-----BEGIN PGP SIGNATURE-----
wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmj3mUoFAwAAAAAACgkQZ0GeRcM5nt1u
DwgAg5JuEHS6090YiTx+CewV1wNrkuRSiU0PyJYrS+CkRU/c3jc3TYKcXRcXUX904rZrYdAdtrQr
lw8dMHzOiKuIL5jDoYthLGmOYtwC4Fy27HfwGRYW2ADi24YY/J3QV9EBjsi1lq0DyM8ZGf4b6yUR
l2JRHVCNMpMLA4+DIK2eWAvoHa9ADj/RJqbAY4eenp1FlaQzQaSeYdy7Us4nsSMyKisoPl4q+Qjg
h8KOQZBGmKqS2VPBs0tURJyznzXW3ulQ8GwnJ14OEj0Il603ciNZdB7snoOcSy+wy3EFJUcM8pmW
SCNWa7EARlBuwZJOaMTdiJW+PpB4J/+dZSveYu6BBg==
=13hU
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-7832-1
October 21, 2025
linux-oracle-5.4 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-oracle-5.4: Linux kernel for Oracle Cloud systems
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Device tree and open firmware driver;
- SCSI subsystem;
- TTY drivers;
- SMB network file system;
- Bluetooth subsystem;
- Network traffic control;
(CVE-2025-38350, CVE-2023-52975, CVE-2024-50073, CVE-2024-57996,
CVE-2024-49950, CVE-2024-38541, CVE-2025-37752, CVE-2023-52757,
CVE-2025-38083, CVE-2025-37797)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 LTS
linux-image-5.4.0-1148-oracle 5.4.0-1148.158~18.04.1
Available with Ubuntu Pro
linux-image-oracle 5.4.0.1148.158~18.04.1
Available with Ubuntu Pro
linux-image-oracle-5.4 5.4.0.1148.158~18.04.1
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-7832-1
CVE-2023-52757, CVE-2023-52975, CVE-2024-38541, CVE-2024-49950,
CVE-2024-50073, CVE-2024-57996, CVE-2025-37752, CVE-2025-37797,
CVE-2025-38083, CVE-2025-38350
No comments:
Post a Comment