-----BEGIN PGP SIGNATURE-----
wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmlFZhgFAwAAAAAACgkQZ0GeRcM5nt17
PQf/bwWWEddt+p4fsJbu905KgkCXfdAA3VVkX8lAwTzFc26IpFRKhlX9qk+HC552gr71d9+e/Sl7
oSNXVrGKo1ecqJsPamVNZySF0g69qHQOC5Da7PQdxAvS7jy1fhtPKA4qo4lOw+8OaWv3t4HxbSQE
26gm/At7s7tZwa2K7GZYfmy5fwcwSksV+gXM3+cFdCZfnlR5eYg6lfm9vhVrxucHN7sz1q0gJsdZ
5v4ItzrytZ1hdxW87NHVKLQ34LRwb3cGlLfyP1XiL0GYGyD3X3cMZ98C0zFfL4T8hv9s/3vnh30K
Su38wrscg7EwPwS/SEz7F8IW5UC67NWIdYk6ygFfIw==
=kxr/
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-7931-4
December 19, 2025
linux-xilinx vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-xilinx: Linux kernel for Xilinx systems
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Cryptographic API;
- Media drivers;
- Memory management;
- Appletalk network protocol;
- Netfilter;
(CVE-2025-37958, CVE-2025-38666, CVE-2025-39964, CVE-2025-39993,
CVE-2025-40018)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
linux-image-6.8.0-1021-xilinx 6.8.0-1021.22
linux-image-xilinx 6.8.0.1021.22
linux-image-xilinx-6.8 6.8.0.1021.22
linux-image-xilinx-zynqmp 6.8.0.1021.22
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-7931-4
https://ubuntu.com/security/notices/USN-7931-3
https://ubuntu.com/security/notices/USN-7931-2
https://ubuntu.com/security/notices/USN-7931-1
CVE-2025-37958, CVE-2025-38666, CVE-2025-39964, CVE-2025-39993,
CVE-2025-40018
Package Information:
https://launchpad.net/ubuntu/+source/linux-xilinx/6.8.0-1021.22
No comments:
Post a Comment