Tuesday, March 3, 2026

[USN-7990-6] Linux kernel (Raspberry Pi) vulnerabilities

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmmnGdsFAwAAAAAACgkQZ0GeRcM5nt0d
QggAttKkb5b8aJdiEDfXCQhVdL5+dBS1sX7aNVKVFm55BiIv6gKgCG6SZ8TucrXmI2y/fN3qKphI
QzUOqOFGCkombcpMG5XFfSDdLbCoXDyeCnvIQ957ZCdVzCC7MwW2+rwYki/iZsfZwNkyJxAlykXG
S1IxTnew1oboGK7v46/uhjm++rK71Jz0l66yJeIVcOJRkervNkw5W19ANkTQDn73JhqKnctW8851
ye8qkLgADHsW7PI3ADnznMZEnJiDXXXGMIG7S531yrdQoWruGILpyS2Wy82P2izW08kziTekW576
eXcqjiJ2WmASJIKKWo5W4HWHM8TvheanhH2QuAv1mw==
=NYj6
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-7990-6
March 03, 2026

linux-raspi, linux-raspi-5.4 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-raspi: Linux kernel for Raspberry Pi systems
- linux-raspi-5.4: Linux kernel for Raspberry Pi systems

Details:

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Cryptographic API;
- Padata parallel execution mechanism;
- Netfilter;
(CVE-2022-49698, CVE-2025-21726, CVE-2025-40019)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS
linux-image-5.4.0-1137-raspi 5.4.0-1137.150
Available with Ubuntu Pro
linux-image-raspi 5.4.0.1137.168
Available with Ubuntu Pro
linux-image-raspi-5.4 5.4.0.1137.168
Available with Ubuntu Pro
linux-image-raspi2 5.4.0.1137.168
Available with Ubuntu Pro

Ubuntu 18.04 LTS
linux-image-5.4.0-1137-raspi 5.4.0-1137.150~18.04.1
Available with Ubuntu Pro
linux-image-raspi-5.4 5.4.0.1137.150~18.04.1
Available with Ubuntu Pro
linux-image-raspi-hwe-18.04 5.4.0.1137.150~18.04.1
Available with Ubuntu Pro

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-7990-6
https://ubuntu.com/security/notices/USN-7990-5
https://ubuntu.com/security/notices/USN-7990-4
https://ubuntu.com/security/notices/USN-7990-3
https://ubuntu.com/security/notices/USN-7990-2
https://ubuntu.com/security/notices/USN-7990-1
CVE-2022-49698, CVE-2025-21726, CVE-2025-40019

No comments:

Post a Comment