[USN-7764-1] Linux kernel vulnerabilities

Giampaolo Fresi Roglia giampaolo.fresi.roglia at canonical.com
Wed Sep 24 10:50:30 UTC 2025


==========================================================================
Ubuntu Security Notice USN-7764-1
September 24, 2025

linux, linux-aws, linux-gcp, linux-gke, linux-gkeop, linux-lowlatency,
linux-lowlatency-hwe-6.8 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-gke: Linux kernel for Google Container Engine (GKE) systems
- linux-gkeop: Linux kernel for Google Container Engine (GKE) systems
- linux-lowlatency: Linux low latency kernel
- linux-lowlatency-hwe-6.8: Linux low latency kernel

Details:

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
  - ARM32 architecture;
  - ARM64 architecture;
  - x86 architecture;
  - Compute Acceleration Framework;
  - Bus devices;
  - AMD CDX bus driver;
  - DPLL subsystem;
  - EFI core;
  - GPIO subsystem;
  - GPU drivers;
  - HID subsystem;
  - I2C subsystem;
  - InfiniBand drivers;
  - Multiple devices driver;
  - Network drivers;
  - Mellanox network drivers;
  - NVME drivers;
  - Pin controllers subsystem;
  - RapidIO drivers;
  - Voltage and Current Regulator drivers;
  - SCSI subsystem;
  - SLIMbus drivers;
  - QCOM SoC drivers;
  - UFS subsystem;
  - USB DSL drivers;
  - Renesas USBHS Controller drivers;
  - USB Type-C Connector System Software Interface driver;
  - Framebuffer layer;
  - ACRN Hypervisor Service Module driver;
  - Network file system (NFS) client;
  - Proc file system;
  - SMB network file system;
  - Memory Management;
  - Scheduler infrastructure;
  - SoC audio core drivers;
  - Perf events;
  - Tracing infrastructure;
  - Memory management;
  - 802.1Q VLAN protocol;
  - Asynchronous Transfer Mode (ATM) subsystem;
  - Bluetooth subsystem;
  - Devlink API;
  - IPv4 networking;
  - IPv6 networking;
  - Logical Link layer;
  - Management Component Transport Protocol (MCTP);
  - Multipath TCP;
  - Netfilter;
  - Network traffic control;
  - Switch device API;
  - Wireless networking;
  - eXpress Data Path;
(CVE-2025-22008, CVE-2025-21872, CVE-2025-21945, CVE-2025-37889,
CVE-2025-21997, CVE-2025-21935, CVE-2025-21986, CVE-2025-21890,
CVE-2025-21925, CVE-2024-58090, CVE-2025-38569, CVE-2025-21911,
CVE-2025-21957, CVE-2025-21891, CVE-2025-21924, CVE-2025-21956,
CVE-2025-21994, CVE-2025-22013, CVE-2025-21964, CVE-2025-21909,
CVE-2025-21888, CVE-2025-21918, CVE-2025-21981, CVE-2025-21966,
CVE-2025-22011, CVE-2025-21877, CVE-2025-21913, CVE-2025-21895,
CVE-2025-21929, CVE-2025-22010, CVE-2025-21992, CVE-2025-21930,
CVE-2025-21982, CVE-2025-21894, CVE-2025-21934, CVE-2025-21873,
CVE-2025-21914, CVE-2025-21941, CVE-2025-21962, CVE-2025-22014,
CVE-2025-21905, CVE-2025-21908, CVE-2025-21898, CVE-2025-21878,
CVE-2025-22009, CVE-2025-21961, CVE-2025-22015, CVE-2025-21883,
CVE-2025-21916, CVE-2025-22016, CVE-2025-21936, CVE-2025-21947,
CVE-2025-21927, CVE-2025-22004, CVE-2025-21926, CVE-2025-21969,
CVE-2025-21976, CVE-2025-21912, CVE-2025-21920, CVE-2025-21951,
CVE-2025-22005, CVE-2025-21978, CVE-2025-21975, CVE-2025-22007,
CVE-2025-21928, CVE-2025-21968, CVE-2025-21963, CVE-2025-21977,
CVE-2025-21915, CVE-2025-21980, CVE-2025-22047, CVE-2025-21972,
CVE-2025-21892, CVE-2025-22003, CVE-2025-21979, CVE-2025-21944,
CVE-2025-21880, CVE-2025-21899, CVE-2025-21995, CVE-2025-22017,
CVE-2025-21946, CVE-2025-22001, CVE-2025-21904, CVE-2025-21881,
CVE-2025-21917, CVE-2025-21970, CVE-2025-21889, CVE-2025-21922,
CVE-2025-21875, CVE-2025-21919, CVE-2025-21991, CVE-2025-21967,
CVE-2025-21960, CVE-2025-21959, CVE-2025-21955, CVE-2025-21996,
CVE-2025-21950, CVE-2025-21937, CVE-2025-21948, CVE-2025-21903,
CVE-2025-21885, CVE-2025-21999, CVE-2025-21910)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
  linux-image-6.8.0-1023-gkeop    6.8.0-1023.25
  linux-image-6.8.0-1036-gke      6.8.0-1036.40
  linux-image-6.8.0-1036-gke-64k  6.8.0-1036.40
  linux-image-6.8.0-1039-aws      6.8.0-1039.41
  linux-image-6.8.0-1039-aws-64k  6.8.0-1039.41
  linux-image-6.8.0-1040-gcp      6.8.0-1040.42
  linux-image-6.8.0-1040-gcp-64k  6.8.0-1040.42
  linux-image-6.8.0-84-generic    6.8.0-84.84
  linux-image-6.8.0-84-generic-64k  6.8.0-84.84
  linux-image-6.8.0-84-lowlatency  6.8.0-84.84.1
  linux-image-6.8.0-84-lowlatency-64k  6.8.0-84.84.1
  linux-image-aws-6.8             6.8.0-1039.41
  linux-image-aws-64k-6.8         6.8.0-1039.41
  linux-image-aws-64k-lts-24.04   6.8.0-1039.41
  linux-image-aws-lts-24.04       6.8.0-1039.41
  linux-image-gcp-6.8             6.8.0-1040.42
  linux-image-gcp-64k-6.8         6.8.0-1040.42
  linux-image-gcp-64k-lts-24.04   6.8.0-1040.42
  linux-image-gcp-lts-24.04       6.8.0-1040.42
  linux-image-generic             6.8.0-84.84
  linux-image-generic-6.8         6.8.0-84.84
  linux-image-generic-64k         6.8.0-84.84
  linux-image-generic-64k-6.8     6.8.0-84.84
  linux-image-generic-lpae        6.8.0-84.84
  linux-image-gke                 6.8.0-1036.40
  linux-image-gke-6.8             6.8.0-1036.40
  linux-image-gke-64k             6.8.0-1036.40
  linux-image-gke-64k-6.8         6.8.0-1036.40
  linux-image-gkeop               6.8.0-1023.25
  linux-image-gkeop-6.8           6.8.0-1023.25
  linux-image-kvm                 6.8.0-84.84
  linux-image-lowlatency          6.8.0-84.84.1
  linux-image-lowlatency-6.8      6.8.0-84.84.1
  linux-image-lowlatency-64k      6.8.0-84.84.1
  linux-image-lowlatency-64k-6.8  6.8.0-84.84.1
  linux-image-virtual             6.8.0-84.84
  linux-image-virtual-6.8         6.8.0-84.84

Ubuntu 22.04 LTS
  linux-image-6.8.0-84-lowlatency  6.8.0-84.84.1~22.04.1
  linux-image-6.8.0-84-lowlatency-64k  6.8.0-84.84.1~22.04.1
  linux-image-lowlatency-6.8      6.8.0-84.84.1~22.04.1
  linux-image-lowlatency-64k-6.8  6.8.0-84.84.1~22.04.1
  linux-image-lowlatency-64k-hwe-22.04  6.8.0-84.84.1~22.04.1
  linux-image-lowlatency-hwe-22.04  6.8.0-84.84.1~22.04.1

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
  https://ubuntu.com/security/notices/USN-7764-1
  CVE-2024-58090, CVE-2025-21872, CVE-2025-21873, CVE-2025-21875,
  CVE-2025-21877, CVE-2025-21878, CVE-2025-21880, CVE-2025-21881,
  CVE-2025-21883, CVE-2025-21885, CVE-2025-21888, CVE-2025-21889,
  CVE-2025-21890, CVE-2025-21891, CVE-2025-21892, CVE-2025-21894,
  CVE-2025-21895, CVE-2025-21898, CVE-2025-21899, CVE-2025-21903,
  CVE-2025-21904, CVE-2025-21905, CVE-2025-21908, CVE-2025-21909,
  CVE-2025-21910, CVE-2025-21911, CVE-2025-21912, CVE-2025-21913,
  CVE-2025-21914, CVE-2025-21915, CVE-2025-21916, CVE-2025-21917,
  CVE-2025-21918, CVE-2025-21919, CVE-2025-21920, CVE-2025-21922,
  CVE-2025-21924, CVE-2025-21925, CVE-2025-21926, CVE-2025-21927,
  CVE-2025-21928, CVE-2025-21929, CVE-2025-21930, CVE-2025-21934,
  CVE-2025-21935, CVE-2025-21936, CVE-2025-21937, CVE-2025-21941,
  CVE-2025-21944, CVE-2025-21945, CVE-2025-21946, CVE-2025-21947,
  CVE-2025-21948, CVE-2025-21950, CVE-2025-21951, CVE-2025-21955,
  CVE-2025-21956, CVE-2025-21957, CVE-2025-21959, CVE-2025-21960,
  CVE-2025-21961, CVE-2025-21962, CVE-2025-21963, CVE-2025-21964,
  CVE-2025-21966, CVE-2025-21967, CVE-2025-21968, CVE-2025-21969,
  CVE-2025-21970, CVE-2025-21972, CVE-2025-21975, CVE-2025-21976,
  CVE-2025-21977, CVE-2025-21978, CVE-2025-21979, CVE-2025-21980,
  CVE-2025-21981, CVE-2025-21982, CVE-2025-21986, CVE-2025-21991,
  CVE-2025-21992, CVE-2025-21994, CVE-2025-21995, CVE-2025-21996,
  CVE-2025-21997, CVE-2025-21999, CVE-2025-22001, CVE-2025-22003,
  CVE-2025-22004, CVE-2025-22005, CVE-2025-22007, CVE-2025-22008,
  CVE-2025-22009, CVE-2025-22010, CVE-2025-22011, CVE-2025-22013,
  CVE-2025-22014, CVE-2025-22015, CVE-2025-22016, CVE-2025-22017,
  CVE-2025-22047, CVE-2025-37889, CVE-2025-38569

Package Information:
  https://launchpad.net/ubuntu/+source/linux/6.8.0-84.84
  https://launchpad.net/ubuntu/+source/linux-aws/6.8.0-1039.41
  https://launchpad.net/ubuntu/+source/linux-gcp/6.8.0-1040.42
  https://launchpad.net/ubuntu/+source/linux-gke/6.8.0-1036.40
  https://launchpad.net/ubuntu/+source/linux-gkeop/6.8.0-1023.25
  https://launchpad.net/ubuntu/+source/linux-lowlatency/6.8.0-84.84.1
  https://launchpad.net/ubuntu/+source/linux-lowlatency-hwe-6.8/6.8.0-84.84.1~22.04.1

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 710 bytes
Desc: not available
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20250924/a687ca38/attachment-0001.sig>


More information about the ubuntu-security-announce mailing list