|
|
Subscribe / Log in / New account

Ubuntu alert USN-7719-1 (linux-raspi-realtime)

From:  Rodrigo Figueiredo Zaiden <rodrigo.zaiden@canonical.com>
To:  ubuntu-security-announce@lists.ubuntu.com
Subject:  [USN-7719-1] Linux kernel (Raspberry Pi Real-time) vulnerabilities
Date:  Tue, 26 Aug 2025 18:49:07 -0300
Message-ID:  <de8675d8-9edd-476d-8bd9-8a2ca11727d6@canonical.com>

========================================================================== Ubuntu Security Notice USN-7719-1 August 26, 2025 linux-raspi-realtime vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 24.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux-raspi-realtime: Linux kernel for Raspberry Pi Real-time systems Details: Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - PowerPC architecture; - x86 architecture; - Block layer subsystem; - GPIO subsystem; - GPU drivers; - HID subsystem; - Input Device (Mouse) drivers; - Multiple devices driver; - Media drivers; - Network drivers; - PCI subsystem; - S/390 drivers; - SPI subsystem; - Trusted Execution Environment drivers; - UFS subsystem; - USB Device Class drivers; - USB core drivers; - USB Gadget drivers; - Framebuffer layer; - Network file system (NFS) client; - Network file system (NFS) server daemon; - File systems infrastructure; - SMB network file system; - Networking core; - L3 Master device support module; - TCP network protocol; - io_uring subsystem; - Process Accounting mechanism; - BPF subsystem; - Timer subsystem; - Workqueue subsystem; - Memory management; - Amateur Radio drivers; - B.A.T.M.A.N. meshing protocol; - IPv4 networking; - IPv6 networking; - Multipath TCP; - Open vSwitch; - Network traffic control; - SOF drivers; (CVE-2025-21821, CVE-2025-21712, CVE-2025-21864, CVE-2024-54456, CVE-2025-21783, CVE-2025-21858, CVE-2025-21859, CVE-2025-21861, CVE-2025-21746, CVE-2025-21779, CVE-2024-58086, CVE-2025-38083, CVE-2025-21863, CVE-2025-21780, CVE-2025-21838, CVE-2025-21775, CVE-2025-21766, CVE-2025-21844, CVE-2025-21792, CVE-2025-21848, CVE-2025-37797, CVE-2024-58088, CVE-2025-21793, CVE-2025-21835, CVE-2025-21846, CVE-2025-21866, CVE-2024-52559, CVE-2025-21855, CVE-2025-21856, CVE-2025-21759, CVE-2025-21773, CVE-2025-21762, CVE-2025-21839, CVE-2025-21787, CVE-2025-21704, CVE-2025-21796, CVE-2025-21764, CVE-2025-21795, CVE-2025-21706, CVE-2025-21786, CVE-2025-21782, CVE-2025-21768, CVE-2025-21836, CVE-2025-21761, CVE-2025-21785, CVE-2025-21784, CVE-2025-21869, CVE-2025-21776, CVE-2024-58093, CVE-2025-21765, CVE-2025-21772, CVE-2025-21853, CVE-2025-21868, CVE-2025-21763, CVE-2025-21870, CVE-2024-57834, CVE-2024-54458, CVE-2025-21867, CVE-2025-21791, CVE-2024-57977, CVE-2025-21823, CVE-2025-21871, CVE-2025-21760, CVE-2025-21790, CVE-2025-21758, CVE-2025-21862, CVE-2025-21767, CVE-2025-21854, CVE-2024-58020, CVE-2025-21847, CVE-2025-21781, CVE-2025-21857) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 24.04 LTS linux-image-6.8.0-2028-raspi-realtime 6.8.0-2028.29 Available with Ubuntu Pro linux-image-raspi-realtime 6.8.0-2028.29 Available with Ubuntu Pro linux-image-raspi-realtime-6.8 6.8.0-2028.29 Available with Ubuntu Pro After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-7719-1 CVE-2024-52559, CVE-2024-54456, CVE-2024-54458, CVE-2024-57834, CVE-2024-57977, CVE-2024-58020, CVE-2024-58086, CVE-2024-58088, CVE-2024-58093, CVE-2025-21704, CVE-2025-21706, CVE-2025-21712, CVE-2025-21746, CVE-2025-21758, CVE-2025-21759, CVE-2025-21760, CVE-2025-21761, CVE-2025-21762, CVE-2025-21763, CVE-2025-21764, CVE-2025-21765, CVE-2025-21766, CVE-2025-21767, CVE-2025-21768, CVE-2025-21772, CVE-2025-21773, CVE-2025-21775, CVE-2025-21776, CVE-2025-21779, CVE-2025-21780, CVE-2025-21781, CVE-2025-21782, CVE-2025-21783, CVE-2025-21784, CVE-2025-21785, CVE-2025-21786, CVE-2025-21787, CVE-2025-21790, CVE-2025-21791, CVE-2025-21792, CVE-2025-21793, CVE-2025-21795, CVE-2025-21796, CVE-2025-21821, CVE-2025-21823, CVE-2025-21835, CVE-2025-21836, CVE-2025-21838, CVE-2025-21839, CVE-2025-21844, CVE-2025-21846, CVE-2025-21847, CVE-2025-21848, CVE-2025-21853, CVE-2025-21854, CVE-2025-21855, CVE-2025-21856, CVE-2025-21857, CVE-2025-21858, CVE-2025-21859, CVE-2025-21861, CVE-2025-21862, CVE-2025-21863, CVE-2025-21864, CVE-2025-21866, CVE-2025-21867, CVE-2025-21868, CVE-2025-21869, CVE-2025-21870, CVE-2025-21871, CVE-2025-37797, CVE-2025-38083 Package Information: https://launchpad.net/ubuntu/+source/linux-raspi-realtime...


Attachment: OpenPGP_signature.asc (type=application/pgp-signature)

-----BEGIN PGP SIGNATURE----- wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmiuK9QFAwAAAAAACgkQZ0GeRcM5nt32 zwf/eQBSn+Ovdygy4JGa7IIepnVPRNj/JgdT0mocP7xpJdgFNcHW5qDXDwGd6E+wj/J9SQx3yH4z 2xnwNgnttp5/F44wYSdZ6EHWJjrrZTXKQDO6D/ncJrZmw64zMx09gyHOEgtbim/NwVOPmvmF3yG8 wTIgXCK7tGxMkpu4T435NcK2Nv9UZ+taCVOvNyAUdCFyl3aU2Su/ZOIbzBtg8bWHRvUFZkkVYU7g 4KZ/Y5u8lGXOjYlO1+bxOD3BBM6XYorSX+g6WnmJzRRCyZI6uARGR8+1UJx+lEal/UoQJLYR0Nqc wJbUgmRrLXfAVTZuvdNmE/6eNwTmawEOkyXcYECHYA== =Z476 -----END PGP SIGNATURE-----


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds