|
|
Subscribe / Log in / New account

Ubuntu alert USN-7721-1 (linux-azure)

From:  Rodrigo Figueiredo Zaiden <rodrigo.zaiden@canonical.com>
To:  ubuntu-security-announce@lists.ubuntu.com
Subject:  [USN-7721-1] Linux kernel (Azure) vulnerabilities
Date:  Thu, 28 Aug 2025 15:35:29 -0300
Message-ID:  <c35a709c-3943-4a80-b689-d3ea81b8c033@canonical.com>

========================================================================== Ubuntu Security Notice USN-7721-1 August 28, 2025 linux-azure vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 25.04 Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux-azure: Linux kernel for Microsoft Azure Cloud systems Details: Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - PA-RISC architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - x86 architecture; - Compute Acceleration Framework; - Ublk userspace block driver; - Bluetooth drivers; - Buffer Sharing and Synchronization framework; - DMA engine subsystem; - ARM SCMI message protocol; - GPU drivers; - HID subsystem; - IIO ADC drivers; - IIO subsystem; - InfiniBand drivers; - Input Device core drivers; - IOMMU subsystem; - IRQ chip drivers; - Multiple devices driver; - Network drivers; - Mellanox network drivers; - PCI subsystem; - PHY drivers; - PTP clock framework; - Voltage and Current Regulator drivers; - SPI subsystem; - VideoCore services drivers; - USB Type-C Connector System Software Interface driver; - Xen hypervisor drivers; - BTRFS file system; - EROFS file system; - Network file system (NFS) client; - File systems infrastructure; - SMB network file system; - Network traffic control; - eXpress Data Path; - Universal MIDI packet (UMP) support module; - io_uring subsystem; - Kernel command line parsing driver; - Scheduler infrastructure; - Tracing infrastructure; - Memory management; - Networking core; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Management Component Transport Protocol (MCTP); - Netfilter; - Open vSwitch; - TLS protocol; - Wireless networking; - AMD SoC Alsa drivers; - SoC Audio generic drivers; - SOF drivers; (CVE-2025-37959, CVE-2025-37927, CVE-2025-37891, CVE-2025-37906, CVE-2025-37962, CVE-2025-37972, CVE-2025-37919, CVE-2025-37958, CVE-2025-37929, CVE-2025-37969, CVE-2025-37949, CVE-2025-37916, CVE-2025-38027, CVE-2025-37968, CVE-2025-37931, CVE-2025-37923, CVE-2025-37918, CVE-2025-37998, CVE-2025-37907, CVE-2025-37894, CVE-2025-38028, CVE-2025-37915, CVE-2025-38008, CVE-2025-37946, CVE-2025-38020, CVE-2025-37926, CVE-2025-37950, CVE-2025-38216, CVE-2025-37973, CVE-2025-38014, CVE-2025-37963, CVE-2025-38009, CVE-2025-38010, CVE-2025-37971, CVE-2025-38012, CVE-2025-38094, CVE-2025-37955, CVE-2025-37904, CVE-2025-38095, CVE-2025-37951, CVE-2025-37964, CVE-2025-37901, CVE-2025-37956, CVE-2025-38016, CVE-2025-37960, CVE-2025-37898, CVE-2025-37992, CVE-2025-38006, CVE-2025-37993, CVE-2025-37921, CVE-2025-38007, CVE-2025-37930, CVE-2025-37895, CVE-2025-37897, CVE-2025-37933, CVE-2025-37899, CVE-2025-37967, CVE-2025-38019, CVE-2025-37966, CVE-2025-37961, CVE-2025-37934, CVE-2025-37952, CVE-2025-37994, CVE-2025-37914, CVE-2025-38083, CVE-2025-37970, CVE-2025-37965, CVE-2025-38025, CVE-2025-38023, CVE-2025-38015, CVE-2025-37911, CVE-2025-38056, CVE-2025-37995, CVE-2025-37991, CVE-2025-37920, CVE-2025-38011, CVE-2025-37910, CVE-2025-37924, CVE-2025-37996, CVE-2025-37948, CVE-2025-37922, CVE-2025-37947, CVE-2025-37912, CVE-2025-37990, CVE-2025-37909, CVE-2025-38021, CVE-2025-38022, CVE-2025-37908, CVE-2025-37900, CVE-2025-37999, CVE-2025-37905, CVE-2025-37954, CVE-2025-37974, CVE-2025-38005, CVE-2025-37913, CVE-2025-37903, CVE-2025-37896, CVE-2025-38002, CVE-2025-37935, CVE-2025-38018, CVE-2025-37936, CVE-2025-38013, CVE-2025-37957, CVE-2025-37928, CVE-2025-37917, CVE-2025-38024) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 25.04 linux-image-6.14.0-1010-azure 6.14.0-1010.10 linux-image-azure 6.14.0-1010.10 linux-image-azure-6.14 6.14.0-1010.10 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-7721-1 CVE-2025-37891, CVE-2025-37894, CVE-2025-37895, CVE-2025-37896, CVE-2025-37897, CVE-2025-37898, CVE-2025-37899, CVE-2025-37900, CVE-2025-37901, CVE-2025-37903, CVE-2025-37904, CVE-2025-37905, CVE-2025-37906, CVE-2025-37907, CVE-2025-37908, CVE-2025-37909, CVE-2025-37910, CVE-2025-37911, CVE-2025-37912, CVE-2025-37913, CVE-2025-37914, CVE-2025-37915, CVE-2025-37916, CVE-2025-37917, CVE-2025-37918, CVE-2025-37919, CVE-2025-37920, CVE-2025-37921, CVE-2025-37922, CVE-2025-37923, CVE-2025-37924, CVE-2025-37926, CVE-2025-37927, CVE-2025-37928, CVE-2025-37929, CVE-2025-37930, CVE-2025-37931, CVE-2025-37933, CVE-2025-37934, CVE-2025-37935, CVE-2025-37936, CVE-2025-37946, CVE-2025-37947, CVE-2025-37948, CVE-2025-37949, CVE-2025-37950, CVE-2025-37951, CVE-2025-37952, CVE-2025-37954, CVE-2025-37955, CVE-2025-37956, CVE-2025-37957, CVE-2025-37958, CVE-2025-37959, CVE-2025-37960, CVE-2025-37961, CVE-2025-37962, CVE-2025-37963, CVE-2025-37964, CVE-2025-37965, CVE-2025-37966, CVE-2025-37967, CVE-2025-37968, CVE-2025-37969, CVE-2025-37970, CVE-2025-37971, CVE-2025-37972, CVE-2025-37973, CVE-2025-37974, CVE-2025-37990, CVE-2025-37991, CVE-2025-37992, CVE-2025-37993, CVE-2025-37994, CVE-2025-37995, CVE-2025-37996, CVE-2025-37998, CVE-2025-37999, CVE-2025-38002, CVE-2025-38005, CVE-2025-38006, CVE-2025-38007, CVE-2025-38008, CVE-2025-38009, CVE-2025-38010, CVE-2025-38011, CVE-2025-38012, CVE-2025-38013, CVE-2025-38014, CVE-2025-38015, CVE-2025-38016, CVE-2025-38018, CVE-2025-38019, CVE-2025-38020, CVE-2025-38021, CVE-2025-38022, CVE-2025-38023, CVE-2025-38024, CVE-2025-38025, CVE-2025-38027, CVE-2025-38028, CVE-2025-38056, CVE-2025-38083, CVE-2025-38094, CVE-2025-38095, CVE-2025-38216 Package Information: https://launchpad.net/ubuntu/+source/linux-azure/6.14.0-1...


Attachment: OpenPGP_signature.asc (type=application/pgp-signature)

-----BEGIN PGP SIGNATURE----- wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmiwoXEFAwAAAAAACgkQZ0GeRcM5nt3O wQf+J+UhihMl0O1Vx+8b1Gq/4rttTJu8qU+SVtkfX8ICWDNapSnJV21SySHhtPPz9KEM2zNKpDmF tBqdrvqcCpIRhxqk7FVOsCuz74zB9GURoStu8DuG1xnLG6eYoVNpwV6fUQOBkH/FCLKh/LOdhUuf c777LodwB3VUOySYbKbkJlcpdW7Jjeab21jqxiW/Z0cIfOIh0DqdrNoSsIjeijvBPRZQWo1lUv3A xi0RWaXNEmp+mepUEKWjzdbV6Wasf/PhjktZDPTy+BN8CAEAdUPuqVIxCAgwILMxdHhnqY1CFYX6 MtCJJrJRB4boerP/UCIa3zhb29vKKwmFGIb7vnjbfQ== =8UGZ -----END PGP SIGNATURE-----


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds