Ubuntu alert USN-7795-5 (linux-raspi-5.4)
| From: | Giampaolo Fresi Roglia <giampaolo.fresi.roglia@canonical.com> | |
| To: | ubuntu-security-announce@lists.ubuntu.com | |
| Subject: | [USN-7795-5] Linux kernel (Raspberry Pi) vulnerabilities | |
| Date: | Fri, 07 Nov 2025 10:39:00 +0100 | |
| Message-ID: | <87jz02w5aj.fsf@canonical.com> |
========================================================================== Ubuntu Security Notice USN-7795-5 November 07, 2025 linux-raspi-5.4 vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 18.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux-raspi-5.4: Linux kernel for Raspberry Pi systems Details: Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Ext4 file system; - Network file system (NFS) server daemon; - Packet sockets; - Network traffic control; - VMware vSockets driver; (CVE-2025-21796, CVE-2025-37785, CVE-2025-38477, CVE-2025-38617, CVE-2025-38618) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 18.04 LTS linux-image-5.4.0-1134-raspi 5.4.0-1134.147~18.04.1 Available with Ubuntu Pro linux-image-raspi-5.4 5.4.0.1134.147~18.04.1 Available with Ubuntu Pro linux-image-raspi-hwe-18.04 5.4.0.1134.147~18.04.1 Available with Ubuntu Pro After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-7795-5 https://ubuntu.com/security/notices/USN-7795-4 https://ubuntu.com/security/notices/USN-7795-3 https://ubuntu.com/security/notices/USN-7795-2 https://ubuntu.com/security/notices/USN-7795-1 CVE-2025-21796, CVE-2025-37785, CVE-2025-38477, CVE-2025-38617, CVE-2025-38618
Attachment: signature.asc (type=application/pgp-signature)
-----BEGIN PGP SIGNATURE----- iQHZBAEBCgBDFiEEBcMY+nwS2CY71sUWc4vdAqvdlsYFAmkNvjQlHGdpYW1wYW9s by5mcmVzaS5yb2dsaWFAY2Fub25pY2FsLmNvbQAKCRBzi90Cq92WxkC3C/9EwJMT XpZtCdubMtJFGGElP91/+HjO4Zp/AUfbQKdkHonGPF6+HRrQDLTSFSnuKCAMZLwT a0emK8UChzoPfjf61gZZvfsxjblEc6rI0z+cgaPXZn075NM7gnAcuLfkWo8INnzr wm+R6hqpye4QTMC5hmq8iDXiM/0T/b482MuBqvSkNe40abgwLTckJOO4a6LbfjPE eqeWyK23sNz6p9qXPMxAzKqb9XFAV4bBVKIRDHKKuLA3zTki0+vc2UW+F7KL43az d5Fdvd0knn7qobt0Pm3luaqIGXB4DKeOk0HbV7B77phnH8jQw+SXr0qqm3YmHvNv oM2mJVa39Rk+7b6uJpSKjjY9j3gy9sXrLWgjQE1WbXLEgKmlfcUk6t6RN18OK/6n QSngEJ4WP0Di2WjVIDD/EzulLIlo/bGgVy12z5Ioaf/QwrVUs7njAh1TNE6kw+IG og5ZOVzN0/untr0HhzjG+6fVKj1AS5qyWsDPfWCbtljBD2MgCbpcJyfucaA= =ZOBZ -----END PGP SIGNATURE-----
