Ubuntu 6770 Published by

Ubuntu Linux has received updates addressing multiple security vulnerabilities, including those related to CRaC JDK 21, Apache Tika, GLib, CRaC JDK 17, Tomcat, and Flask:

[USN-7531-1] CRaC JDK 21 vulnerabilities
[USN-7529-1] Apache Tika vulnerabilities
[USN-7517-3] Linux kernel (BlueField) vulnerabilities
[USN-7516-6] Linux kernel (IBM) vulnerabilities
[USN-7524-1] Linux kernel (Raspberry Pi) vulnerabilities
[USN-7532-1] GLib vulnerability
[USN-7533-1] CRaC JDK 17 vulnerabilities
[USN-7525-2] Tomcat vulnerability
[USN-7534-1] Flask vulnerability




[USN-7531-1] CRaC JDK 21 vulnerabilities


MIME-Version: 1.0

==========================================================================
Ubuntu Security Notice USN-7531-1
May 26, 2025

openjdk-21-crac vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.04
- Ubuntu 24.10

Summary:

Several security issues were fixed in CRaC JDK 21.

Software Description:
- openjdk-21-crac: Open Source Java implementation with Coordinated Restore at Checkpoints

Details:

Alicja Kario discovered that the JSSE component of CRaC JDK 21 incorrectly
handled RSA padding. An Attacker could possibly use this issue to obtain
sensitive information. (CVE-2025-21587)

It was discovered that the Compiler component of CRaC JDK 21 incorrectly
handled compiler transformations. An attacker could possibly use this
issue to cause a denial of service or execute arbitrary code.
(CVE-2025-30691)

It was discovered that the 2D component of CRaC JDK 21 did not properly
manage memory under certain circumstances. An attacker could possibly use
this issue to cause a denial of service or execute arbitrary code.
(CVE-2025-30698)

In addition to security fixes, the updated packages contain bug fixes, new
features, and possibly incompatible changes.

Please see the following for more information:
https://openjdk.org/groups/vulnerability/advisories/2025-04-15

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.04
openjdk-21-crac-jdk 21.0.7+6.1-0ubuntu1~25.04
openjdk-21-crac-jdk-headless 21.0.7+6.1-0ubuntu1~25.04
openjdk-21-crac-jre 21.0.7+6.1-0ubuntu1~25.04
openjdk-21-crac-jre-headless 21.0.7+6.1-0ubuntu1~25.04
openjdk-21-crac-jre-zero 21.0.7+6.1-0ubuntu1~25.04

Ubuntu 24.10
openjdk-21-crac-jdk 21.0.7+6.1-0ubuntu1~24.10
openjdk-21-crac-jdk-headless 21.0.7+6.1-0ubuntu1~24.10
openjdk-21-crac-jre 21.0.7+6.1-0ubuntu1~24.10
openjdk-21-crac-jre-headless 21.0.7+6.1-0ubuntu1~24.10
openjdk-21-crac-jre-zero 21.0.7+6.1-0ubuntu1~24.10

This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart Java
applications to make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7531-1
CVE-2025-21587, CVE-2025-30691, CVE-2025-30698

Package Information:
https://launchpad.net/ubuntu/+source/openjdk-21-crac/21.0.7+6.1-0ubuntu1~25.04
https://launchpad.net/ubuntu/+source/openjdk-21-crac/21.0.7+6.1-0ubuntu1~24.10



[USN-7529-1] Apache Tika vulnerabilities


--==============04485776533665400=Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit

=========================================================================
Ubuntu Security Notice USN-7529-1
May 23, 2025

tika vulnerabilities
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in Apache Tika.

Software Description:
- tika: A content analysis toolkit

Details:

It was discovered that Apache Tika can have an excessive memory usage by
using a crafted or corrupt PSD file. An attacker could possibly use this
issue to cause a denial of service. This issue only affected Ubuntu
20.04 LTS. (CVE-2020-1950, CVE-2020-1951)

It was discovered that Apache Tika incorrectly handled certain regular
expressions. An attacker could possibly use this issue to cause a denial
of service. (CVE-2022-30126, CVE-2022-30973, CVE-2022-33879)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS
libtika-java 1.22-2ubuntu0.22.04.1~esm1
Available with Ubuntu Pro

Ubuntu 20.04 LTS
libtika-java 1.22-1ubuntu0.1~esm1
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7529-1
CVE-2020-1950, CVE-2020-1951, CVE-2022-30126, CVE-2022-30973,
CVE-2022-33879

--==============04485776533665400=Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature

--==============04485776533665400==--



[USN-7517-3] Linux kernel (BlueField) vulnerabilities


==========================================================================
Ubuntu Security Notice USN-7517-3
May 26, 2025

linux-bluefield vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-bluefield: Linux kernel for NVIDIA BlueField platforms

Details:

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
- PowerPC architecture;
- Block layer subsystem;
- Drivers core;
- Network block device driver;
- Character device driver;
- GPU drivers;
- HID subsystem;
- InfiniBand drivers;
- Media drivers;
- Network drivers;
- PPS (Pulse Per Second) driver;
- PTP clock framework;
- RapidIO drivers;
- Real Time Clock drivers;
- SCSI subsystem;
- SLIMbus drivers;
- QCOM SoC drivers;
- Trusted Execution Environment drivers;
- USB DSL drivers;
- USB Device Class drivers;
- USB core drivers;
- USB Gadget drivers;
- USB Host Controller drivers;
- Renesas USBHS Controller drivers;
- File systems infrastructure;
- BTRFS file system;
- Ceph distributed file system;
- NILFS2 file system;
- UBI file system;
- KVM subsystem;
- L3 Master device support module;
- Netfilter;
- Process Accounting mechanism;
- printk logging mechanism;
- Scheduler infrastructure;
- Tracing infrastructure;
- Memory management;
- 802.1Q VLAN protocol;
- B.A.T.M.A.N. meshing protocol;
- Bluetooth subsystem;
- Networking core;
- IPv4 networking;
- IPv6 networking;
- Logical Link layer;
- NFC subsystem;
- Open vSwitch;
- Rose network layer;
- Network traffic control;
- Wireless networking;
- Tomoyo security module;
(CVE-2024-58055, CVE-2025-21715, CVE-2024-26982, CVE-2025-21806,
CVE-2024-58052, CVE-2024-57981, CVE-2025-21935, CVE-2025-21763,
CVE-2024-58002, CVE-2025-21736, CVE-2025-21704, CVE-2024-57986,
CVE-2025-21761, CVE-2024-58069, CVE-2025-21934, CVE-2024-58017,
CVE-2025-21862, CVE-2024-26689, CVE-2025-21744, CVE-2025-21776,
CVE-2024-56599, CVE-2025-21858, CVE-2025-21722, CVE-2025-21791,
CVE-2025-21735, CVE-2025-21926, CVE-2025-21904, CVE-2024-58009,
CVE-2024-58010, CVE-2024-58063, CVE-2025-21765, CVE-2025-21914,
CVE-2025-21866, CVE-2025-21760, CVE-2024-57979, CVE-2024-58071,
CVE-2025-21781, CVE-2025-21772, CVE-2025-21928, CVE-2025-21762,
CVE-2024-58014, CVE-2024-57980, CVE-2024-26996, CVE-2025-21708,
CVE-2025-21922, CVE-2024-58051, CVE-2023-52927, CVE-2024-58085,
CVE-2025-21721, CVE-2025-21782, CVE-2025-21871, CVE-2024-50055,
CVE-2025-21749, CVE-2025-21835, CVE-2024-58007, CVE-2025-21971,
CVE-2024-58083, CVE-2025-21731, CVE-2024-57973, CVE-2025-21811,
CVE-2025-21728, CVE-2023-52741, CVE-2025-21865, CVE-2025-21859,
CVE-2025-21823, CVE-2025-21877, CVE-2024-57977, CVE-2025-21917,
CVE-2025-21909, CVE-2025-21846, CVE-2024-58072, CVE-2025-21848,
CVE-2023-52664, CVE-2025-21785, CVE-2021-47191, CVE-2025-21910,
CVE-2025-21925, CVE-2025-21814, CVE-2024-58020, CVE-2025-21764,
CVE-2024-58058, CVE-2025-21905, CVE-2025-21787, CVE-2024-58001,
CVE-2025-21647, CVE-2025-21719, CVE-2024-58090, CVE-2025-21753,
CVE-2025-21718, CVE-2025-21948, CVE-2025-21898, CVE-2025-21920,
CVE-2025-21916)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS
linux-image-5.4.0-1105-bluefield 5.4.0-1105.112
linux-image-bluefield 5.4.0.1105.101

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-7517-3
https://ubuntu.com/security/notices/USN-7517-2
https://ubuntu.com/security/notices/USN-7517-1
CVE-2021-47191, CVE-2023-52664, CVE-2023-52741, CVE-2023-52927,
CVE-2024-26689, CVE-2024-26982, CVE-2024-26996, CVE-2024-50055,
CVE-2024-56599, CVE-2024-57973, CVE-2024-57977, CVE-2024-57979,
CVE-2024-57980, CVE-2024-57981, CVE-2024-57986, CVE-2024-58001,
CVE-2024-58002, CVE-2024-58007, CVE-2024-58009, CVE-2024-58010,
CVE-2024-58014, CVE-2024-58017, CVE-2024-58020, CVE-2024-58051,
CVE-2024-58052, CVE-2024-58055, CVE-2024-58058, CVE-2024-58063,
CVE-2024-58069, CVE-2024-58071, CVE-2024-58072, CVE-2024-58083,
CVE-2024-58085, CVE-2024-58090, CVE-2025-21647, CVE-2025-21704,
CVE-2025-21708, CVE-2025-21715, CVE-2025-21718, CVE-2025-21719,
CVE-2025-21721, CVE-2025-21722, CVE-2025-21728, CVE-2025-21731,
CVE-2025-21735, CVE-2025-21736, CVE-2025-21744, CVE-2025-21749,
CVE-2025-21753, CVE-2025-21760, CVE-2025-21761, CVE-2025-21762,
CVE-2025-21763, CVE-2025-21764, CVE-2025-21765, CVE-2025-21772,
CVE-2025-21776, CVE-2025-21781, CVE-2025-21782, CVE-2025-21785,
CVE-2025-21787, CVE-2025-21791, CVE-2025-21806, CVE-2025-21811,
CVE-2025-21814, CVE-2025-21823, CVE-2025-21835, CVE-2025-21846,
CVE-2025-21848, CVE-2025-21858, CVE-2025-21859, CVE-2025-21862,
CVE-2025-21865, CVE-2025-21866, CVE-2025-21871, CVE-2025-21877,
CVE-2025-21898, CVE-2025-21904, CVE-2025-21905, CVE-2025-21909,
CVE-2025-21910, CVE-2025-21914, CVE-2025-21916, CVE-2025-21917,
CVE-2025-21920, CVE-2025-21922, CVE-2025-21925, CVE-2025-21926,
CVE-2025-21928, CVE-2025-21934, CVE-2025-21935, CVE-2025-21948,
CVE-2025-21971

Package Information:
https://launchpad.net/ubuntu/+source/linux-bluefield/5.4.0-1105.112



[USN-7516-6] Linux kernel (IBM) vulnerabilities


==========================================================================
Ubuntu Security Notice USN-7516-6
May 26, 2025

linux-ibm vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-ibm: Linux kernel for IBM cloud systems

Details:

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
- PowerPC architecture;
- Block layer subsystem;
- Drivers core;
- Network block device driver;
- Character device driver;
- GPU drivers;
- HID subsystem;
- InfiniBand drivers;
- Media drivers;
- Network drivers;
- PPS (Pulse Per Second) driver;
- PTP clock framework;
- RapidIO drivers;
- Real Time Clock drivers;
- SCSI subsystem;
- SLIMbus drivers;
- QCOM SoC drivers;
- Trusted Execution Environment drivers;
- USB DSL drivers;
- USB Device Class drivers;
- USB core drivers;
- USB Gadget drivers;
- USB Host Controller drivers;
- Renesas USBHS Controller drivers;
- File systems infrastructure;
- BTRFS file system;
- NILFS2 file system;
- UBI file system;
- KVM subsystem;
- L3 Master device support module;
- Process Accounting mechanism;
- printk logging mechanism;
- Scheduler infrastructure;
- Tracing infrastructure;
- Memory management;
- 802.1Q VLAN protocol;
- B.A.T.M.A.N. meshing protocol;
- Bluetooth subsystem;
- Networking core;
- IPv4 networking;
- IPv6 networking;
- Logical Link layer;
- NFC subsystem;
- Open vSwitch;
- Rose network layer;
- Network traffic control;
- Wireless networking;
- Tomoyo security module;
(CVE-2025-21814, CVE-2025-21917, CVE-2025-21871, CVE-2024-57973,
CVE-2025-21862, CVE-2025-21877, CVE-2024-26982, CVE-2024-58090,
CVE-2025-21925, CVE-2025-21787, CVE-2025-21763, CVE-2024-58083,
CVE-2025-21719, CVE-2025-21715, CVE-2025-21704, CVE-2025-21865,
CVE-2025-21781, CVE-2025-21762, CVE-2023-52741, CVE-2025-21761,
CVE-2025-21764, CVE-2025-21811, CVE-2025-21846, CVE-2024-57981,
CVE-2024-58051, CVE-2025-21772, CVE-2024-56599, CVE-2024-58014,
CVE-2024-58007, CVE-2025-21760, CVE-2021-47191, CVE-2025-21909,
CVE-2025-21791, CVE-2025-21916, CVE-2024-57979, CVE-2024-26996,
CVE-2024-58085, CVE-2024-58072, CVE-2025-21914, CVE-2025-21848,
CVE-2025-21736, CVE-2025-21785, CVE-2024-58002, CVE-2024-58058,
CVE-2025-21776, CVE-2025-21935, CVE-2025-21722, CVE-2024-58071,
CVE-2025-21721, CVE-2025-21708, CVE-2024-58055, CVE-2025-21782,
CVE-2025-21806, CVE-2025-21922, CVE-2025-21835, CVE-2025-21749,
CVE-2025-21858, CVE-2024-58020, CVE-2024-58069, CVE-2024-57980,
CVE-2025-21735, CVE-2025-21905, CVE-2025-21823, CVE-2024-58052,
CVE-2025-21971, CVE-2024-58063, CVE-2025-21728, CVE-2025-21910,
CVE-2024-58017, CVE-2025-21647, CVE-2025-21934, CVE-2025-21926,
CVE-2024-57986, CVE-2025-21948, CVE-2024-58009, CVE-2025-21765,
CVE-2025-21904, CVE-2025-21866, CVE-2025-21928, CVE-2025-21859,
CVE-2024-58010, CVE-2025-21753, CVE-2025-21718, CVE-2024-58001,
CVE-2025-21731, CVE-2024-50055, CVE-2025-21744, CVE-2025-21920,
CVE-2024-57977, CVE-2025-21898)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS
linux-image-5.4.0-1092-ibm 5.4.0-1092.97
linux-image-ibm-lts-20.04 5.4.0.1092.121

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-7516-6
https://ubuntu.com/security/notices/USN-7516-5
https://ubuntu.com/security/notices/USN-7516-4
https://ubuntu.com/security/notices/USN-7516-3
https://ubuntu.com/security/notices/USN-7516-2
https://ubuntu.com/security/notices/USN-7516-1
CVE-2021-47191, CVE-2023-52741, CVE-2024-26982, CVE-2024-26996,
CVE-2024-50055, CVE-2024-56599, CVE-2024-57973, CVE-2024-57977,
CVE-2024-57979, CVE-2024-57980, CVE-2024-57981, CVE-2024-57986,
CVE-2024-58001, CVE-2024-58002, CVE-2024-58007, CVE-2024-58009,
CVE-2024-58010, CVE-2024-58014, CVE-2024-58017, CVE-2024-58020,
CVE-2024-58051, CVE-2024-58052, CVE-2024-58055, CVE-2024-58058,
CVE-2024-58063, CVE-2024-58069, CVE-2024-58071, CVE-2024-58072,
CVE-2024-58083, CVE-2024-58085, CVE-2024-58090, CVE-2025-21647,
CVE-2025-21704, CVE-2025-21708, CVE-2025-21715, CVE-2025-21718,
CVE-2025-21719, CVE-2025-21721, CVE-2025-21722, CVE-2025-21728,
CVE-2025-21731, CVE-2025-21735, CVE-2025-21736, CVE-2025-21744,
CVE-2025-21749, CVE-2025-21753, CVE-2025-21760, CVE-2025-21761,
CVE-2025-21762, CVE-2025-21763, CVE-2025-21764, CVE-2025-21765,
CVE-2025-21772, CVE-2025-21776, CVE-2025-21781, CVE-2025-21782,
CVE-2025-21785, CVE-2025-21787, CVE-2025-21791, CVE-2025-21806,
CVE-2025-21811, CVE-2025-21814, CVE-2025-21823, CVE-2025-21835,
CVE-2025-21846, CVE-2025-21848, CVE-2025-21858, CVE-2025-21859,
CVE-2025-21862, CVE-2025-21865, CVE-2025-21866, CVE-2025-21871,
CVE-2025-21877, CVE-2025-21898, CVE-2025-21904, CVE-2025-21905,
CVE-2025-21909, CVE-2025-21910, CVE-2025-21914, CVE-2025-21916,
CVE-2025-21917, CVE-2025-21920, CVE-2025-21922, CVE-2025-21925,
CVE-2025-21926, CVE-2025-21928, CVE-2025-21934, CVE-2025-21935,
CVE-2025-21948, CVE-2025-21971

Package Information:
https://launchpad.net/ubuntu/+source/linux-ibm/5.4.0-1092.97



[USN-7524-1] Linux kernel (Raspberry Pi) vulnerabilities


==========================================================================
Ubuntu Security Notice USN-7524-1
May 26, 2025

linux-raspi vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-raspi: Linux kernel for Raspberry Pi systems

Details:

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
- MIPS architecture;
- PowerPC architecture;
- RISC-V architecture;
- S390 architecture;
- SuperH RISC architecture;
- User-Mode Linux (UML);
- x86 architecture;
- Block layer subsystem;
- Cryptographic API;
- Compute Acceleration Framework;
- ACPI drivers;
- Drivers core;
- RAM backed block device driver;
- Ublk userspace block driver;
- Virtio block driver;
- Compressed RAM block device driver;
- Bluetooth drivers;
- TPM device driver;
- Clock framework and drivers;
- Data acquisition framework and drivers;
- CPU frequency scaling framework;
- Hardware crypto device drivers;
- CXL (Compute Express Link) drivers;
- DAX dirext access to differentiated memory framework;
- DMA engine subsystem;
- EDAC drivers;
- ARM SCMI message protocol;
- ARM SCPI message protocol;
- EFI core;
- iSCSI Boot Firmware Table Attributes driver;
- GPIO subsystem;
- GPU drivers;
- HID subsystem;
- Microsoft Hyper-V drivers;
- Hardware monitoring drivers;
- I3C subsystem;
- IIO ADC drivers;
- IIO subsystem;
- InfiniBand drivers;
- IOMMU subsystem;
- IRQ chip drivers;
- LED subsystem;
- Multiple devices driver;
- Media drivers;
- Multifunction device drivers;
- Microchip PCI driver;
- MMC subsystem;
- MTD block device drivers;
- Network drivers;
- Mellanox network drivers;
- STMicroelectronics network drivers;
- NTB driver;
- Virtio pmem driver;
- NVME drivers;
- Parport drivers;
- PCI subsystem;
- PHY drivers;
- Pin controllers subsystem;
- x86 platform drivers;
- i.MX PM domains;
- Power supply drivers;
- Voltage and Current Regulator drivers;
- StarFive reset controller drivers;
- Real Time Clock drivers;
- SCSI subsystem;
- SuperH / SH-Mobile drivers;
- i.MX SoC drivers;
- QCOM SoC drivers;
- Xilinx SoC drivers;
- SPI subsystem;
- Direct Digital Synthesis drivers;
- Media staging drivers;
- TCM subsystem;
- Thermal drivers;
- TTY drivers;
- UFS subsystem;
- DesignWare USB3 driver;
- USB Gadget drivers;
- USB Host Controller drivers;
- USB Dual Role (OTG-ready) Controller drivers;
- USB Serial drivers;
- USB Type-C support driver;
- USB Type-C Port Controller Manager driver;
- TI TPS6598x USB Power Delivery controller driver;
- USB Type-C Connector System Software Interface driver;
- vDPA drivers;
- VFIO drivers;
- Framebuffer layer;
- TDX Guest driver;
- Xen hypervisor drivers;
- AFS file system;
- BTRFS file system;
- File systems infrastructure;
- Ceph distributed file system;
- EROFS file system;
- Ext4 file system;
- F2FS file system;
- JFFS2 file system;
- JFS file system;
- Network file systems library;
- Network file system (NFS) client;
- Network file system (NFS) server daemon;
- NILFS2 file system;
- NTFS3 file system;
- Overlay file system;
- Proc file system;
- Diskquota system;
- SMB network file system;
- UBI file system;
- DRM display driver;
- BPF subsystem;
- VLANs driver;
- Kernel Samepage Merging mechanism;
- Memory management;
- Network file system (NFS) superblock;
- Kernel stack handling interfaces;
- StackDepot library;
- Task handling mechanism;
- userfaultfd() syscall;
- Bluetooth subsystem;
- IP tunnels definitions;
- LAPB network protocol;
- Network namespace;
- Netfilter;
- Network traffic control;
- Network sockets;
- Tracing infrastructure;
- User-space API (UAPI);
- Kernel init infrastructure;
- io_uring subsystem;
- IPC subsystem;
- Control group (cgroup);
- DMA mapping infrastructure;
- Kernel fork() syscall;
- KCSAN framework;
- Kernel thread helper (kthread);
- RCU subsystem;
- Arbitrary resource management;
- Scheduler infrastructure;
- Signal handling mechanism;
- Timer subsystem;
- Workqueue subsystem;
- Vector I/O iterator library;
- KUnit library;
- Maple Tree data structure library;
- 9P file system network protocol;
- Ethernet bridge;
- CAN network layer;
- Networking core;
- DCCP (Datagram Congestion Control Protocol);
- Ethtool driver;
- HSR network protocol;
- IEEE802154.4 network protocol;
- IPv4 networking;
- IPv6 networking;
- IUCV driver;
- MAC80211 subsystem;
- Multipath TCP;
- Netlink;
- NET/ROM layer;
- Packet sockets;
- RDS protocol;
- RxRPC session sockets;
- SCTP protocol;
- SMC sockets;
- Sun RPC protocol;
- TIPC protocol;
- Unix domain sockets;
- VMware vSockets driver;
- Wireless networking;
- eXpress Data Path;
- XFRM subsystem;
- Integrity Measurement Architecture(IMA) framework;
- Key management;
- SELinux security module;
- ALSA framework;
- FireWire sound drivers;
- HD-audio driver;
- MediaTek ASoC drivers;
- QCOM ASoC drivers;
- SoC audio core drivers;
- STMicroelectronics SoC drivers;
- USB sound devices;
(CVE-2025-21651, CVE-2024-55881, CVE-2024-50223, CVE-2024-50033,
CVE-2024-57907, CVE-2024-53233, CVE-2024-57798, CVE-2024-50262,
CVE-2024-50265, CVE-2024-50197, CVE-2024-50066, CVE-2024-50271,
CVE-2024-57892, CVE-2024-56767, CVE-2024-50237, CVE-2024-56638,
CVE-2024-50084, CVE-2025-21638, CVE-2024-56630, CVE-2024-50193,
CVE-2024-50093, CVE-2024-49914, CVE-2024-50221, CVE-2024-50202,
CVE-2025-21659, CVE-2024-50009, CVE-2024-53059, CVE-2024-50206,
CVE-2024-53239, CVE-2024-53219, CVE-2024-53139, CVE-2024-56752,
CVE-2024-50125, CVE-2024-53226, CVE-2024-57940, CVE-2024-57925,
CVE-2024-53081, CVE-2024-53053, CVE-2024-56627, CVE-2024-57882,
CVE-2025-21645, CVE-2025-21642, CVE-2024-50120, CVE-2024-50240,
CVE-2024-53168, CVE-2024-53178, CVE-2024-53166, CVE-2024-50030,
CVE-2024-50299, CVE-2024-57926, CVE-2024-55916, CVE-2024-56593,
CVE-2024-53083, CVE-2024-56641, CVE-2024-50049, CVE-2024-56761,
CVE-2024-56664, CVE-2024-50242, CVE-2024-56589, CVE-2024-50248,
CVE-2024-41013, CVE-2024-50291, CVE-2024-53061, CVE-2024-50105,
CVE-2024-53171, CVE-2024-56568, CVE-2024-50133, CVE-2024-56594,
CVE-2024-56582, CVE-2024-53100, CVE-2024-50021, CVE-2024-56603,
CVE-2024-50055, CVE-2024-56637, CVE-2024-50273, CVE-2025-21660,
CVE-2024-50083, CVE-2024-53063, CVE-2024-56599, CVE-2024-56783,
CVE-2025-21993, CVE-2024-50019, CVE-2024-53177, CVE-2024-50038,
CVE-2024-53113, CVE-2024-50215, CVE-2024-50036, CVE-2024-44955,
CVE-2024-56602, CVE-2024-54193, CVE-2024-56685, CVE-2024-50137,
CVE-2025-21640, CVE-2024-57838, CVE-2024-50024, CVE-2024-57849,
CVE-2024-50304, CVE-2024-50263, CVE-2024-50048, CVE-2024-53176,
CVE-2024-50191, CVE-2024-56781, CVE-2024-56548, CVE-2024-50278,
CVE-2024-57906, CVE-2024-53114, CVE-2025-21646, CVE-2024-53196,
CVE-2024-50135, CVE-2024-50286, CVE-2025-21831, CVE-2024-50163,
CVE-2024-56694, CVE-2024-50023, CVE-2024-50031, CVE-2024-56709,
CVE-2024-50107, CVE-2024-56672, CVE-2024-57887, CVE-2024-50162,
CVE-2024-50207, CVE-2024-53155, CVE-2024-50095, CVE-2024-56703,
CVE-2024-50268, CVE-2024-56607, CVE-2024-53115, CVE-2024-56739,
CVE-2024-53091, CVE-2024-50086, CVE-2024-56580, CVE-2024-56572,
CVE-2024-56693, CVE-2024-57904, CVE-2025-21938, CVE-2024-56698,
CVE-2024-50039, CVE-2024-50233, CVE-2024-50282, CVE-2024-50251,
CVE-2024-53184, CVE-2025-21700, CVE-2024-56565, CVE-2024-53117,
CVE-2024-50288, CVE-2024-50171, CVE-2024-56583, CVE-2024-50115,
CVE-2024-53687, CVE-2024-49568, CVE-2024-53047, CVE-2024-53150,
CVE-2024-56549, CVE-2024-50148, CVE-2024-56679, CVE-2024-57888,
CVE-2024-53680, CVE-2024-50155, CVE-2024-56751, CVE-2024-56610,
CVE-2024-50272, CVE-2024-50182, CVE-2024-57916, CVE-2024-53237,
CVE-2024-50211, CVE-2024-56605, CVE-2024-56601, CVE-2024-48873,
CVE-2024-50166, CVE-2024-50085, CVE-2024-50108, CVE-2024-57792,
CVE-2024-50224, CVE-2024-56779, CVE-2024-50068, CVE-2024-53151,
CVE-2024-56657, CVE-2024-50026, CVE-2024-53138, CVE-2024-57896,
CVE-2024-53222, CVE-2024-50164, CVE-2024-53230, CVE-2024-56614,
CVE-2024-53089, CVE-2024-57895, CVE-2024-56755, CVE-2024-50096,
CVE-2024-56645, CVE-2024-53162, CVE-2024-56566, CVE-2024-53086,
CVE-2024-56718, CVE-2024-50062, CVE-2024-50065, CVE-2024-56763,
CVE-2024-56538, CVE-2024-53127, CVE-2024-49893, CVE-2024-53087,
CVE-2024-53058, CVE-2024-57945, CVE-2024-53174, CVE-2024-53096,
CVE-2024-56546, CVE-2024-56754, CVE-2024-49865, CVE-2024-56635,
CVE-2024-56539, CVE-2024-56551, CVE-2024-53044, CVE-2024-56700,
CVE-2024-56787, CVE-2024-56586, CVE-2024-56687, CVE-2024-53236,
CVE-2024-50058, CVE-2024-53146, CVE-2024-50269, CVE-2024-50056,
CVE-2024-56608, CVE-2024-49899, CVE-2024-53099, CVE-2024-57902,
CVE-2024-56656, CVE-2024-50126, CVE-2024-50274, CVE-2025-21654,
CVE-2025-21971, CVE-2024-53130, CVE-2024-49571, CVE-2024-56742,
CVE-2024-56613, CVE-2024-56575, CVE-2024-56540, CVE-2024-53194,
CVE-2024-50044, CVE-2024-49906, CVE-2024-53163, CVE-2024-56774,
CVE-2024-50143, CVE-2024-49968, CVE-2024-53202, CVE-2024-57876,
CVE-2024-56650, CVE-2024-53685, CVE-2025-21656, CVE-2024-56648,
CVE-2025-21636, CVE-2024-56782, CVE-2024-50198, CVE-2024-50110,
CVE-2024-56775, CVE-2024-50239, CVE-2024-53156, CVE-2024-50045,
CVE-2024-53045, CVE-2024-58237, CVE-2024-50167, CVE-2024-50060,
CVE-2024-56372, CVE-2024-56756, CVE-2024-54455, CVE-2024-56543,
CVE-2024-56772, CVE-2024-50131, CVE-2024-56616, CVE-2024-50185,
CVE-2024-53154, CVE-2024-50138, CVE-2024-53111, CVE-2024-50025,
CVE-2024-50156, CVE-2024-39282, CVE-2024-53140, CVE-2024-57872,
CVE-2024-50077, CVE-2025-21652, CVE-2025-21655, CVE-2024-57901,
CVE-2024-57791, CVE-2024-50259, CVE-2024-57890, CVE-2024-56770,
CVE-2024-53170, CVE-2024-56705, CVE-2024-56597, CVE-2024-50047,
CVE-2024-53101, CVE-2024-50128, CVE-2024-50287, CVE-2024-50186,
CVE-2024-56745, CVE-2024-56720, CVE-2024-57889, CVE-2024-56590,
CVE-2024-57807, CVE-2024-50158, CVE-2024-53198, CVE-2024-57843,
CVE-2024-53095, CVE-2024-56678, CVE-2024-56758, CVE-2024-53120,
CVE-2024-50087, CVE-2024-50147, CVE-2024-56652, CVE-2024-56692,
CVE-2024-56724, CVE-2024-50226, CVE-2024-56609, CVE-2024-56769,
CVE-2024-47408, CVE-2024-53187, CVE-2024-56596, CVE-2024-48875,
CVE-2024-50236, CVE-2024-50284, CVE-2024-49921, CVE-2024-53229,
CVE-2024-50256, CVE-2024-57946, CVE-2024-53175, CVE-2024-56619,
CVE-2024-50257, CVE-2024-53210, CVE-2024-53203, CVE-2025-21658,
CVE-2024-56683, CVE-2024-50302, CVE-2024-56570, CVE-2024-50187,
CVE-2025-21650, CVE-2024-50082, CVE-2024-50194, CVE-2024-53072,
CVE-2024-50118, CVE-2024-53043, CVE-2024-50160, CVE-2025-21635,
CVE-2024-57900, CVE-2024-57879, CVE-2024-50294, CVE-2024-48876,
CVE-2024-50250, CVE-2024-50220, CVE-2025-21648, CVE-2024-50032,
CVE-2024-56765, CVE-2024-56369, CVE-2024-53109, CVE-2024-47143,
CVE-2025-21643, CVE-2024-50261, CVE-2024-56558, CVE-2024-49920,
CVE-2024-56689, CVE-2024-56647, CVE-2024-50290, CVE-2024-57908,
CVE-2024-53209, CVE-2024-53220, CVE-2024-50073, CVE-2024-47711,
CVE-2024-50183, CVE-2024-56690, CVE-2024-50067, CVE-2024-56778,
CVE-2024-56622, CVE-2024-56729, CVE-2024-53157, CVE-2024-53213,
CVE-2024-50130, CVE-2024-56629, CVE-2024-57885, CVE-2025-21637,
CVE-2024-50078, CVE-2024-53224, CVE-2024-50116, CVE-2024-53068,
CVE-2024-50300, CVE-2024-53084, CVE-2024-50099, CVE-2024-56723,
CVE-2024-50230, CVE-2024-56636, CVE-2024-50252, CVE-2024-56587,
CVE-2024-53131, CVE-2024-50046, CVE-2024-50200, CVE-2024-56588,
CVE-2024-47726, CVE-2024-56615, CVE-2024-57917, CVE-2024-50063,
CVE-2024-50246, CVE-2024-53055, CVE-2024-53133, CVE-2024-50205,
CVE-2024-53076, CVE-2024-50283, CVE-2024-56660, CVE-2024-56707,
CVE-2024-50180, CVE-2024-56746, CVE-2025-21756, CVE-2024-50127,
CVE-2024-50145, CVE-2024-56625, CVE-2024-56760, CVE-2024-53121,
CVE-2024-53122, CVE-2024-53062, CVE-2024-53046, CVE-2024-56764,
CVE-2024-57801, CVE-2024-56728, CVE-2022-49034, CVE-2024-53094,
CVE-2024-53147, CVE-2024-56776, CVE-2024-57898, CVE-2024-53148,
CVE-2024-56704, CVE-2024-50035, CVE-2024-50152, CVE-2024-50169,
CVE-2024-56600, CVE-2024-56681, CVE-2024-45828, CVE-2024-53052,
CVE-2024-56574, CVE-2024-56531, CVE-2024-50303, CVE-2024-57897,
CVE-2024-53123, CVE-2024-57874, CVE-2024-57939, CVE-2024-47141,
CVE-2024-56659, CVE-2024-50069, CVE-2024-50141, CVE-2024-50201,
CVE-2024-50270, CVE-2024-56621, CVE-2024-56606, CVE-2024-53129,
CVE-2024-57938, CVE-2024-50203, CVE-2024-56708, CVE-2024-53197,
CVE-2024-53208, CVE-2024-50028, CVE-2024-56677, CVE-2025-21664,
CVE-2024-50121, CVE-2024-56644, CVE-2024-57804, CVE-2024-53145,
CVE-2024-56780, CVE-2024-50112, CVE-2024-56759, CVE-2024-50192,
CVE-2024-53181, CVE-2024-50170, CVE-2024-50080, CVE-2024-50238,
CVE-2024-57912, CVE-2024-50222, CVE-2024-36476, CVE-2024-53107,
CVE-2024-53119, CVE-2024-43098, CVE-2024-56604, CVE-2024-56567,
CVE-2024-47736, CVE-2024-53180, CVE-2024-38608, CVE-2024-53227,
CVE-2024-50136, CVE-2024-53105, CVE-2024-50225, CVE-2024-56649,
CVE-2024-57899, CVE-2024-41014, CVE-2024-50188, CVE-2024-53160,
CVE-2024-53183, CVE-2024-54460, CVE-2024-56725, CVE-2024-56642,
CVE-2024-53223, CVE-2024-56631, CVE-2024-50134, CVE-2024-53135,
CVE-2024-56573, CVE-2024-50104, CVE-2024-53126, CVE-2024-56667,
CVE-2025-21662, CVE-2024-53221, CVE-2024-56786, CVE-2024-50040,
CVE-2024-53085, CVE-2024-50051, CVE-2024-56721, CVE-2024-52332,
CVE-2024-50075, CVE-2024-50208, CVE-2024-50209, CVE-2024-56710,
CVE-2024-50296, CVE-2024-53066, CVE-2025-21701, CVE-2024-56584,
CVE-2024-41932, CVE-2024-50059, CVE-2024-57911, CVE-2024-56785,
CVE-2024-50216, CVE-2024-50249, CVE-2024-49569, CVE-2024-50098,
CVE-2024-56777, CVE-2024-53093, CVE-2024-53067, CVE-2025-21634,
CVE-2024-53190, CVE-2024-50199, CVE-2024-56577, CVE-2024-56653,
CVE-2024-50027, CVE-2024-50285, CVE-2025-21632, CVE-2025-21702,
CVE-2024-57893, CVE-2024-50235, CVE-2024-56658, CVE-2024-57802,
CVE-2024-58087, CVE-2024-53112, CVE-2024-47809, CVE-2024-50111,
CVE-2024-57910, CVE-2024-53142, CVE-2024-50196, CVE-2024-56578,
CVE-2024-53200, CVE-2024-50276, CVE-2024-53188, CVE-2024-53048,
CVE-2024-56771, CVE-2024-53228, CVE-2024-57850, CVE-2024-49972,
CVE-2025-21647, CVE-2024-50072, CVE-2024-56701, CVE-2024-53232,
CVE-2024-50088, CVE-2024-56557, CVE-2024-56632, CVE-2024-50142,
CVE-2024-57806, CVE-2024-53051, CVE-2024-57931, CVE-2024-50103,
CVE-2024-50258, CVE-2024-53172, CVE-2024-53106, CVE-2024-53158,
CVE-2024-56595, CVE-2024-53108, CVE-2024-56626, CVE-2024-56691,
CVE-2024-50289, CVE-2024-53217, CVE-2024-50234, CVE-2024-54683,
CVE-2024-53042, CVE-2024-56675, CVE-2024-50195, CVE-2024-53195,
CVE-2024-56654, CVE-2024-56715, CVE-2025-21639, CVE-2024-57913,
CVE-2024-56717, CVE-2024-56651, CVE-2024-56688, CVE-2024-53128,
CVE-2024-53169, CVE-2024-56620, CVE-2024-50189, CVE-2024-56550,
CVE-2024-50244, CVE-2024-50279, CVE-2024-42122, CVE-2024-58099,
CVE-2024-53179, CVE-2024-56532, CVE-2024-53215, CVE-2024-50232,
CVE-2024-50029, CVE-2024-57933, CVE-2024-56662, CVE-2024-53690,
CVE-2024-53134, CVE-2024-48881, CVE-2024-56727, CVE-2024-56576,
CVE-2024-56670, CVE-2024-56598, CVE-2024-53161, CVE-2024-50061,
CVE-2024-50117, CVE-2025-21653, CVE-2024-50101, CVE-2024-55639,
CVE-2025-21649, CVE-2024-53231, CVE-2024-50041, CVE-2024-50231,
CVE-2024-57932, CVE-2024-50076, CVE-2024-53165, CVE-2024-57793,
CVE-2024-53082, CVE-2024-50020, CVE-2024-50267, CVE-2024-57883,
CVE-2024-50298, CVE-2024-56643, CVE-2024-56640, CVE-2024-50074,
CVE-2024-53125, CVE-2024-56748, CVE-2024-56634, CVE-2024-50064,
CVE-2024-50172, CVE-2024-50255, CVE-2024-50042, CVE-2024-57929,
CVE-2024-56773, CVE-2024-53214, CVE-2024-53110, CVE-2024-56569,
CVE-2024-56581, CVE-2024-56716, CVE-2024-50090, CVE-2024-53218,
CVE-2024-57884, CVE-2024-56611, CVE-2024-50243, CVE-2024-56545,
CVE-2024-56623, CVE-2024-53173, CVE-2024-53090, CVE-2025-21631,
CVE-2024-56744, CVE-2024-56722, CVE-2024-50297, CVE-2024-56726,
CVE-2024-56592, CVE-2024-50275, CVE-2025-21663, CVE-2024-57841,
CVE-2024-50150, CVE-2024-50301, CVE-2024-56579, CVE-2024-53088,
CVE-2024-50153, CVE-2024-50280, CVE-2024-50124, CVE-2024-50229,
CVE-2024-50146, CVE-2024-50057, CVE-2024-56562, CVE-2024-50070,
CVE-2024-50218, CVE-2024-53118, CVE-2024-47794, CVE-2024-50295,
CVE-2024-56747, CVE-2024-56663, CVE-2024-50292, CVE-2024-50140,
CVE-2024-50154, CVE-2024-53050, CVE-2024-41935, CVE-2024-56533,
CVE-2024-50139, CVE-2024-56633, CVE-2024-50184, CVE-2024-53191,
CVE-2024-50022, CVE-2024-50010, CVE-2024-50245, CVE-2024-53079,
CVE-2024-50151, CVE-2024-53234, CVE-2024-50247, CVE-2024-50159,
CVE-2024-57903)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
linux-image-6.8.0-1028-raspi 6.8.0-1028.32
linux-image-raspi 6.8.0-1028.32

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-7524-1
CVE-2022-49034, CVE-2024-36476, CVE-2024-38608, CVE-2024-39282,
CVE-2024-41013, CVE-2024-41014, CVE-2024-41932, CVE-2024-41935,
CVE-2024-42122, CVE-2024-43098, CVE-2024-44955, CVE-2024-45828,
CVE-2024-47141, CVE-2024-47143, CVE-2024-47408, CVE-2024-47711,
CVE-2024-47726, CVE-2024-47736, CVE-2024-47794, CVE-2024-47809,
CVE-2024-48873, CVE-2024-48875, CVE-2024-48876, CVE-2024-48881,
CVE-2024-49568, CVE-2024-49569, CVE-2024-49571, CVE-2024-49865,
CVE-2024-49893, CVE-2024-49899, CVE-2024-49906, CVE-2024-49914,
CVE-2024-49920, CVE-2024-49921, CVE-2024-49968, CVE-2024-49972,
CVE-2024-50009, CVE-2024-50010, CVE-2024-50019, CVE-2024-50020,
CVE-2024-50021, CVE-2024-50022, CVE-2024-50023, CVE-2024-50024,
CVE-2024-50025, CVE-2024-50026, CVE-2024-50027, CVE-2024-50028,
CVE-2024-50029, CVE-2024-50030, CVE-2024-50031, CVE-2024-50032,
CVE-2024-50033, CVE-2024-50035, CVE-2024-50036, CVE-2024-50038,
CVE-2024-50039, CVE-2024-50040, CVE-2024-50041, CVE-2024-50042,
CVE-2024-50044, CVE-2024-50045, CVE-2024-50046, CVE-2024-50047,
CVE-2024-50048, CVE-2024-50049, CVE-2024-50051, CVE-2024-50055,
CVE-2024-50056, CVE-2024-50057, CVE-2024-50058, CVE-2024-50059,
CVE-2024-50060, CVE-2024-50061, CVE-2024-50062, CVE-2024-50063,
CVE-2024-50064, CVE-2024-50065, CVE-2024-50066, CVE-2024-50067,
CVE-2024-50068, CVE-2024-50069, CVE-2024-50070, CVE-2024-50072,
CVE-2024-50073, CVE-2024-50074, CVE-2024-50075, CVE-2024-50076,
CVE-2024-50077, CVE-2024-50078, CVE-2024-50080, CVE-2024-50082,
CVE-2024-50083, CVE-2024-50084, CVE-2024-50085, CVE-2024-50086,
CVE-2024-50087, CVE-2024-50088, CVE-2024-50090, CVE-2024-50093,
CVE-2024-50095, CVE-2024-50096, CVE-2024-50098, CVE-2024-50099,
CVE-2024-50101, CVE-2024-50103, CVE-2024-50104, CVE-2024-50105,
CVE-2024-50107, CVE-2024-50108, CVE-2024-50110, CVE-2024-50111,
CVE-2024-50112, CVE-2024-50115, CVE-2024-50116, CVE-2024-50117,
CVE-2024-50118, CVE-2024-50120, CVE-2024-50121, CVE-2024-50124,
CVE-2024-50125, CVE-2024-50126, CVE-2024-50127, CVE-2024-50128,
CVE-2024-50130, CVE-2024-50131, CVE-2024-50133, CVE-2024-50134,
CVE-2024-50135, CVE-2024-50136, CVE-2024-50137, CVE-2024-50138,
CVE-2024-50139, CVE-2024-50140, CVE-2024-50141, CVE-2024-50142,
CVE-2024-50143, CVE-2024-50145, CVE-2024-50146, CVE-2024-50147,
CVE-2024-50148, CVE-2024-50150, CVE-2024-50151, CVE-2024-50152,
CVE-2024-50153, CVE-2024-50154, CVE-2024-50155, CVE-2024-50156,
CVE-2024-50158, CVE-2024-50159, CVE-2024-50160, CVE-2024-50162,
CVE-2024-50163, CVE-2024-50164, CVE-2024-50166, CVE-2024-50167,
CVE-2024-50169, CVE-2024-50170, CVE-2024-50171, CVE-2024-50172,
CVE-2024-50180, CVE-2024-50182, CVE-2024-50183, CVE-2024-50184,
CVE-2024-50185, CVE-2024-50186, CVE-2024-50187, CVE-2024-50188,
CVE-2024-50189, CVE-2024-50191, CVE-2024-50192, CVE-2024-50193,
CVE-2024-50194, CVE-2024-50195, CVE-2024-50196, CVE-2024-50197,
CVE-2024-50198, CVE-2024-50199, CVE-2024-50200, CVE-2024-50201,
CVE-2024-50202, CVE-2024-50203, CVE-2024-50205, CVE-2024-50206,
CVE-2024-50207, CVE-2024-50208, CVE-2024-50209, CVE-2024-50211,
CVE-2024-50215, CVE-2024-50216, CVE-2024-50218, CVE-2024-50220,
CVE-2024-50221, CVE-2024-50222, CVE-2024-50223, CVE-2024-50224,
CVE-2024-50225, CVE-2024-50226, CVE-2024-50229, CVE-2024-50230,
CVE-2024-50231, CVE-2024-50232, CVE-2024-50233, CVE-2024-50234,
CVE-2024-50235, CVE-2024-50236, CVE-2024-50237, CVE-2024-50238,
CVE-2024-50239, CVE-2024-50240, CVE-2024-50242, CVE-2024-50243,
CVE-2024-50244, CVE-2024-50245, CVE-2024-50246, CVE-2024-50247,
CVE-2024-50248, CVE-2024-50249, CVE-2024-50250, CVE-2024-50251,
CVE-2024-50252, CVE-2024-50255, CVE-2024-50256, CVE-2024-50257,
CVE-2024-50258, CVE-2024-50259, CVE-2024-50261, CVE-2024-50262,
CVE-2024-50263, CVE-2024-50265, CVE-2024-50267, CVE-2024-50268,
CVE-2024-50269, CVE-2024-50270, CVE-2024-50271, CVE-2024-50272,
CVE-2024-50273, CVE-2024-50274, CVE-2024-50275, CVE-2024-50276,
CVE-2024-50278, CVE-2024-50279, CVE-2024-50280, CVE-2024-50282,
CVE-2024-50283, CVE-2024-50284, CVE-2024-50285, CVE-2024-50286,
CVE-2024-50287, CVE-2024-50288, CVE-2024-50289, CVE-2024-50290,
CVE-2024-50291, CVE-2024-50292, CVE-2024-50294, CVE-2024-50295,
CVE-2024-50296, CVE-2024-50297, CVE-2024-50298, CVE-2024-50299,
CVE-2024-50300, CVE-2024-50301, CVE-2024-50302, CVE-2024-50303,
CVE-2024-50304, CVE-2024-52332, CVE-2024-53042, CVE-2024-53043,
CVE-2024-53044, CVE-2024-53045, CVE-2024-53046, CVE-2024-53047,
CVE-2024-53048, CVE-2024-53050, CVE-2024-53051, CVE-2024-53052,
CVE-2024-53053, CVE-2024-53055, CVE-2024-53058, CVE-2024-53059,
CVE-2024-53061, CVE-2024-53062, CVE-2024-53063, CVE-2024-53066,
CVE-2024-53067, CVE-2024-53068, CVE-2024-53072, CVE-2024-53076,
CVE-2024-53079, CVE-2024-53081, CVE-2024-53082, CVE-2024-53083,
CVE-2024-53084, CVE-2024-53085, CVE-2024-53086, CVE-2024-53087,
CVE-2024-53088, CVE-2024-53089, CVE-2024-53090, CVE-2024-53091,
CVE-2024-53093, CVE-2024-53094, CVE-2024-53095, CVE-2024-53096,
CVE-2024-53099, CVE-2024-53100, CVE-2024-53101, CVE-2024-53105,
CVE-2024-53106, CVE-2024-53107, CVE-2024-53108, CVE-2024-53109,
CVE-2024-53110, CVE-2024-53111, CVE-2024-53112, CVE-2024-53113,
CVE-2024-53114, CVE-2024-53115, CVE-2024-53117, CVE-2024-53118,
CVE-2024-53119, CVE-2024-53120, CVE-2024-53121, CVE-2024-53122,
CVE-2024-53123, CVE-2024-53125, CVE-2024-53126, CVE-2024-53127,
CVE-2024-53128, CVE-2024-53129, CVE-2024-53130, CVE-2024-53131,
CVE-2024-53133, CVE-2024-53134, CVE-2024-53135, CVE-2024-53138,
CVE-2024-53139, CVE-2024-53140, CVE-2024-53142, CVE-2024-53145,
CVE-2024-53146, CVE-2024-53147, CVE-2024-53148, CVE-2024-53150,
CVE-2024-53151, CVE-2024-53154, CVE-2024-53155, CVE-2024-53156,
CVE-2024-53157, CVE-2024-53158, CVE-2024-53160, CVE-2024-53161,
CVE-2024-53162, CVE-2024-53163, CVE-2024-53165, CVE-2024-53166,
CVE-2024-53168, CVE-2024-53169, CVE-2024-53170, CVE-2024-53171,
CVE-2024-53172, CVE-2024-53173, CVE-2024-53174, CVE-2024-53175,
CVE-2024-53176, CVE-2024-53177, CVE-2024-53178, CVE-2024-53179,
CVE-2024-53180, CVE-2024-53181, CVE-2024-53183, CVE-2024-53184,
CVE-2024-53187, CVE-2024-53188, CVE-2024-53190, CVE-2024-53191,
CVE-2024-53194, CVE-2024-53195, CVE-2024-53196, CVE-2024-53197,
CVE-2024-53198, CVE-2024-53200, CVE-2024-53202, CVE-2024-53203,
CVE-2024-53208, CVE-2024-53209, CVE-2024-53210, CVE-2024-53213,
CVE-2024-53214, CVE-2024-53215, CVE-2024-53217, CVE-2024-53218,
CVE-2024-53219, CVE-2024-53220, CVE-2024-53221, CVE-2024-53222,
CVE-2024-53223, CVE-2024-53224, CVE-2024-53226, CVE-2024-53227,
CVE-2024-53228, CVE-2024-53229, CVE-2024-53230, CVE-2024-53231,
CVE-2024-53232, CVE-2024-53233, CVE-2024-53234, CVE-2024-53236,
CVE-2024-53237, CVE-2024-53239, CVE-2024-53680, CVE-2024-53685,
CVE-2024-53687, CVE-2024-53690, CVE-2024-54193, CVE-2024-54455,
CVE-2024-54460, CVE-2024-54683, CVE-2024-55639, CVE-2024-55881,
CVE-2024-55916, CVE-2024-56369, CVE-2024-56372, CVE-2024-56531,
CVE-2024-56532, CVE-2024-56533, CVE-2024-56538, CVE-2024-56539,
CVE-2024-56540, CVE-2024-56543, CVE-2024-56545, CVE-2024-56546,
CVE-2024-56548, CVE-2024-56549, CVE-2024-56550, CVE-2024-56551,
CVE-2024-56557, CVE-2024-56558, CVE-2024-56562, CVE-2024-56565,
CVE-2024-56566, CVE-2024-56567, CVE-2024-56568, CVE-2024-56569,
CVE-2024-56570, CVE-2024-56572, CVE-2024-56573, CVE-2024-56574,
CVE-2024-56575, CVE-2024-56576, CVE-2024-56577, CVE-2024-56578,
CVE-2024-56579, CVE-2024-56580, CVE-2024-56581, CVE-2024-56582,
CVE-2024-56583, CVE-2024-56584, CVE-2024-56586, CVE-2024-56587,
CVE-2024-56588, CVE-2024-56589, CVE-2024-56590, CVE-2024-56592,
CVE-2024-56593, CVE-2024-56594, CVE-2024-56595, CVE-2024-56596,
CVE-2024-56597, CVE-2024-56598, CVE-2024-56599, CVE-2024-56600,
CVE-2024-56601, CVE-2024-56602, CVE-2024-56603, CVE-2024-56604,
CVE-2024-56605, CVE-2024-56606, CVE-2024-56607, CVE-2024-56608,
CVE-2024-56609, CVE-2024-56610, CVE-2024-56611, CVE-2024-56613,
CVE-2024-56614, CVE-2024-56615, CVE-2024-56616, CVE-2024-56619,
CVE-2024-56620, CVE-2024-56621, CVE-2024-56622, CVE-2024-56623,
CVE-2024-56625, CVE-2024-56626, CVE-2024-56627, CVE-2024-56629,
CVE-2024-56630, CVE-2024-56631, CVE-2024-56632, CVE-2024-56633,
CVE-2024-56634, CVE-2024-56635, CVE-2024-56636, CVE-2024-56637,
CVE-2024-56638, CVE-2024-56640, CVE-2024-56641, CVE-2024-56642,
CVE-2024-56643, CVE-2024-56644, CVE-2024-56645, CVE-2024-56647,
CVE-2024-56648, CVE-2024-56649, CVE-2024-56650, CVE-2024-56651,
CVE-2024-56652, CVE-2024-56653, CVE-2024-56654, CVE-2024-56656,
CVE-2024-56657, CVE-2024-56658, CVE-2024-56659, CVE-2024-56660,
CVE-2024-56662, CVE-2024-56663, CVE-2024-56664, CVE-2024-56667,
CVE-2024-56670, CVE-2024-56672, CVE-2024-56675, CVE-2024-56677,
CVE-2024-56678, CVE-2024-56679, CVE-2024-56681, CVE-2024-56683,
CVE-2024-56685, CVE-2024-56687, CVE-2024-56688, CVE-2024-56689,
CVE-2024-56690, CVE-2024-56691, CVE-2024-56692, CVE-2024-56693,
CVE-2024-56694, CVE-2024-56698, CVE-2024-56700, CVE-2024-56701,
CVE-2024-56703, CVE-2024-56704, CVE-2024-56705, CVE-2024-56707,
CVE-2024-56708, CVE-2024-56709, CVE-2024-56710, CVE-2024-56715,
CVE-2024-56716, CVE-2024-56717, CVE-2024-56718, CVE-2024-56720,
CVE-2024-56721, CVE-2024-56722, CVE-2024-56723, CVE-2024-56724,
CVE-2024-56725, CVE-2024-56726, CVE-2024-56727, CVE-2024-56728,
CVE-2024-56729, CVE-2024-56739, CVE-2024-56742, CVE-2024-56744,
CVE-2024-56745, CVE-2024-56746, CVE-2024-56747, CVE-2024-56748,
CVE-2024-56751, CVE-2024-56752, CVE-2024-56754, CVE-2024-56755,
CVE-2024-56756, CVE-2024-56758, CVE-2024-56759, CVE-2024-56760,
CVE-2024-56761, CVE-2024-56763, CVE-2024-56764, CVE-2024-56765,
CVE-2024-56767, CVE-2024-56769, CVE-2024-56770, CVE-2024-56771,
CVE-2024-56772, CVE-2024-56773, CVE-2024-56774, CVE-2024-56775,
CVE-2024-56776, CVE-2024-56777, CVE-2024-56778, CVE-2024-56779,
CVE-2024-56780, CVE-2024-56781, CVE-2024-56782, CVE-2024-56783,
CVE-2024-56785, CVE-2024-56786, CVE-2024-56787, CVE-2024-57791,
CVE-2024-57792, CVE-2024-57793, CVE-2024-57798, CVE-2024-57801,
CVE-2024-57802, CVE-2024-57804, CVE-2024-57806, CVE-2024-57807,
CVE-2024-57838, CVE-2024-57841, CVE-2024-57843, CVE-2024-57849,
CVE-2024-57850, CVE-2024-57872, CVE-2024-57874, CVE-2024-57876,
CVE-2024-57879, CVE-2024-57882, CVE-2024-57883, CVE-2024-57884,
CVE-2024-57885, CVE-2024-57887, CVE-2024-57888, CVE-2024-57889,
CVE-2024-57890, CVE-2024-57892, CVE-2024-57893, CVE-2024-57895,
CVE-2024-57896, CVE-2024-57897, CVE-2024-57898, CVE-2024-57899,
CVE-2024-57900, CVE-2024-57901, CVE-2024-57902, CVE-2024-57903,
CVE-2024-57904, CVE-2024-57906, CVE-2024-57907, CVE-2024-57908,
CVE-2024-57910, CVE-2024-57911, CVE-2024-57912, CVE-2024-57913,
CVE-2024-57916, CVE-2024-57917, CVE-2024-57925, CVE-2024-57926,
CVE-2024-57929, CVE-2024-57931, CVE-2024-57932, CVE-2024-57933,
CVE-2024-57938, CVE-2024-57939, CVE-2024-57940, CVE-2024-57945,
CVE-2024-57946, CVE-2024-58087, CVE-2024-58099, CVE-2024-58237,
CVE-2025-21631, CVE-2025-21632, CVE-2025-21634, CVE-2025-21635,
CVE-2025-21636, CVE-2025-21637, CVE-2025-21638, CVE-2025-21639,
CVE-2025-21640, CVE-2025-21642, CVE-2025-21643, CVE-2025-21645,
CVE-2025-21646, CVE-2025-21647, CVE-2025-21648, CVE-2025-21649,
CVE-2025-21650, CVE-2025-21651, CVE-2025-21652, CVE-2025-21653,
CVE-2025-21654, CVE-2025-21655, CVE-2025-21656, CVE-2025-21658,
CVE-2025-21659, CVE-2025-21660, CVE-2025-21662, CVE-2025-21663,
CVE-2025-21664, CVE-2025-21700, CVE-2025-21701, CVE-2025-21702,
CVE-2025-21756, CVE-2025-21831, CVE-2025-21938, CVE-2025-21971,
CVE-2025-21993

Package Information:
https://launchpad.net/ubuntu/+source/linux-raspi/6.8.0-1028.32



[USN-7532-1] GLib vulnerability


==========================================================================
Ubuntu Security Notice USN-7532-1
May 26, 2025

glib2.0 vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.04
- Ubuntu 24.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

GLib could be made to crash or execute arbitrary code if it
received a specially crafted input.

Software Description:
- glib2.0: GLib library of C routines

Details:

It was discovered that Glib incorrectly handled certain inputs.
An attacker could possibly use this issue to cause a crash
or execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.04
libglib2.0-0t64 2.84.1-1ubuntu0.1
libglib2.0-bin 2.84.1-1ubuntu0.1

Ubuntu 24.10
libglib2.0-0t64 2.82.1-0ubuntu1.1
libglib2.0-bin 2.82.1-0ubuntu1.1

Ubuntu 24.04 LTS
libglib2.0-0t64 2.80.0-6ubuntu3.4
libglib2.0-bin 2.80.0-6ubuntu3.4

Ubuntu 22.04 LTS
libglib2.0-0 2.72.4-0ubuntu2.5
libglib2.0-bin 2.72.4-0ubuntu2.5

Ubuntu 20.04 LTS
libglib2.0-0 2.64.6-1~ubuntu20.04.9
libglib2.0-bin 2.64.6-1~ubuntu20.04.9

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7532-1
CVE-2025-4373

Package Information:
https://launchpad.net/ubuntu/+source/glib2.0/2.84.1-1ubuntu0.1
https://launchpad.net/ubuntu/+source/glib2.0/2.82.1-0ubuntu1.1
https://launchpad.net/ubuntu/+source/glib2.0/2.80.0-6ubuntu3.4
https://launchpad.net/ubuntu/+source/glib2.0/2.72.4-0ubuntu2.5
https://launchpad.net/ubuntu/+source/glib2.0/2.64.6-1~ubuntu20.04.9



[USN-7533-1] CRaC JDK 17 vulnerabilities


MIME-Version: 1.0

==========================================================================
Ubuntu Security Notice USN-7533-1
May 26, 2025

openjdk-17-crac vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.04
- Ubuntu 24.10

Summary:

Several security issues were fixed in CRaC JDK 17.

Software Description:
- openjdk-17-crac: Open Source Java implementation with Coordinated Restore at Checkpoints

Details:

Alicja Kario discovered that the JSSE component of CRaC JDK 17 incorrectly
handled RSA padding. An attacker could possibly use this issue to obtain
sensitive information. (CVE-2025-21587)

It was discovered that the Compiler component of CRaC JDK 17 incorrectly
handled compiler transformations. An attacker could possibly use this
issue to cause a denial of service or execute arbitrary code.
(CVE-2025-30691)

It was discovered that the 2D component of CRaC JDK 17 did not properly
manage memory under certain circumstances. An attacker could possibly use
this issue to cause a denial of service or execute arbitrary code.
(CVE-2025-30698)

In addition to security fixes, the updated packages contain bug fixes,
new features, and possibly incompatible changes.

Please see the following link for more information:
https://openjdk.org/groups/vulnerability/advisories/2025-04-15

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.04
openjdk-17-crac-jdk 17.0.15+6-0ubuntu1~25.04
openjdk-17-crac-jdk-headless 17.0.15+6-0ubuntu1~25.04
openjdk-17-crac-jre 17.0.15+6-0ubuntu1~25.04
openjdk-17-crac-jre-headless 17.0.15+6-0ubuntu1~25.04
openjdk-17-crac-jre-zero 17.0.15+6-0ubuntu1~25.04

Ubuntu 24.10
openjdk-17-crac-jdk 17.0.15+6-0ubuntu1~24.10
openjdk-17-crac-jdk-headless 17.0.15+6-0ubuntu1~24.10
openjdk-17-crac-jre 17.0.15+6-0ubuntu1~24.10
openjdk-17-crac-jre-headless 17.0.15+6-0ubuntu1~24.10
openjdk-17-crac-jre-zero 17.0.15+6-0ubuntu1~24.10

This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart Java
applications to make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7533-1
CVE-2025-21587, CVE-2025-30691, CVE-2025-30698

Package Information:
https://launchpad.net/ubuntu/+source/openjdk-17-crac/17.0.15+6-0ubuntu1~25.04
https://launchpad.net/ubuntu/+source/openjdk-17-crac/17.0.15+6-0ubuntu1~24.10



[USN-7525-2] Tomcat vulnerability


MIME-Version: 1.0

==========================================================================
Ubuntu Security Notice USN-7525-2
May 26, 2025

Tomcat vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.04
- Ubuntu 24.10
- Ubuntu 24.04 LTS

Summary:

Tomcat could expose sensitive files or run programs if it received
specially crafted network traffic.

Software Description:
- tomcat9: Apache Tomcat 9 - Servlet and JSP engine

Details:

USN-7525-1 fixed CVE-2025-24813 for tomcat9 in Ubuntu 22.04 LTS,
Ubuntu 20.04 LTS, and Ubuntu 18.04 LTS. This update fixes it for
tomcat9 in Ubuntu 24.04 LTS, Ubuntu 24.10, and Ubuntu 25.10.
These versions include only the tomcat library (libtomcat9-java)
and not the full tomcat server stack.

Original advisory details:

It was discovered that Apache Tomcat incorrectly implemented partial
PUT functionality by replacing path separators with dots in temporary
files. A remote attacker could possibly use this issue to access
sensitive files, inject malicious content, or execute remote code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.04
libtomcat9-java 9.0.70-2ubuntu1.25.04.1

Ubuntu 24.10
libtomcat9-java 9.0.70-2ubuntu1.24.10.1

Ubuntu 24.04 LTS
libtomcat9-java 9.0.70-2ubuntu0.1+esm1
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7525-2
https://ubuntu.com/security/notices/USN-7525-2
CVE-2025-24813

Package Information:
https://launchpad.net/ubuntu/+source/tomcat9/9.0.70-2ubuntu1.25.04.1
https://launchpad.net/ubuntu/+source/tomcat9/9.0.70-2ubuntu1.24.10.1



[USN-7534-1] Flask vulnerability


==========================================================================
Ubuntu Security Notice USN-7534-1
May 26, 2025

flask vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.04

Summary:

Flask could be made to sign sessions with stale keys.

Software Description:
- flask: Micro web framework based on Werkzeug and Jinja2

Details:

It was discovered that Flask incorrectly handled key rotation.
An attacker could possibly use this issue to sign sessions
with stale keys.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.04
python3-flask 3.1.0-2ubuntu1.1

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7534-1
CVE-2025-47278

Package Information:
https://launchpad.net/ubuntu/+source/flask/3.1.0-2ubuntu1.1