Ubuntu 6922 Published by

Ubuntu Security Notices have been issued to address vulnerabilities in various packages, including Linux kernel (Raspberry Pi Real-time), GNU binutils, GStreamer Base Plugins, and GStreamer Good Plugins. The vulnerabilities affect multiple Ubuntu releases, including Ubuntu 24.04 LTS, Ubuntu 25.04, and Ubuntu 22.04 LTS. Updates are available to fix the issues, and users are advised to update their systems with the latest package versions.

[USN-7719-1] Linux kernel (Raspberry Pi Real-time) vulnerabilities
[USN-7718-1] GNU binutils vulnerability
[USN-7716-1] GStreamer Base Plugins vulnerabilities
[USN-7717-1] GStreamer Good Plugins vulnerabilities




[USN-7719-1] Linux kernel (Raspberry Pi Real-time) vulnerabilities


==========================================================================
Ubuntu Security Notice USN-7719-1
August 26, 2025

linux-raspi-realtime vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-raspi-realtime: Linux kernel for Raspberry Pi Real-time systems

Details:

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
- PowerPC architecture;
- x86 architecture;
- Block layer subsystem;
- GPIO subsystem;
- GPU drivers;
- HID subsystem;
- Input Device (Mouse) drivers;
- Multiple devices driver;
- Media drivers;
- Network drivers;
- PCI subsystem;
- S/390 drivers;
- SPI subsystem;
- Trusted Execution Environment drivers;
- UFS subsystem;
- USB Device Class drivers;
- USB core drivers;
- USB Gadget drivers;
- Framebuffer layer;
- Network file system (NFS) client;
- Network file system (NFS) server daemon;
- File systems infrastructure;
- SMB network file system;
- Networking core;
- L3 Master device support module;
- TCP network protocol;
- io_uring subsystem;
- Process Accounting mechanism;
- BPF subsystem;
- Timer subsystem;
- Workqueue subsystem;
- Memory management;
- Amateur Radio drivers;
- B.A.T.M.A.N. meshing protocol;
- IPv4 networking;
- IPv6 networking;
- Multipath TCP;
- Open vSwitch;
- Network traffic control;
- SOF drivers;
(CVE-2025-21821, CVE-2025-21712, CVE-2025-21864, CVE-2024-54456,
CVE-2025-21783, CVE-2025-21858, CVE-2025-21859, CVE-2025-21861,
CVE-2025-21746, CVE-2025-21779, CVE-2024-58086, CVE-2025-38083,
CVE-2025-21863, CVE-2025-21780, CVE-2025-21838, CVE-2025-21775,
CVE-2025-21766, CVE-2025-21844, CVE-2025-21792, CVE-2025-21848,
CVE-2025-37797, CVE-2024-58088, CVE-2025-21793, CVE-2025-21835,
CVE-2025-21846, CVE-2025-21866, CVE-2024-52559, CVE-2025-21855,
CVE-2025-21856, CVE-2025-21759, CVE-2025-21773, CVE-2025-21762,
CVE-2025-21839, CVE-2025-21787, CVE-2025-21704, CVE-2025-21796,
CVE-2025-21764, CVE-2025-21795, CVE-2025-21706, CVE-2025-21786,
CVE-2025-21782, CVE-2025-21768, CVE-2025-21836, CVE-2025-21761,
CVE-2025-21785, CVE-2025-21784, CVE-2025-21869, CVE-2025-21776,
CVE-2024-58093, CVE-2025-21765, CVE-2025-21772, CVE-2025-21853,
CVE-2025-21868, CVE-2025-21763, CVE-2025-21870, CVE-2024-57834,
CVE-2024-54458, CVE-2025-21867, CVE-2025-21791, CVE-2024-57977,
CVE-2025-21823, CVE-2025-21871, CVE-2025-21760, CVE-2025-21790,
CVE-2025-21758, CVE-2025-21862, CVE-2025-21767, CVE-2025-21854,
CVE-2024-58020, CVE-2025-21847, CVE-2025-21781, CVE-2025-21857)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
linux-image-6.8.0-2028-raspi-realtime 6.8.0-2028.29
Available with Ubuntu Pro
linux-image-raspi-realtime 6.8.0-2028.29
Available with Ubuntu Pro
linux-image-raspi-realtime-6.8 6.8.0-2028.29
Available with Ubuntu Pro

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-7719-1
CVE-2024-52559, CVE-2024-54456, CVE-2024-54458, CVE-2024-57834,
CVE-2024-57977, CVE-2024-58020, CVE-2024-58086, CVE-2024-58088,
CVE-2024-58093, CVE-2025-21704, CVE-2025-21706, CVE-2025-21712,
CVE-2025-21746, CVE-2025-21758, CVE-2025-21759, CVE-2025-21760,
CVE-2025-21761, CVE-2025-21762, CVE-2025-21763, CVE-2025-21764,
CVE-2025-21765, CVE-2025-21766, CVE-2025-21767, CVE-2025-21768,
CVE-2025-21772, CVE-2025-21773, CVE-2025-21775, CVE-2025-21776,
CVE-2025-21779, CVE-2025-21780, CVE-2025-21781, CVE-2025-21782,
CVE-2025-21783, CVE-2025-21784, CVE-2025-21785, CVE-2025-21786,
CVE-2025-21787, CVE-2025-21790, CVE-2025-21791, CVE-2025-21792,
CVE-2025-21793, CVE-2025-21795, CVE-2025-21796, CVE-2025-21821,
CVE-2025-21823, CVE-2025-21835, CVE-2025-21836, CVE-2025-21838,
CVE-2025-21839, CVE-2025-21844, CVE-2025-21846, CVE-2025-21847,
CVE-2025-21848, CVE-2025-21853, CVE-2025-21854, CVE-2025-21855,
CVE-2025-21856, CVE-2025-21857, CVE-2025-21858, CVE-2025-21859,
CVE-2025-21861, CVE-2025-21862, CVE-2025-21863, CVE-2025-21864,
CVE-2025-21866, CVE-2025-21867, CVE-2025-21868, CVE-2025-21869,
CVE-2025-21870, CVE-2025-21871, CVE-2025-37797, CVE-2025-38083

Package Information:
https://launchpad.net/ubuntu/+source/linux-raspi-realtime/6.8.0-2028.29



[USN-7718-1] GNU binutils vulnerability


=======================================================================

Ubuntu Security Notice USN-7718-1
August 26, 2025

binutils vulnerability
=======================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 LTS

Summary:

GNU binutils could be made to crash if it received a specially crafted
input.

Software Description:
- binutils: GNU assembler, linker and binary utilities

Details:

It was discovered that GNU binutils incorrectly handled certain inputs.
An attacker could possibly use this issue to cause a crash.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 LTS
  binutils                        2.26.1-1ubuntu1~16.04.8+esm12
                                  Available with Ubuntu Pro
  binutils-multiarch              2.26.1-1ubuntu1~16.04.8+esm12
                                  Available with Ubuntu Pro

In general, a standard system update will make all the necessary
changes.

References:
  https://ubuntu.com/security/notices/USN-7718-1
  CVE-2025-7545



[USN-7716-1] GStreamer Base Plugins vulnerabilities


==========================================================================
Ubuntu Security Notice USN-7716-1
August 26, 2025

gst-plugins-base1.0 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.04
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in GStreamer Base Plugins.

Software Description:
- gst-plugins-base1.0: GStreamer plugins

Details:

Shaun Mirani discovered that GStreamer Base Plugins incorrectly handled
certain malformed media files. An attacker could use these issues to cause
GStreamer Base Plugins to crash, resulting in a denial of service, or
possibly execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.04
gstreamer1.0-alsa 1.26.0-1ubuntu0.1
gstreamer1.0-gl 1.26.0-1ubuntu0.1
gstreamer1.0-plugins-base 1.26.0-1ubuntu0.1
gstreamer1.0-plugins-base-apps 1.26.0-1ubuntu0.1
gstreamer1.0-x 1.26.0-1ubuntu0.1
libgstreamer-gl1.0-0 1.26.0-1ubuntu0.1
libgstreamer-plugins-base1.0-0 1.26.0-1ubuntu0.1

Ubuntu 24.04 LTS
gstreamer1.0-alsa 1.24.2-1ubuntu0.3
gstreamer1.0-gl 1.24.2-1ubuntu0.3
gstreamer1.0-plugins-base 1.24.2-1ubuntu0.3
gstreamer1.0-plugins-base-apps 1.24.2-1ubuntu0.3
gstreamer1.0-x 1.24.2-1ubuntu0.3
libgstreamer-gl1.0-0 1.24.2-1ubuntu0.3
libgstreamer-plugins-base1.0-0 1.24.2-1ubuntu0.3

Ubuntu 22.04 LTS
gstreamer1.0-alsa 1.20.1-1ubuntu0.5
gstreamer1.0-gl 1.20.1-1ubuntu0.5
gstreamer1.0-plugins-base 1.20.1-1ubuntu0.5
gstreamer1.0-plugins-base-apps 1.20.1-1ubuntu0.5
gstreamer1.0-x 1.20.1-1ubuntu0.5
libgstreamer-gl1.0-0 1.20.1-1ubuntu0.5
libgstreamer-plugins-base1.0-0 1.20.1-1ubuntu0.5

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7716-1
CVE-2025-47806, CVE-2025-47807, CVE-2025-47808

Package Information:
https://launchpad.net/ubuntu/+source/gst-plugins-base1.0/1.26.0-1ubuntu0.1
https://launchpad.net/ubuntu/+source/gst-plugins-base1.0/1.24.2-1ubuntu0.3
https://launchpad.net/ubuntu/+source/gst-plugins-base1.0/1.20.1-1ubuntu0.5



[USN-7717-1] GStreamer Good Plugins vulnerabilities


==========================================================================
Ubuntu Security Notice USN-7717-1
August 26, 2025

gst-plugins-good1.0 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.04
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in GStreamer Good Plugins.

Software Description:
- gst-plugins-good1.0: GStreamer plugins

Details:

Shaun Mirani discovered that GStreamer Good Plugins incorrectly handled
certain malformed media files. An attacker could use these issues to cause
GStreamer Good Plugins to crash, resulting in a denial of service, or
possibly disclose sensitive information.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.04
gstreamer1.0-gtk3 1.26.0-1ubuntu2.1
gstreamer1.0-plugins-good 1.26.0-1ubuntu2.1
gstreamer1.0-pulseaudio 1.26.0-1ubuntu2.1
gstreamer1.0-qt5 1.26.0-1ubuntu2.1
gstreamer1.0-qt6 1.26.0-1ubuntu2.1
libgstreamer-plugins-good1.0-0 1.26.0-1ubuntu2.1

Ubuntu 24.04 LTS
gstreamer1.0-gtk3 1.24.2-1ubuntu1.2
gstreamer1.0-plugins-good 1.24.2-1ubuntu1.2
gstreamer1.0-pulseaudio 1.24.2-1ubuntu1.2
gstreamer1.0-qt5 1.24.2-1ubuntu1.2
gstreamer1.0-qt6 1.24.2-1ubuntu1.2
libgstreamer-plugins-good1.0-0 1.24.2-1ubuntu1.2

Ubuntu 22.04 LTS
gstreamer1.0-gtk3 1.20.3-0ubuntu1.4
gstreamer1.0-plugins-good 1.20.3-0ubuntu1.4
gstreamer1.0-pulseaudio 1.20.3-0ubuntu1.4
gstreamer1.0-qt5 1.20.3-0ubuntu1.4
libgstreamer-plugins-good1.0-0 1.20.3-0ubuntu1.4

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7717-1
CVE-2025-47183, CVE-2025-47219

Package Information:
https://launchpad.net/ubuntu/+source/gst-plugins-good1.0/1.26.0-1ubuntu2.1
https://launchpad.net/ubuntu/+source/gst-plugins-good1.0/1.24.2-1ubuntu1.2
https://launchpad.net/ubuntu/+source/gst-plugins-good1.0/1.20.3-0ubuntu1.4