Ubuntu 6923 Published by

Three Ubuntu Security Notices (USN) were released: USN-7755-1, USN-7722-2, and USN-7755-2. These notices address vulnerabilities in various Linux kernel versions affecting different Ubuntu releases, including Ubuntu 18.04 LTS, Ubuntu 16.04 LTS, Ubuntu 14.04 LTS, Ubuntu 25.04, and Ubuntu 24.04 LTS. The updates correct flaws in media drivers, SPI subsystems, USB core drivers, NILFS2 file systems, IPv6 networking, and network traffic control, among other areas (CVE-2023-52477 through CVE-2025-38350).

[USN-7755-1] Linux kernel vulnerabilities
[USN-7722-2] Linux kernel vulnerability
[USN-7755-2] Linux kernel (FIPS) vulnerabilities




[USN-7755-1] Linux kernel vulnerabilities


==========================================================================
Ubuntu Security Notice USN-7755-1
September 17, 2025

linux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15, linux-gcp,
linux-gcp-4.15, linux-hwe, linux-kvm, linux-oracle vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-azure-4.15: Linux kernel for Microsoft Azure Cloud systems
- linux-gcp-4.15: Linux kernel for Google Cloud Platform (GCP) systems
- linux-kvm: Linux kernel for cloud environments
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-aws-hwe: Linux kernel for Amazon Web Services (AWS-HWE) systems
- linux-azure: Linux kernel for Microsoft Azure Cloud systems
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-hwe: Linux hardware enablement (HWE) kernel

Details:

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Media drivers;
- SPI subsystem;
- USB core drivers;
- NILFS2 file system;
- IPv6 networking;
- Network traffic control;
(CVE-2024-53130, CVE-2025-38350, CVE-2024-50202, CVE-2024-47685,
CVE-2025-37752, CVE-2024-50051, CVE-2024-57996, CVE-2023-52477,
CVE-2024-27074, CVE-2024-53131)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS
linux-image-4.15.0-1146-oracle 4.15.0-1146.157
Available with Ubuntu Pro
linux-image-4.15.0-1167-kvm 4.15.0-1167.172
Available with Ubuntu Pro
linux-image-4.15.0-1177-gcp 4.15.0-1177.194
Available with Ubuntu Pro
linux-image-4.15.0-1184-aws 4.15.0-1184.197
Available with Ubuntu Pro
linux-image-4.15.0-1192-azure 4.15.0-1192.207
Available with Ubuntu Pro
linux-image-4.15.0-241-generic 4.15.0-241.253
Available with Ubuntu Pro
linux-image-4.15.0-241-lowlatency 4.15.0-241.253
Available with Ubuntu Pro
linux-image-aws-4.15 4.15.0.1184.182
Available with Ubuntu Pro
linux-image-aws-lts-18.04 4.15.0.1184.182
Available with Ubuntu Pro
linux-image-azure-4.15 4.15.0.1192.160
Available with Ubuntu Pro
linux-image-azure-lts-18.04 4.15.0.1192.160
Available with Ubuntu Pro
linux-image-gcp-4.15 4.15.0.1177.190
Available with Ubuntu Pro
linux-image-gcp-lts-18.04 4.15.0.1177.190
Available with Ubuntu Pro
linux-image-generic 4.15.0.241.225
Available with Ubuntu Pro
linux-image-kvm 4.15.0.1167.158
Available with Ubuntu Pro
linux-image-lowlatency 4.15.0.241.225
Available with Ubuntu Pro
linux-image-oracle-4.15 4.15.0.1146.151
Available with Ubuntu Pro
linux-image-oracle-lts-18.04 4.15.0.1146.151
Available with Ubuntu Pro
linux-image-virtual 4.15.0.241.225
Available with Ubuntu Pro

Ubuntu 16.04 LTS
linux-image-4.15.0-1177-gcp 4.15.0-1177.194~16.04.1
Available with Ubuntu Pro
linux-image-4.15.0-1184-aws 4.15.0-1184.197~16.04.1
Available with Ubuntu Pro
linux-image-4.15.0-1192-azure 4.15.0-1192.207~16.04.1
Available with Ubuntu Pro
linux-image-4.15.0-241-generic 4.15.0-241.253~16.04.1
Available with Ubuntu Pro
linux-image-4.15.0-241-lowlatency 4.15.0-241.253~16.04.1
Available with Ubuntu Pro
linux-image-aws-hwe 4.15.0.1184.197~16.04.1
Available with Ubuntu Pro
linux-image-azure 4.15.0.1192.207~16.04.1
Available with Ubuntu Pro
linux-image-gcp 4.15.0.1177.194~16.04.1
Available with Ubuntu Pro
linux-image-generic-hwe-16.04 4.15.0.241.253~16.04.1
Available with Ubuntu Pro
linux-image-gke 4.15.0.1177.194~16.04.1
Available with Ubuntu Pro
linux-image-lowlatency-hwe-16.04 4.15.0.241.253~16.04.1
Available with Ubuntu Pro
linux-image-oem 4.15.0.241.253~16.04.1
Available with Ubuntu Pro
linux-image-virtual-hwe-16.04 4.15.0.241.253~16.04.1
Available with Ubuntu Pro

Ubuntu 14.04 LTS
linux-image-4.15.0-1192-azure 4.15.0-1192.207~14.04.1
Available with Ubuntu Pro
linux-image-azure 4.15.0.1192.207~14.04.1
Available with Ubuntu Pro

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-7755-1
CVE-2023-52477, CVE-2024-27074, CVE-2024-47685, CVE-2024-50051,
CVE-2024-50202, CVE-2024-53130, CVE-2024-53131, CVE-2024-57996,
CVE-2025-37752, CVE-2025-38350



[USN-7722-2] Linux kernel vulnerability


==========================================================================
Ubuntu Security Notice USN-7722-2
September 17, 2025

linux-gcp-6.14, linux-oracle, linux-oracle-6.14 vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.04
- Ubuntu 24.04 LTS

Summary:

A security issue was fixed in the Linux kernel.

Software Description:
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-gcp-6.14: Linux kernel for Google Cloud Platform (GCP) systems
- linux-oracle-6.14: Linux kernel for Oracle Cloud systems

Details:

A security issues was discovered in the Linux kernel.
An attacker could possibly use this to compromise the system.
This update corrects flaws in the following subsystem:
- Network traffic control;
(CVE-2025-38350)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.04
linux-image-6.14.0-1012-oracle 6.14.0-1012.12
linux-image-6.14.0-1012-oracle-64k 6.14.0-1012.12
linux-image-oracle 6.14.0-1012.12
linux-image-oracle-6.14 6.14.0-1012.12
linux-image-oracle-64k 6.14.0-1012.12
linux-image-oracle-64k-6.14 6.14.0-1012.12

Ubuntu 24.04 LTS
linux-image-6.14.0-1012-oracle 6.14.0-1012.12~24.04.1
linux-image-6.14.0-1012-oracle-64k 6.14.0-1012.12~24.04.1
linux-image-6.14.0-1015-gcp 6.14.0-1015.16~24.04.1
linux-image-6.14.0-1015-gcp-64k 6.14.0-1015.16~24.04.1
linux-image-gcp 6.14.0-1015.16~24.04.1
linux-image-gcp-6.14 6.14.0-1015.16~24.04.1
linux-image-gcp-64k 6.14.0-1015.16~24.04.1
linux-image-gcp-64k-6.14 6.14.0-1015.16~24.04.1
linux-image-oracle 6.14.0-1012.12~24.04.1
linux-image-oracle-6.14 6.14.0-1012.12~24.04.1
linux-image-oracle-64k 6.14.0-1012.12~24.04.1
linux-image-oracle-64k-6.14 6.14.0-1012.12~24.04.1

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-7722-2
https://ubuntu.com/security/notices/USN-7722-1
CVE-2025-38350

Package Information:
https://launchpad.net/ubuntu/+source/linux-oracle/6.14.0-1012.12
https://launchpad.net/ubuntu/+source/linux-gcp-6.14/6.14.0-1015.16~24.04.1

https://launchpad.net/ubuntu/+source/linux-oracle-6.14/6.14.0-1012.12~24.04.1



[USN-7755-2] Linux kernel (FIPS) vulnerabilities


==========================================================================
Ubuntu Security Notice USN-7755-2
September 17, 2025

linux-fips, linux-azure-fips, linux-gcp-fips vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-azure-fips: Linux kernel for Microsoft Azure Cloud systems with FIPS
- linux-fips: Linux kernel with FIPS
- linux-gcp-fips: Linux kernel for Google Cloud Platform (GCP) systems with
FIPS

Details:

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Media drivers;
- SPI subsystem;
- USB core drivers;
- NILFS2 file system;
- IPv6 networking;
- Network traffic control;
(CVE-2024-53130, CVE-2025-38350, CVE-2024-50202, CVE-2024-47685,
CVE-2025-37752, CVE-2024-50051, CVE-2024-57996, CVE-2023-52477,
CVE-2024-27074, CVE-2024-53131)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS
linux-image-4.15.0-1139-fips 4.15.0-1139.150
Available with Ubuntu Pro
linux-image-4.15.0-2085-gcp-fips 4.15.0-2085.91
Available with Ubuntu Pro
linux-image-4.15.0-2101-azure-fips 4.15.0-2101.107
Available with Ubuntu Pro
linux-image-azure-fips 4.15.0.2101.97
Available with Ubuntu Pro
linux-image-azure-fips-4.15 4.15.0.2101.97
Available with Ubuntu Pro
linux-image-fips 4.15.0.1139.136
Available with Ubuntu Pro
linux-image-gcp-fips 4.15.0.2085.83
Available with Ubuntu Pro
linux-image-gcp-fips-4.15 4.15.0.2085.83
Available with Ubuntu Pro

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-7755-2
https://ubuntu.com/security/notices/USN-7755-1
CVE-2023-52477, CVE-2024-27074, CVE-2024-47685, CVE-2024-50051,
CVE-2024-50202, CVE-2024-53130, CVE-2024-53131, CVE-2024-57996,
CVE-2025-37752, CVE-2025-38350

Package Information:
https://launchpad.net/ubuntu/+source/linux-azure-fips/4.15.0-2101.107
https://launchpad.net/ubuntu/+source/linux-fips/4.15.0-1139.150
https://launchpad.net/ubuntu/+source/linux-gcp-fips/4.15.0-2085.91