Ubuntu 6923 Published by

Ubuntu Linux has been updated with several security patches, including fixes for Perl vulnerabilities, kernel vulnerabilities, and OpenJDK 11 vulnerabilities:

[USN-7678-1] Perl vulnerability
[USN-7654-5] Linux kernel (Xilinx ZynqMP) vulnerabilities
[USN-7674-1] OpenJDK 11 vulnerabilities
[USN-7671-2] Linux kernel vulnerabilities




[USN-7678-1] Perl vulnerability


==========================================================================
Ubuntu Security Notice USN-7678-1
July 29, 2025

perl vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.04
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

Perl could be made to target unintended paths when performing file
operations.

Software Description:
- perl: Practical Extraction and Report Language

Details:

It was discovered that Perl threads incorrectly handled certain file
operations. A local attacker could possibly use this issue to load code or
access files from unexpected locations.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.04
perl 5.40.1-2ubuntu0.2

Ubuntu 24.04 LTS
perl 5.38.2-3.2ubuntu0.2

Ubuntu 22.04 LTS
perl 5.34.0-3ubuntu1.5

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7678-1
CVE-2025-40909

Package Information:
https://launchpad.net/ubuntu/+source/perl/5.40.1-2ubuntu0.2
https://launchpad.net/ubuntu/+source/perl/5.38.2-3.2ubuntu0.2
https://launchpad.net/ubuntu/+source/perl/5.34.0-3ubuntu1.5



[USN-7654-5] Linux kernel (Xilinx ZynqMP) vulnerabilities


==========================================================================
Ubuntu Security Notice USN-7654-5
July 29, 2025

linux-xilinx-zynqmp vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-xilinx-zynqmp: Linux kernel for Xilinx ZynqMP processors

Details:

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- PA-RISC architecture;
- PowerPC architecture;
- x86 architecture;
- Block layer subsystem;
- Cryptographic API;
- Serial ATA and Parallel ATA drivers;
- Bluetooth drivers;
- Bus devices;
- CPU frequency scaling framework;
- Buffer Sharing and Synchronization framework;
- DMA engine subsystem;
- ARM SCMI message protocol;
- GPU drivers;
- HID subsystem;
- HSI subsystem;
- I2C subsystem;
- I3C subsystem;
- IIO subsystem;
- InfiniBand drivers;
- IOMMU subsystem;
- IRQ chip drivers;
- MCB driver;
- Multiple devices driver;
- Media drivers;
- Multifunction device drivers;
- PCI Endpoint Test driver;
- MTD block device drivers;
- Network drivers;
- Device tree and open firmware driver;
- PCI subsystem;
- TI SCI PM domains driver;
- PWM drivers;
- S/390 drivers;
- SCSI subsystem;
- Samsung SoC drivers;
- TCM subsystem;
- UFS subsystem;
- Cadence USB3 driver;
- ChipIdea USB driver;
- USB Device Class drivers;
- DesignWare USB3 driver;
- USB Gadget drivers;
- USB Type-C support driver;
- USB Type-C Connector System Software Interface driver;
- Backlight driver;
- Framebuffer layer;
- Xen hypervisor drivers;
- BTRFS file system;
- Ext4 file system;
- F2FS file system;
- File systems infrastructure;
- JFS file system;
- Network file system (NFS) client;
- Network file system (NFS) server daemon;
- Proc file system;
- SMB network file system;
- Kernel stack handling interfaces;
- Bluetooth subsystem;
- Network traffic control;
- SCTP protocol;
- BPF subsystem;
- Kernel command line parsing driver;
- Tracing infrastructure;
- Memory management;
- 802.1Q VLAN protocol;
- Networking core;
- IPv6 networking;
- MAC80211 subsystem;
- Management Component Transport Protocol (MCTP);
- Multipath TCP;
- Netfilter;
- Open vSwitch;
- Phonet protocol;
- TIPC protocol;
- TLS protocol;
- Virtio sound driver;
- CPU Power monitoring subsystem;
(CVE-2025-37758, CVE-2025-37983, CVE-2025-37768, CVE-2025-37810,
CVE-2025-23140, CVE-2025-37757, CVE-2024-35943, CVE-2022-49168,
CVE-2024-54458, CVE-2024-56751, CVE-2025-37985, CVE-2025-37969,
CVE-2025-37930, CVE-2025-38094, CVE-2025-37749, CVE-2025-37796,
CVE-2024-46751, CVE-2025-37780, CVE-2025-37738, CVE-2025-37765,
CVE-2024-35866, CVE-2025-37771, CVE-2025-37892, CVE-2024-50280,
CVE-2025-37789, CVE-2025-21839, CVE-2023-52757, CVE-2025-37781,
CVE-2025-38024, CVE-2024-50258, CVE-2023-52572, CVE-2025-23148,
CVE-2024-27402, CVE-2025-37824, CVE-2025-37875, CVE-2025-37940,
CVE-2025-37998, CVE-2025-37883, CVE-2024-26739, CVE-2025-37858,
CVE-2024-53203, CVE-2025-37970, CVE-2025-23150, CVE-2025-23163,
CVE-2025-23144, CVE-2025-38023, CVE-2025-37773, CVE-2025-37811,
CVE-2025-37792, CVE-2025-37739, CVE-2025-37991, CVE-2025-37836,
CVE-2025-37812, CVE-2022-49535, CVE-2025-37927, CVE-2025-37885,
CVE-2025-23142, CVE-2025-23161, CVE-2024-53128, CVE-2025-37850,
CVE-2025-37857, CVE-2025-37992, CVE-2025-37790, CVE-2024-49960,
CVE-2025-37756, CVE-2025-37808, CVE-2025-37905, CVE-2024-50272,
CVE-2025-37742, CVE-2025-37967, CVE-2025-37994, CVE-2024-42322,
CVE-2025-37794, CVE-2025-37949, CVE-2025-37787, CVE-2025-37995,
CVE-2024-35790, CVE-2024-46816, CVE-2024-46742, CVE-2025-23159,
CVE-2022-49063, CVE-2025-37788, CVE-2025-37797, CVE-2025-37913,
CVE-2025-37740, CVE-2025-37989, CVE-2025-37914, CVE-2025-23151,
CVE-2022-48893, CVE-2025-37851, CVE-2025-23157, CVE-2025-37923,
CVE-2025-23158, CVE-2025-37871, CVE-2025-37982, CVE-2025-37862,
CVE-2022-21546, CVE-2025-37841, CVE-2025-37844, CVE-2024-35867,
CVE-2025-23147, CVE-2025-37819, CVE-2024-49989, CVE-2025-37830,
CVE-2025-38009, CVE-2024-46774, CVE-2025-37990, CVE-2025-37859,
CVE-2025-37911, CVE-2024-38540, CVE-2025-37767, CVE-2025-37770,
CVE-2025-22062, CVE-2025-37840, CVE-2025-23156, CVE-2025-23145,
CVE-2025-37839, CVE-2025-37823, CVE-2025-22027, CVE-2025-37838,
CVE-2025-37805, CVE-2025-37964, CVE-2025-37867, CVE-2025-37915,
CVE-2025-38005, CVE-2025-37829, CVE-2025-37909, CVE-2025-37741,
CVE-2024-26686, CVE-2024-50125, CVE-2024-38541, CVE-2025-37803,
CVE-2025-23146, CVE-2025-37881, CVE-2025-37766, CVE-2025-37912,
CVE-2024-36908, CVE-2025-21853, CVE-2025-37817)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS
linux-image-5.15.0-1052-xilinx-zynqmp 5.15.0-1052.56
linux-image-xilinx-zynqmp 5.15.0.1052.55
linux-image-xilinx-zynqmp-5.15 5.15.0.1052.55

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-7654-5
https://ubuntu.com/security/notices/USN-7654-4
https://ubuntu.com/security/notices/USN-7654-3
https://ubuntu.com/security/notices/USN-7654-2
https://ubuntu.com/security/notices/USN-7654-1
CVE-2022-21546, CVE-2022-48893, CVE-2022-49063, CVE-2022-49168,
CVE-2022-49535, CVE-2023-52572, CVE-2023-52757, CVE-2024-26686,
CVE-2024-26739, CVE-2024-27402, CVE-2024-35790, CVE-2024-35866,
CVE-2024-35867, CVE-2024-35943, CVE-2024-36908, CVE-2024-38540,
CVE-2024-38541, CVE-2024-42322, CVE-2024-46742, CVE-2024-46751,
CVE-2024-46774, CVE-2024-46816, CVE-2024-49960, CVE-2024-49989,
CVE-2024-50125, CVE-2024-50258, CVE-2024-50272, CVE-2024-50280,
CVE-2024-53128, CVE-2024-53203, CVE-2024-54458, CVE-2024-56751,
CVE-2025-21839, CVE-2025-21853, CVE-2025-22027, CVE-2025-22062,
CVE-2025-23140, CVE-2025-23142, CVE-2025-23144, CVE-2025-23145,
CVE-2025-23146, CVE-2025-23147, CVE-2025-23148, CVE-2025-23150,
CVE-2025-23151, CVE-2025-23156, CVE-2025-23157, CVE-2025-23158,
CVE-2025-23159, CVE-2025-23161, CVE-2025-23163, CVE-2025-37738,
CVE-2025-37739, CVE-2025-37740, CVE-2025-37741, CVE-2025-37742,
CVE-2025-37749, CVE-2025-37756, CVE-2025-37757, CVE-2025-37758,
CVE-2025-37765, CVE-2025-37766, CVE-2025-37767, CVE-2025-37768,
CVE-2025-37770, CVE-2025-37771, CVE-2025-37773, CVE-2025-37780,
CVE-2025-37781, CVE-2025-37787, CVE-2025-37788, CVE-2025-37789,
CVE-2025-37790, CVE-2025-37792, CVE-2025-37794, CVE-2025-37796,
CVE-2025-37797, CVE-2025-37803, CVE-2025-37805, CVE-2025-37808,
CVE-2025-37810, CVE-2025-37811, CVE-2025-37812, CVE-2025-37817,
CVE-2025-37819, CVE-2025-37823, CVE-2025-37824, CVE-2025-37829,
CVE-2025-37830, CVE-2025-37836, CVE-2025-37838, CVE-2025-37839,
CVE-2025-37840, CVE-2025-37841, CVE-2025-37844, CVE-2025-37850,
CVE-2025-37851, CVE-2025-37857, CVE-2025-37858, CVE-2025-37859,
CVE-2025-37862, CVE-2025-37867, CVE-2025-37871, CVE-2025-37875,
CVE-2025-37881, CVE-2025-37883, CVE-2025-37885, CVE-2025-37892,
CVE-2025-37905, CVE-2025-37909, CVE-2025-37911, CVE-2025-37912,
CVE-2025-37913, CVE-2025-37914, CVE-2025-37915, CVE-2025-37923,
CVE-2025-37927, CVE-2025-37930, CVE-2025-37940, CVE-2025-37949,
CVE-2025-37964, CVE-2025-37967, CVE-2025-37969, CVE-2025-37970,
CVE-2025-37982, CVE-2025-37983, CVE-2025-37985, CVE-2025-37989,
CVE-2025-37990, CVE-2025-37991, CVE-2025-37992, CVE-2025-37994,
CVE-2025-37995, CVE-2025-37998, CVE-2025-38005, CVE-2025-38009,
CVE-2025-38023, CVE-2025-38024, CVE-2025-38094

Package Information:
https://launchpad.net/ubuntu/+source/linux-xilinx-zynqmp/5.15.0-1052.56



[USN-7674-1] OpenJDK 11 vulnerabilities


==========================================================================
Ubuntu Security Notice USN-7674-1
July 28, 2025

openjdk-lts vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.04
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in OpenJDK 11.

Software Description:
- openjdk-lts: Open Source Java implementation

Details:

It was discovered that the 2D component of OpenJDK 11 did not properly
manage memory under certain circumstances. An attacker could possibly
use this issue to cause a denial of service or execute arbitrary code.
(CVE-2025-30749, CVE-2025-50106)

VMashroor Hasan Bhuiyan discovered that the JSSE component of OpenJDK 11
did not properly manage TLS 1.3 handshakes under certain circumstances.
An attacker could possibly use this issue to obtain sensitive
information. (CVE-2025-30754)

Martin van Wingerden and Violeta Georgieva of Broadcom discovered
that the Networking component of OpenJDK 11 did not properly
manage network connections under certain circumstances. An attacker
could possibly use this issue to obtain sensitive information.
(CVE-2025-50059)

It was discovered that the Scripting component of OpenJDK 11 did not
properly manage properties under certain circumstances. An attacker
could possibly use this issue to cause a denial of service, execute
arbitrary code or bypass Java sandbox restrictions. (CVE-2025-30761)

In addition to security fixes, the updated packages contain bug fixes,
new features, and possibly incompatible changes.

Please see the following link for more information:
https://openjdk.org/groups/vulnerability/advisories/2025-07-15

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.04
openjdk-11-jdk 11.0.28+6-1ubuntu1~25.04.1
openjdk-11-jdk-headless 11.0.28+6-1ubuntu1~25.04.1
openjdk-11-jre 11.0.28+6-1ubuntu1~25.04.1
openjdk-11-jre-headless 11.0.28+6-1ubuntu1~25.04.1
openjdk-11-jre-zero 11.0.28+6-1ubuntu1~25.04.1

Ubuntu 24.04 LTS
openjdk-11-jdk 11.0.28+6-1ubuntu1~24.04.1
Available with Ubuntu Pro
openjdk-11-jdk-headless 11.0.28+6-1ubuntu1~24.04.1
Available with Ubuntu Pro
openjdk-11-jre 11.0.28+6-1ubuntu1~24.04.1
Available with Ubuntu Pro
openjdk-11-jre-headless 11.0.28+6-1ubuntu1~24.04.1
Available with Ubuntu Pro
openjdk-11-jre-zero 11.0.28+6-1ubuntu1~24.04.1
Available with Ubuntu Pro

Ubuntu 22.04 LTS
openjdk-11-jdk 11.0.28+6-1ubuntu1~22.04.1
openjdk-11-jdk-headless 11.0.28+6-1ubuntu1~22.04.1
openjdk-11-jre 11.0.28+6-1ubuntu1~22.04.1
openjdk-11-jre-headless 11.0.28+6-1ubuntu1~22.04.1
openjdk-11-jre-zero 11.0.28+6-1ubuntu1~22.04.1

Ubuntu 20.04 LTS
openjdk-11-jdk 11.0.28+6-1ubuntu1~20.04.1
Available with Ubuntu Pro
openjdk-11-jdk-headless 11.0.28+6-1ubuntu1~20.04.1
Available with Ubuntu Pro
openjdk-11-jre 11.0.28+6-1ubuntu1~20.04.1
Available with Ubuntu Pro
openjdk-11-jre-headless 11.0.28+6-1ubuntu1~20.04.1
Available with Ubuntu Pro
openjdk-11-jre-zero 11.0.28+6-1ubuntu1~20.04.1
Available with Ubuntu Pro

Ubuntu 18.04 LTS
openjdk-11-jdk 11.0.28+6-1ubuntu1~18.04.1
Available with Ubuntu Pro
openjdk-11-jdk-headless 11.0.28+6-1ubuntu1~18.04.1
Available with Ubuntu Pro
openjdk-11-jre 11.0.28+6-1ubuntu1~18.04.1
Available with Ubuntu Pro
openjdk-11-jre-headless 11.0.28+6-1ubuntu1~18.04.1
Available with Ubuntu Pro
openjdk-11-jre-zero 11.0.28+6-1ubuntu1~18.04.1
Available with Ubuntu Pro

This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart Java
applications to make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7674-1
CVE-2025-30749, CVE-2025-30754, CVE-2025-30761, CVE-2025-50059,
CVE-2025-50106

Package Information:
https://launchpad.net/ubuntu/+source/openjdk-lts/11.0.28+6-1ubuntu1~25.04.1
https://launchpad.net/ubuntu/+source/openjdk-lts/11.0.28+6-1ubuntu1~22.04.1



[USN-7671-2] Linux kernel vulnerabilities


==========================================================================
Ubuntu Security Notice USN-7671-2
July 29, 2025

linux-azure, linux-azure-5.4, linux-azure-fips, linux-raspi,
linux-raspi-5.4 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-azure: Linux kernel for Microsoft Azure Cloud systems
- linux-azure-fips: Linux kernel for Microsoft Azure Cloud systems with FIPS
- linux-raspi: Linux kernel for Raspberry Pi systems
- linux-azure-5.4: Linux kernel for Microsoft Azure cloud systems
- linux-raspi-5.4: Linux kernel for Raspberry Pi systems

Details:

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ACPI drivers;
- GPU drivers;
- SMB network file system;
- Memory management;
- Netfilter;
- Network traffic control;
(CVE-2024-53051, CVE-2024-46787, CVE-2024-50047, CVE-2024-56662,
CVE-2025-37890, CVE-2025-38001, CVE-2025-37997, CVE-2025-37932,
CVE-2025-37798, CVE-2025-38177, CVE-2025-38000)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS
linux-image-5.4.0-1131-raspi 5.4.0-1131.144
Available with Ubuntu Pro
linux-image-5.4.0-1153-azure 5.4.0-1153.160
Available with Ubuntu Pro
linux-image-5.4.0-1154-azure-fips 5.4.0-1154.161+fips1
Available with Ubuntu Pro
linux-image-azure-5.4 5.4.0.1153.147
Available with Ubuntu Pro
linux-image-azure-fips 5.4.0.1154.91
Available with Ubuntu Pro
linux-image-azure-fips-5.4 5.4.0.1154.91
Available with Ubuntu Pro
linux-image-azure-lts-20.04 5.4.0.1153.147
Available with Ubuntu Pro
linux-image-raspi 5.4.0.1131.162
Available with Ubuntu Pro
linux-image-raspi-5.4 5.4.0.1131.162
Available with Ubuntu Pro
linux-image-raspi2 5.4.0.1131.162
Available with Ubuntu Pro

Ubuntu 18.04 LTS
linux-image-5.4.0-1131-raspi 5.4.0-1131.144~18.04.1
Available with Ubuntu Pro
linux-image-5.4.0-1153-azure 5.4.0-1153.160~18.04.1
Available with Ubuntu Pro
linux-image-azure 5.4.0.1153.160~18.04.1
Available with Ubuntu Pro
linux-image-azure-5.4 5.4.0.1153.160~18.04.1
Available with Ubuntu Pro
linux-image-raspi-5.4 5.4.0.1131.144~18.04.1
Available with Ubuntu Pro
linux-image-raspi-hwe-18.04 5.4.0.1131.144~18.04.1
Available with Ubuntu Pro

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-7671-2
https://ubuntu.com/security/notices/USN-7671-1
CVE-2024-46787, CVE-2024-50047, CVE-2024-53051, CVE-2024-56662,
CVE-2025-37798, CVE-2025-37890, CVE-2025-37932, CVE-2025-37997,
CVE-2025-38000, CVE-2025-38001, CVE-2025-38177