Ubuntu 6923 Published by

Ubuntu has released security notices for several vulnerabilities affecting various packages, including Samba, Linux kernel, GStreamer Base Plugins, and Python LDAP. The vulnerabilities were discovered in the following releases: Ubuntu 20.04 LTS, Ubuntu 18.04 LTS, Ubuntu 16.04 LTS, Ubuntu 14.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 25.10. The security issues include incorrect memory initialization, arbitrary code execution, denial of service, and LDAP injection attacks.

[USN-7826-2] Samba vulnerabilities
[USN-7829-1] Linux kernel vulnerabilities
[USN-7829-2] Linux kernel (FIPS and Real-time) vulnerabilities
[USN-7827-1] GStreamer Base Plugins vulnerabilities
[USN-7828-1] Python LDAP vulnerabilities




[USN-7826-2] Samba vulnerabilities


==========================================================================
Ubuntu Security Notice USN-7826-2
October 20, 2025

samba vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in Samba.

Software Description:
- samba: SMB/CIFS file, print, and login server for Unix

Details:

USN-7826-1 fixed vulnerabilities in Samba. This update provides the
corresponding update for Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu
18.04 LTS and Ubuntu 20.04 LTS.

Original advisory details:

Andrew Walker discovered that Samba incorrectly initialized memory in the
vfs_streams_xattr module. An authenticated attacker could possibly use this
issue to obtain sensitive information. (CVE-2025-9640)

Igor Morgenstern discovered that Samba incorrectly handled names passed to
the WINS hook program. An attacker could possibly use this issue to execute
arbitrary code. (CVE-2025-10230)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS
samba 2:4.15.13+dfsg-0ubuntu0.20.04.8+esm1
Available with Ubuntu Pro

Ubuntu 18.04 LTS
samba 2:4.7.6+dfsg~ubuntu-0ubuntu2.29+esm3
Available with Ubuntu Pro

Ubuntu 16.04 LTS
samba 2:4.3.11+dfsg-0ubuntu0.16.04.34+esm4
Available with Ubuntu Pro

Ubuntu 14.04 LTS
samba 2:4.3.11+dfsg-0ubuntu0.14.04.20+esm15
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7826-2
https://ubuntu.com/security/notices/USN-7826-1
CVE-2025-10230, CVE-2025-9640



[USN-7829-1] Linux kernel vulnerabilities


==========================================================================
Ubuntu Security Notice USN-7829-1
October 20, 2025

linux, linux-aws, linux-gcp, linux-gke, linux-gkeop, linux-hwe-5.15,
linux-ibm, linux-ibm-5.15, linux-lowlatency, linux-lowlatency-hwe-5.15,
linux-nvidia, linux-oracle, linux-oracle-5.15, linux-xilinx-zynqmp
vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-gke: Linux kernel for Google Container Engine (GKE) systems
- linux-gkeop: Linux kernel for Google Container Engine (GKE) systems
- linux-ibm: Linux kernel for IBM cloud systems
- linux-lowlatency: Linux low latency kernel
- linux-nvidia: Linux kernel for NVIDIA systems
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-xilinx-zynqmp: Linux kernel for Xilinx ZynqMP processors
- linux-hwe-5.15: Linux hardware enablement (HWE) kernel
- linux-ibm-5.15: Linux kernel for IBM cloud systems
- linux-lowlatency-hwe-5.15: Linux low latency kernel
- linux-oracle-5.15: Linux kernel for Oracle Cloud systems

Details:

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- GPU drivers;
- Network drivers;
- Netlink;
(CVE-2024-26700, CVE-2025-38727, CVE-2023-52593, CVE-2024-26896)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS
linux-image-5.15.0-1059-xilinx-zynqmp 5.15.0-1059.63
linux-image-5.15.0-1078-gkeop 5.15.0-1078.86
linux-image-5.15.0-1089-ibm 5.15.0-1089.92
linux-image-5.15.0-1090-nvidia 5.15.0-1090.91
linux-image-5.15.0-1090-nvidia-lowlatency 5.15.0-1090.91
linux-image-5.15.0-1091-gke 5.15.0-1091.97
linux-image-5.15.0-1092-oracle 5.15.0-1092.98
linux-image-5.15.0-1095-aws 5.15.0-1095.102
linux-image-5.15.0-1095-aws-64k 5.15.0-1095.102
linux-image-5.15.0-1095-gcp 5.15.0-1095.104
linux-image-5.15.0-160-generic 5.15.0-160.170
linux-image-5.15.0-160-generic-64k 5.15.0-160.170
linux-image-5.15.0-160-generic-lpae 5.15.0-160.170
linux-image-5.15.0-160-lowlatency 5.15.0-160.170
linux-image-5.15.0-160-lowlatency-64k 5.15.0-160.170
linux-image-aws-5.15 5.15.0.1095.98
linux-image-aws-64k-5.15 5.15.0.1095.98
linux-image-aws-64k-lts-22.04 5.15.0.1095.98
linux-image-aws-lts-22.04 5.15.0.1095.98
linux-image-gcp-5.15 5.15.0.1095.91
linux-image-gcp-lts-22.04 5.15.0.1095.91
linux-image-generic 5.15.0.160.156
linux-image-generic-5.15 5.15.0.160.156
linux-image-generic-64k 5.15.0.160.156
linux-image-generic-64k-5.15 5.15.0.160.156
linux-image-generic-lpae 5.15.0.160.156
linux-image-generic-lpae-5.15 5.15.0.160.156
linux-image-gke 5.15.0.1091.90
linux-image-gke-5.15 5.15.0.1091.90
linux-image-gkeop 5.15.0.1078.77
linux-image-gkeop-5.15 5.15.0.1078.77
linux-image-ibm 5.15.0.1089.85
linux-image-ibm-5.15 5.15.0.1089.85
linux-image-lowlatency 5.15.0.160.138
linux-image-lowlatency-5.15 5.15.0.160.138
linux-image-lowlatency-64k 5.15.0.160.138
linux-image-lowlatency-64k-5.15 5.15.0.160.138
linux-image-nvidia 5.15.0.1090.90
linux-image-nvidia-5.15 5.15.0.1090.90
linux-image-nvidia-lowlatency 5.15.0.1090.90
linux-image-nvidia-lowlatency-5.15 5.15.0.1090.90
linux-image-oracle-5.15 5.15.0.1092.88
linux-image-oracle-lts-22.04 5.15.0.1092.88
linux-image-virtual 5.15.0.160.156
linux-image-virtual-5.15 5.15.0.160.156
linux-image-xilinx-zynqmp 5.15.0.1059.62
linux-image-xilinx-zynqmp-5.15 5.15.0.1059.62

Ubuntu 20.04 LTS
linux-image-5.15.0-1089-ibm 5.15.0-1089.92~20.04.1
Available with Ubuntu Pro
linux-image-5.15.0-1092-oracle 5.15.0-1092.98~20.04.1
Available with Ubuntu Pro
linux-image-5.15.0-160-generic 5.15.0-160.170~20.04.1
Available with Ubuntu Pro
linux-image-5.15.0-160-generic-64k 5.15.0-160.170~20.04.1
Available with Ubuntu Pro
linux-image-5.15.0-160-generic-lpae 5.15.0-160.170~20.04.1
Available with Ubuntu Pro
linux-image-5.15.0-160-lowlatency 5.15.0-160.170~20.04.1
Available with Ubuntu Pro
linux-image-5.15.0-160-lowlatency-64k 5.15.0-160.170~20.04.1
Available with Ubuntu Pro
linux-image-generic-5.15 5.15.0.160.170~20.04.1
Available with Ubuntu Pro
linux-image-generic-64k-5.15 5.15.0.160.170~20.04.1
Available with Ubuntu Pro
linux-image-generic-64k-hwe-20.04 5.15.0.160.170~20.04.1
Available with Ubuntu Pro
linux-image-generic-hwe-20.04 5.15.0.160.170~20.04.1
Available with Ubuntu Pro
linux-image-generic-lpae-5.15 5.15.0.160.170~20.04.1
Available with Ubuntu Pro
linux-image-generic-lpae-hwe-20.04 5.15.0.160.170~20.04.1
Available with Ubuntu Pro
linux-image-ibm 5.15.0.1089.92~20.04.1
Available with Ubuntu Pro
linux-image-ibm-5.15 5.15.0.1089.92~20.04.1
Available with Ubuntu Pro
linux-image-lowlatency-5.15 5.15.0.160.170~20.04.1
Available with Ubuntu Pro
linux-image-lowlatency-64k-5.15 5.15.0.160.170~20.04.1
Available with Ubuntu Pro
linux-image-lowlatency-64k-hwe-20.04 5.15.0.160.170~20.04.1
Available with Ubuntu Pro
linux-image-lowlatency-hwe-20.04 5.15.0.160.170~20.04.1
Available with Ubuntu Pro
linux-image-oem-20.04 5.15.0.160.170~20.04.1
Available with Ubuntu Pro
linux-image-oem-20.04b 5.15.0.160.170~20.04.1
Available with Ubuntu Pro
linux-image-oem-20.04c 5.15.0.160.170~20.04.1
Available with Ubuntu Pro
linux-image-oem-20.04d 5.15.0.160.170~20.04.1
Available with Ubuntu Pro
linux-image-oracle 5.15.0.1092.98~20.04.1
Available with Ubuntu Pro
linux-image-oracle-5.15 5.15.0.1092.98~20.04.1
Available with Ubuntu Pro
linux-image-virtual-5.15 5.15.0.160.170~20.04.1
Available with Ubuntu Pro
linux-image-virtual-hwe-20.04 5.15.0.160.170~20.04.1
Available with Ubuntu Pro

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-7829-1
CVE-2023-52593, CVE-2024-26700, CVE-2024-26896, CVE-2025-38727

Package Information:
https://launchpad.net/ubuntu/+source/linux/5.15.0-160.170
https://launchpad.net/ubuntu/+source/linux-aws/5.15.0-1095.102
https://launchpad.net/ubuntu/+source/linux-gcp/5.15.0-1095.104
https://launchpad.net/ubuntu/+source/linux-gke/5.15.0-1091.97
https://launchpad.net/ubuntu/+source/linux-gkeop/5.15.0-1078.86
https://launchpad.net/ubuntu/+source/linux-ibm/5.15.0-1089.92
https://launchpad.net/ubuntu/+source/linux-lowlatency/5.15.0-160.170
https://launchpad.net/ubuntu/+source/linux-nvidia/5.15.0-1090.91
https://launchpad.net/ubuntu/+source/linux-oracle/5.15.0-1092.98
https://launchpad.net/ubuntu/+source/linux-xilinx-zynqmp/5.15.0-1059.63



[USN-7829-2] Linux kernel (FIPS and Real-time) vulnerabilities


==========================================================================
Ubuntu Security Notice USN-7829-2
October 20, 2025

linux-fips, linux-aws-fips, linux-azure-fips, linux-gcp-fips,
linux-intel-iot-realtime, linux-realtime vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-aws-fips: Linux kernel for Amazon Web Services (AWS) systems with FIPS
- linux-azure-fips: Linux kernel for Microsoft Azure Cloud systems with FIPS
- linux-fips: Linux kernel with FIPS
- linux-gcp-fips: Linux kernel for Google Cloud Platform (GCP) systems with
FIPS
- linux-intel-iot-realtime: Linux kernel for Intel IoT Real-time platforms
- linux-realtime: Linux kernel for Real-time systems

Details:

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- GPU drivers;
- Network drivers;
- Netlink;
(CVE-2024-26700, CVE-2025-38727, CVE-2023-52593, CVE-2024-26896)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS
linux-image-5.15.0-1087-intel-iot-realtime 5.15.0-1087.89
Available with Ubuntu Pro
linux-image-5.15.0-1094-realtime 5.15.0-1094.103
Available with Ubuntu Pro
linux-image-5.15.0-1095-aws-fips 5.15.0-1095.102+fips1
Available with Ubuntu Pro
linux-image-5.15.0-1095-gcp-fips 5.15.0-1095.104+fips1
Available with Ubuntu Pro
linux-image-5.15.0-1098-azure-fips 5.15.0-1098.107+fips1
Available with Ubuntu Pro
linux-image-5.15.0-160-fips 5.15.0-160.170+fips1
Available with Ubuntu Pro
linux-image-aws-fips 5.15.0.1095.91
Available with Ubuntu Pro
linux-image-aws-fips-5.15 5.15.0.1095.91
Available with Ubuntu Pro
linux-image-azure-fips 5.15.0.1098.83
Available with Ubuntu Pro
linux-image-azure-fips-5.15 5.15.0.1098.83
Available with Ubuntu Pro
linux-image-fips 5.15.0.160.92
Available with Ubuntu Pro
linux-image-fips-5.15 5.15.0.160.92
Available with Ubuntu Pro
linux-image-gcp-fips 5.15.0.1095.85
Available with Ubuntu Pro
linux-image-gcp-fips-5.15 5.15.0.1095.85
Available with Ubuntu Pro
linux-image-intel-iot-realtime 5.15.0.1087.91
Available with Ubuntu Pro
linux-image-intel-iot-realtime-5.15 5.15.0.1087.91
Available with Ubuntu Pro
linux-image-realtime 5.15.0.1094.98
Available with Ubuntu Pro
linux-image-realtime-5.15 5.15.0.1094.98
Available with Ubuntu Pro

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-7829-2
https://ubuntu.com/security/notices/USN-7829-1
CVE-2023-52593, CVE-2024-26700, CVE-2024-26896, CVE-2025-38727

Package Information:
https://launchpad.net/ubuntu/+source/linux-aws-fips/5.15.0-1095.102+fips1
https://launchpad.net/ubuntu/+source/linux-azure-fips/5.15.0-1098.107+fips1
https://launchpad.net/ubuntu/+source/linux-fips/5.15.0-160.170+fips1
https://launchpad.net/ubuntu/+source/linux-gcp-fips/5.15.0-1095.104+fips1
https://launchpad.net/ubuntu/+source/linux-intel-iot-realtime/5.15.0-1087.89
https://launchpad.net/ubuntu/+source/linux-realtime/5.15.0-1094.103



[USN-7827-1] GStreamer Base Plugins vulnerabilities


==========================================================================
Ubuntu Security Notice USN-7827-1
October 20, 2025

gst-plugins-base1.0 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in GStreamer Base Plugins.

Software Description:
- gst-plugins-base1.0: GStreamer plugins

Details:

Shaun Mirani discovered that GStreamer Base Plugins did not correctly
handle certain memory operations. An attacker could possibly use this issue
to cause a denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS
libgstreamer-plugins-base1.0-0 1.16.3-0ubuntu1.4+esm1
Available with Ubuntu Pro
libgstreamer-plugins-base1.0-dev 1.16.3-0ubuntu1.4+esm1
Available with Ubuntu Pro

Ubuntu 18.04 LTS
libgstreamer-plugins-base1.0-0 1.14.5-0ubuntu1~18.04.3+esm2
Available with Ubuntu Pro
libgstreamer-plugins-base1.0-dev 1.14.5-0ubuntu1~18.04.3+esm2
Available with Ubuntu Pro

Ubuntu 16.04 LTS
libgstreamer-plugins-base1.0-0 1.8.3-1ubuntu0.3+esm3
Available with Ubuntu Pro
libgstreamer-plugins-base1.0-dev 1.8.3-1ubuntu0.3+esm3
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7827-1
CVE-2025-47806, CVE-2025-47807, CVE-2025-47808



[USN-7828-1] Python LDAP vulnerabilities


==========================================================================
Ubuntu Security Notice USN-7828-1
October 20, 2025

python-ldap vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.10
- Ubuntu 25.04
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in Python LDAP.

Software Description:
- python-ldap: LDAP interface module for Python

Details:

It was discovered that Python LDAP incorrectly handled special characters
in the special character filtering function. A remote attacker could
possibly use this issue to perform LDAP injection attacks.
(CVE-2025-61911)

Arad Inbar discovered that Python LDAP incorrectly escaped NUL character
bytes. An attacker could possibly use this issue to cause a denial of
service. (CVE-2025-61912)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.10
python3-ldap 3.4.4-1ubuntu0.25.10.1

Ubuntu 25.04
python3-ldap 3.4.4-1ubuntu0.25.04.1

Ubuntu 24.04 LTS
python3-ldap 3.4.4-1ubuntu0.24.04.1

Ubuntu 22.04 LTS
python3-ldap 3.2.0-4ubuntu7.2

Ubuntu 20.04 LTS
python3-ldap 3.2.0-4ubuntu2.1+esm1
Available with Ubuntu Pro

Ubuntu 18.04 LTS
python-ldap 3.0.0-1ubuntu0.2+esm1
Available with Ubuntu Pro
python3-ldap 3.0.0-1ubuntu0.2+esm1
Available with Ubuntu Pro

Ubuntu 16.04 LTS
python-ldap 2.4.22-0.1ubuntu0.1~esm1
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7828-1
CVE-2025-61911, CVE-2025-61912

Package Information:
https://launchpad.net/ubuntu/+source/python-ldap/3.4.4-1ubuntu0.25.10.1
https://launchpad.net/ubuntu/+source/python-ldap/3.4.4-1ubuntu0.25.04.1
https://launchpad.net/ubuntu/+source/python-ldap/3.4.4-1ubuntu0.24.04.1
https://launchpad.net/ubuntu/+source/python-ldap/3.2.0-4ubuntu7.2