Ubuntu 6796 Published by

Ubuntu Linux has undergone multiple security updates, addressing a Samba regression, kernel vulnerabilities, as well as Sudo vulnerabilities:

[USN-7582-2] Samba regression
[USN-7605-1] Linux kernel vulnerabilities
[USN-7595-5] Linux kernel vulnerabilities
[USN-7585-5] Linux kernel (HWE) vulnerabilities
[USN-7606-1] Linux kernel (OEM) vulnerabilities
[USN-7604-1] Sudo vulnerabilities
[USN-7604-2] Sudo vulnerability




[USN-7582-2] Samba regression


==========================================================================
Ubuntu Security Notice USN-7582-2
June 30, 2025

samba regression
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

USN-7582-1 introduced a regression in Samba.

Software Description:
- samba: SMB/CIFS file, print, and login server for Unix

Details:

USN-7582-1 fixed vulnerabilities in Samba. The update introduced a
regression. This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

Evgeny Legerov discovered that Samba incorrectly handled buffers in
certain GSSAPI routines of Heimdal. A remote attacker could possibly use
this issue to cause Samba to crash, resulting in a denial of service.
(CVE-2022-3437)

Greg Hudson discovered that Samba incorrectly handled PAC parsing. On
32-bit systems, a remote attacker could use this issue to escalate
privileges, or possibly execute arbitrary code. (CVE-2022-42898)

Joseph Sutton discovered that Samba could be forced to issue rc4-hmac
encrypted Kerberos tickets. A remote attacker could possibly use this
issue to escalate privileges. This issue only affected Ubuntu 20.04 LTS
and Ubuntu 22.04 LTS. (CVE-2022-45141)

Florent Saudel discovered that Samba incorrectly handled certain Spotlight
requests. A remote attacker could possibly use this issue to cause Samba
to consume resources, leading to a denial of service. (CVE-2023-34966)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS
samba 2:4.7.6+dfsg~ubuntu-0ubuntu2.29+esm2
Available with Ubuntu Pro

Ubuntu 16.04 LTS
samba 2:4.3.11+dfsg-0ubuntu0.16.04.34+esm3
Available with Ubuntu Pro

Ubuntu 14.04 LTS
samba 2:4.3.11+dfsg-0ubuntu0.14.04.20+esm14
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7582-2
https://ubuntu.com/security/notices/USN-7582-1
https://launchpad.net/bugs/2115450



[USN-7605-1] Linux kernel vulnerabilities


==========================================================================
Ubuntu Security Notice USN-7605-1
June 30, 2025

linux, linux-aws, linux-gcp, linux-gcp-6.11, linux-hwe-6.11, linux-oracle,
linux-raspi, linux-realtime vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.10
- Ubuntu 24.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-raspi: Linux kernel for Raspberry Pi systems
- linux-realtime: Linux kernel for Real-time systems
- linux-gcp-6.11: Linux kernel for Google Cloud Platform (GCP) systems
- linux-hwe-6.11: Linux hardware enablement (HWE) kernel

Details:

It was discovered that the CIFS network file system implementation in the
Linux kernel did not properly verify the target namespace when handling
upcalls. An attacker could use this to expose sensitive information.
(CVE-2025-2312)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM32 architecture;
- ARM64 architecture;
- PowerPC architecture;
- x86 architecture;
- Compute Acceleration Framework;
- ACPI drivers;
- Ublk userspace block driver;
- Compressed RAM block device driver;
- Bus devices;
- AMD CDX bus driver;
- Clock framework and drivers;
- DMA engine subsystem;
- DPLL subsystem;
- Qualcomm firmware drivers;
- GPIO subsystem;
- GPU drivers;
- HID subsystem;
- IIO subsystem;
- InfiniBand drivers;
- Multiple devices driver;
- Media drivers;
- MemoryStick subsystem;
- Network drivers;
- Mellanox network drivers;
- NTB driver;
- NVME drivers;
- PCI subsystem;
- Pin controllers subsystem;
- RapidIO drivers;
- Voltage and Current Regulator drivers;
- Remote Processor subsystem;
- SCSI subsystem;
- SLIMbus drivers;
- QCOM SoC drivers;
- VideoCore services drivers;
- Thermal drivers;
- USB DSL drivers;
- USB Host Controller drivers;
- Renesas USBHS Controller drivers;
- USB Type-C Connector System Software Interface driver;
- Virtio Host (VHOST) subsystem;
- Framebuffer layer;
- ACRN Hypervisor Service Module driver;
- W1 Dallas's 1-wire bus driver;
- 9P distributed file system;
- File systems infrastructure;
- Ext4 file system;
- JFS file system;
- Network file systems library;
- Network file system (NFS) client;
- Network file system (NFS) server daemon;
- NTFS3 file system;
- Proc file system;
- SMB network file system;
- Memory Management;
- Key Management;
- Memory management;
- Scheduler infrastructure;
- UProbes tracing;
- RDMA verbs API;
- SoC audio core drivers;
- BPF subsystem;
- Perf events;
- Kernel fork() syscall;
- Tracing infrastructure;
- Watch queue notification mechanism;
- 802.1Q VLAN protocol;
- Asynchronous Transfer Mode (ATM) subsystem;
- Bluetooth subsystem;
- Networking core;
- Devlink API;
- IPv4 networking;
- IPv6 networking;
- Logical Link layer;
- Management Component Transport Protocol (MCTP);
- Netfilter;
- Network traffic control;
- SCTP protocol;
- Switch device API;
- Wireless networking;
- eXpress Data Path;
- Key management;
- ALSA framework;
- SoC Audio for Freescale CPUs drivers;
(CVE-2025-21913, CVE-2025-22070, CVE-2025-21918, CVE-2025-21916,
CVE-2025-22090, CVE-2025-22040, CVE-2025-21972, CVE-2025-21920,
CVE-2025-22071, CVE-2025-21989, CVE-2025-22037, CVE-2025-22068,
CVE-2025-38049, CVE-2025-21980, CVE-2025-21956, CVE-2025-21962,
CVE-2025-21929, CVE-2025-37785, CVE-2025-37889, CVE-2025-21990,
CVE-2025-21966, CVE-2025-38240, CVE-2025-22058, CVE-2025-22072,
CVE-2025-22056, CVE-2025-21963, CVE-2025-23134, CVE-2025-22075,
CVE-2025-22054, CVE-2025-22064, CVE-2025-22027, CVE-2025-21927,
CVE-2025-21943, CVE-2025-22081, CVE-2025-21975, CVE-2025-39735,
CVE-2025-22088, CVE-2025-21996, CVE-2025-22009, CVE-2025-22000,
CVE-2025-21912, CVE-2025-21967, CVE-2025-21995, CVE-2025-21973,
CVE-2025-21908, CVE-2025-22047, CVE-2025-21930, CVE-2025-22078,
CVE-2025-21957, CVE-2025-22021, CVE-2025-22019, CVE-2025-21935,
CVE-2025-21951, CVE-2025-37937, CVE-2025-22043, CVE-2025-22057,
CVE-2025-21922, CVE-2025-22003, CVE-2025-21978, CVE-2025-22010,
CVE-2025-39989, CVE-2025-22034, CVE-2025-21986, CVE-2025-22016,
CVE-2025-21960, CVE-2025-22038, CVE-2025-21924, CVE-2025-22015,
CVE-2025-38152, CVE-2025-21939, CVE-2025-21917, CVE-2025-21974,
CVE-2025-22001, CVE-2025-22025, CVE-2025-22062, CVE-2025-21979,
CVE-2025-21911, CVE-2025-22045, CVE-2025-21914, CVE-2025-21937,
CVE-2025-22095, CVE-2025-21981, CVE-2025-22014, CVE-2025-21947,
CVE-2025-22007, CVE-2025-21925, CVE-2025-22089, CVE-2025-21923,
CVE-2025-38575, CVE-2025-22018, CVE-2025-22073, CVE-2025-21948,
CVE-2025-22080, CVE-2025-22053, CVE-2025-21903, CVE-2025-21969,
CVE-2025-21926, CVE-2025-21941, CVE-2025-40114, CVE-2025-22066,
CVE-2025-22017, CVE-2025-21945, CVE-2025-22065, CVE-2025-22086,
CVE-2025-22032, CVE-2025-22097, CVE-2025-22083, CVE-2025-22044,
CVE-2025-23136, CVE-2025-22046, CVE-2025-22041, CVE-2025-38479,
CVE-2025-21998, CVE-2025-22002, CVE-2025-39688, CVE-2025-22033,
CVE-2025-21970, CVE-2025-22022, CVE-2025-21936, CVE-2025-22050,
CVE-2025-21984, CVE-2025-21928, CVE-2025-38637, CVE-2025-22030,
CVE-2025-21915, CVE-2025-22013, CVE-2025-21997, CVE-2025-22059,
CVE-2025-21961, CVE-2025-21909, CVE-2025-21955, CVE-2025-39778,
CVE-2025-22055, CVE-2023-53034, CVE-2025-39728, CVE-2025-22020,
CVE-2025-22005, CVE-2025-22060, CVE-2025-21902, CVE-2025-22008,
CVE-2025-23138, CVE-2025-21991, CVE-2025-21999, CVE-2025-21982,
CVE-2024-58092, CVE-2025-21992, CVE-2025-22028, CVE-2025-22042,
CVE-2025-22087, CVE-2025-21894, CVE-2025-21934, CVE-2025-21893,
CVE-2025-22079, CVE-2025-22023, CVE-2025-21977, CVE-2024-58093,
CVE-2025-21904, CVE-2025-21910, CVE-2025-22024, CVE-2025-21964,
CVE-2025-21946, CVE-2025-21905, CVE-2025-22084, CVE-2025-21950,
CVE-2025-22011, CVE-2025-21968, CVE-2025-22035, CVE-2025-22004,
CVE-2025-21919, CVE-2025-22039, CVE-2025-22063, CVE-2024-53222,
CVE-2025-21944, CVE-2025-21959, CVE-2025-21994, CVE-2025-21906)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.10
linux-image-6.11.0-1011-realtime 6.11.0-1011.11
linux-image-6.11.0-1014-raspi 6.11.0-1014.14
linux-image-6.11.0-1015-aws 6.11.0-1015.16
linux-image-6.11.0-1016-gcp 6.11.0-1016.16
linux-image-6.11.0-1016-gcp-64k 6.11.0-1016.16
linux-image-6.11.0-1017-oracle 6.11.0-1017.18
linux-image-6.11.0-1017-oracle-64k 6.11.0-1017.18
linux-image-6.11.0-28-generic 6.11.0-28.28
linux-image-6.11.0-28-generic-64k 6.11.0-28.28
linux-image-aws 6.11.0-1015.16
linux-image-gcp 6.11.0-1016.16
linux-image-gcp-64k 6.11.0-1016.16
linux-image-generic 6.11.0-28.28
linux-image-generic-64k 6.11.0-28.28
linux-image-oracle 6.11.0-1017.18
linux-image-oracle-64k 6.11.0-1017.18
linux-image-raspi 6.11.0-1014.14
linux-image-realtime 6.11.0-1011.11
linux-image-virtual 6.11.0-28.28

Ubuntu 24.04 LTS
linux-image-6.11.0-1016-gcp 6.11.0-1016.16~24.04.1
linux-image-6.11.0-1016-gcp-64k 6.11.0-1016.16~24.04.1
linux-image-6.11.0-28-generic 6.11.0-28.28~24.04.1
linux-image-6.11.0-28-generic-64k 6.11.0-28.28~24.04.1
linux-image-gcp 6.11.0-1016.16~24.04.1
linux-image-gcp-64k 6.11.0-1016.16~24.04.1
linux-image-generic-64k-hwe-24.04 6.11.0-28.28~24.04.1
linux-image-generic-hwe-24.04 6.11.0-28.28~24.04.1
linux-image-virtual-hwe-24.04 6.11.0-28.28~24.04.1

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-7605-1
CVE-2023-53034, CVE-2024-53222, CVE-2024-58092, CVE-2024-58093,
CVE-2025-21893, CVE-2025-21894, CVE-2025-21902, CVE-2025-21903,
CVE-2025-21904, CVE-2025-21905, CVE-2025-21906, CVE-2025-21908,
CVE-2025-21909, CVE-2025-21910, CVE-2025-21911, CVE-2025-21912,
CVE-2025-21913, CVE-2025-21914, CVE-2025-21915, CVE-2025-21916,
CVE-2025-21917, CVE-2025-21918, CVE-2025-21919, CVE-2025-21920,
CVE-2025-21922, CVE-2025-21923, CVE-2025-21924, CVE-2025-21925,
CVE-2025-21926, CVE-2025-21927, CVE-2025-21928, CVE-2025-21929,
CVE-2025-21930, CVE-2025-21934, CVE-2025-21935, CVE-2025-21936,
CVE-2025-21937, CVE-2025-21939, CVE-2025-21941, CVE-2025-21943,
CVE-2025-21944, CVE-2025-21945, CVE-2025-21946, CVE-2025-21947,
CVE-2025-21948, CVE-2025-21950, CVE-2025-21951, CVE-2025-21955,
CVE-2025-21956, CVE-2025-21957, CVE-2025-21959, CVE-2025-21960,
CVE-2025-21961, CVE-2025-21962, CVE-2025-21963, CVE-2025-21964,
CVE-2025-21966, CVE-2025-21967, CVE-2025-21968, CVE-2025-21969,
CVE-2025-21970, CVE-2025-21972, CVE-2025-21973, CVE-2025-21974,
CVE-2025-21975, CVE-2025-21977, CVE-2025-21978, CVE-2025-21979,
CVE-2025-21980, CVE-2025-21981, CVE-2025-21982, CVE-2025-21984,
CVE-2025-21986, CVE-2025-21989, CVE-2025-21990, CVE-2025-21991,
CVE-2025-21992, CVE-2025-21994, CVE-2025-21995, CVE-2025-21996,
CVE-2025-21997, CVE-2025-21998, CVE-2025-21999, CVE-2025-22000,
CVE-2025-22001, CVE-2025-22002, CVE-2025-22003, CVE-2025-22004,
CVE-2025-22005, CVE-2025-22007, CVE-2025-22008, CVE-2025-22009,
CVE-2025-22010, CVE-2025-22011, CVE-2025-22013, CVE-2025-22014,
CVE-2025-22015, CVE-2025-22016, CVE-2025-22017, CVE-2025-22018,
CVE-2025-22019, CVE-2025-22020, CVE-2025-22021, CVE-2025-22022,
CVE-2025-22023, CVE-2025-22024, CVE-2025-22025, CVE-2025-22027,
CVE-2025-22028, CVE-2025-22030, CVE-2025-22032, CVE-2025-22033,
CVE-2025-22034, CVE-2025-22035, CVE-2025-22037, CVE-2025-22038,
CVE-2025-22039, CVE-2025-22040, CVE-2025-22041, CVE-2025-22042,
CVE-2025-22043, CVE-2025-22044, CVE-2025-22045, CVE-2025-22046,
CVE-2025-22047, CVE-2025-22050, CVE-2025-22053, CVE-2025-22054,
CVE-2025-22055, CVE-2025-22056, CVE-2025-22057, CVE-2025-22058,
CVE-2025-22059, CVE-2025-22060, CVE-2025-22062, CVE-2025-22063,
CVE-2025-22064, CVE-2025-22065, CVE-2025-22066, CVE-2025-22068,
CVE-2025-22070, CVE-2025-22071, CVE-2025-22072, CVE-2025-22073,
CVE-2025-22075, CVE-2025-22078, CVE-2025-22079, CVE-2025-22080,
CVE-2025-22081, CVE-2025-22083, CVE-2025-22084, CVE-2025-22086,
CVE-2025-22087, CVE-2025-22088, CVE-2025-22089, CVE-2025-22090,
CVE-2025-22095, CVE-2025-22097, CVE-2025-2312, CVE-2025-23134,
CVE-2025-23136, CVE-2025-23138, CVE-2025-37785, CVE-2025-37889,
CVE-2025-37937, CVE-2025-38049, CVE-2025-38152, CVE-2025-38240,
CVE-2025-38479, CVE-2025-38575, CVE-2025-38637, CVE-2025-39688,
CVE-2025-39728, CVE-2025-39735, CVE-2025-39778, CVE-2025-39989,
CVE-2025-40114

Package Information:
https://launchpad.net/ubuntu/+source/linux/6.11.0-28.28
https://launchpad.net/ubuntu/+source/linux-aws/6.11.0-1015.16
https://launchpad.net/ubuntu/+source/linux-gcp/6.11.0-1016.16
https://launchpad.net/ubuntu/+source/linux-oracle/6.11.0-1017.18
https://launchpad.net/ubuntu/+source/linux-raspi/6.11.0-1014.14
https://launchpad.net/ubuntu/+source/linux-realtime/6.11.0-1011.11
https://launchpad.net/ubuntu/+source/linux-gcp-6.11/6.11.0-1016.16~24.04.1
https://launchpad.net/ubuntu/+source/linux-hwe-6.11/6.11.0-28.28~24.04.1



[USN-7595-5] Linux kernel vulnerabilities


==========================================================================
Ubuntu Security Notice USN-7595-5
June 30, 2025

linux-gcp, linux-gcp-6.8 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-gcp-6.8: Linux kernel for Google Cloud Platform (GCP) systems

Details:

It was discovered that the CIFS network file system implementation in the
Linux kernel did not properly verify the target namespace when handling
upcalls. An attacker could use this to expose sensitive information.
(CVE-2025-2312)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- GPIO subsystem;
- GPU drivers;
- InfiniBand drivers;
- IRQ chip drivers;
- Network drivers;
- Mellanox network drivers;
- i.MX PM domains;
- SCSI subsystem;
- USB Serial drivers;
- AFS file system;
- GFS2 file system;
- File systems infrastructure;
- File system notification infrastructure;
- Overlay file system;
- Proc file system;
- SMB network file system;
- Timer subsystem;
- Kernel CPU control infrastructure;
- Memory management;
- Networking core;
- DCCP (Datagram Congestion Control Protocol);
- IPv6 networking;
- IEEE 802.15.4 subsystem;
- Open vSwitch;
- Network traffic control;
- VMware vSockets driver;
(CVE-2025-21943, CVE-2025-21672, CVE-2024-57952, CVE-2024-57949,
CVE-2025-21683, CVE-2025-21690, CVE-2025-21699, CVE-2025-21676,
CVE-2024-57924, CVE-2025-21694, CVE-2024-57948, CVE-2025-21675,
CVE-2024-57951, CVE-2025-21692, CVE-2025-21684, CVE-2025-21668,
CVE-2025-21665, CVE-2025-21667, CVE-2025-21670, CVE-2025-21674,
CVE-2025-21697, CVE-2024-53124, CVE-2025-21666, CVE-2025-21682,
CVE-2025-21680, CVE-2025-21681, CVE-2025-21691, CVE-2025-21669,
CVE-2025-21673, CVE-2024-50157, CVE-2025-21689, CVE-2025-21678)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
linux-image-6.8.0-1031-gcp 6.8.0-1031.33
linux-image-6.8.0-1031-gcp-64k 6.8.0-1031.33
linux-image-gcp-64k-lts-24.04 6.8.0-1031.33
linux-image-gcp-lts-24.04 6.8.0-1031.33

Ubuntu 22.04 LTS
linux-image-6.8.0-1031-gcp 6.8.0-1031.33~22.04.1
linux-image-6.8.0-1031-gcp-64k 6.8.0-1031.33~22.04.1
linux-image-gcp 6.8.0-1031.33~22.04.1
linux-image-gcp-64k 6.8.0-1031.33~22.04.1

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-7595-5
https://ubuntu.com/security/notices/USN-7595-4
https://ubuntu.com/security/notices/USN-7595-3
https://ubuntu.com/security/notices/USN-7595-2
https://ubuntu.com/security/notices/USN-7595-1
CVE-2024-50157, CVE-2024-53124, CVE-2024-57924, CVE-2024-57948,
CVE-2024-57949, CVE-2024-57951, CVE-2024-57952, CVE-2025-21665,
CVE-2025-21666, CVE-2025-21667, CVE-2025-21668, CVE-2025-21669,
CVE-2025-21670, CVE-2025-21672, CVE-2025-21673, CVE-2025-21674,
CVE-2025-21675, CVE-2025-21676, CVE-2025-21678, CVE-2025-21680,
CVE-2025-21681, CVE-2025-21682, CVE-2025-21683, CVE-2025-21684,
CVE-2025-21689, CVE-2025-21690, CVE-2025-21691, CVE-2025-21692,
CVE-2025-21694, CVE-2025-21697, CVE-2025-21699, CVE-2025-21943,
CVE-2025-2312

Package Information:
https://launchpad.net/ubuntu/+source/linux-gcp/6.8.0-1031.33
https://launchpad.net/ubuntu/+source/linux-gcp-6.8/6.8.0-1031.33~22.04.1



[USN-7585-5] Linux kernel (HWE) vulnerabilities


==========================================================================
Ubuntu Security Notice USN-7585-5
June 30, 2025

linux-hwe-5.4 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-hwe-5.4: Linux hardware enablement (HWE) kernel

Details:

It was discovered that the CIFS network file system implementation in the
Linux kernel did not properly verify the target namespace when handling
upcalls. An attacker could use this to expose sensitive information.
(CVE-2025-2312)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- PowerPC architecture;
- x86 architecture;
- iSCSI Boot Firmware Table Attributes driver;
- GPU drivers;
- HID subsystem;
- InfiniBand drivers;
- Media drivers;
- MemoryStick subsystem;
- Network drivers;
- NTB driver;
- PCI subsystem;
- SCSI subsystem;
- Thermal drivers;
- JFS file system;
- File systems infrastructure;
- Tracing infrastructure;
- 802.1Q VLAN protocol;
- Asynchronous Transfer Mode (ATM) subsystem;
- Bluetooth subsystem;
- IPv6 networking;
- Netfilter;
- Network traffic control;
- Sun RPC protocol;
- USB sound devices;
(CVE-2025-22007, CVE-2025-21959, CVE-2025-22021, CVE-2025-22063,
CVE-2025-22045, CVE-2024-58093, CVE-2022-49636, CVE-2025-22020,
CVE-2024-53168, CVE-2025-22071, CVE-2025-39735, CVE-2025-21991,
CVE-2025-21992, CVE-2025-21996, CVE-2025-22035, CVE-2023-53034,
CVE-2025-22054, CVE-2025-23136, CVE-2025-22073, CVE-2024-56551,
CVE-2025-22005, CVE-2025-37937, CVE-2021-47211, CVE-2025-22086,
CVE-2025-21956, CVE-2025-38637, CVE-2025-22004, CVE-2025-22018,
CVE-2025-22079, CVE-2025-21957, CVE-2025-21993)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS
linux-image-5.4.0-218-generic 5.4.0-218.238~18.04.1
Available with Ubuntu Pro
linux-image-5.4.0-218-lowlatency 5.4.0-218.238~18.04.1
Available with Ubuntu Pro
linux-image-generic-hwe-18.04 5.4.0.218.238~18.04.1
Available with Ubuntu Pro
linux-image-lowlatency-hwe-18.04 5.4.0.218.238~18.04.1
Available with Ubuntu Pro
linux-image-oem 5.4.0.218.238~18.04.1
Available with Ubuntu Pro
linux-image-oem-osp1 5.4.0.218.238~18.04.1
Available with Ubuntu Pro
linux-image-snapdragon-hwe-18.04 5.4.0.218.238~18.04.1
Available with Ubuntu Pro
linux-image-virtual-hwe-18.04 5.4.0.218.238~18.04.1
Available with Ubuntu Pro

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-7585-5
https://ubuntu.com/security/notices/USN-7585-4
https://ubuntu.com/security/notices/USN-7585-3
https://ubuntu.com/security/notices/USN-7585-2
https://ubuntu.com/security/notices/USN-7585-1
CVE-2021-47211, CVE-2022-49636, CVE-2023-53034, CVE-2024-53168,
CVE-2024-56551, CVE-2024-58093, CVE-2025-21956, CVE-2025-21957,
CVE-2025-21959, CVE-2025-21991, CVE-2025-21992, CVE-2025-21993,
CVE-2025-21996, CVE-2025-22004, CVE-2025-22005, CVE-2025-22007,
CVE-2025-22018, CVE-2025-22020, CVE-2025-22021, CVE-2025-22035,
CVE-2025-22045, CVE-2025-22054, CVE-2025-22063, CVE-2025-22071,
CVE-2025-22073, CVE-2025-22079, CVE-2025-22086, CVE-2025-2312,
CVE-2025-23136, CVE-2025-37937, CVE-2025-38637, CVE-2025-39735



[USN-7606-1] Linux kernel (OEM) vulnerabilities


==========================================================================
Ubuntu Security Notice USN-7606-1
June 30, 2025

linux-oem-6.11 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-oem-6.11: Linux kernel for OEM systems

Details:

It was discovered that the CIFS network file system implementation in the
Linux kernel did not properly verify the target namespace when handling
upcalls. An attacker could use this to expose sensitive information.
(CVE-2025-2312)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM32 architecture;
- ARM64 architecture;
- PowerPC architecture;
- x86 architecture;
- Compute Acceleration Framework;
- ACPI drivers;
- Ublk userspace block driver;
- Compressed RAM block device driver;
- Bus devices;
- AMD CDX bus driver;
- Clock framework and drivers;
- DMA engine subsystem;
- DPLL subsystem;
- Qualcomm firmware drivers;
- GPIO subsystem;
- GPU drivers;
- HID subsystem;
- IIO subsystem;
- InfiniBand drivers;
- Multiple devices driver;
- Media drivers;
- MemoryStick subsystem;
- Network drivers;
- Mellanox network drivers;
- NTB driver;
- NVME drivers;
- PCI subsystem;
- Pin controllers subsystem;
- RapidIO drivers;
- Voltage and Current Regulator drivers;
- Remote Processor subsystem;
- SCSI subsystem;
- SLIMbus drivers;
- QCOM SoC drivers;
- VideoCore services drivers;
- Thermal drivers;
- USB DSL drivers;
- USB Host Controller drivers;
- Renesas USBHS Controller drivers;
- USB Type-C Connector System Software Interface driver;
- Virtio Host (VHOST) subsystem;
- Framebuffer layer;
- ACRN Hypervisor Service Module driver;
- W1 Dallas's 1-wire bus driver;
- 9P distributed file system;
- File systems infrastructure;
- Ext4 file system;
- JFS file system;
- Network file systems library;
- Network file system (NFS) client;
- Network file system (NFS) server daemon;
- NTFS3 file system;
- Proc file system;
- SMB network file system;
- Memory Management;
- Key Management;
- Memory management;
- Scheduler infrastructure;
- UProbes tracing;
- RDMA verbs API;
- SoC audio core drivers;
- BPF subsystem;
- Perf events;
- Kernel fork() syscall;
- Tracing infrastructure;
- Watch queue notification mechanism;
- 802.1Q VLAN protocol;
- Asynchronous Transfer Mode (ATM) subsystem;
- Bluetooth subsystem;
- Networking core;
- Devlink API;
- IPv4 networking;
- IPv6 networking;
- Logical Link layer;
- Management Component Transport Protocol (MCTP);
- Netfilter;
- Network traffic control;
- SCTP protocol;
- Switch device API;
- Wireless networking;
- eXpress Data Path;
- Key management;
- ALSA framework;
- SoC Audio for Freescale CPUs drivers;
(CVE-2025-22072, CVE-2025-22039, CVE-2025-22078, CVE-2025-21972,
CVE-2025-21989, CVE-2025-21919, CVE-2025-22030, CVE-2025-22084,
CVE-2025-22086, CVE-2025-21956, CVE-2025-21924, CVE-2025-22016,
CVE-2025-23138, CVE-2025-22059, CVE-2025-21928, CVE-2025-21906,
CVE-2025-21947, CVE-2025-21936, CVE-2025-21982, CVE-2025-38152,
CVE-2025-38049, CVE-2025-21974, CVE-2025-21962, CVE-2025-22075,
CVE-2025-21959, CVE-2025-22002, CVE-2025-22014, CVE-2025-21905,
CVE-2025-22044, CVE-2025-22000, CVE-2025-21925, CVE-2025-21944,
CVE-2025-21926, CVE-2025-21904, CVE-2024-58092, CVE-2025-21964,
CVE-2025-22009, CVE-2025-22083, CVE-2025-21992, CVE-2025-39778,
CVE-2025-22021, CVE-2025-22090, CVE-2025-21934, CVE-2025-22043,
CVE-2025-22027, CVE-2025-21951, CVE-2025-22019, CVE-2025-21908,
CVE-2025-22062, CVE-2025-22071, CVE-2025-21914, CVE-2025-21966,
CVE-2025-21984, CVE-2025-39735, CVE-2025-21912, CVE-2025-21979,
CVE-2025-22063, CVE-2025-37785, CVE-2025-22081, CVE-2025-22024,
CVE-2025-38637, CVE-2025-22070, CVE-2025-21911, CVE-2025-21935,
CVE-2024-58093, CVE-2025-21960, CVE-2025-21913, CVE-2025-21927,
CVE-2025-21977, CVE-2025-37843, CVE-2025-22055, CVE-2025-22035,
CVE-2025-21998, CVE-2025-22041, CVE-2025-21945, CVE-2025-22080,
CVE-2025-21963, CVE-2025-21994, CVE-2025-21957, CVE-2025-22079,
CVE-2025-22034, CVE-2025-21946, CVE-2025-22053, CVE-2025-22003,
CVE-2025-22042, CVE-2025-22023, CVE-2025-22020, CVE-2025-21910,
CVE-2025-22037, CVE-2025-22095, CVE-2025-22089, CVE-2025-21986,
CVE-2025-39688, CVE-2025-22040, CVE-2025-39728, CVE-2025-21981,
CVE-2025-21969, CVE-2025-21922, CVE-2025-22022, CVE-2025-23136,
CVE-2025-22058, CVE-2025-21970, CVE-2025-22050, CVE-2025-21978,
CVE-2025-21990, CVE-2025-22046, CVE-2025-21975, CVE-2025-21973,
CVE-2025-21916, CVE-2025-21991, CVE-2025-22007, CVE-2025-21937,
CVE-2025-22004, CVE-2025-21948, CVE-2025-22033, CVE-2025-22017,
CVE-2025-38575, CVE-2025-22097, CVE-2025-22066, CVE-2025-21999,
CVE-2025-21903, CVE-2025-21915, CVE-2025-21961, CVE-2025-21941,
CVE-2025-22064, CVE-2025-21968, CVE-2025-21980, CVE-2025-22010,
CVE-2025-38240, CVE-2025-38479, CVE-2025-22008, CVE-2025-21939,
CVE-2025-22045, CVE-2025-22068, CVE-2025-21893, CVE-2025-37889,
CVE-2024-53222, CVE-2025-22047, CVE-2025-22018, CVE-2025-22013,
CVE-2025-21920, CVE-2025-23134, CVE-2025-22025, CVE-2025-39989,
CVE-2025-22005, CVE-2025-22054, CVE-2025-22057, CVE-2025-22087,
CVE-2025-22088, CVE-2025-22056, CVE-2025-22060, CVE-2025-22015,
CVE-2025-37937, CVE-2025-22001, CVE-2025-21930, CVE-2025-21894,
CVE-2025-21943, CVE-2025-22028, CVE-2025-22032, CVE-2025-22065,
CVE-2025-21929, CVE-2025-21996, CVE-2025-22038, CVE-2025-21923,
CVE-2025-40114, CVE-2025-21967, CVE-2025-21995, CVE-2023-53034,
CVE-2025-21909, CVE-2025-21997, CVE-2025-21955, CVE-2025-21918,
CVE-2025-21917, CVE-2025-22073, CVE-2025-22011, CVE-2025-21950)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
linux-image-6.11.0-1024-oem 6.11.0-1024.24
linux-image-oem-24.04b 6.11.0-1024.24

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-7606-1
CVE-2023-53034, CVE-2024-53222, CVE-2024-58092, CVE-2024-58093,
CVE-2025-21893, CVE-2025-21894, CVE-2025-21903, CVE-2025-21904,
CVE-2025-21905, CVE-2025-21906, CVE-2025-21908, CVE-2025-21909,
CVE-2025-21910, CVE-2025-21911, CVE-2025-21912, CVE-2025-21913,
CVE-2025-21914, CVE-2025-21915, CVE-2025-21916, CVE-2025-21917,
CVE-2025-21918, CVE-2025-21919, CVE-2025-21920, CVE-2025-21922,
CVE-2025-21923, CVE-2025-21924, CVE-2025-21925, CVE-2025-21926,
CVE-2025-21927, CVE-2025-21928, CVE-2025-21929, CVE-2025-21930,
CVE-2025-21934, CVE-2025-21935, CVE-2025-21936, CVE-2025-21937,
CVE-2025-21939, CVE-2025-21941, CVE-2025-21943, CVE-2025-21944,
CVE-2025-21945, CVE-2025-21946, CVE-2025-21947, CVE-2025-21948,
CVE-2025-21950, CVE-2025-21951, CVE-2025-21955, CVE-2025-21956,
CVE-2025-21957, CVE-2025-21959, CVE-2025-21960, CVE-2025-21961,
CVE-2025-21962, CVE-2025-21963, CVE-2025-21964, CVE-2025-21966,
CVE-2025-21967, CVE-2025-21968, CVE-2025-21969, CVE-2025-21970,
CVE-2025-21972, CVE-2025-21973, CVE-2025-21974, CVE-2025-21975,
CVE-2025-21977, CVE-2025-21978, CVE-2025-21979, CVE-2025-21980,
CVE-2025-21981, CVE-2025-21982, CVE-2025-21984, CVE-2025-21986,
CVE-2025-21989, CVE-2025-21990, CVE-2025-21991, CVE-2025-21992,
CVE-2025-21994, CVE-2025-21995, CVE-2025-21996, CVE-2025-21997,
CVE-2025-21998, CVE-2025-21999, CVE-2025-22000, CVE-2025-22001,
CVE-2025-22002, CVE-2025-22003, CVE-2025-22004, CVE-2025-22005,
CVE-2025-22007, CVE-2025-22008, CVE-2025-22009, CVE-2025-22010,
CVE-2025-22011, CVE-2025-22013, CVE-2025-22014, CVE-2025-22015,
CVE-2025-22016, CVE-2025-22017, CVE-2025-22018, CVE-2025-22019,
CVE-2025-22020, CVE-2025-22021, CVE-2025-22022, CVE-2025-22023,
CVE-2025-22024, CVE-2025-22025, CVE-2025-22027, CVE-2025-22028,
CVE-2025-22030, CVE-2025-22032, CVE-2025-22033, CVE-2025-22034,
CVE-2025-22035, CVE-2025-22037, CVE-2025-22038, CVE-2025-22039,
CVE-2025-22040, CVE-2025-22041, CVE-2025-22042, CVE-2025-22043,
CVE-2025-22044, CVE-2025-22045, CVE-2025-22046, CVE-2025-22047,
CVE-2025-22050, CVE-2025-22053, CVE-2025-22054, CVE-2025-22055,
CVE-2025-22056, CVE-2025-22057, CVE-2025-22058, CVE-2025-22059,
CVE-2025-22060, CVE-2025-22062, CVE-2025-22063, CVE-2025-22064,
CVE-2025-22065, CVE-2025-22066, CVE-2025-22068, CVE-2025-22070,
CVE-2025-22071, CVE-2025-22072, CVE-2025-22073, CVE-2025-22075,
CVE-2025-22078, CVE-2025-22079, CVE-2025-22080, CVE-2025-22081,
CVE-2025-22083, CVE-2025-22084, CVE-2025-22086, CVE-2025-22087,
CVE-2025-22088, CVE-2025-22089, CVE-2025-22090, CVE-2025-22095,
CVE-2025-22097, CVE-2025-2312, CVE-2025-23134, CVE-2025-23136,
CVE-2025-23138, CVE-2025-37785, CVE-2025-37843, CVE-2025-37889,
CVE-2025-37937, CVE-2025-38049, CVE-2025-38152, CVE-2025-38240,
CVE-2025-38479, CVE-2025-38575, CVE-2025-38637, CVE-2025-39688,
CVE-2025-39728, CVE-2025-39735, CVE-2025-39778, CVE-2025-39989,
CVE-2025-40114

Package Information:
https://launchpad.net/ubuntu/+source/linux-oem-6.11/6.11.0-1024.24



[USN-7604-1] Sudo vulnerabilities


==========================================================================
Ubuntu Security Notice USN-7604-1
June 30, 2025

sudo vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.04
- Ubuntu 24.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in Sudo.

Software Description:
- sudo: Provide limited super user privileges to specific users

Details:

Rich Mirch discovered that Sudo incorrectly handled the host option. In
environments where per-host rules are configured in the sudoers file, a
local attacker could use this issue to bypass the host restrictions.
(CVE-2025-32462)

Rich Mirch discovered that Sudo incorrectly handled the chroot option. In
environments where the sudoers file is configured to allow the chroot
option, a local attacker could use this issue to run arbitrary commands as
root. This issue only applied to Ubuntu 24.04 LTS, Ubuntu 24.10, and
Ubuntu 25.04. (CVE-2025-32463)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.04
sudo 1.9.16p2-1ubuntu1.1
sudo-ldap 1.9.16p2-1ubuntu1.1

Ubuntu 24.10
sudo 1.9.15p5-3ubuntu5.24.10.1
sudo-ldap 1.9.15p5-3ubuntu5.24.10.1

Ubuntu 24.04 LTS
sudo 1.9.15p5-3ubuntu5.24.04.1
sudo-ldap 1.9.15p5-3ubuntu5.24.04.1

Ubuntu 22.04 LTS
sudo 1.9.9-1ubuntu2.5
sudo-ldap 1.9.9-1ubuntu2.5

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7604-1
CVE-2025-32462, CVE-2025-32463

Package Information:
https://launchpad.net/ubuntu/+source/sudo/1.9.16p2-1ubuntu1.1
https://launchpad.net/ubuntu/+source/sudo/1.9.15p5-3ubuntu5.24.10.1
https://launchpad.net/ubuntu/+source/sudo/1.9.15p5-3ubuntu5.24.04.1
https://launchpad.net/ubuntu/+source/sudo/1.9.9-1ubuntu2.5



[USN-7604-2] Sudo vulnerability


==========================================================================
Ubuntu Security Notice USN-7604-2
June 30, 2025

sudo vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Sudo could be made to bypass host restrictions.

Software Description:
- sudo: Provide limited super user privileges to specific users

Details:

USN-7604-1 fixed CVE-2025-32462 in sudo. This update provides the
corresponding fixes for Ubuntu 20.04 LTS, Ubuntu 18.04 LTS,
Ubuntu 16.04 LTS, and Ubuntu 14.04 LTS.

Original advisory details:

Rich Mirch discovered that Sudo incorrectly handled the host option. In
environments where per-host rules are configured in the sudoers file, a
local attacker could use this issue to bypass the host restrictions.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS
sudo 1.8.31-1ubuntu1.5+esm1
Available with Ubuntu Pro
sudo-ldap 1.8.31-1ubuntu1.5+esm1
Available with Ubuntu Pro

Ubuntu 18.04 LTS
sudo 1.8.21p2-3ubuntu1.6+esm1
Available with Ubuntu Pro
sudo-ldap 1.8.21p2-3ubuntu1.6+esm1
Available with Ubuntu Pro

Ubuntu 16.04 LTS
sudo 1.8.16-0ubuntu1.10+esm3
Available with Ubuntu Pro
sudo-ldap 1.8.16-0ubuntu1.10+esm3
Available with Ubuntu Pro

Ubuntu 14.04 LTS
sudo 1.8.9p5-1ubuntu1.5+esm8
Available with Ubuntu Pro
sudo-ldap 1.8.9p5-1ubuntu1.5+esm8
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7604-2
https://ubuntu.com/security/notices/USN-7604-2
CVE-2025-32462