==========================================================================
Ubuntu Security Notice USN-7719-1
August 26, 2025

linux-raspi-realtime vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-raspi-realtime: Linux kernel for Raspberry Pi Real-time systems

Details:

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
  - ARM64 architecture;
  - PowerPC architecture;
  - x86 architecture;
  - Block layer subsystem;
  - GPIO subsystem;
  - GPU drivers;
  - HID subsystem;
  - Input Device (Mouse) drivers;
  - Multiple devices driver;
  - Media drivers;
  - Network drivers;
  - PCI subsystem;
  - S/390 drivers;
  - SPI subsystem;
  - Trusted Execution Environment drivers;
  - UFS subsystem;
  - USB Device Class drivers;
  - USB core drivers;
  - USB Gadget drivers;
  - Framebuffer layer;
  - Network file system (NFS) client;
  - Network file system (NFS) server daemon;
  - File systems infrastructure;
  - SMB network file system;
  - Networking core;
  - L3 Master device support module;
  - TCP network protocol;
  - io_uring subsystem;
  - Process Accounting mechanism;
  - BPF subsystem;
  - Timer subsystem;
  - Workqueue subsystem;
  - Memory management;
  - Amateur Radio drivers;
  - B.A.T.M.A.N. meshing protocol;
  - IPv4 networking;
  - IPv6 networking;
  - Multipath TCP;
  - Open vSwitch;
  - Network traffic control;
  - SOF drivers;
(CVE-2025-21821, CVE-2025-21712, CVE-2025-21864, CVE-2024-54456,
CVE-2025-21783, CVE-2025-21858, CVE-2025-21859, CVE-2025-21861,
CVE-2025-21746, CVE-2025-21779, CVE-2024-58086, CVE-2025-38083,
CVE-2025-21863, CVE-2025-21780, CVE-2025-21838, CVE-2025-21775,
CVE-2025-21766, CVE-2025-21844, CVE-2025-21792, CVE-2025-21848,
CVE-2025-37797, CVE-2024-58088, CVE-2025-21793, CVE-2025-21835,
CVE-2025-21846, CVE-2025-21866, CVE-2024-52559, CVE-2025-21855,
CVE-2025-21856, CVE-2025-21759, CVE-2025-21773, CVE-2025-21762,
CVE-2025-21839, CVE-2025-21787, CVE-2025-21704, CVE-2025-21796,
CVE-2025-21764, CVE-2025-21795, CVE-2025-21706, CVE-2025-21786,
CVE-2025-21782, CVE-2025-21768, CVE-2025-21836, CVE-2025-21761,
CVE-2025-21785, CVE-2025-21784, CVE-2025-21869, CVE-2025-21776,
CVE-2024-58093, CVE-2025-21765, CVE-2025-21772, CVE-2025-21853,
CVE-2025-21868, CVE-2025-21763, CVE-2025-21870, CVE-2024-57834,
CVE-2024-54458, CVE-2025-21867, CVE-2025-21791, CVE-2024-57977,
CVE-2025-21823, CVE-2025-21871, CVE-2025-21760, CVE-2025-21790,
CVE-2025-21758, CVE-2025-21862, CVE-2025-21767, CVE-2025-21854,
CVE-2024-58020, CVE-2025-21847, CVE-2025-21781, CVE-2025-21857)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
  linux-image-6.8.0-2028-raspi-realtime  6.8.0-2028.29
                                  Available with Ubuntu Pro
  linux-image-raspi-realtime      6.8.0-2028.29
                                  Available with Ubuntu Pro
  linux-image-raspi-realtime-6.8  6.8.0-2028.29
                                  Available with Ubuntu Pro

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
  https://ubuntu.com/security/notices/USN-7719-1
  CVE-2024-52559, CVE-2024-54456, CVE-2024-54458, CVE-2024-57834,
  CVE-2024-57977, CVE-2024-58020, CVE-2024-58086, CVE-2024-58088,
  CVE-2024-58093, CVE-2025-21704, CVE-2025-21706, CVE-2025-21712,
  CVE-2025-21746, CVE-2025-21758, CVE-2025-21759, CVE-2025-21760,
  CVE-2025-21761, CVE-2025-21762, CVE-2025-21763, CVE-2025-21764,
  CVE-2025-21765, CVE-2025-21766, CVE-2025-21767, CVE-2025-21768,
  CVE-2025-21772, CVE-2025-21773, CVE-2025-21775, CVE-2025-21776,
  CVE-2025-21779, CVE-2025-21780, CVE-2025-21781, CVE-2025-21782,
  CVE-2025-21783, CVE-2025-21784, CVE-2025-21785, CVE-2025-21786,
  CVE-2025-21787, CVE-2025-21790, CVE-2025-21791, CVE-2025-21792,
  CVE-2025-21793, CVE-2025-21795, CVE-2025-21796, CVE-2025-21821,
  CVE-2025-21823, CVE-2025-21835, CVE-2025-21836, CVE-2025-21838,
  CVE-2025-21839, CVE-2025-21844, CVE-2025-21846, CVE-2025-21847,
  CVE-2025-21848, CVE-2025-21853, CVE-2025-21854, CVE-2025-21855,
  CVE-2025-21856, CVE-2025-21857, CVE-2025-21858, CVE-2025-21859,
  CVE-2025-21861, CVE-2025-21862, CVE-2025-21863, CVE-2025-21864,
  CVE-2025-21866, CVE-2025-21867, CVE-2025-21868, CVE-2025-21869,
  CVE-2025-21870, CVE-2025-21871, CVE-2025-37797, CVE-2025-38083

Package Information:
  https://launchpad.net/ubuntu/+source/linux-raspi-realtime/6.8.0-2028.29

Attachment: OpenPGP_signature.asc
Description: OpenPGP digital signature

Reply via email to