Packages
- linux - Linux kernel
- linux-aws - Linux kernel for Amazon Web Services (AWS) systems
- linux-aws-6.14 - Linux kernel for Amazon Web Services (AWS) systems
- linux-gcp - Linux kernel for Google Cloud Platform (GCP) systems
- linux-gcp-6.14 - Linux kernel for Google Cloud Platform (GCP) systems
- linux-oracle - Linux kernel for Oracle Cloud systems
- linux-oracle-6.14 - Linux kernel for Oracle Cloud systems
- linux-raspi - Linux kernel for Raspberry Pi systems
- linux-realtime - Linux kernel for Real-time systems
Details
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
- RISC-V architecture;
- x86 architecture;
- Buffer Sharing and Synchronization framework;
- DMA engine subsystem;
- GPU drivers;
- HID subsystem;
- IIO ADC drivers;
- IIO subsystem;
- InfiniBand drivers;
- Input Device core drivers;
- Network drivers;
- Mellanox network drivers;
- PHY drivers;
- Voltage and Current Regulator drivers;
- VideoCore services drivers;
- USB Type-C Connector System Software Interface driver;
- Xen hypervisor drivers;
- EROFS file system;
- Network file system (NFS) client;
- File systems infrastructure;
- SMB network file system;
- Network traffic control;
- io_uring...
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
- RISC-V architecture;
- x86 architecture;
- Buffer Sharing and Synchronization framework;
- DMA engine subsystem;
- GPU drivers;
- HID subsystem;
- IIO ADC drivers;
- IIO subsystem;
- InfiniBand drivers;
- Input Device core drivers;
- Network drivers;
- Mellanox network drivers;
- PHY drivers;
- Voltage and Current Regulator drivers;
- VideoCore services drivers;
- USB Type-C Connector System Software Interface driver;
- Xen hypervisor drivers;
- EROFS file system;
- Network file system (NFS) client;
- File systems infrastructure;
- SMB network file system;
- Network traffic control;
- io_uring subsystem;
- Kernel command line parsing driver;
- Scheduler infrastructure;
- Memory management;
- Networking core;
- MAC80211 subsystem;
- Management Component Transport Protocol (MCTP);
- Netfilter;
- Open vSwitch;
- TLS protocol;
- Wireless networking;
- SOF drivers
Update instructions
After a standard system update you need to reboot your computer to make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.
References
- CVE-2025-38095
- CVE-2025-38094
- CVE-2025-38056
- CVE-2025-38028
- CVE-2025-38027
- CVE-2025-38025
- CVE-2025-38024
- CVE-2025-38023
- CVE-2025-38022
- CVE-2025-38021
- CVE-2025-38095
- CVE-2025-38094
- CVE-2025-38056
- CVE-2025-38028
- CVE-2025-38027
- CVE-2025-38025
- CVE-2025-38024
- CVE-2025-38023
- CVE-2025-38022
- CVE-2025-38021
- CVE-2025-38020
- CVE-2025-38019
- CVE-2025-38018
- CVE-2025-38016
- CVE-2025-38015
- CVE-2025-38014
- CVE-2025-38013
- CVE-2025-38012
- CVE-2025-38011
- CVE-2025-38010
- CVE-2025-38009
- CVE-2025-38008
- CVE-2025-38007
- CVE-2025-38006
- CVE-2025-38005
- CVE-2025-38002
- CVE-2025-37999
- CVE-2025-37998
- CVE-2025-37996
- CVE-2025-37995
- CVE-2025-37994
- CVE-2025-37993
- CVE-2025-37992
- CVE-2025-37973
- CVE-2025-37972
- CVE-2025-37971
- CVE-2025-37970
- CVE-2025-37969
- CVE-2025-37968
- CVE-2025-37967
- CVE-2025-37966
- CVE-2025-37965
- CVE-2025-37964
- CVE-2025-37963
- CVE-2025-37962
- CVE-2025-37961
- CVE-2025-37960
- CVE-2025-37959
- CVE-2025-37958
- CVE-2025-37957
- CVE-2025-37956
- CVE-2025-37955
- CVE-2025-37954
- CVE-2025-37952
- CVE-2025-37951
- CVE-2025-37950
- CVE-2025-37949
- CVE-2025-37948
- CVE-2025-37947
Have additional questions?