Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Linux (Aktualisierung)
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Linux (Aktualisierung)
ID: USN-7585-6
Distribution: Ubuntu
Plattformen: Ubuntu 20.04 LTS
Datum: Fr, 4. Juli 2025, 00:03
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21996
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22079
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53034
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21957
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22005
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22054
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22045
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22018
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22004
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21956
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53168
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23136
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56551
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22063
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22007
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22035
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21992
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22086
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22071
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22073
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21993
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2312
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49636
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39735
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38637
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47211
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21991
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22021
Applikationen: Linux
Update von: Mehrere Probleme in Linux

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------WUIAzYBVjKKvBCgRvESZ4QH0
Content-Type: multipart/mixed;
boundary="------------y8KjshiefV07keaAnqayoMaE";
protected-headers="v1"
From: Rodrigo Figueiredo Zaiden <rodrigo.zaiden@canonical.com>
Reply-To: security@ubuntu.com
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID: <579117a4-a5e2-45e4-8f74-958cfdde92dc@canonical.com>
Subject: [USN-7585-6] Linux kernel (BlueField) vulnerabilities

--------------y8KjshiefV07keaAnqayoMaE
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64

==========================================================================
Ubuntu Security Notice USN-7585-6
July 03, 2025

linux-bluefield vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-bluefield: Linux kernel for NVIDIA BlueField platforms

Details:

It was discovered that the CIFS network file system implementation in the
Linux kernel did not properly verify the target namespace when handling
upcalls. An attacker could use this to expose sensitive information.
(CVE-2025-2312)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- PowerPC architecture;
- x86 architecture;
- iSCSI Boot Firmware Table Attributes driver;
- GPU drivers;
- HID subsystem;
- InfiniBand drivers;
- Media drivers;
- MemoryStick subsystem;
- Network drivers;
- NTB driver;
- PCI subsystem;
- SCSI subsystem;
- Thermal drivers;
- JFS file system;
- File systems infrastructure;
- Tracing infrastructure;
- 802.1Q VLAN protocol;
- Asynchronous Transfer Mode (ATM) subsystem;
- Bluetooth subsystem;
- IPv6 networking;
- Netfilter;
- Network traffic control;
- Sun RPC protocol;
- USB sound devices;
(CVE-2025-22007, CVE-2025-21959, CVE-2025-22021, CVE-2025-22063,
CVE-2025-22045, CVE-2024-58093, CVE-2022-49636, CVE-2025-22020,
CVE-2024-53168, CVE-2025-22071, CVE-2025-39735, CVE-2025-21991,
CVE-2025-21992, CVE-2025-21996, CVE-2025-22035, CVE-2023-53034,
CVE-2025-22054, CVE-2025-23136, CVE-2025-22073, CVE-2024-56551,
CVE-2025-22005, CVE-2025-37937, CVE-2021-47211, CVE-2025-22086,
CVE-2025-21956, CVE-2025-38637, CVE-2025-22004, CVE-2025-22018,
CVE-2025-22079, CVE-2025-21957, CVE-2025-21993)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS
linux-image-5.4.0-1106-bluefield 5.4.0-1106.113
Available with Ubuntu Pro
linux-image-bluefield 5.4.0.1106.102
Available with Ubuntu Pro

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-7585-6
https://ubuntu.com/security/notices/USN-7585-5
https://ubuntu.com/security/notices/USN-7585-4
https://ubuntu.com/security/notices/USN-7585-3
https://ubuntu.com/security/notices/USN-7585-2
https://ubuntu.com/security/notices/USN-7585-1
CVE-2021-47211, CVE-2022-49636, CVE-2023-53034, CVE-2024-53168,
CVE-2024-56551, CVE-2024-58093, CVE-2025-21956, CVE-2025-21957,
CVE-2025-21959, CVE-2025-21991, CVE-2025-21992, CVE-2025-21993,
CVE-2025-21996, CVE-2025-22004, CVE-2025-22005, CVE-2025-22007,
CVE-2025-22018, CVE-2025-22020, CVE-2025-22021, CVE-2025-22035,
CVE-2025-22045, CVE-2025-22054, CVE-2025-22063, CVE-2025-22071,
CVE-2025-22073, CVE-2025-22079, CVE-2025-22086, CVE-2025-2312,
CVE-2025-23136, CVE-2025-37937, CVE-2025-38637, CVE-2025-39735

--------------y8KjshiefV07keaAnqayoMaE--

--------------WUIAzYBVjKKvBCgRvESZ4QH0
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature.asc"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmhm2qgFAwAAAAAACgkQZ0GeRcM5nt1p
Egf/Ya0dsO6Y9D9c8khVIQI3ErSnW+ET7QRkLZztG3vqZ9wJmDWt9aNPytNZkDG4W7gSXZhf4ZgW
pdth51iyq7Tom/l/U+aXZOGeqA85O7/uYa+hlxpafmIV226UzgFa7SzS5QcRi0gML8J3sQBORsKi
19qi83sSNQ0i7RmDkuMWh8tJdokZ0hm02zWPleEd+a78J74zFrSrkU95+1mz3GtMT0D0Z76qTu21
/sGK2FDEBIkTw6Muw6ribQ8So1AEervJQVl2zULl+WX+G2VifJUuTNyTCtGNfRT03NNXIpTtr5e2
KS1mFVC/P6hKAViOZRK49lM6D66EGqnvPfklYRGcgg==
=vj3A
-----END PGP SIGNATURE-----

--------------WUIAzYBVjKKvBCgRvESZ4QH0--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung