========================================================================== Ubuntu Security Notice USN-7703-1 August 19, 2025 linux, linux-aws, linux-lowlatency, linux-lowlatency-hwe-6.8, linux-realtime vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 24.04 LTS - Ubuntu 22.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-lowlatency: Linux low latency kernel - linux-realtime: Linux kernel for Real-time systems - linux-lowlatency-hwe-6.8: Linux low latency kernel Details: Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - PowerPC architecture; - x86 architecture; - Block layer subsystem; - GPIO subsystem; - GPU drivers; - HID subsystem; - Input Device (Mouse) drivers; - Multiple devices driver; - Media drivers; - Network drivers; - PCI subsystem; - S/390 drivers; - SPI subsystem; - Trusted Execution Environment drivers; - UFS subsystem; - USB Device Class drivers; - USB core drivers; - USB Gadget drivers; - Framebuffer layer; - Network file system (NFS) client; - Network file system (NFS) server daemon; - File systems infrastructure; - SMB network file system; - Networking core; - L3 Master device support module; - TCP network protocol; - io_uring subsystem; - Process Accounting mechanism; - BPF subsystem; - Timer subsystem; - Workqueue subsystem; - Memory management; - Amateur Radio drivers; - B.A.T.M.A.N. meshing protocol; - IPv4 networking; - IPv6 networking; - Multipath TCP; - Open vSwitch; - Network traffic control; - SOF drivers; (CVE-2025-21776, CVE-2025-21768, CVE-2025-21848, CVE-2025-21855, CVE-2025-21791, CVE-2025-21838, CVE-2025-21762, CVE-2025-21846, CVE-2025-21765, CVE-2025-21869, CVE-2025-21783, CVE-2025-21868, CVE-2025-21857, CVE-2025-21773, CVE-2024-54458, CVE-2025-21871, CVE-2025-21763, CVE-2024-58088, CVE-2025-21835, CVE-2025-21793, CVE-2025-21867, CVE-2025-21784, CVE-2025-21839, CVE-2025-21786, CVE-2025-21764, CVE-2025-21761, CVE-2025-21767, CVE-2024-58020, CVE-2025-21847, CVE-2025-21792, CVE-2025-21785, CVE-2025-21863, CVE-2025-21854, CVE-2025-21704, CVE-2024-52559, CVE-2025-21775, CVE-2025-21758, CVE-2025-21858, CVE-2025-21866, CVE-2025-21870, CVE-2024-57977, CVE-2024-54456, CVE-2025-21759, CVE-2025-21781, CVE-2025-21760, CVE-2025-21706, CVE-2024-57834, CVE-2025-21712, CVE-2025-21864, CVE-2025-21780, CVE-2025-21790, CVE-2025-21856, CVE-2025-21796, CVE-2025-21859, CVE-2025-21782, CVE-2024-58093, CVE-2025-21844, CVE-2025-21795, CVE-2025-21823, CVE-2025-21853, CVE-2025-21772, CVE-2025-21746, CVE-2025-21821, CVE-2024-58086, CVE-2025-21787, CVE-2025-21836, CVE-2025-21861, CVE-2025-21766, CVE-2025-21862, CVE-2025-21779) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 24.04 LTS linux-image-6.8.0-1035-aws 6.8.0-1035.37 linux-image-6.8.0-1035-aws-64k 6.8.0-1035.37 linux-image-6.8.0-78-generic 6.8.0-78.78 linux-image-6.8.0-78-generic-64k 6.8.0-78.78 linux-image-6.8.0-78-lowlatency 6.8.0-78.78.1 linux-image-6.8.0-78-lowlatency-64k 6.8.0-78.78.1 linux-image-6.8.1-1030-realtime 6.8.1-1030.31 Available with Ubuntu Pro linux-image-aws-6.8 6.8.0-1035.37 linux-image-aws-64k-6.8 6.8.0-1035.37 linux-image-aws-64k-lts-24.04 6.8.0-1035.37 linux-image-aws-lts-24.04 6.8.0-1035.37 linux-image-generic 6.8.0-78.78 linux-image-generic-6.8 6.8.0-78.78 linux-image-generic-64k 6.8.0-78.78 linux-image-generic-64k-6.8 6.8.0-78.78 linux-image-generic-lpae 6.8.0-78.78 linux-image-kvm 6.8.0-78.78 linux-image-lowlatency 6.8.0-78.78.1 linux-image-lowlatency-6.8 6.8.0-78.78.1 linux-image-lowlatency-64k 6.8.0-78.78.1 linux-image-lowlatency-64k-6.8 6.8.0-78.78.1 linux-image-realtime 6.8.1-1030.31 Available with Ubuntu Pro linux-image-realtime-6.8.1 6.8.1-1030.31 Available with Ubuntu Pro linux-image-virtual 6.8.0-78.78 linux-image-virtual-6.8 6.8.0-78.78 Ubuntu 22.04 LTS linux-image-6.8.0-78-lowlatency 6.8.0-78.78.1~22.04.1 linux-image-6.8.0-78-lowlatency-64k 6.8.0-78.78.1~22.04.1 linux-image-lowlatency-6.8 6.8.0-78.78.1~22.04.1 linux-image-lowlatency-64k-6.8 6.8.0-78.78.1~22.04.1 linux-image-lowlatency-64k-hwe-22.04 6.8.0-78.78.1~22.04.1 linux-image-lowlatency-hwe-22.04 6.8.0-78.78.1~22.04.1 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-7703-1 CVE-2024-52559, CVE-2024-54456, CVE-2024-54458, CVE-2024-57834, CVE-2024-57977, CVE-2024-58020, CVE-2024-58086, CVE-2024-58088, CVE-2024-58093, CVE-2025-21704, CVE-2025-21706, CVE-2025-21712, CVE-2025-21746, CVE-2025-21758, CVE-2025-21759, CVE-2025-21760, CVE-2025-21761, CVE-2025-21762, CVE-2025-21763, CVE-2025-21764, CVE-2025-21765, CVE-2025-21766, CVE-2025-21767, CVE-2025-21768, CVE-2025-21772, CVE-2025-21773, CVE-2025-21775, CVE-2025-21776, CVE-2025-21779, CVE-2025-21780, CVE-2025-21781, CVE-2025-21782, CVE-2025-21783, CVE-2025-21784, CVE-2025-21785, CVE-2025-21786, CVE-2025-21787, CVE-2025-21790, CVE-2025-21791, CVE-2025-21792, CVE-2025-21793, CVE-2025-21795, CVE-2025-21796, CVE-2025-21821, CVE-2025-21823, CVE-2025-21835, CVE-2025-21836, CVE-2025-21838, CVE-2025-21839, CVE-2025-21844, CVE-2025-21846, CVE-2025-21847, CVE-2025-21848, CVE-2025-21853, CVE-2025-21854, CVE-2025-21855, CVE-2025-21856, CVE-2025-21857, CVE-2025-21858, CVE-2025-21859, CVE-2025-21861, CVE-2025-21862, CVE-2025-21863, CVE-2025-21864, CVE-2025-21866, CVE-2025-21867, CVE-2025-21868, CVE-2025-21869, CVE-2025-21870, CVE-2025-21871 Package Information: https://launchpad.net/ubuntu/+source/linux/6.8.0-78.78 https://launchpad.net/ubuntu/+source/linux-aws/6.8.0-1035.37 https://launchpad.net/ubuntu/+source/linux-lowlatency/6.8.0-78.78.1 https://launchpad.net/ubuntu/+source/linux-realtime/6.8.1-1030.31 https://launchpad.net/ubuntu/+source/linux-lowlatency-hwe-6.8/6.8.0-78.78.1~22.04.1