========================================================================== Ubuntu Security Notice USN-7703-2 August 20, 2025 linux-aws-6.8, linux-gcp, linux-gcp-6.8, linux-gkeop, linux-ibm, linux-ibm-6.8 vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 24.04 LTS - Ubuntu 22.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems - linux-gkeop: Linux kernel for Google Container Engine (GKE) systems - linux-ibm: Linux kernel for IBM cloud systems - linux-aws-6.8: Linux kernel for Amazon Web Services (AWS) systems - linux-gcp-6.8: Linux kernel for Google Cloud Platform (GCP) systems - linux-ibm-6.8: Linux kernel for IBM cloud systems Details: Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - PowerPC architecture; - x86 architecture; - Block layer subsystem; - GPIO subsystem; - GPU drivers; - HID subsystem; - Input Device (Mouse) drivers; - Multiple devices driver; - Media drivers; - Network drivers; - PCI subsystem; - S/390 drivers; - SPI subsystem; - Trusted Execution Environment drivers; - UFS subsystem; - USB Device Class drivers; - USB core drivers; - USB Gadget drivers; - Framebuffer layer; - Network file system (NFS) client; - Network file system (NFS) server daemon; - File systems infrastructure; - SMB network file system; - Networking core; - L3 Master device support module; - TCP network protocol; - io_uring subsystem; - Process Accounting mechanism; - BPF subsystem; - Timer subsystem; - Workqueue subsystem; - Memory management; - Amateur Radio drivers; - B.A.T.M.A.N. meshing protocol; - IPv4 networking; - IPv6 networking; - Multipath TCP; - Open vSwitch; - Network traffic control; - SOF drivers; (CVE-2025-21776, CVE-2025-21768, CVE-2025-21848, CVE-2025-21855, CVE-2025-21791, CVE-2025-21838, CVE-2025-21762, CVE-2025-21846, CVE-2025-21765, CVE-2025-21869, CVE-2025-21783, CVE-2025-21868, CVE-2025-21857, CVE-2025-21773, CVE-2024-54458, CVE-2025-21871, CVE-2025-21763, CVE-2024-58088, CVE-2025-21835, CVE-2025-21793, CVE-2025-21867, CVE-2025-21784, CVE-2025-21839, CVE-2025-21786, CVE-2025-21764, CVE-2025-21761, CVE-2025-21767, CVE-2024-58020, CVE-2025-21847, CVE-2025-21792, CVE-2025-21785, CVE-2025-21863, CVE-2025-21854, CVE-2025-21704, CVE-2024-52559, CVE-2025-21775, CVE-2025-21758, CVE-2025-21858, CVE-2025-21866, CVE-2025-21870, CVE-2024-57977, CVE-2024-54456, CVE-2025-21759, CVE-2025-21781, CVE-2025-21760, CVE-2025-21706, CVE-2024-57834, CVE-2025-21712, CVE-2025-21864, CVE-2025-21780, CVE-2025-21790, CVE-2025-21856, CVE-2025-21796, CVE-2025-21859, CVE-2025-21782, CVE-2024-58093, CVE-2025-21844, CVE-2025-21795, CVE-2025-21823, CVE-2025-21853, CVE-2025-21772, CVE-2025-21746, CVE-2025-21821, CVE-2024-58086, CVE-2025-21787, CVE-2025-21836, CVE-2025-21861, CVE-2025-21766, CVE-2025-21862, CVE-2025-21779) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 24.04 LTS linux-image-6.8.0-1019-gkeop 6.8.0-1019.21 linux-image-6.8.0-1033-ibm 6.8.0-1033.33 linux-image-6.8.0-1036-gcp 6.8.0-1036.38 linux-image-6.8.0-1036-gcp-64k 6.8.0-1036.38 linux-image-gcp-6.8 6.8.0-1036.38 linux-image-gcp-64k-6.8 6.8.0-1036.38 linux-image-gcp-64k-lts-24.04 6.8.0-1036.38 linux-image-gcp-lts-24.04 6.8.0-1036.38 linux-image-gkeop 6.8.0-1019.21 linux-image-gkeop-6.8 6.8.0-1019.21 linux-image-ibm 6.8.0-1033.33 linux-image-ibm-6.8 6.8.0-1033.33 linux-image-ibm-classic 6.8.0-1033.33 linux-image-ibm-lts-24.04 6.8.0-1033.33 Ubuntu 22.04 LTS linux-image-6.8.0-1033-ibm 6.8.0-1033.33~22.04.1 linux-image-6.8.0-1035-aws 6.8.0-1035.37~22.04.1 linux-image-6.8.0-1035-aws-64k 6.8.0-1035.37~22.04.1 linux-image-6.8.0-1036-gcp 6.8.0-1036.38~22.04.1 linux-image-6.8.0-1036-gcp-64k 6.8.0-1036.38~22.04.1 linux-image-aws 6.8.0-1035.37~22.04.1 linux-image-aws-6.8 6.8.0-1035.37~22.04.1 linux-image-aws-64k 6.8.0-1035.37~22.04.1 linux-image-aws-64k-6.8 6.8.0-1035.37~22.04.1 linux-image-gcp 6.8.0-1036.38~22.04.1 linux-image-gcp-6.8 6.8.0-1036.38~22.04.1 linux-image-gcp-64k 6.8.0-1036.38~22.04.1 linux-image-gcp-64k-6.8 6.8.0-1036.38~22.04.1 linux-image-ibm-6.8 6.8.0-1033.33~22.04.1 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-7703-2 https://ubuntu.com/security/notices/USN-7703-1 CVE-2024-52559, CVE-2024-54456, CVE-2024-54458, CVE-2024-57834, CVE-2024-57977, CVE-2024-58020, CVE-2024-58086, CVE-2024-58088, CVE-2024-58093, CVE-2025-21704, CVE-2025-21706, CVE-2025-21712, CVE-2025-21746, CVE-2025-21758, CVE-2025-21759, CVE-2025-21760, CVE-2025-21761, CVE-2025-21762, CVE-2025-21763, CVE-2025-21764, CVE-2025-21765, CVE-2025-21766, CVE-2025-21767, CVE-2025-21768, CVE-2025-21772, CVE-2025-21773, CVE-2025-21775, CVE-2025-21776, CVE-2025-21779, CVE-2025-21780, CVE-2025-21781, CVE-2025-21782, CVE-2025-21783, CVE-2025-21784, CVE-2025-21785, CVE-2025-21786, CVE-2025-21787, CVE-2025-21790, CVE-2025-21791, CVE-2025-21792, CVE-2025-21793, CVE-2025-21795, CVE-2025-21796, CVE-2025-21821, CVE-2025-21823, CVE-2025-21835, CVE-2025-21836, CVE-2025-21838, CVE-2025-21839, CVE-2025-21844, CVE-2025-21846, CVE-2025-21847, CVE-2025-21848, CVE-2025-21853, CVE-2025-21854, CVE-2025-21855, CVE-2025-21856, CVE-2025-21857, CVE-2025-21858, CVE-2025-21859, CVE-2025-21861, CVE-2025-21862, CVE-2025-21863, CVE-2025-21864, CVE-2025-21866, CVE-2025-21867, CVE-2025-21868, CVE-2025-21869, CVE-2025-21870, CVE-2025-21871 Package Information: https://launchpad.net/ubuntu/+source/linux-gcp/6.8.0-1036.38 https://launchpad.net/ubuntu/+source/linux-gkeop/6.8.0-1019.21 https://launchpad.net/ubuntu/+source/linux-ibm/6.8.0-1033.33 https://launchpad.net/ubuntu/+source/linux-aws-6.8/6.8.0-1035.37~22.04.1 https://launchpad.net/ubuntu/+source/linux-gcp-6.8/6.8.0-1036.38~22.04.1 https://launchpad.net/ubuntu/+source/linux-ibm-6.8/6.8.0-1033.33~22.04.1