USN-7699-2: Linux kernel (HWE) vulnerabilities
Publication date
20 August 2025
Overview
Several security issues were fixed in the Linux kernel.
Releases
Packages
- linux-hwe-6.14 - Linux hardware enablement (HWE) kernel
- linux-oem-6.14 - Linux kernel for OEM systems
Details
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
- RISC-V architecture;
- x86 architecture;
- Buffer Sharing and Synchronization framework;
- DMA engine subsystem;
- GPU drivers;
- HID subsystem;
- IIO ADC drivers;
- IIO subsystem;
- InfiniBand drivers;
- Input Device core drivers;
- Network drivers;
- Mellanox network drivers;
- PHY drivers;
- Voltage and Current Regulator drivers;
- VideoCore services drivers;
- USB Type-C Connector System Software Interface driver;
- Xen hypervisor drivers;
- EROFS file system;
- Network file system (NFS) client;
- File systems infrastructure;
- SMB network file system;
- Network traffic control;
- io_uring...
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
- RISC-V architecture;
- x86 architecture;
- Buffer Sharing and Synchronization framework;
- DMA engine subsystem;
- GPU drivers;
- HID subsystem;
- IIO ADC drivers;
- IIO subsystem;
- InfiniBand drivers;
- Input Device core drivers;
- Network drivers;
- Mellanox network drivers;
- PHY drivers;
- Voltage and Current Regulator drivers;
- VideoCore services drivers;
- USB Type-C Connector System Software Interface driver;
- Xen hypervisor drivers;
- EROFS file system;
- Network file system (NFS) client;
- File systems infrastructure;
- SMB network file system;
- Network traffic control;
- io_uring subsystem;
- Kernel command line parsing driver;
- Scheduler infrastructure;
- Memory management;
- Networking core;
- MAC80211 subsystem;
- Management Component Transport Protocol (MCTP);
- Netfilter;
- Open vSwitch;
- TLS protocol;
- Wireless networking;
- SOF drivers
Update instructions
After a standard system update you need to reboot your computer to make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.
References
- CVE-2025-38095
- CVE-2025-38094
- CVE-2025-38056
- CVE-2025-38028
- CVE-2025-38027
- CVE-2025-38025
- CVE-2025-38024
- CVE-2025-38023
- CVE-2025-38022
- CVE-2025-38021
- CVE-2025-38095
- CVE-2025-38094
- CVE-2025-38056
- CVE-2025-38028
- CVE-2025-38027
- CVE-2025-38025
- CVE-2025-38024
- CVE-2025-38023
- CVE-2025-38022
- CVE-2025-38021
- CVE-2025-38020
- CVE-2025-38019
- CVE-2025-38018
- CVE-2025-38016
- CVE-2025-38015
- CVE-2025-38014
- CVE-2025-38013
- CVE-2025-38012
- CVE-2025-38011
- CVE-2025-38010
- CVE-2025-38009
- CVE-2025-38008
- CVE-2025-38007
- CVE-2025-38006
- CVE-2025-38005
- CVE-2025-38002
- CVE-2025-37999
- CVE-2025-37998
- CVE-2025-37996
- CVE-2025-37995
- CVE-2025-37994
- CVE-2025-37993
- CVE-2025-37992
- CVE-2025-37973
- CVE-2025-37972
- CVE-2025-37971
- CVE-2025-37970
- CVE-2025-37969
- CVE-2025-37968
- CVE-2025-37967
- CVE-2025-37966
- CVE-2025-37965
- CVE-2025-37964
- CVE-2025-37963
- CVE-2025-37962
- CVE-2025-37961
- CVE-2025-37960
- CVE-2025-37959
- CVE-2025-37958
- CVE-2025-37957
- CVE-2025-37956
- CVE-2025-37955
- CVE-2025-37954
- CVE-2025-37952
- CVE-2025-37951
- CVE-2025-37950
- CVE-2025-37949
- CVE-2025-37948
- CVE-2025-37947
Have additional questions?