USN-7650-1

Source
https://ubuntu.com/security/notices/USN-7650-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7650-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/USN-7650-1
Upstream
Related
Published
2025-07-17T15:44:10.358557Z
Modified
2025-07-17T20:00:41.601925Z
Summary
linux-oem-6.14 vulnerabilities
Details

Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - PA-RISC architecture; - PowerPC architecture; - S390 architecture; - x86 architecture; - Compute Acceleration Framework; - Ublk userspace block driver; - ARM SCMI message protocol; - GPU drivers; - IOMMU subsystem; - IRQ chip drivers; - Multiple devices driver; - Network drivers; - PCI subsystem; - PTP clock framework; - SPI subsystem; - BTRFS file system; - SMB network file system; - eXpress Data Path; - Universal MIDI packet (UMP) support module; - Tracing infrastructure; - Memory management; - IPv4 networking; - IPv6 networking; - Network traffic control; - AMD SoC Alsa drivers; - SoC Audio generic drivers; (CVE-2025-37899, CVE-2025-37905, CVE-2025-37916, CVE-2025-37935, CVE-2025-37923, CVE-2025-37906, CVE-2025-37929, CVE-2025-37907, CVE-2025-37909, CVE-2025-37910, CVE-2025-37921, CVE-2025-37927, CVE-2025-38216, CVE-2025-37914, CVE-2025-37928, CVE-2025-37915, CVE-2025-37990, CVE-2025-37917, CVE-2025-37936, CVE-2025-37946, CVE-2025-37934, CVE-2025-37894, CVE-2025-37898, CVE-2025-37911, CVE-2025-37912, CVE-2025-37920, CVE-2025-37926, CVE-2025-37919, CVE-2025-37900, CVE-2025-37908, CVE-2025-37924, CVE-2025-37974, CVE-2025-37901, CVE-2025-37903, CVE-2025-37891, CVE-2025-37922, CVE-2025-37991, CVE-2025-37930, CVE-2025-37896, CVE-2025-37897, CVE-2025-37913, CVE-2025-37895, CVE-2025-37933, CVE-2025-37904, CVE-2025-37931)

References

Affected packages

Ubuntu:24.04:LTS / linux-oem-6.14

Package

Name
linux-oem-6.14
Purl
pkg:deb/ubuntu/linux-oem-6.14@6.14.0-1007.7?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.14.0-1007.7

Affected versions

6.*

6.14.0-1004.4
6.14.0-1005.5
6.14.0-1006.6

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "linux-buildinfo-6.14.0-1007-oem",
            "binary_version": "6.14.0-1007.7"
        },
        {
            "binary_name": "linux-headers-6.14.0-1007-oem",
            "binary_version": "6.14.0-1007.7"
        },
        {
            "binary_name": "linux-image-unsigned-6.14.0-1007-oem",
            "binary_version": "6.14.0-1007.7"
        },
        {
            "binary_name": "linux-image-unsigned-6.14.0-1007-oem-dbgsym",
            "binary_version": "6.14.0-1007.7"
        },
        {
            "binary_name": "linux-modules-6.14.0-1007-oem",
            "binary_version": "6.14.0-1007.7"
        },
        {
            "binary_name": "linux-modules-ipu6-6.14.0-1007-oem",
            "binary_version": "6.14.0-1007.7"
        },
        {
            "binary_name": "linux-modules-ipu7-6.14.0-1007-oem",
            "binary_version": "6.14.0-1007.7"
        },
        {
            "binary_name": "linux-modules-iwlwifi-6.14.0-1007-oem",
            "binary_version": "6.14.0-1007.7"
        },
        {
            "binary_name": "linux-modules-usbio-6.14.0-1007-oem",
            "binary_version": "6.14.0-1007.7"
        },
        {
            "binary_name": "linux-modules-vision-6.14.0-1007-oem",
            "binary_version": "6.14.0-1007.7"
        },
        {
            "binary_name": "linux-oem-6.14-headers-6.14.0-1007",
            "binary_version": "6.14.0-1007.7"
        },
        {
            "binary_name": "linux-oem-6.14-tools-6.14.0-1007",
            "binary_version": "6.14.0-1007.7"
        },
        {
            "binary_name": "linux-tools-6.14.0-1007-oem",
            "binary_version": "6.14.0-1007.7"
        }
    ]
}