USN-7931-4

Source
https://ubuntu.com/security/notices/USN-7931-4
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7931-4.json
JSON Data
https://api.test.osv.dev/v1/vulns/USN-7931-4
Upstream
Related
Published
2025-12-19T14:35:24.658196Z
Modified
2026-02-05T22:48:27.163259Z
Summary
linux-xilinx vulnerabilities
Details

Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Cryptographic API; - Media drivers; - Memory management; - Appletalk network protocol; - Netfilter; (CVE-2025-37958, CVE-2025-38666, CVE-2025-39964, CVE-2025-39993, CVE-2025-40018)

References

Affected packages

Ubuntu:24.04:LTS / linux-xilinx

Package

Name
linux-xilinx
Purl
pkg:deb/ubuntu/linux-xilinx@6.8.0-1021.22?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.0-1021.22

Affected versions

6.*
6.8.0-1008.9
6.8.0-1009.10
6.8.0-1011.12
6.8.0-1012.13
6.8.0-1013.14
6.8.0-1014.15
6.8.0-1015.16
6.8.0-1017.18
6.8.0-1018.19
6.8.0-1019.20
6.8.0-1020.21

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "linux-buildinfo-6.8.0-1021-xilinx",
            "binary_version": "6.8.0-1021.22"
        },
        {
            "binary_name": "linux-headers-6.8.0-1021-xilinx",
            "binary_version": "6.8.0-1021.22"
        },
        {
            "binary_name": "linux-image-6.8.0-1021-xilinx",
            "binary_version": "6.8.0-1021.22"
        },
        {
            "binary_name": "linux-modules-6.8.0-1021-xilinx",
            "binary_version": "6.8.0-1021.22"
        },
        {
            "binary_name": "linux-tools-6.8.0-1021-xilinx",
            "binary_version": "6.8.0-1021.22"
        },
        {
            "binary_name": "linux-xilinx-headers-6.8.0-1021",
            "binary_version": "6.8.0-1021.22"
        },
        {
            "binary_name": "linux-xilinx-tools-6.8.0-1021",
            "binary_version": "6.8.0-1021.22"
        }
    ]
}

Database specific

cves_map
{
    "cves": [
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2025-37958"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "high",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2025-38666"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2025-39964"
        },
        {
            "severity": [
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2025-39993"
        },
        {
            "severity": [
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2025-40018"
        }
    ],
    "ecosystem": "Ubuntu:24.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7931-4.json"