Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
- PA-RISC architecture;
- PowerPC architecture;
- S390 architecture;
- x86 architecture;
- Compute Acceleration Framework;
- Ublk userspace block driver;
- Bluetooth drivers;
- ARM SCMI message protocol;
- GPU drivers;
- IOMMU subsystem;
- IRQ chip drivers;
- Multiple devices driver;
- Network drivers;
- PCI subsystem;
- PTP clock framework;
- SPI subsystem;
- BTRFS file system;
- SMB network file system;
- eXpress Data Path;
- Universal MIDI packet (UMP) support module;
- Tracing infrastructure;
- Memory management;
- IPv4 networking;
- IPv6 networking;
- Netfilter;
- Network traffic control;
- AMD SoC Alsa drivers;
- SoC Audio generic drivers;
(CVE-2025-37900, CVE-2025-37912, CVE-2025-37904, CVE-2025-37924,
CVE-2025-37907, CVE-2025-37894, CVE-2025-37909, CVE-2025-37891,
CVE-2025-37990, CVE-2025-37991, CVE-2025-37910, CVE-2025-37930,
CVE-2025-37895, CVE-2025-37898, CVE-2025-37935, CVE-2025-37931,
CVE-2025-37906, CVE-2025-37997, CVE-2025-37946, CVE-2025-37896,
CVE-2025-37933, CVE-2025-37920, CVE-2025-37890, CVE-2025-37899,
CVE-2025-37974, CVE-2025-37919, CVE-2025-37916, CVE-2025-38177,
CVE-2025-37908, CVE-2025-37913, CVE-2025-37911, CVE-2025-37901,
CVE-2025-37927, CVE-2025-38000, CVE-2025-38001, CVE-2025-37897,
CVE-2025-37918, CVE-2025-37923, CVE-2025-37914, CVE-2025-37929,
CVE-2025-37903, CVE-2025-37932, CVE-2025-37926, CVE-2025-37905,
CVE-2025-37928, CVE-2025-37915, CVE-2025-38216, CVE-2025-37917,
CVE-2025-37936, CVE-2025-37934, CVE-2025-37921, CVE-2025-37922)