Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Nios II architecture;
- Sun Sparc architecture;
- User-Mode Linux (UML);
- x86 architecture;
- Block layer subsystem;
- Cryptographic API;
- Drivers core;
- Bus devices;
- Hardware random number generator core;
- Data acquisition framework and drivers;
- CPU frequency scaling framework;
- DMA engine subsystem;
- GPU drivers;
- HW tracing;
- Input Device (Miscellaneous) drivers;
- Multiple devices driver;
- Media drivers;
- MOST (Media Oriented Systems Transport) drivers;
- MTD block device drivers;
- Network drivers;
- NVME drivers;
- PCI subsystem;
- Performance monitor drivers;
- Pin controllers subsystem;
- x86 platform drivers;
- PPS (Pulse Per Second) driver;
- PWM drivers;
- SCSI subsystem;
- TCM subsystem;
- Userspace I/O drivers;
- USB Gadget drivers;
- USB Host Controller drivers;
- Framebuffer layer;
- BTRFS file system;
- File systems infrastructure;
- Ext4 file system;
- Network file system (NFS) server daemon;
- NTFS3 file system;
- SMB network file system;
- padata parallel execution mechanism;
- IP tunnels definitions;
- Network sockets;
- XFRM subsystem;
- Control group (cgroup);
- Padata parallel execution mechanism;
- PID allocator;
- Tracing infrastructure;
- Memory management;
- 9P file system network protocol;
- Ethernet bridge;
- Ceph Core library;
- Networking core;
- IPv4 networking;
- IPv6 networking;
- NFC subsystem;
- RF switch subsystem;
- SCTP protocol;
- Unix domain sockets;
- VMware vSockets driver;
- Intel ASoC drivers;
- USB sound devices;
(CVE-2024-53114, CVE-2024-56538, CVE-2024-58011, CVE-2025-21861,
CVE-2025-22058, CVE-2025-23143, CVE-2025-38236, CVE-2025-38248,
CVE-2025-38584, CVE-2025-39869, CVE-2025-39873, CVE-2025-39876,...