USN-7931-5

Source
https://ubuntu.com/security/notices/USN-7931-5
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7931-5.json
JSON Data
https://api.osv.dev/v1/vulns/USN-7931-5
Upstream
Related
Published
2026-01-09T19:45:59.741393Z
Modified
2026-01-14T03:45:00.195765Z
Summary
linux-raspi, linux-raspi-realtime vulnerabilities
Details

Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Cryptographic API; - Media drivers; - Memory management; - Appletalk network protocol; - Netfilter; (CVE-2025-37958, CVE-2025-38666, CVE-2025-39964, CVE-2025-39993, CVE-2025-40018)

References

Affected packages

Ubuntu:24.04:LTS / linux-raspi

Package

Name
linux-raspi
Purl
pkg:deb/ubuntu/linux-raspi@6.8.0-1044.48?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.0-1044.48

Affected versions

6.*

6.5.0-1005.7
6.7.0-1001.1
6.8.0-1001.1
6.8.0-1002.2
6.8.0-1003.3
6.8.0-1004.4
6.8.0-1005.5
6.8.0-1006.6
6.8.0-1007.7
6.8.0-1008.8
6.8.0-1009.10
6.8.0-1010.11
6.8.0-1011.12
6.8.0-1012.13
6.8.0-1013.14
6.8.0-1014.16
6.8.0-1015.17
6.8.0-1016.18
6.8.0-1017.19
6.8.0-1018.20
6.8.0-1019.23
6.8.0-1020.24
6.8.0-1024.28
6.8.0-1028.32
6.8.0-1029.33
6.8.0-1030.34
6.8.0-1031.35
6.8.0-1032.36
6.8.0-1035.39
6.8.0-1036.40
6.8.0-1038.42
6.8.0-1039.43
6.8.0-1040.44
6.8.0-1041.45
6.8.0-1042.46
6.8.0-1043.47

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "linux-buildinfo-6.8.0-1044-raspi",
            "binary_version": "6.8.0-1044.48"
        },
        {
            "binary_name": "linux-headers-6.8.0-1044-raspi",
            "binary_version": "6.8.0-1044.48"
        },
        {
            "binary_name": "linux-image-6.8.0-1044-raspi",
            "binary_version": "6.8.0-1044.48"
        },
        {
            "binary_name": "linux-modules-6.8.0-1044-raspi",
            "binary_version": "6.8.0-1044.48"
        },
        {
            "binary_name": "linux-raspi-headers-6.8.0-1044",
            "binary_version": "6.8.0-1044.48"
        },
        {
            "binary_name": "linux-raspi-tools-6.8.0-1044",
            "binary_version": "6.8.0-1044.48"
        },
        {
            "binary_name": "linux-tools-6.8.0-1044-raspi",
            "binary_version": "6.8.0-1044.48"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7931-5.json"

cves_map

{
    "ecosystem": "Ubuntu:24.04:LTS",
    "cves": [
        {
            "id": "CVE-2025-37958",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        },
        {
            "id": "CVE-2025-38666",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "high"
                }
            ]
        },
        {
            "id": "CVE-2025-39964",
            "severity": [
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        },
        {
            "id": "CVE-2025-39993",
            "severity": [
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        },
        {
            "id": "CVE-2025-40018",
            "severity": [
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        }
    ]
}

Ubuntu:Pro:24.04:LTS:Realtime:Kernel / linux-raspi-realtime

Package

Name
linux-raspi-realtime
Purl
pkg:deb/ubuntu/linux-raspi-realtime@6.8.0-2035.36?arch=source&distro=realtime/noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.0-2035.36

Affected versions

6.*

6.7.0-2001.1
6.8.0-2001.1
6.8.0-2002.2
6.8.0-2004.4
6.8.0-2005.5
6.8.0-2006.6
6.8.0-2007.7
6.8.0-2008.8
6.8.0-2009.9
6.8.0-2010.10
6.8.0-2011.11
6.8.0-2012.12
6.8.0-2013.14
6.8.0-2014.15
6.8.0-2015.16
6.8.0-2016.17
6.8.0-2017.18
6.8.0-2018.19
6.8.0-2019.20
6.8.0-2022.23
6.8.0-2023.24
6.8.0-2024.25
6.8.0-2025.26
6.8.0-2026.27
6.8.0-2028.29
6.8.0-2029.30
6.8.0-2030.31
6.8.0-2031.32
6.8.0-2032.33
6.8.0-2033.34
6.8.0-2034.35

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "linux-buildinfo-6.8.0-2035-raspi-realtime",
            "binary_version": "6.8.0-2035.36"
        },
        {
            "binary_name": "linux-headers-6.8.0-2035-raspi-realtime",
            "binary_version": "6.8.0-2035.36"
        },
        {
            "binary_name": "linux-image-6.8.0-2035-raspi-realtime",
            "binary_version": "6.8.0-2035.36"
        },
        {
            "binary_name": "linux-modules-6.8.0-2035-raspi-realtime",
            "binary_version": "6.8.0-2035.36"
        },
        {
            "binary_name": "linux-raspi-realtime-headers-6.8.0-2035",
            "binary_version": "6.8.0-2035.36"
        },
        {
            "binary_name": "linux-raspi-realtime-tools-6.8.0-2035",
            "binary_version": "6.8.0-2035.36"
        },
        {
            "binary_name": "linux-tools-6.8.0-2035-raspi-realtime",
            "binary_version": "6.8.0-2035.36"
        }
    ],
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7931-5.json"

cves_map

{
    "ecosystem": "Ubuntu:Pro:24.04:LTS:Realtime:Kernel",
    "cves": [
        {
            "id": "CVE-2025-37958",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        },
        {
            "id": "CVE-2025-38666",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "high"
                }
            ]
        },
        {
            "id": "CVE-2025-39964",
            "severity": [
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        },
        {
            "id": "CVE-2025-39993",
            "severity": [
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        },
        {
            "id": "CVE-2025-40018",
            "severity": [
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        }
    ]
}