Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
- PowerPC architecture;
- Block layer subsystem;
- Drivers core;
- Network block device driver;
- Character device driver;
- GPU drivers;
- HID subsystem;
- InfiniBand drivers;
- Media drivers;
- Network drivers;
- PPS (Pulse Per Second) driver;
- PTP clock framework;
- RapidIO drivers;
- Real Time Clock drivers;
- SCSI subsystem;
- SLIMbus drivers;
- QCOM SoC drivers;
- Trusted Execution Environment drivers;
- USB DSL drivers;
- USB Device Class drivers;
- USB core drivers;
- USB Gadget drivers;
- USB Host Controller drivers;
- Renesas USBHS Controller drivers;
- File systems infrastructure;
- BTRFS file system;
- NILFS2 file system;
- UBI file system;
- KVM subsystem;
- L3 Master device support module;
- Process Accounting mechanism;
- printk logging mechanism;
- Scheduler infrastructure;
- Tracing infrastructure;
- Memory management;
- 802.1Q VLAN protocol;
- B.A.T.M.A.N. meshing protocol;
- Bluetooth subsystem;
- Networking core;
- IPv4 networking;
- IPv6 networking;
- Logical Link layer;
- NFC subsystem;
- Open vSwitch;
- Rose network layer;
- Network traffic control;
- Wireless networking;
- Tomoyo security module;
(CVE-2025-21814, CVE-2025-21917, CVE-2025-21871, CVE-2024-57973,
CVE-2025-21862, CVE-2025-21877, CVE-2024-26982, CVE-2024-58090,
CVE-2025-21925, CVE-2025-21787, CVE-2025-21763, CVE-2024-58083,
CVE-2025-21719, CVE-2025-21715, CVE-2025-21704, CVE-2025-21865,
CVE-2025-21781, CVE-2025-21762, CVE-2023-52741, CVE-2025-21761,
CVE-2025-21764, CVE-2025-21811, CVE-2025-21846, CVE-2024-57981,
CVE-2024-58051, CVE-2025-21772, CVE-2024-56599, CVE-2024-58014,
CVE-2024-58007, CVE-2025-21760, CVE-2021-47191, CVE-2025-21909,
CVE-2025-21791, CVE-2025-21916, CVE-2024-57979,...