{"id":"USN-7931-4","summary":"linux-xilinx vulnerabilities","details":"Several security issues were discovered in the Linux kernel.\nAn attacker could possibly use these to compromise the system.\nThis update corrects flaws in the following subsystems:\n  - Cryptographic API;\n  - Media drivers;\n  - Memory management;\n  - Appletalk network protocol;\n  - Netfilter;\n(CVE-2025-37958, CVE-2025-38666, CVE-2025-39964, CVE-2025-39993,\nCVE-2025-40018)\n","modified":"2026-05-23T01:34:18.511826619Z","published":"2025-12-19T14:35:24Z","related":["UBUNTU-CVE-2025-37958","UBUNTU-CVE-2025-38666","UBUNTU-CVE-2025-39964","UBUNTU-CVE-2025-39993","UBUNTU-CVE-2025-40018"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7931-4"}],"affected":[{"package":{"name":"linux-xilinx","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/linux-xilinx?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.8.0-1021.22"}]}],"versions":["6.8.0-1008.9","6.8.0-1009.10","6.8.0-1011.12","6.8.0-1012.13","6.8.0-1013.14","6.8.0-1014.15","6.8.0-1015.16","6.8.0-1017.18","6.8.0-1018.19","6.8.0-1019.20","6.8.0-1020.21"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"6.8.0-1021.22","binary_name":"linux-buildinfo-6.8.0-1021-xilinx"},{"binary_version":"6.8.0-1021.22","binary_name":"linux-headers-6.8.0-1021-xilinx"},{"binary_version":"6.8.0-1021.22","binary_name":"linux-image-6.8.0-1021-xilinx"},{"binary_version":"6.8.0-1021.22","binary_name":"linux-modules-6.8.0-1021-xilinx"},{"binary_version":"6.8.0-1021.22","binary_name":"linux-tools-6.8.0-1021-xilinx"},{"binary_version":"6.8.0-1021.22","binary_name":"linux-xilinx-headers-6.8.0-1021"},{"binary_version":"6.8.0-1021.22","binary_name":"linux-xilinx-tools-6.8.0-1021"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7931-4.json","cves_map":{"cves":[],"ecosystem":"Ubuntu:24.04:LTS"}}}],"schema_version":"1.7.5"}