vulnerability

Ubuntu: (Multiple Advisories) (CVE-2025-21668): Linux kernel vulnerabilities

Severity
5
CVSS
(AV:L/AC:L/Au:S/C:N/I:N/A:C)
Published
Jan 31, 2025
Added
Apr 24, 2025
Modified
Sep 30, 2025

Description

In the Linux kernel, the following vulnerability has been resolved:

pmdomain: imx8mp-blk-ctrl: add missing loop break condition

Currently imx8mp_blk_ctrl_remove() will continue the for loop
until an out-of-bounds exception occurs.

pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : dev_pm_domain_detach+0x8/0x48
lr : imx8mp_blk_ctrl_shutdown+0x58/0x90
sp : ffffffc084f8bbf0
x29: ffffffc084f8bbf0 x28: ffffff80daf32ac0 x27: 0000000000000000
x26: ffffffc081658d78 x25: 0000000000000001 x24: ffffffc08201b028
x23: ffffff80d0db9490 x22: ffffffc082340a78 x21: 00000000000005b0
x20: ffffff80d19bc180 x19: 000000000000000a x18: ffffffffffffffff
x17: ffffffc080a39e08 x16: ffffffc080a39c98 x15: 4f435f464f006c72
x14: 0000000000000004 x13: ffffff80d0172110 x12: 0000000000000000
x11: ffffff80d0537740 x10: ffffff80d05376c0 x9 : ffffffc0808ed2d8
x8 : ffffffc084f8bab0 x7 : 0000000000000000 x6 : 0000000000000000
x5 : ffffff80d19b9420 x4 : fffffffe03466e60 x3 : 0000000080800077
x2 : 0000000000000000 x1 : 0000000000000001 x0 : 0000000000000000
Call trace:
dev_pm_domain_detach+0x8/0x48
platform_shutdown+0x2c/0x48
device_shutdown+0x158/0x268
kernel_restart_prepare+0x40/0x58
kernel_kexec+0x58/0xe8
__do_sys_reboot+0x198/0x258
__arm64_sys_reboot+0x2c/0x40
invoke_syscall+0x5c/0x138
el0_svc_common.constprop.0+0x48/0xf0
do_el0_svc+0x24/0x38
el0_svc+0x38/0xc8
el0t_64_sync_handler+0x120/0x130
el0t_64_sync+0x190/0x198
Code: 8128c2d0 ffffffc0 aa1e03e9 d503201f

Solutions

ubuntu-upgrade-linux-image-6-11-0-1008-realtimeubuntu-upgrade-linux-image-6-11-0-1011-raspiubuntu-upgrade-linux-image-6-11-0-1012-awsubuntu-upgrade-linux-image-6-11-0-1012-lowlatencyubuntu-upgrade-linux-image-6-11-0-1012-lowlatency-64kubuntu-upgrade-linux-image-6-11-0-1013-azureubuntu-upgrade-linux-image-6-11-0-1013-azure-fdeubuntu-upgrade-linux-image-6-11-0-1013-gcpubuntu-upgrade-linux-image-6-11-0-1013-gcp-64kubuntu-upgrade-linux-image-6-11-0-1014-oracleubuntu-upgrade-linux-image-6-11-0-1014-oracle-64kubuntu-upgrade-linux-image-6-11-0-1020-oemubuntu-upgrade-linux-image-6-11-0-24-genericubuntu-upgrade-linux-image-6-11-0-24-generic-64kubuntu-upgrade-linux-image-6-8-0-1013-gkeopubuntu-upgrade-linux-image-6-8-0-1018-azure-nvidiaubuntu-upgrade-linux-image-6-8-0-1026-gkeubuntu-upgrade-linux-image-6-8-0-1027-ibmubuntu-upgrade-linux-image-6-8-0-1027-oracleubuntu-upgrade-linux-image-6-8-0-1027-oracle-64kubuntu-upgrade-linux-image-6-8-0-1029-nvidiaubuntu-upgrade-linux-image-6-8-0-1029-nvidia-64kubuntu-upgrade-linux-image-6-8-0-1029-nvidia-lowlatencyubuntu-upgrade-linux-image-6-8-0-1029-nvidia-lowlatency-64kubuntu-upgrade-linux-image-6-8-0-1029-oemubuntu-upgrade-linux-image-6-8-0-1029-raspiubuntu-upgrade-linux-image-6-8-0-1030-awsubuntu-upgrade-linux-image-6-8-0-1030-aws-64kubuntu-upgrade-linux-image-6-8-0-1030-azureubuntu-upgrade-linux-image-6-8-0-1030-azure-fdeubuntu-upgrade-linux-image-6-8-0-1031-gcpubuntu-upgrade-linux-image-6-8-0-1031-gcp-64kubuntu-upgrade-linux-image-6-8-0-2024-raspi-realtimeubuntu-upgrade-linux-image-6-8-0-62-genericubuntu-upgrade-linux-image-6-8-0-62-generic-64kubuntu-upgrade-linux-image-6-8-0-62-lowlatencyubuntu-upgrade-linux-image-6-8-0-62-lowlatency-64kubuntu-upgrade-linux-image-6-8-0-64-genericubuntu-upgrade-linux-image-6-8-0-64-generic-64kubuntu-upgrade-linux-image-6-8-1-1023-realtimeubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-aws-64kubuntu-upgrade-linux-image-aws-64k-lts-24-04ubuntu-upgrade-linux-image-aws-lts-24-04ubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-azure-fdeubuntu-upgrade-linux-image-azure-fde-lts-24-04ubuntu-upgrade-linux-image-azure-lts-24-04ubuntu-upgrade-linux-image-azure-nvidiaubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-gcp-64kubuntu-upgrade-linux-image-gcp-64k-lts-24-04ubuntu-upgrade-linux-image-gcp-lts-24-04ubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-6-8ubuntu-upgrade-linux-image-generic-64kubuntu-upgrade-linux-image-generic-64k-6-8ubuntu-upgrade-linux-image-generic-64k-hwe-22-04ubuntu-upgrade-linux-image-generic-64k-hwe-24-04ubuntu-upgrade-linux-image-generic-hwe-22-04ubuntu-upgrade-linux-image-generic-hwe-24-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-gkeopubuntu-upgrade-linux-image-gkeop-6-8ubuntu-upgrade-linux-image-ibmubuntu-upgrade-linux-image-ibm-classicubuntu-upgrade-linux-image-ibm-lts-24-04ubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-64kubuntu-upgrade-linux-image-lowlatency-64k-hwe-22-04ubuntu-upgrade-linux-image-lowlatency-64k-hwe-24-04ubuntu-upgrade-linux-image-lowlatency-hwe-22-04ubuntu-upgrade-linux-image-lowlatency-hwe-24-04ubuntu-upgrade-linux-image-nvidiaubuntu-upgrade-linux-image-nvidia-6-8ubuntu-upgrade-linux-image-nvidia-64kubuntu-upgrade-linux-image-nvidia-64k-6-8ubuntu-upgrade-linux-image-nvidia-64k-hwe-22-04ubuntu-upgrade-linux-image-nvidia-hwe-22-04ubuntu-upgrade-linux-image-nvidia-lowlatencyubuntu-upgrade-linux-image-nvidia-lowlatency-64kubuntu-upgrade-linux-image-oem-22-04ubuntu-upgrade-linux-image-oem-22-04aubuntu-upgrade-linux-image-oem-22-04bubuntu-upgrade-linux-image-oem-22-04cubuntu-upgrade-linux-image-oem-22-04dubuntu-upgrade-linux-image-oem-24-04ubuntu-upgrade-linux-image-oem-24-04aubuntu-upgrade-linux-image-oem-24-04bubuntu-upgrade-linux-image-oracleubuntu-upgrade-linux-image-oracle-64kubuntu-upgrade-linux-image-oracle-64k-lts-24-04ubuntu-upgrade-linux-image-oracle-lts-24-04ubuntu-upgrade-linux-image-raspiubuntu-upgrade-linux-image-raspi-realtimeubuntu-upgrade-linux-image-realtimeubuntu-upgrade-linux-image-virtualubuntu-upgrade-linux-image-virtual-6-8ubuntu-upgrade-linux-image-virtual-hwe-22-04ubuntu-upgrade-linux-image-virtual-hwe-24-04

References

    Title
    NEW

    Explore Exposure Command

    Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.