Páginas

quarta-feira, 4 de março de 2026

Urgent: Ubuntu Linux Kernel Security Update USN-7990-6 Patches Critical Raspberry Pi Flaws

 

Ubuntu


Critical Ubuntu Linux kernel updates (USN-7990-6) patch high-severity vulnerabilities (CVE-2025-40019) in Raspberry Pi images for 18.04 & 20.04 LTS. This comprehensive guide details flaws in the Crypto API, Padata, and Netfilter, provides step-by-step remediation with Ubuntu Pro, and explains the mandatory ABI change and third-party module recompilation. Ensure your IoT and edge deployments remain secure against potential system compromise.

Is your Ubuntu 18.04 or 20.04 LTS Raspberry Pi deployment a sitting duck for attackers? A new, critical security advisory—Ubuntu Security Notice USN-7990-6—reveals several high-impact vulnerabilities in the Linux kernel for Raspberry Pi (raspi) systems. 

This isn't a routine patch; it addresses flaws that could allow a malicious actor to fully compromise your device. For IT administrators, DevOps teams, and IoT security professionals managing Ubuntu-powered Raspberry Pi fleets, immediate action is required to mitigate risks in the cryptographic, netfilter, and parallel execution subsystems.

Executive Summary: The Threat Landscape for Ubuntu Raspberry Pi Kernels

This security update is paramount for maintaining the integrity of your Ubuntu 20.04 LTS (Focal Fossa) and Ubuntu 18.04 LTS (Bionic Beaver) environments. The vulnerabilities are not theoretical; they are present in the very fabric of the linux-raspi and linux-raspi-5.4 kernels.

Ignoring this advisory exposes your infrastructure to potential data breaches, denial of service, and unauthorized privilege escalation. Below, we break down the technical details and provide a clear remediation path.

Deep Dive: Unpacking the Vulnerabilities (CVE Details)

The USN-7990-6 advisory corrects specific flaws that underscore the complexity of modern kernel security. For cybersecurity professionals, understanding the affected subsystems is key to assessing the potential blast radius.

1. Cryptographic API and Netfilter Flaws (CVE-2025-21726, CVE-2025-40019)

The Cryptographic API is the backbone of secure data transmission, while Netfilter governs packet filtering, NAT, and firewalling (the foundation of iptables and nftables). Vulnerabilities here can lead to:

  • Information Disclosure: Leakage of sensitive kernel memory.

  • Privilege Escalation: An unprivileged user gaining root access by manipulating filtered network states.

  • Kernel Panic: Causing system crashes and disrupting critical IoT operations.

2. Padata Parallel Execution Mechanism (CVE-2022-49698)

Padata is a lesser-known but crucial subsystem that handles parallel jobs across multi-core processors. A flaw in this mechanism, like the one identified in CVE-2022-49698, can be exploited to create race conditions. 

This can allow an attacker to corrupt kernel data, leading to unpredictable system behavior and potential security bypasses, especially in high-performance computing or data-intensive tasks common on newer Raspberry Pi models.

Immediate Remediation: Applying the Ubuntu Kernel Patch

Canonical has released specific kernel images to neutralize these threats. However, access to these patches for the LTS releases in question is gated behind Ubuntu Pro, Canonical's expanded security maintenance subscription. 

This highlights a critical shift: long-term security for older LTS releases now requires an Ubuntu Pro subscription.

Update Instructions for Ubuntu 20.04 LTS (Raspberry Pi)

Execute the following commands in your terminal. This requires an active Ubuntu Pro token attached to your system.

bash
sudo apt update
sudo apt install --only-upgrade linux-image-5.4.0-1137-raspi linux-image-raspi linux-image-raspi-5.4

Key Package Versions:

  • linux-image-5.4.0-1137-raspi5.4.0-1137.150

  • linux-image-raspi5.4.0.1137.168

Update Instructions for Ubuntu 18.04 LTS (Raspberry Pi)

For systems still on Bionic Beaver, the Hardware Enablement (HWE) kernel receives the patch.

bash
sudo apt update
sudo apt install --only-upgrade linux-image-5.4.0-1137-raspi linux-image-raspi-5.4 linux-image-raspi-hwe-18.04

Key Package Versions:

  • linux-image-5.4.0-1137-raspi5.4.0-1137.150~18.04.1

  • linux-image-raspi-hwe-18.045.4.0.1137.150~18.04.1

Critical Post-Update Step: After updating the kernel packages, you must reboot your system to load the new, patched kernel. A system is still vulnerable until the next boot cycle completes.

Critical Note: The Mandatory ABI Change and Third-Party Modules

The advisory contains a vital note for systems with custom kernels or third-party modules (like out-of-tree drivers for specialized sensors or hardware). There has been an unavoidable Application Binary Interface (ABI) change.

This means any kernel modules not included in the standard Ubuntu distribution must be recompiled and reinstalled against the new kernel version. Failure to do so will result in those modules failing to load, potentially causing hardware or application errors.

  • For standard systems: The default kernel metapackages (linux-image-raspi) will handle this automatically during the upgrade.

  • For custom-built environments: Administrators must manually trigger a rebuild of all external modules using tools like dkms (Dynamic Kernel Module Support) or by re-running the module's build process against the new kernel headers.

Frequently Asked Questions

Q: Is my Ubuntu Desktop for Raspberry Pi affected by USN-7990-6?

A: Yes, if you are running Ubuntu 18.04 LTS or 20.04 LTS with the standard linux-raspi kernel. This advisory specifically targets the Raspberry Pi kernel flavor, regardless of whether you're running the server or desktop image.

Q: How do I check if I have Ubuntu Pro to receive these updates?

A: Run pro status in your terminal. If Ubuntu Pro is not attached, you will see a message indicating the system is not entitled. You can attach a token using pro attach [TOKEN]. A free tier is available for personal use on up to 5 machines.

Q: What are the symptoms of the CVE-2025-40019 vulnerability?

A: CVE-2025-40019, related to netfilter, may not present visible symptoms before exploitation. It is a flaw that can be triggered remotely or locally to cause a denial of service (system hang) or potentially execute arbitrary code. Proactive patching is the only reliable mitigation.

Conclusion: Securing Your Ubuntu Raspberry Pi Ecosystem

The release of USN-7990-6 serves as a stark reminder that security is a continuous process, especially in the rapidly evolving landscape of edge and IoT computing. 

By understanding the nuances of these vulnerabilities—from the Crypto API to the Padata mechanism—and adhering to the strict remediation steps involving Ubuntu Pro and mandatory reboots, you fortify your infrastructure against sophisticated threats. Do not delay; the integrity of your data and the stability of your services depend on it.

Action: 

Verify your Ubuntu Pro subscription status and deploy the kernel updates outlined above across your Raspberry Pi estate today.

Nenhum comentário:

Postar um comentário