Releases: cloudfoundry/bosh-linux-stemcell-builder
ubuntu jammy v1.999
Metadata:
BOSH Agent Version: 2.788.0
Kernel Version: 5.15.0.163.158
USNs:
Title: USN-7899-1 -- GNU binutils vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7899-1
Priorities: low,medium
Description:
It was discovered that GNU binutils could be forced to perform an out- of-bounds read in certain instances. An attacker with local access to a system could possibly use this issue to cause a denial of service. (CVE-2025-11839, CVE-2025-11840) It was discovered that GNU binutils incorrectly handled certain inputs. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS. (CVE-2025-8225) It was discovered that GNU binutils incorrectly handled certain inputs. An attacker could possibly use this issue to cause a crash or execute arbitrary code. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS. (CVE-2025-5244, CVE-2025-5245) It was discovered that GNU binutils incorrectly handled certain inputs. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2025-3198) It was discovered that GNU binutils incorrectly handled certain files. An attacker could possibly use this issue to cause a crash. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, and Ubuntu 18.04 LTS. (CVE-2025-1182) It was discovered that ld in GNU binutils incorrectly handled certain files. An attacker could possibly use this issue to cause a crash, expose sensitive information or execute arbitrary code. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS. (CVE-2025-1181) It was discovered that GNU binutils incorrectly handled certain inputs. An attacker could possibly use this issue to cause a crash, expose sensitive information or execute arbitrary code. This issue only affected Ubuntu 25.04. (CVE-2025-1153) It was discovered that GNU binutils incorrectly handled certain inputs. An attacker could possibly use this issue to cause a crash or execute arbitrary code. This issue only affected Ubuntu 14.04 LTS. (CVE-2025-0840) Update Instructions: Run sudo pro fix USN-7899-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: binutils - 2.38-4ubuntu2.11 binutils-aarch64-linux-gnu - 2.38-4ubuntu2.11 binutils-alpha-linux-gnu - 2.38-4ubuntu2.11 binutils-arm-linux-gnueabi - 2.38-4ubuntu2.11 binutils-arm-linux-gnueabihf - 2.38-4ubuntu2.11 binutils-common - 2.38-4ubuntu2.11 binutils-dev - 2.38-4ubuntu2.11 binutils-doc - 2.38-4ubuntu2.11 binutils-for-build - 2.38-4ubuntu2.11 binutils-for-host - 2.38-4ubuntu2.11 binutils-hppa-linux-gnu - 2.38-4ubuntu2.11 binutils-hppa64-linux-gnu - 2.38-4ubuntu2.11 binutils-i686-gnu - 2.38-4ubuntu2.11 binutils-i686-kfreebsd-gnu - 2.38-4ubuntu2.11 binutils-i686-linux-gnu - 2.38-4ubuntu2.11 binutils-ia64-linux-gnu - 2.38-4ubuntu2.11 binutils-m68k-linux-gnu - 2.38-4ubuntu2.11 binutils-multiarch - 2.38-4ubuntu2.11 binutils-multiarch-dev - 2.38-4ubuntu2.11 binutils-powerpc-linux-gnu - 2.38-4ubuntu2.11 binutils-powerpc64-linux-gnu - 2.38-4ubuntu2.11 binutils-powerpc64le-linux-gnu - 2.38-4ubuntu2.11 binutils-riscv64-linux-gnu - 2.38-4ubuntu2.11 binutils-s390x-linux-gnu - 2.38-4ubuntu2.11 binutils-sh4-linux-gnu - 2.38-4ubuntu2.11 binutils-source - 2.38-4ubuntu2.11 binutils-sparc64-linux-gnu - 2.38-4ubuntu2.11 binutils-x86-64-kfreebsd-gnu - 2.38-4ubuntu2.11 binutils-x86-64-linux-gnu - 2.38-4ubuntu2.11 binutils-x86-64-linux-gnux32 - 2.38-4ubuntu2.11 libbinutils - 2.38-4ubuntu2.11 libctf-nobfd0 - 2.38-4ubuntu2.11 libctf0 - 2.38-4ubuntu2.11 No subscription required
CVEs:
- https://ubuntu.com/security/CVE-2025-3198
- https://ubuntu.com/security/CVE-2025-1182
- https://ubuntu.com/security/CVE-2025-1153
- https://ubuntu.com/security/CVE-2025-7545
- https://ubuntu.com/security/CVE-2025-0840
- https://ubuntu.com/security/CVE-2025-5244
- https://ubuntu.com/security/CVE-2025-5245
- https://ubuntu.com/security/CVE-2025-8225
- https://ubuntu.com/security/CVE-2025-1181
- https://ubuntu.com/security/CVE-2025-11839
- https://ubuntu.com/security/CVE-2025-11840
Title: USN-7909-1 -- Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7909-1
Priorities: high,low,medium
Description:
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - ARM64 architecture; - MIPS architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - x86 architecture; - Block layer subsystem; - ACPI drivers; - ATM drivers; - DRBD Distributed Replicated Block Device drivers; - Bus devices; - Clock framework and drivers; - Data acquisition framework and drivers; - Hardware crypto device drivers; - Device frequency scaling framework; - Buffer Sharing and Synchronization framework; - DMA engine subsystem; - ARM SCMI message protocol; - GPU drivers; - HID subsystem; - Hardware monitoring drivers; - I2C subsystem; - I3C subsystem; - IIO subsystem; - InfiniBand drivers; - Input Device core drivers; - IOMMU subsystem; - Media drivers; - Network drivers; - Mellanox network drivers; - PCI subsystem; - PCCARD (PCMCIA/CardBus) bus subsystem; - PHY drivers; - Power supply drivers; - Voltage and Current Regulator drivers; - SCSI subsystem; - ASPEED SoC drivers; - QCOM SoC drivers; - small TFT LCD display modules; - Trusted Execution Environment drivers; - TTY drivers; - UFS subsystem; - USB core drivers; - DesignWare USB3 driver; - USB Gadget drivers; - Framebuffer layer; - BTRFS file system; - File systems infrastructure; - EFI Variable file system; - Ext4 file system; - F2FS file system; - JFS file system; - Network file system (NFS) client; - Network file system (NFS) server daemon; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - Asynchronous Transfer Mode (ATM) subsystem; - BPF subsystem; - NFS page cache wrapper; - Memory management; - Networking subsytem; - UDP network protocol; - Perf events; - RCU subsystem; - Tracing infrastructure; - 802.1Q VLAN protocol; - Appletalk network protocol; - Amateur Radio drivers; - B.A.T.M.A.N. meshing protocol; - Bluetooth subsystem; - Ethernet bridge; - Networking core; - HSR network protocol; - IPv4 networking; - IPv6 networking; - Multipath TCP; - Netfilter; - Network traffic control; - SCTP protocol; - TLS protocol; - Wireless networking; - SoC audio core drivers; - USB sound devices; (CVE-2022-50070, CVE-2022-50327, CVE-2023-52935, CVE-2023-53074, CVE-2024-50061, CVE-2024-53068, CVE-2025-37925, CVE-2025-37968, CVE-2025-38095, CVE-2025-38148, CVE-2025-38165, CVE-2025-38335, CVE-2025-38347, CVE-2025-38468, CVE-2025-38470, CVE-2025-38473, CVE-2025-38474, CVE-2025-38476, CVE-2025-38478, CVE-2025-38480, CVE-2025-38481, CVE-2025-38482, CVE-2025-38483, CVE-2025-38487, CVE-2025-38488, CVE-2025-38494, CVE-2025-38495, CVE-2025-38497, CVE-2025-38499, CVE-2025-38502, CVE-2025-38527, CVE-2025-38528, CVE-2025-38529, CVE-2025-38530, CVE-2025-38535, CVE-2025-38538, CVE-2025-38539, CVE-2025-38548, CVE-2025-38550, CVE-2025-38553, CVE-2025-38555, CVE-2025-38563, CVE-2025-38565, CVE-2025-38569, CVE-2025-38572, CVE-2025-38574, CVE-2025-38576, CVE-2025-38577, CVE-2025-38578, CVE-2025-38579, CVE-2025-38581, CVE-2025-38583, CVE-2025-38601, CVE-2025-38602, CVE-2025-38604, CVE-2025-38608, CVE-2025-38609, CVE-2025-38612, CVE-2025-38614, CVE-2025-38622, CVE-2025-38623, CVE-2025-38624, CVE-2025-38630, CVE-2025-38634, CVE-2025-38635, CVE-2025-38639, CVE-2025-38645, CVE-2025-38650, CVE-2025-38652, CVE-2025-38663, CVE-2025-38664, CVE-2025-38666, CVE-2025-38668, CVE-2025-38670, CVE-2025-38671, CVE-2025-38676, CVE-2025-38677, CVE-2025-38678, CVE-2025-38680, CVE-2025-38681, CVE-2025-38683, CVE-2025-38684, CVE-2025-38685, CVE-2025-38687, CVE-2025-38691, CVE-2025-38693, CVE-2025-38694, CVE-2025-38695, CVE-2025-38696, CVE-2025-38697, CVE-2025-38698, CVE-2025-38699, CVE-2025-38700, CVE-2025-38701, CVE-2025-38706, CVE-2025-38707, CVE-2025-38708, CVE-2025-38711, CVE-2025-38712, CVE-2025-38713, CVE-2025-38714, CVE-2025-38715, CVE-2025-38718, CVE-2025-38721, CVE-2025-38724, CVE-2025-38725, CVE-2025-38729, CVE-2025-38732, CVE-2025-39673, CVE-2025-39675, CVE-2025-39676, CVE-2025-39681, CVE-2025-39683, CVE-2025-39684, CVE-2025-39685, CVE-2025-39686, CVE-2025-39687, CVE-2025-39689, CVE-2025-39691, CVE-2025-39693, CVE-2025-39697, CVE-2025-39702, CVE-2025-39703, CVE-2025-39709, CVE-2025-39710, CVE-2025-39713, CVE-2025-39714, CVE-2025-39724, CVE-2025-39730, CVE-2025-39734, CVE-2025-39736, CVE-2025-39737, CVE-2025-39738, CVE-2025-39742, CVE-2025-39743, CVE-2025-39749, CVE-2025-39752, CVE-2025-39756, CVE-2025-39757, CVE-2025-39760, CVE-2025-39766, CVE-2025-39772, CVE-2025-39773, CVE-2025-39776, CVE-2025-39782, CVE-2025-39783, CVE-2025-39787, CVE-2025-39788, CVE-2025-39790, CVE-2025-39794, CVE-2025-39795, CVE-2025-39798, CVE-2025-39801, CVE-2025-39806, CVE-2025-39808, CVE-2025-39812, CVE-2025-39813, CVE-2025-39817, CVE-2025-39823, CVE-2025-39824, CVE-2025-39828, CVE-2025-39835, CVE-2025-39839, CVE-2025-39841, CVE-2025-39844, CVE-2025-39845, CVE-2025-39846, CVE-2025-39847, CVE-2025-39848, CVE-2025-39853, CVE-2025-39860, CVE-2025-39864, CVE-2025-39865, CVE-2025-39866, CVE-2025-39891, CVE-2025-39894, CVE-2025-39902, CVE-2025-39920) Update Instructions: Run sudo pro fix USN-7909-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-5.15.0-1038-nvidia-tegra-igx - 5.15.0-1038.38 linux-buildinfo-5.15.0-1038-nvidia-tegra-igx-rt - 5.15.0-1038.38 linux-headers-5.15.0-1038-nvidia-tegra-igx - 5.15.0-1038.38 linux-headers-5.15.0-1038-nvidia-tegra-igx-rt - 5.15.0-1038.38 lin...
ubuntu noble v1.165
Metadata:
BOSH Agent Version: 2.786.0
Kernel Version: 6.8.0-87.88
USNs:
Title: USN-7886-1 -- Python vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7886-1
Priorities: medium
Description:
It was discovered that Python inefficiently handled expanding system environment variables. An attacker could possibly use this issue to cause Python to consume excessive resources, leading to a denial of service. (CVE-2025-6075) Caleb Brown discovered that Python incorrectly handled the ZIP64 End of Central Directory (EOCD) Locator record offset value. An attacker could possibly use this issue to obfuscate malicious content. (CVE-2025-8291) Update Instructions: Run sudo pro fix USN-7886-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: idle-python3.12 - 3.12.3-1ubuntu0.9 libpython3.12-dev - 3.12.3-1ubuntu0.9 libpython3.12-minimal - 3.12.3-1ubuntu0.9 libpython3.12-stdlib - 3.12.3-1ubuntu0.9 libpython3.12-testsuite - 3.12.3-1ubuntu0.9 libpython3.12t64 - 3.12.3-1ubuntu0.9 python3.12 - 3.12.3-1ubuntu0.9 python3.12-dev - 3.12.3-1ubuntu0.9 python3.12-doc - 3.12.3-1ubuntu0.9 python3.12-examples - 3.12.3-1ubuntu0.9 python3.12-full - 3.12.3-1ubuntu0.9 python3.12-minimal - 3.12.3-1ubuntu0.9 python3.12-nopie - 3.12.3-1ubuntu0.9 python3.12-venv - 3.12.3-1ubuntu0.9 No subscription required
CVEs:
Title: USN-7889-1 -- Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7889-1
Priorities: medium
Description:
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Media drivers; - Network drivers; - Netfilter; - TLS protocol; (CVE-2025-21729, CVE-2025-38227, CVE-2025-38616, CVE-2025-38678) Update Instructions: Run sudo pro fix USN-7889-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1040-oracle - 6.8.0-1040.41 linux-buildinfo-6.8.0-1040-oracle-64k - 6.8.0-1040.41 linux-headers-6.8.0-1040-oracle - 6.8.0-1040.41 linux-headers-6.8.0-1040-oracle-64k - 6.8.0-1040.41 linux-headers-oracle-6.8 - 6.8.0-1040.41 linux-headers-oracle-64k-6.8 - 6.8.0-1040.41 linux-headers-oracle-64k-lts-24.04 - 6.8.0-1040.41 linux-headers-oracle-lts-24.04 - 6.8.0-1040.41 linux-image-6.8.0-1040-oracle - 6.8.0-1040.41 linux-image-6.8.0-1040-oracle-64k - 6.8.0-1040.41 linux-image-oracle-6.8 - 6.8.0-1040.41 linux-image-oracle-64k-6.8 - 6.8.0-1040.41 linux-image-oracle-64k-lts-24.04 - 6.8.0-1040.41 linux-image-oracle-lts-24.04 - 6.8.0-1040.41 linux-image-unsigned-6.8.0-1040-oracle - 6.8.0-1040.41 linux-image-unsigned-6.8.0-1040-oracle-64k - 6.8.0-1040.41 linux-modules-6.8.0-1040-oracle - 6.8.0-1040.41 linux-modules-6.8.0-1040-oracle-64k - 6.8.0-1040.41 linux-modules-extra-6.8.0-1040-oracle - 6.8.0-1040.41 linux-modules-extra-6.8.0-1040-oracle-64k - 6.8.0-1040.41 linux-oracle-6.8 - 6.8.0-1040.41 linux-oracle-64k-6.8 - 6.8.0-1040.41 linux-oracle-64k-lts-24.04 - 6.8.0-1040.41 linux-oracle-headers-6.8.0-1040 - 6.8.0-1040.41 linux-oracle-lts-24.04 - 6.8.0-1040.41 linux-oracle-tools-6.8.0-1040 - 6.8.0-1040.41 linux-tools-6.8.0-1040-oracle - 6.8.0-1040.41 linux-tools-6.8.0-1040-oracle-64k - 6.8.0-1040.41 linux-tools-oracle-6.8 - 6.8.0-1040.41 linux-tools-oracle-64k-6.8 - 6.8.0-1040.41 linux-tools-oracle-64k-lts-24.04 - 6.8.0-1040.41 linux-tools-oracle-lts-24.04 - 6.8.0-1040.41 No subscription required linux-buildinfo-6.8.0-1041-ibm - 6.8.0-1041.41 linux-headers-6.8.0-1041-ibm - 6.8.0-1041.41 linux-headers-ibm - 6.8.0-1041.41 linux-headers-ibm-6.8 - 6.8.0-1041.41 linux-headers-ibm-classic - 6.8.0-1041.41 linux-headers-ibm-lts-24.04 - 6.8.0-1041.41 linux-ibm - 6.8.0-1041.41 linux-ibm-6.8 - 6.8.0-1041.41 linux-ibm-classic - 6.8.0-1041.41 linux-ibm-headers-6.8.0-1041 - 6.8.0-1041.41 linux-ibm-lts-24.04 - 6.8.0-1041.41 linux-ibm-tools-6.8.0-1041 - 6.8.0-1041.41 linux-image-6.8.0-1041-ibm - 6.8.0-1041.41 linux-image-ibm - 6.8.0-1041.41 linux-image-ibm-6.8 - 6.8.0-1041.41 linux-image-ibm-classic - 6.8.0-1041.41 linux-image-ibm-lts-24.04 - 6.8.0-1041.41 linux-image-unsigned-6.8.0-1041-ibm - 6.8.0-1041.41 linux-modules-6.8.0-1041-ibm - 6.8.0-1041.41 linux-modules-extra-6.8.0-1041-ibm - 6.8.0-1041.41 linux-modules-iwlwifi-6.8.0-1041-ibm - 6.8.0-1041.41 linux-modules-iwlwifi-ibm - 6.8.0-1041.41 linux-modules-iwlwifi-ibm-6.8 - 6.8.0-1041.41 linux-modules-iwlwifi-ibm-classic - 6.8.0-1041.41 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1041.41 linux-tools-6.8.0-1041-ibm - 6.8.0-1041.41 linux-tools-ibm - 6.8.0-1041.41 linux-tools-ibm-6.8 - 6.8.0-1041.41 linux-tools-ibm-classic - 6.8.0-1041.41 linux-tools-ibm-lts-24.04 - 6.8.0-1041.41 No subscription required linux-aws-6.8 - 6.8.0-1043.45 linux-aws-64k-6.8 - 6.8.0-1043.45 linux-aws-64k-lts-24.04 - 6.8.0-1043.45 linux-aws-cloud-tools-6.8.0-1043 - 6.8.0-1043.45 linux-aws-headers-6.8.0-1043 - 6.8.0-1043.45 linux-aws-lts-24.04 - 6.8.0-1043.45 linux-aws-tools-6.8.0-1043 - 6.8.0-1043.45 linux-buildinfo-6.8.0-1043-aws - 6.8.0-1043.45 linux-buildinfo-6.8.0-1043-aws-64k - 6.8.0-1043.45 linux-cloud-tools-6.8.0-1043-aws - 6.8.0-1043.45 linux-cloud-tools-6.8.0-1043-aws-64k - 6.8.0-1043.45 linux-headers-6.8.0-1043-aws - 6.8.0-1043.45 linux-headers-6.8.0-1043-aws-64k - 6.8.0-1043.45 linux-headers-aws-6.8 - 6.8.0-1043.45 linux-headers-aws-64k-6.8 - 6.8.0-1043.45 linux-headers-aws-64k-lts-24.04 - 6.8.0-1043.45 linux-headers-aws-lts-24.04 - 6.8.0-1043.45 linux-image-6.8.0-1043-aws - 6.8.0-1043.45 linux-image-6.8.0-1043-aws-64k - 6.8.0-1043.45 linux-image-aws-6.8 - 6.8.0-1043.45 linux-image-aws-64k-6.8 - 6.8.0-1043.45 linux-image-aws-64k-lts-24.04 - 6.8.0-1043.45 linux-image-aws-lts-24.04 - 6.8.0-1043.45 linux-image-uc-6.8.0-1043-aws - 6.8.0-1043.45 linux-image-uc-6.8.0-1043-aws-64k - 6.8.0-1043.45 linux-image-uc-aws-6.8 - 6.8.0-1043.45 linux-image-uc-aws-lts-24.04 - 6.8.0-1043.45 linux-image-unsigned-6.8.0-1043-aws - 6.8.0-1043.45 linux-image-unsigned-6.8.0-1043-aws-64k - 6.8.0-1043.45 linux-modules-6.8.0-1043-aws - 6.8.0-1043.45 linux-modules-6.8.0-1043-aws-64k - 6.8.0-1043.45 linux-modules-extra-6.8.0-1043-aws - 6.8.0-1043.45 linux-modules-extra-6.8.0-1043-aws-64k - 6.8.0-1043.45 linux-modules-extra-aws-6.8 - 6.8.0-1043.45 linux-modules-extra-aws-64k-6.8 - 6.8.0-1043.45 linux-modules-extra-aws-64k-lts-24.04 - 6.8.0-1043.45 linux-modules-extra-aws-lts-24.04 - 6.8.0-1043.45 linux-tools-6.8.0-1043-aws - 6.8.0-1043.45 linux-tools-6.8.0-1043-aws-64k - 6.8.0-1043.45 linux-tools-aws-6.8 - 6.8.0-1043.45 linux-tools-aws-64k-6.8 - 6.8.0-1043.45 linux-tools-aws-64k-lts-24.04 - 6.8.0-1043.45 linux-tools-aws-lts-24.04 - 6.8.0-1043.45 No subscription required linux-buildinfo-6.8.0-1043-nvidia - 6.8.0-1043.46 linux-buildinfo-6.8.0-1043-nvidia-64k - 6.8.0-1043.46 linux-cloud-tools-nvidia - 6.8.0-1043.46 linux-cloud-tools-nvidia-6.8 - 6.8.0-1043.46 linux-headers-6.8.0-1043-nvidia - 6.8.0-1043.46 linux-headers-6.8.0-1043-nvidia-64k - 6.8.0-1043.46 linux-headers-nvidia - 6.8.0-1043.46 linux-headers-nvidia-6.8 - 6.8.0-1043.46 linux-headers-nvidia-64k - 6.8.0-1043.46 linux-headers-nvidia-64k-6.8 - 6.8.0-1043.46 linux-image-6.8.0-1043-nvidia - 6.8.0-1043.46 linux-image-6.8.0-1043-nvidia-64k - 6.8.0-1043.46 linux-image-nvidia - 6.8.0-1043.46 linux-image-nvidia-6.8 - 6.8.0-1043.46 linux-image-nvidia-64k - 6.8.0-1043.46 linux-image-nvidia-64k-6.8 - 6.8.0-1043.46 linux-image-uc-6.8.0-1043-nvidia - 6.8.0-1043.46 linux-image-uc-6.8.0-1043-nvidia-64k - 6.8.0-1043.46 linux-image-unsigned-6.8.0-1043-nvidia - 6.8.0-1043.46 linux-image-unsigned-6.8.0-1043-nvidia-64k - 6.8.0-1043.46 linux-modules-6.8.0-1043-nvidia - 6.8.0-1043.46 linux-modules-6.8.0-1043-nvidia-64k - 6.8.0-1043.46 linux-modules-nvidia-fs-6.8.0-1043-nvidia - 6.8.0-1043.46 linux-modules-nvidia-fs-6.8.0-1043-nvidia-64k - 6.8.0-1043.46 linux-modules-nvidia-fs-nvidia - 6.8.0-1043.46 linux-modules-nvidia-fs-nvidia-6.8 - 6.8.0-1043.46 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1043.46 linux-modules-nvidia-fs-nvidia-64k-6.8 - 6.8.0-1043.46 linux-nvidia - 6.8.0-1043.46 linux-nvidia-6.8 - 6.8.0-1043.46 linux-nvidia-64k - 6.8.0-1043.46 linux-nvidia-64k-6.8 - 6.8.0-1043.46 linux-nvidia-headers-6.8.0-1043 - 6.8.0-1043.46 linux-nvidia-tools-6.8.0-1043 - 6.8.0-1043.46 linux-tools-6.8.0-1043-nvidia - 6.8.0-1043.46 linux-tools-6.8.0-1043-nvidia-64k - 6.8.0-1043.46 linux-tools-nvidia - 6.8.0-1043.46 linux-tools-nvidia-6.8 - 6.8.0-1043.46 linux-tools-nvidia-64k - 6.8.0-1043.46 linux-tools-nvidia-64k-6.8 - 6.8.0-1043.46 No subscription required linux-buildinfo-6.8.0-1043-nvidia-lowlatency - 6.8.0-1043.46.1 linux-buildinfo-6.8.0-1043-nvidia-lowlatency-64k - 6.8.0-1043.46.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1043.46.1 linux-cloud-tools-nvidia-lowlatency-6.8 - 6.8.0-1043.46.1 linux-headers-6.8.0-1043-nvidia-lowlatency - 6.8.0-1043.46.1 linux-headers-6.8.0-1043-nvidia-lowlatency-64k - 6.8.0-1043.46.1 linux-headers-nvidia-lowlatency - 6.8.0-1043.46.1 linux-headers-nvidia-lowlatency-6.8 - 6.8.0-1043.46.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1043.46.1 linux-headers-nvidia-lowlatency-64k-6.8 - 6.8.0-1043.46.1 linux-image-6.8.0-1043-nvidia-lowlatency - 6.8.0-1043.46.1 linux-image-6.8.0-1043-nvidia-lowlatency-64k - 6.8.0-1043.46.1 linux-image-nvidia-lowlatency - 6.8.0-1043.46.1 linux-image-nvidia-lowlatency-6.8 - 6.8.0-1043.46.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1043.46.1 linux-image-nvidia-lowlatency-64k-6.8 - 6.8.0-1043.46.1 linux-image-uc-6.8.0-1043-nvidia-lowlatency - 6.8.0-1043.46.1 linux-image-uc-6.8.0-1043-nvidia-lowlatency-64k - 6.8.0-1043.46.1 linux-image-unsigned-6.8.0-1043-nvidia-lowlatency - 6.8.0-1043.46.1 linux-image-unsigned-6.8.0-1043-nvidia-lowlatency-64k - 6.8.0-1043.46.1 linux-modules-6.8.0-1043-nvidia-lowlatency - 6.8.0-1043.46.1 linux-...
ubuntu jammy v1.990
Metadata:
BOSH Agent Version: 2.784.0
Kernel Version: 5.15.0.161.157
USNs:
Title: USN-7852-1 -- libxml2 vulnerability
URL: https://ubuntu.com/security/notices/USN-7852-1
Priorities: medium
Description:
It was discovered that libxslt, used by libxml2, incorrectly handled certain attributes. An attacker could use this issue to cause a crash, resulting in a denial of service, or possibly execute arbitrary code. This update adds a fix to libxml2 to mitigate the libxslt vulnerability. Update Instructions: Run sudo pro fix USN-7852-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libxml2 - 2.9.13+dfsg-1ubuntu0.10 libxml2-dev - 2.9.13+dfsg-1ubuntu0.10 libxml2-doc - 2.9.13+dfsg-1ubuntu0.10 libxml2-utils - 2.9.13+dfsg-1ubuntu0.10 python3-libxml2 - 2.9.13+dfsg-1ubuntu0.10 No subscription required
CVEs:
Title: USN-7862-1 -- Linux kernel vulnerability
URL: https://ubuntu.com/security/notices/USN-7862-1
Priorities: high
Description:
Jean-Claude Graf, Sandro Rüegge, Ali Hajiabadi, and Kaveh Razavi discovered that the Linux kernel contained insufficient branch predictor isolation between a guest and a userspace hypervisor for certain processors. This flaw is known as VMSCAPE. An attacker in a guest VM could possibly use this to expose sensitive information from the host OS. Update Instructions: Run sudo pro fix USN-7862-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-5.15.0-1079-gkeop - 5.15.0-1079.87 linux-cloud-tools-5.15.0-1079-gkeop - 5.15.0-1079.87 linux-gkeop-cloud-tools-5.15.0-1079 - 5.15.0-1079.87 linux-gkeop-headers-5.15.0-1079 - 5.15.0-1079.87 linux-gkeop-tools-5.15.0-1079 - 5.15.0-1079.87 linux-headers-5.15.0-1079-gkeop - 5.15.0-1079.87 linux-image-5.15.0-1079-gkeop - 5.15.0-1079.87 linux-image-unsigned-5.15.0-1079-gkeop - 5.15.0-1079.87 linux-modules-5.15.0-1079-gkeop - 5.15.0-1079.87 linux-modules-extra-5.15.0-1079-gkeop - 5.15.0-1079.87 linux-tools-5.15.0-1079-gkeop - 5.15.0-1079.87 No subscription required linux-buildinfo-5.15.0-1090-ibm - 5.15.0-1090.93 linux-headers-5.15.0-1090-ibm - 5.15.0-1090.93 linux-ibm-cloud-tools-common - 5.15.0-1090.93 linux-ibm-headers-5.15.0-1090 - 5.15.0-1090.93 linux-ibm-source-5.15.0 - 5.15.0-1090.93 linux-ibm-tools-5.15.0-1090 - 5.15.0-1090.93 linux-ibm-tools-common - 5.15.0-1090.93 linux-image-5.15.0-1090-ibm - 5.15.0-1090.93 linux-image-unsigned-5.15.0-1090-ibm - 5.15.0-1090.93 linux-modules-5.15.0-1090-ibm - 5.15.0-1090.93 linux-modules-extra-5.15.0-1090-ibm - 5.15.0-1090.93 linux-tools-5.15.0-1090-ibm - 5.15.0-1090.93 No subscription required linux-buildinfo-5.15.0-1091-nvidia - 5.15.0-1091.92 linux-buildinfo-5.15.0-1091-nvidia-lowlatency - 5.15.0-1091.92 linux-cloud-tools-5.15.0-1091-nvidia - 5.15.0-1091.92 linux-cloud-tools-5.15.0-1091-nvidia-lowlatency - 5.15.0-1091.92 linux-headers-5.15.0-1091-nvidia - 5.15.0-1091.92 linux-headers-5.15.0-1091-nvidia-lowlatency - 5.15.0-1091.92 linux-image-5.15.0-1091-nvidia - 5.15.0-1091.92 linux-image-5.15.0-1091-nvidia-lowlatency - 5.15.0-1091.92 linux-image-unsigned-5.15.0-1091-nvidia - 5.15.0-1091.92 linux-image-unsigned-5.15.0-1091-nvidia-lowlatency - 5.15.0-1091.92 linux-modules-5.15.0-1091-nvidia - 5.15.0-1091.92 linux-modules-5.15.0-1091-nvidia-lowlatency - 5.15.0-1091.92 linux-modules-extra-5.15.0-1091-nvidia - 5.15.0-1091.92 linux-modules-nvidia-fs-5.15.0-1091-nvidia - 5.15.0-1091.92 linux-modules-nvidia-fs-5.15.0-1091-nvidia-lowlatency - 5.15.0-1091.92 linux-nvidia-cloud-tools-5.15.0-1091 - 5.15.0-1091.92 linux-nvidia-cloud-tools-common - 5.15.0-1091.92 linux-nvidia-headers-5.15.0-1091 - 5.15.0-1091.92 linux-nvidia-tools-5.15.0-1091 - 5.15.0-1091.92 linux-nvidia-tools-common - 5.15.0-1091.92 linux-nvidia-tools-host - 5.15.0-1091.92 linux-tools-5.15.0-1091-nvidia - 5.15.0-1091.92 linux-tools-5.15.0-1091-nvidia-lowlatency - 5.15.0-1091.92 No subscription required linux-buildinfo-5.15.0-1091-intel-iotg - 5.15.0-1091.97 linux-cloud-tools-5.15.0-1091-intel-iotg - 5.15.0-1091.97 linux-headers-5.15.0-1091-intel-iotg - 5.15.0-1091.97 linux-image-5.15.0-1091-intel-iotg - 5.15.0-1091.97 linux-image-unsigned-5.15.0-1091-intel-iotg - 5.15.0-1091.97 linux-intel-iotg-cloud-tools-5.15.0-1091 - 5.15.0-1091.97 linux-intel-iotg-cloud-tools-common - 5.15.0-1091.97 linux-intel-iotg-headers-5.15.0-1091 - 5.15.0-1091.97 linux-intel-iotg-tools-5.15.0-1091 - 5.15.0-1091.97 linux-intel-iotg-tools-common - 5.15.0-1091.97 linux-intel-iotg-tools-host - 5.15.0-1091.97 linux-modules-5.15.0-1091-intel-iotg - 5.15.0-1091.97 linux-modules-extra-5.15.0-1091-intel-iotg - 5.15.0-1091.97 linux-modules-iwlwifi-5.15.0-1091-intel-iotg - 5.15.0-1091.97 linux-tools-5.15.0-1091-intel-iotg - 5.15.0-1091.97 No subscription required linux-buildinfo-5.15.0-1092-gke - 5.15.0-1092.98 linux-gke-headers-5.15.0-1092 - 5.15.0-1092.98 linux-gke-tools-5.15.0-1092 - 5.15.0-1092.98 linux-headers-5.15.0-1092-gke - 5.15.0-1092.98 linux-image-5.15.0-1092-gke - 5.15.0-1092.98 linux-image-unsigned-5.15.0-1092-gke - 5.15.0-1092.98 linux-modules-5.15.0-1092-gke - 5.15.0-1092.98 linux-modules-extra-5.15.0-1092-gke - 5.15.0-1092.98 linux-tools-5.15.0-1092-gke - 5.15.0-1092.98 No subscription required linux-buildinfo-5.15.0-1093-oracle - 5.15.0-1093.99 linux-headers-5.15.0-1093-oracle - 5.15.0-1093.99 linux-image-5.15.0-1093-oracle - 5.15.0-1093.99 linux-image-unsigned-5.15.0-1093-oracle - 5.15.0-1093.99 linux-modules-5.15.0-1093-oracle - 5.15.0-1093.99 linux-modules-extra-5.15.0-1093-oracle - 5.15.0-1093.99 linux-oracle-headers-5.15.0-1093 - 5.15.0-1093.99 linux-oracle-tools-5.15.0-1093 - 5.15.0-1093.99 linux-tools-5.15.0-1093-oracle - 5.15.0-1093.99 No subscription required linux-aws-cloud-tools-5.15.0-1096 - 5.15.0-1096.103 linux-aws-headers-5.15.0-1096 - 5.15.0-1096.103 linux-aws-tools-5.15.0-1096 - 5.15.0-1096.103 linux-buildinfo-5.15.0-1096-aws - 5.15.0-1096.103 linux-buildinfo-5.15.0-1096-aws-64k - 5.15.0-1096.103 linux-cloud-tools-5.15.0-1096-aws - 5.15.0-1096.103 linux-cloud-tools-5.15.0-1096-aws-64k - 5.15.0-1096.103 linux-headers-5.15.0-1096-aws - 5.15.0-1096.103 linux-headers-5.15.0-1096-aws-64k - 5.15.0-1096.103 linux-image-5.15.0-1096-aws - 5.15.0-1096.103 linux-image-5.15.0-1096-aws-64k - 5.15.0-1096.103 linux-image-unsigned-5.15.0-1096-aws - 5.15.0-1096.103 linux-image-unsigned-5.15.0-1096-aws-64k - 5.15.0-1096.103 linux-modules-5.15.0-1096-aws - 5.15.0-1096.103 linux-modules-5.15.0-1096-aws-64k - 5.15.0-1096.103 linux-modules-extra-5.15.0-1096-aws - 5.15.0-1096.103 linux-modules-extra-5.15.0-1096-aws-64k - 5.15.0-1096.103 linux-tools-5.15.0-1096-aws - 5.15.0-1096.103 linux-tools-5.15.0-1096-aws-64k - 5.15.0-1096.103 No subscription required linux-buildinfo-5.15.0-1096-gcp - 5.15.0-1096.105 linux-gcp-headers-5.15.0-1096 - 5.15.0-1096.105 linux-gcp-tools-5.15.0-1096 - 5.15.0-1096.105 linux-headers-5.15.0-1096-gcp - 5.15.0-1096.105 linux-image-5.15.0-1096-gcp - 5.15.0-1096.105 linux-image-unsigned-5.15.0-1096-gcp - 5.15.0-1096.105 linux-modules-5.15.0-1096-gcp - 5.15.0-1096.105 linux-modules-extra-5.15.0-1096-gcp - 5.15.0-1096.105 linux-tools-5.15.0-1096-gcp - 5.15.0-1096.105 No subscription required linux-buildinfo-5.15.0-161-generic - 5.15.0-161.171 linux-buildinfo-5.15.0-161-generic-64k - 5.15.0-161.171 linux-buildinfo-5.15.0-161-generic-lpae - 5.15.0-161.171 linux-buildinfo-5.15.0-161-lowlatency - 5.15.0-161.171 linux-buildinfo-5.15.0-161-lowlatency-64k - 5.15.0-161.171 linux-cloud-tools-5.15.0-161 - 5.15.0-161.171 linux-cloud-tools-5.15.0-161-generic - 5.15.0-161.171 linux-cloud-tools-5.15.0-161-lowlatency - 5.15.0-161.171 linux-cloud-tools-common - 5.15.0-161.171 linux-doc - 5.15.0-161.171 linux-headers-5.15.0-161 - 5.15.0-161.171 linux-headers-5.15.0-161-generic - 5.15.0-161.171 linux-headers-5.15.0-161-generic-64k - 5.15.0-161.171 linux-headers-5.15.0-161-generic-lpae - 5.15.0-161.171 linux-headers-5.15.0-161-lowlatency - 5.15.0-161.171 linux-headers-5.15.0-161-lowlatency-64k - 5.15.0-161.171 linux-image-5.15.0-161-generic - 5.15.0-161.171 linux-image-5.15.0-161-generic-64k - 5.15.0-161.171 linux-image-5.15.0-161-generic-lpae - 5.15.0-161.171 linux-image-5.15.0-161-lowlatency - 5.15.0-161.171 linux-image-5.15.0-161-lowlatency-64k - 5.15.0-161.171 linux-image-unsigned-5.15.0-161-generic - 5.15.0-161.171 linux-image-unsigned-5.15.0-161-generic-64k - 5.15.0-161.171 linux-image-unsigned-5.15.0-161-lowlatency - 5.15.0-161.171 linux-image-unsigned-5.15.0-161-lowlatency-64k - 5.15.0-161.171 linux-libc-dev - 5.15.0-161.171 linux-lowlatency-cloud-tools-5.15.0-161 - 5.15.0-161.171 linux-lowlatency-headers-5.15.0-161 - 5.15.0-161.171 linux-lowlatency-tools-5.15.0-161 - 5.15.0-161.171 linux-modules-5.15.0-161-generic - 5.15.0-161.171 linux-modules-5.15.0-161-generic-64k - 5.15.0-161.171 linux-modules-5.15.0-161-generic-lpae - 5.15.0-161.171 linux-modules-5.15.0-161-lowlatency - 5.15.0-161.171 linux-modules-5.15.0-161-lowlatency-64k - 5.15.0-161.171 linux-modules-extra-5.15.0-161-generic - 5.15.0-161.171 linux-modules-iwlwifi-5.15.0-161-generic - 5.15.0-161.171 linux-modules-iwlwifi-5.15.0-161-lowlatency - 5.15.0-161.171 linux-source-5.15.0 - 5.15.0-161.171 linux-tools-5.15.0-161 - 5.15.0-161.171 linux-tools-5.15.0-161-generic - 5.15.0-161.171 linux-tools-5.15.0-161-generic-64k - 5.15.0-161.171 linux-tools-5.15.0-161-generic-lpae - 5.15.0-161.171 linux-tools-5.15.0-161-lowlatency - 5.15.0-161.171 linux-tools-5.15.0-161-lowlatency-64k - 5.15.0-161.171 linux-tools-common - 5.15.0-161.171 linux-tools-host - 5.15.0-161.171 No subscription required linux-cloud-tools-gkeop - 5.15.0.1079.78 linux-cloud-tools-gkeop-5.15 - 5.15.0.1079.78 linux-gkeop - 5.15.0.1079.78 linux-gkeop-5.15 - 5.15.0.1079.78 linux-headers-gkeop - 5.15.0.1079.78 linux-headers-gkeop-5.15 - 5.15.0.1079.78 linux-image-gkeop - 5.15.0.1079.78 linux-...
ubuntu noble v1.134
Full Changelog: ubuntu-noble/v1.126...ubuntu-noble/v1.134
Metadata:
BOSH Agent Version: 2.778.0
Kernel Version: 6.8.0-85.85
USNs:
Title: USN-7852-1 -- libxml2 vulnerability
URL: https://ubuntu.com/security/notices/USN-7852-1
Priorities: medium
Description:
It was discovered that libxslt, used by libxml2, incorrectly handled certain attributes. An attacker could use this issue to cause a crash, resulting in a denial of service, or possibly execute arbitrary code. This update adds a fix to libxml2 to mitigate the libxslt vulnerability. Update Instructions: Run sudo pro fix USN-7852-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libxml2 - 2.9.14+dfsg-1.3ubuntu3.6 libxml2-dev - 2.9.14+dfsg-1.3ubuntu3.6 libxml2-doc - 2.9.14+dfsg-1.3ubuntu3.6 libxml2-utils - 2.9.14+dfsg-1.3ubuntu3.6 python3-libxml2 - 2.9.14+dfsg-1.3ubuntu3.6 No subscription required
CVEs:
Title: USN-7861-1 -- Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7861-1
Priorities: high,medium
Description:
Jean-Claude Graf, Sandro Rüegge, Ali Hajiabadi, and Kaveh Razavi discovered that the Linux kernel contained insufficient branch predictor isolation between a guest and a userspace hypervisor for certain processors. This flaw is known as VMSCAPE. An attacker in a guest VM could possibly use this to expose sensitive information from the host OS. Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - HSI subsystem; - Bluetooth subsystem; - Timer subsystem; (CVE-2025-37838, CVE-2025-38118, CVE-2025-38352) Update Instructions: Run sudo pro fix USN-7861-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1026-gkeop - 6.8.0-1026.29 linux-cloud-tools-6.8.0-1026-gkeop - 6.8.0-1026.29 linux-cloud-tools-gkeop - 6.8.0-1026.29 linux-cloud-tools-gkeop-6.8 - 6.8.0-1026.29 linux-gkeop - 6.8.0-1026.29 linux-gkeop-6.8 - 6.8.0-1026.29 linux-gkeop-cloud-tools-6.8.0-1026 - 6.8.0-1026.29 linux-gkeop-headers-6.8.0-1026 - 6.8.0-1026.29 linux-gkeop-tools-6.8.0-1026 - 6.8.0-1026.29 linux-headers-6.8.0-1026-gkeop - 6.8.0-1026.29 linux-headers-gkeop - 6.8.0-1026.29 linux-headers-gkeop-6.8 - 6.8.0-1026.29 linux-image-6.8.0-1026-gkeop - 6.8.0-1026.29 linux-image-gkeop - 6.8.0-1026.29 linux-image-gkeop-6.8 - 6.8.0-1026.29 linux-image-unsigned-6.8.0-1026-gkeop - 6.8.0-1026.29 linux-modules-6.8.0-1026-gkeop - 6.8.0-1026.29 linux-modules-extra-6.8.0-1026-gkeop - 6.8.0-1026.29 linux-modules-extra-gkeop - 6.8.0-1026.29 linux-modules-extra-gkeop-6.8 - 6.8.0-1026.29 linux-tools-6.8.0-1026-gkeop - 6.8.0-1026.29 linux-tools-gkeop - 6.8.0-1026.29 linux-tools-gkeop-6.8 - 6.8.0-1026.29 No subscription required linux-buildinfo-6.8.0-1040-ibm - 6.8.0-1040.40 linux-headers-6.8.0-1040-ibm - 6.8.0-1040.40 linux-headers-ibm - 6.8.0-1040.40 linux-headers-ibm-6.8 - 6.8.0-1040.40 linux-headers-ibm-classic - 6.8.0-1040.40 linux-headers-ibm-lts-24.04 - 6.8.0-1040.40 linux-ibm - 6.8.0-1040.40 linux-ibm-6.8 - 6.8.0-1040.40 linux-ibm-classic - 6.8.0-1040.40 linux-ibm-headers-6.8.0-1040 - 6.8.0-1040.40 linux-ibm-lts-24.04 - 6.8.0-1040.40 linux-ibm-tools-6.8.0-1040 - 6.8.0-1040.40 linux-image-6.8.0-1040-ibm - 6.8.0-1040.40 linux-image-ibm - 6.8.0-1040.40 linux-image-ibm-6.8 - 6.8.0-1040.40 linux-image-ibm-classic - 6.8.0-1040.40 linux-image-ibm-lts-24.04 - 6.8.0-1040.40 linux-image-unsigned-6.8.0-1040-ibm - 6.8.0-1040.40 linux-modules-6.8.0-1040-ibm - 6.8.0-1040.40 linux-modules-extra-6.8.0-1040-ibm - 6.8.0-1040.40 linux-modules-iwlwifi-6.8.0-1040-ibm - 6.8.0-1040.40 linux-modules-iwlwifi-ibm - 6.8.0-1040.40 linux-modules-iwlwifi-ibm-6.8 - 6.8.0-1040.40 linux-modules-iwlwifi-ibm-classic - 6.8.0-1040.40 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1040.40 linux-tools-6.8.0-1040-ibm - 6.8.0-1040.40 linux-tools-ibm - 6.8.0-1040.40 linux-tools-ibm-6.8 - 6.8.0-1040.40 linux-tools-ibm-classic - 6.8.0-1040.40 linux-tools-ibm-lts-24.04 - 6.8.0-1040.40 No subscription required linux-aws-6.8 - 6.8.0-1042.44 linux-aws-64k-6.8 - 6.8.0-1042.44 linux-aws-64k-lts-24.04 - 6.8.0-1042.44 linux-aws-cloud-tools-6.8.0-1042 - 6.8.0-1042.44 linux-aws-headers-6.8.0-1042 - 6.8.0-1042.44 linux-aws-lts-24.04 - 6.8.0-1042.44 linux-aws-tools-6.8.0-1042 - 6.8.0-1042.44 linux-buildinfo-6.8.0-1042-aws - 6.8.0-1042.44 linux-buildinfo-6.8.0-1042-aws-64k - 6.8.0-1042.44 linux-cloud-tools-6.8.0-1042-aws - 6.8.0-1042.44 linux-cloud-tools-6.8.0-1042-aws-64k - 6.8.0-1042.44 linux-headers-6.8.0-1042-aws - 6.8.0-1042.44 linux-headers-6.8.0-1042-aws-64k - 6.8.0-1042.44 linux-headers-aws-6.8 - 6.8.0-1042.44 linux-headers-aws-64k-6.8 - 6.8.0-1042.44 linux-headers-aws-64k-lts-24.04 - 6.8.0-1042.44 linux-headers-aws-lts-24.04 - 6.8.0-1042.44 linux-image-6.8.0-1042-aws - 6.8.0-1042.44 linux-image-6.8.0-1042-aws-64k - 6.8.0-1042.44 linux-image-aws-6.8 - 6.8.0-1042.44 linux-image-aws-64k-6.8 - 6.8.0-1042.44 linux-image-aws-64k-lts-24.04 - 6.8.0-1042.44 linux-image-aws-lts-24.04 - 6.8.0-1042.44 linux-image-uc-6.8.0-1042-aws - 6.8.0-1042.44 linux-image-uc-6.8.0-1042-aws-64k - 6.8.0-1042.44 linux-image-uc-aws-6.8 - 6.8.0-1042.44 linux-image-uc-aws-lts-24.04 - 6.8.0-1042.44 linux-image-unsigned-6.8.0-1042-aws - 6.8.0-1042.44 linux-image-unsigned-6.8.0-1042-aws-64k - 6.8.0-1042.44 linux-modules-6.8.0-1042-aws - 6.8.0-1042.44 linux-modules-6.8.0-1042-aws-64k - 6.8.0-1042.44 linux-modules-extra-6.8.0-1042-aws - 6.8.0-1042.44 linux-modules-extra-6.8.0-1042-aws-64k - 6.8.0-1042.44 linux-modules-extra-aws-6.8 - 6.8.0-1042.44 linux-modules-extra-aws-64k-6.8 - 6.8.0-1042.44 linux-modules-extra-aws-64k-lts-24.04 - 6.8.0-1042.44 linux-modules-extra-aws-lts-24.04 - 6.8.0-1042.44 linux-tools-6.8.0-1042-aws - 6.8.0-1042.44 linux-tools-6.8.0-1042-aws-64k - 6.8.0-1042.44 linux-tools-aws-6.8 - 6.8.0-1042.44 linux-tools-aws-64k-6.8 - 6.8.0-1042.44 linux-tools-aws-64k-lts-24.04 - 6.8.0-1042.44 linux-tools-aws-lts-24.04 - 6.8.0-1042.44 No subscription required linux-buildinfo-6.8.0-1042-nvidia - 6.8.0-1042.45 linux-buildinfo-6.8.0-1042-nvidia-64k - 6.8.0-1042.45 linux-cloud-tools-nvidia - 6.8.0-1042.45 linux-cloud-tools-nvidia-6.8 - 6.8.0-1042.45 linux-headers-6.8.0-1042-nvidia - 6.8.0-1042.45 linux-headers-6.8.0-1042-nvidia-64k - 6.8.0-1042.45 linux-headers-nvidia - 6.8.0-1042.45 linux-headers-nvidia-6.8 - 6.8.0-1042.45 linux-headers-nvidia-64k - 6.8.0-1042.45 linux-headers-nvidia-64k-6.8 - 6.8.0-1042.45 linux-image-nvidia - 6.8.0-1042.45 linux-image-nvidia-6.8 - 6.8.0-1042.45 linux-image-nvidia-64k - 6.8.0-1042.45 linux-image-nvidia-64k-6.8 - 6.8.0-1042.45 linux-image-unsigned-6.8.0-1042-nvidia - 6.8.0-1042.45 linux-image-unsigned-6.8.0-1042-nvidia-64k - 6.8.0-1042.45 linux-modules-6.8.0-1042-nvidia - 6.8.0-1042.45 linux-modules-6.8.0-1042-nvidia-64k - 6.8.0-1042.45 linux-modules-nvidia-fs-6.8.0-1042-nvidia - 6.8.0-1042.45 linux-modules-nvidia-fs-6.8.0-1042-nvidia-64k - 6.8.0-1042.45 linux-modules-nvidia-fs-nvidia - 6.8.0-1042.45 linux-modules-nvidia-fs-nvidia-6.8 - 6.8.0-1042.45 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1042.45 linux-modules-nvidia-fs-nvidia-64k-6.8 - 6.8.0-1042.45 linux-nvidia - 6.8.0-1042.45 linux-nvidia-6.8 - 6.8.0-1042.45 linux-nvidia-64k - 6.8.0-1042.45 linux-nvidia-64k-6.8 - 6.8.0-1042.45 linux-nvidia-headers-6.8.0-1042 - 6.8.0-1042.45 linux-nvidia-tools-6.8.0-1042 - 6.8.0-1042.45 linux-tools-6.8.0-1042-nvidia - 6.8.0-1042.45 linux-tools-6.8.0-1042-nvidia-64k - 6.8.0-1042.45 linux-tools-nvidia - 6.8.0-1042.45 linux-tools-nvidia-6.8 - 6.8.0-1042.45 linux-tools-nvidia-64k - 6.8.0-1042.45 linux-tools-nvidia-64k-6.8 - 6.8.0-1042.45 No subscription required linux-image-6.8.0-1042-nvidia - 6.8.0-1042.45+1 linux-image-6.8.0-1042-nvidia-64k - 6.8.0-1042.45+1 linux-image-uc-6.8.0-1042-nvidia - 6.8.0-1042.45+1 linux-image-uc-6.8.0-1042-nvidia-64k - 6.8.0-1042.45+1 No subscription required linux-buildinfo-6.8.0-1042-nvidia-lowlatency - 6.8.0-1042.45.1 linux-buildinfo-6.8.0-1042-nvidia-lowlatency-64k - 6.8.0-1042.45.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1042.45.1 linux-cloud-tools-nvidia-lowlatency-6.8 - 6.8.0-1042.45.1 linux-headers-6.8.0-1042-nvidia-lowlatency - 6.8.0-1042.45.1 linux-headers-6.8.0-1042-nvidia-lowlatency-64k - 6.8.0-1042.45.1 linux-headers-nvidia-lowlatency - 6.8.0-1042.45.1 linux-headers-nvidia-lowlatency-6.8 - 6.8.0-1042.45.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1042.45.1 linux-headers-nvidia-lowlatency-64k-6.8 - 6.8.0-1042.45.1 linux-image-6.8.0-1042-nvidia-lowlatency - 6.8.0-1042.45.1 linux-image-6.8.0-1042-nvidia-lowlatency-64k - 6.8.0-1042.45.1 linux-image-nvidia-lowlatency - 6.8.0-1042.45.1 linux-image-nvidia-lowlatency-6.8 - 6.8.0-1042.45.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1042.45.1 linux-image-nvidia-lowlatency-64k-6.8 - 6.8.0-1042.45.1 linux-image-uc-6.8.0-1042-nvidia-lowlatency - 6.8.0-1042.45.1 linux-image-uc-6.8.0-1042-nvidia-lowlatency-64k - 6.8.0-1042.45.1 linux-image-unsigned-6.8.0-1042-nvidia-lowlatency - 6.8.0-1042.45.1 linux-image-unsigned-6.8.0-1042-nvidia-lowlatency-64k - 6.8.0-1042.45.1 linux-modules-6.8.0-1042-nvidia-lowlatency - 6.8.0-1042.45.1 linux-modules-6.8.0-1042-nvidia-lowlatency-64k - 6.8.0-1042.45.1 linux-modules-extra-6.8.0-1042-nvidia-lowlatency - 6.8.0-1042.45.1 linux-modules-nvidia-fs-6.8.0-1042-nvidia-lowlatency - 6.8.0-1042.45.1 linux-modules-nvidia-fs-6.8.0-1042-nvidia-lowlatency-64k - 6.8.0-1042.45.1 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1042.45.1 linux-modules-nvidia-fs-nvidia-lowlatency-6.8 - 6.8.0-1042.45.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1042.45.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k-6.8 - 6.8.0-1042.45.1 linux-nvidia-lowlatency - 6.8.0-104...
ubuntu noble v1.126
Metadata:
BOSH Agent Version: 2.775.0
Kernel Version: 6.8.0-85.85
Full Changelog: ubuntu-noble/v1.103...ubuntu-noble/v1.126
USNs:
Title: USN-7835-1 -- Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7835-1
Priorities: high,medium
Description:
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - PowerPC architecture; - x86 architecture; - ACPI drivers; - Ublk userspace block driver; - Clock framework and drivers; - GPU drivers; - IIO subsystem; - InfiniBand drivers; - Media drivers; - MemoryStick subsystem; - Network drivers; - NTB driver; - PCI subsystem; - Remote Processor subsystem; - Thermal drivers; - Virtio Host (VHOST) subsystem; - 9P distributed file system; - File systems infrastructure; - JFS file system; - Network file system (NFS) server daemon; - NTFS3 file system; - SMB network file system; - Memory management; - RDMA verbs API; - Kernel fork() syscall; - Tracing infrastructure; - Watch queue notification mechanism; - Asynchronous Transfer Mode (ATM) subsystem; - Networking core; - IPv4 networking; - IPv6 networking; - Netfilter; - Network traffic control; - SCTP protocol; - TLS protocol; - SoC Audio for Freescale CPUs drivers; (CVE-2025-39728, CVE-2025-23136, CVE-2025-22062, CVE-2025-22035, CVE-2025-22020, CVE-2025-22083, CVE-2025-22071, CVE-2025-22060, CVE-2025-22073, CVE-2025-22044, CVE-2025-22063, CVE-2025-22079, CVE-2025-22057, CVE-2025-22095, CVE-2025-39735, CVE-2025-39682, CVE-2025-22058, CVE-2025-22021, CVE-2025-22018, CVE-2025-22056, CVE-2025-22054, CVE-2025-22080, CVE-2025-22039, CVE-2025-22019, CVE-2025-22038, CVE-2025-22028, CVE-2023-53034, CVE-2024-58092, CVE-2025-38637, CVE-2025-22089, CVE-2025-40114, CVE-2025-22068, CVE-2025-37937, CVE-2025-22070, CVE-2025-22072, CVE-2025-22086, CVE-2025-22050, CVE-2025-22040, CVE-2025-22065, CVE-2025-38575, CVE-2025-22064, CVE-2025-22033, CVE-2025-22041, CVE-2025-22090, CVE-2025-22036, CVE-2025-23138, CVE-2025-22047, CVE-2025-38240, CVE-2025-22066, CVE-2025-22042, CVE-2025-38152, CVE-2025-22055, CVE-2025-22081, CVE-2025-22045, CVE-2025-22053, CVE-2025-22075, CVE-2025-22027, CVE-2025-22025, CVE-2025-22097) Update Instructions: Run sudo pro fix USN-7835-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1025-gkeop - 6.8.0-1025.28 linux-cloud-tools-6.8.0-1025-gkeop - 6.8.0-1025.28 linux-cloud-tools-gkeop - 6.8.0-1025.28 linux-cloud-tools-gkeop-6.8 - 6.8.0-1025.28 linux-gkeop - 6.8.0-1025.28 linux-gkeop-6.8 - 6.8.0-1025.28 linux-gkeop-cloud-tools-6.8.0-1025 - 6.8.0-1025.28 linux-gkeop-headers-6.8.0-1025 - 6.8.0-1025.28 linux-gkeop-tools-6.8.0-1025 - 6.8.0-1025.28 linux-headers-6.8.0-1025-gkeop - 6.8.0-1025.28 linux-headers-gkeop - 6.8.0-1025.28 linux-headers-gkeop-6.8 - 6.8.0-1025.28 linux-image-6.8.0-1025-gkeop - 6.8.0-1025.28 linux-image-gkeop - 6.8.0-1025.28 linux-image-gkeop-6.8 - 6.8.0-1025.28 linux-image-unsigned-6.8.0-1025-gkeop - 6.8.0-1025.28 linux-modules-6.8.0-1025-gkeop - 6.8.0-1025.28 linux-modules-extra-6.8.0-1025-gkeop - 6.8.0-1025.28 linux-modules-extra-gkeop - 6.8.0-1025.28 linux-modules-extra-gkeop-6.8 - 6.8.0-1025.28 linux-tools-6.8.0-1025-gkeop - 6.8.0-1025.28 linux-tools-gkeop - 6.8.0-1025.28 linux-tools-gkeop-6.8 - 6.8.0-1025.28 No subscription required linux-buildinfo-6.8.0-1038-oracle - 6.8.0-1038.39 linux-buildinfo-6.8.0-1038-oracle-64k - 6.8.0-1038.39 linux-headers-6.8.0-1038-oracle - 6.8.0-1038.39 linux-headers-6.8.0-1038-oracle-64k - 6.8.0-1038.39 linux-headers-oracle-6.8 - 6.8.0-1038.39 linux-headers-oracle-64k-6.8 - 6.8.0-1038.39 linux-headers-oracle-64k-lts-24.04 - 6.8.0-1038.39 linux-headers-oracle-lts-24.04 - 6.8.0-1038.39 linux-image-6.8.0-1038-oracle - 6.8.0-1038.39 linux-image-6.8.0-1038-oracle-64k - 6.8.0-1038.39 linux-image-oracle-6.8 - 6.8.0-1038.39 linux-image-oracle-64k-6.8 - 6.8.0-1038.39 linux-image-oracle-64k-lts-24.04 - 6.8.0-1038.39 linux-image-oracle-lts-24.04 - 6.8.0-1038.39 linux-image-unsigned-6.8.0-1038-oracle - 6.8.0-1038.39 linux-image-unsigned-6.8.0-1038-oracle-64k - 6.8.0-1038.39 linux-modules-6.8.0-1038-oracle - 6.8.0-1038.39 linux-modules-6.8.0-1038-oracle-64k - 6.8.0-1038.39 linux-modules-extra-6.8.0-1038-oracle - 6.8.0-1038.39 linux-modules-extra-6.8.0-1038-oracle-64k - 6.8.0-1038.39 linux-oracle-6.8 - 6.8.0-1038.39 linux-oracle-64k-6.8 - 6.8.0-1038.39 linux-oracle-64k-lts-24.04 - 6.8.0-1038.39 linux-oracle-headers-6.8.0-1038 - 6.8.0-1038.39 linux-oracle-lts-24.04 - 6.8.0-1038.39 linux-oracle-tools-6.8.0-1038 - 6.8.0-1038.39 linux-tools-6.8.0-1038-oracle - 6.8.0-1038.39 linux-tools-6.8.0-1038-oracle-64k - 6.8.0-1038.39 linux-tools-oracle-6.8 - 6.8.0-1038.39 linux-tools-oracle-64k-6.8 - 6.8.0-1038.39 linux-tools-oracle-64k-lts-24.04 - 6.8.0-1038.39 linux-tools-oracle-lts-24.04 - 6.8.0-1038.39 No subscription required linux-buildinfo-6.8.0-1039-ibm - 6.8.0-1039.39 linux-headers-6.8.0-1039-ibm - 6.8.0-1039.39 linux-headers-ibm - 6.8.0-1039.39 linux-headers-ibm-6.8 - 6.8.0-1039.39 linux-headers-ibm-classic - 6.8.0-1039.39 linux-headers-ibm-lts-24.04 - 6.8.0-1039.39 linux-ibm - 6.8.0-1039.39 linux-ibm-6.8 - 6.8.0-1039.39 linux-ibm-classic - 6.8.0-1039.39 linux-ibm-headers-6.8.0-1039 - 6.8.0-1039.39 linux-ibm-lts-24.04 - 6.8.0-1039.39 linux-ibm-tools-6.8.0-1039 - 6.8.0-1039.39 linux-image-6.8.0-1039-ibm - 6.8.0-1039.39 linux-image-ibm - 6.8.0-1039.39 linux-image-ibm-6.8 - 6.8.0-1039.39 linux-image-ibm-classic - 6.8.0-1039.39 linux-image-ibm-lts-24.04 - 6.8.0-1039.39 linux-image-unsigned-6.8.0-1039-ibm - 6.8.0-1039.39 linux-modules-6.8.0-1039-ibm - 6.8.0-1039.39 linux-modules-extra-6.8.0-1039-ibm - 6.8.0-1039.39 linux-modules-iwlwifi-6.8.0-1039-ibm - 6.8.0-1039.39 linux-modules-iwlwifi-ibm - 6.8.0-1039.39 linux-modules-iwlwifi-ibm-6.8 - 6.8.0-1039.39 linux-modules-iwlwifi-ibm-classic - 6.8.0-1039.39 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1039.39 linux-tools-6.8.0-1039-ibm - 6.8.0-1039.39 linux-tools-ibm - 6.8.0-1039.39 linux-tools-ibm-6.8 - 6.8.0-1039.39 linux-tools-ibm-classic - 6.8.0-1039.39 linux-tools-ibm-lts-24.04 - 6.8.0-1039.39 No subscription required linux-aws-6.8 - 6.8.0-1041.43 linux-aws-64k-6.8 - 6.8.0-1041.43 linux-aws-64k-lts-24.04 - 6.8.0-1041.43 linux-aws-cloud-tools-6.8.0-1041 - 6.8.0-1041.43 linux-aws-headers-6.8.0-1041 - 6.8.0-1041.43 linux-aws-lts-24.04 - 6.8.0-1041.43 linux-aws-tools-6.8.0-1041 - 6.8.0-1041.43 linux-buildinfo-6.8.0-1041-aws - 6.8.0-1041.43 linux-buildinfo-6.8.0-1041-aws-64k - 6.8.0-1041.43 linux-cloud-tools-6.8.0-1041-aws - 6.8.0-1041.43 linux-cloud-tools-6.8.0-1041-aws-64k - 6.8.0-1041.43 linux-headers-6.8.0-1041-aws - 6.8.0-1041.43 linux-headers-6.8.0-1041-aws-64k - 6.8.0-1041.43 linux-headers-aws-6.8 - 6.8.0-1041.43 linux-headers-aws-64k-6.8 - 6.8.0-1041.43 linux-headers-aws-64k-lts-24.04 - 6.8.0-1041.43 linux-headers-aws-lts-24.04 - 6.8.0-1041.43 linux-image-6.8.0-1041-aws - 6.8.0-1041.43 linux-image-6.8.0-1041-aws-64k - 6.8.0-1041.43 linux-image-aws-6.8 - 6.8.0-1041.43 linux-image-aws-64k-6.8 - 6.8.0-1041.43 linux-image-aws-64k-lts-24.04 - 6.8.0-1041.43 linux-image-aws-lts-24.04 - 6.8.0-1041.43 linux-image-uc-6.8.0-1041-aws - 6.8.0-1041.43 linux-image-uc-6.8.0-1041-aws-64k - 6.8.0-1041.43 linux-image-uc-aws-6.8 - 6.8.0-1041.43 linux-image-uc-aws-lts-24.04 - 6.8.0-1041.43 linux-image-unsigned-6.8.0-1041-aws - 6.8.0-1041.43 linux-image-unsigned-6.8.0-1041-aws-64k - 6.8.0-1041.43 linux-modules-6.8.0-1041-aws - 6.8.0-1041.43 linux-modules-6.8.0-1041-aws-64k - 6.8.0-1041.43 linux-modules-extra-6.8.0-1041-aws - 6.8.0-1041.43 linux-modules-extra-6.8.0-1041-aws-64k - 6.8.0-1041.43 linux-modules-extra-aws-6.8 - 6.8.0-1041.43 linux-modules-extra-aws-64k-6.8 - 6.8.0-1041.43 linux-modules-extra-aws-64k-lts-24.04 - 6.8.0-1041.43 linux-modules-extra-aws-lts-24.04 - 6.8.0-1041.43 linux-tools-6.8.0-1041-aws - 6.8.0-1041.43 linux-tools-6.8.0-1041-aws-64k - 6.8.0-1041.43 linux-tools-aws-6.8 - 6.8.0-1041.43 linux-tools-aws-64k-6.8 - 6.8.0-1041.43 linux-tools-aws-64k-lts-24.04 - 6.8.0-1041.43 linux-tools-aws-lts-24.04 - 6.8.0-1041.43 No subscription required linux-azure-cloud-tools-6.8.0-1041 - 6.8.0-1041.47 linux-azure-headers-6.8.0-1041 - 6.8.0-1041.47 linux-azure-tools-6.8.0-1041 - 6.8.0-1041.47 linux-buildinfo-6.8.0-1041-azure - 6.8.0-1041.47 linux-cloud-tools-6.8.0-1041-azure - 6.8.0-1041.47 linux-headers-6.8.0-1041-azure - 6.8.0-1041.47 linux-image-unsigned-6.8.0-1041-azure - 6.8.0-1041.47 linux-modules-6.8.0-1041-azure - 6.8.0-1041.47 linux-modules-extra-6.8.0-1041-azure - 6.8.0-1041.47 linux-modules-involflt-6.8.0-1041-azure - 6.8.0-1041.47 linux-modules-iwlwifi-6.8.0-1041-azure - 6.8.0-1041.47 linux-tools-6.8.0-1041-azure - 6.8.0-1041.47 No subscription required linux-azure-6.8 - 6.8.0-1041.47+1 linux-azure-lts-24.04 - 6.8.0-1041.47+1 linux-cloud-tools-azure-6.8 - 6.8.0-1041.47+1 linux-cloud-tools-azure-lts-24.04 - 6.8.0-1041.47+1 linux-headers-azure-6.8 - 6.8.0-1041.47+1 linux-headers-azure-lts-24.04 - 6.8.0-1041.47+1 linux-image-6.8.0-1041-azure - 6.8.0-1041.47+1 linux-image-azure-6.8 - 6.8.0-1041.47+1 linux-image-azure-lts-24.04 - 6.8.0-1041.47+1 linux-image-uc-azure-6.8 - 6.8.0-1041.47+1 linux-image-uc-azure-lts-24.04 - 6.8.0-1041.47+1 linux-modules-extra-azure-6.8 - 6.8.0-1041.47+1 linux-modules-extra-azure-lts-24.04 - 6.8.0-1041.47+1 linux-modules-involflt-azure-6.8 - 6.8.0-1041.47+1 linux-modules-involflt-azure-lts-24.04 - 6.8.0-1041.47+1 linux-modules-iwlwifi-azure-6.8 - 6.8.0-1041.47+1 linux-modules-iwlwifi-azure-lts-24.04 - 6.8.0-1041.47+1 linux-tools-azure-6.8 - 6.8.0-1041.47+1 linux-tools-azure-lts-24.04 - 6.8.0-1041.47+1 No subscription required linux-buildinfo-6.8.0-1042-gcp - 6.8.0-1042.45 linux-buildinfo-6.8.0-1042-gcp-64k - 6.8.0-1042.45 linux-gcp-6.8 - 6.8.0-1042.45...
ubuntu jammy v1.954
Metadata:
BOSH Agent Version: 2.775.0
Kernel Version: 5.15.0.161.157
What's Changed
Full Changelog: ubuntu-jammy/v1.943...ubuntu-jammy/v1.954
USNs:
Title: USN-7847-1 -- GNU binutils vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7847-1
Priorities: medium
Description:
It was discovered that GNU binutils incorrectly handled certain files. An attacker could possibly use this issue to cause a crash or execute arbitrary code. The attack is restricted to local execution. (CVE-2025-11082) It was discovered that GNU binutils incorrectly handled certain inputs. An attacker could possibly use this issue to cause a crash or execute arbitrary code. (CVE-2025-11083, CVE-2025-5244, CVE-2025-5245, CVE-2025-7554) It was discovered that GNU binutils incorrectly handled certain files. An attacker could possibly use this issue to cause crash, execute arbitrary code or expose sensitive information. (CVE-2025-1147) It was discovered that GNU binutils incorrectly handled certain inputs. An attacker could possibly use this issue to cause a denial of service. (CVE-2025-1148, CVE-2025-3198, CVE-2025-8225 It was discovered that GNU binutils incorrectly handled certain files. An attacker could possibly use this issue to cause a crash. This issue only affected Ubuntu 25.04. (CVE-2025-1182) It was discovered that GNU binutils incorrectly handled certain inputs. An attacker could possibly use this issue to execute arbritrary code. This issue only affected Ubuntu 25.04 and Ubuntu 24.04 LTS. (CVE-2025-7546) Update Instructions: Run sudo pro fix USN-7847-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: binutils - 2.38-4ubuntu2.10 binutils-aarch64-linux-gnu - 2.38-4ubuntu2.10 binutils-alpha-linux-gnu - 2.38-4ubuntu2.10 binutils-arm-linux-gnueabi - 2.38-4ubuntu2.10 binutils-arm-linux-gnueabihf - 2.38-4ubuntu2.10 binutils-common - 2.38-4ubuntu2.10 binutils-dev - 2.38-4ubuntu2.10 binutils-doc - 2.38-4ubuntu2.10 binutils-for-build - 2.38-4ubuntu2.10 binutils-for-host - 2.38-4ubuntu2.10 binutils-hppa-linux-gnu - 2.38-4ubuntu2.10 binutils-hppa64-linux-gnu - 2.38-4ubuntu2.10 binutils-i686-gnu - 2.38-4ubuntu2.10 binutils-i686-kfreebsd-gnu - 2.38-4ubuntu2.10 binutils-i686-linux-gnu - 2.38-4ubuntu2.10 binutils-ia64-linux-gnu - 2.38-4ubuntu2.10 binutils-m68k-linux-gnu - 2.38-4ubuntu2.10 binutils-multiarch - 2.38-4ubuntu2.10 binutils-multiarch-dev - 2.38-4ubuntu2.10 binutils-powerpc-linux-gnu - 2.38-4ubuntu2.10 binutils-powerpc64-linux-gnu - 2.38-4ubuntu2.10 binutils-powerpc64le-linux-gnu - 2.38-4ubuntu2.10 binutils-riscv64-linux-gnu - 2.38-4ubuntu2.10 binutils-s390x-linux-gnu - 2.38-4ubuntu2.10 binutils-sh4-linux-gnu - 2.38-4ubuntu2.10 binutils-source - 2.38-4ubuntu2.10 binutils-sparc64-linux-gnu - 2.38-4ubuntu2.10 binutils-x86-64-kfreebsd-gnu - 2.38-4ubuntu2.10 binutils-x86-64-linux-gnu - 2.38-4ubuntu2.10 binutils-x86-64-linux-gnux32 - 2.38-4ubuntu2.10 libbinutils - 2.38-4ubuntu2.10 libctf-nobfd0 - 2.38-4ubuntu2.10 libctf0 - 2.38-4ubuntu2.10 No subscription required
CVEs:
- https://ubuntu.com/security/CVE-2025-11082
- https://ubuntu.com/security/CVE-2025-11083
- https://ubuntu.com/security/CVE-2025-1147
- https://ubuntu.com/security/CVE-2025-1148
- https://ubuntu.com/security/CVE-2025-1182
- https://ubuntu.com/security/CVE-2025-3198
- https://ubuntu.com/security/CVE-2025-5244
- https://ubuntu.com/security/CVE-2025-5245
- https://ubuntu.com/security/CVE-2025-7545
- https://ubuntu.com/security/CVE-2025-7546
- https://ubuntu.com/security/CVE-2025-8225
Title: USN-7852-1 -- libxml2 vulnerability
URL: https://ubuntu.com/security/notices/USN-7852-1
Priorities: medium
Description:
It was discovered that libxslt, used by libxml2, incorrectly handled certain attributes. An attacker could use this issue to cause a crash, resulting in a denial of service, or possibly execute arbitrary code. This update adds a fix to libxml2 to mitigate the libxslt vulnerability. Update Instructions: Run sudo pro fix USN-7852-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libxml2 - 2.9.13+dfsg-1ubuntu0.10 libxml2-dev - 2.9.13+dfsg-1ubuntu0.10 libxml2-doc - 2.9.13+dfsg-1ubuntu0.10 libxml2-utils - 2.9.13+dfsg-1ubuntu0.10 python3-libxml2 - 2.9.13+dfsg-1ubuntu0.10 No subscription required
CVEs:
ubuntu jammy v1.943
Metadata:
BOSH Agent Version: 2.772.0
Kernel Version: 5.15.0.160.156
USNs:
Title: USN-7829-1 -- Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7829-1
Priorities: low,medium
Description:
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - GPU drivers; - Network drivers; - Netlink; (CVE-2024-26700, CVE-2025-38727, CVE-2023-52593, CVE-2024-26896) Update Instructions: Run sudo pro fix USN-7829-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-5.15.0-1059-xilinx-zynqmp - 5.15.0-1059.63 linux-headers-5.15.0-1059-xilinx-zynqmp - 5.15.0-1059.63 linux-image-5.15.0-1059-xilinx-zynqmp - 5.15.0-1059.63 linux-modules-5.15.0-1059-xilinx-zynqmp - 5.15.0-1059.63 linux-tools-5.15.0-1059-xilinx-zynqmp - 5.15.0-1059.63 linux-xilinx-zynqmp-headers-5.15.0-1059 - 5.15.0-1059.63 linux-xilinx-zynqmp-tools-5.15.0-1059 - 5.15.0-1059.63 No subscription required linux-buildinfo-5.15.0-1078-gkeop - 5.15.0-1078.86 linux-cloud-tools-5.15.0-1078-gkeop - 5.15.0-1078.86 linux-gkeop-cloud-tools-5.15.0-1078 - 5.15.0-1078.86 linux-gkeop-headers-5.15.0-1078 - 5.15.0-1078.86 linux-gkeop-tools-5.15.0-1078 - 5.15.0-1078.86 linux-headers-5.15.0-1078-gkeop - 5.15.0-1078.86 linux-image-5.15.0-1078-gkeop - 5.15.0-1078.86 linux-image-unsigned-5.15.0-1078-gkeop - 5.15.0-1078.86 linux-modules-5.15.0-1078-gkeop - 5.15.0-1078.86 linux-modules-extra-5.15.0-1078-gkeop - 5.15.0-1078.86 linux-tools-5.15.0-1078-gkeop - 5.15.0-1078.86 No subscription required linux-buildinfo-5.15.0-1089-ibm - 5.15.0-1089.92 linux-headers-5.15.0-1089-ibm - 5.15.0-1089.92 linux-ibm-cloud-tools-common - 5.15.0-1089.92 linux-ibm-headers-5.15.0-1089 - 5.15.0-1089.92 linux-ibm-source-5.15.0 - 5.15.0-1089.92 linux-ibm-tools-5.15.0-1089 - 5.15.0-1089.92 linux-ibm-tools-common - 5.15.0-1089.92 linux-image-5.15.0-1089-ibm - 5.15.0-1089.92 linux-image-unsigned-5.15.0-1089-ibm - 5.15.0-1089.92 linux-modules-5.15.0-1089-ibm - 5.15.0-1089.92 linux-modules-extra-5.15.0-1089-ibm - 5.15.0-1089.92 linux-tools-5.15.0-1089-ibm - 5.15.0-1089.92 No subscription required linux-buildinfo-5.15.0-1090-nvidia - 5.15.0-1090.91 linux-buildinfo-5.15.0-1090-nvidia-lowlatency - 5.15.0-1090.91 linux-cloud-tools-5.15.0-1090-nvidia - 5.15.0-1090.91 linux-cloud-tools-5.15.0-1090-nvidia-lowlatency - 5.15.0-1090.91 linux-headers-5.15.0-1090-nvidia - 5.15.0-1090.91 linux-headers-5.15.0-1090-nvidia-lowlatency - 5.15.0-1090.91 linux-image-5.15.0-1090-nvidia - 5.15.0-1090.91 linux-image-5.15.0-1090-nvidia-lowlatency - 5.15.0-1090.91 linux-image-unsigned-5.15.0-1090-nvidia - 5.15.0-1090.91 linux-image-unsigned-5.15.0-1090-nvidia-lowlatency - 5.15.0-1090.91 linux-modules-5.15.0-1090-nvidia - 5.15.0-1090.91 linux-modules-5.15.0-1090-nvidia-lowlatency - 5.15.0-1090.91 linux-modules-extra-5.15.0-1090-nvidia - 5.15.0-1090.91 linux-modules-nvidia-fs-5.15.0-1090-nvidia - 5.15.0-1090.91 linux-modules-nvidia-fs-5.15.0-1090-nvidia-lowlatency - 5.15.0-1090.91 linux-nvidia-cloud-tools-5.15.0-1090 - 5.15.0-1090.91 linux-nvidia-cloud-tools-common - 5.15.0-1090.91 linux-nvidia-headers-5.15.0-1090 - 5.15.0-1090.91 linux-nvidia-tools-5.15.0-1090 - 5.15.0-1090.91 linux-nvidia-tools-common - 5.15.0-1090.91 linux-nvidia-tools-host - 5.15.0-1090.91 linux-tools-5.15.0-1090-nvidia - 5.15.0-1090.91 linux-tools-5.15.0-1090-nvidia-lowlatency - 5.15.0-1090.91 No subscription required linux-buildinfo-5.15.0-1091-gke - 5.15.0-1091.97 linux-gke-headers-5.15.0-1091 - 5.15.0-1091.97 linux-gke-tools-5.15.0-1091 - 5.15.0-1091.97 linux-headers-5.15.0-1091-gke - 5.15.0-1091.97 linux-image-5.15.0-1091-gke - 5.15.0-1091.97 linux-image-unsigned-5.15.0-1091-gke - 5.15.0-1091.97 linux-modules-5.15.0-1091-gke - 5.15.0-1091.97 linux-modules-extra-5.15.0-1091-gke - 5.15.0-1091.97 linux-tools-5.15.0-1091-gke - 5.15.0-1091.97 No subscription required linux-buildinfo-5.15.0-1092-oracle - 5.15.0-1092.98 linux-headers-5.15.0-1092-oracle - 5.15.0-1092.98 linux-image-5.15.0-1092-oracle - 5.15.0-1092.98 linux-image-unsigned-5.15.0-1092-oracle - 5.15.0-1092.98 linux-modules-5.15.0-1092-oracle - 5.15.0-1092.98 linux-modules-extra-5.15.0-1092-oracle - 5.15.0-1092.98 linux-oracle-headers-5.15.0-1092 - 5.15.0-1092.98 linux-oracle-tools-5.15.0-1092 - 5.15.0-1092.98 linux-tools-5.15.0-1092-oracle - 5.15.0-1092.98 No subscription required linux-aws-cloud-tools-5.15.0-1095 - 5.15.0-1095.102 linux-aws-headers-5.15.0-1095 - 5.15.0-1095.102 linux-aws-tools-5.15.0-1095 - 5.15.0-1095.102 linux-buildinfo-5.15.0-1095-aws - 5.15.0-1095.102 linux-buildinfo-5.15.0-1095-aws-64k - 5.15.0-1095.102 linux-cloud-tools-5.15.0-1095-aws - 5.15.0-1095.102 linux-cloud-tools-5.15.0-1095-aws-64k - 5.15.0-1095.102 linux-headers-5.15.0-1095-aws - 5.15.0-1095.102 linux-headers-5.15.0-1095-aws-64k - 5.15.0-1095.102 linux-image-5.15.0-1095-aws - 5.15.0-1095.102 linux-image-5.15.0-1095-aws-64k - 5.15.0-1095.102 linux-image-unsigned-5.15.0-1095-aws - 5.15.0-1095.102 linux-image-unsigned-5.15.0-1095-aws-64k - 5.15.0-1095.102 linux-modules-5.15.0-1095-aws - 5.15.0-1095.102 linux-modules-5.15.0-1095-aws-64k - 5.15.0-1095.102 linux-modules-extra-5.15.0-1095-aws - 5.15.0-1095.102 linux-modules-extra-5.15.0-1095-aws-64k - 5.15.0-1095.102 linux-tools-5.15.0-1095-aws - 5.15.0-1095.102 linux-tools-5.15.0-1095-aws-64k - 5.15.0-1095.102 No subscription required linux-buildinfo-5.15.0-1095-gcp - 5.15.0-1095.104 linux-gcp-headers-5.15.0-1095 - 5.15.0-1095.104 linux-gcp-tools-5.15.0-1095 - 5.15.0-1095.104 linux-headers-5.15.0-1095-gcp - 5.15.0-1095.104 linux-image-5.15.0-1095-gcp - 5.15.0-1095.104 linux-image-unsigned-5.15.0-1095-gcp - 5.15.0-1095.104 linux-modules-5.15.0-1095-gcp - 5.15.0-1095.104 linux-modules-extra-5.15.0-1095-gcp - 5.15.0-1095.104 linux-tools-5.15.0-1095-gcp - 5.15.0-1095.104 No subscription required linux-buildinfo-5.15.0-160-generic - 5.15.0-160.170 linux-buildinfo-5.15.0-160-generic-64k - 5.15.0-160.170 linux-buildinfo-5.15.0-160-generic-lpae - 5.15.0-160.170 linux-buildinfo-5.15.0-160-lowlatency - 5.15.0-160.170 linux-buildinfo-5.15.0-160-lowlatency-64k - 5.15.0-160.170 linux-cloud-tools-5.15.0-160 - 5.15.0-160.170 linux-cloud-tools-5.15.0-160-generic - 5.15.0-160.170 linux-cloud-tools-5.15.0-160-lowlatency - 5.15.0-160.170 linux-cloud-tools-common - 5.15.0-160.170 linux-doc - 5.15.0-160.170 linux-headers-5.15.0-160 - 5.15.0-160.170 linux-headers-5.15.0-160-generic - 5.15.0-160.170 linux-headers-5.15.0-160-generic-64k - 5.15.0-160.170 linux-headers-5.15.0-160-generic-lpae - 5.15.0-160.170 linux-headers-5.15.0-160-lowlatency - 5.15.0-160.170 linux-headers-5.15.0-160-lowlatency-64k - 5.15.0-160.170 linux-image-5.15.0-160-generic - 5.15.0-160.170 linux-image-5.15.0-160-generic-64k - 5.15.0-160.170 linux-image-5.15.0-160-generic-lpae - 5.15.0-160.170 linux-image-5.15.0-160-lowlatency - 5.15.0-160.170 linux-image-5.15.0-160-lowlatency-64k - 5.15.0-160.170 linux-image-unsigned-5.15.0-160-generic - 5.15.0-160.170 linux-image-unsigned-5.15.0-160-generic-64k - 5.15.0-160.170 linux-image-unsigned-5.15.0-160-lowlatency - 5.15.0-160.170 linux-image-unsigned-5.15.0-160-lowlatency-64k - 5.15.0-160.170 linux-libc-dev - 5.15.0-160.170 linux-lowlatency-cloud-tools-5.15.0-160 - 5.15.0-160.170 linux-lowlatency-headers-5.15.0-160 - 5.15.0-160.170 linux-lowlatency-tools-5.15.0-160 - 5.15.0-160.170 linux-modules-5.15.0-160-generic - 5.15.0-160.170 linux-modules-5.15.0-160-generic-64k - 5.15.0-160.170 linux-modules-5.15.0-160-generic-lpae - 5.15.0-160.170 linux-modules-5.15.0-160-lowlatency - 5.15.0-160.170 linux-modules-5.15.0-160-lowlatency-64k - 5.15.0-160.170 linux-modules-extra-5.15.0-160-generic - 5.15.0-160.170 linux-modules-iwlwifi-5.15.0-160-generic - 5.15.0-160.170 linux-modules-iwlwifi-5.15.0-160-lowlatency - 5.15.0-160.170 linux-source-5.15.0 - 5.15.0-160.170 linux-tools-5.15.0-160 - 5.15.0-160.170 linux-tools-5.15.0-160-generic - 5.15.0-160.170 linux-tools-5.15.0-160-generic-64k - 5.15.0-160.170 linux-tools-5.15.0-160-generic-lpae - 5.15.0-160.170 linux-tools-5.15.0-160-lowlatency - 5.15.0-160.170 linux-tools-5.15.0-160-lowlatency-64k - 5.15.0-160.170 linux-tools-common - 5.15.0-160.170 linux-tools-host - 5.15.0-160.170 No subscription required linux-headers-xilinx-zynqmp - 5.15.0.1059.62 linux-headers-xilinx-zynqmp-5.15 - 5.15.0.1059.62 linux-image-xilinx-zynqmp - 5.15.0.1059.62 linux-image-xilinx-zynqmp-5.15 - 5.15.0.1059.62 linux-tools-xilinx-zynqmp - 5.15.0.1059.62 linux-tools-xilinx-zynqmp-5.15 - 5.15.0.1059.62 linux-xilinx-zynqmp - 5.15.0.1059.62 linux-xilinx-zynqmp-5.15 - 5.15.0.1059.62 No subscription required linux-cloud-tools-gkeop - 5.15.0.1078.77 linux-cloud-tools-gkeop-5.15 - 5.15.0.1078.77 linux-gkeop - 5.15.0.1078.77 linux-gkeop-5.15 - 5.15.0.1078.77 linux-headers-gkeop - 5.15.0.1078.77 linux-headers-gkeop-5.15 - 5.15.0.1078.77 linux-image-gkeop - 5.15.0.1078.77 linux-image-gkeop-5.15 - 5.15.0.1078.77 linux-modules-extra-gkeop - 5.15.0.1078.77 linux-modules-extra-gkeop-5.15 - 5.15.0.1078.77 linux-tools-gkeop - 5.15.0.1078.77 linux-tools-gkeop-5.15 - 5.15.0.1078.77 No subscription required linux-headers-ibm - 5.15.0.1089.85 linux-headers-ibm-5.15 - 5.15.0.1089.85 linux-ibm - 5.15.0.1089.85 linux-ibm-5.15 - 5.15.0.1089.85 linux-image-ibm - 5.15.0.1089.85 linux-image-ibm-5.15 - 5.15.0.1089.85 linux-tools-ibm - 5.15.0.1089.85 linux-tools-ibm-5.15 - 5.15.0.1089.85 No subscription required linux-cloud-tools-nvidia - 5.15.0.1090.90 linux-cloud-tools-nvidia-5.15 - 5.15.0.1090.90 linux-cloud-tools-nvidia-lowlatency - 5.15.0.1090.90 linux-cloud-tools-nvidia-lowlatency-5.15 - 5.15.0.1090.90 linux-headers-nvidia - 5.15.0.1090.90 linux-headers-nvidia-5.15 - 5.15.0.1090.90 linux-headers-nvidia-lowlatency - 5.15.0.1090.90 linux-headers-nvidia-lowlatency-5.15 - 5.15.0.1090.90 linux-image-nvidia - 5.15.0.1090.90 linux-image-nvidia...
ubuntu noble v1.103
Metadata:
BOSH Agent Version: 2.759.0
Kernel Version: 6.8.0-85.85
USNs:
Title: USN-7764-1 -- Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7764-1
Priorities: medium
Description:
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - ARM64 architecture; - x86 architecture; - Compute Acceleration Framework; - Bus devices; - AMD CDX bus driver; - DPLL subsystem; - EFI core; - GPIO subsystem; - GPU drivers; - HID subsystem; - I2C subsystem; - InfiniBand drivers; - Multiple devices driver; - Network drivers; - Mellanox network drivers; - NVME drivers; - Pin controllers subsystem; - RapidIO drivers; - Voltage and Current Regulator drivers; - SCSI subsystem; - SLIMbus drivers; - QCOM SoC drivers; - UFS subsystem; - USB DSL drivers; - Renesas USBHS Controller drivers; - USB Type-C Connector System Software Interface driver; - Framebuffer layer; - ACRN Hypervisor Service Module driver; - Network file system (NFS) client; - Proc file system; - SMB network file system; - Memory Management; - Scheduler infrastructure; - SoC audio core drivers; - Perf events; - Tracing infrastructure; - Memory management; - 802.1Q VLAN protocol; - Asynchronous Transfer Mode (ATM) subsystem; - Bluetooth subsystem; - Devlink API; - IPv4 networking; - IPv6 networking; - Logical Link layer; - Management Component Transport Protocol (MCTP); - Multipath TCP; - Netfilter; - Network traffic control; - Switch device API; - Wireless networking; - eXpress Data Path; (CVE-2025-22008, CVE-2025-21872, CVE-2025-21945, CVE-2025-37889, CVE-2025-21997, CVE-2025-21935, CVE-2025-21986, CVE-2025-21890, CVE-2025-21925, CVE-2024-58090, CVE-2025-38569, CVE-2025-21911, CVE-2025-21957, CVE-2025-21891, CVE-2025-21924, CVE-2025-21956, CVE-2025-21994, CVE-2025-22013, CVE-2025-21964, CVE-2025-21909, CVE-2025-21888, CVE-2025-21918, CVE-2025-21981, CVE-2025-21966, CVE-2025-22011, CVE-2025-21877, CVE-2025-21913, CVE-2025-21895, CVE-2025-21929, CVE-2025-22010, CVE-2025-21992, CVE-2025-21930, CVE-2025-21982, CVE-2025-21894, CVE-2025-21934, CVE-2025-21873, CVE-2025-21914, CVE-2025-21941, CVE-2025-21962, CVE-2025-22014, CVE-2025-21905, CVE-2025-21908, CVE-2025-21898, CVE-2025-21878, CVE-2025-22009, CVE-2025-21961, CVE-2025-22015, CVE-2025-21883, CVE-2025-21916, CVE-2025-22016, CVE-2025-21936, CVE-2025-21947, CVE-2025-21927, CVE-2025-22004, CVE-2025-21926, CVE-2025-21969, CVE-2025-21976, CVE-2025-21912, CVE-2025-21920, CVE-2025-21951, CVE-2025-22005, CVE-2025-21978, CVE-2025-21975, CVE-2025-22007, CVE-2025-21928, CVE-2025-21968, CVE-2025-21963, CVE-2025-21977, CVE-2025-21915, CVE-2025-21980, CVE-2025-22047, CVE-2025-21972, CVE-2025-21892, CVE-2025-22003, CVE-2025-21979, CVE-2025-21944, CVE-2025-21880, CVE-2025-21899, CVE-2025-21995, CVE-2025-22017, CVE-2025-21946, CVE-2025-22001, CVE-2025-21904, CVE-2025-21881, CVE-2025-21917, CVE-2025-21970, CVE-2025-21889, CVE-2025-21922, CVE-2025-21875, CVE-2025-21919, CVE-2025-21991, CVE-2025-21967, CVE-2025-21960, CVE-2025-21959, CVE-2025-21955, CVE-2025-21996, CVE-2025-21950, CVE-2025-21937, CVE-2025-21948, CVE-2025-21903, CVE-2025-21885, CVE-2025-21999, CVE-2025-21910) Update Instructions: Run sudo pro fix USN-7764-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1023-gkeop - 6.8.0-1023.25 linux-cloud-tools-6.8.0-1023-gkeop - 6.8.0-1023.25 linux-cloud-tools-gkeop - 6.8.0-1023.25 linux-cloud-tools-gkeop-6.8 - 6.8.0-1023.25 linux-gkeop - 6.8.0-1023.25 linux-gkeop-6.8 - 6.8.0-1023.25 linux-gkeop-cloud-tools-6.8.0-1023 - 6.8.0-1023.25 linux-gkeop-headers-6.8.0-1023 - 6.8.0-1023.25 linux-gkeop-tools-6.8.0-1023 - 6.8.0-1023.25 linux-headers-6.8.0-1023-gkeop - 6.8.0-1023.25 linux-headers-gkeop - 6.8.0-1023.25 linux-headers-gkeop-6.8 - 6.8.0-1023.25 linux-image-6.8.0-1023-gkeop - 6.8.0-1023.25 linux-image-gkeop - 6.8.0-1023.25 linux-image-gkeop-6.8 - 6.8.0-1023.25 linux-image-unsigned-6.8.0-1023-gkeop - 6.8.0-1023.25 linux-modules-6.8.0-1023-gkeop - 6.8.0-1023.25 linux-modules-extra-6.8.0-1023-gkeop - 6.8.0-1023.25 linux-modules-extra-gkeop - 6.8.0-1023.25 linux-modules-extra-gkeop-6.8 - 6.8.0-1023.25 linux-tools-6.8.0-1023-gkeop - 6.8.0-1023.25 linux-tools-gkeop - 6.8.0-1023.25 linux-tools-gkeop-6.8 - 6.8.0-1023.25 No subscription required linux-buildinfo-6.8.0-1036-gke - 6.8.0-1036.40 linux-buildinfo-6.8.0-1036-gke-64k - 6.8.0-1036.40 linux-gke - 6.8.0-1036.40 linux-gke-6.8 - 6.8.0-1036.40 linux-gke-64k - 6.8.0-1036.40 linux-gke-64k-6.8 - 6.8.0-1036.40 linux-gke-headers-6.8.0-1036 - 6.8.0-1036.40 linux-gke-tools-6.8.0-1036 - 6.8.0-1036.40 linux-headers-6.8.0-1036-gke - 6.8.0-1036.40 linux-headers-6.8.0-1036-gke-64k - 6.8.0-1036.40 linux-headers-gke - 6.8.0-1036.40 linux-headers-gke-6.8 - 6.8.0-1036.40 linux-headers-gke-64k - 6.8.0-1036.40 linux-headers-gke-64k-6.8 - 6.8.0-1036.40 linux-image-6.8.0-1036-gke - 6.8.0-1036.40 linux-image-6.8.0-1036-gke-64k - 6.8.0-1036.40 linux-image-gke - 6.8.0-1036.40 linux-image-gke-6.8 - 6.8.0-1036.40 linux-image-gke-64k - 6.8.0-1036.40 linux-image-gke-64k-6.8 - 6.8.0-1036.40 linux-image-unsigned-6.8.0-1036-gke - 6.8.0-1036.40 linux-image-unsigned-6.8.0-1036-gke-64k - 6.8.0-1036.40 linux-modules-6.8.0-1036-gke - 6.8.0-1036.40 linux-modules-6.8.0-1036-gke-64k - 6.8.0-1036.40 linux-modules-extra-6.8.0-1036-gke - 6.8.0-1036.40 linux-modules-extra-6.8.0-1036-gke-64k - 6.8.0-1036.40 linux-modules-iwlwifi-6.8.0-1036-gke - 6.8.0-1036.40 linux-modules-iwlwifi-gke - 6.8.0-1036.40 linux-modules-iwlwifi-gke-6.8 - 6.8.0-1036.40 linux-tools-6.8.0-1036-gke - 6.8.0-1036.40 linux-tools-6.8.0-1036-gke-64k - 6.8.0-1036.40 linux-tools-gke - 6.8.0-1036.40 linux-tools-gke-6.8 - 6.8.0-1036.40 linux-tools-gke-64k - 6.8.0-1036.40 linux-tools-gke-64k-6.8 - 6.8.0-1036.40 No subscription required linux-aws-6.8 - 6.8.0-1039.41 linux-aws-64k-6.8 - 6.8.0-1039.41 linux-aws-64k-lts-24.04 - 6.8.0-1039.41 linux-aws-cloud-tools-6.8.0-1039 - 6.8.0-1039.41 linux-aws-headers-6.8.0-1039 - 6.8.0-1039.41 linux-aws-lts-24.04 - 6.8.0-1039.41 linux-aws-tools-6.8.0-1039 - 6.8.0-1039.41 linux-buildinfo-6.8.0-1039-aws - 6.8.0-1039.41 linux-buildinfo-6.8.0-1039-aws-64k - 6.8.0-1039.41 linux-cloud-tools-6.8.0-1039-aws - 6.8.0-1039.41 linux-cloud-tools-6.8.0-1039-aws-64k - 6.8.0-1039.41 linux-headers-6.8.0-1039-aws - 6.8.0-1039.41 linux-headers-6.8.0-1039-aws-64k - 6.8.0-1039.41 linux-headers-aws-6.8 - 6.8.0-1039.41 linux-headers-aws-64k-6.8 - 6.8.0-1039.41 linux-headers-aws-64k-lts-24.04 - 6.8.0-1039.41 linux-headers-aws-lts-24.04 - 6.8.0-1039.41 linux-image-6.8.0-1039-aws - 6.8.0-1039.41 linux-image-6.8.0-1039-aws-64k - 6.8.0-1039.41 linux-image-aws-6.8 - 6.8.0-1039.41 linux-image-aws-64k-6.8 - 6.8.0-1039.41 linux-image-aws-64k-lts-24.04 - 6.8.0-1039.41 linux-image-aws-lts-24.04 - 6.8.0-1039.41 linux-image-uc-6.8.0-1039-aws - 6.8.0-1039.41 linux-image-uc-6.8.0-1039-aws-64k - 6.8.0-1039.41 linux-image-uc-aws-6.8 - 6.8.0-1039.41 linux-image-uc-aws-lts-24.04 - 6.8.0-1039.41 linux-image-unsigned-6.8.0-1039-aws - 6.8.0-1039.41 linux-image-unsigned-6.8.0-1039-aws-64k - 6.8.0-1039.41 linux-modules-6.8.0-1039-aws - 6.8.0-1039.41 linux-modules-6.8.0-1039-aws-64k - 6.8.0-1039.41 linux-modules-extra-6.8.0-1039-aws - 6.8.0-1039.41 linux-modules-extra-6.8.0-1039-aws-64k - 6.8.0-1039.41 linux-modules-extra-aws-6.8 - 6.8.0-1039.41 linux-modules-extra-aws-64k-6.8 - 6.8.0-1039.41 linux-modules-extra-aws-64k-lts-24.04 - 6.8.0-1039.41 linux-modules-extra-aws-lts-24.04 - 6.8.0-1039.41 linux-tools-6.8.0-1039-aws - 6.8.0-1039.41 linux-tools-6.8.0-1039-aws-64k - 6.8.0-1039.41 linux-tools-aws-6.8 - 6.8.0-1039.41 linux-tools-aws-64k-6.8 - 6.8.0-1039.41 linux-tools-aws-64k-lts-24.04 - 6.8.0-1039.41 linux-tools-aws-lts-24.04 - 6.8.0-1039.41 No subscription required linux-buildinfo-6.8.0-1040-gcp - 6.8.0-1040.42 linux-buildinfo-6.8.0-1040-gcp-64k - 6.8.0-1040.42 linux-gcp-6.8 - 6.8.0-1040.42 linux-gcp-64k-6.8 - 6.8.0-1040.42 linux-gcp-64k-lts-24.04 - 6.8.0-1040.42 linux-gcp-headers-6.8.0-1040 - 6.8.0-1040.42 linux-gcp-lts-24.04 - 6.8.0-1040.42 linux-gcp-tools-6.8.0-1040 - 6.8.0-1040.42 linux-headers-6.8.0-1040-gcp - 6.8.0-1040.42 linux-headers-6.8.0-1040-gcp-64k - 6.8.0-1040.42 linux-headers-gcp-6.8 - 6.8.0-1040.42 linux-headers-gcp-64k-6.8 - 6.8.0-1040.42 linux-headers-gcp-64k-lts-24.04 - 6.8.0-1040.42 linux-headers-gcp-lts-24.04 - 6.8.0-1040.42 linux-image-6.8.0-1040-gcp - 6.8.0-1040.42 linux-image-6.8.0-1040-gcp-64k - 6.8.0-1040.42 linux-image-gcp-6.8 - 6.8.0-1040.42 linux-image-gcp-64k-6.8 - 6.8.0-1040.42 linux-image-gcp-64k-lts-24.04 - 6.8.0-1040.42 linux-image-gcp-lts-24.04 - 6.8.0-1040.42 linux-image-unsigned-6.8.0-1040-gcp - 6.8.0-1040.42 linux-image-unsigned-6.8.0-1040-gcp-64k - 6.8.0-1040.42 linux-modules-6.8.0-1040-gcp - 6.8.0-1040.42 linux-modules-6.8.0-1040-gcp-64k - 6.8.0-1040.42 linux-modules-extra-6.8.0-1040-gcp - 6.8.0-1040.42 linux-modules-extra-6.8.0-1040-gcp-64k - 6.8.0-1040.42 linux-modules-extra-gcp-6.8 - 6.8.0-1040.42 linux-modules-extra-gcp-64k-6.8 - 6.8.0-1040.42 linux-modules-extra-gcp-64k-lts-24.04 - 6.8.0-1040.42 linux-modules-extra-gcp-lts-24.04 - 6.8.0-1040.42 linux-tools-6.8.0-1040-gcp - 6.8.0-1040.42 linux-tools-6.8.0-1040-gcp-64k - 6.8.0-1040.42 linux-tools-gcp-6.8 - 6.8.0-1040.42 linux-tools-gcp-64k-6.8 - 6.8.0-1040.42 linux-tools-gcp-64k-lts-24.04 - 6.8.0-1040.42 linux-tools-gcp-lts-24.04 - 6.8.0-1040.42 No subscription required linux-bpf-dev - 6.8.0-84.84 linux-buildinfo-6.8.0-84-generic - 6.8.0-84.84 linux-buildinfo-6.8.0-84-generic-64k - 6.8.0-84.84 linux-cloud-tools-6.8.0-84 - 6.8.0-84.84 linux-cloud-tools-6.8.0-84-generic - 6.8.0-84.84 linux-cloud-tools-common - 6.8.0-84.84 linux-cloud-tools-generic - 6.8.0-84.84 linux-cloud-tools-generic-6.8 - 6.8.0-84.84 linux-cloud-tools-virtual - 6.8.0-84.84 linux-cloud-tools-virtual-6.8 - 6.8.0-8...
ubuntu jammy v1.926
🚨 This stemcell version should NOT be used🚨
It has a kernel regression that may cause CPU lockups: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2126434?mkt_tok=MDY2LUVPVi0zMzUAAAGdSgT2ZvEO-2pxTFOJDrrK9KAbRPHNRNX6ofWRQxkP_Zb8qh7EDFcMpGEXbWsRLwMGpuNc62TlpoH0eVcHql4l7PtHg76A1FkMOkN70758hvpsOcA
Metadata:
BOSH Agent Version: 2.759.0
Kernel Version: 5.15.0.157.155
USNs:
Title: USN-7786-1 -- OpenSSL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7786-1
Priorities: medium,low
Description:
Stanislav Fort discovered that OpenSSL incorrectly handled memory when trying to decrypt CMS messages encrypted with password-based encryption. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2025-9230) Stanislav Fort discovered that OpenSSL had a timing side-channel in SM2 signature computations on ARM platforms. A remote attacker could possibly use this issue to recover private data. This issue only affected Ubuntu 25.04. (CVE-2025-9231) Stanislav Fort discovered that OpenSSL incorrectly handled memory during HTTP requests when "no_proxy" environment variable is set. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 25.04. (CVE-2025-9232) Update Instructions: Run sudo pro fix USN-7786-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libssl-dev - 3.0.2-0ubuntu1.20 libssl-doc - 3.0.2-0ubuntu1.20 libssl3 - 3.0.2-0ubuntu1.20 openssl - 3.0.2-0ubuntu1.20 No subscription required
CVEs:
- https://ubuntu.com/security/CVE-2025-9231
- https://ubuntu.com/security/CVE-2025-9232
- https://ubuntu.com/security/CVE-2025-9230
Title: USN-7793-1 -- Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7793-1
Priorities: medium
Description:
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Network traffic control; - VMware vSockets driver; (CVE-2025-38477, CVE-2025-38618) Update Instructions: Run sudo pro fix USN-7793-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-5.15.0-1046-nvidia-tegra - 5.15.0-1046.46 linux-buildinfo-5.15.0-1046-nvidia-tegra-rt - 5.15.0-1046.46 linux-headers-5.15.0-1046-nvidia-tegra - 5.15.0-1046.46 linux-headers-5.15.0-1046-nvidia-tegra-rt - 5.15.0-1046.46 linux-image-5.15.0-1046-nvidia-tegra - 5.15.0-1046.46 linux-image-5.15.0-1046-nvidia-tegra-rt - 5.15.0-1046.46 linux-image-unsigned-5.15.0-1046-nvidia-tegra - 5.15.0-1046.46 linux-image-unsigned-5.15.0-1046-nvidia-tegra-rt - 5.15.0-1046.46 linux-modules-5.15.0-1046-nvidia-tegra - 5.15.0-1046.46 linux-modules-5.15.0-1046-nvidia-tegra-rt - 5.15.0-1046.46 linux-modules-extra-5.15.0-1046-nvidia-tegra - 5.15.0-1046.46 linux-nvidia-tegra-headers-5.15.0-1046 - 5.15.0-1046.46 linux-nvidia-tegra-tools-5.15.0-1046 - 5.15.0-1046.46 linux-tools-5.15.0-1046-nvidia-tegra - 5.15.0-1046.46 linux-tools-5.15.0-1046-nvidia-tegra-rt - 5.15.0-1046.46 No subscription required linux-buildinfo-5.15.0-1057-xilinx-zynqmp - 5.15.0-1057.61 linux-headers-5.15.0-1057-xilinx-zynqmp - 5.15.0-1057.61 linux-image-5.15.0-1057-xilinx-zynqmp - 5.15.0-1057.61 linux-modules-5.15.0-1057-xilinx-zynqmp - 5.15.0-1057.61 linux-tools-5.15.0-1057-xilinx-zynqmp - 5.15.0-1057.61 linux-xilinx-zynqmp-headers-5.15.0-1057 - 5.15.0-1057.61 linux-xilinx-zynqmp-tools-5.15.0-1057 - 5.15.0-1057.61 No subscription required linux-buildinfo-5.15.0-1076-gkeop - 5.15.0-1076.84 linux-cloud-tools-5.15.0-1076-gkeop - 5.15.0-1076.84 linux-gkeop-cloud-tools-5.15.0-1076 - 5.15.0-1076.84 linux-gkeop-headers-5.15.0-1076 - 5.15.0-1076.84 linux-gkeop-tools-5.15.0-1076 - 5.15.0-1076.84 linux-headers-5.15.0-1076-gkeop - 5.15.0-1076.84 linux-image-5.15.0-1076-gkeop - 5.15.0-1076.84 linux-image-unsigned-5.15.0-1076-gkeop - 5.15.0-1076.84 linux-modules-5.15.0-1076-gkeop - 5.15.0-1076.84 linux-modules-extra-5.15.0-1076-gkeop - 5.15.0-1076.84 linux-tools-5.15.0-1076-gkeop - 5.15.0-1076.84 No subscription required linux-buildinfo-5.15.0-1087-ibm - 5.15.0-1087.90 linux-buildinfo-5.15.0-1087-raspi - 5.15.0-1087.90 linux-headers-5.15.0-1087-ibm - 5.15.0-1087.90 linux-headers-5.15.0-1087-raspi - 5.15.0-1087.90 linux-ibm-cloud-tools-common - 5.15.0-1087.90 linux-ibm-headers-5.15.0-1087 - 5.15.0-1087.90 linux-ibm-source-5.15.0 - 5.15.0-1087.90 linux-ibm-tools-5.15.0-1087 - 5.15.0-1087.90 linux-ibm-tools-common - 5.15.0-1087.90 linux-image-5.15.0-1087-ibm - 5.15.0-1087.90 linux-image-5.15.0-1087-raspi - 5.15.0-1087.90 linux-image-unsigned-5.15.0-1087-ibm - 5.15.0-1087.90 linux-modules-5.15.0-1087-ibm - 5.15.0-1087.90 linux-modules-5.15.0-1087-raspi - 5.15.0-1087.90 linux-modules-extra-5.15.0-1087-ibm - 5.15.0-1087.90 linux-modules-extra-5.15.0-1087-raspi - 5.15.0-1087.90 linux-raspi-headers-5.15.0-1087 - 5.15.0-1087.90 linux-raspi-tools-5.15.0-1087 - 5.15.0-1087.90 linux-tools-5.15.0-1087-ibm - 5.15.0-1087.90 linux-tools-5.15.0-1087-raspi - 5.15.0-1087.90 No subscription required linux-buildinfo-5.15.0-1088-nvidia - 5.15.0-1088.89 linux-buildinfo-5.15.0-1088-nvidia-lowlatency - 5.15.0-1088.89 linux-cloud-tools-5.15.0-1088-nvidia - 5.15.0-1088.89 linux-cloud-tools-5.15.0-1088-nvidia-lowlatency - 5.15.0-1088.89 linux-headers-5.15.0-1088-nvidia - 5.15.0-1088.89 linux-headers-5.15.0-1088-nvidia-lowlatency - 5.15.0-1088.89 linux-image-5.15.0-1088-nvidia - 5.15.0-1088.89 linux-image-5.15.0-1088-nvidia-lowlatency - 5.15.0-1088.89 linux-image-unsigned-5.15.0-1088-nvidia - 5.15.0-1088.89 linux-image-unsigned-5.15.0-1088-nvidia-lowlatency - 5.15.0-1088.89 linux-modules-5.15.0-1088-nvidia - 5.15.0-1088.89 linux-modules-5.15.0-1088-nvidia-lowlatency - 5.15.0-1088.89 linux-modules-extra-5.15.0-1088-nvidia - 5.15.0-1088.89 linux-modules-nvidia-fs-5.15.0-1088-nvidia - 5.15.0-1088.89 linux-modules-nvidia-fs-5.15.0-1088-nvidia-lowlatency - 5.15.0-1088.89 linux-nvidia-cloud-tools-5.15.0-1088 - 5.15.0-1088.89 linux-nvidia-cloud-tools-common - 5.15.0-1088.89 linux-nvidia-headers-5.15.0-1088 - 5.15.0-1088.89 linux-nvidia-tools-5.15.0-1088 - 5.15.0-1088.89 linux-nvidia-tools-common - 5.15.0-1088.89 linux-nvidia-tools-host - 5.15.0-1088.89 linux-tools-5.15.0-1088-nvidia - 5.15.0-1088.89 linux-tools-5.15.0-1088-nvidia-lowlatency - 5.15.0-1088.89 No subscription required linux-buildinfo-5.15.0-1088-intel-iotg - 5.15.0-1088.94 linux-cloud-tools-5.15.0-1088-intel-iotg - 5.15.0-1088.94 linux-headers-5.15.0-1088-intel-iotg - 5.15.0-1088.94 linux-image-5.15.0-1088-intel-iotg - 5.15.0-1088.94 linux-image-unsigned-5.15.0-1088-intel-iotg - 5.15.0-1088.94 linux-intel-iotg-cloud-tools-5.15.0-1088 - 5.15.0-1088.94 linux-intel-iotg-cloud-tools-common - 5.15.0-1088.94 linux-intel-iotg-headers-5.15.0-1088 - 5.15.0-1088.94 linux-intel-iotg-tools-5.15.0-1088 - 5.15.0-1088.94 linux-intel-iotg-tools-common - 5.15.0-1088.94 linux-intel-iotg-tools-host - 5.15.0-1088.94 linux-modules-5.15.0-1088-intel-iotg - 5.15.0-1088.94 linux-modules-extra-5.15.0-1088-intel-iotg - 5.15.0-1088.94 linux-modules-iwlwifi-5.15.0-1088-intel-iotg - 5.15.0-1088.94 linux-tools-5.15.0-1088-intel-iotg - 5.15.0-1088.94 No subscription required linux-buildinfo-5.15.0-1091-oracle - 5.15.0-1091.97 linux-headers-5.15.0-1091-oracle - 5.15.0-1091.97 linux-image-5.15.0-1091-oracle - 5.15.0-1091.97 linux-image-unsigned-5.15.0-1091-oracle - 5.15.0-1091.97 linux-modules-5.15.0-1091-oracle - 5.15.0-1091.97 linux-modules-extra-5.15.0-1091-oracle - 5.15.0-1091.97 linux-oracle-headers-5.15.0-1091 - 5.15.0-1091.97 linux-oracle-tools-5.15.0-1091 - 5.15.0-1091.97 linux-tools-5.15.0-1091-oracle - 5.15.0-1091.97 No subscription required linux-aws-cloud-tools-5.15.0-1093 - 5.15.0-1093.100 linux-aws-headers-5.15.0-1093 - 5.15.0-1093.100 linux-aws-tools-5.15.0-1093 - 5.15.0-1093.100 linux-buildinfo-5.15.0-1093-aws - 5.15.0-1093.100 linux-buildinfo-5.15.0-1093-aws-64k - 5.15.0-1093.100 linux-cloud-tools-5.15.0-1093-aws - 5.15.0-1093.100 linux-cloud-tools-5.15.0-1093-aws-64k - 5.15.0-1093.100 linux-headers-5.15.0-1093-aws - 5.15.0-1093.100 linux-headers-5.15.0-1093-aws-64k - 5.15.0-1093.100 linux-image-5.15.0-1093-aws - 5.15.0-1093.100 linux-image-5.15.0-1093-aws-64k - 5.15.0-1093.100 linux-image-unsigned-5.15.0-1093-aws - 5.15.0-1093.100 linux-image-unsigned-5.15.0-1093-aws-64k - 5.15.0-1093.100 linux-modules-5.15.0-1093-aws - 5.15.0-1093.100 linux-modules-5.15.0-1093-aws-64k - 5.15.0-1093.100 linux-modules-extra-5.15.0-1093-aws - 5.15.0-1093.100 linux-modules-extra-5.15.0-1093-aws-64k - 5.15.0-1093.100 linux-tools-5.15.0-1093-aws - 5.15.0-1093.100 linux-tools-5.15.0-1093-aws-64k - 5.15.0-1093.100 No subscription required linux-buildinfo-5.15.0-1093-gcp - 5.15.0-1093.102 linux-gcp-headers-5.15.0-1093 - 5.15.0-1093.102 linux-gcp-tools-5.15.0-1093 - 5.15.0-1093.102 linux-headers-5.15.0-1093-gcp - 5.15.0-1093.102 linux-image-5.15.0-1093-gcp - 5.15.0-1093.102 linux-image-unsigned-5.15.0-1093-gcp - 5.15.0-1093.102 linux-modules-5.15.0-1093-gcp - 5.15.0-1093.102 linux-modules-extra-5.15.0-1093-gcp - 5.15.0-1093.102 linux-tools-5.15.0-1093-gcp - 5.15.0-1093.102 No subscription required linux-buildinfo-5.15.0-157-generic - 5.15.0-157.167 linux-buildinfo-5.15.0-157-generic-64k - 5.15.0-157.167 linux-buildinfo-5.15.0-157-generic-lpae - 5.15.0-157.167 linux-buildinfo-5.15.0-157-lowlatency - 5.15.0-157.167 linux-buildinfo-5.15.0-157-lowlatency-64k - 5.15.0-157.167 linux-cloud-tools-5.15.0-157 - 5.15.0-157.167 linux-cloud-tools-5.15.0-157-generic - 5.15.0-157.167 linux-cloud-tools-5.15.0-157-lowlatency - 5.15.0-157.167 linux-cloud-tools-common - 5.15.0-157.167 linux-doc - 5.15.0-157.167 linux-headers-5.15.0-157 - 5.15.0-157.167 linux-headers-5.15.0-157-generic - 5.15.0-157.167 linux-headers-5.15.0-157-generic-64k - 5.15.0-157.167 linux-headers-5.15.0-15...
ubuntu jammy v1.918
🚨 This stemcell version should NOT be used🚨
It has a kernel regression that may cause CPU lockups: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2126434?mkt_tok=MDY2LUVPVi0zMzUAAAGdSgT2ZvEO-2pxTFOJDrrK9KAbRPHNRNX6ofWRQxkP_Zb8qh7EDFcMpGEXbWsRLwMGpuNc62TlpoH0eVcHql4l7PtHg76A1FkMOkN70758hvpsOcA
We will ship another stemcell as soon as Canonical fixes the issue.
Metadata:
BOSH Agent Version: 2.759.0
Kernel Version: 5.15.0.156.154
USNs:
Title: USN-7760-1 -- GNU C Library vulnerability
URL: https://ubuntu.com/security/notices/USN-7760-1
Priorities: medium
Description:
It was discovered that the GNU C Library incorrectly handled the regcomp function when memory allocation failures occured. An attacker could use this issue to cause applications to crash, leading to a denial of service, or possibly execute arbitrary code. Update Instructions: Run sudo pro fix USN-7760-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: glibc-doc - 2.35-0ubuntu3.11 glibc-source - 2.35-0ubuntu3.11 libc-bin - 2.35-0ubuntu3.11 libc-dev-bin - 2.35-0ubuntu3.11 libc-devtools - 2.35-0ubuntu3.11 libc6 - 2.35-0ubuntu3.11 libc6-amd64 - 2.35-0ubuntu3.11 libc6-dev - 2.35-0ubuntu3.11 libc6-dev-amd64 - 2.35-0ubuntu3.11 libc6-dev-i386 - 2.35-0ubuntu3.11 libc6-dev-s390 - 2.35-0ubuntu3.11 libc6-dev-x32 - 2.35-0ubuntu3.11 libc6-i386 - 2.35-0ubuntu3.11 libc6-prof - 2.35-0ubuntu3.11 libc6-s390 - 2.35-0ubuntu3.11 libc6-x32 - 2.35-0ubuntu3.11 locales - 2.35-0ubuntu3.11 locales-all - 2.35-0ubuntu3.11 nscd - 2.35-0ubuntu3.11 No subscription required
CVEs:
Title: USN-7774-1 -- Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7774-1
Priorities: medium,high
Description:
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - PowerPC architecture; - x86 architecture; - ACPI drivers; - Serial ATA and Parallel ATA drivers; - Drivers core; - ATA over ethernet (AOE) driver; - Network block device driver; - Bus devices; - Clock framework and drivers; - Hardware crypto device drivers; - DMA engine subsystem; - EDAC drivers; - GPU drivers; - HID subsystem; - InfiniBand drivers; - Input Device (Miscellaneous) drivers; - Multiple devices driver; - Media drivers; - VMware VMCI Driver; - MMC subsystem; - MTD block device drivers; - Network drivers; - Pin controllers subsystem; - x86 platform drivers; - PTP clock framework; - RapidIO drivers; - Voltage and Current Regulator drivers; - Remote Processor subsystem; - S/390 drivers; - SCSI subsystem; - ASPEED SoC drivers; - TCM subsystem; - Thermal drivers; - Thunderbolt and USB4 drivers; - TTY drivers; - UFS subsystem; - USB Gadget drivers; - Renesas USBHS Controller drivers; - USB Type-C support driver; - Virtio Host (VHOST) subsystem; - Backlight driver; - Framebuffer layer; - BTRFS file system; - File systems infrastructure; - Ext4 file system; - F2FS file system; - JFFS2 file system; - JFS file system; - Network file system (NFS) client; - Network file system (NFS) server daemon; - NTFS3 file system; - DRM display driver; - Memory Management; - Mellanox drivers; - Memory management; - Netfilter; - Network sockets; - IPC subsystem; - BPF subsystem; - Perf events; - Kernel exit() syscall; - Restartable seuqences system call mechanism; - Timer subsystem; - Tracing infrastructure; - Appletalk network protocol; - Asynchronous Transfer Mode (ATM) subsystem; - Networking core; - IPv6 networking; - MultiProtocol Label Switching driver; - NetLabel subsystem; - Netlink; - NFC subsystem; - Open vSwitch; - Rose network layer; - RxRPC session sockets; - Network traffic control; - TIPC protocol; - VMware vSockets driver; - USB sound devices; (CVE-2025-38465, CVE-2025-38386, CVE-2025-38273, CVE-2025-38227, CVE-2025-38107, CVE-2025-37958, CVE-2025-38371, CVE-2025-38328, CVE-2025-38348, CVE-2025-38100, CVE-2025-38336, CVE-2025-38420, CVE-2025-38154, CVE-2025-38542, CVE-2025-38222, CVE-2025-38406, CVE-2025-37948, CVE-2025-38112, CVE-2025-38145, CVE-2025-38163, CVE-2025-38464, CVE-2025-38085, CVE-2025-38342, CVE-2025-38310, CVE-2025-38326, CVE-2025-38418, CVE-2025-38362, CVE-2025-38412, CVE-2025-38219, CVE-2025-38332, CVE-2025-38387, CVE-2025-38262, CVE-2025-38157, CVE-2025-38514, CVE-2025-38466, CVE-2025-38313, CVE-2025-38159, CVE-2024-44939, CVE-2025-38352, CVE-2025-38459, CVE-2025-38419, CVE-2025-38086, CVE-2025-38298, CVE-2025-38146, CVE-2025-38181, CVE-2025-38448, CVE-2025-38231, CVE-2025-38461, CVE-2025-38251, CVE-2025-38391, CVE-2025-38515, CVE-2024-26726, CVE-2025-38462, CVE-2025-38416, CVE-2025-38280, CVE-2025-38226, CVE-2025-38211, CVE-2025-38120, CVE-2025-38377, CVE-2025-38147, CVE-2025-38204, CVE-2025-38345, CVE-2025-38424, CVE-2025-38203, CVE-2025-38443, CVE-2025-38197, CVE-2025-38067, CVE-2025-38400, CVE-2025-38229, CVE-2025-38108, CVE-2025-38319, CVE-2025-38445, CVE-2025-38212, CVE-2025-38184, CVE-2025-38363, CVE-2025-38160, CVE-2024-57883, CVE-2025-38441, CVE-2025-38320, CVE-2025-38393, CVE-2025-38200, CVE-2025-38467, CVE-2025-38444, CVE-2025-38194, CVE-2025-38460, CVE-2025-38167, CVE-2025-38428, CVE-2025-38312, CVE-2025-38111, CVE-2025-38498, CVE-2025-38135, CVE-2025-38237, CVE-2025-38457, CVE-2025-38401, CVE-2025-38206, CVE-2025-38293, CVE-2025-38143, CVE-2025-38161, CVE-2025-38136, CVE-2022-48703, CVE-2025-38513, CVE-2025-38430, CVE-2025-38384, CVE-2025-38346, CVE-2025-38337, CVE-2025-38088, CVE-2025-38257, CVE-2025-38395, CVE-2025-38153, CVE-2025-38263, CVE-2025-38218, CVE-2024-26775, CVE-2025-38305, CVE-2025-38119, CVE-2025-38389, CVE-2025-38102, CVE-2025-38074, CVE-2025-38173, CVE-2025-38138, CVE-2025-38103, CVE-2025-38286, CVE-2025-38458, CVE-2025-38174, CVE-2025-38245, CVE-2025-38084, CVE-2025-38415, CVE-2025-38516, CVE-2025-38090, CVE-2025-38439, CVE-2025-38403, CVE-2025-38115, CVE-2025-38344, CVE-2025-38410, CVE-2025-38375, CVE-2025-37963, CVE-2025-38249, CVE-2025-38324, CVE-2025-38122, CVE-2025-38540, CVE-2025-38399, CVE-2025-21888, CVE-2025-38285) Update Instructions: Run sudo pro fix USN-7774-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-5.15.0-1045-nvidia-tegra - 5.15.0-1045.45 linux-buildinfo-5.15.0-1045-nvidia-tegra-rt - 5.15.0-1045.45 linux-headers-5.15.0-1045-nvidia-tegra - 5.15.0-1045.45 linux-headers-5.15.0-1045-nvidia-tegra-rt - 5.15.0-1045.45 linux-image-5.15.0-1045-nvidia-tegra - 5.15.0-1045.45 linux-image-5.15.0-1045-nvidia-tegra-rt - 5.15.0-1045.45 linux-image-unsigned-5.15.0-1045-nvidia-tegra - 5.15.0-1045.45 linux-image-unsigned-5.15.0-1045-nvidia-tegra-rt - 5.15.0-1045.45 linux-modules-5.15.0-1045-nvidia-tegra - 5.15.0-1045.45 linux-modules-5.15.0-1045-nvidia-tegra-rt - 5.15.0-1045.45 linux-modules-extra-5.15.0-1045-nvidia-tegra - 5.15.0-1045.45 linux-nvidia-tegra-headers-5.15.0-1045 - 5.15.0-1045.45 linux-nvidia-tegra-tools-5.15.0-1045 - 5.15.0-1045.45 linux-tools-5.15.0-1045-nvidia-tegra - 5.15.0-1045.45 linux-tools-5.15.0-1045-nvidia-tegra-rt - 5.15.0-1045.45 No subscription required linux-buildinfo-5.15.0-1056-xilinx-zynqmp - 5.15.0-1056.60 linux-headers-5.15.0-1056-xilinx-zynqmp - 5.15.0-1056.60 linux-image-5.15.0-1056-xilinx-zynqmp - 5.15.0-1056.60 linux-modules-5.15.0-1056-xilinx-zynqmp - 5.15.0-1056.60 linux-tools-5.15.0-1056-xilinx-zynqmp - 5.15.0-1056.60 linux-xilinx-zynqmp-headers-5.15.0-1056 - 5.15.0-1056.60 linux-xilinx-zynqmp-tools-5.15.0-1056 - 5.15.0-1056.60 No subscription required linux-buildinfo-5.15.0-1075-gkeop - 5.15.0-1075.83 linux-cloud-tools-5.15.0-1075-gkeop - 5.15.0-1075.83 linux-gkeop-cloud-tools-5.15.0-1075 - 5.15.0-1075.83 linux-gkeop-headers-5.15.0-1075 - 5.15.0-1075.83 linux-gkeop-tools-5.15.0-1075 - 5.15.0-1075.83 linux-headers-5.15.0-1075-gkeop - 5.15.0-1075.83 linux-image-5.15.0-1075-gkeop - 5.15.0-1075.83 linux-image-unsigned-5.15.0-1075-gkeop - 5.15.0-1075.83 linux-modules-5.15.0-1075-gkeop - 5.15.0-1075.83 linux-modules-extra-5.15.0-1075-gkeop - 5.15.0-1075.83 linux-tools-5.15.0-1075-gkeop - 5.15.0-1075.83 No subscription required linux-buildinfo-5.15.0-1086-ibm - 5.15.0-1086.89 linux-buildinfo-5.15.0-1086-raspi - 5.15.0-1086.89 linux-headers-5.15.0-1086-ibm - 5.15.0-1086.89 linux-headers-5.15.0-1086-raspi - 5.15.0-1086.89 linux-ibm-cloud-tools-common - 5.15.0-1086.89 linux-ibm-headers-5.15.0-1086 - 5.15.0-1086.89 linux-ibm-source-5.15.0 - 5.15.0-1086.89 linux-ibm-tools-5.15.0-1086 - 5.15.0-1086.89 linux-ibm-tools-common - 5.15.0-1086.89 linux-image-5.15.0-1086-ibm - 5.15.0-1086.89 linux-image-5.15.0-1086-raspi - 5.15.0-1086.89 linux-image-unsigned-5.15.0-1086-ibm - 5.15.0-1086.89 linux-modules-5.15.0-1086-ibm - 5.15.0-1086.89 linux-modules-5.15.0-1086-raspi - 5.15.0-1086.89 linux-modules-extra-5.15.0-1086-ibm - 5.15.0-1086.89 linux-modules-extra-5.15.0-1086-raspi - 5.15.0-1086.89 linux-raspi-headers-5.15.0-1086 - 5.15.0-1086.89 linux-raspi-tools-5.15.0-1086 - 5.15.0-1086.89 linux-tools-5.15.0-1086-ibm - 5.15.0-1086.89 linux-tools-5.15.0-1086-raspi - 5.15.0-1086.89 No subscription required linux-buildinfo-5.15.0-1087-nvidia - 5.15.0-1087.88 linux-buildinfo-5.15.0-1087-nvidia-lowlatency - 5.15.0-1087.88 linux-cloud-tools-5.15.0-1087-nvidia - 5.15.0-1087.88 linux-cloud-tools-5.15.0-1087-nvidia-lowlatency - 5.15.0-1087.88 linux-headers-5.15.0-1087-nvidia - 5.15.0-1087.88 linux-headers-5.15.0-1087-nvidia-lowlatency - 5.15.0-1087.88 linux-image-5.15.0-1087-nvidia - 5.15.0-1087.88 linux-image-5.15.0-1087-nvidia-lowlatency - 5.15.0-1087.88 linux-image-unsigned-5.15.0-1087-nvidia - 5.15.0-1087.88 linux-image-unsigned-5.15.0-1087-nvidia-lowlatency - 5.15.0-1087.88 linux-modules-5.15.0-1087-nvidia - 5.15.0-1087.88 linux-modules-5.15.0-1087-nvidia-lowlatency - 5.15.0-1087.88 linux-modules-extra-5.15.0-1087-nvidia - 5...