Releases: cloudfoundry/bosh-linux-stemcell-builder
ubuntu jammy v1.943
Metadata:
BOSH Agent Version: 2.772.0
Kernel Version: 5.15.0.160.156
USNs:
Title: USN-7829-1 -- Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7829-1
Priorities: low,medium
Description:
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - GPU drivers; - Network drivers; - Netlink; (CVE-2024-26700, CVE-2025-38727, CVE-2023-52593, CVE-2024-26896) Update Instructions: Run sudo pro fix USN-7829-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-5.15.0-1059-xilinx-zynqmp - 5.15.0-1059.63 linux-headers-5.15.0-1059-xilinx-zynqmp - 5.15.0-1059.63 linux-image-5.15.0-1059-xilinx-zynqmp - 5.15.0-1059.63 linux-modules-5.15.0-1059-xilinx-zynqmp - 5.15.0-1059.63 linux-tools-5.15.0-1059-xilinx-zynqmp - 5.15.0-1059.63 linux-xilinx-zynqmp-headers-5.15.0-1059 - 5.15.0-1059.63 linux-xilinx-zynqmp-tools-5.15.0-1059 - 5.15.0-1059.63 No subscription required linux-buildinfo-5.15.0-1078-gkeop - 5.15.0-1078.86 linux-cloud-tools-5.15.0-1078-gkeop - 5.15.0-1078.86 linux-gkeop-cloud-tools-5.15.0-1078 - 5.15.0-1078.86 linux-gkeop-headers-5.15.0-1078 - 5.15.0-1078.86 linux-gkeop-tools-5.15.0-1078 - 5.15.0-1078.86 linux-headers-5.15.0-1078-gkeop - 5.15.0-1078.86 linux-image-5.15.0-1078-gkeop - 5.15.0-1078.86 linux-image-unsigned-5.15.0-1078-gkeop - 5.15.0-1078.86 linux-modules-5.15.0-1078-gkeop - 5.15.0-1078.86 linux-modules-extra-5.15.0-1078-gkeop - 5.15.0-1078.86 linux-tools-5.15.0-1078-gkeop - 5.15.0-1078.86 No subscription required linux-buildinfo-5.15.0-1089-ibm - 5.15.0-1089.92 linux-headers-5.15.0-1089-ibm - 5.15.0-1089.92 linux-ibm-cloud-tools-common - 5.15.0-1089.92 linux-ibm-headers-5.15.0-1089 - 5.15.0-1089.92 linux-ibm-source-5.15.0 - 5.15.0-1089.92 linux-ibm-tools-5.15.0-1089 - 5.15.0-1089.92 linux-ibm-tools-common - 5.15.0-1089.92 linux-image-5.15.0-1089-ibm - 5.15.0-1089.92 linux-image-unsigned-5.15.0-1089-ibm - 5.15.0-1089.92 linux-modules-5.15.0-1089-ibm - 5.15.0-1089.92 linux-modules-extra-5.15.0-1089-ibm - 5.15.0-1089.92 linux-tools-5.15.0-1089-ibm - 5.15.0-1089.92 No subscription required linux-buildinfo-5.15.0-1090-nvidia - 5.15.0-1090.91 linux-buildinfo-5.15.0-1090-nvidia-lowlatency - 5.15.0-1090.91 linux-cloud-tools-5.15.0-1090-nvidia - 5.15.0-1090.91 linux-cloud-tools-5.15.0-1090-nvidia-lowlatency - 5.15.0-1090.91 linux-headers-5.15.0-1090-nvidia - 5.15.0-1090.91 linux-headers-5.15.0-1090-nvidia-lowlatency - 5.15.0-1090.91 linux-image-5.15.0-1090-nvidia - 5.15.0-1090.91 linux-image-5.15.0-1090-nvidia-lowlatency - 5.15.0-1090.91 linux-image-unsigned-5.15.0-1090-nvidia - 5.15.0-1090.91 linux-image-unsigned-5.15.0-1090-nvidia-lowlatency - 5.15.0-1090.91 linux-modules-5.15.0-1090-nvidia - 5.15.0-1090.91 linux-modules-5.15.0-1090-nvidia-lowlatency - 5.15.0-1090.91 linux-modules-extra-5.15.0-1090-nvidia - 5.15.0-1090.91 linux-modules-nvidia-fs-5.15.0-1090-nvidia - 5.15.0-1090.91 linux-modules-nvidia-fs-5.15.0-1090-nvidia-lowlatency - 5.15.0-1090.91 linux-nvidia-cloud-tools-5.15.0-1090 - 5.15.0-1090.91 linux-nvidia-cloud-tools-common - 5.15.0-1090.91 linux-nvidia-headers-5.15.0-1090 - 5.15.0-1090.91 linux-nvidia-tools-5.15.0-1090 - 5.15.0-1090.91 linux-nvidia-tools-common - 5.15.0-1090.91 linux-nvidia-tools-host - 5.15.0-1090.91 linux-tools-5.15.0-1090-nvidia - 5.15.0-1090.91 linux-tools-5.15.0-1090-nvidia-lowlatency - 5.15.0-1090.91 No subscription required linux-buildinfo-5.15.0-1091-gke - 5.15.0-1091.97 linux-gke-headers-5.15.0-1091 - 5.15.0-1091.97 linux-gke-tools-5.15.0-1091 - 5.15.0-1091.97 linux-headers-5.15.0-1091-gke - 5.15.0-1091.97 linux-image-5.15.0-1091-gke - 5.15.0-1091.97 linux-image-unsigned-5.15.0-1091-gke - 5.15.0-1091.97 linux-modules-5.15.0-1091-gke - 5.15.0-1091.97 linux-modules-extra-5.15.0-1091-gke - 5.15.0-1091.97 linux-tools-5.15.0-1091-gke - 5.15.0-1091.97 No subscription required linux-buildinfo-5.15.0-1092-oracle - 5.15.0-1092.98 linux-headers-5.15.0-1092-oracle - 5.15.0-1092.98 linux-image-5.15.0-1092-oracle - 5.15.0-1092.98 linux-image-unsigned-5.15.0-1092-oracle - 5.15.0-1092.98 linux-modules-5.15.0-1092-oracle - 5.15.0-1092.98 linux-modules-extra-5.15.0-1092-oracle - 5.15.0-1092.98 linux-oracle-headers-5.15.0-1092 - 5.15.0-1092.98 linux-oracle-tools-5.15.0-1092 - 5.15.0-1092.98 linux-tools-5.15.0-1092-oracle - 5.15.0-1092.98 No subscription required linux-aws-cloud-tools-5.15.0-1095 - 5.15.0-1095.102 linux-aws-headers-5.15.0-1095 - 5.15.0-1095.102 linux-aws-tools-5.15.0-1095 - 5.15.0-1095.102 linux-buildinfo-5.15.0-1095-aws - 5.15.0-1095.102 linux-buildinfo-5.15.0-1095-aws-64k - 5.15.0-1095.102 linux-cloud-tools-5.15.0-1095-aws - 5.15.0-1095.102 linux-cloud-tools-5.15.0-1095-aws-64k - 5.15.0-1095.102 linux-headers-5.15.0-1095-aws - 5.15.0-1095.102 linux-headers-5.15.0-1095-aws-64k - 5.15.0-1095.102 linux-image-5.15.0-1095-aws - 5.15.0-1095.102 linux-image-5.15.0-1095-aws-64k - 5.15.0-1095.102 linux-image-unsigned-5.15.0-1095-aws - 5.15.0-1095.102 linux-image-unsigned-5.15.0-1095-aws-64k - 5.15.0-1095.102 linux-modules-5.15.0-1095-aws - 5.15.0-1095.102 linux-modules-5.15.0-1095-aws-64k - 5.15.0-1095.102 linux-modules-extra-5.15.0-1095-aws - 5.15.0-1095.102 linux-modules-extra-5.15.0-1095-aws-64k - 5.15.0-1095.102 linux-tools-5.15.0-1095-aws - 5.15.0-1095.102 linux-tools-5.15.0-1095-aws-64k - 5.15.0-1095.102 No subscription required linux-buildinfo-5.15.0-1095-gcp - 5.15.0-1095.104 linux-gcp-headers-5.15.0-1095 - 5.15.0-1095.104 linux-gcp-tools-5.15.0-1095 - 5.15.0-1095.104 linux-headers-5.15.0-1095-gcp - 5.15.0-1095.104 linux-image-5.15.0-1095-gcp - 5.15.0-1095.104 linux-image-unsigned-5.15.0-1095-gcp - 5.15.0-1095.104 linux-modules-5.15.0-1095-gcp - 5.15.0-1095.104 linux-modules-extra-5.15.0-1095-gcp - 5.15.0-1095.104 linux-tools-5.15.0-1095-gcp - 5.15.0-1095.104 No subscription required linux-buildinfo-5.15.0-160-generic - 5.15.0-160.170 linux-buildinfo-5.15.0-160-generic-64k - 5.15.0-160.170 linux-buildinfo-5.15.0-160-generic-lpae - 5.15.0-160.170 linux-buildinfo-5.15.0-160-lowlatency - 5.15.0-160.170 linux-buildinfo-5.15.0-160-lowlatency-64k - 5.15.0-160.170 linux-cloud-tools-5.15.0-160 - 5.15.0-160.170 linux-cloud-tools-5.15.0-160-generic - 5.15.0-160.170 linux-cloud-tools-5.15.0-160-lowlatency - 5.15.0-160.170 linux-cloud-tools-common - 5.15.0-160.170 linux-doc - 5.15.0-160.170 linux-headers-5.15.0-160 - 5.15.0-160.170 linux-headers-5.15.0-160-generic - 5.15.0-160.170 linux-headers-5.15.0-160-generic-64k - 5.15.0-160.170 linux-headers-5.15.0-160-generic-lpae - 5.15.0-160.170 linux-headers-5.15.0-160-lowlatency - 5.15.0-160.170 linux-headers-5.15.0-160-lowlatency-64k - 5.15.0-160.170 linux-image-5.15.0-160-generic - 5.15.0-160.170 linux-image-5.15.0-160-generic-64k - 5.15.0-160.170 linux-image-5.15.0-160-generic-lpae - 5.15.0-160.170 linux-image-5.15.0-160-lowlatency - 5.15.0-160.170 linux-image-5.15.0-160-lowlatency-64k - 5.15.0-160.170 linux-image-unsigned-5.15.0-160-generic - 5.15.0-160.170 linux-image-unsigned-5.15.0-160-generic-64k - 5.15.0-160.170 linux-image-unsigned-5.15.0-160-lowlatency - 5.15.0-160.170 linux-image-unsigned-5.15.0-160-lowlatency-64k - 5.15.0-160.170 linux-libc-dev - 5.15.0-160.170 linux-lowlatency-cloud-tools-5.15.0-160 - 5.15.0-160.170 linux-lowlatency-headers-5.15.0-160 - 5.15.0-160.170 linux-lowlatency-tools-5.15.0-160 - 5.15.0-160.170 linux-modules-5.15.0-160-generic - 5.15.0-160.170 linux-modules-5.15.0-160-generic-64k - 5.15.0-160.170 linux-modules-5.15.0-160-generic-lpae - 5.15.0-160.170 linux-modules-5.15.0-160-lowlatency - 5.15.0-160.170 linux-modules-5.15.0-160-lowlatency-64k - 5.15.0-160.170 linux-modules-extra-5.15.0-160-generic - 5.15.0-160.170 linux-modules-iwlwifi-5.15.0-160-generic - 5.15.0-160.170 linux-modules-iwlwifi-5.15.0-160-lowlatency - 5.15.0-160.170 linux-source-5.15.0 - 5.15.0-160.170 linux-tools-5.15.0-160 - 5.15.0-160.170 linux-tools-5.15.0-160-generic - 5.15.0-160.170 linux-tools-5.15.0-160-generic-64k - 5.15.0-160.170 linux-tools-5.15.0-160-generic-lpae - 5.15.0-160.170 linux-tools-5.15.0-160-lowlatency - 5.15.0-160.170 linux-tools-5.15.0-160-lowlatency-64k - 5.15.0-160.170 linux-tools-common - 5.15.0-160.170 linux-tools-host - 5.15.0-160.170 No subscription required linux-headers-xilinx-zynqmp - 5.15.0.1059.62 linux-headers-xilinx-zynqmp-5.15 - 5.15.0.1059.62 linux-image-xilinx-zynqmp - 5.15.0.1059.62 linux-image-xilinx-zynqmp-5.15 - 5.15.0.1059.62 linux-tools-xilinx-zynqmp - 5.15.0.1059.62 linux-tools-xilinx-zynqmp-5.15 - 5.15.0.1059.62 linux-xilinx-zynqmp - 5.15.0.1059.62 linux-xilinx-zynqmp-5.15 - 5.15.0.1059.62 No subscription required linux-cloud-tools-gkeop - 5.15.0.1078.77 linux-cloud-tools-gkeop-5.15 - 5.15.0.1078.77 linux-gkeop - 5.15.0.1078.77 linux-gkeop-5.15 - 5.15.0.1078.77 linux-headers-gkeop - 5.15.0.1078.77 linux-headers-gkeop-5.15 - 5.15.0.1078.77 linux-image-gkeop - 5.15.0.1078.77 linux-image-gkeop-5.15 - 5.15.0.1078.77 linux-modules-extra-gkeop - 5.15.0.1078.77 linux-modules-extra-gkeop-5.15 - 5.15.0.1078.77 linux-tools-gkeop - 5.15.0.1078.77 linux-tools-gkeop-5.15 - 5.15.0.1078.77 No subscription required linux-headers-ibm - 5.15.0.1089.85 linux-headers-ibm-5.15 - 5.15.0.1089.85 linux-ibm - 5.15.0.1089.85 linux-ibm-5.15 - 5.15.0.1089.85 linux-image-ibm - 5.15.0.1089.85 linux-image-ibm-5.15 - 5.15.0.1089.85 linux-tools-ibm - 5.15.0.1089.85 linux-tools-ibm-5.15 - 5.15.0.1089.85 No subscription required linux-cloud-tools-nvidia - 5.15.0.1090.90 linux-cloud-tools-nvidia-5.15 - 5.15.0.1090.90 linux-cloud-tools-nvidia-lowlatency - 5.15.0.1090.90 linux-cloud-tools-nvidia-lowlatency-5.15 - 5.15.0.1090.90 linux-headers-nvidia - 5.15.0.1090.90 linux-headers-nvidia-5.15 - 5.15.0.1090.90 linux-headers-nvidia-lowlatency - 5.15.0.1090.90 linux-headers-nvidia-lowlatency-5.15 - 5.15.0.1090.90 linux-image-nvidia - 5.15.0.1090.90 linux-image-nvidia...
ubuntu noble v1.103
Metadata:
BOSH Agent Version: 2.759.0
Kernel Version: 6.8.0-85.85
USNs:
Title: USN-7764-1 -- Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7764-1
Priorities: medium
Description:
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - ARM64 architecture; - x86 architecture; - Compute Acceleration Framework; - Bus devices; - AMD CDX bus driver; - DPLL subsystem; - EFI core; - GPIO subsystem; - GPU drivers; - HID subsystem; - I2C subsystem; - InfiniBand drivers; - Multiple devices driver; - Network drivers; - Mellanox network drivers; - NVME drivers; - Pin controllers subsystem; - RapidIO drivers; - Voltage and Current Regulator drivers; - SCSI subsystem; - SLIMbus drivers; - QCOM SoC drivers; - UFS subsystem; - USB DSL drivers; - Renesas USBHS Controller drivers; - USB Type-C Connector System Software Interface driver; - Framebuffer layer; - ACRN Hypervisor Service Module driver; - Network file system (NFS) client; - Proc file system; - SMB network file system; - Memory Management; - Scheduler infrastructure; - SoC audio core drivers; - Perf events; - Tracing infrastructure; - Memory management; - 802.1Q VLAN protocol; - Asynchronous Transfer Mode (ATM) subsystem; - Bluetooth subsystem; - Devlink API; - IPv4 networking; - IPv6 networking; - Logical Link layer; - Management Component Transport Protocol (MCTP); - Multipath TCP; - Netfilter; - Network traffic control; - Switch device API; - Wireless networking; - eXpress Data Path; (CVE-2025-22008, CVE-2025-21872, CVE-2025-21945, CVE-2025-37889, CVE-2025-21997, CVE-2025-21935, CVE-2025-21986, CVE-2025-21890, CVE-2025-21925, CVE-2024-58090, CVE-2025-38569, CVE-2025-21911, CVE-2025-21957, CVE-2025-21891, CVE-2025-21924, CVE-2025-21956, CVE-2025-21994, CVE-2025-22013, CVE-2025-21964, CVE-2025-21909, CVE-2025-21888, CVE-2025-21918, CVE-2025-21981, CVE-2025-21966, CVE-2025-22011, CVE-2025-21877, CVE-2025-21913, CVE-2025-21895, CVE-2025-21929, CVE-2025-22010, CVE-2025-21992, CVE-2025-21930, CVE-2025-21982, CVE-2025-21894, CVE-2025-21934, CVE-2025-21873, CVE-2025-21914, CVE-2025-21941, CVE-2025-21962, CVE-2025-22014, CVE-2025-21905, CVE-2025-21908, CVE-2025-21898, CVE-2025-21878, CVE-2025-22009, CVE-2025-21961, CVE-2025-22015, CVE-2025-21883, CVE-2025-21916, CVE-2025-22016, CVE-2025-21936, CVE-2025-21947, CVE-2025-21927, CVE-2025-22004, CVE-2025-21926, CVE-2025-21969, CVE-2025-21976, CVE-2025-21912, CVE-2025-21920, CVE-2025-21951, CVE-2025-22005, CVE-2025-21978, CVE-2025-21975, CVE-2025-22007, CVE-2025-21928, CVE-2025-21968, CVE-2025-21963, CVE-2025-21977, CVE-2025-21915, CVE-2025-21980, CVE-2025-22047, CVE-2025-21972, CVE-2025-21892, CVE-2025-22003, CVE-2025-21979, CVE-2025-21944, CVE-2025-21880, CVE-2025-21899, CVE-2025-21995, CVE-2025-22017, CVE-2025-21946, CVE-2025-22001, CVE-2025-21904, CVE-2025-21881, CVE-2025-21917, CVE-2025-21970, CVE-2025-21889, CVE-2025-21922, CVE-2025-21875, CVE-2025-21919, CVE-2025-21991, CVE-2025-21967, CVE-2025-21960, CVE-2025-21959, CVE-2025-21955, CVE-2025-21996, CVE-2025-21950, CVE-2025-21937, CVE-2025-21948, CVE-2025-21903, CVE-2025-21885, CVE-2025-21999, CVE-2025-21910) Update Instructions: Run sudo pro fix USN-7764-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1023-gkeop - 6.8.0-1023.25 linux-cloud-tools-6.8.0-1023-gkeop - 6.8.0-1023.25 linux-cloud-tools-gkeop - 6.8.0-1023.25 linux-cloud-tools-gkeop-6.8 - 6.8.0-1023.25 linux-gkeop - 6.8.0-1023.25 linux-gkeop-6.8 - 6.8.0-1023.25 linux-gkeop-cloud-tools-6.8.0-1023 - 6.8.0-1023.25 linux-gkeop-headers-6.8.0-1023 - 6.8.0-1023.25 linux-gkeop-tools-6.8.0-1023 - 6.8.0-1023.25 linux-headers-6.8.0-1023-gkeop - 6.8.0-1023.25 linux-headers-gkeop - 6.8.0-1023.25 linux-headers-gkeop-6.8 - 6.8.0-1023.25 linux-image-6.8.0-1023-gkeop - 6.8.0-1023.25 linux-image-gkeop - 6.8.0-1023.25 linux-image-gkeop-6.8 - 6.8.0-1023.25 linux-image-unsigned-6.8.0-1023-gkeop - 6.8.0-1023.25 linux-modules-6.8.0-1023-gkeop - 6.8.0-1023.25 linux-modules-extra-6.8.0-1023-gkeop - 6.8.0-1023.25 linux-modules-extra-gkeop - 6.8.0-1023.25 linux-modules-extra-gkeop-6.8 - 6.8.0-1023.25 linux-tools-6.8.0-1023-gkeop - 6.8.0-1023.25 linux-tools-gkeop - 6.8.0-1023.25 linux-tools-gkeop-6.8 - 6.8.0-1023.25 No subscription required linux-buildinfo-6.8.0-1036-gke - 6.8.0-1036.40 linux-buildinfo-6.8.0-1036-gke-64k - 6.8.0-1036.40 linux-gke - 6.8.0-1036.40 linux-gke-6.8 - 6.8.0-1036.40 linux-gke-64k - 6.8.0-1036.40 linux-gke-64k-6.8 - 6.8.0-1036.40 linux-gke-headers-6.8.0-1036 - 6.8.0-1036.40 linux-gke-tools-6.8.0-1036 - 6.8.0-1036.40 linux-headers-6.8.0-1036-gke - 6.8.0-1036.40 linux-headers-6.8.0-1036-gke-64k - 6.8.0-1036.40 linux-headers-gke - 6.8.0-1036.40 linux-headers-gke-6.8 - 6.8.0-1036.40 linux-headers-gke-64k - 6.8.0-1036.40 linux-headers-gke-64k-6.8 - 6.8.0-1036.40 linux-image-6.8.0-1036-gke - 6.8.0-1036.40 linux-image-6.8.0-1036-gke-64k - 6.8.0-1036.40 linux-image-gke - 6.8.0-1036.40 linux-image-gke-6.8 - 6.8.0-1036.40 linux-image-gke-64k - 6.8.0-1036.40 linux-image-gke-64k-6.8 - 6.8.0-1036.40 linux-image-unsigned-6.8.0-1036-gke - 6.8.0-1036.40 linux-image-unsigned-6.8.0-1036-gke-64k - 6.8.0-1036.40 linux-modules-6.8.0-1036-gke - 6.8.0-1036.40 linux-modules-6.8.0-1036-gke-64k - 6.8.0-1036.40 linux-modules-extra-6.8.0-1036-gke - 6.8.0-1036.40 linux-modules-extra-6.8.0-1036-gke-64k - 6.8.0-1036.40 linux-modules-iwlwifi-6.8.0-1036-gke - 6.8.0-1036.40 linux-modules-iwlwifi-gke - 6.8.0-1036.40 linux-modules-iwlwifi-gke-6.8 - 6.8.0-1036.40 linux-tools-6.8.0-1036-gke - 6.8.0-1036.40 linux-tools-6.8.0-1036-gke-64k - 6.8.0-1036.40 linux-tools-gke - 6.8.0-1036.40 linux-tools-gke-6.8 - 6.8.0-1036.40 linux-tools-gke-64k - 6.8.0-1036.40 linux-tools-gke-64k-6.8 - 6.8.0-1036.40 No subscription required linux-aws-6.8 - 6.8.0-1039.41 linux-aws-64k-6.8 - 6.8.0-1039.41 linux-aws-64k-lts-24.04 - 6.8.0-1039.41 linux-aws-cloud-tools-6.8.0-1039 - 6.8.0-1039.41 linux-aws-headers-6.8.0-1039 - 6.8.0-1039.41 linux-aws-lts-24.04 - 6.8.0-1039.41 linux-aws-tools-6.8.0-1039 - 6.8.0-1039.41 linux-buildinfo-6.8.0-1039-aws - 6.8.0-1039.41 linux-buildinfo-6.8.0-1039-aws-64k - 6.8.0-1039.41 linux-cloud-tools-6.8.0-1039-aws - 6.8.0-1039.41 linux-cloud-tools-6.8.0-1039-aws-64k - 6.8.0-1039.41 linux-headers-6.8.0-1039-aws - 6.8.0-1039.41 linux-headers-6.8.0-1039-aws-64k - 6.8.0-1039.41 linux-headers-aws-6.8 - 6.8.0-1039.41 linux-headers-aws-64k-6.8 - 6.8.0-1039.41 linux-headers-aws-64k-lts-24.04 - 6.8.0-1039.41 linux-headers-aws-lts-24.04 - 6.8.0-1039.41 linux-image-6.8.0-1039-aws - 6.8.0-1039.41 linux-image-6.8.0-1039-aws-64k - 6.8.0-1039.41 linux-image-aws-6.8 - 6.8.0-1039.41 linux-image-aws-64k-6.8 - 6.8.0-1039.41 linux-image-aws-64k-lts-24.04 - 6.8.0-1039.41 linux-image-aws-lts-24.04 - 6.8.0-1039.41 linux-image-uc-6.8.0-1039-aws - 6.8.0-1039.41 linux-image-uc-6.8.0-1039-aws-64k - 6.8.0-1039.41 linux-image-uc-aws-6.8 - 6.8.0-1039.41 linux-image-uc-aws-lts-24.04 - 6.8.0-1039.41 linux-image-unsigned-6.8.0-1039-aws - 6.8.0-1039.41 linux-image-unsigned-6.8.0-1039-aws-64k - 6.8.0-1039.41 linux-modules-6.8.0-1039-aws - 6.8.0-1039.41 linux-modules-6.8.0-1039-aws-64k - 6.8.0-1039.41 linux-modules-extra-6.8.0-1039-aws - 6.8.0-1039.41 linux-modules-extra-6.8.0-1039-aws-64k - 6.8.0-1039.41 linux-modules-extra-aws-6.8 - 6.8.0-1039.41 linux-modules-extra-aws-64k-6.8 - 6.8.0-1039.41 linux-modules-extra-aws-64k-lts-24.04 - 6.8.0-1039.41 linux-modules-extra-aws-lts-24.04 - 6.8.0-1039.41 linux-tools-6.8.0-1039-aws - 6.8.0-1039.41 linux-tools-6.8.0-1039-aws-64k - 6.8.0-1039.41 linux-tools-aws-6.8 - 6.8.0-1039.41 linux-tools-aws-64k-6.8 - 6.8.0-1039.41 linux-tools-aws-64k-lts-24.04 - 6.8.0-1039.41 linux-tools-aws-lts-24.04 - 6.8.0-1039.41 No subscription required linux-buildinfo-6.8.0-1040-gcp - 6.8.0-1040.42 linux-buildinfo-6.8.0-1040-gcp-64k - 6.8.0-1040.42 linux-gcp-6.8 - 6.8.0-1040.42 linux-gcp-64k-6.8 - 6.8.0-1040.42 linux-gcp-64k-lts-24.04 - 6.8.0-1040.42 linux-gcp-headers-6.8.0-1040 - 6.8.0-1040.42 linux-gcp-lts-24.04 - 6.8.0-1040.42 linux-gcp-tools-6.8.0-1040 - 6.8.0-1040.42 linux-headers-6.8.0-1040-gcp - 6.8.0-1040.42 linux-headers-6.8.0-1040-gcp-64k - 6.8.0-1040.42 linux-headers-gcp-6.8 - 6.8.0-1040.42 linux-headers-gcp-64k-6.8 - 6.8.0-1040.42 linux-headers-gcp-64k-lts-24.04 - 6.8.0-1040.42 linux-headers-gcp-lts-24.04 - 6.8.0-1040.42 linux-image-6.8.0-1040-gcp - 6.8.0-1040.42 linux-image-6.8.0-1040-gcp-64k - 6.8.0-1040.42 linux-image-gcp-6.8 - 6.8.0-1040.42 linux-image-gcp-64k-6.8 - 6.8.0-1040.42 linux-image-gcp-64k-lts-24.04 - 6.8.0-1040.42 linux-image-gcp-lts-24.04 - 6.8.0-1040.42 linux-image-unsigned-6.8.0-1040-gcp - 6.8.0-1040.42 linux-image-unsigned-6.8.0-1040-gcp-64k - 6.8.0-1040.42 linux-modules-6.8.0-1040-gcp - 6.8.0-1040.42 linux-modules-6.8.0-1040-gcp-64k - 6.8.0-1040.42 linux-modules-extra-6.8.0-1040-gcp - 6.8.0-1040.42 linux-modules-extra-6.8.0-1040-gcp-64k - 6.8.0-1040.42 linux-modules-extra-gcp-6.8 - 6.8.0-1040.42 linux-modules-extra-gcp-64k-6.8 - 6.8.0-1040.42 linux-modules-extra-gcp-64k-lts-24.04 - 6.8.0-1040.42 linux-modules-extra-gcp-lts-24.04 - 6.8.0-1040.42 linux-tools-6.8.0-1040-gcp - 6.8.0-1040.42 linux-tools-6.8.0-1040-gcp-64k - 6.8.0-1040.42 linux-tools-gcp-6.8 - 6.8.0-1040.42 linux-tools-gcp-64k-6.8 - 6.8.0-1040.42 linux-tools-gcp-64k-lts-24.04 - 6.8.0-1040.42 linux-tools-gcp-lts-24.04 - 6.8.0-1040.42 No subscription required linux-bpf-dev - 6.8.0-84.84 linux-buildinfo-6.8.0-84-generic - 6.8.0-84.84 linux-buildinfo-6.8.0-84-generic-64k - 6.8.0-84.84 linux-cloud-tools-6.8.0-84 - 6.8.0-84.84 linux-cloud-tools-6.8.0-84-generic - 6.8.0-84.84 linux-cloud-tools-common - 6.8.0-84.84 linux-cloud-tools-generic - 6.8.0-84.84 linux-cloud-tools-generic-6.8 - 6.8.0-84.84 linux-cloud-tools-virtual - 6.8.0-84.84 linux-cloud-tools-virtual-6.8 - 6.8.0-8...
ubuntu jammy v1.926
🚨 This stemcell version should NOT be used🚨
It has a kernel regression that may cause CPU lockups: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2126434?mkt_tok=MDY2LUVPVi0zMzUAAAGdSgT2ZvEO-2pxTFOJDrrK9KAbRPHNRNX6ofWRQxkP_Zb8qh7EDFcMpGEXbWsRLwMGpuNc62TlpoH0eVcHql4l7PtHg76A1FkMOkN70758hvpsOcA
Metadata:
BOSH Agent Version: 2.759.0
Kernel Version: 5.15.0.157.155
USNs:
Title: USN-7786-1 -- OpenSSL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7786-1
Priorities: medium,low
Description:
Stanislav Fort discovered that OpenSSL incorrectly handled memory when trying to decrypt CMS messages encrypted with password-based encryption. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2025-9230) Stanislav Fort discovered that OpenSSL had a timing side-channel in SM2 signature computations on ARM platforms. A remote attacker could possibly use this issue to recover private data. This issue only affected Ubuntu 25.04. (CVE-2025-9231) Stanislav Fort discovered that OpenSSL incorrectly handled memory during HTTP requests when "no_proxy" environment variable is set. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 25.04. (CVE-2025-9232) Update Instructions: Run sudo pro fix USN-7786-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libssl-dev - 3.0.2-0ubuntu1.20 libssl-doc - 3.0.2-0ubuntu1.20 libssl3 - 3.0.2-0ubuntu1.20 openssl - 3.0.2-0ubuntu1.20 No subscription required
CVEs:
- https://ubuntu.com/security/CVE-2025-9231
- https://ubuntu.com/security/CVE-2025-9232
- https://ubuntu.com/security/CVE-2025-9230
Title: USN-7793-1 -- Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7793-1
Priorities: medium
Description:
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Network traffic control; - VMware vSockets driver; (CVE-2025-38477, CVE-2025-38618) Update Instructions: Run sudo pro fix USN-7793-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-5.15.0-1046-nvidia-tegra - 5.15.0-1046.46 linux-buildinfo-5.15.0-1046-nvidia-tegra-rt - 5.15.0-1046.46 linux-headers-5.15.0-1046-nvidia-tegra - 5.15.0-1046.46 linux-headers-5.15.0-1046-nvidia-tegra-rt - 5.15.0-1046.46 linux-image-5.15.0-1046-nvidia-tegra - 5.15.0-1046.46 linux-image-5.15.0-1046-nvidia-tegra-rt - 5.15.0-1046.46 linux-image-unsigned-5.15.0-1046-nvidia-tegra - 5.15.0-1046.46 linux-image-unsigned-5.15.0-1046-nvidia-tegra-rt - 5.15.0-1046.46 linux-modules-5.15.0-1046-nvidia-tegra - 5.15.0-1046.46 linux-modules-5.15.0-1046-nvidia-tegra-rt - 5.15.0-1046.46 linux-modules-extra-5.15.0-1046-nvidia-tegra - 5.15.0-1046.46 linux-nvidia-tegra-headers-5.15.0-1046 - 5.15.0-1046.46 linux-nvidia-tegra-tools-5.15.0-1046 - 5.15.0-1046.46 linux-tools-5.15.0-1046-nvidia-tegra - 5.15.0-1046.46 linux-tools-5.15.0-1046-nvidia-tegra-rt - 5.15.0-1046.46 No subscription required linux-buildinfo-5.15.0-1057-xilinx-zynqmp - 5.15.0-1057.61 linux-headers-5.15.0-1057-xilinx-zynqmp - 5.15.0-1057.61 linux-image-5.15.0-1057-xilinx-zynqmp - 5.15.0-1057.61 linux-modules-5.15.0-1057-xilinx-zynqmp - 5.15.0-1057.61 linux-tools-5.15.0-1057-xilinx-zynqmp - 5.15.0-1057.61 linux-xilinx-zynqmp-headers-5.15.0-1057 - 5.15.0-1057.61 linux-xilinx-zynqmp-tools-5.15.0-1057 - 5.15.0-1057.61 No subscription required linux-buildinfo-5.15.0-1076-gkeop - 5.15.0-1076.84 linux-cloud-tools-5.15.0-1076-gkeop - 5.15.0-1076.84 linux-gkeop-cloud-tools-5.15.0-1076 - 5.15.0-1076.84 linux-gkeop-headers-5.15.0-1076 - 5.15.0-1076.84 linux-gkeop-tools-5.15.0-1076 - 5.15.0-1076.84 linux-headers-5.15.0-1076-gkeop - 5.15.0-1076.84 linux-image-5.15.0-1076-gkeop - 5.15.0-1076.84 linux-image-unsigned-5.15.0-1076-gkeop - 5.15.0-1076.84 linux-modules-5.15.0-1076-gkeop - 5.15.0-1076.84 linux-modules-extra-5.15.0-1076-gkeop - 5.15.0-1076.84 linux-tools-5.15.0-1076-gkeop - 5.15.0-1076.84 No subscription required linux-buildinfo-5.15.0-1087-ibm - 5.15.0-1087.90 linux-buildinfo-5.15.0-1087-raspi - 5.15.0-1087.90 linux-headers-5.15.0-1087-ibm - 5.15.0-1087.90 linux-headers-5.15.0-1087-raspi - 5.15.0-1087.90 linux-ibm-cloud-tools-common - 5.15.0-1087.90 linux-ibm-headers-5.15.0-1087 - 5.15.0-1087.90 linux-ibm-source-5.15.0 - 5.15.0-1087.90 linux-ibm-tools-5.15.0-1087 - 5.15.0-1087.90 linux-ibm-tools-common - 5.15.0-1087.90 linux-image-5.15.0-1087-ibm - 5.15.0-1087.90 linux-image-5.15.0-1087-raspi - 5.15.0-1087.90 linux-image-unsigned-5.15.0-1087-ibm - 5.15.0-1087.90 linux-modules-5.15.0-1087-ibm - 5.15.0-1087.90 linux-modules-5.15.0-1087-raspi - 5.15.0-1087.90 linux-modules-extra-5.15.0-1087-ibm - 5.15.0-1087.90 linux-modules-extra-5.15.0-1087-raspi - 5.15.0-1087.90 linux-raspi-headers-5.15.0-1087 - 5.15.0-1087.90 linux-raspi-tools-5.15.0-1087 - 5.15.0-1087.90 linux-tools-5.15.0-1087-ibm - 5.15.0-1087.90 linux-tools-5.15.0-1087-raspi - 5.15.0-1087.90 No subscription required linux-buildinfo-5.15.0-1088-nvidia - 5.15.0-1088.89 linux-buildinfo-5.15.0-1088-nvidia-lowlatency - 5.15.0-1088.89 linux-cloud-tools-5.15.0-1088-nvidia - 5.15.0-1088.89 linux-cloud-tools-5.15.0-1088-nvidia-lowlatency - 5.15.0-1088.89 linux-headers-5.15.0-1088-nvidia - 5.15.0-1088.89 linux-headers-5.15.0-1088-nvidia-lowlatency - 5.15.0-1088.89 linux-image-5.15.0-1088-nvidia - 5.15.0-1088.89 linux-image-5.15.0-1088-nvidia-lowlatency - 5.15.0-1088.89 linux-image-unsigned-5.15.0-1088-nvidia - 5.15.0-1088.89 linux-image-unsigned-5.15.0-1088-nvidia-lowlatency - 5.15.0-1088.89 linux-modules-5.15.0-1088-nvidia - 5.15.0-1088.89 linux-modules-5.15.0-1088-nvidia-lowlatency - 5.15.0-1088.89 linux-modules-extra-5.15.0-1088-nvidia - 5.15.0-1088.89 linux-modules-nvidia-fs-5.15.0-1088-nvidia - 5.15.0-1088.89 linux-modules-nvidia-fs-5.15.0-1088-nvidia-lowlatency - 5.15.0-1088.89 linux-nvidia-cloud-tools-5.15.0-1088 - 5.15.0-1088.89 linux-nvidia-cloud-tools-common - 5.15.0-1088.89 linux-nvidia-headers-5.15.0-1088 - 5.15.0-1088.89 linux-nvidia-tools-5.15.0-1088 - 5.15.0-1088.89 linux-nvidia-tools-common - 5.15.0-1088.89 linux-nvidia-tools-host - 5.15.0-1088.89 linux-tools-5.15.0-1088-nvidia - 5.15.0-1088.89 linux-tools-5.15.0-1088-nvidia-lowlatency - 5.15.0-1088.89 No subscription required linux-buildinfo-5.15.0-1088-intel-iotg - 5.15.0-1088.94 linux-cloud-tools-5.15.0-1088-intel-iotg - 5.15.0-1088.94 linux-headers-5.15.0-1088-intel-iotg - 5.15.0-1088.94 linux-image-5.15.0-1088-intel-iotg - 5.15.0-1088.94 linux-image-unsigned-5.15.0-1088-intel-iotg - 5.15.0-1088.94 linux-intel-iotg-cloud-tools-5.15.0-1088 - 5.15.0-1088.94 linux-intel-iotg-cloud-tools-common - 5.15.0-1088.94 linux-intel-iotg-headers-5.15.0-1088 - 5.15.0-1088.94 linux-intel-iotg-tools-5.15.0-1088 - 5.15.0-1088.94 linux-intel-iotg-tools-common - 5.15.0-1088.94 linux-intel-iotg-tools-host - 5.15.0-1088.94 linux-modules-5.15.0-1088-intel-iotg - 5.15.0-1088.94 linux-modules-extra-5.15.0-1088-intel-iotg - 5.15.0-1088.94 linux-modules-iwlwifi-5.15.0-1088-intel-iotg - 5.15.0-1088.94 linux-tools-5.15.0-1088-intel-iotg - 5.15.0-1088.94 No subscription required linux-buildinfo-5.15.0-1091-oracle - 5.15.0-1091.97 linux-headers-5.15.0-1091-oracle - 5.15.0-1091.97 linux-image-5.15.0-1091-oracle - 5.15.0-1091.97 linux-image-unsigned-5.15.0-1091-oracle - 5.15.0-1091.97 linux-modules-5.15.0-1091-oracle - 5.15.0-1091.97 linux-modules-extra-5.15.0-1091-oracle - 5.15.0-1091.97 linux-oracle-headers-5.15.0-1091 - 5.15.0-1091.97 linux-oracle-tools-5.15.0-1091 - 5.15.0-1091.97 linux-tools-5.15.0-1091-oracle - 5.15.0-1091.97 No subscription required linux-aws-cloud-tools-5.15.0-1093 - 5.15.0-1093.100 linux-aws-headers-5.15.0-1093 - 5.15.0-1093.100 linux-aws-tools-5.15.0-1093 - 5.15.0-1093.100 linux-buildinfo-5.15.0-1093-aws - 5.15.0-1093.100 linux-buildinfo-5.15.0-1093-aws-64k - 5.15.0-1093.100 linux-cloud-tools-5.15.0-1093-aws - 5.15.0-1093.100 linux-cloud-tools-5.15.0-1093-aws-64k - 5.15.0-1093.100 linux-headers-5.15.0-1093-aws - 5.15.0-1093.100 linux-headers-5.15.0-1093-aws-64k - 5.15.0-1093.100 linux-image-5.15.0-1093-aws - 5.15.0-1093.100 linux-image-5.15.0-1093-aws-64k - 5.15.0-1093.100 linux-image-unsigned-5.15.0-1093-aws - 5.15.0-1093.100 linux-image-unsigned-5.15.0-1093-aws-64k - 5.15.0-1093.100 linux-modules-5.15.0-1093-aws - 5.15.0-1093.100 linux-modules-5.15.0-1093-aws-64k - 5.15.0-1093.100 linux-modules-extra-5.15.0-1093-aws - 5.15.0-1093.100 linux-modules-extra-5.15.0-1093-aws-64k - 5.15.0-1093.100 linux-tools-5.15.0-1093-aws - 5.15.0-1093.100 linux-tools-5.15.0-1093-aws-64k - 5.15.0-1093.100 No subscription required linux-buildinfo-5.15.0-1093-gcp - 5.15.0-1093.102 linux-gcp-headers-5.15.0-1093 - 5.15.0-1093.102 linux-gcp-tools-5.15.0-1093 - 5.15.0-1093.102 linux-headers-5.15.0-1093-gcp - 5.15.0-1093.102 linux-image-5.15.0-1093-gcp - 5.15.0-1093.102 linux-image-unsigned-5.15.0-1093-gcp - 5.15.0-1093.102 linux-modules-5.15.0-1093-gcp - 5.15.0-1093.102 linux-modules-extra-5.15.0-1093-gcp - 5.15.0-1093.102 linux-tools-5.15.0-1093-gcp - 5.15.0-1093.102 No subscription required linux-buildinfo-5.15.0-157-generic - 5.15.0-157.167 linux-buildinfo-5.15.0-157-generic-64k - 5.15.0-157.167 linux-buildinfo-5.15.0-157-generic-lpae - 5.15.0-157.167 linux-buildinfo-5.15.0-157-lowlatency - 5.15.0-157.167 linux-buildinfo-5.15.0-157-lowlatency-64k - 5.15.0-157.167 linux-cloud-tools-5.15.0-157 - 5.15.0-157.167 linux-cloud-tools-5.15.0-157-generic - 5.15.0-157.167 linux-cloud-tools-5.15.0-157-lowlatency - 5.15.0-157.167 linux-cloud-tools-common - 5.15.0-157.167 linux-doc - 5.15.0-157.167 linux-headers-5.15.0-157 - 5.15.0-157.167 linux-headers-5.15.0-157-generic - 5.15.0-157.167 linux-headers-5.15.0-157-generic-64k - 5.15.0-157.167 linux-headers-5.15.0-15...
ubuntu jammy v1.918
🚨 This stemcell version should NOT be used🚨
It has a kernel regression that may cause CPU lockups: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2126434?mkt_tok=MDY2LUVPVi0zMzUAAAGdSgT2ZvEO-2pxTFOJDrrK9KAbRPHNRNX6ofWRQxkP_Zb8qh7EDFcMpGEXbWsRLwMGpuNc62TlpoH0eVcHql4l7PtHg76A1FkMOkN70758hvpsOcA
We will ship another stemcell as soon as Canonical fixes the issue.
Metadata:
BOSH Agent Version: 2.759.0
Kernel Version: 5.15.0.156.154
USNs:
Title: USN-7760-1 -- GNU C Library vulnerability
URL: https://ubuntu.com/security/notices/USN-7760-1
Priorities: medium
Description:
It was discovered that the GNU C Library incorrectly handled the regcomp function when memory allocation failures occured. An attacker could use this issue to cause applications to crash, leading to a denial of service, or possibly execute arbitrary code. Update Instructions: Run sudo pro fix USN-7760-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: glibc-doc - 2.35-0ubuntu3.11 glibc-source - 2.35-0ubuntu3.11 libc-bin - 2.35-0ubuntu3.11 libc-dev-bin - 2.35-0ubuntu3.11 libc-devtools - 2.35-0ubuntu3.11 libc6 - 2.35-0ubuntu3.11 libc6-amd64 - 2.35-0ubuntu3.11 libc6-dev - 2.35-0ubuntu3.11 libc6-dev-amd64 - 2.35-0ubuntu3.11 libc6-dev-i386 - 2.35-0ubuntu3.11 libc6-dev-s390 - 2.35-0ubuntu3.11 libc6-dev-x32 - 2.35-0ubuntu3.11 libc6-i386 - 2.35-0ubuntu3.11 libc6-prof - 2.35-0ubuntu3.11 libc6-s390 - 2.35-0ubuntu3.11 libc6-x32 - 2.35-0ubuntu3.11 locales - 2.35-0ubuntu3.11 locales-all - 2.35-0ubuntu3.11 nscd - 2.35-0ubuntu3.11 No subscription required
CVEs:
Title: USN-7774-1 -- Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7774-1
Priorities: medium,high
Description:
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - PowerPC architecture; - x86 architecture; - ACPI drivers; - Serial ATA and Parallel ATA drivers; - Drivers core; - ATA over ethernet (AOE) driver; - Network block device driver; - Bus devices; - Clock framework and drivers; - Hardware crypto device drivers; - DMA engine subsystem; - EDAC drivers; - GPU drivers; - HID subsystem; - InfiniBand drivers; - Input Device (Miscellaneous) drivers; - Multiple devices driver; - Media drivers; - VMware VMCI Driver; - MMC subsystem; - MTD block device drivers; - Network drivers; - Pin controllers subsystem; - x86 platform drivers; - PTP clock framework; - RapidIO drivers; - Voltage and Current Regulator drivers; - Remote Processor subsystem; - S/390 drivers; - SCSI subsystem; - ASPEED SoC drivers; - TCM subsystem; - Thermal drivers; - Thunderbolt and USB4 drivers; - TTY drivers; - UFS subsystem; - USB Gadget drivers; - Renesas USBHS Controller drivers; - USB Type-C support driver; - Virtio Host (VHOST) subsystem; - Backlight driver; - Framebuffer layer; - BTRFS file system; - File systems infrastructure; - Ext4 file system; - F2FS file system; - JFFS2 file system; - JFS file system; - Network file system (NFS) client; - Network file system (NFS) server daemon; - NTFS3 file system; - DRM display driver; - Memory Management; - Mellanox drivers; - Memory management; - Netfilter; - Network sockets; - IPC subsystem; - BPF subsystem; - Perf events; - Kernel exit() syscall; - Restartable seuqences system call mechanism; - Timer subsystem; - Tracing infrastructure; - Appletalk network protocol; - Asynchronous Transfer Mode (ATM) subsystem; - Networking core; - IPv6 networking; - MultiProtocol Label Switching driver; - NetLabel subsystem; - Netlink; - NFC subsystem; - Open vSwitch; - Rose network layer; - RxRPC session sockets; - Network traffic control; - TIPC protocol; - VMware vSockets driver; - USB sound devices; (CVE-2025-38465, CVE-2025-38386, CVE-2025-38273, CVE-2025-38227, CVE-2025-38107, CVE-2025-37958, CVE-2025-38371, CVE-2025-38328, CVE-2025-38348, CVE-2025-38100, CVE-2025-38336, CVE-2025-38420, CVE-2025-38154, CVE-2025-38542, CVE-2025-38222, CVE-2025-38406, CVE-2025-37948, CVE-2025-38112, CVE-2025-38145, CVE-2025-38163, CVE-2025-38464, CVE-2025-38085, CVE-2025-38342, CVE-2025-38310, CVE-2025-38326, CVE-2025-38418, CVE-2025-38362, CVE-2025-38412, CVE-2025-38219, CVE-2025-38332, CVE-2025-38387, CVE-2025-38262, CVE-2025-38157, CVE-2025-38514, CVE-2025-38466, CVE-2025-38313, CVE-2025-38159, CVE-2024-44939, CVE-2025-38352, CVE-2025-38459, CVE-2025-38419, CVE-2025-38086, CVE-2025-38298, CVE-2025-38146, CVE-2025-38181, CVE-2025-38448, CVE-2025-38231, CVE-2025-38461, CVE-2025-38251, CVE-2025-38391, CVE-2025-38515, CVE-2024-26726, CVE-2025-38462, CVE-2025-38416, CVE-2025-38280, CVE-2025-38226, CVE-2025-38211, CVE-2025-38120, CVE-2025-38377, CVE-2025-38147, CVE-2025-38204, CVE-2025-38345, CVE-2025-38424, CVE-2025-38203, CVE-2025-38443, CVE-2025-38197, CVE-2025-38067, CVE-2025-38400, CVE-2025-38229, CVE-2025-38108, CVE-2025-38319, CVE-2025-38445, CVE-2025-38212, CVE-2025-38184, CVE-2025-38363, CVE-2025-38160, CVE-2024-57883, CVE-2025-38441, CVE-2025-38320, CVE-2025-38393, CVE-2025-38200, CVE-2025-38467, CVE-2025-38444, CVE-2025-38194, CVE-2025-38460, CVE-2025-38167, CVE-2025-38428, CVE-2025-38312, CVE-2025-38111, CVE-2025-38498, CVE-2025-38135, CVE-2025-38237, CVE-2025-38457, CVE-2025-38401, CVE-2025-38206, CVE-2025-38293, CVE-2025-38143, CVE-2025-38161, CVE-2025-38136, CVE-2022-48703, CVE-2025-38513, CVE-2025-38430, CVE-2025-38384, CVE-2025-38346, CVE-2025-38337, CVE-2025-38088, CVE-2025-38257, CVE-2025-38395, CVE-2025-38153, CVE-2025-38263, CVE-2025-38218, CVE-2024-26775, CVE-2025-38305, CVE-2025-38119, CVE-2025-38389, CVE-2025-38102, CVE-2025-38074, CVE-2025-38173, CVE-2025-38138, CVE-2025-38103, CVE-2025-38286, CVE-2025-38458, CVE-2025-38174, CVE-2025-38245, CVE-2025-38084, CVE-2025-38415, CVE-2025-38516, CVE-2025-38090, CVE-2025-38439, CVE-2025-38403, CVE-2025-38115, CVE-2025-38344, CVE-2025-38410, CVE-2025-38375, CVE-2025-37963, CVE-2025-38249, CVE-2025-38324, CVE-2025-38122, CVE-2025-38540, CVE-2025-38399, CVE-2025-21888, CVE-2025-38285) Update Instructions: Run sudo pro fix USN-7774-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-5.15.0-1045-nvidia-tegra - 5.15.0-1045.45 linux-buildinfo-5.15.0-1045-nvidia-tegra-rt - 5.15.0-1045.45 linux-headers-5.15.0-1045-nvidia-tegra - 5.15.0-1045.45 linux-headers-5.15.0-1045-nvidia-tegra-rt - 5.15.0-1045.45 linux-image-5.15.0-1045-nvidia-tegra - 5.15.0-1045.45 linux-image-5.15.0-1045-nvidia-tegra-rt - 5.15.0-1045.45 linux-image-unsigned-5.15.0-1045-nvidia-tegra - 5.15.0-1045.45 linux-image-unsigned-5.15.0-1045-nvidia-tegra-rt - 5.15.0-1045.45 linux-modules-5.15.0-1045-nvidia-tegra - 5.15.0-1045.45 linux-modules-5.15.0-1045-nvidia-tegra-rt - 5.15.0-1045.45 linux-modules-extra-5.15.0-1045-nvidia-tegra - 5.15.0-1045.45 linux-nvidia-tegra-headers-5.15.0-1045 - 5.15.0-1045.45 linux-nvidia-tegra-tools-5.15.0-1045 - 5.15.0-1045.45 linux-tools-5.15.0-1045-nvidia-tegra - 5.15.0-1045.45 linux-tools-5.15.0-1045-nvidia-tegra-rt - 5.15.0-1045.45 No subscription required linux-buildinfo-5.15.0-1056-xilinx-zynqmp - 5.15.0-1056.60 linux-headers-5.15.0-1056-xilinx-zynqmp - 5.15.0-1056.60 linux-image-5.15.0-1056-xilinx-zynqmp - 5.15.0-1056.60 linux-modules-5.15.0-1056-xilinx-zynqmp - 5.15.0-1056.60 linux-tools-5.15.0-1056-xilinx-zynqmp - 5.15.0-1056.60 linux-xilinx-zynqmp-headers-5.15.0-1056 - 5.15.0-1056.60 linux-xilinx-zynqmp-tools-5.15.0-1056 - 5.15.0-1056.60 No subscription required linux-buildinfo-5.15.0-1075-gkeop - 5.15.0-1075.83 linux-cloud-tools-5.15.0-1075-gkeop - 5.15.0-1075.83 linux-gkeop-cloud-tools-5.15.0-1075 - 5.15.0-1075.83 linux-gkeop-headers-5.15.0-1075 - 5.15.0-1075.83 linux-gkeop-tools-5.15.0-1075 - 5.15.0-1075.83 linux-headers-5.15.0-1075-gkeop - 5.15.0-1075.83 linux-image-5.15.0-1075-gkeop - 5.15.0-1075.83 linux-image-unsigned-5.15.0-1075-gkeop - 5.15.0-1075.83 linux-modules-5.15.0-1075-gkeop - 5.15.0-1075.83 linux-modules-extra-5.15.0-1075-gkeop - 5.15.0-1075.83 linux-tools-5.15.0-1075-gkeop - 5.15.0-1075.83 No subscription required linux-buildinfo-5.15.0-1086-ibm - 5.15.0-1086.89 linux-buildinfo-5.15.0-1086-raspi - 5.15.0-1086.89 linux-headers-5.15.0-1086-ibm - 5.15.0-1086.89 linux-headers-5.15.0-1086-raspi - 5.15.0-1086.89 linux-ibm-cloud-tools-common - 5.15.0-1086.89 linux-ibm-headers-5.15.0-1086 - 5.15.0-1086.89 linux-ibm-source-5.15.0 - 5.15.0-1086.89 linux-ibm-tools-5.15.0-1086 - 5.15.0-1086.89 linux-ibm-tools-common - 5.15.0-1086.89 linux-image-5.15.0-1086-ibm - 5.15.0-1086.89 linux-image-5.15.0-1086-raspi - 5.15.0-1086.89 linux-image-unsigned-5.15.0-1086-ibm - 5.15.0-1086.89 linux-modules-5.15.0-1086-ibm - 5.15.0-1086.89 linux-modules-5.15.0-1086-raspi - 5.15.0-1086.89 linux-modules-extra-5.15.0-1086-ibm - 5.15.0-1086.89 linux-modules-extra-5.15.0-1086-raspi - 5.15.0-1086.89 linux-raspi-headers-5.15.0-1086 - 5.15.0-1086.89 linux-raspi-tools-5.15.0-1086 - 5.15.0-1086.89 linux-tools-5.15.0-1086-ibm - 5.15.0-1086.89 linux-tools-5.15.0-1086-raspi - 5.15.0-1086.89 No subscription required linux-buildinfo-5.15.0-1087-nvidia - 5.15.0-1087.88 linux-buildinfo-5.15.0-1087-nvidia-lowlatency - 5.15.0-1087.88 linux-cloud-tools-5.15.0-1087-nvidia - 5.15.0-1087.88 linux-cloud-tools-5.15.0-1087-nvidia-lowlatency - 5.15.0-1087.88 linux-headers-5.15.0-1087-nvidia - 5.15.0-1087.88 linux-headers-5.15.0-1087-nvidia-lowlatency - 5.15.0-1087.88 linux-image-5.15.0-1087-nvidia - 5.15.0-1087.88 linux-image-5.15.0-1087-nvidia-lowlatency - 5.15.0-1087.88 linux-image-unsigned-5.15.0-1087-nvidia - 5.15.0-1087.88 linux-image-unsigned-5.15.0-1087-nvidia-lowlatency - 5.15.0-1087.88 linux-modules-5.15.0-1087-nvidia - 5.15.0-1087.88 linux-modules-5.15.0-1087-nvidia-lowlatency - 5.15.0-1087.88 linux-modules-extra-5.15.0-1087-nvidia - 5...
ubuntu noble v1.90
Metadata:
BOSH Agent Version: 2.759.0
Kernel Version: 6.8.0-83.83
USNs:
Title: USN-7743-1 -- libxml2 vulnerability
URL: https://ubuntu.com/security/notices/USN-7743-1
Priorities: medium
Description:
Nikita Sveshnikov discovered that libxml2 incorrectly handled recursion when processing XPath expressions. An attacker could possibly use this issue to cause a denial of service. Update Instructions: Run sudo pro fix USN-7743-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libxml2 - 2.9.14+dfsg-1.3ubuntu3.5 libxml2-dev - 2.9.14+dfsg-1.3ubuntu3.5 libxml2-doc - 2.9.14+dfsg-1.3ubuntu3.5 libxml2-utils - 2.9.14+dfsg-1.3ubuntu3.5 python3-libxml2 - 2.9.14+dfsg-1.3ubuntu3.5 No subscription required
CVEs:
Title: USN-7748-1 -- Vim vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7748-1
Priorities: medium
Description:
It was discovered that Vim incorrectly handled file extraction when opening maliciously crafted zip or tar archives. An attacker could possibly use this issue to create or overwrite files on the system and execute arbitrary code. Update Instructions: Run sudo pro fix USN-7748-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: vim - 2:9.1.0016-1ubuntu7.9 vim-athena - 2:9.1.0016-1ubuntu7.9 vim-common - 2:9.1.0016-1ubuntu7.9 vim-doc - 2:9.1.0016-1ubuntu7.9 vim-gtk3 - 2:9.1.0016-1ubuntu7.9 vim-gui-common - 2:9.1.0016-1ubuntu7.9 vim-motif - 2:9.1.0016-1ubuntu7.9 vim-nox - 2:9.1.0016-1ubuntu7.9 vim-runtime - 2:9.1.0016-1ubuntu7.9 vim-tiny - 2:9.1.0016-1ubuntu7.9 xxd - 2:9.1.0016-1ubuntu7.9 No subscription required
CVEs:
Title: USN-7751-1 -- SQLite vulnerability
URL: https://ubuntu.com/security/notices/USN-7751-1
Priorities: medium
Description:
It was discovered that the FTS5 SQLite extension incorrectly calculated certain array lengths. An attacker could use this issue to cause SQLite to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run sudo pro fix USN-7751-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: lemon - 3.45.1-1ubuntu2.5 libsqlite3-0 - 3.45.1-1ubuntu2.5 libsqlite3-dev - 3.45.1-1ubuntu2.5 libsqlite3-tcl - 3.45.1-1ubuntu2.5 sqlite3 - 3.45.1-1ubuntu2.5 sqlite3-doc - 3.45.1-1ubuntu2.5 sqlite3-tools - 3.45.1-1ubuntu2.5 No subscription required
CVEs:
Full Changelog: ubuntu-noble/v1.77...ubuntu-noble/v1.90
ubuntu jammy v1.915
Metadata:
BOSH Agent Version: 2.759.0
Kernel Version: 5.15.0.153.153
USNs:
Title: USN-7743-1 -- libxml2 vulnerability
URL: https://ubuntu.com/security/notices/USN-7743-1
Priorities: medium
Description:
Nikita Sveshnikov discovered that libxml2 incorrectly handled recursion when processing XPath expressions. An attacker could possibly use this issue to cause a denial of service. Update Instructions: Run sudo pro fix USN-7743-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libxml2 - 2.9.13+dfsg-1ubuntu0.9 libxml2-dev - 2.9.13+dfsg-1ubuntu0.9 libxml2-doc - 2.9.13+dfsg-1ubuntu0.9 libxml2-utils - 2.9.13+dfsg-1ubuntu0.9 python3-libxml2 - 2.9.13+dfsg-1ubuntu0.9 No subscription required
CVEs:
ubuntu noble v1.77
Metadata:
BOSH Agent Version: 2.759.0
Kernel Version: 6.8.0-78.78
USNs:
Title: USN-7595-1 -- Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7595-1
Priorities: medium
Description:
It was discovered that the CIFS network file system implementation in the Linux kernel did not properly verify the target namespace when handling upcalls. An attacker could use this to expose sensitive information. (CVE-2025-2312) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - GPIO subsystem; - GPU drivers; - InfiniBand drivers; - IRQ chip drivers; - Network drivers; - Mellanox network drivers; - i.MX PM domains; - SCSI subsystem; - USB Serial drivers; - AFS file system; - GFS2 file system; - File systems infrastructure; - File system notification infrastructure; - Overlay file system; - Proc file system; - SMB network file system; - Timer subsystem; - Kernel CPU control infrastructure; - Memory management; - Networking core; - DCCP (Datagram Congestion Control Protocol); - IPv6 networking; - IEEE 802.15.4 subsystem; - Open vSwitch; - Network traffic control; - VMware vSockets driver; (CVE-2025-21943, CVE-2025-21672, CVE-2024-57952, CVE-2024-57949, CVE-2025-21683, CVE-2025-21690, CVE-2025-21699, CVE-2025-21676, CVE-2024-57924, CVE-2025-21694, CVE-2024-57948, CVE-2025-21675, CVE-2024-57951, CVE-2025-21692, CVE-2025-21684, CVE-2025-21668, CVE-2025-21665, CVE-2025-21667, CVE-2025-21670, CVE-2025-21674, CVE-2025-21697, CVE-2024-53124, CVE-2025-21666, CVE-2025-21682, CVE-2025-21680, CVE-2025-21681, CVE-2025-21691, CVE-2025-21669, CVE-2025-21673, CVE-2024-50157, CVE-2025-21689, CVE-2025-21678) Update Instructions: Run sudo pro fix USN-7595-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1013-gkeop - 6.8.0-1013.15 linux-cloud-tools-6.8.0-1013-gkeop - 6.8.0-1013.15 linux-cloud-tools-gkeop - 6.8.0-1013.15 linux-cloud-tools-gkeop-6.8 - 6.8.0-1013.15 linux-gkeop - 6.8.0-1013.15 linux-gkeop-6.8 - 6.8.0-1013.15 linux-gkeop-cloud-tools-6.8.0-1013 - 6.8.0-1013.15 linux-gkeop-headers-6.8.0-1013 - 6.8.0-1013.15 linux-gkeop-tools-6.8.0-1013 - 6.8.0-1013.15 linux-headers-6.8.0-1013-gkeop - 6.8.0-1013.15 linux-headers-gkeop - 6.8.0-1013.15 linux-headers-gkeop-6.8 - 6.8.0-1013.15 linux-image-6.8.0-1013-gkeop - 6.8.0-1013.15 linux-image-gkeop - 6.8.0-1013.15 linux-image-gkeop-6.8 - 6.8.0-1013.15 linux-image-unsigned-6.8.0-1013-gkeop - 6.8.0-1013.15 linux-modules-6.8.0-1013-gkeop - 6.8.0-1013.15 linux-modules-extra-6.8.0-1013-gkeop - 6.8.0-1013.15 linux-modules-extra-gkeop - 6.8.0-1013.15 linux-modules-extra-gkeop-6.8 - 6.8.0-1013.15 linux-tools-6.8.0-1013-gkeop - 6.8.0-1013.15 linux-tools-gkeop - 6.8.0-1013.15 linux-tools-gkeop-6.8 - 6.8.0-1013.15 No subscription required linux-buildinfo-6.8.0-1026-gke - 6.8.0-1026.30 linux-gke - 6.8.0-1026.30 linux-gke-headers-6.8.0-1026 - 6.8.0-1026.30 linux-gke-tools-6.8.0-1026 - 6.8.0-1026.30 linux-headers-6.8.0-1026-gke - 6.8.0-1026.30 linux-headers-gke - 6.8.0-1026.30 linux-image-6.8.0-1026-gke - 6.8.0-1026.30 linux-image-gke - 6.8.0-1026.30 linux-image-unsigned-6.8.0-1026-gke - 6.8.0-1026.30 linux-modules-6.8.0-1026-gke - 6.8.0-1026.30 linux-modules-extra-6.8.0-1026-gke - 6.8.0-1026.30 linux-modules-iwlwifi-6.8.0-1026-gke - 6.8.0-1026.30 linux-modules-iwlwifi-gke - 6.8.0-1026.30 linux-tools-6.8.0-1026-gke - 6.8.0-1026.30 linux-tools-gke - 6.8.0-1026.30 No subscription required linux-buildinfo-6.8.0-1027-ibm - 6.8.0-1027.27 linux-headers-6.8.0-1027-ibm - 6.8.0-1027.27 linux-headers-ibm - 6.8.0-1027.27 linux-headers-ibm-classic - 6.8.0-1027.27 linux-headers-ibm-lts-24.04 - 6.8.0-1027.27 linux-ibm - 6.8.0-1027.27 linux-ibm-classic - 6.8.0-1027.27 linux-ibm-headers-6.8.0-1027 - 6.8.0-1027.27 linux-ibm-lts-24.04 - 6.8.0-1027.27 linux-ibm-tools-6.8.0-1027 - 6.8.0-1027.27 linux-image-6.8.0-1027-ibm - 6.8.0-1027.27 linux-image-ibm - 6.8.0-1027.27 linux-image-ibm-classic - 6.8.0-1027.27 linux-image-ibm-lts-24.04 - 6.8.0-1027.27 linux-image-unsigned-6.8.0-1027-ibm - 6.8.0-1027.27 linux-modules-6.8.0-1027-ibm - 6.8.0-1027.27 linux-modules-extra-6.8.0-1027-ibm - 6.8.0-1027.27 linux-modules-iwlwifi-6.8.0-1027-ibm - 6.8.0-1027.27 linux-modules-iwlwifi-ibm - 6.8.0-1027.27 linux-modules-iwlwifi-ibm-classic - 6.8.0-1027.27 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1027.27 linux-tools-6.8.0-1027-ibm - 6.8.0-1027.27 linux-tools-ibm - 6.8.0-1027.27 linux-tools-ibm-classic - 6.8.0-1027.27 linux-tools-ibm-lts-24.04 - 6.8.0-1027.27 No subscription required linux-buildinfo-6.8.0-1029-oem - 6.8.0-1029.29 linux-headers-6.8.0-1029-oem - 6.8.0-1029.29 linux-headers-oem-24.04 - 6.8.0-1029.29 linux-headers-oem-24.04a - 6.8.0-1029.29 linux-image-6.8.0-1029-oem - 6.8.0-1029.29 linux-image-oem-24.04 - 6.8.0-1029.29 linux-image-oem-24.04a - 6.8.0-1029.29 linux-image-uc-6.8.0-1029-oem - 6.8.0-1029.29 linux-image-uc-oem-24.04 - 6.8.0-1029.29 linux-image-uc-oem-24.04a - 6.8.0-1029.29 linux-image-unsigned-6.8.0-1029-oem - 6.8.0-1029.29 linux-modules-6.8.0-1029-oem - 6.8.0-1029.29 linux-modules-ipu6-6.8.0-1029-oem - 6.8.0-1029.29 linux-modules-ipu6-oem-24.04 - 6.8.0-1029.29 linux-modules-ipu6-oem-24.04a - 6.8.0-1029.29 linux-modules-iwlwifi-6.8.0-1029-oem - 6.8.0-1029.29 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1029.29 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1029.29 linux-modules-usbio-6.8.0-1029-oem - 6.8.0-1029.29 linux-modules-usbio-oem-24.04 - 6.8.0-1029.29 linux-modules-usbio-oem-24.04a - 6.8.0-1029.29 linux-oem-24.04 - 6.8.0-1029.29 linux-oem-24.04a - 6.8.0-1029.29 linux-oem-6.8-headers-6.8.0-1029 - 6.8.0-1029.29 linux-oem-6.8-tools-6.8.0-1029 - 6.8.0-1029.29 linux-tools-6.8.0-1029-oem - 6.8.0-1029.29 linux-tools-oem-24.04 - 6.8.0-1029.29 linux-tools-oem-24.04a - 6.8.0-1029.29 No subscription required linux-buildinfo-6.8.0-1029-nvidia - 6.8.0-1029.32 linux-buildinfo-6.8.0-1029-nvidia-64k - 6.8.0-1029.32 linux-cloud-tools-nvidia - 6.8.0-1029.32 linux-headers-6.8.0-1029-nvidia - 6.8.0-1029.32 linux-headers-6.8.0-1029-nvidia-64k - 6.8.0-1029.32 linux-headers-nvidia - 6.8.0-1029.32 linux-headers-nvidia-64k - 6.8.0-1029.32 linux-image-6.8.0-1029-nvidia - 6.8.0-1029.32 linux-image-6.8.0-1029-nvidia-64k - 6.8.0-1029.32 linux-image-nvidia - 6.8.0-1029.32 linux-image-nvidia-64k - 6.8.0-1029.32 linux-image-uc-6.8.0-1029-nvidia - 6.8.0-1029.32 linux-image-uc-6.8.0-1029-nvidia-64k - 6.8.0-1029.32 linux-image-unsigned-6.8.0-1029-nvidia - 6.8.0-1029.32 linux-image-unsigned-6.8.0-1029-nvidia-64k - 6.8.0-1029.32 linux-modules-6.8.0-1029-nvidia - 6.8.0-1029.32 linux-modules-6.8.0-1029-nvidia-64k - 6.8.0-1029.32 linux-modules-extra-6.8.0-1029-nvidia - 6.8.0-1029.32 linux-modules-nvidia-fs-6.8.0-1029-nvidia - 6.8.0-1029.32 linux-modules-nvidia-fs-6.8.0-1029-nvidia-64k - 6.8.0-1029.32 linux-modules-nvidia-fs-nvidia - 6.8.0-1029.32 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1029.32 linux-nvidia - 6.8.0-1029.32 linux-nvidia-64k - 6.8.0-1029.32 linux-nvidia-headers-6.8.0-1029 - 6.8.0-1029.32 linux-nvidia-tools-6.8.0-1029 - 6.8.0-1029.32 linux-tools-6.8.0-1029-nvidia - 6.8.0-1029.32 linux-tools-6.8.0-1029-nvidia-64k - 6.8.0-1029.32 linux-tools-nvidia - 6.8.0-1029.32 linux-tools-nvidia-64k - 6.8.0-1029.32 No subscription required linux-buildinfo-6.8.0-1029-nvidia-lowlatency - 6.8.0-1029.32.1 linux-buildinfo-6.8.0-1029-nvidia-lowlatency-64k - 6.8.0-1029.32.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1029.32.1 linux-headers-6.8.0-1029-nvidia-lowlatency - 6.8.0-1029.32.1 linux-headers-6.8.0-1029-nvidia-lowlatency-64k - 6.8.0-1029.32.1 linux-headers-nvidia-lowlatency - 6.8.0-1029.32.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1029.32.1 linux-image-6.8.0-1029-nvidia-lowlatency - 6.8.0-1029.32.1 linux-image-6.8.0-1029-nvidia-lowlatency-64k - 6.8.0-1029.32.1 linux-image-nvidia-lowlatency - 6.8.0-1029.32.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1029.32.1 linux-image-uc-6.8.0-1029-nvidia-lowlatency - 6.8.0-1029.32.1 linux-image-uc-6.8.0-1029-nvidia-lowlatency-64k - 6.8.0-1029.32.1 linux-image-unsigned-6.8.0-1029-nvidia-lowlatency - 6.8.0-1029.32.1 linux-image-unsigned-6.8.0-1029-nvidia-lowlatency-64k - 6.8.0-1029.32.1 linux-modules-6.8.0-1029-nvidia-lowlatency - 6.8.0-1029.32.1 linux-modules-6.8.0-1029-nvidia-lowlatency-64k - 6.8.0-1029.32.1 linux-modules-extra-6.8.0-1029-nvidia-lowlatency - 6.8.0-1029.32.1 linux-modules-nvidia-fs-6.8.0-1029-nvidia-lowlatency - 6.8.0-1029.32.1 linux-modules-nvidia-fs-6.8.0-1029-nvidia-lowlatency-64k - 6.8.0-1029.32.1 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1029.32.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1029.32.1 linux-nvidia-lowlatency - 6.8.0-1029.32.1 linux-nvidia-lowlatency-64k - 6.8.0-1029.32.1 linux-nvidia-lowlatency-headers-6.8.0-1029 - 6.8.0-1029.32.1 linux-nvidia-lowlatency-tools-6.8.0-1029 - 6.8.0-1029.32.1 linux-tools-6.8.0-1029-nvidia-lowlatency - 6.8.0-1029.32.1 linux-tools-6.8.0-1029-nvidia-lowlatency-64k - 6.8.0-1029.32.1 linux-tools-nvidia-lowlatency - 6.8.0-1029.32.1 linux-tools-nvidia-lowlatency-64k - 6.8.0-1029.32.1 No subscription required linux-aws-cloud-tools-6.8.0-1030 - 6.8.0-1030.32 linux-aws-headers-6.8.0-1030 - 6.8.0-1030.32 linux-aws-tools-6.8.0-1030 - 6.8.0-1030.32 linux-buildinfo-6.8.0-1030-aws - 6.8.0-1030.32 linux-buildinfo-6.8.0-1030-aws-64k - 6.8.0-1030.32 linux-cloud-tools-6.8.0-1030-aws - 6.8.0-1030.32 linux-cloud-tools-6.8.0-1030-aws-64k - 6.8.0-1030.32 linux-headers-6.8.0-1030-aws - 6.8.0-1030.32 linux-headers-6.8.0-1030-aws-64k - 6.8.0-1030.32 linux-image-6.8.0-1030-aws - 6.8.0-1030.32 linux-image-6.8.0-1030-aws-64k - 6.8.0-1030.32 linux-image-unsigned-6.8.0-1030-aws - 6.8.0-1030.32 linux-image-unsigned-6.8.0-1030-aws-64k - 6.8.0-1030.32 linux-modules-6.8.0-1030-aws - 6.8.0-1030.32 linux-modules-6.8.0-1030-aws-64k - 6....
ubuntu jammy v1.906
Metadata:
BOSH Agent Version: 2.759.0
Kernel Version: 5.15.0.153.153
USNs:
Title: USN-7726-1 -- Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7726-1
Priorities: medium,high
Description:
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - NTFS3 file system; - Network traffic control; (CVE-2024-27407, CVE-2024-57996, CVE-2025-37752, CVE-2025-38350) Update Instructions: Run sudo pro fix USN-7726-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-5.15.0-1033-nvidia-tegra-igx - 5.15.0-1033.33 linux-buildinfo-5.15.0-1033-nvidia-tegra-igx-rt - 5.15.0-1033.33 linux-headers-5.15.0-1033-nvidia-tegra-igx - 5.15.0-1033.33 linux-headers-5.15.0-1033-nvidia-tegra-igx-rt - 5.15.0-1033.33 linux-image-5.15.0-1033-nvidia-tegra-igx - 5.15.0-1033.33 linux-image-5.15.0-1033-nvidia-tegra-igx-rt - 5.15.0-1033.33 linux-image-uc-5.15.0-1033-nvidia-tegra-igx - 5.15.0-1033.33 linux-image-uc-5.15.0-1033-nvidia-tegra-igx-rt - 5.15.0-1033.33 linux-image-unsigned-5.15.0-1033-nvidia-tegra-igx - 5.15.0-1033.33 linux-image-unsigned-5.15.0-1033-nvidia-tegra-igx-rt - 5.15.0-1033.33 linux-modules-5.15.0-1033-nvidia-tegra-igx - 5.15.0-1033.33 linux-modules-5.15.0-1033-nvidia-tegra-igx-rt - 5.15.0-1033.33 linux-modules-extra-5.15.0-1033-nvidia-tegra-igx - 5.15.0-1033.33 linux-nvidia-tegra-igx-headers-5.15.0-1033 - 5.15.0-1033.33 linux-nvidia-tegra-igx-tools-5.15.0-1033 - 5.15.0-1033.33 linux-tools-5.15.0-1033-nvidia-tegra-igx - 5.15.0-1033.33 linux-tools-5.15.0-1033-nvidia-tegra-igx-rt - 5.15.0-1033.33 No subscription required linux-buildinfo-5.15.0-1044-nvidia-tegra - 5.15.0-1044.44 linux-buildinfo-5.15.0-1044-nvidia-tegra-rt - 5.15.0-1044.44 linux-headers-5.15.0-1044-nvidia-tegra - 5.15.0-1044.44 linux-headers-5.15.0-1044-nvidia-tegra-rt - 5.15.0-1044.44 linux-image-5.15.0-1044-nvidia-tegra - 5.15.0-1044.44 linux-image-5.15.0-1044-nvidia-tegra-rt - 5.15.0-1044.44 linux-image-unsigned-5.15.0-1044-nvidia-tegra - 5.15.0-1044.44 linux-image-unsigned-5.15.0-1044-nvidia-tegra-rt - 5.15.0-1044.44 linux-modules-5.15.0-1044-nvidia-tegra - 5.15.0-1044.44 linux-modules-5.15.0-1044-nvidia-tegra-rt - 5.15.0-1044.44 linux-modules-extra-5.15.0-1044-nvidia-tegra - 5.15.0-1044.44 linux-nvidia-tegra-headers-5.15.0-1044 - 5.15.0-1044.44 linux-nvidia-tegra-tools-5.15.0-1044 - 5.15.0-1044.44 linux-tools-5.15.0-1044-nvidia-tegra - 5.15.0-1044.44 linux-tools-5.15.0-1044-nvidia-tegra-rt - 5.15.0-1044.44 No subscription required linux-buildinfo-5.15.0-1055-xilinx-zynqmp - 5.15.0-1055.59 linux-headers-5.15.0-1055-xilinx-zynqmp - 5.15.0-1055.59 linux-image-5.15.0-1055-xilinx-zynqmp - 5.15.0-1055.59 linux-modules-5.15.0-1055-xilinx-zynqmp - 5.15.0-1055.59 linux-tools-5.15.0-1055-xilinx-zynqmp - 5.15.0-1055.59 linux-xilinx-zynqmp-headers-5.15.0-1055 - 5.15.0-1055.59 linux-xilinx-zynqmp-tools-5.15.0-1055 - 5.15.0-1055.59 No subscription required linux-buildinfo-5.15.0-1074-gkeop - 5.15.0-1074.82 linux-cloud-tools-5.15.0-1074-gkeop - 5.15.0-1074.82 linux-gkeop-cloud-tools-5.15.0-1074 - 5.15.0-1074.82 linux-gkeop-headers-5.15.0-1074 - 5.15.0-1074.82 linux-gkeop-tools-5.15.0-1074 - 5.15.0-1074.82 linux-headers-5.15.0-1074-gkeop - 5.15.0-1074.82 linux-image-5.15.0-1074-gkeop - 5.15.0-1074.82 linux-image-unsigned-5.15.0-1074-gkeop - 5.15.0-1074.82 linux-modules-5.15.0-1074-gkeop - 5.15.0-1074.82 linux-modules-extra-5.15.0-1074-gkeop - 5.15.0-1074.82 linux-tools-5.15.0-1074-gkeop - 5.15.0-1074.82 No subscription required linux-buildinfo-5.15.0-1085-ibm - 5.15.0-1085.88 linux-buildinfo-5.15.0-1085-raspi - 5.15.0-1085.88 linux-headers-5.15.0-1085-ibm - 5.15.0-1085.88 linux-headers-5.15.0-1085-raspi - 5.15.0-1085.88 linux-ibm-cloud-tools-common - 5.15.0-1085.88 linux-ibm-headers-5.15.0-1085 - 5.15.0-1085.88 linux-ibm-source-5.15.0 - 5.15.0-1085.88 linux-ibm-tools-5.15.0-1085 - 5.15.0-1085.88 linux-ibm-tools-common - 5.15.0-1085.88 linux-image-5.15.0-1085-ibm - 5.15.0-1085.88 linux-image-5.15.0-1085-raspi - 5.15.0-1085.88 linux-image-unsigned-5.15.0-1085-ibm - 5.15.0-1085.88 linux-modules-5.15.0-1085-ibm - 5.15.0-1085.88 linux-modules-5.15.0-1085-raspi - 5.15.0-1085.88 linux-modules-extra-5.15.0-1085-ibm - 5.15.0-1085.88 linux-modules-extra-5.15.0-1085-raspi - 5.15.0-1085.88 linux-raspi-headers-5.15.0-1085 - 5.15.0-1085.88 linux-raspi-tools-5.15.0-1085 - 5.15.0-1085.88 linux-tools-5.15.0-1085-ibm - 5.15.0-1085.88 linux-tools-5.15.0-1085-raspi - 5.15.0-1085.88 No subscription required linux-buildinfo-5.15.0-1086-nvidia - 5.15.0-1086.87 linux-buildinfo-5.15.0-1086-nvidia-lowlatency - 5.15.0-1086.87 linux-cloud-tools-5.15.0-1086-nvidia - 5.15.0-1086.87 linux-cloud-tools-5.15.0-1086-nvidia-lowlatency - 5.15.0-1086.87 linux-headers-5.15.0-1086-nvidia - 5.15.0-1086.87 linux-headers-5.15.0-1086-nvidia-lowlatency - 5.15.0-1086.87 linux-image-5.15.0-1086-nvidia - 5.15.0-1086.87 linux-image-5.15.0-1086-nvidia-lowlatency - 5.15.0-1086.87 linux-image-unsigned-5.15.0-1086-nvidia - 5.15.0-1086.87 linux-image-unsigned-5.15.0-1086-nvidia-lowlatency - 5.15.0-1086.87 linux-modules-5.15.0-1086-nvidia - 5.15.0-1086.87 linux-modules-5.15.0-1086-nvidia-lowlatency - 5.15.0-1086.87 linux-modules-extra-5.15.0-1086-nvidia - 5.15.0-1086.87 linux-modules-nvidia-fs-5.15.0-1086-nvidia - 5.15.0-1086.87 linux-modules-nvidia-fs-5.15.0-1086-nvidia-lowlatency - 5.15.0-1086.87 linux-nvidia-cloud-tools-5.15.0-1086 - 5.15.0-1086.87 linux-nvidia-cloud-tools-common - 5.15.0-1086.87 linux-nvidia-headers-5.15.0-1086 - 5.15.0-1086.87 linux-nvidia-tools-5.15.0-1086 - 5.15.0-1086.87 linux-nvidia-tools-common - 5.15.0-1086.87 linux-nvidia-tools-host - 5.15.0-1086.87 linux-tools-5.15.0-1086-nvidia - 5.15.0-1086.87 linux-tools-5.15.0-1086-nvidia-lowlatency - 5.15.0-1086.87 No subscription required linux-buildinfo-5.15.0-1086-intel-iotg - 5.15.0-1086.92 linux-cloud-tools-5.15.0-1086-intel-iotg - 5.15.0-1086.92 linux-headers-5.15.0-1086-intel-iotg - 5.15.0-1086.92 linux-image-5.15.0-1086-intel-iotg - 5.15.0-1086.92 linux-image-unsigned-5.15.0-1086-intel-iotg - 5.15.0-1086.92 linux-intel-iotg-cloud-tools-5.15.0-1086 - 5.15.0-1086.92 linux-intel-iotg-cloud-tools-common - 5.15.0-1086.92 linux-intel-iotg-headers-5.15.0-1086 - 5.15.0-1086.92 linux-intel-iotg-tools-5.15.0-1086 - 5.15.0-1086.92 linux-intel-iotg-tools-common - 5.15.0-1086.92 linux-intel-iotg-tools-host - 5.15.0-1086.92 linux-modules-5.15.0-1086-intel-iotg - 5.15.0-1086.92 linux-modules-extra-5.15.0-1086-intel-iotg - 5.15.0-1086.92 linux-modules-iwlwifi-5.15.0-1086-intel-iotg - 5.15.0-1086.92 linux-tools-5.15.0-1086-intel-iotg - 5.15.0-1086.92 No subscription required linux-buildinfo-5.15.0-1089-oracle - 5.15.0-1089.95 linux-headers-5.15.0-1089-oracle - 5.15.0-1089.95 linux-image-5.15.0-1089-oracle - 5.15.0-1089.95 linux-image-unsigned-5.15.0-1089-oracle - 5.15.0-1089.95 linux-modules-5.15.0-1089-oracle - 5.15.0-1089.95 linux-modules-extra-5.15.0-1089-oracle - 5.15.0-1089.95 linux-oracle-headers-5.15.0-1089 - 5.15.0-1089.95 linux-oracle-tools-5.15.0-1089 - 5.15.0-1089.95 linux-tools-5.15.0-1089-oracle - 5.15.0-1089.95 No subscription required linux-buildinfo-5.15.0-1091-gcp - 5.15.0-1091.100 linux-gcp-headers-5.15.0-1091 - 5.15.0-1091.100 linux-gcp-tools-5.15.0-1091 - 5.15.0-1091.100 linux-headers-5.15.0-1091-gcp - 5.15.0-1091.100 linux-image-5.15.0-1091-gcp - 5.15.0-1091.100 linux-image-unsigned-5.15.0-1091-gcp - 5.15.0-1091.100 linux-modules-5.15.0-1091-gcp - 5.15.0-1091.100 linux-modules-extra-5.15.0-1091-gcp - 5.15.0-1091.100 linux-tools-5.15.0-1091-gcp - 5.15.0-1091.100 No subscription required linux-aws-cloud-tools-5.15.0-1091 - 5.15.0-1091.98 linux-aws-headers-5.15.0-1091 - 5.15.0-1091.98 linux-aws-tools-5.15.0-1091 - 5.15.0-1091.98 linux-buildinfo-5.15.0-1091-aws - 5.15.0-1091.98 linux-buildinfo-5.15.0-1091-aws-64k - 5.15.0-1091.98 linux-cloud-tools-5.15.0-1091-aws - 5.15.0-1091.98 linux-cloud-tools-5.15.0-1091-aws-64k - 5.15.0-1091.98 linux-headers-5.15.0-1091-aws - 5.15.0-1091.98 linux-headers-5.15.0-1091-aws-64k - 5.15.0-1091.98 linux-image-5.15.0-1091-aws - 5.15.0-1091.98 linux-image-5.15.0-1091-aws-64k - 5.15.0-1091.98 linux-image-unsigned-5.15.0-1091-aws - 5.15.0-1091.98 linux-image-unsigned-5.15.0-1091-aws-64k - 5.15.0-1091.98 linux-modules-5.15.0-1091-aws - 5.15.0-1091.98 linux-modules-5.15.0-1091-aws-64k - 5.15.0-1091.98 linux-modules-extra-5.15.0-1091-aws - 5.15.0-1091.98 linux-modules-extra-5.15.0-1091-aws-64k - 5.15.0-1091.98 linux-tools-5.15.0-1091-aws - 5.15.0-1091.98 linux-tools-5.15.0-1091-aws-64k - 5.15.0-1091.98 No subscription required linux-buildinfo-5.15.0-153-generic - 5.15.0-153.163 linux-buildinfo-5.15.0-153-generic-64k - 5.15.0-153.163 linux-buildinfo-5.15.0-153-generic-lpae - 5.15.0-153.163 linux-buildinfo-5.15.0-153-lowlatency - 5.15.0-153.163 linux-buildinfo-5.15.0-153-lowlatency-64k - 5.15.0-153.163 linux-cloud-tools-5.15.0-153 - 5.15.0-153.163 linux-cloud-tools-5.15.0-153-generic - 5.15.0-153.163 linux-cloud-tools-5.15.0-153-lowlatency - 5.15.0-153.163 linux-cloud-tools-common - 5.15.0-153.163 linux-doc - 5.15.0-153.163 linux-headers-5.15.0-153 - 5.15.0-153.163 linux-headers-5.15.0-153-generic - 5.15.0-153.163 linux-headers-5.15.0-153-generic-64k - 5.15.0-153.163 linux-headers-5.15.0-153-generic-lpae - 5.15.0-153.163 linux-headers-5.15.0-153-lowlatency - 5.15.0-153.163 linux-headers-5.15.0-153-lowlatency-64k - 5.15.0-153.163 linux-image-5.15.0-153-generic - 5.15.0-153.163 linux-image-5.15.0-153-generic-64k - 5.15.0-153.163 linux-image-5.15.0-153-generic-lpae - 5.15.0-153.163 linux-image-5.15.0-153-lowlatency - 5.15.0-153.163 linux-image-5.15.0-153-lowlatency-64k - 5.15.0-153.163 linux-image-unsigned-5.15.0-153-generic - 5.15.0-153.163 linux-image-unsigned-5.15.0-153-generic-64k - 5.15.0-153.163 linux-image-unsigned-5.15.0-153-lowlatency - 5.15.0-153.163 lin...
ubuntu jammy v1.894
Metadata:
BOSH Agent Version: 2.759.0
Kernel Version: 5.15.0.151.151
USNs:
Title: USN-7694-1 -- libxml2 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7694-1
Priorities: medium
Description:
Ahmed Lekssays discovered that libxml2 did not properly perform certain mathematical operations, leading to an integer overflow. An attacker could possibly use this issue to cause a crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2025-6021) Ahmed Lekssays discovered that libxml2 did not properly validate the size of an untrusted input stream. An attacker could possibly use this issue to cause a crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2025-6170) Nikita Sveshnikov discovered that libxml2 did not properly handle certain XPath expressions, leading to a use-after-free vulnerability. An attacker could potentially exploit this issue to cause a denial of service. (CVE-2025-49794) Nikita Sveshnikov discovered that libxml2 contained a type confusion vulnerability when parsing specially crafted XML documents. An attacker could potentially exploit this issue to cause a denial of service. (CVE-2025-49796) Update Instructions: Run sudo pro fix USN-7694-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libxml2 - 2.9.13+dfsg-1ubuntu0.8 libxml2-dev - 2.9.13+dfsg-1ubuntu0.8 libxml2-doc - 2.9.13+dfsg-1ubuntu0.8 libxml2-utils - 2.9.13+dfsg-1ubuntu0.8 python3-libxml2 - 2.9.13+dfsg-1ubuntu0.8 No subscription required
CVEs:
- https://ubuntu.com/security/CVE-2025-6021
- https://ubuntu.com/security/CVE-2025-49794
- https://ubuntu.com/security/CVE-2025-6170
- https://ubuntu.com/security/CVE-2025-49796
Title: USN-7683-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7683-1
Priorities: medium
Description:
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - TTY drivers; - Network traffic control; (CVE-2025-38083, CVE-2024-50073) Update Instructions: Run sudo pro fix USN-7683-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: `linux-buildinfo-5.15.0-1031-nvidia-tegra-igx - 5.15.0-1031.31 linux-buildinfo-5.15.0-1031-nvidia-tegra-igx-rt - 5.15.0-1031.31 linux-headers-5.15.0-1031-nvidia-tegra-igx - 5.15.0-1031.31 linux-headers-5.15.0-1031-nvidia-tegra-igx-rt - 5.15.0-1031.31 linux-image-5.15.0-1031-nvidia-tegra-igx - 5.15.0-1031.31 linux-image-5.15.0-1031-nvidia-tegra-igx-rt - 5.15.0-1031.31 linux-image-uc-5.15.0-1031-nvidia-tegra-igx - 5.15.0-1031.31 linux-image-uc-5.15.0-1031-nvidia-tegra-igx-rt - 5.15.0-1031.31 linux-image-unsigned-5.15.0-1031-nvidia-tegra-igx - 5.15.0-1031.31 linux-image-unsigned-5.15.0-1031-nvidia-tegra-igx-rt - 5.15.0-1031.31 linux-modules-5.15.0-1031-nvidia-tegra-igx - 5.15.0-1031.31 linux-modules-5.15.0-1031-nvidia-tegra-igx-rt - 5.15.0-1031.31 linux-modules-extra-5.15.0-1031-nvidia-tegra-igx - 5.15.0-1031.31 linux-nvidia-tegra-igx-headers-5.15.0-1031 - 5.15.0-1031.31 linux-nvidia-tegra-igx-tools-5.15.0-1031 - 5.15.0-1031.31 linux-tools-5.15.0-1031-nvidia-tegra-igx - 5.15.0-1031.31 linux-tools-5.15.0-1031-nvidia-tegra-igx-rt - 5.15.0-1031.31 No subscription required linux-buildinfo-5.15.0-1042-nvidia-tegra - 5.15.0-1042.42 linux-buildinfo-5.15.0-1042-nvidia-tegra-rt - 5.15.0-1042.42 linux-headers-5.15.0-1042-nvidia-tegra - 5.15.0-1042.42 linux-headers-5.15.0-1042-nvidia-tegra-rt - 5.15.0-1042.42 linux-image-5.15.0-1042-nvidia-tegra - 5.15.0-1042.42 linux-image-5.15.0-1042-nvidia-tegra-rt - 5.15.0-1042.42 linux-image-unsigned-5.15.0-1042-nvidia-tegra - 5.15.0-1042.42 linux-image-unsigned-5.15.0-1042-nvidia-tegra-rt - 5.15.0-1042.42 linux-modules-5.15.0-1042-nvidia-tegra - 5.15.0-1042.42 linux-modules-5.15.0-1042-nvidia-tegra-rt - 5.15.0-1042.42 linux-modules-extra-5.15.0-1042-nvidia-tegra - 5.15.0-1042.42 linux-nvidia-tegra-headers-5.15.0-1042 - 5.15.0-1042.42 linux-nvidia-tegra-tools-5.15.0-1042 - 5.15.0-1042.42 linux-tools-5.15.0-1042-nvidia-tegra - 5.15.0-1042.42 linux-tools-5.15.0-1042-nvidia-tegra-rt - 5.15.0-1042.42 No subscription required linux-buildinfo-5.15.0-1053-xilinx-zynqmp - 5.15.0-1053.57 linux-headers-5.15.0-1053-xilinx-zynqmp - 5.15.0-1053.57 linux-image-5.15.0-1053-xilinx-zynqmp - 5.15.0-1053.57 linux-modules-5.15.0-1053-xilinx-zynqmp - 5.15.0-1053.57 linux-tools-5.15.0-1053-xilinx-zynqmp - 5.15.0-1053.57 linux-xilinx-zynqmp-headers-5.15.0-1053 - 5.15.0-1053.57 linux-xilinx-zynqmp-tools-5.15.0-1053 - 5.15.0-1053.57 linux-xilinx-zynqmp-tools-common - 5.15.0-1053.57 linux-xilinx-zynqmp-tools-host - 5.15.0-1053.57 No subscription required linux-buildinfo-5.15.0-1071-gkeop - 5.15.0-1071.79 linux-cloud-tools-5.15.0-1071-gkeop - 5.15.0-1071.79 linux-gkeop-cloud-tools-5.15.0-1071 - 5.15.0-1071.79 linux-gkeop-headers-5.15.0-1071 - 5.15.0-1071.79 linux-gkeop-tools-5.15.0-1071 - 5.15.0-1071.79 linux-headers-5.15.0-1071-gkeop - 5.15.0-1071.79 linux-image-5.15.0-1071-gkeop - 5.15.0-1071.79 linux-image-unsigned-5.15.0-1071-gkeop - 5.15.0-1071.79 linux-modules-5.15.0-1071-gkeop - 5.15.0-1071.79 linux-modules-extra-5.15.0-1071-gkeop - 5.15.0-1071.79 linux-tools-5.15.0-1071-gkeop - 5.15.0-1071.79 No subscription required linux-buildinfo-5.15.0-1081-ibm - 5.15.0-1081.84 linux-headers-5.15.0-1081-ibm - 5.15.0-1081.84 linux-ibm-cloud-tools-common - 5.15.0-1081.84 linux-ibm-headers-5.15.0-1081 - 5.15.0-1081.84 linux-ibm-source-5.15.0 - 5.15.0-1081.84 linux-ibm-tools-5.15.0-1081 - 5.15.0-1081.84 linux-ibm-tools-common - 5.15.0-1081.84 linux-image-5.15.0-1081-ibm - 5.15.0-1081.84 linux-image-unsigned-5.15.0-1081-ibm - 5.15.0-1081.84 linux-modules-5.15.0-1081-ibm - 5.15.0-1081.84 linux-modules-extra-5.15.0-1081-ibm - 5.15.0-1081.84 linux-tools-5.15.0-1081-ibm - 5.15.0-1081.84 No subscription required linux-buildinfo-5.15.0-1083-nvidia - 5.15.0-1083.84 linux-buildinfo-5.15.0-1083-nvidia-lowlatency - 5.15.0-1083.84 linux-cloud-tools-5.15.0-1083-nvidia - 5.15.0-1083.84 linux-cloud-tools-5.15.0-1083-nvidia-lowlatency - 5.15.0-1083.84 linux-headers-5.15.0-1083-nvidia - 5.15.0-1083.84 linux-headers-5.15.0-1083-nvidia-lowlatency - 5.15.0-1083.84 linux-image-5.15.0-1083-nvidia - 5.15.0-1083.84 linux-image-5.15.0-1083-nvidia-lowlatency - 5.15.0-1083.84 linux-image-unsigned-5.15.0-1083-nvidia - 5.15.0-1083.84 linux-image-unsigned-5.15.0-1083-nvidia-lowlatency - 5.15.0-1083.84 linux-modules-5.15.0-1083-nvidia - 5.15.0-1083.84 linux-modules-5.15.0-1083-nvidia-lowlatency - 5.15.0-1083.84 linux-modules-extra-5.15.0-1083-nvidia - 5.15.0-1083.84 linux-modules-nvidia-fs-5.15.0-1083-nvidia - 5.15.0-1083.84 linux-modules-nvidia-fs-5.15.0-1083-nvidia-lowlatency - 5.15.0-1083.84 linux-nvidia-cloud-tools-5.15.0-1083 - 5.15.0-1083.84 linux-nvidia-cloud-tools-common - 5.15.0-1083.84 linux-nvidia-headers-5.15.0-1083 - 5.15.0-1083.84 linux-nvidia-tools-5.15.0-1083 - 5.15.0-1083.84 linux-nvidia-tools-common - 5.15.0-1083.84 linux-nvidia-tools-host - 5.15.0-1083.84 linux-tools-5.15.0-1083-nvidia - 5.15.0-1083.84 linux-tools-5.15.0-1083-nvidia-lowlatency - 5.15.0-1083.84 No subscription required linux-buildinfo-5.15.0-1084-intel-iotg - 5.15.0-1084.90 linux-cloud-tools-5.15.0-1084-intel-iotg - 5.15.0-1084.90 linux-headers-5.15.0-1084-intel-iotg - 5.15.0-1084.90 linux-image-5.15.0-1084-intel-iotg - 5.15.0-1084.90 linux-image-unsigned-5.15.0-1084-intel-iotg - 5.15.0-1084.90 linux-intel-iotg-cloud-tools-5.15.0-1084 - 5.15.0-1084.90 linux-intel-iotg-cloud-tools-common - 5.15.0-1084.90 linux-intel-iotg-headers-5.15.0-1084 - 5.15.0-1084.90 linux-intel-iotg-tools-5.15.0-1084 - 5.15.0-1084.90 linux-intel-iotg-tools-common - 5.15.0-1084.90 linux-intel-iotg-tools-host - 5.15.0-1084.90 linux-modules-5.15.0-1084-intel-iotg - 5.15.0-1084.90 linux-modules-extra-5.15.0-1084-intel-iotg - 5.15.0-1084.90 linux-modules-iwlwifi-5.15.0-1084-intel-iotg - 5.15.0-1084.90 linux-tools-5.15.0-1084-intel-iotg - 5.15.0-1084.90 No subscription required linux-buildinfo-5.15.0-1085-kvm - 5.15.0-1085.90 linux-headers-5.15.0-1085-kvm - 5.15.0-1085.90 linux-image-5.15.0-1085-kvm - 5.15.0-1085.90 linux-image-unsigned-5.15.0-1085-kvm - 5.15.0-1085.90 linux-kvm-headers-5.15.0-1085 - 5.15.0-1085.90 linux-kvm-tools-5.15.0-1085 - 5.15.0-1085.90 linux-modules-5.15.0-1085-kvm - 5.15.0-1085.90 linux-tools-5.15.0-1085-kvm - 5.15.0-1085.90 No subscription required linux-buildinfo-5.15.0-1086-gke - 5.15.0-1086.92 linux-buildinfo-5.15.0-1086-oracle - 5.15.0-1086.92 linux-gke-headers-5.15.0-1086 - 5.15.0-1086.92 linux-gke-tools-5.15.0-1086 - 5.15.0-1086.92 linux-headers-5.15.0-1086-gke - 5.15.0-1086.92 linux-headers-5.15.0-1086-oracle - 5.15.0-1086.92 linux-image-5.15.0-1086-gke - 5.15.0-1086.92 linux-image-5.15.0-1086-oracle - 5.15.0-1086.92 linux-image-unsigned-5.15.0-1086-gke - 5.15.0-1086.92 linux-image-unsigned-5.15.0-1086-oracle - 5.15.0-1086.92 linux-modules-5.15.0-1086-gke - 5.15.0-1086.92 linux-modules-5.15.0-1086-oracle - 5.15.0-1086.92 linux-modules-extra-5.15.0-1086-gke - 5.15.0-1086.92 linux-modules-extra-5.15.0-1086-oracle - 5.15.0-1086.92 linux-oracle-headers-5.15.0-1086 - 5.15.0-1086.92 linux-oracle-tools-5.15.0-1086 - 5.15.0-1086.92 linux-tools-5.15.0-1086-gke - 5.15.0-1086.92 linux-tools-5.15.0-1086-oracle - 5.15.0-1086.92 No subscription required linux-buildinfo-5.15.0-1088-gcp - 5.15.0-1088.97 linux-gcp-headers-5.15.0-1088 - 5.15.0-1088.97 linux-gcp-tools-5.15.0-1088 - 5.15.0-1088.97 linux-headers-5.15.0-1088-gcp - 5.15.0-1088.97 linux-image-5.15.0-1088-gcp - 5.15.0-1088.97 linux-image-unsigned-5.15.0-1088-gcp - 5.15.0-1088.97 linux-modules-5.15.0-1088-gcp - 5.15.0-1088.97 linux-modules-extra-5.15.0-1088-gcp - 5.15.0-1088.97 linux-tools-5.15.0-1088-gcp - 5.15.0-1088.97 No subscription required linux-aws-c...
ubuntu jammy v1.866
Metadata:
BOSH Agent Version: 2.756.0
Kernel Version: 5.15.0.143.138
USNs:
Title: USN-7570-1 -- Python vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7570-1
Priorities: medium,low
Description:
It was discovered that Python incorrectly handled certain unicode characters during decoding. An attacker could possibly use this issue to cause a denial of service. (CVE-2025-4516) It was discovered that Python incorrectly handled unicode encoding of email headers with list separators in folded lines. An attacker could possibly use this issue to expose sensitive information. (CVE-2025-1795) Update Instructions: Run sudo pro fix USN-7570-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: idle-python3.10 - 3.10.12-122.04.10 libpython3.10 - 3.10.12-122.04.10 libpython3.10-dev - 3.10.12-122.04.10 libpython3.10-minimal - 3.10.12-122.04.10 libpython3.10-stdlib - 3.10.12-122.04.10 libpython3.10-testsuite - 3.10.12-122.04.10 python3.10 - 3.10.12-122.04.10 python3.10-dev - 3.10.12-122.04.10 python3.10-doc - 3.10.12-122.04.10 python3.10-examples - 3.10.12-122.04.10 python3.10-full - 3.10.12-122.04.10 python3.10-minimal - 3.10.12-122.04.10 python3.10-nopie - 3.10.12-122.04.10 python3.10-venv - 3.10.12-122.04.10 No subscription required idle-python3.11 - 3.11.0rc1-122.04.1esm4 libpython3.11 - 3.11.0rc1-122.04.1esm4 libpython3.11-dev - 3.11.0rc1-122.04.1esm4 libpython3.11-minimal - 3.11.0rc1-122.04.1esm4 libpython3.11-stdlib - 3.11.0rc1-122.04.1esm4 libpython3.11-testsuite - 3.11.0rc1-122.04.1esm4 python3.11 - 3.11.0rc1-122.04.1esm4 python3.11-dev - 3.11.0rc1-122.04.1esm4 python3.11-doc - 3.11.0rc1-122.04.1esm4 python3.11-examples - 3.11.0rc1-122.04.1esm4 python3.11-full - 3.11.0rc1-122.04.1esm4 python3.11-minimal - 3.11.0rc1-122.04.1esm4 python3.11-nopie - 3.11.0rc1-122.04.1esm4 python3.11-venv - 3.11.0rc1-122.04.1esm4 No subscription required
CVEs:
Title: USN-7580-1 -- PAM vulnerability
URL: https://ubuntu.com/security/notices/USN-7580-1
Priorities: medium
Description:
Olivier BAL-PETRE discovered that the PAM pam_namespace module incorrectly handled user-controlled paths. In environments where pam_namespace is used, a local attacker could possibly use this issue to escalate their privileges to root. Update Instructions: Run sudo pro fix USN-7580-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libpam-cracklib - 1.4.0-11ubuntu2.6 libpam-doc - 1.4.0-11ubuntu2.6 libpam-modules - 1.4.0-11ubuntu2.6 libpam-modules-bin - 1.4.0-11ubuntu2.6 libpam-runtime - 1.4.0-11ubuntu2.6 libpam0g - 1.4.0-11ubuntu2.6 libpam0g-dev - 1.4.0-11ubuntu2.6 No subscription required
CVEs:
Title: USN-7591-1 -- Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7591-1
Priorities: low,medium
Description:
Michael Randrianantenaina discovered that the Bluetooth driver in the Linux Kernel contained an improper access control vulnerability. A nearby attacker could use this to connect a rougue device and possibly execute arbitrary code. (CVE-2024-8805) It was discovered that the CIFS network file system implementation in the Linux kernel did not properly verify the target namespace when handling upcalls. An attacker could use this to expose sensitive information. (CVE-2025-2312) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - PowerPC architecture; - x86 architecture; - ACPI drivers; - Clock framework and drivers; - GPU drivers; - HID subsystem; - InfiniBand drivers; - Media drivers; - MemoryStick subsystem; - Network drivers; - Mellanox network drivers; - NTB driver; - PCI subsystem; - Voltage and Current Regulator drivers; - Remote Processor subsystem; - SCSI subsystem; - QCOM SoC drivers; - Thermal drivers; - BTRFS file system; - Ext4 file system; - JFS file system; - Network file system (NFS) server daemon; - NTFS3 file system; - File systems infrastructure; - Proc file system; - SMB network file system; - IPv6 networking; - RDMA verbs API; - SoC audio core drivers; - Tracing infrastructure; - Watch queue notification mechanism; - 802.1Q VLAN protocol; - Asynchronous Transfer Mode (ATM) subsystem; - Bluetooth subsystem; - Networking core; - IPv4 networking; - Netfilter; - Network traffic control; - SMC sockets; - SoC Audio for Freescale CPUs drivers; (CVE-2025-23138, CVE-2025-21956, CVE-2025-21970, CVE-2025-22025, CVE-2024-46753, CVE-2025-21962, CVE-2025-37889, CVE-2025-21992, CVE-2025-39728, CVE-2025-22054, CVE-2025-21959, CVE-2024-53144, CVE-2022-49728, CVE-2024-58093, CVE-2025-38637, CVE-2025-21981, CVE-2025-21963, CVE-2025-21968, CVE-2025-22014, CVE-2024-46812, CVE-2025-22005, CVE-2025-21994, CVE-2025-22071, CVE-2025-22008, CVE-2022-49636, CVE-2025-22007, CVE-2023-53034, CVE-2025-22035, CVE-2025-22010, CVE-2025-22081, CVE-2025-22021, CVE-2024-46821, CVE-2025-21999, CVE-2025-38575, CVE-2025-22073, CVE-2025-22004, CVE-2024-42230, CVE-2025-21941, CVE-2024-56664, CVE-2025-22044, CVE-2025-39735, CVE-2025-22060, CVE-2025-22055, CVE-2025-21957, CVE-2025-21975, CVE-2025-22075, CVE-2025-22089, CVE-2025-37937, CVE-2025-38152, CVE-2025-22020, CVE-2025-22066, CVE-2025-22056, CVE-2025-22050, CVE-2025-21964, CVE-2025-21996, CVE-2025-22079, CVE-2025-23136, CVE-2025-22063, CVE-2024-36945, CVE-2025-22097, CVE-2025-37785, CVE-2025-21991, CVE-2025-22086, CVE-2025-22045, CVE-2025-22018) Update Instructions: Run sudo pro fix USN-7591-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-5.15.0-1028-nvidia-tegra-igx - 5.15.0-1028.28 linux-buildinfo-5.15.0-1028-nvidia-tegra-igx-rt - 5.15.0-1028.28 linux-headers-5.15.0-1028-nvidia-tegra-igx - 5.15.0-1028.28 linux-headers-5.15.0-1028-nvidia-tegra-igx-rt - 5.15.0-1028.28 linux-image-5.15.0-1028-nvidia-tegra-igx - 5.15.0-1028.28 linux-image-5.15.0-1028-nvidia-tegra-igx-rt - 5.15.0-1028.28 linux-image-uc-5.15.0-1028-nvidia-tegra-igx - 5.15.0-1028.28 linux-image-uc-5.15.0-1028-nvidia-tegra-igx-rt - 5.15.0-1028.28 linux-image-unsigned-5.15.0-1028-nvidia-tegra-igx - 5.15.0-1028.28 linux-image-unsigned-5.15.0-1028-nvidia-tegra-igx-rt - 5.15.0-1028.28 linux-modules-5.15.0-1028-nvidia-tegra-igx - 5.15.0-1028.28 linux-modules-5.15.0-1028-nvidia-tegra-igx-rt - 5.15.0-1028.28 linux-modules-extra-5.15.0-1028-nvidia-tegra-igx - 5.15.0-1028.28 linux-nvidia-tegra-igx-headers-5.15.0-1028 - 5.15.0-1028.28 linux-nvidia-tegra-igx-tools-5.15.0-1028 - 5.15.0-1028.28 linux-tools-5.15.0-1028-nvidia-tegra-igx - 5.15.0-1028.28 linux-tools-5.15.0-1028-nvidia-tegra-igx-rt - 5.15.0-1028.28 No subscription required linux-buildinfo-5.15.0-1039-nvidia-tegra - 5.15.0-1039.39 linux-buildinfo-5.15.0-1039-nvidia-tegra-rt - 5.15.0-1039.39 linux-headers-5.15.0-1039-nvidia-tegra - 5.15.0-1039.39 linux-headers-5.15.0-1039-nvidia-tegra-rt - 5.15.0-1039.39 linux-image-5.15.0-1039-nvidia-tegra - 5.15.0-1039.39 linux-image-5.15.0-1039-nvidia-tegra-rt - 5.15.0-1039.39 linux-image-unsigned-5.15.0-1039-nvidia-tegra - 5.15.0-1039.39 linux-image-unsigned-5.15.0-1039-nvidia-tegra-rt - 5.15.0-1039.39 linux-modules-5.15.0-1039-nvidia-tegra - 5.15.0-1039.39 linux-modules-5.15.0-1039-nvidia-tegra-rt - 5.15.0-1039.39 linux-modules-extra-5.15.0-1039-nvidia-tegra - 5.15.0-1039.39 linux-nvidia-tegra-headers-5.15.0-1039 - 5.15.0-1039.39 linux-nvidia-tegra-tools-5.15.0-1039 - 5.15.0-1039.39 linux-tools-5.15.0-1039-nvidia-tegra - 5.15.0-1039.39 linux-tools-5.15.0-1039-nvidia-tegra-rt - 5.15.0-1039.39 No subscription required linux-buildinfo-5.15.0-1068-gkeop - 5.15.0-1068.76 linux-cloud-tools-5.15.0-1068-gkeop - 5.15.0-1068.76 linux-gkeop-cloud-tools-5.15.0-1068 - 5.15.0-1068.76 linux-gkeop-headers-5.15.0-1068 - 5.15.0-1068.76 linux-gkeop-tools-5.15.0-1068 - 5.15.0-1068.76 linux-headers-5.15.0-1068-gkeop - 5.15.0-1068.76 linux-image-5.15.0-1068-gkeop - 5.15.0-1068.76 linux-image-unsigned-5.15.0-1068-gkeop - 5.15.0-1068.76 linux-modules-5.15.0-1068-gkeop - 5.15.0-1068.76 linux-modules-extra-5.15.0-1068-gkeop - 5.15.0-1068.76 linux-tools-5.15.0-1068-gkeop - 5.15.0-1068.76 No subscription required linux-buildinfo-5.15.0-1078-ibm - 5.15.0-1078.81 linux-headers-5.15.0-1078-ibm - 5.15.0-1078.81 linux-ibm-cloud-tools-common - 5.15.0-1078.81 linux-ibm-headers-5.15.0-1078 - 5.15.0-1078.81 linux-ibm-source-5.15.0 - 5.15.0-1078.81 linux-ibm-tools-5.15.0-1078 - 5.15.0-1078.81 linux-ibm-tools-common - 5.15.0-1078.81 linux-image-5.15.0-1078-ibm - 5.15.0-1078.81 linux-image-unsigned-5.15.0-1078-ibm - 5.15.0-1078.81 linux-modules-5.15.0-1078-ibm - 5.15.0-1078.81 linux-modules-extra-5.15.0-1078-ibm - 5.15.0-1078.81 linux-tools-5.15.0-1078-ibm - 5.15.0-1078.81 No subscription required linux-buildinfo-5.15.0-1080-nvidia - 5.15.0-1080.81 linux-buildinfo-5.15.0-1080-nvidia-lowlatency - 5.15.0-1080.81 linux-cloud-tools-5.15.0-1080-nvidia - 5.15.0-1080.81 linux-cloud-tools-5.15.0-1080-nvidia-lowlatency - 5.15.0-1080.81 linux-headers-5.15.0-1080-nvidia - 5.15.0-1080.81 linux-headers-5.15.0-1080-nvidia-lowlatency - 5.15.0-1080.81 linux-image-5.15.0-1080-nvidia - 5.15.0-1080.81 linux-image-5.15.0-1080-nvidia-lowlatency - 5.15.0-1080.81 linux-image-unsigned-5.15.0-1080-nvidia - 5.15.0-1080.81 linux-image-unsigned-5.15.0-1080-nvidia-lowlatency - 5.15.0-1080.81 linux-modules-5.15.0-1080-nvidia - 5.15.0-1080.81 linux-modules-5.15.0-1080-nvidia-lowlatency - 5.15.0-1080.81 linux-modules-extra-5.15.0-1080-nvidia - 5.15.0-1080.81 linux-modules-nvidia-fs-5.15....