Releases: cloudfoundry/bosh-linux-stemcell-builder
ubuntu noble v1.25
Metadata:
BOSH Agent Version: 2.753.0
Kernel Version: 6.8.0-60.63
USNs:
Title: USN-7595-1 -- Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7595-1
Priorities: medium
Description:
It was discovered that the CIFS network file system implementation in the Linux kernel did not properly verify the target namespace when handling upcalls. An attacker could use this to expose sensitive information. (CVE-2025-2312) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - GPIO subsystem; - GPU drivers; - InfiniBand drivers; - IRQ chip drivers; - Network drivers; - Mellanox network drivers; - i.MX PM domains; - SCSI subsystem; - USB Serial drivers; - AFS file system; - GFS2 file system; - File systems infrastructure; - File system notification infrastructure; - Overlay file system; - Proc file system; - SMB network file system; - Timer subsystem; - Kernel CPU control infrastructure; - Memory management; - Networking core; - DCCP (Datagram Congestion Control Protocol); - IPv6 networking; - IEEE 802.15.4 subsystem; - Open vSwitch; - Network traffic control; - VMware vSockets driver; (CVE-2025-21943, CVE-2025-21672, CVE-2024-57952, CVE-2024-57949, CVE-2025-21683, CVE-2025-21690, CVE-2025-21699, CVE-2025-21676, CVE-2024-57924, CVE-2025-21694, CVE-2024-57948, CVE-2025-21675, CVE-2024-57951, CVE-2025-21692, CVE-2025-21684, CVE-2025-21668, CVE-2025-21665, CVE-2025-21667, CVE-2025-21670, CVE-2025-21674, CVE-2025-21697, CVE-2024-53124, CVE-2025-21666, CVE-2025-21682, CVE-2025-21680, CVE-2025-21681, CVE-2025-21691, CVE-2025-21669, CVE-2025-21673, CVE-2024-50157, CVE-2025-21689, CVE-2025-21678) Update Instructions: Run sudo pro fix USN-7595-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1013-gkeop - 6.8.0-1013.15 linux-cloud-tools-6.8.0-1013-gkeop - 6.8.0-1013.15 linux-cloud-tools-gkeop - 6.8.0-1013.15 linux-cloud-tools-gkeop-6.8 - 6.8.0-1013.15 linux-gkeop - 6.8.0-1013.15 linux-gkeop-6.8 - 6.8.0-1013.15 linux-gkeop-cloud-tools-6.8.0-1013 - 6.8.0-1013.15 linux-gkeop-headers-6.8.0-1013 - 6.8.0-1013.15 linux-gkeop-tools-6.8.0-1013 - 6.8.0-1013.15 linux-headers-6.8.0-1013-gkeop - 6.8.0-1013.15 linux-headers-gkeop - 6.8.0-1013.15 linux-headers-gkeop-6.8 - 6.8.0-1013.15 linux-image-6.8.0-1013-gkeop - 6.8.0-1013.15 linux-image-gkeop - 6.8.0-1013.15 linux-image-gkeop-6.8 - 6.8.0-1013.15 linux-image-unsigned-6.8.0-1013-gkeop - 6.8.0-1013.15 linux-modules-6.8.0-1013-gkeop - 6.8.0-1013.15 linux-modules-extra-6.8.0-1013-gkeop - 6.8.0-1013.15 linux-modules-extra-gkeop - 6.8.0-1013.15 linux-modules-extra-gkeop-6.8 - 6.8.0-1013.15 linux-tools-6.8.0-1013-gkeop - 6.8.0-1013.15 linux-tools-gkeop - 6.8.0-1013.15 linux-tools-gkeop-6.8 - 6.8.0-1013.15 No subscription required linux-buildinfo-6.8.0-1026-gke - 6.8.0-1026.30 linux-gke - 6.8.0-1026.30 linux-gke-headers-6.8.0-1026 - 6.8.0-1026.30 linux-gke-tools-6.8.0-1026 - 6.8.0-1026.30 linux-headers-6.8.0-1026-gke - 6.8.0-1026.30 linux-headers-gke - 6.8.0-1026.30 linux-image-6.8.0-1026-gke - 6.8.0-1026.30 linux-image-gke - 6.8.0-1026.30 linux-image-unsigned-6.8.0-1026-gke - 6.8.0-1026.30 linux-modules-6.8.0-1026-gke - 6.8.0-1026.30 linux-modules-extra-6.8.0-1026-gke - 6.8.0-1026.30 linux-modules-iwlwifi-6.8.0-1026-gke - 6.8.0-1026.30 linux-modules-iwlwifi-gke - 6.8.0-1026.30 linux-tools-6.8.0-1026-gke - 6.8.0-1026.30 linux-tools-gke - 6.8.0-1026.30 No subscription required linux-buildinfo-6.8.0-1027-ibm - 6.8.0-1027.27 linux-headers-6.8.0-1027-ibm - 6.8.0-1027.27 linux-headers-ibm - 6.8.0-1027.27 linux-headers-ibm-classic - 6.8.0-1027.27 linux-headers-ibm-lts-24.04 - 6.8.0-1027.27 linux-ibm - 6.8.0-1027.27 linux-ibm-classic - 6.8.0-1027.27 linux-ibm-headers-6.8.0-1027 - 6.8.0-1027.27 linux-ibm-lts-24.04 - 6.8.0-1027.27 linux-ibm-tools-6.8.0-1027 - 6.8.0-1027.27 linux-image-6.8.0-1027-ibm - 6.8.0-1027.27 linux-image-ibm - 6.8.0-1027.27 linux-image-ibm-classic - 6.8.0-1027.27 linux-image-ibm-lts-24.04 - 6.8.0-1027.27 linux-image-unsigned-6.8.0-1027-ibm - 6.8.0-1027.27 linux-modules-6.8.0-1027-ibm - 6.8.0-1027.27 linux-modules-extra-6.8.0-1027-ibm - 6.8.0-1027.27 linux-modules-iwlwifi-6.8.0-1027-ibm - 6.8.0-1027.27 linux-modules-iwlwifi-ibm - 6.8.0-1027.27 linux-modules-iwlwifi-ibm-classic - 6.8.0-1027.27 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1027.27 linux-tools-6.8.0-1027-ibm - 6.8.0-1027.27 linux-tools-ibm - 6.8.0-1027.27 linux-tools-ibm-classic - 6.8.0-1027.27 linux-tools-ibm-lts-24.04 - 6.8.0-1027.27 No subscription required linux-buildinfo-6.8.0-1029-oem - 6.8.0-1029.29 linux-headers-6.8.0-1029-oem - 6.8.0-1029.29 linux-headers-oem-24.04 - 6.8.0-1029.29 linux-headers-oem-24.04a - 6.8.0-1029.29 linux-image-6.8.0-1029-oem - 6.8.0-1029.29 linux-image-oem-24.04 - 6.8.0-1029.29 linux-image-oem-24.04a - 6.8.0-1029.29 linux-image-uc-6.8.0-1029-oem - 6.8.0-1029.29 linux-image-uc-oem-24.04 - 6.8.0-1029.29 linux-image-uc-oem-24.04a - 6.8.0-1029.29 linux-image-unsigned-6.8.0-1029-oem - 6.8.0-1029.29 linux-modules-6.8.0-1029-oem - 6.8.0-1029.29 linux-modules-ipu6-6.8.0-1029-oem - 6.8.0-1029.29 linux-modules-ipu6-oem-24.04 - 6.8.0-1029.29 linux-modules-ipu6-oem-24.04a - 6.8.0-1029.29 linux-modules-iwlwifi-6.8.0-1029-oem - 6.8.0-1029.29 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1029.29 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1029.29 linux-modules-usbio-6.8.0-1029-oem - 6.8.0-1029.29 linux-modules-usbio-oem-24.04 - 6.8.0-1029.29 linux-modules-usbio-oem-24.04a - 6.8.0-1029.29 linux-oem-24.04 - 6.8.0-1029.29 linux-oem-24.04a - 6.8.0-1029.29 linux-oem-6.8-headers-6.8.0-1029 - 6.8.0-1029.29 linux-oem-6.8-tools-6.8.0-1029 - 6.8.0-1029.29 linux-tools-6.8.0-1029-oem - 6.8.0-1029.29 linux-tools-oem-24.04 - 6.8.0-1029.29 linux-tools-oem-24.04a - 6.8.0-1029.29 No subscription required linux-buildinfo-6.8.0-1029-nvidia - 6.8.0-1029.32 linux-buildinfo-6.8.0-1029-nvidia-64k - 6.8.0-1029.32 linux-cloud-tools-nvidia - 6.8.0-1029.32 linux-headers-6.8.0-1029-nvidia - 6.8.0-1029.32 linux-headers-6.8.0-1029-nvidia-64k - 6.8.0-1029.32 linux-headers-nvidia - 6.8.0-1029.32 linux-headers-nvidia-64k - 6.8.0-1029.32 linux-image-6.8.0-1029-nvidia - 6.8.0-1029.32 linux-image-6.8.0-1029-nvidia-64k - 6.8.0-1029.32 linux-image-nvidia - 6.8.0-1029.32 linux-image-nvidia-64k - 6.8.0-1029.32 linux-image-uc-6.8.0-1029-nvidia - 6.8.0-1029.32 linux-image-uc-6.8.0-1029-nvidia-64k - 6.8.0-1029.32 linux-image-unsigned-6.8.0-1029-nvidia - 6.8.0-1029.32 linux-image-unsigned-6.8.0-1029-nvidia-64k - 6.8.0-1029.32 linux-modules-6.8.0-1029-nvidia - 6.8.0-1029.32 linux-modules-6.8.0-1029-nvidia-64k - 6.8.0-1029.32 linux-modules-extra-6.8.0-1029-nvidia - 6.8.0-1029.32 linux-modules-nvidia-fs-6.8.0-1029-nvidia - 6.8.0-1029.32 linux-modules-nvidia-fs-6.8.0-1029-nvidia-64k - 6.8.0-1029.32 linux-modules-nvidia-fs-nvidia - 6.8.0-1029.32 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1029.32 linux-nvidia - 6.8.0-1029.32 linux-nvidia-64k - 6.8.0-1029.32 linux-nvidia-headers-6.8.0-1029 - 6.8.0-1029.32 linux-nvidia-tools-6.8.0-1029 - 6.8.0-1029.32 linux-tools-6.8.0-1029-nvidia - 6.8.0-1029.32 linux-tools-6.8.0-1029-nvidia-64k - 6.8.0-1029.32 linux-tools-nvidia - 6.8.0-1029.32 linux-tools-nvidia-64k - 6.8.0-1029.32 No subscription required linux-buildinfo-6.8.0-1029-nvidia-lowlatency - 6.8.0-1029.32.1 linux-buildinfo-6.8.0-1029-nvidia-lowlatency-64k - 6.8.0-1029.32.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1029.32.1 linux-headers-6.8.0-1029-nvidia-lowlatency - 6.8.0-1029.32.1 linux-headers-6.8.0-1029-nvidia-lowlatency-64k - 6.8.0-1029.32.1 linux-headers-nvidia-lowlatency - 6.8.0-1029.32.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1029.32.1 linux-image-6.8.0-1029-nvidia-lowlatency - 6.8.0-1029.32.1 linux-image-6.8.0-1029-nvidia-lowlatency-64k - 6.8.0-1029.32.1 linux-image-nvidia-lowlatency - 6.8.0-1029.32.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1029.32.1 linux-image-uc-6.8.0-1029-nvidia-lowlatency - 6.8.0-1029.32.1 linux-image-uc-6.8.0-1029-nvidia-lowlatency-64k - 6.8.0-1029.32.1 linux-image-unsigned-6.8.0-1029-nvidia-lowlatency - 6.8.0-1029.32.1 linux-image-unsigned-6.8.0-1029-nvidia-lowlatency-64k - 6.8.0-1029.32.1 linux-modules-6.8.0-1029-nvidia-lowlatency - 6.8.0-1029.32.1 linux-modules-6.8.0-1029-nvidia-lowlatency-64k - 6.8.0-1029.32.1 linux-modules-extra-6.8.0-1029-nvidia-lowlatency - 6.8.0-1029.32.1 linux-modules-nvidia-fs-6.8.0-1029-nvidia-lowlatency - 6.8.0-1029.32.1 linux-modules-nvidia-fs-6.8.0-1029-nvidia-lowlatency-64k - 6.8.0-1029.32.1 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1029.32.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1029.32.1 linux-nvidia-lowlatency - 6.8.0-1029.32.1 linux-nvidia-lowlatency-64k - 6.8.0-1029.32.1 linux-nvidia-lowlatency-headers-6.8.0-1029 - 6.8.0-1029.32.1 linux-nvidia-lowlatency-tools-6.8.0-1029 - 6.8.0-1029.32.1 linux-tools-6.8.0-1029-nvidia-lowlatency - 6.8.0-1029.32.1 linux-tools-6.8.0-1029-nvidia-lowlatency-64k - 6.8.0-1029.32.1 linux-tools-nvidia-lowlatency - 6.8.0-1029.32.1 linux-tools-nvidia-lowlatency-64k - 6.8.0-1029.32.1 No subscription required linux-aws-cloud-tools-6.8.0-1030 - 6.8.0-1030.32 linux-aws-headers-6.8.0-1030 - 6.8.0-1030.32 linux-aws-tools-6.8.0-1030 - 6.8.0-1030.32 linux-buildinfo-6.8.0-1030-aws - 6.8.0-1030.32 linux-buildinfo-6.8.0-1030-aws-64k - 6.8.0-1030.32 linux-cloud-tools-6.8.0-1030-aws - 6.8.0-1030.32 linux-cloud-tools-6.8.0-1030-aws-64k - 6.8.0-1030.32 linux-headers-6.8.0-1030-aws - 6.8.0-1030.32 linux-headers-6.8.0-1030-aws-64k - 6.8.0-1030.32 linux-image-6.8.0-1030-aws - 6.8.0-1030.32 linux-image-6.8.0-1030-aws-64k - 6.8.0-1030.32 linux-image-unsigned-6.8.0-1030-aws - 6.8.0-1030.32 linux-image-unsigned-6.8.0-1030-aws-64k - 6.8.0-1030.32 linux-modules-6.8.0-1030-aws - 6.8.0-1030.32 linux-modules-6.8.0-1030-aws-64k - 6.8....
ubuntu jammy v1.844
What's Changed
- Fixes known issue in the Azure version of v1.842 caused by changes to
cloud-init.
Metadata:
BOSH Agent Version: 2.751.0
Kernel Version: 5.15.0.141.136
USNs:
ubuntu jammy v1.842
Known Issue
- The Azure version of this stemcell has issues when deploying a VM due to a change in
cloud-init. Azure users should use a newer stemcell version instead.
Metadata:
BOSH Agent Version: 2.750.0
Kernel Version: 5.15.0.141.136
- added aws light stemcells to eu-south-1 (milan)
USNs:
Title: USN-7532-1 -- GLib vulnerability
URL: https://ubuntu.com/security/notices/USN-7532-1
Priorities: medium
Description:
It was discovered that Glib incorrectly handled certain inputs. An attacker could possibly use this issue to cause a crash or execute arbitrary code. Update Instructions: Run sudo pro fix USN-7532-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libglib2.0-0 - 2.72.4-0ubuntu2.5 libglib2.0-bin - 2.72.4-0ubuntu2.5 libglib2.0-data - 2.72.4-0ubuntu2.5 libglib2.0-dev - 2.72.4-0ubuntu2.5 libglib2.0-dev-bin - 2.72.4-0ubuntu2.5 libglib2.0-doc - 2.72.4-0ubuntu2.5 libglib2.0-tests - 2.72.4-0ubuntu2.5 No subscription required
CVEs:
Title: USN-7535-1 -- Intel Microcode vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7535-1
Priorities: medium
Description:
Sander Wiebing and Cristiano Giuffrida discovered that some Intel® Processors did not properly handle data in Shared Microarchitectural Structures during Transient Execution. An authenticated attacker could possibly use this issue to obtain sensitive information. (CVE-2024-28956) It was discovered that some Intel® Processors did not properly handle prediction calculations. An authenticated attacker could possibly use this issue to obtain sensitive information. (CVE-2024-43420, CVE-2024-45332, CVE-2025-20623) It was discovered that some Intel® Processors did not properly initialize resources in the branch prediction unit. An authenticated attacker could possibly use this issue to obtain sensitive information. (CVE-2025-20012, CVE-2025-24495) Michal Raviv and Jeff Gilbert discovered that some Intel® Processors did not properly handle resources and exceptions in the core management mechanism. An authenticated attacker could possibly use this issue to cause a denial of service. (CVE-2025-20054, CVE-2025-20103) Update Instructions: Run sudo pro fix USN-7535-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: intel-microcode - 3.20250512.0ubuntu0.22.04.1 No subscription required
CVEs:
- https://ubuntu.com/security/CVE-2024-28956
- https://ubuntu.com/security/CVE-2024-43420
- https://ubuntu.com/security/CVE-2024-45332
- https://ubuntu.com/security/CVE-2025-20012
- https://ubuntu.com/security/CVE-2025-20054
- https://ubuntu.com/security/CVE-2025-20103
- https://ubuntu.com/security/CVE-2025-20623
- https://ubuntu.com/security/CVE-2025-24495
Title: USN-7541-1 -- GNU C Library vulnerability
URL: https://ubuntu.com/security/notices/USN-7541-1
Priorities: medium
Description:
It was discovered that the GNU C Library incorrectly search LD_LIBRARY_PATH to determine which library to load when statically linked setuid binary calls dlopen. A local attacker could possibly use this issue to cause a denial of service or execute arbitrary code. Update Instructions: Run sudo pro fix USN-7541-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: glibc-doc - 2.35-0ubuntu3.10 glibc-source - 2.35-0ubuntu3.10 libc-bin - 2.35-0ubuntu3.10 libc-dev-bin - 2.35-0ubuntu3.10 libc-devtools - 2.35-0ubuntu3.10 libc6 - 2.35-0ubuntu3.10 libc6-amd64 - 2.35-0ubuntu3.10 libc6-dev - 2.35-0ubuntu3.10 libc6-dev-amd64 - 2.35-0ubuntu3.10 libc6-dev-i386 - 2.35-0ubuntu3.10 libc6-dev-s390 - 2.35-0ubuntu3.10 libc6-dev-x32 - 2.35-0ubuntu3.10 libc6-i386 - 2.35-0ubuntu3.10 libc6-prof - 2.35-0ubuntu3.10 libc6-s390 - 2.35-0ubuntu3.10 libc6-x32 - 2.35-0ubuntu3.10 locales - 2.35-0ubuntu3.10 locales-all - 2.35-0ubuntu3.10 nscd - 2.35-0ubuntu3.10 No subscription required
CVEs:
ubuntu noble v1.2
Metadata:
BOSH Agent Version: 2.745.0
Kernel Version: 6.8.0-60.63
initial release
USNs:
ubuntu jammy v1.829
Metadata:
BOSH Agent Version: 2.745.0
Kernel Version: 5.15.0.140.135
USNs:
Title: USN-7510-1 -- Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7510-1
Priorities: medium, low
Description:
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - PowerPC architecture; - x86 architecture; - Block layer subsystem; - Network block device driver; - Bus devices; - Character device driver; - TPM device driver; - Clock framework and drivers; - GPIO subsystem; - GPU drivers; - HID subsystem; - I2C subsystem; - InfiniBand drivers; - Media drivers; - NVIDIA Tegra memory controller driver; - Network drivers; - PCI subsystem; - PPS (Pulse Per Second) driver; - PTP clock framework; - RapidIO drivers; - Real Time Clock drivers; - SLIMbus drivers; - QCOM SoC drivers; - Trusted Execution Environment drivers; - TTY drivers; - USB DSL drivers; - USB Device Class drivers; - USB core drivers; - USB Gadget drivers; - USB Host Controller drivers; - Renesas USBHS Controller drivers; - ACRN Hypervisor Service Module driver; - File systems infrastructure; - BTRFS file system; - F2FS file system; - Network file system (NFS) server daemon; - NILFS2 file system; - Overlay file system; - SMB network file system; - UBI file system; - KVM subsystem; - L3 Master device support module; - Process Accounting mechanism; - Padata parallel execution mechanism; - printk logging mechanism; - Scheduler infrastructure; - Timer subsystem; - Tracing infrastructure; - Memory management; - 802.1Q VLAN protocol; - B.A.T.M.A.N. meshing protocol; - Networking core; - IPv4 networking; - IPv6 networking; - Logical Link layer; - Multipath TCP; - Netfilter; - NFC subsystem; - Open vSwitch; - Rose network layer; - Network traffic control; - Wireless networking; - Landlock security; - Linux Security Modules (LSM) Framework; - Tomoyo security module; (CVE-2025-21731, CVE-2025-21926, CVE-2025-21830, CVE-2024-58010, CVE-2025-21745, CVE-2025-21871, CVE-2024-57980, CVE-2025-21916, CVE-2025-21735, CVE-2025-21763, CVE-2025-21799, CVE-2025-21811, CVE-2025-21814, CVE-2024-58083, CVE-2025-21922, CVE-2025-21802, CVE-2024-58034, CVE-2025-21758, CVE-2024-58069, CVE-2025-21905, CVE-2024-57986, CVE-2025-21718, CVE-2024-58020, CVE-2025-21858, CVE-2025-21749, CVE-2025-21928, CVE-2024-58085, CVE-2025-21795, CVE-2025-21744, CVE-2025-21776, CVE-2025-21804, CVE-2024-57973, CVE-2025-21848, CVE-2025-21844, CVE-2024-56721, CVE-2024-58079, CVE-2025-21781, CVE-2025-21866, CVE-2024-58052, CVE-2024-58017, CVE-2024-58071, CVE-2025-21791, CVE-2024-26982, CVE-2025-21787, CVE-2024-58090, CVE-2025-21951, CVE-2025-21846, CVE-2025-21722, CVE-2024-58001, CVE-2025-21715, CVE-2025-21919, CVE-2025-21904, CVE-2024-57977, CVE-2025-21785, CVE-2025-21950, CVE-2025-21924, CVE-2024-57979, CVE-2025-21711, CVE-2024-47726, CVE-2024-58002, CVE-2025-21914, CVE-2024-58086, CVE-2024-58005, CVE-2025-21835, CVE-2024-58051, CVE-2025-21761, CVE-2025-21760, CVE-2025-21767, CVE-2025-21766, CVE-2025-21726, CVE-2025-21865, CVE-2024-58014, CVE-2025-21878, CVE-2025-21934, CVE-2024-58007, CVE-2025-21898, CVE-2025-21806, CVE-2024-58058, CVE-2025-21779, CVE-2024-58063, CVE-2025-21708, CVE-2025-21684, CVE-2024-57834, CVE-2025-21971, CVE-2025-21762, CVE-2025-21728, CVE-2024-58076, CVE-2025-21704, CVE-2025-21719, CVE-2025-21948, CVE-2025-21707, CVE-2025-21917, CVE-2025-21782, CVE-2025-21943, CVE-2025-21765, CVE-2025-21721, CVE-2024-58016, CVE-2025-21859, CVE-2025-21909, CVE-2025-21748, CVE-2025-21912, CVE-2025-21736, CVE-2025-21862, CVE-2024-57978, CVE-2025-21826, CVE-2025-21920, CVE-2025-21772, CVE-2025-21877, CVE-2025-21935, CVE-2024-56599, CVE-2025-21820, CVE-2025-21764, CVE-2025-21796, CVE-2025-21887, CVE-2025-21753, CVE-2025-21910, CVE-2024-57981, CVE-2025-21727, CVE-2025-21875, CVE-2024-58072, CVE-2024-58055, CVE-2025-21925, CVE-2025-21823, CVE-2025-21647) Update Instructions: Run sudo pro fix USN-7510-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-5.15.0-1066-gkeop - 5.15.0-1066.74 linux-cloud-tools-5.15.0-1066-gkeop - 5.15.0-1066.74 linux-gkeop-cloud-tools-5.15.0-1066 - 5.15.0-1066.74 linux-gkeop-headers-5.15.0-1066 - 5.15.0-1066.74 linux-gkeop-tools-5.15.0-1066 - 5.15.0-1066.74 linux-headers-5.15.0-1066-gkeop - 5.15.0-1066.74 linux-image-5.15.0-1066-gkeop - 5.15.0-1066.74 linux-image-unsigned-5.15.0-1066-gkeop - 5.15.0-1066.74 linux-modules-5.15.0-1066-gkeop - 5.15.0-1066.74 linux-modules-extra-5.15.0-1066-gkeop - 5.15.0-1066.74 linux-tools-5.15.0-1066-gkeop - 5.15.0-1066.74 No subscription required linux-buildinfo-5.15.0-1076-ibm - 5.15.0-1076.79 linux-headers-5.15.0-1076-ibm - 5.15.0-1076.79 linux-ibm-cloud-tools-common - 5.15.0-1076.79 linux-ibm-headers-5.15.0-1076 - 5.15.0-1076.79 linux-ibm-source-5.15.0 - 5.15.0-1076.79 linux-ibm-tools-5.15.0-1076 - 5.15.0-1076.79 linux-ibm-tools-common - 5.15.0-1076.79 linux-image-5.15.0-1076-ibm - 5.15.0-1076.79 linux-image-unsigned-5.15.0-1076-ibm - 5.15.0-1076.79 linux-modules-5.15.0-1076-ibm - 5.15.0-1076.79 linux-modules-extra-5.15.0-1076-ibm - 5.15.0-1076.79 linux-tools-5.15.0-1076-ibm - 5.15.0-1076.79 No subscription required linux-buildinfo-5.15.0-1078-nvidia - 5.15.0-1078.79 linux-buildinfo-5.15.0-1078-nvidia-lowlatency - 5.15.0-1078.79 linux-cloud-tools-5.15.0-1078-nvidia - 5.15.0-1078.79 linux-cloud-tools-5.15.0-1078-nvidia-lowlatency - 5.15.0-1078.79 linux-headers-5.15.0-1078-nvidia - 5.15.0-1078.79 linux-headers-5.15.0-1078-nvidia-lowlatency - 5.15.0-1078.79 linux-image-5.15.0-1078-nvidia - 5.15.0-1078.79 linux-image-5.15.0-1078-nvidia-lowlatency - 5.15.0-1078.79 linux-image-unsigned-5.15.0-1078-nvidia - 5.15.0-1078.79 linux-image-unsigned-5.15.0-1078-nvidia-lowlatency - 5.15.0-1078.79 linux-modules-5.15.0-1078-nvidia - 5.15.0-1078.79 linux-modules-5.15.0-1078-nvidia-lowlatency - 5.15.0-1078.79 linux-modules-extra-5.15.0-1078-nvidia - 5.15.0-1078.79 linux-modules-nvidia-fs-5.15.0-1078-nvidia - 5.15.0-1078.79 linux-modules-nvidia-fs-5.15.0-1078-nvidia-lowlatency - 5.15.0-1078.79 linux-nvidia-cloud-tools-5.15.0-1078 - 5.15.0-1078.79 linux-nvidia-cloud-tools-common - 5.15.0-1078.79 linux-nvidia-headers-5.15.0-1078 - 5.15.0-1078.79 linux-nvidia-tools-5.15.0-1078 - 5.15.0-1078.79 linux-nvidia-tools-common - 5.15.0-1078.79 linux-nvidia-tools-host - 5.15.0-1078.79 linux-tools-5.15.0-1078-nvidia - 5.15.0-1078.79 linux-tools-5.15.0-1078-nvidia-lowlatency - 5.15.0-1078.79 No subscription required linux-buildinfo-5.15.0-1079-intel-iotg - 5.15.0-1079.85 linux-cloud-tools-5.15.0-1079-intel-iotg - 5.15.0-1079.85 linux-headers-5.15.0-1079-intel-iotg - 5.15.0-1079.85 linux-image-5.15.0-1079-intel-iotg - 5.15.0-1079.85 linux-image-unsigned-5.15.0-1079-intel-iotg - 5.15.0-1079.85 linux-intel-iotg-cloud-tools-5.15.0-1079 - 5.15.0-1079.85 linux-intel-iotg-cloud-tools-common - 5.15.0-1079.85 linux-intel-iotg-headers-5.15.0-1079 - 5.15.0-1079.85 linux-intel-iotg-tools-5.15.0-1079 - 5.15.0-1079.85 linux-intel-iotg-tools-common - 5.15.0-1079.85 linux-intel-iotg-tools-host - 5.15.0-1079.85 linux-modules-5.15.0-1079-intel-iotg - 5.15.0-1079.85 linux-modules-extra-5.15.0-1079-intel-iotg - 5.15.0-1079.85 linux-modules-iwlwifi-5.15.0-1079-intel-iotg - 5.15.0-1079.85 linux-tools-5.15.0-1079-intel-iotg - 5.15.0-1079.85 No subscription required linux-buildinfo-5.15.0-1080-kvm - 5.15.0-1080.85 linux-headers-5.15.0-1080-kvm - 5.15.0-1080.85 linux-image-5.15.0-1080-kvm - 5.15.0-1080.85 linux-image-unsigned-5.15.0-1080-kvm - 5.15.0-1080.85 linux-kvm-headers-5.15.0-1080 - 5.15.0-1080.85 linux-kvm-tools-5.15.0-1080 - 5.15.0-1080.85 linux-modules-5.15.0-1080-kvm - 5.15.0-1080.85 linux-tools-5.15.0-1080-kvm - 5.15.0-1080.85 No subscription required linux-buildinfo-5.15.0-1081-oracle - 5.15.0-1081.87 linux-headers-5.15.0-1081-oracle - 5.15.0-1081.87 linux-image-5.15.0-1081-oracle - 5.15.0-1081.87 linux-image-unsigned-5.15.0-1081-oracle - 5.15.0-1081.87 linux-modules-5.15.0-1081-oracle - 5.15.0-1081.87 linux-modules-extra-5.15.0-1081-oracle - 5.15.0-1081.87 linux-oracle-headers-5.15.0-1081 - 5.15.0-1081.87 linux-oracle-tools-5.15.0-1081 - 5.15.0-1081.87 linux-tools-5.15.0-1081-oracle - 5.15.0-1081.87 No subscription required linux-buildinfo-5.15.0-140-generic - 5.15.0-140.150 linux-buildinfo-5.15.0-140-generic-64k - 5.15.0-140.150 linux-buildinfo-5.15.0-140-generic-lpae - 5.15.0-140.150 linux-buildinfo-5.15.0-140-lowlatency - 5.15.0-140.150 linux-buildinfo-5.15.0-140-lowlatency-64k - 5.15.0-140.150 linux-cloud-tools-5.15.0-140 - 5.15.0-140.150 linux-cloud-tools-5.15.0-140-generic - 5.15.0-140.150 linux-cloud-tools-5.15.0-140-lowlatency - 5.15.0-140.150 linux-cloud-tools-common - 5.15.0-140.150 linux-doc - 5.15.0-140.150 linux-headers-5.15.0-140 - 5.15.0-140.150 linux-headers-5.15.0-140-generic - 5.15.0-140.150 linux-headers-5.15.0-140-generic-64k - 5.15.0-140.150 linux-headers-5.15.0-140-generic-lpae - 5.15.0-140.150 linux-headers-5.15.0-140-lowlatency - 5.15.0-140.150 linux-headers-5.15.0-140-lowlatency-64k - 5.15.0-140.150 linux-image-5.15.0-140-generic - 5.15.0-140.150 linux-image-5.15.0-140-generic-64k - 5.15.0-140.150 linux-image-5.15.0-140-generic-lpae - 5.15.0-140.150 linux-image-5.15.0-140-lowlatency - 5.15.0-140.150 linux-image-5.15.0-140-lowlatency-64k - 5.15.0-140.150 linux-image-unsigned-5.15.0-140-generic - 5.15.0-140.150 linux-image-unsigned-5.15.0-140-generic-64k - 5.15.0-140.150 linux-image-unsigned-5.15.0-140-lowlatency - 5.15.0-140.150 linux-image-unsigned-5.15.0-140-lowlatency-64k - 5.15.0-140.150 linux-libc-dev - 5.15.0-140.150 linux-lowlatency-cloud-tools-5.15.0-140 - 5.15.0-140.150 linux-lowlatency-headers-5.15.0-140 - 5.15.0-140.150 linux-lowlatency-to...
ubuntu jammy v1.824
Metadata:
BOSH Agent Version: 2.744.0
Kernel Version: 5.15.0.139.135
USNs:
Title: USN-7467-1 -- libxml2 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7467-1
Priorities: medium
Description:
It was discovered that the libxml2 Python bindings incorrectly handled certain return values. An attacker could possibly use this issue to cause libxml2 to crash, resulting in a denial of service. (CVE-2025-32414) It was discovered that libxml2 incorrectly handled certain memory operations. A remote attacker could possibly use this issue to cause libxml2 to crash, resulting in a denial of service. (CVE-2025-32415) Update Instructions: Run sudo pro fix USN-7467-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libxml2 - 2.9.13+dfsg-1ubuntu0.7 libxml2-dev - 2.9.13+dfsg-1ubuntu0.7 libxml2-doc - 2.9.13+dfsg-1ubuntu0.7 libxml2-utils - 2.9.13+dfsg-1ubuntu0.7 python3-libxml2 - 2.9.13+dfsg-1ubuntu0.7 No subscription required
CVEs:
Title: USN-7494-1 -- Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7494-1
Priorities: high
Description:
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Network drivers; - Netfilter; (CVE-2023-52664, CVE-2023-52927) Update Instructions: Run sudo pro fix USN-7494-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-5.15.0-1024-nvidia-tegra-igx - 5.15.0-1024.24 linux-buildinfo-5.15.0-1024-nvidia-tegra-igx-rt - 5.15.0-1024.24 linux-headers-5.15.0-1024-nvidia-tegra-igx - 5.15.0-1024.24 linux-headers-5.15.0-1024-nvidia-tegra-igx-rt - 5.15.0-1024.24 linux-image-5.15.0-1024-nvidia-tegra-igx - 5.15.0-1024.24 linux-image-5.15.0-1024-nvidia-tegra-igx-rt - 5.15.0-1024.24 linux-image-uc-5.15.0-1024-nvidia-tegra-igx - 5.15.0-1024.24 linux-image-uc-5.15.0-1024-nvidia-tegra-igx-rt - 5.15.0-1024.24 linux-image-unsigned-5.15.0-1024-nvidia-tegra-igx - 5.15.0-1024.24 linux-image-unsigned-5.15.0-1024-nvidia-tegra-igx-rt - 5.15.0-1024.24 linux-modules-5.15.0-1024-nvidia-tegra-igx - 5.15.0-1024.24 linux-modules-5.15.0-1024-nvidia-tegra-igx-rt - 5.15.0-1024.24 linux-modules-extra-5.15.0-1024-nvidia-tegra-igx - 5.15.0-1024.24 linux-nvidia-tegra-igx-headers-5.15.0-1024 - 5.15.0-1024.24 linux-nvidia-tegra-igx-tools-5.15.0-1024 - 5.15.0-1024.24 linux-tools-5.15.0-1024-nvidia-tegra-igx - 5.15.0-1024.24 linux-tools-5.15.0-1024-nvidia-tegra-igx-rt - 5.15.0-1024.24 No subscription required linux-buildinfo-5.15.0-1036-nvidia-tegra - 5.15.0-1036.36 linux-buildinfo-5.15.0-1036-nvidia-tegra-rt - 5.15.0-1036.36 linux-headers-5.15.0-1036-nvidia-tegra - 5.15.0-1036.36 linux-headers-5.15.0-1036-nvidia-tegra-rt - 5.15.0-1036.36 linux-image-5.15.0-1036-nvidia-tegra - 5.15.0-1036.36 linux-image-5.15.0-1036-nvidia-tegra-rt - 5.15.0-1036.36 linux-image-unsigned-5.15.0-1036-nvidia-tegra - 5.15.0-1036.36 linux-image-unsigned-5.15.0-1036-nvidia-tegra-rt - 5.15.0-1036.36 linux-modules-5.15.0-1036-nvidia-tegra - 5.15.0-1036.36 linux-modules-5.15.0-1036-nvidia-tegra-rt - 5.15.0-1036.36 linux-modules-extra-5.15.0-1036-nvidia-tegra - 5.15.0-1036.36 linux-nvidia-tegra-headers-5.15.0-1036 - 5.15.0-1036.36 linux-nvidia-tegra-tools-5.15.0-1036 - 5.15.0-1036.36 linux-tools-5.15.0-1036-nvidia-tegra - 5.15.0-1036.36 linux-tools-5.15.0-1036-nvidia-tegra-rt - 5.15.0-1036.36 No subscription required linux-buildinfo-5.15.0-1065-gkeop - 5.15.0-1065.73 linux-cloud-tools-5.15.0-1065-gkeop - 5.15.0-1065.73 linux-gkeop-cloud-tools-5.15.0-1065 - 5.15.0-1065.73 linux-gkeop-headers-5.15.0-1065 - 5.15.0-1065.73 linux-gkeop-tools-5.15.0-1065 - 5.15.0-1065.73 linux-headers-5.15.0-1065-gkeop - 5.15.0-1065.73 linux-image-5.15.0-1065-gkeop - 5.15.0-1065.73 linux-image-unsigned-5.15.0-1065-gkeop - 5.15.0-1065.73 linux-modules-5.15.0-1065-gkeop - 5.15.0-1065.73 linux-modules-extra-5.15.0-1065-gkeop - 5.15.0-1065.73 linux-tools-5.15.0-1065-gkeop - 5.15.0-1065.73 No subscription required linux-buildinfo-5.15.0-1075-ibm - 5.15.0-1075.78 linux-headers-5.15.0-1075-ibm - 5.15.0-1075.78 linux-ibm-cloud-tools-common - 5.15.0-1075.78 linux-ibm-headers-5.15.0-1075 - 5.15.0-1075.78 linux-ibm-source-5.15.0 - 5.15.0-1075.78 linux-ibm-tools-5.15.0-1075 - 5.15.0-1075.78 linux-ibm-tools-common - 5.15.0-1075.78 linux-image-5.15.0-1075-ibm - 5.15.0-1075.78 linux-image-unsigned-5.15.0-1075-ibm - 5.15.0-1075.78 linux-modules-5.15.0-1075-ibm - 5.15.0-1075.78 linux-modules-extra-5.15.0-1075-ibm - 5.15.0-1075.78 linux-tools-5.15.0-1075-ibm - 5.15.0-1075.78 No subscription required linux-buildinfo-5.15.0-1077-nvidia - 5.15.0-1077.78 linux-buildinfo-5.15.0-1077-nvidia-lowlatency - 5.15.0-1077.78 linux-cloud-tools-5.15.0-1077-nvidia - 5.15.0-1077.78 linux-cloud-tools-5.15.0-1077-nvidia-lowlatency - 5.15.0-1077.78 linux-headers-5.15.0-1077-nvidia - 5.15.0-1077.78 linux-headers-5.15.0-1077-nvidia-lowlatency - 5.15.0-1077.78 linux-image-5.15.0-1077-nvidia - 5.15.0-1077.78 linux-image-5.15.0-1077-nvidia-lowlatency - 5.15.0-1077.78 linux-image-unsigned-5.15.0-1077-nvidia - 5.15.0-1077.78 linux-image-unsigned-5.15.0-1077-nvidia-lowlatency - 5.15.0-1077.78 linux-modules-5.15.0-1077-nvidia - 5.15.0-1077.78 linux-modules-5.15.0-1077-nvidia-lowlatency - 5.15.0-1077.78 linux-modules-extra-5.15.0-1077-nvidia - 5.15.0-1077.78 linux-modules-nvidia-fs-5.15.0-1077-nvidia - 5.15.0-1077.78 linux-modules-nvidia-fs-5.15.0-1077-nvidia-lowlatency - 5.15.0-1077.78 linux-nvidia-cloud-tools-5.15.0-1077 - 5.15.0-1077.78 linux-nvidia-cloud-tools-common - 5.15.0-1077.78 linux-nvidia-headers-5.15.0-1077 - 5.15.0-1077.78 linux-nvidia-tools-5.15.0-1077 - 5.15.0-1077.78 linux-nvidia-tools-common - 5.15.0-1077.78 linux-nvidia-tools-host - 5.15.0-1077.78 linux-tools-5.15.0-1077-nvidia - 5.15.0-1077.78 linux-tools-5.15.0-1077-nvidia-lowlatency - 5.15.0-1077.78 No subscription required linux-buildinfo-5.15.0-1077-raspi - 5.15.0-1077.80 linux-headers-5.15.0-1077-raspi - 5.15.0-1077.80 linux-image-5.15.0-1077-raspi - 5.15.0-1077.80 linux-modules-5.15.0-1077-raspi - 5.15.0-1077.80 linux-modules-extra-5.15.0-1077-raspi - 5.15.0-1077.80 linux-raspi-headers-5.15.0-1077 - 5.15.0-1077.80 linux-raspi-tools-5.15.0-1077 - 5.15.0-1077.80 linux-tools-5.15.0-1077-raspi - 5.15.0-1077.80 No subscription required linux-buildinfo-5.15.0-1078-intel-iotg - 5.15.0-1078.84 linux-cloud-tools-5.15.0-1078-intel-iotg - 5.15.0-1078.84 linux-headers-5.15.0-1078-intel-iotg - 5.15.0-1078.84 linux-image-5.15.0-1078-intel-iotg - 5.15.0-1078.84 linux-image-unsigned-5.15.0-1078-intel-iotg - 5.15.0-1078.84 linux-intel-iotg-cloud-tools-5.15.0-1078 - 5.15.0-1078.84 linux-intel-iotg-cloud-tools-common - 5.15.0-1078.84 linux-intel-iotg-headers-5.15.0-1078 - 5.15.0-1078.84 linux-intel-iotg-tools-5.15.0-1078 - 5.15.0-1078.84 linux-intel-iotg-tools-common - 5.15.0-1078.84 linux-intel-iotg-tools-host - 5.15.0-1078.84 linux-modules-5.15.0-1078-intel-iotg - 5.15.0-1078.84 linux-modules-extra-5.15.0-1078-intel-iotg - 5.15.0-1078.84 linux-modules-iwlwifi-5.15.0-1078-intel-iotg - 5.15.0-1078.84 linux-tools-5.15.0-1078-intel-iotg - 5.15.0-1078.84 No subscription required linux-buildinfo-5.15.0-1079-kvm - 5.15.0-1079.84 linux-headers-5.15.0-1079-kvm - 5.15.0-1079.84 linux-image-5.15.0-1079-kvm - 5.15.0-1079.84 linux-image-unsigned-5.15.0-1079-kvm - 5.15.0-1079.84 linux-kvm-headers-5.15.0-1079 - 5.15.0-1079.84 linux-kvm-tools-5.15.0-1079 - 5.15.0-1079.84 linux-modules-5.15.0-1079-kvm - 5.15.0-1079.84 linux-tools-5.15.0-1079-kvm - 5.15.0-1079.84 No subscription required linux-buildinfo-5.15.0-1080-gke - 5.15.0-1080.86 linux-buildinfo-5.15.0-1080-oracle - 5.15.0-1080.86 linux-gke-headers-5.15.0-1080 - 5.15.0-1080.86 linux-gke-tools-5.15.0-1080 - 5.15.0-1080.86 linux-headers-5.15.0-1080-gke - 5.15.0-1080.86 linux-headers-5.15.0-1080-oracle - 5.15.0-1080.86 linux-image-5.15.0-1080-gke - 5.15.0-1080.86 linux-image-5.15.0-1080-oracle - 5.15.0-1080.86 linux-image-unsigned-5.15.0-1080-gke - 5.15.0-1080.86 linux-image-unsigned-5.15.0-1080-oracle - 5.15.0-1080.86 linux-modules-5.15.0-1080-gke - 5.15.0-1080.86 linux-modules-5.15.0-1080-oracle - 5.15.0-1080.86 linux-modules-extra-5.15.0-1080-gke - 5.15.0-1080.86 linux-modules-extra-5.15.0-1080-oracle - 5.15.0-1080.86 linux-oracle-headers-5.15.0-1080 - 5.15.0-1080.86 linux-oracle-tools-5.15.0-1080 - 5.15.0-1080.86 linux-tools-5.15.0-1080-gke - 5.15.0-1080.86 linux-tools-5.15.0-1080-oracle - 5.15.0-1080.86 No subscription required linux-buildinfo-5.15.0-1082-gcp - 5.15.0-1082.91 linux-gcp-headers-5.15.0-1082 - 5.15.0-1082.91 linux-gcp-tools-5.15.0-1082 - 5.15.0-1082.91 linux-headers-5.15.0-1082-gcp - 5.15.0-1082.91 linux-image-5.15.0-1082-gcp - 5.15.0-1082.91 linux-image-unsigned-5.15.0-1082-gcp - 5.15.0-1082.91 linux-modules-5.15.0-1082-gcp - 5.15.0-1082.91 linux-modules-extra-5.15.0-1082-gcp - 5.15.0-1082.91 linux-tools-5.15.0-1082-gcp - 5.15.0-1082.91 No subscription required linux-aws-cloud-tools-5.15.0-1083 - 5.15.0-1083.90 linux-aws-headers-5.15.0-1083 - 5.15.0-1083.90 linux-aws-tools-5.15.0-1083 - 5.15.0-1083.90 linux-buildinfo-5.15.0-1083-aws - 5.15.0-1083.90 linux-cloud-tools-5.15.0-1083-aws - 5.15.0-1083.90 linux-headers-5.15.0-1083-aws - 5.15.0-1083.90 linux-image-5.15.0-1083-aws - 5.15.0-1083.90 linux-image-unsigned-5.15.0-1083-aws - 5.15.0-1083.90 linux-modules-5.15.0-1083-aws - 5.15.0-1083.90 linux-modules-extra-5.15.0-1083-aws - 5.15.0-1083.90 linux-tools-5.15.0-1083-aws - 5.15.0-1083.90 No subscription required linux-buildinfo-5.15.0-139-generic - 5.15.0-139.149 linux-buildinfo-5.15.0-139-generic-64k - 5.15.0-139.149 linux-buildinfo-5.15.0-139-generic-lpae - 5.15.0-139.149 linux-buildinfo-5.15.0-139-lowlatency - 5.15.0-139.149 linux-...
ubuntu jammy v1.822
Metadata:
BOSH Agent Version: 2.744.0
Kernel Version: 5.15.0.138.134
USNs:
Title: USN-7423-1 -- GNU binutils vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7423-1
Priorities: low,medium
Description:
It was discovered that GNU binutils incorrectly handled certain inputs. An attacker could possibly use this issue to cause a crash, expose sensitive information or execute arbitrary code. (CVE-2025-1153, CVE-2025-1182) It was discovered that ld in GNU binutils incorrectly handled certain files. An attacker could possibly use this issue to execute arbitrary code. (CVE-2025-1176) It was discovered that ld in GNU binutils incorrectly handled certain files. An attacker could possibly use this issue to cause a crash, expose sensitive information or execute arbitrary code. This issue only affected Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, and Ubuntu 24.10. (CVE-2025-1178, CVE-2025-1181) Update Instructions: Run sudo pro fix USN-7423-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: binutils - 2.38-4ubuntu2.8 binutils-aarch64-linux-gnu - 2.38-4ubuntu2.8 binutils-alpha-linux-gnu - 2.38-4ubuntu2.8 binutils-arm-linux-gnueabi - 2.38-4ubuntu2.8 binutils-arm-linux-gnueabihf - 2.38-4ubuntu2.8 binutils-common - 2.38-4ubuntu2.8 binutils-dev - 2.38-4ubuntu2.8 binutils-doc - 2.38-4ubuntu2.8 binutils-for-build - 2.38-4ubuntu2.8 binutils-for-host - 2.38-4ubuntu2.8 binutils-hppa-linux-gnu - 2.38-4ubuntu2.8 binutils-hppa64-linux-gnu - 2.38-4ubuntu2.8 binutils-i686-gnu - 2.38-4ubuntu2.8 binutils-i686-kfreebsd-gnu - 2.38-4ubuntu2.8 binutils-i686-linux-gnu - 2.38-4ubuntu2.8 binutils-ia64-linux-gnu - 2.38-4ubuntu2.8 binutils-m68k-linux-gnu - 2.38-4ubuntu2.8 binutils-multiarch - 2.38-4ubuntu2.8 binutils-multiarch-dev - 2.38-4ubuntu2.8 binutils-powerpc-linux-gnu - 2.38-4ubuntu2.8 binutils-powerpc64-linux-gnu - 2.38-4ubuntu2.8 binutils-powerpc64le-linux-gnu - 2.38-4ubuntu2.8 binutils-riscv64-linux-gnu - 2.38-4ubuntu2.8 binutils-s390x-linux-gnu - 2.38-4ubuntu2.8 binutils-sh4-linux-gnu - 2.38-4ubuntu2.8 binutils-source - 2.38-4ubuntu2.8 binutils-sparc64-linux-gnu - 2.38-4ubuntu2.8 binutils-x86-64-kfreebsd-gnu - 2.38-4ubuntu2.8 binutils-x86-64-linux-gnu - 2.38-4ubuntu2.8 binutils-x86-64-linux-gnux32 - 2.38-4ubuntu2.8 libbinutils - 2.38-4ubuntu2.8 libctf-nobfd0 - 2.38-4ubuntu2.8 libctf0 - 2.38-4ubuntu2.8 No subscription required
CVEs:
- https://ubuntu.com/security/CVE-2025-1153
- https://ubuntu.com/security/CVE-2025-1176
- https://ubuntu.com/security/CVE-2025-1178
- https://ubuntu.com/security/CVE-2025-1181
- https://ubuntu.com/security/CVE-2025-1182
Title: USN-7454-1 -- libarchive vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7454-1
Priorities: medium,low
Description:
It was discovered that the libarchive bsdunzip utility incorrectly handled certain ZIP archive files. If a user or automated system were tricked into processing a specially crafted ZIP archive, an attacker could use this issue to cause libarchive to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 24.04 LTS, Ubuntu 24.10, and Ubuntu 25.04. (CVE-2025-1632) It was discovered that libarchive incorrectly handled certain TAR archive files. If a user or automated system were tricked into processing a specially crafted TAR archive, an attacker could use this issue to cause libarchive to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2025-25724) Update Instructions: Run sudo pro fix USN-7454-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libarchive-dev - 3.6.0-1ubuntu1.4 libarchive-tools - 3.6.0-1ubuntu1.4 libarchive13 - 3.6.0-1ubuntu1.4 No subscription required
CVEs:
Title: USN-7455-1 -- Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7455-1
Priorities: high,medium,low
Description:
Jann Horn discovered that the watch_queue event notification subsystem in the Linux kernel contained an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service (system crash) or escalate their privileges. (CVE-2022-0995) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Network drivers; - File systems infrastructure; - NTFS3 file system; - Ethernet bridge; - Ethtool driver; - IPv6 networking; - Network traffic control; - VMware vSockets driver; (CVE-2025-21703, CVE-2024-56651, CVE-2024-50248, CVE-2025-21701, CVE-2024-26837, CVE-2024-46826, CVE-2025-21993, CVE-2025-21702, CVE-2024-50256, CVE-2025-21756, CVE-2025-21700) Update Instructions: Run sudo pro fix USN-7455-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-5.15.0-1023-nvidia-tegra-igx - 5.15.0-1023.23 linux-buildinfo-5.15.0-1023-nvidia-tegra-igx-rt - 5.15.0-1023.23 linux-headers-5.15.0-1023-nvidia-tegra-igx - 5.15.0-1023.23 linux-headers-5.15.0-1023-nvidia-tegra-igx-rt - 5.15.0-1023.23 linux-image-5.15.0-1023-nvidia-tegra-igx - 5.15.0-1023.23 linux-image-5.15.0-1023-nvidia-tegra-igx-rt - 5.15.0-1023.23 linux-image-uc-5.15.0-1023-nvidia-tegra-igx - 5.15.0-1023.23 linux-image-uc-5.15.0-1023-nvidia-tegra-igx-rt - 5.15.0-1023.23 linux-image-unsigned-5.15.0-1023-nvidia-tegra-igx - 5.15.0-1023.23 linux-image-unsigned-5.15.0-1023-nvidia-tegra-igx-rt - 5.15.0-1023.23 linux-modules-5.15.0-1023-nvidia-tegra-igx - 5.15.0-1023.23 linux-modules-5.15.0-1023-nvidia-tegra-igx-rt - 5.15.0-1023.23 linux-modules-extra-5.15.0-1023-nvidia-tegra-igx - 5.15.0-1023.23 linux-nvidia-tegra-igx-headers-5.15.0-1023 - 5.15.0-1023.23 linux-nvidia-tegra-igx-tools-5.15.0-1023 - 5.15.0-1023.23 linux-tools-5.15.0-1023-nvidia-tegra-igx - 5.15.0-1023.23 linux-tools-5.15.0-1023-nvidia-tegra-igx-rt - 5.15.0-1023.23 No subscription required linux-buildinfo-5.15.0-1035-nvidia-tegra - 5.15.0-1035.35 linux-buildinfo-5.15.0-1035-nvidia-tegra-rt - 5.15.0-1035.35 linux-headers-5.15.0-1035-nvidia-tegra - 5.15.0-1035.35 linux-headers-5.15.0-1035-nvidia-tegra-rt - 5.15.0-1035.35 linux-image-5.15.0-1035-nvidia-tegra - 5.15.0-1035.35 linux-image-5.15.0-1035-nvidia-tegra-rt - 5.15.0-1035.35 linux-image-unsigned-5.15.0-1035-nvidia-tegra - 5.15.0-1035.35 linux-image-unsigned-5.15.0-1035-nvidia-tegra-rt - 5.15.0-1035.35 linux-modules-5.15.0-1035-nvidia-tegra - 5.15.0-1035.35 linux-modules-5.15.0-1035-nvidia-tegra-rt - 5.15.0-1035.35 linux-modules-extra-5.15.0-1035-nvidia-tegra - 5.15.0-1035.35 linux-nvidia-tegra-headers-5.15.0-1035 - 5.15.0-1035.35 linux-nvidia-tegra-tools-5.15.0-1035 - 5.15.0-1035.35 linux-tools-5.15.0-1035-nvidia-tegra - 5.15.0-1035.35 linux-tools-5.15.0-1035-nvidia-tegra-rt - 5.15.0-1035.35 No subscription required linux-buildinfo-5.15.0-1064-gkeop - 5.15.0-1064.72 linux-cloud-tools-5.15.0-1064-gkeop - 5.15.0-1064.72 linux-gkeop-cloud-tools-5.15.0-1064 - 5.15.0-1064.72 linux-gkeop-headers-5.15.0-1064 - 5.15.0-1064.72 linux-gkeop-tools-5.15.0-1064 - 5.15.0-1064.72 linux-headers-5.15.0-1064-gkeop - 5.15.0-1064.72 linux-image-5.15.0-1064-gkeop - 5.15.0-1064.72 linux-image-unsigned-5.15.0-1064-gkeop - 5.15.0-1064.72 linux-modules-5.15.0-1064-gkeop - 5.15.0-1064.72 linux-modules-extra-5.15.0-1064-gkeop - 5.15.0-1064.72 linux-tools-5.15.0-1064-gkeop - 5.15.0-1064.72 No subscription required linux-buildinfo-5.15.0-1074-ibm - 5.15.0-1074.77 linux-headers-5.15.0-1074-ibm - 5.15.0-1074.77 linux-ibm-cloud-tools-common - 5.15.0-1074.77 linux-ibm-headers-5.15.0-1074 - 5.15.0-1074.77 linux-ibm-source-5.15.0 - 5.15.0-1074.77 linux-ibm-tools-5.15.0-1074 - 5.15.0-1074.77 linux-ibm-tools-common - 5.15.0-1074.77 linux-image-5.15.0-1074-ibm - 5.15.0-1074.77 linux-image-unsigned-5.15.0-1074-ibm - 5.15.0-1074.77 linux-modules-5.15.0-1074-ibm - 5.15.0-1074.77 linux-modules-extra-5.15.0-1074-ibm - 5.15.0-1074.77 linux-tools-5.15.0-1074-ibm - 5.15.0-1074.77 No subscription required linux-buildinfo-5.15.0-1076-nvidia - 5.15.0-1076.77 linux-buildinfo-5.15.0-1076-nvidia-lowlatency - 5.15.0-1076.77 linux-cloud-tools-5.15.0-1076-nvidia - 5.15.0-1076.77 linux-cloud-tools-5.15.0-1076-nvidia-lowlatency - 5.15.0-1076.77 linux-headers-5.15.0-1076-nvidia - 5.15.0-1076.77 linux-headers-5.15.0-1076-nvidia-lowlatency - 5.15.0-1076.77 linux-image-5.15.0-1076-nvidia - 5.15.0-1076.77 linux-image-5.15.0-1076-nvidia-lowlatency - 5.15.0-1076.77 linux-image-unsigned-5.15.0-1076-nvidia - 5.15.0-1076.77 linux-image-unsigned-5.15.0-1076-nvidia-lowlatency - 5.15.0-1076.77 linux-modules-5.15.0-1076-nvidia - 5.15.0-1076.77 linux-modules-5.15.0-1076-nvidia-lowlatency - 5.15.0-1076.77 linux-modules-extra-5.15.0-1076-nvidia - 5.15.0-1076.77 linux-modules-nvidia-fs-5.15.0-1076-nvidia - 5.15.0-1076.77 linux-modules-nvidia-fs-5.15.0-1076-nvidia-lowlatency - 5.15.0-1076.77 linux-nvidia-cloud-tools-5.15.0-1076 - 5.15.0-1076.77 linux-nvidia-cloud-tools-common - 5.15.0-1076.77 linux-nvidia-headers-5.15.0-1076 - 5.15.0-1076.77 linux-nvidia-tools-5.15.0-1076 - 5.15.0-1076.77 linux-nvidia-tools-common - 5.15.0-1076.77 linux-nvidia-tools-host - 5.15.0-1076.77 linux-tools-5.15.0-1076-nvidia - 5.15.0-1076.77 linux-tools-5.15.0-1076-nvidia-lowlatency - 5.15.0-1076.77 No subscription required linux-buildinfo-5.15.0-1076-raspi - 5.15.0-1076.79 linux-headers-5.15.0-1076-raspi - 5.15.0-1076.79 linux-image-5.15.0-1076-raspi - 5.15.0-1076.79 linux-modules-5.15.0-1076-raspi - 5.15.0-1076.79 linux-modules-extra-5.15.0-1076-raspi - 5.15.0-1076.79 linux-raspi-headers-5.15.0-1076 - 5.15.0-1076.79 linux-raspi-tools-5.15.0-1076 - 5.15.0-1076.79 linux-tools-5.15.0-1076-raspi - 5.15.0-1076.79 No subscri...
ubuntu jammy v1.808
Metadata:
BOSH Agent Version: 2.744.0
Kernel Version: 5.15.0.136.134
USNs:
Title: USN-7369-1 -- elfutils vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7369-1
Priorities: medium,low
Description:
It was discovered that readelf from elfutils could be made to read out of bounds. If a user or automated system were tricked into running readelf on a specially crafted file, an attacker could cause readelf to crash, resulting in a denial of service. This issue only affected Ubuntu 24.04 LTS. (CVE-2024-25260) It was discovered that readelf from elfutils could be made to write out of bounds. If a user or automated system were tricked into running readelf on a specially crafted file, an attacker could cause readelf to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2025-1365) It was discovered that readelf from elfutils could be made to dereference invalid memory. If a user or automated system were tricked into running readelf on a specially crafted file, an attacker could cause readelf to crash, resulting in a denial of service. This issue only affected Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2025-1371) It was discovered that readelf from elfutils could be made to dereference invalid memory. If a user or automated system were tricked into running readelf on a specially crafted file, an attacker could cause readelf to crash, resulting in a denial of service. (CVE-2025-1372) It was discovered that strip from elfutils could be made to dereference invalid memory. If a user or automated system were tricked into running strip on a specially crafted file, an attacker could cause strip to crash, resulting in a denial of service. (CVE-2025-1377) Update Instructions: Run sudo pro fix USN-7369-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: debuginfod - 0.186-1ubuntu0.1 elfutils - 0.186-1ubuntu0.1 libasm-dev - 0.186-1ubuntu0.1 libasm1 - 0.186-1ubuntu0.1 libdebuginfod-common - 0.186-1ubuntu0.1 libdebuginfod-dev - 0.186-1ubuntu0.1 libdebuginfod1 - 0.186-1ubuntu0.1 libdw-dev - 0.186-1ubuntu0.1 libdw1 - 0.186-1ubuntu0.1 libelf-dev - 0.186-1ubuntu0.1 libelf1 - 0.186-1ubuntu0.1 No subscription required
CVEs:
- https://ubuntu.com/security/CVE-2024-25260
- https://ubuntu.com/security/CVE-2025-1365
- https://ubuntu.com/security/CVE-2025-1371
- https://ubuntu.com/security/CVE-2025-1372
- https://ubuntu.com/security/CVE-2025-1377
Title: USN-7406-1 -- Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7406-1
Priorities: high
Description:
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - GPU drivers; - SMB network file system; - Network namespace; - Networking core; (CVE-2024-26928, CVE-2024-56658, CVE-2024-35864, CVE-2024-57798) Update Instructions: Run sudo pro fix USN-7406-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-5.15.0-1034-nvidia-tegra - 5.15.0-1034.34 linux-buildinfo-5.15.0-1034-nvidia-tegra-rt - 5.15.0-1034.34 linux-headers-5.15.0-1034-nvidia-tegra - 5.15.0-1034.34 linux-headers-5.15.0-1034-nvidia-tegra-rt - 5.15.0-1034.34 linux-image-5.15.0-1034-nvidia-tegra - 5.15.0-1034.34 linux-image-5.15.0-1034-nvidia-tegra-rt - 5.15.0-1034.34 linux-image-unsigned-5.15.0-1034-nvidia-tegra - 5.15.0-1034.34 linux-image-unsigned-5.15.0-1034-nvidia-tegra-rt - 5.15.0-1034.34 linux-modules-5.15.0-1034-nvidia-tegra - 5.15.0-1034.34 linux-modules-5.15.0-1034-nvidia-tegra-rt - 5.15.0-1034.34 linux-modules-extra-5.15.0-1034-nvidia-tegra - 5.15.0-1034.34 linux-nvidia-tegra-headers-5.15.0-1034 - 5.15.0-1034.34 linux-nvidia-tegra-tools-5.15.0-1034 - 5.15.0-1034.34 linux-tools-5.15.0-1034-nvidia-tegra - 5.15.0-1034.34 linux-tools-5.15.0-1034-nvidia-tegra-rt - 5.15.0-1034.34 No subscription required linux-buildinfo-5.15.0-1063-gkeop - 5.15.0-1063.71 linux-cloud-tools-5.15.0-1063-gkeop - 5.15.0-1063.71 linux-gkeop-cloud-tools-5.15.0-1063 - 5.15.0-1063.71 linux-gkeop-headers-5.15.0-1063 - 5.15.0-1063.71 linux-gkeop-tools-5.15.0-1063 - 5.15.0-1063.71 linux-headers-5.15.0-1063-gkeop - 5.15.0-1063.71 linux-image-5.15.0-1063-gkeop - 5.15.0-1063.71 linux-image-unsigned-5.15.0-1063-gkeop - 5.15.0-1063.71 linux-modules-5.15.0-1063-gkeop - 5.15.0-1063.71 linux-modules-extra-5.15.0-1063-gkeop - 5.15.0-1063.71 linux-tools-5.15.0-1063-gkeop - 5.15.0-1063.71 No subscription required linux-buildinfo-5.15.0-1073-ibm - 5.15.0-1073.76 linux-headers-5.15.0-1073-ibm - 5.15.0-1073.76 linux-ibm-cloud-tools-common - 5.15.0-1073.76 linux-ibm-headers-5.15.0-1073 - 5.15.0-1073.76 linux-ibm-source-5.15.0 - 5.15.0-1073.76 linux-ibm-tools-5.15.0-1073 - 5.15.0-1073.76 linux-ibm-tools-common - 5.15.0-1073.76 linux-image-5.15.0-1073-ibm - 5.15.0-1073.76 linux-image-unsigned-5.15.0-1073-ibm - 5.15.0-1073.76 linux-modules-5.15.0-1073-ibm - 5.15.0-1073.76 linux-modules-extra-5.15.0-1073-ibm - 5.15.0-1073.76 linux-tools-5.15.0-1073-ibm - 5.15.0-1073.76 No subscription required linux-buildinfo-5.15.0-1075-raspi - 5.15.0-1075.78 linux-headers-5.15.0-1075-raspi - 5.15.0-1075.78 linux-image-5.15.0-1075-raspi - 5.15.0-1075.78 linux-modules-5.15.0-1075-raspi - 5.15.0-1075.78 linux-modules-extra-5.15.0-1075-raspi - 5.15.0-1075.78 linux-raspi-headers-5.15.0-1075 - 5.15.0-1075.78 linux-raspi-tools-5.15.0-1075 - 5.15.0-1075.78 linux-tools-5.15.0-1075-raspi - 5.15.0-1075.78 No subscription required linux-buildinfo-5.15.0-1076-intel-iotg - 5.15.0-1076.82 linux-cloud-tools-5.15.0-1076-intel-iotg - 5.15.0-1076.82 linux-headers-5.15.0-1076-intel-iotg - 5.15.0-1076.82 linux-image-5.15.0-1076-intel-iotg - 5.15.0-1076.82 linux-image-unsigned-5.15.0-1076-intel-iotg - 5.15.0-1076.82 linux-intel-iotg-cloud-tools-5.15.0-1076 - 5.15.0-1076.82 linux-intel-iotg-cloud-tools-common - 5.15.0-1076.82 linux-intel-iotg-headers-5.15.0-1076 - 5.15.0-1076.82 linux-intel-iotg-tools-5.15.0-1076 - 5.15.0-1076.82 linux-intel-iotg-tools-common - 5.15.0-1076.82 linux-intel-iotg-tools-host - 5.15.0-1076.82 linux-modules-5.15.0-1076-intel-iotg - 5.15.0-1076.82 linux-modules-extra-5.15.0-1076-intel-iotg - 5.15.0-1076.82 linux-modules-iwlwifi-5.15.0-1076-intel-iotg - 5.15.0-1076.82 linux-tools-5.15.0-1076-intel-iotg - 5.15.0-1076.82 No subscription required linux-buildinfo-5.15.0-1077-kvm - 5.15.0-1077.82 linux-headers-5.15.0-1077-kvm - 5.15.0-1077.82 linux-image-5.15.0-1077-kvm - 5.15.0-1077.82 linux-image-unsigned-5.15.0-1077-kvm - 5.15.0-1077.82 linux-kvm-headers-5.15.0-1077 - 5.15.0-1077.82 linux-kvm-tools-5.15.0-1077 - 5.15.0-1077.82 linux-modules-5.15.0-1077-kvm - 5.15.0-1077.82 linux-tools-5.15.0-1077-kvm - 5.15.0-1077.82 No subscription required linux-buildinfo-5.15.0-1078-gke - 5.15.0-1078.84 linux-buildinfo-5.15.0-1078-oracle - 5.15.0-1078.84 linux-gke-headers-5.15.0-1078 - 5.15.0-1078.84 linux-gke-tools-5.15.0-1078 - 5.15.0-1078.84 linux-headers-5.15.0-1078-gke - 5.15.0-1078.84 linux-headers-5.15.0-1078-oracle - 5.15.0-1078.84 linux-image-5.15.0-1078-gke - 5.15.0-1078.84 linux-image-5.15.0-1078-oracle - 5.15.0-1078.84 linux-image-unsigned-5.15.0-1078-gke - 5.15.0-1078.84 linux-image-unsigned-5.15.0-1078-oracle - 5.15.0-1078.84 linux-modules-5.15.0-1078-gke - 5.15.0-1078.84 linux-modules-5.15.0-1078-oracle - 5.15.0-1078.84 linux-modules-extra-5.15.0-1078-gke - 5.15.0-1078.84 linux-modules-extra-5.15.0-1078-oracle - 5.15.0-1078.84 linux-oracle-headers-5.15.0-1078 - 5.15.0-1078.84 linux-oracle-tools-5.15.0-1078 - 5.15.0-1078.84 linux-tools-5.15.0-1078-gke - 5.15.0-1078.84 linux-tools-5.15.0-1078-oracle - 5.15.0-1078.84 No subscription required linux-buildinfo-5.15.0-1080-gcp - 5.15.0-1080.89 linux-gcp-headers-5.15.0-1080 - 5.15.0-1080.89 linux-gcp-tools-5.15.0-1080 - 5.15.0-1080.89 linux-headers-5.15.0-1080-gcp - 5.15.0-1080.89 linux-image-5.15.0-1080-gcp - 5.15.0-1080.89 linux-image-unsigned-5.15.0-1080-gcp - 5.15.0-1080.89 linux-modules-5.15.0-1080-gcp - 5.15.0-1080.89 linux-modules-extra-5.15.0-1080-gcp - 5.15.0-1080.89 linux-tools-5.15.0-1080-gcp - 5.15.0-1080.89 No subscription required linux-aws-cloud-tools-5.15.0-1081 - 5.15.0-1081.88 linux-aws-headers-5.15.0-1081 - 5.15.0-1081.88 linux-aws-tools-5.15.0-1081 - 5.15.0-1081.88 linux-buildinfo-5.15.0-1081-aws - 5.15.0-1081.88 linux-cloud-tools-5.15.0-1081-aws - 5.15.0-1081.88 linux-headers-5.15.0-1081-aws - 5.15.0-1081.88 linux-image-5.15.0-1081-aws - 5.15.0-1081.88 linux-image-unsigned-5.15.0-1081-aws - 5.15.0-1081.88 linux-modules-5.15.0-1081-aws - 5.15.0-1081.88 linux-modules-extra-5.15.0-1081-aws - 5.15.0-1081.88 linux-tools-5.15.0-1081-aws - 5.15.0-1081.88 No subscription required linux-buildinfo-5.15.0-136-generic - 5.15.0-136.147 linux-buildinfo-5.15.0-136-generic-64k - 5.15.0-136.147 linux-buildinfo-5.15.0-136-generic-lpae - 5.15.0-136.147 linux-buildinfo-5.15.0-136-lowlatency - 5.15.0-136.147 linux-buildinfo-5.15.0-136-lowlatency-64k - 5.15.0-136.147 linux-cloud-tools-5.15.0-136 - 5.15.0-136.147 linux-cloud-tools-5.15.0-136-generic - 5.15.0-136.147 linux-cloud-tools-5.15.0-136-lowlatency - 5.15.0-136.147 linux-cloud-tools-common - 5.15.0-136.147 linux-doc - 5.15.0-136.147 linux-headers-5.15.0-136 - 5.15.0-136.147 linux-headers-5.15.0-136-generic - 5.15.0-136.147 linux-headers-5.15.0-136-generic-64k - 5.15.0-136.147 linux-headers-5.15.0-136-generic-lpae - 5.15.0-136.147 linux-headers-5.15.0-136-lowlatency - 5.15.0-136.147 linux-headers-5.15.0-136-lowlatency-64k - 5.15.0-136.147 linux-image-5.15.0-136-generic - 5.15.0-136.147 linux-image-5.15.0-136-generic-64k - 5.15.0-136.147 linux-image-5.15.0-136-generic-lpae - 5.15.0-136.147 linux-image-5.15.0-136-lowlatency - 5.15.0-136.147 linux-image-5.15.0-136-lowlatency-64k - 5.15.0-136.147 linux-ima...
ubuntu jammy v1.803
Metadata:
BOSH Agent Version: 2.742.0
Kernel Version: 5.15.0.134.133
USNs:
Title: USN-7352-1 -- FreeType vulnerability
URL: https://ubuntu.com/security/notices/USN-7352-1
Priorities: medium
Description:
It was discovered that FreeType incorrectly handled certain memory operations when parsing font subglyph structures. A remote attacker could use this issue to cause FreeType to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run sudo pro fix USN-7352-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: freetype2-demos - 2.11.1+dfsg-1ubuntu0.3 freetype2-doc - 2.11.1+dfsg-1ubuntu0.3 libfreetype-dev - 2.11.1+dfsg-1ubuntu0.3 libfreetype6 - 2.11.1+dfsg-1ubuntu0.3 libfreetype6-dev - 2.11.1+dfsg-1ubuntu0.3 No subscription required
CVEs:
Title: USN-7357-1 -- Libxslt vulnerability
URL: https://ubuntu.com/security/notices/USN-7357-1
Priorities: medium
Description:
Ivan Fratric discovered that Libxslt incorrectly handled certain memory operations when handling documents. A remote attacker could use this issue to cause Libxslt to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run sudo pro fix USN-7357-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libxslt1-dev - 1.1.34-4ubuntu0.22.04.2 libxslt1.1 - 1.1.34-4ubuntu0.22.04.2 xsltproc - 1.1.34-4ubuntu0.22.04.2 No subscription required
CVEs:
ubuntu jammy v1.785
Metadata:
BOSH Agent Version: 2.736.0
Kernel Version: 5.15.0.134.133
USNs:
Title: USN-7306-1 -- GNU binutils vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7306-1
Priorities: medium
Description:
It was discovered that GNU binutils in nm tool is affected by an incorrect access control. An attacker could possibly use this issue to cause a crash. This issue only affected Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, and Ubuntu 24.10. (CVE-2024-57360) It was discovered that GNU binutils incorrectly handled certain inputs. An attacker could possibly use this issue to cause a crash or execute arbitrary code. (CVE-2025-0840) Update Instructions: Run sudo pro fix USN-7306-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: binutils - 2.38-4ubuntu2.7 binutils-aarch64-linux-gnu - 2.38-4ubuntu2.7 binutils-alpha-linux-gnu - 2.38-4ubuntu2.7 binutils-arm-linux-gnueabi - 2.38-4ubuntu2.7 binutils-arm-linux-gnueabihf - 2.38-4ubuntu2.7 binutils-common - 2.38-4ubuntu2.7 binutils-dev - 2.38-4ubuntu2.7 binutils-doc - 2.38-4ubuntu2.7 binutils-for-build - 2.38-4ubuntu2.7 binutils-for-host - 2.38-4ubuntu2.7 binutils-hppa-linux-gnu - 2.38-4ubuntu2.7 binutils-hppa64-linux-gnu - 2.38-4ubuntu2.7 binutils-i686-gnu - 2.38-4ubuntu2.7 binutils-i686-kfreebsd-gnu - 2.38-4ubuntu2.7 binutils-i686-linux-gnu - 2.38-4ubuntu2.7 binutils-ia64-linux-gnu - 2.38-4ubuntu2.7 binutils-m68k-linux-gnu - 2.38-4ubuntu2.7 binutils-multiarch - 2.38-4ubuntu2.7 binutils-multiarch-dev - 2.38-4ubuntu2.7 binutils-powerpc-linux-gnu - 2.38-4ubuntu2.7 binutils-powerpc64-linux-gnu - 2.38-4ubuntu2.7 binutils-powerpc64le-linux-gnu - 2.38-4ubuntu2.7 binutils-riscv64-linux-gnu - 2.38-4ubuntu2.7 binutils-s390x-linux-gnu - 2.38-4ubuntu2.7 binutils-sh4-linux-gnu - 2.38-4ubuntu2.7 binutils-source - 2.38-4ubuntu2.7 binutils-sparc64-linux-gnu - 2.38-4ubuntu2.7 binutils-x86-64-kfreebsd-gnu - 2.38-4ubuntu2.7 binutils-x86-64-linux-gnu - 2.38-4ubuntu2.7 binutils-x86-64-linux-gnux32 - 2.38-4ubuntu2.7 libbinutils - 2.38-4ubuntu2.7 libctf-nobfd0 - 2.38-4ubuntu2.7 libctf0 - 2.38-4ubuntu2.7 No subscription required
CVEs:
Title: USN-7314-1 -- Kerberos vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7314-1
Priorities: medium,negligible,low
Description:
It was discovered that Kerberos incorrectly handled certain memory operations. A remote attacker could possibly use this issue to cause Kerberos to consume memory,leading to a denial of service. (CVE-2024-26458, CVE-2024-26461) It was discovered that Kerberos incorrectly handled certain memory operations. A remote attacker could possibly use this issue to cause Kerberos to consume memory,leading to a denial of service. This issue only affected Ubuntu 24.04 LTS. (CVE-2024-26462) It was discovered that the Kerberos kadmind daemon incorrectly handled log files when incremental propagation was enabled. An authenticated attacker could use this issue to cause kadmind to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2025-24528) Update Instructions: Run sudo pro fix USN-7314-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: krb5-admin-server - 1.19.2-2ubuntu0.6 krb5-doc - 1.19.2-2ubuntu0.6 krb5-gss-samples - 1.19.2-2ubuntu0.6 krb5-k5tls - 1.19.2-2ubuntu0.6 krb5-kdc - 1.19.2-2ubuntu0.6 krb5-kdc-ldap - 1.19.2-2ubuntu0.6 krb5-kpropd - 1.19.2-2ubuntu0.6 krb5-locales - 1.19.2-2ubuntu0.6 krb5-multidev - 1.19.2-2ubuntu0.6 krb5-otp - 1.19.2-2ubuntu0.6 krb5-pkinit - 1.19.2-2ubuntu0.6 krb5-user - 1.19.2-2ubuntu0.6 libgssapi-krb5-2 - 1.19.2-2ubuntu0.6 libgssrpc4 - 1.19.2-2ubuntu0.6 libk5crypto3 - 1.19.2-2ubuntu0.6 libkadm5clnt-mit12 - 1.19.2-2ubuntu0.6 libkadm5srv-mit12 - 1.19.2-2ubuntu0.6 libkdb5-10 - 1.19.2-2ubuntu0.6 libkrad-dev - 1.19.2-2ubuntu0.6 libkrad0 - 1.19.2-2ubuntu0.6 libkrb5-3 - 1.19.2-2ubuntu0.6 libkrb5-dev - 1.19.2-2ubuntu0.6 libkrb5support0 - 1.19.2-2ubuntu0.6 No subscription required
CVEs:
- https://ubuntu.com/security/CVE-2024-26458
- https://ubuntu.com/security/CVE-2024-26461
- https://ubuntu.com/security/CVE-2024-26462
- https://ubuntu.com/security/CVE-2025-24528
Title: USN-7327-1 -- Linux kernel vulnerability
URL: https://ubuntu.com/security/notices/USN-7327-1
Priorities: high
Description:
A security issues was discovered in the Linux kernel. An attacker could possibly use this to compromise the system. This update corrects flaws in the following subsystems: - Block layer subsystem; (CVE-2024-56672) Update Instructions: Run sudo pro fix USN-7327-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-5.15.0-134-generic - 5.15.0-134.145 linux-buildinfo-5.15.0-134-generic-64k - 5.15.0-134.145 linux-buildinfo-5.15.0-134-generic-lpae - 5.15.0-134.145 linux-buildinfo-5.15.0-134-lowlatency - 5.15.0-134.145 linux-buildinfo-5.15.0-134-lowlatency-64k - 5.15.0-134.145 linux-cloud-tools-5.15.0-134 - 5.15.0-134.145 linux-cloud-tools-5.15.0-134-generic - 5.15.0-134.145 linux-cloud-tools-5.15.0-134-lowlatency - 5.15.0-134.145 linux-cloud-tools-common - 5.15.0-134.145 linux-doc - 5.15.0-134.145 linux-headers-5.15.0-134 - 5.15.0-134.145 linux-headers-5.15.0-134-generic - 5.15.0-134.145 linux-headers-5.15.0-134-generic-64k - 5.15.0-134.145 linux-headers-5.15.0-134-generic-lpae - 5.15.0-134.145 linux-headers-5.15.0-134-lowlatency - 5.15.0-134.145 linux-headers-5.15.0-134-lowlatency-64k - 5.15.0-134.145 linux-image-5.15.0-134-generic - 5.15.0-134.145 linux-image-5.15.0-134-generic-64k - 5.15.0-134.145 linux-image-5.15.0-134-generic-lpae - 5.15.0-134.145 linux-image-5.15.0-134-lowlatency - 5.15.0-134.145 linux-image-5.15.0-134-lowlatency-64k - 5.15.0-134.145 linux-image-unsigned-5.15.0-134-generic - 5.15.0-134.145 linux-image-unsigned-5.15.0-134-generic-64k - 5.15.0-134.145 linux-image-unsigned-5.15.0-134-lowlatency - 5.15.0-134.145 linux-image-unsigned-5.15.0-134-lowlatency-64k - 5.15.0-134.145 linux-libc-dev - 5.15.0-134.145 linux-lowlatency-cloud-tools-5.15.0-134 - 5.15.0-134.145 linux-lowlatency-headers-5.15.0-134 - 5.15.0-134.145 linux-lowlatency-tools-5.15.0-134 - 5.15.0-134.145 linux-modules-5.15.0-134-generic - 5.15.0-134.145 linux-modules-5.15.0-134-generic-64k - 5.15.0-134.145 linux-modules-5.15.0-134-generic-lpae - 5.15.0-134.145 linux-modules-5.15.0-134-lowlatency - 5.15.0-134.145 linux-modules-5.15.0-134-lowlatency-64k - 5.15.0-134.145 linux-modules-extra-5.15.0-134-generic - 5.15.0-134.145 linux-modules-iwlwifi-5.15.0-134-generic - 5.15.0-134.145 linux-modules-iwlwifi-5.15.0-134-lowlatency - 5.15.0-134.145 linux-source-5.15.0 - 5.15.0-134.145 linux-tools-5.15.0-134 - 5.15.0-134.145 linux-tools-5.15.0-134-generic - 5.15.0-134.145 linux-tools-5.15.0-134-generic-64k - 5.15.0-134.145 linux-tools-5.15.0-134-generic-lpae - 5.15.0-134.145 linux-tools-5.15.0-134-lowlatency - 5.15.0-134.145 linux-tools-5.15.0-134-lowlatency-64k - 5.15.0-134.145 linux-tools-common - 5.15.0-134.145 linux-tools-host - 5.15.0-134.145 No subscription required linux-cloud-tools-lowlatency - 5.15.0.134.121 linux-cloud-tools-lowlatency-hwe-20.04 - 5.15.0.134.121 linux-cloud-tools-lowlatency-hwe-20.04-edge - 5.15.0.134.121 linux-headers-lowlatency - 5.15.0.134.121 linux-headers-lowlatency-64k - 5.15.0.134.121 linux-headers-lowlatency-64k-hwe-20.04 - 5.15.0.134.121 linux-headers-lowlatency-64k-hwe-20.04-edge - 5.15.0.134.121 linux-headers-lowlatency-hwe-20.04 - 5.15.0.134.121 linux-headers-lowlatency-hwe-20.04-edge - 5.15.0.134.121 linux-image-lowlatency - 5.15.0.134.121 linux-image-lowlatency-64k - 5.15.0.134.121 linux-image-lowlatency-64k-hwe-20.04 - 5.15.0.134.121 linux-image-lowlatency-64k-hwe-20.04-edge - 5.15.0.134.121 linux-image-lowlatency-hwe-20.04 - 5.15.0.134.121 linux-image-lowlatency-hwe-20.04-edge - 5.15.0.134.121 linux-lowlatency - 5.15.0.134.121 linux-lowlatency-64k - 5.15.0.134.121 linux-lowlatency-64k-hwe-20.04 - 5.15.0.134.121 linux-lowlatency-64k-hwe-20.04-edge - 5.15.0.134.121 linux-lowlatency-hwe-20.04 - 5.15.0.134.121 linux-lowlatency-hwe-20.04-edge - 5.15.0.134.121 linux-tools-lowlatency - 5.15.0.134.121 linux-tools-lowlatency-64k - 5.15.0.134.121 linux-tools-lowlatency-64k-hwe-20.04 - 5.15.0.134.121 linux-tools-lowlatency-64k-hwe-20.04-edge - 5.15.0.134.121 linux-tools-lowlatency-hwe-20.04 - 5.15.0.134.121 linux-tools-lowlatency-hwe-20.04-edge - 5.15.0.134.121 No subscription required linux-cloud-tools-generic - 5.15.0.134.133 linux-cloud-tools-generic-hwe-20.04 - 5.15.0.134.133 linux-cloud-tools-generic-hwe-20.04-edge - 5.15.0.134.133 linux-cloud-tools-virtual - 5.15.0.134.133 linux-cloud-tools-virtual-hwe-20.04 - 5.15.0.134.133 linux-cloud-tools-virtual-hwe-20.04-edge - 5.15.0.134.133 linux-crashdump - 5.15.0.134.133 linux-generic - 5.15.0.134.133 linux-generic-64k - 5.15.0.134.133 linux-generic-64k-hwe-20.04 - 5.15.0.134.133 linux-generic-64k-hwe-20.04-edge - 5.15.0.134.133 linux-generic-hwe-20.04 - 5.15.0.134.133 linux-generic-hwe-20.04-edge - 5.15.0.134.133 linux-generic-lpae - 5.15.0.134.133 linux-generic-lpae-hwe-20.04 - 5.15.0.134.133 linux-generic-lpae-hwe-20.04-edge - 5.15.0.134.133 linux-headers-generic - 5.15.0.134.133 linux-headers-generic-64k - 5.15.0.134.133 linux-headers-generic-64k-hwe-20.04 - 5.15.0.134.133 linux-headers-generic-64k-hwe-20.04-edge - 5.15.0.134.133 linux-headers-generic-hwe-20.04 - 5.15.0.134.133 linux-headers-generic-hwe-20.04-edge - 5.15.0.134.133 linux-headers-generic-lpae - 5.15.0.134.133 linux-headers-generic-lpae-hwe-20.04 - 5.15.0.134.133 linux-headers-generic-lpae-hwe-20.04-edge - 5.15.0.134.133 linux-headers-oem-20.04 - 5.15.0.134.133 linux-headers-virtual - 5.15.0.134.133 linux-headers-virtual-hwe-20.04 - 5.15.0.134.133 linux-headers-...