Thursday, March 26, 2026

[USN-8128-1] CryptX vulnerabilities

==========================================================================
Ubuntu Security Notice USN-8128-1
March 26, 2026

libcryptx-perl vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in CryptX.

Software Description:
- libcryptx-perl: Perl modules providing cryptography based on LibTomCrypt library

Details:

It was discovered that CryptX did not verify authentication tags while
performing GCM and ChaCha20-Poly1305 decryption. An attacker could possibly
use this issue to cause CryptX to accept modified ciphertext, leading to
data integrity violations or authentication bypass. This issue only
affected Ubuntu 18.04 LTS. (CVE-2018-25099)

It was discovered that CryptX included a version of the tomcrypt library
that was susceptible to malformed unicode handling. An attacker could
possibly use this issue to cause unexpected behavior or incorrect
processing of crafted input. This issue only affected Ubuntu 18.04 LTS.
(CVE-2025-40912)

It was discovered that CryptX included a version of the libtommath library
that was susceptible to an integer overflow. An attacker could possibly use
this issue to cause memory corruption or a denial of service.
(CVE-2025-40914)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
libcryptx-perl 0.080-2ubuntu0.1~esm1
Available with Ubuntu Pro

Ubuntu 22.04 LTS
libcryptx-perl 0.076-1ubuntu0.1~esm1
Available with Ubuntu Pro

Ubuntu 20.04 LTS
libcryptx-perl 0.067-1ubuntu0.1~esm1
Available with Ubuntu Pro

Ubuntu 18.04 LTS
libcryptx-perl 0.056-1ubuntu0.1~esm1
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8128-1
CVE-2018-25099, CVE-2025-40912, CVE-2025-40914

Wednesday, March 25, 2026

FreeBSD Security Advisory FreeBSD-SA-26:09.pf

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

=============================================================================
FreeBSD-SA-26:09.pf Security Advisory
The FreeBSD Project

Topic: pf silently ignores certain rules

Category: core
Module: pf
Announced: 2026-03-25
Credits: Michael Gmelin
Affects: FreeBSD 14.x and FreeBSD 15.0
Corrected: 2026-03-25 07:11:58 UTC (stable/15, 15.0-STABLE)
2026-03-26 01:11:25 UTC (releng/15.0, 15.0-RELEASE-p5)
2026-03-25 09:58:28 UTC (stable/14, 14.4-STABLE)
2026-03-26 01:15:00 UTC (releng/14.4, 14.4-RELEASE-p1)
2026-03-26 01:16:06 UTC (releng/14.3, 14.3-RELEASE-p10)
CVE Name: CVE-2026-4748

For general information regarding FreeBSD Security Advisories,
including descriptions of the fields above, security branches, and the
following sections, please visit <URL:https://security.FreeBSD.org/>.

I. Background

pf is an Internet Protocol packet filter originally written for OpenBSD.
While loading its configuration, pf hashes rules and silently drops
duplicates as an optimisation. Only the first rule with the same hash is
considered.

II. Problem Description

A regression in the way hashes were calculated caused rules containing the
address range syntax (x.x.x.x - y.y.y.y) that only differ in the address
range(s) involved to be silently dropped as duplicates. Only the first of
such rules is actually loaded into pf. Ranges expressed using the
address[/mask-bits] syntax were not affected.

Some keywords representing actions taken on a packet-matching rule, such as
'log', 'return tll', or 'dnpipe', may suffer from the same issue. It is
unlikely that users have such configurations, as these rules would always be
redundant. The verification described in "IV. Workaround" below will find
these as well.

III. Impact

Affected rules are silently ignored, which can lead to unexpected behaviour
including over- and underblocking.

IV. Workaround

Only systems using the pf firewall are affected.

The operator can determine if a specific system is affected by reloading the
configuration verbosely:

# pfctl -vf /etc/pf.conf | grep already

As a workaround, affected rules can be rewritten, e.g., by
using tables or multiple rules instead of address ranges.
Another option is to add labels to rules to make them unique.

V. Solution

Upgrade your vulnerable system to a supported FreeBSD stable or
release / security branch (releng) dated after the correction date
and reboot.

Perform one of the following:

1) To update your vulnerable system installed from base system packages:

Systems running a 15.0-RELEASE version of FreeBSD on the amd64 or arm64
platforms, which were installed using base system packages, can be updated
via the pkg(8) utility:

# pkg upgrade -r FreeBSD-base
# shutdown -r +10min "Rebooting for a security update"

2) To update your vulnerable system installed from binary distribution sets:

Systems running a RELEASE version of FreeBSD on the amd64 or arm64 platforms,
or the i386 platform on FreeBSD 13, which were not installed using base
system packages, can be updated via the freebsd-update(8) utility:

# freebsd-update fetch
# freebsd-update install
# shutdown -r +10min "Rebooting for a security update"

3) To update your vulnerable system via a source code patch:

The following patches have been verified to apply to the applicable
FreeBSD release branches.

a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.

[FreeBSD 15.0]
# fetch https://security.FreeBSD.org/patches/SA-26:09/pf-15.patch
# fetch https://security.FreeBSD.org/patches/SA-26:09/pf-15.patch.asc
# gpg --verify pf-15.patch.asc

[FreeBSD 14.x]
# fetch https://security.FreeBSD.org/patches/SA-26:09/pf-14.patch
# fetch https://security.FreeBSD.org/patches/SA-26:09/pf-14.patch.asc
# gpg --verify pf-14.patch.asc

b) Apply the patch. Execute the following commands as root:

# cd /usr/src
# patch < /path/to/patch

c) Recompile your kernel as described in
<URL:https://www.FreeBSD.org/handbook/kernelconfig.html> and reboot the
system.

VI. Correction details

This issue is corrected as of the corresponding Git commit hash in the
following stable and release branches:

Branch/path Hash Revision
- -------------------------------------------------------------------------
stable/15/ 4311217a039c stable/15-n282698
releng/15.0/ d91cf52e31ac releng/15.0-n281017
stable/14/ e3b801edded9 stable/14-n273835
releng/14.4/ b6865bca4ba5 releng/14.4-n273681
releng/14.3/ c03577d99d2d releng/14.3-n271481
- -------------------------------------------------------------------------

Run the following command to see which files were modified by a
particular commit:

# git show --stat <commit hash>

Or visit the following URL, replacing NNNNNN with the hash:

<URL:https://cgit.freebsd.org/src/commit/?id=NNNNNN>

To determine the commit count in a working tree (for comparison against
nNNNNNN in the table above), run:

# git rev-list --count --first-parent HEAD

VII. References

<URL:https://www.cve.org/CVERecord?id=CVE-2026-4748>

The latest revision of this advisory is available at
<URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-26:09.pf.asc>
-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEthUnfoEIffdcgYM7bljekB8AGu8FAmnEp+AACgkQbljekB8A
Gu84/Q//cIBdAEmzD04kjglaG1X75rULWJ0fsD26RW89Y3IEvLnUa5yoWV0dKUeW
wRta0n7cvpkLiuDVqSfasVrkVM0EZ70toWcd0JXTRwaJ+i7IhHMByXjvSwTzhS/d
OL2uDzjJ1nUyUqangNM+99Mpr3UQOEIMY9Scq5E0NNr/x6NdWXN4psiB/RCSFU64
abRos56CPkWbfVQLVZ3i2FihGhYQ2JLnqvP9DgCT6xy6MU5uTDWF57sxe4ciYWGw
4ZRydr/oyTkpthetm9xPFoFkaBiOiGfdTnsOi58f7mcWln+AgiKLzT0KdOd6XkEy
RH22v4254P4nquDXfBTIJUVyDFd8SVIk7Ol78BzRNdEYOEog6KEI3fTjArFMIiy6
CLPS92ph3xq4aBWMdxnZ4cvfW7Ktm8Zp9xrXCvdRaUGfl+wawzjfjgw62eXaec4x
pFxip2jLziZUDAvpzg1ywK0ajJE+RYh7HlT7CG2pTEcCaaIC0rJ7B2eEIaoO48Ho
Uez92JN54P7xBRLy/rLVfUHz7Td11toAg6wwBTEAQPKssDHh1DQZMLSDKZcGanlt
waUCybHeaWkMZvoHtLlEJjZ8hL/67Ivz2Huv5KCZ5CtpoEqe5ZHmGGS3iOCiuLvQ
9k2F3fkJN4w1zpGHE48JJ03FYQA7cTHwEro7TCRzeM6+KnqgAzE=
=cGmd
-----END PGP SIGNATURE-----

FreeBSD Security Advisory FreeBSD-SA-26:08.rpcsec_gss

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

=============================================================================
FreeBSD-SA-26:08.rpcsec_gss Security Advisory
The FreeBSD Project

Topic: Remote code execution via RPCSEC_GSS packet validation

Category: core
Module: rpcsec_gss
Announced: 2026-03-26
Credits: Nicholas Carlini using Claude, Anthropic
Affects: All supported versions of FreeBSD.
Corrected: 2026-03-26 01:25:23 UTC (stable/15, 15.0-STABLE)
2026-03-26 01:11:20 UTC (releng/15.0, 15.0-RELEASE-p5)
2026-03-26 01:28:47 UTC (stable/14, 14.4-STABLE)
2026-03-26 01:14:55 UTC (releng/14.4, 14.4-RELEASE-p1)
2026-03-26 01:16:01 UTC (releng/14.3, 14.3-RELEASE-p10)
2026-03-26 01:30:12 UTC (stable/13, 13.5-STABLE)
2026-03-26 01:34:10 UTC (releng/13.5, 13.5-RELEASE-p11)
CVE Name: CVE-2026-4747

For general information regarding FreeBSD Security Advisories,
including descriptions of the fields above, security branches, and the
following sections, please visit <URL:https://security.FreeBSD.org/>.

I. Background

Generic Security Services (GSS) is an API which lets applications establish a
private, authenticated communication channel with a server, such as an NFC
server.

RPCSEC_GSS is a module which enables the use of GSS with Sun RPC (rpc(3))
servers. It is implemented in the kernel by the kgssapi.ko kernel module, and
used by the NFS server to enable Kerberos-based authentication and encryption
of traffic between the server and clients. In userspace it is implemented by
the librpcsec_gss library.

II. Problem Description

Each RPCSEC_GSS data packet is validated by a routine which checks a signature
in the packet. This routine copies a portion of the packet into a stack buffer,
but fails to ensure that the buffer is sufficiently large, and a malicious
client can trigger a stack overflow. Notably, this does not require the client
to authenticate itself first.

III. Impact

As kgssapi.ko's RPCSEC_GSS implementation is vulnerable, remote code execution
in the kernel is possible by an authenticated user that is able to send packets
to the kernel's NFS server while kgssapi.ko is loaded into the kernel.

In userspace, applications which have librpcgss_sec loaded and run an RPC server
are vulnerable to remote code execution from any client able to send it packets.
We are not aware of any such applications in the FreeBSD base system.

IV. Workaround

No workaround is available. Kernels that do not have kgssapi.ko loaded are not
vulnerable. In userspace, any daemon linked with librpcgss_sec and running an
RPC server is vulnerable.

V. Solution

Upgrade your vulnerable system to a supported FreeBSD stable or
release / security branch (releng) dated after the correction date.

Perform one of the following:

1) To update your vulnerable system installed from base system packages:

Systems running a 15.0-RELEASE version of FreeBSD on the amd64 or arm64
platforms, which were installed using base system packages, can be updated
via the pkg(8) utility:

# pkg upgrade -r FreeBSD-base
# shutdown -r +10min "Rebooting for a security update"

2) To update your vulnerable system installed from binary distribution sets:

Systems running a RELEASE version of FreeBSD on the amd64 or arm64 platforms,
or the i386 platform on FreeBSD 13, which were not installed using base
system packages, can be updated via the freebsd-update(8) utility:

# freebsd-update fetch
# freebsd-update install
# shutdown -r +10min "Rebooting for a security update"

3) To update your vulnerable system via a source code patch:

The following patches have been verified to apply to the applicable
FreeBSD release branches.

a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.

# fetch https://security.FreeBSD.org/patches/SA-26:08/rpcsec_gss.patch
# fetch https://security.FreeBSD.org/patches/SA-26:08/rpcsec_gss.patch.asc
# gpg --verify rpcsec_gss.patch.asc

b) Apply the patch. Execute the following commands as root:

# cd /usr/src
# patch < /path/to/patch

c) Recompile your kernel and the operating system as described in
<URL:https://www.FreeBSD.org/handbook/kernelconfig.html> and
<URL:https://www.FreeBSD.org/handbook/makeworld.html> and reboot the
system.

VI. Correction details

This issue is corrected as of the corresponding Git commit hash in the
following stable and release branches:

Branch/path Hash Revision
- -------------------------------------------------------------------------
stable/15/ 1b00fdc1f3cd stable/15-n282700
releng/15.0/ 4ec1b6213463 releng/15.0-n281013
stable/14/ e5ed09ffd592 stable/14-n273840
releng/14.4/ 7ea03a4238e8 releng/14.4-n273677
releng/14.3/ b6ce88ab9a5f releng/14.3-n271477
stable/13/ 99ec7f9b9e48 stable/13-n259823
releng/13.5/ c4f53a1adbd4 releng/13.5-n259207
- -------------------------------------------------------------------------

Run the following command to see which files were modified by a
particular commit:

# git show --stat <commit hash>

Or visit the following URL, replacing NNNNNN with the hash:

<URL:https://cgit.freebsd.org/src/commit/?id=NNNNNN>

To determine the commit count in a working tree (for comparison against
nNNNNNN in the table above), run:

# git rev-list --count --first-parent HEAD

VII. References

<URL:https://www.cve.org/CVERecord?id=CVE-2026-4747>

The latest revision of this advisory is available at
<URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-26:08.rpcsec_gss.asc>
-----BEGIN PGP SIGNATURE-----
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=K+Bc
-----END PGP SIGNATURE-----

FreeBSD Security Advisory FreeBSD-SA-26:07.nvmf

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

=============================================================================
FreeBSD-SA-26:07.nvmf Security Advisory
The FreeBSD Project

Topic: Remote denial of service via null pointer dereference

Category: core
Module: nvmf
Announced: 2026-03-26
Credits: Nikolay Denev <ndenev@gmail.com>
Affects: FreeBSD 15.0
Corrected: 2026-03-25 01:29:47 UTC (stable/15, 15.0-STABLE)
2026-03-26 01:11:19 UTC (releng/15.0, 15.0-RELEASE-p5)
CVE Name: CVE-2026-4652

For general information regarding FreeBSD Security Advisories,
including descriptions of the fields above, security branches, and the
following sections, please visit <URL:https://security.FreeBSD.org/>.

I. Background

The nvmf driver implements the kernel component of an NVMe over Fabrics
host.

The CONNECT command is used to create connections (queue pairs) that
carry NVMe read/write commands over the network. For I/O queues, this
is commonly referred to as an I/O CONNECT.

II. Problem Description

On a system exposing an NVMe/TCP target, a remote client can trigger
a kernel panic by sending a CONNECT command for an I/O queue with a
bogus or stale CNTLID.

III. Impact

An attacker with network access to the NVMe/TCP target can trigger
an unauthenticated Denial of Service condition on the affected machine.

IV. Workaround

No workaround is available.

V. Solution

Upgrade your vulnerable system to a supported FreeBSD stable or release /
security branch (releng) dated after the correction date and reboot.

Perform one of the following:

1) To update your vulnerable system installed from base system packages:

Systems running a 15.0-RELEASE version of FreeBSD on the amd64 or arm64
platforms, which were installed using base system packages, can be updated
via the pkg(8) utility:

# pkg upgrade -r FreeBSD-base
# shutdown -r +10min "Rebooting for a security update"

2) To update your vulnerable system installed from binary distribution sets:

Systems running a RELEASE version of FreeBSD on the amd64 or arm64 platforms,
which were not installed using base system packages, can be updated via the
freebsd-update(8) utility:

# freebsd-update fetch
# freebsd-update install
# shutdown -r +10min "Rebooting for a security update"

3) To update your vulnerable system via a source code patch:

The following patches have been verified to apply to the applicable
FreeBSD release branches.

a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.

# fetch https://security.FreeBSD.org/patches/SA-26:07/nvmf.patch
# fetch https://security.FreeBSD.org/patches/SA-26:07/nvmf.patch.asc
# gpg --verify nvmf.patch.asc

b) Apply the patch. Execute the following commands as root:

# cd /usr/src
# patch < /path/to/patch

c) Recompile your kernel as described in
<URL:https://www.FreeBSD.org/handbook/kernelconfig.html> and reboot the
system.

VI. Correction details

This issue is corrected as of the corresponding Git commit hash in the
following stable and release branches:

Branch/path Hash Revision
- -------------------------------------------------------------------------
stable/15/ b1d32521747f stable/15-n282694
releng/15.0/ 48766013063a releng/15.0-n281012
- -------------------------------------------------------------------------

Run the following command to see which files were modified by a
particular commit:

# git show --stat <commit hash>

Or visit the following URL, replacing NNNNNN with the hash:

<URL:https://cgit.freebsd.org/src/commit/?id=NNNNNN>

To determine the commit count in a working tree (for comparison against
nNNNNNN in the table above), run:

# git rev-list --count --first-parent HEAD

VII. References

<URL:https://www.cve.org/CVERecord?id=CVE-2026-4652>

The latest revision of this advisory is available at
<URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-26:07.nvmf.asc>
-----BEGIN PGP SIGNATURE-----
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=l61h
-----END PGP SIGNATURE-----

FreeBSD Security Advisory FreeBSD-SA-26:06.tcp

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

=============================================================================
FreeBSD-SA-26:06.tcp Security Advisory
The FreeBSD Project

Topic: TCP: remotely exploitable DoS vector (mbuf leak)

Category: core
Module: tcp
Announced: 2026-03-26
Credits: Michael Tuexen (Netflix)
Affects: FreeBSD 14.x and FreeBSD 15.0
Corrected: 2026-03-26 01:25:22 UTC (stable/15, 15.0-STABLE)
2026-03-26 01:11:18 UTC (releng/15.0, 15.0-RELEASE-p5)
2026-03-26 01:28:46 UTC (stable/14, 14.4-STABLE)
2026-03-26 01:14:54 UTC (releng/14.4, 14.4-RELEASE-p1)
2026-03-26 01:16:00 UTC (releng/14.3, 14.3-RELEASE-p10)
CVE Name: CVE-2026-4247

For general information regarding FreeBSD Security Advisories,
including descriptions of the fields above, security branches, and the
following sections, please visit <URL:https://security.FreeBSD.org/>.

I. Background

The Transmission Control Protocol (TCP) is a connection oriented transport
protocol, which can be used as an upper layer of IP.

When unexpected TCP segments are received for an established TCP connection,
so called "challenge ACK" segments may be sent back in response if certain
criteria are met.

Challenge ACKs are rate limited to ensure the remote peer does not waste too
many CPU cycles or outbound bandwidth on the local peer if large numbers of
unexpected TCP segments are received.

The rate limiting is controlled by the net.inet.tcp.ack_war_timewindow and
net.inet.tcp.ack_war_cnt sysctls which default to 1000 (milliseconds) and 5
respectively i.e. challenge ACKs will be sent for the first 5 qualifying TCP
segments received within a 1s time period and the rest will be ignored.

The handling of challenge ACKs is common code in tcp_subr.c shared among the
different TCP stacks available in the system. This includes the FreeBSD
default, RACK and BBR stacks. There are differences in the behaviour of the
different stacks; e.g. the base FreeBSD stack sends challenge ACKs to a larger
set of unexpected packets.

II. Problem Description

When a challenge ACK is to be sent tcp_respond() constructs and sends the
challenge ACK and consumes the mbuf that is passed in. When no challenge ACK
should be sent the function returns and leaks the mbuf.

III. Impact

If an attacker is either on path with an established TCP connection, or can
themselves establish a TCP connection, to an affected FreeBSD machine, they
can easily craft and send packets which meet the challenge ACK criteria and
cause the FreeBSD host to leak an mbuf for each crafted packet in excess of
the configured rate limit settings i.e. with default settings, crafted packets
in excess of the first 5 sent within a 1s period will leak an mbuf.

Technically, off-path attackers can also exploit this problem by guessing the
IP addresses, TCP port numbers and in some cases the sequence numbers of
established connections and spoofing packets towards a FreeBSD machine, but
this is harder to do effectively.

IV. Workaround

The mbuf leak can be mitigated by not rate limiting the sending of challenge
ACKs. This can be achieved with immediate effect by setting the
net.inet.tcp.ack_war_timewindow sysctl to 0:

sysctl net.inet.tcp.ack_war_timewindow=0

This mitigation does trade off the leaking of mbufs against additional
CPU/resource cost associated with responding to all challenge ACK eligible
packets received for established TCP connections.

To make this change persistent across reboots, add it to /etc/sysctl.conf.

V. Solution

Upgrade your vulnerable system to a supported FreeBSD stable or release /
security branch (releng) dated after the correction date and reboot.

Perform one of the following:

1) To update your vulnerable system installed from base system packages:

Systems running a 15.0-RELEASE version of FreeBSD on the amd64 or arm64
platforms, which were installed using base system packages, can be updated
via the pkg(8) utility:

# pkg upgrade -r FreeBSD-base
# shutdown -r +10min "Rebooting for a security update"

2) To update your vulnerable system installed from binary distribution sets:

Systems running a RELEASE version of FreeBSD on the amd64 or arm64 platforms,
which were not installed using base system packages, can be updated via the
freebsd-update(8) utility:

# freebsd-update fetch
# freebsd-update install
# shutdown -r +10min "Rebooting for a security update"

3) To update your vulnerable system via a source code patch:

The following patches have been verified to apply to the applicable
FreeBSD release branches.

a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.

# fetch https://security.FreeBSD.org/patches/SA-26:06/tcp.patch
# fetch https://security.FreeBSD.org/patches/SA-26:06/tcp.patch.asc
# gpg --verify tcp.patch.asc

b) Apply the patch. Execute the following commands as root:

# cd /usr/src
# patch < /path/to/patch

c) Recompile your kernel as described in
<URL:https://www.FreeBSD.org/handbook/kernelconfig.html> and reboot the
system.

VI. Correction details

This issue is corrected as of the corresponding Git commit hash in the
following stable and release branches:

Branch/path Hash Revision
- -------------------------------------------------------------------------
stable/15/ 1fddb5435315 stable/15-n282699
releng/15.0/ de9e5d82581e releng/15.0-n281011
stable/14/ b45e7530ffb9 stable/14-n273839
releng/14.4/ 44dd8b58394b releng/14.4-n273676
releng/14.3/ a9cba5321021 releng/14.3-n271476
- -------------------------------------------------------------------------

Run the following command to see which files were modified by a
particular commit:

# git show --stat <commit hash>

Or visit the following URL, replacing NNNNNN with the hash:

<URL:https://cgit.freebsd.org/src/commit/?id=NNNNNN>

To determine the commit count in a working tree (for comparison against
nNNNNNN in the table above), run:

# git rev-list --count --first-parent HEAD

VII. References

<URL:https://www.cve.org/CVERecord?id=CVE-2026-4247>

The latest revision of this advisory is available at
<URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-26:06.tcp.asc>
-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEthUnfoEIffdcgYM7bljekB8AGu8FAmnEkVIACgkQbljekB8A
Gu/sWRAAtGouQg2M2RuF4+EFK1fpDKyDgBpbx88kH/y2ToHQ/voEwpeC3OOulfQ0
kM7vluUY2yf/yITXJnX/czqxX4flpC9fsAIZtSjXwI27V+xrvWwz/LTgmBumJjgC
VI0i66c6ajie8JC6h4Q2yYpF7M2ymYo/rLXXFM+nq/UpOWLEXbEzzDv6hwvwYqJd
h7pvoNUDWRjbxHykilUQ+KrnEDRz4cdmulil+1aAS1af2WHdROHfOSsVmSY/hQJh
MPA9dJxESzHAjYhjQrLFoWiuSt1JFOt5k/Y6FI4ix1UElJVEvwF7NEj6VxTW9/UX
0sWGmKt23ckfBG6fwBjW2e9NVnqIU4NNMbR0vJghtVsi0K4uw4b5/9n2WbfYYHQZ
eoZ8BiFRdrbRwFgk7NK9UG5r1B0l7O9rJWob0ZUt2/tGYpC7sLz9kOWAptD7JPpE
XkrK354K0KIBPdoVj7QDsK7njYkvnjxlHwWX148gQ1maEX/zWHD6x5RXS+QShzjL
kmp/h5Eiz977qHzotXkK7Le/4EnHQlLYO7n8NafoRrCRszPPlLv1/gaEHYYlTU+S
GMJpvsV9ENd15BhcZRCoLRxwa94D9beDhw89RTgPZ8ItpRO7z1cCfZrNC4aE0x3P
Q+BVMF18lrU/UB4jDW2/BmoGdZSjJMqxHaDGiHZZewQX/dVP2BU=
=a5LJ
-----END PGP SIGNATURE-----

[USN-8123-1] Mbed TLS vulnerabilities

==========================================================================
Ubuntu Security Notice USN-8123-1
March 25, 2026

mbedtls vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in mbedtls.

Software Description:
- mbedtls: Lightweight crypto and SSL/TLS library

Details:

It was discovered that Mbed TLS incorrectly handled memory allocation
failures. A remote attacker could possibly use this issue to crash
the program. This issue only affected Ubuntu 18.04 LTS and Ubuntu
20.04 LTS. (CVE-2021-44732)

Jonathan Winzig discovered that Mbed TLS incorrectly handled crafted
inputs. A remote attacker could possibly use this issue to crash the
program, resulting in a denial of service. This issue only affected
Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS. (CVE-2024-23775)

It was discovered that Mbed TLS incorrectly handled the TLS
handshake. A remote attacker could possibly use this issue to
break the security guarantees of the TLS handshake.
(CVE-2025-27810)

Linh Le and Ngan Nguyen discovered that Mbed TLS incorrectly
documented the behavior of a function. Application code relying
on the documented behavior might be affected. A remote attacker
could possibly use this issue to execute arbitrary code.
(CVE-2025-47917)

Linh Le and Ngan Nguyen discovered that Mbed TLS incorrectly handled
crafted input. A remote attacker could possibly use this issue to
crash the program, resulting in a denial of service. (CVE-2025-48965)

It was discovered that Mbed TLS incorrectly handled a race condition.
An attacker could possibly use this issue to extract AES keys.
(CVE-2025-52496)

Linh Le and Ngan Nguyen discovered that Mbed TLS incorrectly handled
certain invalid input. A remote attacker could possibly use this
issue to crash the program, resulting in a denial of service.
(CVE-2025-52497)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
libmbedcrypto7t64 2.28.8-1ubuntu0.1~esm1
Available with Ubuntu Pro
libmbedtls-dev 2.28.8-1ubuntu0.1~esm1
Available with Ubuntu Pro
libmbedtls14t64 2.28.8-1ubuntu0.1~esm1
Available with Ubuntu Pro
libmbedx509-1t64 2.28.8-1ubuntu0.1~esm1
Available with Ubuntu Pro

Ubuntu 22.04 LTS
libmbedcrypto7 2.28.0-1ubuntu0.1~esm1
Available with Ubuntu Pro
libmbedtls-dev 2.28.0-1ubuntu0.1~esm1
Available with Ubuntu Pro
libmbedtls14 2.28.0-1ubuntu0.1~esm1
Available with Ubuntu Pro
libmbedx509-1 2.28.0-1ubuntu0.1~esm1
Available with Ubuntu Pro

Ubuntu 20.04 LTS
libmbedcrypto3 2.16.4-1ubuntu2+esm1
Available with Ubuntu Pro
libmbedtls-dev 2.16.4-1ubuntu2+esm1
Available with Ubuntu Pro
libmbedtls12 2.16.4-1ubuntu2+esm1
Available with Ubuntu Pro
libmbedx509-0 2.16.4-1ubuntu2+esm1
Available with Ubuntu Pro

Ubuntu 18.04 LTS
libmbedcrypto1 2.8.0-1ubuntu0.1~esm1
Available with Ubuntu Pro
libmbedtls-dev 2.8.0-1ubuntu0.1~esm1
Available with Ubuntu Pro
libmbedtls10 2.8.0-1ubuntu0.1~esm1
Available with Ubuntu Pro
libmbedx509-0 2.8.0-1ubuntu0.1~esm1
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8123-1
CVE-2021-44732, CVE-2024-23775, CVE-2025-27810, CVE-2025-47917,
CVE-2025-48965, CVE-2025-52496, CVE-2025-52497

[USN-8126-1] Linux kernel (Azure) vulnerabilities

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmnENPIFAwAAAAAACgkQZ0GeRcM5nt0/
pQgAqp0QLuJVz/7s0W/bLg+/CQzN8vlb+JIoi1fB/Xnc/WxMlpwM+nK3XkoR+L4qSmXsvdk8Hpnx
sNZkvzTdRJESUikwjfEyZPJdcTZh39PQBw4Q01EfJWCLPD4KLvLOWIGpkudug6ZvEa9H68uUUN1I
dIp9cVtmExH8nqL02d+tD+Nhwi+gbV7j+LyROGH7PtkKYM3x96oucjyzi2Ey9jH2JnOXwopGZDNX
0ULETnV2ae0/ibY43gkDpOwcoWI++cWjfYIYAdUozNKMicCHwVjmdum8MSAbnwon24Y1noEzyQII
X4tvBOxTqT2zHvXdca12Yj4QlJlmqjLU1W5pjV9xiQ==
=3bpW
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-8126-1
March 25, 2026

linux-azure-6.8 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-azure-6.8: Linux kernel for Microsoft Azure cloud systems

Details:

Qualys discovered that several vulnerabilities existed in the AppArmor
Linux kernel Security Module (LSM). An unprivileged local attacker could
use these issues to load, replace, and remove arbitrary AppArmor profiles
causing denial of service, exposure of sensitive information (kernel
memory), local privilege escalation, or possibly escape a container.
(LP: #2143853)

It was discovered that improper initialization of CPU cache memory could
allow a local attacker with hypervisor access to overwrite SEV-SNP guest
memory resulting in loss of data integrity. (CVE-2024-36331)

Oleksii Oleksenko, Cedric Fournet, Jana Hofmann, Boris Köpf, Stavros Volos,
and Flavien Solt discovered that some AMD processors may allow an attacker
to infer data from previous stores, potentially resulting in the leakage of
privileged information. A local attacker could possibly use this to expose
sensitive information. (CVE-2024-36350, CVE-2024-36357)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM32 architecture;
- ARM64 architecture;
- MIPS architecture;
- Nios II architecture;
- PA-RISC architecture;
- PowerPC architecture;
- RISC-V architecture;
- S390 architecture;
- Sun Sparc architecture;
- User-Mode Linux (UML);
- x86 architecture;
- Xtensa architecture;
- Block layer subsystem;
- Cryptographic API;
- Compute Acceleration Framework;
- ACPI drivers;
- Serial ATA and Parallel ATA drivers;
- ATM drivers;
- Drivers core;
- ATA over ethernet (AOE) driver;
- DRBD Distributed Replicated Block Device drivers;
- Block device driver;
- Network block device driver;
- Ublk userspace block driver;
- Bluetooth drivers;
- Bus devices;
- Hardware random number generator core;
- Character device driver;
- TPM device driver;
- Clock framework and drivers;
- Data acquisition framework and drivers;
- CPU frequency scaling framework;
- Hardware crypto device drivers;
- Device frequency scaling framework;
- Buffer Sharing and Synchronization framework;
- DMA engine subsystem;
- EDAC drivers;
- Arm Firmware Framework for ARMv8-A(FFA);
- ARM SCMI message protocol;
- EFI core;
- Intel Stratix 10 firmware drivers;
- FPGA Framework;
- GPU drivers;
- HID subsystem;
- Hardware monitoring drivers;
- CoreSight HW tracing drivers;
- I2C subsystem;
- I3C subsystem;
- IIO subsystem;
- InfiniBand drivers;
- Input Device core drivers;
- Input Device (Miscellaneous) drivers;
- Input Device (Tablet) drivers;
- IOMMU subsystem;
- IRQ chip drivers;
- ISDN/mISDN subsystem;
- Mailbox framework;
- MCB driver;
- Multiple devices driver;
- Media drivers;
- Multifunction device drivers;
- Fastrpc Driver;
- Microchip PCI driver;
- Intel Management Engine Interface driver;
- PCI Endpoint Test driver;
- TI TPS6594 PFSM driver;
- VMware VMCI Driver;
- MMC subsystem;
- MOST (Media Oriented Systems Transport) drivers;
- MTD block device drivers;
- Ethernet bonding driver;
- Network drivers;
- Mellanox network drivers;
- STMicroelectronics network drivers;
- Texas Instruments network drivers;
- Ethernet team driver;
- MediaTek network drivers;
- NVDIMM (Non-Volatile Memory Device) drivers;
- NVME drivers;
- PCI subsystem;
- PCCARD (PCMCIA/CardBus) bus subsystem;
- Amlogic Meson DDR PMU;
- Performance monitor drivers;
- PHY drivers;
- Pin controllers subsystem;
- x86 platform drivers;
- ARM PM domains;
- Power supply drivers;
- Powercap sysfs driver;
- PPS (Pulse Per Second) driver;
- PTP clock framework;
- PWM drivers;
- RapidIO drivers;
- Voltage and Current Regulator drivers;
- Remote Processor subsystem;
- S/390 drivers;
- SCSI subsystem;
- ASPEED SoC drivers;
- QCOM SoC drivers;
- Samsung SoC drivers;
- Texas Instruments SoC drivers;
- SPI subsystem;
- small TFT LCD display modules;
- Media staging drivers;
- TCM subsystem;
- Trusted Execution Environment drivers;
- Thunderbolt and USB4 drivers;
- TTY drivers;
- UFS subsystem;
- Userspace I/O drivers;
- Cadence USB3 driver;
- ChipIdea USB driver;
- USB Device Class drivers;
- USB core drivers;
- DesignWare USB3 driver;
- USB Gadget drivers;
- USB Host Controller drivers;
- Renesas USBHS Controller drivers;
- USB Mass Storage drivers;
- USB Type-C support driver;
- USB Type-C Connector System Software Interface driver;
- VFIO drivers;
- Virtio Host (VHOST) subsystem;
- Backlight driver;
- Framebuffer layer;
- TSM Common Guest driver;
- Virtio drivers;
- Xen hypervisor drivers;
- AFS file system;
- File systems infrastructure;
- BTRFS file system;
- Ceph distributed file system;
- EFI Variable file system;
- exFAT file system;
- Ext4 file system;
- F2FS file system;
- FUSE (File system in Userspace);
- GFS2 file system;
- HFS file system;
- HFS+ file system;
- HugeTLB file system;
- Journaling layer for block devices (JBD2);
- JFFS2 file system;
- JFS file system;
- KERNFS file system;
- Network file system (NFS) client;
- Network file system (NFS) server daemon;
- NILFS2 file system;
- File system notification infrastructure;
- NTFS3 file system;
- OCFS2 file system;
- OrangeFS file system;
- Overlay file system;
- Proc file system;
- Diskquota system;
- SMB network file system;
- SquashFS file system;
- UDF file system;
- XFS file system;
- DRM display driver;
- Asynchronous Transfer Mode (ATM) subsystem;
- BPF subsystem;
- Memory Management;
- Internal shared memory driver;
- LZO compression library;
- Mellanox drivers;
- NFS page cache wrapper;
- padata parallel execution mechanism;
- Memory management;
- Networking subsytem;
- Media input infrastructure;
- Bluetooth subsystem;
- IP tunnels definitions;
- Netfilter;
- Network traffic control;
- Rose network layer;
- SCTP protocol;
- Network sockets;
- UDP network protocol;
- eXpress Data Path;
- XFRM subsystem;
- Digital Audio (PCM) driver;
- Universal MIDI packet (UMP) support module;
- Tracing infrastructure;
- User-space API (UAPI);
- io_uring subsystem;
- IPC subsystem;
- Control group (cgroup);
- Kernel crash support code;
- Perf events;
- Kernel exit() syscall;
- Kernel futex primitives;
- IRQ subsystem;
- Padata parallel execution mechanism;
- Kernel command line parsing driver;
- PID allocator;
- Hibernation control;
- RCU subsystem;
- Restartable seuqences system call mechanism;
- Scheduler infrastructure;
- Syscalls implementation;
- Timer subsystem;
- Maple Tree data structure library;
- KASAN memory debugging framework;
- 802.1Q VLAN protocol;
- 9P file system network protocol;
- Appletalk network protocol;
- Amateur Radio drivers;
- B.A.T.M.A.N. meshing protocol;
- Ethernet bridge;
- CAN network layer;
- Ceph Core library;
- Networking core;
- Devlink API;
- Distributed Switch Architecture;
- HSR network protocol;
- IPv4 networking;
- IPv6 networking;
- MAC80211 subsystem;
- Management Component Transport Protocol (MCTP);
- MultiProtocol Label Switching driver;
- Multipath TCP;
- NetLabel subsystem;
- Netlink;
- NFC subsystem;
- Open vSwitch;
- RDS protocol;
- RF switch subsystem;
- RxRPC session sockets;
- SMC sockets;
- Sun RPC protocol;
- TIPC protocol;
- TLS protocol;
- Unix domain sockets;
- VMware vSockets driver;
- Wireless networking;
- Integrity Measurement Architecture(IMA) framework;
- ALSA framework;
- WCD audio codecs;
- Intel ASoC drivers;
- MediaTek ASoC drivers;
- QCOM ASoC drivers;
- SoC audio core drivers;
- USB sound devices;
- Virtio sound driver;
- CPU Power monitoring subsystem;
- KVM subsystem;
(CVE-2025-21833, CVE-2025-21884, CVE-2025-21931, CVE-2025-22026,
CVE-2025-22037, CVE-2025-22101, CVE-2025-22102, CVE-2025-22103,
CVE-2025-22105, CVE-2025-22106, CVE-2025-22107, CVE-2025-22113,
CVE-2025-22115, CVE-2025-22120, CVE-2025-22121, CVE-2025-22124,
CVE-2025-22125, CVE-2025-22126, CVE-2025-22128, CVE-2025-23129,
CVE-2025-23130, CVE-2025-23133, CVE-2025-23140, CVE-2025-23141,
CVE-2025-23142, CVE-2025-23143, CVE-2025-23144, CVE-2025-23145,
CVE-2025-23146, CVE-2025-23147, CVE-2025-23148, CVE-2025-23149,
CVE-2025-23150, CVE-2025-23151, CVE-2025-23155, CVE-2025-23156,
CVE-2025-23157, CVE-2025-23158, CVE-2025-23159, CVE-2025-23160,
CVE-2025-23161, CVE-2025-23163, CVE-2025-37738, CVE-2025-37739,
CVE-2025-37740, CVE-2025-37741, CVE-2025-37742, CVE-2025-37744,
CVE-2025-37745, CVE-2025-37748, CVE-2025-37749, CVE-2025-37754,
CVE-2025-37755, CVE-2025-37757, CVE-2025-37758, CVE-2025-37759,
CVE-2025-37761, CVE-2025-37763, CVE-2025-37764, CVE-2025-37765,
CVE-2025-37766, CVE-2025-37767, CVE-2025-37768, CVE-2025-37769,
CVE-2025-37770, CVE-2025-37771, CVE-2025-37772, CVE-2025-37773,
CVE-2025-37775, CVE-2025-37777, CVE-2025-37778, CVE-2025-37780,
CVE-2025-37781, CVE-2025-37784, CVE-2025-37786, CVE-2025-37787,
CVE-2025-37788, CVE-2025-37789, CVE-2025-37790, CVE-2025-37792,
CVE-2025-37793, CVE-2025-37794, CVE-2025-37796, CVE-2025-37799,
CVE-2025-37800, CVE-2025-37801, CVE-2025-37803, CVE-2025-37805,
CVE-2025-37808, CVE-2025-37809, CVE-2025-37810, CVE-2025-37811,
CVE-2025-37812, CVE-2025-37813, CVE-2025-37815, CVE-2025-37816,
CVE-2025-37817, CVE-2025-37819, CVE-2025-37820, CVE-2025-37822,
CVE-2025-37823, CVE-2025-37824, CVE-2025-37826, CVE-2025-37827,
CVE-2025-37828, CVE-2025-37829, CVE-2025-37830, CVE-2025-37831,
CVE-2025-37836, CVE-2025-37839, CVE-2025-37840, CVE-2025-37841,
CVE-2025-37842, CVE-2025-37844, CVE-2025-37846, CVE-2025-37849,
CVE-2025-37850, CVE-2025-37851, CVE-2025-37852, CVE-2025-37853,
CVE-2025-37854, CVE-2025-37856, CVE-2025-37857, CVE-2025-37858,
CVE-2025-37859, CVE-2025-37860, CVE-2025-37861, CVE-2025-37862,
CVE-2025-37863, CVE-2025-37864, CVE-2025-37865, CVE-2025-37867,
CVE-2025-37869, CVE-2025-37871, CVE-2025-37872, CVE-2025-37873,
CVE-2025-37874, CVE-2025-37875, CVE-2025-37878, CVE-2025-37879,
CVE-2025-37881, CVE-2025-37883, CVE-2025-37884, CVE-2025-37885,
CVE-2025-37886, CVE-2025-37887, CVE-2025-37891, CVE-2025-37892,
CVE-2025-37897, CVE-2025-37899, CVE-2025-37900, CVE-2025-37901,
CVE-2025-37903, CVE-2025-37905, CVE-2025-37909, CVE-2025-37911,
CVE-2025-37912, CVE-2025-37913, CVE-2025-37914, CVE-2025-37915,
CVE-2025-37916, CVE-2025-37917, CVE-2025-37918, CVE-2025-37920,
CVE-2025-37921, CVE-2025-37922, CVE-2025-37923, CVE-2025-37924,
CVE-2025-37925, CVE-2025-37927, CVE-2025-37928, CVE-2025-37930,
CVE-2025-37931, CVE-2025-37933, CVE-2025-37935, CVE-2025-37936,
CVE-2025-37938, CVE-2025-37940, CVE-2025-37943, CVE-2025-37944,
CVE-2025-37945, CVE-2025-37947, CVE-2025-37948, CVE-2025-37949,
CVE-2025-37951, CVE-2025-37952, CVE-2025-37956, CVE-2025-37957,
CVE-2025-37959, CVE-2025-37960, CVE-2025-37961, CVE-2025-37962,
CVE-2025-37963, CVE-2025-37967, CVE-2025-37968, CVE-2025-37969,
CVE-2025-37970, CVE-2025-37972, CVE-2025-37973, CVE-2025-37975,
CVE-2025-37977, CVE-2025-37978, CVE-2025-37979, CVE-2025-37980,
CVE-2025-37982, CVE-2025-37983, CVE-2025-37984, CVE-2025-37985,
CVE-2025-37986, CVE-2025-37987, CVE-2025-37988, CVE-2025-37989,
CVE-2025-37990, CVE-2025-37991, CVE-2025-37992, CVE-2025-37994,
CVE-2025-37995, CVE-2025-37998, CVE-2025-38003, CVE-2025-38004,
CVE-2025-38005, CVE-2025-38006, CVE-2025-38007, CVE-2025-38008,
CVE-2025-38009, CVE-2025-38010, CVE-2025-38011, CVE-2025-38013,
CVE-2025-38014, CVE-2025-38015, CVE-2025-38018, CVE-2025-38019,
CVE-2025-38020, CVE-2025-38023, CVE-2025-38024, CVE-2025-38027,
CVE-2025-38031, CVE-2025-38034, CVE-2025-38035, CVE-2025-38037,
CVE-2025-38039, CVE-2025-38040, CVE-2025-38043, CVE-2025-38044,
CVE-2025-38045, CVE-2025-38048, CVE-2025-38051, CVE-2025-38052,
CVE-2025-38053, CVE-2025-38055, CVE-2025-38057, CVE-2025-38058,
CVE-2025-38059, CVE-2025-38060, CVE-2025-38061, CVE-2025-38062,
CVE-2025-38063, CVE-2025-38065, CVE-2025-38066, CVE-2025-38067,
CVE-2025-38068, CVE-2025-38071, CVE-2025-38072, CVE-2025-38074,
CVE-2025-38075, CVE-2025-38077, CVE-2025-38078, CVE-2025-38079,
CVE-2025-38080, CVE-2025-38081, CVE-2025-38084, CVE-2025-38085,
CVE-2025-38086, CVE-2025-38087, CVE-2025-38088, CVE-2025-38089,
CVE-2025-38090, CVE-2025-38094, CVE-2025-38095, CVE-2025-38097,
CVE-2025-38098, CVE-2025-38099, CVE-2025-38100, CVE-2025-38101,
CVE-2025-38102, CVE-2025-38103, CVE-2025-38104, CVE-2025-38105,
CVE-2025-38107, CVE-2025-38108, CVE-2025-38109, CVE-2025-38110,
CVE-2025-38111, CVE-2025-38112, CVE-2025-38113, CVE-2025-38115,
CVE-2025-38117, CVE-2025-38119, CVE-2025-38120, CVE-2025-38122,
CVE-2025-38123, CVE-2025-38124, CVE-2025-38125, CVE-2025-38126,
CVE-2025-38127, CVE-2025-38129, CVE-2025-38131, CVE-2025-38135,
CVE-2025-38136, CVE-2025-38138, CVE-2025-38142, CVE-2025-38143,
CVE-2025-38145, CVE-2025-38146, CVE-2025-38147, CVE-2025-38148,
CVE-2025-38149, CVE-2025-38153, CVE-2025-38154, CVE-2025-38155,
CVE-2025-38156, CVE-2025-38157, CVE-2025-38158, CVE-2025-38159,
CVE-2025-38160, CVE-2025-38161, CVE-2025-38162, CVE-2025-38163,
CVE-2025-38164, CVE-2025-38165, CVE-2025-38166, CVE-2025-38167,
CVE-2025-38169, CVE-2025-38170, CVE-2025-38173, CVE-2025-38174,
CVE-2025-38180, CVE-2025-38181, CVE-2025-38182, CVE-2025-38183,
CVE-2025-38184, CVE-2025-38185, CVE-2025-38190, CVE-2025-38191,
CVE-2025-38192, CVE-2025-38193, CVE-2025-38194, CVE-2025-38197,
CVE-2025-38198, CVE-2025-38200, CVE-2025-38202, CVE-2025-38208,
CVE-2025-38210, CVE-2025-38211, CVE-2025-38212, CVE-2025-38214,
CVE-2025-38215, CVE-2025-38217, CVE-2025-38218, CVE-2025-38219,
CVE-2025-38220, CVE-2025-38222, CVE-2025-38225, CVE-2025-38226,
CVE-2025-38229, CVE-2025-38230, CVE-2025-38231, CVE-2025-38232,
CVE-2025-38236, CVE-2025-38239, CVE-2025-38245, CVE-2025-38246,
CVE-2025-38248, CVE-2025-38249, CVE-2025-38250, CVE-2025-38251,
CVE-2025-38253, CVE-2025-38255, CVE-2025-38257, CVE-2025-38258,
CVE-2025-38259, CVE-2025-38260, CVE-2025-38262, CVE-2025-38263,
CVE-2025-38264, CVE-2025-38265, CVE-2025-38269, CVE-2025-38274,
CVE-2025-38275, CVE-2025-38277, CVE-2025-38278, CVE-2025-38279,
CVE-2025-38280, CVE-2025-38282, CVE-2025-38283, CVE-2025-38285,
CVE-2025-38286, CVE-2025-38289, CVE-2025-38290, CVE-2025-38292,
CVE-2025-38293, CVE-2025-38295, CVE-2025-38298, CVE-2025-38299,
CVE-2025-38300, CVE-2025-38303, CVE-2025-38304, CVE-2025-38305,
CVE-2025-38307, CVE-2025-38310, CVE-2025-38312, CVE-2025-38313,
CVE-2025-38319, CVE-2025-38320, CVE-2025-38321, CVE-2025-38322,
CVE-2025-38323, CVE-2025-38324, CVE-2025-38326, CVE-2025-38328,
CVE-2025-38331, CVE-2025-38332, CVE-2025-38333, CVE-2025-38334,
CVE-2025-38335, CVE-2025-38336, CVE-2025-38337, CVE-2025-38338,
CVE-2025-38342, CVE-2025-38343, CVE-2025-38344, CVE-2025-38345,
CVE-2025-38346, CVE-2025-38347, CVE-2025-38348, CVE-2025-38349,
CVE-2025-38351, CVE-2025-38354, CVE-2025-38361, CVE-2025-38362,
CVE-2025-38363, CVE-2025-38364, CVE-2025-38365, CVE-2025-38368,
CVE-2025-38369, CVE-2025-38371, CVE-2025-38373, CVE-2025-38374,
CVE-2025-38375, CVE-2025-38376, CVE-2025-38377, CVE-2025-38382,
CVE-2025-38384, CVE-2025-38385, CVE-2025-38386, CVE-2025-38387,
CVE-2025-38388, CVE-2025-38389, CVE-2025-38390, CVE-2025-38391,
CVE-2025-38392, CVE-2025-38393, CVE-2025-38395, CVE-2025-38396,
CVE-2025-38399, CVE-2025-38400, CVE-2025-38401, CVE-2025-38402,
CVE-2025-38403, CVE-2025-38405, CVE-2025-38406, CVE-2025-38407,
CVE-2025-38408, CVE-2025-38409, CVE-2025-38410, CVE-2025-38412,
CVE-2025-38414, CVE-2025-38415, CVE-2025-38416, CVE-2025-38418,
CVE-2025-38419, CVE-2025-38420, CVE-2025-38422, CVE-2025-38424,
CVE-2025-38425, CVE-2025-38427, CVE-2025-38428, CVE-2025-38429,
CVE-2025-38430, CVE-2025-38436, CVE-2025-38437, CVE-2025-38439,
CVE-2025-38441, CVE-2025-38443, CVE-2025-38444, CVE-2025-38445,
CVE-2025-38448, CVE-2025-38449, CVE-2025-38455, CVE-2025-38456,
CVE-2025-38457, CVE-2025-38458, CVE-2025-38459, CVE-2025-38460,
CVE-2025-38461, CVE-2025-38462, CVE-2025-38463, CVE-2025-38464,
CVE-2025-38465, CVE-2025-38466, CVE-2025-38467, CVE-2025-38468,
CVE-2025-38469, CVE-2025-38470, CVE-2025-38471, CVE-2025-38472,
CVE-2025-38473, CVE-2025-38474, CVE-2025-38476, CVE-2025-38478,
CVE-2025-38480, CVE-2025-38481, CVE-2025-38482, CVE-2025-38483,
CVE-2025-38485, CVE-2025-38487, CVE-2025-38488, CVE-2025-38489,
CVE-2025-38490, CVE-2025-38491, CVE-2025-38493, CVE-2025-38494,
CVE-2025-38495, CVE-2025-38496, CVE-2025-38497, CVE-2025-38499,
CVE-2025-38501, CVE-2025-38502, CVE-2025-38503, CVE-2025-38506,
CVE-2025-38507, CVE-2025-38510, CVE-2025-38511, CVE-2025-38512,
CVE-2025-38513, CVE-2025-38514, CVE-2025-38515, CVE-2025-38516,
CVE-2025-38520, CVE-2025-38521, CVE-2025-38524, CVE-2025-38526,
CVE-2025-38527, CVE-2025-38528, CVE-2025-38529, CVE-2025-38530,
CVE-2025-38531, CVE-2025-38532, CVE-2025-38533, CVE-2025-38535,
CVE-2025-38537, CVE-2025-38538, CVE-2025-38539, CVE-2025-38540,
CVE-2025-38542, CVE-2025-38543, CVE-2025-38544, CVE-2025-38546,
CVE-2025-38548, CVE-2025-38549, CVE-2025-38550, CVE-2025-38551,
CVE-2025-38552, CVE-2025-38553, CVE-2025-38555, CVE-2025-38556,
CVE-2025-38560, CVE-2025-38561, CVE-2025-38562, CVE-2025-38566,
CVE-2025-38568, CVE-2025-38569, CVE-2025-38571, CVE-2025-38572,
CVE-2025-38574, CVE-2025-38576, CVE-2025-38577, CVE-2025-38578,
CVE-2025-38579, CVE-2025-38581, CVE-2025-38582, CVE-2025-38583,
CVE-2025-38584, CVE-2025-38585, CVE-2025-38587, CVE-2025-38588,
CVE-2025-38590, CVE-2025-38593, CVE-2025-38595, CVE-2025-38601,
CVE-2025-38602, CVE-2025-38604, CVE-2025-38608, CVE-2025-38609,
CVE-2025-38610, CVE-2025-38612, CVE-2025-38614, CVE-2025-38615,
CVE-2025-38619, CVE-2025-38622, CVE-2025-38623, CVE-2025-38624,
CVE-2025-38625, CVE-2025-38626, CVE-2025-38627, CVE-2025-38630,
CVE-2025-38632, CVE-2025-38634, CVE-2025-38635, CVE-2025-38639,
CVE-2025-38640, CVE-2025-38643, CVE-2025-38644, CVE-2025-38645,
CVE-2025-38646, CVE-2025-38648, CVE-2025-38650, CVE-2025-38652,
CVE-2025-38653, CVE-2025-38659, CVE-2025-38660, CVE-2025-38663,
CVE-2025-38664, CVE-2025-38665, CVE-2025-38668, CVE-2025-38670,
CVE-2025-38671, CVE-2025-38675, CVE-2025-38676, CVE-2025-38677,
CVE-2025-38679, CVE-2025-38680, CVE-2025-38681, CVE-2025-38684,
CVE-2025-38685, CVE-2025-38686, CVE-2025-38687, CVE-2025-38688,
CVE-2025-38691, CVE-2025-38692, CVE-2025-38693, CVE-2025-38694,
CVE-2025-38695, CVE-2025-38696, CVE-2025-38697, CVE-2025-38698,
CVE-2025-38699, CVE-2025-38700, CVE-2025-38701, CVE-2025-38702,
CVE-2025-38703, CVE-2025-38704, CVE-2025-38705, CVE-2025-38706,
CVE-2025-38707, CVE-2025-38708, CVE-2025-38709, CVE-2025-38710,
CVE-2025-38711, CVE-2025-38712, CVE-2025-38713, CVE-2025-38714,
CVE-2025-38715, CVE-2025-38716, CVE-2025-38718, CVE-2025-38721,
CVE-2025-38722, CVE-2025-38724, CVE-2025-38725, CVE-2025-38728,
CVE-2025-38729, CVE-2025-38730, CVE-2025-38732, CVE-2025-38734,
CVE-2025-38735, CVE-2025-39673, CVE-2025-39675, CVE-2025-39676,
CVE-2025-39678, CVE-2025-39679, CVE-2025-39681, CVE-2025-39683,
CVE-2025-39684, CVE-2025-39685, CVE-2025-39686, CVE-2025-39687,
CVE-2025-39689, CVE-2025-39691, CVE-2025-39692, CVE-2025-39693,
CVE-2025-39694, CVE-2025-39697, CVE-2025-39698, CVE-2025-39701,
CVE-2025-39702, CVE-2025-39703, CVE-2025-39705, CVE-2025-39706,
CVE-2025-39707, CVE-2025-39709, CVE-2025-39710, CVE-2025-39711,
CVE-2025-39712, CVE-2025-39713, CVE-2025-39714, CVE-2025-39715,
CVE-2025-39716, CVE-2025-39718, CVE-2025-39719, CVE-2025-39720,
CVE-2025-39721, CVE-2025-39724, CVE-2025-39726, CVE-2025-39730,
CVE-2025-39731, CVE-2025-39732, CVE-2025-39734, CVE-2025-39736,
CVE-2025-39737, CVE-2025-39738, CVE-2025-39739, CVE-2025-39742,
CVE-2025-39743, CVE-2025-39744, CVE-2025-39746, CVE-2025-39747,
CVE-2025-39748, CVE-2025-39749, CVE-2025-39750, CVE-2025-39752,
CVE-2025-39753, CVE-2025-39756, CVE-2025-39757, CVE-2025-39758,
CVE-2025-39759, CVE-2025-39760, CVE-2025-39761, CVE-2025-39763,
CVE-2025-39766, CVE-2025-39770, CVE-2025-39772, CVE-2025-39773,
CVE-2025-39776, CVE-2025-39779, CVE-2025-39781, CVE-2025-39782,
CVE-2025-39783, CVE-2025-39787, CVE-2025-39788, CVE-2025-39790,
CVE-2025-39794, CVE-2025-39795, CVE-2025-39797, CVE-2025-39798,
CVE-2025-39800, CVE-2025-39801, CVE-2025-39805, CVE-2025-39806,
CVE-2025-39807, CVE-2025-39808, CVE-2025-39810, CVE-2025-39811,
CVE-2025-39812, CVE-2025-39813, CVE-2025-39815, CVE-2025-39817,
CVE-2025-39819, CVE-2025-39823, CVE-2025-39824, CVE-2025-39825,
CVE-2025-39826, CVE-2025-39827, CVE-2025-39828, CVE-2025-39829,
CVE-2025-39832, CVE-2025-39835, CVE-2025-39836, CVE-2025-39838,
CVE-2025-39839, CVE-2025-39841, CVE-2025-39842, CVE-2025-39843,
CVE-2025-39844, CVE-2025-39845, CVE-2025-39846, CVE-2025-39847,
CVE-2025-39848, CVE-2025-39849, CVE-2025-39850, CVE-2025-39851,
CVE-2025-39852, CVE-2025-39853, CVE-2025-39854, CVE-2025-39857,
CVE-2025-39860, CVE-2025-39861, CVE-2025-39863, CVE-2025-39864,
CVE-2025-39865, CVE-2025-39866, CVE-2025-39869, CVE-2025-39870,
CVE-2025-39871, CVE-2025-39873, CVE-2025-39876, CVE-2025-39877,
CVE-2025-39880, CVE-2025-39881, CVE-2025-39883, CVE-2025-39885,
CVE-2025-39886, CVE-2025-39889, CVE-2025-39890, CVE-2025-39891,
CVE-2025-39894, CVE-2025-39895, CVE-2025-39897, CVE-2025-39899,
CVE-2025-39901, CVE-2025-39902, CVE-2025-39907, CVE-2025-39909,
CVE-2025-39911, CVE-2025-39913, CVE-2025-39914, CVE-2025-39916,
CVE-2025-39920, CVE-2025-39923, CVE-2025-39927, CVE-2025-39929,
CVE-2025-39931, CVE-2025-39932, CVE-2025-39934, CVE-2025-39937,
CVE-2025-39938, CVE-2025-39940, CVE-2025-39942, CVE-2025-39943,
CVE-2025-39944, CVE-2025-39945, CVE-2025-39946, CVE-2025-39947,
CVE-2025-39948, CVE-2025-39949, CVE-2025-39950, CVE-2025-39951,
CVE-2025-39952, CVE-2025-39953, CVE-2025-39955, CVE-2025-39957,
CVE-2025-39961, CVE-2025-39965, CVE-2025-39967, CVE-2025-39968,
CVE-2025-39969, CVE-2025-39970, CVE-2025-39971, CVE-2025-39972,
CVE-2025-39973, CVE-2025-39977, CVE-2025-39978, CVE-2025-39980,
CVE-2025-39981, CVE-2025-39982, CVE-2025-39985, CVE-2025-39986,
CVE-2025-39987, CVE-2025-39988, CVE-2025-39989, CVE-2025-39991,
CVE-2025-39992, CVE-2025-39994, CVE-2025-39995, CVE-2025-39996,
CVE-2025-39998, CVE-2025-40000, CVE-2025-40001, CVE-2025-40006,
CVE-2025-40008, CVE-2025-40009, CVE-2025-40010, CVE-2025-40011,
CVE-2025-40013, CVE-2025-40016, CVE-2025-40019, CVE-2025-40020,
CVE-2025-40021, CVE-2025-40024, CVE-2025-40026, CVE-2025-40027,
CVE-2025-40029, CVE-2025-40030, CVE-2025-40031, CVE-2025-40032,
CVE-2025-40033, CVE-2025-40035, CVE-2025-40036, CVE-2025-40037,
CVE-2025-40038, CVE-2025-40042, CVE-2025-40043, CVE-2025-40044,
CVE-2025-40047, CVE-2025-40048, CVE-2025-40049, CVE-2025-40051,
CVE-2025-40052, CVE-2025-40053, CVE-2025-40055, CVE-2025-40056,
CVE-2025-40057, CVE-2025-40058, CVE-2025-40059, CVE-2025-40060,
CVE-2025-40061, CVE-2025-40062, CVE-2025-40067, CVE-2025-40068,
CVE-2025-40070, CVE-2025-40071, CVE-2025-40077, CVE-2025-40078,
CVE-2025-40079, CVE-2025-40080, CVE-2025-40081, CVE-2025-40083,
CVE-2025-40084, CVE-2025-40085, CVE-2025-40087, CVE-2025-40088,
CVE-2025-40092, CVE-2025-40093, CVE-2025-40094, CVE-2025-40095,
CVE-2025-40096, CVE-2025-40099, CVE-2025-40100, CVE-2025-40101,
CVE-2025-40103, CVE-2025-40104, CVE-2025-40105, CVE-2025-40106,
CVE-2025-40107, CVE-2025-40109, CVE-2025-40110, CVE-2025-40111,
CVE-2025-40112, CVE-2025-40115, CVE-2025-40116, CVE-2025-40118,
CVE-2025-40120, CVE-2025-40121, CVE-2025-40123, CVE-2025-40124,
CVE-2025-40125, CVE-2025-40126, CVE-2025-40127, CVE-2025-40129,
CVE-2025-40134, CVE-2025-40137, CVE-2025-40140, CVE-2025-40141,
CVE-2025-40153, CVE-2025-40154, CVE-2025-40155, CVE-2025-40156,
CVE-2025-40159, CVE-2025-40160, CVE-2025-40165, CVE-2025-40166,
CVE-2025-40167, CVE-2025-40169, CVE-2025-40171, CVE-2025-40172,
CVE-2025-40173, CVE-2025-40176, CVE-2025-40178, CVE-2025-40179,
CVE-2025-40180, CVE-2025-40183, CVE-2025-40187, CVE-2025-40188,
CVE-2025-40192, CVE-2025-40193, CVE-2025-40194, CVE-2025-40196,
CVE-2025-40198, CVE-2025-40200, CVE-2025-40201, CVE-2025-40202,
CVE-2025-40204, CVE-2025-40205, CVE-2025-40206, CVE-2025-40207,
CVE-2025-40211, CVE-2025-40215, CVE-2025-40218, CVE-2025-40219,
CVE-2025-40220, CVE-2025-40221, CVE-2025-40223, CVE-2025-40226,
CVE-2025-40231, CVE-2025-40233, CVE-2025-40235, CVE-2025-40237,
CVE-2025-40238, CVE-2025-40240, CVE-2025-40242, CVE-2025-40243,
CVE-2025-40244, CVE-2025-40245, CVE-2025-40248, CVE-2025-40250,
CVE-2025-40251, CVE-2025-40252, CVE-2025-40253, CVE-2025-40254,
CVE-2025-40257, CVE-2025-40258, CVE-2025-40259, CVE-2025-40261,
CVE-2025-40262, CVE-2025-40263, CVE-2025-40264, CVE-2025-40266,
CVE-2025-40268, CVE-2025-40269, CVE-2025-40271, CVE-2025-40272,
CVE-2025-40273, CVE-2025-40275, CVE-2025-40277, CVE-2025-40278,
CVE-2025-40279, CVE-2025-40280, CVE-2025-40281, CVE-2025-40282,
CVE-2025-40283, CVE-2025-40284, CVE-2025-40285, CVE-2025-40286,
CVE-2025-40287, CVE-2025-40288, CVE-2025-40289, CVE-2025-40292,
CVE-2025-40293, CVE-2025-40294, CVE-2025-40297, CVE-2025-40301,
CVE-2025-40303, CVE-2025-40304, CVE-2025-40305, CVE-2025-40306,
CVE-2025-40307, CVE-2025-40308, CVE-2025-40309, CVE-2025-40310,
CVE-2025-40311, CVE-2025-40312, CVE-2025-40313, CVE-2025-40314,
CVE-2025-40315, CVE-2025-40317, CVE-2025-40318, CVE-2025-40319,
CVE-2025-40320, CVE-2025-40321, CVE-2025-40322, CVE-2025-40323,
CVE-2025-40324, CVE-2025-40328, CVE-2025-40329, CVE-2025-40331,
CVE-2025-40333, CVE-2025-40337, CVE-2025-40339, CVE-2025-40341,
CVE-2025-40342, CVE-2025-40343, CVE-2025-40345, CVE-2025-40346,
CVE-2025-40347, CVE-2025-40349, CVE-2025-40350, CVE-2025-40351,
CVE-2025-40353, CVE-2025-40358, CVE-2025-40360, CVE-2025-40363,
CVE-2025-68168, CVE-2025-68171, CVE-2025-68172, CVE-2025-68173,
CVE-2025-68176, CVE-2025-68177, CVE-2025-68178, CVE-2025-68179,
CVE-2025-68180, CVE-2025-68183, CVE-2025-68184, CVE-2025-68185,
CVE-2025-68190, CVE-2025-68191, CVE-2025-68192, CVE-2025-68194,
CVE-2025-68198, CVE-2025-68200, CVE-2025-68201, CVE-2025-68204,
CVE-2025-68208, CVE-2025-68213, CVE-2025-68214, CVE-2025-68217,
CVE-2025-68218, CVE-2025-68219, CVE-2025-68220, CVE-2025-68222,
CVE-2025-68223, CVE-2025-68227, CVE-2025-68229, CVE-2025-68231,
CVE-2025-68233, CVE-2025-68235, CVE-2025-68237, CVE-2025-68238,
CVE-2025-68241, CVE-2025-68244, CVE-2025-68245, CVE-2025-68246,
CVE-2025-68249, CVE-2025-68282, CVE-2025-68283, CVE-2025-68284,
CVE-2025-68285, CVE-2025-68286, CVE-2025-68287, CVE-2025-68288,
CVE-2025-68289, CVE-2025-68290, CVE-2025-68295, CVE-2025-68297,
CVE-2025-68301, CVE-2025-68302, CVE-2025-68303, CVE-2025-68305,
CVE-2025-68307, CVE-2025-68308, CVE-2025-68310, CVE-2025-68311,
CVE-2025-68312, CVE-2025-68313, CVE-2025-68315, CVE-2025-68320,
CVE-2025-68321, CVE-2025-68322, CVE-2025-68327, CVE-2025-68328,
CVE-2025-68330, CVE-2025-68331, CVE-2025-68339, CVE-2025-68340,
CVE-2025-68342, CVE-2025-68343, CVE-2025-68734, CVE-2025-68750)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS
linux-image-6.8.0-1051-azure 6.8.0-1051.57~22.04.1
linux-image-azure 6.8.0-1051.57~22.04.1
linux-image-azure-6.8 6.8.0-1051.57~22.04.1

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-8126-1
https://launchpad.net/bugs/2143853
CVE-2024-36331, CVE-2024-36350, CVE-2024-36357, CVE-2025-21833,
CVE-2025-21884, CVE-2025-21931, CVE-2025-22026, CVE-2025-22037,
CVE-2025-22101, CVE-2025-22102, CVE-2025-22103, CVE-2025-22105,
CVE-2025-22106, CVE-2025-22107, CVE-2025-22113, CVE-2025-22115,
CVE-2025-22120, CVE-2025-22121, CVE-2025-22124, CVE-2025-22125,
CVE-2025-22126, CVE-2025-22128, CVE-2025-23129, CVE-2025-23130,
CVE-2025-23133, CVE-2025-23140, CVE-2025-23141, CVE-2025-23142,
CVE-2025-23143, CVE-2025-23144, CVE-2025-23145, CVE-2025-23146,
CVE-2025-23147, CVE-2025-23148, CVE-2025-23149, CVE-2025-23150,
CVE-2025-23151, CVE-2025-23155, CVE-2025-23156, CVE-2025-23157,
CVE-2025-23158, CVE-2025-23159, CVE-2025-23160, CVE-2025-23161,
CVE-2025-23163, CVE-2025-37738, CVE-2025-37739, CVE-2025-37740,
CVE-2025-37741, CVE-2025-37742, CVE-2025-37744, CVE-2025-37745,
CVE-2025-37748, CVE-2025-37749, CVE-2025-37754, CVE-2025-37755,
CVE-2025-37757, CVE-2025-37758, CVE-2025-37759, CVE-2025-37761,
CVE-2025-37763, CVE-2025-37764, CVE-2025-37765, CVE-2025-37766,
CVE-2025-37767, CVE-2025-37768, CVE-2025-37769, CVE-2025-37770,
CVE-2025-37771, CVE-2025-37772, CVE-2025-37773, CVE-2025-37775,
CVE-2025-37777, CVE-2025-37778, CVE-2025-37780, CVE-2025-37781,
CVE-2025-37784, CVE-2025-37786, CVE-2025-37787, CVE-2025-37788,
CVE-2025-37789, CVE-2025-37790, CVE-2025-37792, CVE-2025-37793,
CVE-2025-37794, CVE-2025-37796, CVE-2025-37799, CVE-2025-37800,
CVE-2025-37801, CVE-2025-37803, CVE-2025-37805, CVE-2025-37808,
CVE-2025-37809, CVE-2025-37810, CVE-2025-37811, CVE-2025-37812,
CVE-2025-37813, CVE-2025-37815, CVE-2025-37816, CVE-2025-37817,
CVE-2025-37819, CVE-2025-37820, CVE-2025-37822, CVE-2025-37823,
CVE-2025-37824, CVE-2025-37826, CVE-2025-37827, CVE-2025-37828,
CVE-2025-37829, CVE-2025-37830, CVE-2025-37831, CVE-2025-37836,
CVE-2025-37839, CVE-2025-37840, CVE-2025-37841, CVE-2025-37842,
CVE-2025-37844, CVE-2025-37846, CVE-2025-37849, CVE-2025-37850,
CVE-2025-37851, CVE-2025-37852, CVE-2025-37853, CVE-2025-37854,
CVE-2025-37856, CVE-2025-37857, CVE-2025-37858, CVE-2025-37859,
CVE-2025-37860, CVE-2025-37861, CVE-2025-37862, CVE-2025-37863,
CVE-2025-37864, CVE-2025-37865, CVE-2025-37867, CVE-2025-37869,
CVE-2025-37871, CVE-2025-37872, CVE-2025-37873, CVE-2025-37874,
CVE-2025-37875, CVE-2025-37878, CVE-2025-37879, CVE-2025-37881,
CVE-2025-37883, CVE-2025-37884, CVE-2025-37885, CVE-2025-37886,
CVE-2025-37887, CVE-2025-37891, CVE-2025-37892, CVE-2025-37897,
CVE-2025-37899, CVE-2025-37900, CVE-2025-37901, CVE-2025-37903,
CVE-2025-37905, CVE-2025-37909, CVE-2025-37911, CVE-2025-37912,
CVE-2025-37913, CVE-2025-37914, CVE-2025-37915, CVE-2025-37916,
CVE-2025-37917, CVE-2025-37918, CVE-2025-37920, CVE-2025-37921,
CVE-2025-37922, CVE-2025-37923, CVE-2025-37924, CVE-2025-37925,
CVE-2025-37927, CVE-2025-37928, CVE-2025-37930, CVE-2025-37931,
CVE-2025-37933, CVE-2025-37935, CVE-2025-37936, CVE-2025-37938,
CVE-2025-37940, CVE-2025-37943, CVE-2025-37944, CVE-2025-37945,
CVE-2025-37947, CVE-2025-37948, CVE-2025-37949, CVE-2025-37951,
CVE-2025-37952, CVE-2025-37956, CVE-2025-37957, CVE-2025-37959,
CVE-2025-37960, CVE-2025-37961, CVE-2025-37962, CVE-2025-37963,
CVE-2025-37967, CVE-2025-37968, CVE-2025-37969, CVE-2025-37970,
CVE-2025-37972, CVE-2025-37973, CVE-2025-37975, CVE-2025-37977,
CVE-2025-37978, CVE-2025-37979, CVE-2025-37980, CVE-2025-37982,
CVE-2025-37983, CVE-2025-37984, CVE-2025-37985, CVE-2025-37986,
CVE-2025-37987, CVE-2025-37988, CVE-2025-37989, CVE-2025-37990,
CVE-2025-37991, CVE-2025-37992, CVE-2025-37994, CVE-2025-37995,
CVE-2025-37998, CVE-2025-38003, CVE-2025-38004, CVE-2025-38005,
CVE-2025-38006, CVE-2025-38007, CVE-2025-38008, CVE-2025-38009,
CVE-2025-38010, CVE-2025-38011, CVE-2025-38013, CVE-2025-38014,
CVE-2025-38015, CVE-2025-38018, CVE-2025-38019, CVE-2025-38020,
CVE-2025-38023, CVE-2025-38024, CVE-2025-38027, CVE-2025-38031,
CVE-2025-38034, CVE-2025-38035, CVE-2025-38037, CVE-2025-38039,
CVE-2025-38040, CVE-2025-38043, CVE-2025-38044, CVE-2025-38045,
CVE-2025-38048, CVE-2025-38051, CVE-2025-38052, CVE-2025-38053,
CVE-2025-38055, CVE-2025-38057, CVE-2025-38058, CVE-2025-38059,
CVE-2025-38060, CVE-2025-38061, CVE-2025-38062, CVE-2025-38063,
CVE-2025-38065, CVE-2025-38066, CVE-2025-38067, CVE-2025-38068,
CVE-2025-38071, CVE-2025-38072, CVE-2025-38074, CVE-2025-38075,
CVE-2025-38077, CVE-2025-38078, CVE-2025-38079, CVE-2025-38080,
CVE-2025-38081, CVE-2025-38084, CVE-2025-38085, CVE-2025-38086,
CVE-2025-38087, CVE-2025-38088, CVE-2025-38089, CVE-2025-38090,
CVE-2025-38094, CVE-2025-38095, CVE-2025-38097, CVE-2025-38098,
CVE-2025-38099, CVE-2025-38100, CVE-2025-38101, CVE-2025-38102,
CVE-2025-38103, CVE-2025-38104, CVE-2025-38105, CVE-2025-38107,
CVE-2025-38108, CVE-2025-38109, CVE-2025-38110, CVE-2025-38111,
CVE-2025-38112, CVE-2025-38113, CVE-2025-38115, CVE-2025-38117,
CVE-2025-38119, CVE-2025-38120, CVE-2025-38122, CVE-2025-38123,
CVE-2025-38124, CVE-2025-38125, CVE-2025-38126, CVE-2025-38127,
CVE-2025-38129, CVE-2025-38131, CVE-2025-38135, CVE-2025-38136,
CVE-2025-38138, CVE-2025-38142, CVE-2025-38143, CVE-2025-38145,
CVE-2025-38146, CVE-2025-38147, CVE-2025-38148, CVE-2025-38149,
CVE-2025-38153, CVE-2025-38154, CVE-2025-38155, CVE-2025-38156,
CVE-2025-38157, CVE-2025-38158, CVE-2025-38159, CVE-2025-38160,
CVE-2025-38161, CVE-2025-38162, CVE-2025-38163, CVE-2025-38164,
CVE-2025-38165, CVE-2025-38166, CVE-2025-38167, CVE-2025-38169,
CVE-2025-38170, CVE-2025-38173, CVE-2025-38174, CVE-2025-38180,
CVE-2025-38181, CVE-2025-38182, CVE-2025-38183, CVE-2025-38184,
CVE-2025-38185, CVE-2025-38190, CVE-2025-38191, CVE-2025-38192,
CVE-2025-38193, CVE-2025-38194, CVE-2025-38197, CVE-2025-38198,
CVE-2025-38200, CVE-2025-38202, CVE-2025-38208, CVE-2025-38210,
CVE-2025-38211, CVE-2025-38212, CVE-2025-38214, CVE-2025-38215,
CVE-2025-38217, CVE-2025-38218, CVE-2025-38219, CVE-2025-38220,
CVE-2025-38222, CVE-2025-38225, CVE-2025-38226, CVE-2025-38229,
CVE-2025-38230, CVE-2025-38231, CVE-2025-38232, CVE-2025-38236,
CVE-2025-38239, CVE-2025-38245, CVE-2025-38246, CVE-2025-38248,
CVE-2025-38249, CVE-2025-38250, CVE-2025-38251, CVE-2025-38253,
CVE-2025-38255, CVE-2025-38257, CVE-2025-38258, CVE-2025-38259,
CVE-2025-38260, CVE-2025-38262, CVE-2025-38263, CVE-2025-38264,
CVE-2025-38265, CVE-2025-38269, CVE-2025-38274, CVE-2025-38275,
CVE-2025-38277, CVE-2025-38278, CVE-2025-38279, CVE-2025-38280,
CVE-2025-38282, CVE-2025-38283, CVE-2025-38285, CVE-2025-38286,
CVE-2025-38289, CVE-2025-38290, CVE-2025-38292, CVE-2025-38293,
CVE-2025-38295, CVE-2025-38298, CVE-2025-38299, CVE-2025-38300,
CVE-2025-38303, CVE-2025-38304, CVE-2025-38305, CVE-2025-38307,
CVE-2025-38310, CVE-2025-38312, CVE-2025-38313, CVE-2025-38319,
CVE-2025-38320, CVE-2025-38321, CVE-2025-38322, CVE-2025-38323,
CVE-2025-38324, CVE-2025-38326, CVE-2025-38328, CVE-2025-38331,
CVE-2025-38332, CVE-2025-38333, CVE-2025-38334, CVE-2025-38335,
CVE-2025-38336, CVE-2025-38337, CVE-2025-38338, CVE-2025-38342,
CVE-2025-38343, CVE-2025-38344, CVE-2025-38345, CVE-2025-38346,
CVE-2025-38347, CVE-2025-38348, CVE-2025-38349, CVE-2025-38351,
CVE-2025-38354, CVE-2025-38361, CVE-2025-38362, CVE-2025-38363,
CVE-2025-38364, CVE-2025-38365, CVE-2025-38368, CVE-2025-38369,
CVE-2025-38371, CVE-2025-38373, CVE-2025-38374, CVE-2025-38375,
CVE-2025-38376, CVE-2025-38377, CVE-2025-38382, CVE-2025-38384,
CVE-2025-38385, CVE-2025-38386, CVE-2025-38387, CVE-2025-38388,
CVE-2025-38389, CVE-2025-38390, CVE-2025-38391, CVE-2025-38392,
CVE-2025-38393, CVE-2025-38395, CVE-2025-38396, CVE-2025-38399,
CVE-2025-38400, CVE-2025-38401, CVE-2025-38402, CVE-2025-38403,
CVE-2025-38405, CVE-2025-38406, CVE-2025-38407, CVE-2025-38408,
CVE-2025-38409, CVE-2025-38410, CVE-2025-38412, CVE-2025-38414,
CVE-2025-38415, CVE-2025-38416, CVE-2025-38418, CVE-2025-38419,
CVE-2025-38420, CVE-2025-38422, CVE-2025-38424, CVE-2025-38425,
CVE-2025-38427, CVE-2025-38428, CVE-2025-38429, CVE-2025-38430,
CVE-2025-38436, CVE-2025-38437, CVE-2025-38439, CVE-2025-38441,
CVE-2025-38443, CVE-2025-38444, CVE-2025-38445, CVE-2025-38448,
CVE-2025-38449, CVE-2025-38455, CVE-2025-38456, CVE-2025-38457,
CVE-2025-38458, CVE-2025-38459, CVE-2025-38460, CVE-2025-38461,
CVE-2025-38462, CVE-2025-38463, CVE-2025-38464, CVE-2025-38465,
CVE-2025-38466, CVE-2025-38467, CVE-2025-38468, CVE-2025-38469,
CVE-2025-38470, CVE-2025-38471, CVE-2025-38472, CVE-2025-38473,
CVE-2025-38474, CVE-2025-38476, CVE-2025-38478, CVE-2025-38480,
CVE-2025-38481, CVE-2025-38482, CVE-2025-38483, CVE-2025-38485,
CVE-2025-38487, CVE-2025-38488, CVE-2025-38489, CVE-2025-38490,
CVE-2025-38491, CVE-2025-38493, CVE-2025-38494, CVE-2025-38495,
CVE-2025-38496, CVE-2025-38497, CVE-2025-38499, CVE-2025-38501,
CVE-2025-38502, CVE-2025-38503, CVE-2025-38506, CVE-2025-38507,
CVE-2025-38510, CVE-2025-38511, CVE-2025-38512, CVE-2025-38513,
CVE-2025-38514, CVE-2025-38515, CVE-2025-38516, CVE-2025-38520,
CVE-2025-38521, CVE-2025-38524, CVE-2025-38526, CVE-2025-38527,
CVE-2025-38528, CVE-2025-38529, CVE-2025-38530, CVE-2025-38531,
CVE-2025-38532, CVE-2025-38533, CVE-2025-38535, CVE-2025-38537,
CVE-2025-38538, CVE-2025-38539, CVE-2025-38540, CVE-2025-38542,
CVE-2025-38543, CVE-2025-38544, CVE-2025-38546, CVE-2025-38548,
CVE-2025-38549, CVE-2025-38550, CVE-2025-38551, CVE-2025-38552,
CVE-2025-38553, CVE-2025-38555, CVE-2025-38556, CVE-2025-38560,
CVE-2025-38561, CVE-2025-38562, CVE-2025-38566, CVE-2025-38568,
CVE-2025-38569, CVE-2025-38571, CVE-2025-38572, CVE-2025-38574,
CVE-2025-38576, CVE-2025-38577, CVE-2025-38578, CVE-2025-38579,
CVE-2025-38581, CVE-2025-38582, CVE-2025-38583, CVE-2025-38584,
CVE-2025-38585, CVE-2025-38587, CVE-2025-38588, CVE-2025-38590,
CVE-2025-38593, CVE-2025-38595, CVE-2025-38601, CVE-2025-38602,
CVE-2025-38604, CVE-2025-38608, CVE-2025-38609, CVE-2025-38610,
CVE-2025-38612, CVE-2025-38614, CVE-2025-38615, CVE-2025-38619,
CVE-2025-38622, CVE-2025-38623, CVE-2025-38624, CVE-2025-38625,
CVE-2025-38626, CVE-2025-38627, CVE-2025-38630, CVE-2025-38632,
CVE-2025-38634, CVE-2025-38635, CVE-2025-38639, CVE-2025-38640,
CVE-2025-38643, CVE-2025-38644, CVE-2025-38645, CVE-2025-38646,
CVE-2025-38648, CVE-2025-38650, CVE-2025-38652, CVE-2025-38653,
CVE-2025-38659, CVE-2025-38660, CVE-2025-38663, CVE-2025-38664,
CVE-2025-38665, CVE-2025-38668, CVE-2025-38670, CVE-2025-38671,
CVE-2025-38675, CVE-2025-38676, CVE-2025-38677, CVE-2025-38679,
CVE-2025-38680, CVE-2025-38681, CVE-2025-38684, CVE-2025-38685,
CVE-2025-38686, CVE-2025-38687, CVE-2025-38688, CVE-2025-38691,
CVE-2025-38692, CVE-2025-38693, CVE-2025-38694, CVE-2025-38695,
CVE-2025-38696, CVE-2025-38697, CVE-2025-38698, CVE-2025-38699,
CVE-2025-38700, CVE-2025-38701, CVE-2025-38702, CVE-2025-38703,
CVE-2025-38704, CVE-2025-38705, CVE-2025-38706, CVE-2025-38707,
CVE-2025-38708, CVE-2025-38709, CVE-2025-38710, CVE-2025-38711,
CVE-2025-38712, CVE-2025-38713, CVE-2025-38714, CVE-2025-38715,
CVE-2025-38716, CVE-2025-38718, CVE-2025-38721, CVE-2025-38722,
CVE-2025-38724, CVE-2025-38725, CVE-2025-38728, CVE-2025-38729,
CVE-2025-38730, CVE-2025-38732, CVE-2025-38734, CVE-2025-38735,
CVE-2025-39673, CVE-2025-39675, CVE-2025-39676, CVE-2025-39678,
CVE-2025-39679, CVE-2025-39681, CVE-2025-39683, CVE-2025-39684,
CVE-2025-39685, CVE-2025-39686, CVE-2025-39687, CVE-2025-39689,
CVE-2025-39691, CVE-2025-39692, CVE-2025-39693, CVE-2025-39694,
CVE-2025-39697, CVE-2025-39698, CVE-2025-39701, CVE-2025-39702,
CVE-2025-39703, CVE-2025-39705, CVE-2025-39706, CVE-2025-39707,
CVE-2025-39709, CVE-2025-39710, CVE-2025-39711, CVE-2025-39712,
CVE-2025-39713, CVE-2025-39714, CVE-2025-39715, CVE-2025-39716,
CVE-2025-39718, CVE-2025-39719, CVE-2025-39720, CVE-2025-39721,
CVE-2025-39724, CVE-2025-39726, CVE-2025-39730, CVE-2025-39731,
CVE-2025-39732, CVE-2025-39734, CVE-2025-39736, CVE-2025-39737,
CVE-2025-39738, CVE-2025-39739, CVE-2025-39742, CVE-2025-39743,
CVE-2025-39744, CVE-2025-39746, CVE-2025-39747, CVE-2025-39748,
CVE-2025-39749, CVE-2025-39750, CVE-2025-39752, CVE-2025-39753,
CVE-2025-39756, CVE-2025-39757, CVE-2025-39758, CVE-2025-39759,
CVE-2025-39760, CVE-2025-39761, CVE-2025-39763, CVE-2025-39766,
CVE-2025-39770, CVE-2025-39772, CVE-2025-39773, CVE-2025-39776,
CVE-2025-39779, CVE-2025-39781, CVE-2025-39782, CVE-2025-39783,
CVE-2025-39787, CVE-2025-39788, CVE-2025-39790, CVE-2025-39794,
CVE-2025-39795, CVE-2025-39797, CVE-2025-39798, CVE-2025-39800,
CVE-2025-39801, CVE-2025-39805, CVE-2025-39806, CVE-2025-39807,
CVE-2025-39808, CVE-2025-39810, CVE-2025-39811, CVE-2025-39812,
CVE-2025-39813, CVE-2025-39815, CVE-2025-39817, CVE-2025-39819,
CVE-2025-39823, CVE-2025-39824, CVE-2025-39825, CVE-2025-39826,
CVE-2025-39827, CVE-2025-39828, CVE-2025-39829, CVE-2025-39832,
CVE-2025-39835, CVE-2025-39836, CVE-2025-39838, CVE-2025-39839,
CVE-2025-39841, CVE-2025-39842, CVE-2025-39843, CVE-2025-39844,
CVE-2025-39845, CVE-2025-39846, CVE-2025-39847, CVE-2025-39848,
CVE-2025-39849, CVE-2025-39850, CVE-2025-39851, CVE-2025-39852,
CVE-2025-39853, CVE-2025-39854, CVE-2025-39857, CVE-2025-39860,
CVE-2025-39861, CVE-2025-39863, CVE-2025-39864, CVE-2025-39865,
CVE-2025-39866, CVE-2025-39869, CVE-2025-39870, CVE-2025-39871,
CVE-2025-39873, CVE-2025-39876, CVE-2025-39877, CVE-2025-39880,
CVE-2025-39881, CVE-2025-39883, CVE-2025-39885, CVE-2025-39886,
CVE-2025-39889, CVE-2025-39890, CVE-2025-39891, CVE-2025-39894,
CVE-2025-39895, CVE-2025-39897, CVE-2025-39899, CVE-2025-39901,
CVE-2025-39902, CVE-2025-39907, CVE-2025-39909, CVE-2025-39911,
CVE-2025-39913, CVE-2025-39914, CVE-2025-39916, CVE-2025-39920,
CVE-2025-39923, CVE-2025-39927, CVE-2025-39929, CVE-2025-39931,
CVE-2025-39932, CVE-2025-39934, CVE-2025-39937, CVE-2025-39938,
CVE-2025-39940, CVE-2025-39942, CVE-2025-39943, CVE-2025-39944,
CVE-2025-39945, CVE-2025-39946, CVE-2025-39947, CVE-2025-39948,
CVE-2025-39949, CVE-2025-39950, CVE-2025-39951, CVE-2025-39952,
CVE-2025-39953, CVE-2025-39955, CVE-2025-39957, CVE-2025-39961,
CVE-2025-39965, CVE-2025-39967, CVE-2025-39968, CVE-2025-39969,
CVE-2025-39970, CVE-2025-39971, CVE-2025-39972, CVE-2025-39973,
CVE-2025-39977, CVE-2025-39978, CVE-2025-39980, CVE-2025-39981,
CVE-2025-39982, CVE-2025-39985, CVE-2025-39986, CVE-2025-39987,
CVE-2025-39988, CVE-2025-39989, CVE-2025-39991, CVE-2025-39992,
CVE-2025-39994, CVE-2025-39995, CVE-2025-39996, CVE-2025-39998,
CVE-2025-40000, CVE-2025-40001, CVE-2025-40006, CVE-2025-40008,
CVE-2025-40009, CVE-2025-40010, CVE-2025-40011, CVE-2025-40013,
CVE-2025-40016, CVE-2025-40019, CVE-2025-40020, CVE-2025-40021,
CVE-2025-40024, CVE-2025-40026, CVE-2025-40027, CVE-2025-40029,
CVE-2025-40030, CVE-2025-40031, CVE-2025-40032, CVE-2025-40033,
CVE-2025-40035, CVE-2025-40036, CVE-2025-40037, CVE-2025-40038,
CVE-2025-40042, CVE-2025-40043, CVE-2025-40044, CVE-2025-40047,
CVE-2025-40048, CVE-2025-40049, CVE-2025-40051, CVE-2025-40052,
CVE-2025-40053, CVE-2025-40055, CVE-2025-40056, CVE-2025-40057,
CVE-2025-40058, CVE-2025-40059, CVE-2025-40060, CVE-2025-40061,
CVE-2025-40062, CVE-2025-40067, CVE-2025-40068, CVE-2025-40070,
CVE-2025-40071, CVE-2025-40077, CVE-2025-40078, CVE-2025-40079,
CVE-2025-40080, CVE-2025-40081, CVE-2025-40083, CVE-2025-40084,
CVE-2025-40085, CVE-2025-40087, CVE-2025-40088, CVE-2025-40092,
CVE-2025-40093, CVE-2025-40094, CVE-2025-40095, CVE-2025-40096,
CVE-2025-40099, CVE-2025-40100, CVE-2025-40101, CVE-2025-40103,
CVE-2025-40104, CVE-2025-40105, CVE-2025-40106, CVE-2025-40107,
CVE-2025-40109, CVE-2025-40110, CVE-2025-40111, CVE-2025-40112,
CVE-2025-40115, CVE-2025-40116, CVE-2025-40118, CVE-2025-40120,
CVE-2025-40121, CVE-2025-40123, CVE-2025-40124, CVE-2025-40125,
CVE-2025-40126, CVE-2025-40127, CVE-2025-40129, CVE-2025-40134,
CVE-2025-40137, CVE-2025-40140, CVE-2025-40141, CVE-2025-40153,
CVE-2025-40154, CVE-2025-40155, CVE-2025-40156, CVE-2025-40159,
CVE-2025-40160, CVE-2025-40165, CVE-2025-40166, CVE-2025-40167,
CVE-2025-40169, CVE-2025-40171, CVE-2025-40172, CVE-2025-40173,
CVE-2025-40176, CVE-2025-40178, CVE-2025-40179, CVE-2025-40180,
CVE-2025-40183, CVE-2025-40187, CVE-2025-40188, CVE-2025-40192,
CVE-2025-40193, CVE-2025-40194, CVE-2025-40196, CVE-2025-40198,
CVE-2025-40200, CVE-2025-40201, CVE-2025-40202, CVE-2025-40204,
CVE-2025-40205, CVE-2025-40206, CVE-2025-40207, CVE-2025-40211,
CVE-2025-40215, CVE-2025-40218, CVE-2025-40219, CVE-2025-40220,
CVE-2025-40221, CVE-2025-40223, CVE-2025-40226, CVE-2025-40231,
CVE-2025-40233, CVE-2025-40235, CVE-2025-40237, CVE-2025-40238,
CVE-2025-40240, CVE-2025-40242, CVE-2025-40243, CVE-2025-40244,
CVE-2025-40245, CVE-2025-40248, CVE-2025-40250, CVE-2025-40251,
CVE-2025-40252, CVE-2025-40253, CVE-2025-40254, CVE-2025-40257,
CVE-2025-40258, CVE-2025-40259, CVE-2025-40261, CVE-2025-40262,
CVE-2025-40263, CVE-2025-40264, CVE-2025-40266, CVE-2025-40268,
CVE-2025-40269, CVE-2025-40271, CVE-2025-40272, CVE-2025-40273,
CVE-2025-40275, CVE-2025-40277, CVE-2025-40278, CVE-2025-40279,
CVE-2025-40280, CVE-2025-40281, CVE-2025-40282, CVE-2025-40283,
CVE-2025-40284, CVE-2025-40285, CVE-2025-40286, CVE-2025-40287,
CVE-2025-40288, CVE-2025-40289, CVE-2025-40292, CVE-2025-40293,
CVE-2025-40294, CVE-2025-40297, CVE-2025-40301, CVE-2025-40303,
CVE-2025-40304, CVE-2025-40305, CVE-2025-40306, CVE-2025-40307,
CVE-2025-40308, CVE-2025-40309, CVE-2025-40310, CVE-2025-40311,
CVE-2025-40312, CVE-2025-40313, CVE-2025-40314, CVE-2025-40315,
CVE-2025-40317, CVE-2025-40318, CVE-2025-40319, CVE-2025-40320,
CVE-2025-40321, CVE-2025-40322, CVE-2025-40323, CVE-2025-40324,
CVE-2025-40328, CVE-2025-40329, CVE-2025-40331, CVE-2025-40333,
CVE-2025-40337, CVE-2025-40339, CVE-2025-40341, CVE-2025-40342,
CVE-2025-40343, CVE-2025-40345, CVE-2025-40346, CVE-2025-40347,
CVE-2025-40349, CVE-2025-40350, CVE-2025-40351, CVE-2025-40353,
CVE-2025-40358, CVE-2025-40360, CVE-2025-40363, CVE-2025-68168,
CVE-2025-68171, CVE-2025-68172, CVE-2025-68173, CVE-2025-68176,
CVE-2025-68177, CVE-2025-68178, CVE-2025-68179, CVE-2025-68180,
CVE-2025-68183, CVE-2025-68184, CVE-2025-68185, CVE-2025-68190,
CVE-2025-68191, CVE-2025-68192, CVE-2025-68194, CVE-2025-68198,
CVE-2025-68200, CVE-2025-68201, CVE-2025-68204, CVE-2025-68208,
CVE-2025-68213, CVE-2025-68214, CVE-2025-68217, CVE-2025-68218,
CVE-2025-68219, CVE-2025-68220, CVE-2025-68222, CVE-2025-68223,
CVE-2025-68227, CVE-2025-68229, CVE-2025-68231, CVE-2025-68233,
CVE-2025-68235, CVE-2025-68237, CVE-2025-68238, CVE-2025-68241,
CVE-2025-68244, CVE-2025-68245, CVE-2025-68246, CVE-2025-68249,
CVE-2025-68282, CVE-2025-68283, CVE-2025-68284, CVE-2025-68285,
CVE-2025-68286, CVE-2025-68287, CVE-2025-68288, CVE-2025-68289,
CVE-2025-68290, CVE-2025-68295, CVE-2025-68297, CVE-2025-68301,
CVE-2025-68302, CVE-2025-68303, CVE-2025-68305, CVE-2025-68307,
CVE-2025-68308, CVE-2025-68310, CVE-2025-68311, CVE-2025-68312,
CVE-2025-68313, CVE-2025-68315, CVE-2025-68320, CVE-2025-68321,
CVE-2025-68322, CVE-2025-68327, CVE-2025-68328, CVE-2025-68330,
CVE-2025-68331, CVE-2025-68339, CVE-2025-68340, CVE-2025-68342,
CVE-2025-68343, CVE-2025-68734, CVE-2025-68750

Package Information:
https://launchpad.net/ubuntu/+source/linux-azure-6.8/6.8.0-1051.57~22.04.1

[USN-8125-1] Linux kernel (Azure) vulnerabilities

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmnENLAFAwAAAAAACgkQZ0GeRcM5nt1V
CAf9Fx3Zl0aHoqmgyWaoNmxAsGUbn/62pBYpgyyqaaaumBm7uX8GB3N4xtimO6z9LfQ1VJM2nSaE
bMPPdHpwJCeDdhrY0/PZqCBYzEJtO2uIWpJMYwxlLv8S2q0LMXH5uAQ+t5l97b0pBmNmR/9p+tv/
uAv8RI1rQefod30M2jMFNqTEhZzUEMJHfGwruVx4llUKOAyxbmSEQu6P5VbcxRtc2eE4WiuxoQ5b
Tp9Z0cSeG2NGVba8zI8jeToOzOKKVExkfYMwvxoalhwyDqaZbIMeO7M4WtzdH4zYrT0k/KO1yVbr
IpX6r8BKWy82WIco7iokGi3GzYJ36OaKyEoyRhg32A==
=6gmJ
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-8125-1
March 25, 2026

linux-azure vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-azure: Linux kernel for Microsoft Azure Cloud systems

Details:

Qualys discovered that several vulnerabilities existed in the AppArmor
Linux kernel Security Module (LSM). An unprivileged local attacker could
use these issues to load, replace, and remove arbitrary AppArmor profiles
causing denial of service, exposure of sensitive information (kernel
memory), local privilege escalation, or possibly escape a container.
(LP: #2143853)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
- MIPS architecture;
- Nios II architecture;
- PA-RISC architecture;
- RISC-V architecture;
- S390 architecture;
- Sun Sparc architecture;
- User-Mode Linux (UML);
- x86 architecture;
- Xtensa architecture;
- Block layer subsystem;
- Cryptographic API;
- Compute Acceleration Framework;
- ACPI drivers;
- ATM drivers;
- Drivers core;
- Block device driver;
- Network block device driver;
- Bluetooth drivers;
- Bus devices;
- Hardware random number generator core;
- Character device driver;
- Data acquisition framework and drivers;
- CPU frequency scaling framework;
- Hardware crypto device drivers;
- Device frequency scaling framework;
- DMA engine subsystem;
- ARM SCMI message protocol;
- EFI core;
- Intel Stratix 10 firmware drivers;
- GPU drivers;
- HID subsystem;
- CoreSight HW tracing drivers;
- IIO subsystem;
- InfiniBand drivers;
- Input Device core drivers;
- Input Device (Miscellaneous) drivers;
- Input Device (Tablet) drivers;
- IOMMU subsystem;
- ISDN/mISDN subsystem;
- Mailbox framework;
- Multiple devices driver;
- Media drivers;
- Fastrpc Driver;
- MOST (Media Oriented Systems Transport) drivers;
- MTD block device drivers;
- Ethernet bonding driver;
- Network drivers;
- Mellanox network drivers;
- STMicroelectronics network drivers;
- Texas Instruments network drivers;
- Ethernet team driver;
- NVME drivers;
- PCI subsystem;
- PCCARD (PCMCIA/CardBus) bus subsystem;
- Performance monitor drivers;
- Pin controllers subsystem;
- x86 platform drivers;
- ARM PM domains;
- PPS (Pulse Per Second) driver;
- PTP clock framework;
- PWM drivers;
- Remote Processor subsystem;
- S/390 drivers;
- SCSI subsystem;
- Texas Instruments SoC drivers;
- TCM subsystem;
- Trusted Execution Environment drivers;
- TTY drivers;
- Userspace I/O drivers;
- Cadence USB3 driver;
- DesignWare USB3 driver;
- USB Gadget drivers;
- USB Host Controller drivers;
- Renesas USBHS Controller drivers;
- USB Mass Storage drivers;
- Virtio Host (VHOST) subsystem;
- Framebuffer layer;
- Xen hypervisor drivers;
- AFS file system;
- BTRFS file system;
- Ceph distributed file system;
- File systems infrastructure;
- EFI Variable file system;
- exFAT file system;
- Ext4 file system;
- F2FS file system;
- FUSE (File system in Userspace);
- GFS2 file system;
- HFS file system;
- HFS+ file system;
- HugeTLB file system;
- JFS file system;
- KERNFS file system;
- Network file system (NFS) client;
- Network file system (NFS) server daemon;
- File system notification infrastructure;
- NTFS3 file system;
- OCFS2 file system;
- OrangeFS file system;
- Proc file system;
- Diskquota system;
- SMB network file system;
- SquashFS file system;
- UDF file system;
- XFS file system;
- Asynchronous Transfer Mode (ATM) subsystem;
- BPF subsystem;
- Mellanox drivers;
- NFS page cache wrapper;
- Memory management;
- Memory Management;
- Media input infrastructure;
- Bluetooth subsystem;
- IP tunnels definitions;
- Network traffic control;
- Rose network layer;
- Network sockets;
- io_uring subsystem;
- Control group (cgroup);
- Kernel crash support code;
- Kernel futex primitives;
- PID allocator;
- Scheduler infrastructure;
- Syscalls implementation;
- Timer subsystem;
- Tracing infrastructure;
- 9P file system network protocol;
- Amateur Radio drivers;
- B.A.T.M.A.N. meshing protocol;
- Ethernet bridge;
- Ceph Core library;
- Networking core;
- Devlink API;
- IPv4 networking;
- IPv6 networking;
- MAC80211 subsystem;
- Multipath TCP;
- Netfilter;
- NFC subsystem;
- Open vSwitch;
- RF switch subsystem;
- SCTP protocol;
- SMC sockets;
- Sun RPC protocol;
- TIPC protocol;
- TLS protocol;
- VMware vSockets driver;
- Wireless networking;
- eXpress Data Path;
- XFRM subsystem;
- Integrity Measurement Architecture(IMA) framework;
- Intel ASoC drivers;
- QCOM ASoC drivers;
- USB sound devices;
(CVE-2025-21833, CVE-2025-22037, CVE-2025-22103, CVE-2025-22105,
CVE-2025-22106, CVE-2025-22107, CVE-2025-22113, CVE-2025-22121,
CVE-2025-22124, CVE-2025-22125, CVE-2025-23129, CVE-2025-23130,
CVE-2025-23133, CVE-2025-23143, CVE-2025-37860, CVE-2025-37899,
CVE-2025-38105, CVE-2025-38502, CVE-2025-38556, CVE-2025-38627,
CVE-2025-38643, CVE-2025-38709, CVE-2025-39678, CVE-2025-39697,
CVE-2025-39805, CVE-2025-39806, CVE-2025-39807, CVE-2025-39808,
CVE-2025-39810, CVE-2025-39811, CVE-2025-39812, CVE-2025-39813,
CVE-2025-39815, CVE-2025-39817, CVE-2025-39819, CVE-2025-39823,
CVE-2025-39824, CVE-2025-39825, CVE-2025-39826, CVE-2025-39827,
CVE-2025-39828, CVE-2025-39829, CVE-2025-39832, CVE-2025-39835,
CVE-2025-39836, CVE-2025-39838, CVE-2025-39839, CVE-2025-39841,
CVE-2025-39842, CVE-2025-39843, CVE-2025-39844, CVE-2025-39845,
CVE-2025-39846, CVE-2025-39847, CVE-2025-39848, CVE-2025-39849,
CVE-2025-39850, CVE-2025-39851, CVE-2025-39852, CVE-2025-39853,
CVE-2025-39854, CVE-2025-39857, CVE-2025-39860, CVE-2025-39861,
CVE-2025-39863, CVE-2025-39864, CVE-2025-39865, CVE-2025-39866,
CVE-2025-39869, CVE-2025-39870, CVE-2025-39871, CVE-2025-39873,
CVE-2025-39876, CVE-2025-39877, CVE-2025-39880, CVE-2025-39881,
CVE-2025-39883, CVE-2025-39885, CVE-2025-39886, CVE-2025-39891,
CVE-2025-39894, CVE-2025-39895, CVE-2025-39897, CVE-2025-39899,
CVE-2025-39901, CVE-2025-39902, CVE-2025-39907, CVE-2025-39909,
CVE-2025-39911, CVE-2025-39913, CVE-2025-39914, CVE-2025-39916,
CVE-2025-39920, CVE-2025-39923, CVE-2025-39927, CVE-2025-39929,
CVE-2025-39931, CVE-2025-39932, CVE-2025-39934, CVE-2025-39937,
CVE-2025-39938, CVE-2025-39940, CVE-2025-39942, CVE-2025-39943,
CVE-2025-39944, CVE-2025-39945, CVE-2025-39947, CVE-2025-39948,
CVE-2025-39949, CVE-2025-39950, CVE-2025-39951, CVE-2025-39952,
CVE-2025-39953, CVE-2025-39955, CVE-2025-39957, CVE-2025-39961,
CVE-2025-39965, CVE-2025-39967, CVE-2025-39968, CVE-2025-39969,
CVE-2025-39970, CVE-2025-39971, CVE-2025-39972, CVE-2025-39973,
CVE-2025-39977, CVE-2025-39978, CVE-2025-39980, CVE-2025-39981,
CVE-2025-39982, CVE-2025-39985, CVE-2025-39986, CVE-2025-39987,
CVE-2025-39988, CVE-2025-39991, CVE-2025-39992, CVE-2025-39994,
CVE-2025-39995, CVE-2025-39996, CVE-2025-39998, CVE-2025-40000,
CVE-2025-40001, CVE-2025-40006, CVE-2025-40008, CVE-2025-40009,
CVE-2025-40010, CVE-2025-40011, CVE-2025-40013, CVE-2025-40016,
CVE-2025-40020, CVE-2025-40021, CVE-2025-40024, CVE-2025-40026,
CVE-2025-40027, CVE-2025-40029, CVE-2025-40030, CVE-2025-40031,
CVE-2025-40032, CVE-2025-40033, CVE-2025-40035, CVE-2025-40036,
CVE-2025-40037, CVE-2025-40038, CVE-2025-40042, CVE-2025-40043,
CVE-2025-40044, CVE-2025-40047, CVE-2025-40048, CVE-2025-40049,
CVE-2025-40051, CVE-2025-40052, CVE-2025-40053, CVE-2025-40055,
CVE-2025-40056, CVE-2025-40057, CVE-2025-40058, CVE-2025-40059,
CVE-2025-40060, CVE-2025-40061, CVE-2025-40062, CVE-2025-40067,
CVE-2025-40068, CVE-2025-40070, CVE-2025-40071, CVE-2025-40077,
CVE-2025-40078, CVE-2025-40079, CVE-2025-40080, CVE-2025-40081,
CVE-2025-40083, CVE-2025-40084, CVE-2025-40085, CVE-2025-40087,
CVE-2025-40088, CVE-2025-40092, CVE-2025-40093, CVE-2025-40094,
CVE-2025-40095, CVE-2025-40096, CVE-2025-40099, CVE-2025-40100,
CVE-2025-40101, CVE-2025-40103, CVE-2025-40104, CVE-2025-40105,
CVE-2025-40106, CVE-2025-40107, CVE-2025-40109, CVE-2025-40110,
CVE-2025-40111, CVE-2025-40112, CVE-2025-40115, CVE-2025-40116,
CVE-2025-40118, CVE-2025-40120, CVE-2025-40121, CVE-2025-40123,
CVE-2025-40124, CVE-2025-40125, CVE-2025-40126, CVE-2025-40127,
CVE-2025-40129, CVE-2025-40134, CVE-2025-40137, CVE-2025-40140,
CVE-2025-40141, CVE-2025-40153, CVE-2025-40154, CVE-2025-40155,
CVE-2025-40156, CVE-2025-40159, CVE-2025-40160, CVE-2025-40165,
CVE-2025-40166, CVE-2025-40167, CVE-2025-40169, CVE-2025-40171,
CVE-2025-40172, CVE-2025-40173, CVE-2025-40176, CVE-2025-40178,
CVE-2025-40179, CVE-2025-40180, CVE-2025-40183, CVE-2025-40187,
CVE-2025-40188, CVE-2025-40192, CVE-2025-40193, CVE-2025-40194,
CVE-2025-40196, CVE-2025-40198, CVE-2025-40200, CVE-2025-40201,
CVE-2025-40202, CVE-2025-40204, CVE-2025-40205, CVE-2025-40206,
CVE-2025-40207, CVE-2025-40211, CVE-2025-40218, CVE-2025-40219,
CVE-2025-40220, CVE-2025-40221, CVE-2025-40223, CVE-2025-40226,
CVE-2025-40231, CVE-2025-40233, CVE-2025-40235, CVE-2025-40237,
CVE-2025-40238, CVE-2025-40240, CVE-2025-40242, CVE-2025-40243,
CVE-2025-40244, CVE-2025-40245, CVE-2025-40248, CVE-2025-40250,
CVE-2025-40251, CVE-2025-40252, CVE-2025-40253, CVE-2025-40254,
CVE-2025-40257, CVE-2025-40258, CVE-2025-40259, CVE-2025-40261,
CVE-2025-40262, CVE-2025-40263, CVE-2025-40264, CVE-2025-40266,
CVE-2025-40268, CVE-2025-40269, CVE-2025-40271, CVE-2025-40272,
CVE-2025-40273, CVE-2025-40275, CVE-2025-40277, CVE-2025-40278,
CVE-2025-40279, CVE-2025-40280, CVE-2025-40281, CVE-2025-40282,
CVE-2025-40283, CVE-2025-40284, CVE-2025-40285, CVE-2025-40286,
CVE-2025-40287, CVE-2025-40288, CVE-2025-40289, CVE-2025-40292,
CVE-2025-40293, CVE-2025-40294, CVE-2025-40301, CVE-2025-40303,
CVE-2025-40304, CVE-2025-40305, CVE-2025-40306, CVE-2025-40307,
CVE-2025-40308, CVE-2025-40309, CVE-2025-40310, CVE-2025-40311,
CVE-2025-40312, CVE-2025-40313, CVE-2025-40314, CVE-2025-40315,
CVE-2025-40317, CVE-2025-40318, CVE-2025-40319, CVE-2025-40320,
CVE-2025-40321, CVE-2025-40322, CVE-2025-40323, CVE-2025-40324,
CVE-2025-40328, CVE-2025-40329, CVE-2025-40331, CVE-2025-40333,
CVE-2025-40337, CVE-2025-40339, CVE-2025-40341, CVE-2025-40342,
CVE-2025-40343, CVE-2025-40345, CVE-2025-40346, CVE-2025-40347,
CVE-2025-40349, CVE-2025-40350, CVE-2025-40351, CVE-2025-40353,
CVE-2025-40358, CVE-2025-40360, CVE-2025-40363, CVE-2025-68168,
CVE-2025-68171, CVE-2025-68172, CVE-2025-68173, CVE-2025-68176,
CVE-2025-68177, CVE-2025-68178, CVE-2025-68179, CVE-2025-68180,
CVE-2025-68183, CVE-2025-68184, CVE-2025-68185, CVE-2025-68190,
CVE-2025-68191, CVE-2025-68192, CVE-2025-68194, CVE-2025-68198,
CVE-2025-68200, CVE-2025-68201, CVE-2025-68204, CVE-2025-68208,
CVE-2025-68213, CVE-2025-68214, CVE-2025-68217, CVE-2025-68218,
CVE-2025-68219, CVE-2025-68220, CVE-2025-68222, CVE-2025-68223,
CVE-2025-68227, CVE-2025-68229, CVE-2025-68231, CVE-2025-68233,
CVE-2025-68235, CVE-2025-68237, CVE-2025-68238, CVE-2025-68241,
CVE-2025-68244, CVE-2025-68245, CVE-2025-68246, CVE-2025-68249,
CVE-2025-68282, CVE-2025-68283, CVE-2025-68284, CVE-2025-68285,
CVE-2025-68286, CVE-2025-68287, CVE-2025-68288, CVE-2025-68289,
CVE-2025-68290, CVE-2025-68295, CVE-2025-68297, CVE-2025-68301,
CVE-2025-68302, CVE-2025-68303, CVE-2025-68305, CVE-2025-68307,
CVE-2025-68308, CVE-2025-68310, CVE-2025-68311, CVE-2025-68312,
CVE-2025-68313, CVE-2025-68315, CVE-2025-68320, CVE-2025-68321,
CVE-2025-68322, CVE-2025-68327, CVE-2025-68328, CVE-2025-68330,
CVE-2025-68331, CVE-2025-68339, CVE-2025-68340, CVE-2025-68342,
CVE-2025-68343, CVE-2025-68734)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
linux-image-6.8.0-1051-azure 6.8.0-1051.57
linux-image-azure-6.8 6.8.0-1051.57
linux-image-azure-lts-24.04 6.8.0-1051.57

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-8125-1
https://launchpad.net/bugs/2143853
CVE-2025-21833, CVE-2025-22037, CVE-2025-22103, CVE-2025-22105,
CVE-2025-22106, CVE-2025-22107, CVE-2025-22113, CVE-2025-22121,
CVE-2025-22124, CVE-2025-22125, CVE-2025-23129, CVE-2025-23130,
CVE-2025-23133, CVE-2025-23143, CVE-2025-37860, CVE-2025-37899,
CVE-2025-38105, CVE-2025-38502, CVE-2025-38556, CVE-2025-38627,
CVE-2025-38643, CVE-2025-38709, CVE-2025-39678, CVE-2025-39697,
CVE-2025-39805, CVE-2025-39806, CVE-2025-39807, CVE-2025-39808,
CVE-2025-39810, CVE-2025-39811, CVE-2025-39812, CVE-2025-39813,
CVE-2025-39815, CVE-2025-39817, CVE-2025-39819, CVE-2025-39823,
CVE-2025-39824, CVE-2025-39825, CVE-2025-39826, CVE-2025-39827,
CVE-2025-39828, CVE-2025-39829, CVE-2025-39832, CVE-2025-39835,
CVE-2025-39836, CVE-2025-39838, CVE-2025-39839, CVE-2025-39841,
CVE-2025-39842, CVE-2025-39843, CVE-2025-39844, CVE-2025-39845,
CVE-2025-39846, CVE-2025-39847, CVE-2025-39848, CVE-2025-39849,
CVE-2025-39850, CVE-2025-39851, CVE-2025-39852, CVE-2025-39853,
CVE-2025-39854, CVE-2025-39857, CVE-2025-39860, CVE-2025-39861,
CVE-2025-39863, CVE-2025-39864, CVE-2025-39865, CVE-2025-39866,
CVE-2025-39869, CVE-2025-39870, CVE-2025-39871, CVE-2025-39873,
CVE-2025-39876, CVE-2025-39877, CVE-2025-39880, CVE-2025-39881,
CVE-2025-39883, CVE-2025-39885, CVE-2025-39886, CVE-2025-39891,
CVE-2025-39894, CVE-2025-39895, CVE-2025-39897, CVE-2025-39899,
CVE-2025-39901, CVE-2025-39902, CVE-2025-39907, CVE-2025-39909,
CVE-2025-39911, CVE-2025-39913, CVE-2025-39914, CVE-2025-39916,
CVE-2025-39920, CVE-2025-39923, CVE-2025-39927, CVE-2025-39929,
CVE-2025-39931, CVE-2025-39932, CVE-2025-39934, CVE-2025-39937,
CVE-2025-39938, CVE-2025-39940, CVE-2025-39942, CVE-2025-39943,
CVE-2025-39944, CVE-2025-39945, CVE-2025-39947, CVE-2025-39948,
CVE-2025-39949, CVE-2025-39950, CVE-2025-39951, CVE-2025-39952,
CVE-2025-39953, CVE-2025-39955, CVE-2025-39957, CVE-2025-39961,
CVE-2025-39965, CVE-2025-39967, CVE-2025-39968, CVE-2025-39969,
CVE-2025-39970, CVE-2025-39971, CVE-2025-39972, CVE-2025-39973,
CVE-2025-39977, CVE-2025-39978, CVE-2025-39980, CVE-2025-39981,
CVE-2025-39982, CVE-2025-39985, CVE-2025-39986, CVE-2025-39987,
CVE-2025-39988, CVE-2025-39991, CVE-2025-39992, CVE-2025-39994,
CVE-2025-39995, CVE-2025-39996, CVE-2025-39998, CVE-2025-40000,
CVE-2025-40001, CVE-2025-40006, CVE-2025-40008, CVE-2025-40009,
CVE-2025-40010, CVE-2025-40011, CVE-2025-40013, CVE-2025-40016,
CVE-2025-40020, CVE-2025-40021, CVE-2025-40024, CVE-2025-40026,
CVE-2025-40027, CVE-2025-40029, CVE-2025-40030, CVE-2025-40031,
CVE-2025-40032, CVE-2025-40033, CVE-2025-40035, CVE-2025-40036,
CVE-2025-40037, CVE-2025-40038, CVE-2025-40042, CVE-2025-40043,
CVE-2025-40044, CVE-2025-40047, CVE-2025-40048, CVE-2025-40049,
CVE-2025-40051, CVE-2025-40052, CVE-2025-40053, CVE-2025-40055,
CVE-2025-40056, CVE-2025-40057, CVE-2025-40058, CVE-2025-40059,
CVE-2025-40060, CVE-2025-40061, CVE-2025-40062, CVE-2025-40067,
CVE-2025-40068, CVE-2025-40070, CVE-2025-40071, CVE-2025-40077,
CVE-2025-40078, CVE-2025-40079, CVE-2025-40080, CVE-2025-40081,
CVE-2025-40083, CVE-2025-40084, CVE-2025-40085, CVE-2025-40087,
CVE-2025-40088, CVE-2025-40092, CVE-2025-40093, CVE-2025-40094,
CVE-2025-40095, CVE-2025-40096, CVE-2025-40099, CVE-2025-40100,
CVE-2025-40101, CVE-2025-40103, CVE-2025-40104, CVE-2025-40105,
CVE-2025-40106, CVE-2025-40107, CVE-2025-40109, CVE-2025-40110,
CVE-2025-40111, CVE-2025-40112, CVE-2025-40115, CVE-2025-40116,
CVE-2025-40118, CVE-2025-40120, CVE-2025-40121, CVE-2025-40123,
CVE-2025-40124, CVE-2025-40125, CVE-2025-40126, CVE-2025-40127,
CVE-2025-40129, CVE-2025-40134, CVE-2025-40137, CVE-2025-40140,
CVE-2025-40141, CVE-2025-40153, CVE-2025-40154, CVE-2025-40155,
CVE-2025-40156, CVE-2025-40159, CVE-2025-40160, CVE-2025-40165,
CVE-2025-40166, CVE-2025-40167, CVE-2025-40169, CVE-2025-40171,
CVE-2025-40172, CVE-2025-40173, CVE-2025-40176, CVE-2025-40178,
CVE-2025-40179, CVE-2025-40180, CVE-2025-40183, CVE-2025-40187,
CVE-2025-40188, CVE-2025-40192, CVE-2025-40193, CVE-2025-40194,
CVE-2025-40196, CVE-2025-40198, CVE-2025-40200, CVE-2025-40201,
CVE-2025-40202, CVE-2025-40204, CVE-2025-40205, CVE-2025-40206,
CVE-2025-40207, CVE-2025-40211, CVE-2025-40218, CVE-2025-40219,
CVE-2025-40220, CVE-2025-40221, CVE-2025-40223, CVE-2025-40226,
CVE-2025-40231, CVE-2025-40233, CVE-2025-40235, CVE-2025-40237,
CVE-2025-40238, CVE-2025-40240, CVE-2025-40242, CVE-2025-40243,
CVE-2025-40244, CVE-2025-40245, CVE-2025-40248, CVE-2025-40250,
CVE-2025-40251, CVE-2025-40252, CVE-2025-40253, CVE-2025-40254,
CVE-2025-40257, CVE-2025-40258, CVE-2025-40259, CVE-2025-40261,
CVE-2025-40262, CVE-2025-40263, CVE-2025-40264, CVE-2025-40266,
CVE-2025-40268, CVE-2025-40269, CVE-2025-40271, CVE-2025-40272,
CVE-2025-40273, CVE-2025-40275, CVE-2025-40277, CVE-2025-40278,
CVE-2025-40279, CVE-2025-40280, CVE-2025-40281, CVE-2025-40282,
CVE-2025-40283, CVE-2025-40284, CVE-2025-40285, CVE-2025-40286,
CVE-2025-40287, CVE-2025-40288, CVE-2025-40289, CVE-2025-40292,
CVE-2025-40293, CVE-2025-40294, CVE-2025-40301, CVE-2025-40303,
CVE-2025-40304, CVE-2025-40305, CVE-2025-40306, CVE-2025-40307,
CVE-2025-40308, CVE-2025-40309, CVE-2025-40310, CVE-2025-40311,
CVE-2025-40312, CVE-2025-40313, CVE-2025-40314, CVE-2025-40315,
CVE-2025-40317, CVE-2025-40318, CVE-2025-40319, CVE-2025-40320,
CVE-2025-40321, CVE-2025-40322, CVE-2025-40323, CVE-2025-40324,
CVE-2025-40328, CVE-2025-40329, CVE-2025-40331, CVE-2025-40333,
CVE-2025-40337, CVE-2025-40339, CVE-2025-40341, CVE-2025-40342,
CVE-2025-40343, CVE-2025-40345, CVE-2025-40346, CVE-2025-40347,
CVE-2025-40349, CVE-2025-40350, CVE-2025-40351, CVE-2025-40353,
CVE-2025-40358, CVE-2025-40360, CVE-2025-40363, CVE-2025-68168,
CVE-2025-68171, CVE-2025-68172, CVE-2025-68173, CVE-2025-68176,
CVE-2025-68177, CVE-2025-68178, CVE-2025-68179, CVE-2025-68180,
CVE-2025-68183, CVE-2025-68184, CVE-2025-68185, CVE-2025-68190,
CVE-2025-68191, CVE-2025-68192, CVE-2025-68194, CVE-2025-68198,
CVE-2025-68200, CVE-2025-68201, CVE-2025-68204, CVE-2025-68208,
CVE-2025-68213, CVE-2025-68214, CVE-2025-68217, CVE-2025-68218,
CVE-2025-68219, CVE-2025-68220, CVE-2025-68222, CVE-2025-68223,
CVE-2025-68227, CVE-2025-68229, CVE-2025-68231, CVE-2025-68233,
CVE-2025-68235, CVE-2025-68237, CVE-2025-68238, CVE-2025-68241,
CVE-2025-68244, CVE-2025-68245, CVE-2025-68246, CVE-2025-68249,
CVE-2025-68282, CVE-2025-68283, CVE-2025-68284, CVE-2025-68285,
CVE-2025-68286, CVE-2025-68287, CVE-2025-68288, CVE-2025-68289,
CVE-2025-68290, CVE-2025-68295, CVE-2025-68297, CVE-2025-68301,
CVE-2025-68302, CVE-2025-68303, CVE-2025-68305, CVE-2025-68307,
CVE-2025-68308, CVE-2025-68310, CVE-2025-68311, CVE-2025-68312,
CVE-2025-68313, CVE-2025-68315, CVE-2025-68320, CVE-2025-68321,
CVE-2025-68322, CVE-2025-68327, CVE-2025-68328, CVE-2025-68330,
CVE-2025-68331, CVE-2025-68339, CVE-2025-68340, CVE-2025-68342,
CVE-2025-68343, CVE-2025-68734

Package Information:
https://launchpad.net/ubuntu/+source/linux-azure/6.8.0-1051.57