Thursday, March 12, 2026

[USN-8088-1] go-git vulnerabilities

==========================================================================
Ubuntu Security Notice USN-8088-1
March 12, 2026

golang-github-go-git-go-git vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in go-git.

Software Description:
- golang-github-go-git-go-git: A highly extensible Git implementation in pure Go

Details:

Ionut Lalu discovered that go-git incorrectly handled certain specially
crafted Git server responses. An attacker could possibly use this issue to
cause a denial of service. (CVE-2023-49568, CVE-2025-21614)

Ionut Lalu discovered that go-git incorrectly handled file system paths
when using the ChrootOS implementation. A remote attacker could possibly
use this issue to perform a path traversal and create or modify arbitrary
files, leading to remote code execution. (CVE-2023-49569)

It was discovered that go-git did not properly sanitize arguments when
invoking git-upload-pack using the file transport protocol. An attacker
could possibly use this issue to inject arbitrary flag values when
interacting with local Git repositories. (CVE-2025-21613)

It was discovered that go-git did not properly verify integrity checks for
pack and index files. An attacker could possibly use this issue to cause
go-git to process corrupted repository data, resulting in unexpected errors
or an incorrect repository state. (CVE-2026-25934)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
go-git 5.4.2-4ubuntu0.24.04.3+esm2
Available with Ubuntu Pro
golang-github-go-git-go-git-dev 5.4.2-4ubuntu0.24.04.3+esm2
Available with Ubuntu Pro

Ubuntu 22.04 LTS
go-git 5.4.2-3ubuntu0.1~esm1
Available with Ubuntu Pro
golang-github-go-git-go-git-dev 5.4.2-3ubuntu0.1~esm1
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8088-1
CVE-2023-49568, CVE-2023-49569, CVE-2025-21613, CVE-2025-21614,
CVE-2026-25934

[USN-8087-1] python-cryptography vulnerability

==========================================================================
Ubuntu Security Notice USN-8087-1
March 12, 2026

python-cryptography vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

python-cryptography could be made to expose sensitive information over the
network.

Software Description:
- python-cryptography: Cryptography Python library

Details:

It was discovered that python-cryptography incorrectly handled subgroup
validation for SECT curves. A remote attacker could use this issue to
perform a subgroup attack and possibly recover the least significant bits
of private keys.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.10
python3-cryptography 43.0.0-1ubuntu1.1

Ubuntu 24.04 LTS
python3-cryptography 41.0.7-4ubuntu0.3

Ubuntu 22.04 LTS
python3-cryptography 3.4.8-1ubuntu2.3

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8087-1
CVE-2026-26007

Package Information:
https://launchpad.net/ubuntu/+source/python-cryptography/43.0.0-1ubuntu1.1
https://launchpad.net/ubuntu/+source/python-cryptography/41.0.7-4ubuntu0.3
https://launchpad.net/ubuntu/+source/python-cryptography/3.4.8-1ubuntu2.3

[USN-8085-1] .NET vulnerabilities

==========================================================================
Ubuntu Security Notice USN-8085-1
March 11, 2026

dotnet8, dotnet9, dotnet10 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in .NET.

Software Description:
- dotnet10: .NET CLI tools and runtime
- dotnet8: .NET CLI tools and runtime
- dotnet9: .NET CLI tools and runtime

Details:

It was discovered that the .NET Microsoft.Bcl.Memory NuGet package did not
properly handle certain malformed Base64Url encoded input. An attacker could
possibly use this issue to cause .NET to crash, resulting in a denial of
service. This issue only affected .NET 9.0 and .NET 10.0. (CVE-2026-26127)

Bartłomiej Dach discovered that .NET's SignalR server component did not
properly manage resource consumption when processing certain messages. An
attacker could possibly use this issue to exhaust internal buffers, resulting
in a denial of service. (CVE-2026-26130)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.10
aspnetcore-runtime-10.0 10.0.4-0ubuntu1~25.10.1
aspnetcore-runtime-8.0 8.0.25-0ubuntu1~25.10.1
aspnetcore-runtime-9.0 9.0.14-0ubuntu1~25.10.1
dotnet-host-10.0 10.0.4-0ubuntu1~25.10.1
dotnet-host-8.0 8.0.25-0ubuntu1~25.10.1
dotnet-host-9.0 9.0.14-0ubuntu1~25.10.1
dotnet-hostfxr-10.0 10.0.4-0ubuntu1~25.10.1
dotnet-hostfxr-8.0 8.0.25-0ubuntu1~25.10.1
dotnet-hostfxr-9.0 9.0.14-0ubuntu1~25.10.1
dotnet-runtime-10.0 10.0.4-0ubuntu1~25.10.1
dotnet-runtime-8.0 8.0.25-0ubuntu1~25.10.1
dotnet-runtime-9.0 9.0.14-0ubuntu1~25.10.1
dotnet-sdk-10.0 10.0.104-0ubuntu1~25.10.1
dotnet-sdk-8.0 8.0.125-0ubuntu1~25.10.1
dotnet-sdk-9.0 9.0.115-0ubuntu1~25.10.1
dotnet-sdk-aot-10.0 10.0.104-0ubuntu1~25.10.1
dotnet-sdk-aot-9.0 9.0.115-0ubuntu1~25.10.1
dotnet10 10.0.104-10.0.4-0ubuntu1~25.10.1
dotnet8 8.0.125-8.0.25-0ubuntu1~25.10.1
dotnet9 9.0.115-9.0.14-0ubuntu1~25.10.1

Ubuntu 24.04 LTS
aspnetcore-runtime-10.0 10.0.4-0ubuntu1~24.04.1
aspnetcore-runtime-8.0 8.0.25-0ubuntu1~24.04.1
dotnet-host-10.0 10.0.4-0ubuntu1~24.04.1
dotnet-host-8.0 8.0.25-0ubuntu1~24.04.1
dotnet-hostfxr-10.0 10.0.4-0ubuntu1~24.04.1
dotnet-hostfxr-8.0 8.0.25-0ubuntu1~24.04.1
dotnet-runtime-10.0 10.0.4-0ubuntu1~24.04.1
dotnet-runtime-8.0 8.0.25-0ubuntu1~24.04.1
dotnet-sdk-10.0 10.0.104-0ubuntu1~24.04.1
dotnet-sdk-8.0 8.0.125-0ubuntu1~24.04.1
dotnet-sdk-aot-10.0 10.0.104-0ubuntu1~24.04.1
dotnet10 10.0.104-10.0.4-0ubuntu1~24.04.1
dotnet8 8.0.125-8.0.25-0ubuntu1~24.04.1

Ubuntu 22.04 LTS
aspnetcore-runtime-8.0 8.0.25-0ubuntu1~22.04.1
dotnet-host-8.0 8.0.25-0ubuntu1~22.04.1
dotnet-hostfxr-8.0 8.0.25-0ubuntu1~22.04.1
dotnet-runtime-8.0 8.0.25-0ubuntu1~22.04.1
dotnet-sdk-8.0 8.0.125-0ubuntu1~22.04.1
dotnet8 8.0.125-8.0.25-0ubuntu1~22.04.1

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8085-1
CVE-2026-26127, CVE-2026-26130

Package Information:
https://launchpad.net/ubuntu/+source/dotnet10/10.0.104-10.0.4-0ubuntu1~25.10.1
https://launchpad.net/ubuntu/+source/dotnet8/8.0.125-8.0.25-0ubuntu1~25.10.1
https://launchpad.net/ubuntu/+source/dotnet9/9.0.115-9.0.14-0ubuntu1~25.10.1
https://launchpad.net/ubuntu/+source/dotnet10/10.0.104-10.0.4-0ubuntu1~24.04.1
https://launchpad.net/ubuntu/+source/dotnet8/8.0.125-8.0.25-0ubuntu1~24.04.1
https://launchpad.net/ubuntu/+source/dotnet8/8.0.125-8.0.25-0ubuntu1~22.04.1

[USN-8081-1] libpng vulnerabilities

==========================================================================
Ubuntu Security Notice USN-8081-1
March 11, 2026

libpng vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in libpng.

Software Description:
- libpng: PNG (Portable Network Graphics) file library

Details:

It was discovered that libpng did not properly handle memory when processing
certain PNG files. An attacker could possibly use this issue to cause libpng
to crash, resulting in a denial of service, or disclose sensitive information.
(CVE-2025-64505)

Joshua Inscoe discovered that libpng did not properly handle memory when
processing certain PNG files. An attacker could possibly use this issue
to cause libpng to crash, resulting in a denial of service, disclose sensitive
information, or execute arbitrary code. (CVE-2026-25646)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 LTS
libpng12-0 1.2.54-1ubuntu1.1+esm2
Available with Ubuntu Pro

Ubuntu 14.04 LTS
libpng12-0 1.2.50-1ubuntu2.14.04.3+esm1
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8081-1
CVE-2025-64505, CVE-2026-25646

[USN-8082-1] GIMP vulnerabilities

==========================================================================
Ubuntu Security Notice USN-8082-1
March 10, 2026

gimp vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in GIMP.

Software Description:
- gimp: GNU Image Manipulation Program

Details:

Michael Randrianantenaina discovered that GIMP incorrectly handled certain
malformed ICO files. An attacker could possibly use this to cause a denial
of service or execute arbitrary code. (CVE-2025-5473)

Seungho Kim discovered that GIMP incorrectly handled certain memory
operations when running the despeckle plugin. An attacker could possibly
use this to cause a denial of service or execute arbitrary code.
(CVE-2025-6035)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
gimp 2.10.36-3ubuntu0.24.04.1+esm3
Available with Ubuntu Pro
libgimp2.0t64 2.10.36-3ubuntu0.24.04.1+esm3
Available with Ubuntu Pro

Ubuntu 22.04 LTS
gimp 2.10.30-1ubuntu0.1+esm3
Available with Ubuntu Pro
libgimp2.0 2.10.30-1ubuntu0.1+esm3
Available with Ubuntu Pro

Ubuntu 20.04 LTS
gimp 2.10.18-1ubuntu0.1+esm3
Available with Ubuntu Pro
libgimp2.0 2.10.18-1ubuntu0.1+esm3
Available with Ubuntu Pro

Ubuntu 18.04 LTS
gimp 2.8.22-1ubuntu0.1~esm3
Available with Ubuntu Pro
libgimp2.0 2.8.22-1ubuntu0.1~esm3
Available with Ubuntu Pro

Ubuntu 16.04 LTS
gimp 2.8.16-1ubuntu1.1+esm3
Available with Ubuntu Pro
libgimp2.0 2.8.16-1ubuntu1.1+esm3
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8082-1
CVE-2025-5473, CVE-2025-6035

Wednesday, March 11, 2026

[USN-8084-1] curl vulnerabilities

==========================================================================
Ubuntu Security Notice USN-8084-1
March 11, 2026

curl vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in curl.

Software Description:
- curl: HTTP, HTTPS, and FTP client and client libraries

Details:

Zhicheng Chen discovered that curl could incorrectly reuse the wrong
connection for Negotiate-authenticated HTTP or HTTPS requests. This could
result in the use of credentials from a different connection, contrary to
expectations. (CVE-2026-1965)

It was discovered that curl incorrectly leaked OAuth2 bearer tokens when
following a redirect. This could result in tokens being sent to the wrong
host, contrary to expectations. (CVE-2026-3783)

Muhamad Arga Reksapati discovered that curl incorrectly reused existing
HTTP proxy connections even if the request used different credentials. This
could result in the use of incorrect credentials, contrary to expectations.
(CVE-2026-3784)

Daniel Wade discovered that curl incorrectly handled certain memory
operations when doing a second SMB request to the same host. An attacker
could use this issue to cause curl to crash, resulting in a denial of
service, or possibly execute arbitrary code. This issue only affected
Ubuntu 25.10. (CVE-2026-3805)

Yihang Zhou discovered that curl incorrectly reused .netrc file credentials
when following redirects. This could result in the use of credentials for
a different host, contrary to expectations. This issue only affected Ubuntu
22.04 LTS and Ubuntu 24.04 LTS. (CVE-2025-0167)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.10
curl 8.14.1-2ubuntu1.2
libcurl3t64-gnutls 8.14.1-2ubuntu1.2
libcurl4t64 8.14.1-2ubuntu1.2

Ubuntu 24.04 LTS
curl 8.5.0-2ubuntu10.8
libcurl3t64-gnutls 8.5.0-2ubuntu10.8
libcurl4t64 8.5.0-2ubuntu10.8

Ubuntu 22.04 LTS
curl 7.81.0-1ubuntu1.23
libcurl3-gnutls 7.81.0-1ubuntu1.23
libcurl3-nss 7.81.0-1ubuntu1.23
libcurl4 7.81.0-1ubuntu1.23

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8084-1
CVE-2025-0167, CVE-2026-1965, CVE-2026-3783, CVE-2026-3784,
CVE-2026-3805

Package Information:
https://launchpad.net/ubuntu/+source/curl/8.14.1-2ubuntu1.2
https://launchpad.net/ubuntu/+source/curl/8.5.0-2ubuntu10.8
https://launchpad.net/ubuntu/+source/curl/7.81.0-1ubuntu1.23

[USN-8083-1] GeoPandas vulnerability

==========================================================================
Ubuntu Security Notice USN-8083-1
March 11, 2026

python-geopandas vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

GeoPandas could be vulnerable to SQL injection attacks.

Software Description:
- python-geopandas: Python3 tools for geographic data

Details:

It was discovered that GeoPandas incorrectly handled certain input. An
attacker could possibly use this issue to perform SQL injection attacks.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.10
python3-geopandas 1.0.1-2ubuntu0.1

Ubuntu 24.04 LTS
python3-geopandas 0.14.3-2ubuntu0.1

Ubuntu 22.04 LTS
python3-geopandas 0.10.2-1ubuntu0.1

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8083-1
CVE-2025-69662

Package Information:
https://launchpad.net/ubuntu/+source/python-geopandas/1.0.1-2ubuntu0.1
https://launchpad.net/ubuntu/+source/python-geopandas/0.14.3-2ubuntu0.1
https://launchpad.net/ubuntu/+source/python-geopandas/0.10.2-1ubuntu0.1

Tuesday, March 10, 2026

OpenBSD Errata: March 10, 2026 (freetype calendar)

Errata patches for FreeType library have been released for OpenBSD
7.7 and 7.8. The calendar binary was missing in a previous syspatch.


Binary updates for the amd64, arm64 and i386 platform are available
via the syspatch utility. Source code patches can be found on the
respective errata page:

https://www.openbsd.org/errata77.html
https://www.openbsd.org/errata78.html

F45 Change Proposal: UseSystemdForManagingPerUserEnvironmentVariables [SelfContained]

Wiki: https://fedoraproject.org/wiki/Changes/UseSystemdForManagingPerUserEnvironmentVariables

Discussion Thread: https://discussion.fedoraproject.org/t/182885

**This is a proposed Change for Fedora Linux.**
This document represents a proposed Change. As part of the Changes process, proposals are publicly announced in order to receive community feedback. This proposal will only be implemented if approved by the Fedora Engineering Steering Committee.

== Summary ==

Rely on `systemd`'s `systemd.environment-generator` functionality for managing per-user environment variables (such as appending `~/local/.bin` and `~/bin` to an user's `$PATH`) instead of individual shellrc scripts (`~/.bashrc`, `~/.zshrc` etc).

== Owner ==

* Name: [[User:Faeizmahrus| Faeiz Mahrus]]
* Email: faeizmahrus@proton.me, me@faeizmahrus.bd

== Detailed Description ==

Currently, Fedora relies on shellrc scripts (`~/.bashrc`, `~/.zshrc` files) for modifying an user's environment variables. <br/>

An example of such a case is appending `~/.local/bin` and `~/bin` directories to $PATH <br/>

Such shellrc scripts have only been packaged for the `bash` and `zsh` shells. (`rpm -ql /etc/skel/{.bashrc,.zshrc}` returns packages `bash` and `zsh`) <br/>

However, Fedora Linux also offers several alternative shells such as `fish`, nushell (`nu`), `xonsh`, `dash` etc, for which shellrc scripts have not been packaged. <br/>

This leads to a situation where an user might change their login shell and be unable to directly launch scripts and programs stored in `~/.local/bin` and `~/bin`

`systemd` provides a mechanism for applying environment variables to all user processes via `systemd.environment-generator`. <br/>

Creating simple drop-in file(s) in the `/etc/skel/.config/environment.d/` directory is a simpler and much cleaner way for both managing environment variables for an user and for mitigating the `$PATH` environment variable propagation issue for alternative shells. <br/>

Although out of scope for this specific proposal, the broader goal will be to ultimately move as much cruft possible out of shellrc scripts scattered across the filesystem at different places and `/etc/profile` into `environment-generators`

== Feedback ==

Will be updated later.

== Benefit to Fedora ==

This change simplifies per-user environment variable propagation and makes environment variable changes independant of an user's default shell.

== Scope ==

* Proposal owners:
Modify the `/etc/skel/.*rc` files located in the `bash` and `zsh` packages, modifying them to either remove any environment variable modification parts or splitting those parts into separate subpackages.

Search for any other packages that also modify environemt variables by shellrc scripts.
* Other developers:
Coordinate with the respective package maintainers.
* Release engineering: [https://forge.fedoraproject.org/releng/tickets/issues #Releng issue number]
Most likely no.
* Policies and guidelines: N/A (not needed for this Change)
* Trademark approval: N/A (not needed for this Change)
* Alignment with the Fedora Strategy:

== Upgrade/compatibility impact ==

None.

== Early Testing (Optional) ==

Do you require 'QA Blueprint' support? N

== How To Test ==

Will be added later.

== User Experience ==

Cleaner shellrc files will ease management for users.

== Dependencies ==

Will be updated later.

== Contingency Plan ==

* Contingency mechanism: (What to do?  Who will do it?)
Revert the change. (not a System Wide Change)
* Contingency deadline: Beta freeze (not a System Wide Change)
* Blocks release? N/A (not a System Wide Change), Yes/No

== Documentation ==

N/A (not a System Wide Change)

== Release Notes ==

\nMoved per-user environment variable handling to `systemd.environment-generator`\n

[USN-8060-7] Linux kernel (NVIDIA) vulnerabilities

==========================================================================
Ubuntu Security Notice USN-8060-7
March 10, 2026

linux-nvidia vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-nvidia: Linux kernel for NVIDIA systems

Details:

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- GPU drivers;
- MMC subsystem;
(CVE-2022-49267, CVE-2025-21780)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS
linux-image-5.15.0-1096-nvidia 5.15.0-1096.97
linux-image-5.15.0-1096-nvidia-lowlatency 5.15.0-1096.97
linux-image-nvidia 5.15.0.1096.96
linux-image-nvidia-5.15 5.15.0.1096.96
linux-image-nvidia-lowlatency 5.15.0.1096.96
linux-image-nvidia-lowlatency-5.15 5.15.0.1096.96

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-8060-7
https://ubuntu.com/security/notices/USN-8060-6
https://ubuntu.com/security/notices/USN-8060-5
https://ubuntu.com/security/notices/USN-8060-4
https://ubuntu.com/security/notices/USN-8060-3
https://ubuntu.com/security/notices/USN-8060-2
https://ubuntu.com/security/notices/USN-8060-1
CVE-2022-49267, CVE-2025-21780

Package Information:
https://launchpad.net/ubuntu/+source/linux-nvidia/5.15.0-1096.97

[USN-8059-8] Linux kernel (NVIDIA) vulnerabilities

==========================================================================
Ubuntu Security Notice USN-8059-8
March 10, 2026

linux-nvidia, linux-nvidia-6.8, linux-nvidia-lowlatency vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-nvidia: Linux kernel for NVIDIA systems
- linux-nvidia-lowlatency: Linux low latency kernel for NVIDIA systems
- linux-nvidia-6.8: Linux kernel for NVIDIA systems

Details:

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- SMB network file system;
(CVE-2025-22037, CVE-2025-37899)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
linux-image-6.8.0-1047-nvidia 6.8.0-1047.50
linux-image-6.8.0-1047-nvidia-64k 6.8.0-1047.50
linux-image-6.8.0-1047-nvidia-lowlatency 6.8.0-1047.50.1
linux-image-6.8.0-1047-nvidia-lowlatency-64k 6.8.0-1047.50.1
linux-image-nvidia 6.8.0-1047.50
linux-image-nvidia-6.8 6.8.0-1047.50
linux-image-nvidia-64k 6.8.0-1047.50
linux-image-nvidia-64k-6.8 6.8.0-1047.50
linux-image-nvidia-lowlatency 6.8.0-1047.50.1
linux-image-nvidia-lowlatency-6.8 6.8.0-1047.50.1
linux-image-nvidia-lowlatency-64k 6.8.0-1047.50.1
linux-image-nvidia-lowlatency-64k-6.8 6.8.0-1047.50.1

Ubuntu 22.04 LTS
linux-image-6.8.0-1047-nvidia 6.8.0-1047.50~22.04.1
linux-image-6.8.0-1047-nvidia-64k 6.8.0-1047.50~22.04.1
linux-image-nvidia-6.8 6.8.0-1047.50~22.04.1
linux-image-nvidia-64k-6.8 6.8.0-1047.50~22.04.1
linux-image-nvidia-64k-hwe-22.04 6.8.0-1047.50~22.04.1
linux-image-nvidia-hwe-22.04 6.8.0-1047.50~22.04.1

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-8059-8
https://ubuntu.com/security/notices/USN-8059-7
https://ubuntu.com/security/notices/USN-8059-6
https://ubuntu.com/security/notices/USN-8059-5
https://ubuntu.com/security/notices/USN-8059-4
https://ubuntu.com/security/notices/USN-8059-3
https://ubuntu.com/security/notices/USN-8059-2
https://ubuntu.com/security/notices/USN-8059-1
CVE-2025-22037, CVE-2025-37899

Package Information:
https://launchpad.net/ubuntu/+source/linux-nvidia/6.8.0-1047.50
https://launchpad.net/ubuntu/+source/linux-nvidia-lowlatency/6.8.0-1047.50.1
https://launchpad.net/ubuntu/+source/linux-nvidia-6.8/6.8.0-1047.50~22.04.1

Fedora Linux 44 Beta Released

The Fedora Project is pleased to announce the immediate availability of
Fedora Linux 44 Beta, the next step towards our planned Fedora Linux 44
release in April.

Download the prerelease from our Get Fedora site:

* Get Fedora Linux 44 Beta Workstation:
https://fedoraproject.org/workstation/download?beta
* Get Fedora Linux 44 Beta Server:
https://fedoraproject.org/server/download?beta
* Get Fedora Linux 44 Beta IoT: https://fedoraproject.org/iot/download?beta
* Get Fedora Linux 44 Beta CoreOS:
https://fedoraproject.org/coreos/download?stream=stable
* Get Fedora Linux 44 Beta Cloud: https://fedoraproject.org/cloud/download?beta
* Get Fedora Linux 44 Beta KDE Plasma Desktop:
https://fedoraproject.org/kde/download?beta

Or, check out one of our popular variants, including Xfce, LXDE, COSMIC, i3,
and other desktop environments:

* Get Fedora Linux 44 Beta Spins: https://spins.fedoraproject.org?beta
* Get Fedora Linux 44 Beta Labs: https://labs.fedoraproject.org?beta

For more details about the release, read the full announcement at:

https://fedoramagazine.org/announcing-fedora-linux-44-beta/

or look for the prerelease pages in the download sections at:

https://fedoraproject.org/

Since this is a Beta release, we expect that you may encounter bugs or
missing features. To report issues encountered during testing, contact the
Fedora QA team via the test@lists.fedoraproject.org mailing list or in
the #qa:fedoraproject.org Matrix room.

Regards,

Anton Medvedev
Fedora Release Engineering