-----BEGIN PGP SIGNATURE-----
wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmmDsi8FAwAAAAAACgkQZ0GeRcM5nt0N
aQf/WO4sNDsZCLgK711qvBJj38FPeIDqa7mMIqTItltsVLOw3yjij6VAQdlom+4HAaqBQwPBT2Xz
Ce9rCz5vUvhVLb0JqSqonNvstfjIlY2dgE2eG3kj0fTxNtnX0fPTNPCMDwPYGmILEugMWZ6/1sfT
vDgKjg8QJvpoS80+SU5NGrfSCVXNs2aMkH9VhKT6D9GE10BmUPktJUC1Wf4AJapyoDyftzCGcfpQ
O+1pDNmL0YXWeAxfzNQtmC442fF14MmkcUmvdZkCt2hcv/Uk7kcUPNI3vlys+eQRje+o461jNneM
/EZyPa419ozfgzfucZQT8+E40NxfT3xwjw+5L3dNyg==
=8VUS
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-8016-1
February 04, 2026
linux-nvidia, linux-nvidia-6.8, linux-nvidia-lowlatency vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-nvidia: Linux kernel for NVIDIA systems
- linux-nvidia-lowlatency: Linux low latency kernel for NVIDIA systems
- linux-nvidia-6.8: Linux kernel for NVIDIA systems
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Cryptographic API;
- SPI subsystem;
- SMB network file system;
- io_uring subsystem;
(CVE-2025-38561, CVE-2025-39698, CVE-2025-40019, CVE-2025-68746)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
linux-image-6.8.0-1045-nvidia 6.8.0-1045.48
linux-image-6.8.0-1045-nvidia-64k 6.8.0-1045.48
linux-image-6.8.0-1045-nvidia-lowlatency 6.8.0-1045.48.1
linux-image-6.8.0-1045-nvidia-lowlatency-64k 6.8.0-1045.48.1
linux-image-nvidia 6.8.0-1045.48
linux-image-nvidia-6.8 6.8.0-1045.48
linux-image-nvidia-64k 6.8.0-1045.48
linux-image-nvidia-64k-6.8 6.8.0-1045.48
linux-image-nvidia-lowlatency 6.8.0-1045.48.1
linux-image-nvidia-lowlatency-6.8 6.8.0-1045.48.1
linux-image-nvidia-lowlatency-64k 6.8.0-1045.48.1
linux-image-nvidia-lowlatency-64k-6.8 6.8.0-1045.48.1
Ubuntu 22.04 LTS
linux-image-6.8.0-1045-nvidia 6.8.0-1045.48~22.04.1
linux-image-6.8.0-1045-nvidia-64k 6.8.0-1045.48~22.04.1
linux-image-nvidia-6.8 6.8.0-1045.48~22.04.1
linux-image-nvidia-64k-6.8 6.8.0-1045.48~22.04.1
linux-image-nvidia-64k-hwe-22.04 6.8.0-1045.48~22.04.1
linux-image-nvidia-hwe-22.04 6.8.0-1045.48~22.04.1
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-8016-1
CVE-2025-38561, CVE-2025-39698, CVE-2025-40019, CVE-2025-68746
Package Information:
https://launchpad.net/ubuntu/+source/linux-nvidia/6.8.0-1045.48
https://launchpad.net/ubuntu/+source/linux-nvidia-lowlatency/6.8.0-1045.48.1
https://launchpad.net/ubuntu/+source/linux-nvidia-6.8/6.8.0-1045.48~22.04.1
Wednesday, February 4, 2026
[USN-8015-2] Linux kernel (Real-time) vulnerabilities
-----BEGIN PGP SIGNATURE-----
wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmmDsh8FAwAAAAAACgkQZ0GeRcM5nt08
cQgAnKAsC66s4jVTGGSwbdDtmdab1BWh41Til6RM6JbWyQlBZLUCetk3I/TyjyKKiHOoEzcGwKVM
PvRavonkTSHzgAAMTJvay0IO67XfmGTC4ru79aiUK1IaV1RoGk+bc6x8soujYAQnVXMERA9ZRxTq
OsLH6j5DAStUmeE0PxDU2bZii3ZCvw+/YTx+qIxoOoDmfRsLBOxlSJlrPZDrbwe9jtmu5u/LA0rc
zRDxalOyWvL8PGBya7gw1tKJsW0QgYM4dRc4BGoTZLBW0cBPuFvl5lz28bmL9iUJoctJOdQWd1wA
KDk0xZJZMZ8exFRnJ6LNAk1yEio+dWFWPKxC0HKsEQ==
=Mp/+
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-8015-2
February 04, 2026
linux-realtime, linux-realtime-6.8, linux-raspi-realtime vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-raspi-realtime: Linux kernel for Raspberry Pi Real-time systems
- linux-realtime: Linux kernel for Real-time systems
- linux-realtime-6.8: Linux kernel for Real-time systems
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Cryptographic API;
- SMB network file system;
- io_uring subsystem;
(CVE-2025-38561, CVE-2025-39698, CVE-2025-40019)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
linux-image-6.8.0-2036-raspi-realtime 6.8.0-2036.37
Available with Ubuntu Pro
linux-image-6.8.1-1040-realtime 6.8.1-1040.41
Available with Ubuntu Pro
linux-image-intel-iot-realtime 6.8.1-1040.41
Available with Ubuntu Pro
linux-image-raspi-realtime 6.8.0-2036.37
Available with Ubuntu Pro
linux-image-raspi-realtime-6.8 6.8.0-2036.37
Available with Ubuntu Pro
linux-image-realtime 6.8.1-1040.41
Available with Ubuntu Pro
linux-image-realtime-6.8.1 6.8.1-1040.41
Available with Ubuntu Pro
Ubuntu 22.04 LTS
linux-image-6.8.1-1040-realtime 6.8.1-1040.41~22.04.1
Available with Ubuntu Pro
linux-image-realtime-6.8.1 6.8.1-1040.41~22.04.1
Available with Ubuntu Pro
linux-image-realtime-hwe-22.04 6.8.1-1040.41~22.04.1
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-8015-2
https://ubuntu.com/security/notices/USN-8015-1
CVE-2025-38561, CVE-2025-39698, CVE-2025-40019
Package Information:
https://launchpad.net/ubuntu/+source/linux-raspi-realtime/6.8.0-2036.37
https://launchpad.net/ubuntu/+source/linux-realtime/6.8.1-1040.41
https://launchpad.net/ubuntu/+source/linux-realtime-6.8/6.8.1-1040.41~22.04.1
wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmmDsh8FAwAAAAAACgkQZ0GeRcM5nt08
cQgAnKAsC66s4jVTGGSwbdDtmdab1BWh41Til6RM6JbWyQlBZLUCetk3I/TyjyKKiHOoEzcGwKVM
PvRavonkTSHzgAAMTJvay0IO67XfmGTC4ru79aiUK1IaV1RoGk+bc6x8soujYAQnVXMERA9ZRxTq
OsLH6j5DAStUmeE0PxDU2bZii3ZCvw+/YTx+qIxoOoDmfRsLBOxlSJlrPZDrbwe9jtmu5u/LA0rc
zRDxalOyWvL8PGBya7gw1tKJsW0QgYM4dRc4BGoTZLBW0cBPuFvl5lz28bmL9iUJoctJOdQWd1wA
KDk0xZJZMZ8exFRnJ6LNAk1yEio+dWFWPKxC0HKsEQ==
=Mp/+
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-8015-2
February 04, 2026
linux-realtime, linux-realtime-6.8, linux-raspi-realtime vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-raspi-realtime: Linux kernel for Raspberry Pi Real-time systems
- linux-realtime: Linux kernel for Real-time systems
- linux-realtime-6.8: Linux kernel for Real-time systems
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Cryptographic API;
- SMB network file system;
- io_uring subsystem;
(CVE-2025-38561, CVE-2025-39698, CVE-2025-40019)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
linux-image-6.8.0-2036-raspi-realtime 6.8.0-2036.37
Available with Ubuntu Pro
linux-image-6.8.1-1040-realtime 6.8.1-1040.41
Available with Ubuntu Pro
linux-image-intel-iot-realtime 6.8.1-1040.41
Available with Ubuntu Pro
linux-image-raspi-realtime 6.8.0-2036.37
Available with Ubuntu Pro
linux-image-raspi-realtime-6.8 6.8.0-2036.37
Available with Ubuntu Pro
linux-image-realtime 6.8.1-1040.41
Available with Ubuntu Pro
linux-image-realtime-6.8.1 6.8.1-1040.41
Available with Ubuntu Pro
Ubuntu 22.04 LTS
linux-image-6.8.1-1040-realtime 6.8.1-1040.41~22.04.1
Available with Ubuntu Pro
linux-image-realtime-6.8.1 6.8.1-1040.41~22.04.1
Available with Ubuntu Pro
linux-image-realtime-hwe-22.04 6.8.1-1040.41~22.04.1
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-8015-2
https://ubuntu.com/security/notices/USN-8015-1
CVE-2025-38561, CVE-2025-39698, CVE-2025-40019
Package Information:
https://launchpad.net/ubuntu/+source/linux-raspi-realtime/6.8.0-2036.37
https://launchpad.net/ubuntu/+source/linux-realtime/6.8.1-1040.41
https://launchpad.net/ubuntu/+source/linux-realtime-6.8/6.8.1-1040.41~22.04.1
[USN-8013-3] Linux kernel (Real-time) vulnerabilities
-----BEGIN PGP SIGNATURE-----
wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmmDsgEFAwAAAAAACgkQZ0GeRcM5nt2g
3gf8C6oAIH5/2ZH+e2H84C83xu/KvXLQayFQ3+gVmm24YBuG26MChcvi0HCd1Yv94CbjHrp00gOi
1rOzD6PDfI0AqbunLnc0KywCB8hxrxnIIyXFBy9Des74MbKtuqXR2sU3i78m0j5Dd6hD7mTUDKWu
zrGPZRCU3xDJAVbmtjgDmbOobKu01vi4IZx10cLGAWUZv1jO4qWMRsPmBksDsuRFTDEtNMoXJOIH
SgjI0ffL4uXZrhCTtrWypSDlmcRr9ec/oFiu1ivSG83oVknb1VIH25+mVL0j+AJZ3rsSMRoWJvEz
xpCMvZqQvWgzuGrwdgu0ABVv3VsJKGTOlQ8MHvUOYA==
=Uhlz
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-8013-3
February 04, 2026
linux-realtime, linux-intel-iot-realtime vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-intel-iot-realtime: Linux kernel for Intel IoT Real-time platforms
- linux-realtime: Linux kernel for Real-time systems
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Cryptographic API;
- SMB network file system;
(CVE-2025-38561, CVE-2025-40019)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS
linux-image-5.15.0-1091-intel-iot-realtime 5.15.0-1091.93
Available with Ubuntu Pro
linux-image-5.15.0-1098-realtime 5.15.0-1098.107
Available with Ubuntu Pro
linux-image-intel-iot-realtime 5.15.0.1091.95
Available with Ubuntu Pro
linux-image-intel-iot-realtime-5.15 5.15.0.1091.95
Available with Ubuntu Pro
linux-image-realtime 5.15.0.1098.102
Available with Ubuntu Pro
linux-image-realtime-5.15 5.15.0.1098.102
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-8013-3
https://ubuntu.com/security/notices/USN-8013-2
https://ubuntu.com/security/notices/USN-8013-1
CVE-2025-38561, CVE-2025-40019
Package Information:
https://launchpad.net/ubuntu/+source/linux-intel-iot-realtime/5.15.0-1091.93
https://launchpad.net/ubuntu/+source/linux-realtime/5.15.0-1098.107
wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmmDsgEFAwAAAAAACgkQZ0GeRcM5nt2g
3gf8C6oAIH5/2ZH+e2H84C83xu/KvXLQayFQ3+gVmm24YBuG26MChcvi0HCd1Yv94CbjHrp00gOi
1rOzD6PDfI0AqbunLnc0KywCB8hxrxnIIyXFBy9Des74MbKtuqXR2sU3i78m0j5Dd6hD7mTUDKWu
zrGPZRCU3xDJAVbmtjgDmbOobKu01vi4IZx10cLGAWUZv1jO4qWMRsPmBksDsuRFTDEtNMoXJOIH
SgjI0ffL4uXZrhCTtrWypSDlmcRr9ec/oFiu1ivSG83oVknb1VIH25+mVL0j+AJZ3rsSMRoWJvEz
xpCMvZqQvWgzuGrwdgu0ABVv3VsJKGTOlQ8MHvUOYA==
=Uhlz
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-8013-3
February 04, 2026
linux-realtime, linux-intel-iot-realtime vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-intel-iot-realtime: Linux kernel for Intel IoT Real-time platforms
- linux-realtime: Linux kernel for Real-time systems
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Cryptographic API;
- SMB network file system;
(CVE-2025-38561, CVE-2025-40019)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS
linux-image-5.15.0-1091-intel-iot-realtime 5.15.0-1091.93
Available with Ubuntu Pro
linux-image-5.15.0-1098-realtime 5.15.0-1098.107
Available with Ubuntu Pro
linux-image-intel-iot-realtime 5.15.0.1091.95
Available with Ubuntu Pro
linux-image-intel-iot-realtime-5.15 5.15.0.1091.95
Available with Ubuntu Pro
linux-image-realtime 5.15.0.1098.102
Available with Ubuntu Pro
linux-image-realtime-5.15 5.15.0.1098.102
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-8013-3
https://ubuntu.com/security/notices/USN-8013-2
https://ubuntu.com/security/notices/USN-8013-1
CVE-2025-38561, CVE-2025-40019
Package Information:
https://launchpad.net/ubuntu/+source/linux-intel-iot-realtime/5.15.0-1091.93
https://launchpad.net/ubuntu/+source/linux-realtime/5.15.0-1098.107
[USN-8013-2] Linux kernel (FIPS) vulnerabilities
-----BEGIN PGP SIGNATURE-----
wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmmDse0FAwAAAAAACgkQZ0GeRcM5nt1P
eQgAgpVpNM/3e9BDgJvmLKTHKAeOXF7EjAYJdZKcOPc1mhs4G0QOSX2rXuaQ+DNQU2+BP2Hriq1V
Trq2tvayq/+Dx3AuTBrhiAA4x+IYDGydBDQ1EcBIT6Qnql1YLSTm9hP5TUm2c2m6hPz2cOHOxoio
YEidK+FGHc3M/xbOravoP/8eCzjdSTole39G2RXLviPWm+Uk6xxHGjQ2xCjY7CSbpqGlF2vwwykw
fdo479CQtwUL/fVVa+P/C0s/foC20G1Y3qK89QHqsUvsZ9NT0b2ibBR/fKiIoS+2fycSvME9qNkS
AcKZwhmYgHkxjYymdN7UpQq1P6Ilinb+R1N+xtAhxw==
=0MWT
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-8013-2
February 04, 2026
linux-fips, linux-aws-fips, linux-azure-fips, linux-gcp-fips
vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-aws-fips: Linux kernel for Amazon Web Services (AWS) systems with FIPS
- linux-azure-fips: Linux kernel for Microsoft Azure Cloud systems with FIPS
- linux-fips: Linux kernel with FIPS
- linux-gcp-fips: Linux kernel for Google Cloud Platform (GCP) systems with
FIPS
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Cryptographic API;
- SMB network file system;
(CVE-2025-38561, CVE-2025-40019)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS
linux-image-5.15.0-1099-aws-fips 5.15.0-1099.106+fips1
Available with Ubuntu Pro
linux-image-5.15.0-1099-gcp-fips 5.15.0-1099.108+fips1
Available with Ubuntu Pro
linux-image-5.15.0-1103-azure-fips 5.15.0-1103.112+fips1
Available with Ubuntu Pro
linux-image-5.15.0-168-fips 5.15.0-168.178+fips1
Available with Ubuntu Pro
linux-image-aws-fips 5.15.0.1099.95
Available with Ubuntu Pro
linux-image-aws-fips-5.15 5.15.0.1099.95
Available with Ubuntu Pro
linux-image-azure-fips 5.15.0.1103.88
Available with Ubuntu Pro
linux-image-azure-fips-5.15 5.15.0.1103.88
Available with Ubuntu Pro
linux-image-fips 5.15.0.168.96
Available with Ubuntu Pro
linux-image-fips-5.15 5.15.0.168.96
Available with Ubuntu Pro
linux-image-gcp-fips 5.15.0.1099.89
Available with Ubuntu Pro
linux-image-gcp-fips-5.15 5.15.0.1099.89
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-8013-2
https://ubuntu.com/security/notices/USN-8013-1
CVE-2025-38561, CVE-2025-40019
Package Information:
https://launchpad.net/ubuntu/+source/linux-aws-fips/5.15.0-1099.106+fips1
https://launchpad.net/ubuntu/+source/linux-azure-fips/5.15.0-1103.112+fips1
https://launchpad.net/ubuntu/+source/linux-fips/5.15.0-168.178+fips1
https://launchpad.net/ubuntu/+source/linux-gcp-fips/5.15.0-1099.108+fips1
wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmmDse0FAwAAAAAACgkQZ0GeRcM5nt1P
eQgAgpVpNM/3e9BDgJvmLKTHKAeOXF7EjAYJdZKcOPc1mhs4G0QOSX2rXuaQ+DNQU2+BP2Hriq1V
Trq2tvayq/+Dx3AuTBrhiAA4x+IYDGydBDQ1EcBIT6Qnql1YLSTm9hP5TUm2c2m6hPz2cOHOxoio
YEidK+FGHc3M/xbOravoP/8eCzjdSTole39G2RXLviPWm+Uk6xxHGjQ2xCjY7CSbpqGlF2vwwykw
fdo479CQtwUL/fVVa+P/C0s/foC20G1Y3qK89QHqsUvsZ9NT0b2ibBR/fKiIoS+2fycSvME9qNkS
AcKZwhmYgHkxjYymdN7UpQq1P6Ilinb+R1N+xtAhxw==
=0MWT
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-8013-2
February 04, 2026
linux-fips, linux-aws-fips, linux-azure-fips, linux-gcp-fips
vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-aws-fips: Linux kernel for Amazon Web Services (AWS) systems with FIPS
- linux-azure-fips: Linux kernel for Microsoft Azure Cloud systems with FIPS
- linux-fips: Linux kernel with FIPS
- linux-gcp-fips: Linux kernel for Google Cloud Platform (GCP) systems with
FIPS
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Cryptographic API;
- SMB network file system;
(CVE-2025-38561, CVE-2025-40019)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS
linux-image-5.15.0-1099-aws-fips 5.15.0-1099.106+fips1
Available with Ubuntu Pro
linux-image-5.15.0-1099-gcp-fips 5.15.0-1099.108+fips1
Available with Ubuntu Pro
linux-image-5.15.0-1103-azure-fips 5.15.0-1103.112+fips1
Available with Ubuntu Pro
linux-image-5.15.0-168-fips 5.15.0-168.178+fips1
Available with Ubuntu Pro
linux-image-aws-fips 5.15.0.1099.95
Available with Ubuntu Pro
linux-image-aws-fips-5.15 5.15.0.1099.95
Available with Ubuntu Pro
linux-image-azure-fips 5.15.0.1103.88
Available with Ubuntu Pro
linux-image-azure-fips-5.15 5.15.0.1103.88
Available with Ubuntu Pro
linux-image-fips 5.15.0.168.96
Available with Ubuntu Pro
linux-image-fips-5.15 5.15.0.168.96
Available with Ubuntu Pro
linux-image-gcp-fips 5.15.0.1099.89
Available with Ubuntu Pro
linux-image-gcp-fips-5.15 5.15.0.1099.89
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-8013-2
https://ubuntu.com/security/notices/USN-8013-1
CVE-2025-38561, CVE-2025-40019
Package Information:
https://launchpad.net/ubuntu/+source/linux-aws-fips/5.15.0-1099.106+fips1
https://launchpad.net/ubuntu/+source/linux-azure-fips/5.15.0-1103.112+fips1
https://launchpad.net/ubuntu/+source/linux-fips/5.15.0-168.178+fips1
https://launchpad.net/ubuntu/+source/linux-gcp-fips/5.15.0-1099.108+fips1
[USN-8015-1] Linux kernel vulnerabilities
-----BEGIN PGP SIGNATURE-----
wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmmDmUoFAwAAAAAACgkQZ0GeRcM5nt29
wwgAnjCRVgy/uuv+hPJsxZcNKi15j4QM2X845a0rgAmB3XgKam95OUevSevJscqOQmxlaLY65Jg3
jCggUuy9TTtLLQ+o5Ypba1Somuzs2j8LjsU11vXVmMPrnZKalKBrQc9/HGJe8U+OjGx94CROzD5l
hN41T9+Ah1SNY8EBu9OGgCNC8c4qR3s9auhHUFYAE7J/Hf+K/2pSgFdsvNDdvRf0C6o9bpJfG3fc
r7EYbDV65n3JHWXcK2yAkB0ZDBATZu3ACSke4eCJzYQNheZn/VwdZLPSy4FR0ucqJFq11tZvqjiN
xYqOUhglTfKucl/Ka/Z6PVjm6iLYFFPzVuvjz3i6Pg==
=7B3F
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-8015-1
February 04, 2026
linux, linux-gke, linux-gkeop, linux-hwe-6.8, linux-oracle,
linux-oracle-6.8, linux-raspi vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux: Linux kernel
- linux-gke: Linux kernel for Google Container Engine (GKE) systems
- linux-gkeop: Linux kernel for Google Container Engine (GKE) systems
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-raspi: Linux kernel for Raspberry Pi systems
- linux-hwe-6.8: Linux hardware enablement (HWE) kernel
- linux-oracle-6.8: Linux kernel for Oracle Cloud systems
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Cryptographic API;
- SMB network file system;
- io_uring subsystem;
(CVE-2025-38561, CVE-2025-39698, CVE-2025-40019)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
linux-image-6.8.0-1029-gkeop 6.8.0-1029.32
linux-image-6.8.0-1042-gke 6.8.0-1042.47
linux-image-6.8.0-1042-gke-64k 6.8.0-1042.47
linux-image-6.8.0-1042-oracle 6.8.0-1042.43
linux-image-6.8.0-1042-oracle-64k 6.8.0-1042.43
linux-image-6.8.0-1045-raspi 6.8.0-1045.49
linux-image-6.8.0-94-generic 6.8.0-94.96
linux-image-6.8.0-94-generic-64k 6.8.0-94.96
linux-image-generic 6.8.0-94.96
linux-image-generic-6.8 6.8.0-94.96
linux-image-generic-64k 6.8.0-94.96
linux-image-generic-64k-6.8 6.8.0-94.96
linux-image-generic-lpae 6.8.0-94.96
linux-image-gke 6.8.0-1042.47
linux-image-gke-6.8 6.8.0-1042.47
linux-image-gke-64k 6.8.0-1042.47
linux-image-gke-64k-6.8 6.8.0-1042.47
linux-image-gkeop 6.8.0-1029.32
linux-image-gkeop-6.8 6.8.0-1029.32
linux-image-intel-iotg 6.8.0-94.96
linux-image-kvm 6.8.0-94.96
linux-image-oracle-6.8 6.8.0-1042.43
linux-image-oracle-64k-6.8 6.8.0-1042.43
linux-image-oracle-64k-lts-24.04 6.8.0-1042.43
linux-image-oracle-lts-24.04 6.8.0-1042.43
linux-image-raspi 6.8.0-1045.49
linux-image-raspi-6.8 6.8.0-1045.49
linux-image-virtual 6.8.0-94.96
linux-image-virtual-6.8 6.8.0-94.96
Ubuntu 22.04 LTS
linux-image-6.8.0-1042-oracle 6.8.0-1042.43~22.04.1
linux-image-6.8.0-1042-oracle-64k 6.8.0-1042.43~22.04.1
linux-image-6.8.0-94-generic 6.8.0-94.96~22.04.1
linux-image-6.8.0-94-generic-64k 6.8.0-94.96~22.04.1
linux-image-generic-6.8 6.8.0-94.96~22.04.1
linux-image-generic-64k-6.8 6.8.0-94.96~22.04.1
linux-image-generic-64k-hwe-22.04 6.8.0-94.96~22.04.1
linux-image-generic-hwe-22.04 6.8.0-94.96~22.04.1
linux-image-oem-22.04 6.8.0-94.96~22.04.1
linux-image-oem-22.04a 6.8.0-94.96~22.04.1
linux-image-oem-22.04b 6.8.0-94.96~22.04.1
linux-image-oem-22.04c 6.8.0-94.96~22.04.1
linux-image-oem-22.04d 6.8.0-94.96~22.04.1
linux-image-oracle 6.8.0-1042.43~22.04.1
linux-image-oracle-6.8 6.8.0-1042.43~22.04.1
linux-image-oracle-64k 6.8.0-1042.43~22.04.1
linux-image-oracle-64k-6.8 6.8.0-1042.43~22.04.1
linux-image-virtual-6.8 6.8.0-94.96~22.04.1
linux-image-virtual-hwe-22.04 6.8.0-94.96~22.04.1
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-8015-1
CVE-2025-38561, CVE-2025-39698, CVE-2025-40019
Package Information:
https://launchpad.net/ubuntu/+source/linux/6.8.0-94.96
https://launchpad.net/ubuntu/+source/linux-gke/6.8.0-1042.47
https://launchpad.net/ubuntu/+source/linux-gkeop/6.8.0-1029.32
https://launchpad.net/ubuntu/+source/linux-oracle/6.8.0-1042.43
https://launchpad.net/ubuntu/+source/linux-raspi/6.8.0-1045.49
https://launchpad.net/ubuntu/+source/linux-hwe-6.8/6.8.0-94.96~22.04.1
https://launchpad.net/ubuntu/+source/linux-oracle-6.8/6.8.0-1042.43~22.04.1
wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmmDmUoFAwAAAAAACgkQZ0GeRcM5nt29
wwgAnjCRVgy/uuv+hPJsxZcNKi15j4QM2X845a0rgAmB3XgKam95OUevSevJscqOQmxlaLY65Jg3
jCggUuy9TTtLLQ+o5Ypba1Somuzs2j8LjsU11vXVmMPrnZKalKBrQc9/HGJe8U+OjGx94CROzD5l
hN41T9+Ah1SNY8EBu9OGgCNC8c4qR3s9auhHUFYAE7J/Hf+K/2pSgFdsvNDdvRf0C6o9bpJfG3fc
r7EYbDV65n3JHWXcK2yAkB0ZDBATZu3ACSke4eCJzYQNheZn/VwdZLPSy4FR0ucqJFq11tZvqjiN
xYqOUhglTfKucl/Ka/Z6PVjm6iLYFFPzVuvjz3i6Pg==
=7B3F
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-8015-1
February 04, 2026
linux, linux-gke, linux-gkeop, linux-hwe-6.8, linux-oracle,
linux-oracle-6.8, linux-raspi vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux: Linux kernel
- linux-gke: Linux kernel for Google Container Engine (GKE) systems
- linux-gkeop: Linux kernel for Google Container Engine (GKE) systems
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-raspi: Linux kernel for Raspberry Pi systems
- linux-hwe-6.8: Linux hardware enablement (HWE) kernel
- linux-oracle-6.8: Linux kernel for Oracle Cloud systems
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Cryptographic API;
- SMB network file system;
- io_uring subsystem;
(CVE-2025-38561, CVE-2025-39698, CVE-2025-40019)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
linux-image-6.8.0-1029-gkeop 6.8.0-1029.32
linux-image-6.8.0-1042-gke 6.8.0-1042.47
linux-image-6.8.0-1042-gke-64k 6.8.0-1042.47
linux-image-6.8.0-1042-oracle 6.8.0-1042.43
linux-image-6.8.0-1042-oracle-64k 6.8.0-1042.43
linux-image-6.8.0-1045-raspi 6.8.0-1045.49
linux-image-6.8.0-94-generic 6.8.0-94.96
linux-image-6.8.0-94-generic-64k 6.8.0-94.96
linux-image-generic 6.8.0-94.96
linux-image-generic-6.8 6.8.0-94.96
linux-image-generic-64k 6.8.0-94.96
linux-image-generic-64k-6.8 6.8.0-94.96
linux-image-generic-lpae 6.8.0-94.96
linux-image-gke 6.8.0-1042.47
linux-image-gke-6.8 6.8.0-1042.47
linux-image-gke-64k 6.8.0-1042.47
linux-image-gke-64k-6.8 6.8.0-1042.47
linux-image-gkeop 6.8.0-1029.32
linux-image-gkeop-6.8 6.8.0-1029.32
linux-image-intel-iotg 6.8.0-94.96
linux-image-kvm 6.8.0-94.96
linux-image-oracle-6.8 6.8.0-1042.43
linux-image-oracle-64k-6.8 6.8.0-1042.43
linux-image-oracle-64k-lts-24.04 6.8.0-1042.43
linux-image-oracle-lts-24.04 6.8.0-1042.43
linux-image-raspi 6.8.0-1045.49
linux-image-raspi-6.8 6.8.0-1045.49
linux-image-virtual 6.8.0-94.96
linux-image-virtual-6.8 6.8.0-94.96
Ubuntu 22.04 LTS
linux-image-6.8.0-1042-oracle 6.8.0-1042.43~22.04.1
linux-image-6.8.0-1042-oracle-64k 6.8.0-1042.43~22.04.1
linux-image-6.8.0-94-generic 6.8.0-94.96~22.04.1
linux-image-6.8.0-94-generic-64k 6.8.0-94.96~22.04.1
linux-image-generic-6.8 6.8.0-94.96~22.04.1
linux-image-generic-64k-6.8 6.8.0-94.96~22.04.1
linux-image-generic-64k-hwe-22.04 6.8.0-94.96~22.04.1
linux-image-generic-hwe-22.04 6.8.0-94.96~22.04.1
linux-image-oem-22.04 6.8.0-94.96~22.04.1
linux-image-oem-22.04a 6.8.0-94.96~22.04.1
linux-image-oem-22.04b 6.8.0-94.96~22.04.1
linux-image-oem-22.04c 6.8.0-94.96~22.04.1
linux-image-oem-22.04d 6.8.0-94.96~22.04.1
linux-image-oracle 6.8.0-1042.43~22.04.1
linux-image-oracle-6.8 6.8.0-1042.43~22.04.1
linux-image-oracle-64k 6.8.0-1042.43~22.04.1
linux-image-oracle-64k-6.8 6.8.0-1042.43~22.04.1
linux-image-virtual-6.8 6.8.0-94.96~22.04.1
linux-image-virtual-hwe-22.04 6.8.0-94.96~22.04.1
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-8015-1
CVE-2025-38561, CVE-2025-39698, CVE-2025-40019
Package Information:
https://launchpad.net/ubuntu/+source/linux/6.8.0-94.96
https://launchpad.net/ubuntu/+source/linux-gke/6.8.0-1042.47
https://launchpad.net/ubuntu/+source/linux-gkeop/6.8.0-1029.32
https://launchpad.net/ubuntu/+source/linux-oracle/6.8.0-1042.43
https://launchpad.net/ubuntu/+source/linux-raspi/6.8.0-1045.49
https://launchpad.net/ubuntu/+source/linux-hwe-6.8/6.8.0-94.96~22.04.1
https://launchpad.net/ubuntu/+source/linux-oracle-6.8/6.8.0-1042.43~22.04.1
[USN-8014-1] Linux kernel vulnerabilities
-----BEGIN PGP SIGNATURE-----
wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmmDmTsFAwAAAAAACgkQZ0GeRcM5nt2s
6Af+L2JEDr0LA3rpl/wavJIpwLTyEVhKRqd/7vYzMRaxlByEeg2nR7TGTKvS1vnv0hWvAaN/LfEC
mK7P5MCYm1ODmBFI+Jv/hXbFg3ozS1/+9Qluyr0pMeQL4bpavro2zaKibzYVl+BWVeUkIenIlr9x
rZVip0Mhg17KFBvm/bbXSAS+7CF3BkRXC69A2CyXjnP/BDTQlLSXOw/0idu+g+wyF+DppjrH9PZ8
rO6+sLnLKhmh0uplpi4IGuSIgbtkYj0xblA00AFyO2Fiv3RxaPVjJaPHVo8oUV51nB0lUaYjChdE
WdFhxorJmBPiUTqGyHSUOcIi+AVOzWK/tTdntM5MsQ==
=nd4C
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-8014-1
February 04, 2026
linux, linux-aws, linux-azure, linux-gcp, linux-oem-6.17, linux-oracle,
linux-raspi, linux-realtime vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 25.10
- Ubuntu 24.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-azure: Linux kernel for Microsoft Azure Cloud systems
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-raspi: Linux kernel for Raspberry Pi systems
- linux-realtime: Linux kernel for Real-time systems
- linux-oem-6.17: Linux kernel for OEM systems
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Cryptographic API;
- Unix domain sockets;
(CVE-2025-40019, CVE-2025-40214)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 25.10
linux-image-6.17.0-1005-realtime 6.17.0-1005.6
linux-image-6.17.0-1006-aws 6.17.0-1006.6
linux-image-6.17.0-1006-aws-64k 6.17.0-1006.6
linux-image-6.17.0-1006-gcp 6.17.0-1006.6
linux-image-6.17.0-1006-gcp-64k 6.17.0-1006.6
linux-image-6.17.0-1006-oracle 6.17.0-1006.6
linux-image-6.17.0-1006-oracle-64k 6.17.0-1006.6
linux-image-6.17.0-1007-azure 6.17.0-1007.7
linux-image-6.17.0-1007-raspi 6.17.0-1007.7
linux-image-6.17.0-12-generic 6.17.0-12.12
linux-image-6.17.0-12-generic-64k 6.17.0-12.12
linux-image-aws 6.17.0-1006.6
linux-image-aws-6.17 6.17.0-1006.6
linux-image-aws-64k 6.17.0-1006.6
linux-image-aws-64k-6.17 6.17.0-1006.6
linux-image-azure 6.17.0-1007.7
linux-image-azure-6.17 6.17.0-1007.7
linux-image-gcp 6.17.0-1006.6
linux-image-gcp-6.17 6.17.0-1006.6
linux-image-gcp-64k 6.17.0-1006.6
linux-image-gcp-64k-6.17 6.17.0-1006.6
linux-image-generic 6.17.0-12.12
linux-image-generic-6.17 6.17.0-12.12
linux-image-generic-64k 6.17.0-12.12
linux-image-generic-64k-6.17 6.17.0-12.12
linux-image-oracle 6.17.0-1006.6
linux-image-oracle-6.17 6.17.0-1006.6
linux-image-oracle-64k 6.17.0-1006.6
linux-image-oracle-64k-6.17 6.17.0-1006.6
linux-image-raspi 6.17.0-1007.7
linux-image-raspi-6.17 6.17.0-1007.7
linux-image-realtime 6.17.0-1005.6
linux-image-realtime-6.17 6.17.0-1005.6
linux-image-virtual 6.17.0-12.12
linux-image-virtual-6.17 6.17.0-12.12
Ubuntu 24.04 LTS
linux-image-6.17.0-1010-oem 6.17.0-1010.10
linux-image-oem-24.04d 6.17.0-1010.10
linux-image-oem-6.17 6.17.0-1010.10
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-8014-1
CVE-2025-40019, CVE-2025-40214
Package Information:
https://launchpad.net/ubuntu/+source/linux/6.17.0-12.12
https://launchpad.net/ubuntu/+source/linux-aws/6.17.0-1006.6
https://launchpad.net/ubuntu/+source/linux-azure/6.17.0-1007.7
https://launchpad.net/ubuntu/+source/linux-gcp/6.17.0-1006.6
https://launchpad.net/ubuntu/+source/linux-oracle/6.17.0-1006.6
https://launchpad.net/ubuntu/+source/linux-raspi/6.17.0-1007.7
https://launchpad.net/ubuntu/+source/linux-realtime/6.17.0-1005.6
https://launchpad.net/ubuntu/+source/linux-oem-6.17/6.17.0-1010.10
wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmmDmTsFAwAAAAAACgkQZ0GeRcM5nt2s
6Af+L2JEDr0LA3rpl/wavJIpwLTyEVhKRqd/7vYzMRaxlByEeg2nR7TGTKvS1vnv0hWvAaN/LfEC
mK7P5MCYm1ODmBFI+Jv/hXbFg3ozS1/+9Qluyr0pMeQL4bpavro2zaKibzYVl+BWVeUkIenIlr9x
rZVip0Mhg17KFBvm/bbXSAS+7CF3BkRXC69A2CyXjnP/BDTQlLSXOw/0idu+g+wyF+DppjrH9PZ8
rO6+sLnLKhmh0uplpi4IGuSIgbtkYj0xblA00AFyO2Fiv3RxaPVjJaPHVo8oUV51nB0lUaYjChdE
WdFhxorJmBPiUTqGyHSUOcIi+AVOzWK/tTdntM5MsQ==
=nd4C
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-8014-1
February 04, 2026
linux, linux-aws, linux-azure, linux-gcp, linux-oem-6.17, linux-oracle,
linux-raspi, linux-realtime vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 25.10
- Ubuntu 24.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-azure: Linux kernel for Microsoft Azure Cloud systems
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-raspi: Linux kernel for Raspberry Pi systems
- linux-realtime: Linux kernel for Real-time systems
- linux-oem-6.17: Linux kernel for OEM systems
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Cryptographic API;
- Unix domain sockets;
(CVE-2025-40019, CVE-2025-40214)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 25.10
linux-image-6.17.0-1005-realtime 6.17.0-1005.6
linux-image-6.17.0-1006-aws 6.17.0-1006.6
linux-image-6.17.0-1006-aws-64k 6.17.0-1006.6
linux-image-6.17.0-1006-gcp 6.17.0-1006.6
linux-image-6.17.0-1006-gcp-64k 6.17.0-1006.6
linux-image-6.17.0-1006-oracle 6.17.0-1006.6
linux-image-6.17.0-1006-oracle-64k 6.17.0-1006.6
linux-image-6.17.0-1007-azure 6.17.0-1007.7
linux-image-6.17.0-1007-raspi 6.17.0-1007.7
linux-image-6.17.0-12-generic 6.17.0-12.12
linux-image-6.17.0-12-generic-64k 6.17.0-12.12
linux-image-aws 6.17.0-1006.6
linux-image-aws-6.17 6.17.0-1006.6
linux-image-aws-64k 6.17.0-1006.6
linux-image-aws-64k-6.17 6.17.0-1006.6
linux-image-azure 6.17.0-1007.7
linux-image-azure-6.17 6.17.0-1007.7
linux-image-gcp 6.17.0-1006.6
linux-image-gcp-6.17 6.17.0-1006.6
linux-image-gcp-64k 6.17.0-1006.6
linux-image-gcp-64k-6.17 6.17.0-1006.6
linux-image-generic 6.17.0-12.12
linux-image-generic-6.17 6.17.0-12.12
linux-image-generic-64k 6.17.0-12.12
linux-image-generic-64k-6.17 6.17.0-12.12
linux-image-oracle 6.17.0-1006.6
linux-image-oracle-6.17 6.17.0-1006.6
linux-image-oracle-64k 6.17.0-1006.6
linux-image-oracle-64k-6.17 6.17.0-1006.6
linux-image-raspi 6.17.0-1007.7
linux-image-raspi-6.17 6.17.0-1007.7
linux-image-realtime 6.17.0-1005.6
linux-image-realtime-6.17 6.17.0-1005.6
linux-image-virtual 6.17.0-12.12
linux-image-virtual-6.17 6.17.0-12.12
Ubuntu 24.04 LTS
linux-image-6.17.0-1010-oem 6.17.0-1010.10
linux-image-oem-24.04d 6.17.0-1010.10
linux-image-oem-6.17 6.17.0-1010.10
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-8014-1
CVE-2025-40019, CVE-2025-40214
Package Information:
https://launchpad.net/ubuntu/+source/linux/6.17.0-12.12
https://launchpad.net/ubuntu/+source/linux-aws/6.17.0-1006.6
https://launchpad.net/ubuntu/+source/linux-azure/6.17.0-1007.7
https://launchpad.net/ubuntu/+source/linux-gcp/6.17.0-1006.6
https://launchpad.net/ubuntu/+source/linux-oracle/6.17.0-1006.6
https://launchpad.net/ubuntu/+source/linux-raspi/6.17.0-1007.7
https://launchpad.net/ubuntu/+source/linux-realtime/6.17.0-1005.6
https://launchpad.net/ubuntu/+source/linux-oem-6.17/6.17.0-1010.10
[USN-8013-1] Linux kernel vulnerabilities
-----BEGIN PGP SIGNATURE-----
wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmmDmQAFAwAAAAAACgkQZ0GeRcM5nt0x
ggf9EOrO3CqUtac46fdMqzcRiHiyyIVP/ommkfF2rpK4o4vnh18Ulzxb4Ic2Udm9/cJA9t649aui
zeQCTAuX+w5IvrAhXrz68KvDMUcBvYZpj7UE3UsQRWbydGDTelsd7fM01oUFnD8bxTR/31uA2Q/r
Izupk4B+6Ltg7dz0aZqI78uEkvmcIXIdHW83UZIvGUc/rVgBjeoLIJnKQpbsfFGuzMBbOaP0JkSB
EKlNzl0qNj31kwyZyEZ80yRxVP8+/Y8oGXybUnhaQwxaUm3HgIZZd914HGZYi++MNUabNSZnfiDj
WnfEEoXftZwJVLTqPxmAAc8R6SFmi41E5cxYTwcu4A==
=1GWQ
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-8013-1
February 04, 2026
linux, linux-aws, linux-azure, linux-azure-5.15, linux-gcp, linux-gke,
linux-gkeop, linux-hwe-5.15, linux-ibm, linux-ibm-5.15, linux-intel-iotg,
linux-intel-iotg-5.15, linux-kvm, linux-lowlatency,
linux-lowlatency-hwe-5.15, linux-nvidia, linux-nvidia-tegra,
linux-nvidia-tegra-5.15, linux-oracle, linux-raspi vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-azure: Linux kernel for Microsoft Azure Cloud systems
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-gke: Linux kernel for Google Container Engine (GKE) systems
- linux-gkeop: Linux kernel for Google Container Engine (GKE) systems
- linux-ibm: Linux kernel for IBM cloud systems
- linux-intel-iotg: Linux kernel for Intel IoT platforms
- linux-kvm: Linux kernel for cloud environments
- linux-lowlatency: Linux low latency kernel
- linux-nvidia: Linux kernel for NVIDIA systems
- linux-nvidia-tegra: Linux kernel for NVIDIA Tegra systems
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-raspi: Linux kernel for Raspberry Pi systems
- linux-azure-5.15: Linux kernel for Microsoft Azure cloud systems
- linux-hwe-5.15: Linux hardware enablement (HWE) kernel
- linux-ibm-5.15: Linux kernel for IBM cloud systems
- linux-intel-iotg-5.15: Linux kernel for Intel IoT platforms
- linux-lowlatency-hwe-5.15: Linux low latency kernel
- linux-nvidia-tegra-5.15: Linux kernel for NVIDIA Tegra systems
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Cryptographic API;
- SMB network file system;
(CVE-2025-38561, CVE-2025-40019)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS
linux-image-5.15.0-1051-nvidia-tegra 5.15.0-1051.51
linux-image-5.15.0-1051-nvidia-tegra-rt 5.15.0-1051.51
linux-image-5.15.0-1082-gkeop 5.15.0-1082.90
linux-image-5.15.0-1091-kvm 5.15.0-1091.96
linux-image-5.15.0-1093-ibm 5.15.0-1093.96
linux-image-5.15.0-1093-raspi 5.15.0-1093.96
linux-image-5.15.0-1094-intel-iotg 5.15.0-1094.100
linux-image-5.15.0-1094-nvidia 5.15.0-1094.95
linux-image-5.15.0-1094-nvidia-lowlatency 5.15.0-1094.95
linux-image-5.15.0-1095-gke 5.15.0-1095.101
linux-image-5.15.0-1096-oracle 5.15.0-1096.102
linux-image-5.15.0-1099-aws 5.15.0-1099.106
linux-image-5.15.0-1099-aws-64k 5.15.0-1099.106
linux-image-5.15.0-1099-gcp 5.15.0-1099.108
linux-image-5.15.0-1103-azure 5.15.0-1103.112
linux-image-5.15.0-168-generic 5.15.0-168.178
linux-image-5.15.0-168-generic-64k 5.15.0-168.178
linux-image-5.15.0-168-generic-lpae 5.15.0-168.178
linux-image-5.15.0-168-lowlatency 5.15.0-168.178
linux-image-5.15.0-168-lowlatency-64k 5.15.0-168.178
linux-image-aws-5.15 5.15.0.1099.102
linux-image-aws-64k-5.15 5.15.0.1099.102
linux-image-aws-64k-lts-22.04 5.15.0.1099.102
linux-image-aws-lts-22.04 5.15.0.1099.102
linux-image-azure-5.15 5.15.0.1103.101
linux-image-azure-lts-22.04 5.15.0.1103.101
linux-image-gcp-5.15 5.15.0.1099.95
linux-image-gcp-lts-22.04 5.15.0.1099.95
linux-image-generic 5.15.0.168.159
linux-image-generic-5.15 5.15.0.168.159
linux-image-generic-64k 5.15.0.168.159
linux-image-generic-64k-5.15 5.15.0.168.159
linux-image-generic-lpae 5.15.0.168.159
linux-image-generic-lpae-5.15 5.15.0.168.159
linux-image-gke 5.15.0.1095.94
linux-image-gke-5.15 5.15.0.1095.94
linux-image-gkeop 5.15.0.1082.81
linux-image-gkeop-5.15 5.15.0.1082.81
linux-image-ibm 5.15.0.1093.89
linux-image-ibm-5.15 5.15.0.1093.89
linux-image-intel-iotg 5.15.0.1094.94
linux-image-intel-iotg-5.15 5.15.0.1094.94
linux-image-kvm 5.15.0.1091.87
linux-image-kvm-5.15 5.15.0.1091.87
linux-image-lowlatency 5.15.0.168.142
linux-image-lowlatency-5.15 5.15.0.168.142
linux-image-lowlatency-64k 5.15.0.168.142
linux-image-lowlatency-64k-5.15 5.15.0.168.142
linux-image-nvidia 5.15.0.1094.94
linux-image-nvidia-5.15 5.15.0.1094.94
linux-image-nvidia-lowlatency 5.15.0.1094.94
linux-image-nvidia-lowlatency-5.15 5.15.0.1094.94
linux-image-nvidia-tegra 5.15.0.1051.51
linux-image-nvidia-tegra-5.15 5.15.0.1051.51
linux-image-nvidia-tegra-rt 5.15.0.1051.51
linux-image-nvidia-tegra-rt-5.15 5.15.0.1051.51
linux-image-oracle-5.15 5.15.0.1096.92
linux-image-oracle-lts-22.04 5.15.0.1096.92
linux-image-raspi 5.15.0.1093.91
linux-image-raspi-5.15 5.15.0.1093.91
linux-image-raspi-nolpae 5.15.0.1093.91
linux-image-virtual 5.15.0.168.159
linux-image-virtual-5.15 5.15.0.168.159
Ubuntu 20.04 LTS
linux-image-5.15.0-1051-nvidia-tegra 5.15.0-1051.51~20.04.1
Available with Ubuntu Pro
linux-image-5.15.0-1051-nvidia-tegra-rt 5.15.0-1051.51~20.04.1
Available with Ubuntu Pro
linux-image-5.15.0-1093-ibm 5.15.0-1093.96~20.04.1
Available with Ubuntu Pro
linux-image-5.15.0-1094-intel-iotg 5.15.0-1094.100~20.04.1
Available with Ubuntu Pro
linux-image-5.15.0-1103-azure 5.15.0-1103.112~20.04.1
Available with Ubuntu Pro
linux-image-5.15.0-168-generic 5.15.0-168.178~20.04.1
Available with Ubuntu Pro
linux-image-5.15.0-168-generic-64k 5.15.0-168.178~20.04.1
Available with Ubuntu Pro
linux-image-5.15.0-168-generic-lpae 5.15.0-168.178~20.04.1
Available with Ubuntu Pro
linux-image-5.15.0-168-lowlatency 5.15.0-168.178~20.04.1
Available with Ubuntu Pro
linux-image-5.15.0-168-lowlatency-64k 5.15.0-168.178~20.04.1
Available with Ubuntu Pro
linux-image-azure 5.15.0.1103.112~20.04.1
Available with Ubuntu Pro
linux-image-azure-5.15 5.15.0.1103.112~20.04.1
Available with Ubuntu Pro
linux-image-azure-cvm 5.15.0.1103.112~20.04.1
Available with Ubuntu Pro
linux-image-generic-5.15 5.15.0.168.178~20.04.1
Available with Ubuntu Pro
linux-image-generic-64k-5.15 5.15.0.168.178~20.04.1
Available with Ubuntu Pro
linux-image-generic-64k-hwe-20.04 5.15.0.168.178~20.04.1
Available with Ubuntu Pro
linux-image-generic-hwe-20.04 5.15.0.168.178~20.04.1
Available with Ubuntu Pro
linux-image-generic-lpae-5.15 5.15.0.168.178~20.04.1
Available with Ubuntu Pro
linux-image-generic-lpae-hwe-20.04 5.15.0.168.178~20.04.1
Available with Ubuntu Pro
linux-image-ibm 5.15.0.1093.96~20.04.1
Available with Ubuntu Pro
linux-image-ibm-5.15 5.15.0.1093.96~20.04.1
Available with Ubuntu Pro
linux-image-intel 5.15.0.1094.100~20.04.1
Available with Ubuntu Pro
linux-image-intel-iotg 5.15.0.1094.100~20.04.1
Available with Ubuntu Pro
linux-image-intel-iotg-5.15 5.15.0.1094.100~20.04.1
Available with Ubuntu Pro
linux-image-lowlatency-5.15 5.15.0.168.178~20.04.1
Available with Ubuntu Pro
linux-image-lowlatency-64k-5.15 5.15.0.168.178~20.04.1
Available with Ubuntu Pro
linux-image-lowlatency-64k-hwe-20.04 5.15.0.168.178~20.04.1
Available with Ubuntu Pro
linux-image-lowlatency-hwe-20.04 5.15.0.168.178~20.04.1
Available with Ubuntu Pro
linux-image-nvidia-tegra 5.15.0.1051.51~20.04.1
Available with Ubuntu Pro
linux-image-nvidia-tegra-5.15 5.15.0.1051.51~20.04.1
Available with Ubuntu Pro
linux-image-nvidia-tegra-rt 5.15.0.1051.51~20.04.1
Available with Ubuntu Pro
linux-image-nvidia-tegra-rt-5.15 5.15.0.1051.51~20.04.1
Available with Ubuntu Pro
linux-image-oem-20.04 5.15.0.168.178~20.04.1
Available with Ubuntu Pro
linux-image-oem-20.04b 5.15.0.168.178~20.04.1
Available with Ubuntu Pro
linux-image-oem-20.04c 5.15.0.168.178~20.04.1
Available with Ubuntu Pro
linux-image-oem-20.04d 5.15.0.168.178~20.04.1
Available with Ubuntu Pro
linux-image-virtual-5.15 5.15.0.168.178~20.04.1
Available with Ubuntu Pro
linux-image-virtual-hwe-20.04 5.15.0.168.178~20.04.1
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-8013-1
CVE-2025-38561, CVE-2025-40019
Package Information:
https://launchpad.net/ubuntu/+source/linux/5.15.0-168.178
https://launchpad.net/ubuntu/+source/linux-aws/5.15.0-1099.106
https://launchpad.net/ubuntu/+source/linux-azure/5.15.0-1103.112
https://launchpad.net/ubuntu/+source/linux-gcp/5.15.0-1099.108
https://launchpad.net/ubuntu/+source/linux-gke/5.15.0-1095.101
https://launchpad.net/ubuntu/+source/linux-gkeop/5.15.0-1082.90
https://launchpad.net/ubuntu/+source/linux-ibm/5.15.0-1093.96
https://launchpad.net/ubuntu/+source/linux-intel-iotg/5.15.0-1094.100
https://launchpad.net/ubuntu/+source/linux-kvm/5.15.0-1091.96
https://launchpad.net/ubuntu/+source/linux-lowlatency/5.15.0-168.178
https://launchpad.net/ubuntu/+source/linux-nvidia/5.15.0-1094.95
https://launchpad.net/ubuntu/+source/linux-nvidia-tegra/5.15.0-1051.51
https://launchpad.net/ubuntu/+source/linux-oracle/5.15.0-1096.102
https://launchpad.net/ubuntu/+source/linux-raspi/5.15.0-1093.96
wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmmDmQAFAwAAAAAACgkQZ0GeRcM5nt0x
ggf9EOrO3CqUtac46fdMqzcRiHiyyIVP/ommkfF2rpK4o4vnh18Ulzxb4Ic2Udm9/cJA9t649aui
zeQCTAuX+w5IvrAhXrz68KvDMUcBvYZpj7UE3UsQRWbydGDTelsd7fM01oUFnD8bxTR/31uA2Q/r
Izupk4B+6Ltg7dz0aZqI78uEkvmcIXIdHW83UZIvGUc/rVgBjeoLIJnKQpbsfFGuzMBbOaP0JkSB
EKlNzl0qNj31kwyZyEZ80yRxVP8+/Y8oGXybUnhaQwxaUm3HgIZZd914HGZYi++MNUabNSZnfiDj
WnfEEoXftZwJVLTqPxmAAc8R6SFmi41E5cxYTwcu4A==
=1GWQ
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-8013-1
February 04, 2026
linux, linux-aws, linux-azure, linux-azure-5.15, linux-gcp, linux-gke,
linux-gkeop, linux-hwe-5.15, linux-ibm, linux-ibm-5.15, linux-intel-iotg,
linux-intel-iotg-5.15, linux-kvm, linux-lowlatency,
linux-lowlatency-hwe-5.15, linux-nvidia, linux-nvidia-tegra,
linux-nvidia-tegra-5.15, linux-oracle, linux-raspi vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-azure: Linux kernel for Microsoft Azure Cloud systems
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-gke: Linux kernel for Google Container Engine (GKE) systems
- linux-gkeop: Linux kernel for Google Container Engine (GKE) systems
- linux-ibm: Linux kernel for IBM cloud systems
- linux-intel-iotg: Linux kernel for Intel IoT platforms
- linux-kvm: Linux kernel for cloud environments
- linux-lowlatency: Linux low latency kernel
- linux-nvidia: Linux kernel for NVIDIA systems
- linux-nvidia-tegra: Linux kernel for NVIDIA Tegra systems
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-raspi: Linux kernel for Raspberry Pi systems
- linux-azure-5.15: Linux kernel for Microsoft Azure cloud systems
- linux-hwe-5.15: Linux hardware enablement (HWE) kernel
- linux-ibm-5.15: Linux kernel for IBM cloud systems
- linux-intel-iotg-5.15: Linux kernel for Intel IoT platforms
- linux-lowlatency-hwe-5.15: Linux low latency kernel
- linux-nvidia-tegra-5.15: Linux kernel for NVIDIA Tegra systems
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Cryptographic API;
- SMB network file system;
(CVE-2025-38561, CVE-2025-40019)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS
linux-image-5.15.0-1051-nvidia-tegra 5.15.0-1051.51
linux-image-5.15.0-1051-nvidia-tegra-rt 5.15.0-1051.51
linux-image-5.15.0-1082-gkeop 5.15.0-1082.90
linux-image-5.15.0-1091-kvm 5.15.0-1091.96
linux-image-5.15.0-1093-ibm 5.15.0-1093.96
linux-image-5.15.0-1093-raspi 5.15.0-1093.96
linux-image-5.15.0-1094-intel-iotg 5.15.0-1094.100
linux-image-5.15.0-1094-nvidia 5.15.0-1094.95
linux-image-5.15.0-1094-nvidia-lowlatency 5.15.0-1094.95
linux-image-5.15.0-1095-gke 5.15.0-1095.101
linux-image-5.15.0-1096-oracle 5.15.0-1096.102
linux-image-5.15.0-1099-aws 5.15.0-1099.106
linux-image-5.15.0-1099-aws-64k 5.15.0-1099.106
linux-image-5.15.0-1099-gcp 5.15.0-1099.108
linux-image-5.15.0-1103-azure 5.15.0-1103.112
linux-image-5.15.0-168-generic 5.15.0-168.178
linux-image-5.15.0-168-generic-64k 5.15.0-168.178
linux-image-5.15.0-168-generic-lpae 5.15.0-168.178
linux-image-5.15.0-168-lowlatency 5.15.0-168.178
linux-image-5.15.0-168-lowlatency-64k 5.15.0-168.178
linux-image-aws-5.15 5.15.0.1099.102
linux-image-aws-64k-5.15 5.15.0.1099.102
linux-image-aws-64k-lts-22.04 5.15.0.1099.102
linux-image-aws-lts-22.04 5.15.0.1099.102
linux-image-azure-5.15 5.15.0.1103.101
linux-image-azure-lts-22.04 5.15.0.1103.101
linux-image-gcp-5.15 5.15.0.1099.95
linux-image-gcp-lts-22.04 5.15.0.1099.95
linux-image-generic 5.15.0.168.159
linux-image-generic-5.15 5.15.0.168.159
linux-image-generic-64k 5.15.0.168.159
linux-image-generic-64k-5.15 5.15.0.168.159
linux-image-generic-lpae 5.15.0.168.159
linux-image-generic-lpae-5.15 5.15.0.168.159
linux-image-gke 5.15.0.1095.94
linux-image-gke-5.15 5.15.0.1095.94
linux-image-gkeop 5.15.0.1082.81
linux-image-gkeop-5.15 5.15.0.1082.81
linux-image-ibm 5.15.0.1093.89
linux-image-ibm-5.15 5.15.0.1093.89
linux-image-intel-iotg 5.15.0.1094.94
linux-image-intel-iotg-5.15 5.15.0.1094.94
linux-image-kvm 5.15.0.1091.87
linux-image-kvm-5.15 5.15.0.1091.87
linux-image-lowlatency 5.15.0.168.142
linux-image-lowlatency-5.15 5.15.0.168.142
linux-image-lowlatency-64k 5.15.0.168.142
linux-image-lowlatency-64k-5.15 5.15.0.168.142
linux-image-nvidia 5.15.0.1094.94
linux-image-nvidia-5.15 5.15.0.1094.94
linux-image-nvidia-lowlatency 5.15.0.1094.94
linux-image-nvidia-lowlatency-5.15 5.15.0.1094.94
linux-image-nvidia-tegra 5.15.0.1051.51
linux-image-nvidia-tegra-5.15 5.15.0.1051.51
linux-image-nvidia-tegra-rt 5.15.0.1051.51
linux-image-nvidia-tegra-rt-5.15 5.15.0.1051.51
linux-image-oracle-5.15 5.15.0.1096.92
linux-image-oracle-lts-22.04 5.15.0.1096.92
linux-image-raspi 5.15.0.1093.91
linux-image-raspi-5.15 5.15.0.1093.91
linux-image-raspi-nolpae 5.15.0.1093.91
linux-image-virtual 5.15.0.168.159
linux-image-virtual-5.15 5.15.0.168.159
Ubuntu 20.04 LTS
linux-image-5.15.0-1051-nvidia-tegra 5.15.0-1051.51~20.04.1
Available with Ubuntu Pro
linux-image-5.15.0-1051-nvidia-tegra-rt 5.15.0-1051.51~20.04.1
Available with Ubuntu Pro
linux-image-5.15.0-1093-ibm 5.15.0-1093.96~20.04.1
Available with Ubuntu Pro
linux-image-5.15.0-1094-intel-iotg 5.15.0-1094.100~20.04.1
Available with Ubuntu Pro
linux-image-5.15.0-1103-azure 5.15.0-1103.112~20.04.1
Available with Ubuntu Pro
linux-image-5.15.0-168-generic 5.15.0-168.178~20.04.1
Available with Ubuntu Pro
linux-image-5.15.0-168-generic-64k 5.15.0-168.178~20.04.1
Available with Ubuntu Pro
linux-image-5.15.0-168-generic-lpae 5.15.0-168.178~20.04.1
Available with Ubuntu Pro
linux-image-5.15.0-168-lowlatency 5.15.0-168.178~20.04.1
Available with Ubuntu Pro
linux-image-5.15.0-168-lowlatency-64k 5.15.0-168.178~20.04.1
Available with Ubuntu Pro
linux-image-azure 5.15.0.1103.112~20.04.1
Available with Ubuntu Pro
linux-image-azure-5.15 5.15.0.1103.112~20.04.1
Available with Ubuntu Pro
linux-image-azure-cvm 5.15.0.1103.112~20.04.1
Available with Ubuntu Pro
linux-image-generic-5.15 5.15.0.168.178~20.04.1
Available with Ubuntu Pro
linux-image-generic-64k-5.15 5.15.0.168.178~20.04.1
Available with Ubuntu Pro
linux-image-generic-64k-hwe-20.04 5.15.0.168.178~20.04.1
Available with Ubuntu Pro
linux-image-generic-hwe-20.04 5.15.0.168.178~20.04.1
Available with Ubuntu Pro
linux-image-generic-lpae-5.15 5.15.0.168.178~20.04.1
Available with Ubuntu Pro
linux-image-generic-lpae-hwe-20.04 5.15.0.168.178~20.04.1
Available with Ubuntu Pro
linux-image-ibm 5.15.0.1093.96~20.04.1
Available with Ubuntu Pro
linux-image-ibm-5.15 5.15.0.1093.96~20.04.1
Available with Ubuntu Pro
linux-image-intel 5.15.0.1094.100~20.04.1
Available with Ubuntu Pro
linux-image-intel-iotg 5.15.0.1094.100~20.04.1
Available with Ubuntu Pro
linux-image-intel-iotg-5.15 5.15.0.1094.100~20.04.1
Available with Ubuntu Pro
linux-image-lowlatency-5.15 5.15.0.168.178~20.04.1
Available with Ubuntu Pro
linux-image-lowlatency-64k-5.15 5.15.0.168.178~20.04.1
Available with Ubuntu Pro
linux-image-lowlatency-64k-hwe-20.04 5.15.0.168.178~20.04.1
Available with Ubuntu Pro
linux-image-lowlatency-hwe-20.04 5.15.0.168.178~20.04.1
Available with Ubuntu Pro
linux-image-nvidia-tegra 5.15.0.1051.51~20.04.1
Available with Ubuntu Pro
linux-image-nvidia-tegra-5.15 5.15.0.1051.51~20.04.1
Available with Ubuntu Pro
linux-image-nvidia-tegra-rt 5.15.0.1051.51~20.04.1
Available with Ubuntu Pro
linux-image-nvidia-tegra-rt-5.15 5.15.0.1051.51~20.04.1
Available with Ubuntu Pro
linux-image-oem-20.04 5.15.0.168.178~20.04.1
Available with Ubuntu Pro
linux-image-oem-20.04b 5.15.0.168.178~20.04.1
Available with Ubuntu Pro
linux-image-oem-20.04c 5.15.0.168.178~20.04.1
Available with Ubuntu Pro
linux-image-oem-20.04d 5.15.0.168.178~20.04.1
Available with Ubuntu Pro
linux-image-virtual-5.15 5.15.0.168.178~20.04.1
Available with Ubuntu Pro
linux-image-virtual-hwe-20.04 5.15.0.168.178~20.04.1
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-8013-1
CVE-2025-38561, CVE-2025-40019
Package Information:
https://launchpad.net/ubuntu/+source/linux/5.15.0-168.178
https://launchpad.net/ubuntu/+source/linux-aws/5.15.0-1099.106
https://launchpad.net/ubuntu/+source/linux-azure/5.15.0-1103.112
https://launchpad.net/ubuntu/+source/linux-gcp/5.15.0-1099.108
https://launchpad.net/ubuntu/+source/linux-gke/5.15.0-1095.101
https://launchpad.net/ubuntu/+source/linux-gkeop/5.15.0-1082.90
https://launchpad.net/ubuntu/+source/linux-ibm/5.15.0-1093.96
https://launchpad.net/ubuntu/+source/linux-intel-iotg/5.15.0-1094.100
https://launchpad.net/ubuntu/+source/linux-kvm/5.15.0-1091.96
https://launchpad.net/ubuntu/+source/linux-lowlatency/5.15.0-168.178
https://launchpad.net/ubuntu/+source/linux-nvidia/5.15.0-1094.95
https://launchpad.net/ubuntu/+source/linux-nvidia-tegra/5.15.0-1051.51
https://launchpad.net/ubuntu/+source/linux-oracle/5.15.0-1096.102
https://launchpad.net/ubuntu/+source/linux-raspi/5.15.0-1093.96
[USN-8012-1] GitHub CLI vulnerabilities
==========================================================================
Ubuntu Security Notice USN-8012-1
February 04, 2026
gh vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
Summary:
Several security issues were fixed in GitHub CLI.
Software Description:
- gh: GitHub for the terminal
Details:
It was discovered that GitHub CLI could behave unexpectedly if users
downloaded a malicious GitHub Actions workflow artifact through gh run
download. An attacker could possibly use this issue to create or overwrite
files in unintended directories. (CVE-2024-54132)
It was discovered that GitHub CLI could behave unexpectedly when cloning
repositories containing git submodules hosted outside of GitHub.com and
ghe.com. An attacker could possibly use this issue to gather authentication
tokens. (CVE-2024-53858)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
gh 2.45.0-1ubuntu0.3+esm2
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-8012-1
CVE-2024-53858, CVE-2024-54132
Ubuntu Security Notice USN-8012-1
February 04, 2026
gh vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
Summary:
Several security issues were fixed in GitHub CLI.
Software Description:
- gh: GitHub for the terminal
Details:
It was discovered that GitHub CLI could behave unexpectedly if users
downloaded a malicious GitHub Actions workflow artifact through gh run
download. An attacker could possibly use this issue to create or overwrite
files in unintended directories. (CVE-2024-54132)
It was discovered that GitHub CLI could behave unexpectedly when cloning
repositories containing git submodules hosted outside of GitHub.com and
ghe.com. An attacker could possibly use this issue to gather authentication
tokens. (CVE-2024-53858)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
gh 2.45.0-1ubuntu0.3+esm2
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-8012-1
CVE-2024-53858, CVE-2024-54132
[announce] Next NYC*BUG: tonight @ Brass Monkey
Reminder: NYC*BUG will Be meeting at the Brass Monkey at 18:45
February Social,
2026-02-04 @ 18:45 local (23:45 UTC) - Backroom of Brass Monkey 55 Little West 12th St
2026-02-04 @ 18:45 local (23:45 UTC) - Backroom of Brass Monkey 55 Little West 12th St
We are having a social meeting to catch up after the holidays. Will bring a few ideas for future meetings, stickers.
[USN-8011-1] Emacs vulnerabilities
==========================================================================
Ubuntu Security Notice USN-8011-1
February 04, 2026
emacs vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
Summary:
Several security issues were fixed in Emacs.
Software Description:
- emacs: An extensible, customizable, free/libre text editor — and more.
Details:
It was discovered that Emacs could trigger unsafe Lisp macro expansion,
when a user invoked elisp-completion-at-point on untrusted Emacs Lisp
source code. An attacker could possibly use this issue to execute
arbitrary code. (CVE-2024-53920)
It was discovered that Emacs did not properly sanitize input when
handling certain URI schemes. An attacker could possibly use this issue
to execute arbitrary shell commands by tricking a user into opening a
specially crafted URL. (CVE-2025-1244)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
emacs 1:29.3+1-1ubuntu2+esm3
Available with Ubuntu Pro
emacs-bin-common 1:29.3+1-1ubuntu2+esm3
Available with Ubuntu Pro
emacs-common 1:29.3+1-1ubuntu2+esm3
Available with Ubuntu Pro
emacs-el 1:29.3+1-1ubuntu2+esm3
Available with Ubuntu Pro
emacs-gtk 1:29.3+1-1ubuntu2+esm3
Available with Ubuntu Pro
emacs-lucid 1:29.3+1-1ubuntu2+esm3
Available with Ubuntu Pro
emacs-nox 1:29.3+1-1ubuntu2+esm3
Available with Ubuntu Pro
emacs-pgtk 1:29.3+1-1ubuntu2+esm3
Available with Ubuntu Pro
Ubuntu 22.04 LTS
emacs 1:27.1+1-3ubuntu5.2+esm1
Available with Ubuntu Pro
emacs-bin-common 1:27.1+1-3ubuntu5.2+esm1
Available with Ubuntu Pro
emacs-common 1:27.1+1-3ubuntu5.2+esm1
Available with Ubuntu Pro
emacs-el 1:27.1+1-3ubuntu5.2+esm1
Available with Ubuntu Pro
emacs-gtk 1:27.1+1-3ubuntu5.2+esm1
Available with Ubuntu Pro
emacs-lucid 1:27.1+1-3ubuntu5.2+esm1
Available with Ubuntu Pro
emacs-nox 1:27.1+1-3ubuntu5.2+esm1
Available with Ubuntu Pro
Ubuntu 20.04 LTS
emacs 1:26.3+1-1ubuntu2+esm2
Available with Ubuntu Pro
emacs-bin-common 1:26.3+1-1ubuntu2+esm2
Available with Ubuntu Pro
emacs-common 1:26.3+1-1ubuntu2+esm2
Available with Ubuntu Pro
emacs-el 1:26.3+1-1ubuntu2+esm2
Available with Ubuntu Pro
emacs-gtk 1:26.3+1-1ubuntu2+esm2
Available with Ubuntu Pro
emacs-lucid 1:26.3+1-1ubuntu2+esm2
Available with Ubuntu Pro
emacs-nox 1:26.3+1-1ubuntu2+esm2
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-8011-1
CVE-2024-53920, CVE-2025-1244
Ubuntu Security Notice USN-8011-1
February 04, 2026
emacs vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
Summary:
Several security issues were fixed in Emacs.
Software Description:
- emacs: An extensible, customizable, free/libre text editor — and more.
Details:
It was discovered that Emacs could trigger unsafe Lisp macro expansion,
when a user invoked elisp-completion-at-point on untrusted Emacs Lisp
source code. An attacker could possibly use this issue to execute
arbitrary code. (CVE-2024-53920)
It was discovered that Emacs did not properly sanitize input when
handling certain URI schemes. An attacker could possibly use this issue
to execute arbitrary shell commands by tricking a user into opening a
specially crafted URL. (CVE-2025-1244)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
emacs 1:29.3+1-1ubuntu2+esm3
Available with Ubuntu Pro
emacs-bin-common 1:29.3+1-1ubuntu2+esm3
Available with Ubuntu Pro
emacs-common 1:29.3+1-1ubuntu2+esm3
Available with Ubuntu Pro
emacs-el 1:29.3+1-1ubuntu2+esm3
Available with Ubuntu Pro
emacs-gtk 1:29.3+1-1ubuntu2+esm3
Available with Ubuntu Pro
emacs-lucid 1:29.3+1-1ubuntu2+esm3
Available with Ubuntu Pro
emacs-nox 1:29.3+1-1ubuntu2+esm3
Available with Ubuntu Pro
emacs-pgtk 1:29.3+1-1ubuntu2+esm3
Available with Ubuntu Pro
Ubuntu 22.04 LTS
emacs 1:27.1+1-3ubuntu5.2+esm1
Available with Ubuntu Pro
emacs-bin-common 1:27.1+1-3ubuntu5.2+esm1
Available with Ubuntu Pro
emacs-common 1:27.1+1-3ubuntu5.2+esm1
Available with Ubuntu Pro
emacs-el 1:27.1+1-3ubuntu5.2+esm1
Available with Ubuntu Pro
emacs-gtk 1:27.1+1-3ubuntu5.2+esm1
Available with Ubuntu Pro
emacs-lucid 1:27.1+1-3ubuntu5.2+esm1
Available with Ubuntu Pro
emacs-nox 1:27.1+1-3ubuntu5.2+esm1
Available with Ubuntu Pro
Ubuntu 20.04 LTS
emacs 1:26.3+1-1ubuntu2+esm2
Available with Ubuntu Pro
emacs-bin-common 1:26.3+1-1ubuntu2+esm2
Available with Ubuntu Pro
emacs-common 1:26.3+1-1ubuntu2+esm2
Available with Ubuntu Pro
emacs-el 1:26.3+1-1ubuntu2+esm2
Available with Ubuntu Pro
emacs-gtk 1:26.3+1-1ubuntu2+esm2
Available with Ubuntu Pro
emacs-lucid 1:26.3+1-1ubuntu2+esm2
Available with Ubuntu Pro
emacs-nox 1:26.3+1-1ubuntu2+esm2
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-8011-1
CVE-2024-53920, CVE-2025-1244
[USN-8007-1] ImageMagick vulnerabilities
==========================================================================
Ubuntu Security Notice USN-8007-1
February 03, 2026
imagemagick vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in ImageMagick.
Software Description:
- imagemagick: Image manipulation programs and library
Details:
It was discovered that ImageMagick incorrectly handled image depth values
when processing MIFF image files. An attacker could use this issue to cause
a denial of service or possibly execute arbitrary code. (CVE-2025-43965)
It was discovered that ImageMagick incorrectly processed SVG images and
MSL files. An attacker could possibly use this issue to cause a denial of
service. (CVE-2025-68618)
It was discovered that ImageMagick incorrectly handled memory when
converting MVG files. An attacker could possibly use this issue to cause a
denial of service. (CVE-2025-69204)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
imagemagick-6.q16 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm5
Available with Ubuntu Pro
imagemagick-6.q16hdri 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm5
Available with Ubuntu Pro
libimage-magick-q16-perl 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm5
Available with Ubuntu Pro
libimage-magick-q16hdri-perl 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm5
Available with Ubuntu Pro
libmagick++-6.q16-9t64 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm5
Available with Ubuntu Pro
libmagick++-6.q16hdri-9t64 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm5
Available with Ubuntu Pro
libmagickcore-6-headers 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm5
Available with Ubuntu Pro
libmagickcore-6.q16-7-extra 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm5
Available with Ubuntu Pro
libmagickcore-6.q16-7t64 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm5
Available with Ubuntu Pro
libmagickcore-6.q16hdri-7-extra 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm5
Available with Ubuntu Pro
libmagickcore-6.q16hdri-7t64 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm5
Available with Ubuntu Pro
libmagickwand-6.q16-7t64 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm5
Available with Ubuntu Pro
libmagickwand-6.q16hdri-7t64 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm5
Available with Ubuntu Pro
Ubuntu 22.04 LTS
imagemagick-6.q16 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm6
Available with Ubuntu Pro
imagemagick-6.q16hdri 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm6
Available with Ubuntu Pro
libimage-magick-q16-perl 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm6
Available with Ubuntu Pro
libimage-magick-q16hdri-perl 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm6
Available with Ubuntu Pro
libmagick++-6.q16-8 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm6
Available with Ubuntu Pro
libmagick++-6.q16hdri-8 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm6
Available with Ubuntu Pro
libmagickcore-6.q16-6 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm6
Available with Ubuntu Pro
libmagickcore-6.q16-6-extra 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm6
Available with Ubuntu Pro
libmagickcore-6.q16hdri-6 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm6
Available with Ubuntu Pro
libmagickcore-6.q16hdri-6-extra 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm6
Available with Ubuntu Pro
libmagickwand-6.q16-6 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm6
Available with Ubuntu Pro
libmagickwand-6.q16hdri-6 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm6
Available with Ubuntu Pro
Ubuntu 20.04 LTS
libimage-magick-q16-perl 8:6.9.10.23+dfsg-2.1ubuntu11.11+esm6
Available with Ubuntu Pro
libimage-magick-q16hdri-perl 8:6.9.10.23+dfsg-2.1ubuntu11.11+esm6
Available with Ubuntu Pro
libmagickcore-6.q16-6 8:6.9.10.23+dfsg-2.1ubuntu11.11+esm6
Available with Ubuntu Pro
libmagickcore-6.q16-6-extra 8:6.9.10.23+dfsg-2.1ubuntu11.11+esm6
Available with Ubuntu Pro
libmagickcore-6.q16hdri-6 8:6.9.10.23+dfsg-2.1ubuntu11.11+esm6
Available with Ubuntu Pro
libmagickcore-6.q16hdri-6-extra 8:6.9.10.23+dfsg-2.1ubuntu11.11+esm6
Available with Ubuntu Pro
Ubuntu 18.04 LTS
imagemagick-6.q16 8:6.9.7.4+dfsg-16ubuntu6.15+esm8
Available with Ubuntu Pro
imagemagick-6.q16hdri 8:6.9.7.4+dfsg-16ubuntu6.15+esm8
Available with Ubuntu Pro
libimage-magick-q16-perl 8:6.9.7.4+dfsg-16ubuntu6.15+esm8
Available with Ubuntu Pro
libimage-magick-q16hdri-perl 8:6.9.7.4+dfsg-16ubuntu6.15+esm8
Available with Ubuntu Pro
libmagick++-6.q16-7 8:6.9.7.4+dfsg-16ubuntu6.15+esm8
Available with Ubuntu Pro
libmagick++-6.q16hdri-7 8:6.9.7.4+dfsg-16ubuntu6.15+esm8
Available with Ubuntu Pro
libmagickcore-6-headers 8:6.9.7.4+dfsg-16ubuntu6.15+esm8
Available with Ubuntu Pro
libmagickcore-6.q16-3 8:6.9.7.4+dfsg-16ubuntu6.15+esm8
Available with Ubuntu Pro
libmagickcore-6.q16-3-extra 8:6.9.7.4+dfsg-16ubuntu6.15+esm8
Available with Ubuntu Pro
libmagickcore-6.q16hdri-3 8:6.9.7.4+dfsg-16ubuntu6.15+esm8
Available with Ubuntu Pro
libmagickcore-6.q16hdri-3-extra 8:6.9.7.4+dfsg-16ubuntu6.15+esm8
Available with Ubuntu Pro
libmagickwand-6.q16-3 8:6.9.7.4+dfsg-16ubuntu6.15+esm8
Available with Ubuntu Pro
libmagickwand-6.q16hdri-3 8:6.9.7.4+dfsg-16ubuntu6.15+esm8
Available with Ubuntu Pro
Ubuntu 16.04 LTS
imagemagick-6.q16 8:6.8.9.9-7ubuntu5.16+esm16
Available with Ubuntu Pro
libimage-magick-q16-perl 8:6.8.9.9-7ubuntu5.16+esm16
Available with Ubuntu Pro
libmagick++-6.q16-5v5 8:6.8.9.9-7ubuntu5.16+esm16
Available with Ubuntu Pro
libmagickcore-6-headers 8:6.8.9.9-7ubuntu5.16+esm16
Available with Ubuntu Pro
libmagickcore-6.q16-2 8:6.8.9.9-7ubuntu5.16+esm16
Available with Ubuntu Pro
libmagickcore-6.q16-2-extra 8:6.8.9.9-7ubuntu5.16+esm16
Available with Ubuntu Pro
libmagickwand-6.q16-2 8:6.8.9.9-7ubuntu5.16+esm16
Available with Ubuntu Pro
Ubuntu 14.04 LTS
imagemagick 8:6.7.7.10-6ubuntu3.13+esm17
Available with Ubuntu Pro
imagemagick-common 8:6.7.7.10-6ubuntu3.13+esm17
Available with Ubuntu Pro
libmagick++5 8:6.7.7.10-6ubuntu3.13+esm17
Available with Ubuntu Pro
libmagickcore5 8:6.7.7.10-6ubuntu3.13+esm17
Available with Ubuntu Pro
libmagickcore5-extra 8:6.7.7.10-6ubuntu3.13+esm17
Available with Ubuntu Pro
libmagickwand5 8:6.7.7.10-6ubuntu3.13+esm17
Available with Ubuntu Pro
perlmagick 8:6.7.7.10-6ubuntu3.13+esm17
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-8007-1
CVE-2025-43965, CVE-2025-68618, CVE-2025-69204
Ubuntu Security Notice USN-8007-1
February 03, 2026
imagemagick vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in ImageMagick.
Software Description:
- imagemagick: Image manipulation programs and library
Details:
It was discovered that ImageMagick incorrectly handled image depth values
when processing MIFF image files. An attacker could use this issue to cause
a denial of service or possibly execute arbitrary code. (CVE-2025-43965)
It was discovered that ImageMagick incorrectly processed SVG images and
MSL files. An attacker could possibly use this issue to cause a denial of
service. (CVE-2025-68618)
It was discovered that ImageMagick incorrectly handled memory when
converting MVG files. An attacker could possibly use this issue to cause a
denial of service. (CVE-2025-69204)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
imagemagick-6.q16 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm5
Available with Ubuntu Pro
imagemagick-6.q16hdri 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm5
Available with Ubuntu Pro
libimage-magick-q16-perl 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm5
Available with Ubuntu Pro
libimage-magick-q16hdri-perl 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm5
Available with Ubuntu Pro
libmagick++-6.q16-9t64 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm5
Available with Ubuntu Pro
libmagick++-6.q16hdri-9t64 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm5
Available with Ubuntu Pro
libmagickcore-6-headers 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm5
Available with Ubuntu Pro
libmagickcore-6.q16-7-extra 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm5
Available with Ubuntu Pro
libmagickcore-6.q16-7t64 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm5
Available with Ubuntu Pro
libmagickcore-6.q16hdri-7-extra 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm5
Available with Ubuntu Pro
libmagickcore-6.q16hdri-7t64 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm5
Available with Ubuntu Pro
libmagickwand-6.q16-7t64 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm5
Available with Ubuntu Pro
libmagickwand-6.q16hdri-7t64 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm5
Available with Ubuntu Pro
Ubuntu 22.04 LTS
imagemagick-6.q16 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm6
Available with Ubuntu Pro
imagemagick-6.q16hdri 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm6
Available with Ubuntu Pro
libimage-magick-q16-perl 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm6
Available with Ubuntu Pro
libimage-magick-q16hdri-perl 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm6
Available with Ubuntu Pro
libmagick++-6.q16-8 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm6
Available with Ubuntu Pro
libmagick++-6.q16hdri-8 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm6
Available with Ubuntu Pro
libmagickcore-6.q16-6 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm6
Available with Ubuntu Pro
libmagickcore-6.q16-6-extra 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm6
Available with Ubuntu Pro
libmagickcore-6.q16hdri-6 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm6
Available with Ubuntu Pro
libmagickcore-6.q16hdri-6-extra 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm6
Available with Ubuntu Pro
libmagickwand-6.q16-6 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm6
Available with Ubuntu Pro
libmagickwand-6.q16hdri-6 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm6
Available with Ubuntu Pro
Ubuntu 20.04 LTS
libimage-magick-q16-perl 8:6.9.10.23+dfsg-2.1ubuntu11.11+esm6
Available with Ubuntu Pro
libimage-magick-q16hdri-perl 8:6.9.10.23+dfsg-2.1ubuntu11.11+esm6
Available with Ubuntu Pro
libmagickcore-6.q16-6 8:6.9.10.23+dfsg-2.1ubuntu11.11+esm6
Available with Ubuntu Pro
libmagickcore-6.q16-6-extra 8:6.9.10.23+dfsg-2.1ubuntu11.11+esm6
Available with Ubuntu Pro
libmagickcore-6.q16hdri-6 8:6.9.10.23+dfsg-2.1ubuntu11.11+esm6
Available with Ubuntu Pro
libmagickcore-6.q16hdri-6-extra 8:6.9.10.23+dfsg-2.1ubuntu11.11+esm6
Available with Ubuntu Pro
Ubuntu 18.04 LTS
imagemagick-6.q16 8:6.9.7.4+dfsg-16ubuntu6.15+esm8
Available with Ubuntu Pro
imagemagick-6.q16hdri 8:6.9.7.4+dfsg-16ubuntu6.15+esm8
Available with Ubuntu Pro
libimage-magick-q16-perl 8:6.9.7.4+dfsg-16ubuntu6.15+esm8
Available with Ubuntu Pro
libimage-magick-q16hdri-perl 8:6.9.7.4+dfsg-16ubuntu6.15+esm8
Available with Ubuntu Pro
libmagick++-6.q16-7 8:6.9.7.4+dfsg-16ubuntu6.15+esm8
Available with Ubuntu Pro
libmagick++-6.q16hdri-7 8:6.9.7.4+dfsg-16ubuntu6.15+esm8
Available with Ubuntu Pro
libmagickcore-6-headers 8:6.9.7.4+dfsg-16ubuntu6.15+esm8
Available with Ubuntu Pro
libmagickcore-6.q16-3 8:6.9.7.4+dfsg-16ubuntu6.15+esm8
Available with Ubuntu Pro
libmagickcore-6.q16-3-extra 8:6.9.7.4+dfsg-16ubuntu6.15+esm8
Available with Ubuntu Pro
libmagickcore-6.q16hdri-3 8:6.9.7.4+dfsg-16ubuntu6.15+esm8
Available with Ubuntu Pro
libmagickcore-6.q16hdri-3-extra 8:6.9.7.4+dfsg-16ubuntu6.15+esm8
Available with Ubuntu Pro
libmagickwand-6.q16-3 8:6.9.7.4+dfsg-16ubuntu6.15+esm8
Available with Ubuntu Pro
libmagickwand-6.q16hdri-3 8:6.9.7.4+dfsg-16ubuntu6.15+esm8
Available with Ubuntu Pro
Ubuntu 16.04 LTS
imagemagick-6.q16 8:6.8.9.9-7ubuntu5.16+esm16
Available with Ubuntu Pro
libimage-magick-q16-perl 8:6.8.9.9-7ubuntu5.16+esm16
Available with Ubuntu Pro
libmagick++-6.q16-5v5 8:6.8.9.9-7ubuntu5.16+esm16
Available with Ubuntu Pro
libmagickcore-6-headers 8:6.8.9.9-7ubuntu5.16+esm16
Available with Ubuntu Pro
libmagickcore-6.q16-2 8:6.8.9.9-7ubuntu5.16+esm16
Available with Ubuntu Pro
libmagickcore-6.q16-2-extra 8:6.8.9.9-7ubuntu5.16+esm16
Available with Ubuntu Pro
libmagickwand-6.q16-2 8:6.8.9.9-7ubuntu5.16+esm16
Available with Ubuntu Pro
Ubuntu 14.04 LTS
imagemagick 8:6.7.7.10-6ubuntu3.13+esm17
Available with Ubuntu Pro
imagemagick-common 8:6.7.7.10-6ubuntu3.13+esm17
Available with Ubuntu Pro
libmagick++5 8:6.7.7.10-6ubuntu3.13+esm17
Available with Ubuntu Pro
libmagickcore5 8:6.7.7.10-6ubuntu3.13+esm17
Available with Ubuntu Pro
libmagickcore5-extra 8:6.7.7.10-6ubuntu3.13+esm17
Available with Ubuntu Pro
libmagickwand5 8:6.7.7.10-6ubuntu3.13+esm17
Available with Ubuntu Pro
perlmagick 8:6.7.7.10-6ubuntu3.13+esm17
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-8007-1
CVE-2025-43965, CVE-2025-68618, CVE-2025-69204
[USN-8006-1] MySQL vulnerabilities
==========================================================================
Ubuntu Security Notice USN-8006-1
February 03, 2026
mysql-8.0 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS
Summary:
Several security issues were fixed in MySQL.
Software Description:
- mysql-8.0: MySQL database
Details:
Multiple security issues were discovered in MySQL and this update includes
a new upstream MySQL version to fix these issues.
MySQL has been updated to 8.0.45 in Ubuntu 20.04 LTS.
In addition to security fixes, the updated packages contain bug fixes, new
features, and possibly incompatible changes.
Please see the following for more information:
https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-45.html
https://www.oracle.com/security-alerts/cpujan2026.html
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.04 LTS
mysql-server-8.0 8.0.45-0ubuntu0.20.04.1+esm2
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-8006-1
CVE-2025-53040, CVE-2025-53042, CVE-2025-53044, CVE-2025-53045,
CVE-2025-53053, CVE-2025-53054, CVE-2025-53062, CVE-2025-53069,
CVE-2026-21936, CVE-2026-21937, CVE-2026-21941, CVE-2026-21948,
CVE-2026-21964, CVE-2026-21968
Ubuntu Security Notice USN-8006-1
February 03, 2026
mysql-8.0 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS
Summary:
Several security issues were fixed in MySQL.
Software Description:
- mysql-8.0: MySQL database
Details:
Multiple security issues were discovered in MySQL and this update includes
a new upstream MySQL version to fix these issues.
MySQL has been updated to 8.0.45 in Ubuntu 20.04 LTS.
In addition to security fixes, the updated packages contain bug fixes, new
features, and possibly incompatible changes.
Please see the following for more information:
https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-45.html
https://www.oracle.com/security-alerts/cpujan2026.html
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.04 LTS
mysql-server-8.0 8.0.45-0ubuntu0.20.04.1+esm2
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-8006-1
CVE-2025-53040, CVE-2025-53042, CVE-2025-53044, CVE-2025-53045,
CVE-2025-53053, CVE-2025-53054, CVE-2025-53062, CVE-2025-53069,
CVE-2026-21936, CVE-2026-21937, CVE-2026-21941, CVE-2026-21948,
CVE-2026-21964, CVE-2026-21968
Subscribe to:
Comments (Atom)