Friday, February 6, 2026

[USN-8015-3] Linux kernel (FIPS) vulnerabilities

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmmGLMAFAwAAAAAACgkQZ0GeRcM5nt2j
bgf9EHbtXbQrK00fEmAuKxWBGxaLYX4vDKWKOemeEcg9oTI7Pt6uTTP1dCBdS5ev6GQtt4NF9jVI
y1Eou6zvbN+p+l0wBYUDguT3TydLVioTuGtBH0G52pHP4WKaGQBPGjzGWqqjv8BlhpZxkWhTM8XB
GmBO/OaFOASGU0Aie71sPNvTrCS211NSywMLcU7BmkptdmHRUsjBBh6HadiEGWkyPTHyn5CJ4yqB
WEvxMksgJGmlts1t25Ku1ObCgNrwE9dHXOHkt5voaDpltnTrac4gf35J561FX8ciTcocoUUFwnfa
u87CW2dMv3Y0x1t+qCi5xB6nd4ZnAeWjQvOsAqHoiQ==
=RMQi
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-8015-3
February 06, 2026

linux-fips, linux-aws-fips, linux-gcp-fips vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-aws-fips: Linux kernel for Amazon Web Services (AWS) systems with FIPS
- linux-fips: Linux kernel with FIPS
- linux-gcp-fips: Linux kernel for Google Cloud Platform (GCP) systems with
FIPS

Details:

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Cryptographic API;
- SMB network file system;
- io_uring subsystem;
(CVE-2025-38561, CVE-2025-39698, CVE-2025-40019)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
linux-image-6.8.0-1045-aws-fips 6.8.0-1045.47+fips1
Available with Ubuntu Pro
linux-image-6.8.0-1046-gcp-fips 6.8.0-1046.49+fips1
Available with Ubuntu Pro
linux-image-6.8.0-94-fips 6.8.0-94.96+fips1
Available with Ubuntu Pro
linux-image-aws-fips 6.8.0-1045.47+fips1
Available with Ubuntu Pro
linux-image-aws-fips-6.8 6.8.0-1045.47+fips1
Available with Ubuntu Pro
linux-image-fips 6.8.0-94.96+fips1
Available with Ubuntu Pro
linux-image-fips-6.8 6.8.0-94.96+fips1
Available with Ubuntu Pro
linux-image-gcp-fips 6.8.0-1046.49+fips1
Available with Ubuntu Pro
linux-image-gcp-fips-6.8 6.8.0-1046.49+fips1
Available with Ubuntu Pro

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-8015-3
https://ubuntu.com/security/notices/USN-8015-2
https://ubuntu.com/security/notices/USN-8015-1
CVE-2025-38561, CVE-2025-39698, CVE-2025-40019

Package Information:
https://launchpad.net/ubuntu/+source/linux-aws-fips/6.8.0-1045.47+fips1
https://launchpad.net/ubuntu/+source/linux-fips/6.8.0-94.96+fips1
https://launchpad.net/ubuntu/+source/linux-gcp-fips/6.8.0-1046.49+fips1

Inactive provenpackagers for the F44 cycle

In accordance with FESCo policy[1], the following provenpackagers will
be submitted for removal in two weeks based on a lack of Koji builds
submitted in the last six months. If you received this directly, you
can reply off-list to indicate you should still be in the
provenpackager group.

Note that removal from this group is not a "punishment" or a lack of
appreciation for the work you have done. The intent of the process is
to ensure contributors with distro-wide package privileges are still
active and responsive. This process is done regularly at the branch
point in each release.

[1]
https://docs.fedoraproject.org/en-US/fesco/Provenpackager_policy/#_maintaining_provenpackager_status


Checked 117 provenpackagers
The following 12 provenpackagers have not submitted a Koji build since
at least 2025-08-01 00:00:00:
ignatenkobrain
ausil
jwboyer
till
corsepiu
pbrady
chkr
linville
jnovy
dwmw2
wtogami
steve


--
_______________________________________________
devel-announce mailing list -- devel-announce@lists.fedoraproject.org
To unsubscribe send an email to devel-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/devel-announce@lists.fedoraproject.org
Do not reply to spam, report it: https://forge.fedoraproject.org/infra/tickets/issues/new

Thursday, February 5, 2026

Fedora 44 has been branched

Hi All,

Fedora Linux 44 has now been branched (today, 2026-02-05).
Please be sure to do a git fetch -v to pick up the new branch.

As an additional reminder, Rawhide and Fedora Linux 44 have been
completely isolated from previous releases, which
means that anything you do for f44, you also have to do in the rawhide
branch and do a build there. There will be a Fedora Linux 44 compose and
It will appear in [1] once complete.

Note that until we have a successfull compose of f44, we will
be in a post branch freeze.[2]

Bodhi is currently enabled in the Fedora Linux 44 branch as it is for rawhide,
with automatic update creation. At the hit Beta change freeze point in the
Fedora Linux 44 schedule [3] updates-testing will be enabled and manual
Bodhi updates will be required as in all stable releases.
Additionally, some package updates were unpushed at the time
of mass branching to avoid placing them in an inconsistent state.

Discussions are happening on the #releng:fedoraproject.org matrix channel,
and the Release Engineering ticket for this is [4].

Thanks for understanding.

Fedora Release Engineering

[1] https://dl.fedoraproject.org/pub/fedora/linux/development/44/
[2] https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/#post-branch-freeze
[3] https://fedorapeople.org/groups/schedule/f-44/f-44-key-tasks.html
[4] https://forge.fedoraproject.org/releng/tickets/issues/13185
--
_______________________________________________
devel-announce mailing list -- devel-announce@lists.fedoraproject.org
To unsubscribe send an email to devel-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/devel-announce@lists.fedoraproject.org
Do not reply to spam, report it: https://forge.fedoraproject.org/infra/tickets/issues/new

[USN-8019-1] tracker-miners vulnerabilities

==========================================================================
Ubuntu Security Notice USN-8019-1
February 05, 2026

tracker-miners vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

tracker-miners could be made to crash or run programs as your login if it
opened a specially crafted file.

Software Description:
- tracker-miners: Metadata database, indexer and search tool

Details:

Fatih Çelik discovered that tracker-miners incorrectly handled certain
malformed MP3 files. An attacker could use this issue to cause
tracker-miners to crash, resulting in a denial of service, or possibly
execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.10
tracker-extract 3.8.2-4ubuntu2.1

Ubuntu 24.04 LTS
tracker-extract 3.7.1-1ubuntu0.1

Ubuntu 22.04 LTS
tracker-extract 3.3.3-0ubuntu0.20.04.4

After a standard system update you need to restart your session to make all
the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8019-1
CVE-2026-1764, CVE-2026-1765, CVE-2026-1766, CVE-2026-1767

Package Information:
https://launchpad.net/ubuntu/+source/tracker-miners/3.8.2-4ubuntu2.1
https://launchpad.net/ubuntu/+source/tracker-miners/3.7.1-1ubuntu0.1
https://launchpad.net/ubuntu/+source/tracker-miners/3.3.3-0ubuntu0.20.04.4

[USN-7988-3] Linux kernel vulnerabilities

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmmE9QwFAwAAAAAACgkQZ0GeRcM5nt1S
4QgAt88J9TpOzy0byTWmt+7cIrxfXe6222f1+Eur1iVxQofNk08GpX6qcy6oR4YkYC3/5z5yzwwx
O2bNbsDP/v4tpL3NCh4qP6w5zlgHnCKoRa88Zd5DUFla6LoTfrQ9cj3zyOlD4DsIGYFUTylBpQPZ
sqbkbdZprlLWDP4Lto0dsT1+apDzSGmtF2FbgsgQ/Zd3x6zGqx3yGmT9LGsp4dkkxtQmS4KEZ8F1
1p3II7PF4LzHsndr67ffRGTf240dBLBLQRv5SOOCr0V7SExO+J4BLCqNC7bQocemc3TOfrM5wjkM
fuRAmOFq9A8yl9DBxOYd801hXg1mcfTzfEqCKTNE9A==
=B3mz
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-7988-3
February 05, 2026

linux-azure, linux-azure-4.15, linux-gcp, linux-gcp-4.15 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-azure-4.15: Linux kernel for Microsoft Azure Cloud systems
- linux-gcp-4.15: Linux kernel for Google Cloud Platform (GCP) systems
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-azure: Linux kernel for Microsoft Azure Cloud systems

Details:

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Media drivers;
- NVME drivers;
- File systems infrastructure;
- Timer subsystem;
- Memory management;
- Packet sockets;
(CVE-2022-48986, CVE-2024-27078, CVE-2024-49959, CVE-2024-50195,
CVE-2024-56606, CVE-2024-56756, CVE-2025-39993)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS
linux-image-4.15.0-1181-gcp 4.15.0-1181.198
Available with Ubuntu Pro
linux-image-4.15.0-1196-azure 4.15.0-1196.211
Available with Ubuntu Pro
linux-image-azure-4.15 4.15.0.1196.164
Available with Ubuntu Pro
linux-image-azure-lts-18.04 4.15.0.1196.164
Available with Ubuntu Pro
linux-image-gcp-4.15 4.15.0.1181.194
Available with Ubuntu Pro
linux-image-gcp-lts-18.04 4.15.0.1181.194
Available with Ubuntu Pro

Ubuntu 16.04 LTS
linux-image-4.15.0-1181-gcp 4.15.0-1181.198~16.04.1
Available with Ubuntu Pro
linux-image-gcp 4.15.0.1181.198~16.04.1
Available with Ubuntu Pro
linux-image-gke 4.15.0.1181.198~16.04.1
Available with Ubuntu Pro

Ubuntu 14.04 LTS
linux-image-4.15.0-1196-azure 4.15.0-1196.211~14.04.1
Available with Ubuntu Pro
linux-image-azure 4.15.0.1196.211~14.04.1
Available with Ubuntu Pro

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-7988-3
https://ubuntu.com/security/notices/USN-7988-2
https://ubuntu.com/security/notices/USN-7988-1
CVE-2022-48986, CVE-2024-27078, CVE-2024-49959, CVE-2024-50195,
CVE-2024-56606, CVE-2024-56756, CVE-2025-39993

[USN-8017-1] GLib vulnerabilities

==========================================================================
Ubuntu Security Notice USN-8017-1
February 05, 2026

glib2.0 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in GLib.

Software Description:
- glib2.0: GLib library of C routines

Details:

It was discovered that GLib incorrectly parsed large Base64 data. An
attacker could use this issue to cause GLib to crash, resulting in a
denial of service, or possibly execute arbitrary code. (CVE-2026-1484)

It was discovered that GLib incorrectly parsed certain treemagic files.
An attacker could use this issue to cause GLib to crash, resulting in a
denial of service, or possibly execute arbitrary code. (CVE-2026-1485)

It was discovered that GLib incorrectly handled Unicode case conversion.
An attacker could use this issue to cause GLib to crash, resulting in a
denial of service, or possibly execute arbitrary code. (CVE-2026-1489)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.10
libglib2.0-0t64 2.86.0-2ubuntu0.3
libglib2.0-bin 2.86.0-2ubuntu0.3

Ubuntu 24.04 LTS
libglib2.0-0t64 2.80.0-6ubuntu3.8
libglib2.0-bin 2.80.0-6ubuntu3.8

Ubuntu 22.04 LTS
libglib2.0-0 2.72.4-0ubuntu2.9
libglib2.0-bin 2.72.4-0ubuntu2.9

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8017-1
CVE-2026-1484, CVE-2026-1485, CVE-2026-1489

Package Information:
https://launchpad.net/ubuntu/+source/glib2.0/2.86.0-2ubuntu0.3
https://launchpad.net/ubuntu/+source/glib2.0/2.80.0-6ubuntu3.8
https://launchpad.net/ubuntu/+source/glib2.0/2.72.4-0ubuntu2.9

[USN-8018-1] Python vulnerabilities

==========================================================================
Ubuntu Security Notice USN-8018-1
February 05, 2026

python3.14, python3.13, python3.12, python3.11, python3.10, python3.9,
python3.8, python3.7, python3.6, python3.5, python3.4 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in Python.

Software Description:
- python3.13: An interactive high-level object-oriented language
- python3.14: An interactive high-level object-oriented language
- python3.12: An interactive high-level object-oriented language
- python3.10: An interactive high-level object-oriented language
- python3.11: An interactive high-level object-oriented language
- python3.8: An interactive high-level object-oriented language
- python3.9: An interactive high-level object-oriented language
- python3.6: An interactive high-level object-oriented language
- python3.7: An interactive high-level object-oriented language
- python3.5: An interactive high-level object-oriented language
- python3.4: An interactive high-level object-oriented language

Details:

Denis Ledoux discovered that Python incorrectly parsed email message
headers. An attacker could possibly use this issue to inject arbitrary
headers into email messages. This issue only affected python3.6, python3.7,
python3.8, python3.9, python3.10, python3.11, python3.12, python3.13, and
python3.14 packages. (CVE-2025-11468)

Jacob Walls, Shai Berger, and Natalia Bidart discovered that Python
inefficiently parsed XML input with quadratic complexity. An attacker could
possibly use this issue to cause a denial of service. (CVE-2025-12084)

It was discovered that Python incorrectly parsed malicious plist files. An
attacker could possibly use this issue to cause Python to use excessive
resources, leading to a denial of service. This issue only affected
python3.5, python3.6, python3.7, python3.8, python3.9, python3.10,
python3.11, python3.12, python3.13, and python3.14 packages.
(CVE-2025-13837)

Omar Hasan discovered that Python incorrectly parsed URL mediatypes. An
attacker could possibly use this issue to inject arbitrary HTTP headers.
(CVE-2025-15282)

Omar Hasan discovered that Python incorrectly parsed malicious IMAP inputs.
An attacker could possibly use this issue to inject arbitrary IMAP
commands. (CVE-2025-15366)

Omar Hasan discovered that Python incorrectly parsed malicious POP3 inputs.
An attacker could possibly use this issue to inject arbitrary POP3
commands. (CVE-2025-15367)

Omar Hasan discovered that Python incorrectly parsed malicious HTTP cookie
headers. An attacker could possibly use this issue to inject arbitrary HTTP
headers. (CVE-2026-0672)

Omar Hasan discovered that Python incorrectly parsed malicious HTTP header
names and values. An attacker could possibly use this issue to inject
arbitrary HTTP headers. (CVE-2026-0865)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.10
idle-python3.13 3.13.7-1ubuntu0.3
idle-python3.14 3.14.0-1ubuntu0.2
libpython3.13 3.13.7-1ubuntu0.3
libpython3.13-dev 3.13.7-1ubuntu0.3
libpython3.13-minimal 3.13.7-1ubuntu0.3
libpython3.13-stdlib 3.13.7-1ubuntu0.3
libpython3.13-testsuite 3.13.7-1ubuntu0.3
libpython3.14 3.14.0-1ubuntu0.2
libpython3.14-dev 3.14.0-1ubuntu0.2
libpython3.14-minimal 3.14.0-1ubuntu0.2
libpython3.14-stdlib 3.14.0-1ubuntu0.2
libpython3.14-testsuite 3.14.0-1ubuntu0.2
python3.13 3.13.7-1ubuntu0.3
python3.13-dev 3.13.7-1ubuntu0.3
python3.13-doc 3.13.7-1ubuntu0.3
python3.13-examples 3.13.7-1ubuntu0.3
python3.13-full 3.13.7-1ubuntu0.3
python3.13-gdbm 3.13.7-1ubuntu0.3
python3.13-minimal 3.13.7-1ubuntu0.3
python3.13-nopie 3.13.7-1ubuntu0.3
python3.13-tk 3.13.7-1ubuntu0.3
python3.13-venv 3.13.7-1ubuntu0.3
python3.14 3.14.0-1ubuntu0.2
python3.14-dev 3.14.0-1ubuntu0.2
python3.14-doc 3.14.0-1ubuntu0.2
python3.14-examples 3.14.0-1ubuntu0.2
python3.14-full 3.14.0-1ubuntu0.2
python3.14-gdbm 3.14.0-1ubuntu0.2
python3.14-minimal 3.14.0-1ubuntu0.2
python3.14-nopie 3.14.0-1ubuntu0.2
python3.14-tk 3.14.0-1ubuntu0.2
python3.14-venv 3.14.0-1ubuntu0.2

Ubuntu 24.04 LTS
idle-python3.12 3.12.3-1ubuntu0.11
libpython3.12-dev 3.12.3-1ubuntu0.11
libpython3.12-minimal 3.12.3-1ubuntu0.11
libpython3.12-stdlib 3.12.3-1ubuntu0.11
libpython3.12-testsuite 3.12.3-1ubuntu0.11
libpython3.12t64 3.12.3-1ubuntu0.11
python3.12 3.12.3-1ubuntu0.11
python3.12-dev 3.12.3-1ubuntu0.11
python3.12-doc 3.12.3-1ubuntu0.11
python3.12-examples 3.12.3-1ubuntu0.11
python3.12-full 3.12.3-1ubuntu0.11
python3.12-minimal 3.12.3-1ubuntu0.11
python3.12-nopie 3.12.3-1ubuntu0.11
python3.12-venv 3.12.3-1ubuntu0.11

Ubuntu 22.04 LTS
idle-python3.10 3.10.12-1~22.04.14
idle-python3.11 3.11.0~rc1-1~22.04.1~esm8
Available with Ubuntu Pro
libpython3.10 3.10.12-1~22.04.14
libpython3.10-dev 3.10.12-1~22.04.14
libpython3.10-minimal 3.10.12-1~22.04.14
libpython3.10-stdlib 3.10.12-1~22.04.14
libpython3.10-testsuite 3.10.12-1~22.04.14
libpython3.11 3.11.0~rc1-1~22.04.1~esm8
Available with Ubuntu Pro
libpython3.11-dev 3.11.0~rc1-1~22.04.1~esm8
Available with Ubuntu Pro
libpython3.11-minimal 3.11.0~rc1-1~22.04.1~esm8
Available with Ubuntu Pro
libpython3.11-stdlib 3.11.0~rc1-1~22.04.1~esm8
Available with Ubuntu Pro
libpython3.11-testsuite 3.11.0~rc1-1~22.04.1~esm8
Available with Ubuntu Pro
python3.10 3.10.12-1~22.04.14
python3.10-dev 3.10.12-1~22.04.14
python3.10-doc 3.10.12-1~22.04.14
python3.10-examples 3.10.12-1~22.04.14
python3.10-full 3.10.12-1~22.04.14
python3.10-minimal 3.10.12-1~22.04.14
python3.10-nopie 3.10.12-1~22.04.14
python3.10-venv 3.10.12-1~22.04.14
python3.11 3.11.0~rc1-1~22.04.1~esm8
Available with Ubuntu Pro
python3.11-dev 3.11.0~rc1-1~22.04.1~esm8
Available with Ubuntu Pro
python3.11-doc 3.11.0~rc1-1~22.04.1~esm8
Available with Ubuntu Pro
python3.11-examples 3.11.0~rc1-1~22.04.1~esm8
Available with Ubuntu Pro
python3.11-full 3.11.0~rc1-1~22.04.1~esm8
Available with Ubuntu Pro
python3.11-minimal 3.11.0~rc1-1~22.04.1~esm8
Available with Ubuntu Pro
python3.11-nopie 3.11.0~rc1-1~22.04.1~esm8
Available with Ubuntu Pro
python3.11-venv 3.11.0~rc1-1~22.04.1~esm8
Available with Ubuntu Pro

Ubuntu 20.04 LTS
idle-python3.8 3.8.10-0ubuntu1~20.04.18+esm5
Available with Ubuntu Pro
idle-python3.9 3.9.5-3ubuntu0~20.04.1+esm9
Available with Ubuntu Pro
libpython3.8 3.8.10-0ubuntu1~20.04.18+esm5
Available with Ubuntu Pro
libpython3.8-dev 3.8.10-0ubuntu1~20.04.18+esm5
Available with Ubuntu Pro
libpython3.8-minimal 3.8.10-0ubuntu1~20.04.18+esm5
Available with Ubuntu Pro
libpython3.8-stdlib 3.8.10-0ubuntu1~20.04.18+esm5
Available with Ubuntu Pro
libpython3.8-testsuite 3.8.10-0ubuntu1~20.04.18+esm5
Available with Ubuntu Pro
libpython3.9 3.9.5-3ubuntu0~20.04.1+esm9
Available with Ubuntu Pro
libpython3.9-dev 3.9.5-3ubuntu0~20.04.1+esm9
Available with Ubuntu Pro
libpython3.9-minimal 3.9.5-3ubuntu0~20.04.1+esm9
Available with Ubuntu Pro
libpython3.9-stdlib 3.9.5-3ubuntu0~20.04.1+esm9
Available with Ubuntu Pro
libpython3.9-testsuite 3.9.5-3ubuntu0~20.04.1+esm9
Available with Ubuntu Pro
python3.8 3.8.10-0ubuntu1~20.04.18+esm5
Available with Ubuntu Pro
python3.8-dev 3.8.10-0ubuntu1~20.04.18+esm5
Available with Ubuntu Pro
python3.8-doc 3.8.10-0ubuntu1~20.04.18+esm5
Available with Ubuntu Pro
python3.8-examples 3.8.10-0ubuntu1~20.04.18+esm5
Available with Ubuntu Pro
python3.8-full 3.8.10-0ubuntu1~20.04.18+esm5
Available with Ubuntu Pro
python3.8-minimal 3.8.10-0ubuntu1~20.04.18+esm5
Available with Ubuntu Pro
python3.8-venv 3.8.10-0ubuntu1~20.04.18+esm5
Available with Ubuntu Pro
python3.9 3.9.5-3ubuntu0~20.04.1+esm9
Available with Ubuntu Pro
python3.9-dev 3.9.5-3ubuntu0~20.04.1+esm9
Available with Ubuntu Pro
python3.9-doc 3.9.5-3ubuntu0~20.04.1+esm9
Available with Ubuntu Pro
python3.9-examples 3.9.5-3ubuntu0~20.04.1+esm9
Available with Ubuntu Pro
python3.9-full 3.9.5-3ubuntu0~20.04.1+esm9
Available with Ubuntu Pro
python3.9-minimal 3.9.5-3ubuntu0~20.04.1+esm9
Available with Ubuntu Pro
python3.9-venv 3.9.5-3ubuntu0~20.04.1+esm9
Available with Ubuntu Pro

Ubuntu 18.04 LTS
idle-python3.6 3.6.9-1~18.04ubuntu1.13+esm8
Available with Ubuntu Pro
idle-python3.7 3.7.5-2ubuntu1~18.04.2+esm9
Available with Ubuntu Pro
idle-python3.8 3.8.0-3ubuntu1~18.04.2+esm9
Available with Ubuntu Pro
libpython3.6 3.6.9-1~18.04ubuntu1.13+esm8
Available with Ubuntu Pro
libpython3.6-dev 3.6.9-1~18.04ubuntu1.13+esm8
Available with Ubuntu Pro
libpython3.6-minimal 3.6.9-1~18.04ubuntu1.13+esm8
Available with Ubuntu Pro
libpython3.6-stdlib 3.6.9-1~18.04ubuntu1.13+esm8
Available with Ubuntu Pro
libpython3.6-testsuite 3.6.9-1~18.04ubuntu1.13+esm8
Available with Ubuntu Pro
libpython3.7 3.7.5-2ubuntu1~18.04.2+esm9
Available with Ubuntu Pro
libpython3.7-dev 3.7.5-2ubuntu1~18.04.2+esm9
Available with Ubuntu Pro
libpython3.7-minimal 3.7.5-2ubuntu1~18.04.2+esm9
Available with Ubuntu Pro
libpython3.7-stdlib 3.7.5-2ubuntu1~18.04.2+esm9
Available with Ubuntu Pro
libpython3.7-testsuite 3.7.5-2ubuntu1~18.04.2+esm9
Available with Ubuntu Pro
libpython3.8 3.8.0-3ubuntu1~18.04.2+esm9
Available with Ubuntu Pro
libpython3.8-dev 3.8.0-3ubuntu1~18.04.2+esm9
Available with Ubuntu Pro
libpython3.8-minimal 3.8.0-3ubuntu1~18.04.2+esm9
Available with Ubuntu Pro
libpython3.8-stdlib 3.8.0-3ubuntu1~18.04.2+esm9
Available with Ubuntu Pro
libpython3.8-testsuite 3.8.0-3ubuntu1~18.04.2+esm9
Available with Ubuntu Pro
python3.6 3.6.9-1~18.04ubuntu1.13+esm8
Available with Ubuntu Pro
python3.6-dev 3.6.9-1~18.04ubuntu1.13+esm8
Available with Ubuntu Pro
python3.6-doc 3.6.9-1~18.04ubuntu1.13+esm8
Available with Ubuntu Pro
python3.6-examples 3.6.9-1~18.04ubuntu1.13+esm8
Available with Ubuntu Pro
python3.6-minimal 3.6.9-1~18.04ubuntu1.13+esm8
Available with Ubuntu Pro
python3.6-venv 3.6.9-1~18.04ubuntu1.13+esm8
Available with Ubuntu Pro
python3.7 3.7.5-2ubuntu1~18.04.2+esm9
Available with Ubuntu Pro
python3.7-dev 3.7.5-2ubuntu1~18.04.2+esm9
Available with Ubuntu Pro
python3.7-doc 3.7.5-2ubuntu1~18.04.2+esm9
Available with Ubuntu Pro
python3.7-examples 3.7.5-2ubuntu1~18.04.2+esm9
Available with Ubuntu Pro
python3.7-minimal 3.7.5-2ubuntu1~18.04.2+esm9
Available with Ubuntu Pro
python3.7-venv 3.7.5-2ubuntu1~18.04.2+esm9
Available with Ubuntu Pro
python3.8 3.8.0-3ubuntu1~18.04.2+esm9
Available with Ubuntu Pro
python3.8-dev 3.8.0-3ubuntu1~18.04.2+esm9
Available with Ubuntu Pro
python3.8-examples 3.8.0-3ubuntu1~18.04.2+esm9
Available with Ubuntu Pro
python3.8-minimal 3.8.0-3ubuntu1~18.04.2+esm9
Available with Ubuntu Pro
python3.8-venv 3.8.0-3ubuntu1~18.04.2+esm9
Available with Ubuntu Pro

Ubuntu 16.04 LTS
idle-python3.5 3.5.2-2ubuntu0~16.04.13+esm21
Available with Ubuntu Pro
libpython3.5 3.5.2-2ubuntu0~16.04.13+esm21
Available with Ubuntu Pro
libpython3.5-dev 3.5.2-2ubuntu0~16.04.13+esm21
Available with Ubuntu Pro
libpython3.5-minimal 3.5.2-2ubuntu0~16.04.13+esm21
Available with Ubuntu Pro
libpython3.5-stdlib 3.5.2-2ubuntu0~16.04.13+esm21
Available with Ubuntu Pro
libpython3.5-testsuite 3.5.2-2ubuntu0~16.04.13+esm21
Available with Ubuntu Pro
python3.5 3.5.2-2ubuntu0~16.04.13+esm21
Available with Ubuntu Pro
python3.5-dev 3.5.2-2ubuntu0~16.04.13+esm21
Available with Ubuntu Pro
python3.5-doc 3.5.2-2ubuntu0~16.04.13+esm21
Available with Ubuntu Pro
python3.5-examples 3.5.2-2ubuntu0~16.04.13+esm21
Available with Ubuntu Pro
python3.5-minimal 3.5.2-2ubuntu0~16.04.13+esm21
Available with Ubuntu Pro
python3.5-venv 3.5.2-2ubuntu0~16.04.13+esm21
Available with Ubuntu Pro

Ubuntu 14.04 LTS
idle-python3.4 3.4.3-1ubuntu1~14.04.7+esm19
Available with Ubuntu Pro
idle-python3.5 3.5.2-2ubuntu0~16.04.4~14.04.1+esm9
Available with Ubuntu Pro
libpython3.4 3.4.3-1ubuntu1~14.04.7+esm19
Available with Ubuntu Pro
libpython3.4-dev 3.4.3-1ubuntu1~14.04.7+esm19
Available with Ubuntu Pro
libpython3.4-minimal 3.4.3-1ubuntu1~14.04.7+esm19
Available with Ubuntu Pro
libpython3.4-stdlib 3.4.3-1ubuntu1~14.04.7+esm19
Available with Ubuntu Pro
libpython3.4-testsuite 3.4.3-1ubuntu1~14.04.7+esm19
Available with Ubuntu Pro
libpython3.5 3.5.2-2ubuntu0~16.04.4~14.04.1+esm9
Available with Ubuntu Pro
libpython3.5-dev 3.5.2-2ubuntu0~16.04.4~14.04.1+esm9
Available with Ubuntu Pro
libpython3.5-minimal 3.5.2-2ubuntu0~16.04.4~14.04.1+esm9
Available with Ubuntu Pro
libpython3.5-stdlib 3.5.2-2ubuntu0~16.04.4~14.04.1+esm9
Available with Ubuntu Pro
libpython3.5-testsuite 3.5.2-2ubuntu0~16.04.4~14.04.1+esm9
Available with Ubuntu Pro
python3.4 3.4.3-1ubuntu1~14.04.7+esm19
Available with Ubuntu Pro
python3.4-dev 3.4.3-1ubuntu1~14.04.7+esm19
Available with Ubuntu Pro
python3.4-doc 3.4.3-1ubuntu1~14.04.7+esm19
Available with Ubuntu Pro
python3.4-examples 3.4.3-1ubuntu1~14.04.7+esm19
Available with Ubuntu Pro
python3.4-minimal 3.4.3-1ubuntu1~14.04.7+esm19
Available with Ubuntu Pro
python3.4-venv 3.4.3-1ubuntu1~14.04.7+esm19
Available with Ubuntu Pro
python3.5 3.5.2-2ubuntu0~16.04.4~14.04.1+esm9
Available with Ubuntu Pro
python3.5-dev 3.5.2-2ubuntu0~16.04.4~14.04.1+esm9
Available with Ubuntu Pro
python3.5-doc 3.5.2-2ubuntu0~16.04.4~14.04.1+esm9
Available with Ubuntu Pro
python3.5-examples 3.5.2-2ubuntu0~16.04.4~14.04.1+esm9
Available with Ubuntu Pro
python3.5-minimal 3.5.2-2ubuntu0~16.04.4~14.04.1+esm9
Available with Ubuntu Pro
python3.5-venv 3.5.2-2ubuntu0~16.04.4~14.04.1+esm9
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8018-1
CVE-2025-11468, CVE-2025-12084, CVE-2025-13837, CVE-2025-15282,
CVE-2025-15366, CVE-2025-15367, CVE-2026-0672, CVE-2026-0865

Package Information:
https://launchpad.net/ubuntu/+source/python3.13/3.13.7-1ubuntu0.3
https://launchpad.net/ubuntu/+source/python3.14/3.14.0-1ubuntu0.2
https://launchpad.net/ubuntu/+source/python3.12/3.12.3-1ubuntu0.11

Wednesday, February 4, 2026

Fedora 44 Branching delay (now 2026-02-05)

Greetings.

Per the schedule we were planning on branching Fedora 44 off rawhide on
tuesday ( 2026-02-03 ). However due to a lot of in flight changes,
we have delayed things, first until today, now until tomorrow morning
( 2026-02-05 15UTC).

In flight right before branching was:

- A mini mass rebuild for ghc (completed now)
- A mini mass rebuild for golang (completed now)
- Problems with the fedora-release/systemd kmscon changes not passing gating
(reverted for now until we can figure out the bug)
- The gnome 50 update not passing gating
(still being handled, but getting closer)

Moving forward if everyone could try not to land big changes right at
branching time that would be great. :)

Hopefully things will go smoothly tomorrow and sorry for the delay.

kevin
--
_______________________________________________
devel-announce mailing list -- devel-announce@lists.fedoraproject.org
To unsubscribe send an email to devel-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/devel-announce@lists.fedoraproject.org
Do not reply to spam, report it: https://forge.fedoraproject.org/infra/tickets/issues/new

[USN-8016-1] Linux kernel (NVIDIA) vulnerabilities

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmmDsi8FAwAAAAAACgkQZ0GeRcM5nt0N
aQf/WO4sNDsZCLgK711qvBJj38FPeIDqa7mMIqTItltsVLOw3yjij6VAQdlom+4HAaqBQwPBT2Xz
Ce9rCz5vUvhVLb0JqSqonNvstfjIlY2dgE2eG3kj0fTxNtnX0fPTNPCMDwPYGmILEugMWZ6/1sfT
vDgKjg8QJvpoS80+SU5NGrfSCVXNs2aMkH9VhKT6D9GE10BmUPktJUC1Wf4AJapyoDyftzCGcfpQ
O+1pDNmL0YXWeAxfzNQtmC442fF14MmkcUmvdZkCt2hcv/Uk7kcUPNI3vlys+eQRje+o461jNneM
/EZyPa419ozfgzfucZQT8+E40NxfT3xwjw+5L3dNyg==
=8VUS
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-8016-1
February 04, 2026

linux-nvidia, linux-nvidia-6.8, linux-nvidia-lowlatency vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-nvidia: Linux kernel for NVIDIA systems
- linux-nvidia-lowlatency: Linux low latency kernel for NVIDIA systems
- linux-nvidia-6.8: Linux kernel for NVIDIA systems

Details:

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Cryptographic API;
- SPI subsystem;
- SMB network file system;
- io_uring subsystem;
(CVE-2025-38561, CVE-2025-39698, CVE-2025-40019, CVE-2025-68746)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
linux-image-6.8.0-1045-nvidia 6.8.0-1045.48
linux-image-6.8.0-1045-nvidia-64k 6.8.0-1045.48
linux-image-6.8.0-1045-nvidia-lowlatency 6.8.0-1045.48.1
linux-image-6.8.0-1045-nvidia-lowlatency-64k 6.8.0-1045.48.1
linux-image-nvidia 6.8.0-1045.48
linux-image-nvidia-6.8 6.8.0-1045.48
linux-image-nvidia-64k 6.8.0-1045.48
linux-image-nvidia-64k-6.8 6.8.0-1045.48
linux-image-nvidia-lowlatency 6.8.0-1045.48.1
linux-image-nvidia-lowlatency-6.8 6.8.0-1045.48.1
linux-image-nvidia-lowlatency-64k 6.8.0-1045.48.1
linux-image-nvidia-lowlatency-64k-6.8 6.8.0-1045.48.1

Ubuntu 22.04 LTS
linux-image-6.8.0-1045-nvidia 6.8.0-1045.48~22.04.1
linux-image-6.8.0-1045-nvidia-64k 6.8.0-1045.48~22.04.1
linux-image-nvidia-6.8 6.8.0-1045.48~22.04.1
linux-image-nvidia-64k-6.8 6.8.0-1045.48~22.04.1
linux-image-nvidia-64k-hwe-22.04 6.8.0-1045.48~22.04.1
linux-image-nvidia-hwe-22.04 6.8.0-1045.48~22.04.1

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-8016-1
CVE-2025-38561, CVE-2025-39698, CVE-2025-40019, CVE-2025-68746

Package Information:
https://launchpad.net/ubuntu/+source/linux-nvidia/6.8.0-1045.48
https://launchpad.net/ubuntu/+source/linux-nvidia-lowlatency/6.8.0-1045.48.1
https://launchpad.net/ubuntu/+source/linux-nvidia-6.8/6.8.0-1045.48~22.04.1

[USN-8015-2] Linux kernel (Real-time) vulnerabilities

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmmDsh8FAwAAAAAACgkQZ0GeRcM5nt08
cQgAnKAsC66s4jVTGGSwbdDtmdab1BWh41Til6RM6JbWyQlBZLUCetk3I/TyjyKKiHOoEzcGwKVM
PvRavonkTSHzgAAMTJvay0IO67XfmGTC4ru79aiUK1IaV1RoGk+bc6x8soujYAQnVXMERA9ZRxTq
OsLH6j5DAStUmeE0PxDU2bZii3ZCvw+/YTx+qIxoOoDmfRsLBOxlSJlrPZDrbwe9jtmu5u/LA0rc
zRDxalOyWvL8PGBya7gw1tKJsW0QgYM4dRc4BGoTZLBW0cBPuFvl5lz28bmL9iUJoctJOdQWd1wA
KDk0xZJZMZ8exFRnJ6LNAk1yEio+dWFWPKxC0HKsEQ==
=Mp/+
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-8015-2
February 04, 2026

linux-realtime, linux-realtime-6.8, linux-raspi-realtime vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-raspi-realtime: Linux kernel for Raspberry Pi Real-time systems
- linux-realtime: Linux kernel for Real-time systems
- linux-realtime-6.8: Linux kernel for Real-time systems

Details:

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Cryptographic API;
- SMB network file system;
- io_uring subsystem;
(CVE-2025-38561, CVE-2025-39698, CVE-2025-40019)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
linux-image-6.8.0-2036-raspi-realtime 6.8.0-2036.37
Available with Ubuntu Pro
linux-image-6.8.1-1040-realtime 6.8.1-1040.41
Available with Ubuntu Pro
linux-image-intel-iot-realtime 6.8.1-1040.41
Available with Ubuntu Pro
linux-image-raspi-realtime 6.8.0-2036.37
Available with Ubuntu Pro
linux-image-raspi-realtime-6.8 6.8.0-2036.37
Available with Ubuntu Pro
linux-image-realtime 6.8.1-1040.41
Available with Ubuntu Pro
linux-image-realtime-6.8.1 6.8.1-1040.41
Available with Ubuntu Pro

Ubuntu 22.04 LTS
linux-image-6.8.1-1040-realtime 6.8.1-1040.41~22.04.1
Available with Ubuntu Pro
linux-image-realtime-6.8.1 6.8.1-1040.41~22.04.1
Available with Ubuntu Pro
linux-image-realtime-hwe-22.04 6.8.1-1040.41~22.04.1
Available with Ubuntu Pro

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-8015-2
https://ubuntu.com/security/notices/USN-8015-1
CVE-2025-38561, CVE-2025-39698, CVE-2025-40019

Package Information:
https://launchpad.net/ubuntu/+source/linux-raspi-realtime/6.8.0-2036.37
https://launchpad.net/ubuntu/+source/linux-realtime/6.8.1-1040.41

https://launchpad.net/ubuntu/+source/linux-realtime-6.8/6.8.1-1040.41~22.04.1

[USN-8013-3] Linux kernel (Real-time) vulnerabilities

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmmDsgEFAwAAAAAACgkQZ0GeRcM5nt2g
3gf8C6oAIH5/2ZH+e2H84C83xu/KvXLQayFQ3+gVmm24YBuG26MChcvi0HCd1Yv94CbjHrp00gOi
1rOzD6PDfI0AqbunLnc0KywCB8hxrxnIIyXFBy9Des74MbKtuqXR2sU3i78m0j5Dd6hD7mTUDKWu
zrGPZRCU3xDJAVbmtjgDmbOobKu01vi4IZx10cLGAWUZv1jO4qWMRsPmBksDsuRFTDEtNMoXJOIH
SgjI0ffL4uXZrhCTtrWypSDlmcRr9ec/oFiu1ivSG83oVknb1VIH25+mVL0j+AJZ3rsSMRoWJvEz
xpCMvZqQvWgzuGrwdgu0ABVv3VsJKGTOlQ8MHvUOYA==
=Uhlz
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-8013-3
February 04, 2026

linux-realtime, linux-intel-iot-realtime vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-intel-iot-realtime: Linux kernel for Intel IoT Real-time platforms
- linux-realtime: Linux kernel for Real-time systems

Details:

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Cryptographic API;
- SMB network file system;
(CVE-2025-38561, CVE-2025-40019)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS
linux-image-5.15.0-1091-intel-iot-realtime 5.15.0-1091.93
Available with Ubuntu Pro
linux-image-5.15.0-1098-realtime 5.15.0-1098.107
Available with Ubuntu Pro
linux-image-intel-iot-realtime 5.15.0.1091.95
Available with Ubuntu Pro
linux-image-intel-iot-realtime-5.15 5.15.0.1091.95
Available with Ubuntu Pro
linux-image-realtime 5.15.0.1098.102
Available with Ubuntu Pro
linux-image-realtime-5.15 5.15.0.1098.102
Available with Ubuntu Pro

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-8013-3
https://ubuntu.com/security/notices/USN-8013-2
https://ubuntu.com/security/notices/USN-8013-1
CVE-2025-38561, CVE-2025-40019

Package Information:
https://launchpad.net/ubuntu/+source/linux-intel-iot-realtime/5.15.0-1091.93
https://launchpad.net/ubuntu/+source/linux-realtime/5.15.0-1098.107

[USN-8013-2] Linux kernel (FIPS) vulnerabilities

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmmDse0FAwAAAAAACgkQZ0GeRcM5nt1P
eQgAgpVpNM/3e9BDgJvmLKTHKAeOXF7EjAYJdZKcOPc1mhs4G0QOSX2rXuaQ+DNQU2+BP2Hriq1V
Trq2tvayq/+Dx3AuTBrhiAA4x+IYDGydBDQ1EcBIT6Qnql1YLSTm9hP5TUm2c2m6hPz2cOHOxoio
YEidK+FGHc3M/xbOravoP/8eCzjdSTole39G2RXLviPWm+Uk6xxHGjQ2xCjY7CSbpqGlF2vwwykw
fdo479CQtwUL/fVVa+P/C0s/foC20G1Y3qK89QHqsUvsZ9NT0b2ibBR/fKiIoS+2fycSvME9qNkS
AcKZwhmYgHkxjYymdN7UpQq1P6Ilinb+R1N+xtAhxw==
=0MWT
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-8013-2
February 04, 2026

linux-fips, linux-aws-fips, linux-azure-fips, linux-gcp-fips
vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-aws-fips: Linux kernel for Amazon Web Services (AWS) systems with FIPS
- linux-azure-fips: Linux kernel for Microsoft Azure Cloud systems with FIPS
- linux-fips: Linux kernel with FIPS
- linux-gcp-fips: Linux kernel for Google Cloud Platform (GCP) systems with
FIPS

Details:

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Cryptographic API;
- SMB network file system;
(CVE-2025-38561, CVE-2025-40019)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS
linux-image-5.15.0-1099-aws-fips 5.15.0-1099.106+fips1
Available with Ubuntu Pro
linux-image-5.15.0-1099-gcp-fips 5.15.0-1099.108+fips1
Available with Ubuntu Pro
linux-image-5.15.0-1103-azure-fips 5.15.0-1103.112+fips1
Available with Ubuntu Pro
linux-image-5.15.0-168-fips 5.15.0-168.178+fips1
Available with Ubuntu Pro
linux-image-aws-fips 5.15.0.1099.95
Available with Ubuntu Pro
linux-image-aws-fips-5.15 5.15.0.1099.95
Available with Ubuntu Pro
linux-image-azure-fips 5.15.0.1103.88
Available with Ubuntu Pro
linux-image-azure-fips-5.15 5.15.0.1103.88
Available with Ubuntu Pro
linux-image-fips 5.15.0.168.96
Available with Ubuntu Pro
linux-image-fips-5.15 5.15.0.168.96
Available with Ubuntu Pro
linux-image-gcp-fips 5.15.0.1099.89
Available with Ubuntu Pro
linux-image-gcp-fips-5.15 5.15.0.1099.89
Available with Ubuntu Pro

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-8013-2
https://ubuntu.com/security/notices/USN-8013-1
CVE-2025-38561, CVE-2025-40019

Package Information:
https://launchpad.net/ubuntu/+source/linux-aws-fips/5.15.0-1099.106+fips1
https://launchpad.net/ubuntu/+source/linux-azure-fips/5.15.0-1103.112+fips1
https://launchpad.net/ubuntu/+source/linux-fips/5.15.0-168.178+fips1
https://launchpad.net/ubuntu/+source/linux-gcp-fips/5.15.0-1099.108+fips1