Thursday, February 12, 2026
[USN-7988-5] Linux kernel (Azure) vulnerabilities
wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmmOHVYFAwAAAAAACgkQZ0GeRcM5nt2N
bgf/XMGnvl7W0IVSD+JmMRkj5r8VM6XOhz+rrTnI4Wc9XG3BpYA6ZQepAHbySxTdNdg6TWdqSzJj
YpBzIGAcfPjUgRs87mdcOnicTlt6ysnuahf9XDs1IUCQPxNynViVWZj/QpuSBh9z3OAFj8bbLitA
vMsw90Mkn5IE+N77E7iNAXb7Idl0jDCdBy8lJBE8zFBoURrMZB8Vc+NYT14/dcRuxa5jwKtI1i4Q
6csqFEsTdjegDVGGR+88jzOiRSFYmkGZxytfBxYPUTaY8v76k5v0RsYS/ueM/uYl78zQ7GFkbQby
GYyB1RchEIF2Ms38XgElKfOXReCeSfRMZDB4ZOYHzg==
=c2HD
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-7988-5
February 12, 2026
linux-azure, linux-azure-fips vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-azure-fips: Linux kernel for Microsoft Azure Cloud systems with FIPS
- linux-azure: Linux kernel for Microsoft Azure Cloud systems
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Media drivers;
- NVME drivers;
- File systems infrastructure;
- Timer subsystem;
- Memory management;
- Packet sockets;
(CVE-2022-48986, CVE-2024-27078, CVE-2024-49959, CVE-2024-50195,
CVE-2024-56606, CVE-2024-56756, CVE-2025-39993)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 LTS
linux-image-4.15.0-2105-azure-fips 4.15.0-2105.111
Available with Ubuntu Pro
linux-image-azure-fips 4.15.0.2105.101
Available with Ubuntu Pro
linux-image-azure-fips-4.15 4.15.0.2105.101
Available with Ubuntu Pro
Ubuntu 16.04 LTS
linux-image-4.15.0-1196-azure 4.15.0-1196.211~16.04.1
Available with Ubuntu Pro
linux-image-azure 4.15.0.1196.211~16.04.1
Available with Ubuntu Pro
linux-image-azure-edge 4.15.0.1196.211~16.04.1
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-7988-5
https://ubuntu.com/security/notices/USN-7988-4
https://ubuntu.com/security/notices/USN-7988-3
https://ubuntu.com/security/notices/USN-7988-2
https://ubuntu.com/security/notices/USN-7988-1
CVE-2022-48986, CVE-2024-27078, CVE-2024-49959, CVE-2024-50195,
CVE-2024-56606, CVE-2024-56756, CVE-2025-39993
Package Information:
https://launchpad.net/ubuntu/+source/linux-azure-fips/4.15.0-2105.111
[USN-7990-4] Linux kernel (Oracle) vulnerabilities
wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmmOHWoFAwAAAAAACgkQZ0GeRcM5nt35
swf+KggtLmn6MDY/7dgI9qrHH9U/DUw3ybmqdIeMqls7mIgBf9SpVy5P7j072bsff/seyk/6gauX
HvRAFs3vnx/vuoJWAgaWFGnOWPOkAait/X+clSuOcmfDsFP3RjbXx3Ci9nBNHS2NHI6H1J5u1Wfq
KLgZ1hStvUfDxBTnaBzkBW2M5/ujk3Hy2y86l7O6+ZvT1Xbf3vPUHnqr/6m+V/j8Sl8HXDWXI4/W
+/u7eLuy2rUybsPolDjOpB0kUHCEFZS5oRVO/XDjv5H678ILgvbQrtkDxaPQlgaIypJ5Mv34hssB
buxcOUxtFJIylgbW005OSJSKKCBf9l0HGelHZ3xsJw==
=ud29
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-7990-4
February 12, 2026
linux-oracle, linux-oracle-5.4 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-oracle-5.4: Linux kernel for Oracle Cloud systems
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Cryptographic API;
- Padata parallel execution mechanism;
- Netfilter;
(CVE-2022-49698, CVE-2025-21726, CVE-2025-40019)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.04 LTS
linux-image-5.4.0-1152-oracle 5.4.0-1152.162
Available with Ubuntu Pro
linux-image-oracle-5.4 5.4.0.1152.146
Available with Ubuntu Pro
linux-image-oracle-lts-20.04 5.4.0.1152.146
Available with Ubuntu Pro
Ubuntu 18.04 LTS
linux-image-5.4.0-1152-oracle 5.4.0-1152.162~18.04.1
Available with Ubuntu Pro
linux-image-oracle 5.4.0.1152.162~18.04.1
Available with Ubuntu Pro
linux-image-oracle-5.4 5.4.0.1152.162~18.04.1
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-7990-4
https://ubuntu.com/security/notices/USN-7990-3
https://ubuntu.com/security/notices/USN-7990-2
https://ubuntu.com/security/notices/USN-7990-1
CVE-2022-49698, CVE-2025-21726, CVE-2025-40019
[USN-8037-1] DNSdist vulnerabilities
Ubuntu Security Notice USN-8037-1
February 12, 2026
dnsdist vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in dnsdist.
Software Description:
- dnsdist: A highly DNS-, DoS- and abuse-aware loadbalancer
Details:
It was discovered that HTTP/2, which is used/vendored by DNSdist, did not
properly account for resources when handling client-triggered stream
resets. An attacker could possibly use this issue to cause a
denial of service. (CVE-2025-8671)
It was discovered that DNSdist did not properly manage memory limits when
handling an unlimited number of queries on a single TCP connection. An
attacker could possibly use this issue to cause a denial of service.
(CVE-2025-30193)
It was discovered that DNSdist, when configured with the nghttp2 library,
did not correctly process certain DNS over HTTPS queries. An attacker
could possibly use this cause a denial of service. (CVE-2025-30187)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 25.10
dnsdist 1.9.10-1ubuntu0.1
Ubuntu 24.04 LTS
dnsdist 1.8.3-2ubuntu0.1~esm1
Available with Ubuntu Pro
Ubuntu 22.04 LTS
dnsdist 1.6.1-1ubuntu0.1~esm2
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-8037-1
CVE-2025-30187, CVE-2025-30193, CVE-2025-8671
Package Information:
https://launchpad.net/ubuntu/+source/dnsdist/1.9.10-1ubuntu0.1
Ubuntu 24.04.4 LTS released
The Ubuntu team is pleased to announce the release of Ubuntu 24.04.4 LTS
(Long-Term Support) for its Desktop, Server, and Cloud products, as well
as other flavours of Ubuntu with long-term support.
As usual, this point release includes many updates and updated
installation media has been provided so that fewer updates will need to
be downloaded after installation. These include security updates and
corrections for other high-severity bugs, with a focus on maintaining
stability and compatibility with Ubuntu 24.04 LTS.
Kubuntu 24.04.4 LTS, Ubuntu Budgie 24.04.4 LTS, Lubuntu 24.04.4 LTS, Ubuntu
Kylin 24.04.4 LTS, Ubuntu Studio 24.04.4 LTS, Xubuntu 24.04.4 LTS, Edubuntu
24.04.4 LTS, Ubuntu Cinnamon 24.04.4 LTS and Ubuntu Unity 24.04.4 LTS are also
now available. More details can be found in their individual release notes (see
'Official flavours'):
https://discourse.ubuntu.com/t/ubuntu-24-04-lts-noble-numbat-release-notes/39890
Maintenance updates will be provided for 5 years from the initial 24.04 LTS
release for Ubuntu Desktop, Ubuntu Server, Ubuntu Cloud, and Ubuntu Core.
All the remaining flavours will be supported for 3 years. Additional security
support is available with ESM (Expanded Security Maintenance).
To get Ubuntu 24.04.4 LTS
- -------------------------
In order to download Ubuntu 24.04.4 LTS, visit:
Users of Ubuntu 22.04 LTS will be offered an automatic upgrade to
24.04.4 LTS via Update Manager.
We recommend that all users read the 24.04.4 LTS release notes, which
document caveats and workarounds for known issues, as well as more
in-depth notes on the release itself. They are available at:
https://discourse.ubuntu.com/t/ubuntu-24-04-lts-noble-numbat-release-notes/39890
If you have a question, or if you think you may have found a bug but
aren't sure, you can try asking in any of the following places:
https://matrix.to/#/#discuss:ubuntu.com
https://discourse.ubuntu.com/support
https://lists.ubuntu.com/mailman/listinfo/ubuntu-users
Help Shape Ubuntu
- -----------------
If you would like to help shape Ubuntu, take a look at the list of ways
you can participate at:
https://discourse.ubuntu.com/contribute
About Ubuntu
- ------------
Ubuntu is a full-featured Linux distribution for desktops, laptops,
clouds and servers, with a fast and easy installation and regular
releases. A tightly-integrated selection of excellent applications is
included, and an incredible variety of add-on software is just a few
clicks away.
Professional services including support are available from Canonical and
hundreds of other companies around the world. For more information
about support, visit:
More Information
- ----------------
You can learn more about Ubuntu and about this release on our website
listed below:
To sign up for future Ubuntu announcements, please subscribe to Ubuntu's
very low volume announcement list at:
https://lists.ubuntu.com/mailman/listinfo/ubuntu-announce
On behalf of the Ubuntu Release Team,
Skia
--
ubuntu-announce mailing list
ubuntu-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-announce
[USN-8035-1] libpng vulnerabilities
Ubuntu Security Notice USN-8035-1
February 12, 2026
libpng1.6 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in libpng.
Software Description:
- libpng1.6: PNG (Portable Network Graphics) file library
Details:
It was discovered that the libpng simplified API incorrectly processed
palette PNG images with partial transparency and gamma correction. If a
user or automated system were tricked into opening a specially crafted PNG
file, an attacker could use this issue to cause libpng to crash, resulting
in a denial of service. (CVE-2025-66293)
Petr Simecek, Stanislav Fort and Pavel Kohout discovered that the libpng
simplified API incorrectly processed interlaced 16-bit PNGs with 8-bit
output format and non-minimal row strides. If a user or automated system
were tricked into opening a specially crafted PNG file, an attacker could
use this issue to cause libpng to crash, resulting in a denial of service.
(CVE-2026-22695)
Cosmin Truta discovered that the libpng simplified API incorrectly handled
invalid row strides. If a user or automated system were tricked into
opening a specially crafted PNG file, an attacker could use this issue to
cause libpng to crash, resulting in a denial of service. This issue only
affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2026-22801)
It was discovered that the libpng simplified API incorrectly handled
quantizing RGB images. If a user or automated system were tricked into
opening a specially crafted PNG file, an attacker could use this issue to
cause libpng to crash, resulting in a denial of service. (CVE-2026-25646)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.04 LTS
libpng16-16 1.6.37-2ubuntu0.1~esm2
Available with Ubuntu Pro
Ubuntu 18.04 LTS
libpng16-16 1.6.34-1ubuntu0.18.04.2+esm2
Available with Ubuntu Pro
Ubuntu 16.04 LTS
libpng16-16 1.6.20-2ubuntu0.1~esm3
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-8035-1
CVE-2025-66293, CVE-2026-22695, CVE-2026-22801, CVE-2026-25646
[USN-8025-1] .NET vulnerability
Ubuntu Security Notice USN-8025-1
February 11, 2026
dotnet8, dotnet9, dotnet10 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 25.10
- Ubuntu 22.04 LTS
Summary:
.NET could be made to bypass security features.
Software Description:
- dotnet10: .NET CLI tools and runtime
- dotnet8: .NET CLI tools and runtime
- dotnet9: .NET CLI tools and runtime
Details:
Kevin Jones discovered that the System.Security.Cryptography.Cose component
in .NET did not properly handle certain missing special elements in input
data. An attacker could possibly use this issue to bypass security checks
and gain unauthorized access or perform data manipulation.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 25.10
aspnetcore-runtime-10.0 10.0.3-0ubuntu1~25.10.1
aspnetcore-runtime-8.0 8.0.24-0ubuntu1~25.10.1
aspnetcore-runtime-9.0 9.0.13-0ubuntu1~25.10.1
dotnet-host-10.0 10.0.3-0ubuntu1~25.10.1
dotnet-host-8.0 8.0.24-0ubuntu1~25.10.1
dotnet-host-9.0 9.0.13-0ubuntu1~25.10.1
dotnet-hostfxr-10.0 10.0.3-0ubuntu1~25.10.1
dotnet-hostfxr-8.0 8.0.24-0ubuntu1~25.10.1
dotnet-hostfxr-9.0 9.0.13-0ubuntu1~25.10.1
dotnet-runtime-10.0 10.0.3-0ubuntu1~25.10.1
dotnet-runtime-8.0 8.0.24-0ubuntu1~25.10.1
dotnet-runtime-9.0 9.0.13-0ubuntu1~25.10.1
dotnet-sdk-10.0 10.0.103-0ubuntu1~25.10.1
dotnet-sdk-8.0 8.0.124-0ubuntu1~25.10.1
dotnet-sdk-9.0 9.0.114-0ubuntu1~25.10.1
dotnet-sdk-aot-10.0 10.0.103-0ubuntu1~25.10.1
dotnet-sdk-aot-9.0 9.0.114-0ubuntu1~25.10.1
dotnet10 10.0.103-10.0.3-0ubuntu1~25.10.1
dotnet8 8.0.124-8.0.24-0ubuntu1~25.10.1
dotnet9 9.0.114-9.0.13-0ubuntu1~25.10.1
Ubuntu 22.04 LTS
aspnetcore-runtime-8.0 8.0.24-0ubuntu1~22.04.1
dotnet-host-8.0 8.0.24-0ubuntu1~22.04.1
dotnet-hostfxr-8.0 8.0.24-0ubuntu1~22.04.1
dotnet-runtime-8.0 8.0.24-0ubuntu1~22.04.1
dotnet-sdk-8.0 8.0.124-0ubuntu1~22.04.1
dotnet8 8.0.124-8.0.24-0ubuntu1~22.04.1
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-8025-1
CVE-2026-21218
Package Information:
https://launchpad.net/ubuntu/+source/dotnet10/10.0.103-10.0.3-0ubuntu1~25.10.1
https://launchpad.net/ubuntu/+source/dotnet8/8.0.124-8.0.24-0ubuntu1~25.10.1
https://launchpad.net/ubuntu/+source/dotnet9/9.0.114-9.0.13-0ubuntu1~25.10.1
https://launchpad.net/ubuntu/+source/dotnet8/8.0.124-8.0.24-0ubuntu1~22.04.1
[USN-8034-1] Linux kernel (NVIDIA Tegra) vulnerabilities
Ubuntu Security Notice USN-8034-1
February 12, 2026
linux-nvidia-tegra, linux-nvidia-tegra-5.15 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-nvidia-tegra: Linux kernel for NVIDIA Tegra systems
- linux-nvidia-tegra-5.15: Linux kernel for NVIDIA Tegra systems
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Nios II architecture;
- Sun Sparc architecture;
- User-Mode Linux (UML);
- x86 architecture;
- Block layer subsystem;
- Cryptographic API;
- Drivers core;
- Bus devices;
- Hardware random number generator core;
- Data acquisition framework and drivers;
- CPU frequency scaling framework;
- DMA engine subsystem;
- GPU drivers;
- HW tracing;
- Input Device (Miscellaneous) drivers;
- Multiple devices driver;
- Media drivers;
- MOST (Media Oriented Systems Transport) drivers;
- MTD block device drivers;
- Network drivers;
- NVME drivers;
- PCI subsystem;
- Performance monitor drivers;
- Pin controllers subsystem;
- x86 platform drivers;
- PPS (Pulse Per Second) driver;
- PWM drivers;
- SCSI subsystem;
- TCM subsystem;
- Userspace I/O drivers;
- USB Gadget drivers;
- USB Host Controller drivers;
- Framebuffer layer;
- BTRFS file system;
- File systems infrastructure;
- Ext4 file system;
- Network file system (NFS) server daemon;
- NTFS3 file system;
- SMB network file system;
- padata parallel execution mechanism;
- IP tunnels definitions;
- Network sockets;
- XFRM subsystem;
- Control group (cgroup);
- Padata parallel execution mechanism;
- PID allocator;
- Tracing infrastructure;
- Memory management;
- 9P file system network protocol;
- Ethernet bridge;
- Ceph Core library;
- Networking core;
- IPv4 networking;
- IPv6 networking;
- NFC subsystem;
- RF switch subsystem;
- SCTP protocol;
- Unix domain sockets;
- VMware vSockets driver;
- Intel ASoC drivers;
- USB sound devices;
(CVE-2024-53114, CVE-2024-56538, CVE-2024-58011, CVE-2025-21861,
CVE-2025-22058, CVE-2025-23143, CVE-2025-38236, CVE-2025-38248,
CVE-2025-38584, CVE-2025-39869, CVE-2025-39873, CVE-2025-39876,
CVE-2025-39880, CVE-2025-39883, CVE-2025-39885, CVE-2025-39907,
CVE-2025-39911, CVE-2025-39913, CVE-2025-39923, CVE-2025-39934,
CVE-2025-39937, CVE-2025-39943, CVE-2025-39945, CVE-2025-39949,
CVE-2025-39951, CVE-2025-39953, CVE-2025-39955, CVE-2025-39967,
CVE-2025-39968, CVE-2025-39969, CVE-2025-39970, CVE-2025-39971,
CVE-2025-39972, CVE-2025-39973, CVE-2025-39980, CVE-2025-39985,
CVE-2025-39986, CVE-2025-39987, CVE-2025-39988, CVE-2025-39994,
CVE-2025-39995, CVE-2025-39996, CVE-2025-39998, CVE-2025-40001,
CVE-2025-40006, CVE-2025-40011, CVE-2025-40020, CVE-2025-40021,
CVE-2025-40026, CVE-2025-40027, CVE-2025-40029, CVE-2025-40030,
CVE-2025-40035, CVE-2025-40042, CVE-2025-40043, CVE-2025-40044,
CVE-2025-40048, CVE-2025-40049, CVE-2025-40053, CVE-2025-40055,
CVE-2025-40060, CVE-2025-40068, CVE-2025-40070, CVE-2025-40078,
CVE-2025-40081, CVE-2025-40085, CVE-2025-40087, CVE-2025-40088,
CVE-2025-40092, CVE-2025-40094, CVE-2025-40105, CVE-2025-40106,
CVE-2025-40109, CVE-2025-40111, CVE-2025-40112, CVE-2025-40115,
CVE-2025-40116, CVE-2025-40118, CVE-2025-40120, CVE-2025-40121,
CVE-2025-40124, CVE-2025-40125, CVE-2025-40126, CVE-2025-40127,
CVE-2025-40134, CVE-2025-40140, CVE-2025-40153, CVE-2025-40154,
CVE-2025-40167, CVE-2025-40171, CVE-2025-40173, CVE-2025-40178,
CVE-2025-40179, CVE-2025-40183, CVE-2025-40187, CVE-2025-40188,
CVE-2025-40194, CVE-2025-40200, CVE-2025-40204, CVE-2025-40205,
CVE-2025-40215, CVE-2025-40219, CVE-2025-40220, CVE-2025-40223,
CVE-2025-40231, CVE-2025-40233, CVE-2025-40240, CVE-2025-40243,
CVE-2025-40244, CVE-2025-40245, CVE-2025-40346, CVE-2025-40349,
CVE-2025-40351, CVE-2025-68249, CVE-2025-71162)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS
linux-image-5.15.0-1052-nvidia-tegra 5.15.0-1052.52
linux-image-5.15.0-1052-nvidia-tegra-rt 5.15.0-1052.52
linux-image-nvidia-tegra 5.15.0.1052.52
linux-image-nvidia-tegra-5.15 5.15.0.1052.52
linux-image-nvidia-tegra-rt 5.15.0.1052.52
linux-image-nvidia-tegra-rt-5.15 5.15.0.1052.52
Ubuntu 20.04 LTS
linux-image-5.15.0-1052-nvidia-tegra 5.15.0-1052.52~20.04.2
Available with Ubuntu Pro
linux-image-5.15.0-1052-nvidia-tegra-rt 5.15.0-1052.52~20.04.2
Available with Ubuntu Pro
linux-image-nvidia-tegra 5.15.0.1052.52~20.04.2
Available with Ubuntu Pro
linux-image-nvidia-tegra-5.15 5.15.0.1052.52~20.04.2
Available with Ubuntu Pro
linux-image-nvidia-tegra-rt 5.15.0.1052.52~20.04.2
Available with Ubuntu Pro
linux-image-nvidia-tegra-rt-5.15 5.15.0.1052.52~20.04.2
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-8034-1
CVE-2024-53114, CVE-2024-56538, CVE-2024-58011, CVE-2025-21861,
CVE-2025-22058, CVE-2025-23143, CVE-2025-38236, CVE-2025-38248,
CVE-2025-38584, CVE-2025-39869, CVE-2025-39873, CVE-2025-39876,
CVE-2025-39880, CVE-2025-39883, CVE-2025-39885, CVE-2025-39907,
CVE-2025-39911, CVE-2025-39913, CVE-2025-39923, CVE-2025-39934,
CVE-2025-39937, CVE-2025-39943, CVE-2025-39945, CVE-2025-39949,
CVE-2025-39951, CVE-2025-39953, CVE-2025-39955, CVE-2025-39967,
CVE-2025-39968, CVE-2025-39969, CVE-2025-39970, CVE-2025-39971,
CVE-2025-39972, CVE-2025-39973, CVE-2025-39980, CVE-2025-39985,
CVE-2025-39986, CVE-2025-39987, CVE-2025-39988, CVE-2025-39994,
CVE-2025-39995, CVE-2025-39996, CVE-2025-39998, CVE-2025-40001,
CVE-2025-40006, CVE-2025-40011, CVE-2025-40020, CVE-2025-40021,
CVE-2025-40026, CVE-2025-40027, CVE-2025-40029, CVE-2025-40030,
CVE-2025-40035, CVE-2025-40042, CVE-2025-40043, CVE-2025-40044,
CVE-2025-40048, CVE-2025-40049, CVE-2025-40053, CVE-2025-40055,
CVE-2025-40060, CVE-2025-40068, CVE-2025-40070, CVE-2025-40078,
CVE-2025-40081, CVE-2025-40085, CVE-2025-40087, CVE-2025-40088,
CVE-2025-40092, CVE-2025-40094, CVE-2025-40105, CVE-2025-40106,
CVE-2025-40109, CVE-2025-40111, CVE-2025-40112, CVE-2025-40115,
CVE-2025-40116, CVE-2025-40118, CVE-2025-40120, CVE-2025-40121,
CVE-2025-40124, CVE-2025-40125, CVE-2025-40126, CVE-2025-40127,
CVE-2025-40134, CVE-2025-40140, CVE-2025-40153, CVE-2025-40154,
CVE-2025-40167, CVE-2025-40171, CVE-2025-40173, CVE-2025-40178,
CVE-2025-40179, CVE-2025-40183, CVE-2025-40187, CVE-2025-40188,
CVE-2025-40194, CVE-2025-40200, CVE-2025-40204, CVE-2025-40205,
CVE-2025-40215, CVE-2025-40219, CVE-2025-40220, CVE-2025-40223,
CVE-2025-40231, CVE-2025-40233, CVE-2025-40240, CVE-2025-40243,
CVE-2025-40244, CVE-2025-40245, CVE-2025-40346, CVE-2025-40349,
CVE-2025-40351, CVE-2025-68249, CVE-2025-71162
Package Information:
https://launchpad.net/ubuntu/+source/linux-nvidia-tegra/5.15.0-1052.52
[USN-8033-3] Linux kernel (FIPS) vulnerabilities
Ubuntu Security Notice USN-8033-3
February 12, 2026
linux-aws-fips, linux-fips, linux-gcp-fips vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-aws-fips: Linux kernel for Amazon Web Services (AWS) systems with FIPS
- linux-fips: Linux kernel with FIPS
- linux-gcp-fips: Linux kernel for Google Cloud Platform (GCP) systems with FIPS
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Nios II architecture;
- Sun Sparc architecture;
- User-Mode Linux (UML);
- x86 architecture;
- Block layer subsystem;
- Cryptographic API;
- Drivers core;
- Bus devices;
- Hardware random number generator core;
- Data acquisition framework and drivers;
- CPU frequency scaling framework;
- DMA engine subsystem;
- GPU drivers;
- HW tracing;
- Input Device (Miscellaneous) drivers;
- Multiple devices driver;
- Media drivers;
- MOST (Media Oriented Systems Transport) drivers;
- MTD block device drivers;
- Network drivers;
- NVME drivers;
- PCI subsystem;
- Performance monitor drivers;
- Pin controllers subsystem;
- x86 platform drivers;
- PPS (Pulse Per Second) driver;
- PWM drivers;
- SCSI subsystem;
- TCM subsystem;
- Userspace I/O drivers;
- USB Gadget drivers;
- USB Host Controller drivers;
- Framebuffer layer;
- BTRFS file system;
- File systems infrastructure;
- Ext4 file system;
- Network file system (NFS) server daemon;
- NTFS3 file system;
- SMB network file system;
- padata parallel execution mechanism;
- IP tunnels definitions;
- Network sockets;
- XFRM subsystem;
- Control group (cgroup);
- Padata parallel execution mechanism;
- PID allocator;
- Tracing infrastructure;
- Memory management;
- 9P file system network protocol;
- Ethernet bridge;
- Ceph Core library;
- Networking core;
- IPv4 networking;
- IPv6 networking;
- NFC subsystem;
- RF switch subsystem;
- SCTP protocol;
- Unix domain sockets;
- VMware vSockets driver;
- Intel ASoC drivers;
- USB sound devices;
(CVE-2024-53114, CVE-2024-56538, CVE-2024-58011, CVE-2025-21861,
CVE-2025-22058, CVE-2025-23143, CVE-2025-38236, CVE-2025-38248,
CVE-2025-38584, CVE-2025-39869, CVE-2025-39873, CVE-2025-39876,
CVE-2025-39880, CVE-2025-39883, CVE-2025-39885, CVE-2025-39907,
CVE-2025-39911, CVE-2025-39913, CVE-2025-39923, CVE-2025-39934,
CVE-2025-39937, CVE-2025-39943, CVE-2025-39945, CVE-2025-39949,
CVE-2025-39951, CVE-2025-39953, CVE-2025-39955, CVE-2025-39967,
CVE-2025-39968, CVE-2025-39969, CVE-2025-39970, CVE-2025-39971,
CVE-2025-39972, CVE-2025-39973, CVE-2025-39980, CVE-2025-39985,
CVE-2025-39986, CVE-2025-39987, CVE-2025-39988, CVE-2025-39994,
CVE-2025-39995, CVE-2025-39996, CVE-2025-39998, CVE-2025-40001,
CVE-2025-40006, CVE-2025-40011, CVE-2025-40020, CVE-2025-40021,
CVE-2025-40026, CVE-2025-40027, CVE-2025-40029, CVE-2025-40030,
CVE-2025-40035, CVE-2025-40042, CVE-2025-40043, CVE-2025-40044,
CVE-2025-40048, CVE-2025-40049, CVE-2025-40053, CVE-2025-40055,
CVE-2025-40060, CVE-2025-40068, CVE-2025-40070, CVE-2025-40078,
CVE-2025-40081, CVE-2025-40085, CVE-2025-40087, CVE-2025-40088,
CVE-2025-40092, CVE-2025-40094, CVE-2025-40105, CVE-2025-40106,
CVE-2025-40109, CVE-2025-40111, CVE-2025-40112, CVE-2025-40115,
CVE-2025-40116, CVE-2025-40118, CVE-2025-40120, CVE-2025-40121,
CVE-2025-40124, CVE-2025-40125, CVE-2025-40126, CVE-2025-40127,
CVE-2025-40134, CVE-2025-40140, CVE-2025-40153, CVE-2025-40154,
CVE-2025-40167, CVE-2025-40171, CVE-2025-40173, CVE-2025-40178,
CVE-2025-40179, CVE-2025-40183, CVE-2025-40187, CVE-2025-40188,
CVE-2025-40194, CVE-2025-40200, CVE-2025-40204, CVE-2025-40205,
CVE-2025-40215, CVE-2025-40219, CVE-2025-40220, CVE-2025-40223,
CVE-2025-40231, CVE-2025-40233, CVE-2025-40240, CVE-2025-40243,
CVE-2025-40244, CVE-2025-40245, CVE-2025-40346, CVE-2025-40349,
CVE-2025-40351, CVE-2025-68249)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS
linux-image-5.15.0-1100-aws-fips 5.15.0-1100.107+fips1
Available with Ubuntu Pro
linux-image-5.15.0-1100-gcp-fips 5.15.0-1100.109+fips1
Available with Ubuntu Pro
linux-image-5.15.0-170-fips 5.15.0-170.180+fips1
Available with Ubuntu Pro
linux-image-aws-fips 5.15.0.1100.96
Available with Ubuntu Pro
linux-image-aws-fips-5.15 5.15.0.1100.96
Available with Ubuntu Pro
linux-image-fips 5.15.0.170.97
Available with Ubuntu Pro
linux-image-fips-5.15 5.15.0.170.97
Available with Ubuntu Pro
linux-image-gcp-fips 5.15.0.1100.90
Available with Ubuntu Pro
linux-image-gcp-fips-5.15 5.15.0.1100.90
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-8033-3
https://ubuntu.com/security/notices/USN-8033-2
https://ubuntu.com/security/notices/USN-8033-1
CVE-2024-53114, CVE-2024-56538, CVE-2024-58011, CVE-2025-21861,
CVE-2025-22058, CVE-2025-23143, CVE-2025-38236, CVE-2025-38248,
CVE-2025-38584, CVE-2025-39869, CVE-2025-39873, CVE-2025-39876,
CVE-2025-39880, CVE-2025-39883, CVE-2025-39885, CVE-2025-39907,
CVE-2025-39911, CVE-2025-39913, CVE-2025-39923, CVE-2025-39934,
CVE-2025-39937, CVE-2025-39943, CVE-2025-39945, CVE-2025-39949,
CVE-2025-39951, CVE-2025-39953, CVE-2025-39955, CVE-2025-39967,
CVE-2025-39968, CVE-2025-39969, CVE-2025-39970, CVE-2025-39971,
CVE-2025-39972, CVE-2025-39973, CVE-2025-39980, CVE-2025-39985,
CVE-2025-39986, CVE-2025-39987, CVE-2025-39988, CVE-2025-39994,
CVE-2025-39995, CVE-2025-39996, CVE-2025-39998, CVE-2025-40001,
CVE-2025-40006, CVE-2025-40011, CVE-2025-40020, CVE-2025-40021,
CVE-2025-40026, CVE-2025-40027, CVE-2025-40029, CVE-2025-40030,
CVE-2025-40035, CVE-2025-40042, CVE-2025-40043, CVE-2025-40044,
CVE-2025-40048, CVE-2025-40049, CVE-2025-40053, CVE-2025-40055,
CVE-2025-40060, CVE-2025-40068, CVE-2025-40070, CVE-2025-40078,
CVE-2025-40081, CVE-2025-40085, CVE-2025-40087, CVE-2025-40088,
CVE-2025-40092, CVE-2025-40094, CVE-2025-40105, CVE-2025-40106,
CVE-2025-40109, CVE-2025-40111, CVE-2025-40112, CVE-2025-40115,
CVE-2025-40116, CVE-2025-40118, CVE-2025-40120, CVE-2025-40121,
CVE-2025-40124, CVE-2025-40125, CVE-2025-40126, CVE-2025-40127,
CVE-2025-40134, CVE-2025-40140, CVE-2025-40153, CVE-2025-40154,
CVE-2025-40167, CVE-2025-40171, CVE-2025-40173, CVE-2025-40178,
CVE-2025-40179, CVE-2025-40183, CVE-2025-40187, CVE-2025-40188,
CVE-2025-40194, CVE-2025-40200, CVE-2025-40204, CVE-2025-40205,
CVE-2025-40215, CVE-2025-40219, CVE-2025-40220, CVE-2025-40223,
CVE-2025-40231, CVE-2025-40233, CVE-2025-40240, CVE-2025-40243,
CVE-2025-40244, CVE-2025-40245, CVE-2025-40346, CVE-2025-40349,
CVE-2025-40351, CVE-2025-68249
Package Information:
https://launchpad.net/ubuntu/+source/linux-aws-fips/5.15.0-1100.107+fips1
https://launchpad.net/ubuntu/+source/linux-fips/5.15.0-170.180+fips1
https://launchpad.net/ubuntu/+source/linux-gcp-fips/5.15.0-1100.109+fips1
[USN-8033-2] Linux kernel vulnerabilities
Ubuntu Security Notice USN-8033-2
February 12, 2026
linux-intel-iot-realtime, linux-realtime vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-intel-iot-realtime: Linux kernel for Intel IoT Real-time platforms
- linux-realtime: Linux kernel for Real-time systems
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Nios II architecture;
- Sun Sparc architecture;
- User-Mode Linux (UML);
- x86 architecture;
- Block layer subsystem;
- Cryptographic API;
- Drivers core;
- Bus devices;
- Hardware random number generator core;
- Data acquisition framework and drivers;
- CPU frequency scaling framework;
- DMA engine subsystem;
- GPU drivers;
- HW tracing;
- Input Device (Miscellaneous) drivers;
- Multiple devices driver;
- Media drivers;
- MOST (Media Oriented Systems Transport) drivers;
- MTD block device drivers;
- Network drivers;
- NVME drivers;
- PCI subsystem;
- Performance monitor drivers;
- Pin controllers subsystem;
- x86 platform drivers;
- PPS (Pulse Per Second) driver;
- PWM drivers;
- SCSI subsystem;
- TCM subsystem;
- Userspace I/O drivers;
- USB Gadget drivers;
- USB Host Controller drivers;
- Framebuffer layer;
- BTRFS file system;
- File systems infrastructure;
- Ext4 file system;
- Network file system (NFS) server daemon;
- NTFS3 file system;
- SMB network file system;
- padata parallel execution mechanism;
- IP tunnels definitions;
- Network sockets;
- XFRM subsystem;
- Control group (cgroup);
- Padata parallel execution mechanism;
- PID allocator;
- Tracing infrastructure;
- Memory management;
- 9P file system network protocol;
- Ethernet bridge;
- Ceph Core library;
- Networking core;
- IPv4 networking;
- IPv6 networking;
- NFC subsystem;
- RF switch subsystem;
- SCTP protocol;
- Unix domain sockets;
- VMware vSockets driver;
- Intel ASoC drivers;
- USB sound devices;
(CVE-2024-53114, CVE-2024-56538, CVE-2024-58011, CVE-2025-21861,
CVE-2025-22058, CVE-2025-23143, CVE-2025-38236, CVE-2025-38248,
CVE-2025-38584, CVE-2025-39869, CVE-2025-39873, CVE-2025-39876,
CVE-2025-39880, CVE-2025-39883, CVE-2025-39885, CVE-2025-39907,
CVE-2025-39911, CVE-2025-39913, CVE-2025-39923, CVE-2025-39934,
CVE-2025-39937, CVE-2025-39943, CVE-2025-39945, CVE-2025-39949,
CVE-2025-39951, CVE-2025-39953, CVE-2025-39955, CVE-2025-39967,
CVE-2025-39968, CVE-2025-39969, CVE-2025-39970, CVE-2025-39971,
CVE-2025-39972, CVE-2025-39973, CVE-2025-39980, CVE-2025-39985,
CVE-2025-39986, CVE-2025-39987, CVE-2025-39988, CVE-2025-39994,
CVE-2025-39995, CVE-2025-39996, CVE-2025-39998, CVE-2025-40001,
CVE-2025-40006, CVE-2025-40011, CVE-2025-40020, CVE-2025-40021,
CVE-2025-40026, CVE-2025-40027, CVE-2025-40029, CVE-2025-40030,
CVE-2025-40035, CVE-2025-40042, CVE-2025-40043, CVE-2025-40044,
CVE-2025-40048, CVE-2025-40049, CVE-2025-40053, CVE-2025-40055,
CVE-2025-40060, CVE-2025-40068, CVE-2025-40070, CVE-2025-40078,
CVE-2025-40081, CVE-2025-40085, CVE-2025-40087, CVE-2025-40088,
CVE-2025-40092, CVE-2025-40094, CVE-2025-40105, CVE-2025-40106,
CVE-2025-40109, CVE-2025-40111, CVE-2025-40112, CVE-2025-40115,
CVE-2025-40116, CVE-2025-40118, CVE-2025-40120, CVE-2025-40121,
CVE-2025-40124, CVE-2025-40125, CVE-2025-40126, CVE-2025-40127,
CVE-2025-40134, CVE-2025-40140, CVE-2025-40153, CVE-2025-40154,
CVE-2025-40167, CVE-2025-40171, CVE-2025-40173, CVE-2025-40178,
CVE-2025-40179, CVE-2025-40183, CVE-2025-40187, CVE-2025-40188,
CVE-2025-40194, CVE-2025-40200, CVE-2025-40204, CVE-2025-40205,
CVE-2025-40215, CVE-2025-40219, CVE-2025-40220, CVE-2025-40223,
CVE-2025-40231, CVE-2025-40233, CVE-2025-40240, CVE-2025-40243,
CVE-2025-40244, CVE-2025-40245, CVE-2025-40346, CVE-2025-40349,
CVE-2025-40351, CVE-2025-68249)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS
linux-image-5.15.0-1092-intel-iot-realtime 5.15.0-1092.94
Available with Ubuntu Pro
linux-image-5.15.0-1099-realtime 5.15.0-1099.108
Available with Ubuntu Pro
linux-image-intel-iot-realtime 5.15.0.1092.96
Available with Ubuntu Pro
linux-image-intel-iot-realtime-5.15 5.15.0.1092.96
Available with Ubuntu Pro
linux-image-realtime 5.15.0.1099.103
Available with Ubuntu Pro
linux-image-realtime-5.15 5.15.0.1099.103
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-8033-2
https://ubuntu.com/security/notices/USN-8033-1
CVE-2024-53114, CVE-2024-56538, CVE-2024-58011, CVE-2025-21861,
CVE-2025-22058, CVE-2025-23143, CVE-2025-38236, CVE-2025-38248,
CVE-2025-38584, CVE-2025-39869, CVE-2025-39873, CVE-2025-39876,
CVE-2025-39880, CVE-2025-39883, CVE-2025-39885, CVE-2025-39907,
CVE-2025-39911, CVE-2025-39913, CVE-2025-39923, CVE-2025-39934,
CVE-2025-39937, CVE-2025-39943, CVE-2025-39945, CVE-2025-39949,
CVE-2025-39951, CVE-2025-39953, CVE-2025-39955, CVE-2025-39967,
CVE-2025-39968, CVE-2025-39969, CVE-2025-39970, CVE-2025-39971,
CVE-2025-39972, CVE-2025-39973, CVE-2025-39980, CVE-2025-39985,
CVE-2025-39986, CVE-2025-39987, CVE-2025-39988, CVE-2025-39994,
CVE-2025-39995, CVE-2025-39996, CVE-2025-39998, CVE-2025-40001,
CVE-2025-40006, CVE-2025-40011, CVE-2025-40020, CVE-2025-40021,
CVE-2025-40026, CVE-2025-40027, CVE-2025-40029, CVE-2025-40030,
CVE-2025-40035, CVE-2025-40042, CVE-2025-40043, CVE-2025-40044,
CVE-2025-40048, CVE-2025-40049, CVE-2025-40053, CVE-2025-40055,
CVE-2025-40060, CVE-2025-40068, CVE-2025-40070, CVE-2025-40078,
CVE-2025-40081, CVE-2025-40085, CVE-2025-40087, CVE-2025-40088,
CVE-2025-40092, CVE-2025-40094, CVE-2025-40105, CVE-2025-40106,
CVE-2025-40109, CVE-2025-40111, CVE-2025-40112, CVE-2025-40115,
CVE-2025-40116, CVE-2025-40118, CVE-2025-40120, CVE-2025-40121,
CVE-2025-40124, CVE-2025-40125, CVE-2025-40126, CVE-2025-40127,
CVE-2025-40134, CVE-2025-40140, CVE-2025-40153, CVE-2025-40154,
CVE-2025-40167, CVE-2025-40171, CVE-2025-40173, CVE-2025-40178,
CVE-2025-40179, CVE-2025-40183, CVE-2025-40187, CVE-2025-40188,
CVE-2025-40194, CVE-2025-40200, CVE-2025-40204, CVE-2025-40205,
CVE-2025-40215, CVE-2025-40219, CVE-2025-40220, CVE-2025-40223,
CVE-2025-40231, CVE-2025-40233, CVE-2025-40240, CVE-2025-40243,
CVE-2025-40244, CVE-2025-40245, CVE-2025-40346, CVE-2025-40349,
CVE-2025-40351, CVE-2025-68249
Package Information:
https://launchpad.net/ubuntu/+source/linux-intel-iot-realtime/5.15.0-1092.94
https://launchpad.net/ubuntu/+source/linux-realtime/5.15.0-1099.108
[USN-8033-1] Linux kernel vulnerabilities
Ubuntu Security Notice USN-8033-1
February 12, 2026
linux, linux-aws, linux-gcp, linux-gke, linux-gkeop, linux-hwe-5.15,
linux-ibm, linux-ibm-5.15, linux-lowlatency, linux-lowlatency-hwe-5.15
vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-gke: Linux kernel for Google Container Engine (GKE) systems
- linux-gkeop: Linux kernel for Google Container Engine (GKE) systems
- linux-ibm: Linux kernel for IBM cloud systems
- linux-lowlatency: Linux low latency kernel
- linux-hwe-5.15: Linux hardware enablement (HWE) kernel
- linux-ibm-5.15: Linux kernel for IBM cloud systems
- linux-lowlatency-hwe-5.15: Linux low latency kernel
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Nios II architecture;
- Sun Sparc architecture;
- User-Mode Linux (UML);
- x86 architecture;
- Block layer subsystem;
- Cryptographic API;
- Drivers core;
- Bus devices;
- Hardware random number generator core;
- Data acquisition framework and drivers;
- CPU frequency scaling framework;
- DMA engine subsystem;
- GPU drivers;
- HW tracing;
- Input Device (Miscellaneous) drivers;
- Multiple devices driver;
- Media drivers;
- MOST (Media Oriented Systems Transport) drivers;
- MTD block device drivers;
- Network drivers;
- NVME drivers;
- PCI subsystem;
- Performance monitor drivers;
- Pin controllers subsystem;
- x86 platform drivers;
- PPS (Pulse Per Second) driver;
- PWM drivers;
- SCSI subsystem;
- TCM subsystem;
- Userspace I/O drivers;
- USB Gadget drivers;
- USB Host Controller drivers;
- Framebuffer layer;
- BTRFS file system;
- File systems infrastructure;
- Ext4 file system;
- Network file system (NFS) server daemon;
- NTFS3 file system;
- SMB network file system;
- padata parallel execution mechanism;
- IP tunnels definitions;
- Network sockets;
- XFRM subsystem;
- Control group (cgroup);
- Padata parallel execution mechanism;
- PID allocator;
- Tracing infrastructure;
- Memory management;
- 9P file system network protocol;
- Ethernet bridge;
- Ceph Core library;
- Networking core;
- IPv4 networking;
- IPv6 networking;
- NFC subsystem;
- RF switch subsystem;
- SCTP protocol;
- Unix domain sockets;
- VMware vSockets driver;
- Intel ASoC drivers;
- USB sound devices;
(CVE-2024-53114, CVE-2024-56538, CVE-2024-58011, CVE-2025-21861,
CVE-2025-22058, CVE-2025-23143, CVE-2025-38236, CVE-2025-38248,
CVE-2025-38584, CVE-2025-39869, CVE-2025-39873, CVE-2025-39876,
CVE-2025-39880, CVE-2025-39883, CVE-2025-39885, CVE-2025-39907,
CVE-2025-39911, CVE-2025-39913, CVE-2025-39923, CVE-2025-39934,
CVE-2025-39937, CVE-2025-39943, CVE-2025-39945, CVE-2025-39949,
CVE-2025-39951, CVE-2025-39953, CVE-2025-39955, CVE-2025-39967,
CVE-2025-39968, CVE-2025-39969, CVE-2025-39970, CVE-2025-39971,
CVE-2025-39972, CVE-2025-39973, CVE-2025-39980, CVE-2025-39985,
CVE-2025-39986, CVE-2025-39987, CVE-2025-39988, CVE-2025-39994,
CVE-2025-39995, CVE-2025-39996, CVE-2025-39998, CVE-2025-40001,
CVE-2025-40006, CVE-2025-40011, CVE-2025-40020, CVE-2025-40021,
CVE-2025-40026, CVE-2025-40027, CVE-2025-40029, CVE-2025-40030,
CVE-2025-40035, CVE-2025-40042, CVE-2025-40043, CVE-2025-40044,
CVE-2025-40048, CVE-2025-40049, CVE-2025-40053, CVE-2025-40055,
CVE-2025-40060, CVE-2025-40068, CVE-2025-40070, CVE-2025-40078,
CVE-2025-40081, CVE-2025-40085, CVE-2025-40087, CVE-2025-40088,
CVE-2025-40092, CVE-2025-40094, CVE-2025-40105, CVE-2025-40106,
CVE-2025-40109, CVE-2025-40111, CVE-2025-40112, CVE-2025-40115,
CVE-2025-40116, CVE-2025-40118, CVE-2025-40120, CVE-2025-40121,
CVE-2025-40124, CVE-2025-40125, CVE-2025-40126, CVE-2025-40127,
CVE-2025-40134, CVE-2025-40140, CVE-2025-40153, CVE-2025-40154,
CVE-2025-40167, CVE-2025-40171, CVE-2025-40173, CVE-2025-40178,
CVE-2025-40179, CVE-2025-40183, CVE-2025-40187, CVE-2025-40188,
CVE-2025-40194, CVE-2025-40200, CVE-2025-40204, CVE-2025-40205,
CVE-2025-40215, CVE-2025-40219, CVE-2025-40220, CVE-2025-40223,
CVE-2025-40231, CVE-2025-40233, CVE-2025-40240, CVE-2025-40243,
CVE-2025-40244, CVE-2025-40245, CVE-2025-40346, CVE-2025-40349,
CVE-2025-40351, CVE-2025-68249)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS
linux-image-5.15.0-1083-gkeop 5.15.0-1083.91
linux-image-5.15.0-1094-ibm 5.15.0-1094.97
linux-image-5.15.0-1096-gke 5.15.0-1096.102
linux-image-5.15.0-1100-aws 5.15.0-1100.107
linux-image-5.15.0-1100-aws-64k 5.15.0-1100.107
linux-image-5.15.0-1100-gcp 5.15.0-1100.109
linux-image-5.15.0-170-generic 5.15.0-170.180
linux-image-5.15.0-170-generic-64k 5.15.0-170.180
linux-image-5.15.0-170-generic-lpae 5.15.0-170.180
linux-image-5.15.0-170-lowlatency 5.15.0-170.180
linux-image-5.15.0-170-lowlatency-64k 5.15.0-170.180
linux-image-aws-5.15 5.15.0.1100.103
linux-image-aws-64k-5.15 5.15.0.1100.103
linux-image-aws-64k-lts-22.04 5.15.0.1100.103
linux-image-aws-lts-22.04 5.15.0.1100.103
linux-image-gcp-5.15 5.15.0.1100.96
linux-image-gcp-lts-22.04 5.15.0.1100.96
linux-image-generic 5.15.0.170.159
linux-image-generic-5.15 5.15.0.170.159
linux-image-generic-64k 5.15.0.170.159
linux-image-generic-64k-5.15 5.15.0.170.159
linux-image-generic-lpae 5.15.0.170.159
linux-image-generic-lpae-5.15 5.15.0.170.159
linux-image-gke 5.15.0.1096.95
linux-image-gke-5.15 5.15.0.1096.95
linux-image-gkeop 5.15.0.1083.82
linux-image-gkeop-5.15 5.15.0.1083.82
linux-image-ibm 5.15.0.1094.90
linux-image-ibm-5.15 5.15.0.1094.90
linux-image-lowlatency 5.15.0.170.143
linux-image-lowlatency-5.15 5.15.0.170.143
linux-image-lowlatency-64k 5.15.0.170.143
linux-image-lowlatency-64k-5.15 5.15.0.170.143
linux-image-virtual 5.15.0.170.159
linux-image-virtual-5.15 5.15.0.170.159
Ubuntu 20.04 LTS
linux-image-5.15.0-1094-ibm 5.15.0-1094.97~20.04.1
Available with Ubuntu Pro
linux-image-5.15.0-170-generic 5.15.0-170.180~20.04.3
Available with Ubuntu Pro
linux-image-5.15.0-170-generic-64k 5.15.0-170.180~20.04.3
Available with Ubuntu Pro
linux-image-5.15.0-170-generic-lpae 5.15.0-170.180~20.04.3
Available with Ubuntu Pro
linux-image-5.15.0-170-lowlatency 5.15.0-170.180~20.04.1
Available with Ubuntu Pro
linux-image-5.15.0-170-lowlatency-64k 5.15.0-170.180~20.04.1
Available with Ubuntu Pro
linux-image-generic-5.15 5.15.0.170.180~20.04.3
Available with Ubuntu Pro
linux-image-generic-64k-5.15 5.15.0.170.180~20.04.3
Available with Ubuntu Pro
linux-image-generic-64k-hwe-20.04 5.15.0.170.180~20.04.3
Available with Ubuntu Pro
linux-image-generic-hwe-20.04 5.15.0.170.180~20.04.3
Available with Ubuntu Pro
linux-image-generic-lpae-5.15 5.15.0.170.180~20.04.3
Available with Ubuntu Pro
linux-image-generic-lpae-hwe-20.04 5.15.0.170.180~20.04.3
Available with Ubuntu Pro
linux-image-ibm 5.15.0.1094.97~20.04.1
Available with Ubuntu Pro
linux-image-ibm-5.15 5.15.0.1094.97~20.04.1
Available with Ubuntu Pro
linux-image-lowlatency-5.15 5.15.0.170.180~20.04.1
Available with Ubuntu Pro
linux-image-lowlatency-64k-5.15 5.15.0.170.180~20.04.1
Available with Ubuntu Pro
linux-image-lowlatency-64k-hwe-20.04 5.15.0.170.180~20.04.1
Available with Ubuntu Pro
linux-image-lowlatency-hwe-20.04 5.15.0.170.180~20.04.1
Available with Ubuntu Pro
linux-image-oem-20.04 5.15.0.170.180~20.04.3
Available with Ubuntu Pro
linux-image-oem-20.04b 5.15.0.170.180~20.04.3
Available with Ubuntu Pro
linux-image-oem-20.04c 5.15.0.170.180~20.04.3
Available with Ubuntu Pro
linux-image-oem-20.04d 5.15.0.170.180~20.04.3
Available with Ubuntu Pro
linux-image-virtual-5.15 5.15.0.170.180~20.04.3
Available with Ubuntu Pro
linux-image-virtual-hwe-20.04 5.15.0.170.180~20.04.3
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-8033-1
CVE-2024-53114, CVE-2024-56538, CVE-2024-58011, CVE-2025-21861,
CVE-2025-22058, CVE-2025-23143, CVE-2025-38236, CVE-2025-38248,
CVE-2025-38584, CVE-2025-39869, CVE-2025-39873, CVE-2025-39876,
CVE-2025-39880, CVE-2025-39883, CVE-2025-39885, CVE-2025-39907,
CVE-2025-39911, CVE-2025-39913, CVE-2025-39923, CVE-2025-39934,
CVE-2025-39937, CVE-2025-39943, CVE-2025-39945, CVE-2025-39949,
CVE-2025-39951, CVE-2025-39953, CVE-2025-39955, CVE-2025-39967,
CVE-2025-39968, CVE-2025-39969, CVE-2025-39970, CVE-2025-39971,
CVE-2025-39972, CVE-2025-39973, CVE-2025-39980, CVE-2025-39985,
CVE-2025-39986, CVE-2025-39987, CVE-2025-39988, CVE-2025-39994,
CVE-2025-39995, CVE-2025-39996, CVE-2025-39998, CVE-2025-40001,
CVE-2025-40006, CVE-2025-40011, CVE-2025-40020, CVE-2025-40021,
CVE-2025-40026, CVE-2025-40027, CVE-2025-40029, CVE-2025-40030,
CVE-2025-40035, CVE-2025-40042, CVE-2025-40043, CVE-2025-40044,
CVE-2025-40048, CVE-2025-40049, CVE-2025-40053, CVE-2025-40055,
CVE-2025-40060, CVE-2025-40068, CVE-2025-40070, CVE-2025-40078,
CVE-2025-40081, CVE-2025-40085, CVE-2025-40087, CVE-2025-40088,
CVE-2025-40092, CVE-2025-40094, CVE-2025-40105, CVE-2025-40106,
CVE-2025-40109, CVE-2025-40111, CVE-2025-40112, CVE-2025-40115,
CVE-2025-40116, CVE-2025-40118, CVE-2025-40120, CVE-2025-40121,
CVE-2025-40124, CVE-2025-40125, CVE-2025-40126, CVE-2025-40127,
CVE-2025-40134, CVE-2025-40140, CVE-2025-40153, CVE-2025-40154,
CVE-2025-40167, CVE-2025-40171, CVE-2025-40173, CVE-2025-40178,
CVE-2025-40179, CVE-2025-40183, CVE-2025-40187, CVE-2025-40188,
CVE-2025-40194, CVE-2025-40200, CVE-2025-40204, CVE-2025-40205,
CVE-2025-40215, CVE-2025-40219, CVE-2025-40220, CVE-2025-40223,
CVE-2025-40231, CVE-2025-40233, CVE-2025-40240, CVE-2025-40243,
CVE-2025-40244, CVE-2025-40245, CVE-2025-40346, CVE-2025-40349,
CVE-2025-40351, CVE-2025-68249
Package Information:
https://launchpad.net/ubuntu/+source/linux/5.15.0-170.180
https://launchpad.net/ubuntu/+source/linux-aws/5.15.0-1100.107
https://launchpad.net/ubuntu/+source/linux-gcp/5.15.0-1100.109
https://launchpad.net/ubuntu/+source/linux-gke/5.15.0-1096.102
https://launchpad.net/ubuntu/+source/linux-gkeop/5.15.0-1083.91
https://launchpad.net/ubuntu/+source/linux-ibm/5.15.0-1094.97
https://launchpad.net/ubuntu/+source/linux-lowlatency/5.15.0-170.180
[USN-8031-1] Linux kernel (GCP) vulnerabilities
Ubuntu Security Notice USN-8031-1
February 12, 2026
linux-gcp-6.8 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-gcp-6.8: Linux kernel for Google Cloud Platform (GCP) systems
Details:
It was discovered that improper initialization of CPU cache memory could
allow a local attacker with hypervisor access to overwrite SEV-SNP guest
memory resulting in loss of data integrity. (CVE-2024-36331)
Oleksii Oleksenko, Cedric Fournet, Jana Hofmann, Boris Köpf, Stavros Volos,
and Flavien Solt discovered that some AMD processors may allow an attacker
to infer data from previous stores, potentially resulting in the leakage of
privileged information. A local attacker could possibly use this to expose
sensitive information. (CVE-2024-36350, CVE-2024-36357)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM32 architecture;
- ARM64 architecture;
- MIPS architecture;
- PA-RISC architecture;
- PowerPC architecture;
- RISC-V architecture;
- S390 architecture;
- x86 architecture;
- Block layer subsystem;
- Cryptographic API;
- Compute Acceleration Framework;
- ACPI drivers;
- Serial ATA and Parallel ATA drivers;
- ATM drivers;
- Drivers core;
- ATA over ethernet (AOE) driver;
- DRBD Distributed Replicated Block Device drivers;
- Network block device driver;
- Ublk userspace block driver;
- Bluetooth drivers;
- Bus devices;
- Character device driver;
- TPM device driver;
- Clock framework and drivers;
- Data acquisition framework and drivers;
- CPU frequency scaling framework;
- Hardware crypto device drivers;
- Device frequency scaling framework;
- Buffer Sharing and Synchronization framework;
- DMA engine subsystem;
- EDAC drivers;
- Arm Firmware Framework for ARMv8-A(FFA);
- ARM SCMI message protocol;
- FPGA Framework;
- GPU drivers;
- HID subsystem;
- Hardware monitoring drivers;
- HW tracing;
- I2C subsystem;
- I3C subsystem;
- IIO subsystem;
- InfiniBand drivers;
- Input Device core drivers;
- Input Device (Miscellaneous) drivers;
- IOMMU subsystem;
- IRQ chip drivers;
- MCB driver;
- Multiple devices driver;
- Media drivers;
- Multifunction device drivers;
- Microchip PCI driver;
- Intel Management Engine Interface driver;
- PCI Endpoint Test driver;
- TI TPS6594 PFSM driver;
- VMware VMCI Driver;
- MMC subsystem;
- MTD block device drivers;
- Network drivers;
- Mellanox network drivers;
- STMicroelectronics network drivers;
- NVDIMM (Non-Volatile Memory Device) drivers;
- NVME drivers;
- PCI subsystem;
- Amlogic Meson DDR PMU;
- PHY drivers;
- Pin controllers subsystem;
- x86 platform drivers;
- Power supply drivers;
- Powercap sysfs driver;
- PTP clock framework;
- PWM drivers;
- RapidIO drivers;
- Voltage and Current Regulator drivers;
- Remote Processor subsystem;
- S/390 drivers;
- SCSI subsystem;
- ASPEED SoC drivers;
- QCOM SoC drivers;
- Samsung SoC drivers;
- SPI subsystem;
- small TFT LCD display modules;
- Media staging drivers;
- TCM subsystem;
- Trusted Execution Environment drivers;
- Thunderbolt and USB4 drivers;
- TTY drivers;
- UFS subsystem;
- Cadence USB3 driver;
- ChipIdea USB driver;
- USB Device Class drivers;
- USB core drivers;
- DesignWare USB3 driver;
- USB Gadget drivers;
- USB Host Controller drivers;
- Renesas USBHS Controller drivers;
- USB Type-C support driver;
- USB Type-C Connector System Software Interface driver;
- VFIO drivers;
- Virtio Host (VHOST) subsystem;
- Backlight driver;
- Framebuffer layer;
- TSM Common Guest driver;
- Virtio drivers;
- Xen hypervisor drivers;
- File systems infrastructure;
- BTRFS file system;
- Ceph distributed file system;
- EFI Variable file system;
- Ext4 file system;
- F2FS file system;
- GFS2 file system;
- JFFS2 file system;
- JFS file system;
- Network file system (NFS) client;
- Network file system (NFS) server daemon;
- NILFS2 file system;
- NTFS3 file system;
- Overlay file system;
- Proc file system;
- SMB network file system;
- DRM display driver;
- Asynchronous Transfer Mode (ATM) subsystem;
- BPF subsystem;
- Memory Management;
- Internal shared memory driver;
- LZO compression library;
- Mellanox drivers;
- padata parallel execution mechanism;
- Networking subsytem;
- Bluetooth subsystem;
- Netfilter;
- Network traffic control;
- SCTP protocol;
- Network sockets;
- UDP network protocol;
- eXpress Data Path;
- XFRM subsystem;
- Digital Audio (PCM) driver;
- Universal MIDI packet (UMP) support module;
- Tracing infrastructure;
- User-space API (UAPI);
- io_uring subsystem;
- IPC subsystem;
- Perf events;
- Kernel exit() syscall;
- IRQ subsystem;
- Padata parallel execution mechanism;
- Kernel command line parsing driver;
- Hibernation control;
- RCU subsystem;
- Restartable seuqences system call mechanism;
- Maple Tree data structure library;
- Memory management;
- KASAN memory debugging framework;
- 802.1Q VLAN protocol;
- 9P file system network protocol;
- Appletalk network protocol;
- Ethernet bridge;
- CAN network layer;
- Networking core;
- Distributed Switch Architecture;
- HSR network protocol;
- IPv4 networking;
- IPv6 networking;
- MAC80211 subsystem;
- Management Component Transport Protocol (MCTP);
- MultiProtocol Label Switching driver;
- Multipath TCP;
- NetLabel subsystem;
- Netlink;
- NFC subsystem;
- Open vSwitch;
- RDS protocol;
- Rose network layer;
- RxRPC session sockets;
- SMC sockets;
- Sun RPC protocol;
- TIPC protocol;
- TLS protocol;
- Unix domain sockets;
- VMware vSockets driver;
- Wireless networking;
- ALSA framework;
- WCD audio codecs;
- Intel ASoC drivers;
- MediaTek ASoC drivers;
- QCOM ASoC drivers;
- SoC audio core drivers;
- USB sound devices;
- Virtio sound driver;
- CPU Power monitoring subsystem;
- KVM subsystem;
(CVE-2025-21884, CVE-2025-21931, CVE-2025-22026, CVE-2025-22101,
CVE-2025-22102, CVE-2025-22115, CVE-2025-22120, CVE-2025-22126,
CVE-2025-22128, CVE-2025-23140, CVE-2025-23141, CVE-2025-23142,
CVE-2025-23144, CVE-2025-23145, CVE-2025-23146, CVE-2025-23147,
CVE-2025-23148, CVE-2025-23149, CVE-2025-23150, CVE-2025-23151,
CVE-2025-23155, CVE-2025-23156, CVE-2025-23157, CVE-2025-23158,
CVE-2025-23159, CVE-2025-23160, CVE-2025-23161, CVE-2025-23163,
CVE-2025-37738, CVE-2025-37739, CVE-2025-37740, CVE-2025-37741,
CVE-2025-37742, CVE-2025-37744, CVE-2025-37745, CVE-2025-37748,
CVE-2025-37749, CVE-2025-37754, CVE-2025-37755, CVE-2025-37757,
CVE-2025-37758, CVE-2025-37759, CVE-2025-37761, CVE-2025-37763,
CVE-2025-37764, CVE-2025-37765, CVE-2025-37766, CVE-2025-37767,
CVE-2025-37768, CVE-2025-37769, CVE-2025-37770, CVE-2025-37771,
CVE-2025-37772, CVE-2025-37773, CVE-2025-37775, CVE-2025-37777,
CVE-2025-37778, CVE-2025-37780, CVE-2025-37781, CVE-2025-37784,
CVE-2025-37786, CVE-2025-37787, CVE-2025-37788, CVE-2025-37789,
CVE-2025-37790, CVE-2025-37792, CVE-2025-37793, CVE-2025-37794,
CVE-2025-37796, CVE-2025-37799, CVE-2025-37800, CVE-2025-37801,
CVE-2025-37803, CVE-2025-37805, CVE-2025-37808, CVE-2025-37809,
CVE-2025-37810, CVE-2025-37811, CVE-2025-37812, CVE-2025-37813,
CVE-2025-37815, CVE-2025-37816, CVE-2025-37817, CVE-2025-37819,
CVE-2025-37820, CVE-2025-37822, CVE-2025-37823, CVE-2025-37824,
CVE-2025-37826, CVE-2025-37827, CVE-2025-37828, CVE-2025-37829,
CVE-2025-37830, CVE-2025-37831, CVE-2025-37836, CVE-2025-37839,
CVE-2025-37840, CVE-2025-37841, CVE-2025-37842, CVE-2025-37844,
CVE-2025-37846, CVE-2025-37849, CVE-2025-37850, CVE-2025-37851,
CVE-2025-37852, CVE-2025-37853, CVE-2025-37854, CVE-2025-37856,
CVE-2025-37857, CVE-2025-37858, CVE-2025-37859, CVE-2025-37861,
CVE-2025-37862, CVE-2025-37863, CVE-2025-37864, CVE-2025-37865,
CVE-2025-37867, CVE-2025-37869, CVE-2025-37871, CVE-2025-37872,
CVE-2025-37873, CVE-2025-37874, CVE-2025-37875, CVE-2025-37878,
CVE-2025-37879, CVE-2025-37881, CVE-2025-37883, CVE-2025-37884,
CVE-2025-37885, CVE-2025-37886, CVE-2025-37887, CVE-2025-37891,
CVE-2025-37892, CVE-2025-37897, CVE-2025-37900, CVE-2025-37901,
CVE-2025-37903, CVE-2025-37905, CVE-2025-37909, CVE-2025-37911,
CVE-2025-37912, CVE-2025-37913, CVE-2025-37914, CVE-2025-37915,
CVE-2025-37916, CVE-2025-37917, CVE-2025-37918, CVE-2025-37920,
CVE-2025-37921, CVE-2025-37922, CVE-2025-37923, CVE-2025-37924,
CVE-2025-37925, CVE-2025-37927, CVE-2025-37928, CVE-2025-37930,
CVE-2025-37931, CVE-2025-37933, CVE-2025-37935, CVE-2025-37936,
CVE-2025-37938, CVE-2025-37940, CVE-2025-37943, CVE-2025-37944,
CVE-2025-37945, CVE-2025-37947, CVE-2025-37948, CVE-2025-37949,
CVE-2025-37951, CVE-2025-37952, CVE-2025-37954, CVE-2025-37956,
CVE-2025-37957, CVE-2025-37959, CVE-2025-37960, CVE-2025-37961,
CVE-2025-37962, CVE-2025-37963, CVE-2025-37967, CVE-2025-37968,
CVE-2025-37969, CVE-2025-37970, CVE-2025-37972, CVE-2025-37973,
CVE-2025-37975, CVE-2025-37977, CVE-2025-37978, CVE-2025-37979,
CVE-2025-37980, CVE-2025-37982, CVE-2025-37983, CVE-2025-37984,
CVE-2025-37985, CVE-2025-37986, CVE-2025-37987, CVE-2025-37988,
CVE-2025-37989, CVE-2025-37990, CVE-2025-37991, CVE-2025-37992,
CVE-2025-37994, CVE-2025-37995, CVE-2025-37998, CVE-2025-38003,
CVE-2025-38004, CVE-2025-38005, CVE-2025-38006, CVE-2025-38007,
CVE-2025-38008, CVE-2025-38009, CVE-2025-38010, CVE-2025-38011,
CVE-2025-38013, CVE-2025-38014, CVE-2025-38015, CVE-2025-38018,
CVE-2025-38019, CVE-2025-38020, CVE-2025-38023, CVE-2025-38024,
CVE-2025-38027, CVE-2025-38031, CVE-2025-38034, CVE-2025-38035,
CVE-2025-38037, CVE-2025-38039, CVE-2025-38040, CVE-2025-38043,
CVE-2025-38044, CVE-2025-38045, CVE-2025-38048, CVE-2025-38051,
CVE-2025-38052, CVE-2025-38053, CVE-2025-38055, CVE-2025-38057,
CVE-2025-38058, CVE-2025-38059, CVE-2025-38060, CVE-2025-38061,
CVE-2025-38062, CVE-2025-38063, CVE-2025-38065, CVE-2025-38066,
CVE-2025-38067, CVE-2025-38068, CVE-2025-38071, CVE-2025-38072,
CVE-2025-38074, CVE-2025-38075, CVE-2025-38077, CVE-2025-38078,
CVE-2025-38079, CVE-2025-38080, CVE-2025-38081, CVE-2025-38084,
CVE-2025-38085, CVE-2025-38086, CVE-2025-38087, CVE-2025-38088,
CVE-2025-38089, CVE-2025-38090, CVE-2025-38094, CVE-2025-38095,
CVE-2025-38097, CVE-2025-38098, CVE-2025-38099, CVE-2025-38100,
CVE-2025-38101, CVE-2025-38102, CVE-2025-38103, CVE-2025-38104,
CVE-2025-38107, CVE-2025-38108, CVE-2025-38109, CVE-2025-38110,
CVE-2025-38111, CVE-2025-38112, CVE-2025-38113, CVE-2025-38115,
CVE-2025-38117, CVE-2025-38119, CVE-2025-38120, CVE-2025-38122,
CVE-2025-38123, CVE-2025-38124, CVE-2025-38125, CVE-2025-38126,
CVE-2025-38127, CVE-2025-38129, CVE-2025-38131, CVE-2025-38135,
CVE-2025-38136, CVE-2025-38138, CVE-2025-38142, CVE-2025-38143,
CVE-2025-38145, CVE-2025-38146, CVE-2025-38147, CVE-2025-38148,
CVE-2025-38149, CVE-2025-38153, CVE-2025-38154, CVE-2025-38155,
CVE-2025-38156, CVE-2025-38157, CVE-2025-38158, CVE-2025-38159,
CVE-2025-38160, CVE-2025-38161, CVE-2025-38162, CVE-2025-38163,
CVE-2025-38164, CVE-2025-38165, CVE-2025-38166, CVE-2025-38167,
CVE-2025-38169, CVE-2025-38170, CVE-2025-38173, CVE-2025-38174,
CVE-2025-38180, CVE-2025-38181, CVE-2025-38182, CVE-2025-38183,
CVE-2025-38184, CVE-2025-38185, CVE-2025-38190, CVE-2025-38191,
CVE-2025-38192, CVE-2025-38193, CVE-2025-38194, CVE-2025-38197,
CVE-2025-38198, CVE-2025-38200, CVE-2025-38202, CVE-2025-38208,
CVE-2025-38210, CVE-2025-38211, CVE-2025-38212, CVE-2025-38214,
CVE-2025-38215, CVE-2025-38217, CVE-2025-38218, CVE-2025-38219,
CVE-2025-38220, CVE-2025-38222, CVE-2025-38225, CVE-2025-38226,
CVE-2025-38229, CVE-2025-38230, CVE-2025-38231, CVE-2025-38232,
CVE-2025-38236, CVE-2025-38239, CVE-2025-38244, CVE-2025-38245,
CVE-2025-38246, CVE-2025-38248, CVE-2025-38249, CVE-2025-38250,
CVE-2025-38251, CVE-2025-38253, CVE-2025-38255, CVE-2025-38257,
CVE-2025-38258, CVE-2025-38259, CVE-2025-38260, CVE-2025-38262,
CVE-2025-38263, CVE-2025-38264, CVE-2025-38265, CVE-2025-38269,
CVE-2025-38274, CVE-2025-38275, CVE-2025-38277, CVE-2025-38278,
CVE-2025-38279, CVE-2025-38280, CVE-2025-38282, CVE-2025-38283,
CVE-2025-38285, CVE-2025-38286, CVE-2025-38289, CVE-2025-38290,
CVE-2025-38292, CVE-2025-38293, CVE-2025-38295, CVE-2025-38298,
CVE-2025-38299, CVE-2025-38300, CVE-2025-38303, CVE-2025-38304,
CVE-2025-38305, CVE-2025-38307, CVE-2025-38310, CVE-2025-38312,
CVE-2025-38313, CVE-2025-38319, CVE-2025-38320, CVE-2025-38321,
CVE-2025-38322, CVE-2025-38323, CVE-2025-38324, CVE-2025-38326,
CVE-2025-38328, CVE-2025-38331, CVE-2025-38332, CVE-2025-38333,
CVE-2025-38334, CVE-2025-38335, CVE-2025-38336, CVE-2025-38337,
CVE-2025-38338, CVE-2025-38342, CVE-2025-38343, CVE-2025-38344,
CVE-2025-38345, CVE-2025-38346, CVE-2025-38347, CVE-2025-38348,
CVE-2025-38349, CVE-2025-38351, CVE-2025-38354, CVE-2025-38361,
CVE-2025-38362, CVE-2025-38363, CVE-2025-38364, CVE-2025-38365,
CVE-2025-38368, CVE-2025-38369, CVE-2025-38371, CVE-2025-38373,
CVE-2025-38374, CVE-2025-38375, CVE-2025-38376, CVE-2025-38377,
CVE-2025-38382, CVE-2025-38384, CVE-2025-38385, CVE-2025-38386,
CVE-2025-38387, CVE-2025-38388, CVE-2025-38389, CVE-2025-38390,
CVE-2025-38391, CVE-2025-38392, CVE-2025-38393, CVE-2025-38395,
CVE-2025-38396, CVE-2025-38399, CVE-2025-38400, CVE-2025-38401,
CVE-2025-38402, CVE-2025-38403, CVE-2025-38405, CVE-2025-38406,
CVE-2025-38407, CVE-2025-38408, CVE-2025-38409, CVE-2025-38410,
CVE-2025-38412, CVE-2025-38414, CVE-2025-38415, CVE-2025-38416,
CVE-2025-38418, CVE-2025-38419, CVE-2025-38420, CVE-2025-38422,
CVE-2025-38424, CVE-2025-38427, CVE-2025-38428, CVE-2025-38429,
CVE-2025-38430, CVE-2025-38436, CVE-2025-38437, CVE-2025-38439,
CVE-2025-38441, CVE-2025-38443, CVE-2025-38444, CVE-2025-38445,
CVE-2025-38448, CVE-2025-38449, CVE-2025-38455, CVE-2025-38456,
CVE-2025-38457, CVE-2025-38458, CVE-2025-38459, CVE-2025-38460,
CVE-2025-38461, CVE-2025-38462, CVE-2025-38463, CVE-2025-38464,
CVE-2025-38465, CVE-2025-38466, CVE-2025-38467, CVE-2025-38468,
CVE-2025-38469, CVE-2025-38470, CVE-2025-38471, CVE-2025-38472,
CVE-2025-38473, CVE-2025-38474, CVE-2025-38476, CVE-2025-38478,
CVE-2025-38480, CVE-2025-38481, CVE-2025-38482, CVE-2025-38483,
CVE-2025-38485, CVE-2025-38487, CVE-2025-38488, CVE-2025-38489,
CVE-2025-38490, CVE-2025-38491, CVE-2025-38493, CVE-2025-38494,
CVE-2025-38495, CVE-2025-38496, CVE-2025-38497, CVE-2025-38499,
CVE-2025-38501, CVE-2025-38503, CVE-2025-38506, CVE-2025-38507,
CVE-2025-38510, CVE-2025-38511, CVE-2025-38512, CVE-2025-38513,
CVE-2025-38514, CVE-2025-38515, CVE-2025-38516, CVE-2025-38520,
CVE-2025-38521, CVE-2025-38524, CVE-2025-38526, CVE-2025-38527,
CVE-2025-38528, CVE-2025-38529, CVE-2025-38530, CVE-2025-38531,
CVE-2025-38532, CVE-2025-38533, CVE-2025-38535, CVE-2025-38537,
CVE-2025-38538, CVE-2025-38539, CVE-2025-38540, CVE-2025-38542,
CVE-2025-38543, CVE-2025-38544, CVE-2025-38546, CVE-2025-38548,
CVE-2025-38549, CVE-2025-38550, CVE-2025-38551, CVE-2025-38552,
CVE-2025-38553, CVE-2025-38555, CVE-2025-38560, CVE-2025-38562,
CVE-2025-38566, CVE-2025-38568, CVE-2025-38569, CVE-2025-38571,
CVE-2025-38572, CVE-2025-38574, CVE-2025-38576, CVE-2025-38577,
CVE-2025-38578, CVE-2025-38579, CVE-2025-38581, CVE-2025-38582,
CVE-2025-38583, CVE-2025-38584, CVE-2025-38585, CVE-2025-38587,
CVE-2025-38588, CVE-2025-38590, CVE-2025-38593, CVE-2025-38595,
CVE-2025-38601, CVE-2025-38602, CVE-2025-38604, CVE-2025-38608,
CVE-2025-38609, CVE-2025-38610, CVE-2025-38612, CVE-2025-38614,
CVE-2025-38615, CVE-2025-38619, CVE-2025-38622, CVE-2025-38623,
CVE-2025-38624, CVE-2025-38625, CVE-2025-38626, CVE-2025-38630,
CVE-2025-38632, CVE-2025-38634, CVE-2025-38635, CVE-2025-38639,
CVE-2025-38640, CVE-2025-38644, CVE-2025-38645, CVE-2025-38646,
CVE-2025-38648, CVE-2025-38650, CVE-2025-38652, CVE-2025-38653,
CVE-2025-38659, CVE-2025-38660, CVE-2025-38663, CVE-2025-38664,
CVE-2025-38665, CVE-2025-38668, CVE-2025-38670, CVE-2025-38671,
CVE-2025-38675, CVE-2025-38676, CVE-2025-38677, CVE-2025-38679,
CVE-2025-38680, CVE-2025-38681, CVE-2025-38683, CVE-2025-38684,
CVE-2025-38685, CVE-2025-38686, CVE-2025-38687, CVE-2025-38688,
CVE-2025-38691, CVE-2025-38692, CVE-2025-38693, CVE-2025-38694,
CVE-2025-38695, CVE-2025-38696, CVE-2025-38697, CVE-2025-38698,
CVE-2025-38699, CVE-2025-38700, CVE-2025-38701, CVE-2025-38702,
CVE-2025-38703, CVE-2025-38704, CVE-2025-38705, CVE-2025-38706,
CVE-2025-38707, CVE-2025-38708, CVE-2025-38710, CVE-2025-38711,
CVE-2025-38712, CVE-2025-38713, CVE-2025-38714, CVE-2025-38715,
CVE-2025-38716, CVE-2025-38718, CVE-2025-38721, CVE-2025-38722,
CVE-2025-38724, CVE-2025-38725, CVE-2025-38728, CVE-2025-38729,
CVE-2025-38730, CVE-2025-38732, CVE-2025-38734, CVE-2025-38735,
CVE-2025-39673, CVE-2025-39675, CVE-2025-39676, CVE-2025-39679,
CVE-2025-39681, CVE-2025-39683, CVE-2025-39684, CVE-2025-39685,
CVE-2025-39686, CVE-2025-39687, CVE-2025-39689, CVE-2025-39691,
CVE-2025-39692, CVE-2025-39693, CVE-2025-39694, CVE-2025-39701,
CVE-2025-39702, CVE-2025-39703, CVE-2025-39705, CVE-2025-39706,
CVE-2025-39707, CVE-2025-39709, CVE-2025-39710, CVE-2025-39711,
CVE-2025-39712, CVE-2025-39713, CVE-2025-39714, CVE-2025-39715,
CVE-2025-39716, CVE-2025-39718, CVE-2025-39719, CVE-2025-39720,
CVE-2025-39721, CVE-2025-39724, CVE-2025-39726, CVE-2025-39730,
CVE-2025-39731, CVE-2025-39732, CVE-2025-39734, CVE-2025-39736,
CVE-2025-39737, CVE-2025-39738, CVE-2025-39739, CVE-2025-39742,
CVE-2025-39743, CVE-2025-39744, CVE-2025-39746, CVE-2025-39747,
CVE-2025-39748, CVE-2025-39749, CVE-2025-39750, CVE-2025-39752,
CVE-2025-39753, CVE-2025-39756, CVE-2025-39757, CVE-2025-39758,
CVE-2025-39759, CVE-2025-39760, CVE-2025-39761, CVE-2025-39763,
CVE-2025-39766, CVE-2025-39770, CVE-2025-39772, CVE-2025-39773,
CVE-2025-39776, CVE-2025-39779, CVE-2025-39781, CVE-2025-39782,
CVE-2025-39783, CVE-2025-39787, CVE-2025-39788, CVE-2025-39790,
CVE-2025-39794, CVE-2025-39795, CVE-2025-39797, CVE-2025-39798,
CVE-2025-39800, CVE-2025-39801, CVE-2025-39889, CVE-2025-39890,
CVE-2025-39946, CVE-2025-39989, CVE-2025-40215, CVE-2025-40297,
CVE-2025-68750)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS
linux-image-6.8.0-1047-gcp 6.8.0-1047.50~22.04.2
linux-image-6.8.0-1047-gcp-64k 6.8.0-1047.50~22.04.2
linux-image-gcp 6.8.0-1047.50~22.04.2
linux-image-gcp-6.8 6.8.0-1047.50~22.04.2
linux-image-gcp-64k 6.8.0-1047.50~22.04.2
linux-image-gcp-64k-6.8 6.8.0-1047.50~22.04.2
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-8031-1
CVE-2024-36331, CVE-2024-36350, CVE-2024-36357, CVE-2025-21884,
CVE-2025-21931, CVE-2025-22026, CVE-2025-22101, CVE-2025-22102,
CVE-2025-22115, CVE-2025-22120, CVE-2025-22126, CVE-2025-22128,
CVE-2025-23140, CVE-2025-23141, CVE-2025-23142, CVE-2025-23144,
CVE-2025-23145, CVE-2025-23146, CVE-2025-23147, CVE-2025-23148,
CVE-2025-23149, CVE-2025-23150, CVE-2025-23151, CVE-2025-23155,
CVE-2025-23156, CVE-2025-23157, CVE-2025-23158, CVE-2025-23159,
CVE-2025-23160, CVE-2025-23161, CVE-2025-23163, CVE-2025-37738,
CVE-2025-37739, CVE-2025-37740, CVE-2025-37741, CVE-2025-37742,
CVE-2025-37744, CVE-2025-37745, CVE-2025-37748, CVE-2025-37749,
CVE-2025-37754, CVE-2025-37755, CVE-2025-37757, CVE-2025-37758,
CVE-2025-37759, CVE-2025-37761, CVE-2025-37763, CVE-2025-37764,
CVE-2025-37765, CVE-2025-37766, CVE-2025-37767, CVE-2025-37768,
CVE-2025-37769, CVE-2025-37770, CVE-2025-37771, CVE-2025-37772,
CVE-2025-37773, CVE-2025-37775, CVE-2025-37777, CVE-2025-37778,
CVE-2025-37780, CVE-2025-37781, CVE-2025-37784, CVE-2025-37786,
CVE-2025-37787, CVE-2025-37788, CVE-2025-37789, CVE-2025-37790,
CVE-2025-37792, CVE-2025-37793, CVE-2025-37794, CVE-2025-37796,
CVE-2025-37799, CVE-2025-37800, CVE-2025-37801, CVE-2025-37803,
CVE-2025-37805, CVE-2025-37808, CVE-2025-37809, CVE-2025-37810,
CVE-2025-37811, CVE-2025-37812, CVE-2025-37813, CVE-2025-37815,
CVE-2025-37816, CVE-2025-37817, CVE-2025-37819, CVE-2025-37820,
CVE-2025-37822, CVE-2025-37823, CVE-2025-37824, CVE-2025-37826,
CVE-2025-37827, CVE-2025-37828, CVE-2025-37829, CVE-2025-37830,
CVE-2025-37831, CVE-2025-37836, CVE-2025-37839, CVE-2025-37840,
CVE-2025-37841, CVE-2025-37842, CVE-2025-37844, CVE-2025-37846,
CVE-2025-37849, CVE-2025-37850, CVE-2025-37851, CVE-2025-37852,
CVE-2025-37853, CVE-2025-37854, CVE-2025-37856, CVE-2025-37857,
CVE-2025-37858, CVE-2025-37859, CVE-2025-37861, CVE-2025-37862,
CVE-2025-37863, CVE-2025-37864, CVE-2025-37865, CVE-2025-37867,
CVE-2025-37869, CVE-2025-37871, CVE-2025-37872, CVE-2025-37873,
CVE-2025-37874, CVE-2025-37875, CVE-2025-37878, CVE-2025-37879,
CVE-2025-37881, CVE-2025-37883, CVE-2025-37884, CVE-2025-37885,
CVE-2025-37886, CVE-2025-37887, CVE-2025-37891, CVE-2025-37892,
CVE-2025-37897, CVE-2025-37900, CVE-2025-37901, CVE-2025-37903,
CVE-2025-37905, CVE-2025-37909, CVE-2025-37911, CVE-2025-37912,
CVE-2025-37913, CVE-2025-37914, CVE-2025-37915, CVE-2025-37916,
CVE-2025-37917, CVE-2025-37918, CVE-2025-37920, CVE-2025-37921,
CVE-2025-37922, CVE-2025-37923, CVE-2025-37924, CVE-2025-37925,
CVE-2025-37927, CVE-2025-37928, CVE-2025-37930, CVE-2025-37931,
CVE-2025-37933, CVE-2025-37935, CVE-2025-37936, CVE-2025-37938,
CVE-2025-37940, CVE-2025-37943, CVE-2025-37944, CVE-2025-37945,
CVE-2025-37947, CVE-2025-37948, CVE-2025-37949, CVE-2025-37951,
CVE-2025-37952, CVE-2025-37954, CVE-2025-37956, CVE-2025-37957,
CVE-2025-37959, CVE-2025-37960, CVE-2025-37961, CVE-2025-37962,
CVE-2025-37963, CVE-2025-37967, CVE-2025-37968, CVE-2025-37969,
CVE-2025-37970, CVE-2025-37972, CVE-2025-37973, CVE-2025-37975,
CVE-2025-37977, CVE-2025-37978, CVE-2025-37979, CVE-2025-37980,
CVE-2025-37982, CVE-2025-37983, CVE-2025-37984, CVE-2025-37985,
CVE-2025-37986, CVE-2025-37987, CVE-2025-37988, CVE-2025-37989,
CVE-2025-37990, CVE-2025-37991, CVE-2025-37992, CVE-2025-37994,
CVE-2025-37995, CVE-2025-37998, CVE-2025-38003, CVE-2025-38004,
CVE-2025-38005, CVE-2025-38006, CVE-2025-38007, CVE-2025-38008,
CVE-2025-38009, CVE-2025-38010, CVE-2025-38011, CVE-2025-38013,
CVE-2025-38014, CVE-2025-38015, CVE-2025-38018, CVE-2025-38019,
CVE-2025-38020, CVE-2025-38023, CVE-2025-38024, CVE-2025-38027,
CVE-2025-38031, CVE-2025-38034, CVE-2025-38035, CVE-2025-38037,
CVE-2025-38039, CVE-2025-38040, CVE-2025-38043, CVE-2025-38044,
CVE-2025-38045, CVE-2025-38048, CVE-2025-38051, CVE-2025-38052,
CVE-2025-38053, CVE-2025-38055, CVE-2025-38057, CVE-2025-38058,
CVE-2025-38059, CVE-2025-38060, CVE-2025-38061, CVE-2025-38062,
CVE-2025-38063, CVE-2025-38065, CVE-2025-38066, CVE-2025-38067,
CVE-2025-38068, CVE-2025-38071, CVE-2025-38072, CVE-2025-38074,
CVE-2025-38075, CVE-2025-38077, CVE-2025-38078, CVE-2025-38079,
CVE-2025-38080, CVE-2025-38081, CVE-2025-38084, CVE-2025-38085,
CVE-2025-38086, CVE-2025-38087, CVE-2025-38088, CVE-2025-38089,
CVE-2025-38090, CVE-2025-38094, CVE-2025-38095, CVE-2025-38097,
CVE-2025-38098, CVE-2025-38099, CVE-2025-38100, CVE-2025-38101,
CVE-2025-38102, CVE-2025-38103, CVE-2025-38104, CVE-2025-38107,
CVE-2025-38108, CVE-2025-38109, CVE-2025-38110, CVE-2025-38111,
CVE-2025-38112, CVE-2025-38113, CVE-2025-38115, CVE-2025-38117,
CVE-2025-38119, CVE-2025-38120, CVE-2025-38122, CVE-2025-38123,
CVE-2025-38124, CVE-2025-38125, CVE-2025-38126, CVE-2025-38127,
CVE-2025-38129, CVE-2025-38131, CVE-2025-38135, CVE-2025-38136,
CVE-2025-38138, CVE-2025-38142, CVE-2025-38143, CVE-2025-38145,
CVE-2025-38146, CVE-2025-38147, CVE-2025-38148, CVE-2025-38149,
CVE-2025-38153, CVE-2025-38154, CVE-2025-38155, CVE-2025-38156,
CVE-2025-38157, CVE-2025-38158, CVE-2025-38159, CVE-2025-38160,
CVE-2025-38161, CVE-2025-38162, CVE-2025-38163, CVE-2025-38164,
CVE-2025-38165, CVE-2025-38166, CVE-2025-38167, CVE-2025-38169,
CVE-2025-38170, CVE-2025-38173, CVE-2025-38174, CVE-2025-38180,
CVE-2025-38181, CVE-2025-38182, CVE-2025-38183, CVE-2025-38184,
CVE-2025-38185, CVE-2025-38190, CVE-2025-38191, CVE-2025-38192,
CVE-2025-38193, CVE-2025-38194, CVE-2025-38197, CVE-2025-38198,
CVE-2025-38200, CVE-2025-38202, CVE-2025-38208, CVE-2025-38210,
CVE-2025-38211, CVE-2025-38212, CVE-2025-38214, CVE-2025-38215,
CVE-2025-38217, CVE-2025-38218, CVE-2025-38219, CVE-2025-38220,
CVE-2025-38222, CVE-2025-38225, CVE-2025-38226, CVE-2025-38229,
CVE-2025-38230, CVE-2025-38231, CVE-2025-38232, CVE-2025-38236,
CVE-2025-38239, CVE-2025-38244, CVE-2025-38245, CVE-2025-38246,
CVE-2025-38248, CVE-2025-38249, CVE-2025-38250, CVE-2025-38251,
CVE-2025-38253, CVE-2025-38255, CVE-2025-38257, CVE-2025-38258,
CVE-2025-38259, CVE-2025-38260, CVE-2025-38262, CVE-2025-38263,
CVE-2025-38264, CVE-2025-38265, CVE-2025-38269, CVE-2025-38274,
CVE-2025-38275, CVE-2025-38277, CVE-2025-38278, CVE-2025-38279,
CVE-2025-38280, CVE-2025-38282, CVE-2025-38283, CVE-2025-38285,
CVE-2025-38286, CVE-2025-38289, CVE-2025-38290, CVE-2025-38292,
CVE-2025-38293, CVE-2025-38295, CVE-2025-38298, CVE-2025-38299,
CVE-2025-38300, CVE-2025-38303, CVE-2025-38304, CVE-2025-38305,
CVE-2025-38307, CVE-2025-38310, CVE-2025-38312, CVE-2025-38313,
CVE-2025-38319, CVE-2025-38320, CVE-2025-38321, CVE-2025-38322,
CVE-2025-38323, CVE-2025-38324, CVE-2025-38326, CVE-2025-38328,
CVE-2025-38331, CVE-2025-38332, CVE-2025-38333, CVE-2025-38334,
CVE-2025-38335, CVE-2025-38336, CVE-2025-38337, CVE-2025-38338,
CVE-2025-38342, CVE-2025-38343, CVE-2025-38344, CVE-2025-38345,
CVE-2025-38346, CVE-2025-38347, CVE-2025-38348, CVE-2025-38349,
CVE-2025-38351, CVE-2025-38354, CVE-2025-38361, CVE-2025-38362,
CVE-2025-38363, CVE-2025-38364, CVE-2025-38365, CVE-2025-38368,
CVE-2025-38369, CVE-2025-38371, CVE-2025-38373, CVE-2025-38374,
CVE-2025-38375, CVE-2025-38376, CVE-2025-38377, CVE-2025-38382,
CVE-2025-38384, CVE-2025-38385, CVE-2025-38386, CVE-2025-38387,
CVE-2025-38388, CVE-2025-38389, CVE-2025-38390, CVE-2025-38391,
CVE-2025-38392, CVE-2025-38393, CVE-2025-38395, CVE-2025-38396,
CVE-2025-38399, CVE-2025-38400, CVE-2025-38401, CVE-2025-38402,
CVE-2025-38403, CVE-2025-38405, CVE-2025-38406, CVE-2025-38407,
CVE-2025-38408, CVE-2025-38409, CVE-2025-38410, CVE-2025-38412,
CVE-2025-38414, CVE-2025-38415, CVE-2025-38416, CVE-2025-38418,
CVE-2025-38419, CVE-2025-38420, CVE-2025-38422, CVE-2025-38424,
CVE-2025-38427, CVE-2025-38428, CVE-2025-38429, CVE-2025-38430,
CVE-2025-38436, CVE-2025-38437, CVE-2025-38439, CVE-2025-38441,
CVE-2025-38443, CVE-2025-38444, CVE-2025-38445, CVE-2025-38448,
CVE-2025-38449, CVE-2025-38455, CVE-2025-38456, CVE-2025-38457,
CVE-2025-38458, CVE-2025-38459, CVE-2025-38460, CVE-2025-38461,
CVE-2025-38462, CVE-2025-38463, CVE-2025-38464, CVE-2025-38465,
CVE-2025-38466, CVE-2025-38467, CVE-2025-38468, CVE-2025-38469,
CVE-2025-38470, CVE-2025-38471, CVE-2025-38472, CVE-2025-38473,
CVE-2025-38474, CVE-2025-38476, CVE-2025-38478, CVE-2025-38480,
CVE-2025-38481, CVE-2025-38482, CVE-2025-38483, CVE-2025-38485,
CVE-2025-38487, CVE-2025-38488, CVE-2025-38489, CVE-2025-38490,
CVE-2025-38491, CVE-2025-38493, CVE-2025-38494, CVE-2025-38495,
CVE-2025-38496, CVE-2025-38497, CVE-2025-38499, CVE-2025-38501,
CVE-2025-38503, CVE-2025-38506, CVE-2025-38507, CVE-2025-38510,
CVE-2025-38511, CVE-2025-38512, CVE-2025-38513, CVE-2025-38514,
CVE-2025-38515, CVE-2025-38516, CVE-2025-38520, CVE-2025-38521,
CVE-2025-38524, CVE-2025-38526, CVE-2025-38527, CVE-2025-38528,
CVE-2025-38529, CVE-2025-38530, CVE-2025-38531, CVE-2025-38532,
CVE-2025-38533, CVE-2025-38535, CVE-2025-38537, CVE-2025-38538,
CVE-2025-38539, CVE-2025-38540, CVE-2025-38542, CVE-2025-38543,
CVE-2025-38544, CVE-2025-38546, CVE-2025-38548, CVE-2025-38549,
CVE-2025-38550, CVE-2025-38551, CVE-2025-38552, CVE-2025-38553,
CVE-2025-38555, CVE-2025-38560, CVE-2025-38562, CVE-2025-38566,
CVE-2025-38568, CVE-2025-38569, CVE-2025-38571, CVE-2025-38572,
CVE-2025-38574, CVE-2025-38576, CVE-2025-38577, CVE-2025-38578,
CVE-2025-38579, CVE-2025-38581, CVE-2025-38582, CVE-2025-38583,
CVE-2025-38584, CVE-2025-38585, CVE-2025-38587, CVE-2025-38588,
CVE-2025-38590, CVE-2025-38593, CVE-2025-38595, CVE-2025-38601,
CVE-2025-38602, CVE-2025-38604, CVE-2025-38608, CVE-2025-38609,
CVE-2025-38610, CVE-2025-38612, CVE-2025-38614, CVE-2025-38615,
CVE-2025-38619, CVE-2025-38622, CVE-2025-38623, CVE-2025-38624,
CVE-2025-38625, CVE-2025-38626, CVE-2025-38630, CVE-2025-38632,
CVE-2025-38634, CVE-2025-38635, CVE-2025-38639, CVE-2025-38640,
CVE-2025-38644, CVE-2025-38645, CVE-2025-38646, CVE-2025-38648,
CVE-2025-38650, CVE-2025-38652, CVE-2025-38653, CVE-2025-38659,
CVE-2025-38660, CVE-2025-38663, CVE-2025-38664, CVE-2025-38665,
CVE-2025-38668, CVE-2025-38670, CVE-2025-38671, CVE-2025-38675,
CVE-2025-38676, CVE-2025-38677, CVE-2025-38679, CVE-2025-38680,
CVE-2025-38681, CVE-2025-38683, CVE-2025-38684, CVE-2025-38685,
CVE-2025-38686, CVE-2025-38687, CVE-2025-38688, CVE-2025-38691,
CVE-2025-38692, CVE-2025-38693, CVE-2025-38694, CVE-2025-38695,
CVE-2025-38696, CVE-2025-38697, CVE-2025-38698, CVE-2025-38699,
CVE-2025-38700, CVE-2025-38701, CVE-2025-38702, CVE-2025-38703,
CVE-2025-38704, CVE-2025-38705, CVE-2025-38706, CVE-2025-38707,
CVE-2025-38708, CVE-2025-38710, CVE-2025-38711, CVE-2025-38712,
CVE-2025-38713, CVE-2025-38714, CVE-2025-38715, CVE-2025-38716,
CVE-2025-38718, CVE-2025-38721, CVE-2025-38722, CVE-2025-38724,
CVE-2025-38725, CVE-2025-38728, CVE-2025-38729, CVE-2025-38730,
CVE-2025-38732, CVE-2025-38734, CVE-2025-38735, CVE-2025-39673,
CVE-2025-39675, CVE-2025-39676, CVE-2025-39679, CVE-2025-39681,
CVE-2025-39683, CVE-2025-39684, CVE-2025-39685, CVE-2025-39686,
CVE-2025-39687, CVE-2025-39689, CVE-2025-39691, CVE-2025-39692,
CVE-2025-39693, CVE-2025-39694, CVE-2025-39701, CVE-2025-39702,
CVE-2025-39703, CVE-2025-39705, CVE-2025-39706, CVE-2025-39707,
CVE-2025-39709, CVE-2025-39710, CVE-2025-39711, CVE-2025-39712,
CVE-2025-39713, CVE-2025-39714, CVE-2025-39715, CVE-2025-39716,
CVE-2025-39718, CVE-2025-39719, CVE-2025-39720, CVE-2025-39721,
CVE-2025-39724, CVE-2025-39726, CVE-2025-39730, CVE-2025-39731,
CVE-2025-39732, CVE-2025-39734, CVE-2025-39736, CVE-2025-39737,
CVE-2025-39738, CVE-2025-39739, CVE-2025-39742, CVE-2025-39743,
CVE-2025-39744, CVE-2025-39746, CVE-2025-39747, CVE-2025-39748,
CVE-2025-39749, CVE-2025-39750, CVE-2025-39752, CVE-2025-39753,
CVE-2025-39756, CVE-2025-39757, CVE-2025-39758, CVE-2025-39759,
CVE-2025-39760, CVE-2025-39761, CVE-2025-39763, CVE-2025-39766,
CVE-2025-39770, CVE-2025-39772, CVE-2025-39773, CVE-2025-39776,
CVE-2025-39779, CVE-2025-39781, CVE-2025-39782, CVE-2025-39783,
CVE-2025-39787, CVE-2025-39788, CVE-2025-39790, CVE-2025-39794,
CVE-2025-39795, CVE-2025-39797, CVE-2025-39798, CVE-2025-39800,
CVE-2025-39801, CVE-2025-39889, CVE-2025-39890, CVE-2025-39946,
CVE-2025-39989, CVE-2025-40215, CVE-2025-40297, CVE-2025-68750
Package Information:
https://launchpad.net/ubuntu/+source/linux-gcp-6.8/6.8.0-1047.50~22.04.2
[USN-8028-2] Linux kernel (Real-time) vulnerabilities
Ubuntu Security Notice USN-8028-2
February 12, 2026
linux-realtime-6.8 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-realtime-6.8: Linux kernel for Real-time systems
Details:
It was discovered that improper initialization of CPU cache memory could
allow a local attacker with hypervisor access to overwrite SEV-SNP guest
memory resulting in loss of data integrity. (CVE-2024-36331)
Oleksii Oleksenko, Cedric Fournet, Jana Hofmann, Boris Köpf, Stavros Volos,
and Flavien Solt discovered that some AMD processors may allow an attacker
to infer data from previous stores, potentially resulting in the leakage of
privileged information. A local attacker could possibly use this to expose
sensitive information. (CVE-2024-36350, CVE-2024-36357)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM32 architecture;
- ARM64 architecture;
- MIPS architecture;
- PA-RISC architecture;
- PowerPC architecture;
- RISC-V architecture;
- S390 architecture;
- x86 architecture;
- Block layer subsystem;
- Cryptographic API;
- Compute Acceleration Framework;
- ACPI drivers;
- Serial ATA and Parallel ATA drivers;
- ATM drivers;
- Drivers core;
- ATA over ethernet (AOE) driver;
- DRBD Distributed Replicated Block Device drivers;
- Network block device driver;
- Ublk userspace block driver;
- Bluetooth drivers;
- Bus devices;
- Character device driver;
- TPM device driver;
- Clock framework and drivers;
- Data acquisition framework and drivers;
- CPU frequency scaling framework;
- Hardware crypto device drivers;
- Device frequency scaling framework;
- Buffer Sharing and Synchronization framework;
- DMA engine subsystem;
- EDAC drivers;
- Arm Firmware Framework for ARMv8-A(FFA);
- ARM SCMI message protocol;
- FPGA Framework;
- GPU drivers;
- HID subsystem;
- Hardware monitoring drivers;
- HW tracing;
- I2C subsystem;
- I3C subsystem;
- IIO subsystem;
- InfiniBand drivers;
- Input Device core drivers;
- Input Device (Miscellaneous) drivers;
- IOMMU subsystem;
- IRQ chip drivers;
- MCB driver;
- Multiple devices driver;
- Media drivers;
- Multifunction device drivers;
- Microchip PCI driver;
- Intel Management Engine Interface driver;
- PCI Endpoint Test driver;
- TI TPS6594 PFSM driver;
- VMware VMCI Driver;
- MMC subsystem;
- MTD block device drivers;
- Network drivers;
- Mellanox network drivers;
- STMicroelectronics network drivers;
- NVDIMM (Non-Volatile Memory Device) drivers;
- NVME drivers;
- PCI subsystem;
- Amlogic Meson DDR PMU;
- PHY drivers;
- Pin controllers subsystem;
- x86 platform drivers;
- Power supply drivers;
- Powercap sysfs driver;
- PTP clock framework;
- PWM drivers;
- RapidIO drivers;
- Voltage and Current Regulator drivers;
- Remote Processor subsystem;
- S/390 drivers;
- SCSI subsystem;
- ASPEED SoC drivers;
- QCOM SoC drivers;
- Samsung SoC drivers;
- SPI subsystem;
- small TFT LCD display modules;
- Media staging drivers;
- TCM subsystem;
- Trusted Execution Environment drivers;
- Thunderbolt and USB4 drivers;
- TTY drivers;
- UFS subsystem;
- Cadence USB3 driver;
- ChipIdea USB driver;
- USB Device Class drivers;
- USB core drivers;
- DesignWare USB3 driver;
- USB Gadget drivers;
- USB Host Controller drivers;
- Renesas USBHS Controller drivers;
- USB Type-C support driver;
- USB Type-C Connector System Software Interface driver;
- VFIO drivers;
- Virtio Host (VHOST) subsystem;
- Backlight driver;
- Framebuffer layer;
- TSM Common Guest driver;
- Virtio drivers;
- Xen hypervisor drivers;
- File systems infrastructure;
- BTRFS file system;
- Ceph distributed file system;
- EFI Variable file system;
- Ext4 file system;
- F2FS file system;
- GFS2 file system;
- JFFS2 file system;
- JFS file system;
- Network file system (NFS) client;
- Network file system (NFS) server daemon;
- NILFS2 file system;
- NTFS3 file system;
- Overlay file system;
- Proc file system;
- SMB network file system;
- DRM display driver;
- Asynchronous Transfer Mode (ATM) subsystem;
- BPF subsystem;
- Memory Management;
- Internal shared memory driver;
- LZO compression library;
- Mellanox drivers;
- padata parallel execution mechanism;
- Networking subsytem;
- Bluetooth subsystem;
- Netfilter;
- Network traffic control;
- SCTP protocol;
- Network sockets;
- UDP network protocol;
- eXpress Data Path;
- XFRM subsystem;
- Digital Audio (PCM) driver;
- Universal MIDI packet (UMP) support module;
- Tracing infrastructure;
- User-space API (UAPI);
- io_uring subsystem;
- IPC subsystem;
- Perf events;
- Kernel exit() syscall;
- IRQ subsystem;
- Padata parallel execution mechanism;
- Kernel command line parsing driver;
- Hibernation control;
- RCU subsystem;
- Restartable seuqences system call mechanism;
- Maple Tree data structure library;
- Memory management;
- KASAN memory debugging framework;
- 802.1Q VLAN protocol;
- 9P file system network protocol;
- Appletalk network protocol;
- Ethernet bridge;
- CAN network layer;
- Networking core;
- Distributed Switch Architecture;
- HSR network protocol;
- IPv4 networking;
- IPv6 networking;
- MAC80211 subsystem;
- Management Component Transport Protocol (MCTP);
- MultiProtocol Label Switching driver;
- Multipath TCP;
- NetLabel subsystem;
- Netlink;
- NFC subsystem;
- Open vSwitch;
- RDS protocol;
- Rose network layer;
- RxRPC session sockets;
- SMC sockets;
- Sun RPC protocol;
- TIPC protocol;
- TLS protocol;
- Unix domain sockets;
- VMware vSockets driver;
- Wireless networking;
- ALSA framework;
- WCD audio codecs;
- Intel ASoC drivers;
- MediaTek ASoC drivers;
- QCOM ASoC drivers;
- SoC audio core drivers;
- USB sound devices;
- Virtio sound driver;
- CPU Power monitoring subsystem;
- KVM subsystem;
(CVE-2025-21884, CVE-2025-21931, CVE-2025-22026, CVE-2025-22101,
CVE-2025-22102, CVE-2025-22115, CVE-2025-22120, CVE-2025-22126,
CVE-2025-22128, CVE-2025-23140, CVE-2025-23141, CVE-2025-23142,
CVE-2025-23144, CVE-2025-23145, CVE-2025-23146, CVE-2025-23147,
CVE-2025-23148, CVE-2025-23149, CVE-2025-23150, CVE-2025-23151,
CVE-2025-23155, CVE-2025-23156, CVE-2025-23157, CVE-2025-23158,
CVE-2025-23159, CVE-2025-23160, CVE-2025-23161, CVE-2025-23163,
CVE-2025-37738, CVE-2025-37739, CVE-2025-37740, CVE-2025-37741,
CVE-2025-37742, CVE-2025-37744, CVE-2025-37745, CVE-2025-37748,
CVE-2025-37749, CVE-2025-37754, CVE-2025-37755, CVE-2025-37757,
CVE-2025-37758, CVE-2025-37759, CVE-2025-37761, CVE-2025-37763,
CVE-2025-37764, CVE-2025-37765, CVE-2025-37766, CVE-2025-37767,
CVE-2025-37768, CVE-2025-37769, CVE-2025-37770, CVE-2025-37771,
CVE-2025-37772, CVE-2025-37773, CVE-2025-37775, CVE-2025-37777,
CVE-2025-37778, CVE-2025-37780, CVE-2025-37781, CVE-2025-37784,
CVE-2025-37786, CVE-2025-37787, CVE-2025-37788, CVE-2025-37789,
CVE-2025-37790, CVE-2025-37792, CVE-2025-37793, CVE-2025-37794,
CVE-2025-37796, CVE-2025-37799, CVE-2025-37800, CVE-2025-37801,
CVE-2025-37803, CVE-2025-37805, CVE-2025-37808, CVE-2025-37809,
CVE-2025-37810, CVE-2025-37811, CVE-2025-37812, CVE-2025-37813,
CVE-2025-37815, CVE-2025-37816, CVE-2025-37817, CVE-2025-37819,
CVE-2025-37820, CVE-2025-37822, CVE-2025-37823, CVE-2025-37824,
CVE-2025-37826, CVE-2025-37827, CVE-2025-37828, CVE-2025-37829,
CVE-2025-37830, CVE-2025-37831, CVE-2025-37836, CVE-2025-37839,
CVE-2025-37840, CVE-2025-37841, CVE-2025-37842, CVE-2025-37844,
CVE-2025-37846, CVE-2025-37849, CVE-2025-37850, CVE-2025-37851,
CVE-2025-37852, CVE-2025-37853, CVE-2025-37854, CVE-2025-37856,
CVE-2025-37857, CVE-2025-37858, CVE-2025-37859, CVE-2025-37861,
CVE-2025-37862, CVE-2025-37863, CVE-2025-37864, CVE-2025-37865,
CVE-2025-37867, CVE-2025-37869, CVE-2025-37871, CVE-2025-37872,
CVE-2025-37873, CVE-2025-37874, CVE-2025-37875, CVE-2025-37878,
CVE-2025-37879, CVE-2025-37881, CVE-2025-37883, CVE-2025-37884,
CVE-2025-37885, CVE-2025-37886, CVE-2025-37887, CVE-2025-37891,
CVE-2025-37892, CVE-2025-37897, CVE-2025-37900, CVE-2025-37901,
CVE-2025-37903, CVE-2025-37905, CVE-2025-37909, CVE-2025-37911,
CVE-2025-37912, CVE-2025-37913, CVE-2025-37914, CVE-2025-37915,
CVE-2025-37916, CVE-2025-37917, CVE-2025-37918, CVE-2025-37920,
CVE-2025-37921, CVE-2025-37922, CVE-2025-37923, CVE-2025-37924,
CVE-2025-37925, CVE-2025-37927, CVE-2025-37928, CVE-2025-37930,
CVE-2025-37931, CVE-2025-37933, CVE-2025-37935, CVE-2025-37936,
CVE-2025-37938, CVE-2025-37940, CVE-2025-37943, CVE-2025-37944,
CVE-2025-37945, CVE-2025-37947, CVE-2025-37948, CVE-2025-37949,
CVE-2025-37951, CVE-2025-37952, CVE-2025-37954, CVE-2025-37956,
CVE-2025-37957, CVE-2025-37959, CVE-2025-37960, CVE-2025-37961,
CVE-2025-37962, CVE-2025-37963, CVE-2025-37967, CVE-2025-37968,
CVE-2025-37969, CVE-2025-37970, CVE-2025-37972, CVE-2025-37973,
CVE-2025-37975, CVE-2025-37977, CVE-2025-37978, CVE-2025-37979,
CVE-2025-37980, CVE-2025-37982, CVE-2025-37983, CVE-2025-37984,
CVE-2025-37985, CVE-2025-37986, CVE-2025-37987, CVE-2025-37988,
CVE-2025-37989, CVE-2025-37990, CVE-2025-37991, CVE-2025-37992,
CVE-2025-37994, CVE-2025-37995, CVE-2025-37998, CVE-2025-38003,
CVE-2025-38004, CVE-2025-38005, CVE-2025-38006, CVE-2025-38007,
CVE-2025-38008, CVE-2025-38009, CVE-2025-38010, CVE-2025-38011,
CVE-2025-38013, CVE-2025-38014, CVE-2025-38015, CVE-2025-38018,
CVE-2025-38019, CVE-2025-38020, CVE-2025-38023, CVE-2025-38024,
CVE-2025-38027, CVE-2025-38031, CVE-2025-38034, CVE-2025-38035,
CVE-2025-38037, CVE-2025-38039, CVE-2025-38040, CVE-2025-38043,
CVE-2025-38044, CVE-2025-38045, CVE-2025-38048, CVE-2025-38051,
CVE-2025-38052, CVE-2025-38053, CVE-2025-38055, CVE-2025-38057,
CVE-2025-38058, CVE-2025-38059, CVE-2025-38060, CVE-2025-38061,
CVE-2025-38062, CVE-2025-38063, CVE-2025-38065, CVE-2025-38066,
CVE-2025-38067, CVE-2025-38068, CVE-2025-38071, CVE-2025-38072,
CVE-2025-38074, CVE-2025-38075, CVE-2025-38077, CVE-2025-38078,
CVE-2025-38079, CVE-2025-38080, CVE-2025-38081, CVE-2025-38084,
CVE-2025-38085, CVE-2025-38086, CVE-2025-38087, CVE-2025-38088,
CVE-2025-38089, CVE-2025-38090, CVE-2025-38094, CVE-2025-38095,
CVE-2025-38097, CVE-2025-38098, CVE-2025-38099, CVE-2025-38100,
CVE-2025-38101, CVE-2025-38102, CVE-2025-38103, CVE-2025-38104,
CVE-2025-38107, CVE-2025-38108, CVE-2025-38109, CVE-2025-38110,
CVE-2025-38111, CVE-2025-38112, CVE-2025-38113, CVE-2025-38115,
CVE-2025-38117, CVE-2025-38119, CVE-2025-38120, CVE-2025-38122,
CVE-2025-38123, CVE-2025-38124, CVE-2025-38125, CVE-2025-38126,
CVE-2025-38127, CVE-2025-38129, CVE-2025-38131, CVE-2025-38135,
CVE-2025-38136, CVE-2025-38138, CVE-2025-38142, CVE-2025-38143,
CVE-2025-38145, CVE-2025-38146, CVE-2025-38147, CVE-2025-38148,
CVE-2025-38149, CVE-2025-38153, CVE-2025-38154, CVE-2025-38155,
CVE-2025-38156, CVE-2025-38157, CVE-2025-38158, CVE-2025-38159,
CVE-2025-38160, CVE-2025-38161, CVE-2025-38162, CVE-2025-38163,
CVE-2025-38164, CVE-2025-38165, CVE-2025-38166, CVE-2025-38167,
CVE-2025-38169, CVE-2025-38170, CVE-2025-38173, CVE-2025-38174,
CVE-2025-38180, CVE-2025-38181, CVE-2025-38182, CVE-2025-38183,
CVE-2025-38184, CVE-2025-38185, CVE-2025-38190, CVE-2025-38191,
CVE-2025-38192, CVE-2025-38193, CVE-2025-38194, CVE-2025-38197,
CVE-2025-38198, CVE-2025-38200, CVE-2025-38202, CVE-2025-38208,
CVE-2025-38210, CVE-2025-38211, CVE-2025-38212, CVE-2025-38214,
CVE-2025-38215, CVE-2025-38217, CVE-2025-38218, CVE-2025-38219,
CVE-2025-38220, CVE-2025-38222, CVE-2025-38225, CVE-2025-38226,
CVE-2025-38229, CVE-2025-38230, CVE-2025-38231, CVE-2025-38232,
CVE-2025-38236, CVE-2025-38239, CVE-2025-38244, CVE-2025-38245,
CVE-2025-38246, CVE-2025-38248, CVE-2025-38249, CVE-2025-38250,
CVE-2025-38251, CVE-2025-38253, CVE-2025-38255, CVE-2025-38257,
CVE-2025-38258, CVE-2025-38259, CVE-2025-38260, CVE-2025-38262,
CVE-2025-38263, CVE-2025-38264, CVE-2025-38265, CVE-2025-38269,
CVE-2025-38274, CVE-2025-38275, CVE-2025-38277, CVE-2025-38278,
CVE-2025-38279, CVE-2025-38280, CVE-2025-38282, CVE-2025-38283,
CVE-2025-38285, CVE-2025-38286, CVE-2025-38289, CVE-2025-38290,
CVE-2025-38292, CVE-2025-38293, CVE-2025-38295, CVE-2025-38298,
CVE-2025-38299, CVE-2025-38300, CVE-2025-38303, CVE-2025-38304,
CVE-2025-38305, CVE-2025-38307, CVE-2025-38310, CVE-2025-38312,
CVE-2025-38313, CVE-2025-38319, CVE-2025-38320, CVE-2025-38321,
CVE-2025-38322, CVE-2025-38323, CVE-2025-38324, CVE-2025-38326,
CVE-2025-38328, CVE-2025-38331, CVE-2025-38332, CVE-2025-38333,
CVE-2025-38334, CVE-2025-38335, CVE-2025-38336, CVE-2025-38337,
CVE-2025-38338, CVE-2025-38342, CVE-2025-38343, CVE-2025-38344,
CVE-2025-38345, CVE-2025-38346, CVE-2025-38347, CVE-2025-38348,
CVE-2025-38349, CVE-2025-38351, CVE-2025-38354, CVE-2025-38361,
CVE-2025-38362, CVE-2025-38363, CVE-2025-38364, CVE-2025-38365,
CVE-2025-38368, CVE-2025-38369, CVE-2025-38371, CVE-2025-38373,
CVE-2025-38374, CVE-2025-38375, CVE-2025-38376, CVE-2025-38377,
CVE-2025-38382, CVE-2025-38384, CVE-2025-38385, CVE-2025-38386,
CVE-2025-38387, CVE-2025-38388, CVE-2025-38389, CVE-2025-38390,
CVE-2025-38391, CVE-2025-38392, CVE-2025-38393, CVE-2025-38395,
CVE-2025-38396, CVE-2025-38399, CVE-2025-38400, CVE-2025-38401,
CVE-2025-38402, CVE-2025-38403, CVE-2025-38405, CVE-2025-38406,
CVE-2025-38407, CVE-2025-38408, CVE-2025-38409, CVE-2025-38410,
CVE-2025-38412, CVE-2025-38414, CVE-2025-38415, CVE-2025-38416,
CVE-2025-38418, CVE-2025-38419, CVE-2025-38420, CVE-2025-38422,
CVE-2025-38424, CVE-2025-38425, CVE-2025-38427, CVE-2025-38428,
CVE-2025-38429, CVE-2025-38430, CVE-2025-38436, CVE-2025-38437,
CVE-2025-38439, CVE-2025-38441, CVE-2025-38443, CVE-2025-38444,
CVE-2025-38445, CVE-2025-38448, CVE-2025-38449, CVE-2025-38455,
CVE-2025-38456, CVE-2025-38457, CVE-2025-38458, CVE-2025-38459,
CVE-2025-38460, CVE-2025-38461, CVE-2025-38462, CVE-2025-38463,
CVE-2025-38464, CVE-2025-38465, CVE-2025-38466, CVE-2025-38467,
CVE-2025-38468, CVE-2025-38469, CVE-2025-38470, CVE-2025-38471,
CVE-2025-38472, CVE-2025-38473, CVE-2025-38474, CVE-2025-38476,
CVE-2025-38478, CVE-2025-38480, CVE-2025-38481, CVE-2025-38482,
CVE-2025-38483, CVE-2025-38485, CVE-2025-38487, CVE-2025-38488,
CVE-2025-38489, CVE-2025-38490, CVE-2025-38491, CVE-2025-38493,
CVE-2025-38494, CVE-2025-38495, CVE-2025-38496, CVE-2025-38497,
CVE-2025-38499, CVE-2025-38501, CVE-2025-38503, CVE-2025-38506,
CVE-2025-38507, CVE-2025-38510, CVE-2025-38511, CVE-2025-38512,
CVE-2025-38513, CVE-2025-38514, CVE-2025-38515, CVE-2025-38516,
CVE-2025-38520, CVE-2025-38521, CVE-2025-38524, CVE-2025-38526,
CVE-2025-38527, CVE-2025-38528, CVE-2025-38529, CVE-2025-38530,
CVE-2025-38531, CVE-2025-38532, CVE-2025-38533, CVE-2025-38535,
CVE-2025-38537, CVE-2025-38538, CVE-2025-38539, CVE-2025-38540,
CVE-2025-38542, CVE-2025-38543, CVE-2025-38544, CVE-2025-38546,
CVE-2025-38548, CVE-2025-38549, CVE-2025-38550, CVE-2025-38551,
CVE-2025-38552, CVE-2025-38553, CVE-2025-38555, CVE-2025-38560,
CVE-2025-38562, CVE-2025-38566, CVE-2025-38568, CVE-2025-38569,
CVE-2025-38571, CVE-2025-38572, CVE-2025-38574, CVE-2025-38576,
CVE-2025-38577, CVE-2025-38578, CVE-2025-38579, CVE-2025-38581,
CVE-2025-38582, CVE-2025-38583, CVE-2025-38584, CVE-2025-38585,
CVE-2025-38587, CVE-2025-38588, CVE-2025-38590, CVE-2025-38593,
CVE-2025-38595, CVE-2025-38601, CVE-2025-38602, CVE-2025-38604,
CVE-2025-38608, CVE-2025-38609, CVE-2025-38610, CVE-2025-38612,
CVE-2025-38614, CVE-2025-38615, CVE-2025-38619, CVE-2025-38622,
CVE-2025-38623, CVE-2025-38624, CVE-2025-38625, CVE-2025-38626,
CVE-2025-38630, CVE-2025-38632, CVE-2025-38634, CVE-2025-38635,
CVE-2025-38639, CVE-2025-38640, CVE-2025-38644, CVE-2025-38645,
CVE-2025-38646, CVE-2025-38648, CVE-2025-38650, CVE-2025-38652,
CVE-2025-38653, CVE-2025-38659, CVE-2025-38660, CVE-2025-38663,
CVE-2025-38664, CVE-2025-38665, CVE-2025-38668, CVE-2025-38670,
CVE-2025-38671, CVE-2025-38675, CVE-2025-38676, CVE-2025-38677,
CVE-2025-38679, CVE-2025-38680, CVE-2025-38681, CVE-2025-38683,
CVE-2025-38684, CVE-2025-38685, CVE-2025-38686, CVE-2025-38687,
CVE-2025-38688, CVE-2025-38691, CVE-2025-38692, CVE-2025-38693,
CVE-2025-38694, CVE-2025-38695, CVE-2025-38696, CVE-2025-38697,
CVE-2025-38698, CVE-2025-38699, CVE-2025-38700, CVE-2025-38701,
CVE-2025-38702, CVE-2025-38703, CVE-2025-38704, CVE-2025-38705,
CVE-2025-38706, CVE-2025-38707, CVE-2025-38708, CVE-2025-38710,
CVE-2025-38711, CVE-2025-38712, CVE-2025-38713, CVE-2025-38714,
CVE-2025-38715, CVE-2025-38716, CVE-2025-38718, CVE-2025-38721,
CVE-2025-38722, CVE-2025-38724, CVE-2025-38725, CVE-2025-38728,
CVE-2025-38729, CVE-2025-38730, CVE-2025-38732, CVE-2025-38734,
CVE-2025-38735, CVE-2025-39673, CVE-2025-39675, CVE-2025-39676,
CVE-2025-39679, CVE-2025-39681, CVE-2025-39683, CVE-2025-39684,
CVE-2025-39685, CVE-2025-39686, CVE-2025-39687, CVE-2025-39689,
CVE-2025-39691, CVE-2025-39692, CVE-2025-39693, CVE-2025-39694,
CVE-2025-39701, CVE-2025-39702, CVE-2025-39703, CVE-2025-39705,
CVE-2025-39706, CVE-2025-39707, CVE-2025-39709, CVE-2025-39710,
CVE-2025-39711, CVE-2025-39712, CVE-2025-39713, CVE-2025-39714,
CVE-2025-39715, CVE-2025-39716, CVE-2025-39718, CVE-2025-39719,
CVE-2025-39720, CVE-2025-39721, CVE-2025-39724, CVE-2025-39726,
CVE-2025-39730, CVE-2025-39731, CVE-2025-39732, CVE-2025-39734,
CVE-2025-39736, CVE-2025-39737, CVE-2025-39738, CVE-2025-39739,
CVE-2025-39742, CVE-2025-39743, CVE-2025-39744, CVE-2025-39746,
CVE-2025-39747, CVE-2025-39748, CVE-2025-39749, CVE-2025-39750,
CVE-2025-39752, CVE-2025-39753, CVE-2025-39756, CVE-2025-39757,
CVE-2025-39758, CVE-2025-39759, CVE-2025-39760, CVE-2025-39761,
CVE-2025-39763, CVE-2025-39766, CVE-2025-39770, CVE-2025-39772,
CVE-2025-39773, CVE-2025-39776, CVE-2025-39779, CVE-2025-39781,
CVE-2025-39782, CVE-2025-39783, CVE-2025-39787, CVE-2025-39788,
CVE-2025-39790, CVE-2025-39794, CVE-2025-39795, CVE-2025-39797,
CVE-2025-39798, CVE-2025-39800, CVE-2025-39801, CVE-2025-39889,
CVE-2025-39890, CVE-2025-39946, CVE-2025-39989, CVE-2025-40215,
CVE-2025-40297, CVE-2025-68750)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS
linux-image-6.8.1-1041-realtime 6.8.1-1041.42~22.04.1
Available with Ubuntu Pro
linux-image-realtime-6.8.1 6.8.1-1041.42~22.04.1
Available with Ubuntu Pro
linux-image-realtime-hwe-22.04 6.8.1-1041.42~22.04.1
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-8028-2
https://ubuntu.com/security/notices/USN-8028-1
CVE-2024-36331, CVE-2024-36350, CVE-2024-36357, CVE-2025-21884,
CVE-2025-21931, CVE-2025-22026, CVE-2025-22101, CVE-2025-22102,
CVE-2025-22115, CVE-2025-22120, CVE-2025-22126, CVE-2025-22128,
CVE-2025-23140, CVE-2025-23141, CVE-2025-23142, CVE-2025-23144,
CVE-2025-23145, CVE-2025-23146, CVE-2025-23147, CVE-2025-23148,
CVE-2025-23149, CVE-2025-23150, CVE-2025-23151, CVE-2025-23155,
CVE-2025-23156, CVE-2025-23157, CVE-2025-23158, CVE-2025-23159,
CVE-2025-23160, CVE-2025-23161, CVE-2025-23163, CVE-2025-37738,
CVE-2025-37739, CVE-2025-37740, CVE-2025-37741, CVE-2025-37742,
CVE-2025-37744, CVE-2025-37745, CVE-2025-37748, CVE-2025-37749,
CVE-2025-37754, CVE-2025-37755, CVE-2025-37757, CVE-2025-37758,
CVE-2025-37759, CVE-2025-37761, CVE-2025-37763, CVE-2025-37764,
CVE-2025-37765, CVE-2025-37766, CVE-2025-37767, CVE-2025-37768,
CVE-2025-37769, CVE-2025-37770, CVE-2025-37771, CVE-2025-37772,
CVE-2025-37773, CVE-2025-37775, CVE-2025-37777, CVE-2025-37778,
CVE-2025-37780, CVE-2025-37781, CVE-2025-37784, CVE-2025-37786,
CVE-2025-37787, CVE-2025-37788, CVE-2025-37789, CVE-2025-37790,
CVE-2025-37792, CVE-2025-37793, CVE-2025-37794, CVE-2025-37796,
CVE-2025-37799, CVE-2025-37800, CVE-2025-37801, CVE-2025-37803,
CVE-2025-37805, CVE-2025-37808, CVE-2025-37809, CVE-2025-37810,
CVE-2025-37811, CVE-2025-37812, CVE-2025-37813, CVE-2025-37815,
CVE-2025-37816, CVE-2025-37817, CVE-2025-37819, CVE-2025-37820,
CVE-2025-37822, CVE-2025-37823, CVE-2025-37824, CVE-2025-37826,
CVE-2025-37827, CVE-2025-37828, CVE-2025-37829, CVE-2025-37830,
CVE-2025-37831, CVE-2025-37836, CVE-2025-37839, CVE-2025-37840,
CVE-2025-37841, CVE-2025-37842, CVE-2025-37844, CVE-2025-37846,
CVE-2025-37849, CVE-2025-37850, CVE-2025-37851, CVE-2025-37852,
CVE-2025-37853, CVE-2025-37854, CVE-2025-37856, CVE-2025-37857,
CVE-2025-37858, CVE-2025-37859, CVE-2025-37861, CVE-2025-37862,
CVE-2025-37863, CVE-2025-37864, CVE-2025-37865, CVE-2025-37867,
CVE-2025-37869, CVE-2025-37871, CVE-2025-37872, CVE-2025-37873,
CVE-2025-37874, CVE-2025-37875, CVE-2025-37878, CVE-2025-37879,
CVE-2025-37881, CVE-2025-37883, CVE-2025-37884, CVE-2025-37885,
CVE-2025-37886, CVE-2025-37887, CVE-2025-37891, CVE-2025-37892,
CVE-2025-37897, CVE-2025-37900, CVE-2025-37901, CVE-2025-37903,
CVE-2025-37905, CVE-2025-37909, CVE-2025-37911, CVE-2025-37912,
CVE-2025-37913, CVE-2025-37914, CVE-2025-37915, CVE-2025-37916,
CVE-2025-37917, CVE-2025-37918, CVE-2025-37920, CVE-2025-37921,
CVE-2025-37922, CVE-2025-37923, CVE-2025-37924, CVE-2025-37925,
CVE-2025-37927, CVE-2025-37928, CVE-2025-37930, CVE-2025-37931,
CVE-2025-37933, CVE-2025-37935, CVE-2025-37936, CVE-2025-37938,
CVE-2025-37940, CVE-2025-37943, CVE-2025-37944, CVE-2025-37945,
CVE-2025-37947, CVE-2025-37948, CVE-2025-37949, CVE-2025-37951,
CVE-2025-37952, CVE-2025-37954, CVE-2025-37956, CVE-2025-37957,
CVE-2025-37959, CVE-2025-37960, CVE-2025-37961, CVE-2025-37962,
CVE-2025-37963, CVE-2025-37967, CVE-2025-37968, CVE-2025-37969,
CVE-2025-37970, CVE-2025-37972, CVE-2025-37973, CVE-2025-37975,
CVE-2025-37977, CVE-2025-37978, CVE-2025-37979, CVE-2025-37980,
CVE-2025-37982, CVE-2025-37983, CVE-2025-37984, CVE-2025-37985,
CVE-2025-37986, CVE-2025-37987, CVE-2025-37988, CVE-2025-37989,
CVE-2025-37990, CVE-2025-37991, CVE-2025-37992, CVE-2025-37994,
CVE-2025-37995, CVE-2025-37998, CVE-2025-38003, CVE-2025-38004,
CVE-2025-38005, CVE-2025-38006, CVE-2025-38007, CVE-2025-38008,
CVE-2025-38009, CVE-2025-38010, CVE-2025-38011, CVE-2025-38013,
CVE-2025-38014, CVE-2025-38015, CVE-2025-38018, CVE-2025-38019,
CVE-2025-38020, CVE-2025-38023, CVE-2025-38024, CVE-2025-38027,
CVE-2025-38031, CVE-2025-38034, CVE-2025-38035, CVE-2025-38037,
CVE-2025-38039, CVE-2025-38040, CVE-2025-38043, CVE-2025-38044,
CVE-2025-38045, CVE-2025-38048, CVE-2025-38051, CVE-2025-38052,
CVE-2025-38053, CVE-2025-38055, CVE-2025-38057, CVE-2025-38058,
CVE-2025-38059, CVE-2025-38060, CVE-2025-38061, CVE-2025-38062,
CVE-2025-38063, CVE-2025-38065, CVE-2025-38066, CVE-2025-38067,
CVE-2025-38068, CVE-2025-38071, CVE-2025-38072, CVE-2025-38074,
CVE-2025-38075, CVE-2025-38077, CVE-2025-38078, CVE-2025-38079,
CVE-2025-38080, CVE-2025-38081, CVE-2025-38084, CVE-2025-38085,
CVE-2025-38086, CVE-2025-38087, CVE-2025-38088, CVE-2025-38089,
CVE-2025-38090, CVE-2025-38094, CVE-2025-38095, CVE-2025-38097,
CVE-2025-38098, CVE-2025-38099, CVE-2025-38100, CVE-2025-38101,
CVE-2025-38102, CVE-2025-38103, CVE-2025-38104, CVE-2025-38107,
CVE-2025-38108, CVE-2025-38109, CVE-2025-38110, CVE-2025-38111,
CVE-2025-38112, CVE-2025-38113, CVE-2025-38115, CVE-2025-38117,
CVE-2025-38119, CVE-2025-38120, CVE-2025-38122, CVE-2025-38123,
CVE-2025-38124, CVE-2025-38125, CVE-2025-38126, CVE-2025-38127,
CVE-2025-38129, CVE-2025-38131, CVE-2025-38135, CVE-2025-38136,
CVE-2025-38138, CVE-2025-38142, CVE-2025-38143, CVE-2025-38145,
CVE-2025-38146, CVE-2025-38147, CVE-2025-38148, CVE-2025-38149,
CVE-2025-38153, CVE-2025-38154, CVE-2025-38155, CVE-2025-38156,
CVE-2025-38157, CVE-2025-38158, CVE-2025-38159, CVE-2025-38160,
CVE-2025-38161, CVE-2025-38162, CVE-2025-38163, CVE-2025-38164,
CVE-2025-38165, CVE-2025-38166, CVE-2025-38167, CVE-2025-38169,
CVE-2025-38170, CVE-2025-38173, CVE-2025-38174, CVE-2025-38180,
CVE-2025-38181, CVE-2025-38182, CVE-2025-38183, CVE-2025-38184,
CVE-2025-38185, CVE-2025-38190, CVE-2025-38191, CVE-2025-38192,
CVE-2025-38193, CVE-2025-38194, CVE-2025-38197, CVE-2025-38198,
CVE-2025-38200, CVE-2025-38202, CVE-2025-38208, CVE-2025-38210,
CVE-2025-38211, CVE-2025-38212, CVE-2025-38214, CVE-2025-38215,
CVE-2025-38217, CVE-2025-38218, CVE-2025-38219, CVE-2025-38220,
CVE-2025-38222, CVE-2025-38225, CVE-2025-38226, CVE-2025-38229,
CVE-2025-38230, CVE-2025-38231, CVE-2025-38232, CVE-2025-38236,
CVE-2025-38239, CVE-2025-38244, CVE-2025-38245, CVE-2025-38246,
CVE-2025-38248, CVE-2025-38249, CVE-2025-38250, CVE-2025-38251,
CVE-2025-38253, CVE-2025-38255, CVE-2025-38257, CVE-2025-38258,
CVE-2025-38259, CVE-2025-38260, CVE-2025-38262, CVE-2025-38263,
CVE-2025-38264, CVE-2025-38265, CVE-2025-38269, CVE-2025-38274,
CVE-2025-38275, CVE-2025-38277, CVE-2025-38278, CVE-2025-38279,
CVE-2025-38280, CVE-2025-38282, CVE-2025-38283, CVE-2025-38285,
CVE-2025-38286, CVE-2025-38289, CVE-2025-38290, CVE-2025-38292,
CVE-2025-38293, CVE-2025-38295, CVE-2025-38298, CVE-2025-38299,
CVE-2025-38300, CVE-2025-38303, CVE-2025-38304, CVE-2025-38305,
CVE-2025-38307, CVE-2025-38310, CVE-2025-38312, CVE-2025-38313,
CVE-2025-38319, CVE-2025-38320, CVE-2025-38321, CVE-2025-38322,
CVE-2025-38323, CVE-2025-38324, CVE-2025-38326, CVE-2025-38328,
CVE-2025-38331, CVE-2025-38332, CVE-2025-38333, CVE-2025-38334,
CVE-2025-38335, CVE-2025-38336, CVE-2025-38337, CVE-2025-38338,
CVE-2025-38342, CVE-2025-38343, CVE-2025-38344, CVE-2025-38345,
CVE-2025-38346, CVE-2025-38347, CVE-2025-38348, CVE-2025-38349,
CVE-2025-38351, CVE-2025-38354, CVE-2025-38361, CVE-2025-38362,
CVE-2025-38363, CVE-2025-38364, CVE-2025-38365, CVE-2025-38368,
CVE-2025-38369, CVE-2025-38371, CVE-2025-38373, CVE-2025-38374,
CVE-2025-38375, CVE-2025-38376, CVE-2025-38377, CVE-2025-38382,
CVE-2025-38384, CVE-2025-38385, CVE-2025-38386, CVE-2025-38387,
CVE-2025-38388, CVE-2025-38389, CVE-2025-38390, CVE-2025-38391,
CVE-2025-38392, CVE-2025-38393, CVE-2025-38395, CVE-2025-38396,
CVE-2025-38399, CVE-2025-38400, CVE-2025-38401, CVE-2025-38402,
CVE-2025-38403, CVE-2025-38405, CVE-2025-38406, CVE-2025-38407,
CVE-2025-38408, CVE-2025-38409, CVE-2025-38410, CVE-2025-38412,
CVE-2025-38414, CVE-2025-38415, CVE-2025-38416, CVE-2025-38418,
CVE-2025-38419, CVE-2025-38420, CVE-2025-38422, CVE-2025-38424,
CVE-2025-38425, CVE-2025-38427, CVE-2025-38428, CVE-2025-38429,
CVE-2025-38430, CVE-2025-38436, CVE-2025-38437, CVE-2025-38439,
CVE-2025-38441, CVE-2025-38443, CVE-2025-38444, CVE-2025-38445,
CVE-2025-38448, CVE-2025-38449, CVE-2025-38455, CVE-2025-38456,
CVE-2025-38457, CVE-2025-38458, CVE-2025-38459, CVE-2025-38460,
CVE-2025-38461, CVE-2025-38462, CVE-2025-38463, CVE-2025-38464,
CVE-2025-38465, CVE-2025-38466, CVE-2025-38467, CVE-2025-38468,
CVE-2025-38469, CVE-2025-38470, CVE-2025-38471, CVE-2025-38472,
CVE-2025-38473, CVE-2025-38474, CVE-2025-38476, CVE-2025-38478,
CVE-2025-38480, CVE-2025-38481, CVE-2025-38482, CVE-2025-38483,
CVE-2025-38485, CVE-2025-38487, CVE-2025-38488, CVE-2025-38489,
CVE-2025-38490, CVE-2025-38491, CVE-2025-38493, CVE-2025-38494,
CVE-2025-38495, CVE-2025-38496, CVE-2025-38497, CVE-2025-38499,
CVE-2025-38501, CVE-2025-38503, CVE-2025-38506, CVE-2025-38507,
CVE-2025-38510, CVE-2025-38511, CVE-2025-38512, CVE-2025-38513,
CVE-2025-38514, CVE-2025-38515, CVE-2025-38516, CVE-2025-38520,
CVE-2025-38521, CVE-2025-38524, CVE-2025-38526, CVE-2025-38527,
CVE-2025-38528, CVE-2025-38529, CVE-2025-38530, CVE-2025-38531,
CVE-2025-38532, CVE-2025-38533, CVE-2025-38535, CVE-2025-38537,
CVE-2025-38538, CVE-2025-38539, CVE-2025-38540, CVE-2025-38542,
CVE-2025-38543, CVE-2025-38544, CVE-2025-38546, CVE-2025-38548,
CVE-2025-38549, CVE-2025-38550, CVE-2025-38551, CVE-2025-38552,
CVE-2025-38553, CVE-2025-38555, CVE-2025-38560, CVE-2025-38562,
CVE-2025-38566, CVE-2025-38568, CVE-2025-38569, CVE-2025-38571,
CVE-2025-38572, CVE-2025-38574, CVE-2025-38576, CVE-2025-38577,
CVE-2025-38578, CVE-2025-38579, CVE-2025-38581, CVE-2025-38582,
CVE-2025-38583, CVE-2025-38584, CVE-2025-38585, CVE-2025-38587,
CVE-2025-38588, CVE-2025-38590, CVE-2025-38593, CVE-2025-38595,
CVE-2025-38601, CVE-2025-38602, CVE-2025-38604, CVE-2025-38608,
CVE-2025-38609, CVE-2025-38610, CVE-2025-38612, CVE-2025-38614,
CVE-2025-38615, CVE-2025-38619, CVE-2025-38622, CVE-2025-38623,
CVE-2025-38624, CVE-2025-38625, CVE-2025-38626, CVE-2025-38630,
CVE-2025-38632, CVE-2025-38634, CVE-2025-38635, CVE-2025-38639,
CVE-2025-38640, CVE-2025-38644, CVE-2025-38645, CVE-2025-38646,
CVE-2025-38648, CVE-2025-38650, CVE-2025-38652, CVE-2025-38653,
CVE-2025-38659, CVE-2025-38660, CVE-2025-38663, CVE-2025-38664,
CVE-2025-38665, CVE-2025-38668, CVE-2025-38670, CVE-2025-38671,
CVE-2025-38675, CVE-2025-38676, CVE-2025-38677, CVE-2025-38679,
CVE-2025-38680, CVE-2025-38681, CVE-2025-38683, CVE-2025-38684,
CVE-2025-38685, CVE-2025-38686, CVE-2025-38687, CVE-2025-38688,
CVE-2025-38691, CVE-2025-38692, CVE-2025-38693, CVE-2025-38694,
CVE-2025-38695, CVE-2025-38696, CVE-2025-38697, CVE-2025-38698,
CVE-2025-38699, CVE-2025-38700, CVE-2025-38701, CVE-2025-38702,
CVE-2025-38703, CVE-2025-38704, CVE-2025-38705, CVE-2025-38706,
CVE-2025-38707, CVE-2025-38708, CVE-2025-38710, CVE-2025-38711,
CVE-2025-38712, CVE-2025-38713, CVE-2025-38714, CVE-2025-38715,
CVE-2025-38716, CVE-2025-38718, CVE-2025-38721, CVE-2025-38722,
CVE-2025-38724, CVE-2025-38725, CVE-2025-38728, CVE-2025-38729,
CVE-2025-38730, CVE-2025-38732, CVE-2025-38734, CVE-2025-38735,
CVE-2025-39673, CVE-2025-39675, CVE-2025-39676, CVE-2025-39679,
CVE-2025-39681, CVE-2025-39683, CVE-2025-39684, CVE-2025-39685,
CVE-2025-39686, CVE-2025-39687, CVE-2025-39689, CVE-2025-39691,
CVE-2025-39692, CVE-2025-39693, CVE-2025-39694, CVE-2025-39701,
CVE-2025-39702, CVE-2025-39703, CVE-2025-39705, CVE-2025-39706,
CVE-2025-39707, CVE-2025-39709, CVE-2025-39710, CVE-2025-39711,
CVE-2025-39712, CVE-2025-39713, CVE-2025-39714, CVE-2025-39715,
CVE-2025-39716, CVE-2025-39718, CVE-2025-39719, CVE-2025-39720,
CVE-2025-39721, CVE-2025-39724, CVE-2025-39726, CVE-2025-39730,
CVE-2025-39731, CVE-2025-39732, CVE-2025-39734, CVE-2025-39736,
CVE-2025-39737, CVE-2025-39738, CVE-2025-39739, CVE-2025-39742,
CVE-2025-39743, CVE-2025-39744, CVE-2025-39746, CVE-2025-39747,
CVE-2025-39748, CVE-2025-39749, CVE-2025-39750, CVE-2025-39752,
CVE-2025-39753, CVE-2025-39756, CVE-2025-39757, CVE-2025-39758,
CVE-2025-39759, CVE-2025-39760, CVE-2025-39761, CVE-2025-39763,
CVE-2025-39766, CVE-2025-39770, CVE-2025-39772, CVE-2025-39773,
CVE-2025-39776, CVE-2025-39779, CVE-2025-39781, CVE-2025-39782,
CVE-2025-39783, CVE-2025-39787, CVE-2025-39788, CVE-2025-39790,
CVE-2025-39794, CVE-2025-39795, CVE-2025-39797, CVE-2025-39798,
CVE-2025-39800, CVE-2025-39801, CVE-2025-39889, CVE-2025-39890,
CVE-2025-39946, CVE-2025-39989, CVE-2025-40215, CVE-2025-40297,
CVE-2025-68750
Package Information:
https://launchpad.net/ubuntu/+source/linux-realtime-6.8/6.8.1-1041.42~22.04.1