Friday, February 6, 2026

[announce] Next NYC*BUG: Weird Code Injection Techniques on FreeBSD With libhijack.pdf, Shawn Webb 2026-03-04

  • Weird Code Injection Techniques on FreeBSD With libhijack.pdf remote presentation, Shawn Webb
    2026-03-04 @ 18:45 local (23:45 UTC) - Backroom of Brass Monkey 55 Little West 12th St
    Remote participation: Plans are to stream via NYC*BUG website. Q&A will be via IRC on libera.chat channel #nycbug - please preface your questions with '[Q]'.

    FreeBSD is a widely-used open source operating system, powering your Playstation 4 and 5, Netflix, Juniper dev ices, and many other devices. libhijack is a post-exploitation tool to make code injection easier. In as littl e as four lines of code, developers can inject a complete shared object into another process fully anonymously.

    libhijack makes it easy to force the target process to create new anonymous memory mappings, inject code into memory-backed file descriptors, and finally call fdlopen on the memfd.

    This presentation walks attendees through various methods in which to stealthily inject code into a target pro cess–some of these methods are new variants of prior work and remain unique to libhijack.

    Shawn Webb is the co-founder of the HardenedBSD Project and the founding president of The HardenedBSD Foundati on, a tax-exmpt not-for-profit 501©3 charitable organization in the US. While Shawn has a few decades of exp erience in infosec, both as a profession and a hobby, he considers himself a perpetual newb. He works for IOAc tive, an offensive security company, spending his time finding vulnerabilities in customer products.

    While working in the NSA's backyard, he had the opportunity to be mentored by two interns–an experience that changed his life. He and his interns focused on the intersection of human rights and information security and cybersecurity.

    Shawn "lattera" Webb also maintains a post-exploitation tool called libhijack. It makes runtime process infect ion and runtime function hooking for remote processes over the ptrace boundary incredibly simple on FreeBSD.

    Nearest NYC Subway is the 14th Street/Eighth Avenue station L, A, C, E.

    To get to the backroom, you must enter the front door, follow the long bar on your left, and walk all the way to the back. At the rear of the BrassMonkey, you will see an alcove for the 3 bathrooms our room is off to your right.

  • More Info: https://www.nycbug.org/

    [USN-8015-3] Linux kernel (FIPS) vulnerabilities

    -----BEGIN PGP SIGNATURE-----

    wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmmGLMAFAwAAAAAACgkQZ0GeRcM5nt2j
    bgf9EHbtXbQrK00fEmAuKxWBGxaLYX4vDKWKOemeEcg9oTI7Pt6uTTP1dCBdS5ev6GQtt4NF9jVI
    y1Eou6zvbN+p+l0wBYUDguT3TydLVioTuGtBH0G52pHP4WKaGQBPGjzGWqqjv8BlhpZxkWhTM8XB
    GmBO/OaFOASGU0Aie71sPNvTrCS211NSywMLcU7BmkptdmHRUsjBBh6HadiEGWkyPTHyn5CJ4yqB
    WEvxMksgJGmlts1t25Ku1ObCgNrwE9dHXOHkt5voaDpltnTrac4gf35J561FX8ciTcocoUUFwnfa
    u87CW2dMv3Y0x1t+qCi5xB6nd4ZnAeWjQvOsAqHoiQ==
    =RMQi
    -----END PGP SIGNATURE-----
    ==========================================================================
    Ubuntu Security Notice USN-8015-3
    February 06, 2026

    linux-fips, linux-aws-fips, linux-gcp-fips vulnerabilities
    ==========================================================================

    A security issue affects these releases of Ubuntu and its derivatives:

    - Ubuntu 24.04 LTS

    Summary:

    Several security issues were fixed in the Linux kernel.

    Software Description:
    - linux-aws-fips: Linux kernel for Amazon Web Services (AWS) systems with FIPS
    - linux-fips: Linux kernel with FIPS
    - linux-gcp-fips: Linux kernel for Google Cloud Platform (GCP) systems with
    FIPS

    Details:

    Several security issues were discovered in the Linux kernel.
    An attacker could possibly use these to compromise the system.
    This update corrects flaws in the following subsystems:
    - Cryptographic API;
    - SMB network file system;
    - io_uring subsystem;
    (CVE-2025-38561, CVE-2025-39698, CVE-2025-40019)

    Update instructions:

    The problem can be corrected by updating your system to the following
    package versions:

    Ubuntu 24.04 LTS
    linux-image-6.8.0-1045-aws-fips 6.8.0-1045.47+fips1
    Available with Ubuntu Pro
    linux-image-6.8.0-1046-gcp-fips 6.8.0-1046.49+fips1
    Available with Ubuntu Pro
    linux-image-6.8.0-94-fips 6.8.0-94.96+fips1
    Available with Ubuntu Pro
    linux-image-aws-fips 6.8.0-1045.47+fips1
    Available with Ubuntu Pro
    linux-image-aws-fips-6.8 6.8.0-1045.47+fips1
    Available with Ubuntu Pro
    linux-image-fips 6.8.0-94.96+fips1
    Available with Ubuntu Pro
    linux-image-fips-6.8 6.8.0-94.96+fips1
    Available with Ubuntu Pro
    linux-image-gcp-fips 6.8.0-1046.49+fips1
    Available with Ubuntu Pro
    linux-image-gcp-fips-6.8 6.8.0-1046.49+fips1
    Available with Ubuntu Pro

    After a standard system update you need to reboot your computer to make
    all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates have
    been given a new version number, which requires you to recompile and
    reinstall all third party kernel modules you might have installed.
    Unless you manually uninstalled the standard kernel metapackages
    (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
    linux-powerpc), a standard system upgrade will automatically perform
    this as well.

    References:
    https://ubuntu.com/security/notices/USN-8015-3
    https://ubuntu.com/security/notices/USN-8015-2
    https://ubuntu.com/security/notices/USN-8015-1
    CVE-2025-38561, CVE-2025-39698, CVE-2025-40019

    Package Information:
    https://launchpad.net/ubuntu/+source/linux-aws-fips/6.8.0-1045.47+fips1
    https://launchpad.net/ubuntu/+source/linux-fips/6.8.0-94.96+fips1
    https://launchpad.net/ubuntu/+source/linux-gcp-fips/6.8.0-1046.49+fips1

    Inactive provenpackagers for the F44 cycle

    In accordance with FESCo policy[1], the following provenpackagers will
    be submitted for removal in two weeks based on a lack of Koji builds
    submitted in the last six months. If you received this directly, you
    can reply off-list to indicate you should still be in the
    provenpackager group.

    Note that removal from this group is not a "punishment" or a lack of
    appreciation for the work you have done. The intent of the process is
    to ensure contributors with distro-wide package privileges are still
    active and responsive. This process is done regularly at the branch
    point in each release.

    [1]
    https://docs.fedoraproject.org/en-US/fesco/Provenpackager_policy/#_maintaining_provenpackager_status


    Checked 117 provenpackagers
    The following 12 provenpackagers have not submitted a Koji build since
    at least 2025-08-01 00:00:00:
    ignatenkobrain
    ausil
    jwboyer
    till
    corsepiu
    pbrady
    chkr
    linville
    jnovy
    dwmw2
    wtogami
    steve


    --
    _______________________________________________
    devel-announce mailing list -- devel-announce@lists.fedoraproject.org
    To unsubscribe send an email to devel-announce-leave@lists.fedoraproject.org
    Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
    List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
    List Archives: https://lists.fedoraproject.org/archives/list/devel-announce@lists.fedoraproject.org
    Do not reply to spam, report it: https://forge.fedoraproject.org/infra/tickets/issues/new

    Thursday, February 5, 2026

    Fedora 44 has been branched

    Hi All,

    Fedora Linux 44 has now been branched (today, 2026-02-05).
    Please be sure to do a git fetch -v to pick up the new branch.

    As an additional reminder, Rawhide and Fedora Linux 44 have been
    completely isolated from previous releases, which
    means that anything you do for f44, you also have to do in the rawhide
    branch and do a build there. There will be a Fedora Linux 44 compose and
    It will appear in [1] once complete.

    Note that until we have a successfull compose of f44, we will
    be in a post branch freeze.[2]

    Bodhi is currently enabled in the Fedora Linux 44 branch as it is for rawhide,
    with automatic update creation. At the hit Beta change freeze point in the
    Fedora Linux 44 schedule [3] updates-testing will be enabled and manual
    Bodhi updates will be required as in all stable releases.
    Additionally, some package updates were unpushed at the time
    of mass branching to avoid placing them in an inconsistent state.

    Discussions are happening on the #releng:fedoraproject.org matrix channel,
    and the Release Engineering ticket for this is [4].

    Thanks for understanding.

    Fedora Release Engineering

    [1] https://dl.fedoraproject.org/pub/fedora/linux/development/44/
    [2] https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/#post-branch-freeze
    [3] https://fedorapeople.org/groups/schedule/f-44/f-44-key-tasks.html
    [4] https://forge.fedoraproject.org/releng/tickets/issues/13185
    --
    _______________________________________________
    devel-announce mailing list -- devel-announce@lists.fedoraproject.org
    To unsubscribe send an email to devel-announce-leave@lists.fedoraproject.org
    Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
    List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
    List Archives: https://lists.fedoraproject.org/archives/list/devel-announce@lists.fedoraproject.org
    Do not reply to spam, report it: https://forge.fedoraproject.org/infra/tickets/issues/new

    [USN-8019-1] tracker-miners vulnerabilities

    ==========================================================================
    Ubuntu Security Notice USN-8019-1
    February 05, 2026

    tracker-miners vulnerabilities
    ==========================================================================

    A security issue affects these releases of Ubuntu and its derivatives:

    - Ubuntu 25.10
    - Ubuntu 24.04 LTS
    - Ubuntu 22.04 LTS

    Summary:

    tracker-miners could be made to crash or run programs as your login if it
    opened a specially crafted file.

    Software Description:
    - tracker-miners: Metadata database, indexer and search tool

    Details:

    Fatih Çelik discovered that tracker-miners incorrectly handled certain
    malformed MP3 files. An attacker could use this issue to cause
    tracker-miners to crash, resulting in a denial of service, or possibly
    execute arbitrary code.

    Update instructions:

    The problem can be corrected by updating your system to the following
    package versions:

    Ubuntu 25.10
    tracker-extract 3.8.2-4ubuntu2.1

    Ubuntu 24.04 LTS
    tracker-extract 3.7.1-1ubuntu0.1

    Ubuntu 22.04 LTS
    tracker-extract 3.3.3-0ubuntu0.20.04.4

    After a standard system update you need to restart your session to make all
    the necessary changes.

    References:
    https://ubuntu.com/security/notices/USN-8019-1
    CVE-2026-1764, CVE-2026-1765, CVE-2026-1766, CVE-2026-1767

    Package Information:
    https://launchpad.net/ubuntu/+source/tracker-miners/3.8.2-4ubuntu2.1
    https://launchpad.net/ubuntu/+source/tracker-miners/3.7.1-1ubuntu0.1
    https://launchpad.net/ubuntu/+source/tracker-miners/3.3.3-0ubuntu0.20.04.4

    [USN-7988-3] Linux kernel vulnerabilities

    -----BEGIN PGP SIGNATURE-----

    wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmmE9QwFAwAAAAAACgkQZ0GeRcM5nt1S
    4QgAt88J9TpOzy0byTWmt+7cIrxfXe6222f1+Eur1iVxQofNk08GpX6qcy6oR4YkYC3/5z5yzwwx
    O2bNbsDP/v4tpL3NCh4qP6w5zlgHnCKoRa88Zd5DUFla6LoTfrQ9cj3zyOlD4DsIGYFUTylBpQPZ
    sqbkbdZprlLWDP4Lto0dsT1+apDzSGmtF2FbgsgQ/Zd3x6zGqx3yGmT9LGsp4dkkxtQmS4KEZ8F1
    1p3II7PF4LzHsndr67ffRGTf240dBLBLQRv5SOOCr0V7SExO+J4BLCqNC7bQocemc3TOfrM5wjkM
    fuRAmOFq9A8yl9DBxOYd801hXg1mcfTzfEqCKTNE9A==
    =B3mz
    -----END PGP SIGNATURE-----
    ==========================================================================
    Ubuntu Security Notice USN-7988-3
    February 05, 2026

    linux-azure, linux-azure-4.15, linux-gcp, linux-gcp-4.15 vulnerabilities
    ==========================================================================

    A security issue affects these releases of Ubuntu and its derivatives:

    - Ubuntu 18.04 LTS
    - Ubuntu 16.04 LTS
    - Ubuntu 14.04 LTS

    Summary:

    Several security issues were fixed in the Linux kernel.

    Software Description:
    - linux-azure-4.15: Linux kernel for Microsoft Azure Cloud systems
    - linux-gcp-4.15: Linux kernel for Google Cloud Platform (GCP) systems
    - linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
    - linux-azure: Linux kernel for Microsoft Azure Cloud systems

    Details:

    Several security issues were discovered in the Linux kernel.
    An attacker could possibly use these to compromise the system.
    This update corrects flaws in the following subsystems:
    - Media drivers;
    - NVME drivers;
    - File systems infrastructure;
    - Timer subsystem;
    - Memory management;
    - Packet sockets;
    (CVE-2022-48986, CVE-2024-27078, CVE-2024-49959, CVE-2024-50195,
    CVE-2024-56606, CVE-2024-56756, CVE-2025-39993)

    Update instructions:

    The problem can be corrected by updating your system to the following
    package versions:

    Ubuntu 18.04 LTS
    linux-image-4.15.0-1181-gcp 4.15.0-1181.198
    Available with Ubuntu Pro
    linux-image-4.15.0-1196-azure 4.15.0-1196.211
    Available with Ubuntu Pro
    linux-image-azure-4.15 4.15.0.1196.164
    Available with Ubuntu Pro
    linux-image-azure-lts-18.04 4.15.0.1196.164
    Available with Ubuntu Pro
    linux-image-gcp-4.15 4.15.0.1181.194
    Available with Ubuntu Pro
    linux-image-gcp-lts-18.04 4.15.0.1181.194
    Available with Ubuntu Pro

    Ubuntu 16.04 LTS
    linux-image-4.15.0-1181-gcp 4.15.0-1181.198~16.04.1
    Available with Ubuntu Pro
    linux-image-gcp 4.15.0.1181.198~16.04.1
    Available with Ubuntu Pro
    linux-image-gke 4.15.0.1181.198~16.04.1
    Available with Ubuntu Pro

    Ubuntu 14.04 LTS
    linux-image-4.15.0-1196-azure 4.15.0-1196.211~14.04.1
    Available with Ubuntu Pro
    linux-image-azure 4.15.0.1196.211~14.04.1
    Available with Ubuntu Pro

    After a standard system update you need to reboot your computer to make
    all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates have
    been given a new version number, which requires you to recompile and
    reinstall all third party kernel modules you might have installed.
    Unless you manually uninstalled the standard kernel metapackages
    (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
    linux-powerpc), a standard system upgrade will automatically perform
    this as well.

    References:
    https://ubuntu.com/security/notices/USN-7988-3
    https://ubuntu.com/security/notices/USN-7988-2
    https://ubuntu.com/security/notices/USN-7988-1
    CVE-2022-48986, CVE-2024-27078, CVE-2024-49959, CVE-2024-50195,
    CVE-2024-56606, CVE-2024-56756, CVE-2025-39993

    [USN-8017-1] GLib vulnerabilities

    ==========================================================================
    Ubuntu Security Notice USN-8017-1
    February 05, 2026

    glib2.0 vulnerabilities
    ==========================================================================

    A security issue affects these releases of Ubuntu and its derivatives:

    - Ubuntu 25.10
    - Ubuntu 24.04 LTS
    - Ubuntu 22.04 LTS

    Summary:

    Several security issues were fixed in GLib.

    Software Description:
    - glib2.0: GLib library of C routines

    Details:

    It was discovered that GLib incorrectly parsed large Base64 data. An
    attacker could use this issue to cause GLib to crash, resulting in a
    denial of service, or possibly execute arbitrary code. (CVE-2026-1484)

    It was discovered that GLib incorrectly parsed certain treemagic files.
    An attacker could use this issue to cause GLib to crash, resulting in a
    denial of service, or possibly execute arbitrary code. (CVE-2026-1485)

    It was discovered that GLib incorrectly handled Unicode case conversion.
    An attacker could use this issue to cause GLib to crash, resulting in a
    denial of service, or possibly execute arbitrary code. (CVE-2026-1489)

    Update instructions:

    The problem can be corrected by updating your system to the following
    package versions:

    Ubuntu 25.10
    libglib2.0-0t64 2.86.0-2ubuntu0.3
    libglib2.0-bin 2.86.0-2ubuntu0.3

    Ubuntu 24.04 LTS
    libglib2.0-0t64 2.80.0-6ubuntu3.8
    libglib2.0-bin 2.80.0-6ubuntu3.8

    Ubuntu 22.04 LTS
    libglib2.0-0 2.72.4-0ubuntu2.9
    libglib2.0-bin 2.72.4-0ubuntu2.9

    In general, a standard system update will make all the necessary changes.

    References:
    https://ubuntu.com/security/notices/USN-8017-1
    CVE-2026-1484, CVE-2026-1485, CVE-2026-1489

    Package Information:
    https://launchpad.net/ubuntu/+source/glib2.0/2.86.0-2ubuntu0.3
    https://launchpad.net/ubuntu/+source/glib2.0/2.80.0-6ubuntu3.8
    https://launchpad.net/ubuntu/+source/glib2.0/2.72.4-0ubuntu2.9

    [USN-8018-1] Python vulnerabilities

    ==========================================================================
    Ubuntu Security Notice USN-8018-1
    February 05, 2026

    python3.14, python3.13, python3.12, python3.11, python3.10, python3.9,
    python3.8, python3.7, python3.6, python3.5, python3.4 vulnerabilities
    ==========================================================================

    A security issue affects these releases of Ubuntu and its derivatives:

    - Ubuntu 25.10
    - Ubuntu 24.04 LTS
    - Ubuntu 22.04 LTS
    - Ubuntu 20.04 LTS
    - Ubuntu 18.04 LTS
    - Ubuntu 16.04 LTS
    - Ubuntu 14.04 LTS

    Summary:

    Several security issues were fixed in Python.

    Software Description:
    - python3.13: An interactive high-level object-oriented language
    - python3.14: An interactive high-level object-oriented language
    - python3.12: An interactive high-level object-oriented language
    - python3.10: An interactive high-level object-oriented language
    - python3.11: An interactive high-level object-oriented language
    - python3.8: An interactive high-level object-oriented language
    - python3.9: An interactive high-level object-oriented language
    - python3.6: An interactive high-level object-oriented language
    - python3.7: An interactive high-level object-oriented language
    - python3.5: An interactive high-level object-oriented language
    - python3.4: An interactive high-level object-oriented language

    Details:

    Denis Ledoux discovered that Python incorrectly parsed email message
    headers. An attacker could possibly use this issue to inject arbitrary
    headers into email messages. This issue only affected python3.6, python3.7,
    python3.8, python3.9, python3.10, python3.11, python3.12, python3.13, and
    python3.14 packages. (CVE-2025-11468)

    Jacob Walls, Shai Berger, and Natalia Bidart discovered that Python
    inefficiently parsed XML input with quadratic complexity. An attacker could
    possibly use this issue to cause a denial of service. (CVE-2025-12084)

    It was discovered that Python incorrectly parsed malicious plist files. An
    attacker could possibly use this issue to cause Python to use excessive
    resources, leading to a denial of service. This issue only affected
    python3.5, python3.6, python3.7, python3.8, python3.9, python3.10,
    python3.11, python3.12, python3.13, and python3.14 packages.
    (CVE-2025-13837)

    Omar Hasan discovered that Python incorrectly parsed URL mediatypes. An
    attacker could possibly use this issue to inject arbitrary HTTP headers.
    (CVE-2025-15282)

    Omar Hasan discovered that Python incorrectly parsed malicious IMAP inputs.
    An attacker could possibly use this issue to inject arbitrary IMAP
    commands. (CVE-2025-15366)

    Omar Hasan discovered that Python incorrectly parsed malicious POP3 inputs.
    An attacker could possibly use this issue to inject arbitrary POP3
    commands. (CVE-2025-15367)

    Omar Hasan discovered that Python incorrectly parsed malicious HTTP cookie
    headers. An attacker could possibly use this issue to inject arbitrary HTTP
    headers. (CVE-2026-0672)

    Omar Hasan discovered that Python incorrectly parsed malicious HTTP header
    names and values. An attacker could possibly use this issue to inject
    arbitrary HTTP headers. (CVE-2026-0865)

    Update instructions:

    The problem can be corrected by updating your system to the following
    package versions:

    Ubuntu 25.10
    idle-python3.13 3.13.7-1ubuntu0.3
    idle-python3.14 3.14.0-1ubuntu0.2
    libpython3.13 3.13.7-1ubuntu0.3
    libpython3.13-dev 3.13.7-1ubuntu0.3
    libpython3.13-minimal 3.13.7-1ubuntu0.3
    libpython3.13-stdlib 3.13.7-1ubuntu0.3
    libpython3.13-testsuite 3.13.7-1ubuntu0.3
    libpython3.14 3.14.0-1ubuntu0.2
    libpython3.14-dev 3.14.0-1ubuntu0.2
    libpython3.14-minimal 3.14.0-1ubuntu0.2
    libpython3.14-stdlib 3.14.0-1ubuntu0.2
    libpython3.14-testsuite 3.14.0-1ubuntu0.2
    python3.13 3.13.7-1ubuntu0.3
    python3.13-dev 3.13.7-1ubuntu0.3
    python3.13-doc 3.13.7-1ubuntu0.3
    python3.13-examples 3.13.7-1ubuntu0.3
    python3.13-full 3.13.7-1ubuntu0.3
    python3.13-gdbm 3.13.7-1ubuntu0.3
    python3.13-minimal 3.13.7-1ubuntu0.3
    python3.13-nopie 3.13.7-1ubuntu0.3
    python3.13-tk 3.13.7-1ubuntu0.3
    python3.13-venv 3.13.7-1ubuntu0.3
    python3.14 3.14.0-1ubuntu0.2
    python3.14-dev 3.14.0-1ubuntu0.2
    python3.14-doc 3.14.0-1ubuntu0.2
    python3.14-examples 3.14.0-1ubuntu0.2
    python3.14-full 3.14.0-1ubuntu0.2
    python3.14-gdbm 3.14.0-1ubuntu0.2
    python3.14-minimal 3.14.0-1ubuntu0.2
    python3.14-nopie 3.14.0-1ubuntu0.2
    python3.14-tk 3.14.0-1ubuntu0.2
    python3.14-venv 3.14.0-1ubuntu0.2

    Ubuntu 24.04 LTS
    idle-python3.12 3.12.3-1ubuntu0.11
    libpython3.12-dev 3.12.3-1ubuntu0.11
    libpython3.12-minimal 3.12.3-1ubuntu0.11
    libpython3.12-stdlib 3.12.3-1ubuntu0.11
    libpython3.12-testsuite 3.12.3-1ubuntu0.11
    libpython3.12t64 3.12.3-1ubuntu0.11
    python3.12 3.12.3-1ubuntu0.11
    python3.12-dev 3.12.3-1ubuntu0.11
    python3.12-doc 3.12.3-1ubuntu0.11
    python3.12-examples 3.12.3-1ubuntu0.11
    python3.12-full 3.12.3-1ubuntu0.11
    python3.12-minimal 3.12.3-1ubuntu0.11
    python3.12-nopie 3.12.3-1ubuntu0.11
    python3.12-venv 3.12.3-1ubuntu0.11

    Ubuntu 22.04 LTS
    idle-python3.10 3.10.12-1~22.04.14
    idle-python3.11 3.11.0~rc1-1~22.04.1~esm8
    Available with Ubuntu Pro
    libpython3.10 3.10.12-1~22.04.14
    libpython3.10-dev 3.10.12-1~22.04.14
    libpython3.10-minimal 3.10.12-1~22.04.14
    libpython3.10-stdlib 3.10.12-1~22.04.14
    libpython3.10-testsuite 3.10.12-1~22.04.14
    libpython3.11 3.11.0~rc1-1~22.04.1~esm8
    Available with Ubuntu Pro
    libpython3.11-dev 3.11.0~rc1-1~22.04.1~esm8
    Available with Ubuntu Pro
    libpython3.11-minimal 3.11.0~rc1-1~22.04.1~esm8
    Available with Ubuntu Pro
    libpython3.11-stdlib 3.11.0~rc1-1~22.04.1~esm8
    Available with Ubuntu Pro
    libpython3.11-testsuite 3.11.0~rc1-1~22.04.1~esm8
    Available with Ubuntu Pro
    python3.10 3.10.12-1~22.04.14
    python3.10-dev 3.10.12-1~22.04.14
    python3.10-doc 3.10.12-1~22.04.14
    python3.10-examples 3.10.12-1~22.04.14
    python3.10-full 3.10.12-1~22.04.14
    python3.10-minimal 3.10.12-1~22.04.14
    python3.10-nopie 3.10.12-1~22.04.14
    python3.10-venv 3.10.12-1~22.04.14
    python3.11 3.11.0~rc1-1~22.04.1~esm8
    Available with Ubuntu Pro
    python3.11-dev 3.11.0~rc1-1~22.04.1~esm8
    Available with Ubuntu Pro
    python3.11-doc 3.11.0~rc1-1~22.04.1~esm8
    Available with Ubuntu Pro
    python3.11-examples 3.11.0~rc1-1~22.04.1~esm8
    Available with Ubuntu Pro
    python3.11-full 3.11.0~rc1-1~22.04.1~esm8
    Available with Ubuntu Pro
    python3.11-minimal 3.11.0~rc1-1~22.04.1~esm8
    Available with Ubuntu Pro
    python3.11-nopie 3.11.0~rc1-1~22.04.1~esm8
    Available with Ubuntu Pro
    python3.11-venv 3.11.0~rc1-1~22.04.1~esm8
    Available with Ubuntu Pro

    Ubuntu 20.04 LTS
    idle-python3.8 3.8.10-0ubuntu1~20.04.18+esm5
    Available with Ubuntu Pro
    idle-python3.9 3.9.5-3ubuntu0~20.04.1+esm9
    Available with Ubuntu Pro
    libpython3.8 3.8.10-0ubuntu1~20.04.18+esm5
    Available with Ubuntu Pro
    libpython3.8-dev 3.8.10-0ubuntu1~20.04.18+esm5
    Available with Ubuntu Pro
    libpython3.8-minimal 3.8.10-0ubuntu1~20.04.18+esm5
    Available with Ubuntu Pro
    libpython3.8-stdlib 3.8.10-0ubuntu1~20.04.18+esm5
    Available with Ubuntu Pro
    libpython3.8-testsuite 3.8.10-0ubuntu1~20.04.18+esm5
    Available with Ubuntu Pro
    libpython3.9 3.9.5-3ubuntu0~20.04.1+esm9
    Available with Ubuntu Pro
    libpython3.9-dev 3.9.5-3ubuntu0~20.04.1+esm9
    Available with Ubuntu Pro
    libpython3.9-minimal 3.9.5-3ubuntu0~20.04.1+esm9
    Available with Ubuntu Pro
    libpython3.9-stdlib 3.9.5-3ubuntu0~20.04.1+esm9
    Available with Ubuntu Pro
    libpython3.9-testsuite 3.9.5-3ubuntu0~20.04.1+esm9
    Available with Ubuntu Pro
    python3.8 3.8.10-0ubuntu1~20.04.18+esm5
    Available with Ubuntu Pro
    python3.8-dev 3.8.10-0ubuntu1~20.04.18+esm5
    Available with Ubuntu Pro
    python3.8-doc 3.8.10-0ubuntu1~20.04.18+esm5
    Available with Ubuntu Pro
    python3.8-examples 3.8.10-0ubuntu1~20.04.18+esm5
    Available with Ubuntu Pro
    python3.8-full 3.8.10-0ubuntu1~20.04.18+esm5
    Available with Ubuntu Pro
    python3.8-minimal 3.8.10-0ubuntu1~20.04.18+esm5
    Available with Ubuntu Pro
    python3.8-venv 3.8.10-0ubuntu1~20.04.18+esm5
    Available with Ubuntu Pro
    python3.9 3.9.5-3ubuntu0~20.04.1+esm9
    Available with Ubuntu Pro
    python3.9-dev 3.9.5-3ubuntu0~20.04.1+esm9
    Available with Ubuntu Pro
    python3.9-doc 3.9.5-3ubuntu0~20.04.1+esm9
    Available with Ubuntu Pro
    python3.9-examples 3.9.5-3ubuntu0~20.04.1+esm9
    Available with Ubuntu Pro
    python3.9-full 3.9.5-3ubuntu0~20.04.1+esm9
    Available with Ubuntu Pro
    python3.9-minimal 3.9.5-3ubuntu0~20.04.1+esm9
    Available with Ubuntu Pro
    python3.9-venv 3.9.5-3ubuntu0~20.04.1+esm9
    Available with Ubuntu Pro

    Ubuntu 18.04 LTS
    idle-python3.6 3.6.9-1~18.04ubuntu1.13+esm8
    Available with Ubuntu Pro
    idle-python3.7 3.7.5-2ubuntu1~18.04.2+esm9
    Available with Ubuntu Pro
    idle-python3.8 3.8.0-3ubuntu1~18.04.2+esm9
    Available with Ubuntu Pro
    libpython3.6 3.6.9-1~18.04ubuntu1.13+esm8
    Available with Ubuntu Pro
    libpython3.6-dev 3.6.9-1~18.04ubuntu1.13+esm8
    Available with Ubuntu Pro
    libpython3.6-minimal 3.6.9-1~18.04ubuntu1.13+esm8
    Available with Ubuntu Pro
    libpython3.6-stdlib 3.6.9-1~18.04ubuntu1.13+esm8
    Available with Ubuntu Pro
    libpython3.6-testsuite 3.6.9-1~18.04ubuntu1.13+esm8
    Available with Ubuntu Pro
    libpython3.7 3.7.5-2ubuntu1~18.04.2+esm9
    Available with Ubuntu Pro
    libpython3.7-dev 3.7.5-2ubuntu1~18.04.2+esm9
    Available with Ubuntu Pro
    libpython3.7-minimal 3.7.5-2ubuntu1~18.04.2+esm9
    Available with Ubuntu Pro
    libpython3.7-stdlib 3.7.5-2ubuntu1~18.04.2+esm9
    Available with Ubuntu Pro
    libpython3.7-testsuite 3.7.5-2ubuntu1~18.04.2+esm9
    Available with Ubuntu Pro
    libpython3.8 3.8.0-3ubuntu1~18.04.2+esm9
    Available with Ubuntu Pro
    libpython3.8-dev 3.8.0-3ubuntu1~18.04.2+esm9
    Available with Ubuntu Pro
    libpython3.8-minimal 3.8.0-3ubuntu1~18.04.2+esm9
    Available with Ubuntu Pro
    libpython3.8-stdlib 3.8.0-3ubuntu1~18.04.2+esm9
    Available with Ubuntu Pro
    libpython3.8-testsuite 3.8.0-3ubuntu1~18.04.2+esm9
    Available with Ubuntu Pro
    python3.6 3.6.9-1~18.04ubuntu1.13+esm8
    Available with Ubuntu Pro
    python3.6-dev 3.6.9-1~18.04ubuntu1.13+esm8
    Available with Ubuntu Pro
    python3.6-doc 3.6.9-1~18.04ubuntu1.13+esm8
    Available with Ubuntu Pro
    python3.6-examples 3.6.9-1~18.04ubuntu1.13+esm8
    Available with Ubuntu Pro
    python3.6-minimal 3.6.9-1~18.04ubuntu1.13+esm8
    Available with Ubuntu Pro
    python3.6-venv 3.6.9-1~18.04ubuntu1.13+esm8
    Available with Ubuntu Pro
    python3.7 3.7.5-2ubuntu1~18.04.2+esm9
    Available with Ubuntu Pro
    python3.7-dev 3.7.5-2ubuntu1~18.04.2+esm9
    Available with Ubuntu Pro
    python3.7-doc 3.7.5-2ubuntu1~18.04.2+esm9
    Available with Ubuntu Pro
    python3.7-examples 3.7.5-2ubuntu1~18.04.2+esm9
    Available with Ubuntu Pro
    python3.7-minimal 3.7.5-2ubuntu1~18.04.2+esm9
    Available with Ubuntu Pro
    python3.7-venv 3.7.5-2ubuntu1~18.04.2+esm9
    Available with Ubuntu Pro
    python3.8 3.8.0-3ubuntu1~18.04.2+esm9
    Available with Ubuntu Pro
    python3.8-dev 3.8.0-3ubuntu1~18.04.2+esm9
    Available with Ubuntu Pro
    python3.8-examples 3.8.0-3ubuntu1~18.04.2+esm9
    Available with Ubuntu Pro
    python3.8-minimal 3.8.0-3ubuntu1~18.04.2+esm9
    Available with Ubuntu Pro
    python3.8-venv 3.8.0-3ubuntu1~18.04.2+esm9
    Available with Ubuntu Pro

    Ubuntu 16.04 LTS
    idle-python3.5 3.5.2-2ubuntu0~16.04.13+esm21
    Available with Ubuntu Pro
    libpython3.5 3.5.2-2ubuntu0~16.04.13+esm21
    Available with Ubuntu Pro
    libpython3.5-dev 3.5.2-2ubuntu0~16.04.13+esm21
    Available with Ubuntu Pro
    libpython3.5-minimal 3.5.2-2ubuntu0~16.04.13+esm21
    Available with Ubuntu Pro
    libpython3.5-stdlib 3.5.2-2ubuntu0~16.04.13+esm21
    Available with Ubuntu Pro
    libpython3.5-testsuite 3.5.2-2ubuntu0~16.04.13+esm21
    Available with Ubuntu Pro
    python3.5 3.5.2-2ubuntu0~16.04.13+esm21
    Available with Ubuntu Pro
    python3.5-dev 3.5.2-2ubuntu0~16.04.13+esm21
    Available with Ubuntu Pro
    python3.5-doc 3.5.2-2ubuntu0~16.04.13+esm21
    Available with Ubuntu Pro
    python3.5-examples 3.5.2-2ubuntu0~16.04.13+esm21
    Available with Ubuntu Pro
    python3.5-minimal 3.5.2-2ubuntu0~16.04.13+esm21
    Available with Ubuntu Pro
    python3.5-venv 3.5.2-2ubuntu0~16.04.13+esm21
    Available with Ubuntu Pro

    Ubuntu 14.04 LTS
    idle-python3.4 3.4.3-1ubuntu1~14.04.7+esm19
    Available with Ubuntu Pro
    idle-python3.5 3.5.2-2ubuntu0~16.04.4~14.04.1+esm9
    Available with Ubuntu Pro
    libpython3.4 3.4.3-1ubuntu1~14.04.7+esm19
    Available with Ubuntu Pro
    libpython3.4-dev 3.4.3-1ubuntu1~14.04.7+esm19
    Available with Ubuntu Pro
    libpython3.4-minimal 3.4.3-1ubuntu1~14.04.7+esm19
    Available with Ubuntu Pro
    libpython3.4-stdlib 3.4.3-1ubuntu1~14.04.7+esm19
    Available with Ubuntu Pro
    libpython3.4-testsuite 3.4.3-1ubuntu1~14.04.7+esm19
    Available with Ubuntu Pro
    libpython3.5 3.5.2-2ubuntu0~16.04.4~14.04.1+esm9
    Available with Ubuntu Pro
    libpython3.5-dev 3.5.2-2ubuntu0~16.04.4~14.04.1+esm9
    Available with Ubuntu Pro
    libpython3.5-minimal 3.5.2-2ubuntu0~16.04.4~14.04.1+esm9
    Available with Ubuntu Pro
    libpython3.5-stdlib 3.5.2-2ubuntu0~16.04.4~14.04.1+esm9
    Available with Ubuntu Pro
    libpython3.5-testsuite 3.5.2-2ubuntu0~16.04.4~14.04.1+esm9
    Available with Ubuntu Pro
    python3.4 3.4.3-1ubuntu1~14.04.7+esm19
    Available with Ubuntu Pro
    python3.4-dev 3.4.3-1ubuntu1~14.04.7+esm19
    Available with Ubuntu Pro
    python3.4-doc 3.4.3-1ubuntu1~14.04.7+esm19
    Available with Ubuntu Pro
    python3.4-examples 3.4.3-1ubuntu1~14.04.7+esm19
    Available with Ubuntu Pro
    python3.4-minimal 3.4.3-1ubuntu1~14.04.7+esm19
    Available with Ubuntu Pro
    python3.4-venv 3.4.3-1ubuntu1~14.04.7+esm19
    Available with Ubuntu Pro
    python3.5 3.5.2-2ubuntu0~16.04.4~14.04.1+esm9
    Available with Ubuntu Pro
    python3.5-dev 3.5.2-2ubuntu0~16.04.4~14.04.1+esm9
    Available with Ubuntu Pro
    python3.5-doc 3.5.2-2ubuntu0~16.04.4~14.04.1+esm9
    Available with Ubuntu Pro
    python3.5-examples 3.5.2-2ubuntu0~16.04.4~14.04.1+esm9
    Available with Ubuntu Pro
    python3.5-minimal 3.5.2-2ubuntu0~16.04.4~14.04.1+esm9
    Available with Ubuntu Pro
    python3.5-venv 3.5.2-2ubuntu0~16.04.4~14.04.1+esm9
    Available with Ubuntu Pro

    In general, a standard system update will make all the necessary changes.

    References:
    https://ubuntu.com/security/notices/USN-8018-1
    CVE-2025-11468, CVE-2025-12084, CVE-2025-13837, CVE-2025-15282,
    CVE-2025-15366, CVE-2025-15367, CVE-2026-0672, CVE-2026-0865

    Package Information:
    https://launchpad.net/ubuntu/+source/python3.13/3.13.7-1ubuntu0.3
    https://launchpad.net/ubuntu/+source/python3.14/3.14.0-1ubuntu0.2
    https://launchpad.net/ubuntu/+source/python3.12/3.12.3-1ubuntu0.11

    Wednesday, February 4, 2026

    Fedora 44 Branching delay (now 2026-02-05)

    Greetings.

    Per the schedule we were planning on branching Fedora 44 off rawhide on
    tuesday ( 2026-02-03 ). However due to a lot of in flight changes,
    we have delayed things, first until today, now until tomorrow morning
    ( 2026-02-05 15UTC).

    In flight right before branching was:

    - A mini mass rebuild for ghc (completed now)
    - A mini mass rebuild for golang (completed now)
    - Problems with the fedora-release/systemd kmscon changes not passing gating
    (reverted for now until we can figure out the bug)
    - The gnome 50 update not passing gating
    (still being handled, but getting closer)

    Moving forward if everyone could try not to land big changes right at
    branching time that would be great. :)

    Hopefully things will go smoothly tomorrow and sorry for the delay.

    kevin
    --
    _______________________________________________
    devel-announce mailing list -- devel-announce@lists.fedoraproject.org
    To unsubscribe send an email to devel-announce-leave@lists.fedoraproject.org
    Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
    List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
    List Archives: https://lists.fedoraproject.org/archives/list/devel-announce@lists.fedoraproject.org
    Do not reply to spam, report it: https://forge.fedoraproject.org/infra/tickets/issues/new

    [USN-8016-1] Linux kernel (NVIDIA) vulnerabilities

    -----BEGIN PGP SIGNATURE-----

    wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmmDsi8FAwAAAAAACgkQZ0GeRcM5nt0N
    aQf/WO4sNDsZCLgK711qvBJj38FPeIDqa7mMIqTItltsVLOw3yjij6VAQdlom+4HAaqBQwPBT2Xz
    Ce9rCz5vUvhVLb0JqSqonNvstfjIlY2dgE2eG3kj0fTxNtnX0fPTNPCMDwPYGmILEugMWZ6/1sfT
    vDgKjg8QJvpoS80+SU5NGrfSCVXNs2aMkH9VhKT6D9GE10BmUPktJUC1Wf4AJapyoDyftzCGcfpQ
    O+1pDNmL0YXWeAxfzNQtmC442fF14MmkcUmvdZkCt2hcv/Uk7kcUPNI3vlys+eQRje+o461jNneM
    /EZyPa419ozfgzfucZQT8+E40NxfT3xwjw+5L3dNyg==
    =8VUS
    -----END PGP SIGNATURE-----
    ==========================================================================
    Ubuntu Security Notice USN-8016-1
    February 04, 2026

    linux-nvidia, linux-nvidia-6.8, linux-nvidia-lowlatency vulnerabilities
    ==========================================================================

    A security issue affects these releases of Ubuntu and its derivatives:

    - Ubuntu 24.04 LTS
    - Ubuntu 22.04 LTS

    Summary:

    Several security issues were fixed in the Linux kernel.

    Software Description:
    - linux-nvidia: Linux kernel for NVIDIA systems
    - linux-nvidia-lowlatency: Linux low latency kernel for NVIDIA systems
    - linux-nvidia-6.8: Linux kernel for NVIDIA systems

    Details:

    Several security issues were discovered in the Linux kernel.
    An attacker could possibly use these to compromise the system.
    This update corrects flaws in the following subsystems:
    - Cryptographic API;
    - SPI subsystem;
    - SMB network file system;
    - io_uring subsystem;
    (CVE-2025-38561, CVE-2025-39698, CVE-2025-40019, CVE-2025-68746)

    Update instructions:

    The problem can be corrected by updating your system to the following
    package versions:

    Ubuntu 24.04 LTS
    linux-image-6.8.0-1045-nvidia 6.8.0-1045.48
    linux-image-6.8.0-1045-nvidia-64k 6.8.0-1045.48
    linux-image-6.8.0-1045-nvidia-lowlatency 6.8.0-1045.48.1
    linux-image-6.8.0-1045-nvidia-lowlatency-64k 6.8.0-1045.48.1
    linux-image-nvidia 6.8.0-1045.48
    linux-image-nvidia-6.8 6.8.0-1045.48
    linux-image-nvidia-64k 6.8.0-1045.48
    linux-image-nvidia-64k-6.8 6.8.0-1045.48
    linux-image-nvidia-lowlatency 6.8.0-1045.48.1
    linux-image-nvidia-lowlatency-6.8 6.8.0-1045.48.1
    linux-image-nvidia-lowlatency-64k 6.8.0-1045.48.1
    linux-image-nvidia-lowlatency-64k-6.8 6.8.0-1045.48.1

    Ubuntu 22.04 LTS
    linux-image-6.8.0-1045-nvidia 6.8.0-1045.48~22.04.1
    linux-image-6.8.0-1045-nvidia-64k 6.8.0-1045.48~22.04.1
    linux-image-nvidia-6.8 6.8.0-1045.48~22.04.1
    linux-image-nvidia-64k-6.8 6.8.0-1045.48~22.04.1
    linux-image-nvidia-64k-hwe-22.04 6.8.0-1045.48~22.04.1
    linux-image-nvidia-hwe-22.04 6.8.0-1045.48~22.04.1

    After a standard system update you need to reboot your computer to make
    all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates have
    been given a new version number, which requires you to recompile and
    reinstall all third party kernel modules you might have installed.
    Unless you manually uninstalled the standard kernel metapackages
    (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
    linux-powerpc), a standard system upgrade will automatically perform
    this as well.

    References:
    https://ubuntu.com/security/notices/USN-8016-1
    CVE-2025-38561, CVE-2025-39698, CVE-2025-40019, CVE-2025-68746

    Package Information:
    https://launchpad.net/ubuntu/+source/linux-nvidia/6.8.0-1045.48
    https://launchpad.net/ubuntu/+source/linux-nvidia-lowlatency/6.8.0-1045.48.1
    https://launchpad.net/ubuntu/+source/linux-nvidia-6.8/6.8.0-1045.48~22.04.1

    [USN-8015-2] Linux kernel (Real-time) vulnerabilities

    -----BEGIN PGP SIGNATURE-----

    wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmmDsh8FAwAAAAAACgkQZ0GeRcM5nt08
    cQgAnKAsC66s4jVTGGSwbdDtmdab1BWh41Til6RM6JbWyQlBZLUCetk3I/TyjyKKiHOoEzcGwKVM
    PvRavonkTSHzgAAMTJvay0IO67XfmGTC4ru79aiUK1IaV1RoGk+bc6x8soujYAQnVXMERA9ZRxTq
    OsLH6j5DAStUmeE0PxDU2bZii3ZCvw+/YTx+qIxoOoDmfRsLBOxlSJlrPZDrbwe9jtmu5u/LA0rc
    zRDxalOyWvL8PGBya7gw1tKJsW0QgYM4dRc4BGoTZLBW0cBPuFvl5lz28bmL9iUJoctJOdQWd1wA
    KDk0xZJZMZ8exFRnJ6LNAk1yEio+dWFWPKxC0HKsEQ==
    =Mp/+
    -----END PGP SIGNATURE-----
    ==========================================================================
    Ubuntu Security Notice USN-8015-2
    February 04, 2026

    linux-realtime, linux-realtime-6.8, linux-raspi-realtime vulnerabilities
    ==========================================================================

    A security issue affects these releases of Ubuntu and its derivatives:

    - Ubuntu 24.04 LTS
    - Ubuntu 22.04 LTS

    Summary:

    Several security issues were fixed in the Linux kernel.

    Software Description:
    - linux-raspi-realtime: Linux kernel for Raspberry Pi Real-time systems
    - linux-realtime: Linux kernel for Real-time systems
    - linux-realtime-6.8: Linux kernel for Real-time systems

    Details:

    Several security issues were discovered in the Linux kernel.
    An attacker could possibly use these to compromise the system.
    This update corrects flaws in the following subsystems:
    - Cryptographic API;
    - SMB network file system;
    - io_uring subsystem;
    (CVE-2025-38561, CVE-2025-39698, CVE-2025-40019)

    Update instructions:

    The problem can be corrected by updating your system to the following
    package versions:

    Ubuntu 24.04 LTS
    linux-image-6.8.0-2036-raspi-realtime 6.8.0-2036.37
    Available with Ubuntu Pro
    linux-image-6.8.1-1040-realtime 6.8.1-1040.41
    Available with Ubuntu Pro
    linux-image-intel-iot-realtime 6.8.1-1040.41
    Available with Ubuntu Pro
    linux-image-raspi-realtime 6.8.0-2036.37
    Available with Ubuntu Pro
    linux-image-raspi-realtime-6.8 6.8.0-2036.37
    Available with Ubuntu Pro
    linux-image-realtime 6.8.1-1040.41
    Available with Ubuntu Pro
    linux-image-realtime-6.8.1 6.8.1-1040.41
    Available with Ubuntu Pro

    Ubuntu 22.04 LTS
    linux-image-6.8.1-1040-realtime 6.8.1-1040.41~22.04.1
    Available with Ubuntu Pro
    linux-image-realtime-6.8.1 6.8.1-1040.41~22.04.1
    Available with Ubuntu Pro
    linux-image-realtime-hwe-22.04 6.8.1-1040.41~22.04.1
    Available with Ubuntu Pro

    After a standard system update you need to reboot your computer to make
    all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates have
    been given a new version number, which requires you to recompile and
    reinstall all third party kernel modules you might have installed.
    Unless you manually uninstalled the standard kernel metapackages
    (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
    linux-powerpc), a standard system upgrade will automatically perform
    this as well.

    References:
    https://ubuntu.com/security/notices/USN-8015-2
    https://ubuntu.com/security/notices/USN-8015-1
    CVE-2025-38561, CVE-2025-39698, CVE-2025-40019

    Package Information:
    https://launchpad.net/ubuntu/+source/linux-raspi-realtime/6.8.0-2036.37
    https://launchpad.net/ubuntu/+source/linux-realtime/6.8.1-1040.41

    https://launchpad.net/ubuntu/+source/linux-realtime-6.8/6.8.1-1040.41~22.04.1

    [USN-8013-3] Linux kernel (Real-time) vulnerabilities

    -----BEGIN PGP SIGNATURE-----

    wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmmDsgEFAwAAAAAACgkQZ0GeRcM5nt2g
    3gf8C6oAIH5/2ZH+e2H84C83xu/KvXLQayFQ3+gVmm24YBuG26MChcvi0HCd1Yv94CbjHrp00gOi
    1rOzD6PDfI0AqbunLnc0KywCB8hxrxnIIyXFBy9Des74MbKtuqXR2sU3i78m0j5Dd6hD7mTUDKWu
    zrGPZRCU3xDJAVbmtjgDmbOobKu01vi4IZx10cLGAWUZv1jO4qWMRsPmBksDsuRFTDEtNMoXJOIH
    SgjI0ffL4uXZrhCTtrWypSDlmcRr9ec/oFiu1ivSG83oVknb1VIH25+mVL0j+AJZ3rsSMRoWJvEz
    xpCMvZqQvWgzuGrwdgu0ABVv3VsJKGTOlQ8MHvUOYA==
    =Uhlz
    -----END PGP SIGNATURE-----
    ==========================================================================
    Ubuntu Security Notice USN-8013-3
    February 04, 2026

    linux-realtime, linux-intel-iot-realtime vulnerabilities
    ==========================================================================

    A security issue affects these releases of Ubuntu and its derivatives:

    - Ubuntu 22.04 LTS

    Summary:

    Several security issues were fixed in the Linux kernel.

    Software Description:
    - linux-intel-iot-realtime: Linux kernel for Intel IoT Real-time platforms
    - linux-realtime: Linux kernel for Real-time systems

    Details:

    Several security issues were discovered in the Linux kernel.
    An attacker could possibly use these to compromise the system.
    This update corrects flaws in the following subsystems:
    - Cryptographic API;
    - SMB network file system;
    (CVE-2025-38561, CVE-2025-40019)

    Update instructions:

    The problem can be corrected by updating your system to the following
    package versions:

    Ubuntu 22.04 LTS
    linux-image-5.15.0-1091-intel-iot-realtime 5.15.0-1091.93
    Available with Ubuntu Pro
    linux-image-5.15.0-1098-realtime 5.15.0-1098.107
    Available with Ubuntu Pro
    linux-image-intel-iot-realtime 5.15.0.1091.95
    Available with Ubuntu Pro
    linux-image-intel-iot-realtime-5.15 5.15.0.1091.95
    Available with Ubuntu Pro
    linux-image-realtime 5.15.0.1098.102
    Available with Ubuntu Pro
    linux-image-realtime-5.15 5.15.0.1098.102
    Available with Ubuntu Pro

    After a standard system update you need to reboot your computer to make
    all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates have
    been given a new version number, which requires you to recompile and
    reinstall all third party kernel modules you might have installed.
    Unless you manually uninstalled the standard kernel metapackages
    (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
    linux-powerpc), a standard system upgrade will automatically perform
    this as well.

    References:
    https://ubuntu.com/security/notices/USN-8013-3
    https://ubuntu.com/security/notices/USN-8013-2
    https://ubuntu.com/security/notices/USN-8013-1
    CVE-2025-38561, CVE-2025-40019

    Package Information:
    https://launchpad.net/ubuntu/+source/linux-intel-iot-realtime/5.15.0-1091.93
    https://launchpad.net/ubuntu/+source/linux-realtime/5.15.0-1098.107