==========================================================================
Ubuntu Security Notice USN-8052-2
February 24, 2026
linux-xilinx vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-xilinx: Linux kernel for Xilinx systems
Details:
It was discovered that improper initialization of CPU cache memory could
allow a local attacker with hypervisor access to overwrite SEV-SNP guest
memory resulting in loss of data integrity. (CVE-2024-36331)
Oleksii Oleksenko, Cedric Fournet, Jana Hofmann, Boris Köpf, Stavros Volos,
and Flavien Solt discovered that some AMD processors may allow an attacker
to infer data from previous stores, potentially resulting in the leakage of
privileged information. A local attacker could possibly use this to expose
sensitive information. (CVE-2024-36350, CVE-2024-36357)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM32 architecture;
- ARM64 architecture;
- MIPS architecture;
- PA-RISC architecture;
- PowerPC architecture;
- RISC-V architecture;
- S390 architecture;
- x86 architecture;
- Block layer subsystem;
- Cryptographic API;
- Compute Acceleration Framework;
- ACPI drivers;
- Serial ATA and Parallel ATA drivers;
- ATM drivers;
- Drivers core;
- ATA over ethernet (AOE) driver;
- DRBD Distributed Replicated Block Device drivers;
- Network block device driver;
- Ublk userspace block driver;
- Bluetooth drivers;
- Bus devices;
- Character device driver;
- TPM device driver;
- Clock framework and drivers;
- Data acquisition framework and drivers;
- CPU frequency scaling framework;
- Hardware crypto device drivers;
- Device frequency scaling framework;
- Buffer Sharing and Synchronization framework;
- DMA engine subsystem;
- EDAC drivers;
- Arm Firmware Framework for ARMv8-A(FFA);
- ARM SCMI message protocol;
- FPGA Framework;
- GPU drivers;
- HID subsystem;
- Hardware monitoring drivers;
- HW tracing;
- I2C subsystem;
- I3C subsystem;
- IIO subsystem;
- InfiniBand drivers;
- Input Device core drivers;
- Input Device (Miscellaneous) drivers;
- IOMMU subsystem;
- IRQ chip drivers;
- MCB driver;
- Multiple devices driver;
- Media drivers;
- Multifunction device drivers;
- Microchip PCI driver;
- Intel Management Engine Interface driver;
- PCI Endpoint Test driver;
- TI TPS6594 PFSM driver;
- VMware VMCI Driver;
- MMC subsystem;
- MTD block device drivers;
- Network drivers;
- Mellanox network drivers;
- STMicroelectronics network drivers;
- NVDIMM (Non-Volatile Memory Device) drivers;
- NVME drivers;
- PCI subsystem;
- Amlogic Meson DDR PMU;
- PHY drivers;
- Pin controllers subsystem;
- x86 platform drivers;
- Power supply drivers;
- Powercap sysfs driver;
- PTP clock framework;
- PWM drivers;
- RapidIO drivers;
- Voltage and Current Regulator drivers;
- Remote Processor subsystem;
- S/390 drivers;
- SCSI subsystem;
- ASPEED SoC drivers;
- QCOM SoC drivers;
- Samsung SoC drivers;
- SPI subsystem;
- small TFT LCD display modules;
- Media staging drivers;
- TCM subsystem;
- Trusted Execution Environment drivers;
- Thunderbolt and USB4 drivers;
- TTY drivers;
- UFS subsystem;
- Cadence USB3 driver;
- ChipIdea USB driver;
- USB Device Class drivers;
- USB core drivers;
- DesignWare USB3 driver;
- USB Gadget drivers;
- USB Host Controller drivers;
- Renesas USBHS Controller drivers;
- USB Type-C support driver;
- USB Type-C Connector System Software Interface driver;
- VFIO drivers;
- Virtio Host (VHOST) subsystem;
- Backlight driver;
- Framebuffer layer;
- TSM Common Guest driver;
- Virtio drivers;
- Xen hypervisor drivers;
- File systems infrastructure;
- BTRFS file system;
- Ceph distributed file system;
- EFI Variable file system;
- Ext4 file system;
- F2FS file system;
- GFS2 file system;
- JFFS2 file system;
- JFS file system;
- Network file system (NFS) client;
- Network file system (NFS) server daemon;
- NILFS2 file system;
- NTFS3 file system;
- Overlay file system;
- Proc file system;
- SMB network file system;
- DRM display driver;
- Asynchronous Transfer Mode (ATM) subsystem;
- BPF subsystem;
- Memory Management;
- Internal shared memory driver;
- LZO compression library;
- Mellanox drivers;
- padata parallel execution mechanism;
- Networking subsytem;
- Bluetooth subsystem;
- Netfilter;
- Network traffic control;
- SCTP protocol;
- Network sockets;
- UDP network protocol;
- eXpress Data Path;
- XFRM subsystem;
- Digital Audio (PCM) driver;
- Universal MIDI packet (UMP) support module;
- Tracing infrastructure;
- User-space API (UAPI);
- io_uring subsystem;
- IPC subsystem;
- Perf events;
- Kernel exit() syscall;
- IRQ subsystem;
- Padata parallel execution mechanism;
- Kernel command line parsing driver;
- Hibernation control;
- RCU subsystem;
- Restartable seuqences system call mechanism;
- Maple Tree data structure library;
- Memory management;
- KASAN memory debugging framework;
- 802.1Q VLAN protocol;
- 9P file system network protocol;
- Appletalk network protocol;
- Ethernet bridge;
- CAN network layer;
- Networking core;
- Distributed Switch Architecture;
- HSR network protocol;
- IPv4 networking;
- IPv6 networking;
- MAC80211 subsystem;
- Management Component Transport Protocol (MCTP);
- MultiProtocol Label Switching driver;
- Multipath TCP;
- NetLabel subsystem;
- Netlink;
- NFC subsystem;
- Open vSwitch;
- RDS protocol;
- Rose network layer;
- RxRPC session sockets;
- SMC sockets;
- Sun RPC protocol;
- TIPC protocol;
- TLS protocol;
- Unix domain sockets;
- VMware vSockets driver;
- Wireless networking;
- ALSA framework;
- WCD audio codecs;
- Intel ASoC drivers;
- MediaTek ASoC drivers;
- QCOM ASoC drivers;
- SoC audio core drivers;
- USB sound devices;
- Virtio sound driver;
- CPU Power monitoring subsystem;
- KVM subsystem;
(CVE-2025-21884, CVE-2025-21931, CVE-2025-22026, CVE-2025-22101,
CVE-2025-22102, CVE-2025-22115, CVE-2025-22120, CVE-2025-22126,
CVE-2025-22128, CVE-2025-23140, CVE-2025-23141, CVE-2025-23142,
CVE-2025-23144, CVE-2025-23145, CVE-2025-23146, CVE-2025-23147,
CVE-2025-23148, CVE-2025-23149, CVE-2025-23150, CVE-2025-23151,
CVE-2025-23155, CVE-2025-23156, CVE-2025-23157, CVE-2025-23158,
CVE-2025-23159, CVE-2025-23160, CVE-2025-23161, CVE-2025-23163,
CVE-2025-37738, CVE-2025-37739, CVE-2025-37740, CVE-2025-37741,
CVE-2025-37742, CVE-2025-37744, CVE-2025-37745, CVE-2025-37748,
CVE-2025-37749, CVE-2025-37754, CVE-2025-37755, CVE-2025-37757,
CVE-2025-37758, CVE-2025-37759, CVE-2025-37761, CVE-2025-37763,
CVE-2025-37764, CVE-2025-37765, CVE-2025-37766, CVE-2025-37767,
CVE-2025-37768, CVE-2025-37769, CVE-2025-37770, CVE-2025-37771,
CVE-2025-37772, CVE-2025-37773, CVE-2025-37775, CVE-2025-37777,
CVE-2025-37778, CVE-2025-37780, CVE-2025-37781, CVE-2025-37784,
CVE-2025-37786, CVE-2025-37787, CVE-2025-37788, CVE-2025-37789,
CVE-2025-37790, CVE-2025-37792, CVE-2025-37793, CVE-2025-37794,
CVE-2025-37796, CVE-2025-37799, CVE-2025-37800, CVE-2025-37801,
CVE-2025-37803, CVE-2025-37805, CVE-2025-37808, CVE-2025-37809,
CVE-2025-37810, CVE-2025-37811, CVE-2025-37812, CVE-2025-37813,
CVE-2025-37815, CVE-2025-37816, CVE-2025-37817, CVE-2025-37819,
CVE-2025-37820, CVE-2025-37822, CVE-2025-37823, CVE-2025-37824,
CVE-2025-37826, CVE-2025-37827, CVE-2025-37828, CVE-2025-37829,
CVE-2025-37830, CVE-2025-37831, CVE-2025-37836, CVE-2025-37839,
CVE-2025-37840, CVE-2025-37841, CVE-2025-37842, CVE-2025-37844,
CVE-2025-37846, CVE-2025-37849, CVE-2025-37850, CVE-2025-37851,
CVE-2025-37852, CVE-2025-37853, CVE-2025-37854, CVE-2025-37856,
CVE-2025-37857, CVE-2025-37858, CVE-2025-37859, CVE-2025-37861,
CVE-2025-37862, CVE-2025-37863, CVE-2025-37864, CVE-2025-37865,
CVE-2025-37867, CVE-2025-37869, CVE-2025-37871, CVE-2025-37872,
CVE-2025-37873, CVE-2025-37874, CVE-2025-37875, CVE-2025-37878,
CVE-2025-37879, CVE-2025-37881, CVE-2025-37883, CVE-2025-37884,
CVE-2025-37885, CVE-2025-37886, CVE-2025-37887, CVE-2025-37891,
CVE-2025-37892, CVE-2025-37897, CVE-2025-37900, CVE-2025-37901,
CVE-2025-37903, CVE-2025-37905, CVE-2025-37909, CVE-2025-37911,
CVE-2025-37912, CVE-2025-37913, CVE-2025-37914, CVE-2025-37915,
CVE-2025-37916, CVE-2025-37917, CVE-2025-37918, CVE-2025-37920,
CVE-2025-37921, CVE-2025-37922, CVE-2025-37923, CVE-2025-37924,
CVE-2025-37925, CVE-2025-37927, CVE-2025-37928, CVE-2025-37930,
CVE-2025-37931, CVE-2025-37933, CVE-2025-37935, CVE-2025-37936,
CVE-2025-37938, CVE-2025-37940, CVE-2025-37943, CVE-2025-37944,
CVE-2025-37945, CVE-2025-37947, CVE-2025-37948, CVE-2025-37949,
CVE-2025-37951, CVE-2025-37952, CVE-2025-37954, CVE-2025-37956,
CVE-2025-37957, CVE-2025-37959, CVE-2025-37960, CVE-2025-37961,
CVE-2025-37962, CVE-2025-37963, CVE-2025-37967, CVE-2025-37968,
CVE-2025-37969, CVE-2025-37970, CVE-2025-37972, CVE-2025-37973,
CVE-2025-37975, CVE-2025-37977, CVE-2025-37978, CVE-2025-37979,
CVE-2025-37980, CVE-2025-37982, CVE-2025-37983, CVE-2025-37984,
CVE-2025-37985, CVE-2025-37986, CVE-2025-37987, CVE-2025-37988,
CVE-2025-37989, CVE-2025-37990, CVE-2025-37991, CVE-2025-37992,
CVE-2025-37994, CVE-2025-37995, CVE-2025-37998, CVE-2025-38003,
CVE-2025-38004, CVE-2025-38005, CVE-2025-38006, CVE-2025-38007,
CVE-2025-38008, CVE-2025-38009, CVE-2025-38010, CVE-2025-38011,
CVE-2025-38013, CVE-2025-38014, CVE-2025-38015, CVE-2025-38018,
CVE-2025-38019, CVE-2025-38020, CVE-2025-38023, CVE-2025-38024,
CVE-2025-38027, CVE-2025-38031, CVE-2025-38034, CVE-2025-38035,
CVE-2025-38037, CVE-2025-38039, CVE-2025-38040, CVE-2025-38043,
CVE-2025-38044, CVE-2025-38045, CVE-2025-38048, CVE-2025-38051,
CVE-2025-38052, CVE-2025-38053, CVE-2025-38055, CVE-2025-38057,
CVE-2025-38058, CVE-2025-38059, CVE-2025-38060, CVE-2025-38061,
CVE-2025-38062, CVE-2025-38063, CVE-2025-38065, CVE-2025-38066,
CVE-2025-38067, CVE-2025-38068, CVE-2025-38071, CVE-2025-38072,
CVE-2025-38074, CVE-2025-38075, CVE-2025-38077, CVE-2025-38078,
CVE-2025-38079, CVE-2025-38080, CVE-2025-38081, CVE-2025-38084,
CVE-2025-38085, CVE-2025-38086, CVE-2025-38087, CVE-2025-38088,
CVE-2025-38089, CVE-2025-38090, CVE-2025-38094, CVE-2025-38095,
CVE-2025-38097, CVE-2025-38098, CVE-2025-38099, CVE-2025-38100,
CVE-2025-38101, CVE-2025-38102, CVE-2025-38103, CVE-2025-38104,
CVE-2025-38107, CVE-2025-38108, CVE-2025-38109, CVE-2025-38110,
CVE-2025-38111, CVE-2025-38112, CVE-2025-38113, CVE-2025-38115,
CVE-2025-38117, CVE-2025-38119, CVE-2025-38120, CVE-2025-38122,
CVE-2025-38123, CVE-2025-38124, CVE-2025-38125, CVE-2025-38126,
CVE-2025-38127, CVE-2025-38129, CVE-2025-38131, CVE-2025-38135,
CVE-2025-38136, CVE-2025-38138, CVE-2025-38142, CVE-2025-38143,
CVE-2025-38145, CVE-2025-38146, CVE-2025-38147, CVE-2025-38148,
CVE-2025-38149, CVE-2025-38153, CVE-2025-38154, CVE-2025-38155,
CVE-2025-38156, CVE-2025-38157, CVE-2025-38158, CVE-2025-38159,
CVE-2025-38160, CVE-2025-38161, CVE-2025-38162, CVE-2025-38163,
CVE-2025-38164, CVE-2025-38165, CVE-2025-38166, CVE-2025-38167,
CVE-2025-38169, CVE-2025-38170, CVE-2025-38173, CVE-2025-38174,
CVE-2025-38180, CVE-2025-38181, CVE-2025-38182, CVE-2025-38183,
CVE-2025-38184, CVE-2025-38185, CVE-2025-38190, CVE-2025-38191,
CVE-2025-38192, CVE-2025-38193, CVE-2025-38194, CVE-2025-38197,
CVE-2025-38198, CVE-2025-38200, CVE-2025-38202, CVE-2025-38208,
CVE-2025-38210, CVE-2025-38211, CVE-2025-38212, CVE-2025-38214,
CVE-2025-38215, CVE-2025-38217, CVE-2025-38218, CVE-2025-38219,
CVE-2025-38220, CVE-2025-38222, CVE-2025-38225, CVE-2025-38226,
CVE-2025-38229, CVE-2025-38230, CVE-2025-38231, CVE-2025-38232,
CVE-2025-38236, CVE-2025-38239, CVE-2025-38244, CVE-2025-38245,
CVE-2025-38246, CVE-2025-38248, CVE-2025-38249, CVE-2025-38250,
CVE-2025-38251, CVE-2025-38253, CVE-2025-38255, CVE-2025-38257,
CVE-2025-38258, CVE-2025-38259, CVE-2025-38260, CVE-2025-38262,
CVE-2025-38263, CVE-2025-38264, CVE-2025-38265, CVE-2025-38269,
CVE-2025-38274, CVE-2025-38275, CVE-2025-38277, CVE-2025-38278,
CVE-2025-38279, CVE-2025-38280, CVE-2025-38282, CVE-2025-38283,
CVE-2025-38285, CVE-2025-38286, CVE-2025-38289, CVE-2025-38290,
CVE-2025-38292, CVE-2025-38293, CVE-2025-38295, CVE-2025-38298,
CVE-2025-38299, CVE-2025-38300, CVE-2025-38303, CVE-2025-38304,
CVE-2025-38305, CVE-2025-38307, CVE-2025-38310, CVE-2025-38312,
CVE-2025-38313, CVE-2025-38319, CVE-2025-38320, CVE-2025-38321,
CVE-2025-38322, CVE-2025-38323, CVE-2025-38324, CVE-2025-38326,
CVE-2025-38328, CVE-2025-38331, CVE-2025-38332, CVE-2025-38333,
CVE-2025-38334, CVE-2025-38335, CVE-2025-38336, CVE-2025-38337,
CVE-2025-38338, CVE-2025-38342, CVE-2025-38343, CVE-2025-38344,
CVE-2025-38345, CVE-2025-38346, CVE-2025-38347, CVE-2025-38348,
CVE-2025-38349, CVE-2025-38351, CVE-2025-38354, CVE-2025-38361,
CVE-2025-38362, CVE-2025-38363, CVE-2025-38364, CVE-2025-38365,
CVE-2025-38368, CVE-2025-38369, CVE-2025-38371, CVE-2025-38373,
CVE-2025-38374, CVE-2025-38375, CVE-2025-38376, CVE-2025-38377,
CVE-2025-38382, CVE-2025-38384, CVE-2025-38385, CVE-2025-38386,
CVE-2025-38387, CVE-2025-38388, CVE-2025-38389, CVE-2025-38390,
CVE-2025-38391, CVE-2025-38392, CVE-2025-38393, CVE-2025-38395,
CVE-2025-38396, CVE-2025-38399, CVE-2025-38400, CVE-2025-38401,
CVE-2025-38402, CVE-2025-38403, CVE-2025-38405, CVE-2025-38406,
CVE-2025-38407, CVE-2025-38408, CVE-2025-38409, CVE-2025-38410,
CVE-2025-38412, CVE-2025-38414, CVE-2025-38415, CVE-2025-38416,
CVE-2025-38418, CVE-2025-38419, CVE-2025-38420, CVE-2025-38422,
CVE-2025-38424, CVE-2025-38425, CVE-2025-38427, CVE-2025-38428,
CVE-2025-38429, CVE-2025-38430, CVE-2025-38436, CVE-2025-38437,
CVE-2025-38439, CVE-2025-38441, CVE-2025-38443, CVE-2025-38444,
CVE-2025-38445, CVE-2025-38448, CVE-2025-38449, CVE-2025-38455,
CVE-2025-38456, CVE-2025-38457, CVE-2025-38458, CVE-2025-38459,
CVE-2025-38460, CVE-2025-38461, CVE-2025-38462, CVE-2025-38463,
CVE-2025-38464, CVE-2025-38465, CVE-2025-38466, CVE-2025-38467,
CVE-2025-38468, CVE-2025-38469, CVE-2025-38470, CVE-2025-38471,
CVE-2025-38472, CVE-2025-38473, CVE-2025-38474, CVE-2025-38476,
CVE-2025-38478, CVE-2025-38480, CVE-2025-38481, CVE-2025-38482,
CVE-2025-38483, CVE-2025-38485, CVE-2025-38487, CVE-2025-38488,
CVE-2025-38489, CVE-2025-38490, CVE-2025-38491, CVE-2025-38493,
CVE-2025-38494, CVE-2025-38495, CVE-2025-38496, CVE-2025-38497,
CVE-2025-38499, CVE-2025-38501, CVE-2025-38503, CVE-2025-38506,
CVE-2025-38507, CVE-2025-38510, CVE-2025-38511, CVE-2025-38512,
CVE-2025-38513, CVE-2025-38514, CVE-2025-38515, CVE-2025-38516,
CVE-2025-38520, CVE-2025-38521, CVE-2025-38524, CVE-2025-38526,
CVE-2025-38527, CVE-2025-38528, CVE-2025-38529, CVE-2025-38530,
CVE-2025-38531, CVE-2025-38532, CVE-2025-38533, CVE-2025-38535,
CVE-2025-38537, CVE-2025-38538, CVE-2025-38539, CVE-2025-38540,
CVE-2025-38542, CVE-2025-38543, CVE-2025-38544, CVE-2025-38546,
CVE-2025-38548, CVE-2025-38549, CVE-2025-38550, CVE-2025-38551,
CVE-2025-38552, CVE-2025-38553, CVE-2025-38555, CVE-2025-38560,
CVE-2025-38562, CVE-2025-38566, CVE-2025-38568, CVE-2025-38569,
CVE-2025-38571, CVE-2025-38572, CVE-2025-38574, CVE-2025-38576,
CVE-2025-38577, CVE-2025-38578, CVE-2025-38579, CVE-2025-38581,
CVE-2025-38582, CVE-2025-38583, CVE-2025-38584, CVE-2025-38585,
CVE-2025-38587, CVE-2025-38588, CVE-2025-38590, CVE-2025-38593,
CVE-2025-38595, CVE-2025-38601, CVE-2025-38602, CVE-2025-38604,
CVE-2025-38608, CVE-2025-38609, CVE-2025-38610, CVE-2025-38612,
CVE-2025-38614, CVE-2025-38615, CVE-2025-38619, CVE-2025-38622,
CVE-2025-38623, CVE-2025-38624, CVE-2025-38625, CVE-2025-38626,
CVE-2025-38630, CVE-2025-38632, CVE-2025-38634, CVE-2025-38635,
CVE-2025-38639, CVE-2025-38640, CVE-2025-38644, CVE-2025-38645,
CVE-2025-38646, CVE-2025-38648, CVE-2025-38650, CVE-2025-38652,
CVE-2025-38653, CVE-2025-38659, CVE-2025-38660, CVE-2025-38663,
CVE-2025-38664, CVE-2025-38665, CVE-2025-38668, CVE-2025-38670,
CVE-2025-38671, CVE-2025-38675, CVE-2025-38676, CVE-2025-38677,
CVE-2025-38679, CVE-2025-38680, CVE-2025-38681, CVE-2025-38683,
CVE-2025-38684, CVE-2025-38685, CVE-2025-38686, CVE-2025-38687,
CVE-2025-38688, CVE-2025-38691, CVE-2025-38692, CVE-2025-38693,
CVE-2025-38694, CVE-2025-38695, CVE-2025-38696, CVE-2025-38697,
CVE-2025-38698, CVE-2025-38699, CVE-2025-38700, CVE-2025-38701,
CVE-2025-38702, CVE-2025-38703, CVE-2025-38704, CVE-2025-38705,
CVE-2025-38706, CVE-2025-38707, CVE-2025-38708, CVE-2025-38710,
CVE-2025-38711, CVE-2025-38712, CVE-2025-38713, CVE-2025-38714,
CVE-2025-38715, CVE-2025-38716, CVE-2025-38718, CVE-2025-38721,
CVE-2025-38722, CVE-2025-38724, CVE-2025-38725, CVE-2025-38728,
CVE-2025-38729, CVE-2025-38730, CVE-2025-38732, CVE-2025-38734,
CVE-2025-38735, CVE-2025-39673, CVE-2025-39675, CVE-2025-39676,
CVE-2025-39679, CVE-2025-39681, CVE-2025-39683, CVE-2025-39684,
CVE-2025-39685, CVE-2025-39686, CVE-2025-39687, CVE-2025-39689,
CVE-2025-39691, CVE-2025-39692, CVE-2025-39693, CVE-2025-39694,
CVE-2025-39701, CVE-2025-39702, CVE-2025-39703, CVE-2025-39705,
CVE-2025-39706, CVE-2025-39707, CVE-2025-39709, CVE-2025-39710,
CVE-2025-39711, CVE-2025-39712, CVE-2025-39713, CVE-2025-39714,
CVE-2025-39715, CVE-2025-39716, CVE-2025-39718, CVE-2025-39719,
CVE-2025-39720, CVE-2025-39721, CVE-2025-39724, CVE-2025-39726,
CVE-2025-39730, CVE-2025-39731, CVE-2025-39732, CVE-2025-39734,
CVE-2025-39736, CVE-2025-39737, CVE-2025-39738, CVE-2025-39739,
CVE-2025-39742, CVE-2025-39743, CVE-2025-39744, CVE-2025-39746,
CVE-2025-39747, CVE-2025-39748, CVE-2025-39749, CVE-2025-39750,
CVE-2025-39752, CVE-2025-39753, CVE-2025-39756, CVE-2025-39757,
CVE-2025-39758, CVE-2025-39759, CVE-2025-39760, CVE-2025-39761,
CVE-2025-39763, CVE-2025-39766, CVE-2025-39770, CVE-2025-39772,
CVE-2025-39773, CVE-2025-39776, CVE-2025-39779, CVE-2025-39781,
CVE-2025-39782, CVE-2025-39783, CVE-2025-39787, CVE-2025-39788,
CVE-2025-39790, CVE-2025-39794, CVE-2025-39795, CVE-2025-39797,
CVE-2025-39798, CVE-2025-39800, CVE-2025-39801, CVE-2025-39889,
CVE-2025-39890, CVE-2025-39946, CVE-2025-39989, CVE-2025-40215,
CVE-2025-40297, CVE-2025-68750)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
linux-image-6.8.0-1023-xilinx 6.8.0-1023.24
linux-image-xilinx 6.8.0.1023.24
linux-image-xilinx-6.8 6.8.0.1023.24
linux-image-xilinx-zynqmp 6.8.0.1023.24
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-8052-2
https://ubuntu.com/security/notices/USN-8052-1
CVE-2024-36331, CVE-2024-36350, CVE-2024-36357, CVE-2025-21884,
CVE-2025-21931, CVE-2025-22026, CVE-2025-22101, CVE-2025-22102,
CVE-2025-22115, CVE-2025-22120, CVE-2025-22126, CVE-2025-22128,
CVE-2025-23140, CVE-2025-23141, CVE-2025-23142, CVE-2025-23144,
CVE-2025-23145, CVE-2025-23146, CVE-2025-23147, CVE-2025-23148,
CVE-2025-23149, CVE-2025-23150, CVE-2025-23151, CVE-2025-23155,
CVE-2025-23156, CVE-2025-23157, CVE-2025-23158, CVE-2025-23159,
CVE-2025-23160, CVE-2025-23161, CVE-2025-23163, CVE-2025-37738,
CVE-2025-37739, CVE-2025-37740, CVE-2025-37741, CVE-2025-37742,
CVE-2025-37744, CVE-2025-37745, CVE-2025-37748, CVE-2025-37749,
CVE-2025-37754, CVE-2025-37755, CVE-2025-37757, CVE-2025-37758,
CVE-2025-37759, CVE-2025-37761, CVE-2025-37763, CVE-2025-37764,
CVE-2025-37765, CVE-2025-37766, CVE-2025-37767, CVE-2025-37768,
CVE-2025-37769, CVE-2025-37770, CVE-2025-37771, CVE-2025-37772,
CVE-2025-37773, CVE-2025-37775, CVE-2025-37777, CVE-2025-37778,
CVE-2025-37780, CVE-2025-37781, CVE-2025-37784, CVE-2025-37786,
CVE-2025-37787, CVE-2025-37788, CVE-2025-37789, CVE-2025-37790,
CVE-2025-37792, CVE-2025-37793, CVE-2025-37794, CVE-2025-37796,
CVE-2025-37799, CVE-2025-37800, CVE-2025-37801, CVE-2025-37803,
CVE-2025-37805, CVE-2025-37808, CVE-2025-37809, CVE-2025-37810,
CVE-2025-37811, CVE-2025-37812, CVE-2025-37813, CVE-2025-37815,
CVE-2025-37816, CVE-2025-37817, CVE-2025-37819, CVE-2025-37820,
CVE-2025-37822, CVE-2025-37823, CVE-2025-37824, CVE-2025-37826,
CVE-2025-37827, CVE-2025-37828, CVE-2025-37829, CVE-2025-37830,
CVE-2025-37831, CVE-2025-37836, CVE-2025-37839, CVE-2025-37840,
CVE-2025-37841, CVE-2025-37842, CVE-2025-37844, CVE-2025-37846,
CVE-2025-37849, CVE-2025-37850, CVE-2025-37851, CVE-2025-37852,
CVE-2025-37853, CVE-2025-37854, CVE-2025-37856, CVE-2025-37857,
CVE-2025-37858, CVE-2025-37859, CVE-2025-37861, CVE-2025-37862,
CVE-2025-37863, CVE-2025-37864, CVE-2025-37865, CVE-2025-37867,
CVE-2025-37869, CVE-2025-37871, CVE-2025-37872, CVE-2025-37873,
CVE-2025-37874, CVE-2025-37875, CVE-2025-37878, CVE-2025-37879,
CVE-2025-37881, CVE-2025-37883, CVE-2025-37884, CVE-2025-37885,
CVE-2025-37886, CVE-2025-37887, CVE-2025-37891, CVE-2025-37892,
CVE-2025-37897, CVE-2025-37900, CVE-2025-37901, CVE-2025-37903,
CVE-2025-37905, CVE-2025-37909, CVE-2025-37911, CVE-2025-37912,
CVE-2025-37913, CVE-2025-37914, CVE-2025-37915, CVE-2025-37916,
CVE-2025-37917, CVE-2025-37918, CVE-2025-37920, CVE-2025-37921,
CVE-2025-37922, CVE-2025-37923, CVE-2025-37924, CVE-2025-37925,
CVE-2025-37927, CVE-2025-37928, CVE-2025-37930, CVE-2025-37931,
CVE-2025-37933, CVE-2025-37935, CVE-2025-37936, CVE-2025-37938,
CVE-2025-37940, CVE-2025-37943, CVE-2025-37944, CVE-2025-37945,
CVE-2025-37947, CVE-2025-37948, CVE-2025-37949, CVE-2025-37951,
CVE-2025-37952, CVE-2025-37954, CVE-2025-37956, CVE-2025-37957,
CVE-2025-37959, CVE-2025-37960, CVE-2025-37961, CVE-2025-37962,
CVE-2025-37963, CVE-2025-37967, CVE-2025-37968, CVE-2025-37969,
CVE-2025-37970, CVE-2025-37972, CVE-2025-37973, CVE-2025-37975,
CVE-2025-37977, CVE-2025-37978, CVE-2025-37979, CVE-2025-37980,
CVE-2025-37982, CVE-2025-37983, CVE-2025-37984, CVE-2025-37985,
CVE-2025-37986, CVE-2025-37987, CVE-2025-37988, CVE-2025-37989,
CVE-2025-37990, CVE-2025-37991, CVE-2025-37992, CVE-2025-37994,
CVE-2025-37995, CVE-2025-37998, CVE-2025-38003, CVE-2025-38004,
CVE-2025-38005, CVE-2025-38006, CVE-2025-38007, CVE-2025-38008,
CVE-2025-38009, CVE-2025-38010, CVE-2025-38011, CVE-2025-38013,
CVE-2025-38014, CVE-2025-38015, CVE-2025-38018, CVE-2025-38019,
CVE-2025-38020, CVE-2025-38023, CVE-2025-38024, CVE-2025-38027,
CVE-2025-38031, CVE-2025-38034, CVE-2025-38035, CVE-2025-38037,
CVE-2025-38039, CVE-2025-38040, CVE-2025-38043, CVE-2025-38044,
CVE-2025-38045, CVE-2025-38048, CVE-2025-38051, CVE-2025-38052,
CVE-2025-38053, CVE-2025-38055, CVE-2025-38057, CVE-2025-38058,
CVE-2025-38059, CVE-2025-38060, CVE-2025-38061, CVE-2025-38062,
CVE-2025-38063, CVE-2025-38065, CVE-2025-38066, CVE-2025-38067,
CVE-2025-38068, CVE-2025-38071, CVE-2025-38072, CVE-2025-38074,
CVE-2025-38075, CVE-2025-38077, CVE-2025-38078, CVE-2025-38079,
CVE-2025-38080, CVE-2025-38081, CVE-2025-38084, CVE-2025-38085,
CVE-2025-38086, CVE-2025-38087, CVE-2025-38088, CVE-2025-38089,
CVE-2025-38090, CVE-2025-38094, CVE-2025-38095, CVE-2025-38097,
CVE-2025-38098, CVE-2025-38099, CVE-2025-38100, CVE-2025-38101,
CVE-2025-38102, CVE-2025-38103, CVE-2025-38104, CVE-2025-38107,
CVE-2025-38108, CVE-2025-38109, CVE-2025-38110, CVE-2025-38111,
CVE-2025-38112, CVE-2025-38113, CVE-2025-38115, CVE-2025-38117,
CVE-2025-38119, CVE-2025-38120, CVE-2025-38122, CVE-2025-38123,
CVE-2025-38124, CVE-2025-38125, CVE-2025-38126, CVE-2025-38127,
CVE-2025-38129, CVE-2025-38131, CVE-2025-38135, CVE-2025-38136,
CVE-2025-38138, CVE-2025-38142, CVE-2025-38143, CVE-2025-38145,
CVE-2025-38146, CVE-2025-38147, CVE-2025-38148, CVE-2025-38149,
CVE-2025-38153, CVE-2025-38154, CVE-2025-38155, CVE-2025-38156,
CVE-2025-38157, CVE-2025-38158, CVE-2025-38159, CVE-2025-38160,
CVE-2025-38161, CVE-2025-38162, CVE-2025-38163, CVE-2025-38164,
CVE-2025-38165, CVE-2025-38166, CVE-2025-38167, CVE-2025-38169,
CVE-2025-38170, CVE-2025-38173, CVE-2025-38174, CVE-2025-38180,
CVE-2025-38181, CVE-2025-38182, CVE-2025-38183, CVE-2025-38184,
CVE-2025-38185, CVE-2025-38190, CVE-2025-38191, CVE-2025-38192,
CVE-2025-38193, CVE-2025-38194, CVE-2025-38197, CVE-2025-38198,
CVE-2025-38200, CVE-2025-38202, CVE-2025-38208, CVE-2025-38210,
CVE-2025-38211, CVE-2025-38212, CVE-2025-38214, CVE-2025-38215,
CVE-2025-38217, CVE-2025-38218, CVE-2025-38219, CVE-2025-38220,
CVE-2025-38222, CVE-2025-38225, CVE-2025-38226, CVE-2025-38229,
CVE-2025-38230, CVE-2025-38231, CVE-2025-38232, CVE-2025-38236,
CVE-2025-38239, CVE-2025-38244, CVE-2025-38245, CVE-2025-38246,
CVE-2025-38248, CVE-2025-38249, CVE-2025-38250, CVE-2025-38251,
CVE-2025-38253, CVE-2025-38255, CVE-2025-38257, CVE-2025-38258,
CVE-2025-38259, CVE-2025-38260, CVE-2025-38262, CVE-2025-38263,
CVE-2025-38264, CVE-2025-38265, CVE-2025-38269, CVE-2025-38274,
CVE-2025-38275, CVE-2025-38277, CVE-2025-38278, CVE-2025-38279,
CVE-2025-38280, CVE-2025-38282, CVE-2025-38283, CVE-2025-38285,
CVE-2025-38286, CVE-2025-38289, CVE-2025-38290, CVE-2025-38292,
CVE-2025-38293, CVE-2025-38295, CVE-2025-38298, CVE-2025-38299,
CVE-2025-38300, CVE-2025-38303, CVE-2025-38304, CVE-2025-38305,
CVE-2025-38307, CVE-2025-38310, CVE-2025-38312, CVE-2025-38313,
CVE-2025-38319, CVE-2025-38320, CVE-2025-38321, CVE-2025-38322,
CVE-2025-38323, CVE-2025-38324, CVE-2025-38326, CVE-2025-38328,
CVE-2025-38331, CVE-2025-38332, CVE-2025-38333, CVE-2025-38334,
CVE-2025-38335, CVE-2025-38336, CVE-2025-38337, CVE-2025-38338,
CVE-2025-38342, CVE-2025-38343, CVE-2025-38344, CVE-2025-38345,
CVE-2025-38346, CVE-2025-38347, CVE-2025-38348, CVE-2025-38349,
CVE-2025-38351, CVE-2025-38354, CVE-2025-38361, CVE-2025-38362,
CVE-2025-38363, CVE-2025-38364, CVE-2025-38365, CVE-2025-38368,
CVE-2025-38369, CVE-2025-38371, CVE-2025-38373, CVE-2025-38374,
CVE-2025-38375, CVE-2025-38376, CVE-2025-38377, CVE-2025-38382,
CVE-2025-38384, CVE-2025-38385, CVE-2025-38386, CVE-2025-38387,
CVE-2025-38388, CVE-2025-38389, CVE-2025-38390, CVE-2025-38391,
CVE-2025-38392, CVE-2025-38393, CVE-2025-38395, CVE-2025-38396,
CVE-2025-38399, CVE-2025-38400, CVE-2025-38401, CVE-2025-38402,
CVE-2025-38403, CVE-2025-38405, CVE-2025-38406, CVE-2025-38407,
CVE-2025-38408, CVE-2025-38409, CVE-2025-38410, CVE-2025-38412,
CVE-2025-38414, CVE-2025-38415, CVE-2025-38416, CVE-2025-38418,
CVE-2025-38419, CVE-2025-38420, CVE-2025-38422, CVE-2025-38424,
CVE-2025-38425, CVE-2025-38427, CVE-2025-38428, CVE-2025-38429,
CVE-2025-38430, CVE-2025-38436, CVE-2025-38437, CVE-2025-38439,
CVE-2025-38441, CVE-2025-38443, CVE-2025-38444, CVE-2025-38445,
CVE-2025-38448, CVE-2025-38449, CVE-2025-38455, CVE-2025-38456,
CVE-2025-38457, CVE-2025-38458, CVE-2025-38459, CVE-2025-38460,
CVE-2025-38461, CVE-2025-38462, CVE-2025-38463, CVE-2025-38464,
CVE-2025-38465, CVE-2025-38466, CVE-2025-38467, CVE-2025-38468,
CVE-2025-38469, CVE-2025-38470, CVE-2025-38471, CVE-2025-38472,
CVE-2025-38473, CVE-2025-38474, CVE-2025-38476, CVE-2025-38478,
CVE-2025-38480, CVE-2025-38481, CVE-2025-38482, CVE-2025-38483,
CVE-2025-38485, CVE-2025-38487, CVE-2025-38488, CVE-2025-38489,
CVE-2025-38490, CVE-2025-38491, CVE-2025-38493, CVE-2025-38494,
CVE-2025-38495, CVE-2025-38496, CVE-2025-38497, CVE-2025-38499,
CVE-2025-38501, CVE-2025-38503, CVE-2025-38506, CVE-2025-38507,
CVE-2025-38510, CVE-2025-38511, CVE-2025-38512, CVE-2025-38513,
CVE-2025-38514, CVE-2025-38515, CVE-2025-38516, CVE-2025-38520,
CVE-2025-38521, CVE-2025-38524, CVE-2025-38526, CVE-2025-38527,
CVE-2025-38528, CVE-2025-38529, CVE-2025-38530, CVE-2025-38531,
CVE-2025-38532, CVE-2025-38533, CVE-2025-38535, CVE-2025-38537,
CVE-2025-38538, CVE-2025-38539, CVE-2025-38540, CVE-2025-38542,
CVE-2025-38543, CVE-2025-38544, CVE-2025-38546, CVE-2025-38548,
CVE-2025-38549, CVE-2025-38550, CVE-2025-38551, CVE-2025-38552,
CVE-2025-38553, CVE-2025-38555, CVE-2025-38560, CVE-2025-38562,
CVE-2025-38566, CVE-2025-38568, CVE-2025-38569, CVE-2025-38571,
CVE-2025-38572, CVE-2025-38574, CVE-2025-38576, CVE-2025-38577,
CVE-2025-38578, CVE-2025-38579, CVE-2025-38581, CVE-2025-38582,
CVE-2025-38583, CVE-2025-38584, CVE-2025-38585, CVE-2025-38587,
CVE-2025-38588, CVE-2025-38590, CVE-2025-38593, CVE-2025-38595,
CVE-2025-38601, CVE-2025-38602, CVE-2025-38604, CVE-2025-38608,
CVE-2025-38609, CVE-2025-38610, CVE-2025-38612, CVE-2025-38614,
CVE-2025-38615, CVE-2025-38619, CVE-2025-38622, CVE-2025-38623,
CVE-2025-38624, CVE-2025-38625, CVE-2025-38626, CVE-2025-38630,
CVE-2025-38632, CVE-2025-38634, CVE-2025-38635, CVE-2025-38639,
CVE-2025-38640, CVE-2025-38644, CVE-2025-38645, CVE-2025-38646,
CVE-2025-38648, CVE-2025-38650, CVE-2025-38652, CVE-2025-38653,
CVE-2025-38659, CVE-2025-38660, CVE-2025-38663, CVE-2025-38664,
CVE-2025-38665, CVE-2025-38668, CVE-2025-38670, CVE-2025-38671,
CVE-2025-38675, CVE-2025-38676, CVE-2025-38677, CVE-2025-38679,
CVE-2025-38680, CVE-2025-38681, CVE-2025-38683, CVE-2025-38684,
CVE-2025-38685, CVE-2025-38686, CVE-2025-38687, CVE-2025-38688,
CVE-2025-38691, CVE-2025-38692, CVE-2025-38693, CVE-2025-38694,
CVE-2025-38695, CVE-2025-38696, CVE-2025-38697, CVE-2025-38698,
CVE-2025-38699, CVE-2025-38700, CVE-2025-38701, CVE-2025-38702,
CVE-2025-38703, CVE-2025-38704, CVE-2025-38705, CVE-2025-38706,
CVE-2025-38707, CVE-2025-38708, CVE-2025-38710, CVE-2025-38711,
CVE-2025-38712, CVE-2025-38713, CVE-2025-38714, CVE-2025-38715,
CVE-2025-38716, CVE-2025-38718, CVE-2025-38721, CVE-2025-38722,
CVE-2025-38724, CVE-2025-38725, CVE-2025-38728, CVE-2025-38729,
CVE-2025-38730, CVE-2025-38732, CVE-2025-38734, CVE-2025-38735,
CVE-2025-39673, CVE-2025-39675, CVE-2025-39676, CVE-2025-39679,
CVE-2025-39681, CVE-2025-39683, CVE-2025-39684, CVE-2025-39685,
CVE-2025-39686, CVE-2025-39687, CVE-2025-39689, CVE-2025-39691,
CVE-2025-39692, CVE-2025-39693, CVE-2025-39694, CVE-2025-39701,
CVE-2025-39702, CVE-2025-39703, CVE-2025-39705, CVE-2025-39706,
CVE-2025-39707, CVE-2025-39709, CVE-2025-39710, CVE-2025-39711,
CVE-2025-39712, CVE-2025-39713, CVE-2025-39714, CVE-2025-39715,
CVE-2025-39716, CVE-2025-39718, CVE-2025-39719, CVE-2025-39720,
CVE-2025-39721, CVE-2025-39724, CVE-2025-39726, CVE-2025-39730,
CVE-2025-39731, CVE-2025-39732, CVE-2025-39734, CVE-2025-39736,
CVE-2025-39737, CVE-2025-39738, CVE-2025-39739, CVE-2025-39742,
CVE-2025-39743, CVE-2025-39744, CVE-2025-39746, CVE-2025-39747,
CVE-2025-39748, CVE-2025-39749, CVE-2025-39750, CVE-2025-39752,
CVE-2025-39753, CVE-2025-39756, CVE-2025-39757, CVE-2025-39758,
CVE-2025-39759, CVE-2025-39760, CVE-2025-39761, CVE-2025-39763,
CVE-2025-39766, CVE-2025-39770, CVE-2025-39772, CVE-2025-39773,
CVE-2025-39776, CVE-2025-39779, CVE-2025-39781, CVE-2025-39782,
CVE-2025-39783, CVE-2025-39787, CVE-2025-39788, CVE-2025-39790,
CVE-2025-39794, CVE-2025-39795, CVE-2025-39797, CVE-2025-39798,
CVE-2025-39800, CVE-2025-39801, CVE-2025-39889, CVE-2025-39890,
CVE-2025-39946, CVE-2025-39989, CVE-2025-40215, CVE-2025-40297,
CVE-2025-68750
Package Information:
https://launchpad.net/ubuntu/+source/linux-xilinx/6.8.0-1023.24
Tuesday, February 24, 2026
[USN-8028-8] Linux kernel (IBM) vulnerabilities
==========================================================================
Ubuntu Security Notice USN-8028-8
February 24, 2026
linux-ibm, linux-ibm-6.8 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-ibm: Linux kernel for IBM cloud systems
- linux-ibm-6.8: Linux kernel for IBM cloud systems
Details:
It was discovered that improper initialization of CPU cache memory could
allow a local attacker with hypervisor access to overwrite SEV-SNP guest
memory resulting in loss of data integrity. (CVE-2024-36331)
Oleksii Oleksenko, Cedric Fournet, Jana Hofmann, Boris Köpf, Stavros Volos,
and Flavien Solt discovered that some AMD processors may allow an attacker
to infer data from previous stores, potentially resulting in the leakage of
privileged information. A local attacker could possibly use this to expose
sensitive information. (CVE-2024-36350, CVE-2024-36357)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM32 architecture;
- ARM64 architecture;
- MIPS architecture;
- PA-RISC architecture;
- PowerPC architecture;
- RISC-V architecture;
- S390 architecture;
- x86 architecture;
- Block layer subsystem;
- Cryptographic API;
- Compute Acceleration Framework;
- ACPI drivers;
- Serial ATA and Parallel ATA drivers;
- ATM drivers;
- Drivers core;
- ATA over ethernet (AOE) driver;
- DRBD Distributed Replicated Block Device drivers;
- Network block device driver;
- Ublk userspace block driver;
- Bluetooth drivers;
- Bus devices;
- Character device driver;
- TPM device driver;
- Clock framework and drivers;
- Data acquisition framework and drivers;
- CPU frequency scaling framework;
- Hardware crypto device drivers;
- Device frequency scaling framework;
- Buffer Sharing and Synchronization framework;
- DMA engine subsystem;
- EDAC drivers;
- Arm Firmware Framework for ARMv8-A(FFA);
- ARM SCMI message protocol;
- FPGA Framework;
- GPU drivers;
- HID subsystem;
- Hardware monitoring drivers;
- HW tracing;
- I2C subsystem;
- I3C subsystem;
- IIO subsystem;
- InfiniBand drivers;
- Input Device core drivers;
- Input Device (Miscellaneous) drivers;
- IOMMU subsystem;
- IRQ chip drivers;
- MCB driver;
- Multiple devices driver;
- Media drivers;
- Multifunction device drivers;
- Microchip PCI driver;
- Intel Management Engine Interface driver;
- PCI Endpoint Test driver;
- TI TPS6594 PFSM driver;
- VMware VMCI Driver;
- MMC subsystem;
- MTD block device drivers;
- Network drivers;
- Mellanox network drivers;
- STMicroelectronics network drivers;
- NVDIMM (Non-Volatile Memory Device) drivers;
- NVME drivers;
- PCI subsystem;
- Amlogic Meson DDR PMU;
- PHY drivers;
- Pin controllers subsystem;
- x86 platform drivers;
- Power supply drivers;
- Powercap sysfs driver;
- PTP clock framework;
- PWM drivers;
- RapidIO drivers;
- Voltage and Current Regulator drivers;
- Remote Processor subsystem;
- S/390 drivers;
- SCSI subsystem;
- ASPEED SoC drivers;
- QCOM SoC drivers;
- Samsung SoC drivers;
- SPI subsystem;
- small TFT LCD display modules;
- Media staging drivers;
- TCM subsystem;
- Trusted Execution Environment drivers;
- Thunderbolt and USB4 drivers;
- TTY drivers;
- UFS subsystem;
- Cadence USB3 driver;
- ChipIdea USB driver;
- USB Device Class drivers;
- USB core drivers;
- DesignWare USB3 driver;
- USB Gadget drivers;
- USB Host Controller drivers;
- Renesas USBHS Controller drivers;
- USB Type-C support driver;
- USB Type-C Connector System Software Interface driver;
- VFIO drivers;
- Virtio Host (VHOST) subsystem;
- Backlight driver;
- Framebuffer layer;
- TSM Common Guest driver;
- Virtio drivers;
- Xen hypervisor drivers;
- File systems infrastructure;
- BTRFS file system;
- Ceph distributed file system;
- EFI Variable file system;
- Ext4 file system;
- F2FS file system;
- GFS2 file system;
- JFFS2 file system;
- JFS file system;
- Network file system (NFS) client;
- Network file system (NFS) server daemon;
- NILFS2 file system;
- NTFS3 file system;
- Overlay file system;
- Proc file system;
- SMB network file system;
- DRM display driver;
- Asynchronous Transfer Mode (ATM) subsystem;
- BPF subsystem;
- Memory Management;
- Internal shared memory driver;
- LZO compression library;
- Mellanox drivers;
- padata parallel execution mechanism;
- Networking subsytem;
- Bluetooth subsystem;
- Netfilter;
- Network traffic control;
- SCTP protocol;
- Network sockets;
- UDP network protocol;
- eXpress Data Path;
- XFRM subsystem;
- Digital Audio (PCM) driver;
- Universal MIDI packet (UMP) support module;
- Tracing infrastructure;
- User-space API (UAPI);
- io_uring subsystem;
- IPC subsystem;
- Perf events;
- Kernel exit() syscall;
- IRQ subsystem;
- Padata parallel execution mechanism;
- Kernel command line parsing driver;
- Hibernation control;
- RCU subsystem;
- Restartable seuqences system call mechanism;
- Maple Tree data structure library;
- Memory management;
- KASAN memory debugging framework;
- 802.1Q VLAN protocol;
- 9P file system network protocol;
- Appletalk network protocol;
- Ethernet bridge;
- CAN network layer;
- Networking core;
- Distributed Switch Architecture;
- HSR network protocol;
- IPv4 networking;
- IPv6 networking;
- MAC80211 subsystem;
- Management Component Transport Protocol (MCTP);
- MultiProtocol Label Switching driver;
- Multipath TCP;
- NetLabel subsystem;
- Netlink;
- NFC subsystem;
- Open vSwitch;
- RDS protocol;
- Rose network layer;
- RxRPC session sockets;
- SMC sockets;
- Sun RPC protocol;
- TIPC protocol;
- TLS protocol;
- Unix domain sockets;
- VMware vSockets driver;
- Wireless networking;
- ALSA framework;
- WCD audio codecs;
- Intel ASoC drivers;
- MediaTek ASoC drivers;
- QCOM ASoC drivers;
- SoC audio core drivers;
- USB sound devices;
- Virtio sound driver;
- CPU Power monitoring subsystem;
- KVM subsystem;
(CVE-2025-21884, CVE-2025-21931, CVE-2025-22026, CVE-2025-22101,
CVE-2025-22102, CVE-2025-22115, CVE-2025-22120, CVE-2025-22126,
CVE-2025-22128, CVE-2025-23140, CVE-2025-23141, CVE-2025-23142,
CVE-2025-23144, CVE-2025-23145, CVE-2025-23146, CVE-2025-23147,
CVE-2025-23148, CVE-2025-23149, CVE-2025-23150, CVE-2025-23151,
CVE-2025-23155, CVE-2025-23156, CVE-2025-23157, CVE-2025-23158,
CVE-2025-23159, CVE-2025-23160, CVE-2025-23161, CVE-2025-23163,
CVE-2025-37738, CVE-2025-37739, CVE-2025-37740, CVE-2025-37741,
CVE-2025-37742, CVE-2025-37744, CVE-2025-37745, CVE-2025-37748,
CVE-2025-37749, CVE-2025-37754, CVE-2025-37755, CVE-2025-37757,
CVE-2025-37758, CVE-2025-37759, CVE-2025-37761, CVE-2025-37763,
CVE-2025-37764, CVE-2025-37765, CVE-2025-37766, CVE-2025-37767,
CVE-2025-37768, CVE-2025-37769, CVE-2025-37770, CVE-2025-37771,
CVE-2025-37772, CVE-2025-37773, CVE-2025-37775, CVE-2025-37777,
CVE-2025-37778, CVE-2025-37780, CVE-2025-37781, CVE-2025-37784,
CVE-2025-37786, CVE-2025-37787, CVE-2025-37788, CVE-2025-37789,
CVE-2025-37790, CVE-2025-37792, CVE-2025-37793, CVE-2025-37794,
CVE-2025-37796, CVE-2025-37799, CVE-2025-37800, CVE-2025-37801,
CVE-2025-37803, CVE-2025-37805, CVE-2025-37808, CVE-2025-37809,
CVE-2025-37810, CVE-2025-37811, CVE-2025-37812, CVE-2025-37813,
CVE-2025-37815, CVE-2025-37816, CVE-2025-37817, CVE-2025-37819,
CVE-2025-37820, CVE-2025-37822, CVE-2025-37823, CVE-2025-37824,
CVE-2025-37826, CVE-2025-37827, CVE-2025-37828, CVE-2025-37829,
CVE-2025-37830, CVE-2025-37831, CVE-2025-37836, CVE-2025-37839,
CVE-2025-37840, CVE-2025-37841, CVE-2025-37842, CVE-2025-37844,
CVE-2025-37846, CVE-2025-37849, CVE-2025-37850, CVE-2025-37851,
CVE-2025-37852, CVE-2025-37853, CVE-2025-37854, CVE-2025-37856,
CVE-2025-37857, CVE-2025-37858, CVE-2025-37859, CVE-2025-37861,
CVE-2025-37862, CVE-2025-37863, CVE-2025-37864, CVE-2025-37865,
CVE-2025-37867, CVE-2025-37869, CVE-2025-37871, CVE-2025-37872,
CVE-2025-37873, CVE-2025-37874, CVE-2025-37875, CVE-2025-37878,
CVE-2025-37879, CVE-2025-37881, CVE-2025-37883, CVE-2025-37884,
CVE-2025-37885, CVE-2025-37886, CVE-2025-37887, CVE-2025-37891,
CVE-2025-37892, CVE-2025-37897, CVE-2025-37900, CVE-2025-37901,
CVE-2025-37903, CVE-2025-37905, CVE-2025-37909, CVE-2025-37911,
CVE-2025-37912, CVE-2025-37913, CVE-2025-37914, CVE-2025-37915,
CVE-2025-37916, CVE-2025-37917, CVE-2025-37918, CVE-2025-37920,
CVE-2025-37921, CVE-2025-37922, CVE-2025-37923, CVE-2025-37924,
CVE-2025-37925, CVE-2025-37927, CVE-2025-37928, CVE-2025-37930,
CVE-2025-37931, CVE-2025-37933, CVE-2025-37935, CVE-2025-37936,
CVE-2025-37938, CVE-2025-37940, CVE-2025-37943, CVE-2025-37944,
CVE-2025-37945, CVE-2025-37947, CVE-2025-37948, CVE-2025-37949,
CVE-2025-37951, CVE-2025-37952, CVE-2025-37954, CVE-2025-37956,
CVE-2025-37957, CVE-2025-37959, CVE-2025-37960, CVE-2025-37961,
CVE-2025-37962, CVE-2025-37963, CVE-2025-37967, CVE-2025-37968,
CVE-2025-37969, CVE-2025-37970, CVE-2025-37972, CVE-2025-37973,
CVE-2025-37975, CVE-2025-37977, CVE-2025-37978, CVE-2025-37979,
CVE-2025-37980, CVE-2025-37982, CVE-2025-37983, CVE-2025-37984,
CVE-2025-37985, CVE-2025-37986, CVE-2025-37987, CVE-2025-37988,
CVE-2025-37989, CVE-2025-37990, CVE-2025-37991, CVE-2025-37992,
CVE-2025-37994, CVE-2025-37995, CVE-2025-37998, CVE-2025-38003,
CVE-2025-38004, CVE-2025-38005, CVE-2025-38006, CVE-2025-38007,
CVE-2025-38008, CVE-2025-38009, CVE-2025-38010, CVE-2025-38011,
CVE-2025-38013, CVE-2025-38014, CVE-2025-38015, CVE-2025-38018,
CVE-2025-38019, CVE-2025-38020, CVE-2025-38023, CVE-2025-38024,
CVE-2025-38027, CVE-2025-38031, CVE-2025-38034, CVE-2025-38035,
CVE-2025-38037, CVE-2025-38039, CVE-2025-38040, CVE-2025-38043,
CVE-2025-38044, CVE-2025-38045, CVE-2025-38048, CVE-2025-38051,
CVE-2025-38052, CVE-2025-38053, CVE-2025-38055, CVE-2025-38057,
CVE-2025-38058, CVE-2025-38059, CVE-2025-38060, CVE-2025-38061,
CVE-2025-38062, CVE-2025-38063, CVE-2025-38065, CVE-2025-38066,
CVE-2025-38067, CVE-2025-38068, CVE-2025-38071, CVE-2025-38072,
CVE-2025-38074, CVE-2025-38075, CVE-2025-38077, CVE-2025-38078,
CVE-2025-38079, CVE-2025-38080, CVE-2025-38081, CVE-2025-38084,
CVE-2025-38085, CVE-2025-38086, CVE-2025-38087, CVE-2025-38088,
CVE-2025-38089, CVE-2025-38090, CVE-2025-38094, CVE-2025-38095,
CVE-2025-38097, CVE-2025-38098, CVE-2025-38099, CVE-2025-38100,
CVE-2025-38101, CVE-2025-38102, CVE-2025-38103, CVE-2025-38104,
CVE-2025-38107, CVE-2025-38108, CVE-2025-38109, CVE-2025-38110,
CVE-2025-38111, CVE-2025-38112, CVE-2025-38113, CVE-2025-38115,
CVE-2025-38117, CVE-2025-38119, CVE-2025-38120, CVE-2025-38122,
CVE-2025-38123, CVE-2025-38124, CVE-2025-38125, CVE-2025-38126,
CVE-2025-38127, CVE-2025-38129, CVE-2025-38131, CVE-2025-38135,
CVE-2025-38136, CVE-2025-38138, CVE-2025-38142, CVE-2025-38143,
CVE-2025-38145, CVE-2025-38146, CVE-2025-38147, CVE-2025-38148,
CVE-2025-38149, CVE-2025-38153, CVE-2025-38154, CVE-2025-38155,
CVE-2025-38156, CVE-2025-38157, CVE-2025-38158, CVE-2025-38159,
CVE-2025-38160, CVE-2025-38161, CVE-2025-38162, CVE-2025-38163,
CVE-2025-38164, CVE-2025-38165, CVE-2025-38166, CVE-2025-38167,
CVE-2025-38169, CVE-2025-38170, CVE-2025-38173, CVE-2025-38174,
CVE-2025-38180, CVE-2025-38181, CVE-2025-38182, CVE-2025-38183,
CVE-2025-38184, CVE-2025-38185, CVE-2025-38190, CVE-2025-38191,
CVE-2025-38192, CVE-2025-38193, CVE-2025-38194, CVE-2025-38197,
CVE-2025-38198, CVE-2025-38200, CVE-2025-38202, CVE-2025-38208,
CVE-2025-38210, CVE-2025-38211, CVE-2025-38212, CVE-2025-38214,
CVE-2025-38215, CVE-2025-38217, CVE-2025-38218, CVE-2025-38219,
CVE-2025-38220, CVE-2025-38222, CVE-2025-38225, CVE-2025-38226,
CVE-2025-38229, CVE-2025-38230, CVE-2025-38231, CVE-2025-38232,
CVE-2025-38236, CVE-2025-38239, CVE-2025-38244, CVE-2025-38245,
CVE-2025-38246, CVE-2025-38248, CVE-2025-38249, CVE-2025-38250,
CVE-2025-38251, CVE-2025-38253, CVE-2025-38255, CVE-2025-38257,
CVE-2025-38258, CVE-2025-38259, CVE-2025-38260, CVE-2025-38262,
CVE-2025-38263, CVE-2025-38264, CVE-2025-38265, CVE-2025-38269,
CVE-2025-38274, CVE-2025-38275, CVE-2025-38277, CVE-2025-38278,
CVE-2025-38279, CVE-2025-38280, CVE-2025-38282, CVE-2025-38283,
CVE-2025-38285, CVE-2025-38286, CVE-2025-38289, CVE-2025-38290,
CVE-2025-38292, CVE-2025-38293, CVE-2025-38295, CVE-2025-38298,
CVE-2025-38299, CVE-2025-38300, CVE-2025-38303, CVE-2025-38304,
CVE-2025-38305, CVE-2025-38307, CVE-2025-38310, CVE-2025-38312,
CVE-2025-38313, CVE-2025-38319, CVE-2025-38320, CVE-2025-38321,
CVE-2025-38322, CVE-2025-38323, CVE-2025-38324, CVE-2025-38326,
CVE-2025-38328, CVE-2025-38331, CVE-2025-38332, CVE-2025-38333,
CVE-2025-38334, CVE-2025-38335, CVE-2025-38336, CVE-2025-38337,
CVE-2025-38338, CVE-2025-38342, CVE-2025-38343, CVE-2025-38344,
CVE-2025-38345, CVE-2025-38346, CVE-2025-38347, CVE-2025-38348,
CVE-2025-38349, CVE-2025-38351, CVE-2025-38354, CVE-2025-38361,
CVE-2025-38362, CVE-2025-38363, CVE-2025-38364, CVE-2025-38365,
CVE-2025-38368, CVE-2025-38369, CVE-2025-38371, CVE-2025-38373,
CVE-2025-38374, CVE-2025-38375, CVE-2025-38376, CVE-2025-38377,
CVE-2025-38382, CVE-2025-38384, CVE-2025-38385, CVE-2025-38386,
CVE-2025-38387, CVE-2025-38388, CVE-2025-38389, CVE-2025-38390,
CVE-2025-38391, CVE-2025-38392, CVE-2025-38393, CVE-2025-38395,
CVE-2025-38396, CVE-2025-38399, CVE-2025-38400, CVE-2025-38401,
CVE-2025-38402, CVE-2025-38403, CVE-2025-38405, CVE-2025-38406,
CVE-2025-38407, CVE-2025-38408, CVE-2025-38409, CVE-2025-38410,
CVE-2025-38412, CVE-2025-38414, CVE-2025-38415, CVE-2025-38416,
CVE-2025-38418, CVE-2025-38419, CVE-2025-38420, CVE-2025-38422,
CVE-2025-38424, CVE-2025-38425, CVE-2025-38427, CVE-2025-38428,
CVE-2025-38429, CVE-2025-38430, CVE-2025-38436, CVE-2025-38437,
CVE-2025-38439, CVE-2025-38441, CVE-2025-38443, CVE-2025-38444,
CVE-2025-38445, CVE-2025-38448, CVE-2025-38449, CVE-2025-38455,
CVE-2025-38456, CVE-2025-38457, CVE-2025-38458, CVE-2025-38459,
CVE-2025-38460, CVE-2025-38461, CVE-2025-38462, CVE-2025-38463,
CVE-2025-38464, CVE-2025-38465, CVE-2025-38466, CVE-2025-38467,
CVE-2025-38468, CVE-2025-38469, CVE-2025-38470, CVE-2025-38471,
CVE-2025-38472, CVE-2025-38473, CVE-2025-38474, CVE-2025-38476,
CVE-2025-38478, CVE-2025-38480, CVE-2025-38481, CVE-2025-38482,
CVE-2025-38483, CVE-2025-38485, CVE-2025-38487, CVE-2025-38488,
CVE-2025-38489, CVE-2025-38490, CVE-2025-38491, CVE-2025-38493,
CVE-2025-38494, CVE-2025-38495, CVE-2025-38496, CVE-2025-38497,
CVE-2025-38499, CVE-2025-38501, CVE-2025-38503, CVE-2025-38506,
CVE-2025-38507, CVE-2025-38510, CVE-2025-38511, CVE-2025-38512,
CVE-2025-38513, CVE-2025-38514, CVE-2025-38515, CVE-2025-38516,
CVE-2025-38520, CVE-2025-38521, CVE-2025-38524, CVE-2025-38526,
CVE-2025-38527, CVE-2025-38528, CVE-2025-38529, CVE-2025-38530,
CVE-2025-38531, CVE-2025-38532, CVE-2025-38533, CVE-2025-38535,
CVE-2025-38537, CVE-2025-38538, CVE-2025-38539, CVE-2025-38540,
CVE-2025-38542, CVE-2025-38543, CVE-2025-38544, CVE-2025-38546,
CVE-2025-38548, CVE-2025-38549, CVE-2025-38550, CVE-2025-38551,
CVE-2025-38552, CVE-2025-38553, CVE-2025-38555, CVE-2025-38560,
CVE-2025-38562, CVE-2025-38566, CVE-2025-38568, CVE-2025-38569,
CVE-2025-38571, CVE-2025-38572, CVE-2025-38574, CVE-2025-38576,
CVE-2025-38577, CVE-2025-38578, CVE-2025-38579, CVE-2025-38581,
CVE-2025-38582, CVE-2025-38583, CVE-2025-38584, CVE-2025-38585,
CVE-2025-38587, CVE-2025-38588, CVE-2025-38590, CVE-2025-38593,
CVE-2025-38595, CVE-2025-38601, CVE-2025-38602, CVE-2025-38604,
CVE-2025-38608, CVE-2025-38609, CVE-2025-38610, CVE-2025-38612,
CVE-2025-38614, CVE-2025-38615, CVE-2025-38619, CVE-2025-38622,
CVE-2025-38623, CVE-2025-38624, CVE-2025-38625, CVE-2025-38626,
CVE-2025-38630, CVE-2025-38632, CVE-2025-38634, CVE-2025-38635,
CVE-2025-38639, CVE-2025-38640, CVE-2025-38644, CVE-2025-38645,
CVE-2025-38646, CVE-2025-38648, CVE-2025-38650, CVE-2025-38652,
CVE-2025-38653, CVE-2025-38659, CVE-2025-38660, CVE-2025-38663,
CVE-2025-38664, CVE-2025-38665, CVE-2025-38668, CVE-2025-38670,
CVE-2025-38671, CVE-2025-38675, CVE-2025-38676, CVE-2025-38677,
CVE-2025-38679, CVE-2025-38680, CVE-2025-38681, CVE-2025-38683,
CVE-2025-38684, CVE-2025-38685, CVE-2025-38686, CVE-2025-38687,
CVE-2025-38688, CVE-2025-38691, CVE-2025-38692, CVE-2025-38693,
CVE-2025-38694, CVE-2025-38695, CVE-2025-38696, CVE-2025-38697,
CVE-2025-38698, CVE-2025-38699, CVE-2025-38700, CVE-2025-38701,
CVE-2025-38702, CVE-2025-38703, CVE-2025-38704, CVE-2025-38705,
CVE-2025-38706, CVE-2025-38707, CVE-2025-38708, CVE-2025-38710,
CVE-2025-38711, CVE-2025-38712, CVE-2025-38713, CVE-2025-38714,
CVE-2025-38715, CVE-2025-38716, CVE-2025-38718, CVE-2025-38721,
CVE-2025-38722, CVE-2025-38724, CVE-2025-38725, CVE-2025-38728,
CVE-2025-38729, CVE-2025-38730, CVE-2025-38732, CVE-2025-38734,
CVE-2025-38735, CVE-2025-39673, CVE-2025-39675, CVE-2025-39676,
CVE-2025-39679, CVE-2025-39681, CVE-2025-39683, CVE-2025-39684,
CVE-2025-39685, CVE-2025-39686, CVE-2025-39687, CVE-2025-39689,
CVE-2025-39691, CVE-2025-39692, CVE-2025-39693, CVE-2025-39694,
CVE-2025-39701, CVE-2025-39702, CVE-2025-39703, CVE-2025-39705,
CVE-2025-39706, CVE-2025-39707, CVE-2025-39709, CVE-2025-39710,
CVE-2025-39711, CVE-2025-39712, CVE-2025-39713, CVE-2025-39714,
CVE-2025-39715, CVE-2025-39716, CVE-2025-39718, CVE-2025-39719,
CVE-2025-39720, CVE-2025-39721, CVE-2025-39724, CVE-2025-39726,
CVE-2025-39730, CVE-2025-39731, CVE-2025-39732, CVE-2025-39734,
CVE-2025-39736, CVE-2025-39737, CVE-2025-39738, CVE-2025-39739,
CVE-2025-39742, CVE-2025-39743, CVE-2025-39744, CVE-2025-39746,
CVE-2025-39747, CVE-2025-39748, CVE-2025-39749, CVE-2025-39750,
CVE-2025-39752, CVE-2025-39753, CVE-2025-39756, CVE-2025-39757,
CVE-2025-39758, CVE-2025-39759, CVE-2025-39760, CVE-2025-39761,
CVE-2025-39763, CVE-2025-39766, CVE-2025-39770, CVE-2025-39772,
CVE-2025-39773, CVE-2025-39776, CVE-2025-39779, CVE-2025-39781,
CVE-2025-39782, CVE-2025-39783, CVE-2025-39787, CVE-2025-39788,
CVE-2025-39790, CVE-2025-39794, CVE-2025-39795, CVE-2025-39797,
CVE-2025-39798, CVE-2025-39800, CVE-2025-39801, CVE-2025-39889,
CVE-2025-39890, CVE-2025-39946, CVE-2025-39989, CVE-2025-40215,
CVE-2025-40297, CVE-2025-68750)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
linux-image-6.8.0-1044-ibm 6.8.0-1044.44
linux-image-ibm 6.8.0-1044.44
linux-image-ibm-6.8 6.8.0-1044.44
linux-image-ibm-classic 6.8.0-1044.44
linux-image-ibm-lts-24.04 6.8.0-1044.44
Ubuntu 22.04 LTS
linux-image-6.8.0-1044-ibm 6.8.0-1044.44~22.04.1
linux-image-ibm-6.8 6.8.0-1044.44~22.04.1
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-8028-8
https://ubuntu.com/security/notices/USN-8028-7
https://ubuntu.com/security/notices/USN-8028-6
https://ubuntu.com/security/notices/USN-8028-5
https://ubuntu.com/security/notices/USN-8028-4
https://ubuntu.com/security/notices/USN-8028-3
https://ubuntu.com/security/notices/USN-8028-2
https://ubuntu.com/security/notices/USN-8028-1
CVE-2024-36331, CVE-2024-36350, CVE-2024-36357, CVE-2025-21884,
CVE-2025-21931, CVE-2025-22026, CVE-2025-22101, CVE-2025-22102,
CVE-2025-22115, CVE-2025-22120, CVE-2025-22126, CVE-2025-22128,
CVE-2025-23140, CVE-2025-23141, CVE-2025-23142, CVE-2025-23144,
CVE-2025-23145, CVE-2025-23146, CVE-2025-23147, CVE-2025-23148,
CVE-2025-23149, CVE-2025-23150, CVE-2025-23151, CVE-2025-23155,
CVE-2025-23156, CVE-2025-23157, CVE-2025-23158, CVE-2025-23159,
CVE-2025-23160, CVE-2025-23161, CVE-2025-23163, CVE-2025-37738,
CVE-2025-37739, CVE-2025-37740, CVE-2025-37741, CVE-2025-37742,
CVE-2025-37744, CVE-2025-37745, CVE-2025-37748, CVE-2025-37749,
CVE-2025-37754, CVE-2025-37755, CVE-2025-37757, CVE-2025-37758,
CVE-2025-37759, CVE-2025-37761, CVE-2025-37763, CVE-2025-37764,
CVE-2025-37765, CVE-2025-37766, CVE-2025-37767, CVE-2025-37768,
CVE-2025-37769, CVE-2025-37770, CVE-2025-37771, CVE-2025-37772,
CVE-2025-37773, CVE-2025-37775, CVE-2025-37777, CVE-2025-37778,
CVE-2025-37780, CVE-2025-37781, CVE-2025-37784, CVE-2025-37786,
CVE-2025-37787, CVE-2025-37788, CVE-2025-37789, CVE-2025-37790,
CVE-2025-37792, CVE-2025-37793, CVE-2025-37794, CVE-2025-37796,
CVE-2025-37799, CVE-2025-37800, CVE-2025-37801, CVE-2025-37803,
CVE-2025-37805, CVE-2025-37808, CVE-2025-37809, CVE-2025-37810,
CVE-2025-37811, CVE-2025-37812, CVE-2025-37813, CVE-2025-37815,
CVE-2025-37816, CVE-2025-37817, CVE-2025-37819, CVE-2025-37820,
CVE-2025-37822, CVE-2025-37823, CVE-2025-37824, CVE-2025-37826,
CVE-2025-37827, CVE-2025-37828, CVE-2025-37829, CVE-2025-37830,
CVE-2025-37831, CVE-2025-37836, CVE-2025-37839, CVE-2025-37840,
CVE-2025-37841, CVE-2025-37842, CVE-2025-37844, CVE-2025-37846,
CVE-2025-37849, CVE-2025-37850, CVE-2025-37851, CVE-2025-37852,
CVE-2025-37853, CVE-2025-37854, CVE-2025-37856, CVE-2025-37857,
CVE-2025-37858, CVE-2025-37859, CVE-2025-37861, CVE-2025-37862,
CVE-2025-37863, CVE-2025-37864, CVE-2025-37865, CVE-2025-37867,
CVE-2025-37869, CVE-2025-37871, CVE-2025-37872, CVE-2025-37873,
CVE-2025-37874, CVE-2025-37875, CVE-2025-37878, CVE-2025-37879,
CVE-2025-37881, CVE-2025-37883, CVE-2025-37884, CVE-2025-37885,
CVE-2025-37886, CVE-2025-37887, CVE-2025-37891, CVE-2025-37892,
CVE-2025-37897, CVE-2025-37900, CVE-2025-37901, CVE-2025-37903,
CVE-2025-37905, CVE-2025-37909, CVE-2025-37911, CVE-2025-37912,
CVE-2025-37913, CVE-2025-37914, CVE-2025-37915, CVE-2025-37916,
CVE-2025-37917, CVE-2025-37918, CVE-2025-37920, CVE-2025-37921,
CVE-2025-37922, CVE-2025-37923, CVE-2025-37924, CVE-2025-37925,
CVE-2025-37927, CVE-2025-37928, CVE-2025-37930, CVE-2025-37931,
CVE-2025-37933, CVE-2025-37935, CVE-2025-37936, CVE-2025-37938,
CVE-2025-37940, CVE-2025-37943, CVE-2025-37944, CVE-2025-37945,
CVE-2025-37947, CVE-2025-37948, CVE-2025-37949, CVE-2025-37951,
CVE-2025-37952, CVE-2025-37954, CVE-2025-37956, CVE-2025-37957,
CVE-2025-37959, CVE-2025-37960, CVE-2025-37961, CVE-2025-37962,
CVE-2025-37963, CVE-2025-37967, CVE-2025-37968, CVE-2025-37969,
CVE-2025-37970, CVE-2025-37972, CVE-2025-37973, CVE-2025-37975,
CVE-2025-37977, CVE-2025-37978, CVE-2025-37979, CVE-2025-37980,
CVE-2025-37982, CVE-2025-37983, CVE-2025-37984, CVE-2025-37985,
CVE-2025-37986, CVE-2025-37987, CVE-2025-37988, CVE-2025-37989,
CVE-2025-37990, CVE-2025-37991, CVE-2025-37992, CVE-2025-37994,
CVE-2025-37995, CVE-2025-37998, CVE-2025-38003, CVE-2025-38004,
CVE-2025-38005, CVE-2025-38006, CVE-2025-38007, CVE-2025-38008,
CVE-2025-38009, CVE-2025-38010, CVE-2025-38011, CVE-2025-38013,
CVE-2025-38014, CVE-2025-38015, CVE-2025-38018, CVE-2025-38019,
CVE-2025-38020, CVE-2025-38023, CVE-2025-38024, CVE-2025-38027,
CVE-2025-38031, CVE-2025-38034, CVE-2025-38035, CVE-2025-38037,
CVE-2025-38039, CVE-2025-38040, CVE-2025-38043, CVE-2025-38044,
CVE-2025-38045, CVE-2025-38048, CVE-2025-38051, CVE-2025-38052,
CVE-2025-38053, CVE-2025-38055, CVE-2025-38057, CVE-2025-38058,
CVE-2025-38059, CVE-2025-38060, CVE-2025-38061, CVE-2025-38062,
CVE-2025-38063, CVE-2025-38065, CVE-2025-38066, CVE-2025-38067,
CVE-2025-38068, CVE-2025-38071, CVE-2025-38072, CVE-2025-38074,
CVE-2025-38075, CVE-2025-38077, CVE-2025-38078, CVE-2025-38079,
CVE-2025-38080, CVE-2025-38081, CVE-2025-38084, CVE-2025-38085,
CVE-2025-38086, CVE-2025-38087, CVE-2025-38088, CVE-2025-38089,
CVE-2025-38090, CVE-2025-38094, CVE-2025-38095, CVE-2025-38097,
CVE-2025-38098, CVE-2025-38099, CVE-2025-38100, CVE-2025-38101,
CVE-2025-38102, CVE-2025-38103, CVE-2025-38104, CVE-2025-38107,
CVE-2025-38108, CVE-2025-38109, CVE-2025-38110, CVE-2025-38111,
CVE-2025-38112, CVE-2025-38113, CVE-2025-38115, CVE-2025-38117,
CVE-2025-38119, CVE-2025-38120, CVE-2025-38122, CVE-2025-38123,
CVE-2025-38124, CVE-2025-38125, CVE-2025-38126, CVE-2025-38127,
CVE-2025-38129, CVE-2025-38131, CVE-2025-38135, CVE-2025-38136,
CVE-2025-38138, CVE-2025-38142, CVE-2025-38143, CVE-2025-38145,
CVE-2025-38146, CVE-2025-38147, CVE-2025-38148, CVE-2025-38149,
CVE-2025-38153, CVE-2025-38154, CVE-2025-38155, CVE-2025-38156,
CVE-2025-38157, CVE-2025-38158, CVE-2025-38159, CVE-2025-38160,
CVE-2025-38161, CVE-2025-38162, CVE-2025-38163, CVE-2025-38164,
CVE-2025-38165, CVE-2025-38166, CVE-2025-38167, CVE-2025-38169,
CVE-2025-38170, CVE-2025-38173, CVE-2025-38174, CVE-2025-38180,
CVE-2025-38181, CVE-2025-38182, CVE-2025-38183, CVE-2025-38184,
CVE-2025-38185, CVE-2025-38190, CVE-2025-38191, CVE-2025-38192,
CVE-2025-38193, CVE-2025-38194, CVE-2025-38197, CVE-2025-38198,
CVE-2025-38200, CVE-2025-38202, CVE-2025-38208, CVE-2025-38210,
CVE-2025-38211, CVE-2025-38212, CVE-2025-38214, CVE-2025-38215,
CVE-2025-38217, CVE-2025-38218, CVE-2025-38219, CVE-2025-38220,
CVE-2025-38222, CVE-2025-38225, CVE-2025-38226, CVE-2025-38229,
CVE-2025-38230, CVE-2025-38231, CVE-2025-38232, CVE-2025-38236,
CVE-2025-38239, CVE-2025-38244, CVE-2025-38245, CVE-2025-38246,
CVE-2025-38248, CVE-2025-38249, CVE-2025-38250, CVE-2025-38251,
CVE-2025-38253, CVE-2025-38255, CVE-2025-38257, CVE-2025-38258,
CVE-2025-38259, CVE-2025-38260, CVE-2025-38262, CVE-2025-38263,
CVE-2025-38264, CVE-2025-38265, CVE-2025-38269, CVE-2025-38274,
CVE-2025-38275, CVE-2025-38277, CVE-2025-38278, CVE-2025-38279,
CVE-2025-38280, CVE-2025-38282, CVE-2025-38283, CVE-2025-38285,
CVE-2025-38286, CVE-2025-38289, CVE-2025-38290, CVE-2025-38292,
CVE-2025-38293, CVE-2025-38295, CVE-2025-38298, CVE-2025-38299,
CVE-2025-38300, CVE-2025-38303, CVE-2025-38304, CVE-2025-38305,
CVE-2025-38307, CVE-2025-38310, CVE-2025-38312, CVE-2025-38313,
CVE-2025-38319, CVE-2025-38320, CVE-2025-38321, CVE-2025-38322,
CVE-2025-38323, CVE-2025-38324, CVE-2025-38326, CVE-2025-38328,
CVE-2025-38331, CVE-2025-38332, CVE-2025-38333, CVE-2025-38334,
CVE-2025-38335, CVE-2025-38336, CVE-2025-38337, CVE-2025-38338,
CVE-2025-38342, CVE-2025-38343, CVE-2025-38344, CVE-2025-38345,
CVE-2025-38346, CVE-2025-38347, CVE-2025-38348, CVE-2025-38349,
CVE-2025-38351, CVE-2025-38354, CVE-2025-38361, CVE-2025-38362,
CVE-2025-38363, CVE-2025-38364, CVE-2025-38365, CVE-2025-38368,
CVE-2025-38369, CVE-2025-38371, CVE-2025-38373, CVE-2025-38374,
CVE-2025-38375, CVE-2025-38376, CVE-2025-38377, CVE-2025-38382,
CVE-2025-38384, CVE-2025-38385, CVE-2025-38386, CVE-2025-38387,
CVE-2025-38388, CVE-2025-38389, CVE-2025-38390, CVE-2025-38391,
CVE-2025-38392, CVE-2025-38393, CVE-2025-38395, CVE-2025-38396,
CVE-2025-38399, CVE-2025-38400, CVE-2025-38401, CVE-2025-38402,
CVE-2025-38403, CVE-2025-38405, CVE-2025-38406, CVE-2025-38407,
CVE-2025-38408, CVE-2025-38409, CVE-2025-38410, CVE-2025-38412,
CVE-2025-38414, CVE-2025-38415, CVE-2025-38416, CVE-2025-38418,
CVE-2025-38419, CVE-2025-38420, CVE-2025-38422, CVE-2025-38424,
CVE-2025-38425, CVE-2025-38427, CVE-2025-38428, CVE-2025-38429,
CVE-2025-38430, CVE-2025-38436, CVE-2025-38437, CVE-2025-38439,
CVE-2025-38441, CVE-2025-38443, CVE-2025-38444, CVE-2025-38445,
CVE-2025-38448, CVE-2025-38449, CVE-2025-38455, CVE-2025-38456,
CVE-2025-38457, CVE-2025-38458, CVE-2025-38459, CVE-2025-38460,
CVE-2025-38461, CVE-2025-38462, CVE-2025-38463, CVE-2025-38464,
CVE-2025-38465, CVE-2025-38466, CVE-2025-38467, CVE-2025-38468,
CVE-2025-38469, CVE-2025-38470, CVE-2025-38471, CVE-2025-38472,
CVE-2025-38473, CVE-2025-38474, CVE-2025-38476, CVE-2025-38478,
CVE-2025-38480, CVE-2025-38481, CVE-2025-38482, CVE-2025-38483,
CVE-2025-38485, CVE-2025-38487, CVE-2025-38488, CVE-2025-38489,
CVE-2025-38490, CVE-2025-38491, CVE-2025-38493, CVE-2025-38494,
CVE-2025-38495, CVE-2025-38496, CVE-2025-38497, CVE-2025-38499,
CVE-2025-38501, CVE-2025-38503, CVE-2025-38506, CVE-2025-38507,
CVE-2025-38510, CVE-2025-38511, CVE-2025-38512, CVE-2025-38513,
CVE-2025-38514, CVE-2025-38515, CVE-2025-38516, CVE-2025-38520,
CVE-2025-38521, CVE-2025-38524, CVE-2025-38526, CVE-2025-38527,
CVE-2025-38528, CVE-2025-38529, CVE-2025-38530, CVE-2025-38531,
CVE-2025-38532, CVE-2025-38533, CVE-2025-38535, CVE-2025-38537,
CVE-2025-38538, CVE-2025-38539, CVE-2025-38540, CVE-2025-38542,
CVE-2025-38543, CVE-2025-38544, CVE-2025-38546, CVE-2025-38548,
CVE-2025-38549, CVE-2025-38550, CVE-2025-38551, CVE-2025-38552,
CVE-2025-38553, CVE-2025-38555, CVE-2025-38560, CVE-2025-38562,
CVE-2025-38566, CVE-2025-38568, CVE-2025-38569, CVE-2025-38571,
CVE-2025-38572, CVE-2025-38574, CVE-2025-38576, CVE-2025-38577,
CVE-2025-38578, CVE-2025-38579, CVE-2025-38581, CVE-2025-38582,
CVE-2025-38583, CVE-2025-38584, CVE-2025-38585, CVE-2025-38587,
CVE-2025-38588, CVE-2025-38590, CVE-2025-38593, CVE-2025-38595,
CVE-2025-38601, CVE-2025-38602, CVE-2025-38604, CVE-2025-38608,
CVE-2025-38609, CVE-2025-38610, CVE-2025-38612, CVE-2025-38614,
CVE-2025-38615, CVE-2025-38619, CVE-2025-38622, CVE-2025-38623,
CVE-2025-38624, CVE-2025-38625, CVE-2025-38626, CVE-2025-38630,
CVE-2025-38632, CVE-2025-38634, CVE-2025-38635, CVE-2025-38639,
CVE-2025-38640, CVE-2025-38644, CVE-2025-38645, CVE-2025-38646,
CVE-2025-38648, CVE-2025-38650, CVE-2025-38652, CVE-2025-38653,
CVE-2025-38659, CVE-2025-38660, CVE-2025-38663, CVE-2025-38664,
CVE-2025-38665, CVE-2025-38668, CVE-2025-38670, CVE-2025-38671,
CVE-2025-38675, CVE-2025-38676, CVE-2025-38677, CVE-2025-38679,
CVE-2025-38680, CVE-2025-38681, CVE-2025-38683, CVE-2025-38684,
CVE-2025-38685, CVE-2025-38686, CVE-2025-38687, CVE-2025-38688,
CVE-2025-38691, CVE-2025-38692, CVE-2025-38693, CVE-2025-38694,
CVE-2025-38695, CVE-2025-38696, CVE-2025-38697, CVE-2025-38698,
CVE-2025-38699, CVE-2025-38700, CVE-2025-38701, CVE-2025-38702,
CVE-2025-38703, CVE-2025-38704, CVE-2025-38705, CVE-2025-38706,
CVE-2025-38707, CVE-2025-38708, CVE-2025-38710, CVE-2025-38711,
CVE-2025-38712, CVE-2025-38713, CVE-2025-38714, CVE-2025-38715,
CVE-2025-38716, CVE-2025-38718, CVE-2025-38721, CVE-2025-38722,
CVE-2025-38724, CVE-2025-38725, CVE-2025-38728, CVE-2025-38729,
CVE-2025-38730, CVE-2025-38732, CVE-2025-38734, CVE-2025-38735,
CVE-2025-39673, CVE-2025-39675, CVE-2025-39676, CVE-2025-39679,
CVE-2025-39681, CVE-2025-39683, CVE-2025-39684, CVE-2025-39685,
CVE-2025-39686, CVE-2025-39687, CVE-2025-39689, CVE-2025-39691,
CVE-2025-39692, CVE-2025-39693, CVE-2025-39694, CVE-2025-39701,
CVE-2025-39702, CVE-2025-39703, CVE-2025-39705, CVE-2025-39706,
CVE-2025-39707, CVE-2025-39709, CVE-2025-39710, CVE-2025-39711,
CVE-2025-39712, CVE-2025-39713, CVE-2025-39714, CVE-2025-39715,
CVE-2025-39716, CVE-2025-39718, CVE-2025-39719, CVE-2025-39720,
CVE-2025-39721, CVE-2025-39724, CVE-2025-39726, CVE-2025-39730,
CVE-2025-39731, CVE-2025-39732, CVE-2025-39734, CVE-2025-39736,
CVE-2025-39737, CVE-2025-39738, CVE-2025-39739, CVE-2025-39742,
CVE-2025-39743, CVE-2025-39744, CVE-2025-39746, CVE-2025-39747,
CVE-2025-39748, CVE-2025-39749, CVE-2025-39750, CVE-2025-39752,
CVE-2025-39753, CVE-2025-39756, CVE-2025-39757, CVE-2025-39758,
CVE-2025-39759, CVE-2025-39760, CVE-2025-39761, CVE-2025-39763,
CVE-2025-39766, CVE-2025-39770, CVE-2025-39772, CVE-2025-39773,
CVE-2025-39776, CVE-2025-39779, CVE-2025-39781, CVE-2025-39782,
CVE-2025-39783, CVE-2025-39787, CVE-2025-39788, CVE-2025-39790,
CVE-2025-39794, CVE-2025-39795, CVE-2025-39797, CVE-2025-39798,
CVE-2025-39800, CVE-2025-39801, CVE-2025-39889, CVE-2025-39890,
CVE-2025-39946, CVE-2025-39989, CVE-2025-40215, CVE-2025-40297,
CVE-2025-68750
Package Information:
https://launchpad.net/ubuntu/+source/linux-ibm/6.8.0-1044.44
https://launchpad.net/ubuntu/+source/linux-ibm-6.8/6.8.0-1044.44~22.04.1
Ubuntu Security Notice USN-8028-8
February 24, 2026
linux-ibm, linux-ibm-6.8 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-ibm: Linux kernel for IBM cloud systems
- linux-ibm-6.8: Linux kernel for IBM cloud systems
Details:
It was discovered that improper initialization of CPU cache memory could
allow a local attacker with hypervisor access to overwrite SEV-SNP guest
memory resulting in loss of data integrity. (CVE-2024-36331)
Oleksii Oleksenko, Cedric Fournet, Jana Hofmann, Boris Köpf, Stavros Volos,
and Flavien Solt discovered that some AMD processors may allow an attacker
to infer data from previous stores, potentially resulting in the leakage of
privileged information. A local attacker could possibly use this to expose
sensitive information. (CVE-2024-36350, CVE-2024-36357)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM32 architecture;
- ARM64 architecture;
- MIPS architecture;
- PA-RISC architecture;
- PowerPC architecture;
- RISC-V architecture;
- S390 architecture;
- x86 architecture;
- Block layer subsystem;
- Cryptographic API;
- Compute Acceleration Framework;
- ACPI drivers;
- Serial ATA and Parallel ATA drivers;
- ATM drivers;
- Drivers core;
- ATA over ethernet (AOE) driver;
- DRBD Distributed Replicated Block Device drivers;
- Network block device driver;
- Ublk userspace block driver;
- Bluetooth drivers;
- Bus devices;
- Character device driver;
- TPM device driver;
- Clock framework and drivers;
- Data acquisition framework and drivers;
- CPU frequency scaling framework;
- Hardware crypto device drivers;
- Device frequency scaling framework;
- Buffer Sharing and Synchronization framework;
- DMA engine subsystem;
- EDAC drivers;
- Arm Firmware Framework for ARMv8-A(FFA);
- ARM SCMI message protocol;
- FPGA Framework;
- GPU drivers;
- HID subsystem;
- Hardware monitoring drivers;
- HW tracing;
- I2C subsystem;
- I3C subsystem;
- IIO subsystem;
- InfiniBand drivers;
- Input Device core drivers;
- Input Device (Miscellaneous) drivers;
- IOMMU subsystem;
- IRQ chip drivers;
- MCB driver;
- Multiple devices driver;
- Media drivers;
- Multifunction device drivers;
- Microchip PCI driver;
- Intel Management Engine Interface driver;
- PCI Endpoint Test driver;
- TI TPS6594 PFSM driver;
- VMware VMCI Driver;
- MMC subsystem;
- MTD block device drivers;
- Network drivers;
- Mellanox network drivers;
- STMicroelectronics network drivers;
- NVDIMM (Non-Volatile Memory Device) drivers;
- NVME drivers;
- PCI subsystem;
- Amlogic Meson DDR PMU;
- PHY drivers;
- Pin controllers subsystem;
- x86 platform drivers;
- Power supply drivers;
- Powercap sysfs driver;
- PTP clock framework;
- PWM drivers;
- RapidIO drivers;
- Voltage and Current Regulator drivers;
- Remote Processor subsystem;
- S/390 drivers;
- SCSI subsystem;
- ASPEED SoC drivers;
- QCOM SoC drivers;
- Samsung SoC drivers;
- SPI subsystem;
- small TFT LCD display modules;
- Media staging drivers;
- TCM subsystem;
- Trusted Execution Environment drivers;
- Thunderbolt and USB4 drivers;
- TTY drivers;
- UFS subsystem;
- Cadence USB3 driver;
- ChipIdea USB driver;
- USB Device Class drivers;
- USB core drivers;
- DesignWare USB3 driver;
- USB Gadget drivers;
- USB Host Controller drivers;
- Renesas USBHS Controller drivers;
- USB Type-C support driver;
- USB Type-C Connector System Software Interface driver;
- VFIO drivers;
- Virtio Host (VHOST) subsystem;
- Backlight driver;
- Framebuffer layer;
- TSM Common Guest driver;
- Virtio drivers;
- Xen hypervisor drivers;
- File systems infrastructure;
- BTRFS file system;
- Ceph distributed file system;
- EFI Variable file system;
- Ext4 file system;
- F2FS file system;
- GFS2 file system;
- JFFS2 file system;
- JFS file system;
- Network file system (NFS) client;
- Network file system (NFS) server daemon;
- NILFS2 file system;
- NTFS3 file system;
- Overlay file system;
- Proc file system;
- SMB network file system;
- DRM display driver;
- Asynchronous Transfer Mode (ATM) subsystem;
- BPF subsystem;
- Memory Management;
- Internal shared memory driver;
- LZO compression library;
- Mellanox drivers;
- padata parallel execution mechanism;
- Networking subsytem;
- Bluetooth subsystem;
- Netfilter;
- Network traffic control;
- SCTP protocol;
- Network sockets;
- UDP network protocol;
- eXpress Data Path;
- XFRM subsystem;
- Digital Audio (PCM) driver;
- Universal MIDI packet (UMP) support module;
- Tracing infrastructure;
- User-space API (UAPI);
- io_uring subsystem;
- IPC subsystem;
- Perf events;
- Kernel exit() syscall;
- IRQ subsystem;
- Padata parallel execution mechanism;
- Kernel command line parsing driver;
- Hibernation control;
- RCU subsystem;
- Restartable seuqences system call mechanism;
- Maple Tree data structure library;
- Memory management;
- KASAN memory debugging framework;
- 802.1Q VLAN protocol;
- 9P file system network protocol;
- Appletalk network protocol;
- Ethernet bridge;
- CAN network layer;
- Networking core;
- Distributed Switch Architecture;
- HSR network protocol;
- IPv4 networking;
- IPv6 networking;
- MAC80211 subsystem;
- Management Component Transport Protocol (MCTP);
- MultiProtocol Label Switching driver;
- Multipath TCP;
- NetLabel subsystem;
- Netlink;
- NFC subsystem;
- Open vSwitch;
- RDS protocol;
- Rose network layer;
- RxRPC session sockets;
- SMC sockets;
- Sun RPC protocol;
- TIPC protocol;
- TLS protocol;
- Unix domain sockets;
- VMware vSockets driver;
- Wireless networking;
- ALSA framework;
- WCD audio codecs;
- Intel ASoC drivers;
- MediaTek ASoC drivers;
- QCOM ASoC drivers;
- SoC audio core drivers;
- USB sound devices;
- Virtio sound driver;
- CPU Power monitoring subsystem;
- KVM subsystem;
(CVE-2025-21884, CVE-2025-21931, CVE-2025-22026, CVE-2025-22101,
CVE-2025-22102, CVE-2025-22115, CVE-2025-22120, CVE-2025-22126,
CVE-2025-22128, CVE-2025-23140, CVE-2025-23141, CVE-2025-23142,
CVE-2025-23144, CVE-2025-23145, CVE-2025-23146, CVE-2025-23147,
CVE-2025-23148, CVE-2025-23149, CVE-2025-23150, CVE-2025-23151,
CVE-2025-23155, CVE-2025-23156, CVE-2025-23157, CVE-2025-23158,
CVE-2025-23159, CVE-2025-23160, CVE-2025-23161, CVE-2025-23163,
CVE-2025-37738, CVE-2025-37739, CVE-2025-37740, CVE-2025-37741,
CVE-2025-37742, CVE-2025-37744, CVE-2025-37745, CVE-2025-37748,
CVE-2025-37749, CVE-2025-37754, CVE-2025-37755, CVE-2025-37757,
CVE-2025-37758, CVE-2025-37759, CVE-2025-37761, CVE-2025-37763,
CVE-2025-37764, CVE-2025-37765, CVE-2025-37766, CVE-2025-37767,
CVE-2025-37768, CVE-2025-37769, CVE-2025-37770, CVE-2025-37771,
CVE-2025-37772, CVE-2025-37773, CVE-2025-37775, CVE-2025-37777,
CVE-2025-37778, CVE-2025-37780, CVE-2025-37781, CVE-2025-37784,
CVE-2025-37786, CVE-2025-37787, CVE-2025-37788, CVE-2025-37789,
CVE-2025-37790, CVE-2025-37792, CVE-2025-37793, CVE-2025-37794,
CVE-2025-37796, CVE-2025-37799, CVE-2025-37800, CVE-2025-37801,
CVE-2025-37803, CVE-2025-37805, CVE-2025-37808, CVE-2025-37809,
CVE-2025-37810, CVE-2025-37811, CVE-2025-37812, CVE-2025-37813,
CVE-2025-37815, CVE-2025-37816, CVE-2025-37817, CVE-2025-37819,
CVE-2025-37820, CVE-2025-37822, CVE-2025-37823, CVE-2025-37824,
CVE-2025-37826, CVE-2025-37827, CVE-2025-37828, CVE-2025-37829,
CVE-2025-37830, CVE-2025-37831, CVE-2025-37836, CVE-2025-37839,
CVE-2025-37840, CVE-2025-37841, CVE-2025-37842, CVE-2025-37844,
CVE-2025-37846, CVE-2025-37849, CVE-2025-37850, CVE-2025-37851,
CVE-2025-37852, CVE-2025-37853, CVE-2025-37854, CVE-2025-37856,
CVE-2025-37857, CVE-2025-37858, CVE-2025-37859, CVE-2025-37861,
CVE-2025-37862, CVE-2025-37863, CVE-2025-37864, CVE-2025-37865,
CVE-2025-37867, CVE-2025-37869, CVE-2025-37871, CVE-2025-37872,
CVE-2025-37873, CVE-2025-37874, CVE-2025-37875, CVE-2025-37878,
CVE-2025-37879, CVE-2025-37881, CVE-2025-37883, CVE-2025-37884,
CVE-2025-37885, CVE-2025-37886, CVE-2025-37887, CVE-2025-37891,
CVE-2025-37892, CVE-2025-37897, CVE-2025-37900, CVE-2025-37901,
CVE-2025-37903, CVE-2025-37905, CVE-2025-37909, CVE-2025-37911,
CVE-2025-37912, CVE-2025-37913, CVE-2025-37914, CVE-2025-37915,
CVE-2025-37916, CVE-2025-37917, CVE-2025-37918, CVE-2025-37920,
CVE-2025-37921, CVE-2025-37922, CVE-2025-37923, CVE-2025-37924,
CVE-2025-37925, CVE-2025-37927, CVE-2025-37928, CVE-2025-37930,
CVE-2025-37931, CVE-2025-37933, CVE-2025-37935, CVE-2025-37936,
CVE-2025-37938, CVE-2025-37940, CVE-2025-37943, CVE-2025-37944,
CVE-2025-37945, CVE-2025-37947, CVE-2025-37948, CVE-2025-37949,
CVE-2025-37951, CVE-2025-37952, CVE-2025-37954, CVE-2025-37956,
CVE-2025-37957, CVE-2025-37959, CVE-2025-37960, CVE-2025-37961,
CVE-2025-37962, CVE-2025-37963, CVE-2025-37967, CVE-2025-37968,
CVE-2025-37969, CVE-2025-37970, CVE-2025-37972, CVE-2025-37973,
CVE-2025-37975, CVE-2025-37977, CVE-2025-37978, CVE-2025-37979,
CVE-2025-37980, CVE-2025-37982, CVE-2025-37983, CVE-2025-37984,
CVE-2025-37985, CVE-2025-37986, CVE-2025-37987, CVE-2025-37988,
CVE-2025-37989, CVE-2025-37990, CVE-2025-37991, CVE-2025-37992,
CVE-2025-37994, CVE-2025-37995, CVE-2025-37998, CVE-2025-38003,
CVE-2025-38004, CVE-2025-38005, CVE-2025-38006, CVE-2025-38007,
CVE-2025-38008, CVE-2025-38009, CVE-2025-38010, CVE-2025-38011,
CVE-2025-38013, CVE-2025-38014, CVE-2025-38015, CVE-2025-38018,
CVE-2025-38019, CVE-2025-38020, CVE-2025-38023, CVE-2025-38024,
CVE-2025-38027, CVE-2025-38031, CVE-2025-38034, CVE-2025-38035,
CVE-2025-38037, CVE-2025-38039, CVE-2025-38040, CVE-2025-38043,
CVE-2025-38044, CVE-2025-38045, CVE-2025-38048, CVE-2025-38051,
CVE-2025-38052, CVE-2025-38053, CVE-2025-38055, CVE-2025-38057,
CVE-2025-38058, CVE-2025-38059, CVE-2025-38060, CVE-2025-38061,
CVE-2025-38062, CVE-2025-38063, CVE-2025-38065, CVE-2025-38066,
CVE-2025-38067, CVE-2025-38068, CVE-2025-38071, CVE-2025-38072,
CVE-2025-38074, CVE-2025-38075, CVE-2025-38077, CVE-2025-38078,
CVE-2025-38079, CVE-2025-38080, CVE-2025-38081, CVE-2025-38084,
CVE-2025-38085, CVE-2025-38086, CVE-2025-38087, CVE-2025-38088,
CVE-2025-38089, CVE-2025-38090, CVE-2025-38094, CVE-2025-38095,
CVE-2025-38097, CVE-2025-38098, CVE-2025-38099, CVE-2025-38100,
CVE-2025-38101, CVE-2025-38102, CVE-2025-38103, CVE-2025-38104,
CVE-2025-38107, CVE-2025-38108, CVE-2025-38109, CVE-2025-38110,
CVE-2025-38111, CVE-2025-38112, CVE-2025-38113, CVE-2025-38115,
CVE-2025-38117, CVE-2025-38119, CVE-2025-38120, CVE-2025-38122,
CVE-2025-38123, CVE-2025-38124, CVE-2025-38125, CVE-2025-38126,
CVE-2025-38127, CVE-2025-38129, CVE-2025-38131, CVE-2025-38135,
CVE-2025-38136, CVE-2025-38138, CVE-2025-38142, CVE-2025-38143,
CVE-2025-38145, CVE-2025-38146, CVE-2025-38147, CVE-2025-38148,
CVE-2025-38149, CVE-2025-38153, CVE-2025-38154, CVE-2025-38155,
CVE-2025-38156, CVE-2025-38157, CVE-2025-38158, CVE-2025-38159,
CVE-2025-38160, CVE-2025-38161, CVE-2025-38162, CVE-2025-38163,
CVE-2025-38164, CVE-2025-38165, CVE-2025-38166, CVE-2025-38167,
CVE-2025-38169, CVE-2025-38170, CVE-2025-38173, CVE-2025-38174,
CVE-2025-38180, CVE-2025-38181, CVE-2025-38182, CVE-2025-38183,
CVE-2025-38184, CVE-2025-38185, CVE-2025-38190, CVE-2025-38191,
CVE-2025-38192, CVE-2025-38193, CVE-2025-38194, CVE-2025-38197,
CVE-2025-38198, CVE-2025-38200, CVE-2025-38202, CVE-2025-38208,
CVE-2025-38210, CVE-2025-38211, CVE-2025-38212, CVE-2025-38214,
CVE-2025-38215, CVE-2025-38217, CVE-2025-38218, CVE-2025-38219,
CVE-2025-38220, CVE-2025-38222, CVE-2025-38225, CVE-2025-38226,
CVE-2025-38229, CVE-2025-38230, CVE-2025-38231, CVE-2025-38232,
CVE-2025-38236, CVE-2025-38239, CVE-2025-38244, CVE-2025-38245,
CVE-2025-38246, CVE-2025-38248, CVE-2025-38249, CVE-2025-38250,
CVE-2025-38251, CVE-2025-38253, CVE-2025-38255, CVE-2025-38257,
CVE-2025-38258, CVE-2025-38259, CVE-2025-38260, CVE-2025-38262,
CVE-2025-38263, CVE-2025-38264, CVE-2025-38265, CVE-2025-38269,
CVE-2025-38274, CVE-2025-38275, CVE-2025-38277, CVE-2025-38278,
CVE-2025-38279, CVE-2025-38280, CVE-2025-38282, CVE-2025-38283,
CVE-2025-38285, CVE-2025-38286, CVE-2025-38289, CVE-2025-38290,
CVE-2025-38292, CVE-2025-38293, CVE-2025-38295, CVE-2025-38298,
CVE-2025-38299, CVE-2025-38300, CVE-2025-38303, CVE-2025-38304,
CVE-2025-38305, CVE-2025-38307, CVE-2025-38310, CVE-2025-38312,
CVE-2025-38313, CVE-2025-38319, CVE-2025-38320, CVE-2025-38321,
CVE-2025-38322, CVE-2025-38323, CVE-2025-38324, CVE-2025-38326,
CVE-2025-38328, CVE-2025-38331, CVE-2025-38332, CVE-2025-38333,
CVE-2025-38334, CVE-2025-38335, CVE-2025-38336, CVE-2025-38337,
CVE-2025-38338, CVE-2025-38342, CVE-2025-38343, CVE-2025-38344,
CVE-2025-38345, CVE-2025-38346, CVE-2025-38347, CVE-2025-38348,
CVE-2025-38349, CVE-2025-38351, CVE-2025-38354, CVE-2025-38361,
CVE-2025-38362, CVE-2025-38363, CVE-2025-38364, CVE-2025-38365,
CVE-2025-38368, CVE-2025-38369, CVE-2025-38371, CVE-2025-38373,
CVE-2025-38374, CVE-2025-38375, CVE-2025-38376, CVE-2025-38377,
CVE-2025-38382, CVE-2025-38384, CVE-2025-38385, CVE-2025-38386,
CVE-2025-38387, CVE-2025-38388, CVE-2025-38389, CVE-2025-38390,
CVE-2025-38391, CVE-2025-38392, CVE-2025-38393, CVE-2025-38395,
CVE-2025-38396, CVE-2025-38399, CVE-2025-38400, CVE-2025-38401,
CVE-2025-38402, CVE-2025-38403, CVE-2025-38405, CVE-2025-38406,
CVE-2025-38407, CVE-2025-38408, CVE-2025-38409, CVE-2025-38410,
CVE-2025-38412, CVE-2025-38414, CVE-2025-38415, CVE-2025-38416,
CVE-2025-38418, CVE-2025-38419, CVE-2025-38420, CVE-2025-38422,
CVE-2025-38424, CVE-2025-38425, CVE-2025-38427, CVE-2025-38428,
CVE-2025-38429, CVE-2025-38430, CVE-2025-38436, CVE-2025-38437,
CVE-2025-38439, CVE-2025-38441, CVE-2025-38443, CVE-2025-38444,
CVE-2025-38445, CVE-2025-38448, CVE-2025-38449, CVE-2025-38455,
CVE-2025-38456, CVE-2025-38457, CVE-2025-38458, CVE-2025-38459,
CVE-2025-38460, CVE-2025-38461, CVE-2025-38462, CVE-2025-38463,
CVE-2025-38464, CVE-2025-38465, CVE-2025-38466, CVE-2025-38467,
CVE-2025-38468, CVE-2025-38469, CVE-2025-38470, CVE-2025-38471,
CVE-2025-38472, CVE-2025-38473, CVE-2025-38474, CVE-2025-38476,
CVE-2025-38478, CVE-2025-38480, CVE-2025-38481, CVE-2025-38482,
CVE-2025-38483, CVE-2025-38485, CVE-2025-38487, CVE-2025-38488,
CVE-2025-38489, CVE-2025-38490, CVE-2025-38491, CVE-2025-38493,
CVE-2025-38494, CVE-2025-38495, CVE-2025-38496, CVE-2025-38497,
CVE-2025-38499, CVE-2025-38501, CVE-2025-38503, CVE-2025-38506,
CVE-2025-38507, CVE-2025-38510, CVE-2025-38511, CVE-2025-38512,
CVE-2025-38513, CVE-2025-38514, CVE-2025-38515, CVE-2025-38516,
CVE-2025-38520, CVE-2025-38521, CVE-2025-38524, CVE-2025-38526,
CVE-2025-38527, CVE-2025-38528, CVE-2025-38529, CVE-2025-38530,
CVE-2025-38531, CVE-2025-38532, CVE-2025-38533, CVE-2025-38535,
CVE-2025-38537, CVE-2025-38538, CVE-2025-38539, CVE-2025-38540,
CVE-2025-38542, CVE-2025-38543, CVE-2025-38544, CVE-2025-38546,
CVE-2025-38548, CVE-2025-38549, CVE-2025-38550, CVE-2025-38551,
CVE-2025-38552, CVE-2025-38553, CVE-2025-38555, CVE-2025-38560,
CVE-2025-38562, CVE-2025-38566, CVE-2025-38568, CVE-2025-38569,
CVE-2025-38571, CVE-2025-38572, CVE-2025-38574, CVE-2025-38576,
CVE-2025-38577, CVE-2025-38578, CVE-2025-38579, CVE-2025-38581,
CVE-2025-38582, CVE-2025-38583, CVE-2025-38584, CVE-2025-38585,
CVE-2025-38587, CVE-2025-38588, CVE-2025-38590, CVE-2025-38593,
CVE-2025-38595, CVE-2025-38601, CVE-2025-38602, CVE-2025-38604,
CVE-2025-38608, CVE-2025-38609, CVE-2025-38610, CVE-2025-38612,
CVE-2025-38614, CVE-2025-38615, CVE-2025-38619, CVE-2025-38622,
CVE-2025-38623, CVE-2025-38624, CVE-2025-38625, CVE-2025-38626,
CVE-2025-38630, CVE-2025-38632, CVE-2025-38634, CVE-2025-38635,
CVE-2025-38639, CVE-2025-38640, CVE-2025-38644, CVE-2025-38645,
CVE-2025-38646, CVE-2025-38648, CVE-2025-38650, CVE-2025-38652,
CVE-2025-38653, CVE-2025-38659, CVE-2025-38660, CVE-2025-38663,
CVE-2025-38664, CVE-2025-38665, CVE-2025-38668, CVE-2025-38670,
CVE-2025-38671, CVE-2025-38675, CVE-2025-38676, CVE-2025-38677,
CVE-2025-38679, CVE-2025-38680, CVE-2025-38681, CVE-2025-38683,
CVE-2025-38684, CVE-2025-38685, CVE-2025-38686, CVE-2025-38687,
CVE-2025-38688, CVE-2025-38691, CVE-2025-38692, CVE-2025-38693,
CVE-2025-38694, CVE-2025-38695, CVE-2025-38696, CVE-2025-38697,
CVE-2025-38698, CVE-2025-38699, CVE-2025-38700, CVE-2025-38701,
CVE-2025-38702, CVE-2025-38703, CVE-2025-38704, CVE-2025-38705,
CVE-2025-38706, CVE-2025-38707, CVE-2025-38708, CVE-2025-38710,
CVE-2025-38711, CVE-2025-38712, CVE-2025-38713, CVE-2025-38714,
CVE-2025-38715, CVE-2025-38716, CVE-2025-38718, CVE-2025-38721,
CVE-2025-38722, CVE-2025-38724, CVE-2025-38725, CVE-2025-38728,
CVE-2025-38729, CVE-2025-38730, CVE-2025-38732, CVE-2025-38734,
CVE-2025-38735, CVE-2025-39673, CVE-2025-39675, CVE-2025-39676,
CVE-2025-39679, CVE-2025-39681, CVE-2025-39683, CVE-2025-39684,
CVE-2025-39685, CVE-2025-39686, CVE-2025-39687, CVE-2025-39689,
CVE-2025-39691, CVE-2025-39692, CVE-2025-39693, CVE-2025-39694,
CVE-2025-39701, CVE-2025-39702, CVE-2025-39703, CVE-2025-39705,
CVE-2025-39706, CVE-2025-39707, CVE-2025-39709, CVE-2025-39710,
CVE-2025-39711, CVE-2025-39712, CVE-2025-39713, CVE-2025-39714,
CVE-2025-39715, CVE-2025-39716, CVE-2025-39718, CVE-2025-39719,
CVE-2025-39720, CVE-2025-39721, CVE-2025-39724, CVE-2025-39726,
CVE-2025-39730, CVE-2025-39731, CVE-2025-39732, CVE-2025-39734,
CVE-2025-39736, CVE-2025-39737, CVE-2025-39738, CVE-2025-39739,
CVE-2025-39742, CVE-2025-39743, CVE-2025-39744, CVE-2025-39746,
CVE-2025-39747, CVE-2025-39748, CVE-2025-39749, CVE-2025-39750,
CVE-2025-39752, CVE-2025-39753, CVE-2025-39756, CVE-2025-39757,
CVE-2025-39758, CVE-2025-39759, CVE-2025-39760, CVE-2025-39761,
CVE-2025-39763, CVE-2025-39766, CVE-2025-39770, CVE-2025-39772,
CVE-2025-39773, CVE-2025-39776, CVE-2025-39779, CVE-2025-39781,
CVE-2025-39782, CVE-2025-39783, CVE-2025-39787, CVE-2025-39788,
CVE-2025-39790, CVE-2025-39794, CVE-2025-39795, CVE-2025-39797,
CVE-2025-39798, CVE-2025-39800, CVE-2025-39801, CVE-2025-39889,
CVE-2025-39890, CVE-2025-39946, CVE-2025-39989, CVE-2025-40215,
CVE-2025-40297, CVE-2025-68750)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
linux-image-6.8.0-1044-ibm 6.8.0-1044.44
linux-image-ibm 6.8.0-1044.44
linux-image-ibm-6.8 6.8.0-1044.44
linux-image-ibm-classic 6.8.0-1044.44
linux-image-ibm-lts-24.04 6.8.0-1044.44
Ubuntu 22.04 LTS
linux-image-6.8.0-1044-ibm 6.8.0-1044.44~22.04.1
linux-image-ibm-6.8 6.8.0-1044.44~22.04.1
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-8028-8
https://ubuntu.com/security/notices/USN-8028-7
https://ubuntu.com/security/notices/USN-8028-6
https://ubuntu.com/security/notices/USN-8028-5
https://ubuntu.com/security/notices/USN-8028-4
https://ubuntu.com/security/notices/USN-8028-3
https://ubuntu.com/security/notices/USN-8028-2
https://ubuntu.com/security/notices/USN-8028-1
CVE-2024-36331, CVE-2024-36350, CVE-2024-36357, CVE-2025-21884,
CVE-2025-21931, CVE-2025-22026, CVE-2025-22101, CVE-2025-22102,
CVE-2025-22115, CVE-2025-22120, CVE-2025-22126, CVE-2025-22128,
CVE-2025-23140, CVE-2025-23141, CVE-2025-23142, CVE-2025-23144,
CVE-2025-23145, CVE-2025-23146, CVE-2025-23147, CVE-2025-23148,
CVE-2025-23149, CVE-2025-23150, CVE-2025-23151, CVE-2025-23155,
CVE-2025-23156, CVE-2025-23157, CVE-2025-23158, CVE-2025-23159,
CVE-2025-23160, CVE-2025-23161, CVE-2025-23163, CVE-2025-37738,
CVE-2025-37739, CVE-2025-37740, CVE-2025-37741, CVE-2025-37742,
CVE-2025-37744, CVE-2025-37745, CVE-2025-37748, CVE-2025-37749,
CVE-2025-37754, CVE-2025-37755, CVE-2025-37757, CVE-2025-37758,
CVE-2025-37759, CVE-2025-37761, CVE-2025-37763, CVE-2025-37764,
CVE-2025-37765, CVE-2025-37766, CVE-2025-37767, CVE-2025-37768,
CVE-2025-37769, CVE-2025-37770, CVE-2025-37771, CVE-2025-37772,
CVE-2025-37773, CVE-2025-37775, CVE-2025-37777, CVE-2025-37778,
CVE-2025-37780, CVE-2025-37781, CVE-2025-37784, CVE-2025-37786,
CVE-2025-37787, CVE-2025-37788, CVE-2025-37789, CVE-2025-37790,
CVE-2025-37792, CVE-2025-37793, CVE-2025-37794, CVE-2025-37796,
CVE-2025-37799, CVE-2025-37800, CVE-2025-37801, CVE-2025-37803,
CVE-2025-37805, CVE-2025-37808, CVE-2025-37809, CVE-2025-37810,
CVE-2025-37811, CVE-2025-37812, CVE-2025-37813, CVE-2025-37815,
CVE-2025-37816, CVE-2025-37817, CVE-2025-37819, CVE-2025-37820,
CVE-2025-37822, CVE-2025-37823, CVE-2025-37824, CVE-2025-37826,
CVE-2025-37827, CVE-2025-37828, CVE-2025-37829, CVE-2025-37830,
CVE-2025-37831, CVE-2025-37836, CVE-2025-37839, CVE-2025-37840,
CVE-2025-37841, CVE-2025-37842, CVE-2025-37844, CVE-2025-37846,
CVE-2025-37849, CVE-2025-37850, CVE-2025-37851, CVE-2025-37852,
CVE-2025-37853, CVE-2025-37854, CVE-2025-37856, CVE-2025-37857,
CVE-2025-37858, CVE-2025-37859, CVE-2025-37861, CVE-2025-37862,
CVE-2025-37863, CVE-2025-37864, CVE-2025-37865, CVE-2025-37867,
CVE-2025-37869, CVE-2025-37871, CVE-2025-37872, CVE-2025-37873,
CVE-2025-37874, CVE-2025-37875, CVE-2025-37878, CVE-2025-37879,
CVE-2025-37881, CVE-2025-37883, CVE-2025-37884, CVE-2025-37885,
CVE-2025-37886, CVE-2025-37887, CVE-2025-37891, CVE-2025-37892,
CVE-2025-37897, CVE-2025-37900, CVE-2025-37901, CVE-2025-37903,
CVE-2025-37905, CVE-2025-37909, CVE-2025-37911, CVE-2025-37912,
CVE-2025-37913, CVE-2025-37914, CVE-2025-37915, CVE-2025-37916,
CVE-2025-37917, CVE-2025-37918, CVE-2025-37920, CVE-2025-37921,
CVE-2025-37922, CVE-2025-37923, CVE-2025-37924, CVE-2025-37925,
CVE-2025-37927, CVE-2025-37928, CVE-2025-37930, CVE-2025-37931,
CVE-2025-37933, CVE-2025-37935, CVE-2025-37936, CVE-2025-37938,
CVE-2025-37940, CVE-2025-37943, CVE-2025-37944, CVE-2025-37945,
CVE-2025-37947, CVE-2025-37948, CVE-2025-37949, CVE-2025-37951,
CVE-2025-37952, CVE-2025-37954, CVE-2025-37956, CVE-2025-37957,
CVE-2025-37959, CVE-2025-37960, CVE-2025-37961, CVE-2025-37962,
CVE-2025-37963, CVE-2025-37967, CVE-2025-37968, CVE-2025-37969,
CVE-2025-37970, CVE-2025-37972, CVE-2025-37973, CVE-2025-37975,
CVE-2025-37977, CVE-2025-37978, CVE-2025-37979, CVE-2025-37980,
CVE-2025-37982, CVE-2025-37983, CVE-2025-37984, CVE-2025-37985,
CVE-2025-37986, CVE-2025-37987, CVE-2025-37988, CVE-2025-37989,
CVE-2025-37990, CVE-2025-37991, CVE-2025-37992, CVE-2025-37994,
CVE-2025-37995, CVE-2025-37998, CVE-2025-38003, CVE-2025-38004,
CVE-2025-38005, CVE-2025-38006, CVE-2025-38007, CVE-2025-38008,
CVE-2025-38009, CVE-2025-38010, CVE-2025-38011, CVE-2025-38013,
CVE-2025-38014, CVE-2025-38015, CVE-2025-38018, CVE-2025-38019,
CVE-2025-38020, CVE-2025-38023, CVE-2025-38024, CVE-2025-38027,
CVE-2025-38031, CVE-2025-38034, CVE-2025-38035, CVE-2025-38037,
CVE-2025-38039, CVE-2025-38040, CVE-2025-38043, CVE-2025-38044,
CVE-2025-38045, CVE-2025-38048, CVE-2025-38051, CVE-2025-38052,
CVE-2025-38053, CVE-2025-38055, CVE-2025-38057, CVE-2025-38058,
CVE-2025-38059, CVE-2025-38060, CVE-2025-38061, CVE-2025-38062,
CVE-2025-38063, CVE-2025-38065, CVE-2025-38066, CVE-2025-38067,
CVE-2025-38068, CVE-2025-38071, CVE-2025-38072, CVE-2025-38074,
CVE-2025-38075, CVE-2025-38077, CVE-2025-38078, CVE-2025-38079,
CVE-2025-38080, CVE-2025-38081, CVE-2025-38084, CVE-2025-38085,
CVE-2025-38086, CVE-2025-38087, CVE-2025-38088, CVE-2025-38089,
CVE-2025-38090, CVE-2025-38094, CVE-2025-38095, CVE-2025-38097,
CVE-2025-38098, CVE-2025-38099, CVE-2025-38100, CVE-2025-38101,
CVE-2025-38102, CVE-2025-38103, CVE-2025-38104, CVE-2025-38107,
CVE-2025-38108, CVE-2025-38109, CVE-2025-38110, CVE-2025-38111,
CVE-2025-38112, CVE-2025-38113, CVE-2025-38115, CVE-2025-38117,
CVE-2025-38119, CVE-2025-38120, CVE-2025-38122, CVE-2025-38123,
CVE-2025-38124, CVE-2025-38125, CVE-2025-38126, CVE-2025-38127,
CVE-2025-38129, CVE-2025-38131, CVE-2025-38135, CVE-2025-38136,
CVE-2025-38138, CVE-2025-38142, CVE-2025-38143, CVE-2025-38145,
CVE-2025-38146, CVE-2025-38147, CVE-2025-38148, CVE-2025-38149,
CVE-2025-38153, CVE-2025-38154, CVE-2025-38155, CVE-2025-38156,
CVE-2025-38157, CVE-2025-38158, CVE-2025-38159, CVE-2025-38160,
CVE-2025-38161, CVE-2025-38162, CVE-2025-38163, CVE-2025-38164,
CVE-2025-38165, CVE-2025-38166, CVE-2025-38167, CVE-2025-38169,
CVE-2025-38170, CVE-2025-38173, CVE-2025-38174, CVE-2025-38180,
CVE-2025-38181, CVE-2025-38182, CVE-2025-38183, CVE-2025-38184,
CVE-2025-38185, CVE-2025-38190, CVE-2025-38191, CVE-2025-38192,
CVE-2025-38193, CVE-2025-38194, CVE-2025-38197, CVE-2025-38198,
CVE-2025-38200, CVE-2025-38202, CVE-2025-38208, CVE-2025-38210,
CVE-2025-38211, CVE-2025-38212, CVE-2025-38214, CVE-2025-38215,
CVE-2025-38217, CVE-2025-38218, CVE-2025-38219, CVE-2025-38220,
CVE-2025-38222, CVE-2025-38225, CVE-2025-38226, CVE-2025-38229,
CVE-2025-38230, CVE-2025-38231, CVE-2025-38232, CVE-2025-38236,
CVE-2025-38239, CVE-2025-38244, CVE-2025-38245, CVE-2025-38246,
CVE-2025-38248, CVE-2025-38249, CVE-2025-38250, CVE-2025-38251,
CVE-2025-38253, CVE-2025-38255, CVE-2025-38257, CVE-2025-38258,
CVE-2025-38259, CVE-2025-38260, CVE-2025-38262, CVE-2025-38263,
CVE-2025-38264, CVE-2025-38265, CVE-2025-38269, CVE-2025-38274,
CVE-2025-38275, CVE-2025-38277, CVE-2025-38278, CVE-2025-38279,
CVE-2025-38280, CVE-2025-38282, CVE-2025-38283, CVE-2025-38285,
CVE-2025-38286, CVE-2025-38289, CVE-2025-38290, CVE-2025-38292,
CVE-2025-38293, CVE-2025-38295, CVE-2025-38298, CVE-2025-38299,
CVE-2025-38300, CVE-2025-38303, CVE-2025-38304, CVE-2025-38305,
CVE-2025-38307, CVE-2025-38310, CVE-2025-38312, CVE-2025-38313,
CVE-2025-38319, CVE-2025-38320, CVE-2025-38321, CVE-2025-38322,
CVE-2025-38323, CVE-2025-38324, CVE-2025-38326, CVE-2025-38328,
CVE-2025-38331, CVE-2025-38332, CVE-2025-38333, CVE-2025-38334,
CVE-2025-38335, CVE-2025-38336, CVE-2025-38337, CVE-2025-38338,
CVE-2025-38342, CVE-2025-38343, CVE-2025-38344, CVE-2025-38345,
CVE-2025-38346, CVE-2025-38347, CVE-2025-38348, CVE-2025-38349,
CVE-2025-38351, CVE-2025-38354, CVE-2025-38361, CVE-2025-38362,
CVE-2025-38363, CVE-2025-38364, CVE-2025-38365, CVE-2025-38368,
CVE-2025-38369, CVE-2025-38371, CVE-2025-38373, CVE-2025-38374,
CVE-2025-38375, CVE-2025-38376, CVE-2025-38377, CVE-2025-38382,
CVE-2025-38384, CVE-2025-38385, CVE-2025-38386, CVE-2025-38387,
CVE-2025-38388, CVE-2025-38389, CVE-2025-38390, CVE-2025-38391,
CVE-2025-38392, CVE-2025-38393, CVE-2025-38395, CVE-2025-38396,
CVE-2025-38399, CVE-2025-38400, CVE-2025-38401, CVE-2025-38402,
CVE-2025-38403, CVE-2025-38405, CVE-2025-38406, CVE-2025-38407,
CVE-2025-38408, CVE-2025-38409, CVE-2025-38410, CVE-2025-38412,
CVE-2025-38414, CVE-2025-38415, CVE-2025-38416, CVE-2025-38418,
CVE-2025-38419, CVE-2025-38420, CVE-2025-38422, CVE-2025-38424,
CVE-2025-38425, CVE-2025-38427, CVE-2025-38428, CVE-2025-38429,
CVE-2025-38430, CVE-2025-38436, CVE-2025-38437, CVE-2025-38439,
CVE-2025-38441, CVE-2025-38443, CVE-2025-38444, CVE-2025-38445,
CVE-2025-38448, CVE-2025-38449, CVE-2025-38455, CVE-2025-38456,
CVE-2025-38457, CVE-2025-38458, CVE-2025-38459, CVE-2025-38460,
CVE-2025-38461, CVE-2025-38462, CVE-2025-38463, CVE-2025-38464,
CVE-2025-38465, CVE-2025-38466, CVE-2025-38467, CVE-2025-38468,
CVE-2025-38469, CVE-2025-38470, CVE-2025-38471, CVE-2025-38472,
CVE-2025-38473, CVE-2025-38474, CVE-2025-38476, CVE-2025-38478,
CVE-2025-38480, CVE-2025-38481, CVE-2025-38482, CVE-2025-38483,
CVE-2025-38485, CVE-2025-38487, CVE-2025-38488, CVE-2025-38489,
CVE-2025-38490, CVE-2025-38491, CVE-2025-38493, CVE-2025-38494,
CVE-2025-38495, CVE-2025-38496, CVE-2025-38497, CVE-2025-38499,
CVE-2025-38501, CVE-2025-38503, CVE-2025-38506, CVE-2025-38507,
CVE-2025-38510, CVE-2025-38511, CVE-2025-38512, CVE-2025-38513,
CVE-2025-38514, CVE-2025-38515, CVE-2025-38516, CVE-2025-38520,
CVE-2025-38521, CVE-2025-38524, CVE-2025-38526, CVE-2025-38527,
CVE-2025-38528, CVE-2025-38529, CVE-2025-38530, CVE-2025-38531,
CVE-2025-38532, CVE-2025-38533, CVE-2025-38535, CVE-2025-38537,
CVE-2025-38538, CVE-2025-38539, CVE-2025-38540, CVE-2025-38542,
CVE-2025-38543, CVE-2025-38544, CVE-2025-38546, CVE-2025-38548,
CVE-2025-38549, CVE-2025-38550, CVE-2025-38551, CVE-2025-38552,
CVE-2025-38553, CVE-2025-38555, CVE-2025-38560, CVE-2025-38562,
CVE-2025-38566, CVE-2025-38568, CVE-2025-38569, CVE-2025-38571,
CVE-2025-38572, CVE-2025-38574, CVE-2025-38576, CVE-2025-38577,
CVE-2025-38578, CVE-2025-38579, CVE-2025-38581, CVE-2025-38582,
CVE-2025-38583, CVE-2025-38584, CVE-2025-38585, CVE-2025-38587,
CVE-2025-38588, CVE-2025-38590, CVE-2025-38593, CVE-2025-38595,
CVE-2025-38601, CVE-2025-38602, CVE-2025-38604, CVE-2025-38608,
CVE-2025-38609, CVE-2025-38610, CVE-2025-38612, CVE-2025-38614,
CVE-2025-38615, CVE-2025-38619, CVE-2025-38622, CVE-2025-38623,
CVE-2025-38624, CVE-2025-38625, CVE-2025-38626, CVE-2025-38630,
CVE-2025-38632, CVE-2025-38634, CVE-2025-38635, CVE-2025-38639,
CVE-2025-38640, CVE-2025-38644, CVE-2025-38645, CVE-2025-38646,
CVE-2025-38648, CVE-2025-38650, CVE-2025-38652, CVE-2025-38653,
CVE-2025-38659, CVE-2025-38660, CVE-2025-38663, CVE-2025-38664,
CVE-2025-38665, CVE-2025-38668, CVE-2025-38670, CVE-2025-38671,
CVE-2025-38675, CVE-2025-38676, CVE-2025-38677, CVE-2025-38679,
CVE-2025-38680, CVE-2025-38681, CVE-2025-38683, CVE-2025-38684,
CVE-2025-38685, CVE-2025-38686, CVE-2025-38687, CVE-2025-38688,
CVE-2025-38691, CVE-2025-38692, CVE-2025-38693, CVE-2025-38694,
CVE-2025-38695, CVE-2025-38696, CVE-2025-38697, CVE-2025-38698,
CVE-2025-38699, CVE-2025-38700, CVE-2025-38701, CVE-2025-38702,
CVE-2025-38703, CVE-2025-38704, CVE-2025-38705, CVE-2025-38706,
CVE-2025-38707, CVE-2025-38708, CVE-2025-38710, CVE-2025-38711,
CVE-2025-38712, CVE-2025-38713, CVE-2025-38714, CVE-2025-38715,
CVE-2025-38716, CVE-2025-38718, CVE-2025-38721, CVE-2025-38722,
CVE-2025-38724, CVE-2025-38725, CVE-2025-38728, CVE-2025-38729,
CVE-2025-38730, CVE-2025-38732, CVE-2025-38734, CVE-2025-38735,
CVE-2025-39673, CVE-2025-39675, CVE-2025-39676, CVE-2025-39679,
CVE-2025-39681, CVE-2025-39683, CVE-2025-39684, CVE-2025-39685,
CVE-2025-39686, CVE-2025-39687, CVE-2025-39689, CVE-2025-39691,
CVE-2025-39692, CVE-2025-39693, CVE-2025-39694, CVE-2025-39701,
CVE-2025-39702, CVE-2025-39703, CVE-2025-39705, CVE-2025-39706,
CVE-2025-39707, CVE-2025-39709, CVE-2025-39710, CVE-2025-39711,
CVE-2025-39712, CVE-2025-39713, CVE-2025-39714, CVE-2025-39715,
CVE-2025-39716, CVE-2025-39718, CVE-2025-39719, CVE-2025-39720,
CVE-2025-39721, CVE-2025-39724, CVE-2025-39726, CVE-2025-39730,
CVE-2025-39731, CVE-2025-39732, CVE-2025-39734, CVE-2025-39736,
CVE-2025-39737, CVE-2025-39738, CVE-2025-39739, CVE-2025-39742,
CVE-2025-39743, CVE-2025-39744, CVE-2025-39746, CVE-2025-39747,
CVE-2025-39748, CVE-2025-39749, CVE-2025-39750, CVE-2025-39752,
CVE-2025-39753, CVE-2025-39756, CVE-2025-39757, CVE-2025-39758,
CVE-2025-39759, CVE-2025-39760, CVE-2025-39761, CVE-2025-39763,
CVE-2025-39766, CVE-2025-39770, CVE-2025-39772, CVE-2025-39773,
CVE-2025-39776, CVE-2025-39779, CVE-2025-39781, CVE-2025-39782,
CVE-2025-39783, CVE-2025-39787, CVE-2025-39788, CVE-2025-39790,
CVE-2025-39794, CVE-2025-39795, CVE-2025-39797, CVE-2025-39798,
CVE-2025-39800, CVE-2025-39801, CVE-2025-39889, CVE-2025-39890,
CVE-2025-39946, CVE-2025-39989, CVE-2025-40215, CVE-2025-40297,
CVE-2025-68750
Package Information:
https://launchpad.net/ubuntu/+source/linux-ibm/6.8.0-1044.44
https://launchpad.net/ubuntu/+source/linux-ibm-6.8/6.8.0-1044.44~22.04.1
[USN-8060-3] Linux kernel (GCP FIPS) vulnerabilities
==========================================================================
Ubuntu Security Notice USN-8060-3
February 24, 2026
linux-gcp-fips vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-gcp-fips: Linux kernel for Google Cloud Platform (GCP) systems with FIPS
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- GPU drivers;
- MMC subsystem;
(CVE-2022-49267, CVE-2025-21780)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS
linux-image-5.15.0-1101-gcp-fips 5.15.0-1101.110+fips1
Available with Ubuntu Pro
linux-image-gcp-fips 5.15.0.1101.91
Available with Ubuntu Pro
linux-image-gcp-fips-5.15 5.15.0.1101.91
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-8060-3
https://ubuntu.com/security/notices/USN-8060-2
https://ubuntu.com/security/notices/USN-8060-1
CVE-2022-49267, CVE-2025-21780
Package Information:
https://launchpad.net/ubuntu/+source/linux-gcp-fips/5.15.0-1101.110+fips1
Ubuntu Security Notice USN-8060-3
February 24, 2026
linux-gcp-fips vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-gcp-fips: Linux kernel for Google Cloud Platform (GCP) systems with FIPS
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- GPU drivers;
- MMC subsystem;
(CVE-2022-49267, CVE-2025-21780)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS
linux-image-5.15.0-1101-gcp-fips 5.15.0-1101.110+fips1
Available with Ubuntu Pro
linux-image-gcp-fips 5.15.0.1101.91
Available with Ubuntu Pro
linux-image-gcp-fips-5.15 5.15.0.1101.91
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-8060-3
https://ubuntu.com/security/notices/USN-8060-2
https://ubuntu.com/security/notices/USN-8060-1
CVE-2022-49267, CVE-2025-21780
Package Information:
https://launchpad.net/ubuntu/+source/linux-gcp-fips/5.15.0-1101.110+fips1
[USN-8060-2] Linux kernel (Real-time) vulnerabilities
==========================================================================
Ubuntu Security Notice USN-8060-2
February 24, 2026
linux-intel-iot-realtime, linux-realtime vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-intel-iot-realtime: Linux kernel for Intel IoT Real-time platforms
- linux-realtime: Linux kernel for Real-time systems
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- GPU drivers;
- MMC subsystem;
(CVE-2022-49267, CVE-2025-21780)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS
linux-image-5.15.0-1093-intel-iot-realtime 5.15.0-1093.95
Available with Ubuntu Pro
linux-image-5.15.0-1100-realtime 5.15.0-1100.109
Available with Ubuntu Pro
linux-image-intel-iot-realtime 5.15.0.1093.97
Available with Ubuntu Pro
linux-image-intel-iot-realtime-5.15 5.15.0.1093.97
Available with Ubuntu Pro
linux-image-realtime 5.15.0.1100.104
Available with Ubuntu Pro
linux-image-realtime-5.15 5.15.0.1100.104
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-8060-2
https://ubuntu.com/security/notices/USN-8060-1
CVE-2022-49267, CVE-2025-21780
Package Information:
https://launchpad.net/ubuntu/+source/linux-intel-iot-realtime/5.15.0-1093.95
https://launchpad.net/ubuntu/+source/linux-realtime/5.15.0-1100.109
Ubuntu Security Notice USN-8060-2
February 24, 2026
linux-intel-iot-realtime, linux-realtime vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-intel-iot-realtime: Linux kernel for Intel IoT Real-time platforms
- linux-realtime: Linux kernel for Real-time systems
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- GPU drivers;
- MMC subsystem;
(CVE-2022-49267, CVE-2025-21780)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS
linux-image-5.15.0-1093-intel-iot-realtime 5.15.0-1093.95
Available with Ubuntu Pro
linux-image-5.15.0-1100-realtime 5.15.0-1100.109
Available with Ubuntu Pro
linux-image-intel-iot-realtime 5.15.0.1093.97
Available with Ubuntu Pro
linux-image-intel-iot-realtime-5.15 5.15.0.1093.97
Available with Ubuntu Pro
linux-image-realtime 5.15.0.1100.104
Available with Ubuntu Pro
linux-image-realtime-5.15 5.15.0.1100.104
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-8060-2
https://ubuntu.com/security/notices/USN-8060-1
CVE-2022-49267, CVE-2025-21780
Package Information:
https://launchpad.net/ubuntu/+source/linux-intel-iot-realtime/5.15.0-1093.95
https://launchpad.net/ubuntu/+source/linux-realtime/5.15.0-1100.109
[USN-8059-2] Linux kernel (Raspberry Pi Real-time) vulnerabilities
==========================================================================
Ubuntu Security Notice USN-8059-2
February 24, 2026
linux-raspi-realtime vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-raspi-realtime: Linux kernel for Raspberry Pi Real-time systems
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- SMB network file system;
(CVE-2025-22037, CVE-2025-37899)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
linux-image-6.8.0-2038-raspi-realtime 6.8.0-2038.39
Available with Ubuntu Pro
linux-image-raspi-realtime 6.8.0-2038.39
Available with Ubuntu Pro
linux-image-raspi-realtime-6.8 6.8.0-2038.39
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-8059-2
https://ubuntu.com/security/notices/USN-8059-1
CVE-2025-22037, CVE-2025-37899
Package Information:
https://launchpad.net/ubuntu/+source/linux-raspi-realtime/6.8.0-2038.39
Ubuntu Security Notice USN-8059-2
February 24, 2026
linux-raspi-realtime vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-raspi-realtime: Linux kernel for Raspberry Pi Real-time systems
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- SMB network file system;
(CVE-2025-22037, CVE-2025-37899)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
linux-image-6.8.0-2038-raspi-realtime 6.8.0-2038.39
Available with Ubuntu Pro
linux-image-raspi-realtime 6.8.0-2038.39
Available with Ubuntu Pro
linux-image-raspi-realtime-6.8 6.8.0-2038.39
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-8059-2
https://ubuntu.com/security/notices/USN-8059-1
CVE-2025-22037, CVE-2025-37899
Package Information:
https://launchpad.net/ubuntu/+source/linux-raspi-realtime/6.8.0-2038.39
[USN-8061-1] Linux kernel vulnerabilities
==========================================================================
Ubuntu Security Notice USN-8061-1
February 24, 2026
linux vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux: Linux kernel
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Network file system (NFS) server daemon;
- SCTP protocol;
(CVE-2024-50299, CVE-2024-53217)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS
linux-image-3.13.0-211-generic 3.13.0-211.262
Available with Ubuntu Pro
linux-image-3.13.0-211-lowlatency 3.13.0-211.262
Available with Ubuntu Pro
linux-image-generic 3.13.0.211.221
Available with Ubuntu Pro
linux-image-generic-lts-quantal 3.13.0.211.221
Available with Ubuntu Pro
linux-image-generic-lts-raring 3.13.0.211.221
Available with Ubuntu Pro
linux-image-generic-lts-saucy 3.13.0.211.221
Available with Ubuntu Pro
linux-image-generic-lts-trusty 3.13.0.211.221
Available with Ubuntu Pro
linux-image-lowlatency 3.13.0.211.221
Available with Ubuntu Pro
linux-image-server 3.13.0.211.221
Available with Ubuntu Pro
linux-image-virtual 3.13.0.211.221
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-8061-1
CVE-2024-50299, CVE-2024-53217
Ubuntu Security Notice USN-8061-1
February 24, 2026
linux vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux: Linux kernel
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Network file system (NFS) server daemon;
- SCTP protocol;
(CVE-2024-50299, CVE-2024-53217)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS
linux-image-3.13.0-211-generic 3.13.0-211.262
Available with Ubuntu Pro
linux-image-3.13.0-211-lowlatency 3.13.0-211.262
Available with Ubuntu Pro
linux-image-generic 3.13.0.211.221
Available with Ubuntu Pro
linux-image-generic-lts-quantal 3.13.0.211.221
Available with Ubuntu Pro
linux-image-generic-lts-raring 3.13.0.211.221
Available with Ubuntu Pro
linux-image-generic-lts-saucy 3.13.0.211.221
Available with Ubuntu Pro
linux-image-generic-lts-trusty 3.13.0.211.221
Available with Ubuntu Pro
linux-image-lowlatency 3.13.0.211.221
Available with Ubuntu Pro
linux-image-server 3.13.0.211.221
Available with Ubuntu Pro
linux-image-virtual 3.13.0.211.221
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-8061-1
CVE-2024-50299, CVE-2024-53217
[USN-8060-1] Linux kernel vulnerabilities
==========================================================================
Ubuntu Security Notice USN-8060-1
February 24, 2026
linux, linux-gcp, linux-gke, linux-gkeop, linux-intel-iotg,
linux-intel-iotg-5.15, linux-kvm, linux-lowlatency,
linux-lowlatency-hwe-5.15, linux-nvidia-tegra, linux-oracle,
linux-xilinx-zynqmp vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux: Linux kernel
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-gke: Linux kernel for Google Container Engine (GKE) systems
- linux-gkeop: Linux kernel for Google Container Engine (GKE) systems
- linux-intel-iotg: Linux kernel for Intel IoT platforms
- linux-kvm: Linux kernel for cloud environments
- linux-lowlatency: Linux low latency kernel
- linux-nvidia-tegra: Linux kernel for NVIDIA Tegra systems
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-xilinx-zynqmp: Linux kernel for Xilinx ZynqMP processors
- linux-intel-iotg-5.15: Linux kernel for Intel IoT platforms
- linux-lowlatency-hwe-5.15: Linux low latency kernel
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- GPU drivers;
- MMC subsystem;
(CVE-2022-49267, CVE-2025-21780)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS
linux-image-5.15.0-1053-nvidia-tegra 5.15.0-1053.53
linux-image-5.15.0-1053-nvidia-tegra-rt 5.15.0-1053.53
linux-image-5.15.0-1065-xilinx-zynqmp 5.15.0-1065.69
linux-image-5.15.0-1084-gkeop 5.15.0-1084.92
linux-image-5.15.0-1093-kvm 5.15.0-1093.98
linux-image-5.15.0-1096-intel-iotg 5.15.0-1096.102
linux-image-5.15.0-1097-gke 5.15.0-1097.103
linux-image-5.15.0-1098-oracle 5.15.0-1098.104
linux-image-5.15.0-1101-gcp 5.15.0-1101.110
linux-image-5.15.0-171-generic 5.15.0-171.181
linux-image-5.15.0-171-generic-64k 5.15.0-171.181
linux-image-5.15.0-171-generic-lpae 5.15.0-171.181
linux-image-5.15.0-171-lowlatency 5.15.0-171.181
linux-image-5.15.0-171-lowlatency-64k 5.15.0-171.181
linux-image-gcp-5.15 5.15.0.1101.97
linux-image-gcp-lts-22.04 5.15.0.1101.97
linux-image-generic 5.15.0.171.160
linux-image-generic-5.15 5.15.0.171.160
linux-image-generic-64k 5.15.0.171.160
linux-image-generic-64k-5.15 5.15.0.171.160
linux-image-generic-lpae 5.15.0.171.160
linux-image-generic-lpae-5.15 5.15.0.171.160
linux-image-gke 5.15.0.1097.96
linux-image-gke-5.15 5.15.0.1097.96
linux-image-gkeop 5.15.0.1084.83
linux-image-gkeop-5.15 5.15.0.1084.83
linux-image-intel-iotg 5.15.0.1096.96
linux-image-intel-iotg-5.15 5.15.0.1096.96
linux-image-kvm 5.15.0.1093.89
linux-image-kvm-5.15 5.15.0.1093.89
linux-image-lowlatency 5.15.0.171.144
linux-image-lowlatency-5.15 5.15.0.171.144
linux-image-lowlatency-64k 5.15.0.171.144
linux-image-lowlatency-64k-5.15 5.15.0.171.144
linux-image-nvidia-tegra 5.15.0.1053.53
linux-image-nvidia-tegra-5.15 5.15.0.1053.53
linux-image-nvidia-tegra-rt 5.15.0.1053.53
linux-image-nvidia-tegra-rt-5.15 5.15.0.1053.53
linux-image-oracle-5.15 5.15.0.1098.94
linux-image-oracle-lts-22.04 5.15.0.1098.94
linux-image-virtual 5.15.0.171.160
linux-image-virtual-5.15 5.15.0.171.160
linux-image-xilinx-zynqmp 5.15.0.1065.68
linux-image-xilinx-zynqmp-5.15 5.15.0.1065.68
Ubuntu 20.04 LTS
linux-image-5.15.0-1096-intel-iotg 5.15.0-1096.102~20.04.1
Available with Ubuntu Pro
linux-image-5.15.0-171-lowlatency 5.15.0-171.181~20.04.1
Available with Ubuntu Pro
linux-image-5.15.0-171-lowlatency-64k 5.15.0-171.181~20.04.1
Available with Ubuntu Pro
linux-image-intel 5.15.0.1096.102~20.04.1
Available with Ubuntu Pro
linux-image-intel-iotg 5.15.0.1096.102~20.04.1
Available with Ubuntu Pro
linux-image-intel-iotg-5.15 5.15.0.1096.102~20.04.1
Available with Ubuntu Pro
linux-image-lowlatency-5.15 5.15.0.171.181~20.04.1
Available with Ubuntu Pro
linux-image-lowlatency-64k-5.15 5.15.0.171.181~20.04.1
Available with Ubuntu Pro
linux-image-lowlatency-64k-hwe-20.04 5.15.0.171.181~20.04.1
Available with Ubuntu Pro
linux-image-lowlatency-hwe-20.04 5.15.0.171.181~20.04.1
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-8060-1
CVE-2022-49267, CVE-2025-21780
Package Information:
https://launchpad.net/ubuntu/+source/linux/5.15.0-171.181
https://launchpad.net/ubuntu/+source/linux-gcp/5.15.0-1101.110
https://launchpad.net/ubuntu/+source/linux-gke/5.15.0-1097.103
https://launchpad.net/ubuntu/+source/linux-gkeop/5.15.0-1084.92
https://launchpad.net/ubuntu/+source/linux-intel-iotg/5.15.0-1096.102
https://launchpad.net/ubuntu/+source/linux-kvm/5.15.0-1093.98
https://launchpad.net/ubuntu/+source/linux-lowlatency/5.15.0-171.181
https://launchpad.net/ubuntu/+source/linux-nvidia-tegra/5.15.0-1053.53
https://launchpad.net/ubuntu/+source/linux-oracle/5.15.0-1098.104
https://launchpad.net/ubuntu/+source/linux-xilinx-zynqmp/5.15.0-1065.69
Ubuntu Security Notice USN-8060-1
February 24, 2026
linux, linux-gcp, linux-gke, linux-gkeop, linux-intel-iotg,
linux-intel-iotg-5.15, linux-kvm, linux-lowlatency,
linux-lowlatency-hwe-5.15, linux-nvidia-tegra, linux-oracle,
linux-xilinx-zynqmp vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux: Linux kernel
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-gke: Linux kernel for Google Container Engine (GKE) systems
- linux-gkeop: Linux kernel for Google Container Engine (GKE) systems
- linux-intel-iotg: Linux kernel for Intel IoT platforms
- linux-kvm: Linux kernel for cloud environments
- linux-lowlatency: Linux low latency kernel
- linux-nvidia-tegra: Linux kernel for NVIDIA Tegra systems
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-xilinx-zynqmp: Linux kernel for Xilinx ZynqMP processors
- linux-intel-iotg-5.15: Linux kernel for Intel IoT platforms
- linux-lowlatency-hwe-5.15: Linux low latency kernel
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- GPU drivers;
- MMC subsystem;
(CVE-2022-49267, CVE-2025-21780)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS
linux-image-5.15.0-1053-nvidia-tegra 5.15.0-1053.53
linux-image-5.15.0-1053-nvidia-tegra-rt 5.15.0-1053.53
linux-image-5.15.0-1065-xilinx-zynqmp 5.15.0-1065.69
linux-image-5.15.0-1084-gkeop 5.15.0-1084.92
linux-image-5.15.0-1093-kvm 5.15.0-1093.98
linux-image-5.15.0-1096-intel-iotg 5.15.0-1096.102
linux-image-5.15.0-1097-gke 5.15.0-1097.103
linux-image-5.15.0-1098-oracle 5.15.0-1098.104
linux-image-5.15.0-1101-gcp 5.15.0-1101.110
linux-image-5.15.0-171-generic 5.15.0-171.181
linux-image-5.15.0-171-generic-64k 5.15.0-171.181
linux-image-5.15.0-171-generic-lpae 5.15.0-171.181
linux-image-5.15.0-171-lowlatency 5.15.0-171.181
linux-image-5.15.0-171-lowlatency-64k 5.15.0-171.181
linux-image-gcp-5.15 5.15.0.1101.97
linux-image-gcp-lts-22.04 5.15.0.1101.97
linux-image-generic 5.15.0.171.160
linux-image-generic-5.15 5.15.0.171.160
linux-image-generic-64k 5.15.0.171.160
linux-image-generic-64k-5.15 5.15.0.171.160
linux-image-generic-lpae 5.15.0.171.160
linux-image-generic-lpae-5.15 5.15.0.171.160
linux-image-gke 5.15.0.1097.96
linux-image-gke-5.15 5.15.0.1097.96
linux-image-gkeop 5.15.0.1084.83
linux-image-gkeop-5.15 5.15.0.1084.83
linux-image-intel-iotg 5.15.0.1096.96
linux-image-intel-iotg-5.15 5.15.0.1096.96
linux-image-kvm 5.15.0.1093.89
linux-image-kvm-5.15 5.15.0.1093.89
linux-image-lowlatency 5.15.0.171.144
linux-image-lowlatency-5.15 5.15.0.171.144
linux-image-lowlatency-64k 5.15.0.171.144
linux-image-lowlatency-64k-5.15 5.15.0.171.144
linux-image-nvidia-tegra 5.15.0.1053.53
linux-image-nvidia-tegra-5.15 5.15.0.1053.53
linux-image-nvidia-tegra-rt 5.15.0.1053.53
linux-image-nvidia-tegra-rt-5.15 5.15.0.1053.53
linux-image-oracle-5.15 5.15.0.1098.94
linux-image-oracle-lts-22.04 5.15.0.1098.94
linux-image-virtual 5.15.0.171.160
linux-image-virtual-5.15 5.15.0.171.160
linux-image-xilinx-zynqmp 5.15.0.1065.68
linux-image-xilinx-zynqmp-5.15 5.15.0.1065.68
Ubuntu 20.04 LTS
linux-image-5.15.0-1096-intel-iotg 5.15.0-1096.102~20.04.1
Available with Ubuntu Pro
linux-image-5.15.0-171-lowlatency 5.15.0-171.181~20.04.1
Available with Ubuntu Pro
linux-image-5.15.0-171-lowlatency-64k 5.15.0-171.181~20.04.1
Available with Ubuntu Pro
linux-image-intel 5.15.0.1096.102~20.04.1
Available with Ubuntu Pro
linux-image-intel-iotg 5.15.0.1096.102~20.04.1
Available with Ubuntu Pro
linux-image-intel-iotg-5.15 5.15.0.1096.102~20.04.1
Available with Ubuntu Pro
linux-image-lowlatency-5.15 5.15.0.171.181~20.04.1
Available with Ubuntu Pro
linux-image-lowlatency-64k-5.15 5.15.0.171.181~20.04.1
Available with Ubuntu Pro
linux-image-lowlatency-64k-hwe-20.04 5.15.0.171.181~20.04.1
Available with Ubuntu Pro
linux-image-lowlatency-hwe-20.04 5.15.0.171.181~20.04.1
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-8060-1
CVE-2022-49267, CVE-2025-21780
Package Information:
https://launchpad.net/ubuntu/+source/linux/5.15.0-171.181
https://launchpad.net/ubuntu/+source/linux-gcp/5.15.0-1101.110
https://launchpad.net/ubuntu/+source/linux-gke/5.15.0-1097.103
https://launchpad.net/ubuntu/+source/linux-gkeop/5.15.0-1084.92
https://launchpad.net/ubuntu/+source/linux-intel-iotg/5.15.0-1096.102
https://launchpad.net/ubuntu/+source/linux-kvm/5.15.0-1093.98
https://launchpad.net/ubuntu/+source/linux-lowlatency/5.15.0-171.181
https://launchpad.net/ubuntu/+source/linux-nvidia-tegra/5.15.0-1053.53
https://launchpad.net/ubuntu/+source/linux-oracle/5.15.0-1098.104
https://launchpad.net/ubuntu/+source/linux-xilinx-zynqmp/5.15.0-1065.69
FreeBSD Security Advisory FreeBSD-SA-26:05.route
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
=============================================================================
FreeBSD-SA-26:05.route Security Advisory
The FreeBSD Project
Topic: Local DoS and possible privilege escalation via routing sockets
Category: core
Module: route
Announced: 2026-02-24
Credits: Adam Crosser of the Praetorian Labs team
Affects: All supported versions of FreeBSD.
Corrected: 2026-02-24 16:00:26 UTC (stable/15, 15.0-STABLE)
2026-02-24 16:00:39 UTC (releng/15.0, 15.0-RELEASE-p4)
2026-02-24 16:00:56 UTC (stable/14, 14.4-STABLE)
2026-02-24 16:02:31 UTC (releng/14.4, 14.4-RC1)
2026-02-24 16:01:35 UTC (releng/14.3, 14.3-RELEASE-p9)
2026-02-24 16:03:17 UTC (stable/13, 13.5-STABLE)
2026-02-24 16:04:45 UTC (releng/13.5, 13.5-RELEASE-p10)
CVE Name: CVE-2026-3038
For general information regarding FreeBSD Security Advisories,
including descriptions of the fields above, security branches, and the
following sections, please visit <URL:https://security.FreeBSD.org/>.
I. Background
The routing socket interface, route(4), lets users query the state of the
kernel's routing tables. Most routing socket operations require root
privileges, but unprivileged users may send RTM_GET messages to obtain
information about routing table entries.
II. Problem Description
The rtsock_msg_buffer() function serializes routing information into a buffer.
As a part of this, it copies sockaddr structures into a sockaddr_storage
structure on the stack. It assumes that the source sockaddr length field had
already been validated, but this is not necessarily the case, and it's possible
for a malicious userspace program to craft a request which triggers a 127-byte
overflow.
In practice, this overflow immediately overwrites the canary for the
rtsock_msg_buffer() stack frame, resulting in a panic once the function
returns.
III. Impact
The bug allows an unprivileged user to crash the kernel by triggering a stack
buffer overflow in rtsock_msg_buffer(). In particular, the overflow will
corrupt a stack canary value that is verified when the function returns; this
mitigates the impact of the stack overflow by triggering a kernel panic.
Other kernel bugs may exist which allow userspace to find the canary value and
thus defeat the mitigation, at which point local privilege escalation may be
possible.
IV. Workaround
No workaround is available.
V. Solution
Upgrade your vulnerable system to a supported FreeBSD stable or
release / security branch (releng) dated after the correction date.
Perform one of the following:
1) To update your vulnerable system installed from base system packages:
Systems running a 15.0-RELEASE version of FreeBSD on the amd64 or arm64
platforms, which were installed using base system packages, can be updated
via the pkg(8) utility:
# pkg upgrade -r FreeBSD-base
# shutdown -r +10min "Rebooting for a security update"
2) To update your vulnerable system installed from binary distribution sets:
Systems running a RELEASE version of FreeBSD on the amd64 or arm64 platforms,
or the i386 platform on FreeBSD 13, which were not installed using base
system packages, can be updated via the freebsd-update(8) utility:
# freebsd-update fetch
# freebsd-update install
# shutdown -r +10min "Rebooting for a security update"
3) To update your vulnerable system via a source code patch:
The following patches have been verified to apply to the applicable
FreeBSD release branches.
a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.
# fetch https://security.FreeBSD.org/patches/SA-26:05/route.patch
# fetch https://security.FreeBSD.org/patches/SA-26:05/route.patch.asc
# gpg --verify route.patch.asc
b) Apply the patch. Execute the following commands as root:
# cd /usr/src
# patch < /path/to/patch
c) Recompile your kernel as described in
<URL:https://www.FreeBSD.org/handbook/kernelconfig.html> and reboot the
system.
VI. Correction details
This issue is corrected as of the corresponding Git commit hash in the
following stable and release branches:
Branch/path Hash Revision
- -------------------------------------------------------------------------
stable/15/ df932377e7dd stable/15-n282455
releng/15.0/ 5de6a55c70ba releng/15.0-n281009
stable/14/ 1eb2beb3686c stable/14-n273785
releng/14.4/ 7465d0b094b7 releng/14.4-n273667
releng/14.3/ d521badafdaa releng/14.3-n271474
stable/13/ 8b476ffc4ea3 stable/13-n259798
releng/13.5/ c2e2bfbd9e09 releng/13.5-n259205
- -------------------------------------------------------------------------
Run the following command to see which files were modified by a
particular commit:
# git show --stat <commit hash>
Or visit the following URL, replacing NNNNNN with the hash:
<URL:https://cgit.freebsd.org/src/commit/?id=NNNNNN>
To determine the commit count in a working tree (for comparison against
nNNNNNN in the table above), run:
# git rev-list --count --first-parent HEAD
VII. References
<URL:https://www.cve.org/CVERecord?id=CVE-2026-3038>
The latest revision of this advisory is available at
<URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-26:05.route.asc>
-----BEGIN PGP SIGNATURE-----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=V8QD
-----END PGP SIGNATURE-----
Hash: SHA512
=============================================================================
FreeBSD-SA-26:05.route Security Advisory
The FreeBSD Project
Topic: Local DoS and possible privilege escalation via routing sockets
Category: core
Module: route
Announced: 2026-02-24
Credits: Adam Crosser of the Praetorian Labs team
Affects: All supported versions of FreeBSD.
Corrected: 2026-02-24 16:00:26 UTC (stable/15, 15.0-STABLE)
2026-02-24 16:00:39 UTC (releng/15.0, 15.0-RELEASE-p4)
2026-02-24 16:00:56 UTC (stable/14, 14.4-STABLE)
2026-02-24 16:02:31 UTC (releng/14.4, 14.4-RC1)
2026-02-24 16:01:35 UTC (releng/14.3, 14.3-RELEASE-p9)
2026-02-24 16:03:17 UTC (stable/13, 13.5-STABLE)
2026-02-24 16:04:45 UTC (releng/13.5, 13.5-RELEASE-p10)
CVE Name: CVE-2026-3038
For general information regarding FreeBSD Security Advisories,
including descriptions of the fields above, security branches, and the
following sections, please visit <URL:https://security.FreeBSD.org/>.
I. Background
The routing socket interface, route(4), lets users query the state of the
kernel's routing tables. Most routing socket operations require root
privileges, but unprivileged users may send RTM_GET messages to obtain
information about routing table entries.
II. Problem Description
The rtsock_msg_buffer() function serializes routing information into a buffer.
As a part of this, it copies sockaddr structures into a sockaddr_storage
structure on the stack. It assumes that the source sockaddr length field had
already been validated, but this is not necessarily the case, and it's possible
for a malicious userspace program to craft a request which triggers a 127-byte
overflow.
In practice, this overflow immediately overwrites the canary for the
rtsock_msg_buffer() stack frame, resulting in a panic once the function
returns.
III. Impact
The bug allows an unprivileged user to crash the kernel by triggering a stack
buffer overflow in rtsock_msg_buffer(). In particular, the overflow will
corrupt a stack canary value that is verified when the function returns; this
mitigates the impact of the stack overflow by triggering a kernel panic.
Other kernel bugs may exist which allow userspace to find the canary value and
thus defeat the mitigation, at which point local privilege escalation may be
possible.
IV. Workaround
No workaround is available.
V. Solution
Upgrade your vulnerable system to a supported FreeBSD stable or
release / security branch (releng) dated after the correction date.
Perform one of the following:
1) To update your vulnerable system installed from base system packages:
Systems running a 15.0-RELEASE version of FreeBSD on the amd64 or arm64
platforms, which were installed using base system packages, can be updated
via the pkg(8) utility:
# pkg upgrade -r FreeBSD-base
# shutdown -r +10min "Rebooting for a security update"
2) To update your vulnerable system installed from binary distribution sets:
Systems running a RELEASE version of FreeBSD on the amd64 or arm64 platforms,
or the i386 platform on FreeBSD 13, which were not installed using base
system packages, can be updated via the freebsd-update(8) utility:
# freebsd-update fetch
# freebsd-update install
# shutdown -r +10min "Rebooting for a security update"
3) To update your vulnerable system via a source code patch:
The following patches have been verified to apply to the applicable
FreeBSD release branches.
a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.
# fetch https://security.FreeBSD.org/patches/SA-26:05/route.patch
# fetch https://security.FreeBSD.org/patches/SA-26:05/route.patch.asc
# gpg --verify route.patch.asc
b) Apply the patch. Execute the following commands as root:
# cd /usr/src
# patch < /path/to/patch
c) Recompile your kernel as described in
<URL:https://www.FreeBSD.org/handbook/kernelconfig.html> and reboot the
system.
VI. Correction details
This issue is corrected as of the corresponding Git commit hash in the
following stable and release branches:
Branch/path Hash Revision
- -------------------------------------------------------------------------
stable/15/ df932377e7dd stable/15-n282455
releng/15.0/ 5de6a55c70ba releng/15.0-n281009
stable/14/ 1eb2beb3686c stable/14-n273785
releng/14.4/ 7465d0b094b7 releng/14.4-n273667
releng/14.3/ d521badafdaa releng/14.3-n271474
stable/13/ 8b476ffc4ea3 stable/13-n259798
releng/13.5/ c2e2bfbd9e09 releng/13.5-n259205
- -------------------------------------------------------------------------
Run the following command to see which files were modified by a
particular commit:
# git show --stat <commit hash>
Or visit the following URL, replacing NNNNNN with the hash:
<URL:https://cgit.freebsd.org/src/commit/?id=NNNNNN>
To determine the commit count in a working tree (for comparison against
nNNNNNN in the table above), run:
# git rev-list --count --first-parent HEAD
VII. References
<URL:https://www.cve.org/CVERecord?id=CVE-2026-3038>
The latest revision of this advisory is available at
<URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-26:05.route.asc>
-----BEGIN PGP SIGNATURE-----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=V8QD
-----END PGP SIGNATURE-----
FreeBSD Security Advisory FreeBSD-SA-26:04.jail
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
=============================================================================
FreeBSD-SA-26:04.jail Security Advisory
The FreeBSD Project
Topic: Jail chroot escape via fd exchange with a different jail
Category: core
Module: jail
Announced: 2026-02-24
Affects: FreeBSD 14.3 and 13.5.
Corrected: 2025-07-29 12:49:03 UTC (stable/14, 14.3-STABLE)
2026-02-24 16:01:32 UTC (releng/14.3, 14.3-RELEASE-p9)
2026-02-09 20:44:00 UTC (stable/13, 13.4-STABLE)
2026-02-24 16:04:42 UTC (releng/13.5, 13.5-RELEASE-p10)
CVE Name: CVE-2025-15576
For general information regarding FreeBSD Security Advisories,
including descriptions of the fields above, security branches, and the
following sections, please visit <URL:https://security.FreeBSD.org/>.
I. Background
Jails are an operating system virtualization technology which allow
administrators to confine processes within an environment with limited ability
to affect the system outside of that environment. In particular, jailed
processes typically have their filesystem access restricted by a chroot-like
mechanism.
nullfs(4) is a pseudo-filesystem which allows a directory to be mounted at
another point in the filesystem hierarchy.
unix domain sockets are a mechanism for interprocess communication. They
behave similarly to Internet sockets but are identified by names in the local
filesystem. unix domain sockets allow processes to exchange file descriptors
using control messages.
II. Problem Description
If two sibling jails are restricted to separate filesystem trees, which is to
say that neither of the two jail root directories is an ancestor of the other,
jailed processes may nonetheless be able to access a shared directory via a
nullfs mount, if the administrator has configured one.
In this case, cooperating processes in the two jails may establish a connection
using a unix domain socket and exchange directory descriptors with each other.
When performing a filesystem name lookup, at each step of the lookup, the
kernel checks whether the lookup would descend below the jail root of the
current process. If the jail root directory is not encountered, the lookup
continues.
III. Impact
In a configuration where processes in two different jails are able to exchange
file descriptors using a unix domain socket, it is possible for a jailed
process to receive a directory for a descriptor that is below that process'
jail root. This enables full filesystem access for a jailed process, breaking
the chroot.
Note that the system administrator is still responsible for ensuring that an
unprivileged user on the jail host is not able to pass directory descriptors
to a jailed process, even in a patched kernel.
IV. Workaround
No workaround is available. Note that in order to exploit this problem, an
attacker requires control over processes in two jails which share a nullfs
mount in which a unix socket can be installed.
V. Solution
Upgrade your vulnerable system to a supported FreeBSD stable or
release / security branch (releng) dated after the correction date.
Perform one of the following:
1) To update your vulnerable system installed from binary distribution sets:
Systems running a RELEASE version of FreeBSD on the amd64 or arm64 platforms,
or the i386 platform on FreeBSD 13, which were not installed using base
system packages, can be updated via the freebsd-update(8) utility:
# freebsd-update fetch
# freebsd-update install
# shutdown -r +10min "Rebooting for a security update"
2) To update your vulnerable system via a source code patch:
The following patches have been verified to apply to the applicable
FreeBSD release branches.
a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.
[FreeBSD 14.3]
# fetch https://security.FreeBSD.org/patches/SA-26:04/jail-14.patch
# fetch https://security.FreeBSD.org/patches/SA-26:04/jail-14.patch.asc
# gpg --verify jail-14.patch.asc
[FreeBSD 13.5]
# fetch https://security.FreeBSD.org/patches/SA-26:04/jail-13.patch
# fetch https://security.FreeBSD.org/patches/SA-26:04/jail-13.patch.asc
# gpg --verify jail-13.patch.asc
b) Apply the patch. Execute the following commands as root:
# cd /usr/src
# patch < /path/to/patch
c) Recompile your kernel as described in
<URL:https://www.FreeBSD.org/handbook/kernelconfig.html> and reboot the
system.
VI. Correction details
This issue is corrected as of the corresponding Git commit hash in the
following stable and release branches:
Branch/path Hash Revision
- -------------------------------------------------------------------------
stable/14/ 3ad3ab5f9b6e stable/14-n272076
releng/14.3/ fbc35b3e6615 releng/14.3-n271471
stable/13/ 73530e4c2ea9 stable/13-n259752
releng/13.5/ e6b96891ef7c releng/13.5-n259202
- -------------------------------------------------------------------------
Run the following command to see which files were modified by a
particular commit:
# git show --stat <commit hash>
Or visit the following URL, replacing NNNNNN with the hash:
<URL:https://cgit.freebsd.org/src/commit/?id=NNNNNN>
To determine the commit count in a working tree (for comparison against
nNNNNNN in the table above), run:
# git rev-list --count --first-parent HEAD
VII. References
<URL:https://www.cve.org/CVERecord?id=CVE-2025-15576>
The latest revision of this advisory is available at
<URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-26:04.jail.asc>
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEthUnfoEIffdcgYM7bljekB8AGu8FAmmd0NwACgkQbljekB8A
Gu9WrxAAzgjxobnwhy+3RrD4XSOViKv7Dk6va/cqZtiP+SEv1lwM86P4aeUbqCOL
XPGItri1El9gQoBYsLS/b5ODbevV/CBaTeZbGwm129B9xdrJ4lQgQrDBh3qgo55k
OxQTnZbJgnF0YtjcSnkC+oWs4selpADEevEe2ohVUrV4OjXjVoCc3hVibPPwFh+8
G5lPqcI26kXXimjb+zC+5yFQwNy/an9sYeiVnYceCuAOxxoV0Uf23Z5Ndc5oPBUD
lYMfrfuqmuhX6AtxTSU7x4BDx4MGTDIMYjU/LXptzMI5bpvqUy4F4lqx0t8vXV8F
T8vpbzGt8uhyRoD9Wp9LCIS7PpjBNm3YINY4Zd9z46tiC5ItTSV5mkJzatDB2zW+
4iMcFQxHFGksHyrGn3epYKm1C3NtbKc5lEVHnKZqg11H2xUtDkTRn8AVcy8a9Bh+
FDo1+yAb96W5by9UGA7nCdF8xwr9+ea/k6JDDfHxgVsOKzOgXsh7wmJ686kTIT2I
2REIMLY79xs50Lii5EMvN1oSjXxb7+WFphe+XCoH39JDTI3ekg7EpnFHcXLzMaVt
rciDlmPBU8h5A8U8GyI359DbIlha2IY5R2yC/opHUkOq/wBDJUZcL2y41BEH11jb
uFxRavagcRePVrSHSuXOH1vSdmsdrtl/h7HBP83J4X6ZG3nnr90=
=cwB8
-----END PGP SIGNATURE-----
Hash: SHA512
=============================================================================
FreeBSD-SA-26:04.jail Security Advisory
The FreeBSD Project
Topic: Jail chroot escape via fd exchange with a different jail
Category: core
Module: jail
Announced: 2026-02-24
Affects: FreeBSD 14.3 and 13.5.
Corrected: 2025-07-29 12:49:03 UTC (stable/14, 14.3-STABLE)
2026-02-24 16:01:32 UTC (releng/14.3, 14.3-RELEASE-p9)
2026-02-09 20:44:00 UTC (stable/13, 13.4-STABLE)
2026-02-24 16:04:42 UTC (releng/13.5, 13.5-RELEASE-p10)
CVE Name: CVE-2025-15576
For general information regarding FreeBSD Security Advisories,
including descriptions of the fields above, security branches, and the
following sections, please visit <URL:https://security.FreeBSD.org/>.
I. Background
Jails are an operating system virtualization technology which allow
administrators to confine processes within an environment with limited ability
to affect the system outside of that environment. In particular, jailed
processes typically have their filesystem access restricted by a chroot-like
mechanism.
nullfs(4) is a pseudo-filesystem which allows a directory to be mounted at
another point in the filesystem hierarchy.
unix domain sockets are a mechanism for interprocess communication. They
behave similarly to Internet sockets but are identified by names in the local
filesystem. unix domain sockets allow processes to exchange file descriptors
using control messages.
II. Problem Description
If two sibling jails are restricted to separate filesystem trees, which is to
say that neither of the two jail root directories is an ancestor of the other,
jailed processes may nonetheless be able to access a shared directory via a
nullfs mount, if the administrator has configured one.
In this case, cooperating processes in the two jails may establish a connection
using a unix domain socket and exchange directory descriptors with each other.
When performing a filesystem name lookup, at each step of the lookup, the
kernel checks whether the lookup would descend below the jail root of the
current process. If the jail root directory is not encountered, the lookup
continues.
III. Impact
In a configuration where processes in two different jails are able to exchange
file descriptors using a unix domain socket, it is possible for a jailed
process to receive a directory for a descriptor that is below that process'
jail root. This enables full filesystem access for a jailed process, breaking
the chroot.
Note that the system administrator is still responsible for ensuring that an
unprivileged user on the jail host is not able to pass directory descriptors
to a jailed process, even in a patched kernel.
IV. Workaround
No workaround is available. Note that in order to exploit this problem, an
attacker requires control over processes in two jails which share a nullfs
mount in which a unix socket can be installed.
V. Solution
Upgrade your vulnerable system to a supported FreeBSD stable or
release / security branch (releng) dated after the correction date.
Perform one of the following:
1) To update your vulnerable system installed from binary distribution sets:
Systems running a RELEASE version of FreeBSD on the amd64 or arm64 platforms,
or the i386 platform on FreeBSD 13, which were not installed using base
system packages, can be updated via the freebsd-update(8) utility:
# freebsd-update fetch
# freebsd-update install
# shutdown -r +10min "Rebooting for a security update"
2) To update your vulnerable system via a source code patch:
The following patches have been verified to apply to the applicable
FreeBSD release branches.
a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.
[FreeBSD 14.3]
# fetch https://security.FreeBSD.org/patches/SA-26:04/jail-14.patch
# fetch https://security.FreeBSD.org/patches/SA-26:04/jail-14.patch.asc
# gpg --verify jail-14.patch.asc
[FreeBSD 13.5]
# fetch https://security.FreeBSD.org/patches/SA-26:04/jail-13.patch
# fetch https://security.FreeBSD.org/patches/SA-26:04/jail-13.patch.asc
# gpg --verify jail-13.patch.asc
b) Apply the patch. Execute the following commands as root:
# cd /usr/src
# patch < /path/to/patch
c) Recompile your kernel as described in
<URL:https://www.FreeBSD.org/handbook/kernelconfig.html> and reboot the
system.
VI. Correction details
This issue is corrected as of the corresponding Git commit hash in the
following stable and release branches:
Branch/path Hash Revision
- -------------------------------------------------------------------------
stable/14/ 3ad3ab5f9b6e stable/14-n272076
releng/14.3/ fbc35b3e6615 releng/14.3-n271471
stable/13/ 73530e4c2ea9 stable/13-n259752
releng/13.5/ e6b96891ef7c releng/13.5-n259202
- -------------------------------------------------------------------------
Run the following command to see which files were modified by a
particular commit:
# git show --stat <commit hash>
Or visit the following URL, replacing NNNNNN with the hash:
<URL:https://cgit.freebsd.org/src/commit/?id=NNNNNN>
To determine the commit count in a working tree (for comparison against
nNNNNNN in the table above), run:
# git rev-list --count --first-parent HEAD
VII. References
<URL:https://www.cve.org/CVERecord?id=CVE-2025-15576>
The latest revision of this advisory is available at
<URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-26:04.jail.asc>
-----BEGIN PGP SIGNATURE-----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=cwB8
-----END PGP SIGNATURE-----
Subscribe to:
Comments (Atom)