ubuntu jammy v1.775
Metadata:
BOSH Agent Version: 2.734.0
Kernel Version: 5.15.0.133.132
USNs:
Title: USN-7241-1 -- Bind vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7241-1
Priorities: medium
Description:
Toshifumi Sakaguchi discovered that Bind incorrectly handled many records in the additional section. A remote attacker could possibly use this issue to cause Bind to consume CPU resources, leading to a denial of service. (CVE-2024-11187) Jean-François Billaud discovered that the Bind DNS-over-HTTPS implementation incorrectly handled a heavy query load. A remote attacker could possibly use this issue to cause Bind to consume resources, leading to a denial of service. (CVE-2024-12705) Update Instructions: Run sudo pro fix USN-7241-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: bind9 - 1:9.18.30-0ubuntu0.22.04.2 bind9-dev - 1:9.18.30-0ubuntu0.22.04.2 bind9-dnsutils - 1:9.18.30-0ubuntu0.22.04.2 bind9-doc - 1:9.18.30-0ubuntu0.22.04.2 bind9-host - 1:9.18.30-0ubuntu0.22.04.2 bind9-libs - 1:9.18.30-0ubuntu0.22.04.2 bind9-utils - 1:9.18.30-0ubuntu0.22.04.2 bind9utils - 1:9.18.30-0ubuntu0.22.04.2 dnsutils - 1:9.18.30-0ubuntu0.22.04.2 No subscription required
CVEs:
Title: USN-7244-1 -- Jinja2 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7244-1
Priorities: medium
Description:
It was discovered that Jinja2 incorrectly handled certain filenames when compiling template content. An attacker could possibly use this issue to execute arbitrary code. (CVE-2024-56201) It was discovered that Jinja2 incorrectly handled string formatting calls. An attacker could possibly use this issue to execute arbitrary code. (CVE-2024-56326) Update Instructions: Run sudo pro fix USN-7244-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-jinja2-doc - 3.0.3-1ubuntu0.3 python3-jinja2 - 3.0.3-1ubuntu0.3 No subscription required
CVEs:
Title: USN-7257-1 -- Kerberos vulnerability
URL: https://ubuntu.com/security/notices/USN-7257-1
Priorities: medium
Description:
Goldberg, Miro Haller, Nadia Heninger, Mike Milano, Dan Shumow, Marc Stevens, and Adam Suhl discovered that Kerberos incorrectly authenticated certain responses. An attacker able to intercept communications between a RADIUS client and server could possibly use this issue to forge responses, bypass authentication, and access network devices and services. This update introduces support for the Message-Authenticator attribute in non-EAP authentication methods for communications between Kerberos and a RADIUS server. Update Instructions: Run sudo pro fix USN-7257-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: krb5-admin-server - 1.19.2-2ubuntu0.5 krb5-doc - 1.19.2-2ubuntu0.5 krb5-gss-samples - 1.19.2-2ubuntu0.5 krb5-k5tls - 1.19.2-2ubuntu0.5 krb5-kdc - 1.19.2-2ubuntu0.5 krb5-kdc-ldap - 1.19.2-2ubuntu0.5 krb5-kpropd - 1.19.2-2ubuntu0.5 krb5-locales - 1.19.2-2ubuntu0.5 krb5-multidev - 1.19.2-2ubuntu0.5 krb5-otp - 1.19.2-2ubuntu0.5 krb5-pkinit - 1.19.2-2ubuntu0.5 krb5-user - 1.19.2-2ubuntu0.5 libgssapi-krb5-2 - 1.19.2-2ubuntu0.5 libgssrpc4 - 1.19.2-2ubuntu0.5 libk5crypto3 - 1.19.2-2ubuntu0.5 libkadm5clnt-mit12 - 1.19.2-2ubuntu0.5 libkadm5srv-mit12 - 1.19.2-2ubuntu0.5 libkdb5-10 - 1.19.2-2ubuntu0.5 libkrad-dev - 1.19.2-2ubuntu0.5 libkrad0 - 1.19.2-2ubuntu0.5 libkrb5-3 - 1.19.2-2ubuntu0.5 libkrb5-dev - 1.19.2-2ubuntu0.5 libkrb5support0 - 1.19.2-2ubuntu0.5 No subscription required
CVEs:
Title: USN-7259-1 -- GNU C Library vulnerability
URL: https://ubuntu.com/security/notices/USN-7259-1
Priorities: medium
Description:
It was discovered that GNU C Library incorrectly handled memory when using the assert function. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. Update Instructions: Run sudo pro fix USN-7259-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: glibc-doc - 2.35-0ubuntu3.9 glibc-source - 2.35-0ubuntu3.9 libc-bin - 2.35-0ubuntu3.9 libc-dev-bin - 2.35-0ubuntu3.9 libc-devtools - 2.35-0ubuntu3.9 libc6 - 2.35-0ubuntu3.9 libc6-amd64 - 2.35-0ubuntu3.9 libc6-dev - 2.35-0ubuntu3.9 libc6-dev-amd64 - 2.35-0ubuntu3.9 libc6-dev-i386 - 2.35-0ubuntu3.9 libc6-dev-s390 - 2.35-0ubuntu3.9 libc6-dev-x32 - 2.35-0ubuntu3.9 libc6-i386 - 2.35-0ubuntu3.9 libc6-prof - 2.35-0ubuntu3.9 libc6-s390 - 2.35-0ubuntu3.9 libc6-x32 - 2.35-0ubuntu3.9 locales - 2.35-0ubuntu3.9 locales-all - 2.35-0ubuntu3.9 nscd - 2.35-0ubuntu3.9 No subscription required
CVEs:
Title: USN-7261-1 -- Vim vulnerability
URL: https://ubuntu.com/security/notices/USN-7261-1
Priorities: medium
Description:
It was discovered that Vim incorrectly handled certain internal calls when scrolling a window. An attacker could possibly use this issue to cause a denial of service. Update Instructions: Run sudo pro fix USN-7261-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: vim - 2:8.2.3995-1ubuntu2.23 vim-athena - 2:8.2.3995-1ubuntu2.23 vim-common - 2:8.2.3995-1ubuntu2.23 vim-doc - 2:8.2.3995-1ubuntu2.23 vim-gtk - 2:8.2.3995-1ubuntu2.23 vim-gtk3 - 2:8.2.3995-1ubuntu2.23 vim-gui-common - 2:8.2.3995-1ubuntu2.23 vim-nox - 2:8.2.3995-1ubuntu2.23 vim-runtime - 2:8.2.3995-1ubuntu2.23 vim-tiny - 2:8.2.3995-1ubuntu2.23 xxd - 2:8.2.3995-1ubuntu2.23 No subscription required
CVEs:
Title: USN-7269-1 -- Intel Microcode vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7269-1
Priorities: medium
Description:
Ke Sun, Paul Grosen and Alyssa Milburn discovered that some Intel® Processors did not properly implement Finite State Machines (FSMs) in Hardware Logic. A local privileged attacker could use this issue to cause a denial of service. (CVE-2024-31068) It was discovered that some Intel® Processors with Intel® SGX did not properly restrict access to the EDECCSSA user leaf function. A local authenticated attacker could use this issue to cause a denial of service. (CVE-2024-36293) Ke Sun, Alyssa Milburn, Benoit Morgan, and Erik Bjorge discovered that the UEFI firmware for some Intel® processors did not properly restrict access. An authenticated local attacker could use this issue to cause a denial of service. (CVE-2024-39279) Update Instructions: Run sudo pro fix USN-7269-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: intel-microcode - 3.20250211.0ubuntu0.22.04.1 No subscription required
CVEs:
- https://ubuntu.com/security/CVE-2024-31068
- https://ubuntu.com/security/CVE-2024-36293
- https://ubuntu.com/security/CVE-2024-39279
Title: USN-7275-1 -- Libtasn1 vulnerability
URL: https://ubuntu.com/security/notices/USN-7275-1
Priorities: medium
Description:
Bing Shi discovered that Libtasn1 inefficiently handled certificates. An attacker could possibly use this issue to increase resource utilization leading to a denial of service. Update Instructions: Run sudo pro fix USN-7275-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libtasn1-6 - 4.18.0-4ubuntu0.1 libtasn1-6-dev - 4.18.0-4ubuntu0.1 libtasn1-bin - 4.18.0-4ubuntu0.1 libtasn1-doc - 4.18.0-4ubuntu0.1 No subscription required
CVEs:
Title: USN-7278-1 -- OpenSSL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7278-1
Priorities: low
Description:
George Pantelakis and Alicja Kario discovered that OpenSSL had a timing side-channel when performing ECDSA signature computations. A remote attacker could possibly use this issue to recover private data. (CVE-2024-13176) It was discovered that OpenSSL incorrectly handled certain memory operations when using low-level GF(2^m) elliptic curve APIs with untrusted explicit values for the field polynomial. When being used in this uncommon fashion, a remote attacker could use this issue to cause OpenSSL to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2024-9143) Update Instructions: Run sudo pro fix USN-7278-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libssl-dev - 3.0.2-0ubuntu1.19 libssl-doc - 3.0.2-0ubuntu1.19 libssl3 - 3.0.2-0ubuntu1.19 openssl - 3.0.2-0ubuntu1.19 No subscription required
CVEs:
Title: USN-7280-1 -- Python vulnerability
URL: https://ubuntu.com/security/notices/USN-7280-1
Priorities: medium
Description:
It was discovered that Python incorrectly handled parsing domain names that included square brackets. A remote attacker could possibly use this issue to perform a Server-Side Request Forgery (SSRF) attack. Update Instructions: Run sudo pro fix USN-7280-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: idle-python3.10 - 3.10.12-122.04.9 libpython3.10 - 3.10.12-122.04.9 libpython3.10-dev - 3.10.12-122.04.9 libpython3.10-minimal - 3.10.12-122.04.9 libpython3.10-stdlib - 3.10.12-122.04.9 libpython3.10-testsuite - 3.10.12-122.04.9 python3.10 - 3.10.12-122.04.9 python3.10-dev - 3.10.12-122.04.9 python3.10-doc - 3.10.12-122.04.9 python3.10-examples - 3.10.12-122.04.9 python3.10-full - 3.10.12-122.04.9 python3.10-minimal - 3.10.12-122.04.9 python3.10-nopie - 3.10.12-122.04.9 python3.10-venv - 3.10.12-122.04.9 No subscription required
CVEs:
Title: USN-7281-1 -- GnuTLS vulnerability
URL: https://ubuntu.com/security/notices/USN-7281-1
Priorities: medium
Description:
Bing Shi discovered that GnuTLS incorrectly handled decoding certain DER-encoded certificates. A remote attacker could possibly use this issue to cause GnuTLS to consume resources, leading to a denial of service. Update Instructions: Run sudo pro fix USN-7281-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gnutls-bin - 3.7.3-4ubuntu1.6 gnutls-doc - 3.7.3-4ubuntu1.6 guile-gnutls - 3.7.3-4ubuntu1.6 libgnutls-dane0 - 3.7.3-4ubuntu1.6 libgnutls-openssl27 - 3.7.3-4ubuntu1.6 libgnutls28-dev - 3.7.3-4ubuntu1.6 libgnutls30 - 3.7.3-4ubuntu1.6 libgnutlsxx28 - 3.7.3-4ubuntu1.6 No subscription required
CVEs:
Title: USN-7288-1 -- Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7288-1
Priorities: low,high,medium
Description:
Attila Szász discovered that the HFS+ file system implementation in the Linux Kernel contained a heap overflow vulnerability. An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2025-0927) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - x86 architecture; - Block layer subsystem; - ACPI drivers; - GPU drivers; - HID subsystem; - I2C subsystem; - IIO ADC drivers; - IIO subsystem; - InfiniBand drivers; - IOMMU subsystem; - IRQ chip drivers; - Multiple devices driver; - Media drivers; - Network drivers; - STMicroelectronics network drivers; - Parport drivers; - Pin controllers subsystem; - Direct Digital Synthesis drivers; - TCM subsystem; - TTY drivers; - USB Dual Role (OTG-ready) Controller drivers; - USB Serial drivers; - USB Type-C support driver; - USB Type-C Connector System Software Interface driver; - BTRFS file system; - File systems infrastructure; - Network file system (NFS) client; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - User-space API (UAPI); - io_uring subsystem; - BPF subsystem; - Timer substystem drivers; - Tracing infrastructure; - Closures library; - Memory management; - Amateur Radio drivers; - Bluetooth subsystem; - Networking core; - IPv4 networking; - MAC80211 subsystem; - Multipath TCP; - Netfilter; - Network traffic control; - SCTP protocol; - XFRM subsystem; - Key management; - FireWire sound drivers; - HD-audio driver; - QCOM ASoC drivers; - STMicroelectronics SoC drivers; - KVM core; (CVE-2024-50202, CVE-2024-50208, CVE-2024-50265, CVE-2024-41080, CVE-2024-50101, CVE-2024-39497, CVE-2024-50153, CVE-2024-50162, CVE-2024-50150, CVE-2024-50115, CVE-2024-53066, CVE-2024-50279, CVE-2024-50116, CVE-2024-50218, CVE-2024-53104, CVE-2024-50086, CVE-2024-50154, CVE-2024-50244, CVE-2024-50074, CVE-2024-50278, CVE-2024-50262, CVE-2024-50168, CVE-2024-50134, CVE-2024-53063, CVE-2024-50236, CVE-2024-50082, CVE-2024-50234, CVE-2024-50247, CVE-2024-50282, CVE-2024-50267, CVE-2024-40965, CVE-2024-50229, CVE-2024-50110, CVE-2024-35887, CVE-2024-50302, CVE-2024-50036, CVE-2024-50209, CVE-2024-50287, CVE-2024-50245, CVE-2024-50072, CVE-2024-50301, CVE-2024-50201, CVE-2024-53097, CVE-2024-40953, CVE-2024-50085, CVE-2024-50299, CVE-2024-50292, CVE-2024-50269, CVE-2024-50182, CVE-2024-50233, CVE-2024-53088, CVE-2024-50259, CVE-2024-50232, CVE-2024-53055, CVE-2024-50195, CVE-2024-50273, CVE-2024-42291, CVE-2024-50192, CVE-2024-50251, CVE-2024-50193, CVE-2024-50142, CVE-2024-53101, CVE-2024-50205, CVE-2024-26718, CVE-2024-50167, CVE-2024-50010, CVE-2024-50230, CVE-2024-41066, CVE-2024-50194, CVE-2024-50148, CVE-2024-50151, CVE-2024-50127, CVE-2024-50160, CVE-2023-52913, CVE-2024-53052, CVE-2024-50156, CVE-2024-50141, CVE-2024-50103, CVE-2024-50296, CVE-2024-50257, CVE-2024-50199, CVE-2024-50128, CVE-2024-50058, CVE-2024-50099, CVE-2024-50290, CVE-2024-53042, CVE-2024-50295, CVE-2024-50268, CVE-2024-50163, CVE-2024-53058, CVE-2024-50185, CVE-2024-50117, CVE-2024-50237, CVE-2024-50083, CVE-2024-50131, CVE-2024-50196, CVE-2024-42252, CVE-2024-50143, CVE-2024-50171, CVE-2024-50249, CVE-2024-53059, CVE-2024-50198, CVE-2024-53061) Update Instructions: Run sudo pro fix USN-7288-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-5.15.0-133-lowlatency - 5.15.0-133.143 linux-buildinfo-5.15.0-133-lowlatency-64k - 5.15.0-133.143 linux-cloud-tools-5.15.0-133-lowlatency - 5.15.0-133.143 linux-headers-5.15.0-133-lowlatency - 5.15.0-133.143 linux-headers-5.15.0-133-lowlatency-64k - 5.15.0-133.143 linux-image-5.15.0-133-lowlatency - 5.15.0-133.143 linux-image-5.15.0-133-lowlatency-64k - 5.15.0-133.143 linux-image-unsigned-5.15.0-133-lowlatency - 5.15.0-133.143 linux-image-unsigned-5.15.0-133-lowlatency-64k - 5.15.0-133.143 linux-lowlatency-cloud-tools-5.15.0-133 - 5.15.0-133.143 linux-lowlatency-headers-5.15.0-133 - 5.15.0-133.143 linux-lowlatency-tools-5.15.0-133 - 5.15.0-133.143 linux-modules-5.15.0-133-lowlatency - 5.15.0-133.143 linux-modules-5.15.0-133-lowlatency-64k - 5.15.0-133.143 linux-modules-iwlwifi-5.15.0-133-lowlatency - 5.15.0-133.143 linux-tools-5.15.0-133-lowlatency - 5.15.0-133.143 linux-tools-5.15.0-133-lowlatency-64k - 5.15.0-133.143 No subscription required linux-buildinfo-5.15.0-133-generic - 5.15.0-133.144 linux-buildinfo-5.15.0-133-generic-64k - 5.15.0-133.144 linux-buildinfo-5.15.0-133-generic-lpae - 5.15.0-133.144 linux-cloud-tools-5.15.0-133 - 5.15.0-133.144 linux-cloud-tools-5.15.0-133-generic - 5.15.0-133.144 linux-cloud-tools-common - 5.15.0-133.144 linux-doc - 5.15.0-133.144 linux-headers-5.15.0-133 - 5.15.0-133.144 linux-headers-5.15.0-133-generic - 5.15.0-133.144 linux-headers-5.15.0-133-generic-64k - 5.15.0-133.144 linux-headers-5.15.0-133-generic-lpae - 5.15.0-133.144 linux-image-5.15.0-133-generic - 5.15.0-133.144 linux-image-5.15.0-133-generic-64k - 5.15.0-133.144 linux-image-5.15.0-133-generic-lpae - 5.15.0-133.144 linux-image-unsigned-5.15.0-133-generic - 5.15.0-133.144 linux-image-unsigned-5.15.0-133-generic-64k - 5.15.0-133.144 linux-libc-dev - 5.15.0-133.144 linux-modules-5.15.0-133-generic - 5.15.0-133.144 linux-modules-5.15.0-133-generic-64k - 5.15.0-133.144 linux-modules-5.15.0-133-generic-lpae - 5.15.0-133.144 linux-modules-extra-5.15.0-133-generic - 5.15.0-133.144 linux-modules-iwlwifi-5.15.0-133-generic - 5.15.0-133.144 linux-source-5.15.0 - 5.15.0-133.144 linux-tools-5.15.0-133 - 5.15.0-133.144 linux-tools-5.15.0-133-generic - 5.15.0-133.144 linux-tools-5.15.0-133-generic-64k - 5.15.0-133.144 linux-tools-5.15.0-133-generic-lpae - 5.15.0-133.144 linux-tools-common - 5.15.0-133.144 linux-tools-host - 5.15.0-133.144 No subscription required linux-cloud-tools-lowlatency - 5.15.0.133.120 linux-cloud-tools-lowlatency-hwe-20.04 - 5.15.0.133.120 linux-cloud-tools-lowlatency-hwe-20.04-edge - 5.15.0.133.120 linux-headers-lowlatency - 5.15.0.133.120 linux-headers-lowlatency-64k - 5.15.0.133.120 linux-headers-lowlatency-64k-hwe-20.04 - 5.15.0.133.120 linux-headers-lowlatency-64k-hwe-20.04-edge - 5.15.0.133.120 linux-headers-lowlatency-hwe-20.04 - 5.15.0.133.120 linux-headers-lowlatency-hwe-20.04-edge - 5.15.0.133.120 linux-image-lowlatency - 5.15.0.133.120 linux-image-lowlatency-64k - 5.15.0.133.120 linux-image-lowlatency-64k-hwe-20.04 - 5.15.0.133.120 linux-image-lowlatency-64k-hwe-20.04-edge - 5.15.0.133.120 linux-image-lowlatency-hwe-20.04 - 5.15.0.133.120 linux-image-lowlatency-hwe-20.04-edge - 5.15.0.133.120 linux-lowlatency - 5.15.0.133.120 linux-lowlatency-64k - 5.15.0.133.120 linux-lowlatency-64k-hwe-20.04 - 5.15.0.133.120 linux-lowlatency-64k-hwe-20.04-edge - 5.15.0.133.120 linux-lowlatency-hwe-20.04 - 5.15.0.133.120 linux-lowlatency-hwe-20.04-edge - 5.15.0.133.120 linux-tools-lowlatency - 5.15.0.133.120 linux-tools-lowlatency-64k - 5.15.0.133.120 linux-tools-lowlatency-64k-hwe-20.04 - 5.15.0.133.120 linux-tools-lowlatency-64k-hwe-20.04-edge - 5.15.0.133.120 linux-tools-lowlatency-hwe-20.04 - 5.15.0.133.120 linux-tools-lowlatency-hwe-20.04-edge - 5.15.0.133.120 No subscription required linux-cloud-tools-generic - 5.15.0.133.132 linux-cloud-tools-generic-hwe-20.04 - 5.15.0.133.132 linux-cloud-tools-generic-hwe-20.04-edge - 5.15.0.133.132 linux-cloud-tools-virtual - 5.15.0.133.132 linux-cloud-tools-virtual-hwe-20.04 - 5.15.0.133.132 linux-cloud-tools-virtual-hwe-20.04-edge - 5.15.0.133.132 linux-crashdump - 5.15.0.133.132 linux-generic - 5.15.0.133.132 linux-generic-64k - 5.15.0.133.132 linux-generic-64k-hwe-20.04 - 5.15.0.133.132 linux-generic-64k-hwe-20.04-edge - 5.15.0.133.132 linux-generic-hwe-20.04 - 5.15.0.133.132 linux-generic-hwe-20.04-edge - 5.15.0.133.132 linux-generic-lpae - 5.15.0.133.132 linux-generic-lpae-hwe-20.04 - 5.15.0.133.132 linux-generic-lpae-hwe-20.04-edge - 5.15.0.133.132 linux-headers-generic - 5.15.0.133.132 linux-headers-generic-64k - 5.15.0.133.132 linux-headers-generic-64k-hwe-20.04 - 5.15.0.133.132 linux-headers-generic-64k-hwe-20.04-edge - 5.15.0.133.132 linux-headers-generic-hwe-20.04 - 5.15.0.133.132 linux-headers-generic-hwe-20.04-edge - 5.15.0.133.132 linux-headers-generic-lpae - 5.15.0.133.132 linux-headers-generic-lpae-hwe-20.04 - 5.15.0.133.132 linux-headers-generic-lpae-hwe-20.04-edge - 5.15.0.133.132 linux-headers-oem-20.04 - 5.15.0.133.132 linux-headers-virtual - 5.15.0.133.132 linux-headers-virtual-hwe-20.04 - 5.15.0.133.132 linux-headers-virtual-hwe-20.04-edge - 5.15.0.133.132 linux-image-extra-virtual - 5.15.0.133.132 linux-image-extra-virtual-hwe-20.04 - 5.15.0.133.132 linux-image-extra-virtual-hwe-20.04-edge - 5.15.0.133.132 linux-image-generic - 5.15.0.133.132 linux-image-generic-64k - 5.15.0.133.132 linux-image-generic-64k-hwe-20.04 - 5.15.0.133.132 linux-image-generic-64k-hwe-20.04-edge - 5.15.0.133.132 linux-image-generic-hwe-20.04 - 5.15.0.133.132 linux-image-generic-hwe-20.04-edge - 5.15.0.133.132 linux-image-generic-lpae - 5.15.0.133.132 linux-image-generic-lpae-hwe-20.04 - 5.15.0.133.132 linux-image-generic-lpae-hwe-20.04-edge - 5.15.0.133.132 linux-image-oem-20.04 - 5.15.0.133.132 linux-image-virtual - 5.15.0.133.132 linux-image-virtual-hwe-20.04 - 5.15.0.133.132 linux-image-virtual-hwe-20.04-edge - 5.15.0.133.132 linux-modules-iwlwifi-generic - 5.15.0.133.132 linux-oem-20.04 - 5.15.0.133.132 linux-source - 5.15.0.133.132 linux-tools-generic - 5.15.0.133.132 linux-tools-generic-64k - 5.15.0.133.132 linux-tools-generic-64k-hwe-20.04 - 5.15.0.133.132 linux-tools-generic-64k-hwe-20.04-edge - 5.15.0.133.132 linux-tools-generic-hwe-20.04 - 5.15.0.133.132 linux-tools-generic-hwe-20.04-edge - 5.15.0.133.132 linux-tools-generic-lpae - 5.15.0.133.132 linux-tools-generic-lpae-hwe-20.04 - 5.15.0.133.132 linux-tools-generic-lpae-hwe-20.04-edge - 5.15.0.133.132 linux-tools-oem-20.04 - 5.15.0.133.132 linux-tools-virtual - 5.15.0.133.132 linux-tools-virtual-hwe-20.04 - 5.15.0.133.132 linux-tools-virtual-hwe-20.04-edge - 5.15.0.133.132 linux-virtual - 5.15.0.133.132 linux-virtual-hwe-20.04 - 5.15.0.133.132 linux-virtual-hwe-20.04-edge - 5.15.0.133.132 No subscription required
CVEs:
- https://ubuntu.com/security/CVE-2023-52913
- https://ubuntu.com/security/CVE-2024-26718
- https://ubuntu.com/security/CVE-2024-35887
- https://ubuntu.com/security/CVE-2024-39497
- https://ubuntu.com/security/CVE-2024-40953
- https://ubuntu.com/security/CVE-2024-40965
- https://ubuntu.com/security/CVE-2024-41066
- https://ubuntu.com/security/CVE-2024-41080
- https://ubuntu.com/security/CVE-2024-42252
- https://ubuntu.com/security/CVE-2024-42291
- https://ubuntu.com/security/CVE-2024-50010
- https://ubuntu.com/security/CVE-2024-50036
- https://ubuntu.com/security/CVE-2024-50058
- https://ubuntu.com/security/CVE-2024-50072
- https://ubuntu.com/security/CVE-2024-50074
- https://ubuntu.com/security/CVE-2024-50082
- https://ubuntu.com/security/CVE-2024-50083
- https://ubuntu.com/security/CVE-2024-50085
- https://ubuntu.com/security/CVE-2024-50086
- https://ubuntu.com/security/CVE-2024-50099
- https://ubuntu.com/security/CVE-2024-50101
- https://ubuntu.com/security/CVE-2024-50103
- https://ubuntu.com/security/CVE-2024-50110
- https://ubuntu.com/security/CVE-2024-50115
- https://ubuntu.com/security/CVE-2024-50116
- https://ubuntu.com/security/CVE-2024-50117
- https://ubuntu.com/security/CVE-2024-50127
- https://ubuntu.com/security/CVE-2024-50128
- https://ubuntu.com/security/CVE-2024-50131
- https://ubuntu.com/security/CVE-2024-50134
- https://ubuntu.com/security/CVE-2024-50141
- https://ubuntu.com/security/CVE-2024-50142
- https://ubuntu.com/security/CVE-2024-50143
- https://ubuntu.com/security/CVE-2024-50148
- https://ubuntu.com/security/CVE-2024-50150
- https://ubuntu.com/security/CVE-2024-50151
- https://ubuntu.com/security/CVE-2024-50153
- https://ubuntu.com/security/CVE-2024-50154
- https://ubuntu.com/security/CVE-2024-50156
- https://ubuntu.com/security/CVE-2024-50160
- https://ubuntu.com/security/CVE-2024-50162
- https://ubuntu.com/security/CVE-2024-50163
- https://ubuntu.com/security/CVE-2024-50167
- https://ubuntu.com/security/CVE-2024-50168
- https://ubuntu.com/security/CVE-2024-50171
- https://ubuntu.com/security/CVE-2024-50182
- https://ubuntu.com/security/CVE-2024-50185
- https://ubuntu.com/security/CVE-2024-50192
- https://ubuntu.com/security/CVE-2024-50193
- https://ubuntu.com/security/CVE-2024-50194
- https://ubuntu.com/security/CVE-2024-50195
- https://ubuntu.com/security/CVE-2024-50196
- https://ubuntu.com/security/CVE-2024-50198
- https://ubuntu.com/security/CVE-2024-50199
- https://ubuntu.com/security/CVE-2024-50201
- https://ubuntu.com/security/CVE-2024-50202
- https://ubuntu.com/security/CVE-2024-50205
- https://ubuntu.com/security/CVE-2024-50208
- https://ubuntu.com/security/CVE-2024-50209
- https://ubuntu.com/security/CVE-2024-50218
- https://ubuntu.com/security/CVE-2024-50229
- https://ubuntu.com/security/CVE-2024-50230
- https://ubuntu.com/security/CVE-2024-50232
- https://ubuntu.com/security/CVE-2024-50233
- https://ubuntu.com/security/CVE-2024-50234
- https://ubuntu.com/security/CVE-2024-50236
- https://ubuntu.com/security/CVE-2024-50237
- https://ubuntu.com/security/CVE-2024-50244
- https://ubuntu.com/security/CVE-2024-50245
- https://ubuntu.com/security/CVE-2024-50247
- https://ubuntu.com/security/CVE-2024-50249
- https://ubuntu.com/security/CVE-2024-50251
- https://ubuntu.com/security/CVE-2024-50257
- https://ubuntu.com/security/CVE-2024-50259
- https://ubuntu.com/security/CVE-2024-50262
- https://ubuntu.com/security/CVE-2024-50265
- https://ubuntu.com/security/CVE-2024-50267
- https://ubuntu.com/security/CVE-2024-50268
- https://ubuntu.com/security/CVE-2024-50269
- https://ubuntu.com/security/CVE-2024-50273
- https://ubuntu.com/security/CVE-2024-50278
- https://ubuntu.com/security/CVE-2024-50279
- https://ubuntu.com/security/CVE-2024-50282
- https://ubuntu.com/security/CVE-2024-50287
- https://ubuntu.com/security/CVE-2024-50290
- https://ubuntu.com/security/CVE-2024-50292
- https://ubuntu.com/security/CVE-2024-50295
- https://ubuntu.com/security/CVE-2024-50296
- https://ubuntu.com/security/CVE-2024-50299
- https://ubuntu.com/security/CVE-2024-50301
- https://ubuntu.com/security/CVE-2024-50302
- https://ubuntu.com/security/CVE-2024-53042
- https://ubuntu.com/security/CVE-2024-53052
- https://ubuntu.com/security/CVE-2024-53055
- https://ubuntu.com/security/CVE-2024-53058
- https://ubuntu.com/security/CVE-2024-53059
- https://ubuntu.com/security/CVE-2024-53061
- https://ubuntu.com/security/CVE-2024-53063
- https://ubuntu.com/security/CVE-2024-53066
- https://ubuntu.com/security/CVE-2024-53088
- https://ubuntu.com/security/CVE-2024-53097
- https://ubuntu.com/security/CVE-2024-53101
- https://ubuntu.com/security/CVE-2024-53104
- https://ubuntu.com/security/CVE-2025-0927