Skip to content

ubuntu noble v1.188

Choose a tag to compare

@bosh-admin-bot bosh-admin-bot released this 08 Jan 23:03
· 684 commits to ubuntu-jammy since this release

Metadata:

BOSH Agent Version: 2.794.0
Kernel Version: 6.8.0-90.91

USNs:

Title: USN-7916-1 -- python-apt vulnerability
URL: https://ubuntu.com/security/notices/USN-7916-1
Priorities: medium
Description:
Julian Andres Klode discovered that python-apt incorrectly handled deb822 configuration files. An attacker could use this issue to cause python-apt to crash, resulting in a denial of service. Update Instructions: Run sudo pro fix USN-7916-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-apt-common - 2.7.7ubuntu5.1 python-apt-dev - 2.7.7ubuntu5.1 python-apt-doc - 2.7.7ubuntu5.1 python3-apt - 2.7.7ubuntu5.1 No subscription required
CVEs:

Title: USN-7919-1 -- GNU binutils vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7919-1
Priorities: medium
Description:
It was discovered that GNU binutils' dump_dwarf_section function could be manipulated to perform an out-of-bounds read. A local attacker could possibly use this issue to cause GNU binutils to crash, resulting in a denial of service. This issue only affected Ubuntu 25.10. (CVE-2025-11081) It was discovered that GNU binutils incorrectly handled certain files. A local attacker could possibly use this issue to cause a crash or execute arbitrary code. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 25.10. (CVE-2025-11082) It was discovered that GNU binutils incorrectly handled certain inputs. A local attacker could possibly use this issue to cause a crash or execute arbitrary code. This issue was only fixed in Ubuntu 25.10. (CVE-2025-11083) It was discovered that certain GNU binutils functions could be manipulated to perform out-of-bounds reads. A local attacker could possibly use this issue to cause GNU binutils to crash, resulting in a denial of service. (CVE-2025-11412, CVE-2025-11413, CVE-2025-11414) It was discovered that GNU binutils' _bfd_x86_elf_late_size_sections function could be manipulated to perform an out-of-bounds read. A local attacker could possibly use this issue to cause GNU binutils to crash, resulting in a denial of service. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, Ubuntu 25.04, and Ubuntu 25.10. (CVE-2025-11494) It was discovered that GNU binutils' elf_x86_64_relocate_section function could be manipulated to cause a heap-based buffer overflow. A local attacker could possibly use this issue to cause GNU binutils to crash, resulting in a denial of service. This issue was only fixed in Ubuntu 25.04 and Ubuntu 25.10. (CVE-2025-11495) Update Instructions: Run sudo pro fix USN-7919-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: binutils - 2.42-4ubuntu2.8 binutils-aarch64-linux-gnu - 2.42-4ubuntu2.8 binutils-alpha-linux-gnu - 2.42-4ubuntu2.8 binutils-arc-linux-gnu - 2.42-4ubuntu2.8 binutils-arm-linux-gnueabi - 2.42-4ubuntu2.8 binutils-arm-linux-gnueabihf - 2.42-4ubuntu2.8 binutils-common - 2.42-4ubuntu2.8 binutils-dev - 2.42-4ubuntu2.8 binutils-doc - 2.42-4ubuntu2.8 binutils-for-build - 2.42-4ubuntu2.8 binutils-for-host - 2.42-4ubuntu2.8 binutils-hppa-linux-gnu - 2.42-4ubuntu2.8 binutils-hppa64-linux-gnu - 2.42-4ubuntu2.8 binutils-i686-gnu - 2.42-4ubuntu2.8 binutils-i686-kfreebsd-gnu - 2.42-4ubuntu2.8 binutils-i686-linux-gnu - 2.42-4ubuntu2.8 binutils-ia64-linux-gnu - 2.42-4ubuntu2.8 binutils-loongarch64-linux-gnu - 2.42-4ubuntu2.8 binutils-m68k-linux-gnu - 2.42-4ubuntu2.8 binutils-multiarch - 2.42-4ubuntu2.8 binutils-multiarch-dev - 2.42-4ubuntu2.8 binutils-powerpc-linux-gnu - 2.42-4ubuntu2.8 binutils-powerpc64-linux-gnu - 2.42-4ubuntu2.8 binutils-powerpc64le-linux-gnu - 2.42-4ubuntu2.8 binutils-riscv64-linux-gnu - 2.42-4ubuntu2.8 binutils-s390x-linux-gnu - 2.42-4ubuntu2.8 binutils-sh4-linux-gnu - 2.42-4ubuntu2.8 binutils-source - 2.42-4ubuntu2.8 binutils-sparc64-linux-gnu - 2.42-4ubuntu2.8 binutils-x86-64-gnu - 2.42-4ubuntu2.8 binutils-x86-64-kfreebsd-gnu - 2.42-4ubuntu2.8 binutils-x86-64-linux-gnu - 2.42-4ubuntu2.8 binutils-x86-64-linux-gnux32 - 2.42-4ubuntu2.8 libbinutils - 2.42-4ubuntu2.8 libctf-nobfd0 - 2.42-4ubuntu2.8 libctf0 - 2.42-4ubuntu2.8 libgprofng0 - 2.42-4ubuntu2.8 libsframe1 - 2.42-4ubuntu2.8 No subscription required
CVEs:

Title: USN-7924-1 -- libpng vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7924-1
Priorities: medium
Description:
It was discovered that libpng incorrectly handled memory when processing certain PNG files, which could result in an out-of-bounds memory access. If a user or automated system were tricked into opening a specially crafted PNG file, an attacker could use this issue to cause libpng to crash, resulting in a denial of service. (CVE-2025-64505) It was discovered that libpng incorrectly handled memory when processing 8-bit images through the simplified write API with 'convert_to_8bit' enabled, which could result in an out-of-bounds memory access. If a user or automated system were tricked into opening a specially crafted 8-bit PNG file, an attacker could use this issue to cause libpng to crash, resulting in a denial of service. (CVE-2025-64506) It was discovered that libpng incorrectly handled memory when processing palette images with 'PNG_FLAG_OPTIMIZE_ALPHA' enabled, which could result in an out-of-bounds memory access. If a user or automated system were tricked into opening a specially crafted PNG file, an attacker could use this issue to cause libpng to crash, resulting in a denial of service. (CVE-2025-64720) It was discovered that libpng incorrectly handled memory when processing 6-bit interlaced PNGs with 8-bit output format, which could result in an out-of-bounds memory access. If a user or automated system were tricked into opening a specially crafted PNG file, an attacker could use this issue to cause libpng to crash, resulting in a denial of service. (CVE-2025-65018) Update Instructions: Run sudo pro fix USN-7924-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libpng-dev - 1.6.43-5ubuntu0.1 libpng-tools - 1.6.43-5ubuntu0.1 libpng16-16t64 - 1.6.43-5ubuntu0.1 No subscription required
CVEs:

Title: USN-7931-1 -- Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7931-1
Priorities: high,medium
Description:
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Cryptographic API; - Media drivers; - Memory management; - Appletalk network protocol; - Netfilter; (CVE-2025-37958, CVE-2025-38666, CVE-2025-39964, CVE-2025-39993, CVE-2025-40018) Update Instructions: Run sudo pro fix USN-7931-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1028-gkeop - 6.8.0-1028.31 linux-cloud-tools-6.8.0-1028-gkeop - 6.8.0-1028.31 linux-cloud-tools-gkeop - 6.8.0-1028.31 linux-cloud-tools-gkeop-6.8 - 6.8.0-1028.31 linux-gkeop - 6.8.0-1028.31 linux-gkeop-6.8 - 6.8.0-1028.31 linux-gkeop-cloud-tools-6.8.0-1028 - 6.8.0-1028.31 linux-gkeop-headers-6.8.0-1028 - 6.8.0-1028.31 linux-gkeop-tools-6.8.0-1028 - 6.8.0-1028.31 linux-headers-6.8.0-1028-gkeop - 6.8.0-1028.31 linux-headers-gkeop - 6.8.0-1028.31 linux-headers-gkeop-6.8 - 6.8.0-1028.31 linux-image-6.8.0-1028-gkeop - 6.8.0-1028.31 linux-image-gkeop - 6.8.0-1028.31 linux-image-gkeop-6.8 - 6.8.0-1028.31 linux-image-unsigned-6.8.0-1028-gkeop - 6.8.0-1028.31 linux-modules-6.8.0-1028-gkeop - 6.8.0-1028.31 linux-modules-extra-6.8.0-1028-gkeop - 6.8.0-1028.31 linux-modules-extra-gkeop - 6.8.0-1028.31 linux-modules-extra-gkeop-6.8 - 6.8.0-1028.31 linux-tools-6.8.0-1028-gkeop - 6.8.0-1028.31 linux-tools-gkeop - 6.8.0-1028.31 linux-tools-gkeop-6.8 - 6.8.0-1028.31 No subscription required linux-buildinfo-6.8.0-1041-oracle - 6.8.0-1041.42 linux-buildinfo-6.8.0-1041-oracle-64k - 6.8.0-1041.42 linux-headers-6.8.0-1041-oracle - 6.8.0-1041.42 linux-headers-6.8.0-1041-oracle-64k - 6.8.0-1041.42 linux-headers-oracle-6.8 - 6.8.0-1041.42 linux-headers-oracle-64k-6.8 - 6.8.0-1041.42 linux-headers-oracle-64k-lts-24.04 - 6.8.0-1041.42 linux-headers-oracle-lts-24.04 - 6.8.0-1041.42 linux-image-6.8.0-1041-oracle - 6.8.0-1041.42 linux-image-6.8.0-1041-oracle-64k - 6.8.0-1041.42 linux-image-oracle-6.8 - 6.8.0-1041.42 linux-image-oracle-64k-6.8 - 6.8.0-1041.42 linux-image-oracle-64k-lts-24.04 - 6.8.0-1041.42 linux-image-oracle-lts-24.04 - 6.8.0-1041.42 linux-image-unsigned-6.8.0-1041-oracle - 6.8.0-1041.42 linux-image-unsigned-6.8.0-1041-oracle-64k - 6.8.0-1041.42 linux-modules-6.8.0-1041-oracle - 6.8.0-1041.42 linux-modules-6.8.0-1041-oracle-64k - 6.8.0-1041.42 linux-modules-extra-6.8.0-1041-oracle - 6.8.0-1041.42 linux-modules-extra-6.8.0-1041-oracle-64k - 6.8.0-1041.42 linux-oracle-6.8 - 6.8.0-1041.42 linux-oracle-64k-6.8 - 6.8.0-1041.42 linux-oracle-64k-lts-24.04 - 6.8.0-1041.42 linux-oracle-headers-6.8.0-1041 - 6.8.0-1041.42 linux-oracle-lts-24.04 - 6.8.0-1041.42 linux-oracle-tools-6.8.0-1041 - 6.8.0-1041.42 linux-tools-6.8.0-1041-oracle - 6.8.0-1041.42 linux-tools-6.8.0-1041-oracle-64k - 6.8.0-1041.42 linux-tools-oracle-6.8 - 6.8.0-1041.42 linux-tools-oracle-64k-6.8 - 6.8.0-1041.42 linux-tools-oracle-64k-lts-24.04 - 6.8.0-1041.42 linux-tools-oracle-lts-24.04 - 6.8.0-1041.42 No subscription required linux-buildinfo-6.8.0-1041-gke - 6.8.0-1041.46 linux-buildinfo-6.8.0-1041-gke-64k - 6.8.0-1041.46 linux-gke - 6.8.0-1041.46 linux-gke-6.8 - 6.8.0-1041.46 linux-gke-64k - 6.8.0-1041.46 linux-gke-64k-6.8 - 6.8.0-1041.46 linux-gke-headers-6.8.0-1041 - 6.8.0-1041.46 linux-gke-tools-6.8.0-1041 - 6.8.0-1041.46 linux-headers-6.8.0-1041-gke - 6.8.0-1041.46 linux-headers-6.8.0-1041-gke-64k - 6.8.0-1041.46 linux-headers-gke - 6.8.0-1041.46 linux-headers-gke-6.8 - 6.8.0-1041.46 linux-headers-gke-64k - 6.8.0-1041.46 linux-headers-gke-64k-6.8 - 6.8.0-1041.46 linux-image-6.8.0-1041-gke - 6.8.0-1041.46 linux-image-6.8.0-1041-gke-64k - 6.8.0-1041.46 linux-image-gke - 6.8.0-1041.46 linux-image-gke-6.8 - 6.8.0-1041.46 linux-image-gke-64k - 6.8.0-1041.46 linux-image-gke-64k-6.8 - 6.8.0-1041.46 linux-image-unsigned-6.8.0-1041-gke - 6.8.0-1041.46 linux-image-unsigned-6.8.0-1041-gke-64k - 6.8.0-1041.46 linux-modules-6.8.0-1041-gke - 6.8.0-1041.46 linux-modules-6.8.0-1041-gke-64k - 6.8.0-1041.46 linux-modules-extra-6.8.0-1041-gke - 6.8.0-1041.46 linux-modules-extra-6.8.0-1041-gke-64k - 6.8.0-1041.46 linux-modules-iwlwifi-6.8.0-1041-gke - 6.8.0-1041.46 linux-modules-iwlwifi-gke - 6.8.0-1041.46 linux-modules-iwlwifi-gke-6.8 - 6.8.0-1041.46 linux-tools-6.8.0-1041-gke - 6.8.0-1041.46 linux-tools-6.8.0-1041-gke-64k - 6.8.0-1041.46 linux-tools-gke - 6.8.0-1041.46 linux-tools-gke-6.8 - 6.8.0-1041.46 linux-tools-gke-64k - 6.8.0-1041.46 linux-tools-gke-64k-6.8 - 6.8.0-1041.46 No subscription required linux-buildinfo-6.8.0-1042-ibm - 6.8.0-1042.42 linux-headers-6.8.0-1042-ibm - 6.8.0-1042.42 linux-headers-ibm - 6.8.0-1042.42 linux-headers-ibm-6.8 - 6.8.0-1042.42 linux-headers-ibm-classic - 6.8.0-1042.42 linux-headers-ibm-lts-24.04 - 6.8.0-1042.42 linux-ibm - 6.8.0-1042.42 linux-ibm-6.8 - 6.8.0-1042.42 linux-ibm-classic - 6.8.0-1042.42 linux-ibm-headers-6.8.0-1042 - 6.8.0-1042.42 linux-ibm-lts-24.04 - 6.8.0-1042.42 linux-ibm-tools-6.8.0-1042 - 6.8.0-1042.42 linux-image-6.8.0-1042-ibm - 6.8.0-1042.42 linux-image-ibm - 6.8.0-1042.42 linux-image-ibm-6.8 - 6.8.0-1042.42 linux-image-ibm-classic - 6.8.0-1042.42 linux-image-ibm-lts-24.04 - 6.8.0-1042.42 linux-image-unsigned-6.8.0-1042-ibm - 6.8.0-1042.42 linux-modules-6.8.0-1042-ibm - 6.8.0-1042.42 linux-modules-extra-6.8.0-1042-ibm - 6.8.0-1042.42 linux-modules-iwlwifi-6.8.0-1042-ibm - 6.8.0-1042.42 linux-modules-iwlwifi-ibm - 6.8.0-1042.42 linux-modules-iwlwifi-ibm-6.8 - 6.8.0-1042.42 linux-modules-iwlwifi-ibm-classic - 6.8.0-1042.42 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1042.42 linux-tools-6.8.0-1042-ibm - 6.8.0-1042.42 linux-tools-ibm - 6.8.0-1042.42 linux-tools-ibm-6.8 - 6.8.0-1042.42 linux-tools-ibm-classic - 6.8.0-1042.42 linux-tools-ibm-lts-24.04 - 6.8.0-1042.42 No subscription required linux-aws-6.8 - 6.8.0-1044.46 linux-aws-64k-6.8 - 6.8.0-1044.46 linux-aws-64k-lts-24.04 - 6.8.0-1044.46 linux-aws-cloud-tools-6.8.0-1044 - 6.8.0-1044.46 linux-aws-headers-6.8.0-1044 - 6.8.0-1044.46 linux-aws-lts-24.04 - 6.8.0-1044.46 linux-aws-tools-6.8.0-1044 - 6.8.0-1044.46 linux-buildinfo-6.8.0-1044-aws - 6.8.0-1044.46 linux-buildinfo-6.8.0-1044-aws-64k - 6.8.0-1044.46 linux-cloud-tools-6.8.0-1044-aws - 6.8.0-1044.46 linux-cloud-tools-6.8.0-1044-aws-64k - 6.8.0-1044.46 linux-headers-6.8.0-1044-aws - 6.8.0-1044.46 linux-headers-6.8.0-1044-aws-64k - 6.8.0-1044.46 linux-headers-aws-6.8 - 6.8.0-1044.46 linux-headers-aws-64k-6.8 - 6.8.0-1044.46 linux-headers-aws-64k-lts-24.04 - 6.8.0-1044.46 linux-headers-aws-lts-24.04 - 6.8.0-1044.46 linux-image-6.8.0-1044-aws - 6.8.0-1044.46 linux-image-6.8.0-1044-aws-64k - 6.8.0-1044.46 linux-image-aws-6.8 - 6.8.0-1044.46 linux-image-aws-64k-6.8 - 6.8.0-1044.46 linux-image-aws-64k-lts-24.04 - 6.8.0-1044.46 linux-image-aws-lts-24.04 - 6.8.0-1044.46 linux-image-uc-6.8.0-1044-aws - 6.8.0-1044.46 linux-image-uc-6.8.0-1044-aws-64k - 6.8.0-1044.46 linux-image-uc-aws-6.8 - 6.8.0-1044.46 linux-image-uc-aws-lts-24.04 - 6.8.0-1044.46 linux-image-unsigned-6.8.0-1044-aws - 6.8.0-1044.46 linux-image-unsigned-6.8.0-1044-aws-64k - 6.8.0-1044.46 linux-modules-6.8.0-1044-aws - 6.8.0-1044.46 linux-modules-6.8.0-1044-aws-64k - 6.8.0-1044.46 linux-modules-extra-6.8.0-1044-aws - 6.8.0-1044.46 linux-modules-extra-6.8.0-1044-aws-64k - 6.8.0-1044.46 linux-modules-extra-aws-6.8 - 6.8.0-1044.46 linux-modules-extra-aws-64k-6.8 - 6.8.0-1044.46 linux-modules-extra-aws-64k-lts-24.04 - 6.8.0-1044.46 linux-modules-extra-aws-lts-24.04 - 6.8.0-1044.46 linux-tools-6.8.0-1044-aws - 6.8.0-1044.46 linux-tools-6.8.0-1044-aws-64k - 6.8.0-1044.46 linux-tools-aws-6.8 - 6.8.0-1044.46 linux-tools-aws-64k-6.8 - 6.8.0-1044.46 linux-tools-aws-64k-lts-24.04 - 6.8.0-1044.46 linux-tools-aws-lts-24.04 - 6.8.0-1044.46 No subscription required linux-buildinfo-6.8.0-1044-nvidia - 6.8.0-1044.47 linux-buildinfo-6.8.0-1044-nvidia-64k - 6.8.0-1044.47 linux-cloud-tools-nvidia - 6.8.0-1044.47 linux-cloud-tools-nvidia-6.8 - 6.8.0-1044.47 linux-headers-6.8.0-1044-nvidia - 6.8.0-1044.47 linux-headers-6.8.0-1044-nvidia-64k - 6.8.0-1044.47 linux-headers-nvidia - 6.8.0-1044.47 linux-headers-nvidia-6.8 - 6.8.0-1044.47 linux-headers-nvidia-64k - 6.8.0-1044.47 linux-headers-nvidia-64k-6.8 - 6.8.0-1044.47 linux-image-6.8.0-1044-nvidia - 6.8.0-1044.47 linux-image-6.8.0-1044-nvidia-64k - 6.8.0-1044.47 linux-image-nvidia - 6.8.0-1044.47 linux-image-nvidia-6.8 - 6.8.0-1044.47 linux-image-nvidia-64k - 6.8.0-1044.47 linux-image-nvidia-64k-6.8 - 6.8.0-1044.47 linux-image-uc-6.8.0-1044-nvidia - 6.8.0-1044.47 linux-image-uc-6.8.0-1044-nvidia-64k - 6.8.0-1044.47 linux-image-unsigned-6.8.0-1044-nvidia - 6.8.0-1044.47 linux-image-unsigned-6.8.0-1044-nvidia-64k - 6.8.0-1044.47 linux-modules-6.8.0-1044-nvidia - 6.8.0-1044.47 linux-modules-6.8.0-1044-nvidia-64k - 6.8.0-1044.47 linux-modules-nvidia-fs-6.8.0-1044-nvidia - 6.8.0-1044.47 linux-modules-nvidia-fs-6.8.0-1044-nvidia-64k - 6.8.0-1044.47 linux-modules-nvidia-fs-nvidia - 6.8.0-1044.47 linux-modules-nvidia-fs-nvidia-6.8 - 6.8.0-1044.47 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1044.47 linux-modules-nvidia-fs-nvidia-64k-6.8 - 6.8.0-1044.47 linux-nvidia - 6.8.0-1044.47 linux-nvidia-6.8 - 6.8.0-1044.47 linux-nvidia-64k - 6.8.0-1044.47 linux-nvidia-64k-6.8 - 6.8.0-1044.47 linux-nvidia-headers-6.8.0-1044 - 6.8.0-1044.47 linux-nvidia-tools-6.8.0-1044 - 6.8.0-1044.47 linux-tools-6.8.0-1044-nvidia - 6.8.0-1044.47 linux-tools-6.8.0-1044-nvidia-64k - 6.8.0-1044.47 linux-tools-nvidia - 6.8.0-1044.47 linux-tools-nvidia-6.8 - 6.8.0-1044.47 linux-tools-nvidia-64k - 6.8.0-1044.47 linux-tools-nvidia-64k-6.8 - 6.8.0-1044.47 No subscription required linux-buildinfo-6.8.0-1044-nvidia-lowlatency - 6.8.0-1044.47.1 linux-buildinfo-6.8.0-1044-nvidia-lowlatency-64k - 6.8.0-1044.47.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1044.47.1 linux-cloud-tools-nvidia-lowlatency-6.8 - 6.8.0-1044.47.1 linux-headers-6.8.0-1044-nvidia-lowlatency - 6.8.0-1044.47.1 linux-headers-6.8.0-1044-nvidia-lowlatency-64k - 6.8.0-1044.47.1 linux-headers-nvidia-lowlatency - 6.8.0-1044.47.1 linux-headers-nvidia-lowlatency-6.8 - 6.8.0-1044.47.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1044.47.1 linux-headers-nvidia-lowlatency-64k-6.8 - 6.8.0-1044.47.1 linux-image-6.8.0-1044-nvidia-lowlatency - 6.8.0-1044.47.1 linux-image-6.8.0-1044-nvidia-lowlatency-64k - 6.8.0-1044.47.1 linux-image-nvidia-lowlatency - 6.8.0-1044.47.1 linux-image-nvidia-lowlatency-6.8 - 6.8.0-1044.47.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1044.47.1 linux-image-nvidia-lowlatency-64k-6.8 - 6.8.0-1044.47.1 linux-image-uc-6.8.0-1044-nvidia-lowlatency - 6.8.0-1044.47.1 linux-image-uc-6.8.0-1044-nvidia-lowlatency-64k - 6.8.0-1044.47.1 linux-image-unsigned-6.8.0-1044-nvidia-lowlatency - 6.8.0-1044.47.1 linux-image-unsigned-6.8.0-1044-nvidia-lowlatency-64k - 6.8.0-1044.47.1 linux-modules-6.8.0-1044-nvidia-lowlatency - 6.8.0-1044.47.1 linux-modules-6.8.0-1044-nvidia-lowlatency-64k - 6.8.0-1044.47.1 linux-modules-extra-6.8.0-1044-nvidia-lowlatency - 6.8.0-1044.47.1 linux-modules-nvidia-fs-6.8.0-1044-nvidia-lowlatency - 6.8.0-1044.47.1 linux-modules-nvidia-fs-6.8.0-1044-nvidia-lowlatency-64k - 6.8.0-1044.47.1 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1044.47.1 linux-modules-nvidia-fs-nvidia-lowlatency-6.8 - 6.8.0-1044.47.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1044.47.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k-6.8 - 6.8.0-1044.47.1 linux-nvidia-lowlatency - 6.8.0-1044.47.1 linux-nvidia-lowlatency-6.8 - 6.8.0-1044.47.1 linux-nvidia-lowlatency-64k - 6.8.0-1044.47.1 linux-nvidia-lowlatency-64k-6.8 - 6.8.0-1044.47.1 linux-nvidia-lowlatency-headers-6.8.0-1044 - 6.8.0-1044.47.1 linux-nvidia-lowlatency-tools-6.8.0-1044 - 6.8.0-1044.47.1 linux-tools-6.8.0-1044-nvidia-lowlatency - 6.8.0-1044.47.1 linux-tools-6.8.0-1044-nvidia-lowlatency-64k - 6.8.0-1044.47.1 linux-tools-nvidia-lowlatency - 6.8.0-1044.47.1 linux-tools-nvidia-lowlatency-6.8 - 6.8.0-1044.47.1 linux-tools-nvidia-lowlatency-64k - 6.8.0-1044.47.1 linux-tools-nvidia-lowlatency-64k-6.8 - 6.8.0-1044.47.1 No subscription required linux-buildinfo-6.8.0-1045-gcp - 6.8.0-1045.48 linux-buildinfo-6.8.0-1045-gcp-64k - 6.8.0-1045.48 linux-gcp-6.8 - 6.8.0-1045.48 linux-gcp-64k-6.8 - 6.8.0-1045.48 linux-gcp-64k-lts-24.04 - 6.8.0-1045.48 linux-gcp-headers-6.8.0-1045 - 6.8.0-1045.48 linux-gcp-lts-24.04 - 6.8.0-1045.48 linux-gcp-tools-6.8.0-1045 - 6.8.0-1045.48 linux-headers-6.8.0-1045-gcp - 6.8.0-1045.48 linux-headers-6.8.0-1045-gcp-64k - 6.8.0-1045.48 linux-headers-gcp-6.8 - 6.8.0-1045.48 linux-headers-gcp-64k-6.8 - 6.8.0-1045.48 linux-headers-gcp-64k-lts-24.04 - 6.8.0-1045.48 linux-headers-gcp-lts-24.04 - 6.8.0-1045.48 linux-image-6.8.0-1045-gcp - 6.8.0-1045.48 linux-image-6.8.0-1045-gcp-64k - 6.8.0-1045.48 linux-image-gcp-6.8 - 6.8.0-1045.48 linux-image-gcp-64k-6.8 - 6.8.0-1045.48 linux-image-gcp-64k-lts-24.04 - 6.8.0-1045.48 linux-image-gcp-lts-24.04 - 6.8.0-1045.48 linux-image-unsigned-6.8.0-1045-gcp - 6.8.0-1045.48 linux-image-unsigned-6.8.0-1045-gcp-64k - 6.8.0-1045.48 linux-modules-6.8.0-1045-gcp - 6.8.0-1045.48 linux-modules-6.8.0-1045-gcp-64k - 6.8.0-1045.48 linux-modules-extra-6.8.0-1045-gcp - 6.8.0-1045.48 linux-modules-extra-6.8.0-1045-gcp-64k - 6.8.0-1045.48 linux-modules-extra-gcp-6.8 - 6.8.0-1045.48 linux-modules-extra-gcp-64k-6.8 - 6.8.0-1045.48 linux-modules-extra-gcp-64k-lts-24.04 - 6.8.0-1045.48 linux-modules-extra-gcp-lts-24.04 - 6.8.0-1045.48 linux-tools-6.8.0-1045-gcp - 6.8.0-1045.48 linux-tools-6.8.0-1045-gcp-64k - 6.8.0-1045.48 linux-tools-gcp-6.8 - 6.8.0-1045.48 linux-tools-gcp-64k-6.8 - 6.8.0-1045.48 linux-tools-gcp-64k-lts-24.04 - 6.8.0-1045.48 linux-tools-gcp-lts-24.04 - 6.8.0-1045.48 No subscription required linux-bpf-dev - 6.8.0-90.91 linux-buildinfo-6.8.0-90-generic - 6.8.0-90.91 linux-buildinfo-6.8.0-90-generic-64k - 6.8.0-90.91 linux-cloud-tools-6.8.0-90 - 6.8.0-90.91 linux-cloud-tools-6.8.0-90-generic - 6.8.0-90.91 linux-cloud-tools-common - 6.8.0-90.91 linux-cloud-tools-generic - 6.8.0-90.91 linux-cloud-tools-generic-6.8 - 6.8.0-90.91 linux-cloud-tools-virtual - 6.8.0-90.91 linux-cloud-tools-virtual-6.8 - 6.8.0-90.91 linux-crashdump - 6.8.0-90.91 linux-doc - 6.8.0-90.91 linux-generic - 6.8.0-90.91 linux-generic-6.8 - 6.8.0-90.91 linux-generic-64k - 6.8.0-90.91 linux-generic-64k-6.8 - 6.8.0-90.91 linux-generic-lpae - 6.8.0-90.91 linux-headers-6.8.0-90 - 6.8.0-90.91 linux-headers-6.8.0-90-generic - 6.8.0-90.91 linux-headers-6.8.0-90-generic-64k - 6.8.0-90.91 linux-headers-generic - 6.8.0-90.91 linux-headers-generic-6.8 - 6.8.0-90.91 linux-headers-generic-64k - 6.8.0-90.91 linux-headers-generic-64k-6.8 - 6.8.0-90.91 linux-headers-generic-lpae - 6.8.0-90.91 linux-headers-intel-iotg - 6.8.0-90.91 linux-headers-kvm - 6.8.0-90.91 linux-headers-laptop-23.10 - 6.8.0-90.91 linux-headers-oem-20.04 - 6.8.0-90.91 linux-headers-oem-20.04b - 6.8.0-90.91 linux-headers-oem-20.04c - 6.8.0-90.91 linux-headers-oem-20.04d - 6.8.0-90.91 linux-headers-oem-22.04 - 6.8.0-90.91 linux-headers-virtual - 6.8.0-90.91 linux-headers-virtual-6.8 - 6.8.0-90.91 linux-image-6.8.0-90-generic - 6.8.0-90.91 linux-image-6.8.0-90-generic-64k - 6.8.0-90.91 linux-image-extra-virtual - 6.8.0-90.91 linux-image-extra-virtual-6.8 - 6.8.0-90.91 linux-image-generic - 6.8.0-90.91 linux-image-generic-6.8 - 6.8.0-90.91 linux-image-generic-64k - 6.8.0-90.91 linux-image-generic-64k-6.8 - 6.8.0-90.91 linux-image-generic-lpae - 6.8.0-90.91 linux-image-intel-iotg - 6.8.0-90.91 linux-image-kvm - 6.8.0-90.91 linux-image-laptop-23.10 - 6.8.0-90.91 linux-image-oem-20.04 - 6.8.0-90.91 linux-image-oem-20.04b - 6.8.0-90.91 linux-image-oem-20.04c - 6.8.0-90.91 linux-image-oem-20.04d - 6.8.0-90.91 linux-image-oem-22.04 - 6.8.0-90.91 linux-image-uc-6.8.0-90-generic - 6.8.0-90.91 linux-image-uc-6.8.0-90-generic-64k - 6.8.0-90.91 linux-image-uc-generic - 6.8.0-90.91 linux-image-uc-generic-6.8 - 6.8.0-90.91 linux-image-unsigned-6.8.0-90-generic - 6.8.0-90.91 linux-image-unsigned-6.8.0-90-generic-64k - 6.8.0-90.91 linux-image-virtual - 6.8.0-90.91 linux-image-virtual-6.8 - 6.8.0-90.91 linux-intel-iotg - 6.8.0-90.91 linux-kvm - 6.8.0-90.91 linux-laptop-23.10 - 6.8.0-90.91 linux-lib-rust-6.8.0-90-generic - 6.8.0-90.91 linux-libc-dev - 6.8.0-90.91 linux-modules-6.8.0-90-generic - 6.8.0-90.91 linux-modules-6.8.0-90-generic-64k - 6.8.0-90.91 linux-modules-extra-6.8.0-90-generic - 6.8.0-90.91 linux-modules-ipu6-6.8.0-90-generic - 6.8.0-90.91 linux-modules-ipu6-generic - 6.8.0-90.91 linux-modules-ipu6-generic-6.8 - 6.8.0-90.91 linux-modules-iwlwifi-6.8.0-90-generic - 6.8.0-90.91 linux-modules-iwlwifi-generic - 6.8.0-90.91 linux-modules-iwlwifi-generic-6.8 - 6.8.0-90.91 linux-modules-iwlwifi-oem-20.04 - 6.8.0-90.91 linux-modules-iwlwifi-oem-20.04d - 6.8.0-90.91 linux-modules-iwlwifi-oem-22.04 - 6.8.0-90.91 linux-modules-usbio-6.8.0-90-generic - 6.8.0-90.91 linux-modules-usbio-generic - 6.8.0-90.91 linux-modules-usbio-generic-6.8 - 6.8.0-90.91 linux-oem-20.04 - 6.8.0-90.91 linux-oem-20.04b - 6.8.0-90.91 linux-oem-20.04c - 6.8.0-90.91 linux-oem-20.04d - 6.8.0-90.91 linux-oem-22.04 - 6.8.0-90.91 linux-source - 6.8.0-90.91 linux-source-6.8.0 - 6.8.0-90.91 linux-tools-6.8.0-90 - 6.8.0-90.91 linux-tools-6.8.0-90-generic - 6.8.0-90.91 linux-tools-6.8.0-90-generic-64k - 6.8.0-90.91 linux-tools-common - 6.8.0-90.91 linux-tools-generic - 6.8.0-90.91 linux-tools-generic-6.8 - 6.8.0-90.91 linux-tools-generic-64k - 6.8.0-90.91 linux-tools-generic-64k-6.8 - 6.8.0-90.91 linux-tools-generic-lpae - 6.8.0-90.91 linux-tools-host - 6.8.0-90.91 linux-tools-intel-iotg - 6.8.0-90.91 linux-tools-kvm - 6.8.0-90.91 linux-tools-laptop-23.10 - 6.8.0-90.91 linux-tools-oem-20.04 - 6.8.0-90.91 linux-tools-oem-20.04b - 6.8.0-90.91 linux-tools-oem-20.04c - 6.8.0-90.91 linux-tools-oem-20.04d - 6.8.0-90.91 linux-tools-oem-22.04 - 6.8.0-90.91 linux-tools-virtual - 6.8.0-90.91 linux-tools-virtual-6.8 - 6.8.0-90.91 linux-virtual - 6.8.0-90.91 linux-virtual-6.8 - 6.8.0-90.91 No subscription required linux-buildinfo-6.8.0-90-lowlatency - 6.8.0-90.91.1 linux-buildinfo-6.8.0-90-lowlatency-64k - 6.8.0-90.91.1 linux-cloud-tools-6.8.0-90-lowlatency - 6.8.0-90.91.1 linux-cloud-tools-lowlatency - 6.8.0-90.91.1 linux-cloud-tools-lowlatency-6.8 - 6.8.0-90.91.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-90.91.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-90.91.1 linux-headers-6.8.0-90-lowlatency - 6.8.0-90.91.1 linux-headers-6.8.0-90-lowlatency-64k - 6.8.0-90.91.1 linux-headers-lowlatency - 6.8.0-90.91.1 linux-headers-lowlatency-6.8 - 6.8.0-90.91.1 linux-headers-lowlatency-64k - 6.8.0-90.91.1 linux-headers-lowlatency-64k-6.8 - 6.8.0-90.91.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-90.91.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-90.91.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-90.91.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-90.91.1 linux-image-6.8.0-90-lowlatency - 6.8.0-90.91.1 linux-image-6.8.0-90-lowlatency-64k - 6.8.0-90.91.1 linux-image-lowlatency - 6.8.0-90.91.1 linux-image-lowlatency-6.8 - 6.8.0-90.91.1 linux-image-lowlatency-64k - 6.8.0-90.91.1 linux-image-lowlatency-64k-6.8 - 6.8.0-90.91.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-90.91.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-90.91.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-90.91.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-90.91.1 linux-image-unsigned-6.8.0-90-lowlatency - 6.8.0-90.91.1 linux-image-unsigned-6.8.0-90-lowlatency-64k - 6.8.0-90.91.1 linux-lowlatency - 6.8.0-90.91.1 linux-lowlatency-6.8 - 6.8.0-90.91.1 linux-lowlatency-64k - 6.8.0-90.91.1 linux-lowlatency-64k-6.8 - 6.8.0-90.91.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-90.91.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-90.91.1 linux-lowlatency-cloud-tools-6.8.0-90 - 6.8.0-90.91.1 linux-lowlatency-headers-6.8.0-90 - 6.8.0-90.91.1 linux-lowlatency-hwe-20.04 - 6.8.0-90.91.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-90.91.1 linux-lowlatency-lib-rust-6.8.0-90-lowlatency - 6.8.0-90.91.1 linux-lowlatency-tools-6.8.0-90 - 6.8.0-90.91.1 linux-modules-6.8.0-90-lowlatency - 6.8.0-90.91.1 linux-modules-6.8.0-90-lowlatency-64k - 6.8.0-90.91.1 linux-modules-iwlwifi-6.8.0-90-lowlatency - 6.8.0-90.91.1 linux-modules-iwlwifi-lowlatency - 6.8.0-90.91.1 linux-modules-iwlwifi-lowlatency-6.8 - 6.8.0-90.91.1 linux-tools-6.8.0-90-lowlatency - 6.8.0-90.91.1 linux-tools-6.8.0-90-lowlatency-64k - 6.8.0-90.91.1 linux-tools-lowlatency - 6.8.0-90.91.1 linux-tools-lowlatency-6.8 - 6.8.0-90.91.1 linux-tools-lowlatency-64k - 6.8.0-90.91.1 linux-tools-lowlatency-64k-6.8 - 6.8.0-90.91.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-90.91.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-90.91.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-90.91.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-90.91.1 No subscription required
CVEs:

Title: USN-7942-1 -- GLib vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7942-1
Priorities: low,medium
Description:
It was discovered that GLib incorrectly handled escaping URI strings. An attacker could use this issue to cause GLib to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2025-13601) It was discovered that GLib incorrectly parsed certain GVariants. An attacker could use this issue to cause GLib to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2025-14087) It was discovered that GLib incorrectly parsed certain long invalid ISO 8601 timestamps. An attacker could possibly use this issue to cause GLib to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2025-3360) It was discovered that GLib incorrectly handled GString memory operations. An attacker could use this issue to cause GLib to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 24.04 LTS and Ubuntu 25.04. (CVE-2025-6052) It was discovered that GLib incorrectly handled creating temporary files. An attacker could possibly use this issue to access unauthorized data. This issue only affected Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, and Ubuntu 25.04. (CVE-2025-7039) Update Instructions: Run sudo pro fix USN-7942-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-girepository-3.0 - 2.80.0-6ubuntu3.6 gir1.2-girepository-3.0-dev - 2.80.0-6ubuntu3.6 gir1.2-glib-2.0 - 2.80.0-6ubuntu3.6 gir1.2-glib-2.0-dev - 2.80.0-6ubuntu3.6 libgirepository-2.0-0 - 2.80.0-6ubuntu3.6 libgirepository-2.0-dev - 2.80.0-6ubuntu3.6 libglib2.0-0t64 - 2.80.0-6ubuntu3.6 libglib2.0-bin - 2.80.0-6ubuntu3.6 libglib2.0-data - 2.80.0-6ubuntu3.6 libglib2.0-dev - 2.80.0-6ubuntu3.6 libglib2.0-dev-bin - 2.80.0-6ubuntu3.6 libglib2.0-doc - 2.80.0-6ubuntu3.6 libglib2.0-tests - 2.80.0-6ubuntu3.6 No subscription required
CVEs:

Title: USN-7945-1 -- Libxslt vulnerability
URL: https://ubuntu.com/security/notices/USN-7945-1
Priorities: medium
Description:
Ivan Fratric discovered that Libxslt was vulnerable to type confusion when performing XML transformations. An attacker could possibly use this issue to cause Libxslt to crash or corrupt memory, causing a denial of service or undefined behavior. Update Instructions: Run sudo pro fix USN-7945-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libxslt1-dev - 1.1.39-0exp1ubuntu0.24.04.3 libxslt1.1 - 1.1.39-0exp1ubuntu0.24.04.3 xsltproc - 1.1.39-0exp1ubuntu0.24.04.3 No subscription required
CVEs:

What's Changed

  • Fix output of "nvme id-ctrl" to show vendor-specific fields for noble by @fmoehler in #462
  • Update stemcell-repack-debugger by @ionphractal in #452

New Contributors

Full Changelog: ubuntu-noble/v1.165...ubuntu-noble/v1.188