Releases: cloudfoundry/bosh-linux-stemcell-builder
ubuntu noble v1.126
Metadata:
BOSH Agent Version: 2.775.0
Kernel Version: 6.8.0-85.85
Full Changelog: ubuntu-noble/v1.103...ubuntu-noble/v1.126
USNs:
Title: USN-7835-1 -- Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7835-1
Priorities: high,medium
Description:
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - PowerPC architecture; - x86 architecture; - ACPI drivers; - Ublk userspace block driver; - Clock framework and drivers; - GPU drivers; - IIO subsystem; - InfiniBand drivers; - Media drivers; - MemoryStick subsystem; - Network drivers; - NTB driver; - PCI subsystem; - Remote Processor subsystem; - Thermal drivers; - Virtio Host (VHOST) subsystem; - 9P distributed file system; - File systems infrastructure; - JFS file system; - Network file system (NFS) server daemon; - NTFS3 file system; - SMB network file system; - Memory management; - RDMA verbs API; - Kernel fork() syscall; - Tracing infrastructure; - Watch queue notification mechanism; - Asynchronous Transfer Mode (ATM) subsystem; - Networking core; - IPv4 networking; - IPv6 networking; - Netfilter; - Network traffic control; - SCTP protocol; - TLS protocol; - SoC Audio for Freescale CPUs drivers; (CVE-2025-39728, CVE-2025-23136, CVE-2025-22062, CVE-2025-22035, CVE-2025-22020, CVE-2025-22083, CVE-2025-22071, CVE-2025-22060, CVE-2025-22073, CVE-2025-22044, CVE-2025-22063, CVE-2025-22079, CVE-2025-22057, CVE-2025-22095, CVE-2025-39735, CVE-2025-39682, CVE-2025-22058, CVE-2025-22021, CVE-2025-22018, CVE-2025-22056, CVE-2025-22054, CVE-2025-22080, CVE-2025-22039, CVE-2025-22019, CVE-2025-22038, CVE-2025-22028, CVE-2023-53034, CVE-2024-58092, CVE-2025-38637, CVE-2025-22089, CVE-2025-40114, CVE-2025-22068, CVE-2025-37937, CVE-2025-22070, CVE-2025-22072, CVE-2025-22086, CVE-2025-22050, CVE-2025-22040, CVE-2025-22065, CVE-2025-38575, CVE-2025-22064, CVE-2025-22033, CVE-2025-22041, CVE-2025-22090, CVE-2025-22036, CVE-2025-23138, CVE-2025-22047, CVE-2025-38240, CVE-2025-22066, CVE-2025-22042, CVE-2025-38152, CVE-2025-22055, CVE-2025-22081, CVE-2025-22045, CVE-2025-22053, CVE-2025-22075, CVE-2025-22027, CVE-2025-22025, CVE-2025-22097) Update Instructions: Run sudo pro fix USN-7835-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1025-gkeop - 6.8.0-1025.28 linux-cloud-tools-6.8.0-1025-gkeop - 6.8.0-1025.28 linux-cloud-tools-gkeop - 6.8.0-1025.28 linux-cloud-tools-gkeop-6.8 - 6.8.0-1025.28 linux-gkeop - 6.8.0-1025.28 linux-gkeop-6.8 - 6.8.0-1025.28 linux-gkeop-cloud-tools-6.8.0-1025 - 6.8.0-1025.28 linux-gkeop-headers-6.8.0-1025 - 6.8.0-1025.28 linux-gkeop-tools-6.8.0-1025 - 6.8.0-1025.28 linux-headers-6.8.0-1025-gkeop - 6.8.0-1025.28 linux-headers-gkeop - 6.8.0-1025.28 linux-headers-gkeop-6.8 - 6.8.0-1025.28 linux-image-6.8.0-1025-gkeop - 6.8.0-1025.28 linux-image-gkeop - 6.8.0-1025.28 linux-image-gkeop-6.8 - 6.8.0-1025.28 linux-image-unsigned-6.8.0-1025-gkeop - 6.8.0-1025.28 linux-modules-6.8.0-1025-gkeop - 6.8.0-1025.28 linux-modules-extra-6.8.0-1025-gkeop - 6.8.0-1025.28 linux-modules-extra-gkeop - 6.8.0-1025.28 linux-modules-extra-gkeop-6.8 - 6.8.0-1025.28 linux-tools-6.8.0-1025-gkeop - 6.8.0-1025.28 linux-tools-gkeop - 6.8.0-1025.28 linux-tools-gkeop-6.8 - 6.8.0-1025.28 No subscription required linux-buildinfo-6.8.0-1038-oracle - 6.8.0-1038.39 linux-buildinfo-6.8.0-1038-oracle-64k - 6.8.0-1038.39 linux-headers-6.8.0-1038-oracle - 6.8.0-1038.39 linux-headers-6.8.0-1038-oracle-64k - 6.8.0-1038.39 linux-headers-oracle-6.8 - 6.8.0-1038.39 linux-headers-oracle-64k-6.8 - 6.8.0-1038.39 linux-headers-oracle-64k-lts-24.04 - 6.8.0-1038.39 linux-headers-oracle-lts-24.04 - 6.8.0-1038.39 linux-image-6.8.0-1038-oracle - 6.8.0-1038.39 linux-image-6.8.0-1038-oracle-64k - 6.8.0-1038.39 linux-image-oracle-6.8 - 6.8.0-1038.39 linux-image-oracle-64k-6.8 - 6.8.0-1038.39 linux-image-oracle-64k-lts-24.04 - 6.8.0-1038.39 linux-image-oracle-lts-24.04 - 6.8.0-1038.39 linux-image-unsigned-6.8.0-1038-oracle - 6.8.0-1038.39 linux-image-unsigned-6.8.0-1038-oracle-64k - 6.8.0-1038.39 linux-modules-6.8.0-1038-oracle - 6.8.0-1038.39 linux-modules-6.8.0-1038-oracle-64k - 6.8.0-1038.39 linux-modules-extra-6.8.0-1038-oracle - 6.8.0-1038.39 linux-modules-extra-6.8.0-1038-oracle-64k - 6.8.0-1038.39 linux-oracle-6.8 - 6.8.0-1038.39 linux-oracle-64k-6.8 - 6.8.0-1038.39 linux-oracle-64k-lts-24.04 - 6.8.0-1038.39 linux-oracle-headers-6.8.0-1038 - 6.8.0-1038.39 linux-oracle-lts-24.04 - 6.8.0-1038.39 linux-oracle-tools-6.8.0-1038 - 6.8.0-1038.39 linux-tools-6.8.0-1038-oracle - 6.8.0-1038.39 linux-tools-6.8.0-1038-oracle-64k - 6.8.0-1038.39 linux-tools-oracle-6.8 - 6.8.0-1038.39 linux-tools-oracle-64k-6.8 - 6.8.0-1038.39 linux-tools-oracle-64k-lts-24.04 - 6.8.0-1038.39 linux-tools-oracle-lts-24.04 - 6.8.0-1038.39 No subscription required linux-buildinfo-6.8.0-1039-ibm - 6.8.0-1039.39 linux-headers-6.8.0-1039-ibm - 6.8.0-1039.39 linux-headers-ibm - 6.8.0-1039.39 linux-headers-ibm-6.8 - 6.8.0-1039.39 linux-headers-ibm-classic - 6.8.0-1039.39 linux-headers-ibm-lts-24.04 - 6.8.0-1039.39 linux-ibm - 6.8.0-1039.39 linux-ibm-6.8 - 6.8.0-1039.39 linux-ibm-classic - 6.8.0-1039.39 linux-ibm-headers-6.8.0-1039 - 6.8.0-1039.39 linux-ibm-lts-24.04 - 6.8.0-1039.39 linux-ibm-tools-6.8.0-1039 - 6.8.0-1039.39 linux-image-6.8.0-1039-ibm - 6.8.0-1039.39 linux-image-ibm - 6.8.0-1039.39 linux-image-ibm-6.8 - 6.8.0-1039.39 linux-image-ibm-classic - 6.8.0-1039.39 linux-image-ibm-lts-24.04 - 6.8.0-1039.39 linux-image-unsigned-6.8.0-1039-ibm - 6.8.0-1039.39 linux-modules-6.8.0-1039-ibm - 6.8.0-1039.39 linux-modules-extra-6.8.0-1039-ibm - 6.8.0-1039.39 linux-modules-iwlwifi-6.8.0-1039-ibm - 6.8.0-1039.39 linux-modules-iwlwifi-ibm - 6.8.0-1039.39 linux-modules-iwlwifi-ibm-6.8 - 6.8.0-1039.39 linux-modules-iwlwifi-ibm-classic - 6.8.0-1039.39 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1039.39 linux-tools-6.8.0-1039-ibm - 6.8.0-1039.39 linux-tools-ibm - 6.8.0-1039.39 linux-tools-ibm-6.8 - 6.8.0-1039.39 linux-tools-ibm-classic - 6.8.0-1039.39 linux-tools-ibm-lts-24.04 - 6.8.0-1039.39 No subscription required linux-aws-6.8 - 6.8.0-1041.43 linux-aws-64k-6.8 - 6.8.0-1041.43 linux-aws-64k-lts-24.04 - 6.8.0-1041.43 linux-aws-cloud-tools-6.8.0-1041 - 6.8.0-1041.43 linux-aws-headers-6.8.0-1041 - 6.8.0-1041.43 linux-aws-lts-24.04 - 6.8.0-1041.43 linux-aws-tools-6.8.0-1041 - 6.8.0-1041.43 linux-buildinfo-6.8.0-1041-aws - 6.8.0-1041.43 linux-buildinfo-6.8.0-1041-aws-64k - 6.8.0-1041.43 linux-cloud-tools-6.8.0-1041-aws - 6.8.0-1041.43 linux-cloud-tools-6.8.0-1041-aws-64k - 6.8.0-1041.43 linux-headers-6.8.0-1041-aws - 6.8.0-1041.43 linux-headers-6.8.0-1041-aws-64k - 6.8.0-1041.43 linux-headers-aws-6.8 - 6.8.0-1041.43 linux-headers-aws-64k-6.8 - 6.8.0-1041.43 linux-headers-aws-64k-lts-24.04 - 6.8.0-1041.43 linux-headers-aws-lts-24.04 - 6.8.0-1041.43 linux-image-6.8.0-1041-aws - 6.8.0-1041.43 linux-image-6.8.0-1041-aws-64k - 6.8.0-1041.43 linux-image-aws-6.8 - 6.8.0-1041.43 linux-image-aws-64k-6.8 - 6.8.0-1041.43 linux-image-aws-64k-lts-24.04 - 6.8.0-1041.43 linux-image-aws-lts-24.04 - 6.8.0-1041.43 linux-image-uc-6.8.0-1041-aws - 6.8.0-1041.43 linux-image-uc-6.8.0-1041-aws-64k - 6.8.0-1041.43 linux-image-uc-aws-6.8 - 6.8.0-1041.43 linux-image-uc-aws-lts-24.04 - 6.8.0-1041.43 linux-image-unsigned-6.8.0-1041-aws - 6.8.0-1041.43 linux-image-unsigned-6.8.0-1041-aws-64k - 6.8.0-1041.43 linux-modules-6.8.0-1041-aws - 6.8.0-1041.43 linux-modules-6.8.0-1041-aws-64k - 6.8.0-1041.43 linux-modules-extra-6.8.0-1041-aws - 6.8.0-1041.43 linux-modules-extra-6.8.0-1041-aws-64k - 6.8.0-1041.43 linux-modules-extra-aws-6.8 - 6.8.0-1041.43 linux-modules-extra-aws-64k-6.8 - 6.8.0-1041.43 linux-modules-extra-aws-64k-lts-24.04 - 6.8.0-1041.43 linux-modules-extra-aws-lts-24.04 - 6.8.0-1041.43 linux-tools-6.8.0-1041-aws - 6.8.0-1041.43 linux-tools-6.8.0-1041-aws-64k - 6.8.0-1041.43 linux-tools-aws-6.8 - 6.8.0-1041.43 linux-tools-aws-64k-6.8 - 6.8.0-1041.43 linux-tools-aws-64k-lts-24.04 - 6.8.0-1041.43 linux-tools-aws-lts-24.04 - 6.8.0-1041.43 No subscription required linux-azure-cloud-tools-6.8.0-1041 - 6.8.0-1041.47 linux-azure-headers-6.8.0-1041 - 6.8.0-1041.47 linux-azure-tools-6.8.0-1041 - 6.8.0-1041.47 linux-buildinfo-6.8.0-1041-azure - 6.8.0-1041.47 linux-cloud-tools-6.8.0-1041-azure - 6.8.0-1041.47 linux-headers-6.8.0-1041-azure - 6.8.0-1041.47 linux-image-unsigned-6.8.0-1041-azure - 6.8.0-1041.47 linux-modules-6.8.0-1041-azure - 6.8.0-1041.47 linux-modules-extra-6.8.0-1041-azure - 6.8.0-1041.47 linux-modules-involflt-6.8.0-1041-azure - 6.8.0-1041.47 linux-modules-iwlwifi-6.8.0-1041-azure - 6.8.0-1041.47 linux-tools-6.8.0-1041-azure - 6.8.0-1041.47 No subscription required linux-azure-6.8 - 6.8.0-1041.47+1 linux-azure-lts-24.04 - 6.8.0-1041.47+1 linux-cloud-tools-azure-6.8 - 6.8.0-1041.47+1 linux-cloud-tools-azure-lts-24.04 - 6.8.0-1041.47+1 linux-headers-azure-6.8 - 6.8.0-1041.47+1 linux-headers-azure-lts-24.04 - 6.8.0-1041.47+1 linux-image-6.8.0-1041-azure - 6.8.0-1041.47+1 linux-image-azure-6.8 - 6.8.0-1041.47+1 linux-image-azure-lts-24.04 - 6.8.0-1041.47+1 linux-image-uc-azure-6.8 - 6.8.0-1041.47+1 linux-image-uc-azure-lts-24.04 - 6.8.0-1041.47+1 linux-modules-extra-azure-6.8 - 6.8.0-1041.47+1 linux-modules-extra-azure-lts-24.04 - 6.8.0-1041.47+1 linux-modules-involflt-azure-6.8 - 6.8.0-1041.47+1 linux-modules-involflt-azure-lts-24.04 - 6.8.0-1041.47+1 linux-modules-iwlwifi-azure-6.8 - 6.8.0-1041.47+1 linux-modules-iwlwifi-azure-lts-24.04 - 6.8.0-1041.47+1 linux-tools-azure-6.8 - 6.8.0-1041.47+1 linux-tools-azure-lts-24.04 - 6.8.0-1041.47+1 No subscription required linux-buildinfo-6.8.0-1042-gcp - 6.8.0-1042.45 linux-buildinfo-6.8.0-1042-gcp-64k - 6.8.0-1042.45 linux-gcp-6.8 - 6.8.0-1042.45...
ubuntu jammy v1.954
Metadata:
BOSH Agent Version: 2.775.0
Kernel Version: 5.15.0.161.157
What's Changed
Full Changelog: ubuntu-jammy/v1.943...ubuntu-jammy/v1.954
USNs:
Title: USN-7847-1 -- GNU binutils vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7847-1
Priorities: medium
Description:
It was discovered that GNU binutils incorrectly handled certain files. An attacker could possibly use this issue to cause a crash or execute arbitrary code. The attack is restricted to local execution. (CVE-2025-11082) It was discovered that GNU binutils incorrectly handled certain inputs. An attacker could possibly use this issue to cause a crash or execute arbitrary code. (CVE-2025-11083, CVE-2025-5244, CVE-2025-5245, CVE-2025-7554) It was discovered that GNU binutils incorrectly handled certain files. An attacker could possibly use this issue to cause crash, execute arbitrary code or expose sensitive information. (CVE-2025-1147) It was discovered that GNU binutils incorrectly handled certain inputs. An attacker could possibly use this issue to cause a denial of service. (CVE-2025-1148, CVE-2025-3198, CVE-2025-8225 It was discovered that GNU binutils incorrectly handled certain files. An attacker could possibly use this issue to cause a crash. This issue only affected Ubuntu 25.04. (CVE-2025-1182) It was discovered that GNU binutils incorrectly handled certain inputs. An attacker could possibly use this issue to execute arbritrary code. This issue only affected Ubuntu 25.04 and Ubuntu 24.04 LTS. (CVE-2025-7546) Update Instructions: Run sudo pro fix USN-7847-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: binutils - 2.38-4ubuntu2.10 binutils-aarch64-linux-gnu - 2.38-4ubuntu2.10 binutils-alpha-linux-gnu - 2.38-4ubuntu2.10 binutils-arm-linux-gnueabi - 2.38-4ubuntu2.10 binutils-arm-linux-gnueabihf - 2.38-4ubuntu2.10 binutils-common - 2.38-4ubuntu2.10 binutils-dev - 2.38-4ubuntu2.10 binutils-doc - 2.38-4ubuntu2.10 binutils-for-build - 2.38-4ubuntu2.10 binutils-for-host - 2.38-4ubuntu2.10 binutils-hppa-linux-gnu - 2.38-4ubuntu2.10 binutils-hppa64-linux-gnu - 2.38-4ubuntu2.10 binutils-i686-gnu - 2.38-4ubuntu2.10 binutils-i686-kfreebsd-gnu - 2.38-4ubuntu2.10 binutils-i686-linux-gnu - 2.38-4ubuntu2.10 binutils-ia64-linux-gnu - 2.38-4ubuntu2.10 binutils-m68k-linux-gnu - 2.38-4ubuntu2.10 binutils-multiarch - 2.38-4ubuntu2.10 binutils-multiarch-dev - 2.38-4ubuntu2.10 binutils-powerpc-linux-gnu - 2.38-4ubuntu2.10 binutils-powerpc64-linux-gnu - 2.38-4ubuntu2.10 binutils-powerpc64le-linux-gnu - 2.38-4ubuntu2.10 binutils-riscv64-linux-gnu - 2.38-4ubuntu2.10 binutils-s390x-linux-gnu - 2.38-4ubuntu2.10 binutils-sh4-linux-gnu - 2.38-4ubuntu2.10 binutils-source - 2.38-4ubuntu2.10 binutils-sparc64-linux-gnu - 2.38-4ubuntu2.10 binutils-x86-64-kfreebsd-gnu - 2.38-4ubuntu2.10 binutils-x86-64-linux-gnu - 2.38-4ubuntu2.10 binutils-x86-64-linux-gnux32 - 2.38-4ubuntu2.10 libbinutils - 2.38-4ubuntu2.10 libctf-nobfd0 - 2.38-4ubuntu2.10 libctf0 - 2.38-4ubuntu2.10 No subscription required
CVEs:
- https://ubuntu.com/security/CVE-2025-11082
- https://ubuntu.com/security/CVE-2025-11083
- https://ubuntu.com/security/CVE-2025-1147
- https://ubuntu.com/security/CVE-2025-1148
- https://ubuntu.com/security/CVE-2025-1182
- https://ubuntu.com/security/CVE-2025-3198
- https://ubuntu.com/security/CVE-2025-5244
- https://ubuntu.com/security/CVE-2025-5245
- https://ubuntu.com/security/CVE-2025-7545
- https://ubuntu.com/security/CVE-2025-7546
- https://ubuntu.com/security/CVE-2025-8225
Title: USN-7852-1 -- libxml2 vulnerability
URL: https://ubuntu.com/security/notices/USN-7852-1
Priorities: medium
Description:
It was discovered that libxslt, used by libxml2, incorrectly handled certain attributes. An attacker could use this issue to cause a crash, resulting in a denial of service, or possibly execute arbitrary code. This update adds a fix to libxml2 to mitigate the libxslt vulnerability. Update Instructions: Run sudo pro fix USN-7852-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libxml2 - 2.9.13+dfsg-1ubuntu0.10 libxml2-dev - 2.9.13+dfsg-1ubuntu0.10 libxml2-doc - 2.9.13+dfsg-1ubuntu0.10 libxml2-utils - 2.9.13+dfsg-1ubuntu0.10 python3-libxml2 - 2.9.13+dfsg-1ubuntu0.10 No subscription required
CVEs:
ubuntu jammy v1.943
Metadata:
BOSH Agent Version: 2.772.0
Kernel Version: 5.15.0.160.156
USNs:
Title: USN-7829-1 -- Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7829-1
Priorities: low,medium
Description:
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - GPU drivers; - Network drivers; - Netlink; (CVE-2024-26700, CVE-2025-38727, CVE-2023-52593, CVE-2024-26896) Update Instructions: Run sudo pro fix USN-7829-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-5.15.0-1059-xilinx-zynqmp - 5.15.0-1059.63 linux-headers-5.15.0-1059-xilinx-zynqmp - 5.15.0-1059.63 linux-image-5.15.0-1059-xilinx-zynqmp - 5.15.0-1059.63 linux-modules-5.15.0-1059-xilinx-zynqmp - 5.15.0-1059.63 linux-tools-5.15.0-1059-xilinx-zynqmp - 5.15.0-1059.63 linux-xilinx-zynqmp-headers-5.15.0-1059 - 5.15.0-1059.63 linux-xilinx-zynqmp-tools-5.15.0-1059 - 5.15.0-1059.63 No subscription required linux-buildinfo-5.15.0-1078-gkeop - 5.15.0-1078.86 linux-cloud-tools-5.15.0-1078-gkeop - 5.15.0-1078.86 linux-gkeop-cloud-tools-5.15.0-1078 - 5.15.0-1078.86 linux-gkeop-headers-5.15.0-1078 - 5.15.0-1078.86 linux-gkeop-tools-5.15.0-1078 - 5.15.0-1078.86 linux-headers-5.15.0-1078-gkeop - 5.15.0-1078.86 linux-image-5.15.0-1078-gkeop - 5.15.0-1078.86 linux-image-unsigned-5.15.0-1078-gkeop - 5.15.0-1078.86 linux-modules-5.15.0-1078-gkeop - 5.15.0-1078.86 linux-modules-extra-5.15.0-1078-gkeop - 5.15.0-1078.86 linux-tools-5.15.0-1078-gkeop - 5.15.0-1078.86 No subscription required linux-buildinfo-5.15.0-1089-ibm - 5.15.0-1089.92 linux-headers-5.15.0-1089-ibm - 5.15.0-1089.92 linux-ibm-cloud-tools-common - 5.15.0-1089.92 linux-ibm-headers-5.15.0-1089 - 5.15.0-1089.92 linux-ibm-source-5.15.0 - 5.15.0-1089.92 linux-ibm-tools-5.15.0-1089 - 5.15.0-1089.92 linux-ibm-tools-common - 5.15.0-1089.92 linux-image-5.15.0-1089-ibm - 5.15.0-1089.92 linux-image-unsigned-5.15.0-1089-ibm - 5.15.0-1089.92 linux-modules-5.15.0-1089-ibm - 5.15.0-1089.92 linux-modules-extra-5.15.0-1089-ibm - 5.15.0-1089.92 linux-tools-5.15.0-1089-ibm - 5.15.0-1089.92 No subscription required linux-buildinfo-5.15.0-1090-nvidia - 5.15.0-1090.91 linux-buildinfo-5.15.0-1090-nvidia-lowlatency - 5.15.0-1090.91 linux-cloud-tools-5.15.0-1090-nvidia - 5.15.0-1090.91 linux-cloud-tools-5.15.0-1090-nvidia-lowlatency - 5.15.0-1090.91 linux-headers-5.15.0-1090-nvidia - 5.15.0-1090.91 linux-headers-5.15.0-1090-nvidia-lowlatency - 5.15.0-1090.91 linux-image-5.15.0-1090-nvidia - 5.15.0-1090.91 linux-image-5.15.0-1090-nvidia-lowlatency - 5.15.0-1090.91 linux-image-unsigned-5.15.0-1090-nvidia - 5.15.0-1090.91 linux-image-unsigned-5.15.0-1090-nvidia-lowlatency - 5.15.0-1090.91 linux-modules-5.15.0-1090-nvidia - 5.15.0-1090.91 linux-modules-5.15.0-1090-nvidia-lowlatency - 5.15.0-1090.91 linux-modules-extra-5.15.0-1090-nvidia - 5.15.0-1090.91 linux-modules-nvidia-fs-5.15.0-1090-nvidia - 5.15.0-1090.91 linux-modules-nvidia-fs-5.15.0-1090-nvidia-lowlatency - 5.15.0-1090.91 linux-nvidia-cloud-tools-5.15.0-1090 - 5.15.0-1090.91 linux-nvidia-cloud-tools-common - 5.15.0-1090.91 linux-nvidia-headers-5.15.0-1090 - 5.15.0-1090.91 linux-nvidia-tools-5.15.0-1090 - 5.15.0-1090.91 linux-nvidia-tools-common - 5.15.0-1090.91 linux-nvidia-tools-host - 5.15.0-1090.91 linux-tools-5.15.0-1090-nvidia - 5.15.0-1090.91 linux-tools-5.15.0-1090-nvidia-lowlatency - 5.15.0-1090.91 No subscription required linux-buildinfo-5.15.0-1091-gke - 5.15.0-1091.97 linux-gke-headers-5.15.0-1091 - 5.15.0-1091.97 linux-gke-tools-5.15.0-1091 - 5.15.0-1091.97 linux-headers-5.15.0-1091-gke - 5.15.0-1091.97 linux-image-5.15.0-1091-gke - 5.15.0-1091.97 linux-image-unsigned-5.15.0-1091-gke - 5.15.0-1091.97 linux-modules-5.15.0-1091-gke - 5.15.0-1091.97 linux-modules-extra-5.15.0-1091-gke - 5.15.0-1091.97 linux-tools-5.15.0-1091-gke - 5.15.0-1091.97 No subscription required linux-buildinfo-5.15.0-1092-oracle - 5.15.0-1092.98 linux-headers-5.15.0-1092-oracle - 5.15.0-1092.98 linux-image-5.15.0-1092-oracle - 5.15.0-1092.98 linux-image-unsigned-5.15.0-1092-oracle - 5.15.0-1092.98 linux-modules-5.15.0-1092-oracle - 5.15.0-1092.98 linux-modules-extra-5.15.0-1092-oracle - 5.15.0-1092.98 linux-oracle-headers-5.15.0-1092 - 5.15.0-1092.98 linux-oracle-tools-5.15.0-1092 - 5.15.0-1092.98 linux-tools-5.15.0-1092-oracle - 5.15.0-1092.98 No subscription required linux-aws-cloud-tools-5.15.0-1095 - 5.15.0-1095.102 linux-aws-headers-5.15.0-1095 - 5.15.0-1095.102 linux-aws-tools-5.15.0-1095 - 5.15.0-1095.102 linux-buildinfo-5.15.0-1095-aws - 5.15.0-1095.102 linux-buildinfo-5.15.0-1095-aws-64k - 5.15.0-1095.102 linux-cloud-tools-5.15.0-1095-aws - 5.15.0-1095.102 linux-cloud-tools-5.15.0-1095-aws-64k - 5.15.0-1095.102 linux-headers-5.15.0-1095-aws - 5.15.0-1095.102 linux-headers-5.15.0-1095-aws-64k - 5.15.0-1095.102 linux-image-5.15.0-1095-aws - 5.15.0-1095.102 linux-image-5.15.0-1095-aws-64k - 5.15.0-1095.102 linux-image-unsigned-5.15.0-1095-aws - 5.15.0-1095.102 linux-image-unsigned-5.15.0-1095-aws-64k - 5.15.0-1095.102 linux-modules-5.15.0-1095-aws - 5.15.0-1095.102 linux-modules-5.15.0-1095-aws-64k - 5.15.0-1095.102 linux-modules-extra-5.15.0-1095-aws - 5.15.0-1095.102 linux-modules-extra-5.15.0-1095-aws-64k - 5.15.0-1095.102 linux-tools-5.15.0-1095-aws - 5.15.0-1095.102 linux-tools-5.15.0-1095-aws-64k - 5.15.0-1095.102 No subscription required linux-buildinfo-5.15.0-1095-gcp - 5.15.0-1095.104 linux-gcp-headers-5.15.0-1095 - 5.15.0-1095.104 linux-gcp-tools-5.15.0-1095 - 5.15.0-1095.104 linux-headers-5.15.0-1095-gcp - 5.15.0-1095.104 linux-image-5.15.0-1095-gcp - 5.15.0-1095.104 linux-image-unsigned-5.15.0-1095-gcp - 5.15.0-1095.104 linux-modules-5.15.0-1095-gcp - 5.15.0-1095.104 linux-modules-extra-5.15.0-1095-gcp - 5.15.0-1095.104 linux-tools-5.15.0-1095-gcp - 5.15.0-1095.104 No subscription required linux-buildinfo-5.15.0-160-generic - 5.15.0-160.170 linux-buildinfo-5.15.0-160-generic-64k - 5.15.0-160.170 linux-buildinfo-5.15.0-160-generic-lpae - 5.15.0-160.170 linux-buildinfo-5.15.0-160-lowlatency - 5.15.0-160.170 linux-buildinfo-5.15.0-160-lowlatency-64k - 5.15.0-160.170 linux-cloud-tools-5.15.0-160 - 5.15.0-160.170 linux-cloud-tools-5.15.0-160-generic - 5.15.0-160.170 linux-cloud-tools-5.15.0-160-lowlatency - 5.15.0-160.170 linux-cloud-tools-common - 5.15.0-160.170 linux-doc - 5.15.0-160.170 linux-headers-5.15.0-160 - 5.15.0-160.170 linux-headers-5.15.0-160-generic - 5.15.0-160.170 linux-headers-5.15.0-160-generic-64k - 5.15.0-160.170 linux-headers-5.15.0-160-generic-lpae - 5.15.0-160.170 linux-headers-5.15.0-160-lowlatency - 5.15.0-160.170 linux-headers-5.15.0-160-lowlatency-64k - 5.15.0-160.170 linux-image-5.15.0-160-generic - 5.15.0-160.170 linux-image-5.15.0-160-generic-64k - 5.15.0-160.170 linux-image-5.15.0-160-generic-lpae - 5.15.0-160.170 linux-image-5.15.0-160-lowlatency - 5.15.0-160.170 linux-image-5.15.0-160-lowlatency-64k - 5.15.0-160.170 linux-image-unsigned-5.15.0-160-generic - 5.15.0-160.170 linux-image-unsigned-5.15.0-160-generic-64k - 5.15.0-160.170 linux-image-unsigned-5.15.0-160-lowlatency - 5.15.0-160.170 linux-image-unsigned-5.15.0-160-lowlatency-64k - 5.15.0-160.170 linux-libc-dev - 5.15.0-160.170 linux-lowlatency-cloud-tools-5.15.0-160 - 5.15.0-160.170 linux-lowlatency-headers-5.15.0-160 - 5.15.0-160.170 linux-lowlatency-tools-5.15.0-160 - 5.15.0-160.170 linux-modules-5.15.0-160-generic - 5.15.0-160.170 linux-modules-5.15.0-160-generic-64k - 5.15.0-160.170 linux-modules-5.15.0-160-generic-lpae - 5.15.0-160.170 linux-modules-5.15.0-160-lowlatency - 5.15.0-160.170 linux-modules-5.15.0-160-lowlatency-64k - 5.15.0-160.170 linux-modules-extra-5.15.0-160-generic - 5.15.0-160.170 linux-modules-iwlwifi-5.15.0-160-generic - 5.15.0-160.170 linux-modules-iwlwifi-5.15.0-160-lowlatency - 5.15.0-160.170 linux-source-5.15.0 - 5.15.0-160.170 linux-tools-5.15.0-160 - 5.15.0-160.170 linux-tools-5.15.0-160-generic - 5.15.0-160.170 linux-tools-5.15.0-160-generic-64k - 5.15.0-160.170 linux-tools-5.15.0-160-generic-lpae - 5.15.0-160.170 linux-tools-5.15.0-160-lowlatency - 5.15.0-160.170 linux-tools-5.15.0-160-lowlatency-64k - 5.15.0-160.170 linux-tools-common - 5.15.0-160.170 linux-tools-host - 5.15.0-160.170 No subscription required linux-headers-xilinx-zynqmp - 5.15.0.1059.62 linux-headers-xilinx-zynqmp-5.15 - 5.15.0.1059.62 linux-image-xilinx-zynqmp - 5.15.0.1059.62 linux-image-xilinx-zynqmp-5.15 - 5.15.0.1059.62 linux-tools-xilinx-zynqmp - 5.15.0.1059.62 linux-tools-xilinx-zynqmp-5.15 - 5.15.0.1059.62 linux-xilinx-zynqmp - 5.15.0.1059.62 linux-xilinx-zynqmp-5.15 - 5.15.0.1059.62 No subscription required linux-cloud-tools-gkeop - 5.15.0.1078.77 linux-cloud-tools-gkeop-5.15 - 5.15.0.1078.77 linux-gkeop - 5.15.0.1078.77 linux-gkeop-5.15 - 5.15.0.1078.77 linux-headers-gkeop - 5.15.0.1078.77 linux-headers-gkeop-5.15 - 5.15.0.1078.77 linux-image-gkeop - 5.15.0.1078.77 linux-image-gkeop-5.15 - 5.15.0.1078.77 linux-modules-extra-gkeop - 5.15.0.1078.77 linux-modules-extra-gkeop-5.15 - 5.15.0.1078.77 linux-tools-gkeop - 5.15.0.1078.77 linux-tools-gkeop-5.15 - 5.15.0.1078.77 No subscription required linux-headers-ibm - 5.15.0.1089.85 linux-headers-ibm-5.15 - 5.15.0.1089.85 linux-ibm - 5.15.0.1089.85 linux-ibm-5.15 - 5.15.0.1089.85 linux-image-ibm - 5.15.0.1089.85 linux-image-ibm-5.15 - 5.15.0.1089.85 linux-tools-ibm - 5.15.0.1089.85 linux-tools-ibm-5.15 - 5.15.0.1089.85 No subscription required linux-cloud-tools-nvidia - 5.15.0.1090.90 linux-cloud-tools-nvidia-5.15 - 5.15.0.1090.90 linux-cloud-tools-nvidia-lowlatency - 5.15.0.1090.90 linux-cloud-tools-nvidia-lowlatency-5.15 - 5.15.0.1090.90 linux-headers-nvidia - 5.15.0.1090.90 linux-headers-nvidia-5.15 - 5.15.0.1090.90 linux-headers-nvidia-lowlatency - 5.15.0.1090.90 linux-headers-nvidia-lowlatency-5.15 - 5.15.0.1090.90 linux-image-nvidia - 5.15.0.1090.90 linux-image-nvidia...
ubuntu noble v1.103
Metadata:
BOSH Agent Version: 2.759.0
Kernel Version: 6.8.0-85.85
USNs:
Title: USN-7764-1 -- Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7764-1
Priorities: medium
Description:
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - ARM64 architecture; - x86 architecture; - Compute Acceleration Framework; - Bus devices; - AMD CDX bus driver; - DPLL subsystem; - EFI core; - GPIO subsystem; - GPU drivers; - HID subsystem; - I2C subsystem; - InfiniBand drivers; - Multiple devices driver; - Network drivers; - Mellanox network drivers; - NVME drivers; - Pin controllers subsystem; - RapidIO drivers; - Voltage and Current Regulator drivers; - SCSI subsystem; - SLIMbus drivers; - QCOM SoC drivers; - UFS subsystem; - USB DSL drivers; - Renesas USBHS Controller drivers; - USB Type-C Connector System Software Interface driver; - Framebuffer layer; - ACRN Hypervisor Service Module driver; - Network file system (NFS) client; - Proc file system; - SMB network file system; - Memory Management; - Scheduler infrastructure; - SoC audio core drivers; - Perf events; - Tracing infrastructure; - Memory management; - 802.1Q VLAN protocol; - Asynchronous Transfer Mode (ATM) subsystem; - Bluetooth subsystem; - Devlink API; - IPv4 networking; - IPv6 networking; - Logical Link layer; - Management Component Transport Protocol (MCTP); - Multipath TCP; - Netfilter; - Network traffic control; - Switch device API; - Wireless networking; - eXpress Data Path; (CVE-2025-22008, CVE-2025-21872, CVE-2025-21945, CVE-2025-37889, CVE-2025-21997, CVE-2025-21935, CVE-2025-21986, CVE-2025-21890, CVE-2025-21925, CVE-2024-58090, CVE-2025-38569, CVE-2025-21911, CVE-2025-21957, CVE-2025-21891, CVE-2025-21924, CVE-2025-21956, CVE-2025-21994, CVE-2025-22013, CVE-2025-21964, CVE-2025-21909, CVE-2025-21888, CVE-2025-21918, CVE-2025-21981, CVE-2025-21966, CVE-2025-22011, CVE-2025-21877, CVE-2025-21913, CVE-2025-21895, CVE-2025-21929, CVE-2025-22010, CVE-2025-21992, CVE-2025-21930, CVE-2025-21982, CVE-2025-21894, CVE-2025-21934, CVE-2025-21873, CVE-2025-21914, CVE-2025-21941, CVE-2025-21962, CVE-2025-22014, CVE-2025-21905, CVE-2025-21908, CVE-2025-21898, CVE-2025-21878, CVE-2025-22009, CVE-2025-21961, CVE-2025-22015, CVE-2025-21883, CVE-2025-21916, CVE-2025-22016, CVE-2025-21936, CVE-2025-21947, CVE-2025-21927, CVE-2025-22004, CVE-2025-21926, CVE-2025-21969, CVE-2025-21976, CVE-2025-21912, CVE-2025-21920, CVE-2025-21951, CVE-2025-22005, CVE-2025-21978, CVE-2025-21975, CVE-2025-22007, CVE-2025-21928, CVE-2025-21968, CVE-2025-21963, CVE-2025-21977, CVE-2025-21915, CVE-2025-21980, CVE-2025-22047, CVE-2025-21972, CVE-2025-21892, CVE-2025-22003, CVE-2025-21979, CVE-2025-21944, CVE-2025-21880, CVE-2025-21899, CVE-2025-21995, CVE-2025-22017, CVE-2025-21946, CVE-2025-22001, CVE-2025-21904, CVE-2025-21881, CVE-2025-21917, CVE-2025-21970, CVE-2025-21889, CVE-2025-21922, CVE-2025-21875, CVE-2025-21919, CVE-2025-21991, CVE-2025-21967, CVE-2025-21960, CVE-2025-21959, CVE-2025-21955, CVE-2025-21996, CVE-2025-21950, CVE-2025-21937, CVE-2025-21948, CVE-2025-21903, CVE-2025-21885, CVE-2025-21999, CVE-2025-21910) Update Instructions: Run sudo pro fix USN-7764-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1023-gkeop - 6.8.0-1023.25 linux-cloud-tools-6.8.0-1023-gkeop - 6.8.0-1023.25 linux-cloud-tools-gkeop - 6.8.0-1023.25 linux-cloud-tools-gkeop-6.8 - 6.8.0-1023.25 linux-gkeop - 6.8.0-1023.25 linux-gkeop-6.8 - 6.8.0-1023.25 linux-gkeop-cloud-tools-6.8.0-1023 - 6.8.0-1023.25 linux-gkeop-headers-6.8.0-1023 - 6.8.0-1023.25 linux-gkeop-tools-6.8.0-1023 - 6.8.0-1023.25 linux-headers-6.8.0-1023-gkeop - 6.8.0-1023.25 linux-headers-gkeop - 6.8.0-1023.25 linux-headers-gkeop-6.8 - 6.8.0-1023.25 linux-image-6.8.0-1023-gkeop - 6.8.0-1023.25 linux-image-gkeop - 6.8.0-1023.25 linux-image-gkeop-6.8 - 6.8.0-1023.25 linux-image-unsigned-6.8.0-1023-gkeop - 6.8.0-1023.25 linux-modules-6.8.0-1023-gkeop - 6.8.0-1023.25 linux-modules-extra-6.8.0-1023-gkeop - 6.8.0-1023.25 linux-modules-extra-gkeop - 6.8.0-1023.25 linux-modules-extra-gkeop-6.8 - 6.8.0-1023.25 linux-tools-6.8.0-1023-gkeop - 6.8.0-1023.25 linux-tools-gkeop - 6.8.0-1023.25 linux-tools-gkeop-6.8 - 6.8.0-1023.25 No subscription required linux-buildinfo-6.8.0-1036-gke - 6.8.0-1036.40 linux-buildinfo-6.8.0-1036-gke-64k - 6.8.0-1036.40 linux-gke - 6.8.0-1036.40 linux-gke-6.8 - 6.8.0-1036.40 linux-gke-64k - 6.8.0-1036.40 linux-gke-64k-6.8 - 6.8.0-1036.40 linux-gke-headers-6.8.0-1036 - 6.8.0-1036.40 linux-gke-tools-6.8.0-1036 - 6.8.0-1036.40 linux-headers-6.8.0-1036-gke - 6.8.0-1036.40 linux-headers-6.8.0-1036-gke-64k - 6.8.0-1036.40 linux-headers-gke - 6.8.0-1036.40 linux-headers-gke-6.8 - 6.8.0-1036.40 linux-headers-gke-64k - 6.8.0-1036.40 linux-headers-gke-64k-6.8 - 6.8.0-1036.40 linux-image-6.8.0-1036-gke - 6.8.0-1036.40 linux-image-6.8.0-1036-gke-64k - 6.8.0-1036.40 linux-image-gke - 6.8.0-1036.40 linux-image-gke-6.8 - 6.8.0-1036.40 linux-image-gke-64k - 6.8.0-1036.40 linux-image-gke-64k-6.8 - 6.8.0-1036.40 linux-image-unsigned-6.8.0-1036-gke - 6.8.0-1036.40 linux-image-unsigned-6.8.0-1036-gke-64k - 6.8.0-1036.40 linux-modules-6.8.0-1036-gke - 6.8.0-1036.40 linux-modules-6.8.0-1036-gke-64k - 6.8.0-1036.40 linux-modules-extra-6.8.0-1036-gke - 6.8.0-1036.40 linux-modules-extra-6.8.0-1036-gke-64k - 6.8.0-1036.40 linux-modules-iwlwifi-6.8.0-1036-gke - 6.8.0-1036.40 linux-modules-iwlwifi-gke - 6.8.0-1036.40 linux-modules-iwlwifi-gke-6.8 - 6.8.0-1036.40 linux-tools-6.8.0-1036-gke - 6.8.0-1036.40 linux-tools-6.8.0-1036-gke-64k - 6.8.0-1036.40 linux-tools-gke - 6.8.0-1036.40 linux-tools-gke-6.8 - 6.8.0-1036.40 linux-tools-gke-64k - 6.8.0-1036.40 linux-tools-gke-64k-6.8 - 6.8.0-1036.40 No subscription required linux-aws-6.8 - 6.8.0-1039.41 linux-aws-64k-6.8 - 6.8.0-1039.41 linux-aws-64k-lts-24.04 - 6.8.0-1039.41 linux-aws-cloud-tools-6.8.0-1039 - 6.8.0-1039.41 linux-aws-headers-6.8.0-1039 - 6.8.0-1039.41 linux-aws-lts-24.04 - 6.8.0-1039.41 linux-aws-tools-6.8.0-1039 - 6.8.0-1039.41 linux-buildinfo-6.8.0-1039-aws - 6.8.0-1039.41 linux-buildinfo-6.8.0-1039-aws-64k - 6.8.0-1039.41 linux-cloud-tools-6.8.0-1039-aws - 6.8.0-1039.41 linux-cloud-tools-6.8.0-1039-aws-64k - 6.8.0-1039.41 linux-headers-6.8.0-1039-aws - 6.8.0-1039.41 linux-headers-6.8.0-1039-aws-64k - 6.8.0-1039.41 linux-headers-aws-6.8 - 6.8.0-1039.41 linux-headers-aws-64k-6.8 - 6.8.0-1039.41 linux-headers-aws-64k-lts-24.04 - 6.8.0-1039.41 linux-headers-aws-lts-24.04 - 6.8.0-1039.41 linux-image-6.8.0-1039-aws - 6.8.0-1039.41 linux-image-6.8.0-1039-aws-64k - 6.8.0-1039.41 linux-image-aws-6.8 - 6.8.0-1039.41 linux-image-aws-64k-6.8 - 6.8.0-1039.41 linux-image-aws-64k-lts-24.04 - 6.8.0-1039.41 linux-image-aws-lts-24.04 - 6.8.0-1039.41 linux-image-uc-6.8.0-1039-aws - 6.8.0-1039.41 linux-image-uc-6.8.0-1039-aws-64k - 6.8.0-1039.41 linux-image-uc-aws-6.8 - 6.8.0-1039.41 linux-image-uc-aws-lts-24.04 - 6.8.0-1039.41 linux-image-unsigned-6.8.0-1039-aws - 6.8.0-1039.41 linux-image-unsigned-6.8.0-1039-aws-64k - 6.8.0-1039.41 linux-modules-6.8.0-1039-aws - 6.8.0-1039.41 linux-modules-6.8.0-1039-aws-64k - 6.8.0-1039.41 linux-modules-extra-6.8.0-1039-aws - 6.8.0-1039.41 linux-modules-extra-6.8.0-1039-aws-64k - 6.8.0-1039.41 linux-modules-extra-aws-6.8 - 6.8.0-1039.41 linux-modules-extra-aws-64k-6.8 - 6.8.0-1039.41 linux-modules-extra-aws-64k-lts-24.04 - 6.8.0-1039.41 linux-modules-extra-aws-lts-24.04 - 6.8.0-1039.41 linux-tools-6.8.0-1039-aws - 6.8.0-1039.41 linux-tools-6.8.0-1039-aws-64k - 6.8.0-1039.41 linux-tools-aws-6.8 - 6.8.0-1039.41 linux-tools-aws-64k-6.8 - 6.8.0-1039.41 linux-tools-aws-64k-lts-24.04 - 6.8.0-1039.41 linux-tools-aws-lts-24.04 - 6.8.0-1039.41 No subscription required linux-buildinfo-6.8.0-1040-gcp - 6.8.0-1040.42 linux-buildinfo-6.8.0-1040-gcp-64k - 6.8.0-1040.42 linux-gcp-6.8 - 6.8.0-1040.42 linux-gcp-64k-6.8 - 6.8.0-1040.42 linux-gcp-64k-lts-24.04 - 6.8.0-1040.42 linux-gcp-headers-6.8.0-1040 - 6.8.0-1040.42 linux-gcp-lts-24.04 - 6.8.0-1040.42 linux-gcp-tools-6.8.0-1040 - 6.8.0-1040.42 linux-headers-6.8.0-1040-gcp - 6.8.0-1040.42 linux-headers-6.8.0-1040-gcp-64k - 6.8.0-1040.42 linux-headers-gcp-6.8 - 6.8.0-1040.42 linux-headers-gcp-64k-6.8 - 6.8.0-1040.42 linux-headers-gcp-64k-lts-24.04 - 6.8.0-1040.42 linux-headers-gcp-lts-24.04 - 6.8.0-1040.42 linux-image-6.8.0-1040-gcp - 6.8.0-1040.42 linux-image-6.8.0-1040-gcp-64k - 6.8.0-1040.42 linux-image-gcp-6.8 - 6.8.0-1040.42 linux-image-gcp-64k-6.8 - 6.8.0-1040.42 linux-image-gcp-64k-lts-24.04 - 6.8.0-1040.42 linux-image-gcp-lts-24.04 - 6.8.0-1040.42 linux-image-unsigned-6.8.0-1040-gcp - 6.8.0-1040.42 linux-image-unsigned-6.8.0-1040-gcp-64k - 6.8.0-1040.42 linux-modules-6.8.0-1040-gcp - 6.8.0-1040.42 linux-modules-6.8.0-1040-gcp-64k - 6.8.0-1040.42 linux-modules-extra-6.8.0-1040-gcp - 6.8.0-1040.42 linux-modules-extra-6.8.0-1040-gcp-64k - 6.8.0-1040.42 linux-modules-extra-gcp-6.8 - 6.8.0-1040.42 linux-modules-extra-gcp-64k-6.8 - 6.8.0-1040.42 linux-modules-extra-gcp-64k-lts-24.04 - 6.8.0-1040.42 linux-modules-extra-gcp-lts-24.04 - 6.8.0-1040.42 linux-tools-6.8.0-1040-gcp - 6.8.0-1040.42 linux-tools-6.8.0-1040-gcp-64k - 6.8.0-1040.42 linux-tools-gcp-6.8 - 6.8.0-1040.42 linux-tools-gcp-64k-6.8 - 6.8.0-1040.42 linux-tools-gcp-64k-lts-24.04 - 6.8.0-1040.42 linux-tools-gcp-lts-24.04 - 6.8.0-1040.42 No subscription required linux-bpf-dev - 6.8.0-84.84 linux-buildinfo-6.8.0-84-generic - 6.8.0-84.84 linux-buildinfo-6.8.0-84-generic-64k - 6.8.0-84.84 linux-cloud-tools-6.8.0-84 - 6.8.0-84.84 linux-cloud-tools-6.8.0-84-generic - 6.8.0-84.84 linux-cloud-tools-common - 6.8.0-84.84 linux-cloud-tools-generic - 6.8.0-84.84 linux-cloud-tools-generic-6.8 - 6.8.0-84.84 linux-cloud-tools-virtual - 6.8.0-84.84 linux-cloud-tools-virtual-6.8 - 6.8.0-8...
ubuntu jammy v1.926
🚨 This stemcell version should NOT be used🚨
It has a kernel regression that may cause CPU lockups: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2126434?mkt_tok=MDY2LUVPVi0zMzUAAAGdSgT2ZvEO-2pxTFOJDrrK9KAbRPHNRNX6ofWRQxkP_Zb8qh7EDFcMpGEXbWsRLwMGpuNc62TlpoH0eVcHql4l7PtHg76A1FkMOkN70758hvpsOcA
Metadata:
BOSH Agent Version: 2.759.0
Kernel Version: 5.15.0.157.155
USNs:
Title: USN-7786-1 -- OpenSSL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7786-1
Priorities: medium,low
Description:
Stanislav Fort discovered that OpenSSL incorrectly handled memory when trying to decrypt CMS messages encrypted with password-based encryption. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2025-9230) Stanislav Fort discovered that OpenSSL had a timing side-channel in SM2 signature computations on ARM platforms. A remote attacker could possibly use this issue to recover private data. This issue only affected Ubuntu 25.04. (CVE-2025-9231) Stanislav Fort discovered that OpenSSL incorrectly handled memory during HTTP requests when "no_proxy" environment variable is set. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 25.04. (CVE-2025-9232) Update Instructions: Run sudo pro fix USN-7786-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libssl-dev - 3.0.2-0ubuntu1.20 libssl-doc - 3.0.2-0ubuntu1.20 libssl3 - 3.0.2-0ubuntu1.20 openssl - 3.0.2-0ubuntu1.20 No subscription required
CVEs:
- https://ubuntu.com/security/CVE-2025-9231
- https://ubuntu.com/security/CVE-2025-9232
- https://ubuntu.com/security/CVE-2025-9230
Title: USN-7793-1 -- Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7793-1
Priorities: medium
Description:
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Network traffic control; - VMware vSockets driver; (CVE-2025-38477, CVE-2025-38618) Update Instructions: Run sudo pro fix USN-7793-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-5.15.0-1046-nvidia-tegra - 5.15.0-1046.46 linux-buildinfo-5.15.0-1046-nvidia-tegra-rt - 5.15.0-1046.46 linux-headers-5.15.0-1046-nvidia-tegra - 5.15.0-1046.46 linux-headers-5.15.0-1046-nvidia-tegra-rt - 5.15.0-1046.46 linux-image-5.15.0-1046-nvidia-tegra - 5.15.0-1046.46 linux-image-5.15.0-1046-nvidia-tegra-rt - 5.15.0-1046.46 linux-image-unsigned-5.15.0-1046-nvidia-tegra - 5.15.0-1046.46 linux-image-unsigned-5.15.0-1046-nvidia-tegra-rt - 5.15.0-1046.46 linux-modules-5.15.0-1046-nvidia-tegra - 5.15.0-1046.46 linux-modules-5.15.0-1046-nvidia-tegra-rt - 5.15.0-1046.46 linux-modules-extra-5.15.0-1046-nvidia-tegra - 5.15.0-1046.46 linux-nvidia-tegra-headers-5.15.0-1046 - 5.15.0-1046.46 linux-nvidia-tegra-tools-5.15.0-1046 - 5.15.0-1046.46 linux-tools-5.15.0-1046-nvidia-tegra - 5.15.0-1046.46 linux-tools-5.15.0-1046-nvidia-tegra-rt - 5.15.0-1046.46 No subscription required linux-buildinfo-5.15.0-1057-xilinx-zynqmp - 5.15.0-1057.61 linux-headers-5.15.0-1057-xilinx-zynqmp - 5.15.0-1057.61 linux-image-5.15.0-1057-xilinx-zynqmp - 5.15.0-1057.61 linux-modules-5.15.0-1057-xilinx-zynqmp - 5.15.0-1057.61 linux-tools-5.15.0-1057-xilinx-zynqmp - 5.15.0-1057.61 linux-xilinx-zynqmp-headers-5.15.0-1057 - 5.15.0-1057.61 linux-xilinx-zynqmp-tools-5.15.0-1057 - 5.15.0-1057.61 No subscription required linux-buildinfo-5.15.0-1076-gkeop - 5.15.0-1076.84 linux-cloud-tools-5.15.0-1076-gkeop - 5.15.0-1076.84 linux-gkeop-cloud-tools-5.15.0-1076 - 5.15.0-1076.84 linux-gkeop-headers-5.15.0-1076 - 5.15.0-1076.84 linux-gkeop-tools-5.15.0-1076 - 5.15.0-1076.84 linux-headers-5.15.0-1076-gkeop - 5.15.0-1076.84 linux-image-5.15.0-1076-gkeop - 5.15.0-1076.84 linux-image-unsigned-5.15.0-1076-gkeop - 5.15.0-1076.84 linux-modules-5.15.0-1076-gkeop - 5.15.0-1076.84 linux-modules-extra-5.15.0-1076-gkeop - 5.15.0-1076.84 linux-tools-5.15.0-1076-gkeop - 5.15.0-1076.84 No subscription required linux-buildinfo-5.15.0-1087-ibm - 5.15.0-1087.90 linux-buildinfo-5.15.0-1087-raspi - 5.15.0-1087.90 linux-headers-5.15.0-1087-ibm - 5.15.0-1087.90 linux-headers-5.15.0-1087-raspi - 5.15.0-1087.90 linux-ibm-cloud-tools-common - 5.15.0-1087.90 linux-ibm-headers-5.15.0-1087 - 5.15.0-1087.90 linux-ibm-source-5.15.0 - 5.15.0-1087.90 linux-ibm-tools-5.15.0-1087 - 5.15.0-1087.90 linux-ibm-tools-common - 5.15.0-1087.90 linux-image-5.15.0-1087-ibm - 5.15.0-1087.90 linux-image-5.15.0-1087-raspi - 5.15.0-1087.90 linux-image-unsigned-5.15.0-1087-ibm - 5.15.0-1087.90 linux-modules-5.15.0-1087-ibm - 5.15.0-1087.90 linux-modules-5.15.0-1087-raspi - 5.15.0-1087.90 linux-modules-extra-5.15.0-1087-ibm - 5.15.0-1087.90 linux-modules-extra-5.15.0-1087-raspi - 5.15.0-1087.90 linux-raspi-headers-5.15.0-1087 - 5.15.0-1087.90 linux-raspi-tools-5.15.0-1087 - 5.15.0-1087.90 linux-tools-5.15.0-1087-ibm - 5.15.0-1087.90 linux-tools-5.15.0-1087-raspi - 5.15.0-1087.90 No subscription required linux-buildinfo-5.15.0-1088-nvidia - 5.15.0-1088.89 linux-buildinfo-5.15.0-1088-nvidia-lowlatency - 5.15.0-1088.89 linux-cloud-tools-5.15.0-1088-nvidia - 5.15.0-1088.89 linux-cloud-tools-5.15.0-1088-nvidia-lowlatency - 5.15.0-1088.89 linux-headers-5.15.0-1088-nvidia - 5.15.0-1088.89 linux-headers-5.15.0-1088-nvidia-lowlatency - 5.15.0-1088.89 linux-image-5.15.0-1088-nvidia - 5.15.0-1088.89 linux-image-5.15.0-1088-nvidia-lowlatency - 5.15.0-1088.89 linux-image-unsigned-5.15.0-1088-nvidia - 5.15.0-1088.89 linux-image-unsigned-5.15.0-1088-nvidia-lowlatency - 5.15.0-1088.89 linux-modules-5.15.0-1088-nvidia - 5.15.0-1088.89 linux-modules-5.15.0-1088-nvidia-lowlatency - 5.15.0-1088.89 linux-modules-extra-5.15.0-1088-nvidia - 5.15.0-1088.89 linux-modules-nvidia-fs-5.15.0-1088-nvidia - 5.15.0-1088.89 linux-modules-nvidia-fs-5.15.0-1088-nvidia-lowlatency - 5.15.0-1088.89 linux-nvidia-cloud-tools-5.15.0-1088 - 5.15.0-1088.89 linux-nvidia-cloud-tools-common - 5.15.0-1088.89 linux-nvidia-headers-5.15.0-1088 - 5.15.0-1088.89 linux-nvidia-tools-5.15.0-1088 - 5.15.0-1088.89 linux-nvidia-tools-common - 5.15.0-1088.89 linux-nvidia-tools-host - 5.15.0-1088.89 linux-tools-5.15.0-1088-nvidia - 5.15.0-1088.89 linux-tools-5.15.0-1088-nvidia-lowlatency - 5.15.0-1088.89 No subscription required linux-buildinfo-5.15.0-1088-intel-iotg - 5.15.0-1088.94 linux-cloud-tools-5.15.0-1088-intel-iotg - 5.15.0-1088.94 linux-headers-5.15.0-1088-intel-iotg - 5.15.0-1088.94 linux-image-5.15.0-1088-intel-iotg - 5.15.0-1088.94 linux-image-unsigned-5.15.0-1088-intel-iotg - 5.15.0-1088.94 linux-intel-iotg-cloud-tools-5.15.0-1088 - 5.15.0-1088.94 linux-intel-iotg-cloud-tools-common - 5.15.0-1088.94 linux-intel-iotg-headers-5.15.0-1088 - 5.15.0-1088.94 linux-intel-iotg-tools-5.15.0-1088 - 5.15.0-1088.94 linux-intel-iotg-tools-common - 5.15.0-1088.94 linux-intel-iotg-tools-host - 5.15.0-1088.94 linux-modules-5.15.0-1088-intel-iotg - 5.15.0-1088.94 linux-modules-extra-5.15.0-1088-intel-iotg - 5.15.0-1088.94 linux-modules-iwlwifi-5.15.0-1088-intel-iotg - 5.15.0-1088.94 linux-tools-5.15.0-1088-intel-iotg - 5.15.0-1088.94 No subscription required linux-buildinfo-5.15.0-1091-oracle - 5.15.0-1091.97 linux-headers-5.15.0-1091-oracle - 5.15.0-1091.97 linux-image-5.15.0-1091-oracle - 5.15.0-1091.97 linux-image-unsigned-5.15.0-1091-oracle - 5.15.0-1091.97 linux-modules-5.15.0-1091-oracle - 5.15.0-1091.97 linux-modules-extra-5.15.0-1091-oracle - 5.15.0-1091.97 linux-oracle-headers-5.15.0-1091 - 5.15.0-1091.97 linux-oracle-tools-5.15.0-1091 - 5.15.0-1091.97 linux-tools-5.15.0-1091-oracle - 5.15.0-1091.97 No subscription required linux-aws-cloud-tools-5.15.0-1093 - 5.15.0-1093.100 linux-aws-headers-5.15.0-1093 - 5.15.0-1093.100 linux-aws-tools-5.15.0-1093 - 5.15.0-1093.100 linux-buildinfo-5.15.0-1093-aws - 5.15.0-1093.100 linux-buildinfo-5.15.0-1093-aws-64k - 5.15.0-1093.100 linux-cloud-tools-5.15.0-1093-aws - 5.15.0-1093.100 linux-cloud-tools-5.15.0-1093-aws-64k - 5.15.0-1093.100 linux-headers-5.15.0-1093-aws - 5.15.0-1093.100 linux-headers-5.15.0-1093-aws-64k - 5.15.0-1093.100 linux-image-5.15.0-1093-aws - 5.15.0-1093.100 linux-image-5.15.0-1093-aws-64k - 5.15.0-1093.100 linux-image-unsigned-5.15.0-1093-aws - 5.15.0-1093.100 linux-image-unsigned-5.15.0-1093-aws-64k - 5.15.0-1093.100 linux-modules-5.15.0-1093-aws - 5.15.0-1093.100 linux-modules-5.15.0-1093-aws-64k - 5.15.0-1093.100 linux-modules-extra-5.15.0-1093-aws - 5.15.0-1093.100 linux-modules-extra-5.15.0-1093-aws-64k - 5.15.0-1093.100 linux-tools-5.15.0-1093-aws - 5.15.0-1093.100 linux-tools-5.15.0-1093-aws-64k - 5.15.0-1093.100 No subscription required linux-buildinfo-5.15.0-1093-gcp - 5.15.0-1093.102 linux-gcp-headers-5.15.0-1093 - 5.15.0-1093.102 linux-gcp-tools-5.15.0-1093 - 5.15.0-1093.102 linux-headers-5.15.0-1093-gcp - 5.15.0-1093.102 linux-image-5.15.0-1093-gcp - 5.15.0-1093.102 linux-image-unsigned-5.15.0-1093-gcp - 5.15.0-1093.102 linux-modules-5.15.0-1093-gcp - 5.15.0-1093.102 linux-modules-extra-5.15.0-1093-gcp - 5.15.0-1093.102 linux-tools-5.15.0-1093-gcp - 5.15.0-1093.102 No subscription required linux-buildinfo-5.15.0-157-generic - 5.15.0-157.167 linux-buildinfo-5.15.0-157-generic-64k - 5.15.0-157.167 linux-buildinfo-5.15.0-157-generic-lpae - 5.15.0-157.167 linux-buildinfo-5.15.0-157-lowlatency - 5.15.0-157.167 linux-buildinfo-5.15.0-157-lowlatency-64k - 5.15.0-157.167 linux-cloud-tools-5.15.0-157 - 5.15.0-157.167 linux-cloud-tools-5.15.0-157-generic - 5.15.0-157.167 linux-cloud-tools-5.15.0-157-lowlatency - 5.15.0-157.167 linux-cloud-tools-common - 5.15.0-157.167 linux-doc - 5.15.0-157.167 linux-headers-5.15.0-157 - 5.15.0-157.167 linux-headers-5.15.0-157-generic - 5.15.0-157.167 linux-headers-5.15.0-157-generic-64k - 5.15.0-157.167 linux-headers-5.15.0-15...
ubuntu jammy v1.918
🚨 This stemcell version should NOT be used🚨
It has a kernel regression that may cause CPU lockups: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2126434?mkt_tok=MDY2LUVPVi0zMzUAAAGdSgT2ZvEO-2pxTFOJDrrK9KAbRPHNRNX6ofWRQxkP_Zb8qh7EDFcMpGEXbWsRLwMGpuNc62TlpoH0eVcHql4l7PtHg76A1FkMOkN70758hvpsOcA
We will ship another stemcell as soon as Canonical fixes the issue.
Metadata:
BOSH Agent Version: 2.759.0
Kernel Version: 5.15.0.156.154
USNs:
Title: USN-7760-1 -- GNU C Library vulnerability
URL: https://ubuntu.com/security/notices/USN-7760-1
Priorities: medium
Description:
It was discovered that the GNU C Library incorrectly handled the regcomp function when memory allocation failures occured. An attacker could use this issue to cause applications to crash, leading to a denial of service, or possibly execute arbitrary code. Update Instructions: Run sudo pro fix USN-7760-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: glibc-doc - 2.35-0ubuntu3.11 glibc-source - 2.35-0ubuntu3.11 libc-bin - 2.35-0ubuntu3.11 libc-dev-bin - 2.35-0ubuntu3.11 libc-devtools - 2.35-0ubuntu3.11 libc6 - 2.35-0ubuntu3.11 libc6-amd64 - 2.35-0ubuntu3.11 libc6-dev - 2.35-0ubuntu3.11 libc6-dev-amd64 - 2.35-0ubuntu3.11 libc6-dev-i386 - 2.35-0ubuntu3.11 libc6-dev-s390 - 2.35-0ubuntu3.11 libc6-dev-x32 - 2.35-0ubuntu3.11 libc6-i386 - 2.35-0ubuntu3.11 libc6-prof - 2.35-0ubuntu3.11 libc6-s390 - 2.35-0ubuntu3.11 libc6-x32 - 2.35-0ubuntu3.11 locales - 2.35-0ubuntu3.11 locales-all - 2.35-0ubuntu3.11 nscd - 2.35-0ubuntu3.11 No subscription required
CVEs:
Title: USN-7774-1 -- Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7774-1
Priorities: medium,high
Description:
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - PowerPC architecture; - x86 architecture; - ACPI drivers; - Serial ATA and Parallel ATA drivers; - Drivers core; - ATA over ethernet (AOE) driver; - Network block device driver; - Bus devices; - Clock framework and drivers; - Hardware crypto device drivers; - DMA engine subsystem; - EDAC drivers; - GPU drivers; - HID subsystem; - InfiniBand drivers; - Input Device (Miscellaneous) drivers; - Multiple devices driver; - Media drivers; - VMware VMCI Driver; - MMC subsystem; - MTD block device drivers; - Network drivers; - Pin controllers subsystem; - x86 platform drivers; - PTP clock framework; - RapidIO drivers; - Voltage and Current Regulator drivers; - Remote Processor subsystem; - S/390 drivers; - SCSI subsystem; - ASPEED SoC drivers; - TCM subsystem; - Thermal drivers; - Thunderbolt and USB4 drivers; - TTY drivers; - UFS subsystem; - USB Gadget drivers; - Renesas USBHS Controller drivers; - USB Type-C support driver; - Virtio Host (VHOST) subsystem; - Backlight driver; - Framebuffer layer; - BTRFS file system; - File systems infrastructure; - Ext4 file system; - F2FS file system; - JFFS2 file system; - JFS file system; - Network file system (NFS) client; - Network file system (NFS) server daemon; - NTFS3 file system; - DRM display driver; - Memory Management; - Mellanox drivers; - Memory management; - Netfilter; - Network sockets; - IPC subsystem; - BPF subsystem; - Perf events; - Kernel exit() syscall; - Restartable seuqences system call mechanism; - Timer subsystem; - Tracing infrastructure; - Appletalk network protocol; - Asynchronous Transfer Mode (ATM) subsystem; - Networking core; - IPv6 networking; - MultiProtocol Label Switching driver; - NetLabel subsystem; - Netlink; - NFC subsystem; - Open vSwitch; - Rose network layer; - RxRPC session sockets; - Network traffic control; - TIPC protocol; - VMware vSockets driver; - USB sound devices; (CVE-2025-38465, CVE-2025-38386, CVE-2025-38273, CVE-2025-38227, CVE-2025-38107, CVE-2025-37958, CVE-2025-38371, CVE-2025-38328, CVE-2025-38348, CVE-2025-38100, CVE-2025-38336, CVE-2025-38420, CVE-2025-38154, CVE-2025-38542, CVE-2025-38222, CVE-2025-38406, CVE-2025-37948, CVE-2025-38112, CVE-2025-38145, CVE-2025-38163, CVE-2025-38464, CVE-2025-38085, CVE-2025-38342, CVE-2025-38310, CVE-2025-38326, CVE-2025-38418, CVE-2025-38362, CVE-2025-38412, CVE-2025-38219, CVE-2025-38332, CVE-2025-38387, CVE-2025-38262, CVE-2025-38157, CVE-2025-38514, CVE-2025-38466, CVE-2025-38313, CVE-2025-38159, CVE-2024-44939, CVE-2025-38352, CVE-2025-38459, CVE-2025-38419, CVE-2025-38086, CVE-2025-38298, CVE-2025-38146, CVE-2025-38181, CVE-2025-38448, CVE-2025-38231, CVE-2025-38461, CVE-2025-38251, CVE-2025-38391, CVE-2025-38515, CVE-2024-26726, CVE-2025-38462, CVE-2025-38416, CVE-2025-38280, CVE-2025-38226, CVE-2025-38211, CVE-2025-38120, CVE-2025-38377, CVE-2025-38147, CVE-2025-38204, CVE-2025-38345, CVE-2025-38424, CVE-2025-38203, CVE-2025-38443, CVE-2025-38197, CVE-2025-38067, CVE-2025-38400, CVE-2025-38229, CVE-2025-38108, CVE-2025-38319, CVE-2025-38445, CVE-2025-38212, CVE-2025-38184, CVE-2025-38363, CVE-2025-38160, CVE-2024-57883, CVE-2025-38441, CVE-2025-38320, CVE-2025-38393, CVE-2025-38200, CVE-2025-38467, CVE-2025-38444, CVE-2025-38194, CVE-2025-38460, CVE-2025-38167, CVE-2025-38428, CVE-2025-38312, CVE-2025-38111, CVE-2025-38498, CVE-2025-38135, CVE-2025-38237, CVE-2025-38457, CVE-2025-38401, CVE-2025-38206, CVE-2025-38293, CVE-2025-38143, CVE-2025-38161, CVE-2025-38136, CVE-2022-48703, CVE-2025-38513, CVE-2025-38430, CVE-2025-38384, CVE-2025-38346, CVE-2025-38337, CVE-2025-38088, CVE-2025-38257, CVE-2025-38395, CVE-2025-38153, CVE-2025-38263, CVE-2025-38218, CVE-2024-26775, CVE-2025-38305, CVE-2025-38119, CVE-2025-38389, CVE-2025-38102, CVE-2025-38074, CVE-2025-38173, CVE-2025-38138, CVE-2025-38103, CVE-2025-38286, CVE-2025-38458, CVE-2025-38174, CVE-2025-38245, CVE-2025-38084, CVE-2025-38415, CVE-2025-38516, CVE-2025-38090, CVE-2025-38439, CVE-2025-38403, CVE-2025-38115, CVE-2025-38344, CVE-2025-38410, CVE-2025-38375, CVE-2025-37963, CVE-2025-38249, CVE-2025-38324, CVE-2025-38122, CVE-2025-38540, CVE-2025-38399, CVE-2025-21888, CVE-2025-38285) Update Instructions: Run sudo pro fix USN-7774-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-5.15.0-1045-nvidia-tegra - 5.15.0-1045.45 linux-buildinfo-5.15.0-1045-nvidia-tegra-rt - 5.15.0-1045.45 linux-headers-5.15.0-1045-nvidia-tegra - 5.15.0-1045.45 linux-headers-5.15.0-1045-nvidia-tegra-rt - 5.15.0-1045.45 linux-image-5.15.0-1045-nvidia-tegra - 5.15.0-1045.45 linux-image-5.15.0-1045-nvidia-tegra-rt - 5.15.0-1045.45 linux-image-unsigned-5.15.0-1045-nvidia-tegra - 5.15.0-1045.45 linux-image-unsigned-5.15.0-1045-nvidia-tegra-rt - 5.15.0-1045.45 linux-modules-5.15.0-1045-nvidia-tegra - 5.15.0-1045.45 linux-modules-5.15.0-1045-nvidia-tegra-rt - 5.15.0-1045.45 linux-modules-extra-5.15.0-1045-nvidia-tegra - 5.15.0-1045.45 linux-nvidia-tegra-headers-5.15.0-1045 - 5.15.0-1045.45 linux-nvidia-tegra-tools-5.15.0-1045 - 5.15.0-1045.45 linux-tools-5.15.0-1045-nvidia-tegra - 5.15.0-1045.45 linux-tools-5.15.0-1045-nvidia-tegra-rt - 5.15.0-1045.45 No subscription required linux-buildinfo-5.15.0-1056-xilinx-zynqmp - 5.15.0-1056.60 linux-headers-5.15.0-1056-xilinx-zynqmp - 5.15.0-1056.60 linux-image-5.15.0-1056-xilinx-zynqmp - 5.15.0-1056.60 linux-modules-5.15.0-1056-xilinx-zynqmp - 5.15.0-1056.60 linux-tools-5.15.0-1056-xilinx-zynqmp - 5.15.0-1056.60 linux-xilinx-zynqmp-headers-5.15.0-1056 - 5.15.0-1056.60 linux-xilinx-zynqmp-tools-5.15.0-1056 - 5.15.0-1056.60 No subscription required linux-buildinfo-5.15.0-1075-gkeop - 5.15.0-1075.83 linux-cloud-tools-5.15.0-1075-gkeop - 5.15.0-1075.83 linux-gkeop-cloud-tools-5.15.0-1075 - 5.15.0-1075.83 linux-gkeop-headers-5.15.0-1075 - 5.15.0-1075.83 linux-gkeop-tools-5.15.0-1075 - 5.15.0-1075.83 linux-headers-5.15.0-1075-gkeop - 5.15.0-1075.83 linux-image-5.15.0-1075-gkeop - 5.15.0-1075.83 linux-image-unsigned-5.15.0-1075-gkeop - 5.15.0-1075.83 linux-modules-5.15.0-1075-gkeop - 5.15.0-1075.83 linux-modules-extra-5.15.0-1075-gkeop - 5.15.0-1075.83 linux-tools-5.15.0-1075-gkeop - 5.15.0-1075.83 No subscription required linux-buildinfo-5.15.0-1086-ibm - 5.15.0-1086.89 linux-buildinfo-5.15.0-1086-raspi - 5.15.0-1086.89 linux-headers-5.15.0-1086-ibm - 5.15.0-1086.89 linux-headers-5.15.0-1086-raspi - 5.15.0-1086.89 linux-ibm-cloud-tools-common - 5.15.0-1086.89 linux-ibm-headers-5.15.0-1086 - 5.15.0-1086.89 linux-ibm-source-5.15.0 - 5.15.0-1086.89 linux-ibm-tools-5.15.0-1086 - 5.15.0-1086.89 linux-ibm-tools-common - 5.15.0-1086.89 linux-image-5.15.0-1086-ibm - 5.15.0-1086.89 linux-image-5.15.0-1086-raspi - 5.15.0-1086.89 linux-image-unsigned-5.15.0-1086-ibm - 5.15.0-1086.89 linux-modules-5.15.0-1086-ibm - 5.15.0-1086.89 linux-modules-5.15.0-1086-raspi - 5.15.0-1086.89 linux-modules-extra-5.15.0-1086-ibm - 5.15.0-1086.89 linux-modules-extra-5.15.0-1086-raspi - 5.15.0-1086.89 linux-raspi-headers-5.15.0-1086 - 5.15.0-1086.89 linux-raspi-tools-5.15.0-1086 - 5.15.0-1086.89 linux-tools-5.15.0-1086-ibm - 5.15.0-1086.89 linux-tools-5.15.0-1086-raspi - 5.15.0-1086.89 No subscription required linux-buildinfo-5.15.0-1087-nvidia - 5.15.0-1087.88 linux-buildinfo-5.15.0-1087-nvidia-lowlatency - 5.15.0-1087.88 linux-cloud-tools-5.15.0-1087-nvidia - 5.15.0-1087.88 linux-cloud-tools-5.15.0-1087-nvidia-lowlatency - 5.15.0-1087.88 linux-headers-5.15.0-1087-nvidia - 5.15.0-1087.88 linux-headers-5.15.0-1087-nvidia-lowlatency - 5.15.0-1087.88 linux-image-5.15.0-1087-nvidia - 5.15.0-1087.88 linux-image-5.15.0-1087-nvidia-lowlatency - 5.15.0-1087.88 linux-image-unsigned-5.15.0-1087-nvidia - 5.15.0-1087.88 linux-image-unsigned-5.15.0-1087-nvidia-lowlatency - 5.15.0-1087.88 linux-modules-5.15.0-1087-nvidia - 5.15.0-1087.88 linux-modules-5.15.0-1087-nvidia-lowlatency - 5.15.0-1087.88 linux-modules-extra-5.15.0-1087-nvidia - 5...
ubuntu noble v1.90
Metadata:
BOSH Agent Version: 2.759.0
Kernel Version: 6.8.0-83.83
USNs:
Title: USN-7743-1 -- libxml2 vulnerability
URL: https://ubuntu.com/security/notices/USN-7743-1
Priorities: medium
Description:
Nikita Sveshnikov discovered that libxml2 incorrectly handled recursion when processing XPath expressions. An attacker could possibly use this issue to cause a denial of service. Update Instructions: Run sudo pro fix USN-7743-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libxml2 - 2.9.14+dfsg-1.3ubuntu3.5 libxml2-dev - 2.9.14+dfsg-1.3ubuntu3.5 libxml2-doc - 2.9.14+dfsg-1.3ubuntu3.5 libxml2-utils - 2.9.14+dfsg-1.3ubuntu3.5 python3-libxml2 - 2.9.14+dfsg-1.3ubuntu3.5 No subscription required
CVEs:
Title: USN-7748-1 -- Vim vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7748-1
Priorities: medium
Description:
It was discovered that Vim incorrectly handled file extraction when opening maliciously crafted zip or tar archives. An attacker could possibly use this issue to create or overwrite files on the system and execute arbitrary code. Update Instructions: Run sudo pro fix USN-7748-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: vim - 2:9.1.0016-1ubuntu7.9 vim-athena - 2:9.1.0016-1ubuntu7.9 vim-common - 2:9.1.0016-1ubuntu7.9 vim-doc - 2:9.1.0016-1ubuntu7.9 vim-gtk3 - 2:9.1.0016-1ubuntu7.9 vim-gui-common - 2:9.1.0016-1ubuntu7.9 vim-motif - 2:9.1.0016-1ubuntu7.9 vim-nox - 2:9.1.0016-1ubuntu7.9 vim-runtime - 2:9.1.0016-1ubuntu7.9 vim-tiny - 2:9.1.0016-1ubuntu7.9 xxd - 2:9.1.0016-1ubuntu7.9 No subscription required
CVEs:
Title: USN-7751-1 -- SQLite vulnerability
URL: https://ubuntu.com/security/notices/USN-7751-1
Priorities: medium
Description:
It was discovered that the FTS5 SQLite extension incorrectly calculated certain array lengths. An attacker could use this issue to cause SQLite to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run sudo pro fix USN-7751-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: lemon - 3.45.1-1ubuntu2.5 libsqlite3-0 - 3.45.1-1ubuntu2.5 libsqlite3-dev - 3.45.1-1ubuntu2.5 libsqlite3-tcl - 3.45.1-1ubuntu2.5 sqlite3 - 3.45.1-1ubuntu2.5 sqlite3-doc - 3.45.1-1ubuntu2.5 sqlite3-tools - 3.45.1-1ubuntu2.5 No subscription required
CVEs:
Full Changelog: ubuntu-noble/v1.77...ubuntu-noble/v1.90
ubuntu jammy v1.915
Metadata:
BOSH Agent Version: 2.759.0
Kernel Version: 5.15.0.153.153
USNs:
Title: USN-7743-1 -- libxml2 vulnerability
URL: https://ubuntu.com/security/notices/USN-7743-1
Priorities: medium
Description:
Nikita Sveshnikov discovered that libxml2 incorrectly handled recursion when processing XPath expressions. An attacker could possibly use this issue to cause a denial of service. Update Instructions: Run sudo pro fix USN-7743-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libxml2 - 2.9.13+dfsg-1ubuntu0.9 libxml2-dev - 2.9.13+dfsg-1ubuntu0.9 libxml2-doc - 2.9.13+dfsg-1ubuntu0.9 libxml2-utils - 2.9.13+dfsg-1ubuntu0.9 python3-libxml2 - 2.9.13+dfsg-1ubuntu0.9 No subscription required
CVEs:
ubuntu noble v1.77
Metadata:
BOSH Agent Version: 2.759.0
Kernel Version: 6.8.0-78.78
USNs:
Title: USN-7595-1 -- Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7595-1
Priorities: medium
Description:
It was discovered that the CIFS network file system implementation in the Linux kernel did not properly verify the target namespace when handling upcalls. An attacker could use this to expose sensitive information. (CVE-2025-2312) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - GPIO subsystem; - GPU drivers; - InfiniBand drivers; - IRQ chip drivers; - Network drivers; - Mellanox network drivers; - i.MX PM domains; - SCSI subsystem; - USB Serial drivers; - AFS file system; - GFS2 file system; - File systems infrastructure; - File system notification infrastructure; - Overlay file system; - Proc file system; - SMB network file system; - Timer subsystem; - Kernel CPU control infrastructure; - Memory management; - Networking core; - DCCP (Datagram Congestion Control Protocol); - IPv6 networking; - IEEE 802.15.4 subsystem; - Open vSwitch; - Network traffic control; - VMware vSockets driver; (CVE-2025-21943, CVE-2025-21672, CVE-2024-57952, CVE-2024-57949, CVE-2025-21683, CVE-2025-21690, CVE-2025-21699, CVE-2025-21676, CVE-2024-57924, CVE-2025-21694, CVE-2024-57948, CVE-2025-21675, CVE-2024-57951, CVE-2025-21692, CVE-2025-21684, CVE-2025-21668, CVE-2025-21665, CVE-2025-21667, CVE-2025-21670, CVE-2025-21674, CVE-2025-21697, CVE-2024-53124, CVE-2025-21666, CVE-2025-21682, CVE-2025-21680, CVE-2025-21681, CVE-2025-21691, CVE-2025-21669, CVE-2025-21673, CVE-2024-50157, CVE-2025-21689, CVE-2025-21678) Update Instructions: Run sudo pro fix USN-7595-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1013-gkeop - 6.8.0-1013.15 linux-cloud-tools-6.8.0-1013-gkeop - 6.8.0-1013.15 linux-cloud-tools-gkeop - 6.8.0-1013.15 linux-cloud-tools-gkeop-6.8 - 6.8.0-1013.15 linux-gkeop - 6.8.0-1013.15 linux-gkeop-6.8 - 6.8.0-1013.15 linux-gkeop-cloud-tools-6.8.0-1013 - 6.8.0-1013.15 linux-gkeop-headers-6.8.0-1013 - 6.8.0-1013.15 linux-gkeop-tools-6.8.0-1013 - 6.8.0-1013.15 linux-headers-6.8.0-1013-gkeop - 6.8.0-1013.15 linux-headers-gkeop - 6.8.0-1013.15 linux-headers-gkeop-6.8 - 6.8.0-1013.15 linux-image-6.8.0-1013-gkeop - 6.8.0-1013.15 linux-image-gkeop - 6.8.0-1013.15 linux-image-gkeop-6.8 - 6.8.0-1013.15 linux-image-unsigned-6.8.0-1013-gkeop - 6.8.0-1013.15 linux-modules-6.8.0-1013-gkeop - 6.8.0-1013.15 linux-modules-extra-6.8.0-1013-gkeop - 6.8.0-1013.15 linux-modules-extra-gkeop - 6.8.0-1013.15 linux-modules-extra-gkeop-6.8 - 6.8.0-1013.15 linux-tools-6.8.0-1013-gkeop - 6.8.0-1013.15 linux-tools-gkeop - 6.8.0-1013.15 linux-tools-gkeop-6.8 - 6.8.0-1013.15 No subscription required linux-buildinfo-6.8.0-1026-gke - 6.8.0-1026.30 linux-gke - 6.8.0-1026.30 linux-gke-headers-6.8.0-1026 - 6.8.0-1026.30 linux-gke-tools-6.8.0-1026 - 6.8.0-1026.30 linux-headers-6.8.0-1026-gke - 6.8.0-1026.30 linux-headers-gke - 6.8.0-1026.30 linux-image-6.8.0-1026-gke - 6.8.0-1026.30 linux-image-gke - 6.8.0-1026.30 linux-image-unsigned-6.8.0-1026-gke - 6.8.0-1026.30 linux-modules-6.8.0-1026-gke - 6.8.0-1026.30 linux-modules-extra-6.8.0-1026-gke - 6.8.0-1026.30 linux-modules-iwlwifi-6.8.0-1026-gke - 6.8.0-1026.30 linux-modules-iwlwifi-gke - 6.8.0-1026.30 linux-tools-6.8.0-1026-gke - 6.8.0-1026.30 linux-tools-gke - 6.8.0-1026.30 No subscription required linux-buildinfo-6.8.0-1027-ibm - 6.8.0-1027.27 linux-headers-6.8.0-1027-ibm - 6.8.0-1027.27 linux-headers-ibm - 6.8.0-1027.27 linux-headers-ibm-classic - 6.8.0-1027.27 linux-headers-ibm-lts-24.04 - 6.8.0-1027.27 linux-ibm - 6.8.0-1027.27 linux-ibm-classic - 6.8.0-1027.27 linux-ibm-headers-6.8.0-1027 - 6.8.0-1027.27 linux-ibm-lts-24.04 - 6.8.0-1027.27 linux-ibm-tools-6.8.0-1027 - 6.8.0-1027.27 linux-image-6.8.0-1027-ibm - 6.8.0-1027.27 linux-image-ibm - 6.8.0-1027.27 linux-image-ibm-classic - 6.8.0-1027.27 linux-image-ibm-lts-24.04 - 6.8.0-1027.27 linux-image-unsigned-6.8.0-1027-ibm - 6.8.0-1027.27 linux-modules-6.8.0-1027-ibm - 6.8.0-1027.27 linux-modules-extra-6.8.0-1027-ibm - 6.8.0-1027.27 linux-modules-iwlwifi-6.8.0-1027-ibm - 6.8.0-1027.27 linux-modules-iwlwifi-ibm - 6.8.0-1027.27 linux-modules-iwlwifi-ibm-classic - 6.8.0-1027.27 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1027.27 linux-tools-6.8.0-1027-ibm - 6.8.0-1027.27 linux-tools-ibm - 6.8.0-1027.27 linux-tools-ibm-classic - 6.8.0-1027.27 linux-tools-ibm-lts-24.04 - 6.8.0-1027.27 No subscription required linux-buildinfo-6.8.0-1029-oem - 6.8.0-1029.29 linux-headers-6.8.0-1029-oem - 6.8.0-1029.29 linux-headers-oem-24.04 - 6.8.0-1029.29 linux-headers-oem-24.04a - 6.8.0-1029.29 linux-image-6.8.0-1029-oem - 6.8.0-1029.29 linux-image-oem-24.04 - 6.8.0-1029.29 linux-image-oem-24.04a - 6.8.0-1029.29 linux-image-uc-6.8.0-1029-oem - 6.8.0-1029.29 linux-image-uc-oem-24.04 - 6.8.0-1029.29 linux-image-uc-oem-24.04a - 6.8.0-1029.29 linux-image-unsigned-6.8.0-1029-oem - 6.8.0-1029.29 linux-modules-6.8.0-1029-oem - 6.8.0-1029.29 linux-modules-ipu6-6.8.0-1029-oem - 6.8.0-1029.29 linux-modules-ipu6-oem-24.04 - 6.8.0-1029.29 linux-modules-ipu6-oem-24.04a - 6.8.0-1029.29 linux-modules-iwlwifi-6.8.0-1029-oem - 6.8.0-1029.29 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1029.29 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1029.29 linux-modules-usbio-6.8.0-1029-oem - 6.8.0-1029.29 linux-modules-usbio-oem-24.04 - 6.8.0-1029.29 linux-modules-usbio-oem-24.04a - 6.8.0-1029.29 linux-oem-24.04 - 6.8.0-1029.29 linux-oem-24.04a - 6.8.0-1029.29 linux-oem-6.8-headers-6.8.0-1029 - 6.8.0-1029.29 linux-oem-6.8-tools-6.8.0-1029 - 6.8.0-1029.29 linux-tools-6.8.0-1029-oem - 6.8.0-1029.29 linux-tools-oem-24.04 - 6.8.0-1029.29 linux-tools-oem-24.04a - 6.8.0-1029.29 No subscription required linux-buildinfo-6.8.0-1029-nvidia - 6.8.0-1029.32 linux-buildinfo-6.8.0-1029-nvidia-64k - 6.8.0-1029.32 linux-cloud-tools-nvidia - 6.8.0-1029.32 linux-headers-6.8.0-1029-nvidia - 6.8.0-1029.32 linux-headers-6.8.0-1029-nvidia-64k - 6.8.0-1029.32 linux-headers-nvidia - 6.8.0-1029.32 linux-headers-nvidia-64k - 6.8.0-1029.32 linux-image-6.8.0-1029-nvidia - 6.8.0-1029.32 linux-image-6.8.0-1029-nvidia-64k - 6.8.0-1029.32 linux-image-nvidia - 6.8.0-1029.32 linux-image-nvidia-64k - 6.8.0-1029.32 linux-image-uc-6.8.0-1029-nvidia - 6.8.0-1029.32 linux-image-uc-6.8.0-1029-nvidia-64k - 6.8.0-1029.32 linux-image-unsigned-6.8.0-1029-nvidia - 6.8.0-1029.32 linux-image-unsigned-6.8.0-1029-nvidia-64k - 6.8.0-1029.32 linux-modules-6.8.0-1029-nvidia - 6.8.0-1029.32 linux-modules-6.8.0-1029-nvidia-64k - 6.8.0-1029.32 linux-modules-extra-6.8.0-1029-nvidia - 6.8.0-1029.32 linux-modules-nvidia-fs-6.8.0-1029-nvidia - 6.8.0-1029.32 linux-modules-nvidia-fs-6.8.0-1029-nvidia-64k - 6.8.0-1029.32 linux-modules-nvidia-fs-nvidia - 6.8.0-1029.32 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1029.32 linux-nvidia - 6.8.0-1029.32 linux-nvidia-64k - 6.8.0-1029.32 linux-nvidia-headers-6.8.0-1029 - 6.8.0-1029.32 linux-nvidia-tools-6.8.0-1029 - 6.8.0-1029.32 linux-tools-6.8.0-1029-nvidia - 6.8.0-1029.32 linux-tools-6.8.0-1029-nvidia-64k - 6.8.0-1029.32 linux-tools-nvidia - 6.8.0-1029.32 linux-tools-nvidia-64k - 6.8.0-1029.32 No subscription required linux-buildinfo-6.8.0-1029-nvidia-lowlatency - 6.8.0-1029.32.1 linux-buildinfo-6.8.0-1029-nvidia-lowlatency-64k - 6.8.0-1029.32.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1029.32.1 linux-headers-6.8.0-1029-nvidia-lowlatency - 6.8.0-1029.32.1 linux-headers-6.8.0-1029-nvidia-lowlatency-64k - 6.8.0-1029.32.1 linux-headers-nvidia-lowlatency - 6.8.0-1029.32.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1029.32.1 linux-image-6.8.0-1029-nvidia-lowlatency - 6.8.0-1029.32.1 linux-image-6.8.0-1029-nvidia-lowlatency-64k - 6.8.0-1029.32.1 linux-image-nvidia-lowlatency - 6.8.0-1029.32.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1029.32.1 linux-image-uc-6.8.0-1029-nvidia-lowlatency - 6.8.0-1029.32.1 linux-image-uc-6.8.0-1029-nvidia-lowlatency-64k - 6.8.0-1029.32.1 linux-image-unsigned-6.8.0-1029-nvidia-lowlatency - 6.8.0-1029.32.1 linux-image-unsigned-6.8.0-1029-nvidia-lowlatency-64k - 6.8.0-1029.32.1 linux-modules-6.8.0-1029-nvidia-lowlatency - 6.8.0-1029.32.1 linux-modules-6.8.0-1029-nvidia-lowlatency-64k - 6.8.0-1029.32.1 linux-modules-extra-6.8.0-1029-nvidia-lowlatency - 6.8.0-1029.32.1 linux-modules-nvidia-fs-6.8.0-1029-nvidia-lowlatency - 6.8.0-1029.32.1 linux-modules-nvidia-fs-6.8.0-1029-nvidia-lowlatency-64k - 6.8.0-1029.32.1 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1029.32.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1029.32.1 linux-nvidia-lowlatency - 6.8.0-1029.32.1 linux-nvidia-lowlatency-64k - 6.8.0-1029.32.1 linux-nvidia-lowlatency-headers-6.8.0-1029 - 6.8.0-1029.32.1 linux-nvidia-lowlatency-tools-6.8.0-1029 - 6.8.0-1029.32.1 linux-tools-6.8.0-1029-nvidia-lowlatency - 6.8.0-1029.32.1 linux-tools-6.8.0-1029-nvidia-lowlatency-64k - 6.8.0-1029.32.1 linux-tools-nvidia-lowlatency - 6.8.0-1029.32.1 linux-tools-nvidia-lowlatency-64k - 6.8.0-1029.32.1 No subscription required linux-aws-cloud-tools-6.8.0-1030 - 6.8.0-1030.32 linux-aws-headers-6.8.0-1030 - 6.8.0-1030.32 linux-aws-tools-6.8.0-1030 - 6.8.0-1030.32 linux-buildinfo-6.8.0-1030-aws - 6.8.0-1030.32 linux-buildinfo-6.8.0-1030-aws-64k - 6.8.0-1030.32 linux-cloud-tools-6.8.0-1030-aws - 6.8.0-1030.32 linux-cloud-tools-6.8.0-1030-aws-64k - 6.8.0-1030.32 linux-headers-6.8.0-1030-aws - 6.8.0-1030.32 linux-headers-6.8.0-1030-aws-64k - 6.8.0-1030.32 linux-image-6.8.0-1030-aws - 6.8.0-1030.32 linux-image-6.8.0-1030-aws-64k - 6.8.0-1030.32 linux-image-unsigned-6.8.0-1030-aws - 6.8.0-1030.32 linux-image-unsigned-6.8.0-1030-aws-64k - 6.8.0-1030.32 linux-modules-6.8.0-1030-aws - 6.8.0-1030.32 linux-modules-6.8.0-1030-aws-64k - 6....
ubuntu jammy v1.906
Metadata:
BOSH Agent Version: 2.759.0
Kernel Version: 5.15.0.153.153
USNs:
Title: USN-7726-1 -- Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7726-1
Priorities: medium,high
Description:
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - NTFS3 file system; - Network traffic control; (CVE-2024-27407, CVE-2024-57996, CVE-2025-37752, CVE-2025-38350) Update Instructions: Run sudo pro fix USN-7726-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-5.15.0-1033-nvidia-tegra-igx - 5.15.0-1033.33 linux-buildinfo-5.15.0-1033-nvidia-tegra-igx-rt - 5.15.0-1033.33 linux-headers-5.15.0-1033-nvidia-tegra-igx - 5.15.0-1033.33 linux-headers-5.15.0-1033-nvidia-tegra-igx-rt - 5.15.0-1033.33 linux-image-5.15.0-1033-nvidia-tegra-igx - 5.15.0-1033.33 linux-image-5.15.0-1033-nvidia-tegra-igx-rt - 5.15.0-1033.33 linux-image-uc-5.15.0-1033-nvidia-tegra-igx - 5.15.0-1033.33 linux-image-uc-5.15.0-1033-nvidia-tegra-igx-rt - 5.15.0-1033.33 linux-image-unsigned-5.15.0-1033-nvidia-tegra-igx - 5.15.0-1033.33 linux-image-unsigned-5.15.0-1033-nvidia-tegra-igx-rt - 5.15.0-1033.33 linux-modules-5.15.0-1033-nvidia-tegra-igx - 5.15.0-1033.33 linux-modules-5.15.0-1033-nvidia-tegra-igx-rt - 5.15.0-1033.33 linux-modules-extra-5.15.0-1033-nvidia-tegra-igx - 5.15.0-1033.33 linux-nvidia-tegra-igx-headers-5.15.0-1033 - 5.15.0-1033.33 linux-nvidia-tegra-igx-tools-5.15.0-1033 - 5.15.0-1033.33 linux-tools-5.15.0-1033-nvidia-tegra-igx - 5.15.0-1033.33 linux-tools-5.15.0-1033-nvidia-tegra-igx-rt - 5.15.0-1033.33 No subscription required linux-buildinfo-5.15.0-1044-nvidia-tegra - 5.15.0-1044.44 linux-buildinfo-5.15.0-1044-nvidia-tegra-rt - 5.15.0-1044.44 linux-headers-5.15.0-1044-nvidia-tegra - 5.15.0-1044.44 linux-headers-5.15.0-1044-nvidia-tegra-rt - 5.15.0-1044.44 linux-image-5.15.0-1044-nvidia-tegra - 5.15.0-1044.44 linux-image-5.15.0-1044-nvidia-tegra-rt - 5.15.0-1044.44 linux-image-unsigned-5.15.0-1044-nvidia-tegra - 5.15.0-1044.44 linux-image-unsigned-5.15.0-1044-nvidia-tegra-rt - 5.15.0-1044.44 linux-modules-5.15.0-1044-nvidia-tegra - 5.15.0-1044.44 linux-modules-5.15.0-1044-nvidia-tegra-rt - 5.15.0-1044.44 linux-modules-extra-5.15.0-1044-nvidia-tegra - 5.15.0-1044.44 linux-nvidia-tegra-headers-5.15.0-1044 - 5.15.0-1044.44 linux-nvidia-tegra-tools-5.15.0-1044 - 5.15.0-1044.44 linux-tools-5.15.0-1044-nvidia-tegra - 5.15.0-1044.44 linux-tools-5.15.0-1044-nvidia-tegra-rt - 5.15.0-1044.44 No subscription required linux-buildinfo-5.15.0-1055-xilinx-zynqmp - 5.15.0-1055.59 linux-headers-5.15.0-1055-xilinx-zynqmp - 5.15.0-1055.59 linux-image-5.15.0-1055-xilinx-zynqmp - 5.15.0-1055.59 linux-modules-5.15.0-1055-xilinx-zynqmp - 5.15.0-1055.59 linux-tools-5.15.0-1055-xilinx-zynqmp - 5.15.0-1055.59 linux-xilinx-zynqmp-headers-5.15.0-1055 - 5.15.0-1055.59 linux-xilinx-zynqmp-tools-5.15.0-1055 - 5.15.0-1055.59 No subscription required linux-buildinfo-5.15.0-1074-gkeop - 5.15.0-1074.82 linux-cloud-tools-5.15.0-1074-gkeop - 5.15.0-1074.82 linux-gkeop-cloud-tools-5.15.0-1074 - 5.15.0-1074.82 linux-gkeop-headers-5.15.0-1074 - 5.15.0-1074.82 linux-gkeop-tools-5.15.0-1074 - 5.15.0-1074.82 linux-headers-5.15.0-1074-gkeop - 5.15.0-1074.82 linux-image-5.15.0-1074-gkeop - 5.15.0-1074.82 linux-image-unsigned-5.15.0-1074-gkeop - 5.15.0-1074.82 linux-modules-5.15.0-1074-gkeop - 5.15.0-1074.82 linux-modules-extra-5.15.0-1074-gkeop - 5.15.0-1074.82 linux-tools-5.15.0-1074-gkeop - 5.15.0-1074.82 No subscription required linux-buildinfo-5.15.0-1085-ibm - 5.15.0-1085.88 linux-buildinfo-5.15.0-1085-raspi - 5.15.0-1085.88 linux-headers-5.15.0-1085-ibm - 5.15.0-1085.88 linux-headers-5.15.0-1085-raspi - 5.15.0-1085.88 linux-ibm-cloud-tools-common - 5.15.0-1085.88 linux-ibm-headers-5.15.0-1085 - 5.15.0-1085.88 linux-ibm-source-5.15.0 - 5.15.0-1085.88 linux-ibm-tools-5.15.0-1085 - 5.15.0-1085.88 linux-ibm-tools-common - 5.15.0-1085.88 linux-image-5.15.0-1085-ibm - 5.15.0-1085.88 linux-image-5.15.0-1085-raspi - 5.15.0-1085.88 linux-image-unsigned-5.15.0-1085-ibm - 5.15.0-1085.88 linux-modules-5.15.0-1085-ibm - 5.15.0-1085.88 linux-modules-5.15.0-1085-raspi - 5.15.0-1085.88 linux-modules-extra-5.15.0-1085-ibm - 5.15.0-1085.88 linux-modules-extra-5.15.0-1085-raspi - 5.15.0-1085.88 linux-raspi-headers-5.15.0-1085 - 5.15.0-1085.88 linux-raspi-tools-5.15.0-1085 - 5.15.0-1085.88 linux-tools-5.15.0-1085-ibm - 5.15.0-1085.88 linux-tools-5.15.0-1085-raspi - 5.15.0-1085.88 No subscription required linux-buildinfo-5.15.0-1086-nvidia - 5.15.0-1086.87 linux-buildinfo-5.15.0-1086-nvidia-lowlatency - 5.15.0-1086.87 linux-cloud-tools-5.15.0-1086-nvidia - 5.15.0-1086.87 linux-cloud-tools-5.15.0-1086-nvidia-lowlatency - 5.15.0-1086.87 linux-headers-5.15.0-1086-nvidia - 5.15.0-1086.87 linux-headers-5.15.0-1086-nvidia-lowlatency - 5.15.0-1086.87 linux-image-5.15.0-1086-nvidia - 5.15.0-1086.87 linux-image-5.15.0-1086-nvidia-lowlatency - 5.15.0-1086.87 linux-image-unsigned-5.15.0-1086-nvidia - 5.15.0-1086.87 linux-image-unsigned-5.15.0-1086-nvidia-lowlatency - 5.15.0-1086.87 linux-modules-5.15.0-1086-nvidia - 5.15.0-1086.87 linux-modules-5.15.0-1086-nvidia-lowlatency - 5.15.0-1086.87 linux-modules-extra-5.15.0-1086-nvidia - 5.15.0-1086.87 linux-modules-nvidia-fs-5.15.0-1086-nvidia - 5.15.0-1086.87 linux-modules-nvidia-fs-5.15.0-1086-nvidia-lowlatency - 5.15.0-1086.87 linux-nvidia-cloud-tools-5.15.0-1086 - 5.15.0-1086.87 linux-nvidia-cloud-tools-common - 5.15.0-1086.87 linux-nvidia-headers-5.15.0-1086 - 5.15.0-1086.87 linux-nvidia-tools-5.15.0-1086 - 5.15.0-1086.87 linux-nvidia-tools-common - 5.15.0-1086.87 linux-nvidia-tools-host - 5.15.0-1086.87 linux-tools-5.15.0-1086-nvidia - 5.15.0-1086.87 linux-tools-5.15.0-1086-nvidia-lowlatency - 5.15.0-1086.87 No subscription required linux-buildinfo-5.15.0-1086-intel-iotg - 5.15.0-1086.92 linux-cloud-tools-5.15.0-1086-intel-iotg - 5.15.0-1086.92 linux-headers-5.15.0-1086-intel-iotg - 5.15.0-1086.92 linux-image-5.15.0-1086-intel-iotg - 5.15.0-1086.92 linux-image-unsigned-5.15.0-1086-intel-iotg - 5.15.0-1086.92 linux-intel-iotg-cloud-tools-5.15.0-1086 - 5.15.0-1086.92 linux-intel-iotg-cloud-tools-common - 5.15.0-1086.92 linux-intel-iotg-headers-5.15.0-1086 - 5.15.0-1086.92 linux-intel-iotg-tools-5.15.0-1086 - 5.15.0-1086.92 linux-intel-iotg-tools-common - 5.15.0-1086.92 linux-intel-iotg-tools-host - 5.15.0-1086.92 linux-modules-5.15.0-1086-intel-iotg - 5.15.0-1086.92 linux-modules-extra-5.15.0-1086-intel-iotg - 5.15.0-1086.92 linux-modules-iwlwifi-5.15.0-1086-intel-iotg - 5.15.0-1086.92 linux-tools-5.15.0-1086-intel-iotg - 5.15.0-1086.92 No subscription required linux-buildinfo-5.15.0-1089-oracle - 5.15.0-1089.95 linux-headers-5.15.0-1089-oracle - 5.15.0-1089.95 linux-image-5.15.0-1089-oracle - 5.15.0-1089.95 linux-image-unsigned-5.15.0-1089-oracle - 5.15.0-1089.95 linux-modules-5.15.0-1089-oracle - 5.15.0-1089.95 linux-modules-extra-5.15.0-1089-oracle - 5.15.0-1089.95 linux-oracle-headers-5.15.0-1089 - 5.15.0-1089.95 linux-oracle-tools-5.15.0-1089 - 5.15.0-1089.95 linux-tools-5.15.0-1089-oracle - 5.15.0-1089.95 No subscription required linux-buildinfo-5.15.0-1091-gcp - 5.15.0-1091.100 linux-gcp-headers-5.15.0-1091 - 5.15.0-1091.100 linux-gcp-tools-5.15.0-1091 - 5.15.0-1091.100 linux-headers-5.15.0-1091-gcp - 5.15.0-1091.100 linux-image-5.15.0-1091-gcp - 5.15.0-1091.100 linux-image-unsigned-5.15.0-1091-gcp - 5.15.0-1091.100 linux-modules-5.15.0-1091-gcp - 5.15.0-1091.100 linux-modules-extra-5.15.0-1091-gcp - 5.15.0-1091.100 linux-tools-5.15.0-1091-gcp - 5.15.0-1091.100 No subscription required linux-aws-cloud-tools-5.15.0-1091 - 5.15.0-1091.98 linux-aws-headers-5.15.0-1091 - 5.15.0-1091.98 linux-aws-tools-5.15.0-1091 - 5.15.0-1091.98 linux-buildinfo-5.15.0-1091-aws - 5.15.0-1091.98 linux-buildinfo-5.15.0-1091-aws-64k - 5.15.0-1091.98 linux-cloud-tools-5.15.0-1091-aws - 5.15.0-1091.98 linux-cloud-tools-5.15.0-1091-aws-64k - 5.15.0-1091.98 linux-headers-5.15.0-1091-aws - 5.15.0-1091.98 linux-headers-5.15.0-1091-aws-64k - 5.15.0-1091.98 linux-image-5.15.0-1091-aws - 5.15.0-1091.98 linux-image-5.15.0-1091-aws-64k - 5.15.0-1091.98 linux-image-unsigned-5.15.0-1091-aws - 5.15.0-1091.98 linux-image-unsigned-5.15.0-1091-aws-64k - 5.15.0-1091.98 linux-modules-5.15.0-1091-aws - 5.15.0-1091.98 linux-modules-5.15.0-1091-aws-64k - 5.15.0-1091.98 linux-modules-extra-5.15.0-1091-aws - 5.15.0-1091.98 linux-modules-extra-5.15.0-1091-aws-64k - 5.15.0-1091.98 linux-tools-5.15.0-1091-aws - 5.15.0-1091.98 linux-tools-5.15.0-1091-aws-64k - 5.15.0-1091.98 No subscription required linux-buildinfo-5.15.0-153-generic - 5.15.0-153.163 linux-buildinfo-5.15.0-153-generic-64k - 5.15.0-153.163 linux-buildinfo-5.15.0-153-generic-lpae - 5.15.0-153.163 linux-buildinfo-5.15.0-153-lowlatency - 5.15.0-153.163 linux-buildinfo-5.15.0-153-lowlatency-64k - 5.15.0-153.163 linux-cloud-tools-5.15.0-153 - 5.15.0-153.163 linux-cloud-tools-5.15.0-153-generic - 5.15.0-153.163 linux-cloud-tools-5.15.0-153-lowlatency - 5.15.0-153.163 linux-cloud-tools-common - 5.15.0-153.163 linux-doc - 5.15.0-153.163 linux-headers-5.15.0-153 - 5.15.0-153.163 linux-headers-5.15.0-153-generic - 5.15.0-153.163 linux-headers-5.15.0-153-generic-64k - 5.15.0-153.163 linux-headers-5.15.0-153-generic-lpae - 5.15.0-153.163 linux-headers-5.15.0-153-lowlatency - 5.15.0-153.163 linux-headers-5.15.0-153-lowlatency-64k - 5.15.0-153.163 linux-image-5.15.0-153-generic - 5.15.0-153.163 linux-image-5.15.0-153-generic-64k - 5.15.0-153.163 linux-image-5.15.0-153-generic-lpae - 5.15.0-153.163 linux-image-5.15.0-153-lowlatency - 5.15.0-153.163 linux-image-5.15.0-153-lowlatency-64k - 5.15.0-153.163 linux-image-unsigned-5.15.0-153-generic - 5.15.0-153.163 linux-image-unsigned-5.15.0-153-generic-64k - 5.15.0-153.163 linux-image-unsigned-5.15.0-153-lowlatency - 5.15.0-153.163 lin...