UbuntuUpdates.org

Package "linux-azure-nvidia-6.14"

Name: linux-azure-nvidia-6.14

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • Linux kernel version specific cloud tools for version 6.14.0
  • Header files related to Linux kernel version 6.14.0
  • Header files related to Linux kernel version 6.14.0

Latest version: 6.14.0-1007.7
Release: noble (24.04)
Level: security
Repository: main

Links



Other versions of "linux-azure-nvidia-6.14" in Noble

Repository Area Version
updates main 6.14.0-1007.7
proposed main 6.14.0-1009.9
PPA: Canonical Kernel Team 6.14.0-1009.9

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 6.14.0-1007.7 2025-10-22 20:07:52 UTC

  linux-azure-nvidia-6.14 (6.14.0-1007.7) noble; urgency=medium

  * noble/linux-azure-nvidia-6.14: 6.14.0-1007.7 -proposed tracker (LP: #2123924)

  * Plucky update: upstream stable patchset 2025-09-04 (LP: #2122072)
    - firmware: arm_ffa: Move memory allocation outside the mutex locking
    - firmware: arm_ffa: Replace mutex with rwlock to avoid sleep in atomic
      context

  * sources list generation using dwarfdump takes up to 0.5hr in build process
    (LP: #2104911)
    - [Packaging] azure-nvidia-6.14: Don't generate list of source files

  [ Ubuntu-azure-6.14: 6.14.0-1014.14~24.04.1 ]

  * noble/linux-azure-6.14: 6.14.0-1014.14~24.04.1 -proposed tracker (LP: #2123925)
  * sources list generation using dwarfdump takes up to 0.5hr in build process
    (LP: #2104911)
    - [Packaging] azure-6.14: Don't generate list of source files
  [ Ubuntu-azure: 6.14.0-1014.14 ]
  * plucky/linux-azure: 6.14.0-1014.14 -proposed tracker (LP: #2123926)
  * sources list generation using dwarfdump takes up to 0.5hr in build process
    (LP: #2104911)
    - [Packaging] azure: Don't generate list of source files
  * MANA Catchup (LP: #2125704)
    - RDMA/mana_ib: Allow registration of DMA-mapped memory in PDs
    - RDMA/mana_ib: implement get_dma_mr
    - RDMA/mana_ib: helpers to allocate kernel queues
    - RDMA/mana_ib: create kernel-level CQs
    - RDMA/mana_ib: Create and destroy UD/GSI QP
    - RDMA/mana_ib: UD/GSI QP creation for kernel
    - RDMA/mana_ib: create/destroy AH
    - RDMA/mana_ib: UD/GSI work requests
    - RDMA/mana_ib: implement req_notify_cq
    - RDMA/mana_ib: extend mana QP table
    - RDMA/mana_ib: polling of CQs for GSI/UD
    - RDMA/mana_ib: indicate CM support
    - RDMA/mana_ib: request error CQEs when supported
    - RDMA/mana_ib: Implement DMABUF MR support
    - RDMA/mana_ib: Fix error code in probe()
    - net: mana: Probe rdma device in mana driver
    - RDMA/mana_ib: Add support of 4M, 1G, and 2G pages
    - RDMA/mana_ib: Add support of mana_ib for RNIC and ETH nic
    - RDMA/mana_ib: unify mana_ib functions to support any gdma device
    - net: mana: Add support for auxiliary device servicing events
    - net: mana: Handle Reset Request from MANA NIC
  [ Ubuntu: 6.14.0-34.34 ]
  * plucky/linux: 6.14.0-34.34 -proposed tracker (LP: #2123945)
  * [25.04 FEAT] [post announcement] [KRN2304] CPU-MF Counters for new IBM Z
    hardware - perf part (LP: #2103415)
    - perf list: Add IBM z17 event descriptions
  * Kernel fails to build when coresight is enabled (LP: #2122527)
    - Coresight: Introduce a new struct coresight_path
    - Coresight: Change functions to accept the coresight_path
    - coresight: change coresight_device lock type to raw_spinlock_t
  * memory leaks when configuring a small rate limit in audit (LP: #2122554)
    - audit: fix skb leak when audit rate limit is exceeded
  * [UBUNTU 24.04] s390/pci: Don't abort recovery for user-space drivers
    (LP: #2121150)
    - s390/pci: Allow automatic recovery with minimal driver support
  * [AMDGPU] Call trace occurs when unplugging a HDMI/DP/VGA cable on Dell
    platforms (LP: #2116908)
    - drm/amd/display: limit clear_update_flags to dcn32 and above
    - drm/amd/display: Allow DCN301 to clear update flags
  * sources list generation using dwarfdump takes up to 0.5hr in build process
    (LP: #2104911)
    - [Packaging] Don't generate list of source files
  * [SRU] Apparmor: Unshifted uids for hardlinks and unix sockets in user
    namespaces (LP: #2121257)
    - apparmor: shift ouid when mediating hard links in userns
    - apparmor: shift uid when mediating af_unix in userns
  * Plucky update: upstream stable patchset 2025-09-04 (LP: #2122072)
    - rtc: pcf2127: add missing semicolon after statement
    - rtc: pcf2127: fix SPI command byte for PCF2131
    - rtc: cmos: use spin_lock_irqsave in cmos_interrupt
    - virtio-net: xsk: rx: fix the frame's length check
    - virtio-net: ensure the received length does not exceed allocated size
    - net: txgbe: request MISC IRQ in ndo_open
    - vsock/vmci: Clear the vmci transport packet properly when initializing
      it
    - net: libwx: fix the incorrect display of the queue number
    - mmc: sdhci: Add a helper function for dump register in dynamic debug
      mode
    - Revert "mmc: sdhci: Disable SD card clock before changing parameters"
    - mmc: core: sd: Apply BROKEN_SD_DISCARD quirk earlier
    - Bluetooth: HCI: Set extended advertising data synchronously
    - Bluetooth: hci_sync: revert some mesh modifications
    - Bluetooth: MGMT: set_mesh: update LE scan interval and window
    - Bluetooth: MGMT: mesh_send: check instances prior disabling advertising
    - iommufd/selftest: Fix iommufd_dirty_tracking with large hugepage sizes
    - regulator: gpio: Fix the out-of-bounds access to drvdata::gpiods
    - Input: cs40l50-vibra - fix potential NULL dereference in
      cs40l50_upload_owt()
    - usb: typec: altmodes/displayport: do not index invalid pin_assignments
    - mtk-sd: Fix a pagefault in dma_unmap_sg() for not prepared data
    - mtk-sd: Prevent memory corruption from DMA map failure
    - mtk-sd: reset host->mrq on prepare_data() error
    - drm/v3d: Disable interrupts before resetting the GPU
    - firmware: arm_ffa: Fix memory leak by freeing notifier callback node
    - firmware: arm_ffa: Move memory allocation outside the mutex locking
    - firmware: arm_ffa: Replace mutex with rwlock to avoid sleep in atomic
      context
    - arm64: dts: apple: t8103: Fix PCIe BCM4377 nodename
    - platform/mellanox: mlxbf-tmfifo: fix vring_desc.len assignment
    - RDMA/mlx5: Fix unsafe xarray access in implicit ODP handling
    - RDMA/mlx5: Initialize obj_event->obj_sub_list before xa_insert
    - nfs: Clean up /proc/net/rpc/nfs when nfs_fs_proc_net_init() fails.
    - NFSv4/pNFS: Fix a race to wake on NFS_LAYOUT_DRAIN
    - scsi: qla2xxx: Fix DMA mapping test in qla24xx_get_port_database()
    - scsi: qla4xxx: Fix missing DMA mapping

Source diff to previous version
2122072 Plucky update: upstream stable patchset 2025-09-04
2104911 sources list generation using dwarfdump takes up to 0.5hr in build process
2125704 MANA Catchup
2103415 [25.04 FEAT] [post announcement] [KRN2304] CPU-MF Counters for new IBM Z hardware - perf part
2122527 Kernel fails to build when coresight is enabled
2122554 memory leaks when configuring a small rate limit in audit
2121150 [UBUNTU 24.04] s390/pci: Don't abort recovery for user-space drivers
2121257 [SRU] Apparmor: Unshifted uids for hardlinks and unix sockets in user namespaces
2121149 [UBUNTU 24.04] s390/pci: Fix stale function handles in error handling
2121266 Plucky update: upstream stable patchset 2025-08-22
2120812 Plucky update: upstream stable patchset 2025-08-18
1786013 Packaging resync
CVE-2025-39682 In the Linux kernel, the following vulnerability has been resolved: tls: fix handling of zero-length records on the rx_list Each recvmsg() call mus
CVE-2025-38541 In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7925: Fix null-ptr-deref in mt7925_thermal_init() devm_kasprintf(
CVE-2025-38477 In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix race condition on qfq_aggregate A race condition can oc
CVE-2025-38500 In the Linux kernel, the following vulnerability has been resolved: xfrm: interface: fix use-after-free after changing collect_md xfrm interface co
CVE-2025-38617 In the Linux kernel, the following vulnerability has been resolved: net/packet: fix a race in packet_set_ring() and packet_notifier() When packet_s
CVE-2025-38618 In the Linux kernel, the following vulnerability has been resolved: vsock: Do not allow binding to VMADDR_PORT_ANY It is possible for a vsock to au

Version: 6.14.0-1003.3 2025-08-28 12:33:17 UTC

  linux-azure-nvidia-6.14 (6.14.0-1003.3) noble; urgency=medium

  * noble/linux-azure-nvidia-6.14: 6.14.0-1003.3 -proposed tracker (LP: #2117629)

  * Add pincontrol driver for MT8901 chip (LP: #2117784)
    - [Config] azure-nvidia-6.14: Update annotations to enable
      CONFIG_PINCTRL_MT8901

  * Packaging resync (LP: #1786013)
    - [Packaging] update variants
    - [Packaging] debian.azure-nvidia-6.14/dkms-versions -- update from
      kernel-versions (main/2025.07.14)

  [ Ubuntu-nvidia-6.14: 6.14.0-1008.8 ]

  * noble/linux-nvidia-6.14: 6.14.0-1008.8 -proposed tracker (LP: #2118798)
  * Packaging resync (LP: #1786013)
    - [Packaging] debian.nvidia-6.14/dkms-versions -- update from kernel-
      versions (main/d2025.07.23)
  * mt7925: Mediate extra wifi fixes (LP: #2118583)
    - wifi: mt76: mt7925: prevent multiple scan commands
    - wifi: mt76: mt7925: refine the sniffer commnad
    - wifi: mt76: mt7925: ensure all MCU commands wait for response
  * nvidia-ffa-ec: Fix FFH data response length (LP: #2118357)
    - NVIDIA: SAUCE: Fix FFH data response length
  * Add pincontrol driver for MT8901 chip (LP: #2117784)
    - pinctrl: mediatek: Add EINT support for multiple addresses
    - pinctrl: mediatek: Fix new design debounce issue
    - NVIDIA: SAUCE: MEDIATEK: pinctrl: mediatek: Add gpio-range record in
      pinctrl driver
    - NVIDIA: SAUCE: MEDIATEK: pinctrl: mediatek: Add acpi support
    - NVIDIA: SAUCE: MEDIATEK: pinctrl: mt8901: Add pinctrl driver
    - [Config] nvidia-6.14: Update annotations to enable CONFIG_PINCTRL_MT8901
  * mt7925: Extra wifi fixes (LP: #2117774)
    - wifi: mt76: mt7925: fix the wrong config for tx interrupt
    - wifi: mt76: mt7925: prevent NULL pointer dereference in
      mt7925_sta_set_decap_offload()
  * CVE-2025-38016
    - HID: bpf: abort dispatch if device destroyed
  * Fix incorrect iommu_groups with PCIe ACS (LP: #2116967)
    - NVIDIA: SAUCE: PCI: Move REQ_ACS_FLAGS into pci_regs.h as
      PCI_ACS_ISOLATED
    - NVIDIA: SAUCE: PCI: Add pci_bus_isolation()
    - NVIDIA: SAUCE: iommu: Compute iommu_groups properly for PCIe switches
    - NVIDIA: SAUCE: iommu: Organize iommu_group by member size
    - NVIDIA: SAUCE: PCI: Add pci_reachable_set()
    - NVIDIA: SAUCE: PCI: Remove duplication in calling pci_acs_ctrl_enabled()
    - NVIDIA: SAUCE: PCI: Use pci_quirk_mf_endpoint_acs() for
      pci_quirk_amd_sb_acs()
    - NVIDIA: SAUCE: PCI: Use pci_acs_ctrl_isolated() for pci_quirk_al_acs()
    - NVIDIA: SAUCE: PCI: Widen the acs_flags to u32 within the quirk callback
    - NVIDIA: SAUCE: PCI: Add pci_mfd_isolation()
    - NVIDIA: SAUCE: iommu: Compute iommu_groups properly for PCIe MFDs
    - NVIDIA: SAUCE: iommu: Validate that pci_for_each_dma_alias() matches the
      groups
    - NVIDIA: SAUCE: PCI: Add the ACS Enhanced Capability definitions
    - NVIDIA: SAUCE: PCI: Enable ACS Enhanced bits for enable_acs and
      config_acs
    - NVIDIA: SAUCE: PCI: Check ACS DSP/USP redirect bits in
      pci_enable_pasid()
    - NVIDIA: SAUCE: PCI: Check ACS Extended flags for pci_bus_isolated()
  * Backport: KVM: arm64: Map GPU device memory as cacheable (LP: #2116207)
    - Revert "NVIDIA: SAUCE: KVM: arm64: determine memory type from VMA"
    - KVM: arm64: Rename the device variable to s2_force_noncacheable
    - KVM: arm64: Assume non-PFNMAP/MIXEDMAP VMAs can be mapped cacheable
    - KVM: arm64: Block cacheable PFNMAP mapping
    - KVM: arm64: Allow cacheable stage 2 mapping using VMA flags
    - KVM: arm64: Expose new KVM cap for cacheable PFNMAP
  * wifi: mt7925: Connecting to Wifi is not reliable (LP: #2116194)
    - wifi: mt76: mt7925: Remove unnecessary if-check
    - wifi: mt76: mt7925: fix missing hdr_trans_tlv command for broadcast wtbl
  * Add missing NVIDIA HDA codec IDs (LP: #2115674)
    - ALSA: hda/tegra: Add Tegra264 support
    - ALSA: hda: Add missing NVIDIA HDA codec IDs

  [ Ubuntu-azure-6.14: 6.14.0-1010.10~24.04.1 ]

  * noble/linux-azure-6.14: 6.14.0-1010.10~24.04.1 -proposed tracker (LP: #2117630)
  * Packaging resync (LP: #1786013)
    - [Packaging] debian.azure-6.14/dkms-versions -- update from kernel-
      versions (main/2025.07.14)
  * plucky/linux-azure: 6.14.0-1010.10 -proposed tracker (LP: #2117631)
  * Packaging resync (LP: #1786013)
    - [Packaging] debian.azure/dkms-versions -- update from kernel-versions
      (main/2025.07.14)
  * Additional MANA patch support, kernel 5.15 and later (LP: #2115356)
    - net: mana: Set tx_packets to post gso processing packet count
    - net: mana: Add support for Multi Vports on Bare metal
    - net: mana: Add handler for hardware servicing events
  * Additional MANA patch support, kernel 6.8 and later (LP: #2115309)
    - PCI/MSI: Export pci_msix_prepare_desc() for dynamic MSI-X allocations
    - PCI: hv: Allow dynamic MSI-X vector allocation
    - net: mana: explain irq_setup() algorithm
    - net: mana: Allow irq_setup() to skip cpus for affinity
    - net: mana: Allocate MSI-X vectors dynamically
  * vhci-hcd and usbip-core not available (LP: #2115827)
    - [Config] azure: Revert to -generic config for CONFIG_USBIP_VHCI_HCD and
      CONFIG_USBIP_CORE
  [ Ubuntu: 6.14.0-28.28 ]
  * plucky/linux: 6.14.0-28.28 -proposed tracker (LP: #2117649)
  * Packaging resync (LP: #1786013)
    - [Packaging] update annotations scripts
    - [Packaging] debian.master/dkms-versions -- update from kernel-versions
      (main/2025.07.14)
  * Dell AIO backlight is not working, dell_uart_backlight module is missing
    (LP: #2083800)
    - [Config] enable CONFIG_DELL_UART_BACKLIGHT
  * integrated I219-LM network adapter appears to be running too fast, causing
    synchronization issues when using the I219-LM PTP feature (LP: #2116072)
    - e1000e: set fixed clock frequency indication for Nahum 11 and Nahum 13
  * Audio broken on ThinkPad X13s (LP: #2115898)
    - SAUCE: Revert "UBUNTU: SAUCE: Change: cracking sound fix"
  * Ubuntu 24.04+ arm64: screen resolution fixed to 1024x768 with las

2117784 Add pincontrol driver for MT8901 chip
1786013 Packaging resync
2118583 mt7925: Mediate extra wifi fixes
2118357 nvidia-ffa-ec: Fix FFH data response length
2117774 mt7925: Extra wifi fixes
2116967 Fix incorrect iommu_groups with PCIe ACS
2116207 Backport: KVM: arm64: Map GPU device memory as cacheable
2116194 wifi: mt7925: Connecting to Wifi is not reliable
2115674 Add missing NVIDIA HDA codec IDs
2115356 Additional MANA patch support, kernel 5.15 and later
2115309 Additional MANA patch support, kernel 6.8 and later
2115827 vhci-hcd and usbip-core not available
2083800 Dell AIO backlight is not working, dell_uart_backlight module is missing
2116072 integrated I219-LM network adapter appears to be running too fast, causing synchronization issues when using the I219-LM PTP feature
2115898 Audio broken on ThinkPad X13s
2115068 Ubuntu 24.04+ arm64: screen resolution fixed to 1024x768 with last kernel update
2114516 [SRU][HPE 24.04] Patch Request for HPE iLO7 VGA device for Gen12 Servers
2113990 A process exiting with an open /dev/snapshot fd causes a NULL pointer dereference caught by ubuntu_stress_smoke_test:sut-scan
2114450 [UBUNTU 22.04] kernel: Fix z17 elf platform recognition
2114258 [UBUNTU 24.04] Kernel: Add CPUMF extended counter set for z17
2115266 Plucky update: v6.14.8 upstream stable release
2115252 Plucky update: v6.14.7 upstream stable release
2113992 Creating a VXLAN interface with a Fan mapping causes a NULL pointer dereference caught by ubuntu_fan_smoke_test:sut-scan
2117494 [Regression Updates] \
2116061 [UBUNTU 25.04] lszcrypt output shows no cards because ap module has to be loaded manually
CVE-2025-38016 In the Linux kernel, the following vulnerability has been resolved: HID: bpf: abort dispatch if device destroyed The current HID bpf implementation
CVE-2025-38056 In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: Intel: hda: Fix UAF when reloading module hda_generic_machine_select
CVE-2025-38008 In the Linux kernel, the following vulnerability has been resolved: mm/page_alloc: fix race condition in unaccepted memory handling The page alloca
CVE-2025-38014 In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: Refactor remove call with idxd_cleanup() helper The idxd_clean
CVE-2025-38015 In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: fix memory leak in error handling path of idxd_alloc Memory al
CVE-2025-38005 In the Linux kernel, the following vulnerability has been resolved: dmaengine: ti: k3-udma: Add missing locking Recent kernels complain about a mis
CVE-2025-38009 In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: disable napi on driver removal A warning on driver removal started
CVE-2025-38010 In the Linux kernel, the following vulnerability has been resolved: phy: tegra: xusb: Use a bitmask for UTMI pad power state tracking The current i
CVE-2025-38011 In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: csa unmap use uninterruptible lock After process exit to unmap csa
CVE-2025-38012 In the Linux kernel, the following vulnerability has been resolved: sched_ext: bpf_iter_scx_dsq_new() should always initialize iterator BPF program
CVE-2025-38018 In the Linux kernel, the following vulnerability has been resolved: net/tls: fix kernel panic when alloc_page failed We cannot set frag_list to NUL
CVE-2025-38019 In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum_router: Fix use-after-free when deleting GRE net devices The dr
CVE-2025-38013 In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: Set n_channels after allocating struct cfg80211_scan_request Ma
CVE-2025-38002 In the Linux kernel, the following vulnerability has been resolved: io_uring/fdinfo: grab ctx->uring_lock around io_uring_show_fdinfo() Not everyth
CVE-2025-38027 In the Linux kernel, the following vulnerability has been resolved: regulator: max20086: fix invalid memory access max20086_parse_regulators_dt() c
CVE-2025-38020 In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Disable MACsec offload for uplink representor profile MACsec offload
CVE-2025-38021 In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix null check of pipe_ctx->plane_state for update_dchubp_dpp
CVE-2025-38006 In the Linux kernel, the following vulnerability has been resolved: net: mctp: Don't access ifa_index when missing In mctp_dump_addrinfo, ifa_index
CVE-2025-37992 In the Linux kernel, the following vulnerability has been resolved: net_sched: Flush gso_skb list too during ->change() Previously, when reducing a
CVE-2025-38022 In the Linux kernel, the following vulnerability has been resolved: RDMA/core: Fix "KASAN: slab-use-after-free Read in ib_register_device" problem
CVE-2025-38028 In the Linux kernel, the following vulnerability has been resolved: NFS/localio: Fix a race in nfs_local_open_fh() Once the clp->cl_uuid.lock has b
CVE-2025-38023 In the Linux kernel, the following vulnerability has been resolved: nfs: handle failure of nfs_get_lock_context in unlock path When memory is insuf
CVE-2025-38007 In the Linux kernel, the following vulnerability has been resolved: HID: uclogic: Add NULL check in uclogic_input_configured() devm_kasprintf() ret
CVE-2025-38024 In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug Call Trace: <T
CVE-2025-38025 In the Linux kernel, the following vulnerability has been resolved: iio: adc: ad7606: check for NULL before calling sw_mode_config() Check that the
CVE-2025-37963 In the Linux kernel, the following vulnerability has been resolved: arm64: bpf: Only mitigate cBPF programs loaded by unprivileged users Support fo
CVE-2025-37948 In the Linux kernel, the following vulnerability has been resolved: arm64: bpf: Add BHB mitigation to the epilogue for cBPF programs A malicious BP
CVE-2025-37994 In the Linux kernel, the following vulnerability has been resolved: usb: typec: ucsi: displayport: Fix NULL pointer access This patch ensures that
CVE-2025-37967 In the Linux kernel, the following vulnerability has been resolved: usb: typec: ucsi: displayport: Fix deadlock This patch introduces the ucsi_con_
CVE-2025-37950 In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix panic in failed foilio allocation commit 7e119cff9d0a ("ocfs2: conve
CVE-2025-37995 In the Linux kernel, the following vulnerability has been resolved: module: ensure that kobject_put() is safe for module type kobjects In 'lookup_o
CVE-2025-37960 In the Linux kernel, the following vulnerability has been resolved: memblock: Accept allocated memory before use in memblock_double_array() When in
CVE-2025-37996 In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: Fix uninitialized memcache pointer in user_mem_abort() Commit fce88
CVE-2025-37949 In the Linux kernel, the following vulnerability has been resolved: xenbus: Use kref to track req lifetime Marek reported seeing a NULL pointer fau
CVE-2025-37954 In the Linux kernel, the following vulnerability has been resolved: smb: client: Avoid race in open_cached_dir with lease breaks A pre-existing val
CVE-2025-37965 In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix invalid context error in dml helper [Why] "BUG: sleeping f
CVE-2025-37951 In the Linux kernel, the following vulnerability has been resolved: drm/v3d: Add job to pending list if the reset was skipped When a CL/CSD job tim
CVE-2025-37968 In the Linux kernel, the following vulnerability has been resolved: iio: light: opt3001: fix deadlock due to concurrent flag access The threaded IR
CVE-2025-37969 In the Linux kernel, the following vulnerability has been resolved: iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_tagged_fifo Preven
CVE-2025-37970 In the Linux kernel, the following vulnerability has been resolved: iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_fifo Prevent st_ls
CVE-2025-37966 In the Linux kernel, the following vulnerability has been resolved: riscv: Fix kernel crash due to PR_SET_TAGGED_ADDR_CTRL When userspace does PR_S
CVE-2025-37957 In the Linux kernel, the following vulnerability has been resolved: KVM: SVM: Forcibly leave SMM mode on SHUTDOWN interception Previously, commit e
CVE-2025-37958 In the Linux kernel, the following vulnerability has been resolved: mm/huge_memory: fix dereferencing invalid pmd migration entry When migrating a
CVE-2025-37964 In the Linux kernel, the following vulnerability has been resolved: x86/mm: Eliminate window where TLB flushes may be inadvertently skipped tl;dr:
CVE-2025-37971 In the Linux kernel, the following vulnerability has been resolved: staging: bcm2835-camera: Initialise dev in v4l2_dev Commit 42a2f6664e18 ("stagi
CVE-2025-37972 In the Linux kernel, the following vulnerability has been resolved: Input: mtk-pmic-keys - fix possible null pointer dereference In mtk_pmic_keys_p
CVE-2025-37959 In the Linux kernel, the following vulnerability has been resolved: bpf: Scrub packet on bpf_redirect_peer When bpf_redirect_peer is used to redire
CVE-2025-37961 In the Linux kernel, the following vulnerability has been resolved: ipvs: fix uninit-value for saddr in do_output_route4 syzbot reports for uninit-
CVE-2025-37993 In the Linux kernel, the following vulnerability has been resolved: can: m_can: m_can_class_allocate_dev(): initialize spin lock on device probe Th
CVE-2025-37955 In the Linux kernel, the following vulnerability has been resolved: virtio-net: free xsk_buffs on error in virtnet_xsk_pool_enable() The selftests
CVE-2025-37962 In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix memory leak in parse_lease_state() The previous patch that added bou
CVE-2025-37998 In the Linux kernel, the following vulnerability has been resolved: openvswitch: Fix unsafe attribute parsing in output_userspace() This patch repl
CVE-2025-37952 In the Linux kernel, the following vulnerability has been resolved: ksmbd: Fix UAF in __close_file_table_ids A use-after-free is possible if one th
CVE-2025-37947 In the Linux kernel, the following vulnerability has been resolved: ksmbd: prevent out-of-bounds stream writes by validating *pos ksmbd_vfs_stream_
CVE-2025-37956 In the Linux kernel, the following vulnerability has been resolved: ksmbd: prevent rename with empty string Client can send empty newname string to
CVE-2025-37973 In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: fix out-of-bounds access during multi-link element defragmentati
CVE-2025-37999 In the Linux kernel, the following vulnerability has been resolved: fs/erofs/fileio: call erofs_onlinefolio_split() after bio_add_folio() If bio_ad
CVE-2025-38083 In the Linux kernel, the following vulnerability has been resolved: net_sched: prio: fix a race in prio_tune() Gerrard Tai reported a race conditio



About   -   Send Feedback to @ubuntu_updates