UbuntuUpdates.org

Package "linux-azure-nvidia"

Name: linux-azure-nvidia

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • Linux kernel version specific cloud tools for version 6.8.0
  • Header files related to Linux kernel version 6.8.0
  • Header files related to Linux kernel version 6.8.0
  • Header files related to Linux kernel version 6.8.0

Latest version: 6.8.0-1025.27
Release: noble (24.04)
Level: updates
Repository: main

Links



Other versions of "linux-azure-nvidia" in Noble

Repository Area Version
security main 6.8.0-1022.23
proposed universe 6.8.0-1012.13
proposed main 6.8.0-1024.26
PPA: Canonical Kernel Team 6.8.0-1026.28

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 6.8.0-1025.27 2025-10-06 19:07:43 UTC

  linux-azure-nvidia (6.8.0-1025.27) noble; urgency=medium

  * noble/linux-azure-nvidia: 6.8.0-1025.27 -proposed tracker (LP: #2125071)

  [ Ubuntu-nvidia: 6.8.0-1040.43 ]

  * noble/linux-nvidia: 6.8.0-1040.43 -proposed tracker (LP: #2125093)

  [ Ubuntu-azure: 6.8.0-1040.46 ]

  * noble/linux-azure: 6.8.0-1040.46 -proposed tracker (LP: #2125522)
  * azure: backport "cifs: fix pagecache leak when do writepages"
    (LP: #2122719)
    - cifs: fix pagecache leak when do writepages
  * azure: backport "hv_netvsc: Fix panic during namespace deletion with VF"
    (LP: #2120803)
    - hv_netvsc: Fix panic during namespace deletion with VF
  * azure: backport various SMB multichannel fixes (LP: #2118807)
    - cifs: reset connections for all channels when reconnect requested
    - cifs: update dstaddr whenever channel iface is updated
    - cifs: dns resolution is needed only for primary channel
    - cifs: deal with the channel loading lag while picking channels
    - cifs: serialize other channels when query server interfaces is pending
    - cifs: do not disable interface polling on failure
    - smb: client: fix potential deadlock when reconnecting channels
    - smb: client: fix warning when reconnecting channel
  * net: mana: Use page pool fragments for RX buffers instead of full pages to
    improve memory efficiency (LP: #2121570)
    - net: mana: Use page pool fragments for RX buffers instead of full pages
      to improve memory efficiency.

  [ Ubuntu-azure: 6.8.0-1039.45 ]

  * noble/linux-azure: 6.8.0-1039.45 -proposed tracker (LP: #2125074)
  [ Ubuntu: 6.8.0-85.85 ]
  * noble/linux: 6.8.0-85.85 -proposed tracker (LP: #2125109)
  * Packaging resync (LP: #1786013)
    - [Packaging] resync git-ubuntu-log
  * CVE-2025-38500
    - xfrm: interface: fix use-after-free after changing collect_md xfrm
      interface
  * TLS socket disconnection causes various issues (LP: #2120516) //
    CVE-2025-37756
    - net: tls: explicitly disallow disconnect
  * CVE-2025-38477
    - net/sched: sch_qfq: Fix race condition on qfq_aggregate
    - net/sched: sch_qfq: Avoid triggering might_sleep in atomic context in
      qfq_delete_class
  * CVE-2025-38618
    - vsock: Do not allow binding to VMADDR_PORT_ANY
  * CVE-2025-38617
    - net/packet: fix a race in packet_set_ring() and packet_notifier()
  * CVE-2025-37785
    - ext4: fix OOB read when checking dotdot dir

  [ Ubuntu-azure: 6.8.0-1038.44 ]

  [ Ubuntu: 6.8.0-84.84 ]
  * Linux refcount imbalance in af_unix subsystem (LP: #2121515)
    - SAUCE: af_unix: Fix GC compatibility with upstream OOB refcount changes

 -- John Cabaj <email address hidden> Tue, 23 Sep 2025 16:07:09 -0500

Source diff to previous version
2122719 azure: backport \
2120803 azure: backport \
2118807 azure: backport various SMB multichannel fixes
2121570 net: mana: Use page pool fragments for RX buffers instead of full pages to improve memory efficiency
1786013 Packaging resync
2120516 TLS socket disconnection causes various issues
2121515 Linux refcount imbalance in af_unix subsystem
CVE-2025-38500 In the Linux kernel, the following vulnerability has been resolved: xfrm: interface: fix use-after-free after changing collect_md xfrm interface co
CVE-2025-37756 In the Linux kernel, the following vulnerability has been resolved: net: tls: explicitly disallow disconnect syzbot discovered that it can disconne
CVE-2025-38477 In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix race condition on qfq_aggregate A race condition can oc
CVE-2025-38618 In the Linux kernel, the following vulnerability has been resolved: vsock: Do not allow binding to VMADDR_PORT_ANY It is possible for a vsock to au
CVE-2025-38617 In the Linux kernel, the following vulnerability has been resolved: net/packet: fix a race in packet_set_ring() and packet_notifier() When packet_s
CVE-2025-37785 In the Linux kernel, the following vulnerability has been resolved: ext4: fix OOB read when checking dotdot dir Mounting a corrupted filesystem wit

Version: 6.8.0-1022.23 2025-09-02 13:08:40 UTC

  linux-azure-nvidia (6.8.0-1022.23) noble; urgency=medium

  * noble/linux-azure-nvidia: 6.8.0-1022.23 -proposed tracker (LP: #2120371)

  [ Ubuntu-azure: 6.8.0-1034.39 ]

  * noble/linux-azure: 6.8.0-1034.39 -proposed tracker (LP: #2120374)
  [ Ubuntu: 6.8.0-78.78 ]
  * noble/linux: 6.8.0-78.78 -proposed tracker (LP: #2120405)
  * Incorrect backport for CVE-2025-21861 causes kernel hangs
    (LP: #2120330) // CVE-2025-21861
    - mm/migrate_device: don't add folio to be freed to LRU in
      migrate_device_finalize()
  * Incorrect backport for CVE-2025-21861 causes kernel hangs (LP: #2120330)
    - SAUCE: Revert "mm/migrate_device: don't add folio to be freed to LRU in
      migrate_device_finalize()"
    - mm: migrate_device: use more folio in migrate_device_finalize()

Source diff to previous version
2120330 Incorrect backport for CVE-2025-21861 causes kernel hangs
CVE-2025-21861 In the Linux kernel, the following vulnerability has been resolved: mm/migrate_device: don't add folio to be freed to LRU in migrate_device_finalize

Version: 6.8.0-1019.20 2025-07-16 05:07:06 UTC

  linux-azure-nvidia (6.8.0-1019.20) noble; urgency=medium

  * noble/linux-azure-nvidia: 6.8.0-1019.20 -proposed tracker (LP: #2114309)

  * [GB200] MANA patch updates (LP: #2115453)
    - RDMA/mana_ib: Fix error code in probe()
    - net: mana: Probe rdma device in mana driver
    - RDMA/mana_ib: Add support of 4M, 1G, and 2G pages
    - RDMA/mana_ib: Add support of mana_ib for RNIC and ETH nic
    - RDMA/mana_ib: unify mana_ib functions to support any gdma device
    - net: mana: Add support for auxiliary device servicing events
    - net: mana: use ethtool string helpers
    - net: mana: Expose additional hardware counters for drop and TC via
      ethtool.
    - RDMA/mana_ib: Add device statistics support
    - net: mana: Add handler for hardware servicing events

  * [Arm64] High reboot time for 96 core Linux VMs (LP: #2114218)
    - arm64: mm: Don't remap pgtables per-cont(pte|pmd) block
    - arm64: mm: Batch dsb and isb when populating pgtables
    - arm64: mm: Don't remap pgtables for allocate vs populate

  [ Ubuntu-nvidia: 6.8.0-1030.33 ]

  * noble/linux-nvidia: 6.8.0-1030.33 -proposed tracker (LP: #2114327)
  * Packaging resync (LP: #1786013)
    - [Packaging] update variants

  [ Ubuntu-azure: 6.8.0-1031.36 ]

  * noble/linux-azure: 6.8.0-1031.36 -proposed tracker (LP: #2114312)
  * Packaging resync (LP: #1786013)
    - [Packaging] update variants
  * Request to allow variable-sized MANA indirection table (LP: #2100902)
    - net: mana: Allow variable size indirection table
  * [Arm64] High reboot time for 96 core Linux VMs (LP: #2114218)
    - arm64: mm: Don't remap pgtables per-cont(pte|pmd) block
    - arm64: mm: Batch dsb and isb when populating pgtables
    - arm64: mm: Don't remap pgtables for allocate vs populate
  * Backport of [hv_netvsc]Fix error "nvsp_rndis_pkt_complete error status: 2"
    (LP: #2112423)
    - Drivers: hv: Allow vmbus_sendpacket_mpb_desc() to create multiple ranges
    - hv_netvsc: Use vmbus_sendpacket_mpb_desc() to send VMBus messages
    - hv_netvsc: Preserve contiguous PFN grouping in the page buffer array
    - hv_netvsc: Remove rmsg_pgcnt
    - Drivers: hv: vmbus: Remove vmbus_sendpacket_pagebuffer()
  * Backport request of tools: hv: Enable debug logs for hv_kvp_daemon
    (LP: #2112609)
    - tools: hv: Enable debug logs for hv_kvp_daemon
  * KVM-AMD Crash in GitHub Actions (LP: #2106673)
    - SAUCE (no-up): KVM: SVM: Workaround overly strict CR3 check by Hyper-V
  * noble/linux: 6.8.0-63.66 -proposed tracker (LP: #2114341)
  * Packaging resync (LP: #1786013)
    - [Packaging] update variants
    - [Packaging] update annotations scripts
  * CVE-2025-37798
    - sch_htb: make htb_qlen_notify() idempotent
    - sch_htb: make htb_deactivate() idempotent
    - sch_drr: make drr_qlen_notify() idempotent
    - sch_hfsc: make hfsc_qlen_notify() idempotent
    - sch_qfq: make qfq_qlen_notify() idempotent
    - sch_ets: make est_qlen_notify() idempotent
    - codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog()
  * CVE-2025-37997
    - netfilter: ipset: fix region locking in hash types
  * CVE-2025-22088
    - RDMA/erdma: Prevent use-after-free in erdma_accept_newconn()
  * CVE-2025-37890
    - net_sched: hfsc: Fix a UAF vulnerability in class with netem as child
      qdisc
    - sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue()
    - net_sched: hfsc: Address reentrant enqueue adding class to eltree twice
  * raid1: Fix NULL pointer dereference in process_checks() (LP: #2112519)
    - md/raid1: Add check for missing source disk in process_checks()

 -- John Cabaj <email address hidden> Fri, 27 Jun 2025 17:13:34 -0500

Source diff to previous version
2115453 [GB200] MANA patch updates
2114218 [Arm64] High reboot time for 96 core Linux VMs
1786013 Packaging resync
2100902 Request to allow variable-sized MANA indirection table
2112423 Backport of [hv_netvsc]Fix error \
2112609 Backport request of tools: hv: Enable debug logs for hv_kvp_daemon
2106673 KVM-AMD Crash in GitHub Actions
2112519 raid1: Fix NULL pointer dereference in process_checks()
CVE-2025-37798 In the Linux kernel, the following vulnerability has been resolved: codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog() After making
CVE-2025-37997 In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: fix region locking in hash types Region locking introduced in
CVE-2025-22088 In the Linux kernel, the following vulnerability has been resolved: RDMA/erdma: Prevent use-after-free in erdma_accept_newconn() After the erdma_ce
CVE-2025-37890 In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc As

Version: 6.8.0-1018.19 2025-06-24 01:07:08 UTC

  linux-azure-nvidia (6.8.0-1018.19) noble; urgency=medium

  * noble/linux-azure-nvidia: 6.8.0-1018.19 -proposed tracker (LP: #2112225)

Source diff to previous version

Version: 6.8.0-1016.17 2025-05-15 02:08:39 UTC

  linux-azure-nvidia (6.8.0-1016.17) noble; urgency=medium

  * noble/linux-azure-nvidia: 6.8.0-1016.17 -proposed tracker (LP: #2107105)

  * Packaging resync (LP: #1786013)
    - [Packaging] debian.azure-nvidia/dkms-versions -- update from kernel-versions
      (main/2025.04.14)

  * azure: pull "net: mana: Add HTB Qdisc offload support" as a SAUCE patch
    (LP: #2109536)
    - SAUCE: net: mana: Add speed support in mana_get_link_ksettings
    - SAUCE: net: mana: Add sched HTB offload support
    - SAUCE: net: mana: Handle unsupported HWC commands

  [ Ubuntu-nvidia: 6.8.0-1028.30 ]

  * noble/linux-nvidia: 6.8.0-1028.31 -proposed tracker (LP: #2107124)
  * Packaging resync (LP: #1786013)
    - [Packaging] debian.nvidia/dkms-versions -- update from kernel-versions
      (main/2025.04.14)
  * warning at iommu_dma_unmap_page when running ibv_rc_pingpong (LP: #2107816)
    - RDMA/mlx5: Fix a WARN during dereg_mr for DM type
  * Bump up EFI_MMAP_NR_SLACK_SLOTS to 32 (LP: #2102674)
    - Revert "UBUNTU: SAUCE: efi: efi_get_memory_map -- increase map headroom"
    - efi/libstub: Bump up EFI_MMAP_NR_SLACK_SLOTS to 32

  [ Ubuntu-azure: 6.8.0-1029.34 ]

  * noble/linux-azure: 6.8.0-1029.34 -proposed tracker (LP: #2107108)
  * Packaging resync (LP: #1786013)
    - [Packaging] debian.azure/dkms-versions -- update from kernel-versions
      (main/2025.04.14)
  * azure: include MANA modules in linux-modules (LP: #2106181)
    - [Packaging] azure: include MANA modules in linux-modules
  * noble/linux: 6.8.0-60.63 -proposed tracker (LP: #2107138)
  * Packaging resync (LP: #1786013)
    - [Packaging] debian.master/dkms-versions -- update from kernel-versions
      (main/2025.04.14)
  * Missing upstream commits for LP: #2102181 (LP: #2107336)
    - libperf cpumap: Add any, empty and min helpers
    - libperf cpumap: Ensure empty cpumap is NULL from alloc
  * Noble update: upstream stable patchset 2025-04-10 (LP: #2106770)
    - memblock: use numa_valid_node() helper to check for invalid node ID
    - jbd2: increase IO priority for writing revoke records
    - jbd2: flush filesystem device before updating tail sequence
    - dm array: fix unreleased btree blocks on closing a faulty array cursor
    - dm array: fix cursor index when skipping across block boundaries
    - exfat: fix the infinite loop in __exfat_free_cluster()
    - erofs: fix PSI memstall accounting
    - ASoC: rt722: add delay time to wait for the calibration procedure
    - ASoC: mediatek: disable buffer pre-allocation
    - selftests/alsa: Fix circular dependency involving global-timer
    - ieee802154: ca8210: Add missing check for kfifo_alloc() in ca8210_probe()
    - net: 802: LLC+SNAP OID:PID lookup on start of skb data
    - tcp/dccp: complete lockless accesses to sk->sk_max_ack_backlog
    - tcp/dccp: allow a connection when sk_max_ack_backlog is zero
    - net: libwx: fix firmware mailbox abnormal return
    - pds_core: limit loop over fw name list
    - bnxt_en: Fix possible memory leak when hwrm_req_replace fails
    - cxgb4: Avoid removal of uninserted tid
    - ice: fix incorrect PHY settings for 100 GB/s
    - igc: return early when failing to read EECD register
    - tls: Fix tls_sw_sendmsg error handling
    - eth: gve: use appropriate helper to set xdp_features
    - Bluetooth: hci_sync: Fix not setting Random Address when required
    - Bluetooth: MGMT: Fix Add Device to responding before completing
    - Bluetooth: btnxpuart: Fix driver sending truncated data
    - tcp: Annotate data-race around sk->sk_mark in tcp_v4_send_reset
    - riscv: Fix early ftrace nop patching
    - memblock tests: fix implicit declaration of function 'numa_valid_node'
    - iio: imu: inv_icm42600: fix timestamps after suspend if sensor is on
    - netfilter: nf_tables: imbalance in flowtable binding
    - drm/mediatek: stop selecting foreign drivers
    - [Config] updateconfigs for MTK_SMI
    - drm/mediatek: Fix YCbCr422 color format issue for DP
    - drm/mediatek: Fix mode valid issue for dp
    - drm/mediatek: Add return value check when reading DPCD
    - cpuidle: riscv-sbi: fix device node release in early exit of
      for_each_possible_cpu
    - scsi: ufs: qcom: Power off the PHY if it was already powered on in
      ufs_qcom_power_up_sequence()
    - dm-ebs: don't set the flag DM_TARGET_PASSES_INTEGRITY
    - ksmbd: Implement new SMB3 POSIX type
    - thermal: of: fix OF node leak in of_thermal_zone_find()
    - smb: client: sync the root session and superblock context passwords before
      automounting
    - ACPI: resource: Add TongFang GM5HG0A to irq1_edge_low_force_override[]
    - ACPI: resource: Add Asus Vivobook X1504VAP to irq1_level_low_skip_override[]
    - drm/amd/display: increase MAX_SURFACES to the value supported by hw
    - io_uring/timeout: fix multishot updates
    - dm-verity FEC: Fix RS FEC repair for roots unaligned to block size (take 2)
    - USB: serial: option: add MeiG Smart SRM815
    - USB: serial: option: add Neoway N723-EA support
    - staging: iio: ad9834: Correct phase range check
    - staging: iio: ad9832: Correct phase range check
    - usb-storage: Add max sectors quirk for Nokia 208
    - USB: serial: cp210x: add Phoenix Contact UPS Device
    - usb: dwc3: gadget: fix writing NYET threshold
    - misc: microchip: pci1xxxx: Resolve return code mismatch during GPIO set
      config
    - tty: serial: 8250: Fix another runtime PM usage counter underflow
    - usb: dwc3-am62: Disable autosuspend during remove
    - USB: usblp: return error when setting unsupported protocol
    - USB: core: Disable LPM only for non-suspended ports
    - usb: fix reference leak in usb_new_device()
    - usb: gadget: midi2: Reverse-select at the right place
    - usb: chipidea: ci_hdrc_imx: decrement device's refcount in .remove() and in
      the error path of .probe()
    - usb: gadget: f_uac2: Fix incorrect setting of bNumEndpoints
    - usb: typec: tcpm/tcpci_maxim: fix error code in
      max_contaminant_re

1786013 Packaging resync
2109536 azure: pull \
2107816 warning at iommu_dma_unmap_page when running ibv_rc_pingpong
2102674 Bump up EFI_MMAP_NR_SLACK_SLOTS to 32
2106181 azure: include MANA modules in linux-modules
2102181 Noble update: upstream stable patchset 2025-03-13
2107336 Missing upstream commits for LP: #2102181
2106770 Noble update: upstream stable patchset 2025-04-10
2106638 intel_idle: add Granite Rapids Xeon (D) support
2106449 [SRU] Enable speaker/mic mute LEDs on Lenovo ideapad and thinkbook
2106251 Backport \
2106275 Enable OOB P-state control for Intel Sierra Forest/Granite Rapids
2101120 mptcp BUG 'scheduling while atomic' in mptcp_pm_nl_append_new_local_addr
2106632 Noble update: upstream stable patchset 2025-04-09
2104210 uprobe-related panics during profiling
2069407 ubuntu_bpf failed to build on Noble / Oracular
2103564 nfsd hangs and never recovers after NFS4ERR_DELAY and a connection loss
2103427 thermal: Fix temperature readings on intel hardware
2101811 [SRU] Fix Lenovo M70/90 gen6 micmute key and led
2103869 Noble update: upstream stable patchset 2025-03-22
2102266 Noble update: upstream stable patchset 2025-03-14
2097393 Noble update: upstream stable patchset 2025-02-04
CVE-2025-21659 In the Linux kernel, the following vulnerability has been resolved: netdev: prevent accessing NAPI instances from another namespace The NAPI IDs we
CVE-2025-21634 In the Linux kernel, the following vulnerability has been resolved: cgroup/cpuset: remove kernfs active break A warning was found: WARNING: CPU: 1
CVE-2025-21635 In the Linux kernel, the following vulnerability has been resolved: rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using current->nsproxy As mentioned in
CVE-2025-21643 In the Linux kernel, the following vulnerability has been resolved: netfs: Fix kernel async DIO Netfslib needs to be able to handle kernel-initiate
CVE-2025-21649 In the Linux kernel, the following vulnerability has been resolved: net: hns3: fix kernel crash when 1588 is sent on HIP08 devices Currently, HIP08
CVE-2025-21650 In the Linux kernel, the following vulnerability has been resolved: net: hns3: fixed hclge_fetch_pf_reg accesses bar space out of bounds issue The
CVE-2025-21651 In the Linux kernel, the following vulnerability has been resolved: net: hns3: don't auto enable misc vector Currently, there is a time window betw
CVE-2025-21654 In the Linux kernel, the following vulnerability has been resolved: ovl: support encoding fid from inode with no alias Dmitry Safonov reported that
CVE-2024-57883 In the Linux kernel, the following vulnerability has been resolved: mm: hugetlb: independent PMD page table shared count The folio refcount may be
CVE-2024-57888 In the Linux kernel, the following vulnerability has been resolved: workqueue: Do not warn when cancelling WQ_MEM_RECLAIM work from !WQ_MEM_RECLAIM
CVE-2025-21631 In the Linux kernel, the following vulnerability has been resolved: block, bfq: fix waker_bfqq UAF after bfq_split_bfqq() Our syzkaller report a fo
CVE-2025-21656 In the Linux kernel, the following vulnerability has been resolved: hwmon: (drivetemp) Fix driver producing garbage data when SCSI errors occur scs
CVE-2025-21655 In the Linux kernel, the following vulnerability has been resolved: io_uring/eventfd: ensure io_eventfd_signal() defers another RCU period io_event
CVE-2024-57904 In the Linux kernel, the following vulnerability has been resolved: iio: adc: at91: call input_free_device() on allocated iio_dev Current implement
CVE-2024-57906 In the Linux kernel, the following vulnerability has been resolved: iio: adc: ti-ads8688: fix information leak in triggered buffer The 'buffer' loc
CVE-2024-57907 In the Linux kernel, the following vulnerability has been resolved: iio: adc: rockchip_saradc: fix information leak in triggered buffer The 'data'
CVE-2024-57908 In the Linux kernel, the following vulnerability has been resolved: iio: imu: kmx61: fix information leak in triggered buffer The 'buffer' local ar
CVE-2024-57910 In the Linux kernel, the following vulnerability has been resolved: iio: light: vcnl4035: fix information leak in triggered buffer The 'buffer' loc
CVE-2024-57911 In the Linux kernel, the following vulnerability has been resolved: iio: dummy: iio_simply_dummy_buffer: fix information leak in triggered buffer T
CVE-2024-57912 In the Linux kernel, the following vulnerability has been resolved: iio: pressure: zpa2326: fix information leak in triggered buffer The 'sample' l
CVE-2024-57913 In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_fs: Remove WARN_ON in functionfs_bind This commit addresses an i
CVE-2025-21632 In the Linux kernel, the following vulnerability has been resolved: x86/fpu: Ensure shadow stack is active before "getting" registers The x86 shado
CVE-2024-57916 In the Linux kernel, the following vulnerability has been resolved: misc: microchip: pci1xxxx: Resolve kernel panic during GPIO IRQ handling Resolv
CVE-2024-57917 In the Linux kernel, the following vulnerability has been resolved: topology: Keep the cpumask unchanged when printing cpumap During fuzz testing,
CVE-2024-57939 In the Linux kernel, the following vulnerability has been resolved: riscv: Fix sleeping in invalid context in die() die() can be called in exceptio
CVE-2025-21636 In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: plpmtud_probe_interval: avoid using current->nsproxy As mentioned
CVE-2025-21637 In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: udp_port: avoid using current->nsproxy As mentioned in a previous
CVE-2025-21638 In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: auth_enable: avoid using current->nsproxy As mentioned in a previ
CVE-2025-21639 In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: rto_min/max: avoid using current->nsproxy As mentioned in a previ
CVE-2025-21640 In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy As mentioned in a p
CVE-2025-21642 In the Linux kernel, the following vulnerability has been resolved: mptcp: sysctl: sched: avoid using current->nsproxy Using the 'net' structure vi
CVE-2025-21664 In the Linux kernel, the following vulnerability has been resolved: dm thin: make get_first_thin use rcu-safe list first function The documentation
CVE-2024-57945 In the Linux kernel, the following vulnerability has been resolved: riscv: mm: Fix the out of bound issue of vmemmap address In sparse vmemmap mode
CVE-2025-21660 In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix unexpectedly changed path in ksmbd_vfs_kern_path_locked When `ksmbd_
CVE-2025-21645 In the Linux kernel, the following vulnerability has been resolved: platform/x86/amd/pmc: Only disable IRQ1 wakeup where i8042 actually enabled it
CVE-2025-21646 In the Linux kernel, the following vulnerability has been resolved: afs: Fix the maximum cell name length The kafs filesystem limits the maximum le
CVE-2024-57925 In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix a missing return value check bug In the smb2_send_interim_resp(), if
CVE-2024-57926 In the Linux kernel, the following vulnerability has been resolved: drm/mediatek: Set private->all_drm_private[i]->drm to NULL if mtk_drm_bind retur
CVE-2025-21662 In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Fix variable not being completed when function returns When cmd_alloc
CVE-2025-21663 In the Linux kernel, the following vulnerability has been resolved: net: stmmac: dwmac-tegra: Read iommu stream id from device tree Nvidia's Tegra
CVE-2025-21647 In the Linux kernel, the following vulnerability has been resolved: sched: sch_cake: add bounds checks to host bulk flow fairness counts Even thoug
CVE-2025-21648 In the Linux kernel, the following vulnerability has been resolved: netfilter: conntrack: clamp maximum hashtable size to INT_MAX Use INT_MAX as ma
CVE-2025-21652 In the Linux kernel, the following vulnerability has been resolved: ipvlan: Fix use-after-free in ipvlan_get_iflink(). syzbot presented an use-afte
CVE-2025-21658 In the Linux kernel, the following vulnerability has been resolved: btrfs: avoid NULL pointer dereference if no valid extent tree [BUG] Syzbot repo
CVE-2025-21653 In the Linux kernel, the following vulnerability has been resolved: net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute syzbot found that TCA_F
CVE-2024-47736 In the Linux kernel, the following vulnerability has been resolved: erofs: handle overlapped pclusters out of crafted images properly syzbot report
CVE-2024-57940 In the Linux kernel, the following vulnerability has been resolved: exfat: fix the infinite loop in exfat_readdir() If the file system is corrupted
CVE-2024-57929 In the Linux kernel, the following vulnerability has been resolved: dm array: fix releasing a faulty array block twice in dm_array_cursor_end When
CVE-2025-21971 In the Linux kernel, the following vulnerability has been resolved: net_sched: Prevent creation of classes with TC_H_ROOT The function qdisc_tree_r
CVE-2024-57898 In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: clear link ID from bitmap during link delete after clean up Cur
CVE-2024-57882 In the Linux kernel, the following vulnerability has been resolved: mptcp: fix TCP options overflow. Syzbot reported the following splat: Oops: ge
CVE-2024-57884 In the Linux kernel, the following vulnerability has been resolved: mm: vmscan: account for free pages to prevent infinite Loop in throttle_direct_r
CVE-2024-57885 In the Linux kernel, the following vulnerability has been resolved: mm/kmemleak: fix sleeping function called from invalid context at print message
CVE-2024-57932 In the Linux kernel, the following vulnerability has been resolved: gve: guard XDP xmit NDO on existence of xdp queues In GVE, dedicated XDP queues
CVE-2024-57933 In the Linux kernel, the following vulnerability has been resolved: gve: guard XSK operations on the existence of queues This patch predicates the
CVE-2024-57887 In the Linux kernel, the following vulnerability has been resolved: drm: adv7511: Fix use-after-free in adv7533_attach_dsi() The host_node pointer
CVE-2024-57938 In the Linux kernel, the following vulnerability has been resolved: net/sctp: Prevent autoclose integer overflow in sctp_association_init() While b
CVE-2024-57889 In the Linux kernel, the following vulnerability has been resolved: pinctrl: mcp23s08: Fix sleeping in atomic context due to regmap locking If a de
CVE-2024-57890 In the Linux kernel, the following vulnerability has been resolved: RDMA/uverbs: Prevent integer overflow issue In the expression "cmd.wqe_size * c
CVE-2024-57892 In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv When mounting o
CVE-2024-57893 In the Linux kernel, the following vulnerability has been resolved: ALSA: seq: oss: Fix races at processing SysEx messages OSS sequencer handles th
CVE-2024-57895 In the Linux kernel, the following vulnerability has been resolved: ksmbd: set ATTR_CTIME flags when setting mtime David reported that the new warn
CVE-2024-57896 In the Linux kernel, the following vulnerability has been resolved: btrfs: flush delalloc workers queue before stopping cleaner kthread during unmou
CVE-2024-57897 In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: Correct the migration DMA map direction The SVM DMA device map dire
CVE-2024-57899 In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: fix mbss changed flags corruption on 32 bit systems On 32-bit s
CVE-2024-57900 In the Linux kernel, the following vulnerability has been resolved: ila: serialize calls to nf_register_net_hooks() syzbot found a race in ila_add_
CVE-2024-57901 In the Linux kernel, the following vulnerability has been resolved: af_packet: fix vlan_get_protocol_dgram() vs MSG_PEEK Blamed commit forgot MSG_P
CVE-2024-57902 In the Linux kernel, the following vulnerability has been resolved: af_packet: fix vlan_get_tci() vs MSG_PEEK Blamed commit forgot MSG_PEEK case, a
CVE-2024-57903 In the Linux kernel, the following vulnerability has been resolved: net: restrict SO_REUSEPORT to inet sockets After blamed commit, crypto sockets
CVE-2024-36476 In the Linux kernel, the following vulnerability has been resolved: RDMA/rtrs: Ensure 'ib_sge list' is accessible Move the declaration of the 'ib_s
CVE-2024-39282 In the Linux kernel, the following vulnerability has been resolved: net: wwan: t7xx: Fix FSM command timeout issue When driver processes the intern
CVE-2024-57801 In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Skip restore TC rules for vport rep without loaded flag During drive
CVE-2024-57802 In the Linux kernel, the following vulnerability has been resolved: netrom: check buffer length before accessing it Syzkaller reports an uninit val
CVE-2024-57841 In the Linux kernel, the following vulnerability has been resolved: net: fix memory leak in tcp_conn_request() If inet_csk_reqsk_queue_hash_add() r
CVE-2024-57931 In the Linux kernel, the following vulnerability has been resolved: selinux: ignore unknown extended permissions When evaluating extended permissio
CVE-2024-56761 In the Linux kernel, the following vulnerability has been resolved: x86/fred: Clear WFE in missing-ENDBRANCH #CPs An indirect branch instruction se
CVE-2024-53179 In the Linux kernel, the following vulnerability has been resolved: smb: client: fix use-after-free of signing key Customers have reported use-afte
CVE-2024-56758 In the Linux kernel, the following vulnerability has been resolved: btrfs: check folio mapping after unlock in relocate_one_folio() When we call bt
CVE-2024-56759 In the Linux kernel, the following vulnerability has been resolved: btrfs: fix use-after-free when COWing tree bock and tracing is enabled When a C
CVE-2024-57806 In the Linux kernel, the following vulnerability has been resolved: btrfs: fix transaction atomicity bug when enabling simple quotas Set squota inc
CVE-2024-57793 In the Linux kernel, the following vulnerability has been resolved: virt: tdx-guest: Just leak decrypted memory on unrecoverable errors In CoCo VMs
CVE-2024-56764 In the Linux kernel, the following vulnerability has been resolved: ublk: detach gendisk from ublk device if add_disk() fails Inside ublk_abort_req
CVE-2024-57804 In the Linux kernel, the following vulnerability has been resolved: scsi: mpi3mr: Fix corrupt config pages PHY state is switched in sysfs The drive
CVE-2024-57792 In the Linux kernel, the following vulnerability has been resolved: power: supply: gpio-charger: Fix set charge current limits Fix set charge curre
CVE-2024-56760 In the Linux kernel, the following vulnerability has been resolved: PCI/MSI: Handle lack of irqdomain gracefully Alexandre observed a warning emitt
CVE-2024-56763 In the Linux kernel, the following vulnerability has been resolved: tracing: Prevent bad count for tracing_cpumask_write If a large count is provid
CVE-2024-57946 In the Linux kernel, the following vulnerability has been resolved: virtio-blk: don't keep queue frozen during system suspend Commit 4ce6e2db00de (
CVE-2024-57807 In the Linux kernel, the following vulnerability has been resolved: scsi: megaraid_sas: Fix for a potential deadlock This fixes a 'possible circula
CVE-2024-56767 In the Linux kernel, the following vulnerability has been resolved: dmaengine: at_xdmac: avoid null_prt_deref in at_xdmac_prep_dma_memset The at_xd
CVE-2024-56769 In the Linux kernel, the following vulnerability has been resolved: media: dvb-frontends: dib3000mb: fix uninit-value in dib3000_write_reg Syzbot r
CVE-2024-56710 In the Linux kernel, the following vulnerability has been resolved: ceph: fix memory leak in ceph_direct_read_write() The bvecs array which is allo
CVE-2024-53685 In the Linux kernel, the following vulnerability has been resolved: ceph: give up on paths longer than PATH_MAX If the full path to be built by cep
CVE-2024-54193 In the Linux kernel, the following vulnerability has been resolved: accel/ivpu: Fix WARN in ivpu_ipc_send_receive_internal() Move pm_runtime_set_ac
CVE-2024-54455 In the Linux kernel, the following vulnerability has been resolved: accel/ivpu: Fix general protection fault in ivpu_bo_list() Check if ctx is not
CVE-2024-53690 In the Linux kernel, the following vulnerability has been resolved: nilfs2: prevent use of deleted inode syzbot reported a WARNING in nilfs_rmdir.
CVE-2024-56709 In the Linux kernel, the following vulnerability has been resolved: io_uring: check if iowq is killed before queuing task work can be executed afte
CVE-2024-55881 In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Play nice with protected guests in complete_hypercall_exit() Use is_6
CVE-2024-55916 In the Linux kernel, the following vulnerability has been resolved: Drivers: hv: util: Avoid accessing a ringbuffer not initialized yet If the KVP
CVE-2024-56369 In the Linux kernel, the following vulnerability has been resolved: drm/modes: Avoid divide by zero harder in drm_mode_vrefresh() drm_mode_vrefresh
CVE-2024-56372 In the Linux kernel, the following vulnerability has been resolved: net: tun: fix tun_napi_alloc_frags() syzbot reported the following crash [1] I
CVE-2024-56715 In the Linux kernel, the following vulnerability has been resolved: ionic: Fix netdev notifier unregister on failure If register_netdev() fails, th
CVE-2024-56716 In the Linux kernel, the following vulnerability has been resolved: netdevsim: prevent bad user input in nsim_dev_health_break_write() If either a
CVE-2024-56717 In the Linux kernel, the following vulnerability has been resolved: net: mscc: ocelot: fix incorrect IFH SRC_PORT field in ocelot_ifh_set_basic() P
CVE-2024-57791 In the Linux kernel, the following vulnerability has been resolved: net/smc: check return value of sock_recvmsg when draining clc data When receivi
CVE-2024-47408 In the Linux kernel, the following vulnerability has been resolved: net/smc: check smcd_v2_ext_offset when receiving proposal msg When receiving pr
CVE-2024-49568 In the Linux kernel, the following vulnerability has been resolved: net/smc: check v2_ext_offset/eid_cnt/ism_gid_cnt when receiving proposal msg Wh
CVE-2024-49571 In the Linux kernel, the following vulnerability has been resolved: net/smc: check iparea_offset and ipv6_prefixes_cnt when receiving proposal msg
CVE-2024-56718 In the Linux kernel, the following vulnerability has been resolved: net/smc: protect link down work from execute after lgr freed link down work may
CVE-2024-41013 In the Linux kernel, the following vulnerability has been resolved: xfs: don't walk off the end of a directory data block This adds sanity checks f
CVE-2024-56652 In the Linux kernel, the following vulnerability has been resolved: drm/xe/reg_sr: Remove register pool That pool implementation doesn't really wor
CVE-2024-54460 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: iso: Fix circular lock in iso_listen_bis This fixes the circular loc
CVE-2024-57879 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: iso: Always release hdev at the end of iso_listen_bis Since hci_get_
CVE-2024-56656 In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Fix aggregation ID mask to prevent oops on 5760X chips The 5760X (P7)
CVE-2024-53125 In the Linux kernel, the following vulnerability has been resolved: bpf: sync_linked_regs() must preserve subreg_def Range propagation must not aff
CVE-2024-56654 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: Fix using rcu_read_(un)lock while iterating The usage of
CVE-2024-56770 In the Linux kernel, the following vulnerability has been resolved: net/sched: netem: account for backlog updates from child qdisc In general, 'qle
CVE-2024-54683 In the Linux kernel, the following vulnerability has been resolved: netfilter: IDLETIMER: Fix for possible ABBA deadlock Deletion of the last rule
CVE-2024-55639 In the Linux kernel, the following vulnerability has been resolved: net: renesas: rswitch: avoid use-after-put for a device tree node The device tr
CVE-2024-56657 In the Linux kernel, the following vulnerability has been resolved: ALSA: control: Avoid WARN() for symlink errors Using WARN() for showing the err
CVE-2024-56659 In the Linux kernel, the following vulnerability has been resolved: net: lapb: increase LAPB_HEADER_LEN It is unclear if net/lapb code is supposed
CVE-2024-56660 In the Linux kernel, the following vulnerability has been resolved: net/mlx5: DR, prevent potential error pointer dereference The dr_domain_add_vpo
CVE-2024-56662 In the Linux kernel, the following vulnerability has been resolved: acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl Fix an issue detected b
CVE-2024-56664 In the Linux kernel, the following vulnerability has been resolved: bpf, sockmap: Fix race between element replace and close() Element replace (wit
CVE-2024-56667 In the Linux kernel, the following vulnerability has been resolved: drm/i915: Fix NULL pointer dereference in capture_engine When the intel_context
CVE-2024-56670 In the Linux kernel, the following vulnerability has been resolved: usb: gadget: u_serial: Fix the issue that gs_start_io crashed due to accessing n
CVE-2024-53687 In the Linux kernel, the following vulnerability has been resolved: riscv: Fix IPIs usage in kfence_protect_page() flush_tlb_kernel_range() may use
CVE-2024-56675 In the Linux kernel, the following vulnerability has been resolved: bpf: Fix UAF via mismatching bpf_prog/attachment RCU flavors Uprobes always use
CVE-2024-56653 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btmtk: avoid UAF in btmtk_process_coredump hci_devcd_append may lead



About   -   Send Feedback to @ubuntu_updates