Package "linux-doc"
| Name: |
linux-doc
|
Description: |
Linux kernel specific documentation for version 6.8.0
|
| Latest version: |
6.8.0-117.117 |
| Release: |
noble (24.04) |
| Level: |
updates |
| Repository: |
main |
| Head package: |
linux |
Links
Download "linux-doc"
Other versions of "linux-doc" in Noble
Changelog
|
linux (6.8.0-117.117) noble; urgency=medium
* noble/linux: 6.8.0-117.117 -proposed tracker (LP: #2151070)
* CVE-2026-31419
- net: bonding: fix use-after-free in bond_xmit_broadcast()
* CVE-2026-31431
- crypto: scatterwalk - Backport memcpy_sglist()
- crypto: algif_aead - use memcpy_sglist() instead of null skcipher
- crypto: algif_aead - Revert to operating out-of-place
- crypto: algif_aead - snapshot IV for async AEAD requests
- crypto: authenc - use memcpy_sglist() instead of null skcipher
- crypto: authencesn - Do not place hiseq at end of dst for out-of-place
decryption
- crypto: authencesn - Fix src offset when decrypting in-place
- crypto: af_alg - Fix page reassignment overflow in af_alg_pull_tsgl
- crypto: algif_aead - Fix minimum RX size check for decryption
* CVE-2026-31533
- net/tls: fix use-after-free in -EBUSY error path of tls_do_encryption
* CVE-2026-31504
- net: fix fanout UAF in packet_release() via NETDEV_UP race
-- Manuel Diewald <email address hidden> Tue, 05 May 2026 15:53:02 +0200
|
| Source diff to previous version |
| CVE-2026-31419 |
In the Linux kernel, the following vulnerability has been resolved: net: bonding: fix use-after-free in bond_xmit_broadcast() bond_xmit_broadcast() |
| CVE-2026-31431 |
In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to operating out-of-place This mostly reverts commi |
| CVE-2026-31533 |
In the Linux kernel, the following vulnerability has been resolved: net/tls: fix use-after-free in -EBUSY error path of tls_do_encryption The -EBUS |
| CVE-2026-31504 |
In the Linux kernel, the following vulnerability has been resolved: net: fix fanout UAF in packet_release() via NETDEV_UP race `packet_release()` h |
|
|
linux (6.8.0-111.111) noble; urgency=medium
* noble/linux: 6.8.0-111.111 -proposed tracker (LP: #2147890)
* CVE-2026-23231
- netfilter: nf_tables: fix use-after-free in nf_tables_addchain()
* macvlan: observe an RCU grace period in macvlan_common_newlink() error
path (LP: #2144380) // CVE-2026-23209
- macvlan: observe an RCU grace period in macvlan_common_newlink() error
path
* CVE-2026-23112
- nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec
-- Manuel Diewald <email address hidden> Sat, 11 Apr 2026 22:54:06 +0200
|
| Source diff to previous version |
| 2144380 |
macvlan: observe an RCU grace period in macvlan_common_newlink() error path |
| CVE-2026-23231 |
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: fix use-after-free in nf_tables_addchain() nf_tables_addc |
| CVE-2026-23209 |
In the Linux kernel, the following vulnerability has been resolved: macvlan: fix error recovery in macvlan_common_newlink() valis provided a nice r |
| CVE-2026-23112 |
In the Linux kernel, the following vulnerability has been resolved: nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec nvmet_tcp_build_pdu_i |
|
|
linux (6.8.0-110.110) noble; urgency=medium
* noble/linux: 6.8.0-110.110 -proposed tracker (LP: #2144887)
* ITS mitigation is not enabled on affected CPUs (LP: #2144730)
- x86/bugs: Rename CONFIG_RETPOLINE => CONFIG_MITIGATION_RETPOLINE
- x86/bugs: Rename CONFIG_RETHUNK => CONFIG_MITIGATION_RETHUNK
- [Config] rename config options RETHUNK and RETPOLINE
|
| Source diff to previous version |
| 2144730 |
ITS mitigation is not enabled on affected CPUs |
|
|
linux (6.8.0-107.107) noble; urgency=medium
* noble/linux: 6.8.0-107.107 -proposed tracker (LP: #2144267)
* CVE-2026-23074
- net/sched: Enforce that teql can only be used as root qdisc
* CVE-2026-23060
- crypto: authencesn - reject too-short AAD (assoclen<8) to match ESP/ESN
spec
* CVE-2026-23111
- netfilter: nf_tables: fix inverted genmask check in
nft_map_catchall_activate()
-- Manuel Diewald <email address hidden> Fri, 13 Mar 2026 14:27:20 +0100
|
| Source diff to previous version |
| CVE-2026-23074 |
In the Linux kernel, the following vulnerability has been resolved: net/sched: Enforce that teql can only be used as root qdisc Design intent of te |
| CVE-2026-23060 |
In the Linux kernel, the following vulnerability has been resolved: crypto: authencesn - reject too-short AAD (assoclen<8) to match ESP/ESN spec au |
| CVE-2026-23111 |
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate() |
|
|
linux (6.8.0-106.106) noble; urgency=medium
* Miscellaneous upstream changes
- apparmor: validate DFA start states are in bounds in unpack_pdb
- apparmor: fix memory leak in verify_header
- apparmor: replace recursive profile removal with iterative approach
- apparmor: fix: limit the number of levels of policy namespaces
- apparmor: fix side-effect bug in match_char() macro usage
- apparmor: fix missing bounds check on DEFAULT table in verify_dfa()
- apparmor: Fix double free of ns_name in aa_replace_profiles()
- apparmor: fix unprivileged local user can do privileged policy
management
- apparmor: fix differential encoding verification
- apparmor: fix race on rawdata dereference
- apparmor: fix race between freeing data and fs accessing it
-- Mehmet Basaran <email address hidden> Fri, 06 Mar 2026 03:43:25 +0300
|
About
-
Send Feedback to @ubuntu_updates