UbuntuUpdates.org

Package "linux-modules-extra-6.8.0-107-generic"

Name: linux-modules-extra-6.8.0-107-generic

Description:

Linux kernel extra modules for version 6.8.0 on 64 bit x86 SMP

Latest version: 6.8.0-107.107
Release: noble (24.04)
Level: updates
Repository: main
Head package: linux

Links


Download "linux-modules-extra-6.8.0-107-generic"


Other versions of "linux-modules-extra-6.8.0-107-generic" in Noble

No other version of this package is available in the Noble release.

Changelog

Version: 6.8.0-107.107 2026-04-01 05:08:52 UTC

  linux (6.8.0-107.107) noble; urgency=medium

  * noble/linux: 6.8.0-107.107 -proposed tracker (LP: #2144267)

  * CVE-2026-23074
    - net/sched: Enforce that teql can only be used as root qdisc

  * CVE-2026-23060
    - crypto: authencesn - reject too-short AAD (assoclen<8) to match ESP/ESN
      spec

  * CVE-2026-23111
    - netfilter: nf_tables: fix inverted genmask check in
      nft_map_catchall_activate()

 -- Manuel Diewald <email address hidden> Fri, 13 Mar 2026 14:27:20 +0100

Source diff to previous version
CVE-2026-23074 In the Linux kernel, the following vulnerability has been resolved: net/sched: Enforce that teql can only be used as root qdisc Design intent of te
CVE-2026-23060 In the Linux kernel, the following vulnerability has been resolved: crypto: authencesn - reject too-short AAD (assoclen<8) to match ESP/ESN spec au
CVE-2026-23111 In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate()

Version: 6.8.0-106.106 2026-03-13 20:08:18 UTC

  linux (6.8.0-106.106) noble; urgency=medium

  * Miscellaneous upstream changes
    - apparmor: validate DFA start states are in bounds in unpack_pdb
    - apparmor: fix memory leak in verify_header
    - apparmor: replace recursive profile removal with iterative approach
    - apparmor: fix: limit the number of levels of policy namespaces
    - apparmor: fix side-effect bug in match_char() macro usage
    - apparmor: fix missing bounds check on DEFAULT table in verify_dfa()
    - apparmor: Fix double free of ns_name in aa_replace_profiles()
    - apparmor: fix unprivileged local user can do privileged policy
      management
    - apparmor: fix differential encoding verification
    - apparmor: fix race on rawdata dereference
    - apparmor: fix race between freeing data and fs accessing it

 -- Mehmet Basaran <email address hidden> Fri, 06 Mar 2026 03:43:25 +0300

Source diff to previous version

Version: 6.8.0-101.101 2026-02-23 14:08:27 UTC

  linux (6.8.0-101.101) noble; urgency=medium

  * noble/linux: 6.8.0-101.101 -proposed tracker (LP: #2140964)

  * CVE-2025-37899
    - ksmbd: fix use-after-free in session logoff

  * CVE-2025-22037
    - ksmbd: mark SMB2_SESSION_EXPIRED to session when destroying previous
      session
    - ksmbd: fix race condition between destroy_previous_session() and smb2
      operations()
    - ksmbd: fix null pointer dereference in alloc_preauth_hash()

 -- Manuel Diewald <email address hidden> Fri, 06 Feb 2026 18:52:19 +0100

Source diff to previous version
CVE-2025-37899 In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix use-after-free in session logoff The sess->user object can currently
CVE-2025-22037 In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix null pointer dereference in alloc_preauth_hash() The Client send mal

Version: 6.8.0-100.100 2026-02-05 22:08:48 UTC

  linux (6.8.0-100.100) noble; urgency=medium

  * noble/linux: 6.8.0-100.100 -proposed tracker (LP: #2138307)

  * Turbo boost stuck disabled on Clevo PD5x_7xSNC_SND_SNE (LP: #2122531)
    - cpufreq: intel_pstate: Check IDA only before MSR_IA32_PERF_CTL writes

  * [noble] write-sealed memfd mappings fail to map read-only (LP: #2138244)
    - SAUCE: Fix read-only mapping of write-sealed pages

Source diff to previous version
2122531 Turbo boost stuck disabled on Clevo PD5x_7xSNC_SND_SNE
2138244 [noble] write-sealed memfd mappings fail to map read-only

Version: 6.8.0-94.96 2026-01-29 20:35:11 UTC

  linux (6.8.0-94.96) noble; urgency=medium

  * noble/linux: 6.8.0-94.96 -proposed tracker (LP: #2138092)

  * CVE-2025-40019
    - crypto: essiv - Check ssize for decryption and in-place encryption

  * CVE-2025-38561
    - ksmbd: fix Preauh_HashValue race condition

  * CVE-2025-39698
    - io_uring/futex: ensure io_futex_wait() cleans up properly on failure

 -- Manuel Diewald <email address hidden> Fri, 09 Jan 2026 17:07:51 +0100

CVE-2025-40019 In the Linux kernel, the following vulnerability has been resolved: crypto: essiv - Check ssize for decryption and in-place encryption Move the ssi
CVE-2025-38561 In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix Preauh_HashValue race condition If client send multiple session setu
CVE-2025-39698 In the Linux kernel, the following vulnerability has been resolved: io_uring/futex: ensure io_futex_wait() cleans up properly on failure The io_fut



About   -   Send Feedback to @ubuntu_updates