[USN-8007-1] ImageMagick vulnerabilities
[USN-8006-1] MySQL vulnerabilities
[USN-8011-1] Emacs vulnerabilities
[USN-8012-1] GitHub CLI vulnerabilities
[USN-8015-1] Linux kernel vulnerabilities
[USN-8014-1] Linux kernel vulnerabilities
[USN-8013-1] Linux kernel vulnerabilities
[USN-8016-1] Linux kernel (NVIDIA) vulnerabilities
[USN-8015-2] Linux kernel (Real-time) vulnerabilities
[USN-8013-3] Linux kernel (Real-time) vulnerabilities
[USN-8013-2] Linux kernel (FIPS) vulnerabilities
[USN-8007-1] ImageMagick vulnerabilities
==========================================================================
Ubuntu Security Notice USN-8007-1
February 03, 2026
imagemagick vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in ImageMagick.
Software Description:
- imagemagick: Image manipulation programs and library
Details:
It was discovered that ImageMagick incorrectly handled image depth values
when processing MIFF image files. An attacker could use this issue to cause
a denial of service or possibly execute arbitrary code. (CVE-2025-43965)
It was discovered that ImageMagick incorrectly processed SVG images and
MSL files. An attacker could possibly use this issue to cause a denial of
service. (CVE-2025-68618)
It was discovered that ImageMagick incorrectly handled memory when
converting MVG files. An attacker could possibly use this issue to cause a
denial of service. (CVE-2025-69204)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
imagemagick-6.q16 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm5
Available with Ubuntu Pro
imagemagick-6.q16hdri 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm5
Available with Ubuntu Pro
libimage-magick-q16-perl 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm5
Available with Ubuntu Pro
libimage-magick-q16hdri-perl 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm5
Available with Ubuntu Pro
libmagick++-6.q16-9t64 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm5
Available with Ubuntu Pro
libmagick++-6.q16hdri-9t64 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm5
Available with Ubuntu Pro
libmagickcore-6-headers 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm5
Available with Ubuntu Pro
libmagickcore-6.q16-7-extra 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm5
Available with Ubuntu Pro
libmagickcore-6.q16-7t64 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm5
Available with Ubuntu Pro
libmagickcore-6.q16hdri-7-extra 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm5
Available with Ubuntu Pro
libmagickcore-6.q16hdri-7t64 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm5
Available with Ubuntu Pro
libmagickwand-6.q16-7t64 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm5
Available with Ubuntu Pro
libmagickwand-6.q16hdri-7t64 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm5
Available with Ubuntu Pro
Ubuntu 22.04 LTS
imagemagick-6.q16 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm6
Available with Ubuntu Pro
imagemagick-6.q16hdri 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm6
Available with Ubuntu Pro
libimage-magick-q16-perl 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm6
Available with Ubuntu Pro
libimage-magick-q16hdri-perl 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm6
Available with Ubuntu Pro
libmagick++-6.q16-8 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm6
Available with Ubuntu Pro
libmagick++-6.q16hdri-8 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm6
Available with Ubuntu Pro
libmagickcore-6.q16-6 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm6
Available with Ubuntu Pro
libmagickcore-6.q16-6-extra 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm6
Available with Ubuntu Pro
libmagickcore-6.q16hdri-6 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm6
Available with Ubuntu Pro
libmagickcore-6.q16hdri-6-extra 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm6
Available with Ubuntu Pro
libmagickwand-6.q16-6 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm6
Available with Ubuntu Pro
libmagickwand-6.q16hdri-6 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm6
Available with Ubuntu Pro
Ubuntu 20.04 LTS
libimage-magick-q16-perl 8:6.9.10.23+dfsg-2.1ubuntu11.11+esm6
Available with Ubuntu Pro
libimage-magick-q16hdri-perl 8:6.9.10.23+dfsg-2.1ubuntu11.11+esm6
Available with Ubuntu Pro
libmagickcore-6.q16-6 8:6.9.10.23+dfsg-2.1ubuntu11.11+esm6
Available with Ubuntu Pro
libmagickcore-6.q16-6-extra 8:6.9.10.23+dfsg-2.1ubuntu11.11+esm6
Available with Ubuntu Pro
libmagickcore-6.q16hdri-6 8:6.9.10.23+dfsg-2.1ubuntu11.11+esm6
Available with Ubuntu Pro
libmagickcore-6.q16hdri-6-extra 8:6.9.10.23+dfsg-2.1ubuntu11.11+esm6
Available with Ubuntu Pro
Ubuntu 18.04 LTS
imagemagick-6.q16 8:6.9.7.4+dfsg-16ubuntu6.15+esm8
Available with Ubuntu Pro
imagemagick-6.q16hdri 8:6.9.7.4+dfsg-16ubuntu6.15+esm8
Available with Ubuntu Pro
libimage-magick-q16-perl 8:6.9.7.4+dfsg-16ubuntu6.15+esm8
Available with Ubuntu Pro
libimage-magick-q16hdri-perl 8:6.9.7.4+dfsg-16ubuntu6.15+esm8
Available with Ubuntu Pro
libmagick++-6.q16-7 8:6.9.7.4+dfsg-16ubuntu6.15+esm8
Available with Ubuntu Pro
libmagick++-6.q16hdri-7 8:6.9.7.4+dfsg-16ubuntu6.15+esm8
Available with Ubuntu Pro
libmagickcore-6-headers 8:6.9.7.4+dfsg-16ubuntu6.15+esm8
Available with Ubuntu Pro
libmagickcore-6.q16-3 8:6.9.7.4+dfsg-16ubuntu6.15+esm8
Available with Ubuntu Pro
libmagickcore-6.q16-3-extra 8:6.9.7.4+dfsg-16ubuntu6.15+esm8
Available with Ubuntu Pro
libmagickcore-6.q16hdri-3 8:6.9.7.4+dfsg-16ubuntu6.15+esm8
Available with Ubuntu Pro
libmagickcore-6.q16hdri-3-extra 8:6.9.7.4+dfsg-16ubuntu6.15+esm8
Available with Ubuntu Pro
libmagickwand-6.q16-3 8:6.9.7.4+dfsg-16ubuntu6.15+esm8
Available with Ubuntu Pro
libmagickwand-6.q16hdri-3 8:6.9.7.4+dfsg-16ubuntu6.15+esm8
Available with Ubuntu Pro
Ubuntu 16.04 LTS
imagemagick-6.q16 8:6.8.9.9-7ubuntu5.16+esm16
Available with Ubuntu Pro
libimage-magick-q16-perl 8:6.8.9.9-7ubuntu5.16+esm16
Available with Ubuntu Pro
libmagick++-6.q16-5v5 8:6.8.9.9-7ubuntu5.16+esm16
Available with Ubuntu Pro
libmagickcore-6-headers 8:6.8.9.9-7ubuntu5.16+esm16
Available with Ubuntu Pro
libmagickcore-6.q16-2 8:6.8.9.9-7ubuntu5.16+esm16
Available with Ubuntu Pro
libmagickcore-6.q16-2-extra 8:6.8.9.9-7ubuntu5.16+esm16
Available with Ubuntu Pro
libmagickwand-6.q16-2 8:6.8.9.9-7ubuntu5.16+esm16
Available with Ubuntu Pro
Ubuntu 14.04 LTS
imagemagick 8:6.7.7.10-6ubuntu3.13+esm17
Available with Ubuntu Pro
imagemagick-common 8:6.7.7.10-6ubuntu3.13+esm17
Available with Ubuntu Pro
libmagick++5 8:6.7.7.10-6ubuntu3.13+esm17
Available with Ubuntu Pro
libmagickcore5 8:6.7.7.10-6ubuntu3.13+esm17
Available with Ubuntu Pro
libmagickcore5-extra 8:6.7.7.10-6ubuntu3.13+esm17
Available with Ubuntu Pro
libmagickwand5 8:6.7.7.10-6ubuntu3.13+esm17
Available with Ubuntu Pro
perlmagick 8:6.7.7.10-6ubuntu3.13+esm17
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-8007-1
CVE-2025-43965, CVE-2025-68618, CVE-2025-69204
[USN-8006-1] MySQL vulnerabilities
==========================================================================
Ubuntu Security Notice USN-8006-1
February 03, 2026
mysql-8.0 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS
Summary:
Several security issues were fixed in MySQL.
Software Description:
- mysql-8.0: MySQL database
Details:
Multiple security issues were discovered in MySQL and this update includes
a new upstream MySQL version to fix these issues.
MySQL has been updated to 8.0.45 in Ubuntu 20.04 LTS.
In addition to security fixes, the updated packages contain bug fixes, new
features, and possibly incompatible changes.
Please see the following for more information:
https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-45.html
https://www.oracle.com/security-alerts/cpujan2026.html
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.04 LTS
mysql-server-8.0 8.0.45-0ubuntu0.20.04.1+esm2
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-8006-1
CVE-2025-53040, CVE-2025-53042, CVE-2025-53044, CVE-2025-53045,
CVE-2025-53053, CVE-2025-53054, CVE-2025-53062, CVE-2025-53069,
CVE-2026-21936, CVE-2026-21937, CVE-2026-21941, CVE-2026-21948,
CVE-2026-21964, CVE-2026-21968
[USN-8011-1] Emacs vulnerabilities
==========================================================================
Ubuntu Security Notice USN-8011-1
February 04, 2026
emacs vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
Summary:
Several security issues were fixed in Emacs.
Software Description:
- emacs: An extensible, customizable, free/libre text editor — and more.
Details:
It was discovered that Emacs could trigger unsafe Lisp macro expansion,
when a user invoked elisp-completion-at-point on untrusted Emacs Lisp
source code. An attacker could possibly use this issue to execute
arbitrary code. (CVE-2024-53920)
It was discovered that Emacs did not properly sanitize input when
handling certain URI schemes. An attacker could possibly use this issue
to execute arbitrary shell commands by tricking a user into opening a
specially crafted URL. (CVE-2025-1244)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
emacs 1:29.3+1-1ubuntu2+esm3
Available with Ubuntu Pro
emacs-bin-common 1:29.3+1-1ubuntu2+esm3
Available with Ubuntu Pro
emacs-common 1:29.3+1-1ubuntu2+esm3
Available with Ubuntu Pro
emacs-el 1:29.3+1-1ubuntu2+esm3
Available with Ubuntu Pro
emacs-gtk 1:29.3+1-1ubuntu2+esm3
Available with Ubuntu Pro
emacs-lucid 1:29.3+1-1ubuntu2+esm3
Available with Ubuntu Pro
emacs-nox 1:29.3+1-1ubuntu2+esm3
Available with Ubuntu Pro
emacs-pgtk 1:29.3+1-1ubuntu2+esm3
Available with Ubuntu Pro
Ubuntu 22.04 LTS
emacs 1:27.1+1-3ubuntu5.2+esm1
Available with Ubuntu Pro
emacs-bin-common 1:27.1+1-3ubuntu5.2+esm1
Available with Ubuntu Pro
emacs-common 1:27.1+1-3ubuntu5.2+esm1
Available with Ubuntu Pro
emacs-el 1:27.1+1-3ubuntu5.2+esm1
Available with Ubuntu Pro
emacs-gtk 1:27.1+1-3ubuntu5.2+esm1
Available with Ubuntu Pro
emacs-lucid 1:27.1+1-3ubuntu5.2+esm1
Available with Ubuntu Pro
emacs-nox 1:27.1+1-3ubuntu5.2+esm1
Available with Ubuntu Pro
Ubuntu 20.04 LTS
emacs 1:26.3+1-1ubuntu2+esm2
Available with Ubuntu Pro
emacs-bin-common 1:26.3+1-1ubuntu2+esm2
Available with Ubuntu Pro
emacs-common 1:26.3+1-1ubuntu2+esm2
Available with Ubuntu Pro
emacs-el 1:26.3+1-1ubuntu2+esm2
Available with Ubuntu Pro
emacs-gtk 1:26.3+1-1ubuntu2+esm2
Available with Ubuntu Pro
emacs-lucid 1:26.3+1-1ubuntu2+esm2
Available with Ubuntu Pro
emacs-nox 1:26.3+1-1ubuntu2+esm2
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-8011-1
CVE-2024-53920, CVE-2025-1244
[USN-8012-1] GitHub CLI vulnerabilities
==========================================================================
Ubuntu Security Notice USN-8012-1
February 04, 2026
gh vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
Summary:
Several security issues were fixed in GitHub CLI.
Software Description:
- gh: GitHub for the terminal
Details:
It was discovered that GitHub CLI could behave unexpectedly if users
downloaded a malicious GitHub Actions workflow artifact through gh run
download. An attacker could possibly use this issue to create or overwrite
files in unintended directories. (CVE-2024-54132)
It was discovered that GitHub CLI could behave unexpectedly when cloning
repositories containing git submodules hosted outside of GitHub.com and
ghe.com. An attacker could possibly use this issue to gather authentication
tokens. (CVE-2024-53858)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
gh 2.45.0-1ubuntu0.3+esm2
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-8012-1
CVE-2024-53858, CVE-2024-54132
[USN-8015-1] Linux kernel vulnerabilities
==========================================================================
Ubuntu Security Notice USN-8015-1
February 04, 2026
linux, linux-gke, linux-gkeop, linux-hwe-6.8, linux-oracle,
linux-oracle-6.8, linux-raspi vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux: Linux kernel
- linux-gke: Linux kernel for Google Container Engine (GKE) systems
- linux-gkeop: Linux kernel for Google Container Engine (GKE) systems
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-raspi: Linux kernel for Raspberry Pi systems
- linux-hwe-6.8: Linux hardware enablement (HWE) kernel
- linux-oracle-6.8: Linux kernel for Oracle Cloud systems
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Cryptographic API;
- SMB network file system;
- io_uring subsystem;
(CVE-2025-38561, CVE-2025-39698, CVE-2025-40019)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
linux-image-6.8.0-1029-gkeop 6.8.0-1029.32
linux-image-6.8.0-1042-gke 6.8.0-1042.47
linux-image-6.8.0-1042-gke-64k 6.8.0-1042.47
linux-image-6.8.0-1042-oracle 6.8.0-1042.43
linux-image-6.8.0-1042-oracle-64k 6.8.0-1042.43
linux-image-6.8.0-1045-raspi 6.8.0-1045.49
linux-image-6.8.0-94-generic 6.8.0-94.96
linux-image-6.8.0-94-generic-64k 6.8.0-94.96
linux-image-generic 6.8.0-94.96
linux-image-generic-6.8 6.8.0-94.96
linux-image-generic-64k 6.8.0-94.96
linux-image-generic-64k-6.8 6.8.0-94.96
linux-image-generic-lpae 6.8.0-94.96
linux-image-gke 6.8.0-1042.47
linux-image-gke-6.8 6.8.0-1042.47
linux-image-gke-64k 6.8.0-1042.47
linux-image-gke-64k-6.8 6.8.0-1042.47
linux-image-gkeop 6.8.0-1029.32
linux-image-gkeop-6.8 6.8.0-1029.32
linux-image-intel-iotg 6.8.0-94.96
linux-image-kvm 6.8.0-94.96
linux-image-oracle-6.8 6.8.0-1042.43
linux-image-oracle-64k-6.8 6.8.0-1042.43
linux-image-oracle-64k-lts-24.04 6.8.0-1042.43
linux-image-oracle-lts-24.04 6.8.0-1042.43
linux-image-raspi 6.8.0-1045.49
linux-image-raspi-6.8 6.8.0-1045.49
linux-image-virtual 6.8.0-94.96
linux-image-virtual-6.8 6.8.0-94.96
Ubuntu 22.04 LTS
linux-image-6.8.0-1042-oracle 6.8.0-1042.43~22.04.1
linux-image-6.8.0-1042-oracle-64k 6.8.0-1042.43~22.04.1
linux-image-6.8.0-94-generic 6.8.0-94.96~22.04.1
linux-image-6.8.0-94-generic-64k 6.8.0-94.96~22.04.1
linux-image-generic-6.8 6.8.0-94.96~22.04.1
linux-image-generic-64k-6.8 6.8.0-94.96~22.04.1
linux-image-generic-64k-hwe-22.04 6.8.0-94.96~22.04.1
linux-image-generic-hwe-22.04 6.8.0-94.96~22.04.1
linux-image-oem-22.04 6.8.0-94.96~22.04.1
linux-image-oem-22.04a 6.8.0-94.96~22.04.1
linux-image-oem-22.04b 6.8.0-94.96~22.04.1
linux-image-oem-22.04c 6.8.0-94.96~22.04.1
linux-image-oem-22.04d 6.8.0-94.96~22.04.1
linux-image-oracle 6.8.0-1042.43~22.04.1
linux-image-oracle-6.8 6.8.0-1042.43~22.04.1
linux-image-oracle-64k 6.8.0-1042.43~22.04.1
linux-image-oracle-64k-6.8 6.8.0-1042.43~22.04.1
linux-image-virtual-6.8 6.8.0-94.96~22.04.1
linux-image-virtual-hwe-22.04 6.8.0-94.96~22.04.1
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-8015-1
CVE-2025-38561, CVE-2025-39698, CVE-2025-40019
Package Information:
https://launchpad.net/ubuntu/+source/linux/6.8.0-94.96
https://launchpad.net/ubuntu/+source/linux-gke/6.8.0-1042.47
https://launchpad.net/ubuntu/+source/linux-gkeop/6.8.0-1029.32
https://launchpad.net/ubuntu/+source/linux-oracle/6.8.0-1042.43
https://launchpad.net/ubuntu/+source/linux-raspi/6.8.0-1045.49
https://launchpad.net/ubuntu/+source/linux-hwe-6.8/6.8.0-94.96~22.04.1
https://launchpad.net/ubuntu/+source/linux-oracle-6.8/6.8.0-1042.43~22.04.1
[USN-8014-1] Linux kernel vulnerabilities
==========================================================================
Ubuntu Security Notice USN-8014-1
February 04, 2026
linux, linux-aws, linux-azure, linux-gcp, linux-oem-6.17, linux-oracle,
linux-raspi, linux-realtime vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 25.10
- Ubuntu 24.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-azure: Linux kernel for Microsoft Azure Cloud systems
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-raspi: Linux kernel for Raspberry Pi systems
- linux-realtime: Linux kernel for Real-time systems
- linux-oem-6.17: Linux kernel for OEM systems
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Cryptographic API;
- Unix domain sockets;
(CVE-2025-40019, CVE-2025-40214)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 25.10
linux-image-6.17.0-1005-realtime 6.17.0-1005.6
linux-image-6.17.0-1006-aws 6.17.0-1006.6
linux-image-6.17.0-1006-aws-64k 6.17.0-1006.6
linux-image-6.17.0-1006-gcp 6.17.0-1006.6
linux-image-6.17.0-1006-gcp-64k 6.17.0-1006.6
linux-image-6.17.0-1006-oracle 6.17.0-1006.6
linux-image-6.17.0-1006-oracle-64k 6.17.0-1006.6
linux-image-6.17.0-1007-azure 6.17.0-1007.7
linux-image-6.17.0-1007-raspi 6.17.0-1007.7
linux-image-6.17.0-12-generic 6.17.0-12.12
linux-image-6.17.0-12-generic-64k 6.17.0-12.12
linux-image-aws 6.17.0-1006.6
linux-image-aws-6.17 6.17.0-1006.6
linux-image-aws-64k 6.17.0-1006.6
linux-image-aws-64k-6.17 6.17.0-1006.6
linux-image-azure 6.17.0-1007.7
linux-image-azure-6.17 6.17.0-1007.7
linux-image-gcp 6.17.0-1006.6
linux-image-gcp-6.17 6.17.0-1006.6
linux-image-gcp-64k 6.17.0-1006.6
linux-image-gcp-64k-6.17 6.17.0-1006.6
linux-image-generic 6.17.0-12.12
linux-image-generic-6.17 6.17.0-12.12
linux-image-generic-64k 6.17.0-12.12
linux-image-generic-64k-6.17 6.17.0-12.12
linux-image-oracle 6.17.0-1006.6
linux-image-oracle-6.17 6.17.0-1006.6
linux-image-oracle-64k 6.17.0-1006.6
linux-image-oracle-64k-6.17 6.17.0-1006.6
linux-image-raspi 6.17.0-1007.7
linux-image-raspi-6.17 6.17.0-1007.7
linux-image-realtime 6.17.0-1005.6
linux-image-realtime-6.17 6.17.0-1005.6
linux-image-virtual 6.17.0-12.12
linux-image-virtual-6.17 6.17.0-12.12
Ubuntu 24.04 LTS
linux-image-6.17.0-1010-oem 6.17.0-1010.10
linux-image-oem-24.04d 6.17.0-1010.10
linux-image-oem-6.17 6.17.0-1010.10
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-8014-1
CVE-2025-40019, CVE-2025-40214
Package Information:
https://launchpad.net/ubuntu/+source/linux/6.17.0-12.12
https://launchpad.net/ubuntu/+source/linux-aws/6.17.0-1006.6
https://launchpad.net/ubuntu/+source/linux-azure/6.17.0-1007.7
https://launchpad.net/ubuntu/+source/linux-gcp/6.17.0-1006.6
https://launchpad.net/ubuntu/+source/linux-oracle/6.17.0-1006.6
https://launchpad.net/ubuntu/+source/linux-raspi/6.17.0-1007.7
https://launchpad.net/ubuntu/+source/linux-realtime/6.17.0-1005.6
https://launchpad.net/ubuntu/+source/linux-oem-6.17/6.17.0-1010.10
[USN-8013-1] Linux kernel vulnerabilities
==========================================================================
Ubuntu Security Notice USN-8013-1
February 04, 2026
linux, linux-aws, linux-azure, linux-azure-5.15, linux-gcp, linux-gke,
linux-gkeop, linux-hwe-5.15, linux-ibm, linux-ibm-5.15, linux-intel-iotg,
linux-intel-iotg-5.15, linux-kvm, linux-lowlatency,
linux-lowlatency-hwe-5.15, linux-nvidia, linux-nvidia-tegra,
linux-nvidia-tegra-5.15, linux-oracle, linux-raspi vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-azure: Linux kernel for Microsoft Azure Cloud systems
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-gke: Linux kernel for Google Container Engine (GKE) systems
- linux-gkeop: Linux kernel for Google Container Engine (GKE) systems
- linux-ibm: Linux kernel for IBM cloud systems
- linux-intel-iotg: Linux kernel for Intel IoT platforms
- linux-kvm: Linux kernel for cloud environments
- linux-lowlatency: Linux low latency kernel
- linux-nvidia: Linux kernel for NVIDIA systems
- linux-nvidia-tegra: Linux kernel for NVIDIA Tegra systems
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-raspi: Linux kernel for Raspberry Pi systems
- linux-azure-5.15: Linux kernel for Microsoft Azure cloud systems
- linux-hwe-5.15: Linux hardware enablement (HWE) kernel
- linux-ibm-5.15: Linux kernel for IBM cloud systems
- linux-intel-iotg-5.15: Linux kernel for Intel IoT platforms
- linux-lowlatency-hwe-5.15: Linux low latency kernel
- linux-nvidia-tegra-5.15: Linux kernel for NVIDIA Tegra systems
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Cryptographic API;
- SMB network file system;
(CVE-2025-38561, CVE-2025-40019)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS
linux-image-5.15.0-1051-nvidia-tegra 5.15.0-1051.51
linux-image-5.15.0-1051-nvidia-tegra-rt 5.15.0-1051.51
linux-image-5.15.0-1082-gkeop 5.15.0-1082.90
linux-image-5.15.0-1091-kvm 5.15.0-1091.96
linux-image-5.15.0-1093-ibm 5.15.0-1093.96
linux-image-5.15.0-1093-raspi 5.15.0-1093.96
linux-image-5.15.0-1094-intel-iotg 5.15.0-1094.100
linux-image-5.15.0-1094-nvidia 5.15.0-1094.95
linux-image-5.15.0-1094-nvidia-lowlatency 5.15.0-1094.95
linux-image-5.15.0-1095-gke 5.15.0-1095.101
linux-image-5.15.0-1096-oracle 5.15.0-1096.102
linux-image-5.15.0-1099-aws 5.15.0-1099.106
linux-image-5.15.0-1099-aws-64k 5.15.0-1099.106
linux-image-5.15.0-1099-gcp 5.15.0-1099.108
linux-image-5.15.0-1103-azure 5.15.0-1103.112
linux-image-5.15.0-168-generic 5.15.0-168.178
linux-image-5.15.0-168-generic-64k 5.15.0-168.178
linux-image-5.15.0-168-generic-lpae 5.15.0-168.178
linux-image-5.15.0-168-lowlatency 5.15.0-168.178
linux-image-5.15.0-168-lowlatency-64k 5.15.0-168.178
linux-image-aws-5.15 5.15.0.1099.102
linux-image-aws-64k-5.15 5.15.0.1099.102
linux-image-aws-64k-lts-22.04 5.15.0.1099.102
linux-image-aws-lts-22.04 5.15.0.1099.102
linux-image-azure-5.15 5.15.0.1103.101
linux-image-azure-lts-22.04 5.15.0.1103.101
linux-image-gcp-5.15 5.15.0.1099.95
linux-image-gcp-lts-22.04 5.15.0.1099.95
linux-image-generic 5.15.0.168.159
linux-image-generic-5.15 5.15.0.168.159
linux-image-generic-64k 5.15.0.168.159
linux-image-generic-64k-5.15 5.15.0.168.159
linux-image-generic-lpae 5.15.0.168.159
linux-image-generic-lpae-5.15 5.15.0.168.159
linux-image-gke 5.15.0.1095.94
linux-image-gke-5.15 5.15.0.1095.94
linux-image-gkeop 5.15.0.1082.81
linux-image-gkeop-5.15 5.15.0.1082.81
linux-image-ibm 5.15.0.1093.89
linux-image-ibm-5.15 5.15.0.1093.89
linux-image-intel-iotg 5.15.0.1094.94
linux-image-intel-iotg-5.15 5.15.0.1094.94
linux-image-kvm 5.15.0.1091.87
linux-image-kvm-5.15 5.15.0.1091.87
linux-image-lowlatency 5.15.0.168.142
linux-image-lowlatency-5.15 5.15.0.168.142
linux-image-lowlatency-64k 5.15.0.168.142
linux-image-lowlatency-64k-5.15 5.15.0.168.142
linux-image-nvidia 5.15.0.1094.94
linux-image-nvidia-5.15 5.15.0.1094.94
linux-image-nvidia-lowlatency 5.15.0.1094.94
linux-image-nvidia-lowlatency-5.15 5.15.0.1094.94
linux-image-nvidia-tegra 5.15.0.1051.51
linux-image-nvidia-tegra-5.15 5.15.0.1051.51
linux-image-nvidia-tegra-rt 5.15.0.1051.51
linux-image-nvidia-tegra-rt-5.15 5.15.0.1051.51
linux-image-oracle-5.15 5.15.0.1096.92
linux-image-oracle-lts-22.04 5.15.0.1096.92
linux-image-raspi 5.15.0.1093.91
linux-image-raspi-5.15 5.15.0.1093.91
linux-image-raspi-nolpae 5.15.0.1093.91
linux-image-virtual 5.15.0.168.159
linux-image-virtual-5.15 5.15.0.168.159
Ubuntu 20.04 LTS
linux-image-5.15.0-1051-nvidia-tegra 5.15.0-1051.51~20.04.1
Available with Ubuntu Pro
linux-image-5.15.0-1051-nvidia-tegra-rt 5.15.0-1051.51~20.04.1
Available with Ubuntu Pro
linux-image-5.15.0-1093-ibm 5.15.0-1093.96~20.04.1
Available with Ubuntu Pro
linux-image-5.15.0-1094-intel-iotg 5.15.0-1094.100~20.04.1
Available with Ubuntu Pro
linux-image-5.15.0-1103-azure 5.15.0-1103.112~20.04.1
Available with Ubuntu Pro
linux-image-5.15.0-168-generic 5.15.0-168.178~20.04.1
Available with Ubuntu Pro
linux-image-5.15.0-168-generic-64k 5.15.0-168.178~20.04.1
Available with Ubuntu Pro
linux-image-5.15.0-168-generic-lpae 5.15.0-168.178~20.04.1
Available with Ubuntu Pro
linux-image-5.15.0-168-lowlatency 5.15.0-168.178~20.04.1
Available with Ubuntu Pro
linux-image-5.15.0-168-lowlatency-64k 5.15.0-168.178~20.04.1
Available with Ubuntu Pro
linux-image-azure 5.15.0.1103.112~20.04.1
Available with Ubuntu Pro
linux-image-azure-5.15 5.15.0.1103.112~20.04.1
Available with Ubuntu Pro
linux-image-azure-cvm 5.15.0.1103.112~20.04.1
Available with Ubuntu Pro
linux-image-generic-5.15 5.15.0.168.178~20.04.1
Available with Ubuntu Pro
linux-image-generic-64k-5.15 5.15.0.168.178~20.04.1
Available with Ubuntu Pro
linux-image-generic-64k-hwe-20.04 5.15.0.168.178~20.04.1
Available with Ubuntu Pro
linux-image-generic-hwe-20.04 5.15.0.168.178~20.04.1
Available with Ubuntu Pro
linux-image-generic-lpae-5.15 5.15.0.168.178~20.04.1
Available with Ubuntu Pro
linux-image-generic-lpae-hwe-20.04 5.15.0.168.178~20.04.1
Available with Ubuntu Pro
linux-image-ibm 5.15.0.1093.96~20.04.1
Available with Ubuntu Pro
linux-image-ibm-5.15 5.15.0.1093.96~20.04.1
Available with Ubuntu Pro
linux-image-intel 5.15.0.1094.100~20.04.1
Available with Ubuntu Pro
linux-image-intel-iotg 5.15.0.1094.100~20.04.1
Available with Ubuntu Pro
linux-image-intel-iotg-5.15 5.15.0.1094.100~20.04.1
Available with Ubuntu Pro
linux-image-lowlatency-5.15 5.15.0.168.178~20.04.1
Available with Ubuntu Pro
linux-image-lowlatency-64k-5.15 5.15.0.168.178~20.04.1
Available with Ubuntu Pro
linux-image-lowlatency-64k-hwe-20.04 5.15.0.168.178~20.04.1
Available with Ubuntu Pro
linux-image-lowlatency-hwe-20.04 5.15.0.168.178~20.04.1
Available with Ubuntu Pro
linux-image-nvidia-tegra 5.15.0.1051.51~20.04.1
Available with Ubuntu Pro
linux-image-nvidia-tegra-5.15 5.15.0.1051.51~20.04.1
Available with Ubuntu Pro
linux-image-nvidia-tegra-rt 5.15.0.1051.51~20.04.1
Available with Ubuntu Pro
linux-image-nvidia-tegra-rt-5.15 5.15.0.1051.51~20.04.1
Available with Ubuntu Pro
linux-image-oem-20.04 5.15.0.168.178~20.04.1
Available with Ubuntu Pro
linux-image-oem-20.04b 5.15.0.168.178~20.04.1
Available with Ubuntu Pro
linux-image-oem-20.04c 5.15.0.168.178~20.04.1
Available with Ubuntu Pro
linux-image-oem-20.04d 5.15.0.168.178~20.04.1
Available with Ubuntu Pro
linux-image-virtual-5.15 5.15.0.168.178~20.04.1
Available with Ubuntu Pro
linux-image-virtual-hwe-20.04 5.15.0.168.178~20.04.1
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-8013-1
CVE-2025-38561, CVE-2025-40019
Package Information:
https://launchpad.net/ubuntu/+source/linux/5.15.0-168.178
https://launchpad.net/ubuntu/+source/linux-aws/5.15.0-1099.106
https://launchpad.net/ubuntu/+source/linux-azure/5.15.0-1103.112
https://launchpad.net/ubuntu/+source/linux-gcp/5.15.0-1099.108
https://launchpad.net/ubuntu/+source/linux-gke/5.15.0-1095.101
https://launchpad.net/ubuntu/+source/linux-gkeop/5.15.0-1082.90
https://launchpad.net/ubuntu/+source/linux-ibm/5.15.0-1093.96
https://launchpad.net/ubuntu/+source/linux-intel-iotg/5.15.0-1094.100
https://launchpad.net/ubuntu/+source/linux-kvm/5.15.0-1091.96
https://launchpad.net/ubuntu/+source/linux-lowlatency/5.15.0-168.178
https://launchpad.net/ubuntu/+source/linux-nvidia/5.15.0-1094.95
https://launchpad.net/ubuntu/+source/linux-nvidia-tegra/5.15.0-1051.51
https://launchpad.net/ubuntu/+source/linux-oracle/5.15.0-1096.102
https://launchpad.net/ubuntu/+source/linux-raspi/5.15.0-1093.96
[USN-8016-1] Linux kernel (NVIDIA) vulnerabilities
==========================================================================
Ubuntu Security Notice USN-8016-1
February 04, 2026
linux-nvidia, linux-nvidia-6.8, linux-nvidia-lowlatency vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-nvidia: Linux kernel for NVIDIA systems
- linux-nvidia-lowlatency: Linux low latency kernel for NVIDIA systems
- linux-nvidia-6.8: Linux kernel for NVIDIA systems
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Cryptographic API;
- SPI subsystem;
- SMB network file system;
- io_uring subsystem;
(CVE-2025-38561, CVE-2025-39698, CVE-2025-40019, CVE-2025-68746)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
linux-image-6.8.0-1045-nvidia 6.8.0-1045.48
linux-image-6.8.0-1045-nvidia-64k 6.8.0-1045.48
linux-image-6.8.0-1045-nvidia-lowlatency 6.8.0-1045.48.1
linux-image-6.8.0-1045-nvidia-lowlatency-64k 6.8.0-1045.48.1
linux-image-nvidia 6.8.0-1045.48
linux-image-nvidia-6.8 6.8.0-1045.48
linux-image-nvidia-64k 6.8.0-1045.48
linux-image-nvidia-64k-6.8 6.8.0-1045.48
linux-image-nvidia-lowlatency 6.8.0-1045.48.1
linux-image-nvidia-lowlatency-6.8 6.8.0-1045.48.1
linux-image-nvidia-lowlatency-64k 6.8.0-1045.48.1
linux-image-nvidia-lowlatency-64k-6.8 6.8.0-1045.48.1
Ubuntu 22.04 LTS
linux-image-6.8.0-1045-nvidia 6.8.0-1045.48~22.04.1
linux-image-6.8.0-1045-nvidia-64k 6.8.0-1045.48~22.04.1
linux-image-nvidia-6.8 6.8.0-1045.48~22.04.1
linux-image-nvidia-64k-6.8 6.8.0-1045.48~22.04.1
linux-image-nvidia-64k-hwe-22.04 6.8.0-1045.48~22.04.1
linux-image-nvidia-hwe-22.04 6.8.0-1045.48~22.04.1
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-8016-1
CVE-2025-38561, CVE-2025-39698, CVE-2025-40019, CVE-2025-68746
Package Information:
https://launchpad.net/ubuntu/+source/linux-nvidia/6.8.0-1045.48
https://launchpad.net/ubuntu/+source/linux-nvidia-lowlatency/6.8.0-1045.48.1
https://launchpad.net/ubuntu/+source/linux-nvidia-6.8/6.8.0-1045.48~22.04.1
[USN-8015-2] Linux kernel (Real-time) vulnerabilities
==========================================================================
Ubuntu Security Notice USN-8015-2
February 04, 2026
linux-realtime, linux-realtime-6.8, linux-raspi-realtime vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-raspi-realtime: Linux kernel for Raspberry Pi Real-time systems
- linux-realtime: Linux kernel for Real-time systems
- linux-realtime-6.8: Linux kernel for Real-time systems
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Cryptographic API;
- SMB network file system;
- io_uring subsystem;
(CVE-2025-38561, CVE-2025-39698, CVE-2025-40019)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
linux-image-6.8.0-2036-raspi-realtime 6.8.0-2036.37
Available with Ubuntu Pro
linux-image-6.8.1-1040-realtime 6.8.1-1040.41
Available with Ubuntu Pro
linux-image-intel-iot-realtime 6.8.1-1040.41
Available with Ubuntu Pro
linux-image-raspi-realtime 6.8.0-2036.37
Available with Ubuntu Pro
linux-image-raspi-realtime-6.8 6.8.0-2036.37
Available with Ubuntu Pro
linux-image-realtime 6.8.1-1040.41
Available with Ubuntu Pro
linux-image-realtime-6.8.1 6.8.1-1040.41
Available with Ubuntu Pro
Ubuntu 22.04 LTS
linux-image-6.8.1-1040-realtime 6.8.1-1040.41~22.04.1
Available with Ubuntu Pro
linux-image-realtime-6.8.1 6.8.1-1040.41~22.04.1
Available with Ubuntu Pro
linux-image-realtime-hwe-22.04 6.8.1-1040.41~22.04.1
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-8015-2
https://ubuntu.com/security/notices/USN-8015-1
CVE-2025-38561, CVE-2025-39698, CVE-2025-40019
Package Information:
https://launchpad.net/ubuntu/+source/linux-raspi-realtime/6.8.0-2036.37
https://launchpad.net/ubuntu/+source/linux-realtime/6.8.1-1040.41
https://launchpad.net/ubuntu/+source/linux-realtime-6.8/6.8.1-1040.41~22.04.1
[USN-8013-3] Linux kernel (Real-time) vulnerabilities
==========================================================================
Ubuntu Security Notice USN-8013-3
February 04, 2026
linux-realtime, linux-intel-iot-realtime vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-intel-iot-realtime: Linux kernel for Intel IoT Real-time platforms
- linux-realtime: Linux kernel for Real-time systems
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Cryptographic API;
- SMB network file system;
(CVE-2025-38561, CVE-2025-40019)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS
linux-image-5.15.0-1091-intel-iot-realtime 5.15.0-1091.93
Available with Ubuntu Pro
linux-image-5.15.0-1098-realtime 5.15.0-1098.107
Available with Ubuntu Pro
linux-image-intel-iot-realtime 5.15.0.1091.95
Available with Ubuntu Pro
linux-image-intel-iot-realtime-5.15 5.15.0.1091.95
Available with Ubuntu Pro
linux-image-realtime 5.15.0.1098.102
Available with Ubuntu Pro
linux-image-realtime-5.15 5.15.0.1098.102
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-8013-3
https://ubuntu.com/security/notices/USN-8013-2
https://ubuntu.com/security/notices/USN-8013-1
CVE-2025-38561, CVE-2025-40019
Package Information:
https://launchpad.net/ubuntu/+source/linux-intel-iot-realtime/5.15.0-1091.93
https://launchpad.net/ubuntu/+source/linux-realtime/5.15.0-1098.107
[USN-8013-2] Linux kernel (FIPS) vulnerabilities
==========================================================================
Ubuntu Security Notice USN-8013-2
February 04, 2026
linux-fips, linux-aws-fips, linux-azure-fips, linux-gcp-fips
vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-aws-fips: Linux kernel for Amazon Web Services (AWS) systems with FIPS
- linux-azure-fips: Linux kernel for Microsoft Azure Cloud systems with FIPS
- linux-fips: Linux kernel with FIPS
- linux-gcp-fips: Linux kernel for Google Cloud Platform (GCP) systems with
FIPS
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Cryptographic API;
- SMB network file system;
(CVE-2025-38561, CVE-2025-40019)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS
linux-image-5.15.0-1099-aws-fips 5.15.0-1099.106+fips1
Available with Ubuntu Pro
linux-image-5.15.0-1099-gcp-fips 5.15.0-1099.108+fips1
Available with Ubuntu Pro
linux-image-5.15.0-1103-azure-fips 5.15.0-1103.112+fips1
Available with Ubuntu Pro
linux-image-5.15.0-168-fips 5.15.0-168.178+fips1
Available with Ubuntu Pro
linux-image-aws-fips 5.15.0.1099.95
Available with Ubuntu Pro
linux-image-aws-fips-5.15 5.15.0.1099.95
Available with Ubuntu Pro
linux-image-azure-fips 5.15.0.1103.88
Available with Ubuntu Pro
linux-image-azure-fips-5.15 5.15.0.1103.88
Available with Ubuntu Pro
linux-image-fips 5.15.0.168.96
Available with Ubuntu Pro
linux-image-fips-5.15 5.15.0.168.96
Available with Ubuntu Pro
linux-image-gcp-fips 5.15.0.1099.89
Available with Ubuntu Pro
linux-image-gcp-fips-5.15 5.15.0.1099.89
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-8013-2
https://ubuntu.com/security/notices/USN-8013-1
CVE-2025-38561, CVE-2025-40019
Package Information:
https://launchpad.net/ubuntu/+source/linux-aws-fips/5.15.0-1099.106+fips1
https://launchpad.net/ubuntu/+source/linux-azure-fips/5.15.0-1103.112+fips1
https://launchpad.net/ubuntu/+source/linux-fips/5.15.0-168.178+fips1
https://launchpad.net/ubuntu/+source/linux-gcp-fips/5.15.0-1099.108+fips1