Ubuntu 7049 Published by

Ubuntu Linux has issued several security updates aimed at resolving critical vulnerabilities across multiple packages. Critical fixes are required for the Linux kernel used in Azure environments alongside popular tools like Vim and Rust. Users must also patch RetroArch, kvmtool, xdg-dbus-proxy, and Corosync to prevent potential exploitation of these flaws.

[USN-8166-1] RetroArch vulnerability
[USN-8171-1] Vim vulnerabilities
[USN-8163-2] Linux kernel (Azure) vulnerabilities
[USN-8148-6] Linux kernel (Azure) vulnerabilities
[USN-8149-3] Linux kernel (Azure) vulnerabilities
[USN-8172-1] kvmtool vulnerabilities
[USN-8168-1] Rust vulnerability
[LSN-0119-1] Linux kernel vulnerability
[USN-8167-1] xdg-dbus-proxy vulnerability
[USN-8170-1] Corosync vulnerabilities




[USN-8166-1] RetroArch vulnerability


==========================================================================
Ubuntu Security Notice USN-8166-1
April 12, 2026

retroarch vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.10
- Ubuntu 24.04 LTS

Summary:

RetroArch could be made to crash or run programs as your login if it opened
a specially crafted file.

Software Description:
- retroarch: A frontend for emulators, game engines and media players

Details:

It was discovered that RetroArch did not correctly handle certain memory
operations, which could lead to a buffer overflow. If a user or automated
system were tricked into opening a specially crafted file, an attacker
could possibly use this issue to cause a denial of service or execute
arbitrary code. This issue only affected Ubuntu 24.04 LTS and Ubuntu 25.10.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.10
retroarch 1.20.0+dfsg-3ubuntu0.1
retroarch-dev 1.20.0+dfsg-3ubuntu0.1

Ubuntu 24.04 LTS
retroarch 1.18.0+dfsg-1ubuntu0.1~esm1
Available with Ubuntu Pro
retroarch-dev 1.18.0+dfsg-1ubuntu0.1~esm1
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8166-1
CVE-2025-9809

Package Information:
https://launchpad.net/ubuntu/+source/retroarch/1.20.0+dfsg-3ubuntu0.1



[USN-8171-1] Vim vulnerabilities


==========================================================================
Ubuntu Security Notice USN-8171-1
April 13, 2026

vim vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in Vim.

Software Description:
- vim: Vi IMproved - enhanced vi editor

Details:

Nathan Mills discovered that Vim could crash when parsing certain regular
expressions. An attacker could possibly use this issue to cause a denial of
service. This issue only affected Ubuntu 24.04 LTS and Ubuntu 25.10
(CVE-2026-32249)

It was discovered that Vim did not properly sanitize user input. An
attacker could possibly use this issue to execute arbitrary commands.
(CVE-2026-33412)

Avishay Matayev discovered that Vim's modeline sandbox could be bypassed
when opening a maliciously-crafted file. An attacker could possibly use
this issue to execute arbitrary commands. This issue only affected Ubuntu
20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, and Ubuntu 25.10.
(CVE-2026-34982)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.10
vim 2:9.1.0967-1ubuntu6.2
vim-athena 2:9.1.0967-1ubuntu6.2
vim-common 2:9.1.0967-1ubuntu6.2
vim-gtk3 2:9.1.0967-1ubuntu6.2
vim-gui-common 2:9.1.0967-1ubuntu6.2
vim-motif 2:9.1.0967-1ubuntu6.2
vim-nox 2:9.1.0967-1ubuntu6.2
vim-runtime 2:9.1.0967-1ubuntu6.2
vim-tiny 2:9.1.0967-1ubuntu6.2
xxd 2:9.1.0967-1ubuntu6.2

Ubuntu 24.04 LTS
vim 2:9.1.0016-1ubuntu7.11
vim-athena 2:9.1.0016-1ubuntu7.11
vim-common 2:9.1.0016-1ubuntu7.11
vim-gtk3 2:9.1.0016-1ubuntu7.11
vim-gui-common 2:9.1.0016-1ubuntu7.11
vim-motif 2:9.1.0016-1ubuntu7.11
vim-nox 2:9.1.0016-1ubuntu7.11
vim-runtime 2:9.1.0016-1ubuntu7.11
vim-tiny 2:9.1.0016-1ubuntu7.11
xxd 2:9.1.0016-1ubuntu7.11

Ubuntu 22.04 LTS
vim 2:8.2.3995-1ubuntu2.27
vim-athena 2:8.2.3995-1ubuntu2.27
vim-common 2:8.2.3995-1ubuntu2.27
vim-gtk 2:8.2.3995-1ubuntu2.27
vim-gtk3 2:8.2.3995-1ubuntu2.27
vim-gui-common 2:8.2.3995-1ubuntu2.27
vim-nox 2:8.2.3995-1ubuntu2.27
vim-runtime 2:8.2.3995-1ubuntu2.27
vim-tiny 2:8.2.3995-1ubuntu2.27
xxd 2:8.2.3995-1ubuntu2.27

Ubuntu 20.04 LTS
vim 2:8.1.2269-1ubuntu5.32+esm3
Available with Ubuntu Pro
vim-athena 2:8.1.2269-1ubuntu5.32+esm3
Available with Ubuntu Pro
vim-common 2:8.1.2269-1ubuntu5.32+esm3
Available with Ubuntu Pro
vim-gtk 2:8.1.2269-1ubuntu5.32+esm3
Available with Ubuntu Pro
vim-gtk3 2:8.1.2269-1ubuntu5.32+esm3
Available with Ubuntu Pro
vim-gui-common 2:8.1.2269-1ubuntu5.32+esm3
Available with Ubuntu Pro
vim-nox 2:8.1.2269-1ubuntu5.32+esm3
Available with Ubuntu Pro
vim-runtime 2:8.1.2269-1ubuntu5.32+esm3
Available with Ubuntu Pro
vim-tiny 2:8.1.2269-1ubuntu5.32+esm3
Available with Ubuntu Pro
xxd 2:8.1.2269-1ubuntu5.32+esm3
Available with Ubuntu Pro

Ubuntu 18.04 LTS
vim 2:8.0.1453-1ubuntu1.13+esm15
Available with Ubuntu Pro
vim-athena 2:8.0.1453-1ubuntu1.13+esm15
Available with Ubuntu Pro
vim-common 2:8.0.1453-1ubuntu1.13+esm15
Available with Ubuntu Pro
vim-gnome 2:8.0.1453-1ubuntu1.13+esm15
Available with Ubuntu Pro
vim-gtk 2:8.0.1453-1ubuntu1.13+esm15
Available with Ubuntu Pro
vim-gtk3 2:8.0.1453-1ubuntu1.13+esm15
Available with Ubuntu Pro
vim-gui-common 2:8.0.1453-1ubuntu1.13+esm15
Available with Ubuntu Pro
vim-nox 2:8.0.1453-1ubuntu1.13+esm15
Available with Ubuntu Pro
vim-runtime 2:8.0.1453-1ubuntu1.13+esm15
Available with Ubuntu Pro
vim-tiny 2:8.0.1453-1ubuntu1.13+esm15
Available with Ubuntu Pro
xxd 2:8.0.1453-1ubuntu1.13+esm15
Available with Ubuntu Pro

Ubuntu 16.04 LTS
vim 2:7.4.1689-3ubuntu1.5+esm30
Available with Ubuntu Pro
vim-athena 2:7.4.1689-3ubuntu1.5+esm30
Available with Ubuntu Pro
vim-athena-py2 2:7.4.1689-3ubuntu1.5+esm30
Available with Ubuntu Pro
vim-common 2:7.4.1689-3ubuntu1.5+esm30
Available with Ubuntu Pro
vim-gnome 2:7.4.1689-3ubuntu1.5+esm30
Available with Ubuntu Pro
vim-gnome-py2 2:7.4.1689-3ubuntu1.5+esm30
Available with Ubuntu Pro
vim-gtk 2:7.4.1689-3ubuntu1.5+esm30
Available with Ubuntu Pro
vim-gtk-py2 2:7.4.1689-3ubuntu1.5+esm30
Available with Ubuntu Pro
vim-gtk3 2:7.4.1689-3ubuntu1.5+esm30
Available with Ubuntu Pro
vim-gtk3-py2 2:7.4.1689-3ubuntu1.5+esm30
Available with Ubuntu Pro
vim-gui-common 2:7.4.1689-3ubuntu1.5+esm30
Available with Ubuntu Pro
vim-nox 2:7.4.1689-3ubuntu1.5+esm30
Available with Ubuntu Pro
vim-nox-py2 2:7.4.1689-3ubuntu1.5+esm30
Available with Ubuntu Pro
vim-runtime 2:7.4.1689-3ubuntu1.5+esm30
Available with Ubuntu Pro
vim-tiny 2:7.4.1689-3ubuntu1.5+esm30
Available with Ubuntu Pro

Ubuntu 14.04 LTS
vim 2:7.4.052-1ubuntu3.1+esm24
Available with Ubuntu Pro
vim-athena 2:7.4.052-1ubuntu3.1+esm24
Available with Ubuntu Pro
vim-common 2:7.4.052-1ubuntu3.1+esm24
Available with Ubuntu Pro
vim-gnome 2:7.4.052-1ubuntu3.1+esm24
Available with Ubuntu Pro
vim-gtk 2:7.4.052-1ubuntu3.1+esm24
Available with Ubuntu Pro
vim-gui-common 2:7.4.052-1ubuntu3.1+esm24
Available with Ubuntu Pro
vim-lesstif 2:7.4.052-1ubuntu3.1+esm24
Available with Ubuntu Pro
vim-nox 2:7.4.052-1ubuntu3.1+esm24
Available with Ubuntu Pro
vim-runtime 2:7.4.052-1ubuntu3.1+esm24
Available with Ubuntu Pro
vim-tiny 2:7.4.052-1ubuntu3.1+esm24
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8171-1
CVE-2026-32249, CVE-2026-33412, CVE-2026-34982

Package Information:
https://launchpad.net/ubuntu/+source/vim/2:9.1.0967-1ubuntu6.2
https://launchpad.net/ubuntu/+source/vim/2:9.1.0016-1ubuntu7.11
https://launchpad.net/ubuntu/+source/vim/2:8.2.3995-1ubuntu2.27



[USN-8163-2] Linux kernel (Azure) vulnerabilities


==========================================================================
Ubuntu Security Notice USN-8163-2
April 13, 2026

linux-azure vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-azure: Linux kernel for Microsoft Azure Cloud systems

Details:

Qualys discovered that several vulnerabilities existed in the AppArmor
Linux kernel Security Module (LSM). An unprivileged local attacker could
use these issues to load, replace, and remove arbitrary AppArmor profiles
causing denial of service, exposure of sensitive information (kernel
memory), local privilege escalation, or possibly escape a container.
(LP: #2143853, CVE-2026-23268, CVE-2026-23269, CVE-2026-23403,
CVE-2026-23404, CVE-2026-23405, CVE-2026-23406, CVE-2026-23407,
CVE-2026-23408, CVE-2026-23409, CVE-2026-23410, CVE-2026-23411)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
- Nios II architecture;
- PowerPC architecture;
- Sun Sparc architecture;
- User-Mode Linux (UML);
- x86 architecture;
- Block layer subsystem;
- Cryptographic API;
- ACPI drivers;
- ATM drivers;
- Drivers core;
- Network block device driver;
- Bluetooth drivers;
- Bus devices;
- Character device driver;
- Hardware random number generator core;
- TPM device driver;
- Data acquisition framework and drivers;
- Counter interface drivers;
- CPU frequency scaling framework;
- DMA engine subsystem;
- Intel Stratix 10 firmware drivers;
- GPU drivers;
- HID subsystem;
- Hardware monitoring drivers;
- CoreSight HW tracing drivers;
- IIO subsystem;
- InfiniBand drivers;
- Input Device core drivers;
- Input Device (Miscellaneous) drivers;
- Input Device (Tablet) drivers;
- ISDN/mISDN subsystem;
- Macintosh device drivers;
- Multiple devices driver;
- Media drivers;
- MOST (Media Oriented Systems Transport) drivers;
- MTD block device drivers;
- Network drivers;
- Mellanox network drivers;
- Texas Instruments network drivers;
- Ethernet team driver;
- MediaTek network drivers;
- NVME drivers;
- PA-RISC drivers;
- PCI subsystem;
- Performance monitor drivers;
- Pin controllers subsystem;
- Chrome hardware platform drivers;
- x86 platform drivers;
- ARM PM domains;
- PPS (Pulse Per Second) driver;
- PWM drivers;
- Voltage and Current Regulator drivers;
- S/390 drivers;
- SCSI subsystem;
- Texas Instruments SoC drivers;
- SPI subsystem;
- Realtek RTL8723BS SDIO drivers;
- TCM subsystem;
- Userspace I/O drivers;
- Cadence USB3 driver;
- DesignWare USB3 driver;
- USB Gadget drivers;
- USB Host Controller drivers;
- Renesas USBHS Controller drivers;
- USB Mass Storage drivers;
- USB Type-C Connector System Software Interface driver;
- Backlight driver;
- Framebuffer layer;
- Watchdog drivers;
- BFS file system;
- BTRFS file system;
- File systems infrastructure;
- Ext4 file system;
- F2FS file system;
- FUSE (File system in Userspace);
- HFS file system;
- HFS+ file system;
- HugeTLB file system;
- Journaling layer for block devices (JBD2);
- JFS file system;
- Network file system (NFS) client;
- Network file system (NFS) server daemon;
- File system notification infrastructure;
- NTFS3 file system;
- OCFS2 file system;
- OrangeFS file system;
- Proc file system;
- SMB network file system;
- SquashFS file system;
- UDF file system;
- XFS file system;
- BPF subsystem;
- Ethernet bridge;
- Memory management;
- padata parallel execution mechanism;
- IP tunnels definitions;
- Network traffic control;
- Network sockets;
- XFRM subsystem;
- io_uring subsystem;
- Control group (cgroup);
- Locking primitives;
- Padata parallel execution mechanism;
- PID allocator;
- Scheduler infrastructure;
- Shadow Call Stack mechanism;
- Tracing infrastructure;
- 9P file system network protocol;
- Bluetooth subsystem;
- CAIF protocol;
- CAN network layer;
- Ceph Core library;
- Networking core;
- Ethtool driver;
- HSR network protocol;
- IPv4 networking;
- IPv6 networking;
- MAC80211 subsystem;
- Multipath TCP;
- Netfilter;
- NET/ROM layer;
- NFC subsystem;
- Open vSwitch;
- RF switch subsystem;
- Rose network layer;
- SCTP protocol;
- Sun RPC protocol;
- TIPC protocol;
- Unix domain sockets;
- VMware vSockets driver;
- Wireless networking;
- Rust bindings mechanism;
- Integrity Measurement Architecture(IMA) framework;
- Key management;
- Simplified Mandatory Access Control Kernel framework;
- FireWire sound drivers;
- Turtle Beach Wavefront ALSA driver;
- Intel ASoC drivers;
- STMicroelectronics SoC drivers;
- USB sound devices;
(CVE-2022-49465, CVE-2022-49635, CVE-2023-53041, CVE-2024-36903,
CVE-2024-36927, CVE-2024-37354, CVE-2024-41014, CVE-2024-46830,
CVE-2024-47666, CVE-2024-49968, CVE-2024-53114, CVE-2024-56538,
CVE-2024-58011, CVE-2025-21780, CVE-2025-21861, CVE-2025-22022,
CVE-2025-22058, CVE-2025-22111, CVE-2025-22121, CVE-2025-23143,
CVE-2025-37849, CVE-2025-38022, CVE-2025-38129, CVE-2025-38236,
CVE-2025-38248, CVE-2025-38556, CVE-2025-38584, CVE-2025-39869,
CVE-2025-39873, CVE-2025-39876, CVE-2025-39880, CVE-2025-39883,
CVE-2025-39885, CVE-2025-39907, CVE-2025-39911, CVE-2025-39913,
CVE-2025-39923, CVE-2025-39934, CVE-2025-39937, CVE-2025-39943,
CVE-2025-39945, CVE-2025-39949, CVE-2025-39951, CVE-2025-39953,
CVE-2025-39955, CVE-2025-39967, CVE-2025-39968, CVE-2025-39969,
CVE-2025-39970, CVE-2025-39971, CVE-2025-39972, CVE-2025-39973,
CVE-2025-39980, CVE-2025-39985, CVE-2025-39986, CVE-2025-39987,
CVE-2025-39988, CVE-2025-39994, CVE-2025-39995, CVE-2025-39996,
CVE-2025-39998, CVE-2025-40001, CVE-2025-40006, CVE-2025-40011,
CVE-2025-40020, CVE-2025-40021, CVE-2025-40026, CVE-2025-40027,
CVE-2025-40029, CVE-2025-40030, CVE-2025-40035, CVE-2025-40040,
CVE-2025-40042, CVE-2025-40043, CVE-2025-40044, CVE-2025-40048,
CVE-2025-40049, CVE-2025-40053, CVE-2025-40055, CVE-2025-40060,
CVE-2025-40068, CVE-2025-40070, CVE-2025-40078, CVE-2025-40081,
CVE-2025-40083, CVE-2025-40085, CVE-2025-40087, CVE-2025-40088,
CVE-2025-40092, CVE-2025-40094, CVE-2025-40105, CVE-2025-40106,
CVE-2025-40109, CVE-2025-40110, CVE-2025-40111, CVE-2025-40112,
CVE-2025-40115, CVE-2025-40116, CVE-2025-40118, CVE-2025-40120,
CVE-2025-40121, CVE-2025-40124, CVE-2025-40125, CVE-2025-40126,
CVE-2025-40127, CVE-2025-40134, CVE-2025-40140, CVE-2025-40153,
CVE-2025-40154, CVE-2025-40167, CVE-2025-40171, CVE-2025-40173,
CVE-2025-40178, CVE-2025-40179, CVE-2025-40183, CVE-2025-40187,
CVE-2025-40188, CVE-2025-40194, CVE-2025-40200, CVE-2025-40204,
CVE-2025-40205, CVE-2025-40211, CVE-2025-40215, CVE-2025-40219,
CVE-2025-40220, CVE-2025-40223, CVE-2025-40231, CVE-2025-40233,
CVE-2025-40240, CVE-2025-40243, CVE-2025-40244, CVE-2025-40245,
CVE-2025-40248, CVE-2025-40252, CVE-2025-40253, CVE-2025-40254,
CVE-2025-40257, CVE-2025-40258, CVE-2025-40259, CVE-2025-40261,
CVE-2025-40262, CVE-2025-40263, CVE-2025-40264, CVE-2025-40269,
CVE-2025-40271, CVE-2025-40272, CVE-2025-40273, CVE-2025-40275,
CVE-2025-40277, CVE-2025-40278, CVE-2025-40279, CVE-2025-40280,
CVE-2025-40281, CVE-2025-40282, CVE-2025-40283, CVE-2025-40304,
CVE-2025-40306, CVE-2025-40308, CVE-2025-40309, CVE-2025-40312,
CVE-2025-40313, CVE-2025-40314, CVE-2025-40315, CVE-2025-40317,
CVE-2025-40319, CVE-2025-40321, CVE-2025-40322, CVE-2025-40324,
CVE-2025-40331, CVE-2025-40342, CVE-2025-40343, CVE-2025-40345,
CVE-2025-40346, CVE-2025-40349, CVE-2025-40351, CVE-2025-40360,
CVE-2025-40363, CVE-2025-68168, CVE-2025-68176, CVE-2025-68177,
CVE-2025-68185, CVE-2025-68191, CVE-2025-68192, CVE-2025-68194,
CVE-2025-68200, CVE-2025-68204, CVE-2025-68217, CVE-2025-68220,
CVE-2025-68227, CVE-2025-68229, CVE-2025-68238, CVE-2025-68241,
CVE-2025-68244, CVE-2025-68245, CVE-2025-68249, CVE-2025-68254,
CVE-2025-68255, CVE-2025-68257, CVE-2025-68258, CVE-2025-68261,
CVE-2025-68264, CVE-2025-68266, CVE-2025-68282, CVE-2025-68284,
CVE-2025-68285, CVE-2025-68286, CVE-2025-68287, CVE-2025-68288,
CVE-2025-68289, CVE-2025-68290, CVE-2025-68295, CVE-2025-68301,
CVE-2025-68302, CVE-2025-68303, CVE-2025-68308, CVE-2025-68312,
CVE-2025-68321, CVE-2025-68325, CVE-2025-68327, CVE-2025-68328,
CVE-2025-68330, CVE-2025-68331, CVE-2025-68332, CVE-2025-68335,
CVE-2025-68336, CVE-2025-68337, CVE-2025-68339, CVE-2025-68344,
CVE-2025-68346, CVE-2025-68349, CVE-2025-68354, CVE-2025-68362,
CVE-2025-68364, CVE-2025-68366, CVE-2025-68367, CVE-2025-68372,
CVE-2025-68724, CVE-2025-68727, CVE-2025-68728, CVE-2025-68732,
CVE-2025-68733, CVE-2025-68734, CVE-2025-68740, CVE-2025-68746,
CVE-2025-68757, CVE-2025-68758, CVE-2025-68759, CVE-2025-68764,
CVE-2025-68765, CVE-2025-68767, CVE-2025-68769, CVE-2025-68771,
CVE-2025-68774, CVE-2025-68776, CVE-2025-68777, CVE-2025-68780,
CVE-2025-68782, CVE-2025-68783, CVE-2025-68785, CVE-2025-68787,
CVE-2025-68788, CVE-2025-68795, CVE-2025-68796, CVE-2025-68797,
CVE-2025-68799, CVE-2025-68800, CVE-2025-68801, CVE-2025-68803,
CVE-2025-68804, CVE-2025-68808, CVE-2025-68813, CVE-2025-68814,
CVE-2025-68815, CVE-2025-68816, CVE-2025-68818, CVE-2025-68819,
CVE-2025-68820, CVE-2025-71064, CVE-2025-71066, CVE-2025-71068,
CVE-2025-71069, CVE-2025-71075, CVE-2025-71077, CVE-2025-71078,
CVE-2025-71079, CVE-2025-71081, CVE-2025-71082, CVE-2025-71083,
CVE-2025-71084, CVE-2025-71085, CVE-2025-71086, CVE-2025-71087,
CVE-2025-71091, CVE-2025-71093, CVE-2025-71094, CVE-2025-71096,
CVE-2025-71097, CVE-2025-71098, CVE-2025-71102, CVE-2025-71104,
CVE-2025-71105, CVE-2025-71108, CVE-2025-71111, CVE-2025-71112,
CVE-2025-71113, CVE-2025-71114, CVE-2025-71116, CVE-2025-71118,
CVE-2025-71120, CVE-2025-71121, CVE-2025-71125, CVE-2025-71127,
CVE-2025-71131, CVE-2025-71132, CVE-2025-71133, CVE-2025-71136,
CVE-2025-71137, CVE-2025-71147, CVE-2025-71154, CVE-2025-71180,
CVE-2025-71182, CVE-2026-22976, CVE-2026-22977, CVE-2026-22978,
CVE-2026-22980, CVE-2026-22982, CVE-2026-22984, CVE-2026-22990,
CVE-2026-22991, CVE-2026-22992, CVE-2026-23019, CVE-2026-23020,
CVE-2026-23021, CVE-2026-23047, CVE-2026-23060, CVE-2026-23074,
CVE-2026-23111, CVE-2026-23202, CVE-2026-23207)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS
linux-image-5.15.0-1109-azure 5.15.0-1109.118
linux-image-azure-5.15 5.15.0.1109.107
linux-image-azure-lts-22.04 5.15.0.1109.107

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-8163-2
https://ubuntu.com/security/notices/USN-8163-1
https://launchpad.net/bugs/2143853
CVE-2022-49465, CVE-2022-49635, CVE-2023-53041, CVE-2024-36903,
CVE-2024-36927, CVE-2024-37354, CVE-2024-41014, CVE-2024-46830,
CVE-2024-47666, CVE-2024-49968, CVE-2024-53114, CVE-2024-56538,
CVE-2024-58011, CVE-2025-21780, CVE-2025-21861, CVE-2025-22022,
CVE-2025-22058, CVE-2025-22111, CVE-2025-22121, CVE-2025-23143,
CVE-2025-37849, CVE-2025-38022, CVE-2025-38129, CVE-2025-38236,
CVE-2025-38248, CVE-2025-38556, CVE-2025-38584, CVE-2025-39869,
CVE-2025-39873, CVE-2025-39876, CVE-2025-39880, CVE-2025-39883,
CVE-2025-39885, CVE-2025-39907, CVE-2025-39911, CVE-2025-39913,
CVE-2025-39923, CVE-2025-39934, CVE-2025-39937, CVE-2025-39943,
CVE-2025-39945, CVE-2025-39949, CVE-2025-39951, CVE-2025-39953,
CVE-2025-39955, CVE-2025-39967, CVE-2025-39968, CVE-2025-39969,
CVE-2025-39970, CVE-2025-39971, CVE-2025-39972, CVE-2025-39973,
CVE-2025-39980, CVE-2025-39985, CVE-2025-39986, CVE-2025-39987,
CVE-2025-39988, CVE-2025-39994, CVE-2025-39995, CVE-2025-39996,
CVE-2025-39998, CVE-2025-40001, CVE-2025-40006, CVE-2025-40011,
CVE-2025-40020, CVE-2025-40021, CVE-2025-40026, CVE-2025-40027,
CVE-2025-40029, CVE-2025-40030, CVE-2025-40035, CVE-2025-40040,
CVE-2025-40042, CVE-2025-40043, CVE-2025-40044, CVE-2025-40048,
CVE-2025-40049, CVE-2025-40053, CVE-2025-40055, CVE-2025-40060,
CVE-2025-40068, CVE-2025-40070, CVE-2025-40078, CVE-2025-40081,
CVE-2025-40083, CVE-2025-40085, CVE-2025-40087, CVE-2025-40088,
CVE-2025-40092, CVE-2025-40094, CVE-2025-40105, CVE-2025-40106,
CVE-2025-40109, CVE-2025-40110, CVE-2025-40111, CVE-2025-40112,
CVE-2025-40115, CVE-2025-40116, CVE-2025-40118, CVE-2025-40120,
CVE-2025-40121, CVE-2025-40124, CVE-2025-40125, CVE-2025-40126,
CVE-2025-40127, CVE-2025-40134, CVE-2025-40140, CVE-2025-40153,
CVE-2025-40154, CVE-2025-40167, CVE-2025-40171, CVE-2025-40173,
CVE-2025-40178, CVE-2025-40179, CVE-2025-40183, CVE-2025-40187,
CVE-2025-40188, CVE-2025-40194, CVE-2025-40200, CVE-2025-40204,
CVE-2025-40205, CVE-2025-40211, CVE-2025-40215, CVE-2025-40219,
CVE-2025-40220, CVE-2025-40223, CVE-2025-40231, CVE-2025-40233,
CVE-2025-40240, CVE-2025-40243, CVE-2025-40244, CVE-2025-40245,
CVE-2025-40248, CVE-2025-40252, CVE-2025-40253, CVE-2025-40254,
CVE-2025-40257, CVE-2025-40258, CVE-2025-40259, CVE-2025-40261,
CVE-2025-40262, CVE-2025-40263, CVE-2025-40264, CVE-2025-40269,
CVE-2025-40271, CVE-2025-40272, CVE-2025-40273, CVE-2025-40275,
CVE-2025-40277, CVE-2025-40278, CVE-2025-40279, CVE-2025-40280,
CVE-2025-40281, CVE-2025-40282, CVE-2025-40283, CVE-2025-40304,
CVE-2025-40306, CVE-2025-40308, CVE-2025-40309, CVE-2025-40312,
CVE-2025-40313, CVE-2025-40314, CVE-2025-40315, CVE-2025-40317,
CVE-2025-40319, CVE-2025-40321, CVE-2025-40322, CVE-2025-40324,
CVE-2025-40331, CVE-2025-40342, CVE-2025-40343, CVE-2025-40345,
CVE-2025-40346, CVE-2025-40349, CVE-2025-40351, CVE-2025-40360,
CVE-2025-40363, CVE-2025-68168, CVE-2025-68176, CVE-2025-68177,
CVE-2025-68185, CVE-2025-68191, CVE-2025-68192, CVE-2025-68194,
CVE-2025-68200, CVE-2025-68204, CVE-2025-68217, CVE-2025-68220,
CVE-2025-68227, CVE-2025-68229, CVE-2025-68238, CVE-2025-68241,
CVE-2025-68244, CVE-2025-68245, CVE-2025-68249, CVE-2025-68254,
CVE-2025-68255, CVE-2025-68257, CVE-2025-68258, CVE-2025-68261,
CVE-2025-68264, CVE-2025-68266, CVE-2025-68282, CVE-2025-68284,
CVE-2025-68285, CVE-2025-68286, CVE-2025-68287, CVE-2025-68288,
CVE-2025-68289, CVE-2025-68290, CVE-2025-68295, CVE-2025-68301,
CVE-2025-68302, CVE-2025-68303, CVE-2025-68308, CVE-2025-68312,
CVE-2025-68321, CVE-2025-68325, CVE-2025-68327, CVE-2025-68328,
CVE-2025-68330, CVE-2025-68331, CVE-2025-68332, CVE-2025-68335,
CVE-2025-68336, CVE-2025-68337, CVE-2025-68339, CVE-2025-68344,
CVE-2025-68346, CVE-2025-68349, CVE-2025-68354, CVE-2025-68362,
CVE-2025-68364, CVE-2025-68366, CVE-2025-68367, CVE-2025-68372,
CVE-2025-68724, CVE-2025-68727, CVE-2025-68728, CVE-2025-68732,
CVE-2025-68733, CVE-2025-68734, CVE-2025-68740, CVE-2025-68746,
CVE-2025-68757, CVE-2025-68758, CVE-2025-68759, CVE-2025-68764,
CVE-2025-68765, CVE-2025-68767, CVE-2025-68769, CVE-2025-68771,
CVE-2025-68774, CVE-2025-68776, CVE-2025-68777, CVE-2025-68780,
CVE-2025-68782, CVE-2025-68783, CVE-2025-68785, CVE-2025-68787,
CVE-2025-68788, CVE-2025-68795, CVE-2025-68796, CVE-2025-68797,
CVE-2025-68799, CVE-2025-68800, CVE-2025-68801, CVE-2025-68803,
CVE-2025-68804, CVE-2025-68808, CVE-2025-68813, CVE-2025-68814,
CVE-2025-68815, CVE-2025-68816, CVE-2025-68818, CVE-2025-68819,
CVE-2025-68820, CVE-2025-71064, CVE-2025-71066, CVE-2025-71068,
CVE-2025-71069, CVE-2025-71075, CVE-2025-71077, CVE-2025-71078,
CVE-2025-71079, CVE-2025-71081, CVE-2025-71082, CVE-2025-71083,
CVE-2025-71084, CVE-2025-71085, CVE-2025-71086, CVE-2025-71087,
CVE-2025-71091, CVE-2025-71093, CVE-2025-71094, CVE-2025-71096,
CVE-2025-71097, CVE-2025-71098, CVE-2025-71102, CVE-2025-71104,
CVE-2025-71105, CVE-2025-71108, CVE-2025-71111, CVE-2025-71112,
CVE-2025-71113, CVE-2025-71114, CVE-2025-71116, CVE-2025-71118,
CVE-2025-71120, CVE-2025-71121, CVE-2025-71125, CVE-2025-71127,
CVE-2025-71131, CVE-2025-71132, CVE-2025-71133, CVE-2025-71136,
CVE-2025-71137, CVE-2025-71147, CVE-2025-71154, CVE-2025-71180,
CVE-2025-71182, CVE-2026-22976, CVE-2026-22977, CVE-2026-22978,
CVE-2026-22980, CVE-2026-22982, CVE-2026-22984, CVE-2026-22990,
CVE-2026-22991, CVE-2026-22992, CVE-2026-23019, CVE-2026-23020,
CVE-2026-23021, CVE-2026-23047, CVE-2026-23060, CVE-2026-23074,
CVE-2026-23111, CVE-2026-23202, CVE-2026-23207, CVE-2026-23268,
CVE-2026-23269, CVE-2026-23403, CVE-2026-23404, CVE-2026-23405,
CVE-2026-23406, CVE-2026-23407, CVE-2026-23408, CVE-2026-23409,
CVE-2026-23410, CVE-2026-23411

Package Information:
https://launchpad.net/ubuntu/+source/linux-azure/5.15.0-1109.118



[USN-8148-6] Linux kernel (Azure) vulnerabilities


==========================================================================
Ubuntu Security Notice USN-8148-6
April 14, 2026

linux-azure, linux-azure-6.8 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-azure: Linux kernel for Microsoft Azure Cloud systems
- linux-azure-6.8: Linux kernel for Microsoft Azure cloud systems

Details:

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Cryptographic API;
- Netfilter;
- Network traffic control;
(CVE-2026-23060, CVE-2026-23074, CVE-2026-23111)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
linux-image-6.8.0-1052-azure 6.8.0-1052.58
linux-image-azure-6.8 6.8.0-1052.58
linux-image-azure-lts-24.04 6.8.0-1052.58

Ubuntu 22.04 LTS
linux-image-6.8.0-1052-azure 6.8.0-1052.58~22.04.1
linux-image-azure 6.8.0-1052.58~22.04.1
linux-image-azure-6.8 6.8.0-1052.58~22.04.1

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-8148-6
https://ubuntu.com/security/notices/USN-8148-5
https://ubuntu.com/security/notices/USN-8148-4
https://ubuntu.com/security/notices/USN-8148-3
https://ubuntu.com/security/notices/USN-8148-2
https://ubuntu.com/security/notices/USN-8148-1
CVE-2026-23060, CVE-2026-23074, CVE-2026-23111

Package Information:
https://launchpad.net/ubuntu/+source/linux-azure/6.8.0-1052.58
https://launchpad.net/ubuntu/+source/linux-azure-6.8/6.8.0-1052.58~22.04.1



[USN-8149-3] Linux kernel (Azure) vulnerabilities


==========================================================================
Ubuntu Security Notice USN-8149-3
April 14, 2026

linux-azure, linux-azure-6.17 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.10
- Ubuntu 24.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-azure: Linux kernel for Microsoft Azure Cloud systems
- linux-azure-6.17: Linux kernel for Microsoft Azure cloud systems

Details:

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Cryptographic API;
- Netfilter;
- Network traffic control;
(CVE-2026-23060, CVE-2026-23074, CVE-2026-23111)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.10
linux-image-6.17.0-1011-azure 6.17.0-1011.11
linux-image-azure 6.17.0-1011.11
linux-image-azure-6.17 6.17.0-1011.11

Ubuntu 24.04 LTS
linux-image-6.17.0-1011-azure 6.17.0-1011.11~24.04.2
linux-image-azure 6.17.0-1011.11~24.04.2
linux-image-azure-6.17 6.17.0-1011.11~24.04.2

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-8149-3
https://ubuntu.com/security/notices/USN-8149-2
https://ubuntu.com/security/notices/USN-8149-1
CVE-2026-23060, CVE-2026-23074, CVE-2026-23111

Package Information:
https://launchpad.net/ubuntu/+source/linux-azure/6.17.0-1011.11
https://launchpad.net/ubuntu/+source/linux-azure-6.17/6.17.0-1011.11~24.04.2



[USN-8172-1] kvmtool vulnerabilities


==========================================================================
Ubuntu Security Notice USN-8172-1
April 13, 2026

kvmtool vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in kvmtool.

Software Description:
- kvmtool: Native Linux KVM tool

Details:

It was discovered that kvmtool did not properly manage memory under certain
circumstances. A malicious guest attacker could use this issue to cause
kvmtool to crash, leading to a denial of service, or possibly execute
arbitrary code on the host system. (CVE-2021-45464)

It was discovered that kvmtool incorrectly handled the 9p passthrough file
system. A malicious guest attacker could possibly use this issue to open
special files, escape the exported 9p tree, and execute arbitrary code on
the host system. (CVE-2023-2861)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS
kvmtool 0.20170904-1.1ubuntu0.1~esm2
Available with Ubuntu Pro

Ubuntu 20.04 LTS
kvmtool 0.20170904-1ubuntu0.20.04.1~esm1
Available with Ubuntu Pro

Ubuntu 18.04 LTS
kvmtool 0.20170904-1ubuntu0.18.04.1~esm1
Available with Ubuntu Pro

Ubuntu 16.04 LTS
kvmtool 0.20151104-1ubuntu0.1~esm1
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8172-1
CVE-2021-45464, CVE-2023-2861



[USN-8168-1] Rust vulnerability


==========================================================================
Ubuntu Security Notice USN-8168-1
April 13, 2026

rustc vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

rustc could be made to modify permissions on arbitrary directories.

Software Description:
- rustc-1.85: Rust systems programming language
- rustc-1.88: Rust systems programming language
- rustc: Rust systems programming language
- rustc-1.74: Rust systems programming language
- rustc-1.76: Rust systems programming language
- rustc-1.77: Rust systems programming language
- rustc-1.78: Rust systems programming language
- rustc-1.79: Rust systems programming language
- rustc-1.80: Rust systems programming language
- rustc-1.81: Rust systems programming language
- rustc-1.82: Rust systems programming language
- rustc-1.83: Rust systems programming language
- rustc-1.84: Rust systems programming language
- rustc-1.89: Rust systems programming language
- rustc-1.91: Rust systems programming language
- rustc-1.62: Rust systems programming language

Details:

It was discovered that tar-rs embedded in rustc incorrectly handled
symlinks when unpacking a tar archive. If a user or automated system were
tricked into processing a specially crafted tar archive, a remote attacker
could use this issue to modify permissions of arbitrary directories outside
the extraction root, and possibly escalate privileges.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.10
rustc-1.85 1.85.1+dfsg0ubuntu2-0ubuntu1.25.04.1
rustc-1.88 1.88.0+dfsg0ubuntu1-0ubuntu2

Ubuntu 24.04 LTS
rustc 1.75.0+dfsg0ubuntu1-0ubuntu7.4
rustc-1.74 1.74.1+dfsg0ubuntu1-0ubuntu15
rustc-1.76 1.76.0+dfsg0ubuntu1-0ubuntu0.24.04.2
rustc-1.77 1.77.2+dfsg1ubuntu1-0ubuntu0.24.04.1
rustc-1.78 1.78.0+dfsg1ubuntu1-0ubuntu0.24.04.2
rustc-1.79 1.79.0+dfsg1ubuntu1-0ubuntu0.24.04.1
rustc-1.80 1.80.1+dfsg0ubuntu1-0ubuntu0.24.04.01
rustc-1.81 1.81.0+dfsg0ubuntu1-0ubuntu0.24.04.1
rustc-1.82 1.82.0+dfsg0ubuntu0-0ubuntu0.24.04.1
rustc-1.83 1.83.0+dfsg0ubuntu1~bpo2-0ubuntu0.24.04.1
rustc-1.84 1.84.1+dfsg0ubuntu1~bpo2-0ubuntu2.24.04.1
rustc-1.85 1.85.1+dfsg0ubuntu2~bpo0-0ubuntu0.24.04.2
rustc-1.89 1.89.0+dfsg~24.04-0ubuntu0.24.04.2
rustc-1.91 1.91.1+dfsg~24.04-0ubuntu0.24.04.2

Ubuntu 22.04 LTS
rustc 1.75.0+dfsg0ubuntu1~bpo0-0ubuntu0.22.04.1
rustc-1.62 1.62.1+dfsg1-1ubuntu0.22.04.3
rustc-1.76 1.76.0+dfsg0ubuntu1~bpo0-0ubuntu0.22.04.1
rustc-1.77 1.77.2+dfsg1ubuntu1~bpo0-0ubuntu0.22.04.1
rustc-1.78 1.78.0+dfsg1ubuntu1~bpo0-0ubuntu0.22.04.1
rustc-1.79 1.79.0+dfsg1ubuntu1~bpo0-0ubuntu0.22.04.1
rustc-1.80 1.80.1+dfsg0ubuntu1~bpo0-0ubuntu0.22.04.1
rustc-1.81 1.81.0+dfsg0ubuntu0-0ubuntu0.22.04.1
rustc-1.82 1.82.0+dfsg0ubuntu0~jammy-0ubuntu0.22.04.1
rustc-1.83 1.83.0+dfsg0ubuntu2~bpo2-0ubuntu2.22.04.1
rustc-1.84 1.84.1+dfsg0ubuntu1~bpo10-0ubuntu4.22.04.1
rustc-1.85 1.85.1+dfsg0ubuntu2~bpo0-0ubuntu1.22.04.1
rustc-1.89 1.89.0+dfsg~24.04-0ubuntu0.22.04.2
rustc-1.91 1.91.1+dfsg~22.04-0ubuntu0.22.04.3

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8168-1
CVE-2026-33056

Package Information:
https://launchpad.net/ubuntu/+source/rustc-1.85/1.85.1+dfsg0ubuntu2-0ubuntu1.25.04.1
https://launchpad.net/ubuntu/+source/rustc-1.88/1.88.0+dfsg0ubuntu1-0ubuntu2
https://launchpad.net/ubuntu/+source/rustc/1.75.0+dfsg0ubuntu1-0ubuntu7.4
https://launchpad.net/ubuntu/+source/rustc-1.74/1.74.1+dfsg0ubuntu1-0ubuntu15
https://launchpad.net/ubuntu/+source/rustc-1.76/1.76.0+dfsg0ubuntu1-0ubuntu0.24.04.2
https://launchpad.net/ubuntu/+source/rustc-1.77/1.77.2+dfsg1ubuntu1-0ubuntu0.24.04.1
https://launchpad.net/ubuntu/+source/rustc-1.78/1.78.0+dfsg1ubuntu1-0ubuntu0.24.04.2
https://launchpad.net/ubuntu/+source/rustc-1.79/1.79.0+dfsg1ubuntu1-0ubuntu0.24.04.1
https://launchpad.net/ubuntu/+source/rustc-1.80/1.80.1+dfsg0ubuntu1-0ubuntu0.24.04.01
https://launchpad.net/ubuntu/+source/rustc-1.81/1.81.0+dfsg0ubuntu1-0ubuntu0.24.04.1
https://launchpad.net/ubuntu/+source/rustc-1.82/1.82.0+dfsg0ubuntu0-0ubuntu0.24.04.1
https://launchpad.net/ubuntu/+source/rustc-1.83/1.83.0+dfsg0ubuntu1~bpo2-0ubuntu0.24.04.1
https://launchpad.net/ubuntu/+source/rustc-1.84/1.84.1+dfsg0ubuntu1~bpo2-0ubuntu2.24.04.1
https://launchpad.net/ubuntu/+source/rustc-1.85/1.85.1+dfsg0ubuntu2~bpo0-0ubuntu0.24.04.2
https://launchpad.net/ubuntu/+source/rustc-1.89/1.89.0+dfsg~24.04-0ubuntu0.24.04.2
https://launchpad.net/ubuntu/+source/rustc-1.91/1.91.1+dfsg~24.04-0ubuntu0.24.04.2
https://launchpad.net/ubuntu/+source/rustc/1.75.0+dfsg0ubuntu1~bpo0-0ubuntu0.22.04.1
https://launchpad.net/ubuntu/+source/rustc-1.62/1.62.1+dfsg1-1ubuntu0.22.04.3
https://launchpad.net/ubuntu/+source/rustc-1.76/1.76.0+dfsg0ubuntu1~bpo0-0ubuntu0.22.04.1
https://launchpad.net/ubuntu/+source/rustc-1.77/1.77.2+dfsg1ubuntu1~bpo0-0ubuntu0.22.04.1
https://launchpad.net/ubuntu/+source/rustc-1.78/1.78.0+dfsg1ubuntu1~bpo0-0ubuntu0.22.04.1
https://launchpad.net/ubuntu/+source/rustc-1.79/1.79.0+dfsg1ubuntu1~bpo0-0ubuntu0.22.04.1
https://launchpad.net/ubuntu/+source/rustc-1.80/1.80.1+dfsg0ubuntu1~bpo0-0ubuntu0.22.04.1
https://launchpad.net/ubuntu/+source/rustc-1.81/1.81.0+dfsg0ubuntu0-0ubuntu0.22.04.1
https://launchpad.net/ubuntu/+source/rustc-1.82/1.82.0+dfsg0ubuntu0~jammy-0ubuntu0.22.04.1
https://launchpad.net/ubuntu/+source/rustc-1.83/1.83.0+dfsg0ubuntu2~bpo2-0ubuntu2.22.04.1
https://launchpad.net/ubuntu/+source/rustc-1.84/1.84.1+dfsg0ubuntu1~bpo10-0ubuntu4.22.04.1
https://launchpad.net/ubuntu/+source/rustc-1.85/1.85.1+dfsg0ubuntu2~bpo0-0ubuntu1.22.04.1
https://launchpad.net/ubuntu/+source/rustc-1.89/1.89.0+dfsg~24.04-0ubuntu0.22.04.2
https://launchpad.net/ubuntu/+source/rustc-1.91/1.91.1+dfsg~22.04-0ubuntu0.22.04.3



[LSN-0119-1] Linux kernel vulnerability


Linux kernel vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 24.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 22.04 LTS

Summary

Several security issues were fixed in the kernel.

Software Description

- linux - Linux kernel
- linux-aws - Linux kernel for Amazon Web Services (AWS) systems
- linux-azure - Linux kernel for Microsoft Azure Cloud systems
- linux-gcp - Linux kernel for Google Cloud Platform (GCP) systems
- linux-gke - Linux kernel for Google Container Engine (GKE) systems
- linux-ibm - Linux kernel for IBM cloud systems
- linux-oracle - Linux kernel for Oracle Cloud systems

Details

In the Linux kernel, the following vulnerability has been resolved:
btrfs: ref-verify: fix use-after-free after invalid ref action At
btrfs_ref_tree_mod() after we successfully inserted the new ref entry
(local variable ‘ref’) into the respective block entry’s rbtree (local
variable ‘be’), if we find an unexpected action of
BTRFS_DROP_DELAYED_REF, we error out and free the ref entry without
removing it from the block entry’s rbtree. (CVE-2024-56581)

In the Linux kernel, the following vulnerability has been resolved:
wifi: brcmfmac: Fix oops due to NULL pointer dereference in
brcmf_sdiod_sglist_rw() This patch fixes a NULL pointer dereference bug
in brcmfmac that occurs when a high ‘sd_sgentry_align’ value applies
(e.g. 512) and a lot of queued SKBs are sent from the pkt queue.
(CVE-2024-56593)

In the Linux kernel, the following vulnerability has been resolved:
net/smc: fix LGR and link use-after-free issue We encountered a LGR/link
use-after-free issue, which manifested as the LGR/link refcnt reaching 0
early and entering the clear process, making resource access unsafe.
(CVE-2024-56640)

In the Linux kernel, the following vulnerability has been resolved: usb:
cdc-acm: Check control transfer buffer size before access If the first
fragment is shorter than struct usb_cdc_notification, we can’t calculate
an expected_size. (CVE-2025-21704)

In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table() It
malicious user provides a small pptable through sysfs and then a bigger
pptable, it may cause buffer overflow attack in function
smu_sys_set_pp_table().. (CVE-2025-21780)

In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_tables: fix inverted genmask check in
nft_map_catchall_activate() nft_map_catchall_activate() has an inverted
element activity check compared to its non-catchall counterpart
nft_mapelem_activate() and compared to what is logically required.
nft_map_catchall_activate() is called from the abort path to re-activate
catchall map elements that were deactivated during a failed transaction.
(CVE-2026-23111)

Qualys discovered that several vulnerabilities existed in the AppArmor
Linux kernel Security Module (LSM). An unprivileged local attacker could
use these issues to load, replace, and remove arbitrary AppArmor
profiles causing denial of service, exposure of sensitive information
(kernel memory), local privilege escalation, or possibly escape a
container. (CVE-2026-23268)

Qualys discovered that several vulnerabilities existed in the AppArmor
Linux kernel Security Module (LSM). An unprivileged local attacker could
use these issues to load, replace, and remove arbitrary AppArmor
profiles causing denial of service, exposure of sensitive information
(kernel memory), local privilege escalation, or possibly escape a
container. (CVE-2026-23269)

Update instructions

The problem can be corrected by updating your kernel livepatch to the
following versions:

Ubuntu 20.04 LTS
aws - 119.1
azure - 119.1
gcp - 119.1
generic - 119.1
ibm - 119.1
lowlatency - 119.1
oracle - 119.1

Ubuntu 18.04 LTS
aws - 119.1
azure - 119.1
gcp - 119.1
generic - 119.1
lowlatency - 119.1
oracle - 119.1

Ubuntu 24.04 LTS
aws - 119.1
azure - 119.1
gcp - 119.1
generic - 119.1
ibm - 119.1
oracle - 119.1

Ubuntu 16.04 LTS
aws - 119.1
azure - 119.1
generic - 119.1
lowlatency - 119.1

Ubuntu 22.04 LTS
aws - 119.1
azure - 119.1
gcp - 119.1
generic - 119.1
gke - 119.1
ibm - 119.1
oracle - 119.1

Support Information

Livepatches for supported LTS kernels will receive upgrades for a period
of up to 13 months after the build date of the kernel.

Livepatches for supported HWE kernels which are not based on an LTS
kernel version will receive upgrades for a period of up to 9 months
after the build date of the kernel, or until the end of support for that
kernel’s non-LTS distro release version, whichever is sooner.

References

- CVE-2024-56581
- CVE-2024-56593
- CVE-2024-56640
- CVE-2025-21704
- CVE-2025-21780
- CVE-2026-23111
- CVE-2026-23268
- CVE-2026-23269



[USN-8167-1] xdg-dbus-proxy vulnerability


==========================================================================
Ubuntu Security Notice USN-8167-1
April 13, 2026

xdg-dbus-proxy vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

xdg-dbus-proxy could be made to expose sensitive information.

Software Description:
- xdg-dbus-proxy: A filtering proxy for D-Bus connections

Details:

It was discovered that xdg-dbus-proxy incorrectly handled eavesdropping
in policy rules. A local attacker could possibly use this issue to
intercept certain D-Bus messages.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.10
xdg-dbus-proxy 0.1.6-1ubuntu0.1

Ubuntu 24.04 LTS
xdg-dbus-proxy 0.1.5-1ubuntu0.2

Ubuntu 22.04 LTS
xdg-dbus-proxy 0.1.3-1ubuntu0.1

After a standard system update you need to restart your session to make all
the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8167-1
CVE-2026-34080

Package Information:
https://launchpad.net/ubuntu/+source/xdg-dbus-proxy/0.1.6-1ubuntu0.1
https://launchpad.net/ubuntu/+source/xdg-dbus-proxy/0.1.5-1ubuntu0.2
https://launchpad.net/ubuntu/+source/xdg-dbus-proxy/0.1.3-1ubuntu0.1



[USN-8170-1] Corosync vulnerabilities


==========================================================================
Ubuntu Security Notice USN-8170-1
April 13, 2026

corosync vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in Corosync.

Software Description:
- corosync: cluster engine daemon and utilities

Details:

It was discovered that Corosync incorrectly handled the membership commit
token validity check. A remote attacker could use this issue to cause
Corosync to crash, resulting in a denial of service, or to possibly obtain
a small quantity of sensitive information. (CVE-2026-35091)

It was discovered that Corosync incorrectly handled join message
validation. A remote attacker could possibly use this issue to cause
Corosync to crash, resulting in a denial of service. (CVE-2026-35092)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.10
corosync 3.1.9-2ubuntu1.1

Ubuntu 24.04 LTS
corosync 3.1.7-1ubuntu3.2

Ubuntu 22.04 LTS
corosync 3.1.6-1ubuntu1.2

After a standard system update you need to restart Corosync to make all the
necessary changes.

References:
https://ubuntu.com/security/notices/USN-8170-1
CVE-2026-35091, CVE-2026-35092

Package Information:
https://launchpad.net/ubuntu/+source/corosync/3.1.9-2ubuntu1.1
https://launchpad.net/ubuntu/+source/corosync/3.1.7-1ubuntu3.2
https://launchpad.net/ubuntu/+source/corosync/3.1.6-1ubuntu1.2