Skip to content

ubuntu jammy v1.808

Compare
Choose a tag to compare
@bosh-admin-bot bosh-admin-bot released this 07 Apr 08:28
· 104 commits to ubuntu-jammy since this release

Metadata:

BOSH Agent Version: 2.744.0
Kernel Version: 5.15.0.136.134

USNs:

Title: USN-7369-1 -- elfutils vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7369-1
Priorities: medium,low
Description:
It was discovered that readelf from elfutils could be made to read out of bounds. If a user or automated system were tricked into running readelf on a specially crafted file, an attacker could cause readelf to crash, resulting in a denial of service. This issue only affected Ubuntu 24.04 LTS. (CVE-2024-25260) It was discovered that readelf from elfutils could be made to write out of bounds. If a user or automated system were tricked into running readelf on a specially crafted file, an attacker could cause readelf to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2025-1365) It was discovered that readelf from elfutils could be made to dereference invalid memory. If a user or automated system were tricked into running readelf on a specially crafted file, an attacker could cause readelf to crash, resulting in a denial of service. This issue only affected Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2025-1371) It was discovered that readelf from elfutils could be made to dereference invalid memory. If a user or automated system were tricked into running readelf on a specially crafted file, an attacker could cause readelf to crash, resulting in a denial of service. (CVE-2025-1372) It was discovered that strip from elfutils could be made to dereference invalid memory. If a user or automated system were tricked into running strip on a specially crafted file, an attacker could cause strip to crash, resulting in a denial of service. (CVE-2025-1377) Update Instructions: Run sudo pro fix USN-7369-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: debuginfod - 0.186-1ubuntu0.1 elfutils - 0.186-1ubuntu0.1 libasm-dev - 0.186-1ubuntu0.1 libasm1 - 0.186-1ubuntu0.1 libdebuginfod-common - 0.186-1ubuntu0.1 libdebuginfod-dev - 0.186-1ubuntu0.1 libdebuginfod1 - 0.186-1ubuntu0.1 libdw-dev - 0.186-1ubuntu0.1 libdw1 - 0.186-1ubuntu0.1 libelf-dev - 0.186-1ubuntu0.1 libelf1 - 0.186-1ubuntu0.1 No subscription required
CVEs:

Title: USN-7406-1 -- Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7406-1
Priorities: high
Description:
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - GPU drivers; - SMB network file system; - Network namespace; - Networking core; (CVE-2024-26928, CVE-2024-56658, CVE-2024-35864, CVE-2024-57798) Update Instructions: Run sudo pro fix USN-7406-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-5.15.0-1034-nvidia-tegra - 5.15.0-1034.34 linux-buildinfo-5.15.0-1034-nvidia-tegra-rt - 5.15.0-1034.34 linux-headers-5.15.0-1034-nvidia-tegra - 5.15.0-1034.34 linux-headers-5.15.0-1034-nvidia-tegra-rt - 5.15.0-1034.34 linux-image-5.15.0-1034-nvidia-tegra - 5.15.0-1034.34 linux-image-5.15.0-1034-nvidia-tegra-rt - 5.15.0-1034.34 linux-image-unsigned-5.15.0-1034-nvidia-tegra - 5.15.0-1034.34 linux-image-unsigned-5.15.0-1034-nvidia-tegra-rt - 5.15.0-1034.34 linux-modules-5.15.0-1034-nvidia-tegra - 5.15.0-1034.34 linux-modules-5.15.0-1034-nvidia-tegra-rt - 5.15.0-1034.34 linux-modules-extra-5.15.0-1034-nvidia-tegra - 5.15.0-1034.34 linux-nvidia-tegra-headers-5.15.0-1034 - 5.15.0-1034.34 linux-nvidia-tegra-tools-5.15.0-1034 - 5.15.0-1034.34 linux-tools-5.15.0-1034-nvidia-tegra - 5.15.0-1034.34 linux-tools-5.15.0-1034-nvidia-tegra-rt - 5.15.0-1034.34 No subscription required linux-buildinfo-5.15.0-1063-gkeop - 5.15.0-1063.71 linux-cloud-tools-5.15.0-1063-gkeop - 5.15.0-1063.71 linux-gkeop-cloud-tools-5.15.0-1063 - 5.15.0-1063.71 linux-gkeop-headers-5.15.0-1063 - 5.15.0-1063.71 linux-gkeop-tools-5.15.0-1063 - 5.15.0-1063.71 linux-headers-5.15.0-1063-gkeop - 5.15.0-1063.71 linux-image-5.15.0-1063-gkeop - 5.15.0-1063.71 linux-image-unsigned-5.15.0-1063-gkeop - 5.15.0-1063.71 linux-modules-5.15.0-1063-gkeop - 5.15.0-1063.71 linux-modules-extra-5.15.0-1063-gkeop - 5.15.0-1063.71 linux-tools-5.15.0-1063-gkeop - 5.15.0-1063.71 No subscription required linux-buildinfo-5.15.0-1073-ibm - 5.15.0-1073.76 linux-headers-5.15.0-1073-ibm - 5.15.0-1073.76 linux-ibm-cloud-tools-common - 5.15.0-1073.76 linux-ibm-headers-5.15.0-1073 - 5.15.0-1073.76 linux-ibm-source-5.15.0 - 5.15.0-1073.76 linux-ibm-tools-5.15.0-1073 - 5.15.0-1073.76 linux-ibm-tools-common - 5.15.0-1073.76 linux-image-5.15.0-1073-ibm - 5.15.0-1073.76 linux-image-unsigned-5.15.0-1073-ibm - 5.15.0-1073.76 linux-modules-5.15.0-1073-ibm - 5.15.0-1073.76 linux-modules-extra-5.15.0-1073-ibm - 5.15.0-1073.76 linux-tools-5.15.0-1073-ibm - 5.15.0-1073.76 No subscription required linux-buildinfo-5.15.0-1075-raspi - 5.15.0-1075.78 linux-headers-5.15.0-1075-raspi - 5.15.0-1075.78 linux-image-5.15.0-1075-raspi - 5.15.0-1075.78 linux-modules-5.15.0-1075-raspi - 5.15.0-1075.78 linux-modules-extra-5.15.0-1075-raspi - 5.15.0-1075.78 linux-raspi-headers-5.15.0-1075 - 5.15.0-1075.78 linux-raspi-tools-5.15.0-1075 - 5.15.0-1075.78 linux-tools-5.15.0-1075-raspi - 5.15.0-1075.78 No subscription required linux-buildinfo-5.15.0-1076-intel-iotg - 5.15.0-1076.82 linux-cloud-tools-5.15.0-1076-intel-iotg - 5.15.0-1076.82 linux-headers-5.15.0-1076-intel-iotg - 5.15.0-1076.82 linux-image-5.15.0-1076-intel-iotg - 5.15.0-1076.82 linux-image-unsigned-5.15.0-1076-intel-iotg - 5.15.0-1076.82 linux-intel-iotg-cloud-tools-5.15.0-1076 - 5.15.0-1076.82 linux-intel-iotg-cloud-tools-common - 5.15.0-1076.82 linux-intel-iotg-headers-5.15.0-1076 - 5.15.0-1076.82 linux-intel-iotg-tools-5.15.0-1076 - 5.15.0-1076.82 linux-intel-iotg-tools-common - 5.15.0-1076.82 linux-intel-iotg-tools-host - 5.15.0-1076.82 linux-modules-5.15.0-1076-intel-iotg - 5.15.0-1076.82 linux-modules-extra-5.15.0-1076-intel-iotg - 5.15.0-1076.82 linux-modules-iwlwifi-5.15.0-1076-intel-iotg - 5.15.0-1076.82 linux-tools-5.15.0-1076-intel-iotg - 5.15.0-1076.82 No subscription required linux-buildinfo-5.15.0-1077-kvm - 5.15.0-1077.82 linux-headers-5.15.0-1077-kvm - 5.15.0-1077.82 linux-image-5.15.0-1077-kvm - 5.15.0-1077.82 linux-image-unsigned-5.15.0-1077-kvm - 5.15.0-1077.82 linux-kvm-headers-5.15.0-1077 - 5.15.0-1077.82 linux-kvm-tools-5.15.0-1077 - 5.15.0-1077.82 linux-modules-5.15.0-1077-kvm - 5.15.0-1077.82 linux-tools-5.15.0-1077-kvm - 5.15.0-1077.82 No subscription required linux-buildinfo-5.15.0-1078-gke - 5.15.0-1078.84 linux-buildinfo-5.15.0-1078-oracle - 5.15.0-1078.84 linux-gke-headers-5.15.0-1078 - 5.15.0-1078.84 linux-gke-tools-5.15.0-1078 - 5.15.0-1078.84 linux-headers-5.15.0-1078-gke - 5.15.0-1078.84 linux-headers-5.15.0-1078-oracle - 5.15.0-1078.84 linux-image-5.15.0-1078-gke - 5.15.0-1078.84 linux-image-5.15.0-1078-oracle - 5.15.0-1078.84 linux-image-unsigned-5.15.0-1078-gke - 5.15.0-1078.84 linux-image-unsigned-5.15.0-1078-oracle - 5.15.0-1078.84 linux-modules-5.15.0-1078-gke - 5.15.0-1078.84 linux-modules-5.15.0-1078-oracle - 5.15.0-1078.84 linux-modules-extra-5.15.0-1078-gke - 5.15.0-1078.84 linux-modules-extra-5.15.0-1078-oracle - 5.15.0-1078.84 linux-oracle-headers-5.15.0-1078 - 5.15.0-1078.84 linux-oracle-tools-5.15.0-1078 - 5.15.0-1078.84 linux-tools-5.15.0-1078-gke - 5.15.0-1078.84 linux-tools-5.15.0-1078-oracle - 5.15.0-1078.84 No subscription required linux-buildinfo-5.15.0-1080-gcp - 5.15.0-1080.89 linux-gcp-headers-5.15.0-1080 - 5.15.0-1080.89 linux-gcp-tools-5.15.0-1080 - 5.15.0-1080.89 linux-headers-5.15.0-1080-gcp - 5.15.0-1080.89 linux-image-5.15.0-1080-gcp - 5.15.0-1080.89 linux-image-unsigned-5.15.0-1080-gcp - 5.15.0-1080.89 linux-modules-5.15.0-1080-gcp - 5.15.0-1080.89 linux-modules-extra-5.15.0-1080-gcp - 5.15.0-1080.89 linux-tools-5.15.0-1080-gcp - 5.15.0-1080.89 No subscription required linux-aws-cloud-tools-5.15.0-1081 - 5.15.0-1081.88 linux-aws-headers-5.15.0-1081 - 5.15.0-1081.88 linux-aws-tools-5.15.0-1081 - 5.15.0-1081.88 linux-buildinfo-5.15.0-1081-aws - 5.15.0-1081.88 linux-cloud-tools-5.15.0-1081-aws - 5.15.0-1081.88 linux-headers-5.15.0-1081-aws - 5.15.0-1081.88 linux-image-5.15.0-1081-aws - 5.15.0-1081.88 linux-image-unsigned-5.15.0-1081-aws - 5.15.0-1081.88 linux-modules-5.15.0-1081-aws - 5.15.0-1081.88 linux-modules-extra-5.15.0-1081-aws - 5.15.0-1081.88 linux-tools-5.15.0-1081-aws - 5.15.0-1081.88 No subscription required linux-buildinfo-5.15.0-136-generic - 5.15.0-136.147 linux-buildinfo-5.15.0-136-generic-64k - 5.15.0-136.147 linux-buildinfo-5.15.0-136-generic-lpae - 5.15.0-136.147 linux-buildinfo-5.15.0-136-lowlatency - 5.15.0-136.147 linux-buildinfo-5.15.0-136-lowlatency-64k - 5.15.0-136.147 linux-cloud-tools-5.15.0-136 - 5.15.0-136.147 linux-cloud-tools-5.15.0-136-generic - 5.15.0-136.147 linux-cloud-tools-5.15.0-136-lowlatency - 5.15.0-136.147 linux-cloud-tools-common - 5.15.0-136.147 linux-doc - 5.15.0-136.147 linux-headers-5.15.0-136 - 5.15.0-136.147 linux-headers-5.15.0-136-generic - 5.15.0-136.147 linux-headers-5.15.0-136-generic-64k - 5.15.0-136.147 linux-headers-5.15.0-136-generic-lpae - 5.15.0-136.147 linux-headers-5.15.0-136-lowlatency - 5.15.0-136.147 linux-headers-5.15.0-136-lowlatency-64k - 5.15.0-136.147 linux-image-5.15.0-136-generic - 5.15.0-136.147 linux-image-5.15.0-136-generic-64k - 5.15.0-136.147 linux-image-5.15.0-136-generic-lpae - 5.15.0-136.147 linux-image-5.15.0-136-lowlatency - 5.15.0-136.147 linux-image-5.15.0-136-lowlatency-64k - 5.15.0-136.147 linux-image-unsigned-5.15.0-136-generic - 5.15.0-136.147 linux-image-unsigned-5.15.0-136-generic-64k - 5.15.0-136.147 linux-image-unsigned-5.15.0-136-lowlatency - 5.15.0-136.147 linux-image-unsigned-5.15.0-136-lowlatency-64k - 5.15.0-136.147 linux-libc-dev - 5.15.0-136.147 linux-lowlatency-cloud-tools-5.15.0-136 - 5.15.0-136.147 linux-lowlatency-headers-5.15.0-136 - 5.15.0-136.147 linux-lowlatency-tools-5.15.0-136 - 5.15.0-136.147 linux-modules-5.15.0-136-generic - 5.15.0-136.147 linux-modules-5.15.0-136-generic-64k - 5.15.0-136.147 linux-modules-5.15.0-136-generic-lpae - 5.15.0-136.147 linux-modules-5.15.0-136-lowlatency - 5.15.0-136.147 linux-modules-5.15.0-136-lowlatency-64k - 5.15.0-136.147 linux-modules-extra-5.15.0-136-generic - 5.15.0-136.147 linux-modules-iwlwifi-5.15.0-136-generic - 5.15.0-136.147 linux-modules-iwlwifi-5.15.0-136-lowlatency - 5.15.0-136.147 linux-source-5.15.0 - 5.15.0-136.147 linux-tools-5.15.0-136 - 5.15.0-136.147 linux-tools-5.15.0-136-generic - 5.15.0-136.147 linux-tools-5.15.0-136-generic-64k - 5.15.0-136.147 linux-tools-5.15.0-136-generic-lpae - 5.15.0-136.147 linux-tools-5.15.0-136-lowlatency - 5.15.0-136.147 linux-tools-5.15.0-136-lowlatency-64k - 5.15.0-136.147 linux-tools-common - 5.15.0-136.147 linux-tools-host - 5.15.0-136.147 No subscription required linux-headers-nvidia-tegra - 5.15.0.1034.34 linux-headers-nvidia-tegra-rt - 5.15.0.1034.34 linux-image-nvidia-tegra - 5.15.0.1034.34 linux-image-nvidia-tegra-rt - 5.15.0.1034.34 linux-nvidia-tegra - 5.15.0.1034.34 linux-nvidia-tegra-rt - 5.15.0.1034.34 linux-tools-nvidia-tegra - 5.15.0.1034.34 linux-tools-nvidia-tegra-rt - 5.15.0.1034.34 No subscription required linux-cloud-tools-gkeop - 5.15.0.1063.62 linux-cloud-tools-gkeop-5.15 - 5.15.0.1063.62 linux-gkeop - 5.15.0.1063.62 linux-gkeop-5.15 - 5.15.0.1063.62 linux-headers-gkeop - 5.15.0.1063.62 linux-headers-gkeop-5.15 - 5.15.0.1063.62 linux-image-gkeop - 5.15.0.1063.62 linux-image-gkeop-5.15 - 5.15.0.1063.62 linux-modules-extra-gkeop - 5.15.0.1063.62 linux-modules-extra-gkeop-5.15 - 5.15.0.1063.62 linux-tools-gkeop - 5.15.0.1063.62 linux-tools-gkeop-5.15 - 5.15.0.1063.62 No subscription required linux-headers-ibm - 5.15.0.1073.69 linux-ibm - 5.15.0.1073.69 linux-image-ibm - 5.15.0.1073.69 linux-tools-ibm - 5.15.0.1073.69 No subscription required linux-headers-raspi - 5.15.0.1075.73 linux-headers-raspi-nolpae - 5.15.0.1075.73 linux-image-raspi - 5.15.0.1075.73 linux-image-raspi-nolpae - 5.15.0.1075.73 linux-modules-extra-raspi - 5.15.0.1075.73 linux-modules-extra-raspi-nolpae - 5.15.0.1075.73 linux-raspi - 5.15.0.1075.73 linux-raspi-nolpae - 5.15.0.1075.73 linux-tools-raspi - 5.15.0.1075.73 linux-tools-raspi-nolpae - 5.15.0.1075.73 No subscription required linux-headers-intel-iotg - 5.15.0.1076.76 linux-image-intel-iotg - 5.15.0.1076.76 linux-intel-iotg - 5.15.0.1076.76 linux-tools-intel-iotg - 5.15.0.1076.76 No subscription required linux-headers-kvm - 5.15.0.1077.73 linux-image-kvm - 5.15.0.1077.73 linux-kvm - 5.15.0.1077.73 linux-tools-kvm - 5.15.0.1077.73 No subscription required linux-headers-oracle-lts-22.04 - 5.15.0.1078.74 linux-image-oracle-lts-22.04 - 5.15.0.1078.74 linux-oracle-lts-22.04 - 5.15.0.1078.74 linux-tools-oracle-lts-22.04 - 5.15.0.1078.74 No subscription required linux-gke - 5.15.0.1078.77 linux-gke-5.15 - 5.15.0.1078.77 linux-headers-gke - 5.15.0.1078.77 linux-headers-gke-5.15 - 5.15.0.1078.77 linux-image-gke - 5.15.0.1078.77 linux-image-gke-5.15 - 5.15.0.1078.77 linux-tools-gke - 5.15.0.1078.77 linux-tools-gke-5.15 - 5.15.0.1078.77 No subscription required linux-gcp-lts-22.04 - 5.15.0.1080.76 linux-headers-gcp-lts-22.04 - 5.15.0.1080.76 linux-image-gcp-lts-22.04 - 5.15.0.1080.76 linux-modules-extra-gcp-lts-22.04 - 5.15.0.1080.76 linux-tools-gcp-lts-22.04 - 5.15.0.1080.76 No subscription required linux-aws-lts-22.04 - 5.15.0.1081.83 linux-headers-aws-lts-22.04 - 5.15.0.1081.83 linux-image-aws-lts-22.04 - 5.15.0.1081.83 linux-modules-extra-aws-lts-22.04 - 5.15.0.1081.83 linux-tools-aws-lts-22.04 - 5.15.0.1081.83 No subscription required linux-cloud-tools-lowlatency - 5.15.0.136.123 linux-cloud-tools-lowlatency-hwe-20.04 - 5.15.0.136.123 linux-cloud-tools-lowlatency-hwe-20.04-edge - 5.15.0.136.123 linux-headers-lowlatency - 5.15.0.136.123 linux-headers-lowlatency-64k - 5.15.0.136.123 linux-headers-lowlatency-64k-hwe-20.04 - 5.15.0.136.123 linux-headers-lowlatency-64k-hwe-20.04-edge - 5.15.0.136.123 linux-headers-lowlatency-hwe-20.04 - 5.15.0.136.123 linux-headers-lowlatency-hwe-20.04-edge - 5.15.0.136.123 linux-image-lowlatency - 5.15.0.136.123 linux-image-lowlatency-64k - 5.15.0.136.123 linux-image-lowlatency-64k-hwe-20.04 - 5.15.0.136.123 linux-image-lowlatency-64k-hwe-20.04-edge - 5.15.0.136.123 linux-image-lowlatency-hwe-20.04 - 5.15.0.136.123 linux-image-lowlatency-hwe-20.04-edge - 5.15.0.136.123 linux-lowlatency - 5.15.0.136.123 linux-lowlatency-64k - 5.15.0.136.123 linux-lowlatency-64k-hwe-20.04 - 5.15.0.136.123 linux-lowlatency-64k-hwe-20.04-edge - 5.15.0.136.123 linux-lowlatency-hwe-20.04 - 5.15.0.136.123 linux-lowlatency-hwe-20.04-edge - 5.15.0.136.123 linux-tools-lowlatency - 5.15.0.136.123 linux-tools-lowlatency-64k - 5.15.0.136.123 linux-tools-lowlatency-64k-hwe-20.04 - 5.15.0.136.123 linux-tools-lowlatency-64k-hwe-20.04-edge - 5.15.0.136.123 linux-tools-lowlatency-hwe-20.04 - 5.15.0.136.123 linux-tools-lowlatency-hwe-20.04-edge - 5.15.0.136.123 No subscription required linux-cloud-tools-generic - 5.15.0.136.134 linux-cloud-tools-generic-hwe-20.04 - 5.15.0.136.134 linux-cloud-tools-generic-hwe-20.04-edge - 5.15.0.136.134 linux-cloud-tools-virtual - 5.15.0.136.134 linux-cloud-tools-virtual-hwe-20.04 - 5.15.0.136.134 linux-cloud-tools-virtual-hwe-20.04-edge - 5.15.0.136.134 linux-crashdump - 5.15.0.136.134 linux-generic - 5.15.0.136.134 linux-generic-64k - 5.15.0.136.134 linux-generic-64k-hwe-20.04 - 5.15.0.136.134 linux-generic-64k-hwe-20.04-edge - 5.15.0.136.134 linux-generic-hwe-20.04 - 5.15.0.136.134 linux-generic-hwe-20.04-edge - 5.15.0.136.134 linux-generic-lpae - 5.15.0.136.134 linux-generic-lpae-hwe-20.04 - 5.15.0.136.134 linux-generic-lpae-hwe-20.04-edge - 5.15.0.136.134 linux-headers-generic - 5.15.0.136.134 linux-headers-generic-64k - 5.15.0.136.134 linux-headers-generic-64k-hwe-20.04 - 5.15.0.136.134 linux-headers-generic-64k-hwe-20.04-edge - 5.15.0.136.134 linux-headers-generic-hwe-20.04 - 5.15.0.136.134 linux-headers-generic-hwe-20.04-edge - 5.15.0.136.134 linux-headers-generic-lpae - 5.15.0.136.134 linux-headers-generic-lpae-hwe-20.04 - 5.15.0.136.134 linux-headers-generic-lpae-hwe-20.04-edge - 5.15.0.136.134 linux-headers-oem-20.04 - 5.15.0.136.134 linux-headers-virtual - 5.15.0.136.134 linux-headers-virtual-hwe-20.04 - 5.15.0.136.134 linux-headers-virtual-hwe-20.04-edge - 5.15.0.136.134 linux-image-extra-virtual - 5.15.0.136.134 linux-image-extra-virtual-hwe-20.04 - 5.15.0.136.134 linux-image-extra-virtual-hwe-20.04-edge - 5.15.0.136.134 linux-image-generic - 5.15.0.136.134 linux-image-generic-64k - 5.15.0.136.134 linux-image-generic-64k-hwe-20.04 - 5.15.0.136.134 linux-image-generic-64k-hwe-20.04-edge - 5.15.0.136.134 linux-image-generic-hwe-20.04 - 5.15.0.136.134 linux-image-generic-hwe-20.04-edge - 5.15.0.136.134 linux-image-generic-lpae - 5.15.0.136.134 linux-image-generic-lpae-hwe-20.04 - 5.15.0.136.134 linux-image-generic-lpae-hwe-20.04-edge - 5.15.0.136.134 linux-image-oem-20.04 - 5.15.0.136.134 linux-image-virtual - 5.15.0.136.134 linux-image-virtual-hwe-20.04 - 5.15.0.136.134 linux-image-virtual-hwe-20.04-edge - 5.15.0.136.134 linux-modules-iwlwifi-generic - 5.15.0.136.134 linux-oem-20.04 - 5.15.0.136.134 linux-source - 5.15.0.136.134 linux-tools-generic - 5.15.0.136.134 linux-tools-generic-64k - 5.15.0.136.134 linux-tools-generic-64k-hwe-20.04 - 5.15.0.136.134 linux-tools-generic-64k-hwe-20.04-edge - 5.15.0.136.134 linux-tools-generic-hwe-20.04 - 5.15.0.136.134 linux-tools-generic-hwe-20.04-edge - 5.15.0.136.134 linux-tools-generic-lpae - 5.15.0.136.134 linux-tools-generic-lpae-hwe-20.04 - 5.15.0.136.134 linux-tools-generic-lpae-hwe-20.04-edge - 5.15.0.136.134 linux-tools-oem-20.04 - 5.15.0.136.134 linux-tools-virtual - 5.15.0.136.134 linux-tools-virtual-hwe-20.04 - 5.15.0.136.134 linux-tools-virtual-hwe-20.04-edge - 5.15.0.136.134 linux-virtual - 5.15.0.136.134 linux-virtual-hwe-20.04 - 5.15.0.136.134 linux-virtual-hwe-20.04-edge - 5.15.0.136.134 No subscription required
CVEs:

Title: USN-7412-1 -- GnuPG vulnerability
URL: https://ubuntu.com/security/notices/USN-7412-1
Priorities: medium
Description:
It was discovered that GnuPG incorrectly handled importing keys with certain crafted subkey data. If a user or automated system were tricked into importing a specially crafted key, a remote attacker may prevent users from importing other keys in the future. Update Instructions: Run sudo pro fix USN-7412-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: dirmngr - 2.2.27-3ubuntu2.3 gnupg - 2.2.27-3ubuntu2.3 gnupg-agent - 2.2.27-3ubuntu2.3 gnupg-l10n - 2.2.27-3ubuntu2.3 gnupg-utils - 2.2.27-3ubuntu2.3 gnupg2 - 2.2.27-3ubuntu2.3 gpg - 2.2.27-3ubuntu2.3 gpg-agent - 2.2.27-3ubuntu2.3 gpg-wks-client - 2.2.27-3ubuntu2.3 gpg-wks-server - 2.2.27-3ubuntu2.3 gpgconf - 2.2.27-3ubuntu2.3 gpgsm - 2.2.27-3ubuntu2.3 gpgv - 2.2.27-3ubuntu2.3 gpgv-static - 2.2.27-3ubuntu2.3 gpgv-win32 - 2.2.27-3ubuntu2.3 gpgv2 - 2.2.27-3ubuntu2.3 scdaemon - 2.2.27-3ubuntu2.3 No subscription required
CVEs: