This bug was fixed in the package linux-gcp-6.8 - 6.8.0-1058.61~22.04.1

---------------
linux-gcp-6.8 (6.8.0-1058.61~22.04.1) jammy; urgency=medium

  * jammy/linux-gcp-6.8: 6.8.0-1058.61~22.04.1 -proposed tracker (LP:
#2151035)

  [ Ubuntu-gcp: 6.8.0-1058.61 ]

  * noble/linux-gcp: 6.8.0-1058.61 -proposed tracker (LP: #2151036)
  [ Ubuntu: 6.8.0-117.117 ]
  * noble/linux: 6.8.0-117.117 -proposed tracker (LP: #2151070)
  * CVE-2026-31419
    - net: bonding: fix use-after-free in bond_xmit_broadcast()
  * CVE-2026-31431
    - crypto: scatterwalk - Backport memcpy_sglist()
    - crypto: algif_aead - use memcpy_sglist() instead of null skcipher
    - crypto: algif_aead - Revert to operating out-of-place
    - crypto: algif_aead - snapshot IV for async AEAD requests
    - crypto: authenc - use memcpy_sglist() instead of null skcipher
    - crypto: authencesn - Do not place hiseq at end of dst for out-of-place
      decryption
    - crypto: authencesn - Fix src offset when decrypting in-place
    - crypto: af_alg - Fix page reassignment overflow in af_alg_pull_tsgl
    - crypto: algif_aead - Fix minimum RX size check for decryption
  * CVE-2026-31533
    - net/tls: fix use-after-free in -EBUSY error path of tls_do_encryption
  * CVE-2026-31504
    - net: fix fanout UAF in packet_release() via NETDEV_UP race

 -- Manuel Diewald <[email protected]>  Thu, 07 May 2026
14:21:07 +0200

** Changed in: linux-gcp-6.8 (Ubuntu Jammy)
       Status: Fix Committed => Fix Released

** CVE added: https://cve.org/CVERecord?id=CVE-2026-31419

** CVE added: https://cve.org/CVERecord?id=CVE-2026-31431

** CVE added: https://cve.org/CVERecord?id=CVE-2026-31504

** CVE added: https://cve.org/CVERecord?id=CVE-2026-31533

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2148627

Title:
  Disable IOMMU Passthrough by default

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp-6.8/+bug/2148627/+subscriptions


-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to