{
    "summary": {
        "snap": {
            "added": [],
            "removed": [],
            "diff": []
        },
        "deb": {
            "added": [
                "linux-image-6.8.0-85-generic",
                "linux-modules-6.8.0-85-generic"
            ],
            "removed": [
                "linux-image-6.8.0-84-generic",
                "linux-modules-6.8.0-84-generic"
            ],
            "diff": [
                "cloud-init",
                "libssl3t64",
                "linux-image-virtual",
                "openssl",
                "ubuntu-drivers-common"
            ]
        }
    },
    "diff": {
        "deb": [
            {
                "name": "cloud-init",
                "from_version": {
                    "source_package_name": "cloud-init",
                    "source_package_version": "25.1.4-0ubuntu0~24.04.1",
                    "version": "25.1.4-0ubuntu0~24.04.1"
                },
                "to_version": {
                    "source_package_name": "cloud-init",
                    "source_package_version": "25.2-0ubuntu1~24.04.1",
                    "version": "25.2-0ubuntu1~24.04.1"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2120495
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * add d/p/strip-invalid-mtu.patch",
                            "    - Provides backwards compatibility for an otherwise invalid",
                            "      MTU in a netplan config. (GH-6239)",
                            "  * d/cloud-init.templates:",
                            "    - Move VMware before OVF. See GH-4030",
                            "    - Enable CloudCIX by default",
                            "  * refresh patches:",
                            "    - d/p/no-single-process.patch",
                            "  * Upstream snapshot based on 25.2. (LP: #2120495).",
                            "    List of changes from upstream can be found at",
                            "    https://raw.githubusercontent.com/canonical/cloud-init/25.2/ChangeLog",
                            ""
                        ],
                        "package": "cloud-init",
                        "version": "25.2-0ubuntu1~24.04.1",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2120495
                        ],
                        "author": "James Falcon <james.falcon@canonical.com>",
                        "date": "Tue, 12 Aug 2025 16:19:32 -0500"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libssl3t64",
                "from_version": {
                    "source_package_name": "openssl",
                    "source_package_version": "3.0.13-0ubuntu3.5",
                    "version": "3.0.13-0ubuntu3.5"
                },
                "to_version": {
                    "source_package_name": "openssl",
                    "source_package_version": "3.0.13-0ubuntu3.6",
                    "version": "3.0.13-0ubuntu3.6"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-9230",
                        "url": "https://ubuntu.com/security/CVE-2025-9230",
                        "cve_description": "Out-of-bounds read & write in RFC 3211 KEK Unwrap",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-09-30"
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-9230",
                                "url": "https://ubuntu.com/security/CVE-2025-9230",
                                "cve_description": "Out-of-bounds read & write in RFC 3211 KEK Unwrap",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-09-30"
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Out-of-bounds read & write in RFC 3211 KEK Unwrap",
                            "    - debian/patches/CVE-2025-9230.patch: fix incorrect check of unwrapped",
                            "      key size in crypto/cms/cms_pwri.c.",
                            "    - CVE-2025-9230",
                            ""
                        ],
                        "package": "openssl",
                        "version": "3.0.13-0ubuntu3.6",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Marc Deslauriers <marc.deslauriers@ubuntu.com>",
                        "date": "Thu, 18 Sep 2025 07:12:48 -0400"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "linux-image-virtual",
                "from_version": {
                    "source_package_name": "linux-meta",
                    "source_package_version": "6.8.0-84.84",
                    "version": "6.8.0-84.84"
                },
                "to_version": {
                    "source_package_name": "linux-meta",
                    "source_package_version": "6.8.0-85.85",
                    "version": "6.8.0-85.85"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    1786013
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Main version: 6.8.0-85.85",
                            "",
                            "  * Packaging resync (LP: #1786013)",
                            "    - [Packaging] resync git-ubuntu-log",
                            ""
                        ],
                        "package": "linux-meta",
                        "version": "6.8.0-85.85",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            1786013
                        ],
                        "author": "Manuel Diewald <manuel.diewald@canonical.com>",
                        "date": "Thu, 18 Sep 2025 15:17:46 +0200"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "openssl",
                "from_version": {
                    "source_package_name": "openssl",
                    "source_package_version": "3.0.13-0ubuntu3.5",
                    "version": "3.0.13-0ubuntu3.5"
                },
                "to_version": {
                    "source_package_name": "openssl",
                    "source_package_version": "3.0.13-0ubuntu3.6",
                    "version": "3.0.13-0ubuntu3.6"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-9230",
                        "url": "https://ubuntu.com/security/CVE-2025-9230",
                        "cve_description": "Out-of-bounds read & write in RFC 3211 KEK Unwrap",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-09-30"
                    }
                ],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-9230",
                                "url": "https://ubuntu.com/security/CVE-2025-9230",
                                "cve_description": "Out-of-bounds read & write in RFC 3211 KEK Unwrap",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-09-30"
                            }
                        ],
                        "log": [
                            "",
                            "  * SECURITY UPDATE: Out-of-bounds read & write in RFC 3211 KEK Unwrap",
                            "    - debian/patches/CVE-2025-9230.patch: fix incorrect check of unwrapped",
                            "      key size in crypto/cms/cms_pwri.c.",
                            "    - CVE-2025-9230",
                            ""
                        ],
                        "package": "openssl",
                        "version": "3.0.13-0ubuntu3.6",
                        "urgency": "medium",
                        "distributions": "noble-security",
                        "launchpad_bugs_fixed": [],
                        "author": "Marc Deslauriers <marc.deslauriers@ubuntu.com>",
                        "date": "Thu, 18 Sep 2025 07:12:48 -0400"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "ubuntu-drivers-common",
                "from_version": {
                    "source_package_name": "ubuntu-drivers-common",
                    "source_package_version": "1:0.9.7.6ubuntu3.2",
                    "version": "1:0.9.7.6ubuntu3.2"
                },
                "to_version": {
                    "source_package_name": "ubuntu-drivers-common",
                    "source_package_version": "1:0.9.7.6ubuntu3.4",
                    "version": "1:0.9.7.6ubuntu3.4"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2071829,
                    2115537
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Remove outdated dependency to fix ADT failures (LP: #2071829)",
                            ""
                        ],
                        "package": "ubuntu-drivers-common",
                        "version": "1:0.9.7.6ubuntu3.4",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2071829
                        ],
                        "author": "Mitchell Augustin <mitchell.augustin@canonical.com>",
                        "date": "Fri, 12 Sep 2025 11:44:10 -0500"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Clarify gpgpu flag help text (LP: #2115537)",
                            ""
                        ],
                        "package": "ubuntu-drivers-common",
                        "version": "1:0.9.7.6ubuntu3.3",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2115537
                        ],
                        "author": "Mitchell Augustin <mitchell.augustin@canonical.com>",
                        "date": "Tue, 01 Jul 2025 16:49:10 -0500"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            }
        ],
        "snap": []
    },
    "added": {
        "deb": [
            {
                "name": "linux-image-6.8.0-85-generic",
                "from_version": {
                    "source_package_name": "linux-signed",
                    "source_package_version": "6.8.0-84.84",
                    "version": null
                },
                "to_version": {
                    "source_package_name": "linux-signed",
                    "source_package_version": "6.8.0-85.85",
                    "version": "6.8.0-85.85"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    1786013
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Main version: 6.8.0-85.85",
                            "",
                            "  * Packaging resync (LP: #1786013)",
                            "    - [Packaging] resync git-ubuntu-log",
                            "    - [Packaging] debian/tracking-bug -- resync from main package",
                            ""
                        ],
                        "package": "linux-signed",
                        "version": "6.8.0-85.85",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            1786013
                        ],
                        "author": "Manuel Diewald <manuel.diewald@canonical.com>",
                        "date": "Thu, 18 Sep 2025 15:17:56 +0200"
                    }
                ],
                "notes": "linux-image-6.8.0-85-generic version '6.8.0-85.85' (source package linux-signed version '6.8.0-85.85') was added. linux-image-6.8.0-85-generic version '6.8.0-85.85' has the same source package name, linux-signed, as removed package linux-image-6.8.0-84-generic. As such we can use the source package version of the removed package, '6.8.0-84.84', as the starting point in our changelog diff. Kernel packages are an example of where the binary package name changes for the same source package. Using the removed package source package version as our starting point means we can still get meaningful changelog diffs even for what appears to be a new package.",
                "is_version_downgrade": false
            },
            {
                "name": "linux-modules-6.8.0-85-generic",
                "from_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.8.0-84.84",
                    "version": null
                },
                "to_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.8.0-85.85",
                    "version": "6.8.0-85.85"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-38500",
                        "url": "https://ubuntu.com/security/CVE-2025-38500",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  xfrm: interface: fix use-after-free after changing collect_md xfrm interface  collect_md property on xfrm interfaces can only be set on device creation, thus xfrmi_changelink() should fail when called on such interfaces.  The check to enforce this was done only in the case where the xi was returned from xfrmi_locate() which doesn't look for the collect_md interface, and thus the validation was never reached.  Calling changelink would thus errornously place the special interface xi in the xfrmi_net->xfrmi hash, but since it also exists in the xfrmi_net->collect_md_xfrmi pointer it would lead to a double free when the net namespace was taken down [1].  Change the check to use the xi from netdev_priv which is available earlier in the function to prevent changes in xfrm collect_md interfaces.  [1] resulting oops: [    8.516540] kernel BUG at net/core/dev.c:12029! [    8.516552] Oops: invalid opcode: 0000 [#1] SMP NOPTI [    8.516559] CPU: 0 UID: 0 PID: 12 Comm: kworker/u80:0 Not tainted 6.15.0-virtme #5 PREEMPT(voluntary) [    8.516565] Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [    8.516569] Workqueue: netns cleanup_net [    8.516579] RIP: 0010:unregister_netdevice_many_notify+0x101/0xab0 [    8.516590] Code: 90 0f 0b 90 48 8b b0 78 01 00 00 48 8b 90 80 01 00 00 48 89 56 08 48 89 32 4c 89 80 78 01 00 00 48 89 b8 80 01 00 00 eb ac 90 <0f> 0b 48 8b 45 00 4c 8d a0 88 fe ff ff 48 39 c5 74 5c 41 80 bc 24 [    8.516593] RSP: 0018:ffffa93b8006bd30 EFLAGS: 00010206 [    8.516598] RAX: ffff98fe4226e000 RBX: ffffa93b8006bd58 RCX: ffffa93b8006bc60 [    8.516601] RDX: 0000000000000004 RSI: 0000000000000000 RDI: dead000000000122 [    8.516603] RBP: ffffa93b8006bdd8 R08: dead000000000100 R09: ffff98fe4133c100 [    8.516605] R10: 0000000000000000 R11: 00000000000003d2 R12: ffffa93b8006be00 [    8.516608] R13: ffffffff96c1a510 R14: ffffffff96c1a510 R15: ffffa93b8006be00 [    8.516615] FS:  0000000000000000(0000) GS:ffff98fee73b7000(0000) knlGS:0000000000000000 [    8.516619] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [    8.516622] CR2: 00007fcd2abd0700 CR3: 000000003aa40000 CR4: 0000000000752ef0 [    8.516625] PKRU: 55555554 [    8.516627] Call Trace: [    8.516632]  <TASK> [    8.516635]  ? rtnl_is_locked+0x15/0x20 [    8.516641]  ? unregister_netdevice_queue+0x29/0xf0 [    8.516650]  ops_undo_list+0x1f2/0x220 [    8.516659]  cleanup_net+0x1ad/0x2e0 [    8.516664]  process_one_work+0x160/0x380 [    8.516673]  worker_thread+0x2aa/0x3c0 [    8.516679]  ? __pfx_worker_thread+0x10/0x10 [    8.516686]  kthread+0xfb/0x200 [    8.516690]  ? __pfx_kthread+0x10/0x10 [    8.516693]  ? __pfx_kthread+0x10/0x10 [    8.516697]  ret_from_fork+0x82/0xf0 [    8.516705]  ? __pfx_kthread+0x10/0x10 [    8.516709]  ret_from_fork_asm+0x1a/0x30 [    8.516718]  </TASK>",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-08-12 16:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-37756",
                        "url": "https://ubuntu.com/security/CVE-2025-37756",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  net: tls: explicitly disallow disconnect  syzbot discovered that it can disconnect a TLS socket and then run into all sort of unexpected corner cases. I have a vague recollection of Eric pointing this out to us a long time ago. Supporting disconnect is really hard, for one thing if offload is enabled we'd need to wait for all packets to be _acked_. Disconnect is not commonly used, disallow it.  The immediate problem syzbot run into is the warning in the strp, but that's just the easiest bug to trigger:    WARNING: CPU: 0 PID: 5834 at net/tls/tls_strp.c:486 tls_strp_msg_load+0x72e/0xa80 net/tls/tls_strp.c:486   RIP: 0010:tls_strp_msg_load+0x72e/0xa80 net/tls/tls_strp.c:486   Call Trace:    <TASK>    tls_rx_rec_wait+0x280/0xa60 net/tls/tls_sw.c:1363    tls_sw_recvmsg+0x85c/0x1c30 net/tls/tls_sw.c:2043    inet6_recvmsg+0x2c9/0x730 net/ipv6/af_inet6.c:678    sock_recvmsg_nosec net/socket.c:1023 [inline]    sock_recvmsg+0x109/0x280 net/socket.c:1045    __sys_recvfrom+0x202/0x380 net/socket.c:2237",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-05-01 13:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38477",
                        "url": "https://ubuntu.com/security/CVE-2025-38477",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  net/sched: sch_qfq: Fix race condition on qfq_aggregate  A race condition can occur when 'agg' is modified in qfq_change_agg (called during qfq_enqueue) while other threads access it concurrently. For example, qfq_dump_class may trigger a NULL dereference, and qfq_delete_class may cause a use-after-free.  This patch addresses the issue by:  1. Moved qfq_destroy_class into the critical section.  2. Added sch_tree_lock protection to qfq_dump_class and qfq_dump_class_stats.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-07-28 12:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38618",
                        "url": "https://ubuntu.com/security/CVE-2025-38618",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  vsock: Do not allow binding to VMADDR_PORT_ANY  It is possible for a vsock to autobind to VMADDR_PORT_ANY. This can cause a use-after-free when a connection is made to the bound socket. The socket returned by accept() also has port VMADDR_PORT_ANY but is not on the list of unbound sockets. Binding it will result in an extra refcount decrement similar to the one fixed in fcdd2242c023 (vsock: Keep the binding until socket destruction).  Modify the check in __vsock_bind_connectible() to also prevent binding to VMADDR_PORT_ANY.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-08-22 14:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38617",
                        "url": "https://ubuntu.com/security/CVE-2025-38617",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  net/packet: fix a race in packet_set_ring() and packet_notifier()  When packet_set_ring() releases po->bind_lock, another thread can run packet_notifier() and process an NETDEV_UP event.  This race and the fix are both similar to that of commit 15fe076edea7 (\"net/packet: fix a race in packet_bind() and packet_notifier()\").  There too the packet_notifier NETDEV_UP event managed to run while a po->bind_lock critical section had to be temporarily released. And the fix was similarly to temporarily set po->num to zero to keep the socket unhooked until the lock is retaken.  The po->bind_lock in packet_set_ring and packet_notifier precede the introduction of git history.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-08-22 14:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-37785",
                        "url": "https://ubuntu.com/security/CVE-2025-37785",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  ext4: fix OOB read when checking dotdot dir  Mounting a corrupted filesystem with directory which contains '.' dir entry with rec_len == block size results in out-of-bounds read (later on, when the corrupted directory is removed).  ext4_empty_dir() assumes every ext4 directory contains at least '.' and '..' as directory entries in the first data block. It first loads the '.' dir entry, performs sanity checks by calling ext4_check_dir_entry() and then uses its rec_len member to compute the location of '..' dir entry (in ext4_next_entry). It assumes the '..' dir entry fits into the same data block.  If the rec_len of '.' is precisely one block (4KB), it slips through the sanity checks (it is considered the last directory entry in the data block) and leaves \"struct ext4_dir_entry_2 *de\" point exactly past the memory slot allocated to the data block. The following call to ext4_check_dir_entry() on new value of de then dereferences this pointer which results in out-of-bounds mem access.  Fix this by extending __ext4_check_dir_entry() to check for '.' dir entries that reach the end of data block. Make sure to ignore the phony dir entries for checksum (by checking name_len for non-zero).  Note: This is reported by KASAN as use-after-free in case another structure was recently freed from the slot past the bound, but it is really an OOB read.  This issue was found by syzkaller tool.  Call Trace: [   38.594108] BUG: KASAN: slab-use-after-free in __ext4_check_dir_entry+0x67e/0x710 [   38.594649] Read of size 2 at addr ffff88802b41a004 by task syz-executor/5375 [   38.595158] [   38.595288] CPU: 0 UID: 0 PID: 5375 Comm: syz-executor Not tainted 6.14.0-rc7 #1 [   38.595298] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014 [   38.595304] Call Trace: [   38.595308]  <TASK> [   38.595311]  dump_stack_lvl+0xa7/0xd0 [   38.595325]  print_address_description.constprop.0+0x2c/0x3f0 [   38.595339]  ? __ext4_check_dir_entry+0x67e/0x710 [   38.595349]  print_report+0xaa/0x250 [   38.595359]  ? __ext4_check_dir_entry+0x67e/0x710 [   38.595368]  ? kasan_addr_to_slab+0x9/0x90 [   38.595378]  kasan_report+0xab/0xe0 [   38.595389]  ? __ext4_check_dir_entry+0x67e/0x710 [   38.595400]  __ext4_check_dir_entry+0x67e/0x710 [   38.595410]  ext4_empty_dir+0x465/0x990 [   38.595421]  ? __pfx_ext4_empty_dir+0x10/0x10 [   38.595432]  ext4_rmdir.part.0+0x29a/0xd10 [   38.595441]  ? __dquot_initialize+0x2a7/0xbf0 [   38.595455]  ? __pfx_ext4_rmdir.part.0+0x10/0x10 [   38.595464]  ? __pfx___dquot_initialize+0x10/0x10 [   38.595478]  ? down_write+0xdb/0x140 [   38.595487]  ? __pfx_down_write+0x10/0x10 [   38.595497]  ext4_rmdir+0xee/0x140 [   38.595506]  vfs_rmdir+0x209/0x670 [   38.595517]  ? lookup_one_qstr_excl+0x3b/0x190 [   38.595529]  do_rmdir+0x363/0x3c0 [   38.595537]  ? __pfx_do_rmdir+0x10/0x10 [   38.595544]  ? strncpy_from_user+0x1ff/0x2e0 [   38.595561]  __x64_sys_unlinkat+0xf0/0x130 [   38.595570]  do_syscall_64+0x5b/0x180 [   38.595583]  entry_SYSCALL_64_after_hwframe+0x76/0x7e",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-04-18 07:15:00 UTC"
                    }
                ],
                "launchpad_bugs_fixed": [
                    2125109,
                    1786013,
                    2120516
                ],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-38500",
                                "url": "https://ubuntu.com/security/CVE-2025-38500",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  xfrm: interface: fix use-after-free after changing collect_md xfrm interface  collect_md property on xfrm interfaces can only be set on device creation, thus xfrmi_changelink() should fail when called on such interfaces.  The check to enforce this was done only in the case where the xi was returned from xfrmi_locate() which doesn't look for the collect_md interface, and thus the validation was never reached.  Calling changelink would thus errornously place the special interface xi in the xfrmi_net->xfrmi hash, but since it also exists in the xfrmi_net->collect_md_xfrmi pointer it would lead to a double free when the net namespace was taken down [1].  Change the check to use the xi from netdev_priv which is available earlier in the function to prevent changes in xfrm collect_md interfaces.  [1] resulting oops: [    8.516540] kernel BUG at net/core/dev.c:12029! [    8.516552] Oops: invalid opcode: 0000 [#1] SMP NOPTI [    8.516559] CPU: 0 UID: 0 PID: 12 Comm: kworker/u80:0 Not tainted 6.15.0-virtme #5 PREEMPT(voluntary) [    8.516565] Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [    8.516569] Workqueue: netns cleanup_net [    8.516579] RIP: 0010:unregister_netdevice_many_notify+0x101/0xab0 [    8.516590] Code: 90 0f 0b 90 48 8b b0 78 01 00 00 48 8b 90 80 01 00 00 48 89 56 08 48 89 32 4c 89 80 78 01 00 00 48 89 b8 80 01 00 00 eb ac 90 <0f> 0b 48 8b 45 00 4c 8d a0 88 fe ff ff 48 39 c5 74 5c 41 80 bc 24 [    8.516593] RSP: 0018:ffffa93b8006bd30 EFLAGS: 00010206 [    8.516598] RAX: ffff98fe4226e000 RBX: ffffa93b8006bd58 RCX: ffffa93b8006bc60 [    8.516601] RDX: 0000000000000004 RSI: 0000000000000000 RDI: dead000000000122 [    8.516603] RBP: ffffa93b8006bdd8 R08: dead000000000100 R09: ffff98fe4133c100 [    8.516605] R10: 0000000000000000 R11: 00000000000003d2 R12: ffffa93b8006be00 [    8.516608] R13: ffffffff96c1a510 R14: ffffffff96c1a510 R15: ffffa93b8006be00 [    8.516615] FS:  0000000000000000(0000) GS:ffff98fee73b7000(0000) knlGS:0000000000000000 [    8.516619] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [    8.516622] CR2: 00007fcd2abd0700 CR3: 000000003aa40000 CR4: 0000000000752ef0 [    8.516625] PKRU: 55555554 [    8.516627] Call Trace: [    8.516632]  <TASK> [    8.516635]  ? rtnl_is_locked+0x15/0x20 [    8.516641]  ? unregister_netdevice_queue+0x29/0xf0 [    8.516650]  ops_undo_list+0x1f2/0x220 [    8.516659]  cleanup_net+0x1ad/0x2e0 [    8.516664]  process_one_work+0x160/0x380 [    8.516673]  worker_thread+0x2aa/0x3c0 [    8.516679]  ? __pfx_worker_thread+0x10/0x10 [    8.516686]  kthread+0xfb/0x200 [    8.516690]  ? __pfx_kthread+0x10/0x10 [    8.516693]  ? __pfx_kthread+0x10/0x10 [    8.516697]  ret_from_fork+0x82/0xf0 [    8.516705]  ? __pfx_kthread+0x10/0x10 [    8.516709]  ret_from_fork_asm+0x1a/0x30 [    8.516718]  </TASK>",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-08-12 16:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-37756",
                                "url": "https://ubuntu.com/security/CVE-2025-37756",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  net: tls: explicitly disallow disconnect  syzbot discovered that it can disconnect a TLS socket and then run into all sort of unexpected corner cases. I have a vague recollection of Eric pointing this out to us a long time ago. Supporting disconnect is really hard, for one thing if offload is enabled we'd need to wait for all packets to be _acked_. Disconnect is not commonly used, disallow it.  The immediate problem syzbot run into is the warning in the strp, but that's just the easiest bug to trigger:    WARNING: CPU: 0 PID: 5834 at net/tls/tls_strp.c:486 tls_strp_msg_load+0x72e/0xa80 net/tls/tls_strp.c:486   RIP: 0010:tls_strp_msg_load+0x72e/0xa80 net/tls/tls_strp.c:486   Call Trace:    <TASK>    tls_rx_rec_wait+0x280/0xa60 net/tls/tls_sw.c:1363    tls_sw_recvmsg+0x85c/0x1c30 net/tls/tls_sw.c:2043    inet6_recvmsg+0x2c9/0x730 net/ipv6/af_inet6.c:678    sock_recvmsg_nosec net/socket.c:1023 [inline]    sock_recvmsg+0x109/0x280 net/socket.c:1045    __sys_recvfrom+0x202/0x380 net/socket.c:2237",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-05-01 13:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38477",
                                "url": "https://ubuntu.com/security/CVE-2025-38477",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  net/sched: sch_qfq: Fix race condition on qfq_aggregate  A race condition can occur when 'agg' is modified in qfq_change_agg (called during qfq_enqueue) while other threads access it concurrently. For example, qfq_dump_class may trigger a NULL dereference, and qfq_delete_class may cause a use-after-free.  This patch addresses the issue by:  1. Moved qfq_destroy_class into the critical section.  2. Added sch_tree_lock protection to qfq_dump_class and qfq_dump_class_stats.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-07-28 12:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38618",
                                "url": "https://ubuntu.com/security/CVE-2025-38618",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  vsock: Do not allow binding to VMADDR_PORT_ANY  It is possible for a vsock to autobind to VMADDR_PORT_ANY. This can cause a use-after-free when a connection is made to the bound socket. The socket returned by accept() also has port VMADDR_PORT_ANY but is not on the list of unbound sockets. Binding it will result in an extra refcount decrement similar to the one fixed in fcdd2242c023 (vsock: Keep the binding until socket destruction).  Modify the check in __vsock_bind_connectible() to also prevent binding to VMADDR_PORT_ANY.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-08-22 14:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38617",
                                "url": "https://ubuntu.com/security/CVE-2025-38617",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  net/packet: fix a race in packet_set_ring() and packet_notifier()  When packet_set_ring() releases po->bind_lock, another thread can run packet_notifier() and process an NETDEV_UP event.  This race and the fix are both similar to that of commit 15fe076edea7 (\"net/packet: fix a race in packet_bind() and packet_notifier()\").  There too the packet_notifier NETDEV_UP event managed to run while a po->bind_lock critical section had to be temporarily released. And the fix was similarly to temporarily set po->num to zero to keep the socket unhooked until the lock is retaken.  The po->bind_lock in packet_set_ring and packet_notifier precede the introduction of git history.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-08-22 14:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-37785",
                                "url": "https://ubuntu.com/security/CVE-2025-37785",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  ext4: fix OOB read when checking dotdot dir  Mounting a corrupted filesystem with directory which contains '.' dir entry with rec_len == block size results in out-of-bounds read (later on, when the corrupted directory is removed).  ext4_empty_dir() assumes every ext4 directory contains at least '.' and '..' as directory entries in the first data block. It first loads the '.' dir entry, performs sanity checks by calling ext4_check_dir_entry() and then uses its rec_len member to compute the location of '..' dir entry (in ext4_next_entry). It assumes the '..' dir entry fits into the same data block.  If the rec_len of '.' is precisely one block (4KB), it slips through the sanity checks (it is considered the last directory entry in the data block) and leaves \"struct ext4_dir_entry_2 *de\" point exactly past the memory slot allocated to the data block. The following call to ext4_check_dir_entry() on new value of de then dereferences this pointer which results in out-of-bounds mem access.  Fix this by extending __ext4_check_dir_entry() to check for '.' dir entries that reach the end of data block. Make sure to ignore the phony dir entries for checksum (by checking name_len for non-zero).  Note: This is reported by KASAN as use-after-free in case another structure was recently freed from the slot past the bound, but it is really an OOB read.  This issue was found by syzkaller tool.  Call Trace: [   38.594108] BUG: KASAN: slab-use-after-free in __ext4_check_dir_entry+0x67e/0x710 [   38.594649] Read of size 2 at addr ffff88802b41a004 by task syz-executor/5375 [   38.595158] [   38.595288] CPU: 0 UID: 0 PID: 5375 Comm: syz-executor Not tainted 6.14.0-rc7 #1 [   38.595298] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014 [   38.595304] Call Trace: [   38.595308]  <TASK> [   38.595311]  dump_stack_lvl+0xa7/0xd0 [   38.595325]  print_address_description.constprop.0+0x2c/0x3f0 [   38.595339]  ? __ext4_check_dir_entry+0x67e/0x710 [   38.595349]  print_report+0xaa/0x250 [   38.595359]  ? __ext4_check_dir_entry+0x67e/0x710 [   38.595368]  ? kasan_addr_to_slab+0x9/0x90 [   38.595378]  kasan_report+0xab/0xe0 [   38.595389]  ? __ext4_check_dir_entry+0x67e/0x710 [   38.595400]  __ext4_check_dir_entry+0x67e/0x710 [   38.595410]  ext4_empty_dir+0x465/0x990 [   38.595421]  ? __pfx_ext4_empty_dir+0x10/0x10 [   38.595432]  ext4_rmdir.part.0+0x29a/0xd10 [   38.595441]  ? __dquot_initialize+0x2a7/0xbf0 [   38.595455]  ? __pfx_ext4_rmdir.part.0+0x10/0x10 [   38.595464]  ? __pfx___dquot_initialize+0x10/0x10 [   38.595478]  ? down_write+0xdb/0x140 [   38.595487]  ? __pfx_down_write+0x10/0x10 [   38.595497]  ext4_rmdir+0xee/0x140 [   38.595506]  vfs_rmdir+0x209/0x670 [   38.595517]  ? lookup_one_qstr_excl+0x3b/0x190 [   38.595529]  do_rmdir+0x363/0x3c0 [   38.595537]  ? __pfx_do_rmdir+0x10/0x10 [   38.595544]  ? strncpy_from_user+0x1ff/0x2e0 [   38.595561]  __x64_sys_unlinkat+0xf0/0x130 [   38.595570]  do_syscall_64+0x5b/0x180 [   38.595583]  entry_SYSCALL_64_after_hwframe+0x76/0x7e",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-04-18 07:15:00 UTC"
                            }
                        ],
                        "log": [
                            "",
                            "  * noble/linux: 6.8.0-85.85 -proposed tracker (LP: #2125109)",
                            "",
                            "  * Packaging resync (LP: #1786013)",
                            "    - [Packaging] resync git-ubuntu-log",
                            "",
                            "  * CVE-2025-38500",
                            "    - xfrm: interface: fix use-after-free after changing collect_md xfrm",
                            "      interface",
                            "",
                            "  * TLS socket disconnection causes various issues (LP: #2120516) //",
                            "    CVE-2025-37756",
                            "    - net: tls: explicitly disallow disconnect",
                            "",
                            "  * CVE-2025-38477",
                            "    - net/sched: sch_qfq: Fix race condition on qfq_aggregate",
                            "    - net/sched: sch_qfq: Avoid triggering might_sleep in atomic context in",
                            "      qfq_delete_class",
                            "",
                            "  * CVE-2025-38618",
                            "    - vsock: Do not allow binding to VMADDR_PORT_ANY",
                            "",
                            "  * CVE-2025-38617",
                            "    - net/packet: fix a race in packet_set_ring() and packet_notifier()",
                            "",
                            "  * CVE-2025-37785",
                            "    - ext4: fix OOB read when checking dotdot dir",
                            ""
                        ],
                        "package": "linux",
                        "version": "6.8.0-85.85",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2125109,
                            1786013,
                            2120516
                        ],
                        "author": "Manuel Diewald <manuel.diewald@canonical.com>",
                        "date": "Thu, 18 Sep 2025 14:48:00 +0200"
                    }
                ],
                "notes": "linux-modules-6.8.0-85-generic version '6.8.0-85.85' (source package linux version '6.8.0-85.85') was added. linux-modules-6.8.0-85-generic version '6.8.0-85.85' has the same source package name, linux, as removed package linux-modules-6.8.0-84-generic. As such we can use the source package version of the removed package, '6.8.0-84.84', as the starting point in our changelog diff. Kernel packages are an example of where the binary package name changes for the same source package. Using the removed package source package version as our starting point means we can still get meaningful changelog diffs even for what appears to be a new package.",
                "is_version_downgrade": false
            }
        ],
        "snap": []
    },
    "removed": {
        "deb": [
            {
                "name": "linux-image-6.8.0-84-generic",
                "from_version": {
                    "source_package_name": "linux-signed",
                    "source_package_version": "6.8.0-84.84",
                    "version": "6.8.0-84.84"
                },
                "to_version": {
                    "source_package_name": null,
                    "source_package_version": null,
                    "version": null
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "linux-modules-6.8.0-84-generic",
                "from_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.8.0-84.84",
                    "version": "6.8.0-84.84"
                },
                "to_version": {
                    "source_package_name": null,
                    "source_package_version": null,
                    "version": null
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [],
                "notes": null,
                "is_version_downgrade": false
            }
        ],
        "snap": []
    },
    "notes": "Changelog diff for Ubuntu 24.04 noble image from daily image serial 20250925 to 20251001",
    "from_series": "noble",
    "to_series": "noble",
    "from_serial": "20250925",
    "to_serial": "20251001",
    "from_manifest_filename": "daily_manifest.previous",
    "to_manifest_filename": "manifest.current"
}