Linux LTS Kernel 5.10.257, 5.15.208, 6.1.174, 6.6.141, 6.12.91, and 6.18.33 released

Published by

The latest Linux stable kernel updates, including versions 5.10.257, 5.15.208, 6.1.174, 6.6.141, 6.12.91, and 6.18.33, introduce significant improvements in networking stack security, graphics driver stability, and virtualization routines. Key fixes address memory corruption vulnerabilities, enforce proper encryption routines for SMB, and resolve issues in GPU driver memory management that could lead to crashes. Additionally, the updates enhance filesystem stability and correct race conditions, particularly in Ceph and FUSE, preventing kernel panics and crashes during high-load scenarios. Overall, these updates prioritize closing security gaps and improving system reliability across various hardware configurations, making it essential for users to apply them promptly



Linux LTS Kernel 5.10.257, 5.15.208, 6.1.174, 6.6.141, 6.12.91, and 6.18.33 released

The latest Linux stable kernel updates harden the networking stack by fixing shared fragment marker leaks that could enable memory corruption via ESP decryption and correcting SMB AES-256 key derivation for Kerberos authentication. Graphics drivers receive targeted patches to prevent infinite loops in V3D, resolve VRAM eviction issues on Intel hardware, fix return value leaks in Panfrost, and clean up I2C adapter reference counting on legacy GMA500 systems. Virtualization and security routines get tightened with bounds checking for KVM dirty ring tracking and AMD IOMMU device lookups, alongside a correction to audit logging that was misreporting capability sets. Core kernel improvements include reverting aggressive scheduler preemption logic, fixing BPF verifier register tracking for 32-bit operations, and resolving workqueue allocation leaks during failed unbound queue setups.

Linux LTS Kernel 5.10.257, 5.15.208, 6.1.174, 6.6.141, 6.12.91, and 6.18.33 released @ Linux Compatible