Bugs addressed in recent updates
| Origin | Bug number | Title | Packages |
|---|---|---|---|
| CVE | CVE-2025-39883 | In the Linux kernel, the following vulnerability has been resolved: mm/memory-failure: fix VM_BUG_ON_PAGE(PagePoisoned(page)) when unpoison memory | linux linux linux-hwe-6.8 |
| CVE | CVE-2025-39880 | In the Linux kernel, the following vulnerability has been resolved: libceph: fix invalid accesses to ceph_connection_v1_info There is a place where | linux linux linux-hwe-6.8 |
| CVE | CVE-2025-39877 | In the Linux kernel, the following vulnerability has been resolved: mm/damon/sysfs: fix use-after-free in state_show() state_show() reads kdamond-> | linux linux linux-hwe-6.8 |
| CVE | CVE-2025-39916 | In the Linux kernel, the following vulnerability has been resolved: mm/damon/reclaim: avoid divide-by-zero in damon_reclaim_apply_parameters() When | linux linux linux-hwe-6.8 |
| CVE | CVE-2025-39909 | In the Linux kernel, the following vulnerability has been resolved: mm/damon/lru_sort: avoid divide-by-zero in damon_lru_sort_apply_parameters() Pa | linux linux linux-hwe-6.8 |
| CVE | CVE-2025-39881 | In the Linux kernel, the following vulnerability has been resolved: kernfs: Fix UAF in polling when open file is released A use-after-free (UAF) vu | linux linux linux-hwe-6.8 |
| CVE | CVE-2025-39876 | In the Linux kernel, the following vulnerability has been resolved: net: fec: Fix possible NPD in fec_enet_phy_reset_after_clk_enable() The functio | linux linux linux-hwe-6.8 |
| CVE | CVE-2025-39911 | In the Linux kernel, the following vulnerability has been resolved: i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error path If request_irq() | linux linux linux-hwe-6.8 |
| CVE | CVE-2025-39873 | In the Linux kernel, the following vulnerability has been resolved: can: xilinx_can: xcan_write_frame(): fix use-after-free of transmitted SKB can_ | linux linux linux-hwe-6.8 |
| CVE | CVE-2025-39869 | In the Linux kernel, the following vulnerability has been resolved: dmaengine: ti: edma: Fix memory allocation size for queue_priority_map Fix a cr | linux linux linux-hwe-6.8 |
| CVE | CVE-2025-39923 | In the Linux kernel, the following vulnerability has been resolved: dmaengine: qcom: bam_dma: Fix DT error handling for num-channels/ees When we do | linux linux linux-hwe-6.8 |
| CVE | CVE-2025-39927 | In the Linux kernel, the following vulnerability has been resolved: ceph: fix race condition validating r_parent before applying state Add validati | linux linux linux-hwe-6.8 |
| CVE | CVE-2025-39952 | In the Linux kernel, the following vulnerability has been resolved: wifi: wilc1000: avoid buffer overflow in WID string configuration Fix the follo | linux linux linux-hwe-6.8 |
| CVE | CVE-2025-39957 | In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: increase scan_ies_len for S1G Currently the S1G capability elem | linux linux linux-hwe-6.8 |
| CVE | CVE-2025-39953 | In the Linux kernel, the following vulnerability has been resolved: cgroup: split cgroup_destroy_wq into 3 workqueues A hung task can occur during | linux linux linux-hwe-6.8 |
| CVE | CVE-2025-39951 | In the Linux kernel, the following vulnerability has been resolved: um: virtio_uml: Fix use-after-free after put_device in probe When register_virt | linux linux linux-hwe-6.8 |
| CVE | CVE-2025-39949 | In the Linux kernel, the following vulnerability has been resolved: qed: Don't collect too many protection override GRC elements In the protection | linux linux linux-hwe-6.8 |
| CVE | CVE-2025-39947 | In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Harden uplink netdev access against device unbind The function mlx5_ | linux linux linux-hwe-6.8 |
| CVE | CVE-2025-39955 | In the Linux kernel, the following vulnerability has been resolved: tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect(). syzbot reported the sp | linux linux linux-hwe-6.8 |
| CVE | CVE-2025-39945 | In the Linux kernel, the following vulnerability has been resolved: cnic: Fix use-after-free bugs in cnic_delete_task The original code uses cancel | linux linux linux-hwe-6.8 |
About
-
Send Feedback to @ubuntu_updates