UbuntuUpdates.org

Package "linux-libc-dev"

This package belongs to a PPA: Canonical Kernel Team

Name: linux-libc-dev

Description:

Linux Kernel Headers for development

Latest version: 5.15.0-172.182
Release: jammy (22.04)
Level: base
Repository: main
Head package: linux

Links


Download "linux-libc-dev"


Other versions of "linux-libc-dev" in Jammy

Repository Area Version
base main 5.15.0-25.25
security main 5.15.0-170.180
updates main 5.15.0-170.180
proposed main 5.15.0-172.182

Changelog

Version: 5.15.0-172.182 2026-02-07 11:09:06 UTC

 linux (5.15.0-172.182) jammy; urgency=medium
 .
   * jammy/linux: 5.15.0-172.182 -proposed tracker (LP: #2141059)
 .
   * Jammy update: v5.15.198 upstream stable release (LP: #2139704)
     - Revert "xfrm: destroy xfrm_state synchronously on net exit path"
     - xfrm: flush all states in xfrm_state_fini
     - dpaa2-mac: bail if the dpmacs fwnode is not found
     - drm/i915/selftests: Fix inconsistent IS_ERR and PTR_ERR
     - leds: Replace all non-returning strlcpy with strscpy
     - leds: spi-byte: Use devm_led_classdev_register_ext()
     - Documentation: process: Also mention Sasha Levin as stable tree
       maintainer
     - USB: serial: option: add Foxconn T99W760
     - USB: serial: option: add Telit Cinterion FE910C04 new compositions
     - USB: serial: option: move Telit 0x10c7 composition in the right place
     - USB: serial: ftdi_sio: match on interface number for jtag
     - serial: add support of CPCI cards
     - USB: serial: belkin_sa: fix TIOCMBIS and TIOCMBIC
     - USB: serial: kobil_sct: fix TIOCMBIS and TIOCMBIC
     - spi: xilinx: increase number of retries before declaring stall
     - spi: imx: keep dma request disabled before dma transfer setup
     - pinctrl: qcom: msm: Fix deadlock in pinmux configuration
     - platform/x86: acer-wmi: Ignore backlight event
     - platform/x86: huawei-wmi: add keys for HONOR models
     - HID: elecom: Add support for ELECOM M-XT3URBK (018F)
     - drm/panel: visionox-rm69299: Don't clear all mode flags
     - USB: Fix descriptor count when handling invalid MBIM extended descriptor
     - irqchip/qcom-irq-combiner: Fix section mismatch
     - rculist: Add hlist_nulls_replace_rcu() and
       hlist_nulls_replace_init_rcu()
     - inet: Avoid ehash lookup race in inet_ehash_insert()
     - iio: imu: st_lsm6dsx: introduce st_lsm6dsx_device_set_enable routine
     - iio: imu: st_lsm6dsx: discard samples during filters settling time
     - iio: imu: st_lsm6dsx: Fix measurement unit for odr struct member
     - arm64: dts: imx8mm-venice-gw72xx: remove unused sdhc1 pinctrl
     - uio: uio_fsl_elbc_gpcm:: Add null pointer check to
       uio_fsl_elbc_gpcm_probe
     - crypto: hisilicon/qm - restore original qos values
     - s390/smp: Fix fallback CPU detection
     - s390/ap: Don't leak debug feature files if AP instructions are not
       available
     - firmware: imx: scu-irq: fix OF node leak in
     - phy: mscc: Fix PTP for VSC8574 and VSC8572
     - sctp: Defer SCTP_DBG_OBJCNT_DEC() to sctp_destroy_sock().
     - compiler-gcc.h: Define __SANITIZE_ADDRESS__ under hwaddress sanitizer
     - kmsan: introduce __no_sanitize_memory and __no_kmsan_checks
     - x86: kmsan: don't instrument stack walking functions
     - x86/dumpstack: Prevent KASAN false positive warnings in __show_regs()
     - pinctrl: stm32: fix hwspinlock resource leak in probe function
     - i3c: fix refcount inconsistency in i3c_master_register
     - i3c: master: svc: Prevent incomplete IBI transaction
     - power: supply: wm831x: Check wm831x_set_bits() return value
     - power: supply: apm_power: only unset own apm_get_power_status
     - scsi: target: Do not write NUL characters into ASCII configfs output
     - spi: tegra210-quad: use device_reset method
     - spi: tegra210-quad: add new chips to compatible
     - spi: tegra210-quad: combined sequence mode
     - spi: tegra210-quad: modify chip select (CS) deactivation
     - mfd: da9055: Fix missing regmap_del_irq_chip() in error path
     - ext4: minor defrag code improvements
     - ext4: correct the checking of quota files before moving extents
     - perf/x86/intel: Correct large PEBS flag check
     - regulator: core: disable supply if enabling main regulator fails
     - nbd: clean up return value checking of sock_xmit()
     - nbd: partition nbd_read_stat() into nbd_read_reply() and
       nbd_handle_reply()
     - scsi: stex: Fix reboot_notifier leak in probe error path
     - dt-bindings: PCI: convert amlogic,meson-pcie.txt to dt-schema
     - dt-bindings: PCI: amlogic: Fix the register name of the DBI region
     - RDMA/rtrs: server: Fix error handling in get_or_create_srv
     - ntfs3: init run lock for extend inode
     - powerpc/32: Fix unpaired stwcx. on interrupt exit
     - wifi: cw1200: Fix potential memory leak in cw1200_bh_rx_helper()
     - coresight: etm4x: Save restore TRFCR_EL1
     - coresight: etm4x: Use Trace Filtering controls dynamically
     - coresight-etm4x: add isb() before reading the TRCSTATR
     - coresight: etm4x: Extract the trace unit controlling
     - coresight: etm4x: Add context synchronization before enabling trace
     - clk: renesas: r9a06g032: Fix memory leak in error path
     - lib/vsprintf: Check pointer before dereferencing in time_and_date()
     - ACPI: property: Fix fwnode refcount leak in
       acpi_fwnode_graph_parse_endpoint()
     - scsi: sim710: Fix resource leak by adding missing ioport_unmap() calls
     - leds: netxbig: Fix GPIO descriptor leak in error paths
     - PCI: keystone: Exit ks_pcie_probe() for invalid mode
     - ps3disk: use memcpy_{from,to}_bvec index
     - selftests/bpf: Fix failure paths in send_signal test
     - watchdog: wdat_wdt: Stop watchdog when uninstalling module
     - watchdog: wdat_wdt: Fix ACPI table leak in probe function
     - NFSD/blocklayout: Fix minlength check in proc_layoutget
     - powerpc/64s/ptdump: Fix kernel_hash_pagetable dump for ISA v3.00 HPTE
       format
     - fs/ntfs3: Remove unused mi_mark_free
     - fs/ntfs3: Add new argument is_mft to ntfs_mark_rec_free
     - fs/ntfs3: Make ni_ins_new_attr return error
     - fs/ntfs3: out1 also needs to put mi
     - fs/ntfs3: Prevent memory leaks in add sub record
     - drm/mediatek: Fix CCORR mtk_ctm_s31_32_to_s1_n function issue
     - pwm: bcm2835: Make sure the channel is enabled after pwm_request()
     - mfd: mt6397-irq: Fix missing irq_domain_remove() in error path
     - mfd: mt6358-irq: Fix missing irq_domain_remove() in error path
  

Source diff to previous version
2139704 Jammy update: v5.15.198 upstream stable release
2138662 Jammy update: v5.15.197 upstream stable release
CVE-2025-71182 In the Linux kernel, the following vulnerability has been resolved: can: j1939: make j1939_session_activate() fail if device is no longer registered
CVE-2022-49465 In the Linux kernel, the following vulnerability has been resolved: blk-throttle: Set BIO_THROTTLED when bio has been throttled 1.In current proces
CVE-2025-71180 In the Linux kernel, the following vulnerability has been resolved: counter: interrupt-cnt: Drop IRQF_NO_THREAD flag An IRQ handler can either be I
CVE-2026-22980 In the Linux kernel, the following vulnerability has been resolved: nfsd: provide locking for v4_end_grace Writing to v4_end_grace can race with se
CVE-2026-23021 In the Linux kernel, the following vulnerability has been resolved: net: usb: pegasus: fix memory leak in update_eth_regs_async() When asynchronous
CVE-2026-22976 In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix NULL deref when deactivating inactive aggregate in qfq_r
CVE-2026-22977 In the Linux kernel, the following vulnerability has been resolved: net: sock: fix hardened usercopy panic in sock_recv_errqueue skbuff_fclone_cach
CVE-2026-22982 In the Linux kernel, the following vulnerability has been resolved: net: mscc: ocelot: Fix crash when adding interface under a lag Commit 15faa1f67
CVE-2026-23019 In the Linux kernel, the following vulnerability has been resolved: net: marvell: prestera: fix NULL dereference on devlink_alloc() failure devlink
CVE-2025-22121 In the Linux kernel, the following vulnerability has been resolved: ext4: fix out-of-bound read in ext4_xattr_inode_dec_ref_all() There's issue as
CVE-2026-22992 In the Linux kernel, the following vulnerability has been resolved: libceph: return the handler error from mon_handle_auth_done() Currently any err
CVE-2026-22991 In the Linux kernel, the following vulnerability has been resolved: libceph: make free_choose_arg_map() resilient to partial allocation free_choose
CVE-2026-22990 In the Linux kernel, the following vulnerability has been resolved: libceph: replace overzealous BUG_ON in osdmap_apply_incremental() If the osdmap
CVE-2026-22984 In the Linux kernel, the following vulnerability has been resolved: libceph: prevent potential out-of-bounds reads in handle_auth_done() Perform an
CVE-2026-22978 In the Linux kernel, the following vulnerability has been resolved: wifi: avoid kernel-infoleak from struct iw_point struct iw_point has a 32bit ho
CVE-2026-23020 In the Linux kernel, the following vulnerability has been resolved: net: 3com: 3c59x: fix possible null dereference in vortex_probe1() pdev can be
CVE-2024-49968 In the Linux kernel, the following vulnerability has been resolved: ext4: filesystems without casefold feature cannot be mounted with siphash When
CVE-2024-36927 In the Linux kernel, the following vulnerability has been resolved: ipv4: Fix uninit-value access in __ip_make_skb() KMSAN reported uninit-value ac
CVE-2024-36903 In the Linux kernel, the following vulnerability has been resolved: ipv6: Fix potential uninit-value access in __ip6_make_skb() As it was done in c
CVE-2025-38556 In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot f
CVE-2024-46830 In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Acquire kvm->srcu when handling KVM_SET_VCPU_EVENTS Grab kvm->srcu wh
CVE-2025-38129 In the Linux kernel, the following vulnerability has been resolved: page_pool: Fix use-after-free in page_pool_recycle_in_ring syzbot reported a ua
CVE-2022-49635 In the Linux kernel, the following vulnerability has been resolved: drm/i915/selftests: fix subtraction overflow bug On some machines hole_end can
CVE-2025-22111 In the Linux kernel, the following vulnerability has been resolved: net: Remove RTNL dance for SIOCBRADDIF and SIOCBRDELIF. SIOCBRDELIF is passed t
CVE-2025-71127 In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: Discard Beacon frames to non-broadcast address Beacon frames ar
CVE-2025-71081 In the Linux kernel, the following vulnerability has been resolved: ASoC: stm32: sai: fix OF node leak on probe The reference taken to the sync pro
CVE-2025-71078 In the Linux kernel, the following vulnerability has been resolved: powerpc/64s/slb: Fix SLB multihit issue during SLB preload On systems using the
CVE-2025-68803 In the Linux kernel, the following vulnerability has been resolved: NFSD: NFSv4 file creation neglects setting ACL An NFSv4 client that sets an ACL
CVE-2025-71120 In the Linux kernel, the following vulnerability has been resolved: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy
CVE-2025-71113 In the Linux kernel, the following vulnerability has been resolved: crypto: af_alg - zero initialize memory allocated via sock_kmalloc Several cryp
CVE-2025-71068 In the Linux kernel, the following vulnerability has been resolved: svcrdma: bound check rq_pages index in inline path svc_rdma_copy_inline_range i
CVE-2025-68821 In the Linux kernel, the following vulnerability has been resolved: fuse: fix readahead reclaim deadlock Commit e26ee4efbc79 ("fuse: allocate ff->r
CVE-2025-68796 In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid updating zero-sized extent in extent cache As syzbot reporte
CVE-2025-71105 In the Linux kernel, the following vulnerability has been resolved: f2fs: use global inline_xattr_slab instead of per-sb slab cache As Hong Yun rep
CVE-2025-68344 In the Linux kernel, the following vulnerability has been resolved: ALSA: wavefront: Fix integer overflow in sample size validation The wavefront_s
CVE-2025-71077 In the Linux kernel, the following vulnerability has been resolved: tpm: Cap the number of PCR banks tpm2_get_pcr_allocation() does not cap any upp
CVE-2025-68282 In the Linux kernel, the following vulnerability has been resolved: usb: gadget: udc: fix use-after-free in usb_gadget_state_work A race condition
CVE-2025-22022 In the Linux kernel, the following vulnerability has been resolved: usb: xhci: Apply the link chain quirk on NEC isoc endpoints Two clearly differe
CVE-2025-40110 In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Fix a null-ptr access in the cursor snooper Check that the resource
CVE-2025-38022 In the Linux kernel, the following vulnerability has been resolved: RDMA/core: Fix "KASAN: slab-use-after-free Read in ib_register_device" problem
CVE-2025-71083 In the Linux kernel, the following vulnerability has been resolved: drm/ttm: Avoid NULL pointer deref for evicted BOs It is possible for a BO to ex
CVE-2025-71079 In the Linux kernel, the following vulnerability has been resolved: net: nfc: fix deadlock between nfc_unregister_device and rfkill_fop_write A dea
CVE-2025-71093 In the Linux kernel, the following vulnerability has been resolved: e1000: fix OOB in e1000_tbi_should_accept() In e1000_tbi_should_accept() we rea
CVE-2025-71084 In the Linux kernel, the following vulnerability has been resolved: RDMA/cm: Fix leaking the multicast GID table reference If the CM ID is destroye
CVE-2025-71096 In the Linux kernel, the following vulnerability has been resolved: RDMA/core: Check for the presence of LS_NLA_TYPE_DGID correctly The netlink res
CVE-2025-71136 In the Linux kernel, the following vulnerability has been resolved: media: adv7842: Avoid possible out-of-bounds array accesses in adv7842_cp_log_st
CVE-2025-71133 In the Linux kernel, the following vulnerability has been resolved: RDMA/irdma: avoid invalid read in irdma_net_event irdma_net_event() should not
CVE-2025-71086 In the Linux kernel, the following vulnerability has been resolved: net: rose: fix invalid array index in rose_kill_by_device() rose_kill_by_device
CVE-2025-71097 In the Linux kernel, the following vulnerability has been resolved: ipv4: Fix reference count leak when using error routes with nexthop objects Whe
CVE-2025-71085 In the Linux kernel, the following vulnerability has been resolved: ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr() There exi
CVE-2025-71137 In the Linux kernel, the following vulnerability has been resolved: octeontx2-pf: fix "UBSAN: shift-out-of-bounds error" This patch ensures that th
CVE-2025-71094 In the Linux kernel, the following vulnerability has been resolved: net: usb: asix: validate PHY address before use The ASIX driver reads the PHY a
CVE-2025-71132 In the Linux kernel, the following vulnerability has been resolved: smc91x: fix broken irq-context in PREEMPT_RT When smc91x.c is built with PREEMP
CVE-2025-71154 In the Linux kernel, the following vulnerability has been resolved: net: usb: rtl8150: fix memory leak on usb_submit_urb() failure In async_set_reg
CVE-2025-71091 In the Linux kernel, the following vulnerability has been resolved: team: fix check for port enabled in team_queue_override_port_prio_changed() The
CVE-2025-71098 In the Linux kernel, the following vulnerability has been resolved: ip6_gre: make ip6gre_header() robust Over the years, syzbot found many ways to
CVE-2025-71082 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btusb: revert use of devm_kzalloc in btusb This reverts commit 98921
CVE-2025-71131 In the Linux kernel, the following vulnerability has been resolved: crypto: seqiv - Do not use req->iv after crypto_aead_encrypt As soon as crypto_
CVE-2025-71087 In the Linux kernel, the following vulnerability has been resolved: iavf: fix off-by-one issues in iavf_config_rss_reg() There are off-by-one bugs
CVE-2025-71111 In the Linux kernel, the following vulnerability has been resolved: hwmon: (w83791d) Convert macros to functions to avoid TOCTOU The macro FAN_FROM
CVE-2025-68814 In the Linux kernel, the following vulnerability has been resolved: io_uring: fix filename leak in __io_openat_prep() __io_openat_prep() allocates
CVE-2025-68788 In the Linux kernel, the following vulnerability has been resolved: fsnotify: do not generate ACCESS/MODIFY events on child for special files inoti
CVE-2025-71125 In the Linux kernel, the following vulnerability has been resolved: tracing: Do not register unsupported perf events Synthetic events currently do
CVE-2025-71104 In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Fix VM hard lockup after prolonged inactivity with periodic HV timer
CVE-2025-71116 In the Linux kernel, the following vulnerability has been resolved: libceph: make decode_pool() more resilient against corrupted osdmaps If the osd
CVE-2025-71121 In the Linux kernel, the following vulnerability has been resolved: parisc: Do not reprogram affinitiy on ASP chip The ASP chip is a very old varia
CVE-2025-71102 In the Linux kernel, the following vulnerability has been resolved: scs: fix a wrong parameter in __scs_magic __scs_magic() needs a 'void *' variab
CVE-2025-68804 In the Linux kernel, the following vulnerability has been resolved: platform/chrome: cros_ec_ishtp: Fix UAF after unbinding driver After unbinding
CVE-2025-68771 In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix kernel BUG in ocfs2_find_victim_chain syzbot reported a kernel BUG i
CVE-2025-68808 In the Linux kernel, the following vulnerability has been resolved: media: vidtv: initialize local pointers upon transfer of memory ownership vidtv
CVE-2025-68769 In the Linux kernel, the following vulnerability has been resolved: f2fs: fix return value of f2fs_recover_fsync_data() With below scripts, it will
CVE-2025-71069 In the Linux kernel, the following vulnerability has been resolved: f2fs: invalidate dentry cache on failed whiteout creation F2FS can mount filesy
CVE-2025-68782 In the Linux kernel, the following vulnerability has been resolved: scsi: target: Reset t_task_cdb pointer in error case If allocation of cmd->t_ta
CVE-2025-71075 In the Linux kernel, the following vulnerability has been resolved: scsi: aic94xx: fix use-after-free in device removal path The asd_pci_remove() f
CVE-2025-68818 In the Linux kernel, the following vulnerability has been resolved: scsi: Revert "scsi: qla2xxx: Perform lockless command completion in abort path"
CVE-2025-68797 In the Linux kernel, the following vulnerability has been resolved: char: applicom: fix NULL pointer dereference in ac_ioctl Discovered by Atuin -
CVE-2025-68819 In the Linux kernel, the following vulnerability has been resolved: media: dvb-usb: dtv5100: fix out-of-bounds in dtv5100_i2c_msg() rlen value is a
CVE-2025-68820 In the Linux kernel, the following vulnerability has been resolved: ext4: xattr: fix null pointer deref in ext4_raw_inode() If ext4_get_inode_loc()
CVE-2025-71147 In the Linux kernel, the following vulnerability has been resolved: KEYS: trusted: Fix a memory leak in tpm2_load_cmd 'tpm2_load_cmd' allocates a t
CVE-2025-71108 In the Linux kernel, the following vulnerability has been resolved: usb: typec: ucsi: Handle incorrect num_connectors capability The UCSI spec stat
CVE-2025-71114 In the Linux kernel, the following vulnerability has been resolved: via_wdt: fix critical boot hang due to unnamed resource allocation The VIA watc
CVE-2025-68783 In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-mixer: us16x08: validate meter packet indices get_meter_levels_from_u
CVE-2025-68776 In the Linux kernel, the following vulnerability has been resolved: net/hsr: fix NULL pointer dereference in prp_get_untagged_frame() prp_get_untag
CVE-2025-68777 In the Linux kernel, the following vulnerability has been resolved: Input: ti_am335x_tsc - fix off-by-one error in wire_order validation The curren
CVE-2025-71112 In the Linux kernel, the following vulnerability has been resolved: net: hns3: add VLAN id validation before using Currently, the VLAN id may be us
CVE-2025-71064 In the Linux kernel, the following vulnerability has been resolved: net: hns3: using the num_tqps in the vf driver to apply for resources Currently
CVE-2025-68816 In the Linux kernel, the following vulnerability has been resolved: net/mlx5: fw_tracer, Validate format string parameters Add validation for forma
CVE-2025-68795 In the Linux kernel, the following vulnerability has been resolved: ethtool: Avoid overflowing userspace buffer on stats query The ethtool -S comma
CVE-2025-68815 In the Linux kernel, the following vulnerability has been resolved: net/sched: ets: Remove drr class from the active list if it changes to strict W
CVE-2025-68799 In the Linux kernel, the following vulnerability has been resolved: caif: fix integer underflow in cffrml_receive() The cffrml_receive() function e
CVE-2025-68813 In the Linux kernel, the following vulnerability has been resolved: ipvs: fix ipv4 null-ptr-deref in route error path The IPv4 code path in __ip_vs
CVE-2025-68785 In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: fix middle attribute validation in push_nsh() action The push
CVE-2025-68800 In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum_mr: Fix use-after-free when updating multicast route stats Cite
CVE-2025-68801 In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum_router: Fix neighbour use-after-free We sometimes observe use-a
CVE-2025-71066 In the Linux kernel, the following vulnerability has been resolved: net/sched: ets: Always remove class from active list before deleting in ets_qdis
CVE-2025-68787 In the Linux kernel, the following vulnerability has been resolved: netrom: Fix memory leak in nr_sendmsg() syzbot reported a memory leak [1]. Whe
CVE-2025-68767 In the Linux kernel, the following vulnerability has been resolved: hfsplus: Verify inode mode when loading from disk syzbot is reporting that S_IF
CVE-2025-68774 In the Linux kernel, the following vulnerability has been resolved: hfsplus: fix missing hfs_bnode_get() in __hfs_bnode_create When sync() and link
CVE-2025-71118 In the Linux kernel, the following vulnerability has been resolved: ACPICA: Avoid walking the Namespace if start_node is NULL Although commit 0c999
CVE-2025-68780 In the Linux kernel, the following vulnerability has been resolved: sched/deadline: only set free_cpus for online runqueues Commit 16b269436b72 ("s
CVE-2025-68346 In the Linux kernel, the following vulnerability has been resolved: ALSA: dice: fix buffer overflow in detect_stream_formats() The function detect_
CVE-2025-68764 In the Linux kernel, the following vulnerability has been resolved: NFS: Automounted filesystems should inherit ro,noexec,nodev,sync flags When a f
CVE-2025-68349 In the Linux kernel, the following vulnerability has been resolved: NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid Fixe
CVE-2025-68325 In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_cake: Fix incorrect qlen reduction in cake_drop In cake_drop(),
CVE-2025-68354 In the Linux kernel, the following vulnerability has been resolved: regulator: core: Protect regulator_supply_alias_list with regulator_list_mutex
CVE-2025-68758 In the Linux kernel, the following vulnerability has been resolved: backlight: led-bl: Add devlink to supplier LEDs LED Backlight is a consumer of
CVE-2025-68765 In the Linux kernel, the following vulnerability has been resolved: mt76: mt7615: Fix memory leak in mt7615_mcu_wtbl_sta_add() In mt7615_mcu_wtbl_s
CVE-2025-68740 In the Linux kernel, the following vulnerability has been resolved: ima: Handle error code returned by ima_filter_rule_match() In ima_match_rules()
CVE-2025-68362 In the Linux kernel, the following vulnerability has been resolved: wifi: rtl818x: rtl8187: Fix potential buffer underflow in rtl8187_rx_cb() The r
CVE-2025-68759 In the Linux kernel, the following vulnerability has been resolved: wifi: rtl818x: Fix potential memory leaks in rtl8180_init_rx_ring() In rtl8180_
CVE-2025-68364 In the Linux kernel, the following vulnerability has been resolved: ocfs2: relax BUG() to ocfs2_error() in __ocfs2_move_extent() In '__ocfs2_move_e
CVE-2025-68366 In the Linux kernel, the following vulnerability has been resolved: nbd: defer config unlock in nbd_genl_connect There is one use-after-free warnin
CVE-2025-68367 In the Linux kernel, the following vulnerability has been resolved: macintosh/mac_hid: fix race condition in mac_hid_toggle_emumouse The following
CVE-2025-68372 In the Linux kernel, the following vulnerability has been resolved: nbd: defer config put in recv_work There is one uaf issue in recv_work when run
CVE-2025-68746 In the Linux kernel, the following vulnerability has been resolved: spi: tegra210-quad: Fix timeout handling When the CPU that the QSPI interrupt h
CVE-2025-68724 In the Linux kernel, the following vulnerability has been resolved: crypto: asymmetric_keys - prevent overflow in asymmetric_key_generate_id Use ch
CVE-2025-68727 In the Linux kernel, the following vulnerability has been resolved: ntfs3: Fix uninit buffer allocated by __getname() Fix uninit errors caused afte
CVE-2025-68728 In the Linux kernel, the following vulnerability has been resolved: ntfs3: fix uninit memory after failed mi_read in mi_format_new Fix a KMSAN un-i
CVE-2025-68757 In the Linux kernel, the following vulnerability has been resolved: drm/vgem-fence: Fix potential deadlock on release A timer that expires a vgem f
CVE-2025-68732 In the Linux kernel, the following vulnerability has been resolved: gpu: host1x: Fix race in syncpt alloc/free Fix race condition between host1x_sy
CVE-2025-68733 In the Linux kernel, the following vulnerability has been resolved: smack: fix bug: unprivileged task can create labels If an unprivileged task is
CVE-2025-68254 In the Linux kernel, the following vulnerability has been resolved: staging: rtl8723bs: fix out-of-bounds read in OnBeacon ESR IE parsing The Exten
CVE-2025-68255 In the Linux kernel, the following vulnerability has been resolved: staging: rtl8723bs: fix stack buffer overflow in OnAssocReq IE parsing The Supp
CVE-2025-68257 In the Linux kernel, the following vulnerability has been resolved: comedi: check device's attached status in compat ioctls Syzbot identified an is
CVE-2025-68258 In the Linux kernel, the following vulnerability has been resolved: comedi: multiq3: sanitize config options in multiq3_attach() Syzbot identified
CVE-2025-68332 In the Linux kernel, the following vulnerability has been resolved: comedi: c6xdigio: Fix invalid PNP driver unregistration The Comedi low-level dr
CVE-2025-68266 In the Linux kernel, the following vulnerability has been resolved: bfs: Reconstruct file type when loading from disk syzbot is reporting that S_IF
CVE-2025-68335 In the Linux kernel, the following vulnerability has been resolved: comedi: pcl818: fix null-ptr-deref in pcl818_ai_cancel() Syzbot identified an i
CVE-2025-68261 In the Linux kernel, the following vulnerability has been resolved: ext4: add i_data_sem protection in ext4_destroy_inline_data_nolock() Fix a race
CVE-2025-68336 In the Linux kernel, the following vulnerability has been resolved: locking/spinlock/debug: Fix data-race in do_raw_write_lock KCSAN reports: BUG:
CVE-2025-68264 In the Linux kernel, the following vulnerability has been resolved: ext4: refresh inline data size before write operations The cached ei->i_inline_
CVE-2025-68337 In the Linux kernel, the following vulnerability has been resolved: jbd2: avoid bug_on in jbd2_journal_get_create_access() when file system corrupte
CVE-2024-47666 In the Linux kernel, the following vulnerability has been resolved: scsi: pm80xx: Set phy->enable_completion only when we wait for it pm8001_phy_co
CVE-2025-68327 In the Linux kernel, the following vulnerability has been resolved: usb: renesas_usbhs: Fix synchronous external abort on unbind A synchronous exte
CVE-2025-68295 In the Linux kernel, the following vulnerability has been resolved: smb: client: fix memory leak in cifs_construct_tcon() When having a multiuser m
CVE-2025-68227 In the Linux kernel, the following vulnerability has been resolved: mptcp: Fix proto fallback detection with BPF The sockmap feature allows bpf sys
CVE-2025-68284 In the Linux kernel, the following vulnerability has been resolved: libceph: prevent potential out-of-bounds writes in handle_auth_session_key() Th
CVE-2025-68285 In the Linux kernel, the following vulnerability has been resolved: libceph: fix potential use-after-free in have_mon_and_osd_map() The wait loop i
CVE-2025-68286 In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check NULL before accessing [WHAT] IGT kms_cursor_legacy's lon
CVE-2025-68287 In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: Fix race condition between concurrent dwc3_remove_requests() call pat
CVE-2025-68331 In the Linux kernel, the following vulnerability has been resolved: usb: uas: fix urb unmapping issue when the uas device is remove during ongoing d
CVE-2025-40345 In the Linux kernel, the following vulnerability has been resolved: usb: storage: sddr55: Reject out-of-bound new_pba Discovered by Atuin - Automat
CVE-2025-68288 In the Linux kernel, the following vulnerability has been resolved: usb: storage: Fix memory leak in USB bulk transport A kernel memory leak was id
CVE-2025-68289 In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_eem: Fix memory leak in eem_unwrap The existing code did not han
CVE-2025-68290 In the Linux kernel, the following vulnerability has been resolved: most: usb: fix double free on late probe failure The MOST subsystem has a non-s
CVE-2025-68328 In the Linux kernel, the following vulnerability has been resolved: firmware: stratix10-svc: fix bug in saving controller data Fix the incorrect us
CVE-2025-68339 In the Linux kernel, the following vulnerability has been resolved: atm/fore200e: Fix possible data race in fore200e_open() Protect access to fore2
CVE-2025-68330 In the Linux kernel, the following vulnerability has been resolved: iio: accel: bmc150: Fix irq assumption regression The code in bmc150-accel-core
CVE-2025-68301 In the Linux kernel, the following vulnerability has been resolved: net: atlantic: fix fragment overflow handling in RX path The atlantic driver ca
CVE-2025-68302 In the Linux kernel, the following vulnerability has been resolved: net: sxgbe: fix potential NULL dereference in sxgbe_rx() Currently, when skb is
CVE-2025-68303 In the Linux kernel, the following vulnerability has been resolved: platform/x86: intel: punit_ipc: fix memory corruption This passes the address o
CVE-2025-68308 In the Linux kernel, the following vulnerability has been resolved: can: kvaser_usb: leaf: Fix potential infinite loop in command parsers The `kvas
CVE-2025-40257 In the Linux kernel, the following vulnerability has been resolved: mptcp: fix a race in mptcp_pm_del_add_timer() mptcp_pm_del_add_timer() can call
CVE-2025-68217 In the Linux kernel, the following vulnerability has been resolved: Input: pegasus-notetaker - fix potential out-of-bounds access In the pegasus_no
CVE-2025-68204 In the Linux kernel, the following vulnerability has been resolved: pmdomain: arm: scmi: Fix genpd leak on provider registration failure If of_genp
CVE-2025-68245 In the Linux kernel, the following vulnerability has been resolved: net: netpoll: fix incorrect refcount handling causing incorrect cleanup commit
CVE-2024-37354 In the Linux kernel, the following vulnerability has been resolved: btrfs: fix crash on racing fsync and size-extending write into prealloc We have
CVE-2025-68220 In the Linux kernel, the following vulnerability has been resolved: net: ethernet: ti: netcp: Standardize knav_dma_open_channel to return NULL on er
CVE-2025-40272 In the Linux kernel, the following vulnerability has been resolved: mm/secretmem: fix use-after-free race in fault handler When a page fault occurs
CVE-2025-40248 In the Linux kernel, the following vulnerability has been resolved: vsock: Ignore signal/timeout on connect() if already established During connect
CVE-2025-40252 In the Linux kernel, the following vulnerability has been resolved: net: qlogic/qede: fix potential out-of-bounds read in qede_tpa_cont() and qede_t
CVE-2025-40253 In the Linux kernel, the following vulnerability has been resolved: s390/ctcm: Fix double-kfree The function 'mpc_rcvd_sweep_req(mpcginfo)' is call
CVE-2025-40254 In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: remove never-working support for setting nsh fields The valid
CVE-2025-40258 In the Linux kernel, the following vulnerability has been resolved: mptcp: fix race condition in mptcp_schedule_work() syzbot reported use-after-fr
CVE-2025-68229 In the Linux kernel, the following vulnerability has been resolved: scsi: target: tcm_loop: Fix segfault in tcm_loop_tpg_address_show() If the allo
CVE-2025-40259 In the Linux kernel, the following vulnerability has been resolved: scsi: sg: Do not sleep in atomic context sg_finish_rem_req() calls blk_rq_unmap
CVE-2025-40261 In the Linux kernel, the following vulnerability has been resolved: nvme: nvme-fc: Ensure ->ioerr_work is cancelled in nvme_fc_delete_ctrl() nvme_f
CVE-2025-40262 In the Linux kernel, the following vulnerability has been resolved: Input: imx_sc_key - fix memory corruption on unload This is supposed to be "pri
CVE-2025-40263 In the Linux kernel, the following vulnerability has been resolved: Input: cros_ec_keyb - fix an invalid memory access If cros_ec_keyb_register_mat
CVE-2025-40264 In the Linux kernel, the following vulnerability has been resolved: be2net: pass wrb_params in case of OS2BMC be_insert_vlan_in_pkt() is called wit
CVE-2025-68238 In the Linux kernel, the following vulnerability has been resolved: mtd: rawnand: cadence: fix DMA device NULL pointer dereference The DMA device p
CVE-2025-68734 In the Linux kernel, the following vulnerability has been resolved: isdn: mISDN: hfcsusb: fix memory leak in hfcsusb_probe() In hfcsusb_probe(), th
CVE-2025-40269 In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix potential overflow of PCM transfer buffer The PCM stream d
CVE-2025-40271 In the Linux kernel, the following vulnerability has been resolved: fs/proc: fix uaf in proc_readdir_de() Pde is erased from subdir rbtree through
CVE-2025-68241 In the Linux kernel, the following vulnerability has been resolved: ipv4: route: Prevent rt_bind_exception() from rebinding stale fnhe The sit driv
CVE-2025-40273 In the Linux kernel, the following vulnerability has been resolved: NFSD: free copynotify stateid in nfs4_free_ol_stateid() Typically copynotify st
CVE-2025-40040 In the Linux kernel, the following vulnerability has been resolved: mm/ksm: fix flag-dropping behavior in ksm_madvise syzkaller discovered the foll
CVE-2025-68200 In the Linux kernel, the following vulnerability has been resolved: bpf: Add bpf_prog_run_data_pointers() syzbot found that cls_bpf_classify() is a
CVE-2025-40275 In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix NULL pointer dereference in snd_usb_mixer_controls_badd In
CVE-2025-40277 In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE This dat
CVE-2025-40278 In the Linux kernel, the following vulnerability has been resolved: net: sched: act_ife: initialize struct tc_ife to fix KMSAN kernel-infoleak Fix
CVE-2025-40279 In the Linux kernel, the following vulnerability has been resolved: net: sched: act_connmark: initialize struct tc_ife to fix kernel leak In tcf_co
CVE-2025-40280 In the Linux kernel, the following vulnerability has been resolved: tipc: Fix use-after-free in tipc_mon_reinit_self(). syzbot reported use-after-f
CVE-2025-40281 In the Linux kernel, the following vulnerability has been resolved: sctp: prevent possible shift-out-of-bounds in sctp_transport_update_rto syzbot
CVE-2025-40282 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: 6lowpan: reset link-local header on ipv6 recv path Bluetooth 6lowpan
CVE-2025-40283 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF There is a K
CVE-2025-68244 In the Linux kernel, the following vulnerability has been resolved: drm/i915: Avoid lock inversion when pinning to GGTT on CHV/BXT+VTD On completio
CVE-2025-68192 In the Linux kernel, the following vulnerability has been resolved: net: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup Raw IP pack
CVE-2025-40331 In the Linux kernel, the following vulnerability has been resolved: sctp: Prevent TOCTOU out-of-bounds write For the following path not holding the
CVE-2025-40304 In the Linux kernel, the following vulnerability has been resolved: fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds Add bounds
CVE-2025-40306 In the Linux kernel, the following vulnerability has been resolved: orangefs: fix xattr related buffer overflow... Willy Tarreau <w@1wt.eu> forward
CVE-2025-40308 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: bcsp: receive data only if registered Currently, bcsp_recv() can be
CVE-2025-40309 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: SCO: Fix UAF on sco_conn_free BUG: KASAN: slab-use-after-free in sco
CVE-2025-40361 In the Linux kernel, the following vulnerability has been resolved: fs: ext4: change GFP_KERNEL to GFP_NOFS to avoid deadlock The parent function e
CVE-2025-68185 In the Linux kernel, the following vulnerability has been resolved: nfs4_setup_readdir(): insufficient locking for ->d_parent->d_inode dereferencing
CVE-2025-68176 In the Linux kernel, the following vulnerability has been resolved: PCI: cadence: Check for the existence of cdns_pcie::ops before using it cdns_pc
CVE-2025-68168 In the Linux kernel, the following vulnerability has been resolved: jfs: fix uninitialized waitqueue in transaction manager The transaction manager
CVE-2025-40312 In the Linux kernel, the following vulnerability has been resolved: jfs: Verify inode mode when loading from disk The inode mode loaded from corrup
CVE-2025-68321 In the Linux kernel, the following vulnerability has been resolved: page_pool: always add GFP_NOWARN for ATOMIC allocations Driver authors often fo
CVE-2025-68191 In the Linux kernel, the following vulnerability has been resolved: udp_tunnel: use netdev_warn() instead of netdev_WARN() netdev_WARN() uses WARN/
CVE-2025-40313 In the Linux kernel, the following vulnerability has been resolved: ntfs3: pretend $Extend records as regular files Since commit af153bb63a33 ("vfs
CVE-2025-40314 In the Linux kernel, the following vulnerability has been resolved: usb: cdns3: gadget: Use-after-free during failed initialization and exit of cdns
CVE-2025-68194 In the Linux kernel, the following vulnerability has been resolved: media: imon: make send_packet() more robust syzbot is reporting that imon has t
CVE-2025-40363 In the Linux kernel, the following vulnerability has been resolved: net: ipv6: fix field-spanning memcpy warning in AH output Fix field-spanning me
CVE-2025-40342 In the Linux kernel, the following vulnerability has been resolved: nvme-fc: use lock accessing port_state and rport state nvme_fc_unregister_remot
CVE-2025-40343 In the Linux kernel, the following vulnerability has been resolved: nvmet-fc: avoid scheduling association deletion twice When forcefully shutting
CVE-2025-68177 In the Linux kernel, the following vulnerability has been resolved: cpufreq/longhaul: handle NULL policy in longhaul_exit longhaul_exit() was calli
CVE-2025-40360 In the Linux kernel, the following vulnerability has been resolved: drm/sysfb: Do not dereference NULL pointer in plane reset The plane state in __
CVE-2025-40315 In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_fs: Fix epfile null pointer access after ep enable. A race condi
CVE-2025-40317 In the Linux kernel, the following vulnerability has been resolved: regmap: slimbus: fix bus_context pointer in regmap init calls Commit 4e65bda827
CVE-2025-68312 In the Linux kernel, the following vulnerability has been resolved: usbnet: Prevents free active kevent The root cause of this issue are: 1. When p
CVE-2025-40319 In the Linux kernel, the following vulnerability has been resolved: bpf: Sync pending IRQ work before freeing ring buffer Fix a race where irq_work
CVE-2025-40321 In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: fix crash while sending Action Frames in standalone AP Mode Cur
CVE-2025-40322 In the Linux kernel, the following vulnerability has been resolved: fbdev: bitblit: bound-check glyph index in bit_putcs* bit_putcs_aligned()/unali
CVE-2025-40211 In the Linux kernel, the following vulnerability has been resolved: ACPI: video: Fix use-after-free in acpi_video_switch_brightness() The switch_br
CVE-2025-40324 In the Linux kernel, the following vulnerability has been resolved: NFSD: Fix crash in nfsd4_read_release() When tracing is enabled, the trace_nfsd
CVE-2025-40083 In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix null-deref in agg_dequeue To prevent a potential crash
CVE-2024-41014 In the Linux kernel, the following vulnerability has been resolved: xfs: add bounds checking to xlog_recover_process_data There is a lack of verifi
CVE-2022-49267 In the Linux kernel, the following vulnerability has been resolved: mmc: core: use sysfs_emit() instead of sprintf() sprintf() (still used in the M
CVE-2025-21780 In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table() It malicious

Version: 5.15.0-170.180 2026-01-09 19:10:25 UTC

 linux (5.15.0-170.180) jammy; urgency=medium
 .
   * jammy/linux: 5.15.0-170.180 -proposed tracker (LP: #2137825)
 .
   * ubuntu_kselftests:_net/net:gre_gso.sh failing (LP: #2136820)
     - SAUCE increase socat timeout in gre_gso.sh
 .
   * CVE-2025-40256
     - xfrm: also call xfrm_state_delete_tunnel at destroy time for states that
       were never added
 .
   * CVE-2025-40215
     - xfrm: delete x->tunnel as we delete x
 .
   * CVE-2025-38248
     - bridge: mcast: Fix use-after-free during router port configuration
 .
   * selftests: net: veth: fix compatibility with older ethtool versions
     (LP: #2136734)
     - SAUCE: selftests: net: veth: use short form gro for ethtool -K
     - SAUCE: selftests: net: veth: accept 0 for unsupported combined channels
 .
   * veth.sh from ubuntu_kselftests_net failed on J-5.15 / N-6.8 (with xdp
     attached - gro flag) (LP: #2065369)
     - selftests: net: veth: test the ability to independently manipulate GRO
       and XDP
 .
   * Jammy update: v5.15.196 upstream stable release (LP: #2134182)
     - r8152: add error handling in rtl8152_driver_init
     - jbd2: ensure that all ongoing I/O complete before freeing blocks
     - btrfs: fix clearing of BTRFS_FS_RELOC_RUNNING if relocation already
       running
     - media: s5p-mfc: remove an unused/uninitialized variable
     - media: rc: Directly use ida_free()
     - media: lirc: Fix error handling in lirc_register()
     - blk-crypto: fix missing blktrace bio split events
     - drm/exynos: exynos7_drm_decon: fix uninitialized crtc reference in
       functions
     - drm/exynos: exynos7_drm_decon: properly clear channels during bind
     - drm/exynos: exynos7_drm_decon: remove ctx->suspended
     - crypto: rockchip - Fix dma_unmap_sg() nents value
     - cpufreq: CPPC: Avoid using CPUFREQ_ETERNAL as transition delay
     - HID: multitouch: fix sticky fingers
     - dax: skip read lock assertion for read-only filesystems
     - can: m_can: m_can_plat_remove(): add missing pm_runtime_disable()
     - net: dlink: handle dma_map_single() failure properly
     - doc: fix seg6_flowlabel path
     - r8169: fix packet truncation after S4 resume on RTL8168H/RTL8111H
     - amd-xgbe: Avoid spurious link down messages during interface toggle
     - tcp: fix tcp_tso_should_defer() vs large RTT
     - tg3: prevent use of uninitialized remote_adv and local_adv variables
     - splice, net: Add a splice_eof op to file-ops and socket-ops
     - net: tls: wait for async completion on last message
     - tls: wait for async encrypt in case of error during latter iterations of
       sendmsg
     - tls: always set record_type in tls_process_cmsg
     - tls: don't rely on tx_work during send()
     - net: usb: use eth_hw_addr_set() instead of ether_addr_copy()
     - net: usb: lan78xx: Add error handling to lan78xx_init_mac_address
     - net: usb: lan78xx: fix use of improperly initialized dev->chipid in
       lan78xx_reset
     - riscv: kprobes: Fix probe address validation
     - drm/amd/powerplay: Fix CIK shutdown temperature
     - sched/balancing: Rename newidle_balance() => sched_balance_newidle()
     - sched/fair: Fix pelt lost idle time detection
     - ALSA: firewire: amdtp-stream: fix enum kernel-doc warnings
     - PCI/sysfs: Ensure devices are powered for config reads (part 2)
     - exec: Fix incorrect type for ret
     - nios2: ensure that memblock.current_limit is set when setting pfn limits
     - hfs: clear offset and space out of valid records in b-tree node
     - hfs: make proper initalization of struct hfs_find_data
     - hfsplus: fix KMSAN uninit-value issue in __hfsplus_ext_cache_extent()
     - hfs: validate record offset in hfsplus_bmap_alloc
     - hfsplus: fix KMSAN uninit-value issue in hfsplus_delete_cat()
     - dlm: check for defined force value in dlm_lockspace_release
     - hfs: fix KMSAN uninit-value issue in hfs_find_set_zero_bits()
     - hfsplus: return EIO when type of hidden directory mismatch in
       hfsplus_fill_super()
     - m68k: bitops: Fix find_*_bit() signatures
     - net: rtnetlink: add helper to extract msg type's kind
     - net: rtnetlink: use BIT for flag values
     - net: netlink: add NLM_F_BULK delete request modifier
     - net: rtnetlink: add bulk delete support flag
     - net: add ndo_fdb_del_bulk
     - net: rtnetlink: add NLM_F_BULK support to rtnl_fdb_del
     - rtnetlink: Allow deleting FDB entries in user namespace
     - net: enetc: correct the value of ENETC_RXB_TRUESIZE
     - dpaa2-eth: fix the pointer passed to PTR_ALIGN on Tx path
     - arm64, mm: avoid always making PTE dirty in pte_mkwrite()
     - sctp: avoid NULL dereference when chunk data buffer is missing
     - net: bonding: fix possible peer notify event loss or dup issue
     - Revert "cpuidle: menu: Avoid discarding useful information"
     - MIPS: Malta: Fix keyboard resource preventing i8042 driver from
       registering
     - ocfs2: clear extent cache after moving/defragmenting extents
     - vsock: fix lock inversion in vsock_assign_transport()
     - net: usb: rtl8150: Fix frame padding
     - net: ravb: Ensure memory write completes before ringing TX doorbell
     - USB: serial: option: add UNISOC UIS7720
     - USB: serial: option: add Quectel RG255C
     - USB: serial: option: add Telit FN920C04 ECM compositions
     - usb/core/quirks: Add Huawei ME906S to wakeup quirk
     - usb: raw-gadget: do not limit transfer length
     - xhci: dbc: enable back DbC in resume if it was enabled before suspend
     - binder: remove "invalid inc weak" check
     - mei: me: add wildcat lake P DID
     - most: usb: Fix use-after-free in hdm_disconnect
     - most: usb: hdm_probe: Fix calling put_device() before device
       initialization
     - serial: 8250_exar: add support for Advantech 2 port card with Device ID
       0x0018
     - arm64: cputype: Add Neoverse-V3AE definitions
     - arm64: errata: Apply workarounds for Neoverse-V3AE
     - s390/cio: Update purg

Source diff to previous version
2136820 ubuntu_kselftests:_net/net:gre_gso.sh failing
2136734 selftests: net: veth: fix compatibility with older ethtool versions
2065369 veth.sh from ubuntu_kselftests_net failed on J-5.15 / N-6.8 (with xdp attached - gro flag)
2134182 Jammy update: v5.15.196 upstream stable release
2133909 Jammy update: v5.15.195 upstream stable release
2131046 CAP_PERFMON insufficient to get perf data
2130553 Jammy Linux: Introduced Warning with CVE-2024-53090 fix
2121257 [SRU] Apparmor: Unshifted uids for hardlinks and unix sockets in user namespaces
2127866 Jammy update: v5.15.194 upstream stable release
2128729 Black screen when booting 5.15.0-160 (on AMD Lucienne / Cezanne / Navi / Renoir / Rembrandt)
CVE-2025-40256 In the Linux kernel, the following vulnerability has been resolved: xfrm: also call xfrm_state_delete_tunnel at destroy time for states that were ne
CVE-2025-40215 In the Linux kernel, the following vulnerability has been resolved: xfrm: delete x->tunnel as we delete x The ipcomp fallback tunnels currently get
CVE-2025-38248 In the Linux kernel, the following vulnerability has been resolved: bridge: mcast: Fix use-after-free during router port configuration The bridge m
CVE-2025-40094 In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_acm: Refactor bind path to use __free() After an bind/unbind cyc
CVE-2025-40092 In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_ncm: Refactor bind path to use __free() After an bind/unbind cyc
CVE-2025-40087 In the Linux kernel, the following vulnerability has been resolved: NFSD: Define a proc_layoutcommit for the FlexFiles layout type Avoid a crash if
CVE-2025-40105 In the Linux kernel, the following vulnerability has been resolved: vfs: Don't leak disconnected dentries on umount When user calls open_by_handle_
CVE-2025-40106 In the Linux kernel, the following vulnerability has been resolved: comedi: fix divide-by-zero in comedi_buf_munge() The comedi_buf_munge() functio
CVE-2025-40088 In the Linux kernel, the following vulnerability has been resolved: hfsplus: fix slab-out-of-bounds read in hfsplus_strcasecmp() The hfsplus_strcas
CVE-2025-40085 In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix NULL pointer deference in try_to_register_card In try_to_r
CVE-2025-40173 In the Linux kernel, the following vulnerability has been resolved: net/ip6_tunnel: Prevent perpetual tunnel growth Similarly to ipv4 tunnel, ipv6
CVE-2025-40167 In the Linux kernel, the following vulnerability has been resolved: ext4: detect invalid INLINE_DATA + EXTENTS flag combination syzbot reported a B
CVE-2025-40178 In the Linux kernel, the following vulnerability has been resolved: pid: Add a judgment for ns null in pid_nr_ns __task_pid_nr_ns ns = task
CVE-2025-40134 In the Linux kernel, the following vulnerability has been resolved: dm: fix NULL pointer dereference in __dm_suspend() There is a race condition be
CVE-2025-40042 In the Linux kernel, the following vulnerability has been resolved: tracing: Fix race condition in kprobe initialization causing NULL pointer derefe
CVE-2025-40120 In the Linux kernel, the following vulnerability has been resolved: net: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock Prevent USB
CVE-2025-40200 In the Linux kernel, the following vulnerability has been resolved: Squashfs: reject negative file sizes in squashfs_read_inode() Syskaller reports
CVE-2025-40026 In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Don't (re)check L1 intercepts when completing userspace I/O When comp
CVE-2025-40179 In the Linux kernel, the following vulnerability has been resolved: ext4: verify orphan file size is not too big In principle orphan file can be ar
CVE-2025-40204 In the Linux kernel, the following vulnerability has been resolved: sctp: Fix MAC comparison to be constant-time To prevent timing attacks, MACs ne
CVE-2025-40188 In the Linux kernel, the following vulnerability has been resolved: pwm: berlin: Fix wrong register in suspend/resume The 'enable' register should
CVE-2025-40194 In the Linux kernel, the following vulnerability has been resolved: cpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request() The c
CVE-2025-40205 In the Linux kernel, the following vulnerability has been resolved: btrfs: avoid potential out-of-bounds in btrfs_encode_fh() The function btrfs_en
CVE-2025-40183 In the Linux kernel, the following vulnerability has been resolved: bpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6} Cilium has a BPF egress
CVE-2025-40187 In the Linux kernel, the following vulnerability has been resolved: net/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce() If ne
CVE-2025-40111 In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Fix Use-after-free in validation Nodes stored in the validation dup
CVE-2025-40001 In the Linux kernel, the following vulnerability has been resolved: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue During the detaching of
CVE-2025-40029 In the Linux kernel, the following vulnerability has been resolved: bus: fsl-mc: Check return value of platform_get_resource() platform_get_resourc
CVE-2025-40030 In the Linux kernel, the following vulnerability has been resolved: pinctrl: check the return value of pinmux_ops::get_function_name() While the AP
CVE-2025-40035 In the Linux kernel, the following vulnerability has been resolved: Input: uinput - zero-initialize uinput_ff_upload_compat to avoid info leak Stru
CVE-2025-40153 In the Linux kernel, the following vulnerability has been resolved: mm: hugetlb: avoid soft lockup when mprotect to large memory area When calling
CVE-2025-40043 In the Linux kernel, the following vulnerability has been resolved: net: nfc: nci: Add parameter validation for packet data Syzbot reported an unin
CVE-2025-40044 In the Linux kernel, the following vulnerability has been resolved: fs: udf: fix OOB read in lengthAllocDescs handling When parsing Allocation Exte
CVE-2025-40048 In the Linux kernel, the following vulnerability has been resolved: uio_hv_generic: Let userspace take care of interrupt mask Remove the logic to s
CVE-2025-40049 In the Linux kernel, the following vulnerability has been resolved: Squashfs: fix uninit-value in squashfs_get_parent Syzkaller reports a "KMSAN: u
CVE-2025-40053 In the Linux kernel, the following vulnerability has been resolved: net: dlink: handle copy_thresh allocation failure The driver did not handle fai
CVE-2025-40055 In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix double free in user_cluster_connect() user_cluster_disconnect() free
CVE-2025-40127 In the Linux kernel, the following vulnerability has been resolved: hwrng: ks-sa - fix division by zero in ks_sa_rng_init Fix division by zero in k
CVE-2025-40140 In the Linux kernel, the following vulnerability has been resolved: net: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast syzbot re
CVE-2025-40115 In the Linux kernel, the following vulnerability has been resolved: scsi: mpt3sas: Fix crash in transport port remove by using ioc_info() During mp
CVE-2025-40060 In the Linux kernel, the following vulnerability has been resolved: coresight: trbe: Return NULL pointer for allocation failures When the TRBE driv
CVE-2025-40112 In the Linux kernel, the following vulnerability has been resolved: sparc: fix accurate exception reporting in copy_{from_to}_user for Niagara The
CVE-2025-40124 In the Linux kernel, the following vulnerability has been resolved: sparc: fix accurate exception reporting in copy_{from_to}_user for UltraSPARC II
CVE-2025-40126 In the Linux kernel, the following vulnerability has been resolved: sparc: fix accurate exception reporting in copy_{from_to}_user for UltraSPARC T
CVE-2025-40068 In the Linux kernel, the following vulnerability has been resolved: fs: ntfs3: Fix integer overflow in run_unpack() The MFT record relative to the
CVE-2025-40121 In the Linux kernel, the following vulnerability has been resolved: ASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping When an invalid valu
CVE-2025-40154 In the Linux kernel, the following vulnerability has been resolved: ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping When an invalid valu
CVE-2025-40070 In the Linux kernel, the following vulnerability has been resolved: pps: fix warning in pps_register_cdev when register device fail Similar to prev
CVE-2025-40118 In the Linux kernel, the following vulnerability has been resolved: scsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod Since commit f7b705c238
CVE-2025-40116 In the Linux kernel, the following vulnerability has been resolved: usb: host: max3421-hcd: Fix error pointer dereference in probe cleanup The kthr
CVE-2025-40078 In the Linux kernel, the following vulnerability has been resolved: bpf: Explicitly check accesses to bpf_sock_addr Syzkaller found a kernel warnin
CVE-2025-40171 In the Linux kernel, the following vulnerability has been resolved: nvmet-fc: move lsop put work to nvmet_fc_ls_req_op It’s possible for more than
CVE-2025-40125 In the Linux kernel, the following vulnerability has been resolved: blk-mq: check kobject state_in_sysfs before deleting in blk_mq_unregister_hctx
CVE-2025-40081 In the Linux kernel, the following vulnerability has been resolved: perf: arm_spe: Prevent overflow in PERF_IDX2OFF() Cast nr_pages to unsigned lon
CVE-2025-40027 In the Linux kernel, the following vulnerability has been resolved: net/9p: fix double req put in p9_fd_cancelled Syzkaller reports a KASAN issue a
CVE-2025-40109 In the Linux kernel, the following vulnerability has been resolved: crypto: rng - Ensure set_ent is always present Ensure that set_ent is always se
CVE-2024-58011 In the Linux kernel, the following vulnerability has been resolved: platform/x86: int3472: Check for adev == NULL Not all devices have an ACPI comp
CVE-2025-39995 In the Linux kernel, the following vulnerability has been resolved: media: i2c: tc358743: Fix use-after-free bugs caused by orphan timer in probe T
CVE-2025-39994 In the Linux kernel, the following vulnerability has been resolved: media: tuner: xc5000: Fix use-after-free in xc5000_release The original code us
CVE-2025-22058 In the Linux kernel, the following vulnerability has been resolved: udp: Fix memory accounting leak. Matt Dowling reported a weird UDP memory usage
CVE-2025-39996 In the Linux kernel, the following vulnerability has been resolved: media: b2c2: Fix use-after-free causing by irq_check_work in flexcop_pci_remove
CVE-2025-39998 In the Linux kernel, the following vulnerability has been resolved: scsi: target: target_core_configfs: Add length check to avoid buffer overflow A
CVE-2024-53090 In the Linux kernel, the following vulnerability has been resolved: afs: Fix lock recursion afs_wake_up_async_call() can incur lock recursion. The
CVE-2024-56538 In the Linux kernel, the following vulnerability has been resolved: drm: zynqmp_kms: Unplug DRM device before removal Prevent userspace accesses to
CVE-2024-53114 In the Linux kernel, the following vulnerability has been resolved: x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 client A number of Zen4 cl
CVE-2025-38584 In the Linux kernel, the following vulnerability has been resolved: padata: Fix pd UAF once and for all There is a race condition/UAF in padata_reo
CVE-2025-40019 In the Linux kernel, the following vulnerability has been resolved: crypto: essiv - Check ssize for decryption and in-place encryption Move the ssi
CVE-2025-38561 In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix Preauh_HashValue race condition If client send multiple session setu

Version: 5.15.0-167.177 2025-12-20 09:09:00 UTC

 linux (5.15.0-167.177) jammy; urgency=medium
 .
   * jammy/linux: 5.15.0-167.177 -proposed tracker (LP: #2136914)
 .
   * selftests: net: veth: fix compatibility with older ethtool versions
     (LP: #2136734)
     - SAUCE: selftests: net: veth: use short form gro for ethtool -K
     - SAUCE: selftests: net: veth: accept 0 for unsupported combined channels
 .
   * Miscellaneous Ubuntu changes
     - [SAUCE] Fix selftest/net/rtnetlink.sh for Big Endian
 .
   * Miscellaneous upstream changes
     - selftests: net: use slowwait to stabilize vrf_route_leaking test

Source diff to previous version
2136734 selftests: net: veth: fix compatibility with older ethtool versions

Version: 5.15.0-166.176 2025-12-13 20:13:40 UTC

 linux (5.15.0-166.176) jammy; urgency=medium
 .
   * jammy/linux: 5.15.0-166.176 -proposed tracker (LP: #2135905)
 .
   * veth.sh from ubuntu_kselftests_net failed on J-5.15 / N-6.8 (with xdp
     attached - gro flag) (LP: #2065369)
     - selftests: net: veth: test the ability to independently manipulate GRO
       and XDP
 .
   * Black screen when booting 5.15.0-160 (on AMD Lucienne / Cezanne / Navi /
     Renoir / Rembrandt) (LP: #2128729)
     - SAUCE: drm/amd/display: Fix incorrect code path taken in
       amdgpu_dm_atomic_check()
 .
   * Jammy update: v5.15.196 upstream stable release (LP: #2134182)
     - r8152: add error handling in rtl8152_driver_init
     - jbd2: ensure that all ongoing I/O complete before freeing blocks
     - btrfs: fix clearing of BTRFS_FS_RELOC_RUNNING if relocation already
       running
     - media: s5p-mfc: remove an unused/uninitialized variable
     - media: rc: Directly use ida_free()
     - media: lirc: Fix error handling in lirc_register()
     - blk-crypto: fix missing blktrace bio split events
     - drm/exynos: exynos7_drm_decon: fix uninitialized crtc reference in
       functions
     - drm/exynos: exynos7_drm_decon: properly clear channels during bind
     - drm/exynos: exynos7_drm_decon: remove ctx->suspended
     - crypto: rockchip - Fix dma_unmap_sg() nents value
     - cpufreq: CPPC: Avoid using CPUFREQ_ETERNAL as transition delay
     - HID: multitouch: fix sticky fingers
     - dax: skip read lock assertion for read-only filesystems
     - can: m_can: m_can_plat_remove(): add missing pm_runtime_disable()
     - net: dlink: handle dma_map_single() failure properly
     - doc: fix seg6_flowlabel path
     - r8169: fix packet truncation after S4 resume on RTL8168H/RTL8111H
     - amd-xgbe: Avoid spurious link down messages during interface toggle
     - tcp: fix tcp_tso_should_defer() vs large RTT
     - tg3: prevent use of uninitialized remote_adv and local_adv variables
     - splice, net: Add a splice_eof op to file-ops and socket-ops
     - net: tls: wait for async completion on last message
     - tls: wait for async encrypt in case of error during latter iterations of
       sendmsg
     - tls: always set record_type in tls_process_cmsg
     - tls: don't rely on tx_work during send()
     - net: usb: use eth_hw_addr_set() instead of ether_addr_copy()
     - net: usb: lan78xx: Add error handling to lan78xx_init_mac_address
     - net: usb: lan78xx: fix use of improperly initialized dev->chipid in
       lan78xx_reset
     - riscv: kprobes: Fix probe address validation
     - drm/amd/powerplay: Fix CIK shutdown temperature
     - sched/balancing: Rename newidle_balance() => sched_balance_newidle()
     - sched/fair: Fix pelt lost idle time detection
     - ALSA: firewire: amdtp-stream: fix enum kernel-doc warnings
     - PCI/sysfs: Ensure devices are powered for config reads (part 2)
     - exec: Fix incorrect type for ret
     - nios2: ensure that memblock.current_limit is set when setting pfn limits
     - hfs: clear offset and space out of valid records in b-tree node
     - hfs: make proper initalization of struct hfs_find_data
     - hfsplus: fix KMSAN uninit-value issue in __hfsplus_ext_cache_extent()
     - hfs: validate record offset in hfsplus_bmap_alloc
     - hfsplus: fix KMSAN uninit-value issue in hfsplus_delete_cat()
     - dlm: check for defined force value in dlm_lockspace_release
     - hfs: fix KMSAN uninit-value issue in hfs_find_set_zero_bits()
     - hfsplus: return EIO when type of hidden directory mismatch in
       hfsplus_fill_super()
     - m68k: bitops: Fix find_*_bit() signatures
     - net: rtnetlink: add helper to extract msg type's kind
     - net: rtnetlink: use BIT for flag values
     - net: netlink: add NLM_F_BULK delete request modifier
     - net: rtnetlink: add bulk delete support flag
     - net: add ndo_fdb_del_bulk
     - net: rtnetlink: add NLM_F_BULK support to rtnl_fdb_del
     - rtnetlink: Allow deleting FDB entries in user namespace
     - net: enetc: correct the value of ENETC_RXB_TRUESIZE
     - dpaa2-eth: fix the pointer passed to PTR_ALIGN on Tx path
     - arm64, mm: avoid always making PTE dirty in pte_mkwrite()
     - sctp: avoid NULL dereference when chunk data buffer is missing
     - net: bonding: fix possible peer notify event loss or dup issue
     - Revert "cpuidle: menu: Avoid discarding useful information"
     - MIPS: Malta: Fix keyboard resource preventing i8042 driver from
       registering
     - ocfs2: clear extent cache after moving/defragmenting extents
     - vsock: fix lock inversion in vsock_assign_transport()
     - net: usb: rtl8150: Fix frame padding
     - net: ravb: Ensure memory write completes before ringing TX doorbell
     - USB: serial: option: add UNISOC UIS7720
     - USB: serial: option: add Quectel RG255C
     - USB: serial: option: add Telit FN920C04 ECM compositions
     - usb/core/quirks: Add Huawei ME906S to wakeup quirk
     - usb: raw-gadget: do not limit transfer length
     - xhci: dbc: enable back DbC in resume if it was enabled before suspend
     - binder: remove "invalid inc weak" check
     - mei: me: add wildcat lake P DID
     - most: usb: Fix use-after-free in hdm_disconnect
     - most: usb: hdm_probe: Fix calling put_device() before device
       initialization
     - serial: 8250_exar: add support for Advantech 2 port card with Device ID
       0x0018
     - arm64: cputype: Add Neoverse-V3AE definitions
     - arm64: errata: Apply workarounds for Neoverse-V3AE
     - s390/cio: Update purge function to unregister the unused subchannels
     - xfs: rename the old_crc variable in xlog_recover_process
     - xfs: fix log CRC mismatches between i386 and other architectures
     - NFSD: Rework encoding and decoding of nfsd4_deviceid
     - NFSD: Minor cleanup in layoutcommit processing
     - NFSD: Fix last write offset handling in layoutcommit
     - iio: imu: inv_icm42600: use = { } instead of memset()
     - iio: imu: inv_ic

Source diff to previous version
2065369 veth.sh from ubuntu_kselftests_net failed on J-5.15 / N-6.8 (with xdp attached - gro flag)
2128729 Black screen when booting 5.15.0-160 (on AMD Lucienne / Cezanne / Navi / Renoir / Rembrandt)
2134182 Jammy update: v5.15.196 upstream stable release
2133909 Jammy update: v5.15.195 upstream stable release
CVE-2025-40094 In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_acm: Refactor bind path to use __free() After an bind/unbind cyc
CVE-2025-40092 In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_ncm: Refactor bind path to use __free() After an bind/unbind cyc
CVE-2025-40087 In the Linux kernel, the following vulnerability has been resolved: NFSD: Define a proc_layoutcommit for the FlexFiles layout type Avoid a crash if
CVE-2025-40105 In the Linux kernel, the following vulnerability has been resolved: vfs: Don't leak disconnected dentries on umount When user calls open_by_handle_
CVE-2025-40106 In the Linux kernel, the following vulnerability has been resolved: comedi: fix divide-by-zero in comedi_buf_munge() The comedi_buf_munge() functio
CVE-2025-40088 In the Linux kernel, the following vulnerability has been resolved: hfsplus: fix slab-out-of-bounds read in hfsplus_strcasecmp() The hfsplus_strcas
CVE-2025-40085 In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix NULL pointer deference in try_to_register_card In try_to_r
CVE-2025-40173 In the Linux kernel, the following vulnerability has been resolved: net/ip6_tunnel: Prevent perpetual tunnel growth Similarly to ipv4 tunnel, ipv6
CVE-2025-40167 In the Linux kernel, the following vulnerability has been resolved: ext4: detect invalid INLINE_DATA + EXTENTS flag combination syzbot reported a B
CVE-2025-40178 In the Linux kernel, the following vulnerability has been resolved: pid: Add a judgment for ns null in pid_nr_ns __task_pid_nr_ns ns = task
CVE-2025-40134 In the Linux kernel, the following vulnerability has been resolved: dm: fix NULL pointer dereference in __dm_suspend() There is a race condition be
CVE-2025-40042 In the Linux kernel, the following vulnerability has been resolved: tracing: Fix race condition in kprobe initialization causing NULL pointer derefe
CVE-2025-40120 In the Linux kernel, the following vulnerability has been resolved: net: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock Prevent USB
CVE-2025-40200 In the Linux kernel, the following vulnerability has been resolved: Squashfs: reject negative file sizes in squashfs_read_inode() Syskaller reports
CVE-2025-40026 In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Don't (re)check L1 intercepts when completing userspace I/O When comp
CVE-2025-40179 In the Linux kernel, the following vulnerability has been resolved: ext4: verify orphan file size is not too big In principle orphan file can be ar
CVE-2025-40204 In the Linux kernel, the following vulnerability has been resolved: sctp: Fix MAC comparison to be constant-time To prevent timing attacks, MACs ne
CVE-2025-40188 In the Linux kernel, the following vulnerability has been resolved: pwm: berlin: Fix wrong register in suspend/resume The 'enable' register should
CVE-2025-40194 In the Linux kernel, the following vulnerability has been resolved: cpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request() The c
CVE-2025-40205 In the Linux kernel, the following vulnerability has been resolved: btrfs: avoid potential out-of-bounds in btrfs_encode_fh() The function btrfs_en
CVE-2025-40183 In the Linux kernel, the following vulnerability has been resolved: bpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6} Cilium has a BPF egress
CVE-2025-40187 In the Linux kernel, the following vulnerability has been resolved: net/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce() If ne
CVE-2025-40111 In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Fix Use-after-free in validation Nodes stored in the validation dup
CVE-2025-40001 In the Linux kernel, the following vulnerability has been resolved: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue During the detaching of
CVE-2025-40029 In the Linux kernel, the following vulnerability has been resolved: bus: fsl-mc: Check return value of platform_get_resource() platform_get_resourc
CVE-2025-40030 In the Linux kernel, the following vulnerability has been resolved: pinctrl: check the return value of pinmux_ops::get_function_name() While the AP
CVE-2025-40035 In the Linux kernel, the following vulnerability has been resolved: Input: uinput - zero-initialize uinput_ff_upload_compat to avoid info leak Stru
CVE-2025-40153 In the Linux kernel, the following vulnerability has been resolved: mm: hugetlb: avoid soft lockup when mprotect to large memory area When calling
CVE-2025-40043 In the Linux kernel, the following vulnerability has been resolved: net: nfc: nci: Add parameter validation for packet data Syzbot reported an unin
CVE-2025-40044 In the Linux kernel, the following vulnerability has been resolved: fs: udf: fix OOB read in lengthAllocDescs handling When parsing Allocation Exte
CVE-2025-40048 In the Linux kernel, the following vulnerability has been resolved: uio_hv_generic: Let userspace take care of interrupt mask Remove the logic to s
CVE-2025-40049 In the Linux kernel, the following vulnerability has been resolved: Squashfs: fix uninit-value in squashfs_get_parent Syzkaller reports a "KMSAN: u
CVE-2025-40053 In the Linux kernel, the following vulnerability has been resolved: net: dlink: handle copy_thresh allocation failure The driver did not handle fai
CVE-2025-40055 In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix double free in user_cluster_connect() user_cluster_disconnect() free
CVE-2025-40127 In the Linux kernel, the following vulnerability has been resolved: hwrng: ks-sa - fix division by zero in ks_sa_rng_init Fix division by zero in k
CVE-2025-40140 In the Linux kernel, the following vulnerability has been resolved: net: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast syzbot re
CVE-2025-40115 In the Linux kernel, the following vulnerability has been resolved: scsi: mpt3sas: Fix crash in transport port remove by using ioc_info() During mp
CVE-2025-40060 In the Linux kernel, the following vulnerability has been resolved: coresight: trbe: Return NULL pointer for allocation failures When the TRBE driv
CVE-2025-40112 In the Linux kernel, the following vulnerability has been resolved: sparc: fix accurate exception reporting in copy_{from_to}_user for Niagara The
CVE-2025-40124 In the Linux kernel, the following vulnerability has been resolved: sparc: fix accurate exception reporting in copy_{from_to}_user for UltraSPARC II
CVE-2025-40126 In the Linux kernel, the following vulnerability has been resolved: sparc: fix accurate exception reporting in copy_{from_to}_user for UltraSPARC T
CVE-2025-40068 In the Linux kernel, the following vulnerability has been resolved: fs: ntfs3: Fix integer overflow in run_unpack() The MFT record relative to the
CVE-2025-40121 In the Linux kernel, the following vulnerability has been resolved: ASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping When an invalid valu
CVE-2025-40154 In the Linux kernel, the following vulnerability has been resolved: ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping When an invalid valu
CVE-2025-40070 In the Linux kernel, the following vulnerability has been resolved: pps: fix warning in pps_register_cdev when register device fail Similar to prev
CVE-2025-40118 In the Linux kernel, the following vulnerability has been resolved: scsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod Since commit f7b705c238
CVE-2025-40116 In the Linux kernel, the following vulnerability has been resolved: usb: host: max3421-hcd: Fix error pointer dereference in probe cleanup The kthr
CVE-2025-40078 In the Linux kernel, the following vulnerability has been resolved: bpf: Explicitly check accesses to bpf_sock_addr Syzkaller found a kernel warnin
CVE-2025-40171 In the Linux kernel, the following vulnerability has been resolved: nvmet-fc: move lsop put work to nvmet_fc_ls_req_op It’s possible for more than
CVE-2025-40125 In the Linux kernel, the following vulnerability has been resolved: blk-mq: check kobject state_in_sysfs before deleting in blk_mq_unregister_hctx
CVE-2025-40081 In the Linux kernel, the following vulnerability has been resolved: perf: arm_spe: Prevent overflow in PERF_IDX2OFF() Cast nr_pages to unsigned lon
CVE-2025-40027 In the Linux kernel, the following vulnerability has been resolved: net/9p: fix double req put in p9_fd_cancelled Syzkaller reports a KASAN issue a
CVE-2025-40109 In the Linux kernel, the following vulnerability has been resolved: crypto: rng - Ensure set_ent is always present Ensure that set_ent is always se
CVE-2024-58011 In the Linux kernel, the following vulnerability has been resolved: platform/x86: int3472: Check for adev == NULL Not all devices have an ACPI comp
CVE-2025-39995 In the Linux kernel, the following vulnerability has been resolved: media: i2c: tc358743: Fix use-after-free bugs caused by orphan timer in probe T
CVE-2025-39994 In the Linux kernel, the following vulnerability has been resolved: media: tuner: xc5000: Fix use-after-free in xc5000_release The original code us
CVE-2025-22058 In the Linux kernel, the following vulnerability has been resolved: udp: Fix memory accounting leak. Matt Dowling reported a weird UDP memory usage
CVE-2025-39996 In the Linux kernel, the following vulnerability has been resolved: media: b2c2: Fix use-after-free causing by irq_check_work in flexcop_pci_remove
CVE-2025-39998 In the Linux kernel, the following vulnerability has been resolved: scsi: target: target_core_configfs: Add length check to avoid buffer overflow A
CVE-2025-38561 In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix Preauh_HashValue race condition If client send multiple session setu

Version: 5.15.0-165.175 2025-11-25 21:08:31 UTC

 linux (5.15.0-165.175) jammy; urgency=medium
 .
   * jammy/linux: 5.15.0-165.175 -proposed tracker (LP: #2132307)
 .
   * CAP_PERFMON insufficient to get perf data (LP: #2131046)
     - SAUCE: perf/core: Allow CAP_PERFMON for paranoid level 4
 .
   * Jammy Linux: Introduced Warning with CVE-2024-53090 fix (LP: #2130553)
     - SAUCE: Remove warning introduced during CVE-2024-53090 fix
 .
   * [SRU] Apparmor: Unshifted uids for hardlinks and unix sockets in user
     namespaces (LP: #2121257)
     - apparmor: shift ouid when mediating hard links in userns
     - apparmor: shift uid when mediating af_unix in userns
 .
   * i40e driver is triggering VF resets on every link state change
     (LP: #2130552)
     - i40e: avoid redundant VF link state updates
 .
   * Jammy update: v5.15.194 upstream stable release (LP: #2127866)
     - Revert "fbdev: Disable sysfb device registration when removing
       conflicting FBs"
     - xfs: short circuit xfs_growfs_data_private() if delta is zero
     - kunit: kasan_test: disable fortify string checker on kasan_strings()
       test
     - mm: introduce and use {pgd,p4d}_populate_kernel()
     - media: mtk-vcodec: venc: avoid -Wenum-compare-conditional warning
     - media: i2c: imx214: Fix link frequency validation
     - net: Fix null-ptr-deref by sock_lock_init_class_and_name() and rmmod.
     - tracing: Do not add length to print format in synthetic events
     - mm/rmap: reject hugetlb folios in folio_make_device_exclusive()
     - flexfiles/pNFS: fix NULL checks on result of
       ff_layout_choose_ds_for_read
     - NFSv4: Don't clear capabilities that won't be reset
     - NFSv4: Clear the NFS_CAP_FS_LOCATIONS flag if it is not set
     - NFSv4: Clear the NFS_CAP_XATTR flag if not supported by the server
     - tracing: Fix tracing_marker may trigger page fault during
       preempt_disable
     - NFSv4/flexfiles: Fix layout merge mirror check.
     - tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to
       allocate psock->cork.
     - KVM: x86: Move open-coded CPUID leaf 0x80000021 EAX bit propagation code
     - KVM: SVM: Return TSA_SQ_NO and TSA_L1_NO bits in __do_cpuid_func()
     - KVM: SVM: Set synthesized TSA CPUID flags
     - EDAC/altera: Delete an inappropriate dma_free_coherent() call
     - compiler-clang.h: define __SANITIZE_*__ macros only when undefined
     - ocfs2: fix recursive semaphore deadlock in fiemap call
     - mtd: rawnand: stm32_fmc2: fix ECC overwrite
     - fuse: check if copy_file_range() returns larger than requested size
     - fuse: prevent overflow in copy_file_range return value
     - libceph: fix invalid accesses to ceph_connection_v1_info
     - mm/khugepaged: fix the address passed to notifier on testing young
     - mtd: nand: raw: atmel: Fix comment in timings preparation
     - mtd: nand: raw: atmel: Respect tAR, tCLR in read setup timing
     - mtd: rawnand: stm32_fmc2: Fix dma_map_sg error check
     - mtd: rawnand: stm32_fmc2: avoid overlapping mappings on ECC buffer
     - Input: i8042 - add TUXEDO InfinityBook Pro Gen10 AMD to i8042 quirk
       table
     - tty: hvc_console: Call hvc_kick in hvc_write unconditionally
     - dt-bindings: serial: brcm,bcm7271-uart: Constrain clocks
     - USB: serial: option: add Telit Cinterion FN990A w/audio compositions
     - USB: serial: option: add Telit Cinterion LE910C4-WWX new compositions
     - net: fec: Fix possible NPD in fec_enet_phy_reset_after_clk_enable()
     - tunnels: reset the GSO metadata before reusing the skb
     - igb: fix link test skipping when interface is admin down
     - genirq: Provide new interfaces for affinity hints
     - i40e: Use irq_update_affinity_hint()
     - i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error path
     - can: j1939: j1939_sk_bind(): call j1939_priv_put() immediately when
       j1939_local_ecu_get() failed
     - can: j1939: j1939_local_ecu_get(): undo increment when
       j1939_local_ecu_get() fails
     - can: xilinx_can: xcan_write_frame(): fix use-after-free of transmitted
       SKB
     - net: hsr: Disable promiscuous mode in offload mode
     - net: hsr: Add support for MC filtering at the slave device
     - net: hsr: Add VLAN CTAG filter support
     - hsr: use rtnl lock when iterating over ports
     - hsr: use hsr_for_each_port_rtnl in hsr_port_get_hsr
     - dmaengine: ti: edma: Fix memory allocation size for queue_priority_map
     - regulator: sy7636a: fix lifecycle of power good gpio
     - hrtimer: Remove unused function
     - hrtimer: Rename __hrtimer_hres_active() to hrtimer_hres_active()
     - hrtimers: Unconditionally update target CPU base after offline timer
       migration
     - dmaengine: qcom: bam_dma: Fix DT error handling for num-channels/ees
     - phy: tegra: xusb: fix device and OF node leak at probe
     - phy: ti-pipe3: fix device leak at unbind
     - soc: qcom: mdt_loader: Deal with zero e_shentsize
     - drm/amdgpu: fix a memory leak in fence cleanup when unloading
     - drm/i915/power: fix size for for_each_set_bit() in abox iteration
     - mm/memory-failure: fix VM_BUG_ON_PAGE(PagePoisoned(page)) when unpoison
       memory
     - net: hsr: hsr_slave: Fix the promiscuous mode in offload mode
     - ALSA: firewire-motu: drop EPOLLOUT from poll return values as write is
       not supported
     - wifi: mac80211: fix incorrect type for ret
     - pcmcia: omap_cf: Mark driver struct with __refdata to prevent section
       mismatch
     - cgroup: split cgroup_destroy_wq into 3 workqueues
     - um: virtio_uml: Fix use-after-free after put_device in probe
     - dpaa2-switch: fix buffer pool seeding for control traffic
     - qed: Don't collect too many protection override GRC elements
     - net: natsemi: fix `rx_dropped` double accounting on `netif_rx()` failure
     - i40e: remove redundant memory barrier when cleaning Tx descs
     - tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect().
     - Revert "net/mlx5e: Update and set Xon/X

2131046 CAP_PERFMON insufficient to get perf data
2130553 Jammy Linux: Introduced Warning with CVE-2024-53090 fix
2121257 [SRU] Apparmor: Unshifted uids for hardlinks and unix sockets in user namespaces
2130552 i40e driver is triggering VF resets on every link state change
2127866 Jammy update: v5.15.194 upstream stable release
CVE-2024-53090 In the Linux kernel, the following vulnerability has been resolved: afs: Fix lock recursion afs_wake_up_async_call() can incur lock recursion. The
CVE-2025-40019 In the Linux kernel, the following vulnerability has been resolved: crypto: essiv - Check ssize for decryption and in-place encryption Move the ssi
CVE-2024-56538 In the Linux kernel, the following vulnerability has been resolved: drm: zynqmp_kms: Unplug DRM device before removal Prevent userspace accesses to
CVE-2025-39993 In the Linux kernel, the following vulnerability has been resolved: media: rc: fix races with imon_disconnect() Syzbot reports a KASAN issue as bel
CVE-2024-53218 In the Linux kernel, the following vulnerability has been resolved: f2fs: fix race in concurrent f2fs_stop_gc_thread In my test case, concurrent ca
CVE-2024-47691 In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid use-after-free in f2fs_stop_gc_thread() syzbot reports a f2f
CVE-2025-40018 In the Linux kernel, the following vulnerability has been resolved: ipvs: Defer ip_vs_ftp unregister during netns cleanup On the netns cleanup path
CVE-2024-53114 In the Linux kernel, the following vulnerability has been resolved: x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 client A number of Zen4 cl
CVE-2025-39964 In the Linux kernel, the following vulnerability has been resolved: crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg Issuing two write
CVE-2022-49390 In the Linux kernel, the following vulnerability has been resolved: macsec: fix UAF bug for real_dev Create a new macsec device but not get referen
CVE-2025-38584 In the Linux kernel, the following vulnerability has been resolved: padata: Fix pd UAF once and for all There is a race condition/UAF in padata_reo
CVE-2025-21855 In the Linux kernel, the following vulnerability has been resolved: ibmvnic: Don't reference skb after sending to VIOS Previously, after successful
CVE-2024-50067 In the Linux kernel, the following vulnerability has been resolved: uprobe: avoid out-of-bounds memory access of fetching args Uprobe needs to fetc



About   -   Send Feedback to @ubuntu_updates