USN-7928-5
Unknown
USN-7928-5: Linux kernel (KVM) vulnerabilities
Canonical (Ubuntu)
Released: January 09, 2026
Updated: January 12, 2026
Restart Required
Description
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Cryptographic API;
- Media drivers;
- Network drivers;
- AFS file system;
- F2FS file system;
- Tracing infrastructure;
- Netfilter;
(CVE-2022-49390, CVE-2024-47691, CVE-2024-50067, CVE-2024-53090,
CVE-2024-53218, CVE-2025-21855, CVE-2025-39964, CVE-2025-39993,
CVE-2025-40018)
Fixed Vulnerabilities 2
Mar 12, 2025
In the Linux kernel, the following vulnerability has been resolved: ibmvnic: Don't reference skb after sending to VIOS Previously, after successfully flushing the xmit buffer…
Feb 26, 2025
In the Linux kernel, the following vulnerability has been resolved: macsec: fix UAF bug for real_dev Create a new macsec device but not get reference…
Quick Info
Patch ID:
USN-7928-5
Vendor:
Canonical (Ubuntu)
Severity:
Unknown
CVEs Fixed:
2
Restart:
Required
Vendor
Canonical (Ubuntu)Additional Info
action:
usn id:
USN-7928-5
summary:
Several security issues were fixed in the Linux kernel.
usn number:
7928-5
instructions:
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
