USN-7928-5 Unknown

USN-7928-5: Linux kernel (KVM) vulnerabilities

Canonical (Ubuntu) Released: January 09, 2026 Updated: January 12, 2026 Restart Required

Description

Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Cryptographic API; - Media drivers; - Network drivers; - AFS file system; - F2FS file system; - Tracing infrastructure; - Netfilter; (CVE-2022-49390, CVE-2024-47691, CVE-2024-50067, CVE-2024-53090, CVE-2024-53218, CVE-2025-21855, CVE-2025-39964, CVE-2025-39993, CVE-2025-40018)

Fixed Vulnerabilities 2

CVE-2025-21855 N/A 0.0 ⚠️ KEV fixed
Mar 12, 2025

In the Linux kernel, the following vulnerability has been resolved: ibmvnic: Don't reference skb after sending to VIOS Previously, after successfully flushing the xmit buffer…

CVE-2022-49390 N/A 0.0 ⚠️ KEV fixed
Feb 26, 2025

In the Linux kernel, the following vulnerability has been resolved: macsec: fix UAF bug for real_dev Create a new macsec device but not get reference…

Quick Info

Patch ID: USN-7928-5
Vendor: Canonical (Ubuntu)
Severity: Unknown
CVEs Fixed: 2
Restart: Required

Additional Info

action:
usn id: USN-7928-5
summary: Several security issues were fixed in the Linux kernel.
usn number: 7928-5
instructions: After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.

Share