{
    "summary": {
        "snap": {
            "added": [],
            "removed": [],
            "diff": []
        },
        "deb": {
            "added": [
                "linux-headers-6.8.0-88",
                "linux-headers-6.8.0-88-generic",
                "linux-image-6.8.0-88-generic",
                "linux-modules-6.8.0-88-generic",
                "linux-tools-6.8.0-88",
                "linux-tools-6.8.0-88-generic"
            ],
            "removed": [
                "linux-headers-6.8.0-87",
                "linux-headers-6.8.0-87-generic",
                "linux-image-6.8.0-87-generic",
                "linux-modules-6.8.0-87-generic",
                "linux-tools-6.8.0-87",
                "linux-tools-6.8.0-87-generic"
            ],
            "diff": [
                "gir1.2-packagekitglib-1.0",
                "libdrm-common",
                "libdrm2:s390x",
                "libpackagekit-glib2-18:s390x",
                "linux-headers-generic",
                "linux-headers-virtual",
                "linux-image-virtual",
                "linux-libc-dev:s390x",
                "linux-tools-common",
                "linux-virtual",
                "packagekit",
                "packagekit-tools"
            ]
        }
    },
    "diff": {
        "deb": [
            {
                "name": "gir1.2-packagekitglib-1.0",
                "from_version": {
                    "source_package_name": "packagekit",
                    "source_package_version": "1.2.8-2ubuntu1.2",
                    "version": "1.2.8-2ubuntu1.2"
                },
                "to_version": {
                    "source_package_name": "packagekit",
                    "source_package_version": "1.2.8-2ubuntu1.4",
                    "version": "1.2.8-2ubuntu1.4"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2060730,
                    2060730
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * d/p/apt-Handle-gstreamer-64bit-suffix-on-any-architecture.patch:",
                            "    Fix matching GStreamer capabilities on ARM64 and other architectures",
                            "    (LP: #2060730)",
                            ""
                        ],
                        "package": "packagekit",
                        "version": "1.2.8-2ubuntu1.4",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2060730
                        ],
                        "author": "Alessandro Astone <alessandro.astone@canonical.com>",
                        "date": "Thu, 09 Oct 2025 11:00:52 +0200"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * d/p/apt-Fix-matching-gstreamer-pkgs-where-the-only-modifier-i.patch:",
                            "    Fix matching GStreamer capabilities, which would find no results in some",
                            "    specific but common edge-cases (LP: #2060730).",
                            ""
                        ],
                        "package": "packagekit",
                        "version": "1.2.8-2ubuntu1.3",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2060730
                        ],
                        "author": "Alessandro Astone <alessandro.astone@canonical.com>",
                        "date": "Tue, 01 Jul 2025 11:00:56 +0200"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libdrm-common",
                "from_version": {
                    "source_package_name": "libdrm",
                    "source_package_version": "2.4.122-1~ubuntu0.24.04.1",
                    "version": "2.4.122-1~ubuntu0.24.04.1"
                },
                "to_version": {
                    "source_package_name": "libdrm",
                    "source_package_version": "2.4.122-1~ubuntu0.24.04.2",
                    "version": "2.4.122-1~ubuntu0.24.04.2"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2127944
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * patches: Identify APUs from hardware (LP: #2127944)",
                            ""
                        ],
                        "package": "libdrm",
                        "version": "2.4.122-1~ubuntu0.24.04.2",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2127944
                        ],
                        "author": "Timo Aaltonen <tjaalton@debian.org>",
                        "date": "Fri, 24 Oct 2025 17:48:33 +0300"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libdrm2:s390x",
                "from_version": {
                    "source_package_name": "libdrm",
                    "source_package_version": "2.4.122-1~ubuntu0.24.04.1",
                    "version": "2.4.122-1~ubuntu0.24.04.1"
                },
                "to_version": {
                    "source_package_name": "libdrm",
                    "source_package_version": "2.4.122-1~ubuntu0.24.04.2",
                    "version": "2.4.122-1~ubuntu0.24.04.2"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2127944
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * patches: Identify APUs from hardware (LP: #2127944)",
                            ""
                        ],
                        "package": "libdrm",
                        "version": "2.4.122-1~ubuntu0.24.04.2",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2127944
                        ],
                        "author": "Timo Aaltonen <tjaalton@debian.org>",
                        "date": "Fri, 24 Oct 2025 17:48:33 +0300"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "libpackagekit-glib2-18:s390x",
                "from_version": {
                    "source_package_name": "packagekit",
                    "source_package_version": "1.2.8-2ubuntu1.2",
                    "version": "1.2.8-2ubuntu1.2"
                },
                "to_version": {
                    "source_package_name": "packagekit",
                    "source_package_version": "1.2.8-2ubuntu1.4",
                    "version": "1.2.8-2ubuntu1.4"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2060730,
                    2060730
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * d/p/apt-Handle-gstreamer-64bit-suffix-on-any-architecture.patch:",
                            "    Fix matching GStreamer capabilities on ARM64 and other architectures",
                            "    (LP: #2060730)",
                            ""
                        ],
                        "package": "packagekit",
                        "version": "1.2.8-2ubuntu1.4",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2060730
                        ],
                        "author": "Alessandro Astone <alessandro.astone@canonical.com>",
                        "date": "Thu, 09 Oct 2025 11:00:52 +0200"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * d/p/apt-Fix-matching-gstreamer-pkgs-where-the-only-modifier-i.patch:",
                            "    Fix matching GStreamer capabilities, which would find no results in some",
                            "    specific but common edge-cases (LP: #2060730).",
                            ""
                        ],
                        "package": "packagekit",
                        "version": "1.2.8-2ubuntu1.3",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2060730
                        ],
                        "author": "Alessandro Astone <alessandro.astone@canonical.com>",
                        "date": "Tue, 01 Jul 2025 11:00:56 +0200"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "linux-headers-generic",
                "from_version": {
                    "source_package_name": "linux-meta",
                    "source_package_version": "6.8.0-87.88",
                    "version": "6.8.0-87.88"
                },
                "to_version": {
                    "source_package_name": "linux-meta",
                    "source_package_version": "6.8.0-88.89",
                    "version": "6.8.0-88.89"
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Main version: 6.8.0-88.89",
                            ""
                        ],
                        "package": "linux-meta",
                        "version": "6.8.0-88.89",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [],
                        "author": "Edoardo Canepa <edoardo.canepa@canonical.com>",
                        "date": "Sat, 11 Oct 2025 01:39:50 +0200"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "linux-headers-virtual",
                "from_version": {
                    "source_package_name": "linux-meta",
                    "source_package_version": "6.8.0-87.88",
                    "version": "6.8.0-87.88"
                },
                "to_version": {
                    "source_package_name": "linux-meta",
                    "source_package_version": "6.8.0-88.89",
                    "version": "6.8.0-88.89"
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Main version: 6.8.0-88.89",
                            ""
                        ],
                        "package": "linux-meta",
                        "version": "6.8.0-88.89",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [],
                        "author": "Edoardo Canepa <edoardo.canepa@canonical.com>",
                        "date": "Sat, 11 Oct 2025 01:39:50 +0200"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "linux-image-virtual",
                "from_version": {
                    "source_package_name": "linux-meta",
                    "source_package_version": "6.8.0-87.88",
                    "version": "6.8.0-87.88"
                },
                "to_version": {
                    "source_package_name": "linux-meta",
                    "source_package_version": "6.8.0-88.89",
                    "version": "6.8.0-88.89"
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Main version: 6.8.0-88.89",
                            ""
                        ],
                        "package": "linux-meta",
                        "version": "6.8.0-88.89",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [],
                        "author": "Edoardo Canepa <edoardo.canepa@canonical.com>",
                        "date": "Sat, 11 Oct 2025 01:39:50 +0200"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "linux-libc-dev:s390x",
                "from_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.8.0-87.88",
                    "version": "6.8.0-87.88"
                },
                "to_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.8.0-88.89",
                    "version": "6.8.0-88.89"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-21729",
                        "url": "https://ubuntu.com/security/CVE-2025-21729",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion  The rtwdev->scanning flag isn't protected by mutex originally, so cancel_hw_scan can pass the condition, but suddenly hw_scan completion unset the flag and calls ieee80211_scan_completed() that will free local->hw_scan_req. Then, cancel_hw_scan raises null-ptr-deref and use-after-free. Fix it by moving the check condition to where protected by mutex.   KASAN: null-ptr-deref in range [0x0000000000000088-0x000000000000008f]  CPU: 2 PID: 6922 Comm: kworker/2:2 Tainted: G           OE  Hardware name: LENOVO 2356AD1/2356AD1, BIOS G7ETB6WW (2.76 ) 09/10/2019  Workqueue: events cfg80211_conn_work [cfg80211]  RIP: 0010:rtw89_fw_h2c_scan_offload_be+0xc33/0x13c3 [rtw89_core]  Code: 00 45 89 6c 24 1c 0f 85 23 01 00 00 48 8b 85 20 ff ff ff 48 8d  RSP: 0018:ffff88811fd9f068 EFLAGS: 00010206  RAX: dffffc0000000000 RBX: ffff88811fd9f258 RCX: 0000000000000001  RDX: 0000000000000011 RSI: 0000000000000001 RDI: 0000000000000089  RBP: ffff88811fd9f170 R08: 0000000000000000 R09: 0000000000000000  R10: ffff88811fd9f108 R11: 0000000000000000 R12: ffff88810e47f960  R13: 0000000000000000 R14: 000000000000ffff R15: 0000000000000000  FS:  0000000000000000(0000) GS:ffff8881d6f00000(0000) knlGS:0000000000000000  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033  CR2: 00007531dfca55b0 CR3: 00000001be296004 CR4: 00000000001706e0  Call Trace:   <TASK>   ? show_regs+0x61/0x73   ? __die_body+0x20/0x73   ? die_addr+0x4f/0x7b   ? exc_general_protection+0x191/0x1db   ? asm_exc_general_protection+0x27/0x30   ? rtw89_fw_h2c_scan_offload_be+0xc33/0x13c3 [rtw89_core]   ? rtw89_fw_h2c_scan_offload_be+0x458/0x13c3 [rtw89_core]   ? __pfx_rtw89_fw_h2c_scan_offload_be+0x10/0x10 [rtw89_core]   ? do_raw_spin_lock+0x75/0xdb   ? __pfx_do_raw_spin_lock+0x10/0x10   rtw89_hw_scan_offload+0xb5e/0xbf7 [rtw89_core]   ? _raw_spin_unlock+0xe/0x24   ? __mutex_lock.constprop.0+0x40c/0x471   ? __pfx_rtw89_hw_scan_offload+0x10/0x10 [rtw89_core]   ? __mutex_lock_slowpath+0x13/0x1f   ? mutex_lock+0xa2/0xdc   ? __pfx_mutex_lock+0x10/0x10   rtw89_hw_scan_abort+0x58/0xb7 [rtw89_core]   rtw89_ops_cancel_hw_scan+0x120/0x13b [rtw89_core]   ieee80211_scan_cancel+0x468/0x4d0 [mac80211]   ieee80211_prep_connection+0x858/0x899 [mac80211]   ieee80211_mgd_auth+0xbea/0xdde [mac80211]   ? __pfx_ieee80211_mgd_auth+0x10/0x10 [mac80211]   ? cfg80211_find_elem+0x15/0x29 [cfg80211]   ? is_bss+0x1b7/0x1d7 [cfg80211]   ieee80211_auth+0x18/0x27 [mac80211]   cfg80211_mlme_auth+0x3bb/0x3e7 [cfg80211]   cfg80211_conn_do_work+0x410/0xb81 [cfg80211]   ? __pfx_cfg80211_conn_do_work+0x10/0x10 [cfg80211]   ? __kasan_check_read+0x11/0x1f   ? psi_group_change+0x8bc/0x944   ? __kasan_check_write+0x14/0x22   ? mutex_lock+0x8e/0xdc   ? __pfx_mutex_lock+0x10/0x10   ? __pfx___radix_tree_lookup+0x10/0x10   cfg80211_conn_work+0x245/0x34d [cfg80211]   ? __pfx_cfg80211_conn_work+0x10/0x10 [cfg80211]   ? update_cfs_rq_load_avg+0x3bc/0x3d7   ? sched_clock_noinstr+0x9/0x1a   ? sched_clock+0x10/0x24   ? sched_clock_cpu+0x7e/0x42e   ? newidle_balance+0x796/0x937   ? __pfx_sched_clock_cpu+0x10/0x10   ? __pfx_newidle_balance+0x10/0x10   ? __kasan_check_read+0x11/0x1f   ? psi_group_change+0x8bc/0x944   ? _raw_spin_unlock+0xe/0x24   ? raw_spin_rq_unlock+0x47/0x54   ? raw_spin_rq_unlock_irq+0x9/0x1f   ? finish_task_switch.isra.0+0x347/0x586   ? __schedule+0x27bf/0x2892   ? mutex_unlock+0x80/0xd0   ? do_raw_spin_lock+0x75/0xdb   ? __pfx___schedule+0x10/0x10   process_scheduled_works+0x58c/0x821   worker_thread+0x4c7/0x586   ? __kasan_check_read+0x11/0x1f   kthread+0x285/0x294   ? __pfx_worker_thread+0x10/0x10   ? __pfx_kthread+0x10/0x10   ret_from_fork+0x29/0x6f   ? __pfx_kthread+0x10/0x10   ret_from_fork_asm+0x1b/0x30   </TASK>",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-02-27 02:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38227",
                        "url": "https://ubuntu.com/security/CVE-2025-38227",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  media: vidtv: Terminating the subsequent process of initialization failure  syzbot reported a slab-use-after-free Read in vidtv_mux_init. [1]  After PSI initialization fails, the si member is accessed again, resulting in this uaf.  After si initialization fails, the subsequent process needs to be exited.  [1] BUG: KASAN: slab-use-after-free in vidtv_mux_pid_ctx_init drivers/media/test-drivers/vidtv/vidtv_mux.c:78 [inline] BUG: KASAN: slab-use-after-free in vidtv_mux_init+0xac2/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:524 Read of size 8 at addr ffff88802fa42acc by task syz.2.37/6059  CPU: 0 UID: 0 PID: 6059 Comm: syz.2.37 Not tainted 6.14.0-rc5-syzkaller #0 Hardware name: Google Compute Engine, BIOS Google 02/12/2025 Call Trace: <TASK> __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:408 [inline] print_report+0xc3/0x670 mm/kasan/report.c:521 kasan_report+0xd9/0x110 mm/kasan/report.c:634 vidtv_mux_pid_ctx_init drivers/media/test-drivers/vidtv/vidtv_mux.c:78 vidtv_mux_init+0xac2/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:524 vidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194 vidtv_start_feed drivers/media/test-drivers/vidtv/vidtv_bridge.c:239 dmx_section_feed_start_filtering drivers/media/dvb-core/dvb_demux.c:973 dvb_dmxdev_feed_start drivers/media/dvb-core/dmxdev.c:508 [inline] dvb_dmxdev_feed_restart.isra.0 drivers/media/dvb-core/dmxdev.c:537 dvb_dmxdev_filter_stop+0x2b4/0x3a0 drivers/media/dvb-core/dmxdev.c:564 dvb_dmxdev_filter_free drivers/media/dvb-core/dmxdev.c:840 [inline] dvb_demux_release+0x92/0x550 drivers/media/dvb-core/dmxdev.c:1246 __fput+0x3ff/0xb70 fs/file_table.c:464 task_work_run+0x14e/0x250 kernel/task_work.c:227 exit_task_work include/linux/task_work.h:40 [inline] do_exit+0xad8/0x2d70 kernel/exit.c:938 do_group_exit+0xd3/0x2a0 kernel/exit.c:1087 __do_sys_exit_group kernel/exit.c:1098 [inline] __se_sys_exit_group kernel/exit.c:1096 [inline] __x64_sys_exit_group+0x3e/0x50 kernel/exit.c:1096 x64_sys_call+0x151f/0x1720 arch/x86/include/generated/asm/syscalls_64.h:232 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f871d58d169 Code: Unable to access opcode bytes at 0x7f871d58d13f. RSP: 002b:00007fff4b19a788 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f871d58d169 RDX: 0000000000000064 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 00007fff4b19a7ec R08: 0000000b4b19a87f R09: 00000000000927c0 R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000003 R13: 00000000000927c0 R14: 000000000001d553 R15: 00007fff4b19a840  </TASK>  Allocated by task 6059:  kasan_save_stack+0x33/0x60 mm/kasan/common.c:47  kasan_save_track+0x14/0x30 mm/kasan/common.c:68  poison_kmalloc_redzone mm/kasan/common.c:377 [inline]  __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:394  kmalloc_noprof include/linux/slab.h:901 [inline]  kzalloc_noprof include/linux/slab.h:1037 [inline]  vidtv_psi_pat_table_init drivers/media/test-drivers/vidtv/vidtv_psi.c:970  vidtv_channel_si_init drivers/media/test-drivers/vidtv/vidtv_channel.c:423  vidtv_mux_init drivers/media/test-drivers/vidtv/vidtv_mux.c:519  vidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194  vidtv_start_feed drivers/media/test-drivers/vidtv/vidtv_bridge.c:239  dmx_section_feed_start_filtering drivers/media/dvb-core/dvb_demux.c:973  dvb_dmxdev_feed_start drivers/media/dvb-core/dmxdev.c:508 [inline]  dvb_dmxdev_feed_restart.isra.0 drivers/media/dvb-core/dmxdev.c:537  dvb_dmxdev_filter_stop+0x2b4/0x3a0 drivers/media/dvb-core/dmxdev.c:564  dvb_dmxdev_filter_free drivers/media/dvb-core/dmxdev.c:840 [inline]  dvb_demux_release+0x92/0x550 drivers/media/dvb-core/dmxdev.c:1246  __fput+0x3ff/0xb70 fs/file_tabl ---truncated---",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-07-04 14:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38678",
                        "url": "https://ubuntu.com/security/CVE-2025-38678",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  netfilter: nf_tables: reject duplicate device on updates  A chain/flowtable update with duplicated devices in the same batch is possible. Unfortunately, netdev event path only removes the first device that is found, leaving unregistered the hook of the duplicated device.  Check if a duplicated device exists in the transaction batch, bail out with EEXIST in such case.  WARNING is hit when unregistering the hook:   [49042.221275] WARNING: CPU: 4 PID: 8425 at net/netfilter/core.c:340 nf_hook_entry_head+0xaa/0x150  [49042.221375] CPU: 4 UID: 0 PID: 8425 Comm: nft Tainted: G S                 6.16.0+ #170 PREEMPT(full)  [...]  [49042.221382] RIP: 0010:nf_hook_entry_head+0xaa/0x150",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-09-03 13:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38616",
                        "url": "https://ubuntu.com/security/CVE-2025-38616",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  tls: handle data disappearing from under the TLS ULP  TLS expects that it owns the receive queue of the TCP socket. This cannot be guaranteed in case the reader of the TCP socket entered before the TLS ULP was installed, or uses some non-standard read API (eg. zerocopy ones). Replace the WARN_ON() and a buggy early exit (which leaves anchor pointing to a freed skb) with real error handling. Wipe the parsing state and tell the reader to retry.  We already reload the anchor every time we (re)acquire the socket lock, so the only condition we need to avoid is an out of bounds read (not having enough bytes in the socket for previously parsed record len).  If some data was read from under TLS but there's enough in the queue we'll reload and decrypt what is most likely not a valid TLS record. Leading to some undefined behavior from TLS perspective (corrupting a stream? missing an alert? missing an attack?) but no kernel crash should take place.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-08-22 14:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-37838",
                        "url": "https://ubuntu.com/security/CVE-2025-37838",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  HSI: ssi_protocol: Fix use after free vulnerability in ssi_protocol Driver Due to Race Condition  In the ssi_protocol_probe() function, &ssi->work is bound with ssip_xmit_work(), In ssip_pn_setup(), the ssip_pn_xmit() function within the ssip_pn_ops structure is capable of starting the work.  If we remove the module which will call ssi_protocol_remove() to make a cleanup, it will free ssi through kfree(ssi), while the work mentioned above will be used. The sequence of operations that may lead to a UAF bug is as follows:  CPU0                                    CPU1                          | ssip_xmit_work ssi_protocol_remove     | kfree(ssi);             |                         | struct hsi_client *cl = ssi->cl;                         | // use ssi  Fix it by ensuring that the work is canceled before proceeding with the cleanup in ssi_protocol_remove().",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-04-18 15:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-40300",
                        "url": "https://ubuntu.com/security/CVE-2025-40300",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  x86/vmscape: Add conditional IBPB mitigation  VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace hypervisor (like QEMU). Existing mitigations already protect kernel/KVM from a malicious guest. Userspace can additionally be protected by flushing the branch predictors after a VMexit.  Since it is the userspace that consumes the poisoned branch predictors, conditionally issue an IBPB after a VMexit and before returning to userspace. Workloads that frequently switch between hypervisor and userspace will incur the most overhead from the new IBPB.  This new IBPB is not integrated with the existing IBPB sites. For instance, a task can use the existing speculation control prctl() to get an IBPB at context switch time. With this implementation, the IBPB is doubled up: one at context switch and another before running userspace.  The intent is to integrate and optimize these cases post-embargo.  [ dhansen: elaborate on suboptimal IBPB solution ]",
                        "cve_priority": "high",
                        "cve_public_date": "2025-09-11 17:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38352",
                        "url": "https://ubuntu.com/security/CVE-2025-38352",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del()  If an exiting non-autoreaping task has already passed exit_notify() and calls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent or debugger right after unlock_task_sighand().  If a concurrent posix_cpu_timer_del() runs at that moment, it won't be able to detect timer->it.cpu.firing != 0: cpu_timer_task_rcu() and/or lock_task_sighand() will fail.  Add the tsk->exit_state check into run_posix_cpu_timers() to fix this.  This fix is not needed if CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y, because exit_task_work() is called before exit_notify(). But the check still makes sense, task_work_add(&tsk->posix_cputimers_work.work) will fail anyway in this case.",
                        "cve_priority": "high",
                        "cve_public_date": "2025-07-22 08:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38118",
                        "url": "https://ubuntu.com/security/CVE-2025-38118",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  Bluetooth: MGMT: Fix UAF on mgmt_remove_adv_monitor_complete  This reworks MGMT_OP_REMOVE_ADV_MONITOR to not use mgmt_pending_add to avoid crashes like bellow:  ================================================================== BUG: KASAN: slab-use-after-free in mgmt_remove_adv_monitor_complete+0xe5/0x540 net/bluetooth/mgmt.c:5406 Read of size 8 at addr ffff88801c53f318 by task kworker/u5:5/5341  CPU: 0 UID: 0 PID: 5341 Comm: kworker/u5:5 Not tainted 6.15.0-syzkaller-10402-g4cb6c8af8591 #0 PREEMPT(full) Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014 Workqueue: hci0 hci_cmd_sync_work Call Trace:  <TASK>  dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120  print_address_description mm/kasan/report.c:408 [inline]  print_report+0xd2/0x2b0 mm/kasan/report.c:521  kasan_report+0x118/0x150 mm/kasan/report.c:634  mgmt_remove_adv_monitor_complete+0xe5/0x540 net/bluetooth/mgmt.c:5406  hci_cmd_sync_work+0x261/0x3a0 net/bluetooth/hci_sync.c:334  process_one_work kernel/workqueue.c:3238 [inline]  process_scheduled_works+0xade/0x17b0 kernel/workqueue.c:3321  worker_thread+0x8a0/0xda0 kernel/workqueue.c:3402  kthread+0x711/0x8a0 kernel/kthread.c:464  ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245  </TASK>  Allocated by task 5987:  kasan_save_stack mm/kasan/common.c:47 [inline]  kasan_save_track+0x3e/0x80 mm/kasan/common.c:68  poison_kmalloc_redzone mm/kasan/common.c:377 [inline]  __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:394  kasan_kmalloc include/linux/kasan.h:260 [inline]  __kmalloc_cache_noprof+0x230/0x3d0 mm/slub.c:4358  kmalloc_noprof include/linux/slab.h:905 [inline]  kzalloc_noprof include/linux/slab.h:1039 [inline]  mgmt_pending_new+0x65/0x240 net/bluetooth/mgmt_util.c:252  mgmt_pending_add+0x34/0x120 net/bluetooth/mgmt_util.c:279  remove_adv_monitor+0x103/0x1b0 net/bluetooth/mgmt.c:5454  hci_mgmt_cmd+0x9c9/0xef0 net/bluetooth/hci_sock.c:1719  hci_sock_sendmsg+0x6ca/0xef0 net/bluetooth/hci_sock.c:1839  sock_sendmsg_nosec net/socket.c:712 [inline]  __sock_sendmsg+0x219/0x270 net/socket.c:727  sock_write_iter+0x258/0x330 net/socket.c:1131  new_sync_write fs/read_write.c:593 [inline]  vfs_write+0x548/0xa90 fs/read_write.c:686  ksys_write+0x145/0x250 fs/read_write.c:738  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]  do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94  entry_SYSCALL_64_after_hwframe+0x77/0x7f  Freed by task 5989:  kasan_save_stack mm/kasan/common.c:47 [inline]  kasan_save_track+0x3e/0x80 mm/kasan/common.c:68  kasan_save_free_info+0x46/0x50 mm/kasan/generic.c:576  poison_slab_object mm/kasan/common.c:247 [inline]  __kasan_slab_free+0x62/0x70 mm/kasan/common.c:264  kasan_slab_free include/linux/kasan.h:233 [inline]  slab_free_hook mm/slub.c:2380 [inline]  slab_free mm/slub.c:4642 [inline]  kfree+0x18e/0x440 mm/slub.c:4841  mgmt_pending_foreach+0xc9/0x120 net/bluetooth/mgmt_util.c:242  mgmt_index_removed+0x10d/0x2f0 net/bluetooth/mgmt.c:9366  hci_sock_bind+0xbe9/0x1000 net/bluetooth/hci_sock.c:1314  __sys_bind_socket net/socket.c:1810 [inline]  __sys_bind+0x2c3/0x3e0 net/socket.c:1841  __do_sys_bind net/socket.c:1846 [inline]  __se_sys_bind net/socket.c:1844 [inline]  __x64_sys_bind+0x7a/0x90 net/socket.c:1844  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]  do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94  entry_SYSCALL_64_after_hwframe+0x77/0x7f",
                        "cve_priority": "high",
                        "cve_public_date": "2025-07-03 09:15:00 UTC"
                    }
                ],
                "launchpad_bugs_fixed": [
                    2127619,
                    2121337,
                    2112469,
                    2123901,
                    2126659,
                    2126698,
                    2123815,
                    2125444,
                    2103680,
                    2125053,
                    2122592,
                    2122006,
                    2124105,
                    2124105
                ],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-21729",
                                "url": "https://ubuntu.com/security/CVE-2025-21729",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion  The rtwdev->scanning flag isn't protected by mutex originally, so cancel_hw_scan can pass the condition, but suddenly hw_scan completion unset the flag and calls ieee80211_scan_completed() that will free local->hw_scan_req. Then, cancel_hw_scan raises null-ptr-deref and use-after-free. Fix it by moving the check condition to where protected by mutex.   KASAN: null-ptr-deref in range [0x0000000000000088-0x000000000000008f]  CPU: 2 PID: 6922 Comm: kworker/2:2 Tainted: G           OE  Hardware name: LENOVO 2356AD1/2356AD1, BIOS G7ETB6WW (2.76 ) 09/10/2019  Workqueue: events cfg80211_conn_work [cfg80211]  RIP: 0010:rtw89_fw_h2c_scan_offload_be+0xc33/0x13c3 [rtw89_core]  Code: 00 45 89 6c 24 1c 0f 85 23 01 00 00 48 8b 85 20 ff ff ff 48 8d  RSP: 0018:ffff88811fd9f068 EFLAGS: 00010206  RAX: dffffc0000000000 RBX: ffff88811fd9f258 RCX: 0000000000000001  RDX: 0000000000000011 RSI: 0000000000000001 RDI: 0000000000000089  RBP: ffff88811fd9f170 R08: 0000000000000000 R09: 0000000000000000  R10: ffff88811fd9f108 R11: 0000000000000000 R12: ffff88810e47f960  R13: 0000000000000000 R14: 000000000000ffff R15: 0000000000000000  FS:  0000000000000000(0000) GS:ffff8881d6f00000(0000) knlGS:0000000000000000  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033  CR2: 00007531dfca55b0 CR3: 00000001be296004 CR4: 00000000001706e0  Call Trace:   <TASK>   ? show_regs+0x61/0x73   ? __die_body+0x20/0x73   ? die_addr+0x4f/0x7b   ? exc_general_protection+0x191/0x1db   ? asm_exc_general_protection+0x27/0x30   ? rtw89_fw_h2c_scan_offload_be+0xc33/0x13c3 [rtw89_core]   ? rtw89_fw_h2c_scan_offload_be+0x458/0x13c3 [rtw89_core]   ? __pfx_rtw89_fw_h2c_scan_offload_be+0x10/0x10 [rtw89_core]   ? do_raw_spin_lock+0x75/0xdb   ? __pfx_do_raw_spin_lock+0x10/0x10   rtw89_hw_scan_offload+0xb5e/0xbf7 [rtw89_core]   ? _raw_spin_unlock+0xe/0x24   ? __mutex_lock.constprop.0+0x40c/0x471   ? __pfx_rtw89_hw_scan_offload+0x10/0x10 [rtw89_core]   ? __mutex_lock_slowpath+0x13/0x1f   ? mutex_lock+0xa2/0xdc   ? __pfx_mutex_lock+0x10/0x10   rtw89_hw_scan_abort+0x58/0xb7 [rtw89_core]   rtw89_ops_cancel_hw_scan+0x120/0x13b [rtw89_core]   ieee80211_scan_cancel+0x468/0x4d0 [mac80211]   ieee80211_prep_connection+0x858/0x899 [mac80211]   ieee80211_mgd_auth+0xbea/0xdde [mac80211]   ? __pfx_ieee80211_mgd_auth+0x10/0x10 [mac80211]   ? cfg80211_find_elem+0x15/0x29 [cfg80211]   ? is_bss+0x1b7/0x1d7 [cfg80211]   ieee80211_auth+0x18/0x27 [mac80211]   cfg80211_mlme_auth+0x3bb/0x3e7 [cfg80211]   cfg80211_conn_do_work+0x410/0xb81 [cfg80211]   ? __pfx_cfg80211_conn_do_work+0x10/0x10 [cfg80211]   ? __kasan_check_read+0x11/0x1f   ? psi_group_change+0x8bc/0x944   ? __kasan_check_write+0x14/0x22   ? mutex_lock+0x8e/0xdc   ? __pfx_mutex_lock+0x10/0x10   ? __pfx___radix_tree_lookup+0x10/0x10   cfg80211_conn_work+0x245/0x34d [cfg80211]   ? __pfx_cfg80211_conn_work+0x10/0x10 [cfg80211]   ? update_cfs_rq_load_avg+0x3bc/0x3d7   ? sched_clock_noinstr+0x9/0x1a   ? sched_clock+0x10/0x24   ? sched_clock_cpu+0x7e/0x42e   ? newidle_balance+0x796/0x937   ? __pfx_sched_clock_cpu+0x10/0x10   ? __pfx_newidle_balance+0x10/0x10   ? __kasan_check_read+0x11/0x1f   ? psi_group_change+0x8bc/0x944   ? _raw_spin_unlock+0xe/0x24   ? raw_spin_rq_unlock+0x47/0x54   ? raw_spin_rq_unlock_irq+0x9/0x1f   ? finish_task_switch.isra.0+0x347/0x586   ? __schedule+0x27bf/0x2892   ? mutex_unlock+0x80/0xd0   ? do_raw_spin_lock+0x75/0xdb   ? __pfx___schedule+0x10/0x10   process_scheduled_works+0x58c/0x821   worker_thread+0x4c7/0x586   ? __kasan_check_read+0x11/0x1f   kthread+0x285/0x294   ? __pfx_worker_thread+0x10/0x10   ? __pfx_kthread+0x10/0x10   ret_from_fork+0x29/0x6f   ? __pfx_kthread+0x10/0x10   ret_from_fork_asm+0x1b/0x30   </TASK>",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-02-27 02:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38227",
                                "url": "https://ubuntu.com/security/CVE-2025-38227",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  media: vidtv: Terminating the subsequent process of initialization failure  syzbot reported a slab-use-after-free Read in vidtv_mux_init. [1]  After PSI initialization fails, the si member is accessed again, resulting in this uaf.  After si initialization fails, the subsequent process needs to be exited.  [1] BUG: KASAN: slab-use-after-free in vidtv_mux_pid_ctx_init drivers/media/test-drivers/vidtv/vidtv_mux.c:78 [inline] BUG: KASAN: slab-use-after-free in vidtv_mux_init+0xac2/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:524 Read of size 8 at addr ffff88802fa42acc by task syz.2.37/6059  CPU: 0 UID: 0 PID: 6059 Comm: syz.2.37 Not tainted 6.14.0-rc5-syzkaller #0 Hardware name: Google Compute Engine, BIOS Google 02/12/2025 Call Trace: <TASK> __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:408 [inline] print_report+0xc3/0x670 mm/kasan/report.c:521 kasan_report+0xd9/0x110 mm/kasan/report.c:634 vidtv_mux_pid_ctx_init drivers/media/test-drivers/vidtv/vidtv_mux.c:78 vidtv_mux_init+0xac2/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:524 vidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194 vidtv_start_feed drivers/media/test-drivers/vidtv/vidtv_bridge.c:239 dmx_section_feed_start_filtering drivers/media/dvb-core/dvb_demux.c:973 dvb_dmxdev_feed_start drivers/media/dvb-core/dmxdev.c:508 [inline] dvb_dmxdev_feed_restart.isra.0 drivers/media/dvb-core/dmxdev.c:537 dvb_dmxdev_filter_stop+0x2b4/0x3a0 drivers/media/dvb-core/dmxdev.c:564 dvb_dmxdev_filter_free drivers/media/dvb-core/dmxdev.c:840 [inline] dvb_demux_release+0x92/0x550 drivers/media/dvb-core/dmxdev.c:1246 __fput+0x3ff/0xb70 fs/file_table.c:464 task_work_run+0x14e/0x250 kernel/task_work.c:227 exit_task_work include/linux/task_work.h:40 [inline] do_exit+0xad8/0x2d70 kernel/exit.c:938 do_group_exit+0xd3/0x2a0 kernel/exit.c:1087 __do_sys_exit_group kernel/exit.c:1098 [inline] __se_sys_exit_group kernel/exit.c:1096 [inline] __x64_sys_exit_group+0x3e/0x50 kernel/exit.c:1096 x64_sys_call+0x151f/0x1720 arch/x86/include/generated/asm/syscalls_64.h:232 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f871d58d169 Code: Unable to access opcode bytes at 0x7f871d58d13f. RSP: 002b:00007fff4b19a788 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f871d58d169 RDX: 0000000000000064 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 00007fff4b19a7ec R08: 0000000b4b19a87f R09: 00000000000927c0 R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000003 R13: 00000000000927c0 R14: 000000000001d553 R15: 00007fff4b19a840  </TASK>  Allocated by task 6059:  kasan_save_stack+0x33/0x60 mm/kasan/common.c:47  kasan_save_track+0x14/0x30 mm/kasan/common.c:68  poison_kmalloc_redzone mm/kasan/common.c:377 [inline]  __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:394  kmalloc_noprof include/linux/slab.h:901 [inline]  kzalloc_noprof include/linux/slab.h:1037 [inline]  vidtv_psi_pat_table_init drivers/media/test-drivers/vidtv/vidtv_psi.c:970  vidtv_channel_si_init drivers/media/test-drivers/vidtv/vidtv_channel.c:423  vidtv_mux_init drivers/media/test-drivers/vidtv/vidtv_mux.c:519  vidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194  vidtv_start_feed drivers/media/test-drivers/vidtv/vidtv_bridge.c:239  dmx_section_feed_start_filtering drivers/media/dvb-core/dvb_demux.c:973  dvb_dmxdev_feed_start drivers/media/dvb-core/dmxdev.c:508 [inline]  dvb_dmxdev_feed_restart.isra.0 drivers/media/dvb-core/dmxdev.c:537  dvb_dmxdev_filter_stop+0x2b4/0x3a0 drivers/media/dvb-core/dmxdev.c:564  dvb_dmxdev_filter_free drivers/media/dvb-core/dmxdev.c:840 [inline]  dvb_demux_release+0x92/0x550 drivers/media/dvb-core/dmxdev.c:1246  __fput+0x3ff/0xb70 fs/file_tabl ---truncated---",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-07-04 14:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38678",
                                "url": "https://ubuntu.com/security/CVE-2025-38678",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  netfilter: nf_tables: reject duplicate device on updates  A chain/flowtable update with duplicated devices in the same batch is possible. Unfortunately, netdev event path only removes the first device that is found, leaving unregistered the hook of the duplicated device.  Check if a duplicated device exists in the transaction batch, bail out with EEXIST in such case.  WARNING is hit when unregistering the hook:   [49042.221275] WARNING: CPU: 4 PID: 8425 at net/netfilter/core.c:340 nf_hook_entry_head+0xaa/0x150  [49042.221375] CPU: 4 UID: 0 PID: 8425 Comm: nft Tainted: G S                 6.16.0+ #170 PREEMPT(full)  [...]  [49042.221382] RIP: 0010:nf_hook_entry_head+0xaa/0x150",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-09-03 13:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38616",
                                "url": "https://ubuntu.com/security/CVE-2025-38616",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  tls: handle data disappearing from under the TLS ULP  TLS expects that it owns the receive queue of the TCP socket. This cannot be guaranteed in case the reader of the TCP socket entered before the TLS ULP was installed, or uses some non-standard read API (eg. zerocopy ones). Replace the WARN_ON() and a buggy early exit (which leaves anchor pointing to a freed skb) with real error handling. Wipe the parsing state and tell the reader to retry.  We already reload the anchor every time we (re)acquire the socket lock, so the only condition we need to avoid is an out of bounds read (not having enough bytes in the socket for previously parsed record len).  If some data was read from under TLS but there's enough in the queue we'll reload and decrypt what is most likely not a valid TLS record. Leading to some undefined behavior from TLS perspective (corrupting a stream? missing an alert? missing an attack?) but no kernel crash should take place.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-08-22 14:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-37838",
                                "url": "https://ubuntu.com/security/CVE-2025-37838",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  HSI: ssi_protocol: Fix use after free vulnerability in ssi_protocol Driver Due to Race Condition  In the ssi_protocol_probe() function, &ssi->work is bound with ssip_xmit_work(), In ssip_pn_setup(), the ssip_pn_xmit() function within the ssip_pn_ops structure is capable of starting the work.  If we remove the module which will call ssi_protocol_remove() to make a cleanup, it will free ssi through kfree(ssi), while the work mentioned above will be used. The sequence of operations that may lead to a UAF bug is as follows:  CPU0                                    CPU1                          | ssip_xmit_work ssi_protocol_remove     | kfree(ssi);             |                         | struct hsi_client *cl = ssi->cl;                         | // use ssi  Fix it by ensuring that the work is canceled before proceeding with the cleanup in ssi_protocol_remove().",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-04-18 15:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-40300",
                                "url": "https://ubuntu.com/security/CVE-2025-40300",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  x86/vmscape: Add conditional IBPB mitigation  VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace hypervisor (like QEMU). Existing mitigations already protect kernel/KVM from a malicious guest. Userspace can additionally be protected by flushing the branch predictors after a VMexit.  Since it is the userspace that consumes the poisoned branch predictors, conditionally issue an IBPB after a VMexit and before returning to userspace. Workloads that frequently switch between hypervisor and userspace will incur the most overhead from the new IBPB.  This new IBPB is not integrated with the existing IBPB sites. For instance, a task can use the existing speculation control prctl() to get an IBPB at context switch time. With this implementation, the IBPB is doubled up: one at context switch and another before running userspace.  The intent is to integrate and optimize these cases post-embargo.  [ dhansen: elaborate on suboptimal IBPB solution ]",
                                "cve_priority": "high",
                                "cve_public_date": "2025-09-11 17:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38352",
                                "url": "https://ubuntu.com/security/CVE-2025-38352",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del()  If an exiting non-autoreaping task has already passed exit_notify() and calls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent or debugger right after unlock_task_sighand().  If a concurrent posix_cpu_timer_del() runs at that moment, it won't be able to detect timer->it.cpu.firing != 0: cpu_timer_task_rcu() and/or lock_task_sighand() will fail.  Add the tsk->exit_state check into run_posix_cpu_timers() to fix this.  This fix is not needed if CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y, because exit_task_work() is called before exit_notify(). But the check still makes sense, task_work_add(&tsk->posix_cputimers_work.work) will fail anyway in this case.",
                                "cve_priority": "high",
                                "cve_public_date": "2025-07-22 08:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38118",
                                "url": "https://ubuntu.com/security/CVE-2025-38118",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  Bluetooth: MGMT: Fix UAF on mgmt_remove_adv_monitor_complete  This reworks MGMT_OP_REMOVE_ADV_MONITOR to not use mgmt_pending_add to avoid crashes like bellow:  ================================================================== BUG: KASAN: slab-use-after-free in mgmt_remove_adv_monitor_complete+0xe5/0x540 net/bluetooth/mgmt.c:5406 Read of size 8 at addr ffff88801c53f318 by task kworker/u5:5/5341  CPU: 0 UID: 0 PID: 5341 Comm: kworker/u5:5 Not tainted 6.15.0-syzkaller-10402-g4cb6c8af8591 #0 PREEMPT(full) Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014 Workqueue: hci0 hci_cmd_sync_work Call Trace:  <TASK>  dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120  print_address_description mm/kasan/report.c:408 [inline]  print_report+0xd2/0x2b0 mm/kasan/report.c:521  kasan_report+0x118/0x150 mm/kasan/report.c:634  mgmt_remove_adv_monitor_complete+0xe5/0x540 net/bluetooth/mgmt.c:5406  hci_cmd_sync_work+0x261/0x3a0 net/bluetooth/hci_sync.c:334  process_one_work kernel/workqueue.c:3238 [inline]  process_scheduled_works+0xade/0x17b0 kernel/workqueue.c:3321  worker_thread+0x8a0/0xda0 kernel/workqueue.c:3402  kthread+0x711/0x8a0 kernel/kthread.c:464  ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245  </TASK>  Allocated by task 5987:  kasan_save_stack mm/kasan/common.c:47 [inline]  kasan_save_track+0x3e/0x80 mm/kasan/common.c:68  poison_kmalloc_redzone mm/kasan/common.c:377 [inline]  __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:394  kasan_kmalloc include/linux/kasan.h:260 [inline]  __kmalloc_cache_noprof+0x230/0x3d0 mm/slub.c:4358  kmalloc_noprof include/linux/slab.h:905 [inline]  kzalloc_noprof include/linux/slab.h:1039 [inline]  mgmt_pending_new+0x65/0x240 net/bluetooth/mgmt_util.c:252  mgmt_pending_add+0x34/0x120 net/bluetooth/mgmt_util.c:279  remove_adv_monitor+0x103/0x1b0 net/bluetooth/mgmt.c:5454  hci_mgmt_cmd+0x9c9/0xef0 net/bluetooth/hci_sock.c:1719  hci_sock_sendmsg+0x6ca/0xef0 net/bluetooth/hci_sock.c:1839  sock_sendmsg_nosec net/socket.c:712 [inline]  __sock_sendmsg+0x219/0x270 net/socket.c:727  sock_write_iter+0x258/0x330 net/socket.c:1131  new_sync_write fs/read_write.c:593 [inline]  vfs_write+0x548/0xa90 fs/read_write.c:686  ksys_write+0x145/0x250 fs/read_write.c:738  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]  do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94  entry_SYSCALL_64_after_hwframe+0x77/0x7f  Freed by task 5989:  kasan_save_stack mm/kasan/common.c:47 [inline]  kasan_save_track+0x3e/0x80 mm/kasan/common.c:68  kasan_save_free_info+0x46/0x50 mm/kasan/generic.c:576  poison_slab_object mm/kasan/common.c:247 [inline]  __kasan_slab_free+0x62/0x70 mm/kasan/common.c:264  kasan_slab_free include/linux/kasan.h:233 [inline]  slab_free_hook mm/slub.c:2380 [inline]  slab_free mm/slub.c:4642 [inline]  kfree+0x18e/0x440 mm/slub.c:4841  mgmt_pending_foreach+0xc9/0x120 net/bluetooth/mgmt_util.c:242  mgmt_index_removed+0x10d/0x2f0 net/bluetooth/mgmt.c:9366  hci_sock_bind+0xbe9/0x1000 net/bluetooth/hci_sock.c:1314  __sys_bind_socket net/socket.c:1810 [inline]  __sys_bind+0x2c3/0x3e0 net/socket.c:1841  __do_sys_bind net/socket.c:1846 [inline]  __se_sys_bind net/socket.c:1844 [inline]  __x64_sys_bind+0x7a/0x90 net/socket.c:1844  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]  do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94  entry_SYSCALL_64_after_hwframe+0x77/0x7f",
                                "cve_priority": "high",
                                "cve_public_date": "2025-07-03 09:15:00 UTC"
                            }
                        ],
                        "log": [
                            "",
                            "  * noble/linux: 6.8.0-88.89 -proposed tracker (LP: #2127619)",
                            "",
                            "  *  Enable Xilinx PS UART configs (LP: #2121337)",
                            "    - [Config] Enable Xilinx PS UART configs",
                            "",
                            "  * Fix ARL-U/H suspend issues (LP: #2112469)",
                            "    - platform/x86/intel/pmc: Add Arrow Lake U/H support to intel_pmc_core",
                            "      driver",
                            "    - platform/x86/intel/pmc: Fix Arrow Lake U/H NPU PCI ID",
                            "",
                            "  * r8169 can not wake on LAN via SFP moudule (LP: #2123901)",
                            "    - r8169: set EEE speed down ratio to 1",
                            "",
                            "  * Add pvpanic kernel modules to linux-modules (LP: #2126659)",
                            "    - [Packaging] Add pvpanic kernel modules to linux-modules",
                            "",
                            "  * CVE-2025-21729",
                            "    - wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion",
                            "",
                            "  * Fix failure to build TDX module (LP: #2126698)",
                            "    - x86/paravirt: Move halt paravirt calls under CONFIG_PARAVIRT",
                            "",
                            "  * Ubuntu 24.04.2: error in audit_log_object_context keep printing in the",
                            "    kernel and console (LP: #2123815)",
                            "    - SAUCE: fix: apparmor4.0.0 [26/90]: LSM stacking v39: Audit: Add record",
                            "      for multiple object contexts",
                            "",
                            "  * ensure mptcp keepalives are honored when set (LP: #2125444)",
                            "    - mptcp: sockopt: make sync_socket_options propagate SOCK_KEEPOPEN",
                            "",
                            "  * System hangs when running the memory stress test (LP: #2103680)",
                            "    - mm: page_alloc: avoid kswapd thrashing due to NUMA restrictions",
                            "",
                            "  * UBUNTU: fan: fail to check kmalloc() return could cause a NULL pointer",
                            "    dereference (LP: #2125053)",
                            "    - SAUCE: fan: vxlan: check memory allocation for map",
                            "",
                            "  * jammy:linux-riscv-6.8 is FTBFS because of wrong include (LP: #2122592)",
                            "    - SAUCE: riscv: KVM: Remove broken include",
                            "",
                            "  * Performance degrades rapidly when spawning more processes to run benchmark",
                            "    (LP: #2122006)",
                            "    - cpuidle: menu: Avoid discarding useful information",
                            "    - cpuidle: governors: menu: Avoid using invalid recent intervals data",
                            "",
                            "  * CVE-2025-38227",
                            "    - media: vidtv: Terminating the subsequent process of initialization",
                            "      failure",
                            "",
                            "  * CVE-2025-38678",
                            "    - netfilter: nf_tables: reject duplicate device on updates",
                            "",
                            "  * CVE-2025-38616",
                            "    - tls: handle data disappearing from under the TLS ULP",
                            "",
                            "  * CVE-2025-37838",
                            "    - HSI: ssi_protocol: Fix use after free vulnerability in ssi_protocol",
                            "      Driver Due to Race Condition",
                            "",
                            "  * VMSCAPE CVE-2025-40300 (LP: #2124105) // CVE-2025-40300",
                            "    - Documentation/hw-vuln: Add VMSCAPE documentation",
                            "    - x86/vmscape: Enumerate VMSCAPE bug",
                            "    - x86/vmscape: Add conditional IBPB mitigation",
                            "    - x86/vmscape: Enable the mitigation",
                            "    - x86/bugs: Move cpu_bugs_smt_update() down",
                            "    - x86/vmscape: Warn when STIBP is disabled with SMT",
                            "    - x86/vmscape: Add old Intel CPUs to affected list",
                            "",
                            "  * VMSCAPE CVE-2025-40300 (LP: #2124105)",
                            "    - [Config] Enable MITIGATION_VMSCAPE config",
                            "",
                            "  * CVE-2025-38352",
                            "    - posix-cpu-timers: fix race between handle_posix_cpu_timers() and",
                            "      posix_cpu_timer_del()",
                            "",
                            "  * CVE-2025-38118",
                            "    - Bluetooth: MGMT: Fix UAF on mgmt_remove_adv_monitor_complete",
                            "    - Bluetooth: MGMT: Fix sparse errors",
                            ""
                        ],
                        "package": "linux",
                        "version": "6.8.0-88.89",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2127619,
                            2121337,
                            2112469,
                            2123901,
                            2126659,
                            2126698,
                            2123815,
                            2125444,
                            2103680,
                            2125053,
                            2122592,
                            2122006,
                            2124105,
                            2124105
                        ],
                        "author": "Edoardo Canepa <edoardo.canepa@canonical.com>",
                        "date": "Sat, 11 Oct 2025 01:38:46 +0200"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "linux-tools-common",
                "from_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.8.0-87.88",
                    "version": "6.8.0-87.88"
                },
                "to_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.8.0-88.89",
                    "version": "6.8.0-88.89"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-21729",
                        "url": "https://ubuntu.com/security/CVE-2025-21729",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion  The rtwdev->scanning flag isn't protected by mutex originally, so cancel_hw_scan can pass the condition, but suddenly hw_scan completion unset the flag and calls ieee80211_scan_completed() that will free local->hw_scan_req. Then, cancel_hw_scan raises null-ptr-deref and use-after-free. Fix it by moving the check condition to where protected by mutex.   KASAN: null-ptr-deref in range [0x0000000000000088-0x000000000000008f]  CPU: 2 PID: 6922 Comm: kworker/2:2 Tainted: G           OE  Hardware name: LENOVO 2356AD1/2356AD1, BIOS G7ETB6WW (2.76 ) 09/10/2019  Workqueue: events cfg80211_conn_work [cfg80211]  RIP: 0010:rtw89_fw_h2c_scan_offload_be+0xc33/0x13c3 [rtw89_core]  Code: 00 45 89 6c 24 1c 0f 85 23 01 00 00 48 8b 85 20 ff ff ff 48 8d  RSP: 0018:ffff88811fd9f068 EFLAGS: 00010206  RAX: dffffc0000000000 RBX: ffff88811fd9f258 RCX: 0000000000000001  RDX: 0000000000000011 RSI: 0000000000000001 RDI: 0000000000000089  RBP: ffff88811fd9f170 R08: 0000000000000000 R09: 0000000000000000  R10: ffff88811fd9f108 R11: 0000000000000000 R12: ffff88810e47f960  R13: 0000000000000000 R14: 000000000000ffff R15: 0000000000000000  FS:  0000000000000000(0000) GS:ffff8881d6f00000(0000) knlGS:0000000000000000  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033  CR2: 00007531dfca55b0 CR3: 00000001be296004 CR4: 00000000001706e0  Call Trace:   <TASK>   ? show_regs+0x61/0x73   ? __die_body+0x20/0x73   ? die_addr+0x4f/0x7b   ? exc_general_protection+0x191/0x1db   ? asm_exc_general_protection+0x27/0x30   ? rtw89_fw_h2c_scan_offload_be+0xc33/0x13c3 [rtw89_core]   ? rtw89_fw_h2c_scan_offload_be+0x458/0x13c3 [rtw89_core]   ? __pfx_rtw89_fw_h2c_scan_offload_be+0x10/0x10 [rtw89_core]   ? do_raw_spin_lock+0x75/0xdb   ? __pfx_do_raw_spin_lock+0x10/0x10   rtw89_hw_scan_offload+0xb5e/0xbf7 [rtw89_core]   ? _raw_spin_unlock+0xe/0x24   ? __mutex_lock.constprop.0+0x40c/0x471   ? __pfx_rtw89_hw_scan_offload+0x10/0x10 [rtw89_core]   ? __mutex_lock_slowpath+0x13/0x1f   ? mutex_lock+0xa2/0xdc   ? __pfx_mutex_lock+0x10/0x10   rtw89_hw_scan_abort+0x58/0xb7 [rtw89_core]   rtw89_ops_cancel_hw_scan+0x120/0x13b [rtw89_core]   ieee80211_scan_cancel+0x468/0x4d0 [mac80211]   ieee80211_prep_connection+0x858/0x899 [mac80211]   ieee80211_mgd_auth+0xbea/0xdde [mac80211]   ? __pfx_ieee80211_mgd_auth+0x10/0x10 [mac80211]   ? cfg80211_find_elem+0x15/0x29 [cfg80211]   ? is_bss+0x1b7/0x1d7 [cfg80211]   ieee80211_auth+0x18/0x27 [mac80211]   cfg80211_mlme_auth+0x3bb/0x3e7 [cfg80211]   cfg80211_conn_do_work+0x410/0xb81 [cfg80211]   ? __pfx_cfg80211_conn_do_work+0x10/0x10 [cfg80211]   ? __kasan_check_read+0x11/0x1f   ? psi_group_change+0x8bc/0x944   ? __kasan_check_write+0x14/0x22   ? mutex_lock+0x8e/0xdc   ? __pfx_mutex_lock+0x10/0x10   ? __pfx___radix_tree_lookup+0x10/0x10   cfg80211_conn_work+0x245/0x34d [cfg80211]   ? __pfx_cfg80211_conn_work+0x10/0x10 [cfg80211]   ? update_cfs_rq_load_avg+0x3bc/0x3d7   ? sched_clock_noinstr+0x9/0x1a   ? sched_clock+0x10/0x24   ? sched_clock_cpu+0x7e/0x42e   ? newidle_balance+0x796/0x937   ? __pfx_sched_clock_cpu+0x10/0x10   ? __pfx_newidle_balance+0x10/0x10   ? __kasan_check_read+0x11/0x1f   ? psi_group_change+0x8bc/0x944   ? _raw_spin_unlock+0xe/0x24   ? raw_spin_rq_unlock+0x47/0x54   ? raw_spin_rq_unlock_irq+0x9/0x1f   ? finish_task_switch.isra.0+0x347/0x586   ? __schedule+0x27bf/0x2892   ? mutex_unlock+0x80/0xd0   ? do_raw_spin_lock+0x75/0xdb   ? __pfx___schedule+0x10/0x10   process_scheduled_works+0x58c/0x821   worker_thread+0x4c7/0x586   ? __kasan_check_read+0x11/0x1f   kthread+0x285/0x294   ? __pfx_worker_thread+0x10/0x10   ? __pfx_kthread+0x10/0x10   ret_from_fork+0x29/0x6f   ? __pfx_kthread+0x10/0x10   ret_from_fork_asm+0x1b/0x30   </TASK>",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-02-27 02:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38227",
                        "url": "https://ubuntu.com/security/CVE-2025-38227",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  media: vidtv: Terminating the subsequent process of initialization failure  syzbot reported a slab-use-after-free Read in vidtv_mux_init. [1]  After PSI initialization fails, the si member is accessed again, resulting in this uaf.  After si initialization fails, the subsequent process needs to be exited.  [1] BUG: KASAN: slab-use-after-free in vidtv_mux_pid_ctx_init drivers/media/test-drivers/vidtv/vidtv_mux.c:78 [inline] BUG: KASAN: slab-use-after-free in vidtv_mux_init+0xac2/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:524 Read of size 8 at addr ffff88802fa42acc by task syz.2.37/6059  CPU: 0 UID: 0 PID: 6059 Comm: syz.2.37 Not tainted 6.14.0-rc5-syzkaller #0 Hardware name: Google Compute Engine, BIOS Google 02/12/2025 Call Trace: <TASK> __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:408 [inline] print_report+0xc3/0x670 mm/kasan/report.c:521 kasan_report+0xd9/0x110 mm/kasan/report.c:634 vidtv_mux_pid_ctx_init drivers/media/test-drivers/vidtv/vidtv_mux.c:78 vidtv_mux_init+0xac2/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:524 vidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194 vidtv_start_feed drivers/media/test-drivers/vidtv/vidtv_bridge.c:239 dmx_section_feed_start_filtering drivers/media/dvb-core/dvb_demux.c:973 dvb_dmxdev_feed_start drivers/media/dvb-core/dmxdev.c:508 [inline] dvb_dmxdev_feed_restart.isra.0 drivers/media/dvb-core/dmxdev.c:537 dvb_dmxdev_filter_stop+0x2b4/0x3a0 drivers/media/dvb-core/dmxdev.c:564 dvb_dmxdev_filter_free drivers/media/dvb-core/dmxdev.c:840 [inline] dvb_demux_release+0x92/0x550 drivers/media/dvb-core/dmxdev.c:1246 __fput+0x3ff/0xb70 fs/file_table.c:464 task_work_run+0x14e/0x250 kernel/task_work.c:227 exit_task_work include/linux/task_work.h:40 [inline] do_exit+0xad8/0x2d70 kernel/exit.c:938 do_group_exit+0xd3/0x2a0 kernel/exit.c:1087 __do_sys_exit_group kernel/exit.c:1098 [inline] __se_sys_exit_group kernel/exit.c:1096 [inline] __x64_sys_exit_group+0x3e/0x50 kernel/exit.c:1096 x64_sys_call+0x151f/0x1720 arch/x86/include/generated/asm/syscalls_64.h:232 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f871d58d169 Code: Unable to access opcode bytes at 0x7f871d58d13f. RSP: 002b:00007fff4b19a788 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f871d58d169 RDX: 0000000000000064 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 00007fff4b19a7ec R08: 0000000b4b19a87f R09: 00000000000927c0 R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000003 R13: 00000000000927c0 R14: 000000000001d553 R15: 00007fff4b19a840  </TASK>  Allocated by task 6059:  kasan_save_stack+0x33/0x60 mm/kasan/common.c:47  kasan_save_track+0x14/0x30 mm/kasan/common.c:68  poison_kmalloc_redzone mm/kasan/common.c:377 [inline]  __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:394  kmalloc_noprof include/linux/slab.h:901 [inline]  kzalloc_noprof include/linux/slab.h:1037 [inline]  vidtv_psi_pat_table_init drivers/media/test-drivers/vidtv/vidtv_psi.c:970  vidtv_channel_si_init drivers/media/test-drivers/vidtv/vidtv_channel.c:423  vidtv_mux_init drivers/media/test-drivers/vidtv/vidtv_mux.c:519  vidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194  vidtv_start_feed drivers/media/test-drivers/vidtv/vidtv_bridge.c:239  dmx_section_feed_start_filtering drivers/media/dvb-core/dvb_demux.c:973  dvb_dmxdev_feed_start drivers/media/dvb-core/dmxdev.c:508 [inline]  dvb_dmxdev_feed_restart.isra.0 drivers/media/dvb-core/dmxdev.c:537  dvb_dmxdev_filter_stop+0x2b4/0x3a0 drivers/media/dvb-core/dmxdev.c:564  dvb_dmxdev_filter_free drivers/media/dvb-core/dmxdev.c:840 [inline]  dvb_demux_release+0x92/0x550 drivers/media/dvb-core/dmxdev.c:1246  __fput+0x3ff/0xb70 fs/file_tabl ---truncated---",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-07-04 14:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38678",
                        "url": "https://ubuntu.com/security/CVE-2025-38678",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  netfilter: nf_tables: reject duplicate device on updates  A chain/flowtable update with duplicated devices in the same batch is possible. Unfortunately, netdev event path only removes the first device that is found, leaving unregistered the hook of the duplicated device.  Check if a duplicated device exists in the transaction batch, bail out with EEXIST in such case.  WARNING is hit when unregistering the hook:   [49042.221275] WARNING: CPU: 4 PID: 8425 at net/netfilter/core.c:340 nf_hook_entry_head+0xaa/0x150  [49042.221375] CPU: 4 UID: 0 PID: 8425 Comm: nft Tainted: G S                 6.16.0+ #170 PREEMPT(full)  [...]  [49042.221382] RIP: 0010:nf_hook_entry_head+0xaa/0x150",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-09-03 13:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38616",
                        "url": "https://ubuntu.com/security/CVE-2025-38616",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  tls: handle data disappearing from under the TLS ULP  TLS expects that it owns the receive queue of the TCP socket. This cannot be guaranteed in case the reader of the TCP socket entered before the TLS ULP was installed, or uses some non-standard read API (eg. zerocopy ones). Replace the WARN_ON() and a buggy early exit (which leaves anchor pointing to a freed skb) with real error handling. Wipe the parsing state and tell the reader to retry.  We already reload the anchor every time we (re)acquire the socket lock, so the only condition we need to avoid is an out of bounds read (not having enough bytes in the socket for previously parsed record len).  If some data was read from under TLS but there's enough in the queue we'll reload and decrypt what is most likely not a valid TLS record. Leading to some undefined behavior from TLS perspective (corrupting a stream? missing an alert? missing an attack?) but no kernel crash should take place.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-08-22 14:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-37838",
                        "url": "https://ubuntu.com/security/CVE-2025-37838",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  HSI: ssi_protocol: Fix use after free vulnerability in ssi_protocol Driver Due to Race Condition  In the ssi_protocol_probe() function, &ssi->work is bound with ssip_xmit_work(), In ssip_pn_setup(), the ssip_pn_xmit() function within the ssip_pn_ops structure is capable of starting the work.  If we remove the module which will call ssi_protocol_remove() to make a cleanup, it will free ssi through kfree(ssi), while the work mentioned above will be used. The sequence of operations that may lead to a UAF bug is as follows:  CPU0                                    CPU1                          | ssip_xmit_work ssi_protocol_remove     | kfree(ssi);             |                         | struct hsi_client *cl = ssi->cl;                         | // use ssi  Fix it by ensuring that the work is canceled before proceeding with the cleanup in ssi_protocol_remove().",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-04-18 15:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-40300",
                        "url": "https://ubuntu.com/security/CVE-2025-40300",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  x86/vmscape: Add conditional IBPB mitigation  VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace hypervisor (like QEMU). Existing mitigations already protect kernel/KVM from a malicious guest. Userspace can additionally be protected by flushing the branch predictors after a VMexit.  Since it is the userspace that consumes the poisoned branch predictors, conditionally issue an IBPB after a VMexit and before returning to userspace. Workloads that frequently switch between hypervisor and userspace will incur the most overhead from the new IBPB.  This new IBPB is not integrated with the existing IBPB sites. For instance, a task can use the existing speculation control prctl() to get an IBPB at context switch time. With this implementation, the IBPB is doubled up: one at context switch and another before running userspace.  The intent is to integrate and optimize these cases post-embargo.  [ dhansen: elaborate on suboptimal IBPB solution ]",
                        "cve_priority": "high",
                        "cve_public_date": "2025-09-11 17:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38352",
                        "url": "https://ubuntu.com/security/CVE-2025-38352",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del()  If an exiting non-autoreaping task has already passed exit_notify() and calls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent or debugger right after unlock_task_sighand().  If a concurrent posix_cpu_timer_del() runs at that moment, it won't be able to detect timer->it.cpu.firing != 0: cpu_timer_task_rcu() and/or lock_task_sighand() will fail.  Add the tsk->exit_state check into run_posix_cpu_timers() to fix this.  This fix is not needed if CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y, because exit_task_work() is called before exit_notify(). But the check still makes sense, task_work_add(&tsk->posix_cputimers_work.work) will fail anyway in this case.",
                        "cve_priority": "high",
                        "cve_public_date": "2025-07-22 08:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38118",
                        "url": "https://ubuntu.com/security/CVE-2025-38118",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  Bluetooth: MGMT: Fix UAF on mgmt_remove_adv_monitor_complete  This reworks MGMT_OP_REMOVE_ADV_MONITOR to not use mgmt_pending_add to avoid crashes like bellow:  ================================================================== BUG: KASAN: slab-use-after-free in mgmt_remove_adv_monitor_complete+0xe5/0x540 net/bluetooth/mgmt.c:5406 Read of size 8 at addr ffff88801c53f318 by task kworker/u5:5/5341  CPU: 0 UID: 0 PID: 5341 Comm: kworker/u5:5 Not tainted 6.15.0-syzkaller-10402-g4cb6c8af8591 #0 PREEMPT(full) Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014 Workqueue: hci0 hci_cmd_sync_work Call Trace:  <TASK>  dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120  print_address_description mm/kasan/report.c:408 [inline]  print_report+0xd2/0x2b0 mm/kasan/report.c:521  kasan_report+0x118/0x150 mm/kasan/report.c:634  mgmt_remove_adv_monitor_complete+0xe5/0x540 net/bluetooth/mgmt.c:5406  hci_cmd_sync_work+0x261/0x3a0 net/bluetooth/hci_sync.c:334  process_one_work kernel/workqueue.c:3238 [inline]  process_scheduled_works+0xade/0x17b0 kernel/workqueue.c:3321  worker_thread+0x8a0/0xda0 kernel/workqueue.c:3402  kthread+0x711/0x8a0 kernel/kthread.c:464  ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245  </TASK>  Allocated by task 5987:  kasan_save_stack mm/kasan/common.c:47 [inline]  kasan_save_track+0x3e/0x80 mm/kasan/common.c:68  poison_kmalloc_redzone mm/kasan/common.c:377 [inline]  __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:394  kasan_kmalloc include/linux/kasan.h:260 [inline]  __kmalloc_cache_noprof+0x230/0x3d0 mm/slub.c:4358  kmalloc_noprof include/linux/slab.h:905 [inline]  kzalloc_noprof include/linux/slab.h:1039 [inline]  mgmt_pending_new+0x65/0x240 net/bluetooth/mgmt_util.c:252  mgmt_pending_add+0x34/0x120 net/bluetooth/mgmt_util.c:279  remove_adv_monitor+0x103/0x1b0 net/bluetooth/mgmt.c:5454  hci_mgmt_cmd+0x9c9/0xef0 net/bluetooth/hci_sock.c:1719  hci_sock_sendmsg+0x6ca/0xef0 net/bluetooth/hci_sock.c:1839  sock_sendmsg_nosec net/socket.c:712 [inline]  __sock_sendmsg+0x219/0x270 net/socket.c:727  sock_write_iter+0x258/0x330 net/socket.c:1131  new_sync_write fs/read_write.c:593 [inline]  vfs_write+0x548/0xa90 fs/read_write.c:686  ksys_write+0x145/0x250 fs/read_write.c:738  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]  do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94  entry_SYSCALL_64_after_hwframe+0x77/0x7f  Freed by task 5989:  kasan_save_stack mm/kasan/common.c:47 [inline]  kasan_save_track+0x3e/0x80 mm/kasan/common.c:68  kasan_save_free_info+0x46/0x50 mm/kasan/generic.c:576  poison_slab_object mm/kasan/common.c:247 [inline]  __kasan_slab_free+0x62/0x70 mm/kasan/common.c:264  kasan_slab_free include/linux/kasan.h:233 [inline]  slab_free_hook mm/slub.c:2380 [inline]  slab_free mm/slub.c:4642 [inline]  kfree+0x18e/0x440 mm/slub.c:4841  mgmt_pending_foreach+0xc9/0x120 net/bluetooth/mgmt_util.c:242  mgmt_index_removed+0x10d/0x2f0 net/bluetooth/mgmt.c:9366  hci_sock_bind+0xbe9/0x1000 net/bluetooth/hci_sock.c:1314  __sys_bind_socket net/socket.c:1810 [inline]  __sys_bind+0x2c3/0x3e0 net/socket.c:1841  __do_sys_bind net/socket.c:1846 [inline]  __se_sys_bind net/socket.c:1844 [inline]  __x64_sys_bind+0x7a/0x90 net/socket.c:1844  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]  do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94  entry_SYSCALL_64_after_hwframe+0x77/0x7f",
                        "cve_priority": "high",
                        "cve_public_date": "2025-07-03 09:15:00 UTC"
                    }
                ],
                "launchpad_bugs_fixed": [
                    2127619,
                    2121337,
                    2112469,
                    2123901,
                    2126659,
                    2126698,
                    2123815,
                    2125444,
                    2103680,
                    2125053,
                    2122592,
                    2122006,
                    2124105,
                    2124105
                ],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-21729",
                                "url": "https://ubuntu.com/security/CVE-2025-21729",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion  The rtwdev->scanning flag isn't protected by mutex originally, so cancel_hw_scan can pass the condition, but suddenly hw_scan completion unset the flag and calls ieee80211_scan_completed() that will free local->hw_scan_req. Then, cancel_hw_scan raises null-ptr-deref and use-after-free. Fix it by moving the check condition to where protected by mutex.   KASAN: null-ptr-deref in range [0x0000000000000088-0x000000000000008f]  CPU: 2 PID: 6922 Comm: kworker/2:2 Tainted: G           OE  Hardware name: LENOVO 2356AD1/2356AD1, BIOS G7ETB6WW (2.76 ) 09/10/2019  Workqueue: events cfg80211_conn_work [cfg80211]  RIP: 0010:rtw89_fw_h2c_scan_offload_be+0xc33/0x13c3 [rtw89_core]  Code: 00 45 89 6c 24 1c 0f 85 23 01 00 00 48 8b 85 20 ff ff ff 48 8d  RSP: 0018:ffff88811fd9f068 EFLAGS: 00010206  RAX: dffffc0000000000 RBX: ffff88811fd9f258 RCX: 0000000000000001  RDX: 0000000000000011 RSI: 0000000000000001 RDI: 0000000000000089  RBP: ffff88811fd9f170 R08: 0000000000000000 R09: 0000000000000000  R10: ffff88811fd9f108 R11: 0000000000000000 R12: ffff88810e47f960  R13: 0000000000000000 R14: 000000000000ffff R15: 0000000000000000  FS:  0000000000000000(0000) GS:ffff8881d6f00000(0000) knlGS:0000000000000000  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033  CR2: 00007531dfca55b0 CR3: 00000001be296004 CR4: 00000000001706e0  Call Trace:   <TASK>   ? show_regs+0x61/0x73   ? __die_body+0x20/0x73   ? die_addr+0x4f/0x7b   ? exc_general_protection+0x191/0x1db   ? asm_exc_general_protection+0x27/0x30   ? rtw89_fw_h2c_scan_offload_be+0xc33/0x13c3 [rtw89_core]   ? rtw89_fw_h2c_scan_offload_be+0x458/0x13c3 [rtw89_core]   ? __pfx_rtw89_fw_h2c_scan_offload_be+0x10/0x10 [rtw89_core]   ? do_raw_spin_lock+0x75/0xdb   ? __pfx_do_raw_spin_lock+0x10/0x10   rtw89_hw_scan_offload+0xb5e/0xbf7 [rtw89_core]   ? _raw_spin_unlock+0xe/0x24   ? __mutex_lock.constprop.0+0x40c/0x471   ? __pfx_rtw89_hw_scan_offload+0x10/0x10 [rtw89_core]   ? __mutex_lock_slowpath+0x13/0x1f   ? mutex_lock+0xa2/0xdc   ? __pfx_mutex_lock+0x10/0x10   rtw89_hw_scan_abort+0x58/0xb7 [rtw89_core]   rtw89_ops_cancel_hw_scan+0x120/0x13b [rtw89_core]   ieee80211_scan_cancel+0x468/0x4d0 [mac80211]   ieee80211_prep_connection+0x858/0x899 [mac80211]   ieee80211_mgd_auth+0xbea/0xdde [mac80211]   ? __pfx_ieee80211_mgd_auth+0x10/0x10 [mac80211]   ? cfg80211_find_elem+0x15/0x29 [cfg80211]   ? is_bss+0x1b7/0x1d7 [cfg80211]   ieee80211_auth+0x18/0x27 [mac80211]   cfg80211_mlme_auth+0x3bb/0x3e7 [cfg80211]   cfg80211_conn_do_work+0x410/0xb81 [cfg80211]   ? __pfx_cfg80211_conn_do_work+0x10/0x10 [cfg80211]   ? __kasan_check_read+0x11/0x1f   ? psi_group_change+0x8bc/0x944   ? __kasan_check_write+0x14/0x22   ? mutex_lock+0x8e/0xdc   ? __pfx_mutex_lock+0x10/0x10   ? __pfx___radix_tree_lookup+0x10/0x10   cfg80211_conn_work+0x245/0x34d [cfg80211]   ? __pfx_cfg80211_conn_work+0x10/0x10 [cfg80211]   ? update_cfs_rq_load_avg+0x3bc/0x3d7   ? sched_clock_noinstr+0x9/0x1a   ? sched_clock+0x10/0x24   ? sched_clock_cpu+0x7e/0x42e   ? newidle_balance+0x796/0x937   ? __pfx_sched_clock_cpu+0x10/0x10   ? __pfx_newidle_balance+0x10/0x10   ? __kasan_check_read+0x11/0x1f   ? psi_group_change+0x8bc/0x944   ? _raw_spin_unlock+0xe/0x24   ? raw_spin_rq_unlock+0x47/0x54   ? raw_spin_rq_unlock_irq+0x9/0x1f   ? finish_task_switch.isra.0+0x347/0x586   ? __schedule+0x27bf/0x2892   ? mutex_unlock+0x80/0xd0   ? do_raw_spin_lock+0x75/0xdb   ? __pfx___schedule+0x10/0x10   process_scheduled_works+0x58c/0x821   worker_thread+0x4c7/0x586   ? __kasan_check_read+0x11/0x1f   kthread+0x285/0x294   ? __pfx_worker_thread+0x10/0x10   ? __pfx_kthread+0x10/0x10   ret_from_fork+0x29/0x6f   ? __pfx_kthread+0x10/0x10   ret_from_fork_asm+0x1b/0x30   </TASK>",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-02-27 02:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38227",
                                "url": "https://ubuntu.com/security/CVE-2025-38227",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  media: vidtv: Terminating the subsequent process of initialization failure  syzbot reported a slab-use-after-free Read in vidtv_mux_init. [1]  After PSI initialization fails, the si member is accessed again, resulting in this uaf.  After si initialization fails, the subsequent process needs to be exited.  [1] BUG: KASAN: slab-use-after-free in vidtv_mux_pid_ctx_init drivers/media/test-drivers/vidtv/vidtv_mux.c:78 [inline] BUG: KASAN: slab-use-after-free in vidtv_mux_init+0xac2/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:524 Read of size 8 at addr ffff88802fa42acc by task syz.2.37/6059  CPU: 0 UID: 0 PID: 6059 Comm: syz.2.37 Not tainted 6.14.0-rc5-syzkaller #0 Hardware name: Google Compute Engine, BIOS Google 02/12/2025 Call Trace: <TASK> __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:408 [inline] print_report+0xc3/0x670 mm/kasan/report.c:521 kasan_report+0xd9/0x110 mm/kasan/report.c:634 vidtv_mux_pid_ctx_init drivers/media/test-drivers/vidtv/vidtv_mux.c:78 vidtv_mux_init+0xac2/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:524 vidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194 vidtv_start_feed drivers/media/test-drivers/vidtv/vidtv_bridge.c:239 dmx_section_feed_start_filtering drivers/media/dvb-core/dvb_demux.c:973 dvb_dmxdev_feed_start drivers/media/dvb-core/dmxdev.c:508 [inline] dvb_dmxdev_feed_restart.isra.0 drivers/media/dvb-core/dmxdev.c:537 dvb_dmxdev_filter_stop+0x2b4/0x3a0 drivers/media/dvb-core/dmxdev.c:564 dvb_dmxdev_filter_free drivers/media/dvb-core/dmxdev.c:840 [inline] dvb_demux_release+0x92/0x550 drivers/media/dvb-core/dmxdev.c:1246 __fput+0x3ff/0xb70 fs/file_table.c:464 task_work_run+0x14e/0x250 kernel/task_work.c:227 exit_task_work include/linux/task_work.h:40 [inline] do_exit+0xad8/0x2d70 kernel/exit.c:938 do_group_exit+0xd3/0x2a0 kernel/exit.c:1087 __do_sys_exit_group kernel/exit.c:1098 [inline] __se_sys_exit_group kernel/exit.c:1096 [inline] __x64_sys_exit_group+0x3e/0x50 kernel/exit.c:1096 x64_sys_call+0x151f/0x1720 arch/x86/include/generated/asm/syscalls_64.h:232 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f871d58d169 Code: Unable to access opcode bytes at 0x7f871d58d13f. RSP: 002b:00007fff4b19a788 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f871d58d169 RDX: 0000000000000064 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 00007fff4b19a7ec R08: 0000000b4b19a87f R09: 00000000000927c0 R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000003 R13: 00000000000927c0 R14: 000000000001d553 R15: 00007fff4b19a840  </TASK>  Allocated by task 6059:  kasan_save_stack+0x33/0x60 mm/kasan/common.c:47  kasan_save_track+0x14/0x30 mm/kasan/common.c:68  poison_kmalloc_redzone mm/kasan/common.c:377 [inline]  __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:394  kmalloc_noprof include/linux/slab.h:901 [inline]  kzalloc_noprof include/linux/slab.h:1037 [inline]  vidtv_psi_pat_table_init drivers/media/test-drivers/vidtv/vidtv_psi.c:970  vidtv_channel_si_init drivers/media/test-drivers/vidtv/vidtv_channel.c:423  vidtv_mux_init drivers/media/test-drivers/vidtv/vidtv_mux.c:519  vidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194  vidtv_start_feed drivers/media/test-drivers/vidtv/vidtv_bridge.c:239  dmx_section_feed_start_filtering drivers/media/dvb-core/dvb_demux.c:973  dvb_dmxdev_feed_start drivers/media/dvb-core/dmxdev.c:508 [inline]  dvb_dmxdev_feed_restart.isra.0 drivers/media/dvb-core/dmxdev.c:537  dvb_dmxdev_filter_stop+0x2b4/0x3a0 drivers/media/dvb-core/dmxdev.c:564  dvb_dmxdev_filter_free drivers/media/dvb-core/dmxdev.c:840 [inline]  dvb_demux_release+0x92/0x550 drivers/media/dvb-core/dmxdev.c:1246  __fput+0x3ff/0xb70 fs/file_tabl ---truncated---",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-07-04 14:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38678",
                                "url": "https://ubuntu.com/security/CVE-2025-38678",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  netfilter: nf_tables: reject duplicate device on updates  A chain/flowtable update with duplicated devices in the same batch is possible. Unfortunately, netdev event path only removes the first device that is found, leaving unregistered the hook of the duplicated device.  Check if a duplicated device exists in the transaction batch, bail out with EEXIST in such case.  WARNING is hit when unregistering the hook:   [49042.221275] WARNING: CPU: 4 PID: 8425 at net/netfilter/core.c:340 nf_hook_entry_head+0xaa/0x150  [49042.221375] CPU: 4 UID: 0 PID: 8425 Comm: nft Tainted: G S                 6.16.0+ #170 PREEMPT(full)  [...]  [49042.221382] RIP: 0010:nf_hook_entry_head+0xaa/0x150",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-09-03 13:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38616",
                                "url": "https://ubuntu.com/security/CVE-2025-38616",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  tls: handle data disappearing from under the TLS ULP  TLS expects that it owns the receive queue of the TCP socket. This cannot be guaranteed in case the reader of the TCP socket entered before the TLS ULP was installed, or uses some non-standard read API (eg. zerocopy ones). Replace the WARN_ON() and a buggy early exit (which leaves anchor pointing to a freed skb) with real error handling. Wipe the parsing state and tell the reader to retry.  We already reload the anchor every time we (re)acquire the socket lock, so the only condition we need to avoid is an out of bounds read (not having enough bytes in the socket for previously parsed record len).  If some data was read from under TLS but there's enough in the queue we'll reload and decrypt what is most likely not a valid TLS record. Leading to some undefined behavior from TLS perspective (corrupting a stream? missing an alert? missing an attack?) but no kernel crash should take place.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-08-22 14:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-37838",
                                "url": "https://ubuntu.com/security/CVE-2025-37838",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  HSI: ssi_protocol: Fix use after free vulnerability in ssi_protocol Driver Due to Race Condition  In the ssi_protocol_probe() function, &ssi->work is bound with ssip_xmit_work(), In ssip_pn_setup(), the ssip_pn_xmit() function within the ssip_pn_ops structure is capable of starting the work.  If we remove the module which will call ssi_protocol_remove() to make a cleanup, it will free ssi through kfree(ssi), while the work mentioned above will be used. The sequence of operations that may lead to a UAF bug is as follows:  CPU0                                    CPU1                          | ssip_xmit_work ssi_protocol_remove     | kfree(ssi);             |                         | struct hsi_client *cl = ssi->cl;                         | // use ssi  Fix it by ensuring that the work is canceled before proceeding with the cleanup in ssi_protocol_remove().",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-04-18 15:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-40300",
                                "url": "https://ubuntu.com/security/CVE-2025-40300",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  x86/vmscape: Add conditional IBPB mitigation  VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace hypervisor (like QEMU). Existing mitigations already protect kernel/KVM from a malicious guest. Userspace can additionally be protected by flushing the branch predictors after a VMexit.  Since it is the userspace that consumes the poisoned branch predictors, conditionally issue an IBPB after a VMexit and before returning to userspace. Workloads that frequently switch between hypervisor and userspace will incur the most overhead from the new IBPB.  This new IBPB is not integrated with the existing IBPB sites. For instance, a task can use the existing speculation control prctl() to get an IBPB at context switch time. With this implementation, the IBPB is doubled up: one at context switch and another before running userspace.  The intent is to integrate and optimize these cases post-embargo.  [ dhansen: elaborate on suboptimal IBPB solution ]",
                                "cve_priority": "high",
                                "cve_public_date": "2025-09-11 17:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38352",
                                "url": "https://ubuntu.com/security/CVE-2025-38352",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del()  If an exiting non-autoreaping task has already passed exit_notify() and calls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent or debugger right after unlock_task_sighand().  If a concurrent posix_cpu_timer_del() runs at that moment, it won't be able to detect timer->it.cpu.firing != 0: cpu_timer_task_rcu() and/or lock_task_sighand() will fail.  Add the tsk->exit_state check into run_posix_cpu_timers() to fix this.  This fix is not needed if CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y, because exit_task_work() is called before exit_notify(). But the check still makes sense, task_work_add(&tsk->posix_cputimers_work.work) will fail anyway in this case.",
                                "cve_priority": "high",
                                "cve_public_date": "2025-07-22 08:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38118",
                                "url": "https://ubuntu.com/security/CVE-2025-38118",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  Bluetooth: MGMT: Fix UAF on mgmt_remove_adv_monitor_complete  This reworks MGMT_OP_REMOVE_ADV_MONITOR to not use mgmt_pending_add to avoid crashes like bellow:  ================================================================== BUG: KASAN: slab-use-after-free in mgmt_remove_adv_monitor_complete+0xe5/0x540 net/bluetooth/mgmt.c:5406 Read of size 8 at addr ffff88801c53f318 by task kworker/u5:5/5341  CPU: 0 UID: 0 PID: 5341 Comm: kworker/u5:5 Not tainted 6.15.0-syzkaller-10402-g4cb6c8af8591 #0 PREEMPT(full) Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014 Workqueue: hci0 hci_cmd_sync_work Call Trace:  <TASK>  dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120  print_address_description mm/kasan/report.c:408 [inline]  print_report+0xd2/0x2b0 mm/kasan/report.c:521  kasan_report+0x118/0x150 mm/kasan/report.c:634  mgmt_remove_adv_monitor_complete+0xe5/0x540 net/bluetooth/mgmt.c:5406  hci_cmd_sync_work+0x261/0x3a0 net/bluetooth/hci_sync.c:334  process_one_work kernel/workqueue.c:3238 [inline]  process_scheduled_works+0xade/0x17b0 kernel/workqueue.c:3321  worker_thread+0x8a0/0xda0 kernel/workqueue.c:3402  kthread+0x711/0x8a0 kernel/kthread.c:464  ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245  </TASK>  Allocated by task 5987:  kasan_save_stack mm/kasan/common.c:47 [inline]  kasan_save_track+0x3e/0x80 mm/kasan/common.c:68  poison_kmalloc_redzone mm/kasan/common.c:377 [inline]  __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:394  kasan_kmalloc include/linux/kasan.h:260 [inline]  __kmalloc_cache_noprof+0x230/0x3d0 mm/slub.c:4358  kmalloc_noprof include/linux/slab.h:905 [inline]  kzalloc_noprof include/linux/slab.h:1039 [inline]  mgmt_pending_new+0x65/0x240 net/bluetooth/mgmt_util.c:252  mgmt_pending_add+0x34/0x120 net/bluetooth/mgmt_util.c:279  remove_adv_monitor+0x103/0x1b0 net/bluetooth/mgmt.c:5454  hci_mgmt_cmd+0x9c9/0xef0 net/bluetooth/hci_sock.c:1719  hci_sock_sendmsg+0x6ca/0xef0 net/bluetooth/hci_sock.c:1839  sock_sendmsg_nosec net/socket.c:712 [inline]  __sock_sendmsg+0x219/0x270 net/socket.c:727  sock_write_iter+0x258/0x330 net/socket.c:1131  new_sync_write fs/read_write.c:593 [inline]  vfs_write+0x548/0xa90 fs/read_write.c:686  ksys_write+0x145/0x250 fs/read_write.c:738  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]  do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94  entry_SYSCALL_64_after_hwframe+0x77/0x7f  Freed by task 5989:  kasan_save_stack mm/kasan/common.c:47 [inline]  kasan_save_track+0x3e/0x80 mm/kasan/common.c:68  kasan_save_free_info+0x46/0x50 mm/kasan/generic.c:576  poison_slab_object mm/kasan/common.c:247 [inline]  __kasan_slab_free+0x62/0x70 mm/kasan/common.c:264  kasan_slab_free include/linux/kasan.h:233 [inline]  slab_free_hook mm/slub.c:2380 [inline]  slab_free mm/slub.c:4642 [inline]  kfree+0x18e/0x440 mm/slub.c:4841  mgmt_pending_foreach+0xc9/0x120 net/bluetooth/mgmt_util.c:242  mgmt_index_removed+0x10d/0x2f0 net/bluetooth/mgmt.c:9366  hci_sock_bind+0xbe9/0x1000 net/bluetooth/hci_sock.c:1314  __sys_bind_socket net/socket.c:1810 [inline]  __sys_bind+0x2c3/0x3e0 net/socket.c:1841  __do_sys_bind net/socket.c:1846 [inline]  __se_sys_bind net/socket.c:1844 [inline]  __x64_sys_bind+0x7a/0x90 net/socket.c:1844  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]  do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94  entry_SYSCALL_64_after_hwframe+0x77/0x7f",
                                "cve_priority": "high",
                                "cve_public_date": "2025-07-03 09:15:00 UTC"
                            }
                        ],
                        "log": [
                            "",
                            "  * noble/linux: 6.8.0-88.89 -proposed tracker (LP: #2127619)",
                            "",
                            "  *  Enable Xilinx PS UART configs (LP: #2121337)",
                            "    - [Config] Enable Xilinx PS UART configs",
                            "",
                            "  * Fix ARL-U/H suspend issues (LP: #2112469)",
                            "    - platform/x86/intel/pmc: Add Arrow Lake U/H support to intel_pmc_core",
                            "      driver",
                            "    - platform/x86/intel/pmc: Fix Arrow Lake U/H NPU PCI ID",
                            "",
                            "  * r8169 can not wake on LAN via SFP moudule (LP: #2123901)",
                            "    - r8169: set EEE speed down ratio to 1",
                            "",
                            "  * Add pvpanic kernel modules to linux-modules (LP: #2126659)",
                            "    - [Packaging] Add pvpanic kernel modules to linux-modules",
                            "",
                            "  * CVE-2025-21729",
                            "    - wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion",
                            "",
                            "  * Fix failure to build TDX module (LP: #2126698)",
                            "    - x86/paravirt: Move halt paravirt calls under CONFIG_PARAVIRT",
                            "",
                            "  * Ubuntu 24.04.2: error in audit_log_object_context keep printing in the",
                            "    kernel and console (LP: #2123815)",
                            "    - SAUCE: fix: apparmor4.0.0 [26/90]: LSM stacking v39: Audit: Add record",
                            "      for multiple object contexts",
                            "",
                            "  * ensure mptcp keepalives are honored when set (LP: #2125444)",
                            "    - mptcp: sockopt: make sync_socket_options propagate SOCK_KEEPOPEN",
                            "",
                            "  * System hangs when running the memory stress test (LP: #2103680)",
                            "    - mm: page_alloc: avoid kswapd thrashing due to NUMA restrictions",
                            "",
                            "  * UBUNTU: fan: fail to check kmalloc() return could cause a NULL pointer",
                            "    dereference (LP: #2125053)",
                            "    - SAUCE: fan: vxlan: check memory allocation for map",
                            "",
                            "  * jammy:linux-riscv-6.8 is FTBFS because of wrong include (LP: #2122592)",
                            "    - SAUCE: riscv: KVM: Remove broken include",
                            "",
                            "  * Performance degrades rapidly when spawning more processes to run benchmark",
                            "    (LP: #2122006)",
                            "    - cpuidle: menu: Avoid discarding useful information",
                            "    - cpuidle: governors: menu: Avoid using invalid recent intervals data",
                            "",
                            "  * CVE-2025-38227",
                            "    - media: vidtv: Terminating the subsequent process of initialization",
                            "      failure",
                            "",
                            "  * CVE-2025-38678",
                            "    - netfilter: nf_tables: reject duplicate device on updates",
                            "",
                            "  * CVE-2025-38616",
                            "    - tls: handle data disappearing from under the TLS ULP",
                            "",
                            "  * CVE-2025-37838",
                            "    - HSI: ssi_protocol: Fix use after free vulnerability in ssi_protocol",
                            "      Driver Due to Race Condition",
                            "",
                            "  * VMSCAPE CVE-2025-40300 (LP: #2124105) // CVE-2025-40300",
                            "    - Documentation/hw-vuln: Add VMSCAPE documentation",
                            "    - x86/vmscape: Enumerate VMSCAPE bug",
                            "    - x86/vmscape: Add conditional IBPB mitigation",
                            "    - x86/vmscape: Enable the mitigation",
                            "    - x86/bugs: Move cpu_bugs_smt_update() down",
                            "    - x86/vmscape: Warn when STIBP is disabled with SMT",
                            "    - x86/vmscape: Add old Intel CPUs to affected list",
                            "",
                            "  * VMSCAPE CVE-2025-40300 (LP: #2124105)",
                            "    - [Config] Enable MITIGATION_VMSCAPE config",
                            "",
                            "  * CVE-2025-38352",
                            "    - posix-cpu-timers: fix race between handle_posix_cpu_timers() and",
                            "      posix_cpu_timer_del()",
                            "",
                            "  * CVE-2025-38118",
                            "    - Bluetooth: MGMT: Fix UAF on mgmt_remove_adv_monitor_complete",
                            "    - Bluetooth: MGMT: Fix sparse errors",
                            ""
                        ],
                        "package": "linux",
                        "version": "6.8.0-88.89",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2127619,
                            2121337,
                            2112469,
                            2123901,
                            2126659,
                            2126698,
                            2123815,
                            2125444,
                            2103680,
                            2125053,
                            2122592,
                            2122006,
                            2124105,
                            2124105
                        ],
                        "author": "Edoardo Canepa <edoardo.canepa@canonical.com>",
                        "date": "Sat, 11 Oct 2025 01:38:46 +0200"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "linux-virtual",
                "from_version": {
                    "source_package_name": "linux-meta",
                    "source_package_version": "6.8.0-87.88",
                    "version": "6.8.0-87.88"
                },
                "to_version": {
                    "source_package_name": "linux-meta",
                    "source_package_version": "6.8.0-88.89",
                    "version": "6.8.0-88.89"
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Main version: 6.8.0-88.89",
                            ""
                        ],
                        "package": "linux-meta",
                        "version": "6.8.0-88.89",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [],
                        "author": "Edoardo Canepa <edoardo.canepa@canonical.com>",
                        "date": "Sat, 11 Oct 2025 01:39:50 +0200"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "packagekit",
                "from_version": {
                    "source_package_name": "packagekit",
                    "source_package_version": "1.2.8-2ubuntu1.2",
                    "version": "1.2.8-2ubuntu1.2"
                },
                "to_version": {
                    "source_package_name": "packagekit",
                    "source_package_version": "1.2.8-2ubuntu1.4",
                    "version": "1.2.8-2ubuntu1.4"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2060730,
                    2060730
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * d/p/apt-Handle-gstreamer-64bit-suffix-on-any-architecture.patch:",
                            "    Fix matching GStreamer capabilities on ARM64 and other architectures",
                            "    (LP: #2060730)",
                            ""
                        ],
                        "package": "packagekit",
                        "version": "1.2.8-2ubuntu1.4",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2060730
                        ],
                        "author": "Alessandro Astone <alessandro.astone@canonical.com>",
                        "date": "Thu, 09 Oct 2025 11:00:52 +0200"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * d/p/apt-Fix-matching-gstreamer-pkgs-where-the-only-modifier-i.patch:",
                            "    Fix matching GStreamer capabilities, which would find no results in some",
                            "    specific but common edge-cases (LP: #2060730).",
                            ""
                        ],
                        "package": "packagekit",
                        "version": "1.2.8-2ubuntu1.3",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2060730
                        ],
                        "author": "Alessandro Astone <alessandro.astone@canonical.com>",
                        "date": "Tue, 01 Jul 2025 11:00:56 +0200"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "packagekit-tools",
                "from_version": {
                    "source_package_name": "packagekit",
                    "source_package_version": "1.2.8-2ubuntu1.2",
                    "version": "1.2.8-2ubuntu1.2"
                },
                "to_version": {
                    "source_package_name": "packagekit",
                    "source_package_version": "1.2.8-2ubuntu1.4",
                    "version": "1.2.8-2ubuntu1.4"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    2060730,
                    2060730
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * d/p/apt-Handle-gstreamer-64bit-suffix-on-any-architecture.patch:",
                            "    Fix matching GStreamer capabilities on ARM64 and other architectures",
                            "    (LP: #2060730)",
                            ""
                        ],
                        "package": "packagekit",
                        "version": "1.2.8-2ubuntu1.4",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2060730
                        ],
                        "author": "Alessandro Astone <alessandro.astone@canonical.com>",
                        "date": "Thu, 09 Oct 2025 11:00:52 +0200"
                    },
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * d/p/apt-Fix-matching-gstreamer-pkgs-where-the-only-modifier-i.patch:",
                            "    Fix matching GStreamer capabilities, which would find no results in some",
                            "    specific but common edge-cases (LP: #2060730).",
                            ""
                        ],
                        "package": "packagekit",
                        "version": "1.2.8-2ubuntu1.3",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2060730
                        ],
                        "author": "Alessandro Astone <alessandro.astone@canonical.com>",
                        "date": "Tue, 01 Jul 2025 11:00:56 +0200"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            }
        ],
        "snap": []
    },
    "added": {
        "deb": [
            {
                "name": "linux-headers-6.8.0-88",
                "from_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.8.0-87.88",
                    "version": null
                },
                "to_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.8.0-88.89",
                    "version": "6.8.0-88.89"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-21729",
                        "url": "https://ubuntu.com/security/CVE-2025-21729",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion  The rtwdev->scanning flag isn't protected by mutex originally, so cancel_hw_scan can pass the condition, but suddenly hw_scan completion unset the flag and calls ieee80211_scan_completed() that will free local->hw_scan_req. Then, cancel_hw_scan raises null-ptr-deref and use-after-free. Fix it by moving the check condition to where protected by mutex.   KASAN: null-ptr-deref in range [0x0000000000000088-0x000000000000008f]  CPU: 2 PID: 6922 Comm: kworker/2:2 Tainted: G           OE  Hardware name: LENOVO 2356AD1/2356AD1, BIOS G7ETB6WW (2.76 ) 09/10/2019  Workqueue: events cfg80211_conn_work [cfg80211]  RIP: 0010:rtw89_fw_h2c_scan_offload_be+0xc33/0x13c3 [rtw89_core]  Code: 00 45 89 6c 24 1c 0f 85 23 01 00 00 48 8b 85 20 ff ff ff 48 8d  RSP: 0018:ffff88811fd9f068 EFLAGS: 00010206  RAX: dffffc0000000000 RBX: ffff88811fd9f258 RCX: 0000000000000001  RDX: 0000000000000011 RSI: 0000000000000001 RDI: 0000000000000089  RBP: ffff88811fd9f170 R08: 0000000000000000 R09: 0000000000000000  R10: ffff88811fd9f108 R11: 0000000000000000 R12: ffff88810e47f960  R13: 0000000000000000 R14: 000000000000ffff R15: 0000000000000000  FS:  0000000000000000(0000) GS:ffff8881d6f00000(0000) knlGS:0000000000000000  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033  CR2: 00007531dfca55b0 CR3: 00000001be296004 CR4: 00000000001706e0  Call Trace:   <TASK>   ? show_regs+0x61/0x73   ? __die_body+0x20/0x73   ? die_addr+0x4f/0x7b   ? exc_general_protection+0x191/0x1db   ? asm_exc_general_protection+0x27/0x30   ? rtw89_fw_h2c_scan_offload_be+0xc33/0x13c3 [rtw89_core]   ? rtw89_fw_h2c_scan_offload_be+0x458/0x13c3 [rtw89_core]   ? __pfx_rtw89_fw_h2c_scan_offload_be+0x10/0x10 [rtw89_core]   ? do_raw_spin_lock+0x75/0xdb   ? __pfx_do_raw_spin_lock+0x10/0x10   rtw89_hw_scan_offload+0xb5e/0xbf7 [rtw89_core]   ? _raw_spin_unlock+0xe/0x24   ? __mutex_lock.constprop.0+0x40c/0x471   ? __pfx_rtw89_hw_scan_offload+0x10/0x10 [rtw89_core]   ? __mutex_lock_slowpath+0x13/0x1f   ? mutex_lock+0xa2/0xdc   ? __pfx_mutex_lock+0x10/0x10   rtw89_hw_scan_abort+0x58/0xb7 [rtw89_core]   rtw89_ops_cancel_hw_scan+0x120/0x13b [rtw89_core]   ieee80211_scan_cancel+0x468/0x4d0 [mac80211]   ieee80211_prep_connection+0x858/0x899 [mac80211]   ieee80211_mgd_auth+0xbea/0xdde [mac80211]   ? __pfx_ieee80211_mgd_auth+0x10/0x10 [mac80211]   ? cfg80211_find_elem+0x15/0x29 [cfg80211]   ? is_bss+0x1b7/0x1d7 [cfg80211]   ieee80211_auth+0x18/0x27 [mac80211]   cfg80211_mlme_auth+0x3bb/0x3e7 [cfg80211]   cfg80211_conn_do_work+0x410/0xb81 [cfg80211]   ? __pfx_cfg80211_conn_do_work+0x10/0x10 [cfg80211]   ? __kasan_check_read+0x11/0x1f   ? psi_group_change+0x8bc/0x944   ? __kasan_check_write+0x14/0x22   ? mutex_lock+0x8e/0xdc   ? __pfx_mutex_lock+0x10/0x10   ? __pfx___radix_tree_lookup+0x10/0x10   cfg80211_conn_work+0x245/0x34d [cfg80211]   ? __pfx_cfg80211_conn_work+0x10/0x10 [cfg80211]   ? update_cfs_rq_load_avg+0x3bc/0x3d7   ? sched_clock_noinstr+0x9/0x1a   ? sched_clock+0x10/0x24   ? sched_clock_cpu+0x7e/0x42e   ? newidle_balance+0x796/0x937   ? __pfx_sched_clock_cpu+0x10/0x10   ? __pfx_newidle_balance+0x10/0x10   ? __kasan_check_read+0x11/0x1f   ? psi_group_change+0x8bc/0x944   ? _raw_spin_unlock+0xe/0x24   ? raw_spin_rq_unlock+0x47/0x54   ? raw_spin_rq_unlock_irq+0x9/0x1f   ? finish_task_switch.isra.0+0x347/0x586   ? __schedule+0x27bf/0x2892   ? mutex_unlock+0x80/0xd0   ? do_raw_spin_lock+0x75/0xdb   ? __pfx___schedule+0x10/0x10   process_scheduled_works+0x58c/0x821   worker_thread+0x4c7/0x586   ? __kasan_check_read+0x11/0x1f   kthread+0x285/0x294   ? __pfx_worker_thread+0x10/0x10   ? __pfx_kthread+0x10/0x10   ret_from_fork+0x29/0x6f   ? __pfx_kthread+0x10/0x10   ret_from_fork_asm+0x1b/0x30   </TASK>",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-02-27 02:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38227",
                        "url": "https://ubuntu.com/security/CVE-2025-38227",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  media: vidtv: Terminating the subsequent process of initialization failure  syzbot reported a slab-use-after-free Read in vidtv_mux_init. [1]  After PSI initialization fails, the si member is accessed again, resulting in this uaf.  After si initialization fails, the subsequent process needs to be exited.  [1] BUG: KASAN: slab-use-after-free in vidtv_mux_pid_ctx_init drivers/media/test-drivers/vidtv/vidtv_mux.c:78 [inline] BUG: KASAN: slab-use-after-free in vidtv_mux_init+0xac2/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:524 Read of size 8 at addr ffff88802fa42acc by task syz.2.37/6059  CPU: 0 UID: 0 PID: 6059 Comm: syz.2.37 Not tainted 6.14.0-rc5-syzkaller #0 Hardware name: Google Compute Engine, BIOS Google 02/12/2025 Call Trace: <TASK> __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:408 [inline] print_report+0xc3/0x670 mm/kasan/report.c:521 kasan_report+0xd9/0x110 mm/kasan/report.c:634 vidtv_mux_pid_ctx_init drivers/media/test-drivers/vidtv/vidtv_mux.c:78 vidtv_mux_init+0xac2/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:524 vidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194 vidtv_start_feed drivers/media/test-drivers/vidtv/vidtv_bridge.c:239 dmx_section_feed_start_filtering drivers/media/dvb-core/dvb_demux.c:973 dvb_dmxdev_feed_start drivers/media/dvb-core/dmxdev.c:508 [inline] dvb_dmxdev_feed_restart.isra.0 drivers/media/dvb-core/dmxdev.c:537 dvb_dmxdev_filter_stop+0x2b4/0x3a0 drivers/media/dvb-core/dmxdev.c:564 dvb_dmxdev_filter_free drivers/media/dvb-core/dmxdev.c:840 [inline] dvb_demux_release+0x92/0x550 drivers/media/dvb-core/dmxdev.c:1246 __fput+0x3ff/0xb70 fs/file_table.c:464 task_work_run+0x14e/0x250 kernel/task_work.c:227 exit_task_work include/linux/task_work.h:40 [inline] do_exit+0xad8/0x2d70 kernel/exit.c:938 do_group_exit+0xd3/0x2a0 kernel/exit.c:1087 __do_sys_exit_group kernel/exit.c:1098 [inline] __se_sys_exit_group kernel/exit.c:1096 [inline] __x64_sys_exit_group+0x3e/0x50 kernel/exit.c:1096 x64_sys_call+0x151f/0x1720 arch/x86/include/generated/asm/syscalls_64.h:232 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f871d58d169 Code: Unable to access opcode bytes at 0x7f871d58d13f. RSP: 002b:00007fff4b19a788 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f871d58d169 RDX: 0000000000000064 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 00007fff4b19a7ec R08: 0000000b4b19a87f R09: 00000000000927c0 R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000003 R13: 00000000000927c0 R14: 000000000001d553 R15: 00007fff4b19a840  </TASK>  Allocated by task 6059:  kasan_save_stack+0x33/0x60 mm/kasan/common.c:47  kasan_save_track+0x14/0x30 mm/kasan/common.c:68  poison_kmalloc_redzone mm/kasan/common.c:377 [inline]  __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:394  kmalloc_noprof include/linux/slab.h:901 [inline]  kzalloc_noprof include/linux/slab.h:1037 [inline]  vidtv_psi_pat_table_init drivers/media/test-drivers/vidtv/vidtv_psi.c:970  vidtv_channel_si_init drivers/media/test-drivers/vidtv/vidtv_channel.c:423  vidtv_mux_init drivers/media/test-drivers/vidtv/vidtv_mux.c:519  vidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194  vidtv_start_feed drivers/media/test-drivers/vidtv/vidtv_bridge.c:239  dmx_section_feed_start_filtering drivers/media/dvb-core/dvb_demux.c:973  dvb_dmxdev_feed_start drivers/media/dvb-core/dmxdev.c:508 [inline]  dvb_dmxdev_feed_restart.isra.0 drivers/media/dvb-core/dmxdev.c:537  dvb_dmxdev_filter_stop+0x2b4/0x3a0 drivers/media/dvb-core/dmxdev.c:564  dvb_dmxdev_filter_free drivers/media/dvb-core/dmxdev.c:840 [inline]  dvb_demux_release+0x92/0x550 drivers/media/dvb-core/dmxdev.c:1246  __fput+0x3ff/0xb70 fs/file_tabl ---truncated---",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-07-04 14:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38678",
                        "url": "https://ubuntu.com/security/CVE-2025-38678",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  netfilter: nf_tables: reject duplicate device on updates  A chain/flowtable update with duplicated devices in the same batch is possible. Unfortunately, netdev event path only removes the first device that is found, leaving unregistered the hook of the duplicated device.  Check if a duplicated device exists in the transaction batch, bail out with EEXIST in such case.  WARNING is hit when unregistering the hook:   [49042.221275] WARNING: CPU: 4 PID: 8425 at net/netfilter/core.c:340 nf_hook_entry_head+0xaa/0x150  [49042.221375] CPU: 4 UID: 0 PID: 8425 Comm: nft Tainted: G S                 6.16.0+ #170 PREEMPT(full)  [...]  [49042.221382] RIP: 0010:nf_hook_entry_head+0xaa/0x150",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-09-03 13:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38616",
                        "url": "https://ubuntu.com/security/CVE-2025-38616",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  tls: handle data disappearing from under the TLS ULP  TLS expects that it owns the receive queue of the TCP socket. This cannot be guaranteed in case the reader of the TCP socket entered before the TLS ULP was installed, or uses some non-standard read API (eg. zerocopy ones). Replace the WARN_ON() and a buggy early exit (which leaves anchor pointing to a freed skb) with real error handling. Wipe the parsing state and tell the reader to retry.  We already reload the anchor every time we (re)acquire the socket lock, so the only condition we need to avoid is an out of bounds read (not having enough bytes in the socket for previously parsed record len).  If some data was read from under TLS but there's enough in the queue we'll reload and decrypt what is most likely not a valid TLS record. Leading to some undefined behavior from TLS perspective (corrupting a stream? missing an alert? missing an attack?) but no kernel crash should take place.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-08-22 14:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-37838",
                        "url": "https://ubuntu.com/security/CVE-2025-37838",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  HSI: ssi_protocol: Fix use after free vulnerability in ssi_protocol Driver Due to Race Condition  In the ssi_protocol_probe() function, &ssi->work is bound with ssip_xmit_work(), In ssip_pn_setup(), the ssip_pn_xmit() function within the ssip_pn_ops structure is capable of starting the work.  If we remove the module which will call ssi_protocol_remove() to make a cleanup, it will free ssi through kfree(ssi), while the work mentioned above will be used. The sequence of operations that may lead to a UAF bug is as follows:  CPU0                                    CPU1                          | ssip_xmit_work ssi_protocol_remove     | kfree(ssi);             |                         | struct hsi_client *cl = ssi->cl;                         | // use ssi  Fix it by ensuring that the work is canceled before proceeding with the cleanup in ssi_protocol_remove().",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-04-18 15:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-40300",
                        "url": "https://ubuntu.com/security/CVE-2025-40300",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  x86/vmscape: Add conditional IBPB mitigation  VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace hypervisor (like QEMU). Existing mitigations already protect kernel/KVM from a malicious guest. Userspace can additionally be protected by flushing the branch predictors after a VMexit.  Since it is the userspace that consumes the poisoned branch predictors, conditionally issue an IBPB after a VMexit and before returning to userspace. Workloads that frequently switch between hypervisor and userspace will incur the most overhead from the new IBPB.  This new IBPB is not integrated with the existing IBPB sites. For instance, a task can use the existing speculation control prctl() to get an IBPB at context switch time. With this implementation, the IBPB is doubled up: one at context switch and another before running userspace.  The intent is to integrate and optimize these cases post-embargo.  [ dhansen: elaborate on suboptimal IBPB solution ]",
                        "cve_priority": "high",
                        "cve_public_date": "2025-09-11 17:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38352",
                        "url": "https://ubuntu.com/security/CVE-2025-38352",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del()  If an exiting non-autoreaping task has already passed exit_notify() and calls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent or debugger right after unlock_task_sighand().  If a concurrent posix_cpu_timer_del() runs at that moment, it won't be able to detect timer->it.cpu.firing != 0: cpu_timer_task_rcu() and/or lock_task_sighand() will fail.  Add the tsk->exit_state check into run_posix_cpu_timers() to fix this.  This fix is not needed if CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y, because exit_task_work() is called before exit_notify(). But the check still makes sense, task_work_add(&tsk->posix_cputimers_work.work) will fail anyway in this case.",
                        "cve_priority": "high",
                        "cve_public_date": "2025-07-22 08:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38118",
                        "url": "https://ubuntu.com/security/CVE-2025-38118",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  Bluetooth: MGMT: Fix UAF on mgmt_remove_adv_monitor_complete  This reworks MGMT_OP_REMOVE_ADV_MONITOR to not use mgmt_pending_add to avoid crashes like bellow:  ================================================================== BUG: KASAN: slab-use-after-free in mgmt_remove_adv_monitor_complete+0xe5/0x540 net/bluetooth/mgmt.c:5406 Read of size 8 at addr ffff88801c53f318 by task kworker/u5:5/5341  CPU: 0 UID: 0 PID: 5341 Comm: kworker/u5:5 Not tainted 6.15.0-syzkaller-10402-g4cb6c8af8591 #0 PREEMPT(full) Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014 Workqueue: hci0 hci_cmd_sync_work Call Trace:  <TASK>  dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120  print_address_description mm/kasan/report.c:408 [inline]  print_report+0xd2/0x2b0 mm/kasan/report.c:521  kasan_report+0x118/0x150 mm/kasan/report.c:634  mgmt_remove_adv_monitor_complete+0xe5/0x540 net/bluetooth/mgmt.c:5406  hci_cmd_sync_work+0x261/0x3a0 net/bluetooth/hci_sync.c:334  process_one_work kernel/workqueue.c:3238 [inline]  process_scheduled_works+0xade/0x17b0 kernel/workqueue.c:3321  worker_thread+0x8a0/0xda0 kernel/workqueue.c:3402  kthread+0x711/0x8a0 kernel/kthread.c:464  ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245  </TASK>  Allocated by task 5987:  kasan_save_stack mm/kasan/common.c:47 [inline]  kasan_save_track+0x3e/0x80 mm/kasan/common.c:68  poison_kmalloc_redzone mm/kasan/common.c:377 [inline]  __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:394  kasan_kmalloc include/linux/kasan.h:260 [inline]  __kmalloc_cache_noprof+0x230/0x3d0 mm/slub.c:4358  kmalloc_noprof include/linux/slab.h:905 [inline]  kzalloc_noprof include/linux/slab.h:1039 [inline]  mgmt_pending_new+0x65/0x240 net/bluetooth/mgmt_util.c:252  mgmt_pending_add+0x34/0x120 net/bluetooth/mgmt_util.c:279  remove_adv_monitor+0x103/0x1b0 net/bluetooth/mgmt.c:5454  hci_mgmt_cmd+0x9c9/0xef0 net/bluetooth/hci_sock.c:1719  hci_sock_sendmsg+0x6ca/0xef0 net/bluetooth/hci_sock.c:1839  sock_sendmsg_nosec net/socket.c:712 [inline]  __sock_sendmsg+0x219/0x270 net/socket.c:727  sock_write_iter+0x258/0x330 net/socket.c:1131  new_sync_write fs/read_write.c:593 [inline]  vfs_write+0x548/0xa90 fs/read_write.c:686  ksys_write+0x145/0x250 fs/read_write.c:738  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]  do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94  entry_SYSCALL_64_after_hwframe+0x77/0x7f  Freed by task 5989:  kasan_save_stack mm/kasan/common.c:47 [inline]  kasan_save_track+0x3e/0x80 mm/kasan/common.c:68  kasan_save_free_info+0x46/0x50 mm/kasan/generic.c:576  poison_slab_object mm/kasan/common.c:247 [inline]  __kasan_slab_free+0x62/0x70 mm/kasan/common.c:264  kasan_slab_free include/linux/kasan.h:233 [inline]  slab_free_hook mm/slub.c:2380 [inline]  slab_free mm/slub.c:4642 [inline]  kfree+0x18e/0x440 mm/slub.c:4841  mgmt_pending_foreach+0xc9/0x120 net/bluetooth/mgmt_util.c:242  mgmt_index_removed+0x10d/0x2f0 net/bluetooth/mgmt.c:9366  hci_sock_bind+0xbe9/0x1000 net/bluetooth/hci_sock.c:1314  __sys_bind_socket net/socket.c:1810 [inline]  __sys_bind+0x2c3/0x3e0 net/socket.c:1841  __do_sys_bind net/socket.c:1846 [inline]  __se_sys_bind net/socket.c:1844 [inline]  __x64_sys_bind+0x7a/0x90 net/socket.c:1844  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]  do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94  entry_SYSCALL_64_after_hwframe+0x77/0x7f",
                        "cve_priority": "high",
                        "cve_public_date": "2025-07-03 09:15:00 UTC"
                    }
                ],
                "launchpad_bugs_fixed": [
                    2127619,
                    2121337,
                    2112469,
                    2123901,
                    2126659,
                    2126698,
                    2123815,
                    2125444,
                    2103680,
                    2125053,
                    2122592,
                    2122006,
                    2124105,
                    2124105
                ],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-21729",
                                "url": "https://ubuntu.com/security/CVE-2025-21729",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion  The rtwdev->scanning flag isn't protected by mutex originally, so cancel_hw_scan can pass the condition, but suddenly hw_scan completion unset the flag and calls ieee80211_scan_completed() that will free local->hw_scan_req. Then, cancel_hw_scan raises null-ptr-deref and use-after-free. Fix it by moving the check condition to where protected by mutex.   KASAN: null-ptr-deref in range [0x0000000000000088-0x000000000000008f]  CPU: 2 PID: 6922 Comm: kworker/2:2 Tainted: G           OE  Hardware name: LENOVO 2356AD1/2356AD1, BIOS G7ETB6WW (2.76 ) 09/10/2019  Workqueue: events cfg80211_conn_work [cfg80211]  RIP: 0010:rtw89_fw_h2c_scan_offload_be+0xc33/0x13c3 [rtw89_core]  Code: 00 45 89 6c 24 1c 0f 85 23 01 00 00 48 8b 85 20 ff ff ff 48 8d  RSP: 0018:ffff88811fd9f068 EFLAGS: 00010206  RAX: dffffc0000000000 RBX: ffff88811fd9f258 RCX: 0000000000000001  RDX: 0000000000000011 RSI: 0000000000000001 RDI: 0000000000000089  RBP: ffff88811fd9f170 R08: 0000000000000000 R09: 0000000000000000  R10: ffff88811fd9f108 R11: 0000000000000000 R12: ffff88810e47f960  R13: 0000000000000000 R14: 000000000000ffff R15: 0000000000000000  FS:  0000000000000000(0000) GS:ffff8881d6f00000(0000) knlGS:0000000000000000  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033  CR2: 00007531dfca55b0 CR3: 00000001be296004 CR4: 00000000001706e0  Call Trace:   <TASK>   ? show_regs+0x61/0x73   ? __die_body+0x20/0x73   ? die_addr+0x4f/0x7b   ? exc_general_protection+0x191/0x1db   ? asm_exc_general_protection+0x27/0x30   ? rtw89_fw_h2c_scan_offload_be+0xc33/0x13c3 [rtw89_core]   ? rtw89_fw_h2c_scan_offload_be+0x458/0x13c3 [rtw89_core]   ? __pfx_rtw89_fw_h2c_scan_offload_be+0x10/0x10 [rtw89_core]   ? do_raw_spin_lock+0x75/0xdb   ? __pfx_do_raw_spin_lock+0x10/0x10   rtw89_hw_scan_offload+0xb5e/0xbf7 [rtw89_core]   ? _raw_spin_unlock+0xe/0x24   ? __mutex_lock.constprop.0+0x40c/0x471   ? __pfx_rtw89_hw_scan_offload+0x10/0x10 [rtw89_core]   ? __mutex_lock_slowpath+0x13/0x1f   ? mutex_lock+0xa2/0xdc   ? __pfx_mutex_lock+0x10/0x10   rtw89_hw_scan_abort+0x58/0xb7 [rtw89_core]   rtw89_ops_cancel_hw_scan+0x120/0x13b [rtw89_core]   ieee80211_scan_cancel+0x468/0x4d0 [mac80211]   ieee80211_prep_connection+0x858/0x899 [mac80211]   ieee80211_mgd_auth+0xbea/0xdde [mac80211]   ? __pfx_ieee80211_mgd_auth+0x10/0x10 [mac80211]   ? cfg80211_find_elem+0x15/0x29 [cfg80211]   ? is_bss+0x1b7/0x1d7 [cfg80211]   ieee80211_auth+0x18/0x27 [mac80211]   cfg80211_mlme_auth+0x3bb/0x3e7 [cfg80211]   cfg80211_conn_do_work+0x410/0xb81 [cfg80211]   ? __pfx_cfg80211_conn_do_work+0x10/0x10 [cfg80211]   ? __kasan_check_read+0x11/0x1f   ? psi_group_change+0x8bc/0x944   ? __kasan_check_write+0x14/0x22   ? mutex_lock+0x8e/0xdc   ? __pfx_mutex_lock+0x10/0x10   ? __pfx___radix_tree_lookup+0x10/0x10   cfg80211_conn_work+0x245/0x34d [cfg80211]   ? __pfx_cfg80211_conn_work+0x10/0x10 [cfg80211]   ? update_cfs_rq_load_avg+0x3bc/0x3d7   ? sched_clock_noinstr+0x9/0x1a   ? sched_clock+0x10/0x24   ? sched_clock_cpu+0x7e/0x42e   ? newidle_balance+0x796/0x937   ? __pfx_sched_clock_cpu+0x10/0x10   ? __pfx_newidle_balance+0x10/0x10   ? __kasan_check_read+0x11/0x1f   ? psi_group_change+0x8bc/0x944   ? _raw_spin_unlock+0xe/0x24   ? raw_spin_rq_unlock+0x47/0x54   ? raw_spin_rq_unlock_irq+0x9/0x1f   ? finish_task_switch.isra.0+0x347/0x586   ? __schedule+0x27bf/0x2892   ? mutex_unlock+0x80/0xd0   ? do_raw_spin_lock+0x75/0xdb   ? __pfx___schedule+0x10/0x10   process_scheduled_works+0x58c/0x821   worker_thread+0x4c7/0x586   ? __kasan_check_read+0x11/0x1f   kthread+0x285/0x294   ? __pfx_worker_thread+0x10/0x10   ? __pfx_kthread+0x10/0x10   ret_from_fork+0x29/0x6f   ? __pfx_kthread+0x10/0x10   ret_from_fork_asm+0x1b/0x30   </TASK>",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-02-27 02:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38227",
                                "url": "https://ubuntu.com/security/CVE-2025-38227",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  media: vidtv: Terminating the subsequent process of initialization failure  syzbot reported a slab-use-after-free Read in vidtv_mux_init. [1]  After PSI initialization fails, the si member is accessed again, resulting in this uaf.  After si initialization fails, the subsequent process needs to be exited.  [1] BUG: KASAN: slab-use-after-free in vidtv_mux_pid_ctx_init drivers/media/test-drivers/vidtv/vidtv_mux.c:78 [inline] BUG: KASAN: slab-use-after-free in vidtv_mux_init+0xac2/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:524 Read of size 8 at addr ffff88802fa42acc by task syz.2.37/6059  CPU: 0 UID: 0 PID: 6059 Comm: syz.2.37 Not tainted 6.14.0-rc5-syzkaller #0 Hardware name: Google Compute Engine, BIOS Google 02/12/2025 Call Trace: <TASK> __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:408 [inline] print_report+0xc3/0x670 mm/kasan/report.c:521 kasan_report+0xd9/0x110 mm/kasan/report.c:634 vidtv_mux_pid_ctx_init drivers/media/test-drivers/vidtv/vidtv_mux.c:78 vidtv_mux_init+0xac2/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:524 vidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194 vidtv_start_feed drivers/media/test-drivers/vidtv/vidtv_bridge.c:239 dmx_section_feed_start_filtering drivers/media/dvb-core/dvb_demux.c:973 dvb_dmxdev_feed_start drivers/media/dvb-core/dmxdev.c:508 [inline] dvb_dmxdev_feed_restart.isra.0 drivers/media/dvb-core/dmxdev.c:537 dvb_dmxdev_filter_stop+0x2b4/0x3a0 drivers/media/dvb-core/dmxdev.c:564 dvb_dmxdev_filter_free drivers/media/dvb-core/dmxdev.c:840 [inline] dvb_demux_release+0x92/0x550 drivers/media/dvb-core/dmxdev.c:1246 __fput+0x3ff/0xb70 fs/file_table.c:464 task_work_run+0x14e/0x250 kernel/task_work.c:227 exit_task_work include/linux/task_work.h:40 [inline] do_exit+0xad8/0x2d70 kernel/exit.c:938 do_group_exit+0xd3/0x2a0 kernel/exit.c:1087 __do_sys_exit_group kernel/exit.c:1098 [inline] __se_sys_exit_group kernel/exit.c:1096 [inline] __x64_sys_exit_group+0x3e/0x50 kernel/exit.c:1096 x64_sys_call+0x151f/0x1720 arch/x86/include/generated/asm/syscalls_64.h:232 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f871d58d169 Code: Unable to access opcode bytes at 0x7f871d58d13f. RSP: 002b:00007fff4b19a788 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f871d58d169 RDX: 0000000000000064 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 00007fff4b19a7ec R08: 0000000b4b19a87f R09: 00000000000927c0 R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000003 R13: 00000000000927c0 R14: 000000000001d553 R15: 00007fff4b19a840  </TASK>  Allocated by task 6059:  kasan_save_stack+0x33/0x60 mm/kasan/common.c:47  kasan_save_track+0x14/0x30 mm/kasan/common.c:68  poison_kmalloc_redzone mm/kasan/common.c:377 [inline]  __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:394  kmalloc_noprof include/linux/slab.h:901 [inline]  kzalloc_noprof include/linux/slab.h:1037 [inline]  vidtv_psi_pat_table_init drivers/media/test-drivers/vidtv/vidtv_psi.c:970  vidtv_channel_si_init drivers/media/test-drivers/vidtv/vidtv_channel.c:423  vidtv_mux_init drivers/media/test-drivers/vidtv/vidtv_mux.c:519  vidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194  vidtv_start_feed drivers/media/test-drivers/vidtv/vidtv_bridge.c:239  dmx_section_feed_start_filtering drivers/media/dvb-core/dvb_demux.c:973  dvb_dmxdev_feed_start drivers/media/dvb-core/dmxdev.c:508 [inline]  dvb_dmxdev_feed_restart.isra.0 drivers/media/dvb-core/dmxdev.c:537  dvb_dmxdev_filter_stop+0x2b4/0x3a0 drivers/media/dvb-core/dmxdev.c:564  dvb_dmxdev_filter_free drivers/media/dvb-core/dmxdev.c:840 [inline]  dvb_demux_release+0x92/0x550 drivers/media/dvb-core/dmxdev.c:1246  __fput+0x3ff/0xb70 fs/file_tabl ---truncated---",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-07-04 14:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38678",
                                "url": "https://ubuntu.com/security/CVE-2025-38678",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  netfilter: nf_tables: reject duplicate device on updates  A chain/flowtable update with duplicated devices in the same batch is possible. Unfortunately, netdev event path only removes the first device that is found, leaving unregistered the hook of the duplicated device.  Check if a duplicated device exists in the transaction batch, bail out with EEXIST in such case.  WARNING is hit when unregistering the hook:   [49042.221275] WARNING: CPU: 4 PID: 8425 at net/netfilter/core.c:340 nf_hook_entry_head+0xaa/0x150  [49042.221375] CPU: 4 UID: 0 PID: 8425 Comm: nft Tainted: G S                 6.16.0+ #170 PREEMPT(full)  [...]  [49042.221382] RIP: 0010:nf_hook_entry_head+0xaa/0x150",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-09-03 13:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38616",
                                "url": "https://ubuntu.com/security/CVE-2025-38616",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  tls: handle data disappearing from under the TLS ULP  TLS expects that it owns the receive queue of the TCP socket. This cannot be guaranteed in case the reader of the TCP socket entered before the TLS ULP was installed, or uses some non-standard read API (eg. zerocopy ones). Replace the WARN_ON() and a buggy early exit (which leaves anchor pointing to a freed skb) with real error handling. Wipe the parsing state and tell the reader to retry.  We already reload the anchor every time we (re)acquire the socket lock, so the only condition we need to avoid is an out of bounds read (not having enough bytes in the socket for previously parsed record len).  If some data was read from under TLS but there's enough in the queue we'll reload and decrypt what is most likely not a valid TLS record. Leading to some undefined behavior from TLS perspective (corrupting a stream? missing an alert? missing an attack?) but no kernel crash should take place.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-08-22 14:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-37838",
                                "url": "https://ubuntu.com/security/CVE-2025-37838",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  HSI: ssi_protocol: Fix use after free vulnerability in ssi_protocol Driver Due to Race Condition  In the ssi_protocol_probe() function, &ssi->work is bound with ssip_xmit_work(), In ssip_pn_setup(), the ssip_pn_xmit() function within the ssip_pn_ops structure is capable of starting the work.  If we remove the module which will call ssi_protocol_remove() to make a cleanup, it will free ssi through kfree(ssi), while the work mentioned above will be used. The sequence of operations that may lead to a UAF bug is as follows:  CPU0                                    CPU1                          | ssip_xmit_work ssi_protocol_remove     | kfree(ssi);             |                         | struct hsi_client *cl = ssi->cl;                         | // use ssi  Fix it by ensuring that the work is canceled before proceeding with the cleanup in ssi_protocol_remove().",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-04-18 15:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-40300",
                                "url": "https://ubuntu.com/security/CVE-2025-40300",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  x86/vmscape: Add conditional IBPB mitigation  VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace hypervisor (like QEMU). Existing mitigations already protect kernel/KVM from a malicious guest. Userspace can additionally be protected by flushing the branch predictors after a VMexit.  Since it is the userspace that consumes the poisoned branch predictors, conditionally issue an IBPB after a VMexit and before returning to userspace. Workloads that frequently switch between hypervisor and userspace will incur the most overhead from the new IBPB.  This new IBPB is not integrated with the existing IBPB sites. For instance, a task can use the existing speculation control prctl() to get an IBPB at context switch time. With this implementation, the IBPB is doubled up: one at context switch and another before running userspace.  The intent is to integrate and optimize these cases post-embargo.  [ dhansen: elaborate on suboptimal IBPB solution ]",
                                "cve_priority": "high",
                                "cve_public_date": "2025-09-11 17:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38352",
                                "url": "https://ubuntu.com/security/CVE-2025-38352",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del()  If an exiting non-autoreaping task has already passed exit_notify() and calls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent or debugger right after unlock_task_sighand().  If a concurrent posix_cpu_timer_del() runs at that moment, it won't be able to detect timer->it.cpu.firing != 0: cpu_timer_task_rcu() and/or lock_task_sighand() will fail.  Add the tsk->exit_state check into run_posix_cpu_timers() to fix this.  This fix is not needed if CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y, because exit_task_work() is called before exit_notify(). But the check still makes sense, task_work_add(&tsk->posix_cputimers_work.work) will fail anyway in this case.",
                                "cve_priority": "high",
                                "cve_public_date": "2025-07-22 08:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38118",
                                "url": "https://ubuntu.com/security/CVE-2025-38118",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  Bluetooth: MGMT: Fix UAF on mgmt_remove_adv_monitor_complete  This reworks MGMT_OP_REMOVE_ADV_MONITOR to not use mgmt_pending_add to avoid crashes like bellow:  ================================================================== BUG: KASAN: slab-use-after-free in mgmt_remove_adv_monitor_complete+0xe5/0x540 net/bluetooth/mgmt.c:5406 Read of size 8 at addr ffff88801c53f318 by task kworker/u5:5/5341  CPU: 0 UID: 0 PID: 5341 Comm: kworker/u5:5 Not tainted 6.15.0-syzkaller-10402-g4cb6c8af8591 #0 PREEMPT(full) Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014 Workqueue: hci0 hci_cmd_sync_work Call Trace:  <TASK>  dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120  print_address_description mm/kasan/report.c:408 [inline]  print_report+0xd2/0x2b0 mm/kasan/report.c:521  kasan_report+0x118/0x150 mm/kasan/report.c:634  mgmt_remove_adv_monitor_complete+0xe5/0x540 net/bluetooth/mgmt.c:5406  hci_cmd_sync_work+0x261/0x3a0 net/bluetooth/hci_sync.c:334  process_one_work kernel/workqueue.c:3238 [inline]  process_scheduled_works+0xade/0x17b0 kernel/workqueue.c:3321  worker_thread+0x8a0/0xda0 kernel/workqueue.c:3402  kthread+0x711/0x8a0 kernel/kthread.c:464  ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245  </TASK>  Allocated by task 5987:  kasan_save_stack mm/kasan/common.c:47 [inline]  kasan_save_track+0x3e/0x80 mm/kasan/common.c:68  poison_kmalloc_redzone mm/kasan/common.c:377 [inline]  __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:394  kasan_kmalloc include/linux/kasan.h:260 [inline]  __kmalloc_cache_noprof+0x230/0x3d0 mm/slub.c:4358  kmalloc_noprof include/linux/slab.h:905 [inline]  kzalloc_noprof include/linux/slab.h:1039 [inline]  mgmt_pending_new+0x65/0x240 net/bluetooth/mgmt_util.c:252  mgmt_pending_add+0x34/0x120 net/bluetooth/mgmt_util.c:279  remove_adv_monitor+0x103/0x1b0 net/bluetooth/mgmt.c:5454  hci_mgmt_cmd+0x9c9/0xef0 net/bluetooth/hci_sock.c:1719  hci_sock_sendmsg+0x6ca/0xef0 net/bluetooth/hci_sock.c:1839  sock_sendmsg_nosec net/socket.c:712 [inline]  __sock_sendmsg+0x219/0x270 net/socket.c:727  sock_write_iter+0x258/0x330 net/socket.c:1131  new_sync_write fs/read_write.c:593 [inline]  vfs_write+0x548/0xa90 fs/read_write.c:686  ksys_write+0x145/0x250 fs/read_write.c:738  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]  do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94  entry_SYSCALL_64_after_hwframe+0x77/0x7f  Freed by task 5989:  kasan_save_stack mm/kasan/common.c:47 [inline]  kasan_save_track+0x3e/0x80 mm/kasan/common.c:68  kasan_save_free_info+0x46/0x50 mm/kasan/generic.c:576  poison_slab_object mm/kasan/common.c:247 [inline]  __kasan_slab_free+0x62/0x70 mm/kasan/common.c:264  kasan_slab_free include/linux/kasan.h:233 [inline]  slab_free_hook mm/slub.c:2380 [inline]  slab_free mm/slub.c:4642 [inline]  kfree+0x18e/0x440 mm/slub.c:4841  mgmt_pending_foreach+0xc9/0x120 net/bluetooth/mgmt_util.c:242  mgmt_index_removed+0x10d/0x2f0 net/bluetooth/mgmt.c:9366  hci_sock_bind+0xbe9/0x1000 net/bluetooth/hci_sock.c:1314  __sys_bind_socket net/socket.c:1810 [inline]  __sys_bind+0x2c3/0x3e0 net/socket.c:1841  __do_sys_bind net/socket.c:1846 [inline]  __se_sys_bind net/socket.c:1844 [inline]  __x64_sys_bind+0x7a/0x90 net/socket.c:1844  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]  do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94  entry_SYSCALL_64_after_hwframe+0x77/0x7f",
                                "cve_priority": "high",
                                "cve_public_date": "2025-07-03 09:15:00 UTC"
                            }
                        ],
                        "log": [
                            "",
                            "  * noble/linux: 6.8.0-88.89 -proposed tracker (LP: #2127619)",
                            "",
                            "  *  Enable Xilinx PS UART configs (LP: #2121337)",
                            "    - [Config] Enable Xilinx PS UART configs",
                            "",
                            "  * Fix ARL-U/H suspend issues (LP: #2112469)",
                            "    - platform/x86/intel/pmc: Add Arrow Lake U/H support to intel_pmc_core",
                            "      driver",
                            "    - platform/x86/intel/pmc: Fix Arrow Lake U/H NPU PCI ID",
                            "",
                            "  * r8169 can not wake on LAN via SFP moudule (LP: #2123901)",
                            "    - r8169: set EEE speed down ratio to 1",
                            "",
                            "  * Add pvpanic kernel modules to linux-modules (LP: #2126659)",
                            "    - [Packaging] Add pvpanic kernel modules to linux-modules",
                            "",
                            "  * CVE-2025-21729",
                            "    - wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion",
                            "",
                            "  * Fix failure to build TDX module (LP: #2126698)",
                            "    - x86/paravirt: Move halt paravirt calls under CONFIG_PARAVIRT",
                            "",
                            "  * Ubuntu 24.04.2: error in audit_log_object_context keep printing in the",
                            "    kernel and console (LP: #2123815)",
                            "    - SAUCE: fix: apparmor4.0.0 [26/90]: LSM stacking v39: Audit: Add record",
                            "      for multiple object contexts",
                            "",
                            "  * ensure mptcp keepalives are honored when set (LP: #2125444)",
                            "    - mptcp: sockopt: make sync_socket_options propagate SOCK_KEEPOPEN",
                            "",
                            "  * System hangs when running the memory stress test (LP: #2103680)",
                            "    - mm: page_alloc: avoid kswapd thrashing due to NUMA restrictions",
                            "",
                            "  * UBUNTU: fan: fail to check kmalloc() return could cause a NULL pointer",
                            "    dereference (LP: #2125053)",
                            "    - SAUCE: fan: vxlan: check memory allocation for map",
                            "",
                            "  * jammy:linux-riscv-6.8 is FTBFS because of wrong include (LP: #2122592)",
                            "    - SAUCE: riscv: KVM: Remove broken include",
                            "",
                            "  * Performance degrades rapidly when spawning more processes to run benchmark",
                            "    (LP: #2122006)",
                            "    - cpuidle: menu: Avoid discarding useful information",
                            "    - cpuidle: governors: menu: Avoid using invalid recent intervals data",
                            "",
                            "  * CVE-2025-38227",
                            "    - media: vidtv: Terminating the subsequent process of initialization",
                            "      failure",
                            "",
                            "  * CVE-2025-38678",
                            "    - netfilter: nf_tables: reject duplicate device on updates",
                            "",
                            "  * CVE-2025-38616",
                            "    - tls: handle data disappearing from under the TLS ULP",
                            "",
                            "  * CVE-2025-37838",
                            "    - HSI: ssi_protocol: Fix use after free vulnerability in ssi_protocol",
                            "      Driver Due to Race Condition",
                            "",
                            "  * VMSCAPE CVE-2025-40300 (LP: #2124105) // CVE-2025-40300",
                            "    - Documentation/hw-vuln: Add VMSCAPE documentation",
                            "    - x86/vmscape: Enumerate VMSCAPE bug",
                            "    - x86/vmscape: Add conditional IBPB mitigation",
                            "    - x86/vmscape: Enable the mitigation",
                            "    - x86/bugs: Move cpu_bugs_smt_update() down",
                            "    - x86/vmscape: Warn when STIBP is disabled with SMT",
                            "    - x86/vmscape: Add old Intel CPUs to affected list",
                            "",
                            "  * VMSCAPE CVE-2025-40300 (LP: #2124105)",
                            "    - [Config] Enable MITIGATION_VMSCAPE config",
                            "",
                            "  * CVE-2025-38352",
                            "    - posix-cpu-timers: fix race between handle_posix_cpu_timers() and",
                            "      posix_cpu_timer_del()",
                            "",
                            "  * CVE-2025-38118",
                            "    - Bluetooth: MGMT: Fix UAF on mgmt_remove_adv_monitor_complete",
                            "    - Bluetooth: MGMT: Fix sparse errors",
                            ""
                        ],
                        "package": "linux",
                        "version": "6.8.0-88.89",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2127619,
                            2121337,
                            2112469,
                            2123901,
                            2126659,
                            2126698,
                            2123815,
                            2125444,
                            2103680,
                            2125053,
                            2122592,
                            2122006,
                            2124105,
                            2124105
                        ],
                        "author": "Edoardo Canepa <edoardo.canepa@canonical.com>",
                        "date": "Sat, 11 Oct 2025 01:38:46 +0200"
                    }
                ],
                "notes": "linux-headers-6.8.0-88 version '6.8.0-88.89' (source package linux version '6.8.0-88.89') was added. linux-headers-6.8.0-88 version '6.8.0-88.89' has the same source package name, linux, as removed package linux-headers-6.8.0-87. As such we can use the source package version of the removed package, '6.8.0-87.88', as the starting point in our changelog diff. Kernel packages are an example of where the binary package name changes for the same source package. Using the removed package source package version as our starting point means we can still get meaningful changelog diffs even for what appears to be a new package.",
                "is_version_downgrade": false
            },
            {
                "name": "linux-headers-6.8.0-88-generic",
                "from_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.8.0-87.88",
                    "version": null
                },
                "to_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.8.0-88.89",
                    "version": "6.8.0-88.89"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-21729",
                        "url": "https://ubuntu.com/security/CVE-2025-21729",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion  The rtwdev->scanning flag isn't protected by mutex originally, so cancel_hw_scan can pass the condition, but suddenly hw_scan completion unset the flag and calls ieee80211_scan_completed() that will free local->hw_scan_req. Then, cancel_hw_scan raises null-ptr-deref and use-after-free. Fix it by moving the check condition to where protected by mutex.   KASAN: null-ptr-deref in range [0x0000000000000088-0x000000000000008f]  CPU: 2 PID: 6922 Comm: kworker/2:2 Tainted: G           OE  Hardware name: LENOVO 2356AD1/2356AD1, BIOS G7ETB6WW (2.76 ) 09/10/2019  Workqueue: events cfg80211_conn_work [cfg80211]  RIP: 0010:rtw89_fw_h2c_scan_offload_be+0xc33/0x13c3 [rtw89_core]  Code: 00 45 89 6c 24 1c 0f 85 23 01 00 00 48 8b 85 20 ff ff ff 48 8d  RSP: 0018:ffff88811fd9f068 EFLAGS: 00010206  RAX: dffffc0000000000 RBX: ffff88811fd9f258 RCX: 0000000000000001  RDX: 0000000000000011 RSI: 0000000000000001 RDI: 0000000000000089  RBP: ffff88811fd9f170 R08: 0000000000000000 R09: 0000000000000000  R10: ffff88811fd9f108 R11: 0000000000000000 R12: ffff88810e47f960  R13: 0000000000000000 R14: 000000000000ffff R15: 0000000000000000  FS:  0000000000000000(0000) GS:ffff8881d6f00000(0000) knlGS:0000000000000000  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033  CR2: 00007531dfca55b0 CR3: 00000001be296004 CR4: 00000000001706e0  Call Trace:   <TASK>   ? show_regs+0x61/0x73   ? __die_body+0x20/0x73   ? die_addr+0x4f/0x7b   ? exc_general_protection+0x191/0x1db   ? asm_exc_general_protection+0x27/0x30   ? rtw89_fw_h2c_scan_offload_be+0xc33/0x13c3 [rtw89_core]   ? rtw89_fw_h2c_scan_offload_be+0x458/0x13c3 [rtw89_core]   ? __pfx_rtw89_fw_h2c_scan_offload_be+0x10/0x10 [rtw89_core]   ? do_raw_spin_lock+0x75/0xdb   ? __pfx_do_raw_spin_lock+0x10/0x10   rtw89_hw_scan_offload+0xb5e/0xbf7 [rtw89_core]   ? _raw_spin_unlock+0xe/0x24   ? __mutex_lock.constprop.0+0x40c/0x471   ? __pfx_rtw89_hw_scan_offload+0x10/0x10 [rtw89_core]   ? __mutex_lock_slowpath+0x13/0x1f   ? mutex_lock+0xa2/0xdc   ? __pfx_mutex_lock+0x10/0x10   rtw89_hw_scan_abort+0x58/0xb7 [rtw89_core]   rtw89_ops_cancel_hw_scan+0x120/0x13b [rtw89_core]   ieee80211_scan_cancel+0x468/0x4d0 [mac80211]   ieee80211_prep_connection+0x858/0x899 [mac80211]   ieee80211_mgd_auth+0xbea/0xdde [mac80211]   ? __pfx_ieee80211_mgd_auth+0x10/0x10 [mac80211]   ? cfg80211_find_elem+0x15/0x29 [cfg80211]   ? is_bss+0x1b7/0x1d7 [cfg80211]   ieee80211_auth+0x18/0x27 [mac80211]   cfg80211_mlme_auth+0x3bb/0x3e7 [cfg80211]   cfg80211_conn_do_work+0x410/0xb81 [cfg80211]   ? __pfx_cfg80211_conn_do_work+0x10/0x10 [cfg80211]   ? __kasan_check_read+0x11/0x1f   ? psi_group_change+0x8bc/0x944   ? __kasan_check_write+0x14/0x22   ? mutex_lock+0x8e/0xdc   ? __pfx_mutex_lock+0x10/0x10   ? __pfx___radix_tree_lookup+0x10/0x10   cfg80211_conn_work+0x245/0x34d [cfg80211]   ? __pfx_cfg80211_conn_work+0x10/0x10 [cfg80211]   ? update_cfs_rq_load_avg+0x3bc/0x3d7   ? sched_clock_noinstr+0x9/0x1a   ? sched_clock+0x10/0x24   ? sched_clock_cpu+0x7e/0x42e   ? newidle_balance+0x796/0x937   ? __pfx_sched_clock_cpu+0x10/0x10   ? __pfx_newidle_balance+0x10/0x10   ? __kasan_check_read+0x11/0x1f   ? psi_group_change+0x8bc/0x944   ? _raw_spin_unlock+0xe/0x24   ? raw_spin_rq_unlock+0x47/0x54   ? raw_spin_rq_unlock_irq+0x9/0x1f   ? finish_task_switch.isra.0+0x347/0x586   ? __schedule+0x27bf/0x2892   ? mutex_unlock+0x80/0xd0   ? do_raw_spin_lock+0x75/0xdb   ? __pfx___schedule+0x10/0x10   process_scheduled_works+0x58c/0x821   worker_thread+0x4c7/0x586   ? __kasan_check_read+0x11/0x1f   kthread+0x285/0x294   ? __pfx_worker_thread+0x10/0x10   ? __pfx_kthread+0x10/0x10   ret_from_fork+0x29/0x6f   ? __pfx_kthread+0x10/0x10   ret_from_fork_asm+0x1b/0x30   </TASK>",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-02-27 02:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38227",
                        "url": "https://ubuntu.com/security/CVE-2025-38227",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  media: vidtv: Terminating the subsequent process of initialization failure  syzbot reported a slab-use-after-free Read in vidtv_mux_init. [1]  After PSI initialization fails, the si member is accessed again, resulting in this uaf.  After si initialization fails, the subsequent process needs to be exited.  [1] BUG: KASAN: slab-use-after-free in vidtv_mux_pid_ctx_init drivers/media/test-drivers/vidtv/vidtv_mux.c:78 [inline] BUG: KASAN: slab-use-after-free in vidtv_mux_init+0xac2/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:524 Read of size 8 at addr ffff88802fa42acc by task syz.2.37/6059  CPU: 0 UID: 0 PID: 6059 Comm: syz.2.37 Not tainted 6.14.0-rc5-syzkaller #0 Hardware name: Google Compute Engine, BIOS Google 02/12/2025 Call Trace: <TASK> __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:408 [inline] print_report+0xc3/0x670 mm/kasan/report.c:521 kasan_report+0xd9/0x110 mm/kasan/report.c:634 vidtv_mux_pid_ctx_init drivers/media/test-drivers/vidtv/vidtv_mux.c:78 vidtv_mux_init+0xac2/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:524 vidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194 vidtv_start_feed drivers/media/test-drivers/vidtv/vidtv_bridge.c:239 dmx_section_feed_start_filtering drivers/media/dvb-core/dvb_demux.c:973 dvb_dmxdev_feed_start drivers/media/dvb-core/dmxdev.c:508 [inline] dvb_dmxdev_feed_restart.isra.0 drivers/media/dvb-core/dmxdev.c:537 dvb_dmxdev_filter_stop+0x2b4/0x3a0 drivers/media/dvb-core/dmxdev.c:564 dvb_dmxdev_filter_free drivers/media/dvb-core/dmxdev.c:840 [inline] dvb_demux_release+0x92/0x550 drivers/media/dvb-core/dmxdev.c:1246 __fput+0x3ff/0xb70 fs/file_table.c:464 task_work_run+0x14e/0x250 kernel/task_work.c:227 exit_task_work include/linux/task_work.h:40 [inline] do_exit+0xad8/0x2d70 kernel/exit.c:938 do_group_exit+0xd3/0x2a0 kernel/exit.c:1087 __do_sys_exit_group kernel/exit.c:1098 [inline] __se_sys_exit_group kernel/exit.c:1096 [inline] __x64_sys_exit_group+0x3e/0x50 kernel/exit.c:1096 x64_sys_call+0x151f/0x1720 arch/x86/include/generated/asm/syscalls_64.h:232 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f871d58d169 Code: Unable to access opcode bytes at 0x7f871d58d13f. RSP: 002b:00007fff4b19a788 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f871d58d169 RDX: 0000000000000064 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 00007fff4b19a7ec R08: 0000000b4b19a87f R09: 00000000000927c0 R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000003 R13: 00000000000927c0 R14: 000000000001d553 R15: 00007fff4b19a840  </TASK>  Allocated by task 6059:  kasan_save_stack+0x33/0x60 mm/kasan/common.c:47  kasan_save_track+0x14/0x30 mm/kasan/common.c:68  poison_kmalloc_redzone mm/kasan/common.c:377 [inline]  __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:394  kmalloc_noprof include/linux/slab.h:901 [inline]  kzalloc_noprof include/linux/slab.h:1037 [inline]  vidtv_psi_pat_table_init drivers/media/test-drivers/vidtv/vidtv_psi.c:970  vidtv_channel_si_init drivers/media/test-drivers/vidtv/vidtv_channel.c:423  vidtv_mux_init drivers/media/test-drivers/vidtv/vidtv_mux.c:519  vidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194  vidtv_start_feed drivers/media/test-drivers/vidtv/vidtv_bridge.c:239  dmx_section_feed_start_filtering drivers/media/dvb-core/dvb_demux.c:973  dvb_dmxdev_feed_start drivers/media/dvb-core/dmxdev.c:508 [inline]  dvb_dmxdev_feed_restart.isra.0 drivers/media/dvb-core/dmxdev.c:537  dvb_dmxdev_filter_stop+0x2b4/0x3a0 drivers/media/dvb-core/dmxdev.c:564  dvb_dmxdev_filter_free drivers/media/dvb-core/dmxdev.c:840 [inline]  dvb_demux_release+0x92/0x550 drivers/media/dvb-core/dmxdev.c:1246  __fput+0x3ff/0xb70 fs/file_tabl ---truncated---",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-07-04 14:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38678",
                        "url": "https://ubuntu.com/security/CVE-2025-38678",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  netfilter: nf_tables: reject duplicate device on updates  A chain/flowtable update with duplicated devices in the same batch is possible. Unfortunately, netdev event path only removes the first device that is found, leaving unregistered the hook of the duplicated device.  Check if a duplicated device exists in the transaction batch, bail out with EEXIST in such case.  WARNING is hit when unregistering the hook:   [49042.221275] WARNING: CPU: 4 PID: 8425 at net/netfilter/core.c:340 nf_hook_entry_head+0xaa/0x150  [49042.221375] CPU: 4 UID: 0 PID: 8425 Comm: nft Tainted: G S                 6.16.0+ #170 PREEMPT(full)  [...]  [49042.221382] RIP: 0010:nf_hook_entry_head+0xaa/0x150",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-09-03 13:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38616",
                        "url": "https://ubuntu.com/security/CVE-2025-38616",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  tls: handle data disappearing from under the TLS ULP  TLS expects that it owns the receive queue of the TCP socket. This cannot be guaranteed in case the reader of the TCP socket entered before the TLS ULP was installed, or uses some non-standard read API (eg. zerocopy ones). Replace the WARN_ON() and a buggy early exit (which leaves anchor pointing to a freed skb) with real error handling. Wipe the parsing state and tell the reader to retry.  We already reload the anchor every time we (re)acquire the socket lock, so the only condition we need to avoid is an out of bounds read (not having enough bytes in the socket for previously parsed record len).  If some data was read from under TLS but there's enough in the queue we'll reload and decrypt what is most likely not a valid TLS record. Leading to some undefined behavior from TLS perspective (corrupting a stream? missing an alert? missing an attack?) but no kernel crash should take place.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-08-22 14:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-37838",
                        "url": "https://ubuntu.com/security/CVE-2025-37838",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  HSI: ssi_protocol: Fix use after free vulnerability in ssi_protocol Driver Due to Race Condition  In the ssi_protocol_probe() function, &ssi->work is bound with ssip_xmit_work(), In ssip_pn_setup(), the ssip_pn_xmit() function within the ssip_pn_ops structure is capable of starting the work.  If we remove the module which will call ssi_protocol_remove() to make a cleanup, it will free ssi through kfree(ssi), while the work mentioned above will be used. The sequence of operations that may lead to a UAF bug is as follows:  CPU0                                    CPU1                          | ssip_xmit_work ssi_protocol_remove     | kfree(ssi);             |                         | struct hsi_client *cl = ssi->cl;                         | // use ssi  Fix it by ensuring that the work is canceled before proceeding with the cleanup in ssi_protocol_remove().",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-04-18 15:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-40300",
                        "url": "https://ubuntu.com/security/CVE-2025-40300",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  x86/vmscape: Add conditional IBPB mitigation  VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace hypervisor (like QEMU). Existing mitigations already protect kernel/KVM from a malicious guest. Userspace can additionally be protected by flushing the branch predictors after a VMexit.  Since it is the userspace that consumes the poisoned branch predictors, conditionally issue an IBPB after a VMexit and before returning to userspace. Workloads that frequently switch between hypervisor and userspace will incur the most overhead from the new IBPB.  This new IBPB is not integrated with the existing IBPB sites. For instance, a task can use the existing speculation control prctl() to get an IBPB at context switch time. With this implementation, the IBPB is doubled up: one at context switch and another before running userspace.  The intent is to integrate and optimize these cases post-embargo.  [ dhansen: elaborate on suboptimal IBPB solution ]",
                        "cve_priority": "high",
                        "cve_public_date": "2025-09-11 17:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38352",
                        "url": "https://ubuntu.com/security/CVE-2025-38352",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del()  If an exiting non-autoreaping task has already passed exit_notify() and calls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent or debugger right after unlock_task_sighand().  If a concurrent posix_cpu_timer_del() runs at that moment, it won't be able to detect timer->it.cpu.firing != 0: cpu_timer_task_rcu() and/or lock_task_sighand() will fail.  Add the tsk->exit_state check into run_posix_cpu_timers() to fix this.  This fix is not needed if CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y, because exit_task_work() is called before exit_notify(). But the check still makes sense, task_work_add(&tsk->posix_cputimers_work.work) will fail anyway in this case.",
                        "cve_priority": "high",
                        "cve_public_date": "2025-07-22 08:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38118",
                        "url": "https://ubuntu.com/security/CVE-2025-38118",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  Bluetooth: MGMT: Fix UAF on mgmt_remove_adv_monitor_complete  This reworks MGMT_OP_REMOVE_ADV_MONITOR to not use mgmt_pending_add to avoid crashes like bellow:  ================================================================== BUG: KASAN: slab-use-after-free in mgmt_remove_adv_monitor_complete+0xe5/0x540 net/bluetooth/mgmt.c:5406 Read of size 8 at addr ffff88801c53f318 by task kworker/u5:5/5341  CPU: 0 UID: 0 PID: 5341 Comm: kworker/u5:5 Not tainted 6.15.0-syzkaller-10402-g4cb6c8af8591 #0 PREEMPT(full) Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014 Workqueue: hci0 hci_cmd_sync_work Call Trace:  <TASK>  dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120  print_address_description mm/kasan/report.c:408 [inline]  print_report+0xd2/0x2b0 mm/kasan/report.c:521  kasan_report+0x118/0x150 mm/kasan/report.c:634  mgmt_remove_adv_monitor_complete+0xe5/0x540 net/bluetooth/mgmt.c:5406  hci_cmd_sync_work+0x261/0x3a0 net/bluetooth/hci_sync.c:334  process_one_work kernel/workqueue.c:3238 [inline]  process_scheduled_works+0xade/0x17b0 kernel/workqueue.c:3321  worker_thread+0x8a0/0xda0 kernel/workqueue.c:3402  kthread+0x711/0x8a0 kernel/kthread.c:464  ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245  </TASK>  Allocated by task 5987:  kasan_save_stack mm/kasan/common.c:47 [inline]  kasan_save_track+0x3e/0x80 mm/kasan/common.c:68  poison_kmalloc_redzone mm/kasan/common.c:377 [inline]  __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:394  kasan_kmalloc include/linux/kasan.h:260 [inline]  __kmalloc_cache_noprof+0x230/0x3d0 mm/slub.c:4358  kmalloc_noprof include/linux/slab.h:905 [inline]  kzalloc_noprof include/linux/slab.h:1039 [inline]  mgmt_pending_new+0x65/0x240 net/bluetooth/mgmt_util.c:252  mgmt_pending_add+0x34/0x120 net/bluetooth/mgmt_util.c:279  remove_adv_monitor+0x103/0x1b0 net/bluetooth/mgmt.c:5454  hci_mgmt_cmd+0x9c9/0xef0 net/bluetooth/hci_sock.c:1719  hci_sock_sendmsg+0x6ca/0xef0 net/bluetooth/hci_sock.c:1839  sock_sendmsg_nosec net/socket.c:712 [inline]  __sock_sendmsg+0x219/0x270 net/socket.c:727  sock_write_iter+0x258/0x330 net/socket.c:1131  new_sync_write fs/read_write.c:593 [inline]  vfs_write+0x548/0xa90 fs/read_write.c:686  ksys_write+0x145/0x250 fs/read_write.c:738  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]  do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94  entry_SYSCALL_64_after_hwframe+0x77/0x7f  Freed by task 5989:  kasan_save_stack mm/kasan/common.c:47 [inline]  kasan_save_track+0x3e/0x80 mm/kasan/common.c:68  kasan_save_free_info+0x46/0x50 mm/kasan/generic.c:576  poison_slab_object mm/kasan/common.c:247 [inline]  __kasan_slab_free+0x62/0x70 mm/kasan/common.c:264  kasan_slab_free include/linux/kasan.h:233 [inline]  slab_free_hook mm/slub.c:2380 [inline]  slab_free mm/slub.c:4642 [inline]  kfree+0x18e/0x440 mm/slub.c:4841  mgmt_pending_foreach+0xc9/0x120 net/bluetooth/mgmt_util.c:242  mgmt_index_removed+0x10d/0x2f0 net/bluetooth/mgmt.c:9366  hci_sock_bind+0xbe9/0x1000 net/bluetooth/hci_sock.c:1314  __sys_bind_socket net/socket.c:1810 [inline]  __sys_bind+0x2c3/0x3e0 net/socket.c:1841  __do_sys_bind net/socket.c:1846 [inline]  __se_sys_bind net/socket.c:1844 [inline]  __x64_sys_bind+0x7a/0x90 net/socket.c:1844  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]  do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94  entry_SYSCALL_64_after_hwframe+0x77/0x7f",
                        "cve_priority": "high",
                        "cve_public_date": "2025-07-03 09:15:00 UTC"
                    }
                ],
                "launchpad_bugs_fixed": [
                    2127619,
                    2121337,
                    2112469,
                    2123901,
                    2126659,
                    2126698,
                    2123815,
                    2125444,
                    2103680,
                    2125053,
                    2122592,
                    2122006,
                    2124105,
                    2124105
                ],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-21729",
                                "url": "https://ubuntu.com/security/CVE-2025-21729",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion  The rtwdev->scanning flag isn't protected by mutex originally, so cancel_hw_scan can pass the condition, but suddenly hw_scan completion unset the flag and calls ieee80211_scan_completed() that will free local->hw_scan_req. Then, cancel_hw_scan raises null-ptr-deref and use-after-free. Fix it by moving the check condition to where protected by mutex.   KASAN: null-ptr-deref in range [0x0000000000000088-0x000000000000008f]  CPU: 2 PID: 6922 Comm: kworker/2:2 Tainted: G           OE  Hardware name: LENOVO 2356AD1/2356AD1, BIOS G7ETB6WW (2.76 ) 09/10/2019  Workqueue: events cfg80211_conn_work [cfg80211]  RIP: 0010:rtw89_fw_h2c_scan_offload_be+0xc33/0x13c3 [rtw89_core]  Code: 00 45 89 6c 24 1c 0f 85 23 01 00 00 48 8b 85 20 ff ff ff 48 8d  RSP: 0018:ffff88811fd9f068 EFLAGS: 00010206  RAX: dffffc0000000000 RBX: ffff88811fd9f258 RCX: 0000000000000001  RDX: 0000000000000011 RSI: 0000000000000001 RDI: 0000000000000089  RBP: ffff88811fd9f170 R08: 0000000000000000 R09: 0000000000000000  R10: ffff88811fd9f108 R11: 0000000000000000 R12: ffff88810e47f960  R13: 0000000000000000 R14: 000000000000ffff R15: 0000000000000000  FS:  0000000000000000(0000) GS:ffff8881d6f00000(0000) knlGS:0000000000000000  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033  CR2: 00007531dfca55b0 CR3: 00000001be296004 CR4: 00000000001706e0  Call Trace:   <TASK>   ? show_regs+0x61/0x73   ? __die_body+0x20/0x73   ? die_addr+0x4f/0x7b   ? exc_general_protection+0x191/0x1db   ? asm_exc_general_protection+0x27/0x30   ? rtw89_fw_h2c_scan_offload_be+0xc33/0x13c3 [rtw89_core]   ? rtw89_fw_h2c_scan_offload_be+0x458/0x13c3 [rtw89_core]   ? __pfx_rtw89_fw_h2c_scan_offload_be+0x10/0x10 [rtw89_core]   ? do_raw_spin_lock+0x75/0xdb   ? __pfx_do_raw_spin_lock+0x10/0x10   rtw89_hw_scan_offload+0xb5e/0xbf7 [rtw89_core]   ? _raw_spin_unlock+0xe/0x24   ? __mutex_lock.constprop.0+0x40c/0x471   ? __pfx_rtw89_hw_scan_offload+0x10/0x10 [rtw89_core]   ? __mutex_lock_slowpath+0x13/0x1f   ? mutex_lock+0xa2/0xdc   ? __pfx_mutex_lock+0x10/0x10   rtw89_hw_scan_abort+0x58/0xb7 [rtw89_core]   rtw89_ops_cancel_hw_scan+0x120/0x13b [rtw89_core]   ieee80211_scan_cancel+0x468/0x4d0 [mac80211]   ieee80211_prep_connection+0x858/0x899 [mac80211]   ieee80211_mgd_auth+0xbea/0xdde [mac80211]   ? __pfx_ieee80211_mgd_auth+0x10/0x10 [mac80211]   ? cfg80211_find_elem+0x15/0x29 [cfg80211]   ? is_bss+0x1b7/0x1d7 [cfg80211]   ieee80211_auth+0x18/0x27 [mac80211]   cfg80211_mlme_auth+0x3bb/0x3e7 [cfg80211]   cfg80211_conn_do_work+0x410/0xb81 [cfg80211]   ? __pfx_cfg80211_conn_do_work+0x10/0x10 [cfg80211]   ? __kasan_check_read+0x11/0x1f   ? psi_group_change+0x8bc/0x944   ? __kasan_check_write+0x14/0x22   ? mutex_lock+0x8e/0xdc   ? __pfx_mutex_lock+0x10/0x10   ? __pfx___radix_tree_lookup+0x10/0x10   cfg80211_conn_work+0x245/0x34d [cfg80211]   ? __pfx_cfg80211_conn_work+0x10/0x10 [cfg80211]   ? update_cfs_rq_load_avg+0x3bc/0x3d7   ? sched_clock_noinstr+0x9/0x1a   ? sched_clock+0x10/0x24   ? sched_clock_cpu+0x7e/0x42e   ? newidle_balance+0x796/0x937   ? __pfx_sched_clock_cpu+0x10/0x10   ? __pfx_newidle_balance+0x10/0x10   ? __kasan_check_read+0x11/0x1f   ? psi_group_change+0x8bc/0x944   ? _raw_spin_unlock+0xe/0x24   ? raw_spin_rq_unlock+0x47/0x54   ? raw_spin_rq_unlock_irq+0x9/0x1f   ? finish_task_switch.isra.0+0x347/0x586   ? __schedule+0x27bf/0x2892   ? mutex_unlock+0x80/0xd0   ? do_raw_spin_lock+0x75/0xdb   ? __pfx___schedule+0x10/0x10   process_scheduled_works+0x58c/0x821   worker_thread+0x4c7/0x586   ? __kasan_check_read+0x11/0x1f   kthread+0x285/0x294   ? __pfx_worker_thread+0x10/0x10   ? __pfx_kthread+0x10/0x10   ret_from_fork+0x29/0x6f   ? __pfx_kthread+0x10/0x10   ret_from_fork_asm+0x1b/0x30   </TASK>",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-02-27 02:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38227",
                                "url": "https://ubuntu.com/security/CVE-2025-38227",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  media: vidtv: Terminating the subsequent process of initialization failure  syzbot reported a slab-use-after-free Read in vidtv_mux_init. [1]  After PSI initialization fails, the si member is accessed again, resulting in this uaf.  After si initialization fails, the subsequent process needs to be exited.  [1] BUG: KASAN: slab-use-after-free in vidtv_mux_pid_ctx_init drivers/media/test-drivers/vidtv/vidtv_mux.c:78 [inline] BUG: KASAN: slab-use-after-free in vidtv_mux_init+0xac2/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:524 Read of size 8 at addr ffff88802fa42acc by task syz.2.37/6059  CPU: 0 UID: 0 PID: 6059 Comm: syz.2.37 Not tainted 6.14.0-rc5-syzkaller #0 Hardware name: Google Compute Engine, BIOS Google 02/12/2025 Call Trace: <TASK> __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:408 [inline] print_report+0xc3/0x670 mm/kasan/report.c:521 kasan_report+0xd9/0x110 mm/kasan/report.c:634 vidtv_mux_pid_ctx_init drivers/media/test-drivers/vidtv/vidtv_mux.c:78 vidtv_mux_init+0xac2/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:524 vidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194 vidtv_start_feed drivers/media/test-drivers/vidtv/vidtv_bridge.c:239 dmx_section_feed_start_filtering drivers/media/dvb-core/dvb_demux.c:973 dvb_dmxdev_feed_start drivers/media/dvb-core/dmxdev.c:508 [inline] dvb_dmxdev_feed_restart.isra.0 drivers/media/dvb-core/dmxdev.c:537 dvb_dmxdev_filter_stop+0x2b4/0x3a0 drivers/media/dvb-core/dmxdev.c:564 dvb_dmxdev_filter_free drivers/media/dvb-core/dmxdev.c:840 [inline] dvb_demux_release+0x92/0x550 drivers/media/dvb-core/dmxdev.c:1246 __fput+0x3ff/0xb70 fs/file_table.c:464 task_work_run+0x14e/0x250 kernel/task_work.c:227 exit_task_work include/linux/task_work.h:40 [inline] do_exit+0xad8/0x2d70 kernel/exit.c:938 do_group_exit+0xd3/0x2a0 kernel/exit.c:1087 __do_sys_exit_group kernel/exit.c:1098 [inline] __se_sys_exit_group kernel/exit.c:1096 [inline] __x64_sys_exit_group+0x3e/0x50 kernel/exit.c:1096 x64_sys_call+0x151f/0x1720 arch/x86/include/generated/asm/syscalls_64.h:232 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f871d58d169 Code: Unable to access opcode bytes at 0x7f871d58d13f. RSP: 002b:00007fff4b19a788 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f871d58d169 RDX: 0000000000000064 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 00007fff4b19a7ec R08: 0000000b4b19a87f R09: 00000000000927c0 R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000003 R13: 00000000000927c0 R14: 000000000001d553 R15: 00007fff4b19a840  </TASK>  Allocated by task 6059:  kasan_save_stack+0x33/0x60 mm/kasan/common.c:47  kasan_save_track+0x14/0x30 mm/kasan/common.c:68  poison_kmalloc_redzone mm/kasan/common.c:377 [inline]  __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:394  kmalloc_noprof include/linux/slab.h:901 [inline]  kzalloc_noprof include/linux/slab.h:1037 [inline]  vidtv_psi_pat_table_init drivers/media/test-drivers/vidtv/vidtv_psi.c:970  vidtv_channel_si_init drivers/media/test-drivers/vidtv/vidtv_channel.c:423  vidtv_mux_init drivers/media/test-drivers/vidtv/vidtv_mux.c:519  vidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194  vidtv_start_feed drivers/media/test-drivers/vidtv/vidtv_bridge.c:239  dmx_section_feed_start_filtering drivers/media/dvb-core/dvb_demux.c:973  dvb_dmxdev_feed_start drivers/media/dvb-core/dmxdev.c:508 [inline]  dvb_dmxdev_feed_restart.isra.0 drivers/media/dvb-core/dmxdev.c:537  dvb_dmxdev_filter_stop+0x2b4/0x3a0 drivers/media/dvb-core/dmxdev.c:564  dvb_dmxdev_filter_free drivers/media/dvb-core/dmxdev.c:840 [inline]  dvb_demux_release+0x92/0x550 drivers/media/dvb-core/dmxdev.c:1246  __fput+0x3ff/0xb70 fs/file_tabl ---truncated---",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-07-04 14:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38678",
                                "url": "https://ubuntu.com/security/CVE-2025-38678",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  netfilter: nf_tables: reject duplicate device on updates  A chain/flowtable update with duplicated devices in the same batch is possible. Unfortunately, netdev event path only removes the first device that is found, leaving unregistered the hook of the duplicated device.  Check if a duplicated device exists in the transaction batch, bail out with EEXIST in such case.  WARNING is hit when unregistering the hook:   [49042.221275] WARNING: CPU: 4 PID: 8425 at net/netfilter/core.c:340 nf_hook_entry_head+0xaa/0x150  [49042.221375] CPU: 4 UID: 0 PID: 8425 Comm: nft Tainted: G S                 6.16.0+ #170 PREEMPT(full)  [...]  [49042.221382] RIP: 0010:nf_hook_entry_head+0xaa/0x150",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-09-03 13:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38616",
                                "url": "https://ubuntu.com/security/CVE-2025-38616",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  tls: handle data disappearing from under the TLS ULP  TLS expects that it owns the receive queue of the TCP socket. This cannot be guaranteed in case the reader of the TCP socket entered before the TLS ULP was installed, or uses some non-standard read API (eg. zerocopy ones). Replace the WARN_ON() and a buggy early exit (which leaves anchor pointing to a freed skb) with real error handling. Wipe the parsing state and tell the reader to retry.  We already reload the anchor every time we (re)acquire the socket lock, so the only condition we need to avoid is an out of bounds read (not having enough bytes in the socket for previously parsed record len).  If some data was read from under TLS but there's enough in the queue we'll reload and decrypt what is most likely not a valid TLS record. Leading to some undefined behavior from TLS perspective (corrupting a stream? missing an alert? missing an attack?) but no kernel crash should take place.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-08-22 14:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-37838",
                                "url": "https://ubuntu.com/security/CVE-2025-37838",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  HSI: ssi_protocol: Fix use after free vulnerability in ssi_protocol Driver Due to Race Condition  In the ssi_protocol_probe() function, &ssi->work is bound with ssip_xmit_work(), In ssip_pn_setup(), the ssip_pn_xmit() function within the ssip_pn_ops structure is capable of starting the work.  If we remove the module which will call ssi_protocol_remove() to make a cleanup, it will free ssi through kfree(ssi), while the work mentioned above will be used. The sequence of operations that may lead to a UAF bug is as follows:  CPU0                                    CPU1                          | ssip_xmit_work ssi_protocol_remove     | kfree(ssi);             |                         | struct hsi_client *cl = ssi->cl;                         | // use ssi  Fix it by ensuring that the work is canceled before proceeding with the cleanup in ssi_protocol_remove().",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-04-18 15:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-40300",
                                "url": "https://ubuntu.com/security/CVE-2025-40300",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  x86/vmscape: Add conditional IBPB mitigation  VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace hypervisor (like QEMU). Existing mitigations already protect kernel/KVM from a malicious guest. Userspace can additionally be protected by flushing the branch predictors after a VMexit.  Since it is the userspace that consumes the poisoned branch predictors, conditionally issue an IBPB after a VMexit and before returning to userspace. Workloads that frequently switch between hypervisor and userspace will incur the most overhead from the new IBPB.  This new IBPB is not integrated with the existing IBPB sites. For instance, a task can use the existing speculation control prctl() to get an IBPB at context switch time. With this implementation, the IBPB is doubled up: one at context switch and another before running userspace.  The intent is to integrate and optimize these cases post-embargo.  [ dhansen: elaborate on suboptimal IBPB solution ]",
                                "cve_priority": "high",
                                "cve_public_date": "2025-09-11 17:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38352",
                                "url": "https://ubuntu.com/security/CVE-2025-38352",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del()  If an exiting non-autoreaping task has already passed exit_notify() and calls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent or debugger right after unlock_task_sighand().  If a concurrent posix_cpu_timer_del() runs at that moment, it won't be able to detect timer->it.cpu.firing != 0: cpu_timer_task_rcu() and/or lock_task_sighand() will fail.  Add the tsk->exit_state check into run_posix_cpu_timers() to fix this.  This fix is not needed if CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y, because exit_task_work() is called before exit_notify(). But the check still makes sense, task_work_add(&tsk->posix_cputimers_work.work) will fail anyway in this case.",
                                "cve_priority": "high",
                                "cve_public_date": "2025-07-22 08:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38118",
                                "url": "https://ubuntu.com/security/CVE-2025-38118",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  Bluetooth: MGMT: Fix UAF on mgmt_remove_adv_monitor_complete  This reworks MGMT_OP_REMOVE_ADV_MONITOR to not use mgmt_pending_add to avoid crashes like bellow:  ================================================================== BUG: KASAN: slab-use-after-free in mgmt_remove_adv_monitor_complete+0xe5/0x540 net/bluetooth/mgmt.c:5406 Read of size 8 at addr ffff88801c53f318 by task kworker/u5:5/5341  CPU: 0 UID: 0 PID: 5341 Comm: kworker/u5:5 Not tainted 6.15.0-syzkaller-10402-g4cb6c8af8591 #0 PREEMPT(full) Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014 Workqueue: hci0 hci_cmd_sync_work Call Trace:  <TASK>  dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120  print_address_description mm/kasan/report.c:408 [inline]  print_report+0xd2/0x2b0 mm/kasan/report.c:521  kasan_report+0x118/0x150 mm/kasan/report.c:634  mgmt_remove_adv_monitor_complete+0xe5/0x540 net/bluetooth/mgmt.c:5406  hci_cmd_sync_work+0x261/0x3a0 net/bluetooth/hci_sync.c:334  process_one_work kernel/workqueue.c:3238 [inline]  process_scheduled_works+0xade/0x17b0 kernel/workqueue.c:3321  worker_thread+0x8a0/0xda0 kernel/workqueue.c:3402  kthread+0x711/0x8a0 kernel/kthread.c:464  ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245  </TASK>  Allocated by task 5987:  kasan_save_stack mm/kasan/common.c:47 [inline]  kasan_save_track+0x3e/0x80 mm/kasan/common.c:68  poison_kmalloc_redzone mm/kasan/common.c:377 [inline]  __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:394  kasan_kmalloc include/linux/kasan.h:260 [inline]  __kmalloc_cache_noprof+0x230/0x3d0 mm/slub.c:4358  kmalloc_noprof include/linux/slab.h:905 [inline]  kzalloc_noprof include/linux/slab.h:1039 [inline]  mgmt_pending_new+0x65/0x240 net/bluetooth/mgmt_util.c:252  mgmt_pending_add+0x34/0x120 net/bluetooth/mgmt_util.c:279  remove_adv_monitor+0x103/0x1b0 net/bluetooth/mgmt.c:5454  hci_mgmt_cmd+0x9c9/0xef0 net/bluetooth/hci_sock.c:1719  hci_sock_sendmsg+0x6ca/0xef0 net/bluetooth/hci_sock.c:1839  sock_sendmsg_nosec net/socket.c:712 [inline]  __sock_sendmsg+0x219/0x270 net/socket.c:727  sock_write_iter+0x258/0x330 net/socket.c:1131  new_sync_write fs/read_write.c:593 [inline]  vfs_write+0x548/0xa90 fs/read_write.c:686  ksys_write+0x145/0x250 fs/read_write.c:738  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]  do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94  entry_SYSCALL_64_after_hwframe+0x77/0x7f  Freed by task 5989:  kasan_save_stack mm/kasan/common.c:47 [inline]  kasan_save_track+0x3e/0x80 mm/kasan/common.c:68  kasan_save_free_info+0x46/0x50 mm/kasan/generic.c:576  poison_slab_object mm/kasan/common.c:247 [inline]  __kasan_slab_free+0x62/0x70 mm/kasan/common.c:264  kasan_slab_free include/linux/kasan.h:233 [inline]  slab_free_hook mm/slub.c:2380 [inline]  slab_free mm/slub.c:4642 [inline]  kfree+0x18e/0x440 mm/slub.c:4841  mgmt_pending_foreach+0xc9/0x120 net/bluetooth/mgmt_util.c:242  mgmt_index_removed+0x10d/0x2f0 net/bluetooth/mgmt.c:9366  hci_sock_bind+0xbe9/0x1000 net/bluetooth/hci_sock.c:1314  __sys_bind_socket net/socket.c:1810 [inline]  __sys_bind+0x2c3/0x3e0 net/socket.c:1841  __do_sys_bind net/socket.c:1846 [inline]  __se_sys_bind net/socket.c:1844 [inline]  __x64_sys_bind+0x7a/0x90 net/socket.c:1844  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]  do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94  entry_SYSCALL_64_after_hwframe+0x77/0x7f",
                                "cve_priority": "high",
                                "cve_public_date": "2025-07-03 09:15:00 UTC"
                            }
                        ],
                        "log": [
                            "",
                            "  * noble/linux: 6.8.0-88.89 -proposed tracker (LP: #2127619)",
                            "",
                            "  *  Enable Xilinx PS UART configs (LP: #2121337)",
                            "    - [Config] Enable Xilinx PS UART configs",
                            "",
                            "  * Fix ARL-U/H suspend issues (LP: #2112469)",
                            "    - platform/x86/intel/pmc: Add Arrow Lake U/H support to intel_pmc_core",
                            "      driver",
                            "    - platform/x86/intel/pmc: Fix Arrow Lake U/H NPU PCI ID",
                            "",
                            "  * r8169 can not wake on LAN via SFP moudule (LP: #2123901)",
                            "    - r8169: set EEE speed down ratio to 1",
                            "",
                            "  * Add pvpanic kernel modules to linux-modules (LP: #2126659)",
                            "    - [Packaging] Add pvpanic kernel modules to linux-modules",
                            "",
                            "  * CVE-2025-21729",
                            "    - wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion",
                            "",
                            "  * Fix failure to build TDX module (LP: #2126698)",
                            "    - x86/paravirt: Move halt paravirt calls under CONFIG_PARAVIRT",
                            "",
                            "  * Ubuntu 24.04.2: error in audit_log_object_context keep printing in the",
                            "    kernel and console (LP: #2123815)",
                            "    - SAUCE: fix: apparmor4.0.0 [26/90]: LSM stacking v39: Audit: Add record",
                            "      for multiple object contexts",
                            "",
                            "  * ensure mptcp keepalives are honored when set (LP: #2125444)",
                            "    - mptcp: sockopt: make sync_socket_options propagate SOCK_KEEPOPEN",
                            "",
                            "  * System hangs when running the memory stress test (LP: #2103680)",
                            "    - mm: page_alloc: avoid kswapd thrashing due to NUMA restrictions",
                            "",
                            "  * UBUNTU: fan: fail to check kmalloc() return could cause a NULL pointer",
                            "    dereference (LP: #2125053)",
                            "    - SAUCE: fan: vxlan: check memory allocation for map",
                            "",
                            "  * jammy:linux-riscv-6.8 is FTBFS because of wrong include (LP: #2122592)",
                            "    - SAUCE: riscv: KVM: Remove broken include",
                            "",
                            "  * Performance degrades rapidly when spawning more processes to run benchmark",
                            "    (LP: #2122006)",
                            "    - cpuidle: menu: Avoid discarding useful information",
                            "    - cpuidle: governors: menu: Avoid using invalid recent intervals data",
                            "",
                            "  * CVE-2025-38227",
                            "    - media: vidtv: Terminating the subsequent process of initialization",
                            "      failure",
                            "",
                            "  * CVE-2025-38678",
                            "    - netfilter: nf_tables: reject duplicate device on updates",
                            "",
                            "  * CVE-2025-38616",
                            "    - tls: handle data disappearing from under the TLS ULP",
                            "",
                            "  * CVE-2025-37838",
                            "    - HSI: ssi_protocol: Fix use after free vulnerability in ssi_protocol",
                            "      Driver Due to Race Condition",
                            "",
                            "  * VMSCAPE CVE-2025-40300 (LP: #2124105) // CVE-2025-40300",
                            "    - Documentation/hw-vuln: Add VMSCAPE documentation",
                            "    - x86/vmscape: Enumerate VMSCAPE bug",
                            "    - x86/vmscape: Add conditional IBPB mitigation",
                            "    - x86/vmscape: Enable the mitigation",
                            "    - x86/bugs: Move cpu_bugs_smt_update() down",
                            "    - x86/vmscape: Warn when STIBP is disabled with SMT",
                            "    - x86/vmscape: Add old Intel CPUs to affected list",
                            "",
                            "  * VMSCAPE CVE-2025-40300 (LP: #2124105)",
                            "    - [Config] Enable MITIGATION_VMSCAPE config",
                            "",
                            "  * CVE-2025-38352",
                            "    - posix-cpu-timers: fix race between handle_posix_cpu_timers() and",
                            "      posix_cpu_timer_del()",
                            "",
                            "  * CVE-2025-38118",
                            "    - Bluetooth: MGMT: Fix UAF on mgmt_remove_adv_monitor_complete",
                            "    - Bluetooth: MGMT: Fix sparse errors",
                            ""
                        ],
                        "package": "linux",
                        "version": "6.8.0-88.89",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2127619,
                            2121337,
                            2112469,
                            2123901,
                            2126659,
                            2126698,
                            2123815,
                            2125444,
                            2103680,
                            2125053,
                            2122592,
                            2122006,
                            2124105,
                            2124105
                        ],
                        "author": "Edoardo Canepa <edoardo.canepa@canonical.com>",
                        "date": "Sat, 11 Oct 2025 01:38:46 +0200"
                    }
                ],
                "notes": "linux-headers-6.8.0-88-generic version '6.8.0-88.89' (source package linux version '6.8.0-88.89') was added. linux-headers-6.8.0-88-generic version '6.8.0-88.89' has the same source package name, linux, as removed package linux-headers-6.8.0-87. As such we can use the source package version of the removed package, '6.8.0-87.88', as the starting point in our changelog diff. Kernel packages are an example of where the binary package name changes for the same source package. Using the removed package source package version as our starting point means we can still get meaningful changelog diffs even for what appears to be a new package.",
                "is_version_downgrade": false
            },
            {
                "name": "linux-image-6.8.0-88-generic",
                "from_version": {
                    "source_package_name": "linux-signed",
                    "source_package_version": "6.8.0-87.88",
                    "version": null
                },
                "to_version": {
                    "source_package_name": "linux-signed",
                    "source_package_version": "6.8.0-88.89",
                    "version": "6.8.0-88.89"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    1786013
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Main version: 6.8.0-88.89",
                            "",
                            "  * Packaging resync (LP: #1786013)",
                            "    - [Packaging] debian/tracking-bug -- resync from main package",
                            ""
                        ],
                        "package": "linux-signed",
                        "version": "6.8.0-88.89",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            1786013
                        ],
                        "author": "Edoardo Canepa <edoardo.canepa@canonical.com>",
                        "date": "Sat, 11 Oct 2025 01:40:10 +0200"
                    }
                ],
                "notes": "linux-image-6.8.0-88-generic version '6.8.0-88.89' (source package linux-signed version '6.8.0-88.89') was added. linux-image-6.8.0-88-generic version '6.8.0-88.89' has the same source package name, linux-signed, as removed package linux-image-6.8.0-87-generic. As such we can use the source package version of the removed package, '6.8.0-87.88', as the starting point in our changelog diff. Kernel packages are an example of where the binary package name changes for the same source package. Using the removed package source package version as our starting point means we can still get meaningful changelog diffs even for what appears to be a new package.",
                "is_version_downgrade": false
            },
            {
                "name": "linux-modules-6.8.0-88-generic",
                "from_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.8.0-87.88",
                    "version": null
                },
                "to_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.8.0-88.89",
                    "version": "6.8.0-88.89"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-21729",
                        "url": "https://ubuntu.com/security/CVE-2025-21729",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion  The rtwdev->scanning flag isn't protected by mutex originally, so cancel_hw_scan can pass the condition, but suddenly hw_scan completion unset the flag and calls ieee80211_scan_completed() that will free local->hw_scan_req. Then, cancel_hw_scan raises null-ptr-deref and use-after-free. Fix it by moving the check condition to where protected by mutex.   KASAN: null-ptr-deref in range [0x0000000000000088-0x000000000000008f]  CPU: 2 PID: 6922 Comm: kworker/2:2 Tainted: G           OE  Hardware name: LENOVO 2356AD1/2356AD1, BIOS G7ETB6WW (2.76 ) 09/10/2019  Workqueue: events cfg80211_conn_work [cfg80211]  RIP: 0010:rtw89_fw_h2c_scan_offload_be+0xc33/0x13c3 [rtw89_core]  Code: 00 45 89 6c 24 1c 0f 85 23 01 00 00 48 8b 85 20 ff ff ff 48 8d  RSP: 0018:ffff88811fd9f068 EFLAGS: 00010206  RAX: dffffc0000000000 RBX: ffff88811fd9f258 RCX: 0000000000000001  RDX: 0000000000000011 RSI: 0000000000000001 RDI: 0000000000000089  RBP: ffff88811fd9f170 R08: 0000000000000000 R09: 0000000000000000  R10: ffff88811fd9f108 R11: 0000000000000000 R12: ffff88810e47f960  R13: 0000000000000000 R14: 000000000000ffff R15: 0000000000000000  FS:  0000000000000000(0000) GS:ffff8881d6f00000(0000) knlGS:0000000000000000  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033  CR2: 00007531dfca55b0 CR3: 00000001be296004 CR4: 00000000001706e0  Call Trace:   <TASK>   ? show_regs+0x61/0x73   ? __die_body+0x20/0x73   ? die_addr+0x4f/0x7b   ? exc_general_protection+0x191/0x1db   ? asm_exc_general_protection+0x27/0x30   ? rtw89_fw_h2c_scan_offload_be+0xc33/0x13c3 [rtw89_core]   ? rtw89_fw_h2c_scan_offload_be+0x458/0x13c3 [rtw89_core]   ? __pfx_rtw89_fw_h2c_scan_offload_be+0x10/0x10 [rtw89_core]   ? do_raw_spin_lock+0x75/0xdb   ? __pfx_do_raw_spin_lock+0x10/0x10   rtw89_hw_scan_offload+0xb5e/0xbf7 [rtw89_core]   ? _raw_spin_unlock+0xe/0x24   ? __mutex_lock.constprop.0+0x40c/0x471   ? __pfx_rtw89_hw_scan_offload+0x10/0x10 [rtw89_core]   ? __mutex_lock_slowpath+0x13/0x1f   ? mutex_lock+0xa2/0xdc   ? __pfx_mutex_lock+0x10/0x10   rtw89_hw_scan_abort+0x58/0xb7 [rtw89_core]   rtw89_ops_cancel_hw_scan+0x120/0x13b [rtw89_core]   ieee80211_scan_cancel+0x468/0x4d0 [mac80211]   ieee80211_prep_connection+0x858/0x899 [mac80211]   ieee80211_mgd_auth+0xbea/0xdde [mac80211]   ? __pfx_ieee80211_mgd_auth+0x10/0x10 [mac80211]   ? cfg80211_find_elem+0x15/0x29 [cfg80211]   ? is_bss+0x1b7/0x1d7 [cfg80211]   ieee80211_auth+0x18/0x27 [mac80211]   cfg80211_mlme_auth+0x3bb/0x3e7 [cfg80211]   cfg80211_conn_do_work+0x410/0xb81 [cfg80211]   ? __pfx_cfg80211_conn_do_work+0x10/0x10 [cfg80211]   ? __kasan_check_read+0x11/0x1f   ? psi_group_change+0x8bc/0x944   ? __kasan_check_write+0x14/0x22   ? mutex_lock+0x8e/0xdc   ? __pfx_mutex_lock+0x10/0x10   ? __pfx___radix_tree_lookup+0x10/0x10   cfg80211_conn_work+0x245/0x34d [cfg80211]   ? __pfx_cfg80211_conn_work+0x10/0x10 [cfg80211]   ? update_cfs_rq_load_avg+0x3bc/0x3d7   ? sched_clock_noinstr+0x9/0x1a   ? sched_clock+0x10/0x24   ? sched_clock_cpu+0x7e/0x42e   ? newidle_balance+0x796/0x937   ? __pfx_sched_clock_cpu+0x10/0x10   ? __pfx_newidle_balance+0x10/0x10   ? __kasan_check_read+0x11/0x1f   ? psi_group_change+0x8bc/0x944   ? _raw_spin_unlock+0xe/0x24   ? raw_spin_rq_unlock+0x47/0x54   ? raw_spin_rq_unlock_irq+0x9/0x1f   ? finish_task_switch.isra.0+0x347/0x586   ? __schedule+0x27bf/0x2892   ? mutex_unlock+0x80/0xd0   ? do_raw_spin_lock+0x75/0xdb   ? __pfx___schedule+0x10/0x10   process_scheduled_works+0x58c/0x821   worker_thread+0x4c7/0x586   ? __kasan_check_read+0x11/0x1f   kthread+0x285/0x294   ? __pfx_worker_thread+0x10/0x10   ? __pfx_kthread+0x10/0x10   ret_from_fork+0x29/0x6f   ? __pfx_kthread+0x10/0x10   ret_from_fork_asm+0x1b/0x30   </TASK>",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-02-27 02:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38227",
                        "url": "https://ubuntu.com/security/CVE-2025-38227",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  media: vidtv: Terminating the subsequent process of initialization failure  syzbot reported a slab-use-after-free Read in vidtv_mux_init. [1]  After PSI initialization fails, the si member is accessed again, resulting in this uaf.  After si initialization fails, the subsequent process needs to be exited.  [1] BUG: KASAN: slab-use-after-free in vidtv_mux_pid_ctx_init drivers/media/test-drivers/vidtv/vidtv_mux.c:78 [inline] BUG: KASAN: slab-use-after-free in vidtv_mux_init+0xac2/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:524 Read of size 8 at addr ffff88802fa42acc by task syz.2.37/6059  CPU: 0 UID: 0 PID: 6059 Comm: syz.2.37 Not tainted 6.14.0-rc5-syzkaller #0 Hardware name: Google Compute Engine, BIOS Google 02/12/2025 Call Trace: <TASK> __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:408 [inline] print_report+0xc3/0x670 mm/kasan/report.c:521 kasan_report+0xd9/0x110 mm/kasan/report.c:634 vidtv_mux_pid_ctx_init drivers/media/test-drivers/vidtv/vidtv_mux.c:78 vidtv_mux_init+0xac2/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:524 vidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194 vidtv_start_feed drivers/media/test-drivers/vidtv/vidtv_bridge.c:239 dmx_section_feed_start_filtering drivers/media/dvb-core/dvb_demux.c:973 dvb_dmxdev_feed_start drivers/media/dvb-core/dmxdev.c:508 [inline] dvb_dmxdev_feed_restart.isra.0 drivers/media/dvb-core/dmxdev.c:537 dvb_dmxdev_filter_stop+0x2b4/0x3a0 drivers/media/dvb-core/dmxdev.c:564 dvb_dmxdev_filter_free drivers/media/dvb-core/dmxdev.c:840 [inline] dvb_demux_release+0x92/0x550 drivers/media/dvb-core/dmxdev.c:1246 __fput+0x3ff/0xb70 fs/file_table.c:464 task_work_run+0x14e/0x250 kernel/task_work.c:227 exit_task_work include/linux/task_work.h:40 [inline] do_exit+0xad8/0x2d70 kernel/exit.c:938 do_group_exit+0xd3/0x2a0 kernel/exit.c:1087 __do_sys_exit_group kernel/exit.c:1098 [inline] __se_sys_exit_group kernel/exit.c:1096 [inline] __x64_sys_exit_group+0x3e/0x50 kernel/exit.c:1096 x64_sys_call+0x151f/0x1720 arch/x86/include/generated/asm/syscalls_64.h:232 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f871d58d169 Code: Unable to access opcode bytes at 0x7f871d58d13f. RSP: 002b:00007fff4b19a788 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f871d58d169 RDX: 0000000000000064 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 00007fff4b19a7ec R08: 0000000b4b19a87f R09: 00000000000927c0 R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000003 R13: 00000000000927c0 R14: 000000000001d553 R15: 00007fff4b19a840  </TASK>  Allocated by task 6059:  kasan_save_stack+0x33/0x60 mm/kasan/common.c:47  kasan_save_track+0x14/0x30 mm/kasan/common.c:68  poison_kmalloc_redzone mm/kasan/common.c:377 [inline]  __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:394  kmalloc_noprof include/linux/slab.h:901 [inline]  kzalloc_noprof include/linux/slab.h:1037 [inline]  vidtv_psi_pat_table_init drivers/media/test-drivers/vidtv/vidtv_psi.c:970  vidtv_channel_si_init drivers/media/test-drivers/vidtv/vidtv_channel.c:423  vidtv_mux_init drivers/media/test-drivers/vidtv/vidtv_mux.c:519  vidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194  vidtv_start_feed drivers/media/test-drivers/vidtv/vidtv_bridge.c:239  dmx_section_feed_start_filtering drivers/media/dvb-core/dvb_demux.c:973  dvb_dmxdev_feed_start drivers/media/dvb-core/dmxdev.c:508 [inline]  dvb_dmxdev_feed_restart.isra.0 drivers/media/dvb-core/dmxdev.c:537  dvb_dmxdev_filter_stop+0x2b4/0x3a0 drivers/media/dvb-core/dmxdev.c:564  dvb_dmxdev_filter_free drivers/media/dvb-core/dmxdev.c:840 [inline]  dvb_demux_release+0x92/0x550 drivers/media/dvb-core/dmxdev.c:1246  __fput+0x3ff/0xb70 fs/file_tabl ---truncated---",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-07-04 14:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38678",
                        "url": "https://ubuntu.com/security/CVE-2025-38678",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  netfilter: nf_tables: reject duplicate device on updates  A chain/flowtable update with duplicated devices in the same batch is possible. Unfortunately, netdev event path only removes the first device that is found, leaving unregistered the hook of the duplicated device.  Check if a duplicated device exists in the transaction batch, bail out with EEXIST in such case.  WARNING is hit when unregistering the hook:   [49042.221275] WARNING: CPU: 4 PID: 8425 at net/netfilter/core.c:340 nf_hook_entry_head+0xaa/0x150  [49042.221375] CPU: 4 UID: 0 PID: 8425 Comm: nft Tainted: G S                 6.16.0+ #170 PREEMPT(full)  [...]  [49042.221382] RIP: 0010:nf_hook_entry_head+0xaa/0x150",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-09-03 13:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38616",
                        "url": "https://ubuntu.com/security/CVE-2025-38616",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  tls: handle data disappearing from under the TLS ULP  TLS expects that it owns the receive queue of the TCP socket. This cannot be guaranteed in case the reader of the TCP socket entered before the TLS ULP was installed, or uses some non-standard read API (eg. zerocopy ones). Replace the WARN_ON() and a buggy early exit (which leaves anchor pointing to a freed skb) with real error handling. Wipe the parsing state and tell the reader to retry.  We already reload the anchor every time we (re)acquire the socket lock, so the only condition we need to avoid is an out of bounds read (not having enough bytes in the socket for previously parsed record len).  If some data was read from under TLS but there's enough in the queue we'll reload and decrypt what is most likely not a valid TLS record. Leading to some undefined behavior from TLS perspective (corrupting a stream? missing an alert? missing an attack?) but no kernel crash should take place.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-08-22 14:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-37838",
                        "url": "https://ubuntu.com/security/CVE-2025-37838",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  HSI: ssi_protocol: Fix use after free vulnerability in ssi_protocol Driver Due to Race Condition  In the ssi_protocol_probe() function, &ssi->work is bound with ssip_xmit_work(), In ssip_pn_setup(), the ssip_pn_xmit() function within the ssip_pn_ops structure is capable of starting the work.  If we remove the module which will call ssi_protocol_remove() to make a cleanup, it will free ssi through kfree(ssi), while the work mentioned above will be used. The sequence of operations that may lead to a UAF bug is as follows:  CPU0                                    CPU1                          | ssip_xmit_work ssi_protocol_remove     | kfree(ssi);             |                         | struct hsi_client *cl = ssi->cl;                         | // use ssi  Fix it by ensuring that the work is canceled before proceeding with the cleanup in ssi_protocol_remove().",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-04-18 15:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-40300",
                        "url": "https://ubuntu.com/security/CVE-2025-40300",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  x86/vmscape: Add conditional IBPB mitigation  VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace hypervisor (like QEMU). Existing mitigations already protect kernel/KVM from a malicious guest. Userspace can additionally be protected by flushing the branch predictors after a VMexit.  Since it is the userspace that consumes the poisoned branch predictors, conditionally issue an IBPB after a VMexit and before returning to userspace. Workloads that frequently switch between hypervisor and userspace will incur the most overhead from the new IBPB.  This new IBPB is not integrated with the existing IBPB sites. For instance, a task can use the existing speculation control prctl() to get an IBPB at context switch time. With this implementation, the IBPB is doubled up: one at context switch and another before running userspace.  The intent is to integrate and optimize these cases post-embargo.  [ dhansen: elaborate on suboptimal IBPB solution ]",
                        "cve_priority": "high",
                        "cve_public_date": "2025-09-11 17:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38352",
                        "url": "https://ubuntu.com/security/CVE-2025-38352",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del()  If an exiting non-autoreaping task has already passed exit_notify() and calls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent or debugger right after unlock_task_sighand().  If a concurrent posix_cpu_timer_del() runs at that moment, it won't be able to detect timer->it.cpu.firing != 0: cpu_timer_task_rcu() and/or lock_task_sighand() will fail.  Add the tsk->exit_state check into run_posix_cpu_timers() to fix this.  This fix is not needed if CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y, because exit_task_work() is called before exit_notify(). But the check still makes sense, task_work_add(&tsk->posix_cputimers_work.work) will fail anyway in this case.",
                        "cve_priority": "high",
                        "cve_public_date": "2025-07-22 08:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38118",
                        "url": "https://ubuntu.com/security/CVE-2025-38118",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  Bluetooth: MGMT: Fix UAF on mgmt_remove_adv_monitor_complete  This reworks MGMT_OP_REMOVE_ADV_MONITOR to not use mgmt_pending_add to avoid crashes like bellow:  ================================================================== BUG: KASAN: slab-use-after-free in mgmt_remove_adv_monitor_complete+0xe5/0x540 net/bluetooth/mgmt.c:5406 Read of size 8 at addr ffff88801c53f318 by task kworker/u5:5/5341  CPU: 0 UID: 0 PID: 5341 Comm: kworker/u5:5 Not tainted 6.15.0-syzkaller-10402-g4cb6c8af8591 #0 PREEMPT(full) Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014 Workqueue: hci0 hci_cmd_sync_work Call Trace:  <TASK>  dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120  print_address_description mm/kasan/report.c:408 [inline]  print_report+0xd2/0x2b0 mm/kasan/report.c:521  kasan_report+0x118/0x150 mm/kasan/report.c:634  mgmt_remove_adv_monitor_complete+0xe5/0x540 net/bluetooth/mgmt.c:5406  hci_cmd_sync_work+0x261/0x3a0 net/bluetooth/hci_sync.c:334  process_one_work kernel/workqueue.c:3238 [inline]  process_scheduled_works+0xade/0x17b0 kernel/workqueue.c:3321  worker_thread+0x8a0/0xda0 kernel/workqueue.c:3402  kthread+0x711/0x8a0 kernel/kthread.c:464  ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245  </TASK>  Allocated by task 5987:  kasan_save_stack mm/kasan/common.c:47 [inline]  kasan_save_track+0x3e/0x80 mm/kasan/common.c:68  poison_kmalloc_redzone mm/kasan/common.c:377 [inline]  __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:394  kasan_kmalloc include/linux/kasan.h:260 [inline]  __kmalloc_cache_noprof+0x230/0x3d0 mm/slub.c:4358  kmalloc_noprof include/linux/slab.h:905 [inline]  kzalloc_noprof include/linux/slab.h:1039 [inline]  mgmt_pending_new+0x65/0x240 net/bluetooth/mgmt_util.c:252  mgmt_pending_add+0x34/0x120 net/bluetooth/mgmt_util.c:279  remove_adv_monitor+0x103/0x1b0 net/bluetooth/mgmt.c:5454  hci_mgmt_cmd+0x9c9/0xef0 net/bluetooth/hci_sock.c:1719  hci_sock_sendmsg+0x6ca/0xef0 net/bluetooth/hci_sock.c:1839  sock_sendmsg_nosec net/socket.c:712 [inline]  __sock_sendmsg+0x219/0x270 net/socket.c:727  sock_write_iter+0x258/0x330 net/socket.c:1131  new_sync_write fs/read_write.c:593 [inline]  vfs_write+0x548/0xa90 fs/read_write.c:686  ksys_write+0x145/0x250 fs/read_write.c:738  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]  do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94  entry_SYSCALL_64_after_hwframe+0x77/0x7f  Freed by task 5989:  kasan_save_stack mm/kasan/common.c:47 [inline]  kasan_save_track+0x3e/0x80 mm/kasan/common.c:68  kasan_save_free_info+0x46/0x50 mm/kasan/generic.c:576  poison_slab_object mm/kasan/common.c:247 [inline]  __kasan_slab_free+0x62/0x70 mm/kasan/common.c:264  kasan_slab_free include/linux/kasan.h:233 [inline]  slab_free_hook mm/slub.c:2380 [inline]  slab_free mm/slub.c:4642 [inline]  kfree+0x18e/0x440 mm/slub.c:4841  mgmt_pending_foreach+0xc9/0x120 net/bluetooth/mgmt_util.c:242  mgmt_index_removed+0x10d/0x2f0 net/bluetooth/mgmt.c:9366  hci_sock_bind+0xbe9/0x1000 net/bluetooth/hci_sock.c:1314  __sys_bind_socket net/socket.c:1810 [inline]  __sys_bind+0x2c3/0x3e0 net/socket.c:1841  __do_sys_bind net/socket.c:1846 [inline]  __se_sys_bind net/socket.c:1844 [inline]  __x64_sys_bind+0x7a/0x90 net/socket.c:1844  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]  do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94  entry_SYSCALL_64_after_hwframe+0x77/0x7f",
                        "cve_priority": "high",
                        "cve_public_date": "2025-07-03 09:15:00 UTC"
                    }
                ],
                "launchpad_bugs_fixed": [
                    2127619,
                    2121337,
                    2112469,
                    2123901,
                    2126659,
                    2126698,
                    2123815,
                    2125444,
                    2103680,
                    2125053,
                    2122592,
                    2122006,
                    2124105,
                    2124105
                ],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-21729",
                                "url": "https://ubuntu.com/security/CVE-2025-21729",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion  The rtwdev->scanning flag isn't protected by mutex originally, so cancel_hw_scan can pass the condition, but suddenly hw_scan completion unset the flag and calls ieee80211_scan_completed() that will free local->hw_scan_req. Then, cancel_hw_scan raises null-ptr-deref and use-after-free. Fix it by moving the check condition to where protected by mutex.   KASAN: null-ptr-deref in range [0x0000000000000088-0x000000000000008f]  CPU: 2 PID: 6922 Comm: kworker/2:2 Tainted: G           OE  Hardware name: LENOVO 2356AD1/2356AD1, BIOS G7ETB6WW (2.76 ) 09/10/2019  Workqueue: events cfg80211_conn_work [cfg80211]  RIP: 0010:rtw89_fw_h2c_scan_offload_be+0xc33/0x13c3 [rtw89_core]  Code: 00 45 89 6c 24 1c 0f 85 23 01 00 00 48 8b 85 20 ff ff ff 48 8d  RSP: 0018:ffff88811fd9f068 EFLAGS: 00010206  RAX: dffffc0000000000 RBX: ffff88811fd9f258 RCX: 0000000000000001  RDX: 0000000000000011 RSI: 0000000000000001 RDI: 0000000000000089  RBP: ffff88811fd9f170 R08: 0000000000000000 R09: 0000000000000000  R10: ffff88811fd9f108 R11: 0000000000000000 R12: ffff88810e47f960  R13: 0000000000000000 R14: 000000000000ffff R15: 0000000000000000  FS:  0000000000000000(0000) GS:ffff8881d6f00000(0000) knlGS:0000000000000000  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033  CR2: 00007531dfca55b0 CR3: 00000001be296004 CR4: 00000000001706e0  Call Trace:   <TASK>   ? show_regs+0x61/0x73   ? __die_body+0x20/0x73   ? die_addr+0x4f/0x7b   ? exc_general_protection+0x191/0x1db   ? asm_exc_general_protection+0x27/0x30   ? rtw89_fw_h2c_scan_offload_be+0xc33/0x13c3 [rtw89_core]   ? rtw89_fw_h2c_scan_offload_be+0x458/0x13c3 [rtw89_core]   ? __pfx_rtw89_fw_h2c_scan_offload_be+0x10/0x10 [rtw89_core]   ? do_raw_spin_lock+0x75/0xdb   ? __pfx_do_raw_spin_lock+0x10/0x10   rtw89_hw_scan_offload+0xb5e/0xbf7 [rtw89_core]   ? _raw_spin_unlock+0xe/0x24   ? __mutex_lock.constprop.0+0x40c/0x471   ? __pfx_rtw89_hw_scan_offload+0x10/0x10 [rtw89_core]   ? __mutex_lock_slowpath+0x13/0x1f   ? mutex_lock+0xa2/0xdc   ? __pfx_mutex_lock+0x10/0x10   rtw89_hw_scan_abort+0x58/0xb7 [rtw89_core]   rtw89_ops_cancel_hw_scan+0x120/0x13b [rtw89_core]   ieee80211_scan_cancel+0x468/0x4d0 [mac80211]   ieee80211_prep_connection+0x858/0x899 [mac80211]   ieee80211_mgd_auth+0xbea/0xdde [mac80211]   ? __pfx_ieee80211_mgd_auth+0x10/0x10 [mac80211]   ? cfg80211_find_elem+0x15/0x29 [cfg80211]   ? is_bss+0x1b7/0x1d7 [cfg80211]   ieee80211_auth+0x18/0x27 [mac80211]   cfg80211_mlme_auth+0x3bb/0x3e7 [cfg80211]   cfg80211_conn_do_work+0x410/0xb81 [cfg80211]   ? __pfx_cfg80211_conn_do_work+0x10/0x10 [cfg80211]   ? __kasan_check_read+0x11/0x1f   ? psi_group_change+0x8bc/0x944   ? __kasan_check_write+0x14/0x22   ? mutex_lock+0x8e/0xdc   ? __pfx_mutex_lock+0x10/0x10   ? __pfx___radix_tree_lookup+0x10/0x10   cfg80211_conn_work+0x245/0x34d [cfg80211]   ? __pfx_cfg80211_conn_work+0x10/0x10 [cfg80211]   ? update_cfs_rq_load_avg+0x3bc/0x3d7   ? sched_clock_noinstr+0x9/0x1a   ? sched_clock+0x10/0x24   ? sched_clock_cpu+0x7e/0x42e   ? newidle_balance+0x796/0x937   ? __pfx_sched_clock_cpu+0x10/0x10   ? __pfx_newidle_balance+0x10/0x10   ? __kasan_check_read+0x11/0x1f   ? psi_group_change+0x8bc/0x944   ? _raw_spin_unlock+0xe/0x24   ? raw_spin_rq_unlock+0x47/0x54   ? raw_spin_rq_unlock_irq+0x9/0x1f   ? finish_task_switch.isra.0+0x347/0x586   ? __schedule+0x27bf/0x2892   ? mutex_unlock+0x80/0xd0   ? do_raw_spin_lock+0x75/0xdb   ? __pfx___schedule+0x10/0x10   process_scheduled_works+0x58c/0x821   worker_thread+0x4c7/0x586   ? __kasan_check_read+0x11/0x1f   kthread+0x285/0x294   ? __pfx_worker_thread+0x10/0x10   ? __pfx_kthread+0x10/0x10   ret_from_fork+0x29/0x6f   ? __pfx_kthread+0x10/0x10   ret_from_fork_asm+0x1b/0x30   </TASK>",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-02-27 02:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38227",
                                "url": "https://ubuntu.com/security/CVE-2025-38227",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  media: vidtv: Terminating the subsequent process of initialization failure  syzbot reported a slab-use-after-free Read in vidtv_mux_init. [1]  After PSI initialization fails, the si member is accessed again, resulting in this uaf.  After si initialization fails, the subsequent process needs to be exited.  [1] BUG: KASAN: slab-use-after-free in vidtv_mux_pid_ctx_init drivers/media/test-drivers/vidtv/vidtv_mux.c:78 [inline] BUG: KASAN: slab-use-after-free in vidtv_mux_init+0xac2/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:524 Read of size 8 at addr ffff88802fa42acc by task syz.2.37/6059  CPU: 0 UID: 0 PID: 6059 Comm: syz.2.37 Not tainted 6.14.0-rc5-syzkaller #0 Hardware name: Google Compute Engine, BIOS Google 02/12/2025 Call Trace: <TASK> __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:408 [inline] print_report+0xc3/0x670 mm/kasan/report.c:521 kasan_report+0xd9/0x110 mm/kasan/report.c:634 vidtv_mux_pid_ctx_init drivers/media/test-drivers/vidtv/vidtv_mux.c:78 vidtv_mux_init+0xac2/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:524 vidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194 vidtv_start_feed drivers/media/test-drivers/vidtv/vidtv_bridge.c:239 dmx_section_feed_start_filtering drivers/media/dvb-core/dvb_demux.c:973 dvb_dmxdev_feed_start drivers/media/dvb-core/dmxdev.c:508 [inline] dvb_dmxdev_feed_restart.isra.0 drivers/media/dvb-core/dmxdev.c:537 dvb_dmxdev_filter_stop+0x2b4/0x3a0 drivers/media/dvb-core/dmxdev.c:564 dvb_dmxdev_filter_free drivers/media/dvb-core/dmxdev.c:840 [inline] dvb_demux_release+0x92/0x550 drivers/media/dvb-core/dmxdev.c:1246 __fput+0x3ff/0xb70 fs/file_table.c:464 task_work_run+0x14e/0x250 kernel/task_work.c:227 exit_task_work include/linux/task_work.h:40 [inline] do_exit+0xad8/0x2d70 kernel/exit.c:938 do_group_exit+0xd3/0x2a0 kernel/exit.c:1087 __do_sys_exit_group kernel/exit.c:1098 [inline] __se_sys_exit_group kernel/exit.c:1096 [inline] __x64_sys_exit_group+0x3e/0x50 kernel/exit.c:1096 x64_sys_call+0x151f/0x1720 arch/x86/include/generated/asm/syscalls_64.h:232 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f871d58d169 Code: Unable to access opcode bytes at 0x7f871d58d13f. RSP: 002b:00007fff4b19a788 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f871d58d169 RDX: 0000000000000064 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 00007fff4b19a7ec R08: 0000000b4b19a87f R09: 00000000000927c0 R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000003 R13: 00000000000927c0 R14: 000000000001d553 R15: 00007fff4b19a840  </TASK>  Allocated by task 6059:  kasan_save_stack+0x33/0x60 mm/kasan/common.c:47  kasan_save_track+0x14/0x30 mm/kasan/common.c:68  poison_kmalloc_redzone mm/kasan/common.c:377 [inline]  __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:394  kmalloc_noprof include/linux/slab.h:901 [inline]  kzalloc_noprof include/linux/slab.h:1037 [inline]  vidtv_psi_pat_table_init drivers/media/test-drivers/vidtv/vidtv_psi.c:970  vidtv_channel_si_init drivers/media/test-drivers/vidtv/vidtv_channel.c:423  vidtv_mux_init drivers/media/test-drivers/vidtv/vidtv_mux.c:519  vidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194  vidtv_start_feed drivers/media/test-drivers/vidtv/vidtv_bridge.c:239  dmx_section_feed_start_filtering drivers/media/dvb-core/dvb_demux.c:973  dvb_dmxdev_feed_start drivers/media/dvb-core/dmxdev.c:508 [inline]  dvb_dmxdev_feed_restart.isra.0 drivers/media/dvb-core/dmxdev.c:537  dvb_dmxdev_filter_stop+0x2b4/0x3a0 drivers/media/dvb-core/dmxdev.c:564  dvb_dmxdev_filter_free drivers/media/dvb-core/dmxdev.c:840 [inline]  dvb_demux_release+0x92/0x550 drivers/media/dvb-core/dmxdev.c:1246  __fput+0x3ff/0xb70 fs/file_tabl ---truncated---",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-07-04 14:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38678",
                                "url": "https://ubuntu.com/security/CVE-2025-38678",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  netfilter: nf_tables: reject duplicate device on updates  A chain/flowtable update with duplicated devices in the same batch is possible. Unfortunately, netdev event path only removes the first device that is found, leaving unregistered the hook of the duplicated device.  Check if a duplicated device exists in the transaction batch, bail out with EEXIST in such case.  WARNING is hit when unregistering the hook:   [49042.221275] WARNING: CPU: 4 PID: 8425 at net/netfilter/core.c:340 nf_hook_entry_head+0xaa/0x150  [49042.221375] CPU: 4 UID: 0 PID: 8425 Comm: nft Tainted: G S                 6.16.0+ #170 PREEMPT(full)  [...]  [49042.221382] RIP: 0010:nf_hook_entry_head+0xaa/0x150",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-09-03 13:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38616",
                                "url": "https://ubuntu.com/security/CVE-2025-38616",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  tls: handle data disappearing from under the TLS ULP  TLS expects that it owns the receive queue of the TCP socket. This cannot be guaranteed in case the reader of the TCP socket entered before the TLS ULP was installed, or uses some non-standard read API (eg. zerocopy ones). Replace the WARN_ON() and a buggy early exit (which leaves anchor pointing to a freed skb) with real error handling. Wipe the parsing state and tell the reader to retry.  We already reload the anchor every time we (re)acquire the socket lock, so the only condition we need to avoid is an out of bounds read (not having enough bytes in the socket for previously parsed record len).  If some data was read from under TLS but there's enough in the queue we'll reload and decrypt what is most likely not a valid TLS record. Leading to some undefined behavior from TLS perspective (corrupting a stream? missing an alert? missing an attack?) but no kernel crash should take place.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-08-22 14:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-37838",
                                "url": "https://ubuntu.com/security/CVE-2025-37838",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  HSI: ssi_protocol: Fix use after free vulnerability in ssi_protocol Driver Due to Race Condition  In the ssi_protocol_probe() function, &ssi->work is bound with ssip_xmit_work(), In ssip_pn_setup(), the ssip_pn_xmit() function within the ssip_pn_ops structure is capable of starting the work.  If we remove the module which will call ssi_protocol_remove() to make a cleanup, it will free ssi through kfree(ssi), while the work mentioned above will be used. The sequence of operations that may lead to a UAF bug is as follows:  CPU0                                    CPU1                          | ssip_xmit_work ssi_protocol_remove     | kfree(ssi);             |                         | struct hsi_client *cl = ssi->cl;                         | // use ssi  Fix it by ensuring that the work is canceled before proceeding with the cleanup in ssi_protocol_remove().",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-04-18 15:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-40300",
                                "url": "https://ubuntu.com/security/CVE-2025-40300",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  x86/vmscape: Add conditional IBPB mitigation  VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace hypervisor (like QEMU). Existing mitigations already protect kernel/KVM from a malicious guest. Userspace can additionally be protected by flushing the branch predictors after a VMexit.  Since it is the userspace that consumes the poisoned branch predictors, conditionally issue an IBPB after a VMexit and before returning to userspace. Workloads that frequently switch between hypervisor and userspace will incur the most overhead from the new IBPB.  This new IBPB is not integrated with the existing IBPB sites. For instance, a task can use the existing speculation control prctl() to get an IBPB at context switch time. With this implementation, the IBPB is doubled up: one at context switch and another before running userspace.  The intent is to integrate and optimize these cases post-embargo.  [ dhansen: elaborate on suboptimal IBPB solution ]",
                                "cve_priority": "high",
                                "cve_public_date": "2025-09-11 17:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38352",
                                "url": "https://ubuntu.com/security/CVE-2025-38352",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del()  If an exiting non-autoreaping task has already passed exit_notify() and calls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent or debugger right after unlock_task_sighand().  If a concurrent posix_cpu_timer_del() runs at that moment, it won't be able to detect timer->it.cpu.firing != 0: cpu_timer_task_rcu() and/or lock_task_sighand() will fail.  Add the tsk->exit_state check into run_posix_cpu_timers() to fix this.  This fix is not needed if CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y, because exit_task_work() is called before exit_notify(). But the check still makes sense, task_work_add(&tsk->posix_cputimers_work.work) will fail anyway in this case.",
                                "cve_priority": "high",
                                "cve_public_date": "2025-07-22 08:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38118",
                                "url": "https://ubuntu.com/security/CVE-2025-38118",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  Bluetooth: MGMT: Fix UAF on mgmt_remove_adv_monitor_complete  This reworks MGMT_OP_REMOVE_ADV_MONITOR to not use mgmt_pending_add to avoid crashes like bellow:  ================================================================== BUG: KASAN: slab-use-after-free in mgmt_remove_adv_monitor_complete+0xe5/0x540 net/bluetooth/mgmt.c:5406 Read of size 8 at addr ffff88801c53f318 by task kworker/u5:5/5341  CPU: 0 UID: 0 PID: 5341 Comm: kworker/u5:5 Not tainted 6.15.0-syzkaller-10402-g4cb6c8af8591 #0 PREEMPT(full) Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014 Workqueue: hci0 hci_cmd_sync_work Call Trace:  <TASK>  dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120  print_address_description mm/kasan/report.c:408 [inline]  print_report+0xd2/0x2b0 mm/kasan/report.c:521  kasan_report+0x118/0x150 mm/kasan/report.c:634  mgmt_remove_adv_monitor_complete+0xe5/0x540 net/bluetooth/mgmt.c:5406  hci_cmd_sync_work+0x261/0x3a0 net/bluetooth/hci_sync.c:334  process_one_work kernel/workqueue.c:3238 [inline]  process_scheduled_works+0xade/0x17b0 kernel/workqueue.c:3321  worker_thread+0x8a0/0xda0 kernel/workqueue.c:3402  kthread+0x711/0x8a0 kernel/kthread.c:464  ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245  </TASK>  Allocated by task 5987:  kasan_save_stack mm/kasan/common.c:47 [inline]  kasan_save_track+0x3e/0x80 mm/kasan/common.c:68  poison_kmalloc_redzone mm/kasan/common.c:377 [inline]  __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:394  kasan_kmalloc include/linux/kasan.h:260 [inline]  __kmalloc_cache_noprof+0x230/0x3d0 mm/slub.c:4358  kmalloc_noprof include/linux/slab.h:905 [inline]  kzalloc_noprof include/linux/slab.h:1039 [inline]  mgmt_pending_new+0x65/0x240 net/bluetooth/mgmt_util.c:252  mgmt_pending_add+0x34/0x120 net/bluetooth/mgmt_util.c:279  remove_adv_monitor+0x103/0x1b0 net/bluetooth/mgmt.c:5454  hci_mgmt_cmd+0x9c9/0xef0 net/bluetooth/hci_sock.c:1719  hci_sock_sendmsg+0x6ca/0xef0 net/bluetooth/hci_sock.c:1839  sock_sendmsg_nosec net/socket.c:712 [inline]  __sock_sendmsg+0x219/0x270 net/socket.c:727  sock_write_iter+0x258/0x330 net/socket.c:1131  new_sync_write fs/read_write.c:593 [inline]  vfs_write+0x548/0xa90 fs/read_write.c:686  ksys_write+0x145/0x250 fs/read_write.c:738  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]  do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94  entry_SYSCALL_64_after_hwframe+0x77/0x7f  Freed by task 5989:  kasan_save_stack mm/kasan/common.c:47 [inline]  kasan_save_track+0x3e/0x80 mm/kasan/common.c:68  kasan_save_free_info+0x46/0x50 mm/kasan/generic.c:576  poison_slab_object mm/kasan/common.c:247 [inline]  __kasan_slab_free+0x62/0x70 mm/kasan/common.c:264  kasan_slab_free include/linux/kasan.h:233 [inline]  slab_free_hook mm/slub.c:2380 [inline]  slab_free mm/slub.c:4642 [inline]  kfree+0x18e/0x440 mm/slub.c:4841  mgmt_pending_foreach+0xc9/0x120 net/bluetooth/mgmt_util.c:242  mgmt_index_removed+0x10d/0x2f0 net/bluetooth/mgmt.c:9366  hci_sock_bind+0xbe9/0x1000 net/bluetooth/hci_sock.c:1314  __sys_bind_socket net/socket.c:1810 [inline]  __sys_bind+0x2c3/0x3e0 net/socket.c:1841  __do_sys_bind net/socket.c:1846 [inline]  __se_sys_bind net/socket.c:1844 [inline]  __x64_sys_bind+0x7a/0x90 net/socket.c:1844  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]  do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94  entry_SYSCALL_64_after_hwframe+0x77/0x7f",
                                "cve_priority": "high",
                                "cve_public_date": "2025-07-03 09:15:00 UTC"
                            }
                        ],
                        "log": [
                            "",
                            "  * noble/linux: 6.8.0-88.89 -proposed tracker (LP: #2127619)",
                            "",
                            "  *  Enable Xilinx PS UART configs (LP: #2121337)",
                            "    - [Config] Enable Xilinx PS UART configs",
                            "",
                            "  * Fix ARL-U/H suspend issues (LP: #2112469)",
                            "    - platform/x86/intel/pmc: Add Arrow Lake U/H support to intel_pmc_core",
                            "      driver",
                            "    - platform/x86/intel/pmc: Fix Arrow Lake U/H NPU PCI ID",
                            "",
                            "  * r8169 can not wake on LAN via SFP moudule (LP: #2123901)",
                            "    - r8169: set EEE speed down ratio to 1",
                            "",
                            "  * Add pvpanic kernel modules to linux-modules (LP: #2126659)",
                            "    - [Packaging] Add pvpanic kernel modules to linux-modules",
                            "",
                            "  * CVE-2025-21729",
                            "    - wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion",
                            "",
                            "  * Fix failure to build TDX module (LP: #2126698)",
                            "    - x86/paravirt: Move halt paravirt calls under CONFIG_PARAVIRT",
                            "",
                            "  * Ubuntu 24.04.2: error in audit_log_object_context keep printing in the",
                            "    kernel and console (LP: #2123815)",
                            "    - SAUCE: fix: apparmor4.0.0 [26/90]: LSM stacking v39: Audit: Add record",
                            "      for multiple object contexts",
                            "",
                            "  * ensure mptcp keepalives are honored when set (LP: #2125444)",
                            "    - mptcp: sockopt: make sync_socket_options propagate SOCK_KEEPOPEN",
                            "",
                            "  * System hangs when running the memory stress test (LP: #2103680)",
                            "    - mm: page_alloc: avoid kswapd thrashing due to NUMA restrictions",
                            "",
                            "  * UBUNTU: fan: fail to check kmalloc() return could cause a NULL pointer",
                            "    dereference (LP: #2125053)",
                            "    - SAUCE: fan: vxlan: check memory allocation for map",
                            "",
                            "  * jammy:linux-riscv-6.8 is FTBFS because of wrong include (LP: #2122592)",
                            "    - SAUCE: riscv: KVM: Remove broken include",
                            "",
                            "  * Performance degrades rapidly when spawning more processes to run benchmark",
                            "    (LP: #2122006)",
                            "    - cpuidle: menu: Avoid discarding useful information",
                            "    - cpuidle: governors: menu: Avoid using invalid recent intervals data",
                            "",
                            "  * CVE-2025-38227",
                            "    - media: vidtv: Terminating the subsequent process of initialization",
                            "      failure",
                            "",
                            "  * CVE-2025-38678",
                            "    - netfilter: nf_tables: reject duplicate device on updates",
                            "",
                            "  * CVE-2025-38616",
                            "    - tls: handle data disappearing from under the TLS ULP",
                            "",
                            "  * CVE-2025-37838",
                            "    - HSI: ssi_protocol: Fix use after free vulnerability in ssi_protocol",
                            "      Driver Due to Race Condition",
                            "",
                            "  * VMSCAPE CVE-2025-40300 (LP: #2124105) // CVE-2025-40300",
                            "    - Documentation/hw-vuln: Add VMSCAPE documentation",
                            "    - x86/vmscape: Enumerate VMSCAPE bug",
                            "    - x86/vmscape: Add conditional IBPB mitigation",
                            "    - x86/vmscape: Enable the mitigation",
                            "    - x86/bugs: Move cpu_bugs_smt_update() down",
                            "    - x86/vmscape: Warn when STIBP is disabled with SMT",
                            "    - x86/vmscape: Add old Intel CPUs to affected list",
                            "",
                            "  * VMSCAPE CVE-2025-40300 (LP: #2124105)",
                            "    - [Config] Enable MITIGATION_VMSCAPE config",
                            "",
                            "  * CVE-2025-38352",
                            "    - posix-cpu-timers: fix race between handle_posix_cpu_timers() and",
                            "      posix_cpu_timer_del()",
                            "",
                            "  * CVE-2025-38118",
                            "    - Bluetooth: MGMT: Fix UAF on mgmt_remove_adv_monitor_complete",
                            "    - Bluetooth: MGMT: Fix sparse errors",
                            ""
                        ],
                        "package": "linux",
                        "version": "6.8.0-88.89",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2127619,
                            2121337,
                            2112469,
                            2123901,
                            2126659,
                            2126698,
                            2123815,
                            2125444,
                            2103680,
                            2125053,
                            2122592,
                            2122006,
                            2124105,
                            2124105
                        ],
                        "author": "Edoardo Canepa <edoardo.canepa@canonical.com>",
                        "date": "Sat, 11 Oct 2025 01:38:46 +0200"
                    }
                ],
                "notes": "linux-modules-6.8.0-88-generic version '6.8.0-88.89' (source package linux version '6.8.0-88.89') was added. linux-modules-6.8.0-88-generic version '6.8.0-88.89' has the same source package name, linux, as removed package linux-headers-6.8.0-87. As such we can use the source package version of the removed package, '6.8.0-87.88', as the starting point in our changelog diff. Kernel packages are an example of where the binary package name changes for the same source package. Using the removed package source package version as our starting point means we can still get meaningful changelog diffs even for what appears to be a new package.",
                "is_version_downgrade": false
            },
            {
                "name": "linux-tools-6.8.0-88",
                "from_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.8.0-87.88",
                    "version": null
                },
                "to_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.8.0-88.89",
                    "version": "6.8.0-88.89"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-21729",
                        "url": "https://ubuntu.com/security/CVE-2025-21729",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion  The rtwdev->scanning flag isn't protected by mutex originally, so cancel_hw_scan can pass the condition, but suddenly hw_scan completion unset the flag and calls ieee80211_scan_completed() that will free local->hw_scan_req. Then, cancel_hw_scan raises null-ptr-deref and use-after-free. Fix it by moving the check condition to where protected by mutex.   KASAN: null-ptr-deref in range [0x0000000000000088-0x000000000000008f]  CPU: 2 PID: 6922 Comm: kworker/2:2 Tainted: G           OE  Hardware name: LENOVO 2356AD1/2356AD1, BIOS G7ETB6WW (2.76 ) 09/10/2019  Workqueue: events cfg80211_conn_work [cfg80211]  RIP: 0010:rtw89_fw_h2c_scan_offload_be+0xc33/0x13c3 [rtw89_core]  Code: 00 45 89 6c 24 1c 0f 85 23 01 00 00 48 8b 85 20 ff ff ff 48 8d  RSP: 0018:ffff88811fd9f068 EFLAGS: 00010206  RAX: dffffc0000000000 RBX: ffff88811fd9f258 RCX: 0000000000000001  RDX: 0000000000000011 RSI: 0000000000000001 RDI: 0000000000000089  RBP: ffff88811fd9f170 R08: 0000000000000000 R09: 0000000000000000  R10: ffff88811fd9f108 R11: 0000000000000000 R12: ffff88810e47f960  R13: 0000000000000000 R14: 000000000000ffff R15: 0000000000000000  FS:  0000000000000000(0000) GS:ffff8881d6f00000(0000) knlGS:0000000000000000  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033  CR2: 00007531dfca55b0 CR3: 00000001be296004 CR4: 00000000001706e0  Call Trace:   <TASK>   ? show_regs+0x61/0x73   ? __die_body+0x20/0x73   ? die_addr+0x4f/0x7b   ? exc_general_protection+0x191/0x1db   ? asm_exc_general_protection+0x27/0x30   ? rtw89_fw_h2c_scan_offload_be+0xc33/0x13c3 [rtw89_core]   ? rtw89_fw_h2c_scan_offload_be+0x458/0x13c3 [rtw89_core]   ? __pfx_rtw89_fw_h2c_scan_offload_be+0x10/0x10 [rtw89_core]   ? do_raw_spin_lock+0x75/0xdb   ? __pfx_do_raw_spin_lock+0x10/0x10   rtw89_hw_scan_offload+0xb5e/0xbf7 [rtw89_core]   ? _raw_spin_unlock+0xe/0x24   ? __mutex_lock.constprop.0+0x40c/0x471   ? __pfx_rtw89_hw_scan_offload+0x10/0x10 [rtw89_core]   ? __mutex_lock_slowpath+0x13/0x1f   ? mutex_lock+0xa2/0xdc   ? __pfx_mutex_lock+0x10/0x10   rtw89_hw_scan_abort+0x58/0xb7 [rtw89_core]   rtw89_ops_cancel_hw_scan+0x120/0x13b [rtw89_core]   ieee80211_scan_cancel+0x468/0x4d0 [mac80211]   ieee80211_prep_connection+0x858/0x899 [mac80211]   ieee80211_mgd_auth+0xbea/0xdde [mac80211]   ? __pfx_ieee80211_mgd_auth+0x10/0x10 [mac80211]   ? cfg80211_find_elem+0x15/0x29 [cfg80211]   ? is_bss+0x1b7/0x1d7 [cfg80211]   ieee80211_auth+0x18/0x27 [mac80211]   cfg80211_mlme_auth+0x3bb/0x3e7 [cfg80211]   cfg80211_conn_do_work+0x410/0xb81 [cfg80211]   ? __pfx_cfg80211_conn_do_work+0x10/0x10 [cfg80211]   ? __kasan_check_read+0x11/0x1f   ? psi_group_change+0x8bc/0x944   ? __kasan_check_write+0x14/0x22   ? mutex_lock+0x8e/0xdc   ? __pfx_mutex_lock+0x10/0x10   ? __pfx___radix_tree_lookup+0x10/0x10   cfg80211_conn_work+0x245/0x34d [cfg80211]   ? __pfx_cfg80211_conn_work+0x10/0x10 [cfg80211]   ? update_cfs_rq_load_avg+0x3bc/0x3d7   ? sched_clock_noinstr+0x9/0x1a   ? sched_clock+0x10/0x24   ? sched_clock_cpu+0x7e/0x42e   ? newidle_balance+0x796/0x937   ? __pfx_sched_clock_cpu+0x10/0x10   ? __pfx_newidle_balance+0x10/0x10   ? __kasan_check_read+0x11/0x1f   ? psi_group_change+0x8bc/0x944   ? _raw_spin_unlock+0xe/0x24   ? raw_spin_rq_unlock+0x47/0x54   ? raw_spin_rq_unlock_irq+0x9/0x1f   ? finish_task_switch.isra.0+0x347/0x586   ? __schedule+0x27bf/0x2892   ? mutex_unlock+0x80/0xd0   ? do_raw_spin_lock+0x75/0xdb   ? __pfx___schedule+0x10/0x10   process_scheduled_works+0x58c/0x821   worker_thread+0x4c7/0x586   ? __kasan_check_read+0x11/0x1f   kthread+0x285/0x294   ? __pfx_worker_thread+0x10/0x10   ? __pfx_kthread+0x10/0x10   ret_from_fork+0x29/0x6f   ? __pfx_kthread+0x10/0x10   ret_from_fork_asm+0x1b/0x30   </TASK>",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-02-27 02:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38227",
                        "url": "https://ubuntu.com/security/CVE-2025-38227",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  media: vidtv: Terminating the subsequent process of initialization failure  syzbot reported a slab-use-after-free Read in vidtv_mux_init. [1]  After PSI initialization fails, the si member is accessed again, resulting in this uaf.  After si initialization fails, the subsequent process needs to be exited.  [1] BUG: KASAN: slab-use-after-free in vidtv_mux_pid_ctx_init drivers/media/test-drivers/vidtv/vidtv_mux.c:78 [inline] BUG: KASAN: slab-use-after-free in vidtv_mux_init+0xac2/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:524 Read of size 8 at addr ffff88802fa42acc by task syz.2.37/6059  CPU: 0 UID: 0 PID: 6059 Comm: syz.2.37 Not tainted 6.14.0-rc5-syzkaller #0 Hardware name: Google Compute Engine, BIOS Google 02/12/2025 Call Trace: <TASK> __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:408 [inline] print_report+0xc3/0x670 mm/kasan/report.c:521 kasan_report+0xd9/0x110 mm/kasan/report.c:634 vidtv_mux_pid_ctx_init drivers/media/test-drivers/vidtv/vidtv_mux.c:78 vidtv_mux_init+0xac2/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:524 vidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194 vidtv_start_feed drivers/media/test-drivers/vidtv/vidtv_bridge.c:239 dmx_section_feed_start_filtering drivers/media/dvb-core/dvb_demux.c:973 dvb_dmxdev_feed_start drivers/media/dvb-core/dmxdev.c:508 [inline] dvb_dmxdev_feed_restart.isra.0 drivers/media/dvb-core/dmxdev.c:537 dvb_dmxdev_filter_stop+0x2b4/0x3a0 drivers/media/dvb-core/dmxdev.c:564 dvb_dmxdev_filter_free drivers/media/dvb-core/dmxdev.c:840 [inline] dvb_demux_release+0x92/0x550 drivers/media/dvb-core/dmxdev.c:1246 __fput+0x3ff/0xb70 fs/file_table.c:464 task_work_run+0x14e/0x250 kernel/task_work.c:227 exit_task_work include/linux/task_work.h:40 [inline] do_exit+0xad8/0x2d70 kernel/exit.c:938 do_group_exit+0xd3/0x2a0 kernel/exit.c:1087 __do_sys_exit_group kernel/exit.c:1098 [inline] __se_sys_exit_group kernel/exit.c:1096 [inline] __x64_sys_exit_group+0x3e/0x50 kernel/exit.c:1096 x64_sys_call+0x151f/0x1720 arch/x86/include/generated/asm/syscalls_64.h:232 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f871d58d169 Code: Unable to access opcode bytes at 0x7f871d58d13f. RSP: 002b:00007fff4b19a788 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f871d58d169 RDX: 0000000000000064 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 00007fff4b19a7ec R08: 0000000b4b19a87f R09: 00000000000927c0 R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000003 R13: 00000000000927c0 R14: 000000000001d553 R15: 00007fff4b19a840  </TASK>  Allocated by task 6059:  kasan_save_stack+0x33/0x60 mm/kasan/common.c:47  kasan_save_track+0x14/0x30 mm/kasan/common.c:68  poison_kmalloc_redzone mm/kasan/common.c:377 [inline]  __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:394  kmalloc_noprof include/linux/slab.h:901 [inline]  kzalloc_noprof include/linux/slab.h:1037 [inline]  vidtv_psi_pat_table_init drivers/media/test-drivers/vidtv/vidtv_psi.c:970  vidtv_channel_si_init drivers/media/test-drivers/vidtv/vidtv_channel.c:423  vidtv_mux_init drivers/media/test-drivers/vidtv/vidtv_mux.c:519  vidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194  vidtv_start_feed drivers/media/test-drivers/vidtv/vidtv_bridge.c:239  dmx_section_feed_start_filtering drivers/media/dvb-core/dvb_demux.c:973  dvb_dmxdev_feed_start drivers/media/dvb-core/dmxdev.c:508 [inline]  dvb_dmxdev_feed_restart.isra.0 drivers/media/dvb-core/dmxdev.c:537  dvb_dmxdev_filter_stop+0x2b4/0x3a0 drivers/media/dvb-core/dmxdev.c:564  dvb_dmxdev_filter_free drivers/media/dvb-core/dmxdev.c:840 [inline]  dvb_demux_release+0x92/0x550 drivers/media/dvb-core/dmxdev.c:1246  __fput+0x3ff/0xb70 fs/file_tabl ---truncated---",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-07-04 14:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38678",
                        "url": "https://ubuntu.com/security/CVE-2025-38678",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  netfilter: nf_tables: reject duplicate device on updates  A chain/flowtable update with duplicated devices in the same batch is possible. Unfortunately, netdev event path only removes the first device that is found, leaving unregistered the hook of the duplicated device.  Check if a duplicated device exists in the transaction batch, bail out with EEXIST in such case.  WARNING is hit when unregistering the hook:   [49042.221275] WARNING: CPU: 4 PID: 8425 at net/netfilter/core.c:340 nf_hook_entry_head+0xaa/0x150  [49042.221375] CPU: 4 UID: 0 PID: 8425 Comm: nft Tainted: G S                 6.16.0+ #170 PREEMPT(full)  [...]  [49042.221382] RIP: 0010:nf_hook_entry_head+0xaa/0x150",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-09-03 13:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38616",
                        "url": "https://ubuntu.com/security/CVE-2025-38616",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  tls: handle data disappearing from under the TLS ULP  TLS expects that it owns the receive queue of the TCP socket. This cannot be guaranteed in case the reader of the TCP socket entered before the TLS ULP was installed, or uses some non-standard read API (eg. zerocopy ones). Replace the WARN_ON() and a buggy early exit (which leaves anchor pointing to a freed skb) with real error handling. Wipe the parsing state and tell the reader to retry.  We already reload the anchor every time we (re)acquire the socket lock, so the only condition we need to avoid is an out of bounds read (not having enough bytes in the socket for previously parsed record len).  If some data was read from under TLS but there's enough in the queue we'll reload and decrypt what is most likely not a valid TLS record. Leading to some undefined behavior from TLS perspective (corrupting a stream? missing an alert? missing an attack?) but no kernel crash should take place.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-08-22 14:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-37838",
                        "url": "https://ubuntu.com/security/CVE-2025-37838",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  HSI: ssi_protocol: Fix use after free vulnerability in ssi_protocol Driver Due to Race Condition  In the ssi_protocol_probe() function, &ssi->work is bound with ssip_xmit_work(), In ssip_pn_setup(), the ssip_pn_xmit() function within the ssip_pn_ops structure is capable of starting the work.  If we remove the module which will call ssi_protocol_remove() to make a cleanup, it will free ssi through kfree(ssi), while the work mentioned above will be used. The sequence of operations that may lead to a UAF bug is as follows:  CPU0                                    CPU1                          | ssip_xmit_work ssi_protocol_remove     | kfree(ssi);             |                         | struct hsi_client *cl = ssi->cl;                         | // use ssi  Fix it by ensuring that the work is canceled before proceeding with the cleanup in ssi_protocol_remove().",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-04-18 15:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-40300",
                        "url": "https://ubuntu.com/security/CVE-2025-40300",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  x86/vmscape: Add conditional IBPB mitigation  VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace hypervisor (like QEMU). Existing mitigations already protect kernel/KVM from a malicious guest. Userspace can additionally be protected by flushing the branch predictors after a VMexit.  Since it is the userspace that consumes the poisoned branch predictors, conditionally issue an IBPB after a VMexit and before returning to userspace. Workloads that frequently switch between hypervisor and userspace will incur the most overhead from the new IBPB.  This new IBPB is not integrated with the existing IBPB sites. For instance, a task can use the existing speculation control prctl() to get an IBPB at context switch time. With this implementation, the IBPB is doubled up: one at context switch and another before running userspace.  The intent is to integrate and optimize these cases post-embargo.  [ dhansen: elaborate on suboptimal IBPB solution ]",
                        "cve_priority": "high",
                        "cve_public_date": "2025-09-11 17:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38352",
                        "url": "https://ubuntu.com/security/CVE-2025-38352",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del()  If an exiting non-autoreaping task has already passed exit_notify() and calls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent or debugger right after unlock_task_sighand().  If a concurrent posix_cpu_timer_del() runs at that moment, it won't be able to detect timer->it.cpu.firing != 0: cpu_timer_task_rcu() and/or lock_task_sighand() will fail.  Add the tsk->exit_state check into run_posix_cpu_timers() to fix this.  This fix is not needed if CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y, because exit_task_work() is called before exit_notify(). But the check still makes sense, task_work_add(&tsk->posix_cputimers_work.work) will fail anyway in this case.",
                        "cve_priority": "high",
                        "cve_public_date": "2025-07-22 08:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38118",
                        "url": "https://ubuntu.com/security/CVE-2025-38118",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  Bluetooth: MGMT: Fix UAF on mgmt_remove_adv_monitor_complete  This reworks MGMT_OP_REMOVE_ADV_MONITOR to not use mgmt_pending_add to avoid crashes like bellow:  ================================================================== BUG: KASAN: slab-use-after-free in mgmt_remove_adv_monitor_complete+0xe5/0x540 net/bluetooth/mgmt.c:5406 Read of size 8 at addr ffff88801c53f318 by task kworker/u5:5/5341  CPU: 0 UID: 0 PID: 5341 Comm: kworker/u5:5 Not tainted 6.15.0-syzkaller-10402-g4cb6c8af8591 #0 PREEMPT(full) Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014 Workqueue: hci0 hci_cmd_sync_work Call Trace:  <TASK>  dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120  print_address_description mm/kasan/report.c:408 [inline]  print_report+0xd2/0x2b0 mm/kasan/report.c:521  kasan_report+0x118/0x150 mm/kasan/report.c:634  mgmt_remove_adv_monitor_complete+0xe5/0x540 net/bluetooth/mgmt.c:5406  hci_cmd_sync_work+0x261/0x3a0 net/bluetooth/hci_sync.c:334  process_one_work kernel/workqueue.c:3238 [inline]  process_scheduled_works+0xade/0x17b0 kernel/workqueue.c:3321  worker_thread+0x8a0/0xda0 kernel/workqueue.c:3402  kthread+0x711/0x8a0 kernel/kthread.c:464  ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245  </TASK>  Allocated by task 5987:  kasan_save_stack mm/kasan/common.c:47 [inline]  kasan_save_track+0x3e/0x80 mm/kasan/common.c:68  poison_kmalloc_redzone mm/kasan/common.c:377 [inline]  __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:394  kasan_kmalloc include/linux/kasan.h:260 [inline]  __kmalloc_cache_noprof+0x230/0x3d0 mm/slub.c:4358  kmalloc_noprof include/linux/slab.h:905 [inline]  kzalloc_noprof include/linux/slab.h:1039 [inline]  mgmt_pending_new+0x65/0x240 net/bluetooth/mgmt_util.c:252  mgmt_pending_add+0x34/0x120 net/bluetooth/mgmt_util.c:279  remove_adv_monitor+0x103/0x1b0 net/bluetooth/mgmt.c:5454  hci_mgmt_cmd+0x9c9/0xef0 net/bluetooth/hci_sock.c:1719  hci_sock_sendmsg+0x6ca/0xef0 net/bluetooth/hci_sock.c:1839  sock_sendmsg_nosec net/socket.c:712 [inline]  __sock_sendmsg+0x219/0x270 net/socket.c:727  sock_write_iter+0x258/0x330 net/socket.c:1131  new_sync_write fs/read_write.c:593 [inline]  vfs_write+0x548/0xa90 fs/read_write.c:686  ksys_write+0x145/0x250 fs/read_write.c:738  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]  do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94  entry_SYSCALL_64_after_hwframe+0x77/0x7f  Freed by task 5989:  kasan_save_stack mm/kasan/common.c:47 [inline]  kasan_save_track+0x3e/0x80 mm/kasan/common.c:68  kasan_save_free_info+0x46/0x50 mm/kasan/generic.c:576  poison_slab_object mm/kasan/common.c:247 [inline]  __kasan_slab_free+0x62/0x70 mm/kasan/common.c:264  kasan_slab_free include/linux/kasan.h:233 [inline]  slab_free_hook mm/slub.c:2380 [inline]  slab_free mm/slub.c:4642 [inline]  kfree+0x18e/0x440 mm/slub.c:4841  mgmt_pending_foreach+0xc9/0x120 net/bluetooth/mgmt_util.c:242  mgmt_index_removed+0x10d/0x2f0 net/bluetooth/mgmt.c:9366  hci_sock_bind+0xbe9/0x1000 net/bluetooth/hci_sock.c:1314  __sys_bind_socket net/socket.c:1810 [inline]  __sys_bind+0x2c3/0x3e0 net/socket.c:1841  __do_sys_bind net/socket.c:1846 [inline]  __se_sys_bind net/socket.c:1844 [inline]  __x64_sys_bind+0x7a/0x90 net/socket.c:1844  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]  do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94  entry_SYSCALL_64_after_hwframe+0x77/0x7f",
                        "cve_priority": "high",
                        "cve_public_date": "2025-07-03 09:15:00 UTC"
                    }
                ],
                "launchpad_bugs_fixed": [
                    2127619,
                    2121337,
                    2112469,
                    2123901,
                    2126659,
                    2126698,
                    2123815,
                    2125444,
                    2103680,
                    2125053,
                    2122592,
                    2122006,
                    2124105,
                    2124105
                ],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-21729",
                                "url": "https://ubuntu.com/security/CVE-2025-21729",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion  The rtwdev->scanning flag isn't protected by mutex originally, so cancel_hw_scan can pass the condition, but suddenly hw_scan completion unset the flag and calls ieee80211_scan_completed() that will free local->hw_scan_req. Then, cancel_hw_scan raises null-ptr-deref and use-after-free. Fix it by moving the check condition to where protected by mutex.   KASAN: null-ptr-deref in range [0x0000000000000088-0x000000000000008f]  CPU: 2 PID: 6922 Comm: kworker/2:2 Tainted: G           OE  Hardware name: LENOVO 2356AD1/2356AD1, BIOS G7ETB6WW (2.76 ) 09/10/2019  Workqueue: events cfg80211_conn_work [cfg80211]  RIP: 0010:rtw89_fw_h2c_scan_offload_be+0xc33/0x13c3 [rtw89_core]  Code: 00 45 89 6c 24 1c 0f 85 23 01 00 00 48 8b 85 20 ff ff ff 48 8d  RSP: 0018:ffff88811fd9f068 EFLAGS: 00010206  RAX: dffffc0000000000 RBX: ffff88811fd9f258 RCX: 0000000000000001  RDX: 0000000000000011 RSI: 0000000000000001 RDI: 0000000000000089  RBP: ffff88811fd9f170 R08: 0000000000000000 R09: 0000000000000000  R10: ffff88811fd9f108 R11: 0000000000000000 R12: ffff88810e47f960  R13: 0000000000000000 R14: 000000000000ffff R15: 0000000000000000  FS:  0000000000000000(0000) GS:ffff8881d6f00000(0000) knlGS:0000000000000000  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033  CR2: 00007531dfca55b0 CR3: 00000001be296004 CR4: 00000000001706e0  Call Trace:   <TASK>   ? show_regs+0x61/0x73   ? __die_body+0x20/0x73   ? die_addr+0x4f/0x7b   ? exc_general_protection+0x191/0x1db   ? asm_exc_general_protection+0x27/0x30   ? rtw89_fw_h2c_scan_offload_be+0xc33/0x13c3 [rtw89_core]   ? rtw89_fw_h2c_scan_offload_be+0x458/0x13c3 [rtw89_core]   ? __pfx_rtw89_fw_h2c_scan_offload_be+0x10/0x10 [rtw89_core]   ? do_raw_spin_lock+0x75/0xdb   ? __pfx_do_raw_spin_lock+0x10/0x10   rtw89_hw_scan_offload+0xb5e/0xbf7 [rtw89_core]   ? _raw_spin_unlock+0xe/0x24   ? __mutex_lock.constprop.0+0x40c/0x471   ? __pfx_rtw89_hw_scan_offload+0x10/0x10 [rtw89_core]   ? __mutex_lock_slowpath+0x13/0x1f   ? mutex_lock+0xa2/0xdc   ? __pfx_mutex_lock+0x10/0x10   rtw89_hw_scan_abort+0x58/0xb7 [rtw89_core]   rtw89_ops_cancel_hw_scan+0x120/0x13b [rtw89_core]   ieee80211_scan_cancel+0x468/0x4d0 [mac80211]   ieee80211_prep_connection+0x858/0x899 [mac80211]   ieee80211_mgd_auth+0xbea/0xdde [mac80211]   ? __pfx_ieee80211_mgd_auth+0x10/0x10 [mac80211]   ? cfg80211_find_elem+0x15/0x29 [cfg80211]   ? is_bss+0x1b7/0x1d7 [cfg80211]   ieee80211_auth+0x18/0x27 [mac80211]   cfg80211_mlme_auth+0x3bb/0x3e7 [cfg80211]   cfg80211_conn_do_work+0x410/0xb81 [cfg80211]   ? __pfx_cfg80211_conn_do_work+0x10/0x10 [cfg80211]   ? __kasan_check_read+0x11/0x1f   ? psi_group_change+0x8bc/0x944   ? __kasan_check_write+0x14/0x22   ? mutex_lock+0x8e/0xdc   ? __pfx_mutex_lock+0x10/0x10   ? __pfx___radix_tree_lookup+0x10/0x10   cfg80211_conn_work+0x245/0x34d [cfg80211]   ? __pfx_cfg80211_conn_work+0x10/0x10 [cfg80211]   ? update_cfs_rq_load_avg+0x3bc/0x3d7   ? sched_clock_noinstr+0x9/0x1a   ? sched_clock+0x10/0x24   ? sched_clock_cpu+0x7e/0x42e   ? newidle_balance+0x796/0x937   ? __pfx_sched_clock_cpu+0x10/0x10   ? __pfx_newidle_balance+0x10/0x10   ? __kasan_check_read+0x11/0x1f   ? psi_group_change+0x8bc/0x944   ? _raw_spin_unlock+0xe/0x24   ? raw_spin_rq_unlock+0x47/0x54   ? raw_spin_rq_unlock_irq+0x9/0x1f   ? finish_task_switch.isra.0+0x347/0x586   ? __schedule+0x27bf/0x2892   ? mutex_unlock+0x80/0xd0   ? do_raw_spin_lock+0x75/0xdb   ? __pfx___schedule+0x10/0x10   process_scheduled_works+0x58c/0x821   worker_thread+0x4c7/0x586   ? __kasan_check_read+0x11/0x1f   kthread+0x285/0x294   ? __pfx_worker_thread+0x10/0x10   ? __pfx_kthread+0x10/0x10   ret_from_fork+0x29/0x6f   ? __pfx_kthread+0x10/0x10   ret_from_fork_asm+0x1b/0x30   </TASK>",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-02-27 02:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38227",
                                "url": "https://ubuntu.com/security/CVE-2025-38227",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  media: vidtv: Terminating the subsequent process of initialization failure  syzbot reported a slab-use-after-free Read in vidtv_mux_init. [1]  After PSI initialization fails, the si member is accessed again, resulting in this uaf.  After si initialization fails, the subsequent process needs to be exited.  [1] BUG: KASAN: slab-use-after-free in vidtv_mux_pid_ctx_init drivers/media/test-drivers/vidtv/vidtv_mux.c:78 [inline] BUG: KASAN: slab-use-after-free in vidtv_mux_init+0xac2/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:524 Read of size 8 at addr ffff88802fa42acc by task syz.2.37/6059  CPU: 0 UID: 0 PID: 6059 Comm: syz.2.37 Not tainted 6.14.0-rc5-syzkaller #0 Hardware name: Google Compute Engine, BIOS Google 02/12/2025 Call Trace: <TASK> __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:408 [inline] print_report+0xc3/0x670 mm/kasan/report.c:521 kasan_report+0xd9/0x110 mm/kasan/report.c:634 vidtv_mux_pid_ctx_init drivers/media/test-drivers/vidtv/vidtv_mux.c:78 vidtv_mux_init+0xac2/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:524 vidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194 vidtv_start_feed drivers/media/test-drivers/vidtv/vidtv_bridge.c:239 dmx_section_feed_start_filtering drivers/media/dvb-core/dvb_demux.c:973 dvb_dmxdev_feed_start drivers/media/dvb-core/dmxdev.c:508 [inline] dvb_dmxdev_feed_restart.isra.0 drivers/media/dvb-core/dmxdev.c:537 dvb_dmxdev_filter_stop+0x2b4/0x3a0 drivers/media/dvb-core/dmxdev.c:564 dvb_dmxdev_filter_free drivers/media/dvb-core/dmxdev.c:840 [inline] dvb_demux_release+0x92/0x550 drivers/media/dvb-core/dmxdev.c:1246 __fput+0x3ff/0xb70 fs/file_table.c:464 task_work_run+0x14e/0x250 kernel/task_work.c:227 exit_task_work include/linux/task_work.h:40 [inline] do_exit+0xad8/0x2d70 kernel/exit.c:938 do_group_exit+0xd3/0x2a0 kernel/exit.c:1087 __do_sys_exit_group kernel/exit.c:1098 [inline] __se_sys_exit_group kernel/exit.c:1096 [inline] __x64_sys_exit_group+0x3e/0x50 kernel/exit.c:1096 x64_sys_call+0x151f/0x1720 arch/x86/include/generated/asm/syscalls_64.h:232 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f871d58d169 Code: Unable to access opcode bytes at 0x7f871d58d13f. RSP: 002b:00007fff4b19a788 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f871d58d169 RDX: 0000000000000064 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 00007fff4b19a7ec R08: 0000000b4b19a87f R09: 00000000000927c0 R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000003 R13: 00000000000927c0 R14: 000000000001d553 R15: 00007fff4b19a840  </TASK>  Allocated by task 6059:  kasan_save_stack+0x33/0x60 mm/kasan/common.c:47  kasan_save_track+0x14/0x30 mm/kasan/common.c:68  poison_kmalloc_redzone mm/kasan/common.c:377 [inline]  __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:394  kmalloc_noprof include/linux/slab.h:901 [inline]  kzalloc_noprof include/linux/slab.h:1037 [inline]  vidtv_psi_pat_table_init drivers/media/test-drivers/vidtv/vidtv_psi.c:970  vidtv_channel_si_init drivers/media/test-drivers/vidtv/vidtv_channel.c:423  vidtv_mux_init drivers/media/test-drivers/vidtv/vidtv_mux.c:519  vidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194  vidtv_start_feed drivers/media/test-drivers/vidtv/vidtv_bridge.c:239  dmx_section_feed_start_filtering drivers/media/dvb-core/dvb_demux.c:973  dvb_dmxdev_feed_start drivers/media/dvb-core/dmxdev.c:508 [inline]  dvb_dmxdev_feed_restart.isra.0 drivers/media/dvb-core/dmxdev.c:537  dvb_dmxdev_filter_stop+0x2b4/0x3a0 drivers/media/dvb-core/dmxdev.c:564  dvb_dmxdev_filter_free drivers/media/dvb-core/dmxdev.c:840 [inline]  dvb_demux_release+0x92/0x550 drivers/media/dvb-core/dmxdev.c:1246  __fput+0x3ff/0xb70 fs/file_tabl ---truncated---",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-07-04 14:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38678",
                                "url": "https://ubuntu.com/security/CVE-2025-38678",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  netfilter: nf_tables: reject duplicate device on updates  A chain/flowtable update with duplicated devices in the same batch is possible. Unfortunately, netdev event path only removes the first device that is found, leaving unregistered the hook of the duplicated device.  Check if a duplicated device exists in the transaction batch, bail out with EEXIST in such case.  WARNING is hit when unregistering the hook:   [49042.221275] WARNING: CPU: 4 PID: 8425 at net/netfilter/core.c:340 nf_hook_entry_head+0xaa/0x150  [49042.221375] CPU: 4 UID: 0 PID: 8425 Comm: nft Tainted: G S                 6.16.0+ #170 PREEMPT(full)  [...]  [49042.221382] RIP: 0010:nf_hook_entry_head+0xaa/0x150",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-09-03 13:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38616",
                                "url": "https://ubuntu.com/security/CVE-2025-38616",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  tls: handle data disappearing from under the TLS ULP  TLS expects that it owns the receive queue of the TCP socket. This cannot be guaranteed in case the reader of the TCP socket entered before the TLS ULP was installed, or uses some non-standard read API (eg. zerocopy ones). Replace the WARN_ON() and a buggy early exit (which leaves anchor pointing to a freed skb) with real error handling. Wipe the parsing state and tell the reader to retry.  We already reload the anchor every time we (re)acquire the socket lock, so the only condition we need to avoid is an out of bounds read (not having enough bytes in the socket for previously parsed record len).  If some data was read from under TLS but there's enough in the queue we'll reload and decrypt what is most likely not a valid TLS record. Leading to some undefined behavior from TLS perspective (corrupting a stream? missing an alert? missing an attack?) but no kernel crash should take place.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-08-22 14:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-37838",
                                "url": "https://ubuntu.com/security/CVE-2025-37838",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  HSI: ssi_protocol: Fix use after free vulnerability in ssi_protocol Driver Due to Race Condition  In the ssi_protocol_probe() function, &ssi->work is bound with ssip_xmit_work(), In ssip_pn_setup(), the ssip_pn_xmit() function within the ssip_pn_ops structure is capable of starting the work.  If we remove the module which will call ssi_protocol_remove() to make a cleanup, it will free ssi through kfree(ssi), while the work mentioned above will be used. The sequence of operations that may lead to a UAF bug is as follows:  CPU0                                    CPU1                          | ssip_xmit_work ssi_protocol_remove     | kfree(ssi);             |                         | struct hsi_client *cl = ssi->cl;                         | // use ssi  Fix it by ensuring that the work is canceled before proceeding with the cleanup in ssi_protocol_remove().",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-04-18 15:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-40300",
                                "url": "https://ubuntu.com/security/CVE-2025-40300",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  x86/vmscape: Add conditional IBPB mitigation  VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace hypervisor (like QEMU). Existing mitigations already protect kernel/KVM from a malicious guest. Userspace can additionally be protected by flushing the branch predictors after a VMexit.  Since it is the userspace that consumes the poisoned branch predictors, conditionally issue an IBPB after a VMexit and before returning to userspace. Workloads that frequently switch between hypervisor and userspace will incur the most overhead from the new IBPB.  This new IBPB is not integrated with the existing IBPB sites. For instance, a task can use the existing speculation control prctl() to get an IBPB at context switch time. With this implementation, the IBPB is doubled up: one at context switch and another before running userspace.  The intent is to integrate and optimize these cases post-embargo.  [ dhansen: elaborate on suboptimal IBPB solution ]",
                                "cve_priority": "high",
                                "cve_public_date": "2025-09-11 17:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38352",
                                "url": "https://ubuntu.com/security/CVE-2025-38352",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del()  If an exiting non-autoreaping task has already passed exit_notify() and calls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent or debugger right after unlock_task_sighand().  If a concurrent posix_cpu_timer_del() runs at that moment, it won't be able to detect timer->it.cpu.firing != 0: cpu_timer_task_rcu() and/or lock_task_sighand() will fail.  Add the tsk->exit_state check into run_posix_cpu_timers() to fix this.  This fix is not needed if CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y, because exit_task_work() is called before exit_notify(). But the check still makes sense, task_work_add(&tsk->posix_cputimers_work.work) will fail anyway in this case.",
                                "cve_priority": "high",
                                "cve_public_date": "2025-07-22 08:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38118",
                                "url": "https://ubuntu.com/security/CVE-2025-38118",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  Bluetooth: MGMT: Fix UAF on mgmt_remove_adv_monitor_complete  This reworks MGMT_OP_REMOVE_ADV_MONITOR to not use mgmt_pending_add to avoid crashes like bellow:  ================================================================== BUG: KASAN: slab-use-after-free in mgmt_remove_adv_monitor_complete+0xe5/0x540 net/bluetooth/mgmt.c:5406 Read of size 8 at addr ffff88801c53f318 by task kworker/u5:5/5341  CPU: 0 UID: 0 PID: 5341 Comm: kworker/u5:5 Not tainted 6.15.0-syzkaller-10402-g4cb6c8af8591 #0 PREEMPT(full) Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014 Workqueue: hci0 hci_cmd_sync_work Call Trace:  <TASK>  dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120  print_address_description mm/kasan/report.c:408 [inline]  print_report+0xd2/0x2b0 mm/kasan/report.c:521  kasan_report+0x118/0x150 mm/kasan/report.c:634  mgmt_remove_adv_monitor_complete+0xe5/0x540 net/bluetooth/mgmt.c:5406  hci_cmd_sync_work+0x261/0x3a0 net/bluetooth/hci_sync.c:334  process_one_work kernel/workqueue.c:3238 [inline]  process_scheduled_works+0xade/0x17b0 kernel/workqueue.c:3321  worker_thread+0x8a0/0xda0 kernel/workqueue.c:3402  kthread+0x711/0x8a0 kernel/kthread.c:464  ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245  </TASK>  Allocated by task 5987:  kasan_save_stack mm/kasan/common.c:47 [inline]  kasan_save_track+0x3e/0x80 mm/kasan/common.c:68  poison_kmalloc_redzone mm/kasan/common.c:377 [inline]  __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:394  kasan_kmalloc include/linux/kasan.h:260 [inline]  __kmalloc_cache_noprof+0x230/0x3d0 mm/slub.c:4358  kmalloc_noprof include/linux/slab.h:905 [inline]  kzalloc_noprof include/linux/slab.h:1039 [inline]  mgmt_pending_new+0x65/0x240 net/bluetooth/mgmt_util.c:252  mgmt_pending_add+0x34/0x120 net/bluetooth/mgmt_util.c:279  remove_adv_monitor+0x103/0x1b0 net/bluetooth/mgmt.c:5454  hci_mgmt_cmd+0x9c9/0xef0 net/bluetooth/hci_sock.c:1719  hci_sock_sendmsg+0x6ca/0xef0 net/bluetooth/hci_sock.c:1839  sock_sendmsg_nosec net/socket.c:712 [inline]  __sock_sendmsg+0x219/0x270 net/socket.c:727  sock_write_iter+0x258/0x330 net/socket.c:1131  new_sync_write fs/read_write.c:593 [inline]  vfs_write+0x548/0xa90 fs/read_write.c:686  ksys_write+0x145/0x250 fs/read_write.c:738  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]  do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94  entry_SYSCALL_64_after_hwframe+0x77/0x7f  Freed by task 5989:  kasan_save_stack mm/kasan/common.c:47 [inline]  kasan_save_track+0x3e/0x80 mm/kasan/common.c:68  kasan_save_free_info+0x46/0x50 mm/kasan/generic.c:576  poison_slab_object mm/kasan/common.c:247 [inline]  __kasan_slab_free+0x62/0x70 mm/kasan/common.c:264  kasan_slab_free include/linux/kasan.h:233 [inline]  slab_free_hook mm/slub.c:2380 [inline]  slab_free mm/slub.c:4642 [inline]  kfree+0x18e/0x440 mm/slub.c:4841  mgmt_pending_foreach+0xc9/0x120 net/bluetooth/mgmt_util.c:242  mgmt_index_removed+0x10d/0x2f0 net/bluetooth/mgmt.c:9366  hci_sock_bind+0xbe9/0x1000 net/bluetooth/hci_sock.c:1314  __sys_bind_socket net/socket.c:1810 [inline]  __sys_bind+0x2c3/0x3e0 net/socket.c:1841  __do_sys_bind net/socket.c:1846 [inline]  __se_sys_bind net/socket.c:1844 [inline]  __x64_sys_bind+0x7a/0x90 net/socket.c:1844  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]  do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94  entry_SYSCALL_64_after_hwframe+0x77/0x7f",
                                "cve_priority": "high",
                                "cve_public_date": "2025-07-03 09:15:00 UTC"
                            }
                        ],
                        "log": [
                            "",
                            "  * noble/linux: 6.8.0-88.89 -proposed tracker (LP: #2127619)",
                            "",
                            "  *  Enable Xilinx PS UART configs (LP: #2121337)",
                            "    - [Config] Enable Xilinx PS UART configs",
                            "",
                            "  * Fix ARL-U/H suspend issues (LP: #2112469)",
                            "    - platform/x86/intel/pmc: Add Arrow Lake U/H support to intel_pmc_core",
                            "      driver",
                            "    - platform/x86/intel/pmc: Fix Arrow Lake U/H NPU PCI ID",
                            "",
                            "  * r8169 can not wake on LAN via SFP moudule (LP: #2123901)",
                            "    - r8169: set EEE speed down ratio to 1",
                            "",
                            "  * Add pvpanic kernel modules to linux-modules (LP: #2126659)",
                            "    - [Packaging] Add pvpanic kernel modules to linux-modules",
                            "",
                            "  * CVE-2025-21729",
                            "    - wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion",
                            "",
                            "  * Fix failure to build TDX module (LP: #2126698)",
                            "    - x86/paravirt: Move halt paravirt calls under CONFIG_PARAVIRT",
                            "",
                            "  * Ubuntu 24.04.2: error in audit_log_object_context keep printing in the",
                            "    kernel and console (LP: #2123815)",
                            "    - SAUCE: fix: apparmor4.0.0 [26/90]: LSM stacking v39: Audit: Add record",
                            "      for multiple object contexts",
                            "",
                            "  * ensure mptcp keepalives are honored when set (LP: #2125444)",
                            "    - mptcp: sockopt: make sync_socket_options propagate SOCK_KEEPOPEN",
                            "",
                            "  * System hangs when running the memory stress test (LP: #2103680)",
                            "    - mm: page_alloc: avoid kswapd thrashing due to NUMA restrictions",
                            "",
                            "  * UBUNTU: fan: fail to check kmalloc() return could cause a NULL pointer",
                            "    dereference (LP: #2125053)",
                            "    - SAUCE: fan: vxlan: check memory allocation for map",
                            "",
                            "  * jammy:linux-riscv-6.8 is FTBFS because of wrong include (LP: #2122592)",
                            "    - SAUCE: riscv: KVM: Remove broken include",
                            "",
                            "  * Performance degrades rapidly when spawning more processes to run benchmark",
                            "    (LP: #2122006)",
                            "    - cpuidle: menu: Avoid discarding useful information",
                            "    - cpuidle: governors: menu: Avoid using invalid recent intervals data",
                            "",
                            "  * CVE-2025-38227",
                            "    - media: vidtv: Terminating the subsequent process of initialization",
                            "      failure",
                            "",
                            "  * CVE-2025-38678",
                            "    - netfilter: nf_tables: reject duplicate device on updates",
                            "",
                            "  * CVE-2025-38616",
                            "    - tls: handle data disappearing from under the TLS ULP",
                            "",
                            "  * CVE-2025-37838",
                            "    - HSI: ssi_protocol: Fix use after free vulnerability in ssi_protocol",
                            "      Driver Due to Race Condition",
                            "",
                            "  * VMSCAPE CVE-2025-40300 (LP: #2124105) // CVE-2025-40300",
                            "    - Documentation/hw-vuln: Add VMSCAPE documentation",
                            "    - x86/vmscape: Enumerate VMSCAPE bug",
                            "    - x86/vmscape: Add conditional IBPB mitigation",
                            "    - x86/vmscape: Enable the mitigation",
                            "    - x86/bugs: Move cpu_bugs_smt_update() down",
                            "    - x86/vmscape: Warn when STIBP is disabled with SMT",
                            "    - x86/vmscape: Add old Intel CPUs to affected list",
                            "",
                            "  * VMSCAPE CVE-2025-40300 (LP: #2124105)",
                            "    - [Config] Enable MITIGATION_VMSCAPE config",
                            "",
                            "  * CVE-2025-38352",
                            "    - posix-cpu-timers: fix race between handle_posix_cpu_timers() and",
                            "      posix_cpu_timer_del()",
                            "",
                            "  * CVE-2025-38118",
                            "    - Bluetooth: MGMT: Fix UAF on mgmt_remove_adv_monitor_complete",
                            "    - Bluetooth: MGMT: Fix sparse errors",
                            ""
                        ],
                        "package": "linux",
                        "version": "6.8.0-88.89",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2127619,
                            2121337,
                            2112469,
                            2123901,
                            2126659,
                            2126698,
                            2123815,
                            2125444,
                            2103680,
                            2125053,
                            2122592,
                            2122006,
                            2124105,
                            2124105
                        ],
                        "author": "Edoardo Canepa <edoardo.canepa@canonical.com>",
                        "date": "Sat, 11 Oct 2025 01:38:46 +0200"
                    }
                ],
                "notes": "linux-tools-6.8.0-88 version '6.8.0-88.89' (source package linux version '6.8.0-88.89') was added. linux-tools-6.8.0-88 version '6.8.0-88.89' has the same source package name, linux, as removed package linux-headers-6.8.0-87. As such we can use the source package version of the removed package, '6.8.0-87.88', as the starting point in our changelog diff. Kernel packages are an example of where the binary package name changes for the same source package. Using the removed package source package version as our starting point means we can still get meaningful changelog diffs even for what appears to be a new package.",
                "is_version_downgrade": false
            },
            {
                "name": "linux-tools-6.8.0-88-generic",
                "from_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.8.0-87.88",
                    "version": null
                },
                "to_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.8.0-88.89",
                    "version": "6.8.0-88.89"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-21729",
                        "url": "https://ubuntu.com/security/CVE-2025-21729",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion  The rtwdev->scanning flag isn't protected by mutex originally, so cancel_hw_scan can pass the condition, but suddenly hw_scan completion unset the flag and calls ieee80211_scan_completed() that will free local->hw_scan_req. Then, cancel_hw_scan raises null-ptr-deref and use-after-free. Fix it by moving the check condition to where protected by mutex.   KASAN: null-ptr-deref in range [0x0000000000000088-0x000000000000008f]  CPU: 2 PID: 6922 Comm: kworker/2:2 Tainted: G           OE  Hardware name: LENOVO 2356AD1/2356AD1, BIOS G7ETB6WW (2.76 ) 09/10/2019  Workqueue: events cfg80211_conn_work [cfg80211]  RIP: 0010:rtw89_fw_h2c_scan_offload_be+0xc33/0x13c3 [rtw89_core]  Code: 00 45 89 6c 24 1c 0f 85 23 01 00 00 48 8b 85 20 ff ff ff 48 8d  RSP: 0018:ffff88811fd9f068 EFLAGS: 00010206  RAX: dffffc0000000000 RBX: ffff88811fd9f258 RCX: 0000000000000001  RDX: 0000000000000011 RSI: 0000000000000001 RDI: 0000000000000089  RBP: ffff88811fd9f170 R08: 0000000000000000 R09: 0000000000000000  R10: ffff88811fd9f108 R11: 0000000000000000 R12: ffff88810e47f960  R13: 0000000000000000 R14: 000000000000ffff R15: 0000000000000000  FS:  0000000000000000(0000) GS:ffff8881d6f00000(0000) knlGS:0000000000000000  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033  CR2: 00007531dfca55b0 CR3: 00000001be296004 CR4: 00000000001706e0  Call Trace:   <TASK>   ? show_regs+0x61/0x73   ? __die_body+0x20/0x73   ? die_addr+0x4f/0x7b   ? exc_general_protection+0x191/0x1db   ? asm_exc_general_protection+0x27/0x30   ? rtw89_fw_h2c_scan_offload_be+0xc33/0x13c3 [rtw89_core]   ? rtw89_fw_h2c_scan_offload_be+0x458/0x13c3 [rtw89_core]   ? __pfx_rtw89_fw_h2c_scan_offload_be+0x10/0x10 [rtw89_core]   ? do_raw_spin_lock+0x75/0xdb   ? __pfx_do_raw_spin_lock+0x10/0x10   rtw89_hw_scan_offload+0xb5e/0xbf7 [rtw89_core]   ? _raw_spin_unlock+0xe/0x24   ? __mutex_lock.constprop.0+0x40c/0x471   ? __pfx_rtw89_hw_scan_offload+0x10/0x10 [rtw89_core]   ? __mutex_lock_slowpath+0x13/0x1f   ? mutex_lock+0xa2/0xdc   ? __pfx_mutex_lock+0x10/0x10   rtw89_hw_scan_abort+0x58/0xb7 [rtw89_core]   rtw89_ops_cancel_hw_scan+0x120/0x13b [rtw89_core]   ieee80211_scan_cancel+0x468/0x4d0 [mac80211]   ieee80211_prep_connection+0x858/0x899 [mac80211]   ieee80211_mgd_auth+0xbea/0xdde [mac80211]   ? __pfx_ieee80211_mgd_auth+0x10/0x10 [mac80211]   ? cfg80211_find_elem+0x15/0x29 [cfg80211]   ? is_bss+0x1b7/0x1d7 [cfg80211]   ieee80211_auth+0x18/0x27 [mac80211]   cfg80211_mlme_auth+0x3bb/0x3e7 [cfg80211]   cfg80211_conn_do_work+0x410/0xb81 [cfg80211]   ? __pfx_cfg80211_conn_do_work+0x10/0x10 [cfg80211]   ? __kasan_check_read+0x11/0x1f   ? psi_group_change+0x8bc/0x944   ? __kasan_check_write+0x14/0x22   ? mutex_lock+0x8e/0xdc   ? __pfx_mutex_lock+0x10/0x10   ? __pfx___radix_tree_lookup+0x10/0x10   cfg80211_conn_work+0x245/0x34d [cfg80211]   ? __pfx_cfg80211_conn_work+0x10/0x10 [cfg80211]   ? update_cfs_rq_load_avg+0x3bc/0x3d7   ? sched_clock_noinstr+0x9/0x1a   ? sched_clock+0x10/0x24   ? sched_clock_cpu+0x7e/0x42e   ? newidle_balance+0x796/0x937   ? __pfx_sched_clock_cpu+0x10/0x10   ? __pfx_newidle_balance+0x10/0x10   ? __kasan_check_read+0x11/0x1f   ? psi_group_change+0x8bc/0x944   ? _raw_spin_unlock+0xe/0x24   ? raw_spin_rq_unlock+0x47/0x54   ? raw_spin_rq_unlock_irq+0x9/0x1f   ? finish_task_switch.isra.0+0x347/0x586   ? __schedule+0x27bf/0x2892   ? mutex_unlock+0x80/0xd0   ? do_raw_spin_lock+0x75/0xdb   ? __pfx___schedule+0x10/0x10   process_scheduled_works+0x58c/0x821   worker_thread+0x4c7/0x586   ? __kasan_check_read+0x11/0x1f   kthread+0x285/0x294   ? __pfx_worker_thread+0x10/0x10   ? __pfx_kthread+0x10/0x10   ret_from_fork+0x29/0x6f   ? __pfx_kthread+0x10/0x10   ret_from_fork_asm+0x1b/0x30   </TASK>",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-02-27 02:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38227",
                        "url": "https://ubuntu.com/security/CVE-2025-38227",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  media: vidtv: Terminating the subsequent process of initialization failure  syzbot reported a slab-use-after-free Read in vidtv_mux_init. [1]  After PSI initialization fails, the si member is accessed again, resulting in this uaf.  After si initialization fails, the subsequent process needs to be exited.  [1] BUG: KASAN: slab-use-after-free in vidtv_mux_pid_ctx_init drivers/media/test-drivers/vidtv/vidtv_mux.c:78 [inline] BUG: KASAN: slab-use-after-free in vidtv_mux_init+0xac2/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:524 Read of size 8 at addr ffff88802fa42acc by task syz.2.37/6059  CPU: 0 UID: 0 PID: 6059 Comm: syz.2.37 Not tainted 6.14.0-rc5-syzkaller #0 Hardware name: Google Compute Engine, BIOS Google 02/12/2025 Call Trace: <TASK> __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:408 [inline] print_report+0xc3/0x670 mm/kasan/report.c:521 kasan_report+0xd9/0x110 mm/kasan/report.c:634 vidtv_mux_pid_ctx_init drivers/media/test-drivers/vidtv/vidtv_mux.c:78 vidtv_mux_init+0xac2/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:524 vidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194 vidtv_start_feed drivers/media/test-drivers/vidtv/vidtv_bridge.c:239 dmx_section_feed_start_filtering drivers/media/dvb-core/dvb_demux.c:973 dvb_dmxdev_feed_start drivers/media/dvb-core/dmxdev.c:508 [inline] dvb_dmxdev_feed_restart.isra.0 drivers/media/dvb-core/dmxdev.c:537 dvb_dmxdev_filter_stop+0x2b4/0x3a0 drivers/media/dvb-core/dmxdev.c:564 dvb_dmxdev_filter_free drivers/media/dvb-core/dmxdev.c:840 [inline] dvb_demux_release+0x92/0x550 drivers/media/dvb-core/dmxdev.c:1246 __fput+0x3ff/0xb70 fs/file_table.c:464 task_work_run+0x14e/0x250 kernel/task_work.c:227 exit_task_work include/linux/task_work.h:40 [inline] do_exit+0xad8/0x2d70 kernel/exit.c:938 do_group_exit+0xd3/0x2a0 kernel/exit.c:1087 __do_sys_exit_group kernel/exit.c:1098 [inline] __se_sys_exit_group kernel/exit.c:1096 [inline] __x64_sys_exit_group+0x3e/0x50 kernel/exit.c:1096 x64_sys_call+0x151f/0x1720 arch/x86/include/generated/asm/syscalls_64.h:232 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f871d58d169 Code: Unable to access opcode bytes at 0x7f871d58d13f. RSP: 002b:00007fff4b19a788 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f871d58d169 RDX: 0000000000000064 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 00007fff4b19a7ec R08: 0000000b4b19a87f R09: 00000000000927c0 R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000003 R13: 00000000000927c0 R14: 000000000001d553 R15: 00007fff4b19a840  </TASK>  Allocated by task 6059:  kasan_save_stack+0x33/0x60 mm/kasan/common.c:47  kasan_save_track+0x14/0x30 mm/kasan/common.c:68  poison_kmalloc_redzone mm/kasan/common.c:377 [inline]  __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:394  kmalloc_noprof include/linux/slab.h:901 [inline]  kzalloc_noprof include/linux/slab.h:1037 [inline]  vidtv_psi_pat_table_init drivers/media/test-drivers/vidtv/vidtv_psi.c:970  vidtv_channel_si_init drivers/media/test-drivers/vidtv/vidtv_channel.c:423  vidtv_mux_init drivers/media/test-drivers/vidtv/vidtv_mux.c:519  vidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194  vidtv_start_feed drivers/media/test-drivers/vidtv/vidtv_bridge.c:239  dmx_section_feed_start_filtering drivers/media/dvb-core/dvb_demux.c:973  dvb_dmxdev_feed_start drivers/media/dvb-core/dmxdev.c:508 [inline]  dvb_dmxdev_feed_restart.isra.0 drivers/media/dvb-core/dmxdev.c:537  dvb_dmxdev_filter_stop+0x2b4/0x3a0 drivers/media/dvb-core/dmxdev.c:564  dvb_dmxdev_filter_free drivers/media/dvb-core/dmxdev.c:840 [inline]  dvb_demux_release+0x92/0x550 drivers/media/dvb-core/dmxdev.c:1246  __fput+0x3ff/0xb70 fs/file_tabl ---truncated---",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-07-04 14:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38678",
                        "url": "https://ubuntu.com/security/CVE-2025-38678",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  netfilter: nf_tables: reject duplicate device on updates  A chain/flowtable update with duplicated devices in the same batch is possible. Unfortunately, netdev event path only removes the first device that is found, leaving unregistered the hook of the duplicated device.  Check if a duplicated device exists in the transaction batch, bail out with EEXIST in such case.  WARNING is hit when unregistering the hook:   [49042.221275] WARNING: CPU: 4 PID: 8425 at net/netfilter/core.c:340 nf_hook_entry_head+0xaa/0x150  [49042.221375] CPU: 4 UID: 0 PID: 8425 Comm: nft Tainted: G S                 6.16.0+ #170 PREEMPT(full)  [...]  [49042.221382] RIP: 0010:nf_hook_entry_head+0xaa/0x150",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-09-03 13:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38616",
                        "url": "https://ubuntu.com/security/CVE-2025-38616",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  tls: handle data disappearing from under the TLS ULP  TLS expects that it owns the receive queue of the TCP socket. This cannot be guaranteed in case the reader of the TCP socket entered before the TLS ULP was installed, or uses some non-standard read API (eg. zerocopy ones). Replace the WARN_ON() and a buggy early exit (which leaves anchor pointing to a freed skb) with real error handling. Wipe the parsing state and tell the reader to retry.  We already reload the anchor every time we (re)acquire the socket lock, so the only condition we need to avoid is an out of bounds read (not having enough bytes in the socket for previously parsed record len).  If some data was read from under TLS but there's enough in the queue we'll reload and decrypt what is most likely not a valid TLS record. Leading to some undefined behavior from TLS perspective (corrupting a stream? missing an alert? missing an attack?) but no kernel crash should take place.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-08-22 14:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-37838",
                        "url": "https://ubuntu.com/security/CVE-2025-37838",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  HSI: ssi_protocol: Fix use after free vulnerability in ssi_protocol Driver Due to Race Condition  In the ssi_protocol_probe() function, &ssi->work is bound with ssip_xmit_work(), In ssip_pn_setup(), the ssip_pn_xmit() function within the ssip_pn_ops structure is capable of starting the work.  If we remove the module which will call ssi_protocol_remove() to make a cleanup, it will free ssi through kfree(ssi), while the work mentioned above will be used. The sequence of operations that may lead to a UAF bug is as follows:  CPU0                                    CPU1                          | ssip_xmit_work ssi_protocol_remove     | kfree(ssi);             |                         | struct hsi_client *cl = ssi->cl;                         | // use ssi  Fix it by ensuring that the work is canceled before proceeding with the cleanup in ssi_protocol_remove().",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-04-18 15:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-40300",
                        "url": "https://ubuntu.com/security/CVE-2025-40300",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  x86/vmscape: Add conditional IBPB mitigation  VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace hypervisor (like QEMU). Existing mitigations already protect kernel/KVM from a malicious guest. Userspace can additionally be protected by flushing the branch predictors after a VMexit.  Since it is the userspace that consumes the poisoned branch predictors, conditionally issue an IBPB after a VMexit and before returning to userspace. Workloads that frequently switch between hypervisor and userspace will incur the most overhead from the new IBPB.  This new IBPB is not integrated with the existing IBPB sites. For instance, a task can use the existing speculation control prctl() to get an IBPB at context switch time. With this implementation, the IBPB is doubled up: one at context switch and another before running userspace.  The intent is to integrate and optimize these cases post-embargo.  [ dhansen: elaborate on suboptimal IBPB solution ]",
                        "cve_priority": "high",
                        "cve_public_date": "2025-09-11 17:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38352",
                        "url": "https://ubuntu.com/security/CVE-2025-38352",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del()  If an exiting non-autoreaping task has already passed exit_notify() and calls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent or debugger right after unlock_task_sighand().  If a concurrent posix_cpu_timer_del() runs at that moment, it won't be able to detect timer->it.cpu.firing != 0: cpu_timer_task_rcu() and/or lock_task_sighand() will fail.  Add the tsk->exit_state check into run_posix_cpu_timers() to fix this.  This fix is not needed if CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y, because exit_task_work() is called before exit_notify(). But the check still makes sense, task_work_add(&tsk->posix_cputimers_work.work) will fail anyway in this case.",
                        "cve_priority": "high",
                        "cve_public_date": "2025-07-22 08:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38118",
                        "url": "https://ubuntu.com/security/CVE-2025-38118",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  Bluetooth: MGMT: Fix UAF on mgmt_remove_adv_monitor_complete  This reworks MGMT_OP_REMOVE_ADV_MONITOR to not use mgmt_pending_add to avoid crashes like bellow:  ================================================================== BUG: KASAN: slab-use-after-free in mgmt_remove_adv_monitor_complete+0xe5/0x540 net/bluetooth/mgmt.c:5406 Read of size 8 at addr ffff88801c53f318 by task kworker/u5:5/5341  CPU: 0 UID: 0 PID: 5341 Comm: kworker/u5:5 Not tainted 6.15.0-syzkaller-10402-g4cb6c8af8591 #0 PREEMPT(full) Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014 Workqueue: hci0 hci_cmd_sync_work Call Trace:  <TASK>  dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120  print_address_description mm/kasan/report.c:408 [inline]  print_report+0xd2/0x2b0 mm/kasan/report.c:521  kasan_report+0x118/0x150 mm/kasan/report.c:634  mgmt_remove_adv_monitor_complete+0xe5/0x540 net/bluetooth/mgmt.c:5406  hci_cmd_sync_work+0x261/0x3a0 net/bluetooth/hci_sync.c:334  process_one_work kernel/workqueue.c:3238 [inline]  process_scheduled_works+0xade/0x17b0 kernel/workqueue.c:3321  worker_thread+0x8a0/0xda0 kernel/workqueue.c:3402  kthread+0x711/0x8a0 kernel/kthread.c:464  ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245  </TASK>  Allocated by task 5987:  kasan_save_stack mm/kasan/common.c:47 [inline]  kasan_save_track+0x3e/0x80 mm/kasan/common.c:68  poison_kmalloc_redzone mm/kasan/common.c:377 [inline]  __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:394  kasan_kmalloc include/linux/kasan.h:260 [inline]  __kmalloc_cache_noprof+0x230/0x3d0 mm/slub.c:4358  kmalloc_noprof include/linux/slab.h:905 [inline]  kzalloc_noprof include/linux/slab.h:1039 [inline]  mgmt_pending_new+0x65/0x240 net/bluetooth/mgmt_util.c:252  mgmt_pending_add+0x34/0x120 net/bluetooth/mgmt_util.c:279  remove_adv_monitor+0x103/0x1b0 net/bluetooth/mgmt.c:5454  hci_mgmt_cmd+0x9c9/0xef0 net/bluetooth/hci_sock.c:1719  hci_sock_sendmsg+0x6ca/0xef0 net/bluetooth/hci_sock.c:1839  sock_sendmsg_nosec net/socket.c:712 [inline]  __sock_sendmsg+0x219/0x270 net/socket.c:727  sock_write_iter+0x258/0x330 net/socket.c:1131  new_sync_write fs/read_write.c:593 [inline]  vfs_write+0x548/0xa90 fs/read_write.c:686  ksys_write+0x145/0x250 fs/read_write.c:738  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]  do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94  entry_SYSCALL_64_after_hwframe+0x77/0x7f  Freed by task 5989:  kasan_save_stack mm/kasan/common.c:47 [inline]  kasan_save_track+0x3e/0x80 mm/kasan/common.c:68  kasan_save_free_info+0x46/0x50 mm/kasan/generic.c:576  poison_slab_object mm/kasan/common.c:247 [inline]  __kasan_slab_free+0x62/0x70 mm/kasan/common.c:264  kasan_slab_free include/linux/kasan.h:233 [inline]  slab_free_hook mm/slub.c:2380 [inline]  slab_free mm/slub.c:4642 [inline]  kfree+0x18e/0x440 mm/slub.c:4841  mgmt_pending_foreach+0xc9/0x120 net/bluetooth/mgmt_util.c:242  mgmt_index_removed+0x10d/0x2f0 net/bluetooth/mgmt.c:9366  hci_sock_bind+0xbe9/0x1000 net/bluetooth/hci_sock.c:1314  __sys_bind_socket net/socket.c:1810 [inline]  __sys_bind+0x2c3/0x3e0 net/socket.c:1841  __do_sys_bind net/socket.c:1846 [inline]  __se_sys_bind net/socket.c:1844 [inline]  __x64_sys_bind+0x7a/0x90 net/socket.c:1844  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]  do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94  entry_SYSCALL_64_after_hwframe+0x77/0x7f",
                        "cve_priority": "high",
                        "cve_public_date": "2025-07-03 09:15:00 UTC"
                    }
                ],
                "launchpad_bugs_fixed": [
                    2127619,
                    2121337,
                    2112469,
                    2123901,
                    2126659,
                    2126698,
                    2123815,
                    2125444,
                    2103680,
                    2125053,
                    2122592,
                    2122006,
                    2124105,
                    2124105
                ],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-21729",
                                "url": "https://ubuntu.com/security/CVE-2025-21729",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion  The rtwdev->scanning flag isn't protected by mutex originally, so cancel_hw_scan can pass the condition, but suddenly hw_scan completion unset the flag and calls ieee80211_scan_completed() that will free local->hw_scan_req. Then, cancel_hw_scan raises null-ptr-deref and use-after-free. Fix it by moving the check condition to where protected by mutex.   KASAN: null-ptr-deref in range [0x0000000000000088-0x000000000000008f]  CPU: 2 PID: 6922 Comm: kworker/2:2 Tainted: G           OE  Hardware name: LENOVO 2356AD1/2356AD1, BIOS G7ETB6WW (2.76 ) 09/10/2019  Workqueue: events cfg80211_conn_work [cfg80211]  RIP: 0010:rtw89_fw_h2c_scan_offload_be+0xc33/0x13c3 [rtw89_core]  Code: 00 45 89 6c 24 1c 0f 85 23 01 00 00 48 8b 85 20 ff ff ff 48 8d  RSP: 0018:ffff88811fd9f068 EFLAGS: 00010206  RAX: dffffc0000000000 RBX: ffff88811fd9f258 RCX: 0000000000000001  RDX: 0000000000000011 RSI: 0000000000000001 RDI: 0000000000000089  RBP: ffff88811fd9f170 R08: 0000000000000000 R09: 0000000000000000  R10: ffff88811fd9f108 R11: 0000000000000000 R12: ffff88810e47f960  R13: 0000000000000000 R14: 000000000000ffff R15: 0000000000000000  FS:  0000000000000000(0000) GS:ffff8881d6f00000(0000) knlGS:0000000000000000  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033  CR2: 00007531dfca55b0 CR3: 00000001be296004 CR4: 00000000001706e0  Call Trace:   <TASK>   ? show_regs+0x61/0x73   ? __die_body+0x20/0x73   ? die_addr+0x4f/0x7b   ? exc_general_protection+0x191/0x1db   ? asm_exc_general_protection+0x27/0x30   ? rtw89_fw_h2c_scan_offload_be+0xc33/0x13c3 [rtw89_core]   ? rtw89_fw_h2c_scan_offload_be+0x458/0x13c3 [rtw89_core]   ? __pfx_rtw89_fw_h2c_scan_offload_be+0x10/0x10 [rtw89_core]   ? do_raw_spin_lock+0x75/0xdb   ? __pfx_do_raw_spin_lock+0x10/0x10   rtw89_hw_scan_offload+0xb5e/0xbf7 [rtw89_core]   ? _raw_spin_unlock+0xe/0x24   ? __mutex_lock.constprop.0+0x40c/0x471   ? __pfx_rtw89_hw_scan_offload+0x10/0x10 [rtw89_core]   ? __mutex_lock_slowpath+0x13/0x1f   ? mutex_lock+0xa2/0xdc   ? __pfx_mutex_lock+0x10/0x10   rtw89_hw_scan_abort+0x58/0xb7 [rtw89_core]   rtw89_ops_cancel_hw_scan+0x120/0x13b [rtw89_core]   ieee80211_scan_cancel+0x468/0x4d0 [mac80211]   ieee80211_prep_connection+0x858/0x899 [mac80211]   ieee80211_mgd_auth+0xbea/0xdde [mac80211]   ? __pfx_ieee80211_mgd_auth+0x10/0x10 [mac80211]   ? cfg80211_find_elem+0x15/0x29 [cfg80211]   ? is_bss+0x1b7/0x1d7 [cfg80211]   ieee80211_auth+0x18/0x27 [mac80211]   cfg80211_mlme_auth+0x3bb/0x3e7 [cfg80211]   cfg80211_conn_do_work+0x410/0xb81 [cfg80211]   ? __pfx_cfg80211_conn_do_work+0x10/0x10 [cfg80211]   ? __kasan_check_read+0x11/0x1f   ? psi_group_change+0x8bc/0x944   ? __kasan_check_write+0x14/0x22   ? mutex_lock+0x8e/0xdc   ? __pfx_mutex_lock+0x10/0x10   ? __pfx___radix_tree_lookup+0x10/0x10   cfg80211_conn_work+0x245/0x34d [cfg80211]   ? __pfx_cfg80211_conn_work+0x10/0x10 [cfg80211]   ? update_cfs_rq_load_avg+0x3bc/0x3d7   ? sched_clock_noinstr+0x9/0x1a   ? sched_clock+0x10/0x24   ? sched_clock_cpu+0x7e/0x42e   ? newidle_balance+0x796/0x937   ? __pfx_sched_clock_cpu+0x10/0x10   ? __pfx_newidle_balance+0x10/0x10   ? __kasan_check_read+0x11/0x1f   ? psi_group_change+0x8bc/0x944   ? _raw_spin_unlock+0xe/0x24   ? raw_spin_rq_unlock+0x47/0x54   ? raw_spin_rq_unlock_irq+0x9/0x1f   ? finish_task_switch.isra.0+0x347/0x586   ? __schedule+0x27bf/0x2892   ? mutex_unlock+0x80/0xd0   ? do_raw_spin_lock+0x75/0xdb   ? __pfx___schedule+0x10/0x10   process_scheduled_works+0x58c/0x821   worker_thread+0x4c7/0x586   ? __kasan_check_read+0x11/0x1f   kthread+0x285/0x294   ? __pfx_worker_thread+0x10/0x10   ? __pfx_kthread+0x10/0x10   ret_from_fork+0x29/0x6f   ? __pfx_kthread+0x10/0x10   ret_from_fork_asm+0x1b/0x30   </TASK>",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-02-27 02:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38227",
                                "url": "https://ubuntu.com/security/CVE-2025-38227",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  media: vidtv: Terminating the subsequent process of initialization failure  syzbot reported a slab-use-after-free Read in vidtv_mux_init. [1]  After PSI initialization fails, the si member is accessed again, resulting in this uaf.  After si initialization fails, the subsequent process needs to be exited.  [1] BUG: KASAN: slab-use-after-free in vidtv_mux_pid_ctx_init drivers/media/test-drivers/vidtv/vidtv_mux.c:78 [inline] BUG: KASAN: slab-use-after-free in vidtv_mux_init+0xac2/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:524 Read of size 8 at addr ffff88802fa42acc by task syz.2.37/6059  CPU: 0 UID: 0 PID: 6059 Comm: syz.2.37 Not tainted 6.14.0-rc5-syzkaller #0 Hardware name: Google Compute Engine, BIOS Google 02/12/2025 Call Trace: <TASK> __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:408 [inline] print_report+0xc3/0x670 mm/kasan/report.c:521 kasan_report+0xd9/0x110 mm/kasan/report.c:634 vidtv_mux_pid_ctx_init drivers/media/test-drivers/vidtv/vidtv_mux.c:78 vidtv_mux_init+0xac2/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:524 vidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194 vidtv_start_feed drivers/media/test-drivers/vidtv/vidtv_bridge.c:239 dmx_section_feed_start_filtering drivers/media/dvb-core/dvb_demux.c:973 dvb_dmxdev_feed_start drivers/media/dvb-core/dmxdev.c:508 [inline] dvb_dmxdev_feed_restart.isra.0 drivers/media/dvb-core/dmxdev.c:537 dvb_dmxdev_filter_stop+0x2b4/0x3a0 drivers/media/dvb-core/dmxdev.c:564 dvb_dmxdev_filter_free drivers/media/dvb-core/dmxdev.c:840 [inline] dvb_demux_release+0x92/0x550 drivers/media/dvb-core/dmxdev.c:1246 __fput+0x3ff/0xb70 fs/file_table.c:464 task_work_run+0x14e/0x250 kernel/task_work.c:227 exit_task_work include/linux/task_work.h:40 [inline] do_exit+0xad8/0x2d70 kernel/exit.c:938 do_group_exit+0xd3/0x2a0 kernel/exit.c:1087 __do_sys_exit_group kernel/exit.c:1098 [inline] __se_sys_exit_group kernel/exit.c:1096 [inline] __x64_sys_exit_group+0x3e/0x50 kernel/exit.c:1096 x64_sys_call+0x151f/0x1720 arch/x86/include/generated/asm/syscalls_64.h:232 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f871d58d169 Code: Unable to access opcode bytes at 0x7f871d58d13f. RSP: 002b:00007fff4b19a788 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f871d58d169 RDX: 0000000000000064 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 00007fff4b19a7ec R08: 0000000b4b19a87f R09: 00000000000927c0 R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000003 R13: 00000000000927c0 R14: 000000000001d553 R15: 00007fff4b19a840  </TASK>  Allocated by task 6059:  kasan_save_stack+0x33/0x60 mm/kasan/common.c:47  kasan_save_track+0x14/0x30 mm/kasan/common.c:68  poison_kmalloc_redzone mm/kasan/common.c:377 [inline]  __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:394  kmalloc_noprof include/linux/slab.h:901 [inline]  kzalloc_noprof include/linux/slab.h:1037 [inline]  vidtv_psi_pat_table_init drivers/media/test-drivers/vidtv/vidtv_psi.c:970  vidtv_channel_si_init drivers/media/test-drivers/vidtv/vidtv_channel.c:423  vidtv_mux_init drivers/media/test-drivers/vidtv/vidtv_mux.c:519  vidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194  vidtv_start_feed drivers/media/test-drivers/vidtv/vidtv_bridge.c:239  dmx_section_feed_start_filtering drivers/media/dvb-core/dvb_demux.c:973  dvb_dmxdev_feed_start drivers/media/dvb-core/dmxdev.c:508 [inline]  dvb_dmxdev_feed_restart.isra.0 drivers/media/dvb-core/dmxdev.c:537  dvb_dmxdev_filter_stop+0x2b4/0x3a0 drivers/media/dvb-core/dmxdev.c:564  dvb_dmxdev_filter_free drivers/media/dvb-core/dmxdev.c:840 [inline]  dvb_demux_release+0x92/0x550 drivers/media/dvb-core/dmxdev.c:1246  __fput+0x3ff/0xb70 fs/file_tabl ---truncated---",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-07-04 14:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38678",
                                "url": "https://ubuntu.com/security/CVE-2025-38678",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  netfilter: nf_tables: reject duplicate device on updates  A chain/flowtable update with duplicated devices in the same batch is possible. Unfortunately, netdev event path only removes the first device that is found, leaving unregistered the hook of the duplicated device.  Check if a duplicated device exists in the transaction batch, bail out with EEXIST in such case.  WARNING is hit when unregistering the hook:   [49042.221275] WARNING: CPU: 4 PID: 8425 at net/netfilter/core.c:340 nf_hook_entry_head+0xaa/0x150  [49042.221375] CPU: 4 UID: 0 PID: 8425 Comm: nft Tainted: G S                 6.16.0+ #170 PREEMPT(full)  [...]  [49042.221382] RIP: 0010:nf_hook_entry_head+0xaa/0x150",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-09-03 13:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38616",
                                "url": "https://ubuntu.com/security/CVE-2025-38616",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  tls: handle data disappearing from under the TLS ULP  TLS expects that it owns the receive queue of the TCP socket. This cannot be guaranteed in case the reader of the TCP socket entered before the TLS ULP was installed, or uses some non-standard read API (eg. zerocopy ones). Replace the WARN_ON() and a buggy early exit (which leaves anchor pointing to a freed skb) with real error handling. Wipe the parsing state and tell the reader to retry.  We already reload the anchor every time we (re)acquire the socket lock, so the only condition we need to avoid is an out of bounds read (not having enough bytes in the socket for previously parsed record len).  If some data was read from under TLS but there's enough in the queue we'll reload and decrypt what is most likely not a valid TLS record. Leading to some undefined behavior from TLS perspective (corrupting a stream? missing an alert? missing an attack?) but no kernel crash should take place.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-08-22 14:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-37838",
                                "url": "https://ubuntu.com/security/CVE-2025-37838",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  HSI: ssi_protocol: Fix use after free vulnerability in ssi_protocol Driver Due to Race Condition  In the ssi_protocol_probe() function, &ssi->work is bound with ssip_xmit_work(), In ssip_pn_setup(), the ssip_pn_xmit() function within the ssip_pn_ops structure is capable of starting the work.  If we remove the module which will call ssi_protocol_remove() to make a cleanup, it will free ssi through kfree(ssi), while the work mentioned above will be used. The sequence of operations that may lead to a UAF bug is as follows:  CPU0                                    CPU1                          | ssip_xmit_work ssi_protocol_remove     | kfree(ssi);             |                         | struct hsi_client *cl = ssi->cl;                         | // use ssi  Fix it by ensuring that the work is canceled before proceeding with the cleanup in ssi_protocol_remove().",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-04-18 15:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-40300",
                                "url": "https://ubuntu.com/security/CVE-2025-40300",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  x86/vmscape: Add conditional IBPB mitigation  VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace hypervisor (like QEMU). Existing mitigations already protect kernel/KVM from a malicious guest. Userspace can additionally be protected by flushing the branch predictors after a VMexit.  Since it is the userspace that consumes the poisoned branch predictors, conditionally issue an IBPB after a VMexit and before returning to userspace. Workloads that frequently switch between hypervisor and userspace will incur the most overhead from the new IBPB.  This new IBPB is not integrated with the existing IBPB sites. For instance, a task can use the existing speculation control prctl() to get an IBPB at context switch time. With this implementation, the IBPB is doubled up: one at context switch and another before running userspace.  The intent is to integrate and optimize these cases post-embargo.  [ dhansen: elaborate on suboptimal IBPB solution ]",
                                "cve_priority": "high",
                                "cve_public_date": "2025-09-11 17:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38352",
                                "url": "https://ubuntu.com/security/CVE-2025-38352",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del()  If an exiting non-autoreaping task has already passed exit_notify() and calls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent or debugger right after unlock_task_sighand().  If a concurrent posix_cpu_timer_del() runs at that moment, it won't be able to detect timer->it.cpu.firing != 0: cpu_timer_task_rcu() and/or lock_task_sighand() will fail.  Add the tsk->exit_state check into run_posix_cpu_timers() to fix this.  This fix is not needed if CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y, because exit_task_work() is called before exit_notify(). But the check still makes sense, task_work_add(&tsk->posix_cputimers_work.work) will fail anyway in this case.",
                                "cve_priority": "high",
                                "cve_public_date": "2025-07-22 08:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38118",
                                "url": "https://ubuntu.com/security/CVE-2025-38118",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  Bluetooth: MGMT: Fix UAF on mgmt_remove_adv_monitor_complete  This reworks MGMT_OP_REMOVE_ADV_MONITOR to not use mgmt_pending_add to avoid crashes like bellow:  ================================================================== BUG: KASAN: slab-use-after-free in mgmt_remove_adv_monitor_complete+0xe5/0x540 net/bluetooth/mgmt.c:5406 Read of size 8 at addr ffff88801c53f318 by task kworker/u5:5/5341  CPU: 0 UID: 0 PID: 5341 Comm: kworker/u5:5 Not tainted 6.15.0-syzkaller-10402-g4cb6c8af8591 #0 PREEMPT(full) Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014 Workqueue: hci0 hci_cmd_sync_work Call Trace:  <TASK>  dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120  print_address_description mm/kasan/report.c:408 [inline]  print_report+0xd2/0x2b0 mm/kasan/report.c:521  kasan_report+0x118/0x150 mm/kasan/report.c:634  mgmt_remove_adv_monitor_complete+0xe5/0x540 net/bluetooth/mgmt.c:5406  hci_cmd_sync_work+0x261/0x3a0 net/bluetooth/hci_sync.c:334  process_one_work kernel/workqueue.c:3238 [inline]  process_scheduled_works+0xade/0x17b0 kernel/workqueue.c:3321  worker_thread+0x8a0/0xda0 kernel/workqueue.c:3402  kthread+0x711/0x8a0 kernel/kthread.c:464  ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245  </TASK>  Allocated by task 5987:  kasan_save_stack mm/kasan/common.c:47 [inline]  kasan_save_track+0x3e/0x80 mm/kasan/common.c:68  poison_kmalloc_redzone mm/kasan/common.c:377 [inline]  __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:394  kasan_kmalloc include/linux/kasan.h:260 [inline]  __kmalloc_cache_noprof+0x230/0x3d0 mm/slub.c:4358  kmalloc_noprof include/linux/slab.h:905 [inline]  kzalloc_noprof include/linux/slab.h:1039 [inline]  mgmt_pending_new+0x65/0x240 net/bluetooth/mgmt_util.c:252  mgmt_pending_add+0x34/0x120 net/bluetooth/mgmt_util.c:279  remove_adv_monitor+0x103/0x1b0 net/bluetooth/mgmt.c:5454  hci_mgmt_cmd+0x9c9/0xef0 net/bluetooth/hci_sock.c:1719  hci_sock_sendmsg+0x6ca/0xef0 net/bluetooth/hci_sock.c:1839  sock_sendmsg_nosec net/socket.c:712 [inline]  __sock_sendmsg+0x219/0x270 net/socket.c:727  sock_write_iter+0x258/0x330 net/socket.c:1131  new_sync_write fs/read_write.c:593 [inline]  vfs_write+0x548/0xa90 fs/read_write.c:686  ksys_write+0x145/0x250 fs/read_write.c:738  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]  do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94  entry_SYSCALL_64_after_hwframe+0x77/0x7f  Freed by task 5989:  kasan_save_stack mm/kasan/common.c:47 [inline]  kasan_save_track+0x3e/0x80 mm/kasan/common.c:68  kasan_save_free_info+0x46/0x50 mm/kasan/generic.c:576  poison_slab_object mm/kasan/common.c:247 [inline]  __kasan_slab_free+0x62/0x70 mm/kasan/common.c:264  kasan_slab_free include/linux/kasan.h:233 [inline]  slab_free_hook mm/slub.c:2380 [inline]  slab_free mm/slub.c:4642 [inline]  kfree+0x18e/0x440 mm/slub.c:4841  mgmt_pending_foreach+0xc9/0x120 net/bluetooth/mgmt_util.c:242  mgmt_index_removed+0x10d/0x2f0 net/bluetooth/mgmt.c:9366  hci_sock_bind+0xbe9/0x1000 net/bluetooth/hci_sock.c:1314  __sys_bind_socket net/socket.c:1810 [inline]  __sys_bind+0x2c3/0x3e0 net/socket.c:1841  __do_sys_bind net/socket.c:1846 [inline]  __se_sys_bind net/socket.c:1844 [inline]  __x64_sys_bind+0x7a/0x90 net/socket.c:1844  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]  do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94  entry_SYSCALL_64_after_hwframe+0x77/0x7f",
                                "cve_priority": "high",
                                "cve_public_date": "2025-07-03 09:15:00 UTC"
                            }
                        ],
                        "log": [
                            "",
                            "  * noble/linux: 6.8.0-88.89 -proposed tracker (LP: #2127619)",
                            "",
                            "  *  Enable Xilinx PS UART configs (LP: #2121337)",
                            "    - [Config] Enable Xilinx PS UART configs",
                            "",
                            "  * Fix ARL-U/H suspend issues (LP: #2112469)",
                            "    - platform/x86/intel/pmc: Add Arrow Lake U/H support to intel_pmc_core",
                            "      driver",
                            "    - platform/x86/intel/pmc: Fix Arrow Lake U/H NPU PCI ID",
                            "",
                            "  * r8169 can not wake on LAN via SFP moudule (LP: #2123901)",
                            "    - r8169: set EEE speed down ratio to 1",
                            "",
                            "  * Add pvpanic kernel modules to linux-modules (LP: #2126659)",
                            "    - [Packaging] Add pvpanic kernel modules to linux-modules",
                            "",
                            "  * CVE-2025-21729",
                            "    - wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion",
                            "",
                            "  * Fix failure to build TDX module (LP: #2126698)",
                            "    - x86/paravirt: Move halt paravirt calls under CONFIG_PARAVIRT",
                            "",
                            "  * Ubuntu 24.04.2: error in audit_log_object_context keep printing in the",
                            "    kernel and console (LP: #2123815)",
                            "    - SAUCE: fix: apparmor4.0.0 [26/90]: LSM stacking v39: Audit: Add record",
                            "      for multiple object contexts",
                            "",
                            "  * ensure mptcp keepalives are honored when set (LP: #2125444)",
                            "    - mptcp: sockopt: make sync_socket_options propagate SOCK_KEEPOPEN",
                            "",
                            "  * System hangs when running the memory stress test (LP: #2103680)",
                            "    - mm: page_alloc: avoid kswapd thrashing due to NUMA restrictions",
                            "",
                            "  * UBUNTU: fan: fail to check kmalloc() return could cause a NULL pointer",
                            "    dereference (LP: #2125053)",
                            "    - SAUCE: fan: vxlan: check memory allocation for map",
                            "",
                            "  * jammy:linux-riscv-6.8 is FTBFS because of wrong include (LP: #2122592)",
                            "    - SAUCE: riscv: KVM: Remove broken include",
                            "",
                            "  * Performance degrades rapidly when spawning more processes to run benchmark",
                            "    (LP: #2122006)",
                            "    - cpuidle: menu: Avoid discarding useful information",
                            "    - cpuidle: governors: menu: Avoid using invalid recent intervals data",
                            "",
                            "  * CVE-2025-38227",
                            "    - media: vidtv: Terminating the subsequent process of initialization",
                            "      failure",
                            "",
                            "  * CVE-2025-38678",
                            "    - netfilter: nf_tables: reject duplicate device on updates",
                            "",
                            "  * CVE-2025-38616",
                            "    - tls: handle data disappearing from under the TLS ULP",
                            "",
                            "  * CVE-2025-37838",
                            "    - HSI: ssi_protocol: Fix use after free vulnerability in ssi_protocol",
                            "      Driver Due to Race Condition",
                            "",
                            "  * VMSCAPE CVE-2025-40300 (LP: #2124105) // CVE-2025-40300",
                            "    - Documentation/hw-vuln: Add VMSCAPE documentation",
                            "    - x86/vmscape: Enumerate VMSCAPE bug",
                            "    - x86/vmscape: Add conditional IBPB mitigation",
                            "    - x86/vmscape: Enable the mitigation",
                            "    - x86/bugs: Move cpu_bugs_smt_update() down",
                            "    - x86/vmscape: Warn when STIBP is disabled with SMT",
                            "    - x86/vmscape: Add old Intel CPUs to affected list",
                            "",
                            "  * VMSCAPE CVE-2025-40300 (LP: #2124105)",
                            "    - [Config] Enable MITIGATION_VMSCAPE config",
                            "",
                            "  * CVE-2025-38352",
                            "    - posix-cpu-timers: fix race between handle_posix_cpu_timers() and",
                            "      posix_cpu_timer_del()",
                            "",
                            "  * CVE-2025-38118",
                            "    - Bluetooth: MGMT: Fix UAF on mgmt_remove_adv_monitor_complete",
                            "    - Bluetooth: MGMT: Fix sparse errors",
                            ""
                        ],
                        "package": "linux",
                        "version": "6.8.0-88.89",
                        "urgency": "medium",
                        "distributions": "noble",
                        "launchpad_bugs_fixed": [
                            2127619,
                            2121337,
                            2112469,
                            2123901,
                            2126659,
                            2126698,
                            2123815,
                            2125444,
                            2103680,
                            2125053,
                            2122592,
                            2122006,
                            2124105,
                            2124105
                        ],
                        "author": "Edoardo Canepa <edoardo.canepa@canonical.com>",
                        "date": "Sat, 11 Oct 2025 01:38:46 +0200"
                    }
                ],
                "notes": "linux-tools-6.8.0-88-generic version '6.8.0-88.89' (source package linux version '6.8.0-88.89') was added. linux-tools-6.8.0-88-generic version '6.8.0-88.89' has the same source package name, linux, as removed package linux-headers-6.8.0-87. As such we can use the source package version of the removed package, '6.8.0-87.88', as the starting point in our changelog diff. Kernel packages are an example of where the binary package name changes for the same source package. Using the removed package source package version as our starting point means we can still get meaningful changelog diffs even for what appears to be a new package.",
                "is_version_downgrade": false
            }
        ],
        "snap": []
    },
    "removed": {
        "deb": [
            {
                "name": "linux-headers-6.8.0-87",
                "from_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.8.0-87.88",
                    "version": "6.8.0-87.88"
                },
                "to_version": {
                    "source_package_name": null,
                    "source_package_version": null,
                    "version": null
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "linux-headers-6.8.0-87-generic",
                "from_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.8.0-87.88",
                    "version": "6.8.0-87.88"
                },
                "to_version": {
                    "source_package_name": null,
                    "source_package_version": null,
                    "version": null
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "linux-image-6.8.0-87-generic",
                "from_version": {
                    "source_package_name": "linux-signed",
                    "source_package_version": "6.8.0-87.88",
                    "version": "6.8.0-87.88"
                },
                "to_version": {
                    "source_package_name": null,
                    "source_package_version": null,
                    "version": null
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "linux-modules-6.8.0-87-generic",
                "from_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.8.0-87.88",
                    "version": "6.8.0-87.88"
                },
                "to_version": {
                    "source_package_name": null,
                    "source_package_version": null,
                    "version": null
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "linux-tools-6.8.0-87",
                "from_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.8.0-87.88",
                    "version": "6.8.0-87.88"
                },
                "to_version": {
                    "source_package_name": null,
                    "source_package_version": null,
                    "version": null
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "linux-tools-6.8.0-87-generic",
                "from_version": {
                    "source_package_name": "linux",
                    "source_package_version": "6.8.0-87.88",
                    "version": "6.8.0-87.88"
                },
                "to_version": {
                    "source_package_name": null,
                    "source_package_version": null,
                    "version": null
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [],
                "notes": null,
                "is_version_downgrade": false
            }
        ],
        "snap": []
    },
    "notes": "Changelog diff for Ubuntu 24.04 noble image from daily image serial 20251113 to 20251123",
    "from_series": "noble",
    "to_series": "noble",
    "from_serial": "20251113",
    "to_serial": "20251123",
    "from_manifest_filename": "daily_manifest.previous",
    "to_manifest_filename": "manifest.current"
}