{
    "summary": {
        "snap": {
            "added": [],
            "removed": [],
            "diff": []
        },
        "deb": {
            "added": [
                "linux-headers-5.15.0-1086-kvm",
                "linux-image-5.15.0-1086-kvm",
                "linux-kvm-headers-5.15.0-1086",
                "linux-modules-5.15.0-1086-kvm"
            ],
            "removed": [
                "linux-headers-5.15.0-1085-kvm",
                "linux-image-5.15.0-1085-kvm",
                "linux-kvm-headers-5.15.0-1085",
                "linux-modules-5.15.0-1085-kvm"
            ],
            "diff": [
                "linux-headers-kvm",
                "linux-image-kvm",
                "linux-kvm"
            ]
        }
    },
    "diff": {
        "deb": [
            {
                "name": "linux-headers-kvm",
                "from_version": {
                    "source_package_name": "linux-meta-kvm",
                    "source_package_version": "5.15.0.1085.81",
                    "version": "5.15.0.1085.81"
                },
                "to_version": {
                    "source_package_name": "linux-meta-kvm",
                    "source_package_version": "5.15.0.1086.82",
                    "version": "5.15.0.1086.82"
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Bump ABI 5.15.0-1086",
                            ""
                        ],
                        "package": "linux-meta-kvm",
                        "version": "5.15.0.1086.82",
                        "urgency": "medium",
                        "distributions": "jammy",
                        "launchpad_bugs_fixed": [],
                        "author": "Zixing Liu <zixing.liu@canonical.com>",
                        "date": "Wed, 23 Jul 2025 09:53:20 +0800"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "linux-image-kvm",
                "from_version": {
                    "source_package_name": "linux-meta-kvm",
                    "source_package_version": "5.15.0.1085.81",
                    "version": "5.15.0.1085.81"
                },
                "to_version": {
                    "source_package_name": "linux-meta-kvm",
                    "source_package_version": "5.15.0.1086.82",
                    "version": "5.15.0.1086.82"
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Bump ABI 5.15.0-1086",
                            ""
                        ],
                        "package": "linux-meta-kvm",
                        "version": "5.15.0.1086.82",
                        "urgency": "medium",
                        "distributions": "jammy",
                        "launchpad_bugs_fixed": [],
                        "author": "Zixing Liu <zixing.liu@canonical.com>",
                        "date": "Wed, 23 Jul 2025 09:53:20 +0800"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "linux-kvm",
                "from_version": {
                    "source_package_name": "linux-meta-kvm",
                    "source_package_version": "5.15.0.1085.81",
                    "version": "5.15.0.1085.81"
                },
                "to_version": {
                    "source_package_name": "linux-meta-kvm",
                    "source_package_version": "5.15.0.1086.82",
                    "version": "5.15.0.1086.82"
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Bump ABI 5.15.0-1086",
                            ""
                        ],
                        "package": "linux-meta-kvm",
                        "version": "5.15.0.1086.82",
                        "urgency": "medium",
                        "distributions": "jammy",
                        "launchpad_bugs_fixed": [],
                        "author": "Zixing Liu <zixing.liu@canonical.com>",
                        "date": "Wed, 23 Jul 2025 09:53:20 +0800"
                    }
                ],
                "notes": null,
                "is_version_downgrade": false
            }
        ],
        "snap": []
    },
    "added": {
        "deb": [
            {
                "name": "linux-headers-5.15.0-1086-kvm",
                "from_version": {
                    "source_package_name": "linux-kvm",
                    "source_package_version": "5.15.0-1085.90",
                    "version": null
                },
                "to_version": {
                    "source_package_name": "linux-kvm",
                    "source_package_version": "5.15.0-1086.91",
                    "version": "5.15.0-1086.91"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-38051",
                        "url": "https://ubuntu.com/security/CVE-2025-38051",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  smb: client: Fix use-after-free in cifs_fill_dirent  There is a race condition in the readdir concurrency process, which may access the rsp buffer after it has been released, triggering the following KASAN warning.   ==================================================================  BUG: KASAN: slab-use-after-free in cifs_fill_dirent+0xb03/0xb60 [cifs]  Read of size 4 at addr ffff8880099b819c by task a.out/342975   CPU: 2 UID: 0 PID: 342975 Comm: a.out Not tainted 6.15.0-rc6+ #240 PREEMPT(full)  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.1-2.fc37 04/01/2014  Call Trace:   <TASK>   dump_stack_lvl+0x53/0x70   print_report+0xce/0x640   kasan_report+0xb8/0xf0   cifs_fill_dirent+0xb03/0xb60 [cifs]   cifs_readdir+0x12cb/0x3190 [cifs]   iterate_dir+0x1a1/0x520   __x64_sys_getdents+0x134/0x220   do_syscall_64+0x4b/0x110   entry_SYSCALL_64_after_hwframe+0x76/0x7e  RIP: 0033:0x7f996f64b9f9  Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89  f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01  f0 ff ff  0d f7 c3 0c 00 f7 d8 64 89 8  RSP: 002b:00007f996f53de78 EFLAGS: 00000207 ORIG_RAX: 000000000000004e  RAX: ffffffffffffffda RBX: 00007f996f53ecdc RCX: 00007f996f64b9f9  RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003  RBP: 00007f996f53dea0 R08: 0000000000000000 R09: 0000000000000000  R10: 0000000000000000 R11: 0000000000000207 R12: ffffffffffffff88  R13: 0000000000000000 R14: 00007ffc8cd9a500 R15: 00007f996f51e000   </TASK>   Allocated by task 408:   kasan_save_stack+0x20/0x40   kasan_save_track+0x14/0x30   __kasan_slab_alloc+0x6e/0x70   kmem_cache_alloc_noprof+0x117/0x3d0   mempool_alloc_noprof+0xf2/0x2c0   cifs_buf_get+0x36/0x80 [cifs]   allocate_buffers+0x1d2/0x330 [cifs]   cifs_demultiplex_thread+0x22b/0x2690 [cifs]   kthread+0x394/0x720   ret_from_fork+0x34/0x70   ret_from_fork_asm+0x1a/0x30   Freed by task 342979:   kasan_save_stack+0x20/0x40   kasan_save_track+0x14/0x30   kasan_save_free_info+0x3b/0x60   __kasan_slab_free+0x37/0x50   kmem_cache_free+0x2b8/0x500   cifs_buf_release+0x3c/0x70 [cifs]   cifs_readdir+0x1c97/0x3190 [cifs]   iterate_dir+0x1a1/0x520   __x64_sys_getdents64+0x134/0x220   do_syscall_64+0x4b/0x110   entry_SYSCALL_64_after_hwframe+0x76/0x7e   The buggy address belongs to the object at ffff8880099b8000   which belongs to the cache cifs_request of size 16588  The buggy address is located 412 bytes inside of   freed 16588-byte region [ffff8880099b8000, ffff8880099bc0cc)   The buggy address belongs to the physical page:  page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x99b8  head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0  anon flags: 0x80000000000040(head|node=0|zone=1)  page_type: f5(slab)  raw: 0080000000000040 ffff888001e03400 0000000000000000 dead000000000001  raw: 0000000000000000 0000000000010001 00000000f5000000 0000000000000000  head: 0080000000000040 ffff888001e03400 0000000000000000 dead000000000001  head: 0000000000000000 0000000000010001 00000000f5000000 0000000000000000  head: 0080000000000003 ffffea0000266e01 00000000ffffffff 00000000ffffffff  head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008  page dumped because: kasan: bad access detected   Memory state around the buggy address:   ffff8880099b8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb   ffff8880099b8100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb  >ffff8880099b8180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb                              ^   ffff8880099b8200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb   ffff8880099b8280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb  ==================================================================  POC is available in the link [1].  The problem triggering process is as follows:  Process 1                       Process 2 ----------------------------------- ---truncated---",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38030",
                        "url": "https://ubuntu.com/security/CVE-2025-38030",
                        "cve_description": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
                        "cve_priority": "negligible",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38077",
                        "url": "https://ubuntu.com/security/CVE-2025-38077",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  platform/x86: dell-wmi-sysman: Avoid buffer overflow in current_password_store()  If the 'buf' array received from the user contains an empty string, the 'length' variable will be zero. Accessing the 'buf' array element with index 'length - 1' will result in a buffer overflow.  Add a check for an empty string.  Found by Linux Verification Center (linuxtesting.org) with SVACE.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38078",
                        "url": "https://ubuntu.com/security/CVE-2025-38078",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  ALSA: pcm: Fix race of buffer access at PCM OSS layer  The PCM OSS layer tries to clear the buffer with the silence data at initialization (or reconfiguration) of a stream with the explicit call of snd_pcm_format_set_silence() with runtime->dma_area.  But this may lead to a UAF because the accessed runtime->dma_area might be freed concurrently, as it's performed outside the PCM ops.  For avoiding it, move the code into the PCM core and perform it inside the buffer access lock, so that it won't be changed during the operation.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38003",
                        "url": "https://ubuntu.com/security/CVE-2025-38003",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  can: bcm: add missing rcu read protection for procfs content  When the procfs content is generated for a bcm_op which is in the process to be removed the procfs output might show unreliable data (UAF).  As the removal of bcm_op's is already implemented with rcu handling this patch adds the missing rcu_read_lock() and makes sure the list entries are properly removed under rcu protection.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-08 11:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38004",
                        "url": "https://ubuntu.com/security/CVE-2025-38004",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  can: bcm: add locking for bcm_op runtime updates  The CAN broadcast manager (CAN BCM) can send a sequence of CAN frames via hrtimer. The content and also the length of the sequence can be changed resp reduced at runtime where the 'currframe' counter is then set to zero.  Although this appeared to be a safe operation the updates of 'currframe' can be triggered from user space and hrtimer context in bcm_can_tx(). Anderson Nascimento created a proof of concept that triggered a KASAN slab-out-of-bounds read access which can be prevented with a spin_lock_bh.  At the rework of bcm_can_tx() the 'count' variable has been moved into the protected section as this variable can be modified from both contexts too.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-08 11:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38031",
                        "url": "https://ubuntu.com/security/CVE-2025-38031",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  padata: do not leak refcount in reorder_work  A recent patch that addressed a UAF introduced a reference count leak: the parallel_data refcount is incremented unconditionally, regardless of the return value of queue_work(). If the work item is already queued, the incremented refcount is never decremented.  Fix this by checking the return value of queue_work() and decrementing the refcount when necessary.  Resolves:  Unreferenced object 0xffff9d9f421e3d80 (size 192):   comm \"cryptomgr_probe\", pid 157, jiffies 4294694003   hex dump (first 32 bytes):     80 8b cf 41 9f 9d ff ff b8 97 e0 89 ff ff ff ff  ...A............     d0 97 e0 89 ff ff ff ff 19 00 00 00 1f 88 23 00  ..............#.   backtrace (crc 838fb36):     __kmalloc_cache_noprof+0x284/0x320     padata_alloc_pd+0x20/0x1e0     padata_alloc_shell+0x3b/0xa0     0xffffffffc040a54d     cryptomgr_probe+0x43/0xc0     kthread+0xf6/0x1f0     ret_from_fork+0x2f/0x50     ret_from_fork_asm+0x1a/0x30",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38079",
                        "url": "https://ubuntu.com/security/CVE-2025-38079",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  crypto: algif_hash - fix double free in hash_accept  If accept(2) is called on socket type algif_hash with MSG_MORE flag set and crypto_ahash_import fails, sk2 is freed. However, it is also freed in af_alg_release, leading to slab-use-after-free error.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38052",
                        "url": "https://ubuntu.com/security/CVE-2025-38052",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done  Syzbot reported a slab-use-after-free with the following call trace:    ==================================================================   BUG: KASAN: slab-use-after-free in tipc_aead_encrypt_done+0x4bd/0x510 net/tipc/crypto.c:840   Read of size 8 at addr ffff88807a733000 by task kworker/1:0/25    Call Trace:    kasan_report+0xd9/0x110 mm/kasan/report.c:601    tipc_aead_encrypt_done+0x4bd/0x510 net/tipc/crypto.c:840    crypto_request_complete include/crypto/algapi.h:266    aead_request_complete include/crypto/internal/aead.h:85    cryptd_aead_crypt+0x3b8/0x750 crypto/cryptd.c:772    crypto_request_complete include/crypto/algapi.h:266    cryptd_queue_worker+0x131/0x200 crypto/cryptd.c:181    process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231    Allocated by task 8355:    kzalloc_noprof include/linux/slab.h:778    tipc_crypto_start+0xcc/0x9e0 net/tipc/crypto.c:1466    tipc_init_net+0x2dd/0x430 net/tipc/core.c:72    ops_init+0xb9/0x650 net/core/net_namespace.c:139    setup_net+0x435/0xb40 net/core/net_namespace.c:343    copy_net_ns+0x2f0/0x670 net/core/net_namespace.c:508    create_new_namespaces+0x3ea/0xb10 kernel/nsproxy.c:110    unshare_nsproxy_namespaces+0xc0/0x1f0 kernel/nsproxy.c:228    ksys_unshare+0x419/0x970 kernel/fork.c:3323    __do_sys_unshare kernel/fork.c:3394    Freed by task 63:    kfree+0x12a/0x3b0 mm/slub.c:4557    tipc_crypto_stop+0x23c/0x500 net/tipc/crypto.c:1539    tipc_exit_net+0x8c/0x110 net/tipc/core.c:119    ops_exit_list+0xb0/0x180 net/core/net_namespace.c:173    cleanup_net+0x5b7/0xbf0 net/core/net_namespace.c:640    process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231  After freed the tipc_crypto tx by delete namespace, tipc_aead_encrypt_done may still visit it in cryptd_queue_worker workqueue.  I reproduce this issue by:   ip netns add ns1   ip link add veth1 type veth peer name veth2   ip link set veth1 netns ns1   ip netns exec ns1 tipc bearer enable media eth dev veth1   ip netns exec ns1 tipc node set key this_is_a_master_key master   ip netns exec ns1 tipc bearer disable media eth dev veth1   ip netns del ns1  The key of reproduction is that, simd_aead_encrypt is interrupted, leading to crypto_simd_usable() return false. Thus, the cryptd_queue_worker is triggered, and the tipc_crypto tx will be visited.    tipc_disc_timeout     tipc_bearer_xmit_skb       tipc_crypto_xmit         tipc_aead_encrypt           crypto_aead_encrypt             // encrypt()             simd_aead_encrypt               // crypto_simd_usable() is false               child = &ctx->cryptd_tfm->base;    simd_aead_encrypt     crypto_aead_encrypt       // encrypt()       cryptd_aead_encrypt_enqueue         cryptd_aead_enqueue           cryptd_enqueue_request             // trigger cryptd_queue_worker             queue_work_on(smp_processor_id(), cryptd_wq, &cpu_queue->work)  Fix this by holding net reference count before encrypt.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38058",
                        "url": "https://ubuntu.com/security/CVE-2025-38058",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  __legitimize_mnt(): check for MNT_SYNC_UMOUNT should be under mount_lock  ... or we risk stealing final mntput from sync umount - raising mnt_count after umount(2) has verified that victim is not busy, but before it has set MNT_SYNC_UMOUNT; in that case __legitimize_mnt() doesn't see that it's safe to quietly undo mnt_count increment and leaves dropping the reference to caller, where it'll be a full-blown mntput().  Check under mount_lock is needed; leaving the current one done before taking that makes no sense - it's nowhere near common enough to bother with.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38034",
                        "url": "https://ubuntu.com/security/CVE-2025-38034",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  btrfs: correct the order of prelim_ref arguments in btrfs__prelim_ref  btrfs_prelim_ref() calls the old and new reference variables in the incorrect order. This causes a NULL pointer dereference because oldref is passed as NULL to trace_btrfs_prelim_ref_insert().  Note, trace_btrfs_prelim_ref_insert() is being called with newref as oldref (and oldref as NULL) on purpose in order to print out the values of newref.  To reproduce: echo 1 > /sys/kernel/debug/tracing/events/btrfs/btrfs_prelim_ref_insert/enable  Perform some writeback operations.  Backtrace: BUG: kernel NULL pointer dereference, address: 0000000000000018  #PF: supervisor read access in kernel mode  #PF: error_code(0x0000) - not-present page  PGD 115949067 P4D 115949067 PUD 11594a067 PMD 0  Oops: Oops: 0000 [#1] SMP NOPTI  CPU: 1 UID: 0 PID: 1188 Comm: fsstress Not tainted 6.15.0-rc2-tester+ #47 PREEMPT(voluntary)  7ca2cef72d5e9c600f0c7718adb6462de8149622  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.3-2-gc13ff2cd-prebuilt.qemu.org 04/01/2014  RIP: 0010:trace_event_raw_event_btrfs__prelim_ref+0x72/0x130  Code: e8 43 81 9f ff 48 85 c0 74 78 4d 85 e4 0f 84 8f 00 00 00 49 8b 94 24 c0 06 00 00 48 8b 0a 48 89 48 08 48 8b 52 08 48 89 50 10 <49> 8b 55 18 48 89 50 18 49 8b 55 20 48 89 50 20 41 0f b6 55 28 88  RSP: 0018:ffffce44820077a0 EFLAGS: 00010286  RAX: ffff8c6b403f9014 RBX: ffff8c6b55825730 RCX: 304994edf9cf506b  RDX: d8b11eb7f0fdb699 RSI: ffff8c6b403f9010 RDI: ffff8c6b403f9010  RBP: 0000000000000001 R08: 0000000000000001 R09: 0000000000000010  R10: 00000000ffffffff R11: 0000000000000000 R12: ffff8c6b4e8fb000  R13: 0000000000000000 R14: ffffce44820077a8 R15: ffff8c6b4abd1540  FS:  00007f4dc6813740(0000) GS:ffff8c6c1d378000(0000) knlGS:0000000000000000  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033  CR2: 0000000000000018 CR3: 000000010eb42000 CR4: 0000000000750ef0  PKRU: 55555554  Call Trace:   <TASK>   prelim_ref_insert+0x1c1/0x270   find_parent_nodes+0x12a6/0x1ee0   ? __entry_text_end+0x101f06/0x101f09   ? srso_alias_return_thunk+0x5/0xfbef5   ? srso_alias_return_thunk+0x5/0xfbef5   ? srso_alias_return_thunk+0x5/0xfbef5   ? srso_alias_return_thunk+0x5/0xfbef5   btrfs_is_data_extent_shared+0x167/0x640   ? fiemap_process_hole+0xd0/0x2c0   extent_fiemap+0xa5c/0xbc0   ? __entry_text_end+0x101f05/0x101f09   btrfs_fiemap+0x7e/0xd0   do_vfs_ioctl+0x425/0x9d0   __x64_sys_ioctl+0x75/0xc0",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38035",
                        "url": "https://ubuntu.com/security/CVE-2025-38035",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  nvmet-tcp: don't restore null sk_state_change  queue->state_change is set as part of nvmet_tcp_set_queue_sock(), but if the TCP connection isn't established when nvmet_tcp_set_queue_sock() is called then queue->state_change isn't set and sock->sk->sk_state_change isn't replaced.  As such we don't need to restore sock->sk->sk_state_change if queue->state_change is NULL.  This avoids NULL pointer dereferences such as this:  [  286.462026][    C0] BUG: kernel NULL pointer dereference, address: 0000000000000000 [  286.462814][    C0] #PF: supervisor instruction fetch in kernel mode [  286.463796][    C0] #PF: error_code(0x0010) - not-present page [  286.464392][    C0] PGD 8000000140620067 P4D 8000000140620067 PUD 114201067 PMD 0 [  286.465086][    C0] Oops: Oops: 0010 [#1] SMP KASAN PTI [  286.465559][    C0] CPU: 0 UID: 0 PID: 1628 Comm: nvme Not tainted 6.15.0-rc2+ #11 PREEMPT(voluntary) [  286.466393][    C0] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-3.fc41 04/01/2014 [  286.467147][    C0] RIP: 0010:0x0 [  286.467420][    C0] Code: Unable to access opcode bytes at 0xffffffffffffffd6. [  286.467977][    C0] RSP: 0018:ffff8883ae008580 EFLAGS: 00010246 [  286.468425][    C0] RAX: 0000000000000000 RBX: ffff88813fd34100 RCX: ffffffffa386cc43 [  286.469019][    C0] RDX: 1ffff11027fa68b6 RSI: 0000000000000008 RDI: ffff88813fd34100 [  286.469545][    C0] RBP: ffff88813fd34160 R08: 0000000000000000 R09: ffffed1027fa682c [  286.470072][    C0] R10: ffff88813fd34167 R11: 0000000000000000 R12: ffff88813fd344c3 [  286.470585][    C0] R13: ffff88813fd34112 R14: ffff88813fd34aec R15: ffff888132cdd268 [  286.471070][    C0] FS:  00007fe3c04c7d80(0000) GS:ffff88840743f000(0000) knlGS:0000000000000000 [  286.471644][    C0] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [  286.472543][    C0] CR2: ffffffffffffffd6 CR3: 000000012daca000 CR4: 00000000000006f0 [  286.473500][    C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [  286.474467][    C0] DR3: 0000000000000000 DR6: 00000000ffff07f0 DR7: 0000000000000400 [  286.475453][    C0] Call Trace: [  286.476102][    C0]  <IRQ> [  286.476719][    C0]  tcp_fin+0x2bb/0x440 [  286.477429][    C0]  tcp_data_queue+0x190f/0x4e60 [  286.478174][    C0]  ? __build_skb_around+0x234/0x330 [  286.478940][    C0]  ? rcu_is_watching+0x11/0xb0 [  286.479659][    C0]  ? __pfx_tcp_data_queue+0x10/0x10 [  286.480431][    C0]  ? tcp_try_undo_loss+0x640/0x6c0 [  286.481196][    C0]  ? seqcount_lockdep_reader_access.constprop.0+0x82/0x90 [  286.482046][    C0]  ? kvm_clock_get_cycles+0x14/0x30 [  286.482769][    C0]  ? ktime_get+0x66/0x150 [  286.483433][    C0]  ? rcu_is_watching+0x11/0xb0 [  286.484146][    C0]  tcp_rcv_established+0x6e4/0x2050 [  286.484857][    C0]  ? rcu_is_watching+0x11/0xb0 [  286.485523][    C0]  ? ipv4_dst_check+0x160/0x2b0 [  286.486203][    C0]  ? __pfx_tcp_rcv_established+0x10/0x10 [  286.486917][    C0]  ? lock_release+0x217/0x2c0 [  286.487595][    C0]  tcp_v4_do_rcv+0x4d6/0x9b0 [  286.488279][    C0]  tcp_v4_rcv+0x2af8/0x3e30 [  286.488904][    C0]  ? raw_local_deliver+0x51b/0xad0 [  286.489551][    C0]  ? rcu_is_watching+0x11/0xb0 [  286.490198][    C0]  ? __pfx_tcp_v4_rcv+0x10/0x10 [  286.490813][    C0]  ? __pfx_raw_local_deliver+0x10/0x10 [  286.491487][    C0]  ? __pfx_nf_confirm+0x10/0x10 [nf_conntrack] [  286.492275][    C0]  ? rcu_is_watching+0x11/0xb0 [  286.492900][    C0]  ip_protocol_deliver_rcu+0x8f/0x370 [  286.493579][    C0]  ip_local_deliver_finish+0x297/0x420 [  286.494268][    C0]  ip_local_deliver+0x168/0x430 [  286.494867][    C0]  ? __pfx_ip_local_deliver+0x10/0x10 [  286.495498][    C0]  ? __pfx_ip_local_deliver_finish+0x10/0x10 [  286.496204][    C0]  ? ip_rcv_finish_core+0x19a/0x1f20 [  286.496806][    C0]  ? lock_release+0x217/0x2c0 [  286.497414][    C0]  ip_rcv+0x455/0x6e0 [  286.497945][    C0]  ? __pfx_ip_rcv+0x10/0x10 [ ---truncated---",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38037",
                        "url": "https://ubuntu.com/security/CVE-2025-38037",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  vxlan: Annotate FDB data races  The 'used' and 'updated' fields in the FDB entry structure can be accessed concurrently by multiple threads, leading to reports such as [1]. Can be reproduced using [2].  Suppress these reports by annotating these accesses using READ_ONCE() / WRITE_ONCE().  [1] BUG: KCSAN: data-race in vxlan_xmit / vxlan_xmit  write to 0xffff942604d263a8 of 8 bytes by task 286 on cpu 0:  vxlan_xmit+0xb29/0x2380  dev_hard_start_xmit+0x84/0x2f0  __dev_queue_xmit+0x45a/0x1650  packet_xmit+0x100/0x150  packet_sendmsg+0x2114/0x2ac0  __sys_sendto+0x318/0x330  __x64_sys_sendto+0x76/0x90  x64_sys_call+0x14e8/0x1c00  do_syscall_64+0x9e/0x1a0  entry_SYSCALL_64_after_hwframe+0x77/0x7f  read to 0xffff942604d263a8 of 8 bytes by task 287 on cpu 2:  vxlan_xmit+0xadf/0x2380  dev_hard_start_xmit+0x84/0x2f0  __dev_queue_xmit+0x45a/0x1650  packet_xmit+0x100/0x150  packet_sendmsg+0x2114/0x2ac0  __sys_sendto+0x318/0x330  __x64_sys_sendto+0x76/0x90  x64_sys_call+0x14e8/0x1c00  do_syscall_64+0x9e/0x1a0  entry_SYSCALL_64_after_hwframe+0x77/0x7f  value changed: 0x00000000fffbac6e -> 0x00000000fffbac6f  Reported by Kernel Concurrency Sanitizer on: CPU: 2 UID: 0 PID: 287 Comm: mausezahn Not tainted 6.13.0-rc7-01544-gb4b270f11a02 #5 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-3.fc41 04/01/2014  [2]  #!/bin/bash   set +H  echo whitelist > /sys/kernel/debug/kcsan  echo !vxlan_xmit > /sys/kernel/debug/kcsan   ip link add name vx0 up type vxlan id 10010 dstport 4789 local 192.0.2.1  bridge fdb add 00:11:22:33:44:55 dev vx0 self static dst 198.51.100.1  taskset -c 0 mausezahn vx0 -a own -b 00:11:22:33:44:55 -c 0 -q &  taskset -c 2 mausezahn vx0 -a own -b 00:11:22:33:44:55 -c 0 -q &",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38061",
                        "url": "https://ubuntu.com/security/CVE-2025-38061",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  net: pktgen: fix access outside of user given buffer in pktgen_thread_write()  Honour the user given buffer size for the strn_len() calls (otherwise strn_len() will access memory outside of the user given buffer).",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38043",
                        "url": "https://ubuntu.com/security/CVE-2025-38043",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  firmware: arm_ffa: Set dma_mask for ffa devices  Set dma_mask for FFA devices, otherwise DMA allocation using the device pointer lead to following warning:  WARNING: CPU: 1 PID: 1 at kernel/dma/mapping.c:597 dma_alloc_attrs+0xe0/0x124",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38044",
                        "url": "https://ubuntu.com/security/CVE-2025-38044",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  media: cx231xx: set device_caps for 417  The video_device for the MPEG encoder did not set device_caps.  Add this, otherwise the video device can't be registered (you get a WARN_ON instead).  Not seen before since currently 417 support is disabled, but I found this while experimenting with it.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38065",
                        "url": "https://ubuntu.com/security/CVE-2025-38065",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  orangefs: Do not truncate file size  'len' is used to store the result of i_size_read(), so making 'len' a size_t results in truncation to 4GiB on 32-bit systems.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38066",
                        "url": "https://ubuntu.com/security/CVE-2025-38066",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  dm cache: prevent BUG_ON by blocking retries on failed device resumes  A cache device failing to resume due to mapping errors should not be retried, as the failure leaves a partially initialized policy object. Repeating the resume operation risks triggering BUG_ON when reloading cache mappings into the incomplete policy object.  Reproduce steps:  1. create a cache metadata consisting of 512 or more cache blocks,    with some mappings stored in the first array block of the mapping    array. Here we use cache_restore v1.0 to build the metadata.  cat <<EOF >> cmeta.xml <superblock uuid=\"\" block_size=\"128\" nr_cache_blocks=\"512\" \\ policy=\"smq\" hint_width=\"4\">   <mappings>     <mapping cache_block=\"0\" origin_block=\"0\" dirty=\"false\"/>   </mappings> </superblock> EOF dmsetup create cmeta --table \"0 8192 linear /dev/sdc 0\" cache_restore -i cmeta.xml -o /dev/mapper/cmeta --metadata-version=2 dmsetup remove cmeta  2. wipe the second array block of the mapping array to simulate    data degradations.  mapping_root=$(dd if=/dev/sdc bs=1c count=8 skip=192 \\ 2>/dev/null | hexdump -e '1/8 \"%u\\n\"') ablock=$(dd if=/dev/sdc bs=1c count=8 skip=$((4096*mapping_root+2056)) \\ 2>/dev/null | hexdump -e '1/8 \"%u\\n\"') dd if=/dev/zero of=/dev/sdc bs=4k count=1 seek=$ablock  3. try bringing up the cache device. The resume is expected to fail    due to the broken array block.  dmsetup create cmeta --table \"0 8192 linear /dev/sdc 0\" dmsetup create cdata --table \"0 65536 linear /dev/sdc 8192\" dmsetup create corig --table \"0 524288 linear /dev/sdc 262144\" dmsetup create cache --notable dmsetup load cache --table \"0 524288 cache /dev/mapper/cmeta \\ /dev/mapper/cdata /dev/mapper/corig 128 2 metadata2 writethrough smq 0\" dmsetup resume cache  4. try resuming the cache again. An unexpected BUG_ON is triggered    while loading cache mappings.  dmsetup resume cache  Kernel logs:  (snip) ------------[ cut here ]------------ kernel BUG at drivers/md/dm-cache-policy-smq.c:752! Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN NOPTI CPU: 0 UID: 0 PID: 332 Comm: dmsetup Not tainted 6.13.4 #3 RIP: 0010:smq_load_mapping+0x3e5/0x570  Fix by disallowing resume operations for devices that failed the initial attempt.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38068",
                        "url": "https://ubuntu.com/security/CVE-2025-38068",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  crypto: lzo - Fix compression buffer overrun  Unlike the decompression code, the compression code in LZO never checked for output overruns.  It instead assumes that the caller always provides enough buffer space, disregarding the buffer length provided by the caller.  Add a safe compression interface that checks for the end of buffer before each write.  Use the safe interface in crypto/lzo.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38072",
                        "url": "https://ubuntu.com/security/CVE-2025-38072",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  libnvdimm/labels: Fix divide error in nd_label_data_init()  If a faulty CXL memory device returns a broken zero LSA size in its memory device information (Identify Memory Device (Opcode 4000h), CXL spec. 3.1, 8.2.9.9.1.1), a divide error occurs in the libnvdimm driver:   Oops: divide error: 0000 [#1] PREEMPT SMP NOPTI  RIP: 0010:nd_label_data_init+0x10e/0x800 [libnvdimm]  Code and flow:  1) CXL Command 4000h returns LSA size = 0 2) config_size is assigned to zero LSA size (CXL pmem driver):  drivers/cxl/pmem.c:             .config_size = mds->lsa_size,  3) max_xfer is set to zero (nvdimm driver):  drivers/nvdimm/label.c: max_xfer = min_t(size_t, ndd->nsarea.max_xfer, config_size);  4) A subsequent DIV_ROUND_UP() causes a division by zero:  drivers/nvdimm/label.c: /* Make our initial read size a multiple of max_xfer size */ drivers/nvdimm/label.c: read_size = min(DIV_ROUND_UP(read_size, max_xfer) * max_xfer, drivers/nvdimm/label.c-                 config_size);  Fix this by checking the config size parameter by extending an existing check.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38048",
                        "url": "https://ubuntu.com/security/CVE-2025-38048",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  virtio_ring: Fix data race by tagging event_triggered as racy for KCSAN  syzbot reports a data-race when accessing the event_triggered, here is the simplified stack when the issue occurred:  ================================================================== BUG: KCSAN: data-race in virtqueue_disable_cb / virtqueue_enable_cb_delayed  write to 0xffff8881025bc452 of 1 bytes by task 3288 on cpu 0:  virtqueue_enable_cb_delayed+0x42/0x3c0 drivers/virtio/virtio_ring.c:2653  start_xmit+0x230/0x1310 drivers/net/virtio_net.c:3264  __netdev_start_xmit include/linux/netdevice.h:5151 [inline]  netdev_start_xmit include/linux/netdevice.h:5160 [inline]  xmit_one net/core/dev.c:3800 [inline]  read to 0xffff8881025bc452 of 1 bytes by interrupt on cpu 1:  virtqueue_disable_cb_split drivers/virtio/virtio_ring.c:880 [inline]  virtqueue_disable_cb+0x92/0x180 drivers/virtio/virtio_ring.c:2566  skb_xmit_done+0x5f/0x140 drivers/net/virtio_net.c:777  vring_interrupt+0x161/0x190 drivers/virtio/virtio_ring.c:2715  __handle_irq_event_percpu+0x95/0x490 kernel/irq/handle.c:158  handle_irq_event_percpu kernel/irq/handle.c:193 [inline]  value changed: 0x01 -> 0x00 ==================================================================  When the data race occurs, the function virtqueue_enable_cb_delayed() sets event_triggered to false, and virtqueue_disable_cb_split/packed() reads it as false due to the race condition. Since event_triggered is an unreliable hint used for optimization, this should only cause the driver temporarily suggest that the device not send an interrupt notification when the event index is used.  Fix this KCSAN reported data-race issue by explicitly tagging the access as data_racy.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38075",
                        "url": "https://ubuntu.com/security/CVE-2025-38075",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  scsi: target: iscsi: Fix timeout on deleted connection  NOPIN response timer may expire on a deleted connection and crash with such logs:  Did not receive response to NOPIN on CID: 0, failing connection for I_T Nexus (null),i,0x00023d000125,iqn.2017-01.com.iscsi.target,t,0x3d  BUG: Kernel NULL pointer dereference on read at 0x00000000 NIP  strlcpy+0x8/0xb0 LR iscsit_fill_cxn_timeout_err_stats+0x5c/0xc0 [iscsi_target_mod] Call Trace:  iscsit_handle_nopin_response_timeout+0xfc/0x120 [iscsi_target_mod]  call_timer_fn+0x58/0x1f0  run_timer_softirq+0x740/0x860  __do_softirq+0x16c/0x420  irq_exit+0x188/0x1c0  timer_interrupt+0x184/0x410  That is because nopin response timer may be re-started on nopin timer expiration.  Stop nopin timer before stopping the nopin response timer to be sure that no one of them will be re-started.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38083",
                        "url": "https://ubuntu.com/security/CVE-2025-38083",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  net_sched: prio: fix a race in prio_tune()  Gerrard Tai reported a race condition in PRIO, whenever SFQ perturb timer fires at the wrong time.  The race is as follows:  CPU 0                                 CPU 1 [1]: lock root [2]: qdisc_tree_flush_backlog() [3]: unlock root  |  |                                    [5]: lock root  |                                    [6]: rehash  |                                    [7]: qdisc_tree_reduce_backlog()  | [4]: qdisc_put()  This can be abused to underflow a parent's qlen.  Calling qdisc_purge_queue() instead of qdisc_tree_flush_backlog() should fix the race, because all packets will be purged from the qdisc before releasing the lock.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-20 12:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2024-50073",
                        "url": "https://ubuntu.com/security/CVE-2024-50073",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  tty: n_gsm: Fix use-after-free in gsm_cleanup_mux  BUG: KASAN: slab-use-after-free in gsm_cleanup_mux+0x77b/0x7b0 drivers/tty/n_gsm.c:3160 [n_gsm] Read of size 8 at addr ffff88815fe99c00 by task poc/3379 CPU: 0 UID: 0 PID: 3379 Comm: poc Not tainted 6.11.0+ #56 Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020 Call Trace:  <TASK>  gsm_cleanup_mux+0x77b/0x7b0 drivers/tty/n_gsm.c:3160 [n_gsm]  __pfx_gsm_cleanup_mux+0x10/0x10 drivers/tty/n_gsm.c:3124 [n_gsm]  __pfx_sched_clock_cpu+0x10/0x10 kernel/sched/clock.c:389  update_load_avg+0x1c1/0x27b0 kernel/sched/fair.c:4500  __pfx_min_vruntime_cb_rotate+0x10/0x10 kernel/sched/fair.c:846  __rb_insert_augmented+0x492/0xbf0 lib/rbtree.c:161  gsmld_ioctl+0x395/0x1450 drivers/tty/n_gsm.c:3408 [n_gsm]  _raw_spin_lock_irqsave+0x92/0xf0 arch/x86/include/asm/atomic.h:107  __pfx_gsmld_ioctl+0x10/0x10 drivers/tty/n_gsm.c:3822 [n_gsm]  ktime_get+0x5e/0x140 kernel/time/timekeeping.c:195  ldsem_down_read+0x94/0x4e0 arch/x86/include/asm/atomic64_64.h:79  __pfx_ldsem_down_read+0x10/0x10 drivers/tty/tty_ldsem.c:338  __pfx_do_vfs_ioctl+0x10/0x10 fs/ioctl.c:805  tty_ioctl+0x643/0x1100 drivers/tty/tty_io.c:2818  Allocated by task 65:  gsm_data_alloc.constprop.0+0x27/0x190 drivers/tty/n_gsm.c:926 [n_gsm]  gsm_send+0x2c/0x580 drivers/tty/n_gsm.c:819 [n_gsm]  gsm1_receive+0x547/0xad0 drivers/tty/n_gsm.c:3038 [n_gsm]  gsmld_receive_buf+0x176/0x280 drivers/tty/n_gsm.c:3609 [n_gsm]  tty_ldisc_receive_buf+0x101/0x1e0 drivers/tty/tty_buffer.c:391  tty_port_default_receive_buf+0x61/0xa0 drivers/tty/tty_port.c:39  flush_to_ldisc+0x1b0/0x750 drivers/tty/tty_buffer.c:445  process_scheduled_works+0x2b0/0x10d0 kernel/workqueue.c:3229  worker_thread+0x3dc/0x950 kernel/workqueue.c:3391  kthread+0x2a3/0x370 kernel/kthread.c:389  ret_from_fork+0x2d/0x70 arch/x86/kernel/process.c:147  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:257  Freed by task 3367:  kfree+0x126/0x420 mm/slub.c:4580  gsm_cleanup_mux+0x36c/0x7b0 drivers/tty/n_gsm.c:3160 [n_gsm]  gsmld_ioctl+0x395/0x1450 drivers/tty/n_gsm.c:3408 [n_gsm]  tty_ioctl+0x643/0x1100 drivers/tty/tty_io.c:2818  [Analysis] gsm_msg on the tx_ctrl_list or tx_data_list of gsm_mux can be freed by multi threads through ioctl,which leads to the occurrence of uaf. Protect it by gsm tx lock.",
                        "cve_priority": "medium",
                        "cve_public_date": "2024-10-29 01:15:00 UTC"
                    }
                ],
                "launchpad_bugs_fixed": [
                    2117604,
                    2117618,
                    2114450,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    1786013,
                    2117395
                ],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-38051",
                                "url": "https://ubuntu.com/security/CVE-2025-38051",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  smb: client: Fix use-after-free in cifs_fill_dirent  There is a race condition in the readdir concurrency process, which may access the rsp buffer after it has been released, triggering the following KASAN warning.   ==================================================================  BUG: KASAN: slab-use-after-free in cifs_fill_dirent+0xb03/0xb60 [cifs]  Read of size 4 at addr ffff8880099b819c by task a.out/342975   CPU: 2 UID: 0 PID: 342975 Comm: a.out Not tainted 6.15.0-rc6+ #240 PREEMPT(full)  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.1-2.fc37 04/01/2014  Call Trace:   <TASK>   dump_stack_lvl+0x53/0x70   print_report+0xce/0x640   kasan_report+0xb8/0xf0   cifs_fill_dirent+0xb03/0xb60 [cifs]   cifs_readdir+0x12cb/0x3190 [cifs]   iterate_dir+0x1a1/0x520   __x64_sys_getdents+0x134/0x220   do_syscall_64+0x4b/0x110   entry_SYSCALL_64_after_hwframe+0x76/0x7e  RIP: 0033:0x7f996f64b9f9  Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89  f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01  f0 ff ff  0d f7 c3 0c 00 f7 d8 64 89 8  RSP: 002b:00007f996f53de78 EFLAGS: 00000207 ORIG_RAX: 000000000000004e  RAX: ffffffffffffffda RBX: 00007f996f53ecdc RCX: 00007f996f64b9f9  RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003  RBP: 00007f996f53dea0 R08: 0000000000000000 R09: 0000000000000000  R10: 0000000000000000 R11: 0000000000000207 R12: ffffffffffffff88  R13: 0000000000000000 R14: 00007ffc8cd9a500 R15: 00007f996f51e000   </TASK>   Allocated by task 408:   kasan_save_stack+0x20/0x40   kasan_save_track+0x14/0x30   __kasan_slab_alloc+0x6e/0x70   kmem_cache_alloc_noprof+0x117/0x3d0   mempool_alloc_noprof+0xf2/0x2c0   cifs_buf_get+0x36/0x80 [cifs]   allocate_buffers+0x1d2/0x330 [cifs]   cifs_demultiplex_thread+0x22b/0x2690 [cifs]   kthread+0x394/0x720   ret_from_fork+0x34/0x70   ret_from_fork_asm+0x1a/0x30   Freed by task 342979:   kasan_save_stack+0x20/0x40   kasan_save_track+0x14/0x30   kasan_save_free_info+0x3b/0x60   __kasan_slab_free+0x37/0x50   kmem_cache_free+0x2b8/0x500   cifs_buf_release+0x3c/0x70 [cifs]   cifs_readdir+0x1c97/0x3190 [cifs]   iterate_dir+0x1a1/0x520   __x64_sys_getdents64+0x134/0x220   do_syscall_64+0x4b/0x110   entry_SYSCALL_64_after_hwframe+0x76/0x7e   The buggy address belongs to the object at ffff8880099b8000   which belongs to the cache cifs_request of size 16588  The buggy address is located 412 bytes inside of   freed 16588-byte region [ffff8880099b8000, ffff8880099bc0cc)   The buggy address belongs to the physical page:  page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x99b8  head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0  anon flags: 0x80000000000040(head|node=0|zone=1)  page_type: f5(slab)  raw: 0080000000000040 ffff888001e03400 0000000000000000 dead000000000001  raw: 0000000000000000 0000000000010001 00000000f5000000 0000000000000000  head: 0080000000000040 ffff888001e03400 0000000000000000 dead000000000001  head: 0000000000000000 0000000000010001 00000000f5000000 0000000000000000  head: 0080000000000003 ffffea0000266e01 00000000ffffffff 00000000ffffffff  head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008  page dumped because: kasan: bad access detected   Memory state around the buggy address:   ffff8880099b8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb   ffff8880099b8100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb  >ffff8880099b8180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb                              ^   ffff8880099b8200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb   ffff8880099b8280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb  ==================================================================  POC is available in the link [1].  The problem triggering process is as follows:  Process 1                       Process 2 ----------------------------------- ---truncated---",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38030",
                                "url": "https://ubuntu.com/security/CVE-2025-38030",
                                "cve_description": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
                                "cve_priority": "negligible",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38077",
                                "url": "https://ubuntu.com/security/CVE-2025-38077",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  platform/x86: dell-wmi-sysman: Avoid buffer overflow in current_password_store()  If the 'buf' array received from the user contains an empty string, the 'length' variable will be zero. Accessing the 'buf' array element with index 'length - 1' will result in a buffer overflow.  Add a check for an empty string.  Found by Linux Verification Center (linuxtesting.org) with SVACE.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38078",
                                "url": "https://ubuntu.com/security/CVE-2025-38078",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  ALSA: pcm: Fix race of buffer access at PCM OSS layer  The PCM OSS layer tries to clear the buffer with the silence data at initialization (or reconfiguration) of a stream with the explicit call of snd_pcm_format_set_silence() with runtime->dma_area.  But this may lead to a UAF because the accessed runtime->dma_area might be freed concurrently, as it's performed outside the PCM ops.  For avoiding it, move the code into the PCM core and perform it inside the buffer access lock, so that it won't be changed during the operation.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38003",
                                "url": "https://ubuntu.com/security/CVE-2025-38003",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  can: bcm: add missing rcu read protection for procfs content  When the procfs content is generated for a bcm_op which is in the process to be removed the procfs output might show unreliable data (UAF).  As the removal of bcm_op's is already implemented with rcu handling this patch adds the missing rcu_read_lock() and makes sure the list entries are properly removed under rcu protection.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-08 11:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38004",
                                "url": "https://ubuntu.com/security/CVE-2025-38004",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  can: bcm: add locking for bcm_op runtime updates  The CAN broadcast manager (CAN BCM) can send a sequence of CAN frames via hrtimer. The content and also the length of the sequence can be changed resp reduced at runtime where the 'currframe' counter is then set to zero.  Although this appeared to be a safe operation the updates of 'currframe' can be triggered from user space and hrtimer context in bcm_can_tx(). Anderson Nascimento created a proof of concept that triggered a KASAN slab-out-of-bounds read access which can be prevented with a spin_lock_bh.  At the rework of bcm_can_tx() the 'count' variable has been moved into the protected section as this variable can be modified from both contexts too.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-08 11:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38031",
                                "url": "https://ubuntu.com/security/CVE-2025-38031",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  padata: do not leak refcount in reorder_work  A recent patch that addressed a UAF introduced a reference count leak: the parallel_data refcount is incremented unconditionally, regardless of the return value of queue_work(). If the work item is already queued, the incremented refcount is never decremented.  Fix this by checking the return value of queue_work() and decrementing the refcount when necessary.  Resolves:  Unreferenced object 0xffff9d9f421e3d80 (size 192):   comm \"cryptomgr_probe\", pid 157, jiffies 4294694003   hex dump (first 32 bytes):     80 8b cf 41 9f 9d ff ff b8 97 e0 89 ff ff ff ff  ...A............     d0 97 e0 89 ff ff ff ff 19 00 00 00 1f 88 23 00  ..............#.   backtrace (crc 838fb36):     __kmalloc_cache_noprof+0x284/0x320     padata_alloc_pd+0x20/0x1e0     padata_alloc_shell+0x3b/0xa0     0xffffffffc040a54d     cryptomgr_probe+0x43/0xc0     kthread+0xf6/0x1f0     ret_from_fork+0x2f/0x50     ret_from_fork_asm+0x1a/0x30",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38079",
                                "url": "https://ubuntu.com/security/CVE-2025-38079",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  crypto: algif_hash - fix double free in hash_accept  If accept(2) is called on socket type algif_hash with MSG_MORE flag set and crypto_ahash_import fails, sk2 is freed. However, it is also freed in af_alg_release, leading to slab-use-after-free error.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38052",
                                "url": "https://ubuntu.com/security/CVE-2025-38052",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done  Syzbot reported a slab-use-after-free with the following call trace:    ==================================================================   BUG: KASAN: slab-use-after-free in tipc_aead_encrypt_done+0x4bd/0x510 net/tipc/crypto.c:840   Read of size 8 at addr ffff88807a733000 by task kworker/1:0/25    Call Trace:    kasan_report+0xd9/0x110 mm/kasan/report.c:601    tipc_aead_encrypt_done+0x4bd/0x510 net/tipc/crypto.c:840    crypto_request_complete include/crypto/algapi.h:266    aead_request_complete include/crypto/internal/aead.h:85    cryptd_aead_crypt+0x3b8/0x750 crypto/cryptd.c:772    crypto_request_complete include/crypto/algapi.h:266    cryptd_queue_worker+0x131/0x200 crypto/cryptd.c:181    process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231    Allocated by task 8355:    kzalloc_noprof include/linux/slab.h:778    tipc_crypto_start+0xcc/0x9e0 net/tipc/crypto.c:1466    tipc_init_net+0x2dd/0x430 net/tipc/core.c:72    ops_init+0xb9/0x650 net/core/net_namespace.c:139    setup_net+0x435/0xb40 net/core/net_namespace.c:343    copy_net_ns+0x2f0/0x670 net/core/net_namespace.c:508    create_new_namespaces+0x3ea/0xb10 kernel/nsproxy.c:110    unshare_nsproxy_namespaces+0xc0/0x1f0 kernel/nsproxy.c:228    ksys_unshare+0x419/0x970 kernel/fork.c:3323    __do_sys_unshare kernel/fork.c:3394    Freed by task 63:    kfree+0x12a/0x3b0 mm/slub.c:4557    tipc_crypto_stop+0x23c/0x500 net/tipc/crypto.c:1539    tipc_exit_net+0x8c/0x110 net/tipc/core.c:119    ops_exit_list+0xb0/0x180 net/core/net_namespace.c:173    cleanup_net+0x5b7/0xbf0 net/core/net_namespace.c:640    process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231  After freed the tipc_crypto tx by delete namespace, tipc_aead_encrypt_done may still visit it in cryptd_queue_worker workqueue.  I reproduce this issue by:   ip netns add ns1   ip link add veth1 type veth peer name veth2   ip link set veth1 netns ns1   ip netns exec ns1 tipc bearer enable media eth dev veth1   ip netns exec ns1 tipc node set key this_is_a_master_key master   ip netns exec ns1 tipc bearer disable media eth dev veth1   ip netns del ns1  The key of reproduction is that, simd_aead_encrypt is interrupted, leading to crypto_simd_usable() return false. Thus, the cryptd_queue_worker is triggered, and the tipc_crypto tx will be visited.    tipc_disc_timeout     tipc_bearer_xmit_skb       tipc_crypto_xmit         tipc_aead_encrypt           crypto_aead_encrypt             // encrypt()             simd_aead_encrypt               // crypto_simd_usable() is false               child = &ctx->cryptd_tfm->base;    simd_aead_encrypt     crypto_aead_encrypt       // encrypt()       cryptd_aead_encrypt_enqueue         cryptd_aead_enqueue           cryptd_enqueue_request             // trigger cryptd_queue_worker             queue_work_on(smp_processor_id(), cryptd_wq, &cpu_queue->work)  Fix this by holding net reference count before encrypt.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38058",
                                "url": "https://ubuntu.com/security/CVE-2025-38058",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  __legitimize_mnt(): check for MNT_SYNC_UMOUNT should be under mount_lock  ... or we risk stealing final mntput from sync umount - raising mnt_count after umount(2) has verified that victim is not busy, but before it has set MNT_SYNC_UMOUNT; in that case __legitimize_mnt() doesn't see that it's safe to quietly undo mnt_count increment and leaves dropping the reference to caller, where it'll be a full-blown mntput().  Check under mount_lock is needed; leaving the current one done before taking that makes no sense - it's nowhere near common enough to bother with.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38034",
                                "url": "https://ubuntu.com/security/CVE-2025-38034",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  btrfs: correct the order of prelim_ref arguments in btrfs__prelim_ref  btrfs_prelim_ref() calls the old and new reference variables in the incorrect order. This causes a NULL pointer dereference because oldref is passed as NULL to trace_btrfs_prelim_ref_insert().  Note, trace_btrfs_prelim_ref_insert() is being called with newref as oldref (and oldref as NULL) on purpose in order to print out the values of newref.  To reproduce: echo 1 > /sys/kernel/debug/tracing/events/btrfs/btrfs_prelim_ref_insert/enable  Perform some writeback operations.  Backtrace: BUG: kernel NULL pointer dereference, address: 0000000000000018  #PF: supervisor read access in kernel mode  #PF: error_code(0x0000) - not-present page  PGD 115949067 P4D 115949067 PUD 11594a067 PMD 0  Oops: Oops: 0000 [#1] SMP NOPTI  CPU: 1 UID: 0 PID: 1188 Comm: fsstress Not tainted 6.15.0-rc2-tester+ #47 PREEMPT(voluntary)  7ca2cef72d5e9c600f0c7718adb6462de8149622  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.3-2-gc13ff2cd-prebuilt.qemu.org 04/01/2014  RIP: 0010:trace_event_raw_event_btrfs__prelim_ref+0x72/0x130  Code: e8 43 81 9f ff 48 85 c0 74 78 4d 85 e4 0f 84 8f 00 00 00 49 8b 94 24 c0 06 00 00 48 8b 0a 48 89 48 08 48 8b 52 08 48 89 50 10 <49> 8b 55 18 48 89 50 18 49 8b 55 20 48 89 50 20 41 0f b6 55 28 88  RSP: 0018:ffffce44820077a0 EFLAGS: 00010286  RAX: ffff8c6b403f9014 RBX: ffff8c6b55825730 RCX: 304994edf9cf506b  RDX: d8b11eb7f0fdb699 RSI: ffff8c6b403f9010 RDI: ffff8c6b403f9010  RBP: 0000000000000001 R08: 0000000000000001 R09: 0000000000000010  R10: 00000000ffffffff R11: 0000000000000000 R12: ffff8c6b4e8fb000  R13: 0000000000000000 R14: ffffce44820077a8 R15: ffff8c6b4abd1540  FS:  00007f4dc6813740(0000) GS:ffff8c6c1d378000(0000) knlGS:0000000000000000  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033  CR2: 0000000000000018 CR3: 000000010eb42000 CR4: 0000000000750ef0  PKRU: 55555554  Call Trace:   <TASK>   prelim_ref_insert+0x1c1/0x270   find_parent_nodes+0x12a6/0x1ee0   ? __entry_text_end+0x101f06/0x101f09   ? srso_alias_return_thunk+0x5/0xfbef5   ? srso_alias_return_thunk+0x5/0xfbef5   ? srso_alias_return_thunk+0x5/0xfbef5   ? srso_alias_return_thunk+0x5/0xfbef5   btrfs_is_data_extent_shared+0x167/0x640   ? fiemap_process_hole+0xd0/0x2c0   extent_fiemap+0xa5c/0xbc0   ? __entry_text_end+0x101f05/0x101f09   btrfs_fiemap+0x7e/0xd0   do_vfs_ioctl+0x425/0x9d0   __x64_sys_ioctl+0x75/0xc0",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38035",
                                "url": "https://ubuntu.com/security/CVE-2025-38035",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  nvmet-tcp: don't restore null sk_state_change  queue->state_change is set as part of nvmet_tcp_set_queue_sock(), but if the TCP connection isn't established when nvmet_tcp_set_queue_sock() is called then queue->state_change isn't set and sock->sk->sk_state_change isn't replaced.  As such we don't need to restore sock->sk->sk_state_change if queue->state_change is NULL.  This avoids NULL pointer dereferences such as this:  [  286.462026][    C0] BUG: kernel NULL pointer dereference, address: 0000000000000000 [  286.462814][    C0] #PF: supervisor instruction fetch in kernel mode [  286.463796][    C0] #PF: error_code(0x0010) - not-present page [  286.464392][    C0] PGD 8000000140620067 P4D 8000000140620067 PUD 114201067 PMD 0 [  286.465086][    C0] Oops: Oops: 0010 [#1] SMP KASAN PTI [  286.465559][    C0] CPU: 0 UID: 0 PID: 1628 Comm: nvme Not tainted 6.15.0-rc2+ #11 PREEMPT(voluntary) [  286.466393][    C0] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-3.fc41 04/01/2014 [  286.467147][    C0] RIP: 0010:0x0 [  286.467420][    C0] Code: Unable to access opcode bytes at 0xffffffffffffffd6. [  286.467977][    C0] RSP: 0018:ffff8883ae008580 EFLAGS: 00010246 [  286.468425][    C0] RAX: 0000000000000000 RBX: ffff88813fd34100 RCX: ffffffffa386cc43 [  286.469019][    C0] RDX: 1ffff11027fa68b6 RSI: 0000000000000008 RDI: ffff88813fd34100 [  286.469545][    C0] RBP: ffff88813fd34160 R08: 0000000000000000 R09: ffffed1027fa682c [  286.470072][    C0] R10: ffff88813fd34167 R11: 0000000000000000 R12: ffff88813fd344c3 [  286.470585][    C0] R13: ffff88813fd34112 R14: ffff88813fd34aec R15: ffff888132cdd268 [  286.471070][    C0] FS:  00007fe3c04c7d80(0000) GS:ffff88840743f000(0000) knlGS:0000000000000000 [  286.471644][    C0] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [  286.472543][    C0] CR2: ffffffffffffffd6 CR3: 000000012daca000 CR4: 00000000000006f0 [  286.473500][    C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [  286.474467][    C0] DR3: 0000000000000000 DR6: 00000000ffff07f0 DR7: 0000000000000400 [  286.475453][    C0] Call Trace: [  286.476102][    C0]  <IRQ> [  286.476719][    C0]  tcp_fin+0x2bb/0x440 [  286.477429][    C0]  tcp_data_queue+0x190f/0x4e60 [  286.478174][    C0]  ? __build_skb_around+0x234/0x330 [  286.478940][    C0]  ? rcu_is_watching+0x11/0xb0 [  286.479659][    C0]  ? __pfx_tcp_data_queue+0x10/0x10 [  286.480431][    C0]  ? tcp_try_undo_loss+0x640/0x6c0 [  286.481196][    C0]  ? seqcount_lockdep_reader_access.constprop.0+0x82/0x90 [  286.482046][    C0]  ? kvm_clock_get_cycles+0x14/0x30 [  286.482769][    C0]  ? ktime_get+0x66/0x150 [  286.483433][    C0]  ? rcu_is_watching+0x11/0xb0 [  286.484146][    C0]  tcp_rcv_established+0x6e4/0x2050 [  286.484857][    C0]  ? rcu_is_watching+0x11/0xb0 [  286.485523][    C0]  ? ipv4_dst_check+0x160/0x2b0 [  286.486203][    C0]  ? __pfx_tcp_rcv_established+0x10/0x10 [  286.486917][    C0]  ? lock_release+0x217/0x2c0 [  286.487595][    C0]  tcp_v4_do_rcv+0x4d6/0x9b0 [  286.488279][    C0]  tcp_v4_rcv+0x2af8/0x3e30 [  286.488904][    C0]  ? raw_local_deliver+0x51b/0xad0 [  286.489551][    C0]  ? rcu_is_watching+0x11/0xb0 [  286.490198][    C0]  ? __pfx_tcp_v4_rcv+0x10/0x10 [  286.490813][    C0]  ? __pfx_raw_local_deliver+0x10/0x10 [  286.491487][    C0]  ? __pfx_nf_confirm+0x10/0x10 [nf_conntrack] [  286.492275][    C0]  ? rcu_is_watching+0x11/0xb0 [  286.492900][    C0]  ip_protocol_deliver_rcu+0x8f/0x370 [  286.493579][    C0]  ip_local_deliver_finish+0x297/0x420 [  286.494268][    C0]  ip_local_deliver+0x168/0x430 [  286.494867][    C0]  ? __pfx_ip_local_deliver+0x10/0x10 [  286.495498][    C0]  ? __pfx_ip_local_deliver_finish+0x10/0x10 [  286.496204][    C0]  ? ip_rcv_finish_core+0x19a/0x1f20 [  286.496806][    C0]  ? lock_release+0x217/0x2c0 [  286.497414][    C0]  ip_rcv+0x455/0x6e0 [  286.497945][    C0]  ? __pfx_ip_rcv+0x10/0x10 [ ---truncated---",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38037",
                                "url": "https://ubuntu.com/security/CVE-2025-38037",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  vxlan: Annotate FDB data races  The 'used' and 'updated' fields in the FDB entry structure can be accessed concurrently by multiple threads, leading to reports such as [1]. Can be reproduced using [2].  Suppress these reports by annotating these accesses using READ_ONCE() / WRITE_ONCE().  [1] BUG: KCSAN: data-race in vxlan_xmit / vxlan_xmit  write to 0xffff942604d263a8 of 8 bytes by task 286 on cpu 0:  vxlan_xmit+0xb29/0x2380  dev_hard_start_xmit+0x84/0x2f0  __dev_queue_xmit+0x45a/0x1650  packet_xmit+0x100/0x150  packet_sendmsg+0x2114/0x2ac0  __sys_sendto+0x318/0x330  __x64_sys_sendto+0x76/0x90  x64_sys_call+0x14e8/0x1c00  do_syscall_64+0x9e/0x1a0  entry_SYSCALL_64_after_hwframe+0x77/0x7f  read to 0xffff942604d263a8 of 8 bytes by task 287 on cpu 2:  vxlan_xmit+0xadf/0x2380  dev_hard_start_xmit+0x84/0x2f0  __dev_queue_xmit+0x45a/0x1650  packet_xmit+0x100/0x150  packet_sendmsg+0x2114/0x2ac0  __sys_sendto+0x318/0x330  __x64_sys_sendto+0x76/0x90  x64_sys_call+0x14e8/0x1c00  do_syscall_64+0x9e/0x1a0  entry_SYSCALL_64_after_hwframe+0x77/0x7f  value changed: 0x00000000fffbac6e -> 0x00000000fffbac6f  Reported by Kernel Concurrency Sanitizer on: CPU: 2 UID: 0 PID: 287 Comm: mausezahn Not tainted 6.13.0-rc7-01544-gb4b270f11a02 #5 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-3.fc41 04/01/2014  [2]  #!/bin/bash   set +H  echo whitelist > /sys/kernel/debug/kcsan  echo !vxlan_xmit > /sys/kernel/debug/kcsan   ip link add name vx0 up type vxlan id 10010 dstport 4789 local 192.0.2.1  bridge fdb add 00:11:22:33:44:55 dev vx0 self static dst 198.51.100.1  taskset -c 0 mausezahn vx0 -a own -b 00:11:22:33:44:55 -c 0 -q &  taskset -c 2 mausezahn vx0 -a own -b 00:11:22:33:44:55 -c 0 -q &",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38061",
                                "url": "https://ubuntu.com/security/CVE-2025-38061",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  net: pktgen: fix access outside of user given buffer in pktgen_thread_write()  Honour the user given buffer size for the strn_len() calls (otherwise strn_len() will access memory outside of the user given buffer).",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38043",
                                "url": "https://ubuntu.com/security/CVE-2025-38043",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  firmware: arm_ffa: Set dma_mask for ffa devices  Set dma_mask for FFA devices, otherwise DMA allocation using the device pointer lead to following warning:  WARNING: CPU: 1 PID: 1 at kernel/dma/mapping.c:597 dma_alloc_attrs+0xe0/0x124",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38044",
                                "url": "https://ubuntu.com/security/CVE-2025-38044",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  media: cx231xx: set device_caps for 417  The video_device for the MPEG encoder did not set device_caps.  Add this, otherwise the video device can't be registered (you get a WARN_ON instead).  Not seen before since currently 417 support is disabled, but I found this while experimenting with it.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38065",
                                "url": "https://ubuntu.com/security/CVE-2025-38065",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  orangefs: Do not truncate file size  'len' is used to store the result of i_size_read(), so making 'len' a size_t results in truncation to 4GiB on 32-bit systems.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38066",
                                "url": "https://ubuntu.com/security/CVE-2025-38066",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  dm cache: prevent BUG_ON by blocking retries on failed device resumes  A cache device failing to resume due to mapping errors should not be retried, as the failure leaves a partially initialized policy object. Repeating the resume operation risks triggering BUG_ON when reloading cache mappings into the incomplete policy object.  Reproduce steps:  1. create a cache metadata consisting of 512 or more cache blocks,    with some mappings stored in the first array block of the mapping    array. Here we use cache_restore v1.0 to build the metadata.  cat <<EOF >> cmeta.xml <superblock uuid=\"\" block_size=\"128\" nr_cache_blocks=\"512\" \\ policy=\"smq\" hint_width=\"4\">   <mappings>     <mapping cache_block=\"0\" origin_block=\"0\" dirty=\"false\"/>   </mappings> </superblock> EOF dmsetup create cmeta --table \"0 8192 linear /dev/sdc 0\" cache_restore -i cmeta.xml -o /dev/mapper/cmeta --metadata-version=2 dmsetup remove cmeta  2. wipe the second array block of the mapping array to simulate    data degradations.  mapping_root=$(dd if=/dev/sdc bs=1c count=8 skip=192 \\ 2>/dev/null | hexdump -e '1/8 \"%u\\n\"') ablock=$(dd if=/dev/sdc bs=1c count=8 skip=$((4096*mapping_root+2056)) \\ 2>/dev/null | hexdump -e '1/8 \"%u\\n\"') dd if=/dev/zero of=/dev/sdc bs=4k count=1 seek=$ablock  3. try bringing up the cache device. The resume is expected to fail    due to the broken array block.  dmsetup create cmeta --table \"0 8192 linear /dev/sdc 0\" dmsetup create cdata --table \"0 65536 linear /dev/sdc 8192\" dmsetup create corig --table \"0 524288 linear /dev/sdc 262144\" dmsetup create cache --notable dmsetup load cache --table \"0 524288 cache /dev/mapper/cmeta \\ /dev/mapper/cdata /dev/mapper/corig 128 2 metadata2 writethrough smq 0\" dmsetup resume cache  4. try resuming the cache again. An unexpected BUG_ON is triggered    while loading cache mappings.  dmsetup resume cache  Kernel logs:  (snip) ------------[ cut here ]------------ kernel BUG at drivers/md/dm-cache-policy-smq.c:752! Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN NOPTI CPU: 0 UID: 0 PID: 332 Comm: dmsetup Not tainted 6.13.4 #3 RIP: 0010:smq_load_mapping+0x3e5/0x570  Fix by disallowing resume operations for devices that failed the initial attempt.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38068",
                                "url": "https://ubuntu.com/security/CVE-2025-38068",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  crypto: lzo - Fix compression buffer overrun  Unlike the decompression code, the compression code in LZO never checked for output overruns.  It instead assumes that the caller always provides enough buffer space, disregarding the buffer length provided by the caller.  Add a safe compression interface that checks for the end of buffer before each write.  Use the safe interface in crypto/lzo.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38072",
                                "url": "https://ubuntu.com/security/CVE-2025-38072",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  libnvdimm/labels: Fix divide error in nd_label_data_init()  If a faulty CXL memory device returns a broken zero LSA size in its memory device information (Identify Memory Device (Opcode 4000h), CXL spec. 3.1, 8.2.9.9.1.1), a divide error occurs in the libnvdimm driver:   Oops: divide error: 0000 [#1] PREEMPT SMP NOPTI  RIP: 0010:nd_label_data_init+0x10e/0x800 [libnvdimm]  Code and flow:  1) CXL Command 4000h returns LSA size = 0 2) config_size is assigned to zero LSA size (CXL pmem driver):  drivers/cxl/pmem.c:             .config_size = mds->lsa_size,  3) max_xfer is set to zero (nvdimm driver):  drivers/nvdimm/label.c: max_xfer = min_t(size_t, ndd->nsarea.max_xfer, config_size);  4) A subsequent DIV_ROUND_UP() causes a division by zero:  drivers/nvdimm/label.c: /* Make our initial read size a multiple of max_xfer size */ drivers/nvdimm/label.c: read_size = min(DIV_ROUND_UP(read_size, max_xfer) * max_xfer, drivers/nvdimm/label.c-                 config_size);  Fix this by checking the config size parameter by extending an existing check.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38048",
                                "url": "https://ubuntu.com/security/CVE-2025-38048",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  virtio_ring: Fix data race by tagging event_triggered as racy for KCSAN  syzbot reports a data-race when accessing the event_triggered, here is the simplified stack when the issue occurred:  ================================================================== BUG: KCSAN: data-race in virtqueue_disable_cb / virtqueue_enable_cb_delayed  write to 0xffff8881025bc452 of 1 bytes by task 3288 on cpu 0:  virtqueue_enable_cb_delayed+0x42/0x3c0 drivers/virtio/virtio_ring.c:2653  start_xmit+0x230/0x1310 drivers/net/virtio_net.c:3264  __netdev_start_xmit include/linux/netdevice.h:5151 [inline]  netdev_start_xmit include/linux/netdevice.h:5160 [inline]  xmit_one net/core/dev.c:3800 [inline]  read to 0xffff8881025bc452 of 1 bytes by interrupt on cpu 1:  virtqueue_disable_cb_split drivers/virtio/virtio_ring.c:880 [inline]  virtqueue_disable_cb+0x92/0x180 drivers/virtio/virtio_ring.c:2566  skb_xmit_done+0x5f/0x140 drivers/net/virtio_net.c:777  vring_interrupt+0x161/0x190 drivers/virtio/virtio_ring.c:2715  __handle_irq_event_percpu+0x95/0x490 kernel/irq/handle.c:158  handle_irq_event_percpu kernel/irq/handle.c:193 [inline]  value changed: 0x01 -> 0x00 ==================================================================  When the data race occurs, the function virtqueue_enable_cb_delayed() sets event_triggered to false, and virtqueue_disable_cb_split/packed() reads it as false due to the race condition. Since event_triggered is an unreliable hint used for optimization, this should only cause the driver temporarily suggest that the device not send an interrupt notification when the event index is used.  Fix this KCSAN reported data-race issue by explicitly tagging the access as data_racy.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38075",
                                "url": "https://ubuntu.com/security/CVE-2025-38075",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  scsi: target: iscsi: Fix timeout on deleted connection  NOPIN response timer may expire on a deleted connection and crash with such logs:  Did not receive response to NOPIN on CID: 0, failing connection for I_T Nexus (null),i,0x00023d000125,iqn.2017-01.com.iscsi.target,t,0x3d  BUG: Kernel NULL pointer dereference on read at 0x00000000 NIP  strlcpy+0x8/0xb0 LR iscsit_fill_cxn_timeout_err_stats+0x5c/0xc0 [iscsi_target_mod] Call Trace:  iscsit_handle_nopin_response_timeout+0xfc/0x120 [iscsi_target_mod]  call_timer_fn+0x58/0x1f0  run_timer_softirq+0x740/0x860  __do_softirq+0x16c/0x420  irq_exit+0x188/0x1c0  timer_interrupt+0x184/0x410  That is because nopin response timer may be re-started on nopin timer expiration.  Stop nopin timer before stopping the nopin response timer to be sure that no one of them will be re-started.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38083",
                                "url": "https://ubuntu.com/security/CVE-2025-38083",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  net_sched: prio: fix a race in prio_tune()  Gerrard Tai reported a race condition in PRIO, whenever SFQ perturb timer fires at the wrong time.  The race is as follows:  CPU 0                                 CPU 1 [1]: lock root [2]: qdisc_tree_flush_backlog() [3]: unlock root  |  |                                    [5]: lock root  |                                    [6]: rehash  |                                    [7]: qdisc_tree_reduce_backlog()  | [4]: qdisc_put()  This can be abused to underflow a parent's qlen.  Calling qdisc_purge_queue() instead of qdisc_tree_flush_backlog() should fix the race, because all packets will be purged from the qdisc before releasing the lock.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-20 12:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2024-50073",
                                "url": "https://ubuntu.com/security/CVE-2024-50073",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  tty: n_gsm: Fix use-after-free in gsm_cleanup_mux  BUG: KASAN: slab-use-after-free in gsm_cleanup_mux+0x77b/0x7b0 drivers/tty/n_gsm.c:3160 [n_gsm] Read of size 8 at addr ffff88815fe99c00 by task poc/3379 CPU: 0 UID: 0 PID: 3379 Comm: poc Not tainted 6.11.0+ #56 Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020 Call Trace:  <TASK>  gsm_cleanup_mux+0x77b/0x7b0 drivers/tty/n_gsm.c:3160 [n_gsm]  __pfx_gsm_cleanup_mux+0x10/0x10 drivers/tty/n_gsm.c:3124 [n_gsm]  __pfx_sched_clock_cpu+0x10/0x10 kernel/sched/clock.c:389  update_load_avg+0x1c1/0x27b0 kernel/sched/fair.c:4500  __pfx_min_vruntime_cb_rotate+0x10/0x10 kernel/sched/fair.c:846  __rb_insert_augmented+0x492/0xbf0 lib/rbtree.c:161  gsmld_ioctl+0x395/0x1450 drivers/tty/n_gsm.c:3408 [n_gsm]  _raw_spin_lock_irqsave+0x92/0xf0 arch/x86/include/asm/atomic.h:107  __pfx_gsmld_ioctl+0x10/0x10 drivers/tty/n_gsm.c:3822 [n_gsm]  ktime_get+0x5e/0x140 kernel/time/timekeeping.c:195  ldsem_down_read+0x94/0x4e0 arch/x86/include/asm/atomic64_64.h:79  __pfx_ldsem_down_read+0x10/0x10 drivers/tty/tty_ldsem.c:338  __pfx_do_vfs_ioctl+0x10/0x10 fs/ioctl.c:805  tty_ioctl+0x643/0x1100 drivers/tty/tty_io.c:2818  Allocated by task 65:  gsm_data_alloc.constprop.0+0x27/0x190 drivers/tty/n_gsm.c:926 [n_gsm]  gsm_send+0x2c/0x580 drivers/tty/n_gsm.c:819 [n_gsm]  gsm1_receive+0x547/0xad0 drivers/tty/n_gsm.c:3038 [n_gsm]  gsmld_receive_buf+0x176/0x280 drivers/tty/n_gsm.c:3609 [n_gsm]  tty_ldisc_receive_buf+0x101/0x1e0 drivers/tty/tty_buffer.c:391  tty_port_default_receive_buf+0x61/0xa0 drivers/tty/tty_port.c:39  flush_to_ldisc+0x1b0/0x750 drivers/tty/tty_buffer.c:445  process_scheduled_works+0x2b0/0x10d0 kernel/workqueue.c:3229  worker_thread+0x3dc/0x950 kernel/workqueue.c:3391  kthread+0x2a3/0x370 kernel/kthread.c:389  ret_from_fork+0x2d/0x70 arch/x86/kernel/process.c:147  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:257  Freed by task 3367:  kfree+0x126/0x420 mm/slub.c:4580  gsm_cleanup_mux+0x36c/0x7b0 drivers/tty/n_gsm.c:3160 [n_gsm]  gsmld_ioctl+0x395/0x1450 drivers/tty/n_gsm.c:3408 [n_gsm]  tty_ioctl+0x643/0x1100 drivers/tty/tty_io.c:2818  [Analysis] gsm_msg on the tx_ctrl_list or tx_data_list of gsm_mux can be freed by multi threads through ioctl,which leads to the occurrence of uaf. Protect it by gsm tx lock.",
                                "cve_priority": "medium",
                                "cve_public_date": "2024-10-29 01:15:00 UTC"
                            }
                        ],
                        "log": [
                            "",
                            "  * jammy/linux-kvm: 5.15.0-1086.91 -proposed tracker (LP: #2117604)",
                            "",
                            "  [ Ubuntu: 5.15.0-152.162 ]",
                            "",
                            "  * jammy/linux: 5.15.0-152.162 -proposed tracker (LP: #2117618)",
                            "  * [UBUNTU 22.04] kernel: Fix z17 elf platform recognition (LP: #2114450)",
                            "    - s390: add z16 elf platform",
                            "    - s390: Add z17 elf platform",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240)",
                            "    - dma-mapping: avoid potential unused data compilation warning",
                            "    - cgroup: Fix compilation issue due to cgroup_mutex not being exported",
                            "    - net: enetc: refactor bulk flipping of RX buffers to separate function",
                            "    - bpf: fix possible endless loop in BPF map iteration",
                            "    - samples/bpf: Fix compilation failure for samples/bpf on LoongArch Fedora",
                            "    - kconfig: merge_config: use an empty file as initfile",
                            "    - NFSv4: Check for delegation validity in",
                            "      nfs_start_delegation_return_locked()",
                            "    - tracing: Mark binary printing functions with __printf() attribute",
                            "    - mailbox: use error ret code of of_parse_phandle_with_args()",
                            "    - fbdev: fsl-diu-fb: add missing device_remove_file()",
                            "    - fbcon: Use correct erase colour for clearing in fbcon",
                            "    - fbdev: core: tileblit: Implement missing margin clearing for tileblit",
                            "    - NFSv4: Treat ENETUNREACH errors as fatal for state recovery",
                            "    - SUNRPC: rpc_clnt_set_transport() must not change the autobind setting",
                            "    - SUNRPC: rpcbind should never reset the port to the value '0'",
                            "    - thermal/drivers/qoriq: Power down TMU on system suspend",
                            "    - dql: Fix dql->limit value when reset.",
                            "    - lockdep: Fix wait context check on softirq for PREEMPT_RT",
                            "    - PCI: dwc: ep: Ensure proper iteration over outbound map windows",
                            "    - tools/build: Don't pass test log files to linker",
                            "    - pNFS/flexfiles: Report ENETDOWN as a connection error",
                            "    - PCI: vmd: Disable MSI remapping bypass under Xen",
                            "    - mmc: host: Wait for Vdd to settle on card power off",
                            "    - wifi: mt76: only mark tx-status-failed frames as ACKed on mt76x0/2",
                            "    - i2c: qup: Vote for interconnect bandwidth to DRAM",
                            "    - i2c: pxa: fix call balance of i2c->clk handling routines",
                            "    - btrfs: make btrfs_discard_workfn() block_group ref explicit",
                            "    - btrfs: avoid linker error in btrfs_find_create_tree_block()",
                            "    - btrfs: get zone unusable bytes while holding lock at",
                            "      btrfs_reclaim_bgs_work()",
                            "    - btrfs: send: return -ENAMETOOLONG when attempting a path that is too",
                            "      long",
                            "    - i3c: master: svc: Fix missing STOP for master request",
                            "    - dlm: make tcp still work in multi-link env",
                            "    - um: Store full CSGSFS and SS register from mcontext",
                            "    - um: Update min_low_pfn to match changes in uml_reserved",
                            "    - ext4: reorder capability check last",
                            "    - scsi: st: Tighten the page format heuristics with MODE SELECT",
                            "    - scsi: st: ERASE does not change tape location",
                            "    - vfio/pci: Handle INTx IRQ_NOTCONNECTED",
                            "    - tcp: reorganize tcp_in_ack_event() and tcp_count_delivered()",
                            "    - rtc: rv3032: fix EERD location",
                            "    - ASoC: mediatek: mt6359: Add stub for mt6359_accdet_enable_jack_detect",
                            "    - kbuild: fix argument parsing in scripts/config",
                            "    - crypto: octeontx2 - suppress auth failure screaming due to negative",
                            "      tests",
                            "    - dm: restrict dm device size to 2^63-512 bytes",
                            "    - xen: Add support for XenServer 6.1 platform device",
                            "    - RDMA/uverbs: Propagate errors from rdma_lookup_get_uobject()",
                            "    - posix-timers: Add cond_resched() to posix_timer_add() search loop",
                            "    - timer_list: Don't use %pK through printk()",
                            "    - netfilter: conntrack: Bound nf_conntrack sysctl writes",
                            "    - arm64/mm: Check PUD_TYPE_TABLE in pud_bad()",
                            "    - mmc: sdhci: Disable SD card clock before changing parameters",
                            "    - ipv6: save dontfrag in cork",
                            "    - auxdisplay: charlcd: Partially revert \"Move hwidth and bwidth to struct",
                            "      hd44780_common\"",
                            "    - ASoC: qcom: sm8250: explicitly set format in sm8250_be_hw_params_fixup()",
                            "    - cpufreq: tegra186: Share policy per cluster",
                            "    - arm64: tegra: p2597: Fix gpio for vdd-1v8-dis regulator",
                            "    - powerpc/prom_init: Fixup missing #size-cells on PowerBook6,7",
                            "    - tcp: bring back NUMA dispersion in inet_ehash_locks_alloc()",
                            "    - rtc: ds1307: stop disabling alarms on probe",
                            "    - ieee802154: ca8210: Use proper setters and getters for bitwise types",
                            "    - ARM: tegra: Switch DSI-B clock parent to PLLD on Tegra114",
                            "    - media: c8sectpfe: Call of_node_put(i2c_bus) only once in",
                            "      c8sectpfe_probe()",
                            "    - remoteproc: qcom_wcnss: Handle platforms with only single power domain",
                            "    - drm/amdgpu: Do not program AGP BAR regs under SRIOV in gfxhub_v1_0.c",
                            "    - pinctrl: bcm281xx: Use \"unsigned int\" instead of bare \"unsigned\"",
                            "    - net: ethernet: ti: cpsw_new: populate netdev of_node",
                            "    - net: pktgen: fix mpls maximum labels list parsing",
                            "    - ipv4: fib: Move fib_valid_key_len() to rtm_to_fib_config().",
                            "    - media: uvcvideo: Add sanity check to uvc_ioctl_xu_ctrl_map",
                            "    - clk: imx8mp: inform CCF of maximum frequency of clocks",
                            "    - x86/bugs: Make spectre user default depend on MITIGATION_SPECTRE_V2",
                            "    - hwmon: (gpio-fan) Add missing mutex locks",
                            "    - ARM: at91: pm: fix at91_suspend_finish for ZQ calibration",
                            "    - drm/mediatek: mtk_dpi: Add checks for reg_h_fre_con existence",
                            "    - fpga: altera-cvp: Increase credit timeout",
                            "    - PCI: brcmstb: Expand inbound window size up to 64GB",
                            "    - PCI: brcmstb: Add a softdep to MIP MSI-X driver",
                            "    - net/mlx5: Avoid report two health errors on same syndrome",
                            "    - selftests/net: have `gro.sh -t` return a correct exit code",
                            "    - drm/amdkfd: KFD release_work possible circular locking",
                            "    - net: xgene-v2: remove incorrect ACPI_PTR annotation",
                            "    - bonding: report duplicate MAC address in all situations",
                            "    - soc: ti: k3-socinfo: Do not use syscon helper to build regmap",
                            "    - x86/build: Fix broken copy command in genimage.sh when making isoimage",
                            "    - drm/amd/display: handle max_downscale_src_width fail check",
                            "    - x86/nmi: Add an emergency handler in nmi_desc & use it in",
                            "      nmi_shootdown_cpus()",
                            "    - cpuidle: menu: Avoid discarding useful information",
                            "    - libbpf: Fix out-of-bound read",
                            "    - x86/kaslr: Reduce KASLR entropy on most x86 systems",
                            "    - MIPS: Use arch specific syscall name match function",
                            "    - MIPS: pm-cps: Use per-CPU variables as per-CPU, not per-core",
                            "    - clocksource: mips-gic-timer: Enable counter when CPUs start",
                            "    - scsi: mpt3sas: Send a diag reset if target reset fails",
                            "    - wifi: rtw88: Fix rtw_init_vht_cap() for RTL8814AU",
                            "    - wifi: rtw88: Fix rtw_init_ht_cap() for RTL8814AU",
                            "    - wifi: rtw88: Fix rtw_desc_to_mcsrate() to handle MCS16-31",
                            "    - EDAC/ie31200: work around false positive build warning",
                            "    - RDMA/core: Fix best page size finding when it can cross SG entries",
                            "    - can: c_can: Use of_property_present() to test existence of DT property",
                            "    - eth: mlx4: don't try to complete XDP frames in netpoll",
                            "    - PCI: Fix old_size lower bound in calculate_iosize() too",
                            "    - ACPI: HED: Always initialize before evged",
                            "    - net/mlx5: Modify LSB bitmask in temperature event to include only the",
                            "      first bit",
                            "    - net/mlx5: Apply rate-limiting to high temperature warning",
                            "    - ASoC: ops: Enforce platform maximum on initial value",
                            "    - ASoC: tas2764: Power up/down amp on mute ops",
                            "    - ASoC: soc-dai: check return value at snd_soc_dai_set_tdm_slot()",
                            "    - pinctrl: devicetree: do not goto err when probing hogs in",
                            "      pinctrl_dt_to_map",
                            "    - smack: recognize ipv4 CIPSO w/o categories",
                            "    - media: v4l: Memset argument to 0 before calling get_mbus_config pad op",
                            "    - net/mlx4_core: Avoid impossible mlx4_db_alloc() order value",
                            "    - phy: core: don't require set_mode() callback for phy_get_mode() to work",
                            "    - drm/amdgpu: reset psp->cmd to NULL after releasing the buffer",
                            "    - drm/amd/display: Initial psr_version with correct setting",
                            "    - net/mlx5: Extend Ethtool loopback selftest to support non-linear SKB",
                            "    - net/mlx5e: set the tx_queue_len for pfifo_fast",
                            "    - net/mlx5e: reduce rep rxq depth to 256 for ECPF",
                            "    - wifi: mac80211: don't unconditionally call drv_mgd_complete_tx()",
                            "    - wifi: mac80211: remove misplaced drv_mgd_complete_tx() call",
                            "    - arch/powerpc/perf: Check the instruction type before creating sample",
                            "      with perf_mem_data_src",
                            "    - ip: fib_rules: Fetch net from fib_rule in fib[46]_rule_configure().",
                            "    - r8152: add vendor/device ID pair for Dell Alienware AW1022z",
                            "    - wifi: rtw88: Fix download_firmware_validate() for RTL8814AU",
                            "    - clk: qcom: camcc-sm8250: Use clk_rcg2_shared_ops for some RCGs",
                            "    - hwmon: (xgene-hwmon) use appropriate type for the latency value",
                            "    - media: qcom: camss: csid: Only add TPG v4l2 ctrl if TPG hardware is",
                            "      available",
                            "    - r8169: don't scan PHY addresses > 0",
                            "    - rcu: handle quiescent states for PREEMPT_RCU=n, PREEMPT_COUNT=y",
                            "    - rcu: fix header guard for rcu_all_qs()",
                            "    - net/mana: fix warning in the writer of client oob",
                            "    - scsi: lpfc: Handle duplicate D_IDs in ndlp search-by D_ID routine",
                            "    - scsi: st: Restore some drive settings after reset",
                            "    - HID: usbkbd: Fix the bit shift number for LED_KANA",
                            "    - drm/ast: Find VBIOS mode from regular display size",
                            "    - bpftool: Fix readlink usage in get_fd_type",
                            "    - perf/amd/ibs: Fix perf_ibs_op.cnt_mask for CurCnt",
                            "    - wifi: rtw88: Don't use static local variable in",
                            "      rtw8822b_set_tx_power_index_by_rate",
                            "    - spi: zynqmp-gqspi: Always acknowledge interrupts",
                            "    - regulator: ad5398: Add device tree support",
                            "    - wifi: ath9k: return by of_get_mac_address",
                            "    - drm/atomic: clarify the rules around drm_atomic_state->allow_modeset",
                            "    - drm: Add valid clones check",
                            "    - ASoC: imx-card: Adjust over allocation of memory in imx_card_parse_of()",
                            "    - pinctrl: meson: define the pull up/down resistor value as 60 kOhm",
                            "    - ASoC: Intel: bytcr_rt5640: Add DMI quirk for Acer Aspire SW3-013",
                            "    - ALSA: hda/realtek: Add quirk for HP Spectre x360 15-df1xxx",
                            "    - xenbus: Allow PVH dom0 a non-local xenstore",
                            "    - remoteproc: qcom_wcnss: Fix on platforms without fallback regulators",
                            "    - xfrm: Sanitize marks before insert",
                            "    - Bluetooth: L2CAP: Fix not checking l2cap_chan security level",
                            "    - bridge: netfilter: Fix forwarding of fragmented packets",
                            "    - net: dwmac-sun8i: Use parsed internal PHY address instead of 1",
                            "    - octeontx2-af: Set LMT_ENA bit for APR table entries",
                            "    - llc: fix data loss when reading from a socket in llc_ui_recvmsg()",
                            "    - drm/edid: fixed the bug that hdr metadata was not reset",
                            "    - memcg: always call cond_resched() after fn()",
                            "    - mm/page_alloc.c: avoid infinite retries caused by cpuset race",
                            "    - Revert \"arm64: dts: allwinner: h6: Use RSB for AXP805 PMIC connection\"",
                            "    - spi: spi-fsl-dspi: restrict register range for regmap access",
                            "    - spi: spi-fsl-dspi: Halt the module after a new message transfer",
                            "    - spi: spi-fsl-dspi: Reset SR flags before sending a new message",
                            "    - kbuild: Disable -Wdefault-const-init-unsafe",
                            "    - i3c: master: svc: Fix implicit fallthrough in svc_i3c_master_ibi_work()",
                            "    - xen/swiotlb: relax alignment requirements",
                            "    - drm/i915/gvt: fix unterminated-string-initialization warning",
                            "    - x86/its: Fix undefined reference to cpu_wants_rethunk_at()",
                            "    - smb: client: Reset all search buffer pointers when releasing buffer",
                            "    - arm64: dts: qcom: sm8350: Fix typo in pil_camera_mem node",
                            "    - coredump: fix error handling for replace_fd()",
                            "    - pid: add pidfd_prepare()",
                            "    - fork: use pidfd_prepare()",
                            "    - coredump: hand a pidfd to the usermode coredump helper",
                            "    - HID: quirks: Add ADATA XPG alpha wireless mouse support",
                            "    - nfs: don't share pNFS DS connections between net namespaces",
                            "    - platform/x86: thinkpad_acpi: Support also NEC Lavie X1475JAS",
                            "    - um: let 'make clean' properly clean underlying SUBARCH as well",
                            "    - spi: spi-sun4i: fix early activation",
                            "    - nvme-pci: add NVME_QUIRK_NO_DEEPEST_PS quirk for SOLIDIGM P44 Pro",
                            "    - tpm: tis: Double the timeout B to 4s",
                            "    - platform/x86: fujitsu-laptop: Support Lifebook S2110 hotkeys",
                            "    - platform/x86: thinkpad_acpi: Ignore battery threshold change event",
                            "      notification",
                            "    - perf/arm-cmn: Initialise cmn->cpu earlier",
                            "    - Linux 5.15.185",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38051",
                            "    - smb: client: Fix use-after-free in cifs_fill_dirent",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38030",
                            "    - Revert \"drm/amd: Keep display off while going into S4\"",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38077",
                            "    - platform/x86: dell-wmi-sysman: Avoid buffer overflow in",
                            "      current_password_store()",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38078",
                            "    - ALSA: pcm: Fix race of buffer access at PCM OSS layer",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38003",
                            "    - can: bcm: add missing rcu read protection for procfs content",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38004",
                            "    - can: bcm: add locking for bcm_op runtime updates",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38031",
                            "    - padata: do not leak refcount in reorder_work",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38079",
                            "    - crypto: algif_hash - fix double free in hash_accept",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38052",
                            "    - net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38058",
                            "    - __legitimize_mnt(): check for MNT_SYNC_UMOUNT should be under mount_lock",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38034",
                            "    - btrfs: correct the order of prelim_ref arguments in btrfs__prelim_ref",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38035",
                            "    - nvmet-tcp: don't restore null sk_state_change",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38037",
                            "    - vxlan: Annotate FDB data races",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38061",
                            "    - net: pktgen: fix access outside of user given buffer in",
                            "      pktgen_thread_write()",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38043",
                            "    - firmware: arm_ffa: Set dma_mask for ffa devices",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38044",
                            "    - media: cx231xx: set device_caps for 417",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38065",
                            "    - orangefs: Do not truncate file size",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38066",
                            "    - dm cache: prevent BUG_ON by blocking retries on failed device resumes",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38068",
                            "    - crypto: lzo - Fix compression buffer overrun",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38072",
                            "    - libnvdimm/labels: Fix divide error in nd_label_data_init()",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38048",
                            "    - virtio_ring: Fix data race by tagging event_triggered as racy for KCSAN",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38075",
                            "    - scsi: target: iscsi: Fix timeout on deleted connection",
                            "  * Packaging resync (LP: #1786013)",
                            "    - [Packaging] update annotations scripts",
                            "  * raid10: block discard causes a NULL pointer dereference after",
                            "    5.15.0-144-generic (LP: #2117395)",
                            "    - md: move initialization and destruction of 'io_acct_set' to md.c",
                            "  * CVE-2025-38083",
                            "    - net_sched: prio: fix a race in prio_tune()",
                            "  * CVE-2024-50073",
                            "    - tty: n_gsm: Fix use-after-free in gsm_cleanup_mux",
                            ""
                        ],
                        "package": "linux-kvm",
                        "version": "5.15.0-1086.91",
                        "urgency": "medium",
                        "distributions": "jammy",
                        "launchpad_bugs_fixed": [
                            2117604,
                            2117618,
                            2114450,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            1786013,
                            2117395
                        ],
                        "author": "Zixing Liu <zixing.liu@canonical.com>",
                        "date": "Fri, 25 Jul 2025 09:23:36 +0800"
                    }
                ],
                "notes": "linux-headers-5.15.0-1086-kvm version '5.15.0-1086.91' (source package linux-kvm version '5.15.0-1086.91') was added. linux-headers-5.15.0-1086-kvm version '5.15.0-1086.91' has the same source package name, linux-kvm, as removed package linux-headers-5.15.0-1085-kvm. As such we can use the source package version of the removed package, '5.15.0-1085.90', as the starting point in our changelog diff. Kernel packages are an example of where the binary package name changes for the same source package. Using the removed package source package version as our starting point means we can still get meaningful changelog diffs even for what appears to be a new package.",
                "is_version_downgrade": false
            },
            {
                "name": "linux-image-5.15.0-1086-kvm",
                "from_version": {
                    "source_package_name": "linux-signed-kvm",
                    "source_package_version": "5.15.0-1085.90",
                    "version": null
                },
                "to_version": {
                    "source_package_name": "linux-signed-kvm",
                    "source_package_version": "5.15.0-1086.91",
                    "version": "5.15.0-1086.91"
                },
                "cves": [],
                "launchpad_bugs_fixed": [
                    1786013
                ],
                "changes": [
                    {
                        "cves": [],
                        "log": [
                            "",
                            "  * Main version: 5.15.0-1086.91",
                            "",
                            "  * Packaging resync (LP: #1786013)",
                            "    - [Packaging] debian/tracking-bug -- resync from main package",
                            ""
                        ],
                        "package": "linux-signed-kvm",
                        "version": "5.15.0-1086.91",
                        "urgency": "medium",
                        "distributions": "jammy",
                        "launchpad_bugs_fixed": [
                            1786013
                        ],
                        "author": "Zixing Liu <zixing.liu@canonical.com>",
                        "date": "Wed, 23 Jul 2025 09:53:45 +0800"
                    }
                ],
                "notes": "linux-image-5.15.0-1086-kvm version '5.15.0-1086.91' (source package linux-signed-kvm version '5.15.0-1086.91') was added. linux-image-5.15.0-1086-kvm version '5.15.0-1086.91' has the same source package name, linux-signed-kvm, as removed package linux-image-5.15.0-1085-kvm. As such we can use the source package version of the removed package, '5.15.0-1085.90', as the starting point in our changelog diff. Kernel packages are an example of where the binary package name changes for the same source package. Using the removed package source package version as our starting point means we can still get meaningful changelog diffs even for what appears to be a new package.",
                "is_version_downgrade": false
            },
            {
                "name": "linux-kvm-headers-5.15.0-1086",
                "from_version": {
                    "source_package_name": "linux-kvm",
                    "source_package_version": "5.15.0-1085.90",
                    "version": null
                },
                "to_version": {
                    "source_package_name": "linux-kvm",
                    "source_package_version": "5.15.0-1086.91",
                    "version": "5.15.0-1086.91"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-38051",
                        "url": "https://ubuntu.com/security/CVE-2025-38051",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  smb: client: Fix use-after-free in cifs_fill_dirent  There is a race condition in the readdir concurrency process, which may access the rsp buffer after it has been released, triggering the following KASAN warning.   ==================================================================  BUG: KASAN: slab-use-after-free in cifs_fill_dirent+0xb03/0xb60 [cifs]  Read of size 4 at addr ffff8880099b819c by task a.out/342975   CPU: 2 UID: 0 PID: 342975 Comm: a.out Not tainted 6.15.0-rc6+ #240 PREEMPT(full)  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.1-2.fc37 04/01/2014  Call Trace:   <TASK>   dump_stack_lvl+0x53/0x70   print_report+0xce/0x640   kasan_report+0xb8/0xf0   cifs_fill_dirent+0xb03/0xb60 [cifs]   cifs_readdir+0x12cb/0x3190 [cifs]   iterate_dir+0x1a1/0x520   __x64_sys_getdents+0x134/0x220   do_syscall_64+0x4b/0x110   entry_SYSCALL_64_after_hwframe+0x76/0x7e  RIP: 0033:0x7f996f64b9f9  Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89  f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01  f0 ff ff  0d f7 c3 0c 00 f7 d8 64 89 8  RSP: 002b:00007f996f53de78 EFLAGS: 00000207 ORIG_RAX: 000000000000004e  RAX: ffffffffffffffda RBX: 00007f996f53ecdc RCX: 00007f996f64b9f9  RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003  RBP: 00007f996f53dea0 R08: 0000000000000000 R09: 0000000000000000  R10: 0000000000000000 R11: 0000000000000207 R12: ffffffffffffff88  R13: 0000000000000000 R14: 00007ffc8cd9a500 R15: 00007f996f51e000   </TASK>   Allocated by task 408:   kasan_save_stack+0x20/0x40   kasan_save_track+0x14/0x30   __kasan_slab_alloc+0x6e/0x70   kmem_cache_alloc_noprof+0x117/0x3d0   mempool_alloc_noprof+0xf2/0x2c0   cifs_buf_get+0x36/0x80 [cifs]   allocate_buffers+0x1d2/0x330 [cifs]   cifs_demultiplex_thread+0x22b/0x2690 [cifs]   kthread+0x394/0x720   ret_from_fork+0x34/0x70   ret_from_fork_asm+0x1a/0x30   Freed by task 342979:   kasan_save_stack+0x20/0x40   kasan_save_track+0x14/0x30   kasan_save_free_info+0x3b/0x60   __kasan_slab_free+0x37/0x50   kmem_cache_free+0x2b8/0x500   cifs_buf_release+0x3c/0x70 [cifs]   cifs_readdir+0x1c97/0x3190 [cifs]   iterate_dir+0x1a1/0x520   __x64_sys_getdents64+0x134/0x220   do_syscall_64+0x4b/0x110   entry_SYSCALL_64_after_hwframe+0x76/0x7e   The buggy address belongs to the object at ffff8880099b8000   which belongs to the cache cifs_request of size 16588  The buggy address is located 412 bytes inside of   freed 16588-byte region [ffff8880099b8000, ffff8880099bc0cc)   The buggy address belongs to the physical page:  page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x99b8  head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0  anon flags: 0x80000000000040(head|node=0|zone=1)  page_type: f5(slab)  raw: 0080000000000040 ffff888001e03400 0000000000000000 dead000000000001  raw: 0000000000000000 0000000000010001 00000000f5000000 0000000000000000  head: 0080000000000040 ffff888001e03400 0000000000000000 dead000000000001  head: 0000000000000000 0000000000010001 00000000f5000000 0000000000000000  head: 0080000000000003 ffffea0000266e01 00000000ffffffff 00000000ffffffff  head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008  page dumped because: kasan: bad access detected   Memory state around the buggy address:   ffff8880099b8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb   ffff8880099b8100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb  >ffff8880099b8180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb                              ^   ffff8880099b8200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb   ffff8880099b8280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb  ==================================================================  POC is available in the link [1].  The problem triggering process is as follows:  Process 1                       Process 2 ----------------------------------- ---truncated---",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38030",
                        "url": "https://ubuntu.com/security/CVE-2025-38030",
                        "cve_description": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
                        "cve_priority": "negligible",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38077",
                        "url": "https://ubuntu.com/security/CVE-2025-38077",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  platform/x86: dell-wmi-sysman: Avoid buffer overflow in current_password_store()  If the 'buf' array received from the user contains an empty string, the 'length' variable will be zero. Accessing the 'buf' array element with index 'length - 1' will result in a buffer overflow.  Add a check for an empty string.  Found by Linux Verification Center (linuxtesting.org) with SVACE.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38078",
                        "url": "https://ubuntu.com/security/CVE-2025-38078",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  ALSA: pcm: Fix race of buffer access at PCM OSS layer  The PCM OSS layer tries to clear the buffer with the silence data at initialization (or reconfiguration) of a stream with the explicit call of snd_pcm_format_set_silence() with runtime->dma_area.  But this may lead to a UAF because the accessed runtime->dma_area might be freed concurrently, as it's performed outside the PCM ops.  For avoiding it, move the code into the PCM core and perform it inside the buffer access lock, so that it won't be changed during the operation.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38003",
                        "url": "https://ubuntu.com/security/CVE-2025-38003",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  can: bcm: add missing rcu read protection for procfs content  When the procfs content is generated for a bcm_op which is in the process to be removed the procfs output might show unreliable data (UAF).  As the removal of bcm_op's is already implemented with rcu handling this patch adds the missing rcu_read_lock() and makes sure the list entries are properly removed under rcu protection.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-08 11:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38004",
                        "url": "https://ubuntu.com/security/CVE-2025-38004",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  can: bcm: add locking for bcm_op runtime updates  The CAN broadcast manager (CAN BCM) can send a sequence of CAN frames via hrtimer. The content and also the length of the sequence can be changed resp reduced at runtime where the 'currframe' counter is then set to zero.  Although this appeared to be a safe operation the updates of 'currframe' can be triggered from user space and hrtimer context in bcm_can_tx(). Anderson Nascimento created a proof of concept that triggered a KASAN slab-out-of-bounds read access which can be prevented with a spin_lock_bh.  At the rework of bcm_can_tx() the 'count' variable has been moved into the protected section as this variable can be modified from both contexts too.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-08 11:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38031",
                        "url": "https://ubuntu.com/security/CVE-2025-38031",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  padata: do not leak refcount in reorder_work  A recent patch that addressed a UAF introduced a reference count leak: the parallel_data refcount is incremented unconditionally, regardless of the return value of queue_work(). If the work item is already queued, the incremented refcount is never decremented.  Fix this by checking the return value of queue_work() and decrementing the refcount when necessary.  Resolves:  Unreferenced object 0xffff9d9f421e3d80 (size 192):   comm \"cryptomgr_probe\", pid 157, jiffies 4294694003   hex dump (first 32 bytes):     80 8b cf 41 9f 9d ff ff b8 97 e0 89 ff ff ff ff  ...A............     d0 97 e0 89 ff ff ff ff 19 00 00 00 1f 88 23 00  ..............#.   backtrace (crc 838fb36):     __kmalloc_cache_noprof+0x284/0x320     padata_alloc_pd+0x20/0x1e0     padata_alloc_shell+0x3b/0xa0     0xffffffffc040a54d     cryptomgr_probe+0x43/0xc0     kthread+0xf6/0x1f0     ret_from_fork+0x2f/0x50     ret_from_fork_asm+0x1a/0x30",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38079",
                        "url": "https://ubuntu.com/security/CVE-2025-38079",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  crypto: algif_hash - fix double free in hash_accept  If accept(2) is called on socket type algif_hash with MSG_MORE flag set and crypto_ahash_import fails, sk2 is freed. However, it is also freed in af_alg_release, leading to slab-use-after-free error.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38052",
                        "url": "https://ubuntu.com/security/CVE-2025-38052",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done  Syzbot reported a slab-use-after-free with the following call trace:    ==================================================================   BUG: KASAN: slab-use-after-free in tipc_aead_encrypt_done+0x4bd/0x510 net/tipc/crypto.c:840   Read of size 8 at addr ffff88807a733000 by task kworker/1:0/25    Call Trace:    kasan_report+0xd9/0x110 mm/kasan/report.c:601    tipc_aead_encrypt_done+0x4bd/0x510 net/tipc/crypto.c:840    crypto_request_complete include/crypto/algapi.h:266    aead_request_complete include/crypto/internal/aead.h:85    cryptd_aead_crypt+0x3b8/0x750 crypto/cryptd.c:772    crypto_request_complete include/crypto/algapi.h:266    cryptd_queue_worker+0x131/0x200 crypto/cryptd.c:181    process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231    Allocated by task 8355:    kzalloc_noprof include/linux/slab.h:778    tipc_crypto_start+0xcc/0x9e0 net/tipc/crypto.c:1466    tipc_init_net+0x2dd/0x430 net/tipc/core.c:72    ops_init+0xb9/0x650 net/core/net_namespace.c:139    setup_net+0x435/0xb40 net/core/net_namespace.c:343    copy_net_ns+0x2f0/0x670 net/core/net_namespace.c:508    create_new_namespaces+0x3ea/0xb10 kernel/nsproxy.c:110    unshare_nsproxy_namespaces+0xc0/0x1f0 kernel/nsproxy.c:228    ksys_unshare+0x419/0x970 kernel/fork.c:3323    __do_sys_unshare kernel/fork.c:3394    Freed by task 63:    kfree+0x12a/0x3b0 mm/slub.c:4557    tipc_crypto_stop+0x23c/0x500 net/tipc/crypto.c:1539    tipc_exit_net+0x8c/0x110 net/tipc/core.c:119    ops_exit_list+0xb0/0x180 net/core/net_namespace.c:173    cleanup_net+0x5b7/0xbf0 net/core/net_namespace.c:640    process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231  After freed the tipc_crypto tx by delete namespace, tipc_aead_encrypt_done may still visit it in cryptd_queue_worker workqueue.  I reproduce this issue by:   ip netns add ns1   ip link add veth1 type veth peer name veth2   ip link set veth1 netns ns1   ip netns exec ns1 tipc bearer enable media eth dev veth1   ip netns exec ns1 tipc node set key this_is_a_master_key master   ip netns exec ns1 tipc bearer disable media eth dev veth1   ip netns del ns1  The key of reproduction is that, simd_aead_encrypt is interrupted, leading to crypto_simd_usable() return false. Thus, the cryptd_queue_worker is triggered, and the tipc_crypto tx will be visited.    tipc_disc_timeout     tipc_bearer_xmit_skb       tipc_crypto_xmit         tipc_aead_encrypt           crypto_aead_encrypt             // encrypt()             simd_aead_encrypt               // crypto_simd_usable() is false               child = &ctx->cryptd_tfm->base;    simd_aead_encrypt     crypto_aead_encrypt       // encrypt()       cryptd_aead_encrypt_enqueue         cryptd_aead_enqueue           cryptd_enqueue_request             // trigger cryptd_queue_worker             queue_work_on(smp_processor_id(), cryptd_wq, &cpu_queue->work)  Fix this by holding net reference count before encrypt.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38058",
                        "url": "https://ubuntu.com/security/CVE-2025-38058",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  __legitimize_mnt(): check for MNT_SYNC_UMOUNT should be under mount_lock  ... or we risk stealing final mntput from sync umount - raising mnt_count after umount(2) has verified that victim is not busy, but before it has set MNT_SYNC_UMOUNT; in that case __legitimize_mnt() doesn't see that it's safe to quietly undo mnt_count increment and leaves dropping the reference to caller, where it'll be a full-blown mntput().  Check under mount_lock is needed; leaving the current one done before taking that makes no sense - it's nowhere near common enough to bother with.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38034",
                        "url": "https://ubuntu.com/security/CVE-2025-38034",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  btrfs: correct the order of prelim_ref arguments in btrfs__prelim_ref  btrfs_prelim_ref() calls the old and new reference variables in the incorrect order. This causes a NULL pointer dereference because oldref is passed as NULL to trace_btrfs_prelim_ref_insert().  Note, trace_btrfs_prelim_ref_insert() is being called with newref as oldref (and oldref as NULL) on purpose in order to print out the values of newref.  To reproduce: echo 1 > /sys/kernel/debug/tracing/events/btrfs/btrfs_prelim_ref_insert/enable  Perform some writeback operations.  Backtrace: BUG: kernel NULL pointer dereference, address: 0000000000000018  #PF: supervisor read access in kernel mode  #PF: error_code(0x0000) - not-present page  PGD 115949067 P4D 115949067 PUD 11594a067 PMD 0  Oops: Oops: 0000 [#1] SMP NOPTI  CPU: 1 UID: 0 PID: 1188 Comm: fsstress Not tainted 6.15.0-rc2-tester+ #47 PREEMPT(voluntary)  7ca2cef72d5e9c600f0c7718adb6462de8149622  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.3-2-gc13ff2cd-prebuilt.qemu.org 04/01/2014  RIP: 0010:trace_event_raw_event_btrfs__prelim_ref+0x72/0x130  Code: e8 43 81 9f ff 48 85 c0 74 78 4d 85 e4 0f 84 8f 00 00 00 49 8b 94 24 c0 06 00 00 48 8b 0a 48 89 48 08 48 8b 52 08 48 89 50 10 <49> 8b 55 18 48 89 50 18 49 8b 55 20 48 89 50 20 41 0f b6 55 28 88  RSP: 0018:ffffce44820077a0 EFLAGS: 00010286  RAX: ffff8c6b403f9014 RBX: ffff8c6b55825730 RCX: 304994edf9cf506b  RDX: d8b11eb7f0fdb699 RSI: ffff8c6b403f9010 RDI: ffff8c6b403f9010  RBP: 0000000000000001 R08: 0000000000000001 R09: 0000000000000010  R10: 00000000ffffffff R11: 0000000000000000 R12: ffff8c6b4e8fb000  R13: 0000000000000000 R14: ffffce44820077a8 R15: ffff8c6b4abd1540  FS:  00007f4dc6813740(0000) GS:ffff8c6c1d378000(0000) knlGS:0000000000000000  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033  CR2: 0000000000000018 CR3: 000000010eb42000 CR4: 0000000000750ef0  PKRU: 55555554  Call Trace:   <TASK>   prelim_ref_insert+0x1c1/0x270   find_parent_nodes+0x12a6/0x1ee0   ? __entry_text_end+0x101f06/0x101f09   ? srso_alias_return_thunk+0x5/0xfbef5   ? srso_alias_return_thunk+0x5/0xfbef5   ? srso_alias_return_thunk+0x5/0xfbef5   ? srso_alias_return_thunk+0x5/0xfbef5   btrfs_is_data_extent_shared+0x167/0x640   ? fiemap_process_hole+0xd0/0x2c0   extent_fiemap+0xa5c/0xbc0   ? __entry_text_end+0x101f05/0x101f09   btrfs_fiemap+0x7e/0xd0   do_vfs_ioctl+0x425/0x9d0   __x64_sys_ioctl+0x75/0xc0",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38035",
                        "url": "https://ubuntu.com/security/CVE-2025-38035",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  nvmet-tcp: don't restore null sk_state_change  queue->state_change is set as part of nvmet_tcp_set_queue_sock(), but if the TCP connection isn't established when nvmet_tcp_set_queue_sock() is called then queue->state_change isn't set and sock->sk->sk_state_change isn't replaced.  As such we don't need to restore sock->sk->sk_state_change if queue->state_change is NULL.  This avoids NULL pointer dereferences such as this:  [  286.462026][    C0] BUG: kernel NULL pointer dereference, address: 0000000000000000 [  286.462814][    C0] #PF: supervisor instruction fetch in kernel mode [  286.463796][    C0] #PF: error_code(0x0010) - not-present page [  286.464392][    C0] PGD 8000000140620067 P4D 8000000140620067 PUD 114201067 PMD 0 [  286.465086][    C0] Oops: Oops: 0010 [#1] SMP KASAN PTI [  286.465559][    C0] CPU: 0 UID: 0 PID: 1628 Comm: nvme Not tainted 6.15.0-rc2+ #11 PREEMPT(voluntary) [  286.466393][    C0] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-3.fc41 04/01/2014 [  286.467147][    C0] RIP: 0010:0x0 [  286.467420][    C0] Code: Unable to access opcode bytes at 0xffffffffffffffd6. [  286.467977][    C0] RSP: 0018:ffff8883ae008580 EFLAGS: 00010246 [  286.468425][    C0] RAX: 0000000000000000 RBX: ffff88813fd34100 RCX: ffffffffa386cc43 [  286.469019][    C0] RDX: 1ffff11027fa68b6 RSI: 0000000000000008 RDI: ffff88813fd34100 [  286.469545][    C0] RBP: ffff88813fd34160 R08: 0000000000000000 R09: ffffed1027fa682c [  286.470072][    C0] R10: ffff88813fd34167 R11: 0000000000000000 R12: ffff88813fd344c3 [  286.470585][    C0] R13: ffff88813fd34112 R14: ffff88813fd34aec R15: ffff888132cdd268 [  286.471070][    C0] FS:  00007fe3c04c7d80(0000) GS:ffff88840743f000(0000) knlGS:0000000000000000 [  286.471644][    C0] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [  286.472543][    C0] CR2: ffffffffffffffd6 CR3: 000000012daca000 CR4: 00000000000006f0 [  286.473500][    C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [  286.474467][    C0] DR3: 0000000000000000 DR6: 00000000ffff07f0 DR7: 0000000000000400 [  286.475453][    C0] Call Trace: [  286.476102][    C0]  <IRQ> [  286.476719][    C0]  tcp_fin+0x2bb/0x440 [  286.477429][    C0]  tcp_data_queue+0x190f/0x4e60 [  286.478174][    C0]  ? __build_skb_around+0x234/0x330 [  286.478940][    C0]  ? rcu_is_watching+0x11/0xb0 [  286.479659][    C0]  ? __pfx_tcp_data_queue+0x10/0x10 [  286.480431][    C0]  ? tcp_try_undo_loss+0x640/0x6c0 [  286.481196][    C0]  ? seqcount_lockdep_reader_access.constprop.0+0x82/0x90 [  286.482046][    C0]  ? kvm_clock_get_cycles+0x14/0x30 [  286.482769][    C0]  ? ktime_get+0x66/0x150 [  286.483433][    C0]  ? rcu_is_watching+0x11/0xb0 [  286.484146][    C0]  tcp_rcv_established+0x6e4/0x2050 [  286.484857][    C0]  ? rcu_is_watching+0x11/0xb0 [  286.485523][    C0]  ? ipv4_dst_check+0x160/0x2b0 [  286.486203][    C0]  ? __pfx_tcp_rcv_established+0x10/0x10 [  286.486917][    C0]  ? lock_release+0x217/0x2c0 [  286.487595][    C0]  tcp_v4_do_rcv+0x4d6/0x9b0 [  286.488279][    C0]  tcp_v4_rcv+0x2af8/0x3e30 [  286.488904][    C0]  ? raw_local_deliver+0x51b/0xad0 [  286.489551][    C0]  ? rcu_is_watching+0x11/0xb0 [  286.490198][    C0]  ? __pfx_tcp_v4_rcv+0x10/0x10 [  286.490813][    C0]  ? __pfx_raw_local_deliver+0x10/0x10 [  286.491487][    C0]  ? __pfx_nf_confirm+0x10/0x10 [nf_conntrack] [  286.492275][    C0]  ? rcu_is_watching+0x11/0xb0 [  286.492900][    C0]  ip_protocol_deliver_rcu+0x8f/0x370 [  286.493579][    C0]  ip_local_deliver_finish+0x297/0x420 [  286.494268][    C0]  ip_local_deliver+0x168/0x430 [  286.494867][    C0]  ? __pfx_ip_local_deliver+0x10/0x10 [  286.495498][    C0]  ? __pfx_ip_local_deliver_finish+0x10/0x10 [  286.496204][    C0]  ? ip_rcv_finish_core+0x19a/0x1f20 [  286.496806][    C0]  ? lock_release+0x217/0x2c0 [  286.497414][    C0]  ip_rcv+0x455/0x6e0 [  286.497945][    C0]  ? __pfx_ip_rcv+0x10/0x10 [ ---truncated---",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38037",
                        "url": "https://ubuntu.com/security/CVE-2025-38037",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  vxlan: Annotate FDB data races  The 'used' and 'updated' fields in the FDB entry structure can be accessed concurrently by multiple threads, leading to reports such as [1]. Can be reproduced using [2].  Suppress these reports by annotating these accesses using READ_ONCE() / WRITE_ONCE().  [1] BUG: KCSAN: data-race in vxlan_xmit / vxlan_xmit  write to 0xffff942604d263a8 of 8 bytes by task 286 on cpu 0:  vxlan_xmit+0xb29/0x2380  dev_hard_start_xmit+0x84/0x2f0  __dev_queue_xmit+0x45a/0x1650  packet_xmit+0x100/0x150  packet_sendmsg+0x2114/0x2ac0  __sys_sendto+0x318/0x330  __x64_sys_sendto+0x76/0x90  x64_sys_call+0x14e8/0x1c00  do_syscall_64+0x9e/0x1a0  entry_SYSCALL_64_after_hwframe+0x77/0x7f  read to 0xffff942604d263a8 of 8 bytes by task 287 on cpu 2:  vxlan_xmit+0xadf/0x2380  dev_hard_start_xmit+0x84/0x2f0  __dev_queue_xmit+0x45a/0x1650  packet_xmit+0x100/0x150  packet_sendmsg+0x2114/0x2ac0  __sys_sendto+0x318/0x330  __x64_sys_sendto+0x76/0x90  x64_sys_call+0x14e8/0x1c00  do_syscall_64+0x9e/0x1a0  entry_SYSCALL_64_after_hwframe+0x77/0x7f  value changed: 0x00000000fffbac6e -> 0x00000000fffbac6f  Reported by Kernel Concurrency Sanitizer on: CPU: 2 UID: 0 PID: 287 Comm: mausezahn Not tainted 6.13.0-rc7-01544-gb4b270f11a02 #5 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-3.fc41 04/01/2014  [2]  #!/bin/bash   set +H  echo whitelist > /sys/kernel/debug/kcsan  echo !vxlan_xmit > /sys/kernel/debug/kcsan   ip link add name vx0 up type vxlan id 10010 dstport 4789 local 192.0.2.1  bridge fdb add 00:11:22:33:44:55 dev vx0 self static dst 198.51.100.1  taskset -c 0 mausezahn vx0 -a own -b 00:11:22:33:44:55 -c 0 -q &  taskset -c 2 mausezahn vx0 -a own -b 00:11:22:33:44:55 -c 0 -q &",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38061",
                        "url": "https://ubuntu.com/security/CVE-2025-38061",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  net: pktgen: fix access outside of user given buffer in pktgen_thread_write()  Honour the user given buffer size for the strn_len() calls (otherwise strn_len() will access memory outside of the user given buffer).",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38043",
                        "url": "https://ubuntu.com/security/CVE-2025-38043",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  firmware: arm_ffa: Set dma_mask for ffa devices  Set dma_mask for FFA devices, otherwise DMA allocation using the device pointer lead to following warning:  WARNING: CPU: 1 PID: 1 at kernel/dma/mapping.c:597 dma_alloc_attrs+0xe0/0x124",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38044",
                        "url": "https://ubuntu.com/security/CVE-2025-38044",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  media: cx231xx: set device_caps for 417  The video_device for the MPEG encoder did not set device_caps.  Add this, otherwise the video device can't be registered (you get a WARN_ON instead).  Not seen before since currently 417 support is disabled, but I found this while experimenting with it.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38065",
                        "url": "https://ubuntu.com/security/CVE-2025-38065",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  orangefs: Do not truncate file size  'len' is used to store the result of i_size_read(), so making 'len' a size_t results in truncation to 4GiB on 32-bit systems.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38066",
                        "url": "https://ubuntu.com/security/CVE-2025-38066",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  dm cache: prevent BUG_ON by blocking retries on failed device resumes  A cache device failing to resume due to mapping errors should not be retried, as the failure leaves a partially initialized policy object. Repeating the resume operation risks triggering BUG_ON when reloading cache mappings into the incomplete policy object.  Reproduce steps:  1. create a cache metadata consisting of 512 or more cache blocks,    with some mappings stored in the first array block of the mapping    array. Here we use cache_restore v1.0 to build the metadata.  cat <<EOF >> cmeta.xml <superblock uuid=\"\" block_size=\"128\" nr_cache_blocks=\"512\" \\ policy=\"smq\" hint_width=\"4\">   <mappings>     <mapping cache_block=\"0\" origin_block=\"0\" dirty=\"false\"/>   </mappings> </superblock> EOF dmsetup create cmeta --table \"0 8192 linear /dev/sdc 0\" cache_restore -i cmeta.xml -o /dev/mapper/cmeta --metadata-version=2 dmsetup remove cmeta  2. wipe the second array block of the mapping array to simulate    data degradations.  mapping_root=$(dd if=/dev/sdc bs=1c count=8 skip=192 \\ 2>/dev/null | hexdump -e '1/8 \"%u\\n\"') ablock=$(dd if=/dev/sdc bs=1c count=8 skip=$((4096*mapping_root+2056)) \\ 2>/dev/null | hexdump -e '1/8 \"%u\\n\"') dd if=/dev/zero of=/dev/sdc bs=4k count=1 seek=$ablock  3. try bringing up the cache device. The resume is expected to fail    due to the broken array block.  dmsetup create cmeta --table \"0 8192 linear /dev/sdc 0\" dmsetup create cdata --table \"0 65536 linear /dev/sdc 8192\" dmsetup create corig --table \"0 524288 linear /dev/sdc 262144\" dmsetup create cache --notable dmsetup load cache --table \"0 524288 cache /dev/mapper/cmeta \\ /dev/mapper/cdata /dev/mapper/corig 128 2 metadata2 writethrough smq 0\" dmsetup resume cache  4. try resuming the cache again. An unexpected BUG_ON is triggered    while loading cache mappings.  dmsetup resume cache  Kernel logs:  (snip) ------------[ cut here ]------------ kernel BUG at drivers/md/dm-cache-policy-smq.c:752! Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN NOPTI CPU: 0 UID: 0 PID: 332 Comm: dmsetup Not tainted 6.13.4 #3 RIP: 0010:smq_load_mapping+0x3e5/0x570  Fix by disallowing resume operations for devices that failed the initial attempt.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38068",
                        "url": "https://ubuntu.com/security/CVE-2025-38068",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  crypto: lzo - Fix compression buffer overrun  Unlike the decompression code, the compression code in LZO never checked for output overruns.  It instead assumes that the caller always provides enough buffer space, disregarding the buffer length provided by the caller.  Add a safe compression interface that checks for the end of buffer before each write.  Use the safe interface in crypto/lzo.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38072",
                        "url": "https://ubuntu.com/security/CVE-2025-38072",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  libnvdimm/labels: Fix divide error in nd_label_data_init()  If a faulty CXL memory device returns a broken zero LSA size in its memory device information (Identify Memory Device (Opcode 4000h), CXL spec. 3.1, 8.2.9.9.1.1), a divide error occurs in the libnvdimm driver:   Oops: divide error: 0000 [#1] PREEMPT SMP NOPTI  RIP: 0010:nd_label_data_init+0x10e/0x800 [libnvdimm]  Code and flow:  1) CXL Command 4000h returns LSA size = 0 2) config_size is assigned to zero LSA size (CXL pmem driver):  drivers/cxl/pmem.c:             .config_size = mds->lsa_size,  3) max_xfer is set to zero (nvdimm driver):  drivers/nvdimm/label.c: max_xfer = min_t(size_t, ndd->nsarea.max_xfer, config_size);  4) A subsequent DIV_ROUND_UP() causes a division by zero:  drivers/nvdimm/label.c: /* Make our initial read size a multiple of max_xfer size */ drivers/nvdimm/label.c: read_size = min(DIV_ROUND_UP(read_size, max_xfer) * max_xfer, drivers/nvdimm/label.c-                 config_size);  Fix this by checking the config size parameter by extending an existing check.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38048",
                        "url": "https://ubuntu.com/security/CVE-2025-38048",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  virtio_ring: Fix data race by tagging event_triggered as racy for KCSAN  syzbot reports a data-race when accessing the event_triggered, here is the simplified stack when the issue occurred:  ================================================================== BUG: KCSAN: data-race in virtqueue_disable_cb / virtqueue_enable_cb_delayed  write to 0xffff8881025bc452 of 1 bytes by task 3288 on cpu 0:  virtqueue_enable_cb_delayed+0x42/0x3c0 drivers/virtio/virtio_ring.c:2653  start_xmit+0x230/0x1310 drivers/net/virtio_net.c:3264  __netdev_start_xmit include/linux/netdevice.h:5151 [inline]  netdev_start_xmit include/linux/netdevice.h:5160 [inline]  xmit_one net/core/dev.c:3800 [inline]  read to 0xffff8881025bc452 of 1 bytes by interrupt on cpu 1:  virtqueue_disable_cb_split drivers/virtio/virtio_ring.c:880 [inline]  virtqueue_disable_cb+0x92/0x180 drivers/virtio/virtio_ring.c:2566  skb_xmit_done+0x5f/0x140 drivers/net/virtio_net.c:777  vring_interrupt+0x161/0x190 drivers/virtio/virtio_ring.c:2715  __handle_irq_event_percpu+0x95/0x490 kernel/irq/handle.c:158  handle_irq_event_percpu kernel/irq/handle.c:193 [inline]  value changed: 0x01 -> 0x00 ==================================================================  When the data race occurs, the function virtqueue_enable_cb_delayed() sets event_triggered to false, and virtqueue_disable_cb_split/packed() reads it as false due to the race condition. Since event_triggered is an unreliable hint used for optimization, this should only cause the driver temporarily suggest that the device not send an interrupt notification when the event index is used.  Fix this KCSAN reported data-race issue by explicitly tagging the access as data_racy.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38075",
                        "url": "https://ubuntu.com/security/CVE-2025-38075",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  scsi: target: iscsi: Fix timeout on deleted connection  NOPIN response timer may expire on a deleted connection and crash with such logs:  Did not receive response to NOPIN on CID: 0, failing connection for I_T Nexus (null),i,0x00023d000125,iqn.2017-01.com.iscsi.target,t,0x3d  BUG: Kernel NULL pointer dereference on read at 0x00000000 NIP  strlcpy+0x8/0xb0 LR iscsit_fill_cxn_timeout_err_stats+0x5c/0xc0 [iscsi_target_mod] Call Trace:  iscsit_handle_nopin_response_timeout+0xfc/0x120 [iscsi_target_mod]  call_timer_fn+0x58/0x1f0  run_timer_softirq+0x740/0x860  __do_softirq+0x16c/0x420  irq_exit+0x188/0x1c0  timer_interrupt+0x184/0x410  That is because nopin response timer may be re-started on nopin timer expiration.  Stop nopin timer before stopping the nopin response timer to be sure that no one of them will be re-started.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38083",
                        "url": "https://ubuntu.com/security/CVE-2025-38083",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  net_sched: prio: fix a race in prio_tune()  Gerrard Tai reported a race condition in PRIO, whenever SFQ perturb timer fires at the wrong time.  The race is as follows:  CPU 0                                 CPU 1 [1]: lock root [2]: qdisc_tree_flush_backlog() [3]: unlock root  |  |                                    [5]: lock root  |                                    [6]: rehash  |                                    [7]: qdisc_tree_reduce_backlog()  | [4]: qdisc_put()  This can be abused to underflow a parent's qlen.  Calling qdisc_purge_queue() instead of qdisc_tree_flush_backlog() should fix the race, because all packets will be purged from the qdisc before releasing the lock.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-20 12:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2024-50073",
                        "url": "https://ubuntu.com/security/CVE-2024-50073",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  tty: n_gsm: Fix use-after-free in gsm_cleanup_mux  BUG: KASAN: slab-use-after-free in gsm_cleanup_mux+0x77b/0x7b0 drivers/tty/n_gsm.c:3160 [n_gsm] Read of size 8 at addr ffff88815fe99c00 by task poc/3379 CPU: 0 UID: 0 PID: 3379 Comm: poc Not tainted 6.11.0+ #56 Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020 Call Trace:  <TASK>  gsm_cleanup_mux+0x77b/0x7b0 drivers/tty/n_gsm.c:3160 [n_gsm]  __pfx_gsm_cleanup_mux+0x10/0x10 drivers/tty/n_gsm.c:3124 [n_gsm]  __pfx_sched_clock_cpu+0x10/0x10 kernel/sched/clock.c:389  update_load_avg+0x1c1/0x27b0 kernel/sched/fair.c:4500  __pfx_min_vruntime_cb_rotate+0x10/0x10 kernel/sched/fair.c:846  __rb_insert_augmented+0x492/0xbf0 lib/rbtree.c:161  gsmld_ioctl+0x395/0x1450 drivers/tty/n_gsm.c:3408 [n_gsm]  _raw_spin_lock_irqsave+0x92/0xf0 arch/x86/include/asm/atomic.h:107  __pfx_gsmld_ioctl+0x10/0x10 drivers/tty/n_gsm.c:3822 [n_gsm]  ktime_get+0x5e/0x140 kernel/time/timekeeping.c:195  ldsem_down_read+0x94/0x4e0 arch/x86/include/asm/atomic64_64.h:79  __pfx_ldsem_down_read+0x10/0x10 drivers/tty/tty_ldsem.c:338  __pfx_do_vfs_ioctl+0x10/0x10 fs/ioctl.c:805  tty_ioctl+0x643/0x1100 drivers/tty/tty_io.c:2818  Allocated by task 65:  gsm_data_alloc.constprop.0+0x27/0x190 drivers/tty/n_gsm.c:926 [n_gsm]  gsm_send+0x2c/0x580 drivers/tty/n_gsm.c:819 [n_gsm]  gsm1_receive+0x547/0xad0 drivers/tty/n_gsm.c:3038 [n_gsm]  gsmld_receive_buf+0x176/0x280 drivers/tty/n_gsm.c:3609 [n_gsm]  tty_ldisc_receive_buf+0x101/0x1e0 drivers/tty/tty_buffer.c:391  tty_port_default_receive_buf+0x61/0xa0 drivers/tty/tty_port.c:39  flush_to_ldisc+0x1b0/0x750 drivers/tty/tty_buffer.c:445  process_scheduled_works+0x2b0/0x10d0 kernel/workqueue.c:3229  worker_thread+0x3dc/0x950 kernel/workqueue.c:3391  kthread+0x2a3/0x370 kernel/kthread.c:389  ret_from_fork+0x2d/0x70 arch/x86/kernel/process.c:147  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:257  Freed by task 3367:  kfree+0x126/0x420 mm/slub.c:4580  gsm_cleanup_mux+0x36c/0x7b0 drivers/tty/n_gsm.c:3160 [n_gsm]  gsmld_ioctl+0x395/0x1450 drivers/tty/n_gsm.c:3408 [n_gsm]  tty_ioctl+0x643/0x1100 drivers/tty/tty_io.c:2818  [Analysis] gsm_msg on the tx_ctrl_list or tx_data_list of gsm_mux can be freed by multi threads through ioctl,which leads to the occurrence of uaf. Protect it by gsm tx lock.",
                        "cve_priority": "medium",
                        "cve_public_date": "2024-10-29 01:15:00 UTC"
                    }
                ],
                "launchpad_bugs_fixed": [
                    2117604,
                    2117618,
                    2114450,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    1786013,
                    2117395
                ],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-38051",
                                "url": "https://ubuntu.com/security/CVE-2025-38051",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  smb: client: Fix use-after-free in cifs_fill_dirent  There is a race condition in the readdir concurrency process, which may access the rsp buffer after it has been released, triggering the following KASAN warning.   ==================================================================  BUG: KASAN: slab-use-after-free in cifs_fill_dirent+0xb03/0xb60 [cifs]  Read of size 4 at addr ffff8880099b819c by task a.out/342975   CPU: 2 UID: 0 PID: 342975 Comm: a.out Not tainted 6.15.0-rc6+ #240 PREEMPT(full)  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.1-2.fc37 04/01/2014  Call Trace:   <TASK>   dump_stack_lvl+0x53/0x70   print_report+0xce/0x640   kasan_report+0xb8/0xf0   cifs_fill_dirent+0xb03/0xb60 [cifs]   cifs_readdir+0x12cb/0x3190 [cifs]   iterate_dir+0x1a1/0x520   __x64_sys_getdents+0x134/0x220   do_syscall_64+0x4b/0x110   entry_SYSCALL_64_after_hwframe+0x76/0x7e  RIP: 0033:0x7f996f64b9f9  Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89  f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01  f0 ff ff  0d f7 c3 0c 00 f7 d8 64 89 8  RSP: 002b:00007f996f53de78 EFLAGS: 00000207 ORIG_RAX: 000000000000004e  RAX: ffffffffffffffda RBX: 00007f996f53ecdc RCX: 00007f996f64b9f9  RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003  RBP: 00007f996f53dea0 R08: 0000000000000000 R09: 0000000000000000  R10: 0000000000000000 R11: 0000000000000207 R12: ffffffffffffff88  R13: 0000000000000000 R14: 00007ffc8cd9a500 R15: 00007f996f51e000   </TASK>   Allocated by task 408:   kasan_save_stack+0x20/0x40   kasan_save_track+0x14/0x30   __kasan_slab_alloc+0x6e/0x70   kmem_cache_alloc_noprof+0x117/0x3d0   mempool_alloc_noprof+0xf2/0x2c0   cifs_buf_get+0x36/0x80 [cifs]   allocate_buffers+0x1d2/0x330 [cifs]   cifs_demultiplex_thread+0x22b/0x2690 [cifs]   kthread+0x394/0x720   ret_from_fork+0x34/0x70   ret_from_fork_asm+0x1a/0x30   Freed by task 342979:   kasan_save_stack+0x20/0x40   kasan_save_track+0x14/0x30   kasan_save_free_info+0x3b/0x60   __kasan_slab_free+0x37/0x50   kmem_cache_free+0x2b8/0x500   cifs_buf_release+0x3c/0x70 [cifs]   cifs_readdir+0x1c97/0x3190 [cifs]   iterate_dir+0x1a1/0x520   __x64_sys_getdents64+0x134/0x220   do_syscall_64+0x4b/0x110   entry_SYSCALL_64_after_hwframe+0x76/0x7e   The buggy address belongs to the object at ffff8880099b8000   which belongs to the cache cifs_request of size 16588  The buggy address is located 412 bytes inside of   freed 16588-byte region [ffff8880099b8000, ffff8880099bc0cc)   The buggy address belongs to the physical page:  page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x99b8  head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0  anon flags: 0x80000000000040(head|node=0|zone=1)  page_type: f5(slab)  raw: 0080000000000040 ffff888001e03400 0000000000000000 dead000000000001  raw: 0000000000000000 0000000000010001 00000000f5000000 0000000000000000  head: 0080000000000040 ffff888001e03400 0000000000000000 dead000000000001  head: 0000000000000000 0000000000010001 00000000f5000000 0000000000000000  head: 0080000000000003 ffffea0000266e01 00000000ffffffff 00000000ffffffff  head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008  page dumped because: kasan: bad access detected   Memory state around the buggy address:   ffff8880099b8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb   ffff8880099b8100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb  >ffff8880099b8180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb                              ^   ffff8880099b8200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb   ffff8880099b8280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb  ==================================================================  POC is available in the link [1].  The problem triggering process is as follows:  Process 1                       Process 2 ----------------------------------- ---truncated---",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38030",
                                "url": "https://ubuntu.com/security/CVE-2025-38030",
                                "cve_description": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
                                "cve_priority": "negligible",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38077",
                                "url": "https://ubuntu.com/security/CVE-2025-38077",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  platform/x86: dell-wmi-sysman: Avoid buffer overflow in current_password_store()  If the 'buf' array received from the user contains an empty string, the 'length' variable will be zero. Accessing the 'buf' array element with index 'length - 1' will result in a buffer overflow.  Add a check for an empty string.  Found by Linux Verification Center (linuxtesting.org) with SVACE.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38078",
                                "url": "https://ubuntu.com/security/CVE-2025-38078",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  ALSA: pcm: Fix race of buffer access at PCM OSS layer  The PCM OSS layer tries to clear the buffer with the silence data at initialization (or reconfiguration) of a stream with the explicit call of snd_pcm_format_set_silence() with runtime->dma_area.  But this may lead to a UAF because the accessed runtime->dma_area might be freed concurrently, as it's performed outside the PCM ops.  For avoiding it, move the code into the PCM core and perform it inside the buffer access lock, so that it won't be changed during the operation.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38003",
                                "url": "https://ubuntu.com/security/CVE-2025-38003",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  can: bcm: add missing rcu read protection for procfs content  When the procfs content is generated for a bcm_op which is in the process to be removed the procfs output might show unreliable data (UAF).  As the removal of bcm_op's is already implemented with rcu handling this patch adds the missing rcu_read_lock() and makes sure the list entries are properly removed under rcu protection.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-08 11:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38004",
                                "url": "https://ubuntu.com/security/CVE-2025-38004",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  can: bcm: add locking for bcm_op runtime updates  The CAN broadcast manager (CAN BCM) can send a sequence of CAN frames via hrtimer. The content and also the length of the sequence can be changed resp reduced at runtime where the 'currframe' counter is then set to zero.  Although this appeared to be a safe operation the updates of 'currframe' can be triggered from user space and hrtimer context in bcm_can_tx(). Anderson Nascimento created a proof of concept that triggered a KASAN slab-out-of-bounds read access which can be prevented with a spin_lock_bh.  At the rework of bcm_can_tx() the 'count' variable has been moved into the protected section as this variable can be modified from both contexts too.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-08 11:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38031",
                                "url": "https://ubuntu.com/security/CVE-2025-38031",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  padata: do not leak refcount in reorder_work  A recent patch that addressed a UAF introduced a reference count leak: the parallel_data refcount is incremented unconditionally, regardless of the return value of queue_work(). If the work item is already queued, the incremented refcount is never decremented.  Fix this by checking the return value of queue_work() and decrementing the refcount when necessary.  Resolves:  Unreferenced object 0xffff9d9f421e3d80 (size 192):   comm \"cryptomgr_probe\", pid 157, jiffies 4294694003   hex dump (first 32 bytes):     80 8b cf 41 9f 9d ff ff b8 97 e0 89 ff ff ff ff  ...A............     d0 97 e0 89 ff ff ff ff 19 00 00 00 1f 88 23 00  ..............#.   backtrace (crc 838fb36):     __kmalloc_cache_noprof+0x284/0x320     padata_alloc_pd+0x20/0x1e0     padata_alloc_shell+0x3b/0xa0     0xffffffffc040a54d     cryptomgr_probe+0x43/0xc0     kthread+0xf6/0x1f0     ret_from_fork+0x2f/0x50     ret_from_fork_asm+0x1a/0x30",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38079",
                                "url": "https://ubuntu.com/security/CVE-2025-38079",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  crypto: algif_hash - fix double free in hash_accept  If accept(2) is called on socket type algif_hash with MSG_MORE flag set and crypto_ahash_import fails, sk2 is freed. However, it is also freed in af_alg_release, leading to slab-use-after-free error.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38052",
                                "url": "https://ubuntu.com/security/CVE-2025-38052",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done  Syzbot reported a slab-use-after-free with the following call trace:    ==================================================================   BUG: KASAN: slab-use-after-free in tipc_aead_encrypt_done+0x4bd/0x510 net/tipc/crypto.c:840   Read of size 8 at addr ffff88807a733000 by task kworker/1:0/25    Call Trace:    kasan_report+0xd9/0x110 mm/kasan/report.c:601    tipc_aead_encrypt_done+0x4bd/0x510 net/tipc/crypto.c:840    crypto_request_complete include/crypto/algapi.h:266    aead_request_complete include/crypto/internal/aead.h:85    cryptd_aead_crypt+0x3b8/0x750 crypto/cryptd.c:772    crypto_request_complete include/crypto/algapi.h:266    cryptd_queue_worker+0x131/0x200 crypto/cryptd.c:181    process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231    Allocated by task 8355:    kzalloc_noprof include/linux/slab.h:778    tipc_crypto_start+0xcc/0x9e0 net/tipc/crypto.c:1466    tipc_init_net+0x2dd/0x430 net/tipc/core.c:72    ops_init+0xb9/0x650 net/core/net_namespace.c:139    setup_net+0x435/0xb40 net/core/net_namespace.c:343    copy_net_ns+0x2f0/0x670 net/core/net_namespace.c:508    create_new_namespaces+0x3ea/0xb10 kernel/nsproxy.c:110    unshare_nsproxy_namespaces+0xc0/0x1f0 kernel/nsproxy.c:228    ksys_unshare+0x419/0x970 kernel/fork.c:3323    __do_sys_unshare kernel/fork.c:3394    Freed by task 63:    kfree+0x12a/0x3b0 mm/slub.c:4557    tipc_crypto_stop+0x23c/0x500 net/tipc/crypto.c:1539    tipc_exit_net+0x8c/0x110 net/tipc/core.c:119    ops_exit_list+0xb0/0x180 net/core/net_namespace.c:173    cleanup_net+0x5b7/0xbf0 net/core/net_namespace.c:640    process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231  After freed the tipc_crypto tx by delete namespace, tipc_aead_encrypt_done may still visit it in cryptd_queue_worker workqueue.  I reproduce this issue by:   ip netns add ns1   ip link add veth1 type veth peer name veth2   ip link set veth1 netns ns1   ip netns exec ns1 tipc bearer enable media eth dev veth1   ip netns exec ns1 tipc node set key this_is_a_master_key master   ip netns exec ns1 tipc bearer disable media eth dev veth1   ip netns del ns1  The key of reproduction is that, simd_aead_encrypt is interrupted, leading to crypto_simd_usable() return false. Thus, the cryptd_queue_worker is triggered, and the tipc_crypto tx will be visited.    tipc_disc_timeout     tipc_bearer_xmit_skb       tipc_crypto_xmit         tipc_aead_encrypt           crypto_aead_encrypt             // encrypt()             simd_aead_encrypt               // crypto_simd_usable() is false               child = &ctx->cryptd_tfm->base;    simd_aead_encrypt     crypto_aead_encrypt       // encrypt()       cryptd_aead_encrypt_enqueue         cryptd_aead_enqueue           cryptd_enqueue_request             // trigger cryptd_queue_worker             queue_work_on(smp_processor_id(), cryptd_wq, &cpu_queue->work)  Fix this by holding net reference count before encrypt.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38058",
                                "url": "https://ubuntu.com/security/CVE-2025-38058",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  __legitimize_mnt(): check for MNT_SYNC_UMOUNT should be under mount_lock  ... or we risk stealing final mntput from sync umount - raising mnt_count after umount(2) has verified that victim is not busy, but before it has set MNT_SYNC_UMOUNT; in that case __legitimize_mnt() doesn't see that it's safe to quietly undo mnt_count increment and leaves dropping the reference to caller, where it'll be a full-blown mntput().  Check under mount_lock is needed; leaving the current one done before taking that makes no sense - it's nowhere near common enough to bother with.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38034",
                                "url": "https://ubuntu.com/security/CVE-2025-38034",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  btrfs: correct the order of prelim_ref arguments in btrfs__prelim_ref  btrfs_prelim_ref() calls the old and new reference variables in the incorrect order. This causes a NULL pointer dereference because oldref is passed as NULL to trace_btrfs_prelim_ref_insert().  Note, trace_btrfs_prelim_ref_insert() is being called with newref as oldref (and oldref as NULL) on purpose in order to print out the values of newref.  To reproduce: echo 1 > /sys/kernel/debug/tracing/events/btrfs/btrfs_prelim_ref_insert/enable  Perform some writeback operations.  Backtrace: BUG: kernel NULL pointer dereference, address: 0000000000000018  #PF: supervisor read access in kernel mode  #PF: error_code(0x0000) - not-present page  PGD 115949067 P4D 115949067 PUD 11594a067 PMD 0  Oops: Oops: 0000 [#1] SMP NOPTI  CPU: 1 UID: 0 PID: 1188 Comm: fsstress Not tainted 6.15.0-rc2-tester+ #47 PREEMPT(voluntary)  7ca2cef72d5e9c600f0c7718adb6462de8149622  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.3-2-gc13ff2cd-prebuilt.qemu.org 04/01/2014  RIP: 0010:trace_event_raw_event_btrfs__prelim_ref+0x72/0x130  Code: e8 43 81 9f ff 48 85 c0 74 78 4d 85 e4 0f 84 8f 00 00 00 49 8b 94 24 c0 06 00 00 48 8b 0a 48 89 48 08 48 8b 52 08 48 89 50 10 <49> 8b 55 18 48 89 50 18 49 8b 55 20 48 89 50 20 41 0f b6 55 28 88  RSP: 0018:ffffce44820077a0 EFLAGS: 00010286  RAX: ffff8c6b403f9014 RBX: ffff8c6b55825730 RCX: 304994edf9cf506b  RDX: d8b11eb7f0fdb699 RSI: ffff8c6b403f9010 RDI: ffff8c6b403f9010  RBP: 0000000000000001 R08: 0000000000000001 R09: 0000000000000010  R10: 00000000ffffffff R11: 0000000000000000 R12: ffff8c6b4e8fb000  R13: 0000000000000000 R14: ffffce44820077a8 R15: ffff8c6b4abd1540  FS:  00007f4dc6813740(0000) GS:ffff8c6c1d378000(0000) knlGS:0000000000000000  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033  CR2: 0000000000000018 CR3: 000000010eb42000 CR4: 0000000000750ef0  PKRU: 55555554  Call Trace:   <TASK>   prelim_ref_insert+0x1c1/0x270   find_parent_nodes+0x12a6/0x1ee0   ? __entry_text_end+0x101f06/0x101f09   ? srso_alias_return_thunk+0x5/0xfbef5   ? srso_alias_return_thunk+0x5/0xfbef5   ? srso_alias_return_thunk+0x5/0xfbef5   ? srso_alias_return_thunk+0x5/0xfbef5   btrfs_is_data_extent_shared+0x167/0x640   ? fiemap_process_hole+0xd0/0x2c0   extent_fiemap+0xa5c/0xbc0   ? __entry_text_end+0x101f05/0x101f09   btrfs_fiemap+0x7e/0xd0   do_vfs_ioctl+0x425/0x9d0   __x64_sys_ioctl+0x75/0xc0",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38035",
                                "url": "https://ubuntu.com/security/CVE-2025-38035",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  nvmet-tcp: don't restore null sk_state_change  queue->state_change is set as part of nvmet_tcp_set_queue_sock(), but if the TCP connection isn't established when nvmet_tcp_set_queue_sock() is called then queue->state_change isn't set and sock->sk->sk_state_change isn't replaced.  As such we don't need to restore sock->sk->sk_state_change if queue->state_change is NULL.  This avoids NULL pointer dereferences such as this:  [  286.462026][    C0] BUG: kernel NULL pointer dereference, address: 0000000000000000 [  286.462814][    C0] #PF: supervisor instruction fetch in kernel mode [  286.463796][    C0] #PF: error_code(0x0010) - not-present page [  286.464392][    C0] PGD 8000000140620067 P4D 8000000140620067 PUD 114201067 PMD 0 [  286.465086][    C0] Oops: Oops: 0010 [#1] SMP KASAN PTI [  286.465559][    C0] CPU: 0 UID: 0 PID: 1628 Comm: nvme Not tainted 6.15.0-rc2+ #11 PREEMPT(voluntary) [  286.466393][    C0] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-3.fc41 04/01/2014 [  286.467147][    C0] RIP: 0010:0x0 [  286.467420][    C0] Code: Unable to access opcode bytes at 0xffffffffffffffd6. [  286.467977][    C0] RSP: 0018:ffff8883ae008580 EFLAGS: 00010246 [  286.468425][    C0] RAX: 0000000000000000 RBX: ffff88813fd34100 RCX: ffffffffa386cc43 [  286.469019][    C0] RDX: 1ffff11027fa68b6 RSI: 0000000000000008 RDI: ffff88813fd34100 [  286.469545][    C0] RBP: ffff88813fd34160 R08: 0000000000000000 R09: ffffed1027fa682c [  286.470072][    C0] R10: ffff88813fd34167 R11: 0000000000000000 R12: ffff88813fd344c3 [  286.470585][    C0] R13: ffff88813fd34112 R14: ffff88813fd34aec R15: ffff888132cdd268 [  286.471070][    C0] FS:  00007fe3c04c7d80(0000) GS:ffff88840743f000(0000) knlGS:0000000000000000 [  286.471644][    C0] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [  286.472543][    C0] CR2: ffffffffffffffd6 CR3: 000000012daca000 CR4: 00000000000006f0 [  286.473500][    C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [  286.474467][    C0] DR3: 0000000000000000 DR6: 00000000ffff07f0 DR7: 0000000000000400 [  286.475453][    C0] Call Trace: [  286.476102][    C0]  <IRQ> [  286.476719][    C0]  tcp_fin+0x2bb/0x440 [  286.477429][    C0]  tcp_data_queue+0x190f/0x4e60 [  286.478174][    C0]  ? __build_skb_around+0x234/0x330 [  286.478940][    C0]  ? rcu_is_watching+0x11/0xb0 [  286.479659][    C0]  ? __pfx_tcp_data_queue+0x10/0x10 [  286.480431][    C0]  ? tcp_try_undo_loss+0x640/0x6c0 [  286.481196][    C0]  ? seqcount_lockdep_reader_access.constprop.0+0x82/0x90 [  286.482046][    C0]  ? kvm_clock_get_cycles+0x14/0x30 [  286.482769][    C0]  ? ktime_get+0x66/0x150 [  286.483433][    C0]  ? rcu_is_watching+0x11/0xb0 [  286.484146][    C0]  tcp_rcv_established+0x6e4/0x2050 [  286.484857][    C0]  ? rcu_is_watching+0x11/0xb0 [  286.485523][    C0]  ? ipv4_dst_check+0x160/0x2b0 [  286.486203][    C0]  ? __pfx_tcp_rcv_established+0x10/0x10 [  286.486917][    C0]  ? lock_release+0x217/0x2c0 [  286.487595][    C0]  tcp_v4_do_rcv+0x4d6/0x9b0 [  286.488279][    C0]  tcp_v4_rcv+0x2af8/0x3e30 [  286.488904][    C0]  ? raw_local_deliver+0x51b/0xad0 [  286.489551][    C0]  ? rcu_is_watching+0x11/0xb0 [  286.490198][    C0]  ? __pfx_tcp_v4_rcv+0x10/0x10 [  286.490813][    C0]  ? __pfx_raw_local_deliver+0x10/0x10 [  286.491487][    C0]  ? __pfx_nf_confirm+0x10/0x10 [nf_conntrack] [  286.492275][    C0]  ? rcu_is_watching+0x11/0xb0 [  286.492900][    C0]  ip_protocol_deliver_rcu+0x8f/0x370 [  286.493579][    C0]  ip_local_deliver_finish+0x297/0x420 [  286.494268][    C0]  ip_local_deliver+0x168/0x430 [  286.494867][    C0]  ? __pfx_ip_local_deliver+0x10/0x10 [  286.495498][    C0]  ? __pfx_ip_local_deliver_finish+0x10/0x10 [  286.496204][    C0]  ? ip_rcv_finish_core+0x19a/0x1f20 [  286.496806][    C0]  ? lock_release+0x217/0x2c0 [  286.497414][    C0]  ip_rcv+0x455/0x6e0 [  286.497945][    C0]  ? __pfx_ip_rcv+0x10/0x10 [ ---truncated---",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38037",
                                "url": "https://ubuntu.com/security/CVE-2025-38037",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  vxlan: Annotate FDB data races  The 'used' and 'updated' fields in the FDB entry structure can be accessed concurrently by multiple threads, leading to reports such as [1]. Can be reproduced using [2].  Suppress these reports by annotating these accesses using READ_ONCE() / WRITE_ONCE().  [1] BUG: KCSAN: data-race in vxlan_xmit / vxlan_xmit  write to 0xffff942604d263a8 of 8 bytes by task 286 on cpu 0:  vxlan_xmit+0xb29/0x2380  dev_hard_start_xmit+0x84/0x2f0  __dev_queue_xmit+0x45a/0x1650  packet_xmit+0x100/0x150  packet_sendmsg+0x2114/0x2ac0  __sys_sendto+0x318/0x330  __x64_sys_sendto+0x76/0x90  x64_sys_call+0x14e8/0x1c00  do_syscall_64+0x9e/0x1a0  entry_SYSCALL_64_after_hwframe+0x77/0x7f  read to 0xffff942604d263a8 of 8 bytes by task 287 on cpu 2:  vxlan_xmit+0xadf/0x2380  dev_hard_start_xmit+0x84/0x2f0  __dev_queue_xmit+0x45a/0x1650  packet_xmit+0x100/0x150  packet_sendmsg+0x2114/0x2ac0  __sys_sendto+0x318/0x330  __x64_sys_sendto+0x76/0x90  x64_sys_call+0x14e8/0x1c00  do_syscall_64+0x9e/0x1a0  entry_SYSCALL_64_after_hwframe+0x77/0x7f  value changed: 0x00000000fffbac6e -> 0x00000000fffbac6f  Reported by Kernel Concurrency Sanitizer on: CPU: 2 UID: 0 PID: 287 Comm: mausezahn Not tainted 6.13.0-rc7-01544-gb4b270f11a02 #5 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-3.fc41 04/01/2014  [2]  #!/bin/bash   set +H  echo whitelist > /sys/kernel/debug/kcsan  echo !vxlan_xmit > /sys/kernel/debug/kcsan   ip link add name vx0 up type vxlan id 10010 dstport 4789 local 192.0.2.1  bridge fdb add 00:11:22:33:44:55 dev vx0 self static dst 198.51.100.1  taskset -c 0 mausezahn vx0 -a own -b 00:11:22:33:44:55 -c 0 -q &  taskset -c 2 mausezahn vx0 -a own -b 00:11:22:33:44:55 -c 0 -q &",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38061",
                                "url": "https://ubuntu.com/security/CVE-2025-38061",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  net: pktgen: fix access outside of user given buffer in pktgen_thread_write()  Honour the user given buffer size for the strn_len() calls (otherwise strn_len() will access memory outside of the user given buffer).",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38043",
                                "url": "https://ubuntu.com/security/CVE-2025-38043",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  firmware: arm_ffa: Set dma_mask for ffa devices  Set dma_mask for FFA devices, otherwise DMA allocation using the device pointer lead to following warning:  WARNING: CPU: 1 PID: 1 at kernel/dma/mapping.c:597 dma_alloc_attrs+0xe0/0x124",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38044",
                                "url": "https://ubuntu.com/security/CVE-2025-38044",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  media: cx231xx: set device_caps for 417  The video_device for the MPEG encoder did not set device_caps.  Add this, otherwise the video device can't be registered (you get a WARN_ON instead).  Not seen before since currently 417 support is disabled, but I found this while experimenting with it.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38065",
                                "url": "https://ubuntu.com/security/CVE-2025-38065",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  orangefs: Do not truncate file size  'len' is used to store the result of i_size_read(), so making 'len' a size_t results in truncation to 4GiB on 32-bit systems.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38066",
                                "url": "https://ubuntu.com/security/CVE-2025-38066",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  dm cache: prevent BUG_ON by blocking retries on failed device resumes  A cache device failing to resume due to mapping errors should not be retried, as the failure leaves a partially initialized policy object. Repeating the resume operation risks triggering BUG_ON when reloading cache mappings into the incomplete policy object.  Reproduce steps:  1. create a cache metadata consisting of 512 or more cache blocks,    with some mappings stored in the first array block of the mapping    array. Here we use cache_restore v1.0 to build the metadata.  cat <<EOF >> cmeta.xml <superblock uuid=\"\" block_size=\"128\" nr_cache_blocks=\"512\" \\ policy=\"smq\" hint_width=\"4\">   <mappings>     <mapping cache_block=\"0\" origin_block=\"0\" dirty=\"false\"/>   </mappings> </superblock> EOF dmsetup create cmeta --table \"0 8192 linear /dev/sdc 0\" cache_restore -i cmeta.xml -o /dev/mapper/cmeta --metadata-version=2 dmsetup remove cmeta  2. wipe the second array block of the mapping array to simulate    data degradations.  mapping_root=$(dd if=/dev/sdc bs=1c count=8 skip=192 \\ 2>/dev/null | hexdump -e '1/8 \"%u\\n\"') ablock=$(dd if=/dev/sdc bs=1c count=8 skip=$((4096*mapping_root+2056)) \\ 2>/dev/null | hexdump -e '1/8 \"%u\\n\"') dd if=/dev/zero of=/dev/sdc bs=4k count=1 seek=$ablock  3. try bringing up the cache device. The resume is expected to fail    due to the broken array block.  dmsetup create cmeta --table \"0 8192 linear /dev/sdc 0\" dmsetup create cdata --table \"0 65536 linear /dev/sdc 8192\" dmsetup create corig --table \"0 524288 linear /dev/sdc 262144\" dmsetup create cache --notable dmsetup load cache --table \"0 524288 cache /dev/mapper/cmeta \\ /dev/mapper/cdata /dev/mapper/corig 128 2 metadata2 writethrough smq 0\" dmsetup resume cache  4. try resuming the cache again. An unexpected BUG_ON is triggered    while loading cache mappings.  dmsetup resume cache  Kernel logs:  (snip) ------------[ cut here ]------------ kernel BUG at drivers/md/dm-cache-policy-smq.c:752! Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN NOPTI CPU: 0 UID: 0 PID: 332 Comm: dmsetup Not tainted 6.13.4 #3 RIP: 0010:smq_load_mapping+0x3e5/0x570  Fix by disallowing resume operations for devices that failed the initial attempt.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38068",
                                "url": "https://ubuntu.com/security/CVE-2025-38068",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  crypto: lzo - Fix compression buffer overrun  Unlike the decompression code, the compression code in LZO never checked for output overruns.  It instead assumes that the caller always provides enough buffer space, disregarding the buffer length provided by the caller.  Add a safe compression interface that checks for the end of buffer before each write.  Use the safe interface in crypto/lzo.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38072",
                                "url": "https://ubuntu.com/security/CVE-2025-38072",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  libnvdimm/labels: Fix divide error in nd_label_data_init()  If a faulty CXL memory device returns a broken zero LSA size in its memory device information (Identify Memory Device (Opcode 4000h), CXL spec. 3.1, 8.2.9.9.1.1), a divide error occurs in the libnvdimm driver:   Oops: divide error: 0000 [#1] PREEMPT SMP NOPTI  RIP: 0010:nd_label_data_init+0x10e/0x800 [libnvdimm]  Code and flow:  1) CXL Command 4000h returns LSA size = 0 2) config_size is assigned to zero LSA size (CXL pmem driver):  drivers/cxl/pmem.c:             .config_size = mds->lsa_size,  3) max_xfer is set to zero (nvdimm driver):  drivers/nvdimm/label.c: max_xfer = min_t(size_t, ndd->nsarea.max_xfer, config_size);  4) A subsequent DIV_ROUND_UP() causes a division by zero:  drivers/nvdimm/label.c: /* Make our initial read size a multiple of max_xfer size */ drivers/nvdimm/label.c: read_size = min(DIV_ROUND_UP(read_size, max_xfer) * max_xfer, drivers/nvdimm/label.c-                 config_size);  Fix this by checking the config size parameter by extending an existing check.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38048",
                                "url": "https://ubuntu.com/security/CVE-2025-38048",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  virtio_ring: Fix data race by tagging event_triggered as racy for KCSAN  syzbot reports a data-race when accessing the event_triggered, here is the simplified stack when the issue occurred:  ================================================================== BUG: KCSAN: data-race in virtqueue_disable_cb / virtqueue_enable_cb_delayed  write to 0xffff8881025bc452 of 1 bytes by task 3288 on cpu 0:  virtqueue_enable_cb_delayed+0x42/0x3c0 drivers/virtio/virtio_ring.c:2653  start_xmit+0x230/0x1310 drivers/net/virtio_net.c:3264  __netdev_start_xmit include/linux/netdevice.h:5151 [inline]  netdev_start_xmit include/linux/netdevice.h:5160 [inline]  xmit_one net/core/dev.c:3800 [inline]  read to 0xffff8881025bc452 of 1 bytes by interrupt on cpu 1:  virtqueue_disable_cb_split drivers/virtio/virtio_ring.c:880 [inline]  virtqueue_disable_cb+0x92/0x180 drivers/virtio/virtio_ring.c:2566  skb_xmit_done+0x5f/0x140 drivers/net/virtio_net.c:777  vring_interrupt+0x161/0x190 drivers/virtio/virtio_ring.c:2715  __handle_irq_event_percpu+0x95/0x490 kernel/irq/handle.c:158  handle_irq_event_percpu kernel/irq/handle.c:193 [inline]  value changed: 0x01 -> 0x00 ==================================================================  When the data race occurs, the function virtqueue_enable_cb_delayed() sets event_triggered to false, and virtqueue_disable_cb_split/packed() reads it as false due to the race condition. Since event_triggered is an unreliable hint used for optimization, this should only cause the driver temporarily suggest that the device not send an interrupt notification when the event index is used.  Fix this KCSAN reported data-race issue by explicitly tagging the access as data_racy.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38075",
                                "url": "https://ubuntu.com/security/CVE-2025-38075",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  scsi: target: iscsi: Fix timeout on deleted connection  NOPIN response timer may expire on a deleted connection and crash with such logs:  Did not receive response to NOPIN on CID: 0, failing connection for I_T Nexus (null),i,0x00023d000125,iqn.2017-01.com.iscsi.target,t,0x3d  BUG: Kernel NULL pointer dereference on read at 0x00000000 NIP  strlcpy+0x8/0xb0 LR iscsit_fill_cxn_timeout_err_stats+0x5c/0xc0 [iscsi_target_mod] Call Trace:  iscsit_handle_nopin_response_timeout+0xfc/0x120 [iscsi_target_mod]  call_timer_fn+0x58/0x1f0  run_timer_softirq+0x740/0x860  __do_softirq+0x16c/0x420  irq_exit+0x188/0x1c0  timer_interrupt+0x184/0x410  That is because nopin response timer may be re-started on nopin timer expiration.  Stop nopin timer before stopping the nopin response timer to be sure that no one of them will be re-started.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38083",
                                "url": "https://ubuntu.com/security/CVE-2025-38083",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  net_sched: prio: fix a race in prio_tune()  Gerrard Tai reported a race condition in PRIO, whenever SFQ perturb timer fires at the wrong time.  The race is as follows:  CPU 0                                 CPU 1 [1]: lock root [2]: qdisc_tree_flush_backlog() [3]: unlock root  |  |                                    [5]: lock root  |                                    [6]: rehash  |                                    [7]: qdisc_tree_reduce_backlog()  | [4]: qdisc_put()  This can be abused to underflow a parent's qlen.  Calling qdisc_purge_queue() instead of qdisc_tree_flush_backlog() should fix the race, because all packets will be purged from the qdisc before releasing the lock.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-20 12:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2024-50073",
                                "url": "https://ubuntu.com/security/CVE-2024-50073",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  tty: n_gsm: Fix use-after-free in gsm_cleanup_mux  BUG: KASAN: slab-use-after-free in gsm_cleanup_mux+0x77b/0x7b0 drivers/tty/n_gsm.c:3160 [n_gsm] Read of size 8 at addr ffff88815fe99c00 by task poc/3379 CPU: 0 UID: 0 PID: 3379 Comm: poc Not tainted 6.11.0+ #56 Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020 Call Trace:  <TASK>  gsm_cleanup_mux+0x77b/0x7b0 drivers/tty/n_gsm.c:3160 [n_gsm]  __pfx_gsm_cleanup_mux+0x10/0x10 drivers/tty/n_gsm.c:3124 [n_gsm]  __pfx_sched_clock_cpu+0x10/0x10 kernel/sched/clock.c:389  update_load_avg+0x1c1/0x27b0 kernel/sched/fair.c:4500  __pfx_min_vruntime_cb_rotate+0x10/0x10 kernel/sched/fair.c:846  __rb_insert_augmented+0x492/0xbf0 lib/rbtree.c:161  gsmld_ioctl+0x395/0x1450 drivers/tty/n_gsm.c:3408 [n_gsm]  _raw_spin_lock_irqsave+0x92/0xf0 arch/x86/include/asm/atomic.h:107  __pfx_gsmld_ioctl+0x10/0x10 drivers/tty/n_gsm.c:3822 [n_gsm]  ktime_get+0x5e/0x140 kernel/time/timekeeping.c:195  ldsem_down_read+0x94/0x4e0 arch/x86/include/asm/atomic64_64.h:79  __pfx_ldsem_down_read+0x10/0x10 drivers/tty/tty_ldsem.c:338  __pfx_do_vfs_ioctl+0x10/0x10 fs/ioctl.c:805  tty_ioctl+0x643/0x1100 drivers/tty/tty_io.c:2818  Allocated by task 65:  gsm_data_alloc.constprop.0+0x27/0x190 drivers/tty/n_gsm.c:926 [n_gsm]  gsm_send+0x2c/0x580 drivers/tty/n_gsm.c:819 [n_gsm]  gsm1_receive+0x547/0xad0 drivers/tty/n_gsm.c:3038 [n_gsm]  gsmld_receive_buf+0x176/0x280 drivers/tty/n_gsm.c:3609 [n_gsm]  tty_ldisc_receive_buf+0x101/0x1e0 drivers/tty/tty_buffer.c:391  tty_port_default_receive_buf+0x61/0xa0 drivers/tty/tty_port.c:39  flush_to_ldisc+0x1b0/0x750 drivers/tty/tty_buffer.c:445  process_scheduled_works+0x2b0/0x10d0 kernel/workqueue.c:3229  worker_thread+0x3dc/0x950 kernel/workqueue.c:3391  kthread+0x2a3/0x370 kernel/kthread.c:389  ret_from_fork+0x2d/0x70 arch/x86/kernel/process.c:147  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:257  Freed by task 3367:  kfree+0x126/0x420 mm/slub.c:4580  gsm_cleanup_mux+0x36c/0x7b0 drivers/tty/n_gsm.c:3160 [n_gsm]  gsmld_ioctl+0x395/0x1450 drivers/tty/n_gsm.c:3408 [n_gsm]  tty_ioctl+0x643/0x1100 drivers/tty/tty_io.c:2818  [Analysis] gsm_msg on the tx_ctrl_list or tx_data_list of gsm_mux can be freed by multi threads through ioctl,which leads to the occurrence of uaf. Protect it by gsm tx lock.",
                                "cve_priority": "medium",
                                "cve_public_date": "2024-10-29 01:15:00 UTC"
                            }
                        ],
                        "log": [
                            "",
                            "  * jammy/linux-kvm: 5.15.0-1086.91 -proposed tracker (LP: #2117604)",
                            "",
                            "  [ Ubuntu: 5.15.0-152.162 ]",
                            "",
                            "  * jammy/linux: 5.15.0-152.162 -proposed tracker (LP: #2117618)",
                            "  * [UBUNTU 22.04] kernel: Fix z17 elf platform recognition (LP: #2114450)",
                            "    - s390: add z16 elf platform",
                            "    - s390: Add z17 elf platform",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240)",
                            "    - dma-mapping: avoid potential unused data compilation warning",
                            "    - cgroup: Fix compilation issue due to cgroup_mutex not being exported",
                            "    - net: enetc: refactor bulk flipping of RX buffers to separate function",
                            "    - bpf: fix possible endless loop in BPF map iteration",
                            "    - samples/bpf: Fix compilation failure for samples/bpf on LoongArch Fedora",
                            "    - kconfig: merge_config: use an empty file as initfile",
                            "    - NFSv4: Check for delegation validity in",
                            "      nfs_start_delegation_return_locked()",
                            "    - tracing: Mark binary printing functions with __printf() attribute",
                            "    - mailbox: use error ret code of of_parse_phandle_with_args()",
                            "    - fbdev: fsl-diu-fb: add missing device_remove_file()",
                            "    - fbcon: Use correct erase colour for clearing in fbcon",
                            "    - fbdev: core: tileblit: Implement missing margin clearing for tileblit",
                            "    - NFSv4: Treat ENETUNREACH errors as fatal for state recovery",
                            "    - SUNRPC: rpc_clnt_set_transport() must not change the autobind setting",
                            "    - SUNRPC: rpcbind should never reset the port to the value '0'",
                            "    - thermal/drivers/qoriq: Power down TMU on system suspend",
                            "    - dql: Fix dql->limit value when reset.",
                            "    - lockdep: Fix wait context check on softirq for PREEMPT_RT",
                            "    - PCI: dwc: ep: Ensure proper iteration over outbound map windows",
                            "    - tools/build: Don't pass test log files to linker",
                            "    - pNFS/flexfiles: Report ENETDOWN as a connection error",
                            "    - PCI: vmd: Disable MSI remapping bypass under Xen",
                            "    - mmc: host: Wait for Vdd to settle on card power off",
                            "    - wifi: mt76: only mark tx-status-failed frames as ACKed on mt76x0/2",
                            "    - i2c: qup: Vote for interconnect bandwidth to DRAM",
                            "    - i2c: pxa: fix call balance of i2c->clk handling routines",
                            "    - btrfs: make btrfs_discard_workfn() block_group ref explicit",
                            "    - btrfs: avoid linker error in btrfs_find_create_tree_block()",
                            "    - btrfs: get zone unusable bytes while holding lock at",
                            "      btrfs_reclaim_bgs_work()",
                            "    - btrfs: send: return -ENAMETOOLONG when attempting a path that is too",
                            "      long",
                            "    - i3c: master: svc: Fix missing STOP for master request",
                            "    - dlm: make tcp still work in multi-link env",
                            "    - um: Store full CSGSFS and SS register from mcontext",
                            "    - um: Update min_low_pfn to match changes in uml_reserved",
                            "    - ext4: reorder capability check last",
                            "    - scsi: st: Tighten the page format heuristics with MODE SELECT",
                            "    - scsi: st: ERASE does not change tape location",
                            "    - vfio/pci: Handle INTx IRQ_NOTCONNECTED",
                            "    - tcp: reorganize tcp_in_ack_event() and tcp_count_delivered()",
                            "    - rtc: rv3032: fix EERD location",
                            "    - ASoC: mediatek: mt6359: Add stub for mt6359_accdet_enable_jack_detect",
                            "    - kbuild: fix argument parsing in scripts/config",
                            "    - crypto: octeontx2 - suppress auth failure screaming due to negative",
                            "      tests",
                            "    - dm: restrict dm device size to 2^63-512 bytes",
                            "    - xen: Add support for XenServer 6.1 platform device",
                            "    - RDMA/uverbs: Propagate errors from rdma_lookup_get_uobject()",
                            "    - posix-timers: Add cond_resched() to posix_timer_add() search loop",
                            "    - timer_list: Don't use %pK through printk()",
                            "    - netfilter: conntrack: Bound nf_conntrack sysctl writes",
                            "    - arm64/mm: Check PUD_TYPE_TABLE in pud_bad()",
                            "    - mmc: sdhci: Disable SD card clock before changing parameters",
                            "    - ipv6: save dontfrag in cork",
                            "    - auxdisplay: charlcd: Partially revert \"Move hwidth and bwidth to struct",
                            "      hd44780_common\"",
                            "    - ASoC: qcom: sm8250: explicitly set format in sm8250_be_hw_params_fixup()",
                            "    - cpufreq: tegra186: Share policy per cluster",
                            "    - arm64: tegra: p2597: Fix gpio for vdd-1v8-dis regulator",
                            "    - powerpc/prom_init: Fixup missing #size-cells on PowerBook6,7",
                            "    - tcp: bring back NUMA dispersion in inet_ehash_locks_alloc()",
                            "    - rtc: ds1307: stop disabling alarms on probe",
                            "    - ieee802154: ca8210: Use proper setters and getters for bitwise types",
                            "    - ARM: tegra: Switch DSI-B clock parent to PLLD on Tegra114",
                            "    - media: c8sectpfe: Call of_node_put(i2c_bus) only once in",
                            "      c8sectpfe_probe()",
                            "    - remoteproc: qcom_wcnss: Handle platforms with only single power domain",
                            "    - drm/amdgpu: Do not program AGP BAR regs under SRIOV in gfxhub_v1_0.c",
                            "    - pinctrl: bcm281xx: Use \"unsigned int\" instead of bare \"unsigned\"",
                            "    - net: ethernet: ti: cpsw_new: populate netdev of_node",
                            "    - net: pktgen: fix mpls maximum labels list parsing",
                            "    - ipv4: fib: Move fib_valid_key_len() to rtm_to_fib_config().",
                            "    - media: uvcvideo: Add sanity check to uvc_ioctl_xu_ctrl_map",
                            "    - clk: imx8mp: inform CCF of maximum frequency of clocks",
                            "    - x86/bugs: Make spectre user default depend on MITIGATION_SPECTRE_V2",
                            "    - hwmon: (gpio-fan) Add missing mutex locks",
                            "    - ARM: at91: pm: fix at91_suspend_finish for ZQ calibration",
                            "    - drm/mediatek: mtk_dpi: Add checks for reg_h_fre_con existence",
                            "    - fpga: altera-cvp: Increase credit timeout",
                            "    - PCI: brcmstb: Expand inbound window size up to 64GB",
                            "    - PCI: brcmstb: Add a softdep to MIP MSI-X driver",
                            "    - net/mlx5: Avoid report two health errors on same syndrome",
                            "    - selftests/net: have `gro.sh -t` return a correct exit code",
                            "    - drm/amdkfd: KFD release_work possible circular locking",
                            "    - net: xgene-v2: remove incorrect ACPI_PTR annotation",
                            "    - bonding: report duplicate MAC address in all situations",
                            "    - soc: ti: k3-socinfo: Do not use syscon helper to build regmap",
                            "    - x86/build: Fix broken copy command in genimage.sh when making isoimage",
                            "    - drm/amd/display: handle max_downscale_src_width fail check",
                            "    - x86/nmi: Add an emergency handler in nmi_desc & use it in",
                            "      nmi_shootdown_cpus()",
                            "    - cpuidle: menu: Avoid discarding useful information",
                            "    - libbpf: Fix out-of-bound read",
                            "    - x86/kaslr: Reduce KASLR entropy on most x86 systems",
                            "    - MIPS: Use arch specific syscall name match function",
                            "    - MIPS: pm-cps: Use per-CPU variables as per-CPU, not per-core",
                            "    - clocksource: mips-gic-timer: Enable counter when CPUs start",
                            "    - scsi: mpt3sas: Send a diag reset if target reset fails",
                            "    - wifi: rtw88: Fix rtw_init_vht_cap() for RTL8814AU",
                            "    - wifi: rtw88: Fix rtw_init_ht_cap() for RTL8814AU",
                            "    - wifi: rtw88: Fix rtw_desc_to_mcsrate() to handle MCS16-31",
                            "    - EDAC/ie31200: work around false positive build warning",
                            "    - RDMA/core: Fix best page size finding when it can cross SG entries",
                            "    - can: c_can: Use of_property_present() to test existence of DT property",
                            "    - eth: mlx4: don't try to complete XDP frames in netpoll",
                            "    - PCI: Fix old_size lower bound in calculate_iosize() too",
                            "    - ACPI: HED: Always initialize before evged",
                            "    - net/mlx5: Modify LSB bitmask in temperature event to include only the",
                            "      first bit",
                            "    - net/mlx5: Apply rate-limiting to high temperature warning",
                            "    - ASoC: ops: Enforce platform maximum on initial value",
                            "    - ASoC: tas2764: Power up/down amp on mute ops",
                            "    - ASoC: soc-dai: check return value at snd_soc_dai_set_tdm_slot()",
                            "    - pinctrl: devicetree: do not goto err when probing hogs in",
                            "      pinctrl_dt_to_map",
                            "    - smack: recognize ipv4 CIPSO w/o categories",
                            "    - media: v4l: Memset argument to 0 before calling get_mbus_config pad op",
                            "    - net/mlx4_core: Avoid impossible mlx4_db_alloc() order value",
                            "    - phy: core: don't require set_mode() callback for phy_get_mode() to work",
                            "    - drm/amdgpu: reset psp->cmd to NULL after releasing the buffer",
                            "    - drm/amd/display: Initial psr_version with correct setting",
                            "    - net/mlx5: Extend Ethtool loopback selftest to support non-linear SKB",
                            "    - net/mlx5e: set the tx_queue_len for pfifo_fast",
                            "    - net/mlx5e: reduce rep rxq depth to 256 for ECPF",
                            "    - wifi: mac80211: don't unconditionally call drv_mgd_complete_tx()",
                            "    - wifi: mac80211: remove misplaced drv_mgd_complete_tx() call",
                            "    - arch/powerpc/perf: Check the instruction type before creating sample",
                            "      with perf_mem_data_src",
                            "    - ip: fib_rules: Fetch net from fib_rule in fib[46]_rule_configure().",
                            "    - r8152: add vendor/device ID pair for Dell Alienware AW1022z",
                            "    - wifi: rtw88: Fix download_firmware_validate() for RTL8814AU",
                            "    - clk: qcom: camcc-sm8250: Use clk_rcg2_shared_ops for some RCGs",
                            "    - hwmon: (xgene-hwmon) use appropriate type for the latency value",
                            "    - media: qcom: camss: csid: Only add TPG v4l2 ctrl if TPG hardware is",
                            "      available",
                            "    - r8169: don't scan PHY addresses > 0",
                            "    - rcu: handle quiescent states for PREEMPT_RCU=n, PREEMPT_COUNT=y",
                            "    - rcu: fix header guard for rcu_all_qs()",
                            "    - net/mana: fix warning in the writer of client oob",
                            "    - scsi: lpfc: Handle duplicate D_IDs in ndlp search-by D_ID routine",
                            "    - scsi: st: Restore some drive settings after reset",
                            "    - HID: usbkbd: Fix the bit shift number for LED_KANA",
                            "    - drm/ast: Find VBIOS mode from regular display size",
                            "    - bpftool: Fix readlink usage in get_fd_type",
                            "    - perf/amd/ibs: Fix perf_ibs_op.cnt_mask for CurCnt",
                            "    - wifi: rtw88: Don't use static local variable in",
                            "      rtw8822b_set_tx_power_index_by_rate",
                            "    - spi: zynqmp-gqspi: Always acknowledge interrupts",
                            "    - regulator: ad5398: Add device tree support",
                            "    - wifi: ath9k: return by of_get_mac_address",
                            "    - drm/atomic: clarify the rules around drm_atomic_state->allow_modeset",
                            "    - drm: Add valid clones check",
                            "    - ASoC: imx-card: Adjust over allocation of memory in imx_card_parse_of()",
                            "    - pinctrl: meson: define the pull up/down resistor value as 60 kOhm",
                            "    - ASoC: Intel: bytcr_rt5640: Add DMI quirk for Acer Aspire SW3-013",
                            "    - ALSA: hda/realtek: Add quirk for HP Spectre x360 15-df1xxx",
                            "    - xenbus: Allow PVH dom0 a non-local xenstore",
                            "    - remoteproc: qcom_wcnss: Fix on platforms without fallback regulators",
                            "    - xfrm: Sanitize marks before insert",
                            "    - Bluetooth: L2CAP: Fix not checking l2cap_chan security level",
                            "    - bridge: netfilter: Fix forwarding of fragmented packets",
                            "    - net: dwmac-sun8i: Use parsed internal PHY address instead of 1",
                            "    - octeontx2-af: Set LMT_ENA bit for APR table entries",
                            "    - llc: fix data loss when reading from a socket in llc_ui_recvmsg()",
                            "    - drm/edid: fixed the bug that hdr metadata was not reset",
                            "    - memcg: always call cond_resched() after fn()",
                            "    - mm/page_alloc.c: avoid infinite retries caused by cpuset race",
                            "    - Revert \"arm64: dts: allwinner: h6: Use RSB for AXP805 PMIC connection\"",
                            "    - spi: spi-fsl-dspi: restrict register range for regmap access",
                            "    - spi: spi-fsl-dspi: Halt the module after a new message transfer",
                            "    - spi: spi-fsl-dspi: Reset SR flags before sending a new message",
                            "    - kbuild: Disable -Wdefault-const-init-unsafe",
                            "    - i3c: master: svc: Fix implicit fallthrough in svc_i3c_master_ibi_work()",
                            "    - xen/swiotlb: relax alignment requirements",
                            "    - drm/i915/gvt: fix unterminated-string-initialization warning",
                            "    - x86/its: Fix undefined reference to cpu_wants_rethunk_at()",
                            "    - smb: client: Reset all search buffer pointers when releasing buffer",
                            "    - arm64: dts: qcom: sm8350: Fix typo in pil_camera_mem node",
                            "    - coredump: fix error handling for replace_fd()",
                            "    - pid: add pidfd_prepare()",
                            "    - fork: use pidfd_prepare()",
                            "    - coredump: hand a pidfd to the usermode coredump helper",
                            "    - HID: quirks: Add ADATA XPG alpha wireless mouse support",
                            "    - nfs: don't share pNFS DS connections between net namespaces",
                            "    - platform/x86: thinkpad_acpi: Support also NEC Lavie X1475JAS",
                            "    - um: let 'make clean' properly clean underlying SUBARCH as well",
                            "    - spi: spi-sun4i: fix early activation",
                            "    - nvme-pci: add NVME_QUIRK_NO_DEEPEST_PS quirk for SOLIDIGM P44 Pro",
                            "    - tpm: tis: Double the timeout B to 4s",
                            "    - platform/x86: fujitsu-laptop: Support Lifebook S2110 hotkeys",
                            "    - platform/x86: thinkpad_acpi: Ignore battery threshold change event",
                            "      notification",
                            "    - perf/arm-cmn: Initialise cmn->cpu earlier",
                            "    - Linux 5.15.185",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38051",
                            "    - smb: client: Fix use-after-free in cifs_fill_dirent",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38030",
                            "    - Revert \"drm/amd: Keep display off while going into S4\"",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38077",
                            "    - platform/x86: dell-wmi-sysman: Avoid buffer overflow in",
                            "      current_password_store()",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38078",
                            "    - ALSA: pcm: Fix race of buffer access at PCM OSS layer",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38003",
                            "    - can: bcm: add missing rcu read protection for procfs content",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38004",
                            "    - can: bcm: add locking for bcm_op runtime updates",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38031",
                            "    - padata: do not leak refcount in reorder_work",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38079",
                            "    - crypto: algif_hash - fix double free in hash_accept",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38052",
                            "    - net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38058",
                            "    - __legitimize_mnt(): check for MNT_SYNC_UMOUNT should be under mount_lock",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38034",
                            "    - btrfs: correct the order of prelim_ref arguments in btrfs__prelim_ref",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38035",
                            "    - nvmet-tcp: don't restore null sk_state_change",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38037",
                            "    - vxlan: Annotate FDB data races",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38061",
                            "    - net: pktgen: fix access outside of user given buffer in",
                            "      pktgen_thread_write()",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38043",
                            "    - firmware: arm_ffa: Set dma_mask for ffa devices",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38044",
                            "    - media: cx231xx: set device_caps for 417",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38065",
                            "    - orangefs: Do not truncate file size",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38066",
                            "    - dm cache: prevent BUG_ON by blocking retries on failed device resumes",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38068",
                            "    - crypto: lzo - Fix compression buffer overrun",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38072",
                            "    - libnvdimm/labels: Fix divide error in nd_label_data_init()",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38048",
                            "    - virtio_ring: Fix data race by tagging event_triggered as racy for KCSAN",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38075",
                            "    - scsi: target: iscsi: Fix timeout on deleted connection",
                            "  * Packaging resync (LP: #1786013)",
                            "    - [Packaging] update annotations scripts",
                            "  * raid10: block discard causes a NULL pointer dereference after",
                            "    5.15.0-144-generic (LP: #2117395)",
                            "    - md: move initialization and destruction of 'io_acct_set' to md.c",
                            "  * CVE-2025-38083",
                            "    - net_sched: prio: fix a race in prio_tune()",
                            "  * CVE-2024-50073",
                            "    - tty: n_gsm: Fix use-after-free in gsm_cleanup_mux",
                            ""
                        ],
                        "package": "linux-kvm",
                        "version": "5.15.0-1086.91",
                        "urgency": "medium",
                        "distributions": "jammy",
                        "launchpad_bugs_fixed": [
                            2117604,
                            2117618,
                            2114450,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            1786013,
                            2117395
                        ],
                        "author": "Zixing Liu <zixing.liu@canonical.com>",
                        "date": "Fri, 25 Jul 2025 09:23:36 +0800"
                    }
                ],
                "notes": "linux-kvm-headers-5.15.0-1086 version '5.15.0-1086.91' (source package linux-kvm version '5.15.0-1086.91') was added. linux-kvm-headers-5.15.0-1086 version '5.15.0-1086.91' has the same source package name, linux-kvm, as removed package linux-headers-5.15.0-1085-kvm. As such we can use the source package version of the removed package, '5.15.0-1085.90', as the starting point in our changelog diff. Kernel packages are an example of where the binary package name changes for the same source package. Using the removed package source package version as our starting point means we can still get meaningful changelog diffs even for what appears to be a new package.",
                "is_version_downgrade": false
            },
            {
                "name": "linux-modules-5.15.0-1086-kvm",
                "from_version": {
                    "source_package_name": "linux-kvm",
                    "source_package_version": "5.15.0-1085.90",
                    "version": null
                },
                "to_version": {
                    "source_package_name": "linux-kvm",
                    "source_package_version": "5.15.0-1086.91",
                    "version": "5.15.0-1086.91"
                },
                "cves": [
                    {
                        "cve": "CVE-2025-38051",
                        "url": "https://ubuntu.com/security/CVE-2025-38051",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  smb: client: Fix use-after-free in cifs_fill_dirent  There is a race condition in the readdir concurrency process, which may access the rsp buffer after it has been released, triggering the following KASAN warning.   ==================================================================  BUG: KASAN: slab-use-after-free in cifs_fill_dirent+0xb03/0xb60 [cifs]  Read of size 4 at addr ffff8880099b819c by task a.out/342975   CPU: 2 UID: 0 PID: 342975 Comm: a.out Not tainted 6.15.0-rc6+ #240 PREEMPT(full)  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.1-2.fc37 04/01/2014  Call Trace:   <TASK>   dump_stack_lvl+0x53/0x70   print_report+0xce/0x640   kasan_report+0xb8/0xf0   cifs_fill_dirent+0xb03/0xb60 [cifs]   cifs_readdir+0x12cb/0x3190 [cifs]   iterate_dir+0x1a1/0x520   __x64_sys_getdents+0x134/0x220   do_syscall_64+0x4b/0x110   entry_SYSCALL_64_after_hwframe+0x76/0x7e  RIP: 0033:0x7f996f64b9f9  Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89  f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01  f0 ff ff  0d f7 c3 0c 00 f7 d8 64 89 8  RSP: 002b:00007f996f53de78 EFLAGS: 00000207 ORIG_RAX: 000000000000004e  RAX: ffffffffffffffda RBX: 00007f996f53ecdc RCX: 00007f996f64b9f9  RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003  RBP: 00007f996f53dea0 R08: 0000000000000000 R09: 0000000000000000  R10: 0000000000000000 R11: 0000000000000207 R12: ffffffffffffff88  R13: 0000000000000000 R14: 00007ffc8cd9a500 R15: 00007f996f51e000   </TASK>   Allocated by task 408:   kasan_save_stack+0x20/0x40   kasan_save_track+0x14/0x30   __kasan_slab_alloc+0x6e/0x70   kmem_cache_alloc_noprof+0x117/0x3d0   mempool_alloc_noprof+0xf2/0x2c0   cifs_buf_get+0x36/0x80 [cifs]   allocate_buffers+0x1d2/0x330 [cifs]   cifs_demultiplex_thread+0x22b/0x2690 [cifs]   kthread+0x394/0x720   ret_from_fork+0x34/0x70   ret_from_fork_asm+0x1a/0x30   Freed by task 342979:   kasan_save_stack+0x20/0x40   kasan_save_track+0x14/0x30   kasan_save_free_info+0x3b/0x60   __kasan_slab_free+0x37/0x50   kmem_cache_free+0x2b8/0x500   cifs_buf_release+0x3c/0x70 [cifs]   cifs_readdir+0x1c97/0x3190 [cifs]   iterate_dir+0x1a1/0x520   __x64_sys_getdents64+0x134/0x220   do_syscall_64+0x4b/0x110   entry_SYSCALL_64_after_hwframe+0x76/0x7e   The buggy address belongs to the object at ffff8880099b8000   which belongs to the cache cifs_request of size 16588  The buggy address is located 412 bytes inside of   freed 16588-byte region [ffff8880099b8000, ffff8880099bc0cc)   The buggy address belongs to the physical page:  page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x99b8  head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0  anon flags: 0x80000000000040(head|node=0|zone=1)  page_type: f5(slab)  raw: 0080000000000040 ffff888001e03400 0000000000000000 dead000000000001  raw: 0000000000000000 0000000000010001 00000000f5000000 0000000000000000  head: 0080000000000040 ffff888001e03400 0000000000000000 dead000000000001  head: 0000000000000000 0000000000010001 00000000f5000000 0000000000000000  head: 0080000000000003 ffffea0000266e01 00000000ffffffff 00000000ffffffff  head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008  page dumped because: kasan: bad access detected   Memory state around the buggy address:   ffff8880099b8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb   ffff8880099b8100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb  >ffff8880099b8180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb                              ^   ffff8880099b8200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb   ffff8880099b8280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb  ==================================================================  POC is available in the link [1].  The problem triggering process is as follows:  Process 1                       Process 2 ----------------------------------- ---truncated---",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38030",
                        "url": "https://ubuntu.com/security/CVE-2025-38030",
                        "cve_description": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
                        "cve_priority": "negligible",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38077",
                        "url": "https://ubuntu.com/security/CVE-2025-38077",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  platform/x86: dell-wmi-sysman: Avoid buffer overflow in current_password_store()  If the 'buf' array received from the user contains an empty string, the 'length' variable will be zero. Accessing the 'buf' array element with index 'length - 1' will result in a buffer overflow.  Add a check for an empty string.  Found by Linux Verification Center (linuxtesting.org) with SVACE.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38078",
                        "url": "https://ubuntu.com/security/CVE-2025-38078",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  ALSA: pcm: Fix race of buffer access at PCM OSS layer  The PCM OSS layer tries to clear the buffer with the silence data at initialization (or reconfiguration) of a stream with the explicit call of snd_pcm_format_set_silence() with runtime->dma_area.  But this may lead to a UAF because the accessed runtime->dma_area might be freed concurrently, as it's performed outside the PCM ops.  For avoiding it, move the code into the PCM core and perform it inside the buffer access lock, so that it won't be changed during the operation.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38003",
                        "url": "https://ubuntu.com/security/CVE-2025-38003",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  can: bcm: add missing rcu read protection for procfs content  When the procfs content is generated for a bcm_op which is in the process to be removed the procfs output might show unreliable data (UAF).  As the removal of bcm_op's is already implemented with rcu handling this patch adds the missing rcu_read_lock() and makes sure the list entries are properly removed under rcu protection.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-08 11:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38004",
                        "url": "https://ubuntu.com/security/CVE-2025-38004",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  can: bcm: add locking for bcm_op runtime updates  The CAN broadcast manager (CAN BCM) can send a sequence of CAN frames via hrtimer. The content and also the length of the sequence can be changed resp reduced at runtime where the 'currframe' counter is then set to zero.  Although this appeared to be a safe operation the updates of 'currframe' can be triggered from user space and hrtimer context in bcm_can_tx(). Anderson Nascimento created a proof of concept that triggered a KASAN slab-out-of-bounds read access which can be prevented with a spin_lock_bh.  At the rework of bcm_can_tx() the 'count' variable has been moved into the protected section as this variable can be modified from both contexts too.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-08 11:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38031",
                        "url": "https://ubuntu.com/security/CVE-2025-38031",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  padata: do not leak refcount in reorder_work  A recent patch that addressed a UAF introduced a reference count leak: the parallel_data refcount is incremented unconditionally, regardless of the return value of queue_work(). If the work item is already queued, the incremented refcount is never decremented.  Fix this by checking the return value of queue_work() and decrementing the refcount when necessary.  Resolves:  Unreferenced object 0xffff9d9f421e3d80 (size 192):   comm \"cryptomgr_probe\", pid 157, jiffies 4294694003   hex dump (first 32 bytes):     80 8b cf 41 9f 9d ff ff b8 97 e0 89 ff ff ff ff  ...A............     d0 97 e0 89 ff ff ff ff 19 00 00 00 1f 88 23 00  ..............#.   backtrace (crc 838fb36):     __kmalloc_cache_noprof+0x284/0x320     padata_alloc_pd+0x20/0x1e0     padata_alloc_shell+0x3b/0xa0     0xffffffffc040a54d     cryptomgr_probe+0x43/0xc0     kthread+0xf6/0x1f0     ret_from_fork+0x2f/0x50     ret_from_fork_asm+0x1a/0x30",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38079",
                        "url": "https://ubuntu.com/security/CVE-2025-38079",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  crypto: algif_hash - fix double free in hash_accept  If accept(2) is called on socket type algif_hash with MSG_MORE flag set and crypto_ahash_import fails, sk2 is freed. However, it is also freed in af_alg_release, leading to slab-use-after-free error.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38052",
                        "url": "https://ubuntu.com/security/CVE-2025-38052",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done  Syzbot reported a slab-use-after-free with the following call trace:    ==================================================================   BUG: KASAN: slab-use-after-free in tipc_aead_encrypt_done+0x4bd/0x510 net/tipc/crypto.c:840   Read of size 8 at addr ffff88807a733000 by task kworker/1:0/25    Call Trace:    kasan_report+0xd9/0x110 mm/kasan/report.c:601    tipc_aead_encrypt_done+0x4bd/0x510 net/tipc/crypto.c:840    crypto_request_complete include/crypto/algapi.h:266    aead_request_complete include/crypto/internal/aead.h:85    cryptd_aead_crypt+0x3b8/0x750 crypto/cryptd.c:772    crypto_request_complete include/crypto/algapi.h:266    cryptd_queue_worker+0x131/0x200 crypto/cryptd.c:181    process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231    Allocated by task 8355:    kzalloc_noprof include/linux/slab.h:778    tipc_crypto_start+0xcc/0x9e0 net/tipc/crypto.c:1466    tipc_init_net+0x2dd/0x430 net/tipc/core.c:72    ops_init+0xb9/0x650 net/core/net_namespace.c:139    setup_net+0x435/0xb40 net/core/net_namespace.c:343    copy_net_ns+0x2f0/0x670 net/core/net_namespace.c:508    create_new_namespaces+0x3ea/0xb10 kernel/nsproxy.c:110    unshare_nsproxy_namespaces+0xc0/0x1f0 kernel/nsproxy.c:228    ksys_unshare+0x419/0x970 kernel/fork.c:3323    __do_sys_unshare kernel/fork.c:3394    Freed by task 63:    kfree+0x12a/0x3b0 mm/slub.c:4557    tipc_crypto_stop+0x23c/0x500 net/tipc/crypto.c:1539    tipc_exit_net+0x8c/0x110 net/tipc/core.c:119    ops_exit_list+0xb0/0x180 net/core/net_namespace.c:173    cleanup_net+0x5b7/0xbf0 net/core/net_namespace.c:640    process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231  After freed the tipc_crypto tx by delete namespace, tipc_aead_encrypt_done may still visit it in cryptd_queue_worker workqueue.  I reproduce this issue by:   ip netns add ns1   ip link add veth1 type veth peer name veth2   ip link set veth1 netns ns1   ip netns exec ns1 tipc bearer enable media eth dev veth1   ip netns exec ns1 tipc node set key this_is_a_master_key master   ip netns exec ns1 tipc bearer disable media eth dev veth1   ip netns del ns1  The key of reproduction is that, simd_aead_encrypt is interrupted, leading to crypto_simd_usable() return false. Thus, the cryptd_queue_worker is triggered, and the tipc_crypto tx will be visited.    tipc_disc_timeout     tipc_bearer_xmit_skb       tipc_crypto_xmit         tipc_aead_encrypt           crypto_aead_encrypt             // encrypt()             simd_aead_encrypt               // crypto_simd_usable() is false               child = &ctx->cryptd_tfm->base;    simd_aead_encrypt     crypto_aead_encrypt       // encrypt()       cryptd_aead_encrypt_enqueue         cryptd_aead_enqueue           cryptd_enqueue_request             // trigger cryptd_queue_worker             queue_work_on(smp_processor_id(), cryptd_wq, &cpu_queue->work)  Fix this by holding net reference count before encrypt.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38058",
                        "url": "https://ubuntu.com/security/CVE-2025-38058",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  __legitimize_mnt(): check for MNT_SYNC_UMOUNT should be under mount_lock  ... or we risk stealing final mntput from sync umount - raising mnt_count after umount(2) has verified that victim is not busy, but before it has set MNT_SYNC_UMOUNT; in that case __legitimize_mnt() doesn't see that it's safe to quietly undo mnt_count increment and leaves dropping the reference to caller, where it'll be a full-blown mntput().  Check under mount_lock is needed; leaving the current one done before taking that makes no sense - it's nowhere near common enough to bother with.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38034",
                        "url": "https://ubuntu.com/security/CVE-2025-38034",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  btrfs: correct the order of prelim_ref arguments in btrfs__prelim_ref  btrfs_prelim_ref() calls the old and new reference variables in the incorrect order. This causes a NULL pointer dereference because oldref is passed as NULL to trace_btrfs_prelim_ref_insert().  Note, trace_btrfs_prelim_ref_insert() is being called with newref as oldref (and oldref as NULL) on purpose in order to print out the values of newref.  To reproduce: echo 1 > /sys/kernel/debug/tracing/events/btrfs/btrfs_prelim_ref_insert/enable  Perform some writeback operations.  Backtrace: BUG: kernel NULL pointer dereference, address: 0000000000000018  #PF: supervisor read access in kernel mode  #PF: error_code(0x0000) - not-present page  PGD 115949067 P4D 115949067 PUD 11594a067 PMD 0  Oops: Oops: 0000 [#1] SMP NOPTI  CPU: 1 UID: 0 PID: 1188 Comm: fsstress Not tainted 6.15.0-rc2-tester+ #47 PREEMPT(voluntary)  7ca2cef72d5e9c600f0c7718adb6462de8149622  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.3-2-gc13ff2cd-prebuilt.qemu.org 04/01/2014  RIP: 0010:trace_event_raw_event_btrfs__prelim_ref+0x72/0x130  Code: e8 43 81 9f ff 48 85 c0 74 78 4d 85 e4 0f 84 8f 00 00 00 49 8b 94 24 c0 06 00 00 48 8b 0a 48 89 48 08 48 8b 52 08 48 89 50 10 <49> 8b 55 18 48 89 50 18 49 8b 55 20 48 89 50 20 41 0f b6 55 28 88  RSP: 0018:ffffce44820077a0 EFLAGS: 00010286  RAX: ffff8c6b403f9014 RBX: ffff8c6b55825730 RCX: 304994edf9cf506b  RDX: d8b11eb7f0fdb699 RSI: ffff8c6b403f9010 RDI: ffff8c6b403f9010  RBP: 0000000000000001 R08: 0000000000000001 R09: 0000000000000010  R10: 00000000ffffffff R11: 0000000000000000 R12: ffff8c6b4e8fb000  R13: 0000000000000000 R14: ffffce44820077a8 R15: ffff8c6b4abd1540  FS:  00007f4dc6813740(0000) GS:ffff8c6c1d378000(0000) knlGS:0000000000000000  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033  CR2: 0000000000000018 CR3: 000000010eb42000 CR4: 0000000000750ef0  PKRU: 55555554  Call Trace:   <TASK>   prelim_ref_insert+0x1c1/0x270   find_parent_nodes+0x12a6/0x1ee0   ? __entry_text_end+0x101f06/0x101f09   ? srso_alias_return_thunk+0x5/0xfbef5   ? srso_alias_return_thunk+0x5/0xfbef5   ? srso_alias_return_thunk+0x5/0xfbef5   ? srso_alias_return_thunk+0x5/0xfbef5   btrfs_is_data_extent_shared+0x167/0x640   ? fiemap_process_hole+0xd0/0x2c0   extent_fiemap+0xa5c/0xbc0   ? __entry_text_end+0x101f05/0x101f09   btrfs_fiemap+0x7e/0xd0   do_vfs_ioctl+0x425/0x9d0   __x64_sys_ioctl+0x75/0xc0",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38035",
                        "url": "https://ubuntu.com/security/CVE-2025-38035",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  nvmet-tcp: don't restore null sk_state_change  queue->state_change is set as part of nvmet_tcp_set_queue_sock(), but if the TCP connection isn't established when nvmet_tcp_set_queue_sock() is called then queue->state_change isn't set and sock->sk->sk_state_change isn't replaced.  As such we don't need to restore sock->sk->sk_state_change if queue->state_change is NULL.  This avoids NULL pointer dereferences such as this:  [  286.462026][    C0] BUG: kernel NULL pointer dereference, address: 0000000000000000 [  286.462814][    C0] #PF: supervisor instruction fetch in kernel mode [  286.463796][    C0] #PF: error_code(0x0010) - not-present page [  286.464392][    C0] PGD 8000000140620067 P4D 8000000140620067 PUD 114201067 PMD 0 [  286.465086][    C0] Oops: Oops: 0010 [#1] SMP KASAN PTI [  286.465559][    C0] CPU: 0 UID: 0 PID: 1628 Comm: nvme Not tainted 6.15.0-rc2+ #11 PREEMPT(voluntary) [  286.466393][    C0] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-3.fc41 04/01/2014 [  286.467147][    C0] RIP: 0010:0x0 [  286.467420][    C0] Code: Unable to access opcode bytes at 0xffffffffffffffd6. [  286.467977][    C0] RSP: 0018:ffff8883ae008580 EFLAGS: 00010246 [  286.468425][    C0] RAX: 0000000000000000 RBX: ffff88813fd34100 RCX: ffffffffa386cc43 [  286.469019][    C0] RDX: 1ffff11027fa68b6 RSI: 0000000000000008 RDI: ffff88813fd34100 [  286.469545][    C0] RBP: ffff88813fd34160 R08: 0000000000000000 R09: ffffed1027fa682c [  286.470072][    C0] R10: ffff88813fd34167 R11: 0000000000000000 R12: ffff88813fd344c3 [  286.470585][    C0] R13: ffff88813fd34112 R14: ffff88813fd34aec R15: ffff888132cdd268 [  286.471070][    C0] FS:  00007fe3c04c7d80(0000) GS:ffff88840743f000(0000) knlGS:0000000000000000 [  286.471644][    C0] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [  286.472543][    C0] CR2: ffffffffffffffd6 CR3: 000000012daca000 CR4: 00000000000006f0 [  286.473500][    C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [  286.474467][    C0] DR3: 0000000000000000 DR6: 00000000ffff07f0 DR7: 0000000000000400 [  286.475453][    C0] Call Trace: [  286.476102][    C0]  <IRQ> [  286.476719][    C0]  tcp_fin+0x2bb/0x440 [  286.477429][    C0]  tcp_data_queue+0x190f/0x4e60 [  286.478174][    C0]  ? __build_skb_around+0x234/0x330 [  286.478940][    C0]  ? rcu_is_watching+0x11/0xb0 [  286.479659][    C0]  ? __pfx_tcp_data_queue+0x10/0x10 [  286.480431][    C0]  ? tcp_try_undo_loss+0x640/0x6c0 [  286.481196][    C0]  ? seqcount_lockdep_reader_access.constprop.0+0x82/0x90 [  286.482046][    C0]  ? kvm_clock_get_cycles+0x14/0x30 [  286.482769][    C0]  ? ktime_get+0x66/0x150 [  286.483433][    C0]  ? rcu_is_watching+0x11/0xb0 [  286.484146][    C0]  tcp_rcv_established+0x6e4/0x2050 [  286.484857][    C0]  ? rcu_is_watching+0x11/0xb0 [  286.485523][    C0]  ? ipv4_dst_check+0x160/0x2b0 [  286.486203][    C0]  ? __pfx_tcp_rcv_established+0x10/0x10 [  286.486917][    C0]  ? lock_release+0x217/0x2c0 [  286.487595][    C0]  tcp_v4_do_rcv+0x4d6/0x9b0 [  286.488279][    C0]  tcp_v4_rcv+0x2af8/0x3e30 [  286.488904][    C0]  ? raw_local_deliver+0x51b/0xad0 [  286.489551][    C0]  ? rcu_is_watching+0x11/0xb0 [  286.490198][    C0]  ? __pfx_tcp_v4_rcv+0x10/0x10 [  286.490813][    C0]  ? __pfx_raw_local_deliver+0x10/0x10 [  286.491487][    C0]  ? __pfx_nf_confirm+0x10/0x10 [nf_conntrack] [  286.492275][    C0]  ? rcu_is_watching+0x11/0xb0 [  286.492900][    C0]  ip_protocol_deliver_rcu+0x8f/0x370 [  286.493579][    C0]  ip_local_deliver_finish+0x297/0x420 [  286.494268][    C0]  ip_local_deliver+0x168/0x430 [  286.494867][    C0]  ? __pfx_ip_local_deliver+0x10/0x10 [  286.495498][    C0]  ? __pfx_ip_local_deliver_finish+0x10/0x10 [  286.496204][    C0]  ? ip_rcv_finish_core+0x19a/0x1f20 [  286.496806][    C0]  ? lock_release+0x217/0x2c0 [  286.497414][    C0]  ip_rcv+0x455/0x6e0 [  286.497945][    C0]  ? __pfx_ip_rcv+0x10/0x10 [ ---truncated---",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38037",
                        "url": "https://ubuntu.com/security/CVE-2025-38037",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  vxlan: Annotate FDB data races  The 'used' and 'updated' fields in the FDB entry structure can be accessed concurrently by multiple threads, leading to reports such as [1]. Can be reproduced using [2].  Suppress these reports by annotating these accesses using READ_ONCE() / WRITE_ONCE().  [1] BUG: KCSAN: data-race in vxlan_xmit / vxlan_xmit  write to 0xffff942604d263a8 of 8 bytes by task 286 on cpu 0:  vxlan_xmit+0xb29/0x2380  dev_hard_start_xmit+0x84/0x2f0  __dev_queue_xmit+0x45a/0x1650  packet_xmit+0x100/0x150  packet_sendmsg+0x2114/0x2ac0  __sys_sendto+0x318/0x330  __x64_sys_sendto+0x76/0x90  x64_sys_call+0x14e8/0x1c00  do_syscall_64+0x9e/0x1a0  entry_SYSCALL_64_after_hwframe+0x77/0x7f  read to 0xffff942604d263a8 of 8 bytes by task 287 on cpu 2:  vxlan_xmit+0xadf/0x2380  dev_hard_start_xmit+0x84/0x2f0  __dev_queue_xmit+0x45a/0x1650  packet_xmit+0x100/0x150  packet_sendmsg+0x2114/0x2ac0  __sys_sendto+0x318/0x330  __x64_sys_sendto+0x76/0x90  x64_sys_call+0x14e8/0x1c00  do_syscall_64+0x9e/0x1a0  entry_SYSCALL_64_after_hwframe+0x77/0x7f  value changed: 0x00000000fffbac6e -> 0x00000000fffbac6f  Reported by Kernel Concurrency Sanitizer on: CPU: 2 UID: 0 PID: 287 Comm: mausezahn Not tainted 6.13.0-rc7-01544-gb4b270f11a02 #5 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-3.fc41 04/01/2014  [2]  #!/bin/bash   set +H  echo whitelist > /sys/kernel/debug/kcsan  echo !vxlan_xmit > /sys/kernel/debug/kcsan   ip link add name vx0 up type vxlan id 10010 dstport 4789 local 192.0.2.1  bridge fdb add 00:11:22:33:44:55 dev vx0 self static dst 198.51.100.1  taskset -c 0 mausezahn vx0 -a own -b 00:11:22:33:44:55 -c 0 -q &  taskset -c 2 mausezahn vx0 -a own -b 00:11:22:33:44:55 -c 0 -q &",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38061",
                        "url": "https://ubuntu.com/security/CVE-2025-38061",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  net: pktgen: fix access outside of user given buffer in pktgen_thread_write()  Honour the user given buffer size for the strn_len() calls (otherwise strn_len() will access memory outside of the user given buffer).",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38043",
                        "url": "https://ubuntu.com/security/CVE-2025-38043",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  firmware: arm_ffa: Set dma_mask for ffa devices  Set dma_mask for FFA devices, otherwise DMA allocation using the device pointer lead to following warning:  WARNING: CPU: 1 PID: 1 at kernel/dma/mapping.c:597 dma_alloc_attrs+0xe0/0x124",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38044",
                        "url": "https://ubuntu.com/security/CVE-2025-38044",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  media: cx231xx: set device_caps for 417  The video_device for the MPEG encoder did not set device_caps.  Add this, otherwise the video device can't be registered (you get a WARN_ON instead).  Not seen before since currently 417 support is disabled, but I found this while experimenting with it.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38065",
                        "url": "https://ubuntu.com/security/CVE-2025-38065",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  orangefs: Do not truncate file size  'len' is used to store the result of i_size_read(), so making 'len' a size_t results in truncation to 4GiB on 32-bit systems.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38066",
                        "url": "https://ubuntu.com/security/CVE-2025-38066",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  dm cache: prevent BUG_ON by blocking retries on failed device resumes  A cache device failing to resume due to mapping errors should not be retried, as the failure leaves a partially initialized policy object. Repeating the resume operation risks triggering BUG_ON when reloading cache mappings into the incomplete policy object.  Reproduce steps:  1. create a cache metadata consisting of 512 or more cache blocks,    with some mappings stored in the first array block of the mapping    array. Here we use cache_restore v1.0 to build the metadata.  cat <<EOF >> cmeta.xml <superblock uuid=\"\" block_size=\"128\" nr_cache_blocks=\"512\" \\ policy=\"smq\" hint_width=\"4\">   <mappings>     <mapping cache_block=\"0\" origin_block=\"0\" dirty=\"false\"/>   </mappings> </superblock> EOF dmsetup create cmeta --table \"0 8192 linear /dev/sdc 0\" cache_restore -i cmeta.xml -o /dev/mapper/cmeta --metadata-version=2 dmsetup remove cmeta  2. wipe the second array block of the mapping array to simulate    data degradations.  mapping_root=$(dd if=/dev/sdc bs=1c count=8 skip=192 \\ 2>/dev/null | hexdump -e '1/8 \"%u\\n\"') ablock=$(dd if=/dev/sdc bs=1c count=8 skip=$((4096*mapping_root+2056)) \\ 2>/dev/null | hexdump -e '1/8 \"%u\\n\"') dd if=/dev/zero of=/dev/sdc bs=4k count=1 seek=$ablock  3. try bringing up the cache device. The resume is expected to fail    due to the broken array block.  dmsetup create cmeta --table \"0 8192 linear /dev/sdc 0\" dmsetup create cdata --table \"0 65536 linear /dev/sdc 8192\" dmsetup create corig --table \"0 524288 linear /dev/sdc 262144\" dmsetup create cache --notable dmsetup load cache --table \"0 524288 cache /dev/mapper/cmeta \\ /dev/mapper/cdata /dev/mapper/corig 128 2 metadata2 writethrough smq 0\" dmsetup resume cache  4. try resuming the cache again. An unexpected BUG_ON is triggered    while loading cache mappings.  dmsetup resume cache  Kernel logs:  (snip) ------------[ cut here ]------------ kernel BUG at drivers/md/dm-cache-policy-smq.c:752! Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN NOPTI CPU: 0 UID: 0 PID: 332 Comm: dmsetup Not tainted 6.13.4 #3 RIP: 0010:smq_load_mapping+0x3e5/0x570  Fix by disallowing resume operations for devices that failed the initial attempt.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38068",
                        "url": "https://ubuntu.com/security/CVE-2025-38068",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  crypto: lzo - Fix compression buffer overrun  Unlike the decompression code, the compression code in LZO never checked for output overruns.  It instead assumes that the caller always provides enough buffer space, disregarding the buffer length provided by the caller.  Add a safe compression interface that checks for the end of buffer before each write.  Use the safe interface in crypto/lzo.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38072",
                        "url": "https://ubuntu.com/security/CVE-2025-38072",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  libnvdimm/labels: Fix divide error in nd_label_data_init()  If a faulty CXL memory device returns a broken zero LSA size in its memory device information (Identify Memory Device (Opcode 4000h), CXL spec. 3.1, 8.2.9.9.1.1), a divide error occurs in the libnvdimm driver:   Oops: divide error: 0000 [#1] PREEMPT SMP NOPTI  RIP: 0010:nd_label_data_init+0x10e/0x800 [libnvdimm]  Code and flow:  1) CXL Command 4000h returns LSA size = 0 2) config_size is assigned to zero LSA size (CXL pmem driver):  drivers/cxl/pmem.c:             .config_size = mds->lsa_size,  3) max_xfer is set to zero (nvdimm driver):  drivers/nvdimm/label.c: max_xfer = min_t(size_t, ndd->nsarea.max_xfer, config_size);  4) A subsequent DIV_ROUND_UP() causes a division by zero:  drivers/nvdimm/label.c: /* Make our initial read size a multiple of max_xfer size */ drivers/nvdimm/label.c: read_size = min(DIV_ROUND_UP(read_size, max_xfer) * max_xfer, drivers/nvdimm/label.c-                 config_size);  Fix this by checking the config size parameter by extending an existing check.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38048",
                        "url": "https://ubuntu.com/security/CVE-2025-38048",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  virtio_ring: Fix data race by tagging event_triggered as racy for KCSAN  syzbot reports a data-race when accessing the event_triggered, here is the simplified stack when the issue occurred:  ================================================================== BUG: KCSAN: data-race in virtqueue_disable_cb / virtqueue_enable_cb_delayed  write to 0xffff8881025bc452 of 1 bytes by task 3288 on cpu 0:  virtqueue_enable_cb_delayed+0x42/0x3c0 drivers/virtio/virtio_ring.c:2653  start_xmit+0x230/0x1310 drivers/net/virtio_net.c:3264  __netdev_start_xmit include/linux/netdevice.h:5151 [inline]  netdev_start_xmit include/linux/netdevice.h:5160 [inline]  xmit_one net/core/dev.c:3800 [inline]  read to 0xffff8881025bc452 of 1 bytes by interrupt on cpu 1:  virtqueue_disable_cb_split drivers/virtio/virtio_ring.c:880 [inline]  virtqueue_disable_cb+0x92/0x180 drivers/virtio/virtio_ring.c:2566  skb_xmit_done+0x5f/0x140 drivers/net/virtio_net.c:777  vring_interrupt+0x161/0x190 drivers/virtio/virtio_ring.c:2715  __handle_irq_event_percpu+0x95/0x490 kernel/irq/handle.c:158  handle_irq_event_percpu kernel/irq/handle.c:193 [inline]  value changed: 0x01 -> 0x00 ==================================================================  When the data race occurs, the function virtqueue_enable_cb_delayed() sets event_triggered to false, and virtqueue_disable_cb_split/packed() reads it as false due to the race condition. Since event_triggered is an unreliable hint used for optimization, this should only cause the driver temporarily suggest that the device not send an interrupt notification when the event index is used.  Fix this KCSAN reported data-race issue by explicitly tagging the access as data_racy.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38075",
                        "url": "https://ubuntu.com/security/CVE-2025-38075",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  scsi: target: iscsi: Fix timeout on deleted connection  NOPIN response timer may expire on a deleted connection and crash with such logs:  Did not receive response to NOPIN on CID: 0, failing connection for I_T Nexus (null),i,0x00023d000125,iqn.2017-01.com.iscsi.target,t,0x3d  BUG: Kernel NULL pointer dereference on read at 0x00000000 NIP  strlcpy+0x8/0xb0 LR iscsit_fill_cxn_timeout_err_stats+0x5c/0xc0 [iscsi_target_mod] Call Trace:  iscsit_handle_nopin_response_timeout+0xfc/0x120 [iscsi_target_mod]  call_timer_fn+0x58/0x1f0  run_timer_softirq+0x740/0x860  __do_softirq+0x16c/0x420  irq_exit+0x188/0x1c0  timer_interrupt+0x184/0x410  That is because nopin response timer may be re-started on nopin timer expiration.  Stop nopin timer before stopping the nopin response timer to be sure that no one of them will be re-started.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-18 10:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2025-38083",
                        "url": "https://ubuntu.com/security/CVE-2025-38083",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  net_sched: prio: fix a race in prio_tune()  Gerrard Tai reported a race condition in PRIO, whenever SFQ perturb timer fires at the wrong time.  The race is as follows:  CPU 0                                 CPU 1 [1]: lock root [2]: qdisc_tree_flush_backlog() [3]: unlock root  |  |                                    [5]: lock root  |                                    [6]: rehash  |                                    [7]: qdisc_tree_reduce_backlog()  | [4]: qdisc_put()  This can be abused to underflow a parent's qlen.  Calling qdisc_purge_queue() instead of qdisc_tree_flush_backlog() should fix the race, because all packets will be purged from the qdisc before releasing the lock.",
                        "cve_priority": "medium",
                        "cve_public_date": "2025-06-20 12:15:00 UTC"
                    },
                    {
                        "cve": "CVE-2024-50073",
                        "url": "https://ubuntu.com/security/CVE-2024-50073",
                        "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  tty: n_gsm: Fix use-after-free in gsm_cleanup_mux  BUG: KASAN: slab-use-after-free in gsm_cleanup_mux+0x77b/0x7b0 drivers/tty/n_gsm.c:3160 [n_gsm] Read of size 8 at addr ffff88815fe99c00 by task poc/3379 CPU: 0 UID: 0 PID: 3379 Comm: poc Not tainted 6.11.0+ #56 Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020 Call Trace:  <TASK>  gsm_cleanup_mux+0x77b/0x7b0 drivers/tty/n_gsm.c:3160 [n_gsm]  __pfx_gsm_cleanup_mux+0x10/0x10 drivers/tty/n_gsm.c:3124 [n_gsm]  __pfx_sched_clock_cpu+0x10/0x10 kernel/sched/clock.c:389  update_load_avg+0x1c1/0x27b0 kernel/sched/fair.c:4500  __pfx_min_vruntime_cb_rotate+0x10/0x10 kernel/sched/fair.c:846  __rb_insert_augmented+0x492/0xbf0 lib/rbtree.c:161  gsmld_ioctl+0x395/0x1450 drivers/tty/n_gsm.c:3408 [n_gsm]  _raw_spin_lock_irqsave+0x92/0xf0 arch/x86/include/asm/atomic.h:107  __pfx_gsmld_ioctl+0x10/0x10 drivers/tty/n_gsm.c:3822 [n_gsm]  ktime_get+0x5e/0x140 kernel/time/timekeeping.c:195  ldsem_down_read+0x94/0x4e0 arch/x86/include/asm/atomic64_64.h:79  __pfx_ldsem_down_read+0x10/0x10 drivers/tty/tty_ldsem.c:338  __pfx_do_vfs_ioctl+0x10/0x10 fs/ioctl.c:805  tty_ioctl+0x643/0x1100 drivers/tty/tty_io.c:2818  Allocated by task 65:  gsm_data_alloc.constprop.0+0x27/0x190 drivers/tty/n_gsm.c:926 [n_gsm]  gsm_send+0x2c/0x580 drivers/tty/n_gsm.c:819 [n_gsm]  gsm1_receive+0x547/0xad0 drivers/tty/n_gsm.c:3038 [n_gsm]  gsmld_receive_buf+0x176/0x280 drivers/tty/n_gsm.c:3609 [n_gsm]  tty_ldisc_receive_buf+0x101/0x1e0 drivers/tty/tty_buffer.c:391  tty_port_default_receive_buf+0x61/0xa0 drivers/tty/tty_port.c:39  flush_to_ldisc+0x1b0/0x750 drivers/tty/tty_buffer.c:445  process_scheduled_works+0x2b0/0x10d0 kernel/workqueue.c:3229  worker_thread+0x3dc/0x950 kernel/workqueue.c:3391  kthread+0x2a3/0x370 kernel/kthread.c:389  ret_from_fork+0x2d/0x70 arch/x86/kernel/process.c:147  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:257  Freed by task 3367:  kfree+0x126/0x420 mm/slub.c:4580  gsm_cleanup_mux+0x36c/0x7b0 drivers/tty/n_gsm.c:3160 [n_gsm]  gsmld_ioctl+0x395/0x1450 drivers/tty/n_gsm.c:3408 [n_gsm]  tty_ioctl+0x643/0x1100 drivers/tty/tty_io.c:2818  [Analysis] gsm_msg on the tx_ctrl_list or tx_data_list of gsm_mux can be freed by multi threads through ioctl,which leads to the occurrence of uaf. Protect it by gsm tx lock.",
                        "cve_priority": "medium",
                        "cve_public_date": "2024-10-29 01:15:00 UTC"
                    }
                ],
                "launchpad_bugs_fixed": [
                    2117604,
                    2117618,
                    2114450,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    2115240,
                    1786013,
                    2117395
                ],
                "changes": [
                    {
                        "cves": [
                            {
                                "cve": "CVE-2025-38051",
                                "url": "https://ubuntu.com/security/CVE-2025-38051",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  smb: client: Fix use-after-free in cifs_fill_dirent  There is a race condition in the readdir concurrency process, which may access the rsp buffer after it has been released, triggering the following KASAN warning.   ==================================================================  BUG: KASAN: slab-use-after-free in cifs_fill_dirent+0xb03/0xb60 [cifs]  Read of size 4 at addr ffff8880099b819c by task a.out/342975   CPU: 2 UID: 0 PID: 342975 Comm: a.out Not tainted 6.15.0-rc6+ #240 PREEMPT(full)  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.1-2.fc37 04/01/2014  Call Trace:   <TASK>   dump_stack_lvl+0x53/0x70   print_report+0xce/0x640   kasan_report+0xb8/0xf0   cifs_fill_dirent+0xb03/0xb60 [cifs]   cifs_readdir+0x12cb/0x3190 [cifs]   iterate_dir+0x1a1/0x520   __x64_sys_getdents+0x134/0x220   do_syscall_64+0x4b/0x110   entry_SYSCALL_64_after_hwframe+0x76/0x7e  RIP: 0033:0x7f996f64b9f9  Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89  f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01  f0 ff ff  0d f7 c3 0c 00 f7 d8 64 89 8  RSP: 002b:00007f996f53de78 EFLAGS: 00000207 ORIG_RAX: 000000000000004e  RAX: ffffffffffffffda RBX: 00007f996f53ecdc RCX: 00007f996f64b9f9  RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003  RBP: 00007f996f53dea0 R08: 0000000000000000 R09: 0000000000000000  R10: 0000000000000000 R11: 0000000000000207 R12: ffffffffffffff88  R13: 0000000000000000 R14: 00007ffc8cd9a500 R15: 00007f996f51e000   </TASK>   Allocated by task 408:   kasan_save_stack+0x20/0x40   kasan_save_track+0x14/0x30   __kasan_slab_alloc+0x6e/0x70   kmem_cache_alloc_noprof+0x117/0x3d0   mempool_alloc_noprof+0xf2/0x2c0   cifs_buf_get+0x36/0x80 [cifs]   allocate_buffers+0x1d2/0x330 [cifs]   cifs_demultiplex_thread+0x22b/0x2690 [cifs]   kthread+0x394/0x720   ret_from_fork+0x34/0x70   ret_from_fork_asm+0x1a/0x30   Freed by task 342979:   kasan_save_stack+0x20/0x40   kasan_save_track+0x14/0x30   kasan_save_free_info+0x3b/0x60   __kasan_slab_free+0x37/0x50   kmem_cache_free+0x2b8/0x500   cifs_buf_release+0x3c/0x70 [cifs]   cifs_readdir+0x1c97/0x3190 [cifs]   iterate_dir+0x1a1/0x520   __x64_sys_getdents64+0x134/0x220   do_syscall_64+0x4b/0x110   entry_SYSCALL_64_after_hwframe+0x76/0x7e   The buggy address belongs to the object at ffff8880099b8000   which belongs to the cache cifs_request of size 16588  The buggy address is located 412 bytes inside of   freed 16588-byte region [ffff8880099b8000, ffff8880099bc0cc)   The buggy address belongs to the physical page:  page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x99b8  head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0  anon flags: 0x80000000000040(head|node=0|zone=1)  page_type: f5(slab)  raw: 0080000000000040 ffff888001e03400 0000000000000000 dead000000000001  raw: 0000000000000000 0000000000010001 00000000f5000000 0000000000000000  head: 0080000000000040 ffff888001e03400 0000000000000000 dead000000000001  head: 0000000000000000 0000000000010001 00000000f5000000 0000000000000000  head: 0080000000000003 ffffea0000266e01 00000000ffffffff 00000000ffffffff  head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008  page dumped because: kasan: bad access detected   Memory state around the buggy address:   ffff8880099b8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb   ffff8880099b8100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb  >ffff8880099b8180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb                              ^   ffff8880099b8200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb   ffff8880099b8280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb  ==================================================================  POC is available in the link [1].  The problem triggering process is as follows:  Process 1                       Process 2 ----------------------------------- ---truncated---",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38030",
                                "url": "https://ubuntu.com/security/CVE-2025-38030",
                                "cve_description": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
                                "cve_priority": "negligible",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38077",
                                "url": "https://ubuntu.com/security/CVE-2025-38077",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  platform/x86: dell-wmi-sysman: Avoid buffer overflow in current_password_store()  If the 'buf' array received from the user contains an empty string, the 'length' variable will be zero. Accessing the 'buf' array element with index 'length - 1' will result in a buffer overflow.  Add a check for an empty string.  Found by Linux Verification Center (linuxtesting.org) with SVACE.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38078",
                                "url": "https://ubuntu.com/security/CVE-2025-38078",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  ALSA: pcm: Fix race of buffer access at PCM OSS layer  The PCM OSS layer tries to clear the buffer with the silence data at initialization (or reconfiguration) of a stream with the explicit call of snd_pcm_format_set_silence() with runtime->dma_area.  But this may lead to a UAF because the accessed runtime->dma_area might be freed concurrently, as it's performed outside the PCM ops.  For avoiding it, move the code into the PCM core and perform it inside the buffer access lock, so that it won't be changed during the operation.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38003",
                                "url": "https://ubuntu.com/security/CVE-2025-38003",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  can: bcm: add missing rcu read protection for procfs content  When the procfs content is generated for a bcm_op which is in the process to be removed the procfs output might show unreliable data (UAF).  As the removal of bcm_op's is already implemented with rcu handling this patch adds the missing rcu_read_lock() and makes sure the list entries are properly removed under rcu protection.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-08 11:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38004",
                                "url": "https://ubuntu.com/security/CVE-2025-38004",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  can: bcm: add locking for bcm_op runtime updates  The CAN broadcast manager (CAN BCM) can send a sequence of CAN frames via hrtimer. The content and also the length of the sequence can be changed resp reduced at runtime where the 'currframe' counter is then set to zero.  Although this appeared to be a safe operation the updates of 'currframe' can be triggered from user space and hrtimer context in bcm_can_tx(). Anderson Nascimento created a proof of concept that triggered a KASAN slab-out-of-bounds read access which can be prevented with a spin_lock_bh.  At the rework of bcm_can_tx() the 'count' variable has been moved into the protected section as this variable can be modified from both contexts too.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-08 11:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38031",
                                "url": "https://ubuntu.com/security/CVE-2025-38031",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  padata: do not leak refcount in reorder_work  A recent patch that addressed a UAF introduced a reference count leak: the parallel_data refcount is incremented unconditionally, regardless of the return value of queue_work(). If the work item is already queued, the incremented refcount is never decremented.  Fix this by checking the return value of queue_work() and decrementing the refcount when necessary.  Resolves:  Unreferenced object 0xffff9d9f421e3d80 (size 192):   comm \"cryptomgr_probe\", pid 157, jiffies 4294694003   hex dump (first 32 bytes):     80 8b cf 41 9f 9d ff ff b8 97 e0 89 ff ff ff ff  ...A............     d0 97 e0 89 ff ff ff ff 19 00 00 00 1f 88 23 00  ..............#.   backtrace (crc 838fb36):     __kmalloc_cache_noprof+0x284/0x320     padata_alloc_pd+0x20/0x1e0     padata_alloc_shell+0x3b/0xa0     0xffffffffc040a54d     cryptomgr_probe+0x43/0xc0     kthread+0xf6/0x1f0     ret_from_fork+0x2f/0x50     ret_from_fork_asm+0x1a/0x30",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38079",
                                "url": "https://ubuntu.com/security/CVE-2025-38079",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  crypto: algif_hash - fix double free in hash_accept  If accept(2) is called on socket type algif_hash with MSG_MORE flag set and crypto_ahash_import fails, sk2 is freed. However, it is also freed in af_alg_release, leading to slab-use-after-free error.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38052",
                                "url": "https://ubuntu.com/security/CVE-2025-38052",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done  Syzbot reported a slab-use-after-free with the following call trace:    ==================================================================   BUG: KASAN: slab-use-after-free in tipc_aead_encrypt_done+0x4bd/0x510 net/tipc/crypto.c:840   Read of size 8 at addr ffff88807a733000 by task kworker/1:0/25    Call Trace:    kasan_report+0xd9/0x110 mm/kasan/report.c:601    tipc_aead_encrypt_done+0x4bd/0x510 net/tipc/crypto.c:840    crypto_request_complete include/crypto/algapi.h:266    aead_request_complete include/crypto/internal/aead.h:85    cryptd_aead_crypt+0x3b8/0x750 crypto/cryptd.c:772    crypto_request_complete include/crypto/algapi.h:266    cryptd_queue_worker+0x131/0x200 crypto/cryptd.c:181    process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231    Allocated by task 8355:    kzalloc_noprof include/linux/slab.h:778    tipc_crypto_start+0xcc/0x9e0 net/tipc/crypto.c:1466    tipc_init_net+0x2dd/0x430 net/tipc/core.c:72    ops_init+0xb9/0x650 net/core/net_namespace.c:139    setup_net+0x435/0xb40 net/core/net_namespace.c:343    copy_net_ns+0x2f0/0x670 net/core/net_namespace.c:508    create_new_namespaces+0x3ea/0xb10 kernel/nsproxy.c:110    unshare_nsproxy_namespaces+0xc0/0x1f0 kernel/nsproxy.c:228    ksys_unshare+0x419/0x970 kernel/fork.c:3323    __do_sys_unshare kernel/fork.c:3394    Freed by task 63:    kfree+0x12a/0x3b0 mm/slub.c:4557    tipc_crypto_stop+0x23c/0x500 net/tipc/crypto.c:1539    tipc_exit_net+0x8c/0x110 net/tipc/core.c:119    ops_exit_list+0xb0/0x180 net/core/net_namespace.c:173    cleanup_net+0x5b7/0xbf0 net/core/net_namespace.c:640    process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231  After freed the tipc_crypto tx by delete namespace, tipc_aead_encrypt_done may still visit it in cryptd_queue_worker workqueue.  I reproduce this issue by:   ip netns add ns1   ip link add veth1 type veth peer name veth2   ip link set veth1 netns ns1   ip netns exec ns1 tipc bearer enable media eth dev veth1   ip netns exec ns1 tipc node set key this_is_a_master_key master   ip netns exec ns1 tipc bearer disable media eth dev veth1   ip netns del ns1  The key of reproduction is that, simd_aead_encrypt is interrupted, leading to crypto_simd_usable() return false. Thus, the cryptd_queue_worker is triggered, and the tipc_crypto tx will be visited.    tipc_disc_timeout     tipc_bearer_xmit_skb       tipc_crypto_xmit         tipc_aead_encrypt           crypto_aead_encrypt             // encrypt()             simd_aead_encrypt               // crypto_simd_usable() is false               child = &ctx->cryptd_tfm->base;    simd_aead_encrypt     crypto_aead_encrypt       // encrypt()       cryptd_aead_encrypt_enqueue         cryptd_aead_enqueue           cryptd_enqueue_request             // trigger cryptd_queue_worker             queue_work_on(smp_processor_id(), cryptd_wq, &cpu_queue->work)  Fix this by holding net reference count before encrypt.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38058",
                                "url": "https://ubuntu.com/security/CVE-2025-38058",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  __legitimize_mnt(): check for MNT_SYNC_UMOUNT should be under mount_lock  ... or we risk stealing final mntput from sync umount - raising mnt_count after umount(2) has verified that victim is not busy, but before it has set MNT_SYNC_UMOUNT; in that case __legitimize_mnt() doesn't see that it's safe to quietly undo mnt_count increment and leaves dropping the reference to caller, where it'll be a full-blown mntput().  Check under mount_lock is needed; leaving the current one done before taking that makes no sense - it's nowhere near common enough to bother with.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38034",
                                "url": "https://ubuntu.com/security/CVE-2025-38034",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  btrfs: correct the order of prelim_ref arguments in btrfs__prelim_ref  btrfs_prelim_ref() calls the old and new reference variables in the incorrect order. This causes a NULL pointer dereference because oldref is passed as NULL to trace_btrfs_prelim_ref_insert().  Note, trace_btrfs_prelim_ref_insert() is being called with newref as oldref (and oldref as NULL) on purpose in order to print out the values of newref.  To reproduce: echo 1 > /sys/kernel/debug/tracing/events/btrfs/btrfs_prelim_ref_insert/enable  Perform some writeback operations.  Backtrace: BUG: kernel NULL pointer dereference, address: 0000000000000018  #PF: supervisor read access in kernel mode  #PF: error_code(0x0000) - not-present page  PGD 115949067 P4D 115949067 PUD 11594a067 PMD 0  Oops: Oops: 0000 [#1] SMP NOPTI  CPU: 1 UID: 0 PID: 1188 Comm: fsstress Not tainted 6.15.0-rc2-tester+ #47 PREEMPT(voluntary)  7ca2cef72d5e9c600f0c7718adb6462de8149622  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.3-2-gc13ff2cd-prebuilt.qemu.org 04/01/2014  RIP: 0010:trace_event_raw_event_btrfs__prelim_ref+0x72/0x130  Code: e8 43 81 9f ff 48 85 c0 74 78 4d 85 e4 0f 84 8f 00 00 00 49 8b 94 24 c0 06 00 00 48 8b 0a 48 89 48 08 48 8b 52 08 48 89 50 10 <49> 8b 55 18 48 89 50 18 49 8b 55 20 48 89 50 20 41 0f b6 55 28 88  RSP: 0018:ffffce44820077a0 EFLAGS: 00010286  RAX: ffff8c6b403f9014 RBX: ffff8c6b55825730 RCX: 304994edf9cf506b  RDX: d8b11eb7f0fdb699 RSI: ffff8c6b403f9010 RDI: ffff8c6b403f9010  RBP: 0000000000000001 R08: 0000000000000001 R09: 0000000000000010  R10: 00000000ffffffff R11: 0000000000000000 R12: ffff8c6b4e8fb000  R13: 0000000000000000 R14: ffffce44820077a8 R15: ffff8c6b4abd1540  FS:  00007f4dc6813740(0000) GS:ffff8c6c1d378000(0000) knlGS:0000000000000000  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033  CR2: 0000000000000018 CR3: 000000010eb42000 CR4: 0000000000750ef0  PKRU: 55555554  Call Trace:   <TASK>   prelim_ref_insert+0x1c1/0x270   find_parent_nodes+0x12a6/0x1ee0   ? __entry_text_end+0x101f06/0x101f09   ? srso_alias_return_thunk+0x5/0xfbef5   ? srso_alias_return_thunk+0x5/0xfbef5   ? srso_alias_return_thunk+0x5/0xfbef5   ? srso_alias_return_thunk+0x5/0xfbef5   btrfs_is_data_extent_shared+0x167/0x640   ? fiemap_process_hole+0xd0/0x2c0   extent_fiemap+0xa5c/0xbc0   ? __entry_text_end+0x101f05/0x101f09   btrfs_fiemap+0x7e/0xd0   do_vfs_ioctl+0x425/0x9d0   __x64_sys_ioctl+0x75/0xc0",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38035",
                                "url": "https://ubuntu.com/security/CVE-2025-38035",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  nvmet-tcp: don't restore null sk_state_change  queue->state_change is set as part of nvmet_tcp_set_queue_sock(), but if the TCP connection isn't established when nvmet_tcp_set_queue_sock() is called then queue->state_change isn't set and sock->sk->sk_state_change isn't replaced.  As such we don't need to restore sock->sk->sk_state_change if queue->state_change is NULL.  This avoids NULL pointer dereferences such as this:  [  286.462026][    C0] BUG: kernel NULL pointer dereference, address: 0000000000000000 [  286.462814][    C0] #PF: supervisor instruction fetch in kernel mode [  286.463796][    C0] #PF: error_code(0x0010) - not-present page [  286.464392][    C0] PGD 8000000140620067 P4D 8000000140620067 PUD 114201067 PMD 0 [  286.465086][    C0] Oops: Oops: 0010 [#1] SMP KASAN PTI [  286.465559][    C0] CPU: 0 UID: 0 PID: 1628 Comm: nvme Not tainted 6.15.0-rc2+ #11 PREEMPT(voluntary) [  286.466393][    C0] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-3.fc41 04/01/2014 [  286.467147][    C0] RIP: 0010:0x0 [  286.467420][    C0] Code: Unable to access opcode bytes at 0xffffffffffffffd6. [  286.467977][    C0] RSP: 0018:ffff8883ae008580 EFLAGS: 00010246 [  286.468425][    C0] RAX: 0000000000000000 RBX: ffff88813fd34100 RCX: ffffffffa386cc43 [  286.469019][    C0] RDX: 1ffff11027fa68b6 RSI: 0000000000000008 RDI: ffff88813fd34100 [  286.469545][    C0] RBP: ffff88813fd34160 R08: 0000000000000000 R09: ffffed1027fa682c [  286.470072][    C0] R10: ffff88813fd34167 R11: 0000000000000000 R12: ffff88813fd344c3 [  286.470585][    C0] R13: ffff88813fd34112 R14: ffff88813fd34aec R15: ffff888132cdd268 [  286.471070][    C0] FS:  00007fe3c04c7d80(0000) GS:ffff88840743f000(0000) knlGS:0000000000000000 [  286.471644][    C0] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [  286.472543][    C0] CR2: ffffffffffffffd6 CR3: 000000012daca000 CR4: 00000000000006f0 [  286.473500][    C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [  286.474467][    C0] DR3: 0000000000000000 DR6: 00000000ffff07f0 DR7: 0000000000000400 [  286.475453][    C0] Call Trace: [  286.476102][    C0]  <IRQ> [  286.476719][    C0]  tcp_fin+0x2bb/0x440 [  286.477429][    C0]  tcp_data_queue+0x190f/0x4e60 [  286.478174][    C0]  ? __build_skb_around+0x234/0x330 [  286.478940][    C0]  ? rcu_is_watching+0x11/0xb0 [  286.479659][    C0]  ? __pfx_tcp_data_queue+0x10/0x10 [  286.480431][    C0]  ? tcp_try_undo_loss+0x640/0x6c0 [  286.481196][    C0]  ? seqcount_lockdep_reader_access.constprop.0+0x82/0x90 [  286.482046][    C0]  ? kvm_clock_get_cycles+0x14/0x30 [  286.482769][    C0]  ? ktime_get+0x66/0x150 [  286.483433][    C0]  ? rcu_is_watching+0x11/0xb0 [  286.484146][    C0]  tcp_rcv_established+0x6e4/0x2050 [  286.484857][    C0]  ? rcu_is_watching+0x11/0xb0 [  286.485523][    C0]  ? ipv4_dst_check+0x160/0x2b0 [  286.486203][    C0]  ? __pfx_tcp_rcv_established+0x10/0x10 [  286.486917][    C0]  ? lock_release+0x217/0x2c0 [  286.487595][    C0]  tcp_v4_do_rcv+0x4d6/0x9b0 [  286.488279][    C0]  tcp_v4_rcv+0x2af8/0x3e30 [  286.488904][    C0]  ? raw_local_deliver+0x51b/0xad0 [  286.489551][    C0]  ? rcu_is_watching+0x11/0xb0 [  286.490198][    C0]  ? __pfx_tcp_v4_rcv+0x10/0x10 [  286.490813][    C0]  ? __pfx_raw_local_deliver+0x10/0x10 [  286.491487][    C0]  ? __pfx_nf_confirm+0x10/0x10 [nf_conntrack] [  286.492275][    C0]  ? rcu_is_watching+0x11/0xb0 [  286.492900][    C0]  ip_protocol_deliver_rcu+0x8f/0x370 [  286.493579][    C0]  ip_local_deliver_finish+0x297/0x420 [  286.494268][    C0]  ip_local_deliver+0x168/0x430 [  286.494867][    C0]  ? __pfx_ip_local_deliver+0x10/0x10 [  286.495498][    C0]  ? __pfx_ip_local_deliver_finish+0x10/0x10 [  286.496204][    C0]  ? ip_rcv_finish_core+0x19a/0x1f20 [  286.496806][    C0]  ? lock_release+0x217/0x2c0 [  286.497414][    C0]  ip_rcv+0x455/0x6e0 [  286.497945][    C0]  ? __pfx_ip_rcv+0x10/0x10 [ ---truncated---",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38037",
                                "url": "https://ubuntu.com/security/CVE-2025-38037",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  vxlan: Annotate FDB data races  The 'used' and 'updated' fields in the FDB entry structure can be accessed concurrently by multiple threads, leading to reports such as [1]. Can be reproduced using [2].  Suppress these reports by annotating these accesses using READ_ONCE() / WRITE_ONCE().  [1] BUG: KCSAN: data-race in vxlan_xmit / vxlan_xmit  write to 0xffff942604d263a8 of 8 bytes by task 286 on cpu 0:  vxlan_xmit+0xb29/0x2380  dev_hard_start_xmit+0x84/0x2f0  __dev_queue_xmit+0x45a/0x1650  packet_xmit+0x100/0x150  packet_sendmsg+0x2114/0x2ac0  __sys_sendto+0x318/0x330  __x64_sys_sendto+0x76/0x90  x64_sys_call+0x14e8/0x1c00  do_syscall_64+0x9e/0x1a0  entry_SYSCALL_64_after_hwframe+0x77/0x7f  read to 0xffff942604d263a8 of 8 bytes by task 287 on cpu 2:  vxlan_xmit+0xadf/0x2380  dev_hard_start_xmit+0x84/0x2f0  __dev_queue_xmit+0x45a/0x1650  packet_xmit+0x100/0x150  packet_sendmsg+0x2114/0x2ac0  __sys_sendto+0x318/0x330  __x64_sys_sendto+0x76/0x90  x64_sys_call+0x14e8/0x1c00  do_syscall_64+0x9e/0x1a0  entry_SYSCALL_64_after_hwframe+0x77/0x7f  value changed: 0x00000000fffbac6e -> 0x00000000fffbac6f  Reported by Kernel Concurrency Sanitizer on: CPU: 2 UID: 0 PID: 287 Comm: mausezahn Not tainted 6.13.0-rc7-01544-gb4b270f11a02 #5 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-3.fc41 04/01/2014  [2]  #!/bin/bash   set +H  echo whitelist > /sys/kernel/debug/kcsan  echo !vxlan_xmit > /sys/kernel/debug/kcsan   ip link add name vx0 up type vxlan id 10010 dstport 4789 local 192.0.2.1  bridge fdb add 00:11:22:33:44:55 dev vx0 self static dst 198.51.100.1  taskset -c 0 mausezahn vx0 -a own -b 00:11:22:33:44:55 -c 0 -q &  taskset -c 2 mausezahn vx0 -a own -b 00:11:22:33:44:55 -c 0 -q &",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38061",
                                "url": "https://ubuntu.com/security/CVE-2025-38061",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  net: pktgen: fix access outside of user given buffer in pktgen_thread_write()  Honour the user given buffer size for the strn_len() calls (otherwise strn_len() will access memory outside of the user given buffer).",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38043",
                                "url": "https://ubuntu.com/security/CVE-2025-38043",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  firmware: arm_ffa: Set dma_mask for ffa devices  Set dma_mask for FFA devices, otherwise DMA allocation using the device pointer lead to following warning:  WARNING: CPU: 1 PID: 1 at kernel/dma/mapping.c:597 dma_alloc_attrs+0xe0/0x124",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38044",
                                "url": "https://ubuntu.com/security/CVE-2025-38044",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  media: cx231xx: set device_caps for 417  The video_device for the MPEG encoder did not set device_caps.  Add this, otherwise the video device can't be registered (you get a WARN_ON instead).  Not seen before since currently 417 support is disabled, but I found this while experimenting with it.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38065",
                                "url": "https://ubuntu.com/security/CVE-2025-38065",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  orangefs: Do not truncate file size  'len' is used to store the result of i_size_read(), so making 'len' a size_t results in truncation to 4GiB on 32-bit systems.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38066",
                                "url": "https://ubuntu.com/security/CVE-2025-38066",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  dm cache: prevent BUG_ON by blocking retries on failed device resumes  A cache device failing to resume due to mapping errors should not be retried, as the failure leaves a partially initialized policy object. Repeating the resume operation risks triggering BUG_ON when reloading cache mappings into the incomplete policy object.  Reproduce steps:  1. create a cache metadata consisting of 512 or more cache blocks,    with some mappings stored in the first array block of the mapping    array. Here we use cache_restore v1.0 to build the metadata.  cat <<EOF >> cmeta.xml <superblock uuid=\"\" block_size=\"128\" nr_cache_blocks=\"512\" \\ policy=\"smq\" hint_width=\"4\">   <mappings>     <mapping cache_block=\"0\" origin_block=\"0\" dirty=\"false\"/>   </mappings> </superblock> EOF dmsetup create cmeta --table \"0 8192 linear /dev/sdc 0\" cache_restore -i cmeta.xml -o /dev/mapper/cmeta --metadata-version=2 dmsetup remove cmeta  2. wipe the second array block of the mapping array to simulate    data degradations.  mapping_root=$(dd if=/dev/sdc bs=1c count=8 skip=192 \\ 2>/dev/null | hexdump -e '1/8 \"%u\\n\"') ablock=$(dd if=/dev/sdc bs=1c count=8 skip=$((4096*mapping_root+2056)) \\ 2>/dev/null | hexdump -e '1/8 \"%u\\n\"') dd if=/dev/zero of=/dev/sdc bs=4k count=1 seek=$ablock  3. try bringing up the cache device. The resume is expected to fail    due to the broken array block.  dmsetup create cmeta --table \"0 8192 linear /dev/sdc 0\" dmsetup create cdata --table \"0 65536 linear /dev/sdc 8192\" dmsetup create corig --table \"0 524288 linear /dev/sdc 262144\" dmsetup create cache --notable dmsetup load cache --table \"0 524288 cache /dev/mapper/cmeta \\ /dev/mapper/cdata /dev/mapper/corig 128 2 metadata2 writethrough smq 0\" dmsetup resume cache  4. try resuming the cache again. An unexpected BUG_ON is triggered    while loading cache mappings.  dmsetup resume cache  Kernel logs:  (snip) ------------[ cut here ]------------ kernel BUG at drivers/md/dm-cache-policy-smq.c:752! Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN NOPTI CPU: 0 UID: 0 PID: 332 Comm: dmsetup Not tainted 6.13.4 #3 RIP: 0010:smq_load_mapping+0x3e5/0x570  Fix by disallowing resume operations for devices that failed the initial attempt.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38068",
                                "url": "https://ubuntu.com/security/CVE-2025-38068",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  crypto: lzo - Fix compression buffer overrun  Unlike the decompression code, the compression code in LZO never checked for output overruns.  It instead assumes that the caller always provides enough buffer space, disregarding the buffer length provided by the caller.  Add a safe compression interface that checks for the end of buffer before each write.  Use the safe interface in crypto/lzo.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38072",
                                "url": "https://ubuntu.com/security/CVE-2025-38072",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  libnvdimm/labels: Fix divide error in nd_label_data_init()  If a faulty CXL memory device returns a broken zero LSA size in its memory device information (Identify Memory Device (Opcode 4000h), CXL spec. 3.1, 8.2.9.9.1.1), a divide error occurs in the libnvdimm driver:   Oops: divide error: 0000 [#1] PREEMPT SMP NOPTI  RIP: 0010:nd_label_data_init+0x10e/0x800 [libnvdimm]  Code and flow:  1) CXL Command 4000h returns LSA size = 0 2) config_size is assigned to zero LSA size (CXL pmem driver):  drivers/cxl/pmem.c:             .config_size = mds->lsa_size,  3) max_xfer is set to zero (nvdimm driver):  drivers/nvdimm/label.c: max_xfer = min_t(size_t, ndd->nsarea.max_xfer, config_size);  4) A subsequent DIV_ROUND_UP() causes a division by zero:  drivers/nvdimm/label.c: /* Make our initial read size a multiple of max_xfer size */ drivers/nvdimm/label.c: read_size = min(DIV_ROUND_UP(read_size, max_xfer) * max_xfer, drivers/nvdimm/label.c-                 config_size);  Fix this by checking the config size parameter by extending an existing check.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38048",
                                "url": "https://ubuntu.com/security/CVE-2025-38048",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  virtio_ring: Fix data race by tagging event_triggered as racy for KCSAN  syzbot reports a data-race when accessing the event_triggered, here is the simplified stack when the issue occurred:  ================================================================== BUG: KCSAN: data-race in virtqueue_disable_cb / virtqueue_enable_cb_delayed  write to 0xffff8881025bc452 of 1 bytes by task 3288 on cpu 0:  virtqueue_enable_cb_delayed+0x42/0x3c0 drivers/virtio/virtio_ring.c:2653  start_xmit+0x230/0x1310 drivers/net/virtio_net.c:3264  __netdev_start_xmit include/linux/netdevice.h:5151 [inline]  netdev_start_xmit include/linux/netdevice.h:5160 [inline]  xmit_one net/core/dev.c:3800 [inline]  read to 0xffff8881025bc452 of 1 bytes by interrupt on cpu 1:  virtqueue_disable_cb_split drivers/virtio/virtio_ring.c:880 [inline]  virtqueue_disable_cb+0x92/0x180 drivers/virtio/virtio_ring.c:2566  skb_xmit_done+0x5f/0x140 drivers/net/virtio_net.c:777  vring_interrupt+0x161/0x190 drivers/virtio/virtio_ring.c:2715  __handle_irq_event_percpu+0x95/0x490 kernel/irq/handle.c:158  handle_irq_event_percpu kernel/irq/handle.c:193 [inline]  value changed: 0x01 -> 0x00 ==================================================================  When the data race occurs, the function virtqueue_enable_cb_delayed() sets event_triggered to false, and virtqueue_disable_cb_split/packed() reads it as false due to the race condition. Since event_triggered is an unreliable hint used for optimization, this should only cause the driver temporarily suggest that the device not send an interrupt notification when the event index is used.  Fix this KCSAN reported data-race issue by explicitly tagging the access as data_racy.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38075",
                                "url": "https://ubuntu.com/security/CVE-2025-38075",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  scsi: target: iscsi: Fix timeout on deleted connection  NOPIN response timer may expire on a deleted connection and crash with such logs:  Did not receive response to NOPIN on CID: 0, failing connection for I_T Nexus (null),i,0x00023d000125,iqn.2017-01.com.iscsi.target,t,0x3d  BUG: Kernel NULL pointer dereference on read at 0x00000000 NIP  strlcpy+0x8/0xb0 LR iscsit_fill_cxn_timeout_err_stats+0x5c/0xc0 [iscsi_target_mod] Call Trace:  iscsit_handle_nopin_response_timeout+0xfc/0x120 [iscsi_target_mod]  call_timer_fn+0x58/0x1f0  run_timer_softirq+0x740/0x860  __do_softirq+0x16c/0x420  irq_exit+0x188/0x1c0  timer_interrupt+0x184/0x410  That is because nopin response timer may be re-started on nopin timer expiration.  Stop nopin timer before stopping the nopin response timer to be sure that no one of them will be re-started.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-18 10:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2025-38083",
                                "url": "https://ubuntu.com/security/CVE-2025-38083",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  net_sched: prio: fix a race in prio_tune()  Gerrard Tai reported a race condition in PRIO, whenever SFQ perturb timer fires at the wrong time.  The race is as follows:  CPU 0                                 CPU 1 [1]: lock root [2]: qdisc_tree_flush_backlog() [3]: unlock root  |  |                                    [5]: lock root  |                                    [6]: rehash  |                                    [7]: qdisc_tree_reduce_backlog()  | [4]: qdisc_put()  This can be abused to underflow a parent's qlen.  Calling qdisc_purge_queue() instead of qdisc_tree_flush_backlog() should fix the race, because all packets will be purged from the qdisc before releasing the lock.",
                                "cve_priority": "medium",
                                "cve_public_date": "2025-06-20 12:15:00 UTC"
                            },
                            {
                                "cve": "CVE-2024-50073",
                                "url": "https://ubuntu.com/security/CVE-2024-50073",
                                "cve_description": "In the Linux kernel, the following vulnerability has been resolved:  tty: n_gsm: Fix use-after-free in gsm_cleanup_mux  BUG: KASAN: slab-use-after-free in gsm_cleanup_mux+0x77b/0x7b0 drivers/tty/n_gsm.c:3160 [n_gsm] Read of size 8 at addr ffff88815fe99c00 by task poc/3379 CPU: 0 UID: 0 PID: 3379 Comm: poc Not tainted 6.11.0+ #56 Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020 Call Trace:  <TASK>  gsm_cleanup_mux+0x77b/0x7b0 drivers/tty/n_gsm.c:3160 [n_gsm]  __pfx_gsm_cleanup_mux+0x10/0x10 drivers/tty/n_gsm.c:3124 [n_gsm]  __pfx_sched_clock_cpu+0x10/0x10 kernel/sched/clock.c:389  update_load_avg+0x1c1/0x27b0 kernel/sched/fair.c:4500  __pfx_min_vruntime_cb_rotate+0x10/0x10 kernel/sched/fair.c:846  __rb_insert_augmented+0x492/0xbf0 lib/rbtree.c:161  gsmld_ioctl+0x395/0x1450 drivers/tty/n_gsm.c:3408 [n_gsm]  _raw_spin_lock_irqsave+0x92/0xf0 arch/x86/include/asm/atomic.h:107  __pfx_gsmld_ioctl+0x10/0x10 drivers/tty/n_gsm.c:3822 [n_gsm]  ktime_get+0x5e/0x140 kernel/time/timekeeping.c:195  ldsem_down_read+0x94/0x4e0 arch/x86/include/asm/atomic64_64.h:79  __pfx_ldsem_down_read+0x10/0x10 drivers/tty/tty_ldsem.c:338  __pfx_do_vfs_ioctl+0x10/0x10 fs/ioctl.c:805  tty_ioctl+0x643/0x1100 drivers/tty/tty_io.c:2818  Allocated by task 65:  gsm_data_alloc.constprop.0+0x27/0x190 drivers/tty/n_gsm.c:926 [n_gsm]  gsm_send+0x2c/0x580 drivers/tty/n_gsm.c:819 [n_gsm]  gsm1_receive+0x547/0xad0 drivers/tty/n_gsm.c:3038 [n_gsm]  gsmld_receive_buf+0x176/0x280 drivers/tty/n_gsm.c:3609 [n_gsm]  tty_ldisc_receive_buf+0x101/0x1e0 drivers/tty/tty_buffer.c:391  tty_port_default_receive_buf+0x61/0xa0 drivers/tty/tty_port.c:39  flush_to_ldisc+0x1b0/0x750 drivers/tty/tty_buffer.c:445  process_scheduled_works+0x2b0/0x10d0 kernel/workqueue.c:3229  worker_thread+0x3dc/0x950 kernel/workqueue.c:3391  kthread+0x2a3/0x370 kernel/kthread.c:389  ret_from_fork+0x2d/0x70 arch/x86/kernel/process.c:147  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:257  Freed by task 3367:  kfree+0x126/0x420 mm/slub.c:4580  gsm_cleanup_mux+0x36c/0x7b0 drivers/tty/n_gsm.c:3160 [n_gsm]  gsmld_ioctl+0x395/0x1450 drivers/tty/n_gsm.c:3408 [n_gsm]  tty_ioctl+0x643/0x1100 drivers/tty/tty_io.c:2818  [Analysis] gsm_msg on the tx_ctrl_list or tx_data_list of gsm_mux can be freed by multi threads through ioctl,which leads to the occurrence of uaf. Protect it by gsm tx lock.",
                                "cve_priority": "medium",
                                "cve_public_date": "2024-10-29 01:15:00 UTC"
                            }
                        ],
                        "log": [
                            "",
                            "  * jammy/linux-kvm: 5.15.0-1086.91 -proposed tracker (LP: #2117604)",
                            "",
                            "  [ Ubuntu: 5.15.0-152.162 ]",
                            "",
                            "  * jammy/linux: 5.15.0-152.162 -proposed tracker (LP: #2117618)",
                            "  * [UBUNTU 22.04] kernel: Fix z17 elf platform recognition (LP: #2114450)",
                            "    - s390: add z16 elf platform",
                            "    - s390: Add z17 elf platform",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240)",
                            "    - dma-mapping: avoid potential unused data compilation warning",
                            "    - cgroup: Fix compilation issue due to cgroup_mutex not being exported",
                            "    - net: enetc: refactor bulk flipping of RX buffers to separate function",
                            "    - bpf: fix possible endless loop in BPF map iteration",
                            "    - samples/bpf: Fix compilation failure for samples/bpf on LoongArch Fedora",
                            "    - kconfig: merge_config: use an empty file as initfile",
                            "    - NFSv4: Check for delegation validity in",
                            "      nfs_start_delegation_return_locked()",
                            "    - tracing: Mark binary printing functions with __printf() attribute",
                            "    - mailbox: use error ret code of of_parse_phandle_with_args()",
                            "    - fbdev: fsl-diu-fb: add missing device_remove_file()",
                            "    - fbcon: Use correct erase colour for clearing in fbcon",
                            "    - fbdev: core: tileblit: Implement missing margin clearing for tileblit",
                            "    - NFSv4: Treat ENETUNREACH errors as fatal for state recovery",
                            "    - SUNRPC: rpc_clnt_set_transport() must not change the autobind setting",
                            "    - SUNRPC: rpcbind should never reset the port to the value '0'",
                            "    - thermal/drivers/qoriq: Power down TMU on system suspend",
                            "    - dql: Fix dql->limit value when reset.",
                            "    - lockdep: Fix wait context check on softirq for PREEMPT_RT",
                            "    - PCI: dwc: ep: Ensure proper iteration over outbound map windows",
                            "    - tools/build: Don't pass test log files to linker",
                            "    - pNFS/flexfiles: Report ENETDOWN as a connection error",
                            "    - PCI: vmd: Disable MSI remapping bypass under Xen",
                            "    - mmc: host: Wait for Vdd to settle on card power off",
                            "    - wifi: mt76: only mark tx-status-failed frames as ACKed on mt76x0/2",
                            "    - i2c: qup: Vote for interconnect bandwidth to DRAM",
                            "    - i2c: pxa: fix call balance of i2c->clk handling routines",
                            "    - btrfs: make btrfs_discard_workfn() block_group ref explicit",
                            "    - btrfs: avoid linker error in btrfs_find_create_tree_block()",
                            "    - btrfs: get zone unusable bytes while holding lock at",
                            "      btrfs_reclaim_bgs_work()",
                            "    - btrfs: send: return -ENAMETOOLONG when attempting a path that is too",
                            "      long",
                            "    - i3c: master: svc: Fix missing STOP for master request",
                            "    - dlm: make tcp still work in multi-link env",
                            "    - um: Store full CSGSFS and SS register from mcontext",
                            "    - um: Update min_low_pfn to match changes in uml_reserved",
                            "    - ext4: reorder capability check last",
                            "    - scsi: st: Tighten the page format heuristics with MODE SELECT",
                            "    - scsi: st: ERASE does not change tape location",
                            "    - vfio/pci: Handle INTx IRQ_NOTCONNECTED",
                            "    - tcp: reorganize tcp_in_ack_event() and tcp_count_delivered()",
                            "    - rtc: rv3032: fix EERD location",
                            "    - ASoC: mediatek: mt6359: Add stub for mt6359_accdet_enable_jack_detect",
                            "    - kbuild: fix argument parsing in scripts/config",
                            "    - crypto: octeontx2 - suppress auth failure screaming due to negative",
                            "      tests",
                            "    - dm: restrict dm device size to 2^63-512 bytes",
                            "    - xen: Add support for XenServer 6.1 platform device",
                            "    - RDMA/uverbs: Propagate errors from rdma_lookup_get_uobject()",
                            "    - posix-timers: Add cond_resched() to posix_timer_add() search loop",
                            "    - timer_list: Don't use %pK through printk()",
                            "    - netfilter: conntrack: Bound nf_conntrack sysctl writes",
                            "    - arm64/mm: Check PUD_TYPE_TABLE in pud_bad()",
                            "    - mmc: sdhci: Disable SD card clock before changing parameters",
                            "    - ipv6: save dontfrag in cork",
                            "    - auxdisplay: charlcd: Partially revert \"Move hwidth and bwidth to struct",
                            "      hd44780_common\"",
                            "    - ASoC: qcom: sm8250: explicitly set format in sm8250_be_hw_params_fixup()",
                            "    - cpufreq: tegra186: Share policy per cluster",
                            "    - arm64: tegra: p2597: Fix gpio for vdd-1v8-dis regulator",
                            "    - powerpc/prom_init: Fixup missing #size-cells on PowerBook6,7",
                            "    - tcp: bring back NUMA dispersion in inet_ehash_locks_alloc()",
                            "    - rtc: ds1307: stop disabling alarms on probe",
                            "    - ieee802154: ca8210: Use proper setters and getters for bitwise types",
                            "    - ARM: tegra: Switch DSI-B clock parent to PLLD on Tegra114",
                            "    - media: c8sectpfe: Call of_node_put(i2c_bus) only once in",
                            "      c8sectpfe_probe()",
                            "    - remoteproc: qcom_wcnss: Handle platforms with only single power domain",
                            "    - drm/amdgpu: Do not program AGP BAR regs under SRIOV in gfxhub_v1_0.c",
                            "    - pinctrl: bcm281xx: Use \"unsigned int\" instead of bare \"unsigned\"",
                            "    - net: ethernet: ti: cpsw_new: populate netdev of_node",
                            "    - net: pktgen: fix mpls maximum labels list parsing",
                            "    - ipv4: fib: Move fib_valid_key_len() to rtm_to_fib_config().",
                            "    - media: uvcvideo: Add sanity check to uvc_ioctl_xu_ctrl_map",
                            "    - clk: imx8mp: inform CCF of maximum frequency of clocks",
                            "    - x86/bugs: Make spectre user default depend on MITIGATION_SPECTRE_V2",
                            "    - hwmon: (gpio-fan) Add missing mutex locks",
                            "    - ARM: at91: pm: fix at91_suspend_finish for ZQ calibration",
                            "    - drm/mediatek: mtk_dpi: Add checks for reg_h_fre_con existence",
                            "    - fpga: altera-cvp: Increase credit timeout",
                            "    - PCI: brcmstb: Expand inbound window size up to 64GB",
                            "    - PCI: brcmstb: Add a softdep to MIP MSI-X driver",
                            "    - net/mlx5: Avoid report two health errors on same syndrome",
                            "    - selftests/net: have `gro.sh -t` return a correct exit code",
                            "    - drm/amdkfd: KFD release_work possible circular locking",
                            "    - net: xgene-v2: remove incorrect ACPI_PTR annotation",
                            "    - bonding: report duplicate MAC address in all situations",
                            "    - soc: ti: k3-socinfo: Do not use syscon helper to build regmap",
                            "    - x86/build: Fix broken copy command in genimage.sh when making isoimage",
                            "    - drm/amd/display: handle max_downscale_src_width fail check",
                            "    - x86/nmi: Add an emergency handler in nmi_desc & use it in",
                            "      nmi_shootdown_cpus()",
                            "    - cpuidle: menu: Avoid discarding useful information",
                            "    - libbpf: Fix out-of-bound read",
                            "    - x86/kaslr: Reduce KASLR entropy on most x86 systems",
                            "    - MIPS: Use arch specific syscall name match function",
                            "    - MIPS: pm-cps: Use per-CPU variables as per-CPU, not per-core",
                            "    - clocksource: mips-gic-timer: Enable counter when CPUs start",
                            "    - scsi: mpt3sas: Send a diag reset if target reset fails",
                            "    - wifi: rtw88: Fix rtw_init_vht_cap() for RTL8814AU",
                            "    - wifi: rtw88: Fix rtw_init_ht_cap() for RTL8814AU",
                            "    - wifi: rtw88: Fix rtw_desc_to_mcsrate() to handle MCS16-31",
                            "    - EDAC/ie31200: work around false positive build warning",
                            "    - RDMA/core: Fix best page size finding when it can cross SG entries",
                            "    - can: c_can: Use of_property_present() to test existence of DT property",
                            "    - eth: mlx4: don't try to complete XDP frames in netpoll",
                            "    - PCI: Fix old_size lower bound in calculate_iosize() too",
                            "    - ACPI: HED: Always initialize before evged",
                            "    - net/mlx5: Modify LSB bitmask in temperature event to include only the",
                            "      first bit",
                            "    - net/mlx5: Apply rate-limiting to high temperature warning",
                            "    - ASoC: ops: Enforce platform maximum on initial value",
                            "    - ASoC: tas2764: Power up/down amp on mute ops",
                            "    - ASoC: soc-dai: check return value at snd_soc_dai_set_tdm_slot()",
                            "    - pinctrl: devicetree: do not goto err when probing hogs in",
                            "      pinctrl_dt_to_map",
                            "    - smack: recognize ipv4 CIPSO w/o categories",
                            "    - media: v4l: Memset argument to 0 before calling get_mbus_config pad op",
                            "    - net/mlx4_core: Avoid impossible mlx4_db_alloc() order value",
                            "    - phy: core: don't require set_mode() callback for phy_get_mode() to work",
                            "    - drm/amdgpu: reset psp->cmd to NULL after releasing the buffer",
                            "    - drm/amd/display: Initial psr_version with correct setting",
                            "    - net/mlx5: Extend Ethtool loopback selftest to support non-linear SKB",
                            "    - net/mlx5e: set the tx_queue_len for pfifo_fast",
                            "    - net/mlx5e: reduce rep rxq depth to 256 for ECPF",
                            "    - wifi: mac80211: don't unconditionally call drv_mgd_complete_tx()",
                            "    - wifi: mac80211: remove misplaced drv_mgd_complete_tx() call",
                            "    - arch/powerpc/perf: Check the instruction type before creating sample",
                            "      with perf_mem_data_src",
                            "    - ip: fib_rules: Fetch net from fib_rule in fib[46]_rule_configure().",
                            "    - r8152: add vendor/device ID pair for Dell Alienware AW1022z",
                            "    - wifi: rtw88: Fix download_firmware_validate() for RTL8814AU",
                            "    - clk: qcom: camcc-sm8250: Use clk_rcg2_shared_ops for some RCGs",
                            "    - hwmon: (xgene-hwmon) use appropriate type for the latency value",
                            "    - media: qcom: camss: csid: Only add TPG v4l2 ctrl if TPG hardware is",
                            "      available",
                            "    - r8169: don't scan PHY addresses > 0",
                            "    - rcu: handle quiescent states for PREEMPT_RCU=n, PREEMPT_COUNT=y",
                            "    - rcu: fix header guard for rcu_all_qs()",
                            "    - net/mana: fix warning in the writer of client oob",
                            "    - scsi: lpfc: Handle duplicate D_IDs in ndlp search-by D_ID routine",
                            "    - scsi: st: Restore some drive settings after reset",
                            "    - HID: usbkbd: Fix the bit shift number for LED_KANA",
                            "    - drm/ast: Find VBIOS mode from regular display size",
                            "    - bpftool: Fix readlink usage in get_fd_type",
                            "    - perf/amd/ibs: Fix perf_ibs_op.cnt_mask for CurCnt",
                            "    - wifi: rtw88: Don't use static local variable in",
                            "      rtw8822b_set_tx_power_index_by_rate",
                            "    - spi: zynqmp-gqspi: Always acknowledge interrupts",
                            "    - regulator: ad5398: Add device tree support",
                            "    - wifi: ath9k: return by of_get_mac_address",
                            "    - drm/atomic: clarify the rules around drm_atomic_state->allow_modeset",
                            "    - drm: Add valid clones check",
                            "    - ASoC: imx-card: Adjust over allocation of memory in imx_card_parse_of()",
                            "    - pinctrl: meson: define the pull up/down resistor value as 60 kOhm",
                            "    - ASoC: Intel: bytcr_rt5640: Add DMI quirk for Acer Aspire SW3-013",
                            "    - ALSA: hda/realtek: Add quirk for HP Spectre x360 15-df1xxx",
                            "    - xenbus: Allow PVH dom0 a non-local xenstore",
                            "    - remoteproc: qcom_wcnss: Fix on platforms without fallback regulators",
                            "    - xfrm: Sanitize marks before insert",
                            "    - Bluetooth: L2CAP: Fix not checking l2cap_chan security level",
                            "    - bridge: netfilter: Fix forwarding of fragmented packets",
                            "    - net: dwmac-sun8i: Use parsed internal PHY address instead of 1",
                            "    - octeontx2-af: Set LMT_ENA bit for APR table entries",
                            "    - llc: fix data loss when reading from a socket in llc_ui_recvmsg()",
                            "    - drm/edid: fixed the bug that hdr metadata was not reset",
                            "    - memcg: always call cond_resched() after fn()",
                            "    - mm/page_alloc.c: avoid infinite retries caused by cpuset race",
                            "    - Revert \"arm64: dts: allwinner: h6: Use RSB for AXP805 PMIC connection\"",
                            "    - spi: spi-fsl-dspi: restrict register range for regmap access",
                            "    - spi: spi-fsl-dspi: Halt the module after a new message transfer",
                            "    - spi: spi-fsl-dspi: Reset SR flags before sending a new message",
                            "    - kbuild: Disable -Wdefault-const-init-unsafe",
                            "    - i3c: master: svc: Fix implicit fallthrough in svc_i3c_master_ibi_work()",
                            "    - xen/swiotlb: relax alignment requirements",
                            "    - drm/i915/gvt: fix unterminated-string-initialization warning",
                            "    - x86/its: Fix undefined reference to cpu_wants_rethunk_at()",
                            "    - smb: client: Reset all search buffer pointers when releasing buffer",
                            "    - arm64: dts: qcom: sm8350: Fix typo in pil_camera_mem node",
                            "    - coredump: fix error handling for replace_fd()",
                            "    - pid: add pidfd_prepare()",
                            "    - fork: use pidfd_prepare()",
                            "    - coredump: hand a pidfd to the usermode coredump helper",
                            "    - HID: quirks: Add ADATA XPG alpha wireless mouse support",
                            "    - nfs: don't share pNFS DS connections between net namespaces",
                            "    - platform/x86: thinkpad_acpi: Support also NEC Lavie X1475JAS",
                            "    - um: let 'make clean' properly clean underlying SUBARCH as well",
                            "    - spi: spi-sun4i: fix early activation",
                            "    - nvme-pci: add NVME_QUIRK_NO_DEEPEST_PS quirk for SOLIDIGM P44 Pro",
                            "    - tpm: tis: Double the timeout B to 4s",
                            "    - platform/x86: fujitsu-laptop: Support Lifebook S2110 hotkeys",
                            "    - platform/x86: thinkpad_acpi: Ignore battery threshold change event",
                            "      notification",
                            "    - perf/arm-cmn: Initialise cmn->cpu earlier",
                            "    - Linux 5.15.185",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38051",
                            "    - smb: client: Fix use-after-free in cifs_fill_dirent",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38030",
                            "    - Revert \"drm/amd: Keep display off while going into S4\"",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38077",
                            "    - platform/x86: dell-wmi-sysman: Avoid buffer overflow in",
                            "      current_password_store()",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38078",
                            "    - ALSA: pcm: Fix race of buffer access at PCM OSS layer",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38003",
                            "    - can: bcm: add missing rcu read protection for procfs content",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38004",
                            "    - can: bcm: add locking for bcm_op runtime updates",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38031",
                            "    - padata: do not leak refcount in reorder_work",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38079",
                            "    - crypto: algif_hash - fix double free in hash_accept",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38052",
                            "    - net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38058",
                            "    - __legitimize_mnt(): check for MNT_SYNC_UMOUNT should be under mount_lock",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38034",
                            "    - btrfs: correct the order of prelim_ref arguments in btrfs__prelim_ref",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38035",
                            "    - nvmet-tcp: don't restore null sk_state_change",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38037",
                            "    - vxlan: Annotate FDB data races",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38061",
                            "    - net: pktgen: fix access outside of user given buffer in",
                            "      pktgen_thread_write()",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38043",
                            "    - firmware: arm_ffa: Set dma_mask for ffa devices",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38044",
                            "    - media: cx231xx: set device_caps for 417",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38065",
                            "    - orangefs: Do not truncate file size",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38066",
                            "    - dm cache: prevent BUG_ON by blocking retries on failed device resumes",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38068",
                            "    - crypto: lzo - Fix compression buffer overrun",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38072",
                            "    - libnvdimm/labels: Fix divide error in nd_label_data_init()",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38048",
                            "    - virtio_ring: Fix data race by tagging event_triggered as racy for KCSAN",
                            "  * Jammy update: v5.15.185 upstream stable release (LP: #2115240) //",
                            "    CVE-2025-38075",
                            "    - scsi: target: iscsi: Fix timeout on deleted connection",
                            "  * Packaging resync (LP: #1786013)",
                            "    - [Packaging] update annotations scripts",
                            "  * raid10: block discard causes a NULL pointer dereference after",
                            "    5.15.0-144-generic (LP: #2117395)",
                            "    - md: move initialization and destruction of 'io_acct_set' to md.c",
                            "  * CVE-2025-38083",
                            "    - net_sched: prio: fix a race in prio_tune()",
                            "  * CVE-2024-50073",
                            "    - tty: n_gsm: Fix use-after-free in gsm_cleanup_mux",
                            ""
                        ],
                        "package": "linux-kvm",
                        "version": "5.15.0-1086.91",
                        "urgency": "medium",
                        "distributions": "jammy",
                        "launchpad_bugs_fixed": [
                            2117604,
                            2117618,
                            2114450,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            2115240,
                            1786013,
                            2117395
                        ],
                        "author": "Zixing Liu <zixing.liu@canonical.com>",
                        "date": "Fri, 25 Jul 2025 09:23:36 +0800"
                    }
                ],
                "notes": "linux-modules-5.15.0-1086-kvm version '5.15.0-1086.91' (source package linux-kvm version '5.15.0-1086.91') was added. linux-modules-5.15.0-1086-kvm version '5.15.0-1086.91' has the same source package name, linux-kvm, as removed package linux-headers-5.15.0-1085-kvm. As such we can use the source package version of the removed package, '5.15.0-1085.90', as the starting point in our changelog diff. Kernel packages are an example of where the binary package name changes for the same source package. Using the removed package source package version as our starting point means we can still get meaningful changelog diffs even for what appears to be a new package.",
                "is_version_downgrade": false
            }
        ],
        "snap": []
    },
    "removed": {
        "deb": [
            {
                "name": "linux-headers-5.15.0-1085-kvm",
                "from_version": {
                    "source_package_name": "linux-kvm",
                    "source_package_version": "5.15.0-1085.90",
                    "version": "5.15.0-1085.90"
                },
                "to_version": {
                    "source_package_name": null,
                    "source_package_version": null,
                    "version": null
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "linux-image-5.15.0-1085-kvm",
                "from_version": {
                    "source_package_name": "linux-signed-kvm",
                    "source_package_version": "5.15.0-1085.90",
                    "version": "5.15.0-1085.90"
                },
                "to_version": {
                    "source_package_name": null,
                    "source_package_version": null,
                    "version": null
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "linux-kvm-headers-5.15.0-1085",
                "from_version": {
                    "source_package_name": "linux-kvm",
                    "source_package_version": "5.15.0-1085.90",
                    "version": "5.15.0-1085.90"
                },
                "to_version": {
                    "source_package_name": null,
                    "source_package_version": null,
                    "version": null
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [],
                "notes": null,
                "is_version_downgrade": false
            },
            {
                "name": "linux-modules-5.15.0-1085-kvm",
                "from_version": {
                    "source_package_name": "linux-kvm",
                    "source_package_version": "5.15.0-1085.90",
                    "version": "5.15.0-1085.90"
                },
                "to_version": {
                    "source_package_name": null,
                    "source_package_version": null,
                    "version": null
                },
                "cves": [],
                "launchpad_bugs_fixed": [],
                "changes": [],
                "notes": null,
                "is_version_downgrade": false
            }
        ],
        "snap": []
    },
    "notes": "Changelog diff for Ubuntu 22.04 jammy image from daily image serial 20250822 to 20250827",
    "from_series": "jammy",
    "to_series": "jammy",
    "from_serial": "20250822",
    "to_serial": "20250827",
    "from_manifest_filename": "daily_manifest.previous",
    "to_manifest_filename": "manifest.current"
}