USN-7654-4

Source
https://ubuntu.com/security/notices/USN-7654-4
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7654-4.json
JSON Data
https://api.osv.dev/v1/vulns/USN-7654-4
Upstream
Related
Published
2025-07-22T07:44:23.651780Z
Modified
2025-07-22T20:00:48.529895Z
Summary
linux-kvm vulnerabilities
Details

Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - PA-RISC architecture; - PowerPC architecture; - x86 architecture; - Block layer subsystem; - Cryptographic API; - Serial ATA and Parallel ATA drivers; - Bluetooth drivers; - Bus devices; - CPU frequency scaling framework; - Buffer Sharing and Synchronization framework; - DMA engine subsystem; - ARM SCMI message protocol; - GPU drivers; - HID subsystem; - HSI subsystem; - I2C subsystem; - I3C subsystem; - IIO subsystem; - InfiniBand drivers; - IOMMU subsystem; - IRQ chip drivers; - MCB driver; - Multiple devices driver; - Media drivers; - Multifunction device drivers; - PCI Endpoint Test driver; - MTD block device drivers; - Network drivers; - Device tree and open firmware driver; - PCI subsystem; - TI SCI PM domains driver; - PWM drivers; - S/390 drivers; - SCSI subsystem; - Samsung SoC drivers; - TCM subsystem; - UFS subsystem; - Cadence USB3 driver; - ChipIdea USB driver; - USB Device Class drivers; - DesignWare USB3 driver; - USB Gadget drivers; - USB Type-C support driver; - USB Type-C Connector System Software Interface driver; - Backlight driver; - Framebuffer layer; - Xen hypervisor drivers; - BTRFS file system; - Ext4 file system; - F2FS file system; - File systems infrastructure; - JFS file system; - Network file system (NFS) client; - Network file system (NFS) server daemon; - Proc file system; - SMB network file system; - Kernel stack handling interfaces; - Bluetooth subsystem; - Network traffic control; - SCTP protocol; - BPF subsystem; - Kernel command line parsing driver; - Tracing infrastructure; - Memory management; - 802.1Q VLAN protocol; - Networking core; - IPv6 networking; - MAC80211 subsystem; - Management Component Transport Protocol (MCTP); - Multipath TCP; - Netfilter; - Open vSwitch; - Phonet protocol; - TIPC protocol; - TLS protocol; - Virtio sound driver; - CPU Power monitoring subsystem; (CVE-2025-37767, CVE-2025-23151, CVE-2025-38005, CVE-2024-46816, CVE-2025-37812, CVE-2025-23159, CVE-2024-36908, CVE-2025-37930, CVE-2024-27402, CVE-2024-50125, CVE-2025-37881, CVE-2024-49989, CVE-2025-37964, CVE-2025-37739, CVE-2025-37792, CVE-2025-37742, CVE-2025-37875, CVE-2025-23144, CVE-2025-37836, CVE-2024-35866, CVE-2025-37738, CVE-2024-46774, CVE-2025-37817, CVE-2025-37781, CVE-2025-37757, CVE-2024-46751, CVE-2025-37867, CVE-2025-23158, CVE-2025-37885, CVE-2025-37756, CVE-2025-37788, CVE-2025-37994, CVE-2024-35867, CVE-2025-37905, CVE-2025-37883, CVE-2024-35943, CVE-2024-53128, CVE-2025-38009, CVE-2025-37940, CVE-2025-37992, CVE-2025-37796, CVE-2024-49960, CVE-2024-26686, CVE-2023-52757, CVE-2025-37841, CVE-2025-23148, CVE-2025-37851, CVE-2025-37808, CVE-2024-26739, CVE-2025-23161, CVE-2025-37859, CVE-2025-37839, CVE-2025-37982, CVE-2025-23142, CVE-2025-23140, CVE-2022-49168, CVE-2025-38024, CVE-2025-37949, CVE-2025-37790, CVE-2024-46742, CVE-2025-37780, CVE-2025-37911, CVE-2025-37840, CVE-2025-37768, CVE-2024-54458, CVE-2025-23150, CVE-2025-37969, CVE-2025-37749, CVE-2025-37995, CVE-2025-37789, CVE-2025-23146, CVE-2024-38541, CVE-2025-23163, CVE-2025-37770, CVE-2025-37871, CVE-2025-37740, CVE-2025-23157, CVE-2025-37741, CVE-2022-21546, CVE-2025-37909, CVE-2025-37991, CVE-2025-37913, CVE-2025-37803, CVE-2025-37797, CVE-2022-49063, CVE-2025-38023, CVE-2025-21839, CVE-2025-37811, CVE-2023-52572, CVE-2025-22027, CVE-2025-37765, CVE-2025-37892, CVE-2025-37810, CVE-2025-37914, CVE-2025-37850, CVE-2025-37858, CVE-2025-37794, CVE-2024-53203, CVE-2025-21853, CVE-2024-42322, CVE-2024-50258, CVE-2022-48893, CVE-2024-35790, CVE-2025-37787, CVE-2024-38540, CVE-2025-37915, CVE-2025-37819, CVE-2025-37838, CVE-2025-37998, CVE-2025-37771, CVE-2025-37983, CVE-2025-37844, CVE-2024-50272, CVE-2025-37824, CVE-2025-37857, CVE-2025-37970, CVE-2025-37989, CVE-2025-23156, CVE-2024-50280, CVE-2025-22062, CVE-2025-37985, CVE-2025-37829, CVE-2025-37927, CVE-2025-37766, CVE-2025-37862, CVE-2024-56751, CVE-2025-37990, CVE-2025-37923, CVE-2025-38094, CVE-2025-37830, CVE-2025-23145, CVE-2025-37805, CVE-2025-37823, CVE-2025-23147, CVE-2025-37773, CVE-2025-37758, CVE-2025-37912, CVE-2025-37967, CVE-2022-49535)

References

Affected packages

Ubuntu:22.04:LTS / linux-kvm

Package

Name
linux-kvm
Purl
pkg:deb/ubuntu/linux-kvm@5.15.0-1084.89?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1084.89

Affected versions

5.*

5.13.0-1004.4
5.13.0-1006.6+22.04.1
5.13.0-1007.7+22.04.1
5.13.0-1010.11+22.04.1
5.15.0-1002.2
5.15.0-1004.4
5.15.0-1005.5
5.15.0-1007.7
5.15.0-1008.8
5.15.0-1010.11
5.15.0-1012.14
5.15.0-1013.16
5.15.0-1016.19
5.15.0-1017.21
5.15.0-1018.22
5.15.0-1019.23
5.15.0-1020.24
5.15.0-1021.26
5.15.0-1024.29
5.15.0-1025.30
5.15.0-1026.31
5.15.0-1028.33
5.15.0-1029.34
5.15.0-1030.35
5.15.0-1031.36
5.15.0-1032.37
5.15.0-1033.38
5.15.0-1034.39
5.15.0-1035.40
5.15.0-1037.42
5.15.0-1038.43
5.15.0-1039.44
5.15.0-1040.45
5.15.0-1041.46
5.15.0-1042.47
5.15.0-1044.49
5.15.0-1045.50
5.15.0-1046.51
5.15.0-1047.52
5.15.0-1048.53
5.15.0-1049.54
5.15.0-1050.55
5.15.0-1051.56
5.15.0-1052.57
5.15.0-1053.58
5.15.0-1054.59
5.15.0-1057.62
5.15.0-1058.63
5.15.0-1059.64
5.15.0-1060.65
5.15.0-1061.66
5.15.0-1062.67
5.15.0-1063.68
5.15.0-1064.69
5.15.0-1065.70
5.15.0-1066.71
5.15.0-1067.72
5.15.0-1068.73
5.15.0-1069.74
5.15.0-1070.75
5.15.0-1071.76
5.15.0-1072.77
5.15.0-1073.78
5.15.0-1076.81
5.15.0-1077.82
5.15.0-1078.83
5.15.0-1079.84
5.15.0-1080.85
5.15.0-1081.86
5.15.0-1082.87
5.15.0-1083.88

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "linux-buildinfo-5.15.0-1084-kvm",
            "binary_version": "5.15.0-1084.89"
        },
        {
            "binary_name": "linux-headers-5.15.0-1084-kvm",
            "binary_version": "5.15.0-1084.89"
        },
        {
            "binary_name": "linux-image-unsigned-5.15.0-1084-kvm",
            "binary_version": "5.15.0-1084.89"
        },
        {
            "binary_name": "linux-image-unsigned-5.15.0-1084-kvm-dbgsym",
            "binary_version": "5.15.0-1084.89"
        },
        {
            "binary_name": "linux-kvm-headers-5.15.0-1084",
            "binary_version": "5.15.0-1084.89"
        },
        {
            "binary_name": "linux-kvm-tools-5.15.0-1084",
            "binary_version": "5.15.0-1084.89"
        },
        {
            "binary_name": "linux-modules-5.15.0-1084-kvm",
            "binary_version": "5.15.0-1084.89"
        },
        {
            "binary_name": "linux-tools-5.15.0-1084-kvm",
            "binary_version": "5.15.0-1084.89"
        }
    ]
}