{"id":"USN-7928-5","summary":"linux-kvm vulnerabilities","details":"Several security issues were discovered in the Linux kernel.\nAn attacker could possibly use these to compromise the system.\nThis update corrects flaws in the following subsystems:\n  - Cryptographic API;\n  - Media drivers;\n  - Network drivers;\n  - AFS file system;\n  - F2FS file system;\n  - Tracing infrastructure;\n  - Netfilter;\n(CVE-2022-49390, CVE-2024-47691, CVE-2024-50067, CVE-2024-53090,\nCVE-2024-53218, CVE-2025-21855, CVE-2025-39964, CVE-2025-39993,\nCVE-2025-40018)\n","modified":"2026-04-27T17:54:06.069107Z","published":"2026-01-09T19:20:36Z","related":["UBUNTU-CVE-2022-49390","UBUNTU-CVE-2024-47691","UBUNTU-CVE-2024-50067","UBUNTU-CVE-2024-53090","UBUNTU-CVE-2024-53218","UBUNTU-CVE-2025-21855","UBUNTU-CVE-2025-39964","UBUNTU-CVE-2025-39993","UBUNTU-CVE-2025-40018"],"upstream":["CVE-2022-49390","CVE-2024-47691","CVE-2024-50067","CVE-2024-53090","CVE-2024-53218","CVE-2025-21855","CVE-2025-39964","CVE-2025-39993","CVE-2025-40018","UBUNTU-CVE-2022-49390","UBUNTU-CVE-2024-47691","UBUNTU-CVE-2024-50067","UBUNTU-CVE-2024-53090","UBUNTU-CVE-2024-53218","UBUNTU-CVE-2025-21855","UBUNTU-CVE-2025-39964","UBUNTU-CVE-2025-39993","UBUNTU-CVE-2025-40018"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7928-5"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-49390"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-47691"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-50067"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-53090"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-53218"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-21855"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-39964"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-39993"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-40018"}],"affected":[{"package":{"name":"linux-kvm","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/linux-kvm@5.15.0-1090.95?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.15.0-1090.95"}]}],"versions":["5.13.0-1004.4","5.13.0-1006.6+22.04.1","5.13.0-1007.7+22.04.1","5.13.0-1010.11+22.04.1","5.15.0-1002.2","5.15.0-1004.4","5.15.0-1005.5","5.15.0-1007.7","5.15.0-1008.8","5.15.0-1010.11","5.15.0-1012.14","5.15.0-1013.16","5.15.0-1016.19","5.15.0-1017.21","5.15.0-1018.22","5.15.0-1019.23","5.15.0-1020.24","5.15.0-1021.26","5.15.0-1024.29","5.15.0-1025.30","5.15.0-1026.31","5.15.0-1028.33","5.15.0-1029.34","5.15.0-1030.35","5.15.0-1031.36","5.15.0-1032.37","5.15.0-1033.38","5.15.0-1034.39","5.15.0-1035.40","5.15.0-1037.42","5.15.0-1038.43","5.15.0-1039.44","5.15.0-1040.45","5.15.0-1041.46","5.15.0-1042.47","5.15.0-1044.49","5.15.0-1045.50","5.15.0-1046.51","5.15.0-1047.52","5.15.0-1048.53","5.15.0-1049.54","5.15.0-1050.55","5.15.0-1051.56","5.15.0-1052.57","5.15.0-1053.58","5.15.0-1054.59","5.15.0-1057.62","5.15.0-1058.63","5.15.0-1059.64","5.15.0-1060.65","5.15.0-1061.66","5.15.0-1062.67","5.15.0-1063.68","5.15.0-1064.69","5.15.0-1065.70","5.15.0-1066.71","5.15.0-1067.72","5.15.0-1068.73","5.15.0-1069.74","5.15.0-1070.75","5.15.0-1071.76","5.15.0-1072.77","5.15.0-1073.78","5.15.0-1076.81","5.15.0-1077.82","5.15.0-1078.83","5.15.0-1079.84","5.15.0-1080.85","5.15.0-1081.86","5.15.0-1082.87","5.15.0-1083.88","5.15.0-1084.89","5.15.0-1085.90","5.15.0-1086.91","5.15.0-1087.92","5.15.0-1088.93","5.15.0-1089.94"],"ecosystem_specific":{"binaries":[{"binary_version":"5.15.0-1090.95","binary_name":"linux-buildinfo-5.15.0-1090-kvm"},{"binary_version":"5.15.0-1090.95","binary_name":"linux-headers-5.15.0-1090-kvm"},{"binary_version":"5.15.0-1090.95","binary_name":"linux-image-unsigned-5.15.0-1090-kvm"},{"binary_version":"5.15.0-1090.95","binary_name":"linux-kvm-headers-5.15.0-1090"},{"binary_version":"5.15.0-1090.95","binary_name":"linux-kvm-tools-5.15.0-1090"},{"binary_version":"5.15.0-1090.95","binary_name":"linux-modules-5.15.0-1090-kvm"},{"binary_version":"5.15.0-1090.95","binary_name":"linux-tools-5.15.0-1090-kvm"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2022-49390","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}]},{"id":"CVE-2024-47691","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2024-50067","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-53090","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-53218","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2025-21855","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2025-39964","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2025-39993","severity":[{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2025-40018","severity":[{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:22.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7928-5.json"}}],"schema_version":"1.7.5"}