Follow @Openwall on Twitter for new release announcements and other news
[<prev] [day] [month] [year] [list]
Message-ID: <CAD9zwiUv6UuakBB6UWanPuqEQS8=Nbp3-Vjb9p6yxix+acTKoA@mail.gmail.com>
Date: Thu, 5 Mar 2026 19:03:36 +0000
From: Seth Arnold <seth.arnold@...onical.com>
To: oss-security@...ts.openwall.com
Cc: Ubuntu Security <security@...ntu.com>
Subject: CVE-2025-13350 for Ubuntu Linux kernel

Hello, today the Ubuntu Security Team published CVE-2025-13350 for the
Ubuntu packaging of the Linux kernel. The issue comes from an incorrectly
backported patch that caused us to mix an old-style with a new-style
garbage collector for Unix Domain Sockets.

Upstream kernels weren't affected because they did not cherry-pick pieces
of the transition.

I thought it worth sending a message to a widely read and widely archived
place to give everyone peace of mind: If you consume the upstream kernel
directly, you're fine. This issue only affected Ubuntu and anyone that
rebuilds Ubuntu kernels.

Thanks

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.