|
|
Message-ID: <CAD9zwiUv6UuakBB6UWanPuqEQS8=Nbp3-Vjb9p6yxix+acTKoA@mail.gmail.com> Date: Thu, 5 Mar 2026 19:03:36 +0000 From: Seth Arnold <seth.arnold@...onical.com> To: oss-security@...ts.openwall.com Cc: Ubuntu Security <security@...ntu.com> Subject: CVE-2025-13350 for Ubuntu Linux kernel Hello, today the Ubuntu Security Team published CVE-2025-13350 for the Ubuntu packaging of the Linux kernel. The issue comes from an incorrectly backported patch that caused us to mix an old-style with a new-style garbage collector for Unix Domain Sockets. Upstream kernels weren't affected because they did not cherry-pick pieces of the transition. I thought it worth sending a message to a widely read and widely archived place to give everyone peace of mind: If you consume the upstream kernel directly, you're fine. This issue only affected Ubuntu and anyone that rebuilds Ubuntu kernels. Thanks
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.