{"id":"USN-6828-1","summary":"linux-intel-iotg-5.15 vulnerabilities","details":"Zheng Wang discovered that the Broadcom FullMAC WLAN driver in the Linux\nkernel contained a race condition during device removal, leading to a use-\nafter-free vulnerability. A physically proximate attacker could possibly\nuse this to cause a denial of service (system crash). (CVE-2023-47233)\n\nIt was discovered that the ATA over Ethernet (AoE) driver in the Linux\nkernel contained a race condition, leading to a use-after-free\nvulnerability. An attacker could use this to cause a denial of service or\npossibly execute arbitrary code. (CVE-2023-6270)\n\nIt was discovered that the Atheros 802.11ac wireless driver did not\nproperly validate certain data structures, leading to a NULL pointer\ndereference. An attacker could possibly use this to cause a denial of\nservice. (CVE-2023-7042)\n\nIt was discovered that the HugeTLB file system component of the Linux\nKernel contained a NULL pointer dereference vulnerability. A privileged\nattacker could possibly use this to to cause a denial of service.\n(CVE-2024-0841)\n\nIt was discovered that the Open vSwitch implementation in the Linux kernel\ncould overflow its stack during recursive action operations under certain\nconditions. A local attacker could use this to cause a denial of service\n(system crash). (CVE-2024-1151)\n\nSander Wiebing, Alvise de Faveri Tron, Herbert Bos, and Cristiano Giuffrida\ndiscovered that the Linux kernel mitigations for the initial Branch History\nInjection vulnerability (CVE-2022-0001) were insufficient for Intel\nprocessors. A local attacker could potentially use this to expose sensitive\ninformation. (CVE-2024-2201)\n\nYuxuan Hu discovered that the Bluetooth RFCOMM protocol driver in the Linux\nKernel contained a race condition, leading to a NULL pointer dereference.\nAn attacker could possibly use this to cause a denial of service (system\ncrash). (CVE-2024-22099)\n\nChenyuan Yang discovered that the RDS Protocol implementation in the Linux\nkernel contained an out-of-bounds read vulnerability. An attacker could use\nthis to possibly cause a denial of service (system crash). (CVE-2024-23849)\n\nSeveral security issues were discovered in the Linux kernel.\nAn attacker could possibly use these to compromise the system.\nThis update corrects flaws in the following subsystems:\n  - ARM32 architecture;\n  - PowerPC architecture;\n  - RISC-V architecture;\n  - S390 architecture;\n  - Core kernel;\n  - x86 architecture;\n  - Block layer subsystem;\n  - ACPI drivers;\n  - Android drivers;\n  - Power management core;\n  - Bus devices;\n  - Hardware random number generator core;\n  - Clock framework and drivers;\n  - CPU frequency scaling framework;\n  - Cryptographic API;\n  - Device frequency scaling framework;\n  - DMA engine subsystem;\n  - ARM SCMI message protocol;\n  - EFI core;\n  - GPU drivers;\n  - HID subsystem;\n  - Hardware monitoring drivers;\n  - I2C subsystem;\n  - IIO ADC drivers;\n  - IIO subsystem;\n  - IIO Magnetometer sensors drivers;\n  - InfiniBand drivers;\n  - IOMMU subsystem;\n  - Multiple devices driver;\n  - Media drivers;\n  - MMC subsystem;\n  - Network drivers;\n  - NTB driver;\n  - NVME drivers;\n  - PCI subsystem;\n  - PCI driver for MicroSemi Switchtec;\n  - PHY drivers;\n  - MediaTek PM domains;\n  - Power supply drivers;\n  - SCSI drivers;\n  - SPI subsystem;\n  - Media staging drivers;\n  - TCM subsystem;\n  - USB subsystem;\n  - DesignWare USB3 driver;\n  - Framebuffer layer;\n  - AFS file system;\n  - File systems infrastructure;\n  - BTRFS file system;\n  - Ceph distributed file system;\n  - EROFS file system;\n  - Ext4 file system;\n  - F2FS file system;\n  - JFS file system;\n  - Network file system client;\n  - NILFS2 file system;\n  - NTFS3 file system;\n  - Pstore file system;\n  - Diskquota system;\n  - SMB network file system;\n  - BPF subsystem;\n  - Memory management;\n  - Netfilter;\n  - TLS protocol;\n  - io_uring subsystem;\n  - Bluetooth subsystem;\n  - Ethernet bridge;\n  - CAN network layer;\n  - Networking core;\n  - HSR network protocol;\n  - IPv4 networking;\n  - IPv6 networking;\n  - L2TP protocol;\n  - Logical Link layer;\n  - MAC80211 subsystem;\n  - Multipath TCP;\n  - Netlink;\n  - NET/ROM layer;\n  - NFC subsystem;\n  - Packet sockets;\n  - RDS protocol;\n  - SMC sockets;\n  - Sun RPC protocol;\n  - TIPC protocol;\n  - Unix domain sockets;\n  - Wireless networking;\n  - Tomoyo security module;\n  - Realtek audio codecs;\n  - USB sound devices;\n(CVE-2024-26910, CVE-2024-27074, CVE-2023-52494, CVE-2023-52594,\nCVE-2024-26915, CVE-2024-26766, CVE-2023-52489, CVE-2024-35845,\nCVE-2024-26846, CVE-2024-26898, CVE-2024-26897, CVE-2024-26826,\nCVE-2024-26798, CVE-2023-52662, CVE-2024-26856, CVE-2023-52608,\nCVE-2024-26782, CVE-2024-27047, CVE-2024-27390, CVE-2024-26610,\nCVE-2024-26804, CVE-2023-52638, CVE-2024-26771, CVE-2024-26752,\nCVE-2024-26585, CVE-2024-26645, CVE-2024-26715, CVE-2024-27028,\nCVE-2024-26809, CVE-2024-26880, CVE-2024-27432, CVE-2024-27065,\nCVE-2024-26717, CVE-2023-52616, CVE-2024-26748, CVE-2024-26795,\nCVE-2024-26671, CVE-2024-26743, CVE-2024-27412, CVE-2024-26802,\nCVE-2024-26733, CVE-2024-26736, CVE-2023-52618, CVE-2024-27046,\nCVE-2024-26688, CVE-2024-26679, CVE-2024-26769, CVE-2024-27051,\nCVE-2024-26603, CVE-2024-26744, CVE-2023-52434, CVE-2024-26697,\nCVE-2024-27075, CVE-2023-52583, CVE-2024-26583, CVE-2024-27403,\nCVE-2024-26907, CVE-2024-26636, CVE-2024-27410, CVE-2023-52530,\nCVE-2024-26840, CVE-2024-26851, CVE-2024-26862, CVE-2023-52640,\nCVE-2024-35829, CVE-2024-26906, CVE-2024-26777, CVE-2024-27419,\nCVE-2024-26664, CVE-2024-26627, CVE-2024-26859, CVE-2023-52486,\nCVE-2023-52652, CVE-2024-26835, CVE-2024-35844, CVE-2024-26702,\nCVE-2024-26635, CVE-2024-26704, CVE-2023-52633, CVE-2024-26816,\nCVE-2024-26894, CVE-2024-26778, CVE-2023-52599, CVE-2024-35828,\nCVE-2024-26776, CVE-2023-52493, CVE-2024-26845, CVE-2024-26594,\nCVE-2024-26885, CVE-2024-26829, CVE-2023-52645, CVE-2024-26695,\nCVE-2023-52615, CVE-2024-26651, CVE-2024-26843, CVE-2023-52606,\nCVE-2024-26675, CVE-2024-26874, CVE-2024-26883, CVE-2024-26772,\nCVE-2024-26673, CVE-2024-26737, CVE-2023-52631, CVE-2024-26640,\nCVE-2023-52598, CVE-2024-26735, CVE-2024-26895, CVE-2024-26592,\nCVE-2023-52492, CVE-2024-26861, CVE-2023-52644, CVE-2024-26920,\nCVE-2024-26877, CVE-2024-26863, CVE-2024-26720, CVE-2024-26722,\nCVE-2024-27045, CVE-2024-27038, CVE-2024-26763, CVE-2024-26833,\nCVE-2024-27417, CVE-2024-26916, CVE-2024-26857, CVE-2024-26875,\nCVE-2024-26606, CVE-2024-27024, CVE-2024-26615, CVE-2023-52614,\nCVE-2023-52641, CVE-2024-26600, CVE-2024-27043, CVE-2023-52635,\nCVE-2024-26787, CVE-2024-26622, CVE-2024-27413, CVE-2024-26791,\nCVE-2023-52622, CVE-2023-52491, CVE-2023-52604, CVE-2024-27037,\nCVE-2024-26881, CVE-2024-26754, CVE-2024-26659, CVE-2024-26663,\nCVE-2024-26747, CVE-2023-52602, CVE-2024-26712, CVE-2024-26839,\nCVE-2024-26749, CVE-2024-26764, CVE-2024-26820, CVE-2024-26882,\nCVE-2024-27039, CVE-2024-27078, CVE-2024-26889, CVE-2024-26870,\nCVE-2024-26788, CVE-2024-26602, CVE-2024-26903, CVE-2024-27044,\nCVE-2024-27073, CVE-2023-52601, CVE-2023-52595, CVE-2024-26707,\nCVE-2024-27415, CVE-2023-52637, CVE-2024-26660, CVE-2024-27414,\nCVE-2024-27054, CVE-2023-52497, CVE-2024-26801, CVE-2023-52435,\nCVE-2023-52620, CVE-2023-52627, CVE-2024-26698, CVE-2023-52597,\nCVE-2024-27077, CVE-2023-52650, CVE-2024-26750, CVE-2024-26852,\nCVE-2024-27053, CVE-2023-52656, CVE-2024-26625, CVE-2024-26779,\nCVE-2024-27431, CVE-2024-26751, CVE-2024-26684, CVE-2024-26803,\nCVE-2024-26593, CVE-2023-52642, CVE-2023-52447, CVE-2024-26790,\nCVE-2024-26825, CVE-2024-26668, CVE-2023-52607, CVE-2024-26872,\nCVE-2024-27030, CVE-2023-52643, CVE-2024-26901, CVE-2024-35830,\nCVE-2024-26855, CVE-2023-52588, CVE-2023-52587, CVE-2024-26891,\nCVE-2024-26644, CVE-2024-26884, CVE-2024-26793, CVE-2024-26805,\nCVE-2024-26584, CVE-2024-27405, CVE-2023-52623, CVE-2024-26608,\nCVE-2024-26878, CVE-2024-27388, CVE-2024-27416, CVE-2024-26685,\nCVE-2024-27034, CVE-2024-26879, CVE-2024-26614, CVE-2024-26792,\nCVE-2023-52617, CVE-2024-26773, CVE-2024-26665, CVE-2024-26641,\nCVE-2023-52619, CVE-2024-35811, CVE-2024-27052, CVE-2024-27076,\nCVE-2024-26838, CVE-2024-26808, CVE-2024-26696, CVE-2024-26676,\nCVE-2024-26689, CVE-2024-26774, CVE-2024-26601, CVE-2023-52498,\nCVE-2024-27436)\n","modified":"2026-04-24T10:02:42.317335144Z","published":"2024-06-11T17:45:43Z","related":["UBUNTU-CVE-2023-47233","UBUNTU-CVE-2023-52434","UBUNTU-CVE-2023-52435","UBUNTU-CVE-2023-52447","UBUNTU-CVE-2023-52486","UBUNTU-CVE-2023-52489","UBUNTU-CVE-2023-52491","UBUNTU-CVE-2023-52492","UBUNTU-CVE-2023-52493","UBUNTU-CVE-2023-52494","UBUNTU-CVE-2023-52497","UBUNTU-CVE-2023-52498","UBUNTU-CVE-2023-52530","UBUNTU-CVE-2023-52583","UBUNTU-CVE-2023-52587","UBUNTU-CVE-2023-52588","UBUNTU-CVE-2023-52594","UBUNTU-CVE-2023-52595","UBUNTU-CVE-2023-52597","UBUNTU-CVE-2023-52598","UBUNTU-CVE-2023-52599","UBUNTU-CVE-2023-52601","UBUNTU-CVE-2023-52602","UBUNTU-CVE-2023-52604","UBUNTU-CVE-2023-52606","UBUNTU-CVE-2023-52607","UBUNTU-CVE-2023-52608","UBUNTU-CVE-2023-52614","UBUNTU-CVE-2023-52615","UBUNTU-CVE-2023-52616","UBUNTU-CVE-2023-52617","UBUNTU-CVE-2023-52618","UBUNTU-CVE-2023-52619","UBUNTU-CVE-2023-52620","UBUNTU-CVE-2023-52622","UBUNTU-CVE-2023-52623","UBUNTU-CVE-2023-52627","UBUNTU-CVE-2023-52631","UBUNTU-CVE-2023-52633","UBUNTU-CVE-2023-52635","UBUNTU-CVE-2023-52637","UBUNTU-CVE-2023-52638","UBUNTU-CVE-2023-52640","UBUNTU-CVE-2023-52641","UBUNTU-CVE-2023-52642","UBUNTU-CVE-2023-52643","UBUNTU-CVE-2023-52644","UBUNTU-CVE-2023-52645","UBUNTU-CVE-2023-52650","UBUNTU-CVE-2023-52652","UBUNTU-CVE-2023-52656","UBUNTU-CVE-2023-52662","UBUNTU-CVE-2023-6270","UBUNTU-CVE-2023-7042","UBUNTU-CVE-2024-0841","UBUNTU-CVE-2024-1151","UBUNTU-CVE-2024-2201","UBUNTU-CVE-2024-22099","UBUNTU-CVE-2024-23849","UBUNTU-CVE-2024-26583","UBUNTU-CVE-2024-26584","UBUNTU-CVE-2024-26585","UBUNTU-CVE-2024-26592","UBUNTU-CVE-2024-26593","UBUNTU-CVE-2024-26594","UBUNTU-CVE-2024-26600","UBUNTU-CVE-2024-26601","UBUNTU-CVE-2024-26602","UBUNTU-CVE-2024-26603","UBUNTU-CVE-2024-26606","UBUNTU-CVE-2024-26608","UBUNTU-CVE-2024-26610","UBUNTU-CVE-2024-26614","UBUNTU-CVE-2024-26615","UBUNTU-CVE-2024-26622","UBUNTU-CVE-2024-26625","UBUNTU-CVE-2024-26627","UBUNTU-CVE-2024-26635","UBUNTU-CVE-2024-26636","UBUNTU-CVE-2024-26640","UBUNTU-CVE-2024-26641","UBUNTU-CVE-2024-26644","UBUNTU-CVE-2024-26645","UBUNTU-CVE-2024-26651","UBUNTU-CVE-2024-26659","UBUNTU-CVE-2024-26660","UBUNTU-CVE-2024-26663","UBUNTU-CVE-2024-26664","UBUNTU-CVE-2024-26665","UBUNTU-CVE-2024-26668","UBUNTU-CVE-2024-26671","UBUNTU-CVE-2024-26673","UBUNTU-CVE-2024-26675","UBUNTU-CVE-2024-26676","UBUNTU-CVE-2024-26679","UBUNTU-CVE-2024-26684","UBUNTU-CVE-2024-26685","UBUNTU-CVE-2024-26688","UBUNTU-CVE-2024-26689","UBUNTU-CVE-2024-26695","UBUNTU-CVE-2024-26696","UBUNTU-CVE-2024-26697","UBUNTU-CVE-2024-26698","UBUNTU-CVE-2024-26702","UBUNTU-CVE-2024-26704","UBUNTU-CVE-2024-26707","UBUNTU-CVE-2024-26712","UBUNTU-CVE-2024-26715","UBUNTU-CVE-2024-26717","UBUNTU-CVE-2024-26720","UBUNTU-CVE-2024-26722","UBUNTU-CVE-2024-26733","UBUNTU-CVE-2024-26735","UBUNTU-CVE-2024-26736","UBUNTU-CVE-2024-26737","UBUNTU-CVE-2024-26743","UBUNTU-CVE-2024-26744","UBUNTU-CVE-2024-26747","UBUNTU-CVE-2024-26748","UBUNTU-CVE-2024-26749","UBUNTU-CVE-2024-26750","UBUNTU-CVE-2024-26751","UBUNTU-CVE-2024-26752","UBUNTU-CVE-2024-26754","UBUNTU-CVE-2024-26763","UBUNTU-CVE-2024-26764","UBUNTU-CVE-2024-26766","UBUNTU-CVE-2024-26769","UBUNTU-CVE-2024-26771","UBUNTU-CVE-2024-26772","UBUNTU-CVE-2024-26773","UBUNTU-CVE-2024-26774","UBUNTU-CVE-2024-26776","UBUNTU-CVE-2024-26777","UBUNTU-CVE-2024-26778","UBUNTU-CVE-2024-26779","UBUNTU-CVE-2024-26782","UBUNTU-CVE-2024-26787","UBUNTU-CVE-2024-26788","UBUNTU-CVE-2024-26790","UBUNTU-CVE-2024-26791","UBUNTU-CVE-2024-26792","UBUNTU-CVE-2024-26793","UBUNTU-CVE-2024-26795","UBUNTU-CVE-2024-26798","UBUNTU-CVE-2024-26801","UBUNTU-CVE-2024-26802","UBUNTU-CVE-2024-26803","UBUNTU-CVE-2024-26804","UBUNTU-CVE-2024-26805","UBUNTU-CVE-2024-26808","UBUNTU-CVE-2024-26809","UBUNTU-CVE-2024-26816","UBUNTU-CVE-2024-26820","UBUNTU-CVE-2024-26825","UBUNTU-CVE-2024-26826","UBUNTU-CVE-2024-26829","UBUNTU-CVE-2024-26833","UBUNTU-CVE-2024-26835","UBUNTU-CVE-2024-26838","UBUNTU-CVE-2024-26839","UBUNTU-CVE-2024-26840","UBUNTU-CVE-2024-26843","UBUNTU-CVE-2024-26845","UBUNTU-CVE-2024-26846","UBUNTU-CVE-2024-26851","UBUNTU-CVE-2024-26852","UBUNTU-CVE-2024-26855","UBUNTU-CVE-2024-26856","UBUNTU-CVE-2024-26857","UBUNTU-CVE-2024-26859","UBUNTU-CVE-2024-26861","UBUNTU-CVE-2024-26862","UBUNTU-CVE-2024-26863","UBUNTU-CVE-2024-26870","UBUNTU-CVE-2024-26872","UBUNTU-CVE-2024-26874","UBUNTU-CVE-2024-26875","UBUNTU-CVE-2024-26877","UBUNTU-CVE-2024-26878","UBUNTU-CVE-2024-26879","UBUNTU-CVE-2024-26880","UBUNTU-CVE-2024-26881","UBUNTU-CVE-2024-26882","UBUNTU-CVE-2024-26883","UBUNTU-CVE-2024-26884","UBUNTU-CVE-2024-26885","UBUNTU-CVE-2024-26889","UBUNTU-CVE-2024-26891","UBUNTU-CVE-2024-26894","UBUNTU-CVE-2024-26895","UBUNTU-CVE-2024-26897","UBUNTU-CVE-2024-26898","UBUNTU-CVE-2024-26901","UBUNTU-CVE-2024-26903","UBUNTU-CVE-2024-26906","UBUNTU-CVE-2024-26907","UBUNTU-CVE-2024-26910","UBUNTU-CVE-2024-26915","UBUNTU-CVE-2024-26916","UBUNTU-CVE-2024-26920","UBUNTU-CVE-2024-27024","UBUNTU-CVE-2024-27028","UBUNTU-CVE-2024-27030","UBUNTU-CVE-2024-27034","UBUNTU-CVE-2024-27037","UBUNTU-CVE-2024-27038","UBUNTU-CVE-2024-27039","UBUNTU-CVE-2024-27043","UBUNTU-CVE-2024-27044","UBUNTU-CVE-2024-27045","UBUNTU-CVE-2024-27046","UBUNTU-CVE-2024-27047","UBUNTU-CVE-2024-27051","UBUNTU-CVE-2024-27052","UBUNTU-CVE-2024-27053","UBUNTU-CVE-2024-27054","UBUNTU-CVE-2024-27065","UBUNTU-CVE-2024-27073","UBUNTU-CVE-2024-27074","UBUNTU-CVE-2024-27075","UBUNTU-CVE-2024-27076","UBUNTU-CVE-2024-27077","UBUNTU-CVE-2024-27078","UBUNTU-CVE-2024-27388","UBUNTU-CVE-2024-27390","UBUNTU-CVE-2024-27403","UBUNTU-CVE-2024-27405","UBUNTU-CVE-2024-27410","UBUNTU-CVE-2024-27412","UBUNTU-CVE-2024-27413","UBUNTU-CVE-2024-27414","UBUNTU-CVE-2024-27415","UBUNTU-CVE-2024-27416","UBUNTU-CVE-2024-27417","UBUNTU-CVE-2024-27419","UBUNTU-CVE-2024-27431","UBUNTU-CVE-2024-27432","UBUNTU-CVE-2024-27436","UBUNTU-CVE-2024-35811","UBUNTU-CVE-2024-35828","UBUNTU-CVE-2024-35829","UBUNTU-CVE-2024-35830","UBUNTU-CVE-2024-35844","UBUNTU-CVE-2024-35845"],"upstream":["CVE-2024-26720","CVE-2024-26722","CVE-2024-26750","CVE-2024-26792","CVE-2024-26820","CVE-2024-26889","CVE-2024-26910","CVE-2024-26916","CVE-2024-27416","UBUNTU-CVE-2024-26720","UBUNTU-CVE-2024-26722","UBUNTU-CVE-2024-26750","UBUNTU-CVE-2024-26792","UBUNTU-CVE-2024-26820","UBUNTU-CVE-2024-26889","UBUNTU-CVE-2024-26910","UBUNTU-CVE-2024-26916","UBUNTU-CVE-2024-27416"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6828-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26720"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26722"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26750"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26792"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26820"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26889"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26910"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26916"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-27416"}],"affected":[{"package":{"name":"linux-intel-iotg-5.15","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/linux-intel-iotg-5.15@5.15.0-1058.64~20.04.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.15.0-1058.64~20.04.1"}]}],"versions":["5.15.0-1003.5~20.04.1","5.15.0-1008.11~20.04.1","5.15.0-1010.14~20.04.1","5.15.0-1015.20~20.04.2","5.15.0-1016.21~20.04.1","5.15.0-1017.22~20.04.1","5.15.0-1018.23~20.04.1","5.15.0-1021.26~20.04.1","5.15.0-1023.28~20.04.1","5.15.0-1025.30~20.04.1","5.15.0-1026.31~20.04.1","5.15.0-1027.32~20.04.1","5.15.0-1030.35~20.04.1","5.15.0-1031.36~20.04.1","5.15.0-1033.38~20.04.1","5.15.0-1034.39~20.04.1","5.15.0-1036.41~20.04.1","5.15.0-1037.42~20.04.1","5.15.0-1038.43~20.04.1","5.15.0-1040.46~20.04.1","5.15.0-1043.49~20.04.1","5.15.0-1045.51~20.04.1","5.15.0-1046.52~20.04.1","5.15.0-1048.54~20.04.1","5.15.0-1049.55~20.04.1","5.15.0-1050.56~20.04.1","5.15.0-1051.57~20.04.1","5.15.0-1052.58~20.04.1","5.15.0-1055.61~20.04.1"],"ecosystem_specific":{"binaries":[{"binary_name":"linux-buildinfo-5.15.0-1058-intel-iotg","binary_version":"5.15.0-1058.64~20.04.1"},{"binary_name":"linux-cloud-tools-5.15.0-1058-intel-iotg","binary_version":"5.15.0-1058.64~20.04.1"},{"binary_name":"linux-headers-5.15.0-1058-intel-iotg","binary_version":"5.15.0-1058.64~20.04.1"},{"binary_name":"linux-image-unsigned-5.15.0-1058-intel-iotg","binary_version":"5.15.0-1058.64~20.04.1"},{"binary_name":"linux-intel-iotg-5.15-cloud-tools-5.15.0-1058","binary_version":"5.15.0-1058.64~20.04.1"},{"binary_name":"linux-intel-iotg-5.15-cloud-tools-common","binary_version":"5.15.0-1058.64~20.04.1"},{"binary_name":"linux-intel-iotg-5.15-headers-5.15.0-1058","binary_version":"5.15.0-1058.64~20.04.1"},{"binary_name":"linux-intel-iotg-5.15-tools-5.15.0-1058","binary_version":"5.15.0-1058.64~20.04.1"},{"binary_name":"linux-intel-iotg-5.15-tools-common","binary_version":"5.15.0-1058.64~20.04.1"},{"binary_name":"linux-intel-iotg-5.15-tools-host","binary_version":"5.15.0-1058.64~20.04.1"},{"binary_name":"linux-modules-5.15.0-1058-intel-iotg","binary_version":"5.15.0-1058.64~20.04.1"},{"binary_name":"linux-modules-extra-5.15.0-1058-intel-iotg","binary_version":"5.15.0-1058.64~20.04.1"},{"binary_name":"linux-modules-iwlwifi-5.15.0-1058-intel-iotg","binary_version":"5.15.0-1058.64~20.04.1"},{"binary_name":"linux-tools-5.15.0-1058-intel-iotg","binary_version":"5.15.0-1058.64~20.04.1"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2024-26722","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-26792","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-26820","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2024-26889","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-26910","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2024-26916","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-27416","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:20.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6828-1.json"}}],"schema_version":"1.7.5"}