{"id":"USN-7021-3","summary":"linux-lowlatency, linux-lowlatency-hwe-5.15 vulnerabilities","details":"Several security issues were discovered in the Linux kernel.\nAn attacker could possibly use these to compromise the system.\nThis update corrects flaws in the following subsystems:\n  - GPU drivers;\n  - BTRFS file system;\n  - F2FS file system;\n  - GFS2 file system;\n  - BPF subsystem;\n  - Netfilter;\n  - RxRPC session sockets;\n  - Integrity Measurement Architecture(IMA) framework;\n(CVE-2024-39494, CVE-2024-38570, CVE-2024-27012, CVE-2024-39496,\nCVE-2024-42160, CVE-2024-41009, CVE-2024-42228, CVE-2024-26677)\n","modified":"2026-02-10T04:45:26Z","published":"2024-09-26T11:24:20Z","related":["UBUNTU-CVE-2024-26677","UBUNTU-CVE-2024-27012","UBUNTU-CVE-2024-38570","UBUNTU-CVE-2024-39494","UBUNTU-CVE-2024-39496","UBUNTU-CVE-2024-41009","UBUNTU-CVE-2024-42160","UBUNTU-CVE-2024-42228"],"upstream":["CVE-2024-26677","CVE-2024-27012","CVE-2024-38570","CVE-2024-39494","CVE-2024-39496","CVE-2024-41009","CVE-2024-42160","CVE-2024-42228","UBUNTU-CVE-2024-26677","UBUNTU-CVE-2024-27012","UBUNTU-CVE-2024-38570","UBUNTU-CVE-2024-39494","UBUNTU-CVE-2024-39496","UBUNTU-CVE-2024-41009","UBUNTU-CVE-2024-42160","UBUNTU-CVE-2024-42228"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7021-3"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26677"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-27012"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-38570"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-39494"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-39496"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-41009"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-42160"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-42228"}],"affected":[{"package":{"name":"linux-lowlatency-hwe-5.15","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/linux-lowlatency-hwe-5.15@5.15.0-122.132~20.04.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.15.0-122.132~20.04.1"}]}],"versions":["5.15.0-33.34~20.04.1","5.15.0-42.45~20.04.1","5.15.0-43.46~20.04.1","5.15.0-46.49~20.04.1","5.15.0-48.54~20.04.1","5.15.0-50.56~20.04.1","5.15.0-52.58~20.04.1","5.15.0-53.59~20.04.1","5.15.0-56.62~20.04.1","5.15.0-58.64~20.04.1","5.15.0-60.66~20.04.1","5.15.0-67.74~20.04.1","5.15.0-69.76~20.04.1","5.15.0-70.77~20.04.1","5.15.0-71.78~20.04.1","5.15.0-72.79~20.04.1","5.15.0-73.80~20.04.1","5.15.0-75.82~20.04.1","5.15.0-76.83~20.04.1","5.15.0-78.85~20.04.1","5.15.0-79.88~20.04.1","5.15.0-82.91~20.04.1","5.15.0-83.92~20.04.1","5.15.0-84.93~20.04.1","5.15.0-86.95~20.04.1","5.15.0-87.96~20.04.1","5.15.0-88.98~20.04.1","5.15.0-89.99~20.04.1","5.15.0-91.101~20.04.1","5.15.0-92.102~20.04.1","5.15.0-94.104~20.04.1","5.15.0-97.107~20.04.1","5.15.0-100.110~20.04.1","5.15.0-101.111~20.04.1","5.15.0-102.112~20.04.1","5.15.0-105.115~20.04.1","5.15.0-106.116~20.04.1","5.15.0-107.117~20.04.1","5.15.0-110.120~20.04.1","5.15.0-113.123~20.04.1","5.15.0-116.126~20.04.1","5.15.0-117.127~20.04.1","5.15.0-118.128~20.04.1","5.15.0-119.129~20.04.1","5.15.0-121.131~20.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"linux-buildinfo-5.15.0-122-lowlatency","binary_version":"5.15.0-122.132~20.04.1"},{"binary_name":"linux-buildinfo-5.15.0-122-lowlatency-64k","binary_version":"5.15.0-122.132~20.04.1"},{"binary_name":"linux-cloud-tools-5.15.0-122-lowlatency","binary_version":"5.15.0-122.132~20.04.1"},{"binary_name":"linux-headers-5.15.0-122-lowlatency","binary_version":"5.15.0-122.132~20.04.1"},{"binary_name":"linux-headers-5.15.0-122-lowlatency-64k","binary_version":"5.15.0-122.132~20.04.1"},{"binary_name":"linux-image-unsigned-5.15.0-122-lowlatency","binary_version":"5.15.0-122.132~20.04.1"},{"binary_name":"linux-image-unsigned-5.15.0-122-lowlatency-64k","binary_version":"5.15.0-122.132~20.04.1"},{"binary_name":"linux-lowlatency-hwe-5.15-cloud-tools-5.15.0-122","binary_version":"5.15.0-122.132~20.04.1"},{"binary_name":"linux-lowlatency-hwe-5.15-cloud-tools-common","binary_version":"5.15.0-122.132~20.04.1"},{"binary_name":"linux-lowlatency-hwe-5.15-headers-5.15.0-122","binary_version":"5.15.0-122.132~20.04.1"},{"binary_name":"linux-lowlatency-hwe-5.15-tools-5.15.0-122","binary_version":"5.15.0-122.132~20.04.1"},{"binary_name":"linux-lowlatency-hwe-5.15-tools-common","binary_version":"5.15.0-122.132~20.04.1"},{"binary_name":"linux-lowlatency-hwe-5.15-tools-host","binary_version":"5.15.0-122.132~20.04.1"},{"binary_name":"linux-modules-5.15.0-122-lowlatency","binary_version":"5.15.0-122.132~20.04.1"},{"binary_name":"linux-modules-5.15.0-122-lowlatency-64k","binary_version":"5.15.0-122.132~20.04.1"},{"binary_name":"linux-modules-iwlwifi-5.15.0-122-lowlatency","binary_version":"5.15.0-122.132~20.04.1"},{"binary_name":"linux-tools-5.15.0-122-lowlatency","binary_version":"5.15.0-122.132~20.04.1"},{"binary_name":"linux-tools-5.15.0-122-lowlatency-64k","binary_version":"5.15.0-122.132~20.04.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7021-3.json","cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-26677"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-27012"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-38570"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-39494"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-39496"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-41009"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-42160"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-42228"}]}}},{"package":{"name":"linux-lowlatency","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/linux-lowlatency@5.15.0-122.132?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.15.0-122.132"}]}],"versions":["5.15.0-22.22","5.15.0-23.23","5.15.0-24.24","5.15.0-27.28","5.15.0-30.31","5.15.0-33.34","5.15.0-35.36","5.15.0-37.39","5.15.0-39.42","5.15.0-40.43","5.15.0-41.44","5.15.0-43.46","5.15.0-46.49","5.15.0-47.53","5.15.0-48.54","5.15.0-50.56","5.15.0-52.58","5.15.0-53.59","5.15.0-56.62","5.15.0-57.63","5.15.0-58.64","5.15.0-60.66","5.15.0-67.74","5.15.0-69.76","5.15.0-70.77","5.15.0-71.78","5.15.0-72.79","5.15.0-73.80","5.15.0-75.82","5.15.0-76.83","5.15.0-78.85","5.15.0-79.88","5.15.0-82.91","5.15.0-83.92","5.15.0-84.93","5.15.0-86.95","5.15.0-87.96","5.15.0-88.98","5.15.0-89.99","5.15.0-91.101","5.15.0-92.102","5.15.0-94.104","5.15.0-97.107","5.15.0-100.110","5.15.0-101.111","5.15.0-102.112","5.15.0-105.115","5.15.0-106.116","5.15.0-107.117","5.15.0-110.120","5.15.0-113.123","5.15.0-116.126","5.15.0-117.127","5.15.0-118.128","5.15.0-119.129","5.15.0-121.131"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"linux-buildinfo-5.15.0-122-lowlatency","binary_version":"5.15.0-122.132"},{"binary_name":"linux-buildinfo-5.15.0-122-lowlatency-64k","binary_version":"5.15.0-122.132"},{"binary_name":"linux-cloud-tools-5.15.0-122-lowlatency","binary_version":"5.15.0-122.132"},{"binary_name":"linux-headers-5.15.0-122-lowlatency","binary_version":"5.15.0-122.132"},{"binary_name":"linux-headers-5.15.0-122-lowlatency-64k","binary_version":"5.15.0-122.132"},{"binary_name":"linux-image-unsigned-5.15.0-122-lowlatency","binary_version":"5.15.0-122.132"},{"binary_name":"linux-image-unsigned-5.15.0-122-lowlatency-64k","binary_version":"5.15.0-122.132"},{"binary_name":"linux-lowlatency-cloud-tools-5.15.0-122","binary_version":"5.15.0-122.132"},{"binary_name":"linux-lowlatency-cloud-tools-common","binary_version":"5.15.0-122.132"},{"binary_name":"linux-lowlatency-headers-5.15.0-122","binary_version":"5.15.0-122.132"},{"binary_name":"linux-lowlatency-tools-5.15.0-122","binary_version":"5.15.0-122.132"},{"binary_name":"linux-lowlatency-tools-common","binary_version":"5.15.0-122.132"},{"binary_name":"linux-lowlatency-tools-host","binary_version":"5.15.0-122.132"},{"binary_name":"linux-modules-5.15.0-122-lowlatency","binary_version":"5.15.0-122.132"},{"binary_name":"linux-modules-5.15.0-122-lowlatency-64k","binary_version":"5.15.0-122.132"},{"binary_name":"linux-modules-iwlwifi-5.15.0-122-lowlatency","binary_version":"5.15.0-122.132"},{"binary_name":"linux-tools-5.15.0-122-lowlatency","binary_version":"5.15.0-122.132"},{"binary_name":"linux-tools-5.15.0-122-lowlatency-64k","binary_version":"5.15.0-122.132"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7021-3.json","cves_map":{"ecosystem":"Ubuntu:22.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-26677"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-27012"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-38570"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-39494"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-39496"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-41009"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-42160"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-42228"}]}}}],"schema_version":"1.7.3"}