{"id":"USN-7021-4","summary":"linux-azure-fde-5.15 vulnerabilities","details":"Several security issues were discovered in the Linux kernel.\nAn attacker could possibly use these to compromise the system.\nThis update corrects flaws in the following subsystems:\n  - GPU drivers;\n  - BTRFS file system;\n  - F2FS file system;\n  - GFS2 file system;\n  - BPF subsystem;\n  - Netfilter;\n  - RxRPC session sockets;\n  - Integrity Measurement Architecture(IMA) framework;\n(CVE-2024-41009, CVE-2024-26677, CVE-2024-42160, CVE-2024-39494,\nCVE-2024-39496, CVE-2024-38570, CVE-2024-27012, CVE-2024-42228)\n","modified":"2026-02-10T04:45:26Z","published":"2024-10-03T10:48:38Z","related":["UBUNTU-CVE-2024-26677","UBUNTU-CVE-2024-27012","UBUNTU-CVE-2024-38570","UBUNTU-CVE-2024-39494","UBUNTU-CVE-2024-39496","UBUNTU-CVE-2024-41009","UBUNTU-CVE-2024-42160","UBUNTU-CVE-2024-42228"],"upstream":["CVE-2024-26677","CVE-2024-27012","CVE-2024-38570","CVE-2024-39494","CVE-2024-39496","CVE-2024-41009","CVE-2024-42160","CVE-2024-42228","UBUNTU-CVE-2024-26677","UBUNTU-CVE-2024-27012","UBUNTU-CVE-2024-38570","UBUNTU-CVE-2024-39494","UBUNTU-CVE-2024-39496","UBUNTU-CVE-2024-41009","UBUNTU-CVE-2024-42160","UBUNTU-CVE-2024-42228"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7021-4"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26677"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-27012"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-38570"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-39494"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-39496"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-41009"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-42160"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-42228"}],"affected":[{"package":{"name":"linux-azure-fde-5.15","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/linux-azure-fde-5.15@5.15.0-1073.82~20.04.1.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.15.0-1073.82~20.04.1.1"}]}],"versions":["5.15.0-1019.24~20.04.1.1","5.15.0-1020.25~20.04.1.1","5.15.0-1021.26~20.04.1.1","5.15.0-1029.36~20.04.1.1","5.15.0-1030.37~20.04.1.1","5.15.0-1031.38~20.04.1.1","5.15.0-1033.40~20.04.1.1","5.15.0-1034.41~20.04.1.2","5.15.0-1035.42~20.04.1.1","5.15.0-1036.43~20.04.1.1","5.15.0-1037.44~20.04.1.1","5.15.0-1038.45~20.04.1.1","5.15.0-1039.46~20.04.1.1","5.15.0-1040.47~20.04.1.1","5.15.0-1041.48~20.04.1.1","5.15.0-1042.49~20.04.1.1","5.15.0-1043.50~20.04.1.1","5.15.0-1046.53~20.04.1.1","5.15.0-1047.54~20.04.1.1","5.15.0-1049.56~20.04.1.1","5.15.0-1050.57~20.04.1.1","5.15.0-1051.59~20.04.1.1","5.15.0-1052.60~20.04.1.1","5.15.0-1053.61~20.04.1.1","5.15.0-1054.62~20.04.1.1","5.15.0-1056.64~20.04.1.1","5.15.0-1057.65~20.04.1.1","5.15.0-1058.66~20.04.2.1","5.15.0-1059.67~20.04.1.1","5.15.0-1060.69~20.04.1.1","5.15.0-1061.70~20.04.1.1","5.15.0-1063.72~20.04.1.1","5.15.0-1064.73~20.04.1.1","5.15.0-1065.74~20.04.1.1","5.15.0-1067.76~20.04.1.1","5.15.0-1068.77~20.04.1.1","5.15.0-1070.79~20.04.1.1","5.15.0-1071.80~20.04.1.1","5.15.0-1072.81~20.04.1.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"5.15.0-1073.82~20.04.1.1","binary_name":"linux-image-unsigned-5.15.0-1073-azure-fde"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7021-4.json"}}],"schema_version":"1.7.3"}