{"id":"USN-7028-2","summary":"linux-azure vulnerabilities","details":"It was discovered that the JFS file system contained an out-of-bounds read\nvulnerability when printing xattr debug information. A local attacker could\nuse this to cause a denial of service (system crash).\n\nSeveral security issues were discovered in the Linux kernel.\nAn attacker could possibly use these to compromise the system.\nThis update corrects flaws in the following subsystems:\n  - GPU drivers;\n  - Greybus drivers;\n  - Modular ISDN driver;\n  - Multiple devices driver;\n  - Network drivers;\n  - SCSI drivers;\n  - VFIO drivers;\n  - F2FS file system;\n  - GFS2 file system;\n  - JFS file system;\n  - NILFS2 file system;\n  - Kernel debugger infrastructure;\n  - Bluetooth subsystem;\n  - IPv4 networking;\n  - L2TP protocol;\n  - Netfilter;\n  - RxRPC session sockets;\n(CVE-2024-42154, CVE-2023-52527, CVE-2024-26733, CVE-2024-42160,\nCVE-2021-47188, CVE-2024-38570, CVE-2024-26851, CVE-2024-26984,\nCVE-2024-26677, CVE-2024-39480, CVE-2024-27398, CVE-2022-48791,\nCVE-2024-42224, CVE-2024-38583, CVE-2024-40902, CVE-2023-52809,\nCVE-2024-39495, CVE-2024-26651, CVE-2024-26880, CVE-2024-42228,\nCVE-2024-27437, CVE-2022-48863)\n","modified":"2026-02-10T04:45:27Z","published":"2024-10-17T16:44:05Z","related":["UBUNTU-CVE-2021-47188","UBUNTU-CVE-2022-48791","UBUNTU-CVE-2022-48863","UBUNTU-CVE-2023-52527","UBUNTU-CVE-2023-52809","UBUNTU-CVE-2024-26651","UBUNTU-CVE-2024-26677","UBUNTU-CVE-2024-26733","UBUNTU-CVE-2024-26851","UBUNTU-CVE-2024-26880","UBUNTU-CVE-2024-26984","UBUNTU-CVE-2024-27398","UBUNTU-CVE-2024-27437","UBUNTU-CVE-2024-38570","UBUNTU-CVE-2024-38583","UBUNTU-CVE-2024-39480","UBUNTU-CVE-2024-39495","UBUNTU-CVE-2024-40902","UBUNTU-CVE-2024-42154","UBUNTU-CVE-2024-42160","UBUNTU-CVE-2024-42224","UBUNTU-CVE-2024-42228"],"upstream":["CVE-2021-47188","CVE-2022-48791","CVE-2022-48863","CVE-2023-52527","CVE-2023-52809","CVE-2024-26651","CVE-2024-26677","CVE-2024-26733","CVE-2024-26851","CVE-2024-26880","CVE-2024-26984","CVE-2024-27398","CVE-2024-27437","CVE-2024-38570","CVE-2024-38583","CVE-2024-39480","CVE-2024-39495","CVE-2024-40902","CVE-2024-42154","CVE-2024-42160","CVE-2024-42224","CVE-2024-42228","UBUNTU-CVE-2021-47188","UBUNTU-CVE-2022-48791","UBUNTU-CVE-2022-48863","UBUNTU-CVE-2023-52527","UBUNTU-CVE-2023-52809","UBUNTU-CVE-2024-26651","UBUNTU-CVE-2024-26677","UBUNTU-CVE-2024-26733","UBUNTU-CVE-2024-26851","UBUNTU-CVE-2024-26880","UBUNTU-CVE-2024-26984","UBUNTU-CVE-2024-27398","UBUNTU-CVE-2024-27437","UBUNTU-CVE-2024-38570","UBUNTU-CVE-2024-38583","UBUNTU-CVE-2024-39480","UBUNTU-CVE-2024-39495","UBUNTU-CVE-2024-40902","UBUNTU-CVE-2024-42154","UBUNTU-CVE-2024-42160","UBUNTU-CVE-2024-42224","UBUNTU-CVE-2024-42228"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7028-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-47188"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-48791"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-48863"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52527"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52809"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26651"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26677"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26733"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26851"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26880"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26984"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-27398"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-27437"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-38570"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-38583"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-39480"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-39495"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-40902"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-42154"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-42160"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-42224"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-42228"}],"affected":[{"package":{"name":"linux-azure","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/linux-azure@4.15.0-1181.196~14.04.1?arch=source&distro=trusty/esm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-1181.196~14.04.1"}]}],"versions":["4.15.0-1023.24~14.04.1","4.15.0-1030.31~14.04.1","4.15.0-1031.32~14.04.1","4.15.0-1032.33~14.04.2","4.15.0-1035.36~14.04.2","4.15.0-1036.38~14.04.2","4.15.0-1037.39~14.04.2","4.15.0-1039.41~14.04.2","4.15.0-1040.44~14.04.1","4.15.0-1041.45~14.04.1","4.15.0-1042.46~14.04.1","4.15.0-1045.49~14.04.1","4.15.0-1046.50~14.04.1","4.15.0-1047.51~14.04.1","4.15.0-1049.54~14.04.1","4.15.0-1050.55~14.04.1","4.15.0-1051.56~14.04.1","4.15.0-1052.57~14.04.1","4.15.0-1055.60~14.04.1","4.15.0-1056.61~14.04.1","4.15.0-1057.62~14.04.1","4.15.0-1059.64~14.04.1","4.15.0-1060.65~14.04.1","4.15.0-1061.66~14.04.1","4.15.0-1063.68~14.04.1","4.15.0-1064.69~14.04.1","4.15.0-1066.71~14.04.1","4.15.0-1067.72~14.04.1","4.15.0-1069.74~14.04.1","4.15.0-1071.76~14.04.1","4.15.0-1074.79~14.04.1","4.15.0-1077.82~14.04.1","4.15.0-1082.92~14.04.1","4.15.0-1083.93~14.04.1","4.15.0-1089.99~14.04.1","4.15.0-1091.101~14.04.1","4.15.0-1092.102~14.04.1","4.15.0-1093.103~14.04.1","4.15.0-1095.105~14.04.1","4.15.0-1096.106~14.04.1","4.15.0-1098.109~14.04.1","4.15.0-1100.111~14.04.1","4.15.0-1102.113~14.04.1","4.15.0-1103.114~14.04.1","4.15.0-1106.118~14.04.1","4.15.0-1108.120~14.04.1","4.15.0-1109.121~14.04.1","4.15.0-1110.122~14.04.1","4.15.0-1111.123~14.04.1","4.15.0-1112.124~14.04.1","4.15.0-1113.126~14.04.1","4.15.0-1114.127~14.04.1","4.15.0-1115.128~14.04.1","4.15.0-1118.131~14.04.1","4.15.0-1121.134~14.04.1","4.15.0-1122.135~14.04.1","4.15.0-1123.136~14.04.1","4.15.0-1124.137~14.04.1","4.15.0-1125.138~14.04.1","4.15.0-1126.139~14.04.1","4.15.0-1127.140~14.04.1","4.15.0-1129.142~14.04.1","4.15.0-1130.143~14.04.1","4.15.0-1131.144~14.04.1","4.15.0-1133.146~14.04.1","4.15.0-1134.147~14.04.1","4.15.0-1136.149~14.04.1","4.15.0-1137.150~14.04.1","4.15.0-1138.151~14.04.1","4.15.0-1139.152~14.04.1","4.15.0-1142.156~14.04.1","4.15.0-1145.160~14.04.1","4.15.0-1146.161~14.04.1","4.15.0-1149.164~14.04.1","4.15.0-1150.165~14.04.1","4.15.0-1151.166~14.04.1","4.15.0-1153.168~14.04.1","4.15.0-1157.172~14.04.2","4.15.0-1158.173~14.04.1","4.15.0-1159.174~14.04.1","4.15.0-1162.177~14.04.1","4.15.0-1163.178~14.04.1","4.15.0-1164.179~14.04.1","4.15.0-1165.180~14.04.1","4.15.0-1166.181~14.04.1","4.15.0-1167.182~14.04.1","4.15.0-1168.183~14.04.1","4.15.0-1169.184~14.04.1","4.15.0-1170.185~14.04.1","4.15.0-1171.186~14.04.1","4.15.0-1172.187~14.04.1","4.15.0-1173.188~14.04.1","4.15.0-1174.189~14.04.1","4.15.0-1175.190~14.04.1","4.15.0-1176.191~14.04.1","4.15.0-1177.192~14.04.1","4.15.0-1178.193~14.04.1","4.15.0-1179.194~14.04.1","4.15.0-1180.195~14.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"4.15.0-1181.196~14.04.1","binary_name":"linux-azure-cloud-tools-4.15.0-1181"},{"binary_version":"4.15.0-1181.196~14.04.1","binary_name":"linux-azure-headers-4.15.0-1181"},{"binary_version":"4.15.0-1181.196~14.04.1","binary_name":"linux-azure-tools-4.15.0-1181"},{"binary_version":"4.15.0-1181.196~14.04.1","binary_name":"linux-buildinfo-4.15.0-1181-azure"},{"binary_version":"4.15.0-1181.196~14.04.1","binary_name":"linux-cloud-tools-4.15.0-1181-azure"},{"binary_version":"4.15.0-1181.196~14.04.1","binary_name":"linux-headers-4.15.0-1181-azure"},{"binary_version":"4.15.0-1181.196~14.04.1","binary_name":"linux-image-unsigned-4.15.0-1181-azure"},{"binary_version":"4.15.0-1181.196~14.04.1","binary_name":"linux-modules-4.15.0-1181-azure"},{"binary_version":"4.15.0-1181.196~14.04.1","binary_name":"linux-modules-extra-4.15.0-1181-azure"},{"binary_version":"4.15.0-1181.196~14.04.1","binary_name":"linux-tools-4.15.0-1181-azure"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2021-47188","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-48791","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-48863","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2023-52527","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2023-52809","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2024-26651","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2024-26677","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2024-26733","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2024-26851","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2024-26880","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2024-26984","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2024-27398","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2024-27437","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2024-38570","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2024-38583","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2024-39480","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"negligible","type":"Ubuntu"}]},{"id":"CVE-2024-39495","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2024-40902","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2024-42154","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2024-42160","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2024-42224","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2024-42228","severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:Pro:14.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7028-2.json"}}],"schema_version":"1.7.3"}