{"id":"USN-7455-3","summary":"linux-intel-iot-realtime, linux-realtime vulnerabilities","details":"Jann Horn discovered that the watch_queue event notification subsystem in\nthe Linux kernel contained an out-of-bounds write vulnerability. A local\nattacker could use this to cause a denial of service (system crash) or\nescalate their privileges. (CVE-2022-0995)\n\nSeveral security issues were discovered in the Linux kernel.\nAn attacker could possibly use these to compromise the system.\nThis update corrects flaws in the following subsystems:\n  - Network drivers;\n  - File systems infrastructure;\n  - NTFS3 file system;\n  - Ethernet bridge;\n  - Ethtool driver;\n  - IPv6 networking;\n  - Network traffic control;\n  - VMware vSockets driver;\n(CVE-2024-56651, CVE-2025-21756, CVE-2024-26837, CVE-2025-21700,\nCVE-2024-46826, CVE-2024-50256, CVE-2024-50248, CVE-2025-21993,\nCVE-2025-21702, CVE-2025-21701, CVE-2025-21703)\n","modified":"2026-04-07T10:37:39.207218Z","published":"2025-04-24T12:34:52Z","related":["UBUNTU-CVE-2022-0995","UBUNTU-CVE-2024-26837","UBUNTU-CVE-2024-46826","UBUNTU-CVE-2024-50248","UBUNTU-CVE-2024-50256","UBUNTU-CVE-2024-56651","UBUNTU-CVE-2025-21700","UBUNTU-CVE-2025-21701","UBUNTU-CVE-2025-21702","UBUNTU-CVE-2025-21703","UBUNTU-CVE-2025-21756","UBUNTU-CVE-2025-21993"],"upstream":["CVE-2022-0995","CVE-2024-26837","CVE-2024-46826","CVE-2024-50248","CVE-2024-50256","CVE-2024-56651","CVE-2025-21700","CVE-2025-21701","CVE-2025-21702","CVE-2025-21703","CVE-2025-21756","CVE-2025-21993","UBUNTU-CVE-2022-0995","UBUNTU-CVE-2024-26837","UBUNTU-CVE-2024-46826","UBUNTU-CVE-2024-50248","UBUNTU-CVE-2024-50256","UBUNTU-CVE-2024-56651","UBUNTU-CVE-2025-21700","UBUNTU-CVE-2025-21701","UBUNTU-CVE-2025-21702","UBUNTU-CVE-2025-21703","UBUNTU-CVE-2025-21756","UBUNTU-CVE-2025-21993"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7455-3"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-0995"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26837"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-46826"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-50248"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-50256"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-56651"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-21700"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-21701"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-21702"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-21703"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-21756"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-21993"}],"affected":[{"package":{"name":"linux-intel-iot-realtime","ecosystem":"Ubuntu:Pro:Realtime:22.04:LTS","purl":"pkg:deb/ubuntu/linux-intel-iot-realtime@5.15.0-1075.77?arch=source&distro=realtime/jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.15.0-1075.77"}]}],"versions":["5.15.0-1021.26","5.15.0-1022.27","5.15.0-1023.28","5.15.0-1024.29","5.15.0-1028.33","5.15.0-1033.35","5.15.0-1034.36","5.15.0-1035.37","5.15.0-1036.38","5.15.0-1037.39","5.15.0-1038.40","5.15.0-1039.41","5.15.0-1040.42","5.15.0-1041.43","5.15.0-1042.44","5.15.0-1043.45","5.15.0-1044.46","5.15.0-1046.48","5.15.0-1047.49","5.15.0-1048.50","5.15.0-1049.51","5.15.0-1050.52","5.15.0-1053.55","5.15.0-1054.56","5.15.0-1055.57","5.15.0-1056.58","5.15.0-1057.59","5.15.0-1058.60","5.15.0-1059.61","5.15.0-1060.62","5.15.0-1061.63","5.15.0-1063.65","5.15.0-1064.66","5.15.0-1066.68","5.15.0-1071.73","5.15.0-1072.74","5.15.0-1073.75","5.15.0-1074.76"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro","binaries":[{"binary_name":"linux-buildinfo-5.15.0-1075-intel-iot-realtime","binary_version":"5.15.0-1075.77"},{"binary_name":"linux-cloud-tools-5.15.0-1075-intel-iot-realtime","binary_version":"5.15.0-1075.77"},{"binary_name":"linux-headers-5.15.0-1075-intel-iot-realtime","binary_version":"5.15.0-1075.77"},{"binary_name":"linux-image-unsigned-5.15.0-1075-intel-iot-realtime","binary_version":"5.15.0-1075.77"},{"binary_name":"linux-intel-iot-realtime-cloud-tools-5.15.0-1075","binary_version":"5.15.0-1075.77"},{"binary_name":"linux-intel-iot-realtime-cloud-tools-common","binary_version":"5.15.0-1075.77"},{"binary_name":"linux-intel-iot-realtime-headers-5.15.0-1075","binary_version":"5.15.0-1075.77"},{"binary_name":"linux-intel-iot-realtime-tools-5.15.0-1075","binary_version":"5.15.0-1075.77"},{"binary_name":"linux-intel-iot-realtime-tools-common","binary_version":"5.15.0-1075.77"},{"binary_name":"linux-intel-iot-realtime-tools-host","binary_version":"5.15.0-1075.77"},{"binary_name":"linux-modules-5.15.0-1075-intel-iot-realtime","binary_version":"5.15.0-1075.77"},{"binary_name":"linux-modules-extra-5.15.0-1075-intel-iot-realtime","binary_version":"5.15.0-1075.77"},{"binary_name":"linux-tools-5.15.0-1075-intel-iot-realtime","binary_version":"5.15.0-1075.77"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:Pro:Realtime:22.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2022-0995"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-26837"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2024-46826"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-50248"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-50256"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-56651"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2025-21700"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2025-21701"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2025-21702"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2025-21703"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2025-21756"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2025-21993"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7455-3.json"}},{"package":{"name":"linux-realtime","ecosystem":"Ubuntu:Pro:Realtime:22.04:LTS","purl":"pkg:deb/ubuntu/linux-realtime@5.15.0-1082.91?arch=source&distro=realtime/jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.15.0-1082.91"}]}],"versions":["5.15.0-1006.6","5.15.0-1007.7","5.15.0-1009.9","5.15.0-1011.11","5.15.0-1014.14","5.15.0-1015.15","5.15.0-1016.16","5.15.0-1019.19","5.15.0-1020.20","5.15.0-1021.21","5.15.0-1022.22","5.15.0-1024.25","5.15.0-1025.28","5.15.0-1028.31","5.15.0-1029.32","5.15.0-1030.33","5.15.0-1032.35","5.15.0-1033.36","5.15.0-1034.37","5.15.0-1036.39","5.15.0-1037.40","5.15.0-1038.41","5.15.0-1039.42","5.15.0-1040.45","5.15.0-1041.46","5.15.0-1042.47","5.15.0-1043.48","5.15.0-1044.49","5.15.0-1045.50","5.15.0-1046.52","5.15.0-1048.54","5.15.0-1049.55","5.15.0-1050.56","5.15.0-1051.57","5.15.0-1052.58","5.15.0-1053.59","5.15.0-1054.60","5.15.0-1055.62","5.15.0-1056.63","5.15.0-1057.64","5.15.0-1058.66","5.15.0-1061.69","5.15.0-1062.70","5.15.0-1063.71","5.15.0-1064.72","5.15.0-1065.73","5.15.0-1066.74","5.15.0-1067.75","5.15.0-1068.76","5.15.0-1069.77","5.15.0-1070.78","5.15.0-1071.79","5.15.0-1072.80","5.15.0-1073.81","5.15.0-1074.82","5.15.0-1075.83","5.15.0-1076.84","5.15.0-1077.85","5.15.0-1078.86","5.15.0-1079.87","5.15.0-1080.88","5.15.0-1081.89"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro","binaries":[{"binary_name":"linux-buildinfo-5.15.0-1082-realtime","binary_version":"5.15.0-1082.91"},{"binary_name":"linux-cloud-tools-5.15.0-1082-realtime","binary_version":"5.15.0-1082.91"},{"binary_name":"linux-headers-5.15.0-1082-realtime","binary_version":"5.15.0-1082.91"},{"binary_name":"linux-image-unsigned-5.15.0-1082-realtime","binary_version":"5.15.0-1082.91"},{"binary_name":"linux-modules-5.15.0-1082-realtime","binary_version":"5.15.0-1082.91"},{"binary_name":"linux-modules-extra-5.15.0-1082-realtime","binary_version":"5.15.0-1082.91"},{"binary_name":"linux-modules-iwlwifi-5.15.0-1082-realtime","binary_version":"5.15.0-1082.91"},{"binary_name":"linux-realtime-cloud-tools-5.15.0-1082","binary_version":"5.15.0-1082.91"},{"binary_name":"linux-realtime-cloud-tools-common","binary_version":"5.15.0-1082.91"},{"binary_name":"linux-realtime-headers-5.15.0-1082","binary_version":"5.15.0-1082.91"},{"binary_name":"linux-realtime-tools-5.15.0-1082","binary_version":"5.15.0-1082.91"},{"binary_name":"linux-realtime-tools-common","binary_version":"5.15.0-1082.91"},{"binary_name":"linux-realtime-tools-host","binary_version":"5.15.0-1082.91"},{"binary_name":"linux-tools-5.15.0-1082-realtime","binary_version":"5.15.0-1082.91"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:Pro:Realtime:22.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2022-0995"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-26837"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2024-46826"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-50248"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-50256"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-56651"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2025-21700"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2025-21701"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2025-21702"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2025-21703"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2025-21756"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2025-21993"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7455-3.json"}}],"schema_version":"1.7.5"}