{"id":"USN-7511-3","summary":"linux-gke vulnerabilities","details":"Several security issues were discovered in the Linux kernel.\nAn attacker could possibly use these to compromise the system.\nThis update corrects flaws in the following subsystems:\n  - ARM64 architecture;\n  - PowerPC architecture;\n  - x86 architecture;\n  - Block layer subsystem;\n  - Network block device driver;\n  - Bus devices;\n  - Character device driver;\n  - TPM device driver;\n  - Clock framework and drivers;\n  - GPIO subsystem;\n  - GPU drivers;\n  - HID subsystem;\n  - I2C subsystem;\n  - InfiniBand drivers;\n  - Media drivers;\n  - NVIDIA Tegra memory controller driver;\n  - Network drivers;\n  - PCI subsystem;\n  - PPS (Pulse Per Second) driver;\n  - PTP clock framework;\n  - RapidIO drivers;\n  - Real Time Clock drivers;\n  - SLIMbus drivers;\n  - QCOM SoC drivers;\n  - Trusted Execution Environment drivers;\n  - TTY drivers;\n  - USB DSL drivers;\n  - USB Device Class drivers;\n  - USB core drivers;\n  - USB Gadget drivers;\n  - USB Host Controller drivers;\n  - Renesas USBHS Controller drivers;\n  - ACRN Hypervisor Service Module driver;\n  - File systems infrastructure;\n  - BTRFS file system;\n  - F2FS file system;\n  - Network file system (NFS) server daemon;\n  - NILFS2 file system;\n  - Overlay file system;\n  - SMB network file system;\n  - UBI file system;\n  - KVM subsystem;\n  - L3 Master device support module;\n  - Process Accounting mechanism;\n  - Padata parallel execution mechanism;\n  - printk logging mechanism;\n  - Scheduler infrastructure;\n  - Timer subsystem;\n  - Tracing infrastructure;\n  - Memory management;\n  - 802.1Q VLAN protocol;\n  - B.A.T.M.A.N. meshing protocol;\n  - Networking core;\n  - IPv4 networking;\n  - IPv6 networking;\n  - Logical Link layer;\n  - Multipath TCP;\n  - Netfilter;\n  - NFC subsystem;\n  - Open vSwitch;\n  - Rose network layer;\n  - Network traffic control;\n  - Wireless networking;\n  - Landlock security;\n  - Linux Security Modules (LSM) Framework;\n  - Tomoyo security module;\n(CVE-2024-58002, CVE-2025-21767, CVE-2024-58051, CVE-2025-21909,\nCVE-2025-21866, CVE-2025-21823, CVE-2025-21922, CVE-2025-21804,\nCVE-2024-58069, CVE-2025-21761, CVE-2025-21799, CVE-2024-58034,\nCVE-2025-21826, CVE-2024-58007, CVE-2025-21948, CVE-2025-21910,\nCVE-2025-21748, CVE-2024-57834, CVE-2025-21926, CVE-2025-21722,\nCVE-2024-58072, CVE-2024-58086, CVE-2025-21914, CVE-2025-21802,\nCVE-2025-21916, CVE-2025-21943, CVE-2025-21830, CVE-2025-21950,\nCVE-2025-21736, CVE-2024-58014, CVE-2025-21785, CVE-2025-21766,\nCVE-2025-21878, CVE-2024-56721, CVE-2025-21707, CVE-2025-21904,\nCVE-2025-21782, CVE-2025-21776, CVE-2025-21726, CVE-2025-21862,\nCVE-2024-57986, CVE-2025-21647, CVE-2025-21887, CVE-2025-21877,\nCVE-2024-44964, CVE-2024-58052, CVE-2025-21796, CVE-2024-58085,\nCVE-2025-21934, CVE-2025-21760, CVE-2025-21924, CVE-2024-57979,\nCVE-2025-21875, CVE-2024-58083, CVE-2025-21811, CVE-2025-21749,\nCVE-2025-21814, CVE-2025-21727, CVE-2025-21715, CVE-2025-21684,\nCVE-2025-21917, CVE-2025-21731, CVE-2024-58016, CVE-2024-58090,\nCVE-2025-21865, CVE-2024-58010, CVE-2025-21719, CVE-2025-21925,\nCVE-2025-21846, CVE-2024-58020, CVE-2024-58017, CVE-2024-58063,\nCVE-2025-21844, CVE-2024-58079, CVE-2024-58055, CVE-2024-57981,\nCVE-2024-56599, CVE-2024-26982, CVE-2025-21835, CVE-2025-21935,\nCVE-2024-58005, CVE-2025-21791, CVE-2024-57977, CVE-2024-57978,\nCVE-2025-21806, CVE-2025-21772, CVE-2025-21859, CVE-2025-21728,\nCVE-2025-21781, CVE-2024-57980, CVE-2025-21744, CVE-2025-21721,\nCVE-2025-21718, CVE-2025-21858, CVE-2025-21704, CVE-2025-21905,\nCVE-2025-21951, CVE-2025-21971, CVE-2025-21848, CVE-2025-21745,\nCVE-2025-21928, CVE-2024-58076, CVE-2025-21763, CVE-2025-21762,\nCVE-2025-21919, CVE-2025-21708, CVE-2025-21795, CVE-2024-57973,\nCVE-2025-21753, CVE-2025-21912, CVE-2024-47726, CVE-2024-35889,\nCVE-2024-58071, CVE-2025-21787, CVE-2025-21871, CVE-2025-21711,\nCVE-2025-21765, CVE-2024-58058, CVE-2025-21898, CVE-2025-21735,\nCVE-2025-21758, CVE-2025-21820, CVE-2025-21779, CVE-2025-21920,\nCVE-2024-58001, CVE-2025-21764)\n","modified":"2026-04-24T10:17:22.661050504Z","published":"2025-05-20T16:49:57Z","related":["UBUNTU-CVE-2024-26982","UBUNTU-CVE-2024-35889","UBUNTU-CVE-2024-44964","UBUNTU-CVE-2024-47726","UBUNTU-CVE-2024-56599","UBUNTU-CVE-2024-56721","UBUNTU-CVE-2024-57834","UBUNTU-CVE-2024-57973","UBUNTU-CVE-2024-57977","UBUNTU-CVE-2024-57978","UBUNTU-CVE-2024-57979","UBUNTU-CVE-2024-57980","UBUNTU-CVE-2024-57981","UBUNTU-CVE-2024-57986","UBUNTU-CVE-2024-58001","UBUNTU-CVE-2024-58002","UBUNTU-CVE-2024-58005","UBUNTU-CVE-2024-58007","UBUNTU-CVE-2024-58010","UBUNTU-CVE-2024-58014","UBUNTU-CVE-2024-58016","UBUNTU-CVE-2024-58017","UBUNTU-CVE-2024-58020","UBUNTU-CVE-2024-58034","UBUNTU-CVE-2024-58051","UBUNTU-CVE-2024-58052","UBUNTU-CVE-2024-58055","UBUNTU-CVE-2024-58058","UBUNTU-CVE-2024-58063","UBUNTU-CVE-2024-58069","UBUNTU-CVE-2024-58071","UBUNTU-CVE-2024-58072","UBUNTU-CVE-2024-58076","UBUNTU-CVE-2024-58079","UBUNTU-CVE-2024-58083","UBUNTU-CVE-2024-58085","UBUNTU-CVE-2024-58086","UBUNTU-CVE-2024-58090","UBUNTU-CVE-2025-21647","UBUNTU-CVE-2025-21684","UBUNTU-CVE-2025-21704","UBUNTU-CVE-2025-21707","UBUNTU-CVE-2025-21708","UBUNTU-CVE-2025-21711","UBUNTU-CVE-2025-21715","UBUNTU-CVE-2025-21718","UBUNTU-CVE-2025-21719","UBUNTU-CVE-2025-21721","UBUNTU-CVE-2025-21722","UBUNTU-CVE-2025-21726","UBUNTU-CVE-2025-21727","UBUNTU-CVE-2025-21728","UBUNTU-CVE-2025-21731","UBUNTU-CVE-2025-21735","UBUNTU-CVE-2025-21736","UBUNTU-CVE-2025-21744","UBUNTU-CVE-2025-21745","UBUNTU-CVE-2025-21748","UBUNTU-CVE-2025-21749","UBUNTU-CVE-2025-21753","UBUNTU-CVE-2025-21758","UBUNTU-CVE-2025-21760","UBUNTU-CVE-2025-21761","UBUNTU-CVE-2025-21762","UBUNTU-CVE-2025-21763","UBUNTU-CVE-2025-21764","UBUNTU-CVE-2025-21765","UBUNTU-CVE-2025-21766","UBUNTU-CVE-2025-21767","UBUNTU-CVE-2025-21772","UBUNTU-CVE-2025-21776","UBUNTU-CVE-2025-21779","UBUNTU-CVE-2025-21781","UBUNTU-CVE-2025-21782","UBUNTU-CVE-2025-21785","UBUNTU-CVE-2025-21787","UBUNTU-CVE-2025-21791","UBUNTU-CVE-2025-21795","UBUNTU-CVE-2025-21796","UBUNTU-CVE-2025-21799","UBUNTU-CVE-2025-21802","UBUNTU-CVE-2025-21804","UBUNTU-CVE-2025-21806","UBUNTU-CVE-2025-21811","UBUNTU-CVE-2025-21814","UBUNTU-CVE-2025-21820","UBUNTU-CVE-2025-21823","UBUNTU-CVE-2025-21826","UBUNTU-CVE-2025-21830","UBUNTU-CVE-2025-21835","UBUNTU-CVE-2025-21844","UBUNTU-CVE-2025-21846","UBUNTU-CVE-2025-21848","UBUNTU-CVE-2025-21858","UBUNTU-CVE-2025-21859","UBUNTU-CVE-2025-21862","UBUNTU-CVE-2025-21865","UBUNTU-CVE-2025-21866","UBUNTU-CVE-2025-21871","UBUNTU-CVE-2025-21875","UBUNTU-CVE-2025-21877","UBUNTU-CVE-2025-21878","UBUNTU-CVE-2025-21887","UBUNTU-CVE-2025-21898","UBUNTU-CVE-2025-21904","UBUNTU-CVE-2025-21905","UBUNTU-CVE-2025-21909","UBUNTU-CVE-2025-21910","UBUNTU-CVE-2025-21912","UBUNTU-CVE-2025-21914","UBUNTU-CVE-2025-21916","UBUNTU-CVE-2025-21917","UBUNTU-CVE-2025-21919","UBUNTU-CVE-2025-21920","UBUNTU-CVE-2025-21922","UBUNTU-CVE-2025-21924","UBUNTU-CVE-2025-21925","UBUNTU-CVE-2025-21926","UBUNTU-CVE-2025-21928","UBUNTU-CVE-2025-21934","UBUNTU-CVE-2025-21935","UBUNTU-CVE-2025-21943","UBUNTU-CVE-2025-21948","UBUNTU-CVE-2025-21950","UBUNTU-CVE-2025-21951","UBUNTU-CVE-2025-21971"],"upstream":["CVE-2024-35889","UBUNTU-CVE-2024-35889"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7511-3"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-35889"}],"affected":[{"package":{"name":"linux-gke","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/linux-gke@5.15.0-1081.87?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.15.0-1081.87"}]}],"versions":["5.15.0-1002.2","5.15.0-1003.3","5.15.0-1004.5","5.15.0-1005.6","5.15.0-1006.7","5.15.0-1008.10","5.15.0-1010.13","5.15.0-1011.14","5.15.0-1014.17","5.15.0-1015.18","5.15.0-1016.19","5.15.0-1017.20","5.15.0-1019.23","5.15.0-1020.25","5.15.0-1023.28","5.15.0-1024.29","5.15.0-1027.32","5.15.0-1028.33","5.15.0-1030.35","5.15.0-1031.36","5.15.0-1032.37","5.15.0-1033.38","5.15.0-1034.39","5.15.0-1035.40","5.15.0-1036.41","5.15.0-1037.42","5.15.0-1038.43","5.15.0-1039.44","5.15.0-1040.45","5.15.0-1041.46","5.15.0-1042.47","5.15.0-1044.49","5.15.0-1045.50","5.15.0-1046.51","5.15.0-1047.52","5.15.0-1048.53","5.15.0-1049.54","5.15.0-1050.55","5.15.0-1051.56","5.15.0-1052.57","5.15.0-1053.58","5.15.0-1054.59","5.15.0-1057.62","5.15.0-1058.63","5.15.0-1059.64","5.15.0-1060.66","5.15.0-1061.67","5.15.0-1062.68","5.15.0-1063.69","5.15.0-1064.70","5.15.0-1065.71","5.15.0-1066.72","5.15.0-1067.73","5.15.0-1068.74","5.15.0-1069.75","5.15.0-1070.76","5.15.0-1071.77","5.15.0-1072.78","5.15.0-1073.79","5.15.0-1075.81","5.15.0-1076.82","5.15.0-1077.83","5.15.0-1078.84","5.15.0-1079.85","5.15.0-1080.86"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"linux-buildinfo-5.15.0-1081-gke","binary_version":"5.15.0-1081.87"},{"binary_name":"linux-gke-headers-5.15.0-1081","binary_version":"5.15.0-1081.87"},{"binary_name":"linux-gke-tools-5.15.0-1081","binary_version":"5.15.0-1081.87"},{"binary_name":"linux-headers-5.15.0-1081-gke","binary_version":"5.15.0-1081.87"},{"binary_name":"linux-image-unsigned-5.15.0-1081-gke","binary_version":"5.15.0-1081.87"},{"binary_name":"linux-modules-5.15.0-1081-gke","binary_version":"5.15.0-1081.87"},{"binary_name":"linux-modules-extra-5.15.0-1081-gke","binary_version":"5.15.0-1081.87"},{"binary_name":"linux-tools-5.15.0-1081-gke","binary_version":"5.15.0-1081.87"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:22.04:LTS","cves":[{"id":"CVE-2024-35889","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7511-3.json"}}],"schema_version":"1.7.5"}