{"id":"USN-8015-5","summary":"linux-lowlatency, linux-xilinx vulnerabilities","details":"Several security issues were discovered in the Linux kernel.\nAn attacker could possibly use these to compromise the system.\nThis update corrects flaws in the following subsystems:\n  - Cryptographic API;\n  - SMB network file system;\n  - io_uring subsystem;\n(CVE-2025-38561, CVE-2025-39698, CVE-2025-40019)\n","modified":"2026-02-23T07:13:58.207640Z","published":"2026-02-20T13:23:45Z","related":["UBUNTU-CVE-2025-38561","UBUNTU-CVE-2025-39698","UBUNTU-CVE-2025-40019"],"upstream":["CVE-2025-38561","CVE-2025-39698","CVE-2025-40019","UBUNTU-CVE-2025-38561","UBUNTU-CVE-2025-39698","UBUNTU-CVE-2025-40019"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-8015-5"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-38561"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-39698"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-40019"}],"affected":[{"package":{"name":"linux-lowlatency","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/linux-lowlatency@6.8.0-94.96.1?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.8.0-94.96.1"}]}],"versions":["6.5.0-9.9.1","6.6.0-14.14.1","6.8.0-7.7.1","6.8.0-25.25.3","6.8.0-28.28.1","6.8.0-31.31.1","6.8.0-35.35.1","6.8.0-36.36.1","6.8.0-38.38.1","6.8.0-39.39.1","6.8.0-40.40.1","6.8.0-41.41.1","6.8.0-44.44.1","6.8.0-45.45.1","6.8.0-47.47.1","6.8.0-48.48.3","6.8.0-49.49.1","6.8.0-50.51.1","6.8.0-51.52.1","6.8.0-52.53.1","6.8.0-53.55.2","6.8.0-54.56.1","6.8.0-55.57.1","6.8.0-56.58.1","6.8.0-57.59.1","6.8.0-58.60.1","6.8.0-59.61.1","6.8.0-60.63.1","6.8.0-62.65.1","6.8.0-63.66.1","6.8.0-64.67.1","6.8.0-65.68.1","6.8.0-78.78.1","6.8.0-79.79.1","6.8.0-83.83.1","6.8.0-84.84.1","6.8.0-85.85.1","6.8.0-86.87.1","6.8.0-87.88.1","6.8.0-88.89.1","6.8.0-90.91.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"6.8.0-94.96.1","binary_name":"linux-buildinfo-6.8.0-94-lowlatency"},{"binary_version":"6.8.0-94.96.1","binary_name":"linux-buildinfo-6.8.0-94-lowlatency-64k"},{"binary_version":"6.8.0-94.96.1","binary_name":"linux-cloud-tools-6.8.0-94-lowlatency"},{"binary_version":"6.8.0-94.96.1","binary_name":"linux-headers-6.8.0-94-lowlatency"},{"binary_version":"6.8.0-94.96.1","binary_name":"linux-headers-6.8.0-94-lowlatency-64k"},{"binary_version":"6.8.0-94.96.1","binary_name":"linux-image-unsigned-6.8.0-94-lowlatency"},{"binary_version":"6.8.0-94.96.1","binary_name":"linux-image-unsigned-6.8.0-94-lowlatency-64k"},{"binary_version":"6.8.0-94.96.1","binary_name":"linux-lowlatency-cloud-tools-6.8.0-94"},{"binary_version":"6.8.0-94.96.1","binary_name":"linux-lowlatency-headers-6.8.0-94"},{"binary_version":"6.8.0-94.96.1","binary_name":"linux-lowlatency-lib-rust-6.8.0-94-lowlatency"},{"binary_version":"6.8.0-94.96.1","binary_name":"linux-lowlatency-tools-6.8.0-94"},{"binary_version":"6.8.0-94.96.1","binary_name":"linux-modules-6.8.0-94-lowlatency"},{"binary_version":"6.8.0-94.96.1","binary_name":"linux-modules-6.8.0-94-lowlatency-64k"},{"binary_version":"6.8.0-94.96.1","binary_name":"linux-modules-iwlwifi-6.8.0-94-lowlatency"},{"binary_version":"6.8.0-94.96.1","binary_name":"linux-tools-6.8.0-94-lowlatency"},{"binary_version":"6.8.0-94.96.1","binary_name":"linux-tools-6.8.0-94-lowlatency-64k"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8015-5.json","cves_map":{"ecosystem":"Ubuntu:24.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2025-38561"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2025-39698"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2025-40019"}]}}},{"package":{"name":"linux-xilinx","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/linux-xilinx@6.8.0-1022.23?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.8.0-1022.23"}]}],"versions":["6.8.0-1008.9","6.8.0-1009.10","6.8.0-1011.12","6.8.0-1012.13","6.8.0-1013.14","6.8.0-1014.15","6.8.0-1015.16","6.8.0-1017.18","6.8.0-1018.19","6.8.0-1019.20","6.8.0-1020.21","6.8.0-1021.22"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"6.8.0-1022.23","binary_name":"linux-buildinfo-6.8.0-1022-xilinx"},{"binary_version":"6.8.0-1022.23","binary_name":"linux-headers-6.8.0-1022-xilinx"},{"binary_version":"6.8.0-1022.23","binary_name":"linux-image-6.8.0-1022-xilinx"},{"binary_version":"6.8.0-1022.23","binary_name":"linux-modules-6.8.0-1022-xilinx"},{"binary_version":"6.8.0-1022.23","binary_name":"linux-tools-6.8.0-1022-xilinx"},{"binary_version":"6.8.0-1022.23","binary_name":"linux-xilinx-headers-6.8.0-1022"},{"binary_version":"6.8.0-1022.23","binary_name":"linux-xilinx-tools-6.8.0-1022"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8015-5.json","cves_map":{"ecosystem":"Ubuntu:24.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2025-38561"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2025-39698"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2025-40019"}]}}}],"schema_version":"1.7.3"}