{"id":"USN-7021-2","summary":"linux-ibm-5.15, linux-oracle-5.15, linux-xilinx-zynqmp vulnerabilities","details":"Several security issues were discovered in the Linux kernel.\nAn attacker could possibly use these to compromise the system.\nThis update corrects flaws in the following subsystems:\n  - GPU drivers;\n  - BTRFS file system;\n  - F2FS file system;\n  - GFS2 file system;\n  - BPF subsystem;\n  - Netfilter;\n  - RxRPC session sockets;\n  - Integrity Measurement Architecture(IMA) framework;\n(CVE-2024-27012, CVE-2024-39496, CVE-2024-26677, CVE-2024-42228,\nCVE-2024-38570, CVE-2024-39494, CVE-2024-42160, CVE-2024-41009)\n","modified":"2026-02-10T04:45:26Z","published":"2024-09-23T17:02:44Z","related":["UBUNTU-CVE-2024-26677","UBUNTU-CVE-2024-27012","UBUNTU-CVE-2024-38570","UBUNTU-CVE-2024-39494","UBUNTU-CVE-2024-39496","UBUNTU-CVE-2024-41009","UBUNTU-CVE-2024-42160","UBUNTU-CVE-2024-42228"],"upstream":["CVE-2024-26677","CVE-2024-27012","CVE-2024-38570","CVE-2024-39494","CVE-2024-39496","CVE-2024-41009","CVE-2024-42160","CVE-2024-42228","UBUNTU-CVE-2024-26677","UBUNTU-CVE-2024-27012","UBUNTU-CVE-2024-38570","UBUNTU-CVE-2024-39494","UBUNTU-CVE-2024-39496","UBUNTU-CVE-2024-41009","UBUNTU-CVE-2024-42160","UBUNTU-CVE-2024-42228"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7021-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26677"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-27012"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-38570"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-39494"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-39496"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-41009"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-42160"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-42228"}],"affected":[{"package":{"name":"linux-ibm-5.15","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/linux-ibm-5.15@5.15.0-1063.66~20.04.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.15.0-1063.66~20.04.1"}]}],"versions":["5.15.0-1033.36~20.04.1","5.15.0-1034.37~20.04.1","5.15.0-1035.38~20.04.1","5.15.0-1036.39~20.04.1","5.15.0-1037.40~20.04.1","5.15.0-1038.41~20.04.1","5.15.0-1040.43~20.04.1","5.15.0-1041.44~20.04.1","5.15.0-1042.45~20.04.1","5.15.0-1043.46~20.04.1","5.15.0-1044.47~20.04.1","5.15.0-1045.48~20.04.1","5.15.0-1046.49~20.04.1","5.15.0-1047.50~20.04.1","5.15.0-1048.51~20.04.1","5.15.0-1049.52~20.04.1","5.15.0-1050.53~20.04.1","5.15.0-1053.56~20.04.1","5.15.0-1054.57~20.04.1","5.15.0-1055.58~20.04.1","5.15.0-1057.60~20.04.1","5.15.0-1058.61~20.04.1","5.15.0-1059.62~20.04.1","5.15.0-1060.63~20.04.1","5.15.0-1061.64~20.04.1","5.15.0-1062.65~20.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"5.15.0-1063.66~20.04.1","binary_name":"linux-buildinfo-5.15.0-1063-ibm"},{"binary_version":"5.15.0-1063.66~20.04.1","binary_name":"linux-headers-5.15.0-1063-ibm"},{"binary_version":"5.15.0-1063.66~20.04.1","binary_name":"linux-ibm-5.15-headers-5.15.0-1063"},{"binary_version":"5.15.0-1063.66~20.04.1","binary_name":"linux-ibm-5.15-source-5.15.0"},{"binary_version":"5.15.0-1063.66~20.04.1","binary_name":"linux-ibm-5.15-tools-5.15.0-1063"},{"binary_version":"5.15.0-1063.66~20.04.1","binary_name":"linux-image-unsigned-5.15.0-1063-ibm"},{"binary_version":"5.15.0-1063.66~20.04.1","binary_name":"linux-modules-5.15.0-1063-ibm"},{"binary_version":"5.15.0-1063.66~20.04.1","binary_name":"linux-modules-extra-5.15.0-1063-ibm"},{"binary_version":"5.15.0-1063.66~20.04.1","binary_name":"linux-tools-5.15.0-1063-ibm"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-26677"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-27012"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-38570"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-39494"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-39496"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-41009"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-42160"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-42228"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7021-2.json"}},{"package":{"name":"linux-oracle-5.15","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/linux-oracle-5.15@5.15.0-1068.74~20.04.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.15.0-1068.74~20.04.1"}]}],"versions":["5.15.0-1007.9~20.04.1","5.15.0-1013.17~20.04.1","5.15.0-1016.20~20.04.1","5.15.0-1017.22~20.04.1","5.15.0-1018.23~20.04.1","5.15.0-1019.24~20.04.1","5.15.0-1021.27~20.04.1","5.15.0-1022.28~20.04.1","5.15.0-1025.31~20.04.2","5.15.0-1027.33~20.04.1","5.15.0-1029.35~20.04.1","5.15.0-1030.36~20.04.1","5.15.0-1032.38~20.04.1","5.15.0-1033.39~20.04.1","5.15.0-1034.40~20.04.1","5.15.0-1035.41~20.04.1","5.15.0-1036.42~20.04.1","5.15.0-1037.43~20.04.1","5.15.0-1038.44~20.04.1","5.15.0-1039.45~20.04.1","5.15.0-1040.46~20.04.1","5.15.0-1041.47~20.04.1","5.15.0-1042.48~20.04.1","5.15.0-1044.50~20.04.1","5.15.0-1045.51~20.04.1","5.15.0-1046.52~20.04.1","5.15.0-1047.53~20.04.1","5.15.0-1048.54~20.04.1","5.15.0-1049.55~20.04.1","5.15.0-1050.56~20.04.1","5.15.0-1051.57~20.04.1","5.15.0-1052.58~20.04.1","5.15.0-1053.59~20.04.1","5.15.0-1054.60~20.04.1","5.15.0-1055.61~20.04.1","5.15.0-1058.64~20.04.1","5.15.0-1059.65~20.04.1","5.15.0-1061.67~20.04.1","5.15.0-1062.68~20.04.1","5.15.0-1063.69~20.04.1","5.15.0-1065.71~20.04.1","5.15.0-1066.72~20.04.1","5.15.0-1067.73~20.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"5.15.0-1068.74~20.04.1","binary_name":"linux-buildinfo-5.15.0-1068-oracle"},{"binary_version":"5.15.0-1068.74~20.04.1","binary_name":"linux-headers-5.15.0-1068-oracle"},{"binary_version":"5.15.0-1068.74~20.04.1","binary_name":"linux-image-unsigned-5.15.0-1068-oracle"},{"binary_version":"5.15.0-1068.74~20.04.1","binary_name":"linux-modules-5.15.0-1068-oracle"},{"binary_version":"5.15.0-1068.74~20.04.1","binary_name":"linux-modules-extra-5.15.0-1068-oracle"},{"binary_version":"5.15.0-1068.74~20.04.1","binary_name":"linux-oracle-5.15-headers-5.15.0-1068"},{"binary_version":"5.15.0-1068.74~20.04.1","binary_name":"linux-oracle-5.15-tools-5.15.0-1068"},{"binary_version":"5.15.0-1068.74~20.04.1","binary_name":"linux-tools-5.15.0-1068-oracle"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-26677"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-27012"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-38570"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-39494"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-39496"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-41009"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-42160"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-42228"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7021-2.json"}},{"package":{"name":"linux-xilinx-zynqmp","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/linux-xilinx-zynqmp@5.15.0-1036.40?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.15.0-1036.40"}]}],"versions":["5.15.0-1022.26","5.15.0-1023.27","5.15.0-1025.29","5.15.0-1027.31","5.15.0-1030.34","5.15.0-1031.35","5.15.0-1035.39"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"5.15.0-1036.40","binary_name":"linux-buildinfo-5.15.0-1036-xilinx-zynqmp"},{"binary_version":"5.15.0-1036.40","binary_name":"linux-headers-5.15.0-1036-xilinx-zynqmp"},{"binary_version":"5.15.0-1036.40","binary_name":"linux-image-5.15.0-1036-xilinx-zynqmp"},{"binary_version":"5.15.0-1036.40","binary_name":"linux-modules-5.15.0-1036-xilinx-zynqmp"},{"binary_version":"5.15.0-1036.40","binary_name":"linux-tools-5.15.0-1036-xilinx-zynqmp"},{"binary_version":"5.15.0-1036.40","binary_name":"linux-xilinx-zynqmp-headers-5.15.0-1036"},{"binary_version":"5.15.0-1036.40","binary_name":"linux-xilinx-zynqmp-tools-5.15.0-1036"},{"binary_version":"5.15.0-1036.40","binary_name":"linux-xilinx-zynqmp-tools-common"},{"binary_version":"5.15.0-1036.40","binary_name":"linux-xilinx-zynqmp-tools-host"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:22.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-26677"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-27012"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-38570"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-39494"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-39496"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-41009"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-42160"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-42228"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7021-2.json"}}],"schema_version":"1.7.3"}