{"id":"USN-7591-5","summary":"linux-intel-iotg vulnerabilities","details":"Michael Randrianantenaina discovered that the Bluetooth driver in the Linux\nKernel contained an improper access control vulnerability. A nearby\nattacker could use this to connect a rougue device and possibly execute\narbitrary code. (CVE-2024-8805)\n\nIt was discovered that the CIFS network file system implementation in the\nLinux kernel did not properly verify the target namespace when handling\nupcalls. An attacker could use this to expose sensitive information.\n(CVE-2025-2312)\n\nSeveral security issues were discovered in the Linux kernel.\nAn attacker could possibly use these to compromise the system.\nThis update corrects flaws in the following subsystems:\n  - PowerPC architecture;\n  - x86 architecture;\n  - ACPI drivers;\n  - Clock framework and drivers;\n  - GPU drivers;\n  - HID subsystem;\n  - InfiniBand drivers;\n  - Media drivers;\n  - MemoryStick subsystem;\n  - Network drivers;\n  - Mellanox network drivers;\n  - NTB driver;\n  - PCI subsystem;\n  - Voltage and Current Regulator drivers;\n  - Remote Processor subsystem;\n  - SCSI subsystem;\n  - QCOM SoC drivers;\n  - Thermal drivers;\n  - BTRFS file system;\n  - Ext4 file system;\n  - JFS file system;\n  - Network file system (NFS) server daemon;\n  - NTFS3 file system;\n  - File systems infrastructure;\n  - Proc file system;\n  - SMB network file system;\n  - IPv6 networking;\n  - RDMA verbs API;\n  - SoC audio core drivers;\n  - Tracing infrastructure;\n  - Watch queue notification mechanism;\n  - 802.1Q VLAN protocol;\n  - Asynchronous Transfer Mode (ATM) subsystem;\n  - Bluetooth subsystem;\n  - Networking core;\n  - IPv4 networking;\n  - Netfilter;\n  - Network traffic control;\n  - SMC sockets;\n  - SoC Audio for Freescale CPUs drivers;\n(CVE-2025-23138, CVE-2025-21956, CVE-2025-21970, CVE-2025-22025,\nCVE-2024-46753, CVE-2025-21962, CVE-2025-37889, CVE-2025-21992,\nCVE-2025-39728, CVE-2025-22054, CVE-2025-21959, CVE-2024-53144,\nCVE-2022-49728, CVE-2024-58093, CVE-2025-38637, CVE-2025-21981,\nCVE-2025-21963, CVE-2025-21968, CVE-2025-22014, CVE-2024-46812,\nCVE-2025-22005, CVE-2025-21994, CVE-2025-22071, CVE-2025-22008,\nCVE-2022-49636, CVE-2025-22007, CVE-2023-53034, CVE-2025-22035,\nCVE-2025-22010, CVE-2025-22081, CVE-2025-22021, CVE-2024-46821,\nCVE-2025-21999, CVE-2025-38575, CVE-2025-22073, CVE-2025-22004,\nCVE-2024-42230, CVE-2025-21941, CVE-2024-56664, CVE-2025-22044,\nCVE-2025-39735, CVE-2025-22060, CVE-2025-22055, CVE-2025-21957,\nCVE-2025-21975, CVE-2025-22075, CVE-2025-22089, CVE-2025-37937,\nCVE-2025-38152, CVE-2025-22020, CVE-2025-22066, CVE-2025-22056,\nCVE-2025-22050, CVE-2025-21964, CVE-2025-21996, CVE-2025-22079,\nCVE-2025-23136, CVE-2025-22063, CVE-2024-36945, CVE-2025-22097,\nCVE-2025-37785, CVE-2025-21991, CVE-2025-22086, CVE-2025-22045,\nCVE-2025-22018)\n","modified":"2026-04-24T10:08:47.787628Z","published":"2025-07-04T15:20:38Z","related":["UBUNTU-CVE-2022-49636","UBUNTU-CVE-2022-49728","UBUNTU-CVE-2023-53034","UBUNTU-CVE-2024-36945","UBUNTU-CVE-2024-42230","UBUNTU-CVE-2024-46753","UBUNTU-CVE-2024-46812","UBUNTU-CVE-2024-46821","UBUNTU-CVE-2024-53144","UBUNTU-CVE-2024-56664","UBUNTU-CVE-2024-58093","UBUNTU-CVE-2024-8805","UBUNTU-CVE-2025-21941","UBUNTU-CVE-2025-21956","UBUNTU-CVE-2025-21957","UBUNTU-CVE-2025-21959","UBUNTU-CVE-2025-21962","UBUNTU-CVE-2025-21963","UBUNTU-CVE-2025-21964","UBUNTU-CVE-2025-21968","UBUNTU-CVE-2025-21970","UBUNTU-CVE-2025-21975","UBUNTU-CVE-2025-21981","UBUNTU-CVE-2025-21991","UBUNTU-CVE-2025-21992","UBUNTU-CVE-2025-21994","UBUNTU-CVE-2025-21996","UBUNTU-CVE-2025-21999","UBUNTU-CVE-2025-22004","UBUNTU-CVE-2025-22005","UBUNTU-CVE-2025-22007","UBUNTU-CVE-2025-22008","UBUNTU-CVE-2025-22010","UBUNTU-CVE-2025-22014","UBUNTU-CVE-2025-22018","UBUNTU-CVE-2025-22020","UBUNTU-CVE-2025-22021","UBUNTU-CVE-2025-22025","UBUNTU-CVE-2025-22035","UBUNTU-CVE-2025-22044","UBUNTU-CVE-2025-22045","UBUNTU-CVE-2025-22050","UBUNTU-CVE-2025-22054","UBUNTU-CVE-2025-22055","UBUNTU-CVE-2025-22056","UBUNTU-CVE-2025-22060","UBUNTU-CVE-2025-22063","UBUNTU-CVE-2025-22066","UBUNTU-CVE-2025-22071","UBUNTU-CVE-2025-22073","UBUNTU-CVE-2025-22075","UBUNTU-CVE-2025-22079","UBUNTU-CVE-2025-22081","UBUNTU-CVE-2025-22086","UBUNTU-CVE-2025-22089","UBUNTU-CVE-2025-22097","UBUNTU-CVE-2025-2312","UBUNTU-CVE-2025-23136","UBUNTU-CVE-2025-23138","UBUNTU-CVE-2025-37785","UBUNTU-CVE-2025-37889","UBUNTU-CVE-2025-37937","UBUNTU-CVE-2025-38152","UBUNTU-CVE-2025-38575","UBUNTU-CVE-2025-38637","UBUNTU-CVE-2025-39728","UBUNTU-CVE-2025-39735"],"upstream":["CVE-2022-49636","CVE-2022-49728","CVE-2023-53034","CVE-2024-36945","CVE-2024-42230","CVE-2024-46753","CVE-2024-46812","CVE-2024-46821","CVE-2024-53144","CVE-2024-56664","CVE-2024-58093","CVE-2024-8805","CVE-2025-21941","CVE-2025-21956","CVE-2025-21957","CVE-2025-21959","CVE-2025-21962","CVE-2025-21963","CVE-2025-21964","CVE-2025-21968","CVE-2025-21970","CVE-2025-21975","CVE-2025-21981","CVE-2025-21991","CVE-2025-21992","CVE-2025-21994","CVE-2025-21996","CVE-2025-21999","CVE-2025-22004","CVE-2025-22005","CVE-2025-22007","CVE-2025-22008","CVE-2025-22010","CVE-2025-22014","CVE-2025-22018","CVE-2025-22020","CVE-2025-22021","CVE-2025-22025","CVE-2025-22035","CVE-2025-22044","CVE-2025-22045","CVE-2025-22050","CVE-2025-22054","CVE-2025-22055","CVE-2025-22056","CVE-2025-22060","CVE-2025-22063","CVE-2025-22066","CVE-2025-22071","CVE-2025-22073","CVE-2025-22075","CVE-2025-22079","CVE-2025-22081","CVE-2025-22086","CVE-2025-22089","CVE-2025-22097","CVE-2025-2312","CVE-2025-23136","CVE-2025-23138","CVE-2025-37785","CVE-2025-37889","CVE-2025-37937","CVE-2025-38152","CVE-2025-38575","CVE-2025-38637","CVE-2025-39728","CVE-2025-39735","UBUNTU-CVE-2022-49636","UBUNTU-CVE-2022-49728","UBUNTU-CVE-2023-53034","UBUNTU-CVE-2024-36945","UBUNTU-CVE-2024-42230","UBUNTU-CVE-2024-46753","UBUNTU-CVE-2024-46812","UBUNTU-CVE-2024-46821","UBUNTU-CVE-2024-53144","UBUNTU-CVE-2024-56664","UBUNTU-CVE-2024-58093","UBUNTU-CVE-2024-8805","UBUNTU-CVE-2025-21941","UBUNTU-CVE-2025-21956","UBUNTU-CVE-2025-21957","UBUNTU-CVE-2025-21959","UBUNTU-CVE-2025-21962","UBUNTU-CVE-2025-21963","UBUNTU-CVE-2025-21964","UBUNTU-CVE-2025-21968","UBUNTU-CVE-2025-21970","UBUNTU-CVE-2025-21975","UBUNTU-CVE-2025-21981","UBUNTU-CVE-2025-21991","UBUNTU-CVE-2025-21992","UBUNTU-CVE-2025-21994","UBUNTU-CVE-2025-21996","UBUNTU-CVE-2025-21999","UBUNTU-CVE-2025-22004","UBUNTU-CVE-2025-22005","UBUNTU-CVE-2025-22007","UBUNTU-CVE-2025-22008","UBUNTU-CVE-2025-22010","UBUNTU-CVE-2025-22014","UBUNTU-CVE-2025-22018","UBUNTU-CVE-2025-22020","UBUNTU-CVE-2025-22021","UBUNTU-CVE-2025-22025","UBUNTU-CVE-2025-22035","UBUNTU-CVE-2025-22044","UBUNTU-CVE-2025-22045","UBUNTU-CVE-2025-22050","UBUNTU-CVE-2025-22054","UBUNTU-CVE-2025-22055","UBUNTU-CVE-2025-22056","UBUNTU-CVE-2025-22060","UBUNTU-CVE-2025-22063","UBUNTU-CVE-2025-22066","UBUNTU-CVE-2025-22071","UBUNTU-CVE-2025-22073","UBUNTU-CVE-2025-22075","UBUNTU-CVE-2025-22079","UBUNTU-CVE-2025-22081","UBUNTU-CVE-2025-22086","UBUNTU-CVE-2025-22089","UBUNTU-CVE-2025-22097","UBUNTU-CVE-2025-2312","UBUNTU-CVE-2025-23136","UBUNTU-CVE-2025-23138","UBUNTU-CVE-2025-37785","UBUNTU-CVE-2025-37889","UBUNTU-CVE-2025-37937","UBUNTU-CVE-2025-38152","UBUNTU-CVE-2025-38575","UBUNTU-CVE-2025-38637","UBUNTU-CVE-2025-39728","UBUNTU-CVE-2025-39735"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7591-5"}],"affected":[{"package":{"name":"linux-intel-iotg","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/linux-intel-iotg@5.15.0-1081.87?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.15.0-1081.87"}]}],"versions":["5.15.0-1004.6","5.15.0-1008.11","5.15.0-1010.14","5.15.0-1013.17","5.15.0-1015.20","5.15.0-1016.21","5.15.0-1017.22","5.15.0-1018.23","5.15.0-1021.26","5.15.0-1023.28","5.15.0-1025.30","5.15.0-1026.31","5.15.0-1027.32","5.15.0-1028.33","5.15.0-1030.35","5.15.0-1031.36","5.15.0-1033.38","5.15.0-1034.39","5.15.0-1035.40","5.15.0-1036.41","5.15.0-1037.42","5.15.0-1038.43","5.15.0-1039.45","5.15.0-1040.46","5.15.0-1043.49","5.15.0-1045.51","5.15.0-1046.52","5.15.0-1047.53","5.15.0-1048.54","5.15.0-1049.55","5.15.0-1050.56","5.15.0-1051.57","5.15.0-1052.58","5.15.0-1055.61","5.15.0-1057.63","5.15.0-1058.64","5.15.0-1059.65","5.15.0-1060.66","5.15.0-1061.67","5.15.0-1062.68","5.15.0-1063.69","5.15.0-1064.70","5.15.0-1065.71","5.15.0-1066.72","5.15.0-1067.73","5.15.0-1071.77","5.15.0-1072.78","5.15.0-1073.79","5.15.0-1074.80","5.15.0-1075.81","5.15.0-1076.82","5.15.0-1077.83","5.15.0-1078.84","5.15.0-1079.85","5.15.0-1080.86"],"ecosystem_specific":{"binaries":[{"binary_version":"5.15.0-1081.87","binary_name":"linux-buildinfo-5.15.0-1081-intel-iotg"},{"binary_version":"5.15.0-1081.87","binary_name":"linux-cloud-tools-5.15.0-1081-intel-iotg"},{"binary_version":"5.15.0-1081.87","binary_name":"linux-headers-5.15.0-1081-intel-iotg"},{"binary_version":"5.15.0-1081.87","binary_name":"linux-image-unsigned-5.15.0-1081-intel-iotg"},{"binary_version":"5.15.0-1081.87","binary_name":"linux-intel-iotg-cloud-tools-5.15.0-1081"},{"binary_version":"5.15.0-1081.87","binary_name":"linux-intel-iotg-cloud-tools-common"},{"binary_version":"5.15.0-1081.87","binary_name":"linux-intel-iotg-headers-5.15.0-1081"},{"binary_version":"5.15.0-1081.87","binary_name":"linux-intel-iotg-tools-5.15.0-1081"},{"binary_version":"5.15.0-1081.87","binary_name":"linux-intel-iotg-tools-common"},{"binary_version":"5.15.0-1081.87","binary_name":"linux-intel-iotg-tools-host"},{"binary_version":"5.15.0-1081.87","binary_name":"linux-modules-5.15.0-1081-intel-iotg"},{"binary_version":"5.15.0-1081.87","binary_name":"linux-modules-extra-5.15.0-1081-intel-iotg"},{"binary_version":"5.15.0-1081.87","binary_name":"linux-modules-iwlwifi-5.15.0-1081-intel-iotg"},{"binary_version":"5.15.0-1081.87","binary_name":"linux-tools-5.15.0-1081-intel-iotg"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7591-5.json","cves_map":{"ecosystem":"Ubuntu:22.04:LTS","cves":[]}}}],"schema_version":"1.7.5"}