{"id":"USN-8033-8","summary":"linux-intel-iotg vulnerabilities","details":"Several security issues were discovered in the Linux kernel.\nAn attacker could possibly use these to compromise the system.\nThis update corrects flaws in the following subsystems:\n  - Nios II architecture;\n  - Sun Sparc architecture;\n  - User-Mode Linux (UML);\n  - x86 architecture;\n  - Block layer subsystem;\n  - Cryptographic API;\n  - Drivers core;\n  - Bus devices;\n  - Hardware random number generator core;\n  - Data acquisition framework and drivers;\n  - CPU frequency scaling framework;\n  - DMA engine subsystem;\n  - GPU drivers;\n  - HW tracing;\n  - Input Device (Miscellaneous) drivers;\n  - Multiple devices driver;\n  - Media drivers;\n  - MOST (Media Oriented Systems Transport) drivers;\n  - MTD block device drivers;\n  - Network drivers;\n  - NVME drivers;\n  - PCI subsystem;\n  - Performance monitor drivers;\n  - Pin controllers subsystem;\n  - x86 platform drivers;\n  - PPS (Pulse Per Second) driver;\n  - PWM drivers;\n  - SCSI subsystem;\n  - TCM subsystem;\n  - Userspace I/O drivers;\n  - USB Gadget drivers;\n  - USB Host Controller drivers;\n  - Framebuffer layer;\n  - BTRFS file system;\n  - File systems infrastructure;\n  - Ext4 file system;\n  - Network file system (NFS) server daemon;\n  - NTFS3 file system;\n  - SMB network file system;\n  - padata parallel execution mechanism;\n  - IP tunnels definitions;\n  - Network sockets;\n  - XFRM subsystem;\n  - Control group (cgroup);\n  - Padata parallel execution mechanism;\n  - PID allocator;\n  - Tracing infrastructure;\n  - Memory management;\n  - 9P file system network protocol;\n  - Ethernet bridge;\n  - Ceph Core library;\n  - Networking core;\n  - IPv4 networking;\n  - IPv6 networking;\n  - NFC subsystem;\n  - RF switch subsystem;\n  - SCTP protocol;\n  - Unix domain sockets;\n  - VMware vSockets driver;\n  - Intel ASoC drivers;\n  - USB sound devices;\n(CVE-2024-53114, CVE-2024-56538, CVE-2024-58011, CVE-2025-21861,\nCVE-2025-22058, CVE-2025-23143, CVE-2025-38236, CVE-2025-38248,\nCVE-2025-38584, CVE-2025-39869, CVE-2025-39873, CVE-2025-39876,\nCVE-2025-39880, CVE-2025-39883, CVE-2025-39885, CVE-2025-39907,\nCVE-2025-39911, CVE-2025-39913, CVE-2025-39923, CVE-2025-39934,\nCVE-2025-39937, CVE-2025-39943, CVE-2025-39945, CVE-2025-39949,\nCVE-2025-39951, CVE-2025-39953, CVE-2025-39955, CVE-2025-39967,\nCVE-2025-39968, CVE-2025-39969, CVE-2025-39970, CVE-2025-39971,\nCVE-2025-39972, CVE-2025-39973, CVE-2025-39980, CVE-2025-39985,\nCVE-2025-39986, CVE-2025-39987, CVE-2025-39988, CVE-2025-39994,\nCVE-2025-39995, CVE-2025-39996, CVE-2025-39998, CVE-2025-40001,\nCVE-2025-40006, CVE-2025-40011, CVE-2025-40020, CVE-2025-40021,\nCVE-2025-40026, CVE-2025-40027, CVE-2025-40029, CVE-2025-40030,\nCVE-2025-40035, CVE-2025-40042, CVE-2025-40043, CVE-2025-40044,\nCVE-2025-40048, CVE-2025-40049, CVE-2025-40053, CVE-2025-40055,\nCVE-2025-40060, CVE-2025-40068, CVE-2025-40070, CVE-2025-40078,\nCVE-2025-40081, CVE-2025-40085, CVE-2025-40087, CVE-2025-40088,\nCVE-2025-40092, CVE-2025-40094, CVE-2025-40105, CVE-2025-40106,\nCVE-2025-40109, CVE-2025-40111, CVE-2025-40112, CVE-2025-40115,\nCVE-2025-40116, CVE-2025-40118, CVE-2025-40120, CVE-2025-40121,\nCVE-2025-40124, CVE-2025-40125, CVE-2025-40126, CVE-2025-40127,\nCVE-2025-40134, CVE-2025-40140, CVE-2025-40153, CVE-2025-40154,\nCVE-2025-40167, CVE-2025-40171, CVE-2025-40173, CVE-2025-40178,\nCVE-2025-40179, CVE-2025-40183, CVE-2025-40187, CVE-2025-40188,\nCVE-2025-40194, CVE-2025-40200, CVE-2025-40204, CVE-2025-40205,\nCVE-2025-40215, CVE-2025-40219, CVE-2025-40220, CVE-2025-40223,\nCVE-2025-40231, CVE-2025-40233, CVE-2025-40240, CVE-2025-40243,\nCVE-2025-40244, CVE-2025-40245, CVE-2025-40346, CVE-2025-40349,\nCVE-2025-40351, CVE-2025-68249)\n","modified":"2026-05-23T01:34:19.077471553Z","published":"2026-02-19T14:23:05Z","related":["UBUNTU-CVE-2024-53114","UBUNTU-CVE-2024-56538","UBUNTU-CVE-2024-58011","UBUNTU-CVE-2025-21861","UBUNTU-CVE-2025-22058","UBUNTU-CVE-2025-23143","UBUNTU-CVE-2025-38236","UBUNTU-CVE-2025-38248","UBUNTU-CVE-2025-38584","UBUNTU-CVE-2025-39869","UBUNTU-CVE-2025-39873","UBUNTU-CVE-2025-39876","UBUNTU-CVE-2025-39880","UBUNTU-CVE-2025-39883","UBUNTU-CVE-2025-39885","UBUNTU-CVE-2025-39907","UBUNTU-CVE-2025-39911","UBUNTU-CVE-2025-39913","UBUNTU-CVE-2025-39923","UBUNTU-CVE-2025-39934","UBUNTU-CVE-2025-39937","UBUNTU-CVE-2025-39943","UBUNTU-CVE-2025-39945","UBUNTU-CVE-2025-39949","UBUNTU-CVE-2025-39951","UBUNTU-CVE-2025-39953","UBUNTU-CVE-2025-39955","UBUNTU-CVE-2025-39967","UBUNTU-CVE-2025-39968","UBUNTU-CVE-2025-39969","UBUNTU-CVE-2025-39970","UBUNTU-CVE-2025-39971","UBUNTU-CVE-2025-39972","UBUNTU-CVE-2025-39973","UBUNTU-CVE-2025-39980","UBUNTU-CVE-2025-39985","UBUNTU-CVE-2025-39986","UBUNTU-CVE-2025-39987","UBUNTU-CVE-2025-39988","UBUNTU-CVE-2025-39994","UBUNTU-CVE-2025-39995","UBUNTU-CVE-2025-39996","UBUNTU-CVE-2025-39998","UBUNTU-CVE-2025-40001","UBUNTU-CVE-2025-40006","UBUNTU-CVE-2025-40011","UBUNTU-CVE-2025-40020","UBUNTU-CVE-2025-40021","UBUNTU-CVE-2025-40026","UBUNTU-CVE-2025-40027","UBUNTU-CVE-2025-40029","UBUNTU-CVE-2025-40030","UBUNTU-CVE-2025-40035","UBUNTU-CVE-2025-40042","UBUNTU-CVE-2025-40043","UBUNTU-CVE-2025-40044","UBUNTU-CVE-2025-40048","UBUNTU-CVE-2025-40049","UBUNTU-CVE-2025-40053","UBUNTU-CVE-2025-40055","UBUNTU-CVE-2025-40060","UBUNTU-CVE-2025-40068","UBUNTU-CVE-2025-40070","UBUNTU-CVE-2025-40078","UBUNTU-CVE-2025-40081","UBUNTU-CVE-2025-40085","UBUNTU-CVE-2025-40087","UBUNTU-CVE-2025-40088","UBUNTU-CVE-2025-40092","UBUNTU-CVE-2025-40094","UBUNTU-CVE-2025-40105","UBUNTU-CVE-2025-40106","UBUNTU-CVE-2025-40109","UBUNTU-CVE-2025-40111","UBUNTU-CVE-2025-40112","UBUNTU-CVE-2025-40115","UBUNTU-CVE-2025-40116","UBUNTU-CVE-2025-40118","UBUNTU-CVE-2025-40120","UBUNTU-CVE-2025-40121","UBUNTU-CVE-2025-40124","UBUNTU-CVE-2025-40125","UBUNTU-CVE-2025-40126","UBUNTU-CVE-2025-40127","UBUNTU-CVE-2025-40134","UBUNTU-CVE-2025-40140","UBUNTU-CVE-2025-40153","UBUNTU-CVE-2025-40154","UBUNTU-CVE-2025-40167","UBUNTU-CVE-2025-40171","UBUNTU-CVE-2025-40173","UBUNTU-CVE-2025-40178","UBUNTU-CVE-2025-40179","UBUNTU-CVE-2025-40183","UBUNTU-CVE-2025-40187","UBUNTU-CVE-2025-40188","UBUNTU-CVE-2025-40194","UBUNTU-CVE-2025-40200","UBUNTU-CVE-2025-40204","UBUNTU-CVE-2025-40205","UBUNTU-CVE-2025-40215","UBUNTU-CVE-2025-40219","UBUNTU-CVE-2025-40220","UBUNTU-CVE-2025-40223","UBUNTU-CVE-2025-40231","UBUNTU-CVE-2025-40233","UBUNTU-CVE-2025-40240","UBUNTU-CVE-2025-40243","UBUNTU-CVE-2025-40244","UBUNTU-CVE-2025-40245","UBUNTU-CVE-2025-40346","UBUNTU-CVE-2025-40349","UBUNTU-CVE-2025-40351","UBUNTU-CVE-2025-68249"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-8033-8"}],"affected":[{"package":{"name":"linux-intel-iotg","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/linux-intel-iotg?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.15.0-1095.101"}]}],"versions":["5.15.0-1004.6","5.15.0-1008.11","5.15.0-1010.14","5.15.0-1013.17","5.15.0-1015.20","5.15.0-1016.21","5.15.0-1017.22","5.15.0-1018.23","5.15.0-1021.26","5.15.0-1023.28","5.15.0-1025.30","5.15.0-1026.31","5.15.0-1027.32","5.15.0-1028.33","5.15.0-1030.35","5.15.0-1031.36","5.15.0-1033.38","5.15.0-1034.39","5.15.0-1035.40","5.15.0-1036.41","5.15.0-1037.42","5.15.0-1038.43","5.15.0-1039.45","5.15.0-1040.46","5.15.0-1043.49","5.15.0-1045.51","5.15.0-1046.52","5.15.0-1047.53","5.15.0-1048.54","5.15.0-1049.55","5.15.0-1050.56","5.15.0-1051.57","5.15.0-1052.58","5.15.0-1055.61","5.15.0-1057.63","5.15.0-1058.64","5.15.0-1059.65","5.15.0-1060.66","5.15.0-1061.67","5.15.0-1062.68","5.15.0-1063.69","5.15.0-1064.70","5.15.0-1065.71","5.15.0-1066.72","5.15.0-1067.73","5.15.0-1071.77","5.15.0-1072.78","5.15.0-1073.79","5.15.0-1074.80","5.15.0-1075.81","5.15.0-1076.82","5.15.0-1077.83","5.15.0-1078.84","5.15.0-1079.85","5.15.0-1080.86","5.15.0-1081.87","5.15.0-1082.88","5.15.0-1083.89","5.15.0-1084.90","5.15.0-1085.91","5.15.0-1086.92","5.15.0-1087.93","5.15.0-1088.94","5.15.0-1090.96","5.15.0-1091.97","5.15.0-1092.98","5.15.0-1093.99","5.15.0-1094.100"],"ecosystem_specific":{"binaries":[{"binary_version":"5.15.0-1095.101","binary_name":"linux-buildinfo-5.15.0-1095-intel-iotg"},{"binary_version":"5.15.0-1095.101","binary_name":"linux-cloud-tools-5.15.0-1095-intel-iotg"},{"binary_version":"5.15.0-1095.101","binary_name":"linux-headers-5.15.0-1095-intel-iotg"},{"binary_name":"linux-image-unsigned-5.15.0-1095-intel-iotg","binary_version":"5.15.0-1095.101"},{"binary_version":"5.15.0-1095.101","binary_name":"linux-intel-iotg-cloud-tools-5.15.0-1095"},{"binary_version":"5.15.0-1095.101","binary_name":"linux-intel-iotg-cloud-tools-common"},{"binary_version":"5.15.0-1095.101","binary_name":"linux-intel-iotg-headers-5.15.0-1095"},{"binary_name":"linux-intel-iotg-tools-5.15.0-1095","binary_version":"5.15.0-1095.101"},{"binary_version":"5.15.0-1095.101","binary_name":"linux-intel-iotg-tools-common"},{"binary_version":"5.15.0-1095.101","binary_name":"linux-intel-iotg-tools-host"},{"binary_version":"5.15.0-1095.101","binary_name":"linux-modules-5.15.0-1095-intel-iotg"},{"binary_version":"5.15.0-1095.101","binary_name":"linux-modules-extra-5.15.0-1095-intel-iotg"},{"binary_name":"linux-modules-iwlwifi-5.15.0-1095-intel-iotg","binary_version":"5.15.0-1095.101"},{"binary_version":"5.15.0-1095.101","binary_name":"linux-tools-5.15.0-1095-intel-iotg"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:22.04:LTS","cves":[]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8033-8.json"}}],"schema_version":"1.7.5"}