{"id":"USN-8255-3","summary":"linux-nvidia-tegra-5.15, linux-raspi vulnerabilities","details":"Stonejiajia, Shir Tamari and Sagi Tzadik discovered that the OverlayFS\nimplementation in the Ubuntu Linux kernel did not properly perform\npermission checks in certain situations. A local attacker could possibly\nuse this to gain elevated privileges. (CVE-2023-2640)\n\nShir Tamari and Sagi Tzadik discovered that the OverlayFS implementation in\nthe Ubuntu Linux kernel did not properly perform permission checks in\ncertain situations. A local attacker could possibly use this to gain\nelevated privileges. (CVE-2023-32629)\n\nSeveral security issues were discovered in the Linux kernel.\nAn attacker could possibly use these to compromise the system.\nThis update corrects flaws in the following subsystems:\n  - Network drivers;\n  - NVME drivers;\n(CVE-2026-23112, CVE-2026-23273)\n","modified":"2026-05-20T16:19:00.489130521Z","published":"2026-05-19T09:12:17Z","related":["UBUNTU-CVE-2023-2640","UBUNTU-CVE-2023-32629","UBUNTU-CVE-2026-23112","UBUNTU-CVE-2026-23273"],"upstream":["CVE-2023-2640","CVE-2023-32629","CVE-2026-23112","CVE-2026-23273","UBUNTU-CVE-2023-2640","UBUNTU-CVE-2023-32629","UBUNTU-CVE-2026-23112","UBUNTU-CVE-2026-23273"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-8255-3"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-2640"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-32629"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-23112"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-23273"}],"affected":[{"package":{"name":"linux-nvidia-tegra-5.15","ecosystem":"Ubuntu:Pro:20.04:LTS","purl":"pkg:deb/ubuntu/linux-nvidia-tegra-5.15?arch=source&distro=esm-infra%2Ffocal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.15.0-1058.58~20.04.1"}]}],"versions":["5.15.0-1009.9~20.04.1","5.15.0-1010.10~20.04.1","5.15.0-1012.12~20.04.1","5.15.0-1014.14~20.04.1","5.15.0-1015.15~20.04.1","5.15.0-1016.16~20.04.1","5.15.0-1017.17~20.04.1","5.15.0-1018.18~20.04.1","5.15.0-1019.19~20.04.1","5.15.0-1020.20~20.04.1","5.15.0-1022.22~20.04.1","5.15.0-1025.25~20.04.1","5.15.0-1027.27~20.04.1","5.15.0-1030.30~20.04.1","5.15.0-1032.32~20.04.1","5.15.0-1039.39~20.04.1","5.15.0-1040.40~20.04.1","5.15.0-1041.41~20.04.1","5.15.0-1042.42~20.04.1","5.15.0-1043.43~20.04.1","5.15.0-1044.44~20.04.1","5.15.0-1045.45~20.04.1","5.15.0-1046.46~20.04.1","5.15.0-1047.47~20.04.1","5.15.0-1048.48~20.04.1","5.15.0-1049.49~20.04.1","5.15.0-1050.50~20.04.1","5.15.0-1051.51~20.04.1","5.15.0-1052.52~20.04.2","5.15.0-1053.53~20.04.1","5.15.0-1055.55~20.04.1","5.15.0-1057.57~20.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"5.15.0-1058.58~20.04.1","binary_name":"linux-buildinfo-5.15.0-1058-nvidia-tegra"},{"binary_version":"5.15.0-1058.58~20.04.1","binary_name":"linux-buildinfo-5.15.0-1058-nvidia-tegra-rt"},{"binary_version":"5.15.0-1058.58~20.04.1","binary_name":"linux-headers-5.15.0-1058-nvidia-tegra"},{"binary_version":"5.15.0-1058.58~20.04.1","binary_name":"linux-headers-5.15.0-1058-nvidia-tegra-rt"},{"binary_version":"5.15.0-1058.58~20.04.1","binary_name":"linux-image-unsigned-5.15.0-1058-nvidia-tegra"},{"binary_version":"5.15.0-1058.58~20.04.1","binary_name":"linux-image-unsigned-5.15.0-1058-nvidia-tegra-rt"},{"binary_version":"5.15.0-1058.58~20.04.1","binary_name":"linux-modules-5.15.0-1058-nvidia-tegra"},{"binary_version":"5.15.0-1058.58~20.04.1","binary_name":"linux-modules-5.15.0-1058-nvidia-tegra-rt"},{"binary_version":"5.15.0-1058.58~20.04.1","binary_name":"linux-modules-extra-5.15.0-1058-nvidia-tegra"},{"binary_version":"5.15.0-1058.58~20.04.1","binary_name":"linux-nvidia-tegra-5.15-headers-5.15.0-1058"},{"binary_version":"5.15.0-1058.58~20.04.1","binary_name":"linux-nvidia-tegra-5.15-tools-5.15.0-1058"},{"binary_version":"5.15.0-1058.58~20.04.1","binary_name":"linux-tools-5.15.0-1058-nvidia-tegra"},{"binary_version":"5.15.0-1058.58~20.04.1","binary_name":"linux-tools-5.15.0-1058-nvidia-tegra-rt"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8255-3.json","cves_map":{"ecosystem":"Ubuntu:Pro:20.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2023-2640"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2023-32629"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2026-23112"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2026-23273"}]}}},{"package":{"name":"linux-raspi","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/linux-raspi?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.15.0-1100.103"}]}],"versions":["5.13.0-1008.9","5.15.0-1002.2","5.15.0-1003.3","5.15.0-1004.4","5.15.0-1005.5","5.15.0-1006.6","5.15.0-1008.8","5.15.0-1011.13","5.15.0-1012.14","5.15.0-1013.15","5.15.0-1014.16","5.15.0-1015.17","5.15.0-1016.18","5.15.0-1017.19","5.15.0-1018.20","5.15.0-1021.23","5.15.0-1022.24","5.15.0-1023.25","5.15.0-1024.26","5.15.0-1025.27","5.15.0-1026.28","5.15.0-1027.29","5.15.0-1028.30","5.15.0-1029.31","5.15.0-1030.32","5.15.0-1032.35","5.15.0-1033.36","5.15.0-1034.37","5.15.0-1035.38","5.15.0-1036.39","5.15.0-1037.40","5.15.0-1038.41","5.15.0-1040.43","5.15.0-1041.44","5.15.0-1042.45","5.15.0-1043.46","5.15.0-1044.47","5.15.0-1045.48","5.15.0-1046.49","5.15.0-1047.50","5.15.0-1048.51","5.15.0-1049.52","5.15.0-1050.53","5.15.0-1053.56","5.15.0-1054.57","5.15.0-1055.58","5.15.0-1058.61","5.15.0-1059.62","5.15.0-1060.63","5.15.0-1061.64","5.15.0-1062.65","5.15.0-1063.66","5.15.0-1064.67","5.15.0-1065.68","5.15.0-1066.69","5.15.0-1067.70","5.15.0-1070.73","5.15.0-1071.74","5.15.0-1072.75","5.15.0-1073.76","5.15.0-1074.77","5.15.0-1075.78","5.15.0-1076.79","5.15.0-1077.80","5.15.0-1078.81","5.15.0-1079.82","5.15.0-1080.83","5.15.0-1083.86","5.15.0-1084.87","5.15.0-1085.88","5.15.0-1086.89","5.15.0-1087.90","5.15.0-1089.92","5.15.0-1090.93","5.15.0-1091.94","5.15.0-1092.95","5.15.0-1093.96","5.15.0-1097.100","5.15.0-1098.101","5.15.0-1099.102"],"ecosystem_specific":{"binaries":[{"binary_version":"5.15.0-1100.103","binary_name":"linux-buildinfo-5.15.0-1100-raspi"},{"binary_version":"5.15.0-1100.103","binary_name":"linux-headers-5.15.0-1100-raspi"},{"binary_version":"5.15.0-1100.103","binary_name":"linux-image-5.15.0-1100-raspi"},{"binary_version":"5.15.0-1100.103","binary_name":"linux-modules-5.15.0-1100-raspi"},{"binary_version":"5.15.0-1100.103","binary_name":"linux-modules-extra-5.15.0-1100-raspi"},{"binary_version":"5.15.0-1100.103","binary_name":"linux-raspi-headers-5.15.0-1100"},{"binary_version":"5.15.0-1100.103","binary_name":"linux-raspi-tools-5.15.0-1100"},{"binary_version":"5.15.0-1100.103","binary_name":"linux-tools-5.15.0-1100-raspi"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8255-3.json","cves_map":{"ecosystem":"Ubuntu:22.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2023-2640"},{"id":"CVE-2023-32629","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}]},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2026-23112"},{"id":"CVE-2026-23273","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}]}}}],"schema_version":"1.7.5"}