USN-8015-5

Source
https://ubuntu.com/security/notices/USN-8015-5
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8015-5.json
JSON Data
https://api.osv.dev/v1/vulns/USN-8015-5
Upstream
Related
Published
2026-02-20T13:23:45Z
Modified
2026-02-23T07:13:58.207640Z
Summary
linux-lowlatency, linux-xilinx vulnerabilities
Details

Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Cryptographic API; - SMB network file system; - io_uring subsystem; (CVE-2025-38561, CVE-2025-39698, CVE-2025-40019)

References

Affected packages

Ubuntu:24.04:LTS / linux-lowlatency

Package

Name
linux-lowlatency
Purl
pkg:deb/ubuntu/linux-lowlatency@6.8.0-94.96.1?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.0-94.96.1

Affected versions

6.*
6.5.0-9.9.1
6.6.0-14.14.1
6.8.0-7.7.1
6.8.0-25.25.3
6.8.0-28.28.1
6.8.0-31.31.1
6.8.0-35.35.1
6.8.0-36.36.1
6.8.0-38.38.1
6.8.0-39.39.1
6.8.0-40.40.1
6.8.0-41.41.1
6.8.0-44.44.1
6.8.0-45.45.1
6.8.0-47.47.1
6.8.0-48.48.3
6.8.0-49.49.1
6.8.0-50.51.1
6.8.0-51.52.1
6.8.0-52.53.1
6.8.0-53.55.2
6.8.0-54.56.1
6.8.0-55.57.1
6.8.0-56.58.1
6.8.0-57.59.1
6.8.0-58.60.1
6.8.0-59.61.1
6.8.0-60.63.1
6.8.0-62.65.1
6.8.0-63.66.1
6.8.0-64.67.1
6.8.0-65.68.1
6.8.0-78.78.1
6.8.0-79.79.1
6.8.0-83.83.1
6.8.0-84.84.1
6.8.0-85.85.1
6.8.0-86.87.1
6.8.0-87.88.1
6.8.0-88.89.1
6.8.0-90.91.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "linux-buildinfo-6.8.0-94-lowlatency",
            "binary_version": "6.8.0-94.96.1"
        },
        {
            "binary_name": "linux-buildinfo-6.8.0-94-lowlatency-64k",
            "binary_version": "6.8.0-94.96.1"
        },
        {
            "binary_name": "linux-cloud-tools-6.8.0-94-lowlatency",
            "binary_version": "6.8.0-94.96.1"
        },
        {
            "binary_name": "linux-headers-6.8.0-94-lowlatency",
            "binary_version": "6.8.0-94.96.1"
        },
        {
            "binary_name": "linux-headers-6.8.0-94-lowlatency-64k",
            "binary_version": "6.8.0-94.96.1"
        },
        {
            "binary_name": "linux-image-unsigned-6.8.0-94-lowlatency",
            "binary_version": "6.8.0-94.96.1"
        },
        {
            "binary_name": "linux-image-unsigned-6.8.0-94-lowlatency-64k",
            "binary_version": "6.8.0-94.96.1"
        },
        {
            "binary_name": "linux-lowlatency-cloud-tools-6.8.0-94",
            "binary_version": "6.8.0-94.96.1"
        },
        {
            "binary_name": "linux-lowlatency-headers-6.8.0-94",
            "binary_version": "6.8.0-94.96.1"
        },
        {
            "binary_name": "linux-lowlatency-lib-rust-6.8.0-94-lowlatency",
            "binary_version": "6.8.0-94.96.1"
        },
        {
            "binary_name": "linux-lowlatency-tools-6.8.0-94",
            "binary_version": "6.8.0-94.96.1"
        },
        {
            "binary_name": "linux-modules-6.8.0-94-lowlatency",
            "binary_version": "6.8.0-94.96.1"
        },
        {
            "binary_name": "linux-modules-6.8.0-94-lowlatency-64k",
            "binary_version": "6.8.0-94.96.1"
        },
        {
            "binary_name": "linux-modules-iwlwifi-6.8.0-94-lowlatency",
            "binary_version": "6.8.0-94.96.1"
        },
        {
            "binary_name": "linux-tools-6.8.0-94-lowlatency",
            "binary_version": "6.8.0-94.96.1"
        },
        {
            "binary_name": "linux-tools-6.8.0-94-lowlatency-64k",
            "binary_version": "6.8.0-94.96.1"
        }
    ],
    "availability": "No subscription required"
}

Database specific

cves_map
{
    "ecosystem": "Ubuntu:24.04:LTS",
    "cves": [
        {
            "id": "CVE-2025-38561",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "high"
                }
            ]
        },
        {
            "id": "CVE-2025-39698",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "high"
                }
            ]
        },
        {
            "id": "CVE-2025-40019",
            "severity": [
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        }
    ]
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8015-5.json"

Ubuntu:24.04:LTS / linux-xilinx

Package

Name
linux-xilinx
Purl
pkg:deb/ubuntu/linux-xilinx@6.8.0-1022.23?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.0-1022.23

Affected versions

6.*
6.8.0-1008.9
6.8.0-1009.10
6.8.0-1011.12
6.8.0-1012.13
6.8.0-1013.14
6.8.0-1014.15
6.8.0-1015.16
6.8.0-1017.18
6.8.0-1018.19
6.8.0-1019.20
6.8.0-1020.21
6.8.0-1021.22

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "linux-buildinfo-6.8.0-1022-xilinx",
            "binary_version": "6.8.0-1022.23"
        },
        {
            "binary_name": "linux-headers-6.8.0-1022-xilinx",
            "binary_version": "6.8.0-1022.23"
        },
        {
            "binary_name": "linux-image-6.8.0-1022-xilinx",
            "binary_version": "6.8.0-1022.23"
        },
        {
            "binary_name": "linux-modules-6.8.0-1022-xilinx",
            "binary_version": "6.8.0-1022.23"
        },
        {
            "binary_name": "linux-tools-6.8.0-1022-xilinx",
            "binary_version": "6.8.0-1022.23"
        },
        {
            "binary_name": "linux-xilinx-headers-6.8.0-1022",
            "binary_version": "6.8.0-1022.23"
        },
        {
            "binary_name": "linux-xilinx-tools-6.8.0-1022",
            "binary_version": "6.8.0-1022.23"
        }
    ],
    "availability": "No subscription required"
}

Database specific

cves_map
{
    "ecosystem": "Ubuntu:24.04:LTS",
    "cves": [
        {
            "id": "CVE-2025-38561",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "high"
                }
            ]
        },
        {
            "id": "CVE-2025-39698",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "high"
                }
            ]
        },
        {
            "id": "CVE-2025-40019",
            "severity": [
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        }
    ]
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8015-5.json"