USN-7402-2

Source
https://ubuntu.com/security/notices/USN-7402-2
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7402-2.json
JSON Data
https://api.test.osv.dev/v1/vulns/USN-7402-2
Upstream
Related
Published
2025-04-01T22:25:24.601552Z
Modified
2025-10-24T04:42:51Z
Summary
linux-realtime vulnerabilities
Details

Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Block layer subsystem; - GPU drivers; - HID subsystem; - Media drivers; - JFS file system; - Network namespace; - Networking core; - Netlink; (CVE-2024-57798, CVE-2024-53140, CVE-2024-56595, CVE-2024-56598, CVE-2024-50302, CVE-2024-56658, CVE-2024-56672, CVE-2024-53063)

References

Affected packages

Ubuntu:Pro:24.04:LTS:Realtime:Kernel / linux-realtime

Package

Name
linux-realtime
Purl
pkg:deb/ubuntu/linux-realtime@6.8.1-1019.20?arch=source&distro=realtime/noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.1-1019.20

Affected versions

6.*

6.8.0-1008.19
6.8.1-1001.1
6.8.1-1002.2
6.8.1-1003.3
6.8.1-1004.4
6.8.1-1005.5
6.8.1-1006.6
6.8.1-1007.7
6.8.1-1008.8
6.8.1-1009.9
6.8.1-1010.10
6.8.1-1011.11
6.8.1-1012.12
6.8.1-1013.14
6.8.1-1014.15
6.8.1-1015.16
6.8.1-1016.17
6.8.1-1017.18
6.8.1-1018.19

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "linux-buildinfo-6.8.1-1019-realtime",
            "binary_version": "6.8.1-1019.20"
        },
        {
            "binary_name": "linux-cloud-tools-6.8.1-1019-realtime",
            "binary_version": "6.8.1-1019.20"
        },
        {
            "binary_name": "linux-headers-6.8.1-1019-realtime",
            "binary_version": "6.8.1-1019.20"
        },
        {
            "binary_name": "linux-image-unsigned-6.8.1-1019-realtime",
            "binary_version": "6.8.1-1019.20"
        },
        {
            "binary_name": "linux-modules-6.8.1-1019-realtime",
            "binary_version": "6.8.1-1019.20"
        },
        {
            "binary_name": "linux-modules-extra-6.8.1-1019-realtime",
            "binary_version": "6.8.1-1019.20"
        },
        {
            "binary_name": "linux-modules-iwlwifi-6.8.1-1019-realtime",
            "binary_version": "6.8.1-1019.20"
        },
        {
            "binary_name": "linux-realtime-cloud-tools-6.8.1-1019",
            "binary_version": "6.8.1-1019.20"
        },
        {
            "binary_name": "linux-realtime-headers-6.8.1-1019",
            "binary_version": "6.8.1-1019.20"
        },
        {
            "binary_name": "linux-realtime-tools-6.8.1-1019",
            "binary_version": "6.8.1-1019.20"
        },
        {
            "binary_name": "linux-tools-6.8.1-1019-realtime",
            "binary_version": "6.8.1-1019.20"
        }
    ],
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}

Database specific

cves_map

{
    "ecosystem": "Ubuntu:Pro:24.04:LTS:Realtime:Kernel",
    "cves": [
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "high"
                }
            ],
            "id": "CVE-2024-50302"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "high"
                }
            ],
            "id": "CVE-2024-53063"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "high"
                }
            ],
            "id": "CVE-2024-53140"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "high"
                }
            ],
            "id": "CVE-2024-56595"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "high"
                }
            ],
            "id": "CVE-2024-56598"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "high"
                }
            ],
            "id": "CVE-2024-56658"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "high"
                }
            ],
            "id": "CVE-2024-56672"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "high"
                }
            ],
            "id": "CVE-2024-57798"
        }
    ]
}