{"id":"USN-7408-3","summary":"linux-azure-fips, linux-gcp-fips vulnerabilities","details":"Several security issues were discovered in the Linux kernel.\nAn attacker could possibly use these to compromise the system.\nThis update corrects flaws in the following subsystems:\n  - SMB network file system;\n  - Network namespace;\n  - Networking core;\n(CVE-2024-56658, CVE-2024-35864, CVE-2024-26928)\n","modified":"2026-04-27T17:53:07.248453Z","published":"2025-04-07T17:17:45Z","related":["UBUNTU-CVE-2024-26928","UBUNTU-CVE-2024-35864","UBUNTU-CVE-2024-56658"],"upstream":["CVE-2024-26928","CVE-2024-35864","CVE-2024-56658","UBUNTU-CVE-2024-26928","UBUNTU-CVE-2024-35864","UBUNTU-CVE-2024-56658"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7408-3"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26928"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-35864"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-56658"}],"affected":[{"package":{"name":"linux-azure-fips","ecosystem":"Ubuntu:Pro:FIPS-updates:20.04:LTS","purl":"pkg:deb/ubuntu/linux-azure-fips@5.4.0-1148.156+fips1?arch=source&distro=fips-updates/focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.4.0-1148.156+fips1"}]}],"versions":["5.4.0-1022.22+fips1","5.4.0-1073.76+fips1","5.4.0-1074.77+fips1","5.4.0-1076.79+fips1","5.4.0-1078.81+fips1","5.4.0-1080.83+fips1","5.4.0-1083.87+fips1","5.4.0-1085.90+fips1","5.4.0-1086.91+fips1","5.4.0-1089.94+fips1","5.4.0-1090.95+fips1","5.4.0-1091.96+fips1","5.4.0-1094.100+fips1","5.4.0-1095.101+fips1","5.4.0-1098.104+fips1","5.4.0-1100.106+fips1","5.4.0-1101.107+fips1","5.4.0-1103.109+fips1","5.4.0-1104.110+fips1","5.4.0-1105.111+fips1","5.4.0-1106.112+fips1","5.4.0-1107.113+fips1","5.4.0-1108.114+fips1","5.4.0-1109.115+fips1","5.4.0-1110.116+fips1","5.4.0-1111.117+fips1","5.4.0-1112.118+fips1","5.4.0-1113.119+fips1","5.4.0-1114.120+fips1","5.4.0-1115.122+fips1","5.4.0-1116.123+fips1","5.4.0-1117.124+fips1","5.4.0-1118.125+fips1","5.4.0-1119.126+fips1","5.4.0-1121.128+fips1","5.4.0-1122.129+fips1","5.4.0-1123.130+fips1","5.4.0-1124.131+fips1","5.4.0-1126.133+fips1","5.4.0-1127.134+fips1","5.4.0-1128.135+fips1","5.4.0-1129.136+fips1","5.4.0-1130.137+fips1","5.4.0-1131.138+fips1","5.4.0-1132.139+fips1","5.4.0-1133.140+fips1","5.4.0-1134.141+fips1","5.4.0-1135.142+fips1","5.4.0-1136.143+fips1","5.4.0-1137.144+fips1","5.4.0-1138.145+fips1","5.4.0-1139.146+fips1","5.4.0-1140.147+fips1","5.4.0-1142.149+fips1","5.4.0-1143.150+fips1","5.4.0-1145.152+fips1","5.4.0-1147.154+fips1"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro","binaries":[{"binary_name":"linux-azure-fips-cloud-tools-5.4.0-1148","binary_version":"5.4.0-1148.156+fips1"},{"binary_name":"linux-azure-fips-headers-5.4.0-1148","binary_version":"5.4.0-1148.156+fips1"},{"binary_name":"linux-azure-fips-tools-5.4.0-1148","binary_version":"5.4.0-1148.156+fips1"},{"binary_name":"linux-buildinfo-5.4.0-1148-azure-fips","binary_version":"5.4.0-1148.156+fips1"},{"binary_name":"linux-cloud-tools-5.4.0-1148-azure-fips","binary_version":"5.4.0-1148.156+fips1"},{"binary_name":"linux-headers-5.4.0-1148-azure-fips","binary_version":"5.4.0-1148.156+fips1"},{"binary_name":"linux-image-unsigned-5.4.0-1148-azure-fips","binary_version":"5.4.0-1148.156+fips1"},{"binary_name":"linux-image-unsigned-hmac-5.4.0-1148-azure-fips","binary_version":"5.4.0-1148.156+fips1"},{"binary_name":"linux-modules-5.4.0-1148-azure-fips","binary_version":"5.4.0-1148.156+fips1"},{"binary_name":"linux-modules-extra-5.4.0-1148-azure-fips","binary_version":"5.4.0-1148.156+fips1"},{"binary_name":"linux-tools-5.4.0-1148-azure-fips","binary_version":"5.4.0-1148.156+fips1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7408-3.json","cves_map":{"ecosystem":"Ubuntu:Pro:FIPS-updates:20.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2024-26928"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2024-35864"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2024-56658"}]}}},{"package":{"name":"linux-gcp-fips","ecosystem":"Ubuntu:Pro:FIPS-updates:20.04:LTS","purl":"pkg:deb/ubuntu/linux-gcp-fips@5.4.0-1146.155+fips1?arch=source&distro=fips-updates/focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.4.0-1146.155+fips1"}]}],"versions":["5.4.0-1021.21+fips1","5.4.0-1067.71~20.04.1","5.4.0-1069.73+fips2","5.4.0-1071.75+fips1","5.4.0-1073.78+fips1","5.4.0-1075.80+fips1","5.4.0-1078.84+fips1","5.4.0-1080.87+fips1","5.4.0-1081.88+fips1","5.4.0-1086.94+fips1","5.4.0-1087.95+fips1","5.4.0-1089.97+fips1","5.4.0-1092.101+fips1","5.4.0-1093.102+fips1","5.4.0-1096.105+fips1","5.4.0-1097.106+fips1","5.4.0-1098.107+fips1","5.4.0-1100.109+fips1","5.4.0-1101.110+fips1","5.4.0-1102.111+fips1","5.4.0-1103.112+fips1","5.4.0-1104.113+fips1","5.4.0-1105.114+fips1","5.4.0-1106.115+fips1","5.4.0-1107.116+fips1","5.4.0-1108.117+fips1","5.4.0-1109.118+fips1","5.4.0-1110.119+fips1","5.4.0-1111.120+fips1","5.4.0-1112.121+fips1","5.4.0-1113.122+fips1","5.4.0-1115.124+fips1","5.4.0-1116.125+fips1","5.4.0-1117.126+fips1","5.4.0-1118.127+fips1","5.4.0-1120.129+fips1","5.4.0-1121.130+fips1","5.4.0-1122.131+fips1","5.4.0-1124.133+fips1","5.4.0-1125.134+fips1","5.4.0-1126.135+fips1","5.4.0-1127.136+fips1","5.4.0-1128.137+fips1","5.4.0-1129.138+fips1","5.4.0-1130.139+fips1","5.4.0-1131.140+fips1","5.4.0-1132.141+fips1","5.4.0-1133.142+fips1","5.4.0-1134.143+fips1","5.4.0-1135.144+fips1","5.4.0-1136.145+fips1","5.4.0-1137.146+fips1","5.4.0-1138.147+fips1","5.4.0-1139.148+fips1","5.4.0-1140.149+fips1","5.4.0-1141.150+fips1","5.4.0-1142.151+fips1","5.4.0-1143.152+fips1","5.4.0-1145.154+fips1"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro","binaries":[{"binary_name":"linux-buildinfo-5.4.0-1146-gcp-fips","binary_version":"5.4.0-1146.155+fips1"},{"binary_name":"linux-gcp-fips-headers-5.4.0-1146","binary_version":"5.4.0-1146.155+fips1"},{"binary_name":"linux-gcp-fips-tools-5.4.0-1146","binary_version":"5.4.0-1146.155+fips1"},{"binary_name":"linux-headers-5.4.0-1146-gcp-fips","binary_version":"5.4.0-1146.155+fips1"},{"binary_name":"linux-image-unsigned-5.4.0-1146-gcp-fips","binary_version":"5.4.0-1146.155+fips1"},{"binary_name":"linux-image-unsigned-hmac-5.4.0-1146-gcp-fips","binary_version":"5.4.0-1146.155+fips1"},{"binary_name":"linux-modules-5.4.0-1146-gcp-fips","binary_version":"5.4.0-1146.155+fips1"},{"binary_name":"linux-modules-extra-5.4.0-1146-gcp-fips","binary_version":"5.4.0-1146.155+fips1"},{"binary_name":"linux-tools-5.4.0-1146-gcp-fips","binary_version":"5.4.0-1146.155+fips1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7408-3.json","cves_map":{"ecosystem":"Ubuntu:Pro:FIPS-updates:20.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2024-26928"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2024-35864"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2024-56658"}]}}}],"schema_version":"1.7.5"}