{"id":"USN-7462-2","summary":"linux-aws-fips vulnerabilities","details":"Several security issues were discovered in the Linux kernel.\nAn attacker could possibly use these to compromise the system.\nThis update corrects flaws in the following subsystems:\n  - GPU drivers;\n  - Network drivers;\n  - File systems infrastructure;\n  - Ext4 file system;\n  - Network file system (NFS) server daemon;\n  - SMB network file system;\n  - Network namespace;\n  - Bluetooth subsystem;\n  - Networking core;\n  - IPv6 networking;\n  - Network traffic control;\n(CVE-2024-56651, CVE-2021-47119, CVE-2025-21700, CVE-2025-21702,\nCVE-2024-49974, CVE-2024-56658, CVE-2024-53237, CVE-2025-21703,\nCVE-2024-26928, CVE-2024-26915, CVE-2024-35958, CVE-2024-50256,\nCVE-2024-35864, CVE-2024-46826)\n","modified":"2026-04-27T18:02:27.091908780Z","published":"2025-04-24T16:26:06Z","related":["UBUNTU-CVE-2021-47119","UBUNTU-CVE-2024-26915","UBUNTU-CVE-2024-26928","UBUNTU-CVE-2024-35864","UBUNTU-CVE-2024-35958","UBUNTU-CVE-2024-46826","UBUNTU-CVE-2024-49974","UBUNTU-CVE-2024-50256","UBUNTU-CVE-2024-53237","UBUNTU-CVE-2024-56651","UBUNTU-CVE-2024-56658","UBUNTU-CVE-2025-21700","UBUNTU-CVE-2025-21702","UBUNTU-CVE-2025-21703"],"upstream":["CVE-2021-47119","CVE-2024-26915","CVE-2024-26928","CVE-2024-35864","CVE-2024-35958","CVE-2024-46826","CVE-2024-49974","CVE-2024-50256","CVE-2024-53237","CVE-2024-56651","CVE-2024-56658","CVE-2025-21700","CVE-2025-21702","CVE-2025-21703","UBUNTU-CVE-2021-47119","UBUNTU-CVE-2024-26915","UBUNTU-CVE-2024-26928","UBUNTU-CVE-2024-35864","UBUNTU-CVE-2024-35958","UBUNTU-CVE-2024-46826","UBUNTU-CVE-2024-49974","UBUNTU-CVE-2024-50256","UBUNTU-CVE-2024-53237","UBUNTU-CVE-2024-56651","UBUNTU-CVE-2024-56658","UBUNTU-CVE-2025-21700","UBUNTU-CVE-2025-21702","UBUNTU-CVE-2025-21703"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7462-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-47119"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26915"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26928"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-35864"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-35958"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-46826"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-49974"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-50256"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-53237"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-56651"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-56658"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-21700"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-21702"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-21703"}],"affected":[{"package":{"name":"linux-aws-fips","ecosystem":"Ubuntu:Pro:FIPS-updates:20.04:LTS","purl":"pkg:deb/ubuntu/linux-aws-fips@5.4.0-1144.155+fips1?arch=source&distro=fips-updates/focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.4.0-1144.155+fips1"}]}],"versions":["5.4.0-1021.21+fips2","5.4.0-1069.73+fips2","5.4.0-1071.76+fips1","5.4.0-1072.77+fips1","5.4.0-1073.78+fips1","5.4.0-1078.84+fips1","5.4.0-1080.87+fips1","5.4.0-1081.88+fips1","5.4.0-1083.90+fips1","5.4.0-1085.92+fips1","5.4.0-1086.93+fips1","5.4.0-1088.96+fips1","5.4.0-1089.97+fips1","5.4.0-1092.100+fips1","5.4.0-1093.101+fips1","5.4.0-1094.102+fips1","5.4.0-1096.104+fips1","5.4.0-1099.107+fips1","5.4.0-1100.108+fips1","5.4.0-1101.109+fips1","5.4.0-1102.110+fips1","5.4.0-1103.111+fips1","5.4.0-1104.112+fips1","5.4.0-1105.113+fips1","5.4.0-1106.114+fips1","5.4.0-1107.115+fips1","5.4.0-1108.116+fips1","5.4.0-1109.118+fips1","5.4.0-1110.119+fips1","5.4.0-1111.120+fips1","5.4.0-1112.121+fips1","5.4.0-1113.123+fips1","5.4.0-1114.124+fips1","5.4.0-1116.126+fips1","5.4.0-1117.127+fips1","5.4.0-1118.128+fips1","5.4.0-1119.129+fips1","5.4.0-1120.130+fips1","5.4.0-1121.131+fips1","5.4.0-1122.132+fips1","5.4.0-1123.133+fips1","5.4.0-1124.134+fips1","5.4.0-1125.135+fips1","5.4.0-1126.136+fips2","5.4.0-1127.137+fips1","5.4.0-1128.138+fips1","5.4.0-1129.139+fips1","5.4.0-1130.140+fips1","5.4.0-1131.141+fips1","5.4.0-1132.142+fips1","5.4.0-1133.143+fips1","5.4.0-1134.144+fips1","5.4.0-1135.145+fips1","5.4.0-1136.146+fips1","5.4.0-1137.147+fips1","5.4.0-1139.149+fips1","5.4.0-1140.151+fips1","5.4.0-1142.153+fips1"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro","binaries":[{"binary_name":"linux-aws-fips-headers-5.4.0-1144","binary_version":"5.4.0-1144.155+fips1"},{"binary_name":"linux-aws-fips-tools-5.4.0-1144","binary_version":"5.4.0-1144.155+fips1"},{"binary_name":"linux-buildinfo-5.4.0-1144-aws-fips","binary_version":"5.4.0-1144.155+fips1"},{"binary_name":"linux-headers-5.4.0-1144-aws-fips","binary_version":"5.4.0-1144.155+fips1"},{"binary_name":"linux-image-unsigned-5.4.0-1144-aws-fips","binary_version":"5.4.0-1144.155+fips1"},{"binary_name":"linux-image-unsigned-hmac-5.4.0-1144-aws-fips","binary_version":"5.4.0-1144.155+fips1"},{"binary_name":"linux-modules-5.4.0-1144-aws-fips","binary_version":"5.4.0-1144.155+fips1"},{"binary_name":"linux-modules-extra-5.4.0-1144-aws-fips","binary_version":"5.4.0-1144.155+fips1"},{"binary_name":"linux-tools-5.4.0-1144-aws-fips","binary_version":"5.4.0-1144.155+fips1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7462-2.json","cves_map":{"cves":[{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2021-47119"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-26915"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2024-26928"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2024-35864"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-35958"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2024-46826"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-49974"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-50256"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-53237"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-56651"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2024-56658"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2025-21700"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2025-21702"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2025-21703"}],"ecosystem":"Ubuntu:Pro:FIPS-updates:20.04:LTS"}}}],"schema_version":"1.7.5"}