{"id":"USN-7506-2","summary":"linux-aws vulnerabilities","details":"\nDemi Marie Obenour and Simon Gaiser discovered that several Xen para-\nvirtualization device frontends did not properly restrict the access rights\nof device backends. An attacker could possibly use a malicious Xen backend\nto gain access to memory pages of a guest VM or cause a denial of service\nin the guest. (CVE-2022-23041)\n\nSeveral security issues were discovered in the Linux kernel.\nAn attacker could possibly use these to compromise the system.\nThis update corrects flaws in the following subsystems:\n  - Hardware crypto device drivers;\n  - GPU drivers;\n  - IIO subsystem;\n  - Media drivers;\n  - Network drivers;\n  - SCSI subsystem;\n  - SPI subsystem;\n  - USB Gadget drivers;\n  - Ceph distributed file system;\n  - File systems infrastructure;\n  - JFS file system;\n  - Network file system (NFS) client;\n  - Network file system (NFS) server daemon;\n  - NILFS2 file system;\n  - SMB network file system;\n  - CAN network layer;\n  - IPv6 networking;\n  - MAC80211 subsystem;\n  - Netfilter;\n  - Netlink;\n  - Network traffic control;\n  - SCTP protocol;\n  - TIPC protocol;\n(CVE-2024-56650, CVE-2024-26915, CVE-2024-50237, CVE-2024-53140,\nCVE-2024-26996, CVE-2021-47506, CVE-2024-26974, CVE-2025-21971,\nCVE-2024-56770, CVE-2024-53063, CVE-2021-47245, CVE-2024-36934,\nCVE-2021-47500, CVE-2024-53173, CVE-2021-47219, CVE-2024-46771,\nCVE-2024-56631, CVE-2024-46780, CVE-2024-35864, CVE-2021-46959,\nCVE-2021-47191, CVE-2021-47587, CVE-2024-53066, CVE-2024-56642,\nCVE-2021-47163, CVE-2024-50256, CVE-2021-47150, CVE-2024-56598,\nCVE-2024-26689, CVE-2023-52741, CVE-2024-49944)\n","modified":"2026-04-27T17:58:27.371983Z","published":"2025-05-12T12:58:51Z","related":["UBUNTU-CVE-2021-46959","UBUNTU-CVE-2021-47150","UBUNTU-CVE-2021-47163","UBUNTU-CVE-2021-47191","UBUNTU-CVE-2021-47219","UBUNTU-CVE-2021-47245","UBUNTU-CVE-2021-47500","UBUNTU-CVE-2021-47506","UBUNTU-CVE-2021-47587","UBUNTU-CVE-2022-23041","UBUNTU-CVE-2023-52741","UBUNTU-CVE-2024-26689","UBUNTU-CVE-2024-26915","UBUNTU-CVE-2024-26974","UBUNTU-CVE-2024-26996","UBUNTU-CVE-2024-35864","UBUNTU-CVE-2024-36934","UBUNTU-CVE-2024-46771","UBUNTU-CVE-2024-46780","UBUNTU-CVE-2024-49944","UBUNTU-CVE-2024-50237","UBUNTU-CVE-2024-50256","UBUNTU-CVE-2024-53063","UBUNTU-CVE-2024-53066","UBUNTU-CVE-2024-53140","UBUNTU-CVE-2024-53173","UBUNTU-CVE-2024-56598","UBUNTU-CVE-2024-56631","UBUNTU-CVE-2024-56642","UBUNTU-CVE-2024-56650","UBUNTU-CVE-2024-56770","UBUNTU-CVE-2025-21971"],"upstream":["CVE-2021-46959","CVE-2021-47150","CVE-2021-47163","CVE-2021-47191","CVE-2021-47219","CVE-2021-47245","CVE-2021-47500","CVE-2021-47506","CVE-2021-47587","CVE-2022-23041","CVE-2023-52741","CVE-2024-26689","CVE-2024-26915","CVE-2024-26974","CVE-2024-26996","CVE-2024-35864","CVE-2024-36934","CVE-2024-46771","CVE-2024-46780","CVE-2024-49944","CVE-2024-50237","CVE-2024-50256","CVE-2024-53063","CVE-2024-53066","CVE-2024-53140","CVE-2024-53173","CVE-2024-56598","CVE-2024-56631","CVE-2024-56642","CVE-2024-56650","CVE-2024-56770","CVE-2025-21971","UBUNTU-CVE-2021-46959","UBUNTU-CVE-2021-47150","UBUNTU-CVE-2021-47163","UBUNTU-CVE-2021-47191","UBUNTU-CVE-2021-47219","UBUNTU-CVE-2021-47245","UBUNTU-CVE-2021-47500","UBUNTU-CVE-2021-47506","UBUNTU-CVE-2021-47587","UBUNTU-CVE-2022-23041","UBUNTU-CVE-2023-52741","UBUNTU-CVE-2024-26689","UBUNTU-CVE-2024-26915","UBUNTU-CVE-2024-26974","UBUNTU-CVE-2024-26996","UBUNTU-CVE-2024-35864","UBUNTU-CVE-2024-36934","UBUNTU-CVE-2024-46771","UBUNTU-CVE-2024-46780","UBUNTU-CVE-2024-49944","UBUNTU-CVE-2024-50237","UBUNTU-CVE-2024-50256","UBUNTU-CVE-2024-53063","UBUNTU-CVE-2024-53066","UBUNTU-CVE-2024-53140","UBUNTU-CVE-2024-53173","UBUNTU-CVE-2024-56598","UBUNTU-CVE-2024-56631","UBUNTU-CVE-2024-56642","UBUNTU-CVE-2024-56650","UBUNTU-CVE-2024-56770","UBUNTU-CVE-2025-21971"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7506-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-46959"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-47150"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-47163"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-47191"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-47219"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-47245"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-47500"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-47506"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-47587"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-23041"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52741"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26689"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26915"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26974"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26996"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-35864"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-36934"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-46771"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-46780"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-49944"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-50237"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-50256"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-53063"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-53066"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-53140"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-53173"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-56598"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-56631"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-56642"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-56650"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-56770"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-21971"}],"affected":[{"package":{"name":"linux-aws","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/linux-aws@4.4.0-1143.149?arch=source&distro=esm-infra-legacy/trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.4.0-1143.149"}]}],"versions":["4.4.0-1002.2","4.4.0-1003.3","4.4.0-1005.5","4.4.0-1006.6","4.4.0-1009.9","4.4.0-1010.10","4.4.0-1011.11","4.4.0-1012.12","4.4.0-1014.14","4.4.0-1016.16","4.4.0-1017.17","4.4.0-1019.19","4.4.0-1022.22","4.4.0-1023.23","4.4.0-1024.25","4.4.0-1025.26","4.4.0-1027.30","4.4.0-1028.31","4.4.0-1029.32","4.4.0-1031.34","4.4.0-1032.35","4.4.0-1034.37","4.4.0-1036.39","4.4.0-1037.40","4.4.0-1038.41","4.4.0-1039.42","4.4.0-1040.43","4.4.0-1042.45","4.4.0-1044.47","4.4.0-1045.48","4.4.0-1046.50","4.4.0-1048.52","4.4.0-1050.54","4.4.0-1052.56","4.4.0-1054.58","4.4.0-1055.59","4.4.0-1056.60","4.4.0-1058.62","4.4.0-1059.63","4.4.0-1060.64","4.4.0-1061.65","4.4.0-1062.66","4.4.0-1064.68","4.4.0-1065.69","4.4.0-1066.70","4.4.0-1067.71","4.4.0-1073.77","4.4.0-1074.78","4.4.0-1075.79","4.4.0-1076.80","4.4.0-1077.81","4.4.0-1078.82","4.4.0-1081.85","4.4.0-1082.86","4.4.0-1083.87","4.4.0-1085.89","4.4.0-1086.90","4.4.0-1087.91","4.4.0-1088.92","4.4.0-1090.94","4.4.0-1091.95","4.4.0-1092.96","4.4.0-1093.97","4.4.0-1094.99","4.4.0-1095.100","4.4.0-1096.101","4.4.0-1097.102","4.4.0-1098.103","4.4.0-1099.104","4.4.0-1101.106","4.4.0-1102.107","4.4.0-1103.108","4.4.0-1104.109","4.4.0-1107.113","4.4.0-1109.115","4.4.0-1110.116","4.4.0-1111.117","4.4.0-1112.118","4.4.0-1113.119","4.4.0-1114.120","4.4.0-1115.121","4.4.0-1116.122","4.4.0-1117.123","4.4.0-1118.124","4.4.0-1119.125","4.4.0-1120.126","4.4.0-1121.127","4.4.0-1122.128","4.4.0-1123.129","4.4.0-1124.130","4.4.0-1125.131","4.4.0-1127.133","4.4.0-1128.134","4.4.0-1129.135","4.4.0-1130.136","4.4.0-1131.137","4.4.0-1133.139","4.4.0-1134.140","4.4.0-1135.141","4.4.0-1136.142","4.4.0-1137.143","4.4.0-1138.144","4.4.0-1139.145","4.4.0-1140.146","4.4.0-1141.147","4.4.0-1142.148"],"ecosystem_specific":{"binaries":[{"binary_name":"linux-aws-cloud-tools-4.4.0-1143","binary_version":"4.4.0-1143.149"},{"binary_name":"linux-aws-headers-4.4.0-1143","binary_version":"4.4.0-1143.149"},{"binary_name":"linux-aws-tools-4.4.0-1143","binary_version":"4.4.0-1143.149"},{"binary_name":"linux-buildinfo-4.4.0-1143-aws","binary_version":"4.4.0-1143.149"},{"binary_name":"linux-cloud-tools-4.4.0-1143-aws","binary_version":"4.4.0-1143.149"},{"binary_name":"linux-headers-4.4.0-1143-aws","binary_version":"4.4.0-1143.149"},{"binary_name":"linux-image-4.4.0-1143-aws","binary_version":"4.4.0-1143.149"},{"binary_name":"linux-modules-4.4.0-1143-aws","binary_version":"4.4.0-1143.149"},{"binary_name":"linux-tools-4.4.0-1143-aws","binary_version":"4.4.0-1143.149"}],"availability":"Available with Ubuntu Pro with Legacy support add-on: https://ubuntu.com/pro"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:Pro:14.04:LTS","cves":[{"id":"CVE-2021-46959","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-47150","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-47163","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-47191","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-47219","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-47245","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-47500","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-47506","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}]},{"id":"CVE-2021-47587","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-23041","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-52741","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-26689","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}]},{"id":"CVE-2024-26915","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-26974","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-26996","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-35864","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}]},{"id":"CVE-2024-36934","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-46771","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-46780","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-49944","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-50237","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-50256","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-53063","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"high"}]},{"id":"CVE-2024-53066","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-53140","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"high"}]},{"id":"CVE-2024-53173","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-56598","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}]},{"id":"CVE-2024-56631","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-56642","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-56650","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-56770","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2025-21971","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7506-2.json"}}],"schema_version":"1.7.5"}