{"id":"USN-7553-2","summary":"linux-aws-fips, linux-gcp-fips vulnerabilities","details":"Several security issues were discovered in the Linux kernel.\nAn attacker could possibly use these to compromise the system.\nThis update corrects flaws in the following subsystems:\n  - Clock framework and drivers;\n  - GPU drivers;\n  - Parport drivers;\n  - Ext4 file system;\n  - JFFS2 file system;\n  - JFS file system;\n  - File systems infrastructure;\n  - Sun RPC protocol;\n  - USB sound devices;\n(CVE-2024-53155, CVE-2024-47701, CVE-2021-47211, CVE-2024-56596,\nCVE-2024-42301, CVE-2024-57850, CVE-2024-56551, CVE-2024-26966,\nCVE-2024-53168)\n","modified":"2026-02-10T04:48:59Z","published":"2025-06-04T09:20:35Z","related":["UBUNTU-CVE-2021-47211","UBUNTU-CVE-2024-26966","UBUNTU-CVE-2024-42301","UBUNTU-CVE-2024-47701","UBUNTU-CVE-2024-53155","UBUNTU-CVE-2024-53168","UBUNTU-CVE-2024-56551","UBUNTU-CVE-2024-56596","UBUNTU-CVE-2024-57850"],"upstream":["CVE-2021-47211","CVE-2024-26966","CVE-2024-42301","CVE-2024-47701","CVE-2024-53155","CVE-2024-53168","CVE-2024-56551","CVE-2024-56596","CVE-2024-57850","UBUNTU-CVE-2021-47211","UBUNTU-CVE-2024-26966","UBUNTU-CVE-2024-42301","UBUNTU-CVE-2024-47701","UBUNTU-CVE-2024-53155","UBUNTU-CVE-2024-53168","UBUNTU-CVE-2024-56551","UBUNTU-CVE-2024-56596","UBUNTU-CVE-2024-57850"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7553-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-47211"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26966"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-42301"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-47701"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-53155"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-53168"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-56551"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-56596"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-57850"}],"affected":[{"package":{"name":"linux-aws-fips","ecosystem":"Ubuntu:Pro:FIPS-updates:18.04:LTS","purl":"pkg:deb/ubuntu/linux-aws-fips@4.15.0-2119.125?arch=source&distro=fips-updates/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-2119.125"}]}],"versions":["4.15.0-2000.4","4.15.0-2018.18","4.15.0-2021.21","4.15.0-2022.22","4.15.0-2024.24","4.15.0-2025.25","4.15.0-2026.26","4.15.0-2027.27","4.15.0-2030.31","4.15.0-2031.32","4.15.0-2033.34","4.15.0-2034.35","4.15.0-2035.37","4.15.0-2036.38","4.15.0-2037.39","4.15.0-2038.40","4.15.0-2039.41","4.15.0-2040.42","4.15.0-2041.43","4.15.0-2042.44","4.15.0-2044.46","4.15.0-2045.47","4.15.0-2048.50","4.15.0-2051.53","4.15.0-2052.54","4.15.0-2053.55","4.15.0-2054.56","4.15.0-2055.57","4.15.0-2056.58","4.15.0-2057.59","4.15.0-2059.61","4.15.0-2060.62","4.15.0-2061.63","4.15.0-2063.66","4.15.0-2064.67","4.15.0-2065.68","4.15.0-2066.69","4.15.0-2067.70","4.15.0-2069.72","4.15.0-2072.76","4.15.0-2075.80","4.15.0-2076.81","4.15.0-2078.83","4.15.0-2079.84","4.15.0-2080.85","4.15.0-2081.87","4.15.0-2082.88","4.15.0-2083.89","4.15.0-2085.91","4.15.0-2087.93","4.15.0-2089.95","4.15.0-2090.96","4.15.0-2092.98","4.15.0-2093.99","4.15.0-2094.100","4.15.0-2095.101","4.15.0-2096.102","4.15.0-2097.103","4.15.0-2098.104","4.15.0-2099.105","4.15.0-2100.106","4.15.0-2101.107","4.15.0-2102.108","4.15.0-2103.109","4.15.0-2104.110","4.15.0-2105.111","4.15.0-2106.112","4.15.0-2107.113","4.15.0-2108.114","4.15.0-2109.115","4.15.0-2110.116","4.15.0-2111.117","4.15.0-2112.118","4.15.0-2113.119","4.15.0-2114.120","4.15.0-2115.121","4.15.0-2116.122","4.15.0-2117.123","4.15.0-2118.124"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro","binaries":[{"binary_version":"4.15.0-2119.125","binary_name":"linux-aws-fips-headers-4.15.0-2119"},{"binary_version":"4.15.0-2119.125","binary_name":"linux-aws-fips-tools-4.15.0-2119"},{"binary_version":"4.15.0-2119.125","binary_name":"linux-buildinfo-4.15.0-2119-aws-fips"},{"binary_version":"4.15.0-2119.125","binary_name":"linux-headers-4.15.0-2119-aws-fips"},{"binary_version":"4.15.0-2119.125","binary_name":"linux-image-unsigned-4.15.0-2119-aws-fips"},{"binary_version":"4.15.0-2119.125","binary_name":"linux-image-unsigned-hmac-4.15.0-2119-aws-fips"},{"binary_version":"4.15.0-2119.125","binary_name":"linux-modules-4.15.0-2119-aws-fips"},{"binary_version":"4.15.0-2119.125","binary_name":"linux-modules-extra-4.15.0-2119-aws-fips"},{"binary_version":"4.15.0-2119.125","binary_name":"linux-tools-4.15.0-2119-aws-fips"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7553-2.json","cves_map":{"ecosystem":"Ubuntu:Pro:FIPS-updates:18.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-47211"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-26966"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-42301"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-47701"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-53155"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2024-53168"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2024-56551"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2024-56596"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2024-57850"}]}}},{"package":{"name":"linux-gcp-fips","ecosystem":"Ubuntu:Pro:FIPS-updates:18.04:LTS","purl":"pkg:deb/ubuntu/linux-gcp-fips@4.15.0-2082.88?arch=source&distro=fips-updates/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-2082.88"}]}],"versions":["4.15.0-2013.14","4.15.0-2016.18","4.15.0-2017.19","4.15.0-2018.20","4.15.0-2019.21","4.15.0-2020.22","4.15.0-2021.23","4.15.0-2022.24","4.15.0-2024.26","4.15.0-2025.27","4.15.0-2026.28","4.15.0-2028.31","4.15.0-2029.32","4.15.0-2030.33","4.15.0-2031.34","4.15.0-2032.35","4.15.0-2034.37","4.15.0-2037.41","4.15.0-2040.45","4.15.0-2041.46","4.15.0-2043.48","4.15.0-2044.49","4.15.0-2045.50","4.15.0-2047.52","4.15.0-2050.55","4.15.0-2052.57","4.15.0-2054.59","4.15.0-2055.60","4.15.0-2056.61","4.15.0-2057.62","4.15.0-2058.63","4.15.0-2059.64","4.15.0-2060.65","4.15.0-2061.66","4.15.0-2062.67","4.15.0-2063.68","4.15.0-2064.69","4.15.0-2065.70","4.15.0-2066.71","4.15.0-2067.72","4.15.0-2068.73","4.15.0-2069.74","4.15.0-2070.75","4.15.0-2071.76","4.15.0-2072.77","4.15.0-2073.78","4.15.0-2074.79","4.15.0-2075.80","4.15.0-2076.81","4.15.0-2077.83","4.15.0-2078.84","4.15.0-2079.85","4.15.0-2080.86","4.15.0-2081.87"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro","binaries":[{"binary_version":"4.15.0-2082.88","binary_name":"linux-buildinfo-4.15.0-2082-gcp-fips"},{"binary_version":"4.15.0-2082.88","binary_name":"linux-gcp-fips-headers-4.15.0-2082"},{"binary_version":"4.15.0-2082.88","binary_name":"linux-gcp-fips-tools-4.15.0-2082"},{"binary_version":"4.15.0-2082.88","binary_name":"linux-headers-4.15.0-2082-gcp-fips"},{"binary_version":"4.15.0-2082.88","binary_name":"linux-image-unsigned-4.15.0-2082-gcp-fips"},{"binary_version":"4.15.0-2082.88","binary_name":"linux-image-unsigned-hmac-4.15.0-2082-gcp-fips"},{"binary_version":"4.15.0-2082.88","binary_name":"linux-modules-4.15.0-2082-gcp-fips"},{"binary_version":"4.15.0-2082.88","binary_name":"linux-modules-extra-4.15.0-2082-gcp-fips"},{"binary_version":"4.15.0-2082.88","binary_name":"linux-tools-4.15.0-2082-gcp-fips"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7553-2.json","cves_map":{"ecosystem":"Ubuntu:Pro:FIPS-updates:18.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-47211"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-26966"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-42301"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-47701"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-53155"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2024-53168"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2024-56551"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2024-56596"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2024-57850"}]}}}],"schema_version":"1.7.3"}