{"id":"USN-7553-6","summary":"linux-azure-fips vulnerabilities","details":"Several security issues were discovered in the Linux kernel.\nAn attacker could possibly use these to compromise the system.\nThis update corrects flaws in the following subsystems:\n  - Clock framework and drivers;\n  - GPU drivers;\n  - Parport drivers;\n  - Ext4 file system;\n  - JFFS2 file system;\n  - JFS file system;\n  - File systems infrastructure;\n  - Sun RPC protocol;\n  - USB sound devices;\n(CVE-2024-56551, CVE-2024-47701, CVE-2024-57850, CVE-2024-26966,\nCVE-2021-47211, CVE-2024-56596, CVE-2024-53155, CVE-2024-42301,\nCVE-2024-53168)\n","modified":"2026-04-27T18:03:54.172355Z","published":"2025-06-09T16:59:05Z","related":["UBUNTU-CVE-2021-47211","UBUNTU-CVE-2024-26966","UBUNTU-CVE-2024-42301","UBUNTU-CVE-2024-47701","UBUNTU-CVE-2024-53155","UBUNTU-CVE-2024-53168","UBUNTU-CVE-2024-56551","UBUNTU-CVE-2024-56596","UBUNTU-CVE-2024-57850"],"upstream":["CVE-2021-47211","CVE-2024-26966","CVE-2024-42301","CVE-2024-47701","CVE-2024-53155","CVE-2024-53168","CVE-2024-56551","CVE-2024-56596","CVE-2024-57850","UBUNTU-CVE-2021-47211","UBUNTU-CVE-2024-26966","UBUNTU-CVE-2024-42301","UBUNTU-CVE-2024-47701","UBUNTU-CVE-2024-53155","UBUNTU-CVE-2024-53168","UBUNTU-CVE-2024-56551","UBUNTU-CVE-2024-56596","UBUNTU-CVE-2024-57850"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7553-6"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-47211"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26966"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-42301"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-47701"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-53155"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-53168"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-56551"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-56596"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-57850"}],"affected":[{"package":{"name":"linux-azure-fips","ecosystem":"Ubuntu:Pro:FIPS-updates:18.04:LTS","purl":"pkg:deb/ubuntu/linux-azure-fips@4.15.0-2098.104?arch=source&distro=fips-updates/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-2098.104"}]}],"versions":["4.15.0-1002.2","4.15.0-2006.7","4.15.0-2007.8","4.15.0-2008.9","4.15.0-2009.10","4.15.0-2012.14","4.15.0-2013.15","4.15.0-2015.17","4.15.0-2016.18","4.15.0-2017.20","4.15.0-2018.21","4.15.0-2020.23","4.15.0-2021.24","4.15.0-2022.25","4.15.0-2023.26","4.15.0-2024.27","4.15.0-2025.28","4.15.0-2026.29","4.15.0-2027.30","4.15.0-2030.33","4.15.0-2033.37","4.15.0-2034.38","4.15.0-2035.39","4.15.0-2036.40","4.15.0-2037.41","4.15.0-2038.42","4.15.0-2039.43","4.15.0-2041.45","4.15.0-2042.46","4.15.0-2043.47","4.15.0-2045.49","4.15.0-2046.50","4.15.0-2047.51","4.15.0-2048.52","4.15.0-2049.53","4.15.0-2050.54","4.15.0-2053.58","4.15.0-2056.62","4.15.0-2057.63","4.15.0-2059.65","4.15.0-2060.66","4.15.0-2062.68","4.15.0-2066.72","4.15.0-2067.73","4.15.0-2068.74","4.15.0-2070.76","4.15.0-2071.77","4.15.0-2072.78","4.15.0-2073.79","4.15.0-2074.80","4.15.0-2075.81","4.15.0-2076.82","4.15.0-2077.83","4.15.0-2078.84","4.15.0-2079.85","4.15.0-2080.86","4.15.0-2081.87","4.15.0-2082.88","4.15.0-2084.90","4.15.0-2085.91","4.15.0-2086.92","4.15.0-2087.93","4.15.0-2088.94","4.15.0-2089.95","4.15.0-2090.96","4.15.0-2091.97","4.15.0-2092.98","4.15.0-2093.99","4.15.0-2094.100","4.15.0-2095.101","4.15.0-2096.102","4.15.0-2097.103"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro","binaries":[{"binary_version":"4.15.0-2098.104","binary_name":"linux-azure-fips-cloud-tools-4.15.0-2098"},{"binary_version":"4.15.0-2098.104","binary_name":"linux-azure-fips-headers-4.15.0-2098"},{"binary_version":"4.15.0-2098.104","binary_name":"linux-azure-fips-tools-4.15.0-2098"},{"binary_version":"4.15.0-2098.104","binary_name":"linux-buildinfo-4.15.0-2098-azure-fips"},{"binary_version":"4.15.0-2098.104","binary_name":"linux-cloud-tools-4.15.0-2098-azure-fips"},{"binary_version":"4.15.0-2098.104","binary_name":"linux-headers-4.15.0-2098-azure-fips"},{"binary_version":"4.15.0-2098.104","binary_name":"linux-image-unsigned-4.15.0-2098-azure-fips"},{"binary_version":"4.15.0-2098.104","binary_name":"linux-image-unsigned-hmac-4.15.0-2098-azure-fips"},{"binary_version":"4.15.0-2098.104","binary_name":"linux-modules-4.15.0-2098-azure-fips"},{"binary_version":"4.15.0-2098.104","binary_name":"linux-modules-extra-4.15.0-2098-azure-fips"},{"binary_version":"4.15.0-2098.104","binary_name":"linux-tools-4.15.0-2098-azure-fips"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7553-6.json","cves_map":{"ecosystem":"Ubuntu:Pro:FIPS-updates:18.04:LTS","cves":[{"id":"CVE-2021-47211","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2024-26966","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2024-42301","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2024-47701","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2024-53155","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2024-53168","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2024-56551","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2024-56596","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2024-57850","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]}]}}}],"schema_version":"1.7.5"}