{"id":"USN-7516-8","summary":"linux-aws-fips, linux-fips vulnerabilities","details":"Several security issues were discovered in the Linux kernel.\nAn attacker could possibly use these to compromise the system.\nThis update corrects flaws in the following subsystems:\n  - ARM64 architecture;\n  - PowerPC architecture;\n  - Block layer subsystem;\n  - Drivers core;\n  - Network block device driver;\n  - Character device driver;\n  - GPU drivers;\n  - HID subsystem;\n  - InfiniBand drivers;\n  - Media drivers;\n  - Network drivers;\n  - PPS (Pulse Per Second) driver;\n  - PTP clock framework;\n  - RapidIO drivers;\n  - Real Time Clock drivers;\n  - SCSI subsystem;\n  - SLIMbus drivers;\n  - QCOM SoC drivers;\n  - Trusted Execution Environment drivers;\n  - USB DSL drivers;\n  - USB Device Class drivers;\n  - USB core drivers;\n  - USB Gadget drivers;\n  - USB Host Controller drivers;\n  - Renesas USBHS Controller drivers;\n  - File systems infrastructure;\n  - BTRFS file system;\n  - NILFS2 file system;\n  - UBI file system;\n  - KVM subsystem;\n  - L3 Master device support module;\n  - Process Accounting mechanism;\n  - printk logging mechanism;\n  - Scheduler infrastructure;\n  - Tracing infrastructure;\n  - Memory management;\n  - 802.1Q VLAN protocol;\n  - B.A.T.M.A.N. meshing protocol;\n  - Bluetooth subsystem;\n  - Networking core;\n  - IPv4 networking;\n  - IPv6 networking;\n  - Logical Link layer;\n  - NFC subsystem;\n  - Open vSwitch;\n  - Rose network layer;\n  - Network traffic control;\n  - Wireless networking;\n  - Tomoyo security module;\n(CVE-2024-58072, CVE-2024-58051, CVE-2024-58058, CVE-2024-57977,\nCVE-2024-58007, CVE-2025-21753, CVE-2025-21647, CVE-2025-21787,\nCVE-2025-21791, CVE-2025-21782, CVE-2024-56599, CVE-2024-58063,\nCVE-2025-21806, CVE-2021-47191, CVE-2025-21823, CVE-2025-21776,\nCVE-2025-21948, CVE-2024-58017, CVE-2024-57981, CVE-2025-21925,\nCVE-2024-58069, CVE-2024-58085, CVE-2025-21704, CVE-2025-21811,\nCVE-2025-21858, CVE-2025-21862, CVE-2024-58010, CVE-2025-21926,\nCVE-2025-21920, CVE-2025-21762, CVE-2025-21914, CVE-2025-21916,\nCVE-2023-52741, CVE-2025-21835, CVE-2025-21761, CVE-2025-21905,\nCVE-2024-50055, CVE-2024-57980, CVE-2025-21728, CVE-2025-21910,\nCVE-2025-21785, CVE-2025-21848, CVE-2024-58090, CVE-2025-21971,\nCVE-2024-58071, CVE-2025-21909, CVE-2025-21722, CVE-2025-21765,\nCVE-2025-21859, CVE-2025-21744, CVE-2025-21781, CVE-2025-21922,\nCVE-2024-57979, CVE-2024-58052, CVE-2025-21718, CVE-2024-58014,\nCVE-2024-58020, CVE-2025-21772, CVE-2025-21904, CVE-2025-21708,\nCVE-2025-21846, CVE-2025-21935, CVE-2025-21763, CVE-2025-21934,\nCVE-2024-57973, CVE-2025-21877, CVE-2025-21760, CVE-2024-58002,\nCVE-2025-21721, CVE-2025-21719, CVE-2024-58083, CVE-2025-21928,\nCVE-2025-21871, CVE-2024-58009, CVE-2025-21749, CVE-2025-21866,\nCVE-2024-58055, CVE-2025-21814, CVE-2024-26996, CVE-2025-21898,\nCVE-2025-21715, CVE-2024-57986, CVE-2024-58001, CVE-2025-21731,\nCVE-2025-21764, CVE-2025-21917, CVE-2024-26982, CVE-2025-21736,\nCVE-2025-21865, CVE-2025-21735)\n","modified":"2026-05-23T01:47:51.014028954Z","published":"2025-05-29T12:10:53Z","related":["UBUNTU-CVE-2021-47191","UBUNTU-CVE-2023-52741","UBUNTU-CVE-2024-26982","UBUNTU-CVE-2024-26996","UBUNTU-CVE-2024-50055","UBUNTU-CVE-2024-56599","UBUNTU-CVE-2024-57973","UBUNTU-CVE-2024-57977","UBUNTU-CVE-2024-57979","UBUNTU-CVE-2024-57980","UBUNTU-CVE-2024-57981","UBUNTU-CVE-2024-57986","UBUNTU-CVE-2024-58001","UBUNTU-CVE-2024-58002","UBUNTU-CVE-2024-58007","UBUNTU-CVE-2024-58009","UBUNTU-CVE-2024-58010","UBUNTU-CVE-2024-58014","UBUNTU-CVE-2024-58017","UBUNTU-CVE-2024-58020","UBUNTU-CVE-2024-58051","UBUNTU-CVE-2024-58052","UBUNTU-CVE-2024-58055","UBUNTU-CVE-2024-58058","UBUNTU-CVE-2024-58063","UBUNTU-CVE-2024-58069","UBUNTU-CVE-2024-58071","UBUNTU-CVE-2024-58072","UBUNTU-CVE-2024-58083","UBUNTU-CVE-2024-58085","UBUNTU-CVE-2024-58090","UBUNTU-CVE-2025-21647","UBUNTU-CVE-2025-21704","UBUNTU-CVE-2025-21708","UBUNTU-CVE-2025-21715","UBUNTU-CVE-2025-21718","UBUNTU-CVE-2025-21719","UBUNTU-CVE-2025-21721","UBUNTU-CVE-2025-21722","UBUNTU-CVE-2025-21728","UBUNTU-CVE-2025-21731","UBUNTU-CVE-2025-21735","UBUNTU-CVE-2025-21736","UBUNTU-CVE-2025-21744","UBUNTU-CVE-2025-21749","UBUNTU-CVE-2025-21753","UBUNTU-CVE-2025-21760","UBUNTU-CVE-2025-21761","UBUNTU-CVE-2025-21762","UBUNTU-CVE-2025-21763","UBUNTU-CVE-2025-21764","UBUNTU-CVE-2025-21765","UBUNTU-CVE-2025-21772","UBUNTU-CVE-2025-21776","UBUNTU-CVE-2025-21781","UBUNTU-CVE-2025-21782","UBUNTU-CVE-2025-21785","UBUNTU-CVE-2025-21787","UBUNTU-CVE-2025-21791","UBUNTU-CVE-2025-21806","UBUNTU-CVE-2025-21811","UBUNTU-CVE-2025-21814","UBUNTU-CVE-2025-21823","UBUNTU-CVE-2025-21835","UBUNTU-CVE-2025-21846","UBUNTU-CVE-2025-21848","UBUNTU-CVE-2025-21858","UBUNTU-CVE-2025-21859","UBUNTU-CVE-2025-21862","UBUNTU-CVE-2025-21865","UBUNTU-CVE-2025-21866","UBUNTU-CVE-2025-21871","UBUNTU-CVE-2025-21877","UBUNTU-CVE-2025-21898","UBUNTU-CVE-2025-21904","UBUNTU-CVE-2025-21905","UBUNTU-CVE-2025-21909","UBUNTU-CVE-2025-21910","UBUNTU-CVE-2025-21914","UBUNTU-CVE-2025-21916","UBUNTU-CVE-2025-21917","UBUNTU-CVE-2025-21920","UBUNTU-CVE-2025-21922","UBUNTU-CVE-2025-21925","UBUNTU-CVE-2025-21926","UBUNTU-CVE-2025-21928","UBUNTU-CVE-2025-21934","UBUNTU-CVE-2025-21935","UBUNTU-CVE-2025-21948","UBUNTU-CVE-2025-21971"],"upstream":["CVE-2024-58009","UBUNTU-CVE-2024-58009"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7516-8"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-58009"}],"affected":[{"package":{"name":"linux-aws-fips","ecosystem":"Ubuntu:Pro:FIPS-updates:20.04:LTS","purl":"pkg:deb/ubuntu/linux-aws-fips?arch=source&distro=fips-updates%2Ffocal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.4.0-1146.156+fips1"}]}],"versions":["5.4.0-1021.21+fips2","5.4.0-1069.73+fips2","5.4.0-1071.76+fips1","5.4.0-1072.77+fips1","5.4.0-1073.78+fips1","5.4.0-1078.84+fips1","5.4.0-1080.87+fips1","5.4.0-1081.88+fips1","5.4.0-1083.90+fips1","5.4.0-1085.92+fips1","5.4.0-1086.93+fips1","5.4.0-1088.96+fips1","5.4.0-1089.97+fips1","5.4.0-1092.100+fips1","5.4.0-1093.101+fips1","5.4.0-1094.102+fips1","5.4.0-1096.104+fips1","5.4.0-1099.107+fips1","5.4.0-1100.108+fips1","5.4.0-1101.109+fips1","5.4.0-1102.110+fips1","5.4.0-1103.111+fips1","5.4.0-1104.112+fips1","5.4.0-1105.113+fips1","5.4.0-1106.114+fips1","5.4.0-1107.115+fips1","5.4.0-1108.116+fips1","5.4.0-1109.118+fips1","5.4.0-1110.119+fips1","5.4.0-1111.120+fips1","5.4.0-1112.121+fips1","5.4.0-1113.123+fips1","5.4.0-1114.124+fips1","5.4.0-1116.126+fips1","5.4.0-1117.127+fips1","5.4.0-1118.128+fips1","5.4.0-1119.129+fips1","5.4.0-1120.130+fips1","5.4.0-1121.131+fips1","5.4.0-1122.132+fips1","5.4.0-1123.133+fips1","5.4.0-1124.134+fips1","5.4.0-1125.135+fips1","5.4.0-1126.136+fips2","5.4.0-1127.137+fips1","5.4.0-1128.138+fips1","5.4.0-1129.139+fips1","5.4.0-1130.140+fips1","5.4.0-1131.141+fips1","5.4.0-1132.142+fips1","5.4.0-1133.143+fips1","5.4.0-1134.144+fips1","5.4.0-1135.145+fips1","5.4.0-1136.146+fips1","5.4.0-1137.147+fips1","5.4.0-1139.149+fips1","5.4.0-1140.151+fips1","5.4.0-1142.153+fips1","5.4.0-1144.155+fips1","5.4.0-1145.156+fips1"],"ecosystem_specific":{"binaries":[{"binary_version":"5.4.0-1146.156+fips1","binary_name":"linux-aws-fips-headers-5.4.0-1146"},{"binary_version":"5.4.0-1146.156+fips1","binary_name":"linux-aws-fips-tools-5.4.0-1146"},{"binary_version":"5.4.0-1146.156+fips1","binary_name":"linux-buildinfo-5.4.0-1146-aws-fips"},{"binary_version":"5.4.0-1146.156+fips1","binary_name":"linux-headers-5.4.0-1146-aws-fips"},{"binary_version":"5.4.0-1146.156+fips1","binary_name":"linux-image-unsigned-5.4.0-1146-aws-fips"},{"binary_version":"5.4.0-1146.156+fips1","binary_name":"linux-image-unsigned-hmac-5.4.0-1146-aws-fips"},{"binary_version":"5.4.0-1146.156+fips1","binary_name":"linux-modules-5.4.0-1146-aws-fips"},{"binary_version":"5.4.0-1146.156+fips1","binary_name":"linux-modules-extra-5.4.0-1146-aws-fips"},{"binary_version":"5.4.0-1146.156+fips1","binary_name":"linux-tools-5.4.0-1146-aws-fips"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7516-8.json","cves_map":{"cves":[{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-58009"}],"ecosystem":"Ubuntu:Pro:FIPS-updates:20.04:LTS"}}},{"package":{"name":"linux-fips","ecosystem":"Ubuntu:Pro:FIPS-updates:20.04:LTS","purl":"pkg:deb/ubuntu/linux-fips?arch=source&distro=fips-updates%2Ffocal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.4.0-1120.130"}]}],"versions":["5.4.0-1026.30","5.4.0-1028.32","5.4.0-1031.36","5.4.0-1032.37","5.4.0-1033.38","5.4.0-1034.40","5.4.0-1035.41","5.4.0-1036.42","5.4.0-1037.43","5.4.0-1038.44","5.4.0-1040.46","5.4.0-1041.47","5.4.0-1042.48","5.4.0-1043.49","5.4.0-1045.51","5.4.0-1046.52","5.4.0-1047.53","5.4.0-1048.54","5.4.0-1049.55","5.4.0-1051.57","5.4.0-1054.61","5.4.0-1056.64","5.4.0-1057.65","5.4.0-1059.67","5.4.0-1060.68","5.4.0-1061.69","5.4.0-1062.70","5.4.0-1064.73","5.4.0-1065.74","5.4.0-1068.77","5.4.0-1069.78","5.4.0-1070.79","5.4.0-1072.81","5.4.0-1073.82","5.4.0-1074.83","5.4.0-1075.84","5.4.0-1076.85","5.4.0-1077.86","5.4.0-1078.87","5.4.0-1079.88","5.4.0-1080.89","5.4.0-1081.90","5.4.0-1082.91","5.4.0-1083.92","5.4.0-1084.93","5.4.0-1085.94","5.4.0-1086.95","5.4.0-1087.96","5.4.0-1088.97","5.4.0-1089.98","5.4.0-1090.100","5.4.0-1091.101","5.4.0-1092.102","5.4.0-1094.104","5.4.0-1095.105","5.4.0-1096.106","5.4.0-1097.107","5.4.0-1098.108","5.4.0-1099.109","5.4.0-1100.110","5.4.0-1101.111","5.4.0-1102.112","5.4.0-1103.113","5.4.0-1104.114","5.4.0-1105.115","5.4.0-1106.116","5.4.0-1107.117","5.4.0-1108.118","5.4.0-1109.119","5.4.0-1110.120","5.4.0-1111.121","5.4.0-1112.122","5.4.0-1116.126","5.4.0-1117.127","5.4.0-1118.128","5.4.0-1119.129"],"ecosystem_specific":{"binaries":[{"binary_version":"5.4.0-1120.130","binary_name":"linux-buildinfo-5.4.0-1120-fips"},{"binary_version":"5.4.0-1120.130","binary_name":"linux-fips-headers-5.4.0-1120"},{"binary_version":"5.4.0-1120.130","binary_name":"linux-fips-tools-5.4.0-1120"},{"binary_version":"5.4.0-1120.130","binary_name":"linux-fips-tools-host"},{"binary_version":"5.4.0-1120.130","binary_name":"linux-headers-5.4.0-1120-fips"},{"binary_version":"5.4.0-1120.130","binary_name":"linux-image-unsigned-5.4.0-1120-fips"},{"binary_version":"5.4.0-1120.130","binary_name":"linux-image-unsigned-hmac-5.4.0-1120-fips"},{"binary_version":"5.4.0-1120.130","binary_name":"linux-modules-5.4.0-1120-fips"},{"binary_version":"5.4.0-1120.130","binary_name":"linux-modules-extra-5.4.0-1120-fips"},{"binary_version":"5.4.0-1120.130","binary_name":"linux-tools-5.4.0-1120-fips"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7516-8.json","cves_map":{"cves":[{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-58009"}],"ecosystem":"Ubuntu:Pro:FIPS-updates:20.04:LTS"}}}],"schema_version":"1.7.5"}