{"id":"USN-7922-2","summary":"linux-fips, linux-aws-fips, linux-gcp-fips vulnerabilities","details":"Several security issues were discovered in the Linux kernel.\nAn attacker could possibly use these to compromise the system.\nThis update corrects flaws in the following subsystems:\n  - Cryptographic API;\n  - ACPI drivers;\n  - InfiniBand drivers;\n  - Media drivers;\n  - Network drivers;\n  - Pin controllers subsystem;\n  - AFS file system;\n  - F2FS file system;\n  - Tracing infrastructure;\n  - Memory management;\n  - Appletalk network protocol;\n  - Netfilter;\n(CVE-2022-49026, CVE-2022-49390, CVE-2024-47691, CVE-2024-49935,\nCVE-2024-50067, CVE-2024-50095, CVE-2024-50196, CVE-2024-53090,\nCVE-2024-53218, CVE-2025-21855, CVE-2025-37958, CVE-2025-38666,\nCVE-2025-39964, CVE-2025-39993, CVE-2025-40018)\n","modified":"2026-02-10T04:50:46Z","published":"2025-12-11T16:35:08Z","related":["UBUNTU-CVE-2022-49026","UBUNTU-CVE-2022-49390","UBUNTU-CVE-2024-47691","UBUNTU-CVE-2024-49935","UBUNTU-CVE-2024-50067","UBUNTU-CVE-2024-50095","UBUNTU-CVE-2024-50196","UBUNTU-CVE-2024-53090","UBUNTU-CVE-2024-53218","UBUNTU-CVE-2025-21855","UBUNTU-CVE-2025-37958","UBUNTU-CVE-2025-38666","UBUNTU-CVE-2025-39964","UBUNTU-CVE-2025-39993","UBUNTU-CVE-2025-40018"],"upstream":["CVE-2022-49026","CVE-2022-49390","CVE-2024-47691","CVE-2024-49935","CVE-2024-50067","CVE-2024-50095","CVE-2024-50196","CVE-2024-53090","CVE-2024-53218","CVE-2025-21855","CVE-2025-37958","CVE-2025-38666","CVE-2025-39964","CVE-2025-39993","CVE-2025-40018","UBUNTU-CVE-2022-49026","UBUNTU-CVE-2022-49390","UBUNTU-CVE-2024-47691","UBUNTU-CVE-2024-49935","UBUNTU-CVE-2024-50067","UBUNTU-CVE-2024-50095","UBUNTU-CVE-2024-50196","UBUNTU-CVE-2024-53090","UBUNTU-CVE-2024-53218","UBUNTU-CVE-2025-21855","UBUNTU-CVE-2025-37958","UBUNTU-CVE-2025-38666","UBUNTU-CVE-2025-39964","UBUNTU-CVE-2025-39993","UBUNTU-CVE-2025-40018"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7922-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-49026"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-49390"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-47691"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-49935"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-50067"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-50095"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-50196"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-53090"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-53218"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-21855"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-37958"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-38666"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-39964"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-39993"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-40018"}],"affected":[{"package":{"name":"linux-aws-fips","ecosystem":"Ubuntu:Pro:FIPS-updates:20.04:LTS","purl":"pkg:deb/ubuntu/linux-aws-fips@5.4.0-1153.163+fips1?arch=source&distro=fips-updates/focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.4.0-1153.163+fips1"}]}],"versions":["5.4.0-1021.21+fips2","5.4.0-1069.73+fips2","5.4.0-1071.76+fips1","5.4.0-1072.77+fips1","5.4.0-1073.78+fips1","5.4.0-1078.84+fips1","5.4.0-1080.87+fips1","5.4.0-1081.88+fips1","5.4.0-1083.90+fips1","5.4.0-1085.92+fips1","5.4.0-1086.93+fips1","5.4.0-1088.96+fips1","5.4.0-1089.97+fips1","5.4.0-1092.100+fips1","5.4.0-1093.101+fips1","5.4.0-1094.102+fips1","5.4.0-1096.104+fips1","5.4.0-1099.107+fips1","5.4.0-1100.108+fips1","5.4.0-1101.109+fips1","5.4.0-1102.110+fips1","5.4.0-1103.111+fips1","5.4.0-1104.112+fips1","5.4.0-1105.113+fips1","5.4.0-1106.114+fips1","5.4.0-1107.115+fips1","5.4.0-1108.116+fips1","5.4.0-1109.118+fips1","5.4.0-1110.119+fips1","5.4.0-1111.120+fips1","5.4.0-1112.121+fips1","5.4.0-1113.123+fips1","5.4.0-1114.124+fips1","5.4.0-1116.126+fips1","5.4.0-1117.127+fips1","5.4.0-1118.128+fips1","5.4.0-1119.129+fips1","5.4.0-1120.130+fips1","5.4.0-1121.131+fips1","5.4.0-1122.132+fips1","5.4.0-1123.133+fips1","5.4.0-1124.134+fips1","5.4.0-1125.135+fips1","5.4.0-1126.136+fips2","5.4.0-1127.137+fips1","5.4.0-1128.138+fips1","5.4.0-1129.139+fips1","5.4.0-1130.140+fips1","5.4.0-1131.141+fips1","5.4.0-1132.142+fips1","5.4.0-1133.143+fips1","5.4.0-1134.144+fips1","5.4.0-1135.145+fips1","5.4.0-1136.146+fips1","5.4.0-1137.147+fips1","5.4.0-1139.149+fips1","5.4.0-1140.151+fips1","5.4.0-1142.153+fips1","5.4.0-1144.155+fips1","5.4.0-1145.156+fips1","5.4.0-1146.156+fips1","5.4.0-1147.157+fips1","5.4.0-1148.158+fips1","5.4.0-1149.159+fips1","5.4.0-1150.160+fips1","5.4.0-1151.161+fips1","5.4.0-1152.162+fips1"],"ecosystem_specific":{"binaries":[{"binary_name":"linux-aws-fips-headers-5.4.0-1153","binary_version":"5.4.0-1153.163+fips1"},{"binary_name":"linux-aws-fips-tools-5.4.0-1153","binary_version":"5.4.0-1153.163+fips1"},{"binary_name":"linux-buildinfo-5.4.0-1153-aws-fips","binary_version":"5.4.0-1153.163+fips1"},{"binary_name":"linux-headers-5.4.0-1153-aws-fips","binary_version":"5.4.0-1153.163+fips1"},{"binary_name":"linux-image-unsigned-5.4.0-1153-aws-fips","binary_version":"5.4.0-1153.163+fips1"},{"binary_name":"linux-image-unsigned-hmac-5.4.0-1153-aws-fips","binary_version":"5.4.0-1153.163+fips1"},{"binary_name":"linux-modules-5.4.0-1153-aws-fips","binary_version":"5.4.0-1153.163+fips1"},{"binary_name":"linux-modules-extra-5.4.0-1153-aws-fips","binary_version":"5.4.0-1153.163+fips1"},{"binary_name":"linux-tools-5.4.0-1153-aws-fips","binary_version":"5.4.0-1153.163+fips1"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7922-2.json","cves_map":{"ecosystem":"Ubuntu:Pro:FIPS-updates:20.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2022-49026"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2022-49390"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2024-47691"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-49935"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-50067"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-50095"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-50196"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-53090"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2024-53218"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2025-21855"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2025-37958"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2025-38666"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2025-39964"},{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2025-39993"},{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2025-40018"}]}}},{"package":{"name":"linux-fips","ecosystem":"Ubuntu:Pro:FIPS-updates:20.04:LTS","purl":"pkg:deb/ubuntu/linux-fips@5.4.0-1127.137?arch=source&distro=fips-updates/focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.4.0-1127.137"}]}],"versions":["5.4.0-1026.30","5.4.0-1028.32","5.4.0-1031.36","5.4.0-1032.37","5.4.0-1033.38","5.4.0-1034.40","5.4.0-1035.41","5.4.0-1036.42","5.4.0-1037.43","5.4.0-1038.44","5.4.0-1040.46","5.4.0-1041.47","5.4.0-1042.48","5.4.0-1043.49","5.4.0-1045.51","5.4.0-1046.52","5.4.0-1047.53","5.4.0-1048.54","5.4.0-1049.55","5.4.0-1051.57","5.4.0-1054.61","5.4.0-1056.64","5.4.0-1057.65","5.4.0-1059.67","5.4.0-1060.68","5.4.0-1061.69","5.4.0-1062.70","5.4.0-1064.73","5.4.0-1065.74","5.4.0-1068.77","5.4.0-1069.78","5.4.0-1070.79","5.4.0-1072.81","5.4.0-1073.82","5.4.0-1074.83","5.4.0-1075.84","5.4.0-1076.85","5.4.0-1077.86","5.4.0-1078.87","5.4.0-1079.88","5.4.0-1080.89","5.4.0-1081.90","5.4.0-1082.91","5.4.0-1083.92","5.4.0-1084.93","5.4.0-1085.94","5.4.0-1086.95","5.4.0-1087.96","5.4.0-1088.97","5.4.0-1089.98","5.4.0-1090.100","5.4.0-1091.101","5.4.0-1092.102","5.4.0-1094.104","5.4.0-1095.105","5.4.0-1096.106","5.4.0-1097.107","5.4.0-1098.108","5.4.0-1099.109","5.4.0-1100.110","5.4.0-1101.111","5.4.0-1102.112","5.4.0-1103.113","5.4.0-1104.114","5.4.0-1105.115","5.4.0-1106.116","5.4.0-1107.117","5.4.0-1108.118","5.4.0-1109.119","5.4.0-1110.120","5.4.0-1111.121","5.4.0-1112.122","5.4.0-1116.126","5.4.0-1117.127","5.4.0-1118.128","5.4.0-1119.129","5.4.0-1120.130","5.4.0-1121.131","5.4.0-1122.132","5.4.0-1123.133","5.4.0-1124.134","5.4.0-1125.135","5.4.0-1126.136"],"ecosystem_specific":{"binaries":[{"binary_name":"linux-buildinfo-5.4.0-1127-fips","binary_version":"5.4.0-1127.137"},{"binary_name":"linux-fips-headers-5.4.0-1127","binary_version":"5.4.0-1127.137"},{"binary_name":"linux-fips-tools-5.4.0-1127","binary_version":"5.4.0-1127.137"},{"binary_name":"linux-fips-tools-host","binary_version":"5.4.0-1127.137"},{"binary_name":"linux-headers-5.4.0-1127-fips","binary_version":"5.4.0-1127.137"},{"binary_name":"linux-image-unsigned-5.4.0-1127-fips","binary_version":"5.4.0-1127.137"},{"binary_name":"linux-image-unsigned-hmac-5.4.0-1127-fips","binary_version":"5.4.0-1127.137"},{"binary_name":"linux-modules-5.4.0-1127-fips","binary_version":"5.4.0-1127.137"},{"binary_name":"linux-modules-extra-5.4.0-1127-fips","binary_version":"5.4.0-1127.137"},{"binary_name":"linux-tools-5.4.0-1127-fips","binary_version":"5.4.0-1127.137"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7922-2.json","cves_map":{"ecosystem":"Ubuntu:Pro:FIPS-updates:20.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2022-49026"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2022-49390"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2024-47691"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-49935"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-50067"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-50095"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-50196"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-53090"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2024-53218"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2025-21855"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2025-37958"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2025-38666"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2025-39964"},{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2025-39993"},{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2025-40018"}]}}},{"package":{"name":"linux-gcp-fips","ecosystem":"Ubuntu:Pro:FIPS-updates:20.04:LTS","purl":"pkg:deb/ubuntu/linux-gcp-fips@5.4.0-1156.165+fips1?arch=source&distro=fips-updates/focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.4.0-1156.165+fips1"}]}],"versions":["5.4.0-1021.21+fips1","5.4.0-1067.71~20.04.1","5.4.0-1069.73+fips2","5.4.0-1071.75+fips1","5.4.0-1073.78+fips1","5.4.0-1075.80+fips1","5.4.0-1078.84+fips1","5.4.0-1080.87+fips1","5.4.0-1081.88+fips1","5.4.0-1086.94+fips1","5.4.0-1087.95+fips1","5.4.0-1089.97+fips1","5.4.0-1092.101+fips1","5.4.0-1093.102+fips1","5.4.0-1096.105+fips1","5.4.0-1097.106+fips1","5.4.0-1098.107+fips1","5.4.0-1100.109+fips1","5.4.0-1101.110+fips1","5.4.0-1102.111+fips1","5.4.0-1103.112+fips1","5.4.0-1104.113+fips1","5.4.0-1105.114+fips1","5.4.0-1106.115+fips1","5.4.0-1107.116+fips1","5.4.0-1108.117+fips1","5.4.0-1109.118+fips1","5.4.0-1110.119+fips1","5.4.0-1111.120+fips1","5.4.0-1112.121+fips1","5.4.0-1113.122+fips1","5.4.0-1115.124+fips1","5.4.0-1116.125+fips1","5.4.0-1117.126+fips1","5.4.0-1118.127+fips1","5.4.0-1120.129+fips1","5.4.0-1121.130+fips1","5.4.0-1122.131+fips1","5.4.0-1124.133+fips1","5.4.0-1125.134+fips1","5.4.0-1126.135+fips1","5.4.0-1127.136+fips1","5.4.0-1128.137+fips1","5.4.0-1129.138+fips1","5.4.0-1130.139+fips1","5.4.0-1131.140+fips1","5.4.0-1132.141+fips1","5.4.0-1133.142+fips1","5.4.0-1134.143+fips1","5.4.0-1135.144+fips1","5.4.0-1136.145+fips1","5.4.0-1137.146+fips1","5.4.0-1138.147+fips1","5.4.0-1139.148+fips1","5.4.0-1140.149+fips1","5.4.0-1141.150+fips1","5.4.0-1142.151+fips1","5.4.0-1143.152+fips1","5.4.0-1145.154+fips1","5.4.0-1146.155+fips1","5.4.0-1147.156+fips1","5.4.0-1148.157+fips1","5.4.0-1149.158+fips1","5.4.0-1150.159+fips1","5.4.0-1151.160+fips1","5.4.0-1152.161+fips1","5.4.0-1153.162+fips1","5.4.0-1154.163+fips1","5.4.0-1155.164+fips1"],"ecosystem_specific":{"binaries":[{"binary_name":"linux-buildinfo-5.4.0-1156-gcp-fips","binary_version":"5.4.0-1156.165+fips1"},{"binary_name":"linux-gcp-fips-headers-5.4.0-1156","binary_version":"5.4.0-1156.165+fips1"},{"binary_name":"linux-gcp-fips-tools-5.4.0-1156","binary_version":"5.4.0-1156.165+fips1"},{"binary_name":"linux-headers-5.4.0-1156-gcp-fips","binary_version":"5.4.0-1156.165+fips1"},{"binary_name":"linux-image-unsigned-5.4.0-1156-gcp-fips","binary_version":"5.4.0-1156.165+fips1"},{"binary_name":"linux-image-unsigned-hmac-5.4.0-1156-gcp-fips","binary_version":"5.4.0-1156.165+fips1"},{"binary_name":"linux-modules-5.4.0-1156-gcp-fips","binary_version":"5.4.0-1156.165+fips1"},{"binary_name":"linux-modules-extra-5.4.0-1156-gcp-fips","binary_version":"5.4.0-1156.165+fips1"},{"binary_name":"linux-tools-5.4.0-1156-gcp-fips","binary_version":"5.4.0-1156.165+fips1"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7922-2.json","cves_map":{"ecosystem":"Ubuntu:Pro:FIPS-updates:20.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2022-49026"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2022-49390"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2024-47691"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-49935"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-50067"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-50095"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-50196"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-53090"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2024-53218"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2025-21855"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2025-37958"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2025-38666"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2025-39964"},{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2025-39993"},{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2025-40018"}]}}}],"schema_version":"1.7.3"}