{"id":"USN-7988-4","summary":"linux-gcp-fips vulnerabilities","details":"Several security issues were discovered in the Linux kernel.\nAn attacker could possibly use these to compromise the system.\nThis update corrects flaws in the following subsystems:\n  - Media drivers;\n  - NVME drivers;\n  - File systems infrastructure;\n  - Timer subsystem;\n  - Memory management;\n  - Packet sockets;\n(CVE-2022-48986, CVE-2024-27078, CVE-2024-49959, CVE-2024-50195,\nCVE-2024-56606, CVE-2024-56756, CVE-2025-39993)\n","modified":"2026-02-12T06:58:44.165883Z","published":"2026-02-11T12:55:32Z","related":["UBUNTU-CVE-2022-48986","UBUNTU-CVE-2024-27078","UBUNTU-CVE-2024-49959","UBUNTU-CVE-2024-50195","UBUNTU-CVE-2024-56606","UBUNTU-CVE-2024-56756","UBUNTU-CVE-2025-39993"],"upstream":["CVE-2022-48986","CVE-2024-27078","CVE-2024-49959","CVE-2024-50195","CVE-2024-56606","CVE-2024-56756","CVE-2025-39993","UBUNTU-CVE-2022-48986","UBUNTU-CVE-2024-27078","UBUNTU-CVE-2024-49959","UBUNTU-CVE-2024-50195","UBUNTU-CVE-2024-56606","UBUNTU-CVE-2024-56756","UBUNTU-CVE-2025-39993"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7988-4"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-48986"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-27078"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-49959"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-50195"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-56606"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-56756"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-39993"}],"affected":[{"package":{"name":"linux-gcp-fips","ecosystem":"Ubuntu:Pro:FIPS-updates:18.04:LTS","purl":"pkg:deb/ubuntu/linux-gcp-fips@4.15.0-2089.95?arch=source&distro=fips-updates/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-2089.95"}]}],"versions":["4.15.0-2013.14","4.15.0-2016.18","4.15.0-2017.19","4.15.0-2018.20","4.15.0-2019.21","4.15.0-2020.22","4.15.0-2021.23","4.15.0-2022.24","4.15.0-2024.26","4.15.0-2025.27","4.15.0-2026.28","4.15.0-2028.31","4.15.0-2029.32","4.15.0-2030.33","4.15.0-2031.34","4.15.0-2032.35","4.15.0-2034.37","4.15.0-2037.41","4.15.0-2040.45","4.15.0-2041.46","4.15.0-2043.48","4.15.0-2044.49","4.15.0-2045.50","4.15.0-2047.52","4.15.0-2050.55","4.15.0-2052.57","4.15.0-2054.59","4.15.0-2055.60","4.15.0-2056.61","4.15.0-2057.62","4.15.0-2058.63","4.15.0-2059.64","4.15.0-2060.65","4.15.0-2061.66","4.15.0-2062.67","4.15.0-2063.68","4.15.0-2064.69","4.15.0-2065.70","4.15.0-2066.71","4.15.0-2067.72","4.15.0-2068.73","4.15.0-2069.74","4.15.0-2070.75","4.15.0-2071.76","4.15.0-2072.77","4.15.0-2073.78","4.15.0-2074.79","4.15.0-2075.80","4.15.0-2076.81","4.15.0-2077.83","4.15.0-2078.84","4.15.0-2079.85","4.15.0-2080.86","4.15.0-2081.87","4.15.0-2082.88","4.15.0-2083.89","4.15.0-2084.90","4.15.0-2085.91","4.15.0-2086.92","4.15.0-2087.93","4.15.0-2088.94"],"ecosystem_specific":{"binaries":[{"binary_name":"linux-buildinfo-4.15.0-2089-gcp-fips","binary_version":"4.15.0-2089.95"},{"binary_name":"linux-gcp-fips-headers-4.15.0-2089","binary_version":"4.15.0-2089.95"},{"binary_name":"linux-gcp-fips-tools-4.15.0-2089","binary_version":"4.15.0-2089.95"},{"binary_name":"linux-headers-4.15.0-2089-gcp-fips","binary_version":"4.15.0-2089.95"},{"binary_name":"linux-image-unsigned-4.15.0-2089-gcp-fips","binary_version":"4.15.0-2089.95"},{"binary_name":"linux-image-unsigned-hmac-4.15.0-2089-gcp-fips","binary_version":"4.15.0-2089.95"},{"binary_name":"linux-modules-4.15.0-2089-gcp-fips","binary_version":"4.15.0-2089.95"},{"binary_name":"linux-modules-extra-4.15.0-2089-gcp-fips","binary_version":"4.15.0-2089.95"},{"binary_name":"linux-tools-4.15.0-2089-gcp-fips","binary_version":"4.15.0-2089.95"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7988-4.json","cves_map":{"cves":[{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-48986"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-27078"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-49959"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-50195"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-56606"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-56756"},{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2025-39993"}],"ecosystem":"Ubuntu:Pro:FIPS-updates:18.04:LTS"}}}],"schema_version":"1.7.3"}