{"id":"USN-7990-2","summary":"linux-aws-fips, linux-fips, linux-gcp-fips vulnerabilities","details":"Several security issues were discovered in the Linux kernel.\nAn attacker could possibly use these to compromise the system.\nThis update corrects flaws in the following subsystems:\n  - Cryptographic API;\n  - Padata parallel execution mechanism;\n  - Netfilter;\n(CVE-2022-49698, CVE-2025-21726, CVE-2025-40019)\n","modified":"2026-02-10T04:50:48Z","published":"2026-01-30T15:41:31Z","related":["UBUNTU-CVE-2022-49698","UBUNTU-CVE-2025-21726","UBUNTU-CVE-2025-40019"],"upstream":["CVE-2022-49698","CVE-2025-21726","CVE-2025-40019","UBUNTU-CVE-2022-49698","UBUNTU-CVE-2025-21726","UBUNTU-CVE-2025-40019"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7990-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-49698"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-21726"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-40019"}],"affected":[{"package":{"name":"linux-aws-fips","ecosystem":"Ubuntu:Pro:FIPS-updates:20.04:LTS","purl":"pkg:deb/ubuntu/linux-aws-fips@5.4.0-1154.164+fips1?arch=source&distro=fips-updates/focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.4.0-1154.164+fips1"}]}],"versions":["5.4.0-1021.21+fips2","5.4.0-1069.73+fips2","5.4.0-1071.76+fips1","5.4.0-1072.77+fips1","5.4.0-1073.78+fips1","5.4.0-1078.84+fips1","5.4.0-1080.87+fips1","5.4.0-1081.88+fips1","5.4.0-1083.90+fips1","5.4.0-1085.92+fips1","5.4.0-1086.93+fips1","5.4.0-1088.96+fips1","5.4.0-1089.97+fips1","5.4.0-1092.100+fips1","5.4.0-1093.101+fips1","5.4.0-1094.102+fips1","5.4.0-1096.104+fips1","5.4.0-1099.107+fips1","5.4.0-1100.108+fips1","5.4.0-1101.109+fips1","5.4.0-1102.110+fips1","5.4.0-1103.111+fips1","5.4.0-1104.112+fips1","5.4.0-1105.113+fips1","5.4.0-1106.114+fips1","5.4.0-1107.115+fips1","5.4.0-1108.116+fips1","5.4.0-1109.118+fips1","5.4.0-1110.119+fips1","5.4.0-1111.120+fips1","5.4.0-1112.121+fips1","5.4.0-1113.123+fips1","5.4.0-1114.124+fips1","5.4.0-1116.126+fips1","5.4.0-1117.127+fips1","5.4.0-1118.128+fips1","5.4.0-1119.129+fips1","5.4.0-1120.130+fips1","5.4.0-1121.131+fips1","5.4.0-1122.132+fips1","5.4.0-1123.133+fips1","5.4.0-1124.134+fips1","5.4.0-1125.135+fips1","5.4.0-1126.136+fips2","5.4.0-1127.137+fips1","5.4.0-1128.138+fips1","5.4.0-1129.139+fips1","5.4.0-1130.140+fips1","5.4.0-1131.141+fips1","5.4.0-1132.142+fips1","5.4.0-1133.143+fips1","5.4.0-1134.144+fips1","5.4.0-1135.145+fips1","5.4.0-1136.146+fips1","5.4.0-1137.147+fips1","5.4.0-1139.149+fips1","5.4.0-1140.151+fips1","5.4.0-1142.153+fips1","5.4.0-1144.155+fips1","5.4.0-1145.156+fips1","5.4.0-1146.156+fips1","5.4.0-1147.157+fips1","5.4.0-1148.158+fips1","5.4.0-1149.159+fips1","5.4.0-1150.160+fips1","5.4.0-1151.161+fips1","5.4.0-1152.162+fips1","5.4.0-1153.163+fips1"],"ecosystem_specific":{"binaries":[{"binary_version":"5.4.0-1154.164+fips1","binary_name":"linux-aws-fips-headers-5.4.0-1154"},{"binary_version":"5.4.0-1154.164+fips1","binary_name":"linux-aws-fips-tools-5.4.0-1154"},{"binary_version":"5.4.0-1154.164+fips1","binary_name":"linux-buildinfo-5.4.0-1154-aws-fips"},{"binary_version":"5.4.0-1154.164+fips1","binary_name":"linux-headers-5.4.0-1154-aws-fips"},{"binary_version":"5.4.0-1154.164+fips1","binary_name":"linux-image-unsigned-5.4.0-1154-aws-fips"},{"binary_version":"5.4.0-1154.164+fips1","binary_name":"linux-image-unsigned-hmac-5.4.0-1154-aws-fips"},{"binary_version":"5.4.0-1154.164+fips1","binary_name":"linux-modules-5.4.0-1154-aws-fips"},{"binary_version":"5.4.0-1154.164+fips1","binary_name":"linux-modules-extra-5.4.0-1154-aws-fips"},{"binary_version":"5.4.0-1154.164+fips1","binary_name":"linux-tools-5.4.0-1154-aws-fips"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:Pro:FIPS-updates:20.04:LTS","cves":[{"id":"CVE-2022-49698","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2025-21726","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2025-40019","severity":[{"score":"medium","type":"Ubuntu"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7990-2.json"}},{"package":{"name":"linux-fips","ecosystem":"Ubuntu:Pro:FIPS-updates:20.04:LTS","purl":"pkg:deb/ubuntu/linux-fips@5.4.0-1128.138?arch=source&distro=fips-updates/focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.4.0-1128.138"}]}],"versions":["5.4.0-1026.30","5.4.0-1028.32","5.4.0-1031.36","5.4.0-1032.37","5.4.0-1033.38","5.4.0-1034.40","5.4.0-1035.41","5.4.0-1036.42","5.4.0-1037.43","5.4.0-1038.44","5.4.0-1040.46","5.4.0-1041.47","5.4.0-1042.48","5.4.0-1043.49","5.4.0-1045.51","5.4.0-1046.52","5.4.0-1047.53","5.4.0-1048.54","5.4.0-1049.55","5.4.0-1051.57","5.4.0-1054.61","5.4.0-1056.64","5.4.0-1057.65","5.4.0-1059.67","5.4.0-1060.68","5.4.0-1061.69","5.4.0-1062.70","5.4.0-1064.73","5.4.0-1065.74","5.4.0-1068.77","5.4.0-1069.78","5.4.0-1070.79","5.4.0-1072.81","5.4.0-1073.82","5.4.0-1074.83","5.4.0-1075.84","5.4.0-1076.85","5.4.0-1077.86","5.4.0-1078.87","5.4.0-1079.88","5.4.0-1080.89","5.4.0-1081.90","5.4.0-1082.91","5.4.0-1083.92","5.4.0-1084.93","5.4.0-1085.94","5.4.0-1086.95","5.4.0-1087.96","5.4.0-1088.97","5.4.0-1089.98","5.4.0-1090.100","5.4.0-1091.101","5.4.0-1092.102","5.4.0-1094.104","5.4.0-1095.105","5.4.0-1096.106","5.4.0-1097.107","5.4.0-1098.108","5.4.0-1099.109","5.4.0-1100.110","5.4.0-1101.111","5.4.0-1102.112","5.4.0-1103.113","5.4.0-1104.114","5.4.0-1105.115","5.4.0-1106.116","5.4.0-1107.117","5.4.0-1108.118","5.4.0-1109.119","5.4.0-1110.120","5.4.0-1111.121","5.4.0-1112.122","5.4.0-1116.126","5.4.0-1117.127","5.4.0-1118.128","5.4.0-1119.129","5.4.0-1120.130","5.4.0-1121.131","5.4.0-1122.132","5.4.0-1123.133","5.4.0-1124.134","5.4.0-1125.135","5.4.0-1126.136","5.4.0-1127.137"],"ecosystem_specific":{"binaries":[{"binary_version":"5.4.0-1128.138","binary_name":"linux-buildinfo-5.4.0-1128-fips"},{"binary_version":"5.4.0-1128.138","binary_name":"linux-fips-headers-5.4.0-1128"},{"binary_version":"5.4.0-1128.138","binary_name":"linux-fips-tools-5.4.0-1128"},{"binary_version":"5.4.0-1128.138","binary_name":"linux-fips-tools-host"},{"binary_version":"5.4.0-1128.138","binary_name":"linux-headers-5.4.0-1128-fips"},{"binary_version":"5.4.0-1128.138","binary_name":"linux-image-unsigned-5.4.0-1128-fips"},{"binary_version":"5.4.0-1128.138","binary_name":"linux-image-unsigned-hmac-5.4.0-1128-fips"},{"binary_version":"5.4.0-1128.138","binary_name":"linux-modules-5.4.0-1128-fips"},{"binary_version":"5.4.0-1128.138","binary_name":"linux-modules-extra-5.4.0-1128-fips"},{"binary_version":"5.4.0-1128.138","binary_name":"linux-tools-5.4.0-1128-fips"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:Pro:FIPS-updates:20.04:LTS","cves":[{"id":"CVE-2022-49698","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2025-21726","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2025-40019","severity":[{"score":"medium","type":"Ubuntu"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7990-2.json"}},{"package":{"name":"linux-gcp-fips","ecosystem":"Ubuntu:Pro:FIPS-updates:20.04:LTS","purl":"pkg:deb/ubuntu/linux-gcp-fips@5.4.0-1157.166+fips1?arch=source&distro=fips-updates/focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.4.0-1157.166+fips1"}]}],"versions":["5.4.0-1021.21+fips1","5.4.0-1067.71~20.04.1","5.4.0-1069.73+fips2","5.4.0-1071.75+fips1","5.4.0-1073.78+fips1","5.4.0-1075.80+fips1","5.4.0-1078.84+fips1","5.4.0-1080.87+fips1","5.4.0-1081.88+fips1","5.4.0-1086.94+fips1","5.4.0-1087.95+fips1","5.4.0-1089.97+fips1","5.4.0-1092.101+fips1","5.4.0-1093.102+fips1","5.4.0-1096.105+fips1","5.4.0-1097.106+fips1","5.4.0-1098.107+fips1","5.4.0-1100.109+fips1","5.4.0-1101.110+fips1","5.4.0-1102.111+fips1","5.4.0-1103.112+fips1","5.4.0-1104.113+fips1","5.4.0-1105.114+fips1","5.4.0-1106.115+fips1","5.4.0-1107.116+fips1","5.4.0-1108.117+fips1","5.4.0-1109.118+fips1","5.4.0-1110.119+fips1","5.4.0-1111.120+fips1","5.4.0-1112.121+fips1","5.4.0-1113.122+fips1","5.4.0-1115.124+fips1","5.4.0-1116.125+fips1","5.4.0-1117.126+fips1","5.4.0-1118.127+fips1","5.4.0-1120.129+fips1","5.4.0-1121.130+fips1","5.4.0-1122.131+fips1","5.4.0-1124.133+fips1","5.4.0-1125.134+fips1","5.4.0-1126.135+fips1","5.4.0-1127.136+fips1","5.4.0-1128.137+fips1","5.4.0-1129.138+fips1","5.4.0-1130.139+fips1","5.4.0-1131.140+fips1","5.4.0-1132.141+fips1","5.4.0-1133.142+fips1","5.4.0-1134.143+fips1","5.4.0-1135.144+fips1","5.4.0-1136.145+fips1","5.4.0-1137.146+fips1","5.4.0-1138.147+fips1","5.4.0-1139.148+fips1","5.4.0-1140.149+fips1","5.4.0-1141.150+fips1","5.4.0-1142.151+fips1","5.4.0-1143.152+fips1","5.4.0-1145.154+fips1","5.4.0-1146.155+fips1","5.4.0-1147.156+fips1","5.4.0-1148.157+fips1","5.4.0-1149.158+fips1","5.4.0-1150.159+fips1","5.4.0-1151.160+fips1","5.4.0-1152.161+fips1","5.4.0-1153.162+fips1","5.4.0-1154.163+fips1","5.4.0-1155.164+fips1","5.4.0-1156.165+fips1"],"ecosystem_specific":{"binaries":[{"binary_version":"5.4.0-1157.166+fips1","binary_name":"linux-buildinfo-5.4.0-1157-gcp-fips"},{"binary_version":"5.4.0-1157.166+fips1","binary_name":"linux-gcp-fips-headers-5.4.0-1157"},{"binary_version":"5.4.0-1157.166+fips1","binary_name":"linux-gcp-fips-tools-5.4.0-1157"},{"binary_version":"5.4.0-1157.166+fips1","binary_name":"linux-headers-5.4.0-1157-gcp-fips"},{"binary_version":"5.4.0-1157.166+fips1","binary_name":"linux-image-unsigned-5.4.0-1157-gcp-fips"},{"binary_version":"5.4.0-1157.166+fips1","binary_name":"linux-image-unsigned-hmac-5.4.0-1157-gcp-fips"},{"binary_version":"5.4.0-1157.166+fips1","binary_name":"linux-modules-5.4.0-1157-gcp-fips"},{"binary_version":"5.4.0-1157.166+fips1","binary_name":"linux-modules-extra-5.4.0-1157-gcp-fips"},{"binary_version":"5.4.0-1157.166+fips1","binary_name":"linux-tools-5.4.0-1157-gcp-fips"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:Pro:FIPS-updates:20.04:LTS","cves":[{"id":"CVE-2022-49698","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2025-21726","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2025-40019","severity":[{"score":"medium","type":"Ubuntu"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7990-2.json"}}],"schema_version":"1.7.3"}