{"id":"USN-8059-5","summary":"linux-fips, linux-gcp-fips vulnerabilities","details":"Several security issues were discovered in the Linux kernel.\nAn attacker could possibly use these to compromise the system.\nThis update corrects flaws in the following subsystems:\n  - SMB network file system;\n(CVE-2025-22037, CVE-2025-37899)\n","modified":"2026-04-27T18:03:00.790119Z","published":"2026-02-25T10:52:50Z","related":["UBUNTU-CVE-2025-22037","UBUNTU-CVE-2025-37899"],"upstream":["CVE-2025-22037","CVE-2025-37899","UBUNTU-CVE-2025-22037","UBUNTU-CVE-2025-37899"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-8059-5"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-22037"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-37899"}],"affected":[{"package":{"name":"linux-fips","ecosystem":"Ubuntu:Pro:FIPS-updates:24.04:LTS","purl":"pkg:deb/ubuntu/linux-fips@6.8.0-101.101+fips1?arch=source&distro=fips-updates/noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.8.0-101.101+fips1"}]}],"versions":["6.8.0-38.38+fips4","6.8.0-78.78+fips1","6.8.0-79.79+fips1","6.8.0-83.83+fips1","6.8.0-84.84+fips1","6.8.0-85.85+fips1","6.8.0-86.87+fips1","6.8.0-87.88+fips1","6.8.0-88.89+fips1","6.8.0-90.91+fips1","6.8.0-94.96+fips1","6.8.0-100.100+fips1"],"ecosystem_specific":{"binaries":[{"binary_version":"6.8.0-101.101+fips1","binary_name":"linux-buildinfo-6.8.0-101-fips"},{"binary_version":"6.8.0-101.101+fips1","binary_name":"linux-cloud-tools-6.8.0-101-fips"},{"binary_version":"6.8.0-101.101+fips1","binary_name":"linux-fips-cloud-tools-6.8.0-101"},{"binary_version":"6.8.0-101.101+fips1","binary_name":"linux-fips-headers-6.8.0-101"},{"binary_version":"6.8.0-101.101+fips1","binary_name":"linux-fips-lib-rust-6.8.0-101-fips"},{"binary_version":"6.8.0-101.101+fips1","binary_name":"linux-fips-tools-6.8.0-101"},{"binary_version":"6.8.0-101.101+fips1","binary_name":"linux-headers-6.8.0-101-fips"},{"binary_version":"6.8.0-101.101+fips1","binary_name":"linux-image-6.8.0-101-fips"},{"binary_version":"6.8.0-101.101+fips1","binary_name":"linux-image-hmac-6.8.0-101-fips"},{"binary_version":"6.8.0-101.101+fips1","binary_name":"linux-image-unsigned-6.8.0-101-fips"},{"binary_version":"6.8.0-101.101+fips1","binary_name":"linux-image-unsigned-hmac-6.8.0-101-fips"},{"binary_version":"6.8.0-101.101+fips1","binary_name":"linux-modules-6.8.0-101-fips"},{"binary_version":"6.8.0-101.101+fips1","binary_name":"linux-modules-extra-6.8.0-101-fips"},{"binary_version":"6.8.0-101.101+fips1","binary_name":"linux-modules-ipu6-6.8.0-101-fips"},{"binary_version":"6.8.0-101.101+fips1","binary_name":"linux-modules-iwlwifi-6.8.0-101-fips"},{"binary_version":"6.8.0-101.101+fips1","binary_name":"linux-modules-usbio-6.8.0-101-fips"},{"binary_version":"6.8.0-101.101+fips1","binary_name":"linux-tools-6.8.0-101-fips"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8059-5.json","cves_map":{"cves":[{"id":"CVE-2025-22037","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2025-37899","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}]}],"ecosystem":"Ubuntu:Pro:FIPS-updates:24.04:LTS"}}},{"package":{"name":"linux-gcp-fips","ecosystem":"Ubuntu:Pro:FIPS-updates:24.04:LTS","purl":"pkg:deb/ubuntu/linux-gcp-fips@6.8.0-1048.51+fips1?arch=source&distro=fips-updates/noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.8.0-1048.51+fips1"}]}],"versions":["6.8.0-1036.38+fips1","6.8.0-1037.39+fips1","6.8.0-1039.41+fips1","6.8.0-1040.42+fips1","6.8.0-1041.43+fips1","6.8.0-1042.45+fips1","6.8.0-1043.46+fips1","6.8.0-1044.47+fips1","6.8.0-1045.48+fips1","6.8.0-1046.49+fips1","6.8.0-1047.50+fips1"],"ecosystem_specific":{"binaries":[{"binary_version":"6.8.0-1048.51+fips1","binary_name":"linux-buildinfo-6.8.0-1048-gcp-fips"},{"binary_version":"6.8.0-1048.51+fips1","binary_name":"linux-gcp-fips-headers-6.8.0-1048"},{"binary_version":"6.8.0-1048.51+fips1","binary_name":"linux-gcp-fips-tools-6.8.0-1048"},{"binary_version":"6.8.0-1048.51+fips1","binary_name":"linux-headers-6.8.0-1048-gcp-fips"},{"binary_version":"6.8.0-1048.51+fips1","binary_name":"linux-image-unsigned-6.8.0-1048-gcp-fips"},{"binary_version":"6.8.0-1048.51+fips1","binary_name":"linux-image-unsigned-hmac-6.8.0-1048-gcp-fips"},{"binary_version":"6.8.0-1048.51+fips1","binary_name":"linux-modules-6.8.0-1048-gcp-fips"},{"binary_version":"6.8.0-1048.51+fips1","binary_name":"linux-modules-extra-6.8.0-1048-gcp-fips"},{"binary_version":"6.8.0-1048.51+fips1","binary_name":"linux-tools-6.8.0-1048-gcp-fips"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8059-5.json","cves_map":{"cves":[{"id":"CVE-2025-22037","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2025-37899","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}]}],"ecosystem":"Ubuntu:Pro:FIPS-updates:24.04:LTS"}}}],"schema_version":"1.7.5"}