{"id":"USN-8112-4","summary":"linux-azure-fips vulnerabilities","details":"Several security issues were discovered in the Linux kernel.\nAn attacker could possibly use these to compromise the system.\nThis update corrects flaws in the following subsystems:\n  - x86 architecture;\n  - MMC subsystem;\n  - Network drivers;\n  - USB Device Class drivers;\n  - BTRFS file system;\n  - HFS+ file system;\n  - XFRM subsystem;\n  - IPv4 networking;\n  - IPv6 networking;\n  - MAC80211 subsystem;\n  - Simplified Mandatory Access Control Kernel framework;\n(CVE-2021-47599, CVE-2022-48875, CVE-2022-49267, CVE-2024-47659,\nCVE-2024-49927, CVE-2024-56548, CVE-2024-56581, CVE-2024-56593,\nCVE-2025-21704, CVE-2025-40215)\n","modified":"2026-04-27T18:17:17.297228065Z","published":"2026-03-24T11:42:32Z","related":["UBUNTU-CVE-2021-47599","UBUNTU-CVE-2022-48875","UBUNTU-CVE-2022-49267","UBUNTU-CVE-2024-47659","UBUNTU-CVE-2024-49927","UBUNTU-CVE-2024-56548","UBUNTU-CVE-2024-56581","UBUNTU-CVE-2024-56593","UBUNTU-CVE-2025-21704","UBUNTU-CVE-2025-40215"],"upstream":["CVE-2021-47599","CVE-2022-48875","CVE-2022-49267","CVE-2024-47659","CVE-2024-49927","CVE-2024-56548","CVE-2024-56581","CVE-2024-56593","CVE-2025-21704","CVE-2025-40215","UBUNTU-CVE-2021-47599","UBUNTU-CVE-2022-48875","UBUNTU-CVE-2022-49267","UBUNTU-CVE-2024-47659","UBUNTU-CVE-2024-49927","UBUNTU-CVE-2024-56548","UBUNTU-CVE-2024-56581","UBUNTU-CVE-2024-56593","UBUNTU-CVE-2025-21704","UBUNTU-CVE-2025-40215"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-8112-4"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-47599"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-48875"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-49267"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-47659"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-49927"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-56548"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-56581"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-56593"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-21704"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-40215"}],"affected":[{"package":{"name":"linux-azure-fips","ecosystem":"Ubuntu:Pro:FIPS-updates:18.04:LTS","purl":"pkg:deb/ubuntu/linux-azure-fips@4.15.0-2106.112?arch=source&distro=fips-updates/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-2106.112"}]}],"versions":["4.15.0-1002.2","4.15.0-2006.7","4.15.0-2007.8","4.15.0-2008.9","4.15.0-2009.10","4.15.0-2012.14","4.15.0-2013.15","4.15.0-2015.17","4.15.0-2016.18","4.15.0-2017.20","4.15.0-2018.21","4.15.0-2020.23","4.15.0-2021.24","4.15.0-2022.25","4.15.0-2023.26","4.15.0-2024.27","4.15.0-2025.28","4.15.0-2026.29","4.15.0-2027.30","4.15.0-2030.33","4.15.0-2033.37","4.15.0-2034.38","4.15.0-2035.39","4.15.0-2036.40","4.15.0-2037.41","4.15.0-2038.42","4.15.0-2039.43","4.15.0-2041.45","4.15.0-2042.46","4.15.0-2043.47","4.15.0-2045.49","4.15.0-2046.50","4.15.0-2047.51","4.15.0-2048.52","4.15.0-2049.53","4.15.0-2050.54","4.15.0-2053.58","4.15.0-2056.62","4.15.0-2057.63","4.15.0-2059.65","4.15.0-2060.66","4.15.0-2062.68","4.15.0-2066.72","4.15.0-2067.73","4.15.0-2068.74","4.15.0-2070.76","4.15.0-2071.77","4.15.0-2072.78","4.15.0-2073.79","4.15.0-2074.80","4.15.0-2075.81","4.15.0-2076.82","4.15.0-2077.83","4.15.0-2078.84","4.15.0-2079.85","4.15.0-2080.86","4.15.0-2081.87","4.15.0-2082.88","4.15.0-2084.90","4.15.0-2085.91","4.15.0-2086.92","4.15.0-2087.93","4.15.0-2088.94","4.15.0-2089.95","4.15.0-2090.96","4.15.0-2091.97","4.15.0-2092.98","4.15.0-2093.99","4.15.0-2094.100","4.15.0-2095.101","4.15.0-2096.102","4.15.0-2097.103","4.15.0-2098.104","4.15.0-2099.105","4.15.0-2100.106","4.15.0-2101.107","4.15.0-2102.108","4.15.0-2104.110","4.15.0-2105.111"],"ecosystem_specific":{"binaries":[{"binary_name":"linux-azure-fips-cloud-tools-4.15.0-2106","binary_version":"4.15.0-2106.112"},{"binary_name":"linux-azure-fips-headers-4.15.0-2106","binary_version":"4.15.0-2106.112"},{"binary_name":"linux-azure-fips-tools-4.15.0-2106","binary_version":"4.15.0-2106.112"},{"binary_name":"linux-buildinfo-4.15.0-2106-azure-fips","binary_version":"4.15.0-2106.112"},{"binary_name":"linux-cloud-tools-4.15.0-2106-azure-fips","binary_version":"4.15.0-2106.112"},{"binary_name":"linux-headers-4.15.0-2106-azure-fips","binary_version":"4.15.0-2106.112"},{"binary_name":"linux-image-unsigned-4.15.0-2106-azure-fips","binary_version":"4.15.0-2106.112"},{"binary_name":"linux-image-unsigned-hmac-4.15.0-2106-azure-fips","binary_version":"4.15.0-2106.112"},{"binary_name":"linux-modules-4.15.0-2106-azure-fips","binary_version":"4.15.0-2106.112"},{"binary_name":"linux-modules-extra-4.15.0-2106-azure-fips","binary_version":"4.15.0-2106.112"},{"binary_name":"linux-tools-4.15.0-2106-azure-fips","binary_version":"4.15.0-2106.112"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:Pro:FIPS-updates:18.04:LTS","cves":[{"id":"CVE-2021-47599","severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-48875","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-49267","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2024-47659","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2024-49927","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2024-56548","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2024-56581","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2024-56593","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2025-21704","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2025-40215","severity":[{"score":"medium","type":"Ubuntu"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8112-4.json"}}],"schema_version":"1.7.5"}