USN-7428-2: Linux kernel (FIPS) vulnerabilities
Publication date
9 April 2025
Overview
Several security issues were fixed in the Linux kernel.
Releases
Packages
- linux-aws-fips - Linux kernel for Amazon Web Services (AWS) systems with FIPS
- linux-azure-fips - Linux kernel for Microsoft Azure Cloud systems with FIPS
- linux-fips - Linux kernel with FIPS
- linux-gcp-fips - Linux kernel for Google Cloud Platform (GCP) systems with FIPS
Details
Demi Marie Obenour and Simon Gaiser discovered that several Xen para-
virtualization device frontends did not properly restrict the access rights
of device backends. An attacker could possibly use a malicious Xen backend
to gain access to memory pages of a guest VM or cause a denial of service
in the guest. (CVE-2022-23041)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- HID subsystem;
- Network drivers;
- Mellanox network drivers;
- SCSI subsystem;
- SuperH / SH-Mobile drivers;
- File systems infrastructure;
- Ext4 file system;
- JFS file system;
- IP tunnels definitions;
- Network namespace;
- BPF subsystem;
- Networking core;
- HSR network protocol;
- IPv4...
Demi Marie Obenour and Simon Gaiser discovered that several Xen para-
virtualization device frontends did not properly restrict the access rights
of device backends. An attacker could possibly use a malicious Xen backend
to gain access to memory pages of a guest VM or cause a denial of service
in the guest. (CVE-2022-23041)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- HID subsystem;
- Network drivers;
- Mellanox network drivers;
- SCSI subsystem;
- SuperH / SH-Mobile drivers;
- File systems infrastructure;
- Ext4 file system;
- JFS file system;
- IP tunnels definitions;
- Network namespace;
- BPF subsystem;
- Networking core;
- HSR network protocol;
- IPv4 networking;
- IPv6 networking;
- Network traffic control
Update instructions
After a standard system update you need to reboot your computer to make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Ubuntu Release | Package Version | ||
---|---|---|---|
18.04 bionic | linux-image-4.15.0-1134-fips – 4.15.0-1134.145 | ||
linux-image-4.15.0-2080-gcp-fips – 4.15.0-2080.86 | |||
linux-image-4.15.0-2096-azure-fips – 4.15.0-2096.102 | |||
linux-image-4.15.0-2117-aws-fips – 4.15.0-2117.123 | |||
linux-image-aws-fips – 4.15.0.2117.111 | |||
linux-image-azure-fips – 4.15.0.2096.92 | |||
linux-image-fips – 4.15.0.1134.131 | |||
linux-image-gcp-fips – 4.15.0.2080.78 |
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.
References
- CVE-2025-21702
- CVE-2025-21700
- CVE-2024-56658
- CVE-2024-56615
- CVE-2024-56600
- CVE-2024-56595
- CVE-2024-53227
- CVE-2024-53165
- CVE-2024-50302
- CVE-2024-50265
- CVE-2025-21702
- CVE-2025-21700
- CVE-2024-56658
- CVE-2024-56615
- CVE-2024-56600
- CVE-2024-56595
- CVE-2024-53227
- CVE-2024-53165
- CVE-2024-50302
- CVE-2024-50265
- CVE-2024-50167
- CVE-2024-49952
- CVE-2024-49948
- CVE-2024-46826
- CVE-2024-35973
- CVE-2024-35960
- CVE-2024-26863
- CVE-2022-23041
- CVE-2021-47119
- CVE-2021-47101
Related notices
- USN-7506-1
- USN-7506-3
- USN-7506-2
- USN-7506-4
- USN-7475-1
- USN-7468-1
- USN-7463-1
- USN-7462-1
- USN-7462-2
- USN-7461-1
- USN-7506-1
- USN-7506-3
- USN-7506-2
- USN-7506-4
- USN-7475-1
- USN-7468-1
- USN-7463-1
- USN-7462-1
- USN-7462-2
- USN-7461-1
- USN-7461-2
- USN-7461-3
- USN-7460-1
- USN-7459-1
- USN-7459-2
- USN-7458-1
- USN-7455-1
- USN-7455-2
- USN-7455-3
- USN-7455-4
- USN-7455-5
- USN-7453-1
- USN-7452-1
- USN-7451-1
- USN-7450-1
- USN-7449-1
- USN-7449-2
- USN-7448-1
- USN-7445-1
- USN-7429-1
- USN-7429-2
- USN-7428-1
- USN-7421-1
- USN-7420-1
- USN-7415-1
- USN-7413-1
- USN-7408-1
- USN-7408-2
- USN-7408-3
- USN-7408-4
- USN-7407-1
- USN-7406-1
- USN-7406-2
- USN-7406-3
- USN-7406-4
- USN-7406-5
- USN-7406-6
- USN-7403-1
- USN-7402-1
- USN-7402-2
- USN-7402-3
- USN-7402-4
- USN-7402-5
- USN-7401-1
- USN-7393-1
- USN-7392-1
- USN-7392-2
- USN-7392-4
- USN-7392-3
- USN-7391-1
- USN-7390-1
- USN-7389-1
- USN-7388-1
- USN-7387-1
- USN-7387-2
- USN-7387-3
- USN-7386-1
- USN-7385-1
- USN-7384-1
- USN-7384-2
- USN-7383-1
- USN-7383-2
- USN-7382-1
- USN-7381-1
- USN-7380-1
- USN-7379-1
- USN-7379-2
- USN-7331-1
- USN-7323-1
- USN-7323-2
- USN-7322-1
- USN-7311-1
- USN-7310-1
- USN-7308-1
- USN-7305-1
- USN-7304-1
- USN-7303-1
- USN-7303-2
- USN-7303-3
- USN-7301-1
- USN-7295-1
- USN-7294-1
- USN-7294-2
- USN-7294-3
- USN-7294-4
- USN-7293-1
- USN-7291-1
- USN-7289-1
- USN-7289-2
- USN-7289-3
- USN-7289-4
- USN-7288-1
- USN-7288-2
- USN-7277-1
- USN-7276-1
- USN-7196-1
- USN-7195-1
- USN-7195-2
- USN-7194-1
- USN-7186-1
- USN-7186-2
- USN-7173-1
- USN-7173-2
- USN-7173-3
- USN-7166-1
- USN-7166-2
- USN-7166-3
- USN-7166-4
- USN-7156-1
- USN-7155-1
- USN-7154-1
- USN-7154-2
- USN-7019-1
- USN-6927-1
- USN-6919-1
- USN-6918-1
- USN-6917-1
- USN-6898-1
- USN-6898-2
- USN-6898-3
- USN-6898-4
- USN-6896-1
- USN-6896-2
- USN-6896-3
- USN-6896-4
- USN-6896-5
- USN-6893-1
- USN-6893-2
- USN-6893-3
- USN-6892-1
- USN-6878-1
- USN-6871-1
- USN-6828-1
- USN-6821-1
- USN-6821-2
- USN-6821-3
- USN-6821-4
- USN-6820-1
- USN-6820-2
- USN-6817-1
- USN-6817-2
- USN-6817-3
- USN-6816-1
- USN-5467-1
- LSN-0111-1
Have additional questions?