USN-7930-2

Source
https://ubuntu.com/security/notices/USN-7930-2
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7930-2.json
JSON Data
https://api.test.osv.dev/v1/vulns/USN-7930-2
Upstream
Related
Published
2025-12-15T13:41:42.490125Z
Modified
2025-12-16T12:14:53.068136Z
Summary
linux-fips vulnerabilities
Details

Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Cryptographic API; - ACPI drivers; - Hardware monitoring drivers; - InfiniBand drivers; - MTD block device drivers; - Network drivers; - DesignWare USB3 driver; - Ceph distributed file system; - Network file system (NFS) server daemon; - NILFS2 file system; - File systems infrastructure; - Tracing infrastructure; - Appletalk network protocol; - IPv6 networking; - Netfilter; (CVE-2021-47146, CVE-2021-47269, CVE-2021-47385, CVE-2021-47634, CVE-2022-49026, CVE-2024-49935, CVE-2024-50067, CVE-2024-50095, CVE-2024-50179, CVE-2024-53112, CVE-2024-53217, CVE-2025-21715, CVE-2025-21722, CVE-2025-21811, CVE-2025-21855, CVE-2025-38666, CVE-2025-39964, CVE-2025-40018)

References

Affected packages

Ubuntu:Pro:FIPS:16.04:LTS / linux-fips

Package

Name
linux-fips
Purl
pkg:deb/ubuntu/linux-fips@4.4.0-1120.127?arch=source&distro=fips-updates/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.0-1120.127

Affected versions

4.*

4.4.0-1003.3
4.4.0-1005.5
4.4.0-1006.6
4.4.0-1008.10
4.4.0-1010.13
4.4.0-1011.14
4.4.0-1012.16
4.4.0-1013.17
4.4.0-1015.20
4.4.0-1017.22
4.4.0-1019.24
4.4.0-1021.26
4.4.0-1022.27
4.4.0-1023.28
4.4.0-1025.30
4.4.0-1026.31
4.4.0-1027.32
4.4.0-1028.33
4.4.0-1029.34
4.4.0-1031.36
4.4.0-1032.37
4.4.0-1033.38
4.4.0-1034.39
4.4.0-1041.46
4.4.0-1042.47
4.4.0-1043.48
4.4.0-1044.49
4.4.0-1045.50
4.4.0-1046.51
4.4.0-1048.53
4.4.0-1049.55
4.4.0-1051.57
4.4.0-1052.58
4.4.0-1054.60
4.4.0-1055.61
4.4.0-1056.62
4.4.0-1057.63
4.4.0-1058.64
4.4.0-1060.66
4.4.0-1061.67
4.4.0-1062.68
4.4.0-1063.69
4.4.0-1064.70
4.4.0-1065.71
4.4.0-1066.72
4.4.0-1067.73
4.4.0-1068.74
4.4.0-1069.75
4.4.0-1071.77
4.4.0-1072.78
4.4.0-1073.79
4.4.0-1074.80
4.4.0-1077.84
4.4.0-1079.86
4.4.0-1080.87
4.4.0-1081.88
4.4.0-1082.89
4.4.0-1083.90
4.4.0-1084.91
4.4.0-1085.92
4.4.0-1086.93
4.4.0-1088.95
4.4.0-1089.96
4.4.0-1090.97
4.4.0-1091.98
4.4.0-1092.99
4.4.0-1093.100
4.4.0-1094.101
4.4.0-1095.102
4.4.0-1097.104
4.4.0-1099.106
4.4.0-1100.107
4.4.0-1101.108
4.4.0-1102.109
4.4.0-1103.110
4.4.0-1104.111
4.4.0-1105.112
4.4.0-1106.113
4.4.0-1107.114
4.4.0-1108.115
4.4.0-1109.116
4.4.0-1110.117
4.4.0-1111.118
4.4.0-1112.119
4.4.0-1113.120
4.4.0-1114.121
4.4.0-1115.122
4.4.0-1116.123
4.4.0-1117.124
4.4.0-1119.126

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "block-modules-4.4.0-1120-fips-di"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "crypto-modules-4.4.0-1120-fips-di"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "dasd-extra-modules-4.4.0-1120-fips-di"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "dasd-modules-4.4.0-1120-fips-di"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "fat-modules-4.4.0-1120-fips-di"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "fb-modules-4.4.0-1120-fips-di"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "firewire-core-modules-4.4.0-1120-fips-di"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "floppy-modules-4.4.0-1120-fips-di"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "fs-core-modules-4.4.0-1120-fips-di"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "fs-secondary-modules-4.4.0-1120-fips-di"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "input-modules-4.4.0-1120-fips-di"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "ipmi-modules-4.4.0-1120-fips-di"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "irda-modules-4.4.0-1120-fips-di"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "kernel-image-4.4.0-1120-fips-di"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "linux-buildinfo-4.4.0-1120-fips"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "linux-fips-cloud-tools-common"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "linux-fips-headers-4.4.0-1120"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "linux-fips-source-4.4.0"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "linux-fips-tools-4.4.0-1120"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "linux-headers-4.4.0-1120-fips"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "linux-image-4.4.0-1120-fips"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "linux-image-hmac-4.4.0-1120-fips"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "linux-image-unsigned-4.4.0-1120-fips"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "linux-image-unsigned-hmac-4.4.0-1120-fips"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "linux-modules-4.4.0-1120-fips"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "linux-modules-extra-4.4.0-1120-fips"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "linux-tools-4.4.0-1120-fips"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "linux-udebs-fips"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "md-modules-4.4.0-1120-fips-di"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "message-modules-4.4.0-1120-fips-di"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "mouse-modules-4.4.0-1120-fips-di"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "multipath-modules-4.4.0-1120-fips-di"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "nfs-modules-4.4.0-1120-fips-di"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "nic-modules-4.4.0-1120-fips-di"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "nic-pcmcia-modules-4.4.0-1120-fips-di"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "nic-shared-modules-4.4.0-1120-fips-di"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "nic-usb-modules-4.4.0-1120-fips-di"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "parport-modules-4.4.0-1120-fips-di"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "pata-modules-4.4.0-1120-fips-di"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "pcmcia-modules-4.4.0-1120-fips-di"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "pcmcia-storage-modules-4.4.0-1120-fips-di"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "plip-modules-4.4.0-1120-fips-di"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "ppp-modules-4.4.0-1120-fips-di"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "sata-modules-4.4.0-1120-fips-di"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "scsi-modules-4.4.0-1120-fips-di"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "serial-modules-4.4.0-1120-fips-di"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "speakup-modules-4.4.0-1120-fips-di"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "storage-core-modules-4.4.0-1120-fips-di"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "usb-modules-4.4.0-1120-fips-di"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "virtio-modules-4.4.0-1120-fips-di"
        },
        {
            "binary_version": "4.4.0-1120.127",
            "binary_name": "vlan-modules-4.4.0-1120-fips-di"
        }
    ],
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7930-2.json"

cves_map

{
    "cves": [
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2021-47146"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2021-47269"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2021-47385"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "high"
                }
            ],
            "id": "CVE-2021-47634"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "high"
                }
            ],
            "id": "CVE-2022-49026"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2024-49935"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2024-50067"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2024-50095"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2024-50179"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2024-53112"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "high"
                }
            ],
            "id": "CVE-2024-53217"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "high"
                }
            ],
            "id": "CVE-2025-21715"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2025-21722"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2025-21811"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2025-21855"
        },
        {
            "severity": [
                {
                    "type": "Ubuntu",
                    "score": "high"
                }
            ],
            "id": "CVE-2025-38666"
        },
        {
            "severity": [
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2025-39964"
        },
        {
            "severity": [
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2025-40018"
        }
    ],
    "ecosystem": "Ubuntu:Pro:FIPS:16.04:LTS"
}