USN-8296-1

Source
https://ubuntu.com/security/notices/USN-8296-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8296-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/USN-8296-1
Upstream
Related
Published
2026-05-22T13:39:49Z
Modified
2026-05-23T01:32:18.611442465Z
Summary
linux-fips vulnerabilities
Details

Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - x86 architecture; - Compute Acceleration Framework; - Drivers core; - Null block device driver; - Ublk userspace block driver; - Bluetooth drivers; - Counter interface drivers; - DMA engine subsystem; - DPLL subsystem; - GPU drivers; - HID subsystem; - Intel Trace Hub HW tracing drivers; - IIO ADC drivers; - IIO subsystem; - On-Chip Interconnect management framework; - IRQ chip drivers; - Modular ISDN driver; - LED subsystem; - Multiple devices driver; - UACCE accelerator framework; - MMC subsystem; - Ethernet bonding driver; - Network drivers; - Mellanox network drivers; - NVME drivers; - PHY drivers; - x86 platform drivers; - i.MX PM domains; - SCSI subsystem; - SLIMbus drivers; - SPI subsystem; - TCM subsystem; - W1 Dallas's 1-wire bus driver; - Xen hypervisor drivers; - BTRFS file system; - EFI Variable file system; - exFAT file system; - Ext4 file system; - HFS+ file system; - Network file system (NFS) client; - Network file system (NFS) server daemon; - NTFS3 file system; - SMB network file system; - Scheduler infrastructure; - Netfilter; - NFC subsystem; - Tracing infrastructure; - io_uring subsystem; - BPF subsystem; - Perf events; - Floating proportions library; - Memory management; - Bluetooth subsystem; - CAN network layer; - Ceph Core library; - Networking core; - IPv4 networking; - IPv6 networking; - L2TP protocol; - MAC80211 subsystem; - NET/ROM layer; - Network traffic control; - SCTP protocol; - TLS protocol; - Unix domain sockets; - VMware vSockets driver; - Wireless networking; - ALSA AC97 driver; - Generic PCM loopback sound driver; - Creative Sound Blaster X-Fi driver; - AMD SoC Alsa drivers; - Texas InstrumentS Audio (ASoC/HDA) drivers; - USB sound devices; - KVM subsystem; (CVE-2024-50004, CVE-2024-58096, CVE-2024-58097, CVE-2025-37926, CVE-2025-38201, CVE-2025-38591, CVE-2025-40039, CVE-2025-40082, CVE-2025-40149, CVE-2025-68351, CVE-2025-68358, CVE-2025-68365, CVE-2025-68725, CVE-2025-68749, CVE-2025-68803, CVE-2025-68823, CVE-2025-71160, CVE-2025-71162, CVE-2025-71163, CVE-2025-71180, CVE-2025-71182, CVE-2025-71183, CVE-2025-71184, CVE-2025-71185, CVE-2025-71186, CVE-2025-71188, CVE-2025-71189, CVE-2025-71190, CVE-2025-71191, CVE-2025-71192, CVE-2025-71193, CVE-2025-71194, CVE-2025-71195, CVE-2025-71196, CVE-2025-71197, CVE-2025-71198, CVE-2025-71199, CVE-2025-71200, CVE-2025-71220, CVE-2025-71222, CVE-2025-71224, CVE-2025-71225, CVE-2025-71268, CVE-2026-22976, CVE-2026-22977, CVE-2026-22978, CVE-2026-22979, CVE-2026-22980, CVE-2026-22982, CVE-2026-22984, CVE-2026-22990, CVE-2026-22991, CVE-2026-22992, CVE-2026-22994, CVE-2026-22996, CVE-2026-22997, CVE-2026-22998, CVE-2026-22999, CVE-2026-23000, CVE-2026-23001, CVE-2026-23003, CVE-2026-23005, CVE-2026-23006, CVE-2026-23010, CVE-2026-23011, CVE-2026-23019, CVE-2026-23020, CVE-2026-23021, CVE-2026-23025, CVE-2026-23026, CVE-2026-23030, CVE-2026-23031, CVE-2026-23032, CVE-2026-23033, CVE-2026-23035, CVE-2026-23037, CVE-2026-23038, CVE-2026-23047, CVE-2026-23049, CVE-2026-23050, CVE-2026-23053, CVE-2026-23054, CVE-2026-23056, CVE-2026-23057, CVE-2026-23058, CVE-2026-23059, CVE-2026-23061, CVE-2026-23062, CVE-2026-23063, CVE-2026-23064, CVE-2026-23065, CVE-2026-23068, CVE-2026-23069, CVE-2026-23071, CVE-2026-23073, CVE-2026-23075, CVE-2026-23076, CVE-2026-23078, CVE-2026-23080, CVE-2026-23083, CVE-2026-23084, CVE-2026-23085, CVE-2026-23086, CVE-2026-23087, CVE-2026-23088, CVE-2026-23089, CVE-2026-23090, CVE-2026-23091, CVE-2026-23093, CVE-2026-23094, CVE-2026-23095, CVE-2026-23096, CVE-2026-23097, CVE-2026-23098, CVE-2026-23099, CVE-2026-23101, CVE-2026-23102, CVE-2026-23103, CVE-2026-23105, CVE-2026-23107, CVE-2026-23108, CVE-2026-23110, CVE-2026-23113, CVE-2026-23116, CVE-2026-23119, CVE-2026-23120, CVE-2026-23121, CVE-2026-23123, CVE-2026-23124, CVE-2026-23125, CVE-2026-23126, CVE-2026-23128, CVE-2026-23129, CVE-2026-23131, CVE-2026-23133, CVE-2026-23135, CVE-2026-23136, CVE-2026-23139, CVE-2026-23140, CVE-2026-23141, CVE-2026-23142, CVE-2026-23144, CVE-2026-23145, CVE-2026-23146, CVE-2026-23148, CVE-2026-23150, CVE-2026-23151, CVE-2026-23156, CVE-2026-23159, CVE-2026-23160, CVE-2026-23163, CVE-2026-23164, CVE-2026-23166, CVE-2026-23167, CVE-2026-23168, CVE-2026-23170, CVE-2026-23172, CVE-2026-23173, CVE-2026-23176, CVE-2026-23178, CVE-2026-23179, CVE-2026-23180, CVE-2026-23182, CVE-2026-23187, CVE-2026-23190, CVE-2026-23191, CVE-2026-23193, CVE-2026-23198, CVE-2026-23200, CVE-2026-23202, CVE-2026-23204, CVE-2026-23205, CVE-2026-23206, CVE-2026-23212, CVE-2026-23213, CVE-2026-23214, CVE-2026-23215, CVE-2026-23216, CVE-2026-23254, CVE-2026-23256, CVE-2026-23257, CVE-2026-23258, CVE-2026-23260, CVE-2026-23261, CVE-2026-23262, CVE-2026-23264, CVE-2026-23274, CVE-2026-23351, CVE-2026-23394)

References

Affected packages

Ubuntu:Pro:FIPS-updates:24.04:LTS / linux-fips

Package

Name
linux-fips
Purl
pkg:deb/ubuntu/linux-fips?arch=source&distro=fips-updates%2Fnoble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.0-116.116+fips1

Affected versions

6.*
6.8.0-38.38+fips4
6.8.0-78.78+fips1
6.8.0-79.79+fips1
6.8.0-83.83+fips1
6.8.0-84.84+fips1
6.8.0-85.85+fips1
6.8.0-86.87+fips1
6.8.0-87.88+fips1
6.8.0-88.89+fips1
6.8.0-90.91+fips1
6.8.0-94.96+fips1
6.8.0-100.100+fips1
6.8.0-101.101+fips1
6.8.0-106.106+fips1
6.8.0-107.107+fips1
6.8.0-110.110+fips2
6.8.0-111.111+fips1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "linux-buildinfo-6.8.0-116-fips",
            "binary_version": "6.8.0-116.116+fips1"
        },
        {
            "binary_name": "linux-cloud-tools-6.8.0-116-fips",
            "binary_version": "6.8.0-116.116+fips1"
        },
        {
            "binary_name": "linux-fips-cloud-tools-6.8.0-116",
            "binary_version": "6.8.0-116.116+fips1"
        },
        {
            "binary_name": "linux-fips-headers-6.8.0-116",
            "binary_version": "6.8.0-116.116+fips1"
        },
        {
            "binary_name": "linux-fips-lib-rust-6.8.0-116-fips",
            "binary_version": "6.8.0-116.116+fips1"
        },
        {
            "binary_name": "linux-fips-tools-6.8.0-116",
            "binary_version": "6.8.0-116.116+fips1"
        },
        {
            "binary_name": "linux-headers-6.8.0-116-fips",
            "binary_version": "6.8.0-116.116+fips1"
        },
        {
            "binary_name": "linux-image-6.8.0-116-fips",
            "binary_version": "6.8.0-116.116+fips1"
        },
        {
            "binary_name": "linux-image-hmac-6.8.0-116-fips",
            "binary_version": "6.8.0-116.116+fips1"
        },
        {
            "binary_name": "linux-image-unsigned-6.8.0-116-fips",
            "binary_version": "6.8.0-116.116+fips1"
        },
        {
            "binary_name": "linux-image-unsigned-hmac-6.8.0-116-fips",
            "binary_version": "6.8.0-116.116+fips1"
        },
        {
            "binary_name": "linux-modules-6.8.0-116-fips",
            "binary_version": "6.8.0-116.116+fips1"
        },
        {
            "binary_name": "linux-modules-extra-6.8.0-116-fips",
            "binary_version": "6.8.0-116.116+fips1"
        },
        {
            "binary_name": "linux-modules-ipu6-6.8.0-116-fips",
            "binary_version": "6.8.0-116.116+fips1"
        },
        {
            "binary_name": "linux-modules-iwlwifi-6.8.0-116-fips",
            "binary_version": "6.8.0-116.116+fips1"
        },
        {
            "binary_name": "linux-modules-usbio-6.8.0-116-fips",
            "binary_version": "6.8.0-116.116+fips1"
        },
        {
            "binary_name": "linux-tools-6.8.0-116-fips",
            "binary_version": "6.8.0-116.116+fips1"
        }
    ],
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}

Database specific

cves_map
{
    "cves": [],
    "ecosystem": "Ubuntu:Pro:FIPS-updates:24.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8296-1.json"