USN-8033-3: Linux kernel (FIPS) vulnerabilities
Publication date
12 February 2026
Overview
Several security issues were fixed in the Linux kernel.
Releases
Packages
- linux-aws-fips - Linux kernel for Amazon Web Services (AWS) systems with FIPS
- linux-fips - Linux kernel with FIPS
- linux-gcp-fips - Linux kernel for Google Cloud Platform (GCP) systems with FIPS
Details
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Nios II architecture;
- Sun Sparc architecture;
- User-Mode Linux (UML);
- x86 architecture;
- Block layer subsystem;
- Cryptographic API;
- Drivers core;
- Bus devices;
- Hardware random number generator core;
- Data acquisition framework and drivers;
- CPU frequency scaling framework;
- DMA engine subsystem;
- GPU drivers;
- HW tracing;
- Input Device (Miscellaneous) drivers;
- Multiple devices driver;
- Media drivers;
- MOST (Media Oriented Systems Transport) drivers;
- MTD block device drivers;
- Network drivers;
- NVME drivers;
- PCI subsystem;
- Performance monitor drivers;
- Pin controllers subsystem;
- x86...
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Nios II architecture;
- Sun Sparc architecture;
- User-Mode Linux (UML);
- x86 architecture;
- Block layer subsystem;
- Cryptographic API;
- Drivers core;
- Bus devices;
- Hardware random number generator core;
- Data acquisition framework and drivers;
- CPU frequency scaling framework;
- DMA engine subsystem;
- GPU drivers;
- HW tracing;
- Input Device (Miscellaneous) drivers;
- Multiple devices driver;
- Media drivers;
- MOST (Media Oriented Systems Transport) drivers;
- MTD block device drivers;
- Network drivers;
- NVME drivers;
- PCI subsystem;
- Performance monitor drivers;
- Pin controllers subsystem;
- x86 platform drivers;
- PPS (Pulse Per Second) driver;
- PWM drivers;
- SCSI subsystem;
- TCM subsystem;
- Userspace I/O drivers;
- USB Gadget drivers;
- USB Host Controller drivers;
- Framebuffer layer;
- BTRFS file system;
- File systems infrastructure;
- Ext4 file system;
- Network file system (NFS) server daemon;
- NTFS3 file system;
- SMB network file system;
- padata parallel execution mechanism;
- IP tunnels definitions;
- Network sockets;
- XFRM subsystem;
- Control group (cgroup);
- Padata parallel execution mechanism;
- PID allocator;
- Tracing infrastructure;
- Memory management;
- 9P file system network protocol;
- Ethernet bridge;
- Ceph Core library;
- Networking core;
- IPv4 networking;
- IPv6 networking;
- NFC subsystem;
- RF switch subsystem;
- SCTP protocol;
- Unix domain sockets;
- VMware vSockets driver;
- Intel ASoC drivers;
- USB sound devices
Update instructions
After a standard system update you need to reboot your computer to make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
| Ubuntu Release | Package Version | ||
|---|---|---|---|
| 22.04 LTS jammy | linux-image-5.15.0-1100-aws-fips – 5.15.0-1100.107+fips1 | ||
| linux-image-5.15.0-1100-gcp-fips – 5.15.0-1100.109+fips1 | |||
| linux-image-5.15.0-170-fips – 5.15.0-170.180+fips1 | |||
| linux-image-aws-fips – 5.15.0.1100.96 | |||
| linux-image-aws-fips-5.15 – 5.15.0.1100.96 | |||
| linux-image-fips – 5.15.0.170.97 | |||
| linux-image-fips-5.15 – 5.15.0.170.97 | |||
| linux-image-gcp-fips – 5.15.0.1100.90 | |||
| linux-image-gcp-fips-5.15 – 5.15.0.1100.90 | |||
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.
References
- CVE-2025-68249
- CVE-2025-40351
- CVE-2025-40349
- CVE-2025-40346
- CVE-2025-40245
- CVE-2025-40244
- CVE-2025-40243
- CVE-2025-40240
- CVE-2025-40233
- CVE-2025-40231
- CVE-2025-68249
- CVE-2025-40351
- CVE-2025-40349
- CVE-2025-40346
- CVE-2025-40245
- CVE-2025-40244
- CVE-2025-40243
- CVE-2025-40240
- CVE-2025-40233
- CVE-2025-40231
- CVE-2025-40223
- CVE-2025-40220
- CVE-2025-40219
- CVE-2025-40215
- CVE-2025-40205
- CVE-2025-40204
- CVE-2025-40200
- CVE-2025-40194
- CVE-2025-40188
- CVE-2025-40187
- CVE-2025-40183
- CVE-2025-40179
- CVE-2025-40178
- CVE-2025-40173
- CVE-2025-40171
- CVE-2025-40167
- CVE-2025-40154
- CVE-2025-40153
- CVE-2025-40140
- CVE-2025-40134
- CVE-2025-40127
- CVE-2025-40126
- CVE-2025-40125
- CVE-2025-40124
- CVE-2025-40121
- CVE-2025-40120
- CVE-2025-40118
- CVE-2025-40116
- CVE-2025-40115
- CVE-2025-40112
- CVE-2025-40111
- CVE-2025-40109
- CVE-2025-40106
- CVE-2025-40105
- CVE-2025-40094
- CVE-2025-40092
- CVE-2025-40088
- CVE-2025-40087
- CVE-2025-40085
- CVE-2025-40081
- CVE-2025-40078
- CVE-2025-40070
- CVE-2025-40068
- CVE-2025-40060
- CVE-2025-40055
- CVE-2025-40053
- CVE-2025-40049
- CVE-2025-40048
- CVE-2025-40044
- CVE-2025-40043
- CVE-2025-40042
- CVE-2025-40035
- CVE-2025-40030
- CVE-2025-40029
- CVE-2025-40027
- CVE-2025-40026
- CVE-2025-40021
- CVE-2025-40020
- CVE-2025-40011
- CVE-2025-40006
- CVE-2025-40001
- CVE-2025-39998
- CVE-2025-39996
- CVE-2025-39995
- CVE-2025-39994
- CVE-2025-39988
- CVE-2025-39987
- CVE-2025-39986
- CVE-2025-39985
- CVE-2025-39980
- CVE-2025-39973
- CVE-2025-39972
- CVE-2025-39971
- CVE-2025-39970
- CVE-2025-39969
- CVE-2025-39968
- CVE-2025-39967
- CVE-2025-39955
- CVE-2025-39953
- CVE-2025-39951
- CVE-2025-39949
- CVE-2025-39945
- CVE-2025-39943
- CVE-2025-39937
- CVE-2025-39934
- CVE-2025-39923
- CVE-2025-39913
- CVE-2025-39911
- CVE-2025-39907
- CVE-2025-39885
- CVE-2025-39883
- CVE-2025-39880
- CVE-2025-39876
- CVE-2025-39873
- CVE-2025-39869
- CVE-2025-38584
- CVE-2025-38248
- CVE-2025-38236
- CVE-2025-23143
- CVE-2025-22058
- CVE-2025-21861
- CVE-2024-58011
- CVE-2024-56538
- CVE-2024-53114
Related notices
- USN-8034-1
- USN-8033-1
- USN-8033-2
- USN-8031-1
- USN-8030-1
- USN-8029-1
- USN-8028-1
- USN-8028-2
- USN-7940-1
- USN-7940-2
- USN-8034-1
- USN-8033-1
- USN-8033-2
- USN-8031-1
- USN-8030-1
- USN-8029-1
- USN-8028-1
- USN-8028-2
- USN-7940-1
- USN-7940-2
- USN-7934-1
- USN-7906-1
- USN-7906-2
- USN-7906-3
- USN-7887-1
- USN-7887-2
- USN-7880-1
- USN-7879-1
- USN-7879-2
- USN-7879-3
- USN-7879-4
- USN-7856-1
- USN-7835-1
- USN-7835-2
- USN-7835-3
- USN-7835-4
- USN-7835-5
- USN-7835-6
- USN-7834-1
- USN-7833-1
- USN-7833-2
- USN-7833-3
- USN-7833-4
- USN-7737-1
- USN-7719-1
- USN-7703-1
- USN-7703-2
- USN-7703-3
- USN-7703-4
- USN-7653-1
- USN-7652-1
- USN-7651-1
- USN-7651-2
- USN-7651-3
- USN-7651-4
- USN-7651-5
- USN-7651-6
- USN-7628-1
- USN-7606-1
- USN-7605-1
- USN-7605-2
- USN-7594-1
- USN-7594-2
- USN-7594-3
- USN-7524-1
- USN-7523-1
- USN-7521-1
- USN-7521-2
- USN-7521-3
- USN-7468-1
- USN-7453-1
- USN-7452-1
- USN-7451-1
- USN-7450-1
- USN-7449-1
- USN-7449-2
- USN-7310-1
- USN-7277-1
- USN-7276-1
Have additional questions?