USN-8098-4

Source
https://ubuntu.com/security/notices/USN-8098-4
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8098-4.json
JSON Data
https://api.test.osv.dev/v1/vulns/USN-8098-4
Upstream
Related
Published
2026-03-24T08:34:19Z
Modified
2026-03-24T23:44:12.972131Z
Summary
linux-hwe-5.4, linux-ibm vulnerabilities
Details

Qualys discovered that several vulnerabilities existed in the AppArmor Linux kernel Security Module (LSM). An unprivileged local attacker could use these issues to load, replace, and remove arbitrary AppArmor profiles causing denial of service, exposure of sensitive information (kernel memory), local privilege escalation, or possibly escape a container. (LP: #2143853)

Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - x86 architecture; - GPIO subsystem; - GPU drivers; - MMC subsystem; - BTRFS file system; - XFRM subsystem; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - SMC sockets; (CVE-2021-47599, CVE-2022-48875, CVE-2022-49072, CVE-2022-49267, CVE-2024-49927, CVE-2024-56640, CVE-2025-21780, CVE-2025-40215)

References

Affected packages

Ubuntu:Pro:18.04:LTS / linux-hwe-5.4

Package

Name
linux-hwe-5.4
Purl
pkg:deb/ubuntu/linux-hwe-5.4@5.4.0-227.247~18.04.1?arch=source&distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-227.247~18.04.1

Affected versions

5.*
5.4.0-37.41~18.04.1
5.4.0-39.43~18.04.1
5.4.0-40.44~18.04.1
5.4.0-42.46~18.04.1
5.4.0-45.49~18.04.2
5.4.0-47.51~18.04.1
5.4.0-48.52~18.04.1
5.4.0-51.56~18.04.1
5.4.0-52.57~18.04.1
5.4.0-53.59~18.04.1
5.4.0-54.60~18.04.1
5.4.0-56.62~18.04.1
5.4.0-58.64~18.04.1
5.4.0-59.65~18.04.1
5.4.0-60.67~18.04.1
5.4.0-62.70~18.04.1
5.4.0-64.72~18.04.1
5.4.0-65.73~18.04.1
5.4.0-66.74~18.04.2
5.4.0-67.75~18.04.1
5.4.0-70.78~18.04.1
5.4.0-71.79~18.04.1
5.4.0-72.80~18.04.1
5.4.0-73.82~18.04.1
5.4.0-74.83~18.04.1
5.4.0-77.86~18.04.1
5.4.0-80.90~18.04.1
5.4.0-81.91~18.04.1
5.4.0-84.94~18.04.1
5.4.0-86.97~18.04.1
5.4.0-87.98~18.04.1
5.4.0-89.100~18.04.1
5.4.0-90.101~18.04.1
5.4.0-91.102~18.04.1
5.4.0-92.103~18.04.2
5.4.0-94.106~18.04.1
5.4.0-96.109~18.04.1
5.4.0-97.110~18.04.1
5.4.0-99.112~18.04.1
5.4.0-100.113~18.04.1
5.4.0-104.118~18.04.1
5.4.0-105.119~18.04.1
5.4.0-107.121~18.04.1
5.4.0-109.123~18.04.1
5.4.0-110.124~18.04.1
5.4.0-113.127~18.04.1
5.4.0-117.132~18.04.1
5.4.0-120.136~18.04.1
5.4.0-121.137~18.04.1
5.4.0-122.138~18.04.1
5.4.0-124.140~18.04.1
5.4.0-125.141~18.04.1
5.4.0-126.142~18.04.1
5.4.0-128.144~18.04.1
5.4.0-131.147~18.04.1
5.4.0-132.148~18.04.1
5.4.0-133.149~18.04.1
5.4.0-135.152~18.04.2
5.4.0-136.153~18.04.1
5.4.0-137.154~18.04.1
5.4.0-139.156~18.04.1
5.4.0-144.161~18.04.1
5.4.0-146.163~18.04.1
5.4.0-147.164~18.04.1
5.4.0-148.165~18.04.1
5.4.0-149.166~18.04.1
5.4.0-150.167~18.04.1
5.4.0-152.169~18.04.1
5.4.0-153.170~18.04.1
5.4.0-155.172~18.04.1
5.4.0-156.173~18.04.1
5.4.0-159.176~18.04.1
5.4.0-162.179~18.04.1
5.4.0-163.180~18.04.1
5.4.0-164.181~18.04.1
5.4.0-165.182~18.04.1
5.4.0-166.183~18.04.2
5.4.0-167.184~18.04.1
5.4.0-169.187~18.04.1
5.4.0-170.188~18.04.1
5.4.0-171.189~18.04.1
5.4.0-172.190~18.04.1
5.4.0-173.191~18.04.1
5.4.0-174.193~18.04.1
5.4.0-175.195~18.04.1
5.4.0-177.197~18.04.1
5.4.0-181.201~18.04.1
5.4.0-182.202~18.04.1
5.4.0-186.206~18.04.1
5.4.0-187.207~18.04.1
5.4.0-189.209~18.04.1
5.4.0-190.210~18.04.1
5.4.0-192.212~18.04.1
5.4.0-193.213~18.04.1
5.4.0-195.215~18.04.1
5.4.0-196.216~18.04.1
5.4.0-198.218~18.04.1
5.4.0-200.220~18.04.1
5.4.0-202.222~18.04.1
5.4.0-204.224~18.04.1
5.4.0-205.225~18.04.1
5.4.0-208.228~18.04.1
5.4.0-211.231~18.04.1
5.4.0-212.232~18.04.1
5.4.0-214.234~18.04.1
5.4.0-215.235~18.04.1
5.4.0-216.236~18.04.1
5.4.0-218.238~18.04.1
5.4.0-219.239~18.04.1
5.4.0-220.240~18.04.1
5.4.0-221.241~18.04.1
5.4.0-222.242~18.04.1
5.4.0-223.243~18.04.1
5.4.0-224.244~18.04.1
5.4.0-225.245~18.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "block-modules-5.4.0-227-generic-di",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "crypto-modules-5.4.0-227-generic-di",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "dasd-extra-modules-5.4.0-227-generic-di",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "dasd-modules-5.4.0-227-generic-di",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "fat-modules-5.4.0-227-generic-di",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "fb-modules-5.4.0-227-generic-di",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "firewire-core-modules-5.4.0-227-generic-di",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "floppy-modules-5.4.0-227-generic-di",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "fs-core-modules-5.4.0-227-generic-di",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "fs-secondary-modules-5.4.0-227-generic-di",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "input-modules-5.4.0-227-generic-di",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "ipmi-modules-5.4.0-227-generic-di",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "kernel-image-5.4.0-227-generic-di",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "linux-buildinfo-5.4.0-227-generic",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "linux-buildinfo-5.4.0-227-lowlatency",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "linux-cloud-tools-5.4.0-227-generic",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "linux-cloud-tools-5.4.0-227-lowlatency",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "linux-headers-5.4.0-227-generic",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "linux-headers-5.4.0-227-lowlatency",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "linux-hwe-5.4-cloud-tools-5.4.0-227",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "linux-hwe-5.4-cloud-tools-common",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "linux-hwe-5.4-headers-5.4.0-227",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "linux-hwe-5.4-source-5.4.0",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "linux-hwe-5.4-tools-5.4.0-227",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "linux-hwe-5.4-tools-common",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "linux-hwe-5.4-udebs-generic",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "linux-image-unsigned-5.4.0-227-generic",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "linux-image-unsigned-5.4.0-227-lowlatency",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "linux-modules-5.4.0-227-generic",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "linux-modules-5.4.0-227-lowlatency",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "linux-modules-extra-5.4.0-227-generic",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "linux-tools-5.4.0-227-generic",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "linux-tools-5.4.0-227-lowlatency",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "md-modules-5.4.0-227-generic-di",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "message-modules-5.4.0-227-generic-di",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "mouse-modules-5.4.0-227-generic-di",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "multipath-modules-5.4.0-227-generic-di",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "nfs-modules-5.4.0-227-generic-di",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "nic-modules-5.4.0-227-generic-di",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "nic-pcmcia-modules-5.4.0-227-generic-di",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "nic-shared-modules-5.4.0-227-generic-di",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "nic-usb-modules-5.4.0-227-generic-di",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "parport-modules-5.4.0-227-generic-di",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "pata-modules-5.4.0-227-generic-di",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "pcmcia-modules-5.4.0-227-generic-di",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "pcmcia-storage-modules-5.4.0-227-generic-di",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "plip-modules-5.4.0-227-generic-di",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "ppp-modules-5.4.0-227-generic-di",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "sata-modules-5.4.0-227-generic-di",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "scsi-modules-5.4.0-227-generic-di",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "serial-modules-5.4.0-227-generic-di",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "storage-core-modules-5.4.0-227-generic-di",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "usb-modules-5.4.0-227-generic-di",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "virtio-modules-5.4.0-227-generic-di",
            "binary_version": "5.4.0-227.247~18.04.1"
        },
        {
            "binary_name": "vlan-modules-5.4.0-227-generic-di",
            "binary_version": "5.4.0-227.247~18.04.1"
        }
    ],
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}

Database specific

cves_map
{
    "cves": [
        {
            "id": "CVE-2021-47599",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        },
        {
            "id": "CVE-2022-48875",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        },
        {
            "id": "CVE-2022-49072",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        },
        {
            "id": "CVE-2022-49267",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        },
        {
            "id": "CVE-2024-49927",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        },
        {
            "id": "CVE-2024-56640",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "high"
                }
            ]
        },
        {
            "id": "CVE-2025-21780",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "high"
                }
            ]
        },
        {
            "id": "CVE-2025-40215",
            "severity": [
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        }
    ],
    "ecosystem": "Ubuntu:Pro:18.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8098-4.json"

Ubuntu:Pro:20.04:LTS / linux-ibm

Package

Name
linux-ibm
Purl
pkg:deb/ubuntu/linux-ibm@5.4.0-1102.107?arch=source&distro=esm-infra/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1102.107

Affected versions

5.*
5.4.0-1003.4
5.4.0-1004.5
5.4.0-1005.6
5.4.0-1006.7
5.4.0-1007.8
5.4.0-1008.9
5.4.0-1010.11
5.4.0-1012.13
5.4.0-1013.14
5.4.0-1014.15
5.4.0-1015.16
5.4.0-1017.19
5.4.0-1018.20
5.4.0-1019.21
5.4.0-1020.22
5.4.0-1021.23
5.4.0-1023.25
5.4.0-1026.29
5.4.0-1028.32
5.4.0-1029.33
5.4.0-1031.35
5.4.0-1032.36
5.4.0-1033.37
5.4.0-1034.38
5.4.0-1036.41
5.4.0-1037.42
5.4.0-1040.45
5.4.0-1041.46
5.4.0-1042.47
5.4.0-1044.49
5.4.0-1045.50
5.4.0-1046.51
5.4.0-1047.52
5.4.0-1048.53
5.4.0-1049.54
5.4.0-1050.55
5.4.0-1051.56
5.4.0-1052.57
5.4.0-1053.58
5.4.0-1054.59
5.4.0-1056.61
5.4.0-1057.62
5.4.0-1058.63
5.4.0-1059.64
5.4.0-1060.65
5.4.0-1061.66
5.4.0-1063.68
5.4.0-1064.69
5.4.0-1065.70
5.4.0-1066.71
5.4.0-1067.72
5.4.0-1068.73
5.4.0-1069.74
5.4.0-1070.75
5.4.0-1071.76
5.4.0-1072.77
5.4.0-1073.78
5.4.0-1074.79
5.4.0-1075.80
5.4.0-1076.81
5.4.0-1077.82
5.4.0-1078.83
5.4.0-1079.84
5.4.0-1080.85
5.4.0-1081.86
5.4.0-1082.87
5.4.0-1083.88
5.4.0-1084.89
5.4.0-1085.90
5.4.0-1086.91
5.4.0-1088.93
5.4.0-1089.94
5.4.0-1090.95
5.4.0-1091.96
5.4.0-1092.97
5.4.0-1093.98
5.4.0-1094.99
5.4.0-1095.100
5.4.0-1096.101
5.4.0-1097.102
5.4.0-1098.103
5.4.0-1099.104
5.4.0-1100.105

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "linux-buildinfo-5.4.0-1102-ibm",
            "binary_version": "5.4.0-1102.107"
        },
        {
            "binary_name": "linux-headers-5.4.0-1102-ibm",
            "binary_version": "5.4.0-1102.107"
        },
        {
            "binary_name": "linux-ibm-cloud-tools-common",
            "binary_version": "5.4.0-1102.107"
        },
        {
            "binary_name": "linux-ibm-headers-5.4.0-1102",
            "binary_version": "5.4.0-1102.107"
        },
        {
            "binary_name": "linux-ibm-source-5.4.0",
            "binary_version": "5.4.0-1102.107"
        },
        {
            "binary_name": "linux-ibm-tools-5.4.0-1102",
            "binary_version": "5.4.0-1102.107"
        },
        {
            "binary_name": "linux-ibm-tools-common",
            "binary_version": "5.4.0-1102.107"
        },
        {
            "binary_name": "linux-image-unsigned-5.4.0-1102-ibm",
            "binary_version": "5.4.0-1102.107"
        },
        {
            "binary_name": "linux-modules-5.4.0-1102-ibm",
            "binary_version": "5.4.0-1102.107"
        },
        {
            "binary_name": "linux-modules-extra-5.4.0-1102-ibm",
            "binary_version": "5.4.0-1102.107"
        },
        {
            "binary_name": "linux-tools-5.4.0-1102-ibm",
            "binary_version": "5.4.0-1102.107"
        }
    ],
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}

Database specific

cves_map
{
    "cves": [
        {
            "id": "CVE-2021-47599",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        },
        {
            "id": "CVE-2022-48875",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        },
        {
            "id": "CVE-2022-49072",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        },
        {
            "id": "CVE-2022-49267",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        },
        {
            "id": "CVE-2024-49927",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        },
        {
            "id": "CVE-2024-56640",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "high"
                }
            ]
        },
        {
            "id": "CVE-2025-21780",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "high"
                }
            ]
        },
        {
            "id": "CVE-2025-40215",
            "severity": [
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        }
    ],
    "ecosystem": "Ubuntu:Pro:20.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8098-4.json"