{"id":"USN-8098-2","summary":"linux-gcp vulnerabilities","details":"Qualys discovered that several vulnerabilities existed in the AppArmor\nLinux kernel Security Module (LSM). An unprivileged local attacker could\nuse these issues to load, replace, and remove arbitrary AppArmor profiles\ncausing denial of service, exposure of sensitive information (kernel\nmemory), local privilege escalation, or possibly escape a container.\n(LP: #2143853)\n\nSeveral security issues were discovered in the Linux kernel.\nAn attacker could possibly use these to compromise the system.\nThis update corrects flaws in the following subsystems:\n  - x86 architecture;\n  - GPIO subsystem;\n  - GPU drivers;\n  - MMC subsystem;\n  - BTRFS file system;\n  - XFRM subsystem;\n  - IPv4 networking;\n  - IPv6 networking;\n  - MAC80211 subsystem;\n  - SMC sockets;\n(CVE-2021-47599, CVE-2022-48875, CVE-2022-49072, CVE-2022-49267,\nCVE-2024-49927, CVE-2024-56640, CVE-2025-21780, CVE-2025-40215)\n","modified":"2026-04-27T18:47:23.536656054Z","published":"2026-03-17T10:58:28Z","related":["UBUNTU-CVE-2021-47599","UBUNTU-CVE-2022-48875","UBUNTU-CVE-2022-49072","UBUNTU-CVE-2022-49267","UBUNTU-CVE-2024-49927","UBUNTU-CVE-2024-56640","UBUNTU-CVE-2025-21780","UBUNTU-CVE-2025-40215"],"upstream":["CVE-2021-47599","CVE-2022-48875","CVE-2022-49072","CVE-2022-49267","CVE-2024-49927","CVE-2024-56640","CVE-2025-21780","CVE-2025-40215","UBUNTU-CVE-2021-47599","UBUNTU-CVE-2022-48875","UBUNTU-CVE-2022-49072","UBUNTU-CVE-2022-49267","UBUNTU-CVE-2024-49927","UBUNTU-CVE-2024-56640","UBUNTU-CVE-2025-21780","UBUNTU-CVE-2025-40215"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-8098-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-47599"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-48875"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-49072"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-49267"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-49927"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-56640"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-21780"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-40215"},{"type":"REPORT","url":"https://launchpad.net/bugs/2143853"}],"affected":[{"package":{"name":"linux-gcp","ecosystem":"Ubuntu:Pro:20.04:LTS","purl":"pkg:deb/ubuntu/linux-gcp@5.4.0-1159.168?arch=source&distro=esm-infra/focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.4.0-1159.168"}]}],"versions":["5.3.0-1004.4","5.3.0-1009.10","5.3.0-1011.12","5.4.0-1005.5","5.4.0-1007.7","5.4.0-1008.8","5.4.0-1009.9","5.4.0-1011.11","5.4.0-1015.15","5.4.0-1018.18","5.4.0-1019.19","5.4.0-1021.21","5.4.0-1022.22","5.4.0-1024.24","5.4.0-1025.25","5.4.0-1028.29","5.4.0-1029.31","5.4.0-1030.32","5.4.0-1032.34","5.4.0-1033.35","5.4.0-1034.37","5.4.0-1036.39","5.4.0-1037.40","5.4.0-1038.41","5.4.0-1040.43","5.4.0-1041.44","5.4.0-1042.45","5.4.0-1043.46","5.4.0-1044.47","5.4.0-1046.49","5.4.0-1049.53","5.4.0-1051.55","5.4.0-1052.56","5.4.0-1053.57","5.4.0-1055.59","5.4.0-1056.60","5.4.0-1057.61","5.4.0-1058.62","5.4.0-1059.63","5.4.0-1060.64","5.4.0-1062.66","5.4.0-1063.67","5.4.0-1064.68","5.4.0-1065.69","5.4.0-1067.71","5.4.0-1068.72","5.4.0-1069.73","5.4.0-1072.77","5.4.0-1073.78","5.4.0-1075.80","5.4.0-1078.84","5.4.0-1080.87","5.4.0-1083.91","5.4.0-1084.92","5.4.0-1086.94","5.4.0-1087.95","5.4.0-1089.97","5.4.0-1090.98","5.4.0-1092.101","5.4.0-1093.102","5.4.0-1096.105","5.4.0-1097.106","5.4.0-1098.107","5.4.0-1100.109","5.4.0-1101.110","5.4.0-1102.111","5.4.0-1103.112","5.4.0-1104.113","5.4.0-1105.114","5.4.0-1106.115","5.4.0-1107.116","5.4.0-1108.117","5.4.0-1109.118","5.4.0-1110.119","5.4.0-1111.120","5.4.0-1112.121","5.4.0-1113.122","5.4.0-1115.124","5.4.0-1116.125","5.4.0-1117.126","5.4.0-1118.127","5.4.0-1120.129","5.4.0-1121.130","5.4.0-1122.131","5.4.0-1123.132","5.4.0-1124.133","5.4.0-1125.134","5.4.0-1126.135","5.4.0-1127.136","5.4.0-1128.137","5.4.0-1129.138","5.4.0-1130.139","5.4.0-1131.140","5.4.0-1132.141","5.4.0-1133.142","5.4.0-1134.143","5.4.0-1135.144","5.4.0-1136.145","5.4.0-1137.146","5.4.0-1138.147","5.4.0-1139.148","5.4.0-1140.149","5.4.0-1141.150","5.4.0-1142.151","5.4.0-1143.152","5.4.0-1145.154","5.4.0-1146.155","5.4.0-1147.156","5.4.0-1148.157","5.4.0-1149.158","5.4.0-1150.159","5.4.0-1151.160","5.4.0-1152.161","5.4.0-1153.162","5.4.0-1154.163","5.4.0-1155.164","5.4.0-1156.165","5.4.0-1157.166"],"ecosystem_specific":{"binaries":[{"binary_version":"5.4.0-1159.168","binary_name":"linux-buildinfo-5.4.0-1159-gcp"},{"binary_version":"5.4.0-1159.168","binary_name":"linux-gcp-headers-5.4.0-1159"},{"binary_version":"5.4.0-1159.168","binary_name":"linux-gcp-tools-5.4.0-1159"},{"binary_version":"5.4.0-1159.168","binary_name":"linux-headers-5.4.0-1159-gcp"},{"binary_version":"5.4.0-1159.168","binary_name":"linux-image-unsigned-5.4.0-1159-gcp"},{"binary_version":"5.4.0-1159.168","binary_name":"linux-modules-5.4.0-1159-gcp"},{"binary_version":"5.4.0-1159.168","binary_name":"linux-modules-extra-5.4.0-1159-gcp"},{"binary_version":"5.4.0-1159.168","binary_name":"linux-tools-5.4.0-1159-gcp"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:Pro:20.04:LTS","cves":[{"id":"CVE-2021-47599","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-48875","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-49072","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-49267","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-49927","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-56640","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}]},{"id":"CVE-2025-21780","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}]},{"id":"CVE-2025-40215","severity":[{"type":"Ubuntu","score":"medium"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8098-2.json"}}],"schema_version":"1.7.5"}