{"id":"USN-8224-1","summary":"linux-bluefield vulnerabilities","details":"Qualys discovered that several vulnerabilities existed in the AppArmor\nLinux kernel Security Module (LSM). An unprivileged local attacker could\nuse these issues to load, replace, and remove arbitrary AppArmor profiles\ncausing denial of service, exposure of sensitive information (kernel\nmemory), local privilege escalation, or possibly escape a container.\n(LP: #2143853, CVE-2026-23268, CVE-2026-23269, CVE-2026-23403,\nCVE-2026-23404, CVE-2026-23405, CVE-2026-23406, CVE-2026-23407,\nCVE-2026-23408, CVE-2026-23409, CVE-2026-23410, CVE-2026-23411)\n\nSeveral security issues were discovered in the Linux kernel.\nAn attacker could possibly use these to compromise the system.\nThis update corrects flaws in the following subsystems:\n  - ARM64 architecture;\n  - x86 architecture;\n  - Cryptographic API;\n  - GPU drivers;\n  - I2C subsystem;\n  - BTRFS file system;\n  - XFRM subsystem;\n  - Padata parallel execution mechanism;\n  - IPv4 networking;\n  - IPv6 networking;\n  - MAC80211 subsystem;\n  - Netfilter;\n  - Network traffic control;\n  - SMC sockets;\n(CVE-2021-47599, CVE-2022-48875, CVE-2022-49046, CVE-2022-49698,\nCVE-2024-46816, CVE-2024-49927, CVE-2024-56640, CVE-2025-21726,\nCVE-2025-21780, CVE-2025-37849, CVE-2025-40019, CVE-2025-40215,\nCVE-2026-23060, CVE-2026-23074)\n","modified":"2026-04-30T10:14:17.822487037Z","published":"2026-04-29T13:36:07Z","related":["UBUNTU-CVE-2021-47599","UBUNTU-CVE-2022-48875","UBUNTU-CVE-2022-49046","UBUNTU-CVE-2022-49698","UBUNTU-CVE-2024-46816","UBUNTU-CVE-2024-49927","UBUNTU-CVE-2024-56640","UBUNTU-CVE-2025-21726","UBUNTU-CVE-2025-21780","UBUNTU-CVE-2025-37849","UBUNTU-CVE-2025-40019","UBUNTU-CVE-2025-40215","UBUNTU-CVE-2026-23060","UBUNTU-CVE-2026-23074","UBUNTU-CVE-2026-23268","UBUNTU-CVE-2026-23269","UBUNTU-CVE-2026-23403","UBUNTU-CVE-2026-23404","UBUNTU-CVE-2026-23405","UBUNTU-CVE-2026-23406","UBUNTU-CVE-2026-23407","UBUNTU-CVE-2026-23409","UBUNTU-CVE-2026-23410","UBUNTU-CVE-2026-23411"],"upstream":["CVE-2021-47599","CVE-2022-48875","CVE-2022-49046","CVE-2022-49698","CVE-2024-46816","CVE-2024-49927","CVE-2024-56640","CVE-2025-21726","CVE-2025-21780","CVE-2025-37849","CVE-2025-40019","CVE-2025-40215","CVE-2026-23060","CVE-2026-23074","CVE-2026-23268","CVE-2026-23269","CVE-2026-23403","CVE-2026-23404","CVE-2026-23405","CVE-2026-23406","CVE-2026-23407","CVE-2026-23409","CVE-2026-23410","CVE-2026-23411","UBUNTU-CVE-2021-47599","UBUNTU-CVE-2022-48875","UBUNTU-CVE-2022-49046","UBUNTU-CVE-2022-49698","UBUNTU-CVE-2024-46816","UBUNTU-CVE-2024-49927","UBUNTU-CVE-2024-56640","UBUNTU-CVE-2025-21726","UBUNTU-CVE-2025-21780","UBUNTU-CVE-2025-37849","UBUNTU-CVE-2025-40019","UBUNTU-CVE-2025-40215","UBUNTU-CVE-2026-23060","UBUNTU-CVE-2026-23074","UBUNTU-CVE-2026-23268","UBUNTU-CVE-2026-23269","UBUNTU-CVE-2026-23403","UBUNTU-CVE-2026-23404","UBUNTU-CVE-2026-23405","UBUNTU-CVE-2026-23406","UBUNTU-CVE-2026-23407","UBUNTU-CVE-2026-23409","UBUNTU-CVE-2026-23410","UBUNTU-CVE-2026-23411"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-8224-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-47599"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-48875"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-49046"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-49698"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-46816"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-49927"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-56640"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-21726"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-21780"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-37849"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-40019"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-40215"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-23060"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-23074"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-23268"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-23269"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-23403"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-23404"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-23405"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-23406"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-23407"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-23409"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-23410"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-23411"},{"type":"REPORT","url":"https://launchpad.net/bugs/2143853"}],"affected":[{"package":{"name":"linux-bluefield","ecosystem":"Ubuntu:Pro:20.04:LTS","purl":"pkg:deb/ubuntu/linux-bluefield@5.4.0-1116.123?arch=source&distro=esm-infra/focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.4.0-1116.123"}]}],"versions":["5.4.0-1007.10","5.4.0-1011.14","5.4.0-1012.15","5.4.0-1013.16","5.4.0-1016.19","5.4.0-1019.22","5.4.0-1020.23","5.4.0-1021.24","5.4.0-1022.25","5.4.0-1023.26","5.4.0-1025.28","5.4.0-1026.29","5.4.0-1028.31","5.4.0-1030.33","5.4.0-1032.35","5.4.0-1035.38","5.4.0-1036.39","5.4.0-1040.44","5.4.0-1042.47","5.4.0-1044.49","5.4.0-1045.50","5.4.0-1046.51","5.4.0-1047.52","5.4.0-1049.55","5.4.0-1050.56","5.4.0-1054.60","5.4.0-1058.64","5.4.0-1059.65","5.4.0-1060.66","5.4.0-1062.68","5.4.0-1064.70","5.4.0-1065.71","5.4.0-1066.72","5.4.0-1068.74","5.4.0-1070.76","5.4.0-1071.77","5.4.0-1072.78","5.4.0-1073.79","5.4.0-1074.80","5.4.0-1075.81","5.4.0-1076.82","5.4.0-1077.83","5.4.0-1078.84","5.4.0-1079.85","5.4.0-1080.87","5.4.0-1081.88","5.4.0-1082.89","5.4.0-1083.90","5.4.0-1084.91","5.4.0-1085.92","5.4.0-1086.93","5.4.0-1087.94","5.4.0-1088.95","5.4.0-1089.96","5.4.0-1090.97","5.4.0-1091.98","5.4.0-1092.99","5.4.0-1093.100","5.4.0-1094.101","5.4.0-1095.102","5.4.0-1096.103","5.4.0-1097.104","5.4.0-1098.105","5.4.0-1099.106","5.4.0-1101.108","5.4.0-1102.109","5.4.0-1103.110","5.4.0-1105.112","5.4.0-1106.113","5.4.0-1107.114","5.4.0-1108.115","5.4.0-1109.116","5.4.0-1110.117","5.4.0-1111.118","5.4.0-1112.119"],"ecosystem_specific":{"binaries":[{"binary_name":"linux-bluefield-headers-5.4.0-1116","binary_version":"5.4.0-1116.123"},{"binary_name":"linux-bluefield-tools-5.4.0-1116","binary_version":"5.4.0-1116.123"},{"binary_name":"linux-buildinfo-5.4.0-1116-bluefield","binary_version":"5.4.0-1116.123"},{"binary_name":"linux-headers-5.4.0-1116-bluefield","binary_version":"5.4.0-1116.123"},{"binary_name":"linux-image-unsigned-5.4.0-1116-bluefield","binary_version":"5.4.0-1116.123"},{"binary_name":"linux-modules-5.4.0-1116-bluefield","binary_version":"5.4.0-1116.123"},{"binary_name":"linux-tools-5.4.0-1116-bluefield","binary_version":"5.4.0-1116.123"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-47599"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-48875"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-49046"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-49698"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-46816"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-49927"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2024-56640"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2025-21726"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2025-21780"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2025-37849"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2025-40019"},{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2025-40215"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2026-23060"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2026-23074"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2026-23268"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2026-23269"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2026-23403"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2026-23404"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-23405"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2026-23406"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2026-23407"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2026-23409"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2026-23410"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2026-23411"}],"ecosystem":"Ubuntu:Pro:20.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8224-1.json"}}],"schema_version":"1.7.5"}