{"id":"USN-8164-1","summary":"linux-intel-iot-realtime vulnerabilities","details":"\nQualys discovered that several vulnerabilities existed in the AppArmor\nLinux kernel Security Module (LSM). An unprivileged local attacker could\nuse these issues to load, replace, and remove arbitrary AppArmor profiles\ncausing denial of service, exposure of sensitive information (kernel\nmemory), local privilege escalation, or possibly escape a container.\n(LP: #2143853, CVE-2026-23268, CVE-2026-23269, CVE-2026-23403,\nCVE-2026-23404, CVE-2026-23405, CVE-2026-23406, CVE-2026-23407,\nCVE-2026-23408, CVE-2026-23409, CVE-2026-23410, CVE-2026-23411)\n\nSeveral security issues were discovered in the Linux kernel.\nAn attacker could possibly use these to compromise the system.\nThis update corrects flaws in the following subsystems:\n  - ARM64 architecture;\n  - Cryptographic API;\n  - Netfilter;\n  - Network traffic control;\n(CVE-2025-37849, CVE-2026-23060, CVE-2026-23074, CVE-2026-23111)\n","modified":"2026-04-13T14:29:20.070771227Z","published":"2026-04-09T23:34:17Z","related":["UBUNTU-CVE-2025-37849","UBUNTU-CVE-2026-23060","UBUNTU-CVE-2026-23074","UBUNTU-CVE-2026-23111","UBUNTU-CVE-2026-23268","UBUNTU-CVE-2026-23269","UBUNTU-CVE-2026-23403","UBUNTU-CVE-2026-23404","UBUNTU-CVE-2026-23405","UBUNTU-CVE-2026-23406","UBUNTU-CVE-2026-23407","UBUNTU-CVE-2026-23408","UBUNTU-CVE-2026-23409","UBUNTU-CVE-2026-23410","UBUNTU-CVE-2026-23411"],"upstream":["CVE-2025-37849","CVE-2026-23060","CVE-2026-23074","CVE-2026-23111","CVE-2026-23268","CVE-2026-23269","CVE-2026-23403","CVE-2026-23404","CVE-2026-23405","CVE-2026-23406","CVE-2026-23407","CVE-2026-23408","CVE-2026-23409","CVE-2026-23410","CVE-2026-23411","UBUNTU-CVE-2025-37849","UBUNTU-CVE-2026-23060","UBUNTU-CVE-2026-23074","UBUNTU-CVE-2026-23111","UBUNTU-CVE-2026-23268","UBUNTU-CVE-2026-23269","UBUNTU-CVE-2026-23403","UBUNTU-CVE-2026-23404","UBUNTU-CVE-2026-23405","UBUNTU-CVE-2026-23406","UBUNTU-CVE-2026-23407","UBUNTU-CVE-2026-23408","UBUNTU-CVE-2026-23409","UBUNTU-CVE-2026-23410","UBUNTU-CVE-2026-23411"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-8164-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-37849"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-23060"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-23074"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-23111"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-23268"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-23269"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-23403"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-23404"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-23405"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-23406"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-23407"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-23408"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-23409"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-23410"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-23411"},{"type":"REPORT","url":"https://launchpad.net/bugs/2143853"}],"affected":[{"package":{"name":"linux-intel-iot-realtime","ecosystem":"Ubuntu:Pro:Realtime:22.04:LTS","purl":"pkg:deb/ubuntu/linux-intel-iot-realtime@5.15.0-1096.98?arch=source&distro=realtime/jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.15.0-1096.98"}]}],"versions":["5.15.0-1021.26","5.15.0-1022.27","5.15.0-1023.28","5.15.0-1024.29","5.15.0-1028.33","5.15.0-1033.35","5.15.0-1034.36","5.15.0-1035.37","5.15.0-1036.38","5.15.0-1037.39","5.15.0-1038.40","5.15.0-1039.41","5.15.0-1040.42","5.15.0-1041.43","5.15.0-1042.44","5.15.0-1043.45","5.15.0-1044.46","5.15.0-1046.48","5.15.0-1047.49","5.15.0-1048.50","5.15.0-1049.51","5.15.0-1050.52","5.15.0-1053.55","5.15.0-1054.56","5.15.0-1055.57","5.15.0-1056.58","5.15.0-1057.59","5.15.0-1058.60","5.15.0-1059.61","5.15.0-1060.62","5.15.0-1061.63","5.15.0-1063.65","5.15.0-1064.66","5.15.0-1066.68","5.15.0-1071.73","5.15.0-1072.74","5.15.0-1073.75","5.15.0-1074.76","5.15.0-1075.77","5.15.0-1076.78","5.15.0-1077.79","5.15.0-1078.80","5.15.0-1079.81","5.15.0-1080.82","5.15.0-1081.83","5.15.0-1082.84","5.15.0-1083.85","5.15.0-1084.86","5.15.0-1085.87","5.15.0-1086.88","5.15.0-1087.89","5.15.0-1088.90","5.15.0-1089.91","5.15.0-1090.92","5.15.0-1091.93","5.15.0-1092.94","5.15.0-1093.95","5.15.0-1094.96"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro","binaries":[{"binary_name":"linux-buildinfo-5.15.0-1096-intel-iot-realtime","binary_version":"5.15.0-1096.98"},{"binary_name":"linux-cloud-tools-5.15.0-1096-intel-iot-realtime","binary_version":"5.15.0-1096.98"},{"binary_name":"linux-headers-5.15.0-1096-intel-iot-realtime","binary_version":"5.15.0-1096.98"},{"binary_name":"linux-image-unsigned-5.15.0-1096-intel-iot-realtime","binary_version":"5.15.0-1096.98"},{"binary_name":"linux-intel-iot-realtime-cloud-tools-5.15.0-1096","binary_version":"5.15.0-1096.98"},{"binary_name":"linux-intel-iot-realtime-cloud-tools-common","binary_version":"5.15.0-1096.98"},{"binary_name":"linux-intel-iot-realtime-headers-5.15.0-1096","binary_version":"5.15.0-1096.98"},{"binary_name":"linux-intel-iot-realtime-tools-5.15.0-1096","binary_version":"5.15.0-1096.98"},{"binary_name":"linux-intel-iot-realtime-tools-common","binary_version":"5.15.0-1096.98"},{"binary_name":"linux-intel-iot-realtime-tools-host","binary_version":"5.15.0-1096.98"},{"binary_name":"linux-modules-5.15.0-1096-intel-iot-realtime","binary_version":"5.15.0-1096.98"},{"binary_name":"linux-modules-extra-5.15.0-1096-intel-iot-realtime","binary_version":"5.15.0-1096.98"},{"binary_name":"linux-tools-5.15.0-1096-intel-iot-realtime","binary_version":"5.15.0-1096.98"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:Pro:Realtime:22.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2025-37849"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-23060"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-23074"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2026-23111"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2026-23268"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-23269"},{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-23403"},{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-23404"},{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-23405"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-23406"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-23407"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-23408"},{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-23409"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2026-23410"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2026-23411"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8164-1.json"}}],"schema_version":"1.7.5"}