USN-8149-2

Source
https://ubuntu.com/security/notices/USN-8149-2
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8149-2.json
JSON Data
https://api.test.osv.dev/v1/vulns/USN-8149-2
Upstream
Related
Published
2026-04-09T00:05:19Z
Modified
2026-04-13T14:29:22.062907365Z
Summary
linux-oracle, linux-oracle-6.17, linux-raspi vulnerabilities
Details

Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Cryptographic API; - Netfilter; - Network traffic control; (CVE-2026-23060, CVE-2026-23074, CVE-2026-23111)

References

Affected packages

Ubuntu:24.04:LTS / linux-oracle-6.17

Package

Name
linux-oracle-6.17
Purl
pkg:deb/ubuntu/linux-oracle-6.17@6.17.0-1010.10~24.04.1?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.17.0-1010.10~24.04.1

Affected versions

6.*
6.17.0-1004.4~24.04.2
6.17.0-1007.7~24.04.1
6.17.0-1009.9~24.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "6.17.0-1010.10~24.04.1",
            "binary_name": "linux-buildinfo-6.17.0-1010-oracle"
        },
        {
            "binary_version": "6.17.0-1010.10~24.04.1",
            "binary_name": "linux-buildinfo-6.17.0-1010-oracle-64k"
        },
        {
            "binary_version": "6.17.0-1010.10~24.04.1",
            "binary_name": "linux-headers-6.17.0-1010-oracle"
        },
        {
            "binary_version": "6.17.0-1010.10~24.04.1",
            "binary_name": "linux-headers-6.17.0-1010-oracle-64k"
        },
        {
            "binary_version": "6.17.0-1010.10~24.04.1",
            "binary_name": "linux-image-unsigned-6.17.0-1010-oracle"
        },
        {
            "binary_version": "6.17.0-1010.10~24.04.1",
            "binary_name": "linux-image-unsigned-6.17.0-1010-oracle-64k"
        },
        {
            "binary_version": "6.17.0-1010.10~24.04.1",
            "binary_name": "linux-modules-6.17.0-1010-oracle"
        },
        {
            "binary_version": "6.17.0-1010.10~24.04.1",
            "binary_name": "linux-modules-6.17.0-1010-oracle-64k"
        },
        {
            "binary_version": "6.17.0-1010.10~24.04.1",
            "binary_name": "linux-modules-extra-6.17.0-1010-oracle"
        },
        {
            "binary_version": "6.17.0-1010.10~24.04.1",
            "binary_name": "linux-modules-extra-6.17.0-1010-oracle-64k"
        },
        {
            "binary_version": "6.17.0-1010.10~24.04.1",
            "binary_name": "linux-oracle-6.17-headers-6.17.0-1010"
        },
        {
            "binary_version": "6.17.0-1010.10~24.04.1",
            "binary_name": "linux-oracle-6.17-tools-6.17.0-1010"
        },
        {
            "binary_version": "6.17.0-1010.10~24.04.1",
            "binary_name": "linux-tools-6.17.0-1010-oracle"
        },
        {
            "binary_version": "6.17.0-1010.10~24.04.1",
            "binary_name": "linux-tools-6.17.0-1010-oracle-64k"
        }
    ]
}

Database specific

cves_map
{
    "cves": [
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2026-23060"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2026-23074"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "high",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2026-23111"
        }
    ],
    "ecosystem": "Ubuntu:24.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8149-2.json"

Ubuntu:25.10 / linux-oracle

Package

Name
linux-oracle
Purl
pkg:deb/ubuntu/linux-oracle@6.17.0-1010.10?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.17.0-1010.10

Affected versions

6.*
6.14.0-1005.5
6.14.0-1007.7+25.10.1
6.16.0-1001.1
6.17.0-1001.1
6.17.0-1002.2
6.17.0-1003.3
6.17.0-1005.5
6.17.0-1006.6
6.17.0-1007.7
6.17.0-1009.9

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "6.17.0-1010.10",
            "binary_name": "linux-buildinfo-6.17.0-1010-oracle"
        },
        {
            "binary_version": "6.17.0-1010.10",
            "binary_name": "linux-buildinfo-6.17.0-1010-oracle-64k"
        },
        {
            "binary_version": "6.17.0-1010.10",
            "binary_name": "linux-headers-6.17.0-1010-oracle"
        },
        {
            "binary_version": "6.17.0-1010.10",
            "binary_name": "linux-headers-6.17.0-1010-oracle-64k"
        },
        {
            "binary_version": "6.17.0-1010.10",
            "binary_name": "linux-image-unsigned-6.17.0-1010-oracle"
        },
        {
            "binary_version": "6.17.0-1010.10",
            "binary_name": "linux-image-unsigned-6.17.0-1010-oracle-64k"
        },
        {
            "binary_version": "6.17.0-1010.10",
            "binary_name": "linux-modules-6.17.0-1010-oracle"
        },
        {
            "binary_version": "6.17.0-1010.10",
            "binary_name": "linux-modules-6.17.0-1010-oracle-64k"
        },
        {
            "binary_version": "6.17.0-1010.10",
            "binary_name": "linux-oracle-headers-6.17.0-1010"
        },
        {
            "binary_version": "6.17.0-1010.10",
            "binary_name": "linux-oracle-tools-6.17.0-1010"
        },
        {
            "binary_version": "6.17.0-1010.10",
            "binary_name": "linux-tools-6.17.0-1010-oracle"
        },
        {
            "binary_version": "6.17.0-1010.10",
            "binary_name": "linux-tools-6.17.0-1010-oracle-64k"
        }
    ]
}

Database specific

cves_map
{
    "cves": [
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2026-23060"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2026-23074"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "high",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2026-23111"
        }
    ],
    "ecosystem": "Ubuntu:25.10"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8149-2.json"

Ubuntu:25.10 / linux-raspi

Package

Name
linux-raspi
Purl
pkg:deb/ubuntu/linux-raspi@6.17.0-1011.11?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.17.0-1011.11

Affected versions

6.*
6.14.0-1005.5
6.17.0-1003.3
6.17.0-1004.4
6.17.0-1005.5
6.17.0-1006.6
6.17.0-1007.7
6.17.0-1008.8
6.17.0-1010.10

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "6.17.0-1011.11",
            "binary_name": "linux-buildinfo-6.17.0-1011-raspi"
        },
        {
            "binary_version": "6.17.0-1011.11",
            "binary_name": "linux-headers-6.17.0-1011-raspi"
        },
        {
            "binary_version": "6.17.0-1011.11",
            "binary_name": "linux-image-6.17.0-1011-raspi"
        },
        {
            "binary_version": "6.17.0-1011.11",
            "binary_name": "linux-modules-6.17.0-1011-raspi"
        },
        {
            "binary_version": "6.17.0-1011.11",
            "binary_name": "linux-raspi-headers-6.17.0-1011"
        },
        {
            "binary_version": "6.17.0-1011.11",
            "binary_name": "linux-raspi-tools-6.17.0-1011"
        },
        {
            "binary_version": "6.17.0-1011.11",
            "binary_name": "linux-tools-6.17.0-1011-raspi"
        }
    ]
}

Database specific

cves_map
{
    "cves": [
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2026-23060"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2026-23074"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "high",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2026-23111"
        }
    ],
    "ecosystem": "Ubuntu:25.10"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8149-2.json"