USN-8164-1

Source
https://ubuntu.com/security/notices/USN-8164-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8164-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/USN-8164-1
Upstream
Related
Published
2026-04-09T23:34:17Z
Modified
2026-04-13T14:29:20.070771227Z
Summary
linux-intel-iot-realtime vulnerabilities
Details

Qualys discovered that several vulnerabilities existed in the AppArmor Linux kernel Security Module (LSM). An unprivileged local attacker could use these issues to load, replace, and remove arbitrary AppArmor profiles causing denial of service, exposure of sensitive information (kernel memory), local privilege escalation, or possibly escape a container. (LP: #2143853, CVE-2026-23268, CVE-2026-23269, CVE-2026-23403, CVE-2026-23404, CVE-2026-23405, CVE-2026-23406, CVE-2026-23407, CVE-2026-23408, CVE-2026-23409, CVE-2026-23410, CVE-2026-23411)

Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - Cryptographic API; - Netfilter; - Network traffic control; (CVE-2025-37849, CVE-2026-23060, CVE-2026-23074, CVE-2026-23111)

References

Affected packages

Ubuntu:Pro:Realtime:22.04:LTS / linux-intel-iot-realtime

Package

Name
linux-intel-iot-realtime
Purl
pkg:deb/ubuntu/linux-intel-iot-realtime@5.15.0-1096.98?arch=source&distro=realtime/jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1096.98

Affected versions

5.*
5.15.0-1021.26
5.15.0-1022.27
5.15.0-1023.28
5.15.0-1024.29
5.15.0-1028.33
5.15.0-1033.35
5.15.0-1034.36
5.15.0-1035.37
5.15.0-1036.38
5.15.0-1037.39
5.15.0-1038.40
5.15.0-1039.41
5.15.0-1040.42
5.15.0-1041.43
5.15.0-1042.44
5.15.0-1043.45
5.15.0-1044.46
5.15.0-1046.48
5.15.0-1047.49
5.15.0-1048.50
5.15.0-1049.51
5.15.0-1050.52
5.15.0-1053.55
5.15.0-1054.56
5.15.0-1055.57
5.15.0-1056.58
5.15.0-1057.59
5.15.0-1058.60
5.15.0-1059.61
5.15.0-1060.62
5.15.0-1061.63
5.15.0-1063.65
5.15.0-1064.66
5.15.0-1066.68
5.15.0-1071.73
5.15.0-1072.74
5.15.0-1073.75
5.15.0-1074.76
5.15.0-1075.77
5.15.0-1076.78
5.15.0-1077.79
5.15.0-1078.80
5.15.0-1079.81
5.15.0-1080.82
5.15.0-1081.83
5.15.0-1082.84
5.15.0-1083.85
5.15.0-1084.86
5.15.0-1085.87
5.15.0-1086.88
5.15.0-1087.89
5.15.0-1088.90
5.15.0-1089.91
5.15.0-1090.92
5.15.0-1091.93
5.15.0-1092.94
5.15.0-1093.95
5.15.0-1094.96

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "linux-buildinfo-5.15.0-1096-intel-iot-realtime",
            "binary_version": "5.15.0-1096.98"
        },
        {
            "binary_name": "linux-cloud-tools-5.15.0-1096-intel-iot-realtime",
            "binary_version": "5.15.0-1096.98"
        },
        {
            "binary_name": "linux-headers-5.15.0-1096-intel-iot-realtime",
            "binary_version": "5.15.0-1096.98"
        },
        {
            "binary_name": "linux-image-unsigned-5.15.0-1096-intel-iot-realtime",
            "binary_version": "5.15.0-1096.98"
        },
        {
            "binary_name": "linux-intel-iot-realtime-cloud-tools-5.15.0-1096",
            "binary_version": "5.15.0-1096.98"
        },
        {
            "binary_name": "linux-intel-iot-realtime-cloud-tools-common",
            "binary_version": "5.15.0-1096.98"
        },
        {
            "binary_name": "linux-intel-iot-realtime-headers-5.15.0-1096",
            "binary_version": "5.15.0-1096.98"
        },
        {
            "binary_name": "linux-intel-iot-realtime-tools-5.15.0-1096",
            "binary_version": "5.15.0-1096.98"
        },
        {
            "binary_name": "linux-intel-iot-realtime-tools-common",
            "binary_version": "5.15.0-1096.98"
        },
        {
            "binary_name": "linux-intel-iot-realtime-tools-host",
            "binary_version": "5.15.0-1096.98"
        },
        {
            "binary_name": "linux-modules-5.15.0-1096-intel-iot-realtime",
            "binary_version": "5.15.0-1096.98"
        },
        {
            "binary_name": "linux-modules-extra-5.15.0-1096-intel-iot-realtime",
            "binary_version": "5.15.0-1096.98"
        },
        {
            "binary_name": "linux-tools-5.15.0-1096-intel-iot-realtime",
            "binary_version": "5.15.0-1096.98"
        }
    ],
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8164-1.json"
cves_map
{
    "ecosystem": "Ubuntu:Pro:Realtime:22.04:LTS",
    "cves": [
        {
            "id": "CVE-2025-37849",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "high",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-23060",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-23074",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-23111",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "high",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-23268",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "high",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-23269",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-23403",
            "severity": [
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-23404",
            "severity": [
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-23405",
            "severity": [
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-23406",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-23407",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-23408",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-23409",
            "severity": [
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-23410",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "high",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-23411",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "high",
                    "type": "Ubuntu"
                }
            ]
        }
    ]
}