{"id":"USN-8148-2","summary":"linux-fips, linux-aws-fips, linux-gcp-fips vulnerabilities","details":"Several security issues were discovered in the Linux kernel.\nAn attacker could possibly use these to compromise the system.\nThis update corrects flaws in the following subsystems:\n  - Cryptographic API;\n  - Netfilter;\n  - Network traffic control;\n(CVE-2026-23060, CVE-2026-23074, CVE-2026-23111)\n","modified":"2026-04-07T12:14:23.080189466Z","published":"2026-04-02T20:45:55Z","related":["UBUNTU-CVE-2026-23060","UBUNTU-CVE-2026-23074","UBUNTU-CVE-2026-23111"],"upstream":["CVE-2026-23060","CVE-2026-23074","CVE-2026-23111","UBUNTU-CVE-2026-23060","UBUNTU-CVE-2026-23074","UBUNTU-CVE-2026-23111"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-8148-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-23060"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-23074"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-23111"}],"affected":[{"package":{"name":"linux-aws-fips","ecosystem":"Ubuntu:Pro:FIPS-updates:24.04:LTS","purl":"pkg:deb/ubuntu/linux-aws-fips@6.8.0-1051.54+fips1?arch=source&distro=fips-updates/noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.8.0-1051.54+fips1"}]}],"versions":["6.8.0-1035.37+fips1","6.8.0-1036.38+fips1","6.8.0-1038.40+fips1","6.8.0-1039.41+fips1","6.8.0-1040.42+fips1","6.8.0-1041.43+fips1","6.8.0-1042.44+fips1","6.8.0-1043.45+fips1","6.8.0-1044.46+fips1","6.8.0-1045.47+fips1","6.8.0-1046.49+fips1","6.8.0-1047.50+fips1","6.8.0-1050.53+fips1"],"ecosystem_specific":{"binaries":[{"binary_name":"linux-aws-fips-cloud-tools-6.8.0-1051","binary_version":"6.8.0-1051.54+fips1"},{"binary_name":"linux-aws-fips-headers-6.8.0-1051","binary_version":"6.8.0-1051.54+fips1"},{"binary_name":"linux-aws-fips-tools-6.8.0-1051","binary_version":"6.8.0-1051.54+fips1"},{"binary_name":"linux-buildinfo-6.8.0-1051-aws-fips","binary_version":"6.8.0-1051.54+fips1"},{"binary_name":"linux-cloud-tools-6.8.0-1051-aws-fips","binary_version":"6.8.0-1051.54+fips1"},{"binary_name":"linux-headers-6.8.0-1051-aws-fips","binary_version":"6.8.0-1051.54+fips1"},{"binary_name":"linux-image-unsigned-6.8.0-1051-aws-fips","binary_version":"6.8.0-1051.54+fips1"},{"binary_name":"linux-image-unsigned-hmac-6.8.0-1051-aws-fips","binary_version":"6.8.0-1051.54+fips1"},{"binary_name":"linux-modules-6.8.0-1051-aws-fips","binary_version":"6.8.0-1051.54+fips1"},{"binary_name":"linux-modules-extra-6.8.0-1051-aws-fips","binary_version":"6.8.0-1051.54+fips1"},{"binary_name":"linux-tools-6.8.0-1051-aws-fips","binary_version":"6.8.0-1051.54+fips1"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8148-2.json","cves_map":{"ecosystem":"Ubuntu:Pro:FIPS-updates:24.04:LTS","cves":[{"id":"CVE-2026-23060","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2026-23074","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2026-23111","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]}]}}},{"package":{"name":"linux-fips","ecosystem":"Ubuntu:Pro:FIPS-updates:24.04:LTS","purl":"pkg:deb/ubuntu/linux-fips@6.8.0-107.107+fips1?arch=source&distro=fips-updates/noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.8.0-107.107+fips1"}]}],"versions":["6.8.0-38.38+fips4","6.8.0-78.78+fips1","6.8.0-79.79+fips1","6.8.0-83.83+fips1","6.8.0-84.84+fips1","6.8.0-85.85+fips1","6.8.0-86.87+fips1","6.8.0-87.88+fips1","6.8.0-88.89+fips1","6.8.0-90.91+fips1","6.8.0-94.96+fips1","6.8.0-100.100+fips1","6.8.0-101.101+fips1","6.8.0-106.106+fips1"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro","binaries":[{"binary_name":"linux-buildinfo-6.8.0-107-fips","binary_version":"6.8.0-107.107+fips1"},{"binary_name":"linux-cloud-tools-6.8.0-107-fips","binary_version":"6.8.0-107.107+fips1"},{"binary_name":"linux-fips-cloud-tools-6.8.0-107","binary_version":"6.8.0-107.107+fips1"},{"binary_name":"linux-fips-headers-6.8.0-107","binary_version":"6.8.0-107.107+fips1"},{"binary_name":"linux-fips-lib-rust-6.8.0-107-fips","binary_version":"6.8.0-107.107+fips1"},{"binary_name":"linux-fips-tools-6.8.0-107","binary_version":"6.8.0-107.107+fips1"},{"binary_name":"linux-headers-6.8.0-107-fips","binary_version":"6.8.0-107.107+fips1"},{"binary_name":"linux-image-6.8.0-107-fips","binary_version":"6.8.0-107.107+fips1"},{"binary_name":"linux-image-hmac-6.8.0-107-fips","binary_version":"6.8.0-107.107+fips1"},{"binary_name":"linux-image-unsigned-6.8.0-107-fips","binary_version":"6.8.0-107.107+fips1"},{"binary_name":"linux-image-unsigned-hmac-6.8.0-107-fips","binary_version":"6.8.0-107.107+fips1"},{"binary_name":"linux-modules-6.8.0-107-fips","binary_version":"6.8.0-107.107+fips1"},{"binary_name":"linux-modules-extra-6.8.0-107-fips","binary_version":"6.8.0-107.107+fips1"},{"binary_name":"linux-modules-ipu6-6.8.0-107-fips","binary_version":"6.8.0-107.107+fips1"},{"binary_name":"linux-modules-iwlwifi-6.8.0-107-fips","binary_version":"6.8.0-107.107+fips1"},{"binary_name":"linux-modules-usbio-6.8.0-107-fips","binary_version":"6.8.0-107.107+fips1"},{"binary_name":"linux-tools-6.8.0-107-fips","binary_version":"6.8.0-107.107+fips1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8148-2.json","cves_map":{"ecosystem":"Ubuntu:Pro:FIPS-updates:24.04:LTS","cves":[{"id":"CVE-2026-23060","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2026-23074","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2026-23111","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]}]}}},{"package":{"name":"linux-gcp-fips","ecosystem":"Ubuntu:Pro:FIPS-updates:24.04:LTS","purl":"pkg:deb/ubuntu/linux-gcp-fips@6.8.0-1053.56+fips1?arch=source&distro=fips-updates/noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.8.0-1053.56+fips1"}]}],"versions":["6.8.0-1036.38+fips1","6.8.0-1037.39+fips1","6.8.0-1039.41+fips1","6.8.0-1040.42+fips1","6.8.0-1041.43+fips1","6.8.0-1042.45+fips1","6.8.0-1043.46+fips1","6.8.0-1044.47+fips1","6.8.0-1045.48+fips1","6.8.0-1046.49+fips1","6.8.0-1047.50+fips1","6.8.0-1048.51+fips1","6.8.0-1052.55+fips1"],"ecosystem_specific":{"binaries":[{"binary_name":"linux-buildinfo-6.8.0-1053-gcp-fips","binary_version":"6.8.0-1053.56+fips1"},{"binary_name":"linux-gcp-fips-headers-6.8.0-1053","binary_version":"6.8.0-1053.56+fips1"},{"binary_name":"linux-gcp-fips-tools-6.8.0-1053","binary_version":"6.8.0-1053.56+fips1"},{"binary_name":"linux-headers-6.8.0-1053-gcp-fips","binary_version":"6.8.0-1053.56+fips1"},{"binary_name":"linux-image-unsigned-6.8.0-1053-gcp-fips","binary_version":"6.8.0-1053.56+fips1"},{"binary_name":"linux-image-unsigned-hmac-6.8.0-1053-gcp-fips","binary_version":"6.8.0-1053.56+fips1"},{"binary_name":"linux-modules-6.8.0-1053-gcp-fips","binary_version":"6.8.0-1053.56+fips1"},{"binary_name":"linux-modules-extra-6.8.0-1053-gcp-fips","binary_version":"6.8.0-1053.56+fips1"},{"binary_name":"linux-tools-6.8.0-1053-gcp-fips","binary_version":"6.8.0-1053.56+fips1"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8148-2.json","cves_map":{"ecosystem":"Ubuntu:Pro:FIPS-updates:24.04:LTS","cves":[{"id":"CVE-2026-23060","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2026-23074","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2026-23111","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]}]}}}],"schema_version":"1.7.5"}