{"id":"USN-8159-3","summary":"linux-realtime vulnerabilities","details":"Several security issues were discovered in the Linux kernel.\nAn attacker could possibly use these to compromise the system.\nThis update corrects flaws in the following subsystems:\n  - ARM64 architecture;\n  - Cryptographic API;\n  - Netfilter;\n  - Network traffic control;\n(CVE-2025-37849, CVE-2026-23060, CVE-2026-23074, CVE-2026-23111)\n","modified":"2026-04-13T12:59:21.471938188Z","published":"2026-04-08T23:42:39Z","related":["UBUNTU-CVE-2025-37849","UBUNTU-CVE-2026-23060","UBUNTU-CVE-2026-23074","UBUNTU-CVE-2026-23111"],"upstream":["CVE-2025-37849","CVE-2026-23060","CVE-2026-23074","CVE-2026-23111","UBUNTU-CVE-2025-37849","UBUNTU-CVE-2026-23060","UBUNTU-CVE-2026-23074","UBUNTU-CVE-2026-23111"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-8159-3"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-37849"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-23060"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-23074"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-23111"}],"affected":[{"package":{"name":"linux-realtime","ecosystem":"Ubuntu:Pro:Realtime:22.04:LTS","purl":"pkg:deb/ubuntu/linux-realtime@5.15.0-1103.112?arch=source&distro=realtime/jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.15.0-1103.112"}]}],"versions":["5.15.0-1006.6","5.15.0-1007.7","5.15.0-1009.9","5.15.0-1011.11","5.15.0-1014.14","5.15.0-1015.15","5.15.0-1016.16","5.15.0-1019.19","5.15.0-1020.20","5.15.0-1021.21","5.15.0-1022.22","5.15.0-1024.25","5.15.0-1025.28","5.15.0-1028.31","5.15.0-1029.32","5.15.0-1030.33","5.15.0-1032.35","5.15.0-1033.36","5.15.0-1034.37","5.15.0-1036.39","5.15.0-1037.40","5.15.0-1038.41","5.15.0-1039.42","5.15.0-1040.45","5.15.0-1041.46","5.15.0-1042.47","5.15.0-1043.48","5.15.0-1044.49","5.15.0-1045.50","5.15.0-1046.52","5.15.0-1048.54","5.15.0-1049.55","5.15.0-1050.56","5.15.0-1051.57","5.15.0-1052.58","5.15.0-1053.59","5.15.0-1054.60","5.15.0-1055.62","5.15.0-1056.63","5.15.0-1057.64","5.15.0-1058.66","5.15.0-1061.69","5.15.0-1062.70","5.15.0-1063.71","5.15.0-1064.72","5.15.0-1065.73","5.15.0-1066.74","5.15.0-1067.75","5.15.0-1068.76","5.15.0-1069.77","5.15.0-1070.78","5.15.0-1071.79","5.15.0-1072.80","5.15.0-1073.81","5.15.0-1074.82","5.15.0-1075.83","5.15.0-1076.84","5.15.0-1077.85","5.15.0-1078.86","5.15.0-1079.87","5.15.0-1080.88","5.15.0-1081.89","5.15.0-1082.91","5.15.0-1083.92","5.15.0-1084.93","5.15.0-1085.94","5.15.0-1086.95","5.15.0-1087.96","5.15.0-1088.97","5.15.0-1089.98","5.15.0-1090.99","5.15.0-1091.100","5.15.0-1092.101","5.15.0-1093.102","5.15.0-1094.103","5.15.0-1095.104","5.15.0-1096.105","5.15.0-1097.106","5.15.0-1098.107","5.15.0-1099.108","5.15.0-1100.109","5.15.0-1102.111"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro","binaries":[{"binary_name":"linux-buildinfo-5.15.0-1103-realtime","binary_version":"5.15.0-1103.112"},{"binary_name":"linux-cloud-tools-5.15.0-1103-realtime","binary_version":"5.15.0-1103.112"},{"binary_name":"linux-headers-5.15.0-1103-realtime","binary_version":"5.15.0-1103.112"},{"binary_name":"linux-image-unsigned-5.15.0-1103-realtime","binary_version":"5.15.0-1103.112"},{"binary_name":"linux-modules-5.15.0-1103-realtime","binary_version":"5.15.0-1103.112"},{"binary_name":"linux-modules-extra-5.15.0-1103-realtime","binary_version":"5.15.0-1103.112"},{"binary_name":"linux-modules-iwlwifi-5.15.0-1103-realtime","binary_version":"5.15.0-1103.112"},{"binary_name":"linux-realtime-cloud-tools-5.15.0-1103","binary_version":"5.15.0-1103.112"},{"binary_name":"linux-realtime-cloud-tools-common","binary_version":"5.15.0-1103.112"},{"binary_name":"linux-realtime-headers-5.15.0-1103","binary_version":"5.15.0-1103.112"},{"binary_name":"linux-realtime-tools-5.15.0-1103","binary_version":"5.15.0-1103.112"},{"binary_name":"linux-realtime-tools-common","binary_version":"5.15.0-1103.112"},{"binary_name":"linux-realtime-tools-host","binary_version":"5.15.0-1103.112"},{"binary_name":"linux-tools-5.15.0-1103-realtime","binary_version":"5.15.0-1103.112"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8159-3.json","cves_map":{"cves":[{"id":"CVE-2025-37849","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2026-23060","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2026-23074","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2026-23111","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:Pro:Realtime:22.04:LTS"}}}],"schema_version":"1.7.5"}