========================================================================== Ubuntu Security Notice USN-8180-1 April 16, 2026 linux, linux-aws, linux-aws-5.15, linux-gcp, linux-gke, linux-gkeop, linux-lowlatency, linux-lowlatency-hwe-5.15, linux-nvidia, linux-oracle vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems - linux-gke: Linux kernel for Google Container Engine (GKE) systems - linux-gkeop: Linux kernel for Google Container Engine (GKE) systems - linux-lowlatency: Linux low latency kernel - linux-nvidia: Linux kernel for NVIDIA systems - linux-oracle: Linux kernel for Oracle Cloud systems - linux-aws-5.15: Linux kernel for Amazon Web Services (AWS) systems - linux-lowlatency-hwe-5.15: Linux low latency kernel Details: Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - Block layer subsystem; - Drivers core; - Bluetooth drivers; - DMA engine subsystem; - GPU drivers; - HID subsystem; - Intel Trace Hub HW tracing drivers; - IIO ADC drivers; - IRQ chip drivers; - Modular ISDN driver; - LED subsystem; - UACCE accelerator framework; - Ethernet bonding driver; - Network drivers; - STMicroelectronics network drivers; - Ethernet team driver; - NVME drivers; - PHY drivers; - SLIMbus drivers; - W1 Dallas's 1-wire bus driver; - Xen hypervisor drivers; - BTRFS file system; - Ext4 file system; - Network file system (NFS) client; - Network file system (NFS) server daemon; - NTFS3 file system; - SMB network file system; - NFC subsystem; - BPF subsystem; - IRQ subsystem; - Memory management; - Bluetooth subsystem; - CAN network layer; - Networking core; - IPv4 networking; - IPv6 networking; - L2TP protocol; - NET/ROM layer; - Network traffic control; - SCTP protocol; - TLS protocol; - XFRM subsystem; - Creative Sound Blaster X-Fi driver; - USB sound devices; (CVE-2023-53421, CVE-2023-53520, CVE-2023-53662, CVE-2023-54207, CVE-2025-38057, CVE-2025-38125, CVE-2025-38232, CVE-2025-38408, CVE-2025-38591, CVE-2025-40149, CVE-2025-40164, CVE-2025-68211, CVE-2025-68340, CVE-2025-68365, CVE-2025-68725, CVE-2025-68817, CVE-2025-71162, CVE-2025-71163, CVE-2025-71185, CVE-2025-71186, CVE-2025-71188, CVE-2025-71190, CVE-2025-71191, CVE-2025-71194, CVE-2025-71196, CVE-2025-71197, CVE-2025-71199, CVE-2026-22997, CVE-2026-22998, CVE-2026-22999, CVE-2026-23001, CVE-2026-23003, CVE-2026-23011, CVE-2026-23026, CVE-2026-23033, CVE-2026-23037, CVE-2026-23038, CVE-2026-23049, CVE-2026-23056, CVE-2026-23058, CVE-2026-23061, CVE-2026-23063, CVE-2026-23064, CVE-2026-23071, CVE-2026-23073, CVE-2026-23075, CVE-2026-23076, CVE-2026-23078, CVE-2026-23080, CVE-2026-23083, CVE-2026-23084, CVE-2026-23085, CVE-2026-23087, CVE-2026-23089, CVE-2026-23090, CVE-2026-23091, CVE-2026-23093, CVE-2026-23095, CVE-2026-23096, CVE-2026-23097, CVE-2026-23098, CVE-2026-23099, CVE-2026-23101, CVE-2026-23103, CVE-2026-23105, CVE-2026-23108, CVE-2026-23119, CVE-2026-23120, CVE-2026-23121, CVE-2026-23124, CVE-2026-23125, CVE-2026-23128, CVE-2026-23133, CVE-2026-23145, CVE-2026-23146, CVE-2026-23150, CVE-2026-23164, CVE-2026-23167, CVE-2026-23170, CVE-2026-23209) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 22.04 LTS linux-image-5.15.0-1088-gkeop 5.15.0-1088.96 linux-image-5.15.0-1100-nvidia 5.15.0-1100.101 linux-image-5.15.0-1100-nvidia-lowlatency 5.15.0-1100.101 linux-image-5.15.0-1101-gke 5.15.0-1101.107 linux-image-5.15.0-1102-oracle 5.15.0-1102.108 linux-image-5.15.0-1105-aws 5.15.0-1105.112 linux-image-5.15.0-1105-aws-64k 5.15.0-1105.112 linux-image-5.15.0-1105-gcp 5.15.0-1105.114 linux-image-5.15.0-175-lowlatency 5.15.0-175.185 linux-image-5.15.0-175-lowlatency-64k 5.15.0-175.185 linux-image-5.15.0-176-generic 5.15.0-176.186 linux-image-5.15.0-176-generic-64k 5.15.0-176.186 linux-image-5.15.0-176-generic-lpae 5.15.0-176.186 linux-image-aws-5.15 5.15.0.1105.108 linux-image-aws-64k-5.15 5.15.0.1105.108 linux-image-aws-64k-lts-22.04 5.15.0.1105.108 linux-image-aws-lts-22.04 5.15.0.1105.108 linux-image-gcp-5.15 5.15.0.1105.101 linux-image-gcp-lts-22.04 5.15.0.1105.101 linux-image-generic 5.15.0.176.161 linux-image-generic-5.15 5.15.0.176.161 linux-image-generic-64k 5.15.0.176.161 linux-image-generic-64k-5.15 5.15.0.176.161 linux-image-generic-lpae 5.15.0.176.161 linux-image-generic-lpae-5.15 5.15.0.176.161 linux-image-gke 5.15.0.1101.100 linux-image-gke-5.15 5.15.0.1101.100 linux-image-gkeop 5.15.0.1088.87 linux-image-gkeop-5.15 5.15.0.1088.87 linux-image-lowlatency 5.15.0.175.148 linux-image-lowlatency-5.15 5.15.0.175.148 linux-image-lowlatency-64k 5.15.0.175.148 linux-image-lowlatency-64k-5.15 5.15.0.175.148 linux-image-nvidia 5.15.0.1100.100 linux-image-nvidia-5.15 5.15.0.1100.100 linux-image-nvidia-lowlatency 5.15.0.1100.100 linux-image-nvidia-lowlatency-5.15 5.15.0.1100.100 linux-image-oracle-5.15 5.15.0.1102.98 linux-image-oracle-lts-22.04 5.15.0.1102.98 linux-image-virtual 5.15.0.176.161 linux-image-virtual-5.15 5.15.0.176.161 Ubuntu 20.04 LTS linux-image-5.15.0-1105-aws 5.15.0-1105.112~20.04.1 Available with Ubuntu Pro linux-image-5.15.0-175-lowlatency 5.15.0-175.185~20.04.1 Available with Ubuntu Pro linux-image-5.15.0-175-lowlatency-64k 5.15.0-175.185~20.04.1 Available with Ubuntu Pro linux-image-aws 5.15.0.1105.112~20.04.1 Available with Ubuntu Pro linux-image-aws-5.15 5.15.0.1105.112~20.04.1 Available with Ubuntu Pro linux-image-lowlatency-5.15 5.15.0.175.185~20.04.1 Available with Ubuntu Pro linux-image-lowlatency-64k-5.15 5.15.0.175.185~20.04.1 Available with Ubuntu Pro linux-image-lowlatency-64k-hwe-20.04 5.15.0.175.185~20.04.1 Available with Ubuntu Pro linux-image-lowlatency-hwe-20.04 5.15.0.175.185~20.04.1 Available with Ubuntu Pro After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-8180-1 CVE-2023-53421, CVE-2023-53520, CVE-2023-53662, CVE-2023-54207, CVE-2025-38057, CVE-2025-38125, CVE-2025-38232, CVE-2025-38408, CVE-2025-38591, CVE-2025-40149, CVE-2025-40164, CVE-2025-68211, CVE-2025-68340, CVE-2025-68365, CVE-2025-68725, CVE-2025-68817, CVE-2025-71162, CVE-2025-71163, CVE-2025-71185, CVE-2025-71186, CVE-2025-71188, CVE-2025-71190, CVE-2025-71191, CVE-2025-71194, CVE-2025-71196, CVE-2025-71197, CVE-2025-71199, CVE-2026-22997, CVE-2026-22998, CVE-2026-22999, CVE-2026-23001, CVE-2026-23003, CVE-2026-23011, CVE-2026-23026, CVE-2026-23033, CVE-2026-23037, CVE-2026-23038, CVE-2026-23049, CVE-2026-23056, CVE-2026-23058, CVE-2026-23061, CVE-2026-23063, CVE-2026-23064, CVE-2026-23071, CVE-2026-23073, CVE-2026-23075, CVE-2026-23076, CVE-2026-23078, CVE-2026-23080, CVE-2026-23083, CVE-2026-23084, CVE-2026-23085, CVE-2026-23087, CVE-2026-23089, CVE-2026-23090, CVE-2026-23091, CVE-2026-23093, CVE-2026-23095, CVE-2026-23096, CVE-2026-23097, CVE-2026-23098, CVE-2026-23099, CVE-2026-23101, CVE-2026-23103, CVE-2026-23105, CVE-2026-23108, CVE-2026-23119, CVE-2026-23120, CVE-2026-23121, CVE-2026-23124, CVE-2026-23125, CVE-2026-23128, CVE-2026-23133, CVE-2026-23145, CVE-2026-23146, CVE-2026-23150, CVE-2026-23164, CVE-2026-23167, CVE-2026-23170, CVE-2026-23209 Package Information: https://launchpad.net/ubuntu/+source/linux/5.15.0-176.186 https://launchpad.net/ubuntu/+source/linux-aws/5.15.0-1105.112 https://launchpad.net/ubuntu/+source/linux-gcp/5.15.0-1105.114 https://launchpad.net/ubuntu/+source/linux-gke/5.15.0-1101.107 https://launchpad.net/ubuntu/+source/linux-gkeop/5.15.0-1088.96 https://launchpad.net/ubuntu/+source/linux-lowlatency/5.15.0-175.185 https://launchpad.net/ubuntu/+source/linux-nvidia/5.15.0-1100.101 https://launchpad.net/ubuntu/+source/linux-oracle/5.15.0-1102.108
No comments:
Post a Comment