Home / mailings [USN-8180-1] Linux kernel vulnerabilities
Posted on 16 April 2026
Ubuntu Security==========================================================================Ubuntu Security Notice USN-8180-1
April 16, 2026
linux, linux-aws, linux-aws-5.15, linux-gcp, linux-gke, linux-gkeop,
linux-lowlatency, linux-lowlatency-hwe-5.15, linux-nvidia, linux-oracle
vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-gke: Linux kernel for Google Container Engine (GKE) systems
- linux-gkeop: Linux kernel for Google Container Engine (GKE) systems
- linux-lowlatency: Linux low latency kernel
- linux-nvidia: Linux kernel for NVIDIA systems
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-aws-5.15: Linux kernel for Amazon Web Services (AWS) systems
- linux-lowlatency-hwe-5.15: Linux low latency kernel
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
- Block layer subsystem;
- Drivers core;
- Bluetooth drivers;
- DMA engine subsystem;
- GPU drivers;
- HID subsystem;
- Intel Trace Hub HW tracing drivers;
- IIO ADC drivers;
- IRQ chip drivers;
- Modular ISDN driver;
- LED subsystem;
- UACCE accelerator framework;
- Ethernet bonding driver;
- Network drivers;
- STMicroelectronics network drivers;
- Ethernet team driver;
- NVME drivers;
- PHY drivers;
- SLIMbus drivers;
- W1 Dallas's 1-wire bus driver;
- Xen hypervisor drivers;
- BTRFS file system;
- Ext4 file system;
- Network file system (NFS) client;
- Network file system (NFS) server daemon;
- NTFS3 file system;
- SMB network file system;
- NFC subsystem;
- BPF subsystem;
- IRQ subsystem;
- Memory management;
- Bluetooth subsystem;
- CAN network layer;
- Networking core;
- IPv4 networking;
- IPv6 networking;
- L2TP protocol;
- NET/ROM layer;
- Network traffic control;
- SCTP protocol;
- TLS protocol;
- XFRM subsystem;
- Creative Sound Blaster X-Fi driver;
- USB sound devices;
(CVE-2023-53421, CVE-2023-53520, CVE-2023-53662, CVE-2023-54207,
CVE-2025-38057, CVE-2025-38125, CVE-2025-38232, CVE-2025-38408,
CVE-2025-38591, CVE-2025-40149, CVE-2025-40164, CVE-2025-68211,
CVE-2025-68340, CVE-2025-68365, CVE-2025-68725, CVE-2025-68817,
CVE-2025-71162, CVE-2025-71163, CVE-2025-71185, CVE-2025-71186,
CVE-2025-71188, CVE-2025-71190, CVE-2025-71191, CVE-2025-71194,
CVE-2025-71196, CVE-2025-71197, CVE-2025-71199, CVE-2026-22997,
CVE-2026-22998, CVE-2026-22999, CVE-2026-23001, CVE-2026-23003,
CVE-2026-23011, CVE-2026-23026, CVE-2026-23033, CVE-2026-23037,
CVE-2026-23038, CVE-2026-23049, CVE-2026-23056, CVE-2026-23058,
CVE-2026-23061, CVE-2026-23063, CVE-2026-23064, CVE-2026-23071,
CVE-2026-23073, CVE-2026-23075, CVE-2026-23076, CVE-2026-23078,
CVE-2026-23080, CVE-2026-23083, CVE-2026-23084, CVE-2026-23085,
CVE-2026-23087, CVE-2026-23089, CVE-2026-23090, CVE-2026-23091,
CVE-2026-23093, CVE-2026-23095, CVE-2026-23096, CVE-2026-23097,
CVE-2026-23098, CVE-2026-23099, CVE-2026-23101, CVE-2026-23103,
CVE-2026-23105, CVE-2026-23108, CVE-2026-23119, CVE-2026-23120,
CVE-2026-23121, CVE-2026-23124, CVE-2026-23125, CVE-2026-23128,
CVE-2026-23133, CVE-2026-23145, CVE-2026-23146, CVE-2026-23150,
CVE-2026-23164, CVE-2026-23167, CVE-2026-23170, CVE-2026-23209)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS
linux-image-5.15.0-1088-gkeop 5.15.0-1088.96
linux-image-5.15.0-1100-nvidia 5.15.0-1100.101
linux-image-5.15.0-1100-nvidia-lowlatency 5.15.0-1100.101
linux-image-5.15.0-1101-gke 5.15.0-1101.107
linux-image-5.15.0-1102-oracle 5.15.0-1102.108
linux-image-5.15.0-1105-aws 5.15.0-1105.112
linux-image-5.15.0-1105-aws-64k 5.15.0-1105.112
linux-image-5.15.0-1105-gcp 5.15.0-1105.114
linux-image-5.15.0-175-lowlatency 5.15.0-175.185
linux-image-5.15.0-175-lowlatency-64k 5.15.0-175.185
linux-image-5.15.0-176-generic 5.15.0-176.186
linux-image-5.15.0-176-generic-64k 5.15.0-176.186
linux-image-5.15.0-176-generic-lpae 5.15.0-176.186
linux-image-aws-5.15 5.15.0.1105.108
linux-image-aws-64k-5.15 5.15.0.1105.108
linux-image-aws-64k-lts-22.04 5.15.0.1105.108
linux-image-aws-lts-22.04 5.15.0.1105.108
linux-image-gcp-5.15 5.15.0.1105.101
linux-image-gcp-lts-22.04 5.15.0.1105.101
linux-image-generic 5.15.0.176.161
linux-image-generic-5.15 5.15.0.176.161
linux-image-generic-64k 5.15.0.176.161
linux-image-generic-64k-5.15 5.15.0.176.161
linux-image-generic-lpae 5.15.0.176.161
linux-image-generic-lpae-5.15 5.15.0.176.161
linux-image-gke 5.15.0.1101.100
linux-image-gke-5.15 5.15.0.1101.100
linux-image-gkeop 5.15.0.1088.87
linux-image-gkeop-5.15 5.15.0.1088.87
linux-image-lowlatency 5.15.0.175.148
linux-image-lowlatency-5.15 5.15.0.175.148
linux-image-lowlatency-64k 5.15.0.175.148
linux-image-lowlatency-64k-5.15 5.15.0.175.148
linux-image-nvidia 5.15.0.1100.100
linux-image-nvidia-5.15 5.15.0.1100.100
linux-image-nvidia-lowlatency 5.15.0.1100.100
linux-image-nvidia-lowlatency-5.15 5.15.0.1100.100
linux-image-oracle-5.15 5.15.0.1102.98
linux-image-oracle-lts-22.04 5.15.0.1102.98
linux-image-virtual 5.15.0.176.161
linux-image-virtual-5.15 5.15.0.176.161
Ubuntu 20.04 LTS
linux-image-5.15.0-1105-aws 5.15.0-1105.112~20.04.1
Available with Ubuntu Pro
linux-image-5.15.0-175-lowlatency 5.15.0-175.185~20.04.1
Available with Ubuntu Pro
linux-image-5.15.0-175-lowlatency-64k 5.15.0-175.185~20.04.1
Available with Ubuntu Pro
linux-image-aws 5.15.0.1105.112~20.04.1
Available with Ubuntu Pro
linux-image-aws-5.15 5.15.0.1105.112~20.04.1
Available with Ubuntu Pro
linux-image-lowlatency-5.15 5.15.0.175.185~20.04.1
Available with Ubuntu Pro
linux-image-lowlatency-64k-5.15 5.15.0.175.185~20.04.1
Available with Ubuntu Pro
linux-image-lowlatency-64k-hwe-20.04 5.15.0.175.185~20.04.1
Available with Ubuntu Pro
linux-image-lowlatency-hwe-20.04 5.15.0.175.185~20.04.1
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-8180-1
CVE-2023-53421, CVE-2023-53520, CVE-2023-53662, CVE-2023-54207,
CVE-2025-38057, CVE-2025-38125, CVE-2025-38232, CVE-2025-38408,
CVE-2025-38591, CVE-2025-40149, CVE-2025-40164, CVE-2025-68211,
CVE-2025-68340, CVE-2025-68365, CVE-2025-68725, CVE-2025-68817,
CVE-2025-71162, CVE-2025-71163, CVE-2025-71185, CVE-2025-71186,
CVE-2025-71188, CVE-2025-71190, CVE-2025-71191, CVE-2025-71194,
CVE-2025-71196, CVE-2025-71197, CVE-2025-71199, CVE-2026-22997,
CVE-2026-22998, CVE-2026-22999, CVE-2026-23001, CVE-2026-23003,
CVE-2026-23011, CVE-2026-23026, CVE-2026-23033, CVE-2026-23037,
CVE-2026-23038, CVE-2026-23049, CVE-2026-23056, CVE-2026-23058,
CVE-2026-23061, CVE-2026-23063, CVE-2026-23064, CVE-2026-23071,
CVE-2026-23073, CVE-2026-23075, CVE-2026-23076, CVE-2026-23078,
CVE-2026-23080, CVE-2026-23083, CVE-2026-23084, CVE-2026-23085,
CVE-2026-23087, CVE-2026-23089, CVE-2026-23090, CVE-2026-23091,
CVE-2026-23093, CVE-2026-23095, CVE-2026-23096, CVE-2026-23097,
CVE-2026-23098, CVE-2026-23099, CVE-2026-23101, CVE-2026-23103,
CVE-2026-23105, CVE-2026-23108, CVE-2026-23119, CVE-2026-23120,
CVE-2026-23121, CVE-2026-23124, CVE-2026-23125, CVE-2026-23128,
CVE-2026-23133, CVE-2026-23145, CVE-2026-23146, CVE-2026-23150,
CVE-2026-23164, CVE-2026-23167, CVE-2026-23170, CVE-2026-23209
Package Information:
https://launchpad.net/ubuntu/+source/linux/5.15.0-176.186
https://launchpad.net/ubuntu/+source/linux-aws/5.15.0-1105.112
https://launchpad.net/ubuntu/+source/linux-gcp/5.15.0-1105.114
https://launchpad.net/ubuntu/+source/linux-gke/5.15.0-1101.107
https://launchpad.net/ubuntu/+source/linux-gkeop/5.15.0-1088.96
https://launchpad.net/ubuntu/+source/linux-lowlatency/5.15.0-175.185
https://launchpad.net/ubuntu/+source/linux-nvidia/5.15.0-1100.101
https://launchpad.net/ubuntu/+source/linux-oracle/5.15.0-1102.108
--=-=-=Content-Type: application/pgp-signature; name="signature.asc"
