[USN-8205-1] GStreamer Bad Plugins vulnerabilities
[USN-8180-5] Linux kernel (IBM) vulnerabilities
[USN-8205-1] GStreamer Bad Plugins vulnerabilities
==========================================================================
Ubuntu Security Notice USN-8205-1
April 23, 2026
gst-plugins-bad1.0 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in GStreamer Bad Plugins.
Software Description:
- gst-plugins-bad1.0: GStreamer plugins
Details:
It was discovered that multiple plugins in GStreamer contained arithmetic
overflows. An attacker could possibly use this issue to cause applications
using the plugins to crash, resulting in a denial of service, or possibly
execute arbitrary code. (CVE-2023-37329, CVE-2023-40474, CVE-2023-40475,
CVE-2023-40476)
It was discovered that the MXF demuxer plugin in GStreamer did not
properly manage memory. An attacker could possibly use this issue to cause
applications using the plugin to crash, resulting in a denial of service,
or possibly execute arbitrary code. (CVE-2023-44446)
It was discovered that the H265 codec plugin in GStreamer could be made
to write out of bounds. An attacker could possibly use this issue to
cause applications using the plugin to crash, resulting in a denial of
service, or possibly execute arbitrary code. (CVE-2025-3887)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 LTS
gstreamer1.0-plugins-bad 1.14.5-0ubuntu1~18.04.1+esm1
Available with Ubuntu Pro
libgstreamer-plugins-bad1.0-0 1.14.5-0ubuntu1~18.04.1+esm1
Available with Ubuntu Pro
Ubuntu 16.04 LTS
gstreamer1.0-plugins-bad 1.8.3-1ubuntu0.2+esm1
Available with Ubuntu Pro
libgstreamer-plugins-bad1.0-0 1.8.3-1ubuntu0.2+esm1
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-8205-1
CVE-2023-37329, CVE-2023-40474, CVE-2023-40475, CVE-2023-40476,
CVE-2023-44446, CVE-2025-3887
[USN-8180-5] Linux kernel (IBM) vulnerabilities
==========================================================================
Ubuntu Security Notice USN-8180-5
April 24, 2026
linux-ibm, linux-ibm-5.15 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-ibm: Linux kernel for IBM cloud systems
- linux-ibm-5.15: Linux kernel for IBM cloud systems
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
- Block layer subsystem;
- Drivers core;
- Bluetooth drivers;
- DMA engine subsystem;
- GPU drivers;
- HID subsystem;
- Intel Trace Hub HW tracing drivers;
- IIO ADC drivers;
- IRQ chip drivers;
- Modular ISDN driver;
- LED subsystem;
- UACCE accelerator framework;
- Ethernet bonding driver;
- Network drivers;
- STMicroelectronics network drivers;
- Ethernet team driver;
- NVME drivers;
- PHY drivers;
- SLIMbus drivers;
- W1 Dallas's 1-wire bus driver;
- Xen hypervisor drivers;
- BTRFS file system;
- Ext4 file system;
- Network file system (NFS) client;
- Network file system (NFS) server daemon;
- NTFS3 file system;
- SMB network file system;
- NFC subsystem;
- BPF subsystem;
- IRQ subsystem;
- Memory management;
- Bluetooth subsystem;
- CAN network layer;
- Networking core;
- IPv4 networking;
- IPv6 networking;
- L2TP protocol;
- NET/ROM layer;
- Network traffic control;
- SCTP protocol;
- TLS protocol;
- XFRM subsystem;
- Creative Sound Blaster X-Fi driver;
- USB sound devices;
(CVE-2023-53421, CVE-2023-53520, CVE-2023-53662, CVE-2023-54207,
CVE-2025-38057, CVE-2025-38125, CVE-2025-38232, CVE-2025-38408,
CVE-2025-38591, CVE-2025-40149, CVE-2025-40164, CVE-2025-68211,
CVE-2025-68340, CVE-2025-68365, CVE-2025-68725, CVE-2025-68817,
CVE-2025-71162, CVE-2025-71163, CVE-2025-71185, CVE-2025-71186,
CVE-2025-71188, CVE-2025-71190, CVE-2025-71191, CVE-2025-71194,
CVE-2025-71196, CVE-2025-71197, CVE-2025-71199, CVE-2026-22997,
CVE-2026-22998, CVE-2026-22999, CVE-2026-23001, CVE-2026-23003,
CVE-2026-23011, CVE-2026-23026, CVE-2026-23033, CVE-2026-23037,
CVE-2026-23038, CVE-2026-23049, CVE-2026-23056, CVE-2026-23058,
CVE-2026-23061, CVE-2026-23063, CVE-2026-23064, CVE-2026-23071,
CVE-2026-23073, CVE-2026-23075, CVE-2026-23076, CVE-2026-23078,
CVE-2026-23080, CVE-2026-23083, CVE-2026-23084, CVE-2026-23085,
CVE-2026-23087, CVE-2026-23089, CVE-2026-23090, CVE-2026-23091,
CVE-2026-23093, CVE-2026-23095, CVE-2026-23096, CVE-2026-23097,
CVE-2026-23098, CVE-2026-23099, CVE-2026-23101, CVE-2026-23103,
CVE-2026-23105, CVE-2026-23108, CVE-2026-23119, CVE-2026-23120,
CVE-2026-23121, CVE-2026-23124, CVE-2026-23125, CVE-2026-23128,
CVE-2026-23133, CVE-2026-23145, CVE-2026-23146, CVE-2026-23150,
CVE-2026-23164, CVE-2026-23167, CVE-2026-23170, CVE-2026-23209)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS
linux-image-5.15.0-1099-ibm 5.15.0-1099.102
linux-image-ibm 5.15.0.1099.95
linux-image-ibm-5.15 5.15.0.1099.95
Ubuntu 20.04 LTS
linux-image-5.15.0-1099-ibm 5.15.0-1099.102~20.04.1
Available with Ubuntu Pro
linux-image-ibm 5.15.0.1099.102~20.04.1
Available with Ubuntu Pro
linux-image-ibm-5.15 5.15.0.1099.102~20.04.1
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-8180-5
https://ubuntu.com/security/notices/USN-8180-4
https://ubuntu.com/security/notices/USN-8180-3
https://ubuntu.com/security/notices/USN-8180-2
https://ubuntu.com/security/notices/USN-8180-1
CVE-2023-53421, CVE-2023-53520, CVE-2023-53662, CVE-2023-54207,
CVE-2025-38057, CVE-2025-38125, CVE-2025-38232, CVE-2025-38408,
CVE-2025-38591, CVE-2025-40149, CVE-2025-40164, CVE-2025-68211,
CVE-2025-68340, CVE-2025-68365, CVE-2025-68725, CVE-2025-68817,
CVE-2025-71162, CVE-2025-71163, CVE-2025-71185, CVE-2025-71186,
CVE-2025-71188, CVE-2025-71190, CVE-2025-71191, CVE-2025-71194,
CVE-2025-71196, CVE-2025-71197, CVE-2025-71199, CVE-2026-22997,
CVE-2026-22998, CVE-2026-22999, CVE-2026-23001, CVE-2026-23003,
CVE-2026-23011, CVE-2026-23026, CVE-2026-23033, CVE-2026-23037,
CVE-2026-23038, CVE-2026-23049, CVE-2026-23056, CVE-2026-23058,
CVE-2026-23061, CVE-2026-23063, CVE-2026-23064, CVE-2026-23071,
CVE-2026-23073, CVE-2026-23075, CVE-2026-23076, CVE-2026-23078,
CVE-2026-23080, CVE-2026-23083, CVE-2026-23084, CVE-2026-23085,
CVE-2026-23087, CVE-2026-23089, CVE-2026-23090, CVE-2026-23091,
CVE-2026-23093, CVE-2026-23095, CVE-2026-23096, CVE-2026-23097,
CVE-2026-23098, CVE-2026-23099, CVE-2026-23101, CVE-2026-23103,
CVE-2026-23105, CVE-2026-23108, CVE-2026-23119, CVE-2026-23120,
CVE-2026-23121, CVE-2026-23124, CVE-2026-23125, CVE-2026-23128,
CVE-2026-23133, CVE-2026-23145, CVE-2026-23146, CVE-2026-23150,
CVE-2026-23164, CVE-2026-23167, CVE-2026-23170, CVE-2026-23209
Package Information:
https://launchpad.net/ubuntu/+source/linux-ibm/5.15.0-1099.102