Ubuntu 7093 Published by

Ubuntu released a major batch of security updates that address numerous vulnerabilities across the Linux kernel and several supporting packages. The kernel patches target dozens of common vulnerability identifiers affecting everything from standard desktop installations to specialized cloud and embedded hardware builds. Critical flaws include improper permission checks in OverlayFS that could allow local privilege escalation, alongside cryptographic module errors known as Copy Fail that might enable container escapes or unauthorized access.

[USN-8273-1] Linux kernel vulnerabilities
[USN-8275-1] Linux kernel (Xilinx ZynqMP) vulnerabilities
[USN-8255-3] Linux kernel vulnerabilities
[USN-8254-3] Linux kernel (NVIDIA Tegra) vulnerabilities
[USN-8274-1] Linux kernel vulnerabilities
[USN-8280-1] Linux kernel vulnerabilities
[USN-8279-1] Linux kernel vulnerabilities
[USN-8281-1] Linux kernel vulnerabilities
[USN-8277-1] Linux kernel vulnerabilities
[USN-8278-1] Linux kernel vulnerabilities
[USN-8276-1] Highlight.js vulnerability
[USN-8272-1] Smarty vulnerability



[USN-8273-1] Linux kernel vulnerabilities


==========================================================================
Ubuntu Security Notice USN-8273-1
May 19, 2026

linux, linux-aws, linux-aws-5.4, linux-aws-fips, linux-azure,
linux-azure-5.4, linux-azure-fips, linux-bluefield, linux-fips, linux-gcp,
linux-gcp-5.4, linux-gcp-fips, linux-hwe-5.4, linux-ibm, linux-ibm-5.4,
linux-iot, linux-kvm, linux-oracle, linux-oracle-5.4, linux-xilinx-zynqmp
vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-aws-fips: Linux kernel for Amazon Web Services (AWS) systems with FIPS
- linux-azure: Linux kernel for Microsoft Azure Cloud systems
- linux-azure-fips: Linux kernel for Microsoft Azure Cloud systems with FIPS
- linux-bluefield: Linux kernel for NVIDIA BlueField platforms
- linux-fips: Linux kernel with FIPS
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-gcp-fips: Linux kernel for Google Cloud Platform (GCP) systems with FIPS
- linux-ibm: Linux kernel for IBM cloud systems
- linux-iot: Linux kernel for IoT platforms
- linux-kvm: Linux kernel for cloud environments
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-xilinx-zynqmp: Linux kernel for Xilinx ZynqMP processors
- linux-aws-5.4: Linux kernel for Amazon Web Services (AWS) systems
- linux-azure-5.4: Linux kernel for Microsoft Azure cloud systems
- linux-gcp-5.4: Linux kernel for Google Cloud Platform (GCP) systems
- linux-hwe-5.4: Linux hardware enablement (HWE) kernel
- linux-ibm-5.4: Linux kernel for IBM cloud systems
- linux-oracle-5.4: Linux kernel for Oracle Cloud systems

Details:

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Network drivers;
- NVME drivers;
- IPv4 networking;
(CVE-2024-50304, CVE-2026-23112, CVE-2026-23209)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS
linux-image-5.4.0-1062-iot 5.4.0-1062.65
Available with Ubuntu Pro
linux-image-5.4.0-1076-xilinx-zynqmp 5.4.0-1076.80
Available with Ubuntu Pro
linux-image-5.4.0-1104-ibm 5.4.0-1104.109
Available with Ubuntu Pro
linux-image-5.4.0-1117-bluefield 5.4.0-1117.124
Available with Ubuntu Pro
linux-image-5.4.0-1132-fips 5.4.0-1132.142
Available with Ubuntu Pro
linux-image-5.4.0-1145-kvm 5.4.0-1145.154
Available with Ubuntu Pro
linux-image-5.4.0-1156-oracle 5.4.0-1156.166
Available with Ubuntu Pro
linux-image-5.4.0-1158-aws 5.4.0-1158.168
Available with Ubuntu Pro
linux-image-5.4.0-1158-aws-fips 5.4.0-1158.168+fips1
Available with Ubuntu Pro
linux-image-5.4.0-1161-gcp 5.4.0-1161.170
Available with Ubuntu Pro
linux-image-5.4.0-1161-gcp-fips 5.4.0-1161.170+fips1
Available with Ubuntu Pro
linux-image-5.4.0-1162-azure 5.4.0-1162.168
Available with Ubuntu Pro
linux-image-5.4.0-1162-azure-fips 5.4.0-1162.168+fips1
Available with Ubuntu Pro
linux-image-5.4.0-229-generic 5.4.0-229.249
Available with Ubuntu Pro
linux-image-5.4.0-229-generic-lpae 5.4.0-229.249
Available with Ubuntu Pro
linux-image-5.4.0-229-lowlatency 5.4.0-229.249
Available with Ubuntu Pro
linux-image-aws-5.4 5.4.0.1158.155
Available with Ubuntu Pro
linux-image-aws-fips 5.4.0.1158.105
Available with Ubuntu Pro
linux-image-aws-fips-5.4 5.4.0.1158.105
Available with Ubuntu Pro
linux-image-aws-lts-20.04 5.4.0.1158.155
Available with Ubuntu Pro
linux-image-azure-5.4 5.4.0.1162.154
Available with Ubuntu Pro
linux-image-azure-fips 5.4.0.1162.98
Available with Ubuntu Pro
linux-image-azure-fips-5.4 5.4.0.1162.98
Available with Ubuntu Pro
linux-image-azure-lts-20.04 5.4.0.1162.154
Available with Ubuntu Pro
linux-image-bluefield 5.4.0.1117.113
Available with Ubuntu Pro
linux-image-bluefield-5.4 5.4.0.1117.113
Available with Ubuntu Pro
linux-image-fips 5.4.0.1132.129
Available with Ubuntu Pro
linux-image-fips-5.4 5.4.0.1132.129
Available with Ubuntu Pro
linux-image-gcp-5.4 5.4.0.1161.163
Available with Ubuntu Pro
linux-image-gcp-fips 5.4.0.1161.103
Available with Ubuntu Pro
linux-image-gcp-fips-5.4 5.4.0.1161.103
Available with Ubuntu Pro
linux-image-gcp-lts-20.04 5.4.0.1161.163
Available with Ubuntu Pro
linux-image-generic 5.4.0.229.221
Available with Ubuntu Pro
linux-image-generic-5.4 5.4.0.229.221
Available with Ubuntu Pro
linux-image-generic-lpae 5.4.0.229.221
Available with Ubuntu Pro
linux-image-generic-lpae-5.4 5.4.0.229.221
Available with Ubuntu Pro
linux-image-ibm-5.4 5.4.0.1104.133
Available with Ubuntu Pro
linux-image-ibm-lts-20.04 5.4.0.1104.133
Available with Ubuntu Pro
linux-image-kvm 5.4.0.1145.141
Available with Ubuntu Pro
linux-image-kvm-5.4 5.4.0.1145.141
Available with Ubuntu Pro
linux-image-lowlatency 5.4.0.229.221
Available with Ubuntu Pro
linux-image-lowlatency-5.4 5.4.0.229.221
Available with Ubuntu Pro
linux-image-oem 5.4.0.229.221
Available with Ubuntu Pro
linux-image-oem-osp1 5.4.0.229.221
Available with Ubuntu Pro
linux-image-oracle-5.4 5.4.0.1156.150
Available with Ubuntu Pro
linux-image-oracle-lts-20.04 5.4.0.1156.150
Available with Ubuntu Pro
linux-image-virtual 5.4.0.229.221
Available with Ubuntu Pro
linux-image-virtual-5.4 5.4.0.229.221
Available with Ubuntu Pro
linux-image-xilinx-zynqmp 5.4.0.1076.76
Available with Ubuntu Pro
linux-image-xilinx-zynqmp-5.4 5.4.0.1076.76
Available with Ubuntu Pro

Ubuntu 18.04 LTS
linux-image-5.4.0-1104-ibm 5.4.0-1104.109~18.04.1
Available with Ubuntu Pro
linux-image-5.4.0-1156-oracle 5.4.0-1156.166~18.04.2+1
Available with Ubuntu Pro
linux-image-5.4.0-1158-aws 5.4.0-1158.168~18.04.1
Available with Ubuntu Pro
linux-image-5.4.0-1161-gcp 5.4.0-1161.170~18.04.1
Available with Ubuntu Pro
linux-image-5.4.0-1162-azure 5.4.0-1162.168~18.04.1
Available with Ubuntu Pro
linux-image-5.4.0-229-generic 5.4.0-229.249~18.04.1
Available with Ubuntu Pro
linux-image-5.4.0-229-lowlatency 5.4.0-229.249~18.04.1
Available with Ubuntu Pro
linux-image-aws 5.4.0.1158.168~18.04.1
Available with Ubuntu Pro
linux-image-aws-5.4 5.4.0.1158.168~18.04.1
Available with Ubuntu Pro
linux-image-azure 5.4.0.1162.168~18.04.1
Available with Ubuntu Pro
linux-image-azure-5.4 5.4.0.1162.168~18.04.1
Available with Ubuntu Pro
linux-image-gcp 5.4.0.1161.170~18.04.1
Available with Ubuntu Pro
linux-image-gcp-5.4 5.4.0.1161.170~18.04.1
Available with Ubuntu Pro
linux-image-generic-5.4 5.4.0.229.249~18.04.1
Available with Ubuntu Pro
linux-image-generic-hwe-18.04 5.4.0.229.249~18.04.1
Available with Ubuntu Pro
linux-image-ibm 5.4.0.1104.109~18.04.1
Available with Ubuntu Pro
linux-image-ibm-5.4 5.4.0.1104.109~18.04.1
Available with Ubuntu Pro
linux-image-lowlatency-5.4 5.4.0.229.249~18.04.1
Available with Ubuntu Pro
linux-image-lowlatency-hwe-18.04 5.4.0.229.249~18.04.1
Available with Ubuntu Pro
linux-image-oem 5.4.0.229.249~18.04.1
Available with Ubuntu Pro
linux-image-oem-osp1 5.4.0.229.249~18.04.1
Available with Ubuntu Pro
linux-image-oracle 5.4.0.1156.166~18.04.3
Available with Ubuntu Pro
linux-image-oracle-5.4 5.4.0.1156.166~18.04.3
Available with Ubuntu Pro
linux-image-snapdragon-5.4 5.4.0.229.249~18.04.1
Available with Ubuntu Pro
linux-image-snapdragon-hwe-18.04 5.4.0.229.249~18.04.1
Available with Ubuntu Pro
linux-image-virtual-5.4 5.4.0.229.249~18.04.1
Available with Ubuntu Pro
linux-image-virtual-hwe-18.04 5.4.0.229.249~18.04.1
Available with Ubuntu Pro

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-8273-1
CVE-2024-50304, CVE-2026-23112, CVE-2026-23209



[USN-8275-1] Linux kernel (Xilinx ZynqMP) vulnerabilities


==========================================================================
Ubuntu Security Notice USN-8275-1
May 19, 2026

linux-xilinx-zynqmp vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-xilinx-zynqmp: Linux kernel for Xilinx ZynqMP processors

Details:

Stonejiajia, Shir Tamari and Sagi Tzadik discovered that the OverlayFS
implementation in the Ubuntu Linux kernel did not properly perform
permission checks in certain situations. A local attacker could possibly
use this to gain elevated privileges. (CVE-2023-2640)

Shir Tamari and Sagi Tzadik discovered that the OverlayFS implementation in
the Ubuntu Linux kernel did not properly perform permission checks in
certain situations. A local attacker could possibly use this to gain
elevated privileges. (CVE-2023-32629)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
- Block layer subsystem;
- Drivers core;
- Bluetooth drivers;
- DMA engine subsystem;
- GPU drivers;
- HID subsystem;
- Intel Trace Hub HW tracing drivers;
- IIO ADC drivers;
- IRQ chip drivers;
- Modular ISDN driver;
- LED subsystem;
- UACCE accelerator framework;
- Ethernet bonding driver;
- Network drivers;
- STMicroelectronics network drivers;
- Ethernet team driver;
- NVME drivers;
- PHY drivers;
- SLIMbus drivers;
- W1 Dallas's 1-wire bus driver;
- Xen hypervisor drivers;
- BTRFS file system;
- Ext4 file system;
- Network file system (NFS) client;
- Network file system (NFS) server daemon;
- NTFS3 file system;
- SMB network file system;
- NFC subsystem;
- BPF subsystem;
- IRQ subsystem;
- Memory management;
- Bluetooth subsystem;
- CAN network layer;
- Networking core;
- IPv4 networking;
- IPv6 networking;
- L2TP protocol;
- NET/ROM layer;
- Network traffic control;
- SCTP protocol;
- TLS protocol;
- XFRM subsystem;
- Creative Sound Blaster X-Fi driver;
- USB sound devices;
(CVE-2023-53421, CVE-2023-53520, CVE-2023-53662, CVE-2023-54207,
CVE-2025-38057, CVE-2025-38125, CVE-2025-38232, CVE-2025-38408,
CVE-2025-38591, CVE-2025-40149, CVE-2025-40164, CVE-2025-68211,
CVE-2025-68340, CVE-2025-68365, CVE-2025-68725, CVE-2025-68817,
CVE-2025-71162, CVE-2025-71163, CVE-2025-71185, CVE-2025-71186,
CVE-2025-71188, CVE-2025-71190, CVE-2025-71191, CVE-2025-71194,
CVE-2025-71196, CVE-2025-71197, CVE-2025-71199, CVE-2026-22997,
CVE-2026-22998, CVE-2026-22999, CVE-2026-23001, CVE-2026-23003,
CVE-2026-23011, CVE-2026-23026, CVE-2026-23033, CVE-2026-23037,
CVE-2026-23038, CVE-2026-23049, CVE-2026-23056, CVE-2026-23058,
CVE-2026-23061, CVE-2026-23063, CVE-2026-23064, CVE-2026-23071,
CVE-2026-23073, CVE-2026-23075, CVE-2026-23076, CVE-2026-23078,
CVE-2026-23080, CVE-2026-23083, CVE-2026-23084, CVE-2026-23085,
CVE-2026-23087, CVE-2026-23089, CVE-2026-23090, CVE-2026-23091,
CVE-2026-23093, CVE-2026-23095, CVE-2026-23096, CVE-2026-23097,
CVE-2026-23098, CVE-2026-23099, CVE-2026-23101, CVE-2026-23103,
CVE-2026-23105, CVE-2026-23108, CVE-2026-23112, CVE-2026-23119,
CVE-2026-23120, CVE-2026-23121, CVE-2026-23124, CVE-2026-23125,
CVE-2026-23128, CVE-2026-23133, CVE-2026-23145, CVE-2026-23146,
CVE-2026-23150, CVE-2026-23164, CVE-2026-23167, CVE-2026-23170,
CVE-2026-23209, CVE-2026-23273)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS
linux-image-5.15.0-1070-xilinx-zynqmp 5.15.0-1070.74
linux-image-xilinx-zynqmp 5.15.0.1070.73
linux-image-xilinx-zynqmp-5.15 5.15.0.1070.73

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-8275-1
CVE-2023-2640, CVE-2023-32629, CVE-2023-53421, CVE-2023-53520,
CVE-2023-53662, CVE-2023-54207, CVE-2025-38057, CVE-2025-38125,
CVE-2025-38232, CVE-2025-38408, CVE-2025-38591, CVE-2025-40149,
CVE-2025-40164, CVE-2025-68211, CVE-2025-68340, CVE-2025-68365,
CVE-2025-68725, CVE-2025-68817, CVE-2025-71162, CVE-2025-71163,
CVE-2025-71185, CVE-2025-71186, CVE-2025-71188, CVE-2025-71190,
CVE-2025-71191, CVE-2025-71194, CVE-2025-71196, CVE-2025-71197,
CVE-2025-71199, CVE-2026-22997, CVE-2026-22998, CVE-2026-22999,
CVE-2026-23001, CVE-2026-23003, CVE-2026-23011, CVE-2026-23026,
CVE-2026-23033, CVE-2026-23037, CVE-2026-23038, CVE-2026-23049,
CVE-2026-23056, CVE-2026-23058, CVE-2026-23061, CVE-2026-23063,
CVE-2026-23064, CVE-2026-23071, CVE-2026-23073, CVE-2026-23075,
CVE-2026-23076, CVE-2026-23078, CVE-2026-23080, CVE-2026-23083,
CVE-2026-23084, CVE-2026-23085, CVE-2026-23087, CVE-2026-23089,
CVE-2026-23090, CVE-2026-23091, CVE-2026-23093, CVE-2026-23095,
CVE-2026-23096, CVE-2026-23097, CVE-2026-23098, CVE-2026-23099,
CVE-2026-23101, CVE-2026-23103, CVE-2026-23105, CVE-2026-23108,
CVE-2026-23112, CVE-2026-23119, CVE-2026-23120, CVE-2026-23121,
CVE-2026-23124, CVE-2026-23125, CVE-2026-23128, CVE-2026-23133,
CVE-2026-23145, CVE-2026-23146, CVE-2026-23150, CVE-2026-23164,
CVE-2026-23167, CVE-2026-23170, CVE-2026-23209, CVE-2026-23273

Package Information:
https://launchpad.net/ubuntu/+source/linux-xilinx-zynqmp/5.15.0-1070.74



[USN-8255-3] Linux kernel vulnerabilities


==========================================================================
Ubuntu Security Notice USN-8255-3
May 19, 2026

linux-nvidia-tegra-5.15, linux-raspi vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-raspi: Linux kernel for Raspberry Pi systems
- linux-nvidia-tegra-5.15: Linux kernel for NVIDIA Tegra systems

Details:

Stonejiajia, Shir Tamari and Sagi Tzadik discovered that the OverlayFS
implementation in the Ubuntu Linux kernel did not properly perform
permission checks in certain situations. A local attacker could possibly
use this to gain elevated privileges. (CVE-2023-2640)

Shir Tamari and Sagi Tzadik discovered that the OverlayFS implementation in
the Ubuntu Linux kernel did not properly perform permission checks in
certain situations. A local attacker could possibly use this to gain
elevated privileges. (CVE-2023-32629)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Network drivers;
- NVME drivers;
(CVE-2026-23112, CVE-2026-23273)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS
linux-image-5.15.0-1100-raspi 5.15.0-1100.103
linux-image-raspi 5.15.0.1100.98
linux-image-raspi-5.15 5.15.0.1100.98
linux-image-raspi-nolpae 5.15.0.1100.98

Ubuntu 20.04 LTS
linux-image-5.15.0-1058-nvidia-tegra 5.15.0-1058.58~20.04.1
Available with Ubuntu Pro
linux-image-5.15.0-1058-nvidia-tegra-rt 5.15.0-1058.58~20.04.1
Available with Ubuntu Pro
linux-image-nvidia-tegra 5.15.0.1058.58~20.04.1
Available with Ubuntu Pro
linux-image-nvidia-tegra-5.15 5.15.0.1058.58~20.04.1
Available with Ubuntu Pro
linux-image-nvidia-tegra-rt 5.15.0.1058.58~20.04.1
Available with Ubuntu Pro
linux-image-nvidia-tegra-rt-5.15 5.15.0.1058.58~20.04.1
Available with Ubuntu Pro

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-8255-3
https://ubuntu.com/security/notices/USN-8255-2
https://ubuntu.com/security/notices/USN-8255-1
CVE-2023-2640, CVE-2023-32629, CVE-2026-23112, CVE-2026-23273

Package Information:
https://launchpad.net/ubuntu/+source/linux-raspi/5.15.0-1100.103



[USN-8254-3] Linux kernel (NVIDIA Tegra) vulnerabilities


==========================================================================
Ubuntu Security Notice USN-8254-3
May 19, 2026

linux-nvidia-tegra vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-nvidia-tegra: Linux kernel for NVIDIA Tegra systems

Details:

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Network drivers;
- NVME drivers;
- Netfilter;
(CVE-2026-23112, CVE-2026-23231, CVE-2026-23273)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
linux-image-6.8.0-1023-nvidia-tegra 6.8.0-1023.23
linux-image-6.8.0-1023-nvidia-tegra-rt 6.8.0-1023.23
linux-image-nvidia-tegra 6.8.0-1023.23
linux-image-nvidia-tegra-6.8 6.8.0-1023.23
linux-image-nvidia-tegra-rt 6.8.0-1023.23
linux-image-nvidia-tegra-rt-6.8 6.8.0-1023.23

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-8254-3
https://ubuntu.com/security/notices/USN-8254-2
https://ubuntu.com/security/notices/USN-8254-1
CVE-2026-23112, CVE-2026-23231, CVE-2026-23273

Package Information:
https://launchpad.net/ubuntu/+source/linux-nvidia-tegra/6.8.0-1023.23



[USN-8274-1] Linux kernel vulnerabilities


==========================================================================
Ubuntu Security Notice USN-8274-1
May 19, 2026

linux, linux-aws, linux-kvm, linux-lts-xenial vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-kvm: Linux kernel for cloud environments
- linux-lts-xenial: Linux hardware enablement kernel from Xenial for Trusty

Details:

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Network drivers;
- BTRFS file system;
- Sun RPC protocol;
- XFRM subsystem;
(CVE-2022-49033, CVE-2024-27388, CVE-2024-49938, CVE-2024-50008,
CVE-2024-50142)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 LTS
linux-image-4.4.0-1155-kvm 4.4.0-1155.166
Available with Ubuntu Pro
linux-image-4.4.0-1192-aws 4.4.0-1192.207
Available with Ubuntu Pro
linux-image-4.4.0-280-generic 4.4.0-280.314
Available with Ubuntu Pro
linux-image-4.4.0-280-lowlatency 4.4.0-280.314
Available with Ubuntu Pro
linux-image-aws 4.4.0.1192.196
Available with Ubuntu Pro
linux-image-generic 4.4.0.280.286
Available with Ubuntu Pro
linux-image-generic-lts-xenial 4.4.0.280.286
Available with Ubuntu Pro
linux-image-kvm 4.4.0.1155.152
Available with Ubuntu Pro
linux-image-lowlatency 4.4.0.280.286
Available with Ubuntu Pro
linux-image-lowlatency-lts-xenial 4.4.0.280.286
Available with Ubuntu Pro
linux-image-virtual 4.4.0.280.286
Available with Ubuntu Pro
linux-image-virtual-lts-xenial 4.4.0.280.286
Available with Ubuntu Pro

Ubuntu 14.04 LTS
linux-image-4.4.0-1154-aws 4.4.0-1154.160
Available with Ubuntu Pro
linux-image-4.4.0-280-generic 4.4.0-280.314~14.04.1
Available with Ubuntu Pro
linux-image-4.4.0-280-lowlatency 4.4.0-280.314~14.04.1
Available with Ubuntu Pro
linux-image-aws 4.4.0.1154.151
Available with Ubuntu Pro
linux-image-generic-lts-xenial 4.4.0.280.314~14.04.1
Available with Ubuntu Pro
linux-image-lowlatency-lts-xenial 4.4.0.280.314~14.04.1
Available with Ubuntu Pro
linux-image-virtual-lts-xenial 4.4.0.280.314~14.04.1
Available with Ubuntu Pro

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-8274-1
CVE-2022-49033, CVE-2024-27388, CVE-2024-49938, CVE-2024-50008,
CVE-2024-50142



[USN-8280-1] Linux kernel vulnerabilities


==========================================================================
Ubuntu Security Notice USN-8280-1
May 19, 2026

linux, linux-aws, linux-aws-fips, linux-bluefield, linux-fips, linux-gcp,
linux-gcp-5.4, linux-gcp-fips, linux-ibm, linux-ibm-5.4, linux-kvm,
linux-oracle, linux-oracle-5.4, linux-xilinx-zynqmp vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-aws-fips: Linux kernel for Amazon Web Services (AWS) systems with FIPS
- linux-bluefield: Linux kernel for NVIDIA BlueField platforms
- linux-fips: Linux kernel with FIPS
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-gcp-fips: Linux kernel for Google Cloud Platform (GCP) systems with
FIPS
- linux-ibm: Linux kernel for IBM cloud systems
- linux-kvm: Linux kernel for cloud environments
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-xilinx-zynqmp: Linux kernel for Xilinx ZynqMP processors
- linux-gcp-5.4: Linux kernel for Google Cloud Platform (GCP) systems
- linux-ibm-5.4: Linux kernel for IBM cloud systems
- linux-oracle-5.4: Linux kernel for Oracle Cloud systems

Details:

It was discovered that the Linux kernel algif_aead module did not properly
handle in-place cryptographic operations. This flaw is known as Copy Fail.
A local attacker could use this to escalate privileges, or possibly escape
a container. (CVE-2026-31431)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Cryptographic API;
- Packet sockets;
- TLS protocol;
(CVE-2026-31504, CVE-2026-31533, CVE-2026-43033, CVE-2026-43077,
CVE-2026-43078)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS
linux-image-5.4.0-1077-xilinx-zynqmp 5.4.0-1077.81
Available with Ubuntu Pro
linux-image-5.4.0-1105-ibm 5.4.0-1105.110
Available with Ubuntu Pro
linux-image-5.4.0-1118-bluefield 5.4.0-1118.125
Available with Ubuntu Pro
linux-image-5.4.0-1133-fips 5.4.0-1133.143
Available with Ubuntu Pro
linux-image-5.4.0-1146-kvm 5.4.0-1146.155
Available with Ubuntu Pro
linux-image-5.4.0-1157-oracle 5.4.0-1157.167
Available with Ubuntu Pro
linux-image-5.4.0-1159-aws 5.4.0-1159.169
Available with Ubuntu Pro
linux-image-5.4.0-1159-aws-fips 5.4.0-1159.169+fips1
Available with Ubuntu Pro
linux-image-5.4.0-1162-gcp 5.4.0-1162.171
Available with Ubuntu Pro
linux-image-5.4.0-1162-gcp-fips 5.4.0-1162.171+fips1
Available with Ubuntu Pro
linux-image-5.4.0-230-generic 5.4.0-230.250
Available with Ubuntu Pro
linux-image-5.4.0-230-generic-lpae 5.4.0-230.250
Available with Ubuntu Pro
linux-image-5.4.0-230-lowlatency 5.4.0-230.250
Available with Ubuntu Pro
linux-image-aws-5.4 5.4.0.1159.156
Available with Ubuntu Pro
linux-image-aws-fips 5.4.0.1159.106
Available with Ubuntu Pro
linux-image-aws-fips-5.4 5.4.0.1159.106
Available with Ubuntu Pro
linux-image-aws-lts-20.04 5.4.0.1159.156
Available with Ubuntu Pro
linux-image-bluefield 5.4.0.1118.114
Available with Ubuntu Pro
linux-image-bluefield-5.4 5.4.0.1118.114
Available with Ubuntu Pro
linux-image-fips 5.4.0.1133.130
Available with Ubuntu Pro
linux-image-fips-5.4 5.4.0.1133.130
Available with Ubuntu Pro
linux-image-gcp-5.4 5.4.0.1162.164
Available with Ubuntu Pro
linux-image-gcp-fips 5.4.0.1162.104
Available with Ubuntu Pro
linux-image-gcp-fips-5.4 5.4.0.1162.104
Available with Ubuntu Pro
linux-image-gcp-lts-20.04 5.4.0.1162.164
Available with Ubuntu Pro
linux-image-generic 5.4.0.230.222
Available with Ubuntu Pro
linux-image-generic-5.4 5.4.0.230.222
Available with Ubuntu Pro
linux-image-generic-lpae 5.4.0.230.222
Available with Ubuntu Pro
linux-image-generic-lpae-5.4 5.4.0.230.222
Available with Ubuntu Pro
linux-image-ibm-5.4 5.4.0.1105.134
Available with Ubuntu Pro
linux-image-ibm-lts-20.04 5.4.0.1105.134
Available with Ubuntu Pro
linux-image-kvm 5.4.0.1146.142
Available with Ubuntu Pro
linux-image-kvm-5.4 5.4.0.1146.142
Available with Ubuntu Pro
linux-image-lowlatency 5.4.0.230.222
Available with Ubuntu Pro
linux-image-lowlatency-5.4 5.4.0.230.222
Available with Ubuntu Pro
linux-image-oem 5.4.0.230.222
Available with Ubuntu Pro
linux-image-oem-osp1 5.4.0.230.222
Available with Ubuntu Pro
linux-image-oracle-5.4 5.4.0.1157.151
Available with Ubuntu Pro
linux-image-oracle-lts-20.04 5.4.0.1157.151
Available with Ubuntu Pro
linux-image-virtual 5.4.0.230.222
Available with Ubuntu Pro
linux-image-virtual-5.4 5.4.0.230.222
Available with Ubuntu Pro
linux-image-xilinx-zynqmp 5.4.0.1077.77
Available with Ubuntu Pro
linux-image-xilinx-zynqmp-5.4 5.4.0.1077.77
Available with Ubuntu Pro

Ubuntu 18.04 LTS
linux-image-5.4.0-1105-ibm 5.4.0-1105.110~18.04.1
Available with Ubuntu Pro
linux-image-5.4.0-1157-oracle 5.4.0-1157.167~18.04.1
Available with Ubuntu Pro
linux-image-5.4.0-1162-gcp 5.4.0-1162.171~18.04.1
Available with Ubuntu Pro
linux-image-gcp 5.4.0.1162.171~18.04.1
Available with Ubuntu Pro
linux-image-gcp-5.4 5.4.0.1162.171~18.04.1
Available with Ubuntu Pro
linux-image-ibm 5.4.0.1105.110~18.04.1
Available with Ubuntu Pro
linux-image-ibm-5.4 5.4.0.1105.110~18.04.1
Available with Ubuntu Pro
linux-image-oracle 5.4.0.1157.167~18.04.1
Available with Ubuntu Pro
linux-image-oracle-5.4 5.4.0.1157.167~18.04.1
Available with Ubuntu Pro

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-8280-1
CVE-2026-31431, CVE-2026-31504, CVE-2026-31533, CVE-2026-43033,
CVE-2026-43077, CVE-2026-43078



[USN-8279-1] Linux kernel vulnerabilities


==========================================================================
Ubuntu Security Notice USN-8279-1
May 19, 2026

linux, linux-aws, linux-aws-5.15, linux-aws-fips, linux-fips, linux-gcp,
linux-gcp-fips, linux-gke, linux-gkeop, linux-hwe-5.15, linux-ibm,
linux-ibm-5.15, linux-intel-iotg, linux-intel-iotg-5.15, linux-kvm,
linux-nvidia, linux-nvidia-tegra, linux-nvidia-tegra-5.15, linux-oracle,
linux-raspi, linux-realtime vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-aws-fips: Linux kernel for Amazon Web Services (AWS) systems with FIPS
- linux-fips: Linux kernel with FIPS
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-gcp-fips: Linux kernel for Google Cloud Platform (GCP) systems with
FIPS
- linux-gke: Linux kernel for Google Container Engine (GKE) systems
- linux-gkeop: Linux kernel for Google Container Engine (GKE) systems
- linux-ibm: Linux kernel for IBM cloud systems
- linux-intel-iotg: Linux kernel for Intel IoT platforms
- linux-kvm: Linux kernel for cloud environments
- linux-nvidia: Linux kernel for NVIDIA systems
- linux-nvidia-tegra: Linux kernel for NVIDIA Tegra systems
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-raspi: Linux kernel for Raspberry Pi systems
- linux-realtime: Linux kernel for Real-time systems
- linux-aws-5.15: Linux kernel for Amazon Web Services (AWS) systems
- linux-hwe-5.15: Linux hardware enablement (HWE) kernel
- linux-ibm-5.15: Linux kernel for IBM cloud systems
- linux-intel-iotg-5.15: Linux kernel for Intel IoT platforms
- linux-nvidia-tegra-5.15: Linux kernel for NVIDIA Tegra systems

Details:

It was discovered that the Linux kernel algif_aead module did not properly
handle in-place cryptographic operations. This flaw is known as Copy Fail.
A local attacker could use this to escalate privileges, or possibly escape
a container. (CVE-2026-31431)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Cryptographic API;
- Ethernet bonding driver;
- SMB network file system;
- Netfilter;
- io_uring subsystem;
- Packet sockets;
- TLS protocol;
(CVE-2024-35862, CVE-2024-50060, CVE-2026-23274, CVE-2026-23351,
CVE-2026-31419, CVE-2026-31504, CVE-2026-31533, CVE-2026-43033,
CVE-2026-43077, CVE-2026-43078)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS
linux-image-5.15.0-1060-nvidia-tegra 5.15.0-1060.60
linux-image-5.15.0-1060-nvidia-tegra-rt 5.15.0-1060.60
linux-image-5.15.0-1091-gkeop 5.15.0-1091.99
linux-image-5.15.0-1100-kvm 5.15.0-1100.105
linux-image-5.15.0-1102-ibm 5.15.0-1102.105
linux-image-5.15.0-1102-raspi 5.15.0-1102.105
linux-image-5.15.0-1103-intel-iotg 5.15.0-1103.109
linux-image-5.15.0-1103-nvidia 5.15.0-1103.104
linux-image-5.15.0-1103-nvidia-lowlatency 5.15.0-1103.104
linux-image-5.15.0-1104-gke 5.15.0-1104.110
linux-image-5.15.0-1105-oracle 5.15.0-1105.111
linux-image-5.15.0-1107-realtime 5.15.0-1107.116
Available with Ubuntu Pro
linux-image-5.15.0-1108-aws 5.15.0-1108.115
linux-image-5.15.0-1108-aws-64k 5.15.0-1108.115
linux-image-5.15.0-1108-aws-fips 5.15.0-1108.115+fips1
Available with Ubuntu Pro
linux-image-5.15.0-1108-gcp 5.15.0-1108.117
linux-image-5.15.0-1108-gcp-fips 5.15.0-1108.117+fips1
Available with Ubuntu Pro
linux-image-5.15.0-179-fips 5.15.0-179.189+fips1
Available with Ubuntu Pro
linux-image-5.15.0-179-generic 5.15.0-179.189
linux-image-5.15.0-179-generic-64k 5.15.0-179.189
linux-image-5.15.0-179-generic-lpae 5.15.0-179.189
linux-image-aws-5.15 5.15.0.1108.111
linux-image-aws-64k-5.15 5.15.0.1108.111
linux-image-aws-64k-lts-22.04 5.15.0.1108.111
linux-image-aws-fips 5.15.0.1108.104
Available with Ubuntu Pro
linux-image-aws-fips-5.15 5.15.0.1108.104
Available with Ubuntu Pro
linux-image-aws-lts-22.04 5.15.0.1108.111
linux-image-fips 5.15.0.179.105
Available with Ubuntu Pro
linux-image-fips-5.15 5.15.0.179.105
Available with Ubuntu Pro
linux-image-gcp-5.15 5.15.0.1108.104
linux-image-gcp-fips 5.15.0.1108.98
Available with Ubuntu Pro
linux-image-gcp-fips-5.15 5.15.0.1108.98
Available with Ubuntu Pro
linux-image-gcp-lts-22.04 5.15.0.1108.104
linux-image-generic 5.15.0.179.163
linux-image-generic-5.15 5.15.0.179.163
linux-image-generic-64k 5.15.0.179.163
linux-image-generic-64k-5.15 5.15.0.179.163
linux-image-generic-lpae 5.15.0.179.163
linux-image-generic-lpae-5.15 5.15.0.179.163
linux-image-gke 5.15.0.1104.103
linux-image-gke-5.15 5.15.0.1104.103
linux-image-gkeop 5.15.0.1091.90
linux-image-gkeop-5.15 5.15.0.1091.90
linux-image-ibm 5.15.0.1102.98
linux-image-ibm-5.15 5.15.0.1102.98
linux-image-intel-iotg 5.15.0.1103.102
linux-image-intel-iotg-5.15 5.15.0.1103.102
linux-image-kvm 5.15.0.1100.96
linux-image-kvm-5.15 5.15.0.1100.96
linux-image-nvidia 5.15.0.1103.103
linux-image-nvidia-5.15 5.15.0.1103.103
linux-image-nvidia-lowlatency 5.15.0.1103.103
linux-image-nvidia-lowlatency-5.15 5.15.0.1103.103
linux-image-nvidia-tegra 5.15.0.1060.60
linux-image-nvidia-tegra-5.15 5.15.0.1060.60
linux-image-nvidia-tegra-rt 5.15.0.1060.60
linux-image-nvidia-tegra-rt-5.15 5.15.0.1060.60
linux-image-oracle-5.15 5.15.0.1105.101
linux-image-oracle-lts-22.04 5.15.0.1105.101
linux-image-raspi 5.15.0.1102.100
linux-image-raspi-5.15 5.15.0.1102.100
linux-image-raspi-nolpae 5.15.0.1102.100
linux-image-realtime 5.15.0.1107.111
Available with Ubuntu Pro
linux-image-realtime-5.15 5.15.0.1107.111
Available with Ubuntu Pro
linux-image-virtual 5.15.0.179.163
linux-image-virtual-5.15 5.15.0.179.163

Ubuntu 20.04 LTS
linux-image-5.15.0-1060-nvidia-tegra 5.15.0-1060.60~20.04.1
Available with Ubuntu Pro
linux-image-5.15.0-1060-nvidia-tegra-rt 5.15.0-1060.60~20.04.1
Available with Ubuntu Pro
linux-image-5.15.0-1102-ibm 5.15.0-1102.105~20.04.1
Available with Ubuntu Pro
linux-image-5.15.0-1103-intel-iotg 5.15.0-1103.109~20.04.1
Available with Ubuntu Pro
linux-image-5.15.0-1108-aws 5.15.0-1108.115~20.04.1
Available with Ubuntu Pro
linux-image-5.15.0-179-generic 5.15.0-179.189~20.04.1
Available with Ubuntu Pro
linux-image-5.15.0-179-generic-64k 5.15.0-179.189~20.04.1
Available with Ubuntu Pro
linux-image-5.15.0-179-generic-lpae 5.15.0-179.189~20.04.1
Available with Ubuntu Pro
linux-image-aws 5.15.0.1108.115~20.04.1
Available with Ubuntu Pro
linux-image-aws-5.15 5.15.0.1108.115~20.04.1
Available with Ubuntu Pro
linux-image-generic-5.15 5.15.0.179.189~20.04.1
Available with Ubuntu Pro
linux-image-generic-64k-5.15 5.15.0.179.189~20.04.1
Available with Ubuntu Pro
linux-image-generic-64k-hwe-20.04 5.15.0.179.189~20.04.1
Available with Ubuntu Pro
linux-image-generic-hwe-20.04 5.15.0.179.189~20.04.1
Available with Ubuntu Pro
linux-image-generic-lpae-5.15 5.15.0.179.189~20.04.1
Available with Ubuntu Pro
linux-image-generic-lpae-hwe-20.04 5.15.0.179.189~20.04.1
Available with Ubuntu Pro
linux-image-ibm 5.15.0.1102.105~20.04.1
Available with Ubuntu Pro
linux-image-ibm-5.15 5.15.0.1102.105~20.04.1
Available with Ubuntu Pro
linux-image-intel 5.15.0.1103.109~20.04.1
Available with Ubuntu Pro
linux-image-intel-iotg 5.15.0.1103.109~20.04.1
Available with Ubuntu Pro
linux-image-intel-iotg-5.15 5.15.0.1103.109~20.04.1
Available with Ubuntu Pro
linux-image-nvidia-tegra 5.15.0.1060.60~20.04.1
Available with Ubuntu Pro
linux-image-nvidia-tegra-5.15 5.15.0.1060.60~20.04.1
Available with Ubuntu Pro
linux-image-nvidia-tegra-rt 5.15.0.1060.60~20.04.1
Available with Ubuntu Pro
linux-image-nvidia-tegra-rt-5.15 5.15.0.1060.60~20.04.1
Available with Ubuntu Pro
linux-image-oem-20.04 5.15.0.179.189~20.04.1
Available with Ubuntu Pro
linux-image-oem-20.04b 5.15.0.179.189~20.04.1
Available with Ubuntu Pro
linux-image-oem-20.04c 5.15.0.179.189~20.04.1
Available with Ubuntu Pro
linux-image-oem-20.04d 5.15.0.179.189~20.04.1
Available with Ubuntu Pro
linux-image-virtual-5.15 5.15.0.179.189~20.04.1
Available with Ubuntu Pro
linux-image-virtual-hwe-20.04 5.15.0.179.189~20.04.1
Available with Ubuntu Pro

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-8279-1
CVE-2024-35862, CVE-2024-50060, CVE-2026-23274, CVE-2026-23351,
CVE-2026-31419, CVE-2026-31431, CVE-2026-31504, CVE-2026-31533,
CVE-2026-43033, CVE-2026-43077, CVE-2026-43078

Package Information:
https://launchpad.net/ubuntu/+source/linux/5.15.0-179.189
https://launchpad.net/ubuntu/+source/linux-aws/5.15.0-1108.115
https://launchpad.net/ubuntu/+source/linux-aws-fips/5.15.0-1108.115+fips1
https://launchpad.net/ubuntu/+source/linux-fips/5.15.0-179.189+fips1
https://launchpad.net/ubuntu/+source/linux-gcp/5.15.0-1108.117
https://launchpad.net/ubuntu/+source/linux-gcp-fips/5.15.0-1108.117+fips1
https://launchpad.net/ubuntu/+source/linux-gke/5.15.0-1104.110
https://launchpad.net/ubuntu/+source/linux-gkeop/5.15.0-1091.99
https://launchpad.net/ubuntu/+source/linux-ibm/5.15.0-1102.105
https://launchpad.net/ubuntu/+source/linux-intel-iotg/5.15.0-1103.109
https://launchpad.net/ubuntu/+source/linux-kvm/5.15.0-1100.105
https://launchpad.net/ubuntu/+source/linux-nvidia/5.15.0-1103.104
https://launchpad.net/ubuntu/+source/linux-nvidia-tegra/5.15.0-1060.60
https://launchpad.net/ubuntu/+source/linux-oracle/5.15.0-1105.111
https://launchpad.net/ubuntu/+source/linux-raspi/5.15.0-1102.105
https://launchpad.net/ubuntu/+source/linux-realtime/5.15.0-1107.116



[USN-8281-1] Linux kernel vulnerabilities


==========================================================================
Ubuntu Security Notice USN-8281-1
May 19, 2026

linux, linux-aws, linux-aws-fips, linux-fips, linux-gcp-4.15,
linux-gcp-fips, linux-kvm, linux-oracle vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-aws-fips: Linux kernel for Amazon Web Services (AWS) systems with FIPS
- linux-fips: Linux kernel with FIPS
- linux-gcp-4.15: Linux kernel for Google Cloud Platform (GCP) systems
- linux-gcp-fips: Linux kernel for Google Cloud Platform (GCP) systems with
FIPS
- linux-kvm: Linux kernel for cloud environments
- linux-oracle: Linux kernel for Oracle Cloud systems

Details:

It was discovered that the Linux kernel algif_aead module did not properly
handle in-place cryptographic operations. This flaw is known as Copy Fail.
A local attacker could use this to escalate privileges, or possibly escape
a container. (CVE-2026-31431)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Cryptographic API;
- Packet sockets;
(CVE-2026-31504, CVE-2026-43033, CVE-2026-43077, CVE-2026-43078)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS
linux-image-4.15.0-1147-fips 4.15.0-1147.159
Available with Ubuntu Pro
linux-image-4.15.0-1154-oracle 4.15.0-1154.165
Available with Ubuntu Pro
linux-image-4.15.0-1174-kvm 4.15.0-1174.179
Available with Ubuntu Pro
linux-image-4.15.0-1185-gcp 4.15.0-1185.202
Available with Ubuntu Pro
linux-image-4.15.0-1192-aws 4.15.0-1192.205
Available with Ubuntu Pro
linux-image-4.15.0-2093-gcp-fips 4.15.0-2093.99
Available with Ubuntu Pro
linux-image-4.15.0-2130-aws-fips 4.15.0-2130.136
Available with Ubuntu Pro
linux-image-4.15.0-250-generic 4.15.0-250.262
Available with Ubuntu Pro
linux-image-4.15.0-250-lowlatency 4.15.0-250.262
Available with Ubuntu Pro
linux-image-aws-4.15 4.15.0.1192.190
Available with Ubuntu Pro
linux-image-aws-fips 4.15.0.2130.124
Available with Ubuntu Pro
linux-image-aws-fips-4.15 4.15.0.2130.124
Available with Ubuntu Pro
linux-image-aws-lts-18.04 4.15.0.1192.190
Available with Ubuntu Pro
linux-image-fips 4.15.0.1147.144
Available with Ubuntu Pro
linux-image-gcp-4.15 4.15.0.1185.198
Available with Ubuntu Pro
linux-image-gcp-fips 4.15.0.2093.91
Available with Ubuntu Pro
linux-image-gcp-fips-4.15 4.15.0.2093.91
Available with Ubuntu Pro
linux-image-gcp-lts-18.04 4.15.0.1185.198
Available with Ubuntu Pro
linux-image-generic 4.15.0.250.234
Available with Ubuntu Pro
linux-image-kvm 4.15.0.1174.165
Available with Ubuntu Pro
linux-image-lowlatency 4.15.0.250.234
Available with Ubuntu Pro
linux-image-oracle-4.15 4.15.0.1154.159
Available with Ubuntu Pro
linux-image-oracle-lts-18.04 4.15.0.1154.159
Available with Ubuntu Pro
linux-image-virtual 4.15.0.250.234
Available with Ubuntu Pro

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-8281-1
CVE-2026-31431, CVE-2026-31504, CVE-2026-43033, CVE-2026-43077,
CVE-2026-43078



[USN-8277-1] Linux kernel vulnerabilities


==========================================================================
Ubuntu Security Notice USN-8277-1
May 19, 2026

linux, linux-aws, linux-hwe-6.17, linux-oem-6.17, linux-oracle,
linux-raspi, linux-realtime, linux-realtime-6.17 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.10
- Ubuntu 24.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-raspi: Linux kernel for Raspberry Pi systems
- linux-realtime: Linux kernel for Real-time systems
- linux-hwe-6.17: Linux hardware enablement (HWE) kernel
- linux-oem-6.17: Linux kernel for OEM systems
- linux-realtime-6.17: Linux kernel for Real-time systems

Details:

It was discovered that the Linux kernel algif_aead module did not properly
handle in-place cryptographic operations. This flaw is known as Copy Fail.
A local attacker could use this to escalate privileges, or possibly escape
a container. (CVE-2026-31431)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- S390 architecture;
- Cryptographic API;
- GPU drivers;
- Ethernet bonding driver;
- Network file system (NFS) server daemon;
- Distributed Switch Architecture;
- Netfilter;
- Control group (cgroup);
- Kernel kexec() syscall;
- Memory management;
- MAC80211 subsystem;
- Multipath TCP;
- Packet sockets;
- TLS protocol;
- Unix domain sockets;
(CVE-2025-71088, CVE-2025-71090, CVE-2025-71127, CVE-2025-71134,
CVE-2025-71139, CVE-2025-71141, CVE-2025-71142, CVE-2025-71144,
CVE-2025-71152, CVE-2025-71155, CVE-2026-23274, CVE-2026-23351,
CVE-2026-23394, CVE-2026-31419, CVE-2026-31504, CVE-2026-31533,
CVE-2026-43033, CVE-2026-43077, CVE-2026-43078)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.10
linux-image-6.17.0-1013-realtime 6.17.0-1013.15
linux-image-6.17.0-1014-oracle 6.17.0-1014.14
linux-image-6.17.0-1014-oracle-64k 6.17.0-1014.14
linux-image-6.17.0-1015-aws 6.17.0-1015.15
linux-image-6.17.0-1015-aws-64k 6.17.0-1015.15
linux-image-6.17.0-1017-raspi 6.17.0-1017.17
linux-image-6.17.0-29-generic 6.17.0-29.29
linux-image-6.17.0-29-generic-64k 6.17.0-29.29
linux-image-aws 6.17.0-1015.15
linux-image-aws-6.17 6.17.0-1015.15
linux-image-aws-64k 6.17.0-1015.15
linux-image-aws-64k-6.17 6.17.0-1015.15
linux-image-generic 6.17.0-29.29
linux-image-generic-6.17 6.17.0-29.29
linux-image-generic-64k 6.17.0-29.29
linux-image-generic-64k-6.17 6.17.0-29.29
linux-image-oracle 6.17.0-1014.14
linux-image-oracle-6.17 6.17.0-1014.14
linux-image-oracle-64k 6.17.0-1014.14
linux-image-oracle-64k-6.17 6.17.0-1014.14
linux-image-raspi 6.17.0-1017.17
linux-image-raspi-6.17 6.17.0-1017.17
linux-image-realtime 6.17.0-1013.15
linux-image-realtime-6.17 6.17.0-1013.15
linux-image-realtime-hwe-24.04 6.17.0-1013.15
linux-image-realtime-hwe-24.04-edge 6.17.0-1013.15
linux-image-virtual 6.17.0-29.29
linux-image-virtual-6.17 6.17.0-29.29

Ubuntu 24.04 LTS
linux-image-6.17.0-1013-realtime 6.17.0-1013.15~24.04.1
Available with Ubuntu Pro
linux-image-6.17.0-1023-oem 6.17.0-1023.23
linux-image-6.17.0-29-generic 6.17.0-29.29~24.04.1
linux-image-6.17.0-29-generic-64k 6.17.0-29.29~24.04.1
linux-image-generic-6.17 6.17.0-29.29~24.04.1
linux-image-generic-64k-6.17 6.17.0-29.29~24.04.1
linux-image-generic-64k-hwe-24.04 6.17.0-29.29~24.04.1
linux-image-generic-hwe-24.04 6.17.0-29.29~24.04.1
linux-image-oem-24.04 6.17.0-1023.23
linux-image-oem-24.04a 6.17.0-1023.23
linux-image-oem-24.04b 6.17.0-1023.23
linux-image-oem-24.04c 6.17.0-1023.23
linux-image-oem-24.04d 6.17.0-1023.23
linux-image-oem-6.17 6.17.0-1023.23
linux-image-realtime-6.17 6.17.0-1013.15~24.04.1
Available with Ubuntu Pro
linux-image-realtime-hwe-24.04 6.17.0-1013.15~24.04.1
Available with Ubuntu Pro
linux-image-virtual-6.17 6.17.0-29.29~24.04.1
linux-image-virtual-hwe-24.04 6.17.0-29.29~24.04.1

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-8277-1
CVE-2025-71088, CVE-2025-71090, CVE-2025-71127, CVE-2025-71134,
CVE-2025-71139, CVE-2025-71141, CVE-2025-71142, CVE-2025-71144,
CVE-2025-71152, CVE-2025-71155, CVE-2026-23274, CVE-2026-23351,
CVE-2026-23394, CVE-2026-31419, CVE-2026-31431, CVE-2026-31504,
CVE-2026-31533, CVE-2026-43033, CVE-2026-43077, CVE-2026-43078

Package Information:
https://launchpad.net/ubuntu/+source/linux/6.17.0-29.29
https://launchpad.net/ubuntu/+source/linux-aws/6.17.0-1015.15
https://launchpad.net/ubuntu/+source/linux-oracle/6.17.0-1014.14
https://launchpad.net/ubuntu/+source/linux-raspi/6.17.0-1017.17
https://launchpad.net/ubuntu/+source/linux-realtime/6.17.0-1013.15
https://launchpad.net/ubuntu/+source/linux-hwe-6.17/6.17.0-29.29~24.04.1
https://launchpad.net/ubuntu/+source/linux-oem-6.17/6.17.0-1023.23

https://launchpad.net/ubuntu/+source/linux-realtime-6.17/6.17.0-1013.15~24.04.1



[USN-8278-1] Linux kernel vulnerabilities


==========================================================================
Ubuntu Security Notice USN-8278-1
May 19, 2026

linux, linux-aws, linux-aws-fips, linux-gcp, linux-gcp-fips, linux-gke,
linux-gkeop, linux-ibm, linux-ibm-6.8, linux-lowlatency,
linux-lowlatency-hwe-6.8, linux-raspi, linux-raspi-realtime,
linux-realtime, linux-realtime-6.8 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-aws-fips: Linux kernel for Amazon Web Services (AWS) systems with FIPS
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-gcp-fips: Linux kernel for Google Cloud Platform (GCP) systems with
FIPS
- linux-gke: Linux kernel for Google Container Engine (GKE) systems
- linux-gkeop: Linux kernel for Google Container Engine (GKE) systems
- linux-ibm: Linux kernel for IBM cloud systems
- linux-lowlatency: Linux low latency kernel
- linux-raspi: Linux kernel for Raspberry Pi systems
- linux-raspi-realtime: Linux kernel for Raspberry Pi Real-time systems
- linux-realtime: Linux kernel for Real-time systems
- linux-ibm-6.8: Linux kernel for IBM cloud systems
- linux-lowlatency-hwe-6.8: Linux low latency kernel
- linux-realtime-6.8: Linux kernel for Real-time systems

Details:

It was discovered that the Linux kernel algif_aead module did not properly
handle in-place cryptographic operations. This flaw is known as Copy Fail.
A local attacker could use this to escalate privileges, or possibly escape
a container. (CVE-2026-31431)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
- x86 architecture;
- Cryptographic API;
- Compute Acceleration Framework;
- Drivers core;
- Null block device driver;
- Ublk userspace block driver;
- Bluetooth drivers;
- Counter interface drivers;
- DMA engine subsystem;
- DPLL subsystem;
- GPU drivers;
- HID subsystem;
- Intel Trace Hub HW tracing drivers;
- IIO ADC drivers;
- IIO subsystem;
- On-Chip Interconnect management framework;
- IRQ chip drivers;
- Modular ISDN driver;
- LED subsystem;
- Multiple devices driver;
- UACCE accelerator framework;
- MMC subsystem;
- Ethernet bonding driver;
- Network drivers;
- Mellanox network drivers;
- NVME drivers;
- PHY drivers;
- x86 platform drivers;
- i.MX PM domains;
- SCSI subsystem;
- SLIMbus drivers;
- SPI subsystem;
- TCM subsystem;
- W1 Dallas's 1-wire bus driver;
- Xen hypervisor drivers;
- BTRFS file system;
- EFI Variable file system;
- exFAT file system;
- Ext4 file system;
- HFS+ file system;
- Network file system (NFS) client;
- Network file system (NFS) server daemon;
- NTFS3 file system;
- SMB network file system;
- Scheduler infrastructure;
- Netfilter;
- NFC subsystem;
- Tracing infrastructure;
- io_uring subsystem;
- BPF subsystem;
- Perf events;
- Floating proportions library;
- Memory management;
- Bluetooth subsystem;
- CAN network layer;
- Ceph Core library;
- Networking core;
- IPv4 networking;
- IPv6 networking;
- L2TP protocol;
- MAC80211 subsystem;
- NET/ROM layer;
- Packet sockets;
- Network traffic control;
- SCTP protocol;
- TLS protocol;
- Unix domain sockets;
- VMware vSockets driver;
- Wireless networking;
- ALSA AC97 driver;
- Generic PCM loopback sound driver;
- Creative Sound Blaster X-Fi driver;
- AMD SoC Alsa drivers;
- Texas InstrumentS Audio (ASoC/HDA) drivers;
- USB sound devices;
- KVM subsystem;
(CVE-2024-50004, CVE-2024-58096, CVE-2024-58097, CVE-2025-37926,
CVE-2025-38201, CVE-2025-38591, CVE-2025-40039, CVE-2025-40082,
CVE-2025-40149, CVE-2025-68351, CVE-2025-68358, CVE-2025-68365,
CVE-2025-68725, CVE-2025-68749, CVE-2025-68803, CVE-2025-68823,
CVE-2025-71160, CVE-2025-71162, CVE-2025-71163, CVE-2025-71180,
CVE-2025-71182, CVE-2025-71183, CVE-2025-71184, CVE-2025-71185,
CVE-2025-71186, CVE-2025-71188, CVE-2025-71189, CVE-2025-71190,
CVE-2025-71191, CVE-2025-71192, CVE-2025-71193, CVE-2025-71194,
CVE-2025-71195, CVE-2025-71196, CVE-2025-71197, CVE-2025-71198,
CVE-2025-71199, CVE-2025-71200, CVE-2025-71220, CVE-2025-71222,
CVE-2025-71224, CVE-2025-71225, CVE-2025-71268, CVE-2026-22976,
CVE-2026-22977, CVE-2026-22978, CVE-2026-22979, CVE-2026-22980,
CVE-2026-22982, CVE-2026-22984, CVE-2026-22990, CVE-2026-22991,
CVE-2026-22992, CVE-2026-22994, CVE-2026-22996, CVE-2026-22997,
CVE-2026-22998, CVE-2026-22999, CVE-2026-23000, CVE-2026-23001,
CVE-2026-23003, CVE-2026-23005, CVE-2026-23006, CVE-2026-23010,
CVE-2026-23011, CVE-2026-23019, CVE-2026-23020, CVE-2026-23021,
CVE-2026-23025, CVE-2026-23026, CVE-2026-23030, CVE-2026-23031,
CVE-2026-23032, CVE-2026-23033, CVE-2026-23035, CVE-2026-23037,
CVE-2026-23038, CVE-2026-23047, CVE-2026-23049, CVE-2026-23050,
CVE-2026-23053, CVE-2026-23054, CVE-2026-23056, CVE-2026-23057,
CVE-2026-23058, CVE-2026-23059, CVE-2026-23061, CVE-2026-23062,
CVE-2026-23063, CVE-2026-23064, CVE-2026-23065, CVE-2026-23068,
CVE-2026-23069, CVE-2026-23071, CVE-2026-23073, CVE-2026-23075,
CVE-2026-23076, CVE-2026-23078, CVE-2026-23080, CVE-2026-23083,
CVE-2026-23084, CVE-2026-23085, CVE-2026-23086, CVE-2026-23087,
CVE-2026-23088, CVE-2026-23089, CVE-2026-23090, CVE-2026-23091,
CVE-2026-23093, CVE-2026-23094, CVE-2026-23095, CVE-2026-23096,
CVE-2026-23097, CVE-2026-23098, CVE-2026-23099, CVE-2026-23101,
CVE-2026-23102, CVE-2026-23103, CVE-2026-23105, CVE-2026-23107,
CVE-2026-23108, CVE-2026-23110, CVE-2026-23113, CVE-2026-23116,
CVE-2026-23119, CVE-2026-23120, CVE-2026-23121, CVE-2026-23123,
CVE-2026-23124, CVE-2026-23125, CVE-2026-23126, CVE-2026-23128,
CVE-2026-23129, CVE-2026-23131, CVE-2026-23133, CVE-2026-23135,
CVE-2026-23136, CVE-2026-23139, CVE-2026-23140, CVE-2026-23141,
CVE-2026-23142, CVE-2026-23144, CVE-2026-23145, CVE-2026-23146,
CVE-2026-23148, CVE-2026-23150, CVE-2026-23151, CVE-2026-23156,
CVE-2026-23159, CVE-2026-23160, CVE-2026-23163, CVE-2026-23164,
CVE-2026-23166, CVE-2026-23167, CVE-2026-23168, CVE-2026-23170,
CVE-2026-23172, CVE-2026-23173, CVE-2026-23176, CVE-2026-23178,
CVE-2026-23179, CVE-2026-23180, CVE-2026-23182, CVE-2026-23187,
CVE-2026-23190, CVE-2026-23191, CVE-2026-23193, CVE-2026-23198,
CVE-2026-23200, CVE-2026-23202, CVE-2026-23204, CVE-2026-23205,
CVE-2026-23206, CVE-2026-23212, CVE-2026-23213, CVE-2026-23214,
CVE-2026-23215, CVE-2026-23216, CVE-2026-23254, CVE-2026-23256,
CVE-2026-23257, CVE-2026-23258, CVE-2026-23260, CVE-2026-23261,
CVE-2026-23262, CVE-2026-23264, CVE-2026-23274, CVE-2026-23351,
CVE-2026-23394, CVE-2026-31419, CVE-2026-31504, CVE-2026-31533,
CVE-2026-43033, CVE-2026-43077, CVE-2026-43078)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
linux-image-6.8.0-1041-gkeop 6.8.0-1041.44
linux-image-6.8.0-1054-gke 6.8.0-1054.60
linux-image-6.8.0-1054-gke-64k 6.8.0-1054.60
linux-image-6.8.0-1055-aws 6.8.0-1055.58
linux-image-6.8.0-1055-aws-64k 6.8.0-1055.58
linux-image-6.8.0-1055-aws-fips 6.8.0-1055.58+fips1
Available with Ubuntu Pro
linux-image-6.8.0-1055-ibm 6.8.0-1055.56
linux-image-6.8.0-1056-raspi 6.8.0-1056.60
linux-image-6.8.0-1058-gcp 6.8.0-1058.61
linux-image-6.8.0-1058-gcp-64k 6.8.0-1058.61
linux-image-6.8.0-1058-gcp-fips 6.8.0-1058.61+fips1
Available with Ubuntu Pro
linux-image-6.8.0-117-generic 6.8.0-117.117
linux-image-6.8.0-117-generic-64k 6.8.0-117.117
linux-image-6.8.0-117-lowlatency 6.8.0-117.117.1
linux-image-6.8.0-117-lowlatency-64k 6.8.0-117.117.1
linux-image-6.8.0-2045-raspi-realtime 6.8.0-2045.46
Available with Ubuntu Pro
linux-image-6.8.1-1051-realtime 6.8.1-1051.52
Available with Ubuntu Pro
linux-image-aws-6.8 6.8.0-1055.58
linux-image-aws-64k-6.8 6.8.0-1055.58
linux-image-aws-64k-lts-24.04 6.8.0-1055.58
linux-image-aws-fips 6.8.0-1055.58+fips1
Available with Ubuntu Pro
linux-image-aws-fips-6.8 6.8.0-1055.58+fips1
Available with Ubuntu Pro
linux-image-aws-lts-24.04 6.8.0-1055.58
linux-image-gcp-6.8 6.8.0-1058.61
linux-image-gcp-64k-6.8 6.8.0-1058.61
linux-image-gcp-64k-lts-24.04 6.8.0-1058.61
linux-image-gcp-fips 6.8.0-1058.61+fips1
Available with Ubuntu Pro
linux-image-gcp-fips-6.8 6.8.0-1058.61+fips1
Available with Ubuntu Pro
linux-image-gcp-lts-24.04 6.8.0-1058.61
linux-image-generic 6.8.0-117.117
linux-image-generic-6.8 6.8.0-117.117
linux-image-generic-64k 6.8.0-117.117
linux-image-generic-64k-6.8 6.8.0-117.117
linux-image-generic-lpae 6.8.0-117.117
linux-image-gke 6.8.0-1054.60
linux-image-gke-6.8 6.8.0-1054.60
linux-image-gke-64k 6.8.0-1054.60
linux-image-gke-64k-6.8 6.8.0-1054.60
linux-image-gkeop 6.8.0-1041.44
linux-image-gkeop-6.8 6.8.0-1041.44
linux-image-ibm 6.8.0-1055.56
linux-image-ibm-6.8 6.8.0-1055.56
linux-image-ibm-classic 6.8.0-1055.56
linux-image-ibm-lts-24.04 6.8.0-1055.56
linux-image-intel-iot-realtime 6.8.1-1051.52
Available with Ubuntu Pro
linux-image-intel-iotg 6.8.0-117.117
linux-image-kvm 6.8.0-117.117
linux-image-lowlatency 6.8.0-117.117.1
linux-image-lowlatency-6.8 6.8.0-117.117.1
linux-image-lowlatency-64k 6.8.0-117.117.1
linux-image-lowlatency-64k-6.8 6.8.0-117.117.1
linux-image-raspi 6.8.0-1056.60
linux-image-raspi-6.8 6.8.0-1056.60
linux-image-raspi-realtime 6.8.0-2045.46
Available with Ubuntu Pro
linux-image-raspi-realtime-6.8 6.8.0-2045.46
Available with Ubuntu Pro
linux-image-realtime 6.8.1-1051.52
Available with Ubuntu Pro
linux-image-realtime-6.8.1 6.8.1-1051.52
Available with Ubuntu Pro
linux-image-virtual 6.8.0-117.117
linux-image-virtual-6.8 6.8.0-117.117

Ubuntu 22.04 LTS
linux-image-6.8.0-1055-ibm 6.8.0-1055.56~22.04.1
linux-image-6.8.0-117-lowlatency 6.8.0-117.117.1~22.04.1
linux-image-6.8.0-117-lowlatency-64k 6.8.0-117.117.1~22.04.1
linux-image-6.8.1-1051-realtime 6.8.1-1051.52~22.04.1
Available with Ubuntu Pro
linux-image-ibm-6.8 6.8.0-1055.56~22.04.1
linux-image-lowlatency-6.8 6.8.0-117.117.1~22.04.1
linux-image-lowlatency-64k-6.8 6.8.0-117.117.1~22.04.1
linux-image-lowlatency-64k-hwe-22.04 6.8.0-117.117.1~22.04.1
linux-image-lowlatency-hwe-22.04 6.8.0-117.117.1~22.04.1
linux-image-realtime-6.8.1 6.8.1-1051.52~22.04.1
Available with Ubuntu Pro
linux-image-realtime-hwe-22.04 6.8.1-1051.52~22.04.1
Available with Ubuntu Pro

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-8278-1
CVE-2024-50004, CVE-2024-58096, CVE-2024-58097, CVE-2025-37926,
CVE-2025-38201, CVE-2025-38591, CVE-2025-40039, CVE-2025-40082,
CVE-2025-40149, CVE-2025-68351, CVE-2025-68358, CVE-2025-68365,
CVE-2025-68725, CVE-2025-68749, CVE-2025-68803, CVE-2025-68823,
CVE-2025-71160, CVE-2025-71162, CVE-2025-71163, CVE-2025-71180,
CVE-2025-71182, CVE-2025-71183, CVE-2025-71184, CVE-2025-71185,
CVE-2025-71186, CVE-2025-71188, CVE-2025-71189, CVE-2025-71190,
CVE-2025-71191, CVE-2025-71192, CVE-2025-71193, CVE-2025-71194,
CVE-2025-71195, CVE-2025-71196, CVE-2025-71197, CVE-2025-71198,
CVE-2025-71199, CVE-2025-71200, CVE-2025-71220, CVE-2025-71222,
CVE-2025-71224, CVE-2025-71225, CVE-2025-71268, CVE-2026-22976,
CVE-2026-22977, CVE-2026-22978, CVE-2026-22979, CVE-2026-22980,
CVE-2026-22982, CVE-2026-22984, CVE-2026-22990, CVE-2026-22991,
CVE-2026-22992, CVE-2026-22994, CVE-2026-22996, CVE-2026-22997,
CVE-2026-22998, CVE-2026-22999, CVE-2026-23000, CVE-2026-23001,
CVE-2026-23003, CVE-2026-23005, CVE-2026-23006, CVE-2026-23010,
CVE-2026-23011, CVE-2026-23019, CVE-2026-23020, CVE-2026-23021,
CVE-2026-23025, CVE-2026-23026, CVE-2026-23030, CVE-2026-23031,
CVE-2026-23032, CVE-2026-23033, CVE-2026-23035, CVE-2026-23037,
CVE-2026-23038, CVE-2026-23047, CVE-2026-23049, CVE-2026-23050,
CVE-2026-23053, CVE-2026-23054, CVE-2026-23056, CVE-2026-23057,
CVE-2026-23058, CVE-2026-23059, CVE-2026-23061, CVE-2026-23062,
CVE-2026-23063, CVE-2026-23064, CVE-2026-23065, CVE-2026-23068,
CVE-2026-23069, CVE-2026-23071, CVE-2026-23073, CVE-2026-23075,
CVE-2026-23076, CVE-2026-23078, CVE-2026-23080, CVE-2026-23083,
CVE-2026-23084, CVE-2026-23085, CVE-2026-23086, CVE-2026-23087,
CVE-2026-23088, CVE-2026-23089, CVE-2026-23090, CVE-2026-23091,
CVE-2026-23093, CVE-2026-23094, CVE-2026-23095, CVE-2026-23096,
CVE-2026-23097, CVE-2026-23098, CVE-2026-23099, CVE-2026-23101,
CVE-2026-23102, CVE-2026-23103, CVE-2026-23105, CVE-2026-23107,
CVE-2026-23108, CVE-2026-23110, CVE-2026-23113, CVE-2026-23116,
CVE-2026-23119, CVE-2026-23120, CVE-2026-23121, CVE-2026-23123,
CVE-2026-23124, CVE-2026-23125, CVE-2026-23126, CVE-2026-23128,
CVE-2026-23129, CVE-2026-23131, CVE-2026-23133, CVE-2026-23135,
CVE-2026-23136, CVE-2026-23139, CVE-2026-23140, CVE-2026-23141,
CVE-2026-23142, CVE-2026-23144, CVE-2026-23145, CVE-2026-23146,
CVE-2026-23148, CVE-2026-23150, CVE-2026-23151, CVE-2026-23156,
CVE-2026-23159, CVE-2026-23160, CVE-2026-23163, CVE-2026-23164,
CVE-2026-23166, CVE-2026-23167, CVE-2026-23168, CVE-2026-23170,
CVE-2026-23172, CVE-2026-23173, CVE-2026-23176, CVE-2026-23178,
CVE-2026-23179, CVE-2026-23180, CVE-2026-23182, CVE-2026-23187,
CVE-2026-23190, CVE-2026-23191, CVE-2026-23193, CVE-2026-23198,
CVE-2026-23200, CVE-2026-23202, CVE-2026-23204, CVE-2026-23205,
CVE-2026-23206, CVE-2026-23212, CVE-2026-23213, CVE-2026-23214,
CVE-2026-23215, CVE-2026-23216, CVE-2026-23254, CVE-2026-23256,
CVE-2026-23257, CVE-2026-23258, CVE-2026-23260, CVE-2026-23261,
CVE-2026-23262, CVE-2026-23264, CVE-2026-23274, CVE-2026-23351,
CVE-2026-23394, CVE-2026-31419, CVE-2026-31431, CVE-2026-31504,
CVE-2026-31533, CVE-2026-43033, CVE-2026-43077, CVE-2026-43078

Package Information:
https://launchpad.net/ubuntu/+source/linux/6.8.0-117.117
https://launchpad.net/ubuntu/+source/linux-aws/6.8.0-1055.58
https://launchpad.net/ubuntu/+source/linux-aws-fips/6.8.0-1055.58+fips1
https://launchpad.net/ubuntu/+source/linux-gcp/6.8.0-1058.61
https://launchpad.net/ubuntu/+source/linux-gcp-fips/6.8.0-1058.61+fips1
https://launchpad.net/ubuntu/+source/linux-gke/6.8.0-1054.60
https://launchpad.net/ubuntu/+source/linux-gkeop/6.8.0-1041.44
https://launchpad.net/ubuntu/+source/linux-ibm/6.8.0-1055.56
https://launchpad.net/ubuntu/+source/linux-lowlatency/6.8.0-117.117.1
https://launchpad.net/ubuntu/+source/linux-raspi/6.8.0-1056.60
https://launchpad.net/ubuntu/+source/linux-raspi-realtime/6.8.0-2045.46
https://launchpad.net/ubuntu/+source/linux-realtime/6.8.1-1051.52
https://launchpad.net/ubuntu/+source/linux-ibm-6.8/6.8.0-1055.56~22.04.1

https://launchpad.net/ubuntu/+source/linux-lowlatency-hwe-6.8/6.8.0-117.117.1~22.04.1

https://launchpad.net/ubuntu/+source/linux-realtime-6.8/6.8.1-1051.52~22.04.1



[USN-8276-1] Highlight.js vulnerability


==========================================================================
Ubuntu Security Notice USN-8276-1
May 19, 2026

Highlight.js vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

Highlight.js could be made to crash if it received specially crafted
input.

Software Description:
- highlight.js: JavaScript syntax highlighter

Details:

It was discovered that Highlight.js used plain JavaScript objects for
internal language name lookups, making them susceptible to prototype
pollution attacks. An attacker could use this to cause a denial of
service or unexpected application behaviour.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS
libjs-highlight.js 9.12.0+dfsg1-5ubuntu0.1~esm1
Available with Ubuntu Pro
node-highlight.js 9.12.0+dfsg1-5ubuntu0.1~esm1
Available with Ubuntu Pro

Ubuntu 18.04 LTS
libjs-highlight.js 9.12.0+dfsg1-4ubuntu0.1~esm1
Available with Ubuntu Pro
node-highlight.js 9.12.0+dfsg1-4ubuntu0.1~esm1
Available with Ubuntu Pro

Ubuntu 16.04 LTS
libjs-highlight.js 8.2+ds-4ubuntu0.1~esm1
Available with Ubuntu Pro
node-highlight.js 8.2+ds-4ubuntu0.1~esm1
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8276-1
CVE-2020-26237



[USN-8272-1] Smarty vulnerability


==========================================================================
Ubuntu Security Notice USN-8272-1
May 19, 2026

smarty3 vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 LTS

Summary:

Smarty could be made to run malicious JavaScript in the user's browser if
it received specially crafted input.

Software Description:
- smarty3: The compiling PHP template engine

Details:

Takuya Aramaki discovered that Smarty did not properly escape JavaScript
code. An attacker could possibly use this issue to conduct a cross-site
scripting attack.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 LTS
smarty3 3.1.21-1ubuntu1+esm2
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8272-1
CVE-2023-28447