Home / mailings [USN-8186-1] Linux kernel (Real-time) vulnerabilities
Posted on 17 April 2026
Ubuntu Security==========================================================================Ubuntu Security Notice USN-8186-1
April 17, 2026
linux-intel-iot-realtime, linux-realtime vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-intel-iot-realtime: Linux kernel for Intel IoT Real-time platforms
- linux-realtime: Linux kernel for Real-time systems
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
- Block layer subsystem;
- Drivers core;
- Bluetooth drivers;
- DMA engine subsystem;
- GPU drivers;
- HID subsystem;
- Intel Trace Hub HW tracing drivers;
- IIO ADC drivers;
- IRQ chip drivers;
- Modular ISDN driver;
- LED subsystem;
- UACCE accelerator framework;
- Ethernet bonding driver;
- Network drivers;
- STMicroelectronics network drivers;
- Ethernet team driver;
- NVME drivers;
- PHY drivers;
- SLIMbus drivers;
- W1 Dallas's 1-wire bus driver;
- Xen hypervisor drivers;
- BTRFS file system;
- Ext4 file system;
- Network file system (NFS) client;
- Network file system (NFS) server daemon;
- NTFS3 file system;
- SMB network file system;
- NFC subsystem;
- BPF subsystem;
- IRQ subsystem;
- Memory management;
- Bluetooth subsystem;
- CAN network layer;
- Networking core;
- IPv4 networking;
- IPv6 networking;
- L2TP protocol;
- NET/ROM layer;
- Network traffic control;
- SCTP protocol;
- TLS protocol;
- XFRM subsystem;
- Creative Sound Blaster X-Fi driver;
- USB sound devices;
(CVE-2023-53421, CVE-2023-53520, CVE-2023-53662, CVE-2023-54207,
CVE-2025-38057, CVE-2025-38125, CVE-2025-38232, CVE-2025-38408,
CVE-2025-38591, CVE-2025-40149, CVE-2025-40164, CVE-2025-68211,
CVE-2025-68340, CVE-2025-68365, CVE-2025-68725, CVE-2025-68817,
CVE-2025-71080, CVE-2025-71162, CVE-2025-71163, CVE-2025-71185,
CVE-2025-71186, CVE-2025-71188, CVE-2025-71190, CVE-2025-71191,
CVE-2025-71194, CVE-2025-71196, CVE-2025-71197, CVE-2025-71199,
CVE-2026-22997, CVE-2026-22998, CVE-2026-22999, CVE-2026-23001,
CVE-2026-23003, CVE-2026-23011, CVE-2026-23026, CVE-2026-23033,
CVE-2026-23037, CVE-2026-23038, CVE-2026-23049, CVE-2026-23056,
CVE-2026-23058, CVE-2026-23061, CVE-2026-23063, CVE-2026-23064,
CVE-2026-23071, CVE-2026-23073, CVE-2026-23075, CVE-2026-23076,
CVE-2026-23078, CVE-2026-23080, CVE-2026-23083, CVE-2026-23084,
CVE-2026-23085, CVE-2026-23087, CVE-2026-23089, CVE-2026-23090,
CVE-2026-23091, CVE-2026-23093, CVE-2026-23095, CVE-2026-23096,
CVE-2026-23097, CVE-2026-23098, CVE-2026-23099, CVE-2026-23101,
CVE-2026-23103, CVE-2026-23105, CVE-2026-23108, CVE-2026-23119,
CVE-2026-23120, CVE-2026-23121, CVE-2026-23124, CVE-2026-23125,
CVE-2026-23128, CVE-2026-23133, CVE-2026-23145, CVE-2026-23146,
CVE-2026-23150, CVE-2026-23164, CVE-2026-23167, CVE-2026-23170,
CVE-2026-23209)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS
linux-image-5.15.0-1097-intel-iot-realtime 5.15.0-1097.99
Available with Ubuntu Pro
linux-image-5.15.0-1104-realtime 5.15.0-1104.113
Available with Ubuntu Pro
linux-image-intel-iot-realtime 5.15.0.1097.101
Available with Ubuntu Pro
linux-image-intel-iot-realtime-5.15 5.15.0.1097.101
Available with Ubuntu Pro
linux-image-realtime 5.15.0.1104.108
Available with Ubuntu Pro
linux-image-realtime-5.15 5.15.0.1104.108
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-8186-1
CVE-2023-53421, CVE-2023-53520, CVE-2023-53662, CVE-2023-54207,
CVE-2025-38057, CVE-2025-38125, CVE-2025-38232, CVE-2025-38408,
CVE-2025-38591, CVE-2025-40149, CVE-2025-40164, CVE-2025-68211,
CVE-2025-68340, CVE-2025-68365, CVE-2025-68725, CVE-2025-68817,
CVE-2025-71080, CVE-2025-71162, CVE-2025-71163, CVE-2025-71185,
CVE-2025-71186, CVE-2025-71188, CVE-2025-71190, CVE-2025-71191,
CVE-2025-71194, CVE-2025-71196, CVE-2025-71197, CVE-2025-71199,
CVE-2026-22997, CVE-2026-22998, CVE-2026-22999, CVE-2026-23001,
CVE-2026-23003, CVE-2026-23011, CVE-2026-23026, CVE-2026-23033,
CVE-2026-23037, CVE-2026-23038, CVE-2026-23049, CVE-2026-23056,
CVE-2026-23058, CVE-2026-23061, CVE-2026-23063, CVE-2026-23064,
CVE-2026-23071, CVE-2026-23073, CVE-2026-23075, CVE-2026-23076,
CVE-2026-23078, CVE-2026-23080, CVE-2026-23083, CVE-2026-23084,
CVE-2026-23085, CVE-2026-23087, CVE-2026-23089, CVE-2026-23090,
CVE-2026-23091, CVE-2026-23093, CVE-2026-23095, CVE-2026-23096,
CVE-2026-23097, CVE-2026-23098, CVE-2026-23099, CVE-2026-23101,
CVE-2026-23103, CVE-2026-23105, CVE-2026-23108, CVE-2026-23119,
CVE-2026-23120, CVE-2026-23121, CVE-2026-23124, CVE-2026-23125,
CVE-2026-23128, CVE-2026-23133, CVE-2026-23145, CVE-2026-23146,
CVE-2026-23150, CVE-2026-23164, CVE-2026-23167, CVE-2026-23170,
CVE-2026-23209
Package Information:
https://launchpad.net/ubuntu/+source/linux-intel-iot-realtime/5.15.0-1097.99
https://launchpad.net/ubuntu/+source/linux-realtime/5.15.0-1104.113
--=-=-=Content-Type: application/pgp-signature; name="signature.asc"
