USN-8162-1: Linux kernel (NVIDIA Tegra) vulnerabilities
Publication date
9 April 2026
Overview
Several security issues were fixed in the Linux kernel.
Releases
Packages
- linux-nvidia-tegra-5.15 - Linux kernel for NVIDIA Tegra systems
Details
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
- Block layer subsystem;
- Cryptographic API;
- Drivers core;
- Bluetooth drivers;
- DMA engine subsystem;
- GPU drivers;
- HID subsystem;
- Intel Trace Hub HW tracing drivers;
- IIO ADC drivers;
- IRQ chip drivers;
- Modular ISDN driver;
- LED subsystem;
- UACCE accelerator framework;
- Ethernet bonding driver;
- Network drivers;
- STMicroelectronics network drivers;
- Ethernet team driver;
- NVME drivers;
- PHY drivers;
- SLIMbus drivers;
- W1 Dallas's 1-wire bus driver;
- Xen hypervisor drivers;
- BTRFS file system;
- Ext4 file system;
- Network file system (NFS) client;
- Network...
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
- Block layer subsystem;
- Cryptographic API;
- Drivers core;
- Bluetooth drivers;
- DMA engine subsystem;
- GPU drivers;
- HID subsystem;
- Intel Trace Hub HW tracing drivers;
- IIO ADC drivers;
- IRQ chip drivers;
- Modular ISDN driver;
- LED subsystem;
- UACCE accelerator framework;
- Ethernet bonding driver;
- Network drivers;
- STMicroelectronics network drivers;
- Ethernet team driver;
- NVME drivers;
- PHY drivers;
- SLIMbus drivers;
- W1 Dallas's 1-wire bus driver;
- Xen hypervisor drivers;
- BTRFS file system;
- Ext4 file system;
- Network file system (NFS) client;
- Network file system (NFS) server daemon;
- NTFS3 file system;
- SMB network file system;
- NFC subsystem;
- BPF subsystem;
- IRQ subsystem;
- Memory management;
- Bluetooth subsystem;
- CAN network layer;
- Networking core;
- IPv4 networking;
- IPv6 networking;
- L2TP protocol;
- Netfilter;
- NET/ROM layer;
- Network traffic control;
- SCTP protocol;
- TLS protocol;
- XFRM subsystem;
- Creative Sound Blaster X-Fi driver;
- USB sound devices
Update instructions
After a standard system update you need to reboot your computer to make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
| Ubuntu Release | Package Version | ||
|---|---|---|---|
| 20.04 LTS focal | linux-image-5.15.0-1057-nvidia-tegra – 5.15.0-1057.57~20.04.1 | ||
| linux-image-5.15.0-1057-nvidia-tegra-rt – 5.15.0-1057.57~20.04.1 | |||
| linux-image-nvidia-tegra – 5.15.0.1057.57~20.04.1 | |||
| linux-image-nvidia-tegra-5.15 – 5.15.0.1057.57~20.04.1 | |||
| linux-image-nvidia-tegra-rt – 5.15.0.1057.57~20.04.1 | |||
| linux-image-nvidia-tegra-rt-5.15 – 5.15.0.1057.57~20.04.1 | |||
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.
References
- CVE-2026-23209
- CVE-2026-23170
- CVE-2026-23167
- CVE-2026-23164
- CVE-2026-23150
- CVE-2026-23146
- CVE-2026-23145
- CVE-2026-23133
- CVE-2026-23128
- CVE-2026-23125
- CVE-2026-23209
- CVE-2026-23170
- CVE-2026-23167
- CVE-2026-23164
- CVE-2026-23150
- CVE-2026-23146
- CVE-2026-23145
- CVE-2026-23133
- CVE-2026-23128
- CVE-2026-23125
- CVE-2026-23124
- CVE-2026-23121
- CVE-2026-23120
- CVE-2026-23119
- CVE-2026-23111
- CVE-2026-23108
- CVE-2026-23105
- CVE-2026-23103
- CVE-2026-23101
- CVE-2026-23099
- CVE-2026-23098
- CVE-2026-23097
- CVE-2026-23096
- CVE-2026-23095
- CVE-2026-23093
- CVE-2026-23091
- CVE-2026-23090
- CVE-2026-23089
- CVE-2026-23087
- CVE-2026-23085
- CVE-2026-23084
- CVE-2026-23083
- CVE-2026-23080
- CVE-2026-23078
- CVE-2026-23076
- CVE-2026-23075
- CVE-2026-23074
- CVE-2026-23073
- CVE-2026-23071
- CVE-2026-23064
- CVE-2026-23063
- CVE-2026-23061
- CVE-2026-23060
- CVE-2026-23058
- CVE-2026-23056
- CVE-2026-23049
- CVE-2026-23038
- CVE-2026-23037
- CVE-2026-23033
- CVE-2026-23026
- CVE-2026-23011
- CVE-2026-23003
- CVE-2026-23001
- CVE-2026-22999
- CVE-2026-22998
- CVE-2026-22997
- CVE-2025-71199
- CVE-2025-71197
- CVE-2025-71196
- CVE-2025-71194
- CVE-2025-71191
- CVE-2025-71190
- CVE-2025-71188
- CVE-2025-71186
- CVE-2025-71185
- CVE-2025-71163
- CVE-2025-71080
- CVE-2025-68817
- CVE-2025-68725
- CVE-2025-68365
- CVE-2025-68340
- CVE-2025-68211
- CVE-2025-40164
- CVE-2025-40149
- CVE-2025-38591
- CVE-2025-38408
- CVE-2025-38232
- CVE-2025-38125
- CVE-2025-38057
- CVE-2025-37849
- CVE-2023-54207
- CVE-2023-53662
- CVE-2023-53520
- CVE-2023-53421
Related notices
- USN-8163-1
- USN-8159-1
- USN-8159-2
- USN-8159-3
- USN-8152-1
- USN-8149-1
- USN-8149-2
- USN-8148-1
- USN-8148-2
- USN-8148-3
- USN-8163-1
- USN-8159-1
- USN-8159-2
- USN-8159-3
- USN-8152-1
- USN-8149-1
- USN-8149-2
- USN-8148-1
- USN-8148-2
- USN-8148-3
- USN-8148-4
- USN-8148-5
- USN-8145-1
- USN-8145-2
- USN-8145-3
- USN-8143-1
- USN-8143-2
- USN-8142-1
- USN-8126-1
- USN-8125-1
- USN-8100-1
- USN-8095-1
- USN-8095-2
- USN-8095-3
- USN-8095-4
- USN-8095-5
- USN-8094-5
- USN-8094-1
- USN-8094-2
- USN-8094-3
- USN-8094-4
- USN-8074-1
- USN-8074-2
- USN-8052-1
- USN-8052-2
- USN-8048-1
- USN-8031-1
- USN-8031-2
- USN-8031-3
- USN-8030-1
- USN-8029-1
- USN-8029-2
- USN-8029-3
- USN-8028-1
- USN-8028-2
- USN-8028-3
- USN-8028-4
- USN-8028-5
- USN-8028-6
- USN-8028-7
- USN-8028-8
- USN-7856-1
- USN-7834-1
- USN-7833-1
- USN-7833-2
- USN-7833-3
- USN-7833-4
- USN-7789-1
- USN-7789-2
- USN-7771-1
- USN-7770-1
- USN-7769-1
- USN-7769-2
- USN-7769-3
- USN-7594-1
- USN-7594-2
- USN-7594-3
Have additional questions?