First published: Fri Apr 19 2024(Updated: )
Wei Chen discovered that a race condition existed in the TIPC protocol implementation in the Linux kernel, leading to a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service (system crash). (CVE-2023-1382) It was discovered that the virtio network implementation in the Linux kernel did not properly handle file references in the host, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information (kernel memory). (CVE-2023-1838) Jose Oliveira and Rodrigo Branco discovered that the Spectre Variant 2 mitigations with prctl syscall were insufficient in some situations. A local attacker could possibly use this to expose sensitive information. (CVE-2023-1998) Daniele Antonioli discovered that the Secure Simple Pairing and Secure Connections pairing in the Bluetooth protocol could allow an unauthenticated user to complete authentication without pairing credentials. A physically proximate attacker placed between two Bluetooth devices could use this to subsequently impersonate one of the paired devices. (CVE-2023-24023) shanzhulig discovered that the DRM subsystem in the Linux kernel contained a race condition when performing certain operation while handling driver unload, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-51043) It was discovered that a race condition existed in the Bluetooth subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-51779) It was discovered that the device mapper driver in the Linux kernel did not properly validate target size during certain memory allocations. A local attacker could use this to cause a denial of service (system crash). (CVE-2023-52429, CVE-2024-23851) Zhenghan Wang discovered that the generic ID allocator implementation in the Linux kernel did not properly check for null bitmap when releasing IDs. A local attacker could use this to cause a denial of service (system crash). (CVE-2023-6915) It was discovered that the SCTP protocol implementation in the Linux kernel contained a race condition when handling lock acquisition in certain situations. A local attacker could possibly use this to cause a denial of service (kernel deadlock). (CVE-2024-0639) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems:
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-4.15.0-1130-oracle | <4.15.0-1130.141 | 4.15.0-1130.141 |
=18.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-1151-kvm | <4.15.0-1151.156 | 4.15.0-1151.156 |
=18.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-1161-gcp | <4.15.0-1161.178 | 4.15.0-1161.178 |
=18.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-1167-aws | <4.15.0-1167.180 | 4.15.0-1167.180 |
=18.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-1176-azure | <4.15.0-1176.191 | 4.15.0-1176.191 |
=18.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-224-generic | <4.15.0-224.236 | 4.15.0-224.236 |
=18.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-224-lowlatency | <4.15.0-224.236 | 4.15.0-224.236 |
=18.04 | ||
All of | ||
ubuntu/linux-image-aws-lts-18.04 | <4.15.0.1167.165 | 4.15.0.1167.165 |
=18.04 | ||
All of | ||
ubuntu/linux-image-azure-lts-18.04 | <4.15.0.1176.144 | 4.15.0.1176.144 |
=18.04 | ||
All of | ||
ubuntu/linux-image-gcp-lts-18.04 | <4.15.0.1161.174 | 4.15.0.1161.174 |
=18.04 | ||
All of | ||
ubuntu/linux-image-generic | <4.15.0.224.208 | 4.15.0.224.208 |
=18.04 | ||
All of | ||
ubuntu/linux-image-kvm | <4.15.0.1151.142 | 4.15.0.1151.142 |
=18.04 | ||
All of | ||
ubuntu/linux-image-lowlatency | <4.15.0.224.208 | 4.15.0.224.208 |
=18.04 | ||
All of | ||
ubuntu/linux-image-oracle-lts-18.04 | <4.15.0.1130.135 | 4.15.0.1130.135 |
=18.04 | ||
All of | ||
ubuntu/linux-image-virtual | <4.15.0.224.208 | 4.15.0.224.208 |
=18.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-1130-oracle | <4.15.0-1130.141~16.04.1 | 4.15.0-1130.141~16.04.1 |
=16.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-1161-gcp | <4.15.0-1161.178~16.04.1 | 4.15.0-1161.178~16.04.1 |
=16.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-1167-aws | <4.15.0-1167.180~16.04.1 | 4.15.0-1167.180~16.04.1 |
=16.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-1176-azure | <4.15.0-1176.191~16.04.1 | 4.15.0-1176.191~16.04.1 |
=16.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-224-generic | <4.15.0-224.236~16.04.1 | 4.15.0-224.236~16.04.1 |
=16.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-224-lowlatency | <4.15.0-224.236~16.04.1 | 4.15.0-224.236~16.04.1 |
=16.04 | ||
All of | ||
ubuntu/linux-image-aws-hwe | <4.15.0.1167.180~16.04.1 | 4.15.0.1167.180~16.04.1 |
=16.04 | ||
All of | ||
ubuntu/linux-image-azure | <4.15.0.1176.191~16.04.1 | 4.15.0.1176.191~16.04.1 |
=16.04 | ||
All of | ||
ubuntu/linux-image-gcp | <4.15.0.1161.178~16.04.1 | 4.15.0.1161.178~16.04.1 |
=16.04 | ||
All of | ||
ubuntu/linux-image-generic-hwe-16.04 | <4.15.0.224.236~16.04.1 | 4.15.0.224.236~16.04.1 |
=16.04 | ||
All of | ||
ubuntu/linux-image-gke | <4.15.0.1161.178~16.04.1 | 4.15.0.1161.178~16.04.1 |
=16.04 | ||
All of | ||
ubuntu/linux-image-lowlatency-hwe-16.04 | <4.15.0.224.236~16.04.1 | 4.15.0.224.236~16.04.1 |
=16.04 | ||
All of | ||
ubuntu/linux-image-oem | <4.15.0.224.236~16.04.1 | 4.15.0.224.236~16.04.1 |
=16.04 | ||
All of | ||
ubuntu/linux-image-oracle | <4.15.0.1130.141~16.04.1 | 4.15.0.1130.141~16.04.1 |
=16.04 | ||
All of | ||
ubuntu/linux-image-virtual-hwe-16.04 | <4.15.0.224.236~16.04.1 | 4.15.0.224.236~16.04.1 |
=16.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-1176-azure | <4.15.0-1176.191~14.04.1 | 4.15.0-1176.191~14.04.1 |
=14.04 | ||
All of | ||
ubuntu/linux-image-azure | <4.15.0.1176.191~14.04.1 | 4.15.0.1176.191~14.04.1 |
=14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)