First published: Tue May 07 2024(Updated: )
It was discovered that the Open vSwitch implementation in the Linux kernel could overflow its stack during recursive action operations under certain conditions. A local attacker could use this to cause a denial of service (system crash). (CVE-2024-1151) Sander Wiebing, Alvise de Faveri Tron, Herbert Bos, and Cristiano Giuffrida discovered that the Linux kernel mitigations for the initial Branch History Injection vulnerability (CVE-2022-0001) were insufficient for Intel processors. A local attacker could potentially use this to expose sensitive information. (CVE-2024-2201) Chenyuan Yang discovered that the RDS Protocol implementation in the Linux kernel contained an out-of-bounds read vulnerability. An attacker could use this to possibly cause a denial of service (system crash). (CVE-2024-23849) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems:
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-5.15.0-1044-gkeop | <5.15.0-1044.51 | 5.15.0-1044.51 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/linux-image-5.15.0-1054-ibm | <5.15.0-1054.57 | 5.15.0-1054.57 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/linux-image-5.15.0-1054-nvidia | <5.15.0-1054.55 | 5.15.0-1054.55 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/linux-image-5.15.0-1054-nvidia-lowlatency | <5.15.0-1054.55 | 5.15.0-1054.55 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/linux-image-5.15.0-1058-gke | <5.15.0-1058.63 | 5.15.0-1058.63 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/linux-image-5.15.0-1058-kvm | <5.15.0-1058.63 | 5.15.0-1058.63 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/linux-image-5.15.0-1059-gcp | <5.15.0-1059.67 | 5.15.0-1059.67 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/linux-image-5.15.0-1059-oracle | <5.15.0-1059.65 | 5.15.0-1059.65 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/linux-image-5.15.0-106-generic | <5.15.0-106.116 | 5.15.0-106.116 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/linux-image-5.15.0-106-generic-64k | <5.15.0-106.116 | 5.15.0-106.116 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/linux-image-5.15.0-106-generic-lpae | <5.15.0-106.116 | 5.15.0-106.116 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/linux-image-5.15.0-106-lowlatency | <5.15.0-106.116 | 5.15.0-106.116 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/linux-image-5.15.0-106-lowlatency-64k | <5.15.0-106.116 | 5.15.0-106.116 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/linux-image-5.15.0-1063-azure | <5.15.0-1063.72 | 5.15.0-1063.72 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/linux-image-5.15.0-1063-azure-fde | <5.15.0-1063.72.1 | 5.15.0-1063.72.1 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/linux-image-azure-fde-lts-22.04 | <5.15.0.1063.72.41 | 5.15.0.1063.72.41 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/linux-image-azure-lts-22.04 | <5.15.0.1063.61 | 5.15.0.1063.61 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/linux-image-gcp-lts-22.04 | <5.15.0.1059.55 | 5.15.0.1059.55 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/linux-image-generic | <5.15.0.106.106 | 5.15.0.106.106 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/linux-image-generic-64k | <5.15.0.106.106 | 5.15.0.106.106 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/linux-image-generic-lpae | <5.15.0.106.106 | 5.15.0.106.106 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/linux-image-gke | <5.15.0.1058.57 | 5.15.0.1058.57 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/linux-image-gke-5.15 | <5.15.0.1058.57 | 5.15.0.1058.57 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/linux-image-gkeop | <5.15.0.1044.43 | 5.15.0.1044.43 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/linux-image-gkeop-5.15 | <5.15.0.1044.43 | 5.15.0.1044.43 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/linux-image-ibm | <5.15.0.1054.50 | 5.15.0.1054.50 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/linux-image-kvm | <5.15.0.1058.54 | 5.15.0.1058.54 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/linux-image-lowlatency | <5.15.0.106.101 | 5.15.0.106.101 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/linux-image-lowlatency-64k | <5.15.0.106.101 | 5.15.0.106.101 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/linux-image-nvidia | <5.15.0.1054.54 | 5.15.0.1054.54 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/linux-image-nvidia-lowlatency | <5.15.0.1054.54 | 5.15.0.1054.54 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/linux-image-oracle-lts-22.04 | <5.15.0.1059.55 | 5.15.0.1059.55 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/linux-image-virtual | <5.15.0.106.106 | 5.15.0.106.106 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/linux-image-5.15.0-1044-gkeop | <5.15.0-1044.51~20.04.1 | 5.15.0-1044.51~20.04.1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-5.15.0-1054-ibm | <5.15.0-1054.57~20.04.1 | 5.15.0-1054.57~20.04.1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-5.15.0-1059-gcp | <5.15.0-1059.67~20.04.1 | 5.15.0-1059.67~20.04.1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-5.15.0-1059-oracle | <5.15.0-1059.65~20.04.1 | 5.15.0-1059.65~20.04.1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-5.15.0-106-lowlatency | <5.15.0-106.116~20.04.1 | 5.15.0-106.116~20.04.1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-5.15.0-106-lowlatency-64k | <5.15.0-106.116~20.04.1 | 5.15.0-106.116~20.04.1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-5.15.0-1063-azure | <5.15.0-1063.72~20.04.1 | 5.15.0-1063.72~20.04.1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-5.15.0-1063-azure-fde | <5.15.0-1063.72~20.04.1.1 | 5.15.0-1063.72~20.04.1.1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-azure | <5.15.0.1063.72~20.04.1 | 5.15.0.1063.72~20.04.1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-azure-cvm | <5.15.0.1063.72~20.04.1 | 5.15.0.1063.72~20.04.1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-azure-fde | <5.15.0.1063.72~20.04.1.41 | 5.15.0.1063.72~20.04.1.41 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-gcp | <5.15.0.1059.67~20.04.1 | 5.15.0.1059.67~20.04.1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-gkeop-5.15 | <5.15.0.1044.51~20.04.1 | 5.15.0.1044.51~20.04.1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-ibm | <5.15.0.1054.57~20.04.1 | 5.15.0.1054.57~20.04.1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-lowlatency-64k-hwe-20.04 | <5.15.0.106.116~20.04.1 | 5.15.0.106.116~20.04.1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-lowlatency-hwe-20.04 | <5.15.0.106.116~20.04.1 | 5.15.0.106.116~20.04.1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-oracle | <5.15.0.1059.65~20.04.1 | 5.15.0.1059.65~20.04.1 |
Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The vulnerability identified in USN-6766-1 has a severity level that poses a significant risk of denial of service to affected systems.
To mitigate the vulnerability outlined in USN-6766-1, you should upgrade to the recommended kernel versions provided in the advisory.
USN-6766-1 affects Ubuntu 22.04 users running specific linux-image packages related to Open vSwitch.
A local attacker can exploit USN-6766-1 to perform a denial of service attack, potentially crashing the system.
The specific vulnerability ID for the issue described in USN-6766-1 is CVE-2024-1151.