First published: Wed May 15 2024(Updated: )
It was discovered that the Open vSwitch implementation in the Linux kernel could overflow its stack during recursive action operations under certain conditions. A local attacker could use this to cause a denial of service (system crash). (CVE-2024-1151) Sander Wiebing, Alvise de Faveri Tron, Herbert Bos, and Cristiano Giuffrida discovered that the Linux kernel mitigations for the initial Branch History Injection vulnerability (CVE-2022-0001) were insufficient for Intel processors. A local attacker could potentially use this to expose sensitive information. (CVE-2024-2201) Chenyuan Yang discovered that the RDS Protocol implementation in the Linux kernel contained an out-of-bounds read vulnerability. An attacker could use this to possibly cause a denial of service (system crash). (CVE-2024-23849) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems:
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-5.15.0-1054-raspi | <5.15.0-1054.57 | 5.15.0-1054.57 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/linux-image-raspi | <5.15.0.1054.52 | 5.15.0.1054.52 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/linux-image-raspi-nolpae | <5.15.0.1054.52 | 5.15.0.1054.52 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/linux-image-5.15.0-106-generic | <5.15.0-106.116~20.04.1 | 5.15.0-106.116~20.04.1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-5.15.0-106-generic-64k | <5.15.0-106.116~20.04.1 | 5.15.0-106.116~20.04.1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-5.15.0-106-generic-lpae | <5.15.0-106.116~20.04.1 | 5.15.0-106.116~20.04.1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-generic-64k-hwe-20.04 | <5.15.0.106.116~20.04.1 | 5.15.0.106.116~20.04.1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-generic-hwe-20.04 | <5.15.0.106.116~20.04.1 | 5.15.0.106.116~20.04.1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-generic-lpae-hwe-20.04 | <5.15.0.106.116~20.04.1 | 5.15.0.106.116~20.04.1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-oem-20.04 | <5.15.0.106.116~20.04.1 | 5.15.0.106.116~20.04.1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-oem-20.04b | <5.15.0.106.116~20.04.1 | 5.15.0.106.116~20.04.1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-oem-20.04c | <5.15.0.106.116~20.04.1 | 5.15.0.106.116~20.04.1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-virtual-hwe-20.04 | <5.15.0.106.116~20.04.1 | 5.15.0.106.116~20.04.1 |
Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
USN-6766-2 is classified as a denial of service vulnerability that can lead to a system crash.
To fix USN-6766-2, upgrade your system to the patched versions of the affected packages as specified in the advisory.
USN-6766-2 affects Ubuntu 22.04 and 20.04 systems running specific versions of the linux-image packages.
Yes, a local attacker could potentially exploit USN-6766-2 to cause a denial of service.
The vulnerable versions include linux-image-5.15.0-1054-57 and 5.15.0-106.116~20.04.1 among others.