Packages
- linux-aws - Linux kernel for Amazon Web Services (AWS) systems
- linux-aws-5.15 - Linux kernel for Amazon Web Services (AWS) systems
Details
Chih-Yen Chang discovered that the KSMBD implementation in the Linux kernel
did not properly validate certain data structure fields when parsing lease
contexts, leading to an out-of-bounds read vulnerability. A remote attacker
could use this to cause a denial of service (system crash) or possibly
expose sensitive information. (CVE-2023-1194)
Quentin Minster discovered that a race condition existed in the KSMBD
implementation in the Linux kernel, leading to a use-after-free
vulnerability. A remote attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2023-32254)
It was discovered that a race condition existed in the KSMBD implementation
in the Linux kernel when handling session connections, leading to a use-
after-free vulnerability. A remote attacker could use this to cause a
denial of service...
Chih-Yen Chang discovered that the KSMBD implementation in the Linux kernel
did not properly validate certain data structure fields when parsing lease
contexts, leading to an out-of-bounds read vulnerability. A remote attacker
could use this to cause a denial of service (system crash) or possibly
expose sensitive information. (CVE-2023-1194)
Quentin Minster discovered that a race condition existed in the KSMBD
implementation in the Linux kernel, leading to a use-after-free
vulnerability. A remote attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2023-32254)
It was discovered that a race condition existed in the KSMBD implementation
in the Linux kernel when handling session connections, leading to a use-
after-free vulnerability. A remote attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-32258)
It was discovered that the KSMBD implementation in the Linux kernel did not
properly validate buffer sizes in certain operations, leading to an integer
underflow and out-of-bounds read vulnerability. A remote attacker could use
this to cause a denial of service (system crash) or possibly expose
sensitive information. (CVE-2023-38427)
Chih-Yen Chang discovered that the KSMBD implementation in the Linux kernel
did not properly validate SMB request protocol IDs, leading to a out-of-
bounds read vulnerability. A remote attacker could possibly use this to
cause a denial of service (system crash). (CVE-2023-38430)
Chih-Yen Chang discovered that the KSMBD implementation in the Linux kernel
did not properly validate packet header sizes in certain situations,
leading to an out-of-bounds read vulnerability. A remote attacker could use
this to cause a denial of service (system crash) or possibly expose
sensitive information. (CVE-2023-38431)
It was discovered that the KSMBD implementation in the Linux kernel did not
properly handle session setup requests, leading to an out-of-bounds read
vulnerability. A remote attacker could use this to expose sensitive
information. (CVE-2023-3867)
Pratyush Yadav discovered that the Xen network backend implementation in
the Linux kernel did not properly handle zero length data request, leading
to a null pointer dereference vulnerability. An attacker in a guest VM
could possibly use this to cause a denial of service (host domain crash).
(CVE-2023-46838)
It was discovered that the IPv6 implementation of the Linux kernel did not
properly manage route cache memory usage. A remote attacker could use this
to cause a denial of service (memory exhaustion). (CVE-2023-52340)
It was discovered that the device mapper driver in the Linux kernel did not
properly validate target size during certain memory allocations. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2023-52429, CVE-2024-23851)
Yang Chaoming discovered that the KSMBD implementation in the Linux kernel
did not properly validate request buffer sizes, leading to an out-of-bounds
read vulnerability. An attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2024-22705)
Chenyuan Yang discovered that the btrfs file system in the Linux kernel did
not properly handle read operations on newly created subvolumes in certain
conditions. A local attacker could use this to cause a denial of service
(system crash). (CVE-2024-23850)
It was discovered that a race condition existed in the Bluetooth subsystem
in the Linux kernel, leading to a null pointer dereference vulnerability. A
privileged local attacker could use this to possibly cause a denial of
service (system crash). (CVE-2024-24860)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Architecture specifics;
- Block layer;
- Cryptographic API;
- Android drivers;
- EDAC drivers;
- GPU drivers;
- Media drivers;
- Multifunction device drivers;
- MTD block device drivers;
- Network drivers;
- NVME drivers;
- TTY drivers;
- Userspace I/O drivers;
- EFI Variable file system;
- F2FS file system;
- GFS2 file system;
- SMB network file system;
- BPF subsystem;
- IPv6 Networking;
- Network Traffic Control;
- AppArmor security module
Update instructions
After a standard system update you need to reboot your computer to make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Ubuntu Release | Package Version | ||
---|---|---|---|
22.04 jammy | linux-image-5.15.0-1057-aws – 5.15.0-1057.63 | ||
linux-image-aws-lts-22.04 – 5.15.0.1057.58 | |||
20.04 focal | linux-image-5.15.0-1057-aws – 5.15.0-1057.63~20.04.1 | ||
linux-image-aws – 5.15.0.1057.63~20.04.1 |
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.
References
- CVE-2024-26633
- CVE-2024-26631
- CVE-2024-26598
- CVE-2024-26597
- CVE-2024-26591
- CVE-2024-26589
- CVE-2024-26586
- CVE-2024-24860
- CVE-2024-23851
- CVE-2024-23850
- CVE-2024-26633
- CVE-2024-26631
- CVE-2024-26598
- CVE-2024-26597
- CVE-2024-26591
- CVE-2024-26589
- CVE-2024-26586
- CVE-2024-24860
- CVE-2024-23851
- CVE-2024-23850
- CVE-2024-22705
- CVE-2023-52612
- CVE-2023-52610
- CVE-2023-52609
- CVE-2023-52480
- CVE-2023-52470
- CVE-2023-52469
- CVE-2023-52467
- CVE-2023-52464
- CVE-2023-52463
- CVE-2023-52462
- CVE-2023-52458
- CVE-2023-52457
- CVE-2023-52456
- CVE-2023-52454
- CVE-2023-52451
- CVE-2023-52449
- CVE-2023-52448
- CVE-2023-52445
- CVE-2023-52444
- CVE-2023-52443
- CVE-2023-52442
- CVE-2023-52441
- CVE-2023-52439
- CVE-2023-52438
- CVE-2023-52436
- CVE-2023-52429
- CVE-2023-52340
- CVE-2023-46838
- CVE-2023-3867
- CVE-2023-38431
- CVE-2023-38430
- CVE-2023-38427
- CVE-2023-32258
- CVE-2023-32254
- CVE-2023-1194
Related notices
- USN-7496-1
- USN-7496-4
- USN-7496-2
- USN-7496-3
- USN-7496-5
- USN-7413-1
- USN-7401-1
- USN-7393-1
- USN-7295-1
- USN-7294-1
- USN-7496-1
- USN-7496-4
- USN-7496-2
- USN-7496-3
- USN-7496-5
- USN-7413-1
- USN-7401-1
- USN-7393-1
- USN-7295-1
- USN-7294-1
- USN-7294-2
- USN-7294-3
- USN-7294-4
- USN-7293-1
- USN-7148-1
- USN-7121-1
- USN-7121-2
- USN-7121-3
- USN-7006-1
- USN-6973-1
- USN-6973-2
- USN-6973-3
- USN-6973-4
- USN-6972-1
- USN-6972-2
- USN-6972-3
- USN-6972-4
- USN-6938-1
- USN-6926-1
- USN-6926-2
- USN-6926-3
- USN-6896-1
- USN-6896-2
- USN-6896-3
- USN-6896-4
- USN-6896-5
- USN-6819-1
- USN-6819-2
- USN-6819-3
- USN-6819-4
- USN-6818-1
- USN-6818-2
- USN-6818-3
- USN-6818-4
- USN-6777-1
- USN-6777-2
- USN-6777-3
- USN-6777-4
- USN-6767-1
- USN-6767-2
- USN-6743-1
- USN-6743-2
- USN-6743-3
- USN-6741-1
- USN-6740-1
- USN-6739-1
- USN-6726-1
- USN-6726-2
- USN-6726-3
- USN-6725-1
- USN-6724-1
- USN-6724-2
- USN-6707-1
- USN-6707-2
- USN-6707-3
- USN-6707-4
- USN-6701-1
- USN-6701-2
- USN-6701-3
- USN-6701-4
- USN-6688-1
- USN-6639-1
- USN-6520-1
- USN-6466-1
- USN-6464-1
- USN-6412-1
- USN-6344-1
- USN-6338-1
- USN-6338-2
- USN-6285-1
- USN-6283-1
- USN-6173-1
- LSN-0104-1
- LSN-0103-1
Have additional questions?