Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 4 |
CVE-ID | CVE-2024-26928 CVE-2024-56658 CVE-2024-35864 CVE-2024-57798 |
CWE-ID | CWE-416 |
Exploitation vector | Local network |
Public exploit | N/A |
Vulnerable software |
Ubuntu Operating systems & Components / Operating system linux-image-oracle (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-lowlatency-hwe-20.04 (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-lowlatency-64k-hwe-20.04 (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-aws (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-virtual (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-raspi-nolpae (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-raspi (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-oracle-lts-22.04 (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-nvidia-tegra-rt (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-nvidia-tegra (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-lowlatency-64k (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-lowlatency (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-kvm (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-ibm (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-gkeop-5.15 (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-gkeop (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-gke-5.15 (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-gke (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-generic-lpae (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-generic-64k (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-generic (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-gcp-lts-22.04 (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-aws-lts-22.04 (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-5.15.0-136-lowlatency-64k (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-5.15.0-136-lowlatency (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-5.15.0-136-generic-lpae (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-5.15.0-136-generic-64k (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-5.15.0-136-generic (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-5.15.0-1081-aws (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-5.15.0-1080-gcp (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-5.15.0-1078-oracle (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-5.15.0-1078-gke (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-5.15.0-1077-kvm (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-5.15.0-1076-intel-iotg (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-5.15.0-1075-raspi (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-5.15.0-1073-ibm (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-5.15.0-1063-gkeop (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-5.15.0-1034-nvidia-tegra-rt (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-5.15.0-1034-nvidia-tegra (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-intel-iotg (Ubuntu package) Other |
Vendor | Canonical Ltd. |
Security Bulletin
This security bulletin contains information about 4 vulnerabilities.
EUVDB-ID: #VU90192
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26928
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a use-after-free error within the cifs_debug_files_proc_show() function in fs/smb/client/cifs_debug.c. A remote non-authenticated attacker can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 20.04 - 22.04
linux-image-oracle (Ubuntu package): before 5.15.0.1078.84~20.04.1
linux-image-lowlatency-hwe-20.04 (Ubuntu package): before 5.15.0.136.147~20.04.1
linux-image-lowlatency-64k-hwe-20.04 (Ubuntu package): before 5.15.0.136.147~20.04.1
linux-image-aws (Ubuntu package): before 5.15.0.1081.88~20.04.1
linux-image-virtual (Ubuntu package): before 5.15.0.136.134
linux-image-raspi-nolpae (Ubuntu package): before 5.15.0.1075.73
linux-image-raspi (Ubuntu package): before 5.15.0.1075.73
linux-image-oracle-lts-22.04 (Ubuntu package): before 5.15.0.1078.74
linux-image-nvidia-tegra-rt (Ubuntu package): before 5.15.0.1034.34
linux-image-nvidia-tegra (Ubuntu package): before 5.15.0.1034.34
linux-image-lowlatency-64k (Ubuntu package): before 5.15.0.136.123
linux-image-lowlatency (Ubuntu package): before 5.15.0.136.123
linux-image-kvm (Ubuntu package): before 5.15.0.1077.73
linux-image-intel-iotg (Ubuntu package): before 5.15.0.1076.76
linux-image-ibm (Ubuntu package): before 5.15.0.1073.69
linux-image-gkeop-5.15 (Ubuntu package): before 5.15.0.1063.62
linux-image-gkeop (Ubuntu package): before 5.15.0.1063.62
linux-image-gke-5.15 (Ubuntu package): before 5.15.0.1078.77
linux-image-gke (Ubuntu package): before 5.15.0.1078.77
linux-image-generic-lpae (Ubuntu package): before 5.15.0.136.134
linux-image-generic-64k (Ubuntu package): before 5.15.0.136.134
linux-image-generic (Ubuntu package): before 5.15.0.136.134
linux-image-gcp-lts-22.04 (Ubuntu package): before 5.15.0.1080.76
linux-image-aws-lts-22.04 (Ubuntu package): before 5.15.0.1081.83
linux-image-5.15.0-136-lowlatency-64k (Ubuntu package): before 5.15.0-136.147~20.04.1
linux-image-5.15.0-136-lowlatency (Ubuntu package): before 5.15.0-136.147~20.04.1
linux-image-5.15.0-136-generic-lpae (Ubuntu package): before 5.15.0-136.147
linux-image-5.15.0-136-generic-64k (Ubuntu package): before 5.15.0-136.147
linux-image-5.15.0-136-generic (Ubuntu package): before 5.15.0-136.147
linux-image-5.15.0-1081-aws (Ubuntu package): before 5.15.0-1081.88~20.04.1
linux-image-5.15.0-1080-gcp (Ubuntu package): before 5.15.0-1080.89
linux-image-5.15.0-1078-oracle (Ubuntu package): before 5.15.0-1078.84~20.04.1
linux-image-5.15.0-1078-gke (Ubuntu package): before 5.15.0-1078.84
linux-image-5.15.0-1077-kvm (Ubuntu package): before 5.15.0-1077.82
linux-image-5.15.0-1076-intel-iotg (Ubuntu package): before 5.15.0-1076.82
linux-image-5.15.0-1075-raspi (Ubuntu package): before 5.15.0-1075.78
linux-image-5.15.0-1073-ibm (Ubuntu package): before 5.15.0-1073.76
linux-image-5.15.0-1063-gkeop (Ubuntu package): before 5.15.0-1063.71
linux-image-5.15.0-1034-nvidia-tegra-rt (Ubuntu package): before 5.15.0-1034.34
linux-image-5.15.0-1034-nvidia-tegra (Ubuntu package): before 5.15.0-1034.34
CPE2.3https://ubuntu.com/security/notices/USN-7406-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102033
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56658
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the LLIST_HEAD(), net_free() and cleanup_net() functions in net/core/net_namespace.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 20.04 - 22.04
linux-image-oracle (Ubuntu package): before 5.15.0.1078.84~20.04.1
linux-image-lowlatency-hwe-20.04 (Ubuntu package): before 5.15.0.136.147~20.04.1
linux-image-lowlatency-64k-hwe-20.04 (Ubuntu package): before 5.15.0.136.147~20.04.1
linux-image-aws (Ubuntu package): before 5.15.0.1081.88~20.04.1
linux-image-virtual (Ubuntu package): before 5.15.0.136.134
linux-image-raspi-nolpae (Ubuntu package): before 5.15.0.1075.73
linux-image-raspi (Ubuntu package): before 5.15.0.1075.73
linux-image-oracle-lts-22.04 (Ubuntu package): before 5.15.0.1078.74
linux-image-nvidia-tegra-rt (Ubuntu package): before 5.15.0.1034.34
linux-image-nvidia-tegra (Ubuntu package): before 5.15.0.1034.34
linux-image-lowlatency-64k (Ubuntu package): before 5.15.0.136.123
linux-image-lowlatency (Ubuntu package): before 5.15.0.136.123
linux-image-kvm (Ubuntu package): before 5.15.0.1077.73
linux-image-intel-iotg (Ubuntu package): before 5.15.0.1076.76
linux-image-ibm (Ubuntu package): before 5.15.0.1073.69
linux-image-gkeop-5.15 (Ubuntu package): before 5.15.0.1063.62
linux-image-gkeop (Ubuntu package): before 5.15.0.1063.62
linux-image-gke-5.15 (Ubuntu package): before 5.15.0.1078.77
linux-image-gke (Ubuntu package): before 5.15.0.1078.77
linux-image-generic-lpae (Ubuntu package): before 5.15.0.136.134
linux-image-generic-64k (Ubuntu package): before 5.15.0.136.134
linux-image-generic (Ubuntu package): before 5.15.0.136.134
linux-image-gcp-lts-22.04 (Ubuntu package): before 5.15.0.1080.76
linux-image-aws-lts-22.04 (Ubuntu package): before 5.15.0.1081.83
linux-image-5.15.0-136-lowlatency-64k (Ubuntu package): before 5.15.0-136.147~20.04.1
linux-image-5.15.0-136-lowlatency (Ubuntu package): before 5.15.0-136.147~20.04.1
linux-image-5.15.0-136-generic-lpae (Ubuntu package): before 5.15.0-136.147
linux-image-5.15.0-136-generic-64k (Ubuntu package): before 5.15.0-136.147
linux-image-5.15.0-136-generic (Ubuntu package): before 5.15.0-136.147
linux-image-5.15.0-1081-aws (Ubuntu package): before 5.15.0-1081.88~20.04.1
linux-image-5.15.0-1080-gcp (Ubuntu package): before 5.15.0-1080.89
linux-image-5.15.0-1078-oracle (Ubuntu package): before 5.15.0-1078.84~20.04.1
linux-image-5.15.0-1078-gke (Ubuntu package): before 5.15.0-1078.84
linux-image-5.15.0-1077-kvm (Ubuntu package): before 5.15.0-1077.82
linux-image-5.15.0-1076-intel-iotg (Ubuntu package): before 5.15.0-1076.82
linux-image-5.15.0-1075-raspi (Ubuntu package): before 5.15.0-1075.78
linux-image-5.15.0-1073-ibm (Ubuntu package): before 5.15.0-1073.76
linux-image-5.15.0-1063-gkeop (Ubuntu package): before 5.15.0-1063.71
linux-image-5.15.0-1034-nvidia-tegra-rt (Ubuntu package): before 5.15.0-1034.34
linux-image-5.15.0-1034-nvidia-tegra (Ubuntu package): before 5.15.0-1034.34
CPE2.3https://ubuntu.com/security/notices/USN-7406-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90149
Risk: Medium
CVSSv4.0: 4.3 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2024-35864
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a use-after-free error within the smb2_is_valid_lease_break() function in fs/smb/client/smb2misc.c. A remote non-authenticated attacker can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 20.04 - 22.04
linux-image-oracle (Ubuntu package): before 5.15.0.1078.84~20.04.1
linux-image-lowlatency-hwe-20.04 (Ubuntu package): before 5.15.0.136.147~20.04.1
linux-image-lowlatency-64k-hwe-20.04 (Ubuntu package): before 5.15.0.136.147~20.04.1
linux-image-aws (Ubuntu package): before 5.15.0.1081.88~20.04.1
linux-image-virtual (Ubuntu package): before 5.15.0.136.134
linux-image-raspi-nolpae (Ubuntu package): before 5.15.0.1075.73
linux-image-raspi (Ubuntu package): before 5.15.0.1075.73
linux-image-oracle-lts-22.04 (Ubuntu package): before 5.15.0.1078.74
linux-image-nvidia-tegra-rt (Ubuntu package): before 5.15.0.1034.34
linux-image-nvidia-tegra (Ubuntu package): before 5.15.0.1034.34
linux-image-lowlatency-64k (Ubuntu package): before 5.15.0.136.123
linux-image-lowlatency (Ubuntu package): before 5.15.0.136.123
linux-image-kvm (Ubuntu package): before 5.15.0.1077.73
linux-image-intel-iotg (Ubuntu package): before 5.15.0.1076.76
linux-image-ibm (Ubuntu package): before 5.15.0.1073.69
linux-image-gkeop-5.15 (Ubuntu package): before 5.15.0.1063.62
linux-image-gkeop (Ubuntu package): before 5.15.0.1063.62
linux-image-gke-5.15 (Ubuntu package): before 5.15.0.1078.77
linux-image-gke (Ubuntu package): before 5.15.0.1078.77
linux-image-generic-lpae (Ubuntu package): before 5.15.0.136.134
linux-image-generic-64k (Ubuntu package): before 5.15.0.136.134
linux-image-generic (Ubuntu package): before 5.15.0.136.134
linux-image-gcp-lts-22.04 (Ubuntu package): before 5.15.0.1080.76
linux-image-aws-lts-22.04 (Ubuntu package): before 5.15.0.1081.83
linux-image-5.15.0-136-lowlatency-64k (Ubuntu package): before 5.15.0-136.147~20.04.1
linux-image-5.15.0-136-lowlatency (Ubuntu package): before 5.15.0-136.147~20.04.1
linux-image-5.15.0-136-generic-lpae (Ubuntu package): before 5.15.0-136.147
linux-image-5.15.0-136-generic-64k (Ubuntu package): before 5.15.0-136.147
linux-image-5.15.0-136-generic (Ubuntu package): before 5.15.0-136.147
linux-image-5.15.0-1081-aws (Ubuntu package): before 5.15.0-1081.88~20.04.1
linux-image-5.15.0-1080-gcp (Ubuntu package): before 5.15.0-1080.89
linux-image-5.15.0-1078-oracle (Ubuntu package): before 5.15.0-1078.84~20.04.1
linux-image-5.15.0-1078-gke (Ubuntu package): before 5.15.0-1078.84
linux-image-5.15.0-1077-kvm (Ubuntu package): before 5.15.0-1077.82
linux-image-5.15.0-1076-intel-iotg (Ubuntu package): before 5.15.0-1076.82
linux-image-5.15.0-1075-raspi (Ubuntu package): before 5.15.0-1075.78
linux-image-5.15.0-1073-ibm (Ubuntu package): before 5.15.0-1073.76
linux-image-5.15.0-1063-gkeop (Ubuntu package): before 5.15.0-1063.71
linux-image-5.15.0-1034-nvidia-tegra-rt (Ubuntu package): before 5.15.0-1034.34
linux-image-5.15.0-1034-nvidia-tegra (Ubuntu package): before 5.15.0-1034.34
CPE2.3https://ubuntu.com/security/notices/USN-7406-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102915
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57798
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the drm_dp_mst_up_req_work() and drm_dp_mst_handle_up_req() functions in drivers/gpu/drm/display/drm_dp_mst_topology.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 20.04 - 22.04
linux-image-oracle (Ubuntu package): before 5.15.0.1078.84~20.04.1
linux-image-lowlatency-hwe-20.04 (Ubuntu package): before 5.15.0.136.147~20.04.1
linux-image-lowlatency-64k-hwe-20.04 (Ubuntu package): before 5.15.0.136.147~20.04.1
linux-image-aws (Ubuntu package): before 5.15.0.1081.88~20.04.1
linux-image-virtual (Ubuntu package): before 5.15.0.136.134
linux-image-raspi-nolpae (Ubuntu package): before 5.15.0.1075.73
linux-image-raspi (Ubuntu package): before 5.15.0.1075.73
linux-image-oracle-lts-22.04 (Ubuntu package): before 5.15.0.1078.74
linux-image-nvidia-tegra-rt (Ubuntu package): before 5.15.0.1034.34
linux-image-nvidia-tegra (Ubuntu package): before 5.15.0.1034.34
linux-image-lowlatency-64k (Ubuntu package): before 5.15.0.136.123
linux-image-lowlatency (Ubuntu package): before 5.15.0.136.123
linux-image-kvm (Ubuntu package): before 5.15.0.1077.73
linux-image-intel-iotg (Ubuntu package): before 5.15.0.1076.76
linux-image-ibm (Ubuntu package): before 5.15.0.1073.69
linux-image-gkeop-5.15 (Ubuntu package): before 5.15.0.1063.62
linux-image-gkeop (Ubuntu package): before 5.15.0.1063.62
linux-image-gke-5.15 (Ubuntu package): before 5.15.0.1078.77
linux-image-gke (Ubuntu package): before 5.15.0.1078.77
linux-image-generic-lpae (Ubuntu package): before 5.15.0.136.134
linux-image-generic-64k (Ubuntu package): before 5.15.0.136.134
linux-image-generic (Ubuntu package): before 5.15.0.136.134
linux-image-gcp-lts-22.04 (Ubuntu package): before 5.15.0.1080.76
linux-image-aws-lts-22.04 (Ubuntu package): before 5.15.0.1081.83
linux-image-5.15.0-136-lowlatency-64k (Ubuntu package): before 5.15.0-136.147~20.04.1
linux-image-5.15.0-136-lowlatency (Ubuntu package): before 5.15.0-136.147~20.04.1
linux-image-5.15.0-136-generic-lpae (Ubuntu package): before 5.15.0-136.147
linux-image-5.15.0-136-generic-64k (Ubuntu package): before 5.15.0-136.147
linux-image-5.15.0-136-generic (Ubuntu package): before 5.15.0-136.147
linux-image-5.15.0-1081-aws (Ubuntu package): before 5.15.0-1081.88~20.04.1
linux-image-5.15.0-1080-gcp (Ubuntu package): before 5.15.0-1080.89
linux-image-5.15.0-1078-oracle (Ubuntu package): before 5.15.0-1078.84~20.04.1
linux-image-5.15.0-1078-gke (Ubuntu package): before 5.15.0-1078.84
linux-image-5.15.0-1077-kvm (Ubuntu package): before 5.15.0-1077.82
linux-image-5.15.0-1076-intel-iotg (Ubuntu package): before 5.15.0-1076.82
linux-image-5.15.0-1075-raspi (Ubuntu package): before 5.15.0-1075.78
linux-image-5.15.0-1073-ibm (Ubuntu package): before 5.15.0-1073.76
linux-image-5.15.0-1063-gkeop (Ubuntu package): before 5.15.0-1063.71
linux-image-5.15.0-1034-nvidia-tegra-rt (Ubuntu package): before 5.15.0-1034.34
linux-image-5.15.0-1034-nvidia-tegra (Ubuntu package): before 5.15.0-1034.34
CPE2.3https://ubuntu.com/security/notices/USN-7406-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.