USN-6653-4

See a problem?
Source
https://ubuntu.com/security/notices/USN-6653-4
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6653-4.json
JSON Data
https://api.osv.dev/v1/vulns/USN-6653-4
Related
Published
2024-03-04T22:16:36.086007Z
Modified
2024-03-04T22:16:36.086007Z
Summary
linux-gke vulnerabilities
Details

It was discovered that a race condition existed in the ATM (Asynchronous Transfer Mode) subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-51780)

It was discovered that a race condition existed in the AppleTalk networking subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-51781)

Zhenghan Wang discovered that the generic ID allocator implementation in the Linux kernel did not properly check for null bitmap when releasing IDs. A local attacker could use this to cause a denial of service (system crash). (CVE-2023-6915)

Robert Morris discovered that the CIFS network file system implementation in the Linux kernel did not properly validate certain server commands fields, leading to an out-of-bounds read vulnerability. An attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information. (CVE-2024-0565)

Jann Horn discovered that the TLS subsystem in the Linux kernel did not properly handle spliced messages, leading to an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2024-0646)

References

Affected packages

Ubuntu:22.04:LTS / linux-gke

Package

Name
linux-gke
Purl
pkg:deb/ubuntu/linux-gke@5.15.0-1051.56?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1051.56

Affected versions

5.*

5.15.0-1002.2
5.15.0-1003.3
5.15.0-1004.5
5.15.0-1005.6
5.15.0-1006.7
5.15.0-1008.10
5.15.0-1010.13
5.15.0-1011.14
5.15.0-1014.17
5.15.0-1015.18
5.15.0-1016.19
5.15.0-1017.20
5.15.0-1019.23
5.15.0-1020.25
5.15.0-1023.28
5.15.0-1024.29
5.15.0-1027.32
5.15.0-1028.33
5.15.0-1030.35
5.15.0-1031.36
5.15.0-1032.37
5.15.0-1033.38
5.15.0-1034.39
5.15.0-1035.40
5.15.0-1036.41
5.15.0-1037.42
5.15.0-1038.43
5.15.0-1039.44
5.15.0-1040.45
5.15.0-1041.46
5.15.0-1042.47
5.15.0-1044.49
5.15.0-1045.50
5.15.0-1046.51
5.15.0-1047.52
5.15.0-1048.53
5.15.0-1049.54
5.15.0-1050.55

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "linux-buildinfo-5.15.0-1051-gke": "5.15.0-1051.56",
            "linux-gke-tools-5.15.0-1051": "5.15.0-1051.56",
            "linux-image-unsigned-5.15.0-1051-gke": "5.15.0-1051.56",
            "linux-image-unsigned-5.15.0-1051-gke-dbgsym": "5.15.0-1051.56",
            "linux-modules-extra-5.15.0-1051-gke": "5.15.0-1051.56",
            "linux-modules-iwlwifi-5.15.0-1051-gke": "5.15.0-1051.56",
            "linux-modules-5.15.0-1051-gke": "5.15.0-1051.56",
            "linux-tools-5.15.0-1051-gke": "5.15.0-1051.56",
            "linux-headers-5.15.0-1051-gke": "5.15.0-1051.56",
            "linux-gke-headers-5.15.0-1051": "5.15.0-1051.56"
        }
    ]
}