Linux kernel vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 24.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 14.04 LTS
Summary
Several security issues were fixed in the kernel.
Software Description
- linux - Linux kernel
- linux-aws - Linux kernel for Amazon Web Services (AWS) systems
- linux-azure - Linux kernel for Microsoft Azure Cloud systems
- linux-gcp - Linux kernel for Google Cloud Platform (GCP) systems
- linux-gke - Linux kernel for Google Container Engine (GKE) systems
- linux-gkeop - Linux kernel for Google Container Engine (GKE) systems
- linux-ibm - Linux kernel for IBM cloud systems
- linux-oracle - Linux kernel for Oracle Cloud systems
Details
In the Linux kernel, the following vulnerability has been
resolved: smb: client: fix UAF in async decryption Doing an async
decryption (large read) crashes with a slab-use-after-free way down in the
crypto API. (CVE-2024-50047)
In the Linux kernel, the following vulnerability has been
resolved: ubifs: authentication: Fix use-after-free in ubifs_tnc_end_commit
After an insertion in TNC, the tree might split and cause a node to change
its znode->parent. (CVE-2024-53171)
In the Linux kernel, the following vulnerability has been
resolved: drm/amdgpu: fix usage slab after free (CVE-2024-56551)
In the Linux kernel, the following vulnerability has been
resolved: jfs: fix array-index-out-of-bounds in jfs_readdir The stbl might
contain some invalid values. (CVE-2024-56596)
In the Linux kernel, the following vulnerability has been
resolved: drm/amd/display: Fix out-of-bounds access in
‘dcn21_link_encoder_create’ An issue was identified in the
dcn21_link_encoder_create function where an out-of-bounds access could
occur when the hpd_source index was used to reference the link_enc_hpd_regs
array. (CVE-2024-56608)
In the Linux kernel, the following vulnerability has been
resolved: jffs2: Prevent rtime decompress memory corruption The rtime
decompression routine does not fully check bounds during the entirety of
the decompression pass and can corrupt memory outside the decompression
buffer if the compressed data is corrupted. (CVE-2024-57850)
Update instructions
The problem can be corrected by updating your kernel livepatch to the following
versions:
Ubuntu 20.04 LTS
- aws - 113.1
- azure - 113.1
- gcp - 113.1
- generic - 113.1
- gkeop - 113.1
- ibm - 113.1
- lowlatency - 113.1
- oracle - 113.1
Ubuntu 18.04 LTS
- aws - 113.1
- azure - 113.1
- gcp - 113.1
- generic - 113.1
- lowlatency - 113.1
- oracle - 113.1
Ubuntu 24.04 LTS
- aws - 113.1
- azure - 113.1
- gcp - 113.1
- generic - 113.1
- ibm - 113.1
- oracle - 113.1
Ubuntu 16.04 LTS
- aws - 113.1
- azure - 113.1
- gcp - 113.1
- generic - 113.1
- lowlatency - 113.1
Ubuntu 22.04 LTS
- aws - 113.1
- azure - 113.1
- gcp - 113.1
- generic - 113.1
- gke - 113.1
- ibm - 113.1
- oracle - 113.1
Ubuntu 14.04 LTS
- generic - 113.1
- lowlatency - 113.1
Support Information
Livepatches for supported LTS kernels will receive upgrades for
a period of up to 13 months after the build date of the kernel.
Livepatches for supported HWE kernels which are not based on
an LTS kernel version will receive upgrades for a period of
up to 9 months after the build date of the kernel, or until the end
of support for that kernel’s non-LTS distro release version,
whichever is sooner.