vulnerability

Ubuntu: (Multiple Advisories) (CVE-2023-52806): Linux kernel vulnerabilities

Severity
5
CVSS
(AV:L/AC:L/Au:S/C:N/I:N/A:C)
Published
May 21, 2024
Added
Aug 22, 2024
Modified
Aug 18, 2025

Description

In the Linux kernel, the following vulnerability has been resolved:

ALSA: hda: Fix possible null-ptr-deref when assigning a stream

While AudioDSP drivers assign streams exclusively of HOST or LINK type,
nothing blocks a user to attempt to assign a COUPLED stream. As
supplied substream instance may be a stub, what is the case when
code-loading, such scenario ends with null-ptr-deref.

Solutions

ubuntu-upgrade-linux-image-4-15-0-1134-oracleubuntu-upgrade-linux-image-4-15-0-1155-kvmubuntu-upgrade-linux-image-4-15-0-1165-gcpubuntu-upgrade-linux-image-4-15-0-1172-awsubuntu-upgrade-linux-image-4-15-0-1180-azureubuntu-upgrade-linux-image-4-15-0-228-genericubuntu-upgrade-linux-image-4-15-0-228-lowlatencyubuntu-upgrade-linux-image-4-4-0-1135-awsubuntu-upgrade-linux-image-4-4-0-1136-kvmubuntu-upgrade-linux-image-4-4-0-1173-awsubuntu-upgrade-linux-image-4-4-0-258-genericubuntu-upgrade-linux-image-4-4-0-258-lowlatencyubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-aws-hweubuntu-upgrade-linux-image-aws-lts-18-04ubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-azure-lts-18-04ubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-gcp-lts-18-04ubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-oemubuntu-upgrade-linux-image-oracleubuntu-upgrade-linux-image-oracle-lts-18-04ubuntu-upgrade-linux-image-virtualubuntu-upgrade-linux-image-virtual-hwe-16-04ubuntu-upgrade-linux-image-virtual-lts-xenial
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.