First published: Mon Mar 18 2024(Updated: )
It was discovered that the Layer 2 Tunneling Protocol (L2TP) implementation in the Linux kernel contained a race condition when releasing PPPoL2TP sockets in certain conditions, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-20567) It was discovered that the ext4 file system implementation in the Linux kernel did not properly handle block device modification while it is mounted. A privileged attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information. (CVE-2023-34256) Eric Dumazet discovered that the netfilter subsystem in the Linux kernel did not properly handle DCCP conntrack buffers in certain situations, leading to an out-of-bounds read vulnerability. An attacker could possibly use this to expose sensitive information (kernel memory). (CVE-2023-39197) It was discovered that a race condition existed in the AppleTalk networking subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-51781) It was discovered that the ext4 file system implementation in the Linux kernel did not properly handle the remount operation in certain cases, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information. (CVE-2024-0775) Notselwyn discovered that the netfilter subsystem in the Linux kernel did not properly handle verdict parameters in certain cases, leading to a use- after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2024-1086) It was discovered that a race condition existed in the SCSI Emulex LightPulse Fibre Channel driver in the Linux kernel when unregistering FCF and re-scanning an HBA FCF table, leading to a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service (system crash). (CVE-2024-24855)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-4.4.0-1130-kvm | <4.4.0-1130.140 | 4.4.0-1130.140 |
Ubuntu Ubuntu | =16.04 | |
All of | ||
ubuntu/linux-image-4.4.0-252-generic | <4.4.0-252.286 | 4.4.0-252.286 |
Ubuntu Ubuntu | =16.04 | |
All of | ||
ubuntu/linux-image-4.4.0-252-lowlatency | <4.4.0-252.286 | 4.4.0-252.286 |
Ubuntu Ubuntu | =16.04 | |
All of | ||
ubuntu/linux-image-generic | <4.4.0.252.258 | 4.4.0.252.258 |
Ubuntu Ubuntu | =16.04 | |
All of | ||
ubuntu/linux-image-generic-lts-xenial | <4.4.0.252.258 | 4.4.0.252.258 |
Ubuntu Ubuntu | =16.04 | |
All of | ||
ubuntu/linux-image-kvm | <4.4.0.1130.127 | 4.4.0.1130.127 |
Ubuntu Ubuntu | =16.04 | |
All of | ||
ubuntu/linux-image-lowlatency | <4.4.0.252.258 | 4.4.0.252.258 |
Ubuntu Ubuntu | =16.04 | |
All of | ||
ubuntu/linux-image-lowlatency-lts-xenial | <4.4.0.252.258 | 4.4.0.252.258 |
Ubuntu Ubuntu | =16.04 | |
All of | ||
ubuntu/linux-image-virtual | <4.4.0.252.258 | 4.4.0.252.258 |
Ubuntu Ubuntu | =16.04 | |
All of | ||
ubuntu/linux-image-virtual-lts-xenial | <4.4.0.252.258 | 4.4.0.252.258 |
Ubuntu Ubuntu | =16.04 | |
All of | ||
ubuntu/linux-image-4.4.0-1129-aws | <4.4.0-1129.135 | 4.4.0-1129.135 |
Ubuntu Ubuntu | =14.04 | |
All of | ||
ubuntu/linux-image-4.4.0-252-generic | <4.4.0-252.286~14.04.1 | 4.4.0-252.286~14.04.1 |
Ubuntu Ubuntu | =14.04 | |
All of | ||
ubuntu/linux-image-4.4.0-252-lowlatency | <4.4.0-252.286~14.04.1 | 4.4.0-252.286~14.04.1 |
Ubuntu Ubuntu | =14.04 | |
All of | ||
ubuntu/linux-image-aws | <4.4.0.1129.126 | 4.4.0.1129.126 |
Ubuntu Ubuntu | =14.04 | |
All of | ||
ubuntu/linux-image-generic-lts-xenial | <4.4.0.252.219 | 4.4.0.252.219 |
Ubuntu Ubuntu | =14.04 | |
All of | ||
ubuntu/linux-image-lowlatency-lts-xenial | <4.4.0.252.219 | 4.4.0.252.219 |
Ubuntu Ubuntu | =14.04 | |
All of | ||
ubuntu/linux-image-virtual-lts-xenial | <4.4.0.252.219 | 4.4.0.252.219 |
Ubuntu Ubuntu | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)