First published: Wed Jul 03 2024(Updated: )
It was discovered that the ext4 file system implementation in the Linux kernel did not properly validate data state on write operations. An attacker could use this to construct a malicious ext4 file system image that, when mounted, could cause a denial of service (system crash). (CVE-2021-33631) It was discovered that the ATA over Ethernet (AoE) driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2023-6270) Sander Wiebing, Alvise de Faveri Tron, Herbert Bos, and Cristiano Giuffrida discovered that the Linux kernel mitigations for the initial Branch History Injection vulnerability (CVE-2022-0001) were insufficient for Intel processors. A local attacker could potentially use this to expose sensitive information. (CVE-2024-2201) Gui-Dong Han discovered that the software RAID driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. A privileged attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-23307) Bai Jiaju discovered that the Xceive XC4000 silicon tuner device driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-24861) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems:
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-4.4.0-1134-kvm | <4.4.0-1134.144 | 4.4.0-1134.144 |
=16.04 | ||
All of | ||
ubuntu/linux-image-4.4.0-1171-aws | <4.4.0-1171.186 | 4.4.0-1171.186 |
=16.04 | ||
All of | ||
ubuntu/linux-image-4.4.0-256-generic | <4.4.0-256.290 | 4.4.0-256.290 |
=16.04 | ||
All of | ||
ubuntu/linux-image-4.4.0-256-lowlatency | <4.4.0-256.290 | 4.4.0-256.290 |
=16.04 | ||
All of | ||
ubuntu/linux-image-aws | <4.4.0.1171.175 | 4.4.0.1171.175 |
=16.04 | ||
All of | ||
ubuntu/linux-image-generic | <4.4.0.256.262 | 4.4.0.256.262 |
=16.04 | ||
All of | ||
ubuntu/linux-image-generic-lts-xenial | <4.4.0.256.262 | 4.4.0.256.262 |
=16.04 | ||
All of | ||
ubuntu/linux-image-kvm | <4.4.0.1134.131 | 4.4.0.1134.131 |
=16.04 | ||
All of | ||
ubuntu/linux-image-lowlatency | <4.4.0.256.262 | 4.4.0.256.262 |
=16.04 | ||
All of | ||
ubuntu/linux-image-lowlatency-lts-xenial | <4.4.0.256.262 | 4.4.0.256.262 |
=16.04 | ||
All of | ||
ubuntu/linux-image-virtual | <4.4.0.256.262 | 4.4.0.256.262 |
=16.04 | ||
All of | ||
ubuntu/linux-image-virtual-lts-xenial | <4.4.0.256.262 | 4.4.0.256.262 |
=16.04 | ||
All of | ||
ubuntu/linux-image-4.4.0-1133-aws | <4.4.0-1133.139 | 4.4.0-1133.139 |
=14.04 | ||
All of | ||
ubuntu/linux-image-4.4.0-256-generic | <4.4.0-256.290~14.04.1 | 4.4.0-256.290~14.04.1 |
=14.04 | ||
All of | ||
ubuntu/linux-image-4.4.0-256-lowlatency | <4.4.0-256.290~14.04.1 | 4.4.0-256.290~14.04.1 |
=14.04 | ||
All of | ||
ubuntu/linux-image-aws | <4.4.0.1133.130 | 4.4.0.1133.130 |
=14.04 | ||
All of | ||
ubuntu/linux-image-generic-lts-xenial | <4.4.0.256.290~14.04.1 | 4.4.0.256.290~14.04.1 |
=14.04 | ||
All of | ||
ubuntu/linux-image-lowlatency-lts-xenial | <4.4.0.256.290~14.04.1 | 4.4.0.256.290~14.04.1 |
=14.04 | ||
All of | ||
ubuntu/linux-image-virtual-lts-xenial | <4.4.0.256.290~14.04.1 | 4.4.0.256.290~14.04.1 |
=14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)