First published: Fri Jul 19 2024(Updated: )
It was discovered that the ATA over Ethernet (AoE) driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2023-6270) It was discovered that the HugeTLB file system component of the Linux Kernel contained a NULL pointer dereference vulnerability. A privileged attacker could possibly use this to to cause a denial of service. (CVE-2024-0841) It was discovered that the Open vSwitch implementation in the Linux kernel could overflow its stack during recursive action operations under certain conditions. A local attacker could use this to cause a denial of service (system crash). (CVE-2024-1151) Gui-Dong Han discovered that the software RAID driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. A privileged attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-23307) Bai Jiaju discovered that the Xceive XC4000 silicon tuner device driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-24861) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems:
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-6.5.0-1017-starfive | <6.5.0-1017.18~22.04.1 | 6.5.0-1017.18~22.04.1 |
=22.04 | ||
All of | ||
ubuntu/linux-image-6.5.0-1023-aws | <6.5.0-1023.23~22.04.1 | 6.5.0-1023.23~22.04.1 |
=22.04 | ||
All of | ||
ubuntu/linux-image-6.5.0-1026-oracle | <6.5.0-1026.26~22.04.1 | 6.5.0-1026.26~22.04.1 |
=22.04 | ||
All of | ||
ubuntu/linux-image-6.5.0-1026-oracle-64k | <6.5.0-1026.26~22.04.1 | 6.5.0-1026.26~22.04.1 |
=22.04 | ||
All of | ||
ubuntu/linux-image-6.5.0-44-lowlatency | <6.5.0-44.44.1~22.04.1 | 6.5.0-44.44.1~22.04.1 |
=22.04 | ||
All of | ||
ubuntu/linux-image-6.5.0-44-lowlatency-64k | <6.5.0-44.44.1~22.04.1 | 6.5.0-44.44.1~22.04.1 |
=22.04 | ||
All of | ||
ubuntu/linux-image-aws | <6.5.0.1023.23~22.04.1 | 6.5.0.1023.23~22.04.1 |
=22.04 | ||
All of | ||
ubuntu/linux-image-lowlatency-64k-hwe-22.04 | <6.5.0.44.44.1~22.04.1 | 6.5.0.44.44.1~22.04.1 |
=22.04 | ||
All of | ||
ubuntu/linux-image-lowlatency-hwe-22.04 | <6.5.0.44.44.1~22.04.1 | 6.5.0.44.44.1~22.04.1 |
=22.04 | ||
All of | ||
ubuntu/linux-image-oracle | <6.5.0.1026.26~22.04.1 | 6.5.0.1026.26~22.04.1 |
=22.04 | ||
All of | ||
ubuntu/linux-image-oracle-64k | <6.5.0.1026.26~22.04.1 | 6.5.0.1026.26~22.04.1 |
=22.04 | ||
All of | ||
ubuntu/linux-image-starfive | <6.5.0.1017.18~22.04.1 | 6.5.0.1017.18~22.04.1 |
=22.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)