First published: Thu Aug 01 2024(Updated: )
黄思聪 discovered that the NFC Controller Interface (NCI) implementation in the Linux kernel did not properly handle certain memory allocation failure conditions, leading to a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service (system crash). (CVE-2023-46343) It was discovered that a race condition existed in the Bluetooth subsystem in the Linux kernel when modifying certain settings values through debugfs. A privileged local attacker could use this to cause a denial of service. (CVE-2024-24857, CVE-2024-24858, CVE-2024-24859) Chenyuan Yang discovered that the Unsorted Block Images (UBI) flash device volume management subsystem did not properly validate logical eraseblock sizes in certain situations. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-25739) Supraja Sridhara, Benedict Schlüter, Mark Kuhne, Andrin Bertschi, and Shweta Shinde discovered that the Confidential Computing framework in the Linux kernel for x86 platforms did not properly handle 32-bit emulation on TDX and SEV. An attacker with access to the VMM could use this to cause a denial of service (guest crash) or possibly execute arbitrary code. (CVE-2024-25744) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems:
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-4.15.0-1179-azure | <4.15.0-1179.194 | 4.15.0-1179.194 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-azure-lts-18.04 | <4.15.0.1179.147 | 4.15.0.1179.147 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-4.15.0-1179-azure | <4.15.0-1179.194~14.04.1 | 4.15.0-1179.194~14.04.1 |
Ubuntu Ubuntu | =14.04 | |
All of | ||
ubuntu/linux-image-azure | <4.15.0.1179.194~14.04.1 | 4.15.0.1179.194~14.04.1 |
Ubuntu Ubuntu | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)