First published: Fri Sep 13 2024(Updated: )
It was discovered that the JFS file system contained an out-of-bounds read vulnerability when printing xattr debug information. A local attacker could use this to cause a denial of service (system crash). (CVE-2024-40902) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems:
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-7003-3 is critical due to the potential for a local attacker to exploit the out-of-bounds read vulnerability leading to a denial of service.
To fix USN-7003-3, you should upgrade your Linux kernel to the patched version available for your Ubuntu 20.04 system.
USN-7003-3 affects the linux-image-5.4.0-1051-xilinx-zynqmp and linux-image-xilinx-zynqmp packages with specific versions before the update.
Yes, if you are using Ubuntu 20.04 with an outdated kernel version specified in USN-7003-3, your system is vulnerable.
CVE-2024-40902 could allow a local attacker to cause a denial of service, potentially leading to system crashes.