First published: Wed Feb 12 2025(Updated: )
Ye Zhang and Nicolas Wu discovered that the io_uring subsystem in the Linux kernel did not properly handle locking for rings with IOPOLL, leading to a double-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-21400) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems:
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-5.4.0-1139-aws | <5.4.0-1139.149 | 5.4.0-1139.149 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-aws-lts-20.04 | <5.4.0.1139.136 | 5.4.0.1139.136 |
Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
USN-7234-4 is classified as a high severity vulnerability due to its potential to cause system crashes or arbitrary code execution.
To fix USN-7234-4, update to the patched kernel version 5.4.0-1139.149 or 5.4.0-1139.136 depending on your system.
USN-7234-4 affects Ubuntu 20.04 systems running specific versions of the Linux kernel, including linux-image-5.4.0-1139-aws and linux-image-aws-lts-20.04.
USN-7234-4 requires local access to exploit, meaning it cannot be exploited remotely.
The potential effects of USN-7234-4 include denial of service through system crashes and the possibility of arbitrary code execution.