Lucene search

K
ubuntuUbuntuUSN-6895-1
HistoryJul 12, 2024 - 12:00 a.m.

Linux kernel vulnerabilities

2024-07-1200:00:00
ubuntu.com
13
ubuntu 23.10; ubuntu 22.04 lts; linux kernel; ata over ethernet driver; hugetlb file system; open vswitch implementation; software raid driver; xceive xc4000 silicon tuner device driver; arm64 architecture; powerpc architecture; x86 architecture; cryptographic api; android drivers; block layer subsystem; bluetooth drivers; dma engine subsystem; gpu drivers; hid subsystem; hardware monitoring drivers; i2c subsystem; iio adc drivers; iio subsystem; iio magnetometer sensors drivers; infiniband drivers; on-chip interconnect management framework; media drivers; network drivers; phy drivers; mediatek pm domains; scsi drivers; tty drivers; usb subsystem; framebuffer layer; afs file system; btrfs file system; ceph distributed file system; ext4 file system; file systems infrastructure; nilfs2 file system; ntfs3 file system; smb network file system; core kernel; memory management; bluetooth subsystem; can network layer; devlink api; handshake api; hsr network protocol; ipv4 networking; ipv6 networking; mac80211 subsystem; multipath tcp; netfilter; nfc subsystem; rxrpc session sockets; tipc protocol; unix domain sockets; realtek audio codecs

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

8.3

Confidence

High

EPSS

0.001

Percentile

17.8%

Releases

  • Ubuntu 23.10
  • Ubuntu 22.04 LTS

Packages

  • linux - Linux kernel
  • linux-gcp - Linux kernel for Google Cloud Platform (GCP) systems
  • linux-nvidia-6.5 - Linux kernel for NVIDIA systems
  • linux-raspi - Linux kernel for Raspberry Pi systems

Details

It was discovered that the ATA over Ethernet (AoE) driver in the Linux
kernel contained a race condition, leading to a use-after-free
vulnerability. An attacker could use this to cause a denial of service or
possibly execute arbitrary code. (CVE-2023-6270)

It was discovered that the HugeTLB file system component of the Linux
Kernel contained a NULL pointer dereference vulnerability. A privileged
attacker could possibly use this to to cause a denial of service.
(CVE-2024-0841)

It was discovered that the Open vSwitch implementation in the Linux kernel
could overflow its stack during recursive action operations under certain
conditions. A local attacker could use this to cause a denial of service
(system crash). (CVE-2024-1151)

Gui-Dong Han discovered that the software RAID driver in the Linux kernel
contained a race condition, leading to an integer overflow vulnerability. A
privileged attacker could possibly use this to cause a denial of service
(system crash). (CVE-2024-23307)

Bai Jiaju discovered that the Xceive XC4000 silicon tuner device driver in
the Linux kernel contained a race condition, leading to an integer overflow
vulnerability. An attacker could possibly use this to cause a denial of
service (system crash). (CVE-2024-24861)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:

  • ARM64 architecture;
  • PowerPC architecture;
  • x86 architecture;
  • Cryptographic API;
  • Android drivers;
  • Block layer subsystem;
  • Bluetooth drivers;
  • DMA engine subsystem;
  • GPU drivers;
  • HID subsystem;
  • Hardware monitoring drivers;
  • I2C subsystem;
  • IIO ADC drivers;
  • IIO subsystem;
  • IIO Magnetometer sensors drivers;
  • InfiniBand drivers;
  • On-Chip Interconnect management framework;
  • Multiple devices driver;
  • Media drivers;
  • Network drivers;
  • PHY drivers;
  • MediaTek PM domains;
  • SCSI drivers;
  • TTY drivers;
  • USB subsystem;
  • DesignWare USB3 driver;
  • Framebuffer layer;
  • AFS file system;
  • BTRFS file system;
  • Ceph distributed file system;
  • Ext4 file system;
  • File systems infrastructure;
  • NILFS2 file system;
  • NTFS3 file system;
  • SMB network file system;
  • Core kernel;
  • Memory management;
  • Bluetooth subsystem;
  • CAN network layer;
  • Devlink API;
  • Handshake API;
  • HSR network protocol;
  • IPv4 networking;
  • IPv6 networking;
  • MAC80211 subsystem;
  • Multipath TCP;
  • Netfilter;
  • NFC subsystem;
  • RxRPC session sockets;
  • TIPC protocol;
  • Unix domain sockets;
  • Realtek audio codecs;
    (CVE-2024-26822, CVE-2024-26917, CVE-2024-26723, CVE-2024-26715,
    CVE-2024-26718, CVE-2024-26664, CVE-2024-26707, CVE-2024-26697,
    CVE-2024-26720, CVE-2024-26660, CVE-2024-26677, CVE-2024-26736,
    CVE-2024-26719, CVE-2024-26642, CVE-2024-26700, CVE-2024-26666,
    CVE-2024-26684, CVE-2024-26803, CVE-2024-26698, CVE-2024-26711,
    CVE-2024-26922, CVE-2024-26828, CVE-2024-26910, CVE-2024-26829,
    CVE-2024-26685, CVE-2024-26920, CVE-2024-26696, CVE-2024-26826,
    CVE-2023-52642, CVE-2024-26703, CVE-2024-26708, CVE-2024-26838,
    CVE-2024-26716, CVE-2023-52631, CVE-2024-26782, CVE-2024-26593,
    CVE-2024-26659, CVE-2024-26825, CVE-2024-26824, CVE-2024-26712,
    CVE-2024-26674, CVE-2024-26722, CVE-2023-52643, CVE-2024-26714,
    CVE-2024-26691, CVE-2024-27416, CVE-2024-26830, CVE-2023-52880,
    CVE-2024-26702, CVE-2023-52645, CVE-2024-26820, CVE-2024-26662,
    CVE-2024-26689, CVE-2024-26676, CVE-2024-26923, CVE-2024-26603,
    CVE-2024-26818, CVE-2023-52638, CVE-2024-26733, CVE-2024-26601,
    CVE-2024-26790, CVE-2024-26661, CVE-2024-26600, CVE-2024-26680,
    CVE-2024-26748, CVE-2024-26792, CVE-2024-26889, CVE-2024-26681,
    CVE-2024-26688, CVE-2024-26665, CVE-2024-26602, CVE-2024-26734,
    CVE-2024-35833, CVE-2024-26919, CVE-2024-26916, CVE-2024-26667,
    CVE-2024-26606, CVE-2024-26693, CVE-2024-26717, CVE-2023-52637,
    CVE-2024-26831, CVE-2024-26663, CVE-2024-26694, CVE-2024-26802,
    CVE-2024-26710, CVE-2024-26789, CVE-2024-26679, CVE-2024-26675,
    CVE-2024-26798, CVE-2024-26695, CVE-2024-26726, CVE-2024-26926,
    CVE-2024-26735, CVE-2024-26898, CVE-2024-26890)

References

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

8.3

Confidence

High

EPSS

0.001

Percentile

17.8%