2 months 1 week ago
Chenyuan Yang discovered that the USB Gadget subsystem in the Linux kernel
did not properly check for the device to be enabled before writing. A local
attacker could possibly use this to cause a denial of service.
(CVE-2024-25741)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM32 architecture;
- ARM64 architecture;
- MIPS architecture;
- PA-RISC architecture;
- PowerPC architecture;
- RISC-V architecture;
- S390 architecture;
- User-Mode Linux (UML);
- x86 architecture;
- Block layer subsystem;
- Cryptographic API;
- Android drivers;
- Serial ATA and Parallel ATA drivers;
- ATM drivers;
- Drivers core;
- Null block device driver;
- Ublk userspace block driver;
- Bluetooth drivers;
- Cdrom driver;
- Character device driver;
- Clock framework and drivers;
- Hardware crypto device drivers;
- CXL (Compute Express Link) drivers;
- Buffer Sharing and Synchronization framework;
- DMA engine subsystem;
- Cirrus firmware drivers;
- Qualcomm firmware drivers;
- GPIO subsystem;
- GPU drivers;
- HID subsystem;
- Hardware monitoring drivers;
- I2C subsystem;
- I3C subsystem;
- IIO subsystem;
- InfiniBand drivers;
- Input Device core drivers;
- Input Device (Miscellaneous) drivers;
- IOMMU subsystem;
- IRQ chip drivers;
- ISDN/mISDN subsystem;
- LED subsystem;
- Mailbox framework;
- Multiple devices driver;
- Media drivers;
- Fastrpc Driver;
- VMware VMCI Driver;
- MMC subsystem;
- Ethernet bonding driver;
- Network drivers;
- Mellanox network drivers;
- Microsoft Azure Network Adapter (MANA) driver;
- Near Field Communication (NFC) drivers;
- NVME drivers;
- NVMEM (Non Volatile Memory) drivers;
- Device tree and open firmware driver;
- Parport drivers;
- PCI subsystem;
- Pin controllers subsystem;
- x86 platform drivers;
- Power supply drivers;
- Remote Processor subsystem;
- S/390 drivers;
- SCSI subsystem;
- QCOM SoC drivers;
- SPI subsystem;
- Direct Digital Synthesis drivers;
- Thermal drivers;
- Thunderbolt and USB4 drivers;
- TTY drivers;
- UFS subsystem;
- Userspace I/O drivers;
- USB DSL drivers;
- USB core drivers;
- DesignWare USB3 driver;
- USB Gadget drivers;
- USB Host Controller drivers;
- USB Serial drivers;
- USB Type-C Connector System Software Interface driver;
- USB over IP driver;
- VFIO drivers;
- Virtio Host (VHOST) subsystem;
- Framebuffer layer;
- Xen hypervisor drivers;
- File systems infrastructure;
- BTRFS file system;
- Ext4 file system;
- F2FS file system;
- GFS2 file system;
- JFFS2 file system;
- JFS file system;
- Network file systems library;
- Network file system (NFS) client;
- Network file system (NFS) server daemon;
- NILFS2 file system;
- File system notification infrastructure;
- NTFS3 file system;
- Proc file system;
- SMB network file system;
- Tracing file system;
- Bitmap API;
- BPF subsystem;
- Syscall compatibility layer;
- Memory Management;
- Memory management;
- Objagg library;
- Perf events;
- Syscall interfaces;
- Virtio network driver;
- VMware vSockets driver;
- KCM (Kernel Connection Multiplexor) sockets driver;
- Netfilter;
- Tracing infrastructure;
- io_uring subsystem;
- Control group (cgroup);
- DMA mapping infrastructure;
- Locking primitives;
- Padata parallel execution mechanism;
- Scheduler infrastructure;
- Closures library;
- Radix Tree data structure library;
- Kernel userspace event delivery library;
- KUnit for arithmetic overflow checks;
- Bluetooth subsystem;
- Ethernet bridge;
- CAN network layer;
- Ceph Core library;
- Networking core;
- Ethtool driver;
- IPv4 networking;
- IPv6 networking;
- IUCV driver;
- MAC80211 subsystem;
- Multipath TCP;
- Network traffic control;
- SCTP protocol;
- Sun RPC protocol;
- TIPC protocol;
- Wireless networking;
- AppArmor security module;
- Landlock security;
- SELinux security module;
- Simplified Mandatory Access Control Kernel framework;
- FireWire sound drivers;
- AMD SoC Alsa drivers;
- Texas InstrumentS Audio (ASoC/HDA) drivers;
- SoC Audio for Freescale CPUs drivers;
- Intel ASoC drivers;
- MediaTek ASoC drivers;
- Amlogic Meson SoC drivers;
- SoC audio core drivers;
- SOF drivers;
- Sound sequencer drivers;
- USB sound devices;
- Real-Time Linux Analysis tools;
(CVE-2024-43911, CVE-2024-46762, CVE-2024-46794, CVE-2024-43843,
CVE-2024-42229, CVE-2024-43888, CVE-2024-44978, CVE-2024-46693,
CVE-2024-46695, CVE-2024-42290, CVE-2024-42067, CVE-2024-45012,
CVE-2024-42316, CVE-2024-47665, CVE-2024-41052, CVE-2024-42074,
CVE-2024-41058, CVE-2024-44975, CVE-2024-46709, CVE-2024-46871,
CVE-2024-42090, CVE-2024-42296, CVE-2024-42096, CVE-2024-42146,
CVE-2024-46855, CVE-2024-39487, CVE-2024-43825, CVE-2024-42066,
CVE-2024-42126, CVE-2024-41022, CVE-2024-41025, CVE-2023-52888,
CVE-2024-46702, CVE-2024-42269, CVE-2024-41082, CVE-2024-42284,
CVE-2024-42227, CVE-2024-41017, CVE-2024-42250, CVE-2024-46778,
CVE-2024-47661, CVE-2024-46727, CVE-2024-46845, CVE-2024-44953,
CVE-2024-47659, CVE-2024-42137, CVE-2024-42245, CVE-2024-41096,
CVE-2024-46829, CVE-2024-41053, CVE-2024-46782, CVE-2024-44972,
CVE-2024-41095, CVE-2024-42239, CVE-2024-42127, CVE-2024-42292,
CVE-2024-46752, CVE-2024-46679, CVE-2024-41076, CVE-2024-46784,
CVE-2024-46786, CVE-2024-46678, CVE-2024-44957, CVE-2024-46755,
CVE-2024-47660, CVE-2024-41067, CVE-2024-46838, CVE-2024-43879,
CVE-2024-45007, CVE-2024-45025, CVE-2024-45001, CVE-2024-41009,
CVE-2024-41051, CVE-2024-46836, CVE-2024-49984, CVE-2024-45028,
CVE-2024-43871, CVE-2024-46783, CVE-2024-42272, CVE-2024-42087,
CVE-2024-46785, CVE-2024-42276, CVE-2024-47658, CVE-2024-46761,
CVE-2024-46715, CVE-2024-46676, CVE-2024-43824, CVE-2024-42100,
CVE-2024-46745, CVE-2024-41084, CVE-2024-41086, CVE-2024-45015,
CVE-2024-46797, CVE-2024-42160, CVE-2024-46706, CVE-2024-46803,
CVE-2024-46708, CVE-2024-47669, CVE-2024-45009, CVE-2024-41021,
CVE-2024-42159, CVE-2024-42321, CVE-2024-46868, CVE-2024-41078,
CVE-2024-42303, CVE-2024-45027, CVE-2024-42309, CVE-2024-43849,
CVE-2024-43907, CVE-2024-43899, CVE-2024-43823, CVE-2024-42232,
CVE-2024-44937, CVE-2024-41046, CVE-2024-42237, CVE-2024-42063,
CVE-2024-42065, CVE-2024-42154, CVE-2024-42259, CVE-2024-46698,
CVE-2024-46741, CVE-2024-45020, CVE-2024-42151, CVE-2024-41073,
CVE-2024-46719, CVE-2024-42295, CVE-2024-46859, CVE-2024-41035,
CVE-2024-46751, CVE-2024-47667, CVE-2024-46728, CVE-2024-46824,
CVE-2024-42121, CVE-2024-46776, CVE-2024-46768, CVE-2024-43908,
CVE-2024-43900, CVE-2024-46707, CVE-2024-44934, CVE-2024-41062,
CVE-2024-42304, CVE-2024-42312, CVE-2024-42157, CVE-2024-41092,
CVE-2024-41041, CVE-2024-43832, CVE-2024-41039, CVE-2024-44962,
CVE-2024-46858, CVE-2024-43856, CVE-2024-41060, CVE-2024-45010,
CVE-2024-41044, CVE-2024-44942, CVE-2024-42307, CVE-2024-44984,
CVE-2024-41075, CVE-2024-43817, CVE-2024-46791, CVE-2024-46853,
CVE-2024-42301, CVE-2024-44993, CVE-2024-41094, CVE-2024-27022,
CVE-2024-41088, CVE-2024-43883, CVE-2024-41087, CVE-2024-46780,
CVE-2024-42070, CVE-2024-44965, CVE-2024-46823, CVE-2024-46737,
CVE-2024-44982, CVE-2024-46697, CVE-2024-45021, CVE-2024-44987,
CVE-2024-41072, CVE-2024-41063, CVE-2024-46757, CVE-2024-46831,
CVE-2024-44966, CVE-2024-42322, CVE-2024-42231, CVE-2024-46717,
CVE-2024-41065, CVE-2024-44969, CVE-2023-52887, CVE-2024-42105,
CVE-2024-44971, CVE-2024-46798, CVE-2024-42262, CVE-2024-44938,
CVE-2024-42088, CVE-2024-44970, CVE-2024-43876, CVE-2024-46800,
CVE-2024-42086, CVE-2024-43826, CVE-2024-46729, CVE-2024-46747,
CVE-2024-46691, CVE-2024-46723, CVE-2024-41018, CVE-2024-42258,
CVE-2024-41081, CVE-2024-41049, CVE-2024-43837, CVE-2024-45008,
CVE-2024-41047, CVE-2024-41019, CVE-2024-42152, CVE-2024-41090,
CVE-2024-46716, CVE-2024-42104, CVE-2024-46804, CVE-2024-43852,
CVE-2024-42129, CVE-2024-46870, CVE-2024-41093, CVE-2024-45011,
CVE-2024-41064, CVE-2024-46722, CVE-2024-42286, CVE-2024-45026,
CVE-2024-46818, CVE-2024-42281, CVE-2024-43854, CVE-2024-41037,
CVE-2024-44946, CVE-2024-41012, CVE-2024-41098, CVE-2024-42263,
CVE-2024-42095, CVE-2024-46756, CVE-2024-43913, CVE-2024-46822,
CVE-2024-44944, CVE-2024-42156, CVE-2024-42073, CVE-2024-42093,
CVE-2024-44931, CVE-2024-42223, CVE-2024-42264, CVE-2024-42278,
CVE-2024-46759, CVE-2024-46826, CVE-2024-43828, CVE-2024-42318,
CVE-2024-42240, CVE-2024-45000, CVE-2024-43909, CVE-2024-46792,
CVE-2024-42109, CVE-2024-43867, CVE-2024-42130, CVE-2024-42244,
CVE-2024-44977, CVE-2024-46774, CVE-2024-41030, CVE-2024-42310,
CVE-2024-42138, CVE-2024-42317, CVE-2024-42224, CVE-2024-46694,
CVE-2024-46815, CVE-2024-46677, CVE-2024-46763, CVE-2024-46860,
CVE-2024-46767, CVE-2024-42111, CVE-2024-41020, CVE-2024-46726,
CVE-2024-42117, CVE-2024-43831, CVE-2024-42285, CVE-2024-46842,
CVE-2024-43857, CVE-2024-41031, CVE-2024-43834, CVE-2024-42135,
CVE-2024-42241, CVE-2024-46846, CVE-2024-44988, CVE-2024-43892,
CVE-2024-44991, CVE-2024-46806, CVE-2024-41015, CVE-2024-43906,
CVE-2024-42238, CVE-2024-46779, CVE-2024-41010, CVE-2024-41068,
CVE-2024-46730, CVE-2024-46827, CVE-2024-42120, CVE-2024-41059,
CVE-2024-46850, CVE-2023-52889, CVE-2024-45017, CVE-2024-45003,
CVE-2024-46844, CVE-2024-46816, CVE-2024-46811, CVE-2024-41023,
CVE-2024-44948, CVE-2024-46753, CVE-2024-45002, CVE-2024-42251,
CVE-2024-46713, CVE-2024-42273, CVE-2024-46733, CVE-2024-46739,
CVE-2024-42108, CVE-2024-41085, CVE-2024-41033, CVE-2024-42298,
CVE-2024-46835, CVE-2024-39472, CVE-2024-47663, CVE-2024-43859,
CVE-2024-43820, CVE-2024-42118, CVE-2024-41036, CVE-2024-47683,
CVE-2024-42161, CVE-2024-42235, CVE-2024-43861, CVE-2024-43863,
CVE-2024-47668, CVE-2024-46685, CVE-2024-43864, CVE-2024-46749,
CVE-2024-44983, CVE-2024-46841, CVE-2024-42082, CVE-2024-43818,
CVE-2024-41071, CVE-2024-45006, CVE-2024-42080, CVE-2024-46825,
CVE-2024-46687, CVE-2024-44959, CVE-2024-43835, CVE-2024-43891,
CVE-2024-46851, CVE-2024-42248, CVE-2024-42103, CVE-2024-42079,
CVE-2024-42068, CVE-2024-47664, CVE-2024-46854, CVE-2024-44973,
CVE-2024-42077, CVE-2024-46821, CVE-2024-43886, CVE-2024-41089,
CVE-2024-43850, CVE-2024-44995, CVE-2024-46809, CVE-2024-42084,
CVE-2024-46758, CVE-2024-47662, CVE-2024-43839, CVE-2024-46738,
CVE-2024-41034, CVE-2024-42228, CVE-2024-42147, CVE-2024-43855,
CVE-2024-41032, CVE-2024-46819, CVE-2024-44989, CVE-2024-42265,
CVE-2024-42110, CVE-2024-42155, CVE-2024-45005, CVE-2024-45016,
CVE-2024-42141, CVE-2024-43821, CVE-2024-42299, CVE-2024-44950,
CVE-2024-42279, CVE-2024-44943, CVE-2024-43904, CVE-2024-42268,
CVE-2024-42089, CVE-2024-46807, CVE-2024-44996, CVE-2024-42069,
CVE-2024-46672, CVE-2024-44940, CVE-2024-42270, CVE-2024-46735,
CVE-2024-42319, CVE-2024-46754, CVE-2024-46861, CVE-2024-42277,
CVE-2024-41054, CVE-2024-42131, CVE-2024-41056, CVE-2024-44963,
CVE-2024-42267, CVE-2024-42283, CVE-2024-42320, CVE-2024-46740,
CVE-2024-46787, CVE-2024-43895, CVE-2024-43881, CVE-2024-44961,
CVE-2024-43910, CVE-2024-43875, CVE-2024-42289, CVE-2024-43853,
CVE-2024-42315, CVE-2024-43884, CVE-2024-46867, CVE-2024-43912,
CVE-2024-41007, CVE-2024-46743, CVE-2024-46675, CVE-2024-43877,
CVE-2024-39486, CVE-2024-41050, CVE-2024-43858, CVE-2024-45018,
CVE-2024-46744, CVE-2024-46750, CVE-2024-46840, CVE-2024-42150,
CVE-2024-41028, CVE-2024-42091, CVE-2024-43894, CVE-2024-43869,
CVE-2024-42132, CVE-2024-46777, CVE-2024-42106, CVE-2024-46848,
CVE-2024-41038, CVE-2024-46711, CVE-2024-43833, CVE-2024-46710,
CVE-2024-46812, CVE-2024-42311, CVE-2024-46701, CVE-2024-46683,
CVE-2024-45029, CVE-2024-46830, CVE-2024-46857, CVE-2024-44979,
CVE-2024-44999, CVE-2024-44985, CVE-2024-46773, CVE-2024-45022,
CVE-2024-46772, CVE-2024-44960, CVE-2024-42243, CVE-2024-42158,
CVE-2024-43819, CVE-2024-45030, CVE-2024-42085, CVE-2024-42274,
CVE-2024-44986, CVE-2024-41048, CVE-2024-42098, CVE-2024-46680,
CVE-2023-52918, CVE-2024-46673, CVE-2024-46834, CVE-2024-42288,
CVE-2024-44998, CVE-2024-42113, CVE-2024-42094, CVE-2024-42225,
CVE-2024-42112, CVE-2024-42153, CVE-2024-43880, CVE-2024-43905,
CVE-2024-43902, CVE-2024-46681, CVE-2024-42236, CVE-2024-42294,
CVE-2024-46793, CVE-2024-43882, CVE-2024-44947, CVE-2024-46849,
CVE-2024-44954, CVE-2024-46852, CVE-2024-41070, CVE-2024-41069,
CVE-2024-46864, CVE-2024-46703, CVE-2024-43829, CVE-2024-46802,
CVE-2024-42101, CVE-2024-44990, CVE-2024-43830, CVE-2024-41029,
CVE-2024-43866, CVE-2024-43889, CVE-2024-42230, CVE-2024-46692,
CVE-2024-42133, CVE-2024-45013, CVE-2024-42076, CVE-2024-46810,
CVE-2024-42128, CVE-2024-46718, CVE-2024-46814, CVE-2024-43841,
CVE-2024-43873, CVE-2024-42092, CVE-2024-41074, CVE-2024-41083,
CVE-2024-46731, CVE-2024-43842, CVE-2024-41077, CVE-2024-46720,
CVE-2024-46795, CVE-2024-46813, CVE-2024-46805, CVE-2024-42142,
CVE-2024-42291, CVE-2024-43846, CVE-2024-41057, CVE-2024-43870,
CVE-2024-44980, CVE-2024-46866, CVE-2024-43827, CVE-2024-43840,
CVE-2024-42280, CVE-2024-42261, CVE-2024-42246, CVE-2024-42115,
CVE-2024-46686, CVE-2024-43860, CVE-2024-46808, CVE-2024-42149,
CVE-2024-46828, CVE-2024-44935, CVE-2024-43847, CVE-2024-44967,
CVE-2024-46817, CVE-2024-46721, CVE-2024-42305, CVE-2024-46766,
CVE-2024-43914, CVE-2024-46760, CVE-2024-41061, CVE-2024-41091,
CVE-2024-43890, CVE-2024-42314, CVE-2024-42064, CVE-2024-42302,
CVE-2024-43887, CVE-2024-46832, CVE-2024-46765, CVE-2024-46770,
CVE-2024-41080, CVE-2024-42253, CVE-2024-44941, CVE-2024-42306,
CVE-2024-41027, CVE-2024-46689, CVE-2024-46781, CVE-2024-42247,
CVE-2024-41066, CVE-2024-42287, CVE-2024-41097, CVE-2024-44939,
CVE-2024-45019, CVE-2024-47674, CVE-2024-46705, CVE-2024-42119,
CVE-2024-46725, CVE-2024-46746, CVE-2024-46732, CVE-2024-41042,
CVE-2024-44958, CVE-2024-42114, CVE-2024-43893, CVE-2024-47666,
CVE-2024-46843, CVE-2024-42252, CVE-2024-42102, CVE-2024-42136,
CVE-2024-41045, CVE-2024-42260, CVE-2024-46771, CVE-2024-42124,
CVE-2024-42297, CVE-2024-42271, CVE-2024-43845, CVE-2024-46775,
CVE-2024-41079, CVE-2024-43868, CVE-2024-42140, CVE-2024-42313,
CVE-2024-42145, CVE-2024-46724, CVE-2024-46788, CVE-2024-42234,
CVE-2024-42144, CVE-2024-44974, CVE-2024-42097, CVE-2024-46714,
CVE-2024-41055, CVE-2024-44956)
2 months 1 week ago
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
- MIPS architecture;
- PowerPC architecture;
- RISC-V architecture;
- S390 architecture;
- User-Mode Linux (UML);
- x86 architecture;
- Block layer subsystem;
- Android drivers;
- ATM drivers;
- Drivers core;
- Ublk userspace block driver;
- Bluetooth drivers;
- Character device driver;
- Hardware crypto device drivers;
- Buffer Sharing and Synchronization framework;
- DMA engine subsystem;
- Qualcomm firmware drivers;
- GPIO subsystem;
- GPU drivers;
- HID subsystem;
- Hardware monitoring drivers;
- I2C subsystem;
- I3C subsystem;
- IIO subsystem;
- InfiniBand drivers;
- Input Device core drivers;
- Input Device (Miscellaneous) drivers;
- IOMMU subsystem;
- IRQ chip drivers;
- LED subsystem;
- Mailbox framework;
- Multiple devices driver;
- Media drivers;
- Fastrpc Driver;
- VMware VMCI Driver;
- MMC subsystem;
- Ethernet bonding driver;
- Network drivers;
- Mellanox network drivers;
- Microsoft Azure Network Adapter (MANA) driver;
- Near Field Communication (NFC) drivers;
- NVME drivers;
- Device tree and open firmware driver;
- Parport drivers;
- PCI subsystem;
- Pin controllers subsystem;
- x86 platform drivers;
- Power supply drivers;
- Remote Processor subsystem;
- S/390 drivers;
- SCSI subsystem;
- QCOM SoC drivers;
- SPI subsystem;
- Direct Digital Synthesis drivers;
- Thunderbolt and USB4 drivers;
- TTY drivers;
- UFS subsystem;
- Userspace I/O drivers;
- DesignWare USB3 driver;
- USB Gadget drivers;
- USB Host Controller drivers;
- USB Type-C Connector System Software Interface driver;
- USB over IP driver;
- Virtio Host (VHOST) subsystem;
- Framebuffer layer;
- Xen hypervisor drivers;
- File systems infrastructure;
- BTRFS file system;
- Ext4 file system;
- F2FS file system;
- JFS file system;
- Network file systems library;
- Network file system (NFS) client;
- Network file system (NFS) server daemon;
- NILFS2 file system;
- File system notification infrastructure;
- NTFS3 file system;
- Proc file system;
- SMB network file system;
- Tracing file system;
- Bitmap API;
- BPF subsystem;
- Memory Management;
- Objagg library;
- Perf events;
- Virtio network driver;
- VMware vSockets driver;
- KCM (Kernel Connection Multiplexor) sockets driver;
- Control group (cgroup);
- DMA mapping infrastructure;
- Locking primitives;
- Padata parallel execution mechanism;
- Scheduler infrastructure;
- Tracing infrastructure;
- Radix Tree data structure library;
- Kernel userspace event delivery library;
- KUnit for arithmetic overflow checks;
- Memory management;
- Bluetooth subsystem;
- Ethernet bridge;
- CAN network layer;
- Networking core;
- Ethtool driver;
- IPv4 networking;
- IPv6 networking;
- MAC80211 subsystem;
- Multipath TCP;
- Netfilter;
- Network traffic control;
- SCTP protocol;
- TIPC protocol;
- Wireless networking;
- AppArmor security module;
- Landlock security;
- SELinux security module;
- Simplified Mandatory Access Control Kernel framework;
- FireWire sound drivers;
- AMD SoC Alsa drivers;
- Texas InstrumentS Audio (ASoC/HDA) drivers;
- SoC Audio for Freescale CPUs drivers;
- Intel ASoC drivers;
- Amlogic Meson SoC drivers;
- SoC audio core drivers;
- USB sound devices;
- Real-Time Linux Analysis tools;
(CVE-2024-43845, CVE-2024-42311, CVE-2024-46757, CVE-2024-46738,
CVE-2024-44961, CVE-2024-44935, CVE-2024-46845, CVE-2024-46783,
CVE-2024-42315, CVE-2023-52918, CVE-2024-46708, CVE-2024-44934,
CVE-2024-42298, CVE-2024-46786, CVE-2024-46778, CVE-2024-44960,
CVE-2024-42295, CVE-2024-43881, CVE-2024-44971, CVE-2024-43849,
CVE-2024-43914, CVE-2024-44962, CVE-2024-43841, CVE-2024-46794,
CVE-2024-46752, CVE-2024-46853, CVE-2024-46861, CVE-2024-47664,
CVE-2024-46717, CVE-2024-46806, CVE-2024-46797, CVE-2024-42261,
CVE-2024-46828, CVE-2024-45013, CVE-2024-46870, CVE-2024-42258,
CVE-2024-46689, CVE-2024-43818, CVE-2024-46762, CVE-2024-46825,
CVE-2024-46698, CVE-2024-46816, CVE-2024-46728, CVE-2024-46726,
CVE-2024-43835, CVE-2024-45000, CVE-2024-43850, CVE-2024-43840,
CVE-2024-46846, CVE-2024-43846, CVE-2024-46725, CVE-2024-46867,
CVE-2024-42310, CVE-2024-42274, CVE-2024-46760, CVE-2024-46683,
CVE-2024-42304, CVE-2024-43839, CVE-2024-44954, CVE-2024-43895,
CVE-2024-44967, CVE-2024-43889, CVE-2024-46854, CVE-2024-46860,
CVE-2024-45029, CVE-2024-44938, CVE-2024-46785, CVE-2024-46713,
CVE-2024-46715, CVE-2024-46731, CVE-2024-42297, CVE-2024-43912,
CVE-2024-46751, CVE-2024-46711, CVE-2024-46695, CVE-2024-42317,
CVE-2024-44957, CVE-2024-46792, CVE-2024-45020, CVE-2024-44985,
CVE-2024-46746, CVE-2024-43868, CVE-2024-45017, CVE-2024-46824,
CVE-2024-46787, CVE-2024-42288, CVE-2024-46681, CVE-2024-42306,
CVE-2024-46755, CVE-2024-46826, CVE-2024-46777, CVE-2024-46844,
CVE-2024-44972, CVE-2024-43883, CVE-2024-43909, CVE-2024-46676,
CVE-2024-46798, CVE-2024-42273, CVE-2024-44990, CVE-2024-46744,
CVE-2024-42305, CVE-2024-45006, CVE-2024-42309, CVE-2024-46722,
CVE-2024-44956, CVE-2024-46739, CVE-2024-46680, CVE-2024-46765,
CVE-2024-46714, CVE-2024-46771, CVE-2024-46847, CVE-2024-43879,
CVE-2024-46703, CVE-2024-46733, CVE-2024-46815, CVE-2024-46802,
CVE-2024-45027, CVE-2024-42281, CVE-2024-43891, CVE-2024-45030,
CVE-2024-47662, CVE-2024-43887, CVE-2024-46836, CVE-2024-46782,
CVE-2024-46835, CVE-2024-43907, CVE-2024-46779, CVE-2024-43869,
CVE-2024-43821, CVE-2024-44978, CVE-2024-42286, CVE-2023-52889,
CVE-2024-43852, CVE-2024-42320, CVE-2024-44931, CVE-2024-44993,
CVE-2024-46829, CVE-2024-46701, CVE-2024-42272, CVE-2024-47660,
CVE-2024-49984, CVE-2024-44973, CVE-2024-43817, CVE-2024-42322,
CVE-2024-43830, CVE-2024-42301, CVE-2024-44969, CVE-2024-47674,
CVE-2024-46702, CVE-2024-45025, CVE-2024-46710, CVE-2024-43866,
CVE-2024-46718, CVE-2024-46773, CVE-2024-43834, CVE-2024-46754,
CVE-2024-46871, CVE-2024-44942, CVE-2024-43913, CVE-2024-46818,
CVE-2024-42318, CVE-2024-43831, CVE-2024-43832, CVE-2024-43908,
CVE-2024-43827, CVE-2024-46737, CVE-2024-47665, CVE-2024-43854,
CVE-2024-46707, CVE-2024-42303, CVE-2024-43860, CVE-2024-43824,
CVE-2024-45019, CVE-2024-44984, CVE-2024-46813, CVE-2024-45022,
CVE-2024-44970, CVE-2024-46791, CVE-2024-45012, CVE-2024-43829,
CVE-2024-46850, CVE-2024-44987, CVE-2024-44940, CVE-2024-43864,
CVE-2024-46723, CVE-2024-44999, CVE-2024-43884, CVE-2024-42287,
CVE-2024-46675, CVE-2024-44974, CVE-2024-46721, CVE-2024-44937,
CVE-2024-45008, CVE-2024-43853, CVE-2024-46697, CVE-2024-43899,
CVE-2024-43823, CVE-2024-46747, CVE-2024-45007, CVE-2024-46822,
CVE-2024-42262, CVE-2024-47661, CVE-2024-44953, CVE-2024-46859,
CVE-2024-46694, CVE-2024-42279, CVE-2024-43873, CVE-2024-43828,
CVE-2024-46851, CVE-2024-42296, CVE-2024-46719, CVE-2024-46677,
CVE-2024-42259, CVE-2024-44941, CVE-2024-44946, CVE-2024-46745,
CVE-2024-42299, CVE-2024-46724, CVE-2024-46749, CVE-2024-46706,
CVE-2024-42267, CVE-2024-46774, CVE-2024-46685, CVE-2024-42292,
CVE-2024-47667, CVE-2024-42319, CVE-2024-43888, CVE-2024-46729,
CVE-2024-44947, CVE-2024-45003, CVE-2024-46827, CVE-2024-46693,
CVE-2024-46705, CVE-2024-46767, CVE-2024-46838, CVE-2024-46805,
CVE-2024-43904, CVE-2024-43906, CVE-2024-42265, CVE-2024-42278,
CVE-2024-46750, CVE-2024-46692, CVE-2024-43847, CVE-2024-44995,
CVE-2024-43825, CVE-2024-46803, CVE-2024-47669, CVE-2024-46830,
CVE-2024-46784, CVE-2024-46840, CVE-2024-44939, CVE-2024-46848,
CVE-2024-42313, CVE-2024-46823, CVE-2024-44989, CVE-2024-42270,
CVE-2024-43856, CVE-2024-46716, CVE-2024-43859, CVE-2024-46841,
CVE-2024-47658, CVE-2024-46811, CVE-2024-45028, CVE-2024-46781,
CVE-2024-42290, CVE-2024-44991, CVE-2024-43894, CVE-2024-44979,
CVE-2024-46804, CVE-2024-43826, CVE-2024-43877, CVE-2024-42284,
CVE-2024-43876, CVE-2024-45011, CVE-2024-43819, CVE-2024-46709,
CVE-2024-43867, CVE-2024-44963, CVE-2024-45010, CVE-2024-46753,
CVE-2024-46759, CVE-2024-43880, CVE-2024-44977, CVE-2024-46772,
CVE-2024-44950, CVE-2024-46687, CVE-2024-46834, CVE-2024-43911,
CVE-2024-45015, CVE-2024-46819, CVE-2024-43875, CVE-2024-44996,
CVE-2024-44988, CVE-2024-46673, CVE-2024-44943, CVE-2024-42316,
CVE-2024-47683, CVE-2024-42307, CVE-2024-46788, CVE-2024-43892,
CVE-2024-47659, CVE-2024-46857, CVE-2024-43820, CVE-2024-46832,
CVE-2024-42312, CVE-2024-43910, CVE-2024-43886, CVE-2024-43905,
CVE-2024-46766, CVE-2024-42263, CVE-2024-46821, CVE-2024-43842,
CVE-2024-43857, CVE-2024-42276, CVE-2024-42268, CVE-2024-46740,
CVE-2024-46843, CVE-2024-46807, CVE-2024-46780, CVE-2024-46678,
CVE-2024-44944, CVE-2024-42264, CVE-2024-43863, CVE-2024-39472,
CVE-2024-46691, CVE-2024-44959, CVE-2024-44958, CVE-2024-46679,
CVE-2024-43843, CVE-2024-43900, CVE-2024-45021, CVE-2024-44982,
CVE-2024-46793, CVE-2024-42260, CVE-2024-43890, CVE-2024-43871,
CVE-2024-42269, CVE-2024-42277, CVE-2024-46720, CVE-2024-45005,
CVE-2024-46727, CVE-2024-46808, CVE-2024-46852, CVE-2024-47668,
CVE-2024-42321, CVE-2024-46743, CVE-2024-45002, CVE-2024-46763,
CVE-2024-46817, CVE-2024-42285, CVE-2024-46770, CVE-2024-45026,
CVE-2024-46768, CVE-2024-42314, CVE-2024-42291, CVE-2024-46756,
CVE-2024-42283, CVE-2024-45018, CVE-2024-44966, CVE-2024-42289,
CVE-2024-42294, CVE-2024-46814, CVE-2024-44986, CVE-2024-43870,
CVE-2024-44980, CVE-2024-43902, CVE-2024-47666, CVE-2024-46864,
CVE-2024-46761, CVE-2024-46831, CVE-2024-46758, CVE-2024-46735,
CVE-2024-46858, CVE-2024-46795, CVE-2024-46810, CVE-2024-46849,
CVE-2024-46775, CVE-2024-46868, CVE-2024-46809, CVE-2024-46776,
CVE-2024-46866, CVE-2024-44983, CVE-2024-46741, CVE-2024-43837,
CVE-2024-43833, CVE-2024-46672, CVE-2024-43861, CVE-2024-42302,
CVE-2024-47663, CVE-2024-46812, CVE-2024-43893, CVE-2024-46686,
CVE-2024-44948, CVE-2024-46732, CVE-2024-44965, CVE-2024-46855,
CVE-2024-45009, CVE-2024-46842, CVE-2024-46730, CVE-2024-44975,
CVE-2024-44998)
2 months 1 week ago
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
- MIPS architecture;
- PowerPC architecture;
- RISC-V architecture;
- S390 architecture;
- User-Mode Linux (UML);
- x86 architecture;
- Block layer subsystem;
- Android drivers;
- ATM drivers;
- Drivers core;
- Ublk userspace block driver;
- Bluetooth drivers;
- Character device driver;
- Hardware crypto device drivers;
- Buffer Sharing and Synchronization framework;
- DMA engine subsystem;
- Qualcomm firmware drivers;
- GPIO subsystem;
- GPU drivers;
- HID subsystem;
- Hardware monitoring drivers;
- I2C subsystem;
- I3C subsystem;
- IIO subsystem;
- InfiniBand drivers;
- Input Device core drivers;
- Input Device (Miscellaneous) drivers;
- IOMMU subsystem;
- IRQ chip drivers;
- LED subsystem;
- Mailbox framework;
- Multiple devices driver;
- Media drivers;
- Fastrpc Driver;
- VMware VMCI Driver;
- MMC subsystem;
- Ethernet bonding driver;
- Network drivers;
- Mellanox network drivers;
- Microsoft Azure Network Adapter (MANA) driver;
- Near Field Communication (NFC) drivers;
- NVME drivers;
- Device tree and open firmware driver;
- Parport drivers;
- PCI subsystem;
- Pin controllers subsystem;
- x86 platform drivers;
- Power supply drivers;
- Remote Processor subsystem;
- S/390 drivers;
- SCSI subsystem;
- QCOM SoC drivers;
- SPI subsystem;
- Direct Digital Synthesis drivers;
- Thunderbolt and USB4 drivers;
- TTY drivers;
- UFS subsystem;
- Userspace I/O drivers;
- DesignWare USB3 driver;
- USB Gadget drivers;
- USB Host Controller drivers;
- USB Type-C Connector System Software Interface driver;
- USB over IP driver;
- Virtio Host (VHOST) subsystem;
- Framebuffer layer;
- Xen hypervisor drivers;
- File systems infrastructure;
- BTRFS file system;
- Ext4 file system;
- F2FS file system;
- JFS file system;
- Network file systems library;
- Network file system (NFS) client;
- Network file system (NFS) server daemon;
- NILFS2 file system;
- File system notification infrastructure;
- NTFS3 file system;
- Proc file system;
- SMB network file system;
- Tracing file system;
- Bitmap API;
- BPF subsystem;
- Memory Management;
- Objagg library;
- Perf events;
- Virtio network driver;
- VMware vSockets driver;
- KCM (Kernel Connection Multiplexor) sockets driver;
- Control group (cgroup);
- DMA mapping infrastructure;
- Locking primitives;
- Padata parallel execution mechanism;
- Scheduler infrastructure;
- Tracing infrastructure;
- Radix Tree data structure library;
- Kernel userspace event delivery library;
- KUnit for arithmetic overflow checks;
- Memory management;
- Bluetooth subsystem;
- Ethernet bridge;
- CAN network layer;
- Networking core;
- Ethtool driver;
- IPv4 networking;
- IPv6 networking;
- MAC80211 subsystem;
- Multipath TCP;
- Netfilter;
- Network traffic control;
- SCTP protocol;
- TIPC protocol;
- Wireless networking;
- AppArmor security module;
- Landlock security;
- SELinux security module;
- Simplified Mandatory Access Control Kernel framework;
- FireWire sound drivers;
- AMD SoC Alsa drivers;
- Texas InstrumentS Audio (ASoC/HDA) drivers;
- SoC Audio for Freescale CPUs drivers;
- Intel ASoC drivers;
- Amlogic Meson SoC drivers;
- SoC audio core drivers;
- USB sound devices;
- Real-Time Linux Analysis tools;
(CVE-2024-46783, CVE-2024-44960, CVE-2024-46743, CVE-2024-45009,
CVE-2024-43820, CVE-2024-43888, CVE-2024-45010, CVE-2024-43839,
CVE-2024-42304, CVE-2024-43846, CVE-2024-42258, CVE-2024-45005,
CVE-2024-46709, CVE-2024-46774, CVE-2024-43883, CVE-2024-43859,
CVE-2024-46721, CVE-2024-44944, CVE-2024-43913, CVE-2024-43843,
CVE-2024-43845, CVE-2024-45018, CVE-2024-43909, CVE-2024-46755,
CVE-2024-42284, CVE-2024-42301, CVE-2024-46779, CVE-2024-44971,
CVE-2024-46711, CVE-2024-43889, CVE-2024-46842, CVE-2024-44978,
CVE-2024-46803, CVE-2024-42277, CVE-2024-43892, CVE-2024-45019,
CVE-2024-44988, CVE-2024-46798, CVE-2024-44995, CVE-2024-43860,
CVE-2024-46762, CVE-2024-43831, CVE-2024-44990, CVE-2024-46845,
CVE-2024-46765, CVE-2024-45012, CVE-2024-44975, CVE-2024-46770,
CVE-2024-46802, CVE-2024-44970, CVE-2024-46691, CVE-2024-43833,
CVE-2024-43876, CVE-2024-42292, CVE-2024-42291, CVE-2024-43891,
CVE-2024-46788, CVE-2024-44938, CVE-2024-46710, CVE-2024-42272,
CVE-2024-43868, CVE-2024-43875, CVE-2024-45030, CVE-2024-46689,
CVE-2024-46859, CVE-2024-46795, CVE-2024-46683, CVE-2024-44999,
CVE-2024-44942, CVE-2024-47669, CVE-2024-42318, CVE-2024-43911,
CVE-2024-46693, CVE-2024-42296, CVE-2024-43894, CVE-2024-45002,
CVE-2024-46673, CVE-2024-46852, CVE-2024-45001, CVE-2024-43907,
CVE-2024-42319, CVE-2024-44972, CVE-2024-43905, CVE-2024-45028,
CVE-2024-46816, CVE-2024-46847, CVE-2024-46834, CVE-2024-44982,
CVE-2024-46807, CVE-2024-44948, CVE-2024-46685, CVE-2024-46811,
CVE-2024-42317, CVE-2024-43818, CVE-2024-46786, CVE-2024-43881,
CVE-2024-42294, CVE-2024-46708, CVE-2024-42285, CVE-2024-44941,
CVE-2024-43823, CVE-2024-46694, CVE-2024-46730, CVE-2024-42259,
CVE-2024-42270, CVE-2024-47658, CVE-2024-46718, CVE-2024-44947,
CVE-2024-46701, CVE-2024-43895, CVE-2024-43890, CVE-2024-46826,
CVE-2024-46687, CVE-2024-46768, CVE-2024-45025, CVE-2024-42267,
CVE-2024-42263, CVE-2024-44958, CVE-2024-44989, CVE-2024-43906,
CVE-2024-43869, CVE-2024-43887, CVE-2024-42297, CVE-2024-46702,
CVE-2024-42320, CVE-2024-42322, CVE-2024-46857, CVE-2024-43861,
CVE-2024-45008, CVE-2024-44969, CVE-2024-46821, CVE-2024-44967,
CVE-2024-43914, CVE-2024-46870, CVE-2024-46781, CVE-2024-43842,
CVE-2024-47665, CVE-2024-46753, CVE-2024-43866, CVE-2024-43886,
CVE-2024-44939, CVE-2024-42312, CVE-2024-46864, CVE-2024-46695,
CVE-2024-46818, CVE-2024-45006, CVE-2024-43841, CVE-2024-46703,
CVE-2024-46749, CVE-2024-44986, CVE-2024-46717, CVE-2024-42273,
CVE-2024-43856, CVE-2024-46777, CVE-2024-44984, CVE-2024-46719,
CVE-2024-46858, CVE-2024-43821, CVE-2024-46750, CVE-2024-43829,
CVE-2024-43817, CVE-2024-42281, CVE-2024-42287, CVE-2024-45007,
CVE-2024-46793, CVE-2024-45003, CVE-2024-45011, CVE-2024-47683,
CVE-2024-44934, CVE-2024-46722, CVE-2024-46860, CVE-2024-42314,
CVE-2024-46675, CVE-2024-43899, CVE-2024-46752, CVE-2024-46851,
CVE-2024-42310, CVE-2024-46853, CVE-2024-39472, CVE-2024-43837,
CVE-2024-45021, CVE-2024-46713, CVE-2024-44943, CVE-2024-46787,
CVE-2024-43893, CVE-2024-44946, CVE-2024-45026, CVE-2024-44996,
CVE-2024-46761, CVE-2024-46723, CVE-2024-42311, CVE-2024-42316,
CVE-2024-47663, CVE-2024-44940, CVE-2024-43867, CVE-2024-42265,
CVE-2024-44950, CVE-2024-46867, CVE-2024-45020, CVE-2024-46707,
CVE-2024-44966, CVE-2024-42309, CVE-2024-46767, CVE-2024-46758,
CVE-2024-46732, CVE-2024-42262, CVE-2024-46778, CVE-2024-43884,
CVE-2024-44991, CVE-2024-47668, CVE-2024-46698, CVE-2024-46825,
CVE-2024-42302, CVE-2024-46716, CVE-2024-46726, CVE-2024-43870,
CVE-2024-42307, CVE-2024-46830, CVE-2024-43910, CVE-2024-46735,
CVE-2024-43828, CVE-2024-43904, CVE-2024-44965, CVE-2024-46831,
CVE-2024-44979, CVE-2024-44961, CVE-2024-46771, CVE-2024-46844,
CVE-2024-46871, CVE-2024-43877, CVE-2024-46746, CVE-2024-44987,
CVE-2024-46676, CVE-2024-46766, CVE-2024-46731, CVE-2024-46810,
CVE-2024-46806, CVE-2024-45000, CVE-2024-42313, CVE-2024-45015,
CVE-2024-46784, CVE-2024-43834, CVE-2024-46737, CVE-2024-46797,
CVE-2024-43908, CVE-2024-46724, CVE-2024-44980, CVE-2024-43847,
CVE-2024-46679, CVE-2024-46681, CVE-2024-43819, CVE-2024-46776,
CVE-2024-44954, CVE-2024-45022, CVE-2024-46819, CVE-2024-46775,
CVE-2024-43824, CVE-2024-44953, CVE-2024-46759, CVE-2024-43873,
CVE-2024-46756, CVE-2024-42303, CVE-2024-46738, CVE-2024-42290,
CVE-2024-42295, CVE-2024-43849, CVE-2024-44931, CVE-2024-46741,
CVE-2024-43863, CVE-2024-44974, CVE-2024-46829, CVE-2024-44959,
CVE-2024-42315, CVE-2024-44983, CVE-2024-46715, CVE-2024-46697,
CVE-2024-43850, CVE-2024-46728, CVE-2024-44963, CVE-2024-46823,
CVE-2024-46692, CVE-2024-46760, CVE-2024-46705, CVE-2024-42261,
CVE-2024-42321, CVE-2024-46785, CVE-2024-46686, CVE-2024-49984,
CVE-2024-46706, CVE-2024-45029, CVE-2024-46809, CVE-2024-43827,
CVE-2024-44998, CVE-2024-47667, CVE-2024-43835, CVE-2024-46866,
CVE-2024-46841, CVE-2024-42286, CVE-2024-43852, CVE-2024-43832,
CVE-2024-46773, CVE-2024-46817, CVE-2024-46868, CVE-2024-46812,
CVE-2024-47660, CVE-2024-46725, CVE-2024-42288, CVE-2024-46824,
CVE-2024-42269, CVE-2024-44957, CVE-2024-45017, CVE-2024-46747,
CVE-2024-47662, CVE-2024-46843, CVE-2024-46849, CVE-2024-43879,
CVE-2024-46751, CVE-2024-42298, CVE-2024-46861, CVE-2024-44993,
CVE-2024-46729, CVE-2024-46846, CVE-2024-46794, CVE-2024-43826,
CVE-2024-44973, CVE-2024-46672, CVE-2024-44985, CVE-2024-46815,
CVE-2024-46822, CVE-2024-46754, CVE-2024-43854, CVE-2024-42278,
CVE-2024-46720, CVE-2024-46677, CVE-2024-46854, CVE-2024-43840,
CVE-2024-43830, CVE-2024-46804, CVE-2024-45013, CVE-2024-46782,
CVE-2024-46840, CVE-2024-44977, CVE-2024-46838, CVE-2024-42264,
CVE-2024-47661, CVE-2024-43857, CVE-2023-52918, CVE-2024-44935,
CVE-2024-46739, CVE-2024-43825, CVE-2024-43864, CVE-2024-47659,
CVE-2024-42260, CVE-2024-44962, CVE-2024-46835, CVE-2024-43871,
CVE-2024-47674, CVE-2024-46827, CVE-2024-42283, CVE-2024-42299,
CVE-2024-46714, CVE-2024-46740, CVE-2024-46680, CVE-2024-46791,
CVE-2024-43912, CVE-2024-46813, CVE-2024-46733, CVE-2024-47664,
CVE-2024-42279, CVE-2024-46850, CVE-2024-42289, CVE-2024-46808,
CVE-2024-43880, CVE-2024-46832, CVE-2024-42276, CVE-2024-44937,
CVE-2024-42274, CVE-2024-46772, CVE-2024-47666, CVE-2024-44956,
CVE-2024-46763, CVE-2024-46805, CVE-2023-52889, CVE-2024-46678,
CVE-2024-43902, CVE-2024-46757, CVE-2024-46792, CVE-2024-42268,
CVE-2024-43853, CVE-2024-45027, CVE-2024-42305, CVE-2024-46828,
CVE-2024-43900, CVE-2024-46848, CVE-2024-46814, CVE-2024-46855,
CVE-2024-46727, CVE-2024-46836, CVE-2024-46744, CVE-2024-46780,
CVE-2024-46745, CVE-2024-42306)
2 months 1 week ago
It was discovered that PHP incorrectly handled long string inputs
in two database drivers. An attacker could possibly use this
issue to write files in locations they would not normally have
access to. (CVE-2024-11236)
2 months 1 week ago
USN-7108-1 fixed vulnerabilities in AysncSSH. This update provides the
corresponding update for Ubuntu 18.04 LTS.
Original advisory details:
Fabian Bäumer, Marcus Brinkmann, and Jörg Schwenk discovered that AsyncSSH
did not properly handle the extension info message. An attacker able to
intercept communications could possibly use this issue to downgrade
the algorithm used for client authentication. (CVE-2023-46445)
Fabian Bäumer, Marcus Brinkmann, and Jörg Schwenk discovered that AsyncSSH
did not properly handle the user authentication request message. An
attacker could possibly use this issue to control the remote end of an SSH
client session via packet injection/removal and shell emulation.
(CVE-2023-46446)
2 months 1 week ago
It was discovered that oFono incorrectly handled decoding SMS messages
leading to a stack overflow. A remote attacker could potentially use
this issue to cause a denial of service. (CVE-2023-4232, CVE-2023-4235)
2 months 1 week ago
It was discovered that Tornado incorrectly handled a certain redirect.
A remote attacker could possibly use this issue to redirect a user to an
arbitrary web site and conduct a phishing attack by having the user access
a specially crafted URL. This issue was only addressed in Ubuntu 22.04 LTS,
Ubuntu 20.04 LTS, and Ubuntu 18.04 LTS. Ubuntu 16.04 LTS was previously
addressed in USN-6159-1. (CVE-2023-28370)
It was discovered that Tornado inefficiently handled requests when parsing
cookies. An attacker could possibly use this issue to increase resource
utilization leading to a denial of service. (CVE-2024-52804)
2 months 1 week ago
Avraham Shalev and Nagaraju N Kodalapura discovered that some Intel(R)
Xeon(R) processors did not properly restrict access to the memory
controller when using Intel(R) SGX. This may allow a local privileged
attacker to further escalate their privileges. (CVE-2024-21820,
CVE-2024-23918)
It was discovered that some 4th and 5th Generation Intel(R) Xeon(R)
Processors did not properly implement finite state machines (FSMs) in
hardware logic. THis may allow a local privileged attacker to cause a
denial of service (system crash). (CVE-2024-21853)
It was discovered that some Intel(R) Processors did not properly restrict
access to the Running Average Power Limit (RAPL) interface. This may allow
a local privileged attacker to obtain sensitive information.
(CVE-2024-23984)
It was discovered that some Intel(R) Processors did not properly implement
finite state machines (FSMs) in hardware logic. This may allow a local
privileged attacker to cause a denial of service (system crash).
(CVE-2024-24968)
2 months 1 week ago
Lyu Tao discovered that the NFS implementation in the Linux kernel did not
properly handle requests to open a directory on a regular file. A local
attacker could use this to expose sensitive information (kernel memory).
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- x86 architecture;
- ATM drivers;
- Device frequency scaling framework;
- GPU drivers;
- Hardware monitoring drivers;
- VMware VMCI Driver;
- MTD block device drivers;
- Network drivers;
- Device tree and open firmware driver;
- SCSI subsystem;
- USB Serial drivers;
- BTRFS file system;
- File systems infrastructure;
- F2FS file system;
- JFS file system;
- NILFS2 file system;
- Netfilter;
- Memory management;
- Ethernet bridge;
- IPv6 networking;
- Logical Link layer;
- MAC80211 subsystem;
- NFC subsystem;
- Network traffic control;
(CVE-2021-47055, CVE-2024-26675, CVE-2024-42244, CVE-2024-46743,
CVE-2024-41095, CVE-2024-46756, CVE-2024-46723, CVE-2024-46759,
CVE-2024-35877, CVE-2024-38538, CVE-2024-26668, CVE-2024-44998,
CVE-2024-42309, CVE-2024-46758, CVE-2024-46800, CVE-2022-48733,
CVE-2023-52531, CVE-2023-52599, CVE-2024-46722, CVE-2024-42240,
CVE-2024-44987, CVE-2023-52502, CVE-2023-52578, CVE-2024-41059,
CVE-2024-41071, CVE-2024-44942, CVE-2024-46738, CVE-2022-48943,
CVE-2023-52614, CVE-2024-27397, CVE-2024-38560, CVE-2024-43882,
CVE-2024-42104, CVE-2024-46757, CVE-2024-26636, CVE-2024-26633,
CVE-2024-41089, CVE-2024-42310, CVE-2022-48938)
2 months 1 week ago
It was discovered that Apache Shiro incorrectly handled path traversal when
used with other web frameworks or path rewriting. An attacker could
possibly use this issue to obtain sensitive information or administrative
privileges. This update provides the corresponding fix for Ubuntu 24.04 LTS
and Ubuntu 24.10. (CVE-2023-34478, CVE-2023-46749)
It was discovered that Apache Shiro incorrectly handled web redirects when
used together with the form authentication method. An attacker could
possibly use this issue to perform phishing attacks. This update provides
the corresponding fix for Ubuntu 24.04 LTS and Ubuntu 24.10.
(CVE-2023-46750)
It was discovered that Apache Shiro incorrectly handled requests through
servlet filtering. An attacker could possibly use this issue to obtain
administrative privileges. This update provides the corresponding fix for
Ubuntu 16.04 LTS. (CVE-2016-6802)
2 months 1 week ago
Christina Fu discovered that Dogtag PKI accidentally enabled a mock
authentication plugin by default. An attacker could potentially use
this flaw to bypass the regular authentication process and trick the
CA server into issuing certificates. This issue only affected Ubuntu
16.04 LTS. (CVE-2017-7537)
It was discovered that Dogtag PKI did not properly sanitize user
input. An attacker could possibly use this issue to perform cross site
scripting and obtain sensitive information. This issue only affected
Ubuntu 22.04 LTS. (CVE-2020-25715)
It was discovered that the XML parser did not properly handle entity
expansion. A remote attacker could potentially retrieve the content of
arbitrary files by sending specially crafted HTTP requests. This issue
only affected Ubuntu 16.04 LTS. (CVE-2022-2414)
2 months 1 week ago
It was discovered that Expat did not properly handle its internal state
when attempting to resume an unstarted parser. An attacker could use this
issue to cause a denial of service (application crash).
2 months 1 week ago
It was discovered that oFono incorrectly handled decoding SMS messages
leading to a stack overflow. A remote attacker could potentially use
this issue to cause a denial of service.
(CVE-2023-2794, CVE-2023-4233, CVE-2023-4234)
2 months 1 week ago
Supraja Sridhara, Benedict Schlüter, Mark Kuhne, Andrin Bertschi, and
Shweta Shinde discovered that the Confidential Computing framework in the
Linux kernel for x86 platforms did not properly handle 32-bit emulation on
TDX and SEV. An attacker with access to the VMM could use this to cause a
denial of service (guest crash) or possibly execute arbitrary code.
(CVE-2024-25744)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
- MIPS architecture;
- PowerPC architecture;
- RISC-V architecture;
- User-Mode Linux (UML);
- x86 architecture;
- Block layer subsystem;
- Android drivers;
- Serial ATA and Parallel ATA drivers;
- ATM drivers;
- Drivers core;
- Null block device driver;
- Character device driver;
- ARM SCMI message protocol;
- GPU drivers;
- HID subsystem;
- Hardware monitoring drivers;
- I3C subsystem;
- InfiniBand drivers;
- Input Device core drivers;
- Input Device (Miscellaneous) drivers;
- IOMMU subsystem;
- IRQ chip drivers;
- ISDN/mISDN subsystem;
- LED subsystem;
- Multiple devices driver;
- Media drivers;
- VMware VMCI Driver;
- MMC subsystem;
- Ethernet bonding driver;
- Network drivers;
- Mellanox network drivers;
- Near Field Communication (NFC) drivers;
- NVME drivers;
- Device tree and open firmware driver;
- Parport drivers;
- PCI subsystem;
- Pin controllers subsystem;
- Remote Processor subsystem;
- S/390 drivers;
- SCSI subsystem;
- QCOM SoC drivers;
- Direct Digital Synthesis drivers;
- Thunderbolt and USB4 drivers;
- TTY drivers;
- Userspace I/O drivers;
- DesignWare USB3 driver;
- USB Gadget drivers;
- USB Host Controller drivers;
- USB Type-C Connector System Software Interface driver;
- USB over IP driver;
- Virtio Host (VHOST) subsystem;
- File systems infrastructure;
- BTRFS file system;
- Ext4 file system;
- F2FS file system;
- JFS file system;
- NILFS2 file system;
- File system notification infrastructure;
- NTFS3 file system;
- Proc file system;
- SMB network file system;
- Bitmap API;
- Objagg library;
- Perf events;
- Virtio network driver;
- KCM (Kernel Connection Multiplexor) sockets driver;
- Network traffic control;
- Control group (cgroup);
- DMA mapping infrastructure;
- Locking primitives;
- Padata parallel execution mechanism;
- RCU subsystem;
- Scheduler infrastructure;
- Tracing infrastructure;
- Radix Tree data structure library;
- Kernel userspace event delivery library;
- Memory management;
- Amateur Radio drivers;
- Bluetooth subsystem;
- Ethernet bridge;
- CAN network layer;
- Networking core;
- Ethtool driver;
- IPv4 networking;
- IPv6 networking;
- IUCV driver;
- MAC80211 subsystem;
- Multipath TCP;
- Netfilter;
- SCTP protocol;
- Sun RPC protocol;
- TIPC protocol;
- TLS protocol;
- Wireless networking;
- AppArmor security module;
- Landlock security;
- Simplified Mandatory Access Control Kernel framework;
- FireWire sound drivers;
- SoC audio core drivers;
- USB sound devices;
(CVE-2024-42280, CVE-2024-46759, CVE-2024-42286, CVE-2024-41042,
CVE-2024-42276, CVE-2024-46732, CVE-2024-43902, CVE-2024-47665,
CVE-2024-46675, CVE-2024-43873, CVE-2024-46761, CVE-2024-42281,
CVE-2024-46795, CVE-2024-43869, CVE-2024-39472, CVE-2024-46800,
CVE-2024-44998, CVE-2024-46746, CVE-2024-46747, CVE-2024-41011,
CVE-2024-43871, CVE-2024-46737, CVE-2024-42318, CVE-2024-46731,
CVE-2024-41022, CVE-2024-42285, CVE-2024-46752, CVE-2024-46818,
CVE-2024-44935, CVE-2024-44946, CVE-2024-44944, CVE-2024-41015,
CVE-2024-42312, CVE-2024-46676, CVE-2024-43834, CVE-2024-44966,
CVE-2024-46743, CVE-2024-45026, CVE-2024-46805, CVE-2024-26607,
CVE-2024-46771, CVE-2024-43905, CVE-2024-43884, CVE-2024-41070,
CVE-2024-43829, CVE-2024-46725, CVE-2024-45028, CVE-2024-42287,
CVE-2024-42313, CVE-2024-42277, CVE-2024-42290, CVE-2024-44934,
CVE-2024-46829, CVE-2024-46707, CVE-2024-46677, CVE-2024-42311,
CVE-2024-46814, CVE-2024-46815, CVE-2024-46755, CVE-2024-41065,
CVE-2024-43889, CVE-2024-46780, CVE-2024-43860, CVE-2024-46777,
CVE-2024-46719, CVE-2024-45009, CVE-2024-42302, CVE-2024-42304,
CVE-2024-41063, CVE-2024-47659, CVE-2024-46822, CVE-2024-46756,
CVE-2024-42283, CVE-2024-46757, CVE-2024-43909, CVE-2024-45011,
CVE-2024-46739, CVE-2024-46750, CVE-2024-46782, CVE-2024-44986,
CVE-2024-44983, CVE-2024-45021, CVE-2024-44987, CVE-2024-41090,
CVE-2024-42288, CVE-2024-44969, CVE-2024-42272, CVE-2024-43893,
CVE-2024-42259, CVE-2024-46781, CVE-2024-43907, CVE-2024-42265,
CVE-2024-43839, CVE-2024-47663, CVE-2024-46798, CVE-2024-43817,
CVE-2024-42295, CVE-2024-46840, CVE-2024-45008, CVE-2024-43849,
CVE-2024-46744, CVE-2024-43879, CVE-2024-43841, CVE-2024-42299,
CVE-2024-46783, CVE-2024-36484, CVE-2024-47660, CVE-2024-42310,
CVE-2024-44990, CVE-2024-42270, CVE-2024-43894, CVE-2024-41071,
CVE-2024-40915, CVE-2024-46810, CVE-2024-44954, CVE-2024-42246,
CVE-2023-52889, CVE-2024-43892, CVE-2024-43890, CVE-2024-42284,
CVE-2023-52918, CVE-2024-47669, CVE-2024-41078, CVE-2024-41073,
CVE-2024-26800, CVE-2024-41091, CVE-2024-46828, CVE-2022-48666,
CVE-2024-41060, CVE-2024-42114, CVE-2024-46807, CVE-2024-26669,
CVE-2024-44965, CVE-2024-46758, CVE-2024-44947, CVE-2024-43875,
CVE-2024-42126, CVE-2024-46685, CVE-2024-43883, CVE-2024-46722,
CVE-2024-41064, CVE-2024-43882, CVE-2024-46679, CVE-2024-46740,
CVE-2024-45025, CVE-2024-46721, CVE-2024-38611, CVE-2024-46844,
CVE-2024-45007, CVE-2024-44960, CVE-2024-42306, CVE-2024-44971,
CVE-2024-43835, CVE-2024-42305, CVE-2024-43846, CVE-2024-42289,
CVE-2024-46689, CVE-2024-46724, CVE-2024-43853, CVE-2024-44974,
CVE-2024-43828, CVE-2024-43914, CVE-2024-44958, CVE-2024-46673,
CVE-2024-46723, CVE-2024-41081, CVE-2024-46738, CVE-2024-42296,
CVE-2024-45006, CVE-2024-46714, CVE-2024-43880, CVE-2024-42271,
CVE-2024-44985, CVE-2024-41072, CVE-2024-43867, CVE-2024-43858,
CVE-2024-26893, CVE-2024-41059, CVE-2024-38577, CVE-2024-46817,
CVE-2024-46702, CVE-2024-41019, CVE-2024-44999, CVE-2024-43908,
CVE-2024-42292, CVE-2024-43856, CVE-2024-45018, CVE-2024-41068,
CVE-2024-43870, CVE-2024-45003, CVE-2024-42297, CVE-2024-47668,
CVE-2024-43830, CVE-2024-26661, CVE-2024-41017, CVE-2024-42309,
CVE-2024-43861, CVE-2024-46791, CVE-2024-44989, CVE-2024-46745,
CVE-2024-42269, CVE-2024-43863, CVE-2024-43854, CVE-2024-44995,
CVE-2024-46804, CVE-2024-44948, CVE-2024-46819, CVE-2024-41098,
CVE-2024-44982, CVE-2024-46763, CVE-2024-46832, CVE-2024-41077,
CVE-2024-42274, CVE-2024-47667, CVE-2024-41012, CVE-2024-41020,
CVE-2024-42301, CVE-2024-42267, CVE-2024-46713, CVE-2024-38602,
CVE-2024-44988)
2 months 1 week ago
Christian Rellmann discovered that RabbitMQ Server did not properly
sanitize user input when adding a new user via the management UI. An
attacker could possibly use this issue to perform cross site scripting and
obtain sensitive information. (CVE-2021-32718)
Fahimhusain Raydurg discovered that RabbitMQ Server did not properly
sanitize user input when using the federation management plugin. An
attacker could possibly use this issue to perform cross site scripting and
obtain sensitive information. (CVE-2021-32719)
2 months 1 week ago
Several security issues were discovered in the WebKitGTK Web and JavaScript
engines. If a user were tricked into viewing a malicious website, a remote
attacker could exploit a variety of issues related to web browser security,
including cross-site scripting attacks, denial of service attacks, and
arbitrary code execution.
2 months 1 week ago
It was discovered that Tinyproxy did not properly manage memory under
certain circumstances. An attacker could possibly use this issue to leak
left-over heap data if custom error page templates containing special
non-standard variables are used.
2 months 2 weeks ago
USN-7117-1 fixed vulnerabilities in needrestart. The update introduced a
regression in needrestart. This update fixes the problem for LXC
containers.
We apologize for the inconvenience.
Original advisory details:
Qualys discovered that needrestart passed unsanitized data to a library
(libmodule-scandeps-perl) which expects safe input. A local attacker could
possibly use this issue to execute arbitrary code as root.
(CVE-2024-11003)
Qualys discovered that the library libmodule-scandeps-perl incorrectly
parsed perl code. This could allow a local attacker to execute arbitrary
shell commands. (CVE-2024-10224)
Qualys discovered that needrestart incorrectly used the PYTHONPATH
environment variable to spawn a new Python interpreter. A local attacker
could possibly use this issue to execute arbitrary code as root.
(CVE-2024-48990)
Qualys discovered that needrestart incorrectly checked the path to the
Python interpreter. A local attacker could possibly use this issue to win
a race condition and execute arbitrary code as root. (CVE-2024-48991)
Qualys discovered that needrestart incorrectly used the RUBYLIB
environment variable to spawn a new Ruby interpreter. A local attacker
could possibly use this issue to execute arbitrary code as root.
(CVE-2024-48992)
2 months 2 weeks ago
It was discovered that Apache Shiro used a static cipher within the
"Remember Me" feature inside authentication by default. An attacker could
possibly use this issue to achieve remote code execution or obtain
sensitive information.
2 months 2 weeks ago
It was discovered that Ghostscript incorrectly handled parsing certain PS
files. An attacker could use this issue to cause Ghostscript to crash,
resulting in a denial of service, or possibly execute arbitrary code.
Checked
2 hours 44 minutes ago
Recent content on Ubuntu security notices
Subscribe to Ubuntu feed