Several security issues were fixed in the Linux kernel.
It was discovered that the ATA over Ethernet (AoE) driver in the Linux
kernel contained a race condition, leading to a use-after-free
vulnerability. An attacker could use this to cause a denial of service or
possibly execute arbitrary code. (CVE-2023-6270)
It was discovered that the Atheros 802.11ac wireless driver did not
properly validate certain data structures, leading to a NULL pointer
dereference. An attacker could possibly use this to cause a denial of
service. (CVE-2023-7042)
It was discovered that the HugeTLB file system component of the Linux
Kernel contained a NULL pointer dereference vulnerability. A privileged
attacker could possibly use this to to cause a denial of service.
(CVE-2024-0841)
Yuxuan Hu discovered that the Bluetooth RFCOMM protocol driver in the Linux
Kernel contained a race condition, leading to a NULL pointer dereference.
An attacker could possibly use this to cause a denial of service (system
crash). (CVE-2024-22099)
It was discovered that the MediaTek SoC Gigabit Ethernet driver in the
Linux kernel contained a race condition when stopping the device. A local
attacker could possibly use this to cause a denial of service (device
unavailability). (CVE-2024-27432)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM32 architecture;
- RISC-V architecture;
- x86 architecture;
- ACPI drivers;
- Block layer subsystem;
- Clock framework and drivers;
- CPU frequency scaling framework;
- Cryptographic API;
- DMA engine subsystem;
- EFI core;
- GPU drivers;
- InfiniBand drivers;
- IOMMU subsystem;
- Multiple devices driver;
- Media drivers;
- MMC subsystem;
- Network drivers;
- NTB driver;
- NVME drivers;
- PCI subsystem;
- MediaTek PM domains;
- Power supply drivers;
- SPI subsystem;
- Media staging drivers;
- TCM subsystem;
- USB subsystem;
- Framebuffer layer;
- AFS file system;
- File systems infrastructure;
- BTRFS file system;
- EROFS file system;
- Ext4 file system;
- F2FS file system;
- Network file system client;
- NTFS3 file system;
- Diskquota system;
- SMB network file system;
- BPF subsystem;
- Netfilter;
- TLS protocol;
- io_uring subsystem;
- Bluetooth subsystem;
- Memory management;
- Ethernet bridge;
- Networking core;
- HSR network protocol;
- IPv4 networking;
- IPv6 networking;
- L2TP protocol;
- MAC80211 subsystem;
- Multipath TCP;
- Netlink;
- NET/ROM layer;
- Packet sockets;
- RDS protocol;
- Sun RPC protocol;
- Unix domain sockets;
- Wireless networking;
- USB sound devices;
(CVE-2024-26877, CVE-2024-35829, CVE-2024-26737, CVE-2024-27075,
CVE-2024-27414, CVE-2024-27053, CVE-2024-26889, CVE-2024-26792,
CVE-2024-26882, CVE-2024-26906, CVE-2024-26851, CVE-2024-27037,
CVE-2024-26782, CVE-2024-27388, CVE-2024-26748, CVE-2024-27419,
CVE-2024-27034, CVE-2023-52662, CVE-2024-27047, CVE-2024-26874,
CVE-2024-26779, CVE-2024-26872, CVE-2024-26820, CVE-2024-35811,
CVE-2024-26771, CVE-2024-26733, CVE-2024-26903, CVE-2024-26736,
CVE-2024-26870, CVE-2024-26883, CVE-2024-27403, CVE-2024-26878,
CVE-2024-26857, CVE-2023-52645, CVE-2024-26601, CVE-2024-26891,
CVE-2024-27028, CVE-2024-27054, CVE-2024-26804, CVE-2024-27405,
CVE-2024-35830, CVE-2024-26898, CVE-2024-26754, CVE-2024-26793,
CVE-2024-26747, CVE-2024-26901, CVE-2023-52652, CVE-2023-52650,
CVE-2024-26651, CVE-2024-26816, CVE-2024-35845, CVE-2024-26862,
CVE-2024-26884, CVE-2024-26752, CVE-2024-26852, CVE-2023-52656,
CVE-2024-26790, CVE-2024-26603, CVE-2024-27078, CVE-2024-26802,
CVE-2024-27045, CVE-2024-27024, CVE-2024-27073, CVE-2024-26585,
CVE-2024-26894, CVE-2024-26583, CVE-2024-27416, CVE-2024-27431,
CVE-2024-35844, CVE-2024-26838, CVE-2024-27410, CVE-2024-26915,
CVE-2024-26772, CVE-2024-26897, CVE-2024-26798, CVE-2024-27415,
CVE-2024-26855, CVE-2024-26833, CVE-2024-26764, CVE-2024-26659,
CVE-2024-26846, CVE-2024-26895, CVE-2023-52644, CVE-2024-26751,
CVE-2024-26880, CVE-2024-26863, CVE-2024-26809, CVE-2024-27052,
CVE-2024-27051, CVE-2024-26907, CVE-2024-27413, CVE-2024-26801,
CVE-2023-52620, CVE-2024-26749, CVE-2024-26787, CVE-2024-27046,
CVE-2024-26803, CVE-2024-26744, CVE-2024-26879, CVE-2024-27432,
CVE-2024-27412, CVE-2024-26791, CVE-2024-26773, CVE-2023-52640,
CVE-2024-26778, CVE-2024-26859, CVE-2024-27044, CVE-2024-26788,
CVE-2024-27077, CVE-2024-26750, CVE-2024-26861, CVE-2023-52434,
CVE-2024-26774, CVE-2024-26795, CVE-2024-26856, CVE-2024-27043,
CVE-2024-27039, CVE-2024-26777, CVE-2024-27030, CVE-2024-26584,
CVE-2024-26735, CVE-2024-26805, CVE-2024-26766, CVE-2024-26763,
CVE-2024-27065, CVE-2023-52641, CVE-2024-27417, CVE-2023-52497,
CVE-2023-52447, CVE-2024-26769, CVE-2024-26843, CVE-2024-26881,
CVE-2024-26688, CVE-2024-26743, CVE-2024-27038, CVE-2024-27390,
CVE-2024-27436, CVE-2024-26839, CVE-2024-27074, CVE-2024-26840,
CVE-2024-27076, CVE-2024-26835, CVE-2024-26885, CVE-2024-26776,
CVE-2024-26845, CVE-2024-26875, CVE-2024-35828)
- ID
- USN-6821-2
- Severity
- critical
- URL
- https://ubuntu.com/security/notices/USN-6821-2
- Published
-
2024-06-10T17:13:01
(6 weeks ago) - Modified
-
2024-06-10T17:13:01
(6 weeks ago) - Other Advisories
-
-
ALAS-2024-1923
-
ALAS2-2024-2475
-
ALAS2-2024-2549
-
ALAS2-2024-2584
-
ALSA-2024:3138
-
ALSA-2024:3618
-
ALSA-2024:4211
-
DSA-5658-1
-
DSA-5681-1
-
ELSA-2024-2394
-
ELSA-2024-3138
-
ELSA-2024-3306
-
ELSA-2024-3618
-
ELSA-2024-3619
-
ELSA-2024-4211
-
ELSA-2024-4349
-
RHSA-2024:2950
-
RHSA-2024:3138
-
RHSA-2024:3618
-
RHSA-2024:3627
-
RHSA-2024:4211
-
RHSA-2024:4352
-
RLSA-2024:3138
-
RLSA-2024:3618
-
RLSA-2024:3619
-
RLSA-2024:4211
-
RLSA-2024:4349
-
SSA:2024-157-01
-
SUSE-SU-2024:0855-1
-
SUSE-SU-2024:0856-1
-
SUSE-SU-2024:0857-1
-
SUSE-SU-2024:0858-1
-
SUSE-SU-2024:0900-1
-
SUSE-SU-2024:0900-2
-
SUSE-SU-2024:0910-1
-
SUSE-SU-2024:0925-1
-
SUSE-SU-2024:0926-1
-
SUSE-SU-2024:0975-1
-
SUSE-SU-2024:0976-1
-
SUSE-SU-2024:0977-1
-
SUSE-SU-2024:1320-1
-
SUSE-SU-2024:1321-1
-
SUSE-SU-2024:1322-1
-
SUSE-SU-2024:1454-1
-
SUSE-SU-2024:1466-1
-
SUSE-SU-2024:1480-1
-
SUSE-SU-2024:1490-1
-
USN-6688-1
-
USN-6724-1
-
USN-6724-2
-
USN-6765-1
-
USN-6774-1
-
USN-6777-1
-
USN-6777-2
-
USN-6777-3
-
USN-6777-4
-
USN-6778-1
-
USN-6816-1
-
USN-6817-1
-
USN-6817-2
-
USN-6817-3
-
USN-6818-1
-
USN-6818-2
-
USN-6818-3
-
USN-6818-4
-
USN-6819-1
-
USN-6819-2
-
USN-6819-3
-
USN-6819-4
-
USN-6820-1
-
USN-6820-2
-
USN-6821-1
-
USN-6821-3
-
USN-6821-4
-
USN-6828-1
-
USN-6831-1
-
USN-6865-1
-
USN-6866-1
-
USN-6866-2
-
USN-6866-3
-
USN-6867-1
-
USN-6871-1
-
USN-6872-1
-
USN-6872-2
-
USN-6873-1
-
USN-6873-2
-
USN-6874-1
-
USN-6878-1
-
USN-6892-1
-
USN-6895-1
-
USN-6895-2
-
USN-6895-3
-
USN-6896-1
-
USN-6896-2
-
USN-6896-3
-
USN-6896-4
-
USN-6896-5
-
USN-6900-1
-
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-tools-kvm?distro=jammy | ubuntu |
![]() |
< 5.15.0.1060.56 | jammy | ||
Affected | pkg:deb/ubuntu/linux-tools-gkeop?distro=jammy | ubuntu |
![]() |
< 5.15.0.1046.45 | jammy | ||
Affected | pkg:deb/ubuntu/linux-tools-gkeop-edge?distro=focal | ubuntu |
![]() |
< 5.15.0.1046.53~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-tools-gkeop-5.15?distro=jammy | ubuntu |
![]() |
< 5.15.0.1046.45 | jammy | ||
Affected | pkg:deb/ubuntu/linux-tools-gkeop-5.15?distro=focal | ubuntu |
![]() |
< 5.15.0.1046.53~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-tools-5.15.0-1060-kvm?distro=jammy | ubuntu |
![]() |
< 5.15.0-1060.65 | jammy | ||
Affected | pkg:deb/ubuntu/linux-tools-5.15.0-1046-gkeop?distro=jammy | ubuntu |
![]() |
< 5.15.0-1046.53 | jammy | ||
Affected | pkg:deb/ubuntu/linux-tools-5.15.0-1046-gkeop?distro=focal | ubuntu |
![]() |
< 5.15.0-1046.53~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-modules-extra-gkeop?distro=jammy | ubuntu |
![]() |
< 5.15.0.1046.45 | jammy | ||
Affected | pkg:deb/ubuntu/linux-modules-extra-gkeop-edge?distro=focal | ubuntu |
![]() |
< 5.15.0.1046.53~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-modules-extra-gkeop-5.15?distro=jammy | ubuntu |
![]() |
< 5.15.0.1046.45 | jammy | ||
Affected | pkg:deb/ubuntu/linux-modules-extra-gkeop-5.15?distro=focal | ubuntu |
![]() |
< 5.15.0.1046.53~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-modules-extra-5.15.0-1046-gkeop?distro=jammy | ubuntu |
![]() |
< 5.15.0-1046.53 | jammy | ||
Affected | pkg:deb/ubuntu/linux-modules-extra-5.15.0-1046-gkeop?distro=focal | ubuntu |
![]() |
< 5.15.0-1046.53~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-modules-5.15.0-1060-kvm?distro=jammy | ubuntu |
![]() |
< 5.15.0-1060.65 | jammy | ||
Affected | pkg:deb/ubuntu/linux-modules-5.15.0-1046-gkeop?distro=jammy | ubuntu |
![]() |
< 5.15.0-1046.53 | jammy | ||
Affected | pkg:deb/ubuntu/linux-modules-5.15.0-1046-gkeop?distro=focal | ubuntu |
![]() |
< 5.15.0-1046.53~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-kvm?distro=jammy | ubuntu |
![]() |
< 5.15.0.1060.56 | jammy | ||
Affected | pkg:deb/ubuntu/linux-kvm-tools-5.15.0-1060?distro=jammy | ubuntu |
![]() |
< 5.15.0-1060.65 | jammy | ||
Affected | pkg:deb/ubuntu/linux-kvm-headers-5.15.0-1060?distro=jammy | ubuntu |
![]() |
< 5.15.0-1060.65 | jammy | ||
Affected | pkg:deb/ubuntu/linux-image-unsigned-5.15.0-1060-kvm?distro=jammy | ubuntu |
![]() |
< 5.15.0-1060.65 | jammy | ||
Affected | pkg:deb/ubuntu/linux-image-unsigned-5.15.0-1046-gkeop?distro=jammy | ubuntu |
![]() |
< 5.15.0-1046.53 | jammy | ||
Affected | pkg:deb/ubuntu/linux-image-unsigned-5.15.0-1046-gkeop?distro=focal | ubuntu |
![]() |
< 5.15.0-1046.53~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-kvm?distro=jammy | ubuntu |
![]() |
< 5.15.0.1060.56 | jammy | ||
Affected | pkg:deb/ubuntu/linux-image-gkeop?distro=jammy | ubuntu |
![]() |
< 5.15.0.1046.45 | jammy | ||
Affected | pkg:deb/ubuntu/linux-image-gkeop-edge?distro=focal | ubuntu |
![]() |
< 5.15.0.1046.53~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-gkeop-5.15?distro=jammy | ubuntu |
![]() |
< 5.15.0.1046.45 | jammy | ||
Affected | pkg:deb/ubuntu/linux-image-gkeop-5.15?distro=focal | ubuntu |
![]() |
< 5.15.0.1046.53~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-5.15.0-1060-kvm?distro=jammy | ubuntu |
![]() |
< 5.15.0-1060.65 | jammy | ||
Affected | pkg:deb/ubuntu/linux-image-5.15.0-1046-gkeop?distro=jammy | ubuntu |
![]() |
< 5.15.0-1046.53 | jammy | ||
Affected | pkg:deb/ubuntu/linux-image-5.15.0-1046-gkeop?distro=focal | ubuntu |
![]() |
< 5.15.0-1046.53~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-headers-kvm?distro=jammy | ubuntu |
![]() |
< 5.15.0.1060.56 | jammy | ||
Affected | pkg:deb/ubuntu/linux-headers-gkeop?distro=jammy | ubuntu |
![]() |
< 5.15.0.1046.45 | jammy | ||
Affected | pkg:deb/ubuntu/linux-headers-gkeop-edge?distro=focal | ubuntu |
![]() |
< 5.15.0.1046.53~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-headers-gkeop-5.15?distro=jammy | ubuntu |
![]() |
< 5.15.0.1046.45 | jammy | ||
Affected | pkg:deb/ubuntu/linux-headers-gkeop-5.15?distro=focal | ubuntu |
![]() |
< 5.15.0.1046.53~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-headers-5.15.0-1060-kvm?distro=jammy | ubuntu |
![]() |
< 5.15.0-1060.65 | jammy | ||
Affected | pkg:deb/ubuntu/linux-headers-5.15.0-1046-gkeop?distro=jammy | ubuntu |
![]() |
< 5.15.0-1046.53 | jammy | ||
Affected | pkg:deb/ubuntu/linux-headers-5.15.0-1046-gkeop?distro=focal | ubuntu |
![]() |
< 5.15.0-1046.53~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-gkeop?distro=jammy | ubuntu |
![]() |
< 5.15.0.1046.45 | jammy | ||
Affected | pkg:deb/ubuntu/linux-gkeop-tools-5.15.0-1046?distro=jammy | ubuntu |
![]() |
< 5.15.0-1046.53 | jammy | ||
Affected | pkg:deb/ubuntu/linux-gkeop-headers-5.15.0-1046?distro=jammy | ubuntu |
![]() |
< 5.15.0-1046.53 | jammy | ||
Affected | pkg:deb/ubuntu/linux-gkeop-edge?distro=focal | ubuntu |
![]() |
< 5.15.0.1046.53~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-gkeop-cloud-tools-5.15.0-1046?distro=jammy | ubuntu |
![]() |
< 5.15.0-1046.53 | jammy | ||
Affected | pkg:deb/ubuntu/linux-gkeop-5.15?distro=jammy | ubuntu |
![]() |
< 5.15.0.1046.45 | jammy | ||
Affected | pkg:deb/ubuntu/linux-gkeop-5.15?distro=focal | ubuntu |
![]() |
< 5.15.0.1046.53~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-gkeop-5.15-tools-5.15.0-1046?distro=focal | ubuntu |
![]() |
< 5.15.0-1046.53~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-gkeop-5.15-headers-5.15.0-1046?distro=focal | ubuntu |
![]() |
< 5.15.0-1046.53~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-gkeop-5.15-cloud-tools-5.15.0-1046?distro=focal | ubuntu |
![]() |
< 5.15.0-1046.53~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-cloud-tools-gkeop?distro=jammy | ubuntu |
![]() |
< 5.15.0.1046.45 | jammy | ||
Affected | pkg:deb/ubuntu/linux-cloud-tools-gkeop-edge?distro=focal | ubuntu |
![]() |
< 5.15.0.1046.53~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-cloud-tools-gkeop-5.15?distro=jammy | ubuntu |
![]() |
< 5.15.0.1046.45 | jammy | ||
Affected | pkg:deb/ubuntu/linux-cloud-tools-gkeop-5.15?distro=focal | ubuntu |
![]() |
< 5.15.0.1046.53~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-cloud-tools-5.15.0-1046-gkeop?distro=jammy | ubuntu |
![]() |
< 5.15.0-1046.53 | jammy | ||
Affected | pkg:deb/ubuntu/linux-cloud-tools-5.15.0-1046-gkeop?distro=focal | ubuntu |
![]() |
< 5.15.0-1046.53~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-buildinfo-5.15.0-1060-kvm?distro=jammy | ubuntu |
![]() |
< 5.15.0-1060.65 | jammy | ||
Affected | pkg:deb/ubuntu/linux-buildinfo-5.15.0-1046-gkeop?distro=jammy | ubuntu |
![]() |
< 5.15.0-1046.53 | jammy | ||
Affected | pkg:deb/ubuntu/linux-buildinfo-5.15.0-1046-gkeop?distro=focal | ubuntu |
![]() |
< 5.15.0-1046.53~20.04.1 | focal |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |