[USN-6867-1] Linux kernel vulnerabilities
Several security issues were fixed in the Linux kernel.
It was discovered that the HugeTLB file system component of the Linux
Kernel contained a NULL pointer dereference vulnerability. A privileged
attacker could possibly use this to to cause a denial of service.
(CVE-2024-0841)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM32 architecture;
- PowerPC architecture;
- x86 architecture;
- DMA engine subsystem;
- EFI core;
- GPU drivers;
- InfiniBand drivers;
- Multiple devices driver;
- Network drivers;
- Power supply drivers;
- TCM subsystem;
- Userspace I/O drivers;
- USB subsystem;
- Framebuffer layer;
- AFS file system;
- File systems infrastructure;
- BTRFS file system;
- Ext4 file system;
- Bluetooth subsystem;
- Networking core;
- IPv4 networking;
- IPv6 networking;
- L2TP protocol;
- MAC80211 subsystem;
- Netfilter;
- Netlink;
- Wireless networking;
(CVE-2021-47063, CVE-2024-26751, CVE-2024-26848, CVE-2024-26748,
CVE-2024-26733, CVE-2024-26735, CVE-2024-26805, CVE-2024-26804,
CVE-2024-26793, CVE-2023-52504, CVE-2024-27417, CVE-2024-27405,
CVE-2024-26778, CVE-2024-27414, CVE-2024-26801, CVE-2024-26835,
CVE-2024-27413, CVE-2024-26766, CVE-2024-27410, CVE-2024-27412,
CVE-2024-26773, CVE-2024-26777, CVE-2024-26839, CVE-2024-26764,
CVE-2024-26712, CVE-2024-26788, CVE-2024-26688, CVE-2024-26754,
CVE-2021-47070, CVE-2024-26752, CVE-2024-26845, CVE-2024-26791,
CVE-2024-26763, CVE-2024-27416, CVE-2024-26779, CVE-2024-26749,
CVE-2024-26736, CVE-2024-26840, CVE-2024-26772, CVE-2024-26790)
- ID
- USN-6867-1
- Severity
- high
- Severity from
- CVE-2024-0841
- URL
- https://ubuntu.com/security/notices/USN-6867-1
- Published
-
2024-07-03T21:40:16
(2 months ago) - Modified
-
2024-07-03T21:40:16
(2 months ago) - Other Advisories
-
- ALAS2-2024-2549
- ALSA-2024:3138
- ALSA-2024:3618
- ALSA-2024:4211
- ALSA-2024:5101
- DSA-5681-1
- ELSA-2024-12606
- ELSA-2024-2394
- ELSA-2024-3138
- ELSA-2024-3306
- ELSA-2024-3618
- ELSA-2024-3619
- ELSA-2024-4211
- ELSA-2024-4349
- ELSA-2024-4928
- ELSA-2024-5101
- ELSA-2024-5363
- RHSA-2024:2950
- RHSA-2024:3138
- RHSA-2024:3618
- RHSA-2024:3627
- RHSA-2024:4211
- RHSA-2024:4352
- RHSA-2024:5101
- RHSA-2024:5102
- RLSA-2024:3138
- RLSA-2024:3618
- RLSA-2024:3619
- RLSA-2024:4211
- RLSA-2024:4349
- RLSA-2024:4928
- RLSA-2024:5101
- SSA:2024-157-01
- SUSE-SU-2024:1320-1
- SUSE-SU-2024:1321-1
- SUSE-SU-2024:1322-1
- SUSE-SU-2024:1454-1
- SUSE-SU-2024:1465-1
- SUSE-SU-2024:1466-1
- SUSE-SU-2024:1480-1
- SUSE-SU-2024:1489-1
- SUSE-SU-2024:1490-1
- SUSE-SU-2024:1641-1
- SUSE-SU-2024:1642-1
- SUSE-SU-2024:1643-1
- SUSE-SU-2024:1644-1
- SUSE-SU-2024:1645-1
- SUSE-SU-2024:1646-1
- SUSE-SU-2024:1647-1
- SUSE-SU-2024:1648-1
- SUSE-SU-2024:1650-1
- SUSE-SU-2024:1659-1
- SUSE-SU-2024:1663-1
- SUSE-SU-2024:1669-1
- SUSE-SU-2024:1677-1
- SUSE-SU-2024:1679-1
- SUSE-SU-2024:1680-1
- SUSE-SU-2024:1682-1
- SUSE-SU-2024:1685-1
- SUSE-SU-2024:1695-1
- SUSE-SU-2024:1705-1
- SUSE-SU-2024:1711-1
- SUSE-SU-2024:1726-1
- SUSE-SU-2024:1739-1
- SUSE-SU-2024:1740-1
- SUSE-SU-2024:1748-1
- SUSE-SU-2024:1749-1
- SUSE-SU-2024:1750-1
- SUSE-SU-2024:1753-1
- SUSE-SU-2024:1757-1
- SUSE-SU-2024:1759-1
- SUSE-SU-2024:1870-1
- SUSE-SU-2024:1979-1
- SUSE-SU-2024:1983-1
- SUSE-SU-2024:2008-1
- SUSE-SU-2024:2010-1
- SUSE-SU-2024:2011-1
- SUSE-SU-2024:2019-1
- SUSE-SU-2024:2092-1
- SUSE-SU-2024:2135-1
- SUSE-SU-2024:2162-1
- SUSE-SU-2024:2163-1
- SUSE-SU-2024:2183-1
- SUSE-SU-2024:2184-1
- SUSE-SU-2024:2185-1
- SUSE-SU-2024:2189-1
- SUSE-SU-2024:2190-1
- SUSE-SU-2024:2191-1
- SUSE-SU-2024:2203-1
- SUSE-SU-2024:2207-1
- SUSE-SU-2024:2337-1
- SUSE-SU-2024:2360-1
- SUSE-SU-2024:2372-1
- SUSE-SU-2024:2381-1
- SUSE-SU-2024:2394-1
- SUSE-SU-2024:2446-1
- SUSE-SU-2024:2447-1
- SUSE-SU-2024:2448-1
- SUSE-SU-2024:2561-1
- SUSE-SU-2024:2571-1
- SUSE-SU-2024:2722-1
- SUSE-SU-2024:2824-1
- SUSE-SU-2024:2825-1
- SUSE-SU-2024:2840-1
- SUSE-SU-2024:2850-1
- SUSE-SU-2024:2892-1
- SUSE-SU-2024:2896-1
- SUSE-SU-2024:2901-1
- SUSE-SU-2024:2939-1
- SUSE-SU-2024:2940-1
- SUSE-SU-2024:2973-1
- USN-6766-1
- USN-6766-2
- USN-6766-3
- USN-6774-1
- USN-6777-1
- USN-6777-2
- USN-6777-3
- USN-6777-4
- USN-6778-1
- USN-6795-1
- USN-6816-1
- USN-6817-1
- USN-6817-2
- USN-6817-3
- USN-6820-1
- USN-6820-2
- USN-6821-1
- USN-6821-2
- USN-6821-3
- USN-6821-4
- USN-6828-1
- USN-6831-1
- USN-6866-1
- USN-6866-2
- USN-6866-3
- USN-6871-1
- USN-6892-1
- USN-6895-1
- USN-6895-2
- USN-6895-3
- USN-6895-4
- USN-6900-1
- USN-6919-1
- USN-6926-1
- USN-6926-2
- USN-6926-3
- USN-6938-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-tools-iot?distro=focal | ubuntu | linux-tools-iot | < 5.4.0.1038.36 | focal | ||
Affected | pkg:deb/ubuntu/linux-tools-bluefield?distro=focal | ubuntu | linux-tools-bluefield | < 5.4.0.1086.82 | focal | ||
Affected | pkg:deb/ubuntu/linux-tools-5.4.0-1086-bluefield?distro=focal | ubuntu | linux-tools-5.4.0-1086-bluefield | < 5.4.0-1086.93 | focal | ||
Affected | pkg:deb/ubuntu/linux-tools-5.4.0-1038-iot?distro=focal | ubuntu | linux-tools-5.4.0-1038-iot | < 5.4.0-1038.39 | focal | ||
Affected | pkg:deb/ubuntu/linux-modules-5.4.0-1086-bluefield?distro=focal | ubuntu | linux-modules-5.4.0-1086-bluefield | < 5.4.0-1086.93 | focal | ||
Affected | pkg:deb/ubuntu/linux-modules-5.4.0-1038-iot?distro=focal | ubuntu | linux-modules-5.4.0-1038-iot | < 5.4.0-1038.39 | focal | ||
Affected | pkg:deb/ubuntu/linux-iot?distro=focal | ubuntu | linux-iot | < 5.4.0.1038.36 | focal | ||
Affected | pkg:deb/ubuntu/linux-iot-tools-common?distro=focal | ubuntu | linux-iot-tools-common | < 5.4.0-1038.39 | focal | ||
Affected | pkg:deb/ubuntu/linux-iot-tools-5.4.0-1038?distro=focal | ubuntu | linux-iot-tools-5.4.0-1038 | < 5.4.0-1038.39 | focal | ||
Affected | pkg:deb/ubuntu/linux-iot-headers-5.4.0-1038?distro=focal | ubuntu | linux-iot-headers-5.4.0-1038 | < 5.4.0-1038.39 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-unsigned-5.4.0-1086-bluefield?distro=focal | ubuntu | linux-image-unsigned-5.4.0-1086-bluefield | < 5.4.0-1086.93 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-unsigned-5.4.0-1038-iot?distro=focal | ubuntu | linux-image-unsigned-5.4.0-1038-iot | < 5.4.0-1038.39 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-iot?distro=focal | ubuntu | linux-image-iot | < 5.4.0.1038.36 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-bluefield?distro=focal | ubuntu | linux-image-bluefield | < 5.4.0.1086.82 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-5.4.0-1086-bluefield?distro=focal | ubuntu | linux-image-5.4.0-1086-bluefield | < 5.4.0-1086.93 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-5.4.0-1038-iot?distro=focal | ubuntu | linux-image-5.4.0-1038-iot | < 5.4.0-1038.39 | focal | ||
Affected | pkg:deb/ubuntu/linux-headers-iot?distro=focal | ubuntu | linux-headers-iot | < 5.4.0.1038.36 | focal | ||
Affected | pkg:deb/ubuntu/linux-headers-bluefield?distro=focal | ubuntu | linux-headers-bluefield | < 5.4.0.1086.82 | focal | ||
Affected | pkg:deb/ubuntu/linux-headers-5.4.0-1086-bluefield?distro=focal | ubuntu | linux-headers-5.4.0-1086-bluefield | < 5.4.0-1086.93 | focal | ||
Affected | pkg:deb/ubuntu/linux-headers-5.4.0-1038-iot?distro=focal | ubuntu | linux-headers-5.4.0-1038-iot | < 5.4.0-1038.39 | focal | ||
Affected | pkg:deb/ubuntu/linux-buildinfo-5.4.0-1086-bluefield?distro=focal | ubuntu | linux-buildinfo-5.4.0-1086-bluefield | < 5.4.0-1086.93 | focal | ||
Affected | pkg:deb/ubuntu/linux-buildinfo-5.4.0-1038-iot?distro=focal | ubuntu | linux-buildinfo-5.4.0-1038-iot | < 5.4.0-1038.39 | focal | ||
Affected | pkg:deb/ubuntu/linux-bluefield?distro=focal | ubuntu | linux-bluefield | < 5.4.0.1086.82 | focal | ||
Affected | pkg:deb/ubuntu/linux-bluefield-tools-5.4.0-1086?distro=focal | ubuntu | linux-bluefield-tools-5.4.0-1086 | < 5.4.0-1086.93 | focal | ||
Affected | pkg:deb/ubuntu/linux-bluefield-headers-5.4.0-1086?distro=focal | ubuntu | linux-bluefield-headers-5.4.0-1086 | < 5.4.0-1086.93 | focal |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |