Category Archives: Advisories

USN-6895-1: Linux kernel vulnerabilities

Read Time:3 Minute, 14 Second

It was discovered that the ATA over Ethernet (AoE) driver in the Linux
kernel contained a race condition, leading to a use-after-free
vulnerability. An attacker could use this to cause a denial of service or
possibly execute arbitrary code. (CVE-2023-6270)

It was discovered that the HugeTLB file system component of the Linux
Kernel contained a NULL pointer dereference vulnerability. A privileged
attacker could possibly use this to to cause a denial of service.
(CVE-2024-0841)

It was discovered that the Open vSwitch implementation in the Linux kernel
could overflow its stack during recursive action operations under certain
conditions. A local attacker could use this to cause a denial of service
(system crash). (CVE-2024-1151)

Gui-Dong Han discovered that the software RAID driver in the Linux kernel
contained a race condition, leading to an integer overflow vulnerability. A
privileged attacker could possibly use this to cause a denial of service
(system crash). (CVE-2024-23307)

Bai Jiaju discovered that the Xceive XC4000 silicon tuner device driver in
the Linux kernel contained a race condition, leading to an integer overflow
vulnerability. An attacker could possibly use this to cause a denial of
service (system crash). (CVE-2024-24861)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
– ARM64 architecture;
– PowerPC architecture;
– x86 architecture;
– Cryptographic API;
– Android drivers;
– Block layer subsystem;
– Bluetooth drivers;
– DMA engine subsystem;
– GPU drivers;
– HID subsystem;
– Hardware monitoring drivers;
– I2C subsystem;
– IIO ADC drivers;
– IIO subsystem;
– IIO Magnetometer sensors drivers;
– InfiniBand drivers;
– On-Chip Interconnect management framework;
– Multiple devices driver;
– Media drivers;
– Network drivers;
– PHY drivers;
– MediaTek PM domains;
– SCSI drivers;
– TTY drivers;
– USB subsystem;
– DesignWare USB3 driver;
– Framebuffer layer;
– AFS file system;
– BTRFS file system;
– Ceph distributed file system;
– Ext4 file system;
– File systems infrastructure;
– NILFS2 file system;
– NTFS3 file system;
– SMB network file system;
– Core kernel;
– Memory management;
– Bluetooth subsystem;
– CAN network layer;
– Devlink API;
– Handshake API;
– HSR network protocol;
– IPv4 networking;
– IPv6 networking;
– MAC80211 subsystem;
– Multipath TCP;
– Netfilter;
– NFC subsystem;
– RxRPC session sockets;
– TIPC protocol;
– Unix domain sockets;
– Realtek audio codecs;
(CVE-2024-26822, CVE-2024-26917, CVE-2024-26723, CVE-2024-26715,
CVE-2024-26718, CVE-2024-26664, CVE-2024-26707, CVE-2024-26697,
CVE-2024-26720, CVE-2024-26660, CVE-2024-26677, CVE-2024-26736,
CVE-2024-26719, CVE-2024-26642, CVE-2024-26700, CVE-2024-26666,
CVE-2024-26684, CVE-2024-26803, CVE-2024-26698, CVE-2024-26711,
CVE-2024-26922, CVE-2024-26828, CVE-2024-26910, CVE-2024-26829,
CVE-2024-26685, CVE-2024-26920, CVE-2024-26696, CVE-2024-26826,
CVE-2023-52642, CVE-2024-26703, CVE-2024-26708, CVE-2024-26838,
CVE-2024-26716, CVE-2023-52631, CVE-2024-26782, CVE-2024-26593,
CVE-2024-26659, CVE-2024-26825, CVE-2024-26824, CVE-2024-26712,
CVE-2024-26674, CVE-2024-26722, CVE-2023-52643, CVE-2024-26714,
CVE-2024-26691, CVE-2024-27416, CVE-2024-26830, CVE-2023-52880,
CVE-2024-26702, CVE-2023-52645, CVE-2024-26820, CVE-2024-26662,
CVE-2024-26689, CVE-2024-26676, CVE-2024-26923, CVE-2024-26603,
CVE-2024-26818, CVE-2023-52638, CVE-2024-26733, CVE-2024-26601,
CVE-2024-26790, CVE-2024-26661, CVE-2024-26600, CVE-2024-26680,
CVE-2024-26748, CVE-2024-26792, CVE-2024-26889, CVE-2024-26681,
CVE-2024-26688, CVE-2024-26665, CVE-2024-26602, CVE-2024-26734,
CVE-2024-35833, CVE-2024-26919, CVE-2024-26916, CVE-2024-26667,
CVE-2024-26606, CVE-2024-26693, CVE-2024-26717, CVE-2023-52637,
CVE-2024-26831, CVE-2024-26663, CVE-2024-26694, CVE-2024-26802,
CVE-2024-26710, CVE-2024-26789, CVE-2024-26679, CVE-2024-26675,
CVE-2024-26798, CVE-2024-26695, CVE-2024-26726, CVE-2024-26926,
CVE-2024-26735, CVE-2024-26898, CVE-2024-26890)

Read More

USN-6864-3: Linux kernel (GKE) vulnerabilities

Read Time:23 Second

It was discovered that the Intel Data Streaming and Intel Analytics
Accelerator drivers in the Linux kernel allowed direct access to the
devices for unprivileged users and virtual machines. A local attacker could
use this to cause a denial of service. (CVE-2024-21823)

A security issue was discovered in the Linux kernel.
An attacker could possibly use it to compromise the system.
This update corrects flaws in the following subsystem:
– Netfilter;
(CVE-2024-26924)

Read More

USN-6894-1: Apport vulnerabilities

Read Time:1 Minute, 23 Second

Muqing Liu and neoni discovered that Apport incorrectly handled detecting
if an executable was replaced after a crash. A local attacker could
possibly use this issue to execute arbitrary code as the root user.
(CVE-2021-3899)

Gerrit Venema discovered that Apport incorrectly handled connections to
Apport sockets inside containers. A local attacker could possibly use this
issue to connect to arbitrary sockets as the root user. (CVE-2022-1242)

Gerrit Venema discovered that Apport incorrectly handled user settings
files. A local attacker could possibly use this issue to cause Apport to
consume resources, leading to a denial of service. (CVE-2022-28652)

Gerrit Venema discovered that Apport did not limit the amount of logging
from D-Bus connections. A local attacker could possibly use this issue to
fill up the Apport log file, leading to a denial of service.
(CVE-2022-28654)

Gerrit Venema discovered that Apport did not filter D-Bus connection
strings. A local attacker could possibly use this issue to cause Apport to
make arbitrary network connections. (CVE-2022-28655)

Gerrit Venema discovered that Apport did not limit the amount of memory
being consumed during D-Bus connections. A local attacker could possibly
use this issue to cause Apport to consume memory, leading to a denial of
service. (CVE-2022-28656)

Gerrit Venema discovered that Apport did not disable the python crash
handler before chrooting into a container. A local attacker could possibly
use this issue to execute arbitrary code. (CVE-2022-28657)

Gerrit Venema discovered that Apport incorrectly handled filename argument
whitespace. A local attacker could possibly use this issue to spoof
arguments to the Apport daemon. (CVE-2022-28658)

Read More

USN-6893-1: Linux kernel vulnerabilities

Read Time:3 Minute, 54 Second

It was discovered that a race condition existed in the Bluetooth subsystem
in the Linux kernel when modifying certain settings values through debugfs.
A privileged local attacker could use this to cause a denial of service.
(CVE-2024-24857, CVE-2024-24858, CVE-2024-24859)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
– ARM64 architecture;
– RISC-V architecture;
– S390 architecture;
– x86 architecture;
– Block layer subsystem;
– Compute Acceleration Framework;
– Accessibility subsystem;
– Android drivers;
– Drivers core;
– Bluetooth drivers;
– Clock framework and drivers;
– Data acquisition framework and drivers;
– Cryptographic API;
– Buffer Sharing and Synchronization framework;
– GPU drivers;
– On-Chip Interconnect management framework;
– IOMMU subsystem;
– Multiple devices driver;
– Media drivers;
– VMware VMCI Driver;
– Network drivers;
– Microsoft Azure Network Adapter (MANA) driver;
– Device tree and open firmware driver;
– Chrome hardware platform drivers;
– i.MX PM domains;
– TI SCI PM domains driver;
– S/390 drivers;
– SCSI drivers;
– SPI subsystem;
– Thermal drivers;
– TTY drivers;
– USB subsystem;
– Framebuffer layer;
– BTRFS file system;
– Network file system server daemon;
– NILFS2 file system;
– File systems infrastructure;
– Pstore file system;
– SMB network file system;
– BPF subsystem;
– Bluetooth subsystem;
– Netfilter;
– io_uring subsystem;
– Core kernel;
– Extra boot config (XBC);
– Memory management;
– Amateur Radio drivers;
– B.A.T.M.A.N. meshing protocol;
– Ethernet bridge;
– Networking core;
– IPv4 networking;
– IPv6 networking;
– Multipath TCP;
– NFC subsystem;
– RDS protocol;
– Network traffic control;
– SMC sockets;
– Sun RPC protocol;
– TLS protocol;
– Unix domain sockets;
– Wireless networking;
– eXpress Data Path;
– SELinux security module;
(CVE-2024-35967, CVE-2024-35886, CVE-2024-26999, CVE-2024-27008,
CVE-2024-26988, CVE-2024-35980, CVE-2024-26982, CVE-2024-35946,
CVE-2024-35918, CVE-2024-27015, CVE-2024-35900, CVE-2024-35942,
CVE-2024-35879, CVE-2024-35961, CVE-2024-35944, CVE-2024-35934,
CVE-2024-35978, CVE-2024-35938, CVE-2024-27003, CVE-2024-35976,
CVE-2024-36019, CVE-2024-35880, CVE-2024-35866, CVE-2024-35929,
CVE-2024-35917, CVE-2024-35912, CVE-2024-35896, CVE-2024-26986,
CVE-2024-35951, CVE-2024-35958, CVE-2024-26997, CVE-2024-35965,
CVE-2024-35953, CVE-2024-26993, CVE-2024-26991, CVE-2024-35892,
CVE-2024-36026, CVE-2024-35882, CVE-2024-35964, CVE-2024-35865,
CVE-2024-35897, CVE-2024-26981, CVE-2024-35872, CVE-2024-36027,
CVE-2024-26983, CVE-2024-35909, CVE-2024-35985, CVE-2024-35875,
CVE-2024-35890, CVE-2024-26922, CVE-2024-26994, CVE-2024-35903,
CVE-2024-35936, CVE-2024-35904, CVE-2024-27013, CVE-2024-36025,
CVE-2024-26980, CVE-2024-27006, CVE-2024-35861, CVE-2024-35864,
CVE-2024-27018, CVE-2024-36022, CVE-2024-26990, CVE-2024-35968,
CVE-2024-35860, CVE-2024-36024, CVE-2024-35933, CVE-2024-27019,
CVE-2024-35925, CVE-2024-35950, CVE-2024-35915, CVE-2024-35916,
CVE-2024-35956, CVE-2024-36020, CVE-2024-35873, CVE-2024-27002,
CVE-2024-35963, CVE-2024-35959, CVE-2024-35937, CVE-2024-27011,
CVE-2024-27020, CVE-2024-35883, CVE-2024-35913, CVE-2024-35910,
CVE-2024-27021, CVE-2024-35921, CVE-2024-35905, CVE-2024-27010,
CVE-2024-35981, CVE-2024-35885, CVE-2024-35955, CVE-2024-35894,
CVE-2024-35969, CVE-2024-36018, CVE-2024-35867, CVE-2024-27007,
CVE-2024-35908, CVE-2024-26985, CVE-2024-27016, CVE-2024-35960,
CVE-2024-35935, CVE-2024-35932, CVE-2024-35957, CVE-2024-27001,
CVE-2024-35871, CVE-2024-35907, CVE-2024-35878, CVE-2024-35979,
CVE-2024-35972, CVE-2024-35975, CVE-2024-35877, CVE-2024-35926,
CVE-2024-26817, CVE-2024-35899, CVE-2024-27004, CVE-2024-35920,
CVE-2024-35924, CVE-2024-35977, CVE-2024-35930, CVE-2024-35911,
CVE-2024-26996, CVE-2024-27005, CVE-2024-35870, CVE-2024-35982,
CVE-2024-35895, CVE-2024-35943, CVE-2024-35902, CVE-2024-35919,
CVE-2024-35973, CVE-2024-35931, CVE-2024-35888, CVE-2024-35914,
CVE-2024-35970, CVE-2024-36023, CVE-2024-27012, CVE-2024-35939,
CVE-2024-26984, CVE-2024-35884, CVE-2024-35901, CVE-2024-26811,
CVE-2024-35966, CVE-2024-35891, CVE-2024-35887, CVE-2024-35945,
CVE-2024-35971, CVE-2024-35862, CVE-2024-26987, CVE-2024-26921,
CVE-2024-26989, CVE-2024-35952, CVE-2024-27009, CVE-2024-35893,
CVE-2024-26995, CVE-2024-26925, CVE-2024-35868, CVE-2024-35954,
CVE-2024-35922, CVE-2024-27000, CVE-2024-36021, CVE-2024-27014,
CVE-2024-35940, CVE-2024-26992, CVE-2024-26926, CVE-2024-35927,
CVE-2024-35863, CVE-2024-27022, CVE-2024-26998, CVE-2024-27017,
CVE-2024-26928, CVE-2024-35889, CVE-2024-35898, CVE-2024-35869,
CVE-2024-26936, CVE-2024-26923, CVE-2023-52699, CVE-2024-35974)

Read More

USN-6885-2: Apache HTTP Server regression

Read Time:1 Minute, 24 Second

USN-6885-1 fixed vulnerabilities in Apache HTTP Server. One of the security
fixes introduced a regression when proxying requests to a HTTP/2 server.
This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

Marc Stern discovered that the Apache HTTP Server incorrectly handled
serving WebSocket protocol upgrades over HTTP/2 connections. A remote
attacker could possibly use this issue to cause the server to crash,
resulting in a denial of service. (CVE-2024-36387)

Orange Tsai discovered that the Apache HTTP Server mod_proxy module
incorrectly sent certain request URLs with incorrect encodings to backends.
A remote attacker could possibly use this issue to bypass authentication.
(CVE-2024-38473)

Orange Tsai discovered that the Apache HTTP Server mod_rewrite module
incorrectly handled certain substitutions. A remote attacker could possibly
use this issue to execute scripts in directories not directly reachable
by any URL, or cause a denial of service. Some environments may require
using the new UnsafeAllow3F flag to handle unsafe substitutions.
(CVE-2024-38474, CVE-2024-38475, CVE-2024-39573)

Orange Tsai discovered that the Apache HTTP Server incorrectly handled
certain response headers. A remote attacker could possibly use this issue
to obtain sensitive information, execute local scripts, or perform SSRF
attacks. (CVE-2024-38476)

Orange Tsai discovered that the Apache HTTP Server mod_proxy module
incorrectly handled certain requests. A remote attacker could possibly use
this issue to cause the server to crash, resulting in a denial of service.
(CVE-2024-38477)

It was discovered that the Apache HTTP Server incorrectly handled certain
handlers configured via AddType. A remote attacker could possibly use this
issue to obtain source code. (CVE-2024-39884)

Read More