USN-6972-2: Linux kernel (AWS) vulnerabilities

Read Time:59 Second

Yuxuan Hu discovered that the Bluetooth RFCOMM protocol driver in the Linux
Kernel contained a race condition, leading to a NULL pointer dereference.
An attacker could possibly use this to cause a denial of service (system
crash). (CVE-2024-22099)

It was discovered that a race condition existed in the Bluetooth subsystem
in the Linux kernel, leading to a null pointer dereference vulnerability. A
privileged local attacker could use this to possibly cause a denial of
service (system crash). (CVE-2024-24860)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
– SuperH RISC architecture;
– User-Mode Linux (UML);
– GPU drivers;
– MMC subsystem;
– Network drivers;
– PHY drivers;
– Pin controllers subsystem;
– Xen hypervisor drivers;
– GFS2 file system;
– Core kernel;
– Bluetooth subsystem;
– IPv4 networking;
– IPv6 networking;
– HD-audio driver;
– ALSA SH drivers;
(CVE-2024-26903, CVE-2024-35835, CVE-2023-52644, CVE-2024-39292,
CVE-2024-36940, CVE-2024-26600, CVE-2023-52629, CVE-2024-35955,
CVE-2023-52760, CVE-2023-52806, CVE-2024-39484, CVE-2024-26679,
CVE-2024-26654, CVE-2024-36901, CVE-2024-26687, CVE-2023-52470)

Read More

USN-6979-1: Linux kernel (Raspberry Pi) vulnerabilities

Read Time:2 Minute, 16 Second

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
– ARM64 architecture;
– M68K architecture;
– User-Mode Linux (UML);
– x86 architecture;
– Accessibility subsystem;
– Character device driver;
– Clock framework and drivers;
– CPU frequency scaling framework;
– Hardware crypto device drivers;
– Buffer Sharing and Synchronization framework;
– FireWire subsystem;
– ARM SCMI message protocol;
– GPU drivers;
– HW tracing;
– InfiniBand drivers;
– Macintosh device drivers;
– Multiple devices driver;
– Media drivers;
– Network drivers;
– Pin controllers subsystem;
– S/390 drivers;
– SCSI drivers;
– SoundWire subsystem;
– Greybus lights staging drivers;
– TTY drivers;
– Framebuffer layer;
– Virtio drivers;
– 9P distributed file system;
– eCrypt file system;
– EROFS file system;
– Ext4 file system;
– F2FS file system;
– JFFS2 file system;
– Network file system client;
– NILFS2 file system;
– SMB network file system;
– Mellanox drivers;
– Kernel debugger infrastructure;
– IRQ subsystem;
– Tracing infrastructure;
– Dynamic debug library;
– 9P file system network protocol;
– Bluetooth subsystem;
– Networking core;
– IPv4 networking;
– IPv6 networking;
– Netfilter;
– NET/ROM layer;
– NFC subsystem;
– NSH protocol;
– Open vSwitch;
– Phonet protocol;
– TIPC protocol;
– TLS protocol;
– Unix domain sockets;
– Wireless networking;
– eXpress Data Path;
– XFRM subsystem;
– ALSA framework;
(CVE-2022-48674, CVE-2024-36016, CVE-2024-36934, CVE-2024-39471,
CVE-2024-38381, CVE-2024-26584, CVE-2024-38635, CVE-2024-36902,
CVE-2022-48772, CVE-2024-38600, CVE-2024-39475, CVE-2024-26886,
CVE-2024-39301, CVE-2024-36919, CVE-2024-35947, CVE-2024-38559,
CVE-2024-38637, CVE-2024-36014, CVE-2024-36960, CVE-2024-35976,
CVE-2024-27399, CVE-2024-38607, CVE-2024-38558, CVE-2024-38578,
CVE-2024-36015, CVE-2024-39488, CVE-2024-38780, CVE-2024-36940,
CVE-2024-38621, CVE-2024-38659, CVE-2024-26585, CVE-2024-27019,
CVE-2024-38615, CVE-2024-38661, CVE-2024-37353, CVE-2024-38549,
CVE-2024-38579, CVE-2024-27401, CVE-2024-38589, CVE-2024-38565,
CVE-2022-48655, CVE-2024-38567, CVE-2024-38587, CVE-2024-37356,
CVE-2024-36959, CVE-2024-39493, CVE-2024-38627, CVE-2024-36939,
CVE-2024-31076, CVE-2024-36971, CVE-2024-38560, CVE-2024-39467,
CVE-2024-36286, CVE-2024-39480, CVE-2024-26907, CVE-2024-36017,
CVE-2024-38634, CVE-2023-52585, CVE-2024-38582, CVE-2023-52752,
CVE-2024-38583, CVE-2024-38618, CVE-2024-36946, CVE-2024-39292,
CVE-2024-36950, CVE-2024-36886, CVE-2024-39489, CVE-2024-36933,
CVE-2024-27398, CVE-2023-52434, CVE-2024-36905, CVE-2024-38596,
CVE-2021-47131, CVE-2024-38601, CVE-2024-38552, CVE-2024-26583,
CVE-2024-38633, CVE-2024-36964, CVE-2024-39276, CVE-2024-36270,
CVE-2024-38613, CVE-2024-36904, CVE-2024-38598, CVE-2024-38612,
CVE-2024-36941, CVE-2024-36954, CVE-2024-38599, CVE-2024-36883,
CVE-2023-52882, CVE-2024-33621)

Read More

ZDI-24-1161: Linux Kernel vmwgfx Driver Out-Of-Bounds Read Information Disclosure Vulnerability

Read Time:17 Second

This vulnerability allows local attackers to disclose sensitive information on affected installations of Linux Kernel. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.7. The following CVEs are assigned: CVE-2024-36960.

Read More

News, Advisories and much more

Exit mobile version