Ubuntu update for linux-oem-6.1



Published: 2024-07-08
Risk High
Patch available YES
Number of vulnerabilities 60
CVE-ID CVE-2023-46838
CVE-2023-50431
CVE-2023-5633
CVE-2023-6610
CVE-2024-0340
CVE-2024-1085
CVE-2024-1086
CVE-2024-23849
CVE-2024-24860
CVE-2024-26599
CVE-2023-52604
CVE-2023-52439
CVE-2024-26627
CVE-2024-26601
CVE-2023-52607
CVE-2023-52456
CVE-2023-52602
CVE-2023-52443
CVE-2023-52599
CVE-2023-52603
CVE-2024-26588
CVE-2024-26581
CVE-2023-52600
CVE-2023-52584
CVE-2024-26625
CVE-2023-52606
CVE-2023-52463
CVE-2023-52464
CVE-2023-52597
CVE-2023-52595
CVE-2023-52458
CVE-2023-52457
CVE-2023-52438
CVE-2023-52469
CVE-2023-52462
CVE-2024-26589
CVE-2024-26592
CVE-2024-26594
CVE-2023-52601
CVE-2023-52593
CVE-2023-52436
CVE-2023-52447
CVE-2023-52587
CVE-2023-52445
CVE-2023-52454
CVE-2023-52451
CVE-2024-26597
CVE-2023-52448
CVE-2023-52598
CVE-2024-26591
CVE-2023-52449
CVE-2023-52444
CVE-2023-52583
CVE-2023-52589
CVE-2024-26598
CVE-2023-52470
CVE-2023-52594
CVE-2023-52588
CVE-2023-52467
CVE-2024-26600
CWE-ID CWE-20
CWE-401
CWE-416
CWE-125
CWE-665
CWE-193
CWE-362
CWE-667
CWE-476
CWE-119
CWE-129
CWE-787
CWE-254
CWE-200
CWE-399
CWE-617
Exploitation vector Network
Public exploit Vulnerability #7 is being exploited in the wild.
Vulnerable software
Subscribe
Ubuntu
Operating systems & Components / Operating system

linux-image-oem-22.04c (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-oem-22.04b (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-oem-22.04a (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-oem-22.04 (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-6.1.0-1035-oem (Ubuntu package)
Operating systems & Components / Operating system package or component

Vendor Canonical Ltd.

Security Bulletin

This security bulletin contains information about 60 vulnerabilities.

1) Input validation error

EUVDB-ID: #VU85682

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-46838

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows an unprivileged guest to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of network packets at the backend. An unprivileged guest can send zero-length packets to the OS kernel and perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Memory leak

EUVDB-ID: #VU88285

Risk: Low

CVSSv3.1: 2.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-50431

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due memory leak within the sec_attest_info() function in drivers/accel/habanalabs/common/habanalabs_ioctl.c. A local user can cause information leak to user space.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Use-after-free

EUVDB-ID: #VU83384

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-5633

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error when running inside a VMware guest with 3D acceleration enabled. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Out-of-bounds read

EUVDB-ID: #VU85443

Risk: Low

CVSSv3.1: 6.2 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-6610

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to a boundary condition within the smb2_dump_detail() function in fs/smb/client/smb2ops.c. A local user can trigger an out-of-bounds read error and gain access to sensitive information or crash the kernel.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Improper Initialization

EUVDB-ID: #VU86579

Risk: Low

CVSSv3.1: 3.3 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-0340

CWE-ID: CWE-665 - Improper Initialization

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to improper initialization within the vhost_new_msg() function in drivers/vhost/vhost.c in the Linux kernel vhost driver. A local user can run a specially crafted application to gain access to sensitive kernel information.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Use-after-free

EUVDB-ID: #VU86578

Risk: Low

CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-1085

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the netfilter nf_tables component in Linux kernel. A local user can trigger a use-after-free error and execute arbitrary code on the system.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Use-after-free

EUVDB-ID: #VU86577

Risk: High

CVSSv3.1: 8.4 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:H/RL:O/RC:C]

CVE-ID: CVE-2024-1086

CWE-ID: CWE-416 - Use After Free

Exploit availability: Yes

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the netfilter nf_tables component in Linux kernel. A local user can trigger a use-after-free error and execute arbitrary code on the system.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.

8) Off-by-one

EUVDB-ID: #VU86019

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-23849

CWE-ID: CWE-193 - Off-by-one Error

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an off-by-one error within the rds_recv_track_latency() function in net/rds/af_rds.c. A local user can trigger an off-by-one error and perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Race condition

EUVDB-ID: #VU86580

Risk: Medium

CVSSv3.1: 5.7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-24860

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a race condition within the {min,max}_key_size_set() function in the Linux kernel bluetooth device driver. A remote attacker with physical proximity to device can send specially crafted packets to the system and crash the kernel.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Out-of-bounds read

EUVDB-ID: #VU87681

Risk: Low

CVSSv3.1: 2.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26599

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the of_pwm_single_xlate() function in drivers/pwm/core.c. A local user can trigger an out-of-bounds read error and read contents of memory on the system.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Out-of-bounds read

EUVDB-ID: #VU90342

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52604

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the dbAdjTree() function in fs/jfs/jfs_dmap.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Use-after-free

EUVDB-ID: #VU87573

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52439

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the uio_open() function in drivers/uio/uio.c. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Improper locking

EUVDB-ID: #VU88101

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26627

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service attack (DoS).

The vulnerability exists due to improper locking when calling the scsi_host_busy() function. A local user can perform a denial of service attack.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Improper locking

EUVDB-ID: #VU93770

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26601

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the ext4_mb_generate_buddy() and mb_free_blocks() functions in fs/ext4/mballoc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) NULL pointer dereference

EUVDB-ID: #VU90841

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52607

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the pgtable_cache_add() function in arch/powerpc/mm/init-common.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) Improper locking

EUVDB-ID: #VU89243

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52456

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service attack (DoS) on the target system.

The vulnerability exists due to double-locking error within the imx_uart_stop_tx() function in drivers/tty/serial/imx.c. A local user can crash the OS kernel.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

17) Out-of-bounds read

EUVDB-ID: #VU89254

Risk: Low

CVSSv3.1: 2.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52602

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the dtSearch() function in fs/jfs/jfs_dtree.c. A local user can trigger an out-of-bounds read error and read contents of memory on the system.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

18) NULL pointer dereference

EUVDB-ID: #VU89245

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52443

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error within the unpack_profile() function in security/apparmor/policy_unpack.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

19) Buffer overflow

EUVDB-ID: #VU88105

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52599

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the diNewExt() function in fs/jfs/jfs_imap.c. A local user can trigger memory corruption and execute arbitrary code with elevated privileges.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

20) Improper validation of array index

EUVDB-ID: #VU88885

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52603

CWE-ID: CWE-129 - Improper Validation of Array Index

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper validation of array index within the dtSplitRoot() function in fs/jfs/jfs_dtree.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

21) Out-of-bounds read

EUVDB-ID: #VU90363

Risk: Low

CVSSv3.1: 6.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26588

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to an out-of-bounds read error within the build_insn() function in arch/loongarch/net/bpf_jit.c. A local user can execute arbitrary code.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

22) Input validation error

EUVDB-ID: #VU88887

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26581

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in net/netfilter/nft_set_rbtree.c. A locla user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

23) Use-after-free

EUVDB-ID: #VU88104

Risk: Low

CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52600

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error in fs/jfs/jfs_mount.c. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

24) Use-after-free

EUVDB-ID: #VU90230

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52584

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the mtk_spmi_probe() and mtk_spmi_remove() functions in drivers/spmi/spmi-mtk-pmif.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

25) Use-after-free

EUVDB-ID: #VU87344

Risk: Medium

CVSSv3.1: 5.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26625

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a use-after-free error in net/llc/af_llc.c when handling orphan sockets. A remote attacker can send specially crafted packets to the system and perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

26) Buffer overflow

EUVDB-ID: #VU87343

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52606

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error within the fp/vmx code in powerpc/lib/sstep.c. A local user can trigger memory corruption and perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

27) NULL pointer dereference

EUVDB-ID: #VU90660

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52463

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the efivarfs_get_tree() function in fs/efivarfs/super.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

28) Out-of-bounds write

EUVDB-ID: #VU88895

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52464

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the thunderx_ocx_com_threaded_isr() function in drivers/edac/thunderx_edac.c. A local user can trigger an out-of-bounds write and execute arbitrary code on the target system.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

29) Security features bypass

EUVDB-ID: #VU92172

Risk: Low

CVSSv3.1: 4.1 [CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52597

CWE-ID: CWE-254 - Security Features

Exploit availability: No

Description

The vulnerability allows a local privileged user to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources. A local privileged can trigger resource exhaustion and perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

30) Improper locking

EUVDB-ID: #VU90803

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52595

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the rt2x00mac_bss_info_changed() function in drivers/net/wireless/ralink/rt2x00/rt2x00mac.c, within the rt2x00lib_disable_radio(), rt2x00lib_start() and rt2x00lib_stop() functions in drivers/net/wireless/ralink/rt2x00/rt2x00dev.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

31) NULL pointer dereference

EUVDB-ID: #VU90657

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52458

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the blkpg_do_ioctl() function in block/ioctl.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

32) Use-after-free

EUVDB-ID: #VU89242

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52457

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a use-after-free error within the omap8250_remove() function in drivers/tty/serial/8250/8250_omap.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

33) Use-after-free

EUVDB-ID: #VU87593

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52438

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the binder_alloc_free_page() function in drivers/android/binder_alloc.c. A local user can trigger a race condition and escalate privileges on the system.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

34) Use-after-free

EUVDB-ID: #VU89235

Risk: Low

CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52469

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the kv_parse_power_table() function in drivers/gpu/drm/amd/amdgpu/kv_dpm.c. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

35) Buffer overflow

EUVDB-ID: #VU89237

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52462

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to crash the kernel.

The vulnerability exists due to a boundary error within the check_stack_write_fixed_off() function in kernel/bpf/verifier.c. A local user can trigger memory corruption and crash the kernel.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

36) Buffer overflow

EUVDB-ID: #VU88886

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26589

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error within the adjust_ptr_min_max_vals() function in kernel/bpf/verifier.c. A local user can crash the OS kernel.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

37) Use-after-free

EUVDB-ID: #VU86812

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26592

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a race condition when handling TCP connect and disconnect events within the ksmbd_tcp_new_connection() function in ksmbd. A remote non-authenticated attacker can trigger a use-after-free error and crash the kernel or execute arbitrary code on the system.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

38) Out-of-bounds read

EUVDB-ID: #VU86813

Risk: Medium

CVSSv3.1: 4.7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26594

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition when handling SMB2 Mech Tokens. A remote attacker can send specially crafted packets to ksmbd, trigger an out-of-bounds read error and read contents of memory on the system.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

39) Buffer overflow

EUVDB-ID: #VU88103

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52601

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in fs/jfs/jfs_dmap.c. A local user can trigger memory corruption and perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

40) NULL pointer dereference

EUVDB-ID: #VU90629

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52593

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the wfx_upload_ap_templates() and wfx_start_ap() functions in drivers/net/wireless/silabs/wfx/sta.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

41) Information disclosure

EUVDB-ID: #VU87592

Risk: Low

CVSSv3.1: 2.2 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52436

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to the __f2fs_setxattr() function in fs/f2fs/xattr.c, does not empty by default the unused space in the xattr list. A local user can gain access to potentially sensitive information.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

42) Use-after-free

EUVDB-ID: #VU87740

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52447

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error in bpf. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

43) Improper locking

EUVDB-ID: #VU91541

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52587

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the ipoib_mcast_join() function in drivers/infiniband/ulp/ipoib/ipoib_multicast.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

44) Use-after-free

EUVDB-ID: #VU87745

Risk: Low

CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52445

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error in pvrusb2. A local user can execute arbitrary code with elevated privileges.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

45) NULL pointer dereference

EUVDB-ID: #VU89244

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52454

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error within the nvmet_tcp_build_pdu_iovec() function in drivers/nvme/target/tcp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

46) Out-of-bounds read

EUVDB-ID: #VU88891

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52451

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition within the dlpar_memory_remove_by_index() function in arch/powerpc/platforms/pseries/hotplug-memory.c. A local user can trigger an out-of-bounds read and perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

47) Out-of-bounds read

EUVDB-ID: #VU87682

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26597

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition in drivers/net/ethernet/qualcomm/rmnet/rmnet_config.c when parsing the netlink attributes. A local user can trigger an out-of-bounds read error and perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

48) NULL pointer dereference

EUVDB-ID: #VU87741

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52448

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in gfs2_rgrp_dump() function. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

49) Resource management error

EUVDB-ID: #VU93864

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52598

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper management of internal resources in arch/s390/kernel/ptrace.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

50) NULL pointer dereference

EUVDB-ID: #VU88888

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26591

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error within the bpf_tracing_prog_attach() function in kernel/bpf/syscall.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

51) NULL pointer dereference

EUVDB-ID: #VU87742

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52449

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in mtd. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

52) Reachable assertion

EUVDB-ID: #VU90918

Risk: Low

CVSSv3.1: 6.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52444

CWE-ID: CWE-617 - Reachable Assertion

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to reachable assertion within the f2fs_rename() function in fs/f2fs/namei.c. A local user can execute arbitrary code.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

53) Improper locking

EUVDB-ID: #VU90802

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52583

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the ceph_encode_dentry_release() function in fs/ceph/caps.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

54) Improper locking

EUVDB-ID: #VU91540

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52589

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the rkisp1_isp_stop() function in drivers/media/platform/rockchip/rkisp1/rkisp1-isp.c, within the rkisp1_csi_disable() function in drivers/media/platform/rockchip/rkisp1/rkisp1-csi.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

55) Use-after-free

EUVDB-ID: #VU90262

Risk: Low

CVSSv3.1: 6.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26598

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the vgic_its_check_cache() and vgic_its_inject_cached_translation() functions in virt/kvm/arm/vgic/vgic-its.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

56) NULL pointer dereference

EUVDB-ID: #VU92074

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52470

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the radeon_crtc_init() function in drivers/gpu/drm/radeon/radeon_display.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

57) Out-of-bounds read

EUVDB-ID: #VU90343

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52594

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the ath9k_htc_txstatus() function in drivers/net/wireless/ath/ath9k/htc_drv_txrx.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

58) Resource management error

EUVDB-ID: #VU93647

Risk: Low

CVSSv3.1: 2.9 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52588

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to corrupt data.

The vulnerability exists due to improper management of internal resources within the __clone_blkaddrs() and redirty_blocks() functions in fs/f2fs/file.c, within the set_cluster_dirty() function in fs/f2fs/compress.c. A local user can corrupt data.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

59) NULL pointer dereference

EUVDB-ID: #VU89236

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52467

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error within the of_syscon_register() function in drivers/mfd/syscon.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

60) NULL pointer dereference

EUVDB-ID: #VU89249

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26600

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in drivers/phy/ti/phy-omap-usb2.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-oem-6.1 to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-oem-22.04c (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04b (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04a (Ubuntu package): before 6.1.0.1035.36

linux-image-oem-22.04 (Ubuntu package): before 6.1.0.1035.36

linux-image-6.1.0-1035-oem (Ubuntu package): before 6.1.0-1035.35

External links

http://ubuntu.com/security/notices/USN-6688-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###