Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 162 |
CVE-ID | CVE-2022-36402 CVE-2024-46714 CVE-2024-42288 CVE-2024-42290 CVE-2024-44987 CVE-2024-41090 CVE-2024-42313 CVE-2024-46689 CVE-2024-46737 CVE-2024-44946 CVE-2024-44999 CVE-2024-44935 CVE-2024-38602 CVE-2024-43883 CVE-2024-26607 CVE-2024-41091 CVE-2024-45025 CVE-2024-42305 CVE-2024-26891 CVE-2024-41073 CVE-2024-44969 CVE-2024-26641 CVE-2024-46719 CVE-2024-40929 CVE-2024-46721 CVE-2024-46740 CVE-2024-41012 CVE-2024-42280 CVE-2024-46738 CVE-2024-46722 CVE-2024-42246 CVE-2024-41063 CVE-2024-41072 CVE-2024-41068 CVE-2024-43884 CVE-2024-46758 CVE-2024-43861 CVE-2024-42306 CVE-2024-42285 CVE-2024-41065 CVE-2024-46818 CVE-2024-43894 CVE-2024-44954 CVE-2024-42310 CVE-2024-46829 CVE-2023-52614 CVE-2024-47663 CVE-2024-42281 CVE-2024-42297 CVE-2024-46800 CVE-2024-44960 CVE-2024-44952 CVE-2024-46747 CVE-2024-42286 CVE-2024-41071 CVE-2024-43893 CVE-2023-52531 CVE-2024-43860 CVE-2024-46840 CVE-2024-41011 CVE-2024-43890 CVE-2024-45026 CVE-2024-42292 CVE-2024-27051 CVE-2024-41015 CVE-2024-47668 CVE-2024-46817 CVE-2024-43846 CVE-2024-44988 CVE-2024-44944 CVE-2024-43829 CVE-2024-45021 CVE-2024-43914 CVE-2024-43856 CVE-2024-46673 CVE-2024-46771 CVE-2024-41081 CVE-2024-43830 CVE-2024-43839 CVE-2024-43853 CVE-2024-47669 CVE-2024-42244 CVE-2021-47212 CVE-2024-46844 CVE-2024-44965 CVE-2024-41059 CVE-2024-46783 CVE-2024-42295 CVE-2024-35848 CVE-2024-41017 CVE-2024-47659 CVE-2024-42309 CVE-2024-26800 CVE-2024-41064 CVE-2024-43879 CVE-2024-46679 CVE-2024-43854 CVE-2024-41022 CVE-2024-43858 CVE-2024-46739 CVE-2024-46685 CVE-2024-42289 CVE-2024-44998 CVE-2024-46761 CVE-2024-46677 CVE-2024-42131 CVE-2024-46815 CVE-2024-46777 CVE-2024-43880 CVE-2024-42276 CVE-2024-42265 CVE-2024-46723 CVE-2024-42259 CVE-2024-45028 CVE-2024-42229 CVE-2024-42283 CVE-2024-44948 CVE-2024-44995 CVE-2024-46757 CVE-2024-46822 CVE-2024-45006 CVE-2024-46780 CVE-2024-26668 CVE-2024-42284 CVE-2024-46782 CVE-2024-46781 CVE-2024-43871 CVE-2024-42304 CVE-2024-42311 CVE-2024-45003 CVE-2024-46745 CVE-2024-41098 CVE-2024-46750 CVE-2024-47667 CVE-2024-41020 CVE-2024-26640 CVE-2024-41070 CVE-2024-42301 CVE-2024-43882 CVE-2024-45008 CVE-2024-26885 CVE-2024-42287 CVE-2024-46744 CVE-2024-43908 CVE-2024-46798 CVE-2023-52918 CVE-2024-36484 CVE-2024-43841 CVE-2024-41042 CVE-2024-38611 CVE-2024-43867 CVE-2024-26669 CVE-2024-42271 CVE-2024-46756 CVE-2024-44947 CVE-2024-43835 CVE-2024-46676 CVE-2024-46743 CVE-2024-46759 CVE-2024-46675 CVE-2024-46828 CVE-2024-46755 |
CWE-ID | CWE-190 CWE-388 CWE-119 CWE-399 CWE-416 CWE-125 CWE-835 CWE-476 CWE-908 CWE-401 CWE-20 CWE-682 CWE-667 CWE-415 CWE-824 CWE-191 CWE-369 CWE-843 CWE-665 CWE-617 |
Exploitation vector | Network |
Public exploit |
Public exploit code for vulnerability #10 is available. Public exploit code for vulnerability #155 is available. |
Vulnerable software Subscribe |
Ubuntu Operating systems & Components / Operating system linux-image-azure-lts-20.04 (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-5.4.0-1139-azure (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-bluefield (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-5.4.0-1094-bluefield (Ubuntu package) Operating systems & Components / Operating system package or component |
Vendor | Canonical Ltd. |
Security Bulletin
This security bulletin contains information about 162 vulnerabilities.
EUVDB-ID: #VU80799
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-36402
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to integer overflow in drivers/gpu/vmxgfx/vmxgfx_execbuf.c. A local user can trigger an integer overflow and crash the kernel.
Update the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97548
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46714
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the wbscl_set_scaler_filter() function in drivers/gpu/drm/amd/display/dc/dcn20/dcn20_dwb_scl.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96177
Risk: Low
CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-42288
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the qla2x00_number_of_exch() function in drivers/scsi/qla2xxx/qla_os.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96181
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-42290
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the imx_irqsteer_get_reg_index(), imx_irqsteer_irq_mask() and imx_irqsteer_probe() functions in drivers/irqchip/irq-imx-irqsteer.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96839
Risk: Low
CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-44987
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ip6_send_skb() function in net/ipv6/ip6_output.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94840
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-41090
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the tap_get_user_xdp() function in drivers/net/tap.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96109
Risk: Low
CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-42313
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the vdec_close() function in drivers/media/platform/qcom/venus/vdec.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97279
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46689
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the cmd_db_dev_probe() function in drivers/soc/qcom/cmd-db.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97529
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46737
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the nvmet_tcp_install_queue() function in drivers/nvme/target/tcp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96658
Risk: Low
CVSSv3.1: 7.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C]
CVE-ID: CVE-2024-44946
CWE-ID:
CWE-416 - Use After Free
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the kcm_sendmsg(), KCM_STATS_ADD(), sk->sk_write_space() and init_kcm_sock() functions in net/kcm/kcmsock.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU96870
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-44999
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the gtp_dev_xmit() function in drivers/net/gtp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96522
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-44935
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the __sctp_hash_endpoint() and __sctp_unhash_endpoint() functions in net/sctp/input.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92296
Risk: Low
CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-38602
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the ax25_addr_ax25dev(), ax25_dev_device_up() and ax25_dev_device_down() functions in net/ax25/ax25_dev.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96493
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-43883
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the vhci_urb_enqueue(), vhci_shutdown_connection() and vhci_device_reset() functions in drivers/usb/usbip/vhci_hcd.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90640
Risk: Low
CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-26607
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the sii902x_init() and sii902x_probe() functions in drivers/gpu/drm/bridge/sii902x.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94841
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-41091
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the tun_xdp_one() function in drivers/net/tun.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97193
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-45025
CWE-ID:
CWE-682 - Incorrect Calculation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect calculation within the free_fdtable_rcu(), copy_fdtable() and dup_fd() functions in fs/file.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96182
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-42305
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the add_dirent_to_buf() and make_indexed_dir() functions in fs/ext4/namei.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91524
Risk: Low
CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-26891
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the devtlb_invalidation_with_pasid() function in drivers/iommu/intel/pasid.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95011
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-41073
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the nvme_cleanup_cmd() function in drivers/nvme/host/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96885
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-44969
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the sclp_sd_store_data() function in drivers/s390/char/sclp_sd.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89396
Risk: Medium
CVSSv3.1: 5.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-26641
CWE-ID:
CWE-824 - Access of Uninitialized Pointer
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to access to uninitialized data within the __ip6_tnl_rcv() function in net/ipv6/ip6_tunnel.c. A remote attacker can send specially crafted data to the system and perform a denial of service (DoS) attack.
Update the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97534
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46719
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the drivers/usb/typec/ucsi/ucsi.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94234
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-40929
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the iwl_mvm_scan_umac_dwell() and iwl_mvm_scan_umac_dwell_v10() functions in drivers/net/wireless/intel/iwlwifi/mvm/scan.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97532
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46721
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the __aafs_profile_mkdir() function in security/apparmor/apparmorfs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97492
Risk: Low
CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46740
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the binder_transaction() function in drivers/android/binder.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94672
Risk: Low
CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-41012
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the fcntl_setlk() function in fs/locks.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96106
Risk: Low
CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-42280
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the hfcmulti_dtmf() and HFC_wait_nodebug() functions in drivers/isdn/hardware/mISDN/hfcmulti.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97491
Risk: Low
CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46738
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the vmci_resource_remove() function in drivers/misc/vmw_vmci/vmci_resource.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97508
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46722
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the amdgpu_atombios_init_mc_reg_table() function in drivers/gpu/drm/amd/amdgpu/amdgpu_atombios.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95515
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-42246
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the xs_tcp_setup_socket() function in net/sunrpc/xprtsock.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94992
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-41063
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the hci_unregister_dev() function in net/bluetooth/hci_core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95106
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-41072
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the cfg80211_wext_siwscan() function in net/wireless/scan.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95072
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-41068
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the sclp_init() function in drivers/s390/char/sclp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96538
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-43884
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the pair_device() function in net/bluetooth/mgmt.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97553
Risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46758
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer underflow within the set_tcrit2(), set_tcrit1(), set_tcrit1_hyst() and set_offset() functions in drivers/hwmon/lm95234.c. A local user can execute arbitrary code.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96290
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-43861
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the qmimux_rx_fixup() function in drivers/net/usb/qmi_wwan.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96184
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-42306
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the udf_sb_free_bitmap() function in fs/udf/super.c, within the read_block_bitmap() and __load_block_bitmap() functions in fs/udf/balloc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96107
Risk: Low
CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-42285
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the EXPORT_SYMBOL(), destroy_cm_id() and cm_work_handler() functions in drivers/infiniband/core/iwcm.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94926
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-41065
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the alloc_dispatch_log_kmem_cache() function in arch/powerpc/platforms/pseries/setup.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97842
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46818
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the is_pin_busy(), set_pin_busy(), set_pin_free(), dal_gpio_service_lock() and dal_gpio_service_unlock() functions in drivers/gpu/drm/amd/display/dc/gpio/gpio_service.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96536
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-43894
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the drm_client_modeset_probe() function in drivers/gpu/drm/drm_client_modeset.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96859
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-44954
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the line6_data_received() function in sound/usb/line6/driver.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96134
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-42310
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the cdv_intel_lvds_get_modes() function in drivers/gpu/drm/gma500/cdv_intel_lvds.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97803
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46829
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the __rt_mutex_slowlock(), rt_mutex_handle_deadlock() and rt_mutex_slowlock() functions in kernel/locking/rtmutex.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91315
Risk: Low
CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-52614
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the trans_stat_show() function in drivers/devfreq/devfreq.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98372
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-47663
CWE-ID:
CWE-369 - Divide By Zero
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a division by zero error within the ad9834_write_frequency() function in drivers/staging/iio/frequency/ad9834.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96206
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-42281
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the bpf_skb_net_grow() function in net/core/filter.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96165
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-42297
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the f2fs_mark_inode_dirty_sync() function in fs/f2fs/inode.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97501
Risk: Low
CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46800
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the qdisc_enqueue() function in net/sched/sch_netem.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96854
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-44960
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the usb_ep_enable() function in drivers/usb/gadget/udc/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96857
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-44952
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the make_driver_name() and module_remove_driver() functions in drivers/base/module.c, within the dev_uevent() and uevent_show() functions in drivers/base/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97504
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46747
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the cougar_fix_g6_mapping() function in drivers/hid/hid-cougar.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96141
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-42286
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the qla_nvme_register_remote() function in drivers/scsi/qla2xxx/qla_nvme.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94956
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-41071
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the ieee80211_prep_hw_scan() function in net/mac80211/scan.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96540
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-43893
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the uart_set_info() function in drivers/tty/serial/serial_core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91210
Risk: Low
CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-52531
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the drivers/net/wireless/intel/iwlwifi/mvm/fw.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96118
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-43860
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the imx_rproc_addr_init() function in drivers/remoteproc/imx_rproc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97808
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46840
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the reada_walk_down(), walk_down_proc(), do_walk_down() and walk_up_proc() functions in fs/btrfs/extent-tree.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94530
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-41011
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the kfd_ioctl_alloc_memory_of_gpu(), criu_restore_memory_of_gpu() and kfd_mmio_mmap() functions in drivers/gpu/drm/amd/amdkfd/kfd_chardev.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96544
Risk: Low
CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-43890
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the get_free_elt(), tracing_map_clear() and tracing_map_create() functions in kernel/trace/tracing_map.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97188
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-45026
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the dasd_eckd_analysis_ccw(), dasd_eckd_build_check_tcw(), dasd_eckd_build_cp_cmd_single(), dasd_eckd_build_cp_tpm_track() and dasd_eckd_dump_sense() functions in drivers/s390/block/dasd_eckd.c, within the dasd_3990_erp_file_prot() function in drivers/s390/block/dasd_3990_erp.c, within the dasd_ese_needs_format(), dasd_int_handler() and list_for_each_entry_safe() functions in drivers/s390/block/dasd.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96114
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-42292
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the zap_modalias_env() function in lib/kobject_uevent.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91501
Risk: Low
CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-27051
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the brcm_avs_is_firmware_loaded() function in drivers/cpufreq/brcmstb-avs-cpufreq.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94842
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-41015
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the ocfs2_check_dir_entry(), ocfs2_search_dirblock(), __ocfs2_delete_entry(), __ocfs2_add_entry(), ocfs2_dir_foreach_blk_id(), ocfs2_dir_foreach_blk_el(), ocfs2_find_dir_space_id() and ocfs2_find_dir_space_el() functions in fs/ocfs2/dir.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98376
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-47668
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the __genradix_ptr_alloc() function in lib/generic-radix-tree.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97830
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46817
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the amdgpu_dm_initialize_drm_device() function in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96186
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-43846
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the objagg_obj_parent_assign() function in lib/objagg.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96845
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-44988
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the mv88e6xxx_g1_atu_prob_irq_thread_fn() function in drivers/net/dsa/mv88e6xxx/global1_atu.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96639
Risk: Low
CVSSv3.1: 5.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-44944
CWE-ID:
CWE-843 - Type confusion
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
Update the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96124
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-43829
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the qxl_add_mode() function in drivers/gpu/drm/qxl/qxl_display.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97184
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-45021
CWE-ID:
CWE-665 - Improper Initialization
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper initialization within the memcg_write_event_control() function in mm/memcontrol.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96542
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-43914
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the reshape_request() function in drivers/md/raid5.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96191
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-43856
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the dmam_free_coherent() function in kernel/dma/mapping.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97251
Risk: Low
CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46673
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the aac_init_adapter() function in drivers/scsi/aacraid/comminit.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97485
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46771
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the bcm_notify() function in net/can/bcm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95051
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-41081
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the ila_output() function in net/ipv6/ila/ila_lwt.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96162
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-43830
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the led_trigger_set() function in drivers/leds/led-triggers.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96197
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-43839
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the bnad_tx_msix_register() and bnad_rx_msix_register() functions in drivers/net/ethernet/brocade/bna/bnad.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96104
Risk: Low
CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-43853
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the proc_cpuset_show() function in kernel/cgroup/cpuset.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98367
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-47669
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the nilfs_segctor_abort_construction() and nilfs_segctor_do_construct() functions in fs/nilfs2/segment.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95510
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-42244
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the mos7840_port_remove() function in drivers/usb/serial/mos7840.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89241
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-47212
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect error handling within the mlx5_internal_err_ret_value() function in drivers/net/ethernet/mellanox/mlx5/core/cmd.c. A local user can perform a denial of service (DoS) attack.
Update the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97833
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46844
CWE-ID:
CWE-682 - Incorrect Calculation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect calculation within the setup_one_line() function in arch/um/drivers/line.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96878
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-44965
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the pti_clone_pgtable() function in arch/x86/mm/pti.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95033
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-41059
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the hfsplus_listxattr() function in fs/hfsplus/xattr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97546
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46783
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the sk_stream_error() function in net/ipv4/tcp_bpf.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96166
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-42295
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the nilfs_btree_get_new_block() function in fs/nilfs2/btree.c, within the nilfs_btnode_create_block() function in fs/nilfs2/btnode.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91199
Risk: Low
CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-35848
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the at24_probe() function in drivers/misc/eeprom/at24.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94843
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-41017
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the __jfs_getxattr() and jfs_listxattr() functions in fs/jfs/xattr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98382
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-47659
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the rcu_read_unlock() function in security/smack/smack_lsm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96135
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-42309
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the psb_intel_lvds_get_modes() function in drivers/gpu/drm/gma500/psb_intel_lvds.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90210
Risk: Low
CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-26800
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the struct_group(), tls_do_decryption() and tls_decrypt_sg() functions in net/tls/tls_sw.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94991
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-41064
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the eeh_pe_bus_get() function in arch/powerpc/kernel/eeh_pe.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96304
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-43879
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the cfg80211_calculate_bitrate_he() function in net/wireless/util.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97269
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46679
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the speed_show() function in net/core/net-sysfs.c, within the __ethtool_get_link_ksettings() function in net/core/ethtool.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96099
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-43854
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the bio_integrity_prep() function in block/bio-integrity.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95022
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-41022
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the sdma_v4_0_process_trap_irq() function in drivers/gpu/drm/amd/amdgpu/sdma_v4_0.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96113
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-43858
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the diSync() and diRead() functions in fs/jfs/jfs_imap.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97528
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46739
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the hv_uio_channel_cb() function in drivers/uio/uio_hv_generic.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97259
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46685
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the pcs_get_function() function in drivers/pinctrl/pinctrl-single.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96139
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-42289
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the qla24xx_disable_vp() function in drivers/scsi/qla2xxx/qla_mid.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96842
Risk: Low
CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-44998
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the dequeue_rx() function in drivers/atm/idt77252.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97513
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46761
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the pnv_php_disable_irq() function in drivers/pci/hotplug/pnv_php.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97257
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46677
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the gtp_encap_enable_socket() function in drivers/net/gtp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95035
Risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-42131
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the domain_dirty_limits(), node_dirty_limit(), dirty_background_bytes_handler() and dirty_bytes_handler() functions in mm/page-writeback.c. A local user can execute arbitrary code.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97843
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46815
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the build_watermark_ranges() function in drivers/gpu/drm/amd/display/dc/clk_mgr/dcn21/rn_clk_mgr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97550
Risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46777
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the udf_fill_partdesc_info() function in fs/udf/super.c. A local user can execute arbitrary code.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96305
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-43880
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the objagg_hints_obj_cmp() and objagg_hints_get() functions in lib/objagg.c, within the mlxsw_sp_acl_erp_delta_check() and mlxsw_sp_acl_erp_root_destroy() functions in drivers/net/ethernet/mellanox/mlxsw/spectrum_acl_erp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96205
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-42276
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the nvme_prep_rq() function in drivers/nvme/host/pci.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96203
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-42265
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the __releases() function in fs/file.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97509
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46723
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the amdgpu_cgs_get_firmware_info() function in drivers/gpu/drm/amd/amdgpu/amdgpu_cgs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96008
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-42259
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the i915_error_to_vmf_fault() and vm_fault_gtt() functions in drivers/gpu/drm/i915/gem/i915_gem_mman.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97173
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-45028
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the mtf_test_write() function in drivers/mmc/core/mmc_test.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95078
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-42229
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the setkey_unaligned() function in crypto/cipher.c, within the setkey_unaligned() function in crypto/aead.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96195
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-42283
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the nla_put_nh_group() function in net/ipv4/nexthop.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96889
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-44948
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the mtrr_save_state() function in arch/x86/kernel/cpu/mtrr/mtrr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96855
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-44995
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the hns3_reset_notify_uninit_enet() function in drivers/net/ethernet/hisilicon/hns3/hns3_enet.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97552
Risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46757
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer underflow within the store_temp_offset() function in drivers/hwmon/nct6775.c. A local user can execute arbitrary code.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97798
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46822
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the arch/arm64/include/asm/acpi.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96852
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-45006
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the xhci_configure_endpoint() and xhci_setup_device() functions in drivers/usb/host/xhci.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97564
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46780
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the nilfs_dev_revision_show(), nilfs_dev_device_size_show(), nilfs_dev_uuid_show() and nilfs_dev_volume_name_show() functions in fs/nilfs2/sysfs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91180
Risk: Low
CVSSv3.1: 6.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-26668
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the nft_limit_eval() and nft_limit_init() functions in net/netfilter/nft_limit.c. A local user can execute arbitrary code.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96176
Risk: Low
CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-42284
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the tipc_udp_addr2str() function in net/tipc/udp_media.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97496
Risk: Low
CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46782
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ila_xlat_init_net() and ila_xlat_exit_net() functions in net/ipv6/ila/ila_xlat.c, within the ila_pre_exit_net() and ila_exit_net() functions in net/ipv6/ila/ila_main.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97495
Risk: Low
CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46781
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the nilfs_finish_roll_forward() and nilfs_salvage_orphan_logs() functions in fs/nilfs2/recovery.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96287
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-43871
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the EXPORT_SYMBOL_GPL() function in drivers/base/devres.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96164
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-42304
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the __ext4_read_dirblock(), ext4_empty_dir() and ext4_get_first_dir_block() functions in fs/ext4/namei.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96172
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-42311
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the hfs_new_inode() and hfs_inode_read_fork() functions in fs/hfs/inode.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96843
Risk: Low
CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-45003
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the inode_lru_list_del(), evict() and inode_lru_isolate() functions in fs/inode.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97493
Risk: Low
CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46745
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the uinput_validate_absinfo() function in drivers/input/misc/uinput.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94970
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-41098
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ata_host_release() function in drivers/ata/libata-core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97539
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46750
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the pci_bus_lock(), pci_bus_unlock(), pci_bus_trylock(), list_for_each_entry_continue_reverse(), pci_slot_lock() and pci_slot_trylock() functions in drivers/pci/pci.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98380
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-47667
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the RTL GENMASK(), to_keystone_pcie(), ks_pcie_start_link() and ks_pcie_quirk() functions in drivers/pci/controller/dwc/pci-keystone.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94996
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-41020
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the fcntl_setlk64() function in fs/locks.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89397
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-26640
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper management of internal resources within the skb_advance_to_frag() function in net/ipv4/tcp.c. A remote attacker can send specially crafted data to the system and perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94942
Risk: Low
CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-41070
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the kvm_spapr_tce_attach_iommu_group() function in arch/powerpc/kvm/book3s_64_vio.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96116
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-42301
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the do_active_device(), do_autoprobe(), do_hardware_base_addr(), do_hardware_irq(), do_hardware_dma() and do_hardware_modes() functions in drivers/parport/procfs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96295
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-43882
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the bprm_fill_uid() function in fs/exec.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96883
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-45008
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the input_mt_init_slots() function in drivers/input/input-mt.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89840
Risk: Low
CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-26885
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within the dev_map_init_map() function in kernel/bpf/devmap.c. A local user can trigger memory corruption and execute arbitrary code with elevated privileges.
Update the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96140
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-42287
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the __qla2x00_abort_all_cmds() function in drivers/scsi/qla2xxx/qla_os.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97540
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46744
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the squashfs_read_inode() function in fs/squashfs/inode.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96525
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-43908
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the amdgpu_ras_interrupt_process_handler() function in drivers/gpu/drm/amd/amdgpu/amdgpu_ras.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97500
Risk: Low
CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46798
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the snd_soc_dai_link_event() function in sound/soc/soc-dapm.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99254
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-52918
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the cx23885_video_register() function in drivers/media/pci/cx23885/cx23885-video.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93039
Risk: Low
CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-36484
CWE-ID:
CWE-617 - Reachable Assertion
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to reachable assertion within the __inet_accept() function in net/ipv4/af_inet.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96187
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-43841
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the virt_wifi_inform_bss(), virt_wifi_connect() and virt_wifi_connect_complete() functions in drivers/net/wireless/virt_wifi.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95003
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-41042
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the nf_tables_rule_release(), nft_chain_validate(), nft_chain_validate_hooks() and nft_validate_register_store() functions in net/netfilter/nf_tables_api.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92298
Risk: Low
CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-38611
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the et8ek8_remove() and __exit_p() functions in drivers/media/i2c/et8ek8/et8ek8_driver.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96301
Risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-43867
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer underflow within the nouveau_gem_prime_import_sg_table() function in drivers/gpu/drm/nouveau/nouveau_prime.c. A local user can execute arbitrary code.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90010
Risk: Low
CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-26669
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the fl_tmplt_destroy() function in net/sched/cls_flower.c, within the tcf_block_playback_offloads() and tc_chain_tmplt_add() functions in net/sched/cls_api.c, within the void() function in include/net/sch_generic.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96105
Risk: Low
CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-42271
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the iucv_sever_path() function in net/iucv/af_iucv.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97551
Risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46756
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer underflow within the store_target_temp() and store_tolerance() functions in drivers/hwmon/w83627ehf.c. A local user can execute arbitrary code.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96711
Risk: Low
CVSSv3.1: 5 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C]
CVE-ID: CVE-2024-44947
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the fuse_notify_store() function in fs/fuse/dev.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU96148
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-43835
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the virtnet_receive(), virtnet_poll_cleantx(), virtnet_poll() and virtnet_poll_tx() functions in drivers/net/virtio_net.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97276
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46676
CWE-ID:
CWE-369 - Divide By Zero
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a division by zero error within the pn533_start_poll() function in drivers/nfc/pn533/pn533.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97503
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46743
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the of_irq_parse_one() function in drivers/of/irq.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97554
Risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46759
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer underflow within the adc128_set_in() and adc128_set_temp() functions in drivers/hwmon/adc128d818.c. A local user can execute arbitrary code.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97287
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46675
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the dwc3_event_buffers_setup() function in drivers/usb/dwc3/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97786
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46828
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the net/sched/sch_cake.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97525
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-46755
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the drivers/net/wireless/marvell/mwifiex/main.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1139.133
linux-image-5.4.0-1139-azure (Ubuntu package): before 5.4.0-1139.146
linux-image-bluefield (Ubuntu package): before 5.4.0.1094.90
linux-image-5.4.0-1094-bluefield (Ubuntu package): before 5.4.0-1094.101
CPE2.3 External linkshttp://ubuntu.com/security/notices/USN-7088-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.