{"id":57381,"date":"2024-06-10T17:20:18","date_gmt":"2024-06-10T14:20:18","guid":{"rendered":"https:\/\/packetstormsecurity.com\/files\/178993\/USN-6816-1.txt"},"modified":"2024-06-10T17:20:18","modified_gmt":"2024-06-10T14:20:18","slug":"ubuntu-security-notice-usn-6816-1","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/ubuntu-security-notice-usn-6816-1\/","title":{"rendered":"Ubuntu Security Notice USN-6816-1"},"content":{"rendered":"<p>==========================================================================<br \/>Ubuntu Security Notice USN-6816-1<br \/>June 07, 2024<\/p>\n<p>linux, linux-ibm, linux-lowlatency, linux-raspi vulnerabilities<br \/>==========================================================================<\/p>\n<p>A security issue affects these releases of Ubuntu and its derivatives:<\/p>\n<p>&#8211; Ubuntu 24.04 LTS<\/p>\n<p>Summary:<\/p>\n<p>Several security issues were fixed in the Linux kernel.<\/p>\n<p>Software Description:<br \/>&#8211; linux: Linux kernel<br \/>&#8211; linux-ibm: Linux kernel for IBM cloud systems<br \/>&#8211; linux-lowlatency: Linux low latency kernel<br \/>&#8211; linux-raspi: Linux kernel for Raspberry Pi systems<\/p>\n<p>Details:<\/p>\n<p>Ziming Zhang discovered that the DRM driver for VMware Virtual GPU did not<br \/>properly handle certain error conditions, leading to a NULL pointer<br \/>dereference. A local attacker could possibly trigger this vulnerability to<br \/>cause a denial of service. (CVE-2022-38096)<\/p>\n<p>Zheng Wang discovered that the Broadcom FullMAC WLAN driver in the Linux<br \/>kernel contained a race condition during device removal, leading to a use-<br \/>after-free vulnerability. A physically proximate attacker could possibly<br \/>use this to cause a denial of service (system crash). (CVE-2023-47233)<\/p>\n<p>It was discovered that the ATA over Ethernet (AoE) driver in the Linux<br \/>kernel contained a race condition, leading to a use-after-free<br \/>vulnerability. An attacker could use this to cause a denial of service or<br \/>possibly execute arbitrary code. (CVE-2023-6270)<\/p>\n<p>It was discovered that the Atheros 802.11ac wireless driver did not<br \/>properly validate certain data structures, leading to a NULL pointer<br \/>dereference. An attacker could possibly use this to cause a denial of<br \/>service. (CVE-2023-7042)<\/p>\n<p>It was discovered that the Intel Data Streaming and Intel Analytics<br \/>Accelerator drivers in the Linux kernel allowed direct access to the<br \/>devices for unprivileged users and virtual machines. A local attacker could<br \/>use this to cause a denial of service. (CVE-2024-21823)<\/p>\n<p>Gui-Dong Han discovered that the software RAID driver in the Linux kernel<br \/>contained a race condition, leading to an integer overflow vulnerability. A<br \/>privileged attacker could possibly use this to cause a denial of service<br \/>(system crash). (CVE-2024-23307)<\/p>\n<p>Bai Jiaju discovered that the Xceive XC4000 silicon tuner device driver in<br \/>the Linux kernel contained a race condition, leading to an integer overflow<br \/>vulnerability. An attacker could possibly use this to cause a denial of<br \/>service (system crash). (CVE-2024-24861)<\/p>\n<p>Chenyuan Yang discovered that the Unsorted Block Images (UBI) flash device<br \/>volume management subsystem did not properly validate logical eraseblock<br \/>sizes in certain situations. An attacker could possibly use this to cause a<br \/>denial of service (system crash). (CVE-2024-25739)<\/p>\n<p>It was discovered that the MediaTek SoC Gigabit Ethernet driver in the<br \/>Linux kernel contained a race condition when stopping the device. A local<br \/>attacker could possibly use this to cause a denial of service (device<br \/>unavailability). (CVE-2024-27432)<\/p>\n<p>Several security issues were discovered in the Linux kernel.<br \/>An attacker could possibly use these to compromise the system.<br \/>This update corrects flaws in the following subsystems:<br \/>&#8211; ARM32 architecture;<br \/>&#8211; PowerPC architecture;<br \/>&#8211; x86 architecture;<br \/>&#8211; Block layer subsystem;<br \/>&#8211; ACPI drivers;<br \/>&#8211; Bluetooth drivers;<br \/>&#8211; Clock framework and drivers;<br \/>&#8211; CPU frequency scaling framework;<br \/>&#8211; Cryptographic API;<br \/>&#8211; DPLL subsystem;<br \/>&#8211; ARM SCMI message protocol;<br \/>&#8211; EFI core;<br \/>&#8211; GPU drivers;<br \/>&#8211; InfiniBand drivers;<br \/>&#8211; IOMMU subsystem;<br \/>&#8211; LED subsystem;<br \/>&#8211; Multiple devices driver;<br \/>&#8211; Media drivers;<br \/>&#8211; MMC subsystem;<br \/>&#8211; Network drivers;<br \/>&#8211; NTB driver;<br \/>&#8211; NVME drivers;<br \/>&#8211; PCI subsystem;<br \/>&#8211; Powercap sysfs driver;<br \/>&#8211; SCSI drivers;<br \/>&#8211; Freescale SoC drivers;<br \/>&#8211; SPI subsystem;<br \/>&#8211; Media staging drivers;<br \/>&#8211; Thermal drivers;<br \/>&#8211; TTY drivers;<br \/>&#8211; USB subsystem;<br \/>&#8211; DesignWare USB3 driver;<br \/>&#8211; VFIO drivers;<br \/>&#8211; Backlight driver;<br \/>&#8211; Virtio drivers;<br \/>&#8211; Xen hypervisor drivers;<br \/>&#8211; AFS file system;<br \/>&#8211; File systems infrastructure;<br \/>&#8211; BTRFS file system;<br \/>&#8211; debug file system;<br \/>&#8211; Ext4 file system;<br \/>&#8211; F2FS file system;<br \/>&#8211; FAT file system;<br \/>&#8211; Network file system client;<br \/>&#8211; NILFS2 file system;<br \/>&#8211; Overlay file system;<br \/>&#8211; Pstore file system;<br \/>&#8211; Diskquota system;<br \/>&#8211; SMB network file system;<br \/>&#8211; UBI file system;<br \/>&#8211; io_uring subsystem;<br \/>&#8211; BPF subsystem;<br \/>&#8211; Core kernel;<br \/>&#8211; Memory management;<br \/>&#8211; Bluetooth subsystem;<br \/>&#8211; Networking core;<br \/>&#8211; HSR network protocol;<br \/>&#8211; IPv4 networking;<br \/>&#8211; IPv6 networking;<br \/>&#8211; MAC80211 subsystem;<br \/>&#8211; IEEE 802.15.4 subsystem;<br \/>&#8211; Netfilter;<br \/>&#8211; Packet sockets;<br \/>&#8211; Network traffic control;<br \/>&#8211; Sun RPC protocol;<br \/>&#8211; ALSA SH drivers;<br \/>&#8211; SOF drivers;<br \/>&#8211; USB sound devices;<br \/>&#8211; KVM core;<br \/>(CVE-2024-35822, CVE-2024-26859, CVE-2024-26967, CVE-2024-27053,<br \/>CVE-2024-27064, CVE-2024-27437, CVE-2024-26931, CVE-2024-26870,<br \/>CVE-2024-26927, CVE-2024-26880, CVE-2024-35789, CVE-2024-26929,<br \/>CVE-2024-27034, CVE-2024-26816, CVE-2024-26896, CVE-2024-26975,<br \/>CVE-2024-26972, CVE-2024-26937, CVE-2024-27032, CVE-2024-26871,<br \/>CVE-2024-26655, CVE-2024-35829, CVE-2024-26886, CVE-2023-52653,<br \/>CVE-2024-27028, CVE-2024-26877, CVE-2024-26898, CVE-2024-35796,<br \/>CVE-2024-27065, CVE-2024-35807, CVE-2024-26966, CVE-2024-35826,<br \/>CVE-2024-27067, CVE-2024-27039, CVE-2024-35811, CVE-2024-26895,<br \/>CVE-2024-26814, CVE-2024-26893, CVE-2023-52649, CVE-2024-35801,<br \/>CVE-2023-52648, CVE-2024-27048, CVE-2024-26934, CVE-2024-27049,<br \/>CVE-2024-26890, CVE-2024-26874, CVE-2022-48669, CVE-2023-52661,<br \/>CVE-2024-27436, CVE-2024-27058, CVE-2024-26935, CVE-2024-26956,<br \/>CVE-2024-26960, CVE-2024-26976, CVE-2024-27041, CVE-2024-26873,<br \/>CVE-2024-26946, CVE-2024-27080, CVE-2024-27432, CVE-2023-52650,<br \/>CVE-2024-26879, CVE-2023-52647, CVE-2024-27435, CVE-2024-27038,<br \/>CVE-2024-26951, CVE-2024-27390, CVE-2024-26863, CVE-2024-26959,<br \/>CVE-2024-35794, CVE-2024-26889, CVE-2024-35845, CVE-2024-27433,<br \/>CVE-2024-26961, CVE-2024-35803, CVE-2024-26653, CVE-2024-26939,<br \/>CVE-2024-26872, CVE-2024-26979, CVE-2024-26973, CVE-2024-27029,<br \/>CVE-2024-35831, CVE-2024-26892, CVE-2024-26888, CVE-2024-27074,<br \/>CVE-2024-35844, CVE-2024-26938, CVE-2024-26953, CVE-2024-27391,<br \/>CVE-2024-35843, CVE-2024-27040, CVE-2024-26875, CVE-2024-27026,<br \/>CVE-2024-26978, CVE-2024-26882, CVE-2023-52652, CVE-2023-52662,<br \/>CVE-2024-26963, CVE-2024-26962, CVE-2024-27051, CVE-2024-27068,<br \/>CVE-2024-26881, CVE-2024-35800, CVE-2024-26964, CVE-2024-27389,<br \/>CVE-2024-27043, CVE-2024-26901, CVE-2024-26941, CVE-2024-35798,<br \/>CVE-2024-35799, CVE-2024-26952, CVE-2024-26654, CVE-2024-27046,<br \/>CVE-2024-35810, CVE-2024-27050, CVE-2024-27063, CVE-2024-26954,<br \/>CVE-2024-26884, CVE-2024-27047, CVE-2024-26932, CVE-2024-26883,<br \/>CVE-2024-26943, CVE-2024-26651, CVE-2024-26815, CVE-2024-26948,<br \/>CVE-2024-27066, CVE-2024-27037, CVE-2024-35806, CVE-2024-26869,<br \/>CVE-2024-26878, CVE-2024-26810, CVE-2024-35797, CVE-2024-27073,<br \/>CVE-2024-26812, CVE-2024-26933, CVE-2024-26809, CVE-2024-26894,<br \/>CVE-2024-35813, CVE-2024-27033, CVE-2024-26876, CVE-2024-27076,<br \/>CVE-2024-27045, CVE-2024-27079, CVE-2024-26861, CVE-2024-26957,<br \/>CVE-2024-26864, CVE-2024-26866, CVE-2024-35814, CVE-2024-26813,<br \/>CVE-2024-27388, CVE-2024-27042, CVE-2024-26862, CVE-2024-26968,<br \/>CVE-2024-26940, CVE-2024-27027, CVE-2024-35793, CVE-2024-35874,<br \/>CVE-2024-27035, CVE-2024-26958, CVE-2024-26887, CVE-2024-35809,<br \/>CVE-2024-26930, CVE-2024-35819, CVE-2024-27392, CVE-2024-35808,<br \/>CVE-2023-52644, CVE-2024-35828, CVE-2024-26657, CVE-2024-26969,<br \/>CVE-2024-27434, CVE-2024-35821, CVE-2023-52663, CVE-2024-27078,<br \/>CVE-2024-35787, CVE-2024-27044, CVE-2024-26848, CVE-2024-26955,<br \/>CVE-2024-26899, CVE-2024-27077, CVE-2024-26897, CVE-2024-26945,<br \/>CVE-2024-26885, CVE-2024-27069, CVE-2024-27070, CVE-2024-27054,<br \/>CVE-2024-35795, CVE-2024-35817, CVE-2024-35827, CVE-2024-26656,<br \/>CVE-2024-26860, CVE-2024-26942, CVE-2023-52659, CVE-2024-26865,<br \/>CVE-2024-26868, CVE-2024-26947, CVE-2024-35788, CVE-2024-26950,<br \/>CVE-2024-27030, CVE-2024-26949, CVE-2024-26900, CVE-2024-26971,<br \/>CVE-2024-35805, CVE-2024-26977, CVE-2024-26944, CVE-2024-27036,<br \/>CVE-2024-26965, CVE-2024-26891, CVE-2024-27071, CVE-2024-27075,<br \/>CVE-2024-27072, CVE-2024-35830, CVE-2024-27052, CVE-2024-26970,<br \/>CVE-2024-27031)<\/p>\n<p>Update instructions:<\/p>\n<p>The problem can be corrected by updating your system to the following<br \/>package versions:<\/p>\n<p>Ubuntu 24.04 LTS<br \/>linux-image-6.8.0-1005-raspi 6.8.0-1005.5<br \/>linux-image-6.8.0-1006-ibm 6.8.0-1006.6<br \/>linux-image-6.8.0-35-generic 6.8.0-35.35+1<br \/>linux-image-6.8.0-35-generic-64k 6.8.0-35.35+1<br \/>linux-image-6.8.0-35-lowlatency 6.8.0-35.35.1<br \/>linux-image-6.8.0-35-lowlatency-64k 6.8.0-35.35.1<br \/>linux-image-generic 6.8.0-35.35<br \/>linux-image-generic-64k 6.8.0-35.35<br \/>linux-image-generic-64k-hwe-24.04 6.8.0-35.35<br \/>linux-image-generic-hwe-24.04 6.8.0-35.35<br \/>linux-image-generic-lpae 6.8.0-35.35<br \/>linux-image-ibm 6.8.0-1006.6<br \/>linux-image-ibm-classic 6.8.0-1006.6<br \/>linux-image-ibm-lts-24.04 6.8.0-1006.6<br \/>linux-image-kvm 6.8.0-35.35<br \/>linux-image-lowlatency 6.8.0-35.35.1<br \/>linux-image-lowlatency-64k 6.8.0-35.35.1<br \/>linux-image-raspi 6.8.0-1005.5<br \/>linux-image-virtual 6.8.0-35.35<br \/>linux-image-virtual-hwe-24.04 6.8.0-35.35<\/p>\n<p>After a standard system update you need to reboot your computer to make<br \/>all the necessary changes.<\/p>\n<p>ATTENTION: Due to an unavoidable ABI change the kernel updates have<br \/>been given a new version number, which requires you to recompile and<br \/>reinstall all third party kernel modules you might have installed.<br \/>Unless you manually uninstalled the standard kernel metapackages<br \/>(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,<br \/>linux-powerpc), a standard system upgrade will automatically perform<br \/>this as well.<\/p>\n<p>References:<br \/>https:\/\/ubuntu.com\/security\/notices\/USN-6816-1<br \/>CVE-2022-38096, CVE-2022-48669, CVE-2023-47233, CVE-2023-52644,<br \/>CVE-2023-52647, CVE-2023-52648, CVE-2023-52649, CVE-2023-52650,<br \/>CVE-2023-52652, CVE-2023-52653, CVE-2023-52659, CVE-2023-52661,<br \/>CVE-2023-52662, CVE-2023-52663, CVE-2023-6270, CVE-2023-7042,<br \/>CVE-2024-21823, CVE-2024-23307, CVE-2024-24861, CVE-2024-25739,<br \/>CVE-2024-26651, CVE-2024-26653, CVE-2024-26654, CVE-2024-26655,<br \/>CVE-2024-26656, CVE-2024-26657, CVE-2024-26809, CVE-2024-26810,<br \/>CVE-2024-26812, CVE-2024-26813, CVE-2024-26814, CVE-2024-26815,<br \/>CVE-2024-26816, CVE-2024-26848, CVE-2024-26859, CVE-2024-26860,<br \/>CVE-2024-26861, CVE-2024-26862, CVE-2024-26863, CVE-2024-26864,<br \/>CVE-2024-26865, CVE-2024-26866, CVE-2024-26868, CVE-2024-26869,<br \/>CVE-2024-26870, CVE-2024-26871, CVE-2024-26872, CVE-2024-26873,<br \/>CVE-2024-26874, CVE-2024-26875, CVE-2024-26876, CVE-2024-26877,<br \/>CVE-2024-26878, CVE-2024-26879, CVE-2024-26880, CVE-2024-26881,<br \/>CVE-2024-26882, CVE-2024-26883, CVE-2024-26884, CVE-2024-26885,<br \/>CVE-2024-26886, CVE-2024-26887, CVE-2024-26888, CVE-2024-26889,<br \/>CVE-2024-26890, CVE-2024-26891, CVE-2024-26892, CVE-2024-26893,<br \/>CVE-2024-26894, CVE-2024-26895, CVE-2024-26896, CVE-2024-26897,<br \/>CVE-2024-26898, CVE-2024-26899, CVE-2024-26900, CVE-2024-26901,<br \/>CVE-2024-26927, CVE-2024-26929, CVE-2024-26930, CVE-2024-26931,<br \/>CVE-2024-26932, CVE-2024-26933, CVE-2024-26934, CVE-2024-26935,<br \/>CVE-2024-26937, CVE-2024-26938, CVE-2024-26939, CVE-2024-26940,<br \/>CVE-2024-26941, CVE-2024-26942, CVE-2024-26943, CVE-2024-26944,<br \/>CVE-2024-26945, CVE-2024-26946, CVE-2024-26947, CVE-2024-26948,<br \/>CVE-2024-26949, CVE-2024-26950, CVE-2024-26951, CVE-2024-26952,<br \/>CVE-2024-26953, CVE-2024-26954, CVE-2024-26955, CVE-2024-26956,<br \/>CVE-2024-26957, CVE-2024-26958, CVE-2024-26959, CVE-2024-26960,<br \/>CVE-2024-26961, CVE-2024-26962, CVE-2024-26963, CVE-2024-26964,<br \/>CVE-2024-26965, CVE-2024-26966, CVE-2024-26967, CVE-2024-26968,<br \/>CVE-2024-26969, CVE-2024-26970, CVE-2024-26971, CVE-2024-26972,<br \/>CVE-2024-26973, CVE-2024-26975, CVE-2024-26976, CVE-2024-26977,<br \/>CVE-2024-26978, CVE-2024-26979, CVE-2024-27026, CVE-2024-27027,<br \/>CVE-2024-27028, CVE-2024-27029, CVE-2024-27030, CVE-2024-27031,<br \/>CVE-2024-27032, CVE-2024-27033, CVE-2024-27034, CVE-2024-27035,<br \/>CVE-2024-27036, CVE-2024-27037, CVE-2024-27038, CVE-2024-27039,<br \/>CVE-2024-27040, CVE-2024-27041, CVE-2024-27042, CVE-2024-27043,<br \/>CVE-2024-27044, CVE-2024-27045, CVE-2024-27046, CVE-2024-27047,<br \/>CVE-2024-27048, CVE-2024-27049, CVE-2024-27050, CVE-2024-27051,<br \/>CVE-2024-27052, CVE-2024-27053, CVE-2024-27054, CVE-2024-27058,<br \/>CVE-2024-27063, CVE-2024-27064, CVE-2024-27065, CVE-2024-27066,<br \/>CVE-2024-27067, CVE-2024-27068, CVE-2024-27069, CVE-2024-27070,<br \/>CVE-2024-27071, CVE-2024-27072, CVE-2024-27073, CVE-2024-27074,<br \/>CVE-2024-27075, CVE-2024-27076, CVE-2024-27077, CVE-2024-27078,<br \/>CVE-2024-27079, CVE-2024-27080, CVE-2024-27388, CVE-2024-27389,<br \/>CVE-2024-27390, CVE-2024-27391, CVE-2024-27392, CVE-2024-27432,<br \/>CVE-2024-27433, CVE-2024-27434, CVE-2024-27435, CVE-2024-27436,<br \/>CVE-2024-27437, CVE-2024-35787, CVE-2024-35788, CVE-2024-35789,<br \/>CVE-2024-35793, CVE-2024-35794, CVE-2024-35795, CVE-2024-35796,<br \/>CVE-2024-35797, CVE-2024-35798, CVE-2024-35799, CVE-2024-35800,<br \/>CVE-2024-35801, CVE-2024-35803, CVE-2024-35805, CVE-2024-35806,<br \/>CVE-2024-35807, CVE-2024-35808, CVE-2024-35809, CVE-2024-35810,<br \/>CVE-2024-35811, CVE-2024-35813, CVE-2024-35814, CVE-2024-35817,<br \/>CVE-2024-35819, CVE-2024-35821, CVE-2024-35822, CVE-2024-35826,<br \/>CVE-2024-35827, CVE-2024-35828, CVE-2024-35829, CVE-2024-35830,<br \/>CVE-2024-35831, CVE-2024-35843, CVE-2024-35844, CVE-2024-35845,<br \/>CVE-2024-35874<\/p>\n<p>Package Information:<br \/>https:\/\/launchpad.net\/ubuntu\/+source\/linux\/6.8.0-35.35<br \/>https:\/\/launchpad.net\/ubuntu\/+source\/linux-ibm\/6.8.0-1006.6<br \/>https:\/\/launchpad.net\/ubuntu\/+source\/linux-lowlatency\/6.8.0-35.35.1<br \/>https:\/\/launchpad.net\/ubuntu\/+source\/linux-raspi\/6.8.0-1005.5<\/p>\n","protected":false},"excerpt":{"rendered":"<p>==========================================================================Ubuntu Security Notice USN-6816-1June 07, 2024 linux, linux-ibm, linux-lowlatency, linux-raspi vulnerabilities========================================================================== A security issue affects these releases of Ubuntu and its derivatives: &#8211; Ubuntu 24.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description:&#8211; linux: Linux kernel&#8211; linux-ibm: Linux kernel for IBM cloud systems&#8211; linux-lowlatency: Linux low latency kernel&#8211; linux-raspi: Linux &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-57381","post","type-post","status-publish","format-standard","hentry","category-vulnerability"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/57381","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=57381"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/57381\/revisions"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=57381"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=57381"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=57381"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}