Ubuntu update for linux-xilinx-zynqmp



| Updated: 2025-03-14
Risk Critical
Patch available YES
Number of vulnerabilities 429
CVE-ID CVE-2022-38096
CVE-2024-23307
CVE-2024-23848
CVE-2024-24857
CVE-2024-24858
CVE-2024-24859
CVE-2024-24861
CVE-2024-25739
CVE-2024-25741
CVE-2024-25742
CVE-2024-40902
CVE-2024-42085
CVE-2024-42154
CVE-2024-42229
CVE-2024-38548
CVE-2024-42120
CVE-2024-38555
CVE-2024-38598
CVE-2024-40954
CVE-2024-38571
CVE-2024-36020
CVE-2024-36270
CVE-2024-39482
CVE-2024-39468
CVE-2024-38607
CVE-2024-26923
CVE-2024-42145
CVE-2024-41040
CVE-2024-35852
CVE-2024-35805
CVE-2024-35890
CVE-2024-36965
CVE-2024-42077
CVE-2024-26958
CVE-2024-35823
CVE-2024-42124
CVE-2024-26680
CVE-2024-38549
CVE-2024-36286
CVE-2024-27398
CVE-2024-35990
CVE-2024-36975
CVE-2024-27437
CVE-2024-35848
CVE-2024-26900
CVE-2024-26654
CVE-2024-40971
CVE-2024-35847
CVE-2024-35982
CVE-2024-42232
CVE-2022-48808
CVE-2024-35822
CVE-2024-36950
CVE-2024-33621
CVE-2024-39276
CVE-2024-40968
CVE-2024-35857
CVE-2024-40905
CVE-2023-52880
CVE-2024-35819
CVE-2024-35791
CVE-2024-42076
CVE-2024-40904
CVE-2024-35976
CVE-2024-35854
CVE-2024-26642
CVE-2024-27393
CVE-2024-26934
CVE-2024-26960
CVE-2024-42137
CVE-2024-38588
CVE-2024-40970
CVE-2024-36972
CVE-2024-26977
CVE-2024-38546
CVE-2024-41095
CVE-2024-39292
CVE-2024-41087
CVE-2024-33847
CVE-2024-40978
CVE-2024-41049
CVE-2024-35895
CVE-2024-35804
CVE-2024-42093
CVE-2024-36017
CVE-2024-38591
CVE-2024-42080
CVE-2024-41089
CVE-2024-38613
CVE-2024-39466
CVE-2024-40931
CVE-2024-35907
CVE-2024-36919
CVE-2024-36934
CVE-2024-42240
CVE-2024-35940
CVE-2024-36938
CVE-2024-42121
CVE-2024-39490
CVE-2024-40961
CVE-2024-42223
CVE-2024-41041
CVE-2024-41093
CVE-2024-42068
CVE-2024-41044
CVE-2024-42086
CVE-2024-42105
CVE-2024-36954
CVE-2024-35796
CVE-2024-38610
CVE-2024-36929
CVE-2024-35893
CVE-2024-38601
CVE-2024-40981
CVE-2024-36889
CVE-2024-27015
CVE-2024-35897
CVE-2024-39469
CVE-2024-35825
CVE-2024-26922
CVE-2024-38573
CVE-2024-42130
CVE-2024-38580
CVE-2024-26814
CVE-2024-36955
CVE-2024-26813
CVE-2024-27396
CVE-2024-36937
CVE-2024-36928
CVE-2024-42224
CVE-2024-27004
CVE-2024-42104
CVE-2024-42225
CVE-2024-38659
CVE-2024-35955
CVE-2024-42106
CVE-2024-39489
CVE-2024-31076
CVE-2024-26817
CVE-2024-35884
CVE-2024-42095
CVE-2024-42131
CVE-2024-40956
CVE-2024-40941
CVE-2024-36007
CVE-2024-27009
CVE-2024-40959
CVE-2024-42089
CVE-2024-37078
CVE-2024-35960
CVE-2024-41002
CVE-2024-39301
CVE-2024-35988
CVE-2023-52887
CVE-2024-35885
CVE-2024-39484
CVE-2024-35872
CVE-2024-40974
CVE-2024-35851
CVE-2024-26957
CVE-2024-38623
CVE-2024-35944
CVE-2024-41005
CVE-2024-42152
CVE-2024-35888
CVE-2024-38621
CVE-2024-26989
CVE-2024-42148
CVE-2024-27401
CVE-2024-36883
CVE-2024-35855
CVE-2024-26936
CVE-2024-26935
CVE-2022-48772
CVE-2024-35853
CVE-2024-35997
CVE-2024-27059
CVE-2024-36953
CVE-2024-35969
CVE-2024-42094
CVE-2024-38661
CVE-2024-35925
CVE-2024-40914
CVE-2024-36940
CVE-2024-27016
CVE-2024-26828
CVE-2024-40911
CVE-2024-38634
CVE-2024-38558
CVE-2024-38582
CVE-2023-52629
CVE-2024-27020
CVE-2024-35247
CVE-2024-26999
CVE-2024-26687
CVE-2024-38565
CVE-2024-38612
CVE-2024-39495
CVE-2024-26974
CVE-2024-42101
CVE-2024-38597
CVE-2024-26929
CVE-2024-40927
CVE-2024-26830
CVE-2024-26973
CVE-2024-40980
CVE-2024-38560
CVE-2024-41047
CVE-2024-42098
CVE-2024-39507
CVE-2024-38599
CVE-2024-35789
CVE-2024-27395
CVE-2024-41092
CVE-2024-42161
CVE-2024-41006
CVE-2024-36931
CVE-2024-38619
CVE-2024-35813
CVE-2024-35898
CVE-2024-41027
CVE-2024-40932
CVE-2024-40960
CVE-2024-26925
CVE-2024-41048
CVE-2024-36886
CVE-2024-35877
CVE-2024-40963
CVE-2024-36960
CVE-2024-38590
CVE-2024-35871
CVE-2024-38579
CVE-2024-40987
CVE-2024-36025
CVE-2024-35806
CVE-2024-35899
CVE-2024-26993
CVE-2024-41097
CVE-2024-39488
CVE-2024-42115
CVE-2024-42127
CVE-2024-37356
CVE-2024-26812
CVE-2024-36939
CVE-2024-35807
CVE-2024-26886
CVE-2024-35809
CVE-2024-40937
CVE-2024-35970
CVE-2024-35817
CVE-2024-35973
CVE-2024-40945
CVE-2024-42153
CVE-2024-36964
CVE-2024-42090
CVE-2024-38552
CVE-2024-39467
CVE-2024-26961
CVE-2024-38615
CVE-2024-38618
CVE-2024-40988
CVE-2024-38605
CVE-2024-41004
CVE-2024-26966
CVE-2024-42096
CVE-2024-26996
CVE-2024-36969
CVE-2024-36489
CVE-2024-40957
CVE-2024-36974
CVE-2024-39502
CVE-2024-26976
CVE-2024-27399
CVE-2024-36905
CVE-2024-35958
CVE-2024-35927
CVE-2024-27001
CVE-2024-39487
CVE-2024-41034
CVE-2024-36904
CVE-2024-41055
CVE-2024-38550
CVE-2024-38567
CVE-2024-38586
CVE-2024-40916
CVE-2024-38589
CVE-2023-52884
CVE-2024-26810
CVE-2024-35989
CVE-2024-36894
CVE-2024-39471
CVE-2024-35900
CVE-2024-42097
CVE-2024-36959
CVE-2024-26931
CVE-2024-40934
CVE-2024-36947
CVE-2024-34777
CVE-2024-27018
CVE-2024-39499
CVE-2024-36906
CVE-2024-35984
CVE-2024-39500
CVE-2024-26965
CVE-2024-26921
CVE-2024-27013
CVE-2024-39509
CVE-2024-27008
CVE-2024-36916
CVE-2024-40942
CVE-2024-35978
CVE-2024-26969
CVE-2024-26964
CVE-2024-35879
CVE-2024-36016
CVE-2024-26629
CVE-2024-42236
CVE-2024-40943
CVE-2024-36902
CVE-2024-42247
CVE-2024-36006
CVE-2024-36014
CVE-2024-26955
CVE-2024-39277
CVE-2024-39506
CVE-2024-35936
CVE-2024-26950
CVE-2024-35938
CVE-2024-41035
CVE-2024-42140
CVE-2024-36971
CVE-2024-35910
CVE-2024-34027
CVE-2024-35933
CVE-2024-35886
CVE-2024-39501
CVE-2024-42109
CVE-2024-42157
CVE-2024-35905
CVE-2024-41007
CVE-2024-40912
CVE-2024-26984
CVE-2024-35915
CVE-2024-35934
CVE-2024-38633
CVE-2024-26952
CVE-2024-27017
CVE-2024-38627
CVE-2024-42070
CVE-2024-41046
CVE-2024-35821
CVE-2024-35815
CVE-2024-36978
CVE-2024-36967
CVE-2023-52752
CVE-2024-38583
CVE-2024-38578
CVE-2024-26926
CVE-2023-52699
CVE-2024-36952
CVE-2024-38600
CVE-2024-42102
CVE-2024-38559
CVE-2024-38637
CVE-2024-42082
CVE-2023-52488
CVE-2024-36032
CVE-2024-35950
CVE-2024-35930
CVE-2024-38780
CVE-2024-40995
CVE-2024-36004
CVE-2024-26956
CVE-2024-35896
CVE-2024-26994
CVE-2024-38624
CVE-2024-39480
CVE-2023-52882
CVE-2024-35912
CVE-2024-36015
CVE-2024-27019
CVE-2024-40983
CVE-2023-52760
CVE-2024-39503
CVE-2024-36957
CVE-2024-26980
CVE-2024-40908
CVE-2024-40958
CVE-2024-35902
CVE-2024-42087
CVE-2024-36933
CVE-2024-38635
CVE-2024-26988
CVE-2024-36941
CVE-2024-26970
CVE-2024-36005
CVE-2024-36029
CVE-2024-36008
CVE-2024-42244
CVE-2024-40967
CVE-2023-52585
CVE-2024-26951
CVE-2024-39475
CVE-2024-35922
CVE-2024-36901
CVE-2024-40901
CVE-2024-36031
CVE-2024-41000
CVE-2024-40929
CVE-2024-40994
CVE-2024-42084
CVE-2024-38547
CVE-2024-26937
CVE-2024-40984
CVE-2024-27000
CVE-2024-35785
CVE-2024-35849
CVE-2024-42119
CVE-2024-35947
CVE-2024-39505
CVE-2024-42092
CVE-2024-26811
CVE-2024-35935
CVE-2024-36946
CVE-2024-40990
CVE-2024-26981
CVE-2024-38596
CVE-2024-40976
CVE-2024-36880
CWE-ID CWE-476
CWE-190
CWE-416
CWE-362
CWE-754
CWE-399
CWE-94
CWE-119
CWE-20
CWE-125
CWE-908
CWE-667
CWE-401
CWE-388
CWE-415
CWE-835
CWE-264
CWE-284
CWE-617
CWE-682
CWE-665
CWE-200
CWE-369
CWE-191
CWE-366
CWE-193
CWE-269
CWE-787
CWE-843
CWE-823
CWE-252
CWE-96
Exploitation vector Network
Public exploit Public exploit code for vulnerability #40 is available.
Vulnerability #331 is being exploited in the wild.
Vulnerable software
Ubuntu
Operating systems & Components / Operating system

linux-image-xilinx-zynqmp (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package)
Operating systems & Components / Operating system package or component

Vendor Canonical Ltd.

Security Bulletin

This security bulletin contains information about 429 vulnerabilities.

1) NULL pointer dereference

EUVDB-ID: #VU73764

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-38096

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in GPU component of Linux kernel with device file '/dev/dri/renderD128 (or Dxxx)'. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Integer overflow

EUVDB-ID: #VU88102

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-23307

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to integer overflow in raid5_cache_count() function. A local user can trigger an integer overflow and execute arbitrary code with elevated privileges.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Use-after-free

EUVDB-ID: #VU91600

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-23848

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a use-after-free error within the cec_queue_msg_fh, related to drivers/media/cec/core/cec-adap.c and drivers/media/cec/core/cec-api.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Race condition

EUVDB-ID: #VU92719

Risk: Low

CVSSv4.0: 2.4 [CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-24857

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to damange or delete data.

A race condition was found in the Linux kernel's net/bluetooth device driver in conn_info_{min,max}_age_set() function. This can result in integrity overflow issue, possibly leading to bluetooth connection abnormality or denial of service.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Race condition

EUVDB-ID: #VU92720

Risk: Low

CVSSv4.0: 2.3 [CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-24858

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

A race condition was found in the Linux kernel's net/bluetooth in {conn,adv}_{min,max}_interval_set() function. This can result in I2cap connection or broadcast abnormality issue, possibly leading to denial of service.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Race condition

EUVDB-ID: #VU92721

Risk: Low

CVSSv4.0: 1.9 [CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-24859

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

A race condition was found in the Linux kernel's net/bluetooth in sniff_{min,max}_interval_set() function. This can result in a bluetooth sniffing exception issue, possibly leading denial of service.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Race condition

EUVDB-ID: #VU91634

Risk: Low

CVSSv4.0: 2 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-24861

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition within the xc4000 xc4000_get_frequency() function in the media/xc4000 device driver. A local user can exploit the race and escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Improper check for unusual or exceptional conditions

EUVDB-ID: #VU92399

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-25739

CWE-ID: CWE-754 - Improper Check for Unusual or Exceptional Conditions

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper check for unusual or exceptional conditions error within the ubi_read_volume_table() function in drivers/mtd/ubi/vtbl.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Resource management error

EUVDB-ID: #VU94364

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-25741

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper management of internal resources within the printer_write() in drivers/usb/gadget/function/f_printer.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Code Injection

EUVDB-ID: #VU89087

Risk: Low

CVSSv4.0: 1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-25742

CWE-ID: CWE-94 - Improper Control of Generation of Code ('Code Injection')

Exploit availability: No

Description

The vulnerability allows a malicious hypervisor to escalate privileges on the system.

The vulnerability exists due to improper input validation when handling interrupts. A malicious hypervisor can inject interrupt 0x80, which is used by Linux for legacy 32-bit system calls, and arbitrarily change the value stored in EAX while a SEV VM is running.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Buffer overflow

EUVDB-ID: #VU94296

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40902

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the ea_get() function in fs/jfs/xattr.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) NULL pointer dereference

EUVDB-ID: #VU94965

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42085

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the dwc3_suspend_common() and dwc3_resume_common() functions in drivers/usb/dwc3/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Input validation error

EUVDB-ID: #VU95093

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42154

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the sizeof() function in net/ipv4/tcp_metrics.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Buffer overflow

EUVDB-ID: #VU95078

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42229

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the setkey_unaligned() function in crypto/cipher.c, within the setkey_unaligned() function in crypto/aead.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) NULL pointer dereference

EUVDB-ID: #VU92349

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38548

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the cdns_mhdp_atomic_enable() function in drivers/gpu/drm/bridge/cadence/cdns-mhdp8546-core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) Input validation error

EUVDB-ID: #VU95099

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42120

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the dce110_vblank_set() function in drivers/gpu/drm/amd/display/dc/irq/dce110/irq_service_dce110.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

17) Use-after-free

EUVDB-ID: #VU92307

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38555

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the cmd_comp_notifier() function in drivers/net/ethernet/mellanox/mlx5/core/cmd.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

18) Out-of-bounds read

EUVDB-ID: #VU92320

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38598

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the __acquires() function in drivers/md/md-bitmap.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

19) Use-after-free

EUVDB-ID: #VU94217

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40954

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the sk_common_release() function in net/core/sock.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

20) NULL pointer dereference

EUVDB-ID: #VU92346

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38571

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the compute_intercept_slope() function in drivers/thermal/qcom/tsens.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

21) Use of uninitialized resource

EUVDB-ID: #VU91675

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36020

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the i40e_reset_all_vfs() function in drivers/net/ethernet/intel/i40e/i40e_virtchnl_pf.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

22) NULL pointer dereference

EUVDB-ID: #VU93028

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36270

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the nf_tproxy_laddr4() function in net/ipv4/netfilter/nf_tproxy_ipv4.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

23) Out-of-bounds read

EUVDB-ID: #VU93821

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39482

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the bch_dirty_init_thread() and bch_sectors_dirty_init() functions in drivers/md/bcache/writeback.c, within the bch_root_usage() function in drivers/md/bcache/sysfs.c, within the bch_cache_set_alloc() function in drivers/md/bcache/super.c, within the btree_gc_mark_node(), btree_gc_rewrite_node(), btree_gc_recurse(), bch_btree_check_recurse(), bch_btree_check_thread(), bch_btree_check(), bch_btree_map_nodes_recurse() and bch_btree_map_keys_recurse() functions in drivers/md/bcache/btree.c, within the bch_dump_bucket(), __bch_check_keys(), bch_btree_insert_key(), bch_btree_iter_push(), bch_btree_sort_partial() and bch_btree_sort_into() functions in drivers/md/bcache/bset.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

24) Improper locking

EUVDB-ID: #VU93335

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39468

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the smb2_find_smb_tcon() function in fs/smb/client/smb2transport.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

25) Resource management error

EUVDB-ID: #VU93181

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38607

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the macii_probe() function in drivers/macintosh/via-macii.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

26) Improper locking

EUVDB-ID: #VU92035

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26923

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to improper locking within the unix_gc() function in net/unix/garbage.c due to garbage collector does not take into account the risk of embryo getting enqueued during the garbage collection. A local user can execute arbitrary code with elevated privileges.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

27) Buffer overflow

EUVDB-ID: #VU95054

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42145

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the MODULE_AUTHOR(), __get_agent(), send_handler(), recv_handler() and ib_umad_read() functions in drivers/infiniband/core/user_mad.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

28) Use-after-free

EUVDB-ID: #VU94949

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41040

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the net/sched/act_ct.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

29) Memory leak

EUVDB-ID: #VU89983

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35852

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the mlxsw_sp_acl_tcam_vregion_destroy() function in drivers/net/ethernet/mellanox/mlxsw/spectrum_acl_tcam.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

30) Improper locking

EUVDB-ID: #VU91519

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35805

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the dm_exception_table_exit() function in drivers/md/dm-snap.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

31) Improper error handling

EUVDB-ID: #VU93651

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35890

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the skb_gro_receive_list() and skb_gro_receive() functions in net/core/skbuff.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

32) Buffer overflow

EUVDB-ID: #VU93307

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36965

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the scp_elf_read_ipi_buf_addr() and scp_ipi_init() functions in drivers/remoteproc/mtk_scp.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

33) Resource management error

EUVDB-ID: #VU95068

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42077

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the ocfs2_extend_trans() function in fs/ocfs2/journal.c, within the ocfs2_dio_end_io_write() function in fs/ocfs2/aops.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

34) Use-after-free

EUVDB-ID: #VU90183

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26958

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the , within the wait_on_commit() function in fs/nfs/write.c, within the nfs_direct_commit_schedule() function in fs/nfs/direct.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

35) Buffer overflow

EUVDB-ID: #VU93153

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35823

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the vc_uniscr_delete() function in drivers/tty/vt/vt.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

36) Input validation error

EUVDB-ID: #VU95097

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42124

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the qedf_execute_tmf() function in drivers/scsi/qedf/qedf_io.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

37) Use-after-free

EUVDB-ID: #VU93350

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26680

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the aq_ring_free() function in drivers/net/ethernet/aquantia/atlantic/aq_ring.c, within the aq_ptp_ring_alloc() and aq_ptp_ring_free() functions in drivers/net/ethernet/aquantia/atlantic/aq_ptp.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

38) Resource management error

EUVDB-ID: #VU93390

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38549

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the mtk_drm_gem_init() function in drivers/gpu/drm/mediatek/mtk_drm_gem.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

39) Improper locking

EUVDB-ID: #VU93036

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36286

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the instance_destroy_rcu() function in net/netfilter/nfnetlink_queue.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

40) Use-after-free

EUVDB-ID: #VU89672

Risk: Medium

CVSSv4.0: 5.7 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/U:Green]

CVE-ID: CVE-2024-27398

CWE-ID: CWE-416 - Use After Free

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a use-after-free error within the sco_sock_timeout() function in net/bluetooth/sco.c. A remote attacker can trigger a use-after-free error and perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

41) Improper locking

EUVDB-ID: #VU91513

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35990

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the xilinx_dpdma_chan_vsync_irq(), xilinx_dpdma_issue_pending() and xilinx_dpdma_chan_err_task() functions in drivers/dma/xilinx/xilinx_dpdma.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

42) Race condition

EUVDB-ID: #VU93374

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36975

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a race condition within the tpm2_key_encode() function in security/keys/trusted-keys/trusted_tpm2.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

43) Resource management error

EUVDB-ID: #VU93202

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27437

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the vfio_intx_set_signal() function in drivers/vfio/pci/vfio_pci_intrs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

44) Buffer overflow

EUVDB-ID: #VU91199

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35848

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the at24_probe() function in drivers/misc/eeprom/at24.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

45) Memory leak

EUVDB-ID: #VU90468

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26900

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the bind_rdev_to_array() function in drivers/md/md.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

46) Race condition

EUVDB-ID: #VU88148

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26654

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition in sound/sh/aica.c. A local user can exploit the race and escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

47) Input validation error

EUVDB-ID: #VU94323

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40971

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the default_options() function in fs/f2fs/super.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

48) Double free

EUVDB-ID: #VU90891

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35847

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a double free error within the its_vpe_irq_domain_alloc() function in drivers/irqchip/irq-gic-v3-its.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

49) Infinite loop

EUVDB-ID: #VU91411

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35982

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop within the batadv_tt_local_resize_to_mtu() function in net/batman-adv/translation-table.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

50) Use-after-free

EUVDB-ID: #VU95503

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42232

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the delayed_work() and EXPORT_SYMBOL() functions in net/ceph/mon_client.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

51) NULL pointer dereference

EUVDB-ID: #VU94443

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48808

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the EXPORT_SYMBOL_GPL() and dsa_switch_shutdown() functions in net/dsa/dsa2.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

52) Improper locking

EUVDB-ID: #VU93464

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35822

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the usb_ep_queue() function in drivers/usb/gadget/udc/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

53) Improper error handling

EUVDB-ID: #VU92055

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36950

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the bus_reset_work() and irq_handler() functions in drivers/firewire/ohci.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

54) Resource management error

EUVDB-ID: #VU93043

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-33621

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the ipvlan_process_v4_outbound() and ipvlan_process_v6_outbound() functions in drivers/net/ipvlan/ipvlan_core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

55) Memory leak

EUVDB-ID: #VU93320

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39276

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the ext4_xattr_block_cache_find() function in fs/ext4/xattr.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

56) Input validation error

EUVDB-ID: #VU94319

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40968

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the __cvmx_pcie_build_config_addr() function in arch/mips/pci/pcie-octeon.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

57) NULL pointer dereference

EUVDB-ID: #VU91235

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35857

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the icmp_build_probe() function in net/ipv4/icmp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

58) NULL pointer dereference

EUVDB-ID: #VU94257

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40905

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the rt6_get_pcpu_route() function in net/ipv6/route.c, within the __fib6_drop_pcpu_from() function in net/ipv6/ip6_fib.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

59) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU89899

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52880

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a local user to bypass implemented security restrictions.

The vulnerability exists due to missing permissions checks within the gsmld_open() function in drivers/tty/n_gsm.c. A local user with CAP_NET_ADMIN capability can create a GSM network.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

60) Improper locking

EUVDB-ID: #VU91448

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35819

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the qman_create_portal(), qm_congestion_task(), qman_create_cgr(), qman_delete_cgr() and qman_update_cgr() functions in drivers/soc/fsl/qbman/qman.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

61) Use-after-free

EUVDB-ID: #VU90165

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35791

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the svm_register_enc_region() function in arch/x86/kvm/svm/sev.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

62) Use of uninitialized resource

EUVDB-ID: #VU95031

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42076

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the MODULE_ALIAS() and j1939_send_one() functions in net/can/j1939/main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

63) Improper locking

EUVDB-ID: #VU94283

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40904

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the wdm_int_callback() function in drivers/usb/class/cdc-wdm.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

64) Out-of-bounds read

EUVDB-ID: #VU90305

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35976

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the xsk_setsockopt() function in net/xdp/xsk.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

65) Use-after-free

EUVDB-ID: #VU90162

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35854

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the mlxsw_sp_acl_tcam_vregion_rehash() function in drivers/net/ethernet/mellanox/mlxsw/spectrum_acl_tcam.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

66) Improper access control

EUVDB-ID: #VU88150

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26642

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper access restrictions within the nf_tables_newset() function in net/netfilter/nf_tables_api.c. A local user can set arbitrary timeouts, which can result in a denial of service condition.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

67) Memory leak

EUVDB-ID: #VU89353

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27393

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a malicious guest to perform DoS attack on the target system.

The vulnerability exists due memory leak within the xennet_alloc_one_rx_buffer() function in xen-netback implementation. A malicious guest userspace process can exhaust memory resources within the guest kernel and perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

68) Improper locking

EUVDB-ID: #VU90776

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26934

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to improper locking within the interface_authorized_store() function in drivers/usb/core/sysfs.c. A local user can execute arbitrary code.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

69) Race condition

EUVDB-ID: #VU91475

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26960

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition within the __swap_entry_free_locked() and free_swap_and_cache() functions in mm/swapfile.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

70) Use-after-free

EUVDB-ID: #VU94931

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42137

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the qca_serdev_shutdown() function in drivers/bluetooth/hci_qca.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

71) Use-after-free

EUVDB-ID: #VU92312

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38588

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the lookup_rec(), ftrace_location_range(), ftrace_process_locs(), ftrace_release_mod() and ftrace_free_mem() functions in kernel/trace/ftrace.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

72) Resource management error

EUVDB-ID: #VU94300

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40970

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the axi_desc_alloc(), axi_desc_get() and axi_chan_block_xfer_complete() functions in drivers/dma/dw-axi-dmac/dw-axi-dmac-platform.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

73) Out-of-bounds read

EUVDB-ID: #VU91664

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36972

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the queue_oob(), unix_stream_recv_urg() and manage_oob() functions in net/unix/af_unix.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

74) Memory leak

EUVDB-ID: #VU91644

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26977

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the pci_iounmap() function in lib/pci_iomap.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

75) NULL pointer dereference

EUVDB-ID: #VU92351

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38546

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the vc4_hdmi_audio_init() function in drivers/gpu/drm/vc4/vc4_hdmi.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

76) NULL pointer dereference

EUVDB-ID: #VU94966

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41095

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the nv17_tv_get_ld_modes() function in drivers/gpu/drm/nouveau/dispnv04/tvnv17.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

77) Resource management error

EUVDB-ID: #VU93178

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39292

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the register_winch_irq() function in arch/um/drivers/line.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

78) Double free

EUVDB-ID: #VU95008

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41087

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a double free error within the ata_host_alloc() function in drivers/ata/libata-core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

79) Reachable assertion

EUVDB-ID: #VU93128

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-33847

CWE-ID: CWE-617 - Reachable Assertion

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to reachable assertion within the f2fs_setattr() function in fs/f2fs/file.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

80) Resource management error

EUVDB-ID: #VU94299

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40978

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the qedi_dbg_do_not_recover_cmd_read() function in drivers/scsi/qedi/qedi_debugfs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

81) Use-after-free

EUVDB-ID: #VU94947

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41049

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the posix_lock_inode() function in fs/locks.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

82) Improper locking

EUVDB-ID: #VU90752

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35895

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the __sock_map_delete() and sock_hash_delete_elem() functions in net/core/sock_map.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

83) Buffer overflow

EUVDB-ID: #VU93152

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35804

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the emulator_cmpxchg_emulated() function in arch/x86/kvm/x86.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

84) Buffer overflow

EUVDB-ID: #VU95039

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42093

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the dpaa2_eth_xdp_xmit() and update_xps() functions in drivers/net/ethernet/freescale/dpaa2/dpaa2-eth.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

85) Out-of-bounds read

EUVDB-ID: #VU93081

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36017

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the do_setvfinfo() function in net/core/rtnetlink.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

86) Improper locking

EUVDB-ID: #VU92364

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38591

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the alloc_srqc() and free_srqc() functions in drivers/infiniband/hw/hns/hns_roce_srq.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

87) Input validation error

EUVDB-ID: #VU95103

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42080

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the rdma_restrack_init() and type2str() functions in drivers/infiniband/core/restrack.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

88) NULL pointer dereference

EUVDB-ID: #VU94971

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41089

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the nv17_tv_get_hd_modes() function in drivers/gpu/drm/nouveau/dispnv04/tvnv17.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

89) Improper locking

EUVDB-ID: #VU92359

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38613

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the arch/m68k/kernel/entry.S. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

90) NULL pointer dereference

EUVDB-ID: #VU93331

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39466

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the lmh_probe() function in drivers/thermal/qcom/lmh.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

91) Use of uninitialized resource

EUVDB-ID: #VU94293

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40931

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the mptcp_stream_connect() function in net/mptcp/protocol.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

92) Out-of-bounds read

EUVDB-ID: #VU90308

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35907

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the mlxbf_gige_open() function in drivers/net/ethernet/mellanox/mlxbf_gige/mlxbf_gige_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

93) Improper locking

EUVDB-ID: #VU92010

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36919

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the bnx2fc_free_session_resc() function in drivers/scsi/bnx2fc/bnx2fc_tgt.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

94) Out-of-bounds read

EUVDB-ID: #VU90266

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36934

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the bnad_debugfs_write_regrd() and bnad_debugfs_write_regwr() functions in drivers/net/ethernet/brocade/bna/bnad_debugfs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

95) Buffer overflow

EUVDB-ID: #VU95516

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42240

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the SYM_INNER_LABEL() function in arch/x86/entry/entry_64_compat.S. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

96) NULL pointer dereference

EUVDB-ID: #VU90542

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35940

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the psz_kmsg_read() function in fs/pstore/zone.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

97) NULL pointer dereference

EUVDB-ID: #VU90383

Risk: Low

CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36938

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the include/linux/skmsg.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

98) Input validation error

EUVDB-ID: #VU95098

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42121

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the read() and write() functions in drivers/gpu/drm/amd/display/modules/hdcp/hdcp_ddc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

99) Memory leak

EUVDB-ID: #VU94085

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39490

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the seg6_input_core() function in net/ipv6/seg6_iptunnel.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

100) NULL pointer dereference

EUVDB-ID: #VU94244

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40961

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the fib6_nh_init() function in net/ipv6/route.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

101) Integer overflow

EUVDB-ID: #VU95037

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42223

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the tda10048_set_if() function in drivers/media/dvb-frontends/tda10048.c. A local user can execute arbitrary code.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

102) Resource management error

EUVDB-ID: #VU95069

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41041

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the sock_set_flag() and spin_unlock() functions in net/ipv4/udp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

103) Improper error handling

EUVDB-ID: #VU95019

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41093

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the amdgpu_vkms_prepare_fb() and amdgpu_vkms_cleanup_fb() functions in drivers/gpu/drm/amd/amdgpu/amdgpu_vkms.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

104) Incorrect calculation

EUVDB-ID: #VU95076

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42068

CWE-ID: CWE-682 - Incorrect Calculation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect calculation within the jit_subprogs() function in kernel/bpf/verifier.c, within the bpf_prog_select_runtime() function in kernel/bpf/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

105) Input validation error

EUVDB-ID: #VU95108

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41044

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the ppp_read() and ppp_write() functions in drivers/net/ppp/ppp_generic.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

106) Buffer overflow

EUVDB-ID: #VU95041

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42086

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the bme680_compensate_temp(), bme680_compensate_press() and bme680_compensate_humid() functions in drivers/iio/chemical/bme680_core.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

107) Use-after-free

EUVDB-ID: #VU94936

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42105

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the nilfs_store_disk_layout() function in fs/nilfs2/the_nilfs.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

108) Memory leak

EUVDB-ID: #VU90431

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36954

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the tipc_buf_append() function in net/tipc/msg.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

109) NULL pointer dereference

EUVDB-ID: #VU90553

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35796

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the temac_probe() function in drivers/net/ethernet/xilinx/ll_temac_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

110) Use-after-free

EUVDB-ID: #VU92313

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38610

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the acrn_vm_memseg_unmap() and acrn_vm_ram_map() functions in drivers/virt/acrn/mm.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

111) Improper error handling

EUVDB-ID: #VU93449

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36929

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the skb_alloc_rx_flag() and skb_copy_expand() functions in net/core/skbuff.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

112) Memory leak

EUVDB-ID: #VU93609

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35893

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the tcf_skbmod_dump() function in net/sched/act_skbmod.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

113) Infinite loop

EUVDB-ID: #VU93063

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38601

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop within the rb_check_list() and ring_buffer_resize() functions in kernel/trace/ring_buffer.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

114) Improper locking

EUVDB-ID: #VU94269

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40981

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the batadv_purge_orig_ref() function in net/batman-adv/originator.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

115) Use of uninitialized resource

EUVDB-ID: #VU90975

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36889

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the mptcp_stream_connect() function in net/mptcp/protocol.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

116) Input validation error

EUVDB-ID: #VU94132

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27015

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the nf_flow_tuple_encap() function in net/netfilter/nf_flow_table_ip.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

117) Resource management error

EUVDB-ID: #VU93269

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35897

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the nf_tables_table_disable() and nf_tables_updtable() functions in net/netfilter/nf_tables_api.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

118) Improper error handling

EUVDB-ID: #VU93336

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39469

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the nilfs_empty_dir() function in fs/nilfs2/dir.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

119) Buffer overflow

EUVDB-ID: #VU93241

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35825

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the drivers/usb/gadget/function/f_ncm.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

120) Input validation error

EUVDB-ID: #VU89054

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26922

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input within the amdgpu_vm_bo_insert_map(), amdgpu_vm_bo_map(), amdgpu_vm_bo_replace_map(), and amdgpu_vm_bo_clear_mappings() functions in drivers/gpu/drm/amd/amdgpu/amdgpu_vm.c. A local user can pass specially crafted input to the driver and perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

121) NULL pointer dereference

EUVDB-ID: #VU92345

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38573

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the cppc_cpufreq_get_rate() and hisi_cppc_cpufreq_get_rate() functions in drivers/cpufreq/cppc_cpufreq.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

122) Incorrect calculation

EUVDB-ID: #VU95075

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42130

CWE-ID: CWE-682 - Incorrect Calculation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect calculation within the virtual_ncidev_write() function in drivers/nfc/virtual_ncidev.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

123) Improper locking

EUVDB-ID: #VU92367

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38580

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the __ep_eventpoll_poll() function in fs/eventpoll.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

124) Improper error handling

EUVDB-ID: #VU92058

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26814

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the vfio_fsl_mc_set_irq_trigger() function in drivers/vfio/fsl-mc/vfio_fsl_mc_intr.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

125) Memory leak

EUVDB-ID: #VU91613

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36955

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the is_link_enabled() function in sound/hda/intel-sdw-acpi.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

126) NULL pointer dereference

EUVDB-ID: #VU90588

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26813

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the vfio_platform_set_irq_unmask(), vfio_automasked_irq_handler(), vfio_irq_handler(), vfio_set_trigger(), vfio_platform_set_irq_trigger(), vfio_platform_set_irqs_ioctl(), vfio_platform_irq_init() and vfio_platform_irq_cleanup() functions in drivers/vfio/platform/vfio_platform_irq.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

127) Use-after-free

EUVDB-ID: #VU90168

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27396

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the gtp_dellink() function in drivers/net/gtp.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

128) NULL pointer dereference

EUVDB-ID: #VU90529

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36937

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the __xdp_do_redirect_frame(), EXPORT_SYMBOL_GPL(), xdp_do_generic_redirect_map() and xdp_do_generic_redirect() functions in net/core/filter.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

129) Resource management error

EUVDB-ID: #VU92961

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36928

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the qeth_free_cq(), qeth_alloc_qdio_queues(), atomic_set(), qeth_free_qdio_queues() and qeth_qdio_poll() functions in drivers/s390/net/qeth_core_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

130) Improper error handling

EUVDB-ID: #VU95012

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42224

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the mv88e6xxx_default_mdio_bus() function in drivers/net/dsa/mv88e6xxx/chip.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

131) Improper locking

EUVDB-ID: #VU90770

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27004

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the HLIST_HEAD(), clk_pm_runtime_put(), clk_unprepare_unused_subtree(), clk_disable_unused_subtree(), __setup(), clk_disable_unused(), __clk_release() and __clk_register() functions in drivers/clk/clk.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

132) Use-after-free

EUVDB-ID: #VU94937

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42104

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the nilfs_check_page() and nilfs_error() functions in fs/nilfs2/dir.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

133) Use of uninitialized resource

EUVDB-ID: #VU95028

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42225

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the mt7915_mcu_add_nested_subtlv() function in drivers/net/wireless/mediatek/mt76/mt7915/mcu.c, within the mt76_connac_mcu_add_nested_tlv(), mt76_connac_mcu_hw_scan(), mt76_connac_mcu_sched_scan_req(), mt76_connac_mcu_update_gtk_rekey() and mt76_connac_mcu_set_wow_pattern() functions in drivers/net/wireless/mediatek/mt76/mt76_connac_mcu.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

134) Out-of-bounds read

EUVDB-ID: #VU93080

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38659

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the enic_set_vf_port() function in drivers/net/ethernet/cisco/enic/enic_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

135) Use-after-free

EUVDB-ID: #VU90145

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35955

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the check_kprobe_address_safe() function in kernel/kprobes.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

136) Use of uninitialized resource

EUVDB-ID: #VU95024

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42106

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the inet_diag_dump_compat() and inet_diag_get_exact_compat() functions in net/ipv4/inet_diag.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

137) Memory leak

EUVDB-ID: #VU94084

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39489

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the seg6_hmac_init_algo() and seg6_hmac_net_init() functions in net/ipv6/seg6_hmac.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

138) Memory leak

EUVDB-ID: #VU93016

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-31076

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the migrate_one_irq() function in kernel/irq/cpuhotplug.c, within the __send_cleanup_vector(), irq_complete_move() and irq_force_complete_move() functions in arch/x86/kernel/apic/vector.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

139) Integer overflow

EUVDB-ID: #VU88544

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26817

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to integer overflow within the kfd_ioctl_get_process_apertures_new() function in drivers/gpu/drm/amd/amdkfd/kfd_chardev.c. A local user can trigger an integer overflow and execute arbitrary code with elevated privileges.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

140) Buffer overflow

EUVDB-ID: #VU93150

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35884

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the udp_gro_receive() function in net/ipv4/udp_offload.c, within the __udp_is_mcast_sock() function in net/ipv4/udp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

141) Input validation error

EUVDB-ID: #VU95101

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42095

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the uart_write() and omap8250_irq() functions in drivers/tty/serial/8250/8250_omap.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

142) Integer overflow

EUVDB-ID: #VU95035

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42131

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the domain_dirty_limits(), node_dirty_limit(), dirty_background_bytes_handler() and dirty_bytes_handler() functions in mm/page-writeback.c. A local user can execute arbitrary code.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

143) Use-after-free

EUVDB-ID: #VU94216

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40956

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the irq_process_work_list() function in drivers/dma/idxd/irq.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

144) Buffer overflow

EUVDB-ID: #VU94315

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40941

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the iwl_mvm_mfu_assert_dump_notif() function in drivers/net/wireless/intel/iwlwifi/mvm/fw.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

145) Incorrect calculation

EUVDB-ID: #VU93612

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36007

CWE-ID: CWE-682 - Incorrect Calculation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect calculation within the mlxsw_sp_acl_tcam_vregion_rehash_work(), mlxsw_sp_acl_tcam_rehash_ctx_vregion_changed(), mlxsw_sp_acl_tcam_vchunk_migrate_end(), mlxsw_sp_acl_tcam_vchunk_migrate_one(), mlxsw_sp_acl_tcam_vregion_migrate() and mlxsw_sp_acl_tcam_vregion_rehash_start() functions in drivers/net/ethernet/mellanox/mlxsw/spectrum_acl_tcam.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

146) Race condition

EUVDB-ID: #VU91474

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27009

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition within the ccw_device_set_online() function in drivers/s390/cio/device.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

147) NULL pointer dereference

EUVDB-ID: #VU94246

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40959

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the xfrm6_get_saddr() function in net/ipv6/xfrm6_policy.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

148) NULL pointer dereference

EUVDB-ID: #VU94964

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42089

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the fsl_asoc_card_probe() function in sound/soc/fsl/fsl-asoc-card.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

149) Improper locking

EUVDB-ID: #VU93342

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-37078

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the nilfs_segctor_prepare_write() function in fs/nilfs2/segment.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

150) Improper Initialization

EUVDB-ID: #VU93351

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35960

CWE-ID: CWE-665 - Improper Initialization

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper initialization within the add_rule_fg() function in drivers/net/ethernet/mellanox/mlx5/core/fs_core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

151) Memory leak

EUVDB-ID: #VU94212

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41002

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the sec_alg_resource_free() function in drivers/crypto/hisilicon/sec2/sec_crypto.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

152) Use of uninitialized resource

EUVDB-ID: #VU93337

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39301

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the p9_fcall_init() function in net/9p/client.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

153) Input validation error

EUVDB-ID: #VU94125

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35988

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the arch/riscv/include/asm/pgtable.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

154) Improper error handling

EUVDB-ID: #VU95018

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52887

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the j1939_xtp_rx_rts_session_new() function in net/can/j1939/transport.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

155) NULL pointer dereference

EUVDB-ID: #VU90509

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35885

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the mlxbf_gige_shutdown() function in drivers/net/ethernet/mellanox/mlxbf_gige/mlxbf_gige_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

156) Memory leak

EUVDB-ID: #VU93818

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39484

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the davinci_mmcsd_remove() and __exit_p() functions in drivers/mmc/host/davinci_mmc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

157) Resource management error

EUVDB-ID: #VU93256

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35872

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the include/linux/secretmem.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

158) Buffer overflow

EUVDB-ID: #VU94301

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40974

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the arch/powerpc/include/asm/hvcall.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

159) NULL pointer dereference

EUVDB-ID: #VU90839

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35851

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the qca_prevent_wake() function in drivers/bluetooth/hci_qca.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

160) Use-after-free

EUVDB-ID: #VU91062

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26957

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the zcrypt_pick_queue() and zcrypt_drop_queue() functions in drivers/s390/crypto/zcrypt_api.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

161) Buffer overflow

EUVDB-ID: #VU93236

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38623

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the fs/ntfs3/ntfs.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

162) Resource management error

EUVDB-ID: #VU93839

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35944

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the dg_dispatch_as_host() function in drivers/misc/vmw_vmci/vmci_datagram.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

163) Improper locking

EUVDB-ID: #VU94264

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41005

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the netpoll_owner_active() function in net/core/netpoll.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

164) Memory leak

EUVDB-ID: #VU94922

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42152

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the nvmet_sq_destroy() function in drivers/nvme/target/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

165) Use of uninitialized resource

EUVDB-ID: #VU90873

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35888

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the ip6erspan_rcv() function in net/ipv6/ip6_gre.c, within the erspan_rcv() function in net/ipv4/ip_gre.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

166) Out-of-bounds read

EUVDB-ID: #VU93025

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38621

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the stk1160_buffer_done() and stk1160_copy_video() functions in drivers/media/usb/stk1160/stk1160-video.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

167) Resource management error

EUVDB-ID: #VU93297

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26989

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the kernel_page_present() function in arch/arm64/mm/pageattr.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

168) Out-of-bounds read

EUVDB-ID: #VU94952

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42148

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the drivers/net/ethernet/broadcom/bnx2x/bnx2x.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

169) Buffer overflow

EUVDB-ID: #VU89675

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27401

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error within the packet_buffer_get() function in drivers/firewire/nosy.c. A local user can trigger memory corruption and perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

170) Out-of-bounds read

EUVDB-ID: #VU90272

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36883

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the net_alloc_generic() and register_pernet_operations() functions in net/core/net_namespace.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

171) Use-after-free

EUVDB-ID: #VU90163

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35855

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the mlxsw_sp_acl_tcam_ventry_activity_get() function in drivers/net/ethernet/mellanox/mlxsw/spectrum_acl_tcam.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

172) Out-of-bounds read

EUVDB-ID: #VU90322

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26936

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the smb2_allocate_rsp_buf() function in fs/smb/server/smb2pdu.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

173) Information disclosure

EUVDB-ID: #VU91358

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26935

CWE-ID: CWE-200 - Exposure of sensitive information to an unauthorized actor

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to information disclosure within the scsi_host_dev_release() function in drivers/scsi/hosts.c. A local user can gain access to sensitive information.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

174) NULL pointer dereference

EUVDB-ID: #VU93327

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48772

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the lgdt3306a_probe() function in drivers/media/dvb-frontends/lgdt3306a.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

175) Memory leak

EUVDB-ID: #VU89984

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35853

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the mlxsw_sp_acl_tcam_vchunk_migrate_start() and mlxsw_sp_acl_tcam_vregion_migrate() functions in drivers/net/ethernet/mellanox/mlxsw/spectrum_acl_tcam.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

176) Infinite loop

EUVDB-ID: #VU91412

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35997

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop within the __i2c_hid_command() and i2c_hid_irq() functions in drivers/hid/i2c-hid/i2c-hid-core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

177) Division by zero

EUVDB-ID: #VU91374

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27059

CWE-ID: CWE-369 - Divide By Zero

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a division by zero error within the isd200_dump_driveid(), isd200_get_inquiry_data() and isd200_init_info() functions in drivers/usb/storage/isd200.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

178) Improper error handling

EUVDB-ID: #VU93450

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36953

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the kvm_register_vgic_device() function in arch/arm64/kvm/vgic/vgic-kvm-device.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

179) Use-after-free

EUVDB-ID: #VU90143

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35969

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ipv6_get_ifaddr() function in net/ipv6/addrconf.c, within the in6_ifa_hold() function in include/net/addrconf.h. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

180) Buffer overflow

EUVDB-ID: #VU95040

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42094

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the iucv_setmask_mp() and iucv_cpu_online() functions in net/iucv/iucv.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

181) Improper locking

EUVDB-ID: #VU93333

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38661

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the hex2bitmap() function in drivers/s390/crypto/ap_bus.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

182) Division by zero

EUVDB-ID: #VU91373

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35925

CWE-ID: CWE-369 - Divide By Zero

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a division by zero error within the blk_rq_stat_init() function in block/blk-stat.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

183) Improper error handling

EUVDB-ID: #VU94291

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40914

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the unpoison_memory() function in mm/memory-failure.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

184) Double Free

EUVDB-ID: #VU90885

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36940

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a double free error within the pinctrl_enable() function in drivers/pinctrl/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

185) Input validation error

EUVDB-ID: #VU94131

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27016

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the nf_flow_xmit_xfrm(), nf_flow_skb_encap_protocol() and nf_flow_encap_pop() functions in net/netfilter/nf_flow_table_ip.c, within the nf_flow_offload_inet_hook() function in net/netfilter/nf_flow_table_inet.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

186) Integer underflow

EUVDB-ID: #VU91674

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26828

CWE-ID: CWE-191 - Integer underflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer underflow within the parse_server_interfaces() function in fs/smb/client/smb2ops.c. A local user can execute arbitrary code.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

187) NULL pointer dereference

EUVDB-ID: #VU94256

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40911

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the cfg80211_get_station() function in net/wireless/util.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

188) Improper locking

EUVDB-ID: #VU93038

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38634

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the max3100_sr() and max3100_handlerx() functions in drivers/tty/serial/max3100.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

189) Input validation error

EUVDB-ID: #VU94117

Risk: Medium

CVSSv4.0: 4.9 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2024-38558

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input when parsing ICMPv6 packets within the parse_icmpv6() function in net/openvswitch/flow.c. A remote attacker can send specially crafted packets to the system and perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

190) Improper locking

EUVDB-ID: #VU92366

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38582

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the nilfs_segctor_sync(), nilfs_segctor_wakeup(), nilfs_segctor_notify() and nilfs_segctor_destroy() functions in fs/nilfs2/segment.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

191) Use-after-free

EUVDB-ID: #VU90221

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52629

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the switch_drv_remove() function in arch/sh/drivers/push-switch.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

192) Race condition within a thread

EUVDB-ID: #VU91432

Risk: Low

CVSSv4.0: 4.4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27020

CWE-ID: CWE-366 - Race Condition within a Thread

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to a data race within the __nft_expr_type_get() and nft_expr_type_get() functions in net/netfilter/nf_tables_api.c. A local user can execute arbitrary code.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

193) NULL pointer dereference

EUVDB-ID: #VU93122

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35247

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the fpga_region_get(), fpga_region_put(), ATTRIBUTE_GROUPS(), fpga_region_register_full(), ERR_PTR() and EXPORT_SYMBOL_GPL() functions in drivers/fpga/fpga-region.c, within the fpga_region_register_full() function in Documentation/driver-api/fpga/fpga-region.rst. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

194) Improper locking

EUVDB-ID: #VU91449

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26999

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the pmz_receive_chars() function in drivers/tty/serial/pmac_zilog.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

195) Improper locking

EUVDB-ID: #VU92043

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26687

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the shutdown_pirq() and __unbind_from_irq() functions in drivers/xen/events/events_base.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

196) Resource management error

EUVDB-ID: #VU93836

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38565

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the ar5523_probe() function in drivers/net/wireless/ath/ar5523/ar5523.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

197) Use-after-free

EUVDB-ID: #VU92314

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38612

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the IS_ENABLED() function in net/ipv6/seg6.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

198) Use-after-free

EUVDB-ID: #VU94232

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39495

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the gb_interface_release() function in drivers/greybus/interface.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

199) Use-after-free

EUVDB-ID: #VU90185

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26974

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the adf_device_reset_worker() and adf_dev_aer_schedule_reset() functions in drivers/crypto/qat/qat_common/adf_aer.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

200) NULL pointer dereference

EUVDB-ID: #VU94963

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42101

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the nouveau_connector_get_modes() function in drivers/gpu/drm/nouveau/nouveau_connector.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

201) Improper locking

EUVDB-ID: #VU92361

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38597

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the gem_interrupt() and gem_init_one() functions in drivers/net/ethernet/sun/sungem.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

202) Double free

EUVDB-ID: #VU90894

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26929

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to a double free error within the qla2x00_els_dcmd_sp_free() and qla24xx_els_dcmd_iocb() functions in drivers/scsi/qla2xxx/qla_iocb.c. A local user can execute arbitrary code.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

203) Use-after-free

EUVDB-ID: #VU94220

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40927

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the xhci_invalidate_cancelled_tds() and xhci_handle_cmd_set_deq() functions in drivers/usb/host/xhci-ring.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

204) Input validation error

EUVDB-ID: #VU94135

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26830

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the i40e_check_vf_permission() and i40e_vc_del_mac_addr_msg() functions in drivers/net/ethernet/intel/i40e/i40e_virtchnl_pf.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

205) Information disclosure

EUVDB-ID: #VU91360

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26973

CWE-ID: CWE-200 - Exposure of sensitive information to an unauthorized actor

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to information disclosure within the fat_encode_fh_nostale() function in fs/fat/nfs.c. A local user can gain access to sensitive information.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

206) Improper locking

EUVDB-ID: #VU94270

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40980

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the reset_per_cpu_data(), trace_drop_common(), net_dm_hw_reset_per_cpu_data(), net_dm_hw_summary_probe() and __net_dm_cpu_data_init() functions in net/core/drop_monitor.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

207) Out-of-bounds read

EUVDB-ID: #VU92327

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38560

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the bfad_debugfs_write_regrd() and bfad_debugfs_write_regwr() functions in drivers/scsi/bfa/bfad_debugfs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

208) Improper locking

EUVDB-ID: #VU94994

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41047

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the i40e_xdp_setup() function in drivers/net/ethernet/intel/i40e/i40e_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

209) Input validation error

EUVDB-ID: #VU95100

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42098

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the ecdh_set_secret() function in crypto/ecdh.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

210) Improper locking

EUVDB-ID: #VU94284

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39507

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the hclge_push_link_status(), hclge_update_link_status(), hclge_uninit_need_wait() and hclge_uninit_client_instance() functions in drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

211) Out-of-bounds read

EUVDB-ID: #VU92319

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38599

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the do_jffs2_setxattr() function in fs/jffs2/xattr.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

212) Use-after-free

EUVDB-ID: #VU90167

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35789

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ieee80211_change_station() function in net/mac80211/cfg.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

213) Use-after-free

EUVDB-ID: #VU90169

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27395

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ovs_ct_limit_exit() function in net/openvswitch/conntrack.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

214) Use-after-free

EUVDB-ID: #VU94938

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41092

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the i915_vma_revoke_fence() function in drivers/gpu/drm/i915/gt/intel_ggtt_fencing.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

215) Use of uninitialized resource

EUVDB-ID: #VU95027

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42161

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the tools/lib/bpf/bpf_core_read.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

216) Memory leak

EUVDB-ID: #VU94213

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41006

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the nr_heartbeat_expiry() function in net/netrom/nr_timer.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

217) Out-of-bounds read

EUVDB-ID: #VU90267

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36931

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the crw_inject_write() function in drivers/s390/cio/cio_inject.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

218) Use of uninitialized resource

EUVDB-ID: #VU93082

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38619

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the short_pack() and alauda_check_media() functions in drivers/usb/storage/alauda.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

219) Incorrect calculation

EUVDB-ID: #VU93614

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35813

CWE-ID: CWE-682 - Incorrect Calculation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect calculation within the __mmc_blk_ioctl_cmd() function in drivers/mmc/core/block.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

220) Race condition within a thread

EUVDB-ID: #VU91427

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35898

CWE-ID: CWE-366 - Race Condition within a Thread

Exploit availability: No

Description

The vulnerability allows a local user to manipulate data.

The vulnerability exists due to a data race within the nf_tables_flowtable_parse_hook() and nft_flowtable_type_get() functions in net/netfilter/nf_tables_api.c. A local user can manipulate data.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

221) Resource management error

EUVDB-ID: #VU95071

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41027

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the userfaultfd_api() function in fs/userfaultfd.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

222) Memory leak

EUVDB-ID: #VU94204

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40932

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the vidi_get_modes() function in drivers/gpu/drm/exynos/exynos_drm_vidi.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

223) NULL pointer dereference

EUVDB-ID: #VU94245

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40960

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the rt6_probe() function in net/ipv6/route.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

224) Improper locking

EUVDB-ID: #VU92034

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26925

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the __nf_tables_abort() and nf_tables_abort() functions in net/netfilter/nf_tables_api.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

225) NULL pointer dereference

EUVDB-ID: #VU94982

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41048

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the sk_msg_recvmsg() function in net/core/skmsg.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

226) Use-after-free

EUVDB-ID: #VU90049

Risk: High

CVSSv4.0: 7.2 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2024-36886

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to a use-after-free error within the tipc_buf_append() function in net/tipc/msg.c when processing fragmented TIPC messages. A remote attacker can send specially crafted packets to the system, trigger a use-after-free error and execute arbitrary code on the system in the context of the kernel.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

227) Memory leak

EUVDB-ID: #VU91638

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35877

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the follow_phys() function in mm/memory.c, within the is_cow_mapping(), free_pfn_range() and untrack_pfn() functions in arch/x86/mm/pat.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

228) Input validation error

EUVDB-ID: #VU94318

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40963

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the bcm6358_quirks() function in arch/mips/bmips/setup.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

229) Out-of-bounds read

EUVDB-ID: #VU90819

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36960

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the vmw_event_fence_action_create() function in drivers/gpu/drm/vmwgfx/vmwgfx_fence.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

230) Resource management error

EUVDB-ID: #VU93087

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38590

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the get_cqe_status() function in drivers/infiniband/hw/hns/hns_roce_hw_v2.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

231) Memory leak

EUVDB-ID: #VU91639

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35871

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the __asm__() and copy_thread() functions in arch/riscv/kernel/process.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

232) Buffer overflow

EUVDB-ID: #VU92953

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38579

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the spu2_dump_omd() function in drivers/crypto/bcm/spu2.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

233) Resource management error

EUVDB-ID: #VU94307

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40987

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the sumo_construct_vid_mapping_table() function in drivers/gpu/drm/amd/amdgpu/kv_dpm.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

234) Off-by-one

EUVDB-ID: #VU91172

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36025

CWE-ID: CWE-193 - Off-by-one Error

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an off-by-one error within the qla_edif_app_getstats() function in drivers/scsi/qla2xxx/qla_edif.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

235) Improper locking

EUVDB-ID: #VU90755

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35806

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the qm_congestion_task() and qman_create_cgr() functions in drivers/soc/fsl/qbman/qman.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

236) Use-after-free

EUVDB-ID: #VU90160

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35899

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the nf_tables_module_exit() function in net/netfilter/nf_tables_api.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

237) Information disclosure

EUVDB-ID: #VU91355

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26993

CWE-ID: CWE-200 - Exposure of sensitive information to an unauthorized actor

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to information disclosure within the sysfs_break_active_protection() function in fs/sysfs/file.c. A local user can gain access to sensitive information.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

238) Resource management error

EUVDB-ID: #VU95067

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41097

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the cxacru_bind() function in drivers/usb/atm/cxacru.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

239) Improper error handling

EUVDB-ID: #VU94087

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39488

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the arch/arm64/include/asm/asm-bug.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

240) Use-after-free

EUVDB-ID: #VU94932

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42115

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the jffs2_i_init_once() function in fs/jffs2/super.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

241) Improper error handling

EUVDB-ID: #VU95014

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42127

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the lima_pp_init() and lima_pp_bcast_init() functions in drivers/gpu/drm/lima/lima_pp.c, within the lima_mmu_init() function in drivers/gpu/drm/lima/lima_mmu.c, within the lima_gp_init() function in drivers/gpu/drm/lima/lima_gp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

242) Out-of-bounds read

EUVDB-ID: #VU93024

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-37356

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the net/ipv4/tcp_dctcp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

243) Improper locking

EUVDB-ID: #VU91529

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26812

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the vfio_send_intx_eventfd(), vfio_intx_handler() and vfio_pci_set_intx_trigger() functions in drivers/vfio/pci/vfio_pci_intrs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

244) Improper error handling

EUVDB-ID: #VU92054

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36939

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the nfs_net_init() function in fs/nfs/inode.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

245) Resource management error

EUVDB-ID: #VU93270

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35807

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the EXT4_DESC_PER_BLOCK() function in fs/ext4/resize.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

246) Use-after-free

EUVDB-ID: #VU90200

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26886

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the bt_sock_recvmsg() and bt_sock_ioctl() functions in net/bluetooth/af_bluetooth.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

247) Improper error handling

EUVDB-ID: #VU90947

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35809

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the pci_device_remove() function in drivers/pci/pci-driver.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

248) Double free

EUVDB-ID: #VU94289

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40937

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a double free error within the gve_rx_skb_hash() and gve_rx_poll_dqo() functions in drivers/net/ethernet/google/gve/gve_rx_dqo.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

249) Out-of-bounds read

EUVDB-ID: #VU90304

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35970

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the manage_oob() function in net/unix/af_unix.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

250) Resource management error

EUVDB-ID: #VU93595

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35817

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the amdgpu_ttm_gart_bind() function in drivers/gpu/drm/amd/amdgpu/amdgpu_ttm.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

251) Use of uninitialized resource

EUVDB-ID: #VU90872

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35973

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the geneve_xmit_skb() and geneve6_xmit_skb() functions in drivers/net/geneve.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

252) NULL pointer dereference

EUVDB-ID: #VU94250

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40945

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the include/linux/iommu.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

253) Improper locking

EUVDB-ID: #VU94983

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42153

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the wait_reset(), i2c_pnx_master_xmit(), i2c_pnx_master_rcv(), i2c_pnx_interrupt(), i2c_pnx_timeout(), i2c_pnx_xfer() and i2c_pnx_probe() functions in drivers/i2c/busses/i2c-pnx.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

254) Improper privilege management

EUVDB-ID: #VU93734

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36964

CWE-ID: CWE-269 - Improper Privilege Management

Exploit availability: No

Description

The vulnerability allows a local user to read and manipulate data.

The vulnerability exists due to improperly imposed permissions within the p9mode2perm() function in fs/9p/vfs_inode.c. A local user can read and manipulate data.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

255) Improper locking

EUVDB-ID: #VU94988

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42090

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the create_pinctrl() function in drivers/pinctrl/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

256) Out-of-bounds read

EUVDB-ID: #VU92330

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38552

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the cm_helper_translate_curve_to_hw_format() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_cm_common.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

257) Out-of-bounds read

EUVDB-ID: #VU93325

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39467

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the sanity_check_inode() function in fs/f2fs/inode.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

258) Use-after-free

EUVDB-ID: #VU90186

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26961

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the mac802154_llsec_key_del_rcu() function in net/mac802154/llsec.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

259) Input validation error

EUVDB-ID: #VU94120

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38615

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the __cpufreq_offline() and cpufreq_remove_dev() functions in drivers/cpufreq/cpufreq.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

260) Input validation error

EUVDB-ID: #VU92371

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38618

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the snd_timer_start1() function in sound/core/timer.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

261) Resource management error

EUVDB-ID: #VU94308

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40988

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the sumo_construct_vid_mapping_table() function in drivers/gpu/drm/radeon/sumo_dpm.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

262) NULL pointer dereference

EUVDB-ID: #VU93048

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38605

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the snd_card_new() function in sound/core/init.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

263) Improper locking

EUVDB-ID: #VU94265

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41004

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the kernel/trace/Kconfig. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

264) Out-of-bounds read

EUVDB-ID: #VU91394

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26966

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the F() function in drivers/clk/qcom/mmcc-apq8084.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

265) Improper locking

EUVDB-ID: #VU94987

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42096

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the profile_pc() function in arch/x86/kernel/time.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

266) Use-after-free

EUVDB-ID: #VU90184

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26996

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ncm_set_alt() and ncm_disable() functions in drivers/usb/gadget/function/f_ncm.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

267) Division by zero

EUVDB-ID: #VU91563

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36969

CWE-ID: CWE-369 - Divide By Zero

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a division by zero error within the setup_dsc_config() function in drivers/gpu/drm/amd/display/dc/dsc/dc_dsc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

268) NULL pointer dereference

EUVDB-ID: #VU93030

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36489

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the tls_ctx_create() function in net/tls/tls_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

269) NULL pointer dereference

EUVDB-ID: #VU94247

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40957

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the input_action_end_dx6() and input_action_end_dx4() functions in net/ipv6/seg6_local.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

270) Input validation error

EUVDB-ID: #VU93310

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36974

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the taprio_parse_mqprio_opt() function in net/sched/sch_taprio.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

271) NULL pointer dereference

EUVDB-ID: #VU94261

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39502

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ionic_qcq_enable() function in drivers/net/ethernet/pensando/ionic/ionic_lif.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

272) Improper locking

EUVDB-ID: #VU90774

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26976

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the async_pf_execute(), kvm_clear_async_pf_completion_queue(), kvm_check_async_pf_completion() and kvm_setup_async_pf() functions in virt/kvm/async_pf.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

273) NULL pointer dereference

EUVDB-ID: #VU89673

Risk: Medium

CVSSv4.0: 4.9 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2024-27399

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dreference error within the l2cap_chan_timeout() function in net/bluetooth/l2cap_core.c. A remote attacker can send specially crafted packets to the system and perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

274) Race condition

EUVDB-ID: #VU93375

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36905

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a race condition within the tcp_send_fin() function in net/ipv4/tcp_output.c, within the tcp_rcv_state_process() function in net/ipv4/tcp_input.c, within the tcp_shutdown() and __tcp_close() functions in net/ipv4/tcp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

275) Resource management error

EUVDB-ID: #VU93255

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35958

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the ena_unmap_tx_buff() and ena_free_tx_bufs() functions in drivers/net/ethernet/amazon/ena/ena_netdev.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

276) Use of uninitialized resource

EUVDB-ID: #VU93083

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35927

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the reschedule_output_poll_work() and EXPORT_SYMBOL() functions in drivers/gpu/drm/drm_probe_helper.c, within the drm_mode_config_helper_suspend() and drm_mode_config_helper_resume() functions in drivers/gpu/drm/drm_modeset_helper.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

277) Resource management error

EUVDB-ID: #VU92969

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27001

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the vmk80xx_find_usb_endpoints() function in drivers/comedi/drivers/vmk80xx.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

278) Out-of-bounds read

EUVDB-ID: #VU93889

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39487

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the bond_option_arp_ip_targets_set() function in drivers/net/bonding/bond_options.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

279) Improper error handling

EUVDB-ID: #VU95020

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41034

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the nilfs_dotdot() function in fs/nilfs2/dir.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

280) Use-after-free

EUVDB-ID: #VU90047

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36904

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the tcp_twsk_unique() function in net/ipv4/tcp_ipv4.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

281) NULL pointer dereference

EUVDB-ID: #VU94979

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41055

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the include/linux/mmzone.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

282) NULL pointer dereference

EUVDB-ID: #VU92348

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38550

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the kirkwood_dma_hw_params() function in sound/soc/kirkwood/kirkwood-dma.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

283) Input validation error

EUVDB-ID: #VU92370

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38567

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the carl9170_usb_probe() function in drivers/net/wireless/ath/carl9170/usb.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

284) Buffer overflow

EUVDB-ID: #VU93134

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38586

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the rtl8169_doorbell() and rtl8169_start_xmit() functions in drivers/net/ethernet/realtek/r8169_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

285) Improper locking

EUVDB-ID: #VU94281

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40916

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the hdmi_get_modes() function in drivers/gpu/drm/exynos/exynos_hdmi.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

286) Improper locking

EUVDB-ID: #VU92365

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38589

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the nr_add_node() and nr_del_node() functions in net/netrom/nr_route.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

287) Improper locking

EUVDB-ID: #VU93035

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52884

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the cyapa_suspend() and cyapa_resume() functions in drivers/input/mouse/cyapa.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

288) Improper locking

EUVDB-ID: #VU91318

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26810

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the vfio_send_intx_eventfd(), vfio_pci_intx_mask(), vfio_pci_intx_unmask_handler(), vfio_pci_set_intx_unmask() and vfio_pci_set_intx_mask() functions in drivers/vfio/pci/vfio_pci_intrs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

289) Resource management error

EUVDB-ID: #VU93472

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35989

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the perf_event_cpu_offline() function in drivers/dma/idxd/perfmon.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

290) Improper locking

EUVDB-ID: #VU90735

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36894

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the ffs_user_copy_worker() and ffs_epfile_async_io_complete() functions in drivers/usb/gadget/function/f_fs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

291) Out-of-bounds read

EUVDB-ID: #VU93326

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39471

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the sdma_v4_0_process_trap_irq() function in drivers/gpu/drm/amd/amdgpu/sdma_v4_0.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

292) Incorrect calculation

EUVDB-ID: #VU93613

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35900

CWE-ID: CWE-682 - Incorrect Calculation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect calculation within the nf_tables_addchain() function in net/netfilter/nf_tables_api.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

293) Input validation error

EUVDB-ID: #VU95001

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42097

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the load_data() and load_guspatch() functions in sound/synth/emux/soundfont.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

294) Information disclosure

EUVDB-ID: #VU91321

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36959

CWE-ID: CWE-200 - Exposure of sensitive information to an unauthorized actor

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to information disclosure within the pinctrl_dt_to_map() function in drivers/pinctrl/devicetree.c. A local user can gain access to sensitive information.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

295) NULL pointer dereference

EUVDB-ID: #VU90563

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26931

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the qlt_free_session_done() function in drivers/scsi/qla2xxx/qla_target.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

296) Memory leak

EUVDB-ID: #VU94205

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40934

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the logi_dj_recv_switch_to_dj_mode() function in drivers/hid/hid-logitech-dj.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

297) Memory leak

EUVDB-ID: #VU91614

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36947

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the remove_device_files() function in drivers/infiniband/hw/qib/qib_fs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

298) Input validation error

EUVDB-ID: #VU93172

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-34777

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the map_benchmark_ioctl() function in kernel/dma/map_benchmark.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

299) Resource management error

EUVDB-ID: #VU93196

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27018

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to resource management error within the nf_ct_bridge_pre() function in net/bridge/netfilter/nf_conntrack_bridge.c, within the br_nf_local_in() function in net/bridge/br_netfilter_hooks.c, within the br_netif_receive_skb(), br_pass_frame_up(), br_handle_frame_finish() and br_handle_frame() functions in net/bridge/br_input.c. A local user can execute arbitrary code.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

300) Memory leak

EUVDB-ID: #VU94201

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39499

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the event_deliver() function in drivers/misc/vmw_vmci/vmci_event.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

301) Out-of-bounds read

EUVDB-ID: #VU90271

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36906

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the ENDPROC() function in arch/arm/kernel/sleep.S. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

302) NULL pointer dereference

EUVDB-ID: #VU91458

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35984

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the i2c_check_for_quirks() function in drivers/i2c/i2c-core-base.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

303) NULL pointer dereference

EUVDB-ID: #VU94262

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39500

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the sock_map_close() function in net/core/sock_map.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

304) Out-of-bounds read

EUVDB-ID: #VU91393

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26965

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the F() function in drivers/clk/qcom/mmcc-msm8974.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

305) Integer underflow

EUVDB-ID: #VU91672

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26921

CWE-ID: CWE-191 - Integer underflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer underflow within the nf_ct_frag6_queue() and nf_ct_frag6_gather() functions in net/ipv6/netfilter/nf_conntrack_reasm.c, within the ip_frag_queue() and ip_defrag() functions in net/ipv4/ip_fragment.c, within the FRAG_CB(), inet_frag_queue_insert(), inet_frag_reasm_prepare(), EXPORT_SYMBOL() and inet_frag_reasm_finish() functions in net/ipv4/inet_fragment.c. A local user can execute arbitrary code.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

306) Improper locking

EUVDB-ID: #VU91521

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27013

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the tun_put_user() function in drivers/net/tun.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

307) Resource management error

EUVDB-ID: #VU94310

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39509

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the implement() function in drivers/hid/hid-core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

308) Out-of-bounds read

EUVDB-ID: #VU91095

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27008

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the apply_dcb_encoder_quirks() and fabricate_dcb_encoder_table() functions in drivers/gpu/drm/nouveau/nouveau_bios.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

309) Out-of-bounds read

EUVDB-ID: #VU90273

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36916

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the iocg_kick_delay() function in block/blk-iocost.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

310) Memory leak

EUVDB-ID: #VU94207

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40942

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the mesh_path_discard_frame() function in net/mac80211/mesh_pathtbl.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

311) Memory leak

EUVDB-ID: #VU89973

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35978

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the hci_req_sync_complete() function in net/bluetooth/hci_request.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

312) Out-of-bounds read

EUVDB-ID: #VU91397

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26969

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the F() function in drivers/clk/qcom/gcc-ipq8074.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

313) NULL pointer dereference

EUVDB-ID: #VU90561

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26964

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the xhci_map_temp_buffer() function in drivers/usb/host/xhci.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

314) Memory leak

EUVDB-ID: #VU89979

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35879

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the pr_fmt() and of_changeset_destroy() functions in drivers/of/dynamic.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

315) Out-of-bounds write

EUVDB-ID: #VU89898

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36016

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the gsm0_receive() function in drivers/tty/n_gsm.c. A local user can trigger an out-of-bounds write and execute arbitrary code with elevated privileges.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

316) Improper locking

EUVDB-ID: #VU91536

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26629

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the check_for_locks() and nfsd4_release_lockowner() functions in fs/nfsd/nfs4state.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

317) Memory leak

EUVDB-ID: #VU95502

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42236

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the usb_string_copy() function in drivers/usb/gadget/configfs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

318) Improper locking

EUVDB-ID: #VU94278

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40943

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the __ocfs2_change_file_space() function in fs/ocfs2/file.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

319) NULL pointer dereference

EUVDB-ID: #VU91222

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36902

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the __fib6_rule_action() function in net/ipv6/fib6_rules.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

320) Resource management error

EUVDB-ID: #VU95518

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42247

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the swap_endian() function in drivers/net/wireguard/allowedips.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

321) Resource management error

EUVDB-ID: #VU93838

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36006

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the mlxsw_sp_acl_tcam_vchunk_migrate_one() and mlxsw_sp_acl_tcam_vchunk_migrate_all() functions in drivers/net/ethernet/mellanox/mlxsw/spectrum_acl_tcam.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

322) NULL pointer dereference

EUVDB-ID: #VU89897

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36014

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error within the malidp_mw_connector_reset() function in drivers/gpu/drm/arm/malidp_mw.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

323) Improper error handling

EUVDB-ID: #VU93652

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26955

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the nilfs_get_block() function in fs/nilfs2/inode.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

324) Out-of-bounds read

EUVDB-ID: #VU93023

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39277

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the do_map_benchmark() function in kernel/dma/map_benchmark.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

325) NULL pointer dereference

EUVDB-ID: #VU94258

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39506

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the lio_vf_rep_copy_packet() function in drivers/net/ethernet/cavium/liquidio/lio_vf_rep.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

326) Improper error handling

EUVDB-ID: #VU90942

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35936

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the mutex_unlock() function in fs/btrfs/volumes.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

327) NULL pointer dereference

EUVDB-ID: #VU91460

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26950

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the get_peer() function in drivers/net/wireguard/netlink.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

328) Buffer overflow

EUVDB-ID: #VU93240

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35938

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the ARRAY_SIZE() function in drivers/net/wireless/ath/ath11k/mhi.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

329) Input validation error

EUVDB-ID: #VU95109

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41035

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the usb_parse_endpoint() function in drivers/usb/core/config.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

330) Improper locking

EUVDB-ID: #VU94985

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42140

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the machine_kexec_mask_interrupts() function in arch/riscv/kernel/machine_kexec.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

331) Use-after-free

EUVDB-ID: #VU91597

Risk: Critical

CVSSv4.0: 8.5 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Red]

CVE-ID: CVE-2024-36971

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the system.

The vulnerability exists due to a use-after-free error within the xfrm_link_failure() function in net/xfrm/xfrm_policy.c, within the dst_entry ip6_dst_check() and ip6_dst_check() functions in net/ipv6/route.c, within the dst_entry ipv4_dst_check() and ip_do_redirect() functions in net/ipv4/route.c. A remote attacker can send specially crafted packets to the system and execute arbitrary code.

Note, the vulnerability is being actively exploited in the wild.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.

332) Improper locking

EUVDB-ID: #VU92021

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35910

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the tcp_close() function in net/ipv4/tcp.c, within the inet_csk_clear_xmit_timers() function in net/ipv4/inet_connection_sock.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

333) Improper locking

EUVDB-ID: #VU93125

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-34027

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the f2fs_release_compress_blocks() and f2fs_reserve_compress_blocks() functions in fs/f2fs/file.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

334) NULL pointer dereference

EUVDB-ID: #VU90507

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35933

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the btintel_read_version() function in drivers/bluetooth/btintel.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

335) Infinite loop

EUVDB-ID: #VU91413

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35886

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop within the inet6_dump_fib() function in net/ipv6/ip6_fib.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

336) Improper locking

EUVDB-ID: #VU94277

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39501

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the uevent_show() function in drivers/base/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

337) Use-after-free

EUVDB-ID: #VU94934

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42109

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the nft_rcv_nl_event() function in net/netfilter/nf_tables_api.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

338) Input validation error

EUVDB-ID: #VU95090

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42157

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the pkey_unlocked_ioctl() function in drivers/s390/crypto/pkey_api.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

339) Out-of-bounds read

EUVDB-ID: #VU90307

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35905

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the check_stack_access_within_bounds() function in kernel/bpf/verifier.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

340) Resource management error

EUVDB-ID: #VU94345

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41007

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the tcp_rtx_probe0_timed_out() function in net/ipv4/tcp_timer.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

341) Improper locking

EUVDB-ID: #VU94282

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40912

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the ieee80211_sta_ps_deliver_wakeup() function in net/mac80211/sta_info.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

342) NULL pointer dereference

EUVDB-ID: #VU90557

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26984

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the nv50_instobj_acquire() function in drivers/gpu/drm/nouveau/nvkm/subdev/instmem/nv50.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

343) Use of uninitialized resource

EUVDB-ID: #VU90874

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35915

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the nci_rx_work() function in net/nfc/nci/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

344) Improper locking

EUVDB-ID: #VU92020

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35934

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the smc_pnet_create_pnetids_list() function in net/smc/smc_pnet.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

345) NULL pointer dereference

EUVDB-ID: #VU93032

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38633

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the max3100_probe() and max3100_remove() functions in drivers/tty/serial/max3100.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

346) Out-of-bounds read

EUVDB-ID: #VU90317

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26952

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to an out-of-bounds read error within the smb2_tree_connect(), smb2_open(), smb2_query_dir(), smb2_get_ea(), smb2_set_info_file(), smb2_set_info(), fsctl_pipe_transceive() and smb2_ioctl() functions in fs/smb/server/smb2pdu.c, within the smb2_get_data_area_len() function in fs/smb/server/smb2misc.c. A local user can execute arbitrary code.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

347) Incorrect calculation

EUVDB-ID: #VU93615

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27017

CWE-ID: CWE-682 - Incorrect Calculation

Exploit availability: No

Description

The vulnerability allows a local user to manipulate data.

The vulnerability exists due to incorrect calculation within the nft_pipapo_walk() function in net/netfilter/nft_set_pipapo.c, within the nft_map_deactivate(), nf_tables_bind_set(), nft_map_activate(), nf_tables_dump_set(), nft_set_flush() and nf_tables_check_loops() functions in net/netfilter/nf_tables_api.c. A local user can manipulate data.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

348) Double free

EUVDB-ID: #VU93040

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38627

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a double free error within the stm_register_device() function in drivers/hwtracing/stm/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

349) Type Confusion

EUVDB-ID: #VU94923

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42070

CWE-ID: CWE-843 - Type confusion

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to a type confusion error within the nft_lookup_init() function in net/netfilter/nft_lookup.c, within the nf_tables_fill_setelem() and nft_validate_register_store() functions in net/netfilter/nf_tables_api.c. A local user can pass specially crafted data to the packet filtering to trigger a type confusion error and gain access to sensitive information.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

350) Double free

EUVDB-ID: #VU95010

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41046

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a double free error within the ltq_etop_free_channel() function in drivers/net/ethernet/lantiq_etop.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

351) Improper locking

EUVDB-ID: #VU92025

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35821

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the write_begin_slow(), ubifs_write_begin() and ubifs_write_end() functions in fs/ubifs/file.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

352) Resource management error

EUVDB-ID: #VU93271

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35815

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the aio_setup_ring() and kiocb_set_cancel_fn() functions in fs/aio.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

353) Out-of-bounds read

EUVDB-ID: #VU92332

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36978

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the multiq_tune() function in net/sched/sch_multiq.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

354) Memory leak

EUVDB-ID: #VU91561

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36967

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the tpm2_key_encode() function in security/keys/trusted-keys/trusted_tpm2.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

355) Use-after-free

EUVDB-ID: #VU90068

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52752

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the seq_printf() and spin_unlock() functions in fs/smb/client/cifs_debug.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

356) Use-after-free

EUVDB-ID: #VU92311

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38583

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the nilfs_segctor_start_timer(), nilfs_construct_dsync_segment(), nilfs_segctor_notify(), nilfs_segctor_thread(), nilfs_segctor_new() and nilfs_segctor_destroy() functions in fs/nilfs2/segment.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

357) Out-of-bounds read

EUVDB-ID: #VU92322

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38578

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the write_tag_66_packet() function in fs/ecryptfs/keystore.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

358) Use of Out-of-range Pointer Offset

EUVDB-ID: #VU91119

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26926

CWE-ID: CWE-823 - Use of Out-of-range Pointer Offset

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the binder_get_object() function in drivers/android/binder.c. A local user can influence the pointer offset and potentially execute arbitrary code.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

359) Improper locking

EUVDB-ID: #VU90751

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52699

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the block_end(), get_branch(), get_block() and find_shared() functions in fs/sysv/itree.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

360) Race condition

EUVDB-ID: #VU91463

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36952

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition within the lpfc_vport_delete() function in drivers/scsi/lpfc/lpfc_vport.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

361) Improper locking

EUVDB-ID: #VU92360

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38600

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the snd_card_disconnect() function in sound/core/init.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

362) Integer overflow

EUVDB-ID: #VU95034

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42102

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the wb_dirty_limits() function in mm/page-writeback.c. A local user can execute arbitrary code.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

363) Out-of-bounds read

EUVDB-ID: #VU92328

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38559

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the qedf_dbg_debug_cmd_write() function in drivers/scsi/qedf/qedf_debugfs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

364) NULL pointer dereference

EUVDB-ID: #VU93046

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38637

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the __gb_lights_flash_brightness_set() and gb_lights_light_v4l2_register() functions in drivers/staging/greybus/light.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

365) Buffer overflow

EUVDB-ID: #VU95055

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42082

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the __xdp_reg_mem_model() function in net/core/xdp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

366) Input validation error

EUVDB-ID: #VU94144

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52488

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the sc16is7xx_fifo_read(), sc16is7xx_fifo_write() and sc16is7xx_regmap_precious() functions in drivers/tty/serial/sc16is7xx.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

367) Input validation error

EUVDB-ID: #VU90849

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36032

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the qca_read_fw_build_info() function in drivers/bluetooth/btqca.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

368) Use-after-free

EUVDB-ID: #VU92212

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35950

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the drm_client_modeset_probe() function in drivers/gpu/drm/drm_client_modeset.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

369) Memory leak

EUVDB-ID: #VU89976

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35930

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the lpfc_rcv_padisc() function in drivers/scsi/lpfc/lpfc_nportdisc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

370) Improper locking

EUVDB-ID: #VU93034

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38780

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the sync_print_obj() function in drivers/dma-buf/sync_debug.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

371) Improper locking

EUVDB-ID: #VU94267

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40995

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the tcf_idr_check_alloc() and rcu_read_unlock() functions in net/sched/act_api.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

372) Resource management error

EUVDB-ID: #VU93281

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36004

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the i40e_init_module() function in drivers/net/ethernet/intel/i40e/i40e_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

373) Buffer overflow

EUVDB-ID: #VU93155

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26956

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the nilfs_direct_lookup_contig() function in fs/nilfs2/direct.c, within the nilfs_btree_lookup_contig() function in fs/nilfs2/btree.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

374) Out-of-bounds read

EUVDB-ID: #VU90309

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35896

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the do_replace() and compat_do_replace() functions in net/ipv6/netfilter/ip6_tables.c, within the do_replace() and compat_do_replace() functions in net/ipv4/netfilter/ip_tables.c, within the do_replace() and compat_do_replace() functions in net/ipv4/netfilter/arp_tables.c, within the do_replace(), update_counters() and compat_update_counters() functions in net/bridge/netfilter/ebtables.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

375) Buffer overflow

EUVDB-ID: #VU93243

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26994

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the get_word() function in drivers/accessibility/speakup/main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

376) Integer overflow

EUVDB-ID: #VU93059

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38624

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the log_read_rst() function in fs/ntfs3/fslog.c. A local user can execute arbitrary code.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

377) Buffer overflow

EUVDB-ID: #VU93827

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39480

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the kdb_printf() function in kernel/debug/kdb/kdb_io.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

378) Input validation error

EUVDB-ID: #VU93673

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52882

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the sun50i_h6_ccu_probe() function in drivers/clk/sunxi-ng/ccu-sun50i-h6.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

379) Memory leak

EUVDB-ID: #VU91640

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35912

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the iwl_rfi_get_freq_table() function in drivers/net/wireless/intel/iwlwifi/mvm/rfi.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

380) Unchecked Return Value

EUVDB-ID: #VU89896

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36015

CWE-ID: CWE-252 - Unchecked Return Value

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an unchecked return value within the register_device() function in drivers/char/ppdev.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

381) Race condition within a thread

EUVDB-ID: #VU91431

Risk: Low

CVSSv4.0: 1.9 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27019

CWE-ID: CWE-366 - Race Condition within a Thread

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to a data race within the __nft_obj_type_get() and nft_obj_type_get() functions in net/netfilter/nf_tables_api.c. A local user can gain access to sensitive information.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

382) Resource management error

EUVDB-ID: #VU94304

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40983

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the tipc_rcv() function in net/tipc/node.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

383) Use-after-free

EUVDB-ID: #VU90067

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52760

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the spin_unlock() function in fs/gfs2/super.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

384) Use-after-free

EUVDB-ID: #VU94230

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39503

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the list_set_kadd(), list_set_kdel(), list_set_utest(), list_set_uadd(), list_set_udel() and list_set_destroy() functions in net/netfilter/ipset/ip_set_list_set.c, within the call_rcu(), ip_set_destroy() and ip_set_net_init() functions in net/netfilter/ipset/ip_set_core.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

385) Off-by-one

EUVDB-ID: #VU91171

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36957

CWE-ID: CWE-193 - Off-by-one Error

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an off-by-one error within the rvu_dbg_qsize_write() function in drivers/net/ethernet/marvell/octeontx2/af/rvu_debugfs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

386) Out-of-bounds read

EUVDB-ID: #VU90320

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26980

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the __handle_ksmbd_work() function in fs/smb/server/server.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

387) Input validation error

EUVDB-ID: #VU94316

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40908

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the __bpf_prog_test_run_raw_tp() function in net/bpf/test_run.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

388) Use-after-free

EUVDB-ID: #VU94215

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40958

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the EXPORT_SYMBOL_GPL() function in net/core/net_namespace.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

389) NULL pointer dereference

EUVDB-ID: #VU91234

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35902

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the __rds_rdma_map() function in net/rds/rdma.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

390) Resource management error

EUVDB-ID: #VU95066

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42087

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the ili9881c_prepare() and ili9881c_unprepare() functions in drivers/gpu/drm/panel/panel-ilitek-ili9881c.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

391) Use of uninitialized resource

EUVDB-ID: #VU90862

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36933

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the EXPORT_SYMBOL_GPL() and nsh_gso_segment() functions in net/nsh/nsh.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

392) Out-of-bounds read

EUVDB-ID: #VU93027

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38635

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the sdw_cdns_alloc_pdi() function in drivers/soundwire/cadence_master.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

393) Buffer overflow

EUVDB-ID: #VU93305

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26988

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the setup_command_line() function in init/main.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

394) NULL pointer dereference

EUVDB-ID: #VU90528

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36941

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the nl80211_set_coalesce() function in net/wireless/nl80211.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

395) Out-of-bounds read

EUVDB-ID: #VU91398

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26970

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the F() function in drivers/clk/qcom/gcc-ipq6018.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

396) Resource management error

EUVDB-ID: #VU93190

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36005

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the nft_netdev_event() function in net/netfilter/nft_chain_filter.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

397) Resource management error

EUVDB-ID: #VU92981

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36029

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the sdhci_msm_runtime_suspend() and sdhci_msm_runtime_resume() functions in drivers/mmc/host/sdhci-msm.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

398) NULL pointer dereference

EUVDB-ID: #VU92068

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36008

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ip_route_use_hint() function in net/ipv4/route.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

399) Input validation error

EUVDB-ID: #VU95510

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42244

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the mos7840_port_remove() function in drivers/usb/serial/mos7840.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

400) Improper locking

EUVDB-ID: #VU94274

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40967

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the imx_uart_console_write() function in drivers/tty/serial/imx.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

401) NULL pointer dereference

EUVDB-ID: #VU91241

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52585

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the amdgpu_ras_query_error_status_helper() function in drivers/gpu/drm/amd/amdgpu/amdgpu_ras.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

402) Use-after-free

EUVDB-ID: #VU90187

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26951

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the wg_get_device_dump() function in drivers/net/wireguard/netlink.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

403) Division by zero

EUVDB-ID: #VU93828

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39475

CWE-ID: CWE-369 - Divide By Zero

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a division by zero error within the savagefb_probe() function in drivers/video/fbdev/savage/savagefb_driver.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

404) Division by zero

EUVDB-ID: #VU91372

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35922

CWE-ID: CWE-369 - Divide By Zero

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a division by zero error within the fb_get_mode() and fb_videomode_from_videomode() functions in drivers/video/fbdev/core/fbmon.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

405) NULL pointer dereference

EUVDB-ID: #VU91224

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36901

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ip6_output() function in net/ipv6/ip6_output.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

406) Out-of-bounds read

EUVDB-ID: #VU94233

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40901

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the mpt3sas_base_attach() and _base_check_ioc_facts_changes() functions in drivers/scsi/mpt3sas/mpt3sas_base.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

407) Input validation error

EUVDB-ID: #VU94121

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36031

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the __key_instantiate_and_link() function in security/keys/key.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

408) Integer overflow

EUVDB-ID: #VU94295

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41000

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the blkpg_do_ioctl() function in block/ioctl.c. A local user can execute arbitrary code.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

409) Out-of-bounds read

EUVDB-ID: #VU94234

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40929

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the iwl_mvm_scan_umac_dwell() and iwl_mvm_scan_umac_dwell_v10() functions in drivers/net/wireless/intel/iwlwifi/mvm/scan.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

410) Integer overflow

EUVDB-ID: #VU94294

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40994

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the max_vclocks_store() function in drivers/ptp/ptp_sysfs.c. A local user can execute arbitrary code.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

411) Improper neutralization of directives in statically saved code (\'static code injection\')

EUVDB-ID: #VU95052

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42084

CWE-ID: CWE-96 - Improper Neutralization of Directives in Statically Saved Code (\'Static Code Injection\')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

In the Linux kernel, the following vulnerability has been resolved: ftruncate: pass a signed offset The old ftruncate() syscall, using the 32-bit off_t misses a sign extension when called in compat mode on 64-bit architectures. As a result, passing a negative length accidentally succeeds in truncating to file size between 2GiB and 4GiB. Changing the type of the compat syscall to the signed compat_off_t changes the behavior so it instead returns -EINVAL. The native entry point, the truncate() syscall and the corresponding loff_t based variants are all correct already and do not suffer from this mistake.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

412) NULL pointer dereference

EUVDB-ID: #VU92350

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38547

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the load_video_binaries() function in drivers/staging/media/atomisp/pci/sh_css.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

413) Reachable assertion

EUVDB-ID: #VU90909

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26937

CWE-ID: CWE-617 - Reachable Assertion

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to reachable assertion within the gen11_emit_fini_breadcrumb_rcs() function in drivers/gpu/drm/i915/gt/intel_lrc.c, within the __engine_park() function in drivers/gpu/drm/i915/gt/intel_engine_pm.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

414) NULL pointer dereference

EUVDB-ID: #VU94239

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40984

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the acpi_ex_system_memory_space_handler() function in drivers/acpi/acpica/exregion.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

415) Improper locking

EUVDB-ID: #VU91450

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27000

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the mxs_auart_set_ldisc() and mxs_auart_irq_handle() functions in drivers/tty/serial/mxs-auart.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

416) Improper error handling

EUVDB-ID: #VU90949

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35785

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the optee_register_device() function in drivers/tee/optee/device.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

417) Information disclosure

EUVDB-ID: #VU91345

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35849

CWE-ID: CWE-200 - Exposure of sensitive information to an unauthorized actor

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to information disclosure within the init_data_container() function in fs/btrfs/backref.c. A local user can gain access to sensitive information.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

418) Improper error handling

EUVDB-ID: #VU95015

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42119

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the find_first_free_audio() function in drivers/gpu/drm/amd/display/dc/core/dc_resource.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

419) Improper error handling

EUVDB-ID: #VU93468

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35947

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an error within the ddebug_tokenize() function in lib/dynamic_debug.c. A local user can crash the OS kernel.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

420) NULL pointer dereference

EUVDB-ID: #VU94259

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39505

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the komeda_component_get_avail_scaler() function in drivers/gpu/drm/arm/display/komeda/komeda_pipeline_state.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

421) Input validation error

EUVDB-ID: #VU95000

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42092

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the davinci_gpio_probe() function in drivers/gpio/gpio-davinci.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

422) Buffer overflow

EUVDB-ID: #VU88543

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26811

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error when installing malicious ksmbd-tools. A local user can force the ksmbd.mountd to return invalid ipc response to ksmbd kernel server,  trigger memory corruption and execute arbitrary code on the target system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

423) Improper error handling

EUVDB-ID: #VU90944

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35935

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the iterate_inode_ref() function in fs/btrfs/send.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

424) Buffer overflow

EUVDB-ID: #VU93469

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36946

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the rtm_phonet_notify() function in net/phonet/pn_netlink.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

425) Input validation error

EUVDB-ID: #VU94325

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40990

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the mlx5_ib_create_srq() function in drivers/infiniband/hw/mlx5/srq.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

426) Out-of-bounds read

EUVDB-ID: #VU90318

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26981

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the nilfs_type_by_mode[() function in fs/nilfs2/dir.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

427) Race condition within a thread

EUVDB-ID: #VU92380

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38596

CWE-ID: CWE-366 - Race Condition within a Thread

Exploit availability: No

Description

The vulnerability allows a local user to manipulate data.

The vulnerability exists due to a data race within the unix_stream_sendmsg() function in net/unix/af_unix.c. A local user can manipulate data.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

428) Race condition

EUVDB-ID: #VU94297

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40976

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition within the lima_sched_timedout_job() function in drivers/gpu/drm/lima/lima_sched.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

429) Input validation error

EUVDB-ID: #VU90850

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36880

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the qca_send_pre_shutdown_cmd(), qca_tlv_check_data() and qca_download_firmware() functions in drivers/bluetooth/btqca.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux-xilinx-zynqmp to the latest version.

Vulnerable software versions

Ubuntu: 22.04

linux-image-xilinx-zynqmp (Ubuntu package): before 5.15.0.1035.39

linux-image-5.15.0-1035-xilinx-zynqmp (Ubuntu package): before 5.15.0-1035.39

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7019-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###