Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 407 |
CVE-ID | CVE-2020-12351 CVE-2020-12352 CVE-2020-24490 CVE-2023-6610 CVE-2024-25744 CVE-2024-41091 CVE-2024-46800 CVE-2024-49924 CVE-2024-47659 CVE-2024-42295 CVE-2024-42284 CVE-2024-38577 CVE-2024-49902 CVE-2024-45011 CVE-2024-47673 CVE-2024-38538 CVE-2024-45008 CVE-2024-47667 CVE-2024-46832 CVE-2024-43879 CVE-2024-41059 CVE-2024-43853 CVE-2024-44940 CVE-2024-44947 CVE-2024-43828 CVE-2024-41090 CVE-2024-44944 CVE-2024-43834 CVE-2024-46777 CVE-2024-46689 CVE-2024-35965 CVE-2024-42276 CVE-2024-50264 CVE-2024-44965 CVE-2024-49977 CVE-2024-42079 CVE-2024-46744 CVE-2024-42299 CVE-2024-43909 CVE-2024-41098 CVE-2024-46731 CVE-2024-44946 CVE-2024-50024 CVE-2024-49858 CVE-2024-49892 CVE-2024-44989 CVE-2024-47663 CVE-2024-49983 CVE-2024-42286 CVE-2024-42310 CVE-2024-44974 CVE-2024-43892 CVE-2024-46840 CVE-2024-47695 CVE-2024-46780 CVE-2024-46757 CVE-2024-46707 CVE-2024-49894 CVE-2024-50007 CVE-2024-47705 CVE-2024-49890 CVE-2024-46815 CVE-2024-36968 CVE-2024-40915 CVE-2024-44995 CVE-2024-49871 CVE-2024-42265 CVE-2024-42283 CVE-2024-50000 CVE-2024-42309 CVE-2024-47748 CVE-2024-35967 CVE-2023-52904 CVE-2024-46745 CVE-2024-41016 CVE-2024-49868 CVE-2024-41011 CVE-2024-50186 CVE-2024-50033 CVE-2024-38545 CVE-2024-42267 CVE-2024-46852 CVE-2024-44987 CVE-2024-46783 CVE-2024-47671 CVE-2024-46721 CVE-2024-46853 CVE-2024-43914 CVE-2024-43907 CVE-2024-47734 CVE-2024-36484 CVE-2024-46781 CVE-2024-47693 CVE-2024-46791 CVE-2024-49913 CVE-2024-49900 CVE-2024-50191 CVE-2024-43860 CVE-2024-45018 CVE-2024-46854 CVE-2024-42246 CVE-2024-42156 CVE-2024-47660 CVE-2024-49878 CVE-2024-44982 CVE-2024-43867 CVE-2024-49938 CVE-2024-47737 CVE-2024-46743 CVE-2024-42292 CVE-2024-50181 CVE-2024-41020 CVE-2024-43863 CVE-2024-46817 CVE-2024-42281 CVE-2023-52621 CVE-2024-47749 CVE-2024-46804 CVE-2024-47747 CVE-2024-50045 CVE-2024-41065 CVE-2023-52434 CVE-2024-50095 CVE-2024-45025 CVE-2024-50179 CVE-2024-49946 CVE-2024-46782 CVE-2024-43839 CVE-2024-43904 CVE-2024-44958 CVE-2024-44934 CVE-2024-45006 CVE-2024-49969 CVE-2024-44986 CVE-2024-46752 CVE-2024-35966 CVE-2024-39463 CVE-2024-49883 CVE-2024-46805 CVE-2024-44935 CVE-2023-52532 CVE-2024-41071 CVE-2024-46807 CVE-2024-43846 CVE-2024-50015 CVE-2024-26661 CVE-2024-43841 CVE-2024-46819 CVE-2024-44931 CVE-2024-53057 CVE-2024-49982 CVE-2023-52757 CVE-2024-47735 CVE-2024-49866 CVE-2024-46763 CVE-2024-45021 CVE-2024-46814 CVE-2024-46673 CVE-2024-43873 CVE-2024-49997 CVE-2024-38602 CVE-2024-46795 CVE-2024-26822 CVE-2024-47670 CVE-2024-46755 CVE-2024-43902 CVE-2024-46859 CVE-2024-43883 CVE-2024-49966 CVE-2024-42305 CVE-2024-49959 CVE-2024-42280 CVE-2024-49965 CVE-2024-47674 CVE-2024-46723 CVE-2024-50031 CVE-2024-50184 CVE-2024-36893 CVE-2024-43875 CVE-2023-52918 CVE-2024-49867 CVE-2024-49981 CVE-2024-43861 CVE-2024-49895 CVE-2024-26669 CVE-2024-38544 CVE-2024-49973 CVE-2024-41015 CVE-2024-42296 CVE-2024-46722 CVE-2024-42158 CVE-2024-49881 CVE-2024-27072 CVE-2024-47739 CVE-2024-46828 CVE-2024-46724 CVE-2024-44999 CVE-2024-44971 CVE-2024-40973 CVE-2023-52572 CVE-2024-47709 CVE-2024-47742 CVE-2024-46818 CVE-2024-50035 CVE-2024-50188 CVE-2024-47679 CVE-2024-38667 CVE-2024-41078 CVE-2024-46844 CVE-2024-47672 CVE-2024-42306 CVE-2024-46758 CVE-2024-43869 CVE-2024-50062 CVE-2024-49875 CVE-2024-41017 CVE-2024-41077 CVE-2024-50038 CVE-2024-50013 CVE-2024-46746 CVE-2024-49962 CVE-2024-50049 CVE-2023-52751 CVE-2024-47684 CVE-2024-47701 CVE-2024-41070 CVE-2024-44942 CVE-2024-35904 CVE-2024-26607 CVE-2024-50019 CVE-2024-46714 CVE-2024-46738 CVE-2024-42312 CVE-2024-44948 CVE-2024-43890 CVE-2024-43893 CVE-2024-26800 CVE-2024-35963 CVE-2024-49884 CVE-2024-49930 CVE-2024-46829 CVE-2024-50046 CVE-2024-49985 CVE-2024-41022 CVE-2024-43894 CVE-2024-43830 CVE-2024-45009 CVE-2024-35951 CVE-2024-49889 CVE-2024-42301 CVE-2024-38632 CVE-2024-42114 CVE-2024-42290 CVE-2024-43858 CVE-2024-50002 CVE-2024-41060 CVE-2024-47696 CVE-2024-43870 CVE-2024-49948 CVE-2024-46759 CVE-2024-26947 CVE-2024-46713 CVE-2024-47740 CVE-2024-44960 CVE-2024-46756 CVE-2024-46737 CVE-2024-41068 CVE-2024-46677 CVE-2024-41063 CVE-2024-41019 CVE-2023-52917 CVE-2024-38611 CVE-2024-49852 CVE-2024-49863 CVE-2024-46739 CVE-2024-43908 CVE-2024-47697 CVE-2024-46810 CVE-2024-41072 CVE-2024-42302 CVE-2024-50003 CVE-2024-45026 CVE-2024-45028 CVE-2024-42259 CVE-2022-48666 CVE-2024-49995 CVE-2024-50093 CVE-2024-46865 CVE-2024-49886 CVE-2024-43889 CVE-2024-42285 CVE-2024-50006 CVE-2024-42271 CVE-2024-42274 CVE-2024-49957 CVE-2024-42289 CVE-2024-46719 CVE-2024-46858 CVE-2024-49958 CVE-2024-50041 CVE-2024-46675 CVE-2024-41064 CVE-2024-39472 CVE-2024-42287 CVE-2024-46822 CVE-2024-49877 CVE-2024-43849 CVE-2024-50040 CVE-2024-49879 CVE-2024-46798 CVE-2024-46855 CVE-2024-49944 CVE-2024-46676 CVE-2024-26893 CVE-2024-43835 CVE-2024-47665 CVE-2024-47669 CVE-2024-43882 CVE-2024-46740 CVE-2024-49851 CVE-2024-46849 CVE-2024-42311 CVE-2024-44985 CVE-2024-47757 CVE-2024-50001 CVE-2024-46750 CVE-2024-47706 CVE-2024-50039 CVE-2024-46702 CVE-2024-46725 CVE-2024-43817 CVE-2024-49907 CVE-2024-46695 CVE-2024-38553 CVE-2024-42272 CVE-2024-49882 CVE-2024-42269 CVE-2024-44954 CVE-2024-42318 CVE-2024-42297 CVE-2024-49975 CVE-2024-44988 CVE-2024-49963 CVE-2024-47692 CVE-2024-41042 CVE-2024-41081 CVE-2024-43854 CVE-2024-46771 CVE-2024-46732 CVE-2024-47712 CVE-2024-47699 CVE-2024-49927 CVE-2024-49860 CVE-2024-45003 CVE-2024-49954 CVE-2024-42304 CVE-2024-49933 CVE-2024-42277 CVE-2024-49955 CVE-2024-47710 CVE-2024-43905 CVE-2024-49903 CVE-2024-43856 CVE-2024-50180 CVE-2024-44966 CVE-2024-46685 CVE-2024-49935 CVE-2024-44990 CVE-2023-52889 CVE-2024-49896 CVE-2024-44969 CVE-2024-50189 CVE-2024-50008 CVE-2024-47720 CVE-2024-42313 CVE-2024-44983 CVE-2024-49949 CVE-2024-46761 CVE-2024-47690 CVE-2024-50059 CVE-2024-41073 CVE-2024-47723 CVE-2024-46747 CVE-2024-49952 CVE-2024-50096 CVE-2024-42288 CVE-2024-43871 CVE-2024-42126 CVE-2024-44998 CVE-2024-47685 CVE-2024-46679 CVE-2024-43884 CVE-2024-47668 CVE-2024-49936 CVE-2024-43829 CVE-2024-47756 CVE-2024-43880 CVE-2024-45007 CVE-2024-40910 CVE-2024-50044 CVE-2023-52639 CVE-2024-47698 CVE-2024-41012 CVE-2024-49856 CVE-2024-47713 CVE-2024-47718 CVE-2024-49967 |
CWE-ID | CWE-20 CWE-284 CWE-119 CWE-125 CWE-264 CWE-416 CWE-388 CWE-399 CWE-908 CWE-667 CWE-401 CWE-843 CWE-190 CWE-835 CWE-476 CWE-369 CWE-362 CWE-191 CWE-193 CWE-617 CWE-682 CWE-665 CWE-415 CWE-404 |
Exploitation vector | Local network |
Public exploit |
Public exploit code for vulnerability #1 is available. Public exploit code for vulnerability #2 is available. Public exploit code for vulnerability #3 is available. Public exploit code for vulnerability #24 is available. Public exploit code for vulnerability #42 is available. |
Vulnerable software |
Ubuntu Operating systems & Components / Operating system linux-image-azure-cvm (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-azure (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-5.15.0-1078-azure (Ubuntu package) Operating systems & Components / Operating system package or component |
Vendor | Canonical Ltd. |
Security Bulletin
This security bulletin contains information about 407 vulnerabilities.
EUVDB-ID: #VU47545
Risk: Medium
CVSSv4.0: 7.4 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Green]
CVE-ID: CVE-2020-12351
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to insufficient validation of user-supplied input within the BlueZ implementation in Linux kernel. A remote attacker on the local network can pass specially crafted input to the application and execute arbitrary code on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU47546
Risk: Medium
CVSSv4.0: 5.7 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/U:Green]
CVE-ID: CVE-2020-12352
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to improper access restrictions in BlueZ implementation in Linux kernel. A remote attacker on the local network can pass specially crafted input to the application and gain access to sensitive information.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU47549
Risk: Medium
CVSSv4.0: 5.7 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/U:Green]
CVE-ID: CVE-2020-24490
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error within BlueZ implementation in Linux kernel. A remote attacker on the local network can pass specially crated data to the system and perform a denial of service (DoS) attack.
Update the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU85443
Risk: Low
CVSSv4.0: 4.5 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-6610
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to a boundary condition within the smb2_dump_detail() function in fs/smb/client/smb2ops.c. A local user can trigger an out-of-bounds read error and gain access to sensitive information or crash the kernel.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU87191
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-25744
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to missing access restrictions related to arch/x86/coco/tdx/tdx.c and arch/x86/mm/mem_encrypt_amd.c. An untrusted VMM can trigger int80 syscall handling at any given point and perform a denial of service (DoS) attack.
Update the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94841
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41091
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the tun_xdp_one() function in drivers/net/tun.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97501
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46800
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the qdisc_enqueue() function in net/sched/sch_netem.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98870
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49924
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the pxafb_remove() function in drivers/video/fbdev/pxafb.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98382
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47659
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the rcu_read_unlock() function in security/smack/smack_lsm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96166
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42295
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the nilfs_btree_get_new_block() function in fs/nilfs2/btree.c, within the nilfs_btnode_create_block() function in fs/nilfs2/btnode.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96176
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42284
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the tipc_udp_addr2str() function in net/tipc/udp_media.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92378
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-38577
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the kernel/rcu/tasks.h. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98910
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49902
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the dbAdjTree() and dbFindLeaf() functions in fs/jfs/jfs_dmap.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97195
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-45011
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the xillyusb_setup_base_eps() and setup_channels() functions in drivers/char/xillybus/xillyusb.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98375
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47673
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the iwl_mvm_stop_device() function in drivers/net/wireless/intel/iwlwifi/mvm/ops.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92373
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-38538
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the EXPORT_SYMBOL_GPL() and br_dev_xmit() functions in net/bridge/br_device.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96883
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-45008
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the input_mt_init_slots() function in drivers/input/input-mt.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98380
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47667
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the RTL GENMASK(), to_keystone_pcie(), ks_pcie_start_link() and ks_pcie_quirk() functions in drivers/pci/controller/dwc/pci-keystone.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97805
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46832
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the r4k_clockevent_init() function in arch/mips/kernel/cevt-r4k.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96304
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43879
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the cfg80211_calculate_bitrate_he() function in net/wireless/util.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95033
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41059
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the hfsplus_listxattr() function in fs/hfsplus/xattr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96104
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43853
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the proc_cpuset_show() function in kernel/cgroup/cpuset.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96553
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44940
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the NAPI_GRO_CB() function in net/ipv4/fou_core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96711
Risk: Low
CVSSv4.0: 5.4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID: CVE-2024-44947
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the fuse_notify_store() function in fs/fuse/dev.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU96169
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43828
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the ext4_es_find_extent_range() function in fs/ext4/extents_status.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94840
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41090
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the tap_get_user_xdp() function in drivers/net/tap.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96639
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44944
CWE-ID:
CWE-843 - Type confusion
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
Update the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96103
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43834
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the xdp_unreg_mem_model() function in net/core/xdp.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97550
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46777
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the udf_fill_partdesc_info() function in fs/udf/super.c. A local user can execute arbitrary code.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97279
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46689
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the cmd_db_dev_probe() function in drivers/soc/qcom/cmd-db.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93797
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-35965
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the l2cap_sock_setsockopt_old() and l2cap_sock_setsockopt() functions in net/bluetooth/l2cap_sock.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96205
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42276
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the nvme_prep_rq() function in drivers/nvme/host/pci.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100612
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50264
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the virtio_transport_destruct() function in net/vmw_vsock/virtio_transport_common.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96878
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44965
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the pti_clone_pgtable() function in arch/x86/mm/pti.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99221
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49977
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the tc_setup_cbs() function in drivers/net/ethernet/stmicro/stmmac/stmmac_tc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94968
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42079
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the gfs2_jindex_free() function in fs/gfs2/super.c, within the lops_before_commit() function in fs/gfs2/log.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97540
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46744
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the squashfs_read_inode() function in fs/squashfs/inode.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96193
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42299
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the blksize_bits() function in fs/ntfs3/fslog.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96524
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43909
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the smu7_update_edc_leakage_table() and smu7_hwmgr_backend_init() functions in drivers/gpu/drm/amd/pm/powerplay/hwmgr/smu7_hwmgr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94970
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41098
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ata_host_release() function in drivers/ata/libata-core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97512
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46731
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the atomctrl_retrieve_ac_timing() function in drivers/gpu/drm/amd/pm/powerplay/hwmgr/ppatomctrl.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96658
Risk: Low
CVSSv4.0: 7.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID: CVE-2024-44946
CWE-ID:
CWE-416 - Use After Free
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the kcm_sendmsg(), KCM_STATS_ADD(), sk->sk_write_space() and init_kcm_sock() functions in net/kcm/kcmsock.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU99121
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50024
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the __netlink_clear_multicast_users() function in net/netlink/af_netlink.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99152
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49858
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the efi_retrieve_tpm2_eventlog() function in drivers/firmware/efi/libstub/tpm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99224
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49892
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the calculate_ttu_cursor() function in drivers/gpu/drm/amd/display/dc/dml/dcn21/display_rq_dlg_calc_21.c, within the calculate_ttu_cursor() function in drivers/gpu/drm/amd/display/dc/dml/dcn20/display_rq_dlg_calc_20v2.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96847
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44989
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the bond_ipsec_del_sa_all() function in drivers/net/bonding/bond_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98372
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47663
CWE-ID:
CWE-369 - Divide By Zero
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a division by zero error within the ad9834_write_frequency() function in drivers/staging/iio/frequency/ad9834.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98880
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49983
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ext4_ext_replay_update_ex() function in fs/ext4/extents.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96141
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42286
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the qla_nvme_register_remote() function in drivers/scsi/qla2xxx/qla_nvme.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96134
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42310
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the cdv_intel_lvds_get_modes() function in drivers/gpu/drm/gma500/cdv_intel_lvds.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96834
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44974
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the lookup_subflow_by_daddr(), select_local_address(), select_signal_address(), __lookup_addr() and mptcp_pm_create_subflow_or_signal_addr() functions in net/mptcp/pm_netlink.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96546
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43892
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition within the MEM_CGROUP_ID_MAX(), mem_cgroup_alloc() and mem_cgroup_css_online() functions in mm/memcontrol.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97808
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46840
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the reada_walk_down(), walk_down_proc(), do_walk_down() and walk_up_proc() functions in fs/btrfs/extent-tree.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98921
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47695
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the init_conns() function in drivers/infiniband/ulp/rtrs/rtrs-clt.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97564
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46780
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the nilfs_dev_revision_show(), nilfs_dev_device_size_show(), nilfs_dev_uuid_show() and nilfs_dev_volume_name_show() functions in fs/nilfs2/sysfs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97552
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46757
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer underflow within the store_temp_offset() function in drivers/hwmon/nct6775.c. A local user can execute arbitrary code.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97256
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46707
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the access_gic_sgi() function in arch/arm64/kvm/sys_regs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98912
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49894
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the cm_helper_translate_curve_to_degamma_hw_format() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_cm_common.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98902
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50007
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the HPIMSGX__init() function in sound/pci/asihpi/hpimsgx.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98987
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47705
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the blk_add_partition() function in block/partitions/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98964
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49890
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the init_overdrive_limits() function in drivers/gpu/drm/amd/pm/powerplay/hwmgr/processpptables.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97843
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46815
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the build_watermark_ranges() function in drivers/gpu/drm/amd/display/dc/clk_mgr/dcn21/rn_clk_mgr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92008
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36968
CWE-ID:
CWE-369 - Divide By Zero
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a division by zero error within the sco_sock_clear_timer() and sco_conn_add() functions in net/bluetooth/sco.c, within the l2cap_finish_move(), l2cap_rx_state_wait_f() and l2cap_conn_add() functions in net/bluetooth/l2cap_core.c, within the iso_sock_sendmsg() function in net/bluetooth/iso.c, within the hci_cc_read_buffer_size(), hci_cc_le_read_buffer_size(), hci_cs_create_conn(), hci_conn_complete_evt(), hci_conn_request_evt(), hci_cc_le_read_buffer_size_v2(), le_conn_complete_evt(), hci_le_cis_req_evt(), hci_le_big_sync_established_evt() and hci_le_big_info_adv_report_evt() functions in net/bluetooth/hci_event.c, within the hci_conn_add(), hci_conn_add_unset(), hci_connect_le(), hci_add_bis(), hci_connect_le_scan(), hci_connect_acl(), hci_connect_sco(), hci_bind_cis() and hci_iso_qos_setup() functions in net/bluetooth/hci_conn.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94222
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40915
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the set_direct_map_default_noflush() function in arch/riscv/mm/pageattr.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96855
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44995
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the hns3_reset_notify_uninit_enet() function in drivers/net/ethernet/hisilicon/hns3/hns3_enet.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98968
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49871
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the adp5589_keypad_add() and adp5589_probe() functions in drivers/input/keyboard/adp5589-keys.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96203
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42265
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the __releases() function in fs/file.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96195
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42283
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the nla_put_nh_group() function in net/ipv4/nexthop.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98943
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50000
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the mlx5e_tir_builder_alloc() function in drivers/net/ethernet/mellanox/mlx5/core/en/tir.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96135
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42309
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the psb_intel_lvds_get_modes() function in drivers/gpu/drm/gma500/psb_intel_lvds.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98889
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47748
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the vhost_vdpa_setup_vq_irq(), vhost_vdpa_vring_ioctl() and vhost_vdpa_open() functions in drivers/vhost/vdpa.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90303
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-35967
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the sco_sock_setsockopt() function in net/bluetooth/sco.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96342
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52904
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the find_substream_format() function in sound/usb/pcm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97493
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46745
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the uinput_validate_absinfo() function in drivers/input/misc/uinput.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94837
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41016
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the ocfs2_xattr_find_entry() function in fs/ocfs2/xattr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98969
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49868
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the btrfs_update_reloc_root() function in fs/btrfs/relocation.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94530
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41011
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the kfd_ioctl_alloc_memory_of_gpu(), criu_restore_memory_of_gpu() and kfd_mmio_mmap() functions in drivers/gpu/drm/amd/amdkfd/kfd_chardev.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100122
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50186
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the __sock_create() function in net/socket.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99082
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50033
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the slhc_remember() function in drivers/net/slip/slhc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92306
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-38545
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the alloc_cqc(), free_cqc() and hns_roce_cq_event() functions in drivers/infiniband/hw/hns/hns_roce_cq.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96204
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42267
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the no_context() function in arch/riscv/mm/fault.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97818
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46852
CWE-ID:
CWE-193 - Off-by-one Error
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an off-by-one error within the cma_heap_vm_fault() function in drivers/dma-buf/heaps/cma_heap.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96839
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44987
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ip6_send_skb() function in net/ipv6/ip6_output.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97546
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46783
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the sk_stream_error() function in net/ipv4/tcp_bpf.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98377
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47671
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the usbtmc_create_urb() function in drivers/usb/class/usbtmc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97532
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46721
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the __aafs_profile_mkdir() function in security/apparmor/apparmorfs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97782
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46853
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the nxp_fspi_fill_txfifo() function in drivers/spi/spi-nxp-fspi.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96542
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43914
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the reshape_request() function in drivers/md/raid5.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96526
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43907
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the vega10_apply_state_adjust_rules() function in drivers/gpu/drm/amd/pm/powerplay/hwmgr/vega10_hwmgr.c, within the smu8_apply_state_adjust_rules() function in drivers/gpu/drm/amd/pm/powerplay/hwmgr/smu8_hwmgr.c, within the smu7_apply_state_adjust_rules() function in drivers/gpu/drm/amd/pm/powerplay/hwmgr/smu7_hwmgr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99174
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47734
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the bond_xdp_get_xmit_slave() function in drivers/net/bonding/bond_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93039
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36484
CWE-ID:
CWE-617 - Reachable Assertion
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to reachable assertion within the __inet_accept() function in net/ipv4/af_inet.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97495
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46781
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the nilfs_finish_roll_forward() and nilfs_salvage_orphan_logs() functions in fs/nilfs2/recovery.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99176
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47693
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the ib_cache_setup_one() function in drivers/infiniband/core/cache.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97535
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46791
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the mcp251x_hw_wake() function in drivers/net/can/spi/mcp251x.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98934
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49913
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the commit_planes_for_stream() function in drivers/gpu/drm/amd/display/dc/core/dc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99084
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49900
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the ea_get() function in fs/jfs/xattr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100127
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50191
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the ext4_handle_error() function in fs/ext4/super.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96118
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43860
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the imx_rproc_addr_init() function in drivers/remoteproc/imx_rproc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97182
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-45018
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the nf_flow_offload_tuple() function in net/netfilter/nf_flow_table_offload.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97776
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46854
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the dpaa_start_xmit() function in drivers/net/ethernet/freescale/dpaa/dpaa_eth.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95515
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42246
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the xs_tcp_setup_socket() function in net/sunrpc/xprtsock.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95091
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42156
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the pkey_unlocked_ioctl() function in drivers/s390/crypto/pkey_api.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98370
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47660
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the __fsnotify_recalc_mask() function in fs/notify/mark.c, within the fsnotify_sb_delete(), __fsnotify_update_child_dentry_flags() and __fsnotify_parent() functions in fs/notify/fsnotify.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99169
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49878
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the EXPORT_SYMBOL_GPL() function in kernel/resource.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96828
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44982
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the dpu_plane_prepare_fb() function in drivers/gpu/drm/msm/disp/dpu1/dpu_plane.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96301
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43867
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer underflow within the nouveau_gem_prime_import_sg_table() function in drivers/gpu/drm/nouveau/nouveau_prime.c. A local user can execute arbitrary code.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99041
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49938
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the ath9k_hif_usb_rx_cb() and ath9k_hif_usb_reg_in_cb() functions in drivers/net/wireless/ath/ath9k/hif_usb.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99078
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47737
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the idmap_id_to_name() function in fs/nfsd/nfs4idmap.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97503
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46743
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the of_irq_parse_one() function in drivers/of/irq.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96114
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42292
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the zap_modalias_env() function in lib/kobject_uevent.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100155
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50181
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the imx7d_clocks_init() function in drivers/clk/imx/clk-imx7d.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94996
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41020
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the fcntl_setlk64() function in fs/locks.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96297
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43863
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the vmw_fence_obj_destroy(), vmw_fence_obj_init() and vmw_fence_goal_new_locked() functions in drivers/gpu/drm/vmwgfx/vmwgfx_fence.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97830
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46817
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the amdgpu_dm_initialize_drm_device() function in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96206
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42281
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the bpf_skb_net_grow() function in net/core/filter.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90912
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52621
CWE-ID:
CWE-617 - Reachable Assertion
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to reachable assertion within the rcu_read_lock_held(), BPF_CALL_4() and BPF_CALL_2() functions in kernel/bpf/helpers.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98971
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47749
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the act_establish() and act_open_rpl() functions in drivers/infiniband/hw/cxgb4/cm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97827
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46804
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the read() and write() functions in drivers/gpu/drm/amd/display/modules/hdcp/hdcp_ddc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98888
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47747
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ether3_remove() function in drivers/net/ethernet/seeq/ether3.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99038
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50045
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the br_nf_dev_queue_xmit() function in net/bridge/br_netfilter_hooks.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94926
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41065
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the alloc_dispatch_log_kmem_cache() function in arch/powerpc/platforms/pseries/setup.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU88283
Risk: Medium
CVSSv4.0: 6.1 [CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-52434
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within the smb2_parse_contexts() function when parsing SMB packets. A remote user can send specially crafted SMB traffic to the affected system, trigger memory corruption and execute arbitrary code.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99828
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50095
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the retry_send() and timeout_sends() functions in drivers/infiniband/core/mad.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97193
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-45025
CWE-ID:
CWE-682 - Incorrect Calculation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect calculation within the free_fdtable_rcu(), copy_fdtable() and dup_fd() functions in fs/file.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100154
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50179
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the ceph_set_page_dirty() function in fs/ceph/addr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99018
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49946
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the ppp_channel_bridge_input() function in drivers/net/ppp/ppp_generic.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97496
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46782
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ila_xlat_init_net() and ila_xlat_exit_net() functions in net/ipv6/ila/ila_xlat.c, within the ila_pre_exit_net() and ila_exit_net() functions in net/ipv6/ila/ila_main.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96197
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43839
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the bnad_tx_msix_register() and bnad_rx_msix_register() functions in drivers/net/ethernet/brocade/bna/bnad.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96529
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43904
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the dcn30_apply_idle_power_optimizations() function in drivers/gpu/drm/amd/display/dc/hwss/dcn30/dcn30_hwseq.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96880
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44958
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the sched_cpu_deactivate() function in kernel/sched/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96517
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44934
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the br_multicast_del_port() function in net/bridge/br_multicast.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96852
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-45006
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the xhci_configure_endpoint() and xhci_setup_device() functions in drivers/usb/host/xhci.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98905
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49969
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the cm3_helper_translate_curve_to_hw_format() function in drivers/gpu/drm/amd/display/dc/dcn30/dcn30_cm_common.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96838
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44986
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ip6_finish_output2() function in net/ipv6/ip6_output.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97543
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46752
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the update_ref_for_cow() function in fs/btrfs/ctree.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90306
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-35966
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the rfcomm_sock_setsockopt_old() and rfcomm_sock_setsockopt() functions in net/bluetooth/rfcomm/sock.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93322
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-39463
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the v9fs_cached_dentry_delete() function in fs/9p/vfs_dentry.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98866
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49883
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the fs/ext4/extents.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97793
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46805
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the psp_xgmi_reflect_topology_info() function in drivers/gpu/drm/amd/amdgpu/amdgpu_psp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96522
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44935
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the __sctp_hash_endpoint() and __sctp_unhash_endpoint() functions in net/sctp/input.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90959
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52532
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the mana_poll_tx_cq() function in drivers/net/ethernet/microsoft/mana/mana_en.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94956
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41071
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the ieee80211_prep_hw_scan() function in net/mac80211/scan.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97794
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46807
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the amdgpu_device_recover_vram() function in drivers/gpu/drm/amd/amdgpu/amdgpu_device.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96186
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43846
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the objagg_obj_parent_assign() function in lib/objagg.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99099
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50015
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the ext4_handle_inode_extension(), ext4_dio_write_iter() and ext4_dax_write_iter() functions in fs/ext4/file.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93260
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26661
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the dcn21_set_abm_immediate_disable() function in drivers/gpu/drm/amd/display/dc/dcn21/dcn21_hwseq.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96187
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43841
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the virt_wifi_inform_bss(), virt_wifi_connect() and virt_wifi_connect_complete() functions in drivers/net/wireless/virt_wifi.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97797
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46819
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the nbio_v7_4_handle_ras_controller_intr_no_bifring() function in drivers/gpu/drm/amd/amdgpu/nbio_v7_4.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96512
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44931
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the gpiochip_get_desc() function in drivers/gpio/gpiolib.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100707
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53057
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the qdisc_tree_reduce_backlog() function in net/sched/sch_api.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98879
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49982
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ata_rw_frameinit(), aoecmd_ata_rw(), resend(), probe() and aoecmd_ata_id() functions in drivers/block/aoe/aoecmd.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90069
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52757
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the alloc_mid() function in fs/smb/client/transport.c, within the __smb2_handle_cancelled_cmd() function in fs/smb/client/smb2misc.c, within the cifs_compose_mount_options(), __release_mid() and cifs_get_tcon_super() functions in fs/smb/client/cifsproto.h. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99025
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47735
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the hns_roce_lock_cqs() and hns_roce_unlock_cqs() functions in drivers/infiniband/hw/hns/hns_roce_qp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99146
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49866
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the osnoise_hotplug_workfn() function in kernel/trace/trace_osnoise.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97523
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46763
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the fou_from_sock(), fou_gro_receive(), fou_gro_complete() and gue_gro_receive() functions in net/ipv4/fou.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97184
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-45021
CWE-ID:
CWE-665 - Improper Initialization
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper initialization within the memcg_write_event_control() function in mm/memcontrol.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97844
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46814
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the hdmi_14_process_transaction() and dp_11_process_transaction() functions in drivers/gpu/drm/amd/display/dc/hdcp/hdcp_msg.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97251
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46673
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the aac_init_adapter() function in drivers/scsi/aacraid/comminit.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96300
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43873
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the vhost_vsock_dev_open() and vhost_vsock_set_features() functions in drivers/vhost/vsock.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99193
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49997
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the ltq_etop_tx() function in drivers/net/ethernet/lantiq_etop.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92296
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-38602
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the ax25_addr_ax25dev(), ax25_dev_device_up() and ax25_dev_device_down() functions in net/ax25/ax25_dev.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97516
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46795
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the smb2_sess_setup() function in fs/ksmbd/smb2pdu.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93872
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26822
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to improper management of internal resources within the automount_fullpath() and cifs_do_automount() functions in fs/smb/client/namespace.c. A local user can force the SMB client to reuse its parent mount uid, gid and cruid and gain unauthorized access to information.
Update the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98365
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47670
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the ocfs2_listxattr(), ocfs2_xattr_find_entry(), ocfs2_xattr_ibody_get(), ocfs2_xattr_ibody_find() and ocfs2_xattr_block_find() functions in fs/ocfs2/xattr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97525
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46755
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the drivers/net/wireless/marvell/mwifiex/main.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96530
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43902
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the dm_suspend(), create_eml_sink() and amdgpu_dm_connector_get_modes() functions in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97791
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46859
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the DEVICE_ATTR_RW(), acpi_pcc_hotkey_resume() and acpi_pcc_hotkey_add() functions in drivers/platform/x86/panasonic-laptop.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96493
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43883
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the vhci_urb_enqueue(), vhci_shutdown_connection() and vhci_device_reset() functions in drivers/usb/usbip/vhci_hcd.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99070
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49966
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the ocfs2_local_read_info() function in fs/ocfs2/quota_local.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96182
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42305
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the add_dirent_to_buf() and make_indexed_dir() functions in fs/ext4/namei.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99017
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49959
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the __releases() function in fs/jbd2/checkpoint.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96106
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42280
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the hfcmulti_dtmf() and HFC_wait_nodebug() functions in drivers/isdn/hardware/mISDN/hfcmulti.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99016
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49965
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the ocfs2_read_blocks() function in fs/ocfs2/buffer_head_io.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98598
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47674
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the remap_p4d_range() and remap_pfn_range_notrack() functions in mm/memory.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97509
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46723
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the amdgpu_cgs_get_firmware_info() function in drivers/gpu/drm/amd/amdgpu/amdgpu_cgs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99135
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50031
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the v3d_perfmon_open_file() and v3d_perfmon_idr_del() functions in drivers/gpu/drm/v3d/v3d_perfmon.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100143
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50184
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the virtio_pmem_flush() function in drivers/nvdimm/nd_virtio.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90380
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36893
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the svdm_consume_identity(), tcpm_register_partner_altmodes(), tcpm_init_vconn(), tcpm_typec_connect(), tcpm_typec_disconnect() and tcpm_pwr_opmode_to_rp() functions in drivers/usb/typec/tcpm/tcpm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96298
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43875
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the vpci_scan_bus() and epf_ntb_bind() functions in drivers/pci/endpoint/functions/pci-epf-vntb.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99254
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52918
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the cx23885_video_register() function in drivers/media/pci/cx23885/cx23885-video.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98885
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49867
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the close_ctree() function in fs/btrfs/disk-io.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98878
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49981
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the venus_remove() function in drivers/media/platform/qcom/venus/core.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96290
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43861
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the qmimux_rx_fixup() function in drivers/net/usb/qmi_wwan.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98911
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49895
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the cm3_helper_translate_curve_to_degamma_hw_format() function in drivers/gpu/drm/amd/display/dc/dcn30/dcn30_cm_common.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90010
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26669
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the fl_tmplt_destroy() function in net/sched/cls_flower.c, within the tcf_block_playback_offloads() and tc_chain_tmplt_add() functions in net/sched/cls_api.c, within the void() function in include/net/sch_generic.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93344
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-38544
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the rxe_comp_queue_pkt() function in drivers/infiniband/sw/rxe/rxe_comp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99156
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49973
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the drivers/net/ethernet/realtek/r8169_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94842
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41015
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the ocfs2_check_dir_entry(), ocfs2_search_dirblock(), __ocfs2_delete_entry(), __ocfs2_add_entry(), ocfs2_dir_foreach_blk_id(), ocfs2_dir_foreach_blk_el(), ocfs2_find_dir_space_id() and ocfs2_find_dir_space_el() functions in fs/ocfs2/dir.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96154
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42296
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the f2fs_convert_inline_inode() function in fs/f2fs/inline.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97508
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46722
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the amdgpu_atombios_init_mc_reg_table() function in drivers/gpu/drm/amd/amdgpu/amdgpu_atombios.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95064
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42158
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the pkey_unlocked_ioctl() function in drivers/s390/crypto/pkey_api.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98852
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49881
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the get_ext_path() function in fs/ext4/move_extent.c, within the ext4_find_extent() and ext4_split_extent_at() functions in fs/ext4/extents.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90765
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-27072
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the usbtv_video_free() function in drivers/media/usb/usbtv/usbtv-video.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99021
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47739
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the padata_do_serial() function in kernel/padata.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97786
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46828
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the net/sched/sch_cake.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97510
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46724
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the df_v1_7_get_hbm_channel_number() function in drivers/gpu/drm/amd/amdgpu/df_v1_7.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96870
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44999
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the gtp_dev_xmit() function in drivers/net/gtp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96832
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44971
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the bcm_sf2_mdio_register() function in drivers/net/dsa/bcm_sf2.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94241
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40973
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the mtk_vcodec_fw_scp_init() function in drivers/media/platform/mediatek/vcodec/common/mtk_vcodec_fw_scp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90239
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52572
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a use-after-free error within the cifs_wake_up_task(), __release_mid(), wait_for_response(), cifs_sync_mid_result(), cifs_compound_callback(), compound_send_recv(), SendReceive() and SendReceiveBlockingLock() functions in fs/smb/client/transport.c. A remote non-authenticated attacker can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99177
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47709
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the bcm_notify() function in net/can/bcm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99188
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47742
CWE-ID:
CWE-682 - Incorrect Calculation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect calculation within the fw_abort_batch_reqs() and _request_firmware() functions in drivers/base/firmware_loader/main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97842
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46818
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the is_pin_busy(), set_pin_busy(), set_pin_free(), dal_gpio_service_lock() and dal_gpio_service_unlock() functions in drivers/gpu/drm/amd/display/dc/gpio/gpio_service.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99083
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50035
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the ppp_async_encode() function in drivers/net/ppp/ppp_async.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100138
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50188
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the dp83869_configure_fiber() function in drivers/net/phy/dp83869.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99031
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47679
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the spin_lock() function in fs/inode.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93168
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-38667
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the cpu_update_secondary_bootdata() function in arch/riscv/kernel/cpu_ops_spinwait.c, within the sbi_cpu_start() function in arch/riscv/kernel/cpu_ops_sbi.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94929
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41078
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the btrfs_quota_disable() function in fs/btrfs/qgroup.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97833
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46844
CWE-ID:
CWE-682 - Incorrect Calculation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect calculation within the setup_one_line() function in arch/um/drivers/line.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98368
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47672
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the iwl_mvm_flush_no_vif() and iwl_mvm_mac_flush() functions in drivers/net/wireless/intel/iwlwifi/mvm/mac80211.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96184
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42306
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the udf_sb_free_bitmap() function in fs/udf/super.c, within the read_block_bitmap() and __load_block_bitmap() functions in fs/udf/balloc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97553
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46758
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer underflow within the set_tcrit2(), set_tcrit1(), set_tcrit1_hyst() and set_offset() functions in drivers/hwmon/lm95234.c. A local user can execute arbitrary code.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96285
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43869
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the event_sched_out(), exclusive_event_installable(), perf_pending_task() and perf_event_alloc() functions in kernel/events/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99039
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50062
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the rtrs_srv_info_req_done() and post_recv_path() functions in drivers/infiniband/ulp/rtrs/rtrs-srv.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99020
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49875
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the fs/nfsd/vfs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94843
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41017
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the __jfs_getxattr() and jfs_listxattr() functions in fs/jfs/xattr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94976
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41077
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the null_validate_conf() function in drivers/block/null_blk/main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99159
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50038
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the mark_mt() and mark_mt_init() functions in net/netfilter/xt_mark.c, within the sizeof() function in net/netfilter/xt_connmark.c, within the connlimit_mt_destroy() function in net/netfilter/xt_connlimit.c, within the connbytes_mt_check() function in net/netfilter/xt_connbytes.c, within the xt_cluster_mt_destroy() function in net/netfilter/xt_cluster.c, within the sizeof() function in net/netfilter/xt_addrtype.c, within the trace_tg() function in net/netfilter/xt_TRACE.c, within the offsetof() function in net/netfilter/xt_SECMARK.c, within the xt_rateest_tg_destroy() and xt_rateest_tg_init() functions in net/netfilter/xt_RATEEST.c, within the nflog_tg_destroy() function in net/netfilter/xt_NFLOG.c, within the led_tg_destroy() function in net/netfilter/xt_LED.c, within the idletimer_tg_destroy_v1() function in net/netfilter/xt_IDLETIMER.c, within the xt_ct_tg_destroy_v1() and sizeof() functions in net/netfilter/xt_CT.c, within the connsecmark_tg_destroy() function in net/netfilter/xt_CONNSECMARK.c, within the sizeof() function in net/netfilter/xt_CLASSIFY.c, within the checksum_tg_check() function in net/netfilter/xt_CHECKSUM.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98850
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50013
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the exfat_load_bitmap() function in fs/exfat/balloc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97494
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46746
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the amdtp_hid_remove() function in drivers/hid/amd-sfh-hid/amd_sfh_hid.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98949
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49962
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the acpi_db_convert_to_package() function in drivers/acpi/acpica/dbconvert.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99203
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50049
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the dc_validate_seamless_boot_timing() function in drivers/gpu/drm/amd/display/dc/core/dc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90063
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52751
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the find_or_create_cached_dir(), spin_unlock() and open_cached_dir() functions in fs/smb/client/cached_dir.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98980
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47684
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the include/net/tcp.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98898
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47701
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ext4_find_inline_entry() function in fs/ext4/inline.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94942
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41070
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the kvm_spapr_tce_attach_iommu_group() function in arch/powerpc/kvm/book3s_64_vio.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96552
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44942
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the fs/f2fs/gc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93461
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-35904
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the init_sel_fs() function in security/selinux/selinuxfs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90640
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26607
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the sii902x_init() and sii902x_probe() functions in drivers/gpu/drm/bridge/sii902x.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99160
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50019
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the kthread_unpark() function in kernel/kthread.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97548
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46714
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the wbscl_set_scaler_filter() function in drivers/gpu/drm/amd/display/dc/dcn20/dcn20_dwb_scl.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97491
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46738
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the vmci_resource_remove() function in drivers/misc/vmw_vmci/vmci_resource.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96209
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42312
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the proc_sys_make_inode() function in fs/proc/proc_sysctl.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96889
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44948
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the mtrr_save_state() function in arch/x86/kernel/cpu/mtrr/mtrr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96544
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43890
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the get_free_elt(), tracing_map_clear() and tracing_map_create() functions in kernel/trace/tracing_map.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96540
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43893
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the uart_set_info() function in drivers/tty/serial/serial_core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90210
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26800
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the struct_group(), tls_do_decryption() and tls_decrypt_sg() functions in net/tls/tls_sw.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93795
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-35963
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the hci_sock_setsockopt_old() and hci_sock_setsockopt() functions in net/bluetooth/hci_sock.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98867
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49884
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ext4_split_extent_at() and ext4_ext_dirty() functions in fs/ext4/extents.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98908
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49930
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the drivers/net/wireless/ath/ath11k/dp_rx.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97803
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46829
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the __rt_mutex_slowlock(), rt_mutex_handle_deadlock() and rt_mutex_slowlock() functions in kernel/locking/rtmutex.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98996
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50046
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the nfs42_complete_copies() function in fs/nfs/nfs4state.c, within the handle_async_copy() function in fs/nfs/nfs42proc.c, within the nfs_alloc_server() function in fs/nfs/client.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99013
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49985
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the stm32f7_i2c_runtime_suspend() and stm32f7_i2c_runtime_resume() functions in drivers/i2c/busses/i2c-stm32f7.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95022
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41022
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the sdma_v4_0_process_trap_irq() function in drivers/gpu/drm/amd/amdgpu/sdma_v4_0.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96536
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43894
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the drm_client_modeset_probe() function in drivers/gpu/drm/drm_client_modeset.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96162
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43830
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the led_trigger_set() function in drivers/leds/led-triggers.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97191
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-45009
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the mptcp_pm_nl_rm_addr_or_subflow() function in net/mptcp/pm_netlink.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93746
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-35951
CWE-ID:
CWE-404 - Improper Resource Shutdown or Release
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to failure to properly release resources within the panfrost_mmu_map_fault_addr() and sg_free_table() functions in drivers/gpu/drm/panfrost/panfrost_mmu.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98868
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49889
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ext4_split_extents(), ext4_split_extent() and ext4_ext_handle_unwritten_extents() functions in fs/ext4/extents.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96116
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42301
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the do_active_device(), do_autoprobe(), do_hardware_base_addr(), do_hardware_irq(), do_hardware_dma() and do_hardware_modes() functions in drivers/parport/procfs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93020
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-38632
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the vfio_intx_enable() function in drivers/vfio/pci/vfio_pci_intrs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94986
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42114
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the NLA_POLICY_FULL_RANGE() function in net/wireless/nl80211.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96181
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42290
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the imx_irqsteer_get_reg_index(), imx_irqsteer_irq_mask() and imx_irqsteer_probe() functions in drivers/irqchip/irq-imx-irqsteer.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96113
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43858
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the diSync() and diRead() functions in fs/jfs/jfs_imap.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98942
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50002
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the static_call_del_module() function in kernel/static_call_inline.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94978
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41060
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the radeon_gem_va_update_vm() function in drivers/gpu/drm/radeon/radeon_gem.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98899
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47696
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the iw_cm_init() function in drivers/infiniband/core/iwcm.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96286
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43870
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the event_sched_out() function in kernel/events/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99042
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49948
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the qdisc_pkt_len_init() function in net/core/dev.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97554
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46759
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer underflow within the adc128_set_in() and adc128_set_temp() functions in drivers/hwmon/adc128d818.c. A local user can execute arbitrary code.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92213
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26947
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the __sync_icache_dcache() function in arch/arm/mm/flush.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97313
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46713
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the ring_buffer_init() function in kernel/events/ring_buffer.c, within the put_ctx(), perf_mmap_close(), perf_mmap() and atomic_dec() functions in kernel/events/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99228
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47740
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the f2fs_ioc_start_atomic_write(), f2fs_ioc_commit_atomic_write(), f2fs_ioc_start_volatile_write(), f2fs_ioc_release_volatile_write() and f2fs_ioc_abort_volatile_write() functions in fs/f2fs/file.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96854
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44960
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the usb_ep_enable() function in drivers/usb/gadget/udc/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97551
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46756
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer underflow within the store_target_temp() and store_tolerance() functions in drivers/hwmon/w83627ehf.c. A local user can execute arbitrary code.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97529
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46737
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the nvmet_tcp_install_queue() function in drivers/nvme/target/tcp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95072
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41068
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the sclp_init() function in drivers/s390/char/sclp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97257
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46677
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the gtp_encap_enable_socket() function in drivers/net/gtp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94992
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41063
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the hci_unregister_dev() function in net/bluetooth/hci_core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94839
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41019
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the check_rstbl() function in fs/ntfs3/fslog.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98973
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52917
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ndev_init_debugfs() function in drivers/ntb/hw/intel/ntb_hw_gen1.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92298
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-38611
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the et8ek8_remove() and __exit_p() functions in drivers/media/i2c/et8ek8/et8ek8_driver.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98891
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49852
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the efc_nport_vport_del() function in drivers/scsi/elx/libefc/efc_nport.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98970
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49863
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the vhost_scsi_get_req() function in drivers/vhost/scsi.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97528
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46739
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the hv_uio_channel_cb() function in drivers/uio/uio_hv_generic.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96525
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43908
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the amdgpu_ras_interrupt_process_handler() function in drivers/gpu/drm/amd/amdgpu/amdgpu_ras.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98920
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47697
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the rtl2830_pid_filter() function in drivers/media/dvb-frontends/rtl2830.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97796
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46810
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the tc_irq_handler() function in drivers/gpu/drm/bridge/tc358767.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95106
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41072
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the cfg80211_wext_siwscan() function in net/wireless/scan.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96108
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42302
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the pci_bus_max_d3cold_delay() and pci_bridge_wait_for_secondary_bus() functions in drivers/pci/pci.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99218
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50003
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the dmub_hpd_callback() function in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97188
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-45026
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the dasd_eckd_analysis_ccw(), dasd_eckd_build_check_tcw(), dasd_eckd_build_cp_cmd_single(), dasd_eckd_build_cp_tpm_track() and dasd_eckd_dump_sense() functions in drivers/s390/block/dasd_eckd.c, within the dasd_3990_erp_file_prot() function in drivers/s390/block/dasd_3990_erp.c, within the dasd_ese_needs_format(), dasd_int_handler() and list_for_each_entry_safe() functions in drivers/s390/block/dasd.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97173
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-45028
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the mtf_test_write() function in drivers/mmc/core/mmc_test.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96008
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42259
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the i915_error_to_vmf_fault() and vm_fault_gtt() functions in drivers/gpu/drm/i915/gem/i915_gem_mman.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90191
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48666
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the __scsi_remove_device() function in drivers/scsi/scsi_sysfs.c, within the scsi_alloc_sdev() function in drivers/scsi/scsi_scan.c, within the scsi_mq_setup_tags() function in drivers/scsi/scsi_lib.c, within the scsi_remove_host(), scsi_add_host_with_dma() and scsi_host_dev_release() functions in drivers/scsi/hosts.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99192
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49995
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the bearer_name_validate() function in net/tipc/bearer.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99842
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50093
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the proc_thermal_pci_remove() function in drivers/thermal/intel/int340x_thermal/processor_thermal_device_pci.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97817
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46865
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the gue_gro_receive() function in net/ipv4/fou.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98903
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49886
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the _isst_if_get_pci_dev() function in drivers/platform/x86/intel/speed_select_if/isst_if_common.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96545
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43889
CWE-ID:
CWE-369 - Divide By Zero
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a division by zero error within the padata_do_multithreaded() function in kernel/padata.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96107
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42285
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the EXPORT_SYMBOL(), destroy_cm_id() and cm_work_handler() functions in drivers/infiniband/core/iwcm.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99011
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50006
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the ext4_ind_migrate() function in fs/ext4/migrate.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96105
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42271
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the iucv_sever_path() function in net/iucv/af_iucv.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96158
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42274
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the update_pcm_pointers() and amdtp_domain_stream_pcm_pointer() functions in sound/firewire/amdtp-stream.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98941
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49957
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ocfs2_journal_shutdown() function in fs/ocfs2/journal.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96139
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42289
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the qla24xx_disable_vp() function in drivers/scsi/qla2xxx/qla_mid.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97534
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46719
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the drivers/usb/typec/ucsi/ucsi.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97783
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46858
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the mptcp_pm_del_add_timer() and remove_anno_list_by_saddr() functions in net/mptcp/pm_netlink.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99044
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49958
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the ocfs2_reflink_xattr_inline() function in fs/ocfs2/xattr.c, within the __ocfs2_reflink() function in fs/ocfs2/refcounttree.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98999
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50041
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the i40e_vc_get_vf_resources_msg() function in drivers/net/ethernet/intel/i40e/i40e_virtchnl_pf.c, within the i40e_add_mac_filter() function in drivers/net/ethernet/intel/i40e/i40e_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97287
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46675
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the dwc3_event_buffers_setup() function in drivers/usb/dwc3/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94991
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41064
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the eeh_pe_bus_get() function in arch/powerpc/kernel/eeh_pe.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93820
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-39472
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the xlog_do_recovery_pass() function in fs/xfs/xfs_log_recover.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96140
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42287
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the __qla2x00_abort_all_cmds() function in drivers/scsi/qla2xxx/qla_os.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97798
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46822
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the arch/arm64/include/asm/acpi.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98966
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49877
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the fs/ocfs2/buffer_head_io.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96200
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43849
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the pdr_locator_new_server(), pdr_locator_del_server() and pdr_get_domain_list() functions in drivers/soc/qcom/pdr_interface.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99062
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50040
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the igb_io_resume() function in drivers/net/ethernet/intel/igb/igb_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98965
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49879
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the omapdrm_init() and omap_gem_deinit() functions in drivers/gpu/drm/omapdrm/omap_drv.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97500
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46798
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the snd_soc_dai_link_event() function in sound/soc/soc-dapm.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97777
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46855
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the nft_socket_eval() function in net/netfilter/nft_socket.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98953
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49944
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the sctp_listen_start() function in net/sctp/socket.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97276
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46676
CWE-ID:
CWE-369 - Divide By Zero
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a division by zero error within the pn533_start_poll() function in drivers/nfc/pn533/pn533.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90577
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26893
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the smc_chan_free() function in drivers/firmware/arm_scmi/smc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96148
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43835
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the virtnet_receive(), virtnet_poll_cleantx(), virtnet_poll() and virtnet_poll_tx() functions in drivers/net/virtio_net.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98379
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47665
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the hci_dma_init() function in drivers/i3c/master/mipi-i3c-hci/dma.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98367
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47669
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the nilfs_segctor_abort_construction() and nilfs_segctor_do_construct() functions in fs/nilfs2/segment.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96295
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43882
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the bprm_fill_uid() function in fs/exec.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97492
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46740
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the binder_transaction() function in drivers/android/binder.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98860
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49851
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the tpm2_flush_space() function in drivers/char/tpm/tpm2-space.c, within the tpm_dev_transmit() function in drivers/char/tpm/tpm-dev-common.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97781
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46849
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the axg_card_add_tdm_loopback() function in sound/soc/meson/axg-card.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96172
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42311
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the hfs_new_inode() and hfs_inode_read_fork() functions in fs/hfs/inode.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96837
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44985
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ip6_xmit() function in net/ipv6/ip6_output.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98913
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47757
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the nilfs_btree_check_delete() function in fs/nilfs2/btree.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99157
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50001
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the mlx5e_sq_xmit_mpwqe() function in drivers/net/ethernet/mellanox/mlx5/core/en_tx.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97539
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46750
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the pci_bus_lock(), pci_bus_unlock(), pci_bus_trylock(), list_for_each_entry_continue_reverse(), pci_slot_lock() and pci_slot_trylock() functions in drivers/pci/pci.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98897
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47706
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the bfq_init_rq() function in block/bfq-iosched.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99133
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50039
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the qdisc_skb_cb() function in net/sched/sch_api.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97264
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46702
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the tb_switch_remove() function in drivers/thunderbolt/switch.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97511
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46725
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the amdgpu_ring_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_ring.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96160
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43817
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the include/linux/virtio_net.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98925
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49907
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the dc_allow_idle_optimizations() function in drivers/gpu/drm/amd/display/dc/core/dc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97268
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46695
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the smack_inode_notifysecctx() function in security/smack/smack_lsm.c, within the selinux_inode_notifysecctx() function in security/selinux/hooks.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92369
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-38553
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the fec_set_mac_address() function in drivers/net/ethernet/freescale/fec_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96171
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42272
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the DEFINE_MUTEX() and offsetof() functions in net/sched/act_ct.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99076
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49882
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the ext4_ext_try_to_merge_up() function in fs/ext4/extents.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96146
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42269
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ip6table_nat_init() function in net/ipv6/netfilter/ip6table_nat.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96859
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44954
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the line6_data_received() function in sound/usb/line6/driver.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96210
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42318
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the hook_cred_prepare() and hook_cred_free() functions in security/landlock/cred.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96165
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42297
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the f2fs_mark_inode_dirty_sync() function in fs/f2fs/inode.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98854
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49975
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the __create_xol_area() function in kernel/events/uprobes.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96845
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44988
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the mv88e6xxx_g1_atu_prob_irq_thread_fn() function in drivers/net/dsa/mv88e6xxx/global1_atu.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99150
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49963
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the bcm2835_mbox_probe() function in drivers/mailbox/bcm2835-mailbox.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98983
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47692
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the __cld_pipe_inprogress_downcall() function in fs/nfsd/nfs4recover.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95003
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41042
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the nf_tables_rule_release(), nft_chain_validate(), nft_chain_validate_hooks() and nft_validate_register_store() functions in net/netfilter/nf_tables_api.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95051
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41081
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the ila_output() function in net/ipv6/ila/ila_lwt.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96099
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43854
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the bio_integrity_prep() function in block/bio-integrity.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97485
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46771
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the bcm_notify() function in net/can/bcm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97555
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46732
CWE-ID:
CWE-369 - Divide By Zero
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a division by zero error within the dc_create() function in drivers/gpu/drm/amd/display/dc/core/dc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98895
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47712
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the wilc_parse_join_bss_param() function in drivers/net/wireless/microchip/wilc1000/hif.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98985
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47699
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the nilfs_btree_root_broken() function in fs/nilfs2/btree.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99148
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49927
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the ioapic_mask_entry(), __remove_pin_from_irq(), alloc_isa_irq_from_domain() and mp_irqdomain_alloc() functions in arch/x86/kernel/apic/io_apic.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99194
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49860
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the acpi_device_setup_files() function in drivers/acpi/device_sysfs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96843
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-45003
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the inode_lru_list_del(), evict() and inode_lru_isolate() functions in fs/inode.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99149
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49954
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the static_call_module_notify() function in kernel/static_call_inline.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96164
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42304
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the __ext4_read_dirblock(), ext4_empty_dir() and ext4_get_first_dir_block() functions in fs/ext4/namei.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98906
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49933
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the ioc_forgive_debts() function in block/blk-iocost.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96144
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42277
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the sprd_iommu_cleanup() function in drivers/iommu/sprd-iommu.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99172
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49955
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the battery_hook_unregister_unlocked() and battery_hook_register() functions in drivers/acpi/battery.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99033
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47710
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the sock_hash_free() function in net/core/sock_map.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96528
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43905
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the vega10_find_dpm_states_clocks_in_dpm_table(), vega10_generate_dpm_level_enable_mask(), vega10_check_states_equal(), vega10_set_sclk_od(), vega10_set_mclk_od(), vega10_odn_update_power_state() and vega10_get_performance_level() functions in drivers/gpu/drm/amd/pm/powerplay/hwmgr/vega10_hwmgr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98869
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49903
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the jfs_issue_discard() and jfs_ioc_trim() functions in fs/jfs/jfs_discard.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96191
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43856
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the dmam_free_coherent() function in kernel/dma/mapping.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100137
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50180
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the sisfb_search_mode() function in drivers/video/fbdev/sis/sis_main.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96871
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44966
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the DATA_START_OFFSET_WORDS() and load_flat_binary() functions in fs/binfmt_flat.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97259
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46685
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the pcs_get_function() function in drivers/pinctrl/pinctrl-single.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99178
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49935
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a race condition within the exit_round_robin() function in drivers/acpi/acpi_pad.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96848
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44990
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the bond_ipsec_offload_ok() function in drivers/net/bonding/bond_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96132
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52889
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the apparmor_socket_sock_rcv_skb() function in security/apparmor/lsm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98962
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49896
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the are_stream_backends_same() function in drivers/gpu/drm/amd/display/dc/core/dc_resource.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96885
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44969
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the sclp_sd_store_data() function in drivers/s390/char/sclp_sd.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100145
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50189
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the amd_sfh_hid_client_init() and amd_sfh_hid_client_deinit() functions in drivers/hid/amd-sfh-hid/amd_sfh_client.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99167
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50008
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the mwifiex_ret_802_11_scan_ext() function in drivers/net/wireless/marvell/mwifiex/scan.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98991
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47720
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the dcn30_set_output_transfer_func() function in drivers/gpu/drm/amd/display/dc/dcn30/dcn30_hwseq.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96109
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42313
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the vdec_close() function in drivers/media/platform/qcom/venus/vdec.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96869
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44983
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the nf_flow_skb_encap_protocol() function in net/netfilter/nf_flow_table_ip.c, within the nf_flow_offload_inet_hook() function in net/netfilter/nf_flow_table_inet.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98952
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49949
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the qdisc_pkt_len_init() function in net/core/dev.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97513
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46761
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the pnv_php_disable_irq() function in drivers/pci/hotplug/pnv_php.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99080
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47690
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the f2fs_get_parent() and f2fs_lookup() functions in fs/f2fs/namei.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99125
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50059
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition within the switchtec_ntb_remove() function in drivers/ntb/hw/mscc/ntb_hw_switchtec.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95011
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41073
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the nvme_cleanup_cmd() function in drivers/nvme/host/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98915
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47723
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the diAlloc() function in fs/jfs/jfs_imap.c, within the dbMount() and dbNextAG() functions in fs/jfs/jfs_dmap.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97504
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46747
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the cougar_fix_g6_mapping() function in drivers/hid/hid-cougar.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99151
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49952
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the nf_dup_ipv6_route() and nf_dup_ipv6() functions in net/ipv6/netfilter/nf_dup_ipv6.c, within the nf_dup_ipv4() function in net/ipv4/netfilter/nf_dup_ipv4.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99843
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50096
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the nouveau_dmem_fault_copy_one() function in drivers/gpu/drm/nouveau/nouveau_dmem.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96177
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42288
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the qla2x00_number_of_exch() function in drivers/scsi/qla2xxx/qla_os.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96287
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43871
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the EXPORT_SYMBOL_GPL() function in drivers/base/devres.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94997
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42126
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the pcpu_cpu_to_node() and setup_per_cpu_areas() functions in arch/powerpc/kernel/setup_64.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96842
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-44998
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the dequeue_rx() function in drivers/atm/idt77252.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99087
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47685
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the nf_reject_ip6_tcphdr_put() function in net/ipv6/netfilter/nf_reject_ipv6.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97269
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46679
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the speed_show() function in net/core/net-sysfs.c, within the __ethtool_get_link_ksettings() function in net/core/ethtool.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96538
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43884
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the pair_device() function in net/bluetooth/mgmt.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98376
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47668
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the __genradix_ptr_alloc() function in lib/generic-radix-tree.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98873
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49936
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the xenvif_new_hash() and xenvif_flush_hash() functions in drivers/net/xen-netback/hash.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96124
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43829
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the qxl_add_mode() function in drivers/gpu/drm/qxl/qxl_display.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98976
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47756
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ks_pcie_quirk() function in drivers/pci/controller/dwc/pci-keystone.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96305
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43880
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the objagg_hints_obj_cmp() and objagg_hints_get() functions in lib/objagg.c, within the mlxsw_sp_acl_erp_delta_check() and mlxsw_sp_acl_erp_root_destroy() functions in drivers/net/ethernet/mellanox/mlxsw/spectrum_acl_erp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96888
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-45007
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the MODULE_LICENSE(), cleanup_dev(), report_io_error() and xillyusb_init() functions in drivers/char/xillybus/xillyusb.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94203
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40910
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the ax25_accept() function in net/ax25/af_ax25.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98997
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50044
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the rfcomm_sock_ioctl() function in net/bluetooth/rfcomm/sock.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91483
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52639
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition within the gmap_shadow() function in arch/s390/mm/gmap.c, within the acquire_gmap_shadow() function in arch/s390/kvm/vsie.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98919
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47698
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the rtl2832_pid_filter() function in drivers/media/dvb-frontends/rtl2832.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94672
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41012
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the fcntl_setlk() function in fs/locks.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99029
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49856
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the __sgx_alloc_epc_page() function in arch/x86/kernel/cpu/sgx/main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99032
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47713
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the ieee80211_do_stop() function in net/mac80211/iface.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98894
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47718
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the rtw_wait_firmware_completion() function in drivers/net/wireless/realtek/rtw88/main.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99223
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49967
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the do_split() function in fs/ext4/namei.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-azure-5.15 to the latest version.
Vulnerable software versionsUbuntu: 20.04
linux-image-azure-cvm (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-azure (Ubuntu package): before 5.15.0.1078.87~20.04.1
linux-image-5.15.0-1078-azure (Ubuntu package): before 5.15.0-1078.87~20.04.1
CPE2.3https://ubuntu.com/security/notices/USN-7194-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.