Risk | Low |
Patch available | YES |
Number of vulnerabilities | 11 |
CVE-ID | CVE-2024-53237 CVE-2024-50256 CVE-2021-47119 CVE-2024-35958 CVE-2025-21700 CVE-2025-21703 CVE-2024-56651 CVE-2024-49974 CVE-2025-21702 CVE-2024-26915 CVE-2024-46826 |
CWE-ID | CWE-416 CWE-388 CWE-401 CWE-399 CWE-20 CWE-119 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Ubuntu Operating systems & Components / Operating system linux-image-virtual (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-oracle-lts-20.04 (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-oem-osp1 (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-oem (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-lowlatency (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-kvm (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-ibm-lts-20.04 (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-generic-lpae (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-generic (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-gcp-lts-20.04 (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-bluefield (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-azure-lts-20.04 (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-5.4.0-214-lowlatency (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-5.4.0-214-generic-lpae (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-5.4.0-214-generic (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-5.4.0-1149-azure (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-5.4.0-1147-gcp (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-5.4.0-1142-oracle (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-5.4.0-1131-kvm (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-5.4.0-1103-bluefield (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-5.4.0-1090-ibm (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-lowlatency-hwe-18.04 (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-virtual-hwe-18.04 (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-snapdragon-hwe-18.04 (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-generic-hwe-18.04 (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-azure (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-oracle (Ubuntu package) Operating systems & Components / Operating system package or component |
Vendor | Canonical Ltd. |
Security Bulletin
This security bulletin contains information about 11 vulnerabilities.
EUVDB-ID: #VU102069
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53237
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the __match_tty() and hci_conn_del_sysfs() functions in net/bluetooth/hci_sysfs.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 18.04 - 20.04
linux-image-virtual (Ubuntu package): before 5.4.0.214.207
linux-image-oracle-lts-20.04 (Ubuntu package): before 5.4.0.1142.136
linux-image-oem-osp1 (Ubuntu package): before 5.4.0.214.207
linux-image-oem (Ubuntu package): before 5.4.0.214.207
linux-image-lowlatency (Ubuntu package): before 5.4.0.214.207
linux-image-kvm (Ubuntu package): before 5.4.0.1131.127
linux-image-ibm-lts-20.04 (Ubuntu package): before 5.4.0.1090.119
linux-image-generic-lpae (Ubuntu package): before 5.4.0.214.207
linux-image-generic (Ubuntu package): before 5.4.0.214.207
linux-image-gcp-lts-20.04 (Ubuntu package): before 5.4.0.1147.149
linux-image-bluefield (Ubuntu package): before 5.4.0.1103.99
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1149.143
linux-image-5.4.0-214-lowlatency (Ubuntu package): before Ubuntu Pro
linux-image-5.4.0-214-generic-lpae (Ubuntu package): before 5.4.0-214.234
linux-image-5.4.0-214-generic (Ubuntu package): before Ubuntu Pro
linux-image-5.4.0-1149-azure (Ubuntu package): before Ubuntu Pro
linux-image-5.4.0-1147-gcp (Ubuntu package): before 5.4.0-1147.156
linux-image-5.4.0-1142-oracle (Ubuntu package): before Ubuntu Pro
linux-image-5.4.0-1131-kvm (Ubuntu package): before 5.4.0-1131.140
linux-image-5.4.0-1103-bluefield (Ubuntu package): before 5.4.0-1103.110
linux-image-5.4.0-1090-ibm (Ubuntu package): before 5.4.0-1090.95
linux-image-lowlatency-hwe-18.04 (Ubuntu package): before Ubuntu Pro
linux-image-virtual-hwe-18.04 (Ubuntu package): before Ubuntu Pro
linux-image-snapdragon-hwe-18.04 (Ubuntu package): before Ubuntu Pro
linux-image-generic-hwe-18.04 (Ubuntu package): before Ubuntu Pro
linux-image-azure (Ubuntu package): before Ubuntu Pro (Infra-only)
linux-image-oracle (Ubuntu package): before Ubuntu Pro (Infra-only)
CPE2.3https://ubuntu.com/security/notices/USN-7461-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100192
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50256
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the nf_reject6_fill_skb_dst() and nf_send_reset6() functions in net/ipv6/netfilter/nf_reject_ipv6.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 18.04 - 20.04
linux-image-virtual (Ubuntu package): before 5.4.0.214.207
linux-image-oracle-lts-20.04 (Ubuntu package): before 5.4.0.1142.136
linux-image-oem-osp1 (Ubuntu package): before 5.4.0.214.207
linux-image-oem (Ubuntu package): before 5.4.0.214.207
linux-image-lowlatency (Ubuntu package): before 5.4.0.214.207
linux-image-kvm (Ubuntu package): before 5.4.0.1131.127
linux-image-ibm-lts-20.04 (Ubuntu package): before 5.4.0.1090.119
linux-image-generic-lpae (Ubuntu package): before 5.4.0.214.207
linux-image-generic (Ubuntu package): before 5.4.0.214.207
linux-image-gcp-lts-20.04 (Ubuntu package): before 5.4.0.1147.149
linux-image-bluefield (Ubuntu package): before 5.4.0.1103.99
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1149.143
linux-image-5.4.0-214-lowlatency (Ubuntu package): before Ubuntu Pro
linux-image-5.4.0-214-generic-lpae (Ubuntu package): before 5.4.0-214.234
linux-image-5.4.0-214-generic (Ubuntu package): before Ubuntu Pro
linux-image-5.4.0-1149-azure (Ubuntu package): before Ubuntu Pro
linux-image-5.4.0-1147-gcp (Ubuntu package): before 5.4.0-1147.156
linux-image-5.4.0-1142-oracle (Ubuntu package): before Ubuntu Pro
linux-image-5.4.0-1131-kvm (Ubuntu package): before 5.4.0-1131.140
linux-image-5.4.0-1103-bluefield (Ubuntu package): before 5.4.0-1103.110
linux-image-5.4.0-1090-ibm (Ubuntu package): before 5.4.0-1090.95
linux-image-lowlatency-hwe-18.04 (Ubuntu package): before Ubuntu Pro
linux-image-virtual-hwe-18.04 (Ubuntu package): before Ubuntu Pro
linux-image-snapdragon-hwe-18.04 (Ubuntu package): before Ubuntu Pro
linux-image-generic-hwe-18.04 (Ubuntu package): before Ubuntu Pro
linux-image-azure (Ubuntu package): before Ubuntu Pro (Infra-only)
linux-image-oracle (Ubuntu package): before Ubuntu Pro (Infra-only)
CPE2.3https://ubuntu.com/security/notices/USN-7461-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90018
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47119
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the ext4_fill_super() and kfree() functions in fs/ext4/super.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 18.04 - 20.04
linux-image-virtual (Ubuntu package): before 5.4.0.214.207
linux-image-oracle-lts-20.04 (Ubuntu package): before 5.4.0.1142.136
linux-image-oem-osp1 (Ubuntu package): before 5.4.0.214.207
linux-image-oem (Ubuntu package): before 5.4.0.214.207
linux-image-lowlatency (Ubuntu package): before 5.4.0.214.207
linux-image-kvm (Ubuntu package): before 5.4.0.1131.127
linux-image-ibm-lts-20.04 (Ubuntu package): before 5.4.0.1090.119
linux-image-generic-lpae (Ubuntu package): before 5.4.0.214.207
linux-image-generic (Ubuntu package): before 5.4.0.214.207
linux-image-gcp-lts-20.04 (Ubuntu package): before 5.4.0.1147.149
linux-image-bluefield (Ubuntu package): before 5.4.0.1103.99
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1149.143
linux-image-5.4.0-214-lowlatency (Ubuntu package): before Ubuntu Pro
linux-image-5.4.0-214-generic-lpae (Ubuntu package): before 5.4.0-214.234
linux-image-5.4.0-214-generic (Ubuntu package): before Ubuntu Pro
linux-image-5.4.0-1149-azure (Ubuntu package): before Ubuntu Pro
linux-image-5.4.0-1147-gcp (Ubuntu package): before 5.4.0-1147.156
linux-image-5.4.0-1142-oracle (Ubuntu package): before Ubuntu Pro
linux-image-5.4.0-1131-kvm (Ubuntu package): before 5.4.0-1131.140
linux-image-5.4.0-1103-bluefield (Ubuntu package): before 5.4.0-1103.110
linux-image-5.4.0-1090-ibm (Ubuntu package): before 5.4.0-1090.95
linux-image-lowlatency-hwe-18.04 (Ubuntu package): before Ubuntu Pro
linux-image-virtual-hwe-18.04 (Ubuntu package): before Ubuntu Pro
linux-image-snapdragon-hwe-18.04 (Ubuntu package): before Ubuntu Pro
linux-image-generic-hwe-18.04 (Ubuntu package): before Ubuntu Pro
linux-image-azure (Ubuntu package): before Ubuntu Pro (Infra-only)
linux-image-oracle (Ubuntu package): before Ubuntu Pro (Infra-only)
CPE2.3https://ubuntu.com/security/notices/USN-7461-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93255
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-35958
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the ena_unmap_tx_buff() and ena_free_tx_bufs() functions in drivers/net/ethernet/amazon/ena/ena_netdev.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 18.04 - 20.04
linux-image-virtual (Ubuntu package): before 5.4.0.214.207
linux-image-oracle-lts-20.04 (Ubuntu package): before 5.4.0.1142.136
linux-image-oem-osp1 (Ubuntu package): before 5.4.0.214.207
linux-image-oem (Ubuntu package): before 5.4.0.214.207
linux-image-lowlatency (Ubuntu package): before 5.4.0.214.207
linux-image-kvm (Ubuntu package): before 5.4.0.1131.127
linux-image-ibm-lts-20.04 (Ubuntu package): before 5.4.0.1090.119
linux-image-generic-lpae (Ubuntu package): before 5.4.0.214.207
linux-image-generic (Ubuntu package): before 5.4.0.214.207
linux-image-gcp-lts-20.04 (Ubuntu package): before 5.4.0.1147.149
linux-image-bluefield (Ubuntu package): before 5.4.0.1103.99
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1149.143
linux-image-5.4.0-214-lowlatency (Ubuntu package): before Ubuntu Pro
linux-image-5.4.0-214-generic-lpae (Ubuntu package): before 5.4.0-214.234
linux-image-5.4.0-214-generic (Ubuntu package): before Ubuntu Pro
linux-image-5.4.0-1149-azure (Ubuntu package): before Ubuntu Pro
linux-image-5.4.0-1147-gcp (Ubuntu package): before 5.4.0-1147.156
linux-image-5.4.0-1142-oracle (Ubuntu package): before Ubuntu Pro
linux-image-5.4.0-1131-kvm (Ubuntu package): before 5.4.0-1131.140
linux-image-5.4.0-1103-bluefield (Ubuntu package): before 5.4.0-1103.110
linux-image-5.4.0-1090-ibm (Ubuntu package): before 5.4.0-1090.95
linux-image-lowlatency-hwe-18.04 (Ubuntu package): before Ubuntu Pro
linux-image-virtual-hwe-18.04 (Ubuntu package): before Ubuntu Pro
linux-image-snapdragon-hwe-18.04 (Ubuntu package): before Ubuntu Pro
linux-image-generic-hwe-18.04 (Ubuntu package): before Ubuntu Pro
linux-image-azure (Ubuntu package): before Ubuntu Pro (Infra-only)
linux-image-oracle (Ubuntu package): before Ubuntu Pro (Infra-only)
CPE2.3https://ubuntu.com/security/notices/USN-7461-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103959
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21700
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the qdisc_lookup() function in net/sched/sch_api.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 18.04 - 20.04
linux-image-virtual (Ubuntu package): before 5.4.0.214.207
linux-image-oracle-lts-20.04 (Ubuntu package): before 5.4.0.1142.136
linux-image-oem-osp1 (Ubuntu package): before 5.4.0.214.207
linux-image-oem (Ubuntu package): before 5.4.0.214.207
linux-image-lowlatency (Ubuntu package): before 5.4.0.214.207
linux-image-kvm (Ubuntu package): before 5.4.0.1131.127
linux-image-ibm-lts-20.04 (Ubuntu package): before 5.4.0.1090.119
linux-image-generic-lpae (Ubuntu package): before 5.4.0.214.207
linux-image-generic (Ubuntu package): before 5.4.0.214.207
linux-image-gcp-lts-20.04 (Ubuntu package): before 5.4.0.1147.149
linux-image-bluefield (Ubuntu package): before 5.4.0.1103.99
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1149.143
linux-image-5.4.0-214-lowlatency (Ubuntu package): before Ubuntu Pro
linux-image-5.4.0-214-generic-lpae (Ubuntu package): before 5.4.0-214.234
linux-image-5.4.0-214-generic (Ubuntu package): before Ubuntu Pro
linux-image-5.4.0-1149-azure (Ubuntu package): before Ubuntu Pro
linux-image-5.4.0-1147-gcp (Ubuntu package): before 5.4.0-1147.156
linux-image-5.4.0-1142-oracle (Ubuntu package): before Ubuntu Pro
linux-image-5.4.0-1131-kvm (Ubuntu package): before 5.4.0-1131.140
linux-image-5.4.0-1103-bluefield (Ubuntu package): before 5.4.0-1103.110
linux-image-5.4.0-1090-ibm (Ubuntu package): before 5.4.0-1090.95
linux-image-lowlatency-hwe-18.04 (Ubuntu package): before Ubuntu Pro
linux-image-virtual-hwe-18.04 (Ubuntu package): before Ubuntu Pro
linux-image-snapdragon-hwe-18.04 (Ubuntu package): before Ubuntu Pro
linux-image-generic-hwe-18.04 (Ubuntu package): before Ubuntu Pro
linux-image-azure (Ubuntu package): before Ubuntu Pro (Infra-only)
linux-image-oracle (Ubuntu package): before Ubuntu Pro (Infra-only)
CPE2.3https://ubuntu.com/security/notices/USN-7461-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104073
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21703
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the net/sched/sch_netem.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 18.04 - 20.04
linux-image-virtual (Ubuntu package): before 5.4.0.214.207
linux-image-oracle-lts-20.04 (Ubuntu package): before 5.4.0.1142.136
linux-image-oem-osp1 (Ubuntu package): before 5.4.0.214.207
linux-image-oem (Ubuntu package): before 5.4.0.214.207
linux-image-lowlatency (Ubuntu package): before 5.4.0.214.207
linux-image-kvm (Ubuntu package): before 5.4.0.1131.127
linux-image-ibm-lts-20.04 (Ubuntu package): before 5.4.0.1090.119
linux-image-generic-lpae (Ubuntu package): before 5.4.0.214.207
linux-image-generic (Ubuntu package): before 5.4.0.214.207
linux-image-gcp-lts-20.04 (Ubuntu package): before 5.4.0.1147.149
linux-image-bluefield (Ubuntu package): before 5.4.0.1103.99
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1149.143
linux-image-5.4.0-214-lowlatency (Ubuntu package): before Ubuntu Pro
linux-image-5.4.0-214-generic-lpae (Ubuntu package): before 5.4.0-214.234
linux-image-5.4.0-214-generic (Ubuntu package): before Ubuntu Pro
linux-image-5.4.0-1149-azure (Ubuntu package): before Ubuntu Pro
linux-image-5.4.0-1147-gcp (Ubuntu package): before 5.4.0-1147.156
linux-image-5.4.0-1142-oracle (Ubuntu package): before Ubuntu Pro
linux-image-5.4.0-1131-kvm (Ubuntu package): before 5.4.0-1131.140
linux-image-5.4.0-1103-bluefield (Ubuntu package): before 5.4.0-1103.110
linux-image-5.4.0-1090-ibm (Ubuntu package): before 5.4.0-1090.95
linux-image-lowlatency-hwe-18.04 (Ubuntu package): before Ubuntu Pro
linux-image-virtual-hwe-18.04 (Ubuntu package): before Ubuntu Pro
linux-image-snapdragon-hwe-18.04 (Ubuntu package): before Ubuntu Pro
linux-image-generic-hwe-18.04 (Ubuntu package): before Ubuntu Pro
linux-image-azure (Ubuntu package): before Ubuntu Pro (Infra-only)
linux-image-oracle (Ubuntu package): before Ubuntu Pro (Infra-only)
CPE2.3https://ubuntu.com/security/notices/USN-7461-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102030
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56651
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the hi3110_can_ist() function in drivers/net/can/spi/hi311x.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 18.04 - 20.04
linux-image-virtual (Ubuntu package): before 5.4.0.214.207
linux-image-oracle-lts-20.04 (Ubuntu package): before 5.4.0.1142.136
linux-image-oem-osp1 (Ubuntu package): before 5.4.0.214.207
linux-image-oem (Ubuntu package): before 5.4.0.214.207
linux-image-lowlatency (Ubuntu package): before 5.4.0.214.207
linux-image-kvm (Ubuntu package): before 5.4.0.1131.127
linux-image-ibm-lts-20.04 (Ubuntu package): before 5.4.0.1090.119
linux-image-generic-lpae (Ubuntu package): before 5.4.0.214.207
linux-image-generic (Ubuntu package): before 5.4.0.214.207
linux-image-gcp-lts-20.04 (Ubuntu package): before 5.4.0.1147.149
linux-image-bluefield (Ubuntu package): before 5.4.0.1103.99
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1149.143
linux-image-5.4.0-214-lowlatency (Ubuntu package): before Ubuntu Pro
linux-image-5.4.0-214-generic-lpae (Ubuntu package): before 5.4.0-214.234
linux-image-5.4.0-214-generic (Ubuntu package): before Ubuntu Pro
linux-image-5.4.0-1149-azure (Ubuntu package): before Ubuntu Pro
linux-image-5.4.0-1147-gcp (Ubuntu package): before 5.4.0-1147.156
linux-image-5.4.0-1142-oracle (Ubuntu package): before Ubuntu Pro
linux-image-5.4.0-1131-kvm (Ubuntu package): before 5.4.0-1131.140
linux-image-5.4.0-1103-bluefield (Ubuntu package): before 5.4.0-1103.110
linux-image-5.4.0-1090-ibm (Ubuntu package): before 5.4.0-1090.95
linux-image-lowlatency-hwe-18.04 (Ubuntu package): before Ubuntu Pro
linux-image-virtual-hwe-18.04 (Ubuntu package): before Ubuntu Pro
linux-image-snapdragon-hwe-18.04 (Ubuntu package): before Ubuntu Pro
linux-image-generic-hwe-18.04 (Ubuntu package): before Ubuntu Pro
linux-image-azure (Ubuntu package): before Ubuntu Pro (Infra-only)
linux-image-oracle (Ubuntu package): before Ubuntu Pro (Infra-only)
CPE2.3https://ubuntu.com/security/notices/USN-7461-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99220
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49974
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the nfs4_state_create_net() function in fs/nfsd/nfs4state.c, within the nfs4_put_copy() and nfsd4_copy() functions in fs/nfsd/nfs4proc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 18.04 - 20.04
linux-image-virtual (Ubuntu package): before 5.4.0.214.207
linux-image-oracle-lts-20.04 (Ubuntu package): before 5.4.0.1142.136
linux-image-oem-osp1 (Ubuntu package): before 5.4.0.214.207
linux-image-oem (Ubuntu package): before 5.4.0.214.207
linux-image-lowlatency (Ubuntu package): before 5.4.0.214.207
linux-image-kvm (Ubuntu package): before 5.4.0.1131.127
linux-image-ibm-lts-20.04 (Ubuntu package): before 5.4.0.1090.119
linux-image-generic-lpae (Ubuntu package): before 5.4.0.214.207
linux-image-generic (Ubuntu package): before 5.4.0.214.207
linux-image-gcp-lts-20.04 (Ubuntu package): before 5.4.0.1147.149
linux-image-bluefield (Ubuntu package): before 5.4.0.1103.99
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1149.143
linux-image-5.4.0-214-lowlatency (Ubuntu package): before Ubuntu Pro
linux-image-5.4.0-214-generic-lpae (Ubuntu package): before 5.4.0-214.234
linux-image-5.4.0-214-generic (Ubuntu package): before Ubuntu Pro
linux-image-5.4.0-1149-azure (Ubuntu package): before Ubuntu Pro
linux-image-5.4.0-1147-gcp (Ubuntu package): before 5.4.0-1147.156
linux-image-5.4.0-1142-oracle (Ubuntu package): before Ubuntu Pro
linux-image-5.4.0-1131-kvm (Ubuntu package): before 5.4.0-1131.140
linux-image-5.4.0-1103-bluefield (Ubuntu package): before 5.4.0-1103.110
linux-image-5.4.0-1090-ibm (Ubuntu package): before 5.4.0-1090.95
linux-image-lowlatency-hwe-18.04 (Ubuntu package): before Ubuntu Pro
linux-image-virtual-hwe-18.04 (Ubuntu package): before Ubuntu Pro
linux-image-snapdragon-hwe-18.04 (Ubuntu package): before Ubuntu Pro
linux-image-generic-hwe-18.04 (Ubuntu package): before Ubuntu Pro
linux-image-azure (Ubuntu package): before Ubuntu Pro (Infra-only)
linux-image-oracle (Ubuntu package): before Ubuntu Pro (Infra-only)
CPE2.3https://ubuntu.com/security/notices/USN-7461-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104074
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21702
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the pfifo_tail_enqueue() function in net/sched/sch_fifo.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 18.04 - 20.04
linux-image-virtual (Ubuntu package): before 5.4.0.214.207
linux-image-oracle-lts-20.04 (Ubuntu package): before 5.4.0.1142.136
linux-image-oem-osp1 (Ubuntu package): before 5.4.0.214.207
linux-image-oem (Ubuntu package): before 5.4.0.214.207
linux-image-lowlatency (Ubuntu package): before 5.4.0.214.207
linux-image-kvm (Ubuntu package): before 5.4.0.1131.127
linux-image-ibm-lts-20.04 (Ubuntu package): before 5.4.0.1090.119
linux-image-generic-lpae (Ubuntu package): before 5.4.0.214.207
linux-image-generic (Ubuntu package): before 5.4.0.214.207
linux-image-gcp-lts-20.04 (Ubuntu package): before 5.4.0.1147.149
linux-image-bluefield (Ubuntu package): before 5.4.0.1103.99
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1149.143
linux-image-5.4.0-214-lowlatency (Ubuntu package): before Ubuntu Pro
linux-image-5.4.0-214-generic-lpae (Ubuntu package): before 5.4.0-214.234
linux-image-5.4.0-214-generic (Ubuntu package): before Ubuntu Pro
linux-image-5.4.0-1149-azure (Ubuntu package): before Ubuntu Pro
linux-image-5.4.0-1147-gcp (Ubuntu package): before 5.4.0-1147.156
linux-image-5.4.0-1142-oracle (Ubuntu package): before Ubuntu Pro
linux-image-5.4.0-1131-kvm (Ubuntu package): before 5.4.0-1131.140
linux-image-5.4.0-1103-bluefield (Ubuntu package): before 5.4.0-1103.110
linux-image-5.4.0-1090-ibm (Ubuntu package): before 5.4.0-1090.95
linux-image-lowlatency-hwe-18.04 (Ubuntu package): before Ubuntu Pro
linux-image-virtual-hwe-18.04 (Ubuntu package): before Ubuntu Pro
linux-image-snapdragon-hwe-18.04 (Ubuntu package): before Ubuntu Pro
linux-image-generic-hwe-18.04 (Ubuntu package): before Ubuntu Pro
linux-image-azure (Ubuntu package): before Ubuntu Pro (Infra-only)
linux-image-oracle (Ubuntu package): before Ubuntu Pro (Infra-only)
CPE2.3https://ubuntu.com/security/notices/USN-7461-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91311
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26915
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the vega20_ih_get_wptr() function in drivers/gpu/drm/amd/amdgpu/vega20_ih.c, within the vega10_ih_get_wptr() function in drivers/gpu/drm/amd/amdgpu/vega10_ih.c, within the tonga_ih_get_wptr() function in drivers/gpu/drm/amd/amdgpu/tonga_ih.c, within the si_ih_get_wptr() function in drivers/gpu/drm/amd/amdgpu/si_ih.c, within the navi10_ih_get_wptr() function in drivers/gpu/drm/amd/amdgpu/navi10_ih.c, within the iceland_ih_get_wptr() function in drivers/gpu/drm/amd/amdgpu/iceland_ih.c, within the cz_ih_get_wptr() function in drivers/gpu/drm/amd/amdgpu/cz_ih.c, within the cik_ih_get_wptr() function in drivers/gpu/drm/amd/amdgpu/cik_ih.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 18.04 - 20.04
linux-image-virtual (Ubuntu package): before 5.4.0.214.207
linux-image-oracle-lts-20.04 (Ubuntu package): before 5.4.0.1142.136
linux-image-oem-osp1 (Ubuntu package): before 5.4.0.214.207
linux-image-oem (Ubuntu package): before 5.4.0.214.207
linux-image-lowlatency (Ubuntu package): before 5.4.0.214.207
linux-image-kvm (Ubuntu package): before 5.4.0.1131.127
linux-image-ibm-lts-20.04 (Ubuntu package): before 5.4.0.1090.119
linux-image-generic-lpae (Ubuntu package): before 5.4.0.214.207
linux-image-generic (Ubuntu package): before 5.4.0.214.207
linux-image-gcp-lts-20.04 (Ubuntu package): before 5.4.0.1147.149
linux-image-bluefield (Ubuntu package): before 5.4.0.1103.99
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1149.143
linux-image-5.4.0-214-lowlatency (Ubuntu package): before Ubuntu Pro
linux-image-5.4.0-214-generic-lpae (Ubuntu package): before 5.4.0-214.234
linux-image-5.4.0-214-generic (Ubuntu package): before Ubuntu Pro
linux-image-5.4.0-1149-azure (Ubuntu package): before Ubuntu Pro
linux-image-5.4.0-1147-gcp (Ubuntu package): before 5.4.0-1147.156
linux-image-5.4.0-1142-oracle (Ubuntu package): before Ubuntu Pro
linux-image-5.4.0-1131-kvm (Ubuntu package): before 5.4.0-1131.140
linux-image-5.4.0-1103-bluefield (Ubuntu package): before 5.4.0-1103.110
linux-image-5.4.0-1090-ibm (Ubuntu package): before 5.4.0-1090.95
linux-image-lowlatency-hwe-18.04 (Ubuntu package): before Ubuntu Pro
linux-image-virtual-hwe-18.04 (Ubuntu package): before Ubuntu Pro
linux-image-snapdragon-hwe-18.04 (Ubuntu package): before Ubuntu Pro
linux-image-generic-hwe-18.04 (Ubuntu package): before Ubuntu Pro
linux-image-azure (Ubuntu package): before Ubuntu Pro (Infra-only)
linux-image-oracle (Ubuntu package): before Ubuntu Pro (Infra-only)
CPE2.3https://ubuntu.com/security/notices/USN-7461-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97839
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46826
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the fs/binfmt_elf.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 18.04 - 20.04
linux-image-virtual (Ubuntu package): before 5.4.0.214.207
linux-image-oracle-lts-20.04 (Ubuntu package): before 5.4.0.1142.136
linux-image-oem-osp1 (Ubuntu package): before 5.4.0.214.207
linux-image-oem (Ubuntu package): before 5.4.0.214.207
linux-image-lowlatency (Ubuntu package): before 5.4.0.214.207
linux-image-kvm (Ubuntu package): before 5.4.0.1131.127
linux-image-ibm-lts-20.04 (Ubuntu package): before 5.4.0.1090.119
linux-image-generic-lpae (Ubuntu package): before 5.4.0.214.207
linux-image-generic (Ubuntu package): before 5.4.0.214.207
linux-image-gcp-lts-20.04 (Ubuntu package): before 5.4.0.1147.149
linux-image-bluefield (Ubuntu package): before 5.4.0.1103.99
linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1149.143
linux-image-5.4.0-214-lowlatency (Ubuntu package): before Ubuntu Pro
linux-image-5.4.0-214-generic-lpae (Ubuntu package): before 5.4.0-214.234
linux-image-5.4.0-214-generic (Ubuntu package): before Ubuntu Pro
linux-image-5.4.0-1149-azure (Ubuntu package): before Ubuntu Pro
linux-image-5.4.0-1147-gcp (Ubuntu package): before 5.4.0-1147.156
linux-image-5.4.0-1142-oracle (Ubuntu package): before Ubuntu Pro
linux-image-5.4.0-1131-kvm (Ubuntu package): before 5.4.0-1131.140
linux-image-5.4.0-1103-bluefield (Ubuntu package): before 5.4.0-1103.110
linux-image-5.4.0-1090-ibm (Ubuntu package): before 5.4.0-1090.95
linux-image-lowlatency-hwe-18.04 (Ubuntu package): before Ubuntu Pro
linux-image-virtual-hwe-18.04 (Ubuntu package): before Ubuntu Pro
linux-image-snapdragon-hwe-18.04 (Ubuntu package): before Ubuntu Pro
linux-image-generic-hwe-18.04 (Ubuntu package): before Ubuntu Pro
linux-image-azure (Ubuntu package): before Ubuntu Pro (Infra-only)
linux-image-oracle (Ubuntu package): before Ubuntu Pro (Infra-only)
CPE2.3https://ubuntu.com/security/notices/USN-7461-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.