It was discovered that the HugeTLB file system component of the Linux Kernel contained a NULL pointer dereference vulnerability. A privileged attacker could possibly use this to to cause a denial of service. (CVE-2024-0841)
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - PowerPC architecture; - x86 architecture; - DMA engine subsystem; - EFI core; - GPU drivers; - InfiniBand drivers; - Multiple devices driver; - Network drivers; - Power supply drivers; - TCM subsystem; - Userspace I/O drivers; - USB subsystem; - Framebuffer layer; - AFS file system; - File systems infrastructure; - BTRFS file system; - Ext4 file system; - Bluetooth subsystem; - Networking core; - IPv4 networking; - IPv6 networking; - L2TP protocol; - MAC80211 subsystem; - Netfilter; - Netlink; - Wireless networking; (CVE-2021-47063, CVE-2024-26751, CVE-2024-26848, CVE-2024-26748, CVE-2024-26733, CVE-2024-26735, CVE-2024-26805, CVE-2024-26804, CVE-2024-26793, CVE-2023-52504, CVE-2024-27417, CVE-2024-27405, CVE-2024-26778, CVE-2024-27414, CVE-2024-26801, CVE-2024-26835, CVE-2024-27413, CVE-2024-26766, CVE-2024-27410, CVE-2024-27412, CVE-2024-26773, CVE-2024-26777, CVE-2024-26839, CVE-2024-26764, CVE-2024-26712, CVE-2024-26788, CVE-2024-26688, CVE-2024-26754, CVE-2021-47070, CVE-2024-26752, CVE-2024-26845, CVE-2024-26791, CVE-2024-26763, CVE-2024-27416, CVE-2024-26779, CVE-2024-26749, CVE-2024-26736, CVE-2024-26840, CVE-2024-26772, CVE-2024-26790)
{ "availability": "No subscription required", "binaries": [ { "binary_version": "5.4.0-1086.93", "binary_name": "linux-bluefield-headers-5.4.0-1086" }, { "binary_version": "5.4.0-1086.93", "binary_name": "linux-bluefield-tools-5.4.0-1086" }, { "binary_version": "5.4.0-1086.93", "binary_name": "linux-buildinfo-5.4.0-1086-bluefield" }, { "binary_version": "5.4.0-1086.93", "binary_name": "linux-headers-5.4.0-1086-bluefield" }, { "binary_version": "5.4.0-1086.93", "binary_name": "linux-image-unsigned-5.4.0-1086-bluefield" }, { "binary_version": "5.4.0-1086.93", "binary_name": "linux-image-unsigned-5.4.0-1086-bluefield-dbgsym" }, { "binary_version": "5.4.0-1086.93", "binary_name": "linux-modules-5.4.0-1086-bluefield" }, { "binary_version": "5.4.0-1086.93", "binary_name": "linux-tools-5.4.0-1086-bluefield" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "5.4.0-1038.39", "binary_name": "linux-buildinfo-5.4.0-1038-iot" }, { "binary_version": "5.4.0-1038.39", "binary_name": "linux-headers-5.4.0-1038-iot" }, { "binary_version": "5.4.0-1038.39", "binary_name": "linux-image-5.4.0-1038-iot" }, { "binary_version": "5.4.0-1038.39", "binary_name": "linux-image-5.4.0-1038-iot-dbgsym" }, { "binary_version": "5.4.0-1038.39", "binary_name": "linux-image-unsigned-5.4.0-1038-iot" }, { "binary_version": "5.4.0-1038.39", "binary_name": "linux-image-unsigned-5.4.0-1038-iot-dbgsym" }, { "binary_version": "5.4.0-1038.39", "binary_name": "linux-iot-headers-5.4.0-1038" }, { "binary_version": "5.4.0-1038.39", "binary_name": "linux-iot-tools-5.4.0-1038" }, { "binary_version": "5.4.0-1038.39", "binary_name": "linux-iot-tools-common" }, { "binary_version": "5.4.0-1038.39", "binary_name": "linux-modules-5.4.0-1038-iot" }, { "binary_version": "5.4.0-1038.39", "binary_name": "linux-tools-5.4.0-1038-iot" } ] }