all InfoSec news
USN-6686-5: Linux kernel (Intel IoTG) vulnerabilities
March 27, 2024, 9:03 p.m. |
Ubuntu security notices ubuntu.com
Linux kernel did not properly handle certain error conditions during device
registration. A local attacker could possibly use this to cause a denial of
service (system crash). (CVE-2023-22995)
It was discovered that a race condition existed in the Cypress touchscreen
driver in the Linux kernel during device removal, leading to a use-after-
free vulnerability. A physically proximate attacker could use this to cause
a denial of service …
attacker conditions crash cve denial of service device driver error intel kernel linux linux kernel local qualcomm race race condition registration service socs system usn vulnerabilities
More from ubuntu.com / Ubuntu security notices
USN-6804-1: GNU C Library vulnerabilities
1 day, 19 hours ago |
ubuntu.com
USN-6803-1: FFmpeg vulnerabilities
2 days, 17 hours ago |
ubuntu.com
USN-6802-1: PostgreSQL vulnerability
2 days, 20 hours ago |
ubuntu.com
USN-6801-1: PyMySQL vulnerability
2 days, 21 hours ago |
ubuntu.com
USN-6800-1: browserify-sign vulnerability
2 days, 22 hours ago |
ubuntu.com
USN-6798-1: GStreamer Base Plugins vulnerability
3 days, 18 hours ago |
ubuntu.com
USN-6796-1: TPM2 Software Stack vulnerabilities
3 days, 19 hours ago |
ubuntu.com
USN-6797-1: Intel Microcode vulnerabilities
4 days, 1 hour ago |
ubuntu.com
Jobs in InfoSec / Cybersecurity
CyberSOC Technical Lead
@ Integrity360 | Sandyford, Dublin, Ireland
Cyber Security Strategy Consultant
@ Capco | New York City
Cyber Security Senior Consultant
@ Capco | Chicago, IL
Sr. Product Manager
@ MixMode | Remote, US
Security Compliance Strategist
@ Grab | Petaling Jaya, Malaysia
Cloud Security Architect, Lead
@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)