Feb. 7, 2024, 10:33 p.m. |

Ubuntu security notices ubuntu.com

Marek Marczykowski-Górecki discovered that the Xen event channel
infrastructure implementation in the Linux kernel contained a race
condition. An attacker in a guest VM could possibly use this to cause a
denial of service (paravirtualized device unavailability). (CVE-2023-34324)

Zheng Wang discovered a use-after-free in the Renesas Ethernet AVB driver
in the Linux kernel during device removal. A privileged attacker could use
this to cause a denial of service (system crash). (CVE-2023-35827)

It was discovered that a race condition existed in …

attacker channel cve denial of service device driver ethernet event free implementation infrastructure kernel linux linux kernel linux kernel vulnerabilities race race condition service use-after-free usn vulnerabilities wang xen

Privacy Engineer

@ Snap Inc. | Santa Monica - 2850 Ocean Park Blvd

Senior Security Researcher - Security Automation (Cortex)

@ Palo Alto Networks | Tel Aviv-Yafo, Israel

Information Systems Security Engineer (ISSE)

@ Interclypse | Annapolis Junction, MD, US

Information Systems Security Officer (ISSO)

@ Interclypse | Annapolis Junction, MD, US

Systems Security Engineer (Hybrid)

@ RTX | FL410: Largo FL MFG 7887 Bryan Dairy Road , Largo, FL, 33777 USA

Principal Cyber Security Engineer (Onsite)

@ RTX | HIA33: Cedar Rapids, IA (Intertrade) 400 Collins Road NE MS 153-220, Cedar Rapids, IA, 52411-6636 USA