July 4, 2024, 7:11 p.m. |

Ubuntu security notices ubuntu.com

It was discovered that the ext4 file system implementation in the Linux
kernel did not properly validate data state on write operations. An
attacker could use this to construct a malicious ext4 file system image
that, when mounted, could cause a denial of service (system crash).
(CVE-2021-33631)

It was discovered that the ATA over Ethernet (AoE) driver in the Linux
kernel contained a race condition, leading to a use-after-free
vulnerability. An attacker could use this to cause a …

ata attacker azure crash cve data denial of service ethernet ext4 file file system image implementation kernel linux linux kernel malicious operations service state system usn vulnerabilities

Sr. IT Internal Auditor

@ CCC Intelligent Solutions | Chicago (Green St), IL

Sr. Principal Product Manager

@ Forcepoint | USA - Remote

Principal Software Engineer

@ Rapid7 | NIS Belfast

Consultant as Network & Security Administrator ( Cloud Oriented )

@ Teamwork Corporate | Moka, Mauritius

Access Engineer

@ Booz Allen Hamilton | USA, VA, Arlington (1550 Crystal Dr Suite 1000) client

Associate, Technology Audit

@ BlackRock | AT8 - 725 Ponce de Leon Ave NE, Atlanta