vulnerability
Ubuntu: (Multiple Advisories) (CVE-2024-53136): Linux kernel vulnerabilities
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
4 | (AV:L/AC:M/Au:S/C:N/I:N/A:C) | 2024-12-04 | 2025-03-28 | 2025-04-29 |
Severity
4
CVSS
(AV:L/AC:M/Au:S/C:N/I:N/A:C)
Published
2024-12-04
Added
2025-03-28
Modified
2025-04-29
Description
In the Linux kernel, the following vulnerability has been resolved:
mm: revert "mm: shmem: fix data-race in shmem_getattr()"
Revert d949d1d14fa2 ("mm: shmem: fix data-race in shmem_getattr()") as
suggested by Chuck [1]. It is causing deadlocks when accessing tmpfs over
NFS.
As Hugh commented, "added just to silence a syzbot sanitizer splat: added
where there has never been any practical problem".
Solution(s)
ubuntu-upgrade-linux-image-5-15-0-1062-gkeopubuntu-upgrade-linux-image-5-15-0-1072-ibmubuntu-upgrade-linux-image-5-15-0-1073-intel-iot-realtimeubuntu-upgrade-linux-image-5-15-0-1074-nvidiaubuntu-upgrade-linux-image-5-15-0-1074-nvidia-lowlatencyubuntu-upgrade-linux-image-5-15-0-1074-raspiubuntu-upgrade-linux-image-5-15-0-1075-intel-iotgubuntu-upgrade-linux-image-5-15-0-1076-kvmubuntu-upgrade-linux-image-5-15-0-1077-gkeubuntu-upgrade-linux-image-5-15-0-1077-intel-iotgubuntu-upgrade-linux-image-5-15-0-1077-oracleubuntu-upgrade-linux-image-5-15-0-1079-gcpubuntu-upgrade-linux-image-5-15-0-1079-gcp-fipsubuntu-upgrade-linux-image-5-15-0-1080-awsubuntu-upgrade-linux-image-5-15-0-1080-aws-fipsubuntu-upgrade-linux-image-5-15-0-1080-realtimeubuntu-upgrade-linux-image-5-15-0-1081-gcpubuntu-upgrade-linux-image-5-15-0-1083-azure-fipsubuntu-upgrade-linux-image-5-15-0-1084-azureubuntu-upgrade-linux-image-5-15-0-1086-azureubuntu-upgrade-linux-image-5-15-0-1086-azure-fdeubuntu-upgrade-linux-image-5-15-0-135-fipsubuntu-upgrade-linux-image-5-15-0-135-genericubuntu-upgrade-linux-image-5-15-0-135-generic-64kubuntu-upgrade-linux-image-5-15-0-135-generic-lpaeubuntu-upgrade-linux-image-5-15-0-135-lowlatencyubuntu-upgrade-linux-image-5-15-0-135-lowlatency-64kubuntu-upgrade-linux-image-5-15-0-136-genericubuntu-upgrade-linux-image-5-15-0-136-generic-64kubuntu-upgrade-linux-image-5-15-0-136-generic-lpaeubuntu-upgrade-linux-image-5-4-0-1060-xilinx-zynqmpubuntu-upgrade-linux-image-5-4-0-1088-ibmubuntu-upgrade-linux-image-5-4-0-1090-ibmubuntu-upgrade-linux-image-5-4-0-1101-bluefieldubuntu-upgrade-linux-image-5-4-0-1129-kvmubuntu-upgrade-linux-image-5-4-0-1140-oracleubuntu-upgrade-linux-image-5-4-0-1142-awsubuntu-upgrade-linux-image-5-4-0-1142-aws-fipsubuntu-upgrade-linux-image-5-4-0-1145-gcpubuntu-upgrade-linux-image-5-4-0-1145-gcp-fipsubuntu-upgrade-linux-image-5-4-0-1147-azureubuntu-upgrade-linux-image-5-4-0-1147-azure-fipsubuntu-upgrade-linux-image-5-4-0-211-genericubuntu-upgrade-linux-image-5-4-0-211-generic-lpaeubuntu-upgrade-linux-image-5-4-0-211-lowlatencyubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-aws-fipsubuntu-upgrade-linux-image-aws-lts-20-04ubuntu-upgrade-linux-image-aws-lts-22-04ubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-azure-cvmubuntu-upgrade-linux-image-azure-fdeubuntu-upgrade-linux-image-azure-fipsubuntu-upgrade-linux-image-azure-lts-20-04ubuntu-upgrade-linux-image-azure-lts-22-04ubuntu-upgrade-linux-image-bluefieldubuntu-upgrade-linux-image-fipsubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-gcp-fipsubuntu-upgrade-linux-image-gcp-lts-20-04ubuntu-upgrade-linux-image-gcp-lts-22-04ubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-64kubuntu-upgrade-linux-image-generic-64k-hwe-20-04ubuntu-upgrade-linux-image-generic-hwe-18-04ubuntu-upgrade-linux-image-generic-hwe-20-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-20-04ubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-gke-5-15ubuntu-upgrade-linux-image-gkeopubuntu-upgrade-linux-image-gkeop-5-15ubuntu-upgrade-linux-image-ibmubuntu-upgrade-linux-image-ibm-lts-20-04ubuntu-upgrade-linux-image-intelubuntu-upgrade-linux-image-intel-iot-realtimeubuntu-upgrade-linux-image-intel-iotgubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-64kubuntu-upgrade-linux-image-lowlatency-64k-hwe-20-04ubuntu-upgrade-linux-image-lowlatency-hwe-18-04ubuntu-upgrade-linux-image-lowlatency-hwe-20-04ubuntu-upgrade-linux-image-nvidiaubuntu-upgrade-linux-image-nvidia-lowlatencyubuntu-upgrade-linux-image-oemubuntu-upgrade-linux-image-oem-20-04ubuntu-upgrade-linux-image-oem-20-04bubuntu-upgrade-linux-image-oem-20-04cubuntu-upgrade-linux-image-oem-20-04dubuntu-upgrade-linux-image-oem-osp1ubuntu-upgrade-linux-image-oracleubuntu-upgrade-linux-image-oracle-lts-20-04ubuntu-upgrade-linux-image-oracle-lts-22-04ubuntu-upgrade-linux-image-raspiubuntu-upgrade-linux-image-raspi-nolpaeubuntu-upgrade-linux-image-realtimeubuntu-upgrade-linux-image-snapdragon-hwe-18-04ubuntu-upgrade-linux-image-virtualubuntu-upgrade-linux-image-virtual-hwe-18-04ubuntu-upgrade-linux-image-virtual-hwe-20-04ubuntu-upgrade-linux-image-xilinx-zynqmp
References
- CVE-2024-53136
- https://attackerkb.com/topics/CVE-2024-53136
- UBUNTU-USN-7387-1
- UBUNTU-USN-7387-2
- UBUNTU-USN-7387-3
- UBUNTU-USN-7388-1
- UBUNTU-USN-7391-1
- UBUNTU-USN-7392-1
- UBUNTU-USN-7392-2
- UBUNTU-USN-7392-3
- UBUNTU-USN-7392-4
- UBUNTU-USN-7407-1
- UBUNTU-USN-7421-1
- UBUNTU-USN-7459-1
- UBUNTU-USN-7459-2
- UBUNTU-USN-7463-1
- URL-https://git.kernel.org/linus/d1aa0c04294e29883d65eac6c2f72fe95cc7c049
- URL-https://git.kernel.org/stable/c/5874c1150e77296565ad6e495ef41fbf87570d14
- URL-https://git.kernel.org/stable/c/64e67e8694252c1bf01b802ee911be3fee62c36b
- URL-https://git.kernel.org/stable/c/901dc2ad7c3789fa87dc3956f6697c5d62d5cf7e
- URL-https://git.kernel.org/stable/c/d1aa0c04294e29883d65eac6c2f72fe95cc7c049
- URL-https://ubuntu.com/security/notices/USN-7387-1
- URL-https://ubuntu.com/security/notices/USN-7388-1
- URL-https://www.cve.org/CVERecord?id=CVE-2024-53136

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.