Descripción: | Summary: The remote host is missing an update for the 'linux-ibm' package(s) announced via the USN-7294-3 advisory.
Vulnerability Insight: Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture, - Block layer subsystem, - ACPI drivers, - Drivers core, - ATA over ethernet (AOE) driver, - TPM device driver, - GPIO subsystem, - GPU drivers, - HID subsystem, - I2C subsystem, - InfiniBand drivers, - Mailbox framework, - Multiple devices driver, - Media drivers, - Network drivers, - NTB driver, - Virtio pmem driver, - Parport drivers, - PCI subsystem, - SPI subsystem, - Direct Digital Synthesis drivers, - USB Device Class drivers, - USB Dual Role (OTG-ready) Controller drivers, - USB Serial drivers, - USB Type-C support driver, - Framebuffer layer, - BTRFS file system, - Ceph distributed file system, - Ext4 file system, - F2FS file system, - File systems infrastructure, - JFS file system, - Network file system (NFS) client, - Network file system (NFS) server daemon, - NILFS2 file system, - SMB network file system, - Network traffic control, - Network sockets, - TCP network protocol, - BPF subsystem, - Perf events, - Arbitrary resource management, - Timer substystem drivers, - Tracing infrastructure, - Closures library, - Memory management, - Amateur Radio drivers, - Bluetooth subsystem, - Ethernet bridge, - CAN network layer, - Networking core, - IPv4 networking, - IPv6 networking, - MAC80211 subsystem, - Netfilter, - Netlink, - SCTP protocol, - TIPC protocol, - Wireless networking, - XFRM subsystem, - Key management, - FireWire sound drivers, - AudioScience HPI driver, - Amlogic Meson SoC drivers, - KVM core, (CVE-2024-47698, CVE-2024-49868, CVE-2024-50006, CVE-2024-40965, CVE-2024-50233, CVE-2024-47671, CVE-2024-49944, CVE-2024-47684, CVE-2024-50134, CVE-2024-50279, CVE-2024-50302, CVE-2024-40953, CVE-2024-50234, CVE-2024-41066, CVE-2024-50040, CVE-2024-47701, CVE-2024-50033, CVE-2024-50007, CVE-2024-50143, CVE-2024-41016, CVE-2024-53059, CVE-2024-50195, CVE-2024-50202, CVE-2024-47749, CVE-2024-47685, CVE-2024-50267, CVE-2024-49965, CVE-2024-49903, CVE-2024-49883, CVE-2024-50035, CVE-2024-46849, CVE-2024-53061, CVE-2024-50151, CVE-2024-49995, CVE-2024-49867, CVE-2024-49962, CVE-2024-50218, CVE-2024-50039, CVE-2024-50148, CVE-2024-49900, CVE-2024-50287, CVE-2024-50150, CVE-2024-49879, CVE-2024-47757, CVE-2024-49997, CVE-2024-50045, CVE-2024-47742, CVE-2024-47679, CVE-2024-53063, CVE-2024-49878, CVE-2024-49860, CVE-2024-35896, CVE-2024-40911, CVE-2024-42252, CVE-2024-47723, CVE-2024-47674, CVE-2024-47737, CVE-2024-50282, CVE-2024-44931, CVE-2024-49938, CVE-2024-49963, CVE-2024-50290, CVE-2024-49958, CVE-2021-47469, CVE-2024-47670, CVE-2024-50116, CVE-2024-50262, CVE-2024-50082, CVE-2023-52917, CVE-2024-50117, CVE-2024-50131, CVE-2024-47699, CVE-2024-49896, CVE-2024-49957, CVE-2024-49952, ... [Please see the references for more information on the vulnerabilities]
Affected Software/OS: 'linux-ibm' package(s) on Ubuntu 20.04.
Solution: Please install the updated package(s).
CVSS Score: 9.4
CVSS Vector: AV:N/AC:L/Au:N/C:C/I:N/A:C
|