Descripción: | Summary: The remote host is missing an update for the 'linux-aws, linux-aws-6.8' package(s) announced via the USN-7311-1 advisory.
Vulnerability Insight: Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture, - x86 architecture, - Block layer subsystem, - Cryptographic API, - ACPI drivers, - Drivers core, - ATA over ethernet (AOE) driver, - Network block device driver, - TPM device driver, - Hardware crypto device drivers, - ARM SCMI message protocol, - EFI core, - GPU drivers, - I2C subsystem, - I3C subsystem, - InfiniBand drivers, - Input Device core drivers, - IOMMU subsystem, - Mailbox framework, - Media drivers, - Ethernet bonding driver, - Network drivers, - Mellanox network drivers, - STMicroelectronics network drivers, - NTB driver, - PCI subsystem, - Alibaba DDR Sub-System Driveway PMU driver, - x86 platform drivers, - Powercap sysfs driver, - Remote Processor subsystem, - SCSI subsystem, - USB Device Class drivers, - vDPA drivers, - Virtio Host (VHOST) subsystem, - Framebuffer layer, - AFS file system, - BTRFS file system, - File systems infrastructure, - Ceph distributed file system, - Ext4 file system, - F2FS file system, - JFS file system, - Network file systems library, - Network file system (NFS) server daemon, - NILFS2 file system, - SMB network file system, - BPF subsystem, - Virtio network driver, - TCP network protocol, - Perf events, - Padata parallel execution mechanism, - RCU subsystem, - Arbitrary resource management, - Static call mechanism, - Tracing infrastructure, - Memory management, - Bluetooth subsystem, - CAN network layer, - Networking core, - Distributed Switch Architecture, - IPv4 networking, - IPv6 networking, - MAC80211 subsystem, - IEEE 802.15.4 subsystem, - NCSI (Network Controller Sideband Interface) driver, - Netfilter, - RxRPC session sockets, - Network traffic control, - SCTP protocol, - TIPC protocol, - VMware vSockets driver, - Wireless networking, - AudioScience HPI driver, - KVM core, (CVE-2024-49867, CVE-2024-47675, CVE-2024-49999, CVE-2024-49884, CVE-2024-49992, CVE-2024-49945, CVE-2024-49889, CVE-2024-49890, CVE-2024-49900, CVE-2024-49934, CVE-2024-49976, CVE-2024-49878, CVE-2024-50008, CVE-2024-49919, CVE-2024-47698, CVE-2024-47731, CVE-2024-47673, CVE-2024-49959, CVE-2024-47715, CVE-2024-49912, CVE-2024-47702, CVE-2024-50007, CVE-2024-49953, CVE-2024-49929, CVE-2024-47730, CVE-2024-49966, CVE-2024-47756, CVE-2024-47687, CVE-2024-50002, CVE-2024-49911, CVE-2024-47714, CVE-2024-47704, CVE-2024-50017, CVE-2024-47709, CVE-2024-49858, CVE-2024-47712, CVE-2024-49870, CVE-2024-49883, CVE-2024-47672, CVE-2024-49963, CVE-2024-49926, CVE-2024-49860, CVE-2024-47748, CVE-2024-49928, CVE-2024-49931, CVE-2024-47749, CVE-2024-49913, CVE-2024-49957, CVE-2024-49948, CVE-2024-47732, CVE-2024-47753, CVE-2024-47727, CVE-2024-49896, CVE-2024-47707, CVE-2024-47743, ... [Please see the references for more information on the vulnerabilities]
Affected Software/OS: 'linux-aws, linux-aws-6.8' package(s) on Ubuntu 22.04, Ubuntu 24.04.
Solution: Please install the updated package(s).
CVSS Score: 9.4
CVSS Vector: AV:N/AC:L/Au:N/C:C/I:N/A:C
|