Description: | Summary: The remote host is missing an update for the 'linux-gke, linux-nvidia' package(s) announced via the USN-6893-2 advisory.
Vulnerability Insight: It was discovered that a race condition existed in the Bluetooth subsystem in the Linux kernel when modifying certain settings values through debugfs. A privileged local attacker could use this to cause a denial of service. (CVE-2024-24857, CVE-2024-24858, CVE-2024-24859)
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture, - RISC-V architecture, - S390 architecture, - x86 architecture, - Block layer subsystem, - Compute Acceleration Framework, - Accessibility subsystem, - Android drivers, - Drivers core, - Bluetooth drivers, - Clock framework and drivers, - Data acquisition framework and drivers, - Cryptographic API, - Buffer Sharing and Synchronization framework, - GPU drivers, - On-Chip Interconnect management framework, - IOMMU subsystem, - Multiple devices driver, - Media drivers, - VMware VMCI Driver, - Network drivers, - Microsoft Azure Network Adapter (MANA) driver, - Device tree and open firmware driver, - Chrome hardware platform drivers, - i.MX PM domains, - TI SCI PM domains driver, - S/390 drivers, - SCSI drivers, - SPI subsystem, - Thermal drivers, - TTY drivers, - USB subsystem, - Framebuffer layer, - BTRFS file system, - Network file system server daemon, - NILFS2 file system, - File systems infrastructure, - Pstore file system, - SMB network file system, - BPF subsystem, - Bluetooth subsystem, - Netfilter, - io_uring subsystem, - Core kernel, - Extra boot config (XBC), - Memory management, - Amateur Radio drivers, - B.A.T.M.A.N. meshing protocol, - Ethernet bridge, - Networking core, - IPv4 networking, - IPv6 networking, - Multipath TCP, - NFC subsystem, - RDS protocol, - Network traffic control, - SMC sockets, - Sun RPC protocol, - TLS protocol, - Unix domain sockets, - Wireless networking, - eXpress Data Path, - SELinux security module, (CVE-2024-35976, CVE-2024-35873, CVE-2024-35959, CVE-2024-27012, CVE-2024-36025, CVE-2024-35868, CVE-2024-26995, CVE-2024-35916, CVE-2024-36023, CVE-2024-35964, CVE-2024-35890, CVE-2024-26980, CVE-2024-35950, CVE-2024-27006, CVE-2024-35955, CVE-2024-35885, CVE-2024-35960, CVE-2024-35932, CVE-2024-26986, CVE-2024-35884, CVE-2024-35860, CVE-2024-36020, CVE-2024-35930, CVE-2024-35919, CVE-2024-27020, CVE-2024-26928, CVE-2024-35903, CVE-2024-35907, CVE-2024-35904, CVE-2024-35972, CVE-2024-35892, CVE-2024-26921, CVE-2024-35869, CVE-2024-35957, CVE-2024-35967, CVE-2024-35927, CVE-2024-35946, CVE-2024-27000, CVE-2024-35943, CVE-2024-35902, CVE-2024-27013, CVE-2024-35968, CVE-2024-35970, CVE-2024-35865, CVE-2024-36022, CVE-2024-26993, CVE-2024-36027, CVE-2024-35895, CVE-2024-35908, CVE-2024-35901, CVE-2024-35872, CVE-2024-26925, CVE-2024-35917, CVE-2024-35898, CVE-2024-35861, CVE-2024-35900, CVE-2024-26984, ... [Please see the references for more information on the vulnerabilities]
Affected Software/OS: 'linux-gke, linux-nvidia' package(s) on Ubuntu 24.04.
Solution: Please install the updated package(s).
CVSS Score: 6.8
CVSS Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C
|