Description: | Summary: The remote host is missing an update for the 'linux-aws' package(s) announced via the USN-6893-3 advisory.
Vulnerability Insight: It was discovered that a race condition existed in the Bluetooth subsystem in the Linux kernel when modifying certain settings values through debugfs. A privileged local attacker could use this to cause a denial of service. (CVE-2024-24857, CVE-2024-24858, CVE-2024-24859)
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture, - RISC-V architecture, - S390 architecture, - x86 architecture, - Block layer subsystem, - Compute Acceleration Framework, - Accessibility subsystem, - Android drivers, - Drivers core, - Bluetooth drivers, - Clock framework and drivers, - Data acquisition framework and drivers, - Cryptographic API, - Buffer Sharing and Synchronization framework, - GPU drivers, - On-Chip Interconnect management framework, - IOMMU subsystem, - Multiple devices driver, - Media drivers, - VMware VMCI Driver, - Network drivers, - Microsoft Azure Network Adapter (MANA) driver, - Device tree and open firmware driver, - Chrome hardware platform drivers, - i.MX PM domains, - TI SCI PM domains driver, - S/390 drivers, - SCSI drivers, - SPI subsystem, - Thermal drivers, - TTY drivers, - USB subsystem, - Framebuffer layer, - BTRFS file system, - Network file system server daemon, - NILFS2 file system, - File systems infrastructure, - Pstore file system, - SMB network file system, - BPF subsystem, - Bluetooth subsystem, - Netfilter, - io_uring subsystem, - Core kernel, - Extra boot config (XBC), - Memory management, - Amateur Radio drivers, - B.A.T.M.A.N. meshing protocol, - Ethernet bridge, - Networking core, - IPv4 networking, - IPv6 networking, - Multipath TCP, - NFC subsystem, - RDS protocol, - Network traffic control, - SMC sockets, - Sun RPC protocol, - TLS protocol, - Unix domain sockets, - Wireless networking, - eXpress Data Path, - SELinux security module, (CVE-2024-35955, CVE-2024-35921, CVE-2024-35946, CVE-2024-35934, CVE-2024-26993, CVE-2024-35899, CVE-2024-35952, CVE-2024-35894, CVE-2024-35886, CVE-2024-35872, CVE-2024-35970, CVE-2024-35936, CVE-2024-35907, CVE-2024-27013, CVE-2024-35910, CVE-2024-27009, CVE-2024-35875, CVE-2024-36021, CVE-2024-26923, CVE-2024-26997, CVE-2024-35978, CVE-2024-35981, CVE-2024-27015, CVE-2024-26928, CVE-2024-35963, CVE-2024-35897, CVE-2024-27020, CVE-2024-35922, CVE-2024-27001, CVE-2024-27011, CVE-2024-35940, CVE-2024-35871, CVE-2024-35900, CVE-2024-35869, CVE-2024-35905, CVE-2024-35974, CVE-2024-35873, CVE-2024-35882, CVE-2024-35914, CVE-2024-35956, CVE-2024-35887, CVE-2024-35920, CVE-2024-27018, CVE-2024-35880, CVE-2024-35943, CVE-2024-35912, CVE-2024-35979, CVE-2024-35862, CVE-2024-36019, CVE-2024-35950, CVE-2024-35977, CVE-2024-35918, CVE-2024-26992, CVE-2024-35884, CVE-2024-35916, CVE-2024-26817, CVE-2024-35959, ... [Please see the references for more information on the vulnerabilities]
Affected Software/OS: 'linux-aws' package(s) on Ubuntu 24.04.
Solution: Please install the updated package(s).
CVSS Score: 6.8
CVSS Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C
|