Description: | Summary: The remote host is missing an update for the 'linux-oracle' package(s) announced via the USN-6918-1 advisory.
Vulnerability Insight: It was discovered that a race condition existed in the Bluetooth subsystem in the Linux kernel when modifying certain settings values through debugfs. A privileged local attacker could use this to cause a denial of service.
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture, - RISC-V architecture, - S390 architecture, - x86 architecture, - Block layer subsystem, - Compute Acceleration Framework, - Accessibility subsystem, - Android drivers, - Drivers core, - Bluetooth drivers, - Clock framework and drivers, - Data acquisition framework and drivers, - Cryptographic API, - Buffer Sharing and Synchronization framework, - GPU drivers, - On-Chip Interconnect management framework, - IOMMU subsystem, - Multiple devices driver, - Media drivers, - VMware VMCI Driver, - Network drivers, - Microsoft Azure Network Adapter (MANA) driver, - Device tree and open firmware driver, - Chrome hardware platform drivers, - i.MX PM domains, - TI SCI PM domains driver, - S/390 drivers, - SCSI drivers, - SPI subsystem, - Thermal drivers, - TTY drivers, - USB subsystem, - Framebuffer layer, - BTRFS file system, - Network file system server daemon, - NILFS2 file system, - File systems infrastructure, - Pstore file system, - SMB network file system, - BPF subsystem, - Bluetooth subsystem, - Netfilter, - io_uring subsystem, - Core kernel, - Extra boot config (XBC), - Memory management, - Amateur Radio drivers, - B.A.T.M.A.N. meshing protocol, - Ethernet bridge, - Networking core, - IPv4 networking, - IPv6 networking, - Multipath TCP, - NFC subsystem, - RDS protocol, - Network traffic control, - SMC sockets, - Sun RPC protocol, - TLS protocol, - Unix domain sockets, - Wireless networking, - eXpress Data Path, - SELinux security module, (CVE-2024-26988, CVE-2024-36023, CVE-2024-35869, CVE-2024-35938, CVE-2024-27000, CVE-2024-35880, CVE-2024-35915, CVE-2024-35959, CVE-2024-35883, CVE-2024-35886, CVE-2024-35976, CVE-2024-35903, CVE-2024-35980, CVE-2024-27020, CVE-2024-35955, CVE-2024-35964, CVE-2024-26980, CVE-2024-35882, CVE-2024-35927, CVE-2024-35884, CVE-2024-35914, CVE-2024-35905, CVE-2024-26925, CVE-2024-35885, CVE-2024-26990, CVE-2024-27012, CVE-2024-35969, CVE-2024-35862, CVE-2024-35956, CVE-2024-35971, CVE-2024-27022, CVE-2024-35935, CVE-2024-26992, CVE-2024-27010, CVE-2024-35892, CVE-2024-26999, CVE-2024-26989, CVE-2024-35963, CVE-2024-35981, CVE-2024-26997, CVE-2024-35920, CVE-2024-35918, CVE-2024-35933, CVE-2024-35867, CVE-2024-35904, CVE-2024-35890, CVE-2024-35968, CVE-2024-35917, CVE-2024-35897, CVE-2024-26922, CVE-2024-36026, CVE-2024-27013, CVE-2024-26991, CVE-2024-26996, CVE-2024-35873, CVE-2024-26987, CVE-2024-35895, CVE-2024-36027, CVE-2024-35896, ... [Please see the references for more information on the vulnerabilities]
Affected Software/OS: 'linux-oracle' package(s) on Ubuntu 24.04.
Solution: Please install the updated package(s).
CVSS Score: 6.8
CVSS Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C
|