Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.12.2024.6921.1
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-6921-1)
Summary:The remote host is missing an update for the 'linux, linux-aws, linux-gcp, linux-gke, linux-ibm, linux-nvidia, linux-oem-6.8, linux-raspi' package(s) announced via the USN-6921-1 advisory.
Description:Summary:
The remote host is missing an update for the 'linux, linux-aws, linux-gcp, linux-gke, linux-ibm, linux-nvidia, linux-oem-6.8, linux-raspi' package(s) announced via the USN-6921-1 advisory.

Vulnerability Insight:
Benedict Schluter, Supraja Sridhara, Andrin Bertschi, and Shweta Shinde
discovered that an untrusted hypervisor could inject malicious #VC
interrupts and compromise the security guarantees of AMD SEV-SNP. This flaw
is known as WeSee. A local attacker in control of the hypervisor could use
this to expose sensitive information or possibly execute arbitrary code in
the trusted execution environment. (CVE-2024-25742)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- DMA engine subsystem,
- HID subsystem,
- I2C subsystem,
- PHY drivers,
- TTY drivers,
- IPv4 networking,
(CVE-2024-35990, CVE-2024-35997, CVE-2024-35992, CVE-2024-35984,
CVE-2024-36008, CVE-2024-36016)

Affected Software/OS:
'linux, linux-aws, linux-gcp, linux-gke, linux-ibm, linux-nvidia, linux-oem-6.8, linux-raspi' package(s) on Ubuntu 24.04.

Solution:
Please install the updated package(s).

CVSS Score:
4.6

CVSS Vector:
AV:L/AC:L/Au:S/C:N/I:N/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2024-25742
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.9
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e3ef461af35a8c74f2f4ce6616491ddb355a208f
https://github.com/torvalds/linux/commit/e3ef461af35a8c74f2f4ce6616491ddb355a208f
Common Vulnerability Exposure (CVE) ID: CVE-2024-35984
https://git.kernel.org/stable/c/357c64ef1ef39b1e7cd91ab6bdd304d043702c83
https://git.kernel.org/stable/c/40f1d79f07b49c8a64a861706e5163f2db4bd95d
https://git.kernel.org/stable/c/4e75e222d397c6752b229ed72fc4644c8c36ecde
https://git.kernel.org/stable/c/5a09eae9a7db597fe0c1fc91636205b4a25d2620
https://git.kernel.org/stable/c/5fd72404587d7db4acb2d241fd8c387afb0a7aec
https://git.kernel.org/stable/c/91811a31b68d3765b3065f4bb6d7d6d84a7cfc9f
https://git.kernel.org/stable/c/ad3c3ac7a03be3697114f781193dd3e9d97e6e23
https://git.kernel.org/stable/c/e3425674ff68dc521c57c6eabad0cbd20a027d85
Common Vulnerability Exposure (CVE) ID: CVE-2024-35990
https://git.kernel.org/stable/c/0ccac964520a6f19e355652c8ca38af2a7f27076
https://git.kernel.org/stable/c/244296cc3a155199a8b080d19e645d7d49081a38
https://git.kernel.org/stable/c/8bf574183282d219cfa991f7df37aad491d74c11
https://git.kernel.org/stable/c/8e3c94767cad5150198e4337c8b91f3bb068e14b
https://git.kernel.org/stable/c/c660be571609e03e7d5972343536a736fcb31557
https://git.kernel.org/stable/c/fcdd5bb4a8c81c64c1334d7e0aba41a8829a24de
Common Vulnerability Exposure (CVE) ID: CVE-2024-35992
https://git.kernel.org/stable/c/40406dfbc060503d2e0a9e637e98493c54997b3d
https://git.kernel.org/stable/c/610f175d2e16fb2436ba7974b990563002c20d07
https://git.kernel.org/stable/c/976df695f579bbb2914114b4e9974fe4ed1eb813
https://git.kernel.org/stable/c/e4308bc22b9d46cf33165c9dfaeebcf29cd56f04
Common Vulnerability Exposure (CVE) ID: CVE-2024-35997
https://git.kernel.org/stable/c/0561b65fbd53d3e788c5b0222d9112ca016fd6a1
https://git.kernel.org/stable/c/21bfca822cfc1e71796124e93b46e0d9fa584401
https://git.kernel.org/stable/c/29e94f295bad5be59cf4271a93e22cdcf5536722
https://git.kernel.org/stable/c/418c5575d56410c6e186ab727bf32ae32447d497
https://git.kernel.org/stable/c/5095b93021b899f54c9355bebf36d78854c33a22
https://git.kernel.org/stable/c/9c0f59e47a90c54d0153f8ddc0f80d7a36207d0e
https://git.kernel.org/stable/c/b65fb50e04a95eec34a9d1bc138454a98a5578d8
https://git.kernel.org/stable/c/c448a9fd50f77e8fb9156ff64848aa4295eb3003
Common Vulnerability Exposure (CVE) ID: CVE-2024-36008
https://git.kernel.org/stable/c/03b5a9b2b526862b21bcc31976e393a6e63785d1
https://git.kernel.org/stable/c/58a4c9b1e5a3e53c9148e80b90e1e43897ce77d1
https://git.kernel.org/stable/c/7a25bfd12733a8f38f8ca47c581f876c3d481ac0
https://git.kernel.org/stable/c/7da0f91681c4902bc5c210356fdd963b04d5d1d4
https://git.kernel.org/stable/c/8240c7308c941db4d9a0a91b54eca843c616a655
https://git.kernel.org/stable/c/c71ea3534ec0936fc57e6fb271c7cc6a2f68c295
Common Vulnerability Exposure (CVE) ID: CVE-2024-36016
https://git.kernel.org/stable/c/0fb736c9931e02dbc7d9a75044c8e1c039e50f04
https://git.kernel.org/stable/c/46f52c89a7e7d2691b97a9728e4591d071ca8abc
https://git.kernel.org/stable/c/47388e807f85948eefc403a8a5fdc5b406a65d5a
https://git.kernel.org/stable/c/4c267110fc110390704cc065edb9817fdd10ff54
https://git.kernel.org/stable/c/774d83b008eccb1c48c14dc5486e7aa255731350
https://git.kernel.org/stable/c/9513d4148950b05bc99fa7314dc883cc0e1605e5
https://git.kernel.org/stable/c/b229bc6c6ea9fe459fc3fa94fd0a27a2f32aca56
https://git.kernel.org/stable/c/b890d45aaf02b564e6cae2d2a590f9649330857d
https://git.kernel.org/stable/c/f126ce7305fe88f49cdabc6db4168b9318898ea3
CopyrightCopyright (C) 2024 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.