Description: | Summary: The remote host is missing an update for the 'linux, linux-aws, linux-aws-5.4, linux-gcp, linux-gcp-5.4, linux-gkeop, linux-hwe-5.4, linux-ibm, linux-ibm-5.4, linux-iot, linux-kvm, linux-raspi, linux-xilinx-zynqmp' package(s) announced via the USN-6951-1 advisory.
Vulnerability Insight: Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture, - M68K architecture, - User-Mode Linux (UML), - x86 architecture, - Accessibility subsystem, - Character device driver, - Clock framework and drivers, - CPU frequency scaling framework, - Hardware crypto device drivers, - Buffer Sharing and Synchronization framework, - FireWire subsystem, - GPU drivers, - HW tracing, - Macintosh device drivers, - Multiple devices driver, - Media drivers, - Network drivers, - Pin controllers subsystem, - S/390 drivers, - SCSI drivers, - SoundWire subsystem, - Greybus lights staging drivers, - TTY drivers, - Framebuffer layer, - Virtio drivers, - 9P distributed file system, - eCrypt file system, - EROFS file system, - Ext4 file system, - F2FS file system, - JFFS2 file system, - Network file system client, - NILFS2 file system, - SMB network file system, - Kernel debugger infrastructure, - IRQ subsystem, - Tracing infrastructure, - Dynamic debug library, - 9P file system network protocol, - Bluetooth subsystem, - Networking core, - IPv4 networking, - IPv6 networking, - Netfilter, - NET/ROM layer, - NFC subsystem, - NSH protocol, - Open vSwitch, - Phonet protocol, - TIPC protocol, - Unix domain sockets, - Wireless networking, - eXpress Data Path, - XFRM subsystem, - ALSA framework, (CVE-2024-36934, CVE-2024-38578, CVE-2024-38600, CVE-2024-27399, CVE-2024-39276, CVE-2024-38596, CVE-2024-36933, CVE-2024-36919, CVE-2024-35976, CVE-2024-37356, CVE-2023-52585, CVE-2024-38558, CVE-2024-38560, CVE-2024-38634, CVE-2024-36959, CVE-2024-38633, CVE-2024-36886, CVE-2024-27398, CVE-2024-39493, CVE-2024-26886, CVE-2024-31076, CVE-2024-38559, CVE-2024-38615, CVE-2024-36971, CVE-2024-38627, CVE-2024-36964, CVE-2024-38780, CVE-2024-37353, CVE-2024-38621, CVE-2024-36883, CVE-2024-39488, CVE-2024-38661, CVE-2024-36939, CVE-2024-38589, CVE-2024-38565, CVE-2024-38381, CVE-2024-35947, CVE-2024-36905, CVE-2022-48772, CVE-2024-36017, CVE-2024-36946, CVE-2024-27401, CVE-2024-38579, CVE-2024-38612, CVE-2024-38598, CVE-2024-38635, CVE-2024-38587, CVE-2024-38567, CVE-2024-38549, CVE-2024-36960, CVE-2023-52752, CVE-2024-27019, CVE-2024-38601, CVE-2024-39489, CVE-2024-39467, CVE-2023-52882, CVE-2024-38583, CVE-2024-39480, CVE-2024-38607, CVE-2024-36940, CVE-2024-38659, CVE-2023-52434, CVE-2024-36015, CVE-2024-38582, CVE-2024-36950, CVE-2024-38552, CVE-2024-33621, CVE-2024-36954, CVE-2024-39475, CVE-2024-39301, CVE-2024-38599, CVE-2024-36902, CVE-2024-36286, CVE-2024-38613, CVE-2024-38637, CVE-2024-36941, CVE-2024-36014, CVE-2024-38618, CVE-2024-36904, CVE-2024-36270, CVE-2024-39292, CVE-2024-39471, CVE-2022-48674)
Affected Software/OS: 'linux, linux-aws, linux-aws-5.4, linux-gcp, linux-gcp-5.4, linux-gkeop, linux-hwe-5.4, linux-ibm, linux-ibm-5.4, linux-iot, linux-kvm, linux-raspi, linux-xilinx-zynqmp' package(s) on Ubuntu 18.04, Ubuntu 20.04.
Solution: Please install the updated package(s).
CVSS Score: 7.7
CVSS Vector: AV:A/AC:L/Au:S/C:C/I:C/A:C
|