Description: | Summary: The remote host is missing an update for the 'linux, linux-aws, linux-kvm, linux-lts-xenial' package(s) announced via the USN-7148-1 advisory.
Vulnerability Insight: Lyu Tao discovered that the NFS implementation in the Linux kernel did not properly handle requests to open a directory on a regular file. A local attacker could use this to expose sensitive information (kernel memory).
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - x86 architecture, - ATM drivers, - Device frequency scaling framework, - GPU drivers, - Hardware monitoring drivers, - VMware VMCI Driver, - MTD block device drivers, - Network drivers, - Device tree and open firmware driver, - SCSI subsystem, - USB Serial drivers, - BTRFS file system, - File systems infrastructure, - F2FS file system, - JFS file system, - NILFS2 file system, - Netfilter, - Memory management, - Ethernet bridge, - IPv6 networking, - Logical Link layer, - MAC80211 subsystem, - NFC subsystem, - Network traffic control, (CVE-2021-47055, CVE-2024-26675, CVE-2024-42244, CVE-2024-46743, CVE-2024-41095, CVE-2024-46756, CVE-2024-46723, CVE-2024-46759, CVE-2024-35877, CVE-2024-38538, CVE-2024-26668, CVE-2024-44998, CVE-2024-42309, CVE-2024-46758, CVE-2024-46800, CVE-2022-48733, CVE-2023-52531, CVE-2023-52599, CVE-2024-46722, CVE-2024-42240, CVE-2024-44987, CVE-2023-52502, CVE-2023-52578, CVE-2024-41059, CVE-2024-41071, CVE-2024-44942, CVE-2024-46738, CVE-2022-48943, CVE-2023-52614, CVE-2024-27397, CVE-2024-38560, CVE-2024-43882, CVE-2024-42104, CVE-2024-46757, CVE-2024-26636, CVE-2024-26633, CVE-2024-41089, CVE-2024-42310, CVE-2022-48938)
Affected Software/OS: 'linux, linux-aws, linux-kvm, linux-lts-xenial' package(s) on Ubuntu 14.04, Ubuntu 16.04.
Solution: Please install the updated package(s).
CVSS Score: 1.9
CVSS Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N
|