Description: | Summary: The remote host is missing an update for the 'linux, linux-gcp, linux-gcp-5.15, linux-gke, linux-gkeop, linux-ibm, linux-ibm-5.15, linux-kvm, linux-lowlatency, linux-lowlatency-hwe-5.15, linux-nvidia, linux-oracle, linux-oracle-5.15, linux-raspi' package(s) announced via the USN-7166-1 advisory.
Vulnerability Insight: Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture, - RISC-V architecture, - S390 architecture, - x86 architecture, - Block layer subsystem, - ACPI drivers, - Drivers core, - ATA over ethernet (AOE) driver, - TPM device driver, - Clock framework and drivers, - Buffer Sharing and Synchronization framework, - EFI core, - GPIO subsystem, - GPU drivers, - HID subsystem, - I2C subsystem, - InfiniBand drivers, - Input Device core drivers, - Mailbox framework, - Media drivers, - Ethernet bonding driver, - Network drivers, - Mellanox network drivers, - Microsoft Azure Network Adapter (MANA) driver, - STMicroelectronics network drivers, - NTB driver, - Virtio pmem driver, - PCI subsystem, - x86 platform drivers, - S/390 drivers, - SCSI subsystem, - SPI subsystem, - Thermal drivers, - USB Device Class drivers, - USB Type-C Port Controller Manager driver, - VFIO drivers, - Virtio Host (VHOST) subsystem, - Framebuffer layer, - 9P distributed file system, - BTRFS file system, - Ceph distributed file system, - File systems infrastructure, - Ext4 file system, - F2FS file system, - GFS2 file system, - JFS file system, - Network file system (NFS) client, - Network file system (NFS) server daemon, - NILFS2 file system, - Network file system (NFS) superblock, - Bluetooth subsystem, - Network traffic control, - Network sockets, - TCP network protocol, - BPF subsystem, - Perf events, - Kernel thread helper (kthread), - Padata parallel execution mechanism, - Arbitrary resource management, - Static call mechanism, - Tracing infrastructure, - Memory management, - Ethernet bridge, - CAN network layer, - Networking core, - IPv4 networking, - IPv6 networking, - MAC80211 subsystem, - Multipath TCP, - Netfilter, - Netlink, - SCTP protocol, - TIPC protocol, - SELinux security module, - Simplified Mandatory Access Control Kernel framework, - AudioScience HPI driver, - Amlogic Meson SoC drivers, - USB sound devices, (CVE-2024-49944, CVE-2024-49907, CVE-2024-50062, CVE-2024-36893, CVE-2024-49985, CVE-2024-49903, CVE-2024-49886, CVE-2024-50180, CVE-2024-47757, CVE-2024-49938, CVE-2024-49902, CVE-2024-47709, CVE-2024-49884, CVE-2024-49967, CVE-2024-49977, CVE-2024-47734, CVE-2024-49954, CVE-2024-49963, CVE-2024-47747, CVE-2024-50008, CVE-2024-47696, CVE-2024-50038, CVE-2024-46695, CVE-2024-47705, CVE-2024-49957, CVE-2024-38538, CVE-2024-50019, CVE-2024-38544, CVE-2024-50003, CVE-2024-50095, CVE-2024-50000, CVE-2024-49981, CVE-2024-49863, CVE-2024-47710, CVE-2024-49983, CVE-2024-26947, CVE-2024-46852, CVE-2024-49871, CVE-2024-49936, CVE-2024-47720, CVE-2024-49881, CVE-2024-47672, CVE-2024-50040, CVE-2024-49997, CVE-2024-50044, CVE-2023-52532, CVE-2024-47740, ... [Please see the references for more information on the vulnerabilities]
Affected Software/OS: 'linux, linux-gcp, linux-gcp-5.15, linux-gke, linux-gkeop, linux-ibm, linux-ibm-5.15, linux-kvm, linux-lowlatency, linux-lowlatency-hwe-5.15, linux-nvidia, linux-oracle, linux-oracle-5.15, linux-raspi' package(s) on Ubuntu 20.04, Ubuntu 22.04.
Solution: Please install the updated package(s).
CVSS Score: 9.4
CVSS Vector: AV:N/AC:L/Au:N/C:C/I:N/A:C
|