Description: | Summary: The remote host is missing an update for the 'linux-kvm' package(s) announced via the USN-7294-4 advisory.
Vulnerability Insight: Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture, - Block layer subsystem, - ACPI drivers, - Drivers core, - ATA over ethernet (AOE) driver, - TPM device driver, - GPIO subsystem, - GPU drivers, - HID subsystem, - I2C subsystem, - InfiniBand drivers, - Mailbox framework, - Multiple devices driver, - Media drivers, - Network drivers, - NTB driver, - Virtio pmem driver, - Parport drivers, - PCI subsystem, - SPI subsystem, - Direct Digital Synthesis drivers, - USB Device Class drivers, - USB Dual Role (OTG-ready) Controller drivers, - USB Serial drivers, - USB Type-C support driver, - Framebuffer layer, - BTRFS file system, - Ceph distributed file system, - Ext4 file system, - F2FS file system, - File systems infrastructure, - JFS file system, - Network file system (NFS) client, - Network file system (NFS) server daemon, - NILFS2 file system, - SMB network file system, - Network traffic control, - Network sockets, - TCP network protocol, - BPF subsystem, - Perf events, - Arbitrary resource management, - Timer substystem drivers, - Tracing infrastructure, - Closures library, - Memory management, - Amateur Radio drivers, - Bluetooth subsystem, - Ethernet bridge, - CAN network layer, - Networking core, - IPv4 networking, - IPv6 networking, - MAC80211 subsystem, - Netfilter, - Netlink, - SCTP protocol, - TIPC protocol, - Wireless networking, - XFRM subsystem, - Key management, - FireWire sound drivers, - AudioScience HPI driver, - Amlogic Meson SoC drivers, - KVM core, (CVE-2024-47672, CVE-2024-50273, CVE-2024-49896, CVE-2024-49962, CVE-2024-50007, CVE-2024-47706, CVE-2024-50302, CVE-2024-50299, CVE-2024-49959, CVE-2024-49973, CVE-2024-47674, CVE-2024-50143, CVE-2024-50278, CVE-2024-50184, CVE-2024-49892, CVE-2024-50044, CVE-2024-47701, CVE-2024-49860, CVE-2024-47692, CVE-2024-49948, CVE-2024-50039, CVE-2024-50006, CVE-2024-53066, CVE-2024-49944, CVE-2024-43863, CVE-2024-47756, CVE-2024-50082, CVE-2024-50237, CVE-2024-50262, CVE-2024-49900, CVE-2024-50059, CVE-2024-50194, CVE-2024-53063, CVE-2024-47697, CVE-2024-49975, CVE-2024-50033, CVE-2024-50148, CVE-2024-50116, CVE-2024-50168, CVE-2024-47747, CVE-2024-53104, CVE-2024-50218, CVE-2024-50279, CVE-2024-46853, CVE-2024-46854, CVE-2024-50127, CVE-2024-49995, CVE-2024-50282, CVE-2024-47685, CVE-2024-50296, CVE-2024-50099, CVE-2024-50199, CVE-2024-49879, CVE-2024-50287, CVE-2024-50265, CVE-2024-50269, CVE-2024-47698, CVE-2024-49868, CVE-2024-50035, CVE-2024-47709, CVE-2024-50024, CVE-2024-50301, CVE-2024-50142, CVE-2024-53059, CVE-2024-50008, CVE-2024-49997, CVE-2024-46849, CVE-2024-50290, CVE-2024-40953, CVE-2024-49985, CVE-2024-47737, CVE-2024-49883, CVE-2024-50040, CVE-2024-49958, CVE-2024-50205, ... [Please see the references for more information on the vulnerabilities]
Affected Software/OS: 'linux-kvm' package(s) on Ubuntu 20.04.
Solution: Please install the updated package(s).
CVSS Score: 9.4
CVSS Vector: AV:N/AC:L/Au:N/C:C/I:N/A:C
|