Description: | Summary: The remote host is missing an update for the 'linux-xilinx-zynqmp' package(s) announced via the USN-7295-1 advisory.
Vulnerability Insight: Ye Zhang and Nicolas Wu discovered that the io_uring subsystem in the Linux kernel did not properly handle locking for rings with IOPOLL, leading to a double-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-21400)
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture, - Block layer subsystem, - ACPI drivers, - Drivers core, - ATA over ethernet (AOE) driver, - TPM device driver, - GPIO subsystem, - GPU drivers, - HID subsystem, - I2C subsystem, - InfiniBand drivers, - Mailbox framework, - Multiple devices driver, - Media drivers, - Network drivers, - NTB driver, - Virtio pmem driver, - Parport drivers, - PCI subsystem, - SPI subsystem, - Direct Digital Synthesis drivers, - TTY drivers, - USB Device Class drivers, - USB Dual Role (OTG-ready) Controller drivers, - USB Serial drivers, - USB Type-C support driver, - Framebuffer layer, - BTRFS file system, - Ceph distributed file system, - Ext4 file system, - F2FS file system, - File systems infrastructure, - JFS file system, - Network file system (NFS) client, - Network file system (NFS) server daemon, - NILFS2 file system, - SMB network file system, - Network traffic control, - Network sockets, - TCP network protocol, - BPF subsystem, - Perf events, - Arbitrary resource management, - Timer substystem drivers, - Tracing infrastructure, - Closures library, - Memory management, - Amateur Radio drivers, - Bluetooth subsystem, - Ethernet bridge, - CAN network layer, - Networking core, - IPv4 networking, - IPv6 networking, - MAC80211 subsystem, - Netfilter, - Netlink, - SCTP protocol, - TIPC protocol, - VMware vSockets driver, - Wireless networking, - XFRM subsystem, - Key management, - FireWire sound drivers, - AudioScience HPI driver, - Amlogic Meson SoC drivers, - KVM core, (CVE-2024-50116, CVE-2024-43863, CVE-2024-47757, CVE-2024-50236, CVE-2024-53104, CVE-2024-47701, CVE-2024-46854, CVE-2024-50024, CVE-2024-46849, CVE-2024-50035, CVE-2024-50262, CVE-2024-50184, CVE-2023-52458, CVE-2024-47696, CVE-2024-49957, CVE-2024-47692, CVE-2024-50007, CVE-2024-49867, CVE-2024-49900, CVE-2024-50167, CVE-2024-47697, CVE-2024-53164, CVE-2024-50179, CVE-2024-44931, CVE-2024-50301, CVE-2024-50218, CVE-2024-49995, CVE-2024-47742, CVE-2024-47756, CVE-2021-47469, CVE-2024-49982, CVE-2024-50229, CVE-2024-49851, CVE-2024-47685, CVE-2024-50265, CVE-2024-50195, CVE-2024-47747, CVE-2024-50273, CVE-2024-53066, CVE-2024-49924, CVE-2024-49963, CVE-2024-50287, CVE-2024-49948, CVE-2024-47674, CVE-2024-40967, CVE-2024-35887, CVE-2024-50044, CVE-2024-50099, CVE-2024-53059, CVE-2024-50171, CVE-2024-50082, CVE-2024-41066, CVE-2024-50202, CVE-2024-49868, ... [Please see the references for more information on the vulnerabilities]
Affected Software/OS: 'linux-xilinx-zynqmp' package(s) on Ubuntu 20.04.
Solution: Please install the updated package(s).
CVSS Score: 9.4
CVSS Vector: AV:N/AC:L/Au:N/C:C/I:N/A:C
|