Description: | Summary: The remote host is missing an update for the 'linux-oracle, linux-oracle-6.8' package(s) announced via the USN-7303-2 advisory.
Vulnerability Insight: Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture, - x86 architecture, - Block layer subsystem, - Cryptographic API, - ACPI drivers, - Drivers core, - ATA over ethernet (AOE) driver, - Network block device driver, - TPM device driver, - Hardware crypto device drivers, - ARM SCMI message protocol, - EFI core, - GPU drivers, - I2C subsystem, - I3C subsystem, - InfiniBand drivers, - Input Device core drivers, - IOMMU subsystem, - Mailbox framework, - Media drivers, - Ethernet bonding driver, - Network drivers, - Mellanox network drivers, - STMicroelectronics network drivers, - NTB driver, - PCI subsystem, - Alibaba DDR Sub-System Driveway PMU driver, - x86 platform drivers, - Powercap sysfs driver, - Remote Processor subsystem, - SCSI subsystem, - USB Device Class drivers, - vDPA drivers, - Virtio Host (VHOST) subsystem, - Framebuffer layer, - AFS file system, - BTRFS file system, - File systems infrastructure, - Ceph distributed file system, - Ext4 file system, - F2FS file system, - JFS file system, - Network file systems library, - Network file system (NFS) server daemon, - NILFS2 file system, - SMB network file system, - BPF subsystem, - Virtio network driver, - TCP network protocol, - Perf events, - Padata parallel execution mechanism, - RCU subsystem, - Arbitrary resource management, - Static call mechanism, - Tracing infrastructure, - Memory management, - Bluetooth subsystem, - CAN network layer, - Networking core, - Distributed Switch Architecture, - IPv4 networking, - IPv6 networking, - MAC80211 subsystem, - IEEE 802.15.4 subsystem, - NCSI (Network Controller Sideband Interface) driver, - RxRPC session sockets, - SCTP protocol, - TIPC protocol, - Wireless networking, - AudioScience HPI driver, - KVM core, (CVE-2024-47718, CVE-2024-49942, CVE-2024-49897, CVE-2024-49871, CVE-2024-47687, CVE-2024-47692, CVE-2024-47740, CVE-2024-47691, CVE-2024-49973, CVE-2024-49958, CVE-2024-49889, CVE-2024-49927, CVE-2024-49883, CVE-2024-49885, CVE-2024-49912, CVE-2024-47686, CVE-2024-49985, CVE-2024-47732, CVE-2024-47685, CVE-2024-49935, CVE-2024-49995, CVE-2024-47731, CVE-2024-49931, CVE-2024-49886, CVE-2024-53144, CVE-2024-49917, CVE-2024-49868, CVE-2024-49999, CVE-2024-47684, CVE-2024-50013, CVE-2024-49962, CVE-2024-49981, CVE-2024-49858, CVE-2024-49878, CVE-2024-49852, CVE-2024-49928, CVE-2024-50006, CVE-2024-49988, CVE-2024-47697, CVE-2024-49923, CVE-2024-47704, CVE-2024-49947, CVE-2024-47751, CVE-2024-47672, CVE-2024-47737, CVE-2024-49909, CVE-2024-49992, CVE-2024-49944, CVE-2024-49950, CVE-2024-49850, CVE-2024-49951, CVE-2024-49996, CVE-2024-49934, CVE-2024-47705, CVE-2024-47741, CVE-2024-49957, CVE-2024-47682, CVE-2024-49976, CVE-2024-49895, ... [Please see the references for more information on the vulnerabilities]
Affected Software/OS: 'linux-oracle, linux-oracle-6.8' package(s) on Ubuntu 22.04, Ubuntu 24.04.
Solution: Please install the updated package(s).
CVSS Score: 9.4
CVSS Vector: AV:N/AC:L/Au:N/C:C/I:N/A:C
|