Description: | Summary: The remote host is missing an update for the 'linux-gcp-6.8, linux-raspi' package(s) announced via the USN-7303-3 advisory.
Vulnerability Insight: Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture, - x86 architecture, - Block layer subsystem, - Cryptographic API, - ACPI drivers, - Drivers core, - ATA over ethernet (AOE) driver, - Network block device driver, - TPM device driver, - Hardware crypto device drivers, - ARM SCMI message protocol, - EFI core, - GPU drivers, - I2C subsystem, - I3C subsystem, - InfiniBand drivers, - Input Device core drivers, - IOMMU subsystem, - Mailbox framework, - Media drivers, - Ethernet bonding driver, - Network drivers, - Mellanox network drivers, - STMicroelectronics network drivers, - NTB driver, - PCI subsystem, - Alibaba DDR Sub-System Driveway PMU driver, - x86 platform drivers, - Powercap sysfs driver, - Remote Processor subsystem, - SCSI subsystem, - USB Device Class drivers, - vDPA drivers, - Virtio Host (VHOST) subsystem, - Framebuffer layer, - AFS file system, - BTRFS file system, - File systems infrastructure, - Ceph distributed file system, - Ext4 file system, - F2FS file system, - JFS file system, - Network file systems library, - Network file system (NFS) server daemon, - NILFS2 file system, - SMB network file system, - BPF subsystem, - Virtio network driver, - TCP network protocol, - Perf events, - Padata parallel execution mechanism, - RCU subsystem, - Arbitrary resource management, - Static call mechanism, - Tracing infrastructure, - Memory management, - Bluetooth subsystem, - CAN network layer, - Networking core, - Distributed Switch Architecture, - IPv4 networking, - IPv6 networking, - MAC80211 subsystem, - IEEE 802.15.4 subsystem, - NCSI (Network Controller Sideband Interface) driver, - RxRPC session sockets, - SCTP protocol, - TIPC protocol, - Wireless networking, - AudioScience HPI driver, - KVM core, (CVE-2024-47709, CVE-2024-49889, CVE-2024-49931, CVE-2024-50008, CVE-2024-49969, CVE-2024-49975, CVE-2024-49958, CVE-2024-47756, CVE-2024-49944, CVE-2024-47707, CVE-2024-47693, CVE-2024-47686, CVE-2024-47734, CVE-2024-47750, CVE-2024-50179, CVE-2024-49942, CVE-2024-49864, CVE-2024-49891, CVE-2024-49965, CVE-2024-49905, CVE-2024-47719, CVE-2024-49877, CVE-2024-47688, CVE-2024-47691, CVE-2024-47710, CVE-2024-47748, CVE-2024-49948, CVE-2024-49998, CVE-2024-47673, CVE-2024-47738, CVE-2024-47701, CVE-2024-47705, CVE-2024-49930, CVE-2024-49985, CVE-2024-50016, CVE-2024-53144, CVE-2023-52917, CVE-2024-47690, CVE-2024-47675, CVE-2024-50176, CVE-2024-49922, CVE-2024-47704, CVE-2024-49982, CVE-2024-47741, CVE-2024-49991, CVE-2024-49902, CVE-2024-49883, CVE-2024-49892, CVE-2024-50002, CVE-2024-49945, CVE-2024-49959, CVE-2024-47732, CVE-2024-49856, CVE-2024-47677, CVE-2024-49978, CVE-2024-49966, CVE-2024-49937, CVE-2024-47744, CVE-2024-49890, ... [Please see the references for more information on the vulnerabilities]
Affected Software/OS: 'linux-gcp-6.8, linux-raspi' package(s) on Ubuntu 22.04, Ubuntu 24.04.
Solution: Please install the updated package(s).
CVSS Score: 9.4
CVSS Vector: AV:N/AC:L/Au:N/C:C/I:N/A:C
|