Description: | Summary: The remote host is missing an update for the 'linux-gcp, linux-gke, linux-gkeop' package(s) announced via the USN-7304-1 advisory.
Vulnerability Insight: Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture, - x86 architecture, - Block layer subsystem, - Cryptographic API, - ACPI drivers, - Drivers core, - ATA over ethernet (AOE) driver, - Network block device driver, - TPM device driver, - Hardware crypto device drivers, - ARM SCMI message protocol, - EFI core, - GPU drivers, - I2C subsystem, - I3C subsystem, - InfiniBand drivers, - Input Device core drivers, - IOMMU subsystem, - Mailbox framework, - Media drivers, - Ethernet bonding driver, - Network drivers, - Mellanox network drivers, - STMicroelectronics network drivers, - NTB driver, - PCI subsystem, - Alibaba DDR Sub-System Driveway PMU driver, - x86 platform drivers, - Powercap sysfs driver, - Remote Processor subsystem, - SCSI subsystem, - USB Device Class drivers, - vDPA drivers, - Virtio Host (VHOST) subsystem, - Framebuffer layer, - AFS file system, - BTRFS file system, - File systems infrastructure, - Ceph distributed file system, - Ext4 file system, - F2FS file system, - JFS file system, - Network file systems library, - Network file system (NFS) server daemon, - NILFS2 file system, - SMB network file system, - BPF subsystem, - Virtio network driver, - TCP network protocol, - Perf events, - Padata parallel execution mechanism, - RCU subsystem, - Arbitrary resource management, - Static call mechanism, - Tracing infrastructure, - Memory management, - Bluetooth subsystem, - CAN network layer, - Networking core, - Distributed Switch Architecture, - IPv4 networking, - IPv6 networking, - MAC80211 subsystem, - IEEE 802.15.4 subsystem, - NCSI (Network Controller Sideband Interface) driver, - RxRPC session sockets, - SCTP protocol, - TIPC protocol, - Wireless networking, - AudioScience HPI driver, - KVM core, (CVE-2024-47678, CVE-2024-49952, CVE-2024-47682, CVE-2024-47679, CVE-2024-47748, CVE-2024-47728, CVE-2024-49953, CVE-2024-49883, CVE-2024-47742, CVE-2024-50000, CVE-2024-47733, CVE-2024-47752, CVE-2024-49927, CVE-2024-47713, CVE-2024-49853, CVE-2024-49998, CVE-2024-47672, CVE-2024-49900, CVE-2024-49884, CVE-2024-49876, CVE-2024-47673, CVE-2024-49958, CVE-2024-50274, CVE-2024-49980, CVE-2024-47703, CVE-2024-49891, CVE-2024-47716, CVE-2024-49903, CVE-2024-49868, CVE-2024-47699, CVE-2024-50015, CVE-2024-49896, CVE-2024-49867, CVE-2024-50016, CVE-2024-49862, CVE-2024-49947, CVE-2024-47714, CVE-2024-50179, CVE-2024-50006, CVE-2024-49881, CVE-2024-49933, CVE-2024-49882, CVE-2024-47709, CVE-2024-47686, CVE-2024-49859, CVE-2024-49992, CVE-2024-49957, CVE-2024-47691, CVE-2024-49936, CVE-2024-49878, CVE-2024-49879, CVE-2024-49997, CVE-2024-47697, CVE-2024-49963, CVE-2024-49938, CVE-2024-47723, CVE-2024-47700, CVE-2024-49999, CVE-2024-49923, ... [Please see the references for more information on the vulnerabilities]
Affected Software/OS: 'linux-gcp, linux-gke, linux-gkeop' package(s) on Ubuntu 24.04.
Solution: Please install the updated package(s).
CVSS Score: 9.4
CVSS Vector: AV:N/AC:L/Au:N/C:C/I:N/A:C
|