Description: | Summary: The remote host is missing an update for the 'linux-azure-nvidia' package(s) announced via the USN-7468-1 advisory.
Vulnerability Insight: Michael Randrianantenaina discovered that the Bluetooth driver in the Linux Kernel contained an improper access control vulnerability. A nearby attacker could use this to connect a rougue device and possibly execute arbitrary code. (CVE-2024-8805)
Attila Szasz discovered that the HFS+ file system implementation in the Linux Kernel contained a heap overflow vulnerability. An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2025-0927)
It was discovered that the CIFS network file system implementation in the Linux kernel did not properly verify the target namespace when handling upcalls. An attacker could use this to expose sensitive information. (CVE-2025-2312)
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture, - MIPS architecture, - PowerPC architecture, - RISC-V architecture, - S390 architecture, - SuperH RISC architecture, - User-Mode Linux (UML), - x86 architecture, - Block layer subsystem, - Cryptographic API, - Compute Acceleration Framework, - ACPI drivers, - Drivers core, - ATA over ethernet (AOE) driver, - RAM backed block device driver, - Network block device driver, - Ublk userspace block driver, - Compressed RAM block device driver, - TPM device driver, - Clock framework and drivers, - Data acquisition framework and drivers, - CPU frequency scaling framework, - Hardware crypto device drivers, - CXL (Compute Express Link) drivers, - DAX dirext access to differentiated memory framework, - EDAC drivers, - ARM SCMI message protocol, - ARM SCPI message protocol, - EFI core, - iSCSI Boot Firmware Table Attributes driver, - GPIO subsystem, - GPU drivers, - HID subsystem, - I2C subsystem, - I3C subsystem, - IIO ADC drivers, - IIO subsystem, - InfiniBand drivers, - Input Device core drivers, - IOMMU subsystem, - IRQ chip drivers, - LED subsystem, - Mailbox framework, - Multiple devices driver, - Media drivers, - Multifunction device drivers, - MMC subsystem, - MTD block device drivers, - Ethernet bonding driver, - Network drivers, - Mellanox network drivers, - STMicroelectronics network drivers, - NTB driver, - Virtio pmem driver, - NVME drivers, - Parport drivers, - PCI subsystem, - PHY drivers, - Pin controllers subsystem, - x86 platform drivers, - i.MX PM domains, - Voltage and Current Regulator drivers, - StarFive reset controller drivers, - Real Time Clock drivers, - SCSI subsystem, - SuperH / SH-Mobile drivers, - i.MX SoC drivers, - QCOM SoC drivers, - Xilinx SoC drivers, - SPI subsystem, - Direct Digital Synthesis drivers, - Media staging drivers, - TCM subsystem, - Thermal drivers, - TTY drivers, - UFS subsystem, - USB ... [Please see the references for more information on the vulnerabilities]
Affected Software/OS: 'linux-azure-nvidia' package(s) on Ubuntu 24.04.
Solution: Please install the updated package(s).
CVSS Score: 9.4
CVSS Vector: AV:N/AC:L/Au:N/C:C/I:N/A:C
|