[USN-6893-3] Linux kernel vulnerabilities

Severity Critical
Affected Packages 16
CVEs 179

Several security issues were fixed in the Linux kernel.

It was discovered that a race condition existed in the Bluetooth subsystem
in the Linux kernel when modifying certain settings values through debugfs.
A privileged local attacker could use this to cause a denial of service.
(CVE-2024-24857, CVE-2024-24858, CVE-2024-24859)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
- RISC-V architecture;
- S390 architecture;
- x86 architecture;
- Block layer subsystem;
- Compute Acceleration Framework;
- Accessibility subsystem;
- Android drivers;
- Drivers core;
- Bluetooth drivers;
- Clock framework and drivers;
- Data acquisition framework and drivers;
- Cryptographic API;
- Buffer Sharing and Synchronization framework;
- GPU drivers;
- On-Chip Interconnect management framework;
- IOMMU subsystem;
- Multiple devices driver;
- Media drivers;
- VMware VMCI Driver;
- Network drivers;
- Microsoft Azure Network Adapter (MANA) driver;
- Device tree and open firmware driver;
- Chrome hardware platform drivers;
- i.MX PM domains;
- TI SCI PM domains driver;
- S/390 drivers;
- SCSI drivers;
- SPI subsystem;
- Thermal drivers;
- TTY drivers;
- USB subsystem;
- Framebuffer layer;
- BTRFS file system;
- Network file system server daemon;
- NILFS2 file system;
- File systems infrastructure;
- Pstore file system;
- SMB network file system;
- BPF subsystem;
- Bluetooth subsystem;
- Netfilter;
- io_uring subsystem;
- Core kernel;
- Extra boot config (XBC);
- Memory management;
- Amateur Radio drivers;
- B.A.T.M.A.N. meshing protocol;
- Ethernet bridge;
- Networking core;
- IPv4 networking;
- IPv6 networking;
- Multipath TCP;
- NFC subsystem;
- RDS protocol;
- Network traffic control;
- SMC sockets;
- Sun RPC protocol;
- TLS protocol;
- Unix domain sockets;
- Wireless networking;
- eXpress Data Path;
- SELinux security module;
(CVE-2024-35955, CVE-2024-35921, CVE-2024-35946, CVE-2024-35934,
CVE-2024-26993, CVE-2024-35899, CVE-2024-35952, CVE-2024-35894,
CVE-2024-35886, CVE-2024-35872, CVE-2024-35970, CVE-2024-35936,
CVE-2024-35907, CVE-2024-27013, CVE-2024-35910, CVE-2024-27009,
CVE-2024-35875, CVE-2024-36021, CVE-2024-26923, CVE-2024-26997,
CVE-2024-35978, CVE-2024-35981, CVE-2024-27015, CVE-2024-26928,
CVE-2024-35963, CVE-2024-35897, CVE-2024-27020, CVE-2024-35922,
CVE-2024-27001, CVE-2024-27011, CVE-2024-35940, CVE-2024-35871,
CVE-2024-35900, CVE-2024-35869, CVE-2024-35905, CVE-2024-35974,
CVE-2024-35873, CVE-2024-35882, CVE-2024-35914, CVE-2024-35956,
CVE-2024-35887, CVE-2024-35920, CVE-2024-27018, CVE-2024-35880,
CVE-2024-35943, CVE-2024-35912, CVE-2024-35979, CVE-2024-35862,
CVE-2024-36019, CVE-2024-35950, CVE-2024-35977, CVE-2024-35918,
CVE-2024-26992, CVE-2024-35884, CVE-2024-35916, CVE-2024-26817,
CVE-2024-35959, CVE-2024-35909, CVE-2024-35933, CVE-2024-35982,
CVE-2024-26996, CVE-2024-35980, CVE-2024-36018, CVE-2024-26925,
CVE-2024-35929, CVE-2024-35971, CVE-2024-26990, CVE-2024-35885,
CVE-2024-36025, CVE-2024-26998, CVE-2024-35930, CVE-2024-26982,
CVE-2024-36022, CVE-2024-35895, CVE-2024-35902, CVE-2024-35911,
CVE-2024-27002, CVE-2024-35968, CVE-2024-35861, CVE-2024-35903,
CVE-2024-36026, CVE-2024-35896, CVE-2024-35945, CVE-2024-26936,
CVE-2024-35954, CVE-2024-26985, CVE-2024-35908, CVE-2024-35924,
CVE-2024-35938, CVE-2024-26991, CVE-2024-27017, CVE-2024-26922,
CVE-2024-35919, CVE-2024-35915, CVE-2024-35985, CVE-2024-26995,
CVE-2024-35870, CVE-2024-27010, CVE-2024-35904, CVE-2024-26999,
CVE-2024-26983, CVE-2024-35939, CVE-2024-35865, CVE-2024-35860,
CVE-2024-35944, CVE-2024-27021, CVE-2024-27016, CVE-2024-27004,
CVE-2024-27019, CVE-2024-36027, CVE-2024-35890, CVE-2024-35975,
CVE-2024-35901, CVE-2024-35967, CVE-2024-26986, CVE-2024-35957,
CVE-2024-35937, CVE-2024-26988, CVE-2024-35972, CVE-2024-35926,
CVE-2024-26926, CVE-2024-35964, CVE-2024-26994, CVE-2024-35889,
CVE-2024-26981, CVE-2024-36024, CVE-2024-27022, CVE-2024-35935,
CVE-2024-26811, CVE-2024-35932, CVE-2024-35866, CVE-2024-27008,
CVE-2024-27012, CVE-2024-36023, CVE-2024-35931, CVE-2024-35888,
CVE-2024-26989, CVE-2024-35868, CVE-2024-35976, CVE-2024-35953,
CVE-2024-36020, CVE-2024-35893, CVE-2024-35961, CVE-2024-35965,
CVE-2024-35892, CVE-2024-35942, CVE-2024-35958, CVE-2024-27014,
CVE-2024-35867, CVE-2024-27003, CVE-2024-27007, CVE-2024-35951,
CVE-2024-35973, CVE-2024-35863, CVE-2024-26984, CVE-2024-35898,
CVE-2024-35960, CVE-2024-27005, CVE-2024-35917, CVE-2024-35927,
CVE-2024-26980, CVE-2024-35877, CVE-2024-35925, CVE-2024-26921,
CVE-2024-35913, CVE-2023-52699, CVE-2024-26987, CVE-2024-27006,
CVE-2024-35878, CVE-2024-35864, CVE-2024-35969, CVE-2024-35883,
CVE-2024-35891, CVE-2024-35879, CVE-2024-27000, CVE-2024-35966)

ID
USN-6893-3
Severity
critical
Severity from
CVE-2024-35960
URL
https://ubuntu.com/security/notices/USN-6893-3
Published
2024-07-23T09:12:48
(7 weeks ago)
Modified
2024-07-23T09:12:48
(7 weeks ago)
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:deb/ubuntu/linux-tools-aws?distro=noble ubuntu linux-tools-aws < 6.8.0-1011.12 noble
Affected pkg:deb/ubuntu/linux-tools-6.8.0-1011-aws?distro=noble ubuntu linux-tools-6.8.0-1011-aws < 6.8.0-1011.12 noble
Affected pkg:deb/ubuntu/linux-modules-extra-aws?distro=noble ubuntu linux-modules-extra-aws < 6.8.0-1011.12 noble
Affected pkg:deb/ubuntu/linux-modules-extra-6.8.0-1011-aws?distro=noble ubuntu linux-modules-extra-6.8.0-1011-aws < 6.8.0-1011.12 noble
Affected pkg:deb/ubuntu/linux-modules-6.8.0-1011-aws?distro=noble ubuntu linux-modules-6.8.0-1011-aws < 6.8.0-1011.12 noble
Affected pkg:deb/ubuntu/linux-image-unsigned-6.8.0-1011-aws?distro=noble ubuntu linux-image-unsigned-6.8.0-1011-aws < 6.8.0-1011.12 noble
Affected pkg:deb/ubuntu/linux-image-aws?distro=noble ubuntu linux-image-aws < 6.8.0-1011.12 noble
Affected pkg:deb/ubuntu/linux-image-6.8.0-1011-aws?distro=noble ubuntu linux-image-6.8.0-1011-aws < 6.8.0-1011.12 noble
Affected pkg:deb/ubuntu/linux-headers-aws?distro=noble ubuntu linux-headers-aws < 6.8.0-1011.12 noble
Affected pkg:deb/ubuntu/linux-headers-6.8.0-1011-aws?distro=noble ubuntu linux-headers-6.8.0-1011-aws < 6.8.0-1011.12 noble
Affected pkg:deb/ubuntu/linux-cloud-tools-6.8.0-1011-aws?distro=noble ubuntu linux-cloud-tools-6.8.0-1011-aws < 6.8.0-1011.12 noble
Affected pkg:deb/ubuntu/linux-buildinfo-6.8.0-1011-aws?distro=noble ubuntu linux-buildinfo-6.8.0-1011-aws < 6.8.0-1011.12 noble
Affected pkg:deb/ubuntu/linux-aws?distro=noble ubuntu linux-aws < 6.8.0-1011.12 noble
Affected pkg:deb/ubuntu/linux-aws-tools-6.8.0-1011?distro=noble ubuntu linux-aws-tools-6.8.0-1011 < 6.8.0-1011.12 noble
Affected pkg:deb/ubuntu/linux-aws-headers-6.8.0-1011?distro=noble ubuntu linux-aws-headers-6.8.0-1011 < 6.8.0-1011.12 noble
Affected pkg:deb/ubuntu/linux-aws-cloud-tools-6.8.0-1011?distro=noble ubuntu linux-aws-cloud-tools-6.8.0-1011 < 6.8.0-1011.12 noble
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...