[USN-6893-3] Linux kernel vulnerabilities
Several security issues were fixed in the Linux kernel.
It was discovered that a race condition existed in the Bluetooth subsystem
in the Linux kernel when modifying certain settings values through debugfs.
A privileged local attacker could use this to cause a denial of service.
(CVE-2024-24857, CVE-2024-24858, CVE-2024-24859)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
- RISC-V architecture;
- S390 architecture;
- x86 architecture;
- Block layer subsystem;
- Compute Acceleration Framework;
- Accessibility subsystem;
- Android drivers;
- Drivers core;
- Bluetooth drivers;
- Clock framework and drivers;
- Data acquisition framework and drivers;
- Cryptographic API;
- Buffer Sharing and Synchronization framework;
- GPU drivers;
- On-Chip Interconnect management framework;
- IOMMU subsystem;
- Multiple devices driver;
- Media drivers;
- VMware VMCI Driver;
- Network drivers;
- Microsoft Azure Network Adapter (MANA) driver;
- Device tree and open firmware driver;
- Chrome hardware platform drivers;
- i.MX PM domains;
- TI SCI PM domains driver;
- S/390 drivers;
- SCSI drivers;
- SPI subsystem;
- Thermal drivers;
- TTY drivers;
- USB subsystem;
- Framebuffer layer;
- BTRFS file system;
- Network file system server daemon;
- NILFS2 file system;
- File systems infrastructure;
- Pstore file system;
- SMB network file system;
- BPF subsystem;
- Bluetooth subsystem;
- Netfilter;
- io_uring subsystem;
- Core kernel;
- Extra boot config (XBC);
- Memory management;
- Amateur Radio drivers;
- B.A.T.M.A.N. meshing protocol;
- Ethernet bridge;
- Networking core;
- IPv4 networking;
- IPv6 networking;
- Multipath TCP;
- NFC subsystem;
- RDS protocol;
- Network traffic control;
- SMC sockets;
- Sun RPC protocol;
- TLS protocol;
- Unix domain sockets;
- Wireless networking;
- eXpress Data Path;
- SELinux security module;
(CVE-2024-35955, CVE-2024-35921, CVE-2024-35946, CVE-2024-35934,
CVE-2024-26993, CVE-2024-35899, CVE-2024-35952, CVE-2024-35894,
CVE-2024-35886, CVE-2024-35872, CVE-2024-35970, CVE-2024-35936,
CVE-2024-35907, CVE-2024-27013, CVE-2024-35910, CVE-2024-27009,
CVE-2024-35875, CVE-2024-36021, CVE-2024-26923, CVE-2024-26997,
CVE-2024-35978, CVE-2024-35981, CVE-2024-27015, CVE-2024-26928,
CVE-2024-35963, CVE-2024-35897, CVE-2024-27020, CVE-2024-35922,
CVE-2024-27001, CVE-2024-27011, CVE-2024-35940, CVE-2024-35871,
CVE-2024-35900, CVE-2024-35869, CVE-2024-35905, CVE-2024-35974,
CVE-2024-35873, CVE-2024-35882, CVE-2024-35914, CVE-2024-35956,
CVE-2024-35887, CVE-2024-35920, CVE-2024-27018, CVE-2024-35880,
CVE-2024-35943, CVE-2024-35912, CVE-2024-35979, CVE-2024-35862,
CVE-2024-36019, CVE-2024-35950, CVE-2024-35977, CVE-2024-35918,
CVE-2024-26992, CVE-2024-35884, CVE-2024-35916, CVE-2024-26817,
CVE-2024-35959, CVE-2024-35909, CVE-2024-35933, CVE-2024-35982,
CVE-2024-26996, CVE-2024-35980, CVE-2024-36018, CVE-2024-26925,
CVE-2024-35929, CVE-2024-35971, CVE-2024-26990, CVE-2024-35885,
CVE-2024-36025, CVE-2024-26998, CVE-2024-35930, CVE-2024-26982,
CVE-2024-36022, CVE-2024-35895, CVE-2024-35902, CVE-2024-35911,
CVE-2024-27002, CVE-2024-35968, CVE-2024-35861, CVE-2024-35903,
CVE-2024-36026, CVE-2024-35896, CVE-2024-35945, CVE-2024-26936,
CVE-2024-35954, CVE-2024-26985, CVE-2024-35908, CVE-2024-35924,
CVE-2024-35938, CVE-2024-26991, CVE-2024-27017, CVE-2024-26922,
CVE-2024-35919, CVE-2024-35915, CVE-2024-35985, CVE-2024-26995,
CVE-2024-35870, CVE-2024-27010, CVE-2024-35904, CVE-2024-26999,
CVE-2024-26983, CVE-2024-35939, CVE-2024-35865, CVE-2024-35860,
CVE-2024-35944, CVE-2024-27021, CVE-2024-27016, CVE-2024-27004,
CVE-2024-27019, CVE-2024-36027, CVE-2024-35890, CVE-2024-35975,
CVE-2024-35901, CVE-2024-35967, CVE-2024-26986, CVE-2024-35957,
CVE-2024-35937, CVE-2024-26988, CVE-2024-35972, CVE-2024-35926,
CVE-2024-26926, CVE-2024-35964, CVE-2024-26994, CVE-2024-35889,
CVE-2024-26981, CVE-2024-36024, CVE-2024-27022, CVE-2024-35935,
CVE-2024-26811, CVE-2024-35932, CVE-2024-35866, CVE-2024-27008,
CVE-2024-27012, CVE-2024-36023, CVE-2024-35931, CVE-2024-35888,
CVE-2024-26989, CVE-2024-35868, CVE-2024-35976, CVE-2024-35953,
CVE-2024-36020, CVE-2024-35893, CVE-2024-35961, CVE-2024-35965,
CVE-2024-35892, CVE-2024-35942, CVE-2024-35958, CVE-2024-27014,
CVE-2024-35867, CVE-2024-27003, CVE-2024-27007, CVE-2024-35951,
CVE-2024-35973, CVE-2024-35863, CVE-2024-26984, CVE-2024-35898,
CVE-2024-35960, CVE-2024-27005, CVE-2024-35917, CVE-2024-35927,
CVE-2024-26980, CVE-2024-35877, CVE-2024-35925, CVE-2024-26921,
CVE-2024-35913, CVE-2023-52699, CVE-2024-26987, CVE-2024-27006,
CVE-2024-35878, CVE-2024-35864, CVE-2024-35969, CVE-2024-35883,
CVE-2024-35891, CVE-2024-35879, CVE-2024-27000, CVE-2024-35966)
- ID
- USN-6893-3
- Severity
- critical
- Severity from
- CVE-2024-35960
- URL
- https://ubuntu.com/security/notices/USN-6893-3
- Published
-
2024-07-23T09:12:48
(7 weeks ago) - Modified
-
2024-07-23T09:12:48
(7 weeks ago) - Other Advisories
-
- ALAS-2024-1942
- ALAS2-2024-2581
- ALSA-2024:3618
- ALSA-2024:4211
- ALSA-2024:5101
- DSA-5658-1
- DSA-5680-1
- DSA-5681-1
- DSA-5730-1
- ELSA-2024-12570
- ELSA-2024-12571
- ELSA-2024-12581
- ELSA-2024-12584
- ELSA-2024-12585
- ELSA-2024-12606
- ELSA-2024-3618
- ELSA-2024-3619
- ELSA-2024-4211
- ELSA-2024-4349
- ELSA-2024-4583
- ELSA-2024-4928
- ELSA-2024-5101
- ELSA-2024-5363
- ELSA-2024-5928
- FEDORA-2024-010fe8772a
- FEDORA-2024-33a9ea72d1
- FEDORA-2024-6d35739db7
- FEDORA-2024-a56a47ef1b
- FEDORA-2024-bc0db39a14
- FEDORA-2024-f35f9525d6
- FEDORA-2024-f93cdd8831
- RHSA-2024:3618
- RHSA-2024:3627
- RHSA-2024:4211
- RHSA-2024:4352
- RHSA-2024:5101
- RHSA-2024:5102
- RLSA-2024:3618
- RLSA-2024:3619
- RLSA-2024:4211
- RLSA-2024:4349
- RLSA-2024:4583
- RLSA-2024:4928
- RLSA-2024:5101
- SUSE-SU-2024:1643-1
- SUSE-SU-2024:1644-1
- SUSE-SU-2024:1646-1
- SUSE-SU-2024:1648-1
- SUSE-SU-2024:1659-1
- SUSE-SU-2024:1663-1
- SUSE-SU-2024:1870-1
- SUSE-SU-2024:1979-1
- SUSE-SU-2024:1983-1
- SUSE-SU-2024:2008-1
- SUSE-SU-2024:2010-1
- SUSE-SU-2024:2011-1
- SUSE-SU-2024:2019-1
- SUSE-SU-2024:2135-1
- SUSE-SU-2024:2183-1
- SUSE-SU-2024:2184-1
- SUSE-SU-2024:2185-1
- SUSE-SU-2024:2189-1
- SUSE-SU-2024:2190-1
- SUSE-SU-2024:2203-1
- SUSE-SU-2024:2326-1
- SUSE-SU-2024:2335-1
- SUSE-SU-2024:2337-1
- SUSE-SU-2024:2338-1
- SUSE-SU-2024:2341-1
- SUSE-SU-2024:2342-1
- SUSE-SU-2024:2343-1
- SUSE-SU-2024:2344-1
- SUSE-SU-2024:2351-1
- SUSE-SU-2024:2357-1
- SUSE-SU-2024:2358-1
- SUSE-SU-2024:2360-1
- SUSE-SU-2024:2362-1
- SUSE-SU-2024:2365-1
- SUSE-SU-2024:2368-1
- SUSE-SU-2024:2369-1
- SUSE-SU-2024:2372-1
- SUSE-SU-2024:2373-1
- SUSE-SU-2024:2381-1
- SUSE-SU-2024:2382-1
- SUSE-SU-2024:2384-1
- SUSE-SU-2024:2385-1
- SUSE-SU-2024:2394-1
- SUSE-SU-2024:2396-1
- SUSE-SU-2024:2407-1
- SUSE-SU-2024:2410-1
- SUSE-SU-2024:2411-1
- SUSE-SU-2024:2437-1
- SUSE-SU-2024:2446-1
- SUSE-SU-2024:2447-1
- SUSE-SU-2024:2448-1
- SUSE-SU-2024:2449-1
- SUSE-SU-2024:2472-1
- SUSE-SU-2024:2473-1
- SUSE-SU-2024:2474-1
- SUSE-SU-2024:2480-1
- SUSE-SU-2024:2487-1
- SUSE-SU-2024:2488-1
- SUSE-SU-2024:2495-1
- SUSE-SU-2024:2530-1
- SUSE-SU-2024:2549-1
- SUSE-SU-2024:2558-1
- SUSE-SU-2024:2559-1
- SUSE-SU-2024:2561-1
- SUSE-SU-2024:2571-1
- SUSE-SU-2024:2719-1
- SUSE-SU-2024:2722-1
- SUSE-SU-2024:2723-1
- SUSE-SU-2024:2724-1
- SUSE-SU-2024:2725-1
- SUSE-SU-2024:2726-1
- SUSE-SU-2024:2734-1
- SUSE-SU-2024:2740-1
- SUSE-SU-2024:2750-1
- SUSE-SU-2024:2751-1
- SUSE-SU-2024:2755-1
- SUSE-SU-2024:2758-1
- SUSE-SU-2024:2759-1
- SUSE-SU-2024:2760-1
- SUSE-SU-2024:2771-1
- SUSE-SU-2024:2773-1
- SUSE-SU-2024:2792-1
- SUSE-SU-2024:2793-1
- SUSE-SU-2024:2797-1
- SUSE-SU-2024:2802-1
- SUSE-SU-2024:2815-1
- SUSE-SU-2024:2818-1
- SUSE-SU-2024:2821-1
- SUSE-SU-2024:2822-1
- SUSE-SU-2024:2823-1
- SUSE-SU-2024:2824-1
- SUSE-SU-2024:2825-1
- SUSE-SU-2024:2827-1
- SUSE-SU-2024:2840-1
- SUSE-SU-2024:2841-1
- SUSE-SU-2024:2843-1
- SUSE-SU-2024:2850-1
- SUSE-SU-2024:2851-1
- SUSE-SU-2024:2852-1
- SUSE-SU-2024:2853-1
- SUSE-SU-2024:2874-1
- SUSE-SU-2024:2892-1
- SUSE-SU-2024:2894-1
- SUSE-SU-2024:2895-1
- SUSE-SU-2024:2896-1
- SUSE-SU-2024:2901-1
- SUSE-SU-2024:2902-1
- SUSE-SU-2024:2929-1
- SUSE-SU-2024:2939-1
- SUSE-SU-2024:2940-1
- SUSE-SU-2024:2947-1
- SUSE-SU-2024:2973-1
- SUSE-SU-2024:3015-1
- SUSE-SU-2024:3034-1
- SUSE-SU-2024:3037-1
- SUSE-SU-2024:3039-1
- SUSE-SU-2024:3043-1
- SUSE-SU-2024:3044-1
- SUSE-SU-2024:3048-1
- SUSE-SU-2024:3189-1
- SUSE-SU-2024:3190-1
- SUSE-SU-2024:3194-1
- SUSE-SU-2024:3195-1
- SUSE-SU-2024:3209-1
- USN-6866-1
- USN-6866-2
- USN-6866-3
- USN-6868-1
- USN-6868-2
- USN-6872-1
- USN-6872-2
- USN-6873-1
- USN-6873-2
- USN-6874-1
- USN-6875-1
- USN-6893-1
- USN-6893-2
- USN-6895-1
- USN-6895-2
- USN-6895-3
- USN-6895-4
- USN-6896-1
- USN-6896-2
- USN-6896-3
- USN-6896-4
- USN-6896-5
- USN-6898-1
- USN-6898-2
- USN-6898-3
- USN-6898-4
- USN-6900-1
- USN-6917-1
- USN-6918-1
- USN-6919-1
- USN-6922-1
- USN-6922-2
- USN-6923-1
- USN-6923-2
- USN-6926-1
- USN-6926-2
- USN-6926-3
- USN-6927-1
- USN-6938-1
- USN-6950-1
- USN-6950-2
- USN-6950-3
- USN-6950-4
- USN-6951-1
- USN-6951-2
- USN-6951-3
- USN-6951-4
- USN-6953-1
- USN-6956-1
- USN-6957-1
- USN-6972-1
- USN-6972-2
- USN-6972-3
- USN-6972-4
- USN-6973-1
- USN-6973-2
- USN-6973-3
- USN-6973-4
- USN-6974-1
- USN-6974-2
- USN-6976-1
- USN-6979-1
- USN-7006-1
- USN-7007-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-tools-aws?distro=noble | ubuntu | linux-tools-aws | < 6.8.0-1011.12 | noble | ||
Affected | pkg:deb/ubuntu/linux-tools-6.8.0-1011-aws?distro=noble | ubuntu | linux-tools-6.8.0-1011-aws | < 6.8.0-1011.12 | noble | ||
Affected | pkg:deb/ubuntu/linux-modules-extra-aws?distro=noble | ubuntu | linux-modules-extra-aws | < 6.8.0-1011.12 | noble | ||
Affected | pkg:deb/ubuntu/linux-modules-extra-6.8.0-1011-aws?distro=noble | ubuntu | linux-modules-extra-6.8.0-1011-aws | < 6.8.0-1011.12 | noble | ||
Affected | pkg:deb/ubuntu/linux-modules-6.8.0-1011-aws?distro=noble | ubuntu | linux-modules-6.8.0-1011-aws | < 6.8.0-1011.12 | noble | ||
Affected | pkg:deb/ubuntu/linux-image-unsigned-6.8.0-1011-aws?distro=noble | ubuntu | linux-image-unsigned-6.8.0-1011-aws | < 6.8.0-1011.12 | noble | ||
Affected | pkg:deb/ubuntu/linux-image-aws?distro=noble | ubuntu | linux-image-aws | < 6.8.0-1011.12 | noble | ||
Affected | pkg:deb/ubuntu/linux-image-6.8.0-1011-aws?distro=noble | ubuntu | linux-image-6.8.0-1011-aws | < 6.8.0-1011.12 | noble | ||
Affected | pkg:deb/ubuntu/linux-headers-aws?distro=noble | ubuntu | linux-headers-aws | < 6.8.0-1011.12 | noble | ||
Affected | pkg:deb/ubuntu/linux-headers-6.8.0-1011-aws?distro=noble | ubuntu | linux-headers-6.8.0-1011-aws | < 6.8.0-1011.12 | noble | ||
Affected | pkg:deb/ubuntu/linux-cloud-tools-6.8.0-1011-aws?distro=noble | ubuntu | linux-cloud-tools-6.8.0-1011-aws | < 6.8.0-1011.12 | noble | ||
Affected | pkg:deb/ubuntu/linux-buildinfo-6.8.0-1011-aws?distro=noble | ubuntu | linux-buildinfo-6.8.0-1011-aws | < 6.8.0-1011.12 | noble | ||
Affected | pkg:deb/ubuntu/linux-aws?distro=noble | ubuntu | linux-aws | < 6.8.0-1011.12 | noble | ||
Affected | pkg:deb/ubuntu/linux-aws-tools-6.8.0-1011?distro=noble | ubuntu | linux-aws-tools-6.8.0-1011 | < 6.8.0-1011.12 | noble | ||
Affected | pkg:deb/ubuntu/linux-aws-headers-6.8.0-1011?distro=noble | ubuntu | linux-aws-headers-6.8.0-1011 | < 6.8.0-1011.12 | noble | ||
Affected | pkg:deb/ubuntu/linux-aws-cloud-tools-6.8.0-1011?distro=noble | ubuntu | linux-aws-cloud-tools-6.8.0-1011 | < 6.8.0-1011.12 | noble |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |