[USN-6973-3] Linux kernel (AWS) vulnerabilities
Several security issues were fixed in the Linux kernel.
It was discovered that a race condition existed in the Bluetooth subsystem
in the Linux kernel, leading to a null pointer dereference vulnerability. A
privileged local attacker could use this to possibly cause a denial of
service (system crash). (CVE-2024-24860)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- SuperH RISC architecture;
- MMC subsystem;
- Network drivers;
- SCSI drivers;
- GFS2 file system;
- IPv4 networking;
- IPv6 networking;
- HD-audio driver;
(CVE-2024-26830, CVE-2024-39484, CVE-2024-36901, CVE-2024-26929,
CVE-2024-26921, CVE-2021-46926, CVE-2023-52629, CVE-2023-52760)
- ID
- USN-6973-3
- Severity
- high
- Severity from
- CVE-2023-52629
- URL
- https://ubuntu.com/security/notices/USN-6973-3
- Published
-
2024-08-26T17:16:27
(3 weeks ago) - Modified
-
2024-08-26T17:16:27
(3 weeks ago) - Other Advisories
-
- ALSA-2024:5101
- DSA-5730-1
- DSA-5731-1
- DSA-5747-1
- ELSA-2024-5101
- RHSA-2024:5101
- RHSA-2024:5102
- RLSA-2024:5101
- SSA:2024-157-01
- SUSE-SU-2024:0476-1
- SUSE-SU-2024:0514-1
- SUSE-SU-2024:0515-1
- SUSE-SU-2024:0516-1
- SUSE-SU-2024:1320-1
- SUSE-SU-2024:1321-1
- SUSE-SU-2024:1322-1
- SUSE-SU-2024:1466-1
- SUSE-SU-2024:1480-1
- SUSE-SU-2024:1490-1
- SUSE-SU-2024:1643-1
- SUSE-SU-2024:1644-1
- SUSE-SU-2024:1646-1
- SUSE-SU-2024:1648-1
- SUSE-SU-2024:1659-1
- SUSE-SU-2024:1663-1
- SUSE-SU-2024:1870-1
- SUSE-SU-2024:1978-1
- SUSE-SU-2024:1979-1
- SUSE-SU-2024:1983-1
- SUSE-SU-2024:2008-1
- SUSE-SU-2024:2010-1
- SUSE-SU-2024:2011-1
- SUSE-SU-2024:2019-1
- SUSE-SU-2024:2135-1
- SUSE-SU-2024:2183-1
- SUSE-SU-2024:2184-1
- SUSE-SU-2024:2185-1
- SUSE-SU-2024:2189-1
- SUSE-SU-2024:2190-1
- SUSE-SU-2024:2203-1
- SUSE-SU-2024:2365-1
- SUSE-SU-2024:2802-1
- SUSE-SU-2024:2892-1
- SUSE-SU-2024:2894-1
- SUSE-SU-2024:2896-1
- SUSE-SU-2024:2901-1
- SUSE-SU-2024:2939-1
- SUSE-SU-2024:2940-1
- SUSE-SU-2024:2947-1
- SUSE-SU-2024:2973-1
- SUSE-SU-2024:3194-1
- SUSE-SU-2024:3195-1
- USN-6688-1
- USN-6725-1
- USN-6725-2
- USN-6765-1
- USN-6816-1
- USN-6817-1
- USN-6817-2
- USN-6817-3
- USN-6818-1
- USN-6818-2
- USN-6818-3
- USN-6818-4
- USN-6819-1
- USN-6819-2
- USN-6819-3
- USN-6819-4
- USN-6878-1
- USN-6893-1
- USN-6893-2
- USN-6893-3
- USN-6895-1
- USN-6895-2
- USN-6895-3
- USN-6895-4
- USN-6898-1
- USN-6898-2
- USN-6898-3
- USN-6898-4
- USN-6900-1
- USN-6917-1
- USN-6918-1
- USN-6919-1
- USN-6927-1
- USN-6949-1
- USN-6949-2
- USN-6952-1
- USN-6952-2
- USN-6955-1
- USN-6972-1
- USN-6972-2
- USN-6972-3
- USN-6972-4
- USN-6973-1
- USN-6973-2
- USN-6973-4
- USN-6974-1
- USN-6974-2
- USN-6975-1
- USN-6976-1
- USN-7006-1
- USN-7008-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-tools-aws?distro=bionic | ubuntu | linux-tools-aws | < 5.4.0.1131.141~18.04.1 | bionic | ||
Affected | pkg:deb/ubuntu/linux-tools-aws-edge?distro=bionic | ubuntu | linux-tools-aws-edge | < 5.4.0.1131.141~18.04.1 | bionic | ||
Affected | pkg:deb/ubuntu/linux-tools-5.4.0-1131-aws?distro=bionic | ubuntu | linux-tools-5.4.0-1131-aws | < 5.4.0-1131.141~18.04.1 | bionic | ||
Affected | pkg:deb/ubuntu/linux-modules-extra-aws?distro=bionic | ubuntu | linux-modules-extra-aws | < 5.4.0.1131.141~18.04.1 | bionic | ||
Affected | pkg:deb/ubuntu/linux-modules-extra-aws-edge?distro=bionic | ubuntu | linux-modules-extra-aws-edge | < 5.4.0.1131.141~18.04.1 | bionic | ||
Affected | pkg:deb/ubuntu/linux-modules-extra-5.4.0-1131-aws?distro=bionic | ubuntu | linux-modules-extra-5.4.0-1131-aws | < 5.4.0-1131.141~18.04.1 | bionic | ||
Affected | pkg:deb/ubuntu/linux-modules-5.4.0-1131-aws?distro=bionic | ubuntu | linux-modules-5.4.0-1131-aws | < 5.4.0-1131.141~18.04.1 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-unsigned-5.4.0-1131-aws?distro=bionic | ubuntu | linux-image-unsigned-5.4.0-1131-aws | < 5.4.0-1131.141~18.04.1 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-aws?distro=bionic | ubuntu | linux-image-aws | < 5.4.0.1131.141~18.04.1 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-aws-edge?distro=bionic | ubuntu | linux-image-aws-edge | < 5.4.0.1131.141~18.04.1 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-5.4.0-1131-aws?distro=bionic | ubuntu | linux-image-5.4.0-1131-aws | < 5.4.0-1131.141~18.04.1 | bionic | ||
Affected | pkg:deb/ubuntu/linux-headers-aws?distro=bionic | ubuntu | linux-headers-aws | < 5.4.0.1131.141~18.04.1 | bionic | ||
Affected | pkg:deb/ubuntu/linux-headers-aws-edge?distro=bionic | ubuntu | linux-headers-aws-edge | < 5.4.0.1131.141~18.04.1 | bionic | ||
Affected | pkg:deb/ubuntu/linux-headers-5.4.0-1131-aws?distro=bionic | ubuntu | linux-headers-5.4.0-1131-aws | < 5.4.0-1131.141~18.04.1 | bionic | ||
Affected | pkg:deb/ubuntu/linux-cloud-tools-5.4.0-1131-aws?distro=bionic | ubuntu | linux-cloud-tools-5.4.0-1131-aws | < 5.4.0-1131.141~18.04.1 | bionic | ||
Affected | pkg:deb/ubuntu/linux-buildinfo-5.4.0-1131-aws?distro=bionic | ubuntu | linux-buildinfo-5.4.0-1131-aws | < 5.4.0-1131.141~18.04.1 | bionic | ||
Affected | pkg:deb/ubuntu/linux-aws?distro=bionic | ubuntu | linux-aws | < 5.4.0.1131.141~18.04.1 | bionic | ||
Affected | pkg:deb/ubuntu/linux-aws-edge?distro=bionic | ubuntu | linux-aws-edge | < 5.4.0.1131.141~18.04.1 | bionic | ||
Affected | pkg:deb/ubuntu/linux-aws-5.4-tools-5.4.0-1131?distro=bionic | ubuntu | linux-aws-5.4-tools-5.4.0-1131 | < 5.4.0-1131.141~18.04.1 | bionic | ||
Affected | pkg:deb/ubuntu/linux-aws-5.4-headers-5.4.0-1131?distro=bionic | ubuntu | linux-aws-5.4-headers-5.4.0-1131 | < 5.4.0-1131.141~18.04.1 | bionic | ||
Affected | pkg:deb/ubuntu/linux-aws-5.4-cloud-tools-5.4.0-1131?distro=bionic | ubuntu | linux-aws-5.4-cloud-tools-5.4.0-1131 | < 5.4.0-1131.141~18.04.1 | bionic |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |