ubuntu jammy v1.529
Metadata:
BOSH Agent Version: 2.679.0
Kernel Version: 5.15.0.118.118
USNs:
Title: USN-6895-4: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6895-4
Priorities: medium,low,high
Description:
It was discovered that the ATA over Ethernet (AoE) driver in the Linux
kernel contained a race condition, leading to a use-after-free
vulnerability. An attacker could use this to cause a denial of service or
possibly execute arbitrary code. (CVE-2023-6270)
It was discovered that the HugeTLB file system component of the Linux
Kernel contained a NULL pointer dereference vulnerability. A privileged
attacker could possibly use this to to cause a denial of service.
(CVE-2024-0841)
It was discovered that the Open vSwitch implementation in the Linux kernel
could overflow its stack during recursive action operations under certain
conditions. A local attacker could use this to cause a denial of service
(system crash). (CVE-2024-1151)
Gui-Dong Han discovered that the software RAID driver in the Linux kernel
contained a race condition, leading to an integer overflow vulnerability. A
privileged attacker could possibly use this to cause a denial of service
(system crash). (CVE-2024-23307)
Bai Jiaju discovered that the Xceive XC4000 silicon tuner device driver in
the Linux kernel contained a race condition, leading to an integer overflow
vulnerability. An attacker could possibly use this to cause a denial of
service (system crash). (CVE-2024-24861)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
- PowerPC architecture;
- x86 architecture;
- Cryptographic API;
- Android drivers;
- Block layer subsystem;
- Bluetooth drivers;
- DMA engine subsystem;
- GPU drivers;
- HID subsystem;
- Hardware monitoring drivers;
- I2C subsystem;
- IIO ADC drivers;
- IIO subsystem;
- IIO Magnetometer sensors drivers;
- InfiniBand drivers;
- On-Chip Interconnect management framework;
- Multiple devices driver;
- Media drivers;
- Network drivers;
- PHY drivers;
- MediaTek PM domains;
- SCSI drivers;
- TTY drivers;
- USB subsystem;
- DesignWare USB3 driver;
- Framebuffer layer;
- AFS file system;
- BTRFS file system;
- Ceph distributed file system;
- Ext4 file system;
- File systems infrastructure;
- NILFS2 file system;
- NTFS3 file system;
- SMB network file system;
- Core kernel;
- Memory management;
- Bluetooth subsystem;
- CAN network layer;
- Devlink API;
- Handshake API;
- HSR network protocol;
- IPv4 networking;
- IPv6 networking;
- MAC80211 subsystem;
- Multipath TCP;
- Netfilter;
- NFC subsystem;
- RxRPC session sockets;
- TIPC protocol;
- Unix domain sockets;
- Realtek audio codecs;
(CVE-2023-52638, CVE-2024-26684, CVE-2024-26659, CVE-2024-26708,
CVE-2024-26663, CVE-2024-26662, CVE-2024-26789, CVE-2024-26831,
CVE-2024-26703, CVE-2023-52643, CVE-2024-26688, CVE-2024-26733,
CVE-2024-26818, CVE-2024-26707, CVE-2024-26820, CVE-2024-26719,
CVE-2024-26726, CVE-2024-26830, CVE-2024-26694, CVE-2024-26715,
CVE-2024-26829, CVE-2024-26697, CVE-2024-26916, CVE-2024-26735,
CVE-2024-26717, CVE-2024-26748, CVE-2024-26696, CVE-2024-26710,
CVE-2024-26642, CVE-2024-26680, CVE-2024-26675, CVE-2024-26723,
CVE-2024-26718, CVE-2024-26666, CVE-2024-26720, CVE-2024-26838,
CVE-2024-26824, CVE-2024-26676, CVE-2024-26665, CVE-2024-26693,
CVE-2024-26698, CVE-2024-26890, CVE-2024-26601, CVE-2024-26826,
CVE-2024-26711, CVE-2024-26602, CVE-2023-52645, CVE-2024-26716,
CVE-2024-26660, CVE-2023-52642, CVE-2024-26898, CVE-2024-26803,
CVE-2024-26923, CVE-2024-26722, CVE-2024-26677, CVE-2024-26825,
CVE-2024-26606, CVE-2024-26790, CVE-2024-26828, CVE-2024-26910,
CVE-2024-26681, CVE-2024-26689, CVE-2024-26667, CVE-2024-26798,
CVE-2024-26679, CVE-2023-52631, CVE-2024-26926, CVE-2024-26661,
CVE-2024-26700, CVE-2023-52637, CVE-2024-26919, CVE-2024-26917,
CVE-2024-26712, CVE-2024-26889, CVE-2024-26674, CVE-2024-26792,
CVE-2024-35833, CVE-2024-26822, CVE-2024-26734, CVE-2024-26691,
CVE-2024-26685, CVE-2024-26782, CVE-2024-26702, CVE-2024-26600,
CVE-2024-26922, CVE-2024-26593, CVE-2024-26736, CVE-2024-26920,
CVE-2024-26603, CVE-2024-26714, CVE-2024-27416, CVE-2024-26695,
CVE-2023-52880, CVE-2024-26664, CVE-2024-26802)
CVEs: - https://ubuntu.com/security/CVE-2023-52631
- https://ubuntu.com/security/CVE-2023-52637
- https://ubuntu.com/security/CVE-2023-52638
- https://ubuntu.com/security/CVE-2023-52642
- https://ubuntu.com/security/CVE-2023-52643
- https://ubuntu.com/security/CVE-2023-52645
- https://ubuntu.com/security/CVE-2023-52880
- https://ubuntu.com/security/CVE-2023-6270
- https://ubuntu.com/security/CVE-2024-0841
- https://ubuntu.com/security/CVE-2024-1151
- https://ubuntu.com/security/CVE-2024-23307
- https://ubuntu.com/security/CVE-2024-24861
- https://ubuntu.com/security/CVE-2024-26593
- https://ubuntu.com/security/CVE-2024-26600
- https://ubuntu.com/security/CVE-2024-26601
- https://ubuntu.com/security/CVE-2024-26602
- https://ubuntu.com/security/CVE-2024-26603
- https://ubuntu.com/security/CVE-2024-26606
- https://ubuntu.com/security/CVE-2024-26642
- https://ubuntu.com/security/CVE-2024-26659
- https://ubuntu.com/security/CVE-2024-26660
- https://ubuntu.com/security/CVE-2024-26661
- https://ubuntu.com/security/CVE-2024-26662
- https://ubuntu.com/security/CVE-2024-26663
- https://ubuntu.com/security/CVE-2024-26664
- https://ubuntu.com/security/CVE-2024-26665
- https://ubuntu.com/security/CVE-2024-26666
- https://ubuntu.com/security/CVE-2024-26667
- https://ubuntu.com/security/CVE-2024-26674
- https://ubuntu.com/security/CVE-2024-26675
- https://ubuntu.com/security/CVE-2024-26676
- https://ubuntu.com/security/CVE-2024-26677
- https://ubuntu.com/security/CVE-2024-26679
- https://ubuntu.com/security/CVE-2024-26680
- https://ubuntu.com/security/CVE-2024-26681
- https://ubuntu.com/security/CVE-2024-26684
- https://ubuntu.com/security/CVE-2024-26685
- https://ubuntu.com/security/CVE-2024-26688
- https://ubuntu.com/security/CVE-2024-26689
- https://ubuntu.com/security/CVE-2024-26691
- https://ubuntu.com/security/CVE-2024-26693
- https://ubuntu.com/security/CVE-2024-26694
- https://ubuntu.com/security/CVE-2024-26695
- https://ubuntu.com/security/CVE-2024-26696
- https://ubuntu.com/security/CVE-2024-26697
- https://ubuntu.com/security/CVE-2024-26698
- https://ubuntu.com/security/CVE-2024-26700
- https://ubuntu.com/security/CVE-2024-26702
- https://ubuntu.com/security/CVE-2024-26703
- https://ubuntu.com/security/CVE-2024-26707
- https://ubuntu.com/security/CVE-2024-26708
- https://ubuntu.com/security/CVE-2024-26710
- https://ubuntu.com/security/CVE-2024-26711
- https://ubuntu.com/security/CVE-2024-26712
- https://ubuntu.com/security/CVE-2024-26714
- https://ubuntu.com/security/CVE-2024-26715
- https://ubuntu.com/security/CVE-2024-26716
- https://ubuntu.com/security/CVE-2024-26717
- https://ubuntu.com/security/CVE-2024-26718
- https://ubuntu.com/security/CVE-2024-26719
- https://ubuntu.com/security/CVE-2024-26720
- https://ubuntu.com/security/CVE-2024-26722
- https://ubuntu.com/security/CVE-2024-26723
- https://ubuntu.com/security/CVE-2024-26726
- https://ubuntu.com/security/CVE-2024-26733
- https://ubuntu.com/security/CVE-2024-26734
- https://ubuntu.com/security/CVE-2024-26735
- https://ubuntu.com/security/CVE-2024-26736
- https://ubuntu.com/security/CVE-2024-26748
- https://ubuntu.com/security/CVE-2024-26782
- https://ubuntu.com/security/CVE-2024-26789
- https://ubuntu.com/security/CVE-2024-26790
- https://ubuntu.com/security/CVE-2024-26792
- https://ubuntu.com/security/CVE-2024-26798
- https://ubuntu.com/security/CVE-2024-26802
- https://ubuntu.com/security/CVE-2024-26803
- https://ubuntu.com/security/CVE-2024-26818
- https://ubuntu.com/security/CVE-2024-26820
- https://ubuntu.com/security/CVE-2024-26822
- https://ubuntu.com/security/CVE-2024-26824
- https://ubuntu.com/security/CVE-2024-26825
- https://ubuntu.com/security/CVE-2024-26826
- https://ubuntu.com/security/CVE-2024-26828
- https://ubuntu.com/security/CVE-2024-26829
- https://ubuntu.com/security/CVE-2024-26830
- https://ubuntu.com/security/CVE-2024-26831
- https://ubuntu.com/security/CVE-2024-26838
- https://ubuntu.com/security/CVE-2024-26889
- https://ubuntu.com/security/CVE-2024-26890
- https://ubuntu.com/security/CVE-2024-26898
- https://ubuntu.com/security/CVE-2024-26910
- https://ubuntu.com/security/CVE-2024-26916
- https://ubuntu.com/security/CVE-2024-26917
- https://ubuntu.com/security/CVE-2024-26919
- https://ubuntu.com/security/CVE-2024-26920
- https://ubuntu.com/security/CVE-2024-26922
- https://ubuntu.com/security/CVE-2024-26923
- https://ubuntu.com/security/CVE-2024-26926
- https://ubuntu.com/security/CVE-2024-27416
- https://ubuntu.com/security/CVE-2024-35833
Title: USN-6922-2: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6922-2
Priorities: low,medium
Description:
It was discovered that a race condition existed in the Bluetooth subsystem
in the Linux kernel when modifying certain settings values through debugfs.
A privileged local attacker could use this to cause a denial of service.
(CVE-2024-24857, CVE-2024-24858, CVE-2024-24859)
Chenyuan Yang discovered that the Unsorted Block Images (UBI) flash device
volume management subsystem did not properly validate logical eraseblock
sizes in certain situations. An attacker could possibly use this to cause a
denial of service (system crash). (CVE-2024-25739)
CVEs:
- https://ubuntu.com/security/CVE-2024-24857
- https://ubuntu.com/security/CVE-2024-24858
- https://ubuntu.com/security/CVE-2024-24859
- https://ubuntu.com/security/CVE-2024-25739
Title: USN-6940-1: snapd vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6940-1
Priorities: medium
Description:
Neil McPhail discovered that snapd did not properly restrict writes to the
$HOME/bin path in the AppArmor profile for snaps using the home plug. An
attacker who could convince a user to install a malicious snap could use this
vulnerability to escape the snap sandbox. (CVE-2024-1724)
Zeyad Gouda discovered that snapd failed to properly check the file type when
extracting a snap. An attacker who could convince a user to install a malicious
snap containing non-regular files could then cause snapd to block indefinitely
while trying to read from such files and cause a denial of
service. (CVE-2024-29068)
Zeyad Gouda discovered that snapd failed to properly check the destination of
symbolic links when extracting a snap. An attacker who could convince a user to
install a malicious snap containing crafted symbolic links could then cause
snapd to write out the contents of the symbolic link destination into a
world-readable directory. This in-turn could allow a local unprivileged user to
gain access to privileged information. (CVE-2024-29069)
CVEs:
- https://ubuntu.com/security/CVE-2024-1724
- https://ubuntu.com/security/CVE-2024-29068
- https://ubuntu.com/security/CVE-2024-29069
Title: USN-6942-1: Gross vulnerability
URL: https://ubuntu.com/security/notices/USN-6942-1
Priorities: medium
Description:
It was discovered that Gross incorrectly handled memory when composing log
entries. An attacker could possibly use this issue to cause Gross to crash,
resulting in a denial of service, or possibly execute arbitrary code.
CVEs:
Title: USN-6943-1: Tomcat vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6943-1
Priorities: low,medium
Description:
It was discovered that Tomcat incorrectly handled certain uncommon
PersistenceManager with FileStore configurations. A remote attacker could
possibly use this issue to execute arbitrary code. This issue only affected
tomcat8 for Ubuntu 18.04 LTS (CVE-2020-9484)
It was discovered that Tomcat incorrectly handled certain HTTP/2 connection
requests. A remote attacker could use this issue to obtain wrong responses
possibly containing sensitive information. This issue only affected tomcat8
for Ubuntu 18.04 LTS (CVE-2021-25122)
Thomas Wozenilek discovered that Tomcat incorrectly handled certain TLS
packets. A remote attacker could possibly use this issue to cause a denial
of service. This issue only affected tomcat8 for Ubuntu 18.04 LTS
(CVE-2021-41079)
Trung Pham discovered that a race condition existed in Tomcat when handling
session files with FileStore. A remote attacker could possibly use this
issue to execute arbitrary code. This issue affected tomcat8 for Ubuntu
16.04 LTS and Ubuntu 18.04 LTS, and tomcat9 for Ubuntu 18.04 LTS and Ubuntu
20.04 LTS (CVE-2022-23181)
It was discovered that Tomcat's documentation incorrectly stated that
EncryptInterceptor provided availability protection when running over an
untrusted network. A remote attacker could possibly use this issue to cause
a denial of service even if EncryptInterceptor was being used. This issue
affected tomcat8 for Ubuntu 18.04 LTS, and tomcat9 for Ubuntu 18.04 LTS,
Ubuntu 20.04 LTS and Ubuntu 22.04 LTS (CVE-2022-29885)
CVEs:
- https://ubuntu.com/security/CVE-2020-9484
- https://ubuntu.com/security/CVE-2021-25122
- https://ubuntu.com/security/CVE-2021-41079
- https://ubuntu.com/security/CVE-2022-23181
- https://ubuntu.com/security/CVE-2022-29885
Title: USN-6945-1: wpa_supplicant and hostapd vulnerability
URL: https://ubuntu.com/security/notices/USN-6945-1
Priorities: medium
Description:
Rory McNamara discovered that wpa_supplicant could be made to load
arbitrary shared objects by unprivileged users that have access to
the control interface. An attacker could use this to escalate privileges
to root.
CVEs:
Title: USN-6949-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6949-1
Priorities: medium,high
Description:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM32 architecture;
- ARM64 architecture;
- M68K architecture;
- OpenRISC architecture;
- PowerPC architecture;
- RISC-V architecture;
- x86 architecture;
- Block layer subsystem;
- Accessibility subsystem;
- Bluetooth drivers;
- Clock framework and drivers;
- CPU frequency scaling framework;
- Hardware crypto device drivers;
- DMA engine subsystem;
- DPLL subsystem;
- FireWire subsystem;
- EFI core;
- Qualcomm firmware drivers;
- GPIO subsystem;
- GPU drivers;
- Microsoft Hyper-V drivers;
- InfiniBand drivers;
- IOMMU subsystem;
- IRQ chip drivers;
- Macintosh device drivers;
- Multiple devices driver;
- Media drivers;
- EEPROM drivers;
- MMC subsystem;
- Network drivers;
- STMicroelectronics network drivers;
- Device tree and open firmware driver;
- HiSilicon SoC PMU drivers;
- PHY drivers;
- Pin controllers subsystem;
- Remote Processor subsystem;
- S/390 drivers;
- SCSI drivers;
- SPI subsystem;
- Media staging drivers;
- Thermal drivers;
- Userspace I/O drivers;
- USB subsystem;
- DesignWare USB3 driver;
- ACRN Hypervisor Service Module driver;
- Virtio drivers;
- 9P distributed file system;
- BTRFS file system;
- eCrypt file system;
- EROFS file system;
- File systems infrastructure;
- GFS2 file system;
- JFFS2 file system;
- Network file systems library;
- Network file system client;
- Network file system server daemon;
- NILFS2 file system;
- Proc file system;
- SMB network file system;
- Tracing file system;
- Mellanox drivers;
- Memory management;
- Socket messages infrastructure;
- Slab allocator;
- Tracing infrastructure;
- User-space API (UAPI);
- Core kernel;
- BPF subsystem;
- DMA mapping infrastructure;
- RCU subsystem;
- Dynamic debug library;
- KUnit library;
- Maple Tree data structure library;
- Heterogeneous memory management;
- Amateur Radio drivers;
- Bluetooth subsystem;
- Ethernet bridge;
- Networking core;
- IPv4 networking;
- IPv6 networking;
- Multipath TCP;
- Netfilter;
- NET/ROM layer;
- NFC subsystem;
- NSH protocol;
- Open vSwitch;
- Phonet protocol;
- SMC sockets;
- TIPC protocol;
- Unix domain sockets;
- Wireless networking;
- Key management;
- ALSA framework;
- HD-audio driver;
- Kirkwood ASoC drivers;
- MediaTek ASoC drivers;
(CVE-2024-36006, CVE-2024-36922, CVE-2024-38567, CVE-2024-38584,
CVE-2024-36923, CVE-2024-36892, CVE-2024-35855, CVE-2024-35853,
CVE-2024-38562, CVE-2024-36920, CVE-2024-38543, CVE-2024-38576,
CVE-2024-38572, CVE-2024-36898, CVE-2024-38560, CVE-2024-36004,
CVE-2024-36956, CVE-2024-36881, CVE-2024-36977, CVE-2024-36955,
CVE-2024-36906, CVE-2024-36013, CVE-2024-36884, CVE-2024-38563,
CVE-2024-36966, CVE-2024-38547, CVE-2024-38594, CVE-2024-36926,
CVE-2024-38587, CVE-2024-38566, CVE-2024-27400, CVE-2024-36941,
CVE-2024-36017, CVE-2024-38544, CVE-2024-36899, CVE-2024-35851,
CVE-2024-38577, CVE-2024-38590, CVE-2024-38568, CVE-2024-38559,
CVE-2024-38611, CVE-2024-36887, CVE-2024-36886, CVE-2024-35996,
CVE-2024-38612, CVE-2024-36925, CVE-2024-38586, CVE-2024-38596,
CVE-2024-36932, CVE-2024-39482, CVE-2024-38585, CVE-2024-36033,
CVE-2024-38614, CVE-2024-35852, CVE-2024-36908, CVE-2024-36939,
CVE-2024-36963, CVE-2024-27401, CVE-2024-36029, CVE-2024-38540,
CVE-2024-38565, CVE-2024-36927, CVE-2024-36910, CVE-2024-42134,
CVE-2024-36888, CVE-2024-35859, CVE-2024-36911, CVE-2024-35947,
CVE-2024-36940, CVE-2024-36921, CVE-2024-36913, CVE-2024-36943,
CVE-2024-35986, CVE-2024-38616, CVE-2024-36900, CVE-2024-36954,
CVE-2024-36915, CVE-2024-38602, CVE-2024-41011, CVE-2024-35991,
CVE-2024-36909, CVE-2024-38603, CVE-2023-52882, CVE-2024-36953,
CVE-2024-38599, CVE-2024-38574, CVE-2024-36967, CVE-2024-36895,
CVE-2024-36003, CVE-2024-36961, CVE-2024-38545, CVE-2024-38538,
CVE-2024-36001, CVE-2024-36912, CVE-2024-36952, CVE-2024-38550,
CVE-2024-38570, CVE-2024-36969, CVE-2024-38595, CVE-2024-35849,
CVE-2024-36936, CVE-2024-35949, CVE-2024-36009, CVE-2024-35987,
CVE-2024-38541, CVE-2024-38564, CVE-2024-36032, CVE-2024-38615,
CVE-2024-36960, CVE-2024-36934, CVE-2024-36951, CVE-2024-35999,
CVE-2024-38551, CVE-2024-36903, CVE-2024-36931, CVE-2024-38593,
CVE-2024-36938, CVE-2024-38607, CVE-2024-36928, CVE-2024-38552,
CVE-2024-36002, CVE-2024-38605, CVE-2024-38582, CVE-2024-36933,
CVE-2024-38620, CVE-2024-27395, CVE-2024-27396, CVE-2024-36012,
CVE-2024-38591, CVE-2024-38597, CVE-2024-36889, CVE-2024-36964,
CVE-2024-38606, CVE-2024-38553, CVE-2024-36945, CVE-2024-35848,
CVE-2024-36962, CVE-2024-36947, CVE-2024-27399, CVE-2024-38546,
CVE-2024-38583, CVE-2024-38573, CVE-2024-35850, CVE-2024-38549,
CVE-2024-38588, CVE-2024-38610, CVE-2024-36917, CVE-2024-36957,
CVE-2024-35846, CVE-2024-38579, CVE-2024-36965, CVE-2024-35857,
CVE-2024-38548, CVE-2024-36975, CVE-2024-36919, CVE-2024-38542,
CVE-2024-36948, CVE-2024-36011, CVE-2024-38556, CVE-2024-36897,
CVE-2024-38557, CVE-2024-36890, CVE-2024-36882, CVE-2024-38613,
CVE-2024-36914, CVE-2024-35998, CVE-2024-36958, CVE-2024-38580,
CVE-2024-36896, CVE-2024-36891, CVE-2024-36924, CVE-2024-38589,
CVE-2024-38592, CVE-2024-36904, CVE-2024-36894, CVE-2024-36028,
CVE-2024-36014, CVE-2024-36880, CVE-2024-36944, CVE-2024-38598,
CVE-2024-36929, CVE-2024-36883, CVE-2024-35858, CVE-2024-38555,
CVE-2024-36005, CVE-2024-38539, CVE-2024-35994, CVE-2024-36030,
CVE-2024-27394, CVE-2024-36930, CVE-2024-36937, CVE-2024-38561,
CVE-2024-38578, CVE-2024-36959, CVE-2024-36935, CVE-2024-36916,
CVE-2024-36902, CVE-2024-38604, CVE-2024-38554, CVE-2024-38575,
CVE-2024-36918, CVE-2024-36979, CVE-2024-35854, CVE-2024-36968,
CVE-2024-38558, CVE-2024-36000, CVE-2024-27398, CVE-2024-35983,
CVE-2024-36949, CVE-2024-38600, CVE-2024-36950, CVE-2024-36946,
CVE-2024-36031, CVE-2024-35847, CVE-2024-36905, CVE-2024-38571,
CVE-2024-36007, CVE-2024-35856, CVE-2024-38601, CVE-2024-38569,
CVE-2024-38617, CVE-2024-35988, CVE-2024-35989, CVE-2024-35993,
CVE-2024-36893, CVE-2024-36901)
CVEs: - https://ubuntu.com/security/CVE-2023-52882
- https://ubuntu.com/security/CVE-2024-27394
- https://ubuntu.com/security/CVE-2024-27395
- https://ubuntu.com/security/CVE-2024-27396
- https://ubuntu.com/security/CVE-2024-27398
- https://ubuntu.com/security/CVE-2024-27399
- https://ubuntu.com/security/CVE-2024-27400
- https://ubuntu.com/security/CVE-2024-27401
- https://ubuntu.com/security/CVE-2024-35846
- https://ubuntu.com/security/CVE-2024-35847
- https://ubuntu.com/security/CVE-2024-35848
- https://ubuntu.com/security/CVE-2024-35849
- https://ubuntu.com/security/CVE-2024-35850
- https://ubuntu.com/security/CVE-2024-35851
- https://ubuntu.com/security/CVE-2024-35852
- https://ubuntu.com/security/CVE-2024-35853
- https://ubuntu.com/security/CVE-2024-35854
- https://ubuntu.com/security/CVE-2024-35855
- https://ubuntu.com/security/CVE-2024-35856
- https://ubuntu.com/security/CVE-2024-35857
- https://ubuntu.com/security/CVE-2024-35858
- https://ubuntu.com/security/CVE-2024-35859
- https://ubuntu.com/security/CVE-2024-35947
- https://ubuntu.com/security/CVE-2024-35949
- https://ubuntu.com/security/CVE-2024-35983
- https://ubuntu.com/security/CVE-2024-35986
- https://ubuntu.com/security/CVE-2024-35987
- https://ubuntu.com/security/CVE-2024-35988
- https://ubuntu.com/security/CVE-2024-35989
- https://ubuntu.com/security/CVE-2024-35991
- https://ubuntu.com/security/CVE-2024-35993
- https://ubuntu.com/security/CVE-2024-35994
- https://ubuntu.com/security/CVE-2024-35996
- https://ubuntu.com/security/CVE-2024-35998
- https://ubuntu.com/security/CVE-2024-35999
- https://ubuntu.com/security/CVE-2024-36000
- https://ubuntu.com/security/CVE-2024-36001
- https://ubuntu.com/security/CVE-2024-36002
- https://ubuntu.com/security/CVE-2024-36003
- https://ubuntu.com/security/CVE-2024-36004
- https://ubuntu.com/security/CVE-2024-36005
- https://ubuntu.com/security/CVE-2024-36006
- https://ubuntu.com/security/CVE-2024-36007
- https://ubuntu.com/security/CVE-2024-36009
- https://ubuntu.com/security/CVE-2024-36011
- https://ubuntu.com/security/CVE-2024-36012
- https://ubuntu.com/security/CVE-2024-36013
- https://ubuntu.com/security/CVE-2024-36014
- https://ubuntu.com/security/CVE-2024-36017
- https://ubuntu.com/security/CVE-2024-36028
- https://ubuntu.com/security/CVE-2024-36029
- https://ubuntu.com/security/CVE-2024-36030
- https://ubuntu.com/security/CVE-2024-36031
- https://ubuntu.com/security/CVE-2024-36032
- https://ubuntu.com/security/CVE-2024-36033
- https://ubuntu.com/security/CVE-2024-36880
- https://ubuntu.com/security/CVE-2024-36881
- https://ubuntu.com/security/CVE-2024-36882
- https://ubuntu.com/security/CVE-2024-36883
- https://ubuntu.com/security/CVE-2024-36884
- https://ubuntu.com/security/CVE-2024-36886
- https://ubuntu.com/security/CVE-2024-36887
- https://ubuntu.com/security/CVE-2024-36888
- https://ubuntu.com/security/CVE-2024-36889
- https://ubuntu.com/security/CVE-2024-36890
- https://ubuntu.com/security/CVE-2024-36891
- https://ubuntu.com/security/CVE-2024-36892
- https://ubuntu.com/security/CVE-2024-36893
- https://ubuntu.com/security/CVE-2024-36894
- https://ubuntu.com/security/CVE-2024-36895
- https://ubuntu.com/security/CVE-2024-36896
- https://ubuntu.com/security/CVE-2024-36897
- https://ubuntu.com/security/CVE-2024-36898
- https://ubuntu.com/security/CVE-2024-36899
- https://ubuntu.com/security/CVE-2024-36900
- https://ubuntu.com/security/CVE-2024-36901
- https://ubuntu.com/security/CVE-2024-36902
- https://ubuntu.com/security/CVE-2024-36903
- https://ubuntu.com/security/CVE-2024-36904
- https://ubuntu.com/security/CVE-2024-36905
- https://ubuntu.com/security/CVE-2024-36906
- https://ubuntu.com/security/CVE-2024-36908
- https://ubuntu.com/security/CVE-2024-36909
- https://ubuntu.com/security/CVE-2024-36910
- https://ubuntu.com/security/CVE-2024-36911
- https://ubuntu.com/security/CVE-2024-36912
- https://ubuntu.com/security/CVE-2024-36913
- https://ubuntu.com/security/CVE-2024-36914
- https://ubuntu.com/security/CVE-2024-36915
- https://ubuntu.com/security/CVE-2024-36916
- https://ubuntu.com/security/CVE-2024-36917
- https://ubuntu.com/security/CVE-2024-36918
- https://ubuntu.com/security/CVE-2024-36919
- https://ubuntu.com/security/CVE-2024-36920
- https://ubuntu.com/security/CVE-2024-36921
- https://ubuntu.com/security/CVE-2024-36922
- https://ubuntu.com/security/CVE-2024-36923
- https://ubuntu.com/security/CVE-2024-36924
- https://ubuntu.com/security/CVE-2024-36925
- https://ubuntu.com/security/CVE-2024-36926
- https://ubuntu.com/security/CVE-2024-36927
- https://ubuntu.com/security/CVE-2024-36928
- https://ubuntu.com/security/CVE-2024-36929
- https://ubuntu.com/security/CVE-2024-36930
- https://ubuntu.com/security/CVE-2024-36931
- https://ubuntu.com/security/CVE-2024-36932
- https://ubuntu.com/security/CVE-2024-36933
- https://ubuntu.com/security/CVE-2024-36934
- https://ubuntu.com/security/CVE-2024-36935
- https://ubuntu.com/security/CVE-2024-36936
- https://ubuntu.com/security/CVE-2024-36937
- https://ubuntu.com/security/CVE-2024-36938
- https://ubuntu.com/security/CVE-2024-36939
- https://ubuntu.com/security/CVE-2024-36940
- https://ubuntu.com/security/CVE-2024-36941
- https://ubuntu.com/security/CVE-2024-36943
- https://ubuntu.com/security/CVE-2024-36944
- https://ubuntu.com/security/CVE-2024-36945
- https://ubuntu.com/security/CVE-2024-36946
- https://ubuntu.com/security/CVE-2024-36947
- https://ubuntu.com/security/CVE-2024-36948
- https://ubuntu.com/security/CVE-2024-36949
- https://ubuntu.com/security/CVE-2024-36950
- https://ubuntu.com/security/CVE-2024-36951
- https://ubuntu.com/security/CVE-2024-36952
- https://ubuntu.com/security/CVE-2024-36953
- https://ubuntu.com/security/CVE-2024-36954
- https://ubuntu.com/security/CVE-2024-36955
- https://ubuntu.com/security/CVE-2024-36956
- https://ubuntu.com/security/CVE-2024-36957
- https://ubuntu.com/security/CVE-2024-36958
- https://ubuntu.com/security/CVE-2024-36959
- https://ubuntu.com/security/CVE-2024-36960
- https://ubuntu.com/security/CVE-2024-36961
- https://ubuntu.com/security/CVE-2024-36962
- https://ubuntu.com/security/CVE-2024-36963
- https://ubuntu.com/security/CVE-2024-36964
- https://ubuntu.com/security/CVE-2024-36965
- https://ubuntu.com/security/CVE-2024-36966
- https://ubuntu.com/security/CVE-2024-36967
- https://ubuntu.com/security/CVE-2024-36968
- https://ubuntu.com/security/CVE-2024-36969
- https://ubuntu.com/security/CVE-2024-36975
- https://ubuntu.com/security/CVE-2024-36977
- https://ubuntu.com/security/CVE-2024-36979
- https://ubuntu.com/security/CVE-2024-38538
- https://ubuntu.com/security/CVE-2024-38539
- https://ubuntu.com/security/CVE-2024-38540
- https://ubuntu.com/security/CVE-2024-38541
- https://ubuntu.com/security/CVE-2024-38542
- https://ubuntu.com/security/CVE-2024-38543
- https://ubuntu.com/security/CVE-2024-38544
- https://ubuntu.com/security/CVE-2024-38545
- https://ubuntu.com/security/CVE-2024-38546
- https://ubuntu.com/security/CVE-2024-38547
- https://ubuntu.com/security/CVE-2024-38548
- https://ubuntu.com/security/CVE-2024-38549
- https://ubuntu.com/security/CVE-2024-38550
- https://ubuntu.com/security/CVE-2024-38551
- https://ubuntu.com/security/CVE-2024-38552
- https://ubuntu.com/security/CVE-2024-38553
- https://ubuntu.com/security/CVE-2024-38554
- https://ubuntu.com/security/CVE-2024-38555
- https://ubuntu.com/security/CVE-2024-38556
- https://ubuntu.com/security/CVE-2024-38557
- https://ubuntu.com/security/CVE-2024-38558
- https://ubuntu.com/security/CVE-2024-38559
- https://ubuntu.com/security/CVE-2024-38560
- https://ubuntu.com/security/CVE-2024-38561
- https://ubuntu.com/security/CVE-2024-38562
- https://ubuntu.com/security/CVE-2024-38563
- https://ubuntu.com/security/CVE-2024-38564
- https://ubuntu.com/security/CVE-2024-38565
- https://ubuntu.com/security/CVE-2024-38566
- https://ubuntu.com/security/CVE-2024-38567
- https://ubuntu.com/security/CVE-2024-38568
- https://ubuntu.com/security/CVE-2024-38569
- https://ubuntu.com/security/CVE-2024-38570
- https://ubuntu.com/security/CVE-2024-38571
- https://ubuntu.com/security/CVE-2024-38572
- https://ubuntu.com/security/CVE-2024-38573
- https://ubuntu.com/security/CVE-2024-38574
- https://ubuntu.com/security/CVE-2024-38575
- https://ubuntu.com/security/CVE-2024-38576
- https://ubuntu.com/security/CVE-2024-38577
- https://ubuntu.com/security/CVE-2024-38578
- https://ubuntu.com/security/CVE-2024-38579
- https://ubuntu.com/security/CVE-2024-38580
- https://ubuntu.com/security/CVE-2024-38582
- https://ubuntu.com/security/CVE-2024-38583
- https://ubuntu.com/security/CVE-2024-38584
- https://ubuntu.com/security/CVE-2024-38585
- https://ubuntu.com/security/CVE-2024-38586
- https://ubuntu.com/security/CVE-2024-38587
- https://ubuntu.com/security/CVE-2024-38588
- https://ubuntu.com/security/CVE-2024-38589
- https://ubuntu.com/security/CVE-2024-38590
- https://ubuntu.com/security/CVE-2024-38591
- https://ubuntu.com/security/CVE-2024-38592
- https://ubuntu.com/security/CVE-2024-38593
- https://ubuntu.com/security/CVE-2024-38594
- https://ubuntu.com/security/CVE-2024-38595
- https://ubuntu.com/security/CVE-2024-38596
- https://ubuntu.com/security/CVE-2024-38597
- https://ubuntu.com/security/CVE-2024-38598
- https://ubuntu.com/security/CVE-2024-38599
- https://ubuntu.com/security/CVE-2024-38600
- https://ubuntu.com/security/CVE-2024-38601
- https://ubuntu.com/security/CVE-2024-38602
- https://ubuntu.com/security/CVE-2024-38603
- https://ubuntu.com/security/CVE-2024-38604
- https://ubuntu.com/security/CVE-2024-38605
- https://ubuntu.com/security/CVE-2024-38606
- https://ubuntu.com/security/CVE-2024-38607
- https://ubuntu.com/security/CVE-2024-38610
- https://ubuntu.com/security/CVE-2024-38611
- https://ubuntu.com/security/CVE-2024-38612
- https://ubuntu.com/security/CVE-2024-38613
- https://ubuntu.com/security/CVE-2024-38614
- https://ubuntu.com/security/CVE-2024-38615
- https://ubuntu.com/security/CVE-2024-38616
- https://ubuntu.com/security/CVE-2024-38617
- https://ubuntu.com/security/CVE-2024-38620
- https://ubuntu.com/security/CVE-2024-39482
- https://ubuntu.com/security/CVE-2024-41011
- https://ubuntu.com/security/CVE-2024-42134
Title: USN-6950-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6950-1
Priorities: medium
Description:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM32 architecture;
- ARM64 architecture;
- Block layer subsystem;
- Bluetooth drivers;
- Clock framework and drivers;
- FireWire subsystem;
- GPU drivers;
- InfiniBand drivers;
- Multiple devices driver;
- EEPROM drivers;
- Network drivers;
- Pin controllers subsystem;
- Remote Processor subsystem;
- S/390 drivers;
- SCSI drivers;
- 9P distributed file system;
- Network file system client;
- SMB network file system;
- Socket messages infrastructure;
- Dynamic debug library;
- Bluetooth subsystem;
- Networking core;
- IPv4 networking;
- IPv6 networking;
- Multipath TCP;
- NSH protocol;
- Phonet protocol;
- TIPC protocol;
- Wireless networking;
- Key management;
- ALSA framework;
- HD-audio driver;
(CVE-2024-36883, CVE-2024-36940, CVE-2024-36902, CVE-2024-36975,
CVE-2024-36964, CVE-2024-36938, CVE-2024-36931, CVE-2024-35848,
CVE-2024-26900, CVE-2024-36967, CVE-2024-36904, CVE-2024-27398,
CVE-2024-36031, CVE-2023-52585, CVE-2024-36886, CVE-2024-36937,
CVE-2024-36954, CVE-2024-36916, CVE-2024-36905, CVE-2024-36959,
CVE-2024-26980, CVE-2024-26936, CVE-2024-36928, CVE-2024-36889,
CVE-2024-36929, CVE-2024-36933, CVE-2024-27399, CVE-2024-36946,
CVE-2024-36906, CVE-2024-36965, CVE-2024-36957, CVE-2024-36941,
CVE-2024-36897, CVE-2024-36952, CVE-2024-36947, CVE-2024-36950,
CVE-2024-36880, CVE-2024-36017, CVE-2023-52882, CVE-2024-36969,
CVE-2024-38600, CVE-2024-36955, CVE-2024-36960, CVE-2024-27401,
CVE-2024-36919, CVE-2024-36934, CVE-2024-35947, CVE-2024-36953,
CVE-2024-36944, CVE-2024-36939)
CVEs: - https://ubuntu.com/security/CVE-2023-52585
- https://ubuntu.com/security/CVE-2023-52882
- https://ubuntu.com/security/CVE-2024-26900
- https://ubuntu.com/security/CVE-2024-26936
- https://ubuntu.com/security/CVE-2024-26980
- https://ubuntu.com/security/CVE-2024-27398
- https://ubuntu.com/security/CVE-2024-27399
- https://ubuntu.com/security/CVE-2024-27401
- https://ubuntu.com/security/CVE-2024-35848
- https://ubuntu.com/security/CVE-2024-35947
- https://ubuntu.com/security/CVE-2024-36017
- https://ubuntu.com/security/CVE-2024-36031
- https://ubuntu.com/security/CVE-2024-36880
- https://ubuntu.com/security/CVE-2024-36883
- https://ubuntu.com/security/CVE-2024-36886
- https://ubuntu.com/security/CVE-2024-36889
- https://ubuntu.com/security/CVE-2024-36897
- https://ubuntu.com/security/CVE-2024-36902
- https://ubuntu.com/security/CVE-2024-36904
- https://ubuntu.com/security/CVE-2024-36905
- https://ubuntu.com/security/CVE-2024-36906
- https://ubuntu.com/security/CVE-2024-36916
- https://ubuntu.com/security/CVE-2024-36919
- https://ubuntu.com/security/CVE-2024-36928
- https://ubuntu.com/security/CVE-2024-36929
- https://ubuntu.com/security/CVE-2024-36931
- https://ubuntu.com/security/CVE-2024-36933
- https://ubuntu.com/security/CVE-2024-36934
- https://ubuntu.com/security/CVE-2024-36937
- https://ubuntu.com/security/CVE-2024-36938
- https://ubuntu.com/security/CVE-2024-36939
- https://ubuntu.com/security/CVE-2024-36940
- https://ubuntu.com/security/CVE-2024-36941
- https://ubuntu.com/security/CVE-2024-36944
- https://ubuntu.com/security/CVE-2024-36946
- https://ubuntu.com/security/CVE-2024-36947
- https://ubuntu.com/security/CVE-2024-36950
- https://ubuntu.com/security/CVE-2024-36952
- https://ubuntu.com/security/CVE-2024-36953
- https://ubuntu.com/security/CVE-2024-36954
- https://ubuntu.com/security/CVE-2024-36955
- https://ubuntu.com/security/CVE-2024-36957
- https://ubuntu.com/security/CVE-2024-36959
- https://ubuntu.com/security/CVE-2024-36960
- https://ubuntu.com/security/CVE-2024-36964
- https://ubuntu.com/security/CVE-2024-36965
- https://ubuntu.com/security/CVE-2024-36967
- https://ubuntu.com/security/CVE-2024-36969
- https://ubuntu.com/security/CVE-2024-36975
- https://ubuntu.com/security/CVE-2024-38600
Title: USN-6950-2: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6950-2
Priorities: medium
Description:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM32 architecture;
- ARM64 architecture;
- Block layer subsystem;
- Bluetooth drivers;
- Clock framework and drivers;
- FireWire subsystem;
- GPU drivers;
- InfiniBand drivers;
- Multiple devices driver;
- EEPROM drivers;
- Network drivers;
- Pin controllers subsystem;
- Remote Processor subsystem;
- S/390 drivers;
- SCSI drivers;
- 9P distributed file system;
- Network file system client;
- SMB network file system;
- Socket messages infrastructure;
- Dynamic debug library;
- Bluetooth subsystem;
- Networking core;
- IPv4 networking;
- IPv6 networking;
- Multipath TCP;
- NSH protocol;
- Phonet protocol;
- TIPC protocol;
- Wireless networking;
- Key management;
- ALSA framework;
- HD-audio driver;
(CVE-2024-36883, CVE-2024-36940, CVE-2024-36902, CVE-2024-36975,
CVE-2024-36964, CVE-2024-36938, CVE-2024-36931, CVE-2024-35848,
CVE-2024-26900, CVE-2024-36967, CVE-2024-36904, CVE-2024-27398,
CVE-2024-36031, CVE-2023-52585, CVE-2024-36886, CVE-2024-36937,
CVE-2024-36954, CVE-2024-36916, CVE-2024-36905, CVE-2024-36959,
CVE-2024-26980, CVE-2024-26936, CVE-2024-36928, CVE-2024-36889,
CVE-2024-36929, CVE-2024-36933, CVE-2024-27399, CVE-2024-36946,
CVE-2024-36906, CVE-2024-36965, CVE-2024-36957, CVE-2024-36941,
CVE-2024-36897, CVE-2024-36952, CVE-2024-36947, CVE-2024-36950,
CVE-2024-36880, CVE-2024-36017, CVE-2023-52882, CVE-2024-36969,
CVE-2024-38600, CVE-2024-36955, CVE-2024-36960, CVE-2024-27401,
CVE-2024-36919, CVE-2024-36934, CVE-2024-35947, CVE-2024-36953,
CVE-2024-36944, CVE-2024-36939)
CVEs: - https://ubuntu.com/security/CVE-2023-52585
- https://ubuntu.com/security/CVE-2023-52882
- https://ubuntu.com/security/CVE-2024-26900
- https://ubuntu.com/security/CVE-2024-26936
- https://ubuntu.com/security/CVE-2024-26980
- https://ubuntu.com/security/CVE-2024-27398
- https://ubuntu.com/security/CVE-2024-27399
- https://ubuntu.com/security/CVE-2024-27401
- https://ubuntu.com/security/CVE-2024-35848
- https://ubuntu.com/security/CVE-2024-35947
- https://ubuntu.com/security/CVE-2024-36017
- https://ubuntu.com/security/CVE-2024-36031
- https://ubuntu.com/security/CVE-2024-36880
- https://ubuntu.com/security/CVE-2024-36883
- https://ubuntu.com/security/CVE-2024-36886
- https://ubuntu.com/security/CVE-2024-36889
- https://ubuntu.com/security/CVE-2024-36897
- https://ubuntu.com/security/CVE-2024-36902
- https://ubuntu.com/security/CVE-2024-36904
- https://ubuntu.com/security/CVE-2024-36905
- https://ubuntu.com/security/CVE-2024-36906
- https://ubuntu.com/security/CVE-2024-36916
- https://ubuntu.com/security/CVE-2024-36919
- https://ubuntu.com/security/CVE-2024-36928
- https://ubuntu.com/security/CVE-2024-36929
- https://ubuntu.com/security/CVE-2024-36931
- https://ubuntu.com/security/CVE-2024-36933
- https://ubuntu.com/security/CVE-2024-36934
- https://ubuntu.com/security/CVE-2024-36937
- https://ubuntu.com/security/CVE-2024-36938
- https://ubuntu.com/security/CVE-2024-36939
- https://ubuntu.com/security/CVE-2024-36940
- https://ubuntu.com/security/CVE-2024-36941
- https://ubuntu.com/security/CVE-2024-36944
- https://ubuntu.com/security/CVE-2024-36946
- https://ubuntu.com/security/CVE-2024-36947
- https://ubuntu.com/security/CVE-2024-36950
- https://ubuntu.com/security/CVE-2024-36952
- https://ubuntu.com/security/CVE-2024-36953
- https://ubuntu.com/security/CVE-2024-36954
- https://ubuntu.com/security/CVE-2024-36955
- https://ubuntu.com/security/CVE-2024-36957
- https://ubuntu.com/security/CVE-2024-36959
- https://ubuntu.com/security/CVE-2024-36960
- https://ubuntu.com/security/CVE-2024-36964
- https://ubuntu.com/security/CVE-2024-36965
- https://ubuntu.com/security/CVE-2024-36967
- https://ubuntu.com/security/CVE-2024-36969
- https://ubuntu.com/security/CVE-2024-36975
- https://ubuntu.com/security/CVE-2024-38600
Title: USN-6950-3: Linux kernel (Oracle) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6950-3
Priorities: medium
Description:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM32 architecture;
- ARM64 architecture;
- Block layer subsystem;
- Bluetooth drivers;
- Clock framework and drivers;
- FireWire subsystem;
- GPU drivers;
- InfiniBand drivers;
- Multiple devices driver;
- EEPROM drivers;
- Network drivers;
- Pin controllers subsystem;
- Remote Processor subsystem;
- S/390 drivers;
- SCSI drivers;
- 9P distributed file system;
- Network file system client;
- SMB network file system;
- Socket messages infrastructure;
- Dynamic debug library;
- Bluetooth subsystem;
- Networking core;
- IPv4 networking;
- IPv6 networking;
- Multipath TCP;
- NSH protocol;
- Phonet protocol;
- TIPC protocol;
- Wireless networking;
- Key management;
- ALSA framework;
- HD-audio driver;
(CVE-2024-36883, CVE-2024-36940, CVE-2024-36902, CVE-2024-36975,
CVE-2024-36964, CVE-2024-36938, CVE-2024-36931, CVE-2024-35848,
CVE-2024-26900, CVE-2024-36967, CVE-2024-36904, CVE-2024-27398,
CVE-2024-36031, CVE-2023-52585, CVE-2024-36886, CVE-2024-36937,
CVE-2024-36954, CVE-2024-36916, CVE-2024-36905, CVE-2024-36959,
CVE-2024-26980, CVE-2024-26936, CVE-2024-36928, CVE-2024-36889,
CVE-2024-36929, CVE-2024-36933, CVE-2024-27399, CVE-2024-36946,
CVE-2024-36906, CVE-2024-36965, CVE-2024-36957, CVE-2024-36941,
CVE-2024-36897, CVE-2024-36952, CVE-2024-36947, CVE-2024-36950,
CVE-2024-36880, CVE-2024-36017, CVE-2023-52882, CVE-2024-36969,
CVE-2024-38600, CVE-2024-36955, CVE-2024-36960, CVE-2024-27401,
CVE-2024-36919, CVE-2024-36934, CVE-2024-35947, CVE-2024-36953,
CVE-2024-36944, CVE-2024-36939)
CVEs: - https://ubuntu.com/security/CVE-2023-52585
- https://ubuntu.com/security/CVE-2023-52882
- https://ubuntu.com/security/CVE-2024-26900
- https://ubuntu.com/security/CVE-2024-26936
- https://ubuntu.com/security/CVE-2024-26980
- https://ubuntu.com/security/CVE-2024-27398
- https://ubuntu.com/security/CVE-2024-27399
- https://ubuntu.com/security/CVE-2024-27401
- https://ubuntu.com/security/CVE-2024-35848
- https://ubuntu.com/security/CVE-2024-35947
- https://ubuntu.com/security/CVE-2024-36017
- https://ubuntu.com/security/CVE-2024-36031
- https://ubuntu.com/security/CVE-2024-36880
- https://ubuntu.com/security/CVE-2024-36883
- https://ubuntu.com/security/CVE-2024-36886
- https://ubuntu.com/security/CVE-2024-36889
- https://ubuntu.com/security/CVE-2024-36897
- https://ubuntu.com/security/CVE-2024-36902
- https://ubuntu.com/security/CVE-2024-36904
- https://ubuntu.com/security/CVE-2024-36905
- https://ubuntu.com/security/CVE-2024-36906
- https://ubuntu.com/security/CVE-2024-36916
- https://ubuntu.com/security/CVE-2024-36919
- https://ubuntu.com/security/CVE-2024-36928
- https://ubuntu.com/security/CVE-2024-36929
- https://ubuntu.com/security/CVE-2024-36931
- https://ubuntu.com/security/CVE-2024-36933
- https://ubuntu.com/security/CVE-2024-36934
- https://ubuntu.com/security/CVE-2024-36937
- https://ubuntu.com/security/CVE-2024-36938
- https://ubuntu.com/security/CVE-2024-36939
- https://ubuntu.com/security/CVE-2024-36940
- https://ubuntu.com/security/CVE-2024-36941
- https://ubuntu.com/security/CVE-2024-36944
- https://ubuntu.com/security/CVE-2024-36946
- https://ubuntu.com/security/CVE-2024-36947
- https://ubuntu.com/security/CVE-2024-36950
- https://ubuntu.com/security/CVE-2024-36952
- https://ubuntu.com/security/CVE-2024-36953
- https://ubuntu.com/security/CVE-2024-36954
- https://ubuntu.com/security/CVE-2024-36955
- https://ubuntu.com/security/CVE-2024-36957
- https://ubuntu.com/security/CVE-2024-36959
- https://ubuntu.com/security/CVE-2024-36960
- https://ubuntu.com/security/CVE-2024-36964
- https://ubuntu.com/security/CVE-2024-36965
- https://ubuntu.com/security/CVE-2024-36967
- https://ubuntu.com/security/CVE-2024-36969
- https://ubuntu.com/security/CVE-2024-36975
- https://ubuntu.com/security/CVE-2024-38600
Title: USN-6954-1: QEMU vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6954-1
Priorities: medium
Description:
Markus Frank and Fiona Ebner discovered that QEMU did not properly
handle certain memory operations, leading to a NULL pointer dereference.
An authenticated user could potentially use this issue to cause a denial
of service. (CVE-2023-6683)
Xiao Lei discovered that QEMU did not properly handle certain memory
operations when specific features were enabled, which could lead to a
stack overflow. An attacker could potentially use this issue to leak
sensitive information. (CVE-2023-6693)
It was discovered that QEMU had an integer underflow vulnerability in
the TI command, which would result in a buffer overflow. An attacker
could potentially use this issue to cause a denial of service.
(CVE-2024-24474)
CVEs:
- https://ubuntu.com/security/CVE-2023-6683
- https://ubuntu.com/security/CVE-2023-6693
- https://ubuntu.com/security/CVE-2024-24474
Title: USN-6956-1: Linux kernel (Azure) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6956-1
Priorities: medium,high
Description:
Benedict Schlüter, Supraja Sridhara, Andrin Bertschi, and Shweta Shinde
discovered that an untrusted hypervisor could inject malicious #VC
interrupts and compromise the security guarantees of AMD SEV-SNP. This flaw
is known as WeSee. A local attacker in control of the hypervisor could use
this to expose sensitive information or possibly execute arbitrary code in
the trusted execution environment. (CVE-2024-25742)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM32 architecture;
- ARM64 architecture;
- Block layer subsystem;
- Bluetooth drivers;
- Clock framework and drivers;
- FireWire subsystem;
- GPU drivers;
- InfiniBand drivers;
- Multiple devices driver;
- EEPROM drivers;
- Network drivers;
- Pin controllers subsystem;
- Remote Processor subsystem;
- S/390 drivers;
- SCSI drivers;
- TTY drivers;
- 9P distributed file system;
- Network file system client;
- SMB network file system;
- Socket messages infrastructure;
- Dynamic debug library;
- Bluetooth subsystem;
- Networking core;
- IPv4 networking;
- IPv6 networking;
- Multipath TCP;
- Netfilter;
- NSH protocol;
- Phonet protocol;
- TIPC protocol;
- Wireless networking;
- Key management;
- ALSA framework;
- HD-audio driver;
(CVE-2024-36933, CVE-2024-36960, CVE-2024-26936, CVE-2024-36975,
CVE-2023-52882, CVE-2024-27401, CVE-2024-36929, CVE-2024-36939,
CVE-2024-35947, CVE-2024-36883, CVE-2024-26886, CVE-2024-36952,
CVE-2024-36950, CVE-2024-36940, CVE-2024-36897, CVE-2023-52585,
CVE-2024-26900, CVE-2024-36959, CVE-2024-36928, CVE-2024-36938,
CVE-2024-36016, CVE-2024-36965, CVE-2024-36967, CVE-2024-36889,
CVE-2024-36905, CVE-2024-36969, CVE-2024-36916, CVE-2024-36954,
CVE-2024-27017, CVE-2024-36941, CVE-2024-36957, CVE-2024-27399,
CVE-2024-36937, CVE-2024-36955, CVE-2024-38600, CVE-2023-52752,
CVE-2024-36953, CVE-2024-26980, CVE-2024-36902, CVE-2024-26952,
CVE-2024-36904, CVE-2024-36964, CVE-2024-36946, CVE-2024-36880,
CVE-2024-36906, CVE-2024-36947, CVE-2024-36886, CVE-2024-36934,
CVE-2024-35848, CVE-2024-36919, CVE-2024-36017, CVE-2024-36944,
CVE-2024-36931, CVE-2024-27398)
CVEs: - https://ubuntu.com/security/CVE-2023-52585
- https://ubuntu.com/security/CVE-2023-52752
- https://ubuntu.com/security/CVE-2023-52882
- https://ubuntu.com/security/CVE-2024-25742
- https://ubuntu.com/security/CVE-2024-26886
- https://ubuntu.com/security/CVE-2024-26900
- https://ubuntu.com/security/CVE-2024-26936
- https://ubuntu.com/security/CVE-2024-26952
- https://ubuntu.com/security/CVE-2024-26980
- https://ubuntu.com/security/CVE-2024-27017
- https://ubuntu.com/security/CVE-2024-27398
- https://ubuntu.com/security/CVE-2024-27399
- https://ubuntu.com/security/CVE-2024-27401
- https://ubuntu.com/security/CVE-2024-35848
- https://ubuntu.com/security/CVE-2024-35947
- https://ubuntu.com/security/CVE-2024-36016
- https://ubuntu.com/security/CVE-2024-36017
- https://ubuntu.com/security/CVE-2024-36880
- https://ubuntu.com/security/CVE-2024-36883
- https://ubuntu.com/security/CVE-2024-36886
- https://ubuntu.com/security/CVE-2024-36889
- https://ubuntu.com/security/CVE-2024-36897
- https://ubuntu.com/security/CVE-2024-36902
- https://ubuntu.com/security/CVE-2024-36904
- https://ubuntu.com/security/CVE-2024-36905
- https://ubuntu.com/security/CVE-2024-36906
- https://ubuntu.com/security/CVE-2024-36916
- https://ubuntu.com/security/CVE-2024-36919
- https://ubuntu.com/security/CVE-2024-36928
- https://ubuntu.com/security/CVE-2024-36929
- https://ubuntu.com/security/CVE-2024-36931
- https://ubuntu.com/security/CVE-2024-36933
- https://ubuntu.com/security/CVE-2024-36934
- https://ubuntu.com/security/CVE-2024-36937
- https://ubuntu.com/security/CVE-2024-36938
- https://ubuntu.com/security/CVE-2024-36939
- https://ubuntu.com/security/CVE-2024-36940
- https://ubuntu.com/security/CVE-2024-36941
- https://ubuntu.com/security/CVE-2024-36944
- https://ubuntu.com/security/CVE-2024-36946
- https://ubuntu.com/security/CVE-2024-36947
- https://ubuntu.com/security/CVE-2024-36950
- https://ubuntu.com/security/CVE-2024-36952
- https://ubuntu.com/security/CVE-2024-36953
- https://ubuntu.com/security/CVE-2024-36954
- https://ubuntu.com/security/CVE-2024-36955
- https://ubuntu.com/security/CVE-2024-36957
- https://ubuntu.com/security/CVE-2024-36959
- https://ubuntu.com/security/CVE-2024-36960
- https://ubuntu.com/security/CVE-2024-36964
- https://ubuntu.com/security/CVE-2024-36965
- https://ubuntu.com/security/CVE-2024-36967
- https://ubuntu.com/security/CVE-2024-36969
- https://ubuntu.com/security/CVE-2024-36975
- https://ubuntu.com/security/CVE-2024-38600
Title: USN-6959-1: .NET vulnerability
URL: https://ubuntu.com/security/notices/USN-6959-1
Priorities: medium
Description:
It was discovered that .NET suffered from an information disclosure
vulnerability. An attacker could potentially use this issue to
read targeted email messages.
CVEs:
Title: USN-6960-1: RMagick vulnerability
URL: https://ubuntu.com/security/notices/USN-6960-1
Priorities: medium
Description:
Nick Browning discovered that RMagick incorrectly handled memory under
certain operations. An attacker could possibly use this issue to cause
a denial of service through memory exhaustion.
CVEs:
Title: USN-6961-1: BusyBox vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6961-1
Priorities: low,medium
Description:
It was discovered that BusyBox did not properly validate user input when
performing certain arithmetic operations. If a user or automated system
were tricked into processing a specially crafted file, an attacker could
possibly use this issue to cause a denial of service, or execute arbitrary
code. (CVE-2022-48174)
It was discovered that BusyBox incorrectly managed memory when evaluating
certain awk expressions. An attacker could possibly use this issue to cause
a denial of service, or execute arbitrary code. This issue only affected
Ubuntu 24.04 LTS. (CVE-2023-42363, CVE-2023-42364, CVE-2023-42365)
CVEs: