[USN-7158-1] Smarty vulnerabilities
[USN-7159-1] Linux kernel vulnerabilities
[USN-7155-1] Linux kernel (NVIDIA) vulnerabilities
[USN-7156-1] Linux kernel (GKE) vulnerabilities
[USN-7154-1] Linux kernel vulnerabilities
[USN-7108-2] AsyncSSH vulnerabilities
[USN-7153-1] PHP vulnerability
[USN-7158-1] Smarty vulnerabilities
=========================================================================
Ubuntu Security Notice USN-7158-1
December 12, 2024
smarty3 vulnerabilities
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
Summary:
Several security issues were fixed in Smarty.
Software Description:
- smarty3: The compiling PHP template engine
Details:
It was discovered that Smarty incorrectly handled query parameters in
requests. An attacker could possibly use this issue to inject arbitrary
Javascript code, resulting in denial of service or potential execution of
arbitrary code. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04
LTS, Ubuntu 22.04 LTS and Ubuntu 24.04 LTS.
(CVE-2018-25047, CVE-2023-28447)
It was discovered that Smarty did not properly sanitize user input when
generating templates. An attacker could, through PHP injection, possibly
use this issue to execute arbitrary code. (CVE-2024-35226)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.10
smarty3 3.1.48-1ubuntu0.24.10.1
Ubuntu 24.04 LTS
smarty3 3.1.48-1ubuntu0.24.04.1
Ubuntu 22.04 LTS
smarty3 3.1.39-2ubuntu1.22.04.2
Ubuntu 20.04 LTS
smarty3 3.1.34+20190228.1.c9f0de05+selfpack1-1ubuntu0.1
Ubuntu 18.04 LTS
smarty3 3.1.31+20161214.1.c7d42e4+selfpack1-3ubuntu0.1+esm1
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-7158-1
CVE-2018-25047, CVE-2023-28447, CVE-2024-35226
Package Information:
https://launchpad.net/ubuntu/+source/smarty3/3.1.48-1ubuntu0.24.10.1
https://launchpad.net/ubuntu/+source/smarty3/3.1.48-1ubuntu0.24.04.1
https://launchpad.net/ubuntu/+source/smarty3/3.1.39-2ubuntu1.22.04.2
https://launchpad.net/ubuntu/+source/smarty3/3.1.34+20190228.1.c9f0de05+selfpack1-1ubuntu0.1
[USN-7159-1] Linux kernel vulnerabilities
==========================================================================
Ubuntu Security Notice USN-7159-1
December 12, 2024
linux, linux-gcp, linux-gcp-5.4, linux-hwe-5.4, linux-ibm, linux-ibm-5.4,
linux-kvm, linux-raspi, linux-xilinx-zynqmp vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux: Linux kernel
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-ibm: Linux kernel for IBM cloud systems
- linux-kvm: Linux kernel for cloud environments
- linux-raspi: Linux kernel for Raspberry Pi systems
- linux-xilinx-zynqmp: Linux kernel for Xilinx ZynqMP processors
- linux-gcp-5.4: Linux kernel for Google Cloud Platform (GCP) systems
- linux-hwe-5.4: Linux hardware enablement (HWE) kernel
- linux-ibm-5.4: Linux kernel for IBM cloud systems
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM32 architecture;
- ARM64 architecture;
- S390 architecture;
- x86 architecture;
- Power management core;
- GPU drivers;
- InfiniBand drivers;
- Network drivers;
- S/390 drivers;
- TTY drivers;
- BTRFS file system;
- EROFS file system;
- F2FS file system;
- File systems infrastructure;
- BPF subsystem;
- Socket messages infrastructure;
- Bluetooth subsystem;
- Ethernet bridge;
- Networking core;
- IPv4 networking;
- SELinux security module;
(CVE-2022-48938, CVE-2024-42156, CVE-2024-36953, CVE-2024-38538,
CVE-2021-47501, CVE-2024-42068, CVE-2024-26947, CVE-2024-46724,
CVE-2024-36968, CVE-2023-52497, CVE-2024-35951, CVE-2023-52488,
CVE-2024-44940, CVE-2022-48733, CVE-2023-52498, CVE-2022-48943,
CVE-2024-35904, CVE-2024-42077, CVE-2024-36938, CVE-2023-52639,
CVE-2024-42240, CVE-2024-44942, CVE-2021-47076)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.04 LTS
linux-image-5.4.0-1055-xilinx-zynqmp 5.4.0-1055.59
linux-image-5.4.0-1083-ibm 5.4.0-1083.88
linux-image-5.4.0-1120-raspi 5.4.0-1120.132
linux-image-5.4.0-1124-kvm 5.4.0-1124.132
linux-image-5.4.0-1140-gcp 5.4.0-1140.149
linux-image-5.4.0-202-generic 5.4.0-202.222
linux-image-5.4.0-202-generic-lpae 5.4.0-202.222
linux-image-5.4.0-202-lowlatency 5.4.0-202.222
linux-image-gcp-lts-20.04 5.4.0.1140.142
linux-image-generic 5.4.0.202.198
linux-image-generic-lpae 5.4.0.202.198
linux-image-ibm-lts-20.04 5.4.0.1083.112
linux-image-kvm 5.4.0.1124.120
linux-image-lowlatency 5.4.0.202.198
linux-image-oem 5.4.0.202.198
linux-image-oem-osp1 5.4.0.202.198
linux-image-raspi 5.4.0.1120.150
linux-image-raspi2 5.4.0.1120.150
linux-image-virtual 5.4.0.202.198
linux-image-xilinx-zynqmp 5.4.0.1055.55
Ubuntu 18.04 LTS
linux-image-5.4.0-1083-ibm 5.4.0-1083.88~18.04.1
Available with Ubuntu Pro
linux-image-5.4.0-1140-gcp 5.4.0-1140.149~18.04.1
Available with Ubuntu Pro
linux-image-5.4.0-202-generic 5.4.0-202.222~18.04.1
Available with Ubuntu Pro
linux-image-5.4.0-202-lowlatency 5.4.0-202.222~18.04.1
Available with Ubuntu Pro
linux-image-gcp 5.4.0.1140.149~18.04.1
Available with Ubuntu Pro
linux-image-generic-hwe-18.04 5.4.0.202.222~18.04.1
Available with Ubuntu Pro
linux-image-ibm 5.4.0.1083.88~18.04.1
Available with Ubuntu Pro
linux-image-lowlatency-hwe-18.04 5.4.0.202.222~18.04.1
Available with Ubuntu Pro
linux-image-oem 5.4.0.202.222~18.04.1
Available with Ubuntu Pro
linux-image-oem-osp1 5.4.0.202.222~18.04.1
Available with Ubuntu Pro
linux-image-snapdragon-hwe-18.04 5.4.0.202.222~18.04.1
Available with Ubuntu Pro
linux-image-virtual-hwe-18.04 5.4.0.202.222~18.04.1
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-7159-1
CVE-2021-47076, CVE-2021-47501, CVE-2022-48733, CVE-2022-48938,
CVE-2022-48943, CVE-2023-52488, CVE-2023-52497, CVE-2023-52498,
CVE-2023-52639, CVE-2024-26947, CVE-2024-35904, CVE-2024-35951,
CVE-2024-36938, CVE-2024-36953, CVE-2024-36968, CVE-2024-38538,
CVE-2024-42068, CVE-2024-42077, CVE-2024-42156, CVE-2024-42240,
CVE-2024-44940, CVE-2024-44942, CVE-2024-46724
Package Information:
https://launchpad.net/ubuntu/+source/linux/5.4.0-202.222
https://launchpad.net/ubuntu/+source/linux-gcp/5.4.0-1140.149
https://launchpad.net/ubuntu/+source/linux-ibm/5.4.0-1083.88
https://launchpad.net/ubuntu/+source/linux-kvm/5.4.0-1124.132
https://launchpad.net/ubuntu/+source/linux-raspi/5.4.0-1120.132
https://launchpad.net/ubuntu/+source/linux-xilinx-zynqmp/5.4.0-1055.59
[USN-7155-1] Linux kernel (NVIDIA) vulnerabilities
==========================================================================
Ubuntu Security Notice USN-7155-1
December 12, 2024
linux-nvidia, linux-nvidia-6.8, linux-nvidia-lowlatency vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-nvidia: Linux kernel for NVIDIA systems
- linux-nvidia-lowlatency: Linux low latency kernel for NVIDIA systems
- linux-nvidia-6.8: Linux kernel for NVIDIA systems
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
- MIPS architecture;
- PowerPC architecture;
- RISC-V architecture;
- S390 architecture;
- User-Mode Linux (UML);
- x86 architecture;
- Block layer subsystem;
- Android drivers;
- ATM drivers;
- Drivers core;
- Ublk userspace block driver;
- Bluetooth drivers;
- Character device driver;
- Hardware crypto device drivers;
- Buffer Sharing and Synchronization framework;
- DMA engine subsystem;
- Qualcomm firmware drivers;
- GPIO subsystem;
- GPU drivers;
- HID subsystem;
- Hardware monitoring drivers;
- I2C subsystem;
- I3C subsystem;
- IIO subsystem;
- InfiniBand drivers;
- Input Device core drivers;
- Input Device (Miscellaneous) drivers;
- IOMMU subsystem;
- IRQ chip drivers;
- LED subsystem;
- Mailbox framework;
- Multiple devices driver;
- Media drivers;
- Fastrpc Driver;
- VMware VMCI Driver;
- MMC subsystem;
- Ethernet bonding driver;
- Network drivers;
- Mellanox network drivers;
- Microsoft Azure Network Adapter (MANA) driver;
- Near Field Communication (NFC) drivers;
- NVME drivers;
- Device tree and open firmware driver;
- Parport drivers;
- PCI subsystem;
- Pin controllers subsystem;
- x86 platform drivers;
- Power supply drivers;
- Remote Processor subsystem;
- S/390 drivers;
- SCSI subsystem;
- QCOM SoC drivers;
- SPI subsystem;
- Direct Digital Synthesis drivers;
- Thunderbolt and USB4 drivers;
- TTY drivers;
- UFS subsystem;
- Userspace I/O drivers;
- DesignWare USB3 driver;
- USB Gadget drivers;
- USB Host Controller drivers;
- USB Type-C Connector System Software Interface driver;
- USB over IP driver;
- Virtio Host (VHOST) subsystem;
- Framebuffer layer;
- Xen hypervisor drivers;
- File systems infrastructure;
- BTRFS file system;
- Ext4 file system;
- F2FS file system;
- JFS file system;
- Network file systems library;
- Network file system (NFS) client;
- Network file system (NFS) server daemon;
- NILFS2 file system;
- File system notification infrastructure;
- NTFS3 file system;
- Proc file system;
- SMB network file system;
- Tracing file system;
- Bitmap API;
- BPF subsystem;
- Memory Management;
- Objagg library;
- Perf events;
- Virtio network driver;
- VMware vSockets driver;
- KCM (Kernel Connection Multiplexor) sockets driver;
- Control group (cgroup);
- DMA mapping infrastructure;
- Locking primitives;
- Padata parallel execution mechanism;
- Scheduler infrastructure;
- Tracing infrastructure;
- Radix Tree data structure library;
- Kernel userspace event delivery library;
- KUnit for arithmetic overflow checks;
- Memory management;
- Bluetooth subsystem;
- Ethernet bridge;
- CAN network layer;
- Networking core;
- Ethtool driver;
- IPv4 networking;
- IPv6 networking;
- MAC80211 subsystem;
- Multipath TCP;
- Netfilter;
- Network traffic control;
- SCTP protocol;
- TIPC protocol;
- Wireless networking;
- AppArmor security module;
- Landlock security;
- SELinux security module;
- Simplified Mandatory Access Control Kernel framework;
- FireWire sound drivers;
- AMD SoC Alsa drivers;
- Texas InstrumentS Audio (ASoC/HDA) drivers;
- SoC Audio for Freescale CPUs drivers;
- Intel ASoC drivers;
- Amlogic Meson SoC drivers;
- SoC audio core drivers;
- USB sound devices;
- Real-Time Linux Analysis tools;
(CVE-2024-43845, CVE-2024-42311, CVE-2024-46757, CVE-2024-46738,
CVE-2024-44961, CVE-2024-44935, CVE-2024-46845, CVE-2024-46783,
CVE-2024-42315, CVE-2023-52918, CVE-2024-46708, CVE-2024-44934,
CVE-2024-42298, CVE-2024-46786, CVE-2024-46778, CVE-2024-44960,
CVE-2024-42295, CVE-2024-43881, CVE-2024-44971, CVE-2024-43849,
CVE-2024-43914, CVE-2024-44962, CVE-2024-43841, CVE-2024-46794,
CVE-2024-46752, CVE-2024-46853, CVE-2024-46861, CVE-2024-47664,
CVE-2024-46717, CVE-2024-46806, CVE-2024-46797, CVE-2024-42261,
CVE-2024-46828, CVE-2024-45013, CVE-2024-46870, CVE-2024-42258,
CVE-2024-46689, CVE-2024-43818, CVE-2024-46762, CVE-2024-46825,
CVE-2024-46698, CVE-2024-46816, CVE-2024-46728, CVE-2024-46726,
CVE-2024-43835, CVE-2024-45000, CVE-2024-43850, CVE-2024-43840,
CVE-2024-46846, CVE-2024-43846, CVE-2024-46725, CVE-2024-46867,
CVE-2024-42310, CVE-2024-42274, CVE-2024-46760, CVE-2024-46683,
CVE-2024-42304, CVE-2024-43839, CVE-2024-44954, CVE-2024-43895,
CVE-2024-44967, CVE-2024-43889, CVE-2024-46854, CVE-2024-46860,
CVE-2024-45029, CVE-2024-44938, CVE-2024-46785, CVE-2024-46713,
CVE-2024-46715, CVE-2024-46731, CVE-2024-42297, CVE-2024-43912,
CVE-2024-46751, CVE-2024-46711, CVE-2024-46695, CVE-2024-42317,
CVE-2024-44957, CVE-2024-46792, CVE-2024-45020, CVE-2024-44985,
CVE-2024-46746, CVE-2024-43868, CVE-2024-45017, CVE-2024-46824,
CVE-2024-46787, CVE-2024-42288, CVE-2024-46681, CVE-2024-42306,
CVE-2024-46755, CVE-2024-46826, CVE-2024-46777, CVE-2024-46844,
CVE-2024-44972, CVE-2024-43883, CVE-2024-43909, CVE-2024-46676,
CVE-2024-46798, CVE-2024-42273, CVE-2024-44990, CVE-2024-46744,
CVE-2024-42305, CVE-2024-45006, CVE-2024-42309, CVE-2024-46722,
CVE-2024-44956, CVE-2024-46739, CVE-2024-46680, CVE-2024-46765,
CVE-2024-46714, CVE-2024-46771, CVE-2024-46847, CVE-2024-43879,
CVE-2024-46703, CVE-2024-46733, CVE-2024-46815, CVE-2024-46802,
CVE-2024-45027, CVE-2024-42281, CVE-2024-43891, CVE-2024-45030,
CVE-2024-47662, CVE-2024-43887, CVE-2024-46836, CVE-2024-46782,
CVE-2024-46835, CVE-2024-43907, CVE-2024-46779, CVE-2024-43869,
CVE-2024-43821, CVE-2024-44978, CVE-2024-42286, CVE-2023-52889,
CVE-2024-43852, CVE-2024-42320, CVE-2024-44931, CVE-2024-44993,
CVE-2024-46829, CVE-2024-46701, CVE-2024-42272, CVE-2024-47660,
CVE-2024-49984, CVE-2024-44973, CVE-2024-43817, CVE-2024-42322,
CVE-2024-43830, CVE-2024-42301, CVE-2024-44969, CVE-2024-47674,
CVE-2024-46702, CVE-2024-45025, CVE-2024-46710, CVE-2024-43866,
CVE-2024-46718, CVE-2024-46773, CVE-2024-43834, CVE-2024-46754,
CVE-2024-46871, CVE-2024-44942, CVE-2024-43913, CVE-2024-46818,
CVE-2024-42318, CVE-2024-43831, CVE-2024-43832, CVE-2024-43908,
CVE-2024-43827, CVE-2024-46737, CVE-2024-47665, CVE-2024-43854,
CVE-2024-46707, CVE-2024-42303, CVE-2024-43860, CVE-2024-43824,
CVE-2024-45019, CVE-2024-44984, CVE-2024-46813, CVE-2024-45022,
CVE-2024-44970, CVE-2024-46791, CVE-2024-45012, CVE-2024-43829,
CVE-2024-46850, CVE-2024-44987, CVE-2024-44940, CVE-2024-43864,
CVE-2024-46723, CVE-2024-44999, CVE-2024-43884, CVE-2024-42287,
CVE-2024-46675, CVE-2024-44974, CVE-2024-46721, CVE-2024-44937,
CVE-2024-45008, CVE-2024-43853, CVE-2024-46697, CVE-2024-43899,
CVE-2024-43823, CVE-2024-46747, CVE-2024-45007, CVE-2024-46822,
CVE-2024-42262, CVE-2024-47661, CVE-2024-44953, CVE-2024-46859,
CVE-2024-46694, CVE-2024-42279, CVE-2024-43873, CVE-2024-43828,
CVE-2024-46851, CVE-2024-42296, CVE-2024-46719, CVE-2024-46677,
CVE-2024-42259, CVE-2024-44941, CVE-2024-44946, CVE-2024-46745,
CVE-2024-42299, CVE-2024-46724, CVE-2024-46749, CVE-2024-46706,
CVE-2024-42267, CVE-2024-46774, CVE-2024-46685, CVE-2024-42292,
CVE-2024-47667, CVE-2024-42319, CVE-2024-43888, CVE-2024-46729,
CVE-2024-44947, CVE-2024-45003, CVE-2024-46827, CVE-2024-46693,
CVE-2024-46705, CVE-2024-46767, CVE-2024-46838, CVE-2024-46805,
CVE-2024-43904, CVE-2024-43906, CVE-2024-42265, CVE-2024-42278,
CVE-2024-46750, CVE-2024-46692, CVE-2024-43847, CVE-2024-44995,
CVE-2024-43825, CVE-2024-46803, CVE-2024-47669, CVE-2024-46830,
CVE-2024-46784, CVE-2024-46840, CVE-2024-44939, CVE-2024-46848,
CVE-2024-42313, CVE-2024-46823, CVE-2024-44989, CVE-2024-42270,
CVE-2024-43856, CVE-2024-46716, CVE-2024-43859, CVE-2024-46841,
CVE-2024-47658, CVE-2024-46811, CVE-2024-45028, CVE-2024-46781,
CVE-2024-42290, CVE-2024-44991, CVE-2024-43894, CVE-2024-44979,
CVE-2024-46804, CVE-2024-43826, CVE-2024-43877, CVE-2024-42284,
CVE-2024-43876, CVE-2024-45011, CVE-2024-43819, CVE-2024-46709,
CVE-2024-43867, CVE-2024-44963, CVE-2024-45010, CVE-2024-46753,
CVE-2024-46759, CVE-2024-43880, CVE-2024-44977, CVE-2024-46772,
CVE-2024-44950, CVE-2024-46687, CVE-2024-46834, CVE-2024-43911,
CVE-2024-45015, CVE-2024-46819, CVE-2024-43875, CVE-2024-44996,
CVE-2024-44988, CVE-2024-46673, CVE-2024-44943, CVE-2024-42316,
CVE-2024-47683, CVE-2024-42307, CVE-2024-46788, CVE-2024-43892,
CVE-2024-47659, CVE-2024-46857, CVE-2024-43820, CVE-2024-46832,
CVE-2024-42312, CVE-2024-43910, CVE-2024-43886, CVE-2024-43905,
CVE-2024-46766, CVE-2024-42263, CVE-2024-46821, CVE-2024-43842,
CVE-2024-43857, CVE-2024-42276, CVE-2024-42268, CVE-2024-46740,
CVE-2024-46843, CVE-2024-46807, CVE-2024-46780, CVE-2024-46678,
CVE-2024-44944, CVE-2024-42264, CVE-2024-43863, CVE-2024-39472,
CVE-2024-46691, CVE-2024-44959, CVE-2024-44958, CVE-2024-46679,
CVE-2024-43843, CVE-2024-43900, CVE-2024-45021, CVE-2024-44982,
CVE-2024-46793, CVE-2024-42260, CVE-2024-43890, CVE-2024-43871,
CVE-2024-42269, CVE-2024-42277, CVE-2024-46720, CVE-2024-45005,
CVE-2024-46727, CVE-2024-46808, CVE-2024-46852, CVE-2024-47668,
CVE-2024-42321, CVE-2024-46743, CVE-2024-45002, CVE-2024-46763,
CVE-2024-46817, CVE-2024-42285, CVE-2024-46770, CVE-2024-45026,
CVE-2024-46768, CVE-2024-42314, CVE-2024-42291, CVE-2024-46756,
CVE-2024-42283, CVE-2024-45018, CVE-2024-44966, CVE-2024-42289,
CVE-2024-42294, CVE-2024-46814, CVE-2024-44986, CVE-2024-43870,
CVE-2024-44980, CVE-2024-43902, CVE-2024-47666, CVE-2024-46864,
CVE-2024-46761, CVE-2024-46831, CVE-2024-46758, CVE-2024-46735,
CVE-2024-46858, CVE-2024-46795, CVE-2024-46810, CVE-2024-46849,
CVE-2024-46775, CVE-2024-46868, CVE-2024-46809, CVE-2024-46776,
CVE-2024-46866, CVE-2024-44983, CVE-2024-46741, CVE-2024-43837,
CVE-2024-43833, CVE-2024-46672, CVE-2024-43861, CVE-2024-42302,
CVE-2024-47663, CVE-2024-46812, CVE-2024-43893, CVE-2024-46686,
CVE-2024-44948, CVE-2024-46732, CVE-2024-44965, CVE-2024-46855,
CVE-2024-45009, CVE-2024-46842, CVE-2024-46730, CVE-2024-44975,
CVE-2024-44998)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
linux-image-6.8.0-1019-nvidia 6.8.0-1019.21
linux-image-6.8.0-1019-nvidia-64k 6.8.0-1019.21
linux-image-6.8.0-1019-nvidia-lowlatency 6.8.0-1019.21.1
linux-image-6.8.0-1019-nvidia-lowlatency-64k 6.8.0-1019.21.1
linux-image-nvidia 6.8.0-1019.21
linux-image-nvidia-64k 6.8.0-1019.21
linux-image-nvidia-lowlatency 6.8.0-1019.21.1
linux-image-nvidia-lowlatency-64k 6.8.0-1019.21.1
Ubuntu 22.04 LTS
linux-image-6.8.0-1019-nvidia 6.8.0-1019.21~22.04.1
linux-image-6.8.0-1019-nvidia-64k 6.8.0-1019.21~22.04.1
linux-image-nvidia-6.8 6.8.0-1019.21~22.04.1
linux-image-nvidia-64k-6.8 6.8.0-1019.21~22.04.1
linux-image-nvidia-64k-hwe-22.04 6.8.0-1019.21~22.04.1
linux-image-nvidia-hwe-22.04 6.8.0-1019.21~22.04.1
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-7155-1
CVE-2023-52889, CVE-2023-52918, CVE-2024-39472, CVE-2024-42258,
CVE-2024-42259, CVE-2024-42260, CVE-2024-42261, CVE-2024-42262,
CVE-2024-42263, CVE-2024-42264, CVE-2024-42265, CVE-2024-42267,
CVE-2024-42268, CVE-2024-42269, CVE-2024-42270, CVE-2024-42272,
CVE-2024-42273, CVE-2024-42274, CVE-2024-42276, CVE-2024-42277,
CVE-2024-42278, CVE-2024-42279, CVE-2024-42281, CVE-2024-42283,
CVE-2024-42284, CVE-2024-42285, CVE-2024-42286, CVE-2024-42287,
CVE-2024-42288, CVE-2024-42289, CVE-2024-42290, CVE-2024-42291,
CVE-2024-42292, CVE-2024-42294, CVE-2024-42295, CVE-2024-42296,
CVE-2024-42297, CVE-2024-42298, CVE-2024-42299, CVE-2024-42301,
CVE-2024-42302, CVE-2024-42303, CVE-2024-42304, CVE-2024-42305,
CVE-2024-42306, CVE-2024-42307, CVE-2024-42309, CVE-2024-42310,
CVE-2024-42311, CVE-2024-42312, CVE-2024-42313, CVE-2024-42314,
CVE-2024-42315, CVE-2024-42316, CVE-2024-42317, CVE-2024-42318,
CVE-2024-42319, CVE-2024-42320, CVE-2024-42321, CVE-2024-42322,
CVE-2024-43817, CVE-2024-43818, CVE-2024-43819, CVE-2024-43820,
CVE-2024-43821, CVE-2024-43823, CVE-2024-43824, CVE-2024-43825,
CVE-2024-43826, CVE-2024-43827, CVE-2024-43828, CVE-2024-43829,
CVE-2024-43830, CVE-2024-43831, CVE-2024-43832, CVE-2024-43833,
CVE-2024-43834, CVE-2024-43835, CVE-2024-43837, CVE-2024-43839,
CVE-2024-43840, CVE-2024-43841, CVE-2024-43842, CVE-2024-43843,
CVE-2024-43845, CVE-2024-43846, CVE-2024-43847, CVE-2024-43849,
CVE-2024-43850, CVE-2024-43852, CVE-2024-43853, CVE-2024-43854,
CVE-2024-43856, CVE-2024-43857, CVE-2024-43859, CVE-2024-43860,
CVE-2024-43861, CVE-2024-43863, CVE-2024-43864, CVE-2024-43866,
CVE-2024-43867, CVE-2024-43868, CVE-2024-43869, CVE-2024-43870,
CVE-2024-43871, CVE-2024-43873, CVE-2024-43875, CVE-2024-43876,
CVE-2024-43877, CVE-2024-43879, CVE-2024-43880, CVE-2024-43881,
CVE-2024-43883, CVE-2024-43884, CVE-2024-43886, CVE-2024-43887,
CVE-2024-43888, CVE-2024-43889, CVE-2024-43890, CVE-2024-43891,
CVE-2024-43892, CVE-2024-43893, CVE-2024-43894, CVE-2024-43895,
CVE-2024-43899, CVE-2024-43900, CVE-2024-43902, CVE-2024-43904,
CVE-2024-43905, CVE-2024-43906, CVE-2024-43907, CVE-2024-43908,
CVE-2024-43909, CVE-2024-43910, CVE-2024-43911, CVE-2024-43912,
CVE-2024-43913, CVE-2024-43914, CVE-2024-44931, CVE-2024-44934,
CVE-2024-44935, CVE-2024-44937, CVE-2024-44938, CVE-2024-44939,
CVE-2024-44940, CVE-2024-44941, CVE-2024-44942, CVE-2024-44943,
CVE-2024-44944, CVE-2024-44946, CVE-2024-44947, CVE-2024-44948,
CVE-2024-44950, CVE-2024-44953, CVE-2024-44954, CVE-2024-44956,
CVE-2024-44957, CVE-2024-44958, CVE-2024-44959, CVE-2024-44960,
CVE-2024-44961, CVE-2024-44962, CVE-2024-44963, CVE-2024-44965,
CVE-2024-44966, CVE-2024-44967, CVE-2024-44969, CVE-2024-44970,
CVE-2024-44971, CVE-2024-44972, CVE-2024-44973, CVE-2024-44974,
CVE-2024-44975, CVE-2024-44977, CVE-2024-44978, CVE-2024-44979,
CVE-2024-44980, CVE-2024-44982, CVE-2024-44983, CVE-2024-44984,
CVE-2024-44985, CVE-2024-44986, CVE-2024-44987, CVE-2024-44988,
CVE-2024-44989, CVE-2024-44990, CVE-2024-44991, CVE-2024-44993,
CVE-2024-44995, CVE-2024-44996, CVE-2024-44998, CVE-2024-44999,
CVE-2024-45000, CVE-2024-45002, CVE-2024-45003, CVE-2024-45005,
CVE-2024-45006, CVE-2024-45007, CVE-2024-45008, CVE-2024-45009,
CVE-2024-45010, CVE-2024-45011, CVE-2024-45012, CVE-2024-45013,
CVE-2024-45015, CVE-2024-45017, CVE-2024-45018, CVE-2024-45019,
CVE-2024-45020, CVE-2024-45021, CVE-2024-45022, CVE-2024-45025,
CVE-2024-45026, CVE-2024-45027, CVE-2024-45028, CVE-2024-45029,
CVE-2024-45030, CVE-2024-46672, CVE-2024-46673, CVE-2024-46675,
CVE-2024-46676, CVE-2024-46677, CVE-2024-46678, CVE-2024-46679,
CVE-2024-46680, CVE-2024-46681, CVE-2024-46683, CVE-2024-46685,
CVE-2024-46686, CVE-2024-46687, CVE-2024-46689, CVE-2024-46691,
CVE-2024-46692, CVE-2024-46693, CVE-2024-46694, CVE-2024-46695,
CVE-2024-46697, CVE-2024-46698, CVE-2024-46701, CVE-2024-46702,
CVE-2024-46703, CVE-2024-46705, CVE-2024-46706, CVE-2024-46707,
CVE-2024-46708, CVE-2024-46709, CVE-2024-46710, CVE-2024-46711,
CVE-2024-46713, CVE-2024-46714, CVE-2024-46715, CVE-2024-46716,
CVE-2024-46717, CVE-2024-46718, CVE-2024-46719, CVE-2024-46720,
CVE-2024-46721, CVE-2024-46722, CVE-2024-46723, CVE-2024-46724,
CVE-2024-46725, CVE-2024-46726, CVE-2024-46727, CVE-2024-46728,
CVE-2024-46729, CVE-2024-46730, CVE-2024-46731, CVE-2024-46732,
CVE-2024-46733, CVE-2024-46735, CVE-2024-46737, CVE-2024-46738,
CVE-2024-46739, CVE-2024-46740, CVE-2024-46741, CVE-2024-46743,
CVE-2024-46744, CVE-2024-46745, CVE-2024-46746, CVE-2024-46747,
CVE-2024-46749, CVE-2024-46750, CVE-2024-46751, CVE-2024-46752,
CVE-2024-46753, CVE-2024-46754, CVE-2024-46755, CVE-2024-46756,
CVE-2024-46757, CVE-2024-46758, CVE-2024-46759, CVE-2024-46760,
CVE-2024-46761, CVE-2024-46762, CVE-2024-46763, CVE-2024-46765,
CVE-2024-46766, CVE-2024-46767, CVE-2024-46768, CVE-2024-46770,
CVE-2024-46771, CVE-2024-46772, CVE-2024-46773, CVE-2024-46774,
CVE-2024-46775, CVE-2024-46776, CVE-2024-46777, CVE-2024-46778,
CVE-2024-46779, CVE-2024-46780, CVE-2024-46781, CVE-2024-46782,
CVE-2024-46783, CVE-2024-46784, CVE-2024-46785, CVE-2024-46786,
CVE-2024-46787, CVE-2024-46788, CVE-2024-46791, CVE-2024-46792,
CVE-2024-46793, CVE-2024-46794, CVE-2024-46795, CVE-2024-46797,
CVE-2024-46798, CVE-2024-46802, CVE-2024-46803, CVE-2024-46804,
CVE-2024-46805, CVE-2024-46806, CVE-2024-46807, CVE-2024-46808,
CVE-2024-46809, CVE-2024-46810, CVE-2024-46811, CVE-2024-46812,
CVE-2024-46813, CVE-2024-46814, CVE-2024-46815, CVE-2024-46816,
CVE-2024-46817, CVE-2024-46818, CVE-2024-46819, CVE-2024-46821,
CVE-2024-46822, CVE-2024-46823, CVE-2024-46824, CVE-2024-46825,
CVE-2024-46826, CVE-2024-46827, CVE-2024-46828, CVE-2024-46829,
CVE-2024-46830, CVE-2024-46831, CVE-2024-46832, CVE-2024-46834,
CVE-2024-46835, CVE-2024-46836, CVE-2024-46838, CVE-2024-46840,
CVE-2024-46841, CVE-2024-46842, CVE-2024-46843, CVE-2024-46844,
CVE-2024-46845, CVE-2024-46846, CVE-2024-46847, CVE-2024-46848,
CVE-2024-46849, CVE-2024-46850, CVE-2024-46851, CVE-2024-46852,
CVE-2024-46853, CVE-2024-46854, CVE-2024-46855, CVE-2024-46857,
CVE-2024-46858, CVE-2024-46859, CVE-2024-46860, CVE-2024-46861,
CVE-2024-46864, CVE-2024-46866, CVE-2024-46867, CVE-2024-46868,
CVE-2024-46870, CVE-2024-46871, CVE-2024-47658, CVE-2024-47659,
CVE-2024-47660, CVE-2024-47661, CVE-2024-47662, CVE-2024-47663,
CVE-2024-47664, CVE-2024-47665, CVE-2024-47666, CVE-2024-47667,
CVE-2024-47668, CVE-2024-47669, CVE-2024-47674, CVE-2024-47683,
CVE-2024-49984
Package Information:
https://launchpad.net/ubuntu/+source/linux-nvidia/6.8.0-1019.21
https://launchpad.net/ubuntu/+source/linux-nvidia-lowlatency/6.8.0-1019.21.1
https://launchpad.net/ubuntu/+source/linux-nvidia-6.8/6.8.0-1019.21~22.04.1
[USN-7156-1] Linux kernel (GKE) vulnerabilities
==========================================================================
Ubuntu Security Notice USN-7156-1
December 12, 2024
linux-gkeop vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-gkeop: Linux kernel for Google Container Engine (GKE) systems
Details:
Chenyuan Yang discovered that the USB Gadget subsystem in the Linux kernel
did not properly check for the device to be enabled before writing. A local
attacker could possibly use this to cause a denial of service.
(CVE-2024-25741)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM32 architecture;
- ARM64 architecture;
- MIPS architecture;
- PA-RISC architecture;
- PowerPC architecture;
- RISC-V architecture;
- S390 architecture;
- User-Mode Linux (UML);
- x86 architecture;
- Block layer subsystem;
- Cryptographic API;
- Android drivers;
- Serial ATA and Parallel ATA drivers;
- ATM drivers;
- Drivers core;
- Null block device driver;
- Ublk userspace block driver;
- Bluetooth drivers;
- Cdrom driver;
- Character device driver;
- Clock framework and drivers;
- Hardware crypto device drivers;
- CXL (Compute Express Link) drivers;
- Buffer Sharing and Synchronization framework;
- DMA engine subsystem;
- Cirrus firmware drivers;
- Qualcomm firmware drivers;
- GPIO subsystem;
- GPU drivers;
- HID subsystem;
- Hardware monitoring drivers;
- I2C subsystem;
- I3C subsystem;
- IIO subsystem;
- InfiniBand drivers;
- Input Device core drivers;
- Input Device (Miscellaneous) drivers;
- IOMMU subsystem;
- IRQ chip drivers;
- ISDN/mISDN subsystem;
- LED subsystem;
- Mailbox framework;
- Multiple devices driver;
- Media drivers;
- Fastrpc Driver;
- VMware VMCI Driver;
- MMC subsystem;
- Ethernet bonding driver;
- Network drivers;
- Mellanox network drivers;
- Microsoft Azure Network Adapter (MANA) driver;
- Near Field Communication (NFC) drivers;
- NVME drivers;
- NVMEM (Non Volatile Memory) drivers;
- Device tree and open firmware driver;
- Parport drivers;
- PCI subsystem;
- Pin controllers subsystem;
- x86 platform drivers;
- Power supply drivers;
- Remote Processor subsystem;
- S/390 drivers;
- SCSI subsystem;
- QCOM SoC drivers;
- SPI subsystem;
- Direct Digital Synthesis drivers;
- Thermal drivers;
- Thunderbolt and USB4 drivers;
- TTY drivers;
- UFS subsystem;
- Userspace I/O drivers;
- USB DSL drivers;
- USB core drivers;
- DesignWare USB3 driver;
- USB Gadget drivers;
- USB Host Controller drivers;
- USB Serial drivers;
- USB Type-C Connector System Software Interface driver;
- USB over IP driver;
- VFIO drivers;
- Virtio Host (VHOST) subsystem;
- Framebuffer layer;
- Xen hypervisor drivers;
- File systems infrastructure;
- BTRFS file system;
- Ext4 file system;
- F2FS file system;
- GFS2 file system;
- JFFS2 file system;
- JFS file system;
- Network file systems library;
- Network file system (NFS) client;
- Network file system (NFS) server daemon;
- NILFS2 file system;
- File system notification infrastructure;
- NTFS3 file system;
- Proc file system;
- SMB network file system;
- Tracing file system;
- Bitmap API;
- BPF subsystem;
- Syscall compatibility layer;
- Memory Management;
- Memory management;
- Objagg library;
- Perf events;
- Syscall interfaces;
- Virtio network driver;
- VMware vSockets driver;
- KCM (Kernel Connection Multiplexor) sockets driver;
- Netfilter;
- Tracing infrastructure;
- io_uring subsystem;
- Control group (cgroup);
- DMA mapping infrastructure;
- Locking primitives;
- Padata parallel execution mechanism;
- Scheduler infrastructure;
- Closures library;
- Radix Tree data structure library;
- Kernel userspace event delivery library;
- KUnit for arithmetic overflow checks;
- Bluetooth subsystem;
- Ethernet bridge;
- CAN network layer;
- Ceph Core library;
- Networking core;
- Ethtool driver;
- IPv4 networking;
- IPv6 networking;
- IUCV driver;
- MAC80211 subsystem;
- Multipath TCP;
- Network traffic control;
- SCTP protocol;
- Sun RPC protocol;
- TIPC protocol;
- Wireless networking;
- AppArmor security module;
- Landlock security;
- SELinux security module;
- Simplified Mandatory Access Control Kernel framework;
- FireWire sound drivers;
- AMD SoC Alsa drivers;
- Texas InstrumentS Audio (ASoC/HDA) drivers;
- SoC Audio for Freescale CPUs drivers;
- Intel ASoC drivers;
- MediaTek ASoC drivers;
- Amlogic Meson SoC drivers;
- SoC audio core drivers;
- SOF drivers;
- Sound sequencer drivers;
- USB sound devices;
- Real-Time Linux Analysis tools;
(CVE-2024-43911, CVE-2024-46762, CVE-2024-46794, CVE-2024-43843,
CVE-2024-42229, CVE-2024-43888, CVE-2024-44978, CVE-2024-46693,
CVE-2024-46695, CVE-2024-42290, CVE-2024-42067, CVE-2024-45012,
CVE-2024-42316, CVE-2024-47665, CVE-2024-41052, CVE-2024-42074,
CVE-2024-41058, CVE-2024-44975, CVE-2024-46709, CVE-2024-46871,
CVE-2024-42090, CVE-2024-42296, CVE-2024-42096, CVE-2024-42146,
CVE-2024-46855, CVE-2024-39487, CVE-2024-43825, CVE-2024-42066,
CVE-2024-42126, CVE-2024-41022, CVE-2024-41025, CVE-2023-52888,
CVE-2024-46702, CVE-2024-42269, CVE-2024-41082, CVE-2024-42284,
CVE-2024-42227, CVE-2024-41017, CVE-2024-42250, CVE-2024-46778,
CVE-2024-47661, CVE-2024-46727, CVE-2024-46845, CVE-2024-44953,
CVE-2024-47659, CVE-2024-42137, CVE-2024-42245, CVE-2024-41096,
CVE-2024-46829, CVE-2024-41053, CVE-2024-46782, CVE-2024-44972,
CVE-2024-41095, CVE-2024-42239, CVE-2024-42127, CVE-2024-42292,
CVE-2024-46752, CVE-2024-46679, CVE-2024-41076, CVE-2024-46784,
CVE-2024-46786, CVE-2024-46678, CVE-2024-44957, CVE-2024-46755,
CVE-2024-47660, CVE-2024-41067, CVE-2024-46838, CVE-2024-43879,
CVE-2024-45007, CVE-2024-45025, CVE-2024-45001, CVE-2024-41009,
CVE-2024-41051, CVE-2024-46836, CVE-2024-49984, CVE-2024-45028,
CVE-2024-43871, CVE-2024-46783, CVE-2024-42272, CVE-2024-42087,
CVE-2024-46785, CVE-2024-42276, CVE-2024-47658, CVE-2024-46761,
CVE-2024-46715, CVE-2024-46676, CVE-2024-43824, CVE-2024-42100,
CVE-2024-46745, CVE-2024-41084, CVE-2024-41086, CVE-2024-45015,
CVE-2024-46797, CVE-2024-42160, CVE-2024-46706, CVE-2024-46803,
CVE-2024-46708, CVE-2024-47669, CVE-2024-45009, CVE-2024-41021,
CVE-2024-42159, CVE-2024-42321, CVE-2024-46868, CVE-2024-41078,
CVE-2024-42303, CVE-2024-45027, CVE-2024-42309, CVE-2024-43849,
CVE-2024-43907, CVE-2024-43899, CVE-2024-43823, CVE-2024-42232,
CVE-2024-44937, CVE-2024-41046, CVE-2024-42237, CVE-2024-42063,
CVE-2024-42065, CVE-2024-42154, CVE-2024-42259, CVE-2024-46698,
CVE-2024-46741, CVE-2024-45020, CVE-2024-42151, CVE-2024-41073,
CVE-2024-46719, CVE-2024-42295, CVE-2024-46859, CVE-2024-41035,
CVE-2024-46751, CVE-2024-47667, CVE-2024-46728, CVE-2024-46824,
CVE-2024-42121, CVE-2024-46776, CVE-2024-46768, CVE-2024-43908,
CVE-2024-43900, CVE-2024-46707, CVE-2024-44934, CVE-2024-41062,
CVE-2024-42304, CVE-2024-42312, CVE-2024-42157, CVE-2024-41092,
CVE-2024-41041, CVE-2024-43832, CVE-2024-41039, CVE-2024-44962,
CVE-2024-46858, CVE-2024-46847, CVE-2024-43856, CVE-2024-41060,
CVE-2024-45010, CVE-2024-41044, CVE-2024-44942, CVE-2024-42307,
CVE-2024-44984, CVE-2024-41075, CVE-2024-43817, CVE-2024-46791,
CVE-2024-46853, CVE-2024-42301, CVE-2024-44993, CVE-2024-41094,
CVE-2024-27022, CVE-2024-41088, CVE-2024-43883, CVE-2024-41087,
CVE-2024-46780, CVE-2024-42070, CVE-2024-44965, CVE-2024-46823,
CVE-2024-46737, CVE-2024-44982, CVE-2024-46697, CVE-2024-45021,
CVE-2024-44987, CVE-2024-41072, CVE-2024-41063, CVE-2024-46757,
CVE-2024-46831, CVE-2024-44966, CVE-2024-42322, CVE-2024-42231,
CVE-2024-46717, CVE-2024-41065, CVE-2024-44969, CVE-2023-52887,
CVE-2024-42105, CVE-2024-44971, CVE-2024-46798, CVE-2024-42262,
CVE-2024-44938, CVE-2024-42088, CVE-2024-44970, CVE-2024-43876,
CVE-2024-46800, CVE-2024-42086, CVE-2024-43826, CVE-2024-46729,
CVE-2024-46747, CVE-2024-46691, CVE-2024-46723, CVE-2024-41018,
CVE-2024-42258, CVE-2024-41081, CVE-2024-41049, CVE-2024-43837,
CVE-2024-45008, CVE-2024-41047, CVE-2024-41019, CVE-2024-42152,
CVE-2024-41090, CVE-2024-46716, CVE-2024-42104, CVE-2024-46804,
CVE-2024-43852, CVE-2024-42129, CVE-2024-46870, CVE-2024-41093,
CVE-2024-45011, CVE-2024-41064, CVE-2024-46722, CVE-2024-42286,
CVE-2024-45026, CVE-2024-46818, CVE-2024-42281, CVE-2024-43854,
CVE-2024-41037, CVE-2024-44946, CVE-2024-41012, CVE-2024-41098,
CVE-2024-42263, CVE-2024-42095, CVE-2024-46756, CVE-2024-43913,
CVE-2024-46822, CVE-2024-44944, CVE-2024-42156, CVE-2024-42073,
CVE-2024-42093, CVE-2024-44931, CVE-2024-42223, CVE-2024-42264,
CVE-2024-42278, CVE-2024-46759, CVE-2024-46826, CVE-2024-43828,
CVE-2024-42318, CVE-2024-42240, CVE-2024-45000, CVE-2024-43909,
CVE-2024-46792, CVE-2024-42109, CVE-2024-43867, CVE-2024-42130,
CVE-2024-42244, CVE-2024-44977, CVE-2024-46774, CVE-2024-41030,
CVE-2024-42310, CVE-2024-42138, CVE-2024-42317, CVE-2024-42224,
CVE-2024-46694, CVE-2024-46815, CVE-2024-46677, CVE-2024-46763,
CVE-2024-46860, CVE-2024-46767, CVE-2024-42111, CVE-2024-41020,
CVE-2024-46726, CVE-2024-42117, CVE-2024-43831, CVE-2024-42285,
CVE-2024-46842, CVE-2024-43857, CVE-2024-41031, CVE-2024-43834,
CVE-2024-42135, CVE-2024-42241, CVE-2024-46846, CVE-2024-44988,
CVE-2024-43892, CVE-2024-44991, CVE-2024-46806, CVE-2024-41015,
CVE-2024-43906, CVE-2024-42238, CVE-2024-46779, CVE-2024-41010,
CVE-2024-41068, CVE-2024-46730, CVE-2024-46827, CVE-2024-42120,
CVE-2024-41059, CVE-2024-46850, CVE-2023-52889, CVE-2024-45017,
CVE-2024-45003, CVE-2024-46844, CVE-2024-46816, CVE-2024-46811,
CVE-2024-41023, CVE-2024-44948, CVE-2024-46753, CVE-2024-45002,
CVE-2024-42251, CVE-2024-46713, CVE-2024-42273, CVE-2024-46733,
CVE-2024-46739, CVE-2024-42108, CVE-2024-41085, CVE-2024-41033,
CVE-2024-42298, CVE-2024-46835, CVE-2024-39472, CVE-2024-47663,
CVE-2024-43859, CVE-2024-43820, CVE-2024-42118, CVE-2024-41036,
CVE-2024-47683, CVE-2024-42161, CVE-2024-42235, CVE-2024-43861,
CVE-2024-43863, CVE-2024-47668, CVE-2024-46685, CVE-2024-43864,
CVE-2024-46749, CVE-2024-44983, CVE-2024-46841, CVE-2024-42082,
CVE-2024-43818, CVE-2024-41071, CVE-2024-45006, CVE-2024-42080,
CVE-2024-46825, CVE-2024-46687, CVE-2024-44959, CVE-2024-43835,
CVE-2024-43891, CVE-2024-46851, CVE-2024-42248, CVE-2024-42103,
CVE-2024-42079, CVE-2024-42068, CVE-2024-47664, CVE-2024-46854,
CVE-2024-44973, CVE-2024-42077, CVE-2024-46821, CVE-2024-43886,
CVE-2024-41089, CVE-2024-43850, CVE-2024-44995, CVE-2024-46809,
CVE-2024-42084, CVE-2024-46758, CVE-2024-47662, CVE-2024-43839,
CVE-2024-46738, CVE-2024-41034, CVE-2024-42228, CVE-2024-42147,
CVE-2024-43855, CVE-2024-41032, CVE-2024-46819, CVE-2024-44989,
CVE-2024-42265, CVE-2024-42110, CVE-2024-42155, CVE-2024-45005,
CVE-2024-45016, CVE-2024-42141, CVE-2024-43821, CVE-2024-42299,
CVE-2024-44950, CVE-2024-42279, CVE-2024-44943, CVE-2024-43904,
CVE-2024-42268, CVE-2024-42089, CVE-2024-46807, CVE-2024-44996,
CVE-2024-42069, CVE-2024-46672, CVE-2024-44940, CVE-2024-42270,
CVE-2024-46735, CVE-2024-42319, CVE-2024-46754, CVE-2024-46861,
CVE-2024-42277, CVE-2024-41054, CVE-2024-42131, CVE-2024-41056,
CVE-2024-44963, CVE-2024-42267, CVE-2024-42283, CVE-2024-42320,
CVE-2024-46740, CVE-2024-46787, CVE-2024-43895, CVE-2024-43881,
CVE-2024-44961, CVE-2024-43910, CVE-2024-43875, CVE-2024-42289,
CVE-2024-43853, CVE-2024-42315, CVE-2024-43884, CVE-2024-46867,
CVE-2024-43912, CVE-2024-41007, CVE-2024-46743, CVE-2024-46675,
CVE-2024-43877, CVE-2024-39486, CVE-2024-41050, CVE-2024-43858,
CVE-2024-45018, CVE-2024-46744, CVE-2024-46750, CVE-2024-46840,
CVE-2024-42150, CVE-2024-41028, CVE-2024-42091, CVE-2024-43894,
CVE-2024-43869, CVE-2024-42132, CVE-2024-46777, CVE-2024-42106,
CVE-2024-46848, CVE-2024-41038, CVE-2024-46711, CVE-2024-43833,
CVE-2024-46710, CVE-2024-46812, CVE-2024-42311, CVE-2024-46701,
CVE-2024-46683, CVE-2024-45029, CVE-2024-46830, CVE-2024-46857,
CVE-2024-44979, CVE-2024-44999, CVE-2024-44985, CVE-2024-46773,
CVE-2024-45022, CVE-2024-46772, CVE-2024-44960, CVE-2024-42243,
CVE-2024-42158, CVE-2024-43819, CVE-2024-45030, CVE-2024-42085,
CVE-2024-42274, CVE-2024-44986, CVE-2024-41048, CVE-2024-42098,
CVE-2024-46680, CVE-2023-52918, CVE-2024-46673, CVE-2024-46834,
CVE-2024-42288, CVE-2024-44998, CVE-2024-42113, CVE-2024-42094,
CVE-2024-42225, CVE-2024-42112, CVE-2024-42153, CVE-2024-43880,
CVE-2024-43905, CVE-2024-43902, CVE-2024-46681, CVE-2024-42236,
CVE-2024-42294, CVE-2024-46793, CVE-2024-43882, CVE-2024-44947,
CVE-2024-46849, CVE-2024-44954, CVE-2024-46852, CVE-2024-41070,
CVE-2024-41069, CVE-2024-46864, CVE-2024-46703, CVE-2024-43829,
CVE-2024-46802, CVE-2024-42101, CVE-2024-44990, CVE-2024-43830,
CVE-2024-41029, CVE-2024-43866, CVE-2024-43889, CVE-2024-42230,
CVE-2024-46692, CVE-2024-42133, CVE-2024-45013, CVE-2024-42076,
CVE-2024-46810, CVE-2024-42128, CVE-2024-46718, CVE-2024-46814,
CVE-2024-43841, CVE-2024-43873, CVE-2024-42092, CVE-2024-41074,
CVE-2024-41083, CVE-2024-46731, CVE-2024-43842, CVE-2024-41077,
CVE-2024-46720, CVE-2024-46795, CVE-2024-46813, CVE-2024-46805,
CVE-2024-42142, CVE-2024-42291, CVE-2024-43846, CVE-2024-41057,
CVE-2024-43870, CVE-2024-44980, CVE-2024-46866, CVE-2024-43827,
CVE-2024-43840, CVE-2024-42280, CVE-2024-42261, CVE-2024-42246,
CVE-2024-42115, CVE-2024-46686, CVE-2024-43860, CVE-2024-46808,
CVE-2024-42149, CVE-2024-46828, CVE-2024-44935, CVE-2024-43847,
CVE-2024-44967, CVE-2024-46817, CVE-2024-46721, CVE-2024-42305,
CVE-2024-46766, CVE-2024-43914, CVE-2024-46760, CVE-2024-41061,
CVE-2024-41091, CVE-2024-43890, CVE-2024-42314, CVE-2024-42064,
CVE-2024-42302, CVE-2024-43887, CVE-2024-46832, CVE-2024-46765,
CVE-2024-46770, CVE-2024-41080, CVE-2024-42253, CVE-2024-44941,
CVE-2024-42306, CVE-2024-41027, CVE-2024-46689, CVE-2024-46781,
CVE-2024-42247, CVE-2024-41066, CVE-2024-42287, CVE-2024-41097,
CVE-2024-44939, CVE-2024-45019, CVE-2024-47674, CVE-2024-46705,
CVE-2024-42119, CVE-2024-46725, CVE-2024-46746, CVE-2024-46732,
CVE-2024-41042, CVE-2024-44958, CVE-2024-42114, CVE-2024-43893,
CVE-2024-47666, CVE-2024-46843, CVE-2024-42252, CVE-2024-42102,
CVE-2024-42136, CVE-2024-41045, CVE-2024-42260, CVE-2024-46771,
CVE-2024-42124, CVE-2024-42297, CVE-2024-42271, CVE-2024-43845,
CVE-2024-46775, CVE-2024-41079, CVE-2024-43868, CVE-2024-42140,
CVE-2024-42313, CVE-2024-42145, CVE-2024-46724, CVE-2024-46788,
CVE-2024-42234, CVE-2024-42144, CVE-2024-44974, CVE-2024-42097,
CVE-2024-46714, CVE-2024-41055, CVE-2024-44956)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
linux-image-6.8.0-1002-gkeop 6.8.0-1002.4
linux-image-gkeop 6.8.0-1002.4
linux-image-gkeop-6.8 6.8.0-1002.4
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-7156-1
CVE-2023-52887, CVE-2023-52888, CVE-2023-52889, CVE-2023-52918,
CVE-2024-25741, CVE-2024-27022, CVE-2024-39472, CVE-2024-39486,
CVE-2024-39487, CVE-2024-41007, CVE-2024-41009, CVE-2024-41010,
CVE-2024-41012, CVE-2024-41015, CVE-2024-41017, CVE-2024-41018,
CVE-2024-41019, CVE-2024-41020, CVE-2024-41021, CVE-2024-41022,
CVE-2024-41023, CVE-2024-41025, CVE-2024-41027, CVE-2024-41028,
CVE-2024-41029, CVE-2024-41030, CVE-2024-41031, CVE-2024-41032,
CVE-2024-41033, CVE-2024-41034, CVE-2024-41035, CVE-2024-41036,
CVE-2024-41037, CVE-2024-41038, CVE-2024-41039, CVE-2024-41041,
CVE-2024-41042, CVE-2024-41044, CVE-2024-41045, CVE-2024-41046,
CVE-2024-41047, CVE-2024-41048, CVE-2024-41049, CVE-2024-41050,
CVE-2024-41051, CVE-2024-41052, CVE-2024-41053, CVE-2024-41054,
CVE-2024-41055, CVE-2024-41056, CVE-2024-41057, CVE-2024-41058,
CVE-2024-41059, CVE-2024-41060, CVE-2024-41061, CVE-2024-41062,
CVE-2024-41063, CVE-2024-41064, CVE-2024-41065, CVE-2024-41066,
CVE-2024-41067, CVE-2024-41068, CVE-2024-41069, CVE-2024-41070,
CVE-2024-41071, CVE-2024-41072, CVE-2024-41073, CVE-2024-41074,
CVE-2024-41075, CVE-2024-41076, CVE-2024-41077, CVE-2024-41078,
CVE-2024-41079, CVE-2024-41080, CVE-2024-41081, CVE-2024-41082,
CVE-2024-41083, CVE-2024-41084, CVE-2024-41085, CVE-2024-41086,
CVE-2024-41087, CVE-2024-41088, CVE-2024-41089, CVE-2024-41090,
CVE-2024-41091, CVE-2024-41092, CVE-2024-41093, CVE-2024-41094,
CVE-2024-41095, CVE-2024-41096, CVE-2024-41097, CVE-2024-41098,
CVE-2024-42063, CVE-2024-42064, CVE-2024-42065, CVE-2024-42066,
CVE-2024-42067, CVE-2024-42068, CVE-2024-42069, CVE-2024-42070,
CVE-2024-42073, CVE-2024-42074, CVE-2024-42076, CVE-2024-42077,
CVE-2024-42079, CVE-2024-42080, CVE-2024-42082, CVE-2024-42084,
CVE-2024-42085, CVE-2024-42086, CVE-2024-42087, CVE-2024-42088,
CVE-2024-42089, CVE-2024-42090, CVE-2024-42091, CVE-2024-42092,
CVE-2024-42093, CVE-2024-42094, CVE-2024-42095, CVE-2024-42096,
CVE-2024-42097, CVE-2024-42098, CVE-2024-42100, CVE-2024-42101,
CVE-2024-42102, CVE-2024-42103, CVE-2024-42104, CVE-2024-42105,
CVE-2024-42106, CVE-2024-42108, CVE-2024-42109, CVE-2024-42110,
CVE-2024-42111, CVE-2024-42112, CVE-2024-42113, CVE-2024-42114,
CVE-2024-42115, CVE-2024-42117, CVE-2024-42118, CVE-2024-42119,
CVE-2024-42120, CVE-2024-42121, CVE-2024-42124, CVE-2024-42126,
CVE-2024-42127, CVE-2024-42128, CVE-2024-42129, CVE-2024-42130,
CVE-2024-42131, CVE-2024-42132, CVE-2024-42133, CVE-2024-42135,
CVE-2024-42136, CVE-2024-42137, CVE-2024-42138, CVE-2024-42140,
CVE-2024-42141, CVE-2024-42142, CVE-2024-42144, CVE-2024-42145,
CVE-2024-42146, CVE-2024-42147, CVE-2024-42149, CVE-2024-42150,
CVE-2024-42151, CVE-2024-42152, CVE-2024-42153, CVE-2024-42154,
CVE-2024-42155, CVE-2024-42156, CVE-2024-42157, CVE-2024-42158,
CVE-2024-42159, CVE-2024-42160, CVE-2024-42161, CVE-2024-42223,
CVE-2024-42224, CVE-2024-42225, CVE-2024-42227, CVE-2024-42228,
CVE-2024-42229, CVE-2024-42230, CVE-2024-42231, CVE-2024-42232,
CVE-2024-42234, CVE-2024-42235, CVE-2024-42236, CVE-2024-42237,
CVE-2024-42238, CVE-2024-42239, CVE-2024-42240, CVE-2024-42241,
CVE-2024-42243, CVE-2024-42244, CVE-2024-42245, CVE-2024-42246,
CVE-2024-42247, CVE-2024-42248, CVE-2024-42250, CVE-2024-42251,
CVE-2024-42252, CVE-2024-42253, CVE-2024-42258, CVE-2024-42259,
CVE-2024-42260, CVE-2024-42261, CVE-2024-42262, CVE-2024-42263,
CVE-2024-42264, CVE-2024-42265, CVE-2024-42267, CVE-2024-42268,
CVE-2024-42269, CVE-2024-42270, CVE-2024-42271, CVE-2024-42272,
CVE-2024-42273, CVE-2024-42274, CVE-2024-42276, CVE-2024-42277,
CVE-2024-42278, CVE-2024-42279, CVE-2024-42280, CVE-2024-42281,
CVE-2024-42283, CVE-2024-42284, CVE-2024-42285, CVE-2024-42286,
CVE-2024-42287, CVE-2024-42288, CVE-2024-42289, CVE-2024-42290,
CVE-2024-42291, CVE-2024-42292, CVE-2024-42294, CVE-2024-42295,
CVE-2024-42296, CVE-2024-42297, CVE-2024-42298, CVE-2024-42299,
CVE-2024-42301, CVE-2024-42302, CVE-2024-42303, CVE-2024-42304,
CVE-2024-42305, CVE-2024-42306, CVE-2024-42307, CVE-2024-42309,
CVE-2024-42310, CVE-2024-42311, CVE-2024-42312, CVE-2024-42313,
CVE-2024-42314, CVE-2024-42315, CVE-2024-42316, CVE-2024-42317,
CVE-2024-42318, CVE-2024-42319, CVE-2024-42320, CVE-2024-42321,
CVE-2024-42322, CVE-2024-43817, CVE-2024-43818, CVE-2024-43819,
CVE-2024-43820, CVE-2024-43821, CVE-2024-43823, CVE-2024-43824,
CVE-2024-43825, CVE-2024-43826, CVE-2024-43827, CVE-2024-43828,
CVE-2024-43829, CVE-2024-43830, CVE-2024-43831, CVE-2024-43832,
CVE-2024-43833, CVE-2024-43834, CVE-2024-43835, CVE-2024-43837,
CVE-2024-43839, CVE-2024-43840, CVE-2024-43841, CVE-2024-43842,
CVE-2024-43843, CVE-2024-43845, CVE-2024-43846, CVE-2024-43847,
CVE-2024-43849, CVE-2024-43850, CVE-2024-43852, CVE-2024-43853,
CVE-2024-43854, CVE-2024-43855, CVE-2024-43856, CVE-2024-43857,
CVE-2024-43858, CVE-2024-43859, CVE-2024-43860, CVE-2024-43861,
CVE-2024-43863, CVE-2024-43864, CVE-2024-43866, CVE-2024-43867,
CVE-2024-43868, CVE-2024-43869, CVE-2024-43870, CVE-2024-43871,
CVE-2024-43873, CVE-2024-43875, CVE-2024-43876, CVE-2024-43877,
CVE-2024-43879, CVE-2024-43880, CVE-2024-43881, CVE-2024-43882,
CVE-2024-43883, CVE-2024-43884, CVE-2024-43886, CVE-2024-43887,
CVE-2024-43888, CVE-2024-43889, CVE-2024-43890, CVE-2024-43891,
CVE-2024-43892, CVE-2024-43893, CVE-2024-43894, CVE-2024-43895,
CVE-2024-43899, CVE-2024-43900, CVE-2024-43902, CVE-2024-43904,
CVE-2024-43905, CVE-2024-43906, CVE-2024-43907, CVE-2024-43908,
CVE-2024-43909, CVE-2024-43910, CVE-2024-43911, CVE-2024-43912,
CVE-2024-43913, CVE-2024-43914, CVE-2024-44931, CVE-2024-44934,
CVE-2024-44935, CVE-2024-44937, CVE-2024-44938, CVE-2024-44939,
CVE-2024-44940, CVE-2024-44941, CVE-2024-44942, CVE-2024-44943,
CVE-2024-44944, CVE-2024-44946, CVE-2024-44947, CVE-2024-44948,
CVE-2024-44950, CVE-2024-44953, CVE-2024-44954, CVE-2024-44956,
CVE-2024-44957, CVE-2024-44958, CVE-2024-44959, CVE-2024-44960,
CVE-2024-44961, CVE-2024-44962, CVE-2024-44963, CVE-2024-44965,
CVE-2024-44966, CVE-2024-44967, CVE-2024-44969, CVE-2024-44970,
CVE-2024-44971, CVE-2024-44972, CVE-2024-44973, CVE-2024-44974,
CVE-2024-44975, CVE-2024-44977, CVE-2024-44978, CVE-2024-44979,
CVE-2024-44980, CVE-2024-44982, CVE-2024-44983, CVE-2024-44984,
CVE-2024-44985, CVE-2024-44986, CVE-2024-44987, CVE-2024-44988,
CVE-2024-44989, CVE-2024-44990, CVE-2024-44991, CVE-2024-44993,
CVE-2024-44995, CVE-2024-44996, CVE-2024-44998, CVE-2024-44999,
CVE-2024-45000, CVE-2024-45001, CVE-2024-45002, CVE-2024-45003,
CVE-2024-45005, CVE-2024-45006, CVE-2024-45007, CVE-2024-45008,
CVE-2024-45009, CVE-2024-45010, CVE-2024-45011, CVE-2024-45012,
CVE-2024-45013, CVE-2024-45015, CVE-2024-45016, CVE-2024-45017,
CVE-2024-45018, CVE-2024-45019, CVE-2024-45020, CVE-2024-45021,
CVE-2024-45022, CVE-2024-45025, CVE-2024-45026, CVE-2024-45027,
CVE-2024-45028, CVE-2024-45029, CVE-2024-45030, CVE-2024-46672,
CVE-2024-46673, CVE-2024-46675, CVE-2024-46676, CVE-2024-46677,
CVE-2024-46678, CVE-2024-46679, CVE-2024-46680, CVE-2024-46681,
CVE-2024-46683, CVE-2024-46685, CVE-2024-46686, CVE-2024-46687,
CVE-2024-46689, CVE-2024-46691, CVE-2024-46692, CVE-2024-46693,
CVE-2024-46694, CVE-2024-46695, CVE-2024-46697, CVE-2024-46698,
CVE-2024-46701, CVE-2024-46702, CVE-2024-46703, CVE-2024-46705,
CVE-2024-46706, CVE-2024-46707, CVE-2024-46708, CVE-2024-46709,
CVE-2024-46710, CVE-2024-46711, CVE-2024-46713, CVE-2024-46714,
CVE-2024-46715, CVE-2024-46716, CVE-2024-46717, CVE-2024-46718,
CVE-2024-46719, CVE-2024-46720, CVE-2024-46721, CVE-2024-46722,
CVE-2024-46723, CVE-2024-46724, CVE-2024-46725, CVE-2024-46726,
CVE-2024-46727, CVE-2024-46728, CVE-2024-46729, CVE-2024-46730,
CVE-2024-46731, CVE-2024-46732, CVE-2024-46733, CVE-2024-46735,
CVE-2024-46737, CVE-2024-46738, CVE-2024-46739, CVE-2024-46740,
CVE-2024-46741, CVE-2024-46743, CVE-2024-46744, CVE-2024-46745,
CVE-2024-46746, CVE-2024-46747, CVE-2024-46749, CVE-2024-46750,
CVE-2024-46751, CVE-2024-46752, CVE-2024-46753, CVE-2024-46754,
CVE-2024-46755, CVE-2024-46756, CVE-2024-46757, CVE-2024-46758,
CVE-2024-46759, CVE-2024-46760, CVE-2024-46761, CVE-2024-46762,
CVE-2024-46763, CVE-2024-46765, CVE-2024-46766, CVE-2024-46767,
CVE-2024-46768, CVE-2024-46770, CVE-2024-46771, CVE-2024-46772,
CVE-2024-46773, CVE-2024-46774, CVE-2024-46775, CVE-2024-46776,
CVE-2024-46777, CVE-2024-46778, CVE-2024-46779, CVE-2024-46780,
CVE-2024-46781, CVE-2024-46782, CVE-2024-46783, CVE-2024-46784,
CVE-2024-46785, CVE-2024-46786, CVE-2024-46787, CVE-2024-46788,
CVE-2024-46791, CVE-2024-46792, CVE-2024-46793, CVE-2024-46794,
CVE-2024-46795, CVE-2024-46797, CVE-2024-46798, CVE-2024-46800,
CVE-2024-46802, CVE-2024-46803, CVE-2024-46804, CVE-2024-46805,
CVE-2024-46806, CVE-2024-46807, CVE-2024-46808, CVE-2024-46809,
CVE-2024-46810, CVE-2024-46811, CVE-2024-46812, CVE-2024-46813,
CVE-2024-46814, CVE-2024-46815, CVE-2024-46816, CVE-2024-46817,
CVE-2024-46818, CVE-2024-46819, CVE-2024-46821, CVE-2024-46822,
CVE-2024-46823, CVE-2024-46824, CVE-2024-46825, CVE-2024-46826,
CVE-2024-46827, CVE-2024-46828, CVE-2024-46829, CVE-2024-46830,
CVE-2024-46831, CVE-2024-46832, CVE-2024-46834, CVE-2024-46835,
CVE-2024-46836, CVE-2024-46838, CVE-2024-46840, CVE-2024-46841,
CVE-2024-46842, CVE-2024-46843, CVE-2024-46844, CVE-2024-46845,
CVE-2024-46846, CVE-2024-46847, CVE-2024-46848, CVE-2024-46849,
CVE-2024-46850, CVE-2024-46851, CVE-2024-46852, CVE-2024-46853,
CVE-2024-46854, CVE-2024-46855, CVE-2024-46857, CVE-2024-46858,
CVE-2024-46859, CVE-2024-46860, CVE-2024-46861, CVE-2024-46864,
CVE-2024-46866, CVE-2024-46867, CVE-2024-46868, CVE-2024-46870,
CVE-2024-46871, CVE-2024-47658, CVE-2024-47659, CVE-2024-47660,
CVE-2024-47661, CVE-2024-47662, CVE-2024-47663, CVE-2024-47664,
CVE-2024-47665, CVE-2024-47666, CVE-2024-47667, CVE-2024-47668,
CVE-2024-47669, CVE-2024-47674, CVE-2024-47683, CVE-2024-49984
Package Information:
https://launchpad.net/ubuntu/+source/linux-gkeop/6.8.0-1002.4
[USN-7154-1] Linux kernel vulnerabilities
==========================================================================
Ubuntu Security Notice USN-7154-1
December 12, 2024
linux, linux-aws, linux-aws-6.8, linux-gcp, linux-gcp-6.8, linux-gke,
linux-ibm, linux-lowlatency, linux-lowlatency-hwe-6.8, linux-oem-6.8,
linux-oracle, linux-oracle-6.8, linux-raspi vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-gke: Linux kernel for Google Container Engine (GKE) systems
- linux-ibm: Linux kernel for IBM cloud systems
- linux-lowlatency: Linux low latency kernel
- linux-oem-6.8: Linux kernel for OEM systems
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-raspi: Linux kernel for Raspberry Pi systems
- linux-aws-6.8: Linux kernel for Amazon Web Services (AWS) systems
- linux-gcp-6.8: Linux kernel for Google Cloud Platform (GCP) systems
- linux-lowlatency-hwe-6.8: Linux low latency kernel
- linux-oracle-6.8: Linux kernel for Oracle Cloud systems
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
- MIPS architecture;
- PowerPC architecture;
- RISC-V architecture;
- S390 architecture;
- User-Mode Linux (UML);
- x86 architecture;
- Block layer subsystem;
- Android drivers;
- ATM drivers;
- Drivers core;
- Ublk userspace block driver;
- Bluetooth drivers;
- Character device driver;
- Hardware crypto device drivers;
- Buffer Sharing and Synchronization framework;
- DMA engine subsystem;
- Qualcomm firmware drivers;
- GPIO subsystem;
- GPU drivers;
- HID subsystem;
- Hardware monitoring drivers;
- I2C subsystem;
- I3C subsystem;
- IIO subsystem;
- InfiniBand drivers;
- Input Device core drivers;
- Input Device (Miscellaneous) drivers;
- IOMMU subsystem;
- IRQ chip drivers;
- LED subsystem;
- Mailbox framework;
- Multiple devices driver;
- Media drivers;
- Fastrpc Driver;
- VMware VMCI Driver;
- MMC subsystem;
- Ethernet bonding driver;
- Network drivers;
- Mellanox network drivers;
- Microsoft Azure Network Adapter (MANA) driver;
- Near Field Communication (NFC) drivers;
- NVME drivers;
- Device tree and open firmware driver;
- Parport drivers;
- PCI subsystem;
- Pin controllers subsystem;
- x86 platform drivers;
- Power supply drivers;
- Remote Processor subsystem;
- S/390 drivers;
- SCSI subsystem;
- QCOM SoC drivers;
- SPI subsystem;
- Direct Digital Synthesis drivers;
- Thunderbolt and USB4 drivers;
- TTY drivers;
- UFS subsystem;
- Userspace I/O drivers;
- DesignWare USB3 driver;
- USB Gadget drivers;
- USB Host Controller drivers;
- USB Type-C Connector System Software Interface driver;
- USB over IP driver;
- Virtio Host (VHOST) subsystem;
- Framebuffer layer;
- Xen hypervisor drivers;
- File systems infrastructure;
- BTRFS file system;
- Ext4 file system;
- F2FS file system;
- JFS file system;
- Network file systems library;
- Network file system (NFS) client;
- Network file system (NFS) server daemon;
- NILFS2 file system;
- File system notification infrastructure;
- NTFS3 file system;
- Proc file system;
- SMB network file system;
- Tracing file system;
- Bitmap API;
- BPF subsystem;
- Memory Management;
- Objagg library;
- Perf events;
- Virtio network driver;
- VMware vSockets driver;
- KCM (Kernel Connection Multiplexor) sockets driver;
- Control group (cgroup);
- DMA mapping infrastructure;
- Locking primitives;
- Padata parallel execution mechanism;
- Scheduler infrastructure;
- Tracing infrastructure;
- Radix Tree data structure library;
- Kernel userspace event delivery library;
- KUnit for arithmetic overflow checks;
- Memory management;
- Bluetooth subsystem;
- Ethernet bridge;
- CAN network layer;
- Networking core;
- Ethtool driver;
- IPv4 networking;
- IPv6 networking;
- MAC80211 subsystem;
- Multipath TCP;
- Netfilter;
- Network traffic control;
- SCTP protocol;
- TIPC protocol;
- Wireless networking;
- AppArmor security module;
- Landlock security;
- SELinux security module;
- Simplified Mandatory Access Control Kernel framework;
- FireWire sound drivers;
- AMD SoC Alsa drivers;
- Texas InstrumentS Audio (ASoC/HDA) drivers;
- SoC Audio for Freescale CPUs drivers;
- Intel ASoC drivers;
- Amlogic Meson SoC drivers;
- SoC audio core drivers;
- USB sound devices;
- Real-Time Linux Analysis tools;
(CVE-2024-46783, CVE-2024-44960, CVE-2024-46743, CVE-2024-45009,
CVE-2024-43820, CVE-2024-43888, CVE-2024-45010, CVE-2024-43839,
CVE-2024-42304, CVE-2024-43846, CVE-2024-42258, CVE-2024-45005,
CVE-2024-46709, CVE-2024-46774, CVE-2024-43883, CVE-2024-43859,
CVE-2024-46721, CVE-2024-44944, CVE-2024-43913, CVE-2024-43843,
CVE-2024-43845, CVE-2024-45018, CVE-2024-43909, CVE-2024-46755,
CVE-2024-42284, CVE-2024-42301, CVE-2024-46779, CVE-2024-44971,
CVE-2024-46711, CVE-2024-43889, CVE-2024-46842, CVE-2024-44978,
CVE-2024-46803, CVE-2024-42277, CVE-2024-43892, CVE-2024-45019,
CVE-2024-44988, CVE-2024-46798, CVE-2024-44995, CVE-2024-43860,
CVE-2024-46762, CVE-2024-43831, CVE-2024-44990, CVE-2024-46845,
CVE-2024-46765, CVE-2024-45012, CVE-2024-44975, CVE-2024-46770,
CVE-2024-46802, CVE-2024-44970, CVE-2024-46691, CVE-2024-43833,
CVE-2024-43876, CVE-2024-42292, CVE-2024-42291, CVE-2024-43891,
CVE-2024-46788, CVE-2024-44938, CVE-2024-46710, CVE-2024-42272,
CVE-2024-43868, CVE-2024-43875, CVE-2024-45030, CVE-2024-46689,
CVE-2024-46859, CVE-2024-46795, CVE-2024-46683, CVE-2024-44999,
CVE-2024-44942, CVE-2024-47669, CVE-2024-42318, CVE-2024-43911,
CVE-2024-46693, CVE-2024-42296, CVE-2024-43894, CVE-2024-45002,
CVE-2024-46673, CVE-2024-46852, CVE-2024-45001, CVE-2024-43907,
CVE-2024-42319, CVE-2024-44972, CVE-2024-43905, CVE-2024-45028,
CVE-2024-46816, CVE-2024-46847, CVE-2024-46834, CVE-2024-44982,
CVE-2024-46807, CVE-2024-44948, CVE-2024-46685, CVE-2024-46811,
CVE-2024-42317, CVE-2024-43818, CVE-2024-46786, CVE-2024-43881,
CVE-2024-42294, CVE-2024-46708, CVE-2024-42285, CVE-2024-44941,
CVE-2024-43823, CVE-2024-46694, CVE-2024-46730, CVE-2024-42259,
CVE-2024-42270, CVE-2024-47658, CVE-2024-46718, CVE-2024-44947,
CVE-2024-46701, CVE-2024-43895, CVE-2024-43890, CVE-2024-46826,
CVE-2024-46687, CVE-2024-46768, CVE-2024-45025, CVE-2024-42267,
CVE-2024-42263, CVE-2024-44958, CVE-2024-44989, CVE-2024-43906,
CVE-2024-43869, CVE-2024-43887, CVE-2024-42297, CVE-2024-46702,
CVE-2024-42320, CVE-2024-42322, CVE-2024-46857, CVE-2024-43861,
CVE-2024-45008, CVE-2024-44969, CVE-2024-46821, CVE-2024-44967,
CVE-2024-43914, CVE-2024-46870, CVE-2024-46781, CVE-2024-43842,
CVE-2024-47665, CVE-2024-46753, CVE-2024-43866, CVE-2024-43886,
CVE-2024-44939, CVE-2024-42312, CVE-2024-46864, CVE-2024-46695,
CVE-2024-46818, CVE-2024-45006, CVE-2024-43841, CVE-2024-46703,
CVE-2024-46749, CVE-2024-44986, CVE-2024-46717, CVE-2024-42273,
CVE-2024-43856, CVE-2024-46777, CVE-2024-44984, CVE-2024-46719,
CVE-2024-46858, CVE-2024-43821, CVE-2024-46750, CVE-2024-43829,
CVE-2024-43817, CVE-2024-42281, CVE-2024-42287, CVE-2024-45007,
CVE-2024-46793, CVE-2024-45003, CVE-2024-45011, CVE-2024-47683,
CVE-2024-44934, CVE-2024-46722, CVE-2024-46860, CVE-2024-42314,
CVE-2024-46675, CVE-2024-43899, CVE-2024-46752, CVE-2024-46851,
CVE-2024-42310, CVE-2024-46853, CVE-2024-39472, CVE-2024-43837,
CVE-2024-45021, CVE-2024-46713, CVE-2024-44943, CVE-2024-46787,
CVE-2024-43893, CVE-2024-44946, CVE-2024-45026, CVE-2024-44996,
CVE-2024-46761, CVE-2024-46723, CVE-2024-42311, CVE-2024-42316,
CVE-2024-47663, CVE-2024-44940, CVE-2024-43867, CVE-2024-42265,
CVE-2024-44950, CVE-2024-46867, CVE-2024-45020, CVE-2024-46707,
CVE-2024-44966, CVE-2024-42309, CVE-2024-46767, CVE-2024-46758,
CVE-2024-46732, CVE-2024-42262, CVE-2024-46778, CVE-2024-43884,
CVE-2024-44991, CVE-2024-47668, CVE-2024-46698, CVE-2024-46825,
CVE-2024-42302, CVE-2024-46716, CVE-2024-46726, CVE-2024-43870,
CVE-2024-42307, CVE-2024-46830, CVE-2024-43910, CVE-2024-46735,
CVE-2024-43828, CVE-2024-43904, CVE-2024-44965, CVE-2024-46831,
CVE-2024-44979, CVE-2024-44961, CVE-2024-46771, CVE-2024-46844,
CVE-2024-46871, CVE-2024-43877, CVE-2024-46746, CVE-2024-44987,
CVE-2024-46676, CVE-2024-46766, CVE-2024-46731, CVE-2024-46810,
CVE-2024-46806, CVE-2024-45000, CVE-2024-42313, CVE-2024-45015,
CVE-2024-46784, CVE-2024-43834, CVE-2024-46737, CVE-2024-46797,
CVE-2024-43908, CVE-2024-46724, CVE-2024-44980, CVE-2024-43847,
CVE-2024-46679, CVE-2024-46681, CVE-2024-43819, CVE-2024-46776,
CVE-2024-44954, CVE-2024-45022, CVE-2024-46819, CVE-2024-46775,
CVE-2024-43824, CVE-2024-44953, CVE-2024-46759, CVE-2024-43873,
CVE-2024-46756, CVE-2024-42303, CVE-2024-46738, CVE-2024-42290,
CVE-2024-42295, CVE-2024-43849, CVE-2024-44931, CVE-2024-46741,
CVE-2024-43863, CVE-2024-44974, CVE-2024-46829, CVE-2024-44959,
CVE-2024-42315, CVE-2024-44983, CVE-2024-46715, CVE-2024-46697,
CVE-2024-43850, CVE-2024-46728, CVE-2024-44963, CVE-2024-46823,
CVE-2024-46692, CVE-2024-46760, CVE-2024-46705, CVE-2024-42261,
CVE-2024-42321, CVE-2024-46785, CVE-2024-46686, CVE-2024-49984,
CVE-2024-46706, CVE-2024-45029, CVE-2024-46809, CVE-2024-43827,
CVE-2024-44998, CVE-2024-47667, CVE-2024-43835, CVE-2024-46866,
CVE-2024-46841, CVE-2024-42286, CVE-2024-43852, CVE-2024-43832,
CVE-2024-46773, CVE-2024-46817, CVE-2024-46868, CVE-2024-46812,
CVE-2024-47660, CVE-2024-46725, CVE-2024-42288, CVE-2024-46824,
CVE-2024-42269, CVE-2024-44957, CVE-2024-45017, CVE-2024-46747,
CVE-2024-47662, CVE-2024-46843, CVE-2024-46849, CVE-2024-43879,
CVE-2024-46751, CVE-2024-42298, CVE-2024-46861, CVE-2024-44993,
CVE-2024-46729, CVE-2024-46846, CVE-2024-46794, CVE-2024-43826,
CVE-2024-44973, CVE-2024-46672, CVE-2024-44985, CVE-2024-46815,
CVE-2024-46822, CVE-2024-46754, CVE-2024-43854, CVE-2024-42278,
CVE-2024-46720, CVE-2024-46677, CVE-2024-46854, CVE-2024-43840,
CVE-2024-43830, CVE-2024-46804, CVE-2024-45013, CVE-2024-46782,
CVE-2024-46840, CVE-2024-44977, CVE-2024-46838, CVE-2024-42264,
CVE-2024-47661, CVE-2024-43857, CVE-2023-52918, CVE-2024-44935,
CVE-2024-46739, CVE-2024-43825, CVE-2024-43864, CVE-2024-47659,
CVE-2024-42260, CVE-2024-44962, CVE-2024-46835, CVE-2024-43871,
CVE-2024-47674, CVE-2024-46827, CVE-2024-42283, CVE-2024-42299,
CVE-2024-46714, CVE-2024-46740, CVE-2024-46680, CVE-2024-46791,
CVE-2024-43912, CVE-2024-46813, CVE-2024-46733, CVE-2024-47664,
CVE-2024-42279, CVE-2024-46850, CVE-2024-42289, CVE-2024-46808,
CVE-2024-43880, CVE-2024-46832, CVE-2024-42276, CVE-2024-44937,
CVE-2024-42274, CVE-2024-46772, CVE-2024-47666, CVE-2024-44956,
CVE-2024-46763, CVE-2024-46805, CVE-2023-52889, CVE-2024-46678,
CVE-2024-43902, CVE-2024-46757, CVE-2024-46792, CVE-2024-42268,
CVE-2024-43853, CVE-2024-45027, CVE-2024-42305, CVE-2024-46828,
CVE-2024-43900, CVE-2024-46848, CVE-2024-46814, CVE-2024-46855,
CVE-2024-46727, CVE-2024-46836, CVE-2024-46744, CVE-2024-46780,
CVE-2024-46745, CVE-2024-42306)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
linux-image-6.8.0-1015-gke 6.8.0-1015.19
linux-image-6.8.0-1016-raspi 6.8.0-1016.18
linux-image-6.8.0-1017-ibm 6.8.0-1017.17
linux-image-6.8.0-1017-oracle 6.8.0-1017.18
linux-image-6.8.0-1017-oracle-64k 6.8.0-1017.18
linux-image-6.8.0-1018-oem 6.8.0-1018.18
linux-image-6.8.0-1019-gcp 6.8.0-1019.21
linux-image-6.8.0-1020-aws 6.8.0-1020.22
linux-image-6.8.0-50-generic 6.8.0-50.51
linux-image-6.8.0-50-generic-64k 6.8.0-50.51
linux-image-6.8.0-50-lowlatency 6.8.0-50.51.1
linux-image-6.8.0-50-lowlatency-64k 6.8.0-50.51.1
linux-image-aws 6.8.0-1020.22
linux-image-gcp 6.8.0-1019.21
linux-image-generic 6.8.0-50.51
linux-image-generic-64k 6.8.0-50.51
linux-image-generic-64k-hwe-24.04 6.8.0-50.51
linux-image-generic-hwe-24.04 6.8.0-50.51
linux-image-generic-lpae 6.8.0-50.51
linux-image-gke 6.8.0-1015.19
linux-image-ibm 6.8.0-1017.17
linux-image-ibm-classic 6.8.0-1017.17
linux-image-ibm-lts-24.04 6.8.0-1017.17
linux-image-kvm 6.8.0-50.51
linux-image-lowlatency 6.8.0-50.51.1
linux-image-lowlatency-64k 6.8.0-50.51.1
linux-image-lowlatency-64k-hwe-24.04 6.8.0-50.51.1
linux-image-lowlatency-hwe-24.04 6.8.0-50.51.1
linux-image-oem-24.04 6.8.0-1018.18
linux-image-oem-24.04a 6.8.0-1018.18
linux-image-oracle 6.8.0-1017.18
linux-image-oracle-64k 6.8.0-1017.18
linux-image-raspi 6.8.0-1016.18
linux-image-virtual 6.8.0-50.51
linux-image-virtual-hwe-24.04 6.8.0-50.51
Ubuntu 22.04 LTS
linux-image-6.8.0-1017-oracle 6.8.0-1017.18~22.04.1
linux-image-6.8.0-1017-oracle-64k 6.8.0-1017.18~22.04.1
linux-image-6.8.0-1019-gcp 6.8.0-1019.21~22.04.1
linux-image-6.8.0-1020-aws 6.8.0-1020.22~22.04.1
linux-image-6.8.0-50-lowlatency 6.8.0-50.51.1~22.04.1
linux-image-6.8.0-50-lowlatency-64k 6.8.0-50.51.1~22.04.1
linux-image-aws 6.8.0-1020.22~22.04.1
linux-image-gcp 6.8.0-1019.21~22.04.1
linux-image-lowlatency-64k-hwe-22.04 6.8.0-50.51.1~22.04.1
linux-image-lowlatency-hwe-22.04 6.8.0-50.51.1~22.04.1
linux-image-oracle 6.8.0-1017.18~22.04.1
linux-image-oracle-64k 6.8.0-1017.18~22.04.1
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-7154-1
CVE-2023-52889, CVE-2023-52918, CVE-2024-39472, CVE-2024-42258,
CVE-2024-42259, CVE-2024-42260, CVE-2024-42261, CVE-2024-42262,
CVE-2024-42263, CVE-2024-42264, CVE-2024-42265, CVE-2024-42267,
CVE-2024-42268, CVE-2024-42269, CVE-2024-42270, CVE-2024-42272,
CVE-2024-42273, CVE-2024-42274, CVE-2024-42276, CVE-2024-42277,
CVE-2024-42278, CVE-2024-42279, CVE-2024-42281, CVE-2024-42283,
CVE-2024-42284, CVE-2024-42285, CVE-2024-42286, CVE-2024-42287,
CVE-2024-42288, CVE-2024-42289, CVE-2024-42290, CVE-2024-42291,
CVE-2024-42292, CVE-2024-42294, CVE-2024-42295, CVE-2024-42296,
CVE-2024-42297, CVE-2024-42298, CVE-2024-42299, CVE-2024-42301,
CVE-2024-42302, CVE-2024-42303, CVE-2024-42304, CVE-2024-42305,
CVE-2024-42306, CVE-2024-42307, CVE-2024-42309, CVE-2024-42310,
CVE-2024-42311, CVE-2024-42312, CVE-2024-42313, CVE-2024-42314,
CVE-2024-42315, CVE-2024-42316, CVE-2024-42317, CVE-2024-42318,
CVE-2024-42319, CVE-2024-42320, CVE-2024-42321, CVE-2024-42322,
CVE-2024-43817, CVE-2024-43818, CVE-2024-43819, CVE-2024-43820,
CVE-2024-43821, CVE-2024-43823, CVE-2024-43824, CVE-2024-43825,
CVE-2024-43826, CVE-2024-43827, CVE-2024-43828, CVE-2024-43829,
CVE-2024-43830, CVE-2024-43831, CVE-2024-43832, CVE-2024-43833,
CVE-2024-43834, CVE-2024-43835, CVE-2024-43837, CVE-2024-43839,
CVE-2024-43840, CVE-2024-43841, CVE-2024-43842, CVE-2024-43843,
CVE-2024-43845, CVE-2024-43846, CVE-2024-43847, CVE-2024-43849,
CVE-2024-43850, CVE-2024-43852, CVE-2024-43853, CVE-2024-43854,
CVE-2024-43856, CVE-2024-43857, CVE-2024-43859, CVE-2024-43860,
CVE-2024-43861, CVE-2024-43863, CVE-2024-43864, CVE-2024-43866,
CVE-2024-43867, CVE-2024-43868, CVE-2024-43869, CVE-2024-43870,
CVE-2024-43871, CVE-2024-43873, CVE-2024-43875, CVE-2024-43876,
CVE-2024-43877, CVE-2024-43879, CVE-2024-43880, CVE-2024-43881,
CVE-2024-43883, CVE-2024-43884, CVE-2024-43886, CVE-2024-43887,
CVE-2024-43888, CVE-2024-43889, CVE-2024-43890, CVE-2024-43891,
CVE-2024-43892, CVE-2024-43893, CVE-2024-43894, CVE-2024-43895,
CVE-2024-43899, CVE-2024-43900, CVE-2024-43902, CVE-2024-43904,
CVE-2024-43905, CVE-2024-43906, CVE-2024-43907, CVE-2024-43908,
CVE-2024-43909, CVE-2024-43910, CVE-2024-43911, CVE-2024-43912,
CVE-2024-43913, CVE-2024-43914, CVE-2024-44931, CVE-2024-44934,
CVE-2024-44935, CVE-2024-44937, CVE-2024-44938, CVE-2024-44939,
CVE-2024-44940, CVE-2024-44941, CVE-2024-44942, CVE-2024-44943,
CVE-2024-44944, CVE-2024-44946, CVE-2024-44947, CVE-2024-44948,
CVE-2024-44950, CVE-2024-44953, CVE-2024-44954, CVE-2024-44956,
CVE-2024-44957, CVE-2024-44958, CVE-2024-44959, CVE-2024-44960,
CVE-2024-44961, CVE-2024-44962, CVE-2024-44963, CVE-2024-44965,
CVE-2024-44966, CVE-2024-44967, CVE-2024-44969, CVE-2024-44970,
CVE-2024-44971, CVE-2024-44972, CVE-2024-44973, CVE-2024-44974,
CVE-2024-44975, CVE-2024-44977, CVE-2024-44978, CVE-2024-44979,
CVE-2024-44980, CVE-2024-44982, CVE-2024-44983, CVE-2024-44984,
CVE-2024-44985, CVE-2024-44986, CVE-2024-44987, CVE-2024-44988,
CVE-2024-44989, CVE-2024-44990, CVE-2024-44991, CVE-2024-44993,
CVE-2024-44995, CVE-2024-44996, CVE-2024-44998, CVE-2024-44999,
CVE-2024-45000, CVE-2024-45001, CVE-2024-45002, CVE-2024-45003,
CVE-2024-45005, CVE-2024-45006, CVE-2024-45007, CVE-2024-45008,
CVE-2024-45009, CVE-2024-45010, CVE-2024-45011, CVE-2024-45012,
CVE-2024-45013, CVE-2024-45015, CVE-2024-45017, CVE-2024-45018,
CVE-2024-45019, CVE-2024-45020, CVE-2024-45021, CVE-2024-45022,
CVE-2024-45025, CVE-2024-45026, CVE-2024-45027, CVE-2024-45028,
CVE-2024-45029, CVE-2024-45030, CVE-2024-46672, CVE-2024-46673,
CVE-2024-46675, CVE-2024-46676, CVE-2024-46677, CVE-2024-46678,
CVE-2024-46679, CVE-2024-46680, CVE-2024-46681, CVE-2024-46683,
CVE-2024-46685, CVE-2024-46686, CVE-2024-46687, CVE-2024-46689,
CVE-2024-46691, CVE-2024-46692, CVE-2024-46693, CVE-2024-46694,
CVE-2024-46695, CVE-2024-46697, CVE-2024-46698, CVE-2024-46701,
CVE-2024-46702, CVE-2024-46703, CVE-2024-46705, CVE-2024-46706,
CVE-2024-46707, CVE-2024-46708, CVE-2024-46709, CVE-2024-46710,
CVE-2024-46711, CVE-2024-46713, CVE-2024-46714, CVE-2024-46715,
CVE-2024-46716, CVE-2024-46717, CVE-2024-46718, CVE-2024-46719,
CVE-2024-46720, CVE-2024-46721, CVE-2024-46722, CVE-2024-46723,
CVE-2024-46724, CVE-2024-46725, CVE-2024-46726, CVE-2024-46727,
CVE-2024-46728, CVE-2024-46729, CVE-2024-46730, CVE-2024-46731,
CVE-2024-46732, CVE-2024-46733, CVE-2024-46735, CVE-2024-46737,
CVE-2024-46738, CVE-2024-46739, CVE-2024-46740, CVE-2024-46741,
CVE-2024-46743, CVE-2024-46744, CVE-2024-46745, CVE-2024-46746,
CVE-2024-46747, CVE-2024-46749, CVE-2024-46750, CVE-2024-46751,
CVE-2024-46752, CVE-2024-46753, CVE-2024-46754, CVE-2024-46755,
CVE-2024-46756, CVE-2024-46757, CVE-2024-46758, CVE-2024-46759,
CVE-2024-46760, CVE-2024-46761, CVE-2024-46762, CVE-2024-46763,
CVE-2024-46765, CVE-2024-46766, CVE-2024-46767, CVE-2024-46768,
CVE-2024-46770, CVE-2024-46771, CVE-2024-46772, CVE-2024-46773,
CVE-2024-46774, CVE-2024-46775, CVE-2024-46776, CVE-2024-46777,
CVE-2024-46778, CVE-2024-46779, CVE-2024-46780, CVE-2024-46781,
CVE-2024-46782, CVE-2024-46783, CVE-2024-46784, CVE-2024-46785,
CVE-2024-46786, CVE-2024-46787, CVE-2024-46788, CVE-2024-46791,
CVE-2024-46792, CVE-2024-46793, CVE-2024-46794, CVE-2024-46795,
CVE-2024-46797, CVE-2024-46798, CVE-2024-46802, CVE-2024-46803,
CVE-2024-46804, CVE-2024-46805, CVE-2024-46806, CVE-2024-46807,
CVE-2024-46808, CVE-2024-46809, CVE-2024-46810, CVE-2024-46811,
CVE-2024-46812, CVE-2024-46813, CVE-2024-46814, CVE-2024-46815,
CVE-2024-46816, CVE-2024-46817, CVE-2024-46818, CVE-2024-46819,
CVE-2024-46821, CVE-2024-46822, CVE-2024-46823, CVE-2024-46824,
CVE-2024-46825, CVE-2024-46826, CVE-2024-46827, CVE-2024-46828,
CVE-2024-46829, CVE-2024-46830, CVE-2024-46831, CVE-2024-46832,
CVE-2024-46834, CVE-2024-46835, CVE-2024-46836, CVE-2024-46838,
CVE-2024-46840, CVE-2024-46841, CVE-2024-46842, CVE-2024-46843,
CVE-2024-46844, CVE-2024-46845, CVE-2024-46846, CVE-2024-46847,
CVE-2024-46848, CVE-2024-46849, CVE-2024-46850, CVE-2024-46851,
CVE-2024-46852, CVE-2024-46853, CVE-2024-46854, CVE-2024-46855,
CVE-2024-46857, CVE-2024-46858, CVE-2024-46859, CVE-2024-46860,
CVE-2024-46861, CVE-2024-46864, CVE-2024-46866, CVE-2024-46867,
CVE-2024-46868, CVE-2024-46870, CVE-2024-46871, CVE-2024-47658,
CVE-2024-47659, CVE-2024-47660, CVE-2024-47661, CVE-2024-47662,
CVE-2024-47663, CVE-2024-47664, CVE-2024-47665, CVE-2024-47666,
CVE-2024-47667, CVE-2024-47668, CVE-2024-47669, CVE-2024-47674,
CVE-2024-47683, CVE-2024-49984
Package Information:
https://launchpad.net/ubuntu/+source/linux/6.8.0-50.51
https://launchpad.net/ubuntu/+source/linux-aws/6.8.0-1020.22
https://launchpad.net/ubuntu/+source/linux-gcp/6.8.0-1019.21
https://launchpad.net/ubuntu/+source/linux-gke/6.8.0-1015.19
https://launchpad.net/ubuntu/+source/linux-ibm/6.8.0-1017.17
https://launchpad.net/ubuntu/+source/linux-lowlatency/6.8.0-50.51.1
https://launchpad.net/ubuntu/+source/linux-oem-6.8/6.8.0-1018.18
https://launchpad.net/ubuntu/+source/linux-oracle/6.8.0-1017.18
https://launchpad.net/ubuntu/+source/linux-raspi/6.8.0-1016.18
https://launchpad.net/ubuntu/+source/linux-aws-6.8/6.8.0-1020.22~22.04.1
https://launchpad.net/ubuntu/+source/linux-gcp-6.8/6.8.0-1019.21~22.04.1
https://launchpad.net/ubuntu/+source/linux-lowlatency-hwe-6.8/6.8.0-50.51.1~22.04.1
https://launchpad.net/ubuntu/+source/linux-oracle-6.8/6.8.0-1017.18~22.04.1
[USN-7108-2] AsyncSSH vulnerabilities
==========================================================================
Ubuntu Security Notice USN-7108-2
December 12, 2024
python-asyncssh vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS
Summary:
Several issues were fixed in AsyncSSH.
Software Description:
- python-asyncssh: asyncio-based client and server implementation of SSHv2
protocol
Details:
USN-7108-1 fixed vulnerabilities in AysncSSH. This update provides the
corresponding update for Ubuntu 18.04 LTS.
Original advisory details:
Fabian Bäumer, Marcus Brinkmann, and Jörg Schwenk discovered that AsyncSSH
did not properly handle the extension info message. An attacker able to
intercept communications could possibly use this issue to downgrade
the algorithm used for client authentication. (CVE-2023-46445)
Fabian Bäumer, Marcus Brinkmann, and Jörg Schwenk discovered that AsyncSSH
did not properly handle the user authentication request message. An
attacker could possibly use this issue to control the remote end of an SSH
client session via packet injection/removal and shell emulation.
(CVE-2023-46446)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 LTS
python3-asyncssh 1.11.1-1ubuntu0.1~esm2
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-7108-2
https://ubuntu.com/security/notices/USN-7108-1
CVE-2023-46445, CVE-2023-46446
[USN-7153-1] PHP vulnerability
==========================================================================
Ubuntu Security Notice USN-7153-1
December 12, 2024
php7.0, php7.2 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
PHP could be made to overwrite files.
Software Description:
- php7.2: HTML-embedded scripting language interpreter
- php7.0: HTML-embedded scripting language interpreter
Details:
It was discovered that PHP incorrectly handled long string inputs
in two database drivers. An attacker could possibly use this
issue to write files in locations they would not normally have
access to. (CVE-2024-11236)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 LTS
libapache2-mod-php7.2 7.2.24-0ubuntu0.18.04.17+esm7
Available with Ubuntu Pro
libphp7.2-embed 7.2.24-0ubuntu0.18.04.17+esm7
Available with Ubuntu Pro
php7.2 7.2.24-0ubuntu0.18.04.17+esm7
Available with Ubuntu Pro
php7.2-common 7.2.24-0ubuntu0.18.04.17+esm7
Available with Ubuntu Pro
php7.2-dev 7.2.24-0ubuntu0.18.04.17+esm7
Available with Ubuntu Pro
php7.2-interbase 7.2.24-0ubuntu0.18.04.17+esm7
Available with Ubuntu Pro
php7.2-mysql 7.2.24-0ubuntu0.18.04.17+esm7
Available with Ubuntu Pro
php7.2-pgsql 7.2.24-0ubuntu0.18.04.17+esm7
Available with Ubuntu Pro
php7.2-sqlite3 7.2.24-0ubuntu0.18.04.17+esm7
Available with Ubuntu Pro
Ubuntu 16.04 LTS
libapache2-mod-php7.0 7.0.33-0ubuntu0.16.04.16+esm13
Available with Ubuntu Pro
libphp7.0-embed 7.0.33-0ubuntu0.16.04.16+esm13
Available with Ubuntu Pro
php7.0 7.0.33-0ubuntu0.16.04.16+esm13
Available with Ubuntu Pro
php7.0-common 7.0.33-0ubuntu0.16.04.16+esm13
Available with Ubuntu Pro
php7.0-dev 7.0.33-0ubuntu0.16.04.16+esm13
Available with Ubuntu Pro
php7.0-interbase 7.0.33-0ubuntu0.16.04.16+esm13
Available with Ubuntu Pro
php7.0-mysql 7.0.33-0ubuntu0.16.04.16+esm13
Available with Ubuntu Pro
php7.0-pgsql 7.0.33-0ubuntu0.16.04.16+esm13
Available with Ubuntu Pro
php7.0-sqlite3 7.0.33-0ubuntu0.16.04.16+esm13
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-7153-1
( https://ubuntu.com/security/notices/USN-7153-1)
CVE-2024-11236