ubuntu jammy v1.639
Metadata:
BOSH Agent Version: 2.698.0
Kernel Version: 5.15.0.125.124
Full Changelog: ubuntu-jammy/v1.631...ubuntu-jammy/v1.639
USNs:
Title: USN-7091-1 -- Ruby vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7091-1
Priorities: medium
Description:
It was discovered that Ruby incorrectly handled parsing of an XML document that has specific XML characters in an attribute value using REXML gem. An attacker could use this issue to cause Ruby to crash, resulting in a denial of service. This issue only affected in Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-35176, CVE-2024-39908, CVE-2024-41123) It was discovered that Ruby incorrectly handled parsing of an XML document that has many entity expansions with SAX2 or pull parser API. An attacker could use this issue to cause Ruby to crash, resulting in a denial of service. (CVE-2024-41946) It was discovered that Ruby incorrectly handled parsing of an XML document that has many digits in a hex numeric character reference. An attacker could use this issue to cause Ruby to crash, resulting in a denial of service. (CVE-2024-49761) Update Instructions: Run sudo pro fix USN-7091-1
to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libruby3.0 - 3.0.2-7ubuntu2.8 ruby3.0 - 3.0.2-7ubuntu2.8 ruby3.0-dev - 3.0.2-7ubuntu2.8 ruby3.0-doc - 3.0.2-7ubuntu2.8 No subscription required
CVEs:
- https://ubuntu.com/security/CVE-2024-35176
- https://ubuntu.com/security/CVE-2024-39908
- https://ubuntu.com/security/CVE-2024-41123
- https://ubuntu.com/security/CVE-2024-41946
- https://ubuntu.com/security/CVE-2024-49761
Title: USN-7093-1 -- Werkzeug vulnerability
URL: https://ubuntu.com/security/notices/USN-7093-1
Priorities: medium
Description:
It was discovered that Werkzeug incorrectly handled multiple form submission requests. A remote attacker could possibly use this issue to cause Werkzeug to consume resources, leading to a denial of service. Update Instructions: Run sudo pro fix USN-7093-1
to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-werkzeug-doc - 2.0.2+dfsg1-1ubuntu0.22.04.3 python3-werkzeug - 2.0.2+dfsg1-1ubuntu0.22.04.3 No subscription required
CVEs:
Title: USN-7095-1 -- Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7095-1
Priorities: low,medium
Description:
Chenyuan Yang discovered that the USB Gadget subsystem in the Linux kernel did not properly check for the device to be enabled before writing. A local attacker could possibly use this to cause a denial of service. (CVE-2024-25741) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - MIPS architecture; - PA-RISC architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - x86 architecture; - Cryptographic API; - Serial ATA and Parallel ATA drivers; - Null block device driver; - Bluetooth drivers; - Cdrom driver; - Clock framework and drivers; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - Cirrus firmware drivers; - GPIO subsystem; - GPU drivers; - I2C subsystem; - IIO subsystem; - InfiniBand drivers; - ISDN/mISDN subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - Fastrpc Driver; - Network drivers; - Microsoft Azure Network Adapter (MANA) driver; - Near Field Communication (NFC) drivers; - NVME drivers; - NVMEM (Non Volatile Memory) drivers; - PCI subsystem; - Pin controllers subsystem; - x86 platform drivers; - S/390 drivers; - SCSI drivers; - Thermal drivers; - TTY drivers; - UFS subsystem; - USB DSL drivers; - USB core drivers; - DesignWare USB3 driver; - USB Gadget drivers; - USB Serial drivers; - VFIO drivers; - VHOST drivers; - File systems infrastructure; - BTRFS file system; - GFS2 file system; - JFFS2 file system; - JFS file system; - Network file systems library; - Network file system client; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - Memory management; - Netfilter; - Tracing infrastructure; - io_uring subsystem; - BPF subsystem; - Core kernel; - Bluetooth subsystem; - CAN network layer; - Ceph Core library; - Networking core; - IPv4 networking; - IPv6 networking; - IUCV driver; - MAC80211 subsystem; - Network traffic control; - Sun RPC protocol; - Wireless networking; - AMD SoC Alsa drivers; - SoC Audio for Freescale CPUs drivers; - MediaTek ASoC drivers; - SoC audio core drivers; - SOF drivers; - Sound sequencer drivers; (CVE-2024-42271, CVE-2024-42068, CVE-2024-42086, CVE-2024-42132, CVE-2024-42074, CVE-2024-41017, CVE-2024-42090, CVE-2024-42280, CVE-2024-41030, CVE-2024-41037, CVE-2024-42248, CVE-2024-42084, CVE-2024-41057, CVE-2024-42252, CVE-2024-41055, CVE-2024-42158, CVE-2024-42097, CVE-2024-42101, CVE-2024-42095, CVE-2024-41084, CVE-2024-41051, CVE-2024-41032, CVE-2024-41046, CVE-2024-42231, CVE-2024-42133, CVE-2024-42089, CVE-2024-41062, CVE-2024-41033, CVE-2024-41012, CVE-2024-41077, CVE-2024-41064, CVE-2024-41082, CVE-2024-41090, CVE-2024-42065, CVE-2024-41096, CVE-2024-42119, CVE-2024-41054, CVE-2024-42064, CVE-2024-42253, CVE-2024-42237, CVE-2024-42120, CVE-2024-41066, CVE-2024-41083, CVE-2024-42129, CVE-2024-41085, CVE-2024-41058, CVE-2024-42146, CVE-2024-42156, CVE-2024-42076, CVE-2024-42149, CVE-2024-42069, CVE-2024-41039, CVE-2024-42110, CVE-2024-42150, CVE-2024-41015, CVE-2024-39486, CVE-2024-42144, CVE-2024-42131, CVE-2024-42087, CVE-2024-42091, CVE-2024-42236, CVE-2024-42088, CVE-2024-42112, CVE-2024-42142, CVE-2024-42082, CVE-2024-42111, CVE-2024-41028, CVE-2024-45001, CVE-2024-42077, CVE-2024-42102, CVE-2024-42239, CVE-2024-42140, CVE-2024-41091, CVE-2024-41050, CVE-2024-41034, CVE-2024-43858, CVE-2024-42145, CVE-2024-42227, CVE-2024-41029, CVE-2024-42230, CVE-2024-42096, CVE-2024-42238, CVE-2024-41027, CVE-2024-42063, CVE-2024-41023, CVE-2024-41041, CVE-2024-41038, CVE-2024-41073, CVE-2024-41067, CVE-2024-41025, CVE-2024-42152, CVE-2024-42247, CVE-2024-41065, CVE-2024-42121, CVE-2024-42157, CVE-2024-42080, CVE-2024-41076, CVE-2024-41059, CVE-2024-42108, CVE-2024-42251, CVE-2024-42093, CVE-2024-42130, CVE-2024-42126, CVE-2024-42079, CVE-2024-42246, CVE-2024-41081, CVE-2024-42092, CVE-2024-43855, CVE-2024-42235, CVE-2024-42118, CVE-2024-42067, CVE-2024-41047, CVE-2024-42155, CVE-2024-41010, CVE-2024-41061, CVE-2024-41007, CVE-2024-42245, CVE-2024-42106, CVE-2024-42066, CVE-2024-41078, CVE-2024-42113, CVE-2024-41087, CVE-2024-41092, CVE-2024-42234, CVE-2024-42124, CVE-2024-42100, CVE-2024-42128, CVE-2024-41072, CVE-2024-41022, CVE-2024-41049, CVE-2024-42229, CVE-2024-42225, CVE-2024-41052, CVE-2024-42151, CVE-2024-41094, CVE-2024-41098, CVE-2024-41035, CVE-2024-41042, CVE-2024-42114, CVE-2024-42250, CVE-2024-41095, CVE-2024-42138, CVE-2024-42241, CVE-2024-42103, CVE-2024-42094, CVE-2024-41045, CVE-2024-41075, CVE-2024-42073, CVE-2024-42153, CVE-2024-41048, CVE-2024-42085, CVE-2024-41074, CVE-2024-42244, CVE-2024-41018, CVE-2024-41079, CVE-2024-42127, CVE-2023-52887, CVE-2023-52888, CVE-2024-41071, CVE-2024-41020, CVE-2024-41036, CVE-2024-42117, CVE-2024-41068, CVE-2024-41056, CVE-2024-39487, CVE-2024-42243, CVE-2024-41019, CVE-2024-41070, CVE-2024-41044, CVE-2024-41060, CVE-2024-41088, CVE-2024-41021, CVE-2024-41053, CVE-2024-42137, CVE-2024-41086, CVE-2024-42104, CVE-2024-42109, CVE-2024-42105, CVE-2024-42136, CVE-2024-41080, CVE-2024-42098, CVE-2024-41093, CVE-2024-41063, CVE-2024-42161, CVE-2024-42147, CVE-2024-42223, CVE-2024-41097, CVE-2024-41069, CVE-2024-42240, CVE-2024-42135, CVE-2024-42070, CVE-2024-41089, CVE-2024-42141, CVE-2024-42115, CVE-2024-41031, CVE-2024-42232) Update Instructions: Run sudo pro fix USN-7095-1
to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1017-nvidia - 6.8.0-1017.1922.04.1 linux-buildinfo-6.8.0-1017-nvidia-64k - 6.8.0-1017.1922.04.1 linux-cloud-tools-nvidia-6.8 - 6.8.0-1017.1922.04.1 linux-cloud-tools-nvidia-hwe-22.04 - 6.8.0-1017.1922.04.1 linux-cloud-tools-nvidia-hwe-22.04-edge - 6.8.0-1017.1922.04.1 linux-headers-6.8.0-1017-nvidia - 6.8.0-1017.1922.04.1 linux-headers-6.8.0-1017-nvidia-64k - 6.8.0-1017.1922.04.1 linux-headers-nvidia-6.8 - 6.8.0-1017.1922.04.1 linux-headers-nvidia-64k-6.8 - 6.8.0-1017.1922.04.1 linux-headers-nvidia-64k-hwe-22.04 - 6.8.0-1017.1922.04.1 linux-headers-nvidia-64k-hwe-22.04-edge - 6.8.0-1017.1922.04.1 linux-headers-nvidia-hwe-22.04 - 6.8.0-1017.1922.04.1 linux-headers-nvidia-hwe-22.04-edge - 6.8.0-1017.1922.04.1 linux-image-6.8.0-1017-nvidia - 6.8.0-1017.1922.04.1 linux-image-6.8.0-1017-nvidia-64k - 6.8.0-1017.1922.04.1 linux-image-nvidia-6.8 - 6.8.0-1017.1922.04.1 linux-image-nvidia-64k-6.8 - 6.8.0-1017.1922.04.1 linux-image-nvidia-64k-hwe-22.04 - 6.8.0-1017.1922.04.1 linux-image-nvidia-64k-hwe-22.04-edge - 6.8.0-1017.1922.04.1 linux-image-nvidia-hwe-22.04 - 6.8.0-1017.1922.04.1 linux-image-nvidia-hwe-22.04-edge - 6.8.0-1017.1922.04.1 linux-image-uc-6.8.0-1017-nvidia - 6.8.0-1017.1922.04.1 linux-image-uc-6.8.0-1017-nvidia-64k - 6.8.0-1017.1922.04.1 linux-image-unsigned-6.8.0-1017-nvidia - 6.8.0-1017.1922.04.1 linux-image-unsigned-6.8.0-1017-nvidia-64k - 6.8.0-1017.1922.04.1 linux-modules-6.8.0-1017-nvidia - 6.8.0-1017.1922.04.1 linux-modules-6.8.0-1017-nvidia-64k - 6.8.0-1017.1922.04.1 linux-modules-extra-6.8.0-1017-nvidia - 6.8.0-1017.1922.04.1 linux-modules-nvidia-fs-6.8.0-1017-nvidia - 6.8.0-1017.1922.04.1 linux-modules-nvidia-fs-6.8.0-1017-nvidia-64k - 6.8.0-1017.1922.04.1 linux-modules-nvidia-fs-nvidia-6.8 - 6.8.0-1017.1922.04.1 linux-modules-nvidia-fs-nvidia-64k-6.8 - 6.8.0-1017.1922.04.1 linux-modules-nvidia-fs-nvidia-64k-hwe-22.04 - 6.8.0-1017.1922.04.1 linux-modules-nvidia-fs-nvidia-64k-hwe-22.04-edge - 6.8.0-1017.1922.04.1 linux-modules-nvidia-fs-nvidia-hwe-22.04 - 6.8.0-1017.1922.04.1 linux-modules-nvidia-fs-nvidia-hwe-22.04-edge - 6.8.0-1017.1922.04.1 linux-nvidia-6.8 - 6.8.0-1017.1922.04.1 linux-nvidia-6.8-headers-6.8.0-1017 - 6.8.0-1017.1922.04.1 linux-nvidia-6.8-tools-6.8.0-1017 - 6.8.0-1017.1922.04.1 linux-nvidia-64k-6.8 - 6.8.0-1017.1922.04.1 linux-nvidia-64k-hwe-22.04 - 6.8.0-1017.1922.04.1 linux-nvidia-64k-hwe-22.04-edge - 6.8.0-1017.1922.04.1 linux-nvidia-hwe-22.04 - 6.8.0-1017.1922.04.1 linux-nvidia-hwe-22.04-edge - 6.8.0-1017.1922.04.1 linux-tools-6.8.0-1017-nvidia - 6.8.0-1017.1922.04.1 linux-tools-6.8.0-1017-nvidia-64k - 6.8.0-1017.1922.04.1 linux-tools-nvidia-6.8 - 6.8.0-1017.1922.04.1 linux-tools-nvidia-64k-6.8 - 6.8.0-1017.1922.04.1 linux-tools-nvidia-64k-hwe-22.04 - 6.8.0-1017.1922.04.1 linux-tools-nvidia-64k-hwe-22.04-edge - 6.8.0-1017.1922.04.1 linux-tools-nvidia-hwe-22.04 - 6.8.0-1017.1922.04.1 linux-tools-nvidia-hwe-22.04-edge - 6.8.0-1017.1922.04.1 No subscription required
CVEs:
- https://ubuntu.com/security/CVE-2023-52887
- https://ubuntu.com/security/CVE-2023-52888
- https://ubuntu.com/security/CVE-2024-25741
- https://ubuntu.com/security/CVE-2024-39486
- https://ubuntu.com/security/CVE-2024-39487
- https://ubuntu.com/security/CVE-2024-41007
- https://ubuntu.com/security/CVE-2024-41010
- https://ubuntu.com/security/CVE-2024-41012
- https://ubuntu.com/security/CVE-2024-41015
- https://ubuntu.com/security/CVE-2024-41017
- https://ubuntu.com/security/CVE-2024-41018
- https://ubuntu.com/security/CVE-2024-41019
- https://ubuntu.com/security/CVE-2024-41020
- https://ubuntu.com/security/CVE-2024-41021
- https://ubuntu.com/security/CVE-2024-41022
- https://ubuntu.com/security/CVE-2024-41023
- https://ubuntu.com/security/CVE-2024-41025
- https://ubuntu.com/security/CVE-2024-41027
- https://ubuntu.com/security/CVE-2024-41028
- https://ubuntu.com/security/CVE-2024-41029
- https://ubuntu.com/security/CVE-2024-41030
- https://ubuntu.com/security/CVE-2024-41031
- https://ubuntu.com/security/CVE-2024-41032
- https://ubuntu.com/security/CVE-2024-41033
- https://ubuntu.com/security/CVE-2024-41034
- https://ubuntu.com/security/CVE-2024-41035
- https://ubuntu.com/security/CVE-2024-41036
- https://ubuntu.com/security/CVE-2024-41037
- https://ubuntu.com/security/CVE-2024-41038
- https://ubuntu.com/security/CVE-2024-41039
- https://ubuntu.com/security/CVE-2024-41041
- https://ubuntu.com/security/CVE-2024-41042
- https://ubuntu.com/security/CVE-2024-41044
- https://ubuntu.com/security/CVE-2024-41045
- https://ubuntu.com/security/CVE-2024-41046
- https://ubuntu.com/security/CVE-2024-41047
- https://ubuntu.com/security/CVE-2024-41048
- https://ubuntu.com/security/CVE-2024-41049
- https://ubuntu.com/security/CVE-2024-41050
- https://ubuntu.com/security/CVE-2024-41051
- https://ubuntu.com/security/CVE-2024-41052
- https://ubuntu.com/security/CVE-2024-41053
- https://ubuntu.com/security/CVE-2024-41054
- https://ubuntu.com/security/CVE-2024-41055
- https://ubuntu.com/security/CVE-2024-41056
- https://ubuntu.com/security/CVE-2024-41057
- https://ubuntu.com/security/CVE-2024-41058
- https://ubuntu.com/security/CVE-2024-41059
- https://ubuntu.com/security/CVE-2024-41060
- https://ubuntu.com/security/CVE-2024-41061
- https://ubuntu.com/security/CVE-2024-41062
- https://ubuntu.com/security/CVE-2024-41063
- https://ubuntu.com/security/CVE-2024-41064
- https://ubuntu.com/security/CVE-2024-41065
- https://ubuntu.com/security/CVE-2024-41066
- https://ubuntu.com/security/CVE-2024-41067
- https://ubuntu.com/security/CVE-2024-41068
- https://ubuntu.com/security/CVE-2024-41069
- https://ubuntu.com/security/CVE-2024-41070
- https://ubuntu.com/security/CVE-2024-41071
- https://ubuntu.com/security/CVE-2024-41072
- https://ubuntu.com/security/CVE-2024-41073
- https://ubuntu.com/security/CVE-2024-41074
- https://ubuntu.com/security/CVE-2024-41075
- https://ubuntu.com/security/CVE-2024-41076
- https://ubuntu.com/security/CVE-2024-41077
- https://ubuntu.com/security/CVE-2024-41078
- https://ubuntu.com/security/CVE-2024-41079
- https://ubuntu.com/security/CVE-2024-41080
- https://ubuntu.com/security/CVE-2024-41081
- https://ubuntu.com/security/CVE-2024-41082
- https://ubuntu.com/security/CVE-2024-41083
- https://ubuntu.com/security/CVE-2024-41084
- https://ubuntu.com/security/CVE-2024-41085
- https://ubuntu.com/security/CVE-2024-41086
- https://ubuntu.com/security/CVE-2024-41087
- https://ubuntu.com/security/CVE-2024-41088
- https://ubuntu.com/security/CVE-2024-41089
- https://ubuntu.com/security/CVE-2024-41090
- https://ubuntu.com/security/CVE-2024-41091
- https://ubuntu.com/security/CVE-2024-41092
- https://ubuntu.com/security/CVE-2024-41093
- https://ubuntu.com/security/CVE-2024-41094
- https://ubuntu.com/security/CVE-2024-41095
- https://ubuntu.com/security/CVE-2024-41096
- https://ubuntu.com/security/CVE-2024-41097
- https://ubuntu.com/security/CVE-2024-41098
- https://ubuntu.com/security/CVE-2024-42063
- https://ubuntu.com/security/CVE-2024-42064
- https://ubuntu.com/security/CVE-2024-42065
- https://ubuntu.com/security/CVE-2024-42066
- https://ubuntu.com/security/CVE-2024-42067
- https://ubuntu.com/security/CVE-2024-42068
- https://ubuntu.com/security/CVE-2024-42069
- https://ubuntu.com/security/CVE-2024-42070
- https://ubuntu.com/security/CVE-2024-42073
- https://ubuntu.com/security/CVE-2024-42074
- https://ubuntu.com/security/CVE-2024-42076
- https://ubuntu.com/security/CVE-2024-42077
- https://ubuntu.com/security/CVE-2024-42079
- https://ubuntu.com/security/CVE-2024-42080
- https://ubuntu.com/security/CVE-2024-42082
- https://ubuntu.com/security/CVE-2024-42084
- https://ubuntu.com/security/CVE-2024-42085
- https://ubuntu.com/security/CVE-2024-42086
- https://ubuntu.com/security/CVE-2024-42087
- https://ubuntu.com/security/CVE-2024-42088
- https://ubuntu.com/security/CVE-2024-42089
- https://ubuntu.com/security/CVE-2024-42090
- https://ubuntu.com/security/CVE-2024-42091
- https://ubuntu.com/security/CVE-2024-42092
- https://ubuntu.com/security/CVE-2024-42093
- https://ubuntu.com/security/CVE-2024-42094
- https://ubuntu.com/security/CVE-2024-42095
- https://ubuntu.com/security/CVE-2024-42096
- https://ubuntu.com/security/CVE-2024-42097
- https://ubuntu.com/security/CVE-2024-42098
- https://ubuntu.com/security/CVE-2024-42100
- https://ubuntu.com/security/CVE-2024-42101
- https://ubuntu.com/security/CVE-2024-42102
- https://ubuntu.com/security/CVE-2024-42103
- https://ubuntu.com/security/CVE-2024-42104
- https://ubuntu.com/security/CVE-2024-42105
- https://ubuntu.com/security/CVE-2024-42106
- https://ubuntu.com/security/CVE-2024-42108
- https://ubuntu.com/security/CVE-2024-42109
- https://ubuntu.com/security/CVE-2024-42110
- https://ubuntu.com/security/CVE-2024-42111
- https://ubuntu.com/security/CVE-2024-42112
- https://ubuntu.com/security/CVE-2024-42113
- https://ubuntu.com/security/CVE-2024-42114
- https://ubuntu.com/security/CVE-2024-42115
- https://ubuntu.com/security/CVE-2024-42117
- https://ubuntu.com/security/CVE-2024-42118
- https://ubuntu.com/security/CVE-2024-42119
- https://ubuntu.com/security/CVE-2024-42120
- https://ubuntu.com/security/CVE-2024-42121
- https://ubuntu.com/security/CVE-2024-42124
- https://ubuntu.com/security/CVE-2024-42126
- https://ubuntu.com/security/CVE-2024-42127
- https://ubuntu.com/security/CVE-2024-42128
- https://ubuntu.com/security/CVE-2024-42129
- https://ubuntu.com/security/CVE-2024-42130
- https://ubuntu.com/security/CVE-2024-42131
- https://ubuntu.com/security/CVE-2024-42132
- https://ubuntu.com/security/CVE-2024-42133
- https://ubuntu.com/security/CVE-2024-42135
- https://ubuntu.com/security/CVE-2024-42136
- https://ubuntu.com/security/CVE-2024-42137
- https://ubuntu.com/security/CVE-2024-42138
- https://ubuntu.com/security/CVE-2024-42140
- https://ubuntu.com/security/CVE-2024-42141
- https://ubuntu.com/security/CVE-2024-42142
- https://ubuntu.com/security/CVE-2024-42144
- https://ubuntu.com/security/CVE-2024-42145
- https://ubuntu.com/security/CVE-2024-42146
- https://ubuntu.com/security/CVE-2024-42147
- https://ubuntu.com/security/CVE-2024-42149
- https://ubuntu.com/security/CVE-2024-42150
- https://ubuntu.com/security/CVE-2024-42151
- https://ubuntu.com/security/CVE-2024-42152
- https://ubuntu.com/security/CVE-2024-42153
- https://ubuntu.com/security/CVE-2024-42155
- https://ubuntu.com/security/CVE-2024-42156
- https://ubuntu.com/security/CVE-2024-42157
- https://ubuntu.com/security/CVE-2024-42158
- https://ubuntu.com/security/CVE-2024-42161
- https://ubuntu.com/security/CVE-2024-42223
- https://ubuntu.com/security/CVE-2024-42225
- https://ubuntu.com/security/CVE-2024-42227
- https://ubuntu.com/security/CVE-2024-42229
- https://ubuntu.com/security/CVE-2024-42230
- https://ubuntu.com/security/CVE-2024-42231
- https://ubuntu.com/security/CVE-2024-42232
- https://ubuntu.com/security/CVE-2024-42234
- https://ubuntu.com/security/CVE-2024-42235
- https://ubuntu.com/security/CVE-2024-42236
- https://ubuntu.com/security/CVE-2024-42237
- https://ubuntu.com/security/CVE-2024-42238
- https://ubuntu.com/security/CVE-2024-42239
- https://ubuntu.com/security/CVE-2024-42240
- https://ubuntu.com/security/CVE-2024-42241
- https://ubuntu.com/security/CVE-2024-42243
- https://ubuntu.com/security/CVE-2024-42244
- https://ubuntu.com/security/CVE-2024-42245
- https://ubuntu.com/security/CVE-2024-42246
- https://ubuntu.com/security/CVE-2024-42247
- https://ubuntu.com/security/CVE-2024-42248
- https://ubuntu.com/security/CVE-2024-42250
- https://ubuntu.com/security/CVE-2024-42251
- https://ubuntu.com/security/CVE-2024-42252
- https://ubuntu.com/security/CVE-2024-42253
- https://ubuntu.com/security/CVE-2024-42271
- https://ubuntu.com/security/CVE-2024-42280
- https://ubuntu.com/security/CVE-2024-43855
- https://ubuntu.com/security/CVE-2024-43858
- https://ubuntu.com/security/CVE-2024-45001
Title: USN-7099-1 -- OpenJDK 21 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7099-1
Priorities: low,medium
Description:
Andy Boothe discovered that the Networking component of OpenJDK 21 did not properly handle access under certain circumstances. An unauthenticated attacker could possibly use this issue to cause a denial of service. (CVE-2024-21208) It was discovered that the Hotspot component of OpenJDK 21 did not properly handle vectorization under certain circumstances. An unauthenticated attacker could possibly use this issue to access unauthorized resources and expose sensitive information. (CVE-2024-21210, CVE-2024-21235) It was discovered that the Serialization component of OpenJDK 21 did not properly handle deserialization under certain circumstances. An unauthenticated attacker could possibly use this issue to cause a denial of service. (CVE-2024-21217) Update Instructions: Run sudo pro fix USN-7099-1
to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-21-demo - 21.0.5+11-1ubuntu122.04 openjdk-21-doc - 21.0.5+11-1ubuntu122.04 openjdk-21-jdk - 21.0.5+11-1ubuntu122.04 openjdk-21-jdk-headless - 21.0.5+11-1ubuntu122.04 openjdk-21-jre - 21.0.5+11-1ubuntu122.04 openjdk-21-jre-headless - 21.0.5+11-1ubuntu122.04 openjdk-21-jre-zero - 21.0.5+11-1ubuntu122.04 openjdk-21-source - 21.0.5+11-1ubuntu122.04 openjdk-21-testsupport - 21.0.5+11-1ubuntu1~22.04 No subscription required
CVEs:
- https://ubuntu.com/security/CVE-2024-21208
- https://ubuntu.com/security/CVE-2024-21210
- https://ubuntu.com/security/CVE-2024-21217
- https://ubuntu.com/security/CVE-2024-21235
Title: USN-7100-1 -- Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7100-1
Priorities: medium,high,low
Description:
Supraja Sridhara, Benedict Schlüter, Mark Kuhne, Andrin Bertschi, and Shweta Shinde discovered that the Confidential Computing framework in the Linux kernel for x86 platforms did not properly handle 32-bit emulation on TDX and SEV. An attacker with access to the VMM could use this to cause a denial of service (guest crash) or possibly execute arbitrary code. (CVE-2024-25744) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PowerPC architecture; - RISC-V architecture; - User-Mode Linux (UML); - x86 architecture; - Block layer subsystem; - Android drivers; - Serial ATA and Parallel ATA drivers; - ATM drivers; - Drivers core; - Null block device driver; - Character device driver; - ARM SCMI message protocol; - GPU drivers; - HID subsystem; - Hardware monitoring drivers; - I3C subsystem; - InfiniBand drivers; - Input Device core drivers; - Input Device (Miscellaneous) drivers; - IOMMU subsystem; - IRQ chip drivers; - ISDN/mISDN subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - VMware VMCI Driver; - MMC subsystem; - Network drivers; - Near Field Communication (NFC) drivers; - NVME drivers; - Device tree and open firmware driver; - Parport drivers; - PCI subsystem; - Pin controllers subsystem; - Remote Processor subsystem; - S/390 drivers; - SCSI drivers; - QCOM SoC drivers; - Direct Digital Synthesis drivers; - Thunderbolt and USB4 drivers; - TTY drivers; - Userspace I/O drivers; - DesignWare USB3 driver; - USB Gadget drivers; - USB Host Controller drivers; - USB Type-C Connector System Software Interface driver; - USB over IP driver; - VHOST drivers; - File systems infrastructure; - BTRFS file system; - Ext4 file system; - F2FS file system; - JFS file system; - NILFS2 file system; - NTFS3 file system; - Proc file system; - SMB network file system; - Core kernel; - DMA mapping infrastructure; - RCU subsystem; - Tracing infrastructure; - Radix Tree data structure library; - Kernel userspace event delivery library; - Objagg library; - Memory management; - Amateur Radio drivers; - Bluetooth subsystem; - Ethernet bridge; - CAN network layer; - Networking core; - Ethtool driver; - IPv4 networking; - IPv6 networking; - IUCV driver; - KCM (Kernel Connection Multiplexor) sockets driver; - MAC80211 subsystem; - Multipath TCP; - Netfilter; - Network traffic control; - SCTP protocol; - Sun RPC protocol; - TIPC protocol; - TLS protocol; - Wireless networking; - AppArmor security module; - Landlock security; - Simplified Mandatory Access Control Kernel framework; - FireWire sound drivers; - SoC audio core drivers; - USB sound devices; (CVE-2024-43817, CVE-2024-42304, CVE-2024-46756, CVE-2024-42318, CVE-2024-41090, CVE-2024-41063, CVE-2024-44987, CVE-2024-46844, CVE-2024-46677, CVE-2024-44988, CVE-2024-42297, CVE-2024-26893, CVE-2024-46673, CVE-2024-26800, CVE-2024-42305, CVE-2024-46731, CVE-2024-41091, CVE-2024-46810, CVE-2024-41072, CVE-2022-48666, CVE-2024-38602, CVE-2024-46780, CVE-2024-46750, CVE-2024-43858, CVE-2024-41020, CVE-2024-46755, CVE-2024-46829, CVE-2024-41068, CVE-2024-45003, CVE-2024-42280, CVE-2024-42283, CVE-2024-43873, CVE-2024-46746, CVE-2024-44969, CVE-2024-46807, CVE-2024-41081, CVE-2024-44971, CVE-2024-26607, CVE-2024-43880, CVE-2024-42281, CVE-2024-42274, CVE-2024-43908, CVE-2024-42267, CVE-2024-47665, CVE-2024-45011, CVE-2024-46707, CVE-2024-42310, CVE-2024-42309, CVE-2024-44965, CVE-2024-46747, CVE-2024-42259, CVE-2024-46804, CVE-2024-46679, CVE-2024-45007, CVE-2024-45009, CVE-2024-46771, CVE-2024-46739, CVE-2024-41060, CVE-2024-46676, CVE-2024-46822, CVE-2024-42272, CVE-2024-41059, CVE-2024-43839, CVE-2024-46817, CVE-2024-47669, CVE-2024-44999, CVE-2024-42285, CVE-2024-44986, CVE-2024-43828, CVE-2024-43879, CVE-2024-44998, CVE-2024-46724, CVE-2024-41015, CVE-2024-45025, CVE-2024-43849, CVE-2024-46818, CVE-2024-43830, CVE-2024-46725, CVE-2024-43834, CVE-2024-42302, CVE-2024-36484, CVE-2024-43853, CVE-2024-46782, CVE-2024-46740, CVE-2024-46732, CVE-2024-43869, CVE-2024-42312, CVE-2024-42292, CVE-2024-43884, CVE-2024-44934, CVE-2024-44995, CVE-2024-43894, CVE-2024-46675, CVE-2024-43870, CVE-2024-44990, CVE-2024-42287, CVE-2024-41065, CVE-2024-42301, CVE-2024-42290, CVE-2024-46702, CVE-2024-46719, CVE-2024-46745, CVE-2024-46758, CVE-2024-46757, CVE-2024-44935, CVE-2024-42276, CVE-2024-43890, CVE-2023-52918, CVE-2024-41077, CVE-2024-43905, CVE-2024-38611, CVE-2024-42269, CVE-2024-42284, CVE-2024-41073, CVE-2024-46722, CVE-2024-41017, CVE-2024-47667, CVE-2024-45021, CVE-2024-43867, CVE-2024-41098, CVE-2024-43909, CVE-2024-46723, CVE-2024-45026, CVE-2024-42114, CVE-2024-44944, CVE-2024-43835, CVE-2024-44982, CVE-2024-43907, CVE-2024-46828, CVE-2024-43856, CVE-2024-46832, CVE-2024-44954, CVE-2024-43846, CVE-2024-41070, CVE-2024-43892, CVE-2024-44985, CVE-2024-42306, CVE-2024-43889, CVE-2024-44958, CVE-2024-46798, CVE-2024-44989, CVE-2024-42313, CVE-2024-46737, CVE-2024-42289, CVE-2024-43829, CVE-2024-46744, CVE-2023-52889, CVE-2024-46689, CVE-2024-47663, CVE-2024-46791, CVE-2024-43863, CVE-2024-43893, CVE-2024-43841, CVE-2024-46777, CVE-2024-46800, CVE-2024-45028, CVE-2024-44952, CVE-2024-43883, CVE-2024-44946, CVE-2024-43882, CVE-2024-44960, CVE-2024-38577, CVE-2024-46814, CVE-2024-42288, CVE-2024-44947, CVE-2024-41071, CVE-2024-41042, CVE-2024-41064, CVE-2024-42311, CVE-2024-42270, CVE-2024-43861, CVE-2024-46752, CVE-2024-42296, CVE-2024-41022, CVE-2024-42246, CVE-2024-43871, CVE-2024-42265, CVE-2024-43854, CVE-2024-41019, CVE-2024-46815, CVE-2024-46743, CVE-2024-42126, CVE-2024-26661, CVE-2024-41012, CVE-2024-46761, CVE-2024-45008, CVE-2024-46805, CVE-2024-45006, CVE-2024-42295, CVE-2024-46783, CVE-2024-42286, CVE-2024-46714, CVE-2024-42299, CVE-2024-46781, CVE-2024-43914, CVE-2024-44966, CVE-2024-44974, CVE-2024-45018, CVE-2024-46840, CVE-2024-46819, CVE-2024-40915, CVE-2024-46759, CVE-2024-43860, CVE-2024-47668, CVE-2024-39472, CVE-2024-47660, CVE-2024-47659, CVE-2024-46795, CVE-2024-43875, CVE-2024-46738, CVE-2024-42271, CVE-2024-26669, CVE-2024-44983, CVE-2024-41078, CVE-2024-46685, CVE-2024-46713, CVE-2024-46721, CVE-2024-46763, CVE-2024-41011, CVE-2024-43902, CVE-2024-42277, CVE-2024-44948) Update Instructions: Run sudo pro fix USN-7100-1
to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-5.15.0-1038-xilinx-zynqmp - 5.15.0-1038.42 linux-headers-5.15.0-1038-xilinx-zynqmp - 5.15.0-1038.42 linux-image-5.15.0-1038-xilinx-zynqmp - 5.15.0-1038.42 linux-modules-5.15.0-1038-xilinx-zynqmp - 5.15.0-1038.42 linux-tools-5.15.0-1038-xilinx-zynqmp - 5.15.0-1038.42 linux-xilinx-zynqmp-headers-5.15.0-1038 - 5.15.0-1038.42 linux-xilinx-zynqmp-tools-5.15.0-1038 - 5.15.0-1038.42 linux-xilinx-zynqmp-tools-common - 5.15.0-1038.42 linux-xilinx-zynqmp-tools-host - 5.15.0-1038.42 No subscription required linux-buildinfo-5.15.0-1055-gkeop - 5.15.0-1055.62 linux-cloud-tools-5.15.0-1055-gkeop - 5.15.0-1055.62 linux-gkeop-cloud-tools-5.15.0-1055 - 5.15.0-1055.62 linux-gkeop-headers-5.15.0-1055 - 5.15.0-1055.62 linux-gkeop-tools-5.15.0-1055 - 5.15.0-1055.62 linux-headers-5.15.0-1055-gkeop - 5.15.0-1055.62 linux-image-5.15.0-1055-gkeop - 5.15.0-1055.62 linux-image-unsigned-5.15.0-1055-gkeop - 5.15.0-1055.62 linux-modules-5.15.0-1055-gkeop - 5.15.0-1055.62 linux-modules-extra-5.15.0-1055-gkeop - 5.15.0-1055.62 linux-tools-5.15.0-1055-gkeop - 5.15.0-1055.62 No subscription required linux-buildinfo-5.15.0-1065-ibm - 5.15.0-1065.68 linux-buildinfo-5.15.0-1065-raspi - 5.15.0-1065.68 linux-headers-5.15.0-1065-ibm - 5.15.0-1065.68 linux-headers-5.15.0-1065-raspi - 5.15.0-1065.68 linux-ibm-cloud-tools-common - 5.15.0-1065.68 linux-ibm-headers-5.15.0-1065 - 5.15.0-1065.68 linux-ibm-source-5.15.0 - 5.15.0-1065.68 linux-ibm-tools-5.15.0-1065 - 5.15.0-1065.68 linux-ibm-tools-common - 5.15.0-1065.68 linux-image-5.15.0-1065-ibm - 5.15.0-1065.68 linux-image-5.15.0-1065-raspi - 5.15.0-1065.68 linux-image-unsigned-5.15.0-1065-ibm - 5.15.0-1065.68 linux-modules-5.15.0-1065-ibm - 5.15.0-1065.68 linux-modules-5.15.0-1065-raspi - 5.15.0-1065.68 linux-modules-extra-5.15.0-1065-ibm - 5.15.0-1065.68 linux-modules-extra-5.15.0-1065-raspi - 5.15.0-1065.68 linux-raspi-headers-5.15.0-1065 - 5.15.0-1065.68 linux-raspi-tools-5.15.0-1065 - 5.15.0-1065.68 linux-tools-5.15.0-1065-ibm - 5.15.0-1065.68 linux-tools-5.15.0-1065-raspi - 5.15.0-1065.68 No subscription required linux-buildinfo-5.15.0-1067-nvidia - 5.15.0-1067.68 linux-buildinfo-5.15.0-1067-nvidia-lowlatency - 5.15.0-1067.68 linux-cloud-tools-5.15.0-1067-nvidia - 5.15.0-1067.68 linux-cloud-tools-5.15.0-1067-nvidia-lowlatency - 5.15.0-1067.68 linux-headers-5.15.0-1067-nvidia - 5.15.0-1067.68 linux-headers-5.15.0-1067-nvidia-lowlatency - 5.15.0-1067.68 linux-image-5.15.0-1067-nvidia - 5.15.0-1067.68 linux-image-5.15.0-1067-nvidia-lowlatency - 5.15.0-1067.68 linux-image-unsigned-5.15.0-1067-nvidia - 5.15.0-1067.68 linux-image-unsigned-5.15.0-1067-nvidia-lowlatency - 5.15.0-1067.68 linux-modules-5.15.0-1067-nvidia - 5.15.0-1067.68 linux-modules-5.15.0-1067-nvidia-lowlatency - 5.15.0-1067.68 linux-modules-extra-5.15.0-1067-nvidia - 5.15.0-1067.68 linux-modules-nvidia-fs-5.15.0-1067-nvidia - 5.15.0-1067.68 linux-modules-nvidia-fs-5.15.0-1067-nvidia-lowlatency - 5.15.0-1067.68 linux-nvidia-cloud-tools-5.15.0-1067 - 5.15.0-1067.68 linux-nvidia-cloud-tools-common - 5.15.0-1067.68 linux-nvidia-headers-5.15.0-1067 - 5.15.0-1067.68 linux-nvidia-tools-5.15.0-1067 - 5.15.0-1067.68 linux-nvidia-tools-common - 5.15.0-1067.68 linux-nvidia-tools-host - 5.15.0-1067.68 linux-tools-5.15.0-1067-nvidia - 5.15.0-1067.68 linux-tools-5.15.0-1067-nvidia-lowlatency - 5.15.0-1067.68 No subscription required linux-buildinfo-5.15.0-1069-kvm - 5.15.0-1069.74 linux-headers-5.15.0-1069-kvm - 5.15.0-1069.74 linux-image-5.15.0-1069-kvm - 5.15.0-1069.74 linux-image-unsigned-5.15.0-1069-kvm - 5.15.0-1069.74 linux-kvm-headers-5.15.0-1069 - 5.15.0-1069.74 linux-kvm-tools-5.15.0-1069 - 5.15.0-1069.74 linux-modules-5.15.0-1069-kvm - 5.15.0-1069.74 linux-tools-5.15.0-1069-kvm - 5.15.0-1069.74 No subscription required linux-buildinfo-5.15.0-1069-gke - 5.15.0-1069.75 linux-gke-headers-5.15.0-1069 - 5.15.0-1069.75 linux-gke-tools-5.15.0-1069 - 5.15.0-1069.75 linux-headers-5.15.0-1069-gke - 5.15.0-1069.75 linux-image-5.15.0-1069-gke - 5.15.0-1069.75 linux-image-unsigned-5.15.0-1069-gke - 5.15.0-1069.75 linux-modules-5.15.0-1069-gke - 5.15.0-1069.75 linux-modules-extra-5.15.0-1069-gke - 5.15.0-1069.75 linux-tools-5.15.0-1069-gke - 5.15.0-1069.75 No subscription required linux-buildinfo-5.15.0-1070-oracle - 5.15.0-1070.76 linux-headers-5.15.0-1070-oracle - 5.15.0-1070.76 linux-image-5.15.0-1070-oracle - 5.15.0-1070.76 linux-image-unsigned-5.15.0-1070-oracle - 5.15.0-1070.76 linux-modules-5.15.0-1070-oracle - 5.15.0-1070.76 linux-modules-extra-5.15.0-1070-oracle - 5.15.0-1070.76 linux-oracle-headers-5.15.0-1070 - 5.15.0-1070.76 linux-oracle-tools-5.15.0-1070 - 5.15.0-1070.76 linux-tools-5.15.0-1070-oracle - 5.15.0-1070.76 No subscription required linux-buildinfo-5.15.0-1071-gcp - 5.15.0-1071.79 linux-gcp-headers-5.15.0-1071 - 5.15.0-1071.79 linux-gcp-tools-5.15.0-1071 - 5.15.0-1071.79 linux-headers-5.15.0-1071-gcp - 5.15.0-1071.79 linux-image-5.15.0-1071-gcp - 5.15.0-1071.79 linux-image-unsigned-5.15.0-1071-gcp - 5.15.0-1071.79 linux-modules-5.15.0-1071-gcp - 5.15.0-1071.79 linux-modules-extra-5.15.0-1071-gcp - 5.15.0-1071.79 linux-tools-5.15.0-1071-gcp - 5.15.0-1071.79 No subscription required linux-buildinfo-5.15.0-125-generic - 5.15.0-125.135 linux-buildinfo-5.15.0-125-generic-64k - 5.15.0-125.135 linux-buildinfo-5.15.0-125-generic-lpae - 5.15.0-125.135 linux-buildinfo-5.15.0-125-lowlatency - 5.15.0-125.135 linux-buildinfo-5.15.0-125-lowlatency-64k - 5.15.0-125.135 linux-cloud-tools-5.15.0-125 - 5.15.0-125.135 linux-cloud-tools-5.15.0-125-generic - 5.15.0-125.135 linux-cloud-tools-5.15.0-125-lowlatency - 5.15.0-125.135 linux-cloud-tools-common - 5.15.0-125.135 linux-doc - 5.15.0-125.135 linux-headers-5.15.0-125 - 5.15.0-125.135 linux-headers-5.15.0-125-generic - 5.15.0-125.135 linux-headers-5.15.0-125-generic-64k - 5.15.0-125.135 linux-headers-5.15.0-125-generic-lpae - 5.15.0-125.135 linux-headers-5.15.0-125-lowlatency - 5.15.0-125.135 linux-headers-5.15.0-125-lowlatency-64k - 5.15.0-125.135 linux-image-5.15.0-125-generic - 5.15.0-125.135 linux-image-5.15.0-125-generic-64k - 5.15.0-125.135 linux-image-5.15.0-125-generic-lpae - 5.15.0-125.135 linux-image-5.15.0-125-lowlatency - 5.15.0-125.135 linux-image-5.15.0-125-lowlatency-64k - 5.15.0-125.135 linux-image-unsigned-5.15.0-125-generic - 5.15.0-125.135 linux-image-unsigned-5.15.0-125-generic-64k - 5.15.0-125.135 linux-image-unsigned-5.15.0-125-lowlatency - 5.15.0-125.135 linux-image-unsigned-5.15.0-125-lowlatency-64k - 5.15.0-125.135 linux-libc-dev - 5.15.0-125.135 linux-lowlatency-cloud-tools-5.15.0-125 - 5.15.0-125.135 linux-lowlatency-cloud-tools-common - 5.15.0-125.135 linux-lowlatency-headers-5.15.0-125 - 5.15.0-125.135 linux-lowlatency-tools-5.15.0-125 - 5.15.0-125.135 linux-lowlatency-tools-common - 5.15.0-125.135 linux-lowlatency-tools-host - 5.15.0-125.135 linux-modules-5.15.0-125-generic - 5.15.0-125.135 linux-modules-5.15.0-125-generic-64k - 5.15.0-125.135 linux-modules-5.15.0-125-generic-lpae - 5.15.0-125.135 linux-modules-5.15.0-125-lowlatency - 5.15.0-125.135 linux-modules-5.15.0-125-lowlatency-64k - 5.15.0-125.135 linux-modules-extra-5.15.0-125-generic - 5.15.0-125.135 linux-modules-iwlwifi-5.15.0-125-generic - 5.15.0-125.135 linux-modules-iwlwifi-5.15.0-125-lowlatency - 5.15.0-125.135 linux-source-5.15.0 - 5.15.0-125.135 linux-tools-5.15.0-125 - 5.15.0-125.135 linux-tools-5.15.0-125-generic - 5.15.0-125.135 linux-tools-5.15.0-125-generic-64k - 5.15.0-125.135 linux-tools-5.15.0-125-generic-lpae - 5.15.0-125.135 linux-tools-5.15.0-125-lowlatency - 5.15.0-125.135 linux-tools-5.15.0-125-lowlatency-64k - 5.15.0-125.135 linux-tools-common - 5.15.0-125.135 linux-tools-host - 5.15.0-125.135 No subscription required linux-headers-xilinx-zynqmp - 5.15.0.1038.42 linux-image-xilinx-zynqmp - 5.15.0.1038.42 linux-tools-xilinx-zynqmp - 5.15.0.1038.42 linux-xilinx-zynqmp - 5.15.0.1038.42 No subscription required linux-cloud-tools-gkeop - 5.15.0.1055.54 linux-cloud-tools-gkeop-5.15 - 5.15.0.1055.54 linux-gkeop - 5.15.0.1055.54 linux-gkeop-5.15 - 5.15.0.1055.54 linux-headers-gkeop - 5.15.0.1055.54 linux-headers-gkeop-5.15 - 5.15.0.1055.54 linux-image-gkeop - 5.15.0.1055.54 linux-image-gkeop-5.15 - 5.15.0.1055.54 linux-modules-extra-gkeop - 5.15.0.1055.54 linux-modules-extra-gkeop-5.15 - 5.15.0.1055.54 linux-tools-gkeop - 5.15.0.1055.54 linux-tools-gkeop-5.15 - 5.15.0.1055.54 No subscription required linux-headers-ibm - 5.15.0.1065.61 linux-ibm - 5.15.0.1065.61 linux-image-ibm - 5.15.0.1065.61 linux-tools-ibm - 5.15.0.1065.61 No subscription required linux-headers-raspi - 5.15.0.1065.63 linux-headers-raspi-nolpae - 5.15.0.1065.63 linux-image-raspi - 5.15.0.1065.63 linux-image-raspi-nolpae - 5.15.0.1065.63 linux-modules-extra-raspi - 5.15.0.1065.63 linux-modules-extra-raspi-nolpae - 5.15.0.1065.63 linux-raspi - 5.15.0.1065.63 linux-raspi-nolpae - 5.15.0.1065.63 linux-tools-raspi - 5.15.0.1065.63 linux-tools-raspi-nolpae - 5.15.0.1065.63 No subscription required linux-cloud-tools-nvidia - 5.15.0.1067.67 linux-cloud-tools-nvidia-lowlatency - 5.15.0.1067.67 linux-headers-nvidia - 5.15.0.1067.67 linux-headers-nvidia-lowlatency - 5.15.0.1067.67 linux-image-nvidia - 5.15.0.1067.67 linux-image-nvidia-lowlatency - 5.15.0.1067.67 linux-nvidia - 5.15.0.1067.67 linux-nvidia-lowlatency - 5.15.0.1067.67 linux-tools-nvidia - 5.15.0.1067.67 linux-tools-nvidia-lowlatency - 5.15.0.1067.67 No subscription required linux-headers-kvm - 5.15.0.1069.65 linux-image-kvm - 5.15.0.1069.65 linux-kvm - 5.15.0.1069.65 linux-tools-kvm - 5.15.0.1069.65 No subscription required linux-gke - 5.15.0.1069.68 linux-gke-5.15 - 5.15.0.1069.68 linux-headers-gke - 5.15.0.1069.68 linux-headers-gke-5.15 - 5.15.0.1069.68 linux-image-gke - 5.15.0.1069.68 linux-image-gke-5.15 - 5.15.0.1069.68 linux-tools-gke - 5.15.0.1069.68 linux-tools-gke-5.15 - 5.15.0.1069.68 No subscription required linux-headers-oracle-lts-22.04 - 5.15.0.1070.66 linux-image-oracle-lts-22.04 - 5.15.0.1070.66 linux-oracle-lts-22.04 - 5.15.0.1070.66 linux-tools-oracle-lts-22.04 - 5.15.0.1070.66 No subscription required linux-gcp-lts-22.04 - 5.15.0.1071.67 linux-headers-gcp-lts-22.04 - 5.15.0.1071.67 linux-image-gcp-lts-22.04 - 5.15.0.1071.67 linux-modules-extra-gcp-lts-22.04 - 5.15.0.1071.67 linux-tools-gcp-lts-22.04 - 5.15.0.1071.67 No subscription required linux-cloud-tools-lowlatency - 5.15.0.125.113 linux-cloud-tools-lowlatency-hwe-20.04 - 5.15.0.125.113 linux-cloud-tools-lowlatency-hwe-20.04-edge - 5.15.0.125.113 linux-headers-lowlatency - 5.15.0.125.113 linux-headers-lowlatency-64k - 5.15.0.125.113 linux-headers-lowlatency-64k-hwe-20.04 - 5.15.0.125.113 linux-headers-lowlatency-64k-hwe-20.04-edge - 5.15.0.125.113 linux-headers-lowlatency-hwe-20.04 - 5.15.0.125.113 linux-headers-lowlatency-hwe-20.04-edge - 5.15.0.125.113 linux-image-lowlatency - 5.15.0.125.113 linux-image-lowlatency-64k - 5.15.0.125.113 linux-image-lowlatency-64k-hwe-20.04 - 5.15.0.125.113 linux-image-lowlatency-64k-hwe-20.04-edge - 5.15.0.125.113 linux-image-lowlatency-hwe-20.04 - 5.15.0.125.113 linux-image-lowlatency-hwe-20.04-edge - 5.15.0.125.113 linux-lowlatency - 5.15.0.125.113 linux-lowlatency-64k - 5.15.0.125.113 linux-lowlatency-64k-hwe-20.04 - 5.15.0.125.113 linux-lowlatency-64k-hwe-20.04-edge - 5.15.0.125.113 linux-lowlatency-hwe-20.04 - 5.15.0.125.113 linux-lowlatency-hwe-20.04-edge - 5.15.0.125.113 linux-tools-lowlatency - 5.15.0.125.113 linux-tools-lowlatency-64k - 5.15.0.125.113 linux-tools-lowlatency-64k-hwe-20.04 - 5.15.0.125.113 linux-tools-lowlatency-64k-hwe-20.04-edge - 5.15.0.125.113 linux-tools-lowlatency-hwe-20.04 - 5.15.0.125.113 linux-tools-lowlatency-hwe-20.04-edge - 5.15.0.125.113 No subscription required linux-cloud-tools-generic - 5.15.0.125.124 linux-cloud-tools-generic-hwe-20.04 - 5.15.0.125.124 linux-cloud-tools-generic-hwe-20.04-edge - 5.15.0.125.124 linux-cloud-tools-virtual - 5.15.0.125.124 linux-cloud-tools-virtual-hwe-20.04 - 5.15.0.125.124 linux-cloud-tools-virtual-hwe-20.04-edge - 5.15.0.125.124 linux-crashdump - 5.15.0.125.124 linux-generic - 5.15.0.125.124 linux-generic-64k - 5.15.0.125.124 linux-generic-64k-hwe-20.04 - 5.15.0.125.124 linux-generic-64k-hwe-20.04-edge - 5.15.0.125.124 linux-generic-hwe-20.04 - 5.15.0.125.124 linux-generic-hwe-20.04-edge - 5.15.0.125.124 linux-generic-lpae - 5.15.0.125.124 linux-generic-lpae-hwe-20.04 - 5.15.0.125.124 linux-generic-lpae-hwe-20.04-edge - 5.15.0.125.124 linux-headers-generic - 5.15.0.125.124 linux-headers-generic-64k - 5.15.0.125.124 linux-headers-generic-64k-hwe-20.04 - 5.15.0.125.124 linux-headers-generic-64k-hwe-20.04-edge - 5.15.0.125.124 linux-headers-generic-hwe-20.04 - 5.15.0.125.124 linux-headers-generic-hwe-20.04-edge - 5.15.0.125.124 linux-headers-generic-lpae - 5.15.0.125.124 linux-headers-generic-lpae-hwe-20.04 - 5.15.0.125.124 linux-headers-generic-lpae-hwe-20.04-edge - 5.15.0.125.124 linux-headers-oem-20.04 - 5.15.0.125.124 linux-headers-virtual - 5.15.0.125.124 linux-headers-virtual-hwe-20.04 - 5.15.0.125.124 linux-headers-virtual-hwe-20.04-edge - 5.15.0.125.124 linux-image-extra-virtual - 5.15.0.125.124 linux-image-extra-virtual-hwe-20.04 - 5.15.0.125.124 linux-image-extra-virtual-hwe-20.04-edge - 5.15.0.125.124 linux-image-generic - 5.15.0.125.124 linux-image-generic-64k - 5.15.0.125.124 linux-image-generic-64k-hwe-20.04 - 5.15.0.125.124 linux-image-generic-64k-hwe-20.04-edge - 5.15.0.125.124 linux-image-generic-hwe-20.04 - 5.15.0.125.124 linux-image-generic-hwe-20.04-edge - 5.15.0.125.124 linux-image-generic-lpae - 5.15.0.125.124 linux-image-generic-lpae-hwe-20.04 - 5.15.0.125.124 linux-image-generic-lpae-hwe-20.04-edge - 5.15.0.125.124 linux-image-oem-20.04 - 5.15.0.125.124 linux-image-virtual - 5.15.0.125.124 linux-image-virtual-hwe-20.04 - 5.15.0.125.124 linux-image-virtual-hwe-20.04-edge - 5.15.0.125.124 linux-modules-iwlwifi-generic - 5.15.0.125.124 linux-oem-20.04 - 5.15.0.125.124 linux-source - 5.15.0.125.124 linux-tools-generic - 5.15.0.125.124 linux-tools-generic-64k - 5.15.0.125.124 linux-tools-generic-64k-hwe-20.04 - 5.15.0.125.124 linux-tools-generic-64k-hwe-20.04-edge - 5.15.0.125.124 linux-tools-generic-hwe-20.04 - 5.15.0.125.124 linux-tools-generic-hwe-20.04-edge - 5.15.0.125.124 linux-tools-generic-lpae - 5.15.0.125.124 linux-tools-generic-lpae-hwe-20.04 - 5.15.0.125.124 linux-tools-generic-lpae-hwe-20.04-edge - 5.15.0.125.124 linux-tools-oem-20.04 - 5.15.0.125.124 linux-tools-virtual - 5.15.0.125.124 linux-tools-virtual-hwe-20.04 - 5.15.0.125.124 linux-tools-virtual-hwe-20.04-edge - 5.15.0.125.124 linux-virtual - 5.15.0.125.124 linux-virtual-hwe-20.04 - 5.15.0.125.124 linux-virtual-hwe-20.04-edge - 5.15.0.125.124 No subscription required
CVEs:
- https://ubuntu.com/security/CVE-2022-48666
- https://ubuntu.com/security/CVE-2023-52889
- https://ubuntu.com/security/CVE-2023-52918
- https://ubuntu.com/security/CVE-2024-25744
- https://ubuntu.com/security/CVE-2024-26607
- https://ubuntu.com/security/CVE-2024-26661
- https://ubuntu.com/security/CVE-2024-26669
- https://ubuntu.com/security/CVE-2024-26800
- https://ubuntu.com/security/CVE-2024-26893
- https://ubuntu.com/security/CVE-2024-36484
- https://ubuntu.com/security/CVE-2024-38577
- https://ubuntu.com/security/CVE-2024-38602
- https://ubuntu.com/security/CVE-2024-38611
- https://ubuntu.com/security/CVE-2024-39472
- https://ubuntu.com/security/CVE-2024-40915
- https://ubuntu.com/security/CVE-2024-41011
- https://ubuntu.com/security/CVE-2024-41012
- https://ubuntu.com/security/CVE-2024-41015
- https://ubuntu.com/security/CVE-2024-41017
- https://ubuntu.com/security/CVE-2024-41019
- https://ubuntu.com/security/CVE-2024-41020
- https://ubuntu.com/security/CVE-2024-41022
- https://ubuntu.com/security/CVE-2024-41042
- https://ubuntu.com/security/CVE-2024-41059
- https://ubuntu.com/security/CVE-2024-41060
- https://ubuntu.com/security/CVE-2024-41063
- https://ubuntu.com/security/CVE-2024-41064
- https://ubuntu.com/security/CVE-2024-41065
- https://ubuntu.com/security/CVE-2024-41068
- https://ubuntu.com/security/CVE-2024-41070
- https://ubuntu.com/security/CVE-2024-41071
- https://ubuntu.com/security/CVE-2024-41072
- https://ubuntu.com/security/CVE-2024-41073
- https://ubuntu.com/security/CVE-2024-41077
- https://ubuntu.com/security/CVE-2024-41078
- https://ubuntu.com/security/CVE-2024-41081
- https://ubuntu.com/security/CVE-2024-41090
- https://ubuntu.com/security/CVE-2024-41091
- https://ubuntu.com/security/CVE-2024-41098
- https://ubuntu.com/security/CVE-2024-42114
- https://ubuntu.com/security/CVE-2024-42126
- https://ubuntu.com/security/CVE-2024-42246
- https://ubuntu.com/security/CVE-2024-42259
- https://ubuntu.com/security/CVE-2024-42265
- https://ubuntu.com/security/CVE-2024-42267
- https://ubuntu.com/security/CVE-2024-42269
- https://ubuntu.com/security/CVE-2024-42270
- https://ubuntu.com/security/CVE-2024-42271
- https://ubuntu.com/security/CVE-2024-42272
- https://ubuntu.com/security/CVE-2024-42274
- https://ubuntu.com/security/CVE-2024-42276
- https://ubuntu.com/security/CVE-2024-42277
- https://ubuntu.com/security/CVE-2024-42280
- https://ubuntu.com/security/CVE-2024-42281
- https://ubuntu.com/security/CVE-2024-42283
- https://ubuntu.com/security/CVE-2024-42284
- https://ubuntu.com/security/CVE-2024-42285
- https://ubuntu.com/security/CVE-2024-42286
- https://ubuntu.com/security/CVE-2024-42287
- https://ubuntu.com/security/CVE-2024-42288
- https://ubuntu.com/security/CVE-2024-42289
- https://ubuntu.com/security/CVE-2024-42290
- https://ubuntu.com/security/CVE-2024-42292
- https://ubuntu.com/security/CVE-2024-42295
- https://ubuntu.com/security/CVE-2024-42296
- https://ubuntu.com/security/CVE-2024-42297
- https://ubuntu.com/security/CVE-2024-42299
- https://ubuntu.com/security/CVE-2024-42301
- https://ubuntu.com/security/CVE-2024-42302
- https://ubuntu.com/security/CVE-2024-42304
- https://ubuntu.com/security/CVE-2024-42305
- https://ubuntu.com/security/CVE-2024-42306
- https://ubuntu.com/security/CVE-2024-42309
- https://ubuntu.com/security/CVE-2024-42310
- https://ubuntu.com/security/CVE-2024-42311
- https://ubuntu.com/security/CVE-2024-42312
- https://ubuntu.com/security/CVE-2024-42313
- https://ubuntu.com/security/CVE-2024-42318
- https://ubuntu.com/security/CVE-2024-43817
- https://ubuntu.com/security/CVE-2024-43828
- https://ubuntu.com/security/CVE-2024-43829
- https://ubuntu.com/security/CVE-2024-43830
- https://ubuntu.com/security/CVE-2024-43834
- https://ubuntu.com/security/CVE-2024-43835
- https://ubuntu.com/security/CVE-2024-43839
- https://ubuntu.com/security/CVE-2024-43841
- https://ubuntu.com/security/CVE-2024-43846
- https://ubuntu.com/security/CVE-2024-43849
- https://ubuntu.com/security/CVE-2024-43853
- https://ubuntu.com/security/CVE-2024-43854
- https://ubuntu.com/security/CVE-2024-43856
- https://ubuntu.com/security/CVE-2024-43858
- https://ubuntu.com/security/CVE-2024-43860
- https://ubuntu.com/security/CVE-2024-43861
- https://ubuntu.com/security/CVE-2024-43863
- https://ubuntu.com/security/CVE-2024-43867
- https://ubuntu.com/security/CVE-2024-43869
- https://ubuntu.com/security/CVE-2024-43870
- https://ubuntu.com/security/CVE-2024-43871
- https://ubuntu.com/security/CVE-2024-43873
- https://ubuntu.com/security/CVE-2024-43875
- https://ubuntu.com/security/CVE-2024-43879
- https://ubuntu.com/security/CVE-2024-43880
- https://ubuntu.com/security/CVE-2024-43882
- https://ubuntu.com/security/CVE-2024-43883
- https://ubuntu.com/security/CVE-2024-43884
- https://ubuntu.com/security/CVE-2024-43889
- https://ubuntu.com/security/CVE-2024-43890
- https://ubuntu.com/security/CVE-2024-43892
- https://ubuntu.com/security/CVE-2024-43893
- https://ubuntu.com/security/CVE-2024-43894
- https://ubuntu.com/security/CVE-2024-43902
- https://ubuntu.com/security/CVE-2024-43905
- https://ubuntu.com/security/CVE-2024-43907
- https://ubuntu.com/security/CVE-2024-43908
- https://ubuntu.com/security/CVE-2024-43909
- https://ubuntu.com/security/CVE-2024-43914
- https://ubuntu.com/security/CVE-2024-44934
- https://ubuntu.com/security/CVE-2024-44935
- https://ubuntu.com/security/CVE-2024-44944
- https://ubuntu.com/security/CVE-2024-44946
- https://ubuntu.com/security/CVE-2024-44947
- https://ubuntu.com/security/CVE-2024-44948
- https://ubuntu.com/security/CVE-2024-44952
- https://ubuntu.com/security/CVE-2024-44954
- https://ubuntu.com/security/CVE-2024-44958
- https://ubuntu.com/security/CVE-2024-44960
- https://ubuntu.com/security/CVE-2024-44965
- https://ubuntu.com/security/CVE-2024-44966
- https://ubuntu.com/security/CVE-2024-44969
- https://ubuntu.com/security/CVE-2024-44971
- https://ubuntu.com/security/CVE-2024-44974
- https://ubuntu.com/security/CVE-2024-44982
- https://ubuntu.com/security/CVE-2024-44983
- https://ubuntu.com/security/CVE-2024-44985
- https://ubuntu.com/security/CVE-2024-44986
- https://ubuntu.com/security/CVE-2024-44987
- https://ubuntu.com/security/CVE-2024-44988
- https://ubuntu.com/security/CVE-2024-44989
- https://ubuntu.com/security/CVE-2024-44990
- https://ubuntu.com/security/CVE-2024-44995
- https://ubuntu.com/security/CVE-2024-44998
- https://ubuntu.com/security/CVE-2024-44999
- https://ubuntu.com/security/CVE-2024-45003
- https://ubuntu.com/security/CVE-2024-45006
- https://ubuntu.com/security/CVE-2024-45007
- https://ubuntu.com/security/CVE-2024-45008
- https://ubuntu.com/security/CVE-2024-45009
- https://ubuntu.com/security/CVE-2024-45011
- https://ubuntu.com/security/CVE-2024-45018
- https://ubuntu.com/security/CVE-2024-45021
- https://ubuntu.com/security/CVE-2024-45025
- https://ubuntu.com/security/CVE-2024-45026
- https://ubuntu.com/security/CVE-2024-45028
- https://ubuntu.com/security/CVE-2024-46673
- https://ubuntu.com/security/CVE-2024-46675
- https://ubuntu.com/security/CVE-2024-46676
- https://ubuntu.com/security/CVE-2024-46677
- https://ubuntu.com/security/CVE-2024-46679
- https://ubuntu.com/security/CVE-2024-46685
- https://ubuntu.com/security/CVE-2024-46689
- https://ubuntu.com/security/CVE-2024-46702
- https://ubuntu.com/security/CVE-2024-46707
- https://ubuntu.com/security/CVE-2024-46713
- https://ubuntu.com/security/CVE-2024-46714
- https://ubuntu.com/security/CVE-2024-46719
- https://ubuntu.com/security/CVE-2024-46721
- https://ubuntu.com/security/CVE-2024-46722
- https://ubuntu.com/security/CVE-2024-46723
- https://ubuntu.com/security/CVE-2024-46724
- https://ubuntu.com/security/CVE-2024-46725
- https://ubuntu.com/security/CVE-2024-46731
- https://ubuntu.com/security/CVE-2024-46732
- https://ubuntu.com/security/CVE-2024-46737
- https://ubuntu.com/security/CVE-2024-46738
- https://ubuntu.com/security/CVE-2024-46739
- https://ubuntu.com/security/CVE-2024-46740
- https://ubuntu.com/security/CVE-2024-46743
- https://ubuntu.com/security/CVE-2024-46744
- https://ubuntu.com/security/CVE-2024-46745
- https://ubuntu.com/security/CVE-2024-46746
- https://ubuntu.com/security/CVE-2024-46747
- https://ubuntu.com/security/CVE-2024-46750
- https://ubuntu.com/security/CVE-2024-46752
- https://ubuntu.com/security/CVE-2024-46755
- https://ubuntu.com/security/CVE-2024-46756
- https://ubuntu.com/security/CVE-2024-46757
- https://ubuntu.com/security/CVE-2024-46758
- https://ubuntu.com/security/CVE-2024-46759
- https://ubuntu.com/security/CVE-2024-46761
- https://ubuntu.com/security/CVE-2024-46763
- https://ubuntu.com/security/CVE-2024-46771
- https://ubuntu.com/security/CVE-2024-46777
- https://ubuntu.com/security/CVE-2024-46780
- https://ubuntu.com/security/CVE-2024-46781
- https://ubuntu.com/security/CVE-2024-46782
- https://ubuntu.com/security/CVE-2024-46783
- https://ubuntu.com/security/CVE-2024-46791
- https://ubuntu.com/security/CVE-2024-46795
- https://ubuntu.com/security/CVE-2024-46798
- https://ubuntu.com/security/CVE-2024-46800
- https://ubuntu.com/security/CVE-2024-46804
- https://ubuntu.com/security/CVE-2024-46805
- https://ubuntu.com/security/CVE-2024-46807
- https://ubuntu.com/security/CVE-2024-46810
- https://ubuntu.com/security/CVE-2024-46814
- https://ubuntu.com/security/CVE-2024-46815
- https://ubuntu.com/security/CVE-2024-46817
- https://ubuntu.com/security/CVE-2024-46818
- https://ubuntu.com/security/CVE-2024-46819
- https://ubuntu.com/security/CVE-2024-46822
- https://ubuntu.com/security/CVE-2024-46828
- https://ubuntu.com/security/CVE-2024-46829
- https://ubuntu.com/security/CVE-2024-46832
- https://ubuntu.com/security/CVE-2024-46840
- https://ubuntu.com/security/CVE-2024-46844
- https://ubuntu.com/security/CVE-2024-47659
- https://ubuntu.com/security/CVE-2024-47660
- https://ubuntu.com/security/CVE-2024-47663
- https://ubuntu.com/security/CVE-2024-47665
- https://ubuntu.com/security/CVE-2024-47667
- https://ubuntu.com/security/CVE-2024-47668
- https://ubuntu.com/security/CVE-2024-47669
Title: USN-7100-2 -- Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7100-2
Priorities: high,low,medium
Description:
Supraja Sridhara, Benedict Schlüter, Mark Kuhne, Andrin Bertschi, and Shweta Shinde discovered that the Confidential Computing framework in the Linux kernel for x86 platforms did not properly handle 32-bit emulation on TDX and SEV. An attacker with access to the VMM could use this to cause a denial of service (guest crash) or possibly execute arbitrary code. (CVE-2024-25744) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PowerPC architecture; - RISC-V architecture; - User-Mode Linux (UML); - x86 architecture; - Block layer subsystem; - Android drivers; - Serial ATA and Parallel ATA drivers; - ATM drivers; - Drivers core; - Null block device driver; - Character device driver; - ARM SCMI message protocol; - GPU drivers; - HID subsystem; - Hardware monitoring drivers; - I3C subsystem; - InfiniBand drivers; - Input Device core drivers; - Input Device (Miscellaneous) drivers; - IOMMU subsystem; - IRQ chip drivers; - ISDN/mISDN subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - VMware VMCI Driver; - MMC subsystem; - Network drivers; - Near Field Communication (NFC) drivers; - NVME drivers; - Device tree and open firmware driver; - Parport drivers; - PCI subsystem; - Pin controllers subsystem; - Remote Processor subsystem; - S/390 drivers; - SCSI drivers; - QCOM SoC drivers; - Direct Digital Synthesis drivers; - Thunderbolt and USB4 drivers; - TTY drivers; - Userspace I/O drivers; - DesignWare USB3 driver; - USB Gadget drivers; - USB Host Controller drivers; - USB Type-C Connector System Software Interface driver; - USB over IP driver; - VHOST drivers; - File systems infrastructure; - BTRFS file system; - Ext4 file system; - F2FS file system; - JFS file system; - NILFS2 file system; - NTFS3 file system; - Proc file system; - SMB network file system; - Core kernel; - DMA mapping infrastructure; - RCU subsystem; - Tracing infrastructure; - Radix Tree data structure library; - Kernel userspace event delivery library; - Objagg library; - Memory management; - Amateur Radio drivers; - Bluetooth subsystem; - Ethernet bridge; - CAN network layer; - Networking core; - Ethtool driver; - IPv4 networking; - IPv6 networking; - IUCV driver; - KCM (Kernel Connection Multiplexor) sockets driver; - MAC80211 subsystem; - Multipath TCP; - Netfilter; - Network traffic control; - SCTP protocol; - Sun RPC protocol; - TIPC protocol; - TLS protocol; - Wireless networking; - AppArmor security module; - Landlock security; - Simplified Mandatory Access Control Kernel framework; - FireWire sound drivers; - SoC audio core drivers; - USB sound devices; (CVE-2024-42288, CVE-2024-41098, CVE-2024-43849, CVE-2024-46689, CVE-2024-44987, CVE-2024-40915, CVE-2024-46844, CVE-2024-45009, CVE-2024-46780, CVE-2024-41081, CVE-2024-43817, CVE-2024-44965, CVE-2024-46832, CVE-2024-41072, CVE-2024-45011, CVE-2024-46814, CVE-2024-45026, CVE-2024-44982, CVE-2024-46723, CVE-2024-46771, CVE-2024-46759, CVE-2024-41063, CVE-2024-46673, CVE-2023-52889, CVE-2024-41020, CVE-2024-46677, CVE-2024-46798, CVE-2024-45021, CVE-2024-46676, CVE-2024-47668, CVE-2024-42289, CVE-2024-45018, CVE-2024-46724, CVE-2024-41090, CVE-2024-43853, CVE-2024-42272, CVE-2024-43828, CVE-2024-42292, CVE-2024-26800, CVE-2024-43871, CVE-2024-46758, CVE-2024-36484, CVE-2024-46755, CVE-2024-46782, CVE-2024-43889, CVE-2024-46763, CVE-2024-41015, CVE-2024-43858, CVE-2024-41012, CVE-2024-44960, CVE-2024-46747, CVE-2024-42311, CVE-2024-47660, CVE-2024-42267, CVE-2024-44998, CVE-2024-43839, CVE-2024-43914, CVE-2024-46783, CVE-2024-47659, CVE-2024-46725, CVE-2024-46840, CVE-2024-43873, CVE-2024-46737, CVE-2024-44946, CVE-2024-43841, CVE-2024-26669, CVE-2024-42306, CVE-2024-26661, CVE-2024-42259, CVE-2024-41011, CVE-2024-46822, CVE-2024-42287, CVE-2024-46746, CVE-2024-43860, CVE-2024-42246, CVE-2024-46800, CVE-2024-45007, CVE-2024-42296, CVE-2024-47669, CVE-2024-44983, CVE-2024-43880, CVE-2024-42284, CVE-2022-48666, CVE-2024-44990, CVE-2024-43894, CVE-2024-44989, CVE-2023-52918, CVE-2024-42295, CVE-2024-43869, CVE-2024-42277, CVE-2024-46818, CVE-2024-42270, CVE-2024-45025, CVE-2024-42301, CVE-2024-43883, CVE-2024-46714, CVE-2024-46815, CVE-2024-41073, CVE-2024-43905, CVE-2024-43882, CVE-2024-46719, CVE-2024-42286, CVE-2024-44952, CVE-2024-42297, CVE-2024-41022, CVE-2024-46743, CVE-2024-43829, CVE-2024-43909, CVE-2024-42265, CVE-2024-44944, CVE-2024-46807, CVE-2024-46739, CVE-2024-43867, CVE-2024-44958, CVE-2024-44969, CVE-2024-42271, CVE-2024-46745, CVE-2024-42299, CVE-2024-45006, CVE-2024-43908, CVE-2024-44966, CVE-2024-41065, CVE-2024-46777, CVE-2024-42309, CVE-2024-38602, CVE-2024-44947, CVE-2024-43884, CVE-2024-43902, CVE-2024-47667, CVE-2024-46750, CVE-2024-41070, CVE-2024-26893, CVE-2024-41017, CVE-2024-46810, CVE-2024-46828, CVE-2024-43893, CVE-2024-41077, CVE-2024-46756, CVE-2024-46740, CVE-2024-42269, CVE-2024-43890, CVE-2024-45008, CVE-2024-46795, CVE-2024-43854, CVE-2024-46713, CVE-2024-47663, CVE-2024-46702, CVE-2024-46781, CVE-2024-46722, CVE-2024-42114, CVE-2024-44948, CVE-2024-44988, CVE-2024-42302, CVE-2024-41019, CVE-2024-46731, CVE-2024-46819, CVE-2024-44995, CVE-2024-41059, CVE-2024-43856, CVE-2024-44954, CVE-2024-43863, CVE-2024-38577, CVE-2024-43870, CVE-2024-41068, CVE-2024-41071, CVE-2024-38611, CVE-2024-46761, CVE-2024-42304, CVE-2024-42310, CVE-2024-46707, CVE-2024-42290, CVE-2024-42276, CVE-2024-44935, CVE-2024-46721, CVE-2024-46817, CVE-2024-46791, CVE-2024-44934, CVE-2024-45028, CVE-2024-46757, CVE-2024-43879, CVE-2024-43907, CVE-2024-43846, CVE-2024-42280, CVE-2024-44999, CVE-2024-43861, CVE-2024-42126, CVE-2024-26607, CVE-2024-46752, CVE-2024-42305, CVE-2024-43835, CVE-2024-41042, CVE-2024-46675, CVE-2024-46804, CVE-2024-41091, CVE-2024-41060, CVE-2024-46744, CVE-2024-47665, CVE-2024-39472, CVE-2024-46829, CVE-2024-42285, CVE-2024-42281, CVE-2024-43830, CVE-2024-42274, CVE-2024-46679, CVE-2024-44985, CVE-2024-46805, CVE-2024-42312, CVE-2024-42283, CVE-2024-45003, CVE-2024-44971, CVE-2024-42313, CVE-2024-46685, CVE-2024-46738, CVE-2024-44986, CVE-2024-43834, CVE-2024-46732, CVE-2024-43875, CVE-2024-42318, CVE-2024-41064, CVE-2024-44974, CVE-2024-43892, CVE-2024-41078) Update Instructions: Run sudo pro fix USN-7100-2
to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-aws-cloud-tools-5.15.0-1072 - 5.15.0-1072.78 linux-aws-headers-5.15.0-1072 - 5.15.0-1072.78 linux-aws-tools-5.15.0-1072 - 5.15.0-1072.78 linux-buildinfo-5.15.0-1072-aws - 5.15.0-1072.78 linux-cloud-tools-5.15.0-1072-aws - 5.15.0-1072.78 linux-headers-5.15.0-1072-aws - 5.15.0-1072.78 linux-image-5.15.0-1072-aws - 5.15.0-1072.78 linux-image-unsigned-5.15.0-1072-aws - 5.15.0-1072.78 linux-modules-5.15.0-1072-aws - 5.15.0-1072.78 linux-modules-extra-5.15.0-1072-aws - 5.15.0-1072.78 linux-tools-5.15.0-1072-aws - 5.15.0-1072.78 No subscription required linux-aws-lts-22.04 - 5.15.0.1072.72 linux-headers-aws-lts-22.04 - 5.15.0.1072.72 linux-image-aws-lts-22.04 - 5.15.0.1072.72 linux-modules-extra-aws-lts-22.04 - 5.15.0.1072.72 linux-tools-aws-lts-22.04 - 5.15.0.1072.72 No subscription required
CVEs:
- https://ubuntu.com/security/CVE-2022-48666
- https://ubuntu.com/security/CVE-2023-52889
- https://ubuntu.com/security/CVE-2023-52918
- https://ubuntu.com/security/CVE-2024-25744
- https://ubuntu.com/security/CVE-2024-26607
- https://ubuntu.com/security/CVE-2024-26661
- https://ubuntu.com/security/CVE-2024-26669
- https://ubuntu.com/security/CVE-2024-26800
- https://ubuntu.com/security/CVE-2024-26893
- https://ubuntu.com/security/CVE-2024-36484
- https://ubuntu.com/security/CVE-2024-38577
- https://ubuntu.com/security/CVE-2024-38602
- https://ubuntu.com/security/CVE-2024-38611
- https://ubuntu.com/security/CVE-2024-39472
- https://ubuntu.com/security/CVE-2024-40915
- https://ubuntu.com/security/CVE-2024-41011
- https://ubuntu.com/security/CVE-2024-41012
- https://ubuntu.com/security/CVE-2024-41015
- https://ubuntu.com/security/CVE-2024-41017
- https://ubuntu.com/security/CVE-2024-41019
- https://ubuntu.com/security/CVE-2024-41020
- https://ubuntu.com/security/CVE-2024-41022
- https://ubuntu.com/security/CVE-2024-41042
- https://ubuntu.com/security/CVE-2024-41059
- https://ubuntu.com/security/CVE-2024-41060
- https://ubuntu.com/security/CVE-2024-41063
- https://ubuntu.com/security/CVE-2024-41064
- https://ubuntu.com/security/CVE-2024-41065
- https://ubuntu.com/security/CVE-2024-41068
- https://ubuntu.com/security/CVE-2024-41070
- https://ubuntu.com/security/CVE-2024-41071
- https://ubuntu.com/security/CVE-2024-41072
- https://ubuntu.com/security/CVE-2024-41073
- https://ubuntu.com/security/CVE-2024-41077
- https://ubuntu.com/security/CVE-2024-41078
- https://ubuntu.com/security/CVE-2024-41081
- https://ubuntu.com/security/CVE-2024-41090
- https://ubuntu.com/security/CVE-2024-41091
- https://ubuntu.com/security/CVE-2024-41098
- https://ubuntu.com/security/CVE-2024-42114
- https://ubuntu.com/security/CVE-2024-42126
- https://ubuntu.com/security/CVE-2024-42246
- https://ubuntu.com/security/CVE-2024-42259
- https://ubuntu.com/security/CVE-2024-42265
- https://ubuntu.com/security/CVE-2024-42267
- https://ubuntu.com/security/CVE-2024-42269
- https://ubuntu.com/security/CVE-2024-42270
- https://ubuntu.com/security/CVE-2024-42271
- https://ubuntu.com/security/CVE-2024-42272
- https://ubuntu.com/security/CVE-2024-42274
- https://ubuntu.com/security/CVE-2024-42276
- https://ubuntu.com/security/CVE-2024-42277
- https://ubuntu.com/security/CVE-2024-42280
- https://ubuntu.com/security/CVE-2024-42281
- https://ubuntu.com/security/CVE-2024-42283
- https://ubuntu.com/security/CVE-2024-42284
- https://ubuntu.com/security/CVE-2024-42285
- https://ubuntu.com/security/CVE-2024-42286
- https://ubuntu.com/security/CVE-2024-42287
- https://ubuntu.com/security/CVE-2024-42288
- https://ubuntu.com/security/CVE-2024-42289
- https://ubuntu.com/security/CVE-2024-42290
- https://ubuntu.com/security/CVE-2024-42292
- https://ubuntu.com/security/CVE-2024-42295
- https://ubuntu.com/security/CVE-2024-42296
- https://ubuntu.com/security/CVE-2024-42297
- https://ubuntu.com/security/CVE-2024-42299
- https://ubuntu.com/security/CVE-2024-42301
- https://ubuntu.com/security/CVE-2024-42302
- https://ubuntu.com/security/CVE-2024-42304
- https://ubuntu.com/security/CVE-2024-42305
- https://ubuntu.com/security/CVE-2024-42306
- https://ubuntu.com/security/CVE-2024-42309
- https://ubuntu.com/security/CVE-2024-42310
- https://ubuntu.com/security/CVE-2024-42311
- https://ubuntu.com/security/CVE-2024-42312
- https://ubuntu.com/security/CVE-2024-42313
- https://ubuntu.com/security/CVE-2024-42318
- https://ubuntu.com/security/CVE-2024-43817
- https://ubuntu.com/security/CVE-2024-43828
- https://ubuntu.com/security/CVE-2024-43829
- https://ubuntu.com/security/CVE-2024-43830
- https://ubuntu.com/security/CVE-2024-43834
- https://ubuntu.com/security/CVE-2024-43835
- https://ubuntu.com/security/CVE-2024-43839
- https://ubuntu.com/security/CVE-2024-43841
- https://ubuntu.com/security/CVE-2024-43846
- https://ubuntu.com/security/CVE-2024-43849
- https://ubuntu.com/security/CVE-2024-43853
- https://ubuntu.com/security/CVE-2024-43854
- https://ubuntu.com/security/CVE-2024-43856
- https://ubuntu.com/security/CVE-2024-43858
- https://ubuntu.com/security/CVE-2024-43860
- https://ubuntu.com/security/CVE-2024-43861
- https://ubuntu.com/security/CVE-2024-43863
- https://ubuntu.com/security/CVE-2024-43867
- https://ubuntu.com/security/CVE-2024-43869
- https://ubuntu.com/security/CVE-2024-43870
- https://ubuntu.com/security/CVE-2024-43871
- https://ubuntu.com/security/CVE-2024-43873
- https://ubuntu.com/security/CVE-2024-43875
- https://ubuntu.com/security/CVE-2024-43879
- https://ubuntu.com/security/CVE-2024-43880
- https://ubuntu.com/security/CVE-2024-43882
- https://ubuntu.com/security/CVE-2024-43883
- https://ubuntu.com/security/CVE-2024-43884
- https://ubuntu.com/security/CVE-2024-43889
- https://ubuntu.com/security/CVE-2024-43890
- https://ubuntu.com/security/CVE-2024-43892
- https://ubuntu.com/security/CVE-2024-43893
- https://ubuntu.com/security/CVE-2024-43894
- https://ubuntu.com/security/CVE-2024-43902
- https://ubuntu.com/security/CVE-2024-43905
- https://ubuntu.com/security/CVE-2024-43907
- https://ubuntu.com/security/CVE-2024-43908
- https://ubuntu.com/security/CVE-2024-43909
- https://ubuntu.com/security/CVE-2024-43914
- https://ubuntu.com/security/CVE-2024-44934
- https://ubuntu.com/security/CVE-2024-44935
- https://ubuntu.com/security/CVE-2024-44944
- https://ubuntu.com/security/CVE-2024-44946
- https://ubuntu.com/security/CVE-2024-44947
- https://ubuntu.com/security/CVE-2024-44948
- https://ubuntu.com/security/CVE-2024-44952
- https://ubuntu.com/security/CVE-2024-44954
- https://ubuntu.com/security/CVE-2024-44958
- https://ubuntu.com/security/CVE-2024-44960
- https://ubuntu.com/security/CVE-2024-44965
- https://ubuntu.com/security/CVE-2024-44966
- https://ubuntu.com/security/CVE-2024-44969
- https://ubuntu.com/security/CVE-2024-44971
- https://ubuntu.com/security/CVE-2024-44974
- https://ubuntu.com/security/CVE-2024-44982
- https://ubuntu.com/security/CVE-2024-44983
- https://ubuntu.com/security/CVE-2024-44985
- https://ubuntu.com/security/CVE-2024-44986
- https://ubuntu.com/security/CVE-2024-44987
- https://ubuntu.com/security/CVE-2024-44988
- https://ubuntu.com/security/CVE-2024-44989
- https://ubuntu.com/security/CVE-2024-44990
- https://ubuntu.com/security/CVE-2024-44995
- https://ubuntu.com/security/CVE-2024-44998
- https://ubuntu.com/security/CVE-2024-44999
- https://ubuntu.com/security/CVE-2024-45003
- https://ubuntu.com/security/CVE-2024-45006
- https://ubuntu.com/security/CVE-2024-45007
- https://ubuntu.com/security/CVE-2024-45008
- https://ubuntu.com/security/CVE-2024-45009
- https://ubuntu.com/security/CVE-2024-45011
- https://ubuntu.com/security/CVE-2024-45018
- https://ubuntu.com/security/CVE-2024-45021
- https://ubuntu.com/security/CVE-2024-45025
- https://ubuntu.com/security/CVE-2024-45026
- https://ubuntu.com/security/CVE-2024-45028
- https://ubuntu.com/security/CVE-2024-46673
- https://ubuntu.com/security/CVE-2024-46675
- https://ubuntu.com/security/CVE-2024-46676
- https://ubuntu.com/security/CVE-2024-46677
- https://ubuntu.com/security/CVE-2024-46679
- https://ubuntu.com/security/CVE-2024-46685
- https://ubuntu.com/security/CVE-2024-46689
- https://ubuntu.com/security/CVE-2024-46702
- https://ubuntu.com/security/CVE-2024-46707
- https://ubuntu.com/security/CVE-2024-46713
- https://ubuntu.com/security/CVE-2024-46714
- https://ubuntu.com/security/CVE-2024-46719
- https://ubuntu.com/security/CVE-2024-46721
- https://ubuntu.com/security/CVE-2024-46722
- https://ubuntu.com/security/CVE-2024-46723
- https://ubuntu.com/security/CVE-2024-46724
- https://ubuntu.com/security/CVE-2024-46725
- https://ubuntu.com/security/CVE-2024-46731
- https://ubuntu.com/security/CVE-2024-46732
- https://ubuntu.com/security/CVE-2024-46737
- https://ubuntu.com/security/CVE-2024-46738
- https://ubuntu.com/security/CVE-2024-46739
- https://ubuntu.com/security/CVE-2024-46740
- https://ubuntu.com/security/CVE-2024-46743
- https://ubuntu.com/security/CVE-2024-46744
- https://ubuntu.com/security/CVE-2024-46745
- https://ubuntu.com/security/CVE-2024-46746
- https://ubuntu.com/security/CVE-2024-46747
- https://ubuntu.com/security/CVE-2024-46750
- https://ubuntu.com/security/CVE-2024-46752
- https://ubuntu.com/security/CVE-2024-46755
- https://ubuntu.com/security/CVE-2024-46756
- https://ubuntu.com/security/CVE-2024-46757
- https://ubuntu.com/security/CVE-2024-46758
- https://ubuntu.com/security/CVE-2024-46759
- https://ubuntu.com/security/CVE-2024-46761
- https://ubuntu.com/security/CVE-2024-46763
- https://ubuntu.com/security/CVE-2024-46771
- https://ubuntu.com/security/CVE-2024-46777
- https://ubuntu.com/security/CVE-2024-46780
- https://ubuntu.com/security/CVE-2024-46781
- https://ubuntu.com/security/CVE-2024-46782
- https://ubuntu.com/security/CVE-2024-46783
- https://ubuntu.com/security/CVE-2024-46791
- https://ubuntu.com/security/CVE-2024-46795
- https://ubuntu.com/security/CVE-2024-46798
- https://ubuntu.com/security/CVE-2024-46800
- https://ubuntu.com/security/CVE-2024-46804
- https://ubuntu.com/security/CVE-2024-46805
- https://ubuntu.com/security/CVE-2024-46807
- https://ubuntu.com/security/CVE-2024-46810
- https://ubuntu.com/security/CVE-2024-46814
- https://ubuntu.com/security/CVE-2024-46815
- https://ubuntu.com/security/CVE-2024-46817
- https://ubuntu.com/security/CVE-2024-46818
- https://ubuntu.com/security/CVE-2024-46819
- https://ubuntu.com/security/CVE-2024-46822
- https://ubuntu.com/security/CVE-2024-46828
- https://ubuntu.com/security/CVE-2024-46829
- https://ubuntu.com/security/CVE-2024-46832
- https://ubuntu.com/security/CVE-2024-46840
- https://ubuntu.com/security/CVE-2024-46844
- https://ubuntu.com/security/CVE-2024-47659
- https://ubuntu.com/security/CVE-2024-47660
- https://ubuntu.com/security/CVE-2024-47663
- https://ubuntu.com/security/CVE-2024-47665
- https://ubuntu.com/security/CVE-2024-47667
- https://ubuntu.com/security/CVE-2024-47668
- https://ubuntu.com/security/CVE-2024-47669