CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
16.2%
The remote Ubuntu 20.04 LTS host has a package installed that is affected by multiple vulnerabilities as referenced in the USN-6927-1 advisory.
Ziming Zhang discovered that the DRM driver for VMware Virtual GPU did not properly handle certain error conditions, leading to a NULL pointer dereference. A local attacker could possibly trigger this vulnerability to cause a denial of service. (CVE-2022-38096)
Gui-Dong Han discovered that the software RAID driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. A privileged attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-23307)
It was discovered that a race condition existed in the Bluetooth subsystem in the Linux kernel when modifying certain settings values through debugfs. A privileged local attacker could use this to cause a denial of service. (CVE-2024-24857, CVE-2024-24858, CVE-2024-24859)
Bai Jiaju discovered that the Xceive XC4000 silicon tuner device driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-24861)
Chenyuan Yang discovered that the Unsorted Block Images (UBI) flash device volume management subsystem did not properly validate logical eraseblock sizes in certain situations. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-25739)
Benedict Schlter, Supraja Sridhara, Andrin Bertschi, and Shweta Shinde discovered that an untrusted hypervisor could inject malicious #VC interrupts and compromise the security guarantees of AMD SEV-SNP.
This flaw is known as WeSee. A local attacker in control of the hypervisor could use this to expose sensitive information or possibly execute arbitrary code in the trusted execution environment.
(CVE-2024-25742)
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems:
- ARM64 architecture;
- RISC-V architecture;
- x86 architecture;
- Block layer subsystem;
- Accessibility subsystem;
- Android drivers;
- Bluetooth drivers;
- Clock framework and drivers;
- Data acquisition framework and drivers;
- Cryptographic API;
- DMA engine subsystem;
- GPU drivers;
- HID subsystem;
- I2C subsystem;
- IRQ chip drivers;
- Multiple devices driver;
- VMware VMCI Driver;
- MMC subsystem;
- Network drivers;
- Device tree and open firmware driver;
- PCI subsystem;
- S/390 drivers;
- SCSI drivers;
- Freescale SoC drivers;
- Trusted Execution Environment drivers;
- TTY drivers;
- USB subsystem;
- VFIO drivers;
- Framebuffer layer;
- Xen hypervisor drivers;
- File systems infrastructure;
- BTRFS file system;
- Ext4 file system;
- FAT file system;
- Network file system client;
- Network file system server daemon;
- NILFS2 file system;
- Pstore file system;
- SMB network file system;
- UBI file system;
- Netfilter;
- BPF subsystem;
- Core kernel;
- PCI iomap interfaces;
- Memory management;
- B.A.T.M.A.N. meshing protocol;
- Bluetooth subsystem;
- Ethernet bridge;
- Networking core;
- Distributed Switch Architecture;
- IPv4 networking;
- IPv6 networking;
- MAC80211 subsystem;
- IEEE 802.15.4 subsystem;
- NFC subsystem;
- Open vSwitch;
- RDS protocol;
- Network traffic control;
- SMC sockets;
- Unix domain sockets;
- eXpress Data Path;
- ALSA SH drivers;
- KVM core; (CVE-2024-35902, CVE-2024-35958, CVE-2024-35978, CVE-2024-35886, CVE-2024-35807, CVE-2024-26994, CVE-2024-36004, CVE-2024-35955, CVE-2024-26925, CVE-2024-27059, CVE-2024-35989, CVE-2024-35940, CVE-2024-26952, CVE-2024-35907, CVE-2024-35819, CVE-2024-35872, CVE-2024-36016, CVE-2023-52488, CVE-2024-35884, CVE-2024-26886, CVE-2024-27018, CVE-2024-35905, CVE-2024-35897, CVE-2024-26929, CVE-2024-36007, CVE-2024-35855, CVE-2024-35885, CVE-2024-26965, CVE-2024-35896, CVE-2024-36029, CVE-2024-35813, CVE-2024-26811, CVE-2024-26923, CVE-2024-26961, CVE-2024-26958, CVE-2024-35997, CVE-2024-35809, CVE-2024-27396, CVE-2023-52880, CVE-2024-26966, CVE-2024-27017, CVE-2024-26812, CVE-2024-35960, CVE-2024-35805, CVE-2024-35982, CVE-2024-35976, CVE-2024-35888, CVE-2024-26955, CVE-2024-27019, CVE-2024-35970, CVE-2024-35984, CVE-2024-27393, CVE-2024-26977, CVE-2024-27000, CVE-2024-35918, CVE-2024-26937, CVE-2024-35785, CVE-2024-35933, CVE-2024-26973, CVE-2022-48808, CVE-2024-35922, CVE-2024-35915, CVE-2024-35806, CVE-2024-26976, CVE-2024-26934, CVE-2024-26981, CVE-2024-36005, CVE-2024-26935, CVE-2024-26960, CVE-2024-26642, CVE-2024-27395, CVE-2024-35900, CVE-2024-26814, CVE-2024-26922, CVE-2024-35804, CVE-2024-26957, CVE-2024-35930, CVE-2023-52699, CVE-2024-36020, CVE-2024-35796, CVE-2024-35934, CVE-2024-26931, CVE-2024-35899, CVE-2024-27004, CVE-2024-35853, CVE-2024-35871, CVE-2024-26984, CVE-2024-35925, CVE-2024-35969, CVE-2024-35789, CVE-2024-35879, CVE-2024-36006, CVE-2024-26813, CVE-2024-35988, CVE-2024-36008, CVE-2024-35910, CVE-2024-35791, CVE-2024-26974, CVE-2024-26993, CVE-2024-35849, CVE-2024-26926, CVE-2024-35877, CVE-2024-26989, CVE-2024-35935, CVE-2024-26817, CVE-2024-35912, CVE-2024-27013, CVE-2024-35973, CVE-2024-35890, CVE-2024-35823, CVE-2024-35822, CVE-2024-27015, CVE-2024-35944, CVE-2024-35821, CVE-2024-26687, CVE-2024-27009, CVE-2024-35895, CVE-2024-35852, CVE-2024-35893, CVE-2024-26810, CVE-2024-26950, CVE-2024-35817, CVE-2024-26996, CVE-2024-27020, CVE-2024-35990, CVE-2024-26956, CVE-2024-27001, CVE-2024-26988, CVE-2024-26629, CVE-2024-26654, CVE-2024-35851, CVE-2024-27437, CVE-2024-35854, CVE-2024-35857, CVE-2024-26964, CVE-2024-35847, CVE-2024-35936, CVE-2023-52752, CVE-2024-36025, CVE-2024-26924, CVE-2024-26643, CVE-2024-26969, CVE-2024-35950, CVE-2024-35825, CVE-2024-27016, CVE-2024-35938, CVE-2024-26999, CVE-2024-35898, CVE-2024-26828, CVE-2024-35815, CVE-2024-26970, CVE-2024-26951, CVE-2024-27008)
Tenable has extracted the preceding description block directly from the Ubuntu security advisory.
Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Ubuntu Security Notice USN-6927-1. The text
# itself is copyright (C) Canonical, Inc. See
# <https://ubuntu.com/security/notices>. Ubuntu(R) is a registered
# trademark of Canonical, Inc.
##
include('compat.inc');
if (description)
{
script_id(204856);
script_version("1.2");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/08/27");
script_cve_id(
"CVE-2022-38096",
"CVE-2022-48808",
"CVE-2023-52488",
"CVE-2023-52699",
"CVE-2023-52752",
"CVE-2023-52880",
"CVE-2024-23307",
"CVE-2024-24857",
"CVE-2024-24858",
"CVE-2024-24859",
"CVE-2024-24861",
"CVE-2024-25739",
"CVE-2024-25742",
"CVE-2024-26629",
"CVE-2024-26642",
"CVE-2024-26643",
"CVE-2024-26654",
"CVE-2024-26687",
"CVE-2024-26810",
"CVE-2024-26811",
"CVE-2024-26812",
"CVE-2024-26813",
"CVE-2024-26814",
"CVE-2024-26817",
"CVE-2024-26828",
"CVE-2024-26886",
"CVE-2024-26922",
"CVE-2024-26923",
"CVE-2024-26924",
"CVE-2024-26925",
"CVE-2024-26926",
"CVE-2024-26929",
"CVE-2024-26931",
"CVE-2024-26934",
"CVE-2024-26935",
"CVE-2024-26937",
"CVE-2024-26950",
"CVE-2024-26951",
"CVE-2024-26952",
"CVE-2024-26955",
"CVE-2024-26956",
"CVE-2024-26957",
"CVE-2024-26958",
"CVE-2024-26960",
"CVE-2024-26961",
"CVE-2024-26964",
"CVE-2024-26965",
"CVE-2024-26966",
"CVE-2024-26969",
"CVE-2024-26970",
"CVE-2024-26973",
"CVE-2024-26974",
"CVE-2024-26976",
"CVE-2024-26977",
"CVE-2024-26981",
"CVE-2024-26984",
"CVE-2024-26988",
"CVE-2024-26989",
"CVE-2024-26993",
"CVE-2024-26994",
"CVE-2024-26996",
"CVE-2024-26999",
"CVE-2024-27000",
"CVE-2024-27001",
"CVE-2024-27004",
"CVE-2024-27008",
"CVE-2024-27009",
"CVE-2024-27013",
"CVE-2024-27015",
"CVE-2024-27016",
"CVE-2024-27017",
"CVE-2024-27018",
"CVE-2024-27019",
"CVE-2024-27020",
"CVE-2024-27059",
"CVE-2024-27393",
"CVE-2024-27395",
"CVE-2024-27396",
"CVE-2024-27437",
"CVE-2024-35785",
"CVE-2024-35789",
"CVE-2024-35791",
"CVE-2024-35796",
"CVE-2024-35804",
"CVE-2024-35805",
"CVE-2024-35806",
"CVE-2024-35807",
"CVE-2024-35809",
"CVE-2024-35813",
"CVE-2024-35815",
"CVE-2024-35817",
"CVE-2024-35819",
"CVE-2024-35821",
"CVE-2024-35822",
"CVE-2024-35823",
"CVE-2024-35825",
"CVE-2024-35847",
"CVE-2024-35849",
"CVE-2024-35851",
"CVE-2024-35852",
"CVE-2024-35853",
"CVE-2024-35854",
"CVE-2024-35855",
"CVE-2024-35857",
"CVE-2024-35871",
"CVE-2024-35872",
"CVE-2024-35877",
"CVE-2024-35879",
"CVE-2024-35884",
"CVE-2024-35885",
"CVE-2024-35886",
"CVE-2024-35888",
"CVE-2024-35890",
"CVE-2024-35893",
"CVE-2024-35895",
"CVE-2024-35896",
"CVE-2024-35897",
"CVE-2024-35898",
"CVE-2024-35899",
"CVE-2024-35900",
"CVE-2024-35902",
"CVE-2024-35905",
"CVE-2024-35907",
"CVE-2024-35910",
"CVE-2024-35912",
"CVE-2024-35915",
"CVE-2024-35918",
"CVE-2024-35922",
"CVE-2024-35925",
"CVE-2024-35930",
"CVE-2024-35933",
"CVE-2024-35934",
"CVE-2024-35935",
"CVE-2024-35936",
"CVE-2024-35938",
"CVE-2024-35940",
"CVE-2024-35944",
"CVE-2024-35950",
"CVE-2024-35955",
"CVE-2024-35958",
"CVE-2024-35960",
"CVE-2024-35969",
"CVE-2024-35970",
"CVE-2024-35973",
"CVE-2024-35976",
"CVE-2024-35978",
"CVE-2024-35982",
"CVE-2024-35984",
"CVE-2024-35988",
"CVE-2024-35989",
"CVE-2024-35990",
"CVE-2024-35997",
"CVE-2024-36004",
"CVE-2024-36005",
"CVE-2024-36006",
"CVE-2024-36007",
"CVE-2024-36008",
"CVE-2024-36016",
"CVE-2024-36020",
"CVE-2024-36025",
"CVE-2024-36029"
);
script_xref(name:"USN", value:"6927-1");
script_name(english:"Ubuntu 20.04 LTS : Linux kernel vulnerabilities (USN-6927-1)");
script_set_attribute(attribute:"synopsis", value:
"The remote Ubuntu host is missing one or more security updates.");
script_set_attribute(attribute:"description", value:
"The remote Ubuntu 20.04 LTS host has a package installed that is affected by multiple vulnerabilities as referenced in
the USN-6927-1 advisory.
Ziming Zhang discovered that the DRM driver for VMware Virtual GPU did not properly handle certain error
conditions, leading to a NULL pointer dereference. A local attacker could possibly trigger this
vulnerability to cause a denial of service. (CVE-2022-38096)
Gui-Dong Han discovered that the software RAID driver in the Linux kernel contained a race condition,
leading to an integer overflow vulnerability. A privileged attacker could possibly use this to cause a
denial of service (system crash). (CVE-2024-23307)
It was discovered that a race condition existed in the Bluetooth subsystem in the Linux kernel when
modifying certain settings values through debugfs. A privileged local attacker could use this to cause a
denial of service. (CVE-2024-24857, CVE-2024-24858, CVE-2024-24859)
Bai Jiaju discovered that the Xceive XC4000 silicon tuner device driver in the Linux kernel contained a
race condition, leading to an integer overflow vulnerability. An attacker could possibly use this to cause
a denial of service (system crash). (CVE-2024-24861)
Chenyuan Yang discovered that the Unsorted Block Images (UBI) flash device volume management subsystem did
not properly validate logical eraseblock sizes in certain situations. An attacker could possibly use this
to cause a denial of service (system crash). (CVE-2024-25739)
Benedict Schlter, Supraja Sridhara, Andrin Bertschi, and Shweta Shinde discovered that an untrusted
hypervisor could inject malicious #VC interrupts and compromise the security guarantees of AMD SEV-SNP.
This flaw is known as WeSee. A local attacker in control of the hypervisor could use this to expose
sensitive information or possibly execute arbitrary code in the trusted execution environment.
(CVE-2024-25742)
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to
compromise the system. This update corrects flaws in the following subsystems:
- ARM64 architecture;
- RISC-V architecture;
- x86 architecture;
- Block layer subsystem;
- Accessibility subsystem;
- Android drivers;
- Bluetooth drivers;
- Clock framework and drivers;
- Data acquisition framework and drivers;
- Cryptographic API;
- DMA engine subsystem;
- GPU drivers;
- HID subsystem;
- I2C subsystem;
- IRQ chip drivers;
- Multiple devices driver;
- VMware VMCI Driver;
- MMC subsystem;
- Network drivers;
- Device tree and open firmware driver;
- PCI subsystem;
- S/390 drivers;
- SCSI drivers;
- Freescale SoC drivers;
- Trusted Execution Environment drivers;
- TTY drivers;
- USB subsystem;
- VFIO drivers;
- Framebuffer layer;
- Xen hypervisor drivers;
- File systems infrastructure;
- BTRFS file system;
- Ext4 file system;
- FAT file system;
- Network file system client;
- Network file system server daemon;
- NILFS2 file system;
- Pstore file system;
- SMB network file system;
- UBI file system;
- Netfilter;
- BPF subsystem;
- Core kernel;
- PCI iomap interfaces;
- Memory management;
- B.A.T.M.A.N. meshing protocol;
- Bluetooth subsystem;
- Ethernet bridge;
- Networking core;
- Distributed Switch Architecture;
- IPv4 networking;
- IPv6 networking;
- MAC80211 subsystem;
- IEEE 802.15.4 subsystem;
- NFC subsystem;
- Open vSwitch;
- RDS protocol;
- Network traffic control;
- SMC sockets;
- Unix domain sockets;
- eXpress Data Path;
- ALSA SH drivers;
- KVM core; (CVE-2024-35902, CVE-2024-35958, CVE-2024-35978, CVE-2024-35886, CVE-2024-35807,
CVE-2024-26994, CVE-2024-36004, CVE-2024-35955, CVE-2024-26925, CVE-2024-27059, CVE-2024-35989,
CVE-2024-35940, CVE-2024-26952, CVE-2024-35907, CVE-2024-35819, CVE-2024-35872, CVE-2024-36016,
CVE-2023-52488, CVE-2024-35884, CVE-2024-26886, CVE-2024-27018, CVE-2024-35905, CVE-2024-35897,
CVE-2024-26929, CVE-2024-36007, CVE-2024-35855, CVE-2024-35885, CVE-2024-26965, CVE-2024-35896,
CVE-2024-36029, CVE-2024-35813, CVE-2024-26811, CVE-2024-26923, CVE-2024-26961, CVE-2024-26958,
CVE-2024-35997, CVE-2024-35809, CVE-2024-27396, CVE-2023-52880, CVE-2024-26966, CVE-2024-27017,
CVE-2024-26812, CVE-2024-35960, CVE-2024-35805, CVE-2024-35982, CVE-2024-35976, CVE-2024-35888,
CVE-2024-26955, CVE-2024-27019, CVE-2024-35970, CVE-2024-35984, CVE-2024-27393, CVE-2024-26977,
CVE-2024-27000, CVE-2024-35918, CVE-2024-26937, CVE-2024-35785, CVE-2024-35933, CVE-2024-26973,
CVE-2022-48808, CVE-2024-35922, CVE-2024-35915, CVE-2024-35806, CVE-2024-26976, CVE-2024-26934,
CVE-2024-26981, CVE-2024-36005, CVE-2024-26935, CVE-2024-26960, CVE-2024-26642, CVE-2024-27395,
CVE-2024-35900, CVE-2024-26814, CVE-2024-26922, CVE-2024-35804, CVE-2024-26957, CVE-2024-35930,
CVE-2023-52699, CVE-2024-36020, CVE-2024-35796, CVE-2024-35934, CVE-2024-26931, CVE-2024-35899,
CVE-2024-27004, CVE-2024-35853, CVE-2024-35871, CVE-2024-26984, CVE-2024-35925, CVE-2024-35969,
CVE-2024-35789, CVE-2024-35879, CVE-2024-36006, CVE-2024-26813, CVE-2024-35988, CVE-2024-36008,
CVE-2024-35910, CVE-2024-35791, CVE-2024-26974, CVE-2024-26993, CVE-2024-35849, CVE-2024-26926,
CVE-2024-35877, CVE-2024-26989, CVE-2024-35935, CVE-2024-26817, CVE-2024-35912, CVE-2024-27013,
CVE-2024-35973, CVE-2024-35890, CVE-2024-35823, CVE-2024-35822, CVE-2024-27015, CVE-2024-35944,
CVE-2024-35821, CVE-2024-26687, CVE-2024-27009, CVE-2024-35895, CVE-2024-35852, CVE-2024-35893,
CVE-2024-26810, CVE-2024-26950, CVE-2024-35817, CVE-2024-26996, CVE-2024-27020, CVE-2024-35990,
CVE-2024-26956, CVE-2024-27001, CVE-2024-26988, CVE-2024-26629, CVE-2024-26654, CVE-2024-35851,
CVE-2024-27437, CVE-2024-35854, CVE-2024-35857, CVE-2024-26964, CVE-2024-35847, CVE-2024-35936,
CVE-2023-52752, CVE-2024-36025, CVE-2024-26924, CVE-2024-26643, CVE-2024-26969, CVE-2024-35950,
CVE-2024-35825, CVE-2024-27016, CVE-2024-35938, CVE-2024-26999, CVE-2024-35898, CVE-2024-26828,
CVE-2024-35815, CVE-2024-26970, CVE-2024-26951, CVE-2024-27008)
Tenable has extracted the preceding description block directly from the Ubuntu security advisory.
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
script_set_attribute(attribute:"see_also", value:"https://ubuntu.com/security/notices/USN-6927-1");
script_set_attribute(attribute:"solution", value:
"Update the affected kernel package.");
script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2024-27018");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2022/09/09");
script_set_attribute(attribute:"patch_publication_date", value:"2024/07/30");
script_set_attribute(attribute:"plugin_publication_date", value:"2024/07/30");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:20.04:-:lts");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.15.0-1065-gcp");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Ubuntu Local Security Checks");
script_copyright(english:"Ubuntu Security Notice (C) 2024 Canonical, Inc. / NASL script (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl", "linux_alt_patch_detect.nasl");
script_require_keys("Host/cpu", "Host/Ubuntu", "Host/Ubuntu/release", "Host/Debian/dpkg-l");
exit(0);
}
include('debian_package.inc');
include('ksplice.inc');
if ( ! get_kb_item('Host/local_checks_enabled') ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
var os_release = get_kb_item('Host/Ubuntu/release');
if ( isnull(os_release) ) audit(AUDIT_OS_NOT, 'Ubuntu');
os_release = chomp(os_release);
if (! ('20.04' >< os_release)) audit(AUDIT_OS_NOT, 'Ubuntu 20.04', 'Ubuntu ' + os_release);
if ( ! get_kb_item('Host/Debian/dpkg-l') ) audit(AUDIT_PACKAGE_LIST_MISSING);
var cpu = get_kb_item('Host/cpu');
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ('x86_64' >!< cpu && cpu !~ "^i[3-6]86$" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Ubuntu', cpu);
var kernel_mappings = {
'20.04': {
'5.15.0': {
'gcp': '5.15.0-1065'
}
}
};
var host_kernel_release = get_kb_item('Host/uptrack-uname-r');
if (empty_or_null(host_kernel_release)) host_kernel_release = get_kb_item_or_exit('Host/uname-r');
var host_kernel_base_version = get_kb_item_or_exit('Host/Debian/kernel-base-version');
var host_kernel_type = get_kb_item_or_exit('Host/Debian/kernel-type');
if(empty_or_null(kernel_mappings[os_release][host_kernel_base_version][host_kernel_type])) audit(AUDIT_INST_VER_NOT_VULN, 'kernel ' + host_kernel_release);
var extra = '';
var kernel_fixed_version = kernel_mappings[os_release][host_kernel_base_version][host_kernel_type] + "-" + host_kernel_type;
if (deb_ver_cmp(ver1:host_kernel_release, ver2:kernel_fixed_version) < 0)
{
extra += 'Running Kernel level of ' + host_kernel_release + ' does not meet the minimum fixed level of ' + kernel_fixed_version + ' for this advisory.\n\n';
}
else
{
audit(AUDIT_PATCH_INSTALLED, 'Kernel package for USN-6927-1');
}
if (get_one_kb_item('Host/ksplice/kernel-cves'))
{
var cve_list = make_list('CVE-2022-38096', 'CVE-2022-48808', 'CVE-2023-52488', 'CVE-2023-52699', 'CVE-2023-52752', 'CVE-2023-52880', 'CVE-2024-23307', 'CVE-2024-24857', 'CVE-2024-24858', 'CVE-2024-24859', 'CVE-2024-24861', 'CVE-2024-25739', 'CVE-2024-25742', 'CVE-2024-26629', 'CVE-2024-26642', 'CVE-2024-26643', 'CVE-2024-26654', 'CVE-2024-26687', 'CVE-2024-26810', 'CVE-2024-26811', 'CVE-2024-26812', 'CVE-2024-26813', 'CVE-2024-26814', 'CVE-2024-26817', 'CVE-2024-26828', 'CVE-2024-26886', 'CVE-2024-26922', 'CVE-2024-26923', 'CVE-2024-26924', 'CVE-2024-26925', 'CVE-2024-26926', 'CVE-2024-26929', 'CVE-2024-26931', 'CVE-2024-26934', 'CVE-2024-26935', 'CVE-2024-26937', 'CVE-2024-26950', 'CVE-2024-26951', 'CVE-2024-26952', 'CVE-2024-26955', 'CVE-2024-26956', 'CVE-2024-26957', 'CVE-2024-26958', 'CVE-2024-26960', 'CVE-2024-26961', 'CVE-2024-26964', 'CVE-2024-26965', 'CVE-2024-26966', 'CVE-2024-26969', 'CVE-2024-26970', 'CVE-2024-26973', 'CVE-2024-26974', 'CVE-2024-26976', 'CVE-2024-26977', 'CVE-2024-26981', 'CVE-2024-26984', 'CVE-2024-26988', 'CVE-2024-26989', 'CVE-2024-26993', 'CVE-2024-26994', 'CVE-2024-26996', 'CVE-2024-26999', 'CVE-2024-27000', 'CVE-2024-27001', 'CVE-2024-27004', 'CVE-2024-27008', 'CVE-2024-27009', 'CVE-2024-27013', 'CVE-2024-27015', 'CVE-2024-27016', 'CVE-2024-27017', 'CVE-2024-27018', 'CVE-2024-27019', 'CVE-2024-27020', 'CVE-2024-27059', 'CVE-2024-27393', 'CVE-2024-27395', 'CVE-2024-27396', 'CVE-2024-27437', 'CVE-2024-35785', 'CVE-2024-35789', 'CVE-2024-35791', 'CVE-2024-35796', 'CVE-2024-35804', 'CVE-2024-35805', 'CVE-2024-35806', 'CVE-2024-35807', 'CVE-2024-35809', 'CVE-2024-35813', 'CVE-2024-35815', 'CVE-2024-35817', 'CVE-2024-35819', 'CVE-2024-35821', 'CVE-2024-35822', 'CVE-2024-35823', 'CVE-2024-35825', 'CVE-2024-35847', 'CVE-2024-35849', 'CVE-2024-35851', 'CVE-2024-35852', 'CVE-2024-35853', 'CVE-2024-35854', 'CVE-2024-35855', 'CVE-2024-35857', 'CVE-2024-35871', 'CVE-2024-35872', 'CVE-2024-35877', 'CVE-2024-35879', 'CVE-2024-35884', 'CVE-2024-35885', 'CVE-2024-35886', 'CVE-2024-35888', 'CVE-2024-35890', 'CVE-2024-35893', 'CVE-2024-35895', 'CVE-2024-35896', 'CVE-2024-35897', 'CVE-2024-35898', 'CVE-2024-35899', 'CVE-2024-35900', 'CVE-2024-35902', 'CVE-2024-35905', 'CVE-2024-35907', 'CVE-2024-35910', 'CVE-2024-35912', 'CVE-2024-35915', 'CVE-2024-35918', 'CVE-2024-35922', 'CVE-2024-35925', 'CVE-2024-35930', 'CVE-2024-35933', 'CVE-2024-35934', 'CVE-2024-35935', 'CVE-2024-35936', 'CVE-2024-35938', 'CVE-2024-35940', 'CVE-2024-35944', 'CVE-2024-35950', 'CVE-2024-35955', 'CVE-2024-35958', 'CVE-2024-35960', 'CVE-2024-35969', 'CVE-2024-35970', 'CVE-2024-35973', 'CVE-2024-35976', 'CVE-2024-35978', 'CVE-2024-35982', 'CVE-2024-35984', 'CVE-2024-35988', 'CVE-2024-35989', 'CVE-2024-35990', 'CVE-2024-35997', 'CVE-2024-36004', 'CVE-2024-36005', 'CVE-2024-36006', 'CVE-2024-36007', 'CVE-2024-36008', 'CVE-2024-36016', 'CVE-2024-36020', 'CVE-2024-36025', 'CVE-2024-36029');
if (ksplice_cves_check(cve_list))
{
audit(AUDIT_PATCH_INSTALLED, 'KSplice hotfix for USN-6927-1');
}
else
{
extra = extra + ksplice_reporting_text();
}
}
if (extra) {
security_report_v4(
port : 0,
severity : SECURITY_WARNING,
extra : extra
);
exit(0);
}
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38096
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48808
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52488
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52699
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52752
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52880
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23307
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24857
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24858
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24859
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24861
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25739
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25742
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26629
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26642
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26643
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26654
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26687
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26810
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26811
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26812
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26813
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26814
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26817
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26828
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26886
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26922
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26923
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26924
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26925
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26926
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26929
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26931
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26934
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26935
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26937
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26950
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26951
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26952
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26955
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26956
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26957
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26958
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26960
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26961
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26964
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26965
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26966
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26969
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26970
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26973
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26974
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26976
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26977
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26981
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26984
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26988
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26989
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26993
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26994
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26996
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26999
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27000
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27001
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27004
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27008
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27009
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27013
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27015
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27016
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27017
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27018
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27019
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27059
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27393
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27395
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27396
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27437
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35785
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35789
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35791
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35796
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35804
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35805
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35806
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35807
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35809
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35813
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35815
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35817
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35819
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35821
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35822
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35823
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35825
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35847
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35849
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35851
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35852
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35853
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35854
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35855
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35857
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35871
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35872
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35877
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35879
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35884
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35885
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35886
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35888
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35890
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35893
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35895
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35896
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35897
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35898
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35899
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35900
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35902
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35905
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35907
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35910
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35912
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35915
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35918
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35922
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35925
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35930
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35933
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35934
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35935
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35936
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35938
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35940
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35944
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35950
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35955
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35958
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35960
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35969
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35970
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35973
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35976
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35978
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35982
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35984
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35988
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35989
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35990
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35997
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36004
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36005
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36006
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36007
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36008
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36016
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36020
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36025
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36029
ubuntu.com/security/notices/USN-6927-1
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
16.2%