Ubuntu Security Advisory USN-7088-
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | Ubuntu: Security Advisory (USN-7088-2) | 5 Nov 202400:00 | – | openvas |
![]() | Ubuntu: Security Advisory (USN-7088-1) | 1 Nov 202400:00 | – | openvas |
![]() | Ubuntu: Security Advisory (USN-7088-4) | 8 Nov 202400:00 | – | openvas |
![]() | Ubuntu: Security Advisory (USN-7088-3) | 7 Nov 202400:00 | – | openvas |
![]() | Ubuntu: Security Advisory (USN-7119-1) | 20 Nov 202400:00 | – | openvas |
![]() | Debian: Security Advisory (DLA-3912-1) | 8 Oct 202400:00 | – | openvas |
![]() | Ubuntu: Security Advisory (USN-7100-2) | 13 Nov 202400:00 | – | openvas |
![]() | Ubuntu: Security Advisory (USN-7100-1) | 12 Nov 202400:00 | – | openvas |
![]() | Ubuntu: Security Advisory (USN-7123-1) | 21 Nov 202400:00 | – | openvas |
![]() | Ubuntu: Security Advisory (USN-7144-1) | 11 Dec 202400:00 | – | openvas |
Source | Link |
---|---|
ubuntu | www.ubuntu.com/security/notices/USN-7088-5 |
# SPDX-FileCopyrightText: 2024 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.1.12.2024.7088.5");
script_cve_id("CVE-2021-47212", "CVE-2022-36402", "CVE-2023-52531", "CVE-2023-52614", "CVE-2023-52918", "CVE-2024-26607", "CVE-2024-26640", "CVE-2024-26641", "CVE-2024-26668", "CVE-2024-26669", "CVE-2024-26800", "CVE-2024-26885", "CVE-2024-26891", "CVE-2024-27051", "CVE-2024-35848", "CVE-2024-36484", "CVE-2024-38602", "CVE-2024-38611", "CVE-2024-40929", "CVE-2024-41011", "CVE-2024-41012", "CVE-2024-41015", "CVE-2024-41017", "CVE-2024-41020", "CVE-2024-41022", "CVE-2024-41042", "CVE-2024-41059", "CVE-2024-41063", "CVE-2024-41064", "CVE-2024-41065", "CVE-2024-41068", "CVE-2024-41070", "CVE-2024-41071", "CVE-2024-41072", "CVE-2024-41073", "CVE-2024-41081", "CVE-2024-41090", "CVE-2024-41091", "CVE-2024-41098", "CVE-2024-42131", "CVE-2024-42229", "CVE-2024-42244", "CVE-2024-42246", "CVE-2024-42259", "CVE-2024-42265", "CVE-2024-42271", "CVE-2024-42276", "CVE-2024-42280", "CVE-2024-42281", "CVE-2024-42283", "CVE-2024-42284", "CVE-2024-42285", "CVE-2024-42286", "CVE-2024-42287", "CVE-2024-42288", "CVE-2024-42289", "CVE-2024-42290", "CVE-2024-42292", "CVE-2024-42295", "CVE-2024-42297", "CVE-2024-42301", "CVE-2024-42304", "CVE-2024-42305", "CVE-2024-42306", "CVE-2024-42309", "CVE-2024-42310", "CVE-2024-42311", "CVE-2024-42313", "CVE-2024-43829", "CVE-2024-43830", "CVE-2024-43835", "CVE-2024-43839", "CVE-2024-43841", "CVE-2024-43846", "CVE-2024-43853", "CVE-2024-43854", "CVE-2024-43856", "CVE-2024-43858", "CVE-2024-43860", "CVE-2024-43861", "CVE-2024-43867", "CVE-2024-43871", "CVE-2024-43879", "CVE-2024-43880", "CVE-2024-43882", "CVE-2024-43883", "CVE-2024-43884", "CVE-2024-43890", "CVE-2024-43893", "CVE-2024-43894", "CVE-2024-43908", "CVE-2024-43914", "CVE-2024-44935", "CVE-2024-44944", "CVE-2024-44946", "CVE-2024-44947", "CVE-2024-44948", "CVE-2024-44952", "CVE-2024-44954", "CVE-2024-44960", "CVE-2024-44965", "CVE-2024-44969", "CVE-2024-44987", "CVE-2024-44988", "CVE-2024-44995", "CVE-2024-44998", "CVE-2024-44999", "CVE-2024-45003", "CVE-2024-45006", "CVE-2024-45008", "CVE-2024-45021", "CVE-2024-45025", "CVE-2024-45026", "CVE-2024-45028", "CVE-2024-46673", "CVE-2024-46675", "CVE-2024-46676", "CVE-2024-46677", "CVE-2024-46679", "CVE-2024-46685", "CVE-2024-46689", "CVE-2024-46714", "CVE-2024-46719", "CVE-2024-46721", "CVE-2024-46722", "CVE-2024-46723", "CVE-2024-46737", "CVE-2024-46738", "CVE-2024-46739", "CVE-2024-46740", "CVE-2024-46743", "CVE-2024-46744", "CVE-2024-46745", "CVE-2024-46747", "CVE-2024-46750", "CVE-2024-46755", "CVE-2024-46756", "CVE-2024-46757", "CVE-2024-46758", "CVE-2024-46759", "CVE-2024-46761", "CVE-2024-46771", "CVE-2024-46777", "CVE-2024-46780", "CVE-2024-46781", "CVE-2024-46782", "CVE-2024-46783", "CVE-2024-46798", "CVE-2024-46800", "CVE-2024-46815", "CVE-2024-46817", "CVE-2024-46818", "CVE-2024-46822", "CVE-2024-46828", "CVE-2024-46829", "CVE-2024-46840", "CVE-2024-46844", "CVE-2024-47659", "CVE-2024-47663", "CVE-2024-47667", "CVE-2024-47668", "CVE-2024-47669");
script_tag(name:"creation_date", value:"2024-11-15 04:08:07 +0000 (Fri, 15 Nov 2024)");
script_version("2024-11-15T15:55:05+0000");
script_tag(name:"last_modification", value:"2024-11-15 15:55:05 +0000 (Fri, 15 Nov 2024)");
script_tag(name:"cvss_base", value:"9.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:S/C:C/I:C/A:C");
script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2024-10-23 16:29:14 +0000 (Wed, 23 Oct 2024)");
script_name("Ubuntu: Security Advisory (USN-7088-5)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2024 Greenbone AG");
script_family("Ubuntu Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/ubuntu_linux", "ssh/login/packages", re:"ssh/login/release=UBUNTU(18\.04\ LTS|20\.04\ LTS)");
script_xref(name:"Advisory-ID", value:"USN-7088-5");
script_xref(name:"URL", value:"https://ubuntu.com/security/notices/USN-7088-5");
script_tag(name:"summary", value:"The remote host is missing an update for the 'linux-raspi, linux-raspi-5.4' package(s) announced via the USN-7088-5 advisory.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");
script_tag(name:"insight", value:"Ziming Zhang discovered that the VMware Virtual GPU DRM driver in the
Linux kernel contained an integer overflow vulnerability. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2022-36402)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture,
- PowerPC architecture,
- User-Mode Linux (UML),
- x86 architecture,
- Block layer subsystem,
- Cryptographic API,
- Android drivers,
- Serial ATA and Parallel ATA drivers,
- ATM drivers,
- Drivers core,
- CPU frequency scaling framework,
- Device frequency scaling framework,
- GPU drivers,
- HID subsystem,
- Hardware monitoring drivers,
- InfiniBand drivers,
- Input Device core drivers,
- Input Device (Miscellaneous) drivers,
- IOMMU subsystem,
- IRQ chip drivers,
- ISDN/mISDN subsystem,
- LED subsystem,
- Multiple devices driver,
- Media drivers,
- EEPROM drivers,
- VMware VMCI Driver,
- MMC subsystem,
- Network drivers,
- Near Field Communication (NFC) drivers,
- NVME drivers,
- Device tree and open firmware driver,
- Parport drivers,
- PCI subsystem,
- Pin controllers subsystem,
- Remote Processor subsystem,
- S/390 drivers,
- SCSI drivers,
- QCOM SoC drivers,
- Direct Digital Synthesis drivers,
- TTY drivers,
- Userspace I/O drivers,
- DesignWare USB3 driver,
- USB Gadget drivers,
- USB Host Controller drivers,
- USB Serial drivers,
- USB Type-C Connector System Software Interface driver,
- USB over IP driver,
- BTRFS file system,
- File systems infrastructure,
- Ext4 file system,
- F2FS file system,
- JFS file system,
- NILFS2 file system,
- BPF subsystem,
- Core kernel,
- DMA mapping infrastructure,
- Tracing infrastructure,
- Radix Tree data structure library,
- Kernel userspace event delivery library,
- Objagg library,
- Memory management,
- Amateur Radio drivers,
- Bluetooth subsystem,
- CAN network layer,
- Networking core,
- Ethtool driver,
- IPv4 networking,
- IPv6 networking,
- IUCV driver,
- KCM (Kernel Connection Multiplexor) sockets driver,
- MAC80211 subsystem,
- Netfilter,
- Network traffic control,
- SCTP protocol,
- Sun RPC protocol,
- TIPC protocol,
- TLS protocol,
- Wireless networking,
- AppArmor security module,
- Simplified Mandatory Access Control Kernel framework,
- SoC audio core drivers,
- USB sound devices,
(CVE-2024-42289, CVE-2024-26640, CVE-2024-42246, CVE-2024-43914,
CVE-2024-46744, CVE-2024-45026, CVE-2024-41071, CVE-2024-43893,
CVE-2024-46689, CVE-2024-41073, CVE-2024-42292, CVE-2024-43884,
CVE-2024-42301, CVE-2024-43856, CVE-2024-46756, CVE-2024-46759,
CVE-2024-27051, CVE-2024-26668, CVE-2024-46840, CVE-2024-42306,
CVE-2024-41042, CVE-2024-45006, CVE-2024-42309, CVE-2024-26891,
CVE-2024-42283, CVE-2024-46782, CVE-2024-44948, ... [Please see the references for more information on the vulnerabilities]");
script_tag(name:"affected", value:"'linux-raspi, linux-raspi-5.4' package(s) on Ubuntu 18.04, Ubuntu 20.04.");
script_tag(name:"solution", value:"Please install the updated package(s).");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"package");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-deb.inc");
release = dpkg_get_ssh_release();
if(!release)
exit(0);
res = "";
report = "";
if(release == "UBUNTU18.04 LTS") {
if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.4.0-1119-raspi", ver:"5.4.0-1119.131~18.04.1", rls:"UBUNTU18.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-raspi-hwe-18.04", ver:"5.4.0.1119.131~18.04.1", rls:"UBUNTU18.04 LTS"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
if(release == "UBUNTU20.04 LTS") {
if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.4.0-1119-raspi", ver:"5.4.0-1119.131", rls:"UBUNTU20.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-raspi", ver:"5.4.0.1119.149", rls:"UBUNTU20.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-raspi2", ver:"5.4.0.1119.149", rls:"UBUNTU20.04 LTS"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
exit(0);
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo