Ubuntu Security Advisory (USN-7119-1) for multiple vulnerabilitie
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | Ubuntu: Security Advisory (USN-7088-5) | 15 Nov 202400:00 | – | openvas |
![]() | Ubuntu: Security Advisory (USN-7088-2) | 5 Nov 202400:00 | – | openvas |
![]() | Ubuntu: Security Advisory (USN-7088-1) | 1 Nov 202400:00 | – | openvas |
![]() | Ubuntu: Security Advisory (USN-7088-4) | 8 Nov 202400:00 | – | openvas |
![]() | Ubuntu: Security Advisory (USN-7088-3) | 7 Nov 202400:00 | – | openvas |
![]() | Ubuntu: Security Advisory (USN-7022-3) | 10 Oct 202400:00 | – | openvas |
![]() | Ubuntu: Security Advisory (USN-7022-1) | 19 Sep 202400:00 | – | openvas |
![]() | Ubuntu: Security Advisory (USN-7022-2) | 2 Oct 202400:00 | – | openvas |
![]() | Debian: Security Advisory (DLA-3912-1) | 8 Oct 202400:00 | – | openvas |
![]() | Ubuntu: Security Advisory (USN-7100-2) | 13 Nov 202400:00 | – | openvas |
Source | Link |
---|---|
ubuntu | www.ubuntu.com/security/notices/USN-7119-1 |
# SPDX-FileCopyrightText: 2024 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.1.12.2024.7119.1");
script_cve_id("CVE-2021-47188", "CVE-2021-47212", "CVE-2022-36402", "CVE-2022-48791", "CVE-2022-48863", "CVE-2023-52531", "CVE-2023-52614", "CVE-2023-52918", "CVE-2024-26607", "CVE-2024-26640", "CVE-2024-26641", "CVE-2024-26668", "CVE-2024-26669", "CVE-2024-26677", "CVE-2024-26787", "CVE-2024-26800", "CVE-2024-26885", "CVE-2024-26891", "CVE-2024-26960", "CVE-2024-27012", "CVE-2024-27051", "CVE-2024-27397", "CVE-2024-35848", "CVE-2024-36484", "CVE-2024-38570", "CVE-2024-38602", "CVE-2024-38611", "CVE-2024-38630", "CVE-2024-39494", "CVE-2024-40929", "CVE-2024-41011", "CVE-2024-41012", "CVE-2024-41015", "CVE-2024-41017", "CVE-2024-41020", "CVE-2024-41022", "CVE-2024-41042", "CVE-2024-41059", "CVE-2024-41063", "CVE-2024-41064", "CVE-2024-41065", "CVE-2024-41068", "CVE-2024-41070", "CVE-2024-41071", "CVE-2024-41072", "CVE-2024-41073", "CVE-2024-41081", "CVE-2024-41090", "CVE-2024-41091", "CVE-2024-41098", "CVE-2024-42131", "CVE-2024-42160", "CVE-2024-42228", "CVE-2024-42229", "CVE-2024-42244", "CVE-2024-42246", "CVE-2024-42259", "CVE-2024-42265", "CVE-2024-42271", "CVE-2024-42276", "CVE-2024-42280", "CVE-2024-42281", "CVE-2024-42283", "CVE-2024-42284", "CVE-2024-42285", "CVE-2024-42286", "CVE-2024-42287", "CVE-2024-42288", "CVE-2024-42289", "CVE-2024-42290", "CVE-2024-42292", "CVE-2024-42295", "CVE-2024-42297", "CVE-2024-42301", "CVE-2024-42304", "CVE-2024-42305", "CVE-2024-42306", "CVE-2024-42309", "CVE-2024-42310", "CVE-2024-42311", "CVE-2024-42313", "CVE-2024-43829", "CVE-2024-43830", "CVE-2024-43835", "CVE-2024-43839", "CVE-2024-43841", "CVE-2024-43846", "CVE-2024-43853", "CVE-2024-43854", "CVE-2024-43856", "CVE-2024-43858", "CVE-2024-43860", "CVE-2024-43861", "CVE-2024-43867", "CVE-2024-43871", "CVE-2024-43879", "CVE-2024-43880", "CVE-2024-43882", "CVE-2024-43883", "CVE-2024-43884", "CVE-2024-43890", "CVE-2024-43893", "CVE-2024-43894", "CVE-2024-43908", "CVE-2024-43914", "CVE-2024-44935", "CVE-2024-44944", "CVE-2024-44946", "CVE-2024-44947", "CVE-2024-44948", "CVE-2024-44954", "CVE-2024-44960", "CVE-2024-44965", "CVE-2024-44969", "CVE-2024-44987", "CVE-2024-44988", "CVE-2024-44995", "CVE-2024-44998", "CVE-2024-44999", "CVE-2024-45003", "CVE-2024-45006", "CVE-2024-45008", "CVE-2024-45016", "CVE-2024-45021", "CVE-2024-45025", "CVE-2024-45026", "CVE-2024-45028", "CVE-2024-46673", "CVE-2024-46675", "CVE-2024-46676", "CVE-2024-46677", "CVE-2024-46679", "CVE-2024-46685", "CVE-2024-46689", "CVE-2024-46714", "CVE-2024-46719", "CVE-2024-46721", "CVE-2024-46722", "CVE-2024-46723", "CVE-2024-46737", "CVE-2024-46738", "CVE-2024-46739", "CVE-2024-46740", "CVE-2024-46743", "CVE-2024-46744", "CVE-2024-46745", "CVE-2024-46747", "CVE-2024-46750", "CVE-2024-46755", "CVE-2024-46756", "CVE-2024-46757", "CVE-2024-46758", "CVE-2024-46759", "CVE-2024-46761", "CVE-2024-46771", "CVE-2024-46777", "CVE-2024-46780", "CVE-2024-46781", "CVE-2024-46782", "CVE-2024-46783", "CVE-2024-46798", "CVE-2024-46800", "CVE-2024-46815", "CVE-2024-46817", "CVE-2024-46818", "CVE-2024-46822", "CVE-2024-46828", "CVE-2024-46829", "CVE-2024-46840", "CVE-2024-46844", "CVE-2024-47659", "CVE-2024-47663", "CVE-2024-47667", "CVE-2024-47668", "CVE-2024-47669");
script_tag(name:"creation_date", value:"2024-11-20 15:33:16 +0000 (Wed, 20 Nov 2024)");
script_version("2024-11-21T05:05:26+0000");
script_tag(name:"last_modification", value:"2024-11-21 05:05:26 +0000 (Thu, 21 Nov 2024)");
script_tag(name:"cvss_base", value:"9.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:S/C:C/I:C/A:C");
script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2024-10-23 16:29:14 +0000 (Wed, 23 Oct 2024)");
script_name("Ubuntu: Security Advisory (USN-7119-1)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2024 Greenbone AG");
script_family("Ubuntu Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/ubuntu_linux", "ssh/login/packages", re:"ssh/login/release=UBUNTU20\.04\ LTS");
script_xref(name:"Advisory-ID", value:"USN-7119-1");
script_xref(name:"URL", value:"https://ubuntu.com/security/notices/USN-7119-1");
script_tag(name:"summary", value:"The remote host is missing an update for the 'linux-iot' package(s) announced via the USN-7119-1 advisory.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");
script_tag(name:"insight", value:"Ziming Zhang discovered that the VMware Virtual GPU DRM driver in the Linux
kernel contained an integer overflow vulnerability. A local attacker could
use this to cause a denial of service (system crash). (CVE-2022-36402)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture,
- PowerPC architecture,
- User-Mode Linux (UML),
- x86 architecture,
- Block layer subsystem,
- Cryptographic API,
- Android drivers,
- Serial ATA and Parallel ATA drivers,
- ATM drivers,
- Drivers core,
- CPU frequency scaling framework,
- Device frequency scaling framework,
- GPU drivers,
- HID subsystem,
- Hardware monitoring drivers,
- InfiniBand drivers,
- Input Device core drivers,
- Input Device (Miscellaneous) drivers,
- IOMMU subsystem,
- IRQ chip drivers,
- ISDN/mISDN subsystem,
- Modular ISDN driver,
- LED subsystem,
- Multiple devices driver,
- Media drivers,
- EEPROM drivers,
- VMware VMCI Driver,
- MMC subsystem,
- Network drivers,
- Near Field Communication (NFC) drivers,
- NVME drivers,
- Device tree and open firmware driver,
- Parport drivers,
- PCI subsystem,
- Pin controllers subsystem,
- Remote Processor subsystem,
- S/390 drivers,
- SCSI drivers,
- QCOM SoC drivers,
- Direct Digital Synthesis drivers,
- TTY drivers,
- Userspace I/O drivers,
- DesignWare USB3 driver,
- USB Gadget drivers,
- USB Host Controller drivers,
- USB Serial drivers,
- USB Type-C Connector System Software Interface driver,
- USB over IP driver,
- Watchdog drivers,
- BTRFS file system,
- File systems infrastructure,
- Ext4 file system,
- F2FS file system,
- GFS2 file system,
- JFS file system,
- NILFS2 file system,
- Netfilter,
- BPF subsystem,
- Core kernel,
- DMA mapping infrastructure,
- Tracing infrastructure,
- Radix Tree data structure library,
- Kernel userspace event delivery library,
- Objagg library,
- Memory management,
- Amateur Radio drivers,
- Bluetooth subsystem,
- CAN network layer,
- Networking core,
- Ethtool driver,
- IPv4 networking,
- IPv6 networking,
- IUCV driver,
- KCM (Kernel Connection Multiplexor) sockets driver,
- MAC80211 subsystem,
- RxRPC session sockets,
- Network traffic control,
- SCTP protocol,
- Sun RPC protocol,
- TIPC protocol,
- TLS protocol,
- Wireless networking,
- AppArmor security module,
- Integrity Measurement Architecture(IMA) framework,
- Simplified Mandatory Access Control Kernel framework,
- SoC audio core drivers,
- USB sound devices,
(CVE-2024-46750, CVE-2024-43853, CVE-2024-46722, CVE-2024-42311,
CVE-2024-46679, CVE-2023-52918, CVE-2024-42309, CVE-2024-42160,
CVE-2024-26668, CVE-2024-42271, CVE-2024-40929, CVE-2024-46747,
CVE-2024-41064, CVE-2024-43839, CVE-2024-46757, CVE-2024-41059,
CVE-2024-42301, CVE-2024-46737, ... [Please see the references for more information on the vulnerabilities]");
script_tag(name:"affected", value:"'linux-iot' package(s) on Ubuntu 20.04.");
script_tag(name:"solution", value:"Please install the updated package(s).");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"package");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-deb.inc");
release = dpkg_get_ssh_release();
if(!release)
exit(0);
res = "";
report = "";
if(release == "UBUNTU20.04 LTS") {
if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.4.0-1044-iot", ver:"5.4.0-1044.45", rls:"UBUNTU20.04 LTS"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
exit(0);
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo