Lucene search

K

Ubuntu: Security Advisory (USN-7166-1)

🗓️ 18 Dec 2024 00:00:00Reported by Copyright (C) 2024 Greenbone AGType 
openvas
 openvas
🔗 plugins.openvas.org👁 22 Views

Ubuntu Security Advisory addresses multiple critical vulnerabilities through various CVEs.

Show more
Related
Refs
Code
# SPDX-FileCopyrightText: 2024 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.1.12.2024.7166.1");
  script_cve_id("CVE-2023-52532", "CVE-2023-52621", "CVE-2023-52639", "CVE-2023-52904", "CVE-2023-52917", "CVE-2024-26947", "CVE-2024-27072", "CVE-2024-35904", "CVE-2024-35951", "CVE-2024-36893", "CVE-2024-36968", "CVE-2024-38538", "CVE-2024-38544", "CVE-2024-38545", "CVE-2024-38632", "CVE-2024-38667", "CVE-2024-39463", "CVE-2024-41016", "CVE-2024-42079", "CVE-2024-42156", "CVE-2024-42158", "CVE-2024-44931", "CVE-2024-44940", "CVE-2024-44942", "CVE-2024-46695", "CVE-2024-46849", "CVE-2024-46852", "CVE-2024-46853", "CVE-2024-46854", "CVE-2024-46855", "CVE-2024-46858", "CVE-2024-46859", "CVE-2024-46865", "CVE-2024-47670", "CVE-2024-47671", "CVE-2024-47672", "CVE-2024-47673", "CVE-2024-47674", "CVE-2024-47679", "CVE-2024-47684", "CVE-2024-47685", "CVE-2024-47690", "CVE-2024-47692", "CVE-2024-47693", "CVE-2024-47695", "CVE-2024-47696", "CVE-2024-47697", "CVE-2024-47698", "CVE-2024-47699", "CVE-2024-47701", "CVE-2024-47705", "CVE-2024-47706", "CVE-2024-47709", "CVE-2024-47710", "CVE-2024-47712", "CVE-2024-47713", "CVE-2024-47718", "CVE-2024-47720", "CVE-2024-47723", "CVE-2024-47734", "CVE-2024-47735", "CVE-2024-47737", "CVE-2024-47739", "CVE-2024-47740", "CVE-2024-47742", "CVE-2024-47747", "CVE-2024-47748", "CVE-2024-47749", "CVE-2024-47756", "CVE-2024-47757", "CVE-2024-49851", "CVE-2024-49852", "CVE-2024-49856", "CVE-2024-49858", "CVE-2024-49860", "CVE-2024-49863", "CVE-2024-49866", "CVE-2024-49867", "CVE-2024-49868", "CVE-2024-49871", "CVE-2024-49875", "CVE-2024-49877", "CVE-2024-49878", "CVE-2024-49879", "CVE-2024-49881", "CVE-2024-49882", "CVE-2024-49883", "CVE-2024-49884", "CVE-2024-49886", "CVE-2024-49889", "CVE-2024-49890", "CVE-2024-49892", "CVE-2024-49894", "CVE-2024-49895", "CVE-2024-49896", "CVE-2024-49900", "CVE-2024-49902", "CVE-2024-49903", "CVE-2024-49907", "CVE-2024-49913", "CVE-2024-49924", "CVE-2024-49927", "CVE-2024-49930", "CVE-2024-49933", "CVE-2024-49935", "CVE-2024-49936", "CVE-2024-49938", "CVE-2024-49944", "CVE-2024-49946", "CVE-2024-49948", "CVE-2024-49949", "CVE-2024-49952", "CVE-2024-49954", "CVE-2024-49955", "CVE-2024-49957", "CVE-2024-49958", "CVE-2024-49959", "CVE-2024-49962", "CVE-2024-49963", "CVE-2024-49965", "CVE-2024-49966", "CVE-2024-49967", "CVE-2024-49969", "CVE-2024-49973", "CVE-2024-49975", "CVE-2024-49977", "CVE-2024-49981", "CVE-2024-49982", "CVE-2024-49983", "CVE-2024-49985", "CVE-2024-49995", "CVE-2024-49997", "CVE-2024-50000", "CVE-2024-50001", "CVE-2024-50002", "CVE-2024-50003", "CVE-2024-50006", "CVE-2024-50007", "CVE-2024-50008", "CVE-2024-50013", "CVE-2024-50015", "CVE-2024-50019", "CVE-2024-50024", "CVE-2024-50031", "CVE-2024-50033", "CVE-2024-50035", "CVE-2024-50038", "CVE-2024-50039", "CVE-2024-50040", "CVE-2024-50041", "CVE-2024-50044", "CVE-2024-50045", "CVE-2024-50046", "CVE-2024-50049", "CVE-2024-50059", "CVE-2024-50062", "CVE-2024-50093", "CVE-2024-50095", "CVE-2024-50096", "CVE-2024-50179", "CVE-2024-50180", "CVE-2024-50181", "CVE-2024-50184", "CVE-2024-50186", "CVE-2024-50188", "CVE-2024-50189", "CVE-2024-50191");
  script_tag(name:"creation_date", value:"2024-12-18 04:08:13 +0000 (Wed, 18 Dec 2024)");
  script_version("2024-12-19T05:05:34+0000");
  script_tag(name:"last_modification", value:"2024-12-19 05:05:34 +0000 (Thu, 19 Dec 2024)");
  script_tag(name:"cvss_base", value:"9.4");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:N/A:C");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2024-10-23 15:19:06 +0000 (Wed, 23 Oct 2024)");

  script_name("Ubuntu: Security Advisory (USN-7166-1)");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2024 Greenbone AG");
  script_family("Ubuntu Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/ubuntu_linux", "ssh/login/packages", re:"ssh/login/release=UBUNTU(20\.04\ LTS|22\.04\ LTS)");

  script_xref(name:"Advisory-ID", value:"USN-7166-1");
  script_xref(name:"URL", value:"https://ubuntu.com/security/notices/USN-7166-1");

  script_tag(name:"summary", value:"The remote host is missing an update for the 'linux, linux-gcp, linux-gcp-5.15, linux-gke, linux-gkeop, linux-ibm, linux-ibm-5.15, linux-kvm, linux-lowlatency, linux-lowlatency-hwe-5.15, linux-nvidia, linux-oracle, linux-oracle-5.15, linux-raspi' package(s) announced via the USN-7166-1 advisory.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");

  script_tag(name:"insight", value:"Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
 - ARM32 architecture,
 - RISC-V architecture,
 - S390 architecture,
 - x86 architecture,
 - Block layer subsystem,
 - ACPI drivers,
 - Drivers core,
 - ATA over ethernet (AOE) driver,
 - TPM device driver,
 - Clock framework and drivers,
 - Buffer Sharing and Synchronization framework,
 - EFI core,
 - GPIO subsystem,
 - GPU drivers,
 - HID subsystem,
 - I2C subsystem,
 - InfiniBand drivers,
 - Input Device core drivers,
 - Mailbox framework,
 - Media drivers,
 - Ethernet bonding driver,
 - Network drivers,
 - Mellanox network drivers,
 - Microsoft Azure Network Adapter (MANA) driver,
 - STMicroelectronics network drivers,
 - NTB driver,
 - Virtio pmem driver,
 - PCI subsystem,
 - x86 platform drivers,
 - S/390 drivers,
 - SCSI subsystem,
 - SPI subsystem,
 - Thermal drivers,
 - USB Device Class drivers,
 - USB Type-C Port Controller Manager driver,
 - VFIO drivers,
 - Virtio Host (VHOST) subsystem,
 - Framebuffer layer,
 - 9P distributed file system,
 - BTRFS file system,
 - Ceph distributed file system,
 - File systems infrastructure,
 - Ext4 file system,
 - F2FS file system,
 - GFS2 file system,
 - JFS file system,
 - Network file system (NFS) client,
 - Network file system (NFS) server daemon,
 - NILFS2 file system,
 - Network file system (NFS) superblock,
 - Bluetooth subsystem,
 - Network traffic control,
 - Network sockets,
 - TCP network protocol,
 - BPF subsystem,
 - Perf events,
 - Kernel thread helper (kthread),
 - Padata parallel execution mechanism,
 - Arbitrary resource management,
 - Static call mechanism,
 - Tracing infrastructure,
 - Memory management,
 - Ethernet bridge,
 - CAN network layer,
 - Networking core,
 - IPv4 networking,
 - IPv6 networking,
 - MAC80211 subsystem,
 - Multipath TCP,
 - Netfilter,
 - Netlink,
 - SCTP protocol,
 - TIPC protocol,
 - SELinux security module,
 - Simplified Mandatory Access Control Kernel framework,
 - AudioScience HPI driver,
 - Amlogic Meson SoC drivers,
 - USB sound devices,
(CVE-2024-49944, CVE-2024-49907, CVE-2024-50062, CVE-2024-36893,
CVE-2024-49985, CVE-2024-49903, CVE-2024-49886, CVE-2024-50180,
CVE-2024-47757, CVE-2024-49938, CVE-2024-49902, CVE-2024-47709,
CVE-2024-49884, CVE-2024-49967, CVE-2024-49977, CVE-2024-47734,
CVE-2024-49954, CVE-2024-49963, CVE-2024-47747, CVE-2024-50008,
CVE-2024-47696, CVE-2024-50038, CVE-2024-46695, CVE-2024-47705,
CVE-2024-49957, CVE-2024-38538, CVE-2024-50019, CVE-2024-38544,
CVE-2024-50003, CVE-2024-50095, CVE-2024-50000, CVE-2024-49981,
CVE-2024-49863, CVE-2024-47710, CVE-2024-49983, CVE-2024-26947,
CVE-2024-46852, CVE-2024-49871, CVE-2024-49936, CVE-2024-47720,
CVE-2024-49881, CVE-2024-47672, CVE-2024-50040, CVE-2024-49997,
CVE-2024-50044, CVE-2023-52532, CVE-2024-47740, ... [Please see the references for more information on the vulnerabilities]");

  script_tag(name:"affected", value:"'linux, linux-gcp, linux-gcp-5.15, linux-gke, linux-gkeop, linux-ibm, linux-ibm-5.15, linux-kvm, linux-lowlatency, linux-lowlatency-hwe-5.15, linux-nvidia, linux-oracle, linux-oracle-5.15, linux-raspi' package(s) on Ubuntu 20.04, Ubuntu 22.04.");

  script_tag(name:"solution", value:"Please install the updated package(s).");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"package");

  exit(0);
}

include("revisions-lib.inc");
include("pkg-lib-deb.inc");

release = dpkg_get_ssh_release();
if(!release)
  exit(0);

res = "";
report = "";

if(release == "UBUNTU20.04 LTS") {

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.15.0-1066-ibm", ver:"5.15.0-1066.69~20.04.1", rls:"UBUNTU20.04 LTS"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.15.0-1071-oracle", ver:"5.15.0-1071.77~20.04.1", rls:"UBUNTU20.04 LTS"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.15.0-1072-gcp", ver:"5.15.0-1072.80~20.04.1", rls:"UBUNTU20.04 LTS"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.15.0-127-lowlatency", ver:"5.15.0-127.137~20.04.1", rls:"UBUNTU20.04 LTS"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.15.0-127-lowlatency-64k", ver:"5.15.0-127.137~20.04.1", rls:"UBUNTU20.04 LTS"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-gcp", ver:"5.15.0.1072.80~20.04.1", rls:"UBUNTU20.04 LTS"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-ibm", ver:"5.15.0.1066.69~20.04.1", rls:"UBUNTU20.04 LTS"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-lowlatency-64k-hwe-20.04", ver:"5.15.0.127.137~20.04.1", rls:"UBUNTU20.04 LTS"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-lowlatency-hwe-20.04", ver:"5.15.0.127.137~20.04.1", rls:"UBUNTU20.04 LTS"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-oracle", ver:"5.15.0.1071.77~20.04.1", rls:"UBUNTU20.04 LTS"))) {
    report += res;
  }

  if(report != "") {
    security_message(data:report);
  } else if(__pkg_match) {
    exit(99);
  }
  exit(0);
}

if(release == "UBUNTU22.04 LTS") {

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.15.0-1056-gkeop", ver:"5.15.0-1056.63", rls:"UBUNTU22.04 LTS"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.15.0-1066-ibm", ver:"5.15.0-1066.69", rls:"UBUNTU22.04 LTS"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.15.0-1066-raspi", ver:"5.15.0-1066.69", rls:"UBUNTU22.04 LTS"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.15.0-1068-nvidia", ver:"5.15.0-1068.69", rls:"UBUNTU22.04 LTS"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.15.0-1068-nvidia-lowlatency", ver:"5.15.0-1068.69", rls:"UBUNTU22.04 LTS"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.15.0-1070-gke", ver:"5.15.0-1070.76", rls:"UBUNTU22.04 LTS"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.15.0-1070-kvm", ver:"5.15.0-1070.75", rls:"UBUNTU22.04 LTS"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.15.0-1071-oracle", ver:"5.15.0-1071.77", rls:"UBUNTU22.04 LTS"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.15.0-1072-gcp", ver:"5.15.0-1072.80", rls:"UBUNTU22.04 LTS"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.15.0-127-generic", ver:"5.15.0-127.137", rls:"UBUNTU22.04 LTS"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.15.0-127-generic-64k", ver:"5.15.0-127.137", rls:"UBUNTU22.04 LTS"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.15.0-127-generic-lpae", ver:"5.15.0-127.137", rls:"UBUNTU22.04 LTS"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.15.0-127-lowlatency", ver:"5.15.0-127.137", rls:"UBUNTU22.04 LTS"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.15.0-127-lowlatency-64k", ver:"5.15.0-127.137", rls:"UBUNTU22.04 LTS"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-gcp-lts-22.04", ver:"5.15.0.1072.68", rls:"UBUNTU22.04 LTS"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-generic", ver:"5.15.0.127.126", rls:"UBUNTU22.04 LTS"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-generic-64k", ver:"5.15.0.127.126", rls:"UBUNTU22.04 LTS"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-generic-lpae", ver:"5.15.0.127.126", rls:"UBUNTU22.04 LTS"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-gke", ver:"5.15.0.1070.69", rls:"UBUNTU22.04 LTS"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-gke-5.15", ver:"5.15.0.1070.69", rls:"UBUNTU22.04 LTS"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-gkeop", ver:"5.15.0.1056.55", rls:"UBUNTU22.04 LTS"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-gkeop-5.15", ver:"5.15.0.1056.55", rls:"UBUNTU22.04 LTS"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-ibm", ver:"5.15.0.1066.62", rls:"UBUNTU22.04 LTS"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-kvm", ver:"5.15.0.1070.66", rls:"UBUNTU22.04 LTS"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-lowlatency", ver:"5.15.0.127.115", rls:"UBUNTU22.04 LTS"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-lowlatency-64k", ver:"5.15.0.127.115", rls:"UBUNTU22.04 LTS"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-nvidia", ver:"5.15.0.1068.68", rls:"UBUNTU22.04 LTS"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-nvidia-lowlatency", ver:"5.15.0.1068.68", rls:"UBUNTU22.04 LTS"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-oracle-lts-22.04", ver:"5.15.0.1071.67", rls:"UBUNTU22.04 LTS"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-raspi", ver:"5.15.0.1066.64", rls:"UBUNTU22.04 LTS"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-raspi-nolpae", ver:"5.15.0.1066.64", rls:"UBUNTU22.04 LTS"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"linux-image-virtual", ver:"5.15.0.127.126", rls:"UBUNTU22.04 LTS"))) {
    report += res;
  }

  if(report != "") {
    security_message(data:report);
  } else if(__pkg_match) {
    exit(99);
  }
  exit(0);
}

exit(0);

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
18 Dec 2024 00:00Current
7.5High risk
Vulners AI Score7.5
CVSS39.1
EPSS0.001
SSVC
22
.json
Report