Ubuntu Security Advisory addresses multiple critical vulnerabilities through various CVEs.
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | Ubuntu: Security Advisory (USN-7166-3) | 23 Dec 202400:00 | – | openvas |
![]() | Ubuntu: Security Advisory (USN-7166-4) | 21 Jan 202500:00 | – | openvas |
![]() | Ubuntu: Security Advisory (USN-7166-2) | 19 Dec 202400:00 | – | openvas |
![]() | Ubuntu: Security Advisory (USN-7186-2) | 10 Jan 202500:00 | – | openvas |
![]() | Ubuntu: Security Advisory (USN-7186-1) | 7 Jan 202500:00 | – | openvas |
![]() | Mageia: Security Advisory (MGASA-2024-0345) | 4 Nov 202400:00 | – | openvas |
![]() | Mageia: Security Advisory (MGASA-2024-0344) | 4 Nov 202400:00 | – | openvas |
![]() | Ubuntu: Security Advisory (USN-7194-1) | 10 Jan 202500:00 | – | openvas |
![]() | openSUSE: Security Advisory for the Linux Kernel (SUSE-SU-2024:3984-1) | 14 Nov 202400:00 | – | openvas |
![]() | Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2025-1159) | 10 Feb 202500:00 | – | openvas |
Source | Link |
---|---|
ubuntu | www.ubuntu.com/security/notices/USN-7166-1 |
# SPDX-FileCopyrightText: 2024 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.1.12.2024.7166.1");
script_cve_id("CVE-2023-52532", "CVE-2023-52621", "CVE-2023-52639", "CVE-2023-52904", "CVE-2023-52917", "CVE-2024-26947", "CVE-2024-27072", "CVE-2024-35904", "CVE-2024-35951", "CVE-2024-36893", "CVE-2024-36968", "CVE-2024-38538", "CVE-2024-38544", "CVE-2024-38545", "CVE-2024-38632", "CVE-2024-38667", "CVE-2024-39463", "CVE-2024-41016", "CVE-2024-42079", "CVE-2024-42156", "CVE-2024-42158", "CVE-2024-44931", "CVE-2024-44940", "CVE-2024-44942", "CVE-2024-46695", "CVE-2024-46849", "CVE-2024-46852", "CVE-2024-46853", "CVE-2024-46854", "CVE-2024-46855", "CVE-2024-46858", "CVE-2024-46859", "CVE-2024-46865", "CVE-2024-47670", "CVE-2024-47671", "CVE-2024-47672", "CVE-2024-47673", "CVE-2024-47674", "CVE-2024-47679", "CVE-2024-47684", "CVE-2024-47685", "CVE-2024-47690", "CVE-2024-47692", "CVE-2024-47693", "CVE-2024-47695", "CVE-2024-47696", "CVE-2024-47697", "CVE-2024-47698", "CVE-2024-47699", "CVE-2024-47701", "CVE-2024-47705", "CVE-2024-47706", "CVE-2024-47709", "CVE-2024-47710", "CVE-2024-47712", "CVE-2024-47713", "CVE-2024-47718", "CVE-2024-47720", "CVE-2024-47723", "CVE-2024-47734", "CVE-2024-47735", "CVE-2024-47737", "CVE-2024-47739", "CVE-2024-47740", "CVE-2024-47742", "CVE-2024-47747", "CVE-2024-47748", "CVE-2024-47749", "CVE-2024-47756", "CVE-2024-47757", "CVE-2024-49851", "CVE-2024-49852", "CVE-2024-49856", "CVE-2024-49858", "CVE-2024-49860", "CVE-2024-49863", "CVE-2024-49866", "CVE-2024-49867", "CVE-2024-49868", "CVE-2024-49871", "CVE-2024-49875", "CVE-2024-49877", "CVE-2024-49878", "CVE-2024-49879", "CVE-2024-49881", "CVE-2024-49882", "CVE-2024-49883", "CVE-2024-49884", "CVE-2024-49886", "CVE-2024-49889", "CVE-2024-49890", "CVE-2024-49892", "CVE-2024-49894", "CVE-2024-49895", "CVE-2024-49896", "CVE-2024-49900", "CVE-2024-49902", "CVE-2024-49903", "CVE-2024-49907", "CVE-2024-49913", "CVE-2024-49924", "CVE-2024-49927", "CVE-2024-49930", "CVE-2024-49933", "CVE-2024-49935", "CVE-2024-49936", "CVE-2024-49938", "CVE-2024-49944", "CVE-2024-49946", "CVE-2024-49948", "CVE-2024-49949", "CVE-2024-49952", "CVE-2024-49954", "CVE-2024-49955", "CVE-2024-49957", "CVE-2024-49958", "CVE-2024-49959", "CVE-2024-49962", "CVE-2024-49963", "CVE-2024-49965", "CVE-2024-49966", "CVE-2024-49967", "CVE-2024-49969", "CVE-2024-49973", "CVE-2024-49975", "CVE-2024-49977", "CVE-2024-49981", "CVE-2024-49982", "CVE-2024-49983", "CVE-2024-49985", "CVE-2024-49995", "CVE-2024-49997", "CVE-2024-50000", "CVE-2024-50001", "CVE-2024-50002", "CVE-2024-50003", "CVE-2024-50006", "CVE-2024-50007", "CVE-2024-50008", "CVE-2024-50013", "CVE-2024-50015", "CVE-2024-50019", "CVE-2024-50024", "CVE-2024-50031", "CVE-2024-50033", "CVE-2024-50035", "CVE-2024-50038", "CVE-2024-50039", "CVE-2024-50040", "CVE-2024-50041", "CVE-2024-50044", "CVE-2024-50045", "CVE-2024-50046", "CVE-2024-50049", "CVE-2024-50059", "CVE-2024-50062", "CVE-2024-50093", "CVE-2024-50095", "CVE-2024-50096", "CVE-2024-50179", "CVE-2024-50180", "CVE-2024-50181", "CVE-2024-50184", "CVE-2024-50186", "CVE-2024-50188", "CVE-2024-50189", "CVE-2024-50191");
script_tag(name:"creation_date", value:"2024-12-18 04:08:13 +0000 (Wed, 18 Dec 2024)");
script_version("2024-12-19T05:05:34+0000");
script_tag(name:"last_modification", value:"2024-12-19 05:05:34 +0000 (Thu, 19 Dec 2024)");
script_tag(name:"cvss_base", value:"9.4");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:N/A:C");
script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2024-10-23 15:19:06 +0000 (Wed, 23 Oct 2024)");
script_name("Ubuntu: Security Advisory (USN-7166-1)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2024 Greenbone AG");
script_family("Ubuntu Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/ubuntu_linux", "ssh/login/packages", re:"ssh/login/release=UBUNTU(20\.04\ LTS|22\.04\ LTS)");
script_xref(name:"Advisory-ID", value:"USN-7166-1");
script_xref(name:"URL", value:"https://ubuntu.com/security/notices/USN-7166-1");
script_tag(name:"summary", value:"The remote host is missing an update for the 'linux, linux-gcp, linux-gcp-5.15, linux-gke, linux-gkeop, linux-ibm, linux-ibm-5.15, linux-kvm, linux-lowlatency, linux-lowlatency-hwe-5.15, linux-nvidia, linux-oracle, linux-oracle-5.15, linux-raspi' package(s) announced via the USN-7166-1 advisory.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");
script_tag(name:"insight", value:"Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM32 architecture,
- RISC-V architecture,
- S390 architecture,
- x86 architecture,
- Block layer subsystem,
- ACPI drivers,
- Drivers core,
- ATA over ethernet (AOE) driver,
- TPM device driver,
- Clock framework and drivers,
- Buffer Sharing and Synchronization framework,
- EFI core,
- GPIO subsystem,
- GPU drivers,
- HID subsystem,
- I2C subsystem,
- InfiniBand drivers,
- Input Device core drivers,
- Mailbox framework,
- Media drivers,
- Ethernet bonding driver,
- Network drivers,
- Mellanox network drivers,
- Microsoft Azure Network Adapter (MANA) driver,
- STMicroelectronics network drivers,
- NTB driver,
- Virtio pmem driver,
- PCI subsystem,
- x86 platform drivers,
- S/390 drivers,
- SCSI subsystem,
- SPI subsystem,
- Thermal drivers,
- USB Device Class drivers,
- USB Type-C Port Controller Manager driver,
- VFIO drivers,
- Virtio Host (VHOST) subsystem,
- Framebuffer layer,
- 9P distributed file system,
- BTRFS file system,
- Ceph distributed file system,
- File systems infrastructure,
- Ext4 file system,
- F2FS file system,
- GFS2 file system,
- JFS file system,
- Network file system (NFS) client,
- Network file system (NFS) server daemon,
- NILFS2 file system,
- Network file system (NFS) superblock,
- Bluetooth subsystem,
- Network traffic control,
- Network sockets,
- TCP network protocol,
- BPF subsystem,
- Perf events,
- Kernel thread helper (kthread),
- Padata parallel execution mechanism,
- Arbitrary resource management,
- Static call mechanism,
- Tracing infrastructure,
- Memory management,
- Ethernet bridge,
- CAN network layer,
- Networking core,
- IPv4 networking,
- IPv6 networking,
- MAC80211 subsystem,
- Multipath TCP,
- Netfilter,
- Netlink,
- SCTP protocol,
- TIPC protocol,
- SELinux security module,
- Simplified Mandatory Access Control Kernel framework,
- AudioScience HPI driver,
- Amlogic Meson SoC drivers,
- USB sound devices,
(CVE-2024-49944, CVE-2024-49907, CVE-2024-50062, CVE-2024-36893,
CVE-2024-49985, CVE-2024-49903, CVE-2024-49886, CVE-2024-50180,
CVE-2024-47757, CVE-2024-49938, CVE-2024-49902, CVE-2024-47709,
CVE-2024-49884, CVE-2024-49967, CVE-2024-49977, CVE-2024-47734,
CVE-2024-49954, CVE-2024-49963, CVE-2024-47747, CVE-2024-50008,
CVE-2024-47696, CVE-2024-50038, CVE-2024-46695, CVE-2024-47705,
CVE-2024-49957, CVE-2024-38538, CVE-2024-50019, CVE-2024-38544,
CVE-2024-50003, CVE-2024-50095, CVE-2024-50000, CVE-2024-49981,
CVE-2024-49863, CVE-2024-47710, CVE-2024-49983, CVE-2024-26947,
CVE-2024-46852, CVE-2024-49871, CVE-2024-49936, CVE-2024-47720,
CVE-2024-49881, CVE-2024-47672, CVE-2024-50040, CVE-2024-49997,
CVE-2024-50044, CVE-2023-52532, CVE-2024-47740, ... [Please see the references for more information on the vulnerabilities]");
script_tag(name:"affected", value:"'linux, linux-gcp, linux-gcp-5.15, linux-gke, linux-gkeop, linux-ibm, linux-ibm-5.15, linux-kvm, linux-lowlatency, linux-lowlatency-hwe-5.15, linux-nvidia, linux-oracle, linux-oracle-5.15, linux-raspi' package(s) on Ubuntu 20.04, Ubuntu 22.04.");
script_tag(name:"solution", value:"Please install the updated package(s).");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"package");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-deb.inc");
release = dpkg_get_ssh_release();
if(!release)
exit(0);
res = "";
report = "";
if(release == "UBUNTU20.04 LTS") {
if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.15.0-1066-ibm", ver:"5.15.0-1066.69~20.04.1", rls:"UBUNTU20.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.15.0-1071-oracle", ver:"5.15.0-1071.77~20.04.1", rls:"UBUNTU20.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.15.0-1072-gcp", ver:"5.15.0-1072.80~20.04.1", rls:"UBUNTU20.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.15.0-127-lowlatency", ver:"5.15.0-127.137~20.04.1", rls:"UBUNTU20.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.15.0-127-lowlatency-64k", ver:"5.15.0-127.137~20.04.1", rls:"UBUNTU20.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-gcp", ver:"5.15.0.1072.80~20.04.1", rls:"UBUNTU20.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-ibm", ver:"5.15.0.1066.69~20.04.1", rls:"UBUNTU20.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-lowlatency-64k-hwe-20.04", ver:"5.15.0.127.137~20.04.1", rls:"UBUNTU20.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-lowlatency-hwe-20.04", ver:"5.15.0.127.137~20.04.1", rls:"UBUNTU20.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-oracle", ver:"5.15.0.1071.77~20.04.1", rls:"UBUNTU20.04 LTS"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
if(release == "UBUNTU22.04 LTS") {
if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.15.0-1056-gkeop", ver:"5.15.0-1056.63", rls:"UBUNTU22.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.15.0-1066-ibm", ver:"5.15.0-1066.69", rls:"UBUNTU22.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.15.0-1066-raspi", ver:"5.15.0-1066.69", rls:"UBUNTU22.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.15.0-1068-nvidia", ver:"5.15.0-1068.69", rls:"UBUNTU22.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.15.0-1068-nvidia-lowlatency", ver:"5.15.0-1068.69", rls:"UBUNTU22.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.15.0-1070-gke", ver:"5.15.0-1070.76", rls:"UBUNTU22.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.15.0-1070-kvm", ver:"5.15.0-1070.75", rls:"UBUNTU22.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.15.0-1071-oracle", ver:"5.15.0-1071.77", rls:"UBUNTU22.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.15.0-1072-gcp", ver:"5.15.0-1072.80", rls:"UBUNTU22.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.15.0-127-generic", ver:"5.15.0-127.137", rls:"UBUNTU22.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.15.0-127-generic-64k", ver:"5.15.0-127.137", rls:"UBUNTU22.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.15.0-127-generic-lpae", ver:"5.15.0-127.137", rls:"UBUNTU22.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.15.0-127-lowlatency", ver:"5.15.0-127.137", rls:"UBUNTU22.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.15.0-127-lowlatency-64k", ver:"5.15.0-127.137", rls:"UBUNTU22.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-gcp-lts-22.04", ver:"5.15.0.1072.68", rls:"UBUNTU22.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-generic", ver:"5.15.0.127.126", rls:"UBUNTU22.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-generic-64k", ver:"5.15.0.127.126", rls:"UBUNTU22.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-generic-lpae", ver:"5.15.0.127.126", rls:"UBUNTU22.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-gke", ver:"5.15.0.1070.69", rls:"UBUNTU22.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-gke-5.15", ver:"5.15.0.1070.69", rls:"UBUNTU22.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-gkeop", ver:"5.15.0.1056.55", rls:"UBUNTU22.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-gkeop-5.15", ver:"5.15.0.1056.55", rls:"UBUNTU22.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-ibm", ver:"5.15.0.1066.62", rls:"UBUNTU22.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-kvm", ver:"5.15.0.1070.66", rls:"UBUNTU22.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-lowlatency", ver:"5.15.0.127.115", rls:"UBUNTU22.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-lowlatency-64k", ver:"5.15.0.127.115", rls:"UBUNTU22.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-nvidia", ver:"5.15.0.1068.68", rls:"UBUNTU22.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-nvidia-lowlatency", ver:"5.15.0.1068.68", rls:"UBUNTU22.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-oracle-lts-22.04", ver:"5.15.0.1071.67", rls:"UBUNTU22.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-raspi", ver:"5.15.0.1066.64", rls:"UBUNTU22.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-raspi-nolpae", ver:"5.15.0.1066.64", rls:"UBUNTU22.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-virtual", ver:"5.15.0.127.126", rls:"UBUNTU22.04 LTS"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
exit(0);
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo