CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
16.8%
Benedict Schlüter, Supraja Sridhara, Andrin Bertschi, and Shweta Shinde
discovered that an untrusted hypervisor could inject malicious #VC
interrupts and compromise the security guarantees of AMD SEV-SNP. This flaw
is known as WeSee. A local attacker in control of the hypervisor could use
this to expose sensitive information or possibly execute arbitrary code in
the trusted execution environment. (CVE-2024-25742)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 22.04 | noarch | linux-image-5.15.0-1070-azure | < 5.15.0-1070.79 | UNKNOWN |
Ubuntu | 22.04 | noarch | linux-image-5.15.0-1070-azure-dbgsym | < 5.15.0-1070.79 | UNKNOWN |
Ubuntu | 22.04 | noarch | linux-image-5.15.0-1070-azure-fde | < 5.15.0-1070.79.1 | UNKNOWN |
Ubuntu | 22.04 | noarch | linux-image-5.15.0-1070-azure-fde-dbgsym | < 5.15.0-1070.79.1 | UNKNOWN |
Ubuntu | 22.04 | noarch | linux-image-azure-fde-lts-22.04 | < 5.15.0.1070.79.47 | UNKNOWN |
Ubuntu | 22.04 | noarch | linux-azure-fde-lts-22.04 | < 5.15.0.1070.79.47 | UNKNOWN |
Ubuntu | 22.04 | noarch | linux-cloud-tools-azure-fde-lts-22.04 | < 5.15.0.1070.79.47 | UNKNOWN |
Ubuntu | 22.04 | noarch | linux-headers-azure-fde-lts-22.04 | < 5.15.0.1070.79.47 | UNKNOWN |
Ubuntu | 22.04 | noarch | linux-modules-extra-azure-fde-lts-22.04 | < 5.15.0.1070.79.47 | UNKNOWN |
Ubuntu | 22.04 | noarch | linux-tools-azure-fde-lts-22.04 | < 5.15.0.1070.79.47 | UNKNOWN |
ubuntu.com/security/CVE-2023-52585
ubuntu.com/security/CVE-2023-52752
ubuntu.com/security/CVE-2023-52882
ubuntu.com/security/CVE-2024-25742
ubuntu.com/security/CVE-2024-26886
ubuntu.com/security/CVE-2024-26900
ubuntu.com/security/CVE-2024-26936
ubuntu.com/security/CVE-2024-26952
ubuntu.com/security/CVE-2024-26980
ubuntu.com/security/CVE-2024-27017
ubuntu.com/security/CVE-2024-27398
ubuntu.com/security/CVE-2024-27399
ubuntu.com/security/CVE-2024-27401
ubuntu.com/security/CVE-2024-35848
ubuntu.com/security/CVE-2024-35947
ubuntu.com/security/CVE-2024-36016
ubuntu.com/security/CVE-2024-36017
ubuntu.com/security/CVE-2024-36880
ubuntu.com/security/CVE-2024-36883
ubuntu.com/security/CVE-2024-36886
ubuntu.com/security/CVE-2024-36889
ubuntu.com/security/CVE-2024-36897
ubuntu.com/security/CVE-2024-36902
ubuntu.com/security/CVE-2024-36904
ubuntu.com/security/CVE-2024-36905
ubuntu.com/security/CVE-2024-36906
ubuntu.com/security/CVE-2024-36916
ubuntu.com/security/CVE-2024-36919
ubuntu.com/security/CVE-2024-36928
ubuntu.com/security/CVE-2024-36929
ubuntu.com/security/CVE-2024-36931
ubuntu.com/security/CVE-2024-36933
ubuntu.com/security/CVE-2024-36934
ubuntu.com/security/CVE-2024-36937
ubuntu.com/security/CVE-2024-36938
ubuntu.com/security/CVE-2024-36939
ubuntu.com/security/CVE-2024-36940
ubuntu.com/security/CVE-2024-36941
ubuntu.com/security/CVE-2024-36944
ubuntu.com/security/CVE-2024-36946
ubuntu.com/security/CVE-2024-36947
ubuntu.com/security/CVE-2024-36950
ubuntu.com/security/CVE-2024-36952
ubuntu.com/security/CVE-2024-36953
ubuntu.com/security/CVE-2024-36954
ubuntu.com/security/CVE-2024-36955
ubuntu.com/security/CVE-2024-36957
ubuntu.com/security/CVE-2024-36959
ubuntu.com/security/CVE-2024-36960
ubuntu.com/security/CVE-2024-36964
ubuntu.com/security/CVE-2024-36965
ubuntu.com/security/CVE-2024-36967
ubuntu.com/security/CVE-2024-36969
ubuntu.com/security/CVE-2024-36975
ubuntu.com/security/CVE-2024-38600