Lucene search

K
ubuntuUbuntuUSN-6923-1
HistoryJul 29, 2024 - 12:00 a.m.

Linux kernel vulnerabilities

2024-07-2900:00:00
ubuntu.com
17
ubuntu
kernel
security
vulnerabilities
cve-2024

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.8

Confidence

Low

Releases

  • Ubuntu 22.04 LTS
  • Ubuntu 20.04 LTS

Packages

  • linux - Linux kernel
  • linux-aws - Linux kernel for Amazon Web Services (AWS) systems
  • linux-gcp - Linux kernel for Google Cloud Platform (GCP) systems
  • linux-gke - Linux kernel for Google Container Engine (GKE) systems
  • linux-gkeop - Linux kernel for Google Container Engine (GKE) systems
  • linux-gkeop-5.15 - Linux kernel for Google Container Engine (GKE) systems
  • linux-hwe-5.15 - Linux hardware enablement (HWE) kernel
  • linux-intel-iotg - Linux kernel for Intel IoT platforms
  • linux-intel-iotg-5.15 - Linux kernel for Intel IoT platforms
  • linux-kvm - Linux kernel for cloud environments
  • linux-lowlatency - Linux low latency kernel
  • linux-lowlatency-hwe-5.15 - Linux low latency kernel
  • linux-nvidia - Linux kernel for NVIDIA systems
  • linux-oracle - Linux kernel for Oracle Cloud systems

Details

Benedict Schlüter, Supraja Sridhara, Andrin Bertschi, and Shweta Shinde
discovered that an untrusted hypervisor could inject malicious #VC
interrupts and compromise the security guarantees of AMD SEV-SNP. This flaw
is known as WeSee. A local attacker in control of the hypervisor could use
this to expose sensitive information or possibly execute arbitrary code in
the trusted execution environment. (CVE-2024-25742)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:

  • TTY drivers;
  • SMB network file system;
  • Netfilter;
  • Bluetooth subsystem;
    (CVE-2024-26886, CVE-2024-26952, CVE-2023-52752, CVE-2024-27017,
    CVE-2024-36016)

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.8

Confidence

Low