[USN-7170-1] Linux kernel (OEM) vulnerabilities
Rodrigo Figueiredo Zaiden
rodrigo.zaiden at canonical.com
Tue Dec 17 20:12:04 UTC 2024
==========================================================================
Ubuntu Security Notice USN-7170-1
December 17, 2024
linux-oem-6.11 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-oem-6.11: Linux kernel for OEM systems
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- GPU drivers;
- Ext4 file system;
- Network traffic control;
- VMware vSockets driver;
(CVE-2024-49914, CVE-2024-49912, CVE-2024-49919, CVE-2024-49905,
CVE-2024-49909, CVE-2024-47704, CVE-2024-49916, CVE-2024-49908,
CVE-2024-49899, CVE-2024-49923, CVE-2024-49921, CVE-2024-50264,
CVE-2024-49911, CVE-2024-49893, CVE-2024-53057, CVE-2024-49904,
CVE-2024-49898, CVE-2024-49907, CVE-2024-49897, CVE-2024-49913,
CVE-2024-49967, CVE-2024-49922, CVE-2024-49920, CVE-2024-49896,
CVE-2024-49906, CVE-2024-49917, CVE-2024-49910, CVE-2024-49915,
CVE-2024-49918)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
linux-image-6.11.0-1010-oem 6.11.0-1010.10
linux-image-oem-24.04b 6.11.0-1010.10
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-7170-1
CVE-2024-47704, CVE-2024-49893, CVE-2024-49896, CVE-2024-49897,
CVE-2024-49898, CVE-2024-49899, CVE-2024-49904, CVE-2024-49905,
CVE-2024-49906, CVE-2024-49907, CVE-2024-49908, CVE-2024-49909,
CVE-2024-49910, CVE-2024-49911, CVE-2024-49912, CVE-2024-49913,
CVE-2024-49914, CVE-2024-49915, CVE-2024-49916, CVE-2024-49917,
CVE-2024-49918, CVE-2024-49919, CVE-2024-49920, CVE-2024-49921,
CVE-2024-49922, CVE-2024-49923, CVE-2024-49967, CVE-2024-50264,
CVE-2024-53057
Package Information:
https://launchpad.net/ubuntu/+source/linux-oem-6.11/6.11.0-1010.10
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature.asc
Type: application/pgp-signature
Size: 495 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20241217/116edb02/attachment-0001.sig>
More information about the ubuntu-security-announce
mailing list