-----BEGIN PGP SIGNATURE-----
wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmdh2xUFAwAAAAAACgkQZ0GeRcM5nt1v
Cwf+MtrlEZEHWWdUnNaRFSjGQfisNkGrjYymtp0qXQAT+o3qePHp5oL/nDTjkzuC35UVICImu+Wx
MdcbK0oR63ibf546wvlgPZ66RLKV742x5e8yjRwbQ/AE+sbUARuVDCYEChPcBDMKqdegQ7jAEsNE
p3KAlw6aX21nsj/VmpraU9ogYzWlG+UfLMTztGbmsTO5VMVlbzdK6qbe9bsF8xNnY8I4NK2eTnwO
IxUAMNANH2nzMszkHk8O+qfqp4X46fMTNXNDkWsWEb/QWxsoJBJmJ8JJwq8DQDGN62kbP6jnGmX+
qJz6rpW6vXL1iBBjbm9MqOaGeZ2/83HPWk0/5G7z9A==
=YD/7
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-7170-1
December 17, 2024
linux-oem-6.11 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-oem-6.11: Linux kernel for OEM systems
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- GPU drivers;
- Ext4 file system;
- Network traffic control;
- VMware vSockets driver;
(CVE-2024-49914, CVE-2024-49912, CVE-2024-49919, CVE-2024-49905,
CVE-2024-49909, CVE-2024-47704, CVE-2024-49916, CVE-2024-49908,
CVE-2024-49899, CVE-2024-49923, CVE-2024-49921, CVE-2024-50264,
CVE-2024-49911, CVE-2024-49893, CVE-2024-53057, CVE-2024-49904,
CVE-2024-49898, CVE-2024-49907, CVE-2024-49897, CVE-2024-49913,
CVE-2024-49967, CVE-2024-49922, CVE-2024-49920, CVE-2024-49896,
CVE-2024-49906, CVE-2024-49917, CVE-2024-49910, CVE-2024-49915,
CVE-2024-49918)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
linux-image-6.11.0-1010-oem 6.11.0-1010.10
linux-image-oem-24.04b 6.11.0-1010.10
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-7170-1
CVE-2024-47704, CVE-2024-49893, CVE-2024-49896, CVE-2024-49897,
CVE-2024-49898, CVE-2024-49899, CVE-2024-49904, CVE-2024-49905,
CVE-2024-49906, CVE-2024-49907, CVE-2024-49908, CVE-2024-49909,
CVE-2024-49910, CVE-2024-49911, CVE-2024-49912, CVE-2024-49913,
CVE-2024-49914, CVE-2024-49915, CVE-2024-49916, CVE-2024-49917,
CVE-2024-49918, CVE-2024-49919, CVE-2024-49920, CVE-2024-49921,
CVE-2024-49922, CVE-2024-49923, CVE-2024-49967, CVE-2024-50264,
CVE-2024-53057
Package Information:
https://launchpad.net/ubuntu/+source/linux-oem-6.11/6.11.0-1010.10
No comments:
Post a Comment