Lucene search

K
osvGoogleOSV:USN-6951-2
HistoryAug 14, 2024 - 5:25 p.m.

linux-azure vulnerabilities

2024-08-1417:25:05
Google
osv.dev
9
linux kernel
vulnerabilities
security issues
arm64 architecture
m68k architecture
x86 architecture
accessibility subsystem
character device driver
clock framework
cpu frequency scaling
hardware crypto
firewire
gpu drivers
media drivers
network drivers
s/390 drivers
scsi drivers
soundwire
tty drivers
framebuffer
file systems
networking
bluetooth
netfilter
nfc
open vswitch
unix domain sockets
wireless networking
alsa framework
cve-2024-xxxxx.

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

8

Confidence

High

EPSS

0.001

Percentile

43.7%

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:

  • ARM64 architecture;
  • M68K architecture;
  • User-Mode Linux (UML);
  • x86 architecture;
  • Accessibility subsystem;
  • Character device driver;
  • Clock framework and drivers;
  • CPU frequency scaling framework;
  • Hardware crypto device drivers;
  • Buffer Sharing and Synchronization framework;
  • FireWire subsystem;
  • GPU drivers;
  • HW tracing;
  • Macintosh device drivers;
  • Multiple devices driver;
  • Media drivers;
  • Network drivers;
  • Pin controllers subsystem;
  • S/390 drivers;
  • SCSI drivers;
  • SoundWire subsystem;
  • Greybus lights staging drivers;
  • TTY drivers;
  • Framebuffer layer;
  • Virtio drivers;
  • 9P distributed file system;
  • eCrypt file system;
  • EROFS file system;
  • Ext4 file system;
  • F2FS file system;
  • JFFS2 file system;
  • Network file system client;
  • NILFS2 file system;
  • SMB network file system;
  • Kernel debugger infrastructure;
  • IRQ subsystem;
  • Tracing infrastructure;
  • Dynamic debug library;
  • 9P file system network protocol;
  • Bluetooth subsystem;
  • Networking core;
  • IPv4 networking;
  • IPv6 networking;
  • Netfilter;
  • NET/ROM layer;
  • NFC subsystem;
  • NSH protocol;
  • Open vSwitch;
  • Phonet protocol;
  • TIPC protocol;
  • Unix domain sockets;
  • Wireless networking;
  • eXpress Data Path;
  • XFRM subsystem;
  • ALSA framework;
    (CVE-2024-36934, CVE-2024-38578, CVE-2024-38600, CVE-2024-27399,
    CVE-2024-39276, CVE-2024-38596, CVE-2024-36933, CVE-2024-36919,
    CVE-2024-35976, CVE-2024-37356, CVE-2023-52585, CVE-2024-38558,
    CVE-2024-38560, CVE-2024-38634, CVE-2024-36959, CVE-2024-38633,
    CVE-2024-36886, CVE-2024-27398, CVE-2024-39493, CVE-2024-26886,
    CVE-2024-31076, CVE-2024-38559, CVE-2024-38615, CVE-2024-36971,
    CVE-2024-38627, CVE-2024-36964, CVE-2024-38780, CVE-2024-37353,
    CVE-2024-38621, CVE-2024-36883, CVE-2024-39488, CVE-2024-38661,
    CVE-2024-36939, CVE-2024-38589, CVE-2024-38565, CVE-2024-38381,
    CVE-2024-35947, CVE-2024-36905, CVE-2022-48772, CVE-2024-36017,
    CVE-2024-36946, CVE-2024-27401, CVE-2024-38579, CVE-2024-38612,
    CVE-2024-38598, CVE-2024-38635, CVE-2024-38587, CVE-2024-38567,
    CVE-2024-38549, CVE-2024-36960, CVE-2023-52752, CVE-2024-27019,
    CVE-2024-38601, CVE-2024-39489, CVE-2024-39467, CVE-2023-52882,
    CVE-2024-38583, CVE-2024-39480, CVE-2024-38607, CVE-2024-36940,
    CVE-2024-38659, CVE-2023-52434, CVE-2024-36015, CVE-2024-38582,
    CVE-2024-36950, CVE-2024-38552, CVE-2024-33621, CVE-2024-36954,
    CVE-2024-39475, CVE-2024-39301, CVE-2024-38599, CVE-2024-36902,
    CVE-2024-36286, CVE-2024-38613, CVE-2024-38637, CVE-2024-36941,
    CVE-2024-36014, CVE-2024-38618, CVE-2024-36904, CVE-2024-36270,
    CVE-2024-39292, CVE-2024-39471, CVE-2022-48674)

References

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

8

Confidence

High

EPSS

0.001

Percentile

43.7%