Lucene search

K
ubuntuUbuntuUSN-6921-2
HistoryJul 30, 2024 - 12:00 a.m.

Linux kernel vulnerabilities

2024-07-3000:00:00
ubuntu.com
18
ubuntu 24.04 lts
linux low latency kernel
amd sev-snp
wesee
cve-2024-25742
dma engine subsystem
hid subsystem
i2c subsystem
phy drivers
tty drivers
ipv4 networking
cve-2024-35997
cve-2024-36016
cve-2024-35990
cve-2024-35984
cve-2024-35992
cve-2024-36008

CVSS3

7.7

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

AI Score

8.6

Confidence

High

Releases

  • Ubuntu 24.04 LTS

Packages

  • linux-lowlatency - Linux low latency kernel

Details

Benedict Schlüter, Supraja Sridhara, Andrin Bertschi, and Shweta Shinde
discovered that an untrusted hypervisor could inject malicious #VC
interrupts and compromise the security guarantees of AMD SEV-SNP. This flaw
is known as WeSee. A local attacker in control of the hypervisor could use
this to expose sensitive information or possibly execute arbitrary code in
the trusted execution environment. (CVE-2024-25742)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:

  • DMA engine subsystem;
  • HID subsystem;
  • I2C subsystem;
  • PHY drivers;
  • TTY drivers;
  • IPv4 networking;
    (CVE-2024-35997, CVE-2024-36016, CVE-2024-35990, CVE-2024-35984,
    CVE-2024-35992, CVE-2024-36008)

CVSS3

7.7

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

AI Score

8.6

Confidence

High