USN-6893-3

See a problem?
Source
https://ubuntu.com/security/notices/USN-6893-3
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6893-3.json
JSON Data
https://api.osv.dev/v1/vulns/USN-6893-3
Related
  • CVE-2023-52699
  • CVE-2024-24857
  • CVE-2024-24858
  • CVE-2024-24859
  • CVE-2024-26811
  • CVE-2024-26817
  • CVE-2024-26921
  • CVE-2024-26922
  • CVE-2024-26923
  • CVE-2024-26925
  • CVE-2024-26926
  • CVE-2024-26928
  • CVE-2024-26936
  • CVE-2024-26980
  • CVE-2024-26981
  • CVE-2024-26982
  • CVE-2024-26983
  • CVE-2024-26984
  • CVE-2024-26985
  • CVE-2024-26986
  • CVE-2024-26987
  • CVE-2024-26988
  • CVE-2024-26989
  • CVE-2024-26990
  • CVE-2024-26991
  • CVE-2024-26992
  • CVE-2024-26993
  • CVE-2024-26994
  • CVE-2024-26995
  • CVE-2024-26996
  • CVE-2024-26997
  • CVE-2024-26998
  • CVE-2024-26999
  • CVE-2024-27000
  • CVE-2024-27001
  • CVE-2024-27002
  • CVE-2024-27003
  • CVE-2024-27004
  • CVE-2024-27005
  • CVE-2024-27006
  • CVE-2024-27007
  • CVE-2024-27008
  • CVE-2024-27009
  • CVE-2024-27010
  • CVE-2024-27011
  • CVE-2024-27012
  • CVE-2024-27013
  • CVE-2024-27014
  • CVE-2024-27015
  • CVE-2024-27016
  • CVE-2024-27017
  • CVE-2024-27018
  • CVE-2024-27019
  • CVE-2024-27020
  • CVE-2024-27021
  • CVE-2024-27022
  • CVE-2024-35860
  • CVE-2024-35861
  • CVE-2024-35862
  • CVE-2024-35863
  • CVE-2024-35864
  • CVE-2024-35865
  • CVE-2024-35866
  • CVE-2024-35867
  • CVE-2024-35868
  • CVE-2024-35869
  • CVE-2024-35870
  • CVE-2024-35871
  • CVE-2024-35872
  • CVE-2024-35873
  • CVE-2024-35875
  • CVE-2024-35877
  • CVE-2024-35878
  • CVE-2024-35879
  • CVE-2024-35880
  • CVE-2024-35882
  • CVE-2024-35883
  • CVE-2024-35884
  • CVE-2024-35885
  • CVE-2024-35886
  • CVE-2024-35887
  • CVE-2024-35888
  • CVE-2024-35889
  • CVE-2024-35890
  • CVE-2024-35891
  • CVE-2024-35892
  • CVE-2024-35893
  • CVE-2024-35894
  • CVE-2024-35895
  • CVE-2024-35896
  • CVE-2024-35897
  • CVE-2024-35898
  • CVE-2024-35899
  • CVE-2024-35900
  • CVE-2024-35901
  • CVE-2024-35902
  • CVE-2024-35903
  • CVE-2024-35904
  • CVE-2024-35905
  • CVE-2024-35907
  • CVE-2024-35908
  • CVE-2024-35909
  • CVE-2024-35910
  • CVE-2024-35911
  • CVE-2024-35912
  • CVE-2024-35913
  • CVE-2024-35914
  • CVE-2024-35915
  • CVE-2024-35916
  • CVE-2024-35917
  • CVE-2024-35918
  • CVE-2024-35919
  • CVE-2024-35920
  • CVE-2024-35921
  • CVE-2024-35922
  • CVE-2024-35924
  • CVE-2024-35925
  • CVE-2024-35926
  • CVE-2024-35927
  • CVE-2024-35929
  • CVE-2024-35930
  • CVE-2024-35931
  • CVE-2024-35932
  • CVE-2024-35933
  • CVE-2024-35934
  • CVE-2024-35935
  • CVE-2024-35936
  • CVE-2024-35937
  • CVE-2024-35938
  • CVE-2024-35939
  • CVE-2024-35940
  • CVE-2024-35942
  • CVE-2024-35943
  • CVE-2024-35944
  • CVE-2024-35945
  • CVE-2024-35946
  • CVE-2024-35950
  • CVE-2024-35951
  • CVE-2024-35952
  • CVE-2024-35953
  • CVE-2024-35954
  • CVE-2024-35955
  • CVE-2024-35956
  • CVE-2024-35957
  • CVE-2024-35958
  • CVE-2024-35959
  • CVE-2024-35960
  • CVE-2024-35961
  • CVE-2024-35963
  • CVE-2024-35964
  • CVE-2024-35965
  • CVE-2024-35966
  • CVE-2024-35967
  • CVE-2024-35968
  • CVE-2024-35969
  • CVE-2024-35970
  • CVE-2024-35971
  • CVE-2024-35972
  • CVE-2024-35973
  • CVE-2024-35974
  • CVE-2024-35975
  • CVE-2024-35976
  • CVE-2024-35977
  • CVE-2024-35978
  • CVE-2024-35979
  • CVE-2024-35980
  • CVE-2024-35981
  • CVE-2024-35982
  • CVE-2024-35985
  • CVE-2024-36018
  • CVE-2024-36019
  • CVE-2024-36020
  • CVE-2024-36021
  • CVE-2024-36022
  • CVE-2024-36023
  • CVE-2024-36024
  • CVE-2024-36025
  • CVE-2024-36026
  • CVE-2024-36027
Published
2024-07-23T09:12:48.487547Z
Modified
2024-07-23T09:12:48.487547Z
Summary
linux-aws vulnerabilities
Details

It was discovered that a race condition existed in the Bluetooth subsystem in the Linux kernel when modifying certain settings values through debugfs. A privileged local attacker could use this to cause a denial of service. (CVE-2024-24857, CVE-2024-24858, CVE-2024-24859)

Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - RISC-V architecture; - S390 architecture; - x86 architecture; - Block layer subsystem; - Compute Acceleration Framework; - Accessibility subsystem; - Android drivers; - Drivers core; - Bluetooth drivers; - Clock framework and drivers; - Data acquisition framework and drivers; - Cryptographic API; - Buffer Sharing and Synchronization framework; - GPU drivers; - On-Chip Interconnect management framework; - IOMMU subsystem; - Multiple devices driver; - Media drivers; - VMware VMCI Driver; - Network drivers; - Microsoft Azure Network Adapter (MANA) driver; - Device tree and open firmware driver; - Chrome hardware platform drivers; - i.MX PM domains; - TI SCI PM domains driver; - S/390 drivers; - SCSI drivers; - SPI subsystem; - Thermal drivers; - TTY drivers; - USB subsystem; - Framebuffer layer; - BTRFS file system; - Network file system server daemon; - NILFS2 file system; - File systems infrastructure; - Pstore file system; - SMB network file system; - BPF subsystem; - Bluetooth subsystem; - Netfilter; - io_uring subsystem; - Core kernel; - Extra boot config (XBC); - Memory management; - Amateur Radio drivers; - B.A.T.M.A.N. meshing protocol; - Ethernet bridge; - Networking core; - IPv4 networking; - IPv6 networking; - Multipath TCP; - NFC subsystem; - RDS protocol; - Network traffic control; - SMC sockets; - Sun RPC protocol; - TLS protocol; - Unix domain sockets; - Wireless networking; - eXpress Data Path; - SELinux security module; (CVE-2024-35955, CVE-2024-35921, CVE-2024-35946, CVE-2024-35934, CVE-2024-26993, CVE-2024-35899, CVE-2024-35952, CVE-2024-35894, CVE-2024-35886, CVE-2024-35872, CVE-2024-35970, CVE-2024-35936, CVE-2024-35907, CVE-2024-27013, CVE-2024-35910, CVE-2024-27009, CVE-2024-35875, CVE-2024-36021, CVE-2024-26923, CVE-2024-26997, CVE-2024-35978, CVE-2024-35981, CVE-2024-27015, CVE-2024-26928, CVE-2024-35963, CVE-2024-35897, CVE-2024-27020, CVE-2024-35922, CVE-2024-27001, CVE-2024-27011, CVE-2024-35940, CVE-2024-35871, CVE-2024-35900, CVE-2024-35869, CVE-2024-35905, CVE-2024-35974, CVE-2024-35873, CVE-2024-35882, CVE-2024-35914, CVE-2024-35956, CVE-2024-35887, CVE-2024-35920, CVE-2024-27018, CVE-2024-35880, CVE-2024-35943, CVE-2024-35912, CVE-2024-35979, CVE-2024-35862, CVE-2024-36019, CVE-2024-35950, CVE-2024-35977, CVE-2024-35918, CVE-2024-26992, CVE-2024-35884, CVE-2024-35916, CVE-2024-26817, CVE-2024-35959, CVE-2024-35909, CVE-2024-35933, CVE-2024-35982, CVE-2024-26996, CVE-2024-35980, CVE-2024-36018, CVE-2024-26925, CVE-2024-35929, CVE-2024-35971, CVE-2024-26990, CVE-2024-35885, CVE-2024-36025, CVE-2024-26998, CVE-2024-35930, CVE-2024-26982, CVE-2024-36022, CVE-2024-35895, CVE-2024-35902, CVE-2024-35911, CVE-2024-27002, CVE-2024-35968, CVE-2024-35861, CVE-2024-35903, CVE-2024-36026, CVE-2024-35896, CVE-2024-35945, CVE-2024-26936, CVE-2024-35954, CVE-2024-26985, CVE-2024-35908, CVE-2024-35924, CVE-2024-35938, CVE-2024-26991, CVE-2024-27017, CVE-2024-26922, CVE-2024-35919, CVE-2024-35915, CVE-2024-35985, CVE-2024-26995, CVE-2024-35870, CVE-2024-27010, CVE-2024-35904, CVE-2024-26999, CVE-2024-26983, CVE-2024-35939, CVE-2024-35865, CVE-2024-35860, CVE-2024-35944, CVE-2024-27021, CVE-2024-27016, CVE-2024-27004, CVE-2024-27019, CVE-2024-36027, CVE-2024-35890, CVE-2024-35975, CVE-2024-35901, CVE-2024-35967, CVE-2024-26986, CVE-2024-35957, CVE-2024-35937, CVE-2024-26988, CVE-2024-35972, CVE-2024-35926, CVE-2024-26926, CVE-2024-35964, CVE-2024-26994, CVE-2024-35889, CVE-2024-26981, CVE-2024-36024, CVE-2024-27022, CVE-2024-35935, CVE-2024-26811, CVE-2024-35932, CVE-2024-35866, CVE-2024-27008, CVE-2024-27012, CVE-2024-36023, CVE-2024-35931, CVE-2024-35888, CVE-2024-26989, CVE-2024-35868, CVE-2024-35976, CVE-2024-35953, CVE-2024-36020, CVE-2024-35893, CVE-2024-35961, CVE-2024-35965, CVE-2024-35892, CVE-2024-35942, CVE-2024-35958, CVE-2024-27014, CVE-2024-35867, CVE-2024-27003, CVE-2024-27007, CVE-2024-35951, CVE-2024-35973, CVE-2024-35863, CVE-2024-26984, CVE-2024-35898, CVE-2024-35960, CVE-2024-27005, CVE-2024-35917, CVE-2024-35927, CVE-2024-26980, CVE-2024-35877, CVE-2024-35925, CVE-2024-26921, CVE-2024-35913, CVE-2023-52699, CVE-2024-26987, CVE-2024-27006, CVE-2024-35878, CVE-2024-35864, CVE-2024-35969, CVE-2024-35883, CVE-2024-35891, CVE-2024-35879, CVE-2024-27000, CVE-2024-35966)

References

Affected packages

Ubuntu:24.04:LTS / linux-aws

Package

Name
linux-aws
Purl
pkg:deb/ubuntu/linux-aws@6.8.0-1011.12?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.0-1011.12

Affected versions

6.*

6.5.0-1008.8
6.6.0-1001.1
6.8.0-1001.1
6.8.0-1006.6
6.8.0-1008.8
6.8.0-1009.9
6.8.0-1010.10

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "linux-aws-tools-6.8.0-1011": "6.8.0-1011.12",
            "linux-tools-6.8.0-1011-aws": "6.8.0-1011.12",
            "linux-image-unsigned-6.8.0-1011-aws": "6.8.0-1011.12",
            "linux-aws-headers-6.8.0-1011": "6.8.0-1011.12",
            "linux-buildinfo-6.8.0-1011-aws": "6.8.0-1011.12",
            "linux-cloud-tools-6.8.0-1011-aws": "6.8.0-1011.12",
            "linux-headers-6.8.0-1011-aws": "6.8.0-1011.12",
            "linux-modules-6.8.0-1011-aws": "6.8.0-1011.12",
            "linux-image-unsigned-6.8.0-1011-aws-dbgsym": "6.8.0-1011.12",
            "linux-aws-cloud-tools-6.8.0-1011": "6.8.0-1011.12",
            "linux-modules-extra-6.8.0-1011-aws": "6.8.0-1011.12"
        }
    ]
}