USN-6951-4: Linux kernel (BlueField) vulnerabilities
Publication date
21 August 2024
Overview
Several security issues were fixed in the Linux kernel.
Releases
Packages
- linux-bluefield - Linux kernel for NVIDIA BlueField platforms
Details
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
- M68K architecture;
- User-Mode Linux (UML);
- x86 architecture;
- Accessibility subsystem;
- Character device driver;
- Clock framework and drivers;
- CPU frequency scaling framework;
- Hardware crypto device drivers;
- Buffer Sharing and Synchronization framework;
- FireWire subsystem;
- GPU drivers;
- HW tracing;
- Macintosh device drivers;
- Multiple devices driver;
- Media drivers;
- Network drivers;
- Pin controllers subsystem;
- S/390 drivers;
- SCSI drivers;
- SoundWire subsystem;
- Greybus lights staging drivers;
- TTY drivers;
- Framebuffer layer;
- Virtio drivers;
- 9P...
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
- M68K architecture;
- User-Mode Linux (UML);
- x86 architecture;
- Accessibility subsystem;
- Character device driver;
- Clock framework and drivers;
- CPU frequency scaling framework;
- Hardware crypto device drivers;
- Buffer Sharing and Synchronization framework;
- FireWire subsystem;
- GPU drivers;
- HW tracing;
- Macintosh device drivers;
- Multiple devices driver;
- Media drivers;
- Network drivers;
- Pin controllers subsystem;
- S/390 drivers;
- SCSI drivers;
- SoundWire subsystem;
- Greybus lights staging drivers;
- TTY drivers;
- Framebuffer layer;
- Virtio drivers;
- 9P distributed file system;
- eCrypt file system;
- EROFS file system;
- Ext4 file system;
- F2FS file system;
- JFFS2 file system;
- Network file system client;
- NILFS2 file system;
- SMB network file system;
- Kernel debugger infrastructure;
- IRQ subsystem;
- Tracing infrastructure;
- Dynamic debug library;
- 9P file system network protocol;
- Bluetooth subsystem;
- Networking core;
- IPv4 networking;
- IPv6 networking;
- Netfilter;
- NET/ROM layer;
- NFC subsystem;
- NSH protocol;
- Open vSwitch;
- Phonet protocol;
- TIPC protocol;
- Unix domain sockets;
- Wireless networking;
- eXpress Data Path;
- XFRM subsystem;
- ALSA framework
Update instructions
After a standard system update you need to reboot your computer to make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Ubuntu Release | Package Version | ||
---|---|---|---|
20.04 focal | linux-image-5.4.0-1090-bluefield – 5.4.0-1090.97 | ||
linux-image-bluefield – 5.4.0.1090.86 |
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.
References
- CVE-2024-39493
- CVE-2024-39489
- CVE-2024-39488
- CVE-2024-39480
- CVE-2024-39475
- CVE-2024-39471
- CVE-2024-39467
- CVE-2024-39301
- CVE-2024-39292
- CVE-2024-39276
- CVE-2024-39493
- CVE-2024-39489
- CVE-2024-39488
- CVE-2024-39480
- CVE-2024-39475
- CVE-2024-39471
- CVE-2024-39467
- CVE-2024-39301
- CVE-2024-39292
- CVE-2024-39276
- CVE-2024-38780
- CVE-2024-38661
- CVE-2024-38659
- CVE-2024-38637
- CVE-2024-38635
- CVE-2024-38634
- CVE-2024-38633
- CVE-2024-38627
- CVE-2024-38621
- CVE-2024-38618
- CVE-2024-38615
- CVE-2024-38613
- CVE-2024-38612
- CVE-2024-38607
- CVE-2024-38601
- CVE-2024-38600
- CVE-2024-38599
- CVE-2024-38598
- CVE-2024-38596
- CVE-2024-38589
- CVE-2024-38587
- CVE-2024-38583
- CVE-2024-38582
- CVE-2024-38579
- CVE-2024-38578
- CVE-2024-38567
- CVE-2024-38565
- CVE-2024-38560
- CVE-2024-38559
- CVE-2024-38558
- CVE-2024-38552
- CVE-2024-38549
- CVE-2024-38381
- CVE-2024-37356
- CVE-2024-37353
- CVE-2024-36971
- CVE-2024-36964
- CVE-2024-36960
- CVE-2024-36959
- CVE-2024-36954
- CVE-2024-36950
- CVE-2024-36946
- CVE-2024-36941
- CVE-2024-36940
- CVE-2024-36939
- CVE-2024-36934
- CVE-2024-36933
- CVE-2024-36919
- CVE-2024-36905
- CVE-2024-36904
- CVE-2024-36902
- CVE-2024-36886
- CVE-2024-36883
- CVE-2024-36286
- CVE-2024-36270
- CVE-2024-36017
- CVE-2024-36015
- CVE-2024-36014
- CVE-2024-35976
- CVE-2024-35947
- CVE-2024-33621
- CVE-2024-31076
- CVE-2024-27401
- CVE-2024-27399
- CVE-2024-27398
- CVE-2024-27019
- CVE-2024-26886
- CVE-2023-52882
- CVE-2023-52752
- CVE-2023-52585
- CVE-2023-52434
- CVE-2022-48772
- CVE-2022-48674
Related notices
- USN-7506-1
- USN-7506-3
- USN-7506-2
- USN-7506-4
- USN-7496-1
- USN-7496-4
- USN-7496-2
- USN-7496-3
- USN-7496-5
- USN-7344-1
- USN-7506-1
- USN-7506-3
- USN-7506-2
- USN-7506-4
- USN-7496-1
- USN-7496-4
- USN-7496-2
- USN-7496-3
- USN-7496-5
- USN-7344-1
- USN-7344-2
- USN-7342-1
- USN-7333-1
- USN-7332-1
- USN-7332-2
- USN-7332-3
- USN-7233-1
- USN-7233-2
- USN-7233-3
- USN-7194-1
- USN-7185-1
- USN-7185-2
- USN-7184-1
- USN-7183-1
- USN-7148-1
- USN-7123-1
- USN-7121-1
- USN-7121-2
- USN-7121-3
- USN-7110-1
- USN-7069-1
- USN-7069-2
- USN-7039-1
- USN-7029-1
- USN-7028-1
- USN-7028-2
- USN-7019-1
- USN-7009-1
- USN-7009-2
- USN-7008-1
- USN-7007-1
- USN-7007-2
- USN-7007-3
- USN-7005-1
- USN-7005-2
- USN-7004-1
- USN-6999-1
- USN-6999-2
- USN-6979-1
- USN-6975-1
- USN-6974-1
- USN-6974-2
- USN-6972-1
- USN-6972-2
- USN-6972-3
- USN-6972-4
- USN-6957-1
- USN-6956-1
- USN-6955-1
- USN-6953-1
- USN-6952-1
- USN-6951-1
- USN-6951-2
- USN-6951-3
- USN-6950-1
- USN-6950-2
- USN-6950-3
- USN-6950-4
- USN-6949-1
- USN-6949-2
- USN-6938-1
- USN-6927-1
- USN-6926-1
- USN-6926-2
- USN-6926-3
- USN-6923-1
- USN-6923-2
- USN-6919-1
- USN-6918-1
- USN-6917-1
- USN-6898-1
- USN-6898-2
- USN-6898-3
- USN-6898-4
- USN-6893-1
- USN-6893-2
- USN-6893-3
- USN-6892-1
- USN-6878-1
- USN-6871-1
- USN-6828-1
- USN-6821-1
- USN-6821-2
- USN-6821-3
- USN-6821-4
- USN-6820-1
- USN-6820-2
- USN-6817-1
- USN-6817-2
- USN-6817-3
- USN-6816-1
- USN-6724-1
- USN-6724-2
- LSN-0110-1
- LSN-0108-1
- LSN-0107-1
Have additional questions?