Read Time:2 Minute, 16 Second
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
– ARM64 architecture;
– M68K architecture;
– User-Mode Linux (UML);
– x86 architecture;
– Accessibility subsystem;
– Character device driver;
– Clock framework and drivers;
– CPU frequency scaling framework;
– Hardware crypto device drivers;
– Buffer Sharing and Synchronization framework;
– FireWire subsystem;
– ARM SCMI message protocol;
– GPU drivers;
– HW tracing;
– InfiniBand drivers;
– Macintosh device drivers;
– Multiple devices driver;
– Media drivers;
– Network drivers;
– Pin controllers subsystem;
– S/390 drivers;
– SCSI drivers;
– SoundWire subsystem;
– Greybus lights staging drivers;
– TTY drivers;
– Framebuffer layer;
– Virtio drivers;
– 9P distributed file system;
– eCrypt file system;
– EROFS file system;
– Ext4 file system;
– F2FS file system;
– JFFS2 file system;
– Network file system client;
– NILFS2 file system;
– SMB network file system;
– Mellanox drivers;
– Kernel debugger infrastructure;
– IRQ subsystem;
– Tracing infrastructure;
– Dynamic debug library;
– 9P file system network protocol;
– Bluetooth subsystem;
– Networking core;
– IPv4 networking;
– IPv6 networking;
– Netfilter;
– NET/ROM layer;
– NFC subsystem;
– NSH protocol;
– Open vSwitch;
– Phonet protocol;
– TIPC protocol;
– TLS protocol;
– Unix domain sockets;
– Wireless networking;
– eXpress Data Path;
– XFRM subsystem;
– ALSA framework;
(CVE-2022-48674, CVE-2024-36016, CVE-2024-36934, CVE-2024-39471,
CVE-2024-38381, CVE-2024-26584, CVE-2024-38635, CVE-2024-36902,
CVE-2022-48772, CVE-2024-38600, CVE-2024-39475, CVE-2024-26886,
CVE-2024-39301, CVE-2024-36919, CVE-2024-35947, CVE-2024-38559,
CVE-2024-38637, CVE-2024-36014, CVE-2024-36960, CVE-2024-35976,
CVE-2024-27399, CVE-2024-38607, CVE-2024-38558, CVE-2024-38578,
CVE-2024-36015, CVE-2024-39488, CVE-2024-38780, CVE-2024-36940,
CVE-2024-38621, CVE-2024-38659, CVE-2024-26585, CVE-2024-27019,
CVE-2024-38615, CVE-2024-38661, CVE-2024-37353, CVE-2024-38549,
CVE-2024-38579, CVE-2024-27401, CVE-2024-38589, CVE-2024-38565,
CVE-2022-48655, CVE-2024-38567, CVE-2024-38587, CVE-2024-37356,
CVE-2024-36959, CVE-2024-39493, CVE-2024-38627, CVE-2024-36939,
CVE-2024-31076, CVE-2024-36971, CVE-2024-38560, CVE-2024-39467,
CVE-2024-36286, CVE-2024-39480, CVE-2024-26907, CVE-2024-36017,
CVE-2024-38634, CVE-2023-52585, CVE-2024-38582, CVE-2023-52752,
CVE-2024-38583, CVE-2024-38618, CVE-2024-36946, CVE-2024-39292,
CVE-2024-36950, CVE-2024-36886, CVE-2024-39489, CVE-2024-36933,
CVE-2024-27398, CVE-2023-52434, CVE-2024-36905, CVE-2024-38596,
CVE-2021-47131, CVE-2024-38601, CVE-2024-38552, CVE-2024-26583,
CVE-2024-38633, CVE-2024-36964, CVE-2024-39276, CVE-2024-36270,
CVE-2024-38613, CVE-2024-36904, CVE-2024-38598, CVE-2024-38612,
CVE-2024-36941, CVE-2024-36954, CVE-2024-38599, CVE-2024-36883,
CVE-2023-52882, CVE-2024-33621)