Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Linux (Aktualisierung)
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Linux (Aktualisierung)
ID: USN-6893-2
Distribution: Ubuntu
Plattformen: Ubuntu 24.04 LTS
Datum: Di, 16. Juli 2024, 20:39
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35932
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27005
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26995
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26923
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36024
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35867
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36018
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35865
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35979
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35910
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35883
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26989
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35871
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35873
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36025
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35875
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24858
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35916
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35978
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35970
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35933
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35902
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35924
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27004
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27006
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35918
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35944
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26991
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35860
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35965
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26994
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26996
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35931
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35897
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26925
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35909
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26922
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26811
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35866
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35985
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35911
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27000
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26926
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35925
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26988
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35903
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35971
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35945
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26990
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26998
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35953
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35951
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35887
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27007
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35872
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35960
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24859
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35915
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24857
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35917
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35892
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35977
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35912
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27012
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35919
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26986
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26984
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35946
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35863
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35966
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26981
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35861
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35898
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35930
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26993
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35900
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35968
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35935
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35921
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35940
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27003
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35955
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35894
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35896
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27014
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27011
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35913
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35891
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35885
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35908
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26921
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35957
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26992
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35950
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26997
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26980
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35901
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35926
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35969
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35929
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26928
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35936
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35972
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35907
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26987
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35922
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35904
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27018
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35974
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35878
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35914
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52699
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27010
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35890
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35888
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35961
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27008
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35964
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36027
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26985
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35862
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35967
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35899
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27015
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35864
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35981
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35880
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35895
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35884
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35886
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35956
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35869
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26936
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35927
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35905
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35973
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35879
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35889
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35980
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27009
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36023
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35870
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35963
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35877
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36026
Applikationen: Linux
Update von: Mehrere Probleme in Linux

Originalnachricht

--===============4659877274958049878==
Content-Type: multipart/signed; boundary="=-=-=";
micalg=pgp-sha512; protocol="application/pgp-signature"

--=-=-=
Content-Type: text/plain


==========================================================================
Ubuntu Security Notice USN-6893-2
July 16, 2024

linux-gke, linux-nvidia vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-gke: Linux kernel for Google Container Engine (GKE) systems
- linux-nvidia: Linux kernel for NVIDIA systems

Details:

It was discovered that a race condition existed in the Bluetooth subsystem
in the Linux kernel when modifying certain settings values through debugfs.
A privileged local attacker could use this to cause a denial of service.
(CVE-2024-24857, CVE-2024-24858, CVE-2024-24859)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
- RISC-V architecture;
- S390 architecture;
- x86 architecture;
- Block layer subsystem;
- Compute Acceleration Framework;
- Accessibility subsystem;
- Android drivers;
- Drivers core;
- Bluetooth drivers;
- Clock framework and drivers;
- Data acquisition framework and drivers;
- Cryptographic API;
- Buffer Sharing and Synchronization framework;
- GPU drivers;
- On-Chip Interconnect management framework;
- IOMMU subsystem;
- Multiple devices driver;
- Media drivers;
- VMware VMCI Driver;
- Network drivers;
- Microsoft Azure Network Adapter (MANA) driver;
- Device tree and open firmware driver;
- Chrome hardware platform drivers;
- i.MX PM domains;
- TI SCI PM domains driver;
- S/390 drivers;
- SCSI drivers;
- SPI subsystem;
- Thermal drivers;
- TTY drivers;
- USB subsystem;
- Framebuffer layer;
- BTRFS file system;
- Network file system server daemon;
- NILFS2 file system;
- File systems infrastructure;
- Pstore file system;
- SMB network file system;
- BPF subsystem;
- Bluetooth subsystem;
- Netfilter;
- io_uring subsystem;
- Core kernel;
- Extra boot config (XBC);
- Memory management;
- Amateur Radio drivers;
- B.A.T.M.A.N. meshing protocol;
- Ethernet bridge;
- Networking core;
- IPv4 networking;
- IPv6 networking;
- Multipath TCP;
- NFC subsystem;
- RDS protocol;
- Network traffic control;
- SMC sockets;
- Sun RPC protocol;
- TLS protocol;
- Unix domain sockets;
- Wireless networking;
- eXpress Data Path;
- SELinux security module;
(CVE-2024-35976, CVE-2024-35873, CVE-2024-35959, CVE-2024-27012,
CVE-2024-36025, CVE-2024-35868, CVE-2024-26995, CVE-2024-35916,
CVE-2024-36023, CVE-2024-35964, CVE-2024-35890, CVE-2024-26980,
CVE-2024-35950, CVE-2024-27006, CVE-2024-35955, CVE-2024-35885,
CVE-2024-35960, CVE-2024-35932, CVE-2024-26986, CVE-2024-35884,
CVE-2024-35860, CVE-2024-36020, CVE-2024-35930, CVE-2024-35919,
CVE-2024-27020, CVE-2024-26928, CVE-2024-35903, CVE-2024-35907,
CVE-2024-35904, CVE-2024-35972, CVE-2024-35892, CVE-2024-26921,
CVE-2024-35869, CVE-2024-35957, CVE-2024-35967, CVE-2024-35927,
CVE-2024-35946, CVE-2024-27000, CVE-2024-35943, CVE-2024-35902,
CVE-2024-27013, CVE-2024-35968, CVE-2024-35970, CVE-2024-35865,
CVE-2024-36022, CVE-2024-26993, CVE-2024-36027, CVE-2024-35895,
CVE-2024-35908, CVE-2024-35901, CVE-2024-35872, CVE-2024-26925,
CVE-2024-35917, CVE-2024-35898, CVE-2024-35861, CVE-2024-35900,
CVE-2024-26984, CVE-2024-35891, CVE-2023-52699, CVE-2024-35961,
CVE-2024-35951, CVE-2024-36019, CVE-2024-27021, CVE-2024-35939,
CVE-2024-26997, CVE-2024-26999, CVE-2024-35897, CVE-2024-35896,
CVE-2024-26817, CVE-2024-35875, CVE-2024-35935, CVE-2024-27015,
CVE-2024-26982, CVE-2024-35958, CVE-2024-26989, CVE-2024-26922,
CVE-2024-26811, CVE-2024-27003, CVE-2024-35920, CVE-2024-27007,
CVE-2024-35879, CVE-2024-35979, CVE-2024-35978, CVE-2024-35914,
CVE-2024-35938, CVE-2024-35913, CVE-2024-26985, CVE-2024-35915,
CVE-2024-35974, CVE-2024-27001, CVE-2024-35940, CVE-2024-35867,
CVE-2024-26994, CVE-2024-35886, CVE-2024-35899, CVE-2024-27022,
CVE-2024-35910, CVE-2024-35893, CVE-2024-27010, CVE-2024-36024,
CVE-2024-26926, CVE-2024-26923, CVE-2024-26990, CVE-2024-35912,
CVE-2024-26987, CVE-2024-35966, CVE-2024-35977, CVE-2024-35866,
CVE-2024-35975, CVE-2024-35965, CVE-2024-35933, CVE-2024-26936,
CVE-2024-35889, CVE-2024-35863, CVE-2024-27002, CVE-2024-27018,
CVE-2024-36021, CVE-2024-27019, CVE-2024-35921, CVE-2024-35870,
CVE-2024-35956, CVE-2024-27016, CVE-2024-26996, CVE-2024-35878,
CVE-2024-26988, CVE-2024-35888, CVE-2024-35936, CVE-2024-27014,
CVE-2024-35883, CVE-2024-35862, CVE-2024-35945, CVE-2024-26983,
CVE-2024-35982, CVE-2024-35924, CVE-2024-27004, CVE-2024-27008,
CVE-2024-35963, CVE-2024-35909, CVE-2024-35911, CVE-2024-35973,
CVE-2024-35887, CVE-2024-27009, CVE-2024-35980, CVE-2024-36026,
CVE-2024-35969, CVE-2024-35954, CVE-2024-35864, CVE-2024-35953,
CVE-2024-26998, CVE-2024-35931, CVE-2024-26981, CVE-2024-35971,
CVE-2024-35934, CVE-2024-35929, CVE-2024-35918, CVE-2024-35937,
CVE-2024-36018, CVE-2024-35877, CVE-2024-35925, CVE-2024-35981,
CVE-2024-35985, CVE-2024-35942, CVE-2024-35922, CVE-2024-35952,
CVE-2024-27011, CVE-2024-35944, CVE-2024-35905, CVE-2024-35880,
CVE-2024-35882, CVE-2024-27005, CVE-2024-26991, CVE-2024-35871,
CVE-2024-35926, CVE-2024-26992, CVE-2024-35894, CVE-2024-27017)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
linux-image-6.8.0-1006-gke 6.8.0-1006.9
linux-image-6.8.0-1009-nvidia 6.8.0-1009.9
linux-image-6.8.0-1009-nvidia-64k 6.8.0-1009.9
linux-image-gke 6.8.0-1006.9
linux-image-nvidia 6.8.0-1009.9
linux-image-nvidia-64k 6.8.0-1009.9

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-6893-2
https://ubuntu.com/security/notices/USN-6893-1
CVE-2023-52699, CVE-2024-24857, CVE-2024-24858, CVE-2024-24859,
CVE-2024-26811, CVE-2024-26817, CVE-2024-26921, CVE-2024-26922,
CVE-2024-26923, CVE-2024-26925, CVE-2024-26926, CVE-2024-26928,
CVE-2024-26936, CVE-2024-26980, CVE-2024-26981, CVE-2024-26982,
CVE-2024-26983, CVE-2024-26984, CVE-2024-26985, CVE-2024-26986,
CVE-2024-26987, CVE-2024-26988, CVE-2024-26989, CVE-2024-26990,
CVE-2024-26991, CVE-2024-26992, CVE-2024-26993, CVE-2024-26994,
CVE-2024-26995, CVE-2024-26996, CVE-2024-26997, CVE-2024-26998,
CVE-2024-26999, CVE-2024-27000, CVE-2024-27001, CVE-2024-27002,
CVE-2024-27003, CVE-2024-27004, CVE-2024-27005, CVE-2024-27006,
CVE-2024-27007, CVE-2024-27008, CVE-2024-27009, CVE-2024-27010,
CVE-2024-27011, CVE-2024-27012, CVE-2024-27013, CVE-2024-27014,
CVE-2024-27015, CVE-2024-27016, CVE-2024-27017, CVE-2024-27018,
CVE-2024-27019, CVE-2024-27020, CVE-2024-27021, CVE-2024-27022,
CVE-2024-35860, CVE-2024-35861, CVE-2024-35862, CVE-2024-35863,
CVE-2024-35864, CVE-2024-35865, CVE-2024-35866, CVE-2024-35867,
CVE-2024-35868, CVE-2024-35869, CVE-2024-35870, CVE-2024-35871,
CVE-2024-35872, CVE-2024-35873, CVE-2024-35875, CVE-2024-35877,
CVE-2024-35878, CVE-2024-35879, CVE-2024-35880, CVE-2024-35882,
CVE-2024-35883, CVE-2024-35884, CVE-2024-35885, CVE-2024-35886,
CVE-2024-35887, CVE-2024-35888, CVE-2024-35889, CVE-2024-35890,
CVE-2024-35891, CVE-2024-35892, CVE-2024-35893, CVE-2024-35894,
CVE-2024-35895, CVE-2024-35896, CVE-2024-35897, CVE-2024-35898,
CVE-2024-35899, CVE-2024-35900, CVE-2024-35901, CVE-2024-35902,
CVE-2024-35903, CVE-2024-35904, CVE-2024-35905, CVE-2024-35907,
CVE-2024-35908, CVE-2024-35909, CVE-2024-35910, CVE-2024-35911,
CVE-2024-35912, CVE-2024-35913, CVE-2024-35914, CVE-2024-35915,
CVE-2024-35916, CVE-2024-35917, CVE-2024-35918, CVE-2024-35919,
CVE-2024-35920, CVE-2024-35921, CVE-2024-35922, CVE-2024-35924,
CVE-2024-35925, CVE-2024-35926, CVE-2024-35927, CVE-2024-35929,
CVE-2024-35930, CVE-2024-35931, CVE-2024-35932, CVE-2024-35933,
CVE-2024-35934, CVE-2024-35935, CVE-2024-35936, CVE-2024-35937,
CVE-2024-35938, CVE-2024-35939, CVE-2024-35940, CVE-2024-35942,
CVE-2024-35943, CVE-2024-35944, CVE-2024-35945, CVE-2024-35946,
CVE-2024-35950, CVE-2024-35951, CVE-2024-35952, CVE-2024-35953,
CVE-2024-35954, CVE-2024-35955, CVE-2024-35956, CVE-2024-35957,
CVE-2024-35958, CVE-2024-35959, CVE-2024-35960, CVE-2024-35961,
CVE-2024-35963, CVE-2024-35964, CVE-2024-35965, CVE-2024-35966,
CVE-2024-35967, CVE-2024-35968, CVE-2024-35969, CVE-2024-35970,
CVE-2024-35971, CVE-2024-35972, CVE-2024-35973, CVE-2024-35974,
CVE-2024-35975, CVE-2024-35976, CVE-2024-35977, CVE-2024-35978,
CVE-2024-35979, CVE-2024-35980, CVE-2024-35981, CVE-2024-35982,
CVE-2024-35985, CVE-2024-36018, CVE-2024-36019, CVE-2024-36020,
CVE-2024-36021, CVE-2024-36022, CVE-2024-36023, CVE-2024-36024,
CVE-2024-36025, CVE-2024-36026, CVE-2024-36027

Package Information:
https://launchpad.net/ubuntu/+source/linux-gke/6.8.0-1006.9
https://launchpad.net/ubuntu/+source/linux-nvidia/6.8.0-1009.9

--=-=-=
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=5/BD
-----END PGP SIGNATURE-----
--=-=-=--


--===============4659877274958049878==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline


--===============4659877274958049878==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung