Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.12.2024.6725.1
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-6725-1)
Summary:The remote host is missing an update for the 'linux, linux-azure, linux-azure-5.15, linux-azure-fde, linux-azure-fde-5.15, linux-gcp, linux-gcp-5.15, linux-gke, linux-gkeop, linux-gkeop-5.15, linux-hwe-5.15, linux-ibm, linux-ibm-5.15, linux-intel-iotg, linux-intel-iotg-5.15, linux-kvm, linux-lowlatency, linux-lowlatency-hwe-5.15, linux-nvidia, linux-oracle, linux-oracle-5.15, linux-raspi' package(s) announced via the USN-6725-1 advisory.
Description:Summary:
The remote host is missing an update for the 'linux, linux-azure, linux-azure-5.15, linux-azure-fde, linux-azure-fde-5.15, linux-gcp, linux-gcp-5.15, linux-gke, linux-gkeop, linux-gkeop-5.15, linux-hwe-5.15, linux-ibm, linux-ibm-5.15, linux-intel-iotg, linux-intel-iotg-5.15, linux-kvm, linux-lowlatency, linux-lowlatency-hwe-5.15, linux-nvidia, linux-oracle, linux-oracle-5.15, linux-raspi' package(s) announced via the USN-6725-1 advisory.

Vulnerability Insight:
Chih-Yen Chang discovered that the KSMBD implementation in the Linux kernel
did not properly validate certain data structure fields when parsing lease
contexts, leading to an out-of-bounds read vulnerability. A remote attacker
could use this to cause a denial of service (system crash) or possibly
expose sensitive information. (CVE-2023-1194)

Quentin Minster discovered that a race condition existed in the KSMBD
implementation in the Linux kernel, leading to a use-after-free
vulnerability. A remote attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2023-32254)

It was discovered that a race condition existed in the KSMBD implementation
in the Linux kernel when handling session connections, leading to a use-
after-free vulnerability. A remote attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-32258)

It was discovered that the KSMBD implementation in the Linux kernel did not
properly validate buffer sizes in certain operations, leading to an integer
underflow and out-of-bounds read vulnerability. A remote attacker could use
this to cause a denial of service (system crash) or possibly expose
sensitive information. (CVE-2023-38427)

Chih-Yen Chang discovered that the KSMBD implementation in the Linux kernel
did not properly validate SMB request protocol IDs, leading to a out-of-
bounds read vulnerability. A remote attacker could possibly use this to
cause a denial of service (system crash). (CVE-2023-38430)

Chih-Yen Chang discovered that the KSMBD implementation in the Linux kernel
did not properly validate packet header sizes in certain situations,
leading to an out-of-bounds read vulnerability. A remote attacker could use
this to cause a denial of service (system crash) or possibly expose
sensitive information. (CVE-2023-38431)

It was discovered that the KSMBD implementation in the Linux kernel did not
properly handle session setup requests, leading to an out-of-bounds read
vulnerability. A remote attacker could use this to expose sensitive
information. (CVE-2023-3867)

Pratyush Yadav discovered that the Xen network backend implementation in
the Linux kernel did not properly handle zero length data request, leading
to a null pointer dereference vulnerability. An attacker in a guest VM
could possibly use this to cause a denial of service (host domain crash).
(CVE-2023-46838)

It was discovered that the IPv6 implementation of the Linux kernel did not
properly manage route cache memory usage. A remote attacker could use this
to cause a denial of service (memory exhaustion). (CVE-2023-52340)

It was discovered that the device mapper driver in the Linux kernel did not
properly validate target size during certain memory allocations. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2023-52429, CVE-2024-23851)

Yang Chaoming ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'linux, linux-azure, linux-azure-5.15, linux-azure-fde, linux-azure-fde-5.15, linux-gcp, linux-gcp-5.15, linux-gke, linux-gkeop, linux-gkeop-5.15, linux-hwe-5.15, linux-ibm, linux-ibm-5.15, linux-intel-iotg, linux-intel-iotg-5.15, linux-kvm, linux-lowlatency, linux-lowlatency-hwe-5.15, linux-nvidia, linux-oracle, linux-oracle-5.15, linux-raspi' package(s) on Ubuntu 20.04, Ubuntu 22.04.

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2023-1194
RHBZ#2154176
https://bugzilla.redhat.com/show_bug.cgi?id=2154176
https://access.redhat.com/security/cve/CVE-2023-1194
https://www.spinics.net/lists/stable-commits/msg303065.html
Common Vulnerability Exposure (CVE) ID: CVE-2023-32254
RHBZ#2191658
https://bugzilla.redhat.com/show_bug.cgi?id=2191658
https://access.redhat.com/security/cve/CVE-2023-32254
https://www.zerodayinitiative.com/advisories/ZDI-23-702/
Common Vulnerability Exposure (CVE) ID: CVE-2023-32258
RHBZ#2219809
https://bugzilla.redhat.com/show_bug.cgi?id=2219809
https://access.redhat.com/security/cve/CVE-2023-32258
https://www.zerodayinitiative.com/advisories/ZDI-CAN-20796/
Common Vulnerability Exposure (CVE) ID: CVE-2023-38427
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.8
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/smb/server?id=f1a411873c85b642f13b01f21b534c2bab81fc1b
Common Vulnerability Exposure (CVE) ID: CVE-2023-38430
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.9
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/smb/server?id=1c1bcf2d3ea061613119b534f57507c377df20f9
Common Vulnerability Exposure (CVE) ID: CVE-2023-38431
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/smb/server?id=368ba06881c395f1c9a7ba22203cf8d78b4addc0
Common Vulnerability Exposure (CVE) ID: CVE-2023-3867
Common Vulnerability Exposure (CVE) ID: CVE-2023-46838
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGEKT4DKSDXDS34EL7M4UVJMMPH7Z3ZZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFYW6R64GPLUOXSQBJI3JBUX3HGLAYPP/
https://xenbits.xenproject.org/xsa/advisory-448.html
Common Vulnerability Exposure (CVE) ID: CVE-2023-52340
Common Vulnerability Exposure (CVE) ID: CVE-2023-52429
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GS7S3XLTLOUKBXV67LLFZWB3YVFJZHRK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3LZROQAX7Q7LEP4F7WQ3KUZKWCZGFFP2/
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bd504bcfec41a503b32054da5472904b404341a4
https://www.spinics.net/lists/dm-devel/msg56625.html
Common Vulnerability Exposure (CVE) ID: CVE-2023-52436
https://git.kernel.org/stable/c/12cf91e23b126718a96b914f949f2cdfeadc7b2a
https://git.kernel.org/stable/c/16ae3132ff7746894894927c1892493693b89135
https://git.kernel.org/stable/c/2525d1ba225b5c167162fa344013c408e8b4de36
https://git.kernel.org/stable/c/32a6cfc67675ee96fe107aeed5af9776fec63f11
https://git.kernel.org/stable/c/3e47740091b05ac8d7836a33afd8646b6863ca52
https://git.kernel.org/stable/c/5de9e9dd1828db9b8b962f7ca42548bd596deb8a
https://git.kernel.org/stable/c/e26b6d39270f5eab0087453d9b544189a38c8564
https://git.kernel.org/stable/c/f6c30bfe5a49bc38cae985083a11016800708fea
Common Vulnerability Exposure (CVE) ID: CVE-2023-52438
https://git.kernel.org/stable/c/3f489c2067c5824528212b0fc18b28d51332d906
https://git.kernel.org/stable/c/8ad4d580e8aff8de2a4d57c5930fcc29f1ffd4a6
https://git.kernel.org/stable/c/9fa04c93f24138747807fe75b5591bb680098f56
https://git.kernel.org/stable/c/a49087ab93508b60d9b8add91707a22dda832869
https://git.kernel.org/stable/c/a53e15e592b4dcc91c3a3b8514e484a0bdbc53a3
https://git.kernel.org/stable/c/c8c1158ffb007197f31f9d9170cf13e4f34cbb5c
https://git.kernel.org/stable/c/e074686e993ff1be5f21b085a3b1b4275ccd5727
Common Vulnerability Exposure (CVE) ID: CVE-2023-52439
https://git.kernel.org/stable/c/0c9ae0b8605078eafc3bea053cc78791e97ba2e2
https://git.kernel.org/stable/c/17a8519cb359c3b483fb5c7367efa9a8a508bdea
https://git.kernel.org/stable/c/3174e0f7de1ba392dc191625da83df02d695b60c
https://git.kernel.org/stable/c/35f102607054faafe78d2a6994b18d5d9d6e92ad
https://git.kernel.org/stable/c/5cf604ee538ed0c467abe3b4cda5308a6398f0f7
https://git.kernel.org/stable/c/5e0be1229ae199ebb90b33102f74a0f22d152570
https://git.kernel.org/stable/c/913205930da6213305616ac539447702eaa85e41
https://git.kernel.org/stable/c/e93da893d52d82d57fc0db2ca566024e0f26ff50
Common Vulnerability Exposure (CVE) ID: CVE-2023-52441
https://git.kernel.org/stable/c/330d900620dfc9893011d725b3620cd2ee0bc2bc
https://git.kernel.org/stable/c/536bb492d39bb6c080c92f31e8a55fe9934f452b
https://git.kernel.org/stable/c/5c0df9d30c289d6b9d7d44e2a450de2f8e3cf40b
https://git.kernel.org/stable/c/aa669ef229ae8dd779da9caa24e254964545895f
Common Vulnerability Exposure (CVE) ID: CVE-2023-52442
https://git.kernel.org/stable/c/017d85c94f02090a87f4a473dbe0d6ee0da72693
https://git.kernel.org/stable/c/3df0411e132ee74a87aa13142dfd2b190275332e
https://git.kernel.org/stable/c/4c2b350b2e269e3fd17bbfa42de1b42775b777ac
https://git.kernel.org/stable/c/becb5191d1d5fdfca0198a2e37457bbbf4fe266f
Common Vulnerability Exposure (CVE) ID: CVE-2023-52443
https://git.kernel.org/stable/c/0a12db736edbb4933e4274932aeea594b5876fa4
https://git.kernel.org/stable/c/1d8e62b5569cc1466ceb8a7e4872cf10160a9dcf
https://git.kernel.org/stable/c/55a8210c9e7d21ff2644809699765796d4bfb200
https://git.kernel.org/stable/c/5c0392fdafb0a2321311900be83ffa572bef8203
https://git.kernel.org/stable/c/5ff00408e5029d3550ee77f62dc15f1e15c47f87
https://git.kernel.org/stable/c/77ab09b92f16c8439a948d1af489196953dc4a0e
https://git.kernel.org/stable/c/9286ee97aa4803d99185768735011d0d65827c9e
https://git.kernel.org/stable/c/9d4fa5fe2b1d56662afd14915a73b4d0783ffa45
Common Vulnerability Exposure (CVE) ID: CVE-2023-52444
https://git.kernel.org/stable/c/02160112e6d45c2610b049df6eb693d7a2e57b46
https://git.kernel.org/stable/c/2fb4867f4405aea8c0519d7d188207f232a57862
https://git.kernel.org/stable/c/53edb549565f55ccd0bdf43be3d66ce4c2d48b28
https://git.kernel.org/stable/c/5624a3c1b1ebc8991318e1cce2aa719542991024
https://git.kernel.org/stable/c/6f866885e147d33efc497f1095f35b2ee5ec7310
https://git.kernel.org/stable/c/d3c0b49aaa12a61d560528f5d605029ab57f0728
https://git.kernel.org/stable/c/f0145860c20be6bae6785c7a2249577674702ac7
https://git.kernel.org/stable/c/f100ba617d8be6c98a68f3744ef7617082975b77
Common Vulnerability Exposure (CVE) ID: CVE-2023-52445
https://git.kernel.org/stable/c/2cf0005d315549b8d2b940ff96a66c2a889aa795
https://git.kernel.org/stable/c/30773ea47d41773f9611ffb4ebc9bda9d19a9e7e
https://git.kernel.org/stable/c/3233d8bf7893550045682192cb227af7fa3defeb
https://git.kernel.org/stable/c/437b5f57732bb4cc32cc9f8895d2010ee9ff521c
https://git.kernel.org/stable/c/47aa8fcd5e8b5563af4042a00f25ba89bef8f33d
https://git.kernel.org/stable/c/ded85b0c0edd8f45fec88783d7555a5b982449c1
https://git.kernel.org/stable/c/ec3634ebe23fc3c44ebc67c6d25917300bc68c08
https://git.kernel.org/stable/c/ec36c134dd020d28e312c2f1766f85525e747aab
Common Vulnerability Exposure (CVE) ID: CVE-2023-52448
https://git.kernel.org/stable/c/067a7c48c2c70f05f9460d6f0e8423e234729f05
https://git.kernel.org/stable/c/5c28478af371a1c3fdb570ca67f110e1ae60fc37
https://git.kernel.org/stable/c/8877243beafa7c6bfc42022cbfdf9e39b25bd4fa
https://git.kernel.org/stable/c/c323efd620c741168c8e0cc6fc0be04ab57e331a
https://git.kernel.org/stable/c/d69d7804cf9e2ba171a27e5f98bc266f13d0414a
https://git.kernel.org/stable/c/ee0586d73cbaf0e7058bc640d62a9daf2dfa9178
https://git.kernel.org/stable/c/efc8ef87ab9185a23d5676f2f7d986022d91bcde
Common Vulnerability Exposure (CVE) ID: CVE-2023-52449
https://git.kernel.org/stable/c/001a3f59d8c914ef8273461d4bf495df384cc5f8
https://git.kernel.org/stable/c/1bf4fe14e97cda621522eb2f28b0a4e87c5b0745
https://git.kernel.org/stable/c/5389407bba1eab1266c6d83e226fb0840cb98dd5
https://git.kernel.org/stable/c/a43bdc376deab5fff1ceb93dca55bcab8dbdc1d6
https://git.kernel.org/stable/c/aeba358bcc8ffddf9b4a9bd0e5ec9eb338d46022
https://git.kernel.org/stable/c/b36aaa64d58aaa2f2cbc8275e89bae76a2b6c3dc
https://git.kernel.org/stable/c/cfd7c9d260dc0a3baaea05a122a19ab91e193c65
https://git.kernel.org/stable/c/d8ac2537763b54d278b80b2b080e1652523c7d4c
Common Vulnerability Exposure (CVE) ID: CVE-2023-52451
https://git.kernel.org/stable/c/026fd977dc50ff4a5e09bfb0603557f104d3f3a0
https://git.kernel.org/stable/c/708a4b59baad96c4718dc0bd3a3427d3ab22fedc
https://git.kernel.org/stable/c/999a27b3ce9a69d54ccd5db000ec3a447bc43e6d
https://git.kernel.org/stable/c/9b5f03500bc5b083c0df696d7dd169d7ef3dd0c7
https://git.kernel.org/stable/c/b582aa1f66411d4adcc1aa55b8c575683fb4687e
https://git.kernel.org/stable/c/bb79613a9a704469ddb8d6c6029d532a5cea384c
https://git.kernel.org/stable/c/bd68ffce69f6cf8ddd3a3c32549d1d2275e49fc5
https://git.kernel.org/stable/c/df16afba2378d985359812c865a15c05c70a967e
Common Vulnerability Exposure (CVE) ID: CVE-2023-52454
https://git.kernel.org/stable/c/24e05760186dc070d3db190ca61efdbce23afc88
https://git.kernel.org/stable/c/2871aa407007f6f531fae181ad252486e022df42
https://git.kernel.org/stable/c/4cb3cf7177ae3666be7fb27d4ad4d72a295fb02d
https://git.kernel.org/stable/c/70154e8d015c9b4fb56c1a2ef1fc8b83d45c7f68
https://git.kernel.org/stable/c/ee5e7632e981673f42a50ade25e71e612e543d9d
https://git.kernel.org/stable/c/efa56305908ba20de2104f1b8508c6a7401833be
https://git.kernel.org/stable/c/f775f2621c2ac5cc3a0b3a64665dad4fb146e510
Common Vulnerability Exposure (CVE) ID: CVE-2023-52456
https://git.kernel.org/stable/c/63ee7be01a3f7d28b1ea8b8d7944f12bb7b0ed06
https://git.kernel.org/stable/c/6e04a9d30509fb53ba6df5d655ed61d607a7cfda
https://git.kernel.org/stable/c/763cd68746317b5d746dc2649a3295c1efb41181
https://git.kernel.org/stable/c/78d60dae9a0c9f09aa3d6477c94047df2fe6f7b0
https://git.kernel.org/stable/c/9a662d06c22ddfa371958c2071dc350436be802b
https://git.kernel.org/stable/c/ff168d4fdb0e1ba35fb413a749b3d6cce918ec19
Common Vulnerability Exposure (CVE) ID: CVE-2023-52457
https://git.kernel.org/stable/c/828cd829483f0cda920710997aed79130b0af690
https://git.kernel.org/stable/c/887a558d0298d36297daea039954c39940228d9b
https://git.kernel.org/stable/c/95e4e0031effad9837af557ecbfd4294a4d8aeee
https://git.kernel.org/stable/c/ad90d0358bd3b4554f243a425168fc7cebe7d04e
https://git.kernel.org/stable/c/b502fb43f7fb55aaf07f6092ab44657595214b93
https://git.kernel.org/stable/c/bc57f3ef8a9eb0180606696f586a6dcfaa175ed0
https://git.kernel.org/stable/c/d74173bda29aba58f822175d983d07c8ed335494
Common Vulnerability Exposure (CVE) ID: CVE-2023-52458
https://git.kernel.org/stable/c/5010c27120962c85d2f421d2cf211791c9603503
https://git.kernel.org/stable/c/6f64f866aa1ae6975c95d805ed51d7e9433a0016
https://git.kernel.org/stable/c/8f6dfa1f1efe6dcca2d43e575491d8fcbe922f62
https://git.kernel.org/stable/c/bcdc288e7bc008daf38ef0401b53e4a8bb61bbe5
https://git.kernel.org/stable/c/cb16cc1abda18a9514106d2ac8c8d7abc0be5ed8
https://git.kernel.org/stable/c/ef31cc87794731ffcb578a195a2c47d744e25fb8
Common Vulnerability Exposure (CVE) ID: CVE-2023-52462
https://git.kernel.org/stable/c/2757f17972d87773b3677777f5682510f13c66ef
https://git.kernel.org/stable/c/40617d45ea05535105e202a8a819e388a2b1f036
https://git.kernel.org/stable/c/67e6707f07354ed1acb4e65552e97c60cf9d69cf
https://git.kernel.org/stable/c/8dc15b0670594543c356567a1a45b0182ec63174
https://git.kernel.org/stable/c/ab125ed3ec1c10ccc36bc98c7a4256ad114a3dae
https://git.kernel.org/stable/c/fc3e3c50a0a4cac1463967c110686189e4a59104
Common Vulnerability Exposure (CVE) ID: CVE-2023-52463
https://git.kernel.org/stable/c/0049fe7e4a85849bdd778cdb72e51a791ff3d737
https://git.kernel.org/stable/c/0e8d2444168dd519fea501599d150e62718ed2fe
https://git.kernel.org/stable/c/2aa141f8bc580f8f9811dfe4e0e6009812b73826
https://git.kernel.org/stable/c/94c742324ed7e42c5bd6a9ed22e4ec6d764db4d8
https://git.kernel.org/stable/c/d4a714873db0866cc471521114eeac4a5072d548
https://git.kernel.org/stable/c/d4a9aa7db574a0da64307729cc031fb68597aa8b
Common Vulnerability Exposure (CVE) ID: CVE-2023-52464
https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5
https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8
https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6
https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a
https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21
https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601
https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398
https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057
Common Vulnerability Exposure (CVE) ID: CVE-2023-52467
https://git.kernel.org/stable/c/3ef1130deee98997275904d9bfc37af75e1e906c
https://git.kernel.org/stable/c/41673c66b3d0c09915698fec5c13b24336f18dd1
https://git.kernel.org/stable/c/527e8c5f3d00299822612c495d5adf1f8f43c001
https://git.kernel.org/stable/c/7f2c410ac470959b88e03dadd94b7a0b71df7973
https://git.kernel.org/stable/c/927626a2073887ee30ba00633260d4d203f8e875
https://git.kernel.org/stable/c/c3e3a2144bf50877551138ffce9f7aa6ddfe385b
Common Vulnerability Exposure (CVE) ID: CVE-2023-52469
https://git.kernel.org/stable/c/28dd788382c43b330480f57cd34cde0840896743
https://git.kernel.org/stable/c/3426f059eacc33ecc676b0d66539297e1cfafd02
https://git.kernel.org/stable/c/35fa2394d26e919f63600ce631e6aefc95ec2706
https://git.kernel.org/stable/c/520e213a0b97b64735a13950e9371e0a5d7a5dc3
https://git.kernel.org/stable/c/8a27d9d9fc9b5564b8904c3a77a7dea482bfa34e
https://git.kernel.org/stable/c/8b55b06e737feb2a645b0293ea27e38418876d63
https://git.kernel.org/stable/c/95084632a65d5c0d682a83b55935560bdcd2a1e3
https://git.kernel.org/stable/c/b6dcba02ee178282e0d28684d241e0b8462dea6a
Common Vulnerability Exposure (CVE) ID: CVE-2023-52470
https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088
https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1
https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41
https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb
https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4
https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310
https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85
https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97
Common Vulnerability Exposure (CVE) ID: CVE-2023-52480
https://git.kernel.org/stable/c/18ced78b0ebccc2d16f426143dc56ab3aad666be
https://git.kernel.org/stable/c/53ff5cf89142b978b1a5ca8dc4d4425e6a09745f
https://git.kernel.org/stable/c/a2ca5fd3dbcc665e1169044fa0c9e3eba779202b
https://git.kernel.org/stable/c/c77fd3e25a51ac92b0f1b347a96eff6a0b4f066f
Common Vulnerability Exposure (CVE) ID: CVE-2023-52609
https://git.kernel.org/stable/c/252a2a5569eb9f8d16428872cc24dea1ac0bb097
https://git.kernel.org/stable/c/6696f76c32ff67fec26823fc2df46498e70d9bf3
https://git.kernel.org/stable/c/67f16bf2cc1698fd50e01ee8a2becc5a8e6d3a3e
https://git.kernel.org/stable/c/77d210e8db4d61d43b2d16df66b1ec46fad2ee01
https://git.kernel.org/stable/c/7e7a0d86542b0ea903006d3f42f33c4f7ead6918
https://git.kernel.org/stable/c/95b1d336b0642198b56836b89908d07b9a0c9608
https://git.kernel.org/stable/c/98fee5bee97ad47b527a997d5786410430d1f0e9
https://git.kernel.org/stable/c/9a9ab0d963621d9d12199df9817e66982582d5a5
Common Vulnerability Exposure (CVE) ID: CVE-2023-52610
https://git.kernel.org/stable/c/0b5b831122fc3789fff75be433ba3e4dd7b779d4
https://git.kernel.org/stable/c/172ba7d46c202e679f3ccb10264c67416aaeb1c4
https://git.kernel.org/stable/c/3f14b377d01d8357eba032b4cabc8c1149b458b6
https://git.kernel.org/stable/c/73f7da5fd124f2cda9161e2e46114915e6e82e97
https://git.kernel.org/stable/c/f5346df0591d10bc948761ca854b1fae6d2ef441
Common Vulnerability Exposure (CVE) ID: CVE-2023-52612
https://git.kernel.org/stable/c/1142d65c5b881590962ad763f94505b6dd67d2fe
https://git.kernel.org/stable/c/4518dc468cdd796757190515a9be7408adc8911e
https://git.kernel.org/stable/c/4df0c942d04a67df174195ad8082f6e30e7f71a5
https://git.kernel.org/stable/c/71c6670f9f032ec67d8f4e3f8db4646bf5a62883
https://git.kernel.org/stable/c/744e1885922a9943458954cfea917b31064b4131
https://git.kernel.org/stable/c/7d9e5bed036a7f9e2062a137e97e3c1e77fb8759
https://git.kernel.org/stable/c/a5f2f91b3fd7387e5102060809316a0f8f0bc625
https://git.kernel.org/stable/c/e0e3f4a18784182cfe34e20c00eca11e78d53e76
Common Vulnerability Exposure (CVE) ID: CVE-2024-22705
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.10
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d10c77873ba1e9e6b91905018e29e196fd5f863d
Common Vulnerability Exposure (CVE) ID: CVE-2024-23850
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZOU3745CWCDZ7EMKMXB2OEEIB5Q3IWM/
https://lore.kernel.org/all/6a80cb4b32af89787dadee728310e5e2ca85343f.1705741883.git.wqu@suse.com/
https://lore.kernel.org/lkml/CALGdzuo6awWdau3X=8XK547x2vX_-VoFmH1aPsqosRTQ5WzJVA@mail.gmail.com/
Common Vulnerability Exposure (CVE) ID: CVE-2024-23851
https://www.spinics.net/lists/dm-devel/msg56574.html
https://www.spinics.net/lists/dm-devel/msg56694.html
Common Vulnerability Exposure (CVE) ID: CVE-2024-24860
https://bugzilla.openanolis.cn/show_bug.cgi?id=8151
Common Vulnerability Exposure (CVE) ID: CVE-2024-26586
https://git.kernel.org/stable/c/2f5e1565740490706332c06f36211d4ce0f88e62
https://git.kernel.org/stable/c/348112522a35527c5bcba933b9fefb40a4f44f15
https://git.kernel.org/stable/c/483ae90d8f976f8339cf81066312e1329f2d3706
https://git.kernel.org/stable/c/56750ea5d15426b5f307554e7699e8b5f76c3182
https://git.kernel.org/stable/c/6fd24675188d354b1cad47462969afa2ab09d819
https://git.kernel.org/stable/c/a361c2c1da5dbb13ca67601cf961ab3ad68af383
Common Vulnerability Exposure (CVE) ID: CVE-2024-26589
https://git.kernel.org/stable/c/1b500d5d6cecf98dd6ca88bc9e7ae1783c83e6d3
https://git.kernel.org/stable/c/22c7fa171a02d310e3a3f6ed46a698ca8a0060ed
https://git.kernel.org/stable/c/29ffa63f21bcdcef3e36b03cccf9d0cd031f6ab0
https://git.kernel.org/stable/c/4108b86e324da42f7ed425bd71632fd844300dc8
https://git.kernel.org/stable/c/e8d3872b617c21100c5ee4f64e513997a68c2e3d
Common Vulnerability Exposure (CVE) ID: CVE-2024-26591
https://git.kernel.org/stable/c/50ae82f080cf87e84828f066c31723b781d68f5b
https://git.kernel.org/stable/c/6cc9c0af0aa06f781fa515a1734b1a4239dfd2c0
https://git.kernel.org/stable/c/715d82ba636cb3629a6e18a33bb9dbe53f9936ee
https://git.kernel.org/stable/c/8c8bcd45e9b10eef12321f08d2e5be33d615509c
https://git.kernel.org/stable/c/a7b98aa10f895e2569403896f2d19b73b6c95653
Common Vulnerability Exposure (CVE) ID: CVE-2024-26597
https://git.kernel.org/stable/c/02467ab8b404d80429107588e0f3425cf5fcd2e5
https://git.kernel.org/stable/c/093dab655808207f7a9f54cf156240aeafc70590
https://git.kernel.org/stable/c/17d06a5c44d8fd2e8e61bac295b09153496f87e1
https://git.kernel.org/stable/c/2295c22348faf795e1ccdf618f6eb7afdb2f7447
https://git.kernel.org/stable/c/3b5254862258b595662a0ccca6e9eeb88d6e7468
https://git.kernel.org/stable/c/b33fb5b801c6db408b774a68e7c8722796b59ecc
https://git.kernel.org/stable/c/c4734535034672f59f2652e1e0058c490da62a5c
https://git.kernel.org/stable/c/ee1dc3bf86f2df777038506b139371a9add02534
Common Vulnerability Exposure (CVE) ID: CVE-2024-26598
https://git.kernel.org/stable/c/12c2759ab1343c124ed46ba48f27bd1ef5d2dff4
https://git.kernel.org/stable/c/65b201bf3e9af1b0254243a5881390eda56f72d1
https://git.kernel.org/stable/c/ad362fe07fecf0aba839ff2cc59a3617bd42c33f
https://git.kernel.org/stable/c/ba7be666740847d967822bed15500656b26bc703
https://git.kernel.org/stable/c/d04acadb6490aa3314f9c9e087691e55de153b88
https://git.kernel.org/stable/c/dba788e25f05209adf2b0175eb1691dc89fb1ba6
https://git.kernel.org/stable/c/dd3956a1b3dd11f46488c928cb890d6937d1ca80
Common Vulnerability Exposure (CVE) ID: CVE-2024-26631
https://git.kernel.org/stable/c/2e7ef287f07c74985f1bf2858bedc62bd9ebf155
https://git.kernel.org/stable/c/380540bb06bb1d1b12bdc947d1b8f56cda6b5663
https://git.kernel.org/stable/c/3bb5849675ae1d592929798a2b37ea450879c855
https://git.kernel.org/stable/c/3cc283fd16fba72e2cefe3a6f48d7a36b0438900
https://git.kernel.org/stable/c/62b3387beef11738eb6ce667601a28fa089fa02c
Common Vulnerability Exposure (CVE) ID: CVE-2024-26633
https://git.kernel.org/stable/c/135414f300c5db995e2a2f3bf0f455de9d014aee
https://git.kernel.org/stable/c/3f15ba3dc14e6ee002ea01b4faddc3d49200377c
https://git.kernel.org/stable/c/4329426cf6b8e22b798db2331c7ef1dd2a9c748d
https://git.kernel.org/stable/c/62a1fedeb14c7ac0947ef33fadbabd35ed2400a2
https://git.kernel.org/stable/c/687c5d52fe53e602e76826dbd4d7af412747e183
https://git.kernel.org/stable/c/ba8d904c274268b18ef3dc11d3ca7b24a96cb087
https://git.kernel.org/stable/c/d375b98e0248980681e5e56b712026174d617198
https://git.kernel.org/stable/c/da23bd709b46168f7dfc36055801011222b076cd
CopyrightCopyright (C) 2024 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.