Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.12.2024.6726.1
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-6726-1)
Summary:The remote host is missing an update for the 'linux, linux-aws, linux-aws-5.4, linux-azure, linux-azure-5.4, linux-bluefield, linux-gcp, linux-gcp-5.4, linux-gkeop, linux-hwe-5.4, linux-ibm, linux-ibm-5.4, linux-kvm, linux-oracle, linux-oracle-5.4, linux-raspi, linux-raspi-5.4' package(s) announced via the USN-6726-1 advisory.
Description:Summary:
The remote host is missing an update for the 'linux, linux-aws, linux-aws-5.4, linux-azure, linux-azure-5.4, linux-bluefield, linux-gcp, linux-gcp-5.4, linux-gkeop, linux-hwe-5.4, linux-ibm, linux-ibm-5.4, linux-kvm, linux-oracle, linux-oracle-5.4, linux-raspi, linux-raspi-5.4' package(s) announced via the USN-6726-1 advisory.

Vulnerability Insight:
Pratyush Yadav discovered that the Xen network backend implementation in
the Linux kernel did not properly handle zero length data request, leading
to a null pointer dereference vulnerability. An attacker in a guest VM
could possibly use this to cause a denial of service (host domain crash).
(CVE-2023-46838)

It was discovered that the IPv6 implementation of the Linux kernel did not
properly manage route cache memory usage. A remote attacker could use this
to cause a denial of service (memory exhaustion). (CVE-2023-52340)

It was discovered that the device mapper driver in the Linux kernel did not
properly validate target size during certain memory allocations. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2023-52429, CVE-2024-23851)

Dan Carpenter discovered that the netfilter subsystem in the Linux kernel
did not store data in properly sized memory locations. A local user could
use this to cause a denial of service (system crash). (CVE-2024-0607)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Architecture specifics,
- Cryptographic API,
- Android drivers,
- EDAC drivers,
- GPU drivers,
- Media drivers,
- MTD block device drivers,
- Network drivers,
- NVME drivers,
- TTY drivers,
- Userspace I/O drivers,
- F2FS file system,
- GFS2 file system,
- IPv6 Networking,
- AppArmor security module,
(CVE-2023-52464, CVE-2023-52448, CVE-2023-52457, CVE-2023-52443,
CVE-2023-52439, CVE-2023-52612, CVE-2024-26633, CVE-2024-26597,
CVE-2023-52449, CVE-2023-52444, CVE-2023-52609, CVE-2023-52469,
CVE-2023-52445, CVE-2023-52451, CVE-2023-52470, CVE-2023-52454,
CVE-2023-52436, CVE-2023-52438)

Affected Software/OS:
'linux, linux-aws, linux-aws-5.4, linux-azure, linux-azure-5.4, linux-bluefield, linux-gcp, linux-gcp-5.4, linux-gkeop, linux-hwe-5.4, linux-ibm, linux-ibm-5.4, linux-kvm, linux-oracle, linux-oracle-5.4, linux-raspi, linux-raspi-5.4' package(s) on Ubuntu 18.04, Ubuntu 20.04.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:L/AC:L/Au:S/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2023-46838
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGEKT4DKSDXDS34EL7M4UVJMMPH7Z3ZZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFYW6R64GPLUOXSQBJI3JBUX3HGLAYPP/
https://xenbits.xenproject.org/xsa/advisory-448.html
Common Vulnerability Exposure (CVE) ID: CVE-2023-52340
Common Vulnerability Exposure (CVE) ID: CVE-2023-52429
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GS7S3XLTLOUKBXV67LLFZWB3YVFJZHRK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3LZROQAX7Q7LEP4F7WQ3KUZKWCZGFFP2/
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bd504bcfec41a503b32054da5472904b404341a4
https://www.spinics.net/lists/dm-devel/msg56625.html
Common Vulnerability Exposure (CVE) ID: CVE-2023-52436
https://git.kernel.org/stable/c/12cf91e23b126718a96b914f949f2cdfeadc7b2a
https://git.kernel.org/stable/c/16ae3132ff7746894894927c1892493693b89135
https://git.kernel.org/stable/c/2525d1ba225b5c167162fa344013c408e8b4de36
https://git.kernel.org/stable/c/32a6cfc67675ee96fe107aeed5af9776fec63f11
https://git.kernel.org/stable/c/3e47740091b05ac8d7836a33afd8646b6863ca52
https://git.kernel.org/stable/c/5de9e9dd1828db9b8b962f7ca42548bd596deb8a
https://git.kernel.org/stable/c/e26b6d39270f5eab0087453d9b544189a38c8564
https://git.kernel.org/stable/c/f6c30bfe5a49bc38cae985083a11016800708fea
Common Vulnerability Exposure (CVE) ID: CVE-2023-52438
https://git.kernel.org/stable/c/3f489c2067c5824528212b0fc18b28d51332d906
https://git.kernel.org/stable/c/8ad4d580e8aff8de2a4d57c5930fcc29f1ffd4a6
https://git.kernel.org/stable/c/9fa04c93f24138747807fe75b5591bb680098f56
https://git.kernel.org/stable/c/a49087ab93508b60d9b8add91707a22dda832869
https://git.kernel.org/stable/c/a53e15e592b4dcc91c3a3b8514e484a0bdbc53a3
https://git.kernel.org/stable/c/c8c1158ffb007197f31f9d9170cf13e4f34cbb5c
https://git.kernel.org/stable/c/e074686e993ff1be5f21b085a3b1b4275ccd5727
Common Vulnerability Exposure (CVE) ID: CVE-2023-52439
https://git.kernel.org/stable/c/0c9ae0b8605078eafc3bea053cc78791e97ba2e2
https://git.kernel.org/stable/c/17a8519cb359c3b483fb5c7367efa9a8a508bdea
https://git.kernel.org/stable/c/3174e0f7de1ba392dc191625da83df02d695b60c
https://git.kernel.org/stable/c/35f102607054faafe78d2a6994b18d5d9d6e92ad
https://git.kernel.org/stable/c/5cf604ee538ed0c467abe3b4cda5308a6398f0f7
https://git.kernel.org/stable/c/5e0be1229ae199ebb90b33102f74a0f22d152570
https://git.kernel.org/stable/c/913205930da6213305616ac539447702eaa85e41
https://git.kernel.org/stable/c/e93da893d52d82d57fc0db2ca566024e0f26ff50
Common Vulnerability Exposure (CVE) ID: CVE-2023-52443
https://git.kernel.org/stable/c/0a12db736edbb4933e4274932aeea594b5876fa4
https://git.kernel.org/stable/c/1d8e62b5569cc1466ceb8a7e4872cf10160a9dcf
https://git.kernel.org/stable/c/55a8210c9e7d21ff2644809699765796d4bfb200
https://git.kernel.org/stable/c/5c0392fdafb0a2321311900be83ffa572bef8203
https://git.kernel.org/stable/c/5ff00408e5029d3550ee77f62dc15f1e15c47f87
https://git.kernel.org/stable/c/77ab09b92f16c8439a948d1af489196953dc4a0e
https://git.kernel.org/stable/c/9286ee97aa4803d99185768735011d0d65827c9e
https://git.kernel.org/stable/c/9d4fa5fe2b1d56662afd14915a73b4d0783ffa45
Common Vulnerability Exposure (CVE) ID: CVE-2023-52444
https://git.kernel.org/stable/c/02160112e6d45c2610b049df6eb693d7a2e57b46
https://git.kernel.org/stable/c/2fb4867f4405aea8c0519d7d188207f232a57862
https://git.kernel.org/stable/c/53edb549565f55ccd0bdf43be3d66ce4c2d48b28
https://git.kernel.org/stable/c/5624a3c1b1ebc8991318e1cce2aa719542991024
https://git.kernel.org/stable/c/6f866885e147d33efc497f1095f35b2ee5ec7310
https://git.kernel.org/stable/c/d3c0b49aaa12a61d560528f5d605029ab57f0728
https://git.kernel.org/stable/c/f0145860c20be6bae6785c7a2249577674702ac7
https://git.kernel.org/stable/c/f100ba617d8be6c98a68f3744ef7617082975b77
Common Vulnerability Exposure (CVE) ID: CVE-2023-52445
https://git.kernel.org/stable/c/2cf0005d315549b8d2b940ff96a66c2a889aa795
https://git.kernel.org/stable/c/30773ea47d41773f9611ffb4ebc9bda9d19a9e7e
https://git.kernel.org/stable/c/3233d8bf7893550045682192cb227af7fa3defeb
https://git.kernel.org/stable/c/437b5f57732bb4cc32cc9f8895d2010ee9ff521c
https://git.kernel.org/stable/c/47aa8fcd5e8b5563af4042a00f25ba89bef8f33d
https://git.kernel.org/stable/c/ded85b0c0edd8f45fec88783d7555a5b982449c1
https://git.kernel.org/stable/c/ec3634ebe23fc3c44ebc67c6d25917300bc68c08
https://git.kernel.org/stable/c/ec36c134dd020d28e312c2f1766f85525e747aab
Common Vulnerability Exposure (CVE) ID: CVE-2023-52448
https://git.kernel.org/stable/c/067a7c48c2c70f05f9460d6f0e8423e234729f05
https://git.kernel.org/stable/c/5c28478af371a1c3fdb570ca67f110e1ae60fc37
https://git.kernel.org/stable/c/8877243beafa7c6bfc42022cbfdf9e39b25bd4fa
https://git.kernel.org/stable/c/c323efd620c741168c8e0cc6fc0be04ab57e331a
https://git.kernel.org/stable/c/d69d7804cf9e2ba171a27e5f98bc266f13d0414a
https://git.kernel.org/stable/c/ee0586d73cbaf0e7058bc640d62a9daf2dfa9178
https://git.kernel.org/stable/c/efc8ef87ab9185a23d5676f2f7d986022d91bcde
Common Vulnerability Exposure (CVE) ID: CVE-2023-52449
https://git.kernel.org/stable/c/001a3f59d8c914ef8273461d4bf495df384cc5f8
https://git.kernel.org/stable/c/1bf4fe14e97cda621522eb2f28b0a4e87c5b0745
https://git.kernel.org/stable/c/5389407bba1eab1266c6d83e226fb0840cb98dd5
https://git.kernel.org/stable/c/a43bdc376deab5fff1ceb93dca55bcab8dbdc1d6
https://git.kernel.org/stable/c/aeba358bcc8ffddf9b4a9bd0e5ec9eb338d46022
https://git.kernel.org/stable/c/b36aaa64d58aaa2f2cbc8275e89bae76a2b6c3dc
https://git.kernel.org/stable/c/cfd7c9d260dc0a3baaea05a122a19ab91e193c65
https://git.kernel.org/stable/c/d8ac2537763b54d278b80b2b080e1652523c7d4c
Common Vulnerability Exposure (CVE) ID: CVE-2023-52451
https://git.kernel.org/stable/c/026fd977dc50ff4a5e09bfb0603557f104d3f3a0
https://git.kernel.org/stable/c/708a4b59baad96c4718dc0bd3a3427d3ab22fedc
https://git.kernel.org/stable/c/999a27b3ce9a69d54ccd5db000ec3a447bc43e6d
https://git.kernel.org/stable/c/9b5f03500bc5b083c0df696d7dd169d7ef3dd0c7
https://git.kernel.org/stable/c/b582aa1f66411d4adcc1aa55b8c575683fb4687e
https://git.kernel.org/stable/c/bb79613a9a704469ddb8d6c6029d532a5cea384c
https://git.kernel.org/stable/c/bd68ffce69f6cf8ddd3a3c32549d1d2275e49fc5
https://git.kernel.org/stable/c/df16afba2378d985359812c865a15c05c70a967e
Common Vulnerability Exposure (CVE) ID: CVE-2023-52454
https://git.kernel.org/stable/c/24e05760186dc070d3db190ca61efdbce23afc88
https://git.kernel.org/stable/c/2871aa407007f6f531fae181ad252486e022df42
https://git.kernel.org/stable/c/4cb3cf7177ae3666be7fb27d4ad4d72a295fb02d
https://git.kernel.org/stable/c/70154e8d015c9b4fb56c1a2ef1fc8b83d45c7f68
https://git.kernel.org/stable/c/ee5e7632e981673f42a50ade25e71e612e543d9d
https://git.kernel.org/stable/c/efa56305908ba20de2104f1b8508c6a7401833be
https://git.kernel.org/stable/c/f775f2621c2ac5cc3a0b3a64665dad4fb146e510
Common Vulnerability Exposure (CVE) ID: CVE-2023-52457
https://git.kernel.org/stable/c/828cd829483f0cda920710997aed79130b0af690
https://git.kernel.org/stable/c/887a558d0298d36297daea039954c39940228d9b
https://git.kernel.org/stable/c/95e4e0031effad9837af557ecbfd4294a4d8aeee
https://git.kernel.org/stable/c/ad90d0358bd3b4554f243a425168fc7cebe7d04e
https://git.kernel.org/stable/c/b502fb43f7fb55aaf07f6092ab44657595214b93
https://git.kernel.org/stable/c/bc57f3ef8a9eb0180606696f586a6dcfaa175ed0
https://git.kernel.org/stable/c/d74173bda29aba58f822175d983d07c8ed335494
Common Vulnerability Exposure (CVE) ID: CVE-2023-52464
https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5
https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8
https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6
https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a
https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21
https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601
https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398
https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057
Common Vulnerability Exposure (CVE) ID: CVE-2023-52469
https://git.kernel.org/stable/c/28dd788382c43b330480f57cd34cde0840896743
https://git.kernel.org/stable/c/3426f059eacc33ecc676b0d66539297e1cfafd02
https://git.kernel.org/stable/c/35fa2394d26e919f63600ce631e6aefc95ec2706
https://git.kernel.org/stable/c/520e213a0b97b64735a13950e9371e0a5d7a5dc3
https://git.kernel.org/stable/c/8a27d9d9fc9b5564b8904c3a77a7dea482bfa34e
https://git.kernel.org/stable/c/8b55b06e737feb2a645b0293ea27e38418876d63
https://git.kernel.org/stable/c/95084632a65d5c0d682a83b55935560bdcd2a1e3
https://git.kernel.org/stable/c/b6dcba02ee178282e0d28684d241e0b8462dea6a
Common Vulnerability Exposure (CVE) ID: CVE-2023-52470
https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088
https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1
https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41
https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb
https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4
https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310
https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85
https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97
Common Vulnerability Exposure (CVE) ID: CVE-2023-52609
https://git.kernel.org/stable/c/252a2a5569eb9f8d16428872cc24dea1ac0bb097
https://git.kernel.org/stable/c/6696f76c32ff67fec26823fc2df46498e70d9bf3
https://git.kernel.org/stable/c/67f16bf2cc1698fd50e01ee8a2becc5a8e6d3a3e
https://git.kernel.org/stable/c/77d210e8db4d61d43b2d16df66b1ec46fad2ee01
https://git.kernel.org/stable/c/7e7a0d86542b0ea903006d3f42f33c4f7ead6918
https://git.kernel.org/stable/c/95b1d336b0642198b56836b89908d07b9a0c9608
https://git.kernel.org/stable/c/98fee5bee97ad47b527a997d5786410430d1f0e9
https://git.kernel.org/stable/c/9a9ab0d963621d9d12199df9817e66982582d5a5
Common Vulnerability Exposure (CVE) ID: CVE-2023-52612
https://git.kernel.org/stable/c/1142d65c5b881590962ad763f94505b6dd67d2fe
https://git.kernel.org/stable/c/4518dc468cdd796757190515a9be7408adc8911e
https://git.kernel.org/stable/c/4df0c942d04a67df174195ad8082f6e30e7f71a5
https://git.kernel.org/stable/c/71c6670f9f032ec67d8f4e3f8db4646bf5a62883
https://git.kernel.org/stable/c/744e1885922a9943458954cfea917b31064b4131
https://git.kernel.org/stable/c/7d9e5bed036a7f9e2062a137e97e3c1e77fb8759
https://git.kernel.org/stable/c/a5f2f91b3fd7387e5102060809316a0f8f0bc625
https://git.kernel.org/stable/c/e0e3f4a18784182cfe34e20c00eca11e78d53e76
Common Vulnerability Exposure (CVE) ID: CVE-2024-0607
RHBZ#2258635
https://bugzilla.redhat.com/show_bug.cgi?id=2258635
https://access.redhat.com/security/cve/CVE-2024-0607
https://github.com/torvalds/linux/commit/c301f0981fdd3fd1ffac6836b423c4d7a8e0eb63
Common Vulnerability Exposure (CVE) ID: CVE-2024-23851
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZOU3745CWCDZ7EMKMXB2OEEIB5Q3IWM/
https://www.spinics.net/lists/dm-devel/msg56574.html
https://www.spinics.net/lists/dm-devel/msg56694.html
Common Vulnerability Exposure (CVE) ID: CVE-2024-26597
https://git.kernel.org/stable/c/02467ab8b404d80429107588e0f3425cf5fcd2e5
https://git.kernel.org/stable/c/093dab655808207f7a9f54cf156240aeafc70590
https://git.kernel.org/stable/c/17d06a5c44d8fd2e8e61bac295b09153496f87e1
https://git.kernel.org/stable/c/2295c22348faf795e1ccdf618f6eb7afdb2f7447
https://git.kernel.org/stable/c/3b5254862258b595662a0ccca6e9eeb88d6e7468
https://git.kernel.org/stable/c/b33fb5b801c6db408b774a68e7c8722796b59ecc
https://git.kernel.org/stable/c/c4734535034672f59f2652e1e0058c490da62a5c
https://git.kernel.org/stable/c/ee1dc3bf86f2df777038506b139371a9add02534
Common Vulnerability Exposure (CVE) ID: CVE-2024-26633
https://git.kernel.org/stable/c/135414f300c5db995e2a2f3bf0f455de9d014aee
https://git.kernel.org/stable/c/3f15ba3dc14e6ee002ea01b4faddc3d49200377c
https://git.kernel.org/stable/c/4329426cf6b8e22b798db2331c7ef1dd2a9c748d
https://git.kernel.org/stable/c/62a1fedeb14c7ac0947ef33fadbabd35ed2400a2
https://git.kernel.org/stable/c/687c5d52fe53e602e76826dbd4d7af412747e183
https://git.kernel.org/stable/c/ba8d904c274268b18ef3dc11d3ca7b24a96cb087
https://git.kernel.org/stable/c/d375b98e0248980681e5e56b712026174d617198
https://git.kernel.org/stable/c/da23bd709b46168f7dfc36055801011222b076cd
CopyrightCopyright (C) 2024 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.