Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.12.2024.6739.1
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-6739-1)
Summary:The remote host is missing an update for the 'linux, linux-aws, linux-kvm, linux-lts-xenial' package(s) announced via the USN-6739-1 advisory.
Description:Summary:
The remote host is missing an update for the 'linux, linux-aws, linux-kvm, linux-lts-xenial' package(s) announced via the USN-6739-1 advisory.

Vulnerability Insight:
It was discovered that a race condition existed in the instruction emulator
of the Linux kernel on Arm 64-bit systems. A local attacker could use this
to cause a denial of service (system crash). (CVE-2022-20422)

Wei Chen discovered that a race condition existed in the TIPC protocol
implementation in the Linux kernel, leading to a null pointer dereference
vulnerability. A local attacker could use this to cause a denial of service
(system crash). (CVE-2023-1382)

Jose Oliveira and Rodrigo Branco discovered that the Spectre Variant 2
mitigations with prctl syscall were insufficient in some situations. A
local attacker could possibly use this to expose sensitive information.
(CVE-2023-1998)

Daniele Antonioli discovered that the Secure Simple Pairing and Secure
Connections pairing in the Bluetooth protocol could allow an
unauthenticated user to complete authentication without pairing
credentials. A physically proximate attacker placed between two Bluetooth
devices could use this to subsequently impersonate one of the paired
devices. (CVE-2023-24023)

shanzhulig discovered that the DRM subsystem in the Linux kernel contained
a race condition when performing certain operation while handling driver
unload, leading to a use-after-free vulnerability. A local attacker could
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-51043)

It was discovered that a race condition existed in the Bluetooth subsystem
of the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-51779)

It was discovered that the device mapper driver in the Linux kernel did not
properly validate target size during certain memory allocations. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2023-52429, CVE-2024-23851)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Architecture specifics,
- ACPI drivers,
- I2C subsystem,
- Media drivers,
- JFS file system,
- IPv4 Networking,
- Open vSwitch,
(CVE-2021-46966, CVE-2021-46936, CVE-2023-52451, CVE-2019-25162,
CVE-2023-52445, CVE-2023-52600, CVE-2021-46990, CVE-2021-46955,
CVE-2023-52603)

Affected Software/OS:
'linux, linux-aws, linux-kvm, linux-lts-xenial' package(s) on Ubuntu 14.04, Ubuntu 16.04.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:L/AC:L/Au:S/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2019-25162
https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d
https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829
https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7
https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9
https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87
https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf
https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a
https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4
Common Vulnerability Exposure (CVE) ID: CVE-2021-46936
https://git.kernel.org/stable/c/08eacbd141e2495d2fcdde84358a06c4f95cbb13
https://git.kernel.org/stable/c/15579e1301f856ad9385d720c9267c11032a5022
https://git.kernel.org/stable/c/2386e81a1d277f540e1285565c9d41d531bb69d4
https://git.kernel.org/stable/c/5c2fe20ad37ff56070ae0acb34152333976929b4
https://git.kernel.org/stable/c/a8e1944b44f94f5c5f530e434c5eaee787254566
https://git.kernel.org/stable/c/e22e45fc9e41bf9fcc1e92cfb78eb92786728ef0
https://git.kernel.org/stable/c/e73164e89d1be561228a4534e1091369ee4ba41a
https://git.kernel.org/stable/c/fe5838c22b986c1190f1dce9aa09bf6a491c1a69
Common Vulnerability Exposure (CVE) ID: CVE-2021-46955
https://git.kernel.org/stable/c/23e17ec1a5eb53fe39cc34fa5592686d5acd0dac
https://git.kernel.org/stable/c/490ad0a2390442d0a7b8c00972a83dbb09cab142
https://git.kernel.org/stable/c/5a52fa8ad45b5a593ed416adf326538638454ff1
https://git.kernel.org/stable/c/7c0ea5930c1c211931819d83cfb157bff1539a4c
https://git.kernel.org/stable/c/a1478374b0bda89b4277a8afd39208271faad4be
https://git.kernel.org/stable/c/b1d7280f9ba1bfdbc3af5bdb82e51f014854f26f
https://git.kernel.org/stable/c/b3502b04e84ac5349be95fc033c17bd701d2787a
https://git.kernel.org/stable/c/d841d3cf5297fde4ce6a41ff35451d0e82917f3e
https://git.kernel.org/stable/c/df9e900de24637be41879e2c50afb713ec4e8b2e
Common Vulnerability Exposure (CVE) ID: CVE-2021-46966
https://git.kernel.org/stable/c/1d53ca5d131074c925ce38361fb0376d3bf7e394
https://git.kernel.org/stable/c/62dc2440ebb552aa0d7f635e1697e077d9d21203
https://git.kernel.org/stable/c/72814a94c38a33239793f7622cec6ace1e540c4b
https://git.kernel.org/stable/c/8b04d57f30caf76649d0567551589af9a66ca9be
https://git.kernel.org/stable/c/90575d1d9311b753cf1718f4ce9061ddda7dfd23
https://git.kernel.org/stable/c/a5b26a2e362f572d87e9fd35435680e557052a17
https://git.kernel.org/stable/c/b7a5baaae212a686ceb812c32fceed79c03c0234
https://git.kernel.org/stable/c/e483bb9a991bdae29a0caa4b3a6d002c968f94aa
https://git.kernel.org/stable/c/f16737caf41fc06cfe6e49048becb09657074d4b
Common Vulnerability Exposure (CVE) ID: CVE-2021-46990
https://git.kernel.org/stable/c/0b4eb172cc12dc102cd0ad013e53ee4463db9508
https://git.kernel.org/stable/c/0c25a7bb697f2e6ee65b6d63782f675bf129511a
https://git.kernel.org/stable/c/2db22ba4e0e103f00e0512e0ecce36ac78c644f8
https://git.kernel.org/stable/c/5bc00fdda1e934c557351a9c751a205293e68cbf
https://git.kernel.org/stable/c/8382b15864e5014261b4f36c2aa89723612ee058
https://git.kernel.org/stable/c/aec86b052df6541cc97c5fca44e5934cbea4963b
https://git.kernel.org/stable/c/d2e3590ca39ccfd8a5a46d8c7f095cb6c7b9ae92
https://git.kernel.org/stable/c/dd0d6117052faace5440db20fc37175efe921c7d
https://git.kernel.org/stable/c/ee4b7aab93c2631c3bb0753023c5dda592bb666b
Common Vulnerability Exposure (CVE) ID: CVE-2022-20422
https://source.android.com/security/bulletin/2022-10-01
https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html
Common Vulnerability Exposure (CVE) ID: CVE-2023-1382
https://lore.kernel.org/netdev/bc7bd3183f1c275c820690fc65b708238fe9e38e.1668807842.git.lucien.xin@gmail.com/T/#u
Common Vulnerability Exposure (CVE) ID: CVE-2023-1998
https://github.com/google/security-research/security/advisories/GHSA-mj4w-6495-6crx
https://github.com/torvalds/linux/commit/6921ed9049bc7457f66c1596c5b78aec0dae4a9d
https://kernel.dance/#6921ed9049bc7457f66c1596c5b78aec0dae4a9d
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
Common Vulnerability Exposure (CVE) ID: CVE-2023-24023
https://dl.acm.org/doi/10.1145/3576915.3623066
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/bluffs-vulnerability/
Common Vulnerability Exposure (CVE) ID: CVE-2023-51043
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.5
https://github.com/torvalds/linux/commit/4e076c73e4f6e90816b30fcd4a0d7ab365087255
Common Vulnerability Exposure (CVE) ID: CVE-2023-51779
https://github.com/torvalds/linux/commit/2e07e8348ea454615e268222ae3fc240421be768
Common Vulnerability Exposure (CVE) ID: CVE-2023-52429
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GS7S3XLTLOUKBXV67LLFZWB3YVFJZHRK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3LZROQAX7Q7LEP4F7WQ3KUZKWCZGFFP2/
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bd504bcfec41a503b32054da5472904b404341a4
https://www.spinics.net/lists/dm-devel/msg56625.html
Common Vulnerability Exposure (CVE) ID: CVE-2023-52445
https://git.kernel.org/stable/c/2cf0005d315549b8d2b940ff96a66c2a889aa795
https://git.kernel.org/stable/c/30773ea47d41773f9611ffb4ebc9bda9d19a9e7e
https://git.kernel.org/stable/c/3233d8bf7893550045682192cb227af7fa3defeb
https://git.kernel.org/stable/c/437b5f57732bb4cc32cc9f8895d2010ee9ff521c
https://git.kernel.org/stable/c/47aa8fcd5e8b5563af4042a00f25ba89bef8f33d
https://git.kernel.org/stable/c/ded85b0c0edd8f45fec88783d7555a5b982449c1
https://git.kernel.org/stable/c/ec3634ebe23fc3c44ebc67c6d25917300bc68c08
https://git.kernel.org/stable/c/ec36c134dd020d28e312c2f1766f85525e747aab
Common Vulnerability Exposure (CVE) ID: CVE-2023-52451
https://git.kernel.org/stable/c/026fd977dc50ff4a5e09bfb0603557f104d3f3a0
https://git.kernel.org/stable/c/708a4b59baad96c4718dc0bd3a3427d3ab22fedc
https://git.kernel.org/stable/c/999a27b3ce9a69d54ccd5db000ec3a447bc43e6d
https://git.kernel.org/stable/c/9b5f03500bc5b083c0df696d7dd169d7ef3dd0c7
https://git.kernel.org/stable/c/b582aa1f66411d4adcc1aa55b8c575683fb4687e
https://git.kernel.org/stable/c/bb79613a9a704469ddb8d6c6029d532a5cea384c
https://git.kernel.org/stable/c/bd68ffce69f6cf8ddd3a3c32549d1d2275e49fc5
https://git.kernel.org/stable/c/df16afba2378d985359812c865a15c05c70a967e
Common Vulnerability Exposure (CVE) ID: CVE-2023-52600
https://git.kernel.org/stable/c/1696d6d7d4a1b373e96428d0fe1166bd7c3c795e
https://git.kernel.org/stable/c/32e8f2d95528d45828c613417cb2827d866cbdce
https://git.kernel.org/stable/c/81b4249ef37297fb17ba102a524039a05c6c5d35
https://git.kernel.org/stable/c/8e44dc3f96e903815dab1d74fff8faafdc6feb61
https://git.kernel.org/stable/c/93df0a2a0b3cde2d7ab3a52ed46ea1d6d4aaba5f
https://git.kernel.org/stable/c/bacdaa04251382d7efd4f09f9a0686bfcc297e2e
https://git.kernel.org/stable/c/bc6ef64dbe71136f327d63b2b9071b828af2c2a8
https://git.kernel.org/stable/c/e0e1958f4c365e380b17ccb35617345b31ef7bf3
Common Vulnerability Exposure (CVE) ID: CVE-2023-52603
https://git.kernel.org/stable/c/27e56f59bab5ddafbcfe69ad7a4a6ea1279c1b16
https://git.kernel.org/stable/c/6e2902ecc77e9760a9fc447f56d598383e2372d2
https://git.kernel.org/stable/c/7aa33854477d9c346f5560a1a1fcb3fe7783e2a8
https://git.kernel.org/stable/c/e30b52a2ea3d1e0aaee68096957cf90a2f4ec5af
https://git.kernel.org/stable/c/e4cbc857d75d4e22a1f75446e7480b1f305d8d60
https://git.kernel.org/stable/c/e4ce01c25ccbea02a09a5291c21749b1fc358e39
https://git.kernel.org/stable/c/edff092a59260bf0b0a2eba219cb3da6372c2f9f
https://git.kernel.org/stable/c/fd3486a893778770557649fe28afa5e463d4ed07
Common Vulnerability Exposure (CVE) ID: CVE-2024-23851
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZOU3745CWCDZ7EMKMXB2OEEIB5Q3IWM/
https://www.spinics.net/lists/dm-devel/msg56574.html
https://www.spinics.net/lists/dm-devel/msg56694.html
CopyrightCopyright (C) 2024 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.