Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.12.2024.6743.3
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-6743-3)
Summary:The remote host is missing an update for the 'linux-azure-6.5' package(s) announced via the USN-6743-3 advisory.
Description:Summary:
The remote host is missing an update for the 'linux-azure-6.5' package(s) announced via the USN-6743-3 advisory.

Vulnerability Insight:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- JFS file system,
- BPF subsystem,
- Netfilter,
(CVE-2023-52600, CVE-2024-26589, CVE-2024-26591, CVE-2024-26581,
CVE-2023-52603)

Affected Software/OS:
'linux-azure-6.5' package(s) on Ubuntu 22.04.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:L/AC:L/Au:S/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2023-52600
https://git.kernel.org/stable/c/1696d6d7d4a1b373e96428d0fe1166bd7c3c795e
https://git.kernel.org/stable/c/32e8f2d95528d45828c613417cb2827d866cbdce
https://git.kernel.org/stable/c/81b4249ef37297fb17ba102a524039a05c6c5d35
https://git.kernel.org/stable/c/8e44dc3f96e903815dab1d74fff8faafdc6feb61
https://git.kernel.org/stable/c/93df0a2a0b3cde2d7ab3a52ed46ea1d6d4aaba5f
https://git.kernel.org/stable/c/bacdaa04251382d7efd4f09f9a0686bfcc297e2e
https://git.kernel.org/stable/c/bc6ef64dbe71136f327d63b2b9071b828af2c2a8
https://git.kernel.org/stable/c/e0e1958f4c365e380b17ccb35617345b31ef7bf3
Common Vulnerability Exposure (CVE) ID: CVE-2023-52603
https://git.kernel.org/stable/c/27e56f59bab5ddafbcfe69ad7a4a6ea1279c1b16
https://git.kernel.org/stable/c/6e2902ecc77e9760a9fc447f56d598383e2372d2
https://git.kernel.org/stable/c/7aa33854477d9c346f5560a1a1fcb3fe7783e2a8
https://git.kernel.org/stable/c/e30b52a2ea3d1e0aaee68096957cf90a2f4ec5af
https://git.kernel.org/stable/c/e4cbc857d75d4e22a1f75446e7480b1f305d8d60
https://git.kernel.org/stable/c/e4ce01c25ccbea02a09a5291c21749b1fc358e39
https://git.kernel.org/stable/c/edff092a59260bf0b0a2eba219cb3da6372c2f9f
https://git.kernel.org/stable/c/fd3486a893778770557649fe28afa5e463d4ed07
Common Vulnerability Exposure (CVE) ID: CVE-2024-26581
https://git.kernel.org/stable/c/10e9cb39313627f2eae4cd70c4b742074e998fd8
https://git.kernel.org/stable/c/1296c110c5a0b45a8fcf58e7d18bc5da61a565cb
https://git.kernel.org/stable/c/2bab493a5624444ec6e648ad0d55a362bcb4c003
https://git.kernel.org/stable/c/4cee42fcf54fec46b344681e7cc4f234bb22f85a
https://git.kernel.org/stable/c/60c0c230c6f046da536d3df8b39a20b9a9fd6af0
https://git.kernel.org/stable/c/6eb14441f10602fa1cf691da9d685718b68b78a9
https://git.kernel.org/stable/c/b734f7a47aeb32a5ba298e4ccc16bb0c52b6dbf7
https://git.kernel.org/stable/c/c60d252949caf9aba537525195edae6bbabc35eb
Common Vulnerability Exposure (CVE) ID: CVE-2024-26589
https://git.kernel.org/stable/c/1b500d5d6cecf98dd6ca88bc9e7ae1783c83e6d3
https://git.kernel.org/stable/c/22c7fa171a02d310e3a3f6ed46a698ca8a0060ed
https://git.kernel.org/stable/c/29ffa63f21bcdcef3e36b03cccf9d0cd031f6ab0
https://git.kernel.org/stable/c/4108b86e324da42f7ed425bd71632fd844300dc8
https://git.kernel.org/stable/c/e8d3872b617c21100c5ee4f64e513997a68c2e3d
Common Vulnerability Exposure (CVE) ID: CVE-2024-26591
https://git.kernel.org/stable/c/50ae82f080cf87e84828f066c31723b781d68f5b
https://git.kernel.org/stable/c/6cc9c0af0aa06f781fa515a1734b1a4239dfd2c0
https://git.kernel.org/stable/c/715d82ba636cb3629a6e18a33bb9dbe53f9936ee
https://git.kernel.org/stable/c/8c8bcd45e9b10eef12321f08d2e5be33d615509c
https://git.kernel.org/stable/c/a7b98aa10f895e2569403896f2d19b73b6c95653
CopyrightCopyright (C) 2024 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.