Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.12.2024.6774.1
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-6774-1)
Summary:The remote host is missing an update for the 'linux, linux-aws, linux-aws-6.5, linux-azure, linux-azure-6.5, linux-gcp, linux-gcp-6.5, linux-hwe-6.5, linux-laptop, linux-lowlatency, linux-lowlatency-hwe-6.5, linux-nvidia-6.5, linux-oem-6.5, linux-oracle, linux-oracle-6.5, linux-raspi, linux-starfive, linux-starfive-6.5' package(s) announced via the USN-6774-1 advisory.
Description:Summary:
The remote host is missing an update for the 'linux, linux-aws, linux-aws-6.5, linux-azure, linux-azure-6.5, linux-gcp, linux-gcp-6.5, linux-hwe-6.5, linux-laptop, linux-lowlatency, linux-lowlatency-hwe-6.5, linux-nvidia-6.5, linux-oem-6.5, linux-oracle, linux-oracle-6.5, linux-raspi, linux-starfive, linux-starfive-6.5' package(s) announced via the USN-6774-1 advisory.

Vulnerability Insight:
Zheng Wang discovered that the Broadcom FullMAC WLAN driver in the Linux
kernel contained a race condition during device removal, leading to a use-
after-free vulnerability. A physically proximate attacker could possibly
use this to cause a denial of service (system crash). (CVE-2023-47233)

Sander Wiebing, Alvise de Faveri Tron, Herbert Bos, and Cristiano Giuffrida
discovered that the Linux kernel mitigations for the initial Branch History
Injection vulnerability (CVE-2022-0001) were insufficient for Intel
processors. A local attacker could potentially use this to expose sensitive
information. (CVE-2024-2201)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Hardware random number generator core,
- Ext4 file system,
- JFS file system,
- Bluetooth subsystem,
- Networking core,
- IPv4 networking,
- Logical Link layer,
- Netlink,
- Tomoyo security module,
(CVE-2024-26704, CVE-2023-52615, CVE-2024-26805, CVE-2023-52604,
CVE-2024-26614, CVE-2023-52602, CVE-2024-26635, CVE-2024-26622,
CVE-2023-52601, CVE-2024-26801)

Affected Software/OS:
'linux, linux-aws, linux-aws-6.5, linux-azure, linux-azure-6.5, linux-gcp, linux-gcp-6.5, linux-hwe-6.5, linux-laptop, linux-lowlatency, linux-lowlatency-hwe-6.5, linux-nvidia-6.5, linux-oem-6.5, linux-oracle, linux-oracle-6.5, linux-raspi, linux-starfive, linux-starfive-6.5' package(s) on Ubuntu 22.04, Ubuntu 23.10.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:L/AC:L/Au:S/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2023-47233
https://bugzilla.suse.com/show_bug.cgi?id=1216702
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0f7352557a35ab7888bc7831411ec8a3cbe20d78
https://lore.kernel.org/all/20231104054709.716585-1-zyytlz.wz@163.com/
https://marc.info/?l=linux-kernel&m=169907678011243&w=2
Common Vulnerability Exposure (CVE) ID: CVE-2023-52601
https://git.kernel.org/stable/c/2037cb9d95f1741885f7daf50e8a028c4ade5317
https://git.kernel.org/stable/c/2e16a1389b5a7983b45cb2aa20b0e3f0ee364d6c
https://git.kernel.org/stable/c/3d3898b4d72c677d47fe3cb554449f2df5c12555
https://git.kernel.org/stable/c/3f8217c323fd6ecd6829a0c3ae7ac3f14eac368e
https://git.kernel.org/stable/c/70780914cb57e2ba711e0ac1b677aaaa75103603
https://git.kernel.org/stable/c/74ecdda68242b174920fe7c6133a856fb7d8559b
https://git.kernel.org/stable/c/8393c80cce45f40c1256d72e21ad351b3650c57e
https://git.kernel.org/stable/c/fc67a2e18f4c4e3f07e9f9ae463da24530470e73
Common Vulnerability Exposure (CVE) ID: CVE-2023-52602
https://git.kernel.org/stable/c/1b9d6828589d57f94a23fb1c46112cda39d7efdb
https://git.kernel.org/stable/c/1c40ca3d39d769931b28295b3145c25f1decf5a6
https://git.kernel.org/stable/c/6c6a96c3d74df185ee344977d46944d6f33bb4dd
https://git.kernel.org/stable/c/7110650b85dd2f1cee819acd1345a9013a1a62f7
https://git.kernel.org/stable/c/bff9d4078a232c01e42e9377d005fb2f4d31a472
https://git.kernel.org/stable/c/cab0c265ba182fd266c2aa3c69d7e40640a7f612
https://git.kernel.org/stable/c/ce8bc22e948634a5c0a3fa58a179177d0e3f3950
https://git.kernel.org/stable/c/fa5492ee89463a7590a1449358002ff7ef63529f
Common Vulnerability Exposure (CVE) ID: CVE-2023-52604
https://git.kernel.org/stable/c/42f433785f108893de0dd5260bafb85d7d51db03
https://git.kernel.org/stable/c/59342822276f753e49d27ef5eebffbba990572b9
https://git.kernel.org/stable/c/6a44065dd604972ec1fbcccbdc4a70d266a89cdd
https://git.kernel.org/stable/c/6fe8b702125aeee6ce83f20092a2341446704e7b
https://git.kernel.org/stable/c/9862ec7ac1cbc6eb5ee4a045b5d5b8edbb2f7e68
https://git.kernel.org/stable/c/98f9537fe61b8382b3cc5dd97347531698517c56
https://git.kernel.org/stable/c/de34de6e57bbbc868e4fcf9e98c76b3587cabb0b
https://git.kernel.org/stable/c/e3e95c6850661c77e6dab079d9b5374a618ebb15
Common Vulnerability Exposure (CVE) ID: CVE-2023-52615
https://git.kernel.org/stable/c/26cc6d7006f922df6cc4389248032d955750b2a0
https://git.kernel.org/stable/c/5030d4c798863ccb266563201b341a099e8cdd48
https://git.kernel.org/stable/c/6822a14271786150e178869f1495cc03e74c5029
https://git.kernel.org/stable/c/78aafb3884f6bc6636efcc1760c891c8500b9922
https://git.kernel.org/stable/c/aa8aa16ed9adf1df05bb339d588cf485a011839e
https://git.kernel.org/stable/c/c6a8111aacbfe7a8a70f46cc0de8eed00561693c
https://git.kernel.org/stable/c/eafd83b92f6c044007a3591cbd476bcf90455990
https://git.kernel.org/stable/c/ecabe8cd456d3bf81e92c53b074732f3140f170d
Common Vulnerability Exposure (CVE) ID: CVE-2024-2201
Common Vulnerability Exposure (CVE) ID: CVE-2024-26614
https://git.kernel.org/stable/c/168e7e599860654876c2a1102a82610285c02f02
https://git.kernel.org/stable/c/198bc90e0e734e5f98c3d2833e8390cac3df61b2
https://git.kernel.org/stable/c/3982fe726a63fb3de6005e534e2ac8ca7e0aca2a
https://git.kernel.org/stable/c/b1e0a68a0cd2a83259c444f638b417a8fffc6855
https://git.kernel.org/stable/c/bc99dcedd2f422d602516762b96c8ef1ae6b2882
https://git.kernel.org/stable/c/d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3
Common Vulnerability Exposure (CVE) ID: CVE-2024-26622
https://git.kernel.org/stable/c/2caa605079488da9601099fbda460cfc1702839f
https://git.kernel.org/stable/c/2f03fc340cac9ea1dc63cbf8c93dd2eb0f227815
https://git.kernel.org/stable/c/3bfe04c1273d30b866f4c7c238331ed3b08e5824
https://git.kernel.org/stable/c/6edefe1b6c29a9932f558a898968a9fcbeec5711
https://git.kernel.org/stable/c/7d930a4da17958f869ef679ee0e4a8729337affc
https://git.kernel.org/stable/c/a23ac1788e2c828c097119e9a3178f0b7e503fee
Common Vulnerability Exposure (CVE) ID: CVE-2024-26635
https://git.kernel.org/stable/c/165ad1e22779685c3ed3dd349c6c4c632309cc62
https://git.kernel.org/stable/c/660c3053d992b68fee893a0e9ec9159228cffdc6
https://git.kernel.org/stable/c/9ccdef19cf9497c2803b005369668feb91cacdfd
https://git.kernel.org/stable/c/b8e8838f82f332ae80c643dbb1ca4418d0628097
https://git.kernel.org/stable/c/c0fe2fe7a5a291dfcf6dc64301732c8d3dc6a828
https://git.kernel.org/stable/c/df57fc2f2abf548aa889a36ab0bdcc94a75399dc
https://git.kernel.org/stable/c/e3f9bed9bee261e3347131764e42aeedf1ffea61
https://git.kernel.org/stable/c/f1f34a515fb1e25e85dee94f781e7869ae351fb8
Common Vulnerability Exposure (CVE) ID: CVE-2024-26704
https://git.kernel.org/stable/c/185eab30486ba3e7bf8b9c2e049c79a06ffd2bc1
https://git.kernel.org/stable/c/2883940b19c38d5884c8626483811acf4d7e148f
https://git.kernel.org/stable/c/55583e899a5357308274601364741a83e78d6ac4
https://git.kernel.org/stable/c/559ddacb90da1d8786dd8ec4fd76bbfa404eaef6
https://git.kernel.org/stable/c/afba9d11320dad5ce222ac8964caf64b7b4bedb1
https://git.kernel.org/stable/c/afbcad9ae7d6d11608399188f03a837451b6b3a1
https://git.kernel.org/stable/c/b4fbb89d722cbb16beaaea234b7230faaaf68c71
https://git.kernel.org/stable/c/d033a555d9a1cf53dbf3301af7199cc4a4c8f537
Common Vulnerability Exposure (CVE) ID: CVE-2024-26801
https://git.kernel.org/stable/c/2449007d3f73b2842c9734f45f0aadb522daf592
https://git.kernel.org/stable/c/2ab9a19d896f5a0dd386e1f001c5309bc35f433b
https://git.kernel.org/stable/c/45085686b9559bfbe3a4f41d3d695a520668f5e1
https://git.kernel.org/stable/c/6dd0a9dfa99f8990a08eb8fdd8e79bee31c7d8e2
https://git.kernel.org/stable/c/98fb98fd37e42fd4ce13ff657ea64503e24b6090
https://git.kernel.org/stable/c/da4569d450b193e39e87119fd316c0291b585d14
https://git.kernel.org/stable/c/dd594cdc24f2e48dab441732e6dfcafd6b0711d1
https://git.kernel.org/stable/c/e0b278650f07acf2e0932149183458468a731c03
Common Vulnerability Exposure (CVE) ID: CVE-2024-26805
https://git.kernel.org/stable/c/0b27bf4c494d61e5663baa34c3edd7ccebf0ea44
https://git.kernel.org/stable/c/59fc3e3d049e39e7d0d271f20dd5fb47c57faf1d
https://git.kernel.org/stable/c/661779e1fcafe1b74b3f3fe8e980c1e207fea1fd
https://git.kernel.org/stable/c/9ae51361da43270f4ba0eb924427a07e87e48777
https://git.kernel.org/stable/c/c71ed29d15b1a1ed6c464f8c3536996963046285
https://git.kernel.org/stable/c/d3ada42e534a83b618bbc1e490d23bf0fdae4736
https://git.kernel.org/stable/c/ec343a55b687a452f5e87f3b52bf9f155864df65
https://git.kernel.org/stable/c/f19d1f98e60e68b11fc60839105dd02a30ec0d77
CopyrightCopyright (C) 2024 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.