![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.1.12.2024.6775.2 |
Category: | Ubuntu Local Security Checks |
Title: | Ubuntu: Security Advisory (USN-6775-2) |
Summary: | The remote host is missing an update for the 'linux-aws, linux-aws-5.15, linux-gke' package(s) announced via the USN-6775-2 advisory. |
Description: | Summary: The remote host is missing an update for the 'linux-aws, linux-aws-5.15, linux-gke' package(s) announced via the USN-6775-2 advisory. Vulnerability Insight: Zheng Wang discovered that the Broadcom FullMAC WLAN driver in the Linux kernel contained a race condition during device removal, leading to a use- after-free vulnerability. A physically proximate attacker could possibly use this to cause a denial of service (system crash). (CVE-2023-47233) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - MAC80211 subsystem, - Tomoyo security module, (CVE-2024-26622, CVE-2023-52530) Affected Software/OS: 'linux-aws, linux-aws-5.15, linux-gke' package(s) on Ubuntu 20.04, Ubuntu 22.04. Solution: Please install the updated package(s). CVSS Score: 6.8 CVSS Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2023-47233 https://bugzilla.suse.com/show_bug.cgi?id=1216702 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0f7352557a35ab7888bc7831411ec8a3cbe20d78 https://lore.kernel.org/all/20231104054709.716585-1-zyytlz.wz@163.com/ https://marc.info/?l=linux-kernel&m=169907678011243&w=2 Common Vulnerability Exposure (CVE) ID: CVE-2023-52530 https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36 https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d Common Vulnerability Exposure (CVE) ID: CVE-2024-26622 https://git.kernel.org/stable/c/2caa605079488da9601099fbda460cfc1702839f https://git.kernel.org/stable/c/2f03fc340cac9ea1dc63cbf8c93dd2eb0f227815 https://git.kernel.org/stable/c/3bfe04c1273d30b866f4c7c238331ed3b08e5824 https://git.kernel.org/stable/c/6edefe1b6c29a9932f558a898968a9fcbeec5711 https://git.kernel.org/stable/c/7d930a4da17958f869ef679ee0e4a8729337affc https://git.kernel.org/stable/c/a23ac1788e2c828c097119e9a3178f0b7e503fee |
Copyright | Copyright (C) 2024 Greenbone AG |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |