Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.12.2024.6778.1
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-6778-1)
Summary:The remote host is missing an update for the 'linux, linux-aws, linux-kvm, linux-lts-xenial' package(s) announced via the USN-6778-1 advisory.
Description:Summary:
The remote host is missing an update for the 'linux, linux-aws, linux-kvm, linux-lts-xenial' package(s) announced via the USN-6778-1 advisory.

Vulnerability Insight:
Zheng Wang discovered that the Broadcom FullMAC WLAN driver in the Linux
kernel contained a race condition during device removal, leading to a use-
after-free vulnerability. A physically proximate attacker could possibly
use this to cause a denial of service (system crash). (CVE-2023-47233)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Ext4 file system,
- JFS file system,
- NILFS2 file system,
- Core kernel,
- Bluetooth subsystem,
- Networking core,
- IPv4 networking,
- Logical Link layer,
- MAC80211 subsystem,
- Netlink,
- NFC subsystem,
- Tomoyo security module,
(CVE-2023-52601, CVE-2024-26622, CVE-2024-26805, CVE-2024-26635,
CVE-2023-52602, CVE-2024-26801, CVE-2023-52566, CVE-2024-26704,
CVE-2021-46939, CVE-2024-26614, CVE-2023-52604, CVE-2023-52530,
CVE-2023-52524)

Affected Software/OS:
'linux, linux-aws, linux-kvm, linux-lts-xenial' package(s) on Ubuntu 14.04, Ubuntu 16.04.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:L/AC:L/Au:S/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2021-46939
https://git.kernel.org/stable/c/1fca00920327be96f3318224f502e4d5460f9545
https://git.kernel.org/stable/c/2a1bd74b8186d7938bf004f5603f25b84785f63e
https://git.kernel.org/stable/c/6e2418576228eeb12e7ba82edb8f9500623942ff
https://git.kernel.org/stable/c/859b47a43f5a0e5b9a92b621dc6ceaad39fb5c8b
https://git.kernel.org/stable/c/91ca6f6a91f679c8645d7f3307e03ce86ad518c4
https://git.kernel.org/stable/c/a33614d52e97fc8077eb0b292189ca7d964cc534
https://git.kernel.org/stable/c/aafe104aa9096827a429bc1358f8260ee565b7cc
https://git.kernel.org/stable/c/c64da3294a7d59a4bf6874c664c13be892f15f44
https://git.kernel.org/stable/c/d43d56dbf452ccecc1ec735cd4b6840118005d7c
Common Vulnerability Exposure (CVE) ID: CVE-2023-47233
https://bugzilla.suse.com/show_bug.cgi?id=1216702
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0f7352557a35ab7888bc7831411ec8a3cbe20d78
https://lore.kernel.org/all/20231104054709.716585-1-zyytlz.wz@163.com/
https://marc.info/?l=linux-kernel&m=169907678011243&w=2
Common Vulnerability Exposure (CVE) ID: CVE-2023-52524
https://git.kernel.org/stable/c/191d87a19cf1005ecf41e1ae08d74e17379e8391
https://git.kernel.org/stable/c/29c16c2bf5866326d5fbc4a537b3997fcac23391
https://git.kernel.org/stable/c/4837a192f6d06d5bb2f3f47d6ce5353ab69bf86b
https://git.kernel.org/stable/c/7562780e32b84196731d57dd24563546fcf6d082
https://git.kernel.org/stable/c/dba849cc98113b145c6e720122942c00b8012bdb
https://git.kernel.org/stable/c/dfc7f7a988dad34c3bf4c053124fb26aa6c5f916
Common Vulnerability Exposure (CVE) ID: CVE-2023-52530
https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36
https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b
https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d
Common Vulnerability Exposure (CVE) ID: CVE-2023-52566
https://git.kernel.org/stable/c/193b5a1c6c67c36b430989dc063fe7ea4e200a33
https://git.kernel.org/stable/c/28df4646ad8b433340772edc90ca709cdefc53e2
https://git.kernel.org/stable/c/3936e8714907cd55e37c7cc50e50229e4a9042e8
https://git.kernel.org/stable/c/7130a87ca32396eb9bf48b71a2d42259ae44c6c7
https://git.kernel.org/stable/c/7ee29facd8a9c5a26079148e36bcf07141b3a6bc
https://git.kernel.org/stable/c/980663f1d189eedafd18d80053d9cf3e2ceb5c8c
https://git.kernel.org/stable/c/bb61224f6abc8e71bfdf06d7c984e23460875f5b
https://git.kernel.org/stable/c/fb1084e63ee56958b0a56e17a50a4fd86445b9c1
Common Vulnerability Exposure (CVE) ID: CVE-2023-52601
https://git.kernel.org/stable/c/2037cb9d95f1741885f7daf50e8a028c4ade5317
https://git.kernel.org/stable/c/2e16a1389b5a7983b45cb2aa20b0e3f0ee364d6c
https://git.kernel.org/stable/c/3d3898b4d72c677d47fe3cb554449f2df5c12555
https://git.kernel.org/stable/c/3f8217c323fd6ecd6829a0c3ae7ac3f14eac368e
https://git.kernel.org/stable/c/70780914cb57e2ba711e0ac1b677aaaa75103603
https://git.kernel.org/stable/c/74ecdda68242b174920fe7c6133a856fb7d8559b
https://git.kernel.org/stable/c/8393c80cce45f40c1256d72e21ad351b3650c57e
https://git.kernel.org/stable/c/fc67a2e18f4c4e3f07e9f9ae463da24530470e73
Common Vulnerability Exposure (CVE) ID: CVE-2023-52602
https://git.kernel.org/stable/c/1b9d6828589d57f94a23fb1c46112cda39d7efdb
https://git.kernel.org/stable/c/1c40ca3d39d769931b28295b3145c25f1decf5a6
https://git.kernel.org/stable/c/6c6a96c3d74df185ee344977d46944d6f33bb4dd
https://git.kernel.org/stable/c/7110650b85dd2f1cee819acd1345a9013a1a62f7
https://git.kernel.org/stable/c/bff9d4078a232c01e42e9377d005fb2f4d31a472
https://git.kernel.org/stable/c/cab0c265ba182fd266c2aa3c69d7e40640a7f612
https://git.kernel.org/stable/c/ce8bc22e948634a5c0a3fa58a179177d0e3f3950
https://git.kernel.org/stable/c/fa5492ee89463a7590a1449358002ff7ef63529f
Common Vulnerability Exposure (CVE) ID: CVE-2023-52604
https://git.kernel.org/stable/c/42f433785f108893de0dd5260bafb85d7d51db03
https://git.kernel.org/stable/c/59342822276f753e49d27ef5eebffbba990572b9
https://git.kernel.org/stable/c/6a44065dd604972ec1fbcccbdc4a70d266a89cdd
https://git.kernel.org/stable/c/6fe8b702125aeee6ce83f20092a2341446704e7b
https://git.kernel.org/stable/c/9862ec7ac1cbc6eb5ee4a045b5d5b8edbb2f7e68
https://git.kernel.org/stable/c/98f9537fe61b8382b3cc5dd97347531698517c56
https://git.kernel.org/stable/c/de34de6e57bbbc868e4fcf9e98c76b3587cabb0b
https://git.kernel.org/stable/c/e3e95c6850661c77e6dab079d9b5374a618ebb15
Common Vulnerability Exposure (CVE) ID: CVE-2024-26614
https://git.kernel.org/stable/c/168e7e599860654876c2a1102a82610285c02f02
https://git.kernel.org/stable/c/198bc90e0e734e5f98c3d2833e8390cac3df61b2
https://git.kernel.org/stable/c/3982fe726a63fb3de6005e534e2ac8ca7e0aca2a
https://git.kernel.org/stable/c/b1e0a68a0cd2a83259c444f638b417a8fffc6855
https://git.kernel.org/stable/c/bc99dcedd2f422d602516762b96c8ef1ae6b2882
https://git.kernel.org/stable/c/d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3
Common Vulnerability Exposure (CVE) ID: CVE-2024-26622
https://git.kernel.org/stable/c/2caa605079488da9601099fbda460cfc1702839f
https://git.kernel.org/stable/c/2f03fc340cac9ea1dc63cbf8c93dd2eb0f227815
https://git.kernel.org/stable/c/3bfe04c1273d30b866f4c7c238331ed3b08e5824
https://git.kernel.org/stable/c/6edefe1b6c29a9932f558a898968a9fcbeec5711
https://git.kernel.org/stable/c/7d930a4da17958f869ef679ee0e4a8729337affc
https://git.kernel.org/stable/c/a23ac1788e2c828c097119e9a3178f0b7e503fee
Common Vulnerability Exposure (CVE) ID: CVE-2024-26635
https://git.kernel.org/stable/c/165ad1e22779685c3ed3dd349c6c4c632309cc62
https://git.kernel.org/stable/c/660c3053d992b68fee893a0e9ec9159228cffdc6
https://git.kernel.org/stable/c/9ccdef19cf9497c2803b005369668feb91cacdfd
https://git.kernel.org/stable/c/b8e8838f82f332ae80c643dbb1ca4418d0628097
https://git.kernel.org/stable/c/c0fe2fe7a5a291dfcf6dc64301732c8d3dc6a828
https://git.kernel.org/stable/c/df57fc2f2abf548aa889a36ab0bdcc94a75399dc
https://git.kernel.org/stable/c/e3f9bed9bee261e3347131764e42aeedf1ffea61
https://git.kernel.org/stable/c/f1f34a515fb1e25e85dee94f781e7869ae351fb8
Common Vulnerability Exposure (CVE) ID: CVE-2024-26704
https://git.kernel.org/stable/c/185eab30486ba3e7bf8b9c2e049c79a06ffd2bc1
https://git.kernel.org/stable/c/2883940b19c38d5884c8626483811acf4d7e148f
https://git.kernel.org/stable/c/55583e899a5357308274601364741a83e78d6ac4
https://git.kernel.org/stable/c/559ddacb90da1d8786dd8ec4fd76bbfa404eaef6
https://git.kernel.org/stable/c/afba9d11320dad5ce222ac8964caf64b7b4bedb1
https://git.kernel.org/stable/c/afbcad9ae7d6d11608399188f03a837451b6b3a1
https://git.kernel.org/stable/c/b4fbb89d722cbb16beaaea234b7230faaaf68c71
https://git.kernel.org/stable/c/d033a555d9a1cf53dbf3301af7199cc4a4c8f537
Common Vulnerability Exposure (CVE) ID: CVE-2024-26801
https://git.kernel.org/stable/c/2449007d3f73b2842c9734f45f0aadb522daf592
https://git.kernel.org/stable/c/2ab9a19d896f5a0dd386e1f001c5309bc35f433b
https://git.kernel.org/stable/c/45085686b9559bfbe3a4f41d3d695a520668f5e1
https://git.kernel.org/stable/c/6dd0a9dfa99f8990a08eb8fdd8e79bee31c7d8e2
https://git.kernel.org/stable/c/98fb98fd37e42fd4ce13ff657ea64503e24b6090
https://git.kernel.org/stable/c/da4569d450b193e39e87119fd316c0291b585d14
https://git.kernel.org/stable/c/dd594cdc24f2e48dab441732e6dfcafd6b0711d1
https://git.kernel.org/stable/c/e0b278650f07acf2e0932149183458468a731c03
Common Vulnerability Exposure (CVE) ID: CVE-2024-26805
https://git.kernel.org/stable/c/0b27bf4c494d61e5663baa34c3edd7ccebf0ea44
https://git.kernel.org/stable/c/59fc3e3d049e39e7d0d271f20dd5fb47c57faf1d
https://git.kernel.org/stable/c/661779e1fcafe1b74b3f3fe8e980c1e207fea1fd
https://git.kernel.org/stable/c/9ae51361da43270f4ba0eb924427a07e87e48777
https://git.kernel.org/stable/c/c71ed29d15b1a1ed6c464f8c3536996963046285
https://git.kernel.org/stable/c/d3ada42e534a83b618bbc1e490d23bf0fdae4736
https://git.kernel.org/stable/c/ec343a55b687a452f5e87f3b52bf9f155864df65
https://git.kernel.org/stable/c/f19d1f98e60e68b11fc60839105dd02a30ec0d77
CopyrightCopyright (C) 2024 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.