Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.12.2024.6926.3
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-6926-3)
Summary:The remote host is missing an update for the 'linux-azure' package(s) announced via the USN-6926-3 advisory.
Description:Summary:
The remote host is missing an update for the 'linux-azure' package(s) announced via the USN-6926-3 advisory.

Vulnerability Insight:
Huang Si Cong discovered that the NFC Controller Interface (NCI) implementation in
the Linux kernel did not properly handle certain memory allocation failure
conditions, leading to a null pointer dereference vulnerability. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2023-46343)

It was discovered that a race condition existed in the Bluetooth subsystem
in the Linux kernel when modifying certain settings values through debugfs.
A privileged local attacker could use this to cause a denial of service.
(CVE-2024-24857, CVE-2024-24858, CVE-2024-24859)

Chenyuan Yang discovered that the Unsorted Block Images (UBI) flash device
volume management subsystem did not properly validate logical eraseblock
sizes in certain situations. An attacker could possibly use this to cause a
denial of service (system crash). (CVE-2024-25739)

Supraja Sridhara, Benedict Schluter, Mark Kuhne, Andrin Bertschi, and
Shweta Shinde discovered that the Confidential Computing framework in the
Linux kernel for x86 platforms did not properly handle 32-bit emulation on
TDX and SEV. An attacker with access to the VMM could use this to cause a
denial of service (guest crash) or possibly execute arbitrary code.
(CVE-2024-25744)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- GPU drivers,
- HID subsystem,
- I2C subsystem,
- MTD block device drivers,
- Network drivers,
- TTY drivers,
- USB subsystem,
- File systems infrastructure,
- F2FS file system,
- SMB network file system,
- BPF subsystem,
- B.A.T.M.A.N. meshing protocol,
- Bluetooth subsystem,
- Networking core,
- IPv4 networking,
- IPv6 networking,
- Netfilter,
- Unix domain sockets,
- AppArmor security module,
(CVE-2023-52435, CVE-2024-27013, CVE-2024-35984, CVE-2023-52620,
CVE-2024-35997, CVE-2023-52436, CVE-2024-26884, CVE-2024-26901,
CVE-2023-52469, CVE-2024-35978, CVE-2024-26886, CVE-2024-35982,
CVE-2024-36902, CVE-2024-26857, CVE-2024-26923, CVE-2023-52443,
CVE-2024-27020, CVE-2024-36016, CVE-2024-26840, CVE-2024-26934,
CVE-2023-52449, CVE-2024-26882, CVE-2023-52444, CVE-2023-52752)

Affected Software/OS:
'linux-azure' package(s) on Ubuntu 16.04.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:L/AC:L/Au:S/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2023-46343
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.9
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7937609cd387246aed994e81aa4fa951358fba41
https://github.com/torvalds/linux/commit/7937609cd387246aed994e81aa4fa951358fba41
https://lore.kernel.org/netdev/20231013184129.18738-1-krzysztof.kozlowski@linaro.org/T/#r38bdbaf8ae15305b77f6c5bc8e15d38f405623c7
Common Vulnerability Exposure (CVE) ID: CVE-2023-52435
https://git.kernel.org/stable/c/23d05d563b7e7b0314e65c8e882bc27eac2da8e7
https://git.kernel.org/stable/c/6c53e8547687d9c767c139cd4b50af566f58c29a
https://git.kernel.org/stable/c/8f8f185643747fbb448de6aab0efa51c679909a3
https://git.kernel.org/stable/c/95b3904a261a9f810205da560e802cc326f50d77
https://git.kernel.org/stable/c/989b0ff35fe5fc9652ee5bafbe8483db6f27b137
https://git.kernel.org/stable/c/cd1022eaf87be8e6151435bd4df4c242c347e083
Common Vulnerability Exposure (CVE) ID: CVE-2023-52436
https://git.kernel.org/stable/c/12cf91e23b126718a96b914f949f2cdfeadc7b2a
https://git.kernel.org/stable/c/16ae3132ff7746894894927c1892493693b89135
https://git.kernel.org/stable/c/2525d1ba225b5c167162fa344013c408e8b4de36
https://git.kernel.org/stable/c/32a6cfc67675ee96fe107aeed5af9776fec63f11
https://git.kernel.org/stable/c/3e47740091b05ac8d7836a33afd8646b6863ca52
https://git.kernel.org/stable/c/5de9e9dd1828db9b8b962f7ca42548bd596deb8a
https://git.kernel.org/stable/c/e26b6d39270f5eab0087453d9b544189a38c8564
https://git.kernel.org/stable/c/f6c30bfe5a49bc38cae985083a11016800708fea
Common Vulnerability Exposure (CVE) ID: CVE-2023-52443
https://git.kernel.org/stable/c/0a12db736edbb4933e4274932aeea594b5876fa4
https://git.kernel.org/stable/c/1d8e62b5569cc1466ceb8a7e4872cf10160a9dcf
https://git.kernel.org/stable/c/55a8210c9e7d21ff2644809699765796d4bfb200
https://git.kernel.org/stable/c/5c0392fdafb0a2321311900be83ffa572bef8203
https://git.kernel.org/stable/c/5ff00408e5029d3550ee77f62dc15f1e15c47f87
https://git.kernel.org/stable/c/77ab09b92f16c8439a948d1af489196953dc4a0e
https://git.kernel.org/stable/c/9286ee97aa4803d99185768735011d0d65827c9e
https://git.kernel.org/stable/c/9d4fa5fe2b1d56662afd14915a73b4d0783ffa45
Common Vulnerability Exposure (CVE) ID: CVE-2023-52444
https://git.kernel.org/stable/c/02160112e6d45c2610b049df6eb693d7a2e57b46
https://git.kernel.org/stable/c/2fb4867f4405aea8c0519d7d188207f232a57862
https://git.kernel.org/stable/c/53edb549565f55ccd0bdf43be3d66ce4c2d48b28
https://git.kernel.org/stable/c/5624a3c1b1ebc8991318e1cce2aa719542991024
https://git.kernel.org/stable/c/6f866885e147d33efc497f1095f35b2ee5ec7310
https://git.kernel.org/stable/c/d3c0b49aaa12a61d560528f5d605029ab57f0728
https://git.kernel.org/stable/c/f0145860c20be6bae6785c7a2249577674702ac7
https://git.kernel.org/stable/c/f100ba617d8be6c98a68f3744ef7617082975b77
Common Vulnerability Exposure (CVE) ID: CVE-2023-52449
https://git.kernel.org/stable/c/001a3f59d8c914ef8273461d4bf495df384cc5f8
https://git.kernel.org/stable/c/1bf4fe14e97cda621522eb2f28b0a4e87c5b0745
https://git.kernel.org/stable/c/5389407bba1eab1266c6d83e226fb0840cb98dd5
https://git.kernel.org/stable/c/a43bdc376deab5fff1ceb93dca55bcab8dbdc1d6
https://git.kernel.org/stable/c/aeba358bcc8ffddf9b4a9bd0e5ec9eb338d46022
https://git.kernel.org/stable/c/b36aaa64d58aaa2f2cbc8275e89bae76a2b6c3dc
https://git.kernel.org/stable/c/cfd7c9d260dc0a3baaea05a122a19ab91e193c65
https://git.kernel.org/stable/c/d8ac2537763b54d278b80b2b080e1652523c7d4c
Common Vulnerability Exposure (CVE) ID: CVE-2023-52469
https://git.kernel.org/stable/c/28dd788382c43b330480f57cd34cde0840896743
https://git.kernel.org/stable/c/3426f059eacc33ecc676b0d66539297e1cfafd02
https://git.kernel.org/stable/c/35fa2394d26e919f63600ce631e6aefc95ec2706
https://git.kernel.org/stable/c/520e213a0b97b64735a13950e9371e0a5d7a5dc3
https://git.kernel.org/stable/c/8a27d9d9fc9b5564b8904c3a77a7dea482bfa34e
https://git.kernel.org/stable/c/8b55b06e737feb2a645b0293ea27e38418876d63
https://git.kernel.org/stable/c/95084632a65d5c0d682a83b55935560bdcd2a1e3
https://git.kernel.org/stable/c/b6dcba02ee178282e0d28684d241e0b8462dea6a
Common Vulnerability Exposure (CVE) ID: CVE-2023-52620
https://git.kernel.org/stable/c/00b19ee0dcc1aef06294471ab489bae26d94524e
https://git.kernel.org/stable/c/116b0e8e4673a5faa8a739a19b467010c4d3058c
https://git.kernel.org/stable/c/49ce99ae43314d887153e07cec8bb6a647a19268
https://git.kernel.org/stable/c/6f3ae02bbb62f151b19162d5fdc9fe3d48450323
https://git.kernel.org/stable/c/b7be6c737a179a76901c872f6b4c1d00552d9a1b
https://git.kernel.org/stable/c/e26d3009efda338f19016df4175f354a9bd0a4ab
Common Vulnerability Exposure (CVE) ID: CVE-2023-52752
https://git.kernel.org/stable/c/0ab6f842452ce2cae04209d4671ac6289d0aef8a
https://git.kernel.org/stable/c/558817597d5fbd7af31f891b67b0fd20f0d047b7
https://git.kernel.org/stable/c/89929ea46f9cc11ba66d2c64713aa5d5dc723b09
https://git.kernel.org/stable/c/d328c09ee9f15ee5a26431f5aad7c9239fa85e62
Common Vulnerability Exposure (CVE) ID: CVE-2024-24857
https://bugzilla.openanolis.cn/show_bug.cgi?id=8155
Common Vulnerability Exposure (CVE) ID: CVE-2024-24858
https://bugzilla.openanolis.cn/show_bug.cgi?id=8154
Common Vulnerability Exposure (CVE) ID: CVE-2024-24859
https://bugzilla.openanolis.cn/show_bug.cgi?id=8153
Common Vulnerability Exposure (CVE) ID: CVE-2024-25739
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=68a24aba7c593eafa8fd00f2f76407b9b32b47a9
https://groups.google.com/g/syzkaller/c/Xl97YcQA4hg
https://www.spinics.net/lists/kernel/msg5074816.html
Common Vulnerability Exposure (CVE) ID: CVE-2024-25744
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.7
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b82a8dbd3d2f4563156f7150c6f2ecab6e960b30
Common Vulnerability Exposure (CVE) ID: CVE-2024-26840
https://git.kernel.org/stable/c/037d5a949b0455540ef9aab34c10ddf54b65d285
https://git.kernel.org/stable/c/38e921616320d159336b0ffadb09e9fb4945c7c3
https://git.kernel.org/stable/c/43eccc5823732ba6daab2511ed32dfc545a666d8
https://git.kernel.org/stable/c/8b218e2f0a27a9f09428b1847b4580640b9d1e58
https://git.kernel.org/stable/c/94965be37add0983672e48ecb33cdbda92b62579
https://git.kernel.org/stable/c/9cac69912052a4def571fedf1cb9bb4ec590e25a
https://git.kernel.org/stable/c/cb5466783793e66272624cf71925ae1d1ba32083
https://git.kernel.org/stable/c/e21a2f17566cbd64926fb8f16323972f7a064444
Common Vulnerability Exposure (CVE) ID: CVE-2024-26857
https://git.kernel.org/stable/c/048e16dee1fc609c1c85072ccd70bfd4b5fef6ca
https://git.kernel.org/stable/c/0ece581d2a66e8e488c0d3b3e7b5760dbbfdbdd5
https://git.kernel.org/stable/c/1ca1ba465e55b9460e4e75dec9fff31e708fec74
https://git.kernel.org/stable/c/59d2a4076983303f324557a114cfd5c32e1f6b29
https://git.kernel.org/stable/c/c0b22568a9d8384fd000cc49acb8f74bde40d1b5
https://git.kernel.org/stable/c/c7137900691f5692fe3de54566ea7b30bb35d66c
https://git.kernel.org/stable/c/e431c3227864b5646601c97f5f898d99472f2914
https://git.kernel.org/stable/c/e77e0b0f2a11735c64b105edaee54d6344faca8a
Common Vulnerability Exposure (CVE) ID: CVE-2024-26882
https://git.kernel.org/stable/c/5c03387021cfa3336b97e0dcba38029917a8af2a
https://git.kernel.org/stable/c/60044ab84836359534bd7153b92e9c1584140e4a
https://git.kernel.org/stable/c/77fd5294ea09b21f6772ac954a121b87323cec80
https://git.kernel.org/stable/c/b0ec2abf98267f14d032102551581c833b0659d3
https://git.kernel.org/stable/c/c4c857723b37c20651300b3de4ff25059848b4b0
https://git.kernel.org/stable/c/ca914f1cdee8a85799942c9b0ce5015bbd6844e1
https://git.kernel.org/stable/c/ec6bb01e02cbd47781dd90775b631a1dc4bd9d2b
https://git.kernel.org/stable/c/f6723d8dbfdc10c784a56748f86a9a3cd410dbd5
Common Vulnerability Exposure (CVE) ID: CVE-2024-26884
https://git.kernel.org/stable/c/33ec04cadb77605b71d9298311919303d390c4d5
https://git.kernel.org/stable/c/3b08cfc65f07b1132c1979d73f014ae6e04de55d
https://git.kernel.org/stable/c/64f00b4df0597590b199b62a37a165473bf658a6
https://git.kernel.org/stable/c/6787d916c2cf9850c97a0a3f73e08c43e7d973b1
https://git.kernel.org/stable/c/8435f0961bf3dc65e204094349bd9aeaac1f8868
https://git.kernel.org/stable/c/92c81fbb3ed2e0dfc33a4183a67135e1ab566ace
https://git.kernel.org/stable/c/a6fa75b5096c0f9826a4fabe22d907b0a5bb1016
https://git.kernel.org/stable/c/a83fdaeaea3677b83a53f72ace2d73a19bcd6d93
https://git.kernel.org/stable/c/d817f0d34d927f2deb17dadbfe212c9a6a32ac3e
Common Vulnerability Exposure (CVE) ID: CVE-2024-26886
https://git.kernel.org/stable/c/2c9e2df022ef8b9d7fac58a04a2ef4ed25288955
https://git.kernel.org/stable/c/64be3c6154886200708da0dfe259705fb992416c
https://git.kernel.org/stable/c/817e8138ce86001b2fa5c63d6ede756e205a01f7
https://git.kernel.org/stable/c/cb8adca52f306563d958a863bb0cbae9c184d1ae
https://git.kernel.org/stable/c/f7b94bdc1ec107c92262716b073b3e816d4784fb
Common Vulnerability Exposure (CVE) ID: CVE-2024-26901
https://git.kernel.org/stable/c/3948abaa4e2be938ccdfc289385a27342fb13d43
https://git.kernel.org/stable/c/423b6bdf19bbc5e1f7e7461045099917378f7e71
https://git.kernel.org/stable/c/4bac28f441e3cc9d3f1a84c8d023228a68d8a7c1
https://git.kernel.org/stable/c/772a7def9868091da3bcb0d6c6ff9f0c03d7fa8b
https://git.kernel.org/stable/c/bf9ec1b24ab4e94345aa1c60811dd329f069c38b
https://git.kernel.org/stable/c/c1362eae861db28b1608b9dc23e49634fe87b63b
https://git.kernel.org/stable/c/cba138f1ef37ec6f961baeab62f312dedc7cf730
https://git.kernel.org/stable/c/cde76b3af247f615447bcfecf610bb76c3529126
https://git.kernel.org/stable/c/e6450d5e46a737a008b4885aa223486113bf0ad6
Common Vulnerability Exposure (CVE) ID: CVE-2024-26923
https://git.kernel.org/stable/c/2e2a03787f4f0abc0072350654ab0ef3324d9db3
https://git.kernel.org/stable/c/343c5372d5e17b306db5f8f3c895539b06e3177f
https://git.kernel.org/stable/c/47d8ac011fe1c9251070e1bd64cb10b48193ec51
https://git.kernel.org/stable/c/507cc232ffe53a352847893f8177d276c3b532a9
https://git.kernel.org/stable/c/a36ae0ec2353015f0f6762e59f4c2dbc0c906423
https://git.kernel.org/stable/c/b75722be422c276b699200de90527d01c602ea7c
https://git.kernel.org/stable/c/dbdf7bec5c920200077d693193f989cb1513f009
https://git.kernel.org/stable/c/e76c2678228f6aec74b305ae30c9374cc2f28a51
Common Vulnerability Exposure (CVE) ID: CVE-2024-26934
https://git.kernel.org/stable/c/07acf979da33c721357ff27129edf74c23c036c6
https://git.kernel.org/stable/c/122a06f1068bf5e39089863f4f60b1f5d4273384
https://git.kernel.org/stable/c/12d6a5681a0a5cecc2af7860f0a1613fa7c6e947
https://git.kernel.org/stable/c/1b175bc579f46520b11ecda443bcd2ee4904f66a
https://git.kernel.org/stable/c/80ba43e9f799cbdd83842fc27db667289b3150f5
https://git.kernel.org/stable/c/8cbdd324b41528994027128207fae8100dff094f
https://git.kernel.org/stable/c/ab062fa3dc69aea88fe62162c5881ba14b50ecc5
https://git.kernel.org/stable/c/dbdf66250d2d33e8b27352fcb901de79f3521057
https://git.kernel.org/stable/c/e451709573f8be904a8a72d0775bf114d7c291d9
Common Vulnerability Exposure (CVE) ID: CVE-2024-27013
https://git.kernel.org/stable/c/14cdb43dbc827e18ac7d5b30c5b4c676219f1421
https://git.kernel.org/stable/c/40f4ced305c6c47487d3cd8da54676e2acc1a6ad
https://git.kernel.org/stable/c/4b0dcae5c4797bf31c63011ed62917210d3fdac3
https://git.kernel.org/stable/c/52854101180beccdb9dc2077a3bea31b6ad48dfa
https://git.kernel.org/stable/c/62e27ef18eb4f0d33bbae8e9ef56b99696a74713
https://git.kernel.org/stable/c/68459b8e3ee554ce71878af9eb69659b9462c588
https://git.kernel.org/stable/c/a50dbeca28acf7051dfa92786b85f704c75db6eb
https://git.kernel.org/stable/c/f8bbc07ac535593139c875ffa19af924b1084540
Common Vulnerability Exposure (CVE) ID: CVE-2024-27020
https://git.kernel.org/stable/c/01f1a678b05ade4b1248019c2dcca773aebbeb7f
https://git.kernel.org/stable/c/0b6de00206adbbfc6373b3ae38d2a6f197987907
https://git.kernel.org/stable/c/8d56bad42ac4c43c6c72ddd6a654a2628bf839c5
https://git.kernel.org/stable/c/934e66e231cff2b18faa2c8aad0b8cec13957e05
https://git.kernel.org/stable/c/939109c0a8e2a006a6cc8209e262d25065f4403a
https://git.kernel.org/stable/c/a9ebf340d123ae12582210407f879d6a5a1bc25b
https://git.kernel.org/stable/c/b38a133d37fa421c8447b383d788c9cc6f5cb34c
https://git.kernel.org/stable/c/f969eb84ce482331a991079ab7a5c4dc3b7f89bf
Common Vulnerability Exposure (CVE) ID: CVE-2024-35978
https://git.kernel.org/stable/c/45d355a926ab40f3ae7bc0b0a00cb0e3e8a5a810
https://git.kernel.org/stable/c/4beab84fbb50df3be1d8f8a976e6fe882ca65cb2
https://git.kernel.org/stable/c/66fab1e120b39f8f47a94186ddee36006fc02ca8
https://git.kernel.org/stable/c/75193678cce993aa959e7764b6df2f599886dd06
https://git.kernel.org/stable/c/8478394f76c748862ef179a16f651f752bdafaf0
https://git.kernel.org/stable/c/89a32741f4217856066c198a4a7267bcdd1edd67
https://git.kernel.org/stable/c/9ab5e44b9bac946bd49fd63264a08cd1ea494e76
https://git.kernel.org/stable/c/e4cb8382fff6706436b66eafd9c0ee857ff0a9f5
Common Vulnerability Exposure (CVE) ID: CVE-2024-35982
https://git.kernel.org/stable/c/04720ea2e6c64459a90ca28570ea78335eccd924
https://git.kernel.org/stable/c/3fe79b2c83461edbbf86ed8a6f3924820ff89259
https://git.kernel.org/stable/c/4ca2a5fb54ea2cc43edea614207fcede562d91c2
https://git.kernel.org/stable/c/70a8be9dc2fb65d67f8c1e0c88c587e08e2e575d
https://git.kernel.org/stable/c/87b6af1a7683e021710c08fc0551fc078346032f
https://git.kernel.org/stable/c/b1f532a3b1e6d2e5559c7ace49322922637a28aa
https://git.kernel.org/stable/c/b3ddf6904073990492454b1dd1c10a24be8c74c6
https://git.kernel.org/stable/c/ca54e2671548616ad34885f90d4f26f7adb088f0
Common Vulnerability Exposure (CVE) ID: CVE-2024-35984
https://git.kernel.org/stable/c/357c64ef1ef39b1e7cd91ab6bdd304d043702c83
https://git.kernel.org/stable/c/40f1d79f07b49c8a64a861706e5163f2db4bd95d
https://git.kernel.org/stable/c/4e75e222d397c6752b229ed72fc4644c8c36ecde
https://git.kernel.org/stable/c/5a09eae9a7db597fe0c1fc91636205b4a25d2620
https://git.kernel.org/stable/c/5fd72404587d7db4acb2d241fd8c387afb0a7aec
https://git.kernel.org/stable/c/91811a31b68d3765b3065f4bb6d7d6d84a7cfc9f
https://git.kernel.org/stable/c/ad3c3ac7a03be3697114f781193dd3e9d97e6e23
https://git.kernel.org/stable/c/e3425674ff68dc521c57c6eabad0cbd20a027d85
Common Vulnerability Exposure (CVE) ID: CVE-2024-35997
https://git.kernel.org/stable/c/0561b65fbd53d3e788c5b0222d9112ca016fd6a1
https://git.kernel.org/stable/c/21bfca822cfc1e71796124e93b46e0d9fa584401
https://git.kernel.org/stable/c/29e94f295bad5be59cf4271a93e22cdcf5536722
https://git.kernel.org/stable/c/418c5575d56410c6e186ab727bf32ae32447d497
https://git.kernel.org/stable/c/5095b93021b899f54c9355bebf36d78854c33a22
https://git.kernel.org/stable/c/9c0f59e47a90c54d0153f8ddc0f80d7a36207d0e
https://git.kernel.org/stable/c/b65fb50e04a95eec34a9d1bc138454a98a5578d8
https://git.kernel.org/stable/c/c448a9fd50f77e8fb9156ff64848aa4295eb3003
Common Vulnerability Exposure (CVE) ID: CVE-2024-36016
https://git.kernel.org/stable/c/0fb736c9931e02dbc7d9a75044c8e1c039e50f04
https://git.kernel.org/stable/c/46f52c89a7e7d2691b97a9728e4591d071ca8abc
https://git.kernel.org/stable/c/47388e807f85948eefc403a8a5fdc5b406a65d5a
https://git.kernel.org/stable/c/4c267110fc110390704cc065edb9817fdd10ff54
https://git.kernel.org/stable/c/774d83b008eccb1c48c14dc5486e7aa255731350
https://git.kernel.org/stable/c/9513d4148950b05bc99fa7314dc883cc0e1605e5
https://git.kernel.org/stable/c/b229bc6c6ea9fe459fc3fa94fd0a27a2f32aca56
https://git.kernel.org/stable/c/b890d45aaf02b564e6cae2d2a590f9649330857d
https://git.kernel.org/stable/c/f126ce7305fe88f49cdabc6db4168b9318898ea3
Common Vulnerability Exposure (CVE) ID: CVE-2024-36902
https://git.kernel.org/stable/c/1876881c9a49613b5249fb400cbf53412d90cb09
https://git.kernel.org/stable/c/35297fc68de36826087e976f86a5b1f94fd0bf95
https://git.kernel.org/stable/c/4a5a573387da6a6b23a4cc62147453ff1bc32afa
https://git.kernel.org/stable/c/674c951ab8a23f7aff9b4c3f2f865901bc76a290
https://git.kernel.org/stable/c/7e3242c139c38e60844638e394c2877b16b396b0
https://git.kernel.org/stable/c/8745a8d74ba17dafe72b6ab461fa6c007d879747
https://git.kernel.org/stable/c/d101291b2681e5ab938554e3e323f7a7ee33e3aa
https://git.kernel.org/stable/c/ddec23f206a944c73bcc2724358b85388837daff
CopyrightCopyright (C) 2024 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.