Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.12.2024.6938.1
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-6938-1)
Summary:The remote host is missing an update for the 'linux, linux-aws, linux-kvm, linux-lts-xenial' package(s) announced via the USN-6938-1 advisory.
Description:Summary:
The remote host is missing an update for the 'linux, linux-aws, linux-kvm, linux-lts-xenial' package(s) announced via the USN-6938-1 advisory.

Vulnerability Insight:
It was discovered that the device input subsystem in the Linux kernel did
not properly handle the case when an event code falls outside of a bitmap.
A local attacker could use this to cause a denial of service (system
crash). (CVE-2022-48619)

Huang Si Cong discovered that the NFC Controller Interface (NCI) implementation in
the Linux kernel did not properly handle certain memory allocation failure
conditions, leading to a null pointer dereference vulnerability. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2023-46343)

It was discovered that a race condition existed in the Bluetooth subsystem
in the Linux kernel when modifying certain settings values through debugfs.
A privileged local attacker could use this to cause a denial of service.
(CVE-2024-24857, CVE-2024-24858, CVE-2024-24859)

Chenyuan Yang discovered that the Unsorted Block Images (UBI) flash device
volume management subsystem did not properly validate logical eraseblock
sizes in certain situations. An attacker could possibly use this to cause a
denial of service (system crash). (CVE-2024-25739)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- GPU drivers,
- HID subsystem,
- I2C subsystem,
- Input Device Drivers (Mouse),
- MTD block device drivers,
- Network drivers,
- TTY drivers,
- USB subsystem,
- File systems infrastructure,
- F2FS file system,
- SMB network file system,
- BPF subsystem,
- B.A.T.M.A.N. meshing protocol,
- Bluetooth subsystem,
- IPv4 networking,
- IPv6 networking,
- Netfilter,
- Unix domain sockets,
- Wireless networking,
(CVE-2024-26901, CVE-2021-46932, CVE-2024-26857, CVE-2024-26882,
CVE-2024-26934, CVE-2023-52449, CVE-2024-35982, CVE-2021-46933,
CVE-2023-52620, CVE-2023-52444, CVE-2024-26923, CVE-2023-52469,
CVE-2024-26886, CVE-2024-36902, CVE-2023-52436, CVE-2024-36016,
CVE-2024-26884, CVE-2021-46960, CVE-2021-47194, CVE-2023-52752,
CVE-2024-27020, CVE-2024-26840, CVE-2024-35997, CVE-2024-35984,
CVE-2024-35978)

Affected Software/OS:
'linux, linux-aws, linux-kvm, linux-lts-xenial' package(s) on Ubuntu 14.04, Ubuntu 16.04.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:L/AC:L/Au:S/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2021-46932
https://git.kernel.org/stable/c/292d2ac61fb0d9276a0f7b7ce4f50426f2a1c99f
https://git.kernel.org/stable/c/975774ea7528b489930b76a77ffc4d5379b95ff2
https://git.kernel.org/stable/c/9f329d0d6c91142cf0ad08d23c72dd195db2633c
https://git.kernel.org/stable/c/9f3ccdc3f6ef10084ceb3a47df0961bec6196fd0
https://git.kernel.org/stable/c/a02e1404e27855089d2b0a0acc4652c2ce65fe46
https://git.kernel.org/stable/c/d1962f263a176f493400b8f91bfbf2bfedce951e
https://git.kernel.org/stable/c/d2cb2bf39a6d17ef4bdc0e59c1a35cf5751ad8f4
https://git.kernel.org/stable/c/e79ff8c68acb1eddf709d3ac84716868f2a91012
Common Vulnerability Exposure (CVE) ID: CVE-2021-46933
https://git.kernel.org/stable/c/1c4ace3e6b8575745c50dca9e76e0021e697d645
https://git.kernel.org/stable/c/240fc586e83d645912accce081a48aa63a45f6ee
https://git.kernel.org/stable/c/33f6a0cbb7772146e1c11f38028fffbfed14728b
https://git.kernel.org/stable/c/52500239e3f2d6fc77b6f58632a9fb98fe74ac09
https://git.kernel.org/stable/c/b1e0887379422975f237d43d8839b751a6bcf154
https://git.kernel.org/stable/c/cc8c8028c21b2a3842a1e98e99e55028df275919
https://git.kernel.org/stable/c/ebef2aa29f370b5096c16020c104e393192ef684
https://git.kernel.org/stable/c/f976dd7011150244a7ba820f2c331e9fb253befa
Common Vulnerability Exposure (CVE) ID: CVE-2021-46960
https://git.kernel.org/stable/c/83728cbf366e334301091d5b808add468ab46b27
https://git.kernel.org/stable/c/93f3339b22ba17e66f0808737467b70ba087eaec
https://git.kernel.org/stable/c/aaa0faa5c28a91c362352d6b35dc3ed10df56fb0
https://git.kernel.org/stable/c/b399c1a3ea0b9d10047ff266d65533df7f15532f
https://git.kernel.org/stable/c/e486f8397f3f14a7cadc166138141fdb14379a54
https://git.kernel.org/stable/c/e94851629c49c65b4fbb29a5725ddfd7988f8f20
https://git.kernel.org/stable/c/f59a9242942fef0de7b926e438ba4eae65d4b4dd
Common Vulnerability Exposure (CVE) ID: CVE-2021-47194
https://git.kernel.org/stable/c/0738cdb636c21ab552eaecf905efa4a6070e3ebc
https://git.kernel.org/stable/c/4e458abbb4a523f1413bfe15c079cf4e24c15b21
https://git.kernel.org/stable/c/52affc201fc22a1ab9a59ef0ed641a9adfcb8d13
https://git.kernel.org/stable/c/563fbefed46ae4c1f70cffb8eb54c02df480b2c2
https://git.kernel.org/stable/c/5a9b671c8d74a3e1b999e7a0c7f366079bcc93dd
https://git.kernel.org/stable/c/7b97b5776daa0b39dbdadfea176f9cc0646d4a66
https://git.kernel.org/stable/c/8f06bb8c216bcd172394f61e557727e691b4cb24
https://git.kernel.org/stable/c/b8a045e2a9b234cfbc06cf36923886164358ddec
Common Vulnerability Exposure (CVE) ID: CVE-2022-48619
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.10
https://github.com/torvalds/linux/commit/409353cbe9fe48f6bc196114c442b1cff05a39bc
Common Vulnerability Exposure (CVE) ID: CVE-2023-46343
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.9
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7937609cd387246aed994e81aa4fa951358fba41
https://github.com/torvalds/linux/commit/7937609cd387246aed994e81aa4fa951358fba41
https://lore.kernel.org/netdev/20231013184129.18738-1-krzysztof.kozlowski@linaro.org/T/#r38bdbaf8ae15305b77f6c5bc8e15d38f405623c7
Common Vulnerability Exposure (CVE) ID: CVE-2023-52436
https://git.kernel.org/stable/c/12cf91e23b126718a96b914f949f2cdfeadc7b2a
https://git.kernel.org/stable/c/16ae3132ff7746894894927c1892493693b89135
https://git.kernel.org/stable/c/2525d1ba225b5c167162fa344013c408e8b4de36
https://git.kernel.org/stable/c/32a6cfc67675ee96fe107aeed5af9776fec63f11
https://git.kernel.org/stable/c/3e47740091b05ac8d7836a33afd8646b6863ca52
https://git.kernel.org/stable/c/5de9e9dd1828db9b8b962f7ca42548bd596deb8a
https://git.kernel.org/stable/c/e26b6d39270f5eab0087453d9b544189a38c8564
https://git.kernel.org/stable/c/f6c30bfe5a49bc38cae985083a11016800708fea
Common Vulnerability Exposure (CVE) ID: CVE-2023-52444
https://git.kernel.org/stable/c/02160112e6d45c2610b049df6eb693d7a2e57b46
https://git.kernel.org/stable/c/2fb4867f4405aea8c0519d7d188207f232a57862
https://git.kernel.org/stable/c/53edb549565f55ccd0bdf43be3d66ce4c2d48b28
https://git.kernel.org/stable/c/5624a3c1b1ebc8991318e1cce2aa719542991024
https://git.kernel.org/stable/c/6f866885e147d33efc497f1095f35b2ee5ec7310
https://git.kernel.org/stable/c/d3c0b49aaa12a61d560528f5d605029ab57f0728
https://git.kernel.org/stable/c/f0145860c20be6bae6785c7a2249577674702ac7
https://git.kernel.org/stable/c/f100ba617d8be6c98a68f3744ef7617082975b77
Common Vulnerability Exposure (CVE) ID: CVE-2023-52449
https://git.kernel.org/stable/c/001a3f59d8c914ef8273461d4bf495df384cc5f8
https://git.kernel.org/stable/c/1bf4fe14e97cda621522eb2f28b0a4e87c5b0745
https://git.kernel.org/stable/c/5389407bba1eab1266c6d83e226fb0840cb98dd5
https://git.kernel.org/stable/c/a43bdc376deab5fff1ceb93dca55bcab8dbdc1d6
https://git.kernel.org/stable/c/aeba358bcc8ffddf9b4a9bd0e5ec9eb338d46022
https://git.kernel.org/stable/c/b36aaa64d58aaa2f2cbc8275e89bae76a2b6c3dc
https://git.kernel.org/stable/c/cfd7c9d260dc0a3baaea05a122a19ab91e193c65
https://git.kernel.org/stable/c/d8ac2537763b54d278b80b2b080e1652523c7d4c
Common Vulnerability Exposure (CVE) ID: CVE-2023-52469
https://git.kernel.org/stable/c/28dd788382c43b330480f57cd34cde0840896743
https://git.kernel.org/stable/c/3426f059eacc33ecc676b0d66539297e1cfafd02
https://git.kernel.org/stable/c/35fa2394d26e919f63600ce631e6aefc95ec2706
https://git.kernel.org/stable/c/520e213a0b97b64735a13950e9371e0a5d7a5dc3
https://git.kernel.org/stable/c/8a27d9d9fc9b5564b8904c3a77a7dea482bfa34e
https://git.kernel.org/stable/c/8b55b06e737feb2a645b0293ea27e38418876d63
https://git.kernel.org/stable/c/95084632a65d5c0d682a83b55935560bdcd2a1e3
https://git.kernel.org/stable/c/b6dcba02ee178282e0d28684d241e0b8462dea6a
Common Vulnerability Exposure (CVE) ID: CVE-2023-52620
https://git.kernel.org/stable/c/00b19ee0dcc1aef06294471ab489bae26d94524e
https://git.kernel.org/stable/c/116b0e8e4673a5faa8a739a19b467010c4d3058c
https://git.kernel.org/stable/c/49ce99ae43314d887153e07cec8bb6a647a19268
https://git.kernel.org/stable/c/6f3ae02bbb62f151b19162d5fdc9fe3d48450323
https://git.kernel.org/stable/c/b7be6c737a179a76901c872f6b4c1d00552d9a1b
https://git.kernel.org/stable/c/e26d3009efda338f19016df4175f354a9bd0a4ab
Common Vulnerability Exposure (CVE) ID: CVE-2023-52752
https://git.kernel.org/stable/c/0ab6f842452ce2cae04209d4671ac6289d0aef8a
https://git.kernel.org/stable/c/558817597d5fbd7af31f891b67b0fd20f0d047b7
https://git.kernel.org/stable/c/89929ea46f9cc11ba66d2c64713aa5d5dc723b09
https://git.kernel.org/stable/c/d328c09ee9f15ee5a26431f5aad7c9239fa85e62
Common Vulnerability Exposure (CVE) ID: CVE-2024-24857
https://bugzilla.openanolis.cn/show_bug.cgi?id=8155
Common Vulnerability Exposure (CVE) ID: CVE-2024-24858
https://bugzilla.openanolis.cn/show_bug.cgi?id=8154
Common Vulnerability Exposure (CVE) ID: CVE-2024-24859
https://bugzilla.openanolis.cn/show_bug.cgi?id=8153
Common Vulnerability Exposure (CVE) ID: CVE-2024-25739
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=68a24aba7c593eafa8fd00f2f76407b9b32b47a9
https://groups.google.com/g/syzkaller/c/Xl97YcQA4hg
https://www.spinics.net/lists/kernel/msg5074816.html
Common Vulnerability Exposure (CVE) ID: CVE-2024-26840
https://git.kernel.org/stable/c/037d5a949b0455540ef9aab34c10ddf54b65d285
https://git.kernel.org/stable/c/38e921616320d159336b0ffadb09e9fb4945c7c3
https://git.kernel.org/stable/c/43eccc5823732ba6daab2511ed32dfc545a666d8
https://git.kernel.org/stable/c/8b218e2f0a27a9f09428b1847b4580640b9d1e58
https://git.kernel.org/stable/c/94965be37add0983672e48ecb33cdbda92b62579
https://git.kernel.org/stable/c/9cac69912052a4def571fedf1cb9bb4ec590e25a
https://git.kernel.org/stable/c/cb5466783793e66272624cf71925ae1d1ba32083
https://git.kernel.org/stable/c/e21a2f17566cbd64926fb8f16323972f7a064444
Common Vulnerability Exposure (CVE) ID: CVE-2024-26857
https://git.kernel.org/stable/c/048e16dee1fc609c1c85072ccd70bfd4b5fef6ca
https://git.kernel.org/stable/c/0ece581d2a66e8e488c0d3b3e7b5760dbbfdbdd5
https://git.kernel.org/stable/c/1ca1ba465e55b9460e4e75dec9fff31e708fec74
https://git.kernel.org/stable/c/59d2a4076983303f324557a114cfd5c32e1f6b29
https://git.kernel.org/stable/c/c0b22568a9d8384fd000cc49acb8f74bde40d1b5
https://git.kernel.org/stable/c/c7137900691f5692fe3de54566ea7b30bb35d66c
https://git.kernel.org/stable/c/e431c3227864b5646601c97f5f898d99472f2914
https://git.kernel.org/stable/c/e77e0b0f2a11735c64b105edaee54d6344faca8a
Common Vulnerability Exposure (CVE) ID: CVE-2024-26882
https://git.kernel.org/stable/c/5c03387021cfa3336b97e0dcba38029917a8af2a
https://git.kernel.org/stable/c/60044ab84836359534bd7153b92e9c1584140e4a
https://git.kernel.org/stable/c/77fd5294ea09b21f6772ac954a121b87323cec80
https://git.kernel.org/stable/c/b0ec2abf98267f14d032102551581c833b0659d3
https://git.kernel.org/stable/c/c4c857723b37c20651300b3de4ff25059848b4b0
https://git.kernel.org/stable/c/ca914f1cdee8a85799942c9b0ce5015bbd6844e1
https://git.kernel.org/stable/c/ec6bb01e02cbd47781dd90775b631a1dc4bd9d2b
https://git.kernel.org/stable/c/f6723d8dbfdc10c784a56748f86a9a3cd410dbd5
Common Vulnerability Exposure (CVE) ID: CVE-2024-26884
https://git.kernel.org/stable/c/33ec04cadb77605b71d9298311919303d390c4d5
https://git.kernel.org/stable/c/3b08cfc65f07b1132c1979d73f014ae6e04de55d
https://git.kernel.org/stable/c/64f00b4df0597590b199b62a37a165473bf658a6
https://git.kernel.org/stable/c/6787d916c2cf9850c97a0a3f73e08c43e7d973b1
https://git.kernel.org/stable/c/8435f0961bf3dc65e204094349bd9aeaac1f8868
https://git.kernel.org/stable/c/92c81fbb3ed2e0dfc33a4183a67135e1ab566ace
https://git.kernel.org/stable/c/a6fa75b5096c0f9826a4fabe22d907b0a5bb1016
https://git.kernel.org/stable/c/a83fdaeaea3677b83a53f72ace2d73a19bcd6d93
https://git.kernel.org/stable/c/d817f0d34d927f2deb17dadbfe212c9a6a32ac3e
Common Vulnerability Exposure (CVE) ID: CVE-2024-26886
https://git.kernel.org/stable/c/2c9e2df022ef8b9d7fac58a04a2ef4ed25288955
https://git.kernel.org/stable/c/64be3c6154886200708da0dfe259705fb992416c
https://git.kernel.org/stable/c/817e8138ce86001b2fa5c63d6ede756e205a01f7
https://git.kernel.org/stable/c/cb8adca52f306563d958a863bb0cbae9c184d1ae
https://git.kernel.org/stable/c/f7b94bdc1ec107c92262716b073b3e816d4784fb
Common Vulnerability Exposure (CVE) ID: CVE-2024-26901
https://git.kernel.org/stable/c/3948abaa4e2be938ccdfc289385a27342fb13d43
https://git.kernel.org/stable/c/423b6bdf19bbc5e1f7e7461045099917378f7e71
https://git.kernel.org/stable/c/4bac28f441e3cc9d3f1a84c8d023228a68d8a7c1
https://git.kernel.org/stable/c/772a7def9868091da3bcb0d6c6ff9f0c03d7fa8b
https://git.kernel.org/stable/c/bf9ec1b24ab4e94345aa1c60811dd329f069c38b
https://git.kernel.org/stable/c/c1362eae861db28b1608b9dc23e49634fe87b63b
https://git.kernel.org/stable/c/cba138f1ef37ec6f961baeab62f312dedc7cf730
https://git.kernel.org/stable/c/cde76b3af247f615447bcfecf610bb76c3529126
https://git.kernel.org/stable/c/e6450d5e46a737a008b4885aa223486113bf0ad6
Common Vulnerability Exposure (CVE) ID: CVE-2024-26923
https://git.kernel.org/stable/c/2e2a03787f4f0abc0072350654ab0ef3324d9db3
https://git.kernel.org/stable/c/343c5372d5e17b306db5f8f3c895539b06e3177f
https://git.kernel.org/stable/c/47d8ac011fe1c9251070e1bd64cb10b48193ec51
https://git.kernel.org/stable/c/507cc232ffe53a352847893f8177d276c3b532a9
https://git.kernel.org/stable/c/a36ae0ec2353015f0f6762e59f4c2dbc0c906423
https://git.kernel.org/stable/c/b75722be422c276b699200de90527d01c602ea7c
https://git.kernel.org/stable/c/dbdf7bec5c920200077d693193f989cb1513f009
https://git.kernel.org/stable/c/e76c2678228f6aec74b305ae30c9374cc2f28a51
Common Vulnerability Exposure (CVE) ID: CVE-2024-26934
https://git.kernel.org/stable/c/07acf979da33c721357ff27129edf74c23c036c6
https://git.kernel.org/stable/c/122a06f1068bf5e39089863f4f60b1f5d4273384
https://git.kernel.org/stable/c/12d6a5681a0a5cecc2af7860f0a1613fa7c6e947
https://git.kernel.org/stable/c/1b175bc579f46520b11ecda443bcd2ee4904f66a
https://git.kernel.org/stable/c/80ba43e9f799cbdd83842fc27db667289b3150f5
https://git.kernel.org/stable/c/8cbdd324b41528994027128207fae8100dff094f
https://git.kernel.org/stable/c/ab062fa3dc69aea88fe62162c5881ba14b50ecc5
https://git.kernel.org/stable/c/dbdf66250d2d33e8b27352fcb901de79f3521057
https://git.kernel.org/stable/c/e451709573f8be904a8a72d0775bf114d7c291d9
Common Vulnerability Exposure (CVE) ID: CVE-2024-27020
https://git.kernel.org/stable/c/01f1a678b05ade4b1248019c2dcca773aebbeb7f
https://git.kernel.org/stable/c/0b6de00206adbbfc6373b3ae38d2a6f197987907
https://git.kernel.org/stable/c/8d56bad42ac4c43c6c72ddd6a654a2628bf839c5
https://git.kernel.org/stable/c/934e66e231cff2b18faa2c8aad0b8cec13957e05
https://git.kernel.org/stable/c/939109c0a8e2a006a6cc8209e262d25065f4403a
https://git.kernel.org/stable/c/a9ebf340d123ae12582210407f879d6a5a1bc25b
https://git.kernel.org/stable/c/b38a133d37fa421c8447b383d788c9cc6f5cb34c
https://git.kernel.org/stable/c/f969eb84ce482331a991079ab7a5c4dc3b7f89bf
Common Vulnerability Exposure (CVE) ID: CVE-2024-35978
https://git.kernel.org/stable/c/45d355a926ab40f3ae7bc0b0a00cb0e3e8a5a810
https://git.kernel.org/stable/c/4beab84fbb50df3be1d8f8a976e6fe882ca65cb2
https://git.kernel.org/stable/c/66fab1e120b39f8f47a94186ddee36006fc02ca8
https://git.kernel.org/stable/c/75193678cce993aa959e7764b6df2f599886dd06
https://git.kernel.org/stable/c/8478394f76c748862ef179a16f651f752bdafaf0
https://git.kernel.org/stable/c/89a32741f4217856066c198a4a7267bcdd1edd67
https://git.kernel.org/stable/c/9ab5e44b9bac946bd49fd63264a08cd1ea494e76
https://git.kernel.org/stable/c/e4cb8382fff6706436b66eafd9c0ee857ff0a9f5
Common Vulnerability Exposure (CVE) ID: CVE-2024-35982
https://git.kernel.org/stable/c/04720ea2e6c64459a90ca28570ea78335eccd924
https://git.kernel.org/stable/c/3fe79b2c83461edbbf86ed8a6f3924820ff89259
https://git.kernel.org/stable/c/4ca2a5fb54ea2cc43edea614207fcede562d91c2
https://git.kernel.org/stable/c/70a8be9dc2fb65d67f8c1e0c88c587e08e2e575d
https://git.kernel.org/stable/c/87b6af1a7683e021710c08fc0551fc078346032f
https://git.kernel.org/stable/c/b1f532a3b1e6d2e5559c7ace49322922637a28aa
https://git.kernel.org/stable/c/b3ddf6904073990492454b1dd1c10a24be8c74c6
https://git.kernel.org/stable/c/ca54e2671548616ad34885f90d4f26f7adb088f0
Common Vulnerability Exposure (CVE) ID: CVE-2024-35984
https://git.kernel.org/stable/c/357c64ef1ef39b1e7cd91ab6bdd304d043702c83
https://git.kernel.org/stable/c/40f1d79f07b49c8a64a861706e5163f2db4bd95d
https://git.kernel.org/stable/c/4e75e222d397c6752b229ed72fc4644c8c36ecde
https://git.kernel.org/stable/c/5a09eae9a7db597fe0c1fc91636205b4a25d2620
https://git.kernel.org/stable/c/5fd72404587d7db4acb2d241fd8c387afb0a7aec
https://git.kernel.org/stable/c/91811a31b68d3765b3065f4bb6d7d6d84a7cfc9f
https://git.kernel.org/stable/c/ad3c3ac7a03be3697114f781193dd3e9d97e6e23
https://git.kernel.org/stable/c/e3425674ff68dc521c57c6eabad0cbd20a027d85
Common Vulnerability Exposure (CVE) ID: CVE-2024-35997
https://git.kernel.org/stable/c/0561b65fbd53d3e788c5b0222d9112ca016fd6a1
https://git.kernel.org/stable/c/21bfca822cfc1e71796124e93b46e0d9fa584401
https://git.kernel.org/stable/c/29e94f295bad5be59cf4271a93e22cdcf5536722
https://git.kernel.org/stable/c/418c5575d56410c6e186ab727bf32ae32447d497
https://git.kernel.org/stable/c/5095b93021b899f54c9355bebf36d78854c33a22
https://git.kernel.org/stable/c/9c0f59e47a90c54d0153f8ddc0f80d7a36207d0e
https://git.kernel.org/stable/c/b65fb50e04a95eec34a9d1bc138454a98a5578d8
https://git.kernel.org/stable/c/c448a9fd50f77e8fb9156ff64848aa4295eb3003
Common Vulnerability Exposure (CVE) ID: CVE-2024-36016
https://git.kernel.org/stable/c/0fb736c9931e02dbc7d9a75044c8e1c039e50f04
https://git.kernel.org/stable/c/46f52c89a7e7d2691b97a9728e4591d071ca8abc
https://git.kernel.org/stable/c/47388e807f85948eefc403a8a5fdc5b406a65d5a
https://git.kernel.org/stable/c/4c267110fc110390704cc065edb9817fdd10ff54
https://git.kernel.org/stable/c/774d83b008eccb1c48c14dc5486e7aa255731350
https://git.kernel.org/stable/c/9513d4148950b05bc99fa7314dc883cc0e1605e5
https://git.kernel.org/stable/c/b229bc6c6ea9fe459fc3fa94fd0a27a2f32aca56
https://git.kernel.org/stable/c/b890d45aaf02b564e6cae2d2a590f9649330857d
https://git.kernel.org/stable/c/f126ce7305fe88f49cdabc6db4168b9318898ea3
Common Vulnerability Exposure (CVE) ID: CVE-2024-36902
https://git.kernel.org/stable/c/1876881c9a49613b5249fb400cbf53412d90cb09
https://git.kernel.org/stable/c/35297fc68de36826087e976f86a5b1f94fd0bf95
https://git.kernel.org/stable/c/4a5a573387da6a6b23a4cc62147453ff1bc32afa
https://git.kernel.org/stable/c/674c951ab8a23f7aff9b4c3f2f865901bc76a290
https://git.kernel.org/stable/c/7e3242c139c38e60844638e394c2877b16b396b0
https://git.kernel.org/stable/c/8745a8d74ba17dafe72b6ab461fa6c007d879747
https://git.kernel.org/stable/c/d101291b2681e5ab938554e3e323f7a7ee33e3aa
https://git.kernel.org/stable/c/ddec23f206a944c73bcc2724358b85388837daff
CopyrightCopyright (C) 2024 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.