Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.12.2024.6972.2
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-6972-2)
Summary:The remote host is missing an update for the 'linux-aws, linux-aws-hwe' package(s) announced via the USN-6972-2 advisory.
Description:Summary:
The remote host is missing an update for the 'linux-aws, linux-aws-hwe' package(s) announced via the USN-6972-2 advisory.

Vulnerability Insight:
Yuxuan Hu discovered that the Bluetooth RFCOMM protocol driver in the Linux
Kernel contained a race condition, leading to a NULL pointer dereference.
An attacker could possibly use this to cause a denial of service (system
crash). (CVE-2024-22099)

It was discovered that a race condition existed in the Bluetooth subsystem
in the Linux kernel, leading to a null pointer dereference vulnerability. A
privileged local attacker could use this to possibly cause a denial of
service (system crash). (CVE-2024-24860)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- SuperH RISC architecture,
- User-Mode Linux (UML),
- GPU drivers,
- MMC subsystem,
- Network drivers,
- PHY drivers,
- Pin controllers subsystem,
- Xen hypervisor drivers,
- GFS2 file system,
- Core kernel,
- Bluetooth subsystem,
- IPv4 networking,
- IPv6 networking,
- HD-audio driver,
- ALSA SH drivers,
(CVE-2024-26903, CVE-2024-35835, CVE-2023-52644, CVE-2024-39292,
CVE-2024-36940, CVE-2024-26600, CVE-2023-52629, CVE-2024-35955,
CVE-2023-52760, CVE-2023-52806, CVE-2024-39484, CVE-2024-26679,
CVE-2024-26654, CVE-2024-36901, CVE-2024-26687, CVE-2023-52470)

Affected Software/OS:
'linux-aws, linux-aws-hwe' package(s) on Ubuntu 16.04, Ubuntu 18.04.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:L/AC:L/Au:S/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2023-52470
https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088
https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1
https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41
https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb
https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4
https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310
https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85
https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97
Common Vulnerability Exposure (CVE) ID: CVE-2023-52629
https://git.kernel.org/stable/c/246f80a0b17f8f582b2c0996db02998239057c65
https://git.kernel.org/stable/c/610dbd8ac271aa36080aac50b928d700ee3fe4de
Common Vulnerability Exposure (CVE) ID: CVE-2023-52644
https://git.kernel.org/stable/c/04a2b6eff2ae1c19cb7f41e803bcbfaf94c06455
https://git.kernel.org/stable/c/1824f942527f784a19e01eac2d9679a21623d010
https://git.kernel.org/stable/c/31aaf17200c336fe258b70d39c40645ae19d0240
https://git.kernel.org/stable/c/4049a9f80513a6739c5677736a4c88f96df1b436
https://git.kernel.org/stable/c/49f067726ab01c87cf57566797a8a719badbbf08
https://git.kernel.org/stable/c/9636951e4468f02c72cc75a82dc65d003077edbc
https://git.kernel.org/stable/c/bc845e2e42cae95172c04bf29807c480f51a2a83
https://git.kernel.org/stable/c/c67698325c68f8768db858f5c87c34823421746d
https://git.kernel.org/stable/c/f1cf77bb870046a6111a604f7f7fe83d1c8c9610
Common Vulnerability Exposure (CVE) ID: CVE-2023-52760
https://git.kernel.org/stable/c/08a28272faa750d4357ea2cb48d2baefd778ea81
https://git.kernel.org/stable/c/bdcb8aa434c6d36b5c215d02a9ef07551be25a37
Common Vulnerability Exposure (CVE) ID: CVE-2023-52806
https://git.kernel.org/stable/c/2527775616f3638f4fd54649eba8c7b84d5e4250
https://git.kernel.org/stable/c/25354bae4fc310c3928e8a42fda2d486f67745d7
https://git.kernel.org/stable/c/43b91df291c8802268ab3cfd8fccfdf135800ed4
https://git.kernel.org/stable/c/4a320da7f7cbdab2098b103c47f45d5061f42edd
https://git.kernel.org/stable/c/631a96e9eb4228ff75fce7e72d133ca81194797e
https://git.kernel.org/stable/c/758c7733cb821041f5fd403b7b97c0b95d319323
https://git.kernel.org/stable/c/7de25112de8222fd20564769e6c99dc9f9738a0b
https://git.kernel.org/stable/c/f93dc90c2e8ed664985e366aa6459ac83cdab236
https://git.kernel.org/stable/c/fe7c1a0c2b25c82807cb46fc3aadbf2664a682b0
Common Vulnerability Exposure (CVE) ID: CVE-2024-22099
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSXNF4RLEFLH35BFUQGYXRRVHHUIVBAE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IVVYSTEVMPYGF6GDSOD44MUXZXAZHOHB/
https://bugzilla.openanolis.cn/show_bug.cgi?id=7956
Common Vulnerability Exposure (CVE) ID: CVE-2024-24860
https://bugzilla.openanolis.cn/show_bug.cgi?id=8151
Common Vulnerability Exposure (CVE) ID: CVE-2024-26600
https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4
https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4
https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1
https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b
https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d
https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5
https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462
https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3
Common Vulnerability Exposure (CVE) ID: CVE-2024-26654
https://git.kernel.org/stable/c/051e0840ffa8ab25554d6b14b62c9ab9e4901457
https://git.kernel.org/stable/c/3c907bf56905de7d27b329afaf59c2fb35d17b04
https://git.kernel.org/stable/c/4206ad65a0ee76920041a755bd3c17c6ba59bba2
https://git.kernel.org/stable/c/61d4787692c1fccdc268ffa7a891f9c149f50901
https://git.kernel.org/stable/c/8c990221681688da34295d6d76cc2f5b963e83f5
https://git.kernel.org/stable/c/9d66ae0e7bb78b54e1e0525456c6b54e1d132046
https://git.kernel.org/stable/c/aa39e6878f61f50892ee2dd9d2176f72020be845
https://git.kernel.org/stable/c/e955e8a7f38a856fc6534ba4e6bffd4d5cc80ac3
https://git.kernel.org/stable/c/eeb2a2ca0b8de7e1c66afaf719529154e7dc60b2
Common Vulnerability Exposure (CVE) ID: CVE-2024-26679
https://git.kernel.org/stable/c/307fa8a75ab7423fa5c73573ec3d192de5027830
https://git.kernel.org/stable/c/3266e638ba5cc1165f5e6989eb8c0720f1cc4b41
https://git.kernel.org/stable/c/4a5e31bdd3c1702b520506d9cf8c41085f75c7f2
https://git.kernel.org/stable/c/54538752216bf89ee88d47ad07802063a498c299
https://git.kernel.org/stable/c/5993f121fbc01dc2d734f0ff2628009b258fb1dd
https://git.kernel.org/stable/c/88081ba415224cf413101def4343d660f56d082b
https://git.kernel.org/stable/c/caa064c3c2394d03e289ebd6b0be5102eb8a5b40
https://git.kernel.org/stable/c/eef00a82c568944f113f2de738156ac591bbd5cd
Common Vulnerability Exposure (CVE) ID: CVE-2024-26687
https://git.kernel.org/stable/c/0fc88aeb2e32b76db3fe6a624b8333dbe621b8fd
https://git.kernel.org/stable/c/20980195ec8d2e41653800c45c8c367fa1b1f2b4
https://git.kernel.org/stable/c/585a344af6bcac222608a158fc2830ff02712af5
https://git.kernel.org/stable/c/9470f5b2503cae994098dea9682aee15b313fa44
https://git.kernel.org/stable/c/9be71aa12afa91dfe457b3fb4a444c42b1ee036b
https://git.kernel.org/stable/c/ea592baf9e41779fe9a0424c03dd2f324feca3b3
https://git.kernel.org/stable/c/fa765c4b4aed2d64266b694520ecb025c862c5a9
Common Vulnerability Exposure (CVE) ID: CVE-2024-26903
https://git.kernel.org/stable/c/2535b848fa0f42ddff3e5255cf5e742c9b77bb26
https://git.kernel.org/stable/c/369f419c097e82407dd429a202cde9a73d3ae29b
https://git.kernel.org/stable/c/3ead59bafad05f2967ae2438c0528d53244cfde5
https://git.kernel.org/stable/c/567c0411dc3b424fc7bd1e6109726d7ba32d4f73
https://git.kernel.org/stable/c/5f369efd9d963c1f711a06c9b8baf9f5ce616d85
https://git.kernel.org/stable/c/5f9fe302dd3a9bbc50f4888464c1773f45166bfd
https://git.kernel.org/stable/c/81d7d920a22fd58ef9aedb1bd0a68ee32bd23e96
https://git.kernel.org/stable/c/8d1753973f598531baaa2c1033cf7f7b5bb004b0
Common Vulnerability Exposure (CVE) ID: CVE-2024-35835
https://git.kernel.org/stable/c/2501afe6c4c9829d03abe9a368b83d9ea1b611b7
https://git.kernel.org/stable/c/3c6d5189246f590e4e1f167991558bdb72a4738b
https://git.kernel.org/stable/c/42876db001bbea7558e8676d1019f08f9390addb
https://git.kernel.org/stable/c/66cc521a739ccd5da057a1cb3d6346c6d0e7619b
https://git.kernel.org/stable/c/b21db3f1ab7967a81d6bbd328d28fe5a4c07a8a7
https://git.kernel.org/stable/c/c57ca114eb00e03274dd38108d07a3750fa3c056
https://git.kernel.org/stable/c/cf116d9c3c2aebd653c2dfab5b10c278e9ec3ee5
https://git.kernel.org/stable/c/e3d3ed8c152971dbe64c92c9ecb98fdb52abb629
Common Vulnerability Exposure (CVE) ID: CVE-2024-35955
https://git.kernel.org/stable/c/2df2dd27066cdba8041e46a64362325626bdfb2e
https://git.kernel.org/stable/c/325f3fb551f8cd672dbbfc4cf58b14f9ee3fc9e8
https://git.kernel.org/stable/c/36b57c7d2f8b7de224980f1a284432846ad71ca0
https://git.kernel.org/stable/c/5062d1f4f07facbdade0f402d9a04a788f52e26d
https://git.kernel.org/stable/c/62029bc9ff2c17a4e3a2478d83418ec575413808
https://git.kernel.org/stable/c/93eb31e7c3399e326259f2caa17be1e821f5a412
https://git.kernel.org/stable/c/b5808d40093403334d939e2c3c417144d12a6f33
https://git.kernel.org/stable/c/d15023fb407337028a654237d8968fefdcf87c2f
Common Vulnerability Exposure (CVE) ID: CVE-2024-36901
https://git.kernel.org/stable/c/4db783d68b9b39a411a96096c10828ff5dfada7a
https://git.kernel.org/stable/c/55f7eb4001ef2a3b48cf039cf263f9ed0ec5a488
https://git.kernel.org/stable/c/e31b25cc2066d3f2b6c38579253882008d4469b0
https://git.kernel.org/stable/c/ea0cb87402f774b0e1214ffba0f57028b27cf155
Common Vulnerability Exposure (CVE) ID: CVE-2024-36940
https://git.kernel.org/stable/c/288bc4aa75f150d6f1ee82dd43c6da1b438b6068
https://git.kernel.org/stable/c/41f88ef8ba387a12f4a2b8c400b6c9e8e54b2cca
https://git.kernel.org/stable/c/5038a66dad0199de60e5671603ea6623eb9e5c79
https://git.kernel.org/stable/c/558c8039fdf596a584a92c171cbf3298919c448c
https://git.kernel.org/stable/c/735f4c6b6771eafe336404c157ca683ad72a040d
https://git.kernel.org/stable/c/ac7d65795827dc0cf7662384ed27caf4066bd72e
https://git.kernel.org/stable/c/cdaa171473d98962ae86f2a663d398fda2fbeefd
https://git.kernel.org/stable/c/f9f1e321d53e4c5b666b66e5b43da29841fb55ba
Common Vulnerability Exposure (CVE) ID: CVE-2024-39292
https://git.kernel.org/stable/c/0c02d425a2fbe52643a5859a779db0329e7dddd4
https://git.kernel.org/stable/c/31960d991e43c8d6dc07245f19fc13398e90ead2
https://git.kernel.org/stable/c/351d1a64544944b44732f6a64ed65573b00b9e14
https://git.kernel.org/stable/c/434a06c38ee1217a8baa0dd7c37cc85d50138fb0
https://git.kernel.org/stable/c/66ea9a7c6824821476914bed21a476cd20094f33
https://git.kernel.org/stable/c/73b8e21f76c7dda4905655d2e2c17dc5a73b87f1
https://git.kernel.org/stable/c/a0fbbd36c156b9f7b2276871d499c9943dfe5101
https://git.kernel.org/stable/c/dc1ff95602ee908fcd7d8acee7a0dadb61b1a0c0
Common Vulnerability Exposure (CVE) ID: CVE-2024-39484
CopyrightCopyright (C) 2024 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.