Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.12.2024.6974.1
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-6974-1)
Summary:The remote host is missing an update for the 'linux, linux-aws, linux-aws-5.15, linux-azure, linux-azure-5.15, linux-azure-fde, linux-azure-fde-5.15, linux-gcp, linux-gcp-5.15, linux-gke, linux-gkeop, linux-gkeop-5.15, linux-hwe-5.15, linux-ibm, linux-ibm-5.15, linux-intel-iotg, linux-intel-iotg-5.15, linux-kvm, linux-lowlatency, linux-lowlatency-hwe-5.15, linux-nvidia, linux-oracle, linux-raspi' package(s) announced via the USN-6974-1 advisory.
Description:Summary:
The remote host is missing an update for the 'linux, linux-aws, linux-aws-5.15, linux-azure, linux-azure-5.15, linux-azure-fde, linux-azure-fde-5.15, linux-gcp, linux-gcp-5.15, linux-gke, linux-gkeop, linux-gkeop-5.15, linux-hwe-5.15, linux-ibm, linux-ibm-5.15, linux-intel-iotg, linux-intel-iotg-5.15, linux-kvm, linux-lowlatency, linux-lowlatency-hwe-5.15, linux-nvidia, linux-oracle, linux-raspi' package(s) announced via the USN-6974-1 advisory.

Vulnerability Insight:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- SuperH RISC architecture,
- User-Mode Linux (UML),
- MMC subsystem,
- Network drivers,
- GFS2 file system,
- IPv4 networking,
- IPv6 networking,
(CVE-2024-26921, CVE-2023-52629, CVE-2024-26680, CVE-2024-26830,
CVE-2024-39484, CVE-2024-39292, CVE-2024-36901, CVE-2023-52760)

Affected Software/OS:
'linux, linux-aws, linux-aws-5.15, linux-azure, linux-azure-5.15, linux-azure-fde, linux-azure-fde-5.15, linux-gcp, linux-gcp-5.15, linux-gke, linux-gkeop, linux-gkeop-5.15, linux-hwe-5.15, linux-ibm, linux-ibm-5.15, linux-intel-iotg, linux-intel-iotg-5.15, linux-kvm, linux-lowlatency, linux-lowlatency-hwe-5.15, linux-nvidia, linux-oracle, linux-raspi' package(s) on Ubuntu 20.04, Ubuntu 22.04.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:L/AC:L/Au:S/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2023-52629
https://git.kernel.org/stable/c/246f80a0b17f8f582b2c0996db02998239057c65
https://git.kernel.org/stable/c/610dbd8ac271aa36080aac50b928d700ee3fe4de
Common Vulnerability Exposure (CVE) ID: CVE-2023-52760
https://git.kernel.org/stable/c/08a28272faa750d4357ea2cb48d2baefd778ea81
https://git.kernel.org/stable/c/bdcb8aa434c6d36b5c215d02a9ef07551be25a37
Common Vulnerability Exposure (CVE) ID: CVE-2024-26680
https://git.kernel.org/stable/c/004fe5b7f59286a926a45e0cafc7870e9cdddd56
https://git.kernel.org/stable/c/2e7d3b67630dfd8f178c41fa2217aa00e79a5887
https://git.kernel.org/stable/c/466ceebe48cbba3f4506f165fca7111f9eb8bb12
https://git.kernel.org/stable/c/e42e334c645575be5432adee224975d4f536fdb1
Common Vulnerability Exposure (CVE) ID: CVE-2024-26830
https://git.kernel.org/stable/c/1c981792e4ccbc134b468797acdd7781959e6893
https://git.kernel.org/stable/c/73d9629e1c8c1982f13688c4d1019c3994647ccc
https://git.kernel.org/stable/c/be147926140ac48022c9605d7ab0a67387e4b404
https://git.kernel.org/stable/c/d250a81ba813a93563be68072c563aa1e346346d
Common Vulnerability Exposure (CVE) ID: CVE-2024-26921
https://git.kernel.org/stable/c/18685451fc4e546fc0e718580d32df3c0e5c8272
https://git.kernel.org/stable/c/7d0567842b78390dd9b60f00f1d8f838d540e325
https://git.kernel.org/stable/c/e09cbe017311508c21e0739e97198a8388b98981
https://git.kernel.org/stable/c/f4877225313d474659ee53150ccc3d553a978727
Common Vulnerability Exposure (CVE) ID: CVE-2024-36901
https://git.kernel.org/stable/c/4db783d68b9b39a411a96096c10828ff5dfada7a
https://git.kernel.org/stable/c/55f7eb4001ef2a3b48cf039cf263f9ed0ec5a488
https://git.kernel.org/stable/c/e31b25cc2066d3f2b6c38579253882008d4469b0
https://git.kernel.org/stable/c/ea0cb87402f774b0e1214ffba0f57028b27cf155
Common Vulnerability Exposure (CVE) ID: CVE-2024-39292
https://git.kernel.org/stable/c/0c02d425a2fbe52643a5859a779db0329e7dddd4
https://git.kernel.org/stable/c/31960d991e43c8d6dc07245f19fc13398e90ead2
https://git.kernel.org/stable/c/351d1a64544944b44732f6a64ed65573b00b9e14
https://git.kernel.org/stable/c/434a06c38ee1217a8baa0dd7c37cc85d50138fb0
https://git.kernel.org/stable/c/66ea9a7c6824821476914bed21a476cd20094f33
https://git.kernel.org/stable/c/73b8e21f76c7dda4905655d2e2c17dc5a73b87f1
https://git.kernel.org/stable/c/a0fbbd36c156b9f7b2276871d499c9943dfe5101
https://git.kernel.org/stable/c/dc1ff95602ee908fcd7d8acee7a0dadb61b1a0c0
Common Vulnerability Exposure (CVE) ID: CVE-2024-39484
CopyrightCopyright (C) 2024 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.