Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.12.2024.6976.1
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-6976-1)
Summary:The remote host is missing an update for the 'linux, linux-aws, linux-kvm, linux-lts-xenial' package(s) announced via the USN-6976-1 advisory.
Description:Summary:
The remote host is missing an update for the 'linux, linux-aws, linux-kvm, linux-lts-xenial' package(s) announced via the USN-6976-1 advisory.

Vulnerability Insight:
Yuxuan Hu discovered that the Bluetooth RFCOMM protocol driver in the Linux
Kernel contained a race condition, leading to a NULL pointer dereference.
An attacker could possibly use this to cause a denial of service (system
crash). (CVE-2024-22099)

It was discovered that a race condition existed in the Bluetooth subsystem
in the Linux kernel, leading to a null pointer dereference vulnerability. A
privileged local attacker could use this to possibly cause a denial of
service (system crash). (CVE-2024-24860)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- SuperH RISC architecture,
- User-Mode Linux (UML),
- GPU drivers,
- HID subsystem,
- MMC subsystem,
- Network drivers,
- PHY drivers,
- SCSI drivers,
- USB subsystem,
- Xen hypervisor drivers,
- GFS2 file system,
- Memory management,
- Bluetooth subsystem,
- IPv4 networking,
- IPv6 networking,
- NFC subsystem,
- HD-audio driver,
- ALSA SH drivers,
(CVE-2023-52806, CVE-2021-46924, CVE-2021-47521, CVE-2021-47542,
CVE-2024-26903, CVE-2024-26654, CVE-2024-27013, CVE-2024-26600,
CVE-2021-47518, CVE-2021-47171, CVE-2023-52629, CVE-2023-52644,
CVE-2021-46904, CVE-2023-52470, CVE-2024-36901, CVE-2021-46906,
CVE-2024-39292, CVE-2022-48659, CVE-2021-47173, CVE-2021-47571,
CVE-2024-26929, CVE-2024-39484, CVE-2024-26687, CVE-2024-26679,
CVE-2023-52760)

Affected Software/OS:
'linux, linux-aws, linux-kvm, linux-lts-xenial' package(s) on Ubuntu 14.04, Ubuntu 16.04.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:L/AC:L/Au:S/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2021-46904
https://git.kernel.org/stable/c/145c89c441d27696961752bf51b323f347601bee
https://git.kernel.org/stable/c/388d05f70f1ee0cac4a2068fd295072f1a44152a
https://git.kernel.org/stable/c/4a2933c88399c0ebc738db39bbce3ae89786d723
https://git.kernel.org/stable/c/8a12f8836145ffe37e9c8733dce18c22fb668b66
https://git.kernel.org/stable/c/92028d7a31e55d53e41cff679156b9432cffcb36
https://git.kernel.org/stable/c/a462067d7c8e6953a733bf5ade8db947b1bb5449
https://git.kernel.org/stable/c/caf5ac93b3b5d5fac032fc11fbea680e115421b4
https://git.kernel.org/stable/c/dc195928d7e4ec7b5cfc6cd10dc4c8d87a7c72ac
Common Vulnerability Exposure (CVE) ID: CVE-2021-46906
https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82
https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8
https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce
https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f
https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1
https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0
https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9
https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366
Common Vulnerability Exposure (CVE) ID: CVE-2021-46924
https://git.kernel.org/stable/c/1b9dadba502234eea7244879b8d5d126bfaf9f0c
https://git.kernel.org/stable/c/1cd4063dbc91cf7965d73a6a3855e2028cd4613b
https://git.kernel.org/stable/c/238920381b8925d070d32d73cd9ce52ab29896fe
https://git.kernel.org/stable/c/38c3e320e7ff46f2dc67bc5045333e63d9f8918d
https://git.kernel.org/stable/c/a1e0080a35a16ce3808f7040fe0c3a8fdb052349
https://git.kernel.org/stable/c/e553265ea56482da5700f56319fda9ff53e7dcb4
Common Vulnerability Exposure (CVE) ID: CVE-2021-47171
https://git.kernel.org/stable/c/200dbfcad8011e50c3cec269ed7b980836eeb1fa
https://git.kernel.org/stable/c/22c840596af0c09068b6cf948616e6496e59e07f
https://git.kernel.org/stable/c/46a8b29c6306d8bbfd92b614ef65a47c900d8e70
https://git.kernel.org/stable/c/635ac38b36255d3cfb8312cf7c471334f4d537e0
https://git.kernel.org/stable/c/70c886ac93f87ae7214a0c69151a28a8075dd95b
https://git.kernel.org/stable/c/9e6a3eccb28779710cbbafc4f4258d92509c6d07
https://git.kernel.org/stable/c/9e6b8c1ff9d997e1fa16cbd2d60739adf6dc1bbc
https://git.kernel.org/stable/c/b95fb96e6339e34694dd578fb6bde3575b01af17
Common Vulnerability Exposure (CVE) ID: CVE-2021-47173
https://git.kernel.org/stable/c/36b5ff1db1a4ef4fdbc2bae364344279f033ad88
https://git.kernel.org/stable/c/386918878ce4cd676e4607233866e03c9399a46a
https://git.kernel.org/stable/c/5394ae9d8c7961dd93807fdf1b12a1dde96b0a55
https://git.kernel.org/stable/c/5f46b2410db2c8f26b8bb91b40deebf4ec184391
https://git.kernel.org/stable/c/7889c70e6173ef358f3cd7578db127a489035a42
https://git.kernel.org/stable/c/a3c3face38cb49932c62adcc1289914f1c742096
https://git.kernel.org/stable/c/bcb30cc8f8befcbdbcf7a016e4dfd4747c54a364
https://git.kernel.org/stable/c/dcb4b8ad6a448532d8b681b5d1a7036210b622de
Common Vulnerability Exposure (CVE) ID: CVE-2021-47518
https://git.kernel.org/stable/c/3b861a40325eac9c4c13b6c53874ad90617e944d
https://git.kernel.org/stable/c/48fcd08fdbe05e35b650a252ec2a2d96057a1c7a
https://git.kernel.org/stable/c/4cd8371a234d051f9c9557fcbb1f8c523b1c0d10
https://git.kernel.org/stable/c/69bb79a8f5bb9f436b6f1434ca9742591b7bbe18
https://git.kernel.org/stable/c/811a7576747760bcaf60502f096d1e6e91d566fa
https://git.kernel.org/stable/c/83ea620a1be840bf05089a5061fb8323ca42f38c
https://git.kernel.org/stable/c/87cdb8789c38e44ae5454aafe277997c950d00ed
https://git.kernel.org/stable/c/fae9705d281091254d4a81fa2da9d22346097dca
Common Vulnerability Exposure (CVE) ID: CVE-2021-47521
https://git.kernel.org/stable/c/1a295fea90e1acbe80c6d4940f5ff856edcd6bec
https://git.kernel.org/stable/c/1dd5b819f7e406dc15bbc7670596ff25261aaa2a
https://git.kernel.org/stable/c/3ec6ca6b1a8e64389f0212b5a1b0f6fed1909e45
https://git.kernel.org/stable/c/474f9a8534f5f89841240a7e978bafd6e1e039ce
https://git.kernel.org/stable/c/923f4dc5df679f678e121c20bf2fd70f7bf3e288
https://git.kernel.org/stable/c/c8718026ba287168ff9ad0ccc4f9a413062cba36
https://git.kernel.org/stable/c/cbd86110546f7f730a1f5d7de56c944a336c15c4
https://git.kernel.org/stable/c/ccf070183e4655824936c0f96c4a2bcca93419aa
Common Vulnerability Exposure (CVE) ID: CVE-2021-47542
https://git.kernel.org/stable/c/15fa12c119f869173f9b710cbe6a4a14071d2105
https://git.kernel.org/stable/c/3a061d54e260b701b538873b43e399d9b8b83e03
https://git.kernel.org/stable/c/550658a2d61e4eaf522c8ebc7fad76dc376bfb45
https://git.kernel.org/stable/c/57af54a56024435d83e44c78449513b414eb6edf
https://git.kernel.org/stable/c/b4f217d6fcc00c3fdc0921a7691f30be7490b073
https://git.kernel.org/stable/c/bbeb0325a7460ebf1e03f5e0bfc5c652fba9519f
https://git.kernel.org/stable/c/c5ef33c1489b2cd74368057fa00b5d2183bb5853
https://git.kernel.org/stable/c/e2dabc4f7e7b60299c20a36d6a7b24ed9bf8e572
Common Vulnerability Exposure (CVE) ID: CVE-2021-47571
https://git.kernel.org/stable/c/2e1ec01af2c7139c6a600bbfaea1a018b35094b6
https://git.kernel.org/stable/c/8d0163cec7de995f9eb9c3128c83fb84f0cb1c64
https://git.kernel.org/stable/c/9186680382934b0e7529d3d70dcc0a21d087683b
https://git.kernel.org/stable/c/b535917c51acc97fb0761b1edec85f1f3d02bda4
https://git.kernel.org/stable/c/bca19bb2dc2d89ce60c4a4a6e59609d4cf2e13ef
https://git.kernel.org/stable/c/c0ef0e75a858cbd8618b473f22fbca36106dcf82
https://git.kernel.org/stable/c/d43aecb694b10db9a4228ce2d38b5ae8de374443
https://git.kernel.org/stable/c/e27ee2f607fe6a9b923ef1fc65461c0613c97594
Common Vulnerability Exposure (CVE) ID: CVE-2022-48659
https://git.kernel.org/stable/c/016b150992eebc32c4a18f783cf2bb6e2545a3d9
https://git.kernel.org/stable/c/02bcd951aa3c2cea95fb241c20802e9501940296
https://git.kernel.org/stable/c/2d6e55e0c03804e1e227b80a5746e086d6c6696c
https://git.kernel.org/stable/c/379ac7905ff3f0a6a4e507d3e9f710ec4fab9124
https://git.kernel.org/stable/c/7e9c323c52b379d261a72dc7bd38120a761a93cd
https://git.kernel.org/stable/c/a1d83a19cec3bfeb2b3547a1f7631e432a766d1c
https://git.kernel.org/stable/c/e9219fa63c5c25804af82c7aa54d1ec770ebe457
https://git.kernel.org/stable/c/e996821717c5cf8aa1e1abdb6b3d900a231e3755
Common Vulnerability Exposure (CVE) ID: CVE-2023-52470
https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088
https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1
https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41
https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb
https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4
https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310
https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85
https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97
Common Vulnerability Exposure (CVE) ID: CVE-2023-52629
https://git.kernel.org/stable/c/246f80a0b17f8f582b2c0996db02998239057c65
https://git.kernel.org/stable/c/610dbd8ac271aa36080aac50b928d700ee3fe4de
Common Vulnerability Exposure (CVE) ID: CVE-2023-52644
https://git.kernel.org/stable/c/04a2b6eff2ae1c19cb7f41e803bcbfaf94c06455
https://git.kernel.org/stable/c/1824f942527f784a19e01eac2d9679a21623d010
https://git.kernel.org/stable/c/31aaf17200c336fe258b70d39c40645ae19d0240
https://git.kernel.org/stable/c/4049a9f80513a6739c5677736a4c88f96df1b436
https://git.kernel.org/stable/c/49f067726ab01c87cf57566797a8a719badbbf08
https://git.kernel.org/stable/c/9636951e4468f02c72cc75a82dc65d003077edbc
https://git.kernel.org/stable/c/bc845e2e42cae95172c04bf29807c480f51a2a83
https://git.kernel.org/stable/c/c67698325c68f8768db858f5c87c34823421746d
https://git.kernel.org/stable/c/f1cf77bb870046a6111a604f7f7fe83d1c8c9610
Common Vulnerability Exposure (CVE) ID: CVE-2023-52760
https://git.kernel.org/stable/c/08a28272faa750d4357ea2cb48d2baefd778ea81
https://git.kernel.org/stable/c/bdcb8aa434c6d36b5c215d02a9ef07551be25a37
Common Vulnerability Exposure (CVE) ID: CVE-2023-52806
https://git.kernel.org/stable/c/2527775616f3638f4fd54649eba8c7b84d5e4250
https://git.kernel.org/stable/c/25354bae4fc310c3928e8a42fda2d486f67745d7
https://git.kernel.org/stable/c/43b91df291c8802268ab3cfd8fccfdf135800ed4
https://git.kernel.org/stable/c/4a320da7f7cbdab2098b103c47f45d5061f42edd
https://git.kernel.org/stable/c/631a96e9eb4228ff75fce7e72d133ca81194797e
https://git.kernel.org/stable/c/758c7733cb821041f5fd403b7b97c0b95d319323
https://git.kernel.org/stable/c/7de25112de8222fd20564769e6c99dc9f9738a0b
https://git.kernel.org/stable/c/f93dc90c2e8ed664985e366aa6459ac83cdab236
https://git.kernel.org/stable/c/fe7c1a0c2b25c82807cb46fc3aadbf2664a682b0
Common Vulnerability Exposure (CVE) ID: CVE-2024-22099
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSXNF4RLEFLH35BFUQGYXRRVHHUIVBAE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IVVYSTEVMPYGF6GDSOD44MUXZXAZHOHB/
https://bugzilla.openanolis.cn/show_bug.cgi?id=7956
Common Vulnerability Exposure (CVE) ID: CVE-2024-24860
https://bugzilla.openanolis.cn/show_bug.cgi?id=8151
Common Vulnerability Exposure (CVE) ID: CVE-2024-26600
https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4
https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4
https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1
https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b
https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d
https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5
https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462
https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3
Common Vulnerability Exposure (CVE) ID: CVE-2024-26654
https://git.kernel.org/stable/c/051e0840ffa8ab25554d6b14b62c9ab9e4901457
https://git.kernel.org/stable/c/3c907bf56905de7d27b329afaf59c2fb35d17b04
https://git.kernel.org/stable/c/4206ad65a0ee76920041a755bd3c17c6ba59bba2
https://git.kernel.org/stable/c/61d4787692c1fccdc268ffa7a891f9c149f50901
https://git.kernel.org/stable/c/8c990221681688da34295d6d76cc2f5b963e83f5
https://git.kernel.org/stable/c/9d66ae0e7bb78b54e1e0525456c6b54e1d132046
https://git.kernel.org/stable/c/aa39e6878f61f50892ee2dd9d2176f72020be845
https://git.kernel.org/stable/c/e955e8a7f38a856fc6534ba4e6bffd4d5cc80ac3
https://git.kernel.org/stable/c/eeb2a2ca0b8de7e1c66afaf719529154e7dc60b2
Common Vulnerability Exposure (CVE) ID: CVE-2024-26679
https://git.kernel.org/stable/c/307fa8a75ab7423fa5c73573ec3d192de5027830
https://git.kernel.org/stable/c/3266e638ba5cc1165f5e6989eb8c0720f1cc4b41
https://git.kernel.org/stable/c/4a5e31bdd3c1702b520506d9cf8c41085f75c7f2
https://git.kernel.org/stable/c/54538752216bf89ee88d47ad07802063a498c299
https://git.kernel.org/stable/c/5993f121fbc01dc2d734f0ff2628009b258fb1dd
https://git.kernel.org/stable/c/88081ba415224cf413101def4343d660f56d082b
https://git.kernel.org/stable/c/caa064c3c2394d03e289ebd6b0be5102eb8a5b40
https://git.kernel.org/stable/c/eef00a82c568944f113f2de738156ac591bbd5cd
Common Vulnerability Exposure (CVE) ID: CVE-2024-26687
https://git.kernel.org/stable/c/0fc88aeb2e32b76db3fe6a624b8333dbe621b8fd
https://git.kernel.org/stable/c/20980195ec8d2e41653800c45c8c367fa1b1f2b4
https://git.kernel.org/stable/c/585a344af6bcac222608a158fc2830ff02712af5
https://git.kernel.org/stable/c/9470f5b2503cae994098dea9682aee15b313fa44
https://git.kernel.org/stable/c/9be71aa12afa91dfe457b3fb4a444c42b1ee036b
https://git.kernel.org/stable/c/ea592baf9e41779fe9a0424c03dd2f324feca3b3
https://git.kernel.org/stable/c/fa765c4b4aed2d64266b694520ecb025c862c5a9
Common Vulnerability Exposure (CVE) ID: CVE-2024-26903
https://git.kernel.org/stable/c/2535b848fa0f42ddff3e5255cf5e742c9b77bb26
https://git.kernel.org/stable/c/369f419c097e82407dd429a202cde9a73d3ae29b
https://git.kernel.org/stable/c/3ead59bafad05f2967ae2438c0528d53244cfde5
https://git.kernel.org/stable/c/567c0411dc3b424fc7bd1e6109726d7ba32d4f73
https://git.kernel.org/stable/c/5f369efd9d963c1f711a06c9b8baf9f5ce616d85
https://git.kernel.org/stable/c/5f9fe302dd3a9bbc50f4888464c1773f45166bfd
https://git.kernel.org/stable/c/81d7d920a22fd58ef9aedb1bd0a68ee32bd23e96
https://git.kernel.org/stable/c/8d1753973f598531baaa2c1033cf7f7b5bb004b0
Common Vulnerability Exposure (CVE) ID: CVE-2024-26929
https://git.kernel.org/stable/c/282877633b25d67021a34169c5b5519b1d4ef65e
https://git.kernel.org/stable/c/82f522ae0d97119a43da53e0f729275691b9c525
https://git.kernel.org/stable/c/846fb9f112f618ec6ae181d8dae7961652574774
https://git.kernel.org/stable/c/9b43d2884b54d415caab48878b526dfe2ae9921b
https://git.kernel.org/stable/c/b03e626bd6d3f0684f56ee1890d70fc9ca991c04
https://git.kernel.org/stable/c/f85af9f1aa5e2f53694a6cbe72010f754b5ff862
Common Vulnerability Exposure (CVE) ID: CVE-2024-27013
https://git.kernel.org/stable/c/14cdb43dbc827e18ac7d5b30c5b4c676219f1421
https://git.kernel.org/stable/c/40f4ced305c6c47487d3cd8da54676e2acc1a6ad
https://git.kernel.org/stable/c/4b0dcae5c4797bf31c63011ed62917210d3fdac3
https://git.kernel.org/stable/c/52854101180beccdb9dc2077a3bea31b6ad48dfa
https://git.kernel.org/stable/c/62e27ef18eb4f0d33bbae8e9ef56b99696a74713
https://git.kernel.org/stable/c/68459b8e3ee554ce71878af9eb69659b9462c588
https://git.kernel.org/stable/c/a50dbeca28acf7051dfa92786b85f704c75db6eb
https://git.kernel.org/stable/c/f8bbc07ac535593139c875ffa19af924b1084540
Common Vulnerability Exposure (CVE) ID: CVE-2024-36901
https://git.kernel.org/stable/c/4db783d68b9b39a411a96096c10828ff5dfada7a
https://git.kernel.org/stable/c/55f7eb4001ef2a3b48cf039cf263f9ed0ec5a488
https://git.kernel.org/stable/c/e31b25cc2066d3f2b6c38579253882008d4469b0
https://git.kernel.org/stable/c/ea0cb87402f774b0e1214ffba0f57028b27cf155
Common Vulnerability Exposure (CVE) ID: CVE-2024-39292
https://git.kernel.org/stable/c/0c02d425a2fbe52643a5859a779db0329e7dddd4
https://git.kernel.org/stable/c/31960d991e43c8d6dc07245f19fc13398e90ead2
https://git.kernel.org/stable/c/351d1a64544944b44732f6a64ed65573b00b9e14
https://git.kernel.org/stable/c/434a06c38ee1217a8baa0dd7c37cc85d50138fb0
https://git.kernel.org/stable/c/66ea9a7c6824821476914bed21a476cd20094f33
https://git.kernel.org/stable/c/73b8e21f76c7dda4905655d2e2c17dc5a73b87f1
https://git.kernel.org/stable/c/a0fbbd36c156b9f7b2276871d499c9943dfe5101
https://git.kernel.org/stable/c/dc1ff95602ee908fcd7d8acee7a0dadb61b1a0c0
Common Vulnerability Exposure (CVE) ID: CVE-2024-39484
CopyrightCopyright (C) 2024 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.