Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.12.2024.7028.1
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-7028-1)
Summary:The remote host is missing an update for the 'linux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15, linux-gcp, linux-gcp-4.15, linux-hwe, linux-kvm, linux-oracle' package(s) announced via the USN-7028-1 advisory.
Description:Summary:
The remote host is missing an update for the 'linux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15, linux-gcp, linux-gcp-4.15, linux-hwe, linux-kvm, linux-oracle' package(s) announced via the USN-7028-1 advisory.

Vulnerability Insight:
It was discovered that the JFS file system contained an out-of-bounds read
vulnerability when printing xattr debug information. A local attacker could
use this to cause a denial of service (system crash).

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- GPU drivers,
- Greybus drivers,
- Modular ISDN driver,
- Multiple devices driver,
- Network drivers,
- SCSI drivers,
- VFIO drivers,
- F2FS file system,
- GFS2 file system,
- JFS file system,
- NILFS2 file system,
- Kernel debugger infrastructure,
- Bluetooth subsystem,
- IPv4 networking,
- L2TP protocol,
- Netfilter,
- RxRPC session sockets,
(CVE-2024-42154, CVE-2023-52527, CVE-2024-26733, CVE-2024-42160,
CVE-2021-47188, CVE-2024-38570, CVE-2024-26851, CVE-2024-26984,
CVE-2024-26677, CVE-2024-39480, CVE-2024-27398, CVE-2022-48791,
CVE-2024-42224, CVE-2024-38583, CVE-2024-40902, CVE-2023-52809,
CVE-2024-39495, CVE-2024-26651, CVE-2024-26880, CVE-2024-42228,
CVE-2024-27437, CVE-2022-48863)

Affected Software/OS:
'linux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15, linux-gcp, linux-gcp-4.15, linux-hwe, linux-kvm, linux-oracle' package(s) on Ubuntu 16.04, Ubuntu 18.04.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:L/AC:L/Au:S/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2021-47188
https://git.kernel.org/stable/c/3ff1f6b6ba6f97f50862aa50e79959cc8ddc2566
https://git.kernel.org/stable/c/c36baca06efa833adaefba61f45fefdc49b6d070
Common Vulnerability Exposure (CVE) ID: CVE-2022-48791
Common Vulnerability Exposure (CVE) ID: CVE-2022-48863
Common Vulnerability Exposure (CVE) ID: CVE-2023-52527
https://git.kernel.org/stable/c/1fc793d68d50dee4782ef2e808913d5dd880bcc6
https://git.kernel.org/stable/c/559d697c5d072593d22b3e0bd8b8081108aeaf59
https://git.kernel.org/stable/c/7626b9fed53092aa2147978070e610ecb61af844
https://git.kernel.org/stable/c/96b2e1090397217839fcd6c9b6d8f5d439e705ed
https://git.kernel.org/stable/c/9d4c75800f61e5d75c1659ba201b6c0c7ead3070
https://git.kernel.org/stable/c/cd1189956393bf850b2e275e37411855d3bd86bb
https://git.kernel.org/stable/c/f6a7182179c0ed788e3755ee2ed18c888ddcc33f
https://git.kernel.org/stable/c/fe80658c08e3001c80c5533cd41abfbb0e0e28fd
Common Vulnerability Exposure (CVE) ID: CVE-2023-52809
https://git.kernel.org/stable/c/442fd24d7b6b29e4a9cd9225afba4142d5f522ba
https://git.kernel.org/stable/c/4df105f0ce9f6f30cda4e99f577150d23f0c9c5f
https://git.kernel.org/stable/c/56d78b5495ebecbb9395101f3be177cd0a52450b
https://git.kernel.org/stable/c/6b9ecf4e1032e645873933e5b43cbb84cac19106
https://git.kernel.org/stable/c/77072ec41d6ab3718c3fc639bc149b8037caedfa
https://git.kernel.org/stable/c/930f0aaba4820d6362de4e6ed569eaf444f1ea4e
https://git.kernel.org/stable/c/b549acf999824d4f751ca57965700372f2f3ad00
https://git.kernel.org/stable/c/bb83f79f90e92f46466adcfd4fd264a7ae0f0f01
https://git.kernel.org/stable/c/f6fe7261b92b21109678747f36df9fdab1e30c34
Common Vulnerability Exposure (CVE) ID: CVE-2024-26651
https://git.kernel.org/stable/c/07161b2416f740a2cb87faa5566873f401440a61
https://git.kernel.org/stable/c/276873ae26c8d75b00747c1dadb9561d6ef20581
https://git.kernel.org/stable/c/424eba06ed405d557077339edb19ce0ebe39e7c7
https://git.kernel.org/stable/c/6b4a39acafaf0186ed8e97c16e0aa6fca0e52009
https://git.kernel.org/stable/c/8a8b6a24684bc278036c3f159f7b3a31ad89546a
https://git.kernel.org/stable/c/9c402819620a842cbfe39359a3ddfaac9adc8384
https://git.kernel.org/stable/c/e39a3a14eafcf17f03c037290b78c8f483529028
https://git.kernel.org/stable/c/efba65777f98457773c5b65e3135c6132d3b015f
https://git.kernel.org/stable/c/f546cc19f9b82975238d0ba413adc27714750774
Common Vulnerability Exposure (CVE) ID: CVE-2024-26677
https://git.kernel.org/stable/c/200cb50b9e154434470c8969d32474d38475acc2
https://git.kernel.org/stable/c/63719f490e6a89896e9a463d2b45e8203eab23ae
https://git.kernel.org/stable/c/e7870cf13d20f56bfc19f9c3e89707c69cf104ef
Common Vulnerability Exposure (CVE) ID: CVE-2024-26733
https://git.kernel.org/stable/c/3ab0d6f8289ba8402ca95a9fc61a34909d5e1f3a
https://git.kernel.org/stable/c/97eaa2955db4120ce6ec2ef123e860bc32232c50
https://git.kernel.org/stable/c/a3f2c083cb575d80a7627baf3339e78fedccbb91
https://git.kernel.org/stable/c/a7d6027790acea24446ddd6632d394096c0f4667
https://git.kernel.org/stable/c/dbc9b22d0ed319b4e29034ce0a3fe32a3ee2c587
https://git.kernel.org/stable/c/f119f2325ba70cbfdec701000dcad4d88805d5b0
Common Vulnerability Exposure (CVE) ID: CVE-2024-26851
https://git.kernel.org/stable/c/014a807f1cc9c9d5173c1cd935835553b00d211c
https://git.kernel.org/stable/c/39001e3c42000e7c2038717af0d33c32319ad591
https://git.kernel.org/stable/c/4bafcc43baf7bcf93566394dbd15726b5b456b7a
https://git.kernel.org/stable/c/767146637efc528b5e3d31297df115e85a2fd362
https://git.kernel.org/stable/c/80ee5054435a11c87c9a4f30f1ff750080c96416
https://git.kernel.org/stable/c/98db42191329c679f4ca52bec0b319689e1ad8cb
https://git.kernel.org/stable/c/b3c0f553820516ad4b62a9390ecd28d6f73a7b13
https://git.kernel.org/stable/c/ccd1108b16ab572d9bf635586b0925635dbd6bbc
Common Vulnerability Exposure (CVE) ID: CVE-2024-26880
https://git.kernel.org/stable/c/03ad5ad53e51abf3a4c7538c1bc67a5982b41dc5
https://git.kernel.org/stable/c/15a3fc5c8774c17589dabfe1d642d40685c985af
https://git.kernel.org/stable/c/360a7d1be8112654f1fb328ed3862be630bca3f4
https://git.kernel.org/stable/c/65e8fbde64520001abf1c8d0e573561b4746ef38
https://git.kernel.org/stable/c/69836d9329f0b4c58faaf3d886a7748ddb5bf718
https://git.kernel.org/stable/c/ad10289f68f45649816cc68eb93f45fd5ec48a15
https://git.kernel.org/stable/c/da7ece2197101b1469853e6b5e915be1e3896d52
https://git.kernel.org/stable/c/ef02d8edf738557af2865c5bfb66a03c4e071be7
https://git.kernel.org/stable/c/f89bd27709376d37ff883067193320c58a8c1d5a
Common Vulnerability Exposure (CVE) ID: CVE-2024-26984
https://git.kernel.org/stable/c/13d76b2f443dc371842916dd8768009ff1594716
https://git.kernel.org/stable/c/1bc4825d4c3ec6abe43cf06c3c39d664d044cbf7
https://git.kernel.org/stable/c/21ca9539f09360fd83654f78f2c361f2f5ddcb52
https://git.kernel.org/stable/c/3ab056814cd8ab84744c9a19ef51360b2271c572
https://git.kernel.org/stable/c/a019b44b1bc6ed224c46fb5f88a8a10dd116e525
https://git.kernel.org/stable/c/ad74d208f213c06d860916ad40f609ade8c13039
https://git.kernel.org/stable/c/bba8ec5e9b16649d85bc9e9086bf7ae5b5716ff9
https://git.kernel.org/stable/c/fff1386cc889d8fb4089d285f883f8cba62d82ce
Common Vulnerability Exposure (CVE) ID: CVE-2024-27398
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DW2MIOIMOFUSNLHLRYX23AFR36BMKD65/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OTB4HWU2PTVW5NEYHHLOCXDKG3PYA534/
https://git.kernel.org/stable/c/012363cb1bec5f33a7b94629ab2c1086f30280f2
https://git.kernel.org/stable/c/1b33d55fb7355e27f8c82cd4ecd560f162469249
https://git.kernel.org/stable/c/3212afd00e3cda790fd0583cb3eaef8f9575a014
https://git.kernel.org/stable/c/33a6e92161a78c1073d90e27abe28d746feb0a53
https://git.kernel.org/stable/c/483bc08181827fc475643272ffb69c533007e546
https://git.kernel.org/stable/c/50c2037fc28df870ef29d9728c770c8955d32178
https://git.kernel.org/stable/c/6a18eeb1b3bbc67c20d9609c31dca6a69b4bcde5
https://git.kernel.org/stable/c/bfab2c1f7940a232cd519e82fff137e308abfd93
Common Vulnerability Exposure (CVE) ID: CVE-2024-27437
https://git.kernel.org/stable/c/139dfcc4d723ab13469881200c7d80f49d776060
https://git.kernel.org/stable/c/26389925d6c2126fb777821a0a983adca7ee6351
https://git.kernel.org/stable/c/2a4a666c45107206605b7b5bc20545f8aabc4fa2
https://git.kernel.org/stable/c/3b3491ad0f80d913e7d255941d4470f4a4d9bfda
https://git.kernel.org/stable/c/561d5e1998d58b54ce2bbbb3e843b669aa0b3db5
https://git.kernel.org/stable/c/b7a2f0955ffceffadfe098b40b50307431f45438
https://git.kernel.org/stable/c/bf0bc84a20e6109ab07d5dc072067bd01eb931ec
https://git.kernel.org/stable/c/fe9a7082684eb059b925c535682e68c34d487d43
Common Vulnerability Exposure (CVE) ID: CVE-2024-38570
https://git.kernel.org/stable/c/0636b34b44589b142700ac137b5f69802cfe2e37
https://git.kernel.org/stable/c/501cd8fabf621d10bd4893e37f6ce6c20523c8ca
https://git.kernel.org/stable/c/d98779e687726d8f8860f1c54b5687eec5f63a73
https://git.kernel.org/stable/c/e42e8a24d7f02d28763d16ca7ec5fc6d1f142af0
Common Vulnerability Exposure (CVE) ID: CVE-2024-38583
https://git.kernel.org/stable/c/2f12b2c03c5dae1a0de0a9e5853177e3d6eee3c6
https://git.kernel.org/stable/c/67fa90d4a2ccd9ebb0e1e168c7d0b5d0cf3c7148
https://git.kernel.org/stable/c/68e738be5c518fc3c4e9146b66f67c8fee0135fb
https://git.kernel.org/stable/c/822ae5a8eac30478578a75f7e064f0584931bf2d
https://git.kernel.org/stable/c/82933c84f188dcfe89eb26b0b48ab5d1ca99d164
https://git.kernel.org/stable/c/86a30d6302deddb9fb97ba6fc4b04d0e870b582a
https://git.kernel.org/stable/c/e65ccf3a4de4f0c763d94789615b83e11f204438
https://git.kernel.org/stable/c/f5d4e04634c9cf68bdf23de08ada0bb92e8befe7
https://git.kernel.org/stable/c/f9186bba4ea282b07293c1c892441df3a5441cb0
Common Vulnerability Exposure (CVE) ID: CVE-2024-39480
Common Vulnerability Exposure (CVE) ID: CVE-2024-39495
Common Vulnerability Exposure (CVE) ID: CVE-2024-40902
Common Vulnerability Exposure (CVE) ID: CVE-2024-42154
Common Vulnerability Exposure (CVE) ID: CVE-2024-42160
Common Vulnerability Exposure (CVE) ID: CVE-2024-42224
Common Vulnerability Exposure (CVE) ID: CVE-2024-42228
CopyrightCopyright (C) 2024 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.