Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.12.2024.7110.1
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-7110-1)
Summary:The remote host is missing an update for the 'linux, linux-aws, linux-kvm, linux-lts-xenial' package(s) announced via the USN-7110-1 advisory.
Description:Summary:
The remote host is missing an update for the 'linux, linux-aws, linux-kvm, linux-lts-xenial' package(s) announced via the USN-7110-1 advisory.

Vulnerability Insight:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Cryptographic API,
- HW tracing,
- ISDN/mISDN subsystem,
- Media drivers,
- Network drivers,
- SCSI drivers,
- USB DSL drivers,
- VFIO drivers,
- Watchdog drivers,
- JFS file system,
- Amateur Radio drivers,
- IPv4 networking,
- IUCV driver,
- TIPC protocol,
- Integrity Measurement Architecture(IMA) framework,
- SoC Audio for Freescale CPUs drivers,
- USB sound devices,
(CVE-2024-42229, CVE-2024-27436, CVE-2024-42271, CVE-2024-46673,
CVE-2024-42284, CVE-2024-26810, CVE-2024-38602, CVE-2024-42280,
CVE-2024-43858, CVE-2024-42089, CVE-2024-44940, CVE-2024-42223,
CVE-2024-39487, CVE-2024-41097, CVE-2024-26812, CVE-2024-38627,
CVE-2024-38630, CVE-2023-52528, CVE-2024-39494, CVE-2024-38621)

Affected Software/OS:
'linux, linux-aws, linux-kvm, linux-lts-xenial' package(s) on Ubuntu 14.04, Ubuntu 16.04.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:L/AC:L/Au:S/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2023-52528
https://git.kernel.org/stable/c/2a36d9e2995c8c3c3f179aab1215a69cff06cbed
https://git.kernel.org/stable/c/30bc4d7aebe33904b0f2d3aad4b4a9c6029ad0c5
https://git.kernel.org/stable/c/310f1c92f65ad905b7e81fe14de82d979ebbd825
https://git.kernel.org/stable/c/3e0af6eec1789fd11934164a7f4dbcad979855a4
https://git.kernel.org/stable/c/4931e80da9463b03bfe42be54a9a19f213b0f76d
https://git.kernel.org/stable/c/9ffc5018020fe646795a8dc1203224b8f776dc09
https://git.kernel.org/stable/c/cda10784a176d7192f08ecb518f777a4e9575812
https://git.kernel.org/stable/c/e9c65989920f7c28775ec4e0c11b483910fb67b8
Common Vulnerability Exposure (CVE) ID: CVE-2024-26810
https://git.kernel.org/stable/c/03505e3344b0576fd619416793a31eae9c5b73bf
https://git.kernel.org/stable/c/04a4a017b9ffd7b0f427b8c376688d14cb614651
https://git.kernel.org/stable/c/1e71b6449d55179170efc8dee8664510bb813b42
https://git.kernel.org/stable/c/3dd9be6cb55e0f47544e7cdda486413f7134e3b3
https://git.kernel.org/stable/c/3fe0ac10bd117df847c93408a9d428a453cd60e5
https://git.kernel.org/stable/c/6fe478d855b20ac1eb5da724afe16af5a2aaaa40
https://git.kernel.org/stable/c/810cd4bb53456d0503cc4e7934e063835152c1b7
https://git.kernel.org/stable/c/ec73e079729258a05452356cf6d098bf1504d5a6
Common Vulnerability Exposure (CVE) ID: CVE-2024-26812
https://git.kernel.org/stable/c/0e09cf81959d9f12b75ad5c6dd53d237432ed034
https://git.kernel.org/stable/c/18c198c96a815c962adc2b9b77909eec0be7df4d
https://git.kernel.org/stable/c/27d40bf72dd9a6600b76ad05859176ea9a1b4897
https://git.kernel.org/stable/c/4c089cefe30924fbe20dd1ee92774ea1f5eca834
https://git.kernel.org/stable/c/4cb0d7532126d23145329826c38054b4e9a05e7c
https://git.kernel.org/stable/c/69276a555c740acfbff13fb5769ee9c92e1c828e
https://git.kernel.org/stable/c/7d29d4c72c1e196cce6969c98072a272d1a703b3
https://git.kernel.org/stable/c/b18fa894d615c8527e15d96b76c7448800e13899
Common Vulnerability Exposure (CVE) ID: CVE-2024-27436
https://git.kernel.org/stable/c/22cad1b841a63635a38273b799b4791f202ade72
https://git.kernel.org/stable/c/5cd466673b34bac369334f66cbe14bb77b7d7827
https://git.kernel.org/stable/c/629af0d5fe94a35f498ba2c3f19bd78bfa591be6
https://git.kernel.org/stable/c/6d5dc96b154be371df0d62ecb07efe400701ed8a
https://git.kernel.org/stable/c/6d88b289fb0a8d055cb79d1c46a56aba7809d96d
https://git.kernel.org/stable/c/7e2c1b0f6dd9abde9e60f0f9730026714468770f
https://git.kernel.org/stable/c/9af1658ba293458ca6a13f70637b9654fa4be064
https://git.kernel.org/stable/c/a39d51ff1f52cd0b6fe7d379ac93bd8b4237d1b7
https://git.kernel.org/stable/c/c8a24fd281dcdf3c926413dafbafcf35cde517a9
Common Vulnerability Exposure (CVE) ID: CVE-2024-38602
https://git.kernel.org/stable/c/1ea02699c7557eeb35ccff2bd822de1b3e09d868
https://git.kernel.org/stable/c/38eb01edfdaa1562fa00429be2e33f45383b1b3a
https://git.kernel.org/stable/c/81d8240b0a243b3ddd8fa8aa172f1acc2f7cc8f3
https://git.kernel.org/stable/c/ae467750a3765dd1092eb29f58247950a2f9b60c
https://git.kernel.org/stable/c/b505e0319852b08a3a716b64620168eab21f4ced
Common Vulnerability Exposure (CVE) ID: CVE-2024-38621
https://git.kernel.org/stable/c/7532bcec0797adfa08791301c3bcae14141db3bd
https://git.kernel.org/stable/c/a08492832cc4cacc24e0612f483c86ca899b9261
https://git.kernel.org/stable/c/a16775828aaed1c54ff4e6fe83e8e4d5c6a50cb7
https://git.kernel.org/stable/c/b504518a397059e1d55c521ba0ea2b545a6c4b52
https://git.kernel.org/stable/c/d410017a7181cb55e4a5c810b32b75e4416c6808
https://git.kernel.org/stable/c/ecf4ddc3aee8ade504c4d36b7b4053ce6093e200
https://git.kernel.org/stable/c/f6a392266276730bea893b55d12940e32a25f56a
https://git.kernel.org/stable/c/faa4364bef2ec0060de381ff028d1d836600a381
Common Vulnerability Exposure (CVE) ID: CVE-2024-38627
https://git.kernel.org/stable/c/370c480410f60b90ba3e96abe73ead21ec827b20
https://git.kernel.org/stable/c/3df463865ba42b8f88a590326f4c9ea17a1ce459
https://git.kernel.org/stable/c/4bfd48bb6e62512b9c392c5002c11e1e3b18d247
https://git.kernel.org/stable/c/6cc30ef8eb6d8f8d6df43152264bbf8835d99931
https://git.kernel.org/stable/c/713fc00c571dde4af3db2dbd5d1b0eadc327817b
https://git.kernel.org/stable/c/7419df1acffbcc90037f6b5a2823e81389659b36
https://git.kernel.org/stable/c/a0450d3f38e7c6c0a7c0afd4182976ee15573695
https://git.kernel.org/stable/c/d782a2db8f7ac49c33b9ca3e835500a28667d1be
Common Vulnerability Exposure (CVE) ID: CVE-2024-38630
https://git.kernel.org/stable/c/573601521277119f2e2ba5f28ae6e87fc594f4d4
https://git.kernel.org/stable/c/9b1c063ffc075abf56f63e55d70b9778ff534314
https://git.kernel.org/stable/c/f19686d616500cd0d47b30cee82392b53f7f784a
Common Vulnerability Exposure (CVE) ID: CVE-2024-39487
Common Vulnerability Exposure (CVE) ID: CVE-2024-39494
Common Vulnerability Exposure (CVE) ID: CVE-2024-41097
Common Vulnerability Exposure (CVE) ID: CVE-2024-42089
Common Vulnerability Exposure (CVE) ID: CVE-2024-42223
Common Vulnerability Exposure (CVE) ID: CVE-2024-42229
Common Vulnerability Exposure (CVE) ID: CVE-2024-42271
Common Vulnerability Exposure (CVE) ID: CVE-2024-42280
Common Vulnerability Exposure (CVE) ID: CVE-2024-42284
Common Vulnerability Exposure (CVE) ID: CVE-2024-43858
Common Vulnerability Exposure (CVE) ID: CVE-2024-44940
Common Vulnerability Exposure (CVE) ID: CVE-2024-46673
CopyrightCopyright (C) 2024 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.