Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.12.2024.7148.1
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-7148-1)
Summary:The remote host is missing an update for the 'linux, linux-aws, linux-kvm, linux-lts-xenial' package(s) announced via the USN-7148-1 advisory.
Description:Summary:
The remote host is missing an update for the 'linux, linux-aws, linux-kvm, linux-lts-xenial' package(s) announced via the USN-7148-1 advisory.

Vulnerability Insight:
Lyu Tao discovered that the NFS implementation in the Linux kernel did not
properly handle requests to open a directory on a regular file. A local
attacker could use this to expose sensitive information (kernel memory).


Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- x86 architecture,
- ATM drivers,
- Device frequency scaling framework,
- GPU drivers,
- Hardware monitoring drivers,
- VMware VMCI Driver,
- MTD block device drivers,
- Network drivers,
- Device tree and open firmware driver,
- SCSI subsystem,
- USB Serial drivers,
- BTRFS file system,
- File systems infrastructure,
- F2FS file system,
- JFS file system,
- NILFS2 file system,
- Netfilter,
- Memory management,
- Ethernet bridge,
- IPv6 networking,
- Logical Link layer,
- MAC80211 subsystem,
- NFC subsystem,
- Network traffic control,
(CVE-2021-47055, CVE-2024-26675, CVE-2024-42244, CVE-2024-46743,
CVE-2024-41095, CVE-2024-46756, CVE-2024-46723, CVE-2024-46759,
CVE-2024-35877, CVE-2024-38538, CVE-2024-26668, CVE-2024-44998,
CVE-2024-42309, CVE-2024-46758, CVE-2024-46800, CVE-2022-48733,
CVE-2023-52531, CVE-2023-52599, CVE-2024-46722, CVE-2024-42240,
CVE-2024-44987, CVE-2023-52502, CVE-2023-52578, CVE-2024-41059,
CVE-2024-41071, CVE-2024-44942, CVE-2024-46738, CVE-2022-48943,
CVE-2023-52614, CVE-2024-27397, CVE-2024-38560, CVE-2024-43882,
CVE-2024-42104, CVE-2024-46757, CVE-2024-26636, CVE-2024-26633,
CVE-2024-41089, CVE-2024-42310, CVE-2022-48938)

Affected Software/OS:
'linux, linux-aws, linux-kvm, linux-lts-xenial' package(s) on Ubuntu 14.04, Ubuntu 16.04.

Solution:
Please install the updated package(s).

CVSS Score:
1.9

CVSS Vector:
AV:L/AC:M/Au:N/C:P/I:N/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2021-47055
https://git.kernel.org/stable/c/077259f5e777c3c8821f6b41dee709fcda27306b
https://git.kernel.org/stable/c/1e97743fd180981bef5f01402342bb54bf1c6366
https://git.kernel.org/stable/c/5880afefe0cb9b2d5e801816acd58bfe91a96981
https://git.kernel.org/stable/c/75ed985bd6c8ac1d4e673e93ea9d96c9908c1d37
https://git.kernel.org/stable/c/7b6552719c0ccbbea29dde4be141da54fdb5877e
https://git.kernel.org/stable/c/9625b00cac6630479c0ff4b9fafa88bee636e1f0
https://git.kernel.org/stable/c/a08799d3e8c8088640956237c183f83463c39668
https://git.kernel.org/stable/c/f4d28d8b9b0e7c4ae04214b8d7e0b0466ec6bcaf
https://git.kernel.org/stable/c/f73b29819c6314c0ba8b7d5892dfb03487424bee
Common Vulnerability Exposure (CVE) ID: CVE-2022-24448
Debian Security Information: DSA-5092 (Google Search)
https://www.debian.org/security/2022/dsa-5092
Debian Security Information: DSA-5096 (Google Search)
https://www.debian.org/security/2022/dsa-5096
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.5
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ac795161c93699d600db16c1a8cc23a65a1eceaf
https://github.com/torvalds/linux/commit/ab0fc21bc7105b54bafd85bd8b82742f9e68898a
https://github.com/torvalds/linux/commit/ac795161c93699d600db16c1a8cc23a65a1eceaf
https://lore.kernel.org/all/67d6a536-9027-1928-99b6-af512a36cd1a@huawei.com/T/
https://www.spinics.net/lists/stable/msg531976.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
Common Vulnerability Exposure (CVE) ID: CVE-2022-48733
https://git.kernel.org/stable/c/28b21c558a3753171097193b6f6602a94169093a
https://git.kernel.org/stable/c/9372fa1d73da5f1673921e365d0cd2c27ec7adc2
https://git.kernel.org/stable/c/a7b717fa15165d3d9245614680bebc48a52ac05d
Common Vulnerability Exposure (CVE) ID: CVE-2022-48938
Common Vulnerability Exposure (CVE) ID: CVE-2022-48943
Common Vulnerability Exposure (CVE) ID: CVE-2023-52502
https://git.kernel.org/stable/c/31c07dffafce914c1d1543c135382a11ff058d93
https://git.kernel.org/stable/c/6ac22ecdaad2ecc662048f8c6b0ceb1ca0699ef9
https://git.kernel.org/stable/c/7adcf014bda16cdbf804af5c164d94d5d025db2d
https://git.kernel.org/stable/c/d1af8a39cf839d93c8967fdd858f6bbdc3e4a15c
https://git.kernel.org/stable/c/d888d3f70b0de32b4f51534175f039ddab15eef8
https://git.kernel.org/stable/c/e4f2611f07c87b3ddb57c4b9e8efcd1e330fc3dc
https://git.kernel.org/stable/c/e863f5720a5680e50c4cecf12424d7cc31b3eb0a
Common Vulnerability Exposure (CVE) ID: CVE-2023-52531
https://git.kernel.org/stable/c/6b3223449c959a8be94a1f042288059e40fcccb0
https://git.kernel.org/stable/c/7c8faa31080342aec4903c9acb20caf82fcca1ef
https://git.kernel.org/stable/c/8ba438ef3cacc4808a63ed0ce24d4f0942cfe55d
https://git.kernel.org/stable/c/f06cdd8d4ba5252986f51f80cc30263636397128
Common Vulnerability Exposure (CVE) ID: CVE-2023-52578
https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd
https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4
https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2
https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394
https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5
https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839
https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa
Common Vulnerability Exposure (CVE) ID: CVE-2023-52599
https://git.kernel.org/stable/c/3537f92cd22c672db97fae6997481e678ad14641
https://git.kernel.org/stable/c/49f9637aafa6e63ba686c13cb8549bf5e6920402
https://git.kernel.org/stable/c/5a6660139195f5e2fbbda459eeecb8788f3885fe
https://git.kernel.org/stable/c/6996d43b14486f4a6655b10edc541ada1b580b4b
https://git.kernel.org/stable/c/6aa30020879042d46df9f747e4f0a486eea6fe98
https://git.kernel.org/stable/c/de6a91aed1e0b1a23e9c11e7d7557f088eeeb017
https://git.kernel.org/stable/c/e2b77d107b33bb31c8b1f5c4cb8f277b23728f1e
https://git.kernel.org/stable/c/f423528488e4f9606cef858eceea210bf1163f41
Common Vulnerability Exposure (CVE) ID: CVE-2023-52614
https://git.kernel.org/stable/c/087de000e4f8c878c81d9dd3725f00a1d292980c
https://git.kernel.org/stable/c/08e23d05fa6dc4fc13da0ccf09defdd4bbc92ff4
https://git.kernel.org/stable/c/796d3fad8c35ee9df9027899fb90ceaeb41b958f
https://git.kernel.org/stable/c/8a7729cda2dd276d7a3994638038fb89035b6f2c
https://git.kernel.org/stable/c/a979f56aa4b93579cf0e4265ae04d7e9300fd3e8
https://git.kernel.org/stable/c/eaef4650fa2050147ca25fd7ee43bc0082e03c87
Common Vulnerability Exposure (CVE) ID: CVE-2024-26633
https://git.kernel.org/stable/c/135414f300c5db995e2a2f3bf0f455de9d014aee
https://git.kernel.org/stable/c/3f15ba3dc14e6ee002ea01b4faddc3d49200377c
https://git.kernel.org/stable/c/4329426cf6b8e22b798db2331c7ef1dd2a9c748d
https://git.kernel.org/stable/c/62a1fedeb14c7ac0947ef33fadbabd35ed2400a2
https://git.kernel.org/stable/c/687c5d52fe53e602e76826dbd4d7af412747e183
https://git.kernel.org/stable/c/ba8d904c274268b18ef3dc11d3ca7b24a96cb087
https://git.kernel.org/stable/c/d375b98e0248980681e5e56b712026174d617198
https://git.kernel.org/stable/c/da23bd709b46168f7dfc36055801011222b076cd
Common Vulnerability Exposure (CVE) ID: CVE-2024-26636
https://git.kernel.org/stable/c/04f2a74b562f3a7498be0399309669f342793d8c
https://git.kernel.org/stable/c/6d53b813ff8b177f86f149c2f744442681f720e4
https://git.kernel.org/stable/c/84e9d10419f6f4f3f3cd8f9aaf44a48719aa4b1b
https://git.kernel.org/stable/c/b643d0defcbacd7fe548bc65c3e4e6f17dc5eb2d
https://git.kernel.org/stable/c/c22044270da68881074fda81a7d34812726cb249
https://git.kernel.org/stable/c/c451c008f563d56d5e676c9dcafae565fcad84bb
https://git.kernel.org/stable/c/cafd3ad3fe03ef4d6632747be9ee15dc0029db4b
https://git.kernel.org/stable/c/dad555c816a50c6a6a8a86be1f9177673918c647
Common Vulnerability Exposure (CVE) ID: CVE-2024-26668
https://git.kernel.org/stable/c/00c2c29aa36d1d1827c51a3720e9f893a22c7c6a
https://git.kernel.org/stable/c/79d4efd75e7dbecd855a3b8a63e65f7265f466e1
https://git.kernel.org/stable/c/9882495d02ecc490604f747437a40626dc9160d0
https://git.kernel.org/stable/c/bc6e242bb74e2ae616bfd2b250682b738e781c9b
https://git.kernel.org/stable/c/c9d9eb9c53d37cdebbad56b91e40baf42d5a97aa
Common Vulnerability Exposure (CVE) ID: CVE-2024-26675
https://git.kernel.org/stable/c/210d938f963dddc543b07e66a79b7d8d4bd00bd8
https://git.kernel.org/stable/c/4e2c4846b2507f6dfc9bea72b7567c2693a82a16
https://git.kernel.org/stable/c/4fdb14ba89faff6e6969a4dffdc8e54235d6e5ed
https://git.kernel.org/stable/c/56fae81633ccee307cfcb032f706bf1863a56982
https://git.kernel.org/stable/c/58fbe665b097bf7b3144da7e7b91fb27aa8d0ae3
https://git.kernel.org/stable/c/7e5ef49670766c9742ffcd9cead7cdb018268719
https://git.kernel.org/stable/c/b06e067e93fa4b98acfd3a9f38a398ab91bbc58b
https://git.kernel.org/stable/c/cb88cb53badb8aeb3955ad6ce80b07b598e310b8
Common Vulnerability Exposure (CVE) ID: CVE-2024-27397
https://git.kernel.org/stable/c/383182db8d58c4237772ba0764cded4938a235c3
https://git.kernel.org/stable/c/7395dfacfff65e9938ac0889dafa1ab01e987d15
Common Vulnerability Exposure (CVE) ID: CVE-2024-35877
https://git.kernel.org/stable/c/04c35ab3bdae7fefbd7c7a7355f29fa03a035221
https://git.kernel.org/stable/c/09e6bb53217bf388a0d2fd7fb21e74ab9dffc173
https://git.kernel.org/stable/c/1341e4b32e1fb1b0acd002ccd56f07bd32f2abc6
https://git.kernel.org/stable/c/51b7841f3fe84606ec0bd8da859d22e05e5419ec
https://git.kernel.org/stable/c/7cfee26d1950250b14c5cb0a37b142f3fcc6396a
https://git.kernel.org/stable/c/97e93367e82752e475a33839a80b33bdbef1209f
https://git.kernel.org/stable/c/c2b2430b48f3c9eaccd2c3d2ad75bb540d4952f4
https://git.kernel.org/stable/c/f18681daaec9665a15c5e7e0f591aad5d0ac622b
Common Vulnerability Exposure (CVE) ID: CVE-2024-38538
https://git.kernel.org/stable/c/1abb371147905ba250b4cc0230c4be7e90bea4d5
https://git.kernel.org/stable/c/28126b83f86ab9cc7936029c2dff845d3dcedba2
https://git.kernel.org/stable/c/5b5d669f569807c7ab07546e73c0741845a2547a
https://git.kernel.org/stable/c/8bd67ebb50c0145fd2ca8681ab65eb7e8cde1afc
https://git.kernel.org/stable/c/f482fd4ce919836a49012b2d31b00fc36e2488f2
Common Vulnerability Exposure (CVE) ID: CVE-2024-38560
https://git.kernel.org/stable/c/00b425ff0891283207d7bad607a2412225274d7a
https://git.kernel.org/stable/c/13d0cecb4626fae67c00c84d3c7851f6b62f7df3
https://git.kernel.org/stable/c/1708e3cf2488788cba5489e4f913d227de757baf
https://git.kernel.org/stable/c/204714e68015d6946279719fd464ecaf57240f35
https://git.kernel.org/stable/c/481fc0c8617304a67649027c4a44723a139a0462
https://git.kernel.org/stable/c/595a6b98deec01b6dbb20139f71edcd5fb760ec2
https://git.kernel.org/stable/c/7510fab46b1cbd1680e2a096e779aec3334b4143
https://git.kernel.org/stable/c/7d3e694c4fe30f3aba9cd5ae86fb947a54c3db5c
https://git.kernel.org/stable/c/ecb76200f5557a2886888aaa53702da1ab9e6cdf
Common Vulnerability Exposure (CVE) ID: CVE-2024-41059
Common Vulnerability Exposure (CVE) ID: CVE-2024-41071
Common Vulnerability Exposure (CVE) ID: CVE-2024-41089
Common Vulnerability Exposure (CVE) ID: CVE-2024-41095
Common Vulnerability Exposure (CVE) ID: CVE-2024-42104
Common Vulnerability Exposure (CVE) ID: CVE-2024-42240
Common Vulnerability Exposure (CVE) ID: CVE-2024-42244
Common Vulnerability Exposure (CVE) ID: CVE-2024-42309
Common Vulnerability Exposure (CVE) ID: CVE-2024-42310
Common Vulnerability Exposure (CVE) ID: CVE-2024-43882
Common Vulnerability Exposure (CVE) ID: CVE-2024-44942
Common Vulnerability Exposure (CVE) ID: CVE-2024-44987
Common Vulnerability Exposure (CVE) ID: CVE-2024-44998
Common Vulnerability Exposure (CVE) ID: CVE-2024-46722
Common Vulnerability Exposure (CVE) ID: CVE-2024-46723
Common Vulnerability Exposure (CVE) ID: CVE-2024-46738
Common Vulnerability Exposure (CVE) ID: CVE-2024-46743
Common Vulnerability Exposure (CVE) ID: CVE-2024-46756
Common Vulnerability Exposure (CVE) ID: CVE-2024-46757
Common Vulnerability Exposure (CVE) ID: CVE-2024-46758
Common Vulnerability Exposure (CVE) ID: CVE-2024-46759
Common Vulnerability Exposure (CVE) ID: CVE-2024-46800
CopyrightCopyright (C) 2024 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.