Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.12.2024.7173.2
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-7173-2)
Summary:The remote host is missing an update for the 'linux-aws, linux-aws-5.4, linux-bluefield, linux-ibm, linux-ibm-5.4, linux-oracle, linux-oracle-5.4, linux-xilinx-zynqmp' package(s) announced via the USN-7173-2 advisory.
Description:Summary:
The remote host is missing an update for the 'linux-aws, linux-aws-5.4, linux-bluefield, linux-ibm, linux-ibm-5.4, linux-oracle, linux-oracle-5.4, linux-xilinx-zynqmp' package(s) announced via the USN-7173-2 advisory.

Vulnerability Insight:
Ziming Zhang discovered that the DRM driver for VMware Virtual GPU did not
properly handle certain error conditions, leading to a NULL pointer
dereference. A local attacker could possibly trigger this vulnerability to
cause a denial of service. (CVE-2022-38096)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- GPU drivers,
- Network drivers,
- SCSI subsystem,
- Ext4 file system,
- Bluetooth subsystem,
- Memory management,
- Amateur Radio drivers,
- Network traffic control,
- Sun RPC protocol,
- VMware vSockets driver,
(CVE-2023-52821, CVE-2024-40910, CVE-2024-43892, CVE-2024-49967,
CVE-2024-50264, CVE-2024-36952, CVE-2024-38553, CVE-2021-47101,
CVE-2021-47001, CVE-2024-35965, CVE-2024-35963, CVE-2024-35966,
CVE-2024-35967, CVE-2024-53057, CVE-2024-38597)

Affected Software/OS:
'linux-aws, linux-aws-5.4, linux-bluefield, linux-ibm, linux-ibm-5.4, linux-oracle, linux-oracle-5.4, linux-xilinx-zynqmp' package(s) on Ubuntu 18.04, Ubuntu 20.04.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:L/AC:L/Au:S/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2021-47001
https://git.kernel.org/stable/c/19b5fa9489b5706bc878c3a522a7f771079e2fa0
https://git.kernel.org/stable/c/35d8b10a25884050bb3b0149b62c3818ec59f77c
https://git.kernel.org/stable/c/8834ecb5df22b7ff3c9b0deba7726579bb613f95
https://git.kernel.org/stable/c/eddae8be7944096419c2ae29477a45f767d0fcd4
Common Vulnerability Exposure (CVE) ID: CVE-2021-47101
https://git.kernel.org/stable/c/8035b1a2a37a29d8c717ef84fca8fe7278bc9f03
https://git.kernel.org/stable/c/d259f621c85949f30cc578cac813b82bb5169f56
Common Vulnerability Exposure (CVE) ID: CVE-2022-38096
https://bugzilla.openanolis.cn/show_bug.cgi?id=2073
Common Vulnerability Exposure (CVE) ID: CVE-2023-52821
https://git.kernel.org/stable/c/2381f6b628b3214f07375e0adf5ce17093c31190
https://git.kernel.org/stable/c/4fa930ba046d20fc1899770396ee11e905fa96e4
https://git.kernel.org/stable/c/79813cd59398015867d51e6d7dcc14d287d4c402
https://git.kernel.org/stable/c/8a9dd36fcb4f3906982b82593393578db4479992
https://git.kernel.org/stable/c/924e5814d1f84e6fa5cb19c6eceb69f066225229
https://git.kernel.org/stable/c/c7dc0aca5962fb37dbea9769dd26ec37813faae1
Common Vulnerability Exposure (CVE) ID: CVE-2024-35963
https://git.kernel.org/stable/c/50173882bb187e70e37bac01385b9b114019bee2
https://git.kernel.org/stable/c/b2186061d6043d6345a97100460363e990af0d46
Common Vulnerability Exposure (CVE) ID: CVE-2024-35965
https://git.kernel.org/stable/c/4f3951242ace5efc7131932e2e01e6ac6baed846
https://git.kernel.org/stable/c/8ee0c132a61df9723813c40e742dc5321824daa9
https://git.kernel.org/stable/c/9d42f373391211c7c8af66a3a316533a32b8a607
Common Vulnerability Exposure (CVE) ID: CVE-2024-35966
https://git.kernel.org/stable/c/a97de7bff13b1cc825c1b1344eaed8d6c2d3e695
https://git.kernel.org/stable/c/c3f787a3eafe519c93df9abbb0ca5145861c8d0f
Common Vulnerability Exposure (CVE) ID: CVE-2024-35967
https://git.kernel.org/stable/c/419a0ffca7010216f0fc265b08558d7394fa0ba7
https://git.kernel.org/stable/c/51eda36d33e43201e7a4fd35232e069b2c850b01
https://git.kernel.org/stable/c/72473db90900da970a16ee50ad23c2c38d107d8c
https://git.kernel.org/stable/c/7bc65d23ba20dcd7ecc094a12c181e594e5eb315
https://git.kernel.org/stable/c/b0e30c37695b614bee69187f86eaf250e36606ce
Common Vulnerability Exposure (CVE) ID: CVE-2024-36952
https://git.kernel.org/stable/c/0936809d968ecf81e0726fbd02ff2a5732d960c3
https://git.kernel.org/stable/c/4ddf01f2f1504fa08b766e8cfeec558e9f8eef6c
https://git.kernel.org/stable/c/718602cd15f4c5710850090ea3066a89eeb46278
https://git.kernel.org/stable/c/76337eb8daee32bcc67742efab3168ed4ca299d0
https://git.kernel.org/stable/c/f2c7f029051edc4b394bb48edbe2297575abefe0
Common Vulnerability Exposure (CVE) ID: CVE-2024-38553
https://git.kernel.org/stable/c/87bcbc9b7e0b43a69d44efa5f32f11e32d08fa6f
https://git.kernel.org/stable/c/accdd6b912c4219b8e056d1f1ad2e85bc66ee243
https://git.kernel.org/stable/c/c2e0c58b25a0a0c37ec643255558c5af4450c9f5
https://git.kernel.org/stable/c/d38625f71950e79e254515c5fc585552dad4b33e
Common Vulnerability Exposure (CVE) ID: CVE-2024-38597
https://git.kernel.org/stable/c/476adb3bbbd7886e8251d3b9ce2d3c3e680f35d6
https://git.kernel.org/stable/c/5de5aeb98f9a000adb0db184e32765e4815d860b
https://git.kernel.org/stable/c/6400d205fbbcbcf9b8510157e1f379c1d7e2e937
https://git.kernel.org/stable/c/ac0a230f719b02432d8c7eba7615ebd691da86f4
https://git.kernel.org/stable/c/e22b23f5888a065d084e87db1eec639c445e677f
https://git.kernel.org/stable/c/faf94f1eb8a34b2c31b2042051ef36f63420ecce
https://git.kernel.org/stable/c/fbeeb55dbb33d562149c57e794f06b7414e44289
Common Vulnerability Exposure (CVE) ID: CVE-2024-40910
Common Vulnerability Exposure (CVE) ID: CVE-2024-43892
Common Vulnerability Exposure (CVE) ID: CVE-2024-49967
Common Vulnerability Exposure (CVE) ID: CVE-2024-50264
Common Vulnerability Exposure (CVE) ID: CVE-2024-53057
CopyrightCopyright (C) 2024 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.