Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.12.2025.7332.2
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-7332-2)
Summary:The remote host is missing an update for the 'linux-kvm' package(s) announced via the USN-7332-2 advisory.
Description:Summary:
The remote host is missing an update for the 'linux-kvm' package(s) announced via the USN-7332-2 advisory.

Vulnerability Insight:
Attila Szasz discovered that the HFS+ file system implementation in the
Linux Kernel contained a heap overflow vulnerability. An attacker could use
a specially crafted file system image that, when mounted, could cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2025-0927)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- PowerPC architecture,
- Block layer subsystem,
- GPIO subsystem,
- GPU drivers,
- Media drivers,
- Network drivers,
- SCSI subsystem,
- Direct Digital Synthesis drivers,
- TTY drivers,
- 9P distributed file system,
- JFS file system,
- NILFS2 file system,
- File systems infrastructure,
- BPF subsystem,
- Netfilter,
- Network sockets,
- Memory management,
- Amateur Radio drivers,
- B.A.T.M.A.N. meshing protocol,
- Bluetooth subsystem,
- Ethernet bridge,
- Networking core,
- IPv4 networking,
- IPv6 networking,
- Netlink,
- TIPC protocol,
- Wireless networking,
- ALSA framework,
(CVE-2024-26685, CVE-2024-50233, CVE-2024-41063, CVE-2024-42070,
CVE-2024-40910, CVE-2024-40911, CVE-2024-36886, CVE-2024-35896,
CVE-2024-43863, CVE-2023-52522, CVE-2024-53156, CVE-2023-52488,
CVE-2024-43854, CVE-2024-44938, CVE-2024-53104, CVE-2024-44931,
CVE-2024-50171, CVE-2024-43892, CVE-2024-50148, CVE-2024-38567,
CVE-2024-36964, CVE-2024-43893, CVE-2024-36952, CVE-2022-48994,
CVE-2021-47606, CVE-2023-52818, CVE-2024-41064, CVE-2024-40981,
CVE-2024-40943, CVE-2024-42068, CVE-2023-52880, CVE-2021-47103,
CVE-2024-43900, CVE-2024-50117, CVE-2023-52799, CVE-2024-49902)

Affected Software/OS:
'linux-kvm' package(s) on Ubuntu 16.04.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:L/AC:L/Au:S/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2021-47103
https://git.kernel.org/stable/c/0249a4b8a554f2eb6a27b62516fa50168584faa4
https://git.kernel.org/stable/c/68c34ce11ef23328692aa35fa6aaafdd75913100
https://git.kernel.org/stable/c/75a578000ae5e511e5d0e8433c94a14d9c99c412
https://git.kernel.org/stable/c/8f905c0e7354ef261360fb7535ea079b1082c105
https://git.kernel.org/stable/c/92e6e36ecd16808866ac6172b9491b5097cde449
https://git.kernel.org/stable/c/c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e
https://git.kernel.org/stable/c/f039b43cbaea5e0700980c2f0052da05a70782e0
Common Vulnerability Exposure (CVE) ID: CVE-2021-47606
https://git.kernel.org/stable/c/40cf2e058832d9cfaae98dfd77334926275598b6
https://git.kernel.org/stable/c/4c986072a8c9249b9398c7a18f216dc26a9f0e35
https://git.kernel.org/stable/c/54e785f7d5c197bc06dbb8053700df7e2a093ced
https://git.kernel.org/stable/c/c0315e93552e0d840e9edc6abd71c7db82ec8f51
https://git.kernel.org/stable/c/c54a60c8fbaa774f828e26df79f66229a8a0e010
https://git.kernel.org/stable/c/dadce61247c6230489527cc5e343b6002d1114c5
https://git.kernel.org/stable/c/f123cffdd8fe8ea6c7fded4b88516a42798797d0
https://git.kernel.org/stable/c/ff3f517bf7138e01a17369042908a3f345c0ee41
Common Vulnerability Exposure (CVE) ID: CVE-2022-48994
Common Vulnerability Exposure (CVE) ID: CVE-2023-52488
https://git.kernel.org/stable/c/084c24e788d9cf29c55564de368bf5284f2bb5db
https://git.kernel.org/stable/c/416b10d2817c94db86829fb92ad43ce7d002c573
https://git.kernel.org/stable/c/4e37416e4ee1b1bc17364a68973e0c63be89e611
https://git.kernel.org/stable/c/aa7cb4787698add9367b19f7afc667662c9bdb23
https://git.kernel.org/stable/c/dbf4ab821804df071c8b566d9813083125e6d97b
https://git.kernel.org/stable/c/e635f652696ef6f1230621cfd89c350cb5ec6169
Common Vulnerability Exposure (CVE) ID: CVE-2023-52522
https://git.kernel.org/stable/c/147d89ee41434b97043c2dcb17a97dc151859baa
https://git.kernel.org/stable/c/25563b581ba3a1f263a00e8c9a97f5e7363be6fd
https://git.kernel.org/stable/c/2ea52a2fb8e87067e26bbab4efb8872639240eb0
https://git.kernel.org/stable/c/95eabb075a5902f4c0834ab1fb12dc35730c05af
https://git.kernel.org/stable/c/a75152d233370362eebedb2643592e7c883cc9fc
https://git.kernel.org/stable/c/f82aac8162871e87027692b36af335a2375d4580
Common Vulnerability Exposure (CVE) ID: CVE-2023-52799
https://git.kernel.org/stable/c/20f9310a18e3e99fc031e036fcbed67105ae1859
https://git.kernel.org/stable/c/22cad8bc1d36547cdae0eef316c47d917ce3147c
https://git.kernel.org/stable/c/81aa58cd8495b8c3b527f58ccbe19478d8087f61
https://git.kernel.org/stable/c/86df90f3fea7c5591f05c8a0010871d435e83046
https://git.kernel.org/stable/c/87c681ab49e99039ff2dd3e71852417381b13878
https://git.kernel.org/stable/c/88b7894a8f8705bf4e7ea90b10229376abf14514
https://git.kernel.org/stable/c/a50b796d36719757526ee094c703378895ab5e67
https://git.kernel.org/stable/c/da3da5e1e6f71c21d8e6149d7076d936ef5d4cb9
https://git.kernel.org/stable/c/ecfb47f13b08b02cf28b7b50d4941eefa21954d2
Common Vulnerability Exposure (CVE) ID: CVE-2023-52818
https://git.kernel.org/stable/c/6dffdddfca818c02a42b6caa1d9845995f0a1f94
https://git.kernel.org/stable/c/760efbca74a405dc439a013a5efaa9fadc95a8c3
https://git.kernel.org/stable/c/8af28ae3acb736ada4ce3457662fa446cc913bb4
https://git.kernel.org/stable/c/92a775e7c9707aed28782bafe636bf87675f5a97
https://git.kernel.org/stable/c/acdb6830de02cf2873aeaccdf2d9bca4aee50e47
https://git.kernel.org/stable/c/c847379a5d00078ad6fcb1c24230e72c5609342f
https://git.kernel.org/stable/c/cfd8cd907fd94538561479a43aea455f5cf16928
https://git.kernel.org/stable/c/e52e324a21341c97350d5f11de14721c1c609498
https://git.kernel.org/stable/c/fc9ac0e8e0bcb3740c6eaad3a1a50c20016d422b
Common Vulnerability Exposure (CVE) ID: CVE-2023-52880
https://git.kernel.org/stable/c/2b85977977cbd120591b23c2450e90a5806a7167
https://git.kernel.org/stable/c/2d154a54c58f9c8375bfbea9f7e51ba3bfb2e43a
https://git.kernel.org/stable/c/67c37756898a5a6b2941a13ae7260c89b54e0d88
https://git.kernel.org/stable/c/7a529c9023a197ab3bf09bb95df32a3813f7ba58
https://git.kernel.org/stable/c/7d303dee473ba3529d75b63491e9963342107bed
https://git.kernel.org/stable/c/ada28eb4b9561aab93942f3224a2e41d76fe57fa
Common Vulnerability Exposure (CVE) ID: CVE-2024-26685
https://git.kernel.org/stable/c/2c3bdba00283a6c7a5b19481a59a730f46063803
https://git.kernel.org/stable/c/5bc09b397cbf1221f8a8aacb1152650c9195b02b
https://git.kernel.org/stable/c/626daab3811b772086aef1bf8eed3ffe6f523eff
https://git.kernel.org/stable/c/6589f0f72f8edd1fa11adce4eedbd3615f2e78ab
https://git.kernel.org/stable/c/8fa90634ec3e9cc50f42dd605eec60f2d146ced8
https://git.kernel.org/stable/c/c4a09fdac625e64abe478dcf88bfa20406616928
https://git.kernel.org/stable/c/d31c8721e816eff5ca6573cc487754f357c093cd
https://git.kernel.org/stable/c/f3e4963566f58726d3265a727116a42b591f6596
Common Vulnerability Exposure (CVE) ID: CVE-2024-35896
https://git.kernel.org/stable/c/0c83842df40f86e529db6842231154772c20edcc
https://git.kernel.org/stable/c/0f038242b77ddfc505bf4163d4904c1abd2e74d6
https://git.kernel.org/stable/c/18aae2cb87e5faa9c5bd865260ceadac60d5a6c5
https://git.kernel.org/stable/c/440e948cf0eff32cfe322dcbca3f2525354b159b
https://git.kernel.org/stable/c/58f2bfb789e6bd3bc24a2c9c1580f3c67aec3018
https://git.kernel.org/stable/c/81d51b9b7c95e791ba3c1a2dd77920a9d3b3f525
Common Vulnerability Exposure (CVE) ID: CVE-2024-36886
https://git.kernel.org/stable/c/080cbb890286cd794f1ee788bbc5463e2deb7c2b
https://git.kernel.org/stable/c/21ea04aad8a0839b4ec27ef1691ca480620e8e14
https://git.kernel.org/stable/c/367766ff9e407f8a68409b7ce4dc4d5a72afeab1
https://git.kernel.org/stable/c/66116556076f0b96bc1aa9844008c743c8c67684
https://git.kernel.org/stable/c/93bc2d6d16f2c3178736ba6b845b30475856dc40
https://git.kernel.org/stable/c/a0fbb26f8247e326a320e2cb4395bfb234332c90
https://git.kernel.org/stable/c/e19ec8ab0e25bc4803d7cc91c84e84532e2781bd
https://git.kernel.org/stable/c/ffd4917c1edb3c3ff334fce3704fbe9c39f35682
Common Vulnerability Exposure (CVE) ID: CVE-2024-36952
https://git.kernel.org/stable/c/0936809d968ecf81e0726fbd02ff2a5732d960c3
https://git.kernel.org/stable/c/4ddf01f2f1504fa08b766e8cfeec558e9f8eef6c
https://git.kernel.org/stable/c/718602cd15f4c5710850090ea3066a89eeb46278
https://git.kernel.org/stable/c/76337eb8daee32bcc67742efab3168ed4ca299d0
https://git.kernel.org/stable/c/f2c7f029051edc4b394bb48edbe2297575abefe0
Common Vulnerability Exposure (CVE) ID: CVE-2024-36964
https://git.kernel.org/stable/c/157d468e34fdd3cb1ddc07c2be32fb3b02826b02
https://git.kernel.org/stable/c/5a605930e19f451294bd838754f7d66c976a8a2c
https://git.kernel.org/stable/c/ad4f65328661392de74e3608bb736fedf3b67e32
https://git.kernel.org/stable/c/ca9b5c81f0c918c63d73d962ed8a8e231f840bc8
https://git.kernel.org/stable/c/cd25e15e57e68a6b18dc9323047fe9c68b99290b
https://git.kernel.org/stable/c/df1962a199783ecd66734d563caf0fedecf08f96
https://git.kernel.org/stable/c/e55c601af3b1223a84f9f27f9cdbd2af5e203bf3
https://git.kernel.org/stable/c/e90bc596a74bb905e0a45bf346038c3f9d1e868d
Common Vulnerability Exposure (CVE) ID: CVE-2024-38567
https://git.kernel.org/stable/c/03ddc74bdfd71b84a55c9f2185d8787f258422cd
https://git.kernel.org/stable/c/0fa08a55201ab9be72bacb8ea93cf752d338184f
https://git.kernel.org/stable/c/265c3cda471c26e0f25d0c755da94e1eb15d7a0c
https://git.kernel.org/stable/c/62eb07923f3693d55b0c2d9a5a4f1ad72cb6b8fd
https://git.kernel.org/stable/c/6a9892bf24c906b4d6b587f8759ca38bff672582
https://git.kernel.org/stable/c/8650725bb0a48b206d5a8ddad3a7488f9a5985b7
https://git.kernel.org/stable/c/ac3ed46a8741d464bc70ebdf7433c1d786cf329d
https://git.kernel.org/stable/c/b6dd09b3dac89b45d1ea3e3bd035a3859c0369a0
https://git.kernel.org/stable/c/eb0f2fc3ff5806cc572cd9055ce7c52a01e97645
Common Vulnerability Exposure (CVE) ID: CVE-2024-40910
Common Vulnerability Exposure (CVE) ID: CVE-2024-40911
Common Vulnerability Exposure (CVE) ID: CVE-2024-40943
Common Vulnerability Exposure (CVE) ID: CVE-2024-40981
Common Vulnerability Exposure (CVE) ID: CVE-2024-41063
Common Vulnerability Exposure (CVE) ID: CVE-2024-41064
Common Vulnerability Exposure (CVE) ID: CVE-2024-42068
Common Vulnerability Exposure (CVE) ID: CVE-2024-42070
Common Vulnerability Exposure (CVE) ID: CVE-2024-43854
Common Vulnerability Exposure (CVE) ID: CVE-2024-43863
Common Vulnerability Exposure (CVE) ID: CVE-2024-43892
Common Vulnerability Exposure (CVE) ID: CVE-2024-43893
Common Vulnerability Exposure (CVE) ID: CVE-2024-43900
Common Vulnerability Exposure (CVE) ID: CVE-2024-44931
Common Vulnerability Exposure (CVE) ID: CVE-2024-44938
Common Vulnerability Exposure (CVE) ID: CVE-2024-49902
Common Vulnerability Exposure (CVE) ID: CVE-2024-50117
Common Vulnerability Exposure (CVE) ID: CVE-2024-50148
Common Vulnerability Exposure (CVE) ID: CVE-2024-50171
Common Vulnerability Exposure (CVE) ID: CVE-2024-50233
Common Vulnerability Exposure (CVE) ID: CVE-2024-53104
Common Vulnerability Exposure (CVE) ID: CVE-2024-53156
Common Vulnerability Exposure (CVE) ID: CVE-2025-0927
CopyrightCopyright (C) 2025 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.