![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.1.12.2025.7455.3 |
Category: | Ubuntu Local Security Checks |
Title: | Ubuntu: Security Advisory (USN-7455-3) |
Summary: | The remote host is missing an update for the 'linux-intel-iot-realtime, linux-realtime' package(s) announced via the USN-7455-3 advisory. |
Description: | Summary: The remote host is missing an update for the 'linux-intel-iot-realtime, linux-realtime' package(s) announced via the USN-7455-3 advisory. Vulnerability Insight: Jann Horn discovered that the watch_queue event notification subsystem in the Linux kernel contained an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service (system crash) or escalate their privileges. (CVE-2022-0995) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Network drivers, - File systems infrastructure, - NTFS3 file system, - Ethernet bridge, - Ethtool driver, - IPv6 networking, - Network traffic control, - VMware vSockets driver, (CVE-2024-56651, CVE-2025-21756, CVE-2024-26837, CVE-2025-21700, CVE-2024-46826, CVE-2024-50256, CVE-2024-50248, CVE-2025-21993, CVE-2025-21702, CVE-2025-21701, CVE-2025-21703) Affected Software/OS: 'linux-intel-iot-realtime, linux-realtime' package(s) on Ubuntu 22.04. Solution: Please install the updated package(s). CVSS Score: 7.2 CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2022-0995 http://packetstormsecurity.com/files/166770/Linux-watch_queue-Filter-Out-Of-Bounds-Write.html http://packetstormsecurity.com/files/166815/Watch-Queue-Out-Of-Bounds-Write.html https://bugzilla.redhat.com/show_bug.cgi?id=2063786 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=93ce93587d36493f2f86921fa79921b3cba63fbb Common Vulnerability Exposure (CVE) ID: CVE-2024-26837 https://git.kernel.org/stable/c/2d5b4b3376fa146a23917b8577064906d643925f https://git.kernel.org/stable/c/603be95437e7fd85ba694e75918067fb9e7754db https://git.kernel.org/stable/c/dc489f86257cab5056e747344f17a164f63bff4b https://git.kernel.org/stable/c/e0b4c5b1d760008f1dd18c07c35af0442e54f9c8 Common Vulnerability Exposure (CVE) ID: CVE-2024-46826 Common Vulnerability Exposure (CVE) ID: CVE-2024-50248 Common Vulnerability Exposure (CVE) ID: CVE-2024-50256 Common Vulnerability Exposure (CVE) ID: CVE-2024-56651 Common Vulnerability Exposure (CVE) ID: CVE-2025-21700 Common Vulnerability Exposure (CVE) ID: CVE-2025-21701 Common Vulnerability Exposure (CVE) ID: CVE-2025-21702 Common Vulnerability Exposure (CVE) ID: CVE-2025-21703 Common Vulnerability Exposure (CVE) ID: CVE-2025-21756 Common Vulnerability Exposure (CVE) ID: CVE-2025-21993 |
Copyright | Copyright (C) 2025 Greenbone AG |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |