Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.12.2025.7455.5
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-7455-5)
Summary:The remote host is missing an update for the 'linux-aws-5.15' package(s) announced via the USN-7455-5 advisory.
Description:Summary:
The remote host is missing an update for the 'linux-aws-5.15' package(s) announced via the USN-7455-5 advisory.

Vulnerability Insight:
Jann Horn discovered that the watch_queue event notification subsystem in
the Linux kernel contained an out-of-bounds write vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
escalate their privileges. (CVE-2022-0995)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- iSCSI Boot Firmware Table Attributes driver,
- Network drivers,
- File systems infrastructure,
- NTFS3 file system,
- Ethernet bridge,
- Ethtool driver,
- IPv6 networking,
- Network traffic control,
- VMware vSockets driver,
(CVE-2024-26837, CVE-2025-21993, CVE-2025-21702, CVE-2024-50248,
CVE-2024-46826, CVE-2024-50256, CVE-2025-21703, CVE-2025-21700,
CVE-2025-21756, CVE-2025-21701, CVE-2024-56651)

Affected Software/OS:
'linux-aws-5.15' package(s) on Ubuntu 20.04.

Solution:
Please install the updated package(s).

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2022-0995
http://packetstormsecurity.com/files/166770/Linux-watch_queue-Filter-Out-Of-Bounds-Write.html
http://packetstormsecurity.com/files/166815/Watch-Queue-Out-Of-Bounds-Write.html
https://bugzilla.redhat.com/show_bug.cgi?id=2063786
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=93ce93587d36493f2f86921fa79921b3cba63fbb
Common Vulnerability Exposure (CVE) ID: CVE-2024-26837
https://git.kernel.org/stable/c/2d5b4b3376fa146a23917b8577064906d643925f
https://git.kernel.org/stable/c/603be95437e7fd85ba694e75918067fb9e7754db
https://git.kernel.org/stable/c/dc489f86257cab5056e747344f17a164f63bff4b
https://git.kernel.org/stable/c/e0b4c5b1d760008f1dd18c07c35af0442e54f9c8
Common Vulnerability Exposure (CVE) ID: CVE-2024-46826
Common Vulnerability Exposure (CVE) ID: CVE-2024-50248
Common Vulnerability Exposure (CVE) ID: CVE-2024-50256
Common Vulnerability Exposure (CVE) ID: CVE-2024-56651
Common Vulnerability Exposure (CVE) ID: CVE-2025-21700
Common Vulnerability Exposure (CVE) ID: CVE-2025-21701
Common Vulnerability Exposure (CVE) ID: CVE-2025-21702
Common Vulnerability Exposure (CVE) ID: CVE-2025-21703
Common Vulnerability Exposure (CVE) ID: CVE-2025-21756
Common Vulnerability Exposure (CVE) ID: CVE-2025-21993
CopyrightCopyright (C) 2025 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.