Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.12.2025.7462.1
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-7462-1)
Summary:The remote host is missing an update for the 'linux-aws, linux-aws-5.4, linux-gcp-5.4, linux-iot' package(s) announced via the USN-7462-1 advisory.
Description:Summary:
The remote host is missing an update for the 'linux-aws, linux-aws-5.4, linux-gcp-5.4, linux-iot' package(s) announced via the USN-7462-1 advisory.

Vulnerability Insight:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- GPU drivers,
- Network drivers,
- File systems infrastructure,
- Ext4 file system,
- Network file system (NFS) server daemon,
- SMB network file system,
- Network namespace,
- Bluetooth subsystem,
- Networking core,
- IPv6 networking,
- Network traffic control,
(CVE-2024-56658, CVE-2025-21700, CVE-2025-21703, CVE-2024-35864,
CVE-2024-26915, CVE-2021-47119, CVE-2025-21702, CVE-2024-50256,
CVE-2024-35958, CVE-2024-26928, CVE-2024-49974, CVE-2024-46826,
CVE-2024-53237, CVE-2024-56651)

Affected Software/OS:
'linux-aws, linux-aws-5.4, linux-gcp-5.4, linux-iot' package(s) on Ubuntu 18.04, Ubuntu 20.04.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:L/AC:L/Au:S/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2021-47119
https://git.kernel.org/stable/c/01d349a481f0591230300a9171330136f9159bcd
https://git.kernel.org/stable/c/1385b23396d511d5233b8b921ac3058b3f86a5e1
https://git.kernel.org/stable/c/afd09b617db3786b6ef3dc43e28fe728cfea84df
Common Vulnerability Exposure (CVE) ID: CVE-2024-26915
https://git.kernel.org/stable/c/2827633c9dab6304ec4cdbf369363219832e605d
https://git.kernel.org/stable/c/7330256268664ea0a7dd5b07a3fed363093477dd
https://git.kernel.org/stable/c/8983397951b4b0bd51bb4b4ba9749424e1ccbb70
https://git.kernel.org/stable/c/9a9d00c23d170d4ef5a1b28e6b69f5c85dd12bc1
https://git.kernel.org/stable/c/a28f4d1e0bed85943d309ac243fd1c200f8af9a2
Common Vulnerability Exposure (CVE) ID: CVE-2024-26928
https://git.kernel.org/stable/c/229042314602db62559ecacba127067c22ee7b88
https://git.kernel.org/stable/c/3402faf78b2516b0af1259baff50cc8453ef0bd1
https://git.kernel.org/stable/c/a65f2b56334ba4dc30bd5ee9ce5b2691b973344d
https://git.kernel.org/stable/c/ca545b7f0823f19db0f1148d59bc5e1a56634502
Common Vulnerability Exposure (CVE) ID: CVE-2024-35864
https://git.kernel.org/stable/c/705c76fbf726c7a2f6ff9143d4013b18daaaebf1
https://git.kernel.org/stable/c/a8344e2b69bde63f713b0aa796d70dbeadffddfb
https://git.kernel.org/stable/c/c868cabdf6fdd61bea54532271f4708254e57fc5
https://git.kernel.org/stable/c/f92739fdd4522c4291277136399353d7c341fae4
Common Vulnerability Exposure (CVE) ID: CVE-2024-35958
https://git.kernel.org/stable/c/19ff8fed3338898b70b2aad831386c78564912e1
https://git.kernel.org/stable/c/5c7f2240d9835a7823d87f7460d8eae9f4e504c7
https://git.kernel.org/stable/c/b26aa765f7437e1bbe8db4c1641b12bd5dd378f0
https://git.kernel.org/stable/c/bf02d9fe00632d22fa91d34749c7aacf397b6cde
https://git.kernel.org/stable/c/c31baa07f01307b7ae05f3ce32b89d8e2ba0cc1d
https://git.kernel.org/stable/c/fdfbf54d128ab6ab255db138488f9650485795a2
Common Vulnerability Exposure (CVE) ID: CVE-2024-46826
Common Vulnerability Exposure (CVE) ID: CVE-2024-49974
Common Vulnerability Exposure (CVE) ID: CVE-2024-50256
Common Vulnerability Exposure (CVE) ID: CVE-2024-53237
Common Vulnerability Exposure (CVE) ID: CVE-2024-56651
Common Vulnerability Exposure (CVE) ID: CVE-2024-56658
Common Vulnerability Exposure (CVE) ID: CVE-2025-21700
Common Vulnerability Exposure (CVE) ID: CVE-2025-21702
Common Vulnerability Exposure (CVE) ID: CVE-2025-21703
CopyrightCopyright (C) 2025 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.