Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.12.2025.7496.1
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-7496-1)
Summary:The remote host is missing an update for the 'linux, linux-aws, linux-aws-hwe, linux-gcp, linux-gcp-4.15, linux-hwe, linux-kvm, linux-oracle' package(s) announced via the USN-7496-1 advisory.
Description:Summary:
The remote host is missing an update for the 'linux, linux-aws, linux-aws-hwe, linux-gcp, linux-gcp-4.15, linux-hwe, linux-kvm, linux-oracle' package(s) announced via the USN-7496-1 advisory.

Vulnerability Insight:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Block layer subsystem,
- Character device driver,
- Hardware crypto device drivers,
- GPU drivers,
- Media drivers,
- Network drivers,
- SCSI subsystem,
- USB Gadget drivers,
- Framebuffer layer,
- Ceph distributed file system,
- File systems infrastructure,
- JFS file system,
- Network file system (NFS) client,
- NILFS2 file system,
- SMB network file system,
- Netfilter,
- CAN network layer,
- IPv6 networking,
- MAC80211 subsystem,
- Netlink,
- Network traffic control,
- SCTP protocol,
- TIPC protocol,
(CVE-2024-53173, CVE-2024-26689, CVE-2024-46771, CVE-2024-36934,
CVE-2023-52458, CVE-2021-47191, CVE-2024-50296, CVE-2024-26974,
CVE-2021-47150, CVE-2024-53140, CVE-2025-21971, CVE-2024-50237,
CVE-2024-46780, CVE-2023-52741, CVE-2024-56642, CVE-2024-56631,
CVE-2024-53063, CVE-2024-36015, CVE-2021-47163, CVE-2024-56651,
CVE-2024-49925, CVE-2023-52664, CVE-2021-47219, CVE-2024-50256,
CVE-2024-53066, CVE-2024-49944, CVE-2024-56598, CVE-2024-56650,
CVE-2024-26996, CVE-2024-35864, CVE-2024-56770, CVE-2024-26915,
CVE-2023-52927)

Affected Software/OS:
'linux, linux-aws, linux-aws-hwe, linux-gcp, linux-gcp-4.15, linux-hwe, linux-kvm, linux-oracle' package(s) on Ubuntu 16.04, Ubuntu 18.04.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:L/AC:L/Au:S/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2021-47150
https://git.kernel.org/stable/c/15102886bc8f5f29daaadf2d925591d564c17e9f
https://git.kernel.org/stable/c/20255d41ac560397b6a07d8d87dcc5e2efc7672a
https://git.kernel.org/stable/c/32a1777fd113335c3f70dc445dffee0ad1c6870f
https://git.kernel.org/stable/c/619fee9eb13b5d29e4267cb394645608088c28a8
https://git.kernel.org/stable/c/8ee7ef4a57a9e1228b6f345aaa70aa8951c7e9cd
Common Vulnerability Exposure (CVE) ID: CVE-2021-47163
https://git.kernel.org/stable/c/04c26faa51d1e2fe71cf13c45791f5174c37f986
https://git.kernel.org/stable/c/5195ec5e365a2a9331bfeb585b613a6e94f98dba
https://git.kernel.org/stable/c/b9f5b7ad4ac3af006443f535b1ce7bff1d130d7d
https://git.kernel.org/stable/c/d1f76dfadaf8f47ed1753f97dbcbd41c16215ffa
Common Vulnerability Exposure (CVE) ID: CVE-2021-47191
https://git.kernel.org/stable/c/3e20cb072679bdb47747ccc8bee3233a4cf0765a
https://git.kernel.org/stable/c/4e3ace0051e7e504b55d239daab8789dd89b863c
https://git.kernel.org/stable/c/5b8bed6464ad6653586e30df046185fd816ad999
Common Vulnerability Exposure (CVE) ID: CVE-2021-47219
https://git.kernel.org/stable/c/66523553fa62c7878fc5441dc4e82be71934eb77
https://git.kernel.org/stable/c/8440377e1a5644779b4c8d013aa2a917f5fc83c3
https://git.kernel.org/stable/c/f347c26836c270199de1599c3cd466bb7747caa9
Common Vulnerability Exposure (CVE) ID: CVE-2023-52458
https://git.kernel.org/stable/c/5010c27120962c85d2f421d2cf211791c9603503
https://git.kernel.org/stable/c/6f64f866aa1ae6975c95d805ed51d7e9433a0016
https://git.kernel.org/stable/c/8f6dfa1f1efe6dcca2d43e575491d8fcbe922f62
https://git.kernel.org/stable/c/bcdc288e7bc008daf38ef0401b53e4a8bb61bbe5
https://git.kernel.org/stable/c/cb16cc1abda18a9514106d2ac8c8d7abc0be5ed8
https://git.kernel.org/stable/c/ef31cc87794731ffcb578a195a2c47d744e25fb8
Common Vulnerability Exposure (CVE) ID: CVE-2023-52664
https://git.kernel.org/stable/c/0edb3ae8bfa31cd544b0c195bdec00e036002b5d
https://git.kernel.org/stable/c/b3cb7a830a24527877b0bc900b9bd74a96aea928
https://git.kernel.org/stable/c/c11a870a73a3bc4cc7df6dd877a45b181795fcbf
https://git.kernel.org/stable/c/d1fde4a7e1dcc4d49cce285107a7a43c3030878d
Common Vulnerability Exposure (CVE) ID: CVE-2023-52741
https://git.kernel.org/stable/c/2b693fe3f760c87fd9768e759f6297f743a1b3b0
https://git.kernel.org/stable/c/3684a2f6affa1ca52a5d4a12f04d0652efdee65e
https://git.kernel.org/stable/c/aa5465aeca3c66fecdf7efcf554aed79b4c4b211
https://git.kernel.org/stable/c/d1fba1e096ffc7ec11df863a97c50203c47315b9
Common Vulnerability Exposure (CVE) ID: CVE-2023-52927
Common Vulnerability Exposure (CVE) ID: CVE-2024-26689
https://git.kernel.org/stable/c/70e329b440762390258a6fe8c0de93c9fdd56c77
https://git.kernel.org/stable/c/7958c1bf5b03c6f1f58e724dbdec93f8f60b96fc
https://git.kernel.org/stable/c/8180d0c27b93a6eb60da1b08ea079e3926328214
https://git.kernel.org/stable/c/ae20db45e482303a20e56f2db667a9d9c54ac7e7
https://git.kernel.org/stable/c/cda4672da1c26835dcbd7aec2bfed954eda9b5ef
https://git.kernel.org/stable/c/f3f98d7d84b31828004545e29fd7262b9f444139
Common Vulnerability Exposure (CVE) ID: CVE-2024-26915
https://git.kernel.org/stable/c/2827633c9dab6304ec4cdbf369363219832e605d
https://git.kernel.org/stable/c/7330256268664ea0a7dd5b07a3fed363093477dd
https://git.kernel.org/stable/c/8983397951b4b0bd51bb4b4ba9749424e1ccbb70
https://git.kernel.org/stable/c/9a9d00c23d170d4ef5a1b28e6b69f5c85dd12bc1
https://git.kernel.org/stable/c/a28f4d1e0bed85943d309ac243fd1c200f8af9a2
Common Vulnerability Exposure (CVE) ID: CVE-2024-26974
https://git.kernel.org/stable/c/0c2cf5142bfb634c0ef0a1a69cdf37950747d0be
https://git.kernel.org/stable/c/226fc408c5fcd23cc4186f05ea3a09a7a9aef2f7
https://git.kernel.org/stable/c/4ae5a97781ce7d6ecc9c7055396535815b64ca4f
https://git.kernel.org/stable/c/7d42e097607c4d246d99225bf2b195b6167a210c
https://git.kernel.org/stable/c/8a5a7611ccc7b1fba8d933a9f22a2e76859d94dc
https://git.kernel.org/stable/c/8e81cd58aee14a470891733181a47d123193ba81
https://git.kernel.org/stable/c/bb279ead42263e9fb09480f02a4247b2c287d828
https://git.kernel.org/stable/c/d03092550f526a79cf1ade7f0dfa74906f39eb71
https://git.kernel.org/stable/c/daba62d9eeddcc5b1081be7d348ca836c83c59d7
Common Vulnerability Exposure (CVE) ID: CVE-2024-26996
https://git.kernel.org/stable/c/0588bbbd718a8130b98c54518f1e0b569ce60a93
https://git.kernel.org/stable/c/6334b8e4553cc69f51e383c9de545082213d785e
https://git.kernel.org/stable/c/7250326cbb1f4f90391ac511a126b936cefb5bb7
https://git.kernel.org/stable/c/7f67c2020cb08499c400abf0fc32c65e4d9a09ca
https://git.kernel.org/stable/c/f356fd0cbd9c9cbd0854657a80d1608d0d732db3
Common Vulnerability Exposure (CVE) ID: CVE-2024-35864
https://git.kernel.org/stable/c/705c76fbf726c7a2f6ff9143d4013b18daaaebf1
https://git.kernel.org/stable/c/a8344e2b69bde63f713b0aa796d70dbeadffddfb
https://git.kernel.org/stable/c/c868cabdf6fdd61bea54532271f4708254e57fc5
https://git.kernel.org/stable/c/f92739fdd4522c4291277136399353d7c341fae4
Common Vulnerability Exposure (CVE) ID: CVE-2024-36015
https://git.kernel.org/stable/c/5d5b24edad1107a2ffa99058f20f6aeeafeb5d39
https://git.kernel.org/stable/c/65cd017d43f4319a56747d38308b0a24cf57299e
https://git.kernel.org/stable/c/b65d0410b879af0295d22438a4a32012786d152a
https://git.kernel.org/stable/c/b8c6b83cc3adff3ddf403c8c7063fe6d08b2b9d9
https://git.kernel.org/stable/c/d32caf51379a4d71db03d3d4d7c22d27cdf7f68b
https://git.kernel.org/stable/c/df9329247dbbf00f6057e002139ab3fa529ad828
https://git.kernel.org/stable/c/ec3468221efec6660ff656e9ebe51ced3520fc57
https://git.kernel.org/stable/c/fbf740aeb86a4fe82ad158d26d711f2f3be79b3e
Common Vulnerability Exposure (CVE) ID: CVE-2024-36934
https://git.kernel.org/stable/c/06cb37e2ba6441888f24566a997481d4197b4e32
https://git.kernel.org/stable/c/0f560240b4cc25d3de527deb257cdf072c0102a9
https://git.kernel.org/stable/c/1518b2b498a0109eb6b15755169d3b6607356b35
https://git.kernel.org/stable/c/6f0f19b79c085cc891c418b768f26f7004bd51a4
https://git.kernel.org/stable/c/80578ec10335bc15ac35fd1703c22aab34e39fdd
https://git.kernel.org/stable/c/8c34096c7fdf272fd4c0c37fe411cd2e3ed0ee9f
https://git.kernel.org/stable/c/bd502ba81cd1d515deddad7dbc6b812b14b97147
https://git.kernel.org/stable/c/e19478763154674c084defc62ae0d64d79657f91
Common Vulnerability Exposure (CVE) ID: CVE-2024-46771
Common Vulnerability Exposure (CVE) ID: CVE-2024-46780
Common Vulnerability Exposure (CVE) ID: CVE-2024-49925
Common Vulnerability Exposure (CVE) ID: CVE-2024-49944
Common Vulnerability Exposure (CVE) ID: CVE-2024-50237
Common Vulnerability Exposure (CVE) ID: CVE-2024-50256
Common Vulnerability Exposure (CVE) ID: CVE-2024-50296
Common Vulnerability Exposure (CVE) ID: CVE-2024-53063
Common Vulnerability Exposure (CVE) ID: CVE-2024-53066
Common Vulnerability Exposure (CVE) ID: CVE-2024-53140
Common Vulnerability Exposure (CVE) ID: CVE-2024-53173
Common Vulnerability Exposure (CVE) ID: CVE-2024-56598
Common Vulnerability Exposure (CVE) ID: CVE-2024-56631
Common Vulnerability Exposure (CVE) ID: CVE-2024-56642
Common Vulnerability Exposure (CVE) ID: CVE-2024-56650
Common Vulnerability Exposure (CVE) ID: CVE-2024-56651
Common Vulnerability Exposure (CVE) ID: CVE-2024-56770
Common Vulnerability Exposure (CVE) ID: CVE-2025-21971
CopyrightCopyright (C) 2025 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.