Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
146377 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.1.12.2024.6873.1
Categoría:Ubuntu Local Security Checks
Título:Ubuntu: Security Advisory (USN-6873-1)
Resumen:The remote host is missing an update for the 'linux-aws, linux-aws-6.5, linux-oem-6.5, linux-oracle, linux-oracle-6.5, linux-starfive' package(s) announced via the USN-6873-1 advisory.
Descripción:Summary:
The remote host is missing an update for the 'linux-aws, linux-aws-6.5, linux-oem-6.5, linux-oracle, linux-oracle-6.5, linux-starfive' package(s) announced via the USN-6873-1 advisory.

Vulnerability Insight:
It was discovered that the Intel Data Streaming and Intel Analytics
Accelerator drivers in the Linux kernel allowed direct access to the
devices for unprivileged users and virtual machines. A local attacker could
use this to cause a denial of service. (CVE-2024-21823)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystem:
- Netfilter,
(CVE-2024-26643, CVE-2024-26925, CVE-2024-26924, CVE-2024-26809)

Affected Software/OS:
'linux-aws, linux-aws-6.5, linux-oem-6.5, linux-oracle, linux-oracle-6.5, linux-starfive' package(s) on Ubuntu 22.04, Ubuntu 23.10.

Solution:
Please install the updated package(s).

CVSS Score:
4.6

CVSS Vector:
AV:L/AC:L/Au:S/C:N/I:N/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2024-21823
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DW2MIOIMOFUSNLHLRYX23AFR36BMKD65/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OTB4HWU2PTVW5NEYHHLOCXDKG3PYA534/
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01084.html
http://www.openwall.com/lists/oss-security/2024/05/15/1
Common Vulnerability Exposure (CVE) ID: CVE-2024-26643
https://git.kernel.org/stable/c/291cca35818bd52a407bc37ab45a15816039e363
https://git.kernel.org/stable/c/406b0241d0eb598a0b330ab20ae325537d8d8163
https://git.kernel.org/stable/c/5224afbc30c3ca9ba23e752f0f138729b2c48dd8
https://git.kernel.org/stable/c/552705a3650bbf46a22b1adedc1b04181490fc36
https://git.kernel.org/stable/c/b2d6f9a5b1cf968f1eaa71085ceeb09c2cb276b1
https://git.kernel.org/stable/c/d75a589bb92af1abf3b779cfcd1977ca11b27033
https://git.kernel.org/stable/c/e2d45f467096e931044f0ab7634499879d851a5c
https://git.kernel.org/stable/c/edcf1a3f182ecf8b6b805f0ce90570ea98c5f6bf
Common Vulnerability Exposure (CVE) ID: CVE-2024-26809
https://git.kernel.org/stable/c/362508506bf545e9ce18c72a2c48dcbfb891ab9c
https://git.kernel.org/stable/c/5ad233dc731ab64cdc47b84a5c1f78fff6c024af
https://git.kernel.org/stable/c/821e28d5b506e6a73ccc367ff792bd894050d48b
https://git.kernel.org/stable/c/9384b4d85c46ce839f51af01374062ce6318b2f2
https://git.kernel.org/stable/c/b0e256f3dd2ba6532f37c5c22e07cb07a36031ee
https://git.kernel.org/stable/c/b36b83297ff4910dfc8705402c8abffd4bbf8144
https://git.kernel.org/stable/c/ff90050771412b91e928093ccd8736ae680063c2
Common Vulnerability Exposure (CVE) ID: CVE-2024-26924
https://git.kernel.org/stable/c/14b001ba221136c15f894577253e8db535b99487
https://git.kernel.org/stable/c/3cfc9ec039af60dbd8965ae085b2c2ccdcfbe1cc
https://git.kernel.org/stable/c/41d8fdf3afaff312e17466e4ab732937738d5644
https://git.kernel.org/stable/c/7a1679e2d9bfa3b5f8755c2c7113e54b7d42bd46
https://git.kernel.org/stable/c/e3b887a9c11caf8357a821260e095f2a694a34f2
https://git.kernel.org/stable/c/ebf7c9746f073035ee26209e38c3a1170f7b349a
Common Vulnerability Exposure (CVE) ID: CVE-2024-26925
https://git.kernel.org/stable/c/0d459e2ffb541841714839e8228b845458ed3b27
https://git.kernel.org/stable/c/2cee2ff7f8cce12a63a0a23ffe27f08d99541494
https://git.kernel.org/stable/c/61ac7284346c32f9a8c8ceac56102f7914060428
https://git.kernel.org/stable/c/8038ee3c3e5b59bcd78467686db5270c68544e30
https://git.kernel.org/stable/c/8d3a58af50e46167b6f1db47adadad03c0045dae
https://git.kernel.org/stable/c/a34ba4bdeec0c3b629160497594908dc820110f1
https://git.kernel.org/stable/c/eb769ff4e281f751adcaf4f4445cbf30817be139
CopyrightCopyright (C) 2024 Greenbone AG

Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.