CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
50.6%
Alon Zahavi discovered that the NVMe-oF/TCP subsystem in the Linux kernel
did not properly validate H2C PDU data, leading to a null pointer
dereference vulnerability. A remote attacker could use this to cause a
denial of service (system crash). (CVE-2023-6356, CVE-2023-6535,
CVE-2023-6536)
Sander Wiebing, Alvise de Faveri Tron, Herbert Bos, and Cristiano Giuffrida
discovered that the Linux kernel mitigations for the initial Branch History
Injection vulnerability (CVE-2022-0001) were insufficient for Intel
processors. A local attacker could potentially use this to expose sensitive
information. (CVE-2024-2201)
Chenyuan Yang discovered that the RDS Protocol implementation in the Linux
kernel contained an out-of-bounds read vulnerability. An attacker could use
this to possibly cause a denial of service (system crash). (CVE-2024-23849)
It was discovered that a race condition existed in the Bluetooth subsystem
in the Linux kernel, leading to a null pointer dereference vulnerability. A
privileged local attacker could use this to possibly cause a denial of
service (system crash). (CVE-2024-24860)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
ubuntu.com/security/CVE-2023-52443
ubuntu.com/security/CVE-2023-52444
ubuntu.com/security/CVE-2023-52445
ubuntu.com/security/CVE-2023-52446
ubuntu.com/security/CVE-2023-52447
ubuntu.com/security/CVE-2023-52448
ubuntu.com/security/CVE-2023-52449
ubuntu.com/security/CVE-2023-52450
ubuntu.com/security/CVE-2023-52451
ubuntu.com/security/CVE-2023-52452
ubuntu.com/security/CVE-2023-52453
ubuntu.com/security/CVE-2023-52454
ubuntu.com/security/CVE-2023-52455
ubuntu.com/security/CVE-2023-52456
ubuntu.com/security/CVE-2023-52457
ubuntu.com/security/CVE-2023-52458
ubuntu.com/security/CVE-2023-52462
ubuntu.com/security/CVE-2023-52463
ubuntu.com/security/CVE-2023-52464
ubuntu.com/security/CVE-2023-52465
ubuntu.com/security/CVE-2023-52467
ubuntu.com/security/CVE-2023-52468
ubuntu.com/security/CVE-2023-52469
ubuntu.com/security/CVE-2023-52470
ubuntu.com/security/CVE-2023-52472
ubuntu.com/security/CVE-2023-52473
ubuntu.com/security/CVE-2023-52486
ubuntu.com/security/CVE-2023-52487
ubuntu.com/security/CVE-2023-52488
ubuntu.com/security/CVE-2023-52489
ubuntu.com/security/CVE-2023-52490
ubuntu.com/security/CVE-2023-52491
ubuntu.com/security/CVE-2023-52492
ubuntu.com/security/CVE-2023-52493
ubuntu.com/security/CVE-2023-52494
ubuntu.com/security/CVE-2023-52495
ubuntu.com/security/CVE-2023-52497
ubuntu.com/security/CVE-2023-52498
ubuntu.com/security/CVE-2023-52583
ubuntu.com/security/CVE-2023-52584
ubuntu.com/security/CVE-2023-52587
ubuntu.com/security/CVE-2023-52588
ubuntu.com/security/CVE-2023-52589
ubuntu.com/security/CVE-2023-52591
ubuntu.com/security/CVE-2023-52593
ubuntu.com/security/CVE-2023-52594
ubuntu.com/security/CVE-2023-52595
ubuntu.com/security/CVE-2023-52597
ubuntu.com/security/CVE-2023-52598
ubuntu.com/security/CVE-2023-52599
ubuntu.com/security/CVE-2023-52601
ubuntu.com/security/CVE-2023-52602
ubuntu.com/security/CVE-2023-52604
ubuntu.com/security/CVE-2023-52606
ubuntu.com/security/CVE-2023-52607
ubuntu.com/security/CVE-2023-52608
ubuntu.com/security/CVE-2023-52609
ubuntu.com/security/CVE-2023-52610
ubuntu.com/security/CVE-2023-52611
ubuntu.com/security/CVE-2023-52612
ubuntu.com/security/CVE-2023-52614
ubuntu.com/security/CVE-2023-52615
ubuntu.com/security/CVE-2023-52616
ubuntu.com/security/CVE-2023-52617
ubuntu.com/security/CVE-2023-52618
ubuntu.com/security/CVE-2023-52619
ubuntu.com/security/CVE-2023-52621
ubuntu.com/security/CVE-2023-52622
ubuntu.com/security/CVE-2023-52623
ubuntu.com/security/CVE-2023-52626
ubuntu.com/security/CVE-2023-52627
ubuntu.com/security/CVE-2023-52632
ubuntu.com/security/CVE-2023-52633
ubuntu.com/security/CVE-2023-52635
ubuntu.com/security/CVE-2023-6356
ubuntu.com/security/CVE-2023-6535
ubuntu.com/security/CVE-2023-6536
ubuntu.com/security/CVE-2024-2201
ubuntu.com/security/CVE-2024-23849
ubuntu.com/security/CVE-2024-24860
ubuntu.com/security/CVE-2024-26582
ubuntu.com/security/CVE-2024-26583
ubuntu.com/security/CVE-2024-26584
ubuntu.com/security/CVE-2024-26585
ubuntu.com/security/CVE-2024-26586
ubuntu.com/security/CVE-2024-26592
ubuntu.com/security/CVE-2024-26594
ubuntu.com/security/CVE-2024-26595
ubuntu.com/security/CVE-2024-26598
ubuntu.com/security/CVE-2024-26607
ubuntu.com/security/CVE-2024-26608
ubuntu.com/security/CVE-2024-26610
ubuntu.com/security/CVE-2024-26612
ubuntu.com/security/CVE-2024-26614
ubuntu.com/security/CVE-2024-26615
ubuntu.com/security/CVE-2024-26616
ubuntu.com/security/CVE-2024-26618
ubuntu.com/security/CVE-2024-26620
ubuntu.com/security/CVE-2024-26623
ubuntu.com/security/CVE-2024-26625
ubuntu.com/security/CVE-2024-26627
ubuntu.com/security/CVE-2024-26629
ubuntu.com/security/CVE-2024-26631
ubuntu.com/security/CVE-2024-26632
ubuntu.com/security/CVE-2024-26633
ubuntu.com/security/CVE-2024-26634
ubuntu.com/security/CVE-2024-26635
ubuntu.com/security/CVE-2024-26636
ubuntu.com/security/CVE-2024-26638
ubuntu.com/security/CVE-2024-26640
ubuntu.com/security/CVE-2024-26641
ubuntu.com/security/CVE-2024-26644
ubuntu.com/security/CVE-2024-26645
ubuntu.com/security/CVE-2024-26646
ubuntu.com/security/CVE-2024-26647
ubuntu.com/security/CVE-2024-26649
ubuntu.com/security/CVE-2024-26650
ubuntu.com/security/CVE-2024-26668
ubuntu.com/security/CVE-2024-26669
ubuntu.com/security/CVE-2024-26670
ubuntu.com/security/CVE-2024-26671
ubuntu.com/security/CVE-2024-26673
ubuntu.com/security/CVE-2024-26808
ubuntu.com/security/notices/USN-6765-1
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
50.6%