CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
18.7%
It was discovered that the Open vSwitch implementation in the Linux kernel
could overflow its stack during recursive action operations under certain
conditions. A local attacker could use this to cause a denial of service
(system crash). (CVE-2024-1151)
Sander Wiebing, Alvise de Faveri Tron, Herbert Bos, and Cristiano Giuffrida
discovered that the Linux kernel mitigations for the initial Branch History
Injection vulnerability (CVE-2022-0001) were insufficient for Intel
processors. A local attacker could potentially use this to expose sensitive
information. (CVE-2024-2201)
Chenyuan Yang discovered that the RDS Protocol implementation in the Linux
kernel contained an out-of-bounds read vulnerability. An attacker could use
this to possibly cause a denial of service (system crash). (CVE-2024-23849)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
ubuntu.com/security/CVE-2023-52435
ubuntu.com/security/CVE-2023-52486
ubuntu.com/security/CVE-2023-52489
ubuntu.com/security/CVE-2023-52491
ubuntu.com/security/CVE-2023-52492
ubuntu.com/security/CVE-2023-52493
ubuntu.com/security/CVE-2023-52494
ubuntu.com/security/CVE-2023-52498
ubuntu.com/security/CVE-2023-52583
ubuntu.com/security/CVE-2023-52587
ubuntu.com/security/CVE-2023-52588
ubuntu.com/security/CVE-2023-52594
ubuntu.com/security/CVE-2023-52595
ubuntu.com/security/CVE-2023-52597
ubuntu.com/security/CVE-2023-52598
ubuntu.com/security/CVE-2023-52599
ubuntu.com/security/CVE-2023-52601
ubuntu.com/security/CVE-2023-52602
ubuntu.com/security/CVE-2023-52604
ubuntu.com/security/CVE-2023-52606
ubuntu.com/security/CVE-2023-52607
ubuntu.com/security/CVE-2023-52608
ubuntu.com/security/CVE-2023-52614
ubuntu.com/security/CVE-2023-52615
ubuntu.com/security/CVE-2023-52616
ubuntu.com/security/CVE-2023-52617
ubuntu.com/security/CVE-2023-52618
ubuntu.com/security/CVE-2023-52619
ubuntu.com/security/CVE-2023-52622
ubuntu.com/security/CVE-2023-52623
ubuntu.com/security/CVE-2023-52627
ubuntu.com/security/CVE-2023-52631
ubuntu.com/security/CVE-2023-52633
ubuntu.com/security/CVE-2023-52635
ubuntu.com/security/CVE-2023-52637
ubuntu.com/security/CVE-2023-52638
ubuntu.com/security/CVE-2023-52642
ubuntu.com/security/CVE-2023-52643
ubuntu.com/security/CVE-2024-1151
ubuntu.com/security/CVE-2024-2201
ubuntu.com/security/CVE-2024-23849
ubuntu.com/security/CVE-2024-26592
ubuntu.com/security/CVE-2024-26593
ubuntu.com/security/CVE-2024-26594
ubuntu.com/security/CVE-2024-26600
ubuntu.com/security/CVE-2024-26602
ubuntu.com/security/CVE-2024-26606
ubuntu.com/security/CVE-2024-26608
ubuntu.com/security/CVE-2024-26610
ubuntu.com/security/CVE-2024-26614
ubuntu.com/security/CVE-2024-26615
ubuntu.com/security/CVE-2024-26625
ubuntu.com/security/CVE-2024-26627
ubuntu.com/security/CVE-2024-26635
ubuntu.com/security/CVE-2024-26636
ubuntu.com/security/CVE-2024-26640
ubuntu.com/security/CVE-2024-26641
ubuntu.com/security/CVE-2024-26644
ubuntu.com/security/CVE-2024-26645
ubuntu.com/security/CVE-2024-26660
ubuntu.com/security/CVE-2024-26663
ubuntu.com/security/CVE-2024-26664
ubuntu.com/security/CVE-2024-26665
ubuntu.com/security/CVE-2024-26668
ubuntu.com/security/CVE-2024-26671
ubuntu.com/security/CVE-2024-26673
ubuntu.com/security/CVE-2024-26675
ubuntu.com/security/CVE-2024-26676
ubuntu.com/security/CVE-2024-26679
ubuntu.com/security/CVE-2024-26684
ubuntu.com/security/CVE-2024-26685
ubuntu.com/security/CVE-2024-26689
ubuntu.com/security/CVE-2024-26695
ubuntu.com/security/CVE-2024-26696
ubuntu.com/security/CVE-2024-26697
ubuntu.com/security/CVE-2024-26698
ubuntu.com/security/CVE-2024-26702
ubuntu.com/security/CVE-2024-26704
ubuntu.com/security/CVE-2024-26707
ubuntu.com/security/CVE-2024-26712
ubuntu.com/security/CVE-2024-26715
ubuntu.com/security/CVE-2024-26717
ubuntu.com/security/CVE-2024-26720
ubuntu.com/security/CVE-2024-26722
ubuntu.com/security/CVE-2024-26808
ubuntu.com/security/CVE-2024-26825
ubuntu.com/security/CVE-2024-26826
ubuntu.com/security/CVE-2024-26829
ubuntu.com/security/CVE-2024-26910
ubuntu.com/security/CVE-2024-26916
ubuntu.com/security/CVE-2024-26920
ubuntu.com/security/notices/USN-6766-2
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
18.7%