CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
69.6%
Pratyush Yadav discovered that the Xen network backend implementation in
the Linux kernel did not properly handle zero length data request, leading
to a null pointer dereference vulnerability. An attacker in a guest VM
could possibly use this to cause a denial of service (host domain crash).
(CVE-2023-46838)
It was discovered that the Habana’s AI Processors driver in the Linux
kernel did not properly initialize certain data structures before passing
them to user space. A local attacker could use this to expose sensitive
information (kernel memory). (CVE-2023-50431)
Murray McAllister discovered that the VMware Virtual GPU DRM driver in the
Linux kernel did not properly handle memory objects when storing surfaces,
leading to a use-after-free vulnerability. A local attacker in a guest VM
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-5633)
It was discovered that the CIFS network file system implementation in the
Linux kernel did not properly validate certain SMB messages, leading to an
out-of-bounds read vulnerability. An attacker could use this to cause a
denial of service (system crash) or possibly expose sensitive information.
(CVE-2023-6610)
It was discovered that the VirtIO subsystem in the Linux kernel did not
properly initialize memory in some situations. A local attacker could use
this to possibly expose sensitive information (kernel memory).
(CVE-2024-0340)
Lonial Con discovered that the netfilter subsystem in the Linux kernel did
not properly handle element deactivation in certain cases, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2024-1085)
Notselwyn discovered that the netfilter subsystem in the Linux kernel did
not properly handle verdict parameters in certain cases, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2024-1086)
Chenyuan Yang discovered that the RDS Protocol implementation in the Linux
kernel contained an out-of-bounds read vulnerability. An attacker could use
this to possibly cause a denial of service (system crash). (CVE-2024-23849)
It was discovered that a race condition existed in the Bluetooth subsystem
in the Linux kernel, leading to a null pointer dereference vulnerability. A
privileged local attacker could use this to possibly cause a denial of
service (system crash). (CVE-2024-24860)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 22.04 | noarch | linux-image-6.1.0-1035-oem | < 6.1.0-1035.35 | UNKNOWN |
Ubuntu | 22.04 | noarch | linux-image-6.1.0-1035-oem-dbgsym | < 6.1.0-1035.35 | UNKNOWN |
Ubuntu | 22.04 | noarch | linux-image-oem-22.04 | < 6.1.0.1035.36 | UNKNOWN |
Ubuntu | 22.04 | noarch | linux-headers-oem-22.04 | < 6.1.0.1035.36 | UNKNOWN |
Ubuntu | 22.04 | noarch | linux-headers-oem-22.04a | < 6.1.0.1035.36 | UNKNOWN |
Ubuntu | 22.04 | noarch | linux-headers-oem-22.04b | < 6.1.0.1035.36 | UNKNOWN |
Ubuntu | 22.04 | noarch | linux-headers-oem-22.04c | < 6.1.0.1035.36 | UNKNOWN |
Ubuntu | 22.04 | noarch | linux-image-oem-22.04a | < 6.1.0.1035.36 | UNKNOWN |
Ubuntu | 22.04 | noarch | linux-image-oem-22.04b | < 6.1.0.1035.36 | UNKNOWN |
Ubuntu | 22.04 | noarch | linux-image-oem-22.04c | < 6.1.0.1035.36 | UNKNOWN |
ubuntu.com/security/CVE-2023-46838
ubuntu.com/security/CVE-2023-50431
ubuntu.com/security/CVE-2023-52436
ubuntu.com/security/CVE-2023-52438
ubuntu.com/security/CVE-2023-52439
ubuntu.com/security/CVE-2023-52443
ubuntu.com/security/CVE-2023-52444
ubuntu.com/security/CVE-2023-52445
ubuntu.com/security/CVE-2023-52447
ubuntu.com/security/CVE-2023-52448
ubuntu.com/security/CVE-2023-52449
ubuntu.com/security/CVE-2023-52451
ubuntu.com/security/CVE-2023-52454
ubuntu.com/security/CVE-2023-52456
ubuntu.com/security/CVE-2023-52457
ubuntu.com/security/CVE-2023-52458
ubuntu.com/security/CVE-2023-52462
ubuntu.com/security/CVE-2023-52463
ubuntu.com/security/CVE-2023-52464
ubuntu.com/security/CVE-2023-52467
ubuntu.com/security/CVE-2023-52469
ubuntu.com/security/CVE-2023-52470
ubuntu.com/security/CVE-2023-52583
ubuntu.com/security/CVE-2023-52584
ubuntu.com/security/CVE-2023-52587
ubuntu.com/security/CVE-2023-52588
ubuntu.com/security/CVE-2023-52589
ubuntu.com/security/CVE-2023-52593
ubuntu.com/security/CVE-2023-52594
ubuntu.com/security/CVE-2023-52595
ubuntu.com/security/CVE-2023-52597
ubuntu.com/security/CVE-2023-52598
ubuntu.com/security/CVE-2023-52599
ubuntu.com/security/CVE-2023-52600
ubuntu.com/security/CVE-2023-52601
ubuntu.com/security/CVE-2023-52602
ubuntu.com/security/CVE-2023-52603
ubuntu.com/security/CVE-2023-52604
ubuntu.com/security/CVE-2023-52605
ubuntu.com/security/CVE-2023-52606
ubuntu.com/security/CVE-2023-52607
ubuntu.com/security/CVE-2023-5633
ubuntu.com/security/CVE-2023-6610
ubuntu.com/security/CVE-2024-0340
ubuntu.com/security/CVE-2024-1085
ubuntu.com/security/CVE-2024-1086
ubuntu.com/security/CVE-2024-23849
ubuntu.com/security/CVE-2024-24860
ubuntu.com/security/CVE-2024-26581
ubuntu.com/security/CVE-2024-26588
ubuntu.com/security/CVE-2024-26589
ubuntu.com/security/CVE-2024-26591
ubuntu.com/security/CVE-2024-26592
ubuntu.com/security/CVE-2024-26594
ubuntu.com/security/CVE-2024-26597
ubuntu.com/security/CVE-2024-26598
ubuntu.com/security/CVE-2024-26599
ubuntu.com/security/CVE-2024-26600
ubuntu.com/security/CVE-2024-26601
ubuntu.com/security/CVE-2024-26624
ubuntu.com/security/CVE-2024-26625
ubuntu.com/security/CVE-2024-26627
ubuntu.com/security/CVE-2024-26628