CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
18.0%
Zheng Wang discovered that the Broadcom FullMAC WLAN driver in the Linux
kernel contained a race condition during device removal, leading to a use-
after-free vulnerability. A physically proximate attacker could possibly
use this to cause a denial of service (system crash). (CVE-2023-47233)
Sander Wiebing, Alvise de Faveri Tron, Herbert Bos, and Cristiano Giuffrida
discovered that the Linux kernel mitigations for the initial Branch History
Injection vulnerability (CVE-2022-0001) were insufficient for Intel
processors. A local attacker could potentially use this to expose sensitive
information. (CVE-2024-2201)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 23.10 | noarch | linux-image-6.5.0-1014-starfive | < 6.5.0-1014.15 | UNKNOWN |
Ubuntu | 23.10 | noarch | linux-buildinfo-6.5.0-1014-starfive | < 6.5.0-1014.15 | UNKNOWN |
Ubuntu | 23.10 | noarch | linux-headers-6.5.0-1014-starfive | < 6.5.0-1014.15 | UNKNOWN |
Ubuntu | 23.10 | noarch | linux-image-6.5.0-1014-starfive-dbgsym | < 6.5.0-1014.15 | UNKNOWN |
Ubuntu | 23.10 | noarch | linux-modules-6.5.0-1014-starfive | < 6.5.0-1014.15 | UNKNOWN |
Ubuntu | 23.10 | noarch | linux-modules-extra-6.5.0-1014-starfive | < 6.5.0-1014.15 | UNKNOWN |
Ubuntu | 23.10 | noarch | linux-starfive-headers-6.5.0-1014 | < 6.5.0-1014.15 | UNKNOWN |
Ubuntu | 23.10 | noarch | linux-starfive-tools-6.5.0-1014 | < 6.5.0-1014.15 | UNKNOWN |
Ubuntu | 23.10 | noarch | linux-tools-6.5.0-1014-starfive | < 6.5.0-1014.15 | UNKNOWN |
Ubuntu | 23.10 | noarch | linux-image-6.5.0-1016-laptop | < 6.5.0-1016.19 | UNKNOWN |
ubuntu.com/security/CVE-2023-47233
ubuntu.com/security/CVE-2023-52601
ubuntu.com/security/CVE-2023-52602
ubuntu.com/security/CVE-2023-52604
ubuntu.com/security/CVE-2023-52615
ubuntu.com/security/CVE-2024-2201
ubuntu.com/security/CVE-2024-26614
ubuntu.com/security/CVE-2024-26622
ubuntu.com/security/CVE-2024-26635
ubuntu.com/security/CVE-2024-26704
ubuntu.com/security/CVE-2024-26801
ubuntu.com/security/CVE-2024-26805
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
18.0%