CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
18.7%
Zheng Wang discovered that the Broadcom FullMAC WLAN driver in the Linux
kernel contained a race condition during device removal, leading to a use-
after-free vulnerability. A physically proximate attacker could possibly
use this to cause a denial of service (system crash). (CVE-2023-47233)
It was discovered that the ATA over Ethernet (AoE) driver in the Linux
kernel contained a race condition, leading to a use-after-free
vulnerability. An attacker could use this to cause a denial of service or
possibly execute arbitrary code. (CVE-2023-6270)
It was discovered that the Atheros 802.11ac wireless driver did not
properly validate certain data structures, leading to a NULL pointer
dereference. An attacker could possibly use this to cause a denial of
service. (CVE-2023-7042)
It was discovered that the HugeTLB file system component of the Linux
Kernel contained a NULL pointer dereference vulnerability. A privileged
attacker could possibly use this to to cause a denial of service.
(CVE-2024-0841)
It was discovered that the Open vSwitch implementation in the Linux kernel
could overflow its stack during recursive action operations under certain
conditions. A local attacker could use this to cause a denial of service
(system crash). (CVE-2024-1151)
Sander Wiebing, Alvise de Faveri Tron, Herbert Bos, and Cristiano Giuffrida
discovered that the Linux kernel mitigations for the initial Branch History
Injection vulnerability (CVE-2022-0001) were insufficient for Intel
processors. A local attacker could potentially use this to expose sensitive
information. (CVE-2024-2201)
Yuxuan Hu discovered that the Bluetooth RFCOMM protocol driver in the Linux
Kernel contained a race condition, leading to a NULL pointer dereference.
An attacker could possibly use this to cause a denial of service (system
crash). (CVE-2024-22099)
Chenyuan Yang discovered that the RDS Protocol implementation in the Linux
kernel contained an out-of-bounds read vulnerability. An attacker could use
this to possibly cause a denial of service (system crash). (CVE-2024-23849)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 20.04 | noarch | linux-image-5.15.0-1058-intel-iotg | < 5.15.0-1058.64~20.04.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | linux-image-5.15.0-1058-intel-iotg-dbgsym | < 5.15.0-1058.64~20.04.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | linux-image-intel | < 5.15.0.1058.64~20.04.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | linux-cloud-tools-intel | < 5.15.0.1058.64~20.04.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | linux-headers-intel | < 5.15.0.1058.64~20.04.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | linux-headers-intel-iotg | < 5.15.0.1058.64~20.04.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | linux-headers-intel-iotg-edge | < 5.15.0.1058.64~20.04.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | linux-image-intel-iotg | < 5.15.0.1058.64~20.04.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | linux-image-intel-iotg-edge | < 5.15.0.1058.64~20.04.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | linux-intel | < 5.15.0.1058.64~20.04.1 | UNKNOWN |
ubuntu.com/security/CVE-2023-47233
ubuntu.com/security/CVE-2023-52434
ubuntu.com/security/CVE-2023-52435
ubuntu.com/security/CVE-2023-52447
ubuntu.com/security/CVE-2023-52486
ubuntu.com/security/CVE-2023-52489
ubuntu.com/security/CVE-2023-52491
ubuntu.com/security/CVE-2023-52492
ubuntu.com/security/CVE-2023-52493
ubuntu.com/security/CVE-2023-52494
ubuntu.com/security/CVE-2023-52497
ubuntu.com/security/CVE-2023-52498
ubuntu.com/security/CVE-2023-52530
ubuntu.com/security/CVE-2023-52583
ubuntu.com/security/CVE-2023-52587
ubuntu.com/security/CVE-2023-52588
ubuntu.com/security/CVE-2023-52594
ubuntu.com/security/CVE-2023-52595
ubuntu.com/security/CVE-2023-52597
ubuntu.com/security/CVE-2023-52598
ubuntu.com/security/CVE-2023-52599
ubuntu.com/security/CVE-2023-52601
ubuntu.com/security/CVE-2023-52602
ubuntu.com/security/CVE-2023-52604
ubuntu.com/security/CVE-2023-52606
ubuntu.com/security/CVE-2023-52607
ubuntu.com/security/CVE-2023-52608
ubuntu.com/security/CVE-2023-52614
ubuntu.com/security/CVE-2023-52615
ubuntu.com/security/CVE-2023-52616
ubuntu.com/security/CVE-2023-52617
ubuntu.com/security/CVE-2023-52618
ubuntu.com/security/CVE-2023-52619
ubuntu.com/security/CVE-2023-52620
ubuntu.com/security/CVE-2023-52622
ubuntu.com/security/CVE-2023-52623
ubuntu.com/security/CVE-2023-52627
ubuntu.com/security/CVE-2023-52631
ubuntu.com/security/CVE-2023-52633
ubuntu.com/security/CVE-2023-52635
ubuntu.com/security/CVE-2023-52637
ubuntu.com/security/CVE-2023-52638
ubuntu.com/security/CVE-2023-52640
ubuntu.com/security/CVE-2023-52641
ubuntu.com/security/CVE-2023-52642
ubuntu.com/security/CVE-2023-52643
ubuntu.com/security/CVE-2023-52644
ubuntu.com/security/CVE-2023-52645
ubuntu.com/security/CVE-2023-52650
ubuntu.com/security/CVE-2023-52652
ubuntu.com/security/CVE-2023-52656
ubuntu.com/security/CVE-2023-52662
ubuntu.com/security/CVE-2023-6270
ubuntu.com/security/CVE-2023-7042
ubuntu.com/security/CVE-2024-0841
ubuntu.com/security/CVE-2024-1151
ubuntu.com/security/CVE-2024-2201
ubuntu.com/security/CVE-2024-22099
ubuntu.com/security/CVE-2024-23849
ubuntu.com/security/CVE-2024-26583
ubuntu.com/security/CVE-2024-26584
ubuntu.com/security/CVE-2024-26585
ubuntu.com/security/CVE-2024-26592
ubuntu.com/security/CVE-2024-26593
ubuntu.com/security/CVE-2024-26594
ubuntu.com/security/CVE-2024-26600
ubuntu.com/security/CVE-2024-26601
ubuntu.com/security/CVE-2024-26602
ubuntu.com/security/CVE-2024-26603
ubuntu.com/security/CVE-2024-26606
ubuntu.com/security/CVE-2024-26608
ubuntu.com/security/CVE-2024-26610
ubuntu.com/security/CVE-2024-26614
ubuntu.com/security/CVE-2024-26615
ubuntu.com/security/CVE-2024-26622
ubuntu.com/security/CVE-2024-26625
ubuntu.com/security/CVE-2024-26627
ubuntu.com/security/CVE-2024-26635
ubuntu.com/security/CVE-2024-26636
ubuntu.com/security/CVE-2024-26640
ubuntu.com/security/CVE-2024-26641
ubuntu.com/security/CVE-2024-26644
ubuntu.com/security/CVE-2024-26645
ubuntu.com/security/CVE-2024-26651
ubuntu.com/security/CVE-2024-26659
ubuntu.com/security/CVE-2024-26660
ubuntu.com/security/CVE-2024-26663
ubuntu.com/security/CVE-2024-26664
ubuntu.com/security/CVE-2024-26665
ubuntu.com/security/CVE-2024-26668
ubuntu.com/security/CVE-2024-26671
ubuntu.com/security/CVE-2024-26673
ubuntu.com/security/CVE-2024-26675
ubuntu.com/security/CVE-2024-26676
ubuntu.com/security/CVE-2024-26679
ubuntu.com/security/CVE-2024-26684
ubuntu.com/security/CVE-2024-26685
ubuntu.com/security/CVE-2024-26688
ubuntu.com/security/CVE-2024-26689
ubuntu.com/security/CVE-2024-26695
ubuntu.com/security/CVE-2024-26696
ubuntu.com/security/CVE-2024-26697
ubuntu.com/security/CVE-2024-26698
ubuntu.com/security/CVE-2024-26702
ubuntu.com/security/CVE-2024-26704
ubuntu.com/security/CVE-2024-26707
ubuntu.com/security/CVE-2024-26712
ubuntu.com/security/CVE-2024-26715
ubuntu.com/security/CVE-2024-26717
ubuntu.com/security/CVE-2024-26720
ubuntu.com/security/CVE-2024-26722
ubuntu.com/security/CVE-2024-26733
ubuntu.com/security/CVE-2024-26735
ubuntu.com/security/CVE-2024-26736
ubuntu.com/security/CVE-2024-26737
ubuntu.com/security/CVE-2024-26743
ubuntu.com/security/CVE-2024-26744
ubuntu.com/security/CVE-2024-26747
ubuntu.com/security/CVE-2024-26748
ubuntu.com/security/CVE-2024-26749
ubuntu.com/security/CVE-2024-26750
ubuntu.com/security/CVE-2024-26751
ubuntu.com/security/CVE-2024-26752
ubuntu.com/security/CVE-2024-26754
ubuntu.com/security/CVE-2024-26763
ubuntu.com/security/CVE-2024-26764
ubuntu.com/security/CVE-2024-26766
ubuntu.com/security/CVE-2024-26769
ubuntu.com/security/CVE-2024-26771
ubuntu.com/security/CVE-2024-26772
ubuntu.com/security/CVE-2024-26773
ubuntu.com/security/CVE-2024-26774
ubuntu.com/security/CVE-2024-26776
ubuntu.com/security/CVE-2024-26777
ubuntu.com/security/CVE-2024-26778
ubuntu.com/security/CVE-2024-26779
ubuntu.com/security/CVE-2024-26782
ubuntu.com/security/CVE-2024-26787
ubuntu.com/security/CVE-2024-26788
ubuntu.com/security/CVE-2024-26790
ubuntu.com/security/CVE-2024-26791
ubuntu.com/security/CVE-2024-26792
ubuntu.com/security/CVE-2024-26793
ubuntu.com/security/CVE-2024-26795
ubuntu.com/security/CVE-2024-26798
ubuntu.com/security/CVE-2024-26801
ubuntu.com/security/CVE-2024-26802
ubuntu.com/security/CVE-2024-26803
ubuntu.com/security/CVE-2024-26804
ubuntu.com/security/CVE-2024-26805
ubuntu.com/security/CVE-2024-26808
ubuntu.com/security/CVE-2024-26809
ubuntu.com/security/CVE-2024-26816
ubuntu.com/security/CVE-2024-26820
ubuntu.com/security/CVE-2024-26825
ubuntu.com/security/CVE-2024-26826
ubuntu.com/security/CVE-2024-26829
ubuntu.com/security/CVE-2024-26833
ubuntu.com/security/CVE-2024-26835
ubuntu.com/security/CVE-2024-26838
ubuntu.com/security/CVE-2024-26839
ubuntu.com/security/CVE-2024-26840
ubuntu.com/security/CVE-2024-26843
ubuntu.com/security/CVE-2024-26845
ubuntu.com/security/CVE-2024-26846
ubuntu.com/security/CVE-2024-26851
ubuntu.com/security/CVE-2024-26852
ubuntu.com/security/CVE-2024-26855
ubuntu.com/security/CVE-2024-26856
ubuntu.com/security/CVE-2024-26857
ubuntu.com/security/CVE-2024-26859
ubuntu.com/security/CVE-2024-26861
ubuntu.com/security/CVE-2024-26862
ubuntu.com/security/CVE-2024-26863
ubuntu.com/security/CVE-2024-26870
ubuntu.com/security/CVE-2024-26872
ubuntu.com/security/CVE-2024-26874
ubuntu.com/security/CVE-2024-26875
ubuntu.com/security/CVE-2024-26877
ubuntu.com/security/CVE-2024-26878
ubuntu.com/security/CVE-2024-26879
ubuntu.com/security/CVE-2024-26880
ubuntu.com/security/CVE-2024-26881
ubuntu.com/security/CVE-2024-26882
ubuntu.com/security/CVE-2024-26883
ubuntu.com/security/CVE-2024-26884
ubuntu.com/security/CVE-2024-26885
ubuntu.com/security/CVE-2024-26889
ubuntu.com/security/CVE-2024-26891
ubuntu.com/security/CVE-2024-26894
ubuntu.com/security/CVE-2024-26895
ubuntu.com/security/CVE-2024-26897
ubuntu.com/security/CVE-2024-26898
ubuntu.com/security/CVE-2024-26901
ubuntu.com/security/CVE-2024-26903
ubuntu.com/security/CVE-2024-26906
ubuntu.com/security/CVE-2024-26907
ubuntu.com/security/CVE-2024-26910
ubuntu.com/security/CVE-2024-26915
ubuntu.com/security/CVE-2024-26916
ubuntu.com/security/CVE-2024-26920
ubuntu.com/security/CVE-2024-27024
ubuntu.com/security/CVE-2024-27028
ubuntu.com/security/CVE-2024-27030
ubuntu.com/security/CVE-2024-27034
ubuntu.com/security/CVE-2024-27037
ubuntu.com/security/CVE-2024-27038
ubuntu.com/security/CVE-2024-27039
ubuntu.com/security/CVE-2024-27043
ubuntu.com/security/CVE-2024-27044
ubuntu.com/security/CVE-2024-27045
ubuntu.com/security/CVE-2024-27046
ubuntu.com/security/CVE-2024-27047
ubuntu.com/security/CVE-2024-27051
ubuntu.com/security/CVE-2024-27052
ubuntu.com/security/CVE-2024-27053
ubuntu.com/security/CVE-2024-27054
ubuntu.com/security/CVE-2024-27065
ubuntu.com/security/CVE-2024-27073
ubuntu.com/security/CVE-2024-27074
ubuntu.com/security/CVE-2024-27075
ubuntu.com/security/CVE-2024-27076
ubuntu.com/security/CVE-2024-27077
ubuntu.com/security/CVE-2024-27078
ubuntu.com/security/CVE-2024-27388
ubuntu.com/security/CVE-2024-27390
ubuntu.com/security/CVE-2024-27403
ubuntu.com/security/CVE-2024-27405
ubuntu.com/security/CVE-2024-27410
ubuntu.com/security/CVE-2024-27412
ubuntu.com/security/CVE-2024-27413
ubuntu.com/security/CVE-2024-27414
ubuntu.com/security/CVE-2024-27415
ubuntu.com/security/CVE-2024-27416
ubuntu.com/security/CVE-2024-27417
ubuntu.com/security/CVE-2024-27419
ubuntu.com/security/CVE-2024-27431
ubuntu.com/security/CVE-2024-27432
ubuntu.com/security/CVE-2024-27436
ubuntu.com/security/CVE-2024-35811
ubuntu.com/security/CVE-2024-35828
ubuntu.com/security/CVE-2024-35829
ubuntu.com/security/CVE-2024-35830
ubuntu.com/security/CVE-2024-35844
ubuntu.com/security/CVE-2024-35845
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
18.7%