Ubuntu Linux Kernel Multiple Vulnerabilities
Multiple vulnerabilities were identified in Ubuntu Linux Kernel. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, remote code execution and sensitive information disclosure on the targeted system.
[Updated on 2024-08-02]
Updated System / Technologies affected, Solutions, Vulnerability Identifier and Related Links.
[Updated on 2024-08-12]
Updated Risk Level, Solutions, Vulnerability Identifier and Related Links.
[Updated on 2024-08-13]
Updated Solutions and Related Links.
[Updated on 2024-08-14]
Updated Solutions and Related Links.
[Updated on 2024-08-16]
Updated Solutions and Related Links.
[Updated on 2024-08-21]
Updated Solutions and Related Links.
[Updated on 2024-08-23]
Updated Solutions, Vulnerability Identifier and Related Links.
[Updated on 2024-08-26]
Updated Solutions and Related Links.
[Updated on 2024-08-30]
Updated Solutions and Related Links.
Note:
Exploit in the wild has been detected for CVE-2024-36971. The vulnerability potentially allows an attacker with System execution privileges to perform remote code execution in kernel. The risk level is rated to High Risk.
RISK: High Risk
TYPE: Operating Systems – Linux
Impact
- Denial of Service
- Remote Code Execution
- Information Disclosure
System / Technologies affected
- Ubuntu 14.04 ESM
- Ubuntu 16.04 ESM
- Ubuntu 18.04 ESM
- Ubuntu 20.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 24.04 LTS
Solutions
Before installation of the software, please visit the vendor web-site for more details.
Apply fixes issued by the vendor:
- https://ubuntu.com/security/notices/USN-6921-2
- https://ubuntu.com/security/notices/USN-6922-2
- https://ubuntu.com/security/notices/USN-6923-2
- https://ubuntu.com/security/notices/USN-6924-2
- https://ubuntu.com/security/notices/USN-6926-2
- https://ubuntu.com/security/notices/USN-6927-1
- https://ubuntu.com/security/notices/USN-6938-1
- https://ubuntu.com/security/notices/USN-6951-1
- https://ubuntu.com/security/notices/USN-6950-1
- https://ubuntu.com/security/notices/USN-6949-1
- https://ubuntu.com/security/notices/USN-6953-1
- https://ubuntu.com/security/notices/USN-6926-3
- https://ubuntu.com/security/notices/USN-6949-2
- https://ubuntu.com/security/notices/USN-6950-2
- https://ubuntu.com/security/notices/USN-6950-3
- https://ubuntu.com/security/notices/USN-6955-1
- https://ubuntu.com/security/notices/USN-6956-1
- https://ubuntu.com/security/notices/USN-6957-1
- https://ubuntu.com/security/notices/USN-6951-2
- https://ubuntu.com/security/notices/USN-6951-3
- https://ubuntu.com/security/notices/USN-6950-4
- https://ubuntu.com/security/notices/USN-6951-4
- https://ubuntu.com/security/notices/USN-6971-1
- https://ubuntu.com/security/notices/USN-6972-1
- https://ubuntu.com/security/notices/USN-6972-2
- https://ubuntu.com/security/notices/USN-6972-3
- https://ubuntu.com/security/notices/USN-6973-1
- https://ubuntu.com/security/notices/USN-6973-2
- https://ubuntu.com/security/notices/USN-6974-1
- https://ubuntu.com/security/notices/USN-6974-2
- https://ubuntu.com/security/notices/USN-6975-1
- https://ubuntu.com/security/notices/USN-6979-1
- https://ubuntu.com/security/notices/USN-6972-4
Vulnerability Identifier
- CVE-2021-37159
- CVE-2021-46904
- CVE-2021-46926
- CVE-2021-47131
- CVE-2022-48655
- CVE-2022-48674
- CVE-2022-48772
- CVE-2023-52434
- CVE-2023-52470
- CVE-2023-52585
- CVE-2023-52629
- CVE-2023-52644
- CVE-2023-52752
- CVE-2023-52760
- CVE-2023-52806
- CVE-2023-52882
- CVE-2024-22099
- CVE-2024-24860
- CVE-2024-26583
- CVE-2024-26584
- CVE-2024-26585
- CVE-2024-26600
- CVE-2024-26654
- CVE-2024-26679
- CVE-2024-26680
- CVE-2024-26687
- CVE-2024-26830
- CVE-2024-26886
- CVE-2024-26900
- CVE-2024-26903
- CVE-2024-26907
- CVE-2024-26921
- CVE-2024-26929
- CVE-2024-26936
- CVE-2024-26980
- CVE-2024-27019
- CVE-2024-27398
- CVE-2024-27399
- CVE-2024-27401
- CVE-2024-31076
- CVE-2024-33621
- CVE-2024-35835
- CVE-2024-35848
- CVE-2024-35947
- CVE-2024-35955
- CVE-2024-35976
- CVE-2024-36014
- CVE-2024-36015
- CVE-2024-36016
- CVE-2024-36017
- CVE-2024-36031
- CVE-2024-36270
- CVE-2024-36286
- CVE-2024-36880
- CVE-2024-36883
- CVE-2024-36886
- CVE-2024-36889
- CVE-2024-36901
- CVE-2024-36902
- CVE-2024-36904
- CVE-2024-36905
- CVE-2024-36906
- CVE-2024-36916
- CVE-2024-36919
- CVE-2024-36928
- CVE-2024-36929
- CVE-2024-36931
- CVE-2024-36933
- CVE-2024-36934
- CVE-2024-36937
- CVE-2024-36938
- CVE-2024-36939
- CVE-2024-36940
- CVE-2024-36941
- CVE-2024-36944
- CVE-2024-36946
- CVE-2024-36947
- CVE-2024-36950
- CVE-2024-36952
- CVE-2024-36953
- CVE-2024-36954
- CVE-2024-36955
- CVE-2024-36957
- CVE-2024-36959
- CVE-2024-36960
- CVE-2024-36964
- CVE-2024-36965
- CVE-2024-36967
- CVE-2024-36969
- CVE-2024-36971
- CVE-2024-36975
- CVE-2024-37353
- CVE-2024-37356
- CVE-2024-38381
- CVE-2024-38549
- CVE-2024-38552
- CVE-2024-38558
- CVE-2024-38559
- CVE-2024-38560
- CVE-2024-38565
- CVE-2024-38567
- CVE-2024-38578
- CVE-2024-38579
- CVE-2024-38582
- CVE-2024-38583
- CVE-2024-38587
- CVE-2024-38589
- CVE-2024-38596
- CVE-2024-38598
- CVE-2024-38599
- CVE-2024-38600
- CVE-2024-38601
- CVE-2024-38607
- CVE-2024-38612
- CVE-2024-38613
- CVE-2024-38615
- CVE-2024-38618
- CVE-2024-38621
- CVE-2024-38627
- CVE-2024-38633
- CVE-2024-38634
- CVE-2024-38635
- CVE-2024-38637
- CVE-2024-38659
- CVE-2024-38661
- CVE-2024-38780
- CVE-2024-39276
- CVE-2024-39292
- CVE-2024-39301
- CVE-2024-39467
- CVE-2024-39471
- CVE-2024-39475
- CVE-2024-39480
- CVE-2024-39484
- CVE-2024-39488
- CVE-2024-39489
- CVE-2024-39493
Source
Related Link
- https://ubuntu.com/security/notices/USN-6921-2
- https://ubuntu.com/security/notices/USN-6922-2
- https://ubuntu.com/security/notices/USN-6923-2
- https://ubuntu.com/security/notices/USN-6924-2
- https://ubuntu.com/security/notices/USN-6926-2
- https://ubuntu.com/security/notices/USN-6927-1
- https://ubuntu.com/security/notices/USN-6938-1
- https://ubuntu.com/security/notices/USN-6951-1
- https://ubuntu.com/security/notices/USN-6950-1
- https://ubuntu.com/security/notices/USN-6949-1
- https://ubuntu.com/security/notices/USN-6953-1
- https://ubuntu.com/security/notices/USN-6926-3
- https://ubuntu.com/security/notices/USN-6949-2
- https://ubuntu.com/security/notices/USN-6950-2
- https://ubuntu.com/security/notices/USN-6950-3
- https://ubuntu.com/security/notices/USN-6955-1
- https://ubuntu.com/security/notices/USN-6956-1
- https://ubuntu.com/security/notices/USN-6957-1
- https://ubuntu.com/security/notices/USN-6951-2
- https://ubuntu.com/security/notices/USN-6951-3
- https://ubuntu.com/security/notices/USN-6950-4
- https://ubuntu.com/security/notices/USN-6951-4
- https://ubuntu.com/security/notices/USN-6971-1
- https://ubuntu.com/security/notices/USN-6972-1
- https://ubuntu.com/security/notices/USN-6972-2
- https://ubuntu.com/security/notices/USN-6972-3
- https://ubuntu.com/security/notices/USN-6973-1
- https://ubuntu.com/security/notices/USN-6973-2
- https://ubuntu.com/security/notices/USN-6974-1
- https://ubuntu.com/security/notices/USN-6974-2
- https://ubuntu.com/security/notices/USN-6975-1
- https://ubuntu.com/security/notices/USN-6979-1
- https://ubuntu.com/security/notices/USN-6972-4
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.