{"id":"USN-6688-1","summary":"linux-oem-6.1 vulnerabilities","details":"Pratyush Yadav discovered that the Xen network backend implementation in\nthe Linux kernel did not properly handle zero length data request, leading\nto a null pointer dereference vulnerability. An attacker in a guest VM\ncould possibly use this to cause a denial of service (host domain crash).\n(CVE-2023-46838)\n\nIt was discovered that the Habana's AI Processors driver in the Linux\nkernel did not properly initialize certain data structures before passing\nthem to user space. A local attacker could use this to expose sensitive\ninformation (kernel memory). (CVE-2023-50431)\n\nMurray McAllister discovered that the VMware Virtual GPU DRM driver in the\nLinux kernel did not properly handle memory objects when storing surfaces,\nleading to a use-after-free vulnerability. A local attacker in a guest VM\ncould use this to cause a denial of service (system crash) or possibly\nexecute arbitrary code. (CVE-2023-5633)\n\nIt was discovered that the CIFS network file system implementation in the\nLinux kernel did not properly validate certain SMB messages, leading to an\nout-of-bounds read vulnerability. An attacker could use this to cause a\ndenial of service (system crash) or possibly expose sensitive information.\n(CVE-2023-6610)\n\nIt was discovered that the VirtIO subsystem in the Linux kernel did not\nproperly initialize memory in some situations. A local attacker could use\nthis to possibly expose sensitive information (kernel memory).\n(CVE-2024-0340)\n\nLonial Con discovered that the netfilter subsystem in the Linux kernel did\nnot properly handle element deactivation in certain cases, leading to a\nuse-after-free vulnerability. A local attacker could use this to cause a\ndenial of service (system crash) or possibly execute arbitrary code.\n(CVE-2024-1085)\n\nNotselwyn discovered that the netfilter subsystem in the Linux kernel did\nnot properly handle verdict parameters in certain cases, leading to a use-\nafter-free vulnerability. A local attacker could use this to cause a denial\nof service (system crash) or possibly execute arbitrary code.\n(CVE-2024-1086)\n\nChenyuan Yang discovered that the RDS Protocol implementation in the Linux\nkernel contained an out-of-bounds read vulnerability. An attacker could use\nthis to possibly cause a denial of service (system crash). (CVE-2024-23849)\n\nIt was discovered that a race condition existed in the Bluetooth subsystem\nin the Linux kernel, leading to a null pointer dereference vulnerability. A\nprivileged local attacker could use this to possibly cause a denial of\nservice (system crash). (CVE-2024-24860)\n\nSeveral security issues were discovered in the Linux kernel.\nAn attacker could possibly use these to compromise the system.\nThis update corrects flaws in the following subsystems:\n  - Architecture specifics;\n  - Block layer;\n  - ACPI drivers;\n  - Android drivers;\n  - EDAC drivers;\n  - GPU drivers;\n  - InfiniBand drivers;\n  - Media drivers;\n  - Multifunction device drivers;\n  - MTD block device drivers;\n  - Network drivers;\n  - NVME drivers;\n  - PHY drivers;\n  - PWM drivers;\n  - SCSI drivers;\n  - SPMI drivers;\n  - TTY drivers;\n  - Userspace I/O drivers;\n  - Ceph distributed file system;\n  - EFI Variable file system;\n  - Ext4 file system;\n  - F2FS file system;\n  - GFS2 file system;\n  - JFS file system;\n  - SMB network file system;\n  - BPF subsystem;\n  - Logical Link Layer;\n  - Netfilter;\n  - Unix domain sockets;\n  - AppArmor security module;\n(CVE-2024-26599, CVE-2023-52604, CVE-2023-52439, CVE-2024-26627,\nCVE-2024-26601, CVE-2024-26628, CVE-2023-52607, CVE-2023-52456,\nCVE-2023-52602, CVE-2023-52443, CVE-2023-52599, CVE-2023-52603,\nCVE-2024-26588, CVE-2024-26581, CVE-2023-52600, CVE-2024-26624,\nCVE-2023-52584, CVE-2024-26625, CVE-2023-52606, CVE-2023-52463,\nCVE-2023-52464, CVE-2023-52597, CVE-2023-52595, CVE-2023-52458,\nCVE-2023-52457, CVE-2023-52438, CVE-2023-52469, CVE-2023-52462,\nCVE-2024-26589, CVE-2024-26592, CVE-2024-26594, CVE-2023-52601,\nCVE-2023-52593, CVE-2023-52436, CVE-2023-52447, CVE-2023-52587,\nCVE-2023-52445, CVE-2023-52454, CVE-2023-52451, CVE-2023-52605,\nCVE-2024-26597, CVE-2023-52448, CVE-2023-52598, CVE-2024-26591,\nCVE-2023-52449, CVE-2023-52444, CVE-2023-52583, CVE-2023-52589,\nCVE-2024-26598, CVE-2023-52470, CVE-2023-52594, CVE-2023-52588,\nCVE-2023-52467, CVE-2024-26600)\n","modified":"2026-02-10T04:43:37Z","published":"2024-03-11T20:17:36Z","related":["UBUNTU-CVE-2023-46838","UBUNTU-CVE-2023-50431","UBUNTU-CVE-2023-52436","UBUNTU-CVE-2023-52438","UBUNTU-CVE-2023-52439","UBUNTU-CVE-2023-52443","UBUNTU-CVE-2023-52444","UBUNTU-CVE-2023-52445","UBUNTU-CVE-2023-52447","UBUNTU-CVE-2023-52448","UBUNTU-CVE-2023-52449","UBUNTU-CVE-2023-52451","UBUNTU-CVE-2023-52454","UBUNTU-CVE-2023-52456","UBUNTU-CVE-2023-52457","UBUNTU-CVE-2023-52458","UBUNTU-CVE-2023-52462","UBUNTU-CVE-2023-52463","UBUNTU-CVE-2023-52464","UBUNTU-CVE-2023-52467","UBUNTU-CVE-2023-52469","UBUNTU-CVE-2023-52470","UBUNTU-CVE-2023-52583","UBUNTU-CVE-2023-52584","UBUNTU-CVE-2023-52587","UBUNTU-CVE-2023-52588","UBUNTU-CVE-2023-52589","UBUNTU-CVE-2023-52593","UBUNTU-CVE-2023-52594","UBUNTU-CVE-2023-52595","UBUNTU-CVE-2023-52597","UBUNTU-CVE-2023-52598","UBUNTU-CVE-2023-52599","UBUNTU-CVE-2023-52600","UBUNTU-CVE-2023-52601","UBUNTU-CVE-2023-52602","UBUNTU-CVE-2023-52603","UBUNTU-CVE-2023-52604","UBUNTU-CVE-2023-52605","UBUNTU-CVE-2023-52606","UBUNTU-CVE-2023-52607","UBUNTU-CVE-2023-5633","UBUNTU-CVE-2023-6610","UBUNTU-CVE-2024-0340","UBUNTU-CVE-2024-1085","UBUNTU-CVE-2024-1086","UBUNTU-CVE-2024-23849","UBUNTU-CVE-2024-24860","UBUNTU-CVE-2024-26581","UBUNTU-CVE-2024-26588","UBUNTU-CVE-2024-26589","UBUNTU-CVE-2024-26591","UBUNTU-CVE-2024-26592","UBUNTU-CVE-2024-26594","UBUNTU-CVE-2024-26597","UBUNTU-CVE-2024-26598","UBUNTU-CVE-2024-26599","UBUNTU-CVE-2024-26600","UBUNTU-CVE-2024-26601","UBUNTU-CVE-2024-26624","UBUNTU-CVE-2024-26625","UBUNTU-CVE-2024-26627","UBUNTU-CVE-2024-26628"],"upstream":["CVE-2023-46838","CVE-2023-50431","CVE-2023-52436","CVE-2023-52438","CVE-2023-52439","CVE-2023-52443","CVE-2023-52444","CVE-2023-52445","CVE-2023-52447","CVE-2023-52448","CVE-2023-52449","CVE-2023-52451","CVE-2023-52454","CVE-2023-52456","CVE-2023-52457","CVE-2023-52458","CVE-2023-52462","CVE-2023-52463","CVE-2023-52464","CVE-2023-52467","CVE-2023-52469","CVE-2023-52470","CVE-2023-52583","CVE-2023-52584","CVE-2023-52587","CVE-2023-52588","CVE-2023-52589","CVE-2023-52593","CVE-2023-52594","CVE-2023-52595","CVE-2023-52597","CVE-2023-52598","CVE-2023-52599","CVE-2023-52600","CVE-2023-52601","CVE-2023-52602","CVE-2023-52603","CVE-2023-52604","CVE-2023-52605","CVE-2023-52606","CVE-2023-52607","CVE-2023-5633","CVE-2023-6610","CVE-2024-0340","CVE-2024-1085","CVE-2024-1086","CVE-2024-23849","CVE-2024-24860","CVE-2024-26581","CVE-2024-26588","CVE-2024-26589","CVE-2024-26591","CVE-2024-26592","CVE-2024-26594","CVE-2024-26597","CVE-2024-26598","CVE-2024-26599","CVE-2024-26600","CVE-2024-26601","CVE-2024-26624","CVE-2024-26625","CVE-2024-26627","CVE-2024-26628","UBUNTU-CVE-2023-46838","UBUNTU-CVE-2023-50431","UBUNTU-CVE-2023-52436","UBUNTU-CVE-2023-52438","UBUNTU-CVE-2023-52439","UBUNTU-CVE-2023-52443","UBUNTU-CVE-2023-52444","UBUNTU-CVE-2023-52445","UBUNTU-CVE-2023-52447","UBUNTU-CVE-2023-52448","UBUNTU-CVE-2023-52449","UBUNTU-CVE-2023-52451","UBUNTU-CVE-2023-52454","UBUNTU-CVE-2023-52456","UBUNTU-CVE-2023-52457","UBUNTU-CVE-2023-52458","UBUNTU-CVE-2023-52462","UBUNTU-CVE-2023-52463","UBUNTU-CVE-2023-52464","UBUNTU-CVE-2023-52467","UBUNTU-CVE-2023-52469","UBUNTU-CVE-2023-52470","UBUNTU-CVE-2023-52583","UBUNTU-CVE-2023-52584","UBUNTU-CVE-2023-52587","UBUNTU-CVE-2023-52588","UBUNTU-CVE-2023-52589","UBUNTU-CVE-2023-52593","UBUNTU-CVE-2023-52594","UBUNTU-CVE-2023-52595","UBUNTU-CVE-2023-52597","UBUNTU-CVE-2023-52598","UBUNTU-CVE-2023-52599","UBUNTU-CVE-2023-52600","UBUNTU-CVE-2023-52601","UBUNTU-CVE-2023-52602","UBUNTU-CVE-2023-52603","UBUNTU-CVE-2023-52604","UBUNTU-CVE-2023-52605","UBUNTU-CVE-2023-52606","UBUNTU-CVE-2023-52607","UBUNTU-CVE-2023-5633","UBUNTU-CVE-2023-6610","UBUNTU-CVE-2024-0340","UBUNTU-CVE-2024-1085","UBUNTU-CVE-2024-1086","UBUNTU-CVE-2024-23849","UBUNTU-CVE-2024-24860","UBUNTU-CVE-2024-26581","UBUNTU-CVE-2024-26588","UBUNTU-CVE-2024-26589","UBUNTU-CVE-2024-26591","UBUNTU-CVE-2024-26592","UBUNTU-CVE-2024-26594","UBUNTU-CVE-2024-26597","UBUNTU-CVE-2024-26598","UBUNTU-CVE-2024-26599","UBUNTU-CVE-2024-26600","UBUNTU-CVE-2024-26601","UBUNTU-CVE-2024-26624","UBUNTU-CVE-2024-26625","UBUNTU-CVE-2024-26627","UBUNTU-CVE-2024-26628"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6688-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-5633"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-6610"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-46838"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-50431"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52436"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52438"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52439"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52443"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52444"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52445"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52447"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52448"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52449"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52451"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52454"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52456"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52457"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52458"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52462"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52463"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52464"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52467"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52469"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52470"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52583"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52584"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52587"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52588"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52589"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52593"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52594"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52595"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52597"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52598"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52599"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52600"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52601"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52602"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52603"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52604"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52605"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52606"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52607"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-0340"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-1085"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-1086"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-23849"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-24860"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26581"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26588"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26589"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26591"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26592"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26594"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26597"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26598"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26599"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26600"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26601"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26624"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26625"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26627"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26628"}],"affected":[{"package":{"name":"linux-oem-6.1","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/linux-oem-6.1@6.1.0-1035.35?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.1.0-1035.35"}]}],"versions":["6.1.0-1004.4","6.1.0-1006.6","6.1.0-1007.7","6.1.0-1008.8","6.1.0-1009.9","6.1.0-1010.10","6.1.0-1012.12","6.1.0-1013.13","6.1.0-1014.14","6.1.0-1015.15","6.1.0-1016.16","6.1.0-1017.17","6.1.0-1019.19","6.1.0-1020.20","6.1.0-1021.21","6.1.0-1022.22","6.1.0-1023.23","6.1.0-1024.24","6.1.0-1025.25","6.1.0-1026.26","6.1.0-1027.27","6.1.0-1028.28","6.1.0-1029.29","6.1.0-1033.33","6.1.0-1034.34"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"linux-buildinfo-6.1.0-1035-oem","binary_version":"6.1.0-1035.35"},{"binary_name":"linux-headers-6.1.0-1035-oem","binary_version":"6.1.0-1035.35"},{"binary_name":"linux-image-unsigned-6.1.0-1035-oem","binary_version":"6.1.0-1035.35"},{"binary_name":"linux-modules-6.1.0-1035-oem","binary_version":"6.1.0-1035.35"},{"binary_name":"linux-modules-ipu6-6.1.0-1035-oem","binary_version":"6.1.0-1035.35"},{"binary_name":"linux-modules-ivsc-6.1.0-1035-oem","binary_version":"6.1.0-1035.35"},{"binary_name":"linux-modules-iwlwifi-6.1.0-1035-oem","binary_version":"6.1.0-1035.35"},{"binary_name":"linux-oem-6.1-headers-6.1.0-1035","binary_version":"6.1.0-1035.35"},{"binary_name":"linux-oem-6.1-tools-6.1.0-1035","binary_version":"6.1.0-1035.35"},{"binary_name":"linux-oem-6.1-tools-host","binary_version":"6.1.0-1035.35"},{"binary_name":"linux-tools-6.1.0-1035-oem","binary_version":"6.1.0-1035.35"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:22.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2023-5633"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-6610"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-46838"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-50431"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-52436"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-52438"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-52439"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-52443"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-52444"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-52445"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2023-52447"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-52448"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-52449"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-52451"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-52454"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-52456"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-52457"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-52458"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-52462"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-52463"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-52464"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2023-52467"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2023-52469"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2023-52470"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"negligible"}],"id":"CVE-2023-52583"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-52584"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-52587"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-52588"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-52589"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-52593"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-52594"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-52595"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-52597"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-52598"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-52599"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-52600"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-52601"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-52602"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-52603"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-52604"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-52605"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-52606"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2023-52607"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2024-0340"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2024-1085"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2024-1086"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2024-23849"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:L/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2024-24860"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2024-26581"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-26588"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-26589"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-26591"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-26592"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-26594"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2024-26597"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-26598"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-26599"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-26600"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-26601"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-26624"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-26625"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-26627"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-26628"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6688-1.json"}}],"schema_version":"1.7.3"}