Ubuntu Linux Kernel Multiple Vulnerabilities
Multiple vulnerabilities were identified in Ubuntu Linux Kernel. An attacker could exploit some of these vulnerabilities to trigger security restriction bypass, denial of service condition, elevation of privilege, remote code execution, sensitive information disclosure and data manipulation on the targeted system.
Note:
CVE-2024-50302 is being exploited in the wild. This vulnerability allows an attacker to use a malicious input device to read information from the report buffer. This could be used to leak kernel memory, enabling the exploitation of additional vulnerabilities. Since the exploitation requires physical connection to malicious hardware, the risk level remains Medium.
CVE-2024-53150 is being exploited in the wild. This vulnerability allows an attacker to send incorrect information about its clock settings by using a fake USB audio device, which cause out-of-bounds reads.
CVE-2024-53197 is being exploited in the wild. This vulnerability allows an attacker to provide a misleading number by using a fake sound device, which cause out-of-bounds accesses.
[Updated on 2025-06-04]
Updated Solutions, Vulnerability Identifier and Related Links.
RISK: High Risk
TYPE: Operating Systems – Linux

Impact
- Denial of Service
- Elevation of Privilege
- Remote Code Execution
- Information Disclosure
- Data Manipulation
- Security Restriction Bypass
System / Technologies affected
- Ubuntu 16.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 24.04 LTS
Solutions
Before installation of the software, please visit the vendor web-site for more details.
Apply fixes issued by the vendor:
- https://ubuntu.com/security/notices/LSN-0112-1
- https://ubuntu.com/security/notices/USN-7510-8
- https://ubuntu.com/security/notices/USN-7513-5
- https://ubuntu.com/security/notices/USN-7516-7
- https://ubuntu.com/security/notices/USN-7516-8
- https://ubuntu.com/security/notices/USN-7516-9
- https://ubuntu.com/security/notices/USN-7550-1
- https://ubuntu.com/security/notices/USN-7550-2
- https://ubuntu.com/security/notices/USN-7550-3
Vulnerability Identifier
- CVE-2021-47191
- CVE-2021-47506
- CVE-2022-0995
- CVE-2023-52664
- CVE-2023-52741
- CVE-2024-26689
- CVE-2024-26982
- CVE-2024-26996
- CVE-2024-35864
- CVE-2024-36476
- CVE-2024-38608
- CVE-2024-39282
- CVE-2024-41013
- CVE-2024-47408
- CVE-2024-47726
- CVE-2024-47736
- CVE-2024-49568
- CVE-2024-49571
- CVE-2024-50055
- CVE-2024-50302
- CVE-2024-53063
- CVE-2024-53125
- CVE-2024-53150
- CVE-2024-53168
- CVE-2024-53179
- CVE-2024-53197
- CVE-2024-53685
- CVE-2024-53687
- CVE-2024-53690
- CVE-2024-54193
- CVE-2024-54455
- CVE-2024-54460
- CVE-2024-54683
- CVE-2024-55639
- CVE-2024-55881
- CVE-2024-55916
- CVE-2024-56369
- CVE-2024-56372
- CVE-2024-56551
- CVE-2024-56593
- CVE-2024-56595
- CVE-2024-56598
- CVE-2024-56599
- CVE-2024-56608
- CVE-2024-56652
- CVE-2024-56653
- CVE-2024-56654
- CVE-2024-56656
- CVE-2024-56657
- CVE-2024-56659
- CVE-2024-56660
- CVE-2024-56662
- CVE-2024-56664
- CVE-2024-56665
- CVE-2024-56667
- CVE-2024-56670
- CVE-2024-56675
- CVE-2024-56709
- CVE-2024-56710
- CVE-2024-56715
- CVE-2024-56716
- CVE-2024-56717
- CVE-2024-56718
- CVE-2024-56721
- CVE-2024-56758
- CVE-2024-56759
- CVE-2024-56760
- CVE-2024-56761
- CVE-2024-56763
- CVE-2024-56764
- CVE-2024-56767
- CVE-2024-56769
- CVE-2024-56770
- CVE-2024-57791
- CVE-2024-57792
- CVE-2024-57793
- CVE-2024-57798
- CVE-2024-57801
- CVE-2024-57802
- CVE-2024-57804
- CVE-2024-57805
- CVE-2024-57806
- CVE-2024-57807
- CVE-2024-57834
- CVE-2024-57841
- CVE-2024-57879
- CVE-2024-57882
- CVE-2024-57883
- CVE-2024-57884
- CVE-2024-57885
- CVE-2024-57887
- CVE-2024-57888
- CVE-2024-57889
- CVE-2024-57890
- CVE-2024-57892
- CVE-2024-57893
- CVE-2024-57895
- CVE-2024-57896
- CVE-2024-57897
- CVE-2024-57898
- CVE-2024-57899
- CVE-2024-57900
- CVE-2024-57901
- CVE-2024-57902
- CVE-2024-57903
- CVE-2024-57904
- CVE-2024-57906
- CVE-2024-57907
- CVE-2024-57908
- CVE-2024-57910
- CVE-2024-57911
- CVE-2024-57912
- CVE-2024-57913
- CVE-2024-57916
- CVE-2024-57917
- CVE-2024-57925
- CVE-2024-57926
- CVE-2024-57929
- CVE-2024-57931
- CVE-2024-57932
- CVE-2024-57933
- CVE-2024-57938
- CVE-2024-57939
- CVE-2024-57940
- CVE-2024-57945
- CVE-2024-57946
- CVE-2024-57973
- CVE-2024-57977
- CVE-2024-57978
- CVE-2024-57979
- CVE-2024-57980
- CVE-2024-57981
- CVE-2024-57986
- CVE-2024-58001
- CVE-2024-58002
- CVE-2024-58005
- CVE-2024-58007
- CVE-2024-58009
- CVE-2024-58010
- CVE-2024-58014
- CVE-2024-58016
- CVE-2024-58017
- CVE-2024-58020
- CVE-2024-58034
- CVE-2024-58051
- CVE-2024-58052
- CVE-2024-58055
- CVE-2024-58058
- CVE-2024-58063
- CVE-2024-58069
- CVE-2024-58071
- CVE-2024-58072
- CVE-2024-58076
- CVE-2024-58079
- CVE-2024-58083
- CVE-2024-58085
- CVE-2024-58086
- CVE-2024-58087
- CVE-2024-58090
- CVE-2024-58237
- CVE-2025-21631
- CVE-2025-21632
- CVE-2025-21634
- CVE-2025-21635
- CVE-2025-21636
- CVE-2025-21637
- CVE-2025-21638
- CVE-2025-21639
- CVE-2025-21640
- CVE-2025-21642
- CVE-2025-21643
- CVE-2025-21645
- CVE-2025-21646
- CVE-2025-21647
- CVE-2025-21648
- CVE-2025-21649
- CVE-2025-21650
- CVE-2025-21651
- CVE-2025-21652
- CVE-2025-21653
- CVE-2025-21654
- CVE-2025-21655
- CVE-2025-21656
- CVE-2025-21658
- CVE-2025-21659
- CVE-2025-21660
- CVE-2025-21662
- CVE-2025-21663
- CVE-2025-21664
- CVE-2025-21684
- CVE-2025-21704
- CVE-2025-21707
- CVE-2025-21708
- CVE-2025-21711
- CVE-2025-21715
- CVE-2025-21718
- CVE-2025-21719
- CVE-2025-21721
- CVE-2025-21722
- CVE-2025-21726
- CVE-2025-21727
- CVE-2025-21728
- CVE-2025-21731
- CVE-2025-21735
- CVE-2025-21736
- CVE-2025-21744
- CVE-2025-21745
- CVE-2025-21748
- CVE-2025-21749
- CVE-2025-21753
- CVE-2025-21758
- CVE-2025-21760
- CVE-2025-21761
- CVE-2025-21762
- CVE-2025-21763
- CVE-2025-21764
- CVE-2025-21765
- CVE-2025-21766
- CVE-2025-21767
- CVE-2025-21772
- CVE-2025-21776
- CVE-2025-21779
- CVE-2025-21781
- CVE-2025-21782
- CVE-2025-21785
- CVE-2025-21787
- CVE-2025-21791
- CVE-2025-21795
- CVE-2025-21796
- CVE-2025-21799
- CVE-2025-21802
- CVE-2025-21804
- CVE-2025-21806
- CVE-2025-21811
- CVE-2025-21814
- CVE-2025-21820
- CVE-2025-21823
- CVE-2025-21826
- CVE-2025-21830
- CVE-2025-21835
- CVE-2025-21844
- CVE-2025-21846
- CVE-2025-21848
- CVE-2025-21858
- CVE-2025-21859
- CVE-2025-21862
- CVE-2025-21865
- CVE-2025-21866
- CVE-2025-21871
- CVE-2025-21875
- CVE-2025-21877
- CVE-2025-21878
- CVE-2025-21887
- CVE-2025-21898
- CVE-2025-21904
- CVE-2025-21905
- CVE-2025-21909
- CVE-2025-21910
- CVE-2025-21912
- CVE-2025-21914
- CVE-2025-21916
- CVE-2025-21917
- CVE-2025-21919
- CVE-2025-21920
- CVE-2025-21922
- CVE-2025-21924
- CVE-2025-21925
- CVE-2025-21926
- CVE-2025-21928
- CVE-2025-21934
- CVE-2025-21935
- CVE-2025-21938
- CVE-2025-21943
- CVE-2025-21948
- CVE-2025-21950
- CVE-2025-21951
- CVE-2025-21971
Source
Related Link
- https://ubuntu.com/security/notices/LSN-0112-1
- https://ubuntu.com/security/notices/USN-7510-8
- https://ubuntu.com/security/notices/USN-7513-5
- https://ubuntu.com/security/notices/USN-7516-7
- https://ubuntu.com/security/notices/USN-7516-8
- https://ubuntu.com/security/notices/USN-7516-9
- https://ubuntu.com/security/notices/USN-7550-1
- https://ubuntu.com/security/notices/USN-7550-2
- https://ubuntu.com/security/notices/USN-7550-3
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.