[USN-6124-1] Linux kernel (OEM) vulnerabilities
Several security issues were fixed in the Linux kernel.
Patryk Sondej and Piotr Krysiuk discovered that a race condition existed in
the netfilter subsystem of the Linux kernel when processing batch requests,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-32233)
Reima Ishii discovered that the nested KVM implementation for Intel x86
processors in the Linux kernel did not properly validate control registers
in certain situations. An attacker in a guest VM could use this to cause a
denial of service (guest crash). (CVE-2023-30456)
Gwnaun Jung discovered that the SFB packet scheduling implementation in the
Linux kernel contained a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2022-3586)
It was discovered that the Intel i915 graphics driver in the Linux kernel
did not perform a GPU TLB flush in some situations. A local attacker could
use this to cause a denial of service or possibly execute arbitrary code.
(CVE-2022-4139)
It was discovered that the Xircom PCMCIA network device driver in the Linux
kernel did not properly handle device removal events. A physically
proximate attacker could use this to cause a denial of service (system
crash). (CVE-2023-1670)
Jean-Baptiste Cayrou discovered that the shiftfs file system in the Ubuntu
Linux kernel contained a race condition when handling inode locking in some
situations. A local attacker could use this to cause a denial of service
(kernel deadlock). (CVE-2023-2612)
- ID
- USN-6124-1
- Severity
- high
- Severity from
- CVE-2022-4139
- URL
- https://ubuntu.com/security/notices/USN-6124-1
- Published
-
2023-05-30T17:40:56
(15 months ago) - Modified
-
2023-05-30T17:40:56
(15 months ago) - Other Advisories
-
- ALAS-2023-1750
- ALAS-2024-1942
- ALAS2-2022-1852
- ALAS2-2023-2050
- ALAS2-2024-2581
- ALPINE:CVE-2023-32233
- ALSA-2023:0101
- ALSA-2023:0334
- ALSA-2023:3349
- ALSA-2023:3723
- ALSA-2023:7077
- DSA-5402-1
- ELSA-2022-10108
- ELSA-2023-0101
- ELSA-2023-0334
- ELSA-2023-12116
- ELSA-2023-12119
- ELSA-2023-12120
- ELSA-2023-12121
- ELSA-2023-12339
- ELSA-2023-12375
- ELSA-2023-12393
- ELSA-2023-12394
- ELSA-2023-12412
- ELSA-2023-12413
- ELSA-2023-3349
- ELSA-2023-3723
- ELSA-2023-5622
- ELSA-2023-6583
- ELSA-2023-7077
- FEDORA-2022-24041b1667
- FEDORA-2022-b36cd53dca
- FEDORA-2022-e4460c41bc
- MS:CVE-2022-3586
- RHSA-2023:0101
- RHSA-2023:0114
- RHSA-2023:0123
- RHSA-2023:0300
- RHSA-2023:0334
- RHSA-2023:0348
- RHSA-2023:3349
- RHSA-2023:3350
- RHSA-2023:3351
- RHSA-2023:3705
- RHSA-2023:3708
- RHSA-2023:3723
- RHSA-2023:5574
- RHSA-2023:5621
- RHSA-2023:5622
- RHSA-2023:6901
- RHSA-2023:7077
- RLSA-2023:0101
- RLSA-2023:0334
- SSA:2022-333-01
- SSA:2023-172-02
- SUSE-SU-2022:3897-1
- SUSE-SU-2022:3929-1
- SUSE-SU-2022:3930-1
- SUSE-SU-2022:3998-1
- SUSE-SU-2022:4053-1
- SUSE-SU-2022:4072-1
- SUSE-SU-2022:4272-1
- SUSE-SU-2022:4273-1
- SUSE-SU-2022:4503-1
- SUSE-SU-2022:4504-1
- SUSE-SU-2022:4506-1
- SUSE-SU-2022:4513-1
- SUSE-SU-2022:4515-1
- SUSE-SU-2022:4516-1
- SUSE-SU-2022:4517-1
- SUSE-SU-2022:4518-1
- SUSE-SU-2022:4520-1
- SUSE-SU-2022:4527-1
- SUSE-SU-2022:4528-1
- SUSE-SU-2022:4533-1
- SUSE-SU-2022:4534-1
- SUSE-SU-2022:4539-1
- SUSE-SU-2022:4542-1
- SUSE-SU-2022:4543-1
- SUSE-SU-2022:4544-1
- SUSE-SU-2022:4545-1
- SUSE-SU-2022:4546-1
- SUSE-SU-2022:4550-1
- SUSE-SU-2022:4551-1
- SUSE-SU-2022:4559-1
- SUSE-SU-2022:4560-1
- SUSE-SU-2022:4561-1
- SUSE-SU-2022:4562-1
- SUSE-SU-2022:4569-1
- SUSE-SU-2022:4572-1
- SUSE-SU-2022:4573-1
- SUSE-SU-2022:4574-1
- SUSE-SU-2022:4577-1
- SUSE-SU-2022:4580-1
- SUSE-SU-2022:4585-1
- SUSE-SU-2022:4587-1
- SUSE-SU-2022:4589-1
- SUSE-SU-2022:4595-1
- SUSE-SU-2022:4611-1
- SUSE-SU-2022:4613-1
- SUSE-SU-2022:4614-1
- SUSE-SU-2022:4615-1
- SUSE-SU-2022:4616-1
- SUSE-SU-2022:4617-1
- SUSE-SU-2023:0416-1
- SUSE-SU-2023:2140-1
- SUSE-SU-2023:2141-1
- SUSE-SU-2023:2146-1
- SUSE-SU-2023:2147-1
- SUSE-SU-2023:2148-1
- SUSE-SU-2023:2151-1
- SUSE-SU-2023:2156-1
- SUSE-SU-2023:2162-1
- SUSE-SU-2023:2163-1
- SUSE-SU-2023:2231-1
- SUSE-SU-2023:2232-1
- SUSE-SU-2023:2500-1
- SUSE-SU-2023:2502-1
- SUSE-SU-2023:2506-1
- SUSE-SU-2023:2611-1
- SUSE-SU-2023:2646-1
- SUSE-SU-2023:2651-1
- SUSE-SU-2023:2653-1
- SUSE-SU-2023:2782-1
- SUSE-SU-2023:2805-1
- SUSE-SU-2023:2809-1
- SUSE-SU-2023:2871-1
- SUSE-SU-2023:3594-1
- SUSE-SU-2023:3595-1
- SUSE-SU-2023:3607-1
- SUSE-SU-2023:3612-1
- SUSE-SU-2023:3620-1
- SUSE-SU-2023:3623-1
- SUSE-SU-2023:3627-1
- SUSE-SU-2023:3628-1
- SUSE-SU-2023:3630-1
- SUSE-SU-2023:3644-1
- SUSE-SU-2023:3647-1
- SUSE-SU-2023:3648-1
- SUSE-SU-2023:3668-1
- SUSE-SU-2023:3671-1
- SUSE-SU-2023:3675-1
- USN-5790-1
- USN-5791-1
- USN-5791-2
- USN-5791-3
- USN-5792-1
- USN-5792-2
- USN-5793-1
- USN-5793-2
- USN-5793-3
- USN-5793-4
- USN-5815-1
- USN-5859-1
- USN-5877-1
- USN-5911-1
- USN-5912-1
- USN-5917-1
- USN-5929-1
- USN-5934-1
- USN-5935-1
- USN-5938-1
- USN-5939-1
- USN-5940-1
- USN-5941-1
- USN-5950-1
- USN-5951-1
- USN-5962-1
- USN-6000-1
- USN-6033-1
- USN-6045-1
- USN-6071-1
- USN-6089-1
- USN-6122-1
- USN-6123-1
- USN-6127-1
- USN-6130-1
- USN-6131-1
- USN-6132-1
- USN-6135-1
- USN-6149-1
- USN-6150-1
- USN-6162-1
- USN-6171-1
- USN-6172-1
- USN-6175-1
- USN-6185-1
- USN-6186-1
- USN-6187-1
- USN-6207-1
- USN-6222-1
- USN-6223-1
- USN-6252-1
- USN-6256-1
- USN-6699-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-tools-oem-22.04a?distro=jammy | ubuntu | linux-tools-oem-22.04a | < 5.17.0.1032.30 | jammy | ||
Affected | pkg:deb/ubuntu/linux-tools-oem-22.04?distro=jammy | ubuntu | linux-tools-oem-22.04 | < 5.17.0.1032.30 | jammy | ||
Affected | pkg:deb/ubuntu/linux-tools-5.17.0-1032-oem?distro=jammy | ubuntu | linux-tools-5.17.0-1032-oem | < 5.17.0-1032.33 | jammy | ||
Affected | pkg:deb/ubuntu/linux-oem-5.17-tools-host?distro=jammy | ubuntu | linux-oem-5.17-tools-host | < 5.17.0-1032.33 | jammy | ||
Affected | pkg:deb/ubuntu/linux-oem-5.17-tools-5.17.0-1032?distro=jammy | ubuntu | linux-oem-5.17-tools-5.17.0-1032 | < 5.17.0-1032.33 | jammy | ||
Affected | pkg:deb/ubuntu/linux-oem-5.17-headers-5.17.0-1032?distro=jammy | ubuntu | linux-oem-5.17-headers-5.17.0-1032 | < 5.17.0-1032.33 | jammy | ||
Affected | pkg:deb/ubuntu/linux-oem-22.04a?distro=jammy | ubuntu | linux-oem-22.04a | < 5.17.0.1032.30 | jammy | ||
Affected | pkg:deb/ubuntu/linux-oem-22.04?distro=jammy | ubuntu | linux-oem-22.04 | < 5.17.0.1032.30 | jammy | ||
Affected | pkg:deb/ubuntu/linux-modules-iwlwifi-oem-22.04a?distro=jammy | ubuntu | linux-modules-iwlwifi-oem-22.04a | < 5.17.0.1032.30 | jammy | ||
Affected | pkg:deb/ubuntu/linux-modules-iwlwifi-oem-22.04?distro=jammy | ubuntu | linux-modules-iwlwifi-oem-22.04 | < 5.17.0.1032.30 | jammy | ||
Affected | pkg:deb/ubuntu/linux-modules-iwlwifi-5.17.0-1032-oem?distro=jammy | ubuntu | linux-modules-iwlwifi-5.17.0-1032-oem | < 5.17.0-1032.33 | jammy | ||
Affected | pkg:deb/ubuntu/linux-modules-ivsc-oem-22.04a?distro=jammy | ubuntu | linux-modules-ivsc-oem-22.04a | < 5.17.0.1032.30 | jammy | ||
Affected | pkg:deb/ubuntu/linux-modules-ivsc-oem-22.04?distro=jammy | ubuntu | linux-modules-ivsc-oem-22.04 | < 5.17.0.1032.30 | jammy | ||
Affected | pkg:deb/ubuntu/linux-modules-ivsc-5.17.0-1032-oem?distro=jammy | ubuntu | linux-modules-ivsc-5.17.0-1032-oem | < 5.17.0-1032.33 | jammy | ||
Affected | pkg:deb/ubuntu/linux-modules-ipu6-oem-22.04a?distro=jammy | ubuntu | linux-modules-ipu6-oem-22.04a | < 5.17.0.1032.30 | jammy | ||
Affected | pkg:deb/ubuntu/linux-modules-ipu6-oem-22.04?distro=jammy | ubuntu | linux-modules-ipu6-oem-22.04 | < 5.17.0.1032.30 | jammy | ||
Affected | pkg:deb/ubuntu/linux-modules-ipu6-5.17.0-1032-oem?distro=jammy | ubuntu | linux-modules-ipu6-5.17.0-1032-oem | < 5.17.0-1032.33 | jammy | ||
Affected | pkg:deb/ubuntu/linux-modules-5.17.0-1032-oem?distro=jammy | ubuntu | linux-modules-5.17.0-1032-oem | < 5.17.0-1032.33 | jammy | ||
Affected | pkg:deb/ubuntu/linux-image-unsigned-5.17.0-1032-oem?distro=jammy | ubuntu | linux-image-unsigned-5.17.0-1032-oem | < 5.17.0-1032.33 | jammy | ||
Affected | pkg:deb/ubuntu/linux-image-oem-22.04a?distro=jammy | ubuntu | linux-image-oem-22.04a | < 5.17.0.1032.30 | jammy | ||
Affected | pkg:deb/ubuntu/linux-image-oem-22.04?distro=jammy | ubuntu | linux-image-oem-22.04 | < 5.17.0.1032.30 | jammy | ||
Affected | pkg:deb/ubuntu/linux-image-5.17.0-1032-oem?distro=jammy | ubuntu | linux-image-5.17.0-1032-oem | < 5.17.0-1032.33 | jammy | ||
Affected | pkg:deb/ubuntu/linux-headers-oem-22.04a?distro=jammy | ubuntu | linux-headers-oem-22.04a | < 5.17.0.1032.30 | jammy | ||
Affected | pkg:deb/ubuntu/linux-headers-oem-22.04?distro=jammy | ubuntu | linux-headers-oem-22.04 | < 5.17.0.1032.30 | jammy | ||
Affected | pkg:deb/ubuntu/linux-headers-5.17.0-1032-oem?distro=jammy | ubuntu | linux-headers-5.17.0-1032-oem | < 5.17.0-1032.33 | jammy | ||
Affected | pkg:deb/ubuntu/linux-buildinfo-5.17.0-1032-oem?distro=jammy | ubuntu | linux-buildinfo-5.17.0-1032-oem | < 5.17.0-1032.33 | jammy |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |