[USN-6124-1] Linux kernel (OEM) vulnerabilities

Severity High
Affected Packages 26
CVEs 6

Several security issues were fixed in the Linux kernel.

Patryk Sondej and Piotr Krysiuk discovered that a race condition existed in
the netfilter subsystem of the Linux kernel when processing batch requests,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-32233)

Reima Ishii discovered that the nested KVM implementation for Intel x86
processors in the Linux kernel did not properly validate control registers
in certain situations. An attacker in a guest VM could use this to cause a
denial of service (guest crash). (CVE-2023-30456)

Gwnaun Jung discovered that the SFB packet scheduling implementation in the
Linux kernel contained a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2022-3586)

It was discovered that the Intel i915 graphics driver in the Linux kernel
did not perform a GPU TLB flush in some situations. A local attacker could
use this to cause a denial of service or possibly execute arbitrary code.
(CVE-2022-4139)

It was discovered that the Xircom PCMCIA network device driver in the Linux
kernel did not properly handle device removal events. A physically
proximate attacker could use this to cause a denial of service (system
crash). (CVE-2023-1670)

Jean-Baptiste Cayrou discovered that the shiftfs file system in the Ubuntu
Linux kernel contained a race condition when handling inode locking in some
situations. A local attacker could use this to cause a denial of service
(kernel deadlock). (CVE-2023-2612)

Package Affected Version
pkg:deb/ubuntu/linux-tools-oem-22.04a?distro=jammy < 5.17.0.1032.30
pkg:deb/ubuntu/linux-tools-oem-22.04?distro=jammy < 5.17.0.1032.30
pkg:deb/ubuntu/linux-tools-5.17.0-1032-oem?distro=jammy < 5.17.0-1032.33
pkg:deb/ubuntu/linux-oem-5.17-tools-host?distro=jammy < 5.17.0-1032.33
pkg:deb/ubuntu/linux-oem-5.17-tools-5.17.0-1032?distro=jammy < 5.17.0-1032.33
pkg:deb/ubuntu/linux-oem-5.17-headers-5.17.0-1032?distro=jammy < 5.17.0-1032.33
pkg:deb/ubuntu/linux-oem-22.04a?distro=jammy < 5.17.0.1032.30
pkg:deb/ubuntu/linux-oem-22.04?distro=jammy < 5.17.0.1032.30
pkg:deb/ubuntu/linux-modules-iwlwifi-oem-22.04a?distro=jammy < 5.17.0.1032.30
pkg:deb/ubuntu/linux-modules-iwlwifi-oem-22.04?distro=jammy < 5.17.0.1032.30
pkg:deb/ubuntu/linux-modules-iwlwifi-5.17.0-1032-oem?distro=jammy < 5.17.0-1032.33
pkg:deb/ubuntu/linux-modules-ivsc-oem-22.04a?distro=jammy < 5.17.0.1032.30
pkg:deb/ubuntu/linux-modules-ivsc-oem-22.04?distro=jammy < 5.17.0.1032.30
pkg:deb/ubuntu/linux-modules-ivsc-5.17.0-1032-oem?distro=jammy < 5.17.0-1032.33
pkg:deb/ubuntu/linux-modules-ipu6-oem-22.04a?distro=jammy < 5.17.0.1032.30
pkg:deb/ubuntu/linux-modules-ipu6-oem-22.04?distro=jammy < 5.17.0.1032.30
pkg:deb/ubuntu/linux-modules-ipu6-5.17.0-1032-oem?distro=jammy < 5.17.0-1032.33
pkg:deb/ubuntu/linux-modules-5.17.0-1032-oem?distro=jammy < 5.17.0-1032.33
pkg:deb/ubuntu/linux-image-unsigned-5.17.0-1032-oem?distro=jammy < 5.17.0-1032.33
pkg:deb/ubuntu/linux-image-oem-22.04a?distro=jammy < 5.17.0.1032.30
pkg:deb/ubuntu/linux-image-oem-22.04?distro=jammy < 5.17.0.1032.30
pkg:deb/ubuntu/linux-image-5.17.0-1032-oem?distro=jammy < 5.17.0-1032.33
pkg:deb/ubuntu/linux-headers-oem-22.04a?distro=jammy < 5.17.0.1032.30
pkg:deb/ubuntu/linux-headers-oem-22.04?distro=jammy < 5.17.0.1032.30
pkg:deb/ubuntu/linux-headers-5.17.0-1032-oem?distro=jammy < 5.17.0-1032.33
pkg:deb/ubuntu/linux-buildinfo-5.17.0-1032-oem?distro=jammy < 5.17.0-1032.33
ID
USN-6124-1
Severity
high
Severity from
CVE-2022-4139
URL
https://ubuntu.com/security/notices/USN-6124-1
Published
2023-05-30T17:40:56
(15 months ago)
Modified
2023-05-30T17:40:56
(15 months ago)
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:deb/ubuntu/linux-tools-oem-22.04a?distro=jammy ubuntu linux-tools-oem-22.04a < 5.17.0.1032.30 jammy
Affected pkg:deb/ubuntu/linux-tools-oem-22.04?distro=jammy ubuntu linux-tools-oem-22.04 < 5.17.0.1032.30 jammy
Affected pkg:deb/ubuntu/linux-tools-5.17.0-1032-oem?distro=jammy ubuntu linux-tools-5.17.0-1032-oem < 5.17.0-1032.33 jammy
Affected pkg:deb/ubuntu/linux-oem-5.17-tools-host?distro=jammy ubuntu linux-oem-5.17-tools-host < 5.17.0-1032.33 jammy
Affected pkg:deb/ubuntu/linux-oem-5.17-tools-5.17.0-1032?distro=jammy ubuntu linux-oem-5.17-tools-5.17.0-1032 < 5.17.0-1032.33 jammy
Affected pkg:deb/ubuntu/linux-oem-5.17-headers-5.17.0-1032?distro=jammy ubuntu linux-oem-5.17-headers-5.17.0-1032 < 5.17.0-1032.33 jammy
Affected pkg:deb/ubuntu/linux-oem-22.04a?distro=jammy ubuntu linux-oem-22.04a < 5.17.0.1032.30 jammy
Affected pkg:deb/ubuntu/linux-oem-22.04?distro=jammy ubuntu linux-oem-22.04 < 5.17.0.1032.30 jammy
Affected pkg:deb/ubuntu/linux-modules-iwlwifi-oem-22.04a?distro=jammy ubuntu linux-modules-iwlwifi-oem-22.04a < 5.17.0.1032.30 jammy
Affected pkg:deb/ubuntu/linux-modules-iwlwifi-oem-22.04?distro=jammy ubuntu linux-modules-iwlwifi-oem-22.04 < 5.17.0.1032.30 jammy
Affected pkg:deb/ubuntu/linux-modules-iwlwifi-5.17.0-1032-oem?distro=jammy ubuntu linux-modules-iwlwifi-5.17.0-1032-oem < 5.17.0-1032.33 jammy
Affected pkg:deb/ubuntu/linux-modules-ivsc-oem-22.04a?distro=jammy ubuntu linux-modules-ivsc-oem-22.04a < 5.17.0.1032.30 jammy
Affected pkg:deb/ubuntu/linux-modules-ivsc-oem-22.04?distro=jammy ubuntu linux-modules-ivsc-oem-22.04 < 5.17.0.1032.30 jammy
Affected pkg:deb/ubuntu/linux-modules-ivsc-5.17.0-1032-oem?distro=jammy ubuntu linux-modules-ivsc-5.17.0-1032-oem < 5.17.0-1032.33 jammy
Affected pkg:deb/ubuntu/linux-modules-ipu6-oem-22.04a?distro=jammy ubuntu linux-modules-ipu6-oem-22.04a < 5.17.0.1032.30 jammy
Affected pkg:deb/ubuntu/linux-modules-ipu6-oem-22.04?distro=jammy ubuntu linux-modules-ipu6-oem-22.04 < 5.17.0.1032.30 jammy
Affected pkg:deb/ubuntu/linux-modules-ipu6-5.17.0-1032-oem?distro=jammy ubuntu linux-modules-ipu6-5.17.0-1032-oem < 5.17.0-1032.33 jammy
Affected pkg:deb/ubuntu/linux-modules-5.17.0-1032-oem?distro=jammy ubuntu linux-modules-5.17.0-1032-oem < 5.17.0-1032.33 jammy
Affected pkg:deb/ubuntu/linux-image-unsigned-5.17.0-1032-oem?distro=jammy ubuntu linux-image-unsigned-5.17.0-1032-oem < 5.17.0-1032.33 jammy
Affected pkg:deb/ubuntu/linux-image-oem-22.04a?distro=jammy ubuntu linux-image-oem-22.04a < 5.17.0.1032.30 jammy
Affected pkg:deb/ubuntu/linux-image-oem-22.04?distro=jammy ubuntu linux-image-oem-22.04 < 5.17.0.1032.30 jammy
Affected pkg:deb/ubuntu/linux-image-5.17.0-1032-oem?distro=jammy ubuntu linux-image-5.17.0-1032-oem < 5.17.0-1032.33 jammy
Affected pkg:deb/ubuntu/linux-headers-oem-22.04a?distro=jammy ubuntu linux-headers-oem-22.04a < 5.17.0.1032.30 jammy
Affected pkg:deb/ubuntu/linux-headers-oem-22.04?distro=jammy ubuntu linux-headers-oem-22.04 < 5.17.0.1032.30 jammy
Affected pkg:deb/ubuntu/linux-headers-5.17.0-1032-oem?distro=jammy ubuntu linux-headers-5.17.0-1032-oem < 5.17.0-1032.33 jammy
Affected pkg:deb/ubuntu/linux-buildinfo-5.17.0-1032-oem?distro=jammy ubuntu linux-buildinfo-5.17.0-1032-oem < 5.17.0-1032.33 jammy
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...