[USN-6173-1] Linux kernel (OEM) vulnerabilities
Several security issues were fixed in the Linux kernel.
Gwangun Jung discovered that the Quick Fair Queueing scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-31436)
It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux
kernel did not properly perform data buffer size validation in some
situations. A physically proximate attacker could use this to craft a
malicious USB device that when inserted, could cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-1380)
Ruihan Li discovered that the bluetooth subsystem in the Linux kernel did
not properly perform permissions checks when handling HCI sockets. A
physically proximate attacker could use this to cause a denial of service
(bluetooth communication). (CVE-2023-2002)
It was discovered that the IPv6 RPL protocol implementation in the Linux
kernel did not properly handle user-supplied data. A remote attacker could
use this to cause a denial of service (system crash). (CVE-2023-2156)
Zheng Zhang discovered that the device-mapper implementation in the Linux
kernel did not properly handle locking during table_clear() operations. A
local attacker could use this to cause a denial of service (kernel
deadlock). (CVE-2023-2269)
Quentin Minster discovered that a race condition existed in the KSMBD
implementation in the Linux kernel when handling sessions operations. A
remote attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-32250)
Quentin Minster discovered that a race condition existed in the KSMBD
implementation in the Linux kernel, leading to a use-after-free
vulnerability. A remote attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2023-32254)
- ID
- USN-6173-1
- Severity
- high
- Severity from
- CVE-2023-32250
- URL
- https://ubuntu.com/security/notices/USN-6173-1
- Published
-
2023-06-16T19:55:25
(15 months ago) - Modified
-
2023-06-16T19:55:25
(15 months ago) - Other Advisories
-
- ALAS-2023-1744
- ALAS-2023-1773
- ALAS2-2023-2027
- ALAS2-2023-2035
- ALAS2-2023-2100
- ALSA-2023:3723
- ALSA-2023:5244
- ALSA-2023:7077
- DSA-5402-1
- DSA-5448-1
- DSA-5453-1
- DSA-5480-1
- ELSA-2023-12565
- ELSA-2023-12566
- ELSA-2023-12688
- ELSA-2023-3723
- ELSA-2023-5244
- ELSA-2023-7077
- ELSA-2024-1831
- ELSA-2024-2004
- FEDORA-2023-00393126a0
- FEDORA-2023-26325e5399
- FEDORA-2023-dfd4a6e8f2
- MS:CVE-2023-31436
- RHSA-2023:3708
- RHSA-2023:3723
- RHSA-2023:5244
- RHSA-2023:5255
- RHSA-2023:6901
- RHSA-2023:7077
- RHSA-2024:1323
- RHSA-2024:2003
- RHSA-2024:2004
- RLSA-2023:5244
- SSA:2023-172-02
- SUSE-SU-2023:2500-1
- SUSE-SU-2023:2501-1
- SUSE-SU-2023:2502-1
- SUSE-SU-2023:2507-1
- SUSE-SU-2023:2534-1
- SUSE-SU-2023:2537-1
- SUSE-SU-2023:2538-1
- SUSE-SU-2023:2611-1
- SUSE-SU-2023:2646-1
- SUSE-SU-2023:2651-1
- SUSE-SU-2023:2653-1
- SUSE-SU-2023:2660-1
- SUSE-SU-2023:2666-1
- SUSE-SU-2023:2679-1
- SUSE-SU-2023:2680-1
- SUSE-SU-2023:2681-1
- SUSE-SU-2023:2686-1
- SUSE-SU-2023:2687-1
- SUSE-SU-2023:2689-1
- SUSE-SU-2023:2690-1
- SUSE-SU-2023:2694-1
- SUSE-SU-2023:2695-1
- SUSE-SU-2023:2697-1
- SUSE-SU-2023:2698-1
- SUSE-SU-2023:2700-1
- SUSE-SU-2023:2701-1
- SUSE-SU-2023:2702-1
- SUSE-SU-2023:2703-1
- SUSE-SU-2023:2708-1
- SUSE-SU-2023:2709-1
- SUSE-SU-2023:2710-1
- SUSE-SU-2023:2714-1
- SUSE-SU-2023:2718-1
- SUSE-SU-2023:2719-1
- SUSE-SU-2023:2720-1
- SUSE-SU-2023:2721-1
- SUSE-SU-2023:2724-1
- SUSE-SU-2023:2727-1
- SUSE-SU-2023:2731-1
- SUSE-SU-2023:2734-1
- SUSE-SU-2023:2735-1
- SUSE-SU-2023:2741-1
- SUSE-SU-2023:2743-1
- SUSE-SU-2023:2755-1
- SUSE-SU-2023:2782-1
- SUSE-SU-2023:2804-1
- SUSE-SU-2023:2805-1
- SUSE-SU-2023:2808-1
- SUSE-SU-2023:2809-1
- SUSE-SU-2023:2810-1
- SUSE-SU-2023:2822-1
- SUSE-SU-2023:2830-1
- SUSE-SU-2023:2834-1
- SUSE-SU-2023:2859-1
- SUSE-SU-2023:2871-1
- SUSE-SU-2023:3035-1
- SUSE-SU-2023:3036-1
- SUSE-SU-2023:3046-1
- SUSE-SU-2023:3055-1
- SUSE-SU-2023:3063-1
- SUSE-SU-2023:3069-1
- SUSE-SU-2023:3073-1
- SUSE-SU-2023:3075-1
- SUSE-SU-2023:3076-1
- SUSE-SU-2023:3079-1
- SUSE-SU-2023:3081-1
- SUSE-SU-2023:3083-1
- SUSE-SU-2023:3104-1
- SUSE-SU-2023:3107-1
- SUSE-SU-2023:3111-1
- SUSE-SU-2023:3116-1
- SUSE-SU-2023:3153-1
- SUSE-SU-2023:3302-1
- SUSE-SU-2023:3311-1
- SUSE-SU-2023:3313-1
- SUSE-SU-2023:3318-1
- SUSE-SU-2023:3376-1
- SUSE-SU-2023:3377-1
- SUSE-SU-2023:3391-1
- SUSE-SU-2023:3421-1
- SUSE-SU-2023:3594-1
- SUSE-SU-2023:3595-1
- SUSE-SU-2023:3607-1
- SUSE-SU-2023:3623-1
- SUSE-SU-2023:3627-1
- SUSE-SU-2023:3628-1
- SUSE-SU-2023:3630-1
- SUSE-SU-2023:3631-1
- SUSE-SU-2023:3632-1
- SUSE-SU-2023:3644-1
- SUSE-SU-2023:3647-1
- SUSE-SU-2023:3648-1
- SUSE-SU-2023:3653-1
- SUSE-SU-2023:3657-1
- SUSE-SU-2023:3658-1
- SUSE-SU-2023:3659-1
- SUSE-SU-2023:3668-1
- SUSE-SU-2023:3671-1
- SUSE-SU-2023:3675-1
- SUSE-SU-2023:3676-1
- SUSE-SU-2023:3677-1
- USN-6127-1
- USN-6130-1
- USN-6131-1
- USN-6132-1
- USN-6135-1
- USN-6149-1
- USN-6150-1
- USN-6162-1
- USN-6175-1
- USN-6186-1
- USN-6222-1
- USN-6256-1
- USN-6283-1
- USN-6300-1
- USN-6309-1
- USN-6311-1
- USN-6327-1
- USN-6332-1
- USN-6338-1
- USN-6338-2
- USN-6340-1
- USN-6340-2
- USN-6342-1
- USN-6342-2
- USN-6344-1
- USN-6347-1
- USN-6349-1
- USN-6357-1
- USN-6385-1
- USN-6397-1
- USN-6412-1
- USN-6416-1
- USN-6416-2
- USN-6416-3
- USN-6445-1
- USN-6445-2
- USN-6460-1
- USN-6466-1
- USN-6626-1
- USN-6626-2
- USN-6626-3
- USN-6628-1
- USN-6628-2
- USN-6701-1
- USN-6701-2
- USN-6701-3
- USN-6701-4
- USN-6725-1
- USN-6725-2
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-tools-oem-22.04c?distro=jammy | ubuntu | linux-tools-oem-22.04c | < 6.1.0.1014.14 | jammy | ||
Affected | pkg:deb/ubuntu/linux-tools-6.1.0-1014-oem?distro=jammy | ubuntu | linux-tools-6.1.0-1014-oem | < 6.1.0-1014.14 | jammy | ||
Affected | pkg:deb/ubuntu/linux-oem-6.1-tools-host?distro=jammy | ubuntu | linux-oem-6.1-tools-host | < 6.1.0-1014.14 | jammy | ||
Affected | pkg:deb/ubuntu/linux-oem-6.1-tools-6.1.0-1014?distro=jammy | ubuntu | linux-oem-6.1-tools-6.1.0-1014 | < 6.1.0-1014.14 | jammy | ||
Affected | pkg:deb/ubuntu/linux-oem-6.1-headers-6.1.0-1014?distro=jammy | ubuntu | linux-oem-6.1-headers-6.1.0-1014 | < 6.1.0-1014.14 | jammy | ||
Affected | pkg:deb/ubuntu/linux-oem-22.04c?distro=jammy | ubuntu | linux-oem-22.04c | < 6.1.0.1014.14 | jammy | ||
Affected | pkg:deb/ubuntu/linux-modules-iwlwifi-oem-22.04c?distro=jammy | ubuntu | linux-modules-iwlwifi-oem-22.04c | < 6.1.0.1014.14 | jammy | ||
Affected | pkg:deb/ubuntu/linux-modules-iwlwifi-6.1.0-1014-oem?distro=jammy | ubuntu | linux-modules-iwlwifi-6.1.0-1014-oem | < 6.1.0-1014.14 | jammy | ||
Affected | pkg:deb/ubuntu/linux-modules-ivsc-oem-22.04c?distro=jammy | ubuntu | linux-modules-ivsc-oem-22.04c | < 6.1.0.1014.14 | jammy | ||
Affected | pkg:deb/ubuntu/linux-modules-ivsc-6.1.0-1014-oem?distro=jammy | ubuntu | linux-modules-ivsc-6.1.0-1014-oem | < 6.1.0-1014.14 | jammy | ||
Affected | pkg:deb/ubuntu/linux-modules-ipu6-oem-22.04c?distro=jammy | ubuntu | linux-modules-ipu6-oem-22.04c | < 6.1.0.1014.14 | jammy | ||
Affected | pkg:deb/ubuntu/linux-modules-ipu6-6.1.0-1014-oem?distro=jammy | ubuntu | linux-modules-ipu6-6.1.0-1014-oem | < 6.1.0-1014.14 | jammy | ||
Affected | pkg:deb/ubuntu/linux-modules-6.1.0-1014-oem?distro=jammy | ubuntu | linux-modules-6.1.0-1014-oem | < 6.1.0-1014.14 | jammy | ||
Affected | pkg:deb/ubuntu/linux-image-unsigned-6.1.0-1014-oem?distro=jammy | ubuntu | linux-image-unsigned-6.1.0-1014-oem | < 6.1.0-1014.14 | jammy | ||
Affected | pkg:deb/ubuntu/linux-image-oem-22.04c?distro=jammy | ubuntu | linux-image-oem-22.04c | < 6.1.0.1014.14 | jammy | ||
Affected | pkg:deb/ubuntu/linux-image-6.1.0-1014-oem?distro=jammy | ubuntu | linux-image-6.1.0-1014-oem | < 6.1.0-1014.14 | jammy | ||
Affected | pkg:deb/ubuntu/linux-headers-oem-22.04c?distro=jammy | ubuntu | linux-headers-oem-22.04c | < 6.1.0.1014.14 | jammy | ||
Affected | pkg:deb/ubuntu/linux-headers-6.1.0-1014-oem?distro=jammy | ubuntu | linux-headers-6.1.0-1014-oem | < 6.1.0-1014.14 | jammy | ||
Affected | pkg:deb/ubuntu/linux-buildinfo-6.1.0-1014-oem?distro=jammy | ubuntu | linux-buildinfo-6.1.0-1014-oem | < 6.1.0-1014.14 | jammy |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |