[USN-6207-1] Linux kernel (Intel IoTG) vulnerabilities
Several security issues were fixed in the Linux kernel.
It was discovered that the TUN/TAP driver in the Linux kernel did not
properly initialize socket data. A local attacker could use this to cause a
denial of service (system crash). (CVE-2023-1076)
It was discovered that the Real-Time Scheduling Class implementation in the
Linux kernel contained a type confusion vulnerability in some situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2023-1077)
It was discovered that the ASUS HID driver in the Linux kernel did not
properly handle device removal, leading to a use-after-free vulnerability.
A local attacker with physical access could plug in a specially crafted USB
device to cause a denial of service (system crash). (CVE-2023-1079)
It was discovered that the Xircom PCMCIA network device driver in the Linux
kernel did not properly handle device removal events. A physically
proximate attacker could use this to cause a denial of service (system
crash). (CVE-2023-1670)
It was discovered that a race condition existed in the Xen transport layer
implementation for the 9P file system protocol in the Linux kernel, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service (guest crash) or expose sensitive information (guest
kernel memory). (CVE-2023-1859)
Jose Oliveira and Rodrigo Branco discovered that the Spectre Variant 2
mitigations with prctl syscall were insufficient in some situations. A
local attacker could possibly use this to expose sensitive information.
(CVE-2023-1998)
It was discovered that the BigBen Interactive Kids' gamepad driver in the
Linux kernel did not properly handle device removal, leading to a use-
after-free vulnerability. A local attacker with physical access could plug
in a specially crafted USB device to cause a denial of service (system
crash). (CVE-2023-25012)
It was discovered that a use-after-free vulnerability existed in the HFS+
file system implementation in the Linux kernel. A local attacker could
possibly use this to cause a denial of service (system crash).
(CVE-2023-2985)
- ID
- USN-6207-1
- Severity
- high
- Severity from
- CVE-2023-1670
- URL
- https://ubuntu.com/security/notices/USN-6207-1
- Published
-
2023-07-06T19:00:33
(14 months ago) - Modified
-
2023-07-06T19:00:33
(14 months ago) - Other Advisories
-
- ALAS-2023-1701
- ALAS-2024-1942
- ALAS2-2023-1987
- ALAS2-2024-2588
- ALSA-2023:4377
- ALSA-2023:7077
- ELSA-2023-12375
- ELSA-2023-4377
- ELSA-2023-6583
- ELSA-2023-7077
- ELSA-2024-12110
- ELSA-2024-12150
- FEDORA-2023-4f2cf7e5d2
- FEDORA-2023-6325ed25c4
- FEDORA-2023-9e7774da21
- MS:CVE-2023-1079
- MS:CVE-2023-2985
- RHSA-2023:4377
- RHSA-2023:4378
- RHSA-2023:6901
- RHSA-2023:7077
- SSA:2023-172-02
- SUSE-SU-2023:0749-1
- SUSE-SU-2023:0749-2
- SUSE-SU-2023:0779-1
- SUSE-SU-2023:1608-1
- SUSE-SU-2023:1609-1
- SUSE-SU-2023:1710-1
- SUSE-SU-2023:1800-1
- SUSE-SU-2023:1801-1
- SUSE-SU-2023:1803-1
- SUSE-SU-2023:1811-1
- SUSE-SU-2023:1848-1
- SUSE-SU-2023:1894-1
- SUSE-SU-2023:2140-1
- SUSE-SU-2023:2141-1
- SUSE-SU-2023:2146-1
- SUSE-SU-2023:2147-1
- SUSE-SU-2023:2148-1
- SUSE-SU-2023:2151-1
- SUSE-SU-2023:2156-1
- SUSE-SU-2023:2162-1
- SUSE-SU-2023:2163-1
- SUSE-SU-2023:2231-1
- SUSE-SU-2023:2232-1
- SUSE-SU-2023:2500-1
- SUSE-SU-2023:2502-1
- SUSE-SU-2023:2506-1
- SUSE-SU-2023:2534-1
- SUSE-SU-2023:2611-1
- SUSE-SU-2023:2646-1
- SUSE-SU-2023:2651-1
- SUSE-SU-2023:2653-1
- SUSE-SU-2023:2782-1
- SUSE-SU-2023:2804-1
- SUSE-SU-2023:2805-1
- SUSE-SU-2023:2808-1
- SUSE-SU-2023:2809-1
- SUSE-SU-2023:2810-1
- SUSE-SU-2023:2820-1
- SUSE-SU-2023:2822-1
- SUSE-SU-2023:2830-1
- SUSE-SU-2023:2831-1
- SUSE-SU-2023:2834-1
- SUSE-SU-2023:2859-1
- SUSE-SU-2023:2871-1
- SUSE-SU-2023:3006-1
- SUSE-SU-2023:3171-1
- SUSE-SU-2023:3172-1
- SUSE-SU-2023:3180-1
- SUSE-SU-2023:3182-1
- SUSE-SU-2023:3302-1
- SUSE-SU-2023:3309-1
- SUSE-SU-2023:3318-1
- SUSE-SU-2023:3324-1
- SUSE-SU-2023:3349-1
- SUSE-SU-2023:3390-1
- SUSE-SU-2023:3391-1
- SUSE-SU-2023:3392-1
- SUSE-SU-2023:3421-1
- SUSE-SU-2023:3566-1
- SUSE-SU-2023:3576-1
- SUSE-SU-2023:3582-1
- SUSE-SU-2023:3585-1
- SUSE-SU-2023:3592-1
- SUSE-SU-2023:3594-1
- SUSE-SU-2023:3595-1
- SUSE-SU-2023:3596-1
- SUSE-SU-2023:3603-1
- SUSE-SU-2023:3607-1
- SUSE-SU-2023:3612-1
- SUSE-SU-2023:3620-1
- SUSE-SU-2023:3621-1
- SUSE-SU-2023:3623-1
- SUSE-SU-2023:3627-1
- SUSE-SU-2023:3628-1
- SUSE-SU-2023:3629-1
- SUSE-SU-2023:3630-1
- SUSE-SU-2023:3631-1
- SUSE-SU-2023:3644-1
- SUSE-SU-2023:3647-1
- SUSE-SU-2023:3648-1
- SUSE-SU-2023:3657-1
- SUSE-SU-2023:3668-1
- SUSE-SU-2023:3671-1
- SUSE-SU-2023:3675-1
- SUSE-SU-2023:3988-1
- SUSE-SU-2023:4028-1
- SUSE-SU-2023:4030-1
- SUSE-SU-2023:4031-1
- SUSE-SU-2023:4032-1
- SUSE-SU-2023:4033-1
- SUSE-SU-2023:4057-1
- SUSE-SU-2023:4058-1
- SUSE-SU-2023:4071-1
- SUSE-SU-2023:4072-1
- SUSE-SU-2023:4072-2
- SUSE-SU-2023:4093-1
- SUSE-SU-2023:4095-1
- SUSE-SU-2023:4142-1
- SUSE-SU-2023:4347-1
- USN-6033-1
- USN-6045-1
- USN-6056-1
- USN-6071-1
- USN-6072-1
- USN-6123-1
- USN-6124-1
- USN-6171-1
- USN-6172-1
- USN-6175-1
- USN-6185-1
- USN-6186-1
- USN-6187-1
- USN-6222-1
- USN-6223-1
- USN-6252-1
- USN-6256-1
- USN-6309-1
- USN-6327-1
- USN-6342-1
- USN-6342-2
- USN-6385-1
- USN-6604-1
- USN-6604-2
- USN-6739-1
- USN-6740-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-tools-intel?distro=focal | ubuntu | linux-tools-intel | < 5.15.0.1033.38~20.04.24 | focal | ||
Affected | pkg:deb/ubuntu/linux-tools-intel-iotg?distro=jammy | ubuntu | linux-tools-intel-iotg | < 5.15.0.1033.32 | jammy | ||
Affected | pkg:deb/ubuntu/linux-tools-intel-iotg?distro=focal | ubuntu | linux-tools-intel-iotg | < 5.15.0.1033.38~20.04.24 | focal | ||
Affected | pkg:deb/ubuntu/linux-tools-intel-iotg-edge?distro=focal | ubuntu | linux-tools-intel-iotg-edge | < 5.15.0.1033.38~20.04.24 | focal | ||
Affected | pkg:deb/ubuntu/linux-tools-5.15.0-1033-intel-iotg?distro=jammy | ubuntu | linux-tools-5.15.0-1033-intel-iotg | < 5.15.0-1033.38 | jammy | ||
Affected | pkg:deb/ubuntu/linux-tools-5.15.0-1033-intel-iotg?distro=focal | ubuntu | linux-tools-5.15.0-1033-intel-iotg | < 5.15.0-1033.38~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-modules-iwlwifi-5.15.0-1033-intel-iotg?distro=jammy | ubuntu | linux-modules-iwlwifi-5.15.0-1033-intel-iotg | < 5.15.0-1033.38 | jammy | ||
Affected | pkg:deb/ubuntu/linux-modules-iwlwifi-5.15.0-1033-intel-iotg?distro=focal | ubuntu | linux-modules-iwlwifi-5.15.0-1033-intel-iotg | < 5.15.0-1033.38~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-modules-extra-5.15.0-1033-intel-iotg?distro=jammy | ubuntu | linux-modules-extra-5.15.0-1033-intel-iotg | < 5.15.0-1033.38 | jammy | ||
Affected | pkg:deb/ubuntu/linux-modules-extra-5.15.0-1033-intel-iotg?distro=focal | ubuntu | linux-modules-extra-5.15.0-1033-intel-iotg | < 5.15.0-1033.38~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-modules-5.15.0-1033-intel-iotg?distro=jammy | ubuntu | linux-modules-5.15.0-1033-intel-iotg | < 5.15.0-1033.38 | jammy | ||
Affected | pkg:deb/ubuntu/linux-modules-5.15.0-1033-intel-iotg?distro=focal | ubuntu | linux-modules-5.15.0-1033-intel-iotg | < 5.15.0-1033.38~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-intel?distro=focal | ubuntu | linux-intel | < 5.15.0.1033.38~20.04.24 | focal | ||
Affected | pkg:deb/ubuntu/linux-intel-iotg?distro=jammy | ubuntu | linux-intel-iotg | < 5.15.0.1033.32 | jammy | ||
Affected | pkg:deb/ubuntu/linux-intel-iotg?distro=focal | ubuntu | linux-intel-iotg | < 5.15.0.1033.38~20.04.24 | focal | ||
Affected | pkg:deb/ubuntu/linux-intel-iotg-tools-host?distro=jammy | ubuntu | linux-intel-iotg-tools-host | < 5.15.0-1033.38 | jammy | ||
Affected | pkg:deb/ubuntu/linux-intel-iotg-tools-common?distro=jammy | ubuntu | linux-intel-iotg-tools-common | < 5.15.0-1033.38 | jammy | ||
Affected | pkg:deb/ubuntu/linux-intel-iotg-tools-5.15.0-1033?distro=jammy | ubuntu | linux-intel-iotg-tools-5.15.0-1033 | < 5.15.0-1033.38 | jammy | ||
Affected | pkg:deb/ubuntu/linux-intel-iotg-headers-5.15.0-1033?distro=jammy | ubuntu | linux-intel-iotg-headers-5.15.0-1033 | < 5.15.0-1033.38 | jammy | ||
Affected | pkg:deb/ubuntu/linux-intel-iotg-edge?distro=focal | ubuntu | linux-intel-iotg-edge | < 5.15.0.1033.38~20.04.24 | focal | ||
Affected | pkg:deb/ubuntu/linux-intel-iotg-cloud-tools-common?distro=jammy | ubuntu | linux-intel-iotg-cloud-tools-common | < 5.15.0-1033.38 | jammy | ||
Affected | pkg:deb/ubuntu/linux-intel-iotg-cloud-tools-5.15.0-1033?distro=jammy | ubuntu | linux-intel-iotg-cloud-tools-5.15.0-1033 | < 5.15.0-1033.38 | jammy | ||
Affected | pkg:deb/ubuntu/linux-intel-iotg-5.15-tools-host?distro=focal | ubuntu | linux-intel-iotg-5.15-tools-host | < 5.15.0-1033.38~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-intel-iotg-5.15-tools-common?distro=focal | ubuntu | linux-intel-iotg-5.15-tools-common | < 5.15.0-1033.38~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-intel-iotg-5.15-tools-5.15.0-1033?distro=focal | ubuntu | linux-intel-iotg-5.15-tools-5.15.0-1033 | < 5.15.0-1033.38~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-intel-iotg-5.15-headers-5.15.0-1033?distro=focal | ubuntu | linux-intel-iotg-5.15-headers-5.15.0-1033 | < 5.15.0-1033.38~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-intel-iotg-5.15-cloud-tools-common?distro=focal | ubuntu | linux-intel-iotg-5.15-cloud-tools-common | < 5.15.0-1033.38~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-intel-iotg-5.15-cloud-tools-5.15.0-1033?distro=focal | ubuntu | linux-intel-iotg-5.15-cloud-tools-5.15.0-1033 | < 5.15.0-1033.38~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-unsigned-5.15.0-1033-intel-iotg?distro=jammy | ubuntu | linux-image-unsigned-5.15.0-1033-intel-iotg | < 5.15.0-1033.38 | jammy | ||
Affected | pkg:deb/ubuntu/linux-image-unsigned-5.15.0-1033-intel-iotg?distro=focal | ubuntu | linux-image-unsigned-5.15.0-1033-intel-iotg | < 5.15.0-1033.38~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-intel?distro=focal | ubuntu | linux-image-intel | < 5.15.0.1033.38~20.04.24 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-intel-iotg?distro=jammy | ubuntu | linux-image-intel-iotg | < 5.15.0.1033.32 | jammy | ||
Affected | pkg:deb/ubuntu/linux-image-intel-iotg?distro=focal | ubuntu | linux-image-intel-iotg | < 5.15.0.1033.38~20.04.24 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-intel-iotg-edge?distro=focal | ubuntu | linux-image-intel-iotg-edge | < 5.15.0.1033.38~20.04.24 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-5.15.0-1033-intel-iotg?distro=jammy | ubuntu | linux-image-5.15.0-1033-intel-iotg | < 5.15.0-1033.38 | jammy | ||
Affected | pkg:deb/ubuntu/linux-image-5.15.0-1033-intel-iotg?distro=focal | ubuntu | linux-image-5.15.0-1033-intel-iotg | < 5.15.0-1033.38~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-headers-intel?distro=focal | ubuntu | linux-headers-intel | < 5.15.0.1033.38~20.04.24 | focal | ||
Affected | pkg:deb/ubuntu/linux-headers-intel-iotg?distro=jammy | ubuntu | linux-headers-intel-iotg | < 5.15.0.1033.32 | jammy | ||
Affected | pkg:deb/ubuntu/linux-headers-intel-iotg?distro=focal | ubuntu | linux-headers-intel-iotg | < 5.15.0.1033.38~20.04.24 | focal | ||
Affected | pkg:deb/ubuntu/linux-headers-intel-iotg-edge?distro=focal | ubuntu | linux-headers-intel-iotg-edge | < 5.15.0.1033.38~20.04.24 | focal | ||
Affected | pkg:deb/ubuntu/linux-headers-5.15.0-1033-intel-iotg?distro=jammy | ubuntu | linux-headers-5.15.0-1033-intel-iotg | < 5.15.0-1033.38 | jammy | ||
Affected | pkg:deb/ubuntu/linux-headers-5.15.0-1033-intel-iotg?distro=focal | ubuntu | linux-headers-5.15.0-1033-intel-iotg | < 5.15.0-1033.38~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-cloud-tools-intel?distro=focal | ubuntu | linux-cloud-tools-intel | < 5.15.0.1033.38~20.04.24 | focal | ||
Affected | pkg:deb/ubuntu/linux-cloud-tools-5.15.0-1033-intel-iotg?distro=jammy | ubuntu | linux-cloud-tools-5.15.0-1033-intel-iotg | < 5.15.0-1033.38 | jammy | ||
Affected | pkg:deb/ubuntu/linux-cloud-tools-5.15.0-1033-intel-iotg?distro=focal | ubuntu | linux-cloud-tools-5.15.0-1033-intel-iotg | < 5.15.0-1033.38~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-buildinfo-5.15.0-1033-intel-iotg?distro=jammy | ubuntu | linux-buildinfo-5.15.0-1033-intel-iotg | < 5.15.0-1033.38 | jammy | ||
Affected | pkg:deb/ubuntu/linux-buildinfo-5.15.0-1033-intel-iotg?distro=focal | ubuntu | linux-buildinfo-5.15.0-1033-intel-iotg | < 5.15.0-1033.38~20.04.1 | focal |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |