[USN-6248-1] Linux kernel (OEM) vulnerabilities

Severity High
Affected Packages 19
CVEs 7

Several security issues were fixed in the Linux kernel.

It was discovered that the network queuing discipline implementation in the
Linux kernel contained a null pointer dereference in some situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2022-47929)

It was discovered that a race condition existed in Adreno GPU DRM driver in
the Linux kernel, leading to a double-free vulnerability. A local attacker
could use this to cause a denial of service (system crash).
(CVE-2023-21106)

Stonejiajia, Shir Tamari and Sagi Tzadik discovered that the OverlayFS
implementation in the Ubuntu Linux kernel did not properly perform
permission checks in certain situations. A local attacker could possibly
use this to gain elevated privileges. (CVE-2023-2640)

Mingi Cho discovered that the netfilter subsystem in the Linux kernel did
not properly validate the status of a nft chain while performing a lookup
by id, leading to a use-after-free vulnerability. An attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-31248)

Shir Tamari and Sagi Tzadik discovered that the OverlayFS implementation in
the Ubuntu Linux kernel did not properly perform permission checks in
certain situations. A local attacker could possibly use this to gain
elevated privileges. (CVE-2023-32629)

Querijn Voet discovered that a race condition existed in the io_uring
subsystem in the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-3389)

Tanguy Dubroca discovered that the netfilter subsystem in the Linux kernel
did not properly handle certain pointer data type, leading to an out-of-
bounds write vulnerability. A privileged attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-35001)

ID
USN-6248-1
Severity
high
Severity from
CVE-2023-21106
URL
https://ubuntu.com/security/notices/USN-6248-1
Published
2023-07-25T21:55:57
(13 months ago)
Modified
2023-07-25T21:55:57
(13 months ago)
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:deb/ubuntu/linux-tools-oem-22.04b?distro=jammy ubuntu linux-tools-oem-22.04b < 6.0.0.1020.20 jammy
Affected pkg:deb/ubuntu/linux-tools-6.0.0-1020-oem?distro=jammy ubuntu linux-tools-6.0.0-1020-oem < 6.0.0-1020.20 jammy
Affected pkg:deb/ubuntu/linux-oem-6.0-tools-host?distro=jammy ubuntu linux-oem-6.0-tools-host < 6.0.0-1020.20 jammy
Affected pkg:deb/ubuntu/linux-oem-6.0-tools-6.0.0-1020?distro=jammy ubuntu linux-oem-6.0-tools-6.0.0-1020 < 6.0.0-1020.20 jammy
Affected pkg:deb/ubuntu/linux-oem-6.0-headers-6.0.0-1020?distro=jammy ubuntu linux-oem-6.0-headers-6.0.0-1020 < 6.0.0-1020.20 jammy
Affected pkg:deb/ubuntu/linux-oem-22.04b?distro=jammy ubuntu linux-oem-22.04b < 6.0.0.1020.20 jammy
Affected pkg:deb/ubuntu/linux-modules-iwlwifi-oem-22.04b?distro=jammy ubuntu linux-modules-iwlwifi-oem-22.04b < 6.0.0.1020.20 jammy
Affected pkg:deb/ubuntu/linux-modules-iwlwifi-6.0.0-1020-oem?distro=jammy ubuntu linux-modules-iwlwifi-6.0.0-1020-oem < 6.0.0-1020.20 jammy
Affected pkg:deb/ubuntu/linux-modules-ivsc-oem-22.04b?distro=jammy ubuntu linux-modules-ivsc-oem-22.04b < 6.0.0.1020.20 jammy
Affected pkg:deb/ubuntu/linux-modules-ivsc-6.0.0-1020-oem?distro=jammy ubuntu linux-modules-ivsc-6.0.0-1020-oem < 6.0.0-1020.20 jammy
Affected pkg:deb/ubuntu/linux-modules-ipu6-oem-22.04b?distro=jammy ubuntu linux-modules-ipu6-oem-22.04b < 6.0.0.1020.20 jammy
Affected pkg:deb/ubuntu/linux-modules-ipu6-6.0.0-1020-oem?distro=jammy ubuntu linux-modules-ipu6-6.0.0-1020-oem < 6.0.0-1020.20 jammy
Affected pkg:deb/ubuntu/linux-modules-6.0.0-1020-oem?distro=jammy ubuntu linux-modules-6.0.0-1020-oem < 6.0.0-1020.20 jammy
Affected pkg:deb/ubuntu/linux-image-unsigned-6.0.0-1020-oem?distro=jammy ubuntu linux-image-unsigned-6.0.0-1020-oem < 6.0.0-1020.20 jammy
Affected pkg:deb/ubuntu/linux-image-oem-22.04b?distro=jammy ubuntu linux-image-oem-22.04b < 6.0.0.1020.20 jammy
Affected pkg:deb/ubuntu/linux-image-6.0.0-1020-oem?distro=jammy ubuntu linux-image-6.0.0-1020-oem < 6.0.0-1020.20 jammy
Affected pkg:deb/ubuntu/linux-headers-oem-22.04b?distro=jammy ubuntu linux-headers-oem-22.04b < 6.0.0.1020.20 jammy
Affected pkg:deb/ubuntu/linux-headers-6.0.0-1020-oem?distro=jammy ubuntu linux-headers-6.0.0-1020-oem < 6.0.0-1020.20 jammy
Affected pkg:deb/ubuntu/linux-buildinfo-6.0.0-1020-oem?distro=jammy ubuntu linux-buildinfo-6.0.0-1020-oem < 6.0.0-1020.20 jammy
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...