[USN-6327-1] Linux kernel (KVM) vulnerabilities

Severity High
Affected Packages 13
CVEs 6

Several security issues were fixed in the Linux kernel.

Zheng Zhang discovered that the device-mapper implementation in the Linux
kernel did not properly handle locking during table_clear() operations. A
local attacker could use this to cause a denial of service (kernel
deadlock). (CVE-2023-2269)

It was discovered that a use-after-free vulnerability existed in the HFS+
file system implementation in the Linux kernel. A local attacker could
possibly use this to cause a denial of service (system crash).
(CVE-2023-2985)

It was discovered that the DVB Core driver in the Linux kernel did not
properly handle locking events in certain situations. A local attacker
could use this to cause a denial of service (kernel deadlock).
(CVE-2023-31084)

It was discovered that the virtual terminal driver in the Linux kernel
contained a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly expose sensitive
information (kernel memory). (CVE-2023-3567)

It was discovered that the Quick Fair Queueing network scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3611)

It was discovered that the network packet classifier with
netfilter/firewall marks implementation in the Linux kernel did not
properly handle reference counting, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3776)

ID
USN-6327-1
Severity
high
Severity from
CVE-2023-3611
URL
https://ubuntu.com/security/notices/USN-6327-1
Published
2023-08-31T21:51:29
(12 months ago)
Modified
2023-08-31T21:51:29
(12 months ago)
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:deb/ubuntu/linux-tools-kvm?distro=xenial ubuntu linux-tools-kvm < 4.4.0.1123.120 xenial
Affected pkg:deb/ubuntu/linux-tools-4.4.0-1123-kvm?distro=xenial ubuntu linux-tools-4.4.0-1123-kvm < 4.4.0-1123.133 xenial
Affected pkg:deb/ubuntu/linux-modules-4.4.0-1123-kvm?distro=xenial ubuntu linux-modules-4.4.0-1123-kvm < 4.4.0-1123.133 xenial
Affected pkg:deb/ubuntu/linux-kvm?distro=xenial ubuntu linux-kvm < 4.4.0.1123.120 xenial
Affected pkg:deb/ubuntu/linux-kvm-tools-4.4.0-1123?distro=xenial ubuntu linux-kvm-tools-4.4.0-1123 < 4.4.0-1123.133 xenial
Affected pkg:deb/ubuntu/linux-kvm-headers-4.4.0-1123?distro=xenial ubuntu linux-kvm-headers-4.4.0-1123 < 4.4.0-1123.133 xenial
Affected pkg:deb/ubuntu/linux-kvm-cloud-tools-4.4.0-1123?distro=xenial ubuntu linux-kvm-cloud-tools-4.4.0-1123 < 4.4.0-1123.133 xenial
Affected pkg:deb/ubuntu/linux-image-kvm?distro=xenial ubuntu linux-image-kvm < 4.4.0.1123.120 xenial
Affected pkg:deb/ubuntu/linux-image-4.4.0-1123-kvm?distro=xenial ubuntu linux-image-4.4.0-1123-kvm < 4.4.0-1123.133 xenial
Affected pkg:deb/ubuntu/linux-headers-kvm?distro=xenial ubuntu linux-headers-kvm < 4.4.0.1123.120 xenial
Affected pkg:deb/ubuntu/linux-headers-4.4.0-1123-kvm?distro=xenial ubuntu linux-headers-4.4.0-1123-kvm < 4.4.0-1123.133 xenial
Affected pkg:deb/ubuntu/linux-cloud-tools-4.4.0-1123-kvm?distro=xenial ubuntu linux-cloud-tools-4.4.0-1123-kvm < 4.4.0-1123.133 xenial
Affected pkg:deb/ubuntu/linux-buildinfo-4.4.0-1123-kvm?distro=xenial ubuntu linux-buildinfo-4.4.0-1123-kvm < 4.4.0-1123.133 xenial
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...