[USN-6396-2] Linux kernel (KVM) vulnerabilities

Severity High
Affected Packages 11
CVEs 6

Several security issues were fixed in the Linux kernel.

It was discovered that some AMD x86-64 processors with SMT enabled could
speculatively execute instructions using a return address from a sibling
thread. A local attacker could possibly use this to expose sensitive
information. (CVE-2022-27672)

Daniel Moghimi discovered that some Intel(R) Processors did not properly
clear microarchitectural state after speculative execution of various
instructions. A local unprivileged user could use this to obtain to
sensitive information. (CVE-2022-40982)

Yang Lan discovered that the GFS2 file system implementation in the Linux
kernel could attempt to dereference a null pointer in some situations. An
attacker could use this to construct a malicious GFS2 image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2023-3212)

It was discovered that the NFC implementation in the Linux kernel contained
a use-after-free vulnerability when performing peer-to-peer communication
in certain conditions. A privileged attacker could use this to cause a
denial of service (system crash) or possibly expose sensitive information
(kernel memory). (CVE-2023-3863)

It was discovered that the bluetooth subsystem in the Linux kernel did not
properly handle L2CAP socket release, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-40283)

It was discovered that some network classifier implementations in the Linux
kernel contained use-after-free vulnerabilities. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-4128)

ID
USN-6396-2
Severity
high
Severity from
CVE-2023-40283
URL
https://ubuntu.com/security/notices/USN-6396-2
Published
2023-10-05T12:39:36
(11 months ago)
Modified
2023-10-05T12:39:36
(11 months ago)
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:deb/ubuntu/linux-tools-kvm?distro=bionic ubuntu linux-tools-kvm < 4.15.0.1145.136 bionic
Affected pkg:deb/ubuntu/linux-tools-4.15.0-1145-kvm?distro=bionic ubuntu linux-tools-4.15.0-1145-kvm < 4.15.0-1145.150 bionic
Affected pkg:deb/ubuntu/linux-modules-4.15.0-1145-kvm?distro=bionic ubuntu linux-modules-4.15.0-1145-kvm < 4.15.0-1145.150 bionic
Affected pkg:deb/ubuntu/linux-kvm?distro=bionic ubuntu linux-kvm < 4.15.0.1145.136 bionic
Affected pkg:deb/ubuntu/linux-kvm-tools-4.15.0-1145?distro=bionic ubuntu linux-kvm-tools-4.15.0-1145 < 4.15.0-1145.150 bionic
Affected pkg:deb/ubuntu/linux-kvm-headers-4.15.0-1145?distro=bionic ubuntu linux-kvm-headers-4.15.0-1145 < 4.15.0-1145.150 bionic
Affected pkg:deb/ubuntu/linux-image-kvm?distro=bionic ubuntu linux-image-kvm < 4.15.0.1145.136 bionic
Affected pkg:deb/ubuntu/linux-image-4.15.0-1145-kvm?distro=bionic ubuntu linux-image-4.15.0-1145-kvm < 4.15.0-1145.150 bionic
Affected pkg:deb/ubuntu/linux-headers-kvm?distro=bionic ubuntu linux-headers-kvm < 4.15.0.1145.136 bionic
Affected pkg:deb/ubuntu/linux-headers-4.15.0-1145-kvm?distro=bionic ubuntu linux-headers-4.15.0-1145-kvm < 4.15.0-1145.150 bionic
Affected pkg:deb/ubuntu/linux-buildinfo-4.15.0-1145-kvm?distro=bionic ubuntu linux-buildinfo-4.15.0-1145-kvm < 4.15.0-1145.150 bionic
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...