[USN-6479-1] Linux kernel (OEM) vulnerabilities

Severity High
Affected Packages 22
CVEs 4

Several security issues were fixed in the Linux kernel.

Kyle Zeng discovered that the netfilter subsystem in the Linux kernel
contained a race condition in IP set operations in certain situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2023-42756)

Alex Birnberg discovered that the netfilter subsystem in the Linux kernel
did not properly validate register length, leading to an out-of- bounds
write vulnerability. A local attacker could possibly use this to cause a
denial of service (system crash). (CVE-2023-4881)

It was discovered that the Quick Fair Queueing scheduler implementation in
the Linux kernel did not properly handle network packets in certain
conditions, leading to a use after free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-4921)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle removal of rules from chain bindings in certain
circumstances, leading to a use-after-free vulnerability. A local attacker
could possibly use this to cause a denial of service (system crash) or
execute arbitrary code. (CVE-2023-5197)

Package Affected Version
pkg:deb/ubuntu/linux-tools-oem-22.04d?distro=jammy < 6.5.0.1007.9
pkg:deb/ubuntu/linux-tools-6.5.0-1007-oem?distro=jammy < 6.5.0-1007.7
pkg:deb/ubuntu/linux-oem-6.5-tools-host?distro=jammy < 6.5.0-1007.7
pkg:deb/ubuntu/linux-oem-6.5-tools-6.5.0-1007?distro=jammy < 6.5.0-1007.7
pkg:deb/ubuntu/linux-oem-6.5-lib-rust-6.5.0-1007-oem?distro=jammy < 6.5.0-1007.7
pkg:deb/ubuntu/linux-oem-6.5-headers-6.5.0-1007?distro=jammy < 6.5.0-1007.7
pkg:deb/ubuntu/linux-oem-22.04d?distro=jammy < 6.5.0.1007.9
pkg:deb/ubuntu/linux-modules-iwlwifi-oem-22.04d?distro=jammy < 6.5.0.1007.9
pkg:deb/ubuntu/linux-modules-iwlwifi-6.5.0-1007-oem?distro=jammy < 6.5.0-1007.7
pkg:deb/ubuntu/linux-modules-ivsc-oem-22.04d?distro=jammy < 6.5.0.1007.9
pkg:deb/ubuntu/linux-modules-ivsc-6.5.0-1007-oem?distro=jammy < 6.5.0-1007.7
pkg:deb/ubuntu/linux-modules-ipu6-oem-22.04d?distro=jammy < 6.5.0.1007.9
pkg:deb/ubuntu/linux-modules-ipu6-6.5.0-1007-oem?distro=jammy < 6.5.0-1007.7
pkg:deb/ubuntu/linux-modules-6.5.0-1007-oem?distro=jammy < 6.5.0-1007.7
pkg:deb/ubuntu/linux-image-unsigned-6.5.0-1007-oem?distro=jammy < 6.5.0-1007.7
pkg:deb/ubuntu/linux-image-uc-oem-22.04d?distro=jammy < 6.5.0.1007.9
pkg:deb/ubuntu/linux-image-uc-6.5.0-1007-oem?distro=jammy < 6.5.0-1007.7
pkg:deb/ubuntu/linux-image-oem-22.04d?distro=jammy < 6.5.0.1007.9
pkg:deb/ubuntu/linux-image-6.5.0-1007-oem?distro=jammy < 6.5.0-1007.7
pkg:deb/ubuntu/linux-headers-oem-22.04d?distro=jammy < 6.5.0.1007.9
pkg:deb/ubuntu/linux-headers-6.5.0-1007-oem?distro=jammy < 6.5.0-1007.7
pkg:deb/ubuntu/linux-buildinfo-6.5.0-1007-oem?distro=jammy < 6.5.0-1007.7
ID
USN-6479-1
Severity
high
Severity from
CVE-2023-4921
URL
https://ubuntu.com/security/notices/USN-6479-1
Published
2023-11-14T22:15:29
(10 months ago)
Modified
2023-11-14T22:15:29
(10 months ago)
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:deb/ubuntu/linux-tools-oem-22.04d?distro=jammy ubuntu linux-tools-oem-22.04d < 6.5.0.1007.9 jammy
Affected pkg:deb/ubuntu/linux-tools-6.5.0-1007-oem?distro=jammy ubuntu linux-tools-6.5.0-1007-oem < 6.5.0-1007.7 jammy
Affected pkg:deb/ubuntu/linux-oem-6.5-tools-host?distro=jammy ubuntu linux-oem-6.5-tools-host < 6.5.0-1007.7 jammy
Affected pkg:deb/ubuntu/linux-oem-6.5-tools-6.5.0-1007?distro=jammy ubuntu linux-oem-6.5-tools-6.5.0-1007 < 6.5.0-1007.7 jammy
Affected pkg:deb/ubuntu/linux-oem-6.5-lib-rust-6.5.0-1007-oem?distro=jammy ubuntu linux-oem-6.5-lib-rust-6.5.0-1007-oem < 6.5.0-1007.7 jammy
Affected pkg:deb/ubuntu/linux-oem-6.5-headers-6.5.0-1007?distro=jammy ubuntu linux-oem-6.5-headers-6.5.0-1007 < 6.5.0-1007.7 jammy
Affected pkg:deb/ubuntu/linux-oem-22.04d?distro=jammy ubuntu linux-oem-22.04d < 6.5.0.1007.9 jammy
Affected pkg:deb/ubuntu/linux-modules-iwlwifi-oem-22.04d?distro=jammy ubuntu linux-modules-iwlwifi-oem-22.04d < 6.5.0.1007.9 jammy
Affected pkg:deb/ubuntu/linux-modules-iwlwifi-6.5.0-1007-oem?distro=jammy ubuntu linux-modules-iwlwifi-6.5.0-1007-oem < 6.5.0-1007.7 jammy
Affected pkg:deb/ubuntu/linux-modules-ivsc-oem-22.04d?distro=jammy ubuntu linux-modules-ivsc-oem-22.04d < 6.5.0.1007.9 jammy
Affected pkg:deb/ubuntu/linux-modules-ivsc-6.5.0-1007-oem?distro=jammy ubuntu linux-modules-ivsc-6.5.0-1007-oem < 6.5.0-1007.7 jammy
Affected pkg:deb/ubuntu/linux-modules-ipu6-oem-22.04d?distro=jammy ubuntu linux-modules-ipu6-oem-22.04d < 6.5.0.1007.9 jammy
Affected pkg:deb/ubuntu/linux-modules-ipu6-6.5.0-1007-oem?distro=jammy ubuntu linux-modules-ipu6-6.5.0-1007-oem < 6.5.0-1007.7 jammy
Affected pkg:deb/ubuntu/linux-modules-6.5.0-1007-oem?distro=jammy ubuntu linux-modules-6.5.0-1007-oem < 6.5.0-1007.7 jammy
Affected pkg:deb/ubuntu/linux-image-unsigned-6.5.0-1007-oem?distro=jammy ubuntu linux-image-unsigned-6.5.0-1007-oem < 6.5.0-1007.7 jammy
Affected pkg:deb/ubuntu/linux-image-uc-oem-22.04d?distro=jammy ubuntu linux-image-uc-oem-22.04d < 6.5.0.1007.9 jammy
Affected pkg:deb/ubuntu/linux-image-uc-6.5.0-1007-oem?distro=jammy ubuntu linux-image-uc-6.5.0-1007-oem < 6.5.0-1007.7 jammy
Affected pkg:deb/ubuntu/linux-image-oem-22.04d?distro=jammy ubuntu linux-image-oem-22.04d < 6.5.0.1007.9 jammy
Affected pkg:deb/ubuntu/linux-image-6.5.0-1007-oem?distro=jammy ubuntu linux-image-6.5.0-1007-oem < 6.5.0-1007.7 jammy
Affected pkg:deb/ubuntu/linux-headers-oem-22.04d?distro=jammy ubuntu linux-headers-oem-22.04d < 6.5.0.1007.9 jammy
Affected pkg:deb/ubuntu/linux-headers-6.5.0-1007-oem?distro=jammy ubuntu linux-headers-6.5.0-1007-oem < 6.5.0-1007.7 jammy
Affected pkg:deb/ubuntu/linux-buildinfo-6.5.0-1007-oem?distro=jammy ubuntu linux-buildinfo-6.5.0-1007-oem < 6.5.0-1007.7 jammy
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...