[USN-6549-5] Linux kernel vulnerabilities
Several security issues were fixed in the Linux kernel.
It was discovered that the USB subsystem in the Linux kernel contained a
race condition while handling device descriptors in certain situations,
leading to a out-of-bounds read vulnerability. A local attacker could
possibly use this to cause a denial of service (system crash).
(CVE-2023-37453)
Lin Ma discovered that the Netlink Transformation (XFRM) subsystem in the
Linux kernel did not properly initialize a policy data structure, leading
to an out-of-bounds vulnerability. A local privileged attacker could use
this to cause a denial of service (system crash) or possibly expose
sensitive information (kernel memory). (CVE-2023-3773)
Lucas Leong discovered that the netfilter subsystem in the Linux kernel did
not properly validate some attributes passed from userspace. A local
attacker could use this to cause a denial of service (system crash) or
possibly expose sensitive information (kernel memory). (CVE-2023-39189)
Sunjoo Park discovered that the netfilter subsystem in the Linux kernel did
not properly validate u32 packets content, leading to an out-of-bounds read
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-39192)
Lucas Leong discovered that the netfilter subsystem in the Linux kernel did
not properly validate SCTP data, leading to an out-of-bounds read
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-39193)
Lucas Leong discovered that the Netlink Transformation (XFRM) subsystem in
the Linux kernel did not properly handle state filters, leading to an out-
of-bounds read vulnerability. A privileged local attacker could use this to
cause a denial of service (system crash) or possibly expose sensitive
information. (CVE-2023-39194)
It was discovered that a race condition existed in QXL virtual GPU driver
in the Linux kernel, leading to a use after free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-39198)
Kyle Zeng discovered that the IPv4 implementation in the Linux kernel did
not properly handle socket buffers (skb) when performing IP routing in
certain circumstances, leading to a null pointer dereference vulnerability.
A privileged attacker could use this to cause a denial of service (system
crash). (CVE-2023-42754)
Jason Wang discovered that the virtio ring implementation in the Linux
kernel did not properly handle iov buffers in some situations. A local
attacker in a guest VM could use this to cause a denial of service (host
system crash). (CVE-2023-5158)
Alon Zahavi discovered that the NVMe-oF/TCP subsystem in the Linux kernel
did not properly handle queue initialization failures in certain
situations, leading to a use-after-free vulnerability. A remote attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-5178)
Budimir Markovic discovered that the perf subsystem in the Linux kernel did
not properly handle event groups, leading to an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-5717)
- ID
- USN-6549-5
- Severity
- high
- Severity from
- CVE-2023-5178
- URL
- https://ubuntu.com/security/notices/USN-6549-5
- Published
-
2024-01-10T21:55:12
(8 months ago) - Modified
-
2024-01-10T21:55:12
(8 months ago) - Other Advisories
-
- ALAS-2023-1838
- ALAS-2023-1883
- ALAS2-2023-2264
- ALAS2-2023-2328
- ALAS2-2023-2340
- ALAS2-2024-2391
- ALSA-2023:7549
- ALSA-2024:0897
- ALSA-2024:3138
- DSA-5492-1
- DSA-5594-1
- ELSA-2023-13019
- ELSA-2023-13043
- ELSA-2023-13044
- ELSA-2023-13048
- ELSA-2023-13049
- ELSA-2023-6583
- ELSA-2023-7549
- ELSA-2024-0461
- ELSA-2024-0897
- ELSA-2024-12094
- ELSA-2024-12169
- ELSA-2024-12258
- ELSA-2024-1248
- ELSA-2024-2394
- ELSA-2024-3138
- FEDORA-2023-50bd7c9c12
- FEDORA-2023-830d9ec624
- FEDORA-2023-c3bb819677
- MS:CVE-2023-5178
- MS:CVE-2023-5717
- RHSA-2023:7548
- RHSA-2023:7549
- RHSA-2023:7554
- RHSA-2024:0340
- RHSA-2024:0881
- RHSA-2024:0897
- RHSA-2024:2950
- RHSA-2024:3138
- RLSA-2023:7549
- RLSA-2024:3138
- SSA:2023-325-01
- SUSE-SU-2023:3599-1
- SUSE-SU-2023:3599-2
- SUSE-SU-2023:3600-1
- SUSE-SU-2023:3600-2
- SUSE-SU-2023:3656-1
- SUSE-SU-2023:3682-1
- SUSE-SU-2023:3683-1
- SUSE-SU-2023:3704-1
- SUSE-SU-2023:3964-1
- SUSE-SU-2023:3969-1
- SUSE-SU-2023:3971-1
- SUSE-SU-2023:3988-1
- SUSE-SU-2023:4031-1
- SUSE-SU-2023:4032-1
- SUSE-SU-2023:4033-1
- SUSE-SU-2023:4035-1
- SUSE-SU-2023:4057-1
- SUSE-SU-2023:4058-1
- SUSE-SU-2023:4071-1
- SUSE-SU-2023:4072-1
- SUSE-SU-2023:4072-2
- SUSE-SU-2023:4093-1
- SUSE-SU-2023:4343-1
- SUSE-SU-2023:4345-1
- SUSE-SU-2023:4346-1
- SUSE-SU-2023:4347-1
- SUSE-SU-2023:4348-1
- SUSE-SU-2023:4349-1
- SUSE-SU-2023:4351-1
- SUSE-SU-2023:4358-1
- SUSE-SU-2023:4359-1
- SUSE-SU-2023:4375-1
- SUSE-SU-2023:4377-1
- SUSE-SU-2023:4378-1
- SUSE-SU-2023:4414-1
- SUSE-SU-2023:4730-1
- SUSE-SU-2023:4731-1
- SUSE-SU-2023:4732-1
- SUSE-SU-2023:4733-1
- SUSE-SU-2023:4734-1
- SUSE-SU-2023:4735-1
- SUSE-SU-2023:4782-1
- SUSE-SU-2023:4783-1
- SUSE-SU-2023:4784-1
- SUSE-SU-2023:4810-1
- SUSE-SU-2023:4811-1
- SUSE-SU-2023:4882-1
- SUSE-SU-2023:4883-1
- SUSE-SU-2024:0112-1
- SUSE-SU-2024:0331-1
- SUSE-SU-2024:0348-1
- SUSE-SU-2024:0352-1
- SUSE-SU-2024:0378-1
- SUSE-SU-2024:0395-1
- SUSE-SU-2024:0414-1
- SUSE-SU-2024:0421-1
- SUSE-SU-2024:0622-1
- SUSE-SU-2024:0655-1
- SUSE-SU-2024:0662-1
- SUSE-SU-2024:0666-1
- SUSE-SU-2024:0698-1
- SUSE-SU-2024:0705-1
- SUSE-SU-2024:0727-1
- SUSE-SU-2024:1358-1
- SUSE-SU-2024:1359-1
- SUSE-SU-2024:1380-1
- SUSE-SU-2024:1382-1
- SUSE-SU-2024:1390-1
- SUSE-SU-2024:1400-1
- SUSE-SU-2024:1405-1
- SUSE-SU-2024:1406-1
- SUSE-SU-2024:1418-1
- SUSE-SU-2024:1493-1
- SUSE-SU-2024:1505-1
- SUSE-SU-2024:1537-1
- SUSE-SU-2024:1545-1
- SUSE-SU-2024:1551-1
- SUSE-SU-2024:1558-1
- SUSE-SU-2024:1581-1
- SUSE-SU-2024:1582-1
- SUSE-SU-2024:1596-1
- SUSE-SU-2024:2894-1
- SUSE-SU-2024:2929-1
- SUSE-SU-2024:2947-1
- USN-6415-1
- USN-6461-1
- USN-6494-1
- USN-6494-2
- USN-6497-1
- USN-6532-1
- USN-6534-1
- USN-6534-2
- USN-6534-3
- USN-6536-1
- USN-6537-1
- USN-6548-1
- USN-6548-2
- USN-6548-3
- USN-6548-4
- USN-6548-5
- USN-6549-1
- USN-6549-2
- USN-6549-3
- USN-6549-4
- USN-6573-1
- USN-6635-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-tools-intel?distro=focal | ubuntu | linux-tools-intel | < 5.15.0.1046.52~20.04.36 | focal | ||
Affected | pkg:deb/ubuntu/linux-tools-intel-iotg?distro=focal | ubuntu | linux-tools-intel-iotg | < 5.15.0.1046.52~20.04.36 | focal | ||
Affected | pkg:deb/ubuntu/linux-tools-intel-iotg-edge?distro=focal | ubuntu | linux-tools-intel-iotg-edge | < 5.15.0.1046.52~20.04.36 | focal | ||
Affected | pkg:deb/ubuntu/linux-tools-gcp?distro=focal | ubuntu | linux-tools-gcp | < 5.15.0.1048.56~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-tools-gcp-edge?distro=focal | ubuntu | linux-tools-gcp-edge | < 5.15.0.1048.56~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-tools-5.15.0-1048-gcp?distro=focal | ubuntu | linux-tools-5.15.0-1048-gcp | < 5.15.0-1048.56~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-tools-5.15.0-1046-intel-iotg?distro=focal | ubuntu | linux-tools-5.15.0-1046-intel-iotg | < 5.15.0-1046.52~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-modules-iwlwifi-5.15.0-1048-gcp?distro=focal | ubuntu | linux-modules-iwlwifi-5.15.0-1048-gcp | < 5.15.0-1048.56~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-modules-iwlwifi-5.15.0-1046-intel-iotg?distro=focal | ubuntu | linux-modules-iwlwifi-5.15.0-1046-intel-iotg | < 5.15.0-1046.52~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-modules-extra-gcp?distro=focal | ubuntu | linux-modules-extra-gcp | < 5.15.0.1048.56~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-modules-extra-gcp-edge?distro=focal | ubuntu | linux-modules-extra-gcp-edge | < 5.15.0.1048.56~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-modules-extra-5.15.0-1048-gcp?distro=focal | ubuntu | linux-modules-extra-5.15.0-1048-gcp | < 5.15.0-1048.56~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-modules-extra-5.15.0-1046-intel-iotg?distro=focal | ubuntu | linux-modules-extra-5.15.0-1046-intel-iotg | < 5.15.0-1046.52~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-modules-5.15.0-1048-gcp?distro=focal | ubuntu | linux-modules-5.15.0-1048-gcp | < 5.15.0-1048.56~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-modules-5.15.0-1046-intel-iotg?distro=focal | ubuntu | linux-modules-5.15.0-1046-intel-iotg | < 5.15.0-1046.52~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-intel?distro=focal | ubuntu | linux-intel | < 5.15.0.1046.52~20.04.36 | focal | ||
Affected | pkg:deb/ubuntu/linux-intel-iotg?distro=focal | ubuntu | linux-intel-iotg | < 5.15.0.1046.52~20.04.36 | focal | ||
Affected | pkg:deb/ubuntu/linux-intel-iotg-edge?distro=focal | ubuntu | linux-intel-iotg-edge | < 5.15.0.1046.52~20.04.36 | focal | ||
Affected | pkg:deb/ubuntu/linux-intel-iotg-5.15-tools-host?distro=focal | ubuntu | linux-intel-iotg-5.15-tools-host | < 5.15.0-1046.52~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-intel-iotg-5.15-tools-common?distro=focal | ubuntu | linux-intel-iotg-5.15-tools-common | < 5.15.0-1046.52~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-intel-iotg-5.15-tools-5.15.0-1046?distro=focal | ubuntu | linux-intel-iotg-5.15-tools-5.15.0-1046 | < 5.15.0-1046.52~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-intel-iotg-5.15-headers-5.15.0-1046?distro=focal | ubuntu | linux-intel-iotg-5.15-headers-5.15.0-1046 | < 5.15.0-1046.52~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-intel-iotg-5.15-cloud-tools-common?distro=focal | ubuntu | linux-intel-iotg-5.15-cloud-tools-common | < 5.15.0-1046.52~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-intel-iotg-5.15-cloud-tools-5.15.0-1046?distro=focal | ubuntu | linux-intel-iotg-5.15-cloud-tools-5.15.0-1046 | < 5.15.0-1046.52~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-unsigned-5.15.0-1048-gcp?distro=focal | ubuntu | linux-image-unsigned-5.15.0-1048-gcp | < 5.15.0-1048.56~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-unsigned-5.15.0-1046-intel-iotg?distro=focal | ubuntu | linux-image-unsigned-5.15.0-1046-intel-iotg | < 5.15.0-1046.52~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-intel?distro=focal | ubuntu | linux-image-intel | < 5.15.0.1046.52~20.04.36 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-intel-iotg?distro=focal | ubuntu | linux-image-intel-iotg | < 5.15.0.1046.52~20.04.36 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-intel-iotg-edge?distro=focal | ubuntu | linux-image-intel-iotg-edge | < 5.15.0.1046.52~20.04.36 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-gcp?distro=focal | ubuntu | linux-image-gcp | < 5.15.0.1048.56~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-gcp-edge?distro=focal | ubuntu | linux-image-gcp-edge | < 5.15.0.1048.56~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-5.15.0-1048-gcp?distro=focal | ubuntu | linux-image-5.15.0-1048-gcp | < 5.15.0-1048.56~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-5.15.0-1046-intel-iotg?distro=focal | ubuntu | linux-image-5.15.0-1046-intel-iotg | < 5.15.0-1046.52~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-headers-intel?distro=focal | ubuntu | linux-headers-intel | < 5.15.0.1046.52~20.04.36 | focal | ||
Affected | pkg:deb/ubuntu/linux-headers-intel-iotg?distro=focal | ubuntu | linux-headers-intel-iotg | < 5.15.0.1046.52~20.04.36 | focal | ||
Affected | pkg:deb/ubuntu/linux-headers-intel-iotg-edge?distro=focal | ubuntu | linux-headers-intel-iotg-edge | < 5.15.0.1046.52~20.04.36 | focal | ||
Affected | pkg:deb/ubuntu/linux-headers-gcp?distro=focal | ubuntu | linux-headers-gcp | < 5.15.0.1048.56~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-headers-gcp-edge?distro=focal | ubuntu | linux-headers-gcp-edge | < 5.15.0.1048.56~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-headers-5.15.0-1048-gcp?distro=focal | ubuntu | linux-headers-5.15.0-1048-gcp | < 5.15.0-1048.56~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-headers-5.15.0-1046-intel-iotg?distro=focal | ubuntu | linux-headers-5.15.0-1046-intel-iotg | < 5.15.0-1046.52~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-gcp?distro=focal | ubuntu | linux-gcp | < 5.15.0.1048.56~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-gcp-edge?distro=focal | ubuntu | linux-gcp-edge | < 5.15.0.1048.56~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-gcp-5.15-tools-5.15.0-1048?distro=focal | ubuntu | linux-gcp-5.15-tools-5.15.0-1048 | < 5.15.0-1048.56~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-gcp-5.15-headers-5.15.0-1048?distro=focal | ubuntu | linux-gcp-5.15-headers-5.15.0-1048 | < 5.15.0-1048.56~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-cloud-tools-intel?distro=focal | ubuntu | linux-cloud-tools-intel | < 5.15.0.1046.52~20.04.36 | focal | ||
Affected | pkg:deb/ubuntu/linux-cloud-tools-5.15.0-1046-intel-iotg?distro=focal | ubuntu | linux-cloud-tools-5.15.0-1046-intel-iotg | < 5.15.0-1046.52~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-buildinfo-5.15.0-1048-gcp?distro=focal | ubuntu | linux-buildinfo-5.15.0-1048-gcp | < 5.15.0-1048.56~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-buildinfo-5.15.0-1046-intel-iotg?distro=focal | ubuntu | linux-buildinfo-5.15.0-1046-intel-iotg | < 5.15.0-1046.52~20.04.1 | focal |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |