[USN-6651-3] Linux kernel (StarFive) vulnerabilities

Severity High
Affected Packages 12
CVEs 6

Several security issues were fixed in the Linux kernel.

It was discovered that a race condition existed in the ATM (Asynchronous
Transfer Mode) subsystem of the Linux kernel, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-51780)

It was discovered that a race condition existed in the AppleTalk networking
subsystem of the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-51781)

Zhenghan Wang discovered that the generic ID allocator implementation in
the Linux kernel did not properly check for null bitmap when releasing IDs.
A local attacker could use this to cause a denial of service (system
crash). (CVE-2023-6915)

Robert Morris discovered that the CIFS network file system implementation
in the Linux kernel did not properly validate certain server commands
fields, leading to an out-of-bounds read vulnerability. An attacker could
use this to cause a denial of service (system crash) or possibly expose
sensitive information. (CVE-2024-0565)

Jann Horn discovered that the io_uring subsystem in the Linux kernel did
not properly handle the release of certain buffer rings. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2024-0582)

Jann Horn discovered that the TLS subsystem in the Linux kernel did not
properly handle spliced messages, leading to an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2024-0646)

ID
USN-6651-3
Severity
high
Severity from
CVE-2024-0582
URL
https://ubuntu.com/security/notices/USN-6651-3
Published
2024-02-29T14:24:04
(6 months ago)
Modified
2024-02-29T14:24:04
(6 months ago)
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:deb/ubuntu/linux-tools-starfive?distro=jammy ubuntu linux-tools-starfive < 6.5.0.1008.9~22.04.3 jammy
Affected pkg:deb/ubuntu/linux-tools-6.5.0-1008-starfive?distro=jammy ubuntu linux-tools-6.5.0-1008-starfive < 6.5.0-1008.9~22.04.1 jammy
Affected pkg:deb/ubuntu/linux-starfive?distro=jammy ubuntu linux-starfive < 6.5.0.1008.9~22.04.3 jammy
Affected pkg:deb/ubuntu/linux-starfive-6.5-tools-6.5.0-1008?distro=jammy ubuntu linux-starfive-6.5-tools-6.5.0-1008 < 6.5.0-1008.9~22.04.1 jammy
Affected pkg:deb/ubuntu/linux-starfive-6.5-headers-6.5.0-1008?distro=jammy ubuntu linux-starfive-6.5-headers-6.5.0-1008 < 6.5.0-1008.9~22.04.1 jammy
Affected pkg:deb/ubuntu/linux-modules-extra-6.5.0-1008-starfive?distro=jammy ubuntu linux-modules-extra-6.5.0-1008-starfive < 6.5.0-1008.9~22.04.1 jammy
Affected pkg:deb/ubuntu/linux-modules-6.5.0-1008-starfive?distro=jammy ubuntu linux-modules-6.5.0-1008-starfive < 6.5.0-1008.9~22.04.1 jammy
Affected pkg:deb/ubuntu/linux-image-starfive?distro=jammy ubuntu linux-image-starfive < 6.5.0.1008.9~22.04.3 jammy
Affected pkg:deb/ubuntu/linux-image-6.5.0-1008-starfive?distro=jammy ubuntu linux-image-6.5.0-1008-starfive < 6.5.0-1008.9~22.04.1 jammy
Affected pkg:deb/ubuntu/linux-headers-starfive?distro=jammy ubuntu linux-headers-starfive < 6.5.0.1008.9~22.04.3 jammy
Affected pkg:deb/ubuntu/linux-headers-6.5.0-1008-starfive?distro=jammy ubuntu linux-headers-6.5.0-1008-starfive < 6.5.0-1008.9~22.04.1 jammy
Affected pkg:deb/ubuntu/linux-buildinfo-6.5.0-1008-starfive?distro=jammy ubuntu linux-buildinfo-6.5.0-1008-starfive < 6.5.0-1008.9~22.04.1 jammy
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...