It was discovered that the KVM VMX implementation in the Linux kernel did not properly handle indirect branch prediction isolation between L1 and L2 VMs. An attacker in a guest VM could use this to expose sensitive information from the host OS or other guest VMs. (CVE-2022-2196)
It was discovered that a use-after-free vulnerability existed in the SGI GRU driver in the Linux kernel. A local attacker could possibly use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-3424)
Ziming Zhang discovered that the VMware Virtual GPU DRM driver in the Linux kernel contained an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service (system crash). (CVE-2022-36280)
Hyunwoo Kim discovered that the DVB Core driver in the Linux kernel did not properly perform reference counting in some situations, leading to a use- after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-41218)
Gerald Lee discovered that the USB Gadget file system implementation in the Linux kernel contained a race condition, leading to a use-after-free vulnerability in some situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-4382)
It was discovered that the NTFS file system implementation in the Linux kernel did not properly validate attributes in certain situations, leading to an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service (system crash). (CVE-2022-48423)
It was discovered that the NTFS file system implementation in the Linux kernel did not properly validate attributes in certain situations, leading to an out-of-bounds read vulnerability. A local attacker could possibly use this to expose sensitive information (kernel memory). (CVE-2022-48424)
José Oliveira and Rodrigo Branco discovered that the prctl syscall implementation in the Linux kernel did not properly protect against indirect branch prediction attacks in some situations. A local attacker could possibly use this to expose sensitive information. (CVE-2023-0045)
It was discovered that the KSMBD implementation in the Linux kernel did not properly validate buffer lengths, leading to a heap-based buffer overflow. A remote attacker could possibly use this to cause a denial of service (system crash). (CVE-2023-0210)
It was discovered that a use-after-free vulnerability existed in the Advanced Linux Sound Architecture (ALSA) subsystem. A local attacker could use this to cause a denial of service (system crash). (CVE-2023-0266)
Kyle Zeng discovered that the class-based queuing discipline implementation in the Linux kernel contained a type confusion vulnerability in some situations. An attacker could use this to cause a denial of service (system crash). (CVE-2023-23454)
Kyle Zeng discovered that the ATM VC queuing discipline implementation in the Linux kernel contained a type confusion vulnerability in some situations. An attacker could use this to cause a denial of service (system crash). (CVE-2023-23455)
It was discovered that the RNDIS USB driver in the Linux kernel contained an integer overflow vulnerability. A local attacker with physical access could plug in a malicious USB device to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-23559)
It was discovered that the NTFS file system implementation in the Linux kernel did not properly handle a loop termination condition, leading to an out-of-bounds read vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information. (CVE-2023-26606)
Wei Chen discovered that the DVB USB AZ6027 driver in the Linux kernel contained a null pointer dereference when handling certain messages from user space. A local attacker could use this to cause a denial of service (system crash). (CVE-2023-28328)
{ "availability": "No subscription required", "binaries": [ { "binary_version": "5.15.0-1027.32", "binary_name": "linux-buildinfo-5.15.0-1027-intel-iotg" }, { "binary_version": "5.15.0-1027.32", "binary_name": "linux-cloud-tools-5.15.0-1027-intel-iotg" }, { "binary_version": "5.15.0-1027.32", "binary_name": "linux-headers-5.15.0-1027-intel-iotg" }, { "binary_version": "5.15.0-1027.32", "binary_name": "linux-image-unsigned-5.15.0-1027-intel-iotg" }, { "binary_version": "5.15.0-1027.32", "binary_name": "linux-image-unsigned-5.15.0-1027-intel-iotg-dbgsym" }, { "binary_version": "5.15.0-1027.32", "binary_name": "linux-intel-iotg-cloud-tools-5.15.0-1027" }, { "binary_version": "5.15.0-1027.32", "binary_name": "linux-intel-iotg-cloud-tools-common" }, { "binary_version": "5.15.0-1027.32", "binary_name": "linux-intel-iotg-headers-5.15.0-1027" }, { "binary_version": "5.15.0-1027.32", "binary_name": "linux-intel-iotg-tools-5.15.0-1027" }, { "binary_version": "5.15.0-1027.32", "binary_name": "linux-intel-iotg-tools-common" }, { "binary_version": "5.15.0-1027.32", "binary_name": "linux-intel-iotg-tools-host" }, { "binary_version": "5.15.0-1027.32", "binary_name": "linux-modules-5.15.0-1027-intel-iotg" }, { "binary_version": "5.15.0-1027.32", "binary_name": "linux-modules-extra-5.15.0-1027-intel-iotg" }, { "binary_version": "5.15.0-1027.32", "binary_name": "linux-modules-iwlwifi-5.15.0-1027-intel-iotg" }, { "binary_version": "5.15.0-1027.32", "binary_name": "linux-tools-5.15.0-1027-intel-iotg" } ] }