Patryk Sondej and Piotr Krysiuk discovered that a race condition existed in the netfilter subsystem of the Linux kernel when processing batch requests, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-32233)
Gwangun Jung discovered that the Quick Fair Queueing scheduler implementation in the Linux kernel contained an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-31436)
Reima Ishii discovered that the nested KVM implementation for Intel x86 processors in the Linux kernel did not properly validate control registers in certain situations. An attacker in a guest VM could use this to cause a denial of service (guest crash). (CVE-2023-30456)
It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux kernel did not properly perform data buffer size validation in some situations. A physically proximate attacker could use this to craft a malicious USB device that when inserted, could cause a denial of service (system crash) or possibly expose sensitive information. (CVE-2023-1380)
Jean-Baptiste Cayrou discovered that the shiftfs file system in the Ubuntu Linux kernel contained a race condition when handling inode locking in some situations. A local attacker could use this to cause a denial of service (kernel deadlock). (CVE-2023-2612)
{ "availability": "No subscription required", "binaries": [ { "binary_version": "5.4.0-1086.97", "binary_name": "linux-buildinfo-5.4.0-1086-raspi" }, { "binary_version": "5.4.0-1086.97", "binary_name": "linux-headers-5.4.0-1086-raspi" }, { "binary_version": "5.4.0-1086.97", "binary_name": "linux-image-5.4.0-1086-raspi" }, { "binary_version": "5.4.0-1086.97", "binary_name": "linux-modules-5.4.0-1086-raspi" }, { "binary_version": "5.4.0-1086.97", "binary_name": "linux-raspi-headers-5.4.0-1086" }, { "binary_version": "5.4.0-1086.97", "binary_name": "linux-raspi-tools-5.4.0-1086" }, { "binary_version": "5.4.0-1086.97", "binary_name": "linux-tools-5.4.0-1086-raspi" } ] }
{ "cves_map": { "ecosystem": "Ubuntu:20.04:LTS", "cves": [ { "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" }, { "type": "Ubuntu", "score": "high" } ], "id": "CVE-2023-1380" }, { "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "type": "Ubuntu", "score": "medium" } ], "id": "CVE-2023-2612" }, { "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "type": "Ubuntu", "score": "high" } ], "id": "CVE-2023-30456" }, { "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "type": "Ubuntu", "score": "high" } ], "id": "CVE-2023-31436" }, { "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "type": "Ubuntu", "score": "high" } ], "id": "CVE-2023-32233" } ] } }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "5.15.0-1031.36", "binary_name": "linux-buildinfo-5.15.0-1031-intel-iotg" }, { "binary_version": "5.15.0-1031.36", "binary_name": "linux-cloud-tools-5.15.0-1031-intel-iotg" }, { "binary_version": "5.15.0-1031.36", "binary_name": "linux-headers-5.15.0-1031-intel-iotg" }, { "binary_version": "5.15.0-1031.36", "binary_name": "linux-image-unsigned-5.15.0-1031-intel-iotg" }, { "binary_version": "5.15.0-1031.36", "binary_name": "linux-intel-iotg-cloud-tools-5.15.0-1031" }, { "binary_version": "5.15.0-1031.36", "binary_name": "linux-intel-iotg-cloud-tools-common" }, { "binary_version": "5.15.0-1031.36", "binary_name": "linux-intel-iotg-headers-5.15.0-1031" }, { "binary_version": "5.15.0-1031.36", "binary_name": "linux-intel-iotg-tools-5.15.0-1031" }, { "binary_version": "5.15.0-1031.36", "binary_name": "linux-intel-iotg-tools-common" }, { "binary_version": "5.15.0-1031.36", "binary_name": "linux-intel-iotg-tools-host" }, { "binary_version": "5.15.0-1031.36", "binary_name": "linux-modules-5.15.0-1031-intel-iotg" }, { "binary_version": "5.15.0-1031.36", "binary_name": "linux-modules-extra-5.15.0-1031-intel-iotg" }, { "binary_version": "5.15.0-1031.36", "binary_name": "linux-modules-iwlwifi-5.15.0-1031-intel-iotg" }, { "binary_version": "5.15.0-1031.36", "binary_name": "linux-tools-5.15.0-1031-intel-iotg" } ] }
{ "cves_map": { "ecosystem": "Ubuntu:22.04:LTS", "cves": [ { "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" }, { "type": "Ubuntu", "score": "high" } ], "id": "CVE-2023-1380" }, { "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "type": "Ubuntu", "score": "medium" } ], "id": "CVE-2023-2612" }, { "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "type": "Ubuntu", "score": "high" } ], "id": "CVE-2023-30456" }, { "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "type": "Ubuntu", "score": "high" } ], "id": "CVE-2023-31436" }, { "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "type": "Ubuntu", "score": "high" } ], "id": "CVE-2023-32233" } ] } }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "5.15.0-1030.32", "binary_name": "linux-buildinfo-5.15.0-1030-raspi" }, { "binary_version": "5.15.0-1030.32", "binary_name": "linux-buildinfo-5.15.0-1030-raspi-nolpae" }, { "binary_version": "5.15.0-1030.32", "binary_name": "linux-headers-5.15.0-1030-raspi" }, { "binary_version": "5.15.0-1030.32", "binary_name": "linux-headers-5.15.0-1030-raspi-nolpae" }, { "binary_version": "5.15.0-1030.32", "binary_name": "linux-image-5.15.0-1030-raspi" }, { "binary_version": "5.15.0-1030.32", "binary_name": "linux-image-5.15.0-1030-raspi-nolpae" }, { "binary_version": "5.15.0-1030.32", "binary_name": "linux-modules-5.15.0-1030-raspi" }, { "binary_version": "5.15.0-1030.32", "binary_name": "linux-modules-5.15.0-1030-raspi-nolpae" }, { "binary_version": "5.15.0-1030.32", "binary_name": "linux-modules-extra-5.15.0-1030-raspi" }, { "binary_version": "5.15.0-1030.32", "binary_name": "linux-modules-extra-5.15.0-1030-raspi-nolpae" }, { "binary_version": "5.15.0-1030.32", "binary_name": "linux-raspi-headers-5.15.0-1030" }, { "binary_version": "5.15.0-1030.32", "binary_name": "linux-raspi-tools-5.15.0-1030" }, { "binary_version": "5.15.0-1030.32", "binary_name": "linux-tools-5.15.0-1030-raspi" }, { "binary_version": "5.15.0-1030.32", "binary_name": "linux-tools-5.15.0-1030-raspi-nolpae" } ] }
{ "cves_map": { "ecosystem": "Ubuntu:22.04:LTS", "cves": [ { "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" }, { "type": "Ubuntu", "score": "high" } ], "id": "CVE-2023-1380" }, { "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "type": "Ubuntu", "score": "medium" } ], "id": "CVE-2023-2612" }, { "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "type": "Ubuntu", "score": "high" } ], "id": "CVE-2023-30456" }, { "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "type": "Ubuntu", "score": "high" } ], "id": "CVE-2023-31436" }, { "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "type": "Ubuntu", "score": "high" } ], "id": "CVE-2023-32233" } ] } }