USN-6194-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-6194-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6194-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-6194-1
Related
Published
2023-06-29T19:13:02.337166Z
Modified
2023-06-29T19:13:02.337166Z
Summary
linux-oem-6.1 vulnerabilities
Details

Hangyu Hua discovered that the Flower classifier implementation in the Linux kernel contained an out-of-bounds write vulnerability. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-35788, LP: #2023577)

Xingyuan Mo and Gengjia Chen discovered that the io_uring subsystem in the Linux kernel did not properly handle locking when IOPOLL mode is being used. A local attacker could use this to cause a denial of service (system crash). (CVE-2023-2430)

Wei Chen discovered that the InfiniBand RDMA communication manager implementation in the Linux kernel contained an out-of-bounds read vulnerability. A local attacker could use this to cause a denial of service (system crash). (CVE-2023-2176)

It was discovered that for some Intel processors the INVLPG instruction implementation did not properly flush global TLB entries when PCIDs are enabled. An attacker could use this to expose sensitive information (kernel memory) or possibly cause undesired behaviors. (LP: #2023220)

References

Affected packages

Ubuntu:22.04:LTS / linux-oem-6.1

Package

Name
linux-oem-6.1
Purl
pkg:deb/ubuntu/linux-oem-6.1?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.0-1015.15

Affected versions

6.*

6.1.0-1004.4
6.1.0-1006.6
6.1.0-1007.7
6.1.0-1008.8
6.1.0-1009.9
6.1.0-1010.10
6.1.0-1012.12
6.1.0-1013.13
6.1.0-1014.14

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "6.1.0-1015.15",
            "binary_name": "linux-buildinfo-6.1.0-1015-oem"
        },
        {
            "binary_version": "6.1.0-1015.15",
            "binary_name": "linux-headers-6.1.0-1015-oem"
        },
        {
            "binary_version": "6.1.0-1015.15",
            "binary_name": "linux-image-unsigned-6.1.0-1015-oem"
        },
        {
            "binary_version": "6.1.0-1015.15",
            "binary_name": "linux-image-unsigned-6.1.0-1015-oem-dbgsym"
        },
        {
            "binary_version": "6.1.0-1015.15",
            "binary_name": "linux-modules-6.1.0-1015-oem"
        },
        {
            "binary_version": "6.1.0-1015.15",
            "binary_name": "linux-modules-ipu6-6.1.0-1015-oem"
        },
        {
            "binary_version": "6.1.0-1015.15",
            "binary_name": "linux-modules-ivsc-6.1.0-1015-oem"
        },
        {
            "binary_version": "6.1.0-1015.15",
            "binary_name": "linux-modules-iwlwifi-6.1.0-1015-oem"
        },
        {
            "binary_version": "6.1.0-1015.15",
            "binary_name": "linux-oem-6.1-headers-6.1.0-1015"
        },
        {
            "binary_version": "6.1.0-1015.15",
            "binary_name": "linux-oem-6.1-tools-6.1.0-1015"
        },
        {
            "binary_version": "6.1.0-1015.15",
            "binary_name": "linux-oem-6.1-tools-host"
        },
        {
            "binary_version": "6.1.0-1015.15",
            "binary_name": "linux-tools-6.1.0-1015-oem"
        }
    ]
}