USN-6234-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-6234-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6234-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-6234-1
Related
Published
2023-07-18T12:22:18.839429Z
Modified
2023-07-18T12:22:18.839429Z
Summary
linux-xilinx-zynqmp vulnerability
Details

Hangyu Hua discovered that the Flower classifier implementation in the Linux kernel contained an out-of-bounds write vulnerability. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-35788, LP: #2023577)

It was discovered that for some Intel processors the INVLPG instruction implementation did not properly flush global TLB entries when PCIDs are enabled. An attacker could use this to expose sensitive information (kernel memory) or possibly cause undesired behaviors. (LP: #2023220)

References

Affected packages

Ubuntu:20.04:LTS / linux-xilinx-zynqmp

Package

Name
linux-xilinx-zynqmp
Purl
pkg:deb/ubuntu/linux-xilinx-zynqmp@5.4.0-1025.29?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1025.29

Affected versions

5.*

5.4.0-1020.24
5.4.0-1021.25
5.4.0-1022.26
5.4.0-1023.27
5.4.0-1024.28

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "linux-buildinfo-5.4.0-1025-xilinx-zynqmp": "5.4.0-1025.29",
            "linux-headers-5.4.0-1025-xilinx-zynqmp": "5.4.0-1025.29",
            "linux-modules-5.4.0-1025-xilinx-zynqmp": "5.4.0-1025.29",
            "linux-xilinx-zynqmp-tools-5.4.0-1025": "5.4.0-1025.29",
            "linux-tools-5.4.0-1025-xilinx-zynqmp": "5.4.0-1025.29",
            "linux-image-5.4.0-1025-xilinx-zynqmp-dbgsym": "5.4.0-1025.29",
            "linux-image-5.4.0-1025-xilinx-zynqmp": "5.4.0-1025.29",
            "linux-xilinx-zynqmp-headers-5.4.0-1025": "5.4.0-1025.29"
        }
    ]
}