It was discovered that the NTFS file system implementation in the Linux kernel did not properly check buffer indexes in certain situations, leading to an out-of-bounds read vulnerability. A local attacker could possibly use this to expose sensitive information (kernel memory). (CVE-2022-48502)
Stonejiajia, Shir Tamari and Sagi Tzadik discovered that the OverlayFS implementation in the Ubuntu Linux kernel did not properly perform permission checks in certain situations. A local attacker could possibly use this to gain elevated privileges. (CVE-2023-2640)
It was discovered that the IP-VLAN network driver for the Linux kernel did not properly initialize memory in some situations, leading to an out-of- bounds write vulnerability. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-3090)
Mingi Cho discovered that the netfilter subsystem in the Linux kernel did not properly validate the status of a nft chain while performing a lookup by id, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-31248)
It was discovered that the Ricoh R5C592 MemoryStick card reader driver in the Linux kernel contained a race condition during module unload, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-3141)
Shir Tamari and Sagi Tzadik discovered that the OverlayFS implementation in the Ubuntu Linux kernel did not properly perform permission checks in certain situations. A local attacker could possibly use this to gain elevated privileges. (CVE-2023-32629)
Querijn Voet discovered that a race condition existed in the io_uring subsystem in the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-3389)
It was discovered that the netfilter subsystem in the Linux kernel did not properly handle some error conditions, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-3390)
Tanguy Dubroca discovered that the netfilter subsystem in the Linux kernel did not properly handle certain pointer data type, leading to an out-of- bounds write vulnerability. A privileged attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-35001)
{ "availability": "No subscription required", "binaries": [ { "binary_version": "5.19.0-1029.30~22.04.1", "binary_name": "linux-aws-5.19-cloud-tools-5.19.0-1029" }, { "binary_version": "5.19.0-1029.30~22.04.1", "binary_name": "linux-aws-5.19-headers-5.19.0-1029" }, { "binary_version": "5.19.0-1029.30~22.04.1", "binary_name": "linux-aws-5.19-tools-5.19.0-1029" }, { "binary_version": "5.19.0-1029.30~22.04.1", "binary_name": "linux-buildinfo-5.19.0-1029-aws" }, { "binary_version": "5.19.0-1029.30~22.04.1", "binary_name": "linux-cloud-tools-5.19.0-1029-aws" }, { "binary_version": "5.19.0-1029.30~22.04.1", "binary_name": "linux-headers-5.19.0-1029-aws" }, { "binary_version": "5.19.0-1029.30~22.04.1", "binary_name": "linux-image-unsigned-5.19.0-1029-aws" }, { "binary_version": "5.19.0-1029.30~22.04.1", "binary_name": "linux-image-unsigned-5.19.0-1029-aws-dbgsym" }, { "binary_version": "5.19.0-1029.30~22.04.1", "binary_name": "linux-modules-5.19.0-1029-aws" }, { "binary_version": "5.19.0-1029.30~22.04.1", "binary_name": "linux-modules-extra-5.19.0-1029-aws" }, { "binary_version": "5.19.0-1029.30~22.04.1", "binary_name": "linux-tools-5.19.0-1029-aws" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "5.19.0-1030.32~22.04.1", "binary_name": "linux-buildinfo-5.19.0-1030-gcp" }, { "binary_version": "5.19.0-1030.32~22.04.1", "binary_name": "linux-gcp-5.19-headers-5.19.0-1030" }, { "binary_version": "5.19.0-1030.32~22.04.1", "binary_name": "linux-gcp-5.19-tools-5.19.0-1030" }, { "binary_version": "5.19.0-1030.32~22.04.1", "binary_name": "linux-headers-5.19.0-1030-gcp" }, { "binary_version": "5.19.0-1030.32~22.04.1", "binary_name": "linux-image-unsigned-5.19.0-1030-gcp" }, { "binary_version": "5.19.0-1030.32~22.04.1", "binary_name": "linux-image-unsigned-5.19.0-1030-gcp-dbgsym" }, { "binary_version": "5.19.0-1030.32~22.04.1", "binary_name": "linux-modules-5.19.0-1030-gcp" }, { "binary_version": "5.19.0-1030.32~22.04.1", "binary_name": "linux-modules-extra-5.19.0-1030-gcp" }, { "binary_version": "5.19.0-1030.32~22.04.1", "binary_name": "linux-tools-5.19.0-1030-gcp" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "5.19.0-50.50", "binary_name": "linux-buildinfo-5.19.0-50-generic" }, { "binary_version": "5.19.0-50.50", "binary_name": "linux-buildinfo-5.19.0-50-generic-64k" }, { "binary_version": "5.19.0-50.50", "binary_name": "linux-buildinfo-5.19.0-50-generic-lpae" }, { "binary_version": "5.19.0-50.50", "binary_name": "linux-cloud-tools-5.19.0-50-generic" }, { "binary_version": "5.19.0-50.50", "binary_name": "linux-headers-5.19.0-50-generic" }, { "binary_version": "5.19.0-50.50", "binary_name": "linux-headers-5.19.0-50-generic-64k" }, { "binary_version": "5.19.0-50.50", "binary_name": "linux-headers-5.19.0-50-generic-lpae" }, { "binary_version": "5.19.0-50.50", "binary_name": "linux-hwe-5.19-cloud-tools-5.19.0-50" }, { "binary_version": "5.19.0-50.50", "binary_name": "linux-hwe-5.19-cloud-tools-common" }, { "binary_version": "5.19.0-50.50", "binary_name": "linux-hwe-5.19-headers-5.19.0-50" }, { "binary_version": "5.19.0-50.50", "binary_name": "linux-hwe-5.19-tools-5.19.0-50" }, { "binary_version": "5.19.0-50.50", "binary_name": "linux-hwe-5.19-tools-common" }, { "binary_version": "5.19.0-50.50", "binary_name": "linux-hwe-5.19-tools-host" }, { "binary_version": "5.19.0-50.50", "binary_name": "linux-image-5.19.0-50-generic" }, { "binary_version": "5.19.0-50.50", "binary_name": "linux-image-5.19.0-50-generic-dbgsym" }, { "binary_version": "5.19.0-50.50", "binary_name": "linux-image-5.19.0-50-generic-lpae" }, { "binary_version": "5.19.0-50.50", "binary_name": "linux-image-5.19.0-50-generic-lpae-dbgsym" }, { "binary_version": "5.19.0-50.50", "binary_name": "linux-image-unsigned-5.19.0-50-generic" }, { "binary_version": "5.19.0-50.50", "binary_name": "linux-image-unsigned-5.19.0-50-generic-64k" }, { "binary_version": "5.19.0-50.50", "binary_name": "linux-image-unsigned-5.19.0-50-generic-64k-dbgsym" }, { "binary_version": "5.19.0-50.50", "binary_name": "linux-image-unsigned-5.19.0-50-generic-dbgsym" }, { "binary_version": "5.19.0-50.50", "binary_name": "linux-modules-5.19.0-50-generic" }, { "binary_version": "5.19.0-50.50", "binary_name": "linux-modules-5.19.0-50-generic-64k" }, { "binary_version": "5.19.0-50.50", "binary_name": "linux-modules-5.19.0-50-generic-lpae" }, { "binary_version": "5.19.0-50.50", "binary_name": "linux-modules-extra-5.19.0-50-generic" }, { "binary_version": "5.19.0-50.50", "binary_name": "linux-modules-ipu6-5.19.0-50-generic" }, { "binary_version": "5.19.0-50.50", "binary_name": "linux-modules-ivsc-5.19.0-50-generic" }, { "binary_version": "5.19.0-50.50", "binary_name": "linux-modules-iwlwifi-5.19.0-50-generic" }, { "binary_version": "5.19.0-50.50", "binary_name": "linux-source-5.19.0" }, { "binary_version": "5.19.0-50.50", "binary_name": "linux-tools-5.19.0-50-generic" }, { "binary_version": "5.19.0-50.50", "binary_name": "linux-tools-5.19.0-50-generic-64k" }, { "binary_version": "5.19.0-50.50", "binary_name": "linux-tools-5.19.0-50-generic-lpae" } ] }