USN-6331-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-6331-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6331-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-6331-1
Related
Published
2023-08-31T22:31:05.122529Z
Modified
2023-08-31T22:31:05.122529Z
Summary
linux-azure vulnerabilities
Details

It was discovered that the netlink implementation in the Linux kernel did not properly validate policies when parsing attributes in some situations. An attacker could use this to cause a denial of service (infinite recursion). (CVE-2020-36691)

Billy Jheng Bing Jhong discovered that the CIFS network file system implementation in the Linux kernel did not properly validate arguments to ioctl() in some situations. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-0168)

It was discovered that the ext4 file system implementation in the Linux kernel contained a use-after-free vulnerability. An attacker could use this to construct a malicious ext4 file system image that, when mounted, could cause a denial of service (system crash). (CVE-2022-1184)

It was discovered that some AMD x86-64 processors with SMT enabled could speculatively execute instructions using a return address from a sibling thread. A local attacker could possibly use this to expose sensitive information. (CVE-2022-27672)

Daniel Moghimi discovered that some Intel(R) Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. (CVE-2022-40982)

William Zhao discovered that the Traffic Control (TC) subsystem in the Linux kernel did not properly handle network packet retransmission in certain situations. A local attacker could use this to cause a denial of service (kernel deadlock). (CVE-2022-4269)

It was discovered that a race condition existed in the qdisc implementation in the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-0590)

It was discovered that a race condition existed in the btrfs file system implementation in the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information. (CVE-2023-1611)

It was discovered that the APM X-Gene SoC hardware monitoring driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or expose sensitive information (kernel memory). (CVE-2023-1855)

It was discovered that the ST NCI NFC driver did not properly handle device removal events. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2023-1990)

Tavis Ormandy discovered that some AMD processors did not properly handle speculative execution of certain vector register instructions. A local attacker could use this to expose sensitive information. (CVE-2023-20593)

It was discovered that the XFS file system implementation in the Linux kernel did not properly perform metadata validation when mounting certain images. An attacker could use this to specially craft a file system image that, when mounted, could cause a denial of service (system crash). (CVE-2023-2124)

It was discovered that the SLIMpro I2C device driver in the Linux kernel did not properly validate user-supplied data in some situations, leading to an out-of-bounds write vulnerability. A privileged attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-2194)

It was discovered that a race condition existed in the TLS subsystem in the Linux kernel, leading to a use-after-free or a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-28466)

It was discovered that the DA9150 charger driver in the Linux kernel did not properly handle device removal, leading to a user-after free vulnerability. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-30772)

It was discovered that the btrfs file system implementation in the Linux kernel did not properly handle error conditions in some situations, leading to a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2023-3111)

It was discovered that the Ricoh R5C592 MemoryStick card reader driver in the Linux kernel contained a race condition during module unload, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-3141)

It was discovered that the Qualcomm EMAC ethernet driver in the Linux kernel did not properly handle device removal, leading to a user-after free vulnerability. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-33203)

It was discovered that the universal 32bit network packet classifier implementation in the Linux kernel did not properly perform reference counting in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-3609)

It was discovered that the Quick Fair Queueing network scheduler implementation in the Linux kernel contained an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-3611)

It was discovered that the network packet classifier with netfilter/firewall marks implementation in the Linux kernel did not properly handle reference counting, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-3776)

References

Affected packages

Ubuntu:20.04:LTS / linux-azure

Package

Name
linux-azure
Purl
pkg:deb/ubuntu/linux-azure@5.4.0-1114.120?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1114.120

Affected versions

5.*

5.3.0-1003.3
5.3.0-1008.9
5.3.0-1009.10
5.4.0-1006.6
5.4.0-1008.8
5.4.0-1009.9
5.4.0-1010.10
5.4.0-1012.12
5.4.0-1016.16
5.4.0-1019.19
5.4.0-1020.20
5.4.0-1022.22
5.4.0-1023.23
5.4.0-1025.25
5.4.0-1026.26
5.4.0-1031.32
5.4.0-1032.33
5.4.0-1034.35
5.4.0-1035.36
5.4.0-1036.38
5.4.0-1039.41
5.4.0-1040.42
5.4.0-1041.43
5.4.0-1043.45
5.4.0-1044.46
5.4.0-1046.48
5.4.0-1047.49
5.4.0-1048.50
5.4.0-1049.51
5.4.0-1051.53
5.4.0-1055.57
5.4.0-1056.58
5.4.0-1058.60
5.4.0-1059.62
5.4.0-1061.64
5.4.0-1062.65
5.4.0-1063.66
5.4.0-1064.67
5.4.0-1065.68
5.4.0-1067.70
5.4.0-1068.71
5.4.0-1069.72
5.4.0-1070.73
5.4.0-1072.75
5.4.0-1073.76
5.4.0-1074.77
5.4.0-1077.80
5.4.0-1078.81
5.4.0-1080.83
5.4.0-1083.87
5.4.0-1085.90
5.4.0-1086.91
5.4.0-1089.94
5.4.0-1090.95
5.4.0-1091.96
5.4.0-1094.100
5.4.0-1095.101
5.4.0-1098.104
5.4.0-1100.106
5.4.0-1101.107
5.4.0-1103.109
5.4.0-1104.110
5.4.0-1105.111
5.4.0-1106.112
5.4.0-1107.113
5.4.0-1108.114
5.4.0-1109.115
5.4.0-1110.116
5.4.0-1111.117
5.4.0-1112.118
5.4.0-1113.119

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "linux-azure-tools-5.4.0-1114": "5.4.0-1114.120",
            "linux-headers-5.4.0-1114-azure": "5.4.0-1114.120",
            "linux-azure-cloud-tools-5.4.0-1114": "5.4.0-1114.120",
            "linux-azure-headers-5.4.0-1114": "5.4.0-1114.120",
            "linux-image-unsigned-5.4.0-1114-azure-dbgsym": "5.4.0-1114.120",
            "linux-buildinfo-5.4.0-1114-azure": "5.4.0-1114.120",
            "linux-modules-extra-5.4.0-1114-azure": "5.4.0-1114.120",
            "linux-tools-5.4.0-1114-azure": "5.4.0-1114.120",
            "linux-image-unsigned-5.4.0-1114-azure": "5.4.0-1114.120",
            "linux-cloud-tools-5.4.0-1114-azure": "5.4.0-1114.120",
            "linux-modules-5.4.0-1114-azure": "5.4.0-1114.120"
        }
    ]
}