USN-6534-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-6534-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6534-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-6534-1
Related
Published
2023-12-05T23:21:49.150122Z
Modified
2023-12-05T23:21:49.150122Z
Summary
linux, linux-aws, linux-aws-6.2, linux-azure, linux-azure-6.2, linux-azure-fde-6.2, linux-lowlatency, linux-oracle, linux-raspi, linux-starfive vulnerabilities
Details

It was discovered that the USB subsystem in the Linux kernel contained a race condition while handling device descriptors in certain situations, leading to a out-of-bounds read vulnerability. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2023-37453)

Lin Ma discovered that the Netlink Transformation (XFRM) subsystem in the Linux kernel did not properly initialize a policy data structure, leading to an out-of-bounds vulnerability. A local privileged attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information (kernel memory). (CVE-2023-3773)

Lucas Leong discovered that the netfilter subsystem in the Linux kernel did not properly validate some attributes passed from userspace. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information (kernel memory). (CVE-2023-39189)

Sunjoo Park discovered that the netfilter subsystem in the Linux kernel did not properly validate u32 packets content, leading to an out-of-bounds read vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information. (CVE-2023-39192)

Lucas Leong discovered that the netfilter subsystem in the Linux kernel did not properly validate SCTP data, leading to an out-of-bounds read vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information. (CVE-2023-39193)

Lucas Leong discovered that the Netlink Transformation (XFRM) subsystem in the Linux kernel did not properly handle state filters, leading to an out- of-bounds read vulnerability. A privileged local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information. (CVE-2023-39194)

It was discovered that a race condition existed in QXL virtual GPU driver in the Linux kernel, leading to a use after free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-39198)

Kyle Zeng discovered that the IPv4 implementation in the Linux kernel did not properly handle socket buffers (skb) when performing IP routing in certain circumstances, leading to a null pointer dereference vulnerability. A privileged attacker could use this to cause a denial of service (system crash). (CVE-2023-42754)

Jason Wang discovered that the virtio ring implementation in the Linux kernel did not properly handle iov buffers in some situations. A local attacker in a guest VM could use this to cause a denial of service (host system crash). (CVE-2023-5158)

Alon Zahavi discovered that the NVMe-oF/TCP subsystem in the Linux kernel did not properly handle queue initialization failures in certain situations, leading to a use-after-free vulnerability. A remote attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-5178)

Budimir Markovic discovered that the perf subsystem in the Linux kernel did not properly handle event groups, leading to an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-5717)

It was discovered that the Microchip USB Ethernet driver in the Linux kernel contained a race condition during device removal, leading to a use- after-free vulnerability. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2023-6039)

References

Affected packages

Ubuntu:22.04:LTS / linux-aws-6.2

Package

Name
linux-aws-6.2
Purl
pkg:deb/ubuntu/linux-aws-6.2@6.2.0-1017.17~22.04.1?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.2.0-1017.17~22.04.1

Affected versions

6.*

6.2.0-1005.5~22.04.1
6.2.0-1006.6~22.04.1
6.2.0-1007.7~22.04.1
6.2.0-1008.8~22.04.1
6.2.0-1009.9~22.04.3
6.2.0-1010.10~22.04.1
6.2.0-1011.11~22.04.1
6.2.0-1012.12~22.04.1
6.2.0-1013.13~22.04.1
6.2.0-1014.14~22.04.1
6.2.0-1015.15~22.04.1
6.2.0-1016.16~22.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "linux-headers-6.2.0-1017-aws": "6.2.0-1017.17~22.04.1",
            "linux-aws-6.2-tools-6.2.0-1017": "6.2.0-1017.17~22.04.1",
            "linux-tools-6.2.0-1017-aws": "6.2.0-1017.17~22.04.1",
            "linux-modules-6.2.0-1017-aws": "6.2.0-1017.17~22.04.1",
            "linux-cloud-tools-6.2.0-1017-aws": "6.2.0-1017.17~22.04.1",
            "linux-aws-6.2-cloud-tools-6.2.0-1017": "6.2.0-1017.17~22.04.1",
            "linux-image-unsigned-6.2.0-1017-aws-dbgsym": "6.2.0-1017.17~22.04.1",
            "linux-modules-extra-6.2.0-1017-aws": "6.2.0-1017.17~22.04.1",
            "linux-buildinfo-6.2.0-1017-aws": "6.2.0-1017.17~22.04.1",
            "linux-image-unsigned-6.2.0-1017-aws": "6.2.0-1017.17~22.04.1",
            "linux-aws-6.2-headers-6.2.0-1017": "6.2.0-1017.17~22.04.1"
        }
    ]
}

Ubuntu:22.04:LTS / linux-azure-6.2

Package

Name
linux-azure-6.2
Purl
pkg:deb/ubuntu/linux-azure-6.2@6.2.0-1018.18~22.04.1?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.2.0-1018.18~22.04.1

Affected versions

6.*

6.2.0-1005.5~22.04.1
6.2.0-1006.6~22.04.1
6.2.0-1007.7~22.04.1
6.2.0-1008.8~22.04.1
6.2.0-1009.9~22.04.3
6.2.0-1011.11~22.04.1
6.2.0-1012.12~22.04.1
6.2.0-1014.14~22.04.1
6.2.0-1015.15~22.04.1
6.2.0-1016.16~22.04.1
6.2.0-1017.17~22.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "linux-headers-6.2.0-1018-azure": "6.2.0-1018.18~22.04.1",
            "linux-modules-6.2.0-1018-azure": "6.2.0-1018.18~22.04.1",
            "linux-azure-6.2-tools-6.2.0-1018": "6.2.0-1018.18~22.04.1",
            "linux-buildinfo-6.2.0-1018-azure": "6.2.0-1018.18~22.04.1",
            "linux-tools-6.2.0-1018-azure": "6.2.0-1018.18~22.04.1",
            "linux-cloud-tools-6.2.0-1018-azure": "6.2.0-1018.18~22.04.1",
            "linux-image-unsigned-6.2.0-1018-azure": "6.2.0-1018.18~22.04.1",
            "linux-azure-6.2-cloud-tools-6.2.0-1018": "6.2.0-1018.18~22.04.1",
            "linux-image-unsigned-6.2.0-1018-azure-dbgsym": "6.2.0-1018.18~22.04.1",
            "linux-azure-6.2-headers-6.2.0-1018": "6.2.0-1018.18~22.04.1",
            "linux-modules-extra-6.2.0-1018-azure": "6.2.0-1018.18~22.04.1"
        }
    ]
}

Ubuntu:22.04:LTS / linux-azure-fde-6.2

Package

Name
linux-azure-fde-6.2
Purl
pkg:deb/ubuntu/linux-azure-fde-6.2@6.2.0-1018.18~22.04.1.1?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.2.0-1018.18~22.04.1.1

Affected versions

6.*

6.2.0-1008.8~22.04.1.1
6.2.0-1009.9~22.04.3.1
6.2.0-1011.11~22.04.1.1
6.2.0-1012.12~22.04.1.1
6.2.0-1014.14~22.04.1.1
6.2.0-1015.15~22.04.1.1
6.2.0-1016.16~22.04.1.1
6.2.0-1017.17~22.04.1.1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "linux-image-unsigned-6.2.0-1018-azure-fde": "6.2.0-1018.18~22.04.1.1",
            "linux-image-unsigned-6.2.0-1018-azure-fde-dbgsym": "6.2.0-1018.18~22.04.1.1"
        }
    ]
}