USN-6626-2

See a problem?
Source
https://ubuntu.com/security/notices/USN-6626-2
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6626-2.json
JSON Data
https://api.osv.dev/v1/vulns/USN-6626-2
Related
Published
2024-02-14T05:23:01.944259Z
Modified
2024-02-14T05:23:01.944259Z
Summary
linux-lowlatency, linux-raspi vulnerabilities
Details

Quentin Minster discovered that a race condition existed in the KSMBD implementation in the Linux kernel when handling sessions operations. A remote attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-32250, CVE-2023-32252, CVE-2023-32257)

Marek Marczykowski-Górecki discovered that the Xen event channel infrastructure implementation in the Linux kernel contained a race condition. An attacker in a guest VM could possibly use this to cause a denial of service (paravirtualized device unavailability). (CVE-2023-34324)

Zheng Wang discovered a use-after-free in the Renesas Ethernet AVB driver in the Linux kernel during device removal. A privileged attacker could use this to cause a denial of service (system crash). (CVE-2023-35827)

Tom Dohrmann discovered that the Secure Encrypted Virtualization (SEV) implementation for AMD processors in the Linux kernel contained a race condition when accessing MMIO registers. A local attacker in a SEV guest VM could possibly use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-46813)

It was discovered that the Microchip USB Ethernet driver in the Linux kernel contained a race condition during device removal, leading to a use- after-free vulnerability. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2023-6039)

It was discovered that the TLS subsystem in the Linux kernel did not properly perform cryptographic operations in some situations, leading to a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-6176)

Xingyuan Mo discovered that the netfilter subsystem in the Linux kernel did not properly handle dynset expressions passed from userspace, leading to a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service (system crash). (CVE-2023-6622)

It was discovered that the TIPC protocol implementation in the Linux kernel did not properly handle locking during tipccryptokey_revoke() operations. A local attacker could use this to cause a denial of service (kernel deadlock). (CVE-2024-0641)

References

Affected packages

Ubuntu:22.04:LTS / linux-lowlatency

Package

Name
linux-lowlatency
Purl
pkg:deb/ubuntu/linux-lowlatency@5.15.0-94.104?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-94.104

Affected versions

5.*

5.15.0-22.22
5.15.0-23.23
5.15.0-24.24
5.15.0-27.28
5.15.0-30.31
5.15.0-33.34
5.15.0-35.36
5.15.0-37.39
5.15.0-39.42
5.15.0-40.43
5.15.0-41.44
5.15.0-43.46
5.15.0-46.49
5.15.0-47.53
5.15.0-48.54
5.15.0-50.56
5.15.0-52.58
5.15.0-53.59
5.15.0-56.62
5.15.0-57.63
5.15.0-58.64
5.15.0-60.66
5.15.0-67.74
5.15.0-69.76
5.15.0-70.77
5.15.0-71.78
5.15.0-72.79
5.15.0-73.80
5.15.0-75.82
5.15.0-76.83
5.15.0-78.85
5.15.0-79.88
5.15.0-82.91
5.15.0-83.92
5.15.0-84.93
5.15.0-86.95
5.15.0-87.96
5.15.0-88.98
5.15.0-89.99
5.15.0-91.101
5.15.0-92.102

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "linux-image-unsigned-5.15.0-94-lowlatency-64k-dbgsym": "5.15.0-94.104",
            "linux-lowlatency-tools-common": "5.15.0-94.104",
            "linux-modules-5.15.0-94-lowlatency": "5.15.0-94.104",
            "linux-lowlatency-tools-host": "5.15.0-94.104",
            "linux-lowlatency-cloud-tools-common": "5.15.0-94.104",
            "linux-cloud-tools-5.15.0-94-lowlatency": "5.15.0-94.104",
            "linux-buildinfo-5.15.0-94-lowlatency-64k": "5.15.0-94.104",
            "linux-lowlatency-tools-5.15.0-94": "5.15.0-94.104",
            "linux-modules-5.15.0-94-lowlatency-64k": "5.15.0-94.104",
            "linux-headers-5.15.0-94-lowlatency": "5.15.0-94.104",
            "linux-image-unsigned-5.15.0-94-lowlatency": "5.15.0-94.104",
            "linux-tools-5.15.0-94-lowlatency": "5.15.0-94.104",
            "linux-lowlatency-headers-5.15.0-94": "5.15.0-94.104",
            "linux-image-unsigned-5.15.0-94-lowlatency-dbgsym": "5.15.0-94.104",
            "linux-image-unsigned-5.15.0-94-lowlatency-64k": "5.15.0-94.104",
            "linux-buildinfo-5.15.0-94-lowlatency": "5.15.0-94.104",
            "linux-tools-5.15.0-94-lowlatency-64k": "5.15.0-94.104",
            "linux-headers-5.15.0-94-lowlatency-64k": "5.15.0-94.104",
            "linux-lowlatency-cloud-tools-5.15.0-94": "5.15.0-94.104",
            "linux-modules-iwlwifi-5.15.0-94-lowlatency": "5.15.0-94.104"
        }
    ]
}

Ubuntu:22.04:LTS / linux-raspi

Package

Name
linux-raspi
Purl
pkg:deb/ubuntu/linux-raspi@5.15.0-1046.49?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1046.49

Affected versions

5.*

5.13.0-1008.9
5.15.0-1002.2
5.15.0-1003.3
5.15.0-1004.4
5.15.0-1005.5
5.15.0-1006.6
5.15.0-1008.8
5.15.0-1011.13
5.15.0-1012.14
5.15.0-1013.15
5.15.0-1014.16
5.15.0-1015.17
5.15.0-1016.18
5.15.0-1017.19
5.15.0-1018.20
5.15.0-1021.23
5.15.0-1022.24
5.15.0-1023.25
5.15.0-1024.26
5.15.0-1025.27
5.15.0-1026.28
5.15.0-1027.29
5.15.0-1028.30
5.15.0-1029.31
5.15.0-1030.32
5.15.0-1032.35
5.15.0-1033.36
5.15.0-1034.37
5.15.0-1035.38
5.15.0-1036.39
5.15.0-1037.40
5.15.0-1038.41
5.15.0-1040.43
5.15.0-1041.44
5.15.0-1042.45
5.15.0-1043.46
5.15.0-1044.47
5.15.0-1045.48

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "linux-buildinfo-5.15.0-1046-raspi": "5.15.0-1046.49",
            "linux-raspi-tools-5.15.0-1046": "5.15.0-1046.49",
            "linux-modules-5.15.0-1046-raspi": "5.15.0-1046.49",
            "linux-modules-extra-5.15.0-1046-raspi": "5.15.0-1046.49",
            "linux-raspi-headers-5.15.0-1046": "5.15.0-1046.49",
            "linux-tools-5.15.0-1046-raspi": "5.15.0-1046.49",
            "linux-headers-5.15.0-1046-raspi": "5.15.0-1046.49",
            "linux-image-5.15.0-1046-raspi": "5.15.0-1046.49",
            "linux-image-5.15.0-1046-raspi-dbgsym": "5.15.0-1046.49"
        }
    ]
}