USN-6681-2

Source
https://ubuntu.com/security/notices/USN-6681-2
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6681-2.json
JSON Data
https://api.osv.dev/v1/vulns/USN-6681-2
Related
Published
2024-03-11T20:25:12.657001Z
Modified
2024-03-11T20:25:12.657001Z
Summary
linux-bluefield, linux-raspi-5.4, linux-xilinx-zynqmp vulnerabilities
Details

Wenqing Liu discovered that the f2fs file system implementation in the Linux kernel did not properly validate inode types while performing garbage collection. An attacker could use this to construct a malicious f2fs image that, when mounted and operated on, could cause a denial of service (system crash). (CVE-2021-44879)

It was discovered that the DesignWare USB3 for Qualcomm SoCs driver in the Linux kernel did not properly handle certain error conditions during device registration. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2023-22995)

Bien Pham discovered that the netfiler subsystem in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. A local user could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-4244)

It was discovered that a race condition existed in the Bluetooth subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-51779)

It was discovered that a race condition existed in the ATM (Asynchronous Transfer Mode) subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-51780)

It was discovered that a race condition existed in the Rose X.25 protocol implementation in the Linux kernel, leading to a use-after- free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-51782)

Alon Zahavi discovered that the NVMe-oF/TCP subsystem of the Linux kernel did not properly handle connect command payloads in certain situations, leading to an out-of-bounds read vulnerability. A remote attacker could use this to expose sensitive information (kernel memory). (CVE-2023-6121)

It was discovered that the VirtIO subsystem in the Linux kernel did not properly initialize memory in some situations. A local attacker could use this to possibly expose sensitive information (kernel memory). (CVE-2024-0340)

References

Affected packages

Ubuntu:Pro:18.04:LTS / linux-raspi-5.4

Package

Name
linux-raspi-5.4
Purl
pkg:deb/ubuntu/linux-raspi-5.4?arch=src?distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1104.116~18.04.1

Affected versions

5.*

5.4.0-1013.13~18.04.1
5.4.0-1015.15~18.04.1
5.4.0-1016.17~18.04.1
5.4.0-1018.20~18.04.1
5.4.0-1019.21~18.04.1
5.4.0-1021.24~18.04.1
5.4.0-1022.25~18.04.1
5.4.0-1023.26~18.04.1
5.4.0-1025.28~18.04.1
5.4.0-1026.29~18.04.1
5.4.0-1028.31~18.04.1
5.4.0-1029.32~18.04.1
5.4.0-1030.33~18.04.1
5.4.0-1032.35~18.04.1
5.4.0-1033.36~18.04.1
5.4.0-1034.37~18.04.1
5.4.0-1035.38~18.04.1
5.4.0-1036.39~18.04.1
5.4.0-1038.41~18.04.1
5.4.0-1041.45~18.04.1
5.4.0-1042.46~18.04.3
5.4.0-1043.47~18.04.1
5.4.0-1044.48~18.04.1
5.4.0-1045.49~18.04.1
5.4.0-1046.50~18.04.1
5.4.0-1047.52~18.04.1
5.4.0-1048.53~18.04.1
5.4.0-1050.56~18.04.1
5.4.0-1052.58~18.04.1
5.4.0-1053.60~18.04.1
5.4.0-1055.62~18.04.1
5.4.0-1056.63~18.04.1
5.4.0-1058.65~18.04.1
5.4.0-1059.66~18.04.1
5.4.0-1060.68~18.04.1
5.4.0-1062.70~18.04.1
5.4.0-1065.75~18.04.1
5.4.0-1066.76~18.04.1
5.4.0-1068.78~18.04.1
5.4.0-1069.79~18.04.1
5.4.0-1070.80~18.04.1
5.4.0-1071.81~18.04.1
5.4.0-1073.84~18.04.1
5.4.0-1074.85~18.04.1
5.4.0-1077.88~18.04.2
5.4.0-1078.89~18.04.1
5.4.0-1079.90~18.04.1
5.4.0-1080.91~18.04.1
5.4.0-1081.92~18.04.1
5.4.0-1082.93~18.04.1
5.4.0-1083.94~18.04.1
5.4.0-1084.95~18.04.1
5.4.0-1085.96~18.04.1
5.4.0-1086.97~18.04.1
5.4.0-1088.99~18.04.1
5.4.0-1089.100~18.04.1
5.4.0-1090.101~18.04.1
5.4.0-1091.102~18.04.1
5.4.0-1092.103~18.04.1
5.4.0-1093.104~18.04.1
5.4.0-1094.105~18.04.1
5.4.0-1095.106~18.04.1
5.4.0-1096.107~18.04.1
5.4.0-1097.109~18.04.2
5.4.0-1098.110~18.04.2
5.4.0-1100.112~18.04.1
5.4.0-1101.113~18.04.1
5.4.0-1102.114~18.04.1
5.4.0-1103.115~18.04.1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_version": "5.4.0-1104.116~18.04.1",
            "binary_name": "linux-buildinfo-5.4.0-1104-raspi"
        },
        {
            "binary_version": "5.4.0-1104.116~18.04.1",
            "binary_name": "linux-headers-5.4.0-1104-raspi"
        },
        {
            "binary_version": "5.4.0-1104.116~18.04.1",
            "binary_name": "linux-image-5.4.0-1104-raspi"
        },
        {
            "binary_version": "5.4.0-1104.116~18.04.1",
            "binary_name": "linux-image-5.4.0-1104-raspi-dbgsym"
        },
        {
            "binary_version": "5.4.0-1104.116~18.04.1",
            "binary_name": "linux-modules-5.4.0-1104-raspi"
        },
        {
            "binary_version": "5.4.0-1104.116~18.04.1",
            "binary_name": "linux-raspi-5.4-headers-5.4.0-1104"
        },
        {
            "binary_version": "5.4.0-1104.116~18.04.1",
            "binary_name": "linux-raspi-5.4-tools-5.4.0-1104"
        },
        {
            "binary_version": "5.4.0-1104.116~18.04.1",
            "binary_name": "linux-tools-5.4.0-1104-raspi"
        }
    ]
}

Ubuntu:20.04:LTS / linux-bluefield

Package

Name
linux-bluefield
Purl
pkg:deb/ubuntu/linux-bluefield?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1080.87

Affected versions

5.*

5.4.0-1007.10
5.4.0-1011.14
5.4.0-1012.15
5.4.0-1013.16
5.4.0-1016.19
5.4.0-1019.22
5.4.0-1020.23
5.4.0-1021.24
5.4.0-1022.25
5.4.0-1023.26
5.4.0-1025.28
5.4.0-1026.29
5.4.0-1028.31
5.4.0-1030.33
5.4.0-1032.35
5.4.0-1035.38
5.4.0-1036.39
5.4.0-1040.44
5.4.0-1042.47
5.4.0-1044.49
5.4.0-1045.50
5.4.0-1046.51
5.4.0-1047.52
5.4.0-1049.55
5.4.0-1050.56
5.4.0-1054.60
5.4.0-1058.64
5.4.0-1059.65
5.4.0-1060.66
5.4.0-1062.68
5.4.0-1064.70
5.4.0-1065.71
5.4.0-1066.72
5.4.0-1068.74
5.4.0-1070.76
5.4.0-1071.77
5.4.0-1072.78
5.4.0-1073.79
5.4.0-1074.80
5.4.0-1075.81
5.4.0-1076.82
5.4.0-1077.83
5.4.0-1078.84
5.4.0-1079.85

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "5.4.0-1080.87",
            "binary_name": "linux-bluefield-headers-5.4.0-1080"
        },
        {
            "binary_version": "5.4.0-1080.87",
            "binary_name": "linux-bluefield-tools-5.4.0-1080"
        },
        {
            "binary_version": "5.4.0-1080.87",
            "binary_name": "linux-buildinfo-5.4.0-1080-bluefield"
        },
        {
            "binary_version": "5.4.0-1080.87",
            "binary_name": "linux-headers-5.4.0-1080-bluefield"
        },
        {
            "binary_version": "5.4.0-1080.87",
            "binary_name": "linux-image-unsigned-5.4.0-1080-bluefield"
        },
        {
            "binary_version": "5.4.0-1080.87",
            "binary_name": "linux-image-unsigned-5.4.0-1080-bluefield-dbgsym"
        },
        {
            "binary_version": "5.4.0-1080.87",
            "binary_name": "linux-modules-5.4.0-1080-bluefield"
        },
        {
            "binary_version": "5.4.0-1080.87",
            "binary_name": "linux-tools-5.4.0-1080-bluefield"
        }
    ]
}

Ubuntu:20.04:LTS / linux-xilinx-zynqmp

Package

Name
linux-xilinx-zynqmp
Purl
pkg:deb/ubuntu/linux-xilinx-zynqmp?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1039.43

Affected versions

5.*

5.4.0-1020.24
5.4.0-1021.25
5.4.0-1022.26
5.4.0-1023.27
5.4.0-1024.28
5.4.0-1025.29
5.4.0-1026.30
5.4.0-1027.31
5.4.0-1028.32
5.4.0-1029.33
5.4.0-1030.34
5.4.0-1031.35
5.4.0-1032.36
5.4.0-1033.37
5.4.0-1034.38
5.4.0-1035.39
5.4.0-1036.40
5.4.0-1037.41
5.4.0-1038.42

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "5.4.0-1039.43",
            "binary_name": "linux-buildinfo-5.4.0-1039-xilinx-zynqmp"
        },
        {
            "binary_version": "5.4.0-1039.43",
            "binary_name": "linux-headers-5.4.0-1039-xilinx-zynqmp"
        },
        {
            "binary_version": "5.4.0-1039.43",
            "binary_name": "linux-image-5.4.0-1039-xilinx-zynqmp"
        },
        {
            "binary_version": "5.4.0-1039.43",
            "binary_name": "linux-image-5.4.0-1039-xilinx-zynqmp-dbgsym"
        },
        {
            "binary_version": "5.4.0-1039.43",
            "binary_name": "linux-modules-5.4.0-1039-xilinx-zynqmp"
        },
        {
            "binary_version": "5.4.0-1039.43",
            "binary_name": "linux-tools-5.4.0-1039-xilinx-zynqmp"
        },
        {
            "binary_version": "5.4.0-1039.43",
            "binary_name": "linux-xilinx-zynqmp-headers-5.4.0-1039"
        },
        {
            "binary_version": "5.4.0-1039.43",
            "binary_name": "linux-xilinx-zynqmp-tools-5.4.0-1039"
        }
    ]
}