USN-6686-2

Source
https://ubuntu.com/security/notices/USN-6686-2
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6686-2.json
JSON Data
https://api.osv.dev/v1/vulns/USN-6686-2
Related
Published
2024-03-13T17:17:13.469031Z
Modified
2024-03-13T17:17:13.469031Z
Summary
linux-lowlatency, linux-raspi vulnerabilities
Details

It was discovered that the DesignWare USB3 for Qualcomm SoCs driver in the Linux kernel did not properly handle certain error conditions during device registration. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2023-22995)

It was discovered that a race condition existed in the Cypress touchscreen driver in the Linux kernel during device removal, leading to a use-after- free vulnerability. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-4134)

黄思聪 discovered that the NFC Controller Interface (NCI) implementation in the Linux kernel did not properly handle certain memory allocation failure conditions, leading to a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service (system crash). (CVE-2023-46343)

It was discovered that the io_uring subsystem in the Linux kernel contained a race condition, leading to a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service (system crash). (CVE-2023-46862)

It was discovered that a race condition existed in the Bluetooth subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-51779)

It was discovered that a race condition existed in the Rose X.25 protocol implementation in the Linux kernel, leading to a use-after- free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-51782)

Alon Zahavi discovered that the NVMe-oF/TCP subsystem of the Linux kernel did not properly handle connect command payloads in certain situations, leading to an out-of-bounds read vulnerability. A remote attacker could use this to expose sensitive information (kernel memory). (CVE-2023-6121)

It was discovered that the VirtIO subsystem in the Linux kernel did not properly initialize memory in some situations. A local attacker could use this to possibly expose sensitive information (kernel memory). (CVE-2024-0340)

Dan Carpenter discovered that the netfilter subsystem in the Linux kernel did not store data in properly sized memory locations. A local user could use this to cause a denial of service (system crash). (CVE-2024-0607)

References

Affected packages

Ubuntu:22.04:LTS / linux-lowlatency

Package

Name
linux-lowlatency
Purl
pkg:deb/ubuntu/linux-lowlatency?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-100.110

Affected versions

5.*

5.15.0-22.22
5.15.0-23.23
5.15.0-24.24
5.15.0-27.28
5.15.0-30.31
5.15.0-33.34
5.15.0-35.36
5.15.0-37.39
5.15.0-39.42
5.15.0-40.43
5.15.0-41.44
5.15.0-43.46
5.15.0-46.49
5.15.0-47.53
5.15.0-48.54
5.15.0-50.56
5.15.0-52.58
5.15.0-53.59
5.15.0-56.62
5.15.0-57.63
5.15.0-58.64
5.15.0-60.66
5.15.0-67.74
5.15.0-69.76
5.15.0-70.77
5.15.0-71.78
5.15.0-72.79
5.15.0-73.80
5.15.0-75.82
5.15.0-76.83
5.15.0-78.85
5.15.0-79.88
5.15.0-82.91
5.15.0-83.92
5.15.0-84.93
5.15.0-86.95
5.15.0-87.96
5.15.0-88.98
5.15.0-89.99
5.15.0-91.101
5.15.0-92.102
5.15.0-94.104
5.15.0-97.107

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "5.15.0-100.110",
            "binary_name": "linux-buildinfo-5.15.0-100-lowlatency"
        },
        {
            "binary_version": "5.15.0-100.110",
            "binary_name": "linux-buildinfo-5.15.0-100-lowlatency-64k"
        },
        {
            "binary_version": "5.15.0-100.110",
            "binary_name": "linux-cloud-tools-5.15.0-100-lowlatency"
        },
        {
            "binary_version": "5.15.0-100.110",
            "binary_name": "linux-headers-5.15.0-100-lowlatency"
        },
        {
            "binary_version": "5.15.0-100.110",
            "binary_name": "linux-headers-5.15.0-100-lowlatency-64k"
        },
        {
            "binary_version": "5.15.0-100.110",
            "binary_name": "linux-image-unsigned-5.15.0-100-lowlatency"
        },
        {
            "binary_version": "5.15.0-100.110",
            "binary_name": "linux-image-unsigned-5.15.0-100-lowlatency-64k"
        },
        {
            "binary_version": "5.15.0-100.110",
            "binary_name": "linux-image-unsigned-5.15.0-100-lowlatency-64k-dbgsym"
        },
        {
            "binary_version": "5.15.0-100.110",
            "binary_name": "linux-image-unsigned-5.15.0-100-lowlatency-dbgsym"
        },
        {
            "binary_version": "5.15.0-100.110",
            "binary_name": "linux-lowlatency-cloud-tools-5.15.0-100"
        },
        {
            "binary_version": "5.15.0-100.110",
            "binary_name": "linux-lowlatency-cloud-tools-common"
        },
        {
            "binary_version": "5.15.0-100.110",
            "binary_name": "linux-lowlatency-headers-5.15.0-100"
        },
        {
            "binary_version": "5.15.0-100.110",
            "binary_name": "linux-lowlatency-tools-5.15.0-100"
        },
        {
            "binary_version": "5.15.0-100.110",
            "binary_name": "linux-lowlatency-tools-common"
        },
        {
            "binary_version": "5.15.0-100.110",
            "binary_name": "linux-lowlatency-tools-host"
        },
        {
            "binary_version": "5.15.0-100.110",
            "binary_name": "linux-modules-5.15.0-100-lowlatency"
        },
        {
            "binary_version": "5.15.0-100.110",
            "binary_name": "linux-modules-5.15.0-100-lowlatency-64k"
        },
        {
            "binary_version": "5.15.0-100.110",
            "binary_name": "linux-modules-iwlwifi-5.15.0-100-lowlatency"
        },
        {
            "binary_version": "5.15.0-100.110",
            "binary_name": "linux-tools-5.15.0-100-lowlatency"
        },
        {
            "binary_version": "5.15.0-100.110",
            "binary_name": "linux-tools-5.15.0-100-lowlatency-64k"
        }
    ]
}

Ubuntu:22.04:LTS / linux-raspi

Package

Name
linux-raspi
Purl
pkg:deb/ubuntu/linux-raspi?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1048.51

Affected versions

5.*

5.13.0-1008.9
5.15.0-1002.2
5.15.0-1003.3
5.15.0-1004.4
5.15.0-1005.5
5.15.0-1006.6
5.15.0-1008.8
5.15.0-1011.13
5.15.0-1012.14
5.15.0-1013.15
5.15.0-1014.16
5.15.0-1015.17
5.15.0-1016.18
5.15.0-1017.19
5.15.0-1018.20
5.15.0-1021.23
5.15.0-1022.24
5.15.0-1023.25
5.15.0-1024.26
5.15.0-1025.27
5.15.0-1026.28
5.15.0-1027.29
5.15.0-1028.30
5.15.0-1029.31
5.15.0-1030.32
5.15.0-1032.35
5.15.0-1033.36
5.15.0-1034.37
5.15.0-1035.38
5.15.0-1036.39
5.15.0-1037.40
5.15.0-1038.41
5.15.0-1040.43
5.15.0-1041.44
5.15.0-1042.45
5.15.0-1043.46
5.15.0-1044.47
5.15.0-1045.48
5.15.0-1046.49
5.15.0-1047.50

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "5.15.0-1048.51",
            "binary_name": "linux-buildinfo-5.15.0-1048-raspi"
        },
        {
            "binary_version": "5.15.0-1048.51",
            "binary_name": "linux-headers-5.15.0-1048-raspi"
        },
        {
            "binary_version": "5.15.0-1048.51",
            "binary_name": "linux-image-5.15.0-1048-raspi"
        },
        {
            "binary_version": "5.15.0-1048.51",
            "binary_name": "linux-image-5.15.0-1048-raspi-dbgsym"
        },
        {
            "binary_version": "5.15.0-1048.51",
            "binary_name": "linux-modules-5.15.0-1048-raspi"
        },
        {
            "binary_version": "5.15.0-1048.51",
            "binary_name": "linux-modules-extra-5.15.0-1048-raspi"
        },
        {
            "binary_version": "5.15.0-1048.51",
            "binary_name": "linux-raspi-headers-5.15.0-1048"
        },
        {
            "binary_version": "5.15.0-1048.51",
            "binary_name": "linux-raspi-tools-5.15.0-1048"
        },
        {
            "binary_version": "5.15.0-1048.51",
            "binary_name": "linux-tools-5.15.0-1048-raspi"
        }
    ]
}