Lucene search

K
ubuntuUbuntuUSN-6162-1
HistoryJun 14, 2023 - 12:00 a.m.

Linux kernel (Intel IoTG) vulnerabilities

2023-06-1400:00:00
ubuntu.com
24

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.1 High

AI Score

Confidence

High

4.3 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:S/C:P/I:P/A:P

0.0004 Low

EPSS

Percentile

5.2%

Releases

  • Ubuntu 20.04 LTS

Packages

  • linux-intel-iotg-5.15 - Linux kernel for Intel IoT platforms

Details

Patryk Sondej and Piotr Krysiuk discovered that a race condition existed in
the netfilter subsystem of the Linux kernel when processing batch requests,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-32233)

Gwangun Jung discovered that the Quick Fair Queueing scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-31436)

Reima Ishii discovered that the nested KVM implementation for Intel x86
processors in the Linux kernel did not properly validate control registers
in certain situations. An attacker in a guest VM could use this to cause a
denial of service (guest crash). (CVE-2023-30456)

It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux
kernel did not properly perform data buffer size validation in some
situations. A physically proximate attacker could use this to craft a
malicious USB device that when inserted, could cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-1380)

Jean-Baptiste Cayrou discovered that the shiftfs file system in the Ubuntu
Linux kernel contained a race condition when handling inode locking in some
situations. A local attacker could use this to cause a denial of service
(kernel deadlock). (CVE-2023-2612)

OSVersionArchitecturePackageVersionFilename
Ubuntu20.04noarchlinux-image-intel-iotg< 5.15.0.1031.36~20.04.23UNKNOWN
Ubuntu20.04noarchlinux-cloud-tools-intel< 5.15.0.1031.36~20.04.23UNKNOWN
Ubuntu20.04noarchlinux-headers-intel< 5.15.0.1031.36~20.04.23UNKNOWN
Ubuntu20.04noarchlinux-headers-intel-iotg< 5.15.0.1031.36~20.04.23UNKNOWN
Ubuntu20.04noarchlinux-headers-intel-iotg-edge< 5.15.0.1031.36~20.04.23UNKNOWN
Ubuntu20.04noarchlinux-image-intel< 5.15.0.1031.36~20.04.23UNKNOWN
Ubuntu20.04noarchlinux-image-intel-iotg-edge< 5.15.0.1031.36~20.04.23UNKNOWN
Ubuntu20.04noarchlinux-intel< 5.15.0.1031.36~20.04.23UNKNOWN
Ubuntu20.04noarchlinux-intel-iotg< 5.15.0.1031.36~20.04.23UNKNOWN
Ubuntu20.04noarchlinux-intel-iotg-edge< 5.15.0.1031.36~20.04.23UNKNOWN
Rows per page:
1-10 of 151

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.1 High

AI Score

Confidence

High

4.3 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:S/C:P/I:P/A:P

0.0004 Low

EPSS

Percentile

5.2%