Lucene search

K
ubuntuUbuntuUSN-6255-1
HistoryJul 26, 2023 - 12:00 a.m.

Linux kernel (Intel IoTG) vulnerabilities

2023-07-2600:00:00
ubuntu.com
24

7.7 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

16.2%

Releases

  • Ubuntu 20.04 LTS

Packages

  • linux-intel-iotg-5.15 - Linux kernel for Intel IoT platforms

Details

It was discovered that the IP-VLAN network driver for the Linux kernel did
not properly initialize memory in some situations, leading to an out-of-
bounds write vulnerability. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2023-3090)

Mingi Cho discovered that the netfilter subsystem in the Linux kernel did
not properly validate the status of a nft chain while performing a lookup
by id, leading to a use-after-free vulnerability. An attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-31248)

Querijn Voet discovered that a race condition existed in the io_uring
subsystem in the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-3389)

It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle some error conditions, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3390)

Lin Ma discovered that a race condition existed in the MCTP implementation
in the Linux kernel, leading to a use-after-free vulnerability. A
privileged attacker could use this to cause a denial of service (system
crash) or possibly execute arbitrary code. (CVE-2023-3439)

Tanguy Dubroca discovered that the netfilter subsystem in the Linux kernel
did not properly handle certain pointer data type, leading to an out-of-
bounds write vulnerability. A privileged attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-35001)

OSVersionArchitecturePackageVersionFilename
Ubuntu20.04noarchlinux-image-intel-iotg< 5.15.0.1036.41~20.04.26UNKNOWN
Ubuntu20.04noarchlinux-cloud-tools-intel< 5.15.0.1036.41~20.04.26UNKNOWN
Ubuntu20.04noarchlinux-headers-intel< 5.15.0.1036.41~20.04.26UNKNOWN
Ubuntu20.04noarchlinux-headers-intel-iotg< 5.15.0.1036.41~20.04.26UNKNOWN
Ubuntu20.04noarchlinux-headers-intel-iotg-edge< 5.15.0.1036.41~20.04.26UNKNOWN
Ubuntu20.04noarchlinux-image-intel< 5.15.0.1036.41~20.04.26UNKNOWN
Ubuntu20.04noarchlinux-image-intel-iotg-edge< 5.15.0.1036.41~20.04.26UNKNOWN
Ubuntu20.04noarchlinux-intel< 5.15.0.1036.41~20.04.26UNKNOWN
Ubuntu20.04noarchlinux-intel-iotg< 5.15.0.1036.41~20.04.26UNKNOWN
Ubuntu20.04noarchlinux-intel-iotg-edge< 5.15.0.1036.41~20.04.26UNKNOWN
Rows per page:
1-10 of 151