Lucene search

K
ubuntuUbuntuUSN-6329-1
HistoryAug 31, 2023 - 12:00 a.m.

Linux kernel vulnerabilities

2023-08-3100:00:00
ubuntu.com
53
ubuntu 18.04
esm
gcp
oracle cloud
intel processors
amd processors
network packet classifier
speculative execution
denial of service

8.1 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

51.2%

Releases

  • Ubuntu 18.04 ESM

Packages

  • linux-gcp-5.4 - Linux kernel for Google Cloud Platform (GCP) systems
  • linux-oracle-5.4 - Linux kernel for Oracle Cloud systems

Details

Daniel Moghimi discovered that some Intel® Processors did not properly
clear microarchitectural state after speculative execution of various
instructions. A local unprivileged user could use this to obtain to
sensitive information. (CVE-2022-40982)

Tavis Ormandy discovered that some AMD processors did not properly handle
speculative execution of certain vector register instructions. A local
attacker could use this to expose sensitive information. (CVE-2023-20593)

It was discovered that the universal 32bit network packet classifier
implementation in the Linux kernel did not properly perform reference
counting in some situations, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-3609)

It was discovered that the Quick Fair Queueing network scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3611)

It was discovered that the network packet classifier with
netfilter/firewall marks implementation in the Linux kernel did not
properly handle reference counting, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3776)