Lucene search

K
ubuntuUbuntuUSN-6454-4
HistoryNov 01, 2023 - 12:00 a.m.

Linux kernel (StarFive) vulnerabilities

2023-11-0100:00:00
ubuntu.com
18
linux kernel
starfive
ubuntu 23.10
vulnerabilities
netfilter
ip set operations
denial of service
out-of-bounds write
quick fair queueing
use after free
arbitrary code execution
removal of rules
cve-2023-42756
cve-2023-4881
cve-2023-4921
cve-2023-5197

7.1 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

8.7%

Releases

  • Ubuntu 23.10

Packages

  • linux-starfive - Linux kernel for StarFive processors

Details

Kyle Zeng discovered that the netfilter subsystem in the Linux kernel
contained a race condition in IP set operations in certain situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2023-42756)

Alex Birnberg discovered that the netfilter subsystem in the Linux kernel
did not properly validate register length, leading to an out-of- bounds
write vulnerability. A local attacker could possibly use this to cause a
denial of service (system crash). (CVE-2023-4881)

It was discovered that the Quick Fair Queueing scheduler implementation in
the Linux kernel did not properly handle network packets in certain
conditions, leading to a use after free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-4921)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle removal of rules from chain bindings in certain
circumstances, leading to a use-after-free vulnerability. A local attacker
could possibly use this to cause a denial of service (system crash) or
execute arbitrary code. (CVE-2023-5197)