Lucene search

K
ubuntuUbuntuUSN-6502-1
HistoryNov 21, 2023 - 12:00 a.m.

Linux kernel vulnerabilities

2023-11-2100:00:00
ubuntu.com
90
ubuntu
infiniband
ubi
intel gigabit
kvm
smb
vulnerabilities
kernel
security
ubuntu 23.04
ubuntu 22.04 lts

8.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

32.4%

Releases

  • Ubuntu 23.04
  • Ubuntu 22.04 LTS

Packages

  • linux - Linux kernel
  • linux-aws - Linux kernel for Amazon Web Services (AWS) systems
  • linux-aws-6.2 - Linux kernel for Amazon Web Services (AWS) systems
  • linux-hwe-6.2 - Linux hardware enablement (HWE) kernel
  • linux-kvm - Linux kernel for cloud environments
  • linux-lowlatency - Linux low latency kernel
  • linux-lowlatency-hwe-6.2 - Linux low latency kernel
  • linux-raspi - Linux kernel for Raspberry Pi systems
  • linux-starfive - Linux kernel for StarFive processors

Details

Ivan D Barrera, Christopher Bednarz, Mustafa Ismail, and Shiraz Saleem
discovered that the InfiniBand RDMA driver in the Linux kernel did not
properly check for zero-length STAG or MR registration. A remote attacker
could possibly use this to execute arbitrary code. (CVE-2023-25775)

Yu Hao discovered that the UBI driver in the Linux kernel did not properly
check for MTD with zero erasesize during device attachment. A local
privileged attacker could use this to cause a denial of service (system
crash). (CVE-2023-31085)

Manfred Rudigier discovered that the IntelĀ® PCI-Express Gigabit (igb)
Ethernet driver in the Linux kernel did not properly validate received
frames that are larger than the set MTU size, leading to a buffer overflow
vulnerability. An attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-45871)

Maxim Levitsky discovered that the KVM nested virtualization (SVM)
implementation for AMD processors in the Linux kernel did not properly
handle x2AVIC MSRs. An attacker in a guest VM could use this to cause a
denial of service (host kernel crash). (CVE-2023-5090)

It was discovered that the SMB network file sharing protocol implementation
in the Linux kernel did not properly handle certain error conditions,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-5345)