{"id":52681,"date":"2023-08-12T01:07:44","date_gmt":"2023-08-11T16:07:44","guid":{"rendered":"https:\/\/jirak.net\/wp\/usn-6284-1-linux-kernel-vulnerabilities\/"},"modified":"2023-08-12T03:34:15","modified_gmt":"2023-08-11T18:34:15","slug":"usn-6284-1-linux-kernel-vulnerabilities","status":"publish","type":"post","link":"https:\/\/jirak.net\/wp\/usn-6284-1-linux-kernel-vulnerabilities\/","title":{"rendered":"USN-6284-1: Linux kernel vulnerabilities"},"content":{"rendered":"<p>USN-6284-1: Linux kernel vulnerabilities<\/p>\n<p>It was discovered that the netlink implementation in the Linux kernel did<br \/>\nnot properly validate policies when parsing attributes in some situations.<br \/>\nAn attacker could use this to cause a denial of service (infinite<br \/>\nrecursion). (CVE-2020-36691)<\/p>\n<p>Billy Jheng Bing Jhong discovered that the CIFS network file system<br \/>\nimplementation in the Linux kernel did not properly validate arguments to<br \/>\nioctl() in some situations. A local attacker could possibly use this to<br \/>\ncause a denial of service (system crash). (CVE-2022-0168)<\/p>\n<p>It was discovered that the ext4 file system implementation in the Linux<br \/>\nkernel contained a use-after-free vulnerability. An attacker could use this<br \/>\nto construct a malicious ext4 file system image that, when mounted, could<br \/>\ncause a denial of service (system crash). (CVE-2022-1184)<\/p>\n<p>It was discovered that some AMD x86-64 processors with SMT enabled could<br \/>\nspeculatively execute instructions using a return address from a sibling<br \/>\nthread. A local attacker could possibly use this to expose sensitive<br \/>\ninformation. (CVE-2022-27672)<\/p>\n<p>William Zhao discovered that the Traffic Control (TC) subsystem in the<br \/>\nLinux kernel did not properly handle network packet retransmission in<br \/>\ncertain situations. A local attacker could use this to cause a denial of<br \/>\nservice (kernel deadlock). (CVE-2022-4269)<\/p>\n<p>It was discovered that a race condition existed in the qdisc implementation<br \/>\nin the Linux kernel, leading to a use-after-free vulnerability. A local<br \/>\nattacker could use this to cause a denial of service (system crash) or<br \/>\npossibly execute arbitrary code. (CVE-2023-0590)<\/p>\n<p>It was discovered that a race condition existed in the btrfs file system<br \/>\nimplementation in the Linux kernel, leading to a use-after-free<br \/>\nvulnerability. A local attacker could use this to cause a denial of service<br \/>\n(system crash) or possibly expose sensitive information. (CVE-2023-1611)<\/p>\n<p>It was discovered that the APM X-Gene SoC hardware monitoring driver in the<br \/>\nLinux kernel contained a race condition, leading to a use-after-free<br \/>\nvulnerability. A local attacker could use this to cause a denial of service<br \/>\n(system crash) or expose sensitive information (kernel memory).<br \/>\n(CVE-2023-1855)<\/p>\n<p>It was discovered that the ST NCI NFC driver did not properly handle device<br \/>\nremoval events. A physically proximate attacker could use this to cause a<br \/>\ndenial of service (system crash). (CVE-2023-1990)<\/p>\n<p>It was discovered that the XFS file system implementation in the Linux<br \/>\nkernel did not properly perform metadata validation when mounting certain<br \/>\nimages. An attacker could use this to specially craft a file system image<br \/>\nthat, when mounted, could cause a denial of service (system crash).<br \/>\n(CVE-2023-2124)<\/p>\n<p>It was discovered that the SLIMpro I2C device driver in the Linux kernel<br \/>\ndid not properly validate user-supplied data in some situations, leading to<br \/>\nan out-of-bounds write vulnerability. A privileged attacker could use this<br \/>\nto cause a denial of service (system crash) or possibly execute arbitrary<br \/>\ncode. (CVE-2023-2194)<\/p>\n<p>It was discovered that a race condition existed in the TLS subsystem in the<br \/>\nLinux kernel, leading to a use-after-free or a null pointer dereference<br \/>\nvulnerability. A local attacker could use this to cause a denial of service<br \/>\n(system crash) or possibly execute arbitrary code. (CVE-2023-28466)<\/p>\n<p>It was discovered that the DA9150 charger driver in the Linux kernel did<br \/>\nnot properly handle device removal, leading to a user-after free<br \/>\nvulnerability. A physically proximate attacker could use this to cause a<br \/>\ndenial of service (system crash) or possibly execute arbitrary code.<br \/>\n(CVE-2023-30772)<\/p>\n<p>It was discovered that the btrfs file system implementation in the Linux<br \/>\nkernel did not properly handle error conditions in some situations, leading<br \/>\nto a use-after-free vulnerability. A local attacker could possibly use this<br \/>\nto cause a denial of service (system crash). (CVE-2023-3111)<\/p>\n<p>It was discovered that the Ricoh R5C592 MemoryStick card reader driver in<br \/>\nthe Linux kernel contained a race condition during module unload, leading<br \/>\nto a use-after-free vulnerability. A local attacker could use this to cause<br \/>\na denial of service (system crash) or possibly execute arbitrary code.<br \/>\n(CVE-2023-3141)<\/p>\n<p>It was discovered that the Qualcomm EMAC ethernet driver in the Linux<br \/>\nkernel did not properly handle device removal, leading to a user-after free<br \/>\nvulnerability. A physically proximate attacker could use this to cause a<br \/>\ndenial of service (system crash) or possibly execute arbitrary code.<br \/>\n(CVE-2023-33203)<br \/>\nSource: <a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6284-1\" target=\"_blank\" rel=\"noopener\">USN-6284-1: Linux kernel vulnerabilities<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>USN-6284-1: Linux kernel vulnerabilities It was discovered that the netlink implementation in the Linux kernel did not properly validate policies when parsing attributes in some situations. An attacker could use this to cause a denial of service (infinite recursion). (CVE-2020-36691) Billy Jheng Bing Jhong discovered that the CIFS network file system implementation in the Linux kernel did not properly validate arguments to ioctl() in some situations. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-0168) It was discovered that the ext4 file system implementation in the Linux kernel contained a use-after-free vulnerability. An attacker could use this to construct a malicious ext4 file system image that, when mounted, could cause a denial of service (system crash). (CVE-2022-1184) It was discovered that some AMD x86-64 processors with SMT enabled could speculatively execute instructions using <a class=\"mh-excerpt-more\" href=\"https:\/\/jirak.net\/wp\/usn-6284-1-linux-kernel-vulnerabilities\/\" title=\"USN-6284-1: Linux kernel vulnerabilities\">[ more&#8230; ]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[586],"tags":[587],"class_list":["post-52681","post","type-post","status-publish","format-standard","hentry","category-ubuntu-usn","tag-ubuntu-usn"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/52681","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/comments?post=52681"}],"version-history":[{"count":1,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/52681\/revisions"}],"predecessor-version":[{"id":52682,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/52681\/revisions\/52682"}],"wp:attachment":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/media?parent=52681"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/categories?post=52681"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/tags?post=52681"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}