USN-6135-1

Source
https://ubuntu.com/security/notices/USN-6135-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6135-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-6135-1
Related
Published
2023-06-02T15:52:36.689806Z
Modified
2023-06-02T15:52:36.689806Z
Summary
linux-azure-fde, linux-azure-fde-5.15 vulnerabilities
Details

Patryk Sondej and Piotr Krysiuk discovered that a race condition existed in the netfilter subsystem of the Linux kernel when processing batch requests, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-32233)

Gwangun Jung discovered that the Quick Fair Queueing scheduler implementation in the Linux kernel contained an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-31436)

Reima Ishii discovered that the nested KVM implementation for Intel x86 processors in the Linux kernel did not properly validate control registers in certain situations. An attacker in a guest VM could use this to cause a denial of service (guest crash). (CVE-2023-30456)

It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux kernel did not properly perform data buffer size validation in some situations. A physically proximate attacker could use this to craft a malicious USB device that when inserted, could cause a denial of service (system crash) or possibly expose sensitive information. (CVE-2023-1380)

Jean-Baptiste Cayrou discovered that the shiftfs file system in the Ubuntu Linux kernel contained a race condition when handling inode locking in some situations. A local attacker could use this to cause a denial of service (kernel deadlock). (CVE-2023-2612)

References

Affected packages

Ubuntu:20.04:LTS / linux-azure-fde-5.15

Package

Name
linux-azure-fde-5.15
Purl
pkg:deb/ubuntu/linux-azure-fde-5.15?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1039.46~20.04.1.1

Affected versions

5.*

5.15.0-1019.24~20.04.1.1
5.15.0-1020.25~20.04.1.1
5.15.0-1021.26~20.04.1.1
5.15.0-1029.36~20.04.1.1
5.15.0-1030.37~20.04.1.1
5.15.0-1031.38~20.04.1.1
5.15.0-1033.40~20.04.1.1
5.15.0-1034.41~20.04.1.2
5.15.0-1035.42~20.04.1.1
5.15.0-1036.43~20.04.1.1
5.15.0-1037.44~20.04.1.1
5.15.0-1038.45~20.04.1.1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "5.15.0-1039.46~20.04.1.1",
            "binary_name": "linux-image-unsigned-5.15.0-1039-azure-fde"
        },
        {
            "binary_version": "5.15.0-1039.46~20.04.1.1",
            "binary_name": "linux-image-unsigned-5.15.0-1039-azure-fde-dbgsym"
        }
    ]
}

Ubuntu:22.04:LTS / linux-azure-fde

Package

Name
linux-azure-fde
Purl
pkg:deb/ubuntu/linux-azure-fde?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1039.46.1

Affected versions

5.*

5.15.0-1019.24.1
5.15.0-1024.30.1
5.15.0-1029.36.1
5.15.0-1030.37.1
5.15.0-1031.38.1
5.15.0-1033.40.1
5.15.0-1034.41.1
5.15.0-1035.42.1
5.15.0-1036.43.1
5.15.0-1037.44.1
5.15.0-1038.45.1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "5.15.0-1039.46.1",
            "binary_name": "linux-image-unsigned-5.15.0-1039-azure-fde"
        },
        {
            "binary_version": "5.15.0-1039.46.1",
            "binary_name": "linux-image-unsigned-5.15.0-1039-azure-fde-dbgsym"
        }
    ]
}