It was discovered that the IP-VLAN network driver for the Linux kernel did not properly initialize memory in some situations, leading to an out-of- bounds write vulnerability. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-3090)
Mingi Cho discovered that the netfilter subsystem in the Linux kernel did not properly validate the status of a nft chain while performing a lookup by id, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-31248)
Querijn Voet discovered that a race condition existed in the io_uring subsystem in the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-3389)
It was discovered that the netfilter subsystem in the Linux kernel did not properly handle some error conditions, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-3390)
Lin Ma discovered that a race condition existed in the MCTP implementation in the Linux kernel, leading to a use-after-free vulnerability. A privileged attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-3439)
Tanguy Dubroca discovered that the netfilter subsystem in the Linux kernel did not properly handle certain pointer data type, leading to an out-of- bounds write vulnerability. A privileged attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-35001)
{
"binaries": [
{
"binary_version": "5.15.0-1036.41~20.04.1",
"binary_name": "linux-buildinfo-5.15.0-1036-intel-iotg"
},
{
"binary_version": "5.15.0-1036.41~20.04.1",
"binary_name": "linux-cloud-tools-5.15.0-1036-intel-iotg"
},
{
"binary_version": "5.15.0-1036.41~20.04.1",
"binary_name": "linux-headers-5.15.0-1036-intel-iotg"
},
{
"binary_version": "5.15.0-1036.41~20.04.1",
"binary_name": "linux-image-unsigned-5.15.0-1036-intel-iotg"
},
{
"binary_version": "5.15.0-1036.41~20.04.1",
"binary_name": "linux-intel-iotg-5.15-cloud-tools-5.15.0-1036"
},
{
"binary_version": "5.15.0-1036.41~20.04.1",
"binary_name": "linux-intel-iotg-5.15-cloud-tools-common"
},
{
"binary_version": "5.15.0-1036.41~20.04.1",
"binary_name": "linux-intel-iotg-5.15-headers-5.15.0-1036"
},
{
"binary_version": "5.15.0-1036.41~20.04.1",
"binary_name": "linux-intel-iotg-5.15-tools-5.15.0-1036"
},
{
"binary_version": "5.15.0-1036.41~20.04.1",
"binary_name": "linux-intel-iotg-5.15-tools-common"
},
{
"binary_version": "5.15.0-1036.41~20.04.1",
"binary_name": "linux-intel-iotg-5.15-tools-host"
},
{
"binary_version": "5.15.0-1036.41~20.04.1",
"binary_name": "linux-modules-5.15.0-1036-intel-iotg"
},
{
"binary_version": "5.15.0-1036.41~20.04.1",
"binary_name": "linux-modules-extra-5.15.0-1036-intel-iotg"
},
{
"binary_version": "5.15.0-1036.41~20.04.1",
"binary_name": "linux-modules-iwlwifi-5.15.0-1036-intel-iotg"
},
{
"binary_version": "5.15.0-1036.41~20.04.1",
"binary_name": "linux-tools-5.15.0-1036-intel-iotg"
}
],
"availability": "No subscription required"
}
{
"ecosystem": "Ubuntu:20.04:LTS",
"cves": [
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "high",
"type": "Ubuntu"
}
],
"id": "CVE-2023-3090"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "high",
"type": "Ubuntu"
}
],
"id": "CVE-2023-3389"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "high",
"type": "Ubuntu"
}
],
"id": "CVE-2023-3390"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2023-3439"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "high",
"type": "Ubuntu"
}
],
"id": "CVE-2023-31248"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "high",
"type": "Ubuntu"
}
],
"id": "CVE-2023-35001"
}
]
}