Jana Hofmann, Emanuele Vannacci, Cedric Fournet, Boris Kopf, and Oleksii Oleksenko discovered that some AMD processors could leak stale data from division operations in certain situations. A local attacker could possibly use this to expose sensitive information. (CVE-2023-20588)
It was discovered that the ARM64 KVM implementation in the Linux kernel did not properly restrict hypervisor memory access. An attacker in a guest VM could use this to execute arbitrary code in the host OS. (CVE-2023-21264)
It was discovered that the bluetooth subsystem in the Linux kernel did not properly handle L2CAP socket release, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-40283)
It was discovered that some network classifier implementations in the Linux kernel contained use-after-free vulnerabilities. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-4128)
Lonial Con discovered that the netfilter subsystem in the Linux kernel contained a memory leak when handling certain element flush operations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2023-4569)
{
"binaries": [
{
"binary_version": "6.2.0-1012.12~22.04.1",
"binary_name": "linux-aws-6.2-cloud-tools-6.2.0-1012"
},
{
"binary_version": "6.2.0-1012.12~22.04.1",
"binary_name": "linux-aws-6.2-headers-6.2.0-1012"
},
{
"binary_version": "6.2.0-1012.12~22.04.1",
"binary_name": "linux-aws-6.2-tools-6.2.0-1012"
},
{
"binary_version": "6.2.0-1012.12~22.04.1",
"binary_name": "linux-buildinfo-6.2.0-1012-aws"
},
{
"binary_version": "6.2.0-1012.12~22.04.1",
"binary_name": "linux-cloud-tools-6.2.0-1012-aws"
},
{
"binary_version": "6.2.0-1012.12~22.04.1",
"binary_name": "linux-headers-6.2.0-1012-aws"
},
{
"binary_version": "6.2.0-1012.12~22.04.1",
"binary_name": "linux-image-unsigned-6.2.0-1012-aws"
},
{
"binary_version": "6.2.0-1012.12~22.04.1",
"binary_name": "linux-modules-6.2.0-1012-aws"
},
{
"binary_version": "6.2.0-1012.12~22.04.1",
"binary_name": "linux-modules-extra-6.2.0-1012-aws"
},
{
"binary_version": "6.2.0-1012.12~22.04.1",
"binary_name": "linux-tools-6.2.0-1012-aws"
}
],
"availability": "No subscription required"
}{
"ecosystem": "Ubuntu:22.04:LTS",
"cves": [
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "high",
"type": "Ubuntu"
}
],
"id": "CVE-2023-4128"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "high",
"type": "Ubuntu"
}
],
"id": "CVE-2023-4569"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
},
{
"score": "high",
"type": "Ubuntu"
}
],
"id": "CVE-2023-20588"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "high",
"type": "Ubuntu"
}
],
"id": "CVE-2023-21264"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "high",
"type": "Ubuntu"
}
],
"id": "CVE-2023-40283"
}
]
}
{
"binaries": [
{
"binary_version": "6.2.0-1012.12~22.04.1",
"binary_name": "linux-azure-6.2-cloud-tools-6.2.0-1012"
},
{
"binary_version": "6.2.0-1012.12~22.04.1",
"binary_name": "linux-azure-6.2-headers-6.2.0-1012"
},
{
"binary_version": "6.2.0-1012.12~22.04.1",
"binary_name": "linux-azure-6.2-tools-6.2.0-1012"
},
{
"binary_version": "6.2.0-1012.12~22.04.1",
"binary_name": "linux-buildinfo-6.2.0-1012-azure"
},
{
"binary_version": "6.2.0-1012.12~22.04.1",
"binary_name": "linux-cloud-tools-6.2.0-1012-azure"
},
{
"binary_version": "6.2.0-1012.12~22.04.1",
"binary_name": "linux-headers-6.2.0-1012-azure"
},
{
"binary_version": "6.2.0-1012.12~22.04.1",
"binary_name": "linux-image-unsigned-6.2.0-1012-azure"
},
{
"binary_version": "6.2.0-1012.12~22.04.1",
"binary_name": "linux-modules-6.2.0-1012-azure"
},
{
"binary_version": "6.2.0-1012.12~22.04.1",
"binary_name": "linux-modules-extra-6.2.0-1012-azure"
},
{
"binary_version": "6.2.0-1012.12~22.04.1",
"binary_name": "linux-tools-6.2.0-1012-azure"
}
],
"availability": "No subscription required"
}{
"ecosystem": "Ubuntu:22.04:LTS",
"cves": [
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "high",
"type": "Ubuntu"
}
],
"id": "CVE-2023-4128"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "high",
"type": "Ubuntu"
}
],
"id": "CVE-2023-4569"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
},
{
"score": "high",
"type": "Ubuntu"
}
],
"id": "CVE-2023-20588"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "high",
"type": "Ubuntu"
}
],
"id": "CVE-2023-21264"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "high",
"type": "Ubuntu"
}
],
"id": "CVE-2023-40283"
}
]
}
{
"binaries": [
{
"binary_version": "6.2.0-1012.12~22.04.1.1",
"binary_name": "linux-image-unsigned-6.2.0-1012-azure-fde"
}
],
"availability": "No subscription required"
}{
"ecosystem": "Ubuntu:22.04:LTS",
"cves": [
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "high",
"type": "Ubuntu"
}
],
"id": "CVE-2023-4128"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "high",
"type": "Ubuntu"
}
],
"id": "CVE-2023-4569"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
},
{
"score": "high",
"type": "Ubuntu"
}
],
"id": "CVE-2023-20588"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "high",
"type": "Ubuntu"
}
],
"id": "CVE-2023-21264"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "high",
"type": "Ubuntu"
}
],
"id": "CVE-2023-40283"
}
]
}
{
"binaries": [
{
"binary_version": "6.2.0-1014.14~22.04.1",
"binary_name": "linux-buildinfo-6.2.0-1014-gcp"
},
{
"binary_version": "6.2.0-1014.14~22.04.1",
"binary_name": "linux-gcp-6.2-headers-6.2.0-1014"
},
{
"binary_version": "6.2.0-1014.14~22.04.1",
"binary_name": "linux-gcp-6.2-tools-6.2.0-1014"
},
{
"binary_version": "6.2.0-1014.14~22.04.1",
"binary_name": "linux-headers-6.2.0-1014-gcp"
},
{
"binary_version": "6.2.0-1014.14~22.04.1",
"binary_name": "linux-image-unsigned-6.2.0-1014-gcp"
},
{
"binary_version": "6.2.0-1014.14~22.04.1",
"binary_name": "linux-modules-6.2.0-1014-gcp"
},
{
"binary_version": "6.2.0-1014.14~22.04.1",
"binary_name": "linux-modules-extra-6.2.0-1014-gcp"
},
{
"binary_version": "6.2.0-1014.14~22.04.1",
"binary_name": "linux-modules-iwlwifi-6.2.0-1014-gcp"
},
{
"binary_version": "6.2.0-1014.14~22.04.1",
"binary_name": "linux-tools-6.2.0-1014-gcp"
}
],
"availability": "No subscription required"
}{
"ecosystem": "Ubuntu:22.04:LTS",
"cves": [
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "high",
"type": "Ubuntu"
}
],
"id": "CVE-2023-4128"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "high",
"type": "Ubuntu"
}
],
"id": "CVE-2023-4569"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
},
{
"score": "high",
"type": "Ubuntu"
}
],
"id": "CVE-2023-20588"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "high",
"type": "Ubuntu"
}
],
"id": "CVE-2023-21264"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "high",
"type": "Ubuntu"
}
],
"id": "CVE-2023-40283"
}
]
}
{
"binaries": [
{
"binary_version": "6.2.0-33.33~22.04.1",
"binary_name": "linux-buildinfo-6.2.0-33-generic"
},
{
"binary_version": "6.2.0-33.33~22.04.1",
"binary_name": "linux-buildinfo-6.2.0-33-generic-64k"
},
{
"binary_version": "6.2.0-33.33~22.04.1",
"binary_name": "linux-buildinfo-6.2.0-33-generic-lpae"
},
{
"binary_version": "6.2.0-33.33~22.04.1",
"binary_name": "linux-cloud-tools-6.2.0-33-generic"
},
{
"binary_version": "6.2.0-33.33~22.04.1",
"binary_name": "linux-headers-6.2.0-33-generic"
},
{
"binary_version": "6.2.0-33.33~22.04.1",
"binary_name": "linux-headers-6.2.0-33-generic-64k"
},
{
"binary_version": "6.2.0-33.33~22.04.1",
"binary_name": "linux-headers-6.2.0-33-generic-lpae"
},
{
"binary_version": "6.2.0-33.33~22.04.1",
"binary_name": "linux-hwe-6.2-cloud-tools-6.2.0-33"
},
{
"binary_version": "6.2.0-33.33~22.04.1",
"binary_name": "linux-hwe-6.2-cloud-tools-common"
},
{
"binary_version": "6.2.0-33.33~22.04.1",
"binary_name": "linux-hwe-6.2-headers-6.2.0-33"
},
{
"binary_version": "6.2.0-33.33~22.04.1",
"binary_name": "linux-hwe-6.2-tools-6.2.0-33"
},
{
"binary_version": "6.2.0-33.33~22.04.1",
"binary_name": "linux-hwe-6.2-tools-common"
},
{
"binary_version": "6.2.0-33.33~22.04.1",
"binary_name": "linux-hwe-6.2-tools-host"
},
{
"binary_version": "6.2.0-33.33~22.04.1",
"binary_name": "linux-image-6.2.0-33-generic"
},
{
"binary_version": "6.2.0-33.33~22.04.1",
"binary_name": "linux-image-6.2.0-33-generic-lpae"
},
{
"binary_version": "6.2.0-33.33~22.04.1",
"binary_name": "linux-image-unsigned-6.2.0-33-generic"
},
{
"binary_version": "6.2.0-33.33~22.04.1",
"binary_name": "linux-image-unsigned-6.2.0-33-generic-64k"
},
{
"binary_version": "6.2.0-33.33~22.04.1",
"binary_name": "linux-modules-6.2.0-33-generic"
},
{
"binary_version": "6.2.0-33.33~22.04.1",
"binary_name": "linux-modules-6.2.0-33-generic-64k"
},
{
"binary_version": "6.2.0-33.33~22.04.1",
"binary_name": "linux-modules-6.2.0-33-generic-lpae"
},
{
"binary_version": "6.2.0-33.33~22.04.1",
"binary_name": "linux-modules-extra-6.2.0-33-generic"
},
{
"binary_version": "6.2.0-33.33~22.04.1",
"binary_name": "linux-modules-ipu6-6.2.0-33-generic"
},
{
"binary_version": "6.2.0-33.33~22.04.1",
"binary_name": "linux-modules-ivsc-6.2.0-33-generic"
},
{
"binary_version": "6.2.0-33.33~22.04.1",
"binary_name": "linux-modules-iwlwifi-6.2.0-33-generic"
},
{
"binary_version": "6.2.0-33.33~22.04.1",
"binary_name": "linux-source-6.2.0"
},
{
"binary_version": "6.2.0-33.33~22.04.1",
"binary_name": "linux-tools-6.2.0-33-generic"
},
{
"binary_version": "6.2.0-33.33~22.04.1",
"binary_name": "linux-tools-6.2.0-33-generic-64k"
},
{
"binary_version": "6.2.0-33.33~22.04.1",
"binary_name": "linux-tools-6.2.0-33-generic-lpae"
}
],
"availability": "No subscription required"
}{
"ecosystem": "Ubuntu:22.04:LTS",
"cves": [
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "high",
"type": "Ubuntu"
}
],
"id": "CVE-2023-4128"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "high",
"type": "Ubuntu"
}
],
"id": "CVE-2023-4569"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
},
{
"score": "high",
"type": "Ubuntu"
}
],
"id": "CVE-2023-20588"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "high",
"type": "Ubuntu"
}
],
"id": "CVE-2023-21264"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "high",
"type": "Ubuntu"
}
],
"id": "CVE-2023-40283"
}
]
}
{
"binaries": [
{
"binary_version": "6.2.0-1013.13~22.04.1",
"binary_name": "linux-buildinfo-6.2.0-1013-lowlatency"
},
{
"binary_version": "6.2.0-1013.13~22.04.1",
"binary_name": "linux-buildinfo-6.2.0-1013-lowlatency-64k"
},
{
"binary_version": "6.2.0-1013.13~22.04.1",
"binary_name": "linux-cloud-tools-6.2.0-1013-lowlatency"
},
{
"binary_version": "6.2.0-1013.13~22.04.1",
"binary_name": "linux-headers-6.2.0-1013-lowlatency"
},
{
"binary_version": "6.2.0-1013.13~22.04.1",
"binary_name": "linux-headers-6.2.0-1013-lowlatency-64k"
},
{
"binary_version": "6.2.0-1013.13~22.04.1",
"binary_name": "linux-image-unsigned-6.2.0-1013-lowlatency"
},
{
"binary_version": "6.2.0-1013.13~22.04.1",
"binary_name": "linux-image-unsigned-6.2.0-1013-lowlatency-64k"
},
{
"binary_version": "6.2.0-1013.13~22.04.1",
"binary_name": "linux-lowlatency-hwe-6.2-cloud-tools-6.2.0-1013"
},
{
"binary_version": "6.2.0-1013.13~22.04.1",
"binary_name": "linux-lowlatency-hwe-6.2-cloud-tools-common"
},
{
"binary_version": "6.2.0-1013.13~22.04.1",
"binary_name": "linux-lowlatency-hwe-6.2-headers-6.2.0-1013"
},
{
"binary_version": "6.2.0-1013.13~22.04.1",
"binary_name": "linux-lowlatency-hwe-6.2-tools-6.2.0-1013"
},
{
"binary_version": "6.2.0-1013.13~22.04.1",
"binary_name": "linux-lowlatency-hwe-6.2-tools-common"
},
{
"binary_version": "6.2.0-1013.13~22.04.1",
"binary_name": "linux-lowlatency-hwe-6.2-tools-host"
},
{
"binary_version": "6.2.0-1013.13~22.04.1",
"binary_name": "linux-modules-6.2.0-1013-lowlatency"
},
{
"binary_version": "6.2.0-1013.13~22.04.1",
"binary_name": "linux-modules-6.2.0-1013-lowlatency-64k"
},
{
"binary_version": "6.2.0-1013.13~22.04.1",
"binary_name": "linux-modules-ipu6-6.2.0-1013-lowlatency"
},
{
"binary_version": "6.2.0-1013.13~22.04.1",
"binary_name": "linux-modules-ivsc-6.2.0-1013-lowlatency"
},
{
"binary_version": "6.2.0-1013.13~22.04.1",
"binary_name": "linux-modules-iwlwifi-6.2.0-1013-lowlatency"
},
{
"binary_version": "6.2.0-1013.13~22.04.1",
"binary_name": "linux-tools-6.2.0-1013-lowlatency"
},
{
"binary_version": "6.2.0-1013.13~22.04.1",
"binary_name": "linux-tools-6.2.0-1013-lowlatency-64k"
}
],
"availability": "No subscription required"
}{
"ecosystem": "Ubuntu:22.04:LTS",
"cves": [
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "high",
"type": "Ubuntu"
}
],
"id": "CVE-2023-4128"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "high",
"type": "Ubuntu"
}
],
"id": "CVE-2023-4569"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
},
{
"score": "high",
"type": "Ubuntu"
}
],
"id": "CVE-2023-20588"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "high",
"type": "Ubuntu"
}
],
"id": "CVE-2023-21264"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "high",
"type": "Ubuntu"
}
],
"id": "CVE-2023-40283"
}
]
}