USN-6573-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-6573-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6573-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-6573-1
Related
Published
2024-01-09T18:30:25.533244Z
Modified
2024-01-09T18:30:25.533244Z
Summary
linux-azure vulnerabilities
Details

Lucas Leong discovered that the netfilter subsystem in the Linux kernel did not properly validate some attributes passed from userspace. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information (kernel memory). (CVE-2023-39189)

Kyle Zeng discovered that the IPv4 implementation in the Linux kernel did not properly handle socket buffers (skb) when performing IP routing in certain circumstances, leading to a null pointer dereference vulnerability. A privileged attacker could use this to cause a denial of service (system crash). (CVE-2023-42754)

Yikebaer Aizezi discovered that the ext4 file system implementation in the Linux kernel contained a use-after-free vulnerability when handling inode extent metadata. An attacker could use this to construct a malicious ext4 file system image that, when mounted, could cause a denial of service (system crash). (CVE-2023-45898)

Jason Wang discovered that the virtio ring implementation in the Linux kernel did not properly handle iov buffers in some situations. A local attacker in a guest VM could use this to cause a denial of service (host system crash). (CVE-2023-5158)

Alon Zahavi discovered that the NVMe-oF/TCP subsystem in the Linux kernel did not properly handle queue initialization failures in certain situations, leading to a use-after-free vulnerability. A remote attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-5178)

Budimir Markovic discovered that the perf subsystem in the Linux kernel did not properly handle event groups, leading to an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-5717)

References

Affected packages

Ubuntu:23.10 / linux-azure

Package

Name
linux-azure
Purl
pkg:deb/ubuntu/linux-azure@6.5.0-1010.10?arch=src?distro=mantic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.5.0-1010.10

Affected versions

6.*

6.2.0-1003.3
6.2.0-1004.4
6.5.0-1004.4
6.5.0-1006.6
6.5.0-1007.7
6.5.0-1008.8
6.5.0-1009.9

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "linux-tools-6.5.0-1010-azure": "6.5.0-1010.10",
            "linux-cloud-tools-6.5.0-1010-azure": "6.5.0-1010.10",
            "linux-modules-iwlwifi-6.5.0-1010-azure": "6.5.0-1010.10",
            "linux-azure-tools-6.5.0-1010": "6.5.0-1010.10",
            "linux-headers-6.5.0-1010-azure": "6.5.0-1010.10",
            "linux-azure-cloud-tools-6.5.0-1010": "6.5.0-1010.10",
            "linux-image-unsigned-6.5.0-1010-azure": "6.5.0-1010.10",
            "linux-modules-extra-6.5.0-1010-azure": "6.5.0-1010.10",
            "linux-image-unsigned-6.5.0-1010-azure-dbgsym": "6.5.0-1010.10",
            "linux-azure-headers-6.5.0-1010": "6.5.0-1010.10",
            "linux-modules-6.5.0-1010-azure": "6.5.0-1010.10",
            "linux-buildinfo-6.5.0-1010-azure": "6.5.0-1010.10"
        }
    ]
}