First published: Wed Apr 26 2023(Updated: )
It was discovered that the Traffic-Control Index (TCINDEX) implementation in the Linux kernel did not properly perform filter deactivation in some situations. A local attacker could possibly use this to gain elevated privileges. Please note that with the fix for this CVE, kernel support for the TCINDEX classifier has been removed. (CVE-2023-1829) Gwnaun Jung discovered that the SFB packet scheduling implementation in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-3586) Zheng Wang and Zhuorao Yang discovered that the RealTek RTL8712U wireless driver in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-4095) It was discovered that the TIPC protocol implementation in the Linux kernel did not properly validate the queue of socket buffers (skb) when handling certain UDP packets. A remote attacker could use this to cause a denial of service. (CVE-2023-1390) It was discovered that the Xircom PCMCIA network device driver in the Linux kernel did not properly handle device removal events. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2023-1670)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-virtual | <4.4.0.240.246 | 4.4.0.240.246 |
=16.04 | ||
All of | ||
ubuntu/linux-image-generic | <4.4.0.240.246 | 4.4.0.240.246 |
=16.04 | ||
All of | ||
ubuntu/linux-image-lowlatency-lts-xenial | <4.4.0.240.246 | 4.4.0.240.246 |
=16.04 | ||
All of | ||
ubuntu/linux-image-aws | <4.4.0.1156.160 | 4.4.0.1156.160 |
=16.04 | ||
All of | ||
ubuntu/linux-image-4.4.0-240-lowlatency | <4.4.0-240.274 | 4.4.0-240.274 |
=16.04 | ||
All of | ||
ubuntu/linux-image-virtual-lts-xenial | <4.4.0.240.246 | 4.4.0.240.246 |
=16.04 | ||
All of | ||
ubuntu/linux-image-4.4.0-1156-aws | <4.4.0-1156.171 | 4.4.0-1156.171 |
=16.04 | ||
All of | ||
ubuntu/linux-image-generic-lts-xenial | <4.4.0.240.246 | 4.4.0.240.246 |
=16.04 | ||
All of | ||
ubuntu/linux-image-4.4.0-240-generic | <4.4.0-240.274 | 4.4.0-240.274 |
=16.04 | ||
All of | ||
ubuntu/linux-image-kvm | <4.4.0.1119.116 | 4.4.0.1119.116 |
=16.04 | ||
All of | ||
ubuntu/linux-image-4.4.0-1119-kvm | <4.4.0-1119.129 | 4.4.0-1119.129 |
=16.04 | ||
All of | ||
ubuntu/linux-image-lowlatency | <4.4.0.240.246 | 4.4.0.240.246 |
=16.04 | ||
All of | ||
ubuntu/linux-image-virtual-lts-xenial | <4.4.0.240.208 | 4.4.0.240.208 |
=14.04 | ||
All of | ||
ubuntu/linux-image-generic-lts-xenial | <4.4.0.240.208 | 4.4.0.240.208 |
=14.04 | ||
All of | ||
ubuntu/linux-image-aws | <4.4.0.1118.115 | 4.4.0.1118.115 |
=14.04 | ||
All of | ||
ubuntu/linux-image-4.4.0-240-generic | <4.4.0-240.274~14.04.1 | 4.4.0-240.274~14.04.1 |
=14.04 | ||
All of | ||
ubuntu/linux-image-4.4.0-240-lowlatency | <4.4.0-240.274~14.04.1 | 4.4.0-240.274~14.04.1 |
=14.04 | ||
All of | ||
ubuntu/linux-image-4.4.0-1118-aws | <4.4.0-1118.124 | 4.4.0-1118.124 |
=14.04 | ||
All of | ||
ubuntu/linux-image-lowlatency-lts-xenial | <4.4.0.240.208 | 4.4.0.240.208 |
=14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-6045-1 is high.
The Traffic-Control Index (TCINDEX) vulnerability allows a local attacker to gain elevated privileges.
Ubuntu 16.04 and 14.04 are affected by USN-6045-1.
The remedy for USN-6045-1 is to update the Linux kernel to version 4.4.0.240.246 (exact version may vary).
You can find more information about USN-6045-1 on the Ubuntu Security Advisory website.