First published: Tue May 30 2023(Updated: )
Patryk Sondej and Piotr Krysiuk discovered that a race condition existed in the netfilter subsystem of the Linux kernel when processing batch requests, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-32233) Reima Ishii discovered that the nested KVM implementation for Intel x86 processors in the Linux kernel did not properly validate control registers in certain situations. An attacker in a guest VM could use this to cause a denial of service (guest crash). (CVE-2023-30456) Gwnaun Jung discovered that the SFB packet scheduling implementation in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-3586) It was discovered that the Intel i915 graphics driver in the Linux kernel did not perform a GPU TLB flush in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2022-4139) It was discovered that the Xircom PCMCIA network device driver in the Linux kernel did not properly handle device removal events. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2023-1670) Jean-Baptiste Cayrou discovered that the shiftfs file system in the Ubuntu Linux kernel contained a race condition when handling inode locking in some situations. A local attacker could use this to cause a denial of service (kernel deadlock). (CVE-2023-2612)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-oem-22.04 | <5.17.0.1032.30 | 5.17.0.1032.30 |
=22.04 | ||
All of | ||
ubuntu/linux-image-oem-22.04a | <5.17.0.1032.30 | 5.17.0.1032.30 |
=22.04 | ||
All of | ||
ubuntu/linux-image-5.17.0-1032-oem | <5.17.0-1032.33 | 5.17.0-1032.33 |
=22.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The CVE IDs associated with this vulnerability are CVE-2023-30456, CVE-2023-32233, and CVE-2023-2612.
The vulnerability occurs due to a race condition in the netfilter subsystem of the Linux kernel when processing batch requests, leading to a use-after-free vulnerability.
A local attacker could exploit this vulnerability to cause a denial of service (system crash) or possibly execute arbitrary code.
The vulnerability affects Linux kernel versions 5.17.0.1032.30 and 5.17.0-1032.33 in the Ubuntu 22.04 OEM image.
To fix this vulnerability, update your system to the Linux kernel version 5.17.0.1032.30 or 5.17.0-1032.33 (or later) available for Ubuntu 22.04.