First published: Thu Jun 08 2023(Updated: )
It was discovered that the System V IPC implementation in the Linux kernel did not properly handle large shared memory counts. A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2021-3669) It was discovered that the KVM VMX implementation in the Linux kernel did not properly handle indirect branch prediction isolation between L1 and L2 VMs. An attacker in a guest VM could use this to expose sensitive information from the host OS or other guest VMs. (CVE-2022-2196) Gerald Lee discovered that the USB Gadget file system implementation in the Linux kernel contained a race condition, leading to a use-after-free vulnerability in some situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-4382) It was discovered that the RNDIS USB driver in the Linux kernel contained an integer overflow vulnerability. A local attacker with physical access could plug in a malicious USB device to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-23559)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-5.4.0-1023-xilinx-zynqmp | <5.4.0-1023.27 | 5.4.0-1023.27 |
Ubuntu Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-6151-1 is not specified in the information provided.
USN-6151-1 addresses the following vulnerabilities: CVE-2021-3669, CVE-2023-23559, CVE-2022-4382, CVE-2022-2196.
CVE-2021-3669 allows a local attacker to cause a denial of service (memory exhaustion) by exploiting a vulnerability in the System V IPC implementation.
To fix these vulnerabilities, update to version 5.4.0-1023.27 of the linux-image-5.4.0-1023-xilinx-zynqmp package.
Yes, you can find more information about these vulnerabilities at the following references: [link1], [link2], [link3].