First published: Thu Jul 06 2023(Updated: )
Hangyu Hua discovered that the Flower classifier implementation in the Linux kernel contained an out-of-bounds write vulnerability. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-35788, LP: #2023577) It was discovered that for some Intel processors the INVLPG instruction implementation did not properly flush global TLB entries when PCIDs are enabled. An attacker could use this to expose sensitive information (kernel memory) or possibly cause undesired behaviors. (LP: #2023220)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-gke | <5.4.0.1103.108 | 5.4.0.1103.108 |
=20.04 | ||
All of | ||
ubuntu/linux-image-gke-5.4 | <5.4.0.1103.108 | 5.4.0.1103.108 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-1103-gke | <5.4.0-1103.110 | 5.4.0-1103.110 |
=20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of USN-6205-1 is CVE-2023-35788.
The vulnerability in USN-6205-1 can cause a denial of service (system crash) or possibly execute arbitrary code.
An attacker can exploit the vulnerability in USN-6205-1 by exploiting the out-of-bounds write vulnerability in the Flower classifier implementation in the Linux kernel.
The affected software versions for USN-6205-1 are Linux kernel versions 5.4.0.1103.108 and 5.4.0-1103.110.
To fix the vulnerability in USN-6205-1, update your Linux kernel to version 5.4.0.1103.108 or 5.4.0-1103.110.