First published: Tue Jul 25 2023(Updated: )
Stonejiajia, Shir Tamari and Sagi Tzadik discovered that the OverlayFS implementation in the Ubuntu Linux kernel did not properly perform permission checks in certain situations. A local attacker could possibly use this to gain elevated privileges. (CVE-2023-2640) It was discovered that the IP-VLAN network driver for the Linux kernel did not properly initialize memory in some situations, leading to an out-of- bounds write vulnerability. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-3090) Mingi Cho discovered that the netfilter subsystem in the Linux kernel did not properly validate the status of a nft chain while performing a lookup by id, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-31248) Shir Tamari and Sagi Tzadik discovered that the OverlayFS implementation in the Ubuntu Linux kernel did not properly perform permission checks in certain situations. A local attacker could possibly use this to gain elevated privileges. (CVE-2023-32629) Ruihan Li discovered that the memory management subsystem in the Linux kernel contained a race condition when accessing VMAs in certain conditions, leading to a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2023-3269) Querijn Voet discovered that a race condition existed in the io_uring subsystem in the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-3389) It was discovered that the netfilter subsystem in the Linux kernel did not properly handle some error conditions, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-3390) Tanguy Dubroca discovered that the netfilter subsystem in the Linux kernel did not properly handle certain pointer data type, leading to an out-of- bounds write vulnerability. A privileged attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-35001)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-6.2.0-1010-gcp | <6.2.0-1010.10 | 6.2.0-1010.10 |
=23.04 | ||
All of | ||
ubuntu/linux-image-aws | <6.2.0.1008.9 | 6.2.0.1008.9 |
=23.04 | ||
All of | ||
ubuntu/linux-image-6.2.0-26-generic-64k | <6.2.0-26.26 | 6.2.0-26.26 |
=23.04 | ||
All of | ||
ubuntu/linux-image-virtual | <6.2.0.26.26 | 6.2.0.26.26 |
=23.04 | ||
All of | ||
ubuntu/linux-image-6.2.0-1008-azure | <6.2.0-1008.8 | 6.2.0-1008.8 |
=23.04 | ||
All of | ||
ubuntu/linux-image-generic-64k | <6.2.0.26.26 | 6.2.0.26.26 |
=23.04 | ||
All of | ||
ubuntu/linux-image-generic | <6.2.0.26.26 | 6.2.0.26.26 |
=23.04 | ||
All of | ||
ubuntu/linux-image-6.2.0-1008-oracle | <6.2.0-1008.8 | 6.2.0-1008.8 |
=23.04 | ||
All of | ||
ubuntu/linux-image-raspi | <6.2.0.1009.12 | 6.2.0.1009.12 |
=23.04 | ||
All of | ||
ubuntu/linux-image-6.2.0-1009-lowlatency | <6.2.0-1009.9 | 6.2.0-1009.9 |
=23.04 | ||
All of | ||
ubuntu/linux-image-ibm | <6.2.0.1006.6 | 6.2.0.1006.6 |
=23.04 | ||
All of | ||
ubuntu/linux-image-6.2.0-26-generic | <6.2.0-26.26 | 6.2.0-26.26 |
=23.04 | ||
All of | ||
ubuntu/linux-image-azure | <6.2.0.1008.8 | 6.2.0.1008.8 |
=23.04 | ||
All of | ||
ubuntu/linux-image-raspi-nolpae | <6.2.0.1009.12 | 6.2.0.1009.12 |
=23.04 | ||
All of | ||
ubuntu/linux-image-6.2.0-26-generic-lpae | <6.2.0-26.26 | 6.2.0-26.26 |
=23.04 | ||
All of | ||
ubuntu/linux-image-kvm | <6.2.0.1009.9 | 6.2.0.1009.9 |
=23.04 | ||
All of | ||
ubuntu/linux-image-6.2.0-1009-lowlatency-64k | <6.2.0-1009.9 | 6.2.0-1009.9 |
=23.04 | ||
All of | ||
ubuntu/linux-image-gcp | <6.2.0.1010.10 | 6.2.0.1010.10 |
=23.04 | ||
All of | ||
ubuntu/linux-image-lowlatency-64k | <6.2.0.1009.9 | 6.2.0.1009.9 |
=23.04 | ||
All of | ||
ubuntu/linux-image-oracle | <6.2.0.1008.8 | 6.2.0.1008.8 |
=23.04 | ||
All of | ||
ubuntu/linux-image-6.2.0-1009-kvm | <6.2.0-1009.9 | 6.2.0-1009.9 |
=23.04 | ||
All of | ||
ubuntu/linux-image-6.2.0-1009-raspi | <6.2.0-1009.11 | 6.2.0-1009.11 |
=23.04 | ||
All of | ||
ubuntu/linux-image-6.2.0-1006-ibm | <6.2.0-1006.6 | 6.2.0-1006.6 |
=23.04 | ||
All of | ||
ubuntu/linux-image-generic-lpae | <6.2.0.26.26 | 6.2.0.26.26 |
=23.04 | ||
All of | ||
ubuntu/linux-image-6.2.0-1008-aws | <6.2.0-1008.8 | 6.2.0-1008.8 |
=23.04 | ||
All of | ||
ubuntu/linux-image-lowlatency | <6.2.0.1009.9 | 6.2.0.1009.9 |
=23.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The vulnerability ID for this advisory is CVE-2023-2640.
The severity of CVE-2023-2640 is not provided in the advisory.
The affected software for CVE-2023-2640 is Ubuntu kernel version 6.2.0-1010.10 running on Ubuntu 23.04.
A local attacker can exploit CVE-2023-2640 by using certain situations in the OverlayFS implementation to gain elevated privileges.
You can find more information about CVE-2023-2640 at the Ubuntu Security website.