First published: Thu Jul 27 2023(Updated: )
It was discovered that LLVM Toolchain did not properly manage memory under certain circumstances. If a user were tricked into opening a specially crafted MLIR file, an attacker could possibly use this issue to cause LLVM Toolchain to crash, resulting in a denial of service. (CVE-2023-29932, CVE-2023-29934, CVE-2023-29939) It was discovered that LLVM Toolchain did not properly manage memory under certain circumstances. If a user were tricked into opening a specially crafted MLIR file, an attacker could possibly use this issue to cause LLVM Toolchain to crash, resulting in a denial of service. This issue only affected llvm-toolchain-15. (CVE-2023-29933)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/mlir-15-tools | <1:15.0.7-3ubuntu0.23.04.1 | 1:15.0.7-3ubuntu0.23.04.1 |
Ubuntu | =23.04 | |
All of | ||
ubuntu/llvm-14-tools | <1:14.0.6-12ubuntu0.23.04.1 | 1:14.0.6-12ubuntu0.23.04.1 |
Ubuntu | =23.04 | |
All of | ||
ubuntu/mlir-13-tools | <1:13.0.1-11ubuntu14.1 | 1:13.0.1-11ubuntu14.1 |
Ubuntu | =23.04 | |
All of | ||
ubuntu/llvm-14 | <1:14.0.6-12ubuntu0.23.04.1 | 1:14.0.6-12ubuntu0.23.04.1 |
Ubuntu | =23.04 | |
All of | ||
ubuntu/llvm-15 | <1:15.0.7-3ubuntu0.23.04.1 | 1:15.0.7-3ubuntu0.23.04.1 |
Ubuntu | =23.04 | |
All of | ||
ubuntu/llvm-13 | <1:13.0.1-11ubuntu14.1 | 1:13.0.1-11ubuntu14.1 |
Ubuntu | =23.04 | |
All of | ||
ubuntu/mlir-14-tools | <1:14.0.6-12ubuntu0.23.04.1 | 1:14.0.6-12ubuntu0.23.04.1 |
Ubuntu | =23.04 | |
All of | ||
ubuntu/llvm-15-tools | <1:15.0.7-3ubuntu0.23.04.1 | 1:15.0.7-3ubuntu0.23.04.1 |
Ubuntu | =23.04 | |
All of | ||
ubuntu/llvm-13-tools | <1:13.0.1-11ubuntu14.1 | 1:13.0.1-11ubuntu14.1 |
Ubuntu | =23.04 | |
All of | ||
ubuntu/mlir-15-tools | <1:15.0.7-0ubuntu0.22.04.3 | 1:15.0.7-0ubuntu0.22.04.3 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/llvm-14-tools | <1:14.0.0-1ubuntu1.1 | 1:14.0.0-1ubuntu1.1 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/mlir-13-tools | <1:13.0.1-2ubuntu2.2 | 1:13.0.1-2ubuntu2.2 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/llvm-14 | <1:14.0.0-1ubuntu1.1 | 1:14.0.0-1ubuntu1.1 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/llvm-15 | <1:15.0.7-0ubuntu0.22.04.3 | 1:15.0.7-0ubuntu0.22.04.3 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/llvm-13 | <1:13.0.1-2ubuntu2.2 | 1:13.0.1-2ubuntu2.2 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/mlir-14-tools | <1:14.0.0-1ubuntu1.1 | 1:14.0.0-1ubuntu1.1 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/llvm-15-tools | <1:15.0.7-0ubuntu0.22.04.3 | 1:15.0.7-0ubuntu0.22.04.3 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/llvm-13-tools | <1:13.0.1-2ubuntu2.2 | 1:13.0.1-2ubuntu2.2 |
Ubuntu | =22.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
USN-6258-1 is categorized as a denial of service vulnerability due to improper memory management in the LLVM Toolchain.
To fix USN-6258-1, update the affected packages to the recommended versions provided in the Ubuntu advisory.
USN-6258-1 affects specific versions of LLVM and MLIR tools on Ubuntu 22.04 and 23.04.
Yes, USN-6258-1 could be exploited if a user opens a specially crafted MLIR file.
Yes, it is recommended to address USN-6258-1 to prevent potential denial of service attacks.