First published: Fri Sep 08 2023(Updated: )
Tavis Ormandy discovered that some AMD processors did not properly handle speculative execution of certain vector register instructions. A local attacker could use this to expose sensitive information. (CVE-2023-20593) Zheng Zhang discovered that the device-mapper implementation in the Linux kernel did not properly handle locking during table_clear() operations. A local attacker could use this to cause a denial of service (kernel deadlock). (CVE-2023-2269) It was discovered that a use-after-free vulnerability existed in the HFS+ file system implementation in the Linux kernel. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2023-2985) It was discovered that the DVB Core driver in the Linux kernel did not properly handle locking events in certain situations. A local attacker could use this to cause a denial of service (kernel deadlock). (CVE-2023-31084) It was discovered that the Quick Fair Queueing network scheduler implementation in the Linux kernel contained an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-3611) It was discovered that the network packet classifier with netfilter/firewall marks implementation in the Linux kernel did not properly handle reference counting, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-3776)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-4.15.0-1169-azure | <4.15.0-1169.184 | 4.15.0-1169.184 |
=18.04 | ||
All of | ||
ubuntu/linux-image-azure-lts-18.04 | <4.15.0.1169.137 | 4.15.0.1169.137 |
=18.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-1169-azure | <4.15.0-1169.184~16.04.1 | 4.15.0-1169.184~16.04.1 |
=16.04 | ||
All of | ||
ubuntu/linux-image-azure | <4.15.0.1169.153 | 4.15.0.1169.153 |
=16.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-1169-azure | <4.15.0-1169.184~14.04.1 | 4.15.0-1169.184~14.04.1 |
=14.04 | ||
All of | ||
ubuntu/linux-image-azure | <4.15.0.1169.135 | 4.15.0.1169.135 |
=14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-6342-2 is high.
A local attacker can exploit the vulnerability in USN-6342-2 to expose sensitive information.
Some AMD processors are affected by the vulnerability in USN-6342-2.
The recommended remedy for the vulnerability in USN-6342-2 on Ubuntu 18.04 is to update to linux-image-4.15.0-1169-azure version 4.15.0-1169.184.
You can find more information about the vulnerability in USN-6342-2 on the Ubuntu Security Notices website.