First published: Thu Oct 19 2023(Updated: )
Kyle Zeng discovered that the networking stack implementation in the Linux kernel did not properly validate skb object size in certain conditions. An attacker could use this cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-42752) Kyle Zeng discovered that the IPv4 Resource Reservation Protocol (RSVP) classifier implementation in the Linux kernel contained an out-of-bounds read vulnerability. A local attacker could use this to cause a denial of service (system crash). Please note that kernel packet classifier support for RSVP has been removed to resolve this vulnerability. (CVE-2023-42755) Kyle Zeng discovered that the netfilter subsystem in the Linux kernel contained a race condition in IP set operations in certain situations. A local attacker could use this to cause a denial of service (system crash). (CVE-2023-42756) Alex Birnberg discovered that the netfilter subsystem in the Linux kernel did not properly validate register length, leading to an out-of- bounds write vulnerability. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2023-4881) Kevin Rich discovered that the netfilter subsystem in the Linux kernel did not properly handle removal of rules from chain bindings in certain circumstances, leading to a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2023-5197)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-6.1.0-1024-oem | <6.1.0-1024.24 | 6.1.0-1024.24 |
Ubuntu Ubuntu | =22.04 | |
All of | ||
ubuntu/linux-image-oem-22.04 | <6.1.0.1024.25 | 6.1.0.1024.25 |
Ubuntu Ubuntu | =22.04 | |
All of | ||
ubuntu/linux-image-oem-22.04a | <6.1.0.1024.25 | 6.1.0.1024.25 |
Ubuntu Ubuntu | =22.04 | |
All of | ||
ubuntu/linux-image-oem-22.04c | <6.1.0.1024.25 | 6.1.0.1024.25 |
Ubuntu Ubuntu | =22.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The vulnerability ID of this advisory is USN-6443-1.
The vulnerability described in this advisory is a Linux kernel (OEM) vulnerabilities.
The severity of the vulnerability is not specified in the provided information.
This vulnerability can be exploited by a local user to cause a denial of service (system crash) or possibly execute arbitrary code.
To fix this vulnerability, you should update the affected software to the specified version or apply the recommended fix provided by the software vendor.