First published: Mon Oct 30 2023(Updated: )
It was discovered that the IPv6 implementation in the Linux kernel contained a high rate of hash collisions in connection lookup table. A remote attacker could use this to cause a denial of service (excessive CPU consumption). (CVE-2023-1206) It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux kernel did not properly perform data buffer size validation in some situations. A physically proximate attacker could use this to craft a malicious USB device that when inserted, could cause a denial of service (system crash) or possibly expose sensitive information. (CVE-2023-1380) Gwangun Jung discovered that the Quick Fair Queueing scheduler implementation in the Linux kernel contained an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-31436) Tanguy Dubroca discovered that the netfilter subsystem in the Linux kernel did not properly handle certain pointer data type, leading to an out-of- bounds write vulnerability. A privileged attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-35001) Kyle Zeng discovered that the networking stack implementation in the Linux kernel did not properly validate skb object size in certain conditions. An attacker could use this cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-42752) Kyle Zeng discovered that the IPv4 Resource Reservation Protocol (RSVP) classifier implementation in the Linux kernel contained an out-of-bounds read vulnerability. A local attacker could use this to cause a denial of service (system crash). Please note that kernel packet classifier support for RSVP has been removed to resolve this vulnerability. (CVE-2023-42755) Budimir Markovic discovered that the qdisc implementation in the Linux kernel did not properly validate inner classes, leading to a use-after-free vulnerability. A local user could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-4623)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-3.13.0-194-generic | <3.13.0-194.245 | 3.13.0-194.245 |
=14.04 | ||
All of | ||
ubuntu/linux-image-3.13.0-194-lowlatency | <3.13.0-194.245 | 3.13.0-194.245 |
=14.04 | ||
All of | ||
ubuntu/linux-image-generic | <3.13.0.194.204 | 3.13.0.194.204 |
=14.04 | ||
All of | ||
ubuntu/linux-image-generic-lts-trusty | <3.13.0.194.204 | 3.13.0.194.204 |
=14.04 | ||
All of | ||
ubuntu/linux-image-lowlatency | <3.13.0.194.204 | 3.13.0.194.204 |
=14.04 | ||
All of | ||
ubuntu/linux-image-server | <3.13.0.194.204 | 3.13.0.194.204 |
=14.04 | ||
All of | ||
ubuntu/linux-image-virtual | <3.13.0.194.204 | 3.13.0.194.204 |
=14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The vulnerability ID for Linux kernel vulnerabilities is USN-6460-1.
The severity of USN-6460-1 is not specified.
The affected software for USN-6460-1 is Ubuntu 14.04 with Linux kernel version 3.13.0-194.245.
To fix USN-6460-1, update the Linux kernel to version 3.13.0-194.245 or later.
You can find more information about USN-6460-1 on the Ubuntu security website.