First published: Mon Nov 27 2023(Updated: )
Ivan D Barrera, Christopher Bednarz, Mustafa Ismail, and Shiraz Saleem discovered that the InfiniBand RDMA driver in the Linux kernel did not properly check for zero-length STAG or MR registration. A remote attacker could possibly use this to execute arbitrary code. (CVE-2023-25775) Yu Hao discovered that the UBI driver in the Linux kernel did not properly check for MTD with zero erasesize during device attachment. A local privileged attacker could use this to cause a denial of service (system crash). (CVE-2023-31085) Manfred Rudigier discovered that the Intel(R) PCI-Express Gigabit (igb) Ethernet driver in the Linux kernel did not properly validate received frames that are larger than the set MTU size, leading to a buffer overflow vulnerability. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-45871) Maxim Levitsky discovered that the KVM nested virtualization (SVM) implementation for AMD processors in the Linux kernel did not properly handle x2AVIC MSRs. An attacker in a guest VM could use this to cause a denial of service (host kernel crash). (CVE-2023-5090) It was discovered that the SMB network file sharing protocol implementation in the Linux kernel did not properly handle certain error conditions, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-5345)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-6.2.0-1016-oracle | <6.2.0-1016.17 | 6.2.0-1016.17 |
=23.04 | ||
All of | ||
ubuntu/linux-image-oracle | <6.2.0.1016.16 | 6.2.0.1016.16 |
=23.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-6502-2 is not specified in the given information.
A remote attacker can exploit the vulnerability by using the InfiniBand RDMA driver in the Linux kernel to execute arbitrary code.
The versions of Linux kernel affected by this vulnerability are Ubuntu 23.04 with linux-image-6.2.0-1016-oracle (version up to 6.2.0-1016.17) and Ubuntu 23.04 with linux-image-oracle (version up to 6.2.0.1016.16).
To fix the USN-6502-2 vulnerability, update the affected Linux kernel packages to the specified remedy versions: linux-image-6.2.0-1016-oracle (6.2.0-1016.17) and linux-image-oracle (6.2.0.1016.16).
More information about the USN-6502-2 vulnerability can be found at the following references: [CVE-2023-25775](https://ubuntu.com/security/CVE-2023-25775), [CVE-2023-5090](https://ubuntu.com/security/CVE-2023-5090), [CVE-2023-5345](https://ubuntu.com/security/CVE-2023-5345).