First published: Tue Nov 28 2023(Updated: )
Ivan D Barrera, Christopher Bednarz, Mustafa Ismail, and Shiraz Saleem discovered that the InfiniBand RDMA driver in the Linux kernel did not properly check for zero-length STAG or MR registration. A remote attacker could possibly use this to execute arbitrary code. (CVE-2023-25775) Yu Hao discovered that the UBI driver in the Linux kernel did not properly check for MTD with zero erasesize during device attachment. A local privileged attacker could use this to cause a denial of service (system crash). (CVE-2023-31085) Manfred Rudigier discovered that the Intel(R) PCI-Express Gigabit (igb) Ethernet driver in the Linux kernel did not properly validate received frames that are larger than the set MTU size, leading to a buffer overflow vulnerability. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-45871) Maxim Levitsky discovered that the KVM nested virtualization (SVM) implementation for AMD processors in the Linux kernel did not properly handle x2AVIC MSRs. An attacker in a guest VM could use this to cause a denial of service (host kernel crash). (CVE-2023-5090) It was discovered that the SMB network file sharing protocol implementation in the Linux kernel did not properly handle certain error conditions, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-5345)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-6.2.0-1012-nvidia | <6.2.0-1012.12 | 6.2.0-1012.12 |
=22.04 | ||
All of | ||
ubuntu/linux-image-6.2.0-1012-nvidia-64k | <6.2.0-1012.12 | 6.2.0-1012.12 |
=22.04 | ||
All of | ||
ubuntu/linux-image-nvidia-6.2 | <6.2.0.1012.14 | 6.2.0.1012.14 |
=22.04 | ||
All of | ||
ubuntu/linux-image-nvidia-64k-6.2 | <6.2.0.1012.14 | 6.2.0.1012.14 |
=22.04 | ||
All of | ||
ubuntu/linux-image-nvidia-64k-hwe-22.04 | <6.2.0.1012.14 | 6.2.0.1012.14 |
=22.04 | ||
All of | ||
ubuntu/linux-image-nvidia-hwe-22.04 | <6.2.0.1012.14 | 6.2.0.1012.14 |
=22.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-6502-3 is not mentioned in the provided information.
A remote attacker could possibly use the vulnerability in USN-6502-3 to execute arbitrary code.
USN-6502-3 affects Linux kernel versions 6.2.0-1012.12 and 6.2.0.1012.14 on Ubuntu 22.04.
The remedy for USN-6502-3 is to update the affected Linux kernel packages to version 6.2.0-1012.12 or 6.2.0.1012.14.
You can find more information about USN-6502-3 on the Ubuntu security website.