First published: Thu Nov 30 2023(Updated: )
Ivan D Barrera, Christopher Bednarz, Mustafa Ismail, and Shiraz Saleem discovered that the InfiniBand RDMA driver in the Linux kernel did not properly check for zero-length STAG or MR registration. A remote attacker could possibly use this to execute arbitrary code. (CVE-2023-25775) Yu Hao discovered that the UBI driver in the Linux kernel did not properly check for MTD with zero erasesize during device attachment. A local privileged attacker could use this to cause a denial of service (system crash). (CVE-2023-31085) Manfred Rudigier discovered that the Intel(R) PCI-Express Gigabit (igb) Ethernet driver in the Linux kernel did not properly validate received frames that are larger than the set MTU size, leading to a buffer overflow vulnerability. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-45871) Maxim Levitsky discovered that the KVM nested virtualization (SVM) implementation for AMD processors in the Linux kernel did not properly handle x2AVIC MSRs. An attacker in a guest VM could use this to cause a denial of service (host kernel crash). (CVE-2023-5090) It was discovered that the SMB network file sharing protocol implementation in the Linux kernel did not properly handle certain error conditions, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-5345)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-6.2.0-1017-azure | <6.2.0-1017.17 | 6.2.0-1017.17 |
=23.04 | ||
All of | ||
ubuntu/linux-image-6.2.0-1019-gcp | <6.2.0-1019.21 | 6.2.0-1019.21 |
=23.04 | ||
All of | ||
ubuntu/linux-image-azure | <6.2.0.1017.17 | 6.2.0.1017.17 |
=23.04 | ||
All of | ||
ubuntu/linux-image-gcp | <6.2.0.1019.19 | 6.2.0.1019.19 |
=23.04 | ||
All of | ||
ubuntu/linux-image-6.2.0-1017-azure | <6.2.0-1017.17~22.04.1 | 6.2.0-1017.17~22.04.1 |
=22.04 | ||
All of | ||
ubuntu/linux-image-6.2.0-1017-azure-fde | <6.2.0-1017.17~22.04.1.1 | 6.2.0-1017.17~22.04.1.1 |
=22.04 | ||
All of | ||
ubuntu/linux-image-6.2.0-1019-gcp | <6.2.0-1019.21~22.04.1 | 6.2.0-1019.21~22.04.1 |
=22.04 | ||
All of | ||
ubuntu/linux-image-azure | <6.2.0.1017.17~22.04.1 | 6.2.0.1017.17~22.04.1 |
=22.04 | ||
All of | ||
ubuntu/linux-image-azure-fde | <6.2.0.1017.17~22.04.1.14 | 6.2.0.1017.17~22.04.1.14 |
=22.04 | ||
All of | ||
ubuntu/linux-image-gcp | <6.2.0.1019.21~22.04.1 | 6.2.0.1019.21~22.04.1 |
=22.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-6502-4 is high.
CVE-2023-25775 allows a remote attacker to execute arbitrary code in the Linux kernel.
Ubuntu 23.04 and Ubuntu 22.04 are affected by USN-6502-4.
You can find more information about USN-6502-4 on the Ubuntu Security website.
To fix USN-6502-4, you should update to the specified versions of the linux-image packages for your Ubuntu version.