This topic includes release notes for Linux stemcells used with Ops Manager.
The following sections describe each Jammy stemcell release.
This section includes release notes for the 1.x line of Linux stemcells used with Ops Manager.
Available in VMware Tanzu Network
Release Date: September 20, 2023
BOSH Agent Version: 2.581.0
Title: USN-6360-1: FLAC vulnerability
URL: https://ubuntu.com/security/notices/USN-6360-1
Priorities: medium
Description:
It was discovered that FLAC incorrectly handled encoding certain files. A
remote attacker could use this issue to cause FLAC to crash, resulting in a
denial of service, or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2020-22219
Title: USN-6355-1: GRUB2 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6355-1
Priorities: medium,low
Description:
Daniel Axtens discovered that specially crafted images could cause a
heap-based out-of-bonds write. A local attacker could possibly use
this to circumvent secure boot protections. (CVE-2021-3695)
Daniel Axtens discovered that specially crafted images could cause
out-of-bonds read and write. A local attacker could possibly use this
to circumvent secure boot protections. (CVE-2021-3696)
Daniel Axtens discovered that specially crafted images could cause
buffer underwrite which allows arbitrary data to be written to a heap.
A local attacker could possibly use this to circumvent secure
boot protections. (CVE-2021-3697)
It was discovered that GRUB2 configuration files were created with
the wrong permissions. An attacker could possibly use this to leak
encrypted passwords. (CVE-2021-3981)
Daniel Axtens discovered that specially crafted IP packets could cause
an integer underflow and write past the end of a bugger. An attacker
could possibly use this to circumvent secure boot protections.
(CVE-2022-28733)
Daniel Axtens discovered that specially crafted HTTP headers can cause
an out-of-bounds write of a NULL byte. An attacker could possibly use
this to corrupt GRUB2’s internal data. (CVE-2022-28734)
Julian Andres Klode discovered that GRUB2 shim_lock allowed non-
kernel files to be loaded. A local attack could possibly use this to
circumvent secure boot protections. (CVE-2022-28735)
Chris Coulson discovered that executing chainloaders more than once
caused a use-after-free vulnerability. A local attack could possibly
use this to circumvent secure boot protections. (CVE-2022-28736)
Chris Coulson discovered that specially crafted executables could
cause shim to make out-of-bound writes. A local attack could possibly
use this to circumvent secure boot protections. (CVE-2022-28737)
Zhang Boyang discovered that specially crafted unicode sequences
could lead to an out-of-bounds write to a heap. A local attacker could
possibly use this to circumvent secure boot protections.
(CVE-2022-3775)
CVEs:
- https://ubuntu.com/security/CVE-2021-3695
- https://ubuntu.com/security/CVE-2021-3696
- https://ubuntu.com/security/CVE-2021-3697
- https://ubuntu.com/security/CVE-2021-3981
- https://ubuntu.com/security/CVE-2022-28733
- https://ubuntu.com/security/CVE-2022-28734
- https://ubuntu.com/security/CVE-2022-28735
- https://ubuntu.com/security/CVE-2022-28736
- https://ubuntu.com/security/CVE-2022-28737
- https://ubuntu.com/security/CVE-2022-3775
- https://ubuntu.com/security/CVE-2022-28737
- https://ubuntu.com/security/CVE-2022-28734
- https://ubuntu.com/security/CVE-2022-28735
- https://ubuntu.com/security/CVE-2021-3697
- https://ubuntu.com/security/CVE-2021-3981
- https://ubuntu.com/security/CVE-2021-3696
- https://ubuntu.com/security/CVE-2021-3695
- https://ubuntu.com/security/CVE-2022-3775
- https://ubuntu.com/security/CVE-2022-28736
- https://ubuntu.com/security/CVE-2022-28733
Title: USN-6370-1: ModSecurity vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6370-1
Priorities: medium
Description:
It was discovered that ModSecurity incorrectly handled certain nested JSON
objects. An attacker could possibly use this issue to cause a denial
of service. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS
and Ubuntu 20.04 LTS. (CVE-2021-42717)
It was discovered that ModSecurity incorrectly handled certain HTTP
multipart requests. A remote attacker could possibly use this issue
to bypass ModSecurity restrictions. (CVE-2022-48279)
It was discovered that ModSecurity incorrectly handled certain file
uploads. A remote attacker could possibly use this issue to cause a
buffer overflow and a firewall failure. This issue only affected
Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
(CVE-2023-24021)
CVEs:
- https://ubuntu.com/security/CVE-2021-42717
- https://ubuntu.com/security/CVE-2022-48279
- https://ubuntu.com/security/CVE-2023-24021
- https://ubuntu.com/security/CVE-2021-42717
- https://ubuntu.com/security/CVE-2023-24021
- https://ubuntu.com/security/CVE-2022-48279
Title: USN-6385-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6385-1
Priorities: medium,high,low
Description:
It was discovered that some AMD x86-64 processors with SMT enabled could
speculatively execute instructions using a return address from a sibling
thread. A local attacker could possibly use this to expose sensitive
information. (CVE-2022-27672)
William Zhao discovered that the Traffic Control (TC) subsystem in the
Linux kernel did not properly handle network packet retransmission in
certain situations. A local attacker could use this to cause a denial of
service (kernel deadlock). (CVE-2022-4269)
Jordy Zomer and Alexandra Sandulescu discovered that syscalls invoking the
do_prlimit() function in the Linux kernel did not properly handle
speculative execution barriers. A local attacker could use this to expose
sensitive information (kernel memory). (CVE-2023-0458)
It was discovered that the TLS subsystem in the Linux kernel contained a
type confusion vulnerability in some situations. A local attacker could use
this to cause a denial of service (system crash) or possibly expose
sensitive information. (CVE-2023-1075)
It was discovered that the TUN/TAP driver in the Linux kernel did not
properly initialize socket data. A local attacker could use this to cause a
denial of service (system crash). (CVE-2023-1076, CVE-2023-4194)
It was discovered that the IPv6 implementation in the Linux kernel
contained a high rate of hash collisions in connection lookup table. A
remote attacker could use this to cause a denial of service (excessive CPU
consumption). (CVE-2023-1206)
It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux
kernel did not properly perform data buffer size validation in some
situations. A physically proximate attacker could use this to craft a
malicious USB device that when inserted, could cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-1380)
It was discovered that a race condition existed in the btrfs file system
implementation in the Linux kernel, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-1611)
Ruihan Li discovered that the bluetooth subsystem in the Linux kernel did
not properly perform permissions checks when handling HCI sockets. A
physically proximate attacker could use this to cause a denial of service
(bluetooth communication). (CVE-2023-2002)
Tavis Ormandy discovered that some AMD processors did not properly handle
speculative execution of certain vector register instructions. A local
attacker could use this to expose sensitive information. (CVE-2023-20593)
It was discovered that a use-after-free vulnerability existed in the iSCSI
TCP implementation in the Linux kernel. A local attacker could possibly use
this to cause a denial of service (system crash). (CVE-2023-2162)
Juan Jose Lopez Jaimez, Meador Inge, Simon Scannell, and Nenad Stojanovski
discovered that the BPF verifier in the Linux kernel did not properly mark
registers for precision tracking in certain situations, leading to an out-
of-bounds access vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-2163)
It was discovered that the perf subsystem in the Linux kernel contained a
use-after-free vulnerability. A privileged local attacker could possibly
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-2235)
Zheng Zhang discovered that the device-mapper implementation in the Linux
kernel did not properly handle locking during table_clear() operations. A
local attacker could use this to cause a denial of service (kernel
deadlock). (CVE-2023-2269)
Wei Chen discovered that the DVB USB AZ6027 driver in the Linux kernel
contained a null pointer dereference when handling certain messages from
user space. A local attacker could use this to cause a denial of service
(system crash). (CVE-2023-28328)
It was discovered that a race condition existed in the TLS subsystem in the
Linux kernel, leading to a use-after-free or a null pointer dereference
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-28466)
It was discovered that a race condition existed in the f2fs file system in
the Linux kernel, leading to a null pointer dereference vulnerability. An
attacker could use this to construct a malicious f2fs image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2023-2898)
It was discovered that the IP-VLAN network driver for the Linux kernel did
not properly initialize memory in some situations, leading to an out-of-
bounds write vulnerability. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2023-3090)
It was discovered that the Ricoh R5C592 MemoryStick card reader driver in
the Linux kernel contained a race condition during module unload, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-3141)
Gwangun Jung discovered that the Quick Fair Queueing scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-31436)
It was discovered that the Qualcomm MSM DPU driver in the Linux kernel did
not properly validate memory allocations in certain situations, leading to
a null pointer dereference vulnerability. A local attacker could use this
to cause a denial of service (system crash). (CVE-2023-3220)
It was discovered that the NET/ROM protocol implementation in the Linux
kernel contained a race condition in some situations, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2023-32269)
It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle some error conditions, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3390)
It was discovered that the universal 32bit network packet classifier
implementation in the Linux kernel did not properly perform reference
counting in some situations, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-3609)
It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle certain error conditions, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3610)
It was discovered that the Quick Fair Queueing network scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3611)
It was discovered that the network packet classifier with
netfilter/firewall marks implementation in the Linux kernel did not
properly handle reference counting, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3776)
Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle table rules flush in certain circumstances. A local
attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2023-3777)
It was discovered that the NFC implementation in the Linux kernel contained
a use-after-free vulnerability when performing peer-to-peer communication
in certain conditions. A privileged attacker could use this to cause a
denial of service (system crash) or possibly expose sensitive information
(kernel memory). (CVE-2023-3863)
Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle rule additions to bound chains in certain
circumstances. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2023-3995)
It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle PIPAPO element removal, leading to a use-after-free
vulnerability. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2023-4004)
Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle bound chain deactivation in certain circumstances. A
local attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2023-4015)
It was discovered that the bluetooth subsystem in the Linux kernel did not
properly handle L2CAP socket release, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-40283)
It was discovered that some network classifier implementations in the Linux
kernel contained use-after-free vulnerabilities. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-4128)
Maxim Suhanov discovered that the exFAT file system implementation in the
Linux kernel did not properly check a file name length, leading to an out-
of-bounds write vulnerability. An attacker could use this to construct a
malicious exFAT image that, when mounted and operated on, could cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-4273)
Lonial Con discovered that the netfilter subsystem in the Linux kernel
contained a memory leak when handling certain element flush operations. A
local attacker could use this to expose sensitive information (kernel
memory). (CVE-2023-4569)
CVEs:
- https://ubuntu.com/security/CVE-2022-27672
- https://ubuntu.com/security/CVE-2022-4269
- https://ubuntu.com/security/CVE-2023-0458
- https://ubuntu.com/security/CVE-2023-1075
- https://ubuntu.com/security/CVE-2023-1076
- https://ubuntu.com/security/CVE-2023-4194
- https://ubuntu.com/security/CVE-2023-1206
- https://ubuntu.com/security/CVE-2023-1380
- https://ubuntu.com/security/CVE-2023-1611
- https://ubuntu.com/security/CVE-2023-2002
- https://ubuntu.com/security/CVE-2023-20593
- https://ubuntu.com/security/CVE-2023-2162
- https://ubuntu.com/security/CVE-2023-2163
- https://ubuntu.com/security/CVE-2023-2235
- https://ubuntu.com/security/CVE-2023-2269
- https://ubuntu.com/security/CVE-2023-28328
- https://ubuntu.com/security/CVE-2023-28466
- https://ubuntu.com/security/CVE-2023-2898
- https://ubuntu.com/security/CVE-2023-3090
- https://ubuntu.com/security/CVE-2023-3141
- https://ubuntu.com/security/CVE-2023-31436
- https://ubuntu.com/security/CVE-2023-3220
- https://ubuntu.com/security/CVE-2023-32269
- https://ubuntu.com/security/CVE-2023-3390
- https://ubuntu.com/security/CVE-2023-3609
- https://ubuntu.com/security/CVE-2023-3610
- https://ubuntu.com/security/CVE-2023-3611
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-3777
- https://ubuntu.com/security/CVE-2023-3863
- https://ubuntu.com/security/CVE-2023-3995
- https://ubuntu.com/security/CVE-2023-4004
- https://ubuntu.com/security/CVE-2023-4015
- https://ubuntu.com/security/CVE-2023-40283
- https://ubuntu.com/security/CVE-2023-4128
- https://ubuntu.com/security/CVE-2023-4273
- https://ubuntu.com/security/CVE-2023-4569
- https://ubuntu.com/security/CVE-2023-3141
- https://ubuntu.com/security/CVE-2023-40283
- https://ubuntu.com/security/CVE-2023-28328
- https://ubuntu.com/security/CVE-2023-3220
- https://ubuntu.com/security/CVE-2023-1206
- https://ubuntu.com/security/CVE-2023-1075
- https://ubuntu.com/security/CVE-2023-4273
- https://ubuntu.com/security/CVE-2023-4015
- https://ubuntu.com/security/CVE-2022-27672
- https://ubuntu.com/security/CVE-2023-1076
- https://ubuntu.com/security/CVE-2023-28466
- https://ubuntu.com/security/CVE-2023-3609
- https://ubuntu.com/security/CVE-2023-4128
- https://ubuntu.com/security/CVE-2023-2898
- https://ubuntu.com/security/CVE-2023-3090
- https://ubuntu.com/security/CVE-2023-2235
- https://ubuntu.com/security/CVE-2023-2002
- https://ubuntu.com/security/CVE-2023-32269
- https://ubuntu.com/security/CVE-2023-3863
- https://ubuntu.com/security/CVE-2023-31436
- https://ubuntu.com/security/CVE-2023-2163
- https://ubuntu.com/security/CVE-2023-3777
- https://ubuntu.com/security/CVE-2023-3390
- https://ubuntu.com/security/CVE-2023-3611
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-0458
- https://ubuntu.com/security/CVE-2023-4004
- https://ubuntu.com/security/CVE-2023-4194
- https://ubuntu.com/security/CVE-2022-4269
- https://ubuntu.com/security/CVE-2023-20593
- https://ubuntu.com/security/CVE-2023-1611
- https://ubuntu.com/security/CVE-2023-2269
- https://ubuntu.com/security/CVE-2023-1380
- https://ubuntu.com/security/CVE-2023-3995
- https://ubuntu.com/security/CVE-2023-2162
- https://ubuntu.com/security/CVE-2023-3610
- https://ubuntu.com/security/CVE-2023-4569
Title: USN-6348-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6348-1
Priorities: medium,high
Description:
Daniel Moghimi discovered that some Intel(R) Processors did not properly
clear microarchitectural state after speculative execution of various
instructions. A local unprivileged user could use this to obtain to
sensitive information. (CVE-2022-40982)
Tavis Ormandy discovered that some AMD processors did not properly handle
speculative execution of certain vector register instructions. A local
attacker could use this to expose sensitive information. (CVE-2023-20593)
Ye Zhang and Nicolas Wu discovered that the io_uring subsystem in the Linux
kernel did not properly handle locking for rings with IOPOLL, leading to a
double-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-21400)
It was discovered that the universal 32bit network packet classifier
implementation in the Linux kernel did not properly perform reference
counting in some situations, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-3609)
It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle certain error conditions, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3610)
It was discovered that the Quick Fair Queueing network scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3611)
It was discovered that the network packet classifier with
netfilter/firewall marks implementation in the Linux kernel did not
properly handle reference counting, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3776)
Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle table rules flush in certain circumstances. A local
attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2023-3777)
Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle rule additions to bound chains in certain
circumstances. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2023-3995)
It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle PIPAPO element removal, leading to a use-after-free
vulnerability. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2023-4004)
Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle bound chain deactivation in certain circumstances. A
local attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2023-4015)
CVEs:
- https://ubuntu.com/security/CVE-2022-40982
- https://ubuntu.com/security/CVE-2023-20593
- https://ubuntu.com/security/CVE-2023-21400
- https://ubuntu.com/security/CVE-2023-3609
- https://ubuntu.com/security/CVE-2023-3610
- https://ubuntu.com/security/CVE-2023-3611
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-3777
- https://ubuntu.com/security/CVE-2023-3995
- https://ubuntu.com/security/CVE-2023-4004
- https://ubuntu.com/security/CVE-2023-4015
- https://ubuntu.com/security/CVE-2023-4015
- https://ubuntu.com/security/CVE-2023-3777
- https://ubuntu.com/security/CVE-2023-3611
- https://ubuntu.com/security/CVE-2023-20593
- https://ubuntu.com/security/CVE-2022-40982
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-4004
- https://ubuntu.com/security/CVE-2023-3609
- https://ubuntu.com/security/CVE-2023-3995
- https://ubuntu.com/security/CVE-2023-3610
- https://ubuntu.com/security/CVE-2023-21400
Title: USN-6350-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6350-1
Priorities: medium,low
Description:
It was discovered that the NTFS file system implementation in the Linux
kernel did not properly validate MFT flags in certain situations. An
attacker could use this to construct a malicious NTFS image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2022-48425)
Zi Fan Tan discovered that the binder IPC implementation in the Linux
kernel contained a use-after-free vulnerability. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-21255)
It was discovered that a race condition existed in the f2fs file system in
the Linux kernel, leading to a null pointer dereference vulnerability. An
attacker could use this to construct a malicious f2fs image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2023-2898)
It was discovered that the DVB Core driver in the Linux kernel did not
properly handle locking events in certain situations. A local attacker
could use this to cause a denial of service (kernel deadlock).
(CVE-2023-31084)
Yang Lan discovered that the GFS2 file system implementation in the Linux
kernel could attempt to dereference a null pointer in some situations. An
attacker could use this to construct a malicious GFS2 image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2023-3212)
It was discovered that the KSMBD implementation in the Linux kernel did not
properly validate buffer sizes in certain operations, leading to an out-of-
bounds read vulnerability. A remote attacker could use this to cause a
denial of service (system crash) or possibly expose sensitive information.
(CVE-2023-38426, CVE-2023-38428)
It was discovered that the KSMBD implementation in the Linux kernel did not
properly calculate the size of certain buffers. A remote attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-38429)
CVEs:
- https://ubuntu.com/security/CVE-2022-48425
- https://ubuntu.com/security/CVE-2023-21255
- https://ubuntu.com/security/CVE-2023-2898
- https://ubuntu.com/security/CVE-2023-31084
- https://ubuntu.com/security/CVE-2023-3212
- https://ubuntu.com/security/CVE-2023-38426
- https://ubuntu.com/security/CVE-2023-38428
- https://ubuntu.com/security/CVE-2023-38429
- https://ubuntu.com/security/CVE-2023-2898
- https://ubuntu.com/security/CVE-2023-38428
- https://ubuntu.com/security/CVE-2023-21255
- https://ubuntu.com/security/CVE-2023-38426
- https://ubuntu.com/security/CVE-2023-3212
- https://ubuntu.com/security/CVE-2023-38429
- https://ubuntu.com/security/CVE-2023-31084
- https://ubuntu.com/security/CVE-2022-48425
Title: USN-6339-3: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6339-3
Priorities: medium,low
Description:
It was discovered that the NTFS file system implementation in the Linux
kernel did not properly validate MFT flags in certain situations. An
attacker could use this to construct a malicious NTFS image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2022-48425)
Zi Fan Tan discovered that the binder IPC implementation in the Linux
kernel contained a use-after-free vulnerability. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-21255)
It was discovered that a race condition existed in the f2fs file system in
the Linux kernel, leading to a null pointer dereference vulnerability. An
attacker could use this to construct a malicious f2fs image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2023-2898)
It was discovered that the DVB Core driver in the Linux kernel did not
properly handle locking events in certain situations. A local attacker
could use this to cause a denial of service (kernel deadlock).
(CVE-2023-31084)
Yang Lan discovered that the GFS2 file system implementation in the Linux
kernel could attempt to dereference a null pointer in some situations. An
attacker could use this to construct a malicious GFS2 image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2023-3212)
It was discovered that the KSMBD implementation in the Linux kernel did not
properly validate buffer sizes in certain operations, leading to an out-of-
bounds read vulnerability. A remote attacker could use this to cause a
denial of service (system crash) or possibly expose sensitive information.
(CVE-2023-38426, CVE-2023-38428)
It was discovered that the KSMBD implementation in the Linux kernel did not
properly calculate the size of certain buffers. A remote attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-38429)
CVEs:
- https://ubuntu.com/security/CVE-2022-48425
- https://ubuntu.com/security/CVE-2023-21255
- https://ubuntu.com/security/CVE-2023-2898
- https://ubuntu.com/security/CVE-2023-31084
- https://ubuntu.com/security/CVE-2023-3212
- https://ubuntu.com/security/CVE-2023-38426
- https://ubuntu.com/security/CVE-2023-38428
- https://ubuntu.com/security/CVE-2023-38429
- https://ubuntu.com/security/CVE-2023-38429
- https://ubuntu.com/security/CVE-2023-38428
- https://ubuntu.com/security/CVE-2023-38426
- https://ubuntu.com/security/CVE-2022-48425
- https://ubuntu.com/security/CVE-2023-2898
- https://ubuntu.com/security/CVE-2023-3212
- https://ubuntu.com/security/CVE-2023-31084
- https://ubuntu.com/security/CVE-2023-21255
Title: USN-6359-1: file vulnerability
URL: https://ubuntu.com/security/notices/USN-6359-1
Priorities: medium
Description:
It was discovered that file incorrectly handled certain malformed files. An
attacker could use this issue to cause a denial of service, or possibly
execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-48554
Title: USN-6383-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6383-1
Priorities: high
Description:
Jana Hofmann, Emanuele Vannacci, Cedric Fournet, Boris Kopf, and Oleksii
Oleksenko discovered that some AMD processors could leak stale data from
division operations in certain situations. A local attacker could possibly
use this to expose sensitive information. (CVE-2023-20588)
It was discovered that the ARM64 KVM implementation in the Linux kernel did
not properly restrict hypervisor memory access. An attacker in a guest VM
could use this to execute arbitrary code in the host OS. (CVE-2023-21264)
It was discovered that the bluetooth subsystem in the Linux kernel did not
properly handle L2CAP socket release, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-40283)
It was discovered that some network classifier implementations in the Linux
kernel contained use-after-free vulnerabilities. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-4128)
Lonial Con discovered that the netfilter subsystem in the Linux kernel
contained a memory leak when handling certain element flush operations. A
local attacker could use this to expose sensitive information (kernel
memory). (CVE-2023-4569)
CVEs:
- https://ubuntu.com/security/CVE-2023-20588
- https://ubuntu.com/security/CVE-2023-21264
- https://ubuntu.com/security/CVE-2023-40283
- https://ubuntu.com/security/CVE-2023-4128
- https://ubuntu.com/security/CVE-2023-4569
- https://ubuntu.com/security/CVE-2023-40283
- https://ubuntu.com/security/CVE-2023-4128
- https://ubuntu.com/security/CVE-2023-21264
- https://ubuntu.com/security/CVE-2023-4569
- https://ubuntu.com/security/CVE-2023-20588
Title: USN-6384-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6384-1
Priorities: high
Description:
Jana Hofmann, Emanuele Vannacci, Cedric Fournet, Boris Kopf, and Oleksii
Oleksenko discovered that some AMD processors could leak stale data from
division operations in certain situations. A local attacker could possibly
use this to expose sensitive information. (CVE-2023-20588)
Lonial Con discovered that the netfilter subsystem in the Linux kernel
contained a memory leak when handling certain element flush operations. A
local attacker could use this to expose sensitive information (kernel
memory). (CVE-2023-4569)
CVEs:
- https://ubuntu.com/security/CVE-2023-20588
- https://ubuntu.com/security/CVE-2023-4569
- https://ubuntu.com/security/CVE-2023-20588
- https://ubuntu.com/security/CVE-2023-4569
Title: USN-6365-1: Open VM Tools vulnerability
URL: https://ubuntu.com/security/notices/USN-6365-1
Priorities: medium
Description:
It was discovered that Open VM Tools incorrectly handled SAML tokens. A
remote attacker could possibly use this issue to bypass SAML token
signature verification and perform VMware Tools Guest Operations.
CVEs:
- https://ubuntu.com/security/CVE-2023-20900
Title: USN-6338-2: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6338-2
Priorities: medium,low
Description:
Zi Fan Tan discovered that the binder IPC implementation in the Linux
kernel contained a use-after-free vulnerability. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-21255)
It was discovered that a race condition existed in the f2fs file system in
the Linux kernel, leading to a null pointer dereference vulnerability. An
attacker could use this to construct a malicious f2fs image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2023-2898)
It was discovered that the DVB Core driver in the Linux kernel did not
properly handle locking events in certain situations. A local attacker
could use this to cause a denial of service (kernel deadlock).
(CVE-2023-31084)
Quentin Minster discovered that the KSMBD implementation in the Linux
kernel did not properly handle session setup requests. A remote attacker
could possibly use this to cause a denial of service (memory exhaustion).
(CVE-2023-32247)
Quentin Minster discovered that a race condition existed in the KSMBD
implementation in the Linux kernel when handling sessions operations. A
remote attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-32250, CVE-2023-32252,
CVE-2023-32257)
It was discovered that a race condition existed in the KSMBD implementation
in the Linux kernel when handling session connections, leading to a use-
after-free vulnerability. A remote attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-32258)
It was discovered that the KSMBD implementation in the Linux kernel did not
properly validate buffer sizes in certain operations, leading to an out-of-
bounds read vulnerability. A remote attacker could use this to cause a
denial of service (system crash) or possibly expose sensitive information.
(CVE-2023-38426, CVE-2023-38428)
It was discovered that the KSMBD implementation in the Linux kernel did not
properly calculate the size of certain buffers. A remote attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-38429)
CVEs:
- https://ubuntu.com/security/CVE-2023-21255
- https://ubuntu.com/security/CVE-2023-2898
- https://ubuntu.com/security/CVE-2023-31084
- https://ubuntu.com/security/CVE-2023-32247
- https://ubuntu.com/security/CVE-2023-32250
- https://ubuntu.com/security/CVE-2023-32252
- https://ubuntu.com/security/CVE-2023-32257
- https://ubuntu.com/security/CVE-2023-32258
- https://ubuntu.com/security/CVE-2023-38426
- https://ubuntu.com/security/CVE-2023-38428
- https://ubuntu.com/security/CVE-2023-38429
- https://ubuntu.com/security/CVE-2023-2898
- https://ubuntu.com/security/CVE-2023-38428
- https://ubuntu.com/security/CVE-2023-32247
- https://ubuntu.com/security/CVE-2023-32250
- https://ubuntu.com/security/CVE-2023-21255
- https://ubuntu.com/security/CVE-2023-38426
- https://ubuntu.com/security/CVE-2023-32257
- https://ubuntu.com/security/CVE-2023-38429
- https://ubuntu.com/security/CVE-2023-31084
- https://ubuntu.com/security/CVE-2023-32252
- https://ubuntu.com/security/CVE-2023-32258
Title: USN-6358-1: RedCloth vulnerability
URL: https://ubuntu.com/security/notices/USN-6358-1
Priorities: medium
Description:
It was discovered that RedCloth incorrectly handled certain inputs during
html sanitisation. An attacker could possibly use this issue to cause a
denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-31606
Title: USN-6361-1: CUPS vulnerability
URL: https://ubuntu.com/security/notices/USN-6361-1
Priorities: medium
Description:
It was discovered that CUPS incorrectly authenticated certain remote
requests. A remote attacker could possibly use this issue to obtain
recently printed documents.
CVEs:
- https://ubuntu.com/security/CVE-2023-32360
Title: USN-6362-1: .NET vulnerability
URL: https://ubuntu.com/security/notices/USN-6362-1
Priorities: medium
Description:
Kevin Jones discovered that .NET did not properly process certain
X.509 certificates. An attacker could possibly use this issue to
cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-36799
Title: USN-6378-1: Django vulnerability
URL: https://ubuntu.com/security/notices/USN-6378-1
Priorities: medium
Description:
It was discovered that Django incorrectly handled certain URIs with a very
large number of Unicode characters. A remote attacker could possibly use
this issue to cause Django to consume resources or crash, leading to a
denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-41164
Title: USN-6373-1: gawk vulnerability
URL: https://ubuntu.com/security/notices/USN-6373-1
Priorities: medium
Description:
It was discovered that gawk could be made to read out of bounds when
processing certain inputs. If a user or an automated system were tricked
into opening a specially crafted input, an attacker could possibly use
this issue to cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-4156
Title: USN-6368-1: Thunderbird vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6368-1
Priorities: medium
Description:
Multiple security issues were discovered in Thunderbird. If a user were
tricked into opening a specially crafted website in a browsing context, an
attacker could potentially exploit these to cause a denial of service,
obtain sensitive information, bypass security restrictions, cross-site
tracing, or execute arbitrary code. (CVE-2023-4573, CVE-2023-4574,
CVE-2023-4575, CVE-2023-4581, CVE-2023-4584)
It was discovered that Thunderbird did not properly manage memory when
handling WebP images. If a user were tricked into opening a malicious WebP
image file, an attacker could potentially exploit these to cause a denial
of service or execute arbitrary code. (CVE-2023-4863)
CVEs:
- https://ubuntu.com/security/CVE-2023-4573
- https://ubuntu.com/security/CVE-2023-4574
- https://ubuntu.com/security/CVE-2023-4575
- https://ubuntu.com/security/CVE-2023-4581
- https://ubuntu.com/security/CVE-2023-4584
- https://ubuntu.com/security/CVE-2023-4863
- https://ubuntu.com/security/CVE-2023-4863
- https://ubuntu.com/security/CVE-2023-4574
- https://ubuntu.com/security/CVE-2023-4584
- https://ubuntu.com/security/CVE-2023-4575
- https://ubuntu.com/security/CVE-2023-4581
- https://ubuntu.com/security/CVE-2023-4573
Title: USN-6369-1: libwebp vulnerability
URL: https://ubuntu.com/security/notices/USN-6369-1
Priorities: medium
Description:
It was discovered that libwebp incorrectly handled certain malformed
images. If a user or automated system were tricked into opening a
specially crafted image file, a remote attacker could use this issue to
cause libwebp to crash, resulting in a denial of service, or possibly
execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2023-4863
Full Changelog: https://github.com/cloudfoundry/bosh-linux-stemcell-builder/compare/ubuntu-jammy/v1.222…ubuntu-jammy/v1.232
Available in VMware Tanzu Network
Release Date: September 07, 2023
BOSH Agent Version: 2.578.0
Title: USN-6336-1: Docker Registry vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6336-1
Priorities: low,medium
Description:
It was discovered that Docker Registry incorrectly handled certain crafted
input, which allowed remote attackers to cause a denial of service. This
issue only affected Ubuntu 16.04 LTS. (CVE-2017-11468)
It was discovered that Docker Registry incorrectly handled certain crafted
input. An attacker could possibly use this issue to cause a denial of
service. (CVE-2017-11468)
CVEs:
- https://ubuntu.com/security/CVE-2017-11468
- https://ubuntu.com/security/CVE-2017-11468
- https://ubuntu.com/security/CVE-2023-2253
- https://ubuntu.com/security/CVE-2017-11468
Title: USN-6306-1: Fast DDS vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6306-1
Priorities: medium
Description:
It was discovered that Fast DDS incorrectly handled certain inputs.
A remote attacker could possibly use this issue to cause a denial of
service and information exposure. This issue only affected Ubuntu
22.04 LTS. (CVE-2021-38425)
It was discovered that Fast DDS incorrectly handled certain inputs.
An attacker could possibly use this issue to cause a crash.
(CVE-2023-39534, CVE-2023-39945, CVE-2023-39946, CVE-2023-39947,
CVE-2023-39948, CVE-2023-39949)
CVEs:
- https://ubuntu.com/security/CVE-2021-38425
- https://ubuntu.com/security/CVE-2023-39534
- https://ubuntu.com/security/CVE-2023-39945
- https://ubuntu.com/security/CVE-2023-39946
- https://ubuntu.com/security/CVE-2023-39947
- https://ubuntu.com/security/CVE-2023-39948
- https://ubuntu.com/security/CVE-2023-39949
- https://ubuntu.com/security/CVE-2023-39534
- https://ubuntu.com/security/CVE-2021-38425
- https://ubuntu.com/security/CVE-2023-39945
- https://ubuntu.com/security/CVE-2023-39948
- https://ubuntu.com/security/CVE-2023-39947
- https://ubuntu.com/security/CVE-2023-39946
- https://ubuntu.com/security/CVE-2023-39949
Title: USN-6332-1: Linux kernel (Azure) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6332-1
Priorities: medium,low,high
Description:
Daniel Moghimi discovered that some Intel(R) Processors did not properly
clear microarchitectural state after speculative execution of various
instructions. A local unprivileged user could use this to obtain to
sensitive information. (CVE-2022-40982)
William Zhao discovered that the Traffic Control (TC) subsystem in the
Linux kernel did not properly handle network packet retransmission in
certain situations. A local attacker could use this to cause a denial of
service (kernel deadlock). (CVE-2022-4269)
It was discovered that the NTFS file system implementation in the Linux
kernel did not properly check buffer indexes in certain situations, leading
to an out-of-bounds read vulnerability. A local attacker could possibly use
this to expose sensitive information (kernel memory). (CVE-2022-48502)
Seth Jenkins discovered that the Linux kernel did not properly perform
address randomization for a per-cpu memory management structure. A local
attacker could use this to expose sensitive information (kernel memory) or
in conjunction with another kernel vulnerability. (CVE-2023-0597)
It was discovered that a race condition existed in the btrfs file system
implementation in the Linux kernel, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-1611)
It was discovered that the APM X-Gene SoC hardware monitoring driver in the
Linux kernel contained a race condition, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or expose sensitive information (kernel memory).
(CVE-2023-1855)
It was discovered that the ST NCI NFC driver did not properly handle device
removal events. A physically proximate attacker could use this to cause a
denial of service (system crash). (CVE-2023-1990)
Ruihan Li discovered that the bluetooth subsystem in the Linux kernel did
not properly perform permissions checks when handling HCI sockets. A
physically proximate attacker could use this to cause a denial of service
(bluetooth communication). (CVE-2023-2002)
Tavis Ormandy discovered that some AMD processors did not properly handle
speculative execution of certain vector register instructions. A local
attacker could use this to expose sensitive information. (CVE-2023-20593)
It was discovered that the XFS file system implementation in the Linux
kernel did not properly perform metadata validation when mounting certain
images. An attacker could use this to specially craft a file system image
that, when mounted, could cause a denial of service (system crash).
(CVE-2023-2124)
Ye Zhang and Nicolas Wu discovered that the io_uring subsystem in the Linux
kernel did not properly handle locking for rings with IOPOLL, leading to a
double-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-21400)
Juan Jose Lopez Jaimez, Meador Inge, Simon Scannell, and Nenad Stojanovski
discovered that the BPF verifier in the Linux kernel did not properly mark
registers for precision tracking in certain situations, leading to an out-
of-bounds access vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-2163)
It was discovered that the SLIMpro I2C device driver in the Linux kernel
did not properly validate user-supplied data in some situations, leading to
an out-of-bounds write vulnerability. A privileged attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-2194)
It was discovered that the perf subsystem in the Linux kernel contained a
use-after-free vulnerability. A privileged local attacker could possibly
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-2235)
Zheng Zhang discovered that the device-mapper implementation in the Linux
kernel did not properly handle locking during table_clear() operations. A
local attacker could use this to cause a denial of service (kernel
deadlock). (CVE-2023-2269)
It was discovered that the ARM Mali Display Processor driver implementation
in the Linux kernel did not properly handle certain error conditions. A
local attacker could possibly use this to cause a denial of service (system
crash). (CVE-2023-23004)
It was discovered that a race condition existed in the TLS subsystem in the
Linux kernel, leading to a use-after-free or a null pointer dereference
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-28466)
It was discovered that the DA9150 charger driver in the Linux kernel did
not properly handle device removal, leading to a user-after free
vulnerability. A physically proximate attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-30772)
It was discovered that the Ricoh R5C592 MemoryStick card reader driver in
the Linux kernel contained a race condition during module unload, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-3141)
Quentin Minster discovered that the KSMBD implementation in the Linux
kernel did not properly validate pointers in some situations, leading to a
null pointer dereference vulnerability. A remote attacker could use this to
cause a denial of service (system crash). (CVE-2023-32248)
It was discovered that the kernel->user space relay implementation in the
Linux kernel did not properly perform certain buffer calculations, leading
to an out-of-bounds read vulnerability. A local attacker could use this to
cause a denial of service (system crash) or expose sensitive information
(kernel memory). (CVE-2023-3268)
It was discovered that the Qualcomm EMAC ethernet driver in the Linux
kernel did not properly handle device removal, leading to a user-after free
vulnerability. A physically proximate attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-33203)
It was discovered that the BQ24190 charger driver in the Linux kernel did
not properly handle device removal, leading to a user-after free
vulnerability. A physically proximate attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-33288)
It was discovered that the video4linux driver for Philips based TV cards in
the Linux kernel contained a race condition during device removal, leading
to a use-after-free vulnerability. A physically proximate attacker could
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-35823)
It was discovered that the SDMC DM1105 PCI device driver in the Linux
kernel contained a race condition during device removal, leading to a use-
after-free vulnerability. A physically proximate attacker could use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-35824)
It was discovered that the Renesas USB controller driver in the Linux
kernel contained a race condition during device removal, leading to a use-
after-free vulnerability. A privileged attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-35828)
It was discovered that the Rockchip Video Decoder IP driver in the Linux
kernel contained a race condition during device removal, leading to a use-
after-free vulnerability. A privileged attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-35829)
It was discovered that the universal 32bit network packet classifier
implementation in the Linux kernel did not properly perform reference
counting in some situations, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-3609)
It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle certain error conditions, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3610)
It was discovered that the Quick Fair Queueing network scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3611)
It was discovered that the network packet classifier with
netfilter/firewall marks implementation in the Linux kernel did not
properly handle reference counting, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3776)
Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle table rules flush in certain circumstances. A local
attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2023-3777)
Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle rule additions to bound chains in certain
circumstances. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2023-3995)
It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle PIPAPO element removal, leading to a use-after-free
vulnerability. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2023-4004)
Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle bound chain deactivation in certain circumstances. A
local attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2023-4015)
CVEs:
- https://ubuntu.com/security/CVE-2022-40982
- https://ubuntu.com/security/CVE-2022-4269
- https://ubuntu.com/security/CVE-2022-48502
- https://ubuntu.com/security/CVE-2023-0597
- https://ubuntu.com/security/CVE-2023-1611
- https://ubuntu.com/security/CVE-2023-1855
- https://ubuntu.com/security/CVE-2023-1990
- https://ubuntu.com/security/CVE-2023-2002
- https://ubuntu.com/security/CVE-2023-20593
- https://ubuntu.com/security/CVE-2023-2124
- https://ubuntu.com/security/CVE-2023-21400
- https://ubuntu.com/security/CVE-2023-2163
- https://ubuntu.com/security/CVE-2023-2194
- https://ubuntu.com/security/CVE-2023-2235
- https://ubuntu.com/security/CVE-2023-2269
- https://ubuntu.com/security/CVE-2023-23004
- https://ubuntu.com/security/CVE-2023-28466
- https://ubuntu.com/security/CVE-2023-30772
- https://ubuntu.com/security/CVE-2023-3141
- https://ubuntu.com/security/CVE-2023-32248
- https://ubuntu.com/security/CVE-2023-3268
- https://ubuntu.com/security/CVE-2023-33203
- https://ubuntu.com/security/CVE-2023-33288
- https://ubuntu.com/security/CVE-2023-35823
- https://ubuntu.com/security/CVE-2023-35824
- https://ubuntu.com/security/CVE-2023-35828
- https://ubuntu.com/security/CVE-2023-35829
- https://ubuntu.com/security/CVE-2023-3609
- https://ubuntu.com/security/CVE-2023-3610
- https://ubuntu.com/security/CVE-2023-3611
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-3777
- https://ubuntu.com/security/CVE-2023-3995
- https://ubuntu.com/security/CVE-2023-4004
- https://ubuntu.com/security/CVE-2023-4015
- https://ubuntu.com/security/CVE-2023-3777
- https://ubuntu.com/security/CVE-2023-33288
- https://ubuntu.com/security/CVE-2023-35824
- https://ubuntu.com/security/CVE-2023-32248
- https://ubuntu.com/security/CVE-2023-0597
- https://ubuntu.com/security/CVE-2023-1611
- https://ubuntu.com/security/CVE-2023-35829
- https://ubuntu.com/security/CVE-2023-3611
- https://ubuntu.com/security/CVE-2023-33203
- https://ubuntu.com/security/CVE-2023-4004
- https://ubuntu.com/security/CVE-2023-2235
- https://ubuntu.com/security/CVE-2023-1855
- https://ubuntu.com/security/CVE-2023-3268
- https://ubuntu.com/security/CVE-2023-3141
- https://ubuntu.com/security/CVE-2023-35823
- https://ubuntu.com/security/CVE-2023-3609
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-2194
- https://ubuntu.com/security/CVE-2023-35828
- https://ubuntu.com/security/CVE-2023-28466
- https://ubuntu.com/security/CVE-2023-2124
- https://ubuntu.com/security/CVE-2023-23004
- https://ubuntu.com/security/CVE-2023-30772
- https://ubuntu.com/security/CVE-2023-20593
- https://ubuntu.com/security/CVE-2023-21400
- https://ubuntu.com/security/CVE-2023-2002
- https://ubuntu.com/security/CVE-2022-48502
- https://ubuntu.com/security/CVE-2023-2269
- https://ubuntu.com/security/CVE-2022-40982
- https://ubuntu.com/security/CVE-2023-3610
- https://ubuntu.com/security/CVE-2023-3995
- https://ubuntu.com/security/CVE-2023-4015
- https://ubuntu.com/security/CVE-2023-1990
- https://ubuntu.com/security/CVE-2023-2163
- https://ubuntu.com/security/CVE-2022-4269
Title: USN-6315-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6315-1
Priorities: medium,high
Description:
Daniel Moghimi discovered that some Intel(R) Processors did not properly
clear microarchitectural state after speculative execution of various
instructions. A local unprivileged user could use this to obtain to
sensitive information. (CVE-2022-40982)
Tavis Ormandy discovered that some AMD processors did not properly handle
speculative execution of certain vector register instructions. A local
attacker could use this to expose sensitive information. (CVE-2023-20593)
Ye Zhang and Nicolas Wu discovered that the io_uring subsystem in the Linux
kernel did not properly handle locking for rings with IOPOLL, leading to a
double-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-21400)
It was discovered that the universal 32bit network packet classifier
implementation in the Linux kernel did not properly perform reference
counting in some situations, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-3609)
It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle certain error conditions, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3610)
It was discovered that the Quick Fair Queueing network scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3611)
It was discovered that the network packet classifier with
netfilter/firewall marks implementation in the Linux kernel did not
properly handle reference counting, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3776)
Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle table rules flush in certain circumstances. A local
attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2023-3777)
Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle rule additions to bound chains in certain
circumstances. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2023-3995)
It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle PIPAPO element removal, leading to a use-after-free
vulnerability. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2023-4004)
Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle bound chain deactivation in certain circumstances. A
local attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2023-4015)
CVEs:
- https://ubuntu.com/security/CVE-2022-40982
- https://ubuntu.com/security/CVE-2023-20593
- https://ubuntu.com/security/CVE-2023-21400
- https://ubuntu.com/security/CVE-2023-3609
- https://ubuntu.com/security/CVE-2023-3610
- https://ubuntu.com/security/CVE-2023-3611
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-3777
- https://ubuntu.com/security/CVE-2023-3995
- https://ubuntu.com/security/CVE-2023-4004
- https://ubuntu.com/security/CVE-2023-4015
- https://ubuntu.com/security/CVE-2023-20593
- https://ubuntu.com/security/CVE-2023-4015
- https://ubuntu.com/security/CVE-2023-3995
- https://ubuntu.com/security/CVE-2023-3611
- https://ubuntu.com/security/CVE-2022-40982
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-21400
- https://ubuntu.com/security/CVE-2023-4004
- https://ubuntu.com/security/CVE-2023-3610
- https://ubuntu.com/security/CVE-2023-3777
- https://ubuntu.com/security/CVE-2023-3609
Title: USN-6325-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6325-1
Priorities: medium,high
Description:
Daniel Moghimi discovered that some Intel(R) Processors did not properly
clear microarchitectural state after speculative execution of various
instructions. A local unprivileged user could use this to obtain to
sensitive information. (CVE-2022-40982)
Tavis Ormandy discovered that some AMD processors did not properly handle
speculative execution of certain vector register instructions. A local
attacker could use this to expose sensitive information. (CVE-2023-20593)
Ye Zhang and Nicolas Wu discovered that the io_uring subsystem in the Linux
kernel did not properly handle locking for rings with IOPOLL, leading to a
double-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-21400)
It was discovered that the universal 32bit network packet classifier
implementation in the Linux kernel did not properly perform reference
counting in some situations, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-3609)
It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle certain error conditions, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3610)
It was discovered that the Quick Fair Queueing network scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3611)
It was discovered that the network packet classifier with
netfilter/firewall marks implementation in the Linux kernel did not
properly handle reference counting, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3776)
Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle table rules flush in certain circumstances. A local
attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2023-3777)
Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle rule additions to bound chains in certain
circumstances. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2023-3995)
It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle PIPAPO element removal, leading to a use-after-free
vulnerability. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2023-4004)
Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle bound chain deactivation in certain circumstances. A
local attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2023-4015)
CVEs:
- https://ubuntu.com/security/CVE-2022-40982
- https://ubuntu.com/security/CVE-2023-20593
- https://ubuntu.com/security/CVE-2023-21400
- https://ubuntu.com/security/CVE-2023-3609
- https://ubuntu.com/security/CVE-2023-3610
- https://ubuntu.com/security/CVE-2023-3611
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-3777
- https://ubuntu.com/security/CVE-2023-3995
- https://ubuntu.com/security/CVE-2023-4004
- https://ubuntu.com/security/CVE-2023-4015
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-21400
- https://ubuntu.com/security/CVE-2023-3609
- https://ubuntu.com/security/CVE-2023-4004
- https://ubuntu.com/security/CVE-2023-3610
- https://ubuntu.com/security/CVE-2023-3611
- https://ubuntu.com/security/CVE-2023-3777
- https://ubuntu.com/security/CVE-2022-40982
- https://ubuntu.com/security/CVE-2023-3995
- https://ubuntu.com/security/CVE-2023-4015
- https://ubuntu.com/security/CVE-2023-20593
Title: USN-6318-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6318-1
Priorities: medium,high
Description:
Daniel Moghimi discovered that some Intel(R) Processors did not properly
clear microarchitectural state after speculative execution of various
instructions. A local unprivileged user could use this to obtain to
sensitive information. (CVE-2022-40982)
Tavis Ormandy discovered that some AMD processors did not properly handle
speculative execution of certain vector register instructions. A local
attacker could use this to expose sensitive information. (CVE-2023-20593)
It was discovered that the universal 32bit network packet classifier
implementation in the Linux kernel did not properly perform reference
counting in some situations, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-3609)
It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle certain error conditions, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3610)
It was discovered that the Quick Fair Queueing network scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3611)
It was discovered that the network packet classifier with
netfilter/firewall marks implementation in the Linux kernel did not
properly handle reference counting, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3776)
Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle table rules flush in certain circumstances. A local
attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2023-3777)
Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle rule additions to bound chains in certain
circumstances. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2023-3995)
It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle PIPAPO element removal, leading to a use-after-free
vulnerability. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2023-4004)
Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle bound chain deactivation in certain circumstances. A
local attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2023-4015)
CVEs:
- https://ubuntu.com/security/CVE-2022-40982
- https://ubuntu.com/security/CVE-2023-20593
- https://ubuntu.com/security/CVE-2023-3609
- https://ubuntu.com/security/CVE-2023-3610
- https://ubuntu.com/security/CVE-2023-3611
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-3777
- https://ubuntu.com/security/CVE-2023-3995
- https://ubuntu.com/security/CVE-2023-4004
- https://ubuntu.com/security/CVE-2023-4015
- https://ubuntu.com/security/CVE-2023-3611
- https://ubuntu.com/security/CVE-2023-3610
- https://ubuntu.com/security/CVE-2023-3609
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-4015
- https://ubuntu.com/security/CVE-2022-40982
- https://ubuntu.com/security/CVE-2023-20593
- https://ubuntu.com/security/CVE-2023-3777
- https://ubuntu.com/security/CVE-2023-3995
- https://ubuntu.com/security/CVE-2023-4004
Title: USN-6316-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6316-1
Priorities: medium,high
Description:
Daniel Moghimi discovered that some Intel(R) Processors did not properly
clear microarchitectural state after speculative execution of various
instructions. A local unprivileged user could use this to obtain to
sensitive information. (CVE-2022-40982)
Tavis Ormandy discovered that some AMD processors did not properly handle
speculative execution of certain vector register instructions. A local
attacker could use this to expose sensitive information. (CVE-2023-20593)
Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle table rules flush in certain circumstances. A local
attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2023-3777)
Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle rule additions to bound chains in certain
circumstances. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2023-3995)
It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle PIPAPO element removal, leading to a use-after-free
vulnerability. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2023-4004)
Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle bound chain deactivation in certain circumstances. A
local attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2023-4015)
CVEs:
- https://ubuntu.com/security/CVE-2022-40982
- https://ubuntu.com/security/CVE-2023-20593
- https://ubuntu.com/security/CVE-2023-3777
- https://ubuntu.com/security/CVE-2023-3995
- https://ubuntu.com/security/CVE-2023-4004
- https://ubuntu.com/security/CVE-2023-4015
- https://ubuntu.com/security/CVE-2023-4015
- https://ubuntu.com/security/CVE-2022-40982
- https://ubuntu.com/security/CVE-2023-20593
- https://ubuntu.com/security/CVE-2023-3777
- https://ubuntu.com/security/CVE-2023-3995
- https://ubuntu.com/security/CVE-2023-4004
Title: USN-6311-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6311-1
Priorities: medium,low
Description:
William Zhao discovered that the Traffic Control (TC) subsystem in the
Linux kernel did not properly handle network packet retransmission in
certain situations. A local attacker could use this to cause a denial of
service (kernel deadlock). (CVE-2022-4269)
It was discovered that the NTFS file system implementation in the Linux
kernel did not properly check buffer indexes in certain situations, leading
to an out-of-bounds read vulnerability. A local attacker could possibly use
this to expose sensitive information (kernel memory). (CVE-2022-48502)
Seth Jenkins discovered that the Linux kernel did not properly perform
address randomization for a per-cpu memory management structure. A local
attacker could use this to expose sensitive information (kernel memory) or
in conjunction with another kernel vulnerability. (CVE-2023-0597)
It was discovered that a race condition existed in the btrfs file system
implementation in the Linux kernel, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-1611)
It was discovered that the APM X-Gene SoC hardware monitoring driver in the
Linux kernel contained a race condition, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or expose sensitive information (kernel memory).
(CVE-2023-1855)
It was discovered that the ST NCI NFC driver did not properly handle device
removal events. A physically proximate attacker could use this to cause a
denial of service (system crash). (CVE-2023-1990)
Ruihan Li discovered that the bluetooth subsystem in the Linux kernel did
not properly perform permissions checks when handling HCI sockets. A
physically proximate attacker could use this to cause a denial of service
(bluetooth communication). (CVE-2023-2002)
It was discovered that the XFS file system implementation in the Linux
kernel did not properly perform metadata validation when mounting certain
images. An attacker could use this to specially craft a file system image
that, when mounted, could cause a denial of service (system crash).
(CVE-2023-2124)
Juan Jose Lopez Jaimez, Meador Inge, Simon Scannell, and Nenad Stojanovski
discovered that the BPF verifier in the Linux kernel did not properly mark
registers for precision tracking in certain situations, leading to an out-
of-bounds access vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-2163)
It was discovered that the SLIMpro I2C device driver in the Linux kernel
did not properly validate user-supplied data in some situations, leading to
an out-of-bounds write vulnerability. A privileged attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-2194)
It was discovered that the perf subsystem in the Linux kernel contained a
use-after-free vulnerability. A privileged local attacker could possibly
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-2235)
Zheng Zhang discovered that the device-mapper implementation in the Linux
kernel did not properly handle locking during table_clear() operations. A
local attacker could use this to cause a denial of service (kernel
deadlock). (CVE-2023-2269)
It was discovered that the ARM Mali Display Processor driver implementation
in the Linux kernel did not properly handle certain error conditions. A
local attacker could possibly use this to cause a denial of service (system
crash). (CVE-2023-23004)
It was discovered that a race condition existed in the TLS subsystem in the
Linux kernel, leading to a use-after-free or a null pointer dereference
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-28466)
It was discovered that the DA9150 charger driver in the Linux kernel did
not properly handle device removal, leading to a user-after free
vulnerability. A physically proximate attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-30772)
It was discovered that the Ricoh R5C592 MemoryStick card reader driver in
the Linux kernel contained a race condition during module unload, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-3141)
Quentin Minster discovered that the KSMBD implementation in the Linux
kernel did not properly validate pointers in some situations, leading to a
null pointer dereference vulnerability. A remote attacker could use this to
cause a denial of service (system crash). (CVE-2023-32248)
It was discovered that the kernel->user space relay implementation in the
Linux kernel did not properly perform certain buffer calculations, leading
to an out-of-bounds read vulnerability. A local attacker could use this to
cause a denial of service (system crash) or expose sensitive information
(kernel memory). (CVE-2023-3268)
It was discovered that the Qualcomm EMAC ethernet driver in the Linux
kernel did not properly handle device removal, leading to a user-after free
vulnerability. A physically proximate attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-33203)
It was discovered that the BQ24190 charger driver in the Linux kernel did
not properly handle device removal, leading to a user-after free
vulnerability. A physically proximate attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-33288)
It was discovered that the video4linux driver for Philips based TV cards in
the Linux kernel contained a race condition during device removal, leading
to a use-after-free vulnerability. A physically proximate attacker could
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-35823)
It was discovered that the SDMC DM1105 PCI device driver in the Linux
kernel contained a race condition during device removal, leading to a use-
after-free vulnerability. A physically proximate attacker could use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-35824)
It was discovered that the Renesas USB controller driver in the Linux
kernel contained a race condition during device removal, leading to a use-
after-free vulnerability. A privileged attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-35828)
It was discovered that the Rockchip Video Decoder IP driver in the Linux
kernel contained a race condition during device removal, leading to a use-
after-free vulnerability. A privileged attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-35829)
CVEs:
- https://ubuntu.com/security/CVE-2022-4269
- https://ubuntu.com/security/CVE-2022-48502
- https://ubuntu.com/security/CVE-2023-0597
- https://ubuntu.com/security/CVE-2023-1611
- https://ubuntu.com/security/CVE-2023-1855
- https://ubuntu.com/security/CVE-2023-1990
- https://ubuntu.com/security/CVE-2023-2002
- https://ubuntu.com/security/CVE-2023-2124
- https://ubuntu.com/security/CVE-2023-2163
- https://ubuntu.com/security/CVE-2023-2194
- https://ubuntu.com/security/CVE-2023-2235
- https://ubuntu.com/security/CVE-2023-2269
- https://ubuntu.com/security/CVE-2023-23004
- https://ubuntu.com/security/CVE-2023-28466
- https://ubuntu.com/security/CVE-2023-30772
- https://ubuntu.com/security/CVE-2023-3141
- https://ubuntu.com/security/CVE-2023-32248
- https://ubuntu.com/security/CVE-2023-3268
- https://ubuntu.com/security/CVE-2023-33203
- https://ubuntu.com/security/CVE-2023-33288
- https://ubuntu.com/security/CVE-2023-35823
- https://ubuntu.com/security/CVE-2023-35824
- https://ubuntu.com/security/CVE-2023-35828
- https://ubuntu.com/security/CVE-2023-35829
- https://ubuntu.com/security/CVE-2023-33203
- https://ubuntu.com/security/CVE-2023-28466
- https://ubuntu.com/security/CVE-2023-2124
- https://ubuntu.com/security/CVE-2023-2163
- https://ubuntu.com/security/CVE-2023-2235
- https://ubuntu.com/security/CVE-2023-35823
- https://ubuntu.com/security/CVE-2023-32248
- https://ubuntu.com/security/CVE-2023-2002
- https://ubuntu.com/security/CVE-2023-1990
- https://ubuntu.com/security/CVE-2023-1855
- https://ubuntu.com/security/CVE-2023-35828
- https://ubuntu.com/security/CVE-2023-33288
- https://ubuntu.com/security/CVE-2023-3268
- https://ubuntu.com/security/CVE-2023-35824
- https://ubuntu.com/security/CVE-2023-0597
- https://ubuntu.com/security/CVE-2023-2194
- https://ubuntu.com/security/CVE-2022-48502
- https://ubuntu.com/security/CVE-2023-1611
- https://ubuntu.com/security/CVE-2022-4269
- https://ubuntu.com/security/CVE-2023-23004
- https://ubuntu.com/security/CVE-2023-30772
- https://ubuntu.com/security/CVE-2023-3141
- https://ubuntu.com/security/CVE-2023-35829
- https://ubuntu.com/security/CVE-2023-2269
Title: USN-6339-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6339-1
Priorities: medium,low
Description:
It was discovered that the NTFS file system implementation in the Linux
kernel did not properly validate MFT flags in certain situations. An
attacker could use this to construct a malicious NTFS image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2022-48425)
Zi Fan Tan discovered that the binder IPC implementation in the Linux
kernel contained a use-after-free vulnerability. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-21255)
It was discovered that a race condition existed in the f2fs file system in
the Linux kernel, leading to a null pointer dereference vulnerability. An
attacker could use this to construct a malicious f2fs image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2023-2898)
It was discovered that the DVB Core driver in the Linux kernel did not
properly handle locking events in certain situations. A local attacker
could use this to cause a denial of service (kernel deadlock).
(CVE-2023-31084)
Yang Lan discovered that the GFS2 file system implementation in the Linux
kernel could attempt to dereference a null pointer in some situations. An
attacker could use this to construct a malicious GFS2 image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2023-3212)
It was discovered that the KSMBD implementation in the Linux kernel did not
properly validate buffer sizes in certain operations, leading to an out-of-
bounds read vulnerability. A remote attacker could use this to cause a
denial of service (system crash) or possibly expose sensitive information.
(CVE-2023-38426, CVE-2023-38428)
It was discovered that the KSMBD implementation in the Linux kernel did not
properly calculate the size of certain buffers. A remote attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-38429)
CVEs:
- https://ubuntu.com/security/CVE-2022-48425
- https://ubuntu.com/security/CVE-2023-21255
- https://ubuntu.com/security/CVE-2023-2898
- https://ubuntu.com/security/CVE-2023-31084
- https://ubuntu.com/security/CVE-2023-3212
- https://ubuntu.com/security/CVE-2023-38426
- https://ubuntu.com/security/CVE-2023-38428
- https://ubuntu.com/security/CVE-2023-38429
- https://ubuntu.com/security/CVE-2023-2898
- https://ubuntu.com/security/CVE-2023-38428
- https://ubuntu.com/security/CVE-2023-21255
- https://ubuntu.com/security/CVE-2023-38426
- https://ubuntu.com/security/CVE-2023-3212
- https://ubuntu.com/security/CVE-2023-38429
- https://ubuntu.com/security/CVE-2023-31084
- https://ubuntu.com/security/CVE-2022-48425
Title: USN-6343-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6343-1
Priorities: medium,high
Description:
It was discovered that the IPv6 implementation in the Linux kernel
contained a high rate of hash collisions in connection lookup table. A
remote attacker could use this to cause a denial of service (excessive CPU
consumption). (CVE-2023-1206)
Ross Lagerwall discovered that the Xen netback backend driver in the Linux
kernel did not properly handle certain unusual packets from a
paravirtualized network frontend, leading to a buffer overflow. An attacker
in a guest VM could use this to cause a denial of service (host system
crash) or possibly execute arbitrary code. (CVE-2023-34319)
It was discovered that the bluetooth subsystem in the Linux kernel did not
properly handle L2CAP socket release, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-40283)
It was discovered that some network classifier implementations in the Linux
kernel contained use-after-free vulnerabilities. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-4128)
Andy Nguyen discovered that the KVM implementation for AMD processors in
the Linux kernel with Secure Encrypted Virtualization (SEV) contained a
race condition when accessing the GHCB page. A local attacker in a SEV
guest VM could possibly use this to cause a denial of service (host system
crash). (CVE-2023-4155)
It was discovered that the TUN/TAP driver in the Linux kernel did not
properly initialize socket data. A local attacker could use this to cause a
denial of service (system crash). (CVE-2023-4194)
Maxim Suhanov discovered that the exFAT file system implementation in the
Linux kernel did not properly check a file name length, leading to an out-
of-bounds write vulnerability. An attacker could use this to construct a
malicious exFAT image that, when mounted and operated on, could cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-4273)
CVEs:
- https://ubuntu.com/security/CVE-2023-1206
- https://ubuntu.com/security/CVE-2023-34319
- https://ubuntu.com/security/CVE-2023-40283
- https://ubuntu.com/security/CVE-2023-4128
- https://ubuntu.com/security/CVE-2023-4155
- https://ubuntu.com/security/CVE-2023-4194
- https://ubuntu.com/security/CVE-2023-4273
- https://ubuntu.com/security/CVE-2023-4273
- https://ubuntu.com/security/CVE-2023-1206
- https://ubuntu.com/security/CVE-2023-4155
- https://ubuntu.com/security/CVE-2023-40283
- https://ubuntu.com/security/CVE-2023-4194
- https://ubuntu.com/security/CVE-2023-34319
- https://ubuntu.com/security/CVE-2023-4128
Title: USN-6319-1: AMD Microcode vulnerability
URL: https://ubuntu.com/security/notices/USN-6319-1
Priorities: medium
Description:
Daniël Trujillo, Johannes Wikner, and Kaveh Razavi discovered that some AMD
processors utilising speculative execution and branch prediction may allow
unauthorised memory reads via a speculative side-channel attack. A local
attacker could use this to expose sensitive information, including kernel
memory.
CVEs:
- https://ubuntu.com/security/CVE-2023-20569
Title: USN-6338-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6338-1
Priorities: medium,low
Description:
Zi Fan Tan discovered that the binder IPC implementation in the Linux
kernel contained a use-after-free vulnerability. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-21255)
It was discovered that a race condition existed in the f2fs file system in
the Linux kernel, leading to a null pointer dereference vulnerability. An
attacker could use this to construct a malicious f2fs image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2023-2898)
It was discovered that the DVB Core driver in the Linux kernel did not
properly handle locking events in certain situations. A local attacker
could use this to cause a denial of service (kernel deadlock).
(CVE-2023-31084)
Quentin Minster discovered that the KSMBD implementation in the Linux
kernel did not properly handle session setup requests. A remote attacker
could possibly use this to cause a denial of service (memory exhaustion).
(CVE-2023-32247)
Quentin Minster discovered that a race condition existed in the KSMBD
implementation in the Linux kernel when handling sessions operations. A
remote attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-32250, CVE-2023-32252,
CVE-2023-32257)
It was discovered that a race condition existed in the KSMBD implementation
in the Linux kernel when handling session connections, leading to a use-
after-free vulnerability. A remote attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-32258)
It was discovered that the KSMBD implementation in the Linux kernel did not
properly validate buffer sizes in certain operations, leading to an out-of-
bounds read vulnerability. A remote attacker could use this to cause a
denial of service (system crash) or possibly expose sensitive information.
(CVE-2023-38426, CVE-2023-38428)
It was discovered that the KSMBD implementation in the Linux kernel did not
properly calculate the size of certain buffers. A remote attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-38429)
CVEs:
- https://ubuntu.com/security/CVE-2023-21255
- https://ubuntu.com/security/CVE-2023-2898
- https://ubuntu.com/security/CVE-2023-31084
- https://ubuntu.com/security/CVE-2023-32247
- https://ubuntu.com/security/CVE-2023-32250
- https://ubuntu.com/security/CVE-2023-32252
- https://ubuntu.com/security/CVE-2023-32257
- https://ubuntu.com/security/CVE-2023-32258
- https://ubuntu.com/security/CVE-2023-38426
- https://ubuntu.com/security/CVE-2023-38428
- https://ubuntu.com/security/CVE-2023-38429
- https://ubuntu.com/security/CVE-2023-38426
- https://ubuntu.com/security/CVE-2023-32250
- https://ubuntu.com/security/CVE-2023-32257
- https://ubuntu.com/security/CVE-2023-32252
- https://ubuntu.com/security/CVE-2023-21255
- https://ubuntu.com/security/CVE-2023-32258
- https://ubuntu.com/security/CVE-2023-38429
- https://ubuntu.com/security/CVE-2023-2898
- https://ubuntu.com/security/CVE-2023-38428
- https://ubuntu.com/security/CVE-2023-32247
- https://ubuntu.com/security/CVE-2023-31084
Title: LSN-0097-1: Kernel Live Patch Security Notice
URL: https://ubuntu.com/security/notices/LSN-0097-1
Priorities: high
Description:
It was discovered that the IP-VLAN network driver for the Linux kernel did
not properly initialize memory in some situations, leading to an out-of-
bounds write vulnerability. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code.(CVE-2023-3090)
Querijn Voet discovered that a race condition existed in the io_uring
subsystem in the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code.(CVE-2023-3389)
It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle some error conditions, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code.(CVE-2023-3390)
Mingi Cho discovered that the netfilter subsystem in the Linux kernel did
not properly validate the status of a nft chain while performing a lookup
by id, leading to a use-after-free vulnerability. An attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code.(CVE-2023-31248)
Shir Tamari and Sagi Tzadik discovered that the OverlayFS implementation in
the Ubuntu Linux kernel did not properly perform permission checks in
certain situations. A local attacker could possibly use this to gain
elevated privileges.(CVE-2023-32629)
Tanguy Dubroca discovered that the netfilter subsystem in the Linux kernel
did not properly handle certain pointer data type, leading to an out-of-
bounds write vulnerability. A privileged attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.(CVE-2023-35001)
Hangyu Hua discovered that the Flower classifier implementation in the
Linux kernel contained an out-of-bounds write vulnerability. An attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code.(CVE-2023-35788)
CVEs:
- https://ubuntu.com/security/CVE-2023-3090
- https://ubuntu.com/security/CVE-2023-3389
- https://ubuntu.com/security/CVE-2023-3390
- https://ubuntu.com/security/CVE-2023-31248
- https://ubuntu.com/security/CVE-2023-32629
- https://ubuntu.com/security/CVE-2023-35001
- https://ubuntu.com/security/CVE-2023-35788
- https://ubuntu.com/security/CVE-2023-31248
- https://ubuntu.com/security/CVE-2023-32629
- https://ubuntu.com/security/CVE-2023-3090
- https://ubuntu.com/security/CVE-2023-3390
- https://ubuntu.com/security/CVE-2023-35788
- https://ubuntu.com/security/CVE-2023-35001
- https://ubuntu.com/security/CVE-2023-3389
Title: USN-6323-1: FRR vulnerability
URL: https://ubuntu.com/security/notices/USN-6323-1
Priorities: medium
Description:
Ben Cartwright-Cox discovered that FRR did not handle RFC 7606
attributes properly. A remote attacker could possibly use this to
cause denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-31490
Title: USN-6345-1: SoX vulnerability
URL: https://ubuntu.com/security/notices/USN-6345-1
Priorities: medium
Description:
It was discovered that SoX incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, an attacker could possibly use this issue to cause a denial
of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-32627
Title: USN-6333-1: Thunderbird vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6333-1
Priorities: medium
Description:
Junsung Lee discovered that Thunderbird did not properly validate the text
direction override unicode character in filenames. An attacker could
potentially exploits this issue by spoofing file extension while attaching
a file in emails. (CVE-2023-3417)
Max Vlasov discovered that Thunderbird Offscreen Canvas did not properly
track cross-origin tainting. An attacker could potentially exploit this
issue to access image data from another site in violation of same-origin
policy. (CVE-2023-4045)
Alexander Guryanov discovered that Thunderbird did not properly update the
value of a global variable in WASM JIT analysis in some circumstances. An
attacker could potentially exploit this issue to cause a denial of service.
(CVE-2023-4046)
Mark Brand discovered that Thunderbird did not properly validate the size
of an untrusted input stream. An attacker could potentially exploit this
issue to cause a denial of service. (CVE-2023-4050)
Multiple security issues were discovered in Thunderbird. If a user were
tricked into opening a specially crafted website in a browsing context, an
attacker could potentially exploit these to cause a denial of service,
obtain sensitive information, bypass security restrictions, cross-site
tracing, or execute arbitrary code. (CVE-2023-4047, CVE-2023-4048,
CVE-2023-4049, CVE-2023-4055, CVE-2023-4056)
CVEs:
- https://ubuntu.com/security/CVE-2023-3417
- https://ubuntu.com/security/CVE-2023-4045
- https://ubuntu.com/security/CVE-2023-4046
- https://ubuntu.com/security/CVE-2023-4050
- https://ubuntu.com/security/CVE-2023-4047
- https://ubuntu.com/security/CVE-2023-4048
- https://ubuntu.com/security/CVE-2023-4049
- https://ubuntu.com/security/CVE-2023-4055
- https://ubuntu.com/security/CVE-2023-4056
- https://ubuntu.com/security/CVE-2023-4049
- https://ubuntu.com/security/CVE-2023-4056
- https://ubuntu.com/security/CVE-2023-4047
- https://ubuntu.com/security/CVE-2023-4045
- https://ubuntu.com/security/CVE-2023-4050
- https://ubuntu.com/security/CVE-2023-4046
- https://ubuntu.com/security/CVE-2023-3417
- https://ubuntu.com/security/CVE-2023-4048
- https://ubuntu.com/security/CVE-2023-4055
Title: USN-6307-1: JOSE for C/C++ vulnerability
URL: https://ubuntu.com/security/notices/USN-6307-1
Priorities: medium
Description:
It was discovered that JOSE for C/C++ AES GCM decryption routine incorrectly
uses the Tag length from the actual Authentication Tag provided in the JWE.
An attacker could use this to cause a denial of service (system crash) or
might expose sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2023-37464
Title: USN-6305-1: PHP vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6305-1
Priorities: medium
Description:
It was discovered that PHP incorrectly handled certain XML files.
An attacker could possibly use this issue to expose sensitive information.
(CVE-2023-3823)
It was discovered that PHP incorrectly handled certain PHAR files.
An attacker could possibly use this issue to cause a crash,
expose sensitive information or execute arbitrary code.
(CVE-2023-3824)
CVEs:
- https://ubuntu.com/security/CVE-2023-3823
- https://ubuntu.com/security/CVE-2023-3824
- https://ubuntu.com/security/CVE-2023-3824
- https://ubuntu.com/security/CVE-2023-3823
Available in VMware Tanzu Network
Release Date: August 29, 2023
BOSH Agent Version: 2.572.0
Title: USN-6295-1: Podman vulnerability
URL: https://ubuntu.com/security/notices/USN-6295-1
Priorities: medium
Description:
It was discovered that Podman incorrectly handled certain supplementary groups.
An attacker could possibly use this issue to expose sensitive information
or execute binary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-2989
Title: USN-6286-1: Intel Microcode vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6286-1
Priorities: medium
Description:
Daniel Moghimi discovered that some Intel(R) Processors did not properly clear
microarchitectural state after speculative execution of various instructions. A
local unprivileged user could use this to obtain to sensitive
information. (CVE-2022-40982)
It was discovered that some Intel(R) Xeon(R) Processors did not properly
restrict error injection for Intel(R) SGX or Intel(R) TDX. A local privileged
user could use this to further escalate their privileges. (CVE-2022-41804)
It was discovered that some 3rd Generation Intel(R) Xeon(R) Scalable processors
did not properly restrict access in some situations. A local privileged attacker
could use this to obtain sensitive information. (CVE-2023-23908)
CVEs:
- https://ubuntu.com/security/CVE-2022-40982
- https://ubuntu.com/security/CVE-2022-41804
- https://ubuntu.com/security/CVE-2023-23908
- https://ubuntu.com/security/CVE-2022-40982
- https://ubuntu.com/security/CVE-2023-23908
- https://ubuntu.com/security/CVE-2022-41804
Title: USN-6290-1: LibTIFF vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6290-1
Priorities: medium,low
Description:
It was discovered that LibTIFF could be made to write out of bounds when
processing certain malformed image files with the tiffcrop utility. If a
user were tricked into opening a specially crafted image file, an attacker
could possibly use this issue to cause tiffcrop to crash, resulting in a
denial of service, or possibly execute arbitrary code. This issue only
affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS.
(CVE-2022-48281)
It was discovered that LibTIFF incorrectly handled certain image files. If
a user were tricked into opening a specially crafted image file, an
attacker could possibly use this issue to cause a denial of service. This
issue only affected Ubuntu 23.04. (CVE-2023-2731)
It was discovered that LibTIFF incorrectly handled certain image files
with the tiffcp utility. If a user were tricked into opening a specially
crafted image file, an attacker could possibly use this issue to cause
tiffcp to crash, resulting in a denial of service. (CVE-2023-2908)
It was discovered that LibTIFF incorrectly handled certain file paths. If
a user were tricked into specifying certain output paths, an attacker
could possibly use this issue to cause a denial of service. This issue
only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-3316)
It was discovered that LibTIFF could be made to write out of bounds when
processing certain malformed image files. If a user were tricked into
opening a specially crafted image file, an attacker could possibly use
this issue to cause a denial of service, or possibly execute arbitrary
code. (CVE-2023-3618)
It was discovered that LibTIFF could be made to write out of bounds when
processing certain malformed image files. If a user were tricked into
opening a specially crafted image file, an attacker could possibly use
this issue to cause a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and
Ubuntu 23.04. (CVE-2023-25433, CVE-2023-26966)
It was discovered that LibTIFF did not properly managed memory when
processing certain malformed image files with the tiffcrop utility. If a
user were tricked into opening a specially crafted image file, an attacker
could possibly use this issue to cause tiffcrop to crash, resulting in a
denial of service, or possibly execute arbitrary code. This issue only
affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 23.04.
(CVE-2023-26965)
It was discovered that LibTIFF contained an arithmetic overflow. If a user
were tricked into opening a specially crafted image file, an attacker
could possibly use this issue to cause a denial of service.
(CVE-2023-38288, CVE-2023-38289)
CVEs:
- https://ubuntu.com/security/CVE-2022-48281
- https://ubuntu.com/security/CVE-2023-2731
- https://ubuntu.com/security/CVE-2023-2908
- https://ubuntu.com/security/CVE-2023-3316
- https://ubuntu.com/security/CVE-2023-3618
- https://ubuntu.com/security/CVE-2023-25433
- https://ubuntu.com/security/CVE-2023-26966
- https://ubuntu.com/security/CVE-2023-26965
- https://ubuntu.com/security/CVE-2023-38288
- https://ubuntu.com/security/CVE-2023-38289
- https://ubuntu.com/security/CVE-2022-48281
- https://ubuntu.com/security/CVE-2023-2908
- https://ubuntu.com/security/CVE-2023-3316
- https://ubuntu.com/security/CVE-2023-3618
- https://ubuntu.com/security/CVE-2023-38288
- https://ubuntu.com/security/CVE-2023-25433
- https://ubuntu.com/security/CVE-2023-38289
- https://ubuntu.com/security/CVE-2023-2731
- https://ubuntu.com/security/CVE-2023-26966
- https://ubuntu.com/security/CVE-2023-26965
Title: USN-6293-1: OpenStack Heat vulnerability
URL: https://ubuntu.com/security/notices/USN-6293-1
Priorities: medium
Description:
It was discovered that OpenStack Heat incorrectly handled certain hidden
parameter values. A remote authenticated user could possibly use this issue
to obtain sensitive data.
CVEs:
- https://ubuntu.com/security/CVE-2023-1625
Title: USN-6288-1: MySQL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6288-1
Priorities: medium
Description:
Multiple security issues were discovered in MySQL and this update includes
new upstream MySQL versions to fix these issues.
MySQL has been updated to 8.0.34 in Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and
Ubuntu 23.04.
In addition to security fixes, the updated packages contain bug fixes, new
features, and possibly incompatible changes.
Please see the following for more information:
https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-34.html
https://www.oracle.com/security-alerts/cpujul2023.html
CVEs:
- https://ubuntu.com/security/CVE-2023-22038
- https://ubuntu.com/security/CVE-2023-22005
- https://ubuntu.com/security/CVE-2023-22056
- https://ubuntu.com/security/CVE-2023-22046
- https://ubuntu.com/security/CVE-2023-22008
- https://ubuntu.com/security/CVE-2023-22054
- https://ubuntu.com/security/CVE-2023-22053
- https://ubuntu.com/security/CVE-2023-22058
- https://ubuntu.com/security/CVE-2023-22033
- https://ubuntu.com/security/CVE-2023-22057
- https://ubuntu.com/security/CVE-2023-22048
Title: USN-6289-1: WebKitGTK vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6289-1
Priorities: medium
Description:
Several security issues were discovered in the WebKitGTK Web and JavaScript
engines. If a user were tricked into viewing a malicious website, a remote
attacker could exploit a variety of issues related to web browser security,
including cross-site scripting attacks, denial of service attacks, and
arbitrary code execution.
CVEs:
- https://ubuntu.com/security/CVE-2023-38572
- https://ubuntu.com/security/CVE-2023-38600
- https://ubuntu.com/security/CVE-2023-38592
- https://ubuntu.com/security/CVE-2023-38611
- https://ubuntu.com/security/CVE-2023-38599
- https://ubuntu.com/security/CVE-2023-38133
- https://ubuntu.com/security/CVE-2023-38594
- https://ubuntu.com/security/CVE-2023-38595
- https://ubuntu.com/security/CVE-2023-38597
Title: USN-6294-1: HAProxy vulnerability
URL: https://ubuntu.com/security/notices/USN-6294-1
Priorities: medium
Description:
Ben Kallus discovered that HAProxy incorrectly handled empty Content-Length
headers. A remote attacker could possibly use this issue to manipulate the
payload and bypass certain restrictions.
CVEs:
- https://ubuntu.com/security/CVE-2023-40225
Available in VMware Tanzu Network
Release Date: August 14, 2023
BOSH Agent Version: 2.568.0
Title: USN-6277-2: Dompdf vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6277-2
Priorities: low,medium
Description:
USN-6277-1 fixed vulnerabilities in Dompdf. This update provides the
corresponding updates for Ubuntu 22.04 LTS.
Original advisory details:
It was discovered that Dompdf was not properly validating untrusted input when
processing HTML content under certain circumstances. An attacker could
possibly use this issue to expose sensitive information or execute arbitrary
code. This issue only affected Ubuntu 16.04 LTS.
(CVE-2014-5011, CVE-2014-5012, CVE-2014-5013)
It was discovered that Dompdf was not properly validating processed HTML
content that referenced PHAR files, which could result in the deserialization
of untrusted data. An attacker could possibly use this issue to execute
arbitrary code. (CVE-2021-3838)
It was discovered that Dompdf was not properly validating processed HTML
content that referenced both a remote base and a local file, which could
result in the bypass of a chroot check. An attacker could possibly use this
issue to expose sensitive information. (CVE-2022-2400)
CVEs:
- https://ubuntu.com/security/CVE-2014-5011
- https://ubuntu.com/security/CVE-2014-5012
- https://ubuntu.com/security/CVE-2014-5013
- https://ubuntu.com/security/CVE-2021-3838
- https://ubuntu.com/security/CVE-2022-2400
- https://ubuntu.com/security/CVE-2021-3838
- https://ubuntu.com/security/CVE-2022-2400
Title: USN-6273-1: poppler vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6273-1
Priorities: low,medium
Description:
Jieyong Ma discovered that poppler incorrectly handled certain malformed
PDF files. A remote attacker could possibly use this issue to cause poppler
to crash, resulting in a denial of service. This issue only affected Ubuntu
20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-27337)
It was discovered that poppler incorrectly handled certain malformed PDF
files. A remote attacker could possibly use this issue to cause poppler to
crash, resulting in a denial of service. This issue only affected Ubuntu
22.04 LTS and Ubuntu 23.04. (CVE-2023-34872)
CVEs:
- https://ubuntu.com/security/CVE-2022-27337
- https://ubuntu.com/security/CVE-2023-34872
- https://ubuntu.com/security/CVE-2022-27337
- https://ubuntu.com/security/CVE-2023-34872
Title: USN-6285-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6285-1
Priorities: medium,high,low
Description:
It was discovered that the NTFS file system implementation in the Linux
kernel did not properly check buffer indexes in certain situations, leading
to an out-of-bounds read vulnerability. A local attacker could possibly use
this to expose sensitive information (kernel memory). (CVE-2022-48502)
Stonejiajia, Shir Tamari and Sagi Tzadik discovered that the OverlayFS
implementation in the Ubuntu Linux kernel did not properly perform
permission checks in certain situations. A local attacker could possibly
use this to gain elevated privileges. (CVE-2023-2640)
It was discovered that a race condition existed in the f2fs file system in
the Linux kernel, leading to a null pointer dereference vulnerability. An
attacker could use this to construct a malicious f2fs image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2023-2898)
Mingi Cho discovered that the netfilter subsystem in the Linux kernel did
not properly validate the status of a nft chain while performing a lookup
by id, leading to a use-after-free vulnerability. An attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-31248)
Shir Tamari and Sagi Tzadik discovered that the OverlayFS implementation in
the Ubuntu Linux kernel did not properly perform permission checks in
certain situations. A local attacker could possibly use this to gain
elevated privileges. (CVE-2023-32629)
It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle some error conditions, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3390)
Tanguy Dubroca discovered that the netfilter subsystem in the Linux kernel
did not properly handle certain pointer data type, leading to an out-of-
bounds write vulnerability. A privileged attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-35001)
It was discovered that the universal 32bit network packet classifier
implementation in the Linux kernel did not properly perform reference
counting in some situations, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-3609)
It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle certain error conditions, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3610)
It was discovered that the Quick Fair Queueing network scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3611)
It was discovered that the network packet classifier with
netfilter/firewall marks implementation in the Linux kernel did not
properly handle reference counting, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3776)
Chih-Yen Chang discovered that the KSMBD implementation in the Linux kernel
did not properly validate SMB request protocol IDs, leading to a out-of-
bounds read vulnerability. A remote attacker could possibly use this to
cause a denial of service (system crash). (CVE-2023-38430)
Chih-Yen Chang discovered that the KSMBD implementation in the Linux kernel
did not properly validate command payload size, leading to a out-of-bounds
read vulnerability. A remote attacker could possibly use this to cause a
denial of service (system crash). (CVE-2023-38432)
It was discovered that the NFC implementation in the Linux kernel contained
a use-after-free vulnerability when performing peer-to-peer communication
in certain conditions. A privileged attacker could use this to cause a
denial of service (system crash) or possibly expose sensitive information
(kernel memory). (CVE-2023-3863)
CVEs:
- https://ubuntu.com/security/CVE-2022-48502
- https://ubuntu.com/security/CVE-2023-2640
- https://ubuntu.com/security/CVE-2023-2898
- https://ubuntu.com/security/CVE-2023-31248
- https://ubuntu.com/security/CVE-2023-32629
- https://ubuntu.com/security/CVE-2023-3390
- https://ubuntu.com/security/CVE-2023-35001
- https://ubuntu.com/security/CVE-2023-3609
- https://ubuntu.com/security/CVE-2023-3610
- https://ubuntu.com/security/CVE-2023-3611
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-38430
- https://ubuntu.com/security/CVE-2023-38432
- https://ubuntu.com/security/CVE-2023-3863
- https://ubuntu.com/security/CVE-2023-38430
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-2898
- https://ubuntu.com/security/CVE-2022-48502
- https://ubuntu.com/security/CVE-2023-3611
- https://ubuntu.com/security/CVE-2023-3863
- https://ubuntu.com/security/CVE-2023-32629
- https://ubuntu.com/security/CVE-2023-3610
- https://ubuntu.com/security/CVE-2023-31248
- https://ubuntu.com/security/CVE-2023-2640
- https://ubuntu.com/security/CVE-2023-3390
- https://ubuntu.com/security/CVE-2023-38432
- https://ubuntu.com/security/CVE-2023-35001
- https://ubuntu.com/security/CVE-2023-3609
Title: USN-6260-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6260-1
Priorities: medium,high,low
Description:
It was discovered that the NTFS file system implementation in the Linux
kernel did not properly check buffer indexes in certain situations, leading
to an out-of-bounds read vulnerability. A local attacker could possibly use
this to expose sensitive information (kernel memory). (CVE-2022-48502)
Stonejiajia, Shir Tamari and Sagi Tzadik discovered that the OverlayFS
implementation in the Ubuntu Linux kernel did not properly perform
permission checks in certain situations. A local attacker could possibly
use this to gain elevated privileges. (CVE-2023-2640)
It was discovered that the IP-VLAN network driver for the Linux kernel did
not properly initialize memory in some situations, leading to an out-of-
bounds write vulnerability. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2023-3090)
Mingi Cho discovered that the netfilter subsystem in the Linux kernel did
not properly validate the status of a nft chain while performing a lookup
by id, leading to a use-after-free vulnerability. An attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-31248)
It was discovered that the Ricoh R5C592 MemoryStick card reader driver in
the Linux kernel contained a race condition during module unload, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-3141)
Shir Tamari and Sagi Tzadik discovered that the OverlayFS implementation in
the Ubuntu Linux kernel did not properly perform permission checks in
certain situations. A local attacker could possibly use this to gain
elevated privileges. (CVE-2023-32629)
Querijn Voet discovered that a race condition existed in the io_uring
subsystem in the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-3389)
It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle some error conditions, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3390)
Tanguy Dubroca discovered that the netfilter subsystem in the Linux kernel
did not properly handle certain pointer data type, leading to an out-of-
bounds write vulnerability. A privileged attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-35001)
CVEs:
- https://ubuntu.com/security/CVE-2022-48502
- https://ubuntu.com/security/CVE-2023-2640
- https://ubuntu.com/security/CVE-2023-3090
- https://ubuntu.com/security/CVE-2023-31248
- https://ubuntu.com/security/CVE-2023-3141
- https://ubuntu.com/security/CVE-2023-32629
- https://ubuntu.com/security/CVE-2023-3389
- https://ubuntu.com/security/CVE-2023-3390
- https://ubuntu.com/security/CVE-2023-35001
- https://ubuntu.com/security/CVE-2023-31248
- https://ubuntu.com/security/CVE-2023-3389
- https://ubuntu.com/security/CVE-2023-35001
- https://ubuntu.com/security/CVE-2023-3141
- https://ubuntu.com/security/CVE-2023-3090
- https://ubuntu.com/security/CVE-2023-32629
- https://ubuntu.com/security/CVE-2023-2640
- https://ubuntu.com/security/CVE-2023-3390
- https://ubuntu.com/security/CVE-2022-48502
Title: USN-6257-1: Open VM Tools vulnerability
URL: https://ubuntu.com/security/notices/USN-6257-1
Priorities: low
Description:
It was discovered that Open VM Tools incorrectly handled certain
authentication requests. A fully compromised ESXi host can force Open VM
Tools to fail to authenticate host-to-guest operations, impacting the
confidentiality and integrity of the guest virtual machine. (CVE-2023-20867)
CVEs:
- https://ubuntu.com/security/CVE-2023-20867
- https://ubuntu.com/security/CVE-2023-20867
Title: USN-6263-1: OpenJDK vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6263-1
Priorities: medium,low
Description:
Motoyasu Saburi discovered that OpenJDK incorrectly handled special
characters in file name parameters. An attacker could possibly use
this issue to insert, edit or obtain sensitive information. This issue
only affected OpenJDK 11 and OpenJDK 17. (CVE-2023-22006)
Eirik Bjørsnøs discovered that OpenJDK incorrectly handled certain ZIP
archives. An attacker could possibly use this issue to cause a denial
of service. This issue only affected OpenJDK 11 and OpenJDK 17.
(CVE-2023-22036)
David Stancu discovered that OpenJDK had a flaw in the AES cipher
implementation. An attacker could possibly use this issue to obtain
sensitive information. This issue only affected OpenJDK 11 and OpenJDK 17.
(CVE-2023-22041)
Zhiqiang Zang discovered that OpenJDK incorrectly handled array accesses
when using the binary ‘%’ operator. An attacker could possibly use this
issue to obtain sensitive information. This issue only affected OpenJDK 17.
(CVE-2023-22044)
Zhiqiang Zang discovered that OpenJDK incorrectly handled array accesses.
An attacker could possibly use this issue to obtain sensitive information.
(CVE-2023-22045)
It was discovered that OpenJDK incorrectly sanitized URIs strings. An
attacker could possibly use this issue to insert, edit or obtain sensitive
information. (CVE-2023-22049)
It was discovered that OpenJDK incorrectly handled certain glyphs. An
attacker could possibly use this issue to cause a denial of service.
This issue only affected OpenJDK 11 and OpenJDK 17.
(CVE-2023-25193)
CVEs:
- https://ubuntu.com/security/CVE-2023-22006
- https://ubuntu.com/security/CVE-2023-22036
- https://ubuntu.com/security/CVE-2023-22041
- https://ubuntu.com/security/CVE-2023-22044
- https://ubuntu.com/security/CVE-2023-22045
- https://ubuntu.com/security/CVE-2023-22049
- https://ubuntu.com/security/CVE-2023-25193
- https://ubuntu.com/security/CVE-2023-22045
- https://ubuntu.com/security/CVE-2023-22036
- https://ubuntu.com/security/CVE-2023-22044
- https://ubuntu.com/security/CVE-2023-25193
- https://ubuntu.com/security/CVE-2023-22049
- https://ubuntu.com/security/CVE-2023-22006
- https://ubuntu.com/security/CVE-2023-22041
Title: USN-6258-1: LLVM Toolchain vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6258-1
Priorities: medium
Description:
It was discovered that LLVM Toolchain did not properly manage memory under
certain circumstances. If a user were tricked into opening a specially
crafted MLIR file, an attacker could possibly use this issue to cause LLVM
Toolchain to crash, resulting in a denial of service. (CVE-2023-29932,
CVE-2023-29934, CVE-2023-29939)
It was discovered that LLVM Toolchain did not properly manage memory under
certain circumstances. If a user were tricked into opening a specially
crafted MLIR file, an attacker could possibly use this issue to cause LLVM
Toolchain to crash, resulting in a denial of service. This issue only
affected llvm-toolchain-15. (CVE-2023-29933)
CVEs:
- https://ubuntu.com/security/CVE-2023-29932
- https://ubuntu.com/security/CVE-2023-29934
- https://ubuntu.com/security/CVE-2023-29939
- https://ubuntu.com/security/CVE-2023-29933
- https://ubuntu.com/security/CVE-2023-29939
- https://ubuntu.com/security/CVE-2023-29934
- https://ubuntu.com/security/CVE-2023-29932
- https://ubuntu.com/security/CVE-2023-29933
Title: USN-6264-1: WebKitGTK vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6264-1
Priorities: medium
Description:
Several security issues were discovered in the WebKitGTK Web and JavaScript
engines. If a user were tricked into viewing a malicious website, a remote
attacker could exploit a variety of issues related to web browser security,
including cross-site scripting attacks, denial of service attacks, and
arbitrary code execution.
CVEs:
- https://ubuntu.com/security/CVE-2023-32393
- https://ubuntu.com/security/CVE-2023-37450
- https://ubuntu.com/security/CVE-2023-32435
- https://ubuntu.com/security/CVE-2023-32373
- https://ubuntu.com/security/CVE-2023-32439
- https://ubuntu.com/security/CVE-2023-28204
Title: USN-6249-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6249-1
Priorities: medium,high
Description:
Ruihan Li discovered that the memory management subsystem in the Linux
kernel contained a race condition when accessing VMAs in certain
conditions, leading to a use-after-free vulnerability. A local attacker
could possibly use this to cause a denial of service (system crash) or
execute arbitrary code. (CVE-2023-3269)
Querijn Voet discovered that a race condition existed in the io_uring
subsystem in the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-3389)
CVEs:
- https://ubuntu.com/security/CVE-2023-3269
- https://ubuntu.com/security/CVE-2023-3389
- https://ubuntu.com/security/CVE-2023-3389
- https://ubuntu.com/security/CVE-2023-3269
Title: USN-6278-2: .NET vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6278-2
Priorities: medium
Description:
USN-6278-1 fixed several vulnerabilities in .NET. This update
provides the corresponding updates for Ubuntu 22.04 LTS.
Original advisory details:
It was discovered that .NET did properly handle the execution of
certain commands. An attacker could possibly use this issue to
achieve remote code execution. (CVE-2023-35390)
Benoit Foucher discovered that .NET did not properly implement the
QUIC stream limit in HTTP/3. An attacker could possibly use this
issue to cause a denial of service. (CVE-2023-38178)
It was discovered that .NET did not properly handle the disconnection
of potentially malicious clients interfacing with a Kestrel server. An
attacker could possibly use this issue to cause a denial of service.
(CVE-2023-38180)
CVEs:
- https://ubuntu.com/security/CVE-2023-35390
- https://ubuntu.com/security/CVE-2023-38178
- https://ubuntu.com/security/CVE-2023-38180
- https://ubuntu.com/security/CVE-2023-38180
- https://ubuntu.com/security/CVE-2023-35390
- https://ubuntu.com/security/CVE-2023-38178
Title: USN-6269-1: GStreamer Good Plugins vulnerability
URL: https://ubuntu.com/security/notices/USN-6269-1
Priorities: medium
Description:
It was discovered that GStreamer Good Plugins incorrectly handled certain
FLAC image tags. A remote attacker could use this issue to cause GStreamer
Good Plugins to crash, resulting in a denial of service, or possibly
execute arbitrary code. (CVE-2023-37327)
CVEs:
- https://ubuntu.com/security/CVE-2023-37327
- https://ubuntu.com/security/CVE-2023-37327
Title: USN-6268-1: GStreamer Base Plugins vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6268-1
Priorities: medium
Description:
It was discovered that GStreamer Base Plugins incorrectly handled certain
FLAC image tags. A remote attacker could use this issue to cause GStreamer
Base Plugins to crash, resulting in a denial of service, or possibly
execute arbitrary code. (CVE-2023-37327)
It was discovered that GStreamer Base Plugins incorrectly handled certain
subtitles. A remote attacker could use this issue to cause GStreamer Base
Plugins to crash, resulting in a denial of service, or possibly execute
arbitrary code. (CVE-2023-37328)
CVEs:
- https://ubuntu.com/security/CVE-2023-37327
- https://ubuntu.com/security/CVE-2023-37328
- https://ubuntu.com/security/CVE-2023-37328
- https://ubuntu.com/security/CVE-2023-37327
Title: USN-6266-1: librsvg vulnerability
URL: https://ubuntu.com/security/notices/USN-6266-1
Priorities: medium
Description:
Zac Sims discovered that librsvg incorrectly handled decoding URLs. A
remote attacker could possibly use this issue to read arbitrary files by
using an include element.
CVEs:
- https://ubuntu.com/security/CVE-2023-38633
Available in VMware Tanzu Network
Release Date: July 26, 2023
BOSH Agent Version: 2.560.0
Title: USN-6243-1: Graphite-Web vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6243-1
Priorities: medium
Description:
It was discovered that Graphite-Web incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to perform
server-side request forgery and obtain sensitive information. This issue
only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2017-18638)
It was discovered that Graphite-Web incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to perform
cross site scripting and obtain sensitive information. (CVE-2022-4728,
CVE-2022-4729, CVE-2022-4730)
CVEs:
- https://ubuntu.com/security/CVE-2017-18638
- https://ubuntu.com/security/CVE-2022-4728
- https://ubuntu.com/security/CVE-2022-4729
- https://ubuntu.com/security/CVE-2022-4730
- https://ubuntu.com/security/CVE-2022-4730
- https://ubuntu.com/security/CVE-2017-18638
- https://ubuntu.com/security/CVE-2022-4728
- https://ubuntu.com/security/CVE-2022-4729
Title: USN-6244-1: AMD Microcode vulnerability
URL: https://ubuntu.com/security/notices/USN-6244-1
Priorities: high
Description:
Tavis Ormandy discovered that some AMD processors did not properly handle
speculative execution of certain vector register instructions. A local attacker
could use this to expose sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2023-20593
Title: USN-6241-1: OpenStack vulnerability
URL: https://ubuntu.com/security/notices/USN-6241-1
Priorities: medium
Description:
Jan Wasilewski and Gorka Eguileor discovered that OpenStack incorrectly
handled deleted volume attachments. An authenticated user or attacker could
possibly use this issue to gain access to sensitive information.
This update may require configuration changes, please see the upstream
advisory and the other links below for more information:
https://security.openstack.org/ossa/OSSA-2023-003.html
https://discourse.ubuntu.com/t/cve-2023-2088-for-charmed-openstack/37051
https://lists.openstack.org/pipermail/openstack-discuss/2023-July/034439.html
CVEs:
- https://ubuntu.com/security/CVE-2023-2088
Title: USN-6246-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6246-1
Priorities: high,medium
Description:
It was discovered that the IP-VLAN network driver for the Linux kernel did
not properly initialize memory in some situations, leading to an out-of-
bounds write vulnerability. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2023-3090)
Mingi Cho discovered that the netfilter subsystem in the Linux kernel did
not properly validate the status of a nft chain while performing a lookup
by id, leading to a use-after-free vulnerability. An attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-31248)
Querijn Voet discovered that a race condition existed in the io_uring
subsystem in the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-3389)
It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle some error conditions, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3390)
Lin Ma discovered that a race condition existed in the MCTP implementation
in the Linux kernel, leading to a use-after-free vulnerability. A
privileged attacker could use this to cause a denial of service (system
crash) or possibly execute arbitrary code. (CVE-2023-3439)
Tanguy Dubroca discovered that the netfilter subsystem in the Linux kernel
did not properly handle certain pointer data type, leading to an out-of-
bounds write vulnerability. A privileged attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-35001)
CVEs:
- https://ubuntu.com/security/CVE-2023-3090
- https://ubuntu.com/security/CVE-2023-31248
- https://ubuntu.com/security/CVE-2023-3389
- https://ubuntu.com/security/CVE-2023-3390
- https://ubuntu.com/security/CVE-2023-3439
- https://ubuntu.com/security/CVE-2023-35001
- https://ubuntu.com/security/CVE-2023-3390
- https://ubuntu.com/security/CVE-2023-3090
- https://ubuntu.com/security/CVE-2023-3389
- https://ubuntu.com/security/CVE-2023-3439
- https://ubuntu.com/security/CVE-2023-31248
- https://ubuntu.com/security/CVE-2023-35001
Available in VMware Tanzu Network
Release Date: July 24, 2023
BOSH Agent Version: 2.560.0
Title: USN-6200-1: ImageMagick vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6200-1
Priorities: negligible,medium,low
Description:
It was discovered that ImageMagick incorrectly handled the “-authenticate”
option for password-protected PDF files. An attacker could possibly use
this issue to inject additional shell commands and perform arbitrary code
execution. This issue only affected Ubuntu 20.04 LTS. (CVE-2020-29599)
It was discovered that ImageMagick incorrectly handled certain values
when processing PDF files. If a user or automated system using ImageMagick
were tricked into opening a specially crafted PDF file, an attacker could
exploit this to cause a denial of service. This issue only affected Ubuntu
20.04 LTS. (CVE-2021-20224)
Zhang Xiaohui discovered that ImageMagick incorrectly handled certain
values when processing image data. If a user or automated system using
ImageMagick were tricked into opening a specially crafted image, an
attacker could exploit this to cause a denial of service. This issue only
affected Ubuntu 20.04 LTS. (CVE-2021-20241, CVE-2021-20243)
It was discovered that ImageMagick incorrectly handled certain values
when processing visual effects based image files. By tricking a user into
opening a specially crafted image file, an attacker could crash the
application causing a denial of service. This issue only affected Ubuntu
20.04 LTS. (CVE-2021-20244, CVE-2021-20309)
It was discovered that ImageMagick incorrectly handled certain values
when performing resampling operations. By tricking a user into opening
a specially crafted image file, an attacker could crash the application
causing a denial of service. This issue only affected Ubuntu 20.04 LTS.
(CVE-2021-20246)
It was discovered that ImageMagick incorrectly handled certain values
when processing thumbnail image data. By tricking a user into opening
a specially crafted image file, an attacker could crash the application
causing a denial of service. This issue only affected Ubuntu 20.04 LTS.
(CVE-2021-20312)
It was discovered that ImageMagick incorrectly handled memory cleanup
when performing certain cryptographic operations. Under certain conditions
sensitive cryptographic information could be disclosed. This issue only
affected Ubuntu 20.04 LTS. (CVE-2021-20313)
It was discovered that ImageMagick did not use the correct rights when
specifically excluded by a module policy. An attacker could use this issue
to read and write certain restricted files. This issue only affected Ubuntu
20.04 LTS. (CVE-2021-39212)
It was discovered that ImageMagick incorrectly handled memory under certain
circumstances. If a user were tricked into opening a specially crafted
image file, an attacker could possibly exploit this issue to cause a denial
of service or other unspecified impact. This issue only affected Ubuntu
20.04 LTS. (CVE-2022-28463, CVE-2022-32545, CVE-2022-32546, CVE-2022-32547)
It was discovered that ImageMagick incorrectly handled memory under certain
circumstances. If a user were tricked into opening a specially crafted
image file, an attacker could possibly exploit this issue to cause a denial
of service or other unspecified impact. This issue only affected Ubuntu
22.04 LTS, Ubuntu 22.10, and Ubuntu 23.04. (CVE-2021-3610, CVE-2023-1906,
CVE-2023-3428)
It was discovered that ImageMagick incorrectly handled certain values
when processing specially crafted SVG files. By tricking a user into
opening a specially crafted SVG file, an attacker could crash the
application causing a denial of service. This issue only affected Ubuntu
20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 22.10, and Ubuntu 23.04. (CVE-2023-1289)
It was discovered that ImageMagick incorrectly handled memory under certain
circumstances. If a user were tricked into opening a specially crafted
tiff file, an attacker could possibly exploit this issue to cause a denial
of service or other unspecified impact. This issue only affected Ubuntu
22.04 LTS, Ubuntu 22.10, and Ubuntu 23.04. (CVE-2023-3195)
It was discovered that ImageMagick incorrectly handled memory under certain
circumstances. If a user were tricked into opening a specially crafted
image file, an attacker could possibly exploit this issue to cause a denial
of service or other unspecified impact. (CVE-2023-34151)
CVEs:
- https://ubuntu.com/security/CVE-2020-29599
- https://ubuntu.com/security/CVE-2021-20224
- https://ubuntu.com/security/CVE-2021-20241
- https://ubuntu.com/security/CVE-2021-20243
- https://ubuntu.com/security/CVE-2021-20244
- https://ubuntu.com/security/CVE-2021-20309
- https://ubuntu.com/security/CVE-2021-20246
- https://ubuntu.com/security/CVE-2021-20312
- https://ubuntu.com/security/CVE-2021-20313
- https://ubuntu.com/security/CVE-2021-39212
- https://ubuntu.com/security/CVE-2022-28463
- https://ubuntu.com/security/CVE-2022-32545
- https://ubuntu.com/security/CVE-2022-32546
- https://ubuntu.com/security/CVE-2022-32547
- https://ubuntu.com/security/CVE-2021-3610
- https://ubuntu.com/security/CVE-2023-1906
- https://ubuntu.com/security/CVE-2023-3428
- https://ubuntu.com/security/CVE-2023-1289
- https://ubuntu.com/security/CVE-2023-3195
- https://ubuntu.com/security/CVE-2023-34151
- https://ubuntu.com/security/CVE-2023-1289
- https://ubuntu.com/security/CVE-2021-20243
- https://ubuntu.com/security/CVE-2021-20246
- https://ubuntu.com/security/CVE-2021-3610
- https://ubuntu.com/security/CVE-2021-20224
- https://ubuntu.com/security/CVE-2021-20312
- https://ubuntu.com/security/CVE-2023-3428
- https://ubuntu.com/security/CVE-2021-20313
- https://ubuntu.com/security/CVE-2021-20309
- https://ubuntu.com/security/CVE-2021-39212
- https://ubuntu.com/security/CVE-2021-20241
- https://ubuntu.com/security/CVE-2023-3195
- https://ubuntu.com/security/CVE-2022-32545
- https://ubuntu.com/security/CVE-2022-28463
- https://ubuntu.com/security/CVE-2021-20244
- https://ubuntu.com/security/CVE-2023-1906
- https://ubuntu.com/security/CVE-2023-34151
- https://ubuntu.com/security/CVE-2020-29599
- https://ubuntu.com/security/CVE-2022-32547
- https://ubuntu.com/security/CVE-2022-32546
Title: USN-6236-1: ConnMan vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6236-1
Priorities: medium
Description:
It was discovered that ConnMan could be made to write out of bounds. A
remote attacker could possibly use this issue to cause ConnMan to crash,
resulting in a denial of service, or possibly execute arbitrary code. This
issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS.
(CVE-2021-26675, CVE-2021-33833)
It was discovered that ConnMan could be made to leak sensitive information
via the gdhcp component. A remote attacker could possibly use this issue
to obtain information for further exploitation. This issue only affected
Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS. (CVE-2021-26676)
It was discovered that ConnMan could be made to read out of bounds. A
remote attacker could possibly use this issue to case ConnMan to crash,
resulting in a denial of service. This issue only affected Ubuntu 16.04
LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS.
(CVE-2022-23096, CVE-2022-23097)
It was discovered that ConnMan could be made to run into an infinite loop.
A remote attacker could possibly use this issue to cause ConnMan to
consume resources and to stop operating, resulting in a denial of service.
This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04
LTS, and Ubuntu 22.04 LTS. (CVE-2022-23098)
It was discovered that ConnMan could be made to write out of bounds via
the gweb component. A remote attacker could possibly use this issue to
cause ConnMan to crash, resulting in a denial of service, or possibly
execute arbitrary code. This issue only affected Ubuntu 16.04 LTS, Ubuntu
18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-32292)
It was discovered that ConnMan did not properly manage memory under
certain circumstances. A remote attacker could possibly use this issue to
cause ConnMan to crash, resulting in a denial of service, or possibly
execute arbitrary code. This issue only affected Ubuntu 16.04 LTS, Ubuntu
18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-32293)
It was discovered that ConnMan could be made to write out of bounds via
the gdhcp component. A remote attacker could possibly use this issue to
cause ConnMan to crash, resulting in a denial of service, or possibly
execute arbitrary code. (CVE-2023-28488)
CVEs:
- https://ubuntu.com/security/CVE-2021-26675
- https://ubuntu.com/security/CVE-2021-33833
- https://ubuntu.com/security/CVE-2021-26676
- https://ubuntu.com/security/CVE-2022-23096
- https://ubuntu.com/security/CVE-2022-23097
- https://ubuntu.com/security/CVE-2022-23098
- https://ubuntu.com/security/CVE-2022-32292
- https://ubuntu.com/security/CVE-2022-32293
- https://ubuntu.com/security/CVE-2023-28488
- https://ubuntu.com/security/CVE-2021-26676
- https://ubuntu.com/security/CVE-2022-32293
- https://ubuntu.com/security/CVE-2023-28488
- https://ubuntu.com/security/CVE-2022-23098
- https://ubuntu.com/security/CVE-2021-26675
- https://ubuntu.com/security/CVE-2021-33833
- https://ubuntu.com/security/CVE-2022-23097
- https://ubuntu.com/security/CVE-2022-23096
- https://ubuntu.com/security/CVE-2022-32292
Title: USN-6189-1: etcd vulnerability
URL: https://ubuntu.com/security/notices/USN-6189-1
Priorities: medium
Description:
It was discovered that etcd leaked credentials when debugging
was enabled. This allowed remote attackers to discover etcd
authentication credentials and possibly escalate privileges on
systems using etcd.
CVEs:
- https://ubuntu.com/security/CVE-2021-28235
Title: USN-6195-1: Vim vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6195-1
Priorities: medium,low
Description:
It was discovered that Vim contained an out-of-bounds read vulnerability.
An attacker could possibly use this issue to cause a denial of service or
execute arbitrary code. (CVE-2022-0128)
It was discovered that Vim did not properly manage memory when freeing
allocated memory. An attacker could possibly use this issue to cause a
denial of service or execute arbitrary code. (CVE-2022-0156)
It was discovered that Vim contained a heap-based buffer overflow
vulnerability. An attacker could possibly use this issue to cause a denial
of service or execute arbitrary code. (CVE-2022-0158)
It was discovered that Vim did not properly manage memory when recording
and using select mode. An attacker could possibly use this issue to cause
a denial of service. (CVE-2022-0393)
It was discovered that Vim incorrectly handled certain memory operations
during a visual block yank. An attacker could possibly use this issue to
cause a denial of service or execute arbitrary code. (CVE-2022-0407)
It was discovered that Vim contained a NULL pointer dereference
vulnerability when switching tabpages. An attacker could possible use this
issue to cause a denial of service. (CVE-2022-0696)
CVEs:
- https://ubuntu.com/security/CVE-2022-0128
- https://ubuntu.com/security/CVE-2022-0156
- https://ubuntu.com/security/CVE-2022-0158
- https://ubuntu.com/security/CVE-2022-0393
- https://ubuntu.com/security/CVE-2022-0407
- https://ubuntu.com/security/CVE-2022-0696
- https://ubuntu.com/security/CVE-2022-0696
- https://ubuntu.com/security/CVE-2022-0393
- https://ubuntu.com/security/CVE-2022-0158
- https://ubuntu.com/security/CVE-2022-0407
- https://ubuntu.com/security/CVE-2022-0156
- https://ubuntu.com/security/CVE-2022-0128
Title: USN-6238-1: Samba vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6238-1
Priorities: medium
Description:
It was discovered that Samba incorrectly handled Winbind NTLM
authentication responses. An attacker could possibly use this issue to
cause Samba to crash, resulting in a denial of service. (CVE-2022-2127)
Andreas Schneider discovered that Samba incorrectly enforced SMB2 packet
signing. A remote attacker could possibly use this issue to obtain or
modify sensitive information. This issue only affected Ubuntu 23.04.
(CVE-2023-3347)
Florent Saudel and Arnaud Gatignolof discovered that Samba incorrectly
handled certain Spotlight requests. A remote attacker could possibly use
this issue to cause Samba to consume resources, leading to a denial of
service. (CVE-2023-34966, CVE-2023-34967)
Ralph Boehme and Stefan Metzmacher discovered that Samba incorrectly
handled paths returned by Spotlight requests. A remote attacker could
possibly use this issue to obtain sensitive information. (CVE-2023-34968)
CVEs:
- https://ubuntu.com/security/CVE-2022-2127
- https://ubuntu.com/security/CVE-2023-3347
- https://ubuntu.com/security/CVE-2023-34966
- https://ubuntu.com/security/CVE-2023-34967
- https://ubuntu.com/security/CVE-2023-34968
- https://ubuntu.com/security/CVE-2023-3347
- https://ubuntu.com/security/CVE-2023-34967
- https://ubuntu.com/security/CVE-2023-34968
- https://ubuntu.com/security/CVE-2023-34966
- https://ubuntu.com/security/CVE-2022-2127
Title: USN-6225-1: Knot Resolver vulnerability
URL: https://ubuntu.com/security/notices/USN-6225-1
Priorities: medium
Description:
It was discovered that Knot Resolver did not correctly handle certain
client options. A remote attacker could send requests to malicous domains
and cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2022-40188
Title: USN-6235-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6235-1
Priorities: medium,low,high
Description:
It was discovered that the NTFS file system implementation in the Linux
kernel contained a null pointer dereference in some situations. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2022-4842)
Jordy Zomer and Alexandra Sandulescu discovered that the Linux kernel did
not properly implement speculative execution barriers in usercopy functions
in certain situations. A local attacker could use this to expose sensitive
information (kernel memory). (CVE-2023-0459)
Seth Jenkins discovered that the CPU data to memory implementation for x86
processors in the Linux kernel did not properly perform address
randomization. A local attacker could use this to expose sensitive
information (kernel memory) or in conjunction with another kernel
vulnerability. (CVE-2023-0597)
It was discovered that the Human Interface Device (HID) support driver in
the Linux kernel contained a type confusion vulnerability in some
situations. A local attacker could use this to cause a denial of service
(system crash). (CVE-2023-1073)
It was discovered that the XFS file system implementation in the Linux
kernel did not properly perform metadata validation when mounting certain
images. An attacker could use this to specially craft a file system image
that, when mounted, could cause a denial of service (system crash).
(CVE-2023-2124)
Wei Chen discovered that the InfiniBand RDMA communication manager
implementation in the Linux kernel contained an out-of-bounds read
vulnerability. A local attacker could use this to cause a denial of service
(system crash). (CVE-2023-2176)
Xingyuan Mo and Gengjia Chen discovered that the io_uring subsystem in the
Linux kernel did not properly handle locking when IOPOLL mode is being
used. A local attacker could use this to cause a denial of service (system
crash). (CVE-2023-2430)
Hangyu Hua discovered that the Flower classifier implementation in the
Linux kernel contained an out-of-bounds write vulnerability. An attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-35788, LP: #2023577)
It was discovered that for some Intel processors the INVLPG instruction
implementation did not properly flush global TLB entries when PCIDs are
enabled. An attacker could use this to expose sensitive information
(kernel memory) or possibly cause undesired behaviors. (LP: #2023220)
CVEs:
- https://ubuntu.com/security/CVE-2022-4842
- https://ubuntu.com/security/CVE-2023-0459
- https://ubuntu.com/security/CVE-2023-0597
- https://ubuntu.com/security/CVE-2023-1073
- https://ubuntu.com/security/CVE-2023-2124
- https://ubuntu.com/security/CVE-2023-2176
- https://ubuntu.com/security/CVE-2023-2430
- https://ubuntu.com/security/CVE-2023-35788
- https://ubuntu.com/security/CVE-2023-35788
- https://ubuntu.com/security/CVE-2023-0459
- https://ubuntu.com/security/CVE-2023-2176
- https://ubuntu.com/security/CVE-2023-0597
- https://ubuntu.com/security/CVE-2023-2124
- https://ubuntu.com/security/CVE-2023-2430
- https://ubuntu.com/security/CVE-2023-1073
- https://ubuntu.com/security/CVE-2022-4842
Title: USN-6223-1: Linux kernel (Azure CVM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6223-1
Priorities: medium,low,high
Description:
It was discovered that the TUN/TAP driver in the Linux kernel did not
properly initialize socket data. A local attacker could use this to cause a
denial of service (system crash). (CVE-2023-1076)
It was discovered that the Real-Time Scheduling Class implementation in the
Linux kernel contained a type confusion vulnerability in some situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2023-1077)
It was discovered that the ASUS HID driver in the Linux kernel did not
properly handle device removal, leading to a use-after-free vulnerability.
A local attacker with physical access could plug in a specially crafted USB
device to cause a denial of service (system crash). (CVE-2023-1079)
It was discovered that the Xircom PCMCIA network device driver in the Linux
kernel did not properly handle device removal events. A physically
proximate attacker could use this to cause a denial of service (system
crash). (CVE-2023-1670)
It was discovered that a race condition existed in the Xen transport layer
implementation for the 9P file system protocol in the Linux kernel, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service (guest crash) or expose sensitive information (guest
kernel memory). (CVE-2023-1859)
Jose Oliveira and Rodrigo Branco discovered that the Spectre Variant 2
mitigations with prctl syscall were insufficient in some situations. A
local attacker could possibly use this to expose sensitive information.
(CVE-2023-1998)
It was discovered that the BigBen Interactive Kids’ gamepad driver in the
Linux kernel did not properly handle device removal, leading to a use-
after-free vulnerability. A local attacker with physical access could plug
in a specially crafted USB device to cause a denial of service (system
crash). (CVE-2023-25012)
It was discovered that a use-after-free vulnerability existed in the HFS+
file system implementation in the Linux kernel. A local attacker could
possibly use this to cause a denial of service (system crash).
(CVE-2023-2985)
Hangyu Hua discovered that the Flower classifier implementation in the
Linux kernel contained an out-of-bounds write vulnerability. An attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-35788, LP: #2023577)
It was discovered that for some Intel processors the INVLPG instruction
implementation did not properly flush global TLB entries when PCIDs are
enabled. An attacker could use this to expose sensitive information
(kernel memory) or possibly cause undesired behaviors. (LP: #2023220)
CVEs:
- https://ubuntu.com/security/CVE-2023-1076
- https://ubuntu.com/security/CVE-2023-1077
- https://ubuntu.com/security/CVE-2023-1079
- https://ubuntu.com/security/CVE-2023-1670
- https://ubuntu.com/security/CVE-2023-1859
- https://ubuntu.com/security/CVE-2023-1998
- https://ubuntu.com/security/CVE-2023-25012
- https://ubuntu.com/security/CVE-2023-2985
- https://ubuntu.com/security/CVE-2023-35788
- https://ubuntu.com/security/CVE-2023-25012
- https://ubuntu.com/security/CVE-2023-1076
- https://ubuntu.com/security/CVE-2023-2985
- https://ubuntu.com/security/CVE-2023-1079
- https://ubuntu.com/security/CVE-2023-1670
- https://ubuntu.com/security/CVE-2023-35788
- https://ubuntu.com/security/CVE-2023-1998
- https://ubuntu.com/security/CVE-2023-1077
- https://ubuntu.com/security/CVE-2023-1859
Title: USN-6231-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6231-1
Priorities: low,high
Description:
It was discovered that the XFS file system implementation in the Linux
kernel did not properly perform metadata validation when mounting certain
images. An attacker could use this to specially craft a file system image
that, when mounted, could cause a denial of service (system crash).
(CVE-2023-2124)
It was discovered that the IP-VLAN network driver for the Linux kernel did
not properly initialize memory in some situations, leading to an out-of-
bounds write vulnerability. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2023-3090)
It was discovered that the DVB Core driver in the Linux kernel did not
properly handle locking events in certain situations. A local attacker
could use this to cause a denial of service (kernel deadlock).
(CVE-2023-31084)
It was discovered that the Ricoh R5C592 MemoryStick card reader driver in
the Linux kernel contained a race condition during module unload, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-3141)
Yang Lan discovered that the GFS2 file system implementation in the Linux
kernel could attempt to dereference a null pointer in some situations. An
attacker could use this to construct a malicious GFS2 image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2023-3212)
CVEs:
- https://ubuntu.com/security/CVE-2023-2124
- https://ubuntu.com/security/CVE-2023-3090
- https://ubuntu.com/security/CVE-2023-31084
- https://ubuntu.com/security/CVE-2023-3141
- https://ubuntu.com/security/CVE-2023-3212
- https://ubuntu.com/security/CVE-2023-3212
- https://ubuntu.com/security/CVE-2023-3141
- https://ubuntu.com/security/CVE-2023-31084
- https://ubuntu.com/security/CVE-2023-2124
- https://ubuntu.com/security/CVE-2023-3090
Title: USN-6202-1: containerd vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6202-1
Priorities: medium
Description:
David Korczynski and Adam Korczynski discovered that containerd
incorrectly processed certain images with large files. An attacker
could possibly use this issue to cause containerd to crash,
resulting in a denial of service. (CVE-2023-25153)
It was discovered that containerd incorrectly set up supplementary
groups inside a container. An attacker with direct access to the
container could possibly use this issue to obtain sensitive information
or execute code with higher privileges. (CVE-2023-25173)
CVEs:
- https://ubuntu.com/security/CVE-2023-25153
- https://ubuntu.com/security/CVE-2023-25173
- https://ubuntu.com/security/CVE-2023-25153
- https://ubuntu.com/security/CVE-2023-25173
Title: USN-6237-1: curl vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6237-1
Priorities: low,medium
Description:
Hiroki Kurosawa discovered that curl incorrectly handled validating certain
certificate wildcards. A remote attacker could possibly use this issue to
spoof certain website certificates using IDN hosts. (CVE-2023-28321)
Hiroki Kurosawa discovered that curl incorrectly handled callbacks when
certain options are set by applications. This could cause applications
using curl to misbehave, resulting in information disclosure, or a denial
of service. (CVE-2023-28322)
It was discovered that curl incorrectly handled saving cookies to files. A
local attacker could possibly use this issue to create or overwrite files.
This issue only affected Ubuntu 22.10, and Ubuntu 23.04. (CVE-2023-32001)
CVEs:
- https://ubuntu.com/security/CVE-2023-28321
- https://ubuntu.com/security/CVE-2023-28322
- https://ubuntu.com/security/CVE-2023-32001
- https://ubuntu.com/security/CVE-2023-28321
- https://ubuntu.com/security/CVE-2023-28322
- https://ubuntu.com/security/CVE-2023-32001
Title: USN-6219-1: Ruby vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6219-1
Priorities: medium
Description:
It was discovered that Ruby incorrectly handled certain regular expressions.
An attacker could possibly use this issue to cause a denial of service.
This issue only affected Ubuntu 20.10 and Ubuntu 20.04 LTS.
(CVE-2023-28755)
It was discovered that Ruby incorrectly handled certain regular expressions.
An attacker could possibly use this issue to cause a denial of service.
This issue exists because of an incomplete fix for CVE-2023-28755.
(CVE-2023-36617)
CVEs:
- https://ubuntu.com/security/CVE-2023-28755
- https://ubuntu.com/security/CVE-2023-28755
- https://ubuntu.com/security/CVE-2023-36617
- https://ubuntu.com/security/CVE-2023-36617
- https://ubuntu.com/security/CVE-2023-28755
Title: USN-6199-1: PHP vulnerability
URL: https://ubuntu.com/security/notices/USN-6199-1
Priorities: medium
Description:
It was discovered that PHP incorrectly handled certain Digest
authentication for SOAP. An attacker could possibly use this issue
to expose sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2023-3247
Title: USN-6217-1: .NET vulnerability
URL: https://ubuntu.com/security/notices/USN-6217-1
Priorities: medium
Description:
McKee-Harris, Matt Cotterell, and Jack Moran discovered that .NET did
not properly update account lockout maximum failed attempts. An
attacker could possibly use this issue to bypass the security feature
and attempt to guess more passwords for an account.
CVEs:
- https://ubuntu.com/security/CVE-2023-33170
Title: USN-6204-1: CPDB vulnerability
URL: https://ubuntu.com/security/notices/USN-6204-1
Priorities: medium
Description:
Seth Arnold discovered that CPDB incorrectly handled certain characters.
An attacker could possibly use this issue to cause a crash or execute
arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2023-34095
Title: USN-6214-1: Thunderbird vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6214-1
Priorities: medium
Description:
Multiple security issues were discovered in Thunderbird. If a user were
tricked into opening a specially crafted website in a browsing context, an
attacker could potentially exploit these to cause a denial of service,
obtain sensitive information, bypass security restrictions, cross-site
tracing, or execute arbitrary code. (CVE-2023-34414, CVE-2023-34416,
CVE-2023-37201, CVE-2023-37202, CVE-2023-37207, CVE-2023-37211)
P Umar Farooq discovered that Thunderbird did not properly provide warning
when opening Diagcab files. If a user were tricked into opening a
malicicous Diagcab file, an attacker could execute arbitrary code.
(CVE-2023-37208)
CVEs:
- https://ubuntu.com/security/CVE-2023-34414
- https://ubuntu.com/security/CVE-2023-34416
- https://ubuntu.com/security/CVE-2023-37201
- https://ubuntu.com/security/CVE-2023-37202
- https://ubuntu.com/security/CVE-2023-37207
- https://ubuntu.com/security/CVE-2023-37211
- https://ubuntu.com/security/CVE-2023-37208
- https://ubuntu.com/security/CVE-2023-37211
- https://ubuntu.com/security/CVE-2023-37201
- https://ubuntu.com/security/CVE-2023-37207
- https://ubuntu.com/security/CVE-2023-34416
- https://ubuntu.com/security/CVE-2023-37208
- https://ubuntu.com/security/CVE-2023-34414
- https://ubuntu.com/security/CVE-2023-37202
Title: USN-6206-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6206-1
Priorities: high,medium,low
Description:
Hangyu Hua discovered that the Flower classifier implementation in the
Linux kernel contained an out-of-bounds write vulnerability. An attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-35788, LP: #2023577)
It was discovered that the NTFS file system implementation in the Linux
kernel contained a null pointer dereference in some situations. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2022-4842)
Seth Jenkins discovered that the CPU data to memory implementation for x86
processors in the Linux kernel did not properly perform address
randomization. A local attacker could use this to expose sensitive
information (kernel memory) or in conjunction with another kernel
vulnerability. (CVE-2023-0597)
It was discovered that the XFS file system implementation in the Linux
kernel did not properly perform metadata validation when mounting certain
images. An attacker could use this to specially craft a file system image
that, when mounted, could cause a denial of service (system crash).
(CVE-2023-2124)
It was discovered that for some Intel processors the INVLPG instruction
implementation did not properly flush global TLB entries when PCIDs are
enabled. An attacker could use this to expose sensitive information
(kernel memory) or possibly cause undesired behaviors. (LP: #2023220)
CVEs:
- https://ubuntu.com/security/CVE-2023-35788
- https://ubuntu.com/security/CVE-2022-4842
- https://ubuntu.com/security/CVE-2023-0597
- https://ubuntu.com/security/CVE-2023-2124
- https://ubuntu.com/security/CVE-2023-2124
- https://ubuntu.com/security/CVE-2023-35788
- https://ubuntu.com/security/CVE-2022-4842
- https://ubuntu.com/security/CVE-2023-0597
Title: USN-6194-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6194-1
Priorities: high,medium
Description:
Hangyu Hua discovered that the Flower classifier implementation in the
Linux kernel contained an out-of-bounds write vulnerability. An attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-35788, LP: #2023577)
Xingyuan Mo and Gengjia Chen discovered that the io_uring subsystem in the
Linux kernel did not properly handle locking when IOPOLL mode is being
used. A local attacker could use this to cause a denial of service (system
crash). (CVE-2023-2430)
Wei Chen discovered that the InfiniBand RDMA communication manager
implementation in the Linux kernel contained an out-of-bounds read
vulnerability. A local attacker could use this to cause a denial of service
(system crash). (CVE-2023-2176)
It was discovered that for some Intel processors the INVLPG instruction
implementation did not properly flush global TLB entries when PCIDs are
enabled. An attacker could use this to expose sensitive information
(kernel memory) or possibly cause undesired behaviors. (LP: #2023220)
CVEs:
- https://ubuntu.com/security/CVE-2023-35788
- https://ubuntu.com/security/CVE-2023-2430
- https://ubuntu.com/security/CVE-2023-2176
- https://ubuntu.com/security/CVE-2023-2176
- https://ubuntu.com/security/CVE-2023-35788
- https://ubuntu.com/security/CVE-2023-2430
Title: USN-6212-1: Linux kernel (Intel IoTG) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6212-1
Priorities: high
Description:
Hangyu Hua discovered that the Flower classifier implementation in the
Linux kernel contained an out-of-bounds write vulnerability. An attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-35788, LP: #2023577)
It was discovered that for some Intel processors the INVLPG instruction
implementation did not properly flush global TLB entries when PCIDs are
enabled. An attacker could use this to expose sensitive information
(kernel memory) or possibly cause undesired behaviors. (LP: #2023220)
CVEs:
- https://ubuntu.com/security/CVE-2023-35788
- https://ubuntu.com/security/CVE-2023-35788
Title: USN-6203-1: Django vulnerability
URL: https://ubuntu.com/security/notices/USN-6203-1
Priorities: medium
Description:
Seokchan Yoon discovered that Django incorrectly handled certain regular
expressions. A remote attacker could possibly use this issue to cause
Django to consume resources, leading to a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-36053
Title: USN-6213-1: Ghostscript vulnerability
URL: https://ubuntu.com/security/notices/USN-6213-1
Priorities: medium
Description:
It was discovered that Ghostscript incorrectly handled pipe devices. If a
user or automated system were tricked into opening a specially crafted PDF
file, a remote attacker could use this issue to execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2023-36664
Full Changelog: https://github.com/cloudfoundry/bosh-linux-stemcell-builder/compare/ubuntu-jammy/v1.147…ubuntu-jammy/v1.179
Available in VMware Tanzu Network
Release Date: June 29, 2023
BOSH Agent Version: 2.548.0
Title: USN-6161-2: .NET regression
URL: https://ubuntu.com/security/notices/USN-6161-2
Priorities: medium
Description:
USN-6161-1 fixed vulnerabilities in .NET. The update introduced
a regression with regards to how the runtime imported X.509
certificates. This update fixes the problem.
We apologize for the inconvenience.
Original advisory details:
It was discovered that .NET did not properly enforce certain
restrictions when deserializing a DataSet or DataTable from
XML. An attacker could possibly use this issue to elevate their
privileges. (CVE-2023-24936)
Kevin Jones discovered that .NET did not properly handle the
AIA fetching process for X.509 client certificates. An attacker
could possibly use this issue to cause a denial of service.
(CVE-2023-29331)
Kalle Niemitalo discovered that the .NET package manager,
NuGet, was susceptible to a potential race condition. An
attacker could possibly use this issue to perform remote
code execution. (CVE-2023-29337)
Tom Deseyn discovered that .NET did not properly process certain
arguments when extracting the contents of a tar file. An attacker
could possibly use this issue to elevate their privileges. This
issue only affected the dotnet7 package. (CVE-2023-32032)
It was discovered that .NET did not properly handle memory in
certain circumstances. An attacker could possibly use this issue
to cause a denial of service or perform remote code execution.
(CVE-2023-33128)
CVEs:
- https://ubuntu.com/security/CVE-2023-24936
- https://ubuntu.com/security/CVE-2023-29331
- https://ubuntu.com/security/CVE-2023-29337
- https://ubuntu.com/security/CVE-2023-32032
- https://ubuntu.com/security/CVE-2023-33128
Title: USN-6184-1: CUPS vulnerability
URL: https://ubuntu.com/security/notices/USN-6184-1
Priorities: medium
Description:
It was discovered that CUPS incorrectly handled certain memory operations.
An attacker could possibly use this issue to cause CUPS to crash, resulting
in a denial of service, or possibly obtain sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2023-34241
Title: USN-6192-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6192-1
Priorities: high
Description:
Hangyu Hua discovered that the Flower classifier implementation in the
Linux kernel contained an out-of-bounds write vulnerability. An attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-35788, LP: #2023577)
Xingyuan Mo and Gengjia Chen discovered that the io_uring subsystem in the
Linux kernel did not properly handle locking when IOPOLL mode is being
used. A local attacker could use this to cause a denial of service (system
crash). (CVE-2023-2430)
It was discovered that for some Intel processors the INVLPG instruction
implementation did not properly flush global TLB entries when PCIDs are
enabled. An attacker could use this to expose sensitive information
(kernel memory) or possibly cause undesired behaviors. (LP: #2023220)
CVEs:
- https://ubuntu.com/security/CVE-2023-35788
- https://ubuntu.com/security/CVE-2023-2430
- https://ubuntu.com/security/CVE-2023-2430
- https://ubuntu.com/security/CVE-2023-35788
Available in VMware Tanzu Network
Release Date: June 26, 2023
BOSH Agent Version: 2.548.0
Title: USN-6180-1: VLC media player vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6180-1
Priorities: low,medium
Description:
It was discovered that VLC could be made to read out of bounds when
decoding image files. If a user were tricked into opening a crafted image
file, a remote attacker could possibly use this issue to cause VLC to
crash, leading to a denial of service. This issue only affected Ubuntu
16.04 LTS and Ubuntu 18.04 LTS. (CVE-2019-19721)
It was discovered that VLC could be made to write out of bounds when
processing H.264 video files. If a user were tricked into opening a
crafted H.264 video file, a remote attacker could possibly use this issue
to cause VLC to crash, leading to a denial of service, or possibly
execute arbitrary code. This issue only affected Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. (CVE-2020-13428)
It was discovered that VLC could be made to read out of bounds when
processing AVI video files. If a user were tricked into opening a crafted
AVI video file, a remote attacker could possibly use this issue to cause
VLC to crash, leading to a denial of service. This issue only affected
Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS. (CVE-2021-25801,
CVE-2021-25802, CVE-2021-25803, CVE-2021-25804)
It was discovered that the VNC module of VLC contained an arithmetic
overflow. If a user were tricked into opening a crafted playlist or
connecting to a rouge VNC server, a remote attacker could possibly use
this issue to cause VLC to crash, leading to a denial of service, or
possibly execute arbitrary code. (CVE-2022-41325)
CVEs:
- https://ubuntu.com/security/CVE-2019-19721
- https://ubuntu.com/security/CVE-2020-13428
- https://ubuntu.com/security/CVE-2021-25801
- https://ubuntu.com/security/CVE-2021-25802
- https://ubuntu.com/security/CVE-2021-25803
- https://ubuntu.com/security/CVE-2021-25804
- https://ubuntu.com/security/CVE-2022-41325
- https://ubuntu.com/security/CVE-2021-25801
- https://ubuntu.com/security/CVE-2021-25802
- https://ubuntu.com/security/CVE-2022-41325
- https://ubuntu.com/security/CVE-2019-19721
- https://ubuntu.com/security/CVE-2021-25804
- https://ubuntu.com/security/CVE-2021-25803
- https://ubuntu.com/security/CVE-2020-13428
Title: USN-6163-1: pano13 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6163-1
Priorities: medium
Description:
It was discovered that pano13 did not properly validate the prefix provided
for PTcrop’s output. An attacker could use this issue to cause pano13 to
crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS,
Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS. (CVE-2021-20307)
It was discovered that pano13 did not properly handle certain crafted TIFF
images. An attacker could use this issue to cause pano13 to crash,
resulting in a denial of service. (CVE-2021-33293)
CVEs:
- https://ubuntu.com/security/CVE-2021-20307
- https://ubuntu.com/security/CVE-2021-33293
- https://ubuntu.com/security/CVE-2021-20307
- https://ubuntu.com/security/CVE-2021-33293
Title: USN-6146-1: Netatalk vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6146-1
Priorities: medium,high
Description:
It was discovered that Netatalk did not properly validate the length of
user-supplied data in the DSI structures. A remote attacker could possibly
use this issue to execute arbitrary code with the privileges of the user
invoking the programs. This issue only affected Ubuntu 20.04 LTS and Ubuntu
22.04 LTS. (CVE-2021-31439)
It was discovered that Netatalk did not properly validate the length of
user-supplied data in the ad_addcomment function. A remote attacker could
possibly use this issue to execute arbitrary code with root privileges.
This issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
(CVE-2022-0194)
It was discovered that Netatalk did not properly handle errors when parsing
AppleDouble entries. A remote attacker could possibly use this issue to
execute arbitrary code with root privileges. This issue only affected
Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and
Ubuntu 22.04 LTS. (CVE-2022-23121)
It was discovered that Netatalk did not properly validate the length of
user-supplied data in the setfilparams function. A remote attacker could
possibly use this issue to execute arbitrary code with root privileges.
This issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
(CVE-2022-23122)
It was discovered that Netatalk did not properly validate the length of
user-supplied data in the getdirparams function. A remote attacker could
possibly use this issue to execute arbitrary code with root privileges.
This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04
LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-23123)
It was discovered that Netatalk did not properly validate the length of
user-supplied data in the get_finderinfo function. A remote attacker could
possibly use this issue to execute arbitrary code with root privileges.
This issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
(CVE-2022-23124)
It was discovered that Netatalk did not properly validate the length of
user-supplied data in the copyapplfile function. A remote attacker could
possibly use this issue to execute arbitrary code with root privileges.
This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04
LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-23125)
It was discovered that Netatalk did not properly validate the length of
user-supplied data in the dsi_writeinit function. A remote attacker could
possibly use this issue to execute arbitrary code with root privileges.
This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu
22.10. (CVE-2022-43634)
It was discovered that Netatalk did not properly manage memory under
certain circumstances. If a user were tricked into opening a specially
crafted .appl file, a remote attacker could possibly use this issue to
execute arbitrary code. (CVE-2022-45188)
CVEs:
- https://ubuntu.com/security/CVE-2021-31439
- https://ubuntu.com/security/CVE-2022-0194
- https://ubuntu.com/security/CVE-2022-23121
- https://ubuntu.com/security/CVE-2022-23122
- https://ubuntu.com/security/CVE-2022-23123
- https://ubuntu.com/security/CVE-2022-23124
- https://ubuntu.com/security/CVE-2022-23125
- https://ubuntu.com/security/CVE-2022-43634
- https://ubuntu.com/security/CVE-2022-45188
- https://ubuntu.com/security/CVE-2022-23123
- https://ubuntu.com/security/CVE-2022-43634
- https://ubuntu.com/security/CVE-2022-23122
- https://ubuntu.com/security/CVE-2021-31439
- https://ubuntu.com/security/CVE-2022-23121
- https://ubuntu.com/security/CVE-2022-23124
- https://ubuntu.com/security/CVE-2022-23125
- https://ubuntu.com/security/CVE-2022-0194
- https://ubuntu.com/security/CVE-2022-45188
Title: USN-6167-1: QEMU vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6167-1
Priorities: low,medium
Description:
It was discovered that QEMU did not properly manage the guest drivers when
shared buffers are not allocated. A malicious guest driver could use this
issue to cause QEMU to crash, resulting in a denial of service, or possibly
execute arbitrary code. This issue only affected Ubuntu 20.04 LTS, Ubuntu
22.04 LTS and Ubuntu 22.10. (CVE-2022-1050)
It was discovered that QEMU did not properly check the size of the
structure pointed to by the guest physical address pqxl. A malicious guest
attacker could use this issue to cause QEMU to crash, resulting in a denial
of service. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS,
Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu 22.10.
(CVE-2022-4144)
It was discovered that QEMU did not properly manage memory in the ACPI
Error Record Serialization Table (ERST) device. A malicious guest attacker
could use this issue to cause QEMU to crash, resulting in a denial of
service. This issue only affected Ubuntu 22.10. (CVE-2022-4172)
It was discovered that QEMU did not properly manage memory when DMA memory
writes happen repeatedly in the lsi53c895a device. A malicious guest
attacker could use this issue to cause QEMU to crash, resulting in a denial
of service. (CVE-2023-0330)
CVEs:
- https://ubuntu.com/security/CVE-2022-1050
- https://ubuntu.com/security/CVE-2022-4144
- https://ubuntu.com/security/CVE-2022-4172
- https://ubuntu.com/security/CVE-2023-0330
- https://ubuntu.com/security/CVE-2022-4172
- https://ubuntu.com/security/CVE-2022-4144
- https://ubuntu.com/security/CVE-2022-1050
- https://ubuntu.com/security/CVE-2023-0330
Title: USN-6169-1: GNU SASL vulnerability
URL: https://ubuntu.com/security/notices/USN-6169-1
Priorities: low
Description:
It was discovered that GNU SASL’s GSSAPI server could make an
out-of-bounds reads if given specially crafted GSS-API authentication
data. A remote attacker could possibly use this issue to cause a
denial of service or to expose sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2022-2469
Title: USN-6145-1: Sysstat vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6145-1
Priorities: medium
Description:
It was discovered that Sysstat incorrectly handled certain arithmetic
multiplications. An attacker could use this issue to cause Sysstat to
crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue was only fixed for Ubuntu 16.04 LTS. (CVE-2022-39377)
It was discovered that Sysstat incorrectly handled certain arithmetic
multiplications in 64-bit systems, as a result of an incomplete fix for
CVE-2022-39377. An attacker could use this issue to cause Sysstat to
crash, resulting in a denial of service, or possibly execute arbitrary
code. (CVE-2023-33204)
CVEs:
- https://ubuntu.com/security/CVE-2022-39377
- https://ubuntu.com/security/CVE-2022-39377
- https://ubuntu.com/security/CVE-2023-33204
- https://ubuntu.com/security/CVE-2023-33204
- https://ubuntu.com/security/CVE-2022-39377
Title: USN-6171-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6171-1
Priorities: medium,low
Description:
William Zhao discovered that the Traffic Control (TC) subsystem in the
Linux kernel did not properly handle network packet retransmission in
certain situations. A local attacker could use this to cause a denial of
service (kernel deadlock). (CVE-2022-4269)
It was discovered that the TUN/TAP driver in the Linux kernel did not
properly initialize socket data. A local attacker could use this to cause a
denial of service (system crash). (CVE-2023-1076)
It was discovered that the Real-Time Scheduling Class implementation in the
Linux kernel contained a type confusion vulnerability in some situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2023-1077)
It was discovered that the ASUS HID driver in the Linux kernel did not
properly handle device removal, leading to a use-after-free vulnerability.
A local attacker with physical access could plug in a specially crafted USB
device to cause a denial of service (system crash). (CVE-2023-1079)
It was discovered that the Xircom PCMCIA network device driver in the Linux
kernel did not properly handle device removal events. A physically
proximate attacker could use this to cause a denial of service (system
crash). (CVE-2023-1670)
It was discovered that a race condition existed in the Xen transport layer
implementation for the 9P file system protocol in the Linux kernel, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service (guest crash) or expose sensitive information (guest
kernel memory). (CVE-2023-1859)
Jose Oliveira and Rodrigo Branco discovered that the Spectre Variant 2
mitigations with prctl syscall were insufficient in some situations. A
local attacker could possibly use this to expose sensitive information.
(CVE-2023-1998)
It was discovered that the BigBen Interactive Kids’ gamepad driver in the
Linux kernel did not properly handle device removal, leading to a use-
after-free vulnerability. A local attacker with physical access could plug
in a specially crafted USB device to cause a denial of service (system
crash). (CVE-2023-25012)
It was discovered that a use-after-free vulnerability existed in the HFS+
file system implementation in the Linux kernel. A local attacker could
possibly use this to cause a denial of service (system crash).
(CVE-2023-2985)
CVEs:
- https://ubuntu.com/security/CVE-2022-4269
- https://ubuntu.com/security/CVE-2023-1076
- https://ubuntu.com/security/CVE-2023-1077
- https://ubuntu.com/security/CVE-2023-1079
- https://ubuntu.com/security/CVE-2023-1670
- https://ubuntu.com/security/CVE-2023-1859
- https://ubuntu.com/security/CVE-2023-1998
- https://ubuntu.com/security/CVE-2023-25012
- https://ubuntu.com/security/CVE-2023-2985
- https://ubuntu.com/security/CVE-2023-1998
- https://ubuntu.com/security/CVE-2023-1079
- https://ubuntu.com/security/CVE-2022-4269
- https://ubuntu.com/security/CVE-2023-1076
- https://ubuntu.com/security/CVE-2023-1077
- https://ubuntu.com/security/CVE-2023-2985
- https://ubuntu.com/security/CVE-2023-1670
- https://ubuntu.com/security/CVE-2023-25012
- https://ubuntu.com/security/CVE-2023-1859
Title: LSN-0095-1: Kernel Live Patch Security Notice
URL: https://ubuntu.com/security/notices/LSN-0095-1
Priorities: high,medium
Description:
It was discovered that the OverlayFS implementation in the Linux kernel did
not properly handle copy up operation in some conditions. A local attacker
could possibly use this to gain elevated privileges.(CVE-2023-0386)
It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux
kernel did not properly perform data buffer size validation in some
situations. A physically proximate attacker could use this to craft a
malicious USB device that when inserted, could cause a denial of service
(system crash) or possibly expose sensitive information.(CVE-2023-1380)
It was discovered that a race condition existed in the io_uring subsystem
in the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code.(CVE-2023-1872)
Jean-Baptiste Cayrou discovered that the shiftfs file system in the Ubuntu
Linux kernel contained a race condition when handling inode locking in some
situations. A local attacker could use this to cause a denial of service
(kernel deadlock).(CVE-2023-2612)
Gwangun Jung discovered that the Quick Fair Queueing scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code.(CVE-2023-31436)
Patryk Sondej and Piotr Krysiuk discovered that a race condition existed in
the netfilter subsystem of the Linux kernel when processing batch requests,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code.(CVE-2023-32233)
CVEs:
- https://ubuntu.com/security/CVE-2023-0386
- https://ubuntu.com/security/CVE-2023-1380
- https://ubuntu.com/security/CVE-2023-1872
- https://ubuntu.com/security/CVE-2023-2612
- https://ubuntu.com/security/CVE-2023-31436
- https://ubuntu.com/security/CVE-2023-32233
- https://ubuntu.com/security/CVE-2023-32233
- https://ubuntu.com/security/CVE-2023-2612
- https://ubuntu.com/security/CVE-2023-0386
- https://ubuntu.com/security/CVE-2023-1872
- https://ubuntu.com/security/CVE-2023-1380
- https://ubuntu.com/security/CVE-2023-31436
Title: USN-6144-1: LibreOffice vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6144-1
Priorities: medium
Description:
It was discovered that LibreOffice did not properly validate the number of
parameters passed to the formula interpreter, leading to an array index
underflow attack. If a user were tricked into opening a specially crafted
spreadsheet file, an attacker could possibly use this issue to execute
arbitrary code. (CVE-2023-0950)
Amel Bouziane-Leblond discovered that LibreOffice did not prompt the user
before loading the host document inside an IFrame. If a user were tricked
into opening a specially crafted input file, an attacker could possibly use
this issue to cause information disclosure or execute arbitrary code.
(CVE-2023-2255)
CVEs:
- https://ubuntu.com/security/CVE-2023-0950
- https://ubuntu.com/security/CVE-2023-2255
- https://ubuntu.com/security/CVE-2023-2255
- https://ubuntu.com/security/CVE-2023-0950
Title: USN-6179-1: Jettison vulnerability
URL: https://ubuntu.com/security/notices/USN-6179-1
Priorities: medium
Description:
It was discovered that Jettison incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to cause a
denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-1436
Title: USN-6138-1: libssh vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6138-1
Priorities: medium
Description:
Philip Turnbull discovered that libssh incorrectly handled rekeying with
algorithm guessing. A remote attacker could use this issue to cause libssh
to crash, resulting in a denial of service, or possibly execute arbitrary
code. (CVE-2023-1667)
Kevin Backhouse discovered that libssh incorrectly handled verifying data
signatures. A remote attacker could possibly use this issue to bypass
authorization. (CVE-2023-2283)
CVEs:
- https://ubuntu.com/security/CVE-2023-1667
- https://ubuntu.com/security/CVE-2023-2283
- https://ubuntu.com/security/CVE-2023-1667
- https://ubuntu.com/security/CVE-2023-2283
Title: USN-6137-1: LibRaw vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6137-1
Priorities: medium,low
Description:
It was discovered that LibRaw incorrectly handled photo files. If a user or
automated system were tricked into processing a specially crafted photo
file, a remote attacker could cause applications linked against LibRaw to
crash, resulting in a denial of service, or possibly execute arbitrary
code.
CVEs:
- https://ubuntu.com/security/CVE-2023-1729
- https://ubuntu.com/security/CVE-2021-32142
Title: USN-6133-1: Linux kernel (Intel IoTG) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6133-1
Priorities: high,medium,low,negligible
Description:
It was discovered that the Traffic-Control Index (TCINDEX) implementation
in the Linux kernel did not properly perform filter deactivation in some
situations. A local attacker could possibly use this to gain elevated
privileges. Please note that with the fix for this CVE, kernel support for
the TCINDEX classifier has been removed. (CVE-2023-1829)
It was discovered that some AMD x86-64 processors with SMT enabled could
speculatively execute instructions using a return address from a sibling
thread. A local attacker could possibly use this to expose sensitive
information. (CVE-2022-27672)
Zheng Wang discovered that the Intel i915 graphics driver in the Linux
kernel did not properly handle certain error conditions, leading to a
double-free. A local attacker could possibly use this to cause a denial of
service (system crash). (CVE-2022-3707)
Jordy Zomer and Alexandra Sandulescu discovered that the Linux kernel did
not properly implement speculative execution barriers in usercopy functions
in certain situations. A local attacker could use this to expose sensitive
information (kernel memory). (CVE-2023-0459)
It was discovered that the TLS subsystem in the Linux kernel contained a
type confusion vulnerability in some situations. A local attacker could use
this to cause a denial of service (system crash) or possibly expose
sensitive information. (CVE-2023-1075)
It was discovered that the Reliable Datagram Sockets (RDS) protocol
implementation in the Linux kernel contained a type confusion vulnerability
in some situations. An attacker could use this to cause a denial of service
(system crash). (CVE-2023-1078)
Xingyuan Mo discovered that the x86 KVM implementation in the Linux kernel
did not properly initialize some data structures. A local attacker could
use this to expose sensitive information (kernel memory). (CVE-2023-1513)
It was discovered that a race condition existed in the io_uring subsystem
in the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-1872)
It was discovered that the Android Binder IPC subsystem in the Linux kernel
did not properly validate inputs in some situations, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2023-20938)
It was discovered that a use-after-free vulnerability existed in the iSCSI
TCP implementation in the Linux kernel. A local attacker could possibly use
this to cause a denial of service (system crash). (CVE-2023-2162)
It was discovered that the NET/ROM protocol implementation in the Linux
kernel contained a race condition in some situations, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2023-32269)
Duoming Zhou discovered that a race condition existed in the infrared
receiver/transceiver driver in the Linux kernel, leading to a use-after-
free vulnerability. A privileged attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2023-1118)
CVEs:
- https://ubuntu.com/security/CVE-2023-1829
- https://ubuntu.com/security/CVE-2022-27672
- https://ubuntu.com/security/CVE-2022-3707
- https://ubuntu.com/security/CVE-2023-0459
- https://ubuntu.com/security/CVE-2023-1075
- https://ubuntu.com/security/CVE-2023-1078
- https://ubuntu.com/security/CVE-2023-1513
- https://ubuntu.com/security/CVE-2023-1872
- https://ubuntu.com/security/CVE-2023-20938
- https://ubuntu.com/security/CVE-2023-2162
- https://ubuntu.com/security/CVE-2023-32269
- https://ubuntu.com/security/CVE-2023-1118
- https://ubuntu.com/security/CVE-2023-32269
- https://ubuntu.com/security/CVE-2023-1513
- https://ubuntu.com/security/CVE-2023-0459
- https://ubuntu.com/security/CVE-2023-1075
- https://ubuntu.com/security/CVE-2023-1118
- https://ubuntu.com/security/CVE-2023-1078
- https://ubuntu.com/security/CVE-2023-1829
- https://ubuntu.com/security/CVE-2022-3707
- https://ubuntu.com/security/CVE-2022-27672
- https://ubuntu.com/security/CVE-2023-20938
- https://ubuntu.com/security/CVE-2023-1872
- https://ubuntu.com/security/CVE-2023-2162
Title: USN-6129-1: Avahi vulnerability
URL: https://ubuntu.com/security/notices/USN-6129-1
Priorities: medium
Description:
It was discovered that Avahi incorrectly handled certain DBus messages. A
local attacker could possibly use this issue to cause Avahi to crash,
resulting in a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-1981
Title: USN-6154-1: Vim vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6154-1
Priorities: medium
Description:
It was discovered that Vim was using uninitialized memory when fuzzy
matching, which could lead to invalid memory access. An attacker could
possibly use this issue to cause a denial of service or execute arbitrary
code. This issue only affected Ubuntu 22.04 LTS, Ubuntu 22.10 and Ubuntu
23.04. (CVE-2023-2426)
It was discovered that Vim was not properly performing bounds checks when
processing register contents, which could lead to a NULL pointer
dereference. An attacker could possibly use this issue to cause a denial
of service or execute arbitrary code. (CVE-2023-2609)
It was discovered that Vim was not properly limiting the length of
substitution expression strings, which could lead to excessive memory
consumption. An attacker could possibly use this issue to cause a denial
of service. (CVE-2023-2610)
CVEs:
- https://ubuntu.com/security/CVE-2023-2426
- https://ubuntu.com/security/CVE-2023-2609
- https://ubuntu.com/security/CVE-2023-2610
- https://ubuntu.com/security/CVE-2023-2609
- https://ubuntu.com/security/CVE-2023-2610
- https://ubuntu.com/security/CVE-2023-2426
Title: USN-6139-1: Python vulnerability
URL: https://ubuntu.com/security/notices/USN-6139-1
Priorities: medium
Description:
Yebo Cao discovered that Python incorrectly handled certain URLs.
An attacker could use this issue to bypass blockinglisting methods.
This issue was first addressed in USN-5960-1, but was incomplete.
Here we address an additional fix to that issue. (CVE-2023-24329)
CVEs:
- https://ubuntu.com/security/CVE-2023-24329
- https://ubuntu.com/security/CVE-2023-24329
Title: USN-6161-1: .NET vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6161-1
Priorities: medium
Description:
It was discovered that .NET did not properly enforce certain
restrictions when deserializing a DataSet or DataTable from
XML. An attacker could possibly use this issue to elevate their
privileges. (CVE-2023-24936)
Kevin Jones discovered that .NET did not properly handle the
AIA fetching process for X.509 client certificates. An attacker
could possibly use this issue to cause a denial of service.
(CVE-2023-29331)
Kalle Niemitalo discovered that the .NET package manager,
NuGet, was susceptible to a potential race condition. An
attacker could possibly use this issue to perform remote
code execution. (CVE-2023-29337)
Tom Deseyn discovered that .NET did not properly process certain
arguments when extracting the contents of a tar file. An attacker
could possibly use this issue to elevate their privileges. This
issue only affected the dotnet7 package. (CVE-2023-32032)
It was discovered that .NET did not properly handle memory in
certain circumstances. An attacker could possibly use this issue
to cause a denial of service or perform remote code execution.
(CVE-2023-33128)
CVEs:
- https://ubuntu.com/security/CVE-2023-24936
- https://ubuntu.com/security/CVE-2023-29331
- https://ubuntu.com/security/CVE-2023-29337
- https://ubuntu.com/security/CVE-2023-32032
- https://ubuntu.com/security/CVE-2023-33128
- https://ubuntu.com/security/CVE-2023-32032
- https://ubuntu.com/security/CVE-2023-33128
- https://ubuntu.com/security/CVE-2023-29337
- https://ubuntu.com/security/CVE-2023-29331
- https://ubuntu.com/security/CVE-2023-24936
Title: USN-6148-1: SNI Proxy vulnerability
URL: https://ubuntu.com/security/notices/USN-6148-1
Priorities: high
Description:
It was discovered that SNI Proxy did not properly handle wildcard backend
hosts. An attacker could possibly use this issue to cause a buffer overflow,
resulting in a denial of service, or arbitrary code execution.
CVEs:
- https://ubuntu.com/security/CVE-2023-25076
Title: USN-6166-1: libcap2 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6166-1
Priorities: low,medium
Description:
David Gstir discovered that libcap2 incorrectly handled certain return
codes. An attacker could possibly use this issue to cause libcap2 to
consume memory, leading to a denial of service. (CVE-2023-2602)
Richard Weinberger discovered that libcap2 incorrectly handled certain long
input strings. An attacker could use this issue to cause libcap2 to crash,
resulting in a denial of service, or possibly execute arbitrary code.
(CVE-2023-2603)
CVEs:
- https://ubuntu.com/security/CVE-2023-2602
- https://ubuntu.com/security/CVE-2023-2603
- https://ubuntu.com/security/CVE-2023-2602
- https://ubuntu.com/security/CVE-2023-2603
Title: USN-6183-1: Bind vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6183-1
Priorities: medium
Description:
Shoham Danino, Anat Bremler-Barr, Yehuda Afek, and Yuval Shavitt discovered
that Bind incorrectly handled the cache size limit. A remote attacker could
possibly use this issue to consume memory, leading to a denial of service.
(CVE-2023-2828)
It was discovered that Bind incorrectly handled the recursive-clients
quota. A remote attacker could possibly use this issue to cause Bind to
crash, resulting in a denial of service. This issue only affected Ubuntu
22.04 LTS, Ubuntu 22.10, and Ubuntu 23.04. (CVE-2023-2911)
CVEs:
- https://ubuntu.com/security/CVE-2023-2828
- https://ubuntu.com/security/CVE-2023-2911
- https://ubuntu.com/security/CVE-2023-2911
- https://ubuntu.com/security/CVE-2023-2828
Title: USN-6164-1: c-ares vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6164-1
Priorities: medium
Description:
Hannes Moesl discovered that c-ares incorrectly handled certain ipv6
addresses. An attacker could use this issue to cause c-ares to crash,
resulting in a denial of service, or possibly execute arbitrary code.
(CVE-2023-31130)
Xiang Li discovered that c-ares incorrectly handled certain UDP packets. A
remote attacker could possibly use this issue to cause c-res to crash,
resulting in a denial of service. (CVE-2023-32067)
CVEs:
- https://ubuntu.com/security/CVE-2023-31130
- https://ubuntu.com/security/CVE-2023-32067
- https://ubuntu.com/security/CVE-2023-31130
- https://ubuntu.com/security/CVE-2023-32067
Title: USN-6168-1: libx11 vulnerability
URL: https://ubuntu.com/security/notices/USN-6168-1
Priorities: medium
Description:
Gregory James Duck discovered that libx11 incorrectly handled certain
Request, Event, or Error IDs. If a user were tricked into connecting to a
malicious X Server, a remote attacker could possibly use this issue to
cause libx11 to crash, resulting in a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-3138
Title: USN-6173-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6173-1
Priorities: high,medium
Description:
Gwangun Jung discovered that the Quick Fair Queueing scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-31436)
It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux
kernel did not properly perform data buffer size validation in some
situations. A physically proximate attacker could use this to craft a
malicious USB device that when inserted, could cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-1380)
Ruihan Li discovered that the bluetooth subsystem in the Linux kernel did
not properly perform permissions checks when handling HCI sockets. A
physically proximate attacker could use this to cause a denial of service
(bluetooth communication). (CVE-2023-2002)
It was discovered that the IPv6 RPL protocol implementation in the Linux
kernel did not properly handle user-supplied data. A remote attacker could
use this to cause a denial of service (system crash). (CVE-2023-2156)
Zheng Zhang discovered that the device-mapper implementation in the Linux
kernel did not properly handle locking during table_clear() operations. A
local attacker could use this to cause a denial of service (kernel
deadlock). (CVE-2023-2269)
Quentin Minster discovered that a race condition existed in the KSMBD
implementation in the Linux kernel when handling sessions operations. A
remote attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-32250)
Quentin Minster discovered that a race condition existed in the KSMBD
implementation in the Linux kernel, leading to a use-after-free
vulnerability. A remote attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2023-32254)
CVEs:
- https://ubuntu.com/security/CVE-2023-31436
- https://ubuntu.com/security/CVE-2023-1380
- https://ubuntu.com/security/CVE-2023-2002
- https://ubuntu.com/security/CVE-2023-2156
- https://ubuntu.com/security/CVE-2023-2269
- https://ubuntu.com/security/CVE-2023-32250
- https://ubuntu.com/security/CVE-2023-32254
- https://ubuntu.com/security/CVE-2023-32254
- https://ubuntu.com/security/CVE-2023-2002
- https://ubuntu.com/security/CVE-2023-2156
- https://ubuntu.com/security/CVE-2023-32250
- https://ubuntu.com/security/CVE-2023-2269
- https://ubuntu.com/security/CVE-2023-1380
- https://ubuntu.com/security/CVE-2023-31436
Title: USN-6112-2: Perl vulnerability
URL: https://ubuntu.com/security/notices/USN-6112-2
Priorities: medium
Description:
USN-6112-1 fixed vulnerabilities in Perl. This update provides the
corresponding updates for Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu
22.10, and Ubuntu 23.04.
Original advisory details:
It was discovered that Perl was not properly verifying TLS certificates
when using CPAN together with HTTP::Tiny to download modules over HTTPS.
If a remote attacker were able to intercept communications, this flaw
could potentially be used to install altered modules.
CVEs:
- https://ubuntu.com/security/CVE-2023-31484
Title: USN-6136-1: FRR vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6136-1
Priorities: medium
Description:
It was discovered that FRR incorrectly handled parsing certain BGP
messages. A remote attacker could possibly use this issue to cause FRR to
crash, resulting in a denial of service. This issue only affected Ubuntu
23.04. (CVE-2023-31489)
It was discovered that FRR incorrectly handled parsing certain BGP
messages. A remote attacker could possibly use this issue to cause FRR to
crash, resulting in a denial of service. (CVE-2023-31490)
CVEs:
- https://ubuntu.com/security/CVE-2023-31489
- https://ubuntu.com/security/CVE-2023-31490
- https://ubuntu.com/security/CVE-2023-31489
- https://ubuntu.com/security/CVE-2023-31490
Title: USN-6150-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6150-1
Priorities: high,medium
Description:
Patryk Sondej and Piotr Krysiuk discovered that a race condition existed in
the netfilter subsystem of the Linux kernel when processing batch requests,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-32233)
Gwangun Jung discovered that the Quick Fair Queueing scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-31436)
Reima Ishii discovered that the nested KVM implementation for Intel x86
processors in the Linux kernel did not properly validate control registers
in certain situations. An attacker in a guest VM could use this to cause a
denial of service (guest crash). (CVE-2023-30456)
It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux
kernel did not properly perform data buffer size validation in some
situations. A physically proximate attacker could use this to craft a
malicious USB device that when inserted, could cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-1380)
Jean-Baptiste Cayrou discovered that the shiftfs file system in the Ubuntu
Linux kernel contained a race condition when handling inode locking in some
situations. A local attacker could use this to cause a denial of service
(kernel deadlock). (CVE-2023-2612)
CVEs:
- https://ubuntu.com/security/CVE-2023-32233
- https://ubuntu.com/security/CVE-2023-31436
- https://ubuntu.com/security/CVE-2023-30456
- https://ubuntu.com/security/CVE-2023-1380
- https://ubuntu.com/security/CVE-2023-2612
- https://ubuntu.com/security/CVE-2023-30456
- https://ubuntu.com/security/CVE-2023-1380
- https://ubuntu.com/security/CVE-2023-32233
- https://ubuntu.com/security/CVE-2023-2612
- https://ubuntu.com/security/CVE-2023-31436
Title: USN-6135-1: Linux kernel (Azure CVM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6135-1
Priorities: high,medium
Description:
Patryk Sondej and Piotr Krysiuk discovered that a race condition existed in
the netfilter subsystem of the Linux kernel when processing batch requests,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-32233)
Gwangun Jung discovered that the Quick Fair Queueing scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-31436)
Reima Ishii discovered that the nested KVM implementation for Intel x86
processors in the Linux kernel did not properly validate control registers
in certain situations. An attacker in a guest VM could use this to cause a
denial of service (guest crash). (CVE-2023-30456)
It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux
kernel did not properly perform data buffer size validation in some
situations. A physically proximate attacker could use this to craft a
malicious USB device that when inserted, could cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-1380)
Jean-Baptiste Cayrou discovered that the shiftfs file system in the Ubuntu
Linux kernel contained a race condition when handling inode locking in some
situations. A local attacker could use this to cause a denial of service
(kernel deadlock). (CVE-2023-2612)
CVEs:
- https://ubuntu.com/security/CVE-2023-32233
- https://ubuntu.com/security/CVE-2023-31436
- https://ubuntu.com/security/CVE-2023-30456
- https://ubuntu.com/security/CVE-2023-1380
- https://ubuntu.com/security/CVE-2023-2612
- https://ubuntu.com/security/CVE-2023-32233
- https://ubuntu.com/security/CVE-2023-1380
- https://ubuntu.com/security/CVE-2023-2612
- https://ubuntu.com/security/CVE-2023-31436
- https://ubuntu.com/security/CVE-2023-30456
Title: USN-6127-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6127-1
Priorities: high,medium
Description:
Patryk Sondej and Piotr Krysiuk discovered that a race condition existed in
the netfilter subsystem of the Linux kernel when processing batch requests,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-32233)
Gwangun Jung discovered that the Quick Fair Queueing scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-31436)
Reima Ishii discovered that the nested KVM implementation for Intel x86
processors in the Linux kernel did not properly validate control registers
in certain situations. An attacker in a guest VM could use this to cause a
denial of service (guest crash). (CVE-2023-30456)
It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux
kernel did not properly perform data buffer size validation in some
situations. A physically proximate attacker could use this to craft a
malicious USB device that when inserted, could cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-1380)
Jean-Baptiste Cayrou discovered that the shiftfs file system in the Ubuntu
Linux kernel contained a race condition when handling inode locking in some
situations. A local attacker could use this to cause a denial of service
(kernel deadlock). (CVE-2023-2612)
CVEs:
- https://ubuntu.com/security/CVE-2023-32233
- https://ubuntu.com/security/CVE-2023-31436
- https://ubuntu.com/security/CVE-2023-30456
- https://ubuntu.com/security/CVE-2023-1380
- https://ubuntu.com/security/CVE-2023-2612
- https://ubuntu.com/security/CVE-2023-32233
- https://ubuntu.com/security/CVE-2023-1380
- https://ubuntu.com/security/CVE-2023-2612
- https://ubuntu.com/security/CVE-2023-31436
- https://ubuntu.com/security/CVE-2023-30456
Title: USN-6128-1: CUPS vulnerability
URL: https://ubuntu.com/security/notices/USN-6128-1
Priorities: medium
Description:
It was discovered that CUPS incorrectly handled logging. A remote attacker
could use this issue to cause CUPS to crash, resulting in a denial of
service, or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2023-32324
Title: USN-6165-1: GLib vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6165-1
Priorities: medium,low
Description:
It was discovered that GLib incorrectly handled non-normal GVariants. An
attacker could use this issue to cause GLib to crash, resulting in a denial
of service, or perform other unknown attacks.
CVEs:
- https://ubuntu.com/security/CVE-2023-32636
- https://ubuntu.com/security/CVE-2023-32665
- https://ubuntu.com/security/CVE-2023-24593
- https://ubuntu.com/security/CVE-2023-32611
- https://ubuntu.com/security/CVE-2023-29499
- https://ubuntu.com/security/CVE-2023-25180
- https://ubuntu.com/security/CVE-2023-32643
Title: USN-6147-1: SpiderMonkey vulnerability
URL: https://ubuntu.com/security/notices/USN-6147-1
Priorities: medium
Description:
Several security issues were discovered in the SpiderMonkey JavaScript
library. If a user were tricked into opening malicious JavaScript
applications or processing malformed data, a remote attacker could exploit
a variety of issues related to JavaScript security, including denial of
service attacks, and arbitrary code execution.
CVEs:
- https://ubuntu.com/security/CVE-2023-34416
Available in VMware Tanzu Network
Release Date: June 02, 2023
BOSH Agent Version: 2.536.0
Title: USN-6117-1: Apache Batik vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6117-1
Priorities: medium
Description:
It was discovered that Apache Batik incorrectly handled certain inputs. An
attacker could possibly use this to perform a cross site request forgery
attack. (CVE-2019-17566, CVE-2020-11987, CVE-2022-38398, CVE-2022-38648)
It was discovered that Apache Batik incorrectly handled Jar URLs in some
situations. A remote attacker could use this issue to access files on the
server. (CVE-2022-40146)
It was discovered that Apache Batik allowed running untrusted Java code from
an SVG. An attacker could use this issue to cause a denial of service,
or possibly execute arbitrary code. (CVE-2022-41704, CVE-2022-42890)
CVEs:
- https://ubuntu.com/security/CVE-2019-17566
- https://ubuntu.com/security/CVE-2020-11987
- https://ubuntu.com/security/CVE-2022-38398
- https://ubuntu.com/security/CVE-2022-38648
- https://ubuntu.com/security/CVE-2022-40146
- https://ubuntu.com/security/CVE-2022-41704
- https://ubuntu.com/security/CVE-2022-42890
- https://ubuntu.com/security/CVE-2022-40146
- https://ubuntu.com/security/CVE-2020-11987
- https://ubuntu.com/security/CVE-2022-41704
- https://ubuntu.com/security/CVE-2022-38648
- https://ubuntu.com/security/CVE-2022-38398
- https://ubuntu.com/security/CVE-2019-17566
- https://ubuntu.com/security/CVE-2022-42890
Title: USN-6099-1: ncurses vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6099-1
Priorities: negligible,medium
Description:
It was discovered that ncurses was incorrectly performing bounds
checks when processing invalid hashcodes. An attacker could possibly
use this issue to cause a denial of service or to expose sensitive
information. This issue only affected Ubuntu 18.04 LTS.
(CVE-2019-17594)
It was discovered that ncurses was incorrectly handling
end-of-string characters when processing terminfo and termcap files.
An attacker could possibly use this issue to cause a denial of
service or to expose sensitive information. This issue only affected
Ubuntu 18.04 LTS. (CVE-2019-17595)
It was discovered that ncurses was incorrectly handling
end-of-string characters when converting between termcap and
terminfo formats. An attacker could possibly use this issue to cause
a denial of service or execute arbitrary code. This issue only
affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2021-39537)
It was discovered that ncurses was incorrectly performing bounds
checks when dealing with corrupt terminfo data while reading a
terminfo file. An attacker could possibly use this issue to cause a
denial of service or to expose sensitive information. This issue only
affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
(CVE-2022-29458)
It was discovered that ncurses was parsing environment variables when
running with setuid applications and not properly handling the
processing of malformed data when doing so. A local attacker could
possibly use this issue to cause a denial of service (application
crash) or execute arbitrary code. (CVE-2023-29491)
CVEs:
- https://ubuntu.com/security/CVE-2019-17594
- https://ubuntu.com/security/CVE-2019-17595
- https://ubuntu.com/security/CVE-2021-39537
- https://ubuntu.com/security/CVE-2022-29458
- https://ubuntu.com/security/CVE-2023-29491
- https://ubuntu.com/security/CVE-2021-39537
- https://ubuntu.com/security/CVE-2023-29491
- https://ubuntu.com/security/CVE-2022-29458
- https://ubuntu.com/security/CVE-2019-17594
- https://ubuntu.com/security/CVE-2019-17595
Title: USN-6102-1: xmldom vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6102-1
Priorities: medium
Description:
It was discovered that xmldom incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to cause
unexpected syntactic changes during XML processing. This issue only affected
Ubuntu 20.04 LTS. (CVE-2021-21366)
It was discovered that xmldom incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to cause a
denial of service. (CVE-2022-37616, CVE-2022-39353)
CVEs:
- https://ubuntu.com/security/CVE-2021-21366
- https://ubuntu.com/security/CVE-2022-37616
- https://ubuntu.com/security/CVE-2022-39353
- https://ubuntu.com/security/CVE-2021-21366
- https://ubuntu.com/security/CVE-2022-37616
- https://ubuntu.com/security/CVE-2022-39353
Title: USN-6108-1: Jhead vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6108-1
Priorities: medium
Description:
It was discovered that Jhead did not properly handle certain crafted images
while rotating them. An attacker could possibly use this issue to crash Jhead,
resulting in a denial of service. (CVE-2021-34055)
Kyle Brown discovered that Jhead did not properly handle certain crafted
images while regenerating the Exif thumbnail. An attacker could possibly use
this issue to execute arbitrary commands. (CVE-2022-41751)
CVEs:
- https://ubuntu.com/security/CVE-2021-34055
- https://ubuntu.com/security/CVE-2022-41751
- https://ubuntu.com/security/CVE-2022-41751
- https://ubuntu.com/security/CVE-2021-34055
Title: USN-6110-1: Jhead vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6110-1
Priorities: medium
Description:
It was discovered that Jhead did not properly handle certain crafted Canon
images when processing them. An attacker could possibly use this issue to
crash Jhead, resulting in a denial of service. (CVE-2021-3496)
It was discovered that Jhead did not properly handle certain crafted images
when printing Canon-specific information. An attacker could possibly use this
issue to crash Jhead, resulting in a denial of service. (CVE-2021-28275)
It was discovered that Jhead did not properly handle certain crafted images
when removing unknown sections. An attacker could possibly use this issue to
crash Jhead, resulting in a denial of service. (CVE-2021-28275)
Kyle Brown discovered that Jhead did not properly handle certain crafted
images when editing their comments. An attacker could possibly use this to
crash Jhead, resulting in a denial of service. (LP: #2020068)
CVEs:
- https://ubuntu.com/security/CVE-2021-3496
- https://ubuntu.com/security/CVE-2021-28275
- https://ubuntu.com/security/CVE-2021-28275
- https://ubuntu.com/security/CVE-2021-28277
- https://ubuntu.com/security/CVE-2021-28275
- https://ubuntu.com/security/CVE-2021-3496
Title: USN-6126-1: libvirt vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6126-1
Priorities: low,medium
Description:
It was discovered that libvirt incorrectly handled the nwfilter driver. A
local attacker could possibly use this issue to cause libvirt to crash,
resulting in a denial of service. This issue only affected Ubuntu 22.04
LTS. (CVE-2022-0897)
It was discovered that libvirt incorrectly handled queries for the SR-IOV
PCI device capabilities. A local attacker could possibly use this issue to
cause libvirt to consume resources, leading to a denial of service.
(CVE-2023-2700)
CVEs:
- https://ubuntu.com/security/CVE-2022-0897
- https://ubuntu.com/security/CVE-2023-2700
- https://ubuntu.com/security/CVE-2022-0897
- https://ubuntu.com/security/CVE-2023-2700
Title: USN-6116-1: hawk vulnerability
URL: https://ubuntu.com/security/notices/USN-6116-1
Priorities: medium
Description:
It was discovered that hawk incorrectly handled certain inputs. If a user or
an automated system were tricked into opening a specially crafted input file,
a remote attacker could possibly use this issue to cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2022-29167
Title: USN-6089-1: Linux kernel (OEM) vulnerability
URL: https://ubuntu.com/security/notices/USN-6089-1
Priorities: medium
Description:
It was discovered that the Intel i915 graphics driver in the Linux kernel
did not perform a GPU TLB flush in some situations. A local attacker could
use this to cause a denial of service or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-4139
Title: USN-6125-1: snapd vulnerability
URL: https://ubuntu.com/security/notices/USN-6125-1
Priorities: medium
Description:
It was discovered that the snap sandbox did not restrict the use of the
ioctl system call with a TIOCLINUX request. This could be exploited by a
malicious snap to inject commands into the controlling terminal which would
then be executed outside of the snap sandbox once the snap had exited. This
could allow an attacker to execute arbitrary commands outside of the
confined snap sandbox. Note: graphical terminal emulators like xterm,
gnome-terminal and others are not affected - this can only be exploited
when snaps are run on a virtual console.
CVEs:
- https://ubuntu.com/security/CVE-2023-1523
Title: USN-6101-1: GNU binutils vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6101-1
Priorities: medium,low
Description:
It was discovered that GNU binutils incorrectly handled certain DWARF
files. An attacker could possibly use this issue to cause a crash or
execute arbitrary code. This issue only affected Ubuntu 22.10.
(CVE-2023-1579)
It was discovered that GNU binutils did not properly verify the version
definitions in zer0-lengthverdef table. An attacker could possibly use this
issue to cause a crash or execute arbitrary code. This issue only affected
Ubuntu 22.04 LTS, Ubuntu 22.10 and Ubuntu 23.04. (CVE-2023-1972)
It was discovered that GNU binutils did not properly validate the size of
length parameter in vms-alpha. An attacker could possibly use this issue to
cause a crash or access sensitive information. This issue only affected
Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu 22.10.
(CVE-2023-25584)
It was discovered that GNU binutils did not properly initialized the
file_table field of struct module and the_bfd field of asymbol. An attacker
could possibly use this issue to cause a crash. This issue only affected
Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and
Ubuntu 22.04 LTS. (CVE-2023-25585, CVE-2023-25586)
CVEs:
- https://ubuntu.com/security/CVE-2023-1579
- https://ubuntu.com/security/CVE-2023-1972
- https://ubuntu.com/security/CVE-2023-25584
- https://ubuntu.com/security/CVE-2023-25585
- https://ubuntu.com/security/CVE-2023-25586
- https://ubuntu.com/security/CVE-2023-1972
- https://ubuntu.com/security/CVE-2023-25588
- https://ubuntu.com/security/CVE-2023-25585
- https://ubuntu.com/security/CVE-2023-25584
- https://ubuntu.com/security/CVE-2023-1579
Title: USN-6104-1: PostgreSQL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6104-1
Priorities: medium
Description:
Alexander Lakhin discovered that PostgreSQL incorrectly handled certain
CREATE privileges. An authenticated user could possibly use this issue to
execute arbitrary code as the bootstrap supervisor. (CVE-2023-2454)
Wolfgang Walther discovered that PostgreSQL incorrectly handled certain row
security policies. An authenticated user could possibly use this issue to
complete otherwise forbidden reads and modifications. (CVE-2023-2455)
CVEs:
- https://ubuntu.com/security/CVE-2023-2454
- https://ubuntu.com/security/CVE-2023-2455
- https://ubuntu.com/security/CVE-2023-2454
- https://ubuntu.com/security/CVE-2023-2455
Title: USN-6119-1: OpenSSL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6119-1
Priorities: medium,low
Description:
Matt Caswell discovered that OpenSSL incorrectly handled certain ASN.1
object identifiers. A remote attacker could possibly use this issue to
cause OpenSSL to consume resources, resulting in a denial of service.
(CVE-2023-2650)
Anton Romanov discovered that OpenSSL incorrectly handled AES-XTS cipher
decryption on 64-bit ARM platforms. An attacker could possibly use this
issue to cause OpenSSL to crash, resulting in a denial of service. This
issue only affected Ubuntu 22.04 LTS, Ubuntu 22.10, and Ubuntu 23.04.
(CVE-2023-1255)
CVEs:
- https://ubuntu.com/security/CVE-2023-2650
- https://ubuntu.com/security/CVE-2023-1255
- https://ubuntu.com/security/CVE-2023-1255
- https://ubuntu.com/security/CVE-2023-2650
Title: USN-6120-1: SpiderMonkey vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6120-1
Priorities: medium
Description:
Several security issues were discovered in the SpiderMonkey JavaScript
library. If a user were tricked into opening malicious JavaScript
applications or processing malformed data, a remote attacker could exploit
a variety of issues related to JavaScript security, including denial of
service attacks, and arbitrary code execution.
CVEs:
- https://ubuntu.com/security/CVE-2023-29535
- https://ubuntu.com/security/CVE-2023-29536
- https://ubuntu.com/security/CVE-2023-25739
- https://ubuntu.com/security/CVE-2023-32211
- https://ubuntu.com/security/CVE-2023-32215
- https://ubuntu.com/security/CVE-2023-25751
- https://ubuntu.com/security/CVE-2023-29550
- https://ubuntu.com/security/CVE-2023-25735
- https://ubuntu.com/security/CVE-2023-29548
Title: USN-6111-1: Flask vulnerability
URL: https://ubuntu.com/security/notices/USN-6111-1
Priorities: medium
Description:
It was discovered that Flask incorrectly handled certain data responses.
An attacker could possibly use this issue to expose sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2023-30861
Title: USN-6122-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6122-1
Priorities: high,medium
Description:
Patryk Sondej and Piotr Krysiuk discovered that a race condition existed in
the netfilter subsystem of the Linux kernel when processing batch requests,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-32233)
Jean-Baptiste Cayrou discovered that the shiftfs file system in the Ubuntu
Linux kernel contained a race condition when handling inode locking in some
situations. A local attacker could use this to cause a denial of service
(kernel deadlock). (CVE-2023-2612)
CVEs:
- https://ubuntu.com/security/CVE-2023-32233
- https://ubuntu.com/security/CVE-2023-2612
- https://ubuntu.com/security/CVE-2023-32233
- https://ubuntu.com/security/CVE-2023-2612
Title: USN-6124-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6124-1
Priorities: high,medium,low
Description:
Patryk Sondej and Piotr Krysiuk discovered that a race condition existed in
the netfilter subsystem of the Linux kernel when processing batch requests,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-32233)
Reima Ishii discovered that the nested KVM implementation for Intel x86
processors in the Linux kernel did not properly validate control registers
in certain situations. An attacker in a guest VM could use this to cause a
denial of service (guest crash). (CVE-2023-30456)
Gwnaun Jung discovered that the SFB packet scheduling implementation in the
Linux kernel contained a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2022-3586)
It was discovered that the Intel i915 graphics driver in the Linux kernel
did not perform a GPU TLB flush in some situations. A local attacker could
use this to cause a denial of service or possibly execute arbitrary code.
(CVE-2022-4139)
It was discovered that the Xircom PCMCIA network device driver in the Linux
kernel did not properly handle device removal events. A physically
proximate attacker could use this to cause a denial of service (system
crash). (CVE-2023-1670)
Jean-Baptiste Cayrou discovered that the shiftfs file system in the Ubuntu
Linux kernel contained a race condition when handling inode locking in some
situations. A local attacker could use this to cause a denial of service
(kernel deadlock). (CVE-2023-2612)
CVEs:
- https://ubuntu.com/security/CVE-2023-32233
- https://ubuntu.com/security/CVE-2023-30456
- https://ubuntu.com/security/CVE-2022-3586
- https://ubuntu.com/security/CVE-2022-4139
- https://ubuntu.com/security/CVE-2023-1670
- https://ubuntu.com/security/CVE-2023-2612
- https://ubuntu.com/security/CVE-2023-30456
- https://ubuntu.com/security/CVE-2023-32233
- https://ubuntu.com/security/CVE-2023-2612
- https://ubuntu.com/security/CVE-2022-4139
- https://ubuntu.com/security/CVE-2022-3586
- https://ubuntu.com/security/CVE-2023-1670
Title: USN-6123-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6123-1
Priorities: high,low,medium
Description:
Patryk Sondej and Piotr Krysiuk discovered that a race condition existed in
the netfilter subsystem of the Linux kernel when processing batch requests,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-32233)
Reima Ishii discovered that the nested KVM implementation for Intel x86
processors in the Linux kernel did not properly validate control registers
in certain situations. An attacker in a guest VM could use this to cause a
denial of service (guest crash). (CVE-2023-30456)
It was discovered that the Xircom PCMCIA network device driver in the Linux
kernel did not properly handle device removal events. A physically
proximate attacker could use this to cause a denial of service (system
crash). (CVE-2023-1670)
Jean-Baptiste Cayrou discovered that the shiftfs file system in the Ubuntu
Linux kernel contained a race condition when handling inode locking in some
situations. A local attacker could use this to cause a denial of service
(kernel deadlock). (CVE-2023-2612)
It was discovered that the NTFS file system implementation in the Linux
kernel did not properly handle a loop termination condition, leading to an
out-of-bounds read vulnerability. A local attacker could use this to cause
a denial of service (system crash) or possibly expose sensitive
information. (CVE-2023-26606)
CVEs:
- https://ubuntu.com/security/CVE-2023-32233
- https://ubuntu.com/security/CVE-2023-30456
- https://ubuntu.com/security/CVE-2023-1670
- https://ubuntu.com/security/CVE-2023-2612
- https://ubuntu.com/security/CVE-2023-26606
- https://ubuntu.com/security/CVE-2023-30456
- https://ubuntu.com/security/CVE-2023-2612
- https://ubuntu.com/security/CVE-2023-1670
- https://ubuntu.com/security/CVE-2023-26606
- https://ubuntu.com/security/CVE-2023-32233
Title: USN-6127-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6127-1
Priorities: high,medium
Description:
Patryk Sondej and Piotr Krysiuk discovered that a race condition existed in
the netfilter subsystem of the Linux kernel when processing batch requests,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-32233)
Gwangun Jung discovered that the Quick Fair Queueing scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-31436)
Reima Ishii discovered that the nested KVM implementation for Intel x86
processors in the Linux kernel did not properly validate control registers
in certain situations. An attacker in a guest VM could use this to cause a
denial of service (guest crash). (CVE-2023-30456)
It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux
kernel did not properly perform data buffer size validation in some
situations. A physically proximate attacker could use this to craft a
malicious USB device that when inserted, could cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-1380)
Jean-Baptiste Cayrou discovered that the shiftfs file system in the Ubuntu
Linux kernel contained a race condition when handling inode locking in some
situations. A local attacker could use this to cause a denial of service
(kernel deadlock). (CVE-2023-2612)
CVEs:
- https://ubuntu.com/security/CVE-2023-32233
- https://ubuntu.com/security/CVE-2023-31436
- https://ubuntu.com/security/CVE-2023-30456
- https://ubuntu.com/security/CVE-2023-1380
- https://ubuntu.com/security/CVE-2023-2612
- https://ubuntu.com/security/CVE-2023-32233
- https://ubuntu.com/security/CVE-2023-1380
- https://ubuntu.com/security/CVE-2023-2612
- https://ubuntu.com/security/CVE-2023-31436
- https://ubuntu.com/security/CVE-2023-30456
Title: USN-6115-1: TeX Live vulnerability
URL: https://ubuntu.com/security/notices/USN-6115-1
Priorities: medium
Description:
Max Chernoff discovered that LuaTeX (TeX Live) did not properly disable
shell escape. An attacker could possibly use this issue to execute
arbitrary shell commands.
CVEs:
- https://ubuntu.com/security/CVE-2023-32700
Available in VMware Tanzu Network
Release Date: May 22, 2023
BOSH Agent Version: 2.533.0
Title: USN-6049-1: Netty vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6049-1
Priorities: medium
Description:
It was discovered that Netty’s Zlib decoders did not limit memory
allocations. A remote attacker could possibly use this issue to cause
Netty to exhaust memory via malicious input, leading to a denial of
service. This issue only affected Ubuntu 16.04 ESM and Ubuntu 20.04 ESM.
(CVE-2020-11612)
It was discovered that Netty created temporary files with excessive
permissions. A local attacker could possibly use this issue to expose
sensitive information. This issue only affected Ubuntu 16.04 ESM, Ubuntu
18.04 ESM, and Ubuntu 20.04 ESM. (CVE-2021-21290)
It was discovered that Netty did not properly validate content-length
headers. A remote attacker could possibly use this issue to smuggle
requests. This issue was only fixed in Ubuntu 20.04 ESM. (CVE-2021-21295,
CVE-2021-21409)
It was discovered that Netty’s Bzip2 decompression decoder did not limit
the decompressed output data size. A remote attacker could possibly use
this issue to cause Netty to exhaust memory via malicious input, leading
to a denial of service. This issue only affected Ubuntu 18.04 ESM, Ubuntu
20.04 ESM, Ubuntu 22.04 LTS, and Ubuntu 22.10. (CVE-2021-37136)
It was discovered that Netty’s Snappy frame decoder function did not limit
chunk lengths. A remote attacker could possibly use this issue to cause
Netty to exhaust memory via malicious input, leading to a denial of
service. (CVE-2021-37137)
It was discovered that Netty did not properly handle control chars at the
beginning and end of header names. A remote attacker could possibly use
this issue to smuggle requests. This issue only affected Ubuntu 18.04 ESM,
Ubuntu 20.04 ESM, Ubuntu 22.04 LTS, and Ubuntu 22.10. (CVE-2021-43797)
It was discovered that Netty could be made into an infinite recursion when
parsing a malformed crafted message. A remote attacker could possibly use
this issue to cause Netty to crash, leading to a denial of service. This
issue only affected Ubuntu 20.04 ESM, Ubuntu 22.04 LTS, and Ubuntu 22.10.
(CVE-2022-41881)
It was discovered that Netty did not validate header values under certain
circumstances. A remote attacker could possibly use this issue to perform
HTTP response splitting via malicious header values. This issue only
affected Ubuntu 18.04 ESM, Ubuntu 20.04 ESM, Ubuntu 22.04 LTS, and Ubuntu
22.10. (CVE-2022-41915)
CVEs:
- https://ubuntu.com/security/CVE-2020-11612
- https://ubuntu.com/security/CVE-2021-21290
- https://ubuntu.com/security/CVE-2021-21295
- https://ubuntu.com/security/CVE-2021-21409
- https://ubuntu.com/security/CVE-2021-37136
- https://ubuntu.com/security/CVE-2021-37137
- https://ubuntu.com/security/CVE-2021-43797
- https://ubuntu.com/security/CVE-2022-41881
- https://ubuntu.com/security/CVE-2022-41915
- https://ubuntu.com/security/CVE-2021-21295
- https://ubuntu.com/security/CVE-2022-41881
- https://ubuntu.com/security/CVE-2021-37137
- https://ubuntu.com/security/CVE-2021-21290
- https://ubuntu.com/security/CVE-2021-37136
- https://ubuntu.com/security/CVE-2021-21409
- https://ubuntu.com/security/CVE-2020-11612
- https://ubuntu.com/security/CVE-2022-41915
- https://ubuntu.com/security/CVE-2021-43797
Title: USN-6067-1: OpenStack Neutron vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6067-1
Priorities: medium
Description:
David Sinquin discovered that OpenStack Neutron incorrectly handled the
default Open vSwitch firewall rules. An attacker could possibly use this
issue to impersonate the IPv6 addresses of other systems on the network.
This issue only affected Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS.
(CVE-2021-20267)
Jake Yip and Justin Mammarella discovered that OpenStack Neutron
incorrectly handled the linuxbridge driver when ebtables-nft is being
used. An attacker could possibly use this issue to impersonate the hardware
addresss of other systems on the network. This issue only affected Ubuntu
18.04 LTS, and Ubuntu 20.04 LTS. (CVE-2021-38598)
Pavel Toporkov discovered that OpenStack Neutron incorrectly handled
extra_dhcp_opts values. An attacker could possibly use this issue to
reconfigure dnsmasq. This issue only affected Ubuntu 18.04 LTS, and Ubuntu
20.04 LTS. (CVE-2021-40085)
Slawek Kaplonski discovered that OpenStack Neutron incorrectly handled the
routes middleware. An attacker could possibly use this issue to cause the
API worker to consume memory, leading to a denial of service. This issue
only affected Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS. (CVE-2021-40797)
It was discovered that OpenStack Neutron incorrectly handled certain
queries. A remote authenticated user could possibly use this issue to cause
resource consumption, leading to a denial of service. (CVE-2022-3277)
CVEs:
- https://ubuntu.com/security/CVE-2021-20267
- https://ubuntu.com/security/CVE-2021-38598
- https://ubuntu.com/security/CVE-2021-40085
- https://ubuntu.com/security/CVE-2021-40797
- https://ubuntu.com/security/CVE-2022-3277
- https://ubuntu.com/security/CVE-2021-20267
- https://ubuntu.com/security/CVE-2022-3277
- https://ubuntu.com/security/CVE-2021-40085
- https://ubuntu.com/security/CVE-2021-40797
- https://ubuntu.com/security/CVE-2021-38598
Title: USN-6037-1: Apache Commons Net vulnerability
URL: https://ubuntu.com/security/notices/USN-6037-1
Priorities: medium
Description:
ZeddYu Lu discovered that the FTP client from Apache Commons Net trusted
the host from PASV responses by default. A remote attacker with a
malicious FTP server could redirect the client to another server, which
could possibly result in leaked information about services running on the
private network of the client.
CVEs:
- https://ubuntu.com/security/CVE-2021-37533
Title: USN-6063-1: Ceph vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6063-1
Priorities: low,medium
Description:
Mark Kirkwood discovered that Ceph incorrectly handled certain key lengths.
An attacker could possibly use this issue to create non-random encryption
keys. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS.
(CVE-2021-3979)
It was discovered that Ceph incorrectly handled the volumes plugin. An
attacker could possibly use this issue to obtain access to any share. This
issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 22.10.
(CVE-2022-0670)
It was discovered that Ceph incorrectly handled crash dumps. A local
attacker could possibly use this issue to escalate privileges to root. This
issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 22.10.
(CVE-2022-3650)
It was discovered that Ceph incorrectly handled URL processing on RGW
backends. An attacker could possibly use this issue to cause RGW to crash,
leading to a denial of service. This issue only affected Ubuntu 22.04 LTS
and Ubuntu 22.10. (CVE-2022-3854)
CVEs:
- https://ubuntu.com/security/CVE-2021-3979
- https://ubuntu.com/security/CVE-2022-0670
- https://ubuntu.com/security/CVE-2022-3650
- https://ubuntu.com/security/CVE-2022-3854
- https://ubuntu.com/security/CVE-2021-3979
- https://ubuntu.com/security/CVE-2022-3854
- https://ubuntu.com/security/CVE-2022-3650
- https://ubuntu.com/security/CVE-2022-0670
Title: USN-6079-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6079-1
Priorities: medium,low,negligible
Description:
It was discovered that some AMD x86-64 processors with SMT enabled could
speculatively execute instructions using a return address from a sibling
thread. A local attacker could possibly use this to expose sensitive
information. (CVE-2022-27672)
Ziming Zhang discovered that the VMware Virtual GPU DRM driver in the Linux
kernel contained an out-of-bounds write vulnerability. A local attacker
could use this to cause a denial of service (system crash).
(CVE-2022-36280)
Zheng Wang discovered that the Intel i915 graphics driver in the Linux
kernel did not properly handle certain error conditions, leading to a
double-free. A local attacker could possibly use this to cause a denial of
service (system crash). (CVE-2022-3707)
Haowei Yan discovered that a race condition existed in the Layer 2
Tunneling Protocol (L2TP) implementation in the Linux kernel. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2022-4129)
It was discovered that the NTFS file system implementation in the Linux
kernel contained a null pointer dereference in some situations. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2022-4842)
It was discovered that the NTFS file system implementation in the Linux
kernel did not properly validate attributes in certain situations, leading
to an out-of-bounds write vulnerability. A local attacker could use this to
cause a denial of service (system crash). (CVE-2022-48423)
It was discovered that the NTFS file system implementation in the Linux
kernel did not properly validate attributes in certain situations, leading
to an out-of-bounds read vulnerability. A local attacker could possibly use
this to expose sensitive information (kernel memory). (CVE-2022-48424)
It was discovered that the KSMBD implementation in the Linux kernel did not
properly validate buffer lengths, leading to a heap-based buffer overflow.
A remote attacker could possibly use this to cause a denial of service
(system crash). (CVE-2023-0210)
Kyle Zeng discovered that the IPv6 implementation in the Linux kernel
contained a NULL pointer dereference vulnerability in certain situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2023-0394)
Jordy Zomer and Alexandra Sandulescu discovered that syscalls invoking the
do_prlimit() function in the Linux kernel did not properly handle
speculative execution barriers. A local attacker could use this to expose
sensitive information (kernel memory). (CVE-2023-0458)
Jordy Zomer and Alexandra Sandulescu discovered that the Linux kernel did
not properly implement speculative execution barriers in usercopy functions
in certain situations. A local attacker could use this to expose sensitive
information (kernel memory). (CVE-2023-0459)
It was discovered that the Human Interface Device (HID) support driver in
the Linux kernel contained a type confusion vulnerability in some
situations. A local attacker could use this to cause a denial of service
(system crash). (CVE-2023-1073)
It was discovered that a memory leak existed in the SCTP protocol
implementation in the Linux kernel. A local attacker could use this to
cause a denial of service (memory exhaustion). (CVE-2023-1074)
It was discovered that the TLS subsystem in the Linux kernel contained a
type confusion vulnerability in some situations. A local attacker could use
this to cause a denial of service (system crash) or possibly expose
sensitive information. (CVE-2023-1075)
It was discovered that the Reliable Datagram Sockets (RDS) protocol
implementation in the Linux kernel contained a type confusion vulnerability
in some situations. An attacker could use this to cause a denial of service
(system crash). (CVE-2023-1078)
Xingyuan Mo discovered that the x86 KVM implementation in the Linux kernel
did not properly initialize some data structures. A local attacker could
use this to expose sensitive information (kernel memory). (CVE-2023-1513)
It was discovered that the NFS implementation in the Linux kernel did not
properly handle pending tasks in some situations. A local attacker could
use this to cause a denial of service (system crash) or expose sensitive
information (kernel memory). (CVE-2023-1652)
It was discovered that the ARM64 EFI runtime services implementation in the
Linux kernel did not properly manage concurrency calls. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-21102)
It was discovered that a race condition existed in Adreno GPU DRM driver in
the Linux kernel, leading to a double-free vulnerability. A local attacker
could use this to cause a denial of service (system crash).
(CVE-2023-21106)
It was discovered that a use-after-free vulnerability existed in the iSCSI
TCP implementation in the Linux kernel. A local attacker could possibly use
this to cause a denial of service (system crash). (CVE-2023-2162)
Kyle Zeng discovered that the class-based queuing discipline implementation
in the Linux kernel contained a type confusion vulnerability in some
situations. An attacker could use this to cause a denial of service (system
crash). (CVE-2023-23454)
Kyle Zeng discovered that the ATM VC queuing discipline implementation in
the Linux kernel contained a type confusion vulnerability in some
situations. An attacker could use this to cause a denial of service (system
crash). (CVE-2023-23455)
It was discovered that the NTFS file system implementation in the Linux
kernel did not properly validate the size of attributes when parsing MFT. A
local attacker could possibly use this to cause a denial of service (system
crash) or expose sensitive information (kernel memory). (CVE-2023-26544)
It was discovered that the NET/ROM protocol implementation in the Linux
kernel contained a race condition in some situations, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2023-32269)
Duoming Zhou discovered that a race condition existed in the infrared
receiver/transceiver driver in the Linux kernel, leading to a use-after-
free vulnerability. A privileged attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2023-1118)
CVEs:
- https://ubuntu.com/security/CVE-2022-27672
- https://ubuntu.com/security/CVE-2022-36280
- https://ubuntu.com/security/CVE-2022-3707
- https://ubuntu.com/security/CVE-2022-4129
- https://ubuntu.com/security/CVE-2022-4842
- https://ubuntu.com/security/CVE-2022-48423
- https://ubuntu.com/security/CVE-2022-48424
- https://ubuntu.com/security/CVE-2023-0210
- https://ubuntu.com/security/CVE-2023-0394
- https://ubuntu.com/security/CVE-2023-0458
- https://ubuntu.com/security/CVE-2023-0459
- https://ubuntu.com/security/CVE-2023-1073
- https://ubuntu.com/security/CVE-2023-1074
- https://ubuntu.com/security/CVE-2023-1075
- https://ubuntu.com/security/CVE-2023-1078
- https://ubuntu.com/security/CVE-2023-1513
- https://ubuntu.com/security/CVE-2023-1652
- https://ubuntu.com/security/CVE-2023-21102
- https://ubuntu.com/security/CVE-2023-21106
- https://ubuntu.com/security/CVE-2023-2162
- https://ubuntu.com/security/CVE-2023-23454
- https://ubuntu.com/security/CVE-2023-23455
- https://ubuntu.com/security/CVE-2023-26544
- https://ubuntu.com/security/CVE-2023-32269
- https://ubuntu.com/security/CVE-2023-1118
- https://ubuntu.com/security/CVE-2023-0458
- https://ubuntu.com/security/CVE-2023-26544
- https://ubuntu.com/security/CVE-2022-4842
- https://ubuntu.com/security/CVE-2023-0210
- https://ubuntu.com/security/CVE-2023-0394
- https://ubuntu.com/security/CVE-2023-1075
- https://ubuntu.com/security/CVE-2023-21106
- https://ubuntu.com/security/CVE-2023-1074
- https://ubuntu.com/security/CVE-2023-23455
- https://ubuntu.com/security/CVE-2022-48423
- https://ubuntu.com/security/CVE-2023-1513
- https://ubuntu.com/security/CVE-2023-21102
- https://ubuntu.com/security/CVE-2023-1073
- https://ubuntu.com/security/CVE-2022-27672
- https://ubuntu.com/security/CVE-2022-3707
- https://ubuntu.com/security/CVE-2022-36280
- https://ubuntu.com/security/CVE-2022-4129
- https://ubuntu.com/security/CVE-2023-32269
- https://ubuntu.com/security/CVE-2022-48424
- https://ubuntu.com/security/CVE-2023-1078
- https://ubuntu.com/security/CVE-2023-2162
- https://ubuntu.com/security/CVE-2023-1652
- https://ubuntu.com/security/CVE-2023-1118
- https://ubuntu.com/security/CVE-2023-23454
- https://ubuntu.com/security/CVE-2023-0459
Title: USN-6080-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6080-1
Priorities: medium,low,negligible
Description:
It was discovered that some AMD x86-64 processors with SMT enabled could
speculatively execute instructions using a return address from a sibling
thread. A local attacker could possibly use this to expose sensitive
information. (CVE-2022-27672)
Zheng Wang discovered that the Intel i915 graphics driver in the Linux
kernel did not properly handle certain error conditions, leading to a
double-free. A local attacker could possibly use this to cause a denial of
service (system crash). (CVE-2022-3707)
Jordy Zomer and Alexandra Sandulescu discovered that the Linux kernel did
not properly implement speculative execution barriers in usercopy functions
in certain situations. A local attacker could use this to expose sensitive
information (kernel memory). (CVE-2023-0459)
It was discovered that the TLS subsystem in the Linux kernel contained a
type confusion vulnerability in some situations. A local attacker could use
this to cause a denial of service (system crash) or possibly expose
sensitive information. (CVE-2023-1075)
It was discovered that the Reliable Datagram Sockets (RDS) protocol
implementation in the Linux kernel contained a type confusion vulnerability
in some situations. An attacker could use this to cause a denial of service
(system crash). (CVE-2023-1078)
Xingyuan Mo discovered that the x86 KVM implementation in the Linux kernel
did not properly initialize some data structures. A local attacker could
use this to expose sensitive information (kernel memory). (CVE-2023-1513)
It was discovered that the Android Binder IPC subsystem in the Linux kernel
did not properly validate inputs in some situations, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2023-20938)
It was discovered that a use-after-free vulnerability existed in the iSCSI
TCP implementation in the Linux kernel. A local attacker could possibly use
this to cause a denial of service (system crash). (CVE-2023-2162)
It was discovered that the NET/ROM protocol implementation in the Linux
kernel contained a race condition in some situations, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2023-32269)
Duoming Zhou discovered that a race condition existed in the infrared
receiver/transceiver driver in the Linux kernel, leading to a use-after-
free vulnerability. A privileged attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2023-1118)
CVEs:
- https://ubuntu.com/security/CVE-2022-27672
- https://ubuntu.com/security/CVE-2022-3707
- https://ubuntu.com/security/CVE-2023-0459
- https://ubuntu.com/security/CVE-2023-1075
- https://ubuntu.com/security/CVE-2023-1078
- https://ubuntu.com/security/CVE-2023-1513
- https://ubuntu.com/security/CVE-2023-20938
- https://ubuntu.com/security/CVE-2023-2162
- https://ubuntu.com/security/CVE-2023-32269
- https://ubuntu.com/security/CVE-2023-1118
- https://ubuntu.com/security/CVE-2022-27672
- https://ubuntu.com/security/CVE-2023-1075
- https://ubuntu.com/security/CVE-2023-0459
- https://ubuntu.com/security/CVE-2023-32269
- https://ubuntu.com/security/CVE-2023-1118
- https://ubuntu.com/security/CVE-2022-3707
- https://ubuntu.com/security/CVE-2023-2162
- https://ubuntu.com/security/CVE-2023-1513
- https://ubuntu.com/security/CVE-2023-1078
- https://ubuntu.com/security/CVE-2023-20938
Title: USN-6085-1: Linux kernel (Raspberry Pi) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6085-1
Priorities: medium,low,negligible
Description:
It was discovered that some AMD x86-64 processors with SMT enabled could
speculatively execute instructions using a return address from a sibling
thread. A local attacker could possibly use this to expose sensitive
information. (CVE-2022-27672)
Zheng Wang discovered that the Intel i915 graphics driver in the Linux
kernel did not properly handle certain error conditions, leading to a
double-free. A local attacker could possibly use this to cause a denial of
service (system crash). (CVE-2022-3707)
Jordy Zomer and Alexandra Sandulescu discovered that the Linux kernel did
not properly implement speculative execution barriers in usercopy functions
in certain situations. A local attacker could use this to expose sensitive
information (kernel memory). (CVE-2023-0459)
It was discovered that the TLS subsystem in the Linux kernel contained a
type confusion vulnerability in some situations. A local attacker could use
this to cause a denial of service (system crash) or possibly expose
sensitive information. (CVE-2023-1075)
It was discovered that the Reliable Datagram Sockets (RDS) protocol
implementation in the Linux kernel contained a type confusion vulnerability
in some situations. An attacker could use this to cause a denial of service
(system crash). (CVE-2023-1078)
Xingyuan Mo discovered that the x86 KVM implementation in the Linux kernel
did not properly initialize some data structures. A local attacker could
use this to expose sensitive information (kernel memory). (CVE-2023-1513)
It was discovered that the Android Binder IPC subsystem in the Linux kernel
did not properly validate inputs in some situations, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2023-20938)
It was discovered that a use-after-free vulnerability existed in the iSCSI
TCP implementation in the Linux kernel. A local attacker could possibly use
this to cause a denial of service (system crash). (CVE-2023-2162)
It was discovered that the NET/ROM protocol implementation in the Linux
kernel contained a race condition in some situations, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2023-32269)
Duoming Zhou discovered that a race condition existed in the infrared
receiver/transceiver driver in the Linux kernel, leading to a use-after-
free vulnerability. A privileged attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2023-1118)
CVEs:
- https://ubuntu.com/security/CVE-2022-27672
- https://ubuntu.com/security/CVE-2022-3707
- https://ubuntu.com/security/CVE-2023-0459
- https://ubuntu.com/security/CVE-2023-1075
- https://ubuntu.com/security/CVE-2023-1078
- https://ubuntu.com/security/CVE-2023-1513
- https://ubuntu.com/security/CVE-2023-20938
- https://ubuntu.com/security/CVE-2023-2162
- https://ubuntu.com/security/CVE-2023-32269
- https://ubuntu.com/security/CVE-2023-1118
- https://ubuntu.com/security/CVE-2023-1513
- https://ubuntu.com/security/CVE-2023-1118
- https://ubuntu.com/security/CVE-2022-3707
- https://ubuntu.com/security/CVE-2023-0459
- https://ubuntu.com/security/CVE-2022-27672
- https://ubuntu.com/security/CVE-2023-1078
- https://ubuntu.com/security/CVE-2023-32269
- https://ubuntu.com/security/CVE-2023-2162
- https://ubuntu.com/security/CVE-2023-20938
- https://ubuntu.com/security/CVE-2023-1075
Title: USN-6039-1: OpenSSL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6039-1
Priorities: low,negligible
Description:
It was discovered that OpenSSL was not properly managing file locks when
processing policy constraints. If a user or automated system were tricked
into processing a certificate chain with specially crafted policy
constraints, a remote attacker could possibly use this issue to cause a
denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu
22.10. (CVE-2022-3996)
David Benjamin discovered that OpenSSL was not properly performing the
verification of X.509 certificate chains that include policy constraints,
which could lead to excessive resource consumption. If a user or automated
system were tricked into processing a specially crafted X.509 certificate
chain that includes policy constraints, a remote attacker could possibly
use this issue to cause a denial of service. (CVE-2023-0464)
David Benjamin discovered that OpenSSL was not properly handling invalid
certificate policies in leaf certificates, which would result in certain
policy checks being skipped for the certificate. If a user or automated
system were tricked into processing a specially crafted certificate, a
remote attacker could possibly use this issue to assert invalid
certificate policies and circumvent policy checking. (CVE-2023-0465)
David Benjamin discovered that OpenSSL incorrectly documented the
functionalities of function X509_VERIFY_PARAM_add0_policy, stating that
it would implicitly enable certificate policy checks when doing
certificate verifications, contrary to its implementation. This could
cause users and applications to not perform certificate policy checks
even when expected to do so. (CVE-2023-0466)
CVEs:
- https://ubuntu.com/security/CVE-2022-3996
- https://ubuntu.com/security/CVE-2023-0464
- https://ubuntu.com/security/CVE-2023-0465
- https://ubuntu.com/security/CVE-2023-0466
- https://ubuntu.com/security/CVE-2022-3996
- https://ubuntu.com/security/CVE-2023-0464
- https://ubuntu.com/security/CVE-2023-0466
Title: USN-6057-1: Linux kernel (Intel IoTG) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6057-1
Priorities: high,medium
Description:
It was discovered that the Traffic-Control Index (TCINDEX) implementation
in the Linux kernel contained a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-1281)
It was discovered that the OverlayFS implementation in the Linux kernel did
not properly handle copy up operation in some conditions. A local attacker
could possibly use this to gain elevated privileges. (CVE-2023-0386)
Haowei Yan discovered that a race condition existed in the Layer 2
Tunneling Protocol (L2TP) implementation in the Linux kernel. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2022-4129)
It was discovered that the network queuing discipline implementation in the
Linux kernel contained a null pointer dereference in some situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2022-47929)
It was discovered that the NTFS file system implementation in the Linux
kernel contained a null pointer dereference in some situations. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2022-4842)
Kyle Zeng discovered that the IPv6 implementation in the Linux kernel
contained a NULL pointer dereference vulnerability in certain situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2023-0394)
It was discovered that the Human Interface Device (HID) support driver in
the Linux kernel contained a type confusion vulnerability in some
situations. A local attacker could use this to cause a denial of service
(system crash). (CVE-2023-1073)
It was discovered that a memory leak existed in the SCTP protocol
implementation in the Linux kernel. A local attacker could use this to
cause a denial of service (memory exhaustion). (CVE-2023-1074)
It was discovered that the NFS implementation in the Linux kernel did not
properly handle pending tasks in some situations. A local attacker could
use this to cause a denial of service (system crash) or expose sensitive
information (kernel memory). (CVE-2023-1652)
Lianhui Tang discovered that the MPLS implementation in the Linux kernel
did not properly handle certain sysctl allocation failure conditions,
leading to a double-free vulnerability. An attacker could use this to cause
a denial of service or possibly execute arbitrary code. (CVE-2023-26545)
CVEs:
- https://ubuntu.com/security/CVE-2023-1281
- https://ubuntu.com/security/CVE-2023-0386
- https://ubuntu.com/security/CVE-2022-4129
- https://ubuntu.com/security/CVE-2022-47929
- https://ubuntu.com/security/CVE-2022-4842
- https://ubuntu.com/security/CVE-2023-0394
- https://ubuntu.com/security/CVE-2023-1073
- https://ubuntu.com/security/CVE-2023-1074
- https://ubuntu.com/security/CVE-2023-1652
- https://ubuntu.com/security/CVE-2023-26545
- https://ubuntu.com/security/CVE-2022-4842
- https://ubuntu.com/security/CVE-2023-26545
- https://ubuntu.com/security/CVE-2023-1074
- https://ubuntu.com/security/CVE-2023-1652
- https://ubuntu.com/security/CVE-2023-1073
- https://ubuntu.com/security/CVE-2023-1281
- https://ubuntu.com/security/CVE-2023-0386
- https://ubuntu.com/security/CVE-2022-47929
- https://ubuntu.com/security/CVE-2022-4129
- https://ubuntu.com/security/CVE-2023-0394
Title: USN-6042-1: Cloud-init vulnerability
URL: https://ubuntu.com/security/notices/USN-6042-1
Priorities: medium
Description:
James Golovich discovered that sensitive data could be exposed in logs. An
attacker could use this information to find hashed passwords and possibly
escalate their privilege.
CVEs:
- https://ubuntu.com/security/CVE-2023-1786
Title: USN-6044-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6044-1
Priorities: high,medium
Description:
It was discovered that the Traffic-Control Index (TCINDEX) implementation
in the Linux kernel did not properly perform filter deactivation in some
situations. A local attacker could possibly use this to gain elevated
privileges. Please note that with the fix for this CVE, kernel support for
the TCINDEX classifier has been removed. (CVE-2023-1829)
It was discovered that a race condition existed in the io_uring subsystem
in the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-1872)
CVEs:
- https://ubuntu.com/security/CVE-2023-1829
- https://ubuntu.com/security/CVE-2023-1872
- https://ubuntu.com/security/CVE-2023-1829
- https://ubuntu.com/security/CVE-2023-1872
Title: USN-6051-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6051-1
Priorities: high,medium
Description:
It was discovered that the Traffic-Control Index (TCINDEX) implementation
in the Linux kernel did not properly perform filter deactivation in some
situations. A local attacker could possibly use this to gain elevated
privileges. Please note that with the fix for this CVE, kernel support for
the TCINDEX classifier has been removed. (CVE-2023-1829)
It was discovered that a race condition existed in the io_uring subsystem
in the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-1872)
CVEs:
- https://ubuntu.com/security/CVE-2023-1829
- https://ubuntu.com/security/CVE-2023-1872
- https://ubuntu.com/security/CVE-2023-1829
- https://ubuntu.com/security/CVE-2023-1872
Title: USN-6070-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6070-1
Priorities: high,medium
Description:
It was discovered that the Traffic-Control Index (TCINDEX) implementation
in the Linux kernel did not properly perform filter deactivation in some
situations. A local attacker could possibly use this to gain elevated
privileges. Please note that with the fix for this CVE, kernel support for
the TCINDEX classifier has been removed. (CVE-2023-1829)
It was discovered that a race condition existed in the io_uring subsystem
in the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-1872)
CVEs:
- https://ubuntu.com/security/CVE-2023-1829
- https://ubuntu.com/security/CVE-2023-1872
- https://ubuntu.com/security/CVE-2023-1829
- https://ubuntu.com/security/CVE-2023-1872
Title: USN-6056-1: Linux kernel (OEM) vulnerability
URL: https://ubuntu.com/security/notices/USN-6056-1
Priorities: medium
Description:
It was discovered that a race condition existed in the Xen transport layer
implementation for the 9P file system protocol in the Linux kernel, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service (guest crash) or expose sensitive information (guest
kernel memory).
CVEs:
- https://ubuntu.com/security/CVE-2023-1859
Title: USN-6078-1: libwebp vulnerability
URL: https://ubuntu.com/security/notices/USN-6078-1
Priorities: medium
Description:
Irvan Kurniawan discovered that libwebp incorrectly handled certain memory
operations. If a user or automated system were tricked into opening a
specially crafted image file, a remote attacker could use this issue to
cause libwebp to crash, resulting in a denial of service, or possibly
execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2023-1999
Title: USN-6073-2: Glance_store vulnerability
URL: https://ubuntu.com/security/notices/USN-6073-2
Priorities: medium
Description:
Jan Wasilewski and Gorka Eguileor discovered that Glance_store incorrectly
handled deleted volume attachments. An authenticated user or attacker could
possibly use this issue to gain access to sensitive information.
This update may require configuration changes to be completely effective,
please see the upstream advisory for more information:
https://security.openstack.org/ossa/OSSA-2023-003.html
CVEs:
- https://ubuntu.com/security/CVE-2023-2088
Title: USN-6077-1: OpenJDK vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6077-1
Priorities: medium
Description:
Ben Smyth discovered that OpenJDK incorrectly handled half-duplex
connections during TLS handshake. A remote attacker could possibly use
this issue to insert, edit or obtain sensitive information.
(CVE-2023-21930)
It was discovered that OpenJDK incorrectly handled certain inputs. An
attacker could possibly use this issue to insert, edit or obtain sensitive
information. (CVE-2023-21937)
It was discovered that OpenJDK incorrectly handled command arguments. An
attacker could possibly use this issue to insert, edit or obtain sensitive
information. (CVE-2023-21938)
It was discovered that OpenJDK incorrectly validated HTML documents. An
attacker could possibly use this issue to insert, edit or obtain sensitive
information. (CVE-2023-21939)
Ramki Ramakrishna discovered that OpenJDK incorrectly handled garbage
collection. An attacker could possibly use this issue to bypass Java
sandbox restrictions. (CVE-2023-21954)
Jonathan Looney discovered that OpenJDK incorrectly handled certificate
chains during TLS session negotiation. A remote attacker could possibly
use this issue to cause a denial of service. (CVE-2023-21967)
Adam Reziouk discovered that OpenJDK incorrectly sanitized URIs. An
attacker could possibly use this issue to bypass Java sandbox
restrictions. (CVE-2023-21968)
CVEs:
- https://ubuntu.com/security/CVE-2023-21930
- https://ubuntu.com/security/CVE-2023-21937
- https://ubuntu.com/security/CVE-2023-21938
- https://ubuntu.com/security/CVE-2023-21939
- https://ubuntu.com/security/CVE-2023-21954
- https://ubuntu.com/security/CVE-2023-21967
- https://ubuntu.com/security/CVE-2023-21968
- https://ubuntu.com/security/CVE-2023-21937
- https://ubuntu.com/security/CVE-2023-21938
- https://ubuntu.com/security/CVE-2023-21968
- https://ubuntu.com/security/CVE-2023-21939
- https://ubuntu.com/security/CVE-2023-21930
- https://ubuntu.com/security/CVE-2023-21967
- https://ubuntu.com/security/CVE-2023-21954
Title: USN-6083-1: cups-filters vulnerability
URL: https://ubuntu.com/security/notices/USN-6083-1
Priorities: medium
Description:
It was discovered that cups-filters incorrectly handled the beh CUPS
backend. A remote attacker could possibly use this issue to cause the
backend to stop responding or to execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2023-24805
Title: USN-6050-1: Git vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6050-1
Priorities: medium
Description:
It was discovered that Git incorrectly handled certain commands.
An attacker could possibly use this issue to overwriting some paths.
(CVE-2023-25652)
Maxime Escourbiac and Yassine BENGANA discovered that Git incorrectly
handled some gettext machinery. An attacker could possibly use this issue
to allows the malicious placement of crafted messages. (CVE-2023-25815)
André Baptista and Vítor Pinho discovered that Git incorrectly handled
certain configurations. An attacker could possibly use this issue
to arbitrary configuration injection. (CVE-2023-29007)
CVEs:
- https://ubuntu.com/security/CVE-2023-25652
- https://ubuntu.com/security/CVE-2023-25815
- https://ubuntu.com/security/CVE-2023-29007
- https://ubuntu.com/security/CVE-2023-25815
- https://ubuntu.com/security/CVE-2023-29007
- https://ubuntu.com/security/CVE-2023-25652
Title: USN-6054-1: Django vulnerability
URL: https://ubuntu.com/security/notices/USN-6054-1
Priorities: low
Description:
Moataz Al-Sharida and nawaik discovered that Django incorrectly handled
uploading multiple files using one form field. A remote attacker could
possibly use this issue to bypass certain validations.
CVEs:
- https://ubuntu.com/security/CVE-2023-31047
Title: USN-6075-1: Thunderbird vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6075-1
Priorities: medium
Description:
Multiple security issues were discovered in Thunderbird. If a user were
tricked into opening a specially crafted website in a browsing context, an
attacker could potentially exploit these to cause a denial of service,
obtain sensitive information, bypass security restrictions, cross-site
tracing, or execute arbitrary code. (CVE-2023-32205, CVE-2023-32207,
CVE-2023-32211, CVE-2023-32212, CVE-2023-32213, CVE-2023-32215)
Irvan Kurniawan discovered that Thunderbird did not properly manage memory
when using RLBox Expat driver. An attacker could potentially exploits this
issue to cause a denial of service. (CVE-2023-32206)
CVEs:
- https://ubuntu.com/security/CVE-2023-32205
- https://ubuntu.com/security/CVE-2023-32207
- https://ubuntu.com/security/CVE-2023-32211
- https://ubuntu.com/security/CVE-2023-32212
- https://ubuntu.com/security/CVE-2023-32213
- https://ubuntu.com/security/CVE-2023-32215
- https://ubuntu.com/security/CVE-2023-32206
- https://ubuntu.com/security/CVE-2023-32206
- https://ubuntu.com/security/CVE-2023-32215
- https://ubuntu.com/security/CVE-2023-32211
- https://ubuntu.com/security/CVE-2023-32207
- https://ubuntu.com/security/CVE-2023-32213
- https://ubuntu.com/security/CVE-2023-32212
- https://ubuntu.com/security/CVE-2023-32205
Available in VMware Tanzu Network
Release Date: April 28, 2023
BOSH Agent Version: 2.528.0
Title: USN-6032-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6032-1
Priorities: medium,low,negligible
Description:
Ziming Zhang discovered that the VMware Virtual GPU DRM driver in the Linux
kernel contained an out-of-bounds write vulnerability. A local attacker
could use this to cause a denial of service (system crash).
(CVE-2022-36280)
Gerald Lee discovered that the USB Gadget file system implementation in the
Linux kernel contained a race condition, leading to a use-after-free
vulnerability in some situations. A local attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-4382)
It was discovered that a memory leak existed in the SCTP protocol
implementation in the Linux kernel. A local attacker could use this to
cause a denial of service (memory exhaustion). (CVE-2023-1074)
It was discovered that the RNDIS USB driver in the Linux kernel contained
an integer overflow vulnerability. A local attacker with physical access
could plug in a malicious USB device to cause a denial of service (system
crash) or possibly execute arbitrary code. (CVE-2023-23559)
It was discovered that the file system writeback functionality in the Linux
kernel contained a user-after-free vulnerability. A local attacker could
possibly use this to cause a denial of service (system crash) or execute
arbitrary code. (CVE-2023-26605)
It was discovered that the NTFS file system implementation in the Linux
kernel did not properly validate attributes in certain situations, leading
to an out-of-bounds read vulnerability. A local attacker could possibly use
this to expose sensitive information (kernel memory). (CVE-2023-26607)
Duoming Zhou discovered that a race condition existed in the infrared
receiver/transceiver driver in the Linux kernel, leading to a use-after-
free vulnerability. A privileged attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2023-1118)
CVEs:
- https://ubuntu.com/security/CVE-2022-36280
- https://ubuntu.com/security/CVE-2022-4382
- https://ubuntu.com/security/CVE-2023-1074
- https://ubuntu.com/security/CVE-2023-23559
- https://ubuntu.com/security/CVE-2023-26605
- https://ubuntu.com/security/CVE-2023-26607
- https://ubuntu.com/security/CVE-2023-1118
- https://ubuntu.com/security/CVE-2022-4382
- https://ubuntu.com/security/CVE-2023-26605
- https://ubuntu.com/security/CVE-2023-1118
- https://ubuntu.com/security/CVE-2022-36280
- https://ubuntu.com/security/CVE-2023-23559
- https://ubuntu.com/security/CVE-2023-1074
- https://ubuntu.com/security/CVE-2023-26607
Title: USN-6036-1: PatchELF vulnerability
URL: https://ubuntu.com/security/notices/USN-6036-1
Priorities: medium
Description:
It was discovered that PatchELF was not properly performing bounds
checks, which could lead to an out-of-bounds read via a specially
crafted file. An attacker could possibly use this issue to cause a
denial of service or to expose sensitive information. (CVE-2022-44940)
CVEs:
- https://ubuntu.com/security/CVE-2022-44940
- https://ubuntu.com/security/CVE-2022-44940
Title: USN-6033-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6033-1
Priorities: high,medium,low,negligible
Description:
It was discovered that the Traffic-Control Index (TCINDEX) implementation
in the Linux kernel did not properly perform filter deactivation in some
situations. A local attacker could possibly use this to gain elevated
privileges. Please note that with the fix for this CVE, kernel support for
the TCINDEX classifier has been removed. (CVE-2023-1829)
William Zhao discovered that the Traffic Control (TC) subsystem in the
Linux kernel did not properly handle network packet retransmission in
certain situations. A local attacker could use this to cause a denial of
service (kernel deadlock). (CVE-2022-4269)
Thadeu Cascardo discovered that the io_uring subsystem contained a double-
free vulnerability in certain memory allocation error conditions. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2023-1032)
It was discovered that the TUN/TAP driver in the Linux kernel did not
properly initialize socket data. A local attacker could use this to cause a
denial of service (system crash). (CVE-2023-1076)
It was discovered that the Real-Time Scheduling Class implementation in the
Linux kernel contained a type confusion vulnerability in some situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2023-1077)
It was discovered that the ASUS HID driver in the Linux kernel did not
properly handle device removal, leading to a use-after-free vulnerability.
A local attacker with physical access could plug in a specially crafted USB
device to cause a denial of service (system crash). (CVE-2023-1079)
It was discovered that the io_uring subsystem in the Linux kernel did not
properly perform file table updates in some situations, leading to a null
pointer dereference vulnerability. A local attacker could use this to cause
a denial of service (system crash). (CVE-2023-1583)
It was discovered that the Xircom PCMCIA network device driver in the Linux
kernel did not properly handle device removal events. A physically
proximate attacker could use this to cause a denial of service (system
crash). (CVE-2023-1670)
It was discovered that the APM X-Gene SoC hardware monitoring driver in the
Linux kernel contained a race condition, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or expose sensitive information (kernel memory).
(CVE-2023-1855)
It was discovered that a race condition existed in the Bluetooth HCI SDIO
driver, leading to a use-after-free vulnerability. A local attacker could
use this to cause a denial of service (system crash). (CVE-2023-1989)
It was discovered that the ST NCI NFC driver did not properly handle device
removal events. A physically proximate attacker could use this to cause a
denial of service (system crash). (CVE-2023-1990)
José Oliveira and Rodrigo Branco discovered that the Spectre Variant 2
mitigations with prctl syscall were insufficient in some situations. A
local attacker could possibly use this to expose sensitive information.
(CVE-2023-1998)
It was discovered that the BigBen Interactive Kids’ gamepad driver in the
Linux kernel did not properly handle device removal, leading to a use-
after-free vulnerability. A local attacker with physical access could plug
in a specially crafted USB device to cause a denial of service (system
crash). (CVE-2023-25012)
It was discovered that a race condition existed in the TLS subsystem in the
Linux kernel, leading to a use-after-free or a null pointer dereference
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-28466)
It was discovered that the Bluetooth subsystem in the Linux kernel did not
properly initialize some data structures, leading to an out-of-bounds
access vulnerability in certain situations. An attacker could use this to
expose sensitive information (kernel memory). (CVE-2023-28866)
Reima Ishii discovered that the nested KVM implementation for Intel x86
processors in the Linux kernel did not properly validate control registers
in certain situations. An attacker in a guest VM could use this to cause a
denial of service (guest crash). (CVE-2023-30456)
Duoming Zhou discovered that a race condition existed in the infrared
receiver/transceiver driver in the Linux kernel, leading to a use-after-
free vulnerability. A privileged attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2023-1118)
CVEs:
- https://ubuntu.com/security/CVE-2023-1829
- https://ubuntu.com/security/CVE-2022-4269
- https://ubuntu.com/security/CVE-2023-1032
- https://ubuntu.com/security/CVE-2023-1076
- https://ubuntu.com/security/CVE-2023-1077
- https://ubuntu.com/security/CVE-2023-1079
- https://ubuntu.com/security/CVE-2023-1583
- https://ubuntu.com/security/CVE-2023-1670
- https://ubuntu.com/security/CVE-2023-1855
- https://ubuntu.com/security/CVE-2023-1989
- https://ubuntu.com/security/CVE-2023-1990
- https://ubuntu.com/security/CVE-2023-1998
- https://ubuntu.com/security/CVE-2023-25012
- https://ubuntu.com/security/CVE-2023-28466
- https://ubuntu.com/security/CVE-2023-28866
- https://ubuntu.com/security/CVE-2023-30456
- https://ubuntu.com/security/CVE-2023-1118
- https://ubuntu.com/security/CVE-2023-1076
- https://ubuntu.com/security/CVE-2023-1118
- https://ubuntu.com/security/CVE-2023-25012
- https://ubuntu.com/security/CVE-2023-1855
- https://ubuntu.com/security/CVE-2023-1990
- https://ubuntu.com/security/CVE-2023-28866
- https://ubuntu.com/security/CVE-2023-1998
- https://ubuntu.com/security/CVE-2023-1077
- https://ubuntu.com/security/CVE-2023-1583
- https://ubuntu.com/security/CVE-2023-1670
- https://ubuntu.com/security/CVE-2023-1032
- https://ubuntu.com/security/CVE-2023-1079
- https://ubuntu.com/security/CVE-2023-30456
- https://ubuntu.com/security/CVE-2023-28466
- https://ubuntu.com/security/CVE-2023-1989
- https://ubuntu.com/security/CVE-2023-1829
- https://ubuntu.com/security/CVE-2022-4269
Title: USN-6043-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6043-1
Priorities: high
Description:
It was discovered that the Traffic-Control Index (TCINDEX) implementation
in the Linux kernel did not properly perform filter deactivation in some
situations. A local attacker could possibly use this to gain elevated
privileges. Please note that with the fix for this CVE, kernel support for
the TCINDEX classifier has been removed. (CVE-2023-1829)
It was discovered that the OverlayFS implementation in the Linux kernel did
not properly handle copy up operation in some conditions. A local attacker
could possibly use this to gain elevated privileges. (CVE-2023-0386)
CVEs:
- https://ubuntu.com/security/CVE-2023-1829
- https://ubuntu.com/security/CVE-2023-0386
- https://ubuntu.com/security/CVE-2023-0386
- https://ubuntu.com/security/CVE-2023-1829
Title: USN-6034-1: Dnsmasq vulnerability
URL: https://ubuntu.com/security/notices/USN-6034-1
Priorities: low
Description:
It was discovered that Dnsmasq was sending large DNS messages
over UDP, possibly causing transmission failures due to IP
fragmentation. This update lowers the default maximum size of
DNS messages to improve transmission reliability over UDP.
CVEs:
- https://ubuntu.com/security/CVE-2023-28450
Available in VMware Tanzu Network
Release Date: April 21, 2023
BOSH Agent Version: 2.525.0
Title: USN-6011-1: Json-smart vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6011-1
Priorities: medium
Description:
It was discovered that Json-smart incorrectly handled memory
when processing input containing unclosed quotes.
A remote attacker could possibly use this issue to cause
applications using Json-smart to crash, leading to a
denial of service. (CVE-2021-31684)
It was discovered that Json-smart incorrectly handled memory
when processing input containing unclosed brackets.
A remote attacker could possibly use this issue to cause
applications using Json-smart to crash, leading to a
denial of service. (CVE-2023-1370)
CVEs:
- https://ubuntu.com/security/CVE-2021-31684
- https://ubuntu.com/security/CVE-2023-1370
- https://ubuntu.com/security/CVE-2021-31684
- https://ubuntu.com/security/CVE-2023-1370
Title: USN-6026-1: Vim vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6026-1
Priorities: medium,low
Description:
It was discovered that Vim was incorrectly processing Vim buffers. An
attacker could possibly use this issue to perform illegal memory access and
expose sensitive information. This issue only affected Ubuntu 20.04 LTS.
(CVE-2021-4166)
It was discovered that Vim was using freed memory when dealing with regular
expressions inside a visual selection. If a user were tricked into opening a
specially crafted file, an attacker could crash the application, leading to a
denial of service, or possibly achieve code execution with user privileges.
This issue only affected Ubuntu 14.04 ESM, Ubuntu 18.04 LTS and Ubuntu
20.04 LTS. (CVE-2021-4192)
It was discovered that Vim was incorrectly handling virtual column position
operations, which could result in an out-of-bounds read. An attacker could
possibly use this issue to expose sensitive information. This issue only
affected Ubuntu 14.04 ESM, Ubuntu 18.04 LTS and Ubuntu 20.04 LTS.
(CVE-2021-4193)
It was discovered that Vim was not properly performing bounds checks when
updating windows present on a screen, which could result in a heap buffer
overflow. An attacker could possibly use this issue to cause a denial of
service or execute arbitrary code. (CVE-2022-0213)
It was discovered that Vim was incorrectly performing read and write
operations when in visual block mode, going beyond the end of a line and
causing a heap buffer overflow. If a user were tricked into opening a
specially crafted file, an attacker could crash the application, leading to a
denial of service, or possibly achieve code execution with user privileges.
This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu
22.04 LTS. (CVE-2022-0261, CVE-2022-0318)
It was discovered that Vim was incorrectly handling window exchanging
operations when in Visual mode, which could result in an out-of-bounds read.
An attacker could possibly use this issue to expose sensitive information.
(CVE-2022-0319)
It was discovered that Vim was incorrectly handling recursion when parsing
conditional expressions. An attacker could possibly use this issue to cause
a denial of service or execute arbitrary code. (CVE-2022-0351)
It was discovered that Vim was not properly handling memory allocation when
processing data in Ex mode, which could result in a heap buffer overflow.
An attacker could possibly use this issue to cause a denial of service or
execute arbitrary code. (CVE-2022-0359)
It was discovered that Vim was not properly performing bounds checks when
executing line operations in Visual mode, which could result in a heap
buffer overflow. An attacker could possibly use this issue to cause a
denial of service or execute arbitrary code. This issue only affected
Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-0361,
CVE-2022-0368)
It was discovered that Vim was not properly handling loop conditions when
looking for spell suggestions, which could result in a stack buffer
overflow. An attacker could possibly use this issue to cause a denial of
service or execute arbitrary code. (CVE-2022-0408)
It was discovered that Vim was incorrectly handling memory access when
executing buffer operations, which could result in the usage of freed
memory. An attacker could possibly use this issue to execute arbitrary
code. (CVE-2022-0443)
It was discovered that Vim was incorrectly processing Vim buffers. An
attacker could possibly use this issue to perform illegal memory access and
expose sensitive information. (CVE-2022-0554)
It was discovered that Vim was not properly performing bounds checks for
column numbers when replacing tabs with spaces or spaces with tabs, which
could cause a heap buffer overflow. An attacker could possibly use this
issue to cause a denial of service or execute arbitrary code.
(CVE-2022-0572)
It was discovered that Vim was incorrectly processing Vim buffers. An
attacker could possibly use this issue to perform illegal memory access and
expose sensitive information. This issue only affected Ubuntu 20.04 LTS and
Ubuntu 22.04 LTS. (CVE-2022-0629)
It was discovered that Vim was not properly performing validation of data
that contained special multi-byte characters, which could cause an
out-of-bounds read. An attacker could possibly use this issue to cause a
denial of service. (CVE-2022-0685)
It was discovered that Vim was incorrectly processing data used to define
indentation in a file, which could cause a heap buffer overflow. An
attacker could possibly use this issue to cause a denial of service.
(CVE-2022-0714)
It was discovered that Vim was incorrectly processing certain regular
expression patterns and strings, which could cause an out-of-bounds read.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2022-0729)
It was discovered that Vim incorrectly handled memory access. An attacker
could potentially use this issue to cause the corruption of sensitive
information, a crash, or arbitrary code execution. (CVE-2022-2207)
CVEs:
- https://ubuntu.com/security/CVE-2021-4166
- https://ubuntu.com/security/CVE-2021-4192
- https://ubuntu.com/security/CVE-2021-4193
- https://ubuntu.com/security/CVE-2022-0213
- https://ubuntu.com/security/CVE-2022-0261
- https://ubuntu.com/security/CVE-2022-0318
- https://ubuntu.com/security/CVE-2022-0319
- https://ubuntu.com/security/CVE-2022-0351
- https://ubuntu.com/security/CVE-2022-0359
- https://ubuntu.com/security/CVE-2022-0361
- https://ubuntu.com/security/CVE-2022-0368
- https://ubuntu.com/security/CVE-2022-0408
- https://ubuntu.com/security/CVE-2022-0443
- https://ubuntu.com/security/CVE-2022-0554
- https://ubuntu.com/security/CVE-2022-0572
- https://ubuntu.com/security/CVE-2022-0629
- https://ubuntu.com/security/CVE-2022-0685
- https://ubuntu.com/security/CVE-2022-0714
- https://ubuntu.com/security/CVE-2022-0729
- https://ubuntu.com/security/CVE-2022-2207
- https://ubuntu.com/security/CVE-2022-0729
- https://ubuntu.com/security/CVE-2022-2207
- https://ubuntu.com/security/CVE-2022-0714
- https://ubuntu.com/security/CVE-2022-0408
- https://ubuntu.com/security/CVE-2022-0572
- https://ubuntu.com/security/CVE-2022-0685
- https://ubuntu.com/security/CVE-2022-0261
- https://ubuntu.com/security/CVE-2022-0351
- https://ubuntu.com/security/CVE-2022-0359
- https://ubuntu.com/security/CVE-2021-4166
- https://ubuntu.com/security/CVE-2022-0319
- https://ubuntu.com/security/CVE-2022-0213
- https://ubuntu.com/security/CVE-2022-0443
- https://ubuntu.com/security/CVE-2021-4193
- https://ubuntu.com/security/CVE-2022-0368
- https://ubuntu.com/security/CVE-2022-0554
- https://ubuntu.com/security/CVE-2022-0361
- https://ubuntu.com/security/CVE-2022-0318
- https://ubuntu.com/security/CVE-2021-4192
- https://ubuntu.com/security/CVE-2022-0629
Title: USN-6012-1: Smarty vulnerability
URL: https://ubuntu.com/security/notices/USN-6012-1
Priorities: medium
Description:
It was discovered that Smarty incorrectly parsed blocks’ names and
included files’ names. A remote attacker with template writing permissions
could use this issue to execute arbitrary PHP code. (CVE-2022-29221)
CVEs:
- https://ubuntu.com/security/CVE-2022-29221
- https://ubuntu.com/security/CVE-2022-29221
Title: USN-6008-1: Exo vulnerability
URL: https://ubuntu.com/security/notices/USN-6008-1
Priorities: medium
Description:
It was discovered that Exo did not properly sanitized desktop files.
A remote attacker could possibly use this issue to to cause a crash or
arbitrary code execution.
CVEs:
- https://ubuntu.com/security/CVE-2022-32278
Title: USN-6025-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6025-1
Priorities: high,medium
Description:
It was discovered that the Traffic-Control Index (TCINDEX) implementation
in the Linux kernel contained a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-1281)
It was discovered that the OverlayFS implementation in the Linux kernel did
not properly handle copy up operation in some conditions. A local attacker
could possibly use this to gain elevated privileges. (CVE-2023-0386)
Haowei Yan discovered that a race condition existed in the Layer 2
Tunneling Protocol (L2TP) implementation in the Linux kernel. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2022-4129)
It was discovered that the network queuing discipline implementation in the
Linux kernel contained a null pointer dereference in some situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2022-47929)
It was discovered that the NTFS file system implementation in the Linux
kernel contained a null pointer dereference in some situations. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2022-4842)
Kyle Zeng discovered that the IPv6 implementation in the Linux kernel
contained a NULL pointer dereference vulnerability in certain situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2023-0394)
It was discovered that the Human Interface Device (HID) support driver in
the Linux kernel contained a type confusion vulnerability in some
situations. A local attacker could use this to cause a denial of service
(system crash). (CVE-2023-1073)
It was discovered that a memory leak existed in the SCTP protocol
implementation in the Linux kernel. A local attacker could use this to
cause a denial of service (memory exhaustion). (CVE-2023-1074)
It was discovered that the NFS implementation in the Linux kernel did not
properly handle pending tasks in some situations. A local attacker could
use this to cause a denial of service (system crash) or expose sensitive
information (kernel memory). (CVE-2023-1652)
Lianhui Tang discovered that the MPLS implementation in the Linux kernel
did not properly handle certain sysctl allocation failure conditions,
leading to a double-free vulnerability. An attacker could use this to cause
a denial of service or possibly execute arbitrary code. (CVE-2023-26545)
CVEs:
- https://ubuntu.com/security/CVE-2023-1281
- https://ubuntu.com/security/CVE-2023-0386
- https://ubuntu.com/security/CVE-2022-4129
- https://ubuntu.com/security/CVE-2022-47929
- https://ubuntu.com/security/CVE-2022-4842
- https://ubuntu.com/security/CVE-2023-0394
- https://ubuntu.com/security/CVE-2023-1073
- https://ubuntu.com/security/CVE-2023-1074
- https://ubuntu.com/security/CVE-2023-1652
- https://ubuntu.com/security/CVE-2023-26545
- https://ubuntu.com/security/CVE-2022-4842
- https://ubuntu.com/security/CVE-2023-26545
- https://ubuntu.com/security/CVE-2023-1074
- https://ubuntu.com/security/CVE-2023-1652
- https://ubuntu.com/security/CVE-2023-1073
- https://ubuntu.com/security/CVE-2023-1281
- https://ubuntu.com/security/CVE-2023-0386
- https://ubuntu.com/security/CVE-2022-47929
- https://ubuntu.com/security/CVE-2022-4129
- https://ubuntu.com/security/CVE-2023-0394
Title: USN-6024-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6024-1
Priorities: high,medium,low
Description:
It was discovered that the Traffic-Control Index (TCINDEX) implementation
in the Linux kernel contained a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-1281)
Lin Ma discovered a race condition in the io_uring subsystem in the Linux
kernel, leading to a null pointer dereference vulnerability. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2023-0468)
It was discovered that a use-after-free vulnerability existed in the SGI
GRU driver in the Linux kernel. A local attacker could possibly use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3424)
Hyunwoo Kim discovered that the DVB Core driver in the Linux kernel did not
properly perform reference counting in some situations, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2022-41218)
It was discovered that the network queuing discipline implementation in the
Linux kernel contained a null pointer dereference in some situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2022-47929)
Thadeu Cascardo discovered that the io_uring subsystem contained a double-
free vulnerability in certain memory allocation error conditions. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2023-1032)
It was discovered that the module decompression implementation in the Linux
kernel did not properly handle return values in certain error conditions. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2023-22997)
Lianhui Tang discovered that the MPLS implementation in the Linux kernel
did not properly handle certain sysctl allocation failure conditions,
leading to a double-free vulnerability. An attacker could use this to cause
a denial of service or possibly execute arbitrary code. (CVE-2023-26545)
It was discovered that the NTFS file system implementation in the Linux
kernel did not properly handle a loop termination condition, leading to an
out-of-bounds read vulnerability. A local attacker could use this to cause
a denial of service (system crash) or possibly expose sensitive
information. (CVE-2023-26606)
Wei Chen discovered that the DVB USB AZ6027 driver in the Linux kernel
contained a null pointer dereference when handling certain messages from
user space. A local attacker could use this to cause a denial of service
(system crash). (CVE-2023-28328)
CVEs:
- https://ubuntu.com/security/CVE-2023-1281
- https://ubuntu.com/security/CVE-2023-0468
- https://ubuntu.com/security/CVE-2022-3424
- https://ubuntu.com/security/CVE-2022-41218
- https://ubuntu.com/security/CVE-2022-47929
- https://ubuntu.com/security/CVE-2023-1032
- https://ubuntu.com/security/CVE-2023-22997
- https://ubuntu.com/security/CVE-2023-26545
- https://ubuntu.com/security/CVE-2023-26606
- https://ubuntu.com/security/CVE-2023-28328
- https://ubuntu.com/security/CVE-2023-0468
- https://ubuntu.com/security/CVE-2022-3424
- https://ubuntu.com/security/CVE-2022-47929
- https://ubuntu.com/security/CVE-2022-41218
- https://ubuntu.com/security/CVE-2023-22997
- https://ubuntu.com/security/CVE-2023-1032
- https://ubuntu.com/security/CVE-2023-26545
- https://ubuntu.com/security/CVE-2023-1281
- https://ubuntu.com/security/CVE-2023-26606
- https://ubuntu.com/security/CVE-2023-28328
Title: USN-6018-1: Apport vulnerability
URL: https://ubuntu.com/security/notices/USN-6018-1
Priorities: medium
Description:
Chen Lu, Lei Wang, and YiQi Sun discovered a privilege escalation
vulnerability in apport-cli when viewing crash reports and unprivileged
users are allowed to run sudo less. A local attacker on a specially
configured system could use this to escalate their privilege.
CVEs:
- https://ubuntu.com/security/CVE-2023-1326
Title: USN-6015-1: Thunderbird vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6015-1
Priorities: medium
Description:
Multiple security issues were discovered in Thunderbird. If a user were
tricked into opening a specially crafted website in a browsing context, an
attacker could potentially exploit these to cause a denial of service,
obtain sensitive information, bypass security restrictions, cross-site
tracing, or execute arbitrary code. (CVE-2023-1945, CVE-2023-29548,
CVE-2023-29550)
Paul Menzel discovered that Thunderbird did not properly validate OCSP
revocation status of recipient certificates when sending S/Mime encrypted
email. An attacker could potentially exploits this issue to perform
spoofing attack. (CVE-2023-0547)
Ribose RNP Team discovered that Thunderbird did not properly manage memory
when parsing certain OpenPGP messages. An attacker could potentially
exploits this issue to cause a denial of service. (CVE-2023-29479)
Irvan Kurniawan discovered that Thunderbird did not properly manage
fullscreen notifications using a combination of window.open, fullscreen
requests, window.name assignments, and setInterval calls. An attacker could
potentially exploit this issue to perform spoofing attacks.
(CVE-2023-29533)
Lukas Bernhard discovered that Thunderbird did not properly manage memory
when doing Garbage Collector compaction. An attacker could potentially
exploits this issue to cause a denial of service. (CVE-2023-29535)
Zx from qriousec discovered that Thunderbird did not properly validate the
address to free a pointer provided to the memory manager. An attacker could
potentially exploits this issue to cause a denial of service.
(CVE-2023-29536)
Trung Pham discovered that Thunderbird did not properly validate the
filename directive in the Content-Disposition header. An attacker could
possibly exploit this to perform reflected file download attacks
potentially tricking users to install malware. (CVE-2023-29539)
Ameen Basha M K discovered that Thunderbird did not properly validate
downloads of files ending in .desktop. An attacker could potentially
exploits this issue to execute arbitrary code. (CVE-2023-29541)
CVEs:
- https://ubuntu.com/security/CVE-2023-1945
- https://ubuntu.com/security/CVE-2023-29548
- https://ubuntu.com/security/CVE-2023-29550
- https://ubuntu.com/security/CVE-2023-0547
- https://ubuntu.com/security/CVE-2023-29479
- https://ubuntu.com/security/CVE-2023-29533
- https://ubuntu.com/security/CVE-2023-29535
- https://ubuntu.com/security/CVE-2023-29536
- https://ubuntu.com/security/CVE-2023-29539
- https://ubuntu.com/security/CVE-2023-29541
- https://ubuntu.com/security/CVE-2023-29535
- https://ubuntu.com/security/CVE-2023-29479
- https://ubuntu.com/security/CVE-2023-29548
- https://ubuntu.com/security/CVE-2023-29536
- https://ubuntu.com/security/CVE-2023-1945
- https://ubuntu.com/security/CVE-2023-29533
- https://ubuntu.com/security/CVE-2023-29550
- https://ubuntu.com/security/CVE-2023-29541
- https://ubuntu.com/security/CVE-2023-0547
- https://ubuntu.com/security/CVE-2023-29539
Title: USN-6006-1: .NET vulnerability
URL: https://ubuntu.com/security/notices/USN-6006-1
Priorities: medium
Description:
It was discovered that .NET did not properly manage dll files. An
attacker could potentially use this issue to execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2023-28260
Available in VMware Tanzu Network
Release Date: April 12, 2023
BOSH Agent Version: 2.523.0
Title: USN-5995-1: Vim vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5995-1
Priorities: medium,low
Description:
It was discovered that Vim incorrectly handled memory when opening certain
files. If an attacker could trick a user into opening a specially crafted
file, it could cause Vim to crash, or possible execute arbitrary code. This
issue only affected Ubuntu 14.04 ESM, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS,
and Ubuntu 22.04 LTS. (CVE-2022-0413, CVE-2022-1629, CVE-2022-1674,
CVE-2022-1733, CVE-2022-1735, CVE-2022-1785, CVE-2022-1796, CVE-2022-1851,
CVE-2022-1898, CVE-2022-1942, CVE-2022-1968, CVE-2022-2124, CVE-2022-2125,
CVE-2022-2126, CVE-2022-2129, CVE-2022-2175, CVE-2022-2183, CVE-2022-2206,
CVE-2022-2304, CVE-2022-2345, CVE-2022-2581)
It was discovered that Vim incorrectly handled memory when opening certain
files. If an attacker could trick a user into opening a specially crafted
file, it could cause Vim to crash, or possible execute arbitrary code. This
issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04
LTS. (CVE-2022-1720, CVE-2022-2571, CVE-2022-2845, CVE-2022-2849,
CVE-2022-2923)
It was discovered that Vim incorrectly handled memory when opening certain
files. If an attacker could trick a user into opening a specially crafted
file, it could cause Vim to crash, or possible execute arbitrary code. This
issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-1927,
CVE-2022-2344)
It was discovered that Vim incorrectly handled memory when opening certain
files. If an attacker could trick a user into opening a specially crafted
file, it could cause Vim to crash, or possible execute arbitrary code. This
issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS,
and Ubuntu 22.10. (CVE-2022-2946)
It was discovered that Vim incorrectly handled memory when opening certain
files. If an attacker could trick a user into opening a specially crafted
file, it could cause Vim to crash, or possible execute arbitrary code. This
issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 22.10.
(CVE-2022-2980)
CVEs:
- https://ubuntu.com/security/CVE-2022-0413
- https://ubuntu.com/security/CVE-2022-1629
- https://ubuntu.com/security/CVE-2022-1674
- https://ubuntu.com/security/CVE-2022-1733
- https://ubuntu.com/security/CVE-2022-1735
- https://ubuntu.com/security/CVE-2022-1785
- https://ubuntu.com/security/CVE-2022-1796
- https://ubuntu.com/security/CVE-2022-1851
- https://ubuntu.com/security/CVE-2022-1898
- https://ubuntu.com/security/CVE-2022-1942
- https://ubuntu.com/security/CVE-2022-1968
- https://ubuntu.com/security/CVE-2022-2124
- https://ubuntu.com/security/CVE-2022-2125
- https://ubuntu.com/security/CVE-2022-2126
- https://ubuntu.com/security/CVE-2022-2129
- https://ubuntu.com/security/CVE-2022-2175
- https://ubuntu.com/security/CVE-2022-2183
- https://ubuntu.com/security/CVE-2022-2206
- https://ubuntu.com/security/CVE-2022-2304
- https://ubuntu.com/security/CVE-2022-2345
- https://ubuntu.com/security/CVE-2022-2581
- https://ubuntu.com/security/CVE-2022-1720
- https://ubuntu.com/security/CVE-2022-2571
- https://ubuntu.com/security/CVE-2022-2845
- https://ubuntu.com/security/CVE-2022-2849
- https://ubuntu.com/security/CVE-2022-2923
- https://ubuntu.com/security/CVE-2022-1927
- https://ubuntu.com/security/CVE-2022-2344
- https://ubuntu.com/security/CVE-2022-2946
- https://ubuntu.com/security/CVE-2022-2980
- https://ubuntu.com/security/CVE-2022-1968
- https://ubuntu.com/security/CVE-2022-2125
- https://ubuntu.com/security/CVE-2022-2304
- https://ubuntu.com/security/CVE-2022-2946
- https://ubuntu.com/security/CVE-2022-1629
- https://ubuntu.com/security/CVE-2022-0413
- https://ubuntu.com/security/CVE-2022-1785
- https://ubuntu.com/security/CVE-2022-2845
- https://ubuntu.com/security/CVE-2022-1927
- https://ubuntu.com/security/CVE-2022-2345
- https://ubuntu.com/security/CVE-2022-2581
- https://ubuntu.com/security/CVE-2022-2126
- https://ubuntu.com/security/CVE-2022-1898
- https://ubuntu.com/security/CVE-2022-1720
- https://ubuntu.com/security/CVE-2022-1674
- https://ubuntu.com/security/CVE-2022-2183
- https://ubuntu.com/security/CVE-2022-2124
- https://ubuntu.com/security/CVE-2022-2344
- https://ubuntu.com/security/CVE-2022-1735
- https://ubuntu.com/security/CVE-2022-1733
- https://ubuntu.com/security/CVE-2022-2206
- https://ubuntu.com/security/CVE-2022-2849
- https://ubuntu.com/security/CVE-2022-2129
- https://ubuntu.com/security/CVE-2022-2923
- https://ubuntu.com/security/CVE-2022-1796
- https://ubuntu.com/security/CVE-2022-2980
- https://ubuntu.com/security/CVE-2022-1851
- https://ubuntu.com/security/CVE-2022-2175
- https://ubuntu.com/security/CVE-2022-1942
- https://ubuntu.com/security/CVE-2022-2571
Title: USN-5987-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5987-1
Priorities: medium,low
Description:
It was discovered that the KVM VMX implementation in the Linux kernel did
not properly handle indirect branch prediction isolation between L1 and L2
VMs. An attacker in a guest VM could use this to expose sensitive
information from the host OS or other guest VMs. (CVE-2022-2196)
It was discovered that a use-after-free vulnerability existed in the SGI
GRU driver in the Linux kernel. A local attacker could possibly use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3424)
Ziming Zhang discovered that the VMware Virtual GPU DRM driver in the Linux
kernel contained an out-of-bounds write vulnerability. A local attacker
could use this to cause a denial of service (system crash).
(CVE-2022-36280)
Hyunwoo Kim discovered that the DVB Core driver in the Linux kernel did not
properly perform reference counting in some situations, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2022-41218)
Gerald Lee discovered that the USB Gadget file system implementation in the
Linux kernel contained a race condition, leading to a use-after-free
vulnerability in some situations. A local attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-4382)
It was discovered that the NTFS file system implementation in the Linux
kernel did not properly validate attributes in certain situations, leading
to an out-of-bounds write vulnerability. A local attacker could use this to
cause a denial of service (system crash). (CVE-2022-48423)
It was discovered that the NTFS file system implementation in the Linux
kernel did not properly validate attributes in certain situations, leading
to an out-of-bounds read vulnerability. A local attacker could possibly use
this to expose sensitive information (kernel memory). (CVE-2022-48424)
José Oliveira and Rodrigo Branco discovered that the prctl syscall
implementation in the Linux kernel did not properly protect against
indirect branch prediction attacks in some situations. A local attacker
could possibly use this to expose sensitive information. (CVE-2023-0045)
It was discovered that the KSMBD implementation in the Linux kernel did not
properly validate buffer lengths, leading to a heap-based buffer overflow.
A remote attacker could possibly use this to cause a denial of service
(system crash). (CVE-2023-0210)
It was discovered that a use-after-free vulnerability existed in the
Advanced Linux Sound Architecture (ALSA) subsystem. A local attacker could
use this to cause a denial of service (system crash). (CVE-2023-0266)
Kyle Zeng discovered that the class-based queuing discipline implementation
in the Linux kernel contained a type confusion vulnerability in some
situations. An attacker could use this to cause a denial of service (system
crash). (CVE-2023-23454)
Kyle Zeng discovered that the ATM VC queuing discipline implementation in
the Linux kernel contained a type confusion vulnerability in some
situations. An attacker could use this to cause a denial of service (system
crash). (CVE-2023-23455)
It was discovered that the RNDIS USB driver in the Linux kernel contained
an integer overflow vulnerability. A local attacker with physical access
could plug in a malicious USB device to cause a denial of service (system
crash) or possibly execute arbitrary code. (CVE-2023-23559)
It was discovered that the NTFS file system implementation in the Linux
kernel did not properly handle a loop termination condition, leading to an
out-of-bounds read vulnerability. A local attacker could use this to cause
a denial of service (system crash) or possibly expose sensitive
information. (CVE-2023-26606)
Wei Chen discovered that the DVB USB AZ6027 driver in the Linux kernel
contained a null pointer dereference when handling certain messages from
user space. A local attacker could use this to cause a denial of service
(system crash). (CVE-2023-28328)
CVEs:
- https://ubuntu.com/security/CVE-2022-2196
- https://ubuntu.com/security/CVE-2022-3424
- https://ubuntu.com/security/CVE-2022-36280
- https://ubuntu.com/security/CVE-2022-41218
- https://ubuntu.com/security/CVE-2022-4382
- https://ubuntu.com/security/CVE-2022-48423
- https://ubuntu.com/security/CVE-2022-48424
- https://ubuntu.com/security/CVE-2023-0045
- https://ubuntu.com/security/CVE-2023-0210
- https://ubuntu.com/security/CVE-2023-0266
- https://ubuntu.com/security/CVE-2023-23454
- https://ubuntu.com/security/CVE-2023-23455
- https://ubuntu.com/security/CVE-2023-23559
- https://ubuntu.com/security/CVE-2023-26606
- https://ubuntu.com/security/CVE-2023-28328
- https://ubuntu.com/security/CVE-2023-0210
- https://ubuntu.com/security/CVE-2023-23454
- https://ubuntu.com/security/CVE-2023-0266
- https://ubuntu.com/security/CVE-2022-36280
- https://ubuntu.com/security/CVE-2023-23559
- https://ubuntu.com/security/CVE-2023-28328
- https://ubuntu.com/security/CVE-2022-3424
- https://ubuntu.com/security/CVE-2023-0045
- https://ubuntu.com/security/CVE-2023-23455
- https://ubuntu.com/security/CVE-2022-41218
- https://ubuntu.com/security/CVE-2023-26606
- https://ubuntu.com/security/CVE-2022-4382
- https://ubuntu.com/security/CVE-2022-48423
- https://ubuntu.com/security/CVE-2022-48424
- https://ubuntu.com/security/CVE-2022-2196
Title: USN-5979-1: Linux kernel (HWE) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5979-1
Priorities: medium,low
Description:
It was discovered that the KVM VMX implementation in the Linux kernel did
not properly handle indirect branch prediction isolation between L1 and L2
VMs. An attacker in a guest VM could use this to expose sensitive
information from the host OS or other guest VMs. (CVE-2022-2196)
It was discovered that a race condition existed in the Xen network backend
driver in the Linux kernel when handling dropped packets in certain
circumstances. An attacker could use this to cause a denial of service
(kernel deadlock). (CVE-2022-42328, CVE-2022-42329)
Gerald Lee discovered that the USB Gadget file system implementation in the
Linux kernel contained a race condition, leading to a use-after-free
vulnerability in some situations. A local attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-4382)
José Oliveira and Rodrigo Branco discovered that the prctl syscall
implementation in the Linux kernel did not properly protect against
indirect branch prediction attacks in some situations. A local attacker
could possibly use this to expose sensitive information. (CVE-2023-0045)
It was discovered that a use-after-free vulnerability existed in the
Advanced Linux Sound Architecture (ALSA) subsystem. A local attacker could
use this to cause a denial of service (system crash). (CVE-2023-0266)
It was discovered that the io_uring subsystem in the Linux kernel contained
a use-after-free vulnerability. A local attacker could possibly use this to
cause a denial of service (system crash) or execute arbitrary code.
(CVE-2023-0469)
It was discovered that the CIFS network file system implementation in the
Linux kernel contained a user-after-free vulnerability. A local attacker
could possibly use this to cause a denial of service (system crash) or
execute arbitrary code. (CVE-2023-1195)
It was discovered that the RNDIS USB driver in the Linux kernel contained
an integer overflow vulnerability. A local attacker with physical access
could plug in a malicious USB device to cause a denial of service (system
crash) or possibly execute arbitrary code. (CVE-2023-23559)
CVEs:
- https://ubuntu.com/security/CVE-2022-2196
- https://ubuntu.com/security/CVE-2022-42328
- https://ubuntu.com/security/CVE-2022-42329
- https://ubuntu.com/security/CVE-2022-4382
- https://ubuntu.com/security/CVE-2023-0045
- https://ubuntu.com/security/CVE-2023-0266
- https://ubuntu.com/security/CVE-2023-0469
- https://ubuntu.com/security/CVE-2023-1195
- https://ubuntu.com/security/CVE-2023-23559
- https://ubuntu.com/security/CVE-2023-0469
- https://ubuntu.com/security/CVE-2023-0045
- https://ubuntu.com/security/CVE-2022-42328
- https://ubuntu.com/security/CVE-2023-0266
- https://ubuntu.com/security/CVE-2023-1195
- https://ubuntu.com/security/CVE-2022-2196
- https://ubuntu.com/security/CVE-2023-23559
- https://ubuntu.com/security/CVE-2022-42329
- https://ubuntu.com/security/CVE-2022-4382
Title: USN-5968-1: GitPython vulnerability
URL: https://ubuntu.com/security/notices/USN-5968-1
Priorities: medium
Description:
It was discovered that GitPython did not properly sanitize user inputs for
remote URLs in the clone command. By injecting a maliciously crafted
remote URL, an attacker could possibly use this issue to execute arbitrary
commands on the host.
CVEs:
- https://ubuntu.com/security/CVE-2022-24439
Title: USN-5966-2: amanda regression
URL: https://ubuntu.com/security/notices/USN-5966-2
Priorities: low,medium,high
Description:
USN-5966-1 fixed vulnerabilities in amanda. Unfortunately it introduced
a regression in GNUTAR-based backups. This update reverts all of the
changes in amanda until a better fix is provided.
We apologize for the inconvenience.
Original advisory details:
Maher Azzouzi discovered an information disclosure vulnerability in the
calcsize binary within amanda. calcsize is a suid binary owned by root that
could possibly be used by a malicious local attacker to expose sensitive
file system information. (CVE-2022-37703)
Maher Azzouzi discovered a privilege escalation vulnerability in the
rundump binary within amanda. rundump is a suid binary owned by root that
did not perform adequate sanitization of environment variables or
commandline options and could possibly be used by a malicious local
attacker to escalate privileges. (CVE-2022-37704)
Maher Azzouzi discovered a privilege escalation vulnerability in the runtar
binary within amanda. runtar is a suid binary owned by root that did not
perform adequate sanitization of commandline options and could possibly be
used by a malicious local attacker to escalate privileges. (CVE-2022-37705)
CVEs:
- https://ubuntu.com/security/CVE-2022-37703
- https://ubuntu.com/security/CVE-2022-37704
- https://ubuntu.com/security/CVE-2022-37705
Title: USN-5966-1: amanda vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5966-1
Priorities: low,medium,high
Description:
Maher Azzouzi discovered an information disclosure vulnerability in the
calcsize binary within amanda. calcsize is a suid binary owned by root that
could possibly be used by a malicious local attacker to expose sensitive
file system information. (CVE-2022-37703)
Maher Azzouzi discovered a privilege escalation vulnerability in the
rundump binary within amanda. rundump is a suid binary owned by root that
did not perform adequate sanitization of environment variables or
commandline options and could possibly be used by a malicious local
attacker to escalate privileges. (CVE-2022-37704)
Maher Azzouzi discovered a privilege escalation vulnerability in the runtar
binary within amanda. runtar is a suid binary owned by root that did not
perform adequate sanitization of commandline options and could possibly be
used by a malicious local attacker to escalate privileges. (CVE-2022-37705)
CVEs:
- https://ubuntu.com/security/CVE-2022-37703
- https://ubuntu.com/security/CVE-2022-37704
- https://ubuntu.com/security/CVE-2022-37705
- https://ubuntu.com/security/CVE-2022-37703
- https://ubuntu.com/security/CVE-2022-37704
- https://ubuntu.com/security/CVE-2022-37705
Title: USN-5966-3: amanda regression
URL: https://ubuntu.com/security/notices/USN-5966-3
Priorities: low,medium,high
Description:
USN-5966-1 fixed vulnerabilities in amanda. Unfortunately that update
caused a regression and was reverted in USN-5966-2. This update provides
security fixes for Ubuntu 22.10, Ubuntu 22.04 LTS, Ubuntu 20.04
LTS and Ubuntu 18.04 LTS.
We apologize for the inconvenience.
Original advisory details:
Maher Azzouzi discovered an information disclosure vulnerability in the
calcsize binary within amanda. calcsize is a suid binary owned by root that
could possibly be used by a malicious local attacker to expose sensitive
file system information. (CVE-2022-37703)
Maher Azzouzi discovered a privilege escalation vulnerability in the
rundump binary within amanda. rundump is a suid binary owned by root that
did not perform adequate sanitization of environment variables or
commandline options and could possibly be used by a malicious local
attacker to escalate privileges. (CVE-2022-37704)
Maher Azzouzi discovered a privilege escalation vulnerability in the runtar
binary within amanda. runtar is a suid binary owned by root that did not
perform adequate sanitization of commandline options and could possibly be
used by a malicious local attacker to escalate privileges. (CVE-2022-37705)
CVEs:
- https://ubuntu.com/security/CVE-2022-37703
- https://ubuntu.com/security/CVE-2022-37704
- https://ubuntu.com/security/CVE-2022-37705
- https://ubuntu.com/security/CVE-2022-37704
- https://ubuntu.com/security/CVE-2022-37703
- https://ubuntu.com/security/CVE-2022-37705
Title: LSN-0093-1: Kernel Live Patch Security Notice
URL: https://ubuntu.com/security/notices/LSN-0093-1
Priorities: high
Description:
Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel
did not properly handle VLAN headers in some situations. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code.(CVE-2023-0179)
It was discovered that the Upper Level Protocol (ULP) subsystem in the
Linux kernel did not properly handle sockets entering the LISTEN state in
certain protocols, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code.(CVE-2023-0461)
CVEs:
- https://ubuntu.com/security/CVE-2023-0179
- https://ubuntu.com/security/CVE-2023-0461
- https://ubuntu.com/security/CVE-2023-0461
- https://ubuntu.com/security/CVE-2023-0179
Title: USN-5976-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5976-1
Priorities: high,medium,low
Description:
It was discovered that the Upper Level Protocol (ULP) subsystem in the
Linux kernel did not properly handle sockets entering the LISTEN state in
certain protocols, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-0461)
It was discovered that the KVM VMX implementation in the Linux kernel did
not properly handle indirect branch prediction isolation between L1 and L2
VMs. An attacker in a guest VM could use this to expose sensitive
information from the host OS or other guest VMs. (CVE-2022-2196)
It was discovered that the Intel 740 frame buffer driver in the Linux
kernel contained a divide by zero vulnerability. A local attacker could use
this to cause a denial of service (system crash). (CVE-2022-3061)
It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux
kernel did not properly perform bounds checking in some situations. A
physically proximate attacker could use this to craft a malicious USB
device that when inserted, could cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2022-3628)
Ziming Zhang discovered that the VMware Virtual GPU DRM driver in the Linux
kernel contained an out-of-bounds write vulnerability. A local attacker
could use this to cause a denial of service (system crash).
(CVE-2022-36280)
It was discovered that the NILFS2 file system implementation in the Linux
kernel did not properly deallocate memory in certain error conditions. An
attacker could use this to cause a denial of service (memory exhaustion).
(CVE-2022-3646)
Khalid Masum discovered that the NILFS2 file system implementation in the
Linux kernel did not properly handle certain error conditions, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service or possibly execute arbitrary code. (CVE-2022-3649)
It was discovered that a race condition existed in the Roccat HID driver in
the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-41850)
Kyle Zeng discovered that the IPv6 implementation in the Linux kernel
contained a NULL pointer dereference vulnerability in certain situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2023-0394)
CVEs:
- https://ubuntu.com/security/CVE-2023-0461
- https://ubuntu.com/security/CVE-2022-2196
- https://ubuntu.com/security/CVE-2022-3061
- https://ubuntu.com/security/CVE-2022-3628
- https://ubuntu.com/security/CVE-2022-36280
- https://ubuntu.com/security/CVE-2022-3646
- https://ubuntu.com/security/CVE-2022-3649
- https://ubuntu.com/security/CVE-2022-41850
- https://ubuntu.com/security/CVE-2023-0394
- https://ubuntu.com/security/CVE-2022-3061
- https://ubuntu.com/security/CVE-2023-0394
- https://ubuntu.com/security/CVE-2022-3649
- https://ubuntu.com/security/CVE-2023-0461
- https://ubuntu.com/security/CVE-2022-36280
- https://ubuntu.com/security/CVE-2022-2196
- https://ubuntu.com/security/CVE-2022-41850
- https://ubuntu.com/security/CVE-2022-3628
- https://ubuntu.com/security/CVE-2022-3646
Title: USN-5992-1: ldb vulnerability
URL: https://ubuntu.com/security/notices/USN-5992-1
Priorities: medium
Description:
Demi Marie Obenour discovered that ldb, when used with Samba, incorrectly
handled certain confidential attribute values. A remote authenticated
attacker could possibly use this issue to obtain certain sensitive
information.
CVEs:
- https://ubuntu.com/security/CVE-2023-0614
Title: USN-5978-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5978-1
Priorities: high,medium,low
Description:
It was discovered that the network queuing discipline implementation in the
Linux kernel contained a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-1281)
It was discovered that the KVM VMX implementation in the Linux kernel did
not properly handle indirect branch prediction isolation between L1 and L2
VMs. An attacker in a guest VM could use this to expose sensitive
information from the host OS or other guest VMs. (CVE-2022-2196)
It was discovered that some AMD x86-64 processors with SMT enabled could
speculatively execute instructions using a return address from a sibling
thread. A local attacker could possibly use this to expose sensitive
information. (CVE-2022-27672)
Gerald Lee discovered that the USB Gadget file system implementation in the
Linux kernel contained a race condition, leading to a use-after-free
vulnerability in some situations. A local attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-4382)
It was discovered that the NTFS file system implementation in the Linux
kernel contained a null pointer dereference in some situations. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2022-4842)
Kyle Zeng discovered that the IPv6 implementation in the Linux kernel
contained a NULL pointer dereference vulnerability in certain situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2023-0394)
It was discovered that the Human Interface Device (HID) support driver in
the Linux kernel contained a type confusion vulnerability in some
situations. A local attacker could use this to cause a denial of service
(system crash). (CVE-2023-1073)
It was discovered that a memory leak existed in the SCTP protocol
implementation in the Linux kernel. A local attacker could use this to
cause a denial of service (memory exhaustion). (CVE-2023-1074)
It was discovered that the TLS subsystem in the Linux kernel contained a
type confusion vulnerability in some situations. A local attacker could use
this to cause a denial of service (system crash) or possibly expose
sensitive information. (CVE-2023-1075)
It was discovered that the Reliable Datagram Sockets (RDS) protocol
implementation in the Linux kernel contained a type confusion vulnerability
in some situations. An attacker could use this to cause a denial of service
(system crash). (CVE-2023-1078)
It was discovered that the RNDIS USB driver in the Linux kernel contained
an integer overflow vulnerability. A local attacker with physical access
could plug in a malicious USB device to cause a denial of service (system
crash) or possibly execute arbitrary code. (CVE-2023-23559)
Lianhui Tang discovered that the MPLS implementation in the Linux kernel
did not properly handle certain sysctl allocation failure conditions,
leading to a double-free vulnerability. An attacker could use this to cause
a denial of service or possibly execute arbitrary code. (CVE-2023-26545)
CVEs:
- https://ubuntu.com/security/CVE-2023-1281
- https://ubuntu.com/security/CVE-2022-2196
- https://ubuntu.com/security/CVE-2022-27672
- https://ubuntu.com/security/CVE-2022-4382
- https://ubuntu.com/security/CVE-2022-4842
- https://ubuntu.com/security/CVE-2023-0394
- https://ubuntu.com/security/CVE-2023-1073
- https://ubuntu.com/security/CVE-2023-1074
- https://ubuntu.com/security/CVE-2023-1075
- https://ubuntu.com/security/CVE-2023-1078
- https://ubuntu.com/security/CVE-2023-23559
- https://ubuntu.com/security/CVE-2023-26545
- https://ubuntu.com/security/CVE-2023-1281
- https://ubuntu.com/security/CVE-2023-1074
- https://ubuntu.com/security/CVE-2023-26545
- https://ubuntu.com/security/CVE-2022-27672
- https://ubuntu.com/security/CVE-2023-23559
- https://ubuntu.com/security/CVE-2023-1078
- https://ubuntu.com/security/CVE-2023-1073
- https://ubuntu.com/security/CVE-2023-1075
- https://ubuntu.com/security/CVE-2022-4842
- https://ubuntu.com/security/CVE-2022-4382
- https://ubuntu.com/security/CVE-2023-0394
- https://ubuntu.com/security/CVE-2022-2196
Title: USN-5977-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5977-1
Priorities: high,medium
Description:
It was discovered that the network queuing discipline implementation in the
Linux kernel contained a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-1281)
It was discovered that the KVM VMX implementation in the Linux kernel did
not properly handle indirect branch prediction isolation between L1 and L2
VMs. An attacker in a guest VM could use this to expose sensitive
information from the host OS or other guest VMs. (CVE-2022-2196)
Thadeu Cascardo discovered that the io_uring subsystem contained a double-
free vulnerability in certain memory allocation error conditions. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2023-1032)
CVEs:
- https://ubuntu.com/security/CVE-2023-1281
- https://ubuntu.com/security/CVE-2022-2196
- https://ubuntu.com/security/CVE-2023-1032
- https://ubuntu.com/security/CVE-2022-2196
- https://ubuntu.com/security/CVE-2023-1032
- https://ubuntu.com/security/CVE-2023-1281
Title: USN-5996-1: Liblouis vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5996-1
Priorities: medium
Description:
It was discovered that Liblouis incorrectly handled certain files.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2023-26767, CVE-2023-26768, CVE-2023-26769)
CVEs:
- https://ubuntu.com/security/CVE-2023-26767
- https://ubuntu.com/security/CVE-2023-26768
- https://ubuntu.com/security/CVE-2023-26769
- https://ubuntu.com/security/CVE-2023-26769
- https://ubuntu.com/security/CVE-2023-26768
- https://ubuntu.com/security/CVE-2023-26767
Title: USN-6005-1: Sudo vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6005-1
Priorities: medium
Description:
Matthieu Barjole and Victor Cutillas discovered that Sudo incorrectly
escaped control characters in log messages and sudoreplay output. An
attacker could possibly use these issues to inject terminal control
characters that alter output when being viewed.
CVEs:
- https://ubuntu.com/security/CVE-2023-28486
- https://ubuntu.com/security/CVE-2023-28487
Available in VMware Tanzu Network
Release Date: March 22, 2023
BOSH Agent Version: 2.516.0
Title: USN-5956-1: PHPMailer vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5956-1
Priorities: medium,low
Description:
Dawid Golunski discovered that PHPMailer was not properly escaping user
input data used as arguments to functions executed by the system shell. An
attacker could possibly use this issue to execute arbitrary code. This
issue only affected Ubuntu 16.04 ESM. (CVE-2016-10033, CVE-2016-10045)
It was discovered that PHPMailer was not properly escaping characters
in certain fields of the code_generator.php example code. An attacker
could possibly use this issue to conduct cross-site scripting (XSS)
attacks. This issue was only fixed in Ubuntu 16.04 ESM and Ubuntu 18.04
ESM. (CVE-2017-11503)
Yongxiang Li discovered that PHPMailer was not properly converting
relative paths provided as user input when adding attachments to messages,
which could lead to relative image URLs being treated as absolute local
file paths and added as attachments. An attacker could possibly use this
issue to access unauthorized resources and expose sensitive information.
This issue only affected Ubuntu 16.04 ESM. (CVE-2017-5223)
Sehun Oh discovered that PHPMailer was not properly processing untrusted
non-local file attachments, which could lead to an object injection. An
attacker could possibly use this issue to execute arbitrary code. This
issue only affected Ubuntu 16.04 ESM. (CVE-2018-19296)
Elar Lang discovered that PHPMailer was not properly escaping file
attachment names, which could lead to a misinterpretation of file types
by entities processing the message. An attacker could possibly use this
issue to bypass attachment filters. This issue was only fixed in Ubuntu
16.04 ESM and Ubuntu 20.04 ESM. (CVE-2020-13625)
It was discovered that PHPMailer was not properly handling callables in
its validateAddress function, which could result in untrusted code being
called should the global namespace contain a function called ‘php’. An
attacker could possibly use this issue to execute arbitrary code. This
issue was only fixed in Ubuntu 20.04 ESM and Ubuntu 22.04 ESM.
(CVE-2021-3603)
CVEs:
- https://ubuntu.com/security/CVE-2016-10033
- https://ubuntu.com/security/CVE-2016-10045
- https://ubuntu.com/security/CVE-2017-11503
- https://ubuntu.com/security/CVE-2017-5223
- https://ubuntu.com/security/CVE-2018-19296
- https://ubuntu.com/security/CVE-2020-13625
- https://ubuntu.com/security/CVE-2021-3603
- https://ubuntu.com/security/CVE-2021-3603
- https://ubuntu.com/security/CVE-2016-10045
- https://ubuntu.com/security/CVE-2017-5223
- https://ubuntu.com/security/CVE-2016-10033
- https://ubuntu.com/security/CVE-2018-19296
- https://ubuntu.com/security/CVE-2017-11503
- https://ubuntu.com/security/CVE-2020-13625
Title: USN-5961-1: abcm2ps vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5961-1
Priorities: medium,low
Description:
It was discovered that abcm2ps incorrectly
handled memory when parsing specially crafted ABC files.
An attacker could use this issue to cause abcm2ps to crash,
leading to a denial of service, or possibly execute
arbitrary code. This issue only affected Ubuntu 16.04 ESM
and Ubuntu 18.04 LTS.
(CVE-2018-10753, CVE-2018-10771, CVE-2019-1010069)
Chiba of Topsec Alpha Lab discovered that abcm2ps incorrectly
handled memory when parsing specially crafted ABC files.
An attacker could use this issue to cause abcm2ps to crash,
leading to a denial of service.
(CVE-2021-32434, CVE-2021-32435, CVE-2021-32436)
CVEs:
- https://ubuntu.com/security/CVE-2018-10753
- https://ubuntu.com/security/CVE-2018-10771
- https://ubuntu.com/security/CVE-2019-1010069
- https://ubuntu.com/security/CVE-2021-32434
- https://ubuntu.com/security/CVE-2021-32435
- https://ubuntu.com/security/CVE-2021-32436
- https://ubuntu.com/security/CVE-2021-32435
- https://ubuntu.com/security/CVE-2018-10771
- https://ubuntu.com/security/CVE-2019-1010069
- https://ubuntu.com/security/CVE-2021-32434
- https://ubuntu.com/security/CVE-2021-32436
- https://ubuntu.com/security/CVE-2018-10753
Title: USN-5947-1: Twig vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5947-1
Priorities: medium
Description:
Fabien Potencier discovered that Twig was not properly enforcing sandbox
policies when dealing with objects automatically cast to strings by PHP.
An attacker could possibly use this issue to expose sensitive information.
This issue was only fixed in Ubuntu 16.04 ESM and Ubuntu 18.04 ESM.
(CVE-2019-9942)
Marlon Starkloff discovered that Twig was not properly enforcing closure
constraints in some of its array filtering functions. An attacker could
possibly use this issue to execute arbitrary code. This issue was only
fixed in Ubuntu 20.04 ESM. (CVE-2022-23614)
Dariusz Tytko discovered that Twig was not properly verifying input data
utilized when defining pathnames used to access files in a system. An
attacker could possibly use this issue to access unauthorized resources
and expose sensitive information. (CVE-2022-39261)
CVEs:
- https://ubuntu.com/security/CVE-2019-9942
- https://ubuntu.com/security/CVE-2022-23614
- https://ubuntu.com/security/CVE-2022-39261
- https://ubuntu.com/security/CVE-2019-9942
- https://ubuntu.com/security/CVE-2022-23614
- https://ubuntu.com/security/CVE-2022-39261
Title: USN-5945-1: Protocol Buffers vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5945-1
Priorities: low
Description:
It was discovered that Protocol Buffers did not properly validate field
com.google.protobuf.UnknownFieldSet in protobuf-java. An attacker could
possibly use this issue to perform a denial of service attack. This issue
only affected protobuf Ubuntu 22.04 LTS and Ubuntu 22.10. (CVE-2021-22569)
It was discovered that Protocol Buffers did not properly parse certain
symbols. An attacker could possibly use this issue to cause a denial of
service or other unspecified impact. (CVE-2021-22570)
It was discovered that Protocol Buffers did not properly manage memory when
parsing specifically crafted messages. An attacker could possibly use this
issue to cause applications using protobuf to crash, resulting in a denial
of service. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS,
Ubuntu 22.04 LTS and Ubuntu 22.10. (CVE-2022-1941)
CVEs:
- https://ubuntu.com/security/CVE-2021-22569
- https://ubuntu.com/security/CVE-2021-22570
- https://ubuntu.com/security/CVE-2022-1941
- https://ubuntu.com/security/CVE-2021-22570
- https://ubuntu.com/security/CVE-2022-1941
- https://ubuntu.com/security/CVE-2021-22569
Title: USN-5946-1: XStream vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5946-1
Priorities: medium
Description:
Lai Han discovered that XStream incorrectly handled certain inputs.
If a user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to cause a denial
of service. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS.
(CVE-2021-39140)
It was discovered that XStream incorrectly handled certain inputs. If
a user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to execute
arbitrary code. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04
LTS. (CVE-2021-39139, CVE-2021-39141, CVE-2021-39144, CVE-2021-39145,
CVE-2021-39146, CVE-2021-39147, CVE-2021-39148, CVE-2021-39149,
CVE-2021-39151, CVE-2021-39153, CVE-2021-39154)
It was discovered that XStream incorrectly handled certain inputs. If
a user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to obtain
sensitive information. This issue only affected Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. (CVE-2021-39150, CVE-2021-39152)
Lai Han discovered that XStream incorrectly handled certain inputs.
If a user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to cause a denial
of service. (CVE-2022-41966)
CVEs:
- https://ubuntu.com/security/CVE-2021-39140
- https://ubuntu.com/security/CVE-2021-39139
- https://ubuntu.com/security/CVE-2021-39141
- https://ubuntu.com/security/CVE-2021-39144
- https://ubuntu.com/security/CVE-2021-39145
- https://ubuntu.com/security/CVE-2021-39146
- https://ubuntu.com/security/CVE-2021-39147
- https://ubuntu.com/security/CVE-2021-39148
- https://ubuntu.com/security/CVE-2021-39149
- https://ubuntu.com/security/CVE-2021-39151
- https://ubuntu.com/security/CVE-2021-39153
- https://ubuntu.com/security/CVE-2021-39154
- https://ubuntu.com/security/CVE-2021-39150
- https://ubuntu.com/security/CVE-2021-39152
- https://ubuntu.com/security/CVE-2022-41966
- https://ubuntu.com/security/CVE-2021-39141
- https://ubuntu.com/security/CVE-2021-39150
- https://ubuntu.com/security/CVE-2021-39139
- https://ubuntu.com/security/CVE-2021-39147
- https://ubuntu.com/security/CVE-2021-39152
- https://ubuntu.com/security/CVE-2021-39149
- https://ubuntu.com/security/CVE-2021-39148
- https://ubuntu.com/security/CVE-2022-41966
- https://ubuntu.com/security/CVE-2021-39144
- https://ubuntu.com/security/CVE-2021-39146
- https://ubuntu.com/security/CVE-2021-39151
- https://ubuntu.com/security/CVE-2021-39154
- https://ubuntu.com/security/CVE-2021-39145
- https://ubuntu.com/security/CVE-2021-39140
- https://ubuntu.com/security/CVE-2021-39153
Title: USN-5944-1: SnakeYAML vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5944-1
Priorities: low,medium
Description:
It was discovered that SnakeYAML did not limit the maximal nested depth
for collections when parsing YAML data. If a user or automated system were
tricked into opening a specially crafted YAML file, an attacker could
possibly use this issue to cause applications using SnakeYAML to crash,
resulting in a denial of service. (CVE-2022-25857, CVE-2022-38749,
CVE-2022-38750)
It was discovered that SnakeYAML did not limit the maximal data matched
with regular expressions when parsing YAML data. If a user or automated
system were tricked into opening a specially crafted YAML file, an
attacker could possibly use this issue to cause applications using
SnakeYAML to crash, resulting in a denial of service. (CVE-2022-38751)
CVEs:
- https://ubuntu.com/security/CVE-2022-25857
- https://ubuntu.com/security/CVE-2022-38749
- https://ubuntu.com/security/CVE-2022-38750
- https://ubuntu.com/security/CVE-2022-38751
- https://ubuntu.com/security/CVE-2022-38750
- https://ubuntu.com/security/CVE-2022-25857
- https://ubuntu.com/security/CVE-2022-38749
- https://ubuntu.com/security/CVE-2022-38751
Title: USN-5958-1: FFmpeg vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5958-1
Priorities: medium
Description:
It was discovered that FFmpeg could be made to dereference a null
pointer. An attacker could possibly use this to cause a denial of
service via application crash. These issues only affected Ubuntu
16.04 ESM, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04
LTS. (CVE-2022-3109, CVE-2022-3341)
It was discovered that FFmpeg could be made to access an out-of-bounds
frame by the Apple RPZA encoder. An attacker could possibly use this
to cause a denial of service via application crash or access sensitive
information. This issue only affected Ubuntu 20.04 LTS and Ubuntu
22.10. (CVE-2022-3964)
It was discovered that FFmpeg could be made to access an out-of-bounds
frame by the QuickTime encoder. An attacker could possibly use this to
cause a denial of service via application crash or access sensitive
information. This issue only affected Ubuntu 22.10. (CVE-2022-3965)
CVEs:
- https://ubuntu.com/security/CVE-2022-3109
- https://ubuntu.com/security/CVE-2022-3341
- https://ubuntu.com/security/CVE-2022-3964
- https://ubuntu.com/security/CVE-2022-3965
- https://ubuntu.com/security/CVE-2022-3341
- https://ubuntu.com/security/CVE-2022-3109
- https://ubuntu.com/security/CVE-2022-3965
- https://ubuntu.com/security/CVE-2022-3964
Title: USN-5928-1: systemd vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5928-1
Priorities: medium
Description:
It was discovered that systemd did not properly validate the time and
accuracy values provided to the format_timespan() function. An attacker
could possibly use this issue to cause a buffer overrun, leading to a
denial of service attack. This issue only affected Ubuntu 14.04 ESM, Ubuntu
16.04 ESM, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS.
(CVE-2022-3821)
It was discovered that systemd did not properly manage the fs.suid_dumpable
kernel configurations. A local attacker could possibly use this issue to
expose sensitive information. This issue only affected Ubuntu 20.04 LTS,
Ubuntu 22.04 LTS, and Ubuntu 22.10. (CVE-2022-4415)
It was discovered that systemd did not properly manage a crash with long
backtrace data. A local attacker could possibly use this issue to cause a
deadlock, leading to a denial of service attack. This issue only affected
Ubuntu 22.10. (CVE-2022-45873)
CVEs:
- https://ubuntu.com/security/CVE-2022-3821
- https://ubuntu.com/security/CVE-2022-4415
- https://ubuntu.com/security/CVE-2022-45873
- https://ubuntu.com/security/CVE-2022-3821
- https://ubuntu.com/security/CVE-2022-45873
- https://ubuntu.com/security/CVE-2022-4415
Title: LSN-0092-1: Kernel Live Patch Security Notice
URL: https://ubuntu.com/security/notices/LSN-0092-1
Priorities: high
Description:
Kyle Zeng discovered that the sysctl implementation in the Linux kernel
contained a stack-based buffer overflow. A local attacker could use this to
cause a denial of service (system crash) or execute arbitrary code.(CVE-2022-4378)
Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation
in the Linux kernel contained multiple use-after-free vulnerabilities. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code.(CVE-2022-42896)
It was discovered that the NFSD implementation in the Linux kernel did not
properly handle some RPC messages, leading to a buffer overflow. A remote
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code.(CVE-2022-43945)
CVEs:
- https://ubuntu.com/security/CVE-2022-4378
- https://ubuntu.com/security/CVE-2022-42896
- https://ubuntu.com/security/CVE-2022-43945
- https://ubuntu.com/security/CVE-2022-42896
- https://ubuntu.com/security/CVE-2022-4378
- https://ubuntu.com/security/CVE-2022-43945
Title: USN-5855-2: ImageMagick vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5855-2
Priorities: medium
Description:
USN-5855-1 fixed a vulnerability in ImageMagick. This update provides
the corresponding update for Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu
22.10.
Original advisory details:
It was discovered that ImageMagick incorrectly handled certain PNG images.
If a user or automated system were tricked into opening a specially crafted
PNG file, an attacker could use this issue to cause ImageMagick to stop
responding, resulting in a denial of service, or possibly obtain the
contents of arbitrary files by including them into images.
CVEs:
- https://ubuntu.com/security/CVE-2022-44267
- https://ubuntu.com/security/CVE-2022-44268
Title: USN-5937-1: Opusfile vulnerability
URL: https://ubuntu.com/security/notices/USN-5937-1
Priorities: medium
Description:
It was discovered that Opusfile was not properly validating pointer
arguments in some of its functions, which could lead to a NULL pointer
dereference. An attacker could possibly use this issue to cause a denial
of service or have other unspecified impacts.
CVEs:
- https://ubuntu.com/security/CVE-2022-47021
Title: USN-5963-1: Vim vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5963-1
Priorities: medium
Description:
It was discovered that Vim was not properly performing memory management
operations. An attacker could possibly use this issue to cause a denial
of service or execute arbitrary code. This issue only affected Ubuntu 18.04
LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 22.10. (CVE-2022-47024,
CVE-2023-0049, CVE-2023-0054, CVE-2023-0288, CVE-2023-0433)
It was discovered that Vim was not properly performing memory management
operations. An attacker could possibly use this issue to cause a denial
of service or execute arbitrary code. This issue only affected Ubuntu 22.04
LTS, and Ubuntu 22.10. (CVE-2023-0051)
It was discovered that Vim was not properly performing memory management
operations. An attacker could possibly use this issue to cause a denial
of service or execute arbitrary code. (CVE-2023-1170, CVE-2023-1175)
It was discovered that Vim was not properly performing memory management
operations. An attacker could possibly use this issue to cause a denial
of service or execute arbitrary code. This issue only affected Ubuntu 20.04
LTS, Ubuntu 22.04 LTS, and Ubuntu 22.10. (CVE-2023-1264)
CVEs:
- https://ubuntu.com/security/CVE-2022-47024
- https://ubuntu.com/security/CVE-2023-0049
- https://ubuntu.com/security/CVE-2023-0054
- https://ubuntu.com/security/CVE-2023-0288
- https://ubuntu.com/security/CVE-2023-0433
- https://ubuntu.com/security/CVE-2023-0051
- https://ubuntu.com/security/CVE-2023-1170
- https://ubuntu.com/security/CVE-2023-1175
- https://ubuntu.com/security/CVE-2023-1264
- https://ubuntu.com/security/CVE-2023-0054
- https://ubuntu.com/security/CVE-2023-1175
- https://ubuntu.com/security/CVE-2023-0049
- https://ubuntu.com/security/CVE-2023-1264
- https://ubuntu.com/security/CVE-2023-0433
- https://ubuntu.com/security/CVE-2022-47024
- https://ubuntu.com/security/CVE-2023-0051
- https://ubuntu.com/security/CVE-2023-0288
- https://ubuntu.com/security/CVE-2023-1170
Title: USN-5938-1: Linux kernel (GKE) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5938-1
Priorities: high,medium,low
Description:
It was discovered that the Upper Level Protocol (ULP) subsystem in the
Linux kernel did not properly handle sockets entering the LISTEN state in
certain protocols, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-0461)
Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel
did not properly handle VLAN headers in some situations. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-0179)
It was discovered that the NVMe driver in the Linux kernel did not properly
handle reset events in some situations. A local attacker could use this to
cause a denial of service (system crash). (CVE-2022-3169)
Maxim Levitsky discovered that the KVM nested virtualization (SVM)
implementation for AMD processors in the Linux kernel did not properly
handle nested shutdown execution. An attacker in a guest vm could use this
to cause a denial of service (host kernel crash) (CVE-2022-3344)
Gwangun Jung discovered a race condition in the IPv4 implementation in the
Linux kernel when deleting multipath routes, resulting in an out-of-bounds
read. An attacker could use this to cause a denial of service (system
crash) or possibly expose sensitive information (kernel memory).
(CVE-2022-3435)
It was discovered that a race condition existed in the Kernel Connection
Multiplexor (KCM) socket implementation in the Linux kernel when releasing
sockets in certain situations. A local attacker could use this to cause a
denial of service (system crash). (CVE-2022-3521)
It was discovered that the Netronome Ethernet driver in the Linux kernel
contained a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3545)
It was discovered that the Intel i915 graphics driver in the Linux kernel
did not perform a GPU TLB flush in some situations. A local attacker could
use this to cause a denial of service or possibly execute arbitrary code.
(CVE-2022-4139)
It was discovered that a race condition existed in the Xen network backend
driver in the Linux kernel when handling dropped packets in certain
circumstances. An attacker could use this to cause a denial of service
(kernel deadlock). (CVE-2022-42328, CVE-2022-42329)
It was discovered that the NFSD implementation in the Linux kernel
contained a use-after-free vulnerability. A remote attacker could possibly
use this to cause a denial of service (system crash) or execute arbitrary
code. (CVE-2022-4379)
It was discovered that a race condition existed in the x86 KVM subsystem
implementation in the Linux kernel when nested virtualization and the TDP
MMU are enabled. An attacker in a guest vm could use this to cause a denial
of service (host OS crash). (CVE-2022-45869)
It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate the number of channels, leading to an out-of-bounds
write vulnerability. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2022-47518)
It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate specific attributes, leading to an out-of-bounds
write vulnerability. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2022-47519)
It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate offsets, leading to an out-of-bounds read
vulnerability. An attacker could use this to cause a denial of service
(system crash). (CVE-2022-47520)
It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate specific attributes, leading to a heap-based buffer
overflow. An attacker could use this to cause a denial of service (system
crash) or possibly execute arbitrary code. (CVE-2022-47521)
Lin Ma discovered a race condition in the io_uring subsystem in the Linux
kernel, leading to a null pointer dereference vulnerability. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2023-0468)
CVEs:
- https://ubuntu.com/security/CVE-2023-0461
- https://ubuntu.com/security/CVE-2023-0179
- https://ubuntu.com/security/CVE-2022-3169
- https://ubuntu.com/security/CVE-2022-3344
- https://ubuntu.com/security/CVE-2022-3435
- https://ubuntu.com/security/CVE-2022-3521
- https://ubuntu.com/security/CVE-2022-3545
- https://ubuntu.com/security/CVE-2022-4139
- https://ubuntu.com/security/CVE-2022-42328
- https://ubuntu.com/security/CVE-2022-42329
- https://ubuntu.com/security/CVE-2022-4379
- https://ubuntu.com/security/CVE-2022-45869
- https://ubuntu.com/security/CVE-2022-47518
- https://ubuntu.com/security/CVE-2022-47519
- https://ubuntu.com/security/CVE-2022-47520
- https://ubuntu.com/security/CVE-2022-47521
- https://ubuntu.com/security/CVE-2023-0468
- https://ubuntu.com/security/CVE-2022-3169
- https://ubuntu.com/security/CVE-2022-3521
- https://ubuntu.com/security/CVE-2022-3344
- https://ubuntu.com/security/CVE-2022-3545
- https://ubuntu.com/security/CVE-2022-3435
- https://ubuntu.com/security/CVE-2022-45869
- https://ubuntu.com/security/CVE-2022-47518
- https://ubuntu.com/security/CVE-2023-0461
- https://ubuntu.com/security/CVE-2023-0468
- https://ubuntu.com/security/CVE-2022-42328
- https://ubuntu.com/security/CVE-2022-42329
- https://ubuntu.com/security/CVE-2022-4139
- https://ubuntu.com/security/CVE-2022-4379
- https://ubuntu.com/security/CVE-2022-47519
- https://ubuntu.com/security/CVE-2022-47521
- https://ubuntu.com/security/CVE-2022-47520
- https://ubuntu.com/security/CVE-2023-0179
Title: USN-5941-1: Linux kernel (KVM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5941-1
Priorities: high,medium,low
Description:
It was discovered that the Upper Level Protocol (ULP) subsystem in the
Linux kernel did not properly handle sockets entering the LISTEN state in
certain protocols, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-0461)
Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel
did not properly handle VLAN headers in some situations. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-0179)
It was discovered that the NVMe driver in the Linux kernel did not properly
handle reset events in some situations. A local attacker could use this to
cause a denial of service (system crash). (CVE-2022-3169)
Maxim Levitsky discovered that the KVM nested virtualization (SVM)
implementation for AMD processors in the Linux kernel did not properly
handle nested shutdown execution. An attacker in a guest vm could use this
to cause a denial of service (host kernel crash) (CVE-2022-3344)
Gwangun Jung discovered a race condition in the IPv4 implementation in the
Linux kernel when deleting multipath routes, resulting in an out-of-bounds
read. An attacker could use this to cause a denial of service (system
crash) or possibly expose sensitive information (kernel memory).
(CVE-2022-3435)
It was discovered that a race condition existed in the Kernel Connection
Multiplexor (KCM) socket implementation in the Linux kernel when releasing
sockets in certain situations. A local attacker could use this to cause a
denial of service (system crash). (CVE-2022-3521)
It was discovered that the Netronome Ethernet driver in the Linux kernel
contained a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3545)
It was discovered that the Intel i915 graphics driver in the Linux kernel
did not perform a GPU TLB flush in some situations. A local attacker could
use this to cause a denial of service or possibly execute arbitrary code.
(CVE-2022-4139)
It was discovered that a race condition existed in the Xen network backend
driver in the Linux kernel when handling dropped packets in certain
circumstances. An attacker could use this to cause a denial of service
(kernel deadlock). (CVE-2022-42328, CVE-2022-42329)
It was discovered that the NFSD implementation in the Linux kernel
contained a use-after-free vulnerability. A remote attacker could possibly
use this to cause a denial of service (system crash) or execute arbitrary
code. (CVE-2022-4379)
It was discovered that a race condition existed in the x86 KVM subsystem
implementation in the Linux kernel when nested virtualization and the TDP
MMU are enabled. An attacker in a guest vm could use this to cause a denial
of service (host OS crash). (CVE-2022-45869)
It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate the number of channels, leading to an out-of-bounds
write vulnerability. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2022-47518)
It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate specific attributes, leading to an out-of-bounds
write vulnerability. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2022-47519)
It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate offsets, leading to an out-of-bounds read
vulnerability. An attacker could use this to cause a denial of service
(system crash). (CVE-2022-47520)
It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate specific attributes, leading to a heap-based buffer
overflow. An attacker could use this to cause a denial of service (system
crash) or possibly execute arbitrary code. (CVE-2022-47521)
Lin Ma discovered a race condition in the io_uring subsystem in the Linux
kernel, leading to a null pointer dereference vulnerability. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2023-0468)
CVEs:
- https://ubuntu.com/security/CVE-2023-0461
- https://ubuntu.com/security/CVE-2023-0179
- https://ubuntu.com/security/CVE-2022-3169
- https://ubuntu.com/security/CVE-2022-3344
- https://ubuntu.com/security/CVE-2022-3435
- https://ubuntu.com/security/CVE-2022-3521
- https://ubuntu.com/security/CVE-2022-3545
- https://ubuntu.com/security/CVE-2022-4139
- https://ubuntu.com/security/CVE-2022-42328
- https://ubuntu.com/security/CVE-2022-42329
- https://ubuntu.com/security/CVE-2022-4379
- https://ubuntu.com/security/CVE-2022-45869
- https://ubuntu.com/security/CVE-2022-47518
- https://ubuntu.com/security/CVE-2022-47519
- https://ubuntu.com/security/CVE-2022-47520
- https://ubuntu.com/security/CVE-2022-47521
- https://ubuntu.com/security/CVE-2023-0468
- https://ubuntu.com/security/CVE-2022-42329
- https://ubuntu.com/security/CVE-2022-47518
- https://ubuntu.com/security/CVE-2022-3545
- https://ubuntu.com/security/CVE-2022-4139
- https://ubuntu.com/security/CVE-2022-47519
- https://ubuntu.com/security/CVE-2023-0461
- https://ubuntu.com/security/CVE-2022-3344
- https://ubuntu.com/security/CVE-2022-4379
- https://ubuntu.com/security/CVE-2022-45869
- https://ubuntu.com/security/CVE-2022-47520
- https://ubuntu.com/security/CVE-2022-42328
- https://ubuntu.com/security/CVE-2023-0179
- https://ubuntu.com/security/CVE-2022-47521
- https://ubuntu.com/security/CVE-2023-0468
- https://ubuntu.com/security/CVE-2022-3521
- https://ubuntu.com/security/CVE-2022-3435
- https://ubuntu.com/security/CVE-2022-3169
Title: USN-5935-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5935-1
Priorities: high,medium,low
Description:
It was discovered that the Upper Level Protocol (ULP) subsystem in the
Linux kernel did not properly handle sockets entering the LISTEN state in
certain protocols, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-0461)
Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel
did not properly handle VLAN headers in some situations. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-0179)
It was discovered that the NVMe driver in the Linux kernel did not properly
handle reset events in some situations. A local attacker could use this to
cause a denial of service (system crash). (CVE-2022-3169)
Maxim Levitsky discovered that the KVM nested virtualization (SVM)
implementation for AMD processors in the Linux kernel did not properly
handle nested shutdown execution. An attacker in a guest vm could use this
to cause a denial of service (host kernel crash) (CVE-2022-3344)
Gwangun Jung discovered a race condition in the IPv4 implementation in the
Linux kernel when deleting multipath routes, resulting in an out-of-bounds
read. An attacker could use this to cause a denial of service (system
crash) or possibly expose sensitive information (kernel memory).
(CVE-2022-3435)
It was discovered that a race condition existed in the Kernel Connection
Multiplexor (KCM) socket implementation in the Linux kernel when releasing
sockets in certain situations. A local attacker could use this to cause a
denial of service (system crash). (CVE-2022-3521)
It was discovered that the Netronome Ethernet driver in the Linux kernel
contained a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3545)
It was discovered that the Intel i915 graphics driver in the Linux kernel
did not perform a GPU TLB flush in some situations. A local attacker could
use this to cause a denial of service or possibly execute arbitrary code.
(CVE-2022-4139)
It was discovered that a race condition existed in the Xen network backend
driver in the Linux kernel when handling dropped packets in certain
circumstances. An attacker could use this to cause a denial of service
(kernel deadlock). (CVE-2022-42328, CVE-2022-42329)
It was discovered that the NFSD implementation in the Linux kernel
contained a use-after-free vulnerability. A remote attacker could possibly
use this to cause a denial of service (system crash) or execute arbitrary
code. (CVE-2022-4379)
It was discovered that a race condition existed in the x86 KVM subsystem
implementation in the Linux kernel when nested virtualization and the TDP
MMU are enabled. An attacker in a guest vm could use this to cause a denial
of service (host OS crash). (CVE-2022-45869)
It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate the number of channels, leading to an out-of-bounds
write vulnerability. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2022-47518)
It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate specific attributes, leading to an out-of-bounds
write vulnerability. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2022-47519)
It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate offsets, leading to an out-of-bounds read
vulnerability. An attacker could use this to cause a denial of service
(system crash). (CVE-2022-47520)
It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate specific attributes, leading to a heap-based buffer
overflow. An attacker could use this to cause a denial of service (system
crash) or possibly execute arbitrary code. (CVE-2022-47521)
Lin Ma discovered a race condition in the io_uring subsystem in the Linux
kernel, leading to a null pointer dereference vulnerability. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2023-0468)
CVEs:
- https://ubuntu.com/security/CVE-2023-0461
- https://ubuntu.com/security/CVE-2023-0179
- https://ubuntu.com/security/CVE-2022-3169
- https://ubuntu.com/security/CVE-2022-3344
- https://ubuntu.com/security/CVE-2022-3435
- https://ubuntu.com/security/CVE-2022-3521
- https://ubuntu.com/security/CVE-2022-3545
- https://ubuntu.com/security/CVE-2022-4139
- https://ubuntu.com/security/CVE-2022-42328
- https://ubuntu.com/security/CVE-2022-42329
- https://ubuntu.com/security/CVE-2022-4379
- https://ubuntu.com/security/CVE-2022-45869
- https://ubuntu.com/security/CVE-2022-47518
- https://ubuntu.com/security/CVE-2022-47519
- https://ubuntu.com/security/CVE-2022-47520
- https://ubuntu.com/security/CVE-2022-47521
- https://ubuntu.com/security/CVE-2023-0468
- https://ubuntu.com/security/CVE-2022-47521
- https://ubuntu.com/security/CVE-2022-3169
- https://ubuntu.com/security/CVE-2022-4379
- https://ubuntu.com/security/CVE-2022-47520
- https://ubuntu.com/security/CVE-2022-42329
- https://ubuntu.com/security/CVE-2022-3435
- https://ubuntu.com/security/CVE-2022-3521
- https://ubuntu.com/security/CVE-2022-3545
- https://ubuntu.com/security/CVE-2022-3344
- https://ubuntu.com/security/CVE-2023-0461
- https://ubuntu.com/security/CVE-2022-45869
- https://ubuntu.com/security/CVE-2023-0179
- https://ubuntu.com/security/CVE-2023-0468
- https://ubuntu.com/security/CVE-2022-47519
- https://ubuntu.com/security/CVE-2022-47518
- https://ubuntu.com/security/CVE-2022-42328
- https://ubuntu.com/security/CVE-2022-4139
Title: USN-5962-1: Linux kernel (Intel IoTG) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5962-1
Priorities: high,medium,low
Description:
It was discovered that the Upper Level Protocol (ULP) subsystem in the
Linux kernel did not properly handle sockets entering the LISTEN state in
certain protocols, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-0461)
Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel
did not properly handle VLAN headers in some situations. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-0179)
It was discovered that the NVMe driver in the Linux kernel did not properly
handle reset events in some situations. A local attacker could use this to
cause a denial of service (system crash). (CVE-2022-3169)
Maxim Levitsky discovered that the KVM nested virtualization (SVM)
implementation for AMD processors in the Linux kernel did not properly
handle nested shutdown execution. An attacker in a guest vm could use this
to cause a denial of service (host kernel crash) (CVE-2022-3344)
Gwangun Jung discovered a race condition in the IPv4 implementation in the
Linux kernel when deleting multipath routes, resulting in an out-of-bounds
read. An attacker could use this to cause a denial of service (system
crash) or possibly expose sensitive information (kernel memory).
(CVE-2022-3435)
It was discovered that a race condition existed in the Kernel Connection
Multiplexor (KCM) socket implementation in the Linux kernel when releasing
sockets in certain situations. A local attacker could use this to cause a
denial of service (system crash). (CVE-2022-3521)
It was discovered that the Netronome Ethernet driver in the Linux kernel
contained a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3545)
It was discovered that the Intel i915 graphics driver in the Linux kernel
did not perform a GPU TLB flush in some situations. A local attacker could
use this to cause a denial of service or possibly execute arbitrary code.
(CVE-2022-4139)
It was discovered that a race condition existed in the Xen network backend
driver in the Linux kernel when handling dropped packets in certain
circumstances. An attacker could use this to cause a denial of service
(kernel deadlock). (CVE-2022-42328, CVE-2022-42329)
It was discovered that the NFSD implementation in the Linux kernel
contained a use-after-free vulnerability. A remote attacker could possibly
use this to cause a denial of service (system crash) or execute arbitrary
code. (CVE-2022-4379)
It was discovered that a race condition existed in the x86 KVM subsystem
implementation in the Linux kernel when nested virtualization and the TDP
MMU are enabled. An attacker in a guest vm could use this to cause a denial
of service (host OS crash). (CVE-2022-45869)
It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate the number of channels, leading to an out-of-bounds
write vulnerability. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2022-47518)
It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate specific attributes, leading to an out-of-bounds
write vulnerability. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2022-47519)
It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate offsets, leading to an out-of-bounds read
vulnerability. An attacker could use this to cause a denial of service
(system crash). (CVE-2022-47520)
It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate specific attributes, leading to a heap-based buffer
overflow. An attacker could use this to cause a denial of service (system
crash) or possibly execute arbitrary code. (CVE-2022-47521)
Lin Ma discovered a race condition in the io_uring subsystem in the Linux
kernel, leading to a null pointer dereference vulnerability. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2023-0468)
It was discovered that the file system writeback functionality in the Linux
kernel contained a user-after-free vulnerability. A local attacker could
possibly use this to cause a denial of service (system crash) or execute
arbitrary code. (CVE-2023-26605)
CVEs:
- https://ubuntu.com/security/CVE-2023-0461
- https://ubuntu.com/security/CVE-2023-0179
- https://ubuntu.com/security/CVE-2022-3169
- https://ubuntu.com/security/CVE-2022-3344
- https://ubuntu.com/security/CVE-2022-3435
- https://ubuntu.com/security/CVE-2022-3521
- https://ubuntu.com/security/CVE-2022-3545
- https://ubuntu.com/security/CVE-2022-4139
- https://ubuntu.com/security/CVE-2022-42328
- https://ubuntu.com/security/CVE-2022-42329
- https://ubuntu.com/security/CVE-2022-4379
- https://ubuntu.com/security/CVE-2022-45869
- https://ubuntu.com/security/CVE-2022-47518
- https://ubuntu.com/security/CVE-2022-47519
- https://ubuntu.com/security/CVE-2022-47520
- https://ubuntu.com/security/CVE-2022-47521
- https://ubuntu.com/security/CVE-2023-0468
- https://ubuntu.com/security/CVE-2023-26605
- https://ubuntu.com/security/CVE-2022-47520
- https://ubuntu.com/security/CVE-2022-3521
- https://ubuntu.com/security/CVE-2022-42328
- https://ubuntu.com/security/CVE-2022-3545
- https://ubuntu.com/security/CVE-2022-47518
- https://ubuntu.com/security/CVE-2022-47521
- https://ubuntu.com/security/CVE-2022-3344
- https://ubuntu.com/security/CVE-2022-3435
- https://ubuntu.com/security/CVE-2023-26605
- https://ubuntu.com/security/CVE-2022-4139
- https://ubuntu.com/security/CVE-2022-47519
- https://ubuntu.com/security/CVE-2022-42329
- https://ubuntu.com/security/CVE-2023-0179
- https://ubuntu.com/security/CVE-2022-45869
- https://ubuntu.com/security/CVE-2022-4379
- https://ubuntu.com/security/CVE-2022-3169
- https://ubuntu.com/security/CVE-2023-0468
- https://ubuntu.com/security/CVE-2023-0461
Title: USN-5943-1: Thunderbird vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5943-1
Priorities: medium
Description:
Multiple security issues were discovered in Thunderbird. If a user were
tricked into opening a specially crafted website in a browsing context, an
attacker could potentially exploit these to cause a denial of service,
obtain sensitive information, bypass security restrictions, cross-site
tracing, or execute arbitrary code. (CVE-2023-0616, CVE-2023-25735,
CVE-2023-25737, CVE-2023-25739, CVE-2023-25729, CVE-2023-25742,
CVE-2023-25746)
Johan Carlsson discovered that Thunderbird did not properly implement CSP
policy on a header when using iframes. An attacker could potentially
exploits this to exfiltrate data. (CVE-2023-25728)
Irvan Kurniawan discovered that Thunderbird was not properly handling
background fullscreen scripts when the window goes into fullscreen mode.
An attacker could possibly use this issue to spoof the user and obtain
sensitive information. (CVE-2023-25730)
Christian Holler discovered that Thunderbird did not properly check the
Safe Bag attributes in PKCS 12 certificate bundle. An attacker could
possibly use this issue to write to arbitrary memory by sending malicious
PKCS 12 certificate. (CVE-2023-0767)
Ronald Crane discovered that Thunderbird did not properly check the size of
the input being encoded in xpcom. An attacker could possibly use this issue
to perform out of bound memory write operations. (CVE-2023-25732)
CVEs:
- https://ubuntu.com/security/CVE-2023-0616
- https://ubuntu.com/security/CVE-2023-25735
- https://ubuntu.com/security/CVE-2023-25737
- https://ubuntu.com/security/CVE-2023-25739
- https://ubuntu.com/security/CVE-2023-25729
- https://ubuntu.com/security/CVE-2023-25742
- https://ubuntu.com/security/CVE-2023-25746
- https://ubuntu.com/security/CVE-2023-25728
- https://ubuntu.com/security/CVE-2023-25730
- https://ubuntu.com/security/CVE-2023-0767
- https://ubuntu.com/security/CVE-2023-25732
- https://ubuntu.com/security/CVE-2023-25737
- https://ubuntu.com/security/CVE-2023-25729
- https://ubuntu.com/security/CVE-2023-0767
- https://ubuntu.com/security/CVE-2023-25728
- https://ubuntu.com/security/CVE-2023-25739
- https://ubuntu.com/security/CVE-2023-25735
- https://ubuntu.com/security/CVE-2023-25746
- https://ubuntu.com/security/CVE-2023-0616
- https://ubuntu.com/security/CVE-2023-25732
- https://ubuntu.com/security/CVE-2023-25742
- https://ubuntu.com/security/CVE-2023-25730
Title: USN-5923-1: LibTIFF vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5923-1
Priorities: medium
Description:
It was discovered that LibTIFF could be made to read out of bounds when
processing certain malformed image files with the tiffcrop tool. If a user
were tricked into opening a specially crafted image file, an attacker
could possibly use this issue to cause tiffcrop to crash, resulting in a
denial of service. (CVE-2023-0795, CVE-2023-0796, CVE-2023-0797,
CVE-2023-0798, CVE-2023-0799)
It was discovered that LibTIFF could be made to write out of bounds when
processing certain malformed image files with the tiffcrop tool. If a user
were tricked into opening a specially crafted image file, an attacker
could possibly use this issue to cause tiffcrop to crash, resulting in a
denial of service, or possibly execute arbitrary code. (CVE-2023-0800,
CVE-2023-0801, CVE-2023-0802, CVE-2023-0803, CVE-2023-0804)
CVEs:
- https://ubuntu.com/security/CVE-2023-0795
- https://ubuntu.com/security/CVE-2023-0796
- https://ubuntu.com/security/CVE-2023-0797
- https://ubuntu.com/security/CVE-2023-0798
- https://ubuntu.com/security/CVE-2023-0799
- https://ubuntu.com/security/CVE-2023-0800
- https://ubuntu.com/security/CVE-2023-0801
- https://ubuntu.com/security/CVE-2023-0802
- https://ubuntu.com/security/CVE-2023-0803
- https://ubuntu.com/security/CVE-2023-0804
- https://ubuntu.com/security/CVE-2023-0802
- https://ubuntu.com/security/CVE-2023-0796
- https://ubuntu.com/security/CVE-2023-0803
- https://ubuntu.com/security/CVE-2023-0799
- https://ubuntu.com/security/CVE-2023-0800
- https://ubuntu.com/security/CVE-2023-0801
- https://ubuntu.com/security/CVE-2023-0798
- https://ubuntu.com/security/CVE-2023-0795
- https://ubuntu.com/security/CVE-2023-0797
- https://ubuntu.com/security/CVE-2023-0804
Title: USN-5933-1: Libtpms vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5933-1
Priorities: medium
Description:
Francisco Falcon discovered that Libtpms did not properly manage memory
when performing certain cryptographic operations. An attacker could
possibly use this issue to cause a denial of service, or possibly execute
arbitrary code. (CVE-2023-1017, CVE-2023-1018)
It was discovered that Libtpms did not properly manage memory when
handling certain commands. An attacker could possibly use this issue
to cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-1017
- https://ubuntu.com/security/CVE-2023-1018
- https://ubuntu.com/security/CVE-2023-1017
- https://ubuntu.com/security/CVE-2023-1018
Title: USN-5948-1: Werkzeug vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5948-1
Priorities: medium
Description:
It was discovered that Werkzeug did not properly handle the parsing of
nameless cookies. A remote attacker could possibly use this issue to
shadow other cookies. (CVE-2023-23934)
It was discovered that Werkzeug could be made to process unlimited number
of multipart form data parts. A remote attacker could possibly use this
issue to cause Werkzeug to consume resources, leading to a denial of
service. (CVE-2023-25577)
CVEs:
- https://ubuntu.com/security/CVE-2023-23934
- https://ubuntu.com/security/CVE-2023-25577
- https://ubuntu.com/security/CVE-2023-23934
- https://ubuntu.com/security/CVE-2023-25577
Title: USN-5960-1: Python vulnerability
URL: https://ubuntu.com/security/notices/USN-5960-1
Priorities: medium
Description:
Yebo Cao discovered that Python incorrectly handled certain URLs.
An attacker could possibly use this issue to bypass blocklisting
methods by supplying a URL that starts with blank characters.
CVEs:
- https://ubuntu.com/security/CVE-2023-24329
Title: USN-5942-1: Apache HTTP Server vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5942-1
Priorities: medium
Description:
Lars Krapf discovered that the Apache HTTP Server mod_proxy module
incorrectly handled certain configurations. A remote attacker could
possibly use this issue to perform an HTTP Request Smuggling attack.
(CVE-2023-25690)
Dimas Fariski Setyawan Putra discovered that the Apache HTTP Server
mod_proxy_uwsgi module incorrectly handled certain special characters. A
remote attacker could possibly use this issue to perform an HTTP Request
Smuggling attack. This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04
LTS, and Ubuntu 22.10. (CVE-2023-27522)
CVEs:
- https://ubuntu.com/security/CVE-2023-25690
- https://ubuntu.com/security/CVE-2023-27522
- https://ubuntu.com/security/CVE-2023-27522
- https://ubuntu.com/security/CVE-2023-25690
Title: USN-5964-1: curl vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5964-1
Priorities: low,medium
Description:
Harry Sintonen discovered that curl incorrectly handled certain TELNET
connection options. Due to lack of proper input scrubbing, curl could pass
on user name and telnet options to the server as provided, contrary to
expectations. (CVE-2023-27533)
Harry Sintonen discovered that curl incorrectly handled special tilde
characters when used with SFTP paths. A remote attacker could possibly use
this issue to circumvent filtering. (CVE-2023-27534)
Harry Sintonen discovered that curl incorrectly reused certain FTP
connections. This could lead to the wrong credentials being reused,
contrary to expectations. (CVE-2023-27535)
Harry Sintonen discovered that curl incorrectly reused connections when the
GSS delegation option had been changed. This could lead to the option being
reused, contrary to expectations. (CVE-2023-27536)
Harry Sintonen discovered that curl incorrectly reused certain SSH
connections. This could lead to the wrong credentials being reused,
contrary to expectations. (CVE-2023-27538)
CVEs:
- https://ubuntu.com/security/CVE-2023-27533
- https://ubuntu.com/security/CVE-2023-27534
- https://ubuntu.com/security/CVE-2023-27535
- https://ubuntu.com/security/CVE-2023-27536
- https://ubuntu.com/security/CVE-2023-27538
- https://ubuntu.com/security/CVE-2023-27533
- https://ubuntu.com/security/CVE-2023-27534
- https://ubuntu.com/security/CVE-2023-27536
- https://ubuntu.com/security/CVE-2023-27535
- https://ubuntu.com/security/CVE-2023-27538
Available in VMware Tanzu Network
Release Date: March 07, 2023
BOSH Agent Version: 2.514.0
Title: USN-5882-1: DCMTK vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5882-1
Priorities: medium,low
Description:
Gjoko Krstic discovered that DCMTK incorrectly handled buffers. If a user or
an automated system were tricked into opening a certain specially crafted
input file, a remote attacker could possibly use this issue to cause a
denial of service. This issue only affected Ubuntu 16.04 LTS. (CVE-2015-8979)
Omar Ganiev discovered that DCMTK incorrectly handled buffers. If a user or
an automated system were tricked into opening a certain specially crafted
input file, a remote attacker could possibly use this issue to cause a
denial of service. This issue only affected Ubuntu 16.04 LTS and
Ubuntu 18.04 LTS. (CVE-2019-1010228)
Jinsheng Ba discovered that DCMTK incorrectly handled certain requests. If a
user or an automated system were tricked into opening a certain specially
crafted input file, a remote attacker could possibly use this issue to
cause a denial of service. This issue only affected Ubuntu 16.04 LTS,
Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2021-41687,
CVE-2021-41688, CVE-2021-41689, and CVE-2021-41690)
Sharon Brizinov and Noam Moshe discovered that DCMTK incorrectly handled
certain inputs. If a user or an automated system were tricked into opening
a certain specially crafted input file, a remote attacker could possibly use
this issue to execute arbitrary code. This issue only affected
Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS.
(CVE-2022-2119 and CVE-2022-2120)
Sharon Brizinov and Noam Moshe discovered that DCMTK incorrectly handled
pointers. If a user or an automated system were tricked into opening a
certain specially crafted input file, a remote attacker could possibly use
this issue to cause a denial of service. This issue only affected
Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS.
(CVE-2022-2121)
It was discovered that DCMTK incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a certain specially
crafted input file, a remote attacker could possibly use this issue to
cause a denial of service. This issue affected Ubuntu 16.04 LTS,
Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 22.10.
(CVE-2022-43272)
CVEs:
- https://ubuntu.com/security/CVE-2015-8979
- https://ubuntu.com/security/CVE-2019-1010228
- https://ubuntu.com/security/CVE-2021-41687
- https://ubuntu.com/security/CVE-2021-41688
- https://ubuntu.com/security/CVE-2021-41689
- https://ubuntu.com/security/CVE-2021-41690
- https://ubuntu.com/security/CVE-2022-2119
- https://ubuntu.com/security/CVE-2022-2120
- https://ubuntu.com/security/CVE-2022-2121
- https://ubuntu.com/security/CVE-2022-43272
- https://ubuntu.com/security/CVE-2021-41689
- https://ubuntu.com/security/CVE-2022-43272
- https://ubuntu.com/security/CVE-2021-41687
- https://ubuntu.com/security/CVE-2019-1010228
- https://ubuntu.com/security/CVE-2022-2119
- https://ubuntu.com/security/CVE-2021-41688
- https://ubuntu.com/security/CVE-2015-8979
- https://ubuntu.com/security/CVE-2022-2121
- https://ubuntu.com/security/CVE-2022-2120
- https://ubuntu.com/security/CVE-2021-41690
Title: USN-5904-1: SoX vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5904-1
Priorities: medium,low
Description:
Helmut Grohne discovered that SoX incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to cause a
denial of service. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS,
and Ubuntu 18.04 LTS. (CVE-2019-13590)
Helmut Grohne discovered that SoX incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to cause a
denial of service. (CVE-2021-23159, CVE-2021-23172, CVE-2021-23210,
CVE-2021-33844, CVE-2021-3643, CVE-2021-40426, CVE-2022-31650, and
CVE-2022-31651)
CVEs:
- https://ubuntu.com/security/CVE-2019-13590
- https://ubuntu.com/security/CVE-2021-23159
- https://ubuntu.com/security/CVE-2021-23172
- https://ubuntu.com/security/CVE-2021-23210
- https://ubuntu.com/security/CVE-2021-33844
- https://ubuntu.com/security/CVE-2021-3643
- https://ubuntu.com/security/CVE-2021-40426
- https://ubuntu.com/security/CVE-2022-31650
- https://ubuntu.com/security/CVE-2022-31651
- https://ubuntu.com/security/CVE-2021-3643
- https://ubuntu.com/security/CVE-2021-23172
- https://ubuntu.com/security/CVE-2021-23159
- https://ubuntu.com/security/CVE-2022-31650
- https://ubuntu.com/security/CVE-2019-13590
- https://ubuntu.com/security/CVE-2021-40426
- https://ubuntu.com/security/CVE-2021-33844
- https://ubuntu.com/security/CVE-2021-23210
- https://ubuntu.com/security/CVE-2022-31651
Title: USN-5889-1: ZoneMinder vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5889-1
Priorities: medium,high
Description:
It was discovered that ZoneMinder was not properly sanitizing URL
parameters for certain views. An attacker could possibly use this issue to
perform a cross-site scripting (XSS) attack. This issue was only fixed in
Ubuntu 16.04 ESM. (CVE-2019-6777)
It was discovered that ZoneMinder was not properly sanitizing stored user
input later printed to the user in certain views. An attacker could
possibly use this issue to perform a cross-site scripting (XSS) attack.
This issue was only fixed in Ubuntu 16.04 ESM. (CVE-2019-6990,
CVE-2019-6992)
It was discovered that ZoneMinder was not properly limiting data size and
not properly performing bound checks when processing username and password
data, which could lead to a stack buffer overflow. An attacker could
possibly use this issue to bypass authentication, cause a denial of
service or execute arbitrary code. This issue was only fixed in Ubuntu
16.04 ESM. (CVE-2019-6991)
It was discovered that ZoneMinder was not properly defining and filtering
data that was appended to the webroot URL of a view. An attacker could
possibly use this issue to perform cross-site scripting (XSS) attacks.
This issue was only fixed in Ubuntu 16.04 ESM and Ubuntu 20.04 ESM.
(CVE-2019-7325, CVE-2019-7329)
It was discovered that ZoneMinder was not properly sanitizing stored user
input later printed to the user in certain views. An attacker could
possibly use this issue to perform a cross-site scripting (XSS) attack.
This issue was only fixed in Ubuntu 20.04 ESM. (CVE-2019-7326)
It was discovered that ZoneMinder was not properly sanitizing URL
parameters for certain views. An attacker could possibly use this issue to
perform a cross-site scripting (XSS) attack. This issue was only fixed in
Ubuntu 20.04 ESM. (CVE-2019-7327, CVE-2019-7328, CVE-2019-7330,
CVE-2019-7332)
It was discovered that ZoneMinder was not properly sanitizing user input
in the monitor editing view. An attacker could possibly use this issue to
perform a cross-site scripting (XSS) attack. This issue was only fixed in
Ubuntu 16.04 ESM and Ubuntu 20.04 ESM. (CVE-2019-7331)
It was discovered that ZoneMinder was not properly sanitizing data related
to file paths in a system. An attacker could possibly use this issue to
execute arbitrary code. (CVE-2022-29806)
CVEs:
- https://ubuntu.com/security/CVE-2019-6777
- https://ubuntu.com/security/CVE-2019-6990
- https://ubuntu.com/security/CVE-2019-6992
- https://ubuntu.com/security/CVE-2019-6991
- https://ubuntu.com/security/CVE-2019-7325
- https://ubuntu.com/security/CVE-2019-7329
- https://ubuntu.com/security/CVE-2019-7326
- https://ubuntu.com/security/CVE-2019-7327
- https://ubuntu.com/security/CVE-2019-7328
- https://ubuntu.com/security/CVE-2019-7330
- https://ubuntu.com/security/CVE-2019-7332
- https://ubuntu.com/security/CVE-2019-7331
- https://ubuntu.com/security/CVE-2022-29806
- https://ubuntu.com/security/CVE-2019-7332
- https://ubuntu.com/security/CVE-2019-7326
- https://ubuntu.com/security/CVE-2019-7328
- https://ubuntu.com/security/CVE-2019-7330
- https://ubuntu.com/security/CVE-2019-7329
- https://ubuntu.com/security/CVE-2019-6777
- https://ubuntu.com/security/CVE-2019-7325
- https://ubuntu.com/security/CVE-2019-6991
- https://ubuntu.com/security/CVE-2019-6992
- https://ubuntu.com/security/CVE-2019-7327
- https://ubuntu.com/security/CVE-2019-6990
- https://ubuntu.com/security/CVE-2019-7331
- https://ubuntu.com/security/CVE-2022-29806
Title: USN-5889-1: ZoneMinder vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5889-1
Priorities: medium,high
Description:
It was discovered that ZoneMinder was not properly sanitizing URL
parameters for certain views. An attacker could possibly use this issue to
perform a cross-site scripting (XSS) attack. This issue was only fixed in
Ubuntu 16.04 ESM. (CVE-2019-6777)
It was discovered that ZoneMinder was not properly sanitizing stored user
input later printed to the user in certain views. An attacker could
possibly use this issue to perform a cross-site scripting (XSS) attack.
This issue was only fixed in Ubuntu 16.04 ESM. (CVE-2019-6990,
CVE-2019-6992)
It was discovered that ZoneMinder was not properly limiting data size and
not properly performing bound checks when processing username and password
data, which could lead to a stack buffer overflow. An attacker could
possibly use this issue to bypass authentication, cause a denial of
service or execute arbitrary code. This issue was only fixed in Ubuntu
16.04 ESM. (CVE-2019-6991)
It was discovered that ZoneMinder was not properly defining and filtering
data that was appended to the webroot URL of a view. An attacker could
possibly use this issue to perform cross-site scripting (XSS) attacks.
This issue was only fixed in Ubuntu 16.04 ESM and Ubuntu 20.04 LTS.
(CVE-2019-7325, CVE-2019-7329)
It was discovered that ZoneMinder was not properly sanitizing stored user
input later printed to the user in certain views. An attacker could
possibly use this issue to perform a cross-site scripting (XSS) attack.
This issue was only fixed in Ubuntu 20.04 LTS. (CVE-2019-7326)
It was discovered that ZoneMinder was not properly sanitizing URL
parameters for certain views. An attacker could possibly use this issue to
perform a cross-site scripting (XSS) attack. This issue was only fixed in
Ubuntu 20.04 LTS. (CVE-2019-7327, CVE-2019-7328, CVE-2019-7330,
CVE-2019-7332)
It was discovered that ZoneMinder was not properly sanitizing user input
in the monitor editing view. An attacker could possibly use this issue to
perform a cross-site scripting (XSS) attack. This issue was only fixed in
Ubuntu 16.04 ESM and Ubuntu 20.04 LTS. (CVE-2019-7331)
It was discovered that ZoneMinder was not properly sanitizing data related
to file paths in a system. An attacker could possibly use this issue to
execute arbitrary code. (CVE-2022-29806)
CVEs:
- https://ubuntu.com/security/CVE-2019-6777
- https://ubuntu.com/security/CVE-2019-6990
- https://ubuntu.com/security/CVE-2019-6992
- https://ubuntu.com/security/CVE-2019-6991
- https://ubuntu.com/security/CVE-2019-7325
- https://ubuntu.com/security/CVE-2019-7329
- https://ubuntu.com/security/CVE-2019-7326
- https://ubuntu.com/security/CVE-2019-7327
- https://ubuntu.com/security/CVE-2019-7328
- https://ubuntu.com/security/CVE-2019-7330
- https://ubuntu.com/security/CVE-2019-7332
- https://ubuntu.com/security/CVE-2019-7331
- https://ubuntu.com/security/CVE-2022-29806
- https://ubuntu.com/security/CVE-2019-7332
- https://ubuntu.com/security/CVE-2019-7326
- https://ubuntu.com/security/CVE-2019-7328
- https://ubuntu.com/security/CVE-2019-7330
- https://ubuntu.com/security/CVE-2019-7329
- https://ubuntu.com/security/CVE-2019-6777
- https://ubuntu.com/security/CVE-2019-7325
- https://ubuntu.com/security/CVE-2019-6991
- https://ubuntu.com/security/CVE-2019-6992
- https://ubuntu.com/security/CVE-2019-7327
- https://ubuntu.com/security/CVE-2019-6990
- https://ubuntu.com/security/CVE-2019-7331
- https://ubuntu.com/security/CVE-2022-29806
Title: USN-5873-1: Go Text vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5873-1
Priorities: low,medium
Description:
It was discovered that Go Text incorrectly handled certain encodings. An
attacker could possibly use this issue to cause a denial of service. This
issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-14040)
It was discovered that Go Text incorrectly handled certain BCP 47 language
tags. An attacker could possibly use this issue to cause a denial of service.
CVE-2020-28851, CVE-2020-28852 and CVE-2021-38561 affected only
Ubuntu 18.04 LTS and Ubuntu 20.04 LTS.
(CVE-2020-28851, CVE-2020-28852, CVE-2021-38561, CVE-2022-32149)
CVEs:
- https://ubuntu.com/security/CVE-2020-14040
- https://ubuntu.com/security/CVE-2020-28851
- https://ubuntu.com/security/CVE-2020-28852
- https://ubuntu.com/security/CVE-2021-38561
- https://ubuntu.com/security/CVE-2020-28851
- https://ubuntu.com/security/CVE-2020-28852
- https://ubuntu.com/security/CVE-2021-38561
- https://ubuntu.com/security/CVE-2022-32149
- https://ubuntu.com/security/CVE-2020-14040
- https://ubuntu.com/security/CVE-2020-28852
- https://ubuntu.com/security/CVE-2020-28851
- https://ubuntu.com/security/CVE-2022-32149
- https://ubuntu.com/security/CVE-2021-38561
Title: USN-5847-1: Grunt vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5847-1
Priorities: medium,high
Description:
It was discovered that Grunt was not properly loading YAML files before
parsing them. An attacker could possibly use this issue to execute
arbitrary code. (CVE-2020-7729)
It was discovered that Grunt was not properly handling symbolic links
when performing file copy operations. An attacker could possibly use this
issue to expose sensitive information or execute arbitrary code.
(CVE-2022-0436)
It was discovered that there was a race condition in the Grunt file copy
function, which could lead to an arbitrary file write. An attacker could
possibly use this issue to perform a local privilege escalation attack or
to execute arbitrary code. (CVE-2022-1537)
CVEs:
- https://ubuntu.com/security/CVE-2020-7729
- https://ubuntu.com/security/CVE-2022-0436
- https://ubuntu.com/security/CVE-2022-1537
- https://ubuntu.com/security/CVE-2020-7729
- https://ubuntu.com/security/CVE-2022-0436
- https://ubuntu.com/security/CVE-2022-1537
Title: USN-5886-1: Intel Microcode vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5886-1
Priorities: medium
Description:
Erik C. Bjorge discovered that some Intel(R) Atom and Intel Xeon Scalable
Processors did not properly implement access controls for out-of-band
management. This may allow a privileged network-adjacent user to potentially
escalate privileges. (CVE-2022-21216)
Cfir Cohen, Erdem Aktas, Felix Wilhelm, James Forshaw, Josh Eads, Nagaraju
Kodalapura Nagabhushana Rao, Przemyslaw Duda, Liron Shacham and Ron Anderson
discovered that some Intel(R) Xeon(R) Processors used incorrect default
permissions in some memory controller configurations when using Intel(R)
Software Guard Extensions. This may allow a privileged local user to potentially
escalate privileges. (CVE-2022-33196)
It was discovered that some 3rd Generation Intel(R) Xeon(R) Scalable Processors
did not properly calculate microkey keying. This may allow a privileged local
user to potentially disclose information. (CVE-2022-33972)
Joseph Nuzman discovered that some Intel(R) Processors when using Intel(R)
Software Guard Extensions did not properly isolate shared resources. This may
allow a privileged local user to potentially disclose
information. (CVE-2022-38090)
CVEs:
- https://ubuntu.com/security/CVE-2022-21216
- https://ubuntu.com/security/CVE-2022-33196
- https://ubuntu.com/security/CVE-2022-33972
- https://ubuntu.com/security/CVE-2022-38090
- https://ubuntu.com/security/CVE-2022-33972
- https://ubuntu.com/security/CVE-2022-38090
- https://ubuntu.com/security/CVE-2022-21216
- https://ubuntu.com/security/CVE-2022-33196
Title: USN-5903-1: lighttpd vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5903-1
Priorities: low,medium
Description:
It was discovered that lighttpd incorrectly handled certain inputs, which could
result in a stack buffer overflow. A remote attacker could possibly use this
issue to cause a denial of service (DoS). (CVE-2022-22707, CVE-2022-41556)
CVEs:
- https://ubuntu.com/security/CVE-2022-22707
- https://ubuntu.com/security/CVE-2022-41556
- https://ubuntu.com/security/CVE-2022-41556
- https://ubuntu.com/security/CVE-2022-22707
Title: USN-5885-1: APR vulnerability
URL: https://ubuntu.com/security/notices/USN-5885-1
Priorities: medium
Description:
Ronald Crane discovered integer overflow vulnerabilities in the Apache
Portable Runtime (APR) that could potentially result in memory corruption.
A remote attacker could possibly use these issues to cause a denial of
service or execute arbitary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-24963
Title: USN-5870-1: apr-util vulnerability
URL: https://ubuntu.com/security/notices/USN-5870-1
Priorities: medium
Description:
Ronald Crane discovered that APR-util did not properly handled memory when
encoding or decoding certain input data. An attacker could possibly use
this issue to cause a denial of service, or possibly execute arbitrary
code.
CVEs:
- https://ubuntu.com/security/CVE-2022-25147
Title: USN-5921-1: rsync vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5921-1
Priorities: medium
Description:
Koen van Hove discovered that the rsync client incorrectly validated
filenames returned by servers. If a user or automated system were tricked
into connecting to a malicious server, a remote attacker could use this
issue to write arbitrary files, and possibly excalate privileges.
CVEs:
- https://ubuntu.com/security/CVE-2022-29154
Title: USN-5896-1: Rack vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5896-1
Priorities: medium
Description:
It was discovered that Rack was not properly parsing data when processing
multipart POST requests. If a user or automated system were tricked into
sending a specially crafted multipart POST request to an application using
Rack, a remote attacker could possibly use this issue to cause a denial of
service. (CVE-2022-30122)
It was discovered that Rack was not properly escaping untrusted data when
performing logging operations, which could cause shell escaped sequences
to be written to a terminal. If a user or automated system were tricked
into sending a specially crafted request to an application using Rack, a
remote attacker could possibly use this issue to execute arbitrary code in
the machine running the application. (CVE-2022-30123)
CVEs:
- https://ubuntu.com/security/CVE-2022-30122
- https://ubuntu.com/security/CVE-2022-30123
- https://ubuntu.com/security/CVE-2022-30123
- https://ubuntu.com/security/CVE-2022-30122
Title: USN-5892-1: NSS vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5892-1
Priorities: low,medium
Description:
It was discovered that NSS incorrectly handled client authentication
without a user certificate in the database. A remote attacker could
possibly use this issue to cause a NSS client to crash, resulting in a
denial of service. This issue only affected Ubuntu 22.10. (CVE-2022-3479)
Christian Holler discovered that NSS incorrectly handled certain PKCS 12
certificated bundles. A remote attacker could use this issue to cause NSS
to crash, leading to a denial of service, or possibly execute arbitrary
code. (CVE-2023-0767)
CVEs:
- https://ubuntu.com/security/CVE-2022-3479
- https://ubuntu.com/security/CVE-2023-0767
- https://ubuntu.com/security/CVE-2022-3479
- https://ubuntu.com/security/CVE-2023-0767
Title: USN-5851-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5851-1
Priorities: medium
Description:
It was discovered that a memory leak existed in the Unix domain socket
implementation of the Linux kernel. A local attacker could use this to
cause a denial of service (memory exhaustion). (CVE-2022-3543)
It was discovered that the Bluetooth HCI implementation in the Linux kernel
did not properly deallocate memory in some situations. An attacker could
possibly use this cause a denial of service (memory exhaustion).
(CVE-2022-3619)
It was discovered that the hugetlb implementation in the Linux kernel
contained a race condition in some situations. A local attacker could use
this to cause a denial of service (system crash) or expose sensitive
information (kernel memory). (CVE-2022-3623)
It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux
kernel did not properly perform bounds checking in some situations. A
physically proximate attacker could use this to craft a malicious USB
device that when inserted, could cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2022-3628)
It was discovered that a use-after-free vulnerability existed in the
Bluetooth stack in the Linux kernel. A local attacker could use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3640)
It was discovered that a race condition existed in the SMSC UFX USB driver
implementation in the Linux kernel, leading to a use-after-free
vulnerability. A physically proximate attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-41849)
It was discovered that a race condition existed in the Roccat HID driver in
the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-41850)
Tamás Koczka discovered that the Bluetooth L2CAP implementation in the
Linux kernel did not properly initialize memory in some situations. A
physically proximate attacker could possibly use this to expose sensitive
information (kernel memory). (CVE-2022-42895)
Arnaud Gatignol, Quentin Minster, Florent Saudel and Guillaume Teissier
discovered that the KSMBD implementation in the Linux kernel did not
properly validate user-supplied data in some situations. An authenticated
attacker could use this to cause a denial of service (system crash), expose
sensitive information (kernel memory) or possibly execute arbitrary code.
(CVE-2022-47940)
It was discovered that a race condition existed in the qdisc implementation
in the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-0590)
CVEs:
- https://ubuntu.com/security/CVE-2022-3543
- https://ubuntu.com/security/CVE-2022-3619
- https://ubuntu.com/security/CVE-2022-3623
- https://ubuntu.com/security/CVE-2022-3628
- https://ubuntu.com/security/CVE-2022-3640
- https://ubuntu.com/security/CVE-2022-41849
- https://ubuntu.com/security/CVE-2022-41850
- https://ubuntu.com/security/CVE-2022-42895
- https://ubuntu.com/security/CVE-2022-47940
- https://ubuntu.com/security/CVE-2023-0590
- https://ubuntu.com/security/CVE-2022-3623
- https://ubuntu.com/security/CVE-2022-41850
- https://ubuntu.com/security/CVE-2022-3640
- https://ubuntu.com/security/CVE-2022-3543
- https://ubuntu.com/security/CVE-2022-41849
- https://ubuntu.com/security/CVE-2022-42895
- https://ubuntu.com/security/CVE-2022-3619
- https://ubuntu.com/security/CVE-2023-0590
- https://ubuntu.com/security/CVE-2022-47940
- https://ubuntu.com/security/CVE-2022-3628
Title: USN-5876-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5876-1
Priorities: medium,low
Description:
It was discovered that a memory leak existed in the Unix domain socket
implementation of the Linux kernel. A local attacker could use this to
cause a denial of service (memory exhaustion). (CVE-2022-3543)
It was discovered that the Bluetooth HCI implementation in the Linux kernel
did not properly deallocate memory in some situations. An attacker could
possibly use this cause a denial of service (memory exhaustion).
(CVE-2022-3619)
It was discovered that the hugetlb implementation in the Linux kernel
contained a race condition in some situations. A local attacker could use
this to cause a denial of service (system crash) or expose sensitive
information (kernel memory). (CVE-2022-3623)
It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux
kernel did not properly perform bounds checking in some situations. A
physically proximate attacker could use this to craft a malicious USB
device that when inserted, could cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2022-3628)
It was discovered that a use-after-free vulnerability existed in the
Bluetooth stack in the Linux kernel. A local attacker could use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3640)
It was discovered that a race condition existed in the SMSC UFX USB driver
implementation in the Linux kernel, leading to a use-after-free
vulnerability. A physically proximate attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-41849)
It was discovered that a race condition existed in the Roccat HID driver in
the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-41850)
Tamás Koczka discovered that the Bluetooth L2CAP implementation in the
Linux kernel did not properly initialize memory in some situations. A
physically proximate attacker could possibly use this to expose sensitive
information (kernel memory). (CVE-2022-42895)
Arnaud Gatignol, Quentin Minster, Florent Saudel and Guillaume Teissier
discovered that the KSMBD implementation in the Linux kernel did not
properly validate user-supplied data in some situations. An authenticated
attacker could use this to cause a denial of service (system crash), expose
sensitive information (kernel memory) or possibly execute arbitrary code.
(CVE-2022-47940)
It was discovered that a race condition existed in the qdisc implementation
in the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-0590)
CVEs:
- https://ubuntu.com/security/CVE-2022-3543
- https://ubuntu.com/security/CVE-2022-3619
- https://ubuntu.com/security/CVE-2022-3623
- https://ubuntu.com/security/CVE-2022-3628
- https://ubuntu.com/security/CVE-2022-3640
- https://ubuntu.com/security/CVE-2022-41849
- https://ubuntu.com/security/CVE-2022-41850
- https://ubuntu.com/security/CVE-2022-42895
- https://ubuntu.com/security/CVE-2022-47940
- https://ubuntu.com/security/CVE-2023-0590
- https://ubuntu.com/security/CVE-2022-41850
- https://ubuntu.com/security/CVE-2022-41849
- https://ubuntu.com/security/CVE-2022-3623
- https://ubuntu.com/security/CVE-2022-3619
- https://ubuntu.com/security/CVE-2022-42895
- https://ubuntu.com/security/CVE-2023-0590
- https://ubuntu.com/security/CVE-2022-3628
- https://ubuntu.com/security/CVE-2022-3543
- https://ubuntu.com/security/CVE-2022-3640
- https://ubuntu.com/security/CVE-2022-47940
Title: USN-5895-1: MPlayer vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5895-1
Priorities: medium
Description:
It was discovered that MPlayer could be made to divide by zero when
processing certain malformed media files. If a user were tricked into
opening a specially crafted media file, an attacker could possibly use
this issue to cause MPlayer to crash, resulting in a denial of service.
(CVE-2022-38850, CVE-2022-38860, CVE-2022-38865)
It was discovered that MPlayer could be made to read out of bounds when
processing certain malformed media files. If a user were tricked into
opening a specially crafted media file, an attacker could possibly use
this issue to cause MPlayer to crash, resulting in a denial of service.
(CVE-2022-38851)
It was discovered that MPlayer could be made to write out of bounds when
processing certain malformed media files. If a user were tricked into
opening a specially crafted media file, an attacker could possibly use
this issue to cause MPlayer to crash, resulting in a denial of service, or
possibly execute arbitrary code. (CVE-2022-38855, CVE-2022-38858,
CVE-2022-38863, CVE-2022-38864, CVE-2022-38866)
It was discovered that MPlayer did not properly managed memory when
processing certain malformed media files. If a user were tricked into
opening a specially crafted media file, an attacker could possibly use
this issue to cause MPlayer to crash, resulting in a denial of service, or
possibly execute arbitrary code. (CVE-2022-38861)
CVEs:
- https://ubuntu.com/security/CVE-2022-38850
- https://ubuntu.com/security/CVE-2022-38860
- https://ubuntu.com/security/CVE-2022-38865
- https://ubuntu.com/security/CVE-2022-38851
- https://ubuntu.com/security/CVE-2022-38855
- https://ubuntu.com/security/CVE-2022-38858
- https://ubuntu.com/security/CVE-2022-38863
- https://ubuntu.com/security/CVE-2022-38864
- https://ubuntu.com/security/CVE-2022-38866
- https://ubuntu.com/security/CVE-2022-38861
- https://ubuntu.com/security/CVE-2022-38851
- https://ubuntu.com/security/CVE-2022-38860
- https://ubuntu.com/security/CVE-2022-38855
- https://ubuntu.com/security/CVE-2022-38861
- https://ubuntu.com/security/CVE-2022-38865
- https://ubuntu.com/security/CVE-2022-38863
- https://ubuntu.com/security/CVE-2022-38864
- https://ubuntu.com/security/CVE-2022-38858
- https://ubuntu.com/security/CVE-2022-38866
- https://ubuntu.com/security/CVE-2022-38850
Title: USN-5821-3: pip regression
URL: https://ubuntu.com/security/notices/USN-5821-3
Priorities: medium
Description:
USN-5821-1 fixed a vulnerability in wheel and pip. Unfortunately,
it was missing a commit to fix it properly in pip.
We apologize for the inconvenience.
Original advisory details:
Sebastian Chnelik discovered that wheel incorrectly handled
certain file names when validated against a regex expression.
An attacker could possibly use this issue to cause a
denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2022-40898
Title: USN-5890-1: Open vSwitch vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5890-1
Priorities: medium
Description:
Qian Chen discovered that Open vSwitch incorrectly handled certain
Organization Specific TLVs. A remote attacker could use this issue to cause
Open vSwitch to crash, resulting in a denial of service, or possibly
execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-4338
- https://ubuntu.com/security/CVE-2022-4337
Title: USN-5860-1: Linux kernel (GKE) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5860-1
Priorities: high,medium
Description:
Kyle Zeng discovered that the sysctl implementation in the Linux kernel
contained a stack-based buffer overflow. A local attacker could use this to
cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-4378)
Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation
in the Linux kernel contained multiple use-after-free vulnerabilities. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-42896)
It was discovered that a memory leak existed in the Unix domain socket
implementation of the Linux kernel. A local attacker could use this to
cause a denial of service (memory exhaustion). (CVE-2022-3543)
It was discovered that the Bluetooth HCI implementation in the Linux kernel
did not properly deallocate memory in some situations. An attacker could
possibly use this cause a denial of service (memory exhaustion).
(CVE-2022-3619)
It was discovered that the hugetlb implementation in the Linux kernel
contained a race condition in some situations. A local attacker could use
this to cause a denial of service (system crash) or expose sensitive
information (kernel memory). (CVE-2022-3623)
It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux
kernel did not properly perform bounds checking in some situations. A
physically proximate attacker could use this to craft a malicious USB
device that when inserted, could cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2022-3628)
It was discovered that a use-after-free vulnerability existed in the
Bluetooth stack in the Linux kernel. A local attacker could use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3640)
It was discovered that the Xen netback driver in the Linux kernel did not
properly handle packets structured in certain ways. An attacker in a guest
VM could possibly use this to cause a denial of service (host NIC
availability). (CVE-2022-3643)
It was discovered that a race condition existed in the SMSC UFX USB driver
implementation in the Linux kernel, leading to a use-after-free
vulnerability. A physically proximate attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-41849)
It was discovered that a race condition existed in the Roccat HID driver in
the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-41850)
Tamás Koczka discovered that the Bluetooth L2CAP implementation in the
Linux kernel did not properly initialize memory in some situations. A
physically proximate attacker could possibly use this to expose sensitive
information (kernel memory). (CVE-2022-42895)
It was discovered that an integer overflow vulnerability existed in the
Bluetooth subsystem in the Linux kernel. A physically proximate attacker
could use this to cause a denial of service (system crash).
(CVE-2022-45934)
Arnaud Gatignol, Quentin Minster, Florent Saudel and Guillaume Teissier
discovered that the KSMBD implementation in the Linux kernel did not
properly validate user-supplied data in some situations. An authenticated
attacker could use this to cause a denial of service (system crash), expose
sensitive information (kernel memory) or possibly execute arbitrary code.
(CVE-2022-47940)
It was discovered that a race condition existed in the qdisc implementation
in the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-0590)
CVEs:
- https://ubuntu.com/security/CVE-2022-4378
- https://ubuntu.com/security/CVE-2022-42896
- https://ubuntu.com/security/CVE-2022-3543
- https://ubuntu.com/security/CVE-2022-3619
- https://ubuntu.com/security/CVE-2022-3623
- https://ubuntu.com/security/CVE-2022-3628
- https://ubuntu.com/security/CVE-2022-3640
- https://ubuntu.com/security/CVE-2022-3643
- https://ubuntu.com/security/CVE-2022-41849
- https://ubuntu.com/security/CVE-2022-41850
- https://ubuntu.com/security/CVE-2022-42895
- https://ubuntu.com/security/CVE-2022-45934
- https://ubuntu.com/security/CVE-2022-47940
- https://ubuntu.com/security/CVE-2023-0590
- https://ubuntu.com/security/CVE-2022-3623
- https://ubuntu.com/security/CVE-2022-41850
- https://ubuntu.com/security/CVE-2022-3643
- https://ubuntu.com/security/CVE-2022-3640
- https://ubuntu.com/security/CVE-2022-3543
- https://ubuntu.com/security/CVE-2022-41849
- https://ubuntu.com/security/CVE-2022-42895
- https://ubuntu.com/security/CVE-2022-45934
- https://ubuntu.com/security/CVE-2022-3619
- https://ubuntu.com/security/CVE-2022-42896
- https://ubuntu.com/security/CVE-2023-0590
- https://ubuntu.com/security/CVE-2022-47940
- https://ubuntu.com/security/CVE-2022-3628
- https://ubuntu.com/security/CVE-2022-4378
Title: USN-5879-1: Linux kernel (HWE) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5879-1
Priorities: high,medium
Description:
Kyle Zeng discovered that the sysctl implementation in the Linux kernel
contained a stack-based buffer overflow. A local attacker could use this to
cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-4378)
Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation
in the Linux kernel contained multiple use-after-free vulnerabilities. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-42896)
It was discovered that the Bluetooth HCI implementation in the Linux kernel
did not properly deallocate memory in some situations. An attacker could
possibly use this cause a denial of service (memory exhaustion).
(CVE-2022-3619)
It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux
kernel did not properly perform bounds checking in some situations. A
physically proximate attacker could use this to craft a malicious USB
device that when inserted, could cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2022-3628)
It was discovered that a use-after-free vulnerability existed in the
Bluetooth stack in the Linux kernel. A local attacker could use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3640)
It was discovered that the Xen netback driver in the Linux kernel did not
properly handle packets structured in certain ways. An attacker in a guest
VM could possibly use this to cause a denial of service (host NIC
availability). (CVE-2022-3643)
Tamás Koczka discovered that the Bluetooth L2CAP implementation in the
Linux kernel did not properly initialize memory in some situations. A
physically proximate attacker could possibly use this to expose sensitive
information (kernel memory). (CVE-2022-42895)
It was discovered that an integer overflow vulnerability existed in the
Bluetooth subsystem in the Linux kernel. A physically proximate attacker
could use this to cause a denial of service (system crash).
(CVE-2022-45934)
It was discovered that a race condition existed in the qdisc implementation
in the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-0590)
CVEs:
- https://ubuntu.com/security/CVE-2022-4378
- https://ubuntu.com/security/CVE-2022-42896
- https://ubuntu.com/security/CVE-2022-3619
- https://ubuntu.com/security/CVE-2022-3628
- https://ubuntu.com/security/CVE-2022-3640
- https://ubuntu.com/security/CVE-2022-3643
- https://ubuntu.com/security/CVE-2022-42895
- https://ubuntu.com/security/CVE-2022-45934
- https://ubuntu.com/security/CVE-2023-0590
- https://ubuntu.com/security/CVE-2022-4378
- https://ubuntu.com/security/CVE-2022-3619
- https://ubuntu.com/security/CVE-2022-42895
- https://ubuntu.com/security/CVE-2023-0590
- https://ubuntu.com/security/CVE-2022-3628
- https://ubuntu.com/security/CVE-2022-42896
- https://ubuntu.com/security/CVE-2022-3643
- https://ubuntu.com/security/CVE-2022-45934
- https://ubuntu.com/security/CVE-2022-3640
Title: USN-5899-1: AWStats vulnerability
URL: https://ubuntu.com/security/notices/USN-5899-1
Priorities: low
Description:
It was discovered that AWStats did not properly sanitize the content of
whois responses in the hostinfo plugin. An attacker could possibly use
this issue to conduct cross-site scripting (XSS) attacks.
CVEs:
- https://ubuntu.com/security/CVE-2022-46391
Title: USN-5857-1: Linux kernel (OEM) vulnerability
URL: https://ubuntu.com/security/notices/USN-5857-1
Priorities: high
Description:
Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel
did not properly handle VLAN headers in some situations. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2023-0179
Title: USN-5856-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5856-1
Priorities: high,medium
Description:
Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel
did not properly handle VLAN headers in some situations. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-0179)
Hu Jiahui discovered that multiple race conditions existed in the Advanced
Linux Sound Architecture (ALSA) framework, leading to use-after-free
vulnerabilities. A local attacker could use these to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2022-1048)
It was discovered that a use-after-free vulnerability existed in the SGI
GRU driver in the Linux kernel. A local attacker could possibly use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3424)
CVEs:
- https://ubuntu.com/security/CVE-2023-0179
- https://ubuntu.com/security/CVE-2022-1048
- https://ubuntu.com/security/CVE-2022-3424
- https://ubuntu.com/security/CVE-2022-3424
- https://ubuntu.com/security/CVE-2023-0179
- https://ubuntu.com/security/CVE-2022-1048
Title: USN-5858-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5858-1
Priorities: high,medium
Description:
Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel
did not properly handle VLAN headers in some situations. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-0179)
It was discovered that the Netronome Ethernet driver in the Linux kernel
contained a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3545)
Tamás Koczka discovered that the Bluetooth L2CAP implementation in the
Linux kernel did not properly initialize memory in some situations. A
physically proximate attacker could possibly use this to expose sensitive
information (kernel memory). (CVE-2022-42895)
It was discovered that an integer overflow vulnerability existed in the
Bluetooth subsystem in the Linux kernel. A physically proximate attacker
could use this to cause a denial of service (system crash).
(CVE-2022-45934)
CVEs:
- https://ubuntu.com/security/CVE-2023-0179
- https://ubuntu.com/security/CVE-2022-3545
- https://ubuntu.com/security/CVE-2022-42895
- https://ubuntu.com/security/CVE-2022-45934
- https://ubuntu.com/security/CVE-2022-42895
- https://ubuntu.com/security/CVE-2022-3545
- https://ubuntu.com/security/CVE-2022-45934
- https://ubuntu.com/security/CVE-2023-0179
Title: USN-5844-1: OpenSSL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5844-1
Priorities: high,medium
Description:
David Benjamin discovered that OpenSSL incorrectly handled X.400 address
processing. A remote attacker could possibly use this issue to read
arbitrary memory contents or cause OpenSSL to crash, resulting in a denial
of service. (CVE-2023-0286)
Corey Bonnell discovered that OpenSSL incorrectly handled X.509 certificate
verification. A remote attacker could possibly use this issue to cause
OpenSSL to crash, resulting in a denial of service. This issue only
affected Ubuntu 22.04 LTS and Ubuntu 22.10. (CVE-2022-4203)
Hubert Kario discovered that OpenSSL had a timing based side channel in the
OpenSSL RSA Decryption implementation. A remote attacker could possibly use
this issue to recover sensitive information. (CVE-2022-4304)
Dawei Wang discovered that OpenSSL incorrectly handled parsing certain PEM
data. A remote attacker could possibly use this issue to cause OpenSSL to
crash, resulting in a denial of service. (CVE-2022-4450)
Octavio Galland and Marcel Böhme discovered that OpenSSL incorrectly
handled streaming ASN.1 data. A remote attacker could use this issue to
cause OpenSSL to crash, resulting in a denial of service, or possibly
execute arbitrary code. (CVE-2023-0215)
Marc Schönefeld discovered that OpenSSL incorrectly handled malformed PKCS7
data. A remote attacker could possibly use this issue to cause OpenSSL to
crash, resulting in a denial of service. This issue only affected Ubuntu
22.04 LTS and Ubuntu 22.10. (CVE-2023-0216)
Kurt Roeckx discovered that OpenSSL incorrectly handled validating certain
DSA public keys. A remote attacker could possibly use this issue to cause
OpenSSL to crash, resulting in a denial of service. This issue only
affected Ubuntu 22.04 LTS and Ubuntu 22.10. (CVE-2023-0217)
Hubert Kario and Dmitry Belyavsky discovered that OpenSSL incorrectly
validated certain signatures. A remote attacker could possibly use this
issue to cause OpenSSL to crash, resulting in a denial of service. This
issue only affected Ubuntu 22.04 LTS and Ubuntu 22.10. (CVE-2023-0401)
CVEs:
- https://ubuntu.com/security/CVE-2023-0286
- https://ubuntu.com/security/CVE-2022-4203
- https://ubuntu.com/security/CVE-2022-4304
- https://ubuntu.com/security/CVE-2022-4450
- https://ubuntu.com/security/CVE-2023-0215
- https://ubuntu.com/security/CVE-2023-0216
- https://ubuntu.com/security/CVE-2023-0217
- https://ubuntu.com/security/CVE-2023-0401
- https://ubuntu.com/security/CVE-2023-0217
- https://ubuntu.com/security/CVE-2022-4304
- https://ubuntu.com/security/CVE-2023-0215
- https://ubuntu.com/security/CVE-2022-4450
- https://ubuntu.com/security/CVE-2023-0286
- https://ubuntu.com/security/CVE-2023-0401
- https://ubuntu.com/security/CVE-2022-4203
- https://ubuntu.com/security/CVE-2023-0216
Title: USN-5912-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5912-1
Priorities: high,medium,low
Description:
It was discovered that the Upper Level Protocol (ULP) subsystem in the
Linux kernel did not properly handle sockets entering the LISTEN state in
certain protocols, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-0461)
Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel
did not properly handle VLAN headers in some situations. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-0179)
It was discovered that the NVMe driver in the Linux kernel did not properly
handle reset events in some situations. A local attacker could use this to
cause a denial of service (system crash). (CVE-2022-3169)
Maxim Levitsky discovered that the KVM nested virtualization (SVM)
implementation for AMD processors in the Linux kernel did not properly
handle nested shutdown execution. An attacker in a guest vm could use this
to cause a denial of service (host kernel crash) (CVE-2022-3344)
Gwangun Jung discovered a race condition in the IPv4 implementation in the
Linux kernel when deleting multipath routes, resulting in an out-of-bounds
read. An attacker could use this to cause a denial of service (system
crash) or possibly expose sensitive information (kernel memory).
(CVE-2022-3435)
It was discovered that a race condition existed in the Kernel Connection
Multiplexor (KCM) socket implementation in the Linux kernel when releasing
sockets in certain situations. A local attacker could use this to cause a
denial of service (system crash). (CVE-2022-3521)
It was discovered that the Netronome Ethernet driver in the Linux kernel
contained a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3545)
It was discovered that the Intel i915 graphics driver in the Linux kernel
did not perform a GPU TLB flush in some situations. A local attacker could
use this to cause a denial of service or possibly execute arbitrary code.
(CVE-2022-4139)
It was discovered that a race condition existed in the Xen network backend
driver in the Linux kernel when handling dropped packets in certain
circumstances. An attacker could use this to cause a denial of service
(kernel deadlock). (CVE-2022-42328, CVE-2022-42329)
It was discovered that the NFSD implementation in the Linux kernel
contained a use-after-free vulnerability. A remote attacker could possibly
use this to cause a denial of service (system crash) or execute arbitrary
code. (CVE-2022-4379)
It was discovered that a race condition existed in the x86 KVM subsystem
implementation in the Linux kernel when nested virtualization and the TDP
MMU are enabled. An attacker in a guest vm could use this to cause a denial
of service (host OS crash). (CVE-2022-45869)
It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate the number of channels, leading to an out-of-bounds
write vulnerability. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2022-47518)
It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate specific attributes, leading to an out-of-bounds
write vulnerability. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2022-47519)
It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate offsets, leading to an out-of-bounds read
vulnerability. An attacker could use this to cause a denial of service
(system crash). (CVE-2022-47520)
It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate specific attributes, leading to a heap-based buffer
overflow. An attacker could use this to cause a denial of service (system
crash) or possibly execute arbitrary code. (CVE-2022-47521)
Lin Ma discovered a race condition in the io_uring subsystem in the Linux
kernel, leading to a null pointer dereference vulnerability. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2023-0468)
CVEs:
- https://ubuntu.com/security/CVE-2023-0461
- https://ubuntu.com/security/CVE-2023-0179
- https://ubuntu.com/security/CVE-2022-3169
- https://ubuntu.com/security/CVE-2022-3344
- https://ubuntu.com/security/CVE-2022-3435
- https://ubuntu.com/security/CVE-2022-3521
- https://ubuntu.com/security/CVE-2022-3545
- https://ubuntu.com/security/CVE-2022-4139
- https://ubuntu.com/security/CVE-2022-42328
- https://ubuntu.com/security/CVE-2022-42329
- https://ubuntu.com/security/CVE-2022-4379
- https://ubuntu.com/security/CVE-2022-45869
- https://ubuntu.com/security/CVE-2022-47518
- https://ubuntu.com/security/CVE-2022-47519
- https://ubuntu.com/security/CVE-2022-47520
- https://ubuntu.com/security/CVE-2022-47521
- https://ubuntu.com/security/CVE-2023-0468
- https://ubuntu.com/security/CVE-2022-42329
- https://ubuntu.com/security/CVE-2022-47518
- https://ubuntu.com/security/CVE-2022-3545
- https://ubuntu.com/security/CVE-2022-4139
- https://ubuntu.com/security/CVE-2022-47519
- https://ubuntu.com/security/CVE-2023-0461
- https://ubuntu.com/security/CVE-2022-3344
- https://ubuntu.com/security/CVE-2022-4379
- https://ubuntu.com/security/CVE-2022-45869
- https://ubuntu.com/security/CVE-2022-47520
- https://ubuntu.com/security/CVE-2022-42328
- https://ubuntu.com/security/CVE-2023-0179
- https://ubuntu.com/security/CVE-2022-47521
- https://ubuntu.com/security/CVE-2023-0468
- https://ubuntu.com/security/CVE-2022-3521
- https://ubuntu.com/security/CVE-2022-3435
- https://ubuntu.com/security/CVE-2022-3169
Title: USN-5911-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5911-1
Priorities: high,medium,low
Description:
It was discovered that the Upper Level Protocol (ULP) subsystem in the
Linux kernel did not properly handle sockets entering the LISTEN state in
certain protocols, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-0461)
Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel
did not properly handle VLAN headers in some situations. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-0179)
It was discovered that the NVMe driver in the Linux kernel did not properly
handle reset events in some situations. A local attacker could use this to
cause a denial of service (system crash). (CVE-2022-3169)
Maxim Levitsky discovered that the KVM nested virtualization (SVM)
implementation for AMD processors in the Linux kernel did not properly
handle nested shutdown execution. An attacker in a guest vm could use this
to cause a denial of service (host kernel crash) (CVE-2022-3344)
Gwangun Jung discovered a race condition in the IPv4 implementation in the
Linux kernel when deleting multipath routes, resulting in an out-of-bounds
read. An attacker could use this to cause a denial of service (system
crash) or possibly expose sensitive information (kernel memory).
(CVE-2022-3435)
It was discovered that a race condition existed in the Kernel Connection
Multiplexor (KCM) socket implementation in the Linux kernel when releasing
sockets in certain situations. A local attacker could use this to cause a
denial of service (system crash). (CVE-2022-3521)
It was discovered that the Netronome Ethernet driver in the Linux kernel
contained a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3545)
It was discovered that the Intel i915 graphics driver in the Linux kernel
did not perform a GPU TLB flush in some situations. A local attacker could
use this to cause a denial of service or possibly execute arbitrary code.
(CVE-2022-4139)
It was discovered that the NFSD implementation in the Linux kernel
contained a use-after-free vulnerability. A remote attacker could possibly
use this to cause a denial of service (system crash) or execute arbitrary
code. (CVE-2022-4379)
It was discovered that a race condition existed in the x86 KVM subsystem
implementation in the Linux kernel when nested virtualization and the TDP
MMU are enabled. An attacker in a guest vm could use this to cause a denial
of service (host OS crash). (CVE-2022-45869)
It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate the number of channels, leading to an out-of-bounds
write vulnerability. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2022-47518)
It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate specific attributes, leading to an out-of-bounds
write vulnerability. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2022-47519)
It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate offsets, leading to an out-of-bounds read
vulnerability. An attacker could use this to cause a denial of service
(system crash). (CVE-2022-47520)
It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate specific attributes, leading to a heap-based buffer
overflow. An attacker could use this to cause a denial of service (system
crash) or possibly execute arbitrary code. (CVE-2022-47521)
CVEs:
- https://ubuntu.com/security/CVE-2023-0461
- https://ubuntu.com/security/CVE-2023-0179
- https://ubuntu.com/security/CVE-2022-3169
- https://ubuntu.com/security/CVE-2022-3344
- https://ubuntu.com/security/CVE-2022-3435
- https://ubuntu.com/security/CVE-2022-3521
- https://ubuntu.com/security/CVE-2022-3545
- https://ubuntu.com/security/CVE-2022-4139
- https://ubuntu.com/security/CVE-2022-4379
- https://ubuntu.com/security/CVE-2022-45869
- https://ubuntu.com/security/CVE-2022-47518
- https://ubuntu.com/security/CVE-2022-47519
- https://ubuntu.com/security/CVE-2022-47520
- https://ubuntu.com/security/CVE-2022-47521
- https://ubuntu.com/security/CVE-2022-3169
- https://ubuntu.com/security/CVE-2022-3521
- https://ubuntu.com/security/CVE-2022-3344
- https://ubuntu.com/security/CVE-2022-3545
- https://ubuntu.com/security/CVE-2022-3435
- https://ubuntu.com/security/CVE-2022-45869
- https://ubuntu.com/security/CVE-2022-47518
- https://ubuntu.com/security/CVE-2023-0461
- https://ubuntu.com/security/CVE-2022-47519
- https://ubuntu.com/security/CVE-2022-4139
- https://ubuntu.com/security/CVE-2022-4379
- https://ubuntu.com/security/CVE-2022-47521
- https://ubuntu.com/security/CVE-2022-47520
- https://ubuntu.com/security/CVE-2023-0179
Title: USN-5887-1: ClamAV vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5887-1
Priorities: medium
Description:
Simon Scannell discovered that ClamAV incorrectly handled parsing
HFS+ files. A remote attacker could possibly use this issue
to cause ClamAV to crash, resulting in a denial of service,
or execute arbitrary code. (CVE-2023-20032)
Simon Scannell discovered that ClamAV incorrectly handled parsing
DMG files. A remote attacker could possibly use this issue
to expose sensitive information. (CVE-2023-20052)
CVEs:
- https://ubuntu.com/security/CVE-2023-20032
- https://ubuntu.com/security/CVE-2023-20052
- https://ubuntu.com/security/CVE-2023-20032
- https://ubuntu.com/security/CVE-2023-20052
Title: USN-5898-1: OpenJDK vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5898-1
Priorities: medium,low
Description:
It was discovered that the Serialization component of OpenJDK did not
properly handle the deserialization of some CORBA objects. An attacker
could possibly use this to bypass Java sandbox restrictions.
(CVE-2023-21830)
Markus Loewe discovered that the Java Sound subsystem in OpenJDK did not
properly validate the origin of a Soundbank. An attacker could use this to
specially craft an untrusted Java application or applet that could load a
Soundbank from an attacker controlled remote URL. (CVE-2023-21843)
CVEs:
- https://ubuntu.com/security/CVE-2023-21830
- https://ubuntu.com/security/CVE-2023-21843
- https://ubuntu.com/security/CVE-2023-21830
- https://ubuntu.com/security/CVE-2023-21843
Title: USN-5897-1: OpenJDK vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5897-1
Priorities: medium,low
Description:
Juraj Somorovsky, Marcel Maehren, Nurullah Erinola, and Robert Merget
discovered that the DTLS implementation in the JSSE subsystem of OpenJDK
did not properly restrict handshake initiation requests from clients. A
remote attacker could possibly use this to cause a denial of service.
(CVE-2023-21835)
Markus Loewe discovered that the Java Sound subsystem in OpenJDK did not
properly validate the origin of a Soundbank. An attacker could use this to
specially craft an untrusted Java application or applet that could load a
Soundbank from an attacker controlled remote URL. (CVE-2023-21843)
CVEs:
- https://ubuntu.com/security/CVE-2023-21835
- https://ubuntu.com/security/CVE-2023-21843
- https://ubuntu.com/security/CVE-2023-21843
- https://ubuntu.com/security/CVE-2023-21835
Title: USN-5871-1: Git vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5871-1
Priorities: medium
Description:
It was discovered that Git incorrectly handled certain repositories.
An attacker could use this issue to make Git uses its local
clone optimization even when using a non-local transport.
(CVE-2023-22490)
Joern Schneeweisz discovered that Git incorrectly handled certain commands.
An attacker could possibly use this issue to overwrite a patch outside
the working tree. (CVE-2023-23946)
CVEs:
- https://ubuntu.com/security/CVE-2023-22490
- https://ubuntu.com/security/CVE-2023-23946
- https://ubuntu.com/security/CVE-2023-23946
- https://ubuntu.com/security/CVE-2023-22490
Title: USN-5867-1: WebKitGTK vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5867-1
Priorities: medium
Description:
Several security issues were discovered in the WebKitGTK Web and JavaScript
engines. If a user were tricked into viewing a malicious website, a remote
attacker could exploit a variety of issues related to web browser security,
including cross-site scripting attacks, denial of service attacks, and
arbitrary code execution.
CVEs:
- https://ubuntu.com/security/CVE-2023-23517
- https://ubuntu.com/security/CVE-2022-42826
- https://ubuntu.com/security/CVE-2023-23518
Title: USN-5893-1: WebKitGTK vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5893-1
Priorities: high
Description:
Several security issues were discovered in the WebKitGTK Web and JavaScript
engines. If a user were tricked into viewing a malicious website, a remote
attacker could exploit a variety of issues related to web browser security,
including cross-site scripting attacks, denial of service attacks, and
arbitrary code execution.
CVEs:
- https://ubuntu.com/security/CVE-2023-23529
Title: USN-5891-1: curl vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5891-1
Priorities: low,medium
Description:
Harry Sintonen discovered that curl incorrectly handled HSTS support
when multiple URLs are requested serially. A remote attacker could possibly
use this issue to cause curl to use unencrypted connections. This issue
only affected Ubuntu 22.04 LTS, and Ubuntu 22.10. (CVE-2023-23914)
Harry Sintonen discovered that curl incorrectly handled HSTS support
when multiple URLs are requested in parallel. A remote attacker could
possibly use this issue to cause curl to use unencrypted connections. This
issue only affected Ubuntu 22.04 LTS, and Ubuntu 22.10. (CVE-2023-23915)
Patrick Monnerat discovered that curl incorrectly handled memory when
processing requests with multi-header compression. A remote attacker could
possibly use this issue to cause curl to consume resources, leading to a
denial of service. (CVE-2023-23916)
CVEs:
- https://ubuntu.com/security/CVE-2023-23914
- https://ubuntu.com/security/CVE-2023-23915
- https://ubuntu.com/security/CVE-2023-23916
- https://ubuntu.com/security/CVE-2023-23915
- https://ubuntu.com/security/CVE-2023-23914
- https://ubuntu.com/security/CVE-2023-23916
Title: USN-5868-1: Django vulnerability
URL: https://ubuntu.com/security/notices/USN-5868-1
Priorities: medium
Description:
Jakob Ackermann discovered that Django incorrectly handled certain file
uploads. A remote attacker could possibly use this issue to cause Django to
consume resources, leading to a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-24580
Title: USN-5869-1: HAProxy vulnerability
URL: https://ubuntu.com/security/notices/USN-5869-1
Priorities: medium
Description:
Bahruz Jabiyev, Anthony Gavazzi, Engin Kirda, Kaan Onarlioglu, Adi Peleg,
and Harvey Tuch discovered that HAProxy incorrectly handled empty header
names. A remote attacker could possibly use this issue to manipulate
headers and bypass certain authentication checks and restrictions.
CVEs:
- https://ubuntu.com/security/CVE-2023-25725
Title: USN-5908-1: Sudo vulnerability
URL: https://ubuntu.com/security/notices/USN-5908-1
Priorities: medium
Description:
It was discovered that Sudo incorrectly handled the per-command chroot
feature. In certain environments where Sudo is configured with a rule that
contains a CHROOT setting, a local attacker could use this issue to cause
Sudo to crash, resulting in a denial of service, or possibly escalate
privileges.
CVEs:
- https://ubuntu.com/security/CVE-2023-27320
Available in VMware Tanzu Network
Release Date: February 09, 2023
BOSH Agent Version: 2.504.0
Title: USN-5828-1: Kerberos vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5828-1
Priorities: medium
Description:
It was discovered that Kerberos incorrectly handled certain S4U2Self
requests. An attacker could possibly use this issue to cause a denial of
service. This issue was only addressed in Ubuntu 16.04 ESM and Ubuntu
18.04 LTS. (CVE-2018-20217)
Greg Hudson discovered that Kerberos PAC implementation incorrectly
handled certain parsing operations. A remote attacker could use this
issue to cause a denial of service, or possibly execute arbitrary code.
(CVE-2022-42898)
CVEs:
- https://ubuntu.com/security/CVE-2018-20217
- https://ubuntu.com/security/CVE-2022-42898
- https://ubuntu.com/security/CVE-2022-42898
- https://ubuntu.com/security/CVE-2018-20217
Title: USN-5822-1: Samba vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5822-1
Priorities: low,medium,unknown
Description:
It was discovered that Samba incorrectly handled the bad password count
logic. A remote attacker could possibly use this issue to bypass bad
passwords lockouts. This issue was only addressed in Ubuntu 22.10.
(CVE-2021-20251)
Evgeny Legerov discovered that Samba incorrectly handled buffers in
certain GSSAPI routines of Heimdal. A remote attacker could possibly use
this issue to cause Samba to crash, resulting in a denial of service.
(CVE-2022-3437)
Tom Tervoort discovered that Samba incorrectly used weak rc4-hmac Kerberos
keys. A remote attacker could possibly use this issue to elevate
privileges. (CVE-2022-37966, CVE-2022-37967)
It was discovered that Samba supported weak RC4/HMAC-MD5 in NetLogon Secure
Channel. A remote attacker could possibly use this issue to elevate
privileges. (CVE-2022-38023)
Greg Hudson discovered that Samba incorrectly handled PAC parsing. On
32-bit systems, a remote attacker could use this issue to escalate
privileges, or possibly execute arbitrary code. (CVE-2022-42898)
Joseph Sutton discovered that Samba could be forced to issue rc4-hmac
encrypted Kerberos tickets. A remote attacker could possibly use this issue
to escalate privileges. This issue only affected Ubuntu 20.04 LTS and
Ubuntu 22.04 LTS. (CVE-2022-45141)
WARNING: The fixes included in these updates introduce several important
behavior changes which may cause compatibility problems interacting with
systems still expecting the former behavior. Please see the following
upstream advisories for more information:
https://www.samba.org/samba/security/CVE-2022-37966.html
https://www.samba.org/samba/security/CVE-2022-37967.html
https://www.samba.org/samba/security/CVE-2022-38023.html
CVEs:
- https://ubuntu.com/security/CVE-2021-20251
- https://ubuntu.com/security/CVE-2022-3437
- https://ubuntu.com/security/CVE-2022-37966
- https://ubuntu.com/security/CVE-2022-37967
- https://ubuntu.com/security/CVE-2022-38023
- https://ubuntu.com/security/CVE-2022-42898
- https://ubuntu.com/security/CVE-2022-45141
- https://www.samba.org/samba/security/CVE-2022-37966
- https://www.samba.org/samba/security/CVE-2022-37967
- https://www.samba.org/samba/security/CVE-2022-38023
- https://ubuntu.com/security/CVE-2022-37966
- https://ubuntu.com/security/CVE-2022-37967
- https://ubuntu.com/security/CVE-2022-38023
- https://ubuntu.com/security/CVE-2021-20251
- https://ubuntu.com/security/CVE-2022-42898
- https://ubuntu.com/security/CVE-2022-3437
- https://ubuntu.com/security/CVE-2022-45141
Title: USN-5806-2: Ruby vulnerability
URL: https://ubuntu.com/security/notices/USN-5806-2
Priorities: medium
Description:
USN-5806-1 fixed vulnerabilities in Ruby. This update fixes the problem
for Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.10.
Original advisory details:
Hiroshi Tokumaru discovered that Ruby did not properly handle certain
user input for applications which generate HTTP responses using cgi gem.
An attacker could possibly use this issue to maliciously modify the
response a user would receive from a vulnerable application.
CVEs:
- https://ubuntu.com/security/CVE-2021-33621
Title: USN-5827-1: Bind vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5827-1
Priorities: medium
Description:
Rob Schulhof discovered that Bind incorrectly handled a large number of
UPDATE messages. A remote attacker could possibly use this issue to cause
Bind to consume resources, resulting in a denial of service.
(CVE-2022-3094)
Borja Marcos discovered that Bind incorrectly handled certain RRSIG
queries. A remote attacker could possibly use this issue to cause Bind to
crash, resulting in a denial of service. This issue only affected Ubuntu
22.04 LTS and Ubuntu 22.10. (CVE-2022-3736)
Maksym Odinintsev discovered that Bind incorrectly handled certain answers
from stale cache. A remote attacker could possibly use this issue to cause
Bind to crash, resulting in a denial of service. This issue only affected
Ubuntu 22.04 LTS and Ubuntu 22.10. (CVE-2022-3924)
CVEs:
- https://ubuntu.com/security/CVE-2022-3094
- https://ubuntu.com/security/CVE-2022-3736
- https://ubuntu.com/security/CVE-2022-3924
- https://ubuntu.com/security/CVE-2022-3094
- https://ubuntu.com/security/CVE-2022-3924
- https://ubuntu.com/security/CVE-2022-3736
Title: USN-5818-1: PHP vulnerability
URL: https://ubuntu.com/security/notices/USN-5818-1
Priorities: medium
Description:
It was discovered that PHP incorrectly handled certain inputs.
An attacker could possibly use this issue to cause a crash or
execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-31631
Title: USN-5817-1: Setuptools vulnerability
URL: https://ubuntu.com/security/notices/USN-5817-1
Priorities: medium
Description:
Sebastian Chnelik discovered that setuptools incorrectly handled
certain regex inputs. An attacker could possibly use this issue
to cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2022-40897
Title: USN-5821-1: wheel vulnerability
URL: https://ubuntu.com/security/notices/USN-5821-1
Priorities: medium
Description:
Sebastian Chnelik discovered that wheel incorrectly handled
certain file names when validated against a regex expression.
An attacker could possibly use this issue to cause a
denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2022-40898
Title: USN-5833-1: python-future vulnerability
URL: https://ubuntu.com/security/notices/USN-5833-1
Priorities: medium
Description:
Sebastian Chnelik discovered that python-future incorrectly handled
certain HTTP header field. An attacker could possibly use this issue
to cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2022-40899
Title: USN-5831-1: Linux kernel (Azure CVM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5831-1
Priorities: high,medium
Description:
Kyle Zeng discovered that the sysctl implementation in the Linux kernel
contained a stack-based buffer overflow. A local attacker could use this to
cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-4378)
Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation
in the Linux kernel contained multiple use-after-free vulnerabilities. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-42896)
It was discovered that the Xen netback driver in the Linux kernel did not
properly handle packets structured in certain ways. An attacker in a guest
VM could possibly use this to cause a denial of service (host NIC
availability). (CVE-2022-3643)
It was discovered that an integer overflow vulnerability existed in the
Bluetooth subsystem in the Linux kernel. A physically proximate attacker
could use this to cause a denial of service (system crash).
(CVE-2022-45934)
CVEs:
- https://ubuntu.com/security/CVE-2022-4378
- https://ubuntu.com/security/CVE-2022-42896
- https://ubuntu.com/security/CVE-2022-3643
- https://ubuntu.com/security/CVE-2022-45934
- https://ubuntu.com/security/CVE-2022-4378
- https://ubuntu.com/security/CVE-2022-42896
- https://ubuntu.com/security/CVE-2022-3643
- https://ubuntu.com/security/CVE-2022-45934
Title: USN-5814-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5814-1
Priorities: high,medium
Description:
Kyle Zeng discovered that the sysctl implementation in the Linux kernel
contained a stack-based buffer overflow. A local attacker could use this to
cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-4378)
Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation
in the Linux kernel contained multiple use-after-free vulnerabilities. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-42896)
It was discovered that the Xen netback driver in the Linux kernel did not
properly handle packets structured in certain ways. An attacker in a guest
VM could possibly use this to cause a denial of service (host NIC
availability). (CVE-2022-3643)
It was discovered that an integer overflow vulnerability existed in the
Bluetooth subsystem in the Linux kernel. A physically proximate attacker
could use this to cause a denial of service (system crash).
(CVE-2022-45934)
CVEs:
- https://ubuntu.com/security/CVE-2022-4378
- https://ubuntu.com/security/CVE-2022-42896
- https://ubuntu.com/security/CVE-2022-3643
- https://ubuntu.com/security/CVE-2022-45934
- https://ubuntu.com/security/CVE-2022-4378
- https://ubuntu.com/security/CVE-2022-45934
- https://ubuntu.com/security/CVE-2022-42896
- https://ubuntu.com/security/CVE-2022-3643
Title: USN-5820-1: exuberant-ctags vulnerability
URL: https://ubuntu.com/security/notices/USN-5820-1
Priorities: medium
Description:
Lorenz Hipp discovered a flaw in exuberant-ctags handling of the tag
filename command-line argument. A crafted tag filename specified
in the command line or in the configuration file could result in
arbitrary command execution.
CVEs:
- https://ubuntu.com/security/CVE-2022-4515
Title: USN-5824-1: Thunderbird vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5824-1
Priorities: medium,unknown
Description:
Multiple security issues were discovered in Thunderbird. If a user were
tricked into opening a specially crafted website in a browsing context, an
attacker could potentially exploit these to cause a denial of service,
obtain sensitive information, bypass security restrictions, cross-site
tracing, or execute arbitrary code. (CVE-2022-45403, CVE-2022-45404,
CVE-2022-45405, CVE-2022-45406, CVE-2022-45408, CVE-2022-45409,
CVE-2022-45410, CVE-2022-45411, CVE-2022-45418, CVE-2022-45420,
CVE-2022-45421, CVE-2022-46878, CVE-2022-46880, CVE-2022-46881,
CVE-2022-46882, CVE-2023-23605)
Armin Ebert discovered that Thunderbird did not properly manage memory
while resolving file symlink. If a user were tricked into opening a
specially crafted weblink, an attacker could potentially exploit these to
cause a denial of service. (CVE-2022-45412)
Sarah Jamie Lewis discovered that Thunderbird did not properly manage
network request while handling HTML emails with certain tags. If a user
were tricked into opening a specially HTML email, an attacker could
potentially exploit these issue and load remote content regardless of a
configuration to block remote content. (CVE-2022-45414)
Erik Kraft, Martin Schwarzl, and Andrew McCreight discovered that
Thunderbird incorrectly handled keyboard events. An attacker could possibly
use this issue to perform a timing side-channel attack and possibly figure
out which keys are being pressed. (CVE-2022-45416)
It was discovered that Thunderbird was using an out-of-date libusrsctp
library. An attacker could possibly use this library to perform a
reentrancy issue on Thunderbird. (CVE-2022-46871)
Nika Layzell discovered that Thunderbird was not performing a check on
paste received from cross-processes. An attacker could potentially
exploit this to obtain sensitive information. (CVE-2022-46872)
Matthias Zoellner discovered that Thunderbird was not keeping the filename
ending intact when using the drag-and-drop event. An attacker could
possibly use this issue to add a file with a malicious extension, leading
to execute arbitrary code. (CVE-2022-46874)
Hafiizh discovered that Thunderbird was not properly handling fullscreen
notifications when the window goes into fullscreen mode. An attacker could
possibly use this issue to spoof the user and obtain sensitive information.
(CVE-2022-46877)
Tom Schuster discovered that Thunderbird was not performing a validation
check on GTK drag data. An attacker could potentially exploits this to
obtain sensitive information. (CVE-2023-23598)
Vadim discovered that Thunderbird was not properly sanitizing a curl
command output when copying a network request from the developer tools
panel. An attacker could potentially exploits this to hide and execute
arbitrary commands. (CVE-2023-23599)
Luan Herrera discovered that Thunderbird was not stopping navigation when
dragging a URL from a cross-origin iframe into the same tab. An attacker
potentially exploits this to spoof the user. (CVE-2023-23601)
Dave Vandyke discovered that Thunderbird did not properly implement CSP
policy when creating a WebSocket in a WebWorker. An attacker who was able
to inject markup into a page otherwise protected by a Content Security
Policy may have been able to inject an executable script. (CVE-2023-23602)
Dan Veditz discovered that Thunderbird did not properly implement CSP
policy on regular expression when using console.log. An attacker
potentially exploits this to exfiltrate data. (CVE-2023-23603)
It was discovered that Thunderbird did not properly check the Certificate
OCSP revocation status when verifying S/Mime signatures. An attacker could
possibly use this issue to bypass signature validation check by sending
email signed with a revoked certificate. (CVE-2023-0430)
CVEs:
- https://ubuntu.com/security/CVE-2022-45403
- https://ubuntu.com/security/CVE-2022-45404
- https://ubuntu.com/security/CVE-2022-45405
- https://ubuntu.com/security/CVE-2022-45406
- https://ubuntu.com/security/CVE-2022-45408
- https://ubuntu.com/security/CVE-2022-45409
- https://ubuntu.com/security/CVE-2022-45410
- https://ubuntu.com/security/CVE-2022-45411
- https://ubuntu.com/security/CVE-2022-45418
- https://ubuntu.com/security/CVE-2022-45420
- https://ubuntu.com/security/CVE-2022-45421
- https://ubuntu.com/security/CVE-2022-46878
- https://ubuntu.com/security/CVE-2022-46880
- https://ubuntu.com/security/CVE-2022-46881
- https://ubuntu.com/security/CVE-2022-46882
- https://ubuntu.com/security/CVE-2023-23605
- https://ubuntu.com/security/CVE-2022-45412
- https://ubuntu.com/security/CVE-2022-45414
- https://ubuntu.com/security/CVE-2022-45416
- https://ubuntu.com/security/CVE-2022-46871
- https://ubuntu.com/security/CVE-2022-46872
- https://ubuntu.com/security/CVE-2022-46874
- https://ubuntu.com/security/CVE-2022-46877
- https://ubuntu.com/security/CVE-2023-23598
- https://ubuntu.com/security/CVE-2023-23599
- https://ubuntu.com/security/CVE-2023-23601
- https://ubuntu.com/security/CVE-2023-23602
- https://ubuntu.com/security/CVE-2023-23603
- https://ubuntu.com/security/CVE-2023-0430
- https://ubuntu.com/security/CVE-2022-45409
- https://ubuntu.com/security/CVE-2022-45408
- https://ubuntu.com/security/CVE-2022-46874
- https://ubuntu.com/security/CVE-2023-23601
- https://ubuntu.com/security/CVE-2023-23602
- https://ubuntu.com/security/CVE-2022-45411
- https://ubuntu.com/security/CVE-2022-46871
- https://ubuntu.com/security/CVE-2022-45414
- https://ubuntu.com/security/CVE-2022-45420
- https://ubuntu.com/security/CVE-2022-46872
- https://ubuntu.com/security/CVE-2022-45405
- https://ubuntu.com/security/CVE-2023-0430
- https://ubuntu.com/security/CVE-2022-45404
- https://ubuntu.com/security/CVE-2022-46880
- https://ubuntu.com/security/CVE-2022-45410
- https://ubuntu.com/security/CVE-2022-46881
- https://ubuntu.com/security/CVE-2023-23603
- https://ubuntu.com/security/CVE-2022-45403
- https://ubuntu.com/security/CVE-2022-45406
- https://ubuntu.com/security/CVE-2023-23605
- https://ubuntu.com/security/CVE-2022-46882
- https://ubuntu.com/security/CVE-2022-45412
- https://ubuntu.com/security/CVE-2022-46877
- https://ubuntu.com/security/CVE-2022-46878
- https://ubuntu.com/security/CVE-2022-45418
- https://ubuntu.com/security/CVE-2023-23598
- https://ubuntu.com/security/CVE-2022-45416
- https://ubuntu.com/security/CVE-2022-45421
- https://ubuntu.com/security/CVE-2023-23599
Title: USN-5835-1: Cinder vulnerability
URL: https://ubuntu.com/security/notices/USN-5835-1
Priorities: medium
Description:
Guillaume Espanel, Pierre Libeau, Arnaud Morin, and Damien Rannou
discovered that Cinder incorrectly handled VMDK image processing. An
authenticated attacker could possibly supply a specially crafted VMDK flat
image and obtain arbitrary files from the server containing sensitive
information.
CVEs:
- https://ubuntu.com/security/CVE-2022-47951
Title: USN-5835-2: OpenStack Glance vulnerability
URL: https://ubuntu.com/security/notices/USN-5835-2
Priorities: medium
Description:
Guillaume Espanel, Pierre Libeau, Arnaud Morin, and Damien Rannou
discovered that OpenStack Glance incorrectly handled VMDK image processing.
An authenticated attacker could possibly supply a specially crafted VMDK
flat image and obtain arbitrary files from the server containing sensitive
information.
CVEs:
- https://ubuntu.com/security/CVE-2022-47951
Title: USN-5819-1: HAProxy vulnerability
URL: https://ubuntu.com/security/notices/USN-5819-1
Priorities: medium
Description:
It was discovered that HAProxy incorrectly handled certain messages. A
remote attacker could possibly use this issue to cause HAProxy to stop
responding, resulting in a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-0056
Title: USN-5844-1: OpenSSL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5844-1
Priorities: high,medium
Description:
David Benjamin discovered that OpenSSL incorrectly handled X.400 address
processing. A remote attacker could possibly use this issue to read
arbitrary memory contents or cause OpenSSL to crash, resulting in a denial
of service. (CVE-2023-0286)
Corey Bonnell discovered that OpenSSL incorrectly handled X.509 certificate
verification. A remote attacker could possibly use this issue to cause
OpenSSL to crash, resulting in a denial of service. This issue only
affected Ubuntu 22.04 LTS and Ubuntu 22.10. (CVE-2022-4203)
Hubert Kario discovered that OpenSSL had a timing based side channel in the
OpenSSL RSA Decryption implementation. A remote attacker could possibly use
this issue to recover sensitive information. (CVE-2022-4304)
Dawei Wang discovered that OpenSSL incorrectly handled parsing certain PEM
data. A remote attacker could possibly use this issue to cause OpenSSL to
crash, resulting in a denial of service. (CVE-2022-4450)
Octavio Galland and Marcel Böhme discovered that OpenSSL incorrectly
handled streaming ASN.1 data. A remote attacker could use this issue to
cause OpenSSL to crash, resulting in a denial of service, or possibly
execute arbitrary code. (CVE-2023-0215)
Marc Schönefeld discovered that OpenSSL incorrectly handled malformed PKCS7
data. A remote attacker could possibly use this issue to cause OpenSSL to
crash, resulting in a denial of service. This issue only affected Ubuntu
22.04 LTS and Ubuntu 22.10. (CVE-2023-0216)
Kurt Roeckx discovered that OpenSSL incorrectly handled validating certain
DSA public keys. A remote attacker could possibly use this issue to cause
OpenSSL to crash, resulting in a denial of service. This issue only
affected Ubuntu 22.04 LTS and Ubuntu 22.10. (CVE-2023-0217)
Hubert Kario and Dmitry Belyavsky discovered that OpenSSL incorrectly
validated certain signatures. A remote attacker could possibly use this
issue to cause OpenSSL to crash, resulting in a denial of service. This
issue only affected Ubuntu 22.04 LTS and Ubuntu 22.10. (CVE-2023-0401)
CVEs:
- https://ubuntu.com/security/CVE-2023-0286
- https://ubuntu.com/security/CVE-2022-4203
- https://ubuntu.com/security/CVE-2022-4304
- https://ubuntu.com/security/CVE-2022-4450
- https://ubuntu.com/security/CVE-2023-0215
- https://ubuntu.com/security/CVE-2023-0216
- https://ubuntu.com/security/CVE-2023-0217
- https://ubuntu.com/security/CVE-2023-0401
- https://ubuntu.com/security/CVE-2023-0217
- https://ubuntu.com/security/CVE-2022-4304
- https://ubuntu.com/security/CVE-2023-0215
- https://ubuntu.com/security/CVE-2022-4450
- https://ubuntu.com/security/CVE-2023-0286
- https://ubuntu.com/security/CVE-2023-0401
- https://ubuntu.com/security/CVE-2022-4203
- https://ubuntu.com/security/CVE-2023-0216
Title: USN-5823-1: MySQL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5823-1
Priorities: medium
Description:
Multiple security issues were discovered in MySQL and this update includes
new upstream MySQL versions to fix these issues.
MySQL has been updated to 8.0.32 in Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and
Ubuntu 22.10. Ubuntu 18.04 LTS has been updated to MySQL 5.7.41.
In addition to security fixes, the updated packages contain bug fixes, new
features, and possibly incompatible changes.
Please see the following for more information:
https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-41.html
https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-32.html
https://www.oracle.com/security-alerts/cpujan2023.html
CVEs:
- https://ubuntu.com/security/CVE-2023-21869
- https://ubuntu.com/security/CVE-2023-21878
- https://ubuntu.com/security/CVE-2023-21880
- https://ubuntu.com/security/CVE-2023-21836
- https://ubuntu.com/security/CVE-2023-21840
- https://ubuntu.com/security/CVE-2022-32221
- https://ubuntu.com/security/CVE-2023-21873
- https://ubuntu.com/security/CVE-2023-21883
- https://ubuntu.com/security/CVE-2023-21877
- https://ubuntu.com/security/CVE-2023-21871
- https://ubuntu.com/security/CVE-2023-21882
- https://ubuntu.com/security/CVE-2023-21870
- https://ubuntu.com/security/CVE-2023-21876
- https://ubuntu.com/security/CVE-2023-21867
- https://ubuntu.com/security/CVE-2023-21881
- https://ubuntu.com/security/CVE-2023-21863
- https://ubuntu.com/security/CVE-2023-21887
- https://ubuntu.com/security/CVE-2023-21879
- https://ubuntu.com/security/CVE-2023-21868
- https://ubuntu.com/security/CVE-2023-21875
Available in VMware Tanzu Network
Release Date: January 20, 2023
BOSH Agent Version: 2.499.0
Title: USN-5785-1: FreeRADIUS vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5785-1
Priorities: low,medium
Description:
It was discovered that FreeRADIUS incorrectly handled multiple EAP-pwd
handshakes. An attacker could possibly use this issue to cause a denial of
service. This issue only affected Ubuntu 18.04 LTS. (CVE-2019-17185)
Shane Guan discovered that FreeRADIUS incorrectly handled memory when
checking unknown SIM option sent by EAP-SIM supplicant. An attacker could
possibly use this issue to cause a denial of service on the server. This
issue only affected Ubuntu 16.04 ESM, Ubuntu 18.04 LTS and Ubuntu 20.04
LTS. (CVE-2022-41860)
It was discovered that FreeRADIUS incorrectly handled memory when
processing certain abinary attributes. An attacker could possibly use this
issue to cause a denial of service on the server. (CVE-2022-41861)
CVEs:
- https://ubuntu.com/security/CVE-2019-17185
- https://ubuntu.com/security/CVE-2022-41860
- https://ubuntu.com/security/CVE-2022-41861
- https://ubuntu.com/security/CVE-2019-17185
- https://ubuntu.com/security/CVE-2022-41860
- https://ubuntu.com/security/CVE-2022-41861
Title: USN-5792-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5792-1
Priorities: medium,low
Description:
Mingwei Zhang discovered that the KVM implementation for AMD processors in
the Linux kernel did not properly handle cache coherency with Secure
Encrypted Virtualization (SEV). A local attacker could possibly use this to
cause a denial of service (host system crash). (CVE-2022-0171)
It was discovered that a race condition existed in the Android Binder IPC
subsystem in the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2022-20421)
David Leadbeater discovered that the netfilter IRC protocol tracking
implementation in the Linux Kernel incorrectly handled certain message
payloads in some situations. A remote attacker could possibly use this to
cause a denial of service or bypass firewall filtering. (CVE-2022-2663)
It was discovered that the Intel 740 frame buffer driver in the Linux
kernel contained a divide by zero vulnerability. A local attacker could use
this to cause a denial of service (system crash). (CVE-2022-3061)
It was discovered that the sound subsystem in the Linux kernel contained a
race condition in some situations. A local attacker could use this to cause
a denial of service (system crash). (CVE-2022-3303)
Gwnaun Jung discovered that the SFB packet scheduling implementation in the
Linux kernel contained a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2022-3586)
It was discovered that the NILFS2 file system implementation in the Linux
kernel did not properly deallocate memory in certain error conditions. An
attacker could use this to cause a denial of service (memory exhaustion).
(CVE-2022-3646)
Khalid Masum discovered that the NILFS2 file system implementation in the
Linux kernel did not properly handle certain error conditions, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service or possibly execute arbitrary code. (CVE-2022-3649)
Jann Horn discovered a race condition existed in the Linux kernel when
unmapping VMAs in certain situations, resulting in possible use-after-free
vulnerabilities. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2022-39188)
Hyunwoo Kim discovered that an integer overflow vulnerability existed in
the PXA3xx graphics driver in the Linux kernel. A local attacker could
possibly use this to cause a denial of service (system crash).
(CVE-2022-39842)
It was discovered that a race condition existed in the EFI capsule loader
driver in the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2022-40307)
Zheng Wang and Zhuorao Yang discovered that the RealTek RTL8712U wireless
driver in the Linux kernel contained a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2022-4095)
It was discovered that the USB monitoring (usbmon) component in the Linux
kernel did not properly set permissions on memory mapped in to user space
processes. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-43750)
CVEs:
- https://ubuntu.com/security/CVE-2022-0171
- https://ubuntu.com/security/CVE-2022-20421
- https://ubuntu.com/security/CVE-2022-2663
- https://ubuntu.com/security/CVE-2022-3061
- https://ubuntu.com/security/CVE-2022-3303
- https://ubuntu.com/security/CVE-2022-3586
- https://ubuntu.com/security/CVE-2022-3646
- https://ubuntu.com/security/CVE-2022-3649
- https://ubuntu.com/security/CVE-2022-39188
- https://ubuntu.com/security/CVE-2022-39842
- https://ubuntu.com/security/CVE-2022-40307
- https://ubuntu.com/security/CVE-2022-4095
- https://ubuntu.com/security/CVE-2022-43750
- https://ubuntu.com/security/CVE-2022-3646
- https://ubuntu.com/security/CVE-2022-20421
- https://ubuntu.com/security/CVE-2022-39188
- https://ubuntu.com/security/CVE-2022-3061
- https://ubuntu.com/security/CVE-2022-0171
- https://ubuntu.com/security/CVE-2022-40307
- https://ubuntu.com/security/CVE-2022-39842
- https://ubuntu.com/security/CVE-2022-3586
- https://ubuntu.com/security/CVE-2022-43750
- https://ubuntu.com/security/CVE-2022-2663
- https://ubuntu.com/security/CVE-2022-4095
- https://ubuntu.com/security/CVE-2022-3649
- https://ubuntu.com/security/CVE-2022-3303
Title: USN-5801-1: Vim vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5801-1
Priorities: medium
Description:
It was discovered that Vim makes illegal memory calls when pasting
brackets in Ex mode. An attacker could possibly use this to crash Vim,
access or modify memory, or execute arbitrary commands. This issue
affected only Ubuntu 20.04 and 22.04 (CVE-2022-0392)
It was discovered that Vim makes illegal memory calls when making
certain retab calls. An attacker could possibly use this to crash Vim,
access or modify memory, or execute arbitrary commands. (CVE-2022-0417)
CVEs:
- https://ubuntu.com/security/CVE-2022-0392
- https://ubuntu.com/security/CVE-2022-0417
- https://ubuntu.com/security/CVE-2022-0392
- https://ubuntu.com/security/CVE-2022-0417
Title: USN-5810-1: Git vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5810-1
Priorities: medium
Description:
Markus Vervier and Eric Sesterhenn discovered that Git incorrectly handled certain
gitattributes. An attacker could possibly use this issue to cause a crash
or execute arbitrary code. (CVE-2022-23521)
Joern Schneeweisz discovered that Git incorrectly handled certain commands.
An attacker could possibly use this issue to cause a crash or execute
arbitrary code. (CVE-2022-41903)
CVEs:
- https://ubuntu.com/security/CVE-2022-23521
- https://ubuntu.com/security/CVE-2022-41903
- https://ubuntu.com/security/CVE-2022-41903
- https://ubuntu.com/security/CVE-2022-23521
Title: USN-5780-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5780-1
Priorities: medium,high
Description:
It was discovered that a memory leak existed in the IPv6 implementation of
the Linux kernel. A local attacker could use this to cause a denial of
service (memory exhaustion). (CVE-2022-3524)
It was discovered that the Bluetooth HCI implementation in the Linux kernel
did not properly deallocate memory in some situations. An attacker could
possibly use this cause a denial of service (memory exhaustion).
(CVE-2022-3619)
It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux
kernel did not properly perform bounds checking in some situations. A
physically proximate attacker could use this to craft a malicious USB
device that when inserted, could cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2022-3628)
Tamás Koczka discovered that the Bluetooth L2CAP implementation in the
Linux kernel did not properly initialize memory in some situations. A
physically proximate attacker could possibly use this to expose sensitive
information (kernel memory). (CVE-2022-42895)
Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation
in the Linux kernel contained multiple use-after-free vulnerabilities. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-42896)
CVEs:
- https://ubuntu.com/security/CVE-2022-3524
- https://ubuntu.com/security/CVE-2022-3619
- https://ubuntu.com/security/CVE-2022-3628
- https://ubuntu.com/security/CVE-2022-42895
- https://ubuntu.com/security/CVE-2022-42896
- https://ubuntu.com/security/CVE-2022-3524
- https://ubuntu.com/security/CVE-2022-3628
- https://ubuntu.com/security/CVE-2022-42895
- https://ubuntu.com/security/CVE-2022-3619
- https://ubuntu.com/security/CVE-2022-42896
Title: USN-5786-1: GNOME Files vulnerability
URL: https://ubuntu.com/security/notices/USN-5786-1
Priorities: medium
Description:
It was discovered that GNOME Files incorrectly handled certain filenames.
An attacker could possibly use this issue to cause GNOME Files to crash,
leading to a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2022-37290
Title: USN-5796-1: w3m vulnerability
URL: https://ubuntu.com/security/notices/USN-5796-1
Priorities: medium
Description:
It was discovered that w3m incorrectly handled certain HTML files. A remote
attacker could use this issue to cause w3m to crash, resulting in a denial
of service, or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-38223
Title: USN-5788-1: curl vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5788-1
Priorities: medium
Description:
Hiroki Kurosawa discovered that curl incorrectly handled HSTS support
when certain hostnames included IDN characters. A remote attacker could
possibly use this issue to cause curl to use unencrypted connections. This
issue only affected Ubuntu 22.04 LTS, and Ubuntu 22.10. (CVE-2022-43551)
It was discovered that curl incorrectly handled denials when using HTTP
proxies. A remote attacker could use this issue to cause curl to crash,
resulting in a denial of service, or possibly execute arbitrary code.
(CVE-2022-43552)
CVEs:
- https://ubuntu.com/security/CVE-2022-43551
- https://ubuntu.com/security/CVE-2022-43552
- https://ubuntu.com/security/CVE-2022-43551
- https://ubuntu.com/security/CVE-2022-43552
Title: USN-5799-1: Linux kernel (OEM) vulnerability
URL: https://ubuntu.com/security/notices/USN-5799-1
Priorities: high
Description:
Kyle Zeng discovered that the sysctl implementation in the Linux kernel
contained a stack-based buffer overflow. A local attacker could use this to
cause a denial of service (system crash) or execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-4378
Title: USN-5803-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5803-1
Priorities: high,medium
Description:
Kyle Zeng discovered that the sysctl implementation in the Linux kernel
contained a stack-based buffer overflow. A local attacker could use this to
cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-4378)
Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation
in the Linux kernel contained multiple use-after-free vulnerabilities. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-42896)
It was discovered that the Xen netback driver in the Linux kernel did not
properly handle packets structured in certain ways. An attacker in a guest
VM could possibly use this to cause a denial of service (host NIC
availability). (CVE-2022-3643)
It was discovered that an integer overflow vulnerability existed in the
Bluetooth subsystem in the Linux kernel. A physically proximate attacker
could use this to cause a denial of service (system crash).
(CVE-2022-45934)
CVEs:
- https://ubuntu.com/security/CVE-2022-4378
- https://ubuntu.com/security/CVE-2022-42896
- https://ubuntu.com/security/CVE-2022-3643
- https://ubuntu.com/security/CVE-2022-45934
- https://ubuntu.com/security/CVE-2022-3643
- https://ubuntu.com/security/CVE-2022-42896
- https://ubuntu.com/security/CVE-2022-4378
- https://ubuntu.com/security/CVE-2022-45934
Title: USN-5814-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5814-1
Priorities: high,medium
Description:
Kyle Zeng discovered that the sysctl implementation in the Linux kernel
contained a stack-based buffer overflow. A local attacker could use this to
cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-4378)
Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation
in the Linux kernel contained multiple use-after-free vulnerabilities. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-42896)
It was discovered that the Xen netback driver in the Linux kernel did not
properly handle packets structured in certain ways. An attacker in a guest
VM could possibly use this to cause a denial of service (host NIC
availability). (CVE-2022-3643)
It was discovered that an integer overflow vulnerability existed in the
Bluetooth subsystem in the Linux kernel. A physically proximate attacker
could use this to cause a denial of service (system crash).
(CVE-2022-45934)
CVEs:
- https://ubuntu.com/security/CVE-2022-4378
- https://ubuntu.com/security/CVE-2022-42896
- https://ubuntu.com/security/CVE-2022-3643
- https://ubuntu.com/security/CVE-2022-45934
- https://ubuntu.com/security/CVE-2022-4378
- https://ubuntu.com/security/CVE-2022-45934
- https://ubuntu.com/security/CVE-2022-42896
- https://ubuntu.com/security/CVE-2022-3643
Title: USN-5807-1: libXpm vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5807-1
Priorities: medium
Description:
Martin Ettl discovered that libXpm incorrectly handled certain XPM files.
If a user or automated system were tricked into opening a specially crafted
XPM file, a remote attacker could possibly use this issue to cause libXpm
to stop responding, resulting in a denial of service. (CVE-2022-44617)
Marco Ivaldi discovered that libXpm incorrectly handled certain XPM files.
If a user or automated system were tricked into opening a specially crafted
XPM file, a remote attacker could possibly use this issue to cause libXpm
to stop responding, resulting in a denial of service. (CVE-2022-46285)
Alan Coopersmith discovered that libXpm incorrectly handled calling
external helper binaries. If libXpm was being used by a setuid binary, a
local attacker could possibly use this issue to escalate privileges.
(CVE-2022-4883)
CVEs:
- https://ubuntu.com/security/CVE-2022-44617
- https://ubuntu.com/security/CVE-2022-46285
- https://ubuntu.com/security/CVE-2022-4883
- https://ubuntu.com/security/CVE-2022-46285
- https://ubuntu.com/security/CVE-2022-44617
- https://ubuntu.com/security/CVE-2022-4883
Title: USN-5795-1: Net-SNMP vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5795-1
Priorities: medium
Description:
It was discovered that Net-SNMP incorrectly handled certain requests. A
remote attacker could possibly use these issues to cause Net-SNMP to crash,
resulting in a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2022-44792
- https://ubuntu.com/security/CVE-2022-44793
Title: USN-5787-1: Libksba vulnerability
URL: https://ubuntu.com/security/notices/USN-5787-1
Priorities: medium
Description:
It was discovered that Libksba incorrectly handled parsing CRL signatures.
A remote attacker could use this issue to cause Libksba to crash, resulting
in a denial of service, or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-47629
Title: USN-5798-1: .NET 6 vulnerability
URL: https://ubuntu.com/security/notices/USN-5798-1
Priorities: medium
Description:
Johan Gorter discovered that .NET 6 incorrectly processed certain
invalid HTTP requests. An attacker could possibly use this issue to
cause a denial of service condition for an exposed endpoint.
CVEs:
- https://ubuntu.com/security/CVE-2023-21538
Title: USN-5811-1: Sudo vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5811-1
Priorities: medium
Description:
Matthieu Barjole and Victor Cutillas discovered that Sudo incorrectly
handled user-specified editors when using the sudoedit command. A local
attacker that has permission to use the sudoedit command could possibly use
this issue to edit arbitrary files. (CVE-2023-22809)
It was discovered that the Protobuf-c library, used by Sudo, incorrectly
handled certain arithmetic shifts. An attacker could possibly use this
issue to cause Sudo to crash, resulting in a denial of service. This issue
only affected Ubuntu 22.04 LTS. (CVE-2022-33070)
CVEs:
- https://ubuntu.com/security/CVE-2023-22809
- https://ubuntu.com/security/CVE-2022-33070
- https://ubuntu.com/security/CVE-2023-22809
- https://ubuntu.com/security/CVE-2022-33070
Available in VMware Tanzu Network
Release Date: December 20, 2022
BOSH Agent Version: 2.489.0
- The new BOSH Agent reliably identifies the root filesystem disk, reducing the chance of Agent timeouts on deploy.
Title: USN-5780-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5780-1
Priorities: medium,high
Description:
It was discovered that a memory leak existed in the IPv6 implementation of
the Linux kernel. A local attacker could use this to cause a denial of
service (memory exhaustion). (CVE-2022-3524)
It was discovered that the Bluetooth HCI implementation in the Linux kernel
did not properly deallocate memory in some situations. An attacker could
possibly use this cause a denial of service (memory exhaustion).
(CVE-2022-3619)
It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux
kernel did not properly perform bounds checking in some situations. A
physically proximate attacker could use this to craft a malicious USB
device that when inserted, could cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2022-3628)
Tamás Koczka discovered that the Bluetooth L2CAP implementation in the
Linux kernel did not properly initialize memory in some situations. A
physically proximate attacker could possibly use this to expose sensitive
information (kernel memory). (CVE-2022-42895)
Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation
in the Linux kernel contained multiple use-after-free vulnerabilities. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-42896)
CVEs:
- https://ubuntu.com/security/CVE-2022-3524
- https://ubuntu.com/security/CVE-2022-3619
- https://ubuntu.com/security/CVE-2022-3628
- https://ubuntu.com/security/CVE-2022-42895
- https://ubuntu.com/security/CVE-2022-42896
- https://ubuntu.com/security/CVE-2022-3524
- https://ubuntu.com/security/CVE-2022-3628
- https://ubuntu.com/security/CVE-2022-42895
- https://ubuntu.com/security/CVE-2022-3619
- https://ubuntu.com/security/CVE-2022-42896
Title: USN-5783-1: Linux kernel (OEM) vulnerability
URL: https://ubuntu.com/security/notices/USN-5783-1
Priorities: high
Description:
Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation
in the Linux kernel contained multiple use-after-free vulnerabilities. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-42896
Title: USN-5779-1: Linux kernel (Azure) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5779-1
Priorities: high,medium,low
Description:
It was discovered that the NFSD implementation in the Linux kernel did not
properly handle some RPC messages, leading to a buffer overflow. A remote
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-43945)
Jann Horn discovered that the Linux kernel did not properly track memory
allocations for anonymous VMA mappings in some situations, leading to
potential data structure reuse. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-42703)
It was discovered that a memory leak existed in the IPv6 implementation of
the Linux kernel. A local attacker could use this to cause a denial of
service (memory exhaustion). (CVE-2022-3524)
It was discovered that a race condition existed in the Bluetooth subsystem
in the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-3564)
It was discovered that the ISDN implementation of the Linux kernel
contained a use-after-free vulnerability. A privileged user could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3565)
It was discovered that the TCP implementation in the Linux kernel contained
a data race condition. An attacker could possibly use this to cause
undesired behaviors. (CVE-2022-3566)
It was discovered that the IPv6 implementation in the Linux kernel
contained a data race condition. An attacker could possibly use this to
cause undesired behaviors. (CVE-2022-3567)
It was discovered that the Realtek RTL8152 USB Ethernet adapter driver in
the Linux kernel did not properly handle certain error conditions. A local
attacker with physical access could plug in a specially crafted USB device
to cause a denial of service (memory exhaustion). (CVE-2022-3594)
It was discovered that a null pointer dereference existed in the NILFS2
file system implementation in the Linux kernel. A local attacker could use
this to cause a denial of service (system crash). (CVE-2022-3621)
CVEs:
- https://ubuntu.com/security/CVE-2022-43945
- https://ubuntu.com/security/CVE-2022-42703
- https://ubuntu.com/security/CVE-2022-3524
- https://ubuntu.com/security/CVE-2022-3564
- https://ubuntu.com/security/CVE-2022-3565
- https://ubuntu.com/security/CVE-2022-3566
- https://ubuntu.com/security/CVE-2022-3567
- https://ubuntu.com/security/CVE-2022-3594
- https://ubuntu.com/security/CVE-2022-3621
- https://ubuntu.com/security/CVE-2022-42703
- https://ubuntu.com/security/CVE-2022-3524
- https://ubuntu.com/security/CVE-2022-3594
- https://ubuntu.com/security/CVE-2022-3566
- https://ubuntu.com/security/CVE-2022-3621
- https://ubuntu.com/security/CVE-2022-43945
- https://ubuntu.com/security/CVE-2022-3564
- https://ubuntu.com/security/CVE-2022-3565
- https://ubuntu.com/security/CVE-2022-3567
Title: USN-5778-1: X.Org X Server vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5778-1
Priorities: medium
Description:
Jan-Niklas Sohn discovered that X.Org X Server extensions contained
multiple security issues. An attacker could possibly use these issues to
cause the X Server to crash, execute arbitrary code, or escalate
privileges.
CVEs:
- https://ubuntu.com/security/CVE-2022-46341
- https://ubuntu.com/security/CVE-2022-46342
- https://ubuntu.com/security/CVE-2022-46340
- https://ubuntu.com/security/CVE-2022-4283
- https://ubuntu.com/security/CVE-2022-46344
- https://ubuntu.com/security/CVE-2022-46343
Full Changelog: https://github.com/cloudfoundry/bosh-linux-stemcell-builder/compare/ubuntu-jammy/v1.71…ubuntu-jammy/v1.75
Available in VMware Tanzu Network
Release Date: December 14, 2022
BOSH Agent Version: 2.488.0
Title: USN-5763-1: NumPy vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5763-1
Priorities: medium
Description:
It was discovered that NumPy did not properly manage memory when specifying
arrays of large dimensions. If a user were tricked into running malicious
Python file, an attacker could cause a denial of service. This issue only
affected Ubuntu 20.04 LTS. (CVE-2021-33430)
It was discovered that NumPy did not properly perform string comparison
operations under certain circumstances. An attacker could possibly use
this issue to cause NumPy to crash, resulting in a denial of service.
(CVE-2021-34141)
It was discovered that NumPy did not properly manage memory under certain
circumstances. An attacker could possibly use this issue to cause NumPy to
crash, resulting in a denial of service. (CVE-2021-41495, CVE-2021-41496)
CVEs:
- https://ubuntu.com/security/CVE-2021-33430
- https://ubuntu.com/security/CVE-2021-34141
- https://ubuntu.com/security/CVE-2021-41495
- https://ubuntu.com/security/CVE-2021-41496
- https://ubuntu.com/security/CVE-2021-41495
- https://ubuntu.com/security/CVE-2021-34141
- https://ubuntu.com/security/CVE-2021-41496
- https://ubuntu.com/security/CVE-2021-33430
Title: USN-5772-1: QEMU vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5772-1
Priorities: medium,low
Description:
It was discovered that QEMU incorrectly handled bulk transfers from SPICE
clients. A remote attacker could use this issue to cause QEMU to crash,
resulting in a denial of service, or possibly execute arbitrary code. This
issue only affected Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. (CVE-2021-3682)
It was discovered that QEMU did not properly manage memory when it
transfers the USB packets. A malicious guest attacker could use this issue
to cause QEMU to crash, resulting in a denial of service, or possibly
execute arbitrary code. This issue only affected Ubuntu 18.04 LTS, Ubuntu
20.04 LTS and Ubuntu 22.04 LTS. (CVE-2021-3750)
It was discovered that the QEMU SCSI device emulation incorrectly handled
certain MODE SELECT commands. An attacker inside the guest could possibly
use this issue to cause QEMU to crash, resulting in a denial of service.
This issue only affected Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.
(CVE-2021-3930)
It was discovered that QEMU did not properly manage memory when it
processing repeated messages to cancel the current SCSI request. A
malicious privileged guest attacker could use this issue to cause QEMU to
crash, resulting in a denial of service. (CVE-2022-0216)
It was discovered that QEMU did not properly manage memory when it
using Tulip device emulation. A malicious guest attacker could use this
issue to cause QEMU to crash, resulting in a denial of service. This issue
only affected Ubuntu 22.10. (CVE-2022-2962)
It was discovered that QEMU did not properly manage memory when processing
ClientCutText messages. A attacker could use this issue to cause QEMU to
crash, resulting in a denial of service. This issue only affected Ubuntu
22.04 LTS and Ubuntu 22.10. (CVE-2022-3165)
CVEs:
- https://ubuntu.com/security/CVE-2021-3682
- https://ubuntu.com/security/CVE-2021-3750
- https://ubuntu.com/security/CVE-2021-3930
- https://ubuntu.com/security/CVE-2022-0216
- https://ubuntu.com/security/CVE-2022-2962
- https://ubuntu.com/security/CVE-2022-3165
- https://ubuntu.com/security/CVE-2021-3682
- https://ubuntu.com/security/CVE-2022-3165
- https://ubuntu.com/security/CVE-2022-0216
- https://ubuntu.com/security/CVE-2021-3750
- https://ubuntu.com/security/CVE-2021-3930
- https://ubuntu.com/security/CVE-2022-2962
Title: USN-5759-1: LibBPF vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5759-1
Priorities: medium
Description:
It was discovered that LibBPF incorrectly handled certain memory operations
under certain circumstances. An attacker could possibly use this issue to
cause LibBPF to crash, resulting in a denial of service, or possibly
execute arbitrary code. This issue only affected Ubuntu 22.10.
(CVE-2021-45940, CVE-2021-45941, CVE-2022-3533)
It was discovered that LibBPF incorrectly handled certain memory operations
under certain circumstances. An attacker could possibly use this issue to
cause LibBPF to crash, resulting in a denial of service, or possibly
execute arbitrary code. (CVE-2022-3534, CVE-2022-3606)
CVEs:
- https://ubuntu.com/security/CVE-2021-45940
- https://ubuntu.com/security/CVE-2021-45941
- https://ubuntu.com/security/CVE-2022-3533
- https://ubuntu.com/security/CVE-2022-3534
- https://ubuntu.com/security/CVE-2022-3606
- https://ubuntu.com/security/CVE-2021-45941
- https://ubuntu.com/security/CVE-2022-3534
- https://ubuntu.com/security/CVE-2022-3606
- https://ubuntu.com/security/CVE-2022-3533
- https://ubuntu.com/security/CVE-2021-45940
Title: USN-5760-1: libxml2 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5760-1
Priorities: low,medium
Description:
It was discovered that libxml2 incorrectly handled certain XML files.
An attacker could possibly use this issue to cause a crash.
(CVE-2022-2309)
It was discovered that libxml2 incorrectly handled certain XML files.
An attacker could possibly use this issue to expose sensitive information
or cause a crash. (CVE-2022-40303)
It was discovered that libxml2 incorrectly handled certain XML files.
An attacker could possibly use this issue to execute arbitrary code.
(CVE-2022-40304)
CVEs:
- https://ubuntu.com/security/CVE-2022-2309
- https://ubuntu.com/security/CVE-2022-40303
- https://ubuntu.com/security/CVE-2022-40304
- https://ubuntu.com/security/CVE-2022-40304
- https://ubuntu.com/security/CVE-2022-40303
- https://ubuntu.com/security/CVE-2022-2309
Title: USN-5764-1: U-Boot vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5764-1
Priorities: medium
Description:
It was discovered that U-Boot incorrectly handled certain USB DFU download
setup packets. A local attacker could use this issue to cause U-Boot to
crash, resulting in a denial of service, or possibly execute arbitrary
code. (CVE-2022-2347)
Nicolas Bidron and Nicolas Guigo discovered that U-Boot incorrectly handled
certain fragmented IP packets. A local attacker could use this issue to
cause U-Boot to crash, resulting in a denial of service, or possibly
execute arbitrary code. This issue only affected Ubuntu 18.04 LTS, Ubuntu
20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-30552, CVE-2022-30790)
It was discovered that U-Boot incorrectly handled certain NFS lookup
replies. A remote attacker could use this issue to cause U-Boot to crash,
resulting in a denial of service, or possibly execute arbitrary code. This
issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04
LTS. (CVE-2022-30767)
Jincheng Wang discovered that U-Boot incorrectly handled certain SquashFS
structures. A local attacker could use this issue to cause U-Boot to
crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and
Ubuntu 22.04 LTS. (CVE-2022-33103)
Tatsuhiko Yasumatsu discovered that U-Boot incorrectly handled certain
SquashFS structures. A local attacker could use this issue to cause U-Boot
to crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and
Ubuntu 22.04 LTS. (CVE-2022-33967)
It was discovered that U-Boot incorrectly handled the i2c command. A local
attacker could use this issue to cause U-Boot to crash, resulting in a
denial of service, or possibly execute arbitrary code. This issue only
affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS.
(CVE-2022-34835)
CVEs:
- https://ubuntu.com/security/CVE-2022-2347
- https://ubuntu.com/security/CVE-2022-30552
- https://ubuntu.com/security/CVE-2022-30790
- https://ubuntu.com/security/CVE-2022-30767
- https://ubuntu.com/security/CVE-2022-33103
- https://ubuntu.com/security/CVE-2022-33967
- https://ubuntu.com/security/CVE-2022-34835
- https://ubuntu.com/security/CVE-2022-30767
- https://ubuntu.com/security/CVE-2022-30552
- https://ubuntu.com/security/CVE-2022-33967
- https://ubuntu.com/security/CVE-2022-34835
- https://ubuntu.com/security/CVE-2022-30790
- https://ubuntu.com/security/CVE-2022-33103
- https://ubuntu.com/security/CVE-2022-2347
Title: USN-5776-1: containerd vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5776-1
Priorities: medium
Description:
It was discovered that containerd incorrectly handled memory
when receiving certain faulty Exec or ExecSync commands. A remote
attacker could possibly use this issue to cause a denial of service
or crash containerd. (CVE-2022-23471, CVE-2022-31030)
It was discovered that containerd incorrectly set up inheritable file
capabilities. An attacker could possibly use this issue to escalate
privileges inside a container. This issue only affected Ubuntu 18.04 LTS,
Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-24769)
It was discovered that containerd incorrectly handled access to encrypted
container images when using imgcrypt library. A remote attacker could
possibly use this issue to access encrypted images from other users.
This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and
Ubuntu 22.04 LTS. (CVE-2022-24778)
CVEs:
- https://ubuntu.com/security/CVE-2022-23471
- https://ubuntu.com/security/CVE-2022-31030
- https://ubuntu.com/security/CVE-2022-24769
- https://ubuntu.com/security/CVE-2022-24778
- https://ubuntu.com/security/CVE-2022-24778
- https://ubuntu.com/security/CVE-2022-24769
- https://ubuntu.com/security/CVE-2022-23471
- https://ubuntu.com/security/CVE-2022-31030
Title: USN-5767-1: Python vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5767-1
Priorities: medium
Description:
Nicky Mouha discovered that Python incorrectly handled certain SHA-3 internals.
An attacker could possibly use this issue to cause a crash or execute arbitrary code.
(CVE-2022-37454)
It was discovered that Python incorrectly handled certain IDNA inputs.
An attacker could possibly use this issue to expose sensitive information
denial of service, or cause a crash.
(CVE-2022-45061)
CVEs:
- https://ubuntu.com/security/CVE-2022-37454
- https://ubuntu.com/security/CVE-2022-45061
- https://ubuntu.com/security/CVE-2022-45061
- https://ubuntu.com/security/CVE-2022-37454
Title: USN-5762-1: GNU binutils vulnerability
URL: https://ubuntu.com/security/notices/USN-5762-1
Priorities: medium
Description:
It was discovered that GNU binutils incorrectly handled certain COFF files.
An attacker could possibly use this issue to cause a crash or execute
arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-38533
Title: USN-5773-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5773-1
Priorities: high,medium,low
Description:
It was discovered that the NFSD implementation in the Linux kernel did not
properly handle some RPC messages, leading to a buffer overflow. A remote
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-43945)
Jann Horn discovered that the Linux kernel did not properly track memory
allocations for anonymous VMA mappings in some situations, leading to
potential data structure reuse. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-42703)
Roger Pau Monné discovered that the Xen virtual block driver in the Linux
kernel did not properly initialize memory pages to be used for shared
communication with the backend. A local attacker could use this to expose
sensitive information (guest kernel memory). (CVE-2022-26365)
Jan Beulich discovered that the Xen network device frontend driver in the
Linux kernel incorrectly handled socket buffers (skb) references when
communicating with certain backends. A local attacker could use this to
cause a denial of service (guest crash). (CVE-2022-33743)
It was discovered that a memory leak existed in the IPv6 implementation of
the Linux kernel. A local attacker could use this to cause a denial of
service (memory exhaustion). (CVE-2022-3524)
It was discovered that a race condition existed in the Bluetooth subsystem
in the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-3564)
It was discovered that the TCP implementation in the Linux kernel contained
a data race condition. An attacker could possibly use this to cause
undesired behaviors. (CVE-2022-3566)
It was discovered that the IPv6 implementation in the Linux kernel
contained a data race condition. An attacker could possibly use this to
cause undesired behaviors. (CVE-2022-3567)
It was discovered that the Realtek RTL8152 USB Ethernet adapter driver in
the Linux kernel did not properly handle certain error conditions. A local
attacker with physical access could plug in a specially crafted USB device
to cause a denial of service (memory exhaustion). (CVE-2022-3594)
It was discovered that a null pointer dereference existed in the NILFS2
file system implementation in the Linux kernel. A local attacker could use
this to cause a denial of service (system crash). (CVE-2022-3621)
CVEs:
- https://ubuntu.com/security/CVE-2022-43945
- https://ubuntu.com/security/CVE-2022-42703
- https://ubuntu.com/security/CVE-2022-26365
- https://ubuntu.com/security/CVE-2022-33743
- https://ubuntu.com/security/CVE-2022-3524
- https://ubuntu.com/security/CVE-2022-3564
- https://ubuntu.com/security/CVE-2022-3566
- https://ubuntu.com/security/CVE-2022-3567
- https://ubuntu.com/security/CVE-2022-3594
- https://ubuntu.com/security/CVE-2022-3621
- https://ubuntu.com/security/CVE-2022-3564
- https://ubuntu.com/security/CVE-2022-3621
- https://ubuntu.com/security/CVE-2022-43945
- https://ubuntu.com/security/CVE-2022-3524
- https://ubuntu.com/security/CVE-2022-3594
- https://ubuntu.com/security/CVE-2022-33743
- https://ubuntu.com/security/CVE-2022-3566
- https://ubuntu.com/security/CVE-2022-42703
- https://ubuntu.com/security/CVE-2022-26365
- https://ubuntu.com/security/CVE-2022-3567
Title: USN-5755-2: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5755-2
Priorities: high,medium,low
Description:
It was discovered that the NFSD implementation in the Linux kernel did not
properly handle some RPC messages, leading to a buffer overflow. A remote
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-43945)
Jann Horn discovered that the Linux kernel did not properly track memory
allocations for anonymous VMA mappings in some situations, leading to
potential data structure reuse. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-42703)
It was discovered that a memory leak existed in the IPv6 implementation of
the Linux kernel. A local attacker could use this to cause a denial of
service (memory exhaustion). (CVE-2022-3524)
It was discovered that a race condition existed in the Bluetooth subsystem
in the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-3564)
It was discovered that the ISDN implementation of the Linux kernel
contained a use-after-free vulnerability. A privileged user could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3565)
It was discovered that the TCP implementation in the Linux kernel contained
a data race condition. An attacker could possibly use this to cause
undesired behaviors. (CVE-2022-3566)
It was discovered that the IPv6 implementation in the Linux kernel
contained a data race condition. An attacker could possibly use this to
cause undesired behaviors. (CVE-2022-3567)
It was discovered that the Realtek RTL8152 USB Ethernet adapter driver in
the Linux kernel did not properly handle certain error conditions. A local
attacker with physical access could plug in a specially crafted USB device
to cause a denial of service (memory exhaustion). (CVE-2022-3594)
It was discovered that a null pointer dereference existed in the NILFS2
file system implementation in the Linux kernel. A local attacker could use
this to cause a denial of service (system crash). (CVE-2022-3621)
CVEs:
- https://ubuntu.com/security/CVE-2022-43945
- https://ubuntu.com/security/CVE-2022-42703
- https://ubuntu.com/security/CVE-2022-3524
- https://ubuntu.com/security/CVE-2022-3564
- https://ubuntu.com/security/CVE-2022-3565
- https://ubuntu.com/security/CVE-2022-3566
- https://ubuntu.com/security/CVE-2022-3567
- https://ubuntu.com/security/CVE-2022-3594
- https://ubuntu.com/security/CVE-2022-3621
- https://ubuntu.com/security/CVE-2022-3524
- https://ubuntu.com/security/CVE-2022-3564
- https://ubuntu.com/security/CVE-2022-3621
- https://ubuntu.com/security/CVE-2022-3567
- https://ubuntu.com/security/CVE-2022-43945
- https://ubuntu.com/security/CVE-2022-3566
- https://ubuntu.com/security/CVE-2022-42703
- https://ubuntu.com/security/CVE-2022-3565
- https://ubuntu.com/security/CVE-2022-3594
Available in VMware Tanzu Network
Release Date: December 02, 2022
BOSH Agent Version: 2.481.0
* Fixed issue with BOSH service-broker tasks failing under heavy usage with error “Cannot connect to the monit daemon.” https://github.com/cloudfoundry/bosh-linux-stemcell-builder/pull/264
* Stemcells now include the networking utility, ethtool
, useful for troubleshooting & resolving networking issues. https://github.com/cloudfoundry/bosh-linux-stemcell-builder/pull/263
Title: USN-5752-1: Linux kernel (Azure CVM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5752-1
Priorities: high,medium
Description:
David Bouman and Billy Jheng Bing Jhong discovered that a race condition
existed in the io_uring subsystem in the Linux kernel, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2022-2602)
Sönke Huster discovered that an integer overflow vulnerability existed in
the WiFi driver stack in the Linux kernel, leading to a buffer overflow. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-41674)
Sönke Huster discovered that a use-after-free vulnerability existed in the
WiFi driver stack in the Linux kernel. A physically proximate attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2022-42719)
Sönke Huster discovered that the WiFi driver stack in the Linux kernel did
not properly perform reference counting in some situations, leading to a
use-after-free vulnerability. A physically proximate attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2022-42720)
Sönke Huster discovered that the WiFi driver stack in the Linux kernel did
not properly handle BSSID/SSID lists in some situations. A physically
proximate attacker could use this to cause a denial of service (infinite
loop). (CVE-2022-42721)
Sönke Huster discovered that the WiFi driver stack in the Linux kernel
contained a NULL pointer dereference vulnerability in certain situations. A
physically proximate attacker could use this to cause a denial of service
(system crash). (CVE-2022-42722)
CVEs:
- https://ubuntu.com/security/CVE-2022-2602
- https://ubuntu.com/security/CVE-2022-41674
- https://ubuntu.com/security/CVE-2022-42719
- https://ubuntu.com/security/CVE-2022-42720
- https://ubuntu.com/security/CVE-2022-42721
- https://ubuntu.com/security/CVE-2022-42722
- https://ubuntu.com/security/CVE-2022-2602
- https://ubuntu.com/security/CVE-2022-42720
- https://ubuntu.com/security/CVE-2022-42722
- https://ubuntu.com/security/CVE-2022-42719
- https://ubuntu.com/security/CVE-2022-41674
- https://ubuntu.com/security/CVE-2022-42721
Title: USN-5753-1: snapd vulnerability
URL: https://ubuntu.com/security/notices/USN-5753-1
Priorities: high
Description:
The Qualys Research Team discovered that a race condition existed in the
snapd snap-confine binary when preparing the private /tmp mount for a
snap. A local attacker could possibly use this issue to escalate privileges
and execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-3328
Title: USN-5741-1: Exim vulnerability
URL: https://ubuntu.com/security/notices/USN-5741-1
Priorities: medium
Description:
It was discovered that Exim incorrectly handled certain regular
expressions. An attacker could use this issue to cause Exim to crash,
resulting in a denial of service, or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-3559
Title: USN-5748-1: Sysstat vulnerability
URL: https://ubuntu.com/security/notices/USN-5748-1
Priorities: medium
Description:
It was discovered that Sysstat incorrectly handled certain arithmetic
multiplications. An attacker could use this issue to cause Sysstat to
crash, resulting in a denial of service, or possibly execute arbitrary
code.
CVEs:
- https://ubuntu.com/security/CVE-2022-39377
Title: USN-5743-2: LibTIFF vulnerability
URL: https://ubuntu.com/security/notices/USN-5743-2
Priorities: medium
Description:
USN-5743-1 fixed a vulnerability in LibTIFF. This update provides the
corresponding updates for Ubuntu 18.04 LTS, Ubuntu 20.04 LTS,
Ubuntu 22.04 LTS and Ubuntu 22.10.
Original advisory details:
It was discovered that LibTIFF incorrectly handled certain malformed
images. If a user or automated system were tricked into opening a specially
crafted image, a remote attacker could crash the application, leading to a
denial of service, or possibly execute arbitrary code with user privileges.
CVEs:
- https://ubuntu.com/security/CVE-2022-3970
Title: USN-5755-2: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5755-2
Priorities: high,medium,low
Description:
It was discovered that the NFSD implementation in the Linux kernel did not
properly handle some RPC messages, leading to a buffer overflow. A remote
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-43945)
Jann Horn discovered that the Linux kernel did not properly track memory
allocations for anonymous VMA mappings in some situations, leading to
potential data structure reuse. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-42703)
It was discovered that a memory leak existed in the IPv6 implementation of
the Linux kernel. A local attacker could use this to cause a denial of
service (memory exhaustion). (CVE-2022-3524)
It was discovered that a race condition existed in the Bluetooth subsystem
in the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-3564)
It was discovered that the ISDN implementation of the Linux kernel
contained a use-after-free vulnerability. A privileged user could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3565)
It was discovered that the TCP implementation in the Linux kernel contained
a data race condition. An attacker could possibly use this to cause
undesired behaviors. (CVE-2022-3566)
It was discovered that the IPv6 implementation in the Linux kernel
contained a data race condition. An attacker could possibly use this to
cause undesired behaviors. (CVE-2022-3567)
It was discovered that the Realtek RTL8152 USB Ethernet adapter driver in
the Linux kernel did not properly handle certain error conditions. A local
attacker with physical access could plug in a specially crafted USB device
to cause a denial of service (memory exhaustion). (CVE-2022-3594)
It was discovered that a null pointer dereference existed in the NILFS2
file system implementation in the Linux kernel. A local attacker could use
this to cause a denial of service (system crash). (CVE-2022-3621)
CVEs:
- https://ubuntu.com/security/CVE-2022-43945
- https://ubuntu.com/security/CVE-2022-42703
- https://ubuntu.com/security/CVE-2022-3524
- https://ubuntu.com/security/CVE-2022-3564
- https://ubuntu.com/security/CVE-2022-3565
- https://ubuntu.com/security/CVE-2022-3566
- https://ubuntu.com/security/CVE-2022-3567
- https://ubuntu.com/security/CVE-2022-3594
- https://ubuntu.com/security/CVE-2022-3621
- https://ubuntu.com/security/CVE-2022-3524
- https://ubuntu.com/security/CVE-2022-3564
- https://ubuntu.com/security/CVE-2022-3621
- https://ubuntu.com/security/CVE-2022-3567
- https://ubuntu.com/security/CVE-2022-43945
- https://ubuntu.com/security/CVE-2022-3566
- https://ubuntu.com/security/CVE-2022-42703
- https://ubuntu.com/security/CVE-2022-3565
- https://ubuntu.com/security/CVE-2022-3594
Title: USN-5755-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5755-1
Priorities: high,medium,low
Description:
It was discovered that the NFSD implementation in the Linux kernel did not
properly handle some RPC messages, leading to a buffer overflow. A remote
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-43945)
Jann Horn discovered that the Linux kernel did not properly track memory
allocations for anonymous VMA mappings in some situations, leading to
potential data structure reuse. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-42703)
It was discovered that a memory leak existed in the IPv6 implementation of
the Linux kernel. A local attacker could use this to cause a denial of
service (memory exhaustion). (CVE-2022-3524)
It was discovered that a race condition existed in the Bluetooth subsystem
in the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-3564)
It was discovered that the ISDN implementation of the Linux kernel
contained a use-after-free vulnerability. A privileged user could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3565)
It was discovered that the TCP implementation in the Linux kernel contained
a data race condition. An attacker could possibly use this to cause
undesired behaviors. (CVE-2022-3566)
It was discovered that the IPv6 implementation in the Linux kernel
contained a data race condition. An attacker could possibly use this to
cause undesired behaviors. (CVE-2022-3567)
It was discovered that the Realtek RTL8152 USB Ethernet adapter driver in
the Linux kernel did not properly handle certain error conditions. A local
attacker with physical access could plug in a specially crafted USB device
to cause a denial of service (memory exhaustion). (CVE-2022-3594)
It was discovered that a null pointer dereference existed in the NILFS2
file system implementation in the Linux kernel. A local attacker could use
this to cause a denial of service (system crash). (CVE-2022-3621)
CVEs:
- https://ubuntu.com/security/CVE-2022-43945
- https://ubuntu.com/security/CVE-2022-42703
- https://ubuntu.com/security/CVE-2022-3524
- https://ubuntu.com/security/CVE-2022-3564
- https://ubuntu.com/security/CVE-2022-3565
- https://ubuntu.com/security/CVE-2022-3566
- https://ubuntu.com/security/CVE-2022-3567
- https://ubuntu.com/security/CVE-2022-3594
- https://ubuntu.com/security/CVE-2022-3621
- https://ubuntu.com/security/CVE-2022-3567
- https://ubuntu.com/security/CVE-2022-3564
- https://ubuntu.com/security/CVE-2022-43945
- https://ubuntu.com/security/CVE-2022-3566
- https://ubuntu.com/security/CVE-2022-42703
- https://ubuntu.com/security/CVE-2022-3565
- https://ubuntu.com/security/CVE-2022-3621
- https://ubuntu.com/security/CVE-2022-3524
- https://ubuntu.com/security/CVE-2022-3594
Available in VMware Tanzu Network
Release Date: November 29, 2022
BOSH Agent Version: 2.479.0
PR’s
- fix rsyslog crash in case of connection abort .#255 by @h0nIg
-
Available in VMware Tanzu Network
Release Date: November 17, 2022
BOSH Agent Version: 2.475.0
Title: USN-5719-1: OpenJDK vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5719-1
Priorities: medium
Description:
It was discovered that OpenJDK incorrectly handled long client hostnames.
An attacker could possibly use this issue to cause the corruption of
sensitive information. (CVE-2022-21619)
It was discovered that OpenJDK incorrectly randomized DNS port numbers. A
remote attacker could possibly use this issue to perform spoofing attacks.
(CVE-2022-21624)
It was discovered that OpenJDK did not limit the number of connections
accepted from HTTP clients. An attacker could possibly use this issue to
cause a denial of service. (CVE-2022-21628)
It was discovered that OpenJDK incorrectly handled X.509 certificates. An
attacker could possibly use this issue to cause a denial of service. This
issue only affected OpenJDK 8 and OpenJDK 11. (CVE-2022-21626)
It was discovered that OpenJDK incorrectly handled cached server
connections. An attacker could possibly use this issue to perform spoofing
attacks. This issue only affected OpenJDK 11, OpenJDK 17 and OpenJDK 19.
(CVE-2022-39399)
It was discovered that OpenJDK incorrectly handled byte conversions. An
attacker could possibly use this issue to obtain sensitive information.
This issue only affected OpenJDK 11, OpenJDK 17 and OpenJDK 19.
(CVE-2022-21618)
CVEs:
- https://ubuntu.com/security/CVE-2022-21619
- https://ubuntu.com/security/CVE-2022-21624
- https://ubuntu.com/security/CVE-2022-21628
- https://ubuntu.com/security/CVE-2022-21626
- https://ubuntu.com/security/CVE-2022-39399
- https://ubuntu.com/security/CVE-2022-21618
- https://ubuntu.com/security/CVE-2022-21618
- https://ubuntu.com/security/CVE-2022-21626
- https://ubuntu.com/security/CVE-2022-39399
- https://ubuntu.com/security/CVE-2022-21628
- https://ubuntu.com/security/CVE-2022-21619
- https://ubuntu.com/security/CVE-2022-21624
Title: USN-5714-1: LibTIFF vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5714-1
Priorities: medium,low
Description:
It was discovered that LibTIFF incorrectly handled certain memory operations
when using tiffcrop. An attacker could trick a user into processing a specially
crafted tiff image file and potentially use this issue to cause a denial of
service. This issue only affected Ubuntu 22.10. (CVE-2022-2519, CVE-2022-2520,
CVE-2022-2521, CVE-2022-2953)
It was discovered that LibTIFF did not properly perform bounds checking in
certain operations when using tiffcrop. An attacker could trick a user into
processing a specially crafted tiff image file and potentially use this issue
to allow for information disclosure or to cause the application to crash. This
issue only affected to Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
(CVE-2022-2867, CVE-2022-2868, CVE-2022-2869)
It was discovered that LibTIFF did not properly perform bounds checking in
certain operations when using tiffsplit. An attacker could trick a user into
processing a specially crafted tiff image file and potentially use this issue
to allow for information disclosure or to cause the application to crash. This
issue only affected to Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS,
Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-34526)
Chintan Shah discovered that LibTIFF incorrectly handled memory in certain
conditions when using tiffcrop. An attacker could trick a user into processing
a specially crafted image file and potentially use this issue to allow for
information disclosure or to cause the application to crash. This issue only
affected to Ubuntu 14.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04
LTS and Ubuntu 22.10. (CVE-2022-3570)
It was discovered that LibTIFF incorrectly handled memory in certain conditions
when using tiffcrop. An attacker could trick a user into processing a specially
crafted tiff file and potentially use this issue to cause a denial of service.
This issue only affected to Ubuntu 14.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04
LTS, Ubuntu 22.04 LTS and Ubuntu 22.10. (CVE-2022-3598)
It was discovered that LibTIFF did not properly perform bounds checking in
certain operations when using tiffcrop. An attacker could trick a user into
processing a specially crafted tiff image file and potentially use this issue
to allow for information disclosure or to cause the application to crash.
(CVE-2022-3599)
It was discovered that LibTIFF did not properly perform bounds checking in
certain operations when using tiffcrop. An attacker could trick a user into
processing a specially crafted tiff image file and potentially use this issue
to allow for information disclosure or to cause the application to crash. This
issue only affected to Ubuntu 22.10. (CVE-2022-3626, CVE-2022-3627)
CVEs:
- https://ubuntu.com/security/CVE-2022-2519
- https://ubuntu.com/security/CVE-2022-2520
- https://ubuntu.com/security/CVE-2022-2521
- https://ubuntu.com/security/CVE-2022-2953
- https://ubuntu.com/security/CVE-2022-2867
- https://ubuntu.com/security/CVE-2022-2868
- https://ubuntu.com/security/CVE-2022-2869
- https://ubuntu.com/security/CVE-2022-34526
- https://ubuntu.com/security/CVE-2022-3570
- https://ubuntu.com/security/CVE-2022-3598
- https://ubuntu.com/security/CVE-2022-3599
- https://ubuntu.com/security/CVE-2022-3626
- https://ubuntu.com/security/CVE-2022-3627
- https://ubuntu.com/security/CVE-2022-2869
- https://ubuntu.com/security/CVE-2022-3627
- https://ubuntu.com/security/CVE-2022-3599
- https://ubuntu.com/security/CVE-2022-2519
- https://ubuntu.com/security/CVE-2022-3598
- https://ubuntu.com/security/CVE-2022-34526
- https://ubuntu.com/security/CVE-2022-2867
- https://ubuntu.com/security/CVE-2022-2868
- https://ubuntu.com/security/CVE-2022-2520
- https://ubuntu.com/security/CVE-2022-2521
- https://ubuntu.com/security/CVE-2022-3570
- https://ubuntu.com/security/CVE-2022-2953
- https://ubuntu.com/security/CVE-2022-3626
Title: USN-5717-1: PHP vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5717-1
Priorities: medium
Description:
It was discovered that PHP incorrectly handled certain gzip files.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2022-31628)
It was discovered that PHP incorrectly handled certain cookies.
An attacker could possibly use this issue to compromise the data
(CVE-2022-31629)
It was discovered that PHP incorrectly handled certain image fonts.
An attacker could possibly use this issue to expose sensitive information.
This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.10, and Ubuntu 22.04 LTS.
(CVE-2022-31630)
Nicky Mouha discovered that PHP incorrectly handled certain SHA-3 operations.
An attacker could possibly use this issue to cause a crash
or execute arbitrary code. This issue only affected Ubuntu 20.04 LTS,
Ubuntu 22.10, and Ubuntu 22.04 LTS. (CVE-2022-37454)
CVEs:
- https://ubuntu.com/security/CVE-2022-31628
- https://ubuntu.com/security/CVE-2022-31629
- https://ubuntu.com/security/CVE-2022-31630
- https://ubuntu.com/security/CVE-2022-37454
- https://ubuntu.com/security/CVE-2022-31630
- https://ubuntu.com/security/CVE-2022-37454
- https://ubuntu.com/security/CVE-2022-31628
- https://ubuntu.com/security/CVE-2022-31629
Title: USN-5724-1: Thunderbird vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5724-1
Priorities: medium,low
Description:
Multiple security issues were discovered in Thunderbird. If a user were
tricked into opening a specially crafted website in a browsing context, an
attacker could potentially exploit these to cause a denial of service,
bypass Content Security Policy (CSP) or other security restrictions, or
execute arbitrary code. These issues only affect Ubuntu 18.04 LTS, Ubuntu
20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-3266, CVE-2022-40956,
CVE-2022-40957, CVE-2022-40958, CVE-2022-40959, CVE-2022-40960,
CVE-2022-40962)
Multiple security issues were discovered in the Matrix SDK bundled with
Thunderbird. An attacker could potentially exploit these in order to
impersonate another user. These issues only affect Ubuntu 18.04 LTS,
Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-39236, CVE-2022-39249,
CVE-2022-39250, CVE-2022-39251)
Multiple security issues were discovered in Thunderbird. If a user were
tricked into opening a specially crafted website in a browsing context, an
attacker could potentially exploit these to cause a denial of service,
obtain sensitive information, or execute arbitrary code. (CVE-2022-42927,
CVE-2022-42928, CVE-2022-42929, CVE-2022-42932)
CVEs:
- https://ubuntu.com/security/CVE-2022-3266
- https://ubuntu.com/security/CVE-2022-40956
- https://ubuntu.com/security/CVE-2022-40957
- https://ubuntu.com/security/CVE-2022-40958
- https://ubuntu.com/security/CVE-2022-40959
- https://ubuntu.com/security/CVE-2022-40960
- https://ubuntu.com/security/CVE-2022-40962
- https://ubuntu.com/security/CVE-2022-39236
- https://ubuntu.com/security/CVE-2022-39249
- https://ubuntu.com/security/CVE-2022-39250
- https://ubuntu.com/security/CVE-2022-39251
- https://ubuntu.com/security/CVE-2022-42927
- https://ubuntu.com/security/CVE-2022-42928
- https://ubuntu.com/security/CVE-2022-42929
- https://ubuntu.com/security/CVE-2022-42932
- https://ubuntu.com/security/CVE-2022-40956
- https://ubuntu.com/security/CVE-2022-39236
- https://ubuntu.com/security/CVE-2022-42928
- https://ubuntu.com/security/CVE-2022-39251
- https://ubuntu.com/security/CVE-2022-40962
- https://ubuntu.com/security/CVE-2022-42927
- https://ubuntu.com/security/CVE-2022-39249
- https://ubuntu.com/security/CVE-2022-3266
- https://ubuntu.com/security/CVE-2022-42932
- https://ubuntu.com/security/CVE-2022-40958
- https://ubuntu.com/security/CVE-2022-40957
- https://ubuntu.com/security/CVE-2022-40960
- https://ubuntu.com/security/CVE-2022-39250
- https://ubuntu.com/security/CVE-2022-42929
- https://ubuntu.com/security/CVE-2022-40959
Title: USN-5716-1: SQLite vulnerability
URL: https://ubuntu.com/security/notices/USN-5716-1
Priorities: medium
Description:
It was discovered that SQLite incorrectly handled certain long string
arguments. An attacker could use this issue to cause SQLite to crash,
resulting in a denial of service, or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-35737
Title: USN-5711-1: NTFS-3G vulnerability
URL: https://ubuntu.com/security/notices/USN-5711-1
Priorities: medium
Description:
Yuchen Zeng and Eduardo Vela discovered that NTFS-3G incorrectly validated
certain NTFS metadata. A local attacker could possibly use this issue to
gain privileges.
CVEs:
- https://ubuntu.com/security/CVE-2022-40284
Title: USN-5713-1: Python vulnerability
URL: https://ubuntu.com/security/notices/USN-5713-1
Priorities: high
Description:
Devin Jeanpierre discovered that Python incorrectly handled sockets when
the multiprocessing module was being used. A local attacker could possibly
use this issue to execute arbitrary code and escalate privileges.
CVEs:
- https://ubuntu.com/security/CVE-2022-42919
Title: USN-5718-1: pixman vulnerability
URL: https://ubuntu.com/security/notices/USN-5718-1
Priorities: medium
Description:
Maddie Stone discovered that pixman incorrectly handled certain memory
operations. A remote attacker could use this issue to cause pixman to
crash, resulting in a denial of service, or possibly execute arbitrary
code.
CVEs:
- https://ubuntu.com/security/CVE-2022-44638
Available in VMware Tanzu Network
Release Date: November 02, 2022
BOSH Agent Version: 2.475.0
Bug Fixes:
- rsyslog on aws starts a boot again. #242
- clang is introduced to speedup the bosh director #251
Title: USN-5703-1: Linux kernel (Intel IoTG) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5703-1
Priorities: medium
Description:
Selim Enes Karaduman discovered that a race condition existed in the
General notification queue implementation of the Linux kernel, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-1882)
Pawan Kumar Gupta, Alyssa Milburn, Amit Peled, Shani Rehana, Nir Shildan
and Ariel Sabba discovered that some Intel processors with Enhanced
Indirect Branch Restricted Speculation (eIBRS) did not properly handle RET
instructions after a VM exits. A local attacker could potentially use this
to expose sensitive information. (CVE-2022-26373)
Eric Biggers discovered that a use-after-free vulnerability existed in the
io_uring subsystem in the Linux kernel. A local attacker could possibly use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2022-3176)
It was discovered that the Netlink Transformation (XFRM) subsystem in the
Linux kernel contained a reference counting error. A local attacker could
use this to cause a denial of service (system crash). (CVE-2022-36879)
Jann Horn discovered that the KVM subsystem in the Linux kernel did not
properly handle TLB flush operations in some situations. A local attacker
in a guest VM could use this to cause a denial of service (guest crash) or
possibly execute arbitrary code in the guest kernel. (CVE-2022-39189)
CVEs:
- https://ubuntu.com/security/CVE-2022-1882
- https://ubuntu.com/security/CVE-2022-26373
- https://ubuntu.com/security/CVE-2022-3176
- https://ubuntu.com/security/CVE-2022-36879
- https://ubuntu.com/security/CVE-2022-39189
- https://ubuntu.com/security/CVE-2022-36879
- https://ubuntu.com/security/CVE-2022-3176
- https://ubuntu.com/security/CVE-2022-1882
- https://ubuntu.com/security/CVE-2022-26373
- https://ubuntu.com/security/CVE-2022-39189
Title: USN-5696-1: MySQL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5696-1
Priorities: medium
Description:
Multiple security issues were discovered in MySQL and this update includes
new upstream MySQL versions to fix these issues.
MySQL has been updated to 8.0.31 in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
Ubuntu 18.04 LTS has been updated to MySQL 5.7.40.
In addition to security fixes, the updated packages contain bug fixes, new
features, and possibly incompatible changes.
Please see the following for more information:
https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-40.html
https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-31.html
https://www.oracle.com/security-alerts/cpuoct2022.html
CVEs:
- https://ubuntu.com/security/CVE-2022-21632
- https://ubuntu.com/security/CVE-2022-21633
- https://ubuntu.com/security/CVE-2022-21589
- https://ubuntu.com/security/CVE-2022-39400
- https://ubuntu.com/security/CVE-2022-21611
- https://ubuntu.com/security/CVE-2022-21599
- https://ubuntu.com/security/CVE-2022-21604
- https://ubuntu.com/security/CVE-2022-21637
- https://ubuntu.com/security/CVE-2022-21592
- https://ubuntu.com/security/CVE-2022-39410
- https://ubuntu.com/security/CVE-2022-21608
- https://ubuntu.com/security/CVE-2022-21617
- https://ubuntu.com/security/CVE-2022-39408
- https://ubuntu.com/security/CVE-2022-21640
- https://ubuntu.com/security/CVE-2022-21625
- https://ubuntu.com/security/CVE-2022-21594
Title: USN-5697-1: Barbican vulnerability
URL: https://ubuntu.com/security/notices/USN-5697-1
Priorities: medium
Description:
Douglas Mendizabal discovered that Barbican incorrectly handled certain
query strings. A remote attacker could possibly use this issue to bypass
the access policy.
CVEs:
- https://ubuntu.com/security/CVE-2022-3100
Title: USN-5702-1: curl vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5702-1
Priorities: medium,low
Description:
Robby Simpson discovered that curl incorrectly handled certain POST
operations after PUT operations. This issue could cause applications using
curl to send the wrong data, perform incorrect memory operations, or crash.
(CVE-2022-32221)
Hiroki Kurosawa discovered that curl incorrectly handled parsing .netrc
files. If an attacker were able to provide a specially crafted .netrc file,
this issue could cause curl to crash, resulting in a denial of service.
This issue only affected Ubuntu 22.10. (CVE-2022-35260)
It was discovered that curl incorrectly handled certain HTTP proxy return
codes. A remote attacker could use this issue to cause curl to crash,
resulting in a denial of service, or possibly execute arbitrary code. This
issue only affected Ubuntu 22.04 LTS, and Ubuntu 22.10. (CVE-2022-42915)
Hiroki Kurosawa discovered that curl incorrectly handled HSTS support
when certain hostnames included IDN characters. A remote attacker could
possibly use this issue to cause curl to use unencrypted connections. This
issue only affected Ubuntu 22.04 LTS, and Ubuntu 22.10. (CVE-2022-42916)
CVEs:
- https://ubuntu.com/security/CVE-2022-32221
- https://ubuntu.com/security/CVE-2022-35260
- https://ubuntu.com/security/CVE-2022-42915
- https://ubuntu.com/security/CVE-2022-42916
- https://ubuntu.com/security/CVE-2022-32221
- https://ubuntu.com/security/CVE-2022-35260
- https://ubuntu.com/security/CVE-2022-42916
- https://ubuntu.com/security/CVE-2022-42915
Title: USN-5710-1: OpenSSL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5710-1
Priorities: high,low
Description:
It was discovered that OpenSSL incorrectly handled certain X.509 Email
Addresses. If a certificate authority were tricked into signing a
specially-crafted certificate, a remote attacker could possibly use this
issue to cause OpenSSL to crash, resulting in a denial of service. The
default compiler options for affected releases reduce the vulnerability to
a denial of service. (CVE-2022-3602, CVE-2022-3786)
It was discovered that OpenSSL incorrectly handled applications creating
custom ciphers via the legacy EVP_CIPHER_meth_new() function. This issue
could cause certain applications that mishandled values to the function to
possibly end up with a NULL cipher and messages in plaintext.
(CVE-2022-3358)
CVEs:
- https://ubuntu.com/security/CVE-2022-3602
- https://ubuntu.com/security/CVE-2022-3786
- https://ubuntu.com/security/CVE-2022-3358
- https://ubuntu.com/security/CVE-2022-3358
- https://ubuntu.com/security/CVE-2022-3602
- https://ubuntu.com/security/CVE-2022-3786
Title: USN-5708-1: backport-iwlwifi-dkms vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5708-1
Priorities: medium
Description:
Sönke Huster discovered that an integer overflow vulnerability existed in
the WiFi driver stack in the Linux kernel, leading to a buffer overflow. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-41674)
Sönke Huster discovered that a use-after-free vulnerability existed in the
WiFi driver stack in the Linux kernel. A physically proximate attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2022-42719)
Sönke Huster discovered that the WiFi driver stack in the Linux kernel did
not properly perform reference counting in some situations, leading to a
use-after-free vulnerability. A physically proximate attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2022-42720)
Sönke Huster discovered that the WiFi driver stack in the Linux kernel did
not properly handle BSSID/SSID lists in some situations. A physically
proximate attacker could use this to cause a denial of service (infinite
loop). (CVE-2022-42721)
Sönke Huster discovered that the WiFi driver stack in the Linux kernel
contained a NULL pointer dereference vulnerability in certain situations. A
physically proximate attacker could use this to cause a denial of service
(system crash). This issue only affected Ubuntu 20.04 LTS and Ubuntu 22.10.
(CVE-2022-42722)
CVEs:
- https://ubuntu.com/security/CVE-2022-41674
- https://ubuntu.com/security/CVE-2022-42719
- https://ubuntu.com/security/CVE-2022-42720
- https://ubuntu.com/security/CVE-2022-42721
- https://ubuntu.com/security/CVE-2022-42722
- https://ubuntu.com/security/CVE-2022-42722
- https://ubuntu.com/security/CVE-2022-41674
- https://ubuntu.com/security/CVE-2022-42721
- https://ubuntu.com/security/CVE-2022-42719
- https://ubuntu.com/security/CVE-2022-42720
Title: USN-5704-1: DBus vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5704-1
Priorities: medium
Description:
It was discovered that DBus incorrectly handled messages with invalid type
signatures. A local attacker could possibly use this issue to cause DBus to
crash, resulting in a denial of service. (CVE-2022-42010)
It was discovered that DBus was incorrectly validating the length of arrays of
fixed-length items. A local attacker could possibly use this issue to cause
DBus to crash, resulting in a denial of service. (CVE-2022-42011)
It was discovered that DBus incorrectly handled the body DBus message with
attached file descriptors. A local attacker could possibly use this issue to
cause DBus to crash, resulting in a denial of service. (CVE-2022-42012)
CVEs:
- https://ubuntu.com/security/CVE-2022-42010
- https://ubuntu.com/security/CVE-2022-42011
- https://ubuntu.com/security/CVE-2022-42012
- https://ubuntu.com/security/CVE-2022-42010
- https://ubuntu.com/security/CVE-2022-42012
- https://ubuntu.com/security/CVE-2022-42011
Available in VMware Tanzu Network
Release Date: October 24, 2022
BOSH Agent Version: 2.471.0
Title: USN-5689-1: Perl vulnerability
URL: https://ubuntu.com/security/notices/USN-5689-1
Priorities: medium
Description:
It was discovered that Perl incorrectly handled certain signature verification.
An remote attacker could possibly use this issue to bypass signature verification.
CVEs:
- https://ubuntu.com/security/CVE-2020-16156
Title: USN-5659-1: kitty vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5659-1
Priorities: medium
Description:
Stephane Chauveau discovered that kitty incorrectly handled image
filenames with special characters in error messages. A remote
attacker could possibly use this to execute arbitrary commands.
This issue only affected Ubuntu 20.04 LTS. (CVE-2020-35605)
Carter Sande discovered that kitty incorrectly handled escape
sequences in desktop notifications. A remote attacker could possibly
use this to execute arbitrary commands. This issue only affected
Ubuntu 22.04 LTS. (CVE-2022-41322)
CVEs:
- https://ubuntu.com/security/CVE-2020-35605
- https://ubuntu.com/security/CVE-2022-41322
- https://ubuntu.com/security/CVE-2022-41322
- https://ubuntu.com/security/CVE-2020-35605
Title: USN-5633-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5633-1
Priorities: medium
Description:
It was discovered that the framebuffer driver on the Linux kernel did not
verify size limits when changing font or screen size, leading to an out-of-
bounds write. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2021-33655)
Duoming Zhou discovered that race conditions existed in the timer handling
implementation of the Linux kernel’s Rose X.25 protocol layer, resulting in
use-after-free vulnerabilities. A local attacker could use this to cause a
denial of service (system crash). (CVE-2022-2318)
Roger Pau Monné discovered that the Xen virtual block driver in the Linux
kernel did not properly initialize memory pages to be used for shared
communication with the backend. A local attacker could use this to expose
sensitive information (guest kernel memory). (CVE-2022-26365)
Roger Pau Monné discovered that the Xen paravirtualization frontend in the
Linux kernel did not properly initialize memory pages to be used for shared
communication with the backend. A local attacker could use this to expose
sensitive information (guest kernel memory). (CVE-2022-33740)
It was discovered that the Xen paravirtualization frontend in the Linux
kernel incorrectly shared unrelated data when communicating with certain
backends. A local attacker could use this to cause a denial of service
(guest crash) or expose sensitive information (guest kernel memory).
(CVE-2022-33741, CVE-2022-33742)
Jan Beulich discovered that the Xen network device frontend driver in the
Linux kernel incorrectly handled socket buffers (skb) references when
communicating with certain backends. A local attacker could use this to
cause a denial of service (guest crash). (CVE-2022-33743)
Oleksandr Tyshchenko discovered that the Xen paravirtualization platform in
the Linux kernel on ARM platforms contained a race condition in certain
situations. An attacker in a guest VM could use this to cause a denial of
service in the host OS. (CVE-2022-33744)
It was discovered that the virtio RPMSG bus driver in the Linux kernel
contained a double-free vulnerability in certain error conditions. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2022-34494, CVE-2022-34495)
Domingo Dirutigliano and Nicola Guerrera discovered that the netfilter
subsystem in the Linux kernel did not properly handle rules that truncated
packets below the packet header size. When such rules are in place, a
remote attacker could possibly use this to cause a denial of service
(system crash). (CVE-2022-36946)
CVEs:
- https://ubuntu.com/security/CVE-2021-33655
- https://ubuntu.com/security/CVE-2022-2318
- https://ubuntu.com/security/CVE-2022-26365
- https://ubuntu.com/security/CVE-2022-33740
- https://ubuntu.com/security/CVE-2022-33741
- https://ubuntu.com/security/CVE-2022-33742
- https://ubuntu.com/security/CVE-2022-33743
- https://ubuntu.com/security/CVE-2022-33744
- https://ubuntu.com/security/CVE-2022-34494
- https://ubuntu.com/security/CVE-2022-34495
- https://ubuntu.com/security/CVE-2022-36946
- https://ubuntu.com/security/CVE-2022-33741
- https://ubuntu.com/security/CVE-2022-33744
- https://ubuntu.com/security/CVE-2021-33655
- https://ubuntu.com/security/CVE-2022-33740
- https://ubuntu.com/security/CVE-2022-34495
- https://ubuntu.com/security/CVE-2022-26365
- https://ubuntu.com/security/CVE-2022-36946
- https://ubuntu.com/security/CVE-2022-33743
- https://ubuntu.com/security/CVE-2022-33742
- https://ubuntu.com/security/CVE-2022-34494
- https://ubuntu.com/security/CVE-2022-2318
Title: USN-5655-1: Linux kernel (Intel IoTG) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5655-1
Priorities: medium
Description:
It was discovered that the framebuffer driver on the Linux kernel did not
verify size limits when changing font or screen size, leading to an out-of-
bounds write. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2021-33655)
Duoming Zhou discovered that race conditions existed in the timer handling
implementation of the Linux kernel’s Rose X.25 protocol layer, resulting in
use-after-free vulnerabilities. A local attacker could use this to cause a
denial of service (system crash). (CVE-2022-2318)
Roger Pau Monné discovered that the Xen virtual block driver in the Linux
kernel did not properly initialize memory pages to be used for shared
communication with the backend. A local attacker could use this to expose
sensitive information (guest kernel memory). (CVE-2022-26365)
Roger Pau Monné discovered that the Xen paravirtualization frontend in the
Linux kernel did not properly initialize memory pages to be used for shared
communication with the backend. A local attacker could use this to expose
sensitive information (guest kernel memory). (CVE-2022-33740)
It was discovered that the Xen paravirtualization frontend in the Linux
kernel incorrectly shared unrelated data when communicating with certain
backends. A local attacker could use this to cause a denial of service
(guest crash) or expose sensitive information (guest kernel memory).
(CVE-2022-33741, CVE-2022-33742)
Jan Beulich discovered that the Xen network device frontend driver in the
Linux kernel incorrectly handled socket buffers (skb) references when
communicating with certain backends. A local attacker could use this to
cause a denial of service (guest crash). (CVE-2022-33743)
Oleksandr Tyshchenko discovered that the Xen paravirtualization platform in
the Linux kernel on ARM platforms contained a race condition in certain
situations. An attacker in a guest VM could use this to cause a denial of
service in the host OS. (CVE-2022-33744)
It was discovered that the virtio RPMSG bus driver in the Linux kernel
contained a double-free vulnerability in certain error conditions. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2022-34494, CVE-2022-34495)
Domingo Dirutigliano and Nicola Guerrera discovered that the netfilter
subsystem in the Linux kernel did not properly handle rules that truncated
packets below the packet header size. When such rules are in place, a
remote attacker could possibly use this to cause a denial of service
(system crash). (CVE-2022-36946)
CVEs:
- https://ubuntu.com/security/CVE-2021-33655
- https://ubuntu.com/security/CVE-2022-2318
- https://ubuntu.com/security/CVE-2022-26365
- https://ubuntu.com/security/CVE-2022-33740
- https://ubuntu.com/security/CVE-2022-33741
- https://ubuntu.com/security/CVE-2022-33742
- https://ubuntu.com/security/CVE-2022-33743
- https://ubuntu.com/security/CVE-2022-33744
- https://ubuntu.com/security/CVE-2022-34494
- https://ubuntu.com/security/CVE-2022-34495
- https://ubuntu.com/security/CVE-2022-36946
- https://ubuntu.com/security/CVE-2022-33741
- https://ubuntu.com/security/CVE-2022-33744
- https://ubuntu.com/security/CVE-2021-33655
- https://ubuntu.com/security/CVE-2022-33740
- https://ubuntu.com/security/CVE-2022-34495
- https://ubuntu.com/security/CVE-2022-26365
- https://ubuntu.com/security/CVE-2022-36946
- https://ubuntu.com/security/CVE-2022-33743
- https://ubuntu.com/security/CVE-2022-33742
- https://ubuntu.com/security/CVE-2022-34494
- https://ubuntu.com/security/CVE-2022-2318
Title: USN-5640-1: Linux kernel (Oracle) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5640-1
Priorities: medium
Description:
It was discovered that the framebuffer driver on the Linux kernel did not
verify size limits when changing font or screen size, leading to an out-of-
bounds write. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2021-33655)
Duoming Zhou discovered that race conditions existed in the timer handling
implementation of the Linux kernel’s Rose X.25 protocol layer, resulting in
use-after-free vulnerabilities. A local attacker could use this to cause a
denial of service (system crash). (CVE-2022-2318)
Roger Pau Monné discovered that the Xen virtual block driver in the Linux
kernel did not properly initialize memory pages to be used for shared
communication with the backend. A local attacker could use this to expose
sensitive information (guest kernel memory). (CVE-2022-26365)
Roger Pau Monné discovered that the Xen paravirtualization frontend in the
Linux kernel did not properly initialize memory pages to be used for shared
communication with the backend. A local attacker could use this to expose
sensitive information (guest kernel memory). (CVE-2022-33740)
It was discovered that the Xen paravirtualization frontend in the Linux
kernel incorrectly shared unrelated data when communicating with certain
backends. A local attacker could use this to cause a denial of service
(guest crash) or expose sensitive information (guest kernel memory).
(CVE-2022-33741, CVE-2022-33742)
Jan Beulich discovered that the Xen network device frontend driver in the
Linux kernel incorrectly handled socket buffers (skb) references when
communicating with certain backends. A local attacker could use this to
cause a denial of service (guest crash). (CVE-2022-33743)
Oleksandr Tyshchenko discovered that the Xen paravirtualization platform in
the Linux kernel on ARM platforms contained a race condition in certain
situations. An attacker in a guest VM could use this to cause a denial of
service in the host OS. (CVE-2022-33744)
It was discovered that the virtio RPMSG bus driver in the Linux kernel
contained a double-free vulnerability in certain error conditions. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2022-34494, CVE-2022-34495)
Domingo Dirutigliano and Nicola Guerrera discovered that the netfilter
subsystem in the Linux kernel did not properly handle rules that truncated
packets below the packet header size. When such rules are in place, a
remote attacker could possibly use this to cause a denial of service
(system crash). (CVE-2022-36946)
CVEs:
- https://ubuntu.com/security/CVE-2021-33655
- https://ubuntu.com/security/CVE-2022-2318
- https://ubuntu.com/security/CVE-2022-26365
- https://ubuntu.com/security/CVE-2022-33740
- https://ubuntu.com/security/CVE-2022-33741
- https://ubuntu.com/security/CVE-2022-33742
- https://ubuntu.com/security/CVE-2022-33743
- https://ubuntu.com/security/CVE-2022-33744
- https://ubuntu.com/security/CVE-2022-34494
- https://ubuntu.com/security/CVE-2022-34495
- https://ubuntu.com/security/CVE-2022-36946
- https://ubuntu.com/security/CVE-2022-36946
- https://ubuntu.com/security/CVE-2022-26365
- https://ubuntu.com/security/CVE-2021-33655
- https://ubuntu.com/security/CVE-2022-2318
- https://ubuntu.com/security/CVE-2022-34495
- https://ubuntu.com/security/CVE-2022-33742
- https://ubuntu.com/security/CVE-2022-33743
- https://ubuntu.com/security/CVE-2022-33744
- https://ubuntu.com/security/CVE-2022-33741
- https://ubuntu.com/security/CVE-2022-33740
- https://ubuntu.com/security/CVE-2022-34494
Title: USN-5635-1: Linux kernel (GKE) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5635-1
Priorities: medium
Description:
It was discovered that the framebuffer driver on the Linux kernel did not
verify size limits when changing font or screen size, leading to an out-of-
bounds write. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2021-33655)
Duoming Zhou discovered that race conditions existed in the timer handling
implementation of the Linux kernel’s Rose X.25 protocol layer, resulting in
use-after-free vulnerabilities. A local attacker could use this to cause a
denial of service (system crash). (CVE-2022-2318)
Roger Pau Monné discovered that the Xen virtual block driver in the Linux
kernel did not properly initialize memory pages to be used for shared
communication with the backend. A local attacker could use this to expose
sensitive information (guest kernel memory). (CVE-2022-26365)
Roger Pau Monné discovered that the Xen paravirtualization frontend in the
Linux kernel did not properly initialize memory pages to be used for shared
communication with the backend. A local attacker could use this to expose
sensitive information (guest kernel memory). (CVE-2022-33740)
It was discovered that the Xen paravirtualization frontend in the Linux
kernel incorrectly shared unrelated data when communicating with certain
backends. A local attacker could use this to cause a denial of service
(guest crash) or expose sensitive information (guest kernel memory).
(CVE-2022-33741, CVE-2022-33742)
Jan Beulich discovered that the Xen network device frontend driver in the
Linux kernel incorrectly handled socket buffers (skb) references when
communicating with certain backends. A local attacker could use this to
cause a denial of service (guest crash). (CVE-2022-33743)
Oleksandr Tyshchenko discovered that the Xen paravirtualization platform in
the Linux kernel on ARM platforms contained a race condition in certain
situations. An attacker in a guest VM could use this to cause a denial of
service in the host OS. (CVE-2022-33744)
It was discovered that the virtio RPMSG bus driver in the Linux kernel
contained a double-free vulnerability in certain error conditions. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2022-34494, CVE-2022-34495)
Domingo Dirutigliano and Nicola Guerrera discovered that the netfilter
subsystem in the Linux kernel did not properly handle rules that truncated
packets below the packet header size. When such rules are in place, a
remote attacker could possibly use this to cause a denial of service
(system crash). (CVE-2022-36946)
CVEs:
- https://ubuntu.com/security/CVE-2021-33655
- https://ubuntu.com/security/CVE-2022-2318
- https://ubuntu.com/security/CVE-2022-26365
- https://ubuntu.com/security/CVE-2022-33740
- https://ubuntu.com/security/CVE-2022-33741
- https://ubuntu.com/security/CVE-2022-33742
- https://ubuntu.com/security/CVE-2022-33743
- https://ubuntu.com/security/CVE-2022-33744
- https://ubuntu.com/security/CVE-2022-34494
- https://ubuntu.com/security/CVE-2022-34495
- https://ubuntu.com/security/CVE-2022-36946
- https://ubuntu.com/security/CVE-2022-36946
- https://ubuntu.com/security/CVE-2022-26365
- https://ubuntu.com/security/CVE-2022-34495
- https://ubuntu.com/security/CVE-2021-33655
- https://ubuntu.com/security/CVE-2022-2318
- https://ubuntu.com/security/CVE-2022-33744
- https://ubuntu.com/security/CVE-2022-33742
- https://ubuntu.com/security/CVE-2022-34494
- https://ubuntu.com/security/CVE-2022-33741
- https://ubuntu.com/security/CVE-2022-33743
- https://ubuntu.com/security/CVE-2022-33740
Title: USN-5673-1: unzip vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5673-1
Priorities: low,medium
Description:
It was discovered that unzip did not properly handle unicode strings under
certain circumstances. If a user were tricked into opening a specially crafted
zip file, an attacker could possibly use this issue to cause unzip to crash,
resulting in a denial of service, or possibly execute arbitrary code.
(CVE-2021-4217)
It was discovered that unzip did not properly perform bounds checking while
converting wide strings to local strings. If a user were tricked into opening a
specially crafted zip file, an attacker could possibly use this issue to cause
unzip to crash, resulting in a denial of service, or possibly execute arbitrary
code. (CVE-2022-0529, CVE-2022-0530)
CVEs:
- https://ubuntu.com/security/CVE-2021-4217
- https://ubuntu.com/security/CVE-2022-0529
- https://ubuntu.com/security/CVE-2022-0530
- https://ubuntu.com/security/CVE-2022-0529
- https://ubuntu.com/security/CVE-2021-4217
- https://ubuntu.com/security/CVE-2022-0530
Title: USN-5627-1: PCRE vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5627-1
Priorities: low
Description:
It was discovered that PCRE incorrectly handled memory when
handling certain regular expressions. An attacker could possibly
use this issue to cause applications using PCRE to expose
sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2022-1586
- https://ubuntu.com/security/CVE-2022-1587
Title: USN-5667-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5667-1
Priorities: medium
Description:
Selim Enes Karaduman discovered that a race condition existed in the
General notification queue implementation of the Linux kernel, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-1882)
Pawan Kumar Gupta, Alyssa Milburn, Amit Peled, Shani Rehana, Nir Shildan
and Ariel Sabba discovered that some Intel processors with Enhanced
Indirect Branch Restricted Speculation (eIBRS) did not properly handle RET
instructions after a VM exits. A local attacker could potentially use this
to expose sensitive information. (CVE-2022-26373)
Eric Biggers discovered that a use-after-free vulnerability existed in the
io_uring subsystem in the Linux kernel. A local attacker could possibly use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2022-3176)
It was discovered that the Netlink Transformation (XFRM) subsystem in the
Linux kernel contained a reference counting error. A local attacker could
use this to cause a denial of service (system crash). (CVE-2022-36879)
Jann Horn discovered that the KVM subsystem in the Linux kernel did not
properly handle TLB flush operations in some situations. A local attacker
in a guest VM could use this to cause a denial of service (guest crash) or
possibly execute arbitrary code in the guest kernel. (CVE-2022-39189)
CVEs:
- https://ubuntu.com/security/CVE-2022-1882
- https://ubuntu.com/security/CVE-2022-26373
- https://ubuntu.com/security/CVE-2022-3176
- https://ubuntu.com/security/CVE-2022-36879
- https://ubuntu.com/security/CVE-2022-39189
- https://ubuntu.com/security/CVE-2022-1882
- https://ubuntu.com/security/CVE-2022-26373
- https://ubuntu.com/security/CVE-2022-39189
- https://ubuntu.com/security/CVE-2022-36879
- https://ubuntu.com/security/CVE-2022-3176
Title: USN-5663-1: Thunderbird vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5663-1
Priorities: medium
Description:
Multiple security issues were discovered in Thunderbird. If a user were
tricked into opening a specially crafted website in a browsing context, an
attacker could potentially exploit these to cause a denial of service,
spoof the mouse pointer position, obtain sensitive information, spoof the
contents of the addressbar, bypass security restrictions, or execute
arbitrary code. (CVE-2022-2505, CVE-2022-36318, CVE-2022-36319,
CVE-2022-38472, CVE-2022-38473, CVE-2022-38476 CVE-2022-38477,
CVE-2022-38478)
Multiple security issues were discovered in Thunderbird. An attacker could
potentially exploit these in order to determine when a user opens a
specially crafted message. (CVE-2022-3032, CVE-2022-3034)
It was discovered that Thunderbird did not correctly handle HTML messages
that contain a meta tag in some circumstances. If a user were tricked into
replying to a specially crafted message, an attacker could potentially
exploit this to obtain sensitive information. (CVE-2022-3033)
A security issue was discovered with the Matrix SDK in Thunderbird. An
attacker sharing a room with a user could potentially exploit this to
cause a denial of service. (CVE-2022-36059)
CVEs:
- https://ubuntu.com/security/CVE-2022-2505
- https://ubuntu.com/security/CVE-2022-36318
- https://ubuntu.com/security/CVE-2022-36319
- https://ubuntu.com/security/CVE-2022-38472
- https://ubuntu.com/security/CVE-2022-38473
- https://ubuntu.com/security/CVE-2022-38476
- https://ubuntu.com/security/CVE-2022-38477
- https://ubuntu.com/security/CVE-2022-38478
- https://ubuntu.com/security/CVE-2022-3032
- https://ubuntu.com/security/CVE-2022-3034
- https://ubuntu.com/security/CVE-2022-3033
- https://ubuntu.com/security/CVE-2022-36059
- https://ubuntu.com/security/CVE-2022-36059
- https://ubuntu.com/security/CVE-2022-38476
- https://ubuntu.com/security/CVE-2022-3034
- https://ubuntu.com/security/CVE-2022-38472
- https://ubuntu.com/security/CVE-2022-3033
- https://ubuntu.com/security/CVE-2022-36319
- https://ubuntu.com/security/CVE-2022-3032
- https://ubuntu.com/security/CVE-2022-38473
- https://ubuntu.com/security/CVE-2022-38478
- https://ubuntu.com/security/CVE-2022-38477
- https://ubuntu.com/security/CVE-2022-2505
- https://ubuntu.com/security/CVE-2022-36318
Title: USN-5693-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5693-1
Priorities: high,medium
Description:
David Bouman and Billy Jheng Bing Jhong discovered that a race condition
existed in the io_uring subsystem in the Linux kernel, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2022-2602)
Duoming Zhou discovered that race conditions existed in the timer handling
implementation of the Linux kernel’s Rose X.25 protocol layer, resulting in
use-after-free vulnerabilities. A local attacker could use this to cause a
denial of service (system crash). (CVE-2022-2318)
Hao Sun and Jiacheng Xu discovered that the NILFS file system
implementation in the Linux kernel contained a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-2978)
Abhishek Shah discovered a race condition in the PF_KEYv2 implementation in
the Linux kernel. A local attacker could use this to cause a denial of
service (system crash) or possibly expose sensitive information (kernel
memory). (CVE-2022-3028)
Xingyuan Mo and Gengjia Chen discovered that the Promise SuperTrak EX
storage controller driver in the Linux kernel did not properly handle
certain structures. A local attacker could potentially use this to expose
sensitive information (kernel memory). (CVE-2022-40768)
Sönke Huster discovered that an integer overflow vulnerability existed in
the WiFi driver stack in the Linux kernel, leading to a buffer overflow. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-41674)
Sönke Huster discovered that a use-after-free vulnerability existed in the
WiFi driver stack in the Linux kernel. A physically proximate attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2022-42719)
Sönke Huster discovered that the WiFi driver stack in the Linux kernel did
not properly perform reference counting in some situations, leading to a
use-after-free vulnerability. A physically proximate attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2022-42720)
Sönke Huster discovered that the WiFi driver stack in the Linux kernel did
not properly handle BSSID/SSID lists in some situations. A physically
proximate attacker could use this to cause a denial of service (infinite
loop). (CVE-2022-42721)
Sönke Huster discovered that the WiFi driver stack in the Linux kernel
contained a NULL pointer dereference vulnerability in certain situations. A
physically proximate attacker could use this to cause a denial of service
(system crash). (CVE-2022-42722)
CVEs:
- https://ubuntu.com/security/CVE-2022-2602
- https://ubuntu.com/security/CVE-2022-2318
- https://ubuntu.com/security/CVE-2022-2978
- https://ubuntu.com/security/CVE-2022-3028
- https://ubuntu.com/security/CVE-2022-40768
- https://ubuntu.com/security/CVE-2022-41674
- https://ubuntu.com/security/CVE-2022-42719
- https://ubuntu.com/security/CVE-2022-42720
- https://ubuntu.com/security/CVE-2022-42721
- https://ubuntu.com/security/CVE-2022-42722
- https://ubuntu.com/security/CVE-2022-2318
- https://ubuntu.com/security/CVE-2022-42722
- https://ubuntu.com/security/CVE-2022-41674
- https://ubuntu.com/security/CVE-2022-2602
- https://ubuntu.com/security/CVE-2022-42721
- https://ubuntu.com/security/CVE-2022-2978
- https://ubuntu.com/security/CVE-2022-3028
- https://ubuntu.com/security/CVE-2022-42719
- https://ubuntu.com/security/CVE-2022-42720
- https://ubuntu.com/security/CVE-2022-40768
Title: USN-5692-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5692-1
Priorities: high,medium
Description:
David Bouman and Billy Jheng Bing Jhong discovered that a race condition
existed in the io_uring subsystem in the Linux kernel, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2022-2602)
Sönke Huster discovered that an integer overflow vulnerability existed in
the WiFi driver stack in the Linux kernel, leading to a buffer overflow. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-41674)
Sönke Huster discovered that a use-after-free vulnerability existed in the
WiFi driver stack in the Linux kernel. A physically proximate attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2022-42719)
Sönke Huster discovered that the WiFi driver stack in the Linux kernel did
not properly perform reference counting in some situations, leading to a
use-after-free vulnerability. A physically proximate attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2022-42720)
Sönke Huster discovered that the WiFi driver stack in the Linux kernel did
not properly handle BSSID/SSID lists in some situations. A physically
proximate attacker could use this to cause a denial of service (infinite
loop). (CVE-2022-42721)
Sönke Huster discovered that the WiFi driver stack in the Linux kernel
contained a NULL pointer dereference vulnerability in certain situations. A
physically proximate attacker could use this to cause a denial of service
(system crash). (CVE-2022-42722)
CVEs:
- https://ubuntu.com/security/CVE-2022-2602
- https://ubuntu.com/security/CVE-2022-41674
- https://ubuntu.com/security/CVE-2022-42719
- https://ubuntu.com/security/CVE-2022-42720
- https://ubuntu.com/security/CVE-2022-42721
- https://ubuntu.com/security/CVE-2022-42722
- https://ubuntu.com/security/CVE-2022-42722
- https://ubuntu.com/security/CVE-2022-41674
- https://ubuntu.com/security/CVE-2022-42721
- https://ubuntu.com/security/CVE-2022-2602
- https://ubuntu.com/security/CVE-2022-42719
- https://ubuntu.com/security/CVE-2022-42720
Title: USN-5636-1: SoS vulnerability
URL: https://ubuntu.com/security/notices/USN-5636-1
Priorities: medium
Description:
It was discovered that SoS incorrectly handled certain data.
An attacker could possibly use this issue to expose sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2022-2806
Title: USN-5658-1: DHCP vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5658-1
Priorities: medium
Description:
It was discovered that DHCP incorrectly handled option reference counting.
A remote attacker could possibly use this issue to cause DHCP servers to
crash, resulting in a denial of service. (CVE-2022-2928)
It was discovered that DHCP incorrectly handled certain memory operations.
A remote attacker could possibly use this issue to cause DHCP clients and
servers to consume resources, leading to a denial of service.
(CVE-2022-2929)
CVEs:
- https://ubuntu.com/security/CVE-2022-2928
- https://ubuntu.com/security/CVE-2022-2929
- https://ubuntu.com/security/CVE-2022-2929
- https://ubuntu.com/security/CVE-2022-2928
Title: USN-5694-1: LibreOffice vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5694-1
Priorities: medium,low
Description:
It was discovered that LibreOffice incorrectly handled links using the
Office URI Schemes. If a user were tricked into opening a specially
crafted document, a remote attacker could use this issue to execute
arbitrary scripts. (CVE-2022-3140)
Thomas Florian discovered that LibreOffice incorrectly handled crashes when
an encrypted document is open. If the document is recovered upon restarting
LibreOffice, subsequent saves of the document were unencrypted. This issue
only affected Ubuntu 18.04 LTS. (CVE-2020-12801)
Jens Müller discovered that LibreOffice incorrectly handled certain
documents containing forms. If a user were tricked into opening a specially
crafted document, a remote attacker could overwrite arbitrary files when
the form was submitted. This issue only affected Ubuntu 18.04 LTS.
(CVE-2020-12803)
It was discovered that LibreOffice incorrectly validated macro signatures.
If a user were tricked into opening a specially crafted document, a remote
attacker could possibly use this issue to execute arbitrary macros. This
issue only affected Ubuntu 18.04 LTS. (CVE-2022-26305)
It was discovered that Libreoffice incorrectly handled encrypting the
master key provided by the user for storing passwords for web connections.
A local attacker could possibly use this issue to obtain access to
passwords stored in the user’s configuration data. This issue only affected
Ubuntu 18.04 LTS. (CVE-2022-26306, CVE-2022-26307)
CVEs:
- https://ubuntu.com/security/CVE-2022-3140
- https://ubuntu.com/security/CVE-2020-12801
- https://ubuntu.com/security/CVE-2020-12803
- https://ubuntu.com/security/CVE-2022-26305
- https://ubuntu.com/security/CVE-2022-26306
- https://ubuntu.com/security/CVE-2022-26307
- https://ubuntu.com/security/CVE-2022-3140
- https://ubuntu.com/security/CVE-2022-26307
- https://ubuntu.com/security/CVE-2022-26306
- https://ubuntu.com/security/CVE-2022-26305
- https://ubuntu.com/security/CVE-2020-12803
- https://ubuntu.com/security/CVE-2020-12801
Title: USN-5688-1: Libksba vulnerability
URL: https://ubuntu.com/security/notices/USN-5688-1
Priorities: high
Description:
It was discovered that an integer overflow could be triggered in Libksba
when decoding certain data. An attacker could use this issue to cause a
denial of service (application crash) or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-3515
Title: USN-5634-1: Linux kernel (OEM) vulnerability
URL: https://ubuntu.com/security/notices/USN-5634-1
Priorities: medium
Description:
Domingo Dirutigliano and Nicola Guerrera discovered that the netfilter
subsystem in the Linux kernel did not properly handle rules that truncated
packets below the packet header size. When such rules are in place, a
remote attacker could possibly use this to cause a denial of service
(system crash).
CVEs:
- https://ubuntu.com/security/CVE-2022-36946
Title: USN-5685-1: FRR vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5685-1
Priorities: medium
Description:
It was discovered that FRR incorrectly handled parsing certain BGP
messages. A remote attacker could possibly use this issue to cause FRR to
crash, resulting in a denial of service. (CVE-2022-37032)
It was discovered that FRR incorrectly handled processing certain BGP
messages. A remote attacker could possibly use this issue to cause FRR to
crash, resulting in a denial of service, obtain sensitive information,
or execute arbitrary code. (CVE-2022-37035)
CVEs:
- https://ubuntu.com/security/CVE-2022-37032
- https://ubuntu.com/security/CVE-2022-37035
- https://ubuntu.com/security/CVE-2022-37032
- https://ubuntu.com/security/CVE-2022-37035
Title: USN-5570-2: zlib vulnerability
URL: https://ubuntu.com/security/notices/USN-5570-2
Priorities: medium
Description:
USN-5570-1 fixed a vulnerability in zlib. This update provides the
corresponding update for Ubuntu 22.04 LTS and Ubuntu 20.04 LTS.
Original advisory details:
Evgeny Legerov discovered that zlib incorrectly handled memory when
performing certain inflate operations. An attacker could use this issue
to cause zlib to crash, resulting in a denial of service, or possibly
execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-37434
Title: USN-5686-1: Git vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5686-1
Priorities: medium
Description:
Cory Snider discovered that Git incorrectly handled certain symbolic links.
An attacker could possibly use this issue to cause an unexpected behaviour.
(CVE-2022-39253)
Kevin Backhouse discovered that Git incorrectly handled certain command strings.
An attacker could possibly use this issue to arbitrary code execution.
(CVE-2022-39260)
CVEs:
- https://ubuntu.com/security/CVE-2022-39253
- https://ubuntu.com/security/CVE-2022-39260
- https://ubuntu.com/security/CVE-2022-39260
- https://ubuntu.com/security/CVE-2022-39253
Title: USN-5651-1: strongSwan vulnerability
URL: https://ubuntu.com/security/notices/USN-5651-1
Priorities: medium
Description:
Lahav Schlesinger discovered that strongSwan incorrectly handled certain OCSP URIs and
and CRL distribution points (CDP) in certificates. A remote attacker could
possibly use this issue to initiate IKE_SAs and send crafted certificates
that contain URIs pointing to servers under their control, which can lead
to a denial-of-service attack.
CVEs:
- https://ubuntu.com/security/CVE-2022-40617
Title: USN-5670-1: .NET 6 vulnerability
URL: https://ubuntu.com/security/notices/USN-5670-1
Priorities: medium
Description:
Edward Thomson discovered that .NET 6 incorrectly handled
permissions for local NuGet cache. A local attacker could
possibly use this issue to execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-41032
Title: USN-5641-1: Squid vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5641-1
Priorities: medium
Description:
Mikhail Evdokimov discovered that Squid incorrectly handled cache manager
ACLs. A remote attacker could possibly use this issue to obtain sensitive
information. This issue only affected Ubuntu 20.04 LTS, and Ubuntu 22.04
LTS. (CVE-2022-41317)
It was discovered that Squid incorrectly handled SSPI and SMB
authentication. A remote attacker could use this issue to cause Squid to
crash, resulting in a denial of service, or possibly obtain sensitive
information. (CVE-2022-41318)
CVEs:
- https://ubuntu.com/security/CVE-2022-41317
- https://ubuntu.com/security/CVE-2022-41318
- https://ubuntu.com/security/CVE-2022-41317
- https://ubuntu.com/security/CVE-2022-41318
Title: USN-5653-1: Django vulnerability
URL: https://ubuntu.com/security/notices/USN-5653-1
Priorities: medium
Description:
Benjamin Balder Bach discovered that Django incorrectly handled certain
internationalized URLs. A remote attacker could possibly use this issue to
cause Django to crash, resulting in a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2022-41323
Available in VMware Tanzu Network
Release Date: September 21, 2022
BOSH Agent Version: 2.468.0
Title: USN-5585-1: Jupyter Notebook vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5585-1
Priorities: medium,low
Description:
It was discovered that Jupyter Notebook incorrectly handled certain notebooks.
An attacker could possibly use this issue of lack of Content Security Policy
in Nbconvert to perform cross-site scripting (XSS) attacks on the notebook
server. This issue only affected Ubuntu 18.04 LTS. (CVE-2018-19351)
It was discovered that Jupyter Notebook incorrectly handled certain SVG
documents. An attacker could possibly use this issue to perform cross-site
scripting (XSS) attacks. This issue only affected Ubuntu 18.04 LTS.
(CVE-2018-21030)
It was discovered that Jupyter Notebook incorrectly filtered certain URLs on
the login page. An attacker could possibly use this issue to perform
open-redirect attack. This issue only affected Ubuntu 18.04 LTS.
(CVE-2019-10255)
It was discovered that Jupyter Notebook had an incomplete fix for
CVE-2019-10255. An attacker could possibly use this issue to perform
open-redirect attack using empty netloc. (CVE-2019-10856)
It was discovered that Jupyter Notebook incorrectly handled the inclusion of
remote pages on Jupyter server. An attacker could possibly use this issue to
perform cross-site script inclusion (XSSI) attacks. This issue only affected
Ubuntu 18.04 LTS. (CVE-2019-9644)
It was discovered that Jupyter Notebook incorrectly filtered certain URLs to a
notebook. An attacker could possibly use this issue to perform open-redirect
attack. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS.
(CVE-2020-26215)
It was discovered that Jupyter Notebook server access logs were not protected.
An attacker having access to the notebook server could possibly use this issue
to get access to steal sensitive information such as auth/cookies.
(CVE-2022-24758)
It was discovered that Jupyter Notebook incorrectly configured hidden files on
the server. An authenticated attacker could possibly use this issue to see
unwanted sensitive hidden files from the server which may result in getting
full access to the server. This issue only affected Ubuntu 20.04 LTS and
Ubuntu 22.04 LTS. (CVE-2022-29238)
CVEs:
- https://ubuntu.com/security/CVE-2018-19351
- https://ubuntu.com/security/CVE-2018-21030
- https://ubuntu.com/security/CVE-2019-10255
- https://ubuntu.com/security/CVE-2019-10255
- https://ubuntu.com/security/CVE-2019-10856
- https://ubuntu.com/security/CVE-2019-9644
- https://ubuntu.com/security/CVE-2020-26215
- https://ubuntu.com/security/CVE-2022-24758
- https://ubuntu.com/security/CVE-2022-29238
- https://ubuntu.com/security/CVE-2022-24758
- https://ubuntu.com/security/CVE-2019-9644
- https://ubuntu.com/security/CVE-2022-29238
- https://ubuntu.com/security/CVE-2018-21030
- https://ubuntu.com/security/CVE-2020-26215
- https://ubuntu.com/security/CVE-2019-10856
- https://ubuntu.com/security/CVE-2019-10255
- https://ubuntu.com/security/CVE-2018-19351
Title: USN-5575-1: Libxslt vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5575-1
Priorities: medium
Description:
Nicolas Grégoire discovered that Libxslt incorrectly handled certain XML.
An attacker could possibly use this issue to expose sensitive information
or execute arbitrary code. This issue only affected Ubuntu 18.04 LTS.
(CVE-2019-5815)
Alexey Neyman incorrectly handled certain HTML pages.
An attacker could possibly use this issue to expose sensitive information
or execute arbitrary code. (CVE-2021-30560)
CVEs:
- https://ubuntu.com/security/CVE-2019-5815
- https://ubuntu.com/security/CVE-2021-30560
- https://ubuntu.com/security/CVE-2019-5815
- https://ubuntu.com/security/CVE-2021-30560
Title: USN-5619-1: LibTIFF vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5619-1
Priorities: negligible,medium,low
Description:
It was discovered that LibTIFF was not properly performing the calculation
of data that would eventually be used as a reference for bound-checking
operations. An attacker could possibly use this issue to cause a denial of
service or to expose sensitive information. This issue only affected Ubuntu
18.04 LTS. (CVE-2020-19131)
It was discovered that LibTIFF was not properly terminating a function
execution when processing incorrect data. An attacker could possibly use
this issue to cause a denial of service or to expose sensitive information.
This issue only affected Ubuntu 18.04 LTS. (CVE-2020-19144)
It was discovered that LibTIFF did not properly manage memory under certain
circumstances. If a user were tricked into opening a specially crafted TIFF
file using tiffinfo tool, an attacker could possibly use this issue to
cause a denial of service. This issue only affected Ubuntu 20.04 LTS and
Ubuntu 22.04 LTS. (CVE-2022-1354)
It was discovered that LibTIFF did not properly manage memory under certain
circumstances. If a user were tricked into opening a specially crafted TIFF
file using tiffcp tool, an attacker could possibly use this issue to
cause a denial of service. (CVE-2022-1355)
It was discovered that LibTIFF was not properly performing checks to avoid
division calculations where the denominator value was zero, which could
lead to an undefined behaviour situation via a specially crafted file. An
attacker could possibly use this issue to cause a denial of service.
(CVE-2022-2056, CVE-2022-2057, CVE-2022-2058)
CVEs:
- https://ubuntu.com/security/CVE-2020-19131
- https://ubuntu.com/security/CVE-2020-19144
- https://ubuntu.com/security/CVE-2022-1354
- https://ubuntu.com/security/CVE-2022-1355
- https://ubuntu.com/security/CVE-2022-2056
- https://ubuntu.com/security/CVE-2022-2057
- https://ubuntu.com/security/CVE-2022-2058
- https://ubuntu.com/security/CVE-2020-19144
- https://ubuntu.com/security/CVE-2022-1354
- https://ubuntu.com/security/CVE-2022-2056
- https://ubuntu.com/security/CVE-2022-2058
- https://ubuntu.com/security/CVE-2022-2057
- https://ubuntu.com/security/CVE-2020-19131
- https://ubuntu.com/security/CVE-2022-1355
Title: USN-5596-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5596-1
Priorities: medium
Description:
Asaf Modelevsky discovered that the Intel(R) 10GbE PCI Express (ixgbe)
Ethernet driver for the Linux kernel performed insufficient control flow
management. A local attacker could possibly use this to cause a denial of
service. (CVE-2021-33061)
It was discovered that the framebuffer driver on the Linux kernel did not
verify size limits when changing font or screen size, leading to an out-of-
bounds write. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2021-33655)
CVEs:
- https://ubuntu.com/security/CVE-2021-33061
- https://ubuntu.com/security/CVE-2021-33655
- https://ubuntu.com/security/CVE-2021-33061
- https://ubuntu.com/security/CVE-2021-33655
Title: USN-5594-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5594-1
Priorities: medium,low
Description:
Asaf Modelevsky discovered that the Intel(R) 10GbE PCI Express (ixgbe)
Ethernet driver for the Linux kernel performed insufficient control flow
management. A local attacker could possibly use this to cause a denial of
service. (CVE-2021-33061)
It was discovered that the IP implementation in the Linux kernel did not
provide sufficient randomization when calculating port offsets. An attacker
could possibly use this to expose sensitive information. (CVE-2022-1012)
Norbert Slusarek discovered that a race condition existed in the perf
subsystem in the Linux kernel, resulting in a use-after-free vulnerability.
A privileged local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-1729)
Qiuhao Li, Gaoning Pan, and Yongkang Jia discovered that the KVM hypervisor
implementation in the Linux kernel did not properly handle an illegal
instruction in a guest, resulting in a null pointer dereference. An
attacker in a guest VM could use this to cause a denial of service (system
crash) in the host OS. (CVE-2022-1852)
It was discovered that the UDF file system implementation in the Linux
kernel contained an out-of-bounds write vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2022-1943)
Gerald Lee discovered that the NTFS file system implementation in the Linux
kernel did not properly handle certain error conditions, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly expose sensitive information.
(CVE-2022-1973)
It was discovered that the device-mapper verity (dm-verity) driver in the
Linux kernel did not properly verify targets being loaded into the device-
mapper table. A privileged attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2022-2503)
Zheyu Ma discovered that the Intel iSMT SMBus host controller driver in the
Linux kernel contained an out-of-bounds write vulnerability. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2022-2873)
Selim Enes Karaduman discovered that a race condition existed in the pipe
buffers implementation of the Linux kernel. A local attacker could use this
to cause a denial of service (system crash) or possibly escalate
privileges. (CVE-2022-2959)
CVEs:
- https://ubuntu.com/security/CVE-2021-33061
- https://ubuntu.com/security/CVE-2022-1012
- https://ubuntu.com/security/CVE-2022-1729
- https://ubuntu.com/security/CVE-2022-1852
- https://ubuntu.com/security/CVE-2022-1943
- https://ubuntu.com/security/CVE-2022-1973
- https://ubuntu.com/security/CVE-2022-2503
- https://ubuntu.com/security/CVE-2022-2873
- https://ubuntu.com/security/CVE-2022-2959
- https://ubuntu.com/security/CVE-2022-1973
- https://ubuntu.com/security/CVE-2022-1729
- https://ubuntu.com/security/CVE-2022-1852
- https://ubuntu.com/security/CVE-2022-2959
- https://ubuntu.com/security/CVE-2021-33061
- https://ubuntu.com/security/CVE-2022-1943
- https://ubuntu.com/security/CVE-2022-2873
- https://ubuntu.com/security/CVE-2022-1012
- https://ubuntu.com/security/CVE-2022-2503
Title: USN-5599-1: Linux kernel (Oracle) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5599-1
Priorities: medium,low
Description:
Asaf Modelevsky discovered that the Intel(R) 10GbE PCI Express (ixgbe)
Ethernet driver for the Linux kernel performed insufficient control flow
management. A local attacker could possibly use this to cause a denial of
service. (CVE-2021-33061)
It was discovered that the IP implementation in the Linux kernel did not
provide sufficient randomization when calculating port offsets. An attacker
could possibly use this to expose sensitive information. (CVE-2022-1012)
Norbert Slusarek discovered that a race condition existed in the perf
subsystem in the Linux kernel, resulting in a use-after-free vulnerability.
A privileged local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-1729)
Qiuhao Li, Gaoning Pan, and Yongkang Jia discovered that the KVM hypervisor
implementation in the Linux kernel did not properly handle an illegal
instruction in a guest, resulting in a null pointer dereference. An
attacker in a guest VM could use this to cause a denial of service (system
crash) in the host OS. (CVE-2022-1852)
It was discovered that the UDF file system implementation in the Linux
kernel contained an out-of-bounds write vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2022-1943)
Gerald Lee discovered that the NTFS file system implementation in the Linux
kernel did not properly handle certain error conditions, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly expose sensitive information.
(CVE-2022-1973)
It was discovered that the device-mapper verity (dm-verity) driver in the
Linux kernel did not properly verify targets being loaded into the device-
mapper table. A privileged attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2022-2503)
Zheyu Ma discovered that the Intel iSMT SMBus host controller driver in the
Linux kernel contained an out-of-bounds write vulnerability. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2022-2873)
Selim Enes Karaduman discovered that a race condition existed in the pipe
buffers implementation of the Linux kernel. A local attacker could use this
to cause a denial of service (system crash) or possibly escalate
privileges. (CVE-2022-2959)
CVEs:
- https://ubuntu.com/security/CVE-2021-33061
- https://ubuntu.com/security/CVE-2022-1012
- https://ubuntu.com/security/CVE-2022-1729
- https://ubuntu.com/security/CVE-2022-1852
- https://ubuntu.com/security/CVE-2022-1943
- https://ubuntu.com/security/CVE-2022-1973
- https://ubuntu.com/security/CVE-2022-2503
- https://ubuntu.com/security/CVE-2022-2873
- https://ubuntu.com/security/CVE-2022-2959
- https://ubuntu.com/security/CVE-2022-2959
- https://ubuntu.com/security/CVE-2021-33061
- https://ubuntu.com/security/CVE-2022-1943
- https://ubuntu.com/security/CVE-2022-2503
- https://ubuntu.com/security/CVE-2022-1012
- https://ubuntu.com/security/CVE-2022-1973
- https://ubuntu.com/security/CVE-2022-1852
- https://ubuntu.com/security/CVE-2022-1729
- https://ubuntu.com/security/CVE-2022-2873
Title: USN-5602-1: Linux kernel (Raspberry Pi) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5602-1
Priorities: medium,low
Description:
Asaf Modelevsky discovered that the Intel(R) 10GbE PCI Express (ixgbe)
Ethernet driver for the Linux kernel performed insufficient control flow
management. A local attacker could possibly use this to cause a denial of
service. (CVE-2021-33061)
It was discovered that the IP implementation in the Linux kernel did not
provide sufficient randomization when calculating port offsets. An attacker
could possibly use this to expose sensitive information. (CVE-2022-1012)
Norbert Slusarek discovered that a race condition existed in the perf
subsystem in the Linux kernel, resulting in a use-after-free vulnerability.
A privileged local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-1729)
Qiuhao Li, Gaoning Pan, and Yongkang Jia discovered that the KVM hypervisor
implementation in the Linux kernel did not properly handle an illegal
instruction in a guest, resulting in a null pointer dereference. An
attacker in a guest VM could use this to cause a denial of service (system
crash) in the host OS. (CVE-2022-1852)
It was discovered that the UDF file system implementation in the Linux
kernel contained an out-of-bounds write vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2022-1943)
Gerald Lee discovered that the NTFS file system implementation in the Linux
kernel did not properly handle certain error conditions, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly expose sensitive information.
(CVE-2022-1973)
It was discovered that the device-mapper verity (dm-verity) driver in the
Linux kernel did not properly verify targets being loaded into the device-
mapper table. A privileged attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2022-2503)
Zheyu Ma discovered that the Intel iSMT SMBus host controller driver in the
Linux kernel contained an out-of-bounds write vulnerability. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2022-2873)
Selim Enes Karaduman discovered that a race condition existed in the pipe
buffers implementation of the Linux kernel. A local attacker could use this
to cause a denial of service (system crash) or possibly escalate
privileges. (CVE-2022-2959)
CVEs:
- https://ubuntu.com/security/CVE-2021-33061
- https://ubuntu.com/security/CVE-2022-1012
- https://ubuntu.com/security/CVE-2022-1729
- https://ubuntu.com/security/CVE-2022-1852
- https://ubuntu.com/security/CVE-2022-1943
- https://ubuntu.com/security/CVE-2022-1973
- https://ubuntu.com/security/CVE-2022-2503
- https://ubuntu.com/security/CVE-2022-2873
- https://ubuntu.com/security/CVE-2022-2959
- https://ubuntu.com/security/CVE-2022-2959
- https://ubuntu.com/security/CVE-2021-33061
- https://ubuntu.com/security/CVE-2022-1943
- https://ubuntu.com/security/CVE-2022-2503
- https://ubuntu.com/security/CVE-2022-1012
- https://ubuntu.com/security/CVE-2022-1973
- https://ubuntu.com/security/CVE-2022-1852
- https://ubuntu.com/security/CVE-2022-1729
- https://ubuntu.com/security/CVE-2022-2873
Title: USN-5616-1: Linux kernel (Intel IoTG) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5616-1
Priorities: medium,low
Description:
Asaf Modelevsky discovered that the Intel(R) 10GbE PCI Express (ixgbe)
Ethernet driver for the Linux kernel performed insufficient control flow
management. A local attacker could possibly use this to cause a denial of
service. (CVE-2021-33061)
Moshe Kol, Amit Klein and Yossi Gilad discovered that the IP implementation
in the Linux kernel did notprovide sufficient randomization when
calculating port offsets. An attacker could possibly use this to expose
sensitive information. (CVE-2022-1012, CVE-2022-32296)
Norbert Slusarek discovered that a race condition existed in the perf
subsystem in the Linux kernel, resulting in a use-after-free vulnerability.
A privileged local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-1729)
Qiuhao Li, Gaoning Pan, and Yongkang Jia discovered that the KVM hypervisor
implementation in the Linux kernel did not properly handle an illegal
instruction in a guest, resulting in a null pointer dereference. An
attacker in a guest VM could use this to cause a denial of service (system
crash) in the host OS. (CVE-2022-1852)
It was discovered that the UDF file system implementation in the Linux
kernel contained an out-of-bounds write vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2022-1943)
Gerald Lee discovered that the NTFS file system implementation in the Linux
kernel did not properly handle certain error conditions, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly expose sensitive information.
(CVE-2022-1973)
It was discovered that the device-mapper verity (dm-verity) driver in the
Linux kernel did not properly verify targets being loaded into the device-
mapper table. A privileged attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2022-2503)
Zheyu Ma discovered that the Intel iSMT SMBus host controller driver in the
Linux kernel contained an out-of-bounds write vulnerability. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2022-2873)
Selim Enes Karaduman discovered that a race condition existed in the pipe
buffers implementation of the Linux kernel. A local attacker could use this
to cause a denial of service (system crash) or possibly escalate
privileges. (CVE-2022-2959)
CVEs:
- https://ubuntu.com/security/CVE-2021-33061
- https://ubuntu.com/security/CVE-2022-1012
- https://ubuntu.com/security/CVE-2022-32296
- https://ubuntu.com/security/CVE-2022-1729
- https://ubuntu.com/security/CVE-2022-1852
- https://ubuntu.com/security/CVE-2022-1943
- https://ubuntu.com/security/CVE-2022-1973
- https://ubuntu.com/security/CVE-2022-2503
- https://ubuntu.com/security/CVE-2022-2873
- https://ubuntu.com/security/CVE-2022-2959
- https://ubuntu.com/security/CVE-2022-1973
- https://ubuntu.com/security/CVE-2022-1729
- https://ubuntu.com/security/CVE-2022-1852
- https://ubuntu.com/security/CVE-2022-2959
- https://ubuntu.com/security/CVE-2021-33061
- https://ubuntu.com/security/CVE-2022-32296
- https://ubuntu.com/security/CVE-2022-1943
- https://ubuntu.com/security/CVE-2022-2873
- https://ubuntu.com/security/CVE-2022-1012
- https://ubuntu.com/security/CVE-2022-2503
Title: USN-5614-1: Wayland vulnerability
URL: https://ubuntu.com/security/notices/USN-5614-1
Priorities: medium
Description:
It was discovered that Wayland incorrectly handled reference counting
certain objects. An attacker could use this issue to cause Wayland to
crash, resulting in a denial of service, or possibly execute arbitrary
code.
CVEs:
- https://ubuntu.com/security/CVE-2021-3782
Title: USN-5607-1: GDK-PixBuf vulnerability
URL: https://ubuntu.com/security/notices/USN-5607-1
Priorities: medium
Description:
It was discovered that GDK-PixBuf incorrectly handled certain images.
An attacker could possibly use this issue to execute arbitrary code
or cause a crash.
CVEs:
- https://ubuntu.com/security/CVE-2021-44648
Title: USN-5613-1: Vim vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5613-1
Priorities: medium
Description:
It was discovered that Vim was not properly performing bounds checks
when executing spell suggestion commands. An attacker could possibly use
this issue to cause a denial of service or execute arbitrary code.
(CVE-2022-0943)
It was discovered that Vim was using freed memory when dealing with
regular expressions through its old regular expression engine. If a user
were tricked into opening a specially crafted file, an attacker could
crash the application, leading to a denial of service, or possibly achieve
code execution. (CVE-2022-1154)
It was discovered that Vim was not properly performing checks on name of
lambda functions. An attacker could possibly use this issue to cause a
denial of service. This issue affected only Ubuntu 22.04 LTS.
(CVE-2022-1420)
It was discovered that Vim was incorrectly performing bounds checks
when processing invalid commands with composing characters in Ex
mode. An attacker could possibly use this issue to cause a denial of
service or execute arbitrary code. (CVE-2022-1616)
It was discovered that Vim was not properly processing latin1 data
when issuing Ex commands. An attacker could possibly use this issue to
cause a denial of service or execute arbitrary code. (CVE-2022-1619)
It was discovered that Vim was not properly performing memory
management when dealing with invalid regular expression patterns in
buffers. An attacker could possibly use this issue to cause a denial of
service. (CVE-2022-1620)
It was discovered that Vim was not properly processing invalid bytes
when performing spell check operations. An attacker could possibly use
this issue to cause a denial of service or execute arbitrary code.
(CVE-2022-1621)
CVEs:
- https://ubuntu.com/security/CVE-2022-0943
- https://ubuntu.com/security/CVE-2022-1154
- https://ubuntu.com/security/CVE-2022-1420
- https://ubuntu.com/security/CVE-2022-1616
- https://ubuntu.com/security/CVE-2022-1619
- https://ubuntu.com/security/CVE-2022-1620
- https://ubuntu.com/security/CVE-2022-1621
- https://ubuntu.com/security/CVE-2022-1621
- https://ubuntu.com/security/CVE-2022-1616
- https://ubuntu.com/security/CVE-2022-1620
- https://ubuntu.com/security/CVE-2022-1154
- https://ubuntu.com/security/CVE-2022-1420
- https://ubuntu.com/security/CVE-2022-0943
- https://ubuntu.com/security/CVE-2022-1619
Title: USN-5612-1: Intel Microcode vulnerability
URL: https://ubuntu.com/security/notices/USN-5612-1
Priorities: medium
Description:
Pietro Borrello, Andreas Kogler, Martin Schwarzl, Daniel Gruss, Michael
Schwarz and Moritz Lipp discovered that some Intel processors did not
properly clear data between subsequent xAPIC MMIO reads. This could allow a
local attacker to compromise SGX enclaves.
CVEs:
- https://ubuntu.com/security/CVE-2022-21233
Title: USN-5608-1: DPDK vulnerability
URL: https://ubuntu.com/security/notices/USN-5608-1
Priorities: medium
Description:
It was discovered that DPDK incorrectly handled certain Vhost headers. A
remote attacker could possibly use this issue to cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2022-2132
Title: USN-5610-1: rust-regex vulnerability
URL: https://ubuntu.com/security/notices/USN-5610-1
Priorities: medium
Description:
Addison Crump discovered that rust-regex did not properly limit
the complexity of the regular expressions (regex) it parses.
An attacker could possibly use this issue to cause a denial of
service.
CVEs:
- https://ubuntu.com/security/CVE-2022-24713
Title: USN-5576-1: Twisted vulnerability
URL: https://ubuntu.com/security/notices/USN-5576-1
Priorities: medium
Description:
It was discovered that Twisted incorrectly parsed some types of HTTP requests
in its web server implementation. In certain proxy or multi-server
configurations, a remote attacker could craft malicious HTTP requests in order
to obtain sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2022-24801
Title: USN-5584-1: Schroot vulnerability
URL: https://ubuntu.com/security/notices/USN-5584-1
Priorities: medium
Description:
It was discovered that Schroot incorrectly handled certain Schroot names.
An attacker could possibly use this issue to break schroot’s internal
state causing a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2022-2787
Title: USN-5578-1: Open VM Tools vulnerability
URL: https://ubuntu.com/security/notices/USN-5578-1
Priorities: medium
Description:
It was discovered that Open VM Tools incorrectly handled certain requests.
An attacker inside the guest could possibly use this issue to gain root
privileges inside the virtual machine.
CVEs:
- https://ubuntu.com/security/CVE-2022-31676
Title: USN-5611-1: WebKitGTK vulnerability
URL: https://ubuntu.com/security/notices/USN-5611-1
Priorities: medium
Description:
Several security issues were discovered in the WebKitGTK Web and JavaScript
engines. If a user were tricked into viewing a malicious website, a remote
attacker could exploit a variety of issues related to web browser security,
including cross-site scripting attacks, denial of service attacks, and
arbitrary code execution.
CVEs:
- https://ubuntu.com/security/CVE-2022-32893
Title: USN-5606-1: poppler vulnerability
URL: https://ubuntu.com/security/notices/USN-5606-1
Priorities: medium
Description:
It was discovered that poppler incorrectly handled certain
PDF. An attacker could possibly use this issue to cause a
denial of service or execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-38784
Available in VMware Tanzu Network
Release Date: August 22, 2022
BOSH Agent Version: 2.461.0
Title: USN-5542-1: Samba vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5542-1
Priorities: low,medium
Description:
It was discovered that Samba did not handle MaxQueryDuration when being
used in AD DC configurations, contrary to expectations. This issue only
affected Ubuntu 20.04 LTS. (CVE-2021-3670)
Luke Howard discovered that Samba incorrectly handled certain restrictions
associated with changing passwords. A remote attacker being requested to
change passwords could possibly use this issue to escalate privileges.
(CVE-2022-2031)
Luca Moro discovered that Samba incorrectly handled certain SMB1
communications. A remote attacker could possibly use this issue to obtain
sensitive memory contents. (CVE-2022-32742)
Joseph Sutton discovered that Samba incorrectly handled certain password
change requests. A remote attacker could use this issue to change passwords
of other users, resulting in privilege escalation. (CVE-2022-32744)
Joseph Sutton discovered that Samba incorrectly handled certain LDAP add or
modify requests. A remote attacker could possibly use this issue to cause
Samba to crash, resulting in a denial of service. (CVE-2022-32745)
Joseph Sutton and Andrew Bartlett discovered that Samba incorrectly handled
certain LDAP add or modify requests. A remote attacker could possibly use
this issue to cause Samba to crash, resulting in a denial of service.
(CVE-2022-32746)
CVEs:
- https://ubuntu.com/security/CVE-2021-3670
- https://ubuntu.com/security/CVE-2022-2031
- https://ubuntu.com/security/CVE-2022-32742
- https://ubuntu.com/security/CVE-2022-32744
- https://ubuntu.com/security/CVE-2022-32745
- https://ubuntu.com/security/CVE-2022-32746
- https://ubuntu.com/security/CVE-2022-32744
- https://ubuntu.com/security/CVE-2022-32745
- https://ubuntu.com/security/CVE-2022-32742
- https://ubuntu.com/security/CVE-2022-32746
- https://ubuntu.com/security/CVE-2021-3670
- https://ubuntu.com/security/CVE-2022-2031
Title: USN-5561-1: GNOME Web vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5561-1
Priorities: medium
Description:
It was discovered that GNOME Web incorrectly filtered certain strings. A
remote attacker could use this issue to perform cross-site scripting (XSS)
attacks. This issue only affected Ubuntu 20.04 LTS. (CVE-2021-45085,
CVE-2021-45086, CVE-2021-45087)
It was discovered that GNOME Web incorrectly handled certain long page
titles. A remote attacker could use this issue to cause GNOME Web to crash,
resulting in a denial of service, or possibly execute arbitrary code.
(CVE-2022-29536)
CVEs:
- https://ubuntu.com/security/CVE-2021-45085
- https://ubuntu.com/security/CVE-2021-45086
- https://ubuntu.com/security/CVE-2021-45087
- https://ubuntu.com/security/CVE-2022-29536
- https://ubuntu.com/security/CVE-2022-29536
- https://ubuntu.com/security/CVE-2021-45086
- https://ubuntu.com/security/CVE-2021-45087
- https://ubuntu.com/security/CVE-2021-45085
Title: USN-5538-1: libtirpc vulnerability
URL: https://ubuntu.com/security/notices/USN-5538-1
Priorities: medium
Description:
It was discovered that libtirpc incorrectly handled certain inputs.
An attacker could possibly use this issue to cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2021-46828
Title: USN-5544-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5544-1
Priorities: medium
Description:
It was discovered that the Atheros ath9k wireless device driver in the
Linux kernel did not properly handle some error conditions, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-1679)
Felix Fu discovered that the Sun RPC implementation in the Linux kernel did
not properly handle socket states, leading to a use-after-free
vulnerability. A remote attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2022-28893)
Arthur Mongodin discovered that the netfilter subsystem in the Linux kernel
did not properly perform data validation. A local attacker could use this
to escalate privileges in certain situations. (CVE-2022-34918)
Minh Yuan discovered that the floppy disk driver in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2022-1652)
CVEs:
- https://ubuntu.com/security/CVE-2022-1679
- https://ubuntu.com/security/CVE-2022-28893
- https://ubuntu.com/security/CVE-2022-34918
- https://ubuntu.com/security/CVE-2022-1652
- https://ubuntu.com/security/CVE-2022-1679
- https://ubuntu.com/security/CVE-2022-28893
- https://ubuntu.com/security/CVE-2022-1652
- https://ubuntu.com/security/CVE-2022-34918
Title: USN-5546-1: OpenJDK vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5546-1
Priorities: high,medium
Description:
Neil Madden discovered that OpenJDK did not properly verify ECDSA
signatures. A remote attacker could possibly use this issue to insert,
edit or obtain sensitive information. This issue only affected OpenJDK
17 and OpenJDK 18. (CVE-2022-21449)
It was discovered that OpenJDK incorrectly limited memory when compiling a
specially crafted XPath expression. An attacker could possibly use this
issue to cause a denial of service. This issue was fixed in OpenJDK 8 and
OpenJDK 18. USN-5388-1 and USN-5388-2 addressed this issue in OpenJDK 11
and OpenJDK 17. (CVE-2022-21426)
It was discovered that OpenJDK incorrectly handled converting certain
object arguments into their textual representations. An attacker could
possibly use this issue to cause a denial of service. This issue was
fixed in OpenJDK 8 and OpenJDK 18. USN-5388-1 and USN-5388-2 addressed
this issue in OpenJDK 11 and OpenJDK 17. (CVE-2022-21434)
It was discovered that OpenJDK incorrectly validated the encoded length of
certain object identifiers. An attacker could possibly use this issue to
cause a denial of service. This issue was fixed in OpenJDK 8 and OpenJDK 18.
USN-5388-1 and USN-5388-2 addressed this issue in OpenJDK 11 and OpenJDK 17.
(CVE-2022-21443)
It was discovered that OpenJDK incorrectly validated certain paths. An
attacker could possibly use this issue to bypass the secure validation
feature and expose sensitive information in XML files. This issue was
fixed in OpenJDK 8 and OpenJDK 18. USN-5388-1 and USN-5388-2 addressed this
issue in OpenJDK 11 and OpenJDK 17. (CVE-2022-21476)
It was discovered that OpenJDK incorrectly parsed certain URI strings. An
attacker could possibly use this issue to make applications accept
invalid of malformed URI strings. This issue was fixed in OpenJDK 8 and
OpenJDK 18. USN-5388-1 and USN-5388-2 addressed this issue in OpenJDK 11
and OpenJDK 17. (CVE-2022-21496)
It was discovered that OpenJDK incorrectly generated class code in the
Hotspot component. An attacker could possibly use this issue to obtain
sensitive information. (CVE-2022-21540)
It was dicovered that OpenJDK incorrectly restricted access to the
invokeBasic() method in the Hotspot component. An attacker could possibly
use this issue to insert, edit or obtain sensitive information.
(CVE-2022-21541)
It was discovered that OpenJDK incorrectly computed exponentials. An
attacker could possibly use this issue to insert, edit or obtain sensitive
information. This issue only affected OpenJDK 17.
(CVE-2022-21549)
It was discovered that OpenJDK includes a copy of Xalan that incorrectly
handled integer truncation. An attacker could possibly use this issue to
execute arbitrary code. (CVE-2022-34169)
CVEs:
- https://ubuntu.com/security/CVE-2022-21449
- https://ubuntu.com/security/CVE-2022-21426
- https://ubuntu.com/security/CVE-2022-21434
- https://ubuntu.com/security/CVE-2022-21443
- https://ubuntu.com/security/CVE-2022-21476
- https://ubuntu.com/security/CVE-2022-21496
- https://ubuntu.com/security/CVE-2022-21540
- https://ubuntu.com/security/CVE-2022-21541
- https://ubuntu.com/security/CVE-2022-21549
- https://ubuntu.com/security/CVE-2022-34169
- https://ubuntu.com/security/CVE-2022-21541
- https://ubuntu.com/security/CVE-2022-21540
- https://ubuntu.com/security/CVE-2022-21549
- https://ubuntu.com/security/CVE-2022-21426
- https://ubuntu.com/security/CVE-2022-21476
- https://ubuntu.com/security/CVE-2022-34169
- https://ubuntu.com/security/CVE-2022-21443
- https://ubuntu.com/security/CVE-2022-21449
- https://ubuntu.com/security/CVE-2022-21434
- https://ubuntu.com/security/CVE-2022-21496
Title: USN-5537-1: MySQL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5537-1
Priorities: low,medium
Description:
Multiple security issues were discovered in MySQL and this update includes
new upstream MySQL versions to fix these issues.
MySQL has been updated to 8.0.30 in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
Ubuntu 18.04 LTS has been updated to MySQL 5.7.39.
In addition to security fixes, the updated packages contain bug fixes, new
features, and possibly incompatible changes.
Please see the following for more information:
https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-39.html
https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-30.html
https://www.oracle.com/security-alerts/cpujul2022.html
CVEs:
- https://ubuntu.com/security/CVE-2022-21517
- https://ubuntu.com/security/CVE-2022-21569
- https://ubuntu.com/security/CVE-2022-21515
- https://ubuntu.com/security/CVE-2022-21509
- https://ubuntu.com/security/CVE-2022-21530
- https://ubuntu.com/security/CVE-2022-21528
- https://ubuntu.com/security/CVE-2022-21529
- https://ubuntu.com/security/CVE-2022-21553
- https://ubuntu.com/security/CVE-2022-21525
- https://ubuntu.com/security/CVE-2022-21537
- https://ubuntu.com/security/CVE-2022-21531
- https://ubuntu.com/security/CVE-2022-21534
- https://ubuntu.com/security/CVE-2022-21526
- https://ubuntu.com/security/CVE-2022-21538
- https://ubuntu.com/security/CVE-2022-21527
- https://ubuntu.com/security/CVE-2022-21539
- https://ubuntu.com/security/CVE-2022-21547
- https://ubuntu.com/security/CVE-2022-21522
Title: USN-5568-1: WebKitGTK vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5568-1
Priorities: medium
Description:
Several security issues were discovered in the WebKitGTK Web and JavaScript
engines. If a user were tricked into viewing a malicious website, a remote
attacker could exploit a variety of issues related to web browser security,
including cross-site scripting attacks, denial of service attacks, and
arbitrary code execution.
CVEs:
- https://ubuntu.com/security/CVE-2022-2294
- https://ubuntu.com/security/CVE-2022-32792
- https://ubuntu.com/security/CVE-2022-32816
Title: USN-5543-1: Net-SNMP vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5543-1
Priorities: medium
Description:
Yu Zhang and Nanyu Zhong discovered that Net-SNMP incorrectly handled
memory operations when processing certain requests. A remote attacker could
use this issue to cause Net-SNMP to crash, resulting in a denial of
service, or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-24806
- https://ubuntu.com/security/CVE-2022-24808
- https://ubuntu.com/security/CVE-2022-24809
- https://ubuntu.com/security/CVE-2022-24805
- https://ubuntu.com/security/CVE-2022-24810
- https://ubuntu.com/security/CVE-2022-24807
Title: USN-5564-1: Linux kernel (Intel IoTG) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5564-1
Priorities: high,medium,low
Description:
Zhenpeng Lin discovered that the network packet scheduler implementation in
the Linux kernel did not properly remove all references to a route filter
before freeing it in some situations. A local attacker could use this to
cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-2588)
It was discovered that the netfilter subsystem of the Linux kernel did not
prevent one nft object from referencing an nft set in another nft table,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-2586)
It was discovered that the implementation of POSIX timers in the Linux
kernel did not properly clean up timers in some situations. A local
attacker could use this to cause a denial of service (system crash) or
execute arbitrary code. (CVE-2022-2585)
It was discovered that the eBPF implementation in the Linux kernel did not
properly prevent writes to kernel objects in BPF_BTF_LOAD commands. A
privileged local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-0500)
Minh Yuan discovered that the floppy disk driver in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2022-1652)
It was discovered that the Atheros ath9k wireless device driver in the
Linux kernel did not properly handle some error conditions, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-1679)
It was discovered that the Marvell NFC device driver implementation in the
Linux kernel did not properly perform memory cleanup operations in some
situations, leading to a use-after-free vulnerability. A local attacker
could possibly use this to cause a denial of service (system crash) or
execute arbitrary code. (CVE-2022-1734)
Yongkang Jia discovered that the KVM hypervisor implementation in the Linux
kernel did not properly handle guest TLB mapping invalidation requests in
some situations. An attacker in a guest VM could use this to cause a denial
of service (system crash) in the host OS. (CVE-2022-1789)
Duoming Zhou discovered a race condition in the NFC subsystem in the Linux
kernel, leading to a use-after-free vulnerability. A privileged local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-1974)
Duoming Zhou discovered that the NFC subsystem in the Linux kernel did not
properly prevent context switches from occurring during certain atomic
context operations. A privileged local attacker could use this to cause a
denial of service (system crash). (CVE-2022-1975)
Felix Fu discovered that the Sun RPC implementation in the Linux kernel did
not properly handle socket states, leading to a use-after-free
vulnerability. A remote attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2022-28893)
Johannes Wikner and Kaveh Razavi discovered that for some AMD x86-64
processors, the branch predictor could by mis-trained for return
instructions in certain circumstances. A local attacker could possibly use
this to expose sensitive information. (CVE-2022-29900)
Johannes Wikner and Kaveh Razavi discovered that for some Intel x86-64
processors, the Linux kernel’s protections against speculative branch
target injection attacks were insufficient in some circumstances. A local
attacker could possibly use this to expose sensitive information.
(CVE-2022-29901)
Minh Yuan discovered that the floppy driver in the Linux kernel contained a
race condition in some situations, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-33981)
Arthur Mongodin discovered that the netfilter subsystem in the Linux kernel
did not properly perform data validation. A local attacker could use this
to escalate privileges in certain situations. (CVE-2022-34918)
CVEs:
- https://ubuntu.com/security/CVE-2022-2588
- https://ubuntu.com/security/CVE-2022-2586
- https://ubuntu.com/security/CVE-2022-2585
- https://ubuntu.com/security/CVE-2022-0500
- https://ubuntu.com/security/CVE-2022-1652
- https://ubuntu.com/security/CVE-2022-1679
- https://ubuntu.com/security/CVE-2022-1734
- https://ubuntu.com/security/CVE-2022-1789
- https://ubuntu.com/security/CVE-2022-1974
- https://ubuntu.com/security/CVE-2022-1975
- https://ubuntu.com/security/CVE-2022-28893
- https://ubuntu.com/security/CVE-2022-29900
- https://ubuntu.com/security/CVE-2022-29901
- https://ubuntu.com/security/CVE-2022-33981
- https://ubuntu.com/security/CVE-2022-34918
- https://ubuntu.com/security/CVE-2022-1734
- https://ubuntu.com/security/CVE-2022-2585
- https://ubuntu.com/security/CVE-2022-29900
- https://ubuntu.com/security/CVE-2022-29901
- https://ubuntu.com/security/CVE-2022-33981
- https://ubuntu.com/security/CVE-2022-0500
- https://ubuntu.com/security/CVE-2022-1974
- https://ubuntu.com/security/CVE-2022-28893
- https://ubuntu.com/security/CVE-2022-1789
- https://ubuntu.com/security/CVE-2022-1975
- https://ubuntu.com/security/CVE-2022-34918
- https://ubuntu.com/security/CVE-2022-2586
- https://ubuntu.com/security/CVE-2022-2588
- https://ubuntu.com/security/CVE-2022-1652
- https://ubuntu.com/security/CVE-2022-1679
Title: USN-5566-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5566-1
Priorities: high,medium
Description:
Zhenpeng Lin discovered that the network packet scheduler implementation in
the Linux kernel did not properly remove all references to a route filter
before freeing it in some situations. A local attacker could use this to
cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-2588)
It was discovered that the netfilter subsystem of the Linux kernel did not
prevent one nft object from referencing an nft set in another nft table,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-2586)
It was discovered that the implementation of POSIX timers in the Linux
kernel did not properly clean up timers in some situations. A local
attacker could use this to cause a denial of service (system crash) or
execute arbitrary code. (CVE-2022-2585)
Minh Yuan discovered that the floppy disk driver in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2022-1652)
It was discovered that the Atheros ath9k wireless device driver in the
Linux kernel did not properly handle some error conditions, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-1679)
Felix Fu discovered that the Sun RPC implementation in the Linux kernel did
not properly handle socket states, leading to a use-after-free
vulnerability. A remote attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2022-28893)
Johannes Wikner and Kaveh Razavi discovered that for some AMD x86-64
processors, the branch predictor could by mis-trained for return
instructions in certain circumstances. A local attacker could possibly use
this to expose sensitive information. (CVE-2022-29900)
Johannes Wikner and Kaveh Razavi discovered that for some Intel x86-64
processors, the Linux kernel’s protections against speculative branch
target injection attacks were insufficient in some circumstances. A local
attacker could possibly use this to expose sensitive information.
(CVE-2022-29901)
Arthur Mongodin discovered that the netfilter subsystem in the Linux kernel
did not properly perform data validation. A local attacker could use this
to escalate privileges in certain situations. (CVE-2022-34918)
CVEs:
- https://ubuntu.com/security/CVE-2022-2588
- https://ubuntu.com/security/CVE-2022-2586
- https://ubuntu.com/security/CVE-2022-2585
- https://ubuntu.com/security/CVE-2022-1652
- https://ubuntu.com/security/CVE-2022-1679
- https://ubuntu.com/security/CVE-2022-28893
- https://ubuntu.com/security/CVE-2022-29900
- https://ubuntu.com/security/CVE-2022-29901
- https://ubuntu.com/security/CVE-2022-34918
- https://ubuntu.com/security/CVE-2022-2586
- https://ubuntu.com/security/CVE-2022-29901
- https://ubuntu.com/security/CVE-2022-34918
- https://ubuntu.com/security/CVE-2022-29900
- https://ubuntu.com/security/CVE-2022-2585
- https://ubuntu.com/security/CVE-2022-2588
- https://ubuntu.com/security/CVE-2022-1652
- https://ubuntu.com/security/CVE-2022-1679
- https://ubuntu.com/security/CVE-2022-28893
Title: USN-5567-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5567-1
Priorities: high
Description:
Zhenpeng Lin discovered that the network packet scheduler implementation in
the Linux kernel did not properly remove all references to a route filter
before freeing it in some situations. A local attacker could use this to
cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-2588)
It was discovered that the netfilter subsystem of the Linux kernel did not
prevent one nft object from referencing an nft set in another nft table,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-2586)
It was discovered that the implementation of POSIX timers in the Linux
kernel did not properly clean up timers in some situations. A local
attacker could use this to cause a denial of service (system crash) or
execute arbitrary code. (CVE-2022-2585)
CVEs:
- https://ubuntu.com/security/CVE-2022-2588
- https://ubuntu.com/security/CVE-2022-2586
- https://ubuntu.com/security/CVE-2022-2585
- https://ubuntu.com/security/CVE-2022-2588
- https://ubuntu.com/security/CVE-2022-2585
- https://ubuntu.com/security/CVE-2022-2586
Title: USN-5565-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5565-1
Priorities: high,medium
Description:
Zhenpeng Lin discovered that the network packet scheduler implementation in
the Linux kernel did not properly remove all references to a route filter
before freeing it in some situations. A local attacker could use this to
cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-2588)
It was discovered that the netfilter subsystem of the Linux kernel did not
prevent one nft object from referencing an nft set in another nft table,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-2586)
It was discovered that the implementation of POSIX timers in the Linux
kernel did not properly clean up timers in some situations. A local
attacker could use this to cause a denial of service (system crash) or
execute arbitrary code. (CVE-2022-2585)
Johannes Wikner and Kaveh Razavi discovered that for some AMD x86-64
processors, the branch predictor could by mis-trained for return
instructions in certain circumstances. A local attacker could possibly use
this to expose sensitive information. (CVE-2022-29900)
Johannes Wikner and Kaveh Razavi discovered that for some Intel x86-64
processors, the Linux kernel’s protections against speculative branch
target injection attacks were insufficient in some circumstances. A local
attacker could possibly use this to expose sensitive information.
(CVE-2022-29901)
CVEs:
- https://ubuntu.com/security/CVE-2022-2588
- https://ubuntu.com/security/CVE-2022-2586
- https://ubuntu.com/security/CVE-2022-2585
- https://ubuntu.com/security/CVE-2022-29900
- https://ubuntu.com/security/CVE-2022-29901
- https://ubuntu.com/security/CVE-2022-2588
- https://ubuntu.com/security/CVE-2022-2585
- https://ubuntu.com/security/CVE-2022-29901
- https://ubuntu.com/security/CVE-2022-29900
- https://ubuntu.com/security/CVE-2022-2586
Title: USN-5571-1: PostgreSQL vulnerability
URL: https://ubuntu.com/security/notices/USN-5571-1
Priorities: medium
Description:
Sven Klemm discovered that PostgreSQL incorrectly handled extensions. An
attacker could possibly use this issue to execute arbitrary code when
extensions are created or updated.
CVEs:
- https://ubuntu.com/security/CVE-2022-2625
Title: USN-5569-1: Unbound vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5569-1
Priorities: medium
Description:
Xiang Li discovered that Unbound incorrectly handled delegation caching.
A remote attacker could use this issue to keep rogue domain names
resolvable long after they have been revoked.
CVEs:
- https://ubuntu.com/security/CVE-2022-30699
- https://ubuntu.com/security/CVE-2022-30698
Title: USN-5547-1: NVIDIA graphics drivers vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5547-1
Priorities: high,medium,low
Description:
Le Wu discovered that the NVIDIA graphics drivers did not properly perform
input validation in some situations. A local user could use this to cause a
denial of service or possibly execute arbitrary code. (CVE-2022-31607)
Tal Lossos discovered that the NVIDIA graphics drivers incorrectly handled
certain memory operations, leading to a null-pointer dereference. A local
attacker could use this to cause a denial of service. (CVE-2022-31615)
Artem S. Tashkinov discovered that the NVIDIA graphics drivers Dynamic
Boost D-Bus component did not properly restrict access to its endpoint.
When enabled in non-default configurations, a local attacker could use this
to cause a denial of service or possibly execute arbitrary code.
(CVE-2022-31608)
CVEs:
- https://ubuntu.com/security/CVE-2022-31607
- https://ubuntu.com/security/CVE-2022-31615
- https://ubuntu.com/security/CVE-2022-31608
- https://ubuntu.com/security/CVE-2022-31607
- https://ubuntu.com/security/CVE-2022-31615
- https://ubuntu.com/security/CVE-2022-31608
Title: USN-5532-1: Bottle vulnerability
URL: https://ubuntu.com/security/notices/USN-5532-1
Priorities: medium
Description:
It was discovered that Bottle incorrectly handled errors during early request
binding. An attacker could possibly use this issue to disclose sensitive
information. (CVE-2022-31799)
CVEs:
- https://ubuntu.com/security/CVE-2022-31799
- https://ubuntu.com/security/CVE-2022-31799
Title: USN-5531-1: protobuf-c vulnerability
URL: https://ubuntu.com/security/notices/USN-5531-1
Priorities: medium
Description:
Pietro Borrello discovered that protobuf-c contained an invalid
arithmetic shift. This vulnerability allowed attackers to cause a
denial of service (system crash) via unspecified vectors
(CVE-2022-33070).
It was discovered that protobuf-c contained an unsigned integer
overflow. This vulnerability allowed attackers to cause a denial of
service (system crash) via unspecified vectors.
Todd Miller discovered that protobuf-c contained a possible NULL
dereference. This could cause a vulnerability that allowed attackers to
cause a denial of service (system crash) via unspecified vectors.
CVEs:
- https://ubuntu.com/security/CVE-2022-33070
- https://ubuntu.com/security/CVE-2022-33070
Title: USN-5545-1: Linux kernel (OEM) vulnerability
URL: https://ubuntu.com/security/notices/USN-5545-1
Priorities: medium
Description:
Arthur Mongodin discovered that the netfilter subsystem in the Linux kernel
did not properly perform data validation. A local attacker could use this
to escalate privileges in certain situations.
CVEs:
- https://ubuntu.com/security/CVE-2022-34918
Release Date: July 28, 2022
BOSH Agent Version: 2.461.0
First GA version of ubuntu-jammy
The following sections describe each Xenial stemcell release.
This section includes release notes for the 621.x line of Linux stemcells used with Ops Manager.
Available in VMware Tanzu Network
Release Date: September 20, 2023
BOSH Agent Version: 2.268.173
Title: USN-6380-1: Node.js vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6380-1
Priorities: medium
Description:
Rogier Schouten discovered that Node.js incorrectly handled certain inputs. If
a user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to cause a denial
of service. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.
(CVE-2019-15604)
Ethan Rubinson discovered that Node.js incorrectly handled certain inputs. If
a user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to obtain
sensitive information. This issue only affected Ubuntu 16.04 LTS and
Ubuntu 18.04 LTS. (CVE-2019-15605)
Alyssa Wilk discovered that Node.js incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to execute
arbitrary code. This issue only affected Ubuntu 16.04 LTS and
Ubuntu 18.04 LTS. (CVE-2019-15606)
Tobias Niessen discovered that Node.js incorrectly handled certain inputs. If
a user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to cause a
denial of service. This issue only affected Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. (CVE-2020-8174)
It was discovered that Node.js incorrectly handled certain inputs. If a user
or an automated system were tricked into opening a specially crafted input
file, a remote attacker could possibly use this issue to cause a
denial of service. (CVE-2020-8265, CVE-2020-8287)
CVEs:
- https://ubuntu.com/security/CVE-2019-15604
- https://ubuntu.com/security/CVE-2019-15605
- https://ubuntu.com/security/CVE-2019-15606
- https://ubuntu.com/security/CVE-2020-8174
- https://ubuntu.com/security/CVE-2020-8265
- https://ubuntu.com/security/CVE-2020-8287
- https://ubuntu.com/security/CVE-2019-15604
- https://ubuntu.com/security/CVE-2019-15606
- https://ubuntu.com/security/CVE-2020-8265
- https://ubuntu.com/security/CVE-2019-15605
- https://ubuntu.com/security/CVE-2020-8287
- https://ubuntu.com/security/CVE-2020-8174
Title: USN-6356-1: OpenDMARC vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6356-1
Priorities: low,medium
Description:
Jianjun Chen, Vern Paxson and Jian Jiang discovered that OpenDMARC
incorrectly handled certain inputs. If a user or an automated system were
tricked into receiving crafted inputs, an attacker could possibly use this
to falsify the domain of an e-mails origin. (CVE-2020-12272)
Patrik Lantz discovered that OpenDMARC incorrectly handled certain inputs.
If a user or an automated system were tricked into opening a specially
crafted input file, a remote attacker could possibly use this issue to
cause a denial of service. (CVE-2020-12460)
CVEs:
- https://ubuntu.com/security/CVE-2020-12272
- https://ubuntu.com/security/CVE-2020-12460
- https://ubuntu.com/security/CVE-2020-12460
- https://ubuntu.com/security/CVE-2020-12272
Title: USN-6381-1: GNU binutils vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6381-1
Priorities: medium
Description:
It was discovered that a memory leak existed in certain GNU binutils
modules. An attacker could possibly use this issue to cause a denial of
service (memory exhaustion). (CVE-2020-19724, CVE-2020-21490)
It was discovered that GNU binutils was not properly performing bounds
checks in several functions, which could lead to a buffer overflow. An
attacker could possibly use this issue to cause a denial of service,
expose sensitive information or execute arbitrary code.
(CVE-2020-19726, CVE-2021-46174, CVE-2022-45703)
It was discovered that GNU binutils was not properly initializing heap
memory when processing certain print instructions. An attacker could
possibly use this issue to expose sensitive information. (CVE-2020-35342)
It was discovered that GNU binutils was not properly handling the logic
behind certain memory management related operations, which could lead to a
buffer overflow. An attacker could possibly use this issue to cause a
denial of service or execute arbitrary code. (CVE-2022-44840)
It was discovered that GNU binutils was not properly handling the logic
behind certain memory management related operations, which could lead to
an invalid memory access. An attacker could possibly use this issue to
cause a denial of service. (CVE-2022-47695)
CVEs:
- https://ubuntu.com/security/CVE-2020-19724
- https://ubuntu.com/security/CVE-2020-21490
- https://ubuntu.com/security/CVE-2020-19726
- https://ubuntu.com/security/CVE-2021-46174
- https://ubuntu.com/security/CVE-2022-45703
- https://ubuntu.com/security/CVE-2020-35342
- https://ubuntu.com/security/CVE-2022-44840
- https://ubuntu.com/security/CVE-2022-47695
- https://ubuntu.com/security/CVE-2020-19726
- https://ubuntu.com/security/CVE-2020-35342
- https://ubuntu.com/security/CVE-2022-44840
- https://ubuntu.com/security/CVE-2020-21490
- https://ubuntu.com/security/CVE-2022-45703
- https://ubuntu.com/security/CVE-2021-46174
- https://ubuntu.com/security/CVE-2020-19724
- https://ubuntu.com/security/CVE-2022-47695
Title: USN-6364-1: Ghostscript vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6364-1
Priorities: medium
Description:
It was discovered that Ghostscript incorrectly handled certain PDF files.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2020-21710)
It was discovered that Ghostscript incorrectly handled certain PDF files.
An attacker could possibly use this issue to cause a denial of service,
or possibly execute arbitrary code. (CVE-2020-21890)
CVEs:
- https://ubuntu.com/security/CVE-2020-21710
- https://ubuntu.com/security/CVE-2020-21890
- https://ubuntu.com/security/CVE-2020-21890
- https://ubuntu.com/security/CVE-2020-21710
Title: USN-6371-1: libssh2 vulnerability
URL: https://ubuntu.com/security/notices/USN-6371-1
Priorities: medium
Description:
It was discovered that libssh2 incorrectly handled memory
access. An attacker could possibly use this issue to cause
a crash.
CVEs:
- https://ubuntu.com/security/CVE-2020-22218
Title: USN-6370-1: ModSecurity vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6370-1
Priorities: medium
Description:
It was discovered that ModSecurity incorrectly handled certain nested JSON
objects. An attacker could possibly use this issue to cause a denial
of service. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS
and Ubuntu 20.04 LTS. (CVE-2021-42717)
It was discovered that ModSecurity incorrectly handled certain HTTP
multipart requests. A remote attacker could possibly use this issue
to bypass ModSecurity restrictions. (CVE-2022-48279)
It was discovered that ModSecurity incorrectly handled certain file
uploads. A remote attacker could possibly use this issue to cause a
buffer overflow and a firewall failure. This issue only affected
Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
(CVE-2023-24021)
CVEs:
- https://ubuntu.com/security/CVE-2021-42717
- https://ubuntu.com/security/CVE-2022-48279
- https://ubuntu.com/security/CVE-2023-24021
- https://ubuntu.com/security/CVE-2021-42717
- https://ubuntu.com/security/CVE-2023-24021
- https://ubuntu.com/security/CVE-2022-48279
Title: USN-6388-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6388-1
Priorities: medium,low,high
Description:
Daniel Moghimi discovered that some Intel(R) Processors did not properly
clear microarchitectural state after speculative execution of various
instructions. A local unprivileged user could use this to obtain to
sensitive information. (CVE-2022-40982)
Yang Lan discovered that the GFS2 file system implementation in the Linux
kernel could attempt to dereference a null pointer in some situations. An
attacker could use this to construct a malicious GFS2 image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2023-3212)
It was discovered that the NET/ROM protocol implementation in the Linux
kernel contained a race condition in some situations, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2023-32269)
It was discovered that the NFC implementation in the Linux kernel contained
a use-after-free vulnerability when performing peer-to-peer communication
in certain conditions. A privileged attacker could use this to cause a
denial of service (system crash) or possibly expose sensitive information
(kernel memory). (CVE-2023-3863)
It was discovered that the bluetooth subsystem in the Linux kernel did not
properly handle L2CAP socket release, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-40283)
It was discovered that some network classifier implementations in the Linux
kernel contained use-after-free vulnerabilities. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-4128)
It was discovered that the JFS file system implementation in the Linux
kernel did not properly validate memory allocations in certain situations,
leading to a null pointer dereference vulnerability. An attacker could use
this to construct a malicious JFS image that, when mounted, could cause a
denial of service (system crash). (CVE-2023-4385)
It was discovered that the VMware VMXNET3 ethernet driver in the Linux
kernel contained a use-after-free vulnerability in certain situations. A
local attacker in a guest VM could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-4387)
It was discovered that the VMware VMXNET3 ethernet driver in the Linux
kernel did not properly handle errors in certain situations, leading to a
null pointer dereference vulnerability. A local attacker in a guest VM
could use this to cause a denial of service (system crash). (CVE-2023-4459)
CVEs:
- https://ubuntu.com/security/CVE-2022-40982
- https://ubuntu.com/security/CVE-2023-3212
- https://ubuntu.com/security/CVE-2023-32269
- https://ubuntu.com/security/CVE-2023-3863
- https://ubuntu.com/security/CVE-2023-40283
- https://ubuntu.com/security/CVE-2023-4128
- https://ubuntu.com/security/CVE-2023-4385
- https://ubuntu.com/security/CVE-2023-4387
- https://ubuntu.com/security/CVE-2023-4459
- https://ubuntu.com/security/CVE-2023-32269
- https://ubuntu.com/security/CVE-2023-4385
- https://ubuntu.com/security/CVE-2023-3212
- https://ubuntu.com/security/CVE-2023-4387
- https://ubuntu.com/security/CVE-2023-3863
- https://ubuntu.com/security/CVE-2023-4459
- https://ubuntu.com/security/CVE-2023-4128
- https://ubuntu.com/security/CVE-2022-40982
- https://ubuntu.com/security/CVE-2023-40283
Title: USN-6342-2: Linux kernel (Azure)
URL: https://ubuntu.com/security/notices/USN-6342-2
Priorities: high,medium,low
Description:
Tavis Ormandy discovered that some AMD processors did not properly handle
speculative execution of certain vector register instructions. A local
attacker could use this to expose sensitive information. (CVE-2023-20593)
Zheng Zhang discovered that the device-mapper implementation in the Linux
kernel did not properly handle locking during table_clear() operations. A
local attacker could use this to cause a denial of service (kernel
deadlock). (CVE-2023-2269)
It was discovered that a use-after-free vulnerability existed in the HFS+
file system implementation in the Linux kernel. A local attacker could
possibly use this to cause a denial of service (system crash).
(CVE-2023-2985)
It was discovered that the DVB Core driver in the Linux kernel did not
properly handle locking events in certain situations. A local attacker
could use this to cause a denial of service (kernel deadlock).
(CVE-2023-31084)
It was discovered that the Quick Fair Queueing network scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3611)
It was discovered that the network packet classifier with
netfilter/firewall marks implementation in the Linux kernel did not
properly handle reference counting, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3776)
CVEs:
- https://ubuntu.com/security/CVE-2023-20593
- https://ubuntu.com/security/CVE-2023-2269
- https://ubuntu.com/security/CVE-2023-2985
- https://ubuntu.com/security/CVE-2023-31084
- https://ubuntu.com/security/CVE-2023-3611
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-3611
- https://ubuntu.com/security/CVE-2023-2269
- https://ubuntu.com/security/CVE-2023-2985
- https://ubuntu.com/security/CVE-2023-31084
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-20593
Title: USN-6237-3: curl vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6237-3
Priorities: low,medium
Description:
USN-6237-1 fixed several vulnerabilities in curl. This update provides the
corresponding updates for Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, and
Ubuntu 18.04 LTS.
Original advisory details:
Hiroki Kurosawa discovered that curl incorrectly handled validating certain
certificate wildcards. A remote attacker could possibly use this issue to
spoof certain website certificates using IDN hosts. (CVE-2023-28321)
Hiroki Kurosawa discovered that curl incorrectly handled callbacks when
certain options are set by applications. This could cause applications
using curl to misbehave, resulting in information disclosure, or a denial
of service. (CVE-2023-28322)
It was discovered that curl incorrectly handled saving cookies to files. A
local attacker could possibly use this issue to create or overwrite files.
This issue only affected Ubuntu 22.10, and Ubuntu 23.04. (CVE-2023-32001)
CVEs:
- https://ubuntu.com/security/CVE-2023-28321
- https://ubuntu.com/security/CVE-2023-28322
- https://ubuntu.com/security/CVE-2023-32001
- https://ubuntu.com/security/CVE-2023-28322
- https://ubuntu.com/security/CVE-2023-28321
Title: USN-6164-2: c-ares vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6164-2
Priorities: medium
Description:
USN-6164-1 fixed several vulnerabilities in c-ares. This update provides
the corresponding update for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.
Original advisory details:
Hannes Moesl discovered that c-ares incorrectly handled certain ipv6
addresses. An attacker could use this issue to cause c-ares to crash,
resulting in a denial of service, or possibly execute arbitrary code.
(CVE-2023-31130)
Xiang Li discovered that c-ares incorrectly handled certain UDP packets. A
remote attacker could possibly use this issue to cause c-res to crash,
resulting in a denial of service. (CVE-2023-32067)
CVEs:
- https://ubuntu.com/security/CVE-2023-31130
- https://ubuntu.com/security/CVE-2023-32067
- https://ubuntu.com/security/CVE-2023-32067
- https://ubuntu.com/security/CVE-2023-31130
Title: USN-6358-1: RedCloth vulnerability
URL: https://ubuntu.com/security/notices/USN-6358-1
Priorities: medium
Description:
It was discovered that RedCloth incorrectly handled certain inputs during
html sanitisation. An attacker could possibly use this issue to cause a
denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-31606
Title: USN-6372-1: DBus vulnerability
URL: https://ubuntu.com/security/notices/USN-6372-1
Priorities: low
Description:
It was discovered that DBus incorrectly handled certain
invalid messages. A local attacker could possibly use
this issue to cause DBus to crash, resulting in a denial
of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-34969
Title: USN-6366-1: PostgreSQL vulnerability
URL: https://ubuntu.com/security/notices/USN-6366-1
Priorities: medium
Description:
It was discovered that PostgreSQL incorrectly handled certain extension
script substitutions. An attacker having database-level CREATE privileges
can use this issue to execute arbitrary code as the bootstrap superuser.
CVEs:
- https://ubuntu.com/security/CVE-2023-39417
Title: USN-6373-1: gawk vulnerability
URL: https://ubuntu.com/security/notices/USN-6373-1
Priorities: medium
Description:
It was discovered that gawk could be made to read out of bounds when
processing certain inputs. If a user or an automated system were tricked
into opening a specially crafted input, an attacker could possibly use
this issue to cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-4156
Title: USN-6374-1: Mutt vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6374-1
Priorities: medium
Description:
It was discovered that Mutt incorrectly handled certain email header
contents. If a user were tricked into opening a specially crafted message,
a remote attacker could possibly use this issue to cause a denial of
service. (CVE-2023-4874, CVE-2023-4875)
CVEs:
- https://ubuntu.com/security/CVE-2023-4874
- https://ubuntu.com/security/CVE-2023-4875
- https://ubuntu.com/security/CVE-2023-4874
- https://ubuntu.com/security/CVE-2023-4875
Full Changelog: https://github.com/pivotal-cf/bosh-linux-stemcell-builder-lts/compare/ubuntu-trusty/v3586.153…ubuntu-xenial/v621.687
Available in VMware Tanzu Network
Release Date: September 07, 2023
BOSH Agent Version: 2.268.170
Title: USN-6336-1: Docker Registry vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6336-1
Priorities: low,medium
Description:
It was discovered that Docker Registry incorrectly handled certain crafted
input, which allowed remote attackers to cause a denial of service. This
issue only affected Ubuntu 16.04 LTS. (CVE-2017-11468)
It was discovered that Docker Registry incorrectly handled certain crafted
input. An attacker could possibly use this issue to cause a denial of
service. (CVE-2017-11468)
CVEs:
- https://ubuntu.com/security/CVE-2017-11468
- https://ubuntu.com/security/CVE-2017-11468
- https://ubuntu.com/security/CVE-2023-2253
- https://ubuntu.com/security/CVE-2017-11468
Title: USN-6322-1: elfutils vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6322-1
Priorities: low,medium
Description:
It was discovered that elfutils incorrectly handled certain malformed
files. If a user or automated system were tricked into processing a
specially crafted file, elfutils could be made to crash or consume
resources, resulting in a denial of service. This issue only affected
Ubuntu 14.04 LTS. (CVE-2018-16062, CVE-2018-16403, CVE-2018-18310,
CVE-2018-18520, CVE-2018-18521, CVE-2019-7149, CVE-2019-7150,
CVE-2019-7665)
It was discovered that elfutils incorrectly handled bounds checks in
certain functions when processing malformed files. If a user or automated
system were tricked into processing a specially crafted file, elfutils
could be made to crash or consume resources, resulting in a denial of
service. (CVE-2020-21047, CVE-2021-33294)
CVEs:
- https://ubuntu.com/security/CVE-2018-16062
- https://ubuntu.com/security/CVE-2018-16403
- https://ubuntu.com/security/CVE-2018-18310
- https://ubuntu.com/security/CVE-2018-18520
- https://ubuntu.com/security/CVE-2018-18521
- https://ubuntu.com/security/CVE-2019-7149
- https://ubuntu.com/security/CVE-2019-7150
- https://ubuntu.com/security/CVE-2019-7665
- https://ubuntu.com/security/CVE-2020-21047
- https://ubuntu.com/security/CVE-2021-33294
- https://ubuntu.com/security/CVE-2021-33294
- https://ubuntu.com/security/CVE-2020-21047
- https://ubuntu.com/security/CVE-2018-18521
- https://ubuntu.com/security/CVE-2018-18520
- https://ubuntu.com/security/CVE-2019-7665
- https://ubuntu.com/security/CVE-2018-16062
- https://ubuntu.com/security/CVE-2019-7150
- https://ubuntu.com/security/CVE-2018-16403
- https://ubuntu.com/security/CVE-2019-7149
- https://ubuntu.com/security/CVE-2018-18310
Title: USN-6334-1: atftp vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6334-1
Priorities: medium
Description:
Peter Wang discovered that atftp did not properly manage certain inputs. A
remote attacker could send a specially crafted tftp request to the server
to cause a crash. (CVE-2020-6097)
Andreas B. Mundt discovered that atftp did not properly manage certain
inputs. A remote attacker could send a specially crafted tftp request to
the server to cause a crash. (CVE-2021-41054)
Johannes Krupp discovered that atftp did not properly manage certain
inputs. A remote attacker could send a specially crafted tftp request to
the server and make the server to disclose /etc/group data.
(CVE-2021-46671)
CVEs:
- https://ubuntu.com/security/CVE-2020-6097
- https://ubuntu.com/security/CVE-2021-41054
- https://ubuntu.com/security/CVE-2021-46671
- https://ubuntu.com/security/CVE-2020-6097
- https://ubuntu.com/security/CVE-2021-46671
- https://ubuntu.com/security/CVE-2021-41054
Title: USN-6335-1: BusyBox vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6335-1
Priorities: low,medium
Description:
It was discovered that BusyBox incorrectly handled certain malformed gzip
archives. If a user or automated system were tricked into processing a
specially crafted gzip archive, a remote attacker could use this issue to
cause BusyBox to crash, resulting in a denial of service, or execute
arbitrary code. This issue only affected Ubuntu 14.04 LTS.
(CVE-2021-28831)
It was discovered that BusyBox did not properly validate user input when
performing certain arithmetic operations. If a user or automated system
were tricked into processing a specially crafted file, an attacker could
possibly use this issue to cause BusyBox to crash, resulting in a denial
of service, or execute arbitrary code. (CVE-2022-48174)
CVEs:
- https://ubuntu.com/security/CVE-2021-28831
- https://ubuntu.com/security/CVE-2022-48174
- https://ubuntu.com/security/CVE-2022-48174
- https://ubuntu.com/security/CVE-2021-28831
Title: USN-6313-1: FAAD2 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6313-1
Priorities: medium
Description:
It was discovered that FAAD2 incorrectly handled certain inputs. If a user or
an automated system were tricked into opening a specially crafted input file,
a remote attacker could possibly use this issue to execute arbitrary code.
(CVE-2021-32272, CVE-2021-32273, CVE-2021-32274, CVE-2021-32277,
CVE-2021-32278, CVE-2023-38857, CVE-2023-38858)
It was discovered that FAAD2 incorrectly handled certain inputs. If a user or
an automated system were tricked into opening a specially crafted input file,
a remote attacker could possibly use this issue to cause a denial of service.
(CVE-2021-32276)
CVEs:
- https://ubuntu.com/security/CVE-2021-32272
- https://ubuntu.com/security/CVE-2021-32273
- https://ubuntu.com/security/CVE-2021-32274
- https://ubuntu.com/security/CVE-2021-32277
- https://ubuntu.com/security/CVE-2021-32278
- https://ubuntu.com/security/CVE-2023-38857
- https://ubuntu.com/security/CVE-2023-38858
- https://ubuntu.com/security/CVE-2021-32276
- https://ubuntu.com/security/CVE-2021-32276
- https://ubuntu.com/security/CVE-2021-32278
- https://ubuntu.com/security/CVE-2023-38857
- https://ubuntu.com/security/CVE-2021-32273
- https://ubuntu.com/security/CVE-2021-32274
- https://ubuntu.com/security/CVE-2021-32277
- https://ubuntu.com/security/CVE-2023-38858
- https://ubuntu.com/security/CVE-2021-32272
Title: USN-6353-1: PLIB vulnerability
URL: https://ubuntu.com/security/notices/USN-6353-1
Priorities: medium
Description:
Wooseok Kang discovered that PLIB did not properly manage memory under
certain circumstances. If a user were tricked into opening a specially
crafted TGA file, an attacker could possibly use this issue to cause
applications using PLIB to crash, resulting in a denial of service, or
possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2021-38714
Title: USN-6354-1: Python vulnerability
URL: https://ubuntu.com/security/notices/USN-6354-1
Priorities: medium
Description:
It was discovered that Python did not properly handle XML entity
declarations in plist files. An attacker could possibly use this
vulnerability to perform an XML External Entity (XXE) injection,
resulting in a denial of service or information disclosure.
CVEs:
- https://ubuntu.com/security/CVE-2022-48565
Title: USN-6319-1: AMD Microcode vulnerability
URL: https://ubuntu.com/security/notices/USN-6319-1
Priorities: medium
Description:
Daniël Trujillo, Johannes Wikner, and Kaveh Razavi discovered that some AMD
processors utilising speculative execution and branch prediction may allow
unauthorised memory reads via a speculative side-channel attack. A local
attacker could use this to expose sensitive information, including kernel
memory.
CVEs:
- https://ubuntu.com/security/CVE-2023-20569
Title: USN-6342-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6342-1
Priorities: high,medium,low
Description:
Tavis Ormandy discovered that some AMD processors did not properly handle
speculative execution of certain vector register instructions. A local
attacker could use this to expose sensitive information. (CVE-2023-20593)
Zheng Zhang discovered that the device-mapper implementation in the Linux
kernel did not properly handle locking during table_clear() operations. A
local attacker could use this to cause a denial of service (kernel
deadlock). (CVE-2023-2269)
It was discovered that a use-after-free vulnerability existed in the HFS+
file system implementation in the Linux kernel. A local attacker could
possibly use this to cause a denial of service (system crash).
(CVE-2023-2985)
It was discovered that the DVB Core driver in the Linux kernel did not
properly handle locking events in certain situations. A local attacker
could use this to cause a denial of service (kernel deadlock).
(CVE-2023-31084)
It was discovered that the Quick Fair Queueing network scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3611)
It was discovered that the network packet classifier with
netfilter/firewall marks implementation in the Linux kernel did not
properly handle reference counting, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3776)
CVEs:
- https://ubuntu.com/security/CVE-2023-20593
- https://ubuntu.com/security/CVE-2023-2269
- https://ubuntu.com/security/CVE-2023-2985
- https://ubuntu.com/security/CVE-2023-31084
- https://ubuntu.com/security/CVE-2023-3611
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-2985
- https://ubuntu.com/security/CVE-2023-2269
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-31084
- https://ubuntu.com/security/CVE-2023-3611
- https://ubuntu.com/security/CVE-2023-20593
Title: USN-6327-1: Linux kernel (KVM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6327-1
Priorities: medium,low,high
Description:
Zheng Zhang discovered that the device-mapper implementation in the Linux
kernel did not properly handle locking during table_clear() operations. A
local attacker could use this to cause a denial of service (kernel
deadlock). (CVE-2023-2269)
It was discovered that a use-after-free vulnerability existed in the HFS+
file system implementation in the Linux kernel. A local attacker could
possibly use this to cause a denial of service (system crash).
(CVE-2023-2985)
It was discovered that the DVB Core driver in the Linux kernel did not
properly handle locking events in certain situations. A local attacker
could use this to cause a denial of service (kernel deadlock).
(CVE-2023-31084)
It was discovered that the virtual terminal driver in the Linux kernel
contained a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly expose sensitive
information (kernel memory). (CVE-2023-3567)
It was discovered that the Quick Fair Queueing network scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3611)
It was discovered that the network packet classifier with
netfilter/firewall marks implementation in the Linux kernel did not
properly handle reference counting, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3776)
CVEs:
- https://ubuntu.com/security/CVE-2023-2269
- https://ubuntu.com/security/CVE-2023-2985
- https://ubuntu.com/security/CVE-2023-31084
- https://ubuntu.com/security/CVE-2023-3567
- https://ubuntu.com/security/CVE-2023-3611
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-3611
- https://ubuntu.com/security/CVE-2023-2269
- https://ubuntu.com/security/CVE-2023-3567
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-2985
- https://ubuntu.com/security/CVE-2023-31084
Title: LSN-0097-1: Kernel Live Patch Security Notice
URL: https://ubuntu.com/security/notices/LSN-0097-1
Priorities: high
Description:
It was discovered that the IP-VLAN network driver for the Linux kernel did
not properly initialize memory in some situations, leading to an out-of-
bounds write vulnerability. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code.(CVE-2023-3090)
Querijn Voet discovered that a race condition existed in the io_uring
subsystem in the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code.(CVE-2023-3389)
It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle some error conditions, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code.(CVE-2023-3390)
Mingi Cho discovered that the netfilter subsystem in the Linux kernel did
not properly validate the status of a nft chain while performing a lookup
by id, leading to a use-after-free vulnerability. An attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code.(CVE-2023-31248)
Shir Tamari and Sagi Tzadik discovered that the OverlayFS implementation in
the Ubuntu Linux kernel did not properly perform permission checks in
certain situations. A local attacker could possibly use this to gain
elevated privileges.(CVE-2023-32629)
Tanguy Dubroca discovered that the netfilter subsystem in the Linux kernel
did not properly handle certain pointer data type, leading to an out-of-
bounds write vulnerability. A privileged attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.(CVE-2023-35001)
Hangyu Hua discovered that the Flower classifier implementation in the
Linux kernel contained an out-of-bounds write vulnerability. An attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code.(CVE-2023-35788)
CVEs:
- https://ubuntu.com/security/CVE-2023-3090
- https://ubuntu.com/security/CVE-2023-3389
- https://ubuntu.com/security/CVE-2023-3390
- https://ubuntu.com/security/CVE-2023-31248
- https://ubuntu.com/security/CVE-2023-32629
- https://ubuntu.com/security/CVE-2023-35001
- https://ubuntu.com/security/CVE-2023-35788
- https://ubuntu.com/security/CVE-2023-31248
- https://ubuntu.com/security/CVE-2023-32629
- https://ubuntu.com/security/CVE-2023-3090
- https://ubuntu.com/security/CVE-2023-3390
- https://ubuntu.com/security/CVE-2023-35788
- https://ubuntu.com/security/CVE-2023-35001
- https://ubuntu.com/security/CVE-2023-3389
Title: USN-6345-1: SoX vulnerability
URL: https://ubuntu.com/security/notices/USN-6345-1
Priorities: medium
Description:
It was discovered that SoX incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, an attacker could possibly use this issue to cause a denial
of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-32627
Title: USN-6326-1: GitPython vulnerability
URL: https://ubuntu.com/security/notices/USN-6326-1
Priorities: medium
Description:
It was discovered that GitPython did not block insecure options from user
inputs in the clone command. An attacker could possibly use this issue to
execute arbitrary commands on the host.
CVEs:
- https://ubuntu.com/security/CVE-2023-40267
Available in VMware Tanzu Network
Release Date: August 29, 2023
BOSH Agent Version: 2.268.165
Title: USN-6291-1: GStreamer vulnerability
URL: https://ubuntu.com/security/notices/USN-6291-1
Priorities: low
Description:
Hanno Bock discovered that GStreamer incorrecly handled certain datetime
strings. An attacker could possibly use this issue to cause a denial
of service or expose sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2017-5838
Title: USN-6298-1: ZZIPlib vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6298-1
Priorities: low
Description:
Liu Zhu discovered that ZZIPlib incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to cause a
denial of service. (CVE-2018-7727)
YiMing Liu discovered that ZZIPlib incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to cause a
denial of service. (CVE-2020-18442)
CVEs:
- https://ubuntu.com/security/CVE-2018-7727
- https://ubuntu.com/security/CVE-2020-18442
- https://ubuntu.com/security/CVE-2020-18442
- https://ubuntu.com/security/CVE-2018-7727
Title: USN-6303-2: ClamAV vulnerability
URL: https://ubuntu.com/security/notices/USN-6303-2
Priorities: medium
Description:
USN-6303-1 fixed a vulnerability in ClamAV. This update provides
the corresponding update for Ubuntu 14.04 LTS, Ubuntu 16.04 LTS,
and Ubuntu 18.04 LTS.
Original advisory details:
It was discovered that ClamAV incorrectly handled parsing HFS+ files. A
remote attacker could possibly use this issue to cause ClamAV to crash,
resulting in a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-20197
Title: USN-6309-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6309-1
Priorities: medium,low,high
Description:
Zheng Zhang discovered that the device-mapper implementation in the Linux
kernel did not properly handle locking during table_clear() operations. A
local attacker could use this to cause a denial of service (kernel
deadlock). (CVE-2023-2269)
It was discovered that a use-after-free vulnerability existed in the HFS+
file system implementation in the Linux kernel. A local attacker could
possibly use this to cause a denial of service (system crash).
(CVE-2023-2985)
It was discovered that the DVB Core driver in the Linux kernel did not
properly handle locking events in certain situations. A local attacker
could use this to cause a denial of service (kernel deadlock).
(CVE-2023-31084)
It was discovered that the virtual terminal driver in the Linux kernel
contained a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly expose sensitive
information (kernel memory). (CVE-2023-3567)
It was discovered that the Quick Fair Queueing network scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3611)
It was discovered that the network packet classifier with
netfilter/firewall marks implementation in the Linux kernel did not
properly handle reference counting, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3776)
CVEs:
- https://ubuntu.com/security/CVE-2023-2269
- https://ubuntu.com/security/CVE-2023-2985
- https://ubuntu.com/security/CVE-2023-31084
- https://ubuntu.com/security/CVE-2023-3567
- https://ubuntu.com/security/CVE-2023-3611
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-31084
- https://ubuntu.com/security/CVE-2023-3611
- https://ubuntu.com/security/CVE-2023-2985
- https://ubuntu.com/security/CVE-2023-3567
- https://ubuntu.com/security/CVE-2023-2269
Title: USN-6297-1: Ghostscript vulnerability
URL: https://ubuntu.com/security/notices/USN-6297-1
Priorities: medium
Description:
It was discovered that Ghostscript incorrectly handled outputting certain
PDF files. A local attacker could potentially use this issue to cause
a crash, resulting in a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-38559
Available in VMware Tanzu Network
Release Date: August 17, 2023
BOSH Agent Version: 2.268.161
Title: USN-6265-1: RabbitMQ vulnerability
URL: https://ubuntu.com/security/notices/USN-6265-1
Priorities: low
Description:
It was discovered that RabbitMQ incorrectly handled certain signed-in user
credentials. An attacker could possibly use this issue to expose
sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2017-4966
Title: USN-6276-1: unixODBC vulnerability
URL: https://ubuntu.com/security/notices/USN-6276-1
Priorities: low
Description:
It was discovered that unixODBC incorrectly handled certain unicode
to ansi copies. An attacker could possibly use this issue to cause
a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2018-7409
Title: USN-6262-1: Wireshark vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6262-1
Priorities: low,medium
Description:
It was discovered that Wireshark did not properly handle certain
NFS packages when certain configuration options were enabled.
An attacker could possibly use this issue to cause
Wireshark to crash, resulting in a denial of service. (CVE-2020-13164)
It was discovered that Wireshark did not properly handle certain GVCP
packages. An attacker could possibly use this issue to cause
Wireshark to crash, resulting in a denial of service. This issue only
affected Ubuntu 20.04 LTS. (CVE-2020-15466)
It was discovered that Wireshark did not properly handle certain
Kafka packages. An attacker could possibly use this issue to cause
Wireshark to crash, resulting in a denial of service. This issue only
affected Ubuntu 20.04 LTS. (CVE-2020-17498)
It was discovered that Wireshark did not properly handle certain TCP
packages containing an invalid 0xFFFF checksum. An attacker could
possibly use this issue to cause Wireshark to crash, resulting in
a denial of service. (CVE-2020-25862)
It was discovered that Wireshark did not properly handle certain
MIME packages containing invalid parts. An attacker could
possibly use this issue to cause Wireshark to crash, resulting in
a denial of service. (CVE-2020-25863)
CVEs:
- https://ubuntu.com/security/CVE-2020-13164
- https://ubuntu.com/security/CVE-2020-15466
- https://ubuntu.com/security/CVE-2020-17498
- https://ubuntu.com/security/CVE-2020-25862
- https://ubuntu.com/security/CVE-2020-25863
- https://ubuntu.com/security/CVE-2020-13164
- https://ubuntu.com/security/CVE-2020-17498
- https://ubuntu.com/security/CVE-2020-15466
- https://ubuntu.com/security/CVE-2020-25863
- https://ubuntu.com/security/CVE-2020-25862
Title: USN-6281-1: Velocity Engine vulnerability
URL: https://ubuntu.com/security/notices/USN-6281-1
Priorities: medium
Description:
Alvaro Munoz discovered that Velocity Engine incorrectly handled certain
inputs. If a user or an automated system were tricked into opening a specially
crafted input file, a remote attacker could possibly use this issue to execute
arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2020-13936
Title: USN-6282-1: Velocity Tools vulnerability
URL: https://ubuntu.com/security/notices/USN-6282-1
Priorities: medium
Description:
Jackson Henry discovered that Velocity Tools incorrectly handled certain
inputs. If a user or an automated system were tricked into opening a specially
crafted input file, a remote attacker could possibly use this issue to execute
arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2020-13959
Title: USN-6259-1: Open-iSCSI vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6259-1
Priorities: low
Description:
Jos Wetzels, Stanislav Dashevskyi, and Amine Amri discovered that
Open-iSCSI incorrectly handled certain checksums for IP packets.
An attacker could possibly use this issue to expose sensitive information.
(CVE-2020-13987)
Jos Wetzels, Stanislav Dashevskyi, Amine Amri discovered that
Open-iSCSI incorrectly handled certain parsing TCP MSS options.
An attacker could possibly use this issue to cause a crash or cause
unexpected behavior. (CVE-2020-13988)
Amine Amri and Stanislav Dashevskyi discovered that Open-iSCSI
incorrectly handled certain TCP data. An attacker could possibly
use this issue to expose sensitive information. (CVE-2020-17437)
CVEs:
- https://ubuntu.com/security/CVE-2020-13987
- https://ubuntu.com/security/CVE-2020-13988
- https://ubuntu.com/security/CVE-2020-17437
- https://ubuntu.com/security/CVE-2020-13988
- https://ubuntu.com/security/CVE-2020-13987
- https://ubuntu.com/security/CVE-2020-17437
Title: USN-5193-3: X.Org X Server vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5193-3
Priorities: medium
Description:
USN-5193-1 fixed several vulnerabilities in X.Org. This update provides
the corresponding update for Ubuntu 16.04 ESM.
Original advisory details:
Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
certain inputs. An attacker could use this issue to cause the server to
crash, resulting in a denial of service, or possibly execute arbitrary
code and escalate privileges.
CVEs:
- https://ubuntu.com/security/CVE-2021-4011
- https://ubuntu.com/security/CVE-2021-4008
- https://ubuntu.com/security/CVE-2021-4009
Title: USN-6287-1: Go yaml vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6287-1
Priorities: medium
Description:
Simon Ferquel discovered that the Go yaml package incorrectly handled
certain YAML documents. If a user or an automated system were tricked
into opening a specially crafted input file, a remote attacker could
possibly use this issue to cause the system to crash, resulting in
a denial of service. (CVE-2021-4235)
It was discovered that the Go yaml package incorrectly handled
certain large YAML documents. If a user or an automated system were tricked
into opening a specially crafted input file, a remote attacker could
possibly use this issue to cause the system to crash, resulting in
a denial of service. (CVE-2022-3064)
CVEs:
- https://ubuntu.com/security/CVE-2021-4235
- https://ubuntu.com/security/CVE-2022-3064
- https://ubuntu.com/security/CVE-2022-3064
- https://ubuntu.com/security/CVE-2021-4235
Title: USN-6252-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6252-1
Priorities: medium,low,high
Description:
It was discovered that the ext4 file system implementation in the Linux
kernel contained a use-after-free vulnerability. An attacker could use this
to construct a malicious ext4 file system image that, when mounted, could
cause a denial of service (system crash). (CVE-2022-1184)
It was discovered that the sound subsystem in the Linux kernel contained a
race condition in some situations. A local attacker could use this to cause
a denial of service (system crash). (CVE-2022-3303)
It was discovered that a race condition existed in the btrfs file system
implementation in the Linux kernel, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-1611)
It was discovered that the Xircom PCMCIA network device driver in the Linux
kernel did not properly handle device removal events. A physically
proximate attacker could use this to cause a denial of service (system
crash). (CVE-2023-1670)
It was discovered that a race condition existed in the Xen transport layer
implementation for the 9P file system protocol in the Linux kernel, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service (guest crash) or expose sensitive information (guest
kernel memory). (CVE-2023-1859)
It was discovered that the ST NCI NFC driver did not properly handle device
removal events. A physically proximate attacker could use this to cause a
denial of service (system crash). (CVE-2023-1990)
It was discovered that the XFS file system implementation in the Linux
kernel did not properly perform metadata validation when mounting certain
images. An attacker could use this to specially craft a file system image
that, when mounted, could cause a denial of service (system crash).
(CVE-2023-2124)
It was discovered that the IP-VLAN network driver for the Linux kernel did
not properly initialize memory in some situations, leading to an out-of-
bounds write vulnerability. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2023-3090)
It was discovered that the btrfs file system implementation in the Linux
kernel did not properly handle error conditions in some situations, leading
to a use-after-free vulnerability. A local attacker could possibly use this
to cause a denial of service (system crash). (CVE-2023-3111)
It was discovered that the Ricoh R5C592 MemoryStick card reader driver in
the Linux kernel contained a race condition during module unload, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-3141)
It was discovered that the kernel->user space relay implementation in the
Linux kernel did not properly perform certain buffer calculations, leading
to an out-of-bounds read vulnerability. A local attacker could use this to
cause a denial of service (system crash) or expose sensitive information
(kernel memory). (CVE-2023-3268)
It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle some error conditions, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3390)
Tanguy Dubroca discovered that the netfilter subsystem in the Linux kernel
did not properly handle certain pointer data type, leading to an out-of-
bounds write vulnerability. A privileged attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-35001)
CVEs:
- https://ubuntu.com/security/CVE-2022-1184
- https://ubuntu.com/security/CVE-2022-3303
- https://ubuntu.com/security/CVE-2023-1611
- https://ubuntu.com/security/CVE-2023-1670
- https://ubuntu.com/security/CVE-2023-1859
- https://ubuntu.com/security/CVE-2023-1990
- https://ubuntu.com/security/CVE-2023-2124
- https://ubuntu.com/security/CVE-2023-3090
- https://ubuntu.com/security/CVE-2023-3111
- https://ubuntu.com/security/CVE-2023-3141
- https://ubuntu.com/security/CVE-2023-3268
- https://ubuntu.com/security/CVE-2023-3390
- https://ubuntu.com/security/CVE-2023-35001
- https://ubuntu.com/security/CVE-2023-3390
- https://ubuntu.com/security/CVE-2023-1990
- https://ubuntu.com/security/CVE-2023-3268
- https://ubuntu.com/security/CVE-2023-1670
- https://ubuntu.com/security/CVE-2022-1184
- https://ubuntu.com/security/CVE-2023-1859
- https://ubuntu.com/security/CVE-2023-3141
- https://ubuntu.com/security/CVE-2023-3111
- https://ubuntu.com/security/CVE-2023-2124
- https://ubuntu.com/security/CVE-2023-35001
- https://ubuntu.com/security/CVE-2023-3090
- https://ubuntu.com/security/CVE-2022-3303
- https://ubuntu.com/security/CVE-2023-1611
Title: USN-6270-1: Vim vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6270-1
Priorities: medium,low
Description:
It was discovered that Vim incorrectly handled memory when opening certain
files. If an attacker could trick a user into opening a specially crafted
file, it could cause Vim to crash, or possibly execute arbitrary code. This
issue only affected Ubuntu 22.04 LTS. (CVE-2022-2182)
It was discovered that Vim incorrectly handled memory when deleting buffers
in diff mode. An attacker could possibly use this issue to cause a denial
of service. This issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
(CVE-2022-2208)
It was discovered that Vim incorrectly handled memory access. An attacker
could possibly use this issue to cause the corruption of sensitive
information, a crash, or arbitrary code execution. This issue only affected
Ubuntu 14.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
(CVE-2022-2210)
It was discovered that Vim incorrectly handled memory when using nested
:source. An attacker could possibly use this issue to cause a denial of
service. This issue only affected Ubuntu 22.04 LTS. (CVE-2022-2231)
It was discovered that Vim did not properly perform bounds checks when
processing a menu item with the only modifier. An attacker could possibly
use this issue to cause a denial of service. (CVE-2022-2257)
It was discovered that Vim incorrectly handled memory when opening certain
files. If an attacker could trick a user into opening a specially crafted
file, it could cause Vim to crash, or possibly execute arbitrary code.
(CVE-2022-2264, CVE-2022-2284, CVE-2022-2289)
It was discovered that Vim did not properly perform bounds checks when
going over the end of the typahead. An attacker could possibly use this
issue to cause a denial of service. (CVE-2022-2285)
It was discovered that Vim did not properly perform bounds checks when
reading the provided string. An attacker could possibly use this issue to
cause a denial of service. (CVE-2022-2286)
It was discovered that Vim incorrectly handled memory when adding words
with a control character to the internal spell word list. An attacker could
possibly use this issue to cause a denial of service. (CVE-2022-2287)
CVEs:
- https://ubuntu.com/security/CVE-2022-2182
- https://ubuntu.com/security/CVE-2022-2208
- https://ubuntu.com/security/CVE-2022-2210
- https://ubuntu.com/security/CVE-2022-2231
- https://ubuntu.com/security/CVE-2022-2257
- https://ubuntu.com/security/CVE-2022-2264
- https://ubuntu.com/security/CVE-2022-2284
- https://ubuntu.com/security/CVE-2022-2289
- https://ubuntu.com/security/CVE-2022-2285
- https://ubuntu.com/security/CVE-2022-2286
- https://ubuntu.com/security/CVE-2022-2287
- https://ubuntu.com/security/CVE-2022-2208
- https://ubuntu.com/security/CVE-2022-2182
- https://ubuntu.com/security/CVE-2022-2264
- https://ubuntu.com/security/CVE-2022-2286
- https://ubuntu.com/security/CVE-2022-2287
- https://ubuntu.com/security/CVE-2022-2231
- https://ubuntu.com/security/CVE-2022-2210
- https://ubuntu.com/security/CVE-2022-2285
- https://ubuntu.com/security/CVE-2022-2289
- https://ubuntu.com/security/CVE-2022-2284
- https://ubuntu.com/security/CVE-2022-2257
Title: USN-6271-1: MaraDNS vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6271-1
Priorities: medium
Description:
Xiang Li discovered that MaraDNS incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to obtain
sensitive information. (CVE-2022-30256)
Huascar Tejeda discovered that MaraDNS incorrectly handled certain inputs. If
a user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to cause a denial
of service. (CVE-2023-31137)
CVEs:
- https://ubuntu.com/security/CVE-2022-30256
- https://ubuntu.com/security/CVE-2023-31137
- https://ubuntu.com/security/CVE-2023-31137
- https://ubuntu.com/security/CVE-2022-30256
Title: USN-6286-1: Intel Microcode vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6286-1
Priorities: medium
Description:
Daniel Moghimi discovered that some Intel(R) Processors did not properly clear
microarchitectural state after speculative execution of various instructions. A
local unprivileged user could use this to obtain to sensitive
information. (CVE-2022-40982)
It was discovered that some Intel(R) Xeon(R) Processors did not properly
restrict error injection for Intel(R) SGX or Intel(R) TDX. A local privileged
user could use this to further escalate their privileges. (CVE-2022-41804)
It was discovered that some 3rd Generation Intel(R) Xeon(R) Scalable processors
did not properly restrict access in some situations. A local privileged attacker
could use this to obtain sensitive information. (CVE-2023-23908)
CVEs:
- https://ubuntu.com/security/CVE-2022-40982
- https://ubuntu.com/security/CVE-2022-41804
- https://ubuntu.com/security/CVE-2023-23908
- https://ubuntu.com/security/CVE-2022-40982
- https://ubuntu.com/security/CVE-2023-23908
- https://ubuntu.com/security/CVE-2022-41804
Title: USN-6290-1: LibTIFF vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6290-1
Priorities: medium,low
Description:
It was discovered that LibTIFF could be made to write out of bounds when
processing certain malformed image files with the tiffcrop utility. If a
user were tricked into opening a specially crafted image file, an attacker
could possibly use this issue to cause tiffcrop to crash, resulting in a
denial of service, or possibly execute arbitrary code. This issue only
affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS.
(CVE-2022-48281)
It was discovered that LibTIFF incorrectly handled certain image files. If
a user were tricked into opening a specially crafted image file, an
attacker could possibly use this issue to cause a denial of service. This
issue only affected Ubuntu 23.04. (CVE-2023-2731)
It was discovered that LibTIFF incorrectly handled certain image files
with the tiffcp utility. If a user were tricked into opening a specially
crafted image file, an attacker could possibly use this issue to cause
tiffcp to crash, resulting in a denial of service. (CVE-2023-2908)
It was discovered that LibTIFF incorrectly handled certain file paths. If
a user were tricked into specifying certain output paths, an attacker
could possibly use this issue to cause a denial of service. This issue
only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-3316)
It was discovered that LibTIFF could be made to write out of bounds when
processing certain malformed image files. If a user were tricked into
opening a specially crafted image file, an attacker could possibly use
this issue to cause a denial of service, or possibly execute arbitrary
code. (CVE-2023-3618)
It was discovered that LibTIFF could be made to write out of bounds when
processing certain malformed image files. If a user were tricked into
opening a specially crafted image file, an attacker could possibly use
this issue to cause a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and
Ubuntu 23.04. (CVE-2023-25433, CVE-2023-26966)
It was discovered that LibTIFF did not properly managed memory when
processing certain malformed image files with the tiffcrop utility. If a
user were tricked into opening a specially crafted image file, an attacker
could possibly use this issue to cause tiffcrop to crash, resulting in a
denial of service, or possibly execute arbitrary code. This issue only
affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 23.04.
(CVE-2023-26965)
It was discovered that LibTIFF contained an arithmetic overflow. If a user
were tricked into opening a specially crafted image file, an attacker
could possibly use this issue to cause a denial of service.
(CVE-2023-38288, CVE-2023-38289)
CVEs:
- https://ubuntu.com/security/CVE-2022-48281
- https://ubuntu.com/security/CVE-2023-2731
- https://ubuntu.com/security/CVE-2023-2908
- https://ubuntu.com/security/CVE-2023-3316
- https://ubuntu.com/security/CVE-2023-3618
- https://ubuntu.com/security/CVE-2023-25433
- https://ubuntu.com/security/CVE-2023-26966
- https://ubuntu.com/security/CVE-2023-26965
- https://ubuntu.com/security/CVE-2023-38288
- https://ubuntu.com/security/CVE-2023-38289
- https://ubuntu.com/security/CVE-2022-48281
- https://ubuntu.com/security/CVE-2023-2908
- https://ubuntu.com/security/CVE-2023-3316
- https://ubuntu.com/security/CVE-2023-3618
- https://ubuntu.com/security/CVE-2023-38288
- https://ubuntu.com/security/CVE-2023-25433
- https://ubuntu.com/security/CVE-2023-38289
- https://ubuntu.com/security/CVE-2023-2731
- https://ubuntu.com/security/CVE-2023-26966
- https://ubuntu.com/security/CVE-2023-26965
Title: USN-6254-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6254-1
Priorities: medium,low,high
Description:
Jordy Zomer and Alexandra Sandulescu discovered that syscalls invoking the
do_prlimit() function in the Linux kernel did not properly handle
speculative execution barriers. A local attacker could use this to expose
sensitive information (kernel memory). (CVE-2023-0458)
It was discovered that a race condition existed in the btrfs file system
implementation in the Linux kernel, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-1611)
It was discovered that the XFS file system implementation in the Linux
kernel did not properly perform metadata validation when mounting certain
images. An attacker could use this to specially craft a file system image
that, when mounted, could cause a denial of service (system crash).
(CVE-2023-2124)
It was discovered that a use-after-free vulnerability existed in the iSCSI
TCP implementation in the Linux kernel. A local attacker could possibly use
this to cause a denial of service (system crash). (CVE-2023-2162)
It was discovered that the ext4 file system implementation in the Linux
kernel did not properly handle extra inode size for extended attributes,
leading to a use-after-free vulnerability. A privileged attacker could
possibly use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-2513)
It was discovered that the IP-VLAN network driver for the Linux kernel did
not properly initialize memory in some situations, leading to an out-of-
bounds write vulnerability. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2023-3090)
It was discovered that the Ricoh R5C592 MemoryStick card reader driver in
the Linux kernel contained a race condition during module unload, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-3141)
It was discovered that a use-after-free vulnerability existed in the IEEE
1394 (Firewire) implementation in the Linux kernel. A privileged attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-3159)
Sanan Hasanov discovered that the framebuffer console driver in the Linux
kernel did not properly perform checks for font dimension limits. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2023-3161)
It was discovered that the kernel->user space relay implementation in the
Linux kernel did not properly perform certain buffer calculations, leading
to an out-of-bounds read vulnerability. A local attacker could use this to
cause a denial of service (system crash) or expose sensitive information
(kernel memory). (CVE-2023-3268)
It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle some error conditions, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3390)
Tanguy Dubroca discovered that the netfilter subsystem in the Linux kernel
did not properly handle certain pointer data type, leading to an out-of-
bounds write vulnerability. A privileged attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-35001)
CVEs:
- https://ubuntu.com/security/CVE-2023-0458
- https://ubuntu.com/security/CVE-2023-1611
- https://ubuntu.com/security/CVE-2023-2124
- https://ubuntu.com/security/CVE-2023-2162
- https://ubuntu.com/security/CVE-2023-2513
- https://ubuntu.com/security/CVE-2023-3090
- https://ubuntu.com/security/CVE-2023-3141
- https://ubuntu.com/security/CVE-2023-3159
- https://ubuntu.com/security/CVE-2023-3161
- https://ubuntu.com/security/CVE-2023-3268
- https://ubuntu.com/security/CVE-2023-3390
- https://ubuntu.com/security/CVE-2023-35001
- https://ubuntu.com/security/CVE-2023-2513
- https://ubuntu.com/security/CVE-2023-3268
- https://ubuntu.com/security/CVE-2023-3390
- https://ubuntu.com/security/CVE-2023-2162
- https://ubuntu.com/security/CVE-2023-3141
- https://ubuntu.com/security/CVE-2023-0458
- https://ubuntu.com/security/CVE-2023-3159
- https://ubuntu.com/security/CVE-2023-3161
- https://ubuntu.com/security/CVE-2023-35001
- https://ubuntu.com/security/CVE-2023-2124
- https://ubuntu.com/security/CVE-2023-3090
- https://ubuntu.com/security/CVE-2023-1611
Title: USN-6257-1: Open VM Tools vulnerability
URL: https://ubuntu.com/security/notices/USN-6257-1
Priorities: low
Description:
It was discovered that Open VM Tools incorrectly handled certain
authentication requests. A fully compromised ESXi host can force Open VM
Tools to fail to authenticate host-to-guest operations, impacting the
confidentiality and integrity of the guest virtual machine. (CVE-2023-20867)
CVEs:
- https://ubuntu.com/security/CVE-2023-20867
- https://ubuntu.com/security/CVE-2023-20867
Title: USN-6263-1: OpenJDK vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6263-1
Priorities: medium,low
Description:
Motoyasu Saburi discovered that OpenJDK incorrectly handled special
characters in file name parameters. An attacker could possibly use
this issue to insert, edit or obtain sensitive information. This issue
only affected OpenJDK 11 and OpenJDK 17. (CVE-2023-22006)
Eirik Bjørsnøs discovered that OpenJDK incorrectly handled certain ZIP
archives. An attacker could possibly use this issue to cause a denial
of service. This issue only affected OpenJDK 11 and OpenJDK 17.
(CVE-2023-22036)
David Stancu discovered that OpenJDK had a flaw in the AES cipher
implementation. An attacker could possibly use this issue to obtain
sensitive information. This issue only affected OpenJDK 11 and OpenJDK 17.
(CVE-2023-22041)
Zhiqiang Zang discovered that OpenJDK incorrectly handled array accesses
when using the binary ‘%’ operator. An attacker could possibly use this
issue to obtain sensitive information. This issue only affected OpenJDK 17.
(CVE-2023-22044)
Zhiqiang Zang discovered that OpenJDK incorrectly handled array accesses.
An attacker could possibly use this issue to obtain sensitive information.
(CVE-2023-22045)
It was discovered that OpenJDK incorrectly sanitized URIs strings. An
attacker could possibly use this issue to insert, edit or obtain sensitive
information. (CVE-2023-22049)
It was discovered that OpenJDK incorrectly handled certain glyphs. An
attacker could possibly use this issue to cause a denial of service.
This issue only affected OpenJDK 11 and OpenJDK 17.
(CVE-2023-25193)
CVEs:
- https://ubuntu.com/security/CVE-2023-22006
- https://ubuntu.com/security/CVE-2023-22036
- https://ubuntu.com/security/CVE-2023-22041
- https://ubuntu.com/security/CVE-2023-22044
- https://ubuntu.com/security/CVE-2023-22045
- https://ubuntu.com/security/CVE-2023-22049
- https://ubuntu.com/security/CVE-2023-25193
- https://ubuntu.com/security/CVE-2023-22045
- https://ubuntu.com/security/CVE-2023-22036
- https://ubuntu.com/security/CVE-2023-22044
- https://ubuntu.com/security/CVE-2023-25193
- https://ubuntu.com/security/CVE-2023-22049
- https://ubuntu.com/security/CVE-2023-22006
- https://ubuntu.com/security/CVE-2023-22041
Title: USN-6274-1: XMLTooling vulnerability
URL: https://ubuntu.com/security/notices/USN-6274-1
Priorities: medium
Description:
Jurien de Jong discovered that XMLTooling did not properly handle certain
KeyInfo element content within an XML signature. An attacker could possibly
use this issue to achieve server-side request forgery.
CVEs:
- https://ubuntu.com/security/CVE-2023-36661
Title: USN-6242-2: OpenSSH vulnerability
URL: https://ubuntu.com/security/notices/USN-6242-2
Priorities: medium
Description:
USN-6242-1 fixed a vulnerability in OpenSSH. This update provides
the corresponding update for Ubuntu 14.04 LTS, Ubuntu 16.04 LTS,
and Ubuntu 18.04 LTS.
Original advisory details:
It was discovered that OpenSSH incorrectly handled loading certain PKCS#11
providers. If a user forwarded their ssh-agent to an untrusted system, a
remote attacker could possibly use this issue to load arbitrary libraries
from the user’s system and execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2023-38408
Title: USN-6275-1: Cargo vulnerability
URL: https://ubuntu.com/security/notices/USN-6275-1
Priorities: medium
Description:
Addison Crump discovered that Cargo incorrectly set file permissions
on UNIX-like systems when extracting crate archives. If the crate would
contain files writable by any user, a local attacker could possibly use
this issue to execute code as another user.
CVEs:
- https://ubuntu.com/security/CVE-2023-38497
Available in VMware Tanzu Network
Release Date: July 26, 2023
BOSH Agent Version: 2.268.150
Title: USN-6233-1: YAJL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6233-1
Priorities: low,medium
Description:
It was discovered that YAJL was not properly performing bounds checks when
decoding a string with escape sequences. If a user or automated system
using YAJL were tricked into processing specially crafted input, an
attacker could possibly use this issue to cause a denial of service
(application abort). (CVE-2017-16516)
It was discovered that YAJL was not properly handling memory allocation
when dealing with large inputs, which could lead to heap memory
corruption. If a user or automated system using YAJL were tricked into
running a specially crafted large input, an attacker could possibly use
this issue to cause a denial of service. (CVE-2022-24795)
It was discovered that memory leaks existed in one of the YAJL parsing
functions. An attacker could possibly use this issue to cause a denial of
service (memory exhaustion). (CVE-2023-33460)
CVEs:
- https://ubuntu.com/security/CVE-2017-16516
- https://ubuntu.com/security/CVE-2022-24795
- https://ubuntu.com/security/CVE-2023-33460
- https://ubuntu.com/security/CVE-2023-33460
- https://ubuntu.com/security/CVE-2022-24795
- https://ubuntu.com/security/CVE-2017-16516
Title: USN-6232-1: wkhtmltopdf vulnerability
URL: https://ubuntu.com/security/notices/USN-6232-1
Priorities: medium
Description:
It was discovered that wkhtmltopdf was not properly enforcing the
same-origin policy when processing certain HTML files. If a user or
automated system using wkhtmltopdf were tricked into processing a
specially crafted HTML file, an attacker could possibly use this issue to
expose sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2020-21365
Title: USN-6236-1: ConnMan vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6236-1
Priorities: medium
Description:
It was discovered that ConnMan could be made to write out of bounds. A
remote attacker could possibly use this issue to cause ConnMan to crash,
resulting in a denial of service, or possibly execute arbitrary code. This
issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS.
(CVE-2021-26675, CVE-2021-33833)
It was discovered that ConnMan could be made to leak sensitive information
via the gdhcp component. A remote attacker could possibly use this issue
to obtain information for further exploitation. This issue only affected
Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS. (CVE-2021-26676)
It was discovered that ConnMan could be made to read out of bounds. A
remote attacker could possibly use this issue to case ConnMan to crash,
resulting in a denial of service. This issue only affected Ubuntu 16.04
LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS.
(CVE-2022-23096, CVE-2022-23097)
It was discovered that ConnMan could be made to run into an infinite loop.
A remote attacker could possibly use this issue to cause ConnMan to
consume resources and to stop operating, resulting in a denial of service.
This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04
LTS, and Ubuntu 22.04 LTS. (CVE-2022-23098)
It was discovered that ConnMan could be made to write out of bounds via
the gweb component. A remote attacker could possibly use this issue to
cause ConnMan to crash, resulting in a denial of service, or possibly
execute arbitrary code. This issue only affected Ubuntu 16.04 LTS, Ubuntu
18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-32292)
It was discovered that ConnMan did not properly manage memory under
certain circumstances. A remote attacker could possibly use this issue to
cause ConnMan to crash, resulting in a denial of service, or possibly
execute arbitrary code. This issue only affected Ubuntu 16.04 LTS, Ubuntu
18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-32293)
It was discovered that ConnMan could be made to write out of bounds via
the gdhcp component. A remote attacker could possibly use this issue to
cause ConnMan to crash, resulting in a denial of service, or possibly
execute arbitrary code. (CVE-2023-28488)
CVEs:
- https://ubuntu.com/security/CVE-2021-26675
- https://ubuntu.com/security/CVE-2021-33833
- https://ubuntu.com/security/CVE-2021-26676
- https://ubuntu.com/security/CVE-2022-23096
- https://ubuntu.com/security/CVE-2022-23097
- https://ubuntu.com/security/CVE-2022-23098
- https://ubuntu.com/security/CVE-2022-32292
- https://ubuntu.com/security/CVE-2022-32293
- https://ubuntu.com/security/CVE-2023-28488
- https://ubuntu.com/security/CVE-2021-26676
- https://ubuntu.com/security/CVE-2022-32293
- https://ubuntu.com/security/CVE-2023-28488
- https://ubuntu.com/security/CVE-2022-23098
- https://ubuntu.com/security/CVE-2021-26675
- https://ubuntu.com/security/CVE-2021-33833
- https://ubuntu.com/security/CVE-2022-23097
- https://ubuntu.com/security/CVE-2022-23096
- https://ubuntu.com/security/CVE-2022-32292
Title: USN-6239-1: ECDSA Util vulnerability
URL: https://ubuntu.com/security/notices/USN-6239-1
Priorities: medium
Description:
It was discovered that ECDSA Util did not properly verify certain
signature values.
An attacker could possibly use this issue to bypass signature
verification.
CVEs:
- https://ubuntu.com/security/CVE-2022-24884
Title: USN-6244-1: AMD Microcode vulnerability
URL: https://ubuntu.com/security/notices/USN-6244-1
Priorities: high
Description:
Tavis Ormandy discovered that some AMD processors did not properly handle
speculative execution of certain vector register instructions. A local attacker
could use this to expose sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2023-20593
Title: USN-6183-2: Bind vulnerability
URL: https://ubuntu.com/security/notices/USN-6183-2
Priorities: medium
Description:
USN-6183-1 fixed vulnerabilities in Bind. This update provides the
corresponding updates for Ubuntu 14.04 LTS, Ubuntu 16.04 LTS and Ubuntu 18.04
LTS.
Original advisory details:
Shoham Danino, Anat Bremler-Barr, Yehuda Afek, and Yuval Shavitt discovered
that Bind incorrectly handled the cache size limit. A remote attacker could
possibly use this issue to consume memory, leading to a denial of service.
(CVE-2023-2828)
It was discovered that Bind incorrectly handled the recursive-clients
quota. A remote attacker could possibly use this issue to cause Bind to
crash, resulting in a denial of service. This issue only affected Ubuntu
22.04 LTS, Ubuntu 22.10, and Ubuntu 23.04. (CVE-2023-2911)
CVEs:
- https://ubuntu.com/security/CVE-2023-2828
- https://ubuntu.com/security/CVE-2023-2911
- https://ubuntu.com/security/CVE-2023-2828
Available in VMware Tanzu Network
Release Date: July 19, 2023
BOSH Agent Version: 2.268.149
Title: USN-6200-1: ImageMagick vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6200-1
Priorities: negligible,medium,low
Description:
It was discovered that ImageMagick incorrectly handled the “-authenticate”
option for password-protected PDF files. An attacker could possibly use
this issue to inject additional shell commands and perform arbitrary code
execution. This issue only affected Ubuntu 20.04 LTS. (CVE-2020-29599)
It was discovered that ImageMagick incorrectly handled certain values
when processing PDF files. If a user or automated system using ImageMagick
were tricked into opening a specially crafted PDF file, an attacker could
exploit this to cause a denial of service. This issue only affected Ubuntu
20.04 LTS. (CVE-2021-20224)
Zhang Xiaohui discovered that ImageMagick incorrectly handled certain
values when processing image data. If a user or automated system using
ImageMagick were tricked into opening a specially crafted image, an
attacker could exploit this to cause a denial of service. This issue only
affected Ubuntu 20.04 LTS. (CVE-2021-20241, CVE-2021-20243)
It was discovered that ImageMagick incorrectly handled certain values
when processing visual effects based image files. By tricking a user into
opening a specially crafted image file, an attacker could crash the
application causing a denial of service. This issue only affected Ubuntu
20.04 LTS. (CVE-2021-20244, CVE-2021-20309)
It was discovered that ImageMagick incorrectly handled certain values
when performing resampling operations. By tricking a user into opening
a specially crafted image file, an attacker could crash the application
causing a denial of service. This issue only affected Ubuntu 20.04 LTS.
(CVE-2021-20246)
It was discovered that ImageMagick incorrectly handled certain values
when processing thumbnail image data. By tricking a user into opening
a specially crafted image file, an attacker could crash the application
causing a denial of service. This issue only affected Ubuntu 20.04 LTS.
(CVE-2021-20312)
It was discovered that ImageMagick incorrectly handled memory cleanup
when performing certain cryptographic operations. Under certain conditions
sensitive cryptographic information could be disclosed. This issue only
affected Ubuntu 20.04 LTS. (CVE-2021-20313)
It was discovered that ImageMagick did not use the correct rights when
specifically excluded by a module policy. An attacker could use this issue
to read and write certain restricted files. This issue only affected Ubuntu
20.04 LTS. (CVE-2021-39212)
It was discovered that ImageMagick incorrectly handled memory under certain
circumstances. If a user were tricked into opening a specially crafted
image file, an attacker could possibly exploit this issue to cause a denial
of service or other unspecified impact. This issue only affected Ubuntu
20.04 LTS. (CVE-2022-28463, CVE-2022-32545, CVE-2022-32546, CVE-2022-32547)
It was discovered that ImageMagick incorrectly handled memory under certain
circumstances. If a user were tricked into opening a specially crafted
image file, an attacker could possibly exploit this issue to cause a denial
of service or other unspecified impact. This issue only affected Ubuntu
22.04 LTS, Ubuntu 22.10, and Ubuntu 23.04. (CVE-2021-3610, CVE-2023-1906,
CVE-2023-3428)
It was discovered that ImageMagick incorrectly handled certain values
when processing specially crafted SVG files. By tricking a user into
opening a specially crafted SVG file, an attacker could crash the
application causing a denial of service. This issue only affected Ubuntu
20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 22.10, and Ubuntu 23.04. (CVE-2023-1289)
It was discovered that ImageMagick incorrectly handled memory under certain
circumstances. If a user were tricked into opening a specially crafted
tiff file, an attacker could possibly exploit this issue to cause a denial
of service or other unspecified impact. This issue only affected Ubuntu
22.04 LTS, Ubuntu 22.10, and Ubuntu 23.04. (CVE-2023-3195)
It was discovered that ImageMagick incorrectly handled memory under certain
circumstances. If a user were tricked into opening a specially crafted
image file, an attacker could possibly exploit this issue to cause a denial
of service or other unspecified impact. (CVE-2023-34151)
CVEs:
- https://ubuntu.com/security/CVE-2020-29599
- https://ubuntu.com/security/CVE-2021-20224
- https://ubuntu.com/security/CVE-2021-20241
- https://ubuntu.com/security/CVE-2021-20243
- https://ubuntu.com/security/CVE-2021-20244
- https://ubuntu.com/security/CVE-2021-20309
- https://ubuntu.com/security/CVE-2021-20246
- https://ubuntu.com/security/CVE-2021-20312
- https://ubuntu.com/security/CVE-2021-20313
- https://ubuntu.com/security/CVE-2021-39212
- https://ubuntu.com/security/CVE-2022-28463
- https://ubuntu.com/security/CVE-2022-32545
- https://ubuntu.com/security/CVE-2022-32546
- https://ubuntu.com/security/CVE-2022-32547
- https://ubuntu.com/security/CVE-2021-3610
- https://ubuntu.com/security/CVE-2023-1906
- https://ubuntu.com/security/CVE-2023-3428
- https://ubuntu.com/security/CVE-2023-1289
- https://ubuntu.com/security/CVE-2023-3195
- https://ubuntu.com/security/CVE-2023-34151
- https://ubuntu.com/security/CVE-2023-1289
- https://ubuntu.com/security/CVE-2021-20243
- https://ubuntu.com/security/CVE-2021-20246
- https://ubuntu.com/security/CVE-2021-3610
- https://ubuntu.com/security/CVE-2021-20224
- https://ubuntu.com/security/CVE-2021-20312
- https://ubuntu.com/security/CVE-2023-3428
- https://ubuntu.com/security/CVE-2021-20313
- https://ubuntu.com/security/CVE-2021-20309
- https://ubuntu.com/security/CVE-2021-39212
- https://ubuntu.com/security/CVE-2021-20241
- https://ubuntu.com/security/CVE-2023-3195
- https://ubuntu.com/security/CVE-2022-32545
- https://ubuntu.com/security/CVE-2022-28463
- https://ubuntu.com/security/CVE-2021-20244
- https://ubuntu.com/security/CVE-2023-1906
- https://ubuntu.com/security/CVE-2023-34151
- https://ubuntu.com/security/CVE-2020-29599
- https://ubuntu.com/security/CVE-2022-32547
- https://ubuntu.com/security/CVE-2022-32546
Title: USN-6221-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6221-1
Priorities: medium,low
Description:
It was discovered that a race condition existed in the overlay file system
implementation in the Linux kernel. A local attacker could use this to
cause a denial of service (system crash). (CVE-2021-20321)
It was discovered that the virtual terminal (vt) device implementation in
the Linux kernel contained a race condition in its ioctl handling that led
to an out-of-bounds read vulnerability. A local attacker could possibly use
this to expose sensitive information. (CVE-2021-3753)
It was discovered that the ext4 file system implementation in the Linux
kernel contained a use-after-free vulnerability. An attacker could use this
to construct a malicious ext4 file system image that, when mounted, could
cause a denial of service (system crash). (CVE-2022-1184)
Pawan Kumar Gupta, Alyssa Milburn, Amit Peled, Shani Rehana, Nir Shildan
and Ariel Sabba discovered that some Intel processors with Enhanced
Indirect Branch Restricted Speculation (eIBRS) did not properly handle RET
instructions after a VM exits. A local attacker could potentially use this
to expose sensitive information. (CVE-2022-26373)
Johannes Wikner and Kaveh Razavi discovered that for some Intel x86-64
processors, the Linux kernel’s protections against speculative branch
target injection attacks were insufficient in some circumstances. A local
attacker could possibly use this to expose sensitive information.
(CVE-2022-29901)
It was discovered that the ST NCI NFC driver did not properly handle device
removal events. A physically proximate attacker could use this to cause a
denial of service (system crash). (CVE-2023-1990)
It was discovered that the btrfs file system implementation in the Linux
kernel did not properly handle error conditions in some situations, leading
to a use-after-free vulnerability. A local attacker could possibly use this
to cause a denial of service (system crash). (CVE-2023-3111)
CVEs:
- https://ubuntu.com/security/CVE-2021-20321
- https://ubuntu.com/security/CVE-2021-3753
- https://ubuntu.com/security/CVE-2022-1184
- https://ubuntu.com/security/CVE-2022-26373
- https://ubuntu.com/security/CVE-2022-29901
- https://ubuntu.com/security/CVE-2023-1990
- https://ubuntu.com/security/CVE-2023-3111
- https://ubuntu.com/security/CVE-2022-29901
- https://ubuntu.com/security/CVE-2022-26373
- https://ubuntu.com/security/CVE-2023-3111
- https://ubuntu.com/security/CVE-2021-20321
- https://ubuntu.com/security/CVE-2023-1990
- https://ubuntu.com/security/CVE-2021-3753
- https://ubuntu.com/security/CVE-2022-1184
Title: USN-6225-1: Knot Resolver vulnerability
URL: https://ubuntu.com/security/notices/USN-6225-1
Priorities: medium
Description:
It was discovered that Knot Resolver did not correctly handle certain
client options. A remote attacker could send requests to malicous domains
and cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2022-40188
Title: USN-6230-1: PostgreSQL vulnerability
URL: https://ubuntu.com/security/notices/USN-6230-1
Priorities: medium
Description:
Alexander Lakhin discovered that PostgreSQL incorrectly handled certain
CREATE privileges. An authenticated user could possibly use this issue to
execute arbitrary code as the bootstrap supervisor.
CVEs:
- https://ubuntu.com/security/CVE-2023-2454
Title: USN-6198-1: GNU Screen vulnerability
URL: https://ubuntu.com/security/notices/USN-6198-1
Priorities: low
Description:
It was discovered that GNU Screen was not properly checking user
identifiers before sending certain signals to target processes. If GNU
Screen was installed as setuid or setgid, a local attacker could possibly
use this issue to cause a denial of service on a target application.
CVEs:
- https://ubuntu.com/security/CVE-2023-24626
Title: USN-6202-1: containerd vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6202-1
Priorities: medium
Description:
David Korczynski and Adam Korczynski discovered that containerd
incorrectly processed certain images with large files. An attacker
could possibly use this issue to cause containerd to crash,
resulting in a denial of service. (CVE-2023-25153)
It was discovered that containerd incorrectly set up supplementary
groups inside a container. An attacker with direct access to the
container could possibly use this issue to obtain sensitive information
or execute code with higher privileges. (CVE-2023-25173)
CVEs:
- https://ubuntu.com/security/CVE-2023-25153
- https://ubuntu.com/security/CVE-2023-25173
- https://ubuntu.com/security/CVE-2023-25153
- https://ubuntu.com/security/CVE-2023-25173
Title: USN-6229-1: LibTIFF vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6229-1
Priorities: medium,low
Description:
It was discovered that LibTIFF was not properly handling variables used to
perform memory management operations when processing an image through
tiffcrop, which could lead to a heap buffer overflow. An attacker could
possibly use this issue to cause a denial of service or execute arbitrary
code. (CVE-2023-25433, CVE-2023-26965)
It was discovered that LibTIFF was not properly processing numerical
values when dealing with little-endian input data, which could lead to the
execution of an invalid operation. An attacker could possibly use this
issue to cause a denial of service (CVE-2023-26966)
It was discovered that LibTIFF was not properly performing bounds checks
when closing a previously opened TIFF file, which could lead to a NULL
pointer dereference. An attacker could possibly use this issue to cause a
denial of service. (CVE-2023-3316)
CVEs:
- https://ubuntu.com/security/CVE-2023-25433
- https://ubuntu.com/security/CVE-2023-26965
- https://ubuntu.com/security/CVE-2023-26966
- https://ubuntu.com/security/CVE-2023-3316
- https://ubuntu.com/security/CVE-2023-25433
- https://ubuntu.com/security/CVE-2023-26965
- https://ubuntu.com/security/CVE-2023-3316
- https://ubuntu.com/security/CVE-2023-26966
Title: USN-6219-1: Ruby vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6219-1
Priorities: medium
Description:
It was discovered that Ruby incorrectly handled certain regular expressions.
An attacker could possibly use this issue to cause a denial of service.
This issue only affected Ubuntu 20.10 and Ubuntu 20.04 LTS.
(CVE-2023-28755)
It was discovered that Ruby incorrectly handled certain regular expressions.
An attacker could possibly use this issue to cause a denial of service.
This issue exists because of an incomplete fix for CVE-2023-28755.
(CVE-2023-36617)
CVEs:
- https://ubuntu.com/security/CVE-2023-28755
- https://ubuntu.com/security/CVE-2023-28755
- https://ubuntu.com/security/CVE-2023-36617
- https://ubuntu.com/security/CVE-2023-36617
- https://ubuntu.com/security/CVE-2023-28755
Title: USN-6197-1: OpenLDAP vulnerability
URL: https://ubuntu.com/security/notices/USN-6197-1
Priorities: low
Description:
It was discovered that OpenLDAP was not properly performing bounds checks
when executing functions related to LDAP URLs. An attacker could possibly
use this issue to cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-2953
Title: USN-6210-1: Doorkeeper vulnerability
URL: https://ubuntu.com/security/notices/USN-6210-1
Priorities: high
Description:
It was discovered that Doorkeeper incorrectly performed authorization checks
for public clients that have been previous approved. An attacker could
potentially exploit these in order to impersonate another user and obtain
sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2023-34246
Available in VMware Tanzu Network
Release Date: June 26, 2023
BOSH Agent Version: 2.268.145
Title: USN-6180-1: VLC media player vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6180-1
Priorities: low,medium
Description:
It was discovered that VLC could be made to read out of bounds when
decoding image files. If a user were tricked into opening a crafted image
file, a remote attacker could possibly use this issue to cause VLC to
crash, leading to a denial of service. This issue only affected Ubuntu
16.04 LTS and Ubuntu 18.04 LTS. (CVE-2019-19721)
It was discovered that VLC could be made to write out of bounds when
processing H.264 video files. If a user were tricked into opening a
crafted H.264 video file, a remote attacker could possibly use this issue
to cause VLC to crash, leading to a denial of service, or possibly
execute arbitrary code. This issue only affected Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. (CVE-2020-13428)
It was discovered that VLC could be made to read out of bounds when
processing AVI video files. If a user were tricked into opening a crafted
AVI video file, a remote attacker could possibly use this issue to cause
VLC to crash, leading to a denial of service. This issue only affected
Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS. (CVE-2021-25801,
CVE-2021-25802, CVE-2021-25803, CVE-2021-25804)
It was discovered that the VNC module of VLC contained an arithmetic
overflow. If a user were tricked into opening a crafted playlist or
connecting to a rouge VNC server, a remote attacker could possibly use
this issue to cause VLC to crash, leading to a denial of service, or
possibly execute arbitrary code. (CVE-2022-41325)
CVEs:
- https://ubuntu.com/security/CVE-2019-19721
- https://ubuntu.com/security/CVE-2020-13428
- https://ubuntu.com/security/CVE-2021-25801
- https://ubuntu.com/security/CVE-2021-25802
- https://ubuntu.com/security/CVE-2021-25803
- https://ubuntu.com/security/CVE-2021-25804
- https://ubuntu.com/security/CVE-2022-41325
- https://ubuntu.com/security/CVE-2021-25801
- https://ubuntu.com/security/CVE-2021-25802
- https://ubuntu.com/security/CVE-2022-41325
- https://ubuntu.com/security/CVE-2019-19721
- https://ubuntu.com/security/CVE-2021-25804
- https://ubuntu.com/security/CVE-2021-25803
- https://ubuntu.com/security/CVE-2020-13428
Title: USN-6182-1: pngcheck vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6182-1
Priorities: medium
Description:
It was discovered that pngcheck incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to cause a
denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2020-27818
- https://ubuntu.com/security/CVE-2020-35511
Title: USN-6163-1: pano13 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6163-1
Priorities: medium
Description:
It was discovered that pano13 did not properly validate the prefix provided
for PTcrop’s output. An attacker could use this issue to cause pano13 to
crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS,
Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS. (CVE-2021-20307)
It was discovered that pano13 did not properly handle certain crafted TIFF
images. An attacker could use this issue to cause pano13 to crash,
resulting in a denial of service. (CVE-2021-33293)
CVEs:
- https://ubuntu.com/security/CVE-2021-20307
- https://ubuntu.com/security/CVE-2021-33293
- https://ubuntu.com/security/CVE-2021-20307
- https://ubuntu.com/security/CVE-2021-33293
Title: USN-6167-1: QEMU vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6167-1
Priorities: low,medium
Description:
It was discovered that QEMU did not properly manage the guest drivers when
shared buffers are not allocated. A malicious guest driver could use this
issue to cause QEMU to crash, resulting in a denial of service, or possibly
execute arbitrary code. This issue only affected Ubuntu 20.04 LTS, Ubuntu
22.04 LTS and Ubuntu 22.10. (CVE-2022-1050)
It was discovered that QEMU did not properly check the size of the
structure pointed to by the guest physical address pqxl. A malicious guest
attacker could use this issue to cause QEMU to crash, resulting in a denial
of service. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS,
Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu 22.10.
(CVE-2022-4144)
It was discovered that QEMU did not properly manage memory in the ACPI
Error Record Serialization Table (ERST) device. A malicious guest attacker
could use this issue to cause QEMU to crash, resulting in a denial of
service. This issue only affected Ubuntu 22.10. (CVE-2022-4172)
It was discovered that QEMU did not properly manage memory when DMA memory
writes happen repeatedly in the lsi53c895a device. A malicious guest
attacker could use this issue to cause QEMU to crash, resulting in a denial
of service. (CVE-2023-0330)
CVEs:
- https://ubuntu.com/security/CVE-2022-1050
- https://ubuntu.com/security/CVE-2022-4144
- https://ubuntu.com/security/CVE-2022-4172
- https://ubuntu.com/security/CVE-2023-0330
- https://ubuntu.com/security/CVE-2022-4172
- https://ubuntu.com/security/CVE-2022-4144
- https://ubuntu.com/security/CVE-2022-1050
- https://ubuntu.com/security/CVE-2023-0330
Title: USN-6169-1: GNU SASL vulnerability
URL: https://ubuntu.com/security/notices/USN-6169-1
Priorities: low
Description:
It was discovered that GNU SASL’s GSSAPI server could make an
out-of-bounds reads if given specially crafted GSS-API authentication
data. A remote attacker could possibly use this issue to cause a
denial of service or to expose sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2022-2469
Title: USN-6176-1: PyPDF2 vulnerability
URL: https://ubuntu.com/security/notices/USN-6176-1
Priorities: medium
Description:
It was discovered that PyPDF2 incorrectly handled certain PDF files. If a
user or automated system were tricked into processing a specially crafted
file, an attacker could possibly use this issue to consume system
resources, resulting in a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2022-24859
Title: USN-6179-1: Jettison vulnerability
URL: https://ubuntu.com/security/notices/USN-6179-1
Priorities: medium
Description:
It was discovered that Jettison incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to cause a
denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-1436
Title: USN-6154-1: Vim vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6154-1
Priorities: medium
Description:
It was discovered that Vim was using uninitialized memory when fuzzy
matching, which could lead to invalid memory access. An attacker could
possibly use this issue to cause a denial of service or execute arbitrary
code. This issue only affected Ubuntu 22.04 LTS, Ubuntu 22.10 and Ubuntu
23.04. (CVE-2023-2426)
It was discovered that Vim was not properly performing bounds checks when
processing register contents, which could lead to a NULL pointer
dereference. An attacker could possibly use this issue to cause a denial
of service or execute arbitrary code. (CVE-2023-2609)
It was discovered that Vim was not properly limiting the length of
substitution expression strings, which could lead to excessive memory
consumption. An attacker could possibly use this issue to cause a denial
of service. (CVE-2023-2610)
CVEs:
- https://ubuntu.com/security/CVE-2023-2426
- https://ubuntu.com/security/CVE-2023-2609
- https://ubuntu.com/security/CVE-2023-2610
- https://ubuntu.com/security/CVE-2023-2609
- https://ubuntu.com/security/CVE-2023-2610
- https://ubuntu.com/security/CVE-2023-2426
Title: USN-6083-2: cups-filters vulnerability
URL: https://ubuntu.com/security/notices/USN-6083-2
Priorities: medium
Description:
USN-6083-1 fixed a vulnerability in cups-filters. This update provides
the corresponding update for Ubuntu 16.04 LTS.
Original advisory details:
It was discovered that cups-filters incorrectly handled the beh CUPS
backend. A remote attacker could possibly use this issue to cause the
backend to stop responding or to execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2023-24805
Title: USN-6166-2: libcap2 vulnerability
URL: https://ubuntu.com/security/notices/USN-6166-2
Priorities: medium
Description:
USN-6166-1 fixed a vulnerability in libcap2. This update provides
the corresponding update for Ubuntu 14.04 ESM, Ubuntu 16.04 ESM
and Ubuntu 18.04 ESM.
Original advisory details:
Richard Weinberger discovered that libcap2 incorrectly handled certain long
input strings. An attacker could use this issue to cause libcap2 to crash,
resulting in a denial of service, or possibly execute arbitrary code.
(CVE-2023-2603)
CVEs:
- https://ubuntu.com/security/CVE-2023-2603
- https://ubuntu.com/security/CVE-2023-2603
Title: USN-6188-1: OpenSSL vulnerability
URL: https://ubuntu.com/security/notices/USN-6188-1
Priorities: medium
Description:
Matt Caswell discovered that OpenSSL incorrectly handled certain ASN.1
object identifiers. A remote attacker could possibly use this issue to
cause OpenSSL to consume resources, resulting in a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-2650
Title: USN-6159-1: Tornado vulnerability
URL: https://ubuntu.com/security/notices/USN-6159-1
Priorities: medium
Description:
It was discovered that Tornado incorrectly handled certain redirect.
An remote attacker could possibly use this issue to redirect a user to an
arbitrary web site and conduct a phishing attack by having user access a
specially crafted URL.
CVEs:
- https://ubuntu.com/security/CVE-2023-28370
Title: USN-6168-2: libx11 vulnerability
URL: https://ubuntu.com/security/notices/USN-6168-2
Priorities: medium
Description:
USN-6168-1 fixed a vulnerability in libx11. This update provides
the corresponding update for Ubuntu 14.04 ESM, Ubuntu 16.04 ESM,
and Ubuntu 18.04 ESM.
Original advisory details:
Gregory James Duck discovered that libx11 incorrectly handled certain
Request, Event, or Error IDs. If a user were tricked into connecting to a
malicious X Server, a remote attacker could possibly use this issue to
cause libx11 to crash, resulting in a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-3138
Title: USN-6155-2: Requests vulnerability
URL: https://ubuntu.com/security/notices/USN-6155-2
Priorities: medium
Description:
USN-6155-1 fixed a vulnerability in Requests. This update provides
the corresponding update for Ubuntu 16.04 ESM and 18.04 ESM.
Original advisory details:
Dennis Brinkrolf and Tobias Funke discovered that Requests incorrectly
leaked Proxy-Authorization headers. A remote attacker could possibly use
this issue to obtain sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2023-32681
Available in VMware Tanzu Network
Release Date: June 09, 2023
BOSH Agent Version: 2.268.141
Title: USN-6146-1: Netatalk vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6146-1
Priorities: medium,high
Description:
It was discovered that Netatalk did not properly validate the length of
user-supplied data in the DSI structures. A remote attacker could possibly
use this issue to execute arbitrary code with the privileges of the user
invoking the programs. This issue only affected Ubuntu 20.04 LTS and Ubuntu
22.04 LTS. (CVE-2021-31439)
It was discovered that Netatalk did not properly validate the length of
user-supplied data in the ad_addcomment function. A remote attacker could
possibly use this issue to execute arbitrary code with root privileges.
This issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
(CVE-2022-0194)
It was discovered that Netatalk did not properly handle errors when parsing
AppleDouble entries. A remote attacker could possibly use this issue to
execute arbitrary code with root privileges. This issue only affected
Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and
Ubuntu 22.04 LTS. (CVE-2022-23121)
It was discovered that Netatalk did not properly validate the length of
user-supplied data in the setfilparams function. A remote attacker could
possibly use this issue to execute arbitrary code with root privileges.
This issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
(CVE-2022-23122)
It was discovered that Netatalk did not properly validate the length of
user-supplied data in the getdirparams function. A remote attacker could
possibly use this issue to execute arbitrary code with root privileges.
This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04
LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-23123)
It was discovered that Netatalk did not properly validate the length of
user-supplied data in the get_finderinfo function. A remote attacker could
possibly use this issue to execute arbitrary code with root privileges.
This issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
(CVE-2022-23124)
It was discovered that Netatalk did not properly validate the length of
user-supplied data in the copyapplfile function. A remote attacker could
possibly use this issue to execute arbitrary code with root privileges.
This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04
LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-23125)
It was discovered that Netatalk did not properly validate the length of
user-supplied data in the dsi_writeinit function. A remote attacker could
possibly use this issue to execute arbitrary code with root privileges.
This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu
22.10. (CVE-2022-43634)
It was discovered that Netatalk did not properly manage memory under
certain circumstances. If a user were tricked into opening a specially
crafted .appl file, a remote attacker could possibly use this issue to
execute arbitrary code. (CVE-2022-45188)
CVEs:
- https://ubuntu.com/security/CVE-2021-31439
- https://ubuntu.com/security/CVE-2022-0194
- https://ubuntu.com/security/CVE-2022-23121
- https://ubuntu.com/security/CVE-2022-23122
- https://ubuntu.com/security/CVE-2022-23123
- https://ubuntu.com/security/CVE-2022-23124
- https://ubuntu.com/security/CVE-2022-23125
- https://ubuntu.com/security/CVE-2022-43634
- https://ubuntu.com/security/CVE-2022-45188
- https://ubuntu.com/security/CVE-2022-23123
- https://ubuntu.com/security/CVE-2022-43634
- https://ubuntu.com/security/CVE-2022-23122
- https://ubuntu.com/security/CVE-2021-31439
- https://ubuntu.com/security/CVE-2022-23121
- https://ubuntu.com/security/CVE-2022-23124
- https://ubuntu.com/security/CVE-2022-23125
- https://ubuntu.com/security/CVE-2022-0194
- https://ubuntu.com/security/CVE-2022-45188
Title: USN-6145-1: Sysstat vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6145-1
Priorities: medium
Description:
It was discovered that Sysstat incorrectly handled certain arithmetic
multiplications. An attacker could use this issue to cause Sysstat to
crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue was only fixed for Ubuntu 16.04 LTS. (CVE-2022-39377)
It was discovered that Sysstat incorrectly handled certain arithmetic
multiplications in 64-bit systems, as a result of an incomplete fix for
CVE-2022-39377. An attacker could use this issue to cause Sysstat to
crash, resulting in a denial of service, or possibly execute arbitrary
code. (CVE-2023-33204)
CVEs:
- https://ubuntu.com/security/CVE-2022-39377
- https://ubuntu.com/security/CVE-2022-39377
- https://ubuntu.com/security/CVE-2023-33204
- https://ubuntu.com/security/CVE-2023-33204
- https://ubuntu.com/security/CVE-2022-39377
Title: USN-6149-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6149-1
Priorities: high,medium
Description:
Patryk Sondej and Piotr Krysiuk discovered that a race condition existed in
the netfilter subsystem of the Linux kernel when processing batch requests,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-32233)
Gwangun Jung discovered that the Quick Fair Queueing scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-31436)
Reima Ishii discovered that the nested KVM implementation for Intel x86
processors in the Linux kernel did not properly validate control registers
in certain situations. An attacker in a guest VM could use this to cause a
denial of service (guest crash). (CVE-2023-30456)
It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux
kernel did not properly perform data buffer size validation in some
situations. A physically proximate attacker could use this to craft a
malicious USB device that when inserted, could cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-1380)
It was discovered that the Human Interface Device (HID) support driver in
the Linux kernel contained a type confusion vulnerability in some
situations. A local attacker could use this to cause a denial of service
(system crash). (CVE-2023-1073)
Wei Chen discovered that the DVB USB AZ6027 driver in the Linux kernel
contained a null pointer dereference when handling certain messages from
user space. A local attacker could use this to cause a denial of service
(system crash). (CVE-2023-28328)
CVEs:
- https://ubuntu.com/security/CVE-2023-32233
- https://ubuntu.com/security/CVE-2023-31436
- https://ubuntu.com/security/CVE-2023-30456
- https://ubuntu.com/security/CVE-2023-1380
- https://ubuntu.com/security/CVE-2023-1073
- https://ubuntu.com/security/CVE-2023-28328
- https://ubuntu.com/security/CVE-2023-32233
- https://ubuntu.com/security/CVE-2023-28328
- https://ubuntu.com/security/CVE-2023-1073
- https://ubuntu.com/security/CVE-2023-30456
- https://ubuntu.com/security/CVE-2023-1380
- https://ubuntu.com/security/CVE-2023-31436
Available in VMware Tanzu Network
Release Date: June 06, 2023
BOSH Agent Version: 2.268.141
Title: USN-6117-1: Apache Batik vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6117-1
Priorities: medium
Description:
It was discovered that Apache Batik incorrectly handled certain inputs. An
attacker could possibly use this to perform a cross site request forgery
attack. (CVE-2019-17566, CVE-2020-11987, CVE-2022-38398, CVE-2022-38648)
It was discovered that Apache Batik incorrectly handled Jar URLs in some
situations. A remote attacker could use this issue to access files on the
server. (CVE-2022-40146)
It was discovered that Apache Batik allowed running untrusted Java code from
an SVG. An attacker could use this issue to cause a denial of service,
or possibly execute arbitrary code. (CVE-2022-41704, CVE-2022-42890)
CVEs:
- https://ubuntu.com/security/CVE-2019-17566
- https://ubuntu.com/security/CVE-2020-11987
- https://ubuntu.com/security/CVE-2022-38398
- https://ubuntu.com/security/CVE-2022-38648
- https://ubuntu.com/security/CVE-2022-40146
- https://ubuntu.com/security/CVE-2022-41704
- https://ubuntu.com/security/CVE-2022-42890
- https://ubuntu.com/security/CVE-2022-40146
- https://ubuntu.com/security/CVE-2020-11987
- https://ubuntu.com/security/CVE-2022-41704
- https://ubuntu.com/security/CVE-2022-38648
- https://ubuntu.com/security/CVE-2022-38398
- https://ubuntu.com/security/CVE-2019-17566
- https://ubuntu.com/security/CVE-2022-42890
Title: USN-6099-1: ncurses vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6099-1
Priorities: negligible,medium
Description:
It was discovered that ncurses was incorrectly performing bounds
checks when processing invalid hashcodes. An attacker could possibly
use this issue to cause a denial of service or to expose sensitive
information. This issue only affected Ubuntu 18.04 LTS.
(CVE-2019-17594)
It was discovered that ncurses was incorrectly handling
end-of-string characters when processing terminfo and termcap files.
An attacker could possibly use this issue to cause a denial of
service or to expose sensitive information. This issue only affected
Ubuntu 18.04 LTS. (CVE-2019-17595)
It was discovered that ncurses was incorrectly handling
end-of-string characters when converting between termcap and
terminfo formats. An attacker could possibly use this issue to cause
a denial of service or execute arbitrary code. This issue only
affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2021-39537)
It was discovered that ncurses was incorrectly performing bounds
checks when dealing with corrupt terminfo data while reading a
terminfo file. An attacker could possibly use this issue to cause a
denial of service or to expose sensitive information. This issue only
affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
(CVE-2022-29458)
It was discovered that ncurses was parsing environment variables when
running with setuid applications and not properly handling the
processing of malformed data when doing so. A local attacker could
possibly use this issue to cause a denial of service (application
crash) or execute arbitrary code. (CVE-2023-29491)
CVEs:
- https://ubuntu.com/security/CVE-2019-17594
- https://ubuntu.com/security/CVE-2019-17595
- https://ubuntu.com/security/CVE-2021-39537
- https://ubuntu.com/security/CVE-2022-29458
- https://ubuntu.com/security/CVE-2023-29491
- https://ubuntu.com/security/CVE-2021-39537
- https://ubuntu.com/security/CVE-2023-29491
- https://ubuntu.com/security/CVE-2022-29458
- https://ubuntu.com/security/CVE-2019-17594
- https://ubuntu.com/security/CVE-2019-17595
Title: USN-6098-1: Jhead vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6098-1
Priorities: medium,low
Description:
It was discovered that Jhead did not properly handle certain crafted images
while processing the JFIF markers. An attacker could cause Jhead to crash. This
issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, and Ubuntu 18.04 LTS.
(CVE-2019-19035)
It was discovered that Jhead did not properly handle certain crafted images
while processing longitude tags. An attacker could cause Jhead to crash. This
issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2019-1010301)
It was discovered that Jhead did not properly handle certain crafted images
while processing IPTC data. An attacker could cause Jhead to crash. This
issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2019-1010302)
Binbin Li discovered that Jhead did not properly handle certain crafted images
while processing the DQT data. An attacker could cause Jhead to crash.
(CVE-2020-6624)
Binbin Li discovered that Jhead did not properly handle certain crafted images
while processing longitude data. An attacker could cause Jhead to crash.
(CVE-2020-6625)
Feng Zhao Yang discovered that Jhead did not properly handle certain crafted
images while reading JPEG sections. An attacker could cause Jhead to crash.
(CVE-2020-26208)
It was discovered that Jhead did not properly handle certain crafted images
while processing Canon images. An attacker could cause Jhead to crash.
(CVE-2021-28276)
It was discovered that Jhead did not properly handle certain crafted images
when removing a certain type of sections. An attacker could cause Jhead to
crash. (CVE-2021-28278)
CVEs:
- https://ubuntu.com/security/CVE-2019-19035
- https://ubuntu.com/security/CVE-2019-1010301
- https://ubuntu.com/security/CVE-2019-1010302
- https://ubuntu.com/security/CVE-2020-6624
- https://ubuntu.com/security/CVE-2020-6625
- https://ubuntu.com/security/CVE-2020-26208
- https://ubuntu.com/security/CVE-2021-28276
- https://ubuntu.com/security/CVE-2021-28278
- https://ubuntu.com/security/CVE-2019-1010302
- https://ubuntu.com/security/CVE-2021-28278
- https://ubuntu.com/security/CVE-2019-1010301
- https://ubuntu.com/security/CVE-2020-6624
- https://ubuntu.com/security/CVE-2020-26208
- https://ubuntu.com/security/CVE-2019-19035
- https://ubuntu.com/security/CVE-2020-6625
- https://ubuntu.com/security/CVE-2021-28276
Title: USN-6088-2: runC vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6088-2
Priorities: medium,low
Description:
USN-6088-1 fixed vulnerabilities in runC. This update provides
the corresponding updates for Ubuntu 16.04 LTS.
It was discovered that runC incorrectly performed access control when
mounting /proc to non-directories. An attacker could possibly use
this issue to escalate privileges.
(CVE-2019-19921)
Felix Wilhelm discovered that runC incorrecly handled netlink
messages. An attacker could possibly use
this issue to escalate privileges. (CVE-2021-43784)
Andrew G. Morgan discovered that runC incorrectly set
inherited process capabilities inside the container.
An attacker could possibly use this issue to
escalate privileges. (CVE-2022-29162)
Original advisory details:
It was discovered that runC incorrectly made /sys/fs/cgroup
writable when in rootless mode. An attacker could possibly
use this issue to escalate privileges. (CVE-2023-25809)
It was discovered that runC incorrectly performed access control when
mounting /proc to non-directories. An attacker could possibly use
this issue to escalate privileges. (CVE-2023-27561)
It was discovered that runC incorrectly handled /proc and
/sys mounts inside a container. An attacker could possibly
use this issue to bypass AppArmor, and potentially SELinux.
(CVE-2023-28642)
CVEs:
- https://ubuntu.com/security/CVE-2019-19921
- https://ubuntu.com/security/CVE-2021-43784
- https://ubuntu.com/security/CVE-2022-29162
- https://ubuntu.com/security/CVE-2023-25809
- https://ubuntu.com/security/CVE-2023-27561
- https://ubuntu.com/security/CVE-2023-28642
- https://ubuntu.com/security/CVE-2022-29162
- https://ubuntu.com/security/CVE-2023-25809
- https://ubuntu.com/security/CVE-2023-28642
- https://ubuntu.com/security/CVE-2021-43784
- https://ubuntu.com/security/CVE-2023-27561
- https://ubuntu.com/security/CVE-2019-19921
Title: USN-6142-1: nghttp2 vulnerability
URL: https://ubuntu.com/security/notices/USN-6142-1
Priorities: medium
Description:
Gal Goldshtein discovered that nghttp2 incorrectly handled certain inputs. If
a user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to cause a
denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2020-11080
Title: USN-5725-2: Go vulnerability
URL: https://ubuntu.com/security/notices/USN-5725-2
Priorities: low
Description:
USN-5725-1 fixed a vulnerability in Go. This update provides
the corresponding update for Ubuntu 16.04 LTS.
Original advisory details:
Diederik Loerakker, Jonny Rhea, Raúl Kripalani, and Preston
Van Loon discovered that Go incorrectly handled certain inputs.
An attacker could possibly use this issue to cause Go applications
to hang or crash, resulting in a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2020-16845
Title: USN-6108-1: Jhead vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6108-1
Priorities: medium
Description:
It was discovered that Jhead did not properly handle certain crafted images
while rotating them. An attacker could possibly use this issue to crash Jhead,
resulting in a denial of service. (CVE-2021-34055)
Kyle Brown discovered that Jhead did not properly handle certain crafted
images while regenerating the Exif thumbnail. An attacker could possibly use
this issue to execute arbitrary commands. (CVE-2022-41751)
CVEs:
- https://ubuntu.com/security/CVE-2021-34055
- https://ubuntu.com/security/CVE-2022-41751
- https://ubuntu.com/security/CVE-2022-41751
- https://ubuntu.com/security/CVE-2021-34055
Title: USN-6110-1: Jhead vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6110-1
Priorities: medium
Description:
It was discovered that Jhead did not properly handle certain crafted Canon
images when processing them. An attacker could possibly use this issue to
crash Jhead, resulting in a denial of service. (CVE-2021-3496)
It was discovered that Jhead did not properly handle certain crafted images
when printing Canon-specific information. An attacker could possibly use this
issue to crash Jhead, resulting in a denial of service. (CVE-2021-28275)
It was discovered that Jhead did not properly handle certain crafted images
when removing unknown sections. An attacker could possibly use this issue to
crash Jhead, resulting in a denial of service. (CVE-2021-28275)
Kyle Brown discovered that Jhead did not properly handle certain crafted
images when editing their comments. An attacker could possibly use this to
crash Jhead, resulting in a denial of service. (LP: #2020068)
CVEs:
- https://ubuntu.com/security/CVE-2021-3496
- https://ubuntu.com/security/CVE-2021-28275
- https://ubuntu.com/security/CVE-2021-28275
- https://ubuntu.com/security/CVE-2021-28277
- https://ubuntu.com/security/CVE-2021-28275
- https://ubuntu.com/security/CVE-2021-3496
Title: USN-6097-1: Linux PTP vulnerability
URL: https://ubuntu.com/security/notices/USN-6097-1
Priorities: medium
Description:
It was discovered that Linux PTP did not properly perform a length check
when forwarding a PTP message between ports. A remote attacker could
possibly use this issue to access sensitive information, execute
arbitrary code, or cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2021-3570
Title: USN-6125-1: snapd vulnerability
URL: https://ubuntu.com/security/notices/USN-6125-1
Priorities: medium
Description:
It was discovered that the snap sandbox did not restrict the use of the
ioctl system call with a TIOCLINUX request. This could be exploited by a
malicious snap to inject commands into the controlling terminal which would
then be executed outside of the snap sandbox once the snap had exited. This
could allow an attacker to execute arbitrary commands outside of the
confined snap sandbox. Note: graphical terminal emulators like xterm,
gnome-terminal and others are not affected - this can only be exploited
when snaps are run on a virtual console.
CVEs:
- https://ubuntu.com/security/CVE-2023-1523
Title: USN-6101-1: GNU binutils vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6101-1
Priorities: medium,low
Description:
It was discovered that GNU binutils incorrectly handled certain DWARF
files. An attacker could possibly use this issue to cause a crash or
execute arbitrary code. This issue only affected Ubuntu 22.10.
(CVE-2023-1579)
It was discovered that GNU binutils did not properly verify the version
definitions in zer0-lengthverdef table. An attacker could possibly use this
issue to cause a crash or execute arbitrary code. This issue only affected
Ubuntu 22.04 LTS, Ubuntu 22.10 and Ubuntu 23.04. (CVE-2023-1972)
It was discovered that GNU binutils did not properly validate the size of
length parameter in vms-alpha. An attacker could possibly use this issue to
cause a crash or access sensitive information. This issue only affected
Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu 22.10.
(CVE-2023-25584)
It was discovered that GNU binutils did not properly initialized the
file_table field of struct module and the_bfd field of asymbol. An attacker
could possibly use this issue to cause a crash. This issue only affected
Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and
Ubuntu 22.04 LTS. (CVE-2023-25585, CVE-2023-25588)
CVEs:
- https://ubuntu.com/security/CVE-2023-1579
- https://ubuntu.com/security/CVE-2023-1972
- https://ubuntu.com/security/CVE-2023-25584
- https://ubuntu.com/security/CVE-2023-25585
- https://ubuntu.com/security/CVE-2023-25588
- https://ubuntu.com/security/CVE-2023-1972
- https://ubuntu.com/security/CVE-2023-25588
- https://ubuntu.com/security/CVE-2023-25585
- https://ubuntu.com/security/CVE-2023-25584
- https://ubuntu.com/security/CVE-2023-1579
Title: USN-6100-1: HTML::StripScripts vulnerability
URL: https://ubuntu.com/security/notices/USN-6100-1
Priorities: medium
Description:
It was discovered that HTML::StripScripts does not properly parse HTML
content with certain style attributes. A remote attacker could use this issue
to cause a regular expression denial of service (ReDoS).
CVEs:
- https://ubuntu.com/security/CVE-2023-24038
Title: USN-6139-1: Python vulnerability
URL: https://ubuntu.com/security/notices/USN-6139-1
Priorities: medium
Description:
Yebo Cao discovered that Python incorrectly handled certain URLs.
An attacker could use this issue to bypass blockinglisting methods.
This issue was first addressed in USN-5960-1, but was incomplete.
Here we address an additional fix to that issue. (CVE-2023-24329)
CVEs:
- https://ubuntu.com/security/CVE-2023-24329
- https://ubuntu.com/security/CVE-2023-24329
Title: USN-6005-2: Sudo vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6005-2
Priorities: medium
Description:
USN-6005-1 fixed vulnerabilities in Sudo. This update
provides the corresponding updates for Ubuntu 16.04 LTS.
Original advisory details:
Matthieu Barjole and Victor Cutillas discovered that Sudo incorrectly
escaped control characters in log messages and sudoreplay output. An
attacker could possibly use these issues to inject terminal control
characters that alter output when being viewed.
CVEs:
- https://ubuntu.com/security/CVE-2023-28486
- https://ubuntu.com/security/CVE-2023-28487
Title: USN-6054-2: Django vulnerability
URL: https://ubuntu.com/security/notices/USN-6054-2
Priorities: low
Description:
USN-6054-1 fixed a vulnerability in Django. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.
Original advisory details:
Moataz Al-Sharida and nawaik discovered that Django incorrectly handled
uploading multiple files using one form field. A remote attacker could
possibly use this issue to bypass certain validations.
CVEs:
- https://ubuntu.com/security/CVE-2023-31047
Title: USN-6112-1: Perl vulnerability
URL: https://ubuntu.com/security/notices/USN-6112-1
Priorities: medium
Description:
It was discovered that Perl was not properly verifying TLS certificates
when using CPAN together with HTTP::Tiny to download modules over HTTPS.
If a remote attacker were able to intercept communications, this flaw
could potentially be used to install altered modules.
CVEs:
- https://ubuntu.com/security/CVE-2023-31484
Title: USN-6130-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6130-1
Priorities: high
Description:
Patryk Sondej and Piotr Krysiuk discovered that a race condition existed in
the netfilter subsystem of the Linux kernel when processing batch requests,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-32233)
Gwangun Jung discovered that the Quick Fair Queueing scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-31436)
Reima Ishii discovered that the nested KVM implementation for Intel x86
processors in the Linux kernel did not properly validate control registers
in certain situations. An attacker in a guest VM could use this to cause a
denial of service (guest crash). (CVE-2023-30456)
It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux
kernel did not properly perform data buffer size validation in some
situations. A physically proximate attacker could use this to craft a
malicious USB device that when inserted, could cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-1380)
CVEs:
- https://ubuntu.com/security/CVE-2023-32233
- https://ubuntu.com/security/CVE-2023-31436
- https://ubuntu.com/security/CVE-2023-30456
- https://ubuntu.com/security/CVE-2023-1380
- https://ubuntu.com/security/CVE-2023-30456
- https://ubuntu.com/security/CVE-2023-1380
- https://ubuntu.com/security/CVE-2023-32233
- https://ubuntu.com/security/CVE-2023-31436
Title: USN-6128-2: CUPS vulnerability
URL: https://ubuntu.com/security/notices/USN-6128-2
Priorities: medium
Description:
USN-6128-1 fixed a vulnerability in CUPS. This update provides
the corresponding update for Ubuntu 16.04 ESM.
Original advisory details:
It was discovered that CUPS incorrectly handled logging. A remote attacker
could use this issue to cause CUPS to crash, resulting in a denial of
service, or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2023-32324
Available in VMware Tanzu Network
Release Date: May 22, 2023
BOSH Agent Version: 2.268.139
Title: USN-6065-1: css-what vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6065-1
Priorities: medium
Description:
It was discovered that css-what incorrectly handled certain inputs. If a user
or an automated system were tricked into opening a specially crafted input
file, a remote attacker could possibly use this issue to cause a denial of
service. (CVE-2021-33587, CVE-2022-21222)
CVEs:
- https://ubuntu.com/security/CVE-2021-33587
- https://ubuntu.com/security/CVE-2022-21222
- https://ubuntu.com/security/CVE-2022-21222
- https://ubuntu.com/security/CVE-2021-33587
Title: USN-6082-1: EventSource vulnerability
URL: https://ubuntu.com/security/notices/USN-6082-1
Priorities: medium
Description:
It was discovered that EventSource incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to obtain
sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2022-1650
Title: USN-6081-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6081-1
Priorities: medium,low,negligible
Description:
Jordy Zomer and Alexandra Sandulescu discovered that the Linux kernel did
not properly implement speculative execution barriers in usercopy functions
in certain situations. A local attacker could use this to expose sensitive
information (kernel memory). (CVE-2023-0459)
Xingyuan Mo discovered that the x86 KVM implementation in the Linux kernel
did not properly initialize some data structures. A local attacker could
use this to expose sensitive information (kernel memory). (CVE-2023-1513)
It was discovered that a use-after-free vulnerability existed in the iSCSI
TCP implementation in the Linux kernel. A local attacker could possibly use
this to cause a denial of service (system crash). (CVE-2023-2162)
It was discovered that the NET/ROM protocol implementation in the Linux
kernel contained a race condition in some situations, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2023-32269)
Duoming Zhou discovered that a race condition existed in the infrared
receiver/transceiver driver in the Linux kernel, leading to a use-after-
free vulnerability. A privileged attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2023-1118)
CVEs:
- https://ubuntu.com/security/CVE-2023-0459
- https://ubuntu.com/security/CVE-2023-1513
- https://ubuntu.com/security/CVE-2023-2162
- https://ubuntu.com/security/CVE-2023-32269
- https://ubuntu.com/security/CVE-2023-1118
- https://ubuntu.com/security/CVE-2023-1513
- https://ubuntu.com/security/CVE-2023-1118
- https://ubuntu.com/security/CVE-2023-32269
- https://ubuntu.com/security/CVE-2023-0459
- https://ubuntu.com/security/CVE-2023-2162
Title: USN-6084-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6084-1
Priorities: medium,low,negligible
Description:
Jordy Zomer and Alexandra Sandulescu discovered that the Linux kernel did
not properly implement speculative execution barriers in usercopy functions
in certain situations. A local attacker could use this to expose sensitive
information (kernel memory). (CVE-2023-0459)
Xingyuan Mo discovered that the x86 KVM implementation in the Linux kernel
did not properly initialize some data structures. A local attacker could
use this to expose sensitive information (kernel memory). (CVE-2023-1513)
It was discovered that a use-after-free vulnerability existed in the iSCSI
TCP implementation in the Linux kernel. A local attacker could possibly use
this to cause a denial of service (system crash). (CVE-2023-2162)
It was discovered that the NET/ROM protocol implementation in the Linux
kernel contained a race condition in some situations, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2023-32269)
Duoming Zhou discovered that a race condition existed in the infrared
receiver/transceiver driver in the Linux kernel, leading to a use-after-
free vulnerability. A privileged attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2023-1118)
CVEs:
- https://ubuntu.com/security/CVE-2023-0459
- https://ubuntu.com/security/CVE-2023-1513
- https://ubuntu.com/security/CVE-2023-2162
- https://ubuntu.com/security/CVE-2023-32269
- https://ubuntu.com/security/CVE-2023-1118
- https://ubuntu.com/security/CVE-2023-1513
- https://ubuntu.com/security/CVE-2023-1118
- https://ubuntu.com/security/CVE-2023-32269
- https://ubuntu.com/security/CVE-2023-0459
- https://ubuntu.com/security/CVE-2023-2162
Title: USN-6092-1: Linux kernel (Azure) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6092-1
Priorities: medium,low,negligible
Description:
Jordy Zomer and Alexandra Sandulescu discovered that the Linux kernel did
not properly implement speculative execution barriers in usercopy functions
in certain situations. A local attacker could use this to expose sensitive
information (kernel memory). (CVE-2023-0459)
Xingyuan Mo discovered that the x86 KVM implementation in the Linux kernel
did not properly initialize some data structures. A local attacker could
use this to expose sensitive information (kernel memory). (CVE-2023-1513)
It was discovered that a use-after-free vulnerability existed in the iSCSI
TCP implementation in the Linux kernel. A local attacker could possibly use
this to cause a denial of service (system crash). (CVE-2023-2162)
It was discovered that the NET/ROM protocol implementation in the Linux
kernel contained a race condition in some situations, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2023-32269)
Duoming Zhou discovered that a race condition existed in the infrared
receiver/transceiver driver in the Linux kernel, leading to a use-after-
free vulnerability. A privileged attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2023-1118)
CVEs:
- https://ubuntu.com/security/CVE-2023-0459
- https://ubuntu.com/security/CVE-2023-1513
- https://ubuntu.com/security/CVE-2023-2162
- https://ubuntu.com/security/CVE-2023-32269
- https://ubuntu.com/security/CVE-2023-1118
- https://ubuntu.com/security/CVE-2023-32269
- https://ubuntu.com/security/CVE-2023-2162
- https://ubuntu.com/security/CVE-2023-1118
- https://ubuntu.com/security/CVE-2023-1513
- https://ubuntu.com/security/CVE-2023-0459
Title: USN-6053-1: PHP vulnerability
URL: https://ubuntu.com/security/notices/USN-6053-1
Priorities: medium
Description:
It was discovered that PHP incorrectly handled certain invalid Blowfish
password hashes. An invalid password hash could possibly allow applications to
accept any password as valid, contrary to expectations.
CVEs:
- https://ubuntu.com/security/CVE-2023-0567
Title: USN-6058-1: Linux kernel vulnerability
URL: https://ubuntu.com/security/notices/USN-6058-1
Priorities: high
Description:
It was discovered that the Traffic-Control Index (TCINDEX) implementation
in the Linux kernel did not properly perform filter deactivation in some
situations. A local attacker could possibly use this to gain elevated
privileges. Please note that with the fix for this CVE, kernel support for
the TCINDEX classifier has been removed.
CVEs:
- https://ubuntu.com/security/CVE-2023-1829
Title: USN-6060-2: MySQL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6060-2
Priorities: medium
Description:
USN-6060-1 fixed several vulnerabilities in MySQL. This update provides
the corresponding update for Ubuntu 16.04 ESM.
Original advisory details:
Multiple security issues were discovered in MySQL and this update includes
new upstream MySQL versions to fix these issues.
MySQL has been updated to 5.7.42 in Ubuntu 16.04 ESM.
In addition to security fixes, the updated packages contain bug fixes, new
features, and possibly incompatible changes.
Please see the following for more information:
https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-42.html
https://www.oracle.com/security-alerts/cpuapr2023.html
CVEs:
- https://ubuntu.com/security/CVE-2023-21912
- https://ubuntu.com/security/CVE-2023-21980
Title: USN-6050-2: Git vulnerability
URL: https://ubuntu.com/security/notices/USN-6050-2
Priorities: medium
Description:
USN-6050-1 fixed several vulnerabilities in Git. This update provides
the corresponding updates for CVE-2023-25652 and CVE-2023-29007 on
Ubuntu 16.04 LTS.
Original advisory details:
It was discovered that Git incorrectly handled certain commands.
An attacker could possibly use this issue to overwrite paths.
(CVE-2023-25652)
André Baptista and Vítor Pinho discovered that Git incorrectly handled
certain configurations. An attacker could possibly use this issue
to achieve arbitrary configuration injection. (CVE-2023-29007)
CVEs:
- https://ubuntu.com/security/CVE-2023-25652
- https://ubuntu.com/security/CVE-2023-29007
- https://ubuntu.com/security/CVE-2023-25652
- https://ubuntu.com/security/CVE-2023-29007
- https://ubuntu.com/security/CVE-2023-25652
- https://ubuntu.com/security/CVE-2023-29007
Title: USN-6055-2: Ruby regression
URL: https://ubuntu.com/security/notices/USN-6055-2
Priorities: medium
Description:
USN-6055-1 fixed a vulnerability in Ruby. Unfortunately it introduced a regression.
This update reverts the patches applied to CVE-2023-28755 in order to fix the regression
pending further investigation.
We apologize for the inconvenience.
Original advisory details:
It was discovered that Ruby incorrectly handled certain regular expressions.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2023-28755)
CVEs:
- https://ubuntu.com/security/CVE-2023-28755
- https://ubuntu.com/security/CVE-2023-28755
- https://ubuntu.com/security/CVE-2023-28755
Title: USN-6055-1: Ruby vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6055-1
Priorities: medium
Description:
It was discovered that Ruby incorrectly handled certain regular expressions.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2023-28755)
It was discovered that Ruby incorrectly handled certain regular expressions.
An attacker could possibly use this issue to cause a denial of service.
This issue is being addressed only for Ubuntu 18.04 LTS and Ubuntu 20.04 LTS.
(CVE-2023-28756)
CVEs:
- https://ubuntu.com/security/CVE-2023-28755
- https://ubuntu.com/security/CVE-2023-28756
- https://ubuntu.com/security/CVE-2023-28755
- https://ubuntu.com/security/CVE-2023-28756
Title: USN-6087-1: Ruby vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6087-1
Priorities: medium
Description:
It was discovered that Ruby incorrectly handled certain regular expressions.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2023-28755)
It was discovered that Ruby incorrectly handled certain regular expressions.
An attacker could possily use this issue to cause a denial of service.
This issue only affected Ubuntu 16.04 ESM. (CVE-2023-28756)
CVEs:
- https://ubuntu.com/security/CVE-2023-28755
- https://ubuntu.com/security/CVE-2023-28756
- https://ubuntu.com/security/CVE-2023-28756
- https://ubuntu.com/security/CVE-2023-28755
Available in VMware Tanzu Network
Release Date: April 28, 2023
BOSH Agent Version: 2.268.135
Title: USN-6035-1: KAuth vulnerability
URL: https://ubuntu.com/security/notices/USN-6035-1
Priorities: medium
Description:
It was discovered that KAuth incorrectly handled some configuration parameters
with specially crafted arbitrary types. An attacker could possibly use this
issue to cause a denial of service, or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2019-7443
Title: USN-6039-1: OpenSSL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6039-1
Priorities: low,negligible
Description:
It was discovered that OpenSSL was not properly managing file locks when
processing policy constraints. If a user or automated system were tricked
into processing a certificate chain with specially crafted policy
constraints, a remote attacker could possibly use this issue to cause a
denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu
22.10. (CVE-2022-3996)
David Benjamin discovered that OpenSSL was not properly performing the
verification of X.509 certificate chains that include policy constraints,
which could lead to excessive resource consumption. If a user or automated
system were tricked into processing a specially crafted X.509 certificate
chain that includes policy constraints, a remote attacker could possibly
use this issue to cause a denial of service. (CVE-2023-0464)
David Benjamin discovered that OpenSSL was not properly handling invalid
certificate policies in leaf certificates, which would result in certain
policy checks being skipped for the certificate. If a user or automated
system were tricked into processing a specially crafted certificate, a
remote attacker could possibly use this issue to assert invalid
certificate policies and circumvent policy checking. (CVE-2023-0465)
David Benjamin discovered that OpenSSL incorrectly documented the
functionalities of function X509_VERIFY_PARAM_add0_policy, stating that
it would implicitly enable certificate policy checks when doing
certificate verifications, contrary to its implementation. This could
cause users and applications to not perform certificate policy checks
even when expected to do so. (CVE-2023-0466)
CVEs:
- https://ubuntu.com/security/CVE-2022-3996
- https://ubuntu.com/security/CVE-2023-0464
- https://ubuntu.com/security/CVE-2023-0465
- https://ubuntu.com/security/CVE-2023-0466
- https://ubuntu.com/security/CVE-2022-3996
- https://ubuntu.com/security/CVE-2023-0464
- https://ubuntu.com/security/CVE-2023-0466
Title: USN-6042-1: Cloud-init vulnerability
URL: https://ubuntu.com/security/notices/USN-6042-1
Priorities: medium
Description:
James Glovich discovered that sensitive data could be exposed in logs. An
attacker could use this information to find hashed passwords and possibly
escalate their privilege.
CVEs:
- https://ubuntu.com/security/CVE-2023-1786
Title: USN-6047-1: Linux kernel vulnerability
URL: https://ubuntu.com/security/notices/USN-6047-1
Priorities: high
Description:
It was discovered that the Traffic-Control Index (TCINDEX) implementation
in the Linux kernel did not properly perform filter deactivation in some
situations. A local attacker could possibly use this to gain elevated
privileges. Please note that with the fix for this CVE, kernel support for
the TCINDEX classifier has been removed.
CVEs:
- https://ubuntu.com/security/CVE-2023-1829
Title: USN-6045-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6045-1
Priorities: high,medium,low
Description:
It was discovered that the Traffic-Control Index (TCINDEX) implementation
in the Linux kernel did not properly perform filter deactivation in some
situations. A local attacker could possibly use this to gain elevated
privileges. Please note that with the fix for this CVE, kernel support for
the TCINDEX classifier has been removed. (CVE-2023-1829)
Gwnaun Jung discovered that the SFB packet scheduling implementation in the
Linux kernel contained a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2022-3586)
Zheng Wang and Zhuorao Yang discovered that the RealTek RTL8712U wireless
driver in the Linux kernel contained a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2022-4095)
It was discovered that the TIPC protocol implementation in the Linux kernel
did not properly validate the queue of socket buffers (skb) when handling
certain UDP packets. A remote attacker could use this to cause a denial of
service. (CVE-2023-1390)
It was discovered that the Xircom PCMCIA network device driver in the Linux
kernel did not properly handle device removal events. A physically
proximate attacker could use this to cause a denial of service (system
crash). (CVE-2023-1670)
CVEs:
- https://ubuntu.com/security/CVE-2023-1829
- https://ubuntu.com/security/CVE-2022-3586
- https://ubuntu.com/security/CVE-2022-4095
- https://ubuntu.com/security/CVE-2023-1390
- https://ubuntu.com/security/CVE-2023-1670
- https://ubuntu.com/security/CVE-2022-3586
- https://ubuntu.com/security/CVE-2023-1829
- https://ubuntu.com/security/CVE-2023-1670
- https://ubuntu.com/security/CVE-2023-1390
- https://ubuntu.com/security/CVE-2022-4095
Title: USN-6034-1: Dnsmasq vulnerability
URL: https://ubuntu.com/security/notices/USN-6034-1
Priorities: low
Description:
It was discovered that Dnsmasq was sending large DNS messages
over UDP, possibly causing transmission failures due to IP
fragmentation. This update lowers the default maximum size of
DNS messages to improve transmission reliability over UDP.
CVEs:
- https://ubuntu.com/security/CVE-2023-28450
Available in VMware Tanzu Network
Release Date: April 19, 2023
BOSH Agent Version: 2.268.134
Title: USN-6022-1: Kamailio vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6022-1
Priorities: medium
Description:
It was discovered that Kamailio did not properly sanitize SIP messages under
certain circumstances. An attacker could use this vulnerability to cause a
denial of service or possibly execute arbitrary code. This issue only affected
Ubuntu 16.04 ESM and 18.04 ESM. (CVE-2018-16657)
It was discovered that Kamailio did not properly validate INVITE requests
under certain circumstances. An attacker could use this vulnerability to
cause a denial of service or possibly execute arbitrary code. (CVE-2020-27507)
CVEs:
- https://ubuntu.com/security/CVE-2018-16657
- https://ubuntu.com/security/CVE-2020-27507
- https://ubuntu.com/security/CVE-2020-27507
- https://ubuntu.com/security/CVE-2018-16657
Title: USN-6014-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6014-1
Priorities: medium,low,negligible
Description:
Xuewei Feng, Chuanpu Fu, Qi Li, Kun Sun, and Ke Xu discovered that the TCP
implementation in the Linux kernel did not properly handle IPID assignment.
A remote attacker could use this to cause a denial of service (connection
termination) or inject forged data. (CVE-2020-36516)
Ke Sun, Alyssa Milburn, Henrique Kawakami, Emma Benoit, Igor Chervatyuk,
Lisa Aichele, and Thais Moreira Hamasaki discovered that the Spectre
Variant 2 mitigations for AMD processors on Linux were insufficient in some
situations. A local attacker could possibly use this to expose sensitive
information. (CVE-2021-26401)
Jürgen Groß discovered that the Xen subsystem within the Linux kernel did
not adequately limit the number of events driver domains (unprivileged PV
backends) could send to other guest VMs. An attacker in a driver domain
could use this to cause a denial of service in other guest VMs.
(CVE-2021-28711, CVE-2021-28712, CVE-2021-28713)
Wolfgang Frisch discovered that the ext4 file system implementation in the
Linux kernel contained an integer overflow when handling metadata inode
extents. An attacker could use this to construct a malicious ext4 file
system image that, when mounted, could cause a denial of service (system
crash). (CVE-2021-3428)
It was discovered that the IEEE 802.15.4 wireless network subsystem in the
Linux kernel did not properly handle certain error conditions, leading to a
null pointer dereference vulnerability. A local attacker could possibly use
this to cause a denial of service (system crash). (CVE-2021-3659)
It was discovered that the System V IPC implementation in the Linux kernel
did not properly handle large shared memory counts. A local attacker could
use this to cause a denial of service (memory exhaustion). (CVE-2021-3669)
Alois Wohlschlager discovered that the overlay file system in the Linux
kernel did not restrict private clones in some situations. An attacker
could use this to expose sensitive information. (CVE-2021-3732)
It was discovered that the SCTP protocol implementation in the Linux kernel
did not properly verify VTAGs in some situations. A remote attacker could
possibly use this to cause a denial of service (connection disassociation).
(CVE-2021-3772)
It was discovered that the btrfs file system implementation in the Linux
kernel did not properly handle locking in certain error conditions. A local
attacker could use this to cause a denial of service (kernel deadlock).
(CVE-2021-4149)
Jann Horn discovered that the socket subsystem in the Linux kernel
contained a race condition when handling listen() and connect() operations,
leading to a read-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly expose sensitive
information. (CVE-2021-4203)
It was discovered that the file system quotas implementation in the Linux
kernel did not properly validate the quota block number. An attacker could
use this to construct a malicious file system image that, when mounted and
operated on, could cause a denial of service (system crash).
(CVE-2021-45868)
Zhihua Yao discovered that the MOXART SD/MMC driver in the Linux kernel did
not properly handle device removal, leading to a use-after-free
vulnerability. A physically proximate attacker could possibly use this to
cause a denial of service (system crash). (CVE-2022-0487)
It was discovered that the block layer subsystem in the Linux kernel did
not properly initialize memory in some situations. A privileged local
attacker could use this to expose sensitive information (kernel memory).
(CVE-2022-0494)
It was discovered that the UDF file system implementation in the Linux
kernel could attempt to dereference a null pointer in some situations. An
attacker could use this to construct a malicious UDF image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2022-0617)
David Bouman discovered that the netfilter subsystem in the Linux kernel
did not initialize memory in some situations. A local attacker could use
this to expose sensitive information (kernel memory). (CVE-2022-1016)
It was discovered that the implementation of the 6pack and mkiss protocols
in the Linux kernel did not handle detach events properly in some
situations, leading to a use-after-free vulnerability. A local attacker
could possibly use this to cause a denial of service (system crash).
(CVE-2022-1195)
Duoming Zhou discovered race conditions in the AX.25 amateur radio protocol
implementation in the Linux kernel, leading to use-after-free
vulnerabilities. A local attacker could possibly use this to cause a denial
of service (system crash). (CVE-2022-1205)
It was discovered that the tty subsystem in the Linux kernel contained a
race condition in certain situations, leading to an out-of-bounds read
vulnerability. A local attacker could possibly use this to cause a denial
of service (system crash) or expose sensitive information. (CVE-2022-1462)
It was discovered that the implementation of X.25 network protocols in the
Linux kernel did not terminate link layer sessions properly. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2022-1516)
Duoming Zhou discovered a race condition in the NFC subsystem in the Linux
kernel, leading to a use-after-free vulnerability. A privileged local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-1974)
Duoming Zhou discovered that the NFC subsystem in the Linux kernel did not
properly prevent context switches from occurring during certain atomic
context operations. A privileged local attacker could use this to cause a
denial of service (system crash). (CVE-2022-1975)
It was discovered that the HID subsystem in the Linux kernel did not
properly validate inputs in certain conditions. A local attacker with
physical access could plug in a specially crafted USB device to expose
sensitive information. (CVE-2022-20132)
It was discovered that the device-mapper verity (dm-verity) driver in the
Linux kernel did not properly verify targets being loaded into the device-
mapper table. A privileged attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2022-20572,
CVE-2022-2503)
Duoming Zhou discovered that race conditions existed in the timer handling
implementation of the Linux kernel’s Rose X.25 protocol layer, resulting in
use-after-free vulnerabilities. A local attacker could use this to cause a
denial of service (system crash). (CVE-2022-2318)
Zheyu Ma discovered that the Silicon Motion SM712 framebuffer driver in the
Linux kernel did not properly handle very small reads. A local attacker
could use this to cause a denial of service (system crash). (CVE-2022-2380)
David Leadbeater discovered that the netfilter IRC protocol tracking
implementation in the Linux Kernel incorrectly handled certain message
payloads in some situations. A remote attacker could possibly use this to
cause a denial of service or bypass firewall filtering. (CVE-2022-2663)
Lucas Leong discovered that the LightNVM subsystem in the Linux kernel did
not properly handle data lengths in certain situations. A privileged
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-2991)
It was discovered that the Intel 740 frame buffer driver in the Linux
kernel contained a divide by zero vulnerability. A local attacker could use
this to cause a denial of service (system crash). (CVE-2022-3061)
Jiasheng Jiang discovered that the wm8350 charger driver in the Linux
kernel did not properly deallocate memory, leading to a null pointer
dereference vulnerability. A local attacker could use this to cause a
denial of service (system crash). (CVE-2022-3111)
It was discovered that the sound subsystem in the Linux kernel contained a
race condition in some situations. A local attacker could use this to cause
a denial of service (system crash). (CVE-2022-3303)
It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux
kernel did not properly perform bounds checking in some situations. A
physically proximate attacker could use this to craft a malicious USB
device that when inserted, could cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2022-3628)
Ziming Zhang discovered that the VMware Virtual GPU DRM driver in the Linux
kernel contained an out-of-bounds write vulnerability. A local attacker
could use this to cause a denial of service (system crash).
(CVE-2022-36280)
It was discovered that the NILFS2 file system implementation in the Linux
kernel did not properly deallocate memory in certain error conditions. An
attacker could use this to cause a denial of service (memory exhaustion).
(CVE-2022-3646)
It was discovered that the Netlink Transformation (XFRM) subsystem in the
Linux kernel contained a reference counting error. A local attacker could
use this to cause a denial of service (system crash). (CVE-2022-36879)
It was discovered that the infrared transceiver USB driver did not properly
handle USB control messages. A local attacker with physical access could
plug in a specially crafted USB device to cause a denial of service (memory
exhaustion). (CVE-2022-3903)
Jann Horn discovered a race condition existed in the Linux kernel when
unmapping VMAs in certain situations, resulting in possible use-after-free
vulnerabilities. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2022-39188)
Hyunwoo Kim discovered that the DVB Core driver in the Linux kernel did not
properly perform reference counting in some situations, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2022-41218)
It was discovered that a race condition existed in the SMSC UFX USB driver
implementation in the Linux kernel, leading to a use-after-free
vulnerability. A physically proximate attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-41849)
It was discovered that a race condition existed in the Roccat HID driver in
the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-41850)
It was discovered that the USB core subsystem in the Linux kernel did not
properly handle nested reset events. A local attacker with physical access
could plug in a specially crafted USB device to cause a denial of service
(kernel deadlock). (CVE-2022-4662)
It was discovered that the network queuing discipline implementation in the
Linux kernel contained a null pointer dereference in some situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2022-47929)
Kyle Zeng discovered that the IPv6 implementation in the Linux kernel
contained a NULL pointer dereference vulnerability in certain situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2023-0394)
It was discovered that a memory leak existed in the SCTP protocol
implementation in the Linux kernel. A local attacker could use this to
cause a denial of service (memory exhaustion). (CVE-2023-1074)
Mingi Cho discovered that the netfilter subsystem in the Linux kernel did
not properly initialize a data structure, leading to a null pointer
dereference vulnerability. An attacker could use this to cause a denial of
service (system crash). (CVE-2023-1095)
Kyle Zeng discovered that the ATM VC queuing discipline implementation in
the Linux kernel contained a type confusion vulnerability in some
situations. An attacker could use this to cause a denial of service (system
crash). (CVE-2023-23455)
Lianhui Tang discovered that the MPLS implementation in the Linux kernel
did not properly handle certain sysctl allocation failure conditions,
leading to a double-free vulnerability. An attacker could use this to cause
a denial of service or possibly execute arbitrary code. (CVE-2023-26545)
It was discovered that the NTFS file system implementation in the Linux
kernel did not properly validate attributes in certain situations, leading
to an out-of-bounds read vulnerability. A local attacker could possibly use
this to expose sensitive information (kernel memory). (CVE-2023-26607)
Duoming Zhou discovered that a race condition existed in the infrared
receiver/transceiver driver in the Linux kernel, leading to a use-after-
free vulnerability. A privileged attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2023-1118)
CVEs:
- https://ubuntu.com/security/CVE-2020-36516
- https://ubuntu.com/security/CVE-2021-26401
- https://ubuntu.com/security/CVE-2021-28711
- https://ubuntu.com/security/CVE-2021-28712
- https://ubuntu.com/security/CVE-2021-28713
- https://ubuntu.com/security/CVE-2021-3428
- https://ubuntu.com/security/CVE-2021-3659
- https://ubuntu.com/security/CVE-2021-3669
- https://ubuntu.com/security/CVE-2021-3732
- https://ubuntu.com/security/CVE-2021-3772
- https://ubuntu.com/security/CVE-2021-4149
- https://ubuntu.com/security/CVE-2021-4203
- https://ubuntu.com/security/CVE-2021-45868
- https://ubuntu.com/security/CVE-2022-0487
- https://ubuntu.com/security/CVE-2022-0494
- https://ubuntu.com/security/CVE-2022-0617
- https://ubuntu.com/security/CVE-2022-1016
- https://ubuntu.com/security/CVE-2022-1195
- https://ubuntu.com/security/CVE-2022-1205
- https://ubuntu.com/security/CVE-2022-1462
- https://ubuntu.com/security/CVE-2022-1516
- https://ubuntu.com/security/CVE-2022-1974
- https://ubuntu.com/security/CVE-2022-1975
- https://ubuntu.com/security/CVE-2022-20132
- https://ubuntu.com/security/CVE-2022-20572
- https://ubuntu.com/security/CVE-2022-2503
- https://ubuntu.com/security/CVE-2022-2318
- https://ubuntu.com/security/CVE-2022-2380
- https://ubuntu.com/security/CVE-2022-2663
- https://ubuntu.com/security/CVE-2022-2991
- https://ubuntu.com/security/CVE-2022-3061
- https://ubuntu.com/security/CVE-2022-3111
- https://ubuntu.com/security/CVE-2022-3303
- https://ubuntu.com/security/CVE-2022-3628
- https://ubuntu.com/security/CVE-2022-36280
- https://ubuntu.com/security/CVE-2022-3646
- https://ubuntu.com/security/CVE-2022-36879
- https://ubuntu.com/security/CVE-2022-3903
- https://ubuntu.com/security/CVE-2022-39188
- https://ubuntu.com/security/CVE-2022-41218
- https://ubuntu.com/security/CVE-2022-41849
- https://ubuntu.com/security/CVE-2022-41850
- https://ubuntu.com/security/CVE-2022-4662
- https://ubuntu.com/security/CVE-2022-47929
- https://ubuntu.com/security/CVE-2023-0394
- https://ubuntu.com/security/CVE-2023-1074
- https://ubuntu.com/security/CVE-2023-1095
- https://ubuntu.com/security/CVE-2023-23455
- https://ubuntu.com/security/CVE-2023-26545
- https://ubuntu.com/security/CVE-2023-26607
- https://ubuntu.com/security/CVE-2023-1118
- https://ubuntu.com/security/CVE-2023-1095
- https://ubuntu.com/security/CVE-2021-3772
- https://ubuntu.com/security/CVE-2021-45868
- https://ubuntu.com/security/CVE-2022-36280
- https://ubuntu.com/security/CVE-2021-4149
- https://ubuntu.com/security/CVE-2022-1462
- https://ubuntu.com/security/CVE-2021-28711
- https://ubuntu.com/security/CVE-2022-4662
- https://ubuntu.com/security/CVE-2023-26545
- https://ubuntu.com/security/CVE-2022-3061
- https://ubuntu.com/security/CVE-2022-2663
- https://ubuntu.com/security/CVE-2022-3628
- https://ubuntu.com/security/CVE-2022-1516
- https://ubuntu.com/security/CVE-2022-36879
- https://ubuntu.com/security/CVE-2022-41218
- https://ubuntu.com/security/CVE-2022-47929
- https://ubuntu.com/security/CVE-2021-26401
- https://ubuntu.com/security/CVE-2022-39188
- https://ubuntu.com/security/CVE-2022-1974
- https://ubuntu.com/security/CVE-2022-3111
- https://ubuntu.com/security/CVE-2023-23455
- https://ubuntu.com/security/CVE-2022-0617
- https://ubuntu.com/security/CVE-2020-36516
- https://ubuntu.com/security/CVE-2023-1118
- https://ubuntu.com/security/CVE-2023-26607
- https://ubuntu.com/security/CVE-2022-3646
- https://ubuntu.com/security/CVE-2023-0394
- https://ubuntu.com/security/CVE-2021-4203
- https://ubuntu.com/security/CVE-2022-2380
- https://ubuntu.com/security/CVE-2022-0487
- https://ubuntu.com/security/CVE-2022-41849
- https://ubuntu.com/security/CVE-2023-1074
- https://ubuntu.com/security/CVE-2022-1195
- https://ubuntu.com/security/CVE-2022-20572
- https://ubuntu.com/security/CVE-2022-1205
- https://ubuntu.com/security/CVE-2021-3732
- https://ubuntu.com/security/CVE-2022-1975
- https://ubuntu.com/security/CVE-2022-0494
- https://ubuntu.com/security/CVE-2021-3428
- https://ubuntu.com/security/CVE-2021-28712
- https://ubuntu.com/security/CVE-2022-3303
- https://ubuntu.com/security/CVE-2021-28713
- https://ubuntu.com/security/CVE-2021-3669
- https://ubuntu.com/security/CVE-2022-2503
- https://ubuntu.com/security/CVE-2022-2991
- https://ubuntu.com/security/CVE-2022-3903
- https://ubuntu.com/security/CVE-2022-2318
- https://ubuntu.com/security/CVE-2022-41850
- https://ubuntu.com/security/CVE-2022-1016
- https://ubuntu.com/security/CVE-2021-3659
- https://ubuntu.com/security/CVE-2022-20132
Title: USN-6009-1: Linux kernel (GCP) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6009-1
Priorities: low,medium
Description:
It was discovered that the System V IPC implementation in the Linux kernel
did not properly handle large shared memory counts. A local attacker could
use this to cause a denial of service (memory exhaustion). (CVE-2021-3669)
It was discovered that a use-after-free vulnerability existed in the SGI
GRU driver in the Linux kernel. A local attacker could possibly use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3424)
Ziming Zhang discovered that the VMware Virtual GPU DRM driver in the Linux
kernel contained an out-of-bounds write vulnerability. A local attacker
could use this to cause a denial of service (system crash).
(CVE-2022-36280)
Hyunwoo Kim discovered that the DVB Core driver in the Linux kernel did not
properly perform reference counting in some situations, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2022-41218)
It was discovered that the network queuing discipline implementation in the
Linux kernel contained a null pointer dereference in some situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2022-47929)
José Oliveira and Rodrigo Branco discovered that the prctl syscall
implementation in the Linux kernel did not properly protect against
indirect branch prediction attacks in some situations. A local attacker
could possibly use this to expose sensitive information. (CVE-2023-0045)
It was discovered that a use-after-free vulnerability existed in the
Advanced Linux Sound Architecture (ALSA) subsystem. A local attacker could
use this to cause a denial of service (system crash). (CVE-2023-0266)
Kyle Zeng discovered that the IPv6 implementation in the Linux kernel
contained a NULL pointer dereference vulnerability in certain situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2023-0394)
Kyle Zeng discovered that the ATM VC queuing discipline implementation in
the Linux kernel contained a type confusion vulnerability in some
situations. An attacker could use this to cause a denial of service (system
crash). (CVE-2023-23455)
It was discovered that the RNDIS USB driver in the Linux kernel contained
an integer overflow vulnerability. A local attacker with physical access
could plug in a malicious USB device to cause a denial of service (system
crash) or possibly execute arbitrary code. (CVE-2023-23559)
Wei Chen discovered that the DVB USB AZ6027 driver in the Linux kernel
contained a null pointer dereference when handling certain messages from
user space. A local attacker could use this to cause a denial of service
(system crash). (CVE-2023-28328)
CVEs:
- https://ubuntu.com/security/CVE-2021-3669
- https://ubuntu.com/security/CVE-2022-3424
- https://ubuntu.com/security/CVE-2022-36280
- https://ubuntu.com/security/CVE-2022-41218
- https://ubuntu.com/security/CVE-2022-47929
- https://ubuntu.com/security/CVE-2023-0045
- https://ubuntu.com/security/CVE-2023-0266
- https://ubuntu.com/security/CVE-2023-0394
- https://ubuntu.com/security/CVE-2023-23455
- https://ubuntu.com/security/CVE-2023-23559
- https://ubuntu.com/security/CVE-2023-28328
- https://ubuntu.com/security/CVE-2023-23559
- https://ubuntu.com/security/CVE-2023-0394
- https://ubuntu.com/security/CVE-2022-3424
- https://ubuntu.com/security/CVE-2022-36280
- https://ubuntu.com/security/CVE-2023-23455
- https://ubuntu.com/security/CVE-2023-28328
- https://ubuntu.com/security/CVE-2022-47929
- https://ubuntu.com/security/CVE-2023-0266
- https://ubuntu.com/security/CVE-2021-3669
- https://ubuntu.com/security/CVE-2023-0045
- https://ubuntu.com/security/CVE-2022-41218
Title: USN-5855-4: ImageMagick vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5855-4
Priorities: medium
Description:
USN-5855-1 fixed vulnerabilities in ImageMagick. This update provides the
corresponding updates for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.
Original advisory details:
It was discovered that ImageMagick incorrectly handled certain PNG images.
If a user or automated system were tricked into opening a specially crafted
PNG file, an attacker could use this issue to cause ImageMagick to stop
responding, resulting in a denial of service, or possibly obtain the
contents of arbitrary files by including them into images.
CVEs:
- https://ubuntu.com/security/CVE-2022-44267
- https://ubuntu.com/security/CVE-2022-44268
Title: USN-6007-1: Linux kernel (GCP) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6007-1
Priorities: high,medium,low
Description:
It was discovered that the Upper Level Protocol (ULP) subsystem in the
Linux kernel did not properly handle sockets entering the LISTEN state in
certain protocols, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-0461)
It was discovered that an out-of-bounds write vulnerability existed in the
Video for Linux 2 (V4L2) implementation in the Linux kernel. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-20369)
Pawan Kumar Gupta, Alyssa Milburn, Amit Peled, Shani Rehana, Nir Shildan
and Ariel Sabba discovered that some Intel processors with Enhanced
Indirect Branch Restricted Speculation (eIBRS) did not properly handle RET
instructions after a VM exits. A local attacker could potentially use this
to expose sensitive information. (CVE-2022-26373)
David Leadbeater discovered that the netfilter IRC protocol tracking
implementation in the Linux Kernel incorrectly handled certain message
payloads in some situations. A remote attacker could possibly use this to
cause a denial of service or bypass firewall filtering. (CVE-2022-2663)
Johannes Wikner and Kaveh Razavi discovered that for some AMD x86-64
processors, the branch predictor could by mis-trained for return
instructions in certain circumstances. A local attacker could possibly use
this to expose sensitive information. (CVE-2022-29900)
Johannes Wikner and Kaveh Razavi discovered that for some Intel x86-64
processors, the Linux kernel’s protections against speculative branch
target injection attacks were insufficient in some circumstances. A local
attacker could possibly use this to expose sensitive information.
(CVE-2022-29901)
It was discovered that a race condition existed in the Kernel Connection
Multiplexor (KCM) socket implementation in the Linux kernel when releasing
sockets in certain situations. A local attacker could use this to cause a
denial of service (system crash). (CVE-2022-3521)
It was discovered that the Netronome Ethernet driver in the Linux kernel
contained a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3545)
It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux
kernel did not properly perform bounds checking in some situations. A
physically proximate attacker could use this to craft a malicious USB
device that when inserted, could cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2022-3628)
It was discovered that a use-after-free vulnerability existed in the
Bluetooth stack in the Linux kernel. A local attacker could use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3640)
It was discovered that the NILFS2 file system implementation in the Linux
kernel did not properly deallocate memory in certain error conditions. An
attacker could use this to cause a denial of service (memory exhaustion).
(CVE-2022-3646)
Khalid Masum discovered that the NILFS2 file system implementation in the
Linux kernel did not properly handle certain error conditions, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service or possibly execute arbitrary code. (CVE-2022-3649)
Hyunwoo Kim discovered that an integer overflow vulnerability existed in
the PXA3xx graphics driver in the Linux kernel. A local attacker could
possibly use this to cause a denial of service (system crash).
(CVE-2022-39842)
It was discovered that a race condition existed in the SMSC UFX USB driver
implementation in the Linux kernel, leading to a use-after-free
vulnerability. A physically proximate attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-41849)
It was discovered that a race condition existed in the Roccat HID driver in
the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-41850)
It was discovered that a race condition existed in the Xen network backend
driver in the Linux kernel when handling dropped packets in certain
circumstances. An attacker could use this to cause a denial of service
(kernel deadlock). (CVE-2022-42328, CVE-2022-42329)
Tamás Koczka discovered that the Bluetooth L2CAP implementation in the
Linux kernel did not properly initialize memory in some situations. A
physically proximate attacker could possibly use this to expose sensitive
information (kernel memory). (CVE-2022-42895)
It was discovered that the USB monitoring (usbmon) component in the Linux
kernel did not properly set permissions on memory mapped in to user space
processes. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-43750)
It was discovered that the NTFS file system implementation in the Linux
kernel did not properly validate attributes in certain situations, leading
to an out-of-bounds read vulnerability. A local attacker could possibly use
this to expose sensitive information (kernel memory). (CVE-2023-26607)
CVEs:
- https://ubuntu.com/security/CVE-2023-0461
- https://ubuntu.com/security/CVE-2022-20369
- https://ubuntu.com/security/CVE-2022-26373
- https://ubuntu.com/security/CVE-2022-2663
- https://ubuntu.com/security/CVE-2022-29900
- https://ubuntu.com/security/CVE-2022-29901
- https://ubuntu.com/security/CVE-2022-3521
- https://ubuntu.com/security/CVE-2022-3545
- https://ubuntu.com/security/CVE-2022-3628
- https://ubuntu.com/security/CVE-2022-3640
- https://ubuntu.com/security/CVE-2022-3646
- https://ubuntu.com/security/CVE-2022-3649
- https://ubuntu.com/security/CVE-2022-39842
- https://ubuntu.com/security/CVE-2022-41849
- https://ubuntu.com/security/CVE-2022-41850
- https://ubuntu.com/security/CVE-2022-42328
- https://ubuntu.com/security/CVE-2022-42329
- https://ubuntu.com/security/CVE-2022-42895
- https://ubuntu.com/security/CVE-2022-43750
- https://ubuntu.com/security/CVE-2023-26607
- https://ubuntu.com/security/CVE-2022-42328
- https://ubuntu.com/security/CVE-2022-3646
- https://ubuntu.com/security/CVE-2022-29900
- https://ubuntu.com/security/CVE-2023-0461
- https://ubuntu.com/security/CVE-2022-41850
- https://ubuntu.com/security/CVE-2023-26607
- https://ubuntu.com/security/CVE-2022-42329
- https://ubuntu.com/security/CVE-2022-43750
- https://ubuntu.com/security/CVE-2022-39842
- https://ubuntu.com/security/CVE-2022-3649
- https://ubuntu.com/security/CVE-2022-20369
- https://ubuntu.com/security/CVE-2022-3628
- https://ubuntu.com/security/CVE-2022-42895
- https://ubuntu.com/security/CVE-2022-3545
- https://ubuntu.com/security/CVE-2022-29901
- https://ubuntu.com/security/CVE-2022-3640
- https://ubuntu.com/security/CVE-2022-26373
- https://ubuntu.com/security/CVE-2022-41849
- https://ubuntu.com/security/CVE-2022-3521
- https://ubuntu.com/security/CVE-2022-2663
Title: LSN-0094-1: Kernel Live Patch Security Notice
URL: https://ubuntu.com/security/notices/LSN-0094-1
Priorities: high
Description:
Lin Ma discovered a race condition in the io_uring subsystem in the Linux
kernel, leading to a null pointer dereference vulnerability. A local
attacker could use this to cause a denial of service (system crash).(CVE-2023-0468)
It was discovered that the Traffic-Control Index (TCINDEX) implementation
in the Linux kernel contained a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code.(CVE-2023-1281)
CVEs:
- https://ubuntu.com/security/CVE-2023-0468
- https://ubuntu.com/security/CVE-2023-1281
- https://ubuntu.com/security/CVE-2023-1281
- https://ubuntu.com/security/CVE-2023-0468
Title: USN-6029-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6029-1
Priorities: high,low,medium
Description:
It was discovered that the Traffic-Control Index (TCINDEX) implementation
in the Linux kernel contained a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-1281)
It was discovered that the infrared transceiver USB driver did not properly
handle USB control messages. A local attacker with physical access could
plug in a specially crafted USB device to cause a denial of service (memory
exhaustion). (CVE-2022-3903)
It was discovered that the Human Interface Device (HID) support driver in
the Linux kernel contained a type confusion vulnerability in some
situations. A local attacker could use this to cause a denial of service
(system crash). (CVE-2023-1073)
It was discovered that a memory leak existed in the SCTP protocol
implementation in the Linux kernel. A local attacker could use this to
cause a denial of service (memory exhaustion). (CVE-2023-1074)
Lianhui Tang discovered that the MPLS implementation in the Linux kernel
did not properly handle certain sysctl allocation failure conditions,
leading to a double-free vulnerability. An attacker could use this to cause
a denial of service or possibly execute arbitrary code. (CVE-2023-26545)
CVEs:
- https://ubuntu.com/security/CVE-2023-1281
- https://ubuntu.com/security/CVE-2022-3903
- https://ubuntu.com/security/CVE-2023-1073
- https://ubuntu.com/security/CVE-2023-1074
- https://ubuntu.com/security/CVE-2023-26545
- https://ubuntu.com/security/CVE-2023-1074
- https://ubuntu.com/security/CVE-2022-3903
- https://ubuntu.com/security/CVE-2023-26545
- https://ubuntu.com/security/CVE-2023-1073
- https://ubuntu.com/security/CVE-2023-1281
Title: USN-6017-1: Ghostscript vulnerability
URL: https://ubuntu.com/security/notices/USN-6017-1
Priorities: medium
Description:
Hadrien Perrineau discovered that Ghostscript incorrectly handled certain
inputs. An attacker could possibly use this issue to cause a denial of
service, or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2023-28879
Available in VMware Tanzu Network
Release Date: April 07, 2023
BOSH Agent Version: 2.268.132
Title: USN-5961-1: abcm2ps vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5961-1
Priorities: medium,low
Description:
It was discovered that abcm2ps incorrectly
handled memory when parsing specially crafted ABC files.
An attacker could use this issue to cause abcm2ps to crash,
leading to a denial of service, or possibly execute
arbitrary code. This issue only affected Ubuntu 16.04 ESM
and Ubuntu 18.04 LTS.
(CVE-2018-10753, CVE-2018-10771, CVE-2019-1010069)
Chiba of Topsec Alpha Lab discovered that abcm2ps incorrectly
handled memory when parsing specially crafted ABC files.
An attacker could use this issue to cause abcm2ps to crash,
leading to a denial of service.
(CVE-2021-32434, CVE-2021-32435, CVE-2021-32436)
CVEs:
- https://ubuntu.com/security/CVE-2018-10753
- https://ubuntu.com/security/CVE-2018-10771
- https://ubuntu.com/security/CVE-2019-1010069
- https://ubuntu.com/security/CVE-2021-32434
- https://ubuntu.com/security/CVE-2021-32435
- https://ubuntu.com/security/CVE-2021-32436
- https://ubuntu.com/security/CVE-2021-32435
- https://ubuntu.com/security/CVE-2018-10771
- https://ubuntu.com/security/CVE-2019-1010069
- https://ubuntu.com/security/CVE-2021-32434
- https://ubuntu.com/security/CVE-2021-32436
- https://ubuntu.com/security/CVE-2018-10753
Title: USN-5974-1: GraphicsMagick vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5974-1
Priorities: medium
Description:
It was discovered that GraphicsMagick was not properly performing bounds
checks when processing TGA image files, which could lead to a heap buffer
overflow. If a user or automated system were tricked into processing a
specially crafted TGA image file, an attacker could possibly use this
issue to cause a denial of service or execute arbitrary code. This issue
only affected Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. (CVE-2018-20184)
It was discovered that GraphicsMagick was not properly validating bits per
pixel data when processing DIB image files. If a user or automated system
were tricked into processing a specially crafted DIB image file, an
attacker could possibly use this issue to cause a denial of service. This
issue only affected Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.
(CVE-2018-20189)
It was discovered that GraphicsMagick was not properly processing
bit-field mask values in BMP image files, which could result in the
execution of an infinite loop. If a user or automated system were tricked
into processing a specially crafted BMP image file, an attacker could
possibly use this issue to cause a denial of service. This issue only
affected Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. (CVE-2018-5685)
It was discovered that GraphicsMagick was not properly validating data
used in arithmetic operations when processing MNG image files, which
could result in a divide-by-zero error. If a user or automated system were
tricked into processing a specially crafted MNG image file, an attacker
could possibly use this issue to cause a denial of service. This issue
only affected Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. (CVE-2018-9018)
It was discovered that GraphicsMagick was not properly performing bounds
checks when processing MIFF image files, which could lead to a heap buffer
overflow. If a user or automated system were tricked into processing a
specially crafted MIFF image file, an attacker could possibly use this
issue to cause a denial of service or expose sensitive information. This
issue only affected Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.
(CVE-2019-11006)
It was discovered that GraphicsMagick did not properly magnify certain
MNG image files, which could lead to a heap buffer overflow. If a user or
automated system were tricked into processing a specially crafted MNG
image file, an attacker could possibly use this issue to cause a denial
of service or execute arbitrary code. This issue only affected Ubuntu
20.04 LTS. (CVE-2020-12672)
It was discovered that GraphicsMagick was not properly performing bounds
checks when parsing certain MIFF image files, which could lead to a heap
buffer overflow. If a user or automated system were tricked into
processing a specially crafted MIFF image file, an attacker could possibly
use this issue to cause a denial of service or execute arbitrary code.
(CVE-2022-1270)
CVEs:
- https://ubuntu.com/security/CVE-2018-20184
- https://ubuntu.com/security/CVE-2018-20189
- https://ubuntu.com/security/CVE-2018-5685
- https://ubuntu.com/security/CVE-2018-9018
- https://ubuntu.com/security/CVE-2019-11006
- https://ubuntu.com/security/CVE-2020-12672
- https://ubuntu.com/security/CVE-2022-1270
- https://ubuntu.com/security/CVE-2019-11006
- https://ubuntu.com/security/CVE-2018-9018
- https://ubuntu.com/security/CVE-2022-1270
- https://ubuntu.com/security/CVE-2018-20189
- https://ubuntu.com/security/CVE-2020-12672
- https://ubuntu.com/security/CVE-2018-20184
- https://ubuntu.com/security/CVE-2018-5685
Title: USN-5973-1: url-parse vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5973-1
Priorities: medium,low
Description:
It was discovered that url-parse incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to cause a
denial of service, or to perform a server-side request forgery attack or open
redirect attack. (CVE-2018-3774)
It was discovered that url-parse incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to bypass input
validation. This issue was only fixed in Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. (CVE-2020-8124)
Yaniv Nizry discovered that url-parse incorrectly handled certain inputs.
If a user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to cause a
denial of service, or to perform a server-side request forgery attack or open
redirect attack. This issue was only fixed in Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. (CVE-2021-27515)
It was discovered that url-parse incorrectly handled certain inputs.
If a user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to cause a
denial of service, or to perform a server-side request forgery attack or open
redirect attack. This issue was only fixed in Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. (CVE-2021-3664)
It was discovered that url-parse incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to bypass
authorization. This issue was only fixed in Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. (CVE-2022-0512, CVE-2022-0639, CVE-2022-0691)
Rohan Sharma discovered that url-parse incorrectly handled certain inputs.
If a user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to bypass
authorization. This issue was only fixed in Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. (CVE-2022-0686)
CVEs:
- https://ubuntu.com/security/CVE-2018-3774
- https://ubuntu.com/security/CVE-2020-8124
- https://ubuntu.com/security/CVE-2021-27515
- https://ubuntu.com/security/CVE-2021-3664
- https://ubuntu.com/security/CVE-2022-0512
- https://ubuntu.com/security/CVE-2022-0639
- https://ubuntu.com/security/CVE-2022-0691
- https://ubuntu.com/security/CVE-2022-0686
- https://ubuntu.com/security/CVE-2021-3664
- https://ubuntu.com/security/CVE-2022-0639
- https://ubuntu.com/security/CVE-2021-27515
- https://ubuntu.com/security/CVE-2022-0686
- https://ubuntu.com/security/CVE-2020-8124
- https://ubuntu.com/security/CVE-2022-0512
- https://ubuntu.com/security/CVE-2022-0691
- https://ubuntu.com/security/CVE-2018-3774
Title: USN-5990-1: musl vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5990-1
Priorities: medium
Description:
It was discovered that musl did not handle certain i386 math functions
properly. An attacker could use this vulnerability to cause a denial of
service (crash) or possibly execute arbitrary code. This issue only
affected Ubuntu 14.04 ESM, Ubuntu 16.04 ESM, and Ubuntu 18.04 LTS.
(CVE-2019-14697)
It was discovered that musl did not handle wide-character conversion
properly. A remote attacker could use this vulnerability to cause resource
consumption (infinite loop), denial of service, or possibly execute
arbitrary code. This issue only affected Ubuntu 14.04 ESM, Ubuntu 16.04
ESM, Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS. (CVE-2020-28928)
CVEs:
- https://ubuntu.com/security/CVE-2019-14697
- https://ubuntu.com/security/CVE-2020-28928
- https://ubuntu.com/security/CVE-2020-28928
- https://ubuntu.com/security/CVE-2019-14697
Title: USN-5988-1: Xcftools vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5988-1
Priorities: medium
Description:
It was discovered that integer overflows vulnerabilities existed in Xcftools.
An attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2019-5086, CVE-2019-5087)
CVEs:
- https://ubuntu.com/security/CVE-2019-5086
- https://ubuntu.com/security/CVE-2019-5087
- https://ubuntu.com/security/CVE-2019-5086
- https://ubuntu.com/security/CVE-2019-5087
Title: USN-5983-1: Nette vulnerability
URL: https://ubuntu.com/security/notices/USN-5983-1
Priorities: medium
Description:
Cyku Hong discovered that Nette was not properly handling and validating
data used for code generation. A remote attacker could possibly use this
issue to execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2020-15227
Title: USN-5997-1: IPMItool vulnerability
URL: https://ubuntu.com/security/notices/USN-5997-1
Priorities: medium
Description:
It was discovered that IPMItool was not properly checking the data received
from a remote LAN party. A remote attacker could possibly use this issue to
to cause a crash or arbitrary code execution.
CVEs:
- https://ubuntu.com/security/CVE-2020-5208
Title: USN-5904-2: SoX regression
URL: https://ubuntu.com/security/notices/USN-5904-2
Priorities: medium,low
Description:
USN-5904-1 fixed vulnerabilities in SoX. It was discovered that the fix for
CVE-2021-33844 was incomplete. This update fixes the problem.
Original advisory details:
Helmut Grohne discovered that SoX incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to cause a
denial of service. This issue only affected Ubuntu 14.04 ESM, Ubuntu 16.04 ESM,
and Ubuntu 18.04 LTS. (CVE-2019-13590)
Helmut Grohne discovered that SoX incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to cause a
denial of service. (CVE-2021-23159, CVE-2021-23172, CVE-2021-23210,
CVE-2021-33844, CVE-2021-3643, CVE-2021-40426, CVE-2022-31650, and
CVE-2022-31651)
CVEs:
- https://ubuntu.com/security/CVE-2021-33844
- https://ubuntu.com/security/CVE-2019-13590
- https://ubuntu.com/security/CVE-2021-23159
- https://ubuntu.com/security/CVE-2021-23172
- https://ubuntu.com/security/CVE-2021-23210
- https://ubuntu.com/security/CVE-2021-33844
- https://ubuntu.com/security/CVE-2021-3643
- https://ubuntu.com/security/CVE-2021-40426
- https://ubuntu.com/security/CVE-2022-31650
- https://ubuntu.com/security/CVE-2022-31651
- https://ubuntu.com/security/CVE-2021-33844
Title: USN-5981-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5981-1
Priorities: low,medium
Description:
It was discovered that the System V IPC implementation in the Linux kernel
did not properly handle large shared memory counts. A local attacker could
use this to cause a denial of service (memory exhaustion). (CVE-2021-3669)
It was discovered that a use-after-free vulnerability existed in the SGI
GRU driver in the Linux kernel. A local attacker could possibly use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3424)
Ziming Zhang discovered that the VMware Virtual GPU DRM driver in the Linux
kernel contained an out-of-bounds write vulnerability. A local attacker
could use this to cause a denial of service (system crash).
(CVE-2022-36280)
Hyunwoo Kim discovered that the DVB Core driver in the Linux kernel did not
properly perform reference counting in some situations, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2022-41218)
It was discovered that the network queuing discipline implementation in the
Linux kernel contained a null pointer dereference in some situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2022-47929)
José Oliveira and Rodrigo Branco discovered that the prctl syscall
implementation in the Linux kernel did not properly protect against
indirect branch prediction attacks in some situations. A local attacker
could possibly use this to expose sensitive information. (CVE-2023-0045)
It was discovered that a use-after-free vulnerability existed in the
Advanced Linux Sound Architecture (ALSA) subsystem. A local attacker could
use this to cause a denial of service (system crash). (CVE-2023-0266)
Kyle Zeng discovered that the IPv6 implementation in the Linux kernel
contained a NULL pointer dereference vulnerability in certain situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2023-0394)
Kyle Zeng discovered that the ATM VC queuing discipline implementation in
the Linux kernel contained a type confusion vulnerability in some
situations. An attacker could use this to cause a denial of service (system
crash). (CVE-2023-23455)
It was discovered that the RNDIS USB driver in the Linux kernel contained
an integer overflow vulnerability. A local attacker with physical access
could plug in a malicious USB device to cause a denial of service (system
crash) or possibly execute arbitrary code. (CVE-2023-23559)
Wei Chen discovered that the DVB USB AZ6027 driver in the Linux kernel
contained a null pointer dereference when handling certain messages from
user space. A local attacker could use this to cause a denial of service
(system crash). (CVE-2023-28328)
CVEs:
- https://ubuntu.com/security/CVE-2021-3669
- https://ubuntu.com/security/CVE-2022-3424
- https://ubuntu.com/security/CVE-2022-36280
- https://ubuntu.com/security/CVE-2022-41218
- https://ubuntu.com/security/CVE-2022-47929
- https://ubuntu.com/security/CVE-2023-0045
- https://ubuntu.com/security/CVE-2023-0266
- https://ubuntu.com/security/CVE-2023-0394
- https://ubuntu.com/security/CVE-2023-23455
- https://ubuntu.com/security/CVE-2023-23559
- https://ubuntu.com/security/CVE-2023-28328
- https://ubuntu.com/security/CVE-2022-41218
- https://ubuntu.com/security/CVE-2023-0394
- https://ubuntu.com/security/CVE-2022-36280
- https://ubuntu.com/security/CVE-2021-3669
- https://ubuntu.com/security/CVE-2023-23455
- https://ubuntu.com/security/CVE-2022-3424
- https://ubuntu.com/security/CVE-2023-0045
- https://ubuntu.com/security/CVE-2023-0266
- https://ubuntu.com/security/CVE-2022-47929
- https://ubuntu.com/security/CVE-2023-23559
- https://ubuntu.com/security/CVE-2023-28328
Title: USN-5969-1: gif2apng vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5969-1
Priorities: medium
Description:
It was discovered that gif2apng contained multiple heap-base overflows. An
attacker could potentially exploit this to cause a denial of service (system
crash). (CVE-2021-45909, CVE-2021-45910, CVE-2021-45911)
CVEs:
- https://ubuntu.com/security/CVE-2021-45909
- https://ubuntu.com/security/CVE-2021-45910
- https://ubuntu.com/security/CVE-2021-45911
- https://ubuntu.com/security/CVE-2021-45911
- https://ubuntu.com/security/CVE-2021-45909
- https://ubuntu.com/security/CVE-2021-45910
Title: USN-5968-1: GitPython vulnerability
URL: https://ubuntu.com/security/notices/USN-5968-1
Priorities: medium
Description:
It was discovered that GitPython did not properly sanitize user inputs for
remote URLs in the clone command. By injecting a maliciously crafted
remote URL, an attacker could possibly use this issue to execute arbitrary
commands on the host.
CVEs:
- https://ubuntu.com/security/CVE-2022-24439
Title: USN-5958-1: FFmpeg vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5958-1
Priorities: medium
Description:
It was discovered that FFmpeg could be made to dereference a null
pointer. An attacker could possibly use this to cause a denial of
service via application crash. These issues only affected Ubuntu
16.04 ESM, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04
LTS. (CVE-2022-3109, CVE-2022-3341)
It was discovered that FFmpeg could be made to access an out-of-bounds
frame by the Apple RPZA encoder. An attacker could possibly use this
to cause a denial of service via application crash or access sensitive
information. This issue only affected Ubuntu 20.04 LTS and Ubuntu
22.10. (CVE-2022-3964)
It was discovered that FFmpeg could be made to access an out-of-bounds
frame by the QuickTime encoder. An attacker could possibly use this to
cause a denial of service via application crash or access sensitive
information. This issue only affected Ubuntu 22.10. (CVE-2022-3965)
CVEs:
- https://ubuntu.com/security/CVE-2022-3109
- https://ubuntu.com/security/CVE-2022-3341
- https://ubuntu.com/security/CVE-2022-3964
- https://ubuntu.com/security/CVE-2022-3965
- https://ubuntu.com/security/CVE-2022-3341
- https://ubuntu.com/security/CVE-2022-3109
- https://ubuntu.com/security/CVE-2022-3965
- https://ubuntu.com/security/CVE-2022-3964
Title: USN-5966-2: amanda regression
URL: https://ubuntu.com/security/notices/USN-5966-2
Priorities: low,medium,high
Description:
USN-5966-1 fixed vulnerabilities in amanda. Unfortunately it introduced
a regression in GNUTAR-based backups. This update reverts all of the
changes in amanda until a better fix is provided.
We apologize for the inconvenience.
Original advisory details:
Maher Azzouzi discovered an information disclosure vulnerability in the
calcsize binary within amanda. calcsize is a suid binary owned by root that
could possibly be used by a malicious local attacker to expose sensitive
file system information. (CVE-2022-37703)
Maher Azzouzi discovered a privilege escalation vulnerability in the
rundump binary within amanda. rundump is a suid binary owned by root that
did not perform adequate sanitization of environment variables or
commandline options and could possibly be used by a malicious local
attacker to escalate privileges. (CVE-2022-37704)
Maher Azzouzi discovered a privilege escalation vulnerability in the runtar
binary within amanda. runtar is a suid binary owned by root that did not
perform adequate sanitization of commandline options and could possibly be
used by a malicious local attacker to escalate privileges. (CVE-2022-37705)
CVEs:
- https://ubuntu.com/security/CVE-2022-37703
- https://ubuntu.com/security/CVE-2022-37704
- https://ubuntu.com/security/CVE-2022-37705
Title: USN-5966-1: amanda vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5966-1
Priorities: low,medium,high
Description:
Maher Azzouzi discovered an information disclosure vulnerability in the
calcsize binary within amanda. calcsize is a suid binary owned by root that
could possibly be used by a malicious local attacker to expose sensitive
file system information. (CVE-2022-37703)
Maher Azzouzi discovered a privilege escalation vulnerability in the
rundump binary within amanda. rundump is a suid binary owned by root that
did not perform adequate sanitization of environment variables or
commandline options and could possibly be used by a malicious local
attacker to escalate privileges. (CVE-2022-37704)
Maher Azzouzi discovered a privilege escalation vulnerability in the runtar
binary within amanda. runtar is a suid binary owned by root that did not
perform adequate sanitization of commandline options and could possibly be
used by a malicious local attacker to escalate privileges. (CVE-2022-37705)
CVEs:
- https://ubuntu.com/security/CVE-2022-37703
- https://ubuntu.com/security/CVE-2022-37704
- https://ubuntu.com/security/CVE-2022-37705
- https://ubuntu.com/security/CVE-2022-37703
- https://ubuntu.com/security/CVE-2022-37704
- https://ubuntu.com/security/CVE-2022-37705
Title: USN-5686-4: Git vulnerability
URL: https://ubuntu.com/security/notices/USN-5686-4
Priorities: medium
Description:
USN-5686-1 fixed several vulnerabilities in Git. This update
provides the corresponding fix for CVE-2022-39253 on Ubuntu 16.04 ESM.
Original advisory details:
Cory Snider discovered that Git incorrectly handled certain symbolic links.
An attacker could possibly use this issue to cause an unexpected behaviour.
CVEs:
- https://ubuntu.com/security/CVE-2022-39253
- https://ubuntu.com/security/CVE-2022-39253
Title: USN-5963-1: Vim vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5963-1
Priorities: medium
Description:
It was discovered that Vim was not properly performing memory management
operations. An attacker could possibly use this issue to cause a denial
of service or execute arbitrary code. This issue only affected Ubuntu 18.04
LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 22.10. (CVE-2022-47024,
CVE-2023-0049, CVE-2023-0054, CVE-2023-0288, CVE-2023-0433)
It was discovered that Vim was not properly performing memory management
operations. An attacker could possibly use this issue to cause a denial
of service or execute arbitrary code. This issue only affected Ubuntu 22.04
LTS, and Ubuntu 22.10. (CVE-2023-0051)
It was discovered that Vim was not properly performing memory management
operations. An attacker could possibly use this issue to cause a denial
of service or execute arbitrary code. (CVE-2023-1170, CVE-2023-1175)
It was discovered that Vim was not properly performing memory management
operations. An attacker could possibly use this issue to cause a denial
of service or execute arbitrary code. This issue only affected Ubuntu 20.04
LTS, Ubuntu 22.04 LTS, and Ubuntu 22.10. (CVE-2023-1264)
CVEs:
- https://ubuntu.com/security/CVE-2022-47024
- https://ubuntu.com/security/CVE-2023-0049
- https://ubuntu.com/security/CVE-2023-0054
- https://ubuntu.com/security/CVE-2023-0288
- https://ubuntu.com/security/CVE-2023-0433
- https://ubuntu.com/security/CVE-2023-0051
- https://ubuntu.com/security/CVE-2023-1170
- https://ubuntu.com/security/CVE-2023-1175
- https://ubuntu.com/security/CVE-2023-1264
- https://ubuntu.com/security/CVE-2023-0054
- https://ubuntu.com/security/CVE-2023-1175
- https://ubuntu.com/security/CVE-2023-0049
- https://ubuntu.com/security/CVE-2023-1264
- https://ubuntu.com/security/CVE-2023-0433
- https://ubuntu.com/security/CVE-2022-47024
- https://ubuntu.com/security/CVE-2023-0051
- https://ubuntu.com/security/CVE-2023-0288
- https://ubuntu.com/security/CVE-2023-1170
Title: LSN-0093-1: Kernel Live Patch Security Notice
URL: https://ubuntu.com/security/notices/LSN-0093-1
Priorities: high
Description:
Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel
did not properly handle VLAN headers in some situations. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code.(CVE-2023-0179)
It was discovered that the Upper Level Protocol (ULP) subsystem in the
Linux kernel did not properly handle sockets entering the LISTEN state in
certain protocols, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code.(CVE-2023-0461)
CVEs:
- https://ubuntu.com/security/CVE-2023-0179
- https://ubuntu.com/security/CVE-2023-0461
- https://ubuntu.com/security/CVE-2023-0461
- https://ubuntu.com/security/CVE-2023-0179
Title: USN-5975-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5975-1
Priorities: high,low,medium
Description:
It was discovered that the Upper Level Protocol (ULP) subsystem in the
Linux kernel did not properly handle sockets entering the LISTEN state in
certain protocols, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-0461)
It was discovered that the System V IPC implementation in the Linux kernel
did not properly handle large shared memory counts. A local attacker could
use this to cause a denial of service (memory exhaustion). (CVE-2021-3669)
It was discovered that an out-of-bounds write vulnerability existed in the
Video for Linux 2 (V4L2) implementation in the Linux kernel. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-20369)
Pawan Kumar Gupta, Alyssa Milburn, Amit Peled, Shani Rehana, Nir Shildan
and Ariel Sabba discovered that some Intel processors with Enhanced
Indirect Branch Restricted Speculation (eIBRS) did not properly handle RET
instructions after a VM exits. A local attacker could potentially use this
to expose sensitive information. (CVE-2022-26373)
David Leadbeater discovered that the netfilter IRC protocol tracking
implementation in the Linux Kernel incorrectly handled certain message
payloads in some situations. A remote attacker could possibly use this to
cause a denial of service or bypass firewall filtering. (CVE-2022-2663)
Johannes Wikner and Kaveh Razavi discovered that for some AMD x86-64
processors, the branch predictor could by mis-trained for return
instructions in certain circumstances. A local attacker could possibly use
this to expose sensitive information. (CVE-2022-29900)
Johannes Wikner and Kaveh Razavi discovered that for some Intel x86-64
processors, the Linux kernel’s protections against speculative branch
target injection attacks were insufficient in some circumstances. A local
attacker could possibly use this to expose sensitive information.
(CVE-2022-29901)
It was discovered that a use-after-free vulnerability existed in the SGI
GRU driver in the Linux kernel. A local attacker could possibly use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3424)
It was discovered that a race condition existed in the Kernel Connection
Multiplexor (KCM) socket implementation in the Linux kernel when releasing
sockets in certain situations. A local attacker could use this to cause a
denial of service (system crash). (CVE-2022-3521)
It was discovered that the Netronome Ethernet driver in the Linux kernel
contained a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3545)
It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux
kernel did not properly perform bounds checking in some situations. A
physically proximate attacker could use this to craft a malicious USB
device that when inserted, could cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2022-3628)
Ziming Zhang discovered that the VMware Virtual GPU DRM driver in the Linux
kernel contained an out-of-bounds write vulnerability. A local attacker
could use this to cause a denial of service (system crash).
(CVE-2022-36280)
It was discovered that a use-after-free vulnerability existed in the
Bluetooth stack in the Linux kernel. A local attacker could use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3640)
It was discovered that the NILFS2 file system implementation in the Linux
kernel did not properly deallocate memory in certain error conditions. An
attacker could use this to cause a denial of service (memory exhaustion).
(CVE-2022-3646)
Khalid Masum discovered that the NILFS2 file system implementation in the
Linux kernel did not properly handle certain error conditions, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service or possibly execute arbitrary code. (CVE-2022-3649)
Hyunwoo Kim discovered that an integer overflow vulnerability existed in
the PXA3xx graphics driver in the Linux kernel. A local attacker could
possibly use this to cause a denial of service (system crash).
(CVE-2022-39842)
Hyunwoo Kim discovered that the DVB Core driver in the Linux kernel did not
properly perform reference counting in some situations, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2022-41218)
It was discovered that a race condition existed in the SMSC UFX USB driver
implementation in the Linux kernel, leading to a use-after-free
vulnerability. A physically proximate attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-41849)
It was discovered that a race condition existed in the Roccat HID driver in
the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-41850)
It was discovered that a race condition existed in the Xen network backend
driver in the Linux kernel when handling dropped packets in certain
circumstances. An attacker could use this to cause a denial of service
(kernel deadlock). (CVE-2022-42328, CVE-2022-42329)
Tamás Koczka discovered that the Bluetooth L2CAP implementation in the
Linux kernel did not properly initialize memory in some situations. A
physically proximate attacker could possibly use this to expose sensitive
information (kernel memory). (CVE-2022-42895)
It was discovered that the USB monitoring (usbmon) component in the Linux
kernel did not properly set permissions on memory mapped in to user space
processes. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-43750)
It was discovered that the network queuing discipline implementation in the
Linux kernel contained a null pointer dereference in some situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2022-47929)
José Oliveira and Rodrigo Branco discovered that the prctl syscall
implementation in the Linux kernel did not properly protect against
indirect branch prediction attacks in some situations. A local attacker
could possibly use this to expose sensitive information. (CVE-2023-0045)
It was discovered that a use-after-free vulnerability existed in the
Advanced Linux Sound Architecture (ALSA) subsystem. A local attacker could
use this to cause a denial of service (system crash). (CVE-2023-0266)
Kyle Zeng discovered that the IPv6 implementation in the Linux kernel
contained a NULL pointer dereference vulnerability in certain situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2023-0394)
Kyle Zeng discovered that the ATM VC queuing discipline implementation in
the Linux kernel contained a type confusion vulnerability in some
situations. An attacker could use this to cause a denial of service (system
crash). (CVE-2023-23455)
It was discovered that the RNDIS USB driver in the Linux kernel contained
an integer overflow vulnerability. A local attacker with physical access
could plug in a malicious USB device to cause a denial of service (system
crash) or possibly execute arbitrary code. (CVE-2023-23559)
It was discovered that the NTFS file system implementation in the Linux
kernel did not properly validate attributes in certain situations, leading
to an out-of-bounds read vulnerability. A local attacker could possibly use
this to expose sensitive information (kernel memory). (CVE-2023-26607)
Wei Chen discovered that the DVB USB AZ6027 driver in the Linux kernel
contained a null pointer dereference when handling certain messages from
user space. A local attacker could use this to cause a denial of service
(system crash). (CVE-2023-28328)
CVEs:
- https://ubuntu.com/security/CVE-2023-0461
- https://ubuntu.com/security/CVE-2021-3669
- https://ubuntu.com/security/CVE-2022-20369
- https://ubuntu.com/security/CVE-2022-26373
- https://ubuntu.com/security/CVE-2022-2663
- https://ubuntu.com/security/CVE-2022-29900
- https://ubuntu.com/security/CVE-2022-29901
- https://ubuntu.com/security/CVE-2022-3424
- https://ubuntu.com/security/CVE-2022-3521
- https://ubuntu.com/security/CVE-2022-3545
- https://ubuntu.com/security/CVE-2022-3628
- https://ubuntu.com/security/CVE-2022-36280
- https://ubuntu.com/security/CVE-2022-3640
- https://ubuntu.com/security/CVE-2022-3646
- https://ubuntu.com/security/CVE-2022-3649
- https://ubuntu.com/security/CVE-2022-39842
- https://ubuntu.com/security/CVE-2022-41218
- https://ubuntu.com/security/CVE-2022-41849
- https://ubuntu.com/security/CVE-2022-41850
- https://ubuntu.com/security/CVE-2022-42328
- https://ubuntu.com/security/CVE-2022-42329
- https://ubuntu.com/security/CVE-2022-42895
- https://ubuntu.com/security/CVE-2022-43750
- https://ubuntu.com/security/CVE-2022-47929
- https://ubuntu.com/security/CVE-2023-0045
- https://ubuntu.com/security/CVE-2023-0266
- https://ubuntu.com/security/CVE-2023-0394
- https://ubuntu.com/security/CVE-2023-23455
- https://ubuntu.com/security/CVE-2023-23559
- https://ubuntu.com/security/CVE-2023-26607
- https://ubuntu.com/security/CVE-2023-28328
- https://ubuntu.com/security/CVE-2022-43750
- https://ubuntu.com/security/CVE-2022-3521
- https://ubuntu.com/security/CVE-2022-3424
- https://ubuntu.com/security/CVE-2022-41218
- https://ubuntu.com/security/CVE-2022-47929
- https://ubuntu.com/security/CVE-2022-3628
- https://ubuntu.com/security/CVE-2022-3640
- https://ubuntu.com/security/CVE-2023-23455
- https://ubuntu.com/security/CVE-2022-42329
- https://ubuntu.com/security/CVE-2023-26607
- https://ubuntu.com/security/CVE-2023-23559
- https://ubuntu.com/security/CVE-2022-3649
- https://ubuntu.com/security/CVE-2023-0045
- https://ubuntu.com/security/CVE-2022-2663
- https://ubuntu.com/security/CVE-2021-3669
- https://ubuntu.com/security/CVE-2022-29901
- https://ubuntu.com/security/CVE-2022-3646
- https://ubuntu.com/security/CVE-2022-29900
- https://ubuntu.com/security/CVE-2022-42328
- https://ubuntu.com/security/CVE-2022-41850
- https://ubuntu.com/security/CVE-2022-39842
- https://ubuntu.com/security/CVE-2022-3545
- https://ubuntu.com/security/CVE-2023-0266
- https://ubuntu.com/security/CVE-2023-0394
- https://ubuntu.com/security/CVE-2023-0461
- https://ubuntu.com/security/CVE-2022-20369
- https://ubuntu.com/security/CVE-2022-42895
- https://ubuntu.com/security/CVE-2022-36280
- https://ubuntu.com/security/CVE-2023-28328
- https://ubuntu.com/security/CVE-2022-26373
- https://ubuntu.com/security/CVE-2022-41849
Title: USN-5960-1: Python vulnerability
URL: https://ubuntu.com/security/notices/USN-5960-1
Priorities: medium
Description:
Yebo Cao discovered that Python incorrectly handled certain URLs.
An attacker could possibly use this issue to bypass blocklisting
methods by supplying a URL that starts with blank characters.
CVEs:
- https://ubuntu.com/security/CVE-2023-24329
Title: USN-5942-2: Apache HTTP Server vulnerability
URL: https://ubuntu.com/security/notices/USN-5942-2
Priorities: medium
Description:
USN-5942-1 fixed vulnerabilities in Apache HTTP Server. This update
provides the corresponding update for CVE-2023-25690 for Ubuntu 16.04 ESM.
Original advisory details:
Lars Krapf discovered that the Apache HTTP Server mod_proxy module
incorrectly handled certain configurations. A remote attacker could
possibly use this issue to perform an HTTP Request Smuggling attack.
(CVE-2023-25690)
CVEs:
- https://ubuntu.com/security/CVE-2023-25690
- https://ubuntu.com/security/CVE-2023-25690
- https://ubuntu.com/security/CVE-2023-25690
Title: USN-5989-1: GlusterFS vulnerability
URL: https://ubuntu.com/security/notices/USN-5989-1
Priorities: medium
Description:
Tao Lyu discovered that GlusterFS did not properly handle certain
event notifications. An attacker could possibly use this issue to
cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-26253
Title: USN-5996-1: Liblouis vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5996-1
Priorities: medium
Description:
It was discovered that Liblouis incorrectly handled certain files.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2023-26767, CVE-2023-26768, CVE-2023-26769)
CVEs:
- https://ubuntu.com/security/CVE-2023-26767
- https://ubuntu.com/security/CVE-2023-26768
- https://ubuntu.com/security/CVE-2023-26769
- https://ubuntu.com/security/CVE-2023-26769
- https://ubuntu.com/security/CVE-2023-26768
- https://ubuntu.com/security/CVE-2023-26767
Title: USN-5964-2: curl vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5964-2
Priorities: low,medium
Description:
USN-5964-1 fixed several vulnerabilities in curl. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.
Original advisory details:
Harry Sintonen discovered that curl incorrectly handled certain TELNET
connection options. Due to lack of proper input scrubbing, curl could pass
on user name and telnet options to the server as provided, contrary to
expectations. (CVE-2023-27533)
Harry Sintonen discovered that curl incorrectly reused certain FTP
connections. This could lead to the wrong credentials being reused,
contrary to expectations. (CVE-2023-2753