Security
Headlines
HeadlinesLatestCVEs

Headline

Ubuntu Security Notice USN-6193-1

Ubuntu Security Notice 6193-1 - Hangyu Hua discovered that the Flower classifier implementation in the Linux kernel contained an out-of-bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that for some Intel processors the INVLPG instruction implementation did not properly flush global TLB entries when PCIDs are enabled. An attacker could use this to expose sensitive information or possibly cause undesired behaviors.

Packet Storm
#vulnerability#web#google#microsoft#amazon#ubuntu#linux#dos#oracle#intel#perl#aws#ibm
==========================================================================Ubuntu Security Notice USN-6193-1June 29, 2023linux, linux-aws, linux-aws-5.15, linux-aws-5.4, linux-azure,linux-azure-5.15, linux-azure-5.4, linux-azure-fde-5.15, linux-bluefield,linux-gcp, linux-gcp-5.15, linux-gcp-5.4, linux-gke, linux-gke-5.15,linux-gkeop, linux-gkeop-5.15, linux-hwe-5.15, linux-hwe-5.4, linux-ibm,linux-ibm-5.4, linux-kvm, linux-lowlatency, linux-lowlatency-hwe-5.15,linux-nvidia, linux-oracle, linux-oracle-5.15, linux-oracle-5.4,linux-raspi, linux-raspi-5.4 vulnerabilities==========================================================================A security issue affects these releases of Ubuntu and its derivatives:- Ubuntu 23.04- Ubuntu 22.04 LTS- Ubuntu 20.04 LTS- Ubuntu 18.04 LTS (Available with Ubuntu Pro)Summary:Several security issues were fixed in the Linux kernel.Software Description:- linux: Linux kernel- linux-aws: Linux kernel for Amazon Web Services (AWS) systems- linux-kvm: Linux kernel for cloud environments- linux-lowlatency: Linux low latency kernel- linux-raspi: Linux kernel for Raspberry Pi systems- linux-azure: Linux kernel for Microsoft Azure Cloud systems- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems- linux-gke: Linux kernel for Google Container Engine (GKE) systems- linux-gkeop: Linux kernel for Google Container Engine (GKE) systems- linux-ibm: Linux kernel for IBM cloud systems- linux-nvidia: Linux kernel for NVIDIA systems- linux-oracle: Linux kernel for Oracle Cloud systems- linux-aws-5.15: Linux kernel for Amazon Web Services (AWS) systems- linux-azure-5.15: Linux kernel for Microsoft Azure cloud systems- linux-azure-fde-5.15: Linux kernel for Microsoft Azure CVM cloud systems- linux-bluefield: Linux kernel for NVIDIA BlueField platforms- linux-gcp-5.15: Linux kernel for Google Cloud Platform (GCP) systems- linux-gke-5.15: Linux kernel for Google Container Engine (GKE) systems- linux-gkeop-5.15: Linux kernel for Google Container Engine (GKE) systems- linux-hwe-5.15: Linux hardware enablement (HWE) kernel- linux-lowlatency-hwe-5.15: Linux low latency kernel- linux-oracle-5.15: Linux kernel for Oracle Cloud systems- linux-aws-5.4: Linux kernel for Amazon Web Services (AWS) systems- linux-azure-5.4: Linux kernel for Microsoft Azure cloud systems- linux-gcp-5.4: Linux kernel for Google Cloud Platform (GCP) systems- linux-hwe-5.4: Linux hardware enablement (HWE) kernel- linux-ibm-5.4: Linux kernel for IBM cloud systems- linux-oracle-5.4: Linux kernel for Oracle Cloud systems- linux-raspi-5.4: Linux kernel for Raspberry Pi systemsDetails:Hangyu Hua discovered that the Flower classifier implementation in theLinux kernel contained an out-of-bounds write vulnerability. An attackercould use this to cause a denial of service (system crash) or possiblyexecute arbitrary code.  (CVE-2023-35788, LP: #2023577)It was discovered that for some Intel processors the INVLPG instructionimplementation did not properly flush global TLB entries when PCIDs areenabled. An attacker could use this to expose sensitive information(kernel memory) or possibly cause undesired behaviors. (LP: #2023220)Update instructions:The problem can be corrected by updating your system to the followingpackage versions:Ubuntu 23.04:   linux-image-6.2.0-1006-aws      6.2.0-1006.6   linux-image-6.2.0-1007-kvm      6.2.0-1007.7   linux-image-6.2.0-1007-lowlatency  6.2.0-1007.7   linux-image-6.2.0-1007-lowlatency-64k  6.2.0-1007.7   linux-image-6.2.0-1007-raspi    6.2.0-1007.9   linux-image-6.2.0-1007-raspi-nolpae  6.2.0-1007.9   linux-image-6.2.0-24-generic    6.2.0-24.24   linux-image-6.2.0-24-generic-64k  6.2.0-24.24   linux-image-6.2.0-24-generic-lpae  6.2.0-24.24   linux-image-aws                 6.2.0.1006.7   linux-image-generic             6.2.0.24.24   linux-image-generic-64k         6.2.0.24.24   linux-image-generic-lpae        6.2.0.24.24   linux-image-kvm                 6.2.0.1007.7   linux-image-lowlatency          6.2.0.1007.7   linux-image-lowlatency-64k      6.2.0.1007.7   linux-image-raspi               6.2.0.1007.10   linux-image-raspi-nolpae        6.2.0.1007.10   linux-image-virtual             6.2.0.24.24Ubuntu 22.04 LTS:   linux-image-5.15.0-1023-gkeop   5.15.0-1023.28   linux-image-5.15.0-1028-nvidia  5.15.0-1028.28   linux-image-5.15.0-1028-nvidia-lowlatency  5.15.0-1028.28   linux-image-5.15.0-1033-ibm     5.15.0-1033.36   linux-image-5.15.0-1033-raspi   5.15.0-1033.36   linux-image-5.15.0-1033-raspi-nolpae  5.15.0-1033.36   linux-image-5.15.0-1037-gcp     5.15.0-1037.45   linux-image-5.15.0-1037-gke     5.15.0-1037.42   linux-image-5.15.0-1037-kvm     5.15.0-1037.42   linux-image-5.15.0-1038-oracle  5.15.0-1038.44   linux-image-5.15.0-1039-aws     5.15.0-1039.44   linux-image-5.15.0-1041-azure   5.15.0-1041.48   linux-image-5.15.0-76-generic   5.15.0-76.83   linux-image-5.15.0-76-generic-64k  5.15.0-76.83   linux-image-5.15.0-76-generic-lpae  5.15.0-76.83   linux-image-5.15.0-76-lowlatency  5.15.0-76.83   linux-image-5.15.0-76-lowlatency-64k  5.15.0-76.83   linux-image-aws-lts-22.04       5.15.0.1039.38   linux-image-azure               5.15.0.1041.37   linux-image-azure-lts-22.04     5.15.0.1041.37   linux-image-gcp-lts-22.04       5.15.0.1037.33   linux-image-generic             5.15.0.76.74   linux-image-generic-64k         5.15.0.76.74   linux-image-generic-lpae        5.15.0.76.74   linux-image-gke                 5.15.0.1037.36   linux-image-gke-5.15            5.15.0.1037.36   linux-image-gkeop               5.15.0.1023.22   linux-image-gkeop-5.15          5.15.0.1023.22   linux-image-ibm                 5.15.0.1033.29   linux-image-kvm                 5.15.0.1037.33   linux-image-lowlatency          5.15.0.76.81   linux-image-lowlatency-64k      5.15.0.76.81   linux-image-nvidia              5.15.0.1028.28   linux-image-nvidia-lowlatency   5.15.0.1028.28   linux-image-oracle              5.15.0.1038.33   linux-image-raspi               5.15.0.1033.30   linux-image-raspi-nolpae        5.15.0.1033.30   linux-image-virtual             5.15.0.76.74Ubuntu 20.04 LTS:   linux-image-5.15.0-1023-gkeop   5.15.0-1023.28~20.04.1   linux-image-5.15.0-1037-gcp     5.15.0-1037.45~20.04.1   linux-image-5.15.0-1037-gke     5.15.0-1037.42~20.04.1   linux-image-5.15.0-1038-oracle  5.15.0-1038.44~20.04.1   linux-image-5.15.0-1039-aws     5.15.0-1039.44~20.04.1   linux-image-5.15.0-1041-azure   5.15.0-1041.48~20.04.1   linux-image-5.15.0-1041-azure-fde  5.15.0-1041.48~20.04.1.1   linux-image-5.15.0-76-generic   5.15.0-76.83~20.04.1   linux-image-5.15.0-76-generic-64k  5.15.0-76.83~20.04.1   linux-image-5.15.0-76-generic-lpae  5.15.0-76.83~20.04.1   linux-image-5.15.0-76-lowlatency  5.15.0-76.83~20.04.1   linux-image-5.15.0-76-lowlatency-64k  5.15.0-76.83~20.04.1   linux-image-5.4.0-1052-ibm      5.4.0-1052.57   linux-image-5.4.0-1066-bluefield  5.4.0-1066.72   linux-image-5.4.0-1072-gkeop    5.4.0-1072.76   linux-image-5.4.0-1089-raspi    5.4.0-1089.100   linux-image-5.4.0-1094-kvm      5.4.0-1094.100   linux-image-5.4.0-1104-oracle   5.4.0-1104.113   linux-image-5.4.0-1105-aws      5.4.0-1105.113   linux-image-5.4.0-1108-gcp      5.4.0-1108.117   linux-image-5.4.0-1111-azure    5.4.0-1111.117   linux-image-5.4.0-153-generic   5.4.0-153.170   linux-image-5.4.0-153-generic-lpae  5.4.0-153.170   linux-image-5.4.0-153-lowlatency  5.4.0-153.170   linux-image-aws                 5.15.0.1039.44~20.04.28   linux-image-aws-lts-20.04       5.4.0.1105.102   linux-image-azure               5.15.0.1041.48~20.04.31   linux-image-azure-cvm           5.15.0.1041.48~20.04.31   linux-image-azure-fde           5.15.0.1041.48~20.04.1.20   linux-image-azure-lts-20.04     5.4.0.1111.104   linux-image-bluefield           5.4.0.1066.61   linux-image-gcp                 5.15.0.1037.45~20.04.1   linux-image-gcp-lts-20.04       5.4.0.1108.110   linux-image-generic             5.4.0.153.150   linux-image-generic-64k-hwe-20.04  5.15.0.76.83~20.04.37   linux-image-generic-hwe-20.04   5.15.0.76.83~20.04.37   linux-image-generic-lpae        5.4.0.153.150   linux-image-generic-lpae-hwe-20.04  5.15.0.76.83~20.04.37   linux-image-gke-5.15            5.15.0.1037.42~20.04.1   linux-image-gkeop               5.4.0.1072.70   linux-image-gkeop-5.15          5.15.0.1023.28~20.04.19   linux-image-gkeop-5.4           5.4.0.1072.70   linux-image-ibm                 5.4.0.1052.78   linux-image-ibm-lts-20.04       5.4.0.1052.78   linux-image-kvm                 5.4.0.1094.89   linux-image-lowlatency          5.4.0.153.150   linux-image-lowlatency-64k-hwe-20.04  5.15.0.76.83~20.04.34   linux-image-lowlatency-hwe-20.04  5.15.0.76.83~20.04.34   linux-image-oem                 5.4.0.153.150   linux-image-oem-20.04           5.15.0.76.83~20.04.37   linux-image-oem-20.04b          5.15.0.76.83~20.04.37   linux-image-oem-20.04c          5.15.0.76.83~20.04.37   linux-image-oem-20.04d          5.15.0.76.83~20.04.37   linux-image-oem-osp1            5.4.0.153.150   linux-image-oracle              5.15.0.1038.44~20.04.1   linux-image-oracle-lts-20.04    5.4.0.1104.97   linux-image-raspi               5.4.0.1089.119   linux-image-raspi-hwe-18.04     5.4.0.1089.119   linux-image-raspi2              5.4.0.1089.119   linux-image-raspi2-hwe-18.04    5.4.0.1089.119   linux-image-virtual             5.4.0.153.150   linux-image-virtual-hwe-20.04   5.15.0.76.83~20.04.37Ubuntu 18.04 LTS (Available with Ubuntu Pro):   linux-image-5.4.0-1052-ibm      5.4.0-1052.57~18.04.1   linux-image-5.4.0-1089-raspi    5.4.0-1089.100~18.04.1   linux-image-5.4.0-1104-oracle   5.4.0-1104.113~18.04.1   linux-image-5.4.0-1105-aws      5.4.0-1105.113~18.04.1   linux-image-5.4.0-1108-gcp      5.4.0-1108.117~18.04.1   linux-image-5.4.0-1111-azure    5.4.0-1111.117~18.04.1   linux-image-5.4.0-153-generic   5.4.0-153.170~18.04.1   linux-image-5.4.0-153-generic-lpae  5.4.0-153.170~18.04.1   linux-image-5.4.0-153-lowlatency  5.4.0-153.170~18.04.1   linux-image-aws                 5.4.0.1105.83   linux-image-azure               5.4.0.1111.84   linux-image-gcp                 5.4.0.1108.84   linux-image-generic-hwe-18.04   5.4.0.153.170~18.04.124   linux-image-generic-lpae-hwe-18.04  5.4.0.153.170~18.04.124   linux-image-ibm                 5.4.0.1052.63   linux-image-lowlatency-hwe-18.04  5.4.0.153.170~18.04.124   linux-image-oem                 5.4.0.153.170~18.04.124   linux-image-oem-osp1            5.4.0.153.170~18.04.124   linux-image-oracle              5.4.0.1104.113~18.04.76   linux-image-raspi-hwe-18.04     5.4.0.1089.86   linux-image-snapdragon-hwe-18.04  5.4.0.153.170~18.04.124   linux-image-virtual-hwe-18.04   5.4.0.153.170~18.04.124After a standard system update you need to reboot your computer to makeall the necessary changes.ATTENTION: Due to an unavoidable ABI change the kernel updates havebeen given a new version number, which requires you to recompile andreinstall all third party kernel modules you might have installed.Unless you manually uninstalled the standard kernel metapackages(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,linux-powerpc), a standard system upgrade will automatically performthis as well.References:   https://ubuntu.com/security/notices/USN-6193-1   https://launchpad.net/bugs/2023220   https://launchpad.net/bugs/2023577   CVE-2023-35788Package Information:   https://launchpad.net/ubuntu/+source/linux/6.2.0-24.24   https://launchpad.net/ubuntu/+source/linux-aws/6.2.0-1006.6   https://launchpad.net/ubuntu/+source/linux-kvm/6.2.0-1007.7   https://launchpad.net/ubuntu/+source/linux-lowlatency/6.2.0-1007.7   https://launchpad.net/ubuntu/+source/linux-raspi/6.2.0-1007.9   https://launchpad.net/ubuntu/+source/linux/5.15.0-76.83   https://launchpad.net/ubuntu/+source/linux-aws/5.15.0-1039.44   https://launchpad.net/ubuntu/+source/linux-azure/5.15.0-1041.48   https://launchpad.net/ubuntu/+source/linux-gcp/5.15.0-1037.45   https://launchpad.net/ubuntu/+source/linux-gke/5.15.0-1037.42   https://launchpad.net/ubuntu/+source/linux-gkeop/5.15.0-1023.28   https://launchpad.net/ubuntu/+source/linux-ibm/5.15.0-1033.36   https://launchpad.net/ubuntu/+source/linux-kvm/5.15.0-1037.42   https://launchpad.net/ubuntu/+source/linux-lowlatency/5.15.0-76.83   https://launchpad.net/ubuntu/+source/linux-nvidia/5.15.0-1028.28   https://launchpad.net/ubuntu/+source/linux-oracle/5.15.0-1038.44   https://launchpad.net/ubuntu/+source/linux-raspi/5.15.0-1033.36   https://launchpad.net/ubuntu/+source/linux/5.4.0-153.170   https://launchpad.net/ubuntu/+source/linux-aws/5.4.0-1105.113   https://launchpad.net/ubuntu/+source/linux-aws-5.15/5.15.0-1039.44~20.04.1   https://launchpad.net/ubuntu/+source/linux-azure/5.4.0-1111.117   https://launchpad.net/ubuntu/+source/linux-azure-5.15/5.15.0-1041.48~20.04.1 https://launchpad.net/ubuntu/+source/linux-azure-fde-5.15/5.15.0-1041.48~20.04.1.1   https://launchpad.net/ubuntu/+source/linux-bluefield/5.4.0-1066.72   https://launchpad.net/ubuntu/+source/linux-gcp/5.4.0-1108.117   https://launchpad.net/ubuntu/+source/linux-gcp-5.15/5.15.0-1037.45~20.04.1   https://launchpad.net/ubuntu/+source/linux-gke-5.15/5.15.0-1037.42~20.04.1   https://launchpad.net/ubuntu/+source/linux-gkeop/5.4.0-1072.76   https://launchpad.net/ubuntu/+source/linux-gkeop-5.15/5.15.0-1023.28~20.04.1   https://launchpad.net/ubuntu/+source/linux-hwe-5.15/5.15.0-76.83~20.04.1   https://launchpad.net/ubuntu/+source/linux-ibm/5.4.0-1052.57   https://launchpad.net/ubuntu/+source/linux-kvm/5.4.0-1094.100 https://launchpad.net/ubuntu/+source/linux-lowlatency-hwe-5.15/5.15.0-76.83~20.04.1   https://launchpad.net/ubuntu/+source/linux-oracle/5.4.0-1104.113 https://launchpad.net/ubuntu/+source/linux-oracle-5.15/5.15.0-1038.44~20.04.1   https://launchpad.net/ubuntu/+source/linux-raspi/5.4.0-1089.100

Related news

Red Hat Security Advisory 2023-5604-01

Red Hat Security Advisory 2023-5604-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include denial of service, out of bounds write, and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-5244-01

Red Hat Security Advisory 2023-5244-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include information leakage, out of bounds write, and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-5255-01

Red Hat Security Advisory 2023-5255-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine- tuning for systems with extremely high determinism requirements. Issues addressed include information leakage, out of bounds write, and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-4962-01

Red Hat Security Advisory 2023-4962-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include out of bounds access, out of bounds write, and use-after-free vulnerabilities.

RHSA-2023:4961: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1829: A use-after-free vulnerability was found in the traffic control index filter (tcindex) in the Linux kernel. The tcindex_delete does not properly deactivate filters, which ...

Red Hat Security Advisory 2023-4888-01

Red Hat Security Advisory 2023-4888-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include out of bounds write and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-4829-01

Red Hat Security Advisory 2023-4829-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include an out of bounds write vulnerability.

Red Hat Security Advisory 2023-4815-01

Red Hat Security Advisory 2023-4815-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include out of bounds access and out of bounds write vulnerabilities.

RHSA-2023:4834: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-35788: A flaw was found in the TC flower classifier (cls_flower) in the Networking subsystem of the Linux kernel. This issue occurs when sending two TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets with a total size of 252 bytes, which results in an out-of-bounds write when the third packet enters fl_set_geneve_opt, potentially leading to a denial of servic...

RHSA-2023:4821: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-20593: A flaw was found in hw, in “Zen 2” CPUs. This issue may allow an attacker to access sensitive information under specific microarchitectural circumstances. * CVE-2023-35788: A flaw was found in the TC flower classifier (cls_flower) in the Networking subsystem of the Linux kernel. This issue occurs when sending two TCA_FLOWER_KEY_ENC_OPTS_GENEVE...

Red Hat Security Advisory 2023-4698-01

Red Hat Security Advisory 2023-4698-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include an out of bounds write vulnerability.

RHSA-2023:4697: Red Hat Security Advisory: kernel security update

An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-35788: A flaw was found in the TC flower classifier (cls_flower) in the Networking subsystem of the Linux kernel. This issue occurs when sending two TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets with a total ...

Red Hat Security Advisory 2023-4664-01

Red Hat Security Advisory 2023-4664-01 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. This advisory contains OpenShift Virtualization 4.13.3 images. Issues addressed include a denial of service vulnerability.

RHSA-2023:4664: Red Hat Security Advisory: OpenShift Virtualization 4.13.3 Images security and bug fix update

Red Hat OpenShift Virtualization release 4.13.3 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of requests. * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Con...

Red Hat Security Advisory 2023-4456-01

Red Hat Security Advisory 2023-4456-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.13.8. Issues addressed include an add administrator vulnerability.

RHSA-2023:4515: Red Hat Security Advisory: kernel security update

An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1829: A use-after-free vulnerability was found in the traffic control index filter (tcindex) in the Linux kernel. The tcindex_delete does not properly deactivate filters, which can later lead to double freeing the structure. This flaw allows a local attacker to cause a use-after-free problem, leading to privilege esca...

RHSA-2023:4516: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch-4_18_0-147_78_1, kpatch-patch-4_18_0-147_80_1, kpatch-patch-4_18_0-147_81_1, kpatch-patch-4_18_0-147_83_1, and kpatch-patch-4_18_0-147_85_1 is now available for Red Hat Enterprise Linux 8.1. Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1829: A use-after-free vulnerability was found in the traffic control index filter (tcindex) in the Linux kernel. The tcindex_delete does not properly deactivate filters, w...

Red Hat Security Advisory 2023-4380-01

Red Hat Security Advisory 2023-4380-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include an out of bounds write vulnerability.

RHSA-2023:4380: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3090: A flaw was found in the IPVLAN network driver in the Linux kernel. This issue is caused by missing skb->cb initialization in `__ip_options_echo` and can lead to an out-of-bounds write stack overflow. This may allow a local user to cause a denial of service or potentially achieve local privilege escalation. * CVE-2023-35788: A flaw was found ...

Ubuntu Security Notice USN-6256-1

Ubuntu Security Notice 6256-1 - Jiasheng Jiang discovered that the HSA Linux kernel driver for AMD Radeon GPU devices did not properly validate memory allocation in certain situations, leading to a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service. Zheng Wang discovered that the Intel i915 graphics driver in the Linux kernel did not properly handle certain error conditions, leading to a double-free. A local attacker could possibly use this to cause a denial of service.

Ubuntu Security Notice USN-6234-1

Ubuntu Security Notice 6234-1 - Hangyu Hua discovered that the Flower classifier implementation in the Linux kernel contained an out-of-bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that for some Intel processors the INVLPG instruction implementation did not properly flush global TLB entries when PCIDs are enabled. An attacker could use this to expose sensitive information or possibly cause undesired behaviors.

Ubuntu Security Notice USN-6235-1

Ubuntu Security Notice 6235-1 - It was discovered that the NTFS file system implementation in the Linux kernel contained a null pointer dereference in some situations. A local attacker could use this to cause a denial of service. Jordy Zomer and Alexandra Sandulescu discovered that the Linux kernel did not properly implement speculative execution barriers in usercopy functions in certain situations. A local attacker could use this to expose sensitive information.

Ubuntu Security Notice USN-6223-1

Ubuntu Security Notice 6223-1 - It was discovered that the TUN/TAP driver in the Linux kernel did not properly initialize socket data. A local attacker could use this to cause a denial of service. It was discovered that the Real-Time Scheduling Class implementation in the Linux kernel contained a type confusion vulnerability in some situations. A local attacker could use this to cause a denial of service.

Ubuntu Security Notice USN-6220-1

Ubuntu Security Notice 6220-1 - Hangyu Hua discovered that the Flower classifier implementation in the Linux kernel contained an out-of-bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that for some Intel processors the INVLPG instruction implementation did not properly flush global TLB entries when PCIDs are enabled. An attacker could use this to expose sensitive information or possibly cause undesired behaviors.

Ubuntu Security Notice USN-6212-1

Ubuntu Security Notice 6212-1 - Hangyu Hua discovered that the Flower classifier implementation in the Linux kernel contained an out-of-bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that for some Intel processors the INVLPG instruction implementation did not properly flush global TLB entries when PCIDs are enabled. An attacker could use this to expose sensitive information or possibly cause undesired behaviors.

Ubuntu Security Notice USN-6206-1

Ubuntu Security Notice 6206-1 - Hangyu Hua discovered that the Flower classifier implementation in the Linux kernel contained an out-of-bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the NTFS file system implementation in the Linux kernel contained a null pointer dereference in some situations. A local attacker could use this to cause a denial of service.

Ubuntu Security Notice USN-6205-1

Ubuntu Security Notice 6205-1 - Hangyu Hua discovered that the Flower classifier implementation in the Linux kernel contained an out-of-bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that for some Intel processors the INVLPG instruction implementation did not properly flush global TLB entries when PCIDs are enabled. An attacker could use this to expose sensitive information or possibly cause undesired behaviors.

Debian Security Advisory 5448-1

Debian Linux Security Advisory 5448-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.

Ubuntu Security Notice USN-6194-1

Ubuntu Security Notice 6194-1 - Hangyu Hua discovered that the Flower classifier implementation in the Linux kernel contained an out-of-bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. Xingyuan Mo and Gengjia Chen discovered that the io_uring subsystem in the Linux kernel did not properly handle locking when IOPOLL mode is being used. A local attacker could use this to cause a denial of service.

Ubuntu Security Notice USN-6192-1

Ubuntu Security Notice 6192-1 - Hangyu Hua discovered that the Flower classifier implementation in the Linux kernel contained an out-of-bounds write vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. Xingyuan Mo and Gengjia Chen discovered that the io_uring subsystem in the Linux kernel did not properly handle locking when IOPOLL mode is being used. A local attacker could use this to cause a denial of service.

CVE-2023-35788: security - Linux kernel: off-by-one in fl_set_geneve_opt

An issue was discovered in fl_set_geneve_opt in net/sched/cls_flower.c in the Linux kernel before 6.3.7. It allows an out-of-bounds write in the flower classifier code via TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets. This may result in denial of service or privilege escalation.

Packet Storm: Latest News

Zeek 6.0.9