Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.12.2023.6079.1
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-6079-1)
Summary:The remote host is missing an update for the 'linux, linux-aws, linux-azure, linux-azure-5.19, linux-kvm, linux-lowlatency, linux-raspi' package(s) announced via the USN-6079-1 advisory.
Description:Summary:
The remote host is missing an update for the 'linux, linux-aws, linux-azure, linux-azure-5.19, linux-kvm, linux-lowlatency, linux-raspi' package(s) announced via the USN-6079-1 advisory.

Vulnerability Insight:
It was discovered that some AMD x86-64 processors with SMT enabled could
speculatively execute instructions using a return address from a sibling
thread. A local attacker could possibly use this to expose sensitive
information. (CVE-2022-27672)

Ziming Zhang discovered that the VMware Virtual GPU DRM driver in the Linux
kernel contained an out-of-bounds write vulnerability. A local attacker
could use this to cause a denial of service (system crash).
(CVE-2022-36280)

Zheng Wang discovered that the Intel i915 graphics driver in the Linux
kernel did not properly handle certain error conditions, leading to a
double-free. A local attacker could possibly use this to cause a denial of
service (system crash). (CVE-2022-3707)

Haowei Yan discovered that a race condition existed in the Layer 2
Tunneling Protocol (L2TP) implementation in the Linux kernel. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2022-4129)

It was discovered that the NTFS file system implementation in the Linux
kernel contained a null pointer dereference in some situations. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2022-4842)

It was discovered that the NTFS file system implementation in the Linux
kernel did not properly validate attributes in certain situations, leading
to an out-of-bounds write vulnerability. A local attacker could use this to
cause a denial of service (system crash). (CVE-2022-48423)

It was discovered that the NTFS file system implementation in the Linux
kernel did not properly validate attributes in certain situations, leading
to an out-of-bounds read vulnerability. A local attacker could possibly use
this to expose sensitive information (kernel memory). (CVE-2022-48424)

It was discovered that the KSMBD implementation in the Linux kernel did not
properly validate buffer lengths, leading to a heap-based buffer overflow.
A remote attacker could possibly use this to cause a denial of service
(system crash). (CVE-2023-0210)

Kyle Zeng discovered that the IPv6 implementation in the Linux kernel
contained a NULL pointer dereference vulnerability in certain situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2023-0394)

Jordy Zomer and Alexandra Sandulescu discovered that syscalls invoking the
do_prlimit() function in the Linux kernel did not properly handle
speculative execution barriers. A local attacker could use this to expose
sensitive information (kernel memory). (CVE-2023-0458)

Jordy Zomer and Alexandra Sandulescu discovered that the Linux kernel did
not properly implement speculative execution barriers in usercopy functions
in certain situations. A local attacker could use this to expose sensitive
information (kernel memory). (CVE-2023-0459)

It was discovered that the Human Interface Device (HID) support driver in
the Linux kernel contained a type confusion ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'linux, linux-aws, linux-azure, linux-azure-5.19, linux-kvm, linux-lowlatency, linux-raspi' package(s) on Ubuntu 22.04, Ubuntu 22.10.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:L/AC:L/Au:S/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2022-27672
https://security.gentoo.org/glsa/202402-07
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1045
Common Vulnerability Exposure (CVE) ID: CVE-2022-36280
Debian Security Information: DSA-5324 (Google Search)
https://www.debian.org/security/2023/dsa-5324
https://bugzilla.openanolis.cn/show_bug.cgi?id=2071
https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
Common Vulnerability Exposure (CVE) ID: CVE-2022-3707
https://bugzilla.redhat.com/show_bug.cgi?id=2137979
https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz@163.com/
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
Common Vulnerability Exposure (CVE) ID: CVE-2022-4129
FEDORA-2022-24041b1667
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOKXNIM2R4FQCDRQV67UMAY6EBC72QFG/
FEDORA-2022-b36cd53dca
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7X5SPXMXXFANDASPCKER2JIQO2F3UHCP/
FEDORA-2022-e4460c41bc
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AM5KFIE6JNZXHBA5A2KYDZAT3MEX2B67/
https://lore.kernel.org/all/20221114191619.124659-1-jakub%40cloudflare.com/t
https://lore.kernel.org/netdev/20221121085426.21315-1-jakub%40cloudflare.com/t
Common Vulnerability Exposure (CVE) ID: CVE-2022-4842
https://lore.kernel.org/ntfs3/784f82c4-de71-b8c3-afd6-468869a369af@paragon-software.com/T/#t
Common Vulnerability Exposure (CVE) ID: CVE-2022-48423
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.3
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=54e45702b648b7c0000e90b3e9b890e367e16ea8
Common Vulnerability Exposure (CVE) ID: CVE-2022-48424
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4f1dc7d9756e66f3f876839ea174df2e656b7f79
Common Vulnerability Exposure (CVE) ID: CVE-2023-0210
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=797805d81baa814f76cf7bdab35f86408a79d707
https://github.com/cifsd-team/ksmbd/commit/8824b7af409f51f1316e92e9887c2fd48c0b26d6
https://www.openwall.com/lists/oss-security/2023/01/04/1
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit
https://securityonline.info/cve-2023-0210-flaw-in-linux-kernel-allows-unauthenticated-remote-dos-attacks/
https://www.openwall.com/lists/oss-security/2023/01/11/1
Common Vulnerability Exposure (CVE) ID: CVE-2023-0394
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cb3e9864cdbe35ff6378966660edbcbac955fe17
Common Vulnerability Exposure (CVE) ID: CVE-2023-0458
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/diff/kernel/sys.c?id=v6.1.8&id2=v6.1.7
https://github.com/torvalds/linux/commit/739790605705ddcf18f21782b9c99ad7d53a8c11
Common Vulnerability Exposure (CVE) ID: CVE-2023-0459
https://github.com/torvalds/linux/commit/4b842e4e25b12951fa10dedb4bc16bc47e3b850c
https://github.com/torvalds/linux/commit/74e19ef0ff8061ef55957c3abd71614ef0f42f47
Common Vulnerability Exposure (CVE) ID: CVE-2023-1073
https://bugzilla.redhat.com/show_bug.cgi?id=2173403
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/id=b12fece4c64857e5fab4290bf01b2e0317a88456
https://www.openwall.com/lists/osssecurity/2023/01/17/3
http://www.openwall.com/lists/oss-security/2023/11/05/3
http://www.openwall.com/lists/oss-security/2023/11/05/2
Common Vulnerability Exposure (CVE) ID: CVE-2023-1074
https://bugzilla.redhat.com/show_bug.cgi?id=2173430
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=458e279f861d3f61796894cd158b780765a1569f
https://www.openwall.com/lists/oss-security/2023/01/23/1
http://www.openwall.com/lists/oss-security/2023/11/05/4
Common Vulnerability Exposure (CVE) ID: CVE-2023-1075
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=ffe2a22562444720b05bdfeb999c03e810d84cbb
Common Vulnerability Exposure (CVE) ID: CVE-2023-1078
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=f753a68980cf4b59a80fe677619da2b1804f526d
http://www.openwall.com/lists/oss-security/2023/11/05/1
Common Vulnerability Exposure (CVE) ID: CVE-2023-1118
https://github.com/torvalds/linux/commit/29b0589a865b6f66d141d79b2dd1373e4e50fe17
Common Vulnerability Exposure (CVE) ID: CVE-2023-1513
https://bugzilla.redhat.com/show_bug.cgi?id=2179892
https://github.com/torvalds/linux/commit/2c10b61421a28e95a46ab489fd56c0f442ff6952
https://lore.kernel.org/kvm/20230214103304.3689213-1-gregkh@linuxfoundation.org/
Common Vulnerability Exposure (CVE) ID: CVE-2023-1652
https://access.redhat.com/security/cve/cve-2023-1652
Common Vulnerability Exposure (CVE) ID: CVE-2023-21102
https://source.android.com/security/bulletin/2023-05-01
Common Vulnerability Exposure (CVE) ID: CVE-2023-21106
Common Vulnerability Exposure (CVE) ID: CVE-2023-2162
https://www.spinics.net/lists/linux-scsi/msg181542.html
Common Vulnerability Exposure (CVE) ID: CVE-2023-23454
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=caa4b35b4317d5147b3ab0fbdc9c075c7d2e9c12
https://www.openwall.com/lists/oss-security/2023/01/10/1
https://www.openwall.com/lists/oss-security/2023/01/10/4
Common Vulnerability Exposure (CVE) ID: CVE-2023-23455
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2965c7be0522eaa18808684b7b82b248515511b
Common Vulnerability Exposure (CVE) ID: CVE-2023-26544
https://bugzilla.suse.com/show_bug.cgi?id=1208697
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=887bfc546097fbe8071dac13b2fef73b77920899
https://lkml.org/lkml/2023/2/20/128
Common Vulnerability Exposure (CVE) ID: CVE-2023-32269
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.11
https://github.com/torvalds/linux/commit/611792920925fb088ddccbe2783c7f92fdfb6b64
CopyrightCopyright (C) 2023 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.