Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.12.2023.6285.1
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-6285-1)
Summary:The remote host is missing an update for the 'linux-oem-6.1' package(s) announced via the USN-6285-1 advisory.
Description:Summary:
The remote host is missing an update for the 'linux-oem-6.1' package(s) announced via the USN-6285-1 advisory.

Vulnerability Insight:
It was discovered that the NTFS file system implementation in the Linux
kernel did not properly check buffer indexes in certain situations, leading
to an out-of-bounds read vulnerability. A local attacker could possibly use
this to expose sensitive information (kernel memory). (CVE-2022-48502)

Stonejiajia, Shir Tamari and Sagi Tzadik discovered that the OverlayFS
implementation in the Ubuntu Linux kernel did not properly perform
permission checks in certain situations. A local attacker could possibly
use this to gain elevated privileges. (CVE-2023-2640)

It was discovered that a race condition existed in the f2fs file system in
the Linux kernel, leading to a null pointer dereference vulnerability. An
attacker could use this to construct a malicious f2fs image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2023-2898)

Mingi Cho discovered that the netfilter subsystem in the Linux kernel did
not properly validate the status of a nft chain while performing a lookup
by id, leading to a use-after-free vulnerability. An attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-31248)

Shir Tamari and Sagi Tzadik discovered that the OverlayFS implementation in
the Ubuntu Linux kernel did not properly perform permission checks in
certain situations. A local attacker could possibly use this to gain
elevated privileges. (CVE-2023-32629)

It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle some error conditions, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3390)

Tanguy Dubroca discovered that the netfilter subsystem in the Linux kernel
did not properly handle certain pointer data type, leading to an out-of-
bounds write vulnerability. A privileged attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-35001)

It was discovered that the universal 32bit network packet classifier
implementation in the Linux kernel did not properly perform reference
counting in some situations, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-3609)

It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle certain error conditions, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3610)

It was discovered that the Quick Fair Queueing network scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'linux-oem-6.1' package(s) on Ubuntu 22.04.

Solution:
Please install the updated package(s).

CVSS Score:
9.4

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:N/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2022-48502
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0e8235d28f3a0e9eda9f02ff67ee566d5f42b66b
https://syzkaller.appspot.com/bug?extid=8778f030156c6cd16d72
Common Vulnerability Exposure (CVE) ID: CVE-2023-2640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2640
https://lists.ubuntu.com/archives/kernel-team/2023-July/140923.html
https://ubuntu.com/security/notices/USN-6250-1
https://wiz.io/blog/ubuntu-overlayfs-vulnerability
Common Vulnerability Exposure (CVE) ID: CVE-2023-2898
Debian Security Information: DSA-5480 (Google Search)
https://www.debian.org/security/2023/dsa-5480
Debian Security Information: DSA-5492 (Google Search)
https://www.debian.org/security/2023/dsa-5492
https://lore.kernel.org/linux-f2fs-devel/20230522124203.3838360-1-chao@kernel.org/
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
Common Vulnerability Exposure (CVE) ID: CVE-2023-31248
Debian Security Information: DSA-5453 (Google Search)
https://www.debian.org/security/2023/dsa-5453
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGZC5XOANA75OJ4XARBBXYSLDKUIJI5E/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPHI46ROSSLVAV4R5LJWJYU747JGOS6D/
http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html
http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html
https://lore.kernel.org/netfilter-devel/20230705121627.GC19489@breakpoint.cc/T/
https://www.openwall.com/lists/oss-security/2023/07/05/2
https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html
http://www.openwall.com/lists/oss-security/2023/07/05/2
Common Vulnerability Exposure (CVE) ID: CVE-2023-32629
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32629
https://lists.ubuntu.com/archives/kernel-team/2023-July/140920.html
Common Vulnerability Exposure (CVE) ID: CVE-2023-3390
Debian Security Information: DSA-5448 (Google Search)
https://www.debian.org/security/2023/dsa-5448
Debian Security Information: DSA-5461 (Google Search)
https://www.debian.org/security/2023/dsa-5461
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=1240eb93f0616b21c675416516ff3d74798fdc97
https://kernel.dance/1240eb93f0616b21c675416516ff3d74798fdc97
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
Common Vulnerability Exposure (CVE) ID: CVE-2023-35001
https://lore.kernel.org/netfilter-devel/20230705121515.747251-1-cascardo@canonical.com/T/
https://www.openwall.com/lists/oss-security/2023/07/05/3
http://www.openwall.com/lists/oss-security/2023/07/05/3
Common Vulnerability Exposure (CVE) ID: CVE-2023-3609
http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=04c55383fa5689357bcdd2c8036725a55ed632bc
https://kernel.dance/04c55383fa5689357bcdd2c8036725a55ed632bc
Common Vulnerability Exposure (CVE) ID: CVE-2023-3610
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=4bedf9eee016286c835e3d8fa981ddece5338795
https://kernel.dance/4bedf9eee016286c835e3d8fa981ddece5338795
Common Vulnerability Exposure (CVE) ID: CVE-2023-3611
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e337087c3b5805fe0b8a46ba622a962880b5d64
https://kernel.dance/3e337087c3b5805fe0b8a46ba622a962880b5d64
Common Vulnerability Exposure (CVE) ID: CVE-2023-3776
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=0323bce598eea038714f941ce2b22541c46d488f
https://kernel.dance/0323bce598eea038714f941ce2b22541c46d488f
Common Vulnerability Exposure (CVE) ID: CVE-2023-38430
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.9
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/smb/server?id=1c1bcf2d3ea061613119b534f57507c377df20f9
Common Vulnerability Exposure (CVE) ID: CVE-2023-38432
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.10
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/smb/server?id=2b9b8f3b68edb3d67d79962f02e26dbb5ae3808d
Common Vulnerability Exposure (CVE) ID: CVE-2023-3863
RHBZ#2225126
https://bugzilla.redhat.com/show_bug.cgi?id=2225126
https://access.redhat.com/security/cve/CVE-2023-3863
https://github.com/torvalds/linux/commit/6709d4b7bc2e079241fdef15d1160581c5261c10
CopyrightCopyright (C) 2023 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.