[Debian] High CVE: CVE-2023-2002/CVE-2023-21255/CVE-2023-2269/CVE-2023-31084/CVE-2023-3268/CVE-2023-3389/CVE-2023-34319/CVE-2023-4194/CVE-2023-4147/CVE-2023-4273/CVE-2022-40982/CVE-2023-4128/CVE-2023-40283/CVE-2023-1206/CVE-2023-0160 kernel: multiple CVEs
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
StarlingX |
Fix Released
|
High
|
Peng Zhang |
Bug Description
CVE-2023-20569: https:/
A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-
CVE-2023-20588: https:/
A division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality.
CVE-2023-35829: https:/
An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in rkvdec_remove in drivers/
CVE-2023-35828: https:/
An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in renesas_usb3_remove in drivers/
CVE-2023-35824: https:/
An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in dm1105_remove in drivers/
CVE-2023-35823: https:/
An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in saa7134_finidev in drivers/
CVE-2023-2163: https:/
bpf: Fix incorrect verifier pruning due to missing register precision taints
CVE-2023-34256: https:/
DISPUTED ** An issue was discovered in the Linux kernel before 6.3.3. There is an out-of-bounds read in crc16 in lib/crc16.c when called from fs/ext4/super.c because ext4_group_
CVE-2022-39189: https:/
An issue was discovered the x86 KVM subsystem in the Linux kernel before 5.18.17. Unprivileged guest users can compromise the guest kernel because TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED situations.
CVE-2022-4269: https:/
A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action "mirred") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of service condition.
CVE-2023-1380: https:/
A slab-out-of-bound read problem was found in brcmf_get_assoc_ies in drivers/
CVE-2023-2002: https:/
A vulnerability was found in the HCI sockets implementation due to a missing capability check in net/bluetooth/
CVE-2023-21255: https:/
In multiple functions of binder.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2023-2269: https:/
A denial of service problem was found, due to a possible recursive locking scenario, resulting in a deadlock in table_clear in drivers/
CVE-2023-31084: https:/
An issue was discovered in drivers/
CVE-2023-3268: https:/
An out of bounds (OOB) memory access flaw was found in the Linux kernel in relay_file_
CVE-2023-3389: https:/
A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation. Racing a io_uring cancel poll request with a linked timeout can cause a UAF in a hrtimer. We recommend upgrading past commit ef7dfac51d8ed96
CVE-2023-34319: https:/
linux: xen/netback: Fix buffer overrun triggered by unusual packet
CVE-2023-4194: https:/
A flaw was found in the Linux kernel's TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized access to some resources. The original patches fixing CVE-2023-1076 are incorrect or incomplete. The problem is that the following upstream commits - a096ccca6e50 ("tun: tun_chr_open(): correctly initialize socket uid"), - 66b2c338adce ("tap: tap_open(): correctly initialize socket uid"), pass "inode->i_uid" to sock_init_
CVE-2023-4147: https:/
A use-after-free flaw was found in the Linux kernel’s Netfilter functionality when adding a rule with NFTA_RULE_CHAIN_ID. This flaw allows a local user to crash or escalate their privileges on the system.
CVE-2023-4273: https:/
A flaw was found in the exFAT driver of the Linux kernel. The vulnerability exists in the implementation of the file name reconstruction function, which is responsible for reading file name entries from a directory index and merging file name parts belonging to one file into a single long file name. Since the file name characters are copied into a stack variable, a local privileged attacker could use this flaw to overflow the kernel stack.
CVE-2022-40982: https:/
Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
CVE-2023-4128: https:/
A use-after-free flaw was found in net/sched/cls_fw.c in classifiers (cls_fw, cls_u32, and cls_route) in the Linux Kernel. This flaw allows a local attacker to perform a local privilege escalation due to incorrect handling of the existing filter, leading to a kernel information leak issue.
CVE-2023-40283: https:/
An issue was discovered in l2cap_sock_release in net/bluetooth/
CVE-2023-1206: https:/
A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel’s IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%.
CVE-2023-0160: https:/
A deadlock flaw was found in the Linux kernel’s BPF subsystem. This flaw allows a local user to potentially crash the system.
Base Score: High
Reference:
Upgrade Yocto Linux_5.10.190
CVE References
- 2022-39189
- 2022-40982
- 2022-4269
- 2022-45886
- 2022-45887
- 2022-45919
- 2023-0160
- 2023-1206
- 2023-1380
- 2023-2002
- 2023-20588
- 2023-21255
- 2023-21400
- 2023-2163
- 2023-2269
- 2023-31084
- 2023-3268
- 2023-3389
- 2023-34256
- 2023-34319
- 2023-35823
- 2023-35824
- 2023-35828
- 2023-35829
- 2023-3772
- 2023-3773
- 2023-3777
- 2023-4015
- 2023-40283
- 2023-4128
- 2023-4147
- 2023-4194
- 2023-4206
- 2023-4207
- 2023-4208
- 2023-4273
summary: |
[Debian] High CVE: CVE-2023-2002/CVE-2023-21255/CVE-2023-2269/CVE-2023-31084/CVE-2023-3268/CVE-2023-3389/CVE-2023-34319/CVE-2023-4194/CVE-2023-4147/CVE-2023-4273/CVE-2022-40982/CVE-2023-4128/CVE-2023-40283/CVE-2023-1206/CVE-2023-0160 - kernel + kernel: multiple CVEs |
tags: | added: stx.9.0 stx.security |
Changed in starlingx: | |
assignee: | nobody → Peng Zhang (pzhang2) |
Fix proposed to branch: master /review. opendev. org/c/starlingx /kernel/ +/895943
Review: https:/