[Debian] High CVE: CVE-2023-42755/CVE-2023-42752/CVE-2023-4622/CVE-2023-37453/CVE-2023-42753/CVE-2023-4623/CVE-2023-4921 kernel: multiple CVEs
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
StarlingX |
Triaged
|
High
|
Unassigned |
Bug Description
CVE-2023-45871: https:/
An issue was discovered in drivers/
CVE-2023-5197: https:/
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. Addition and removal of rules from chain bindings within the same transaction causes leads to use-after-free. We recommend upgrading past commit f15f29fd4779be8
CVE-2023-39194: https:/
A flaw was found in the XFRM subsystem in the Linux kernel. The specific flaw exists within the processing of state filters, which can result in a read past the end of an allocated buffer. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, potentially leading to an information disclosure.
CVE-2023-39192: https:/
A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundaries, leading to a crash or information disclosure.
CVE-2023-39193: https:/
A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.
CVE-2023-42756: https:/
A flaw was found in the Netfilter subsystem of the Linux kernel. A race condition between IPSET_CMD_ADD and IPSET_CMD_SWAP can lead to a kernel panic due to the invocation of `__ip_set_put` on a wrong `set`. This issue may allow a local user to crash the system.
CVE-2023-42754: https:/
A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_
CVE-2023-39189: https:/
A flaw was found in the Netfilter subsystem in the Linux kernel. The nfnl_osf_
CVE-2023-31084: https:/
An issue was discovered in drivers/
CVE-2023-3389: https:/
A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation. Racing a io_uring cancel poll request with a linked timeout can cause a UAF in a hrtimer. We recommend upgrading past commit ef7dfac51d8ed96
CVE-2022-45884: https:/
An issue was discovered in the Linux kernel through 6.0.9. drivers/
CVE-2023-42755: https:/
A flaw was found in the IPv4 Resource Reservation Protocol (RSVP) classifier in the Linux kernel. The xprt pointer may go beyond the linear part of the skb, leading to an out-of-bounds read in the `rsvp_classify` function. This issue may allow a local user to crash the system and cause a denial of service.
CVE-2023-42752: https:/
CVE-2023-4622: https:/
A use-after-free vulnerability in the Linux kernel's af_unix component can be exploited to achieve local privilege escalation. The unix_stream_
CVE-2023-37453: https:/
An issue was discovered in the USB subsystem in the Linux kernel through 6.4.2. There is an out-of-bounds and crash in read_descriptors in drivers/
CVE-2023-42753: https:/
An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h->nets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.
CVE-2023-4623: https:/
A use-after-free vulnerability in the Linux kernel's net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation.
If a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free.
We recommend upgrading past commit b3d26c5702c7d6c
CVE-2023-4921: https:/
A use-after-free vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation.
When the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue().
We recommend upgrading past commit 8fc134fee27f226
Base Score: High
Reference:
Upgrade Yocto Linux_5.10.198
summary: |
[Debian] High CVE: - CVE-2023-4622/CVE-2023-37453/CVE-2023-42753/CVE-2023-4623/CVE-2023-4921 + CVE-2023-42752/CVE-2023-4622/CVE-2023-37453/CVE-2023-42753/CVE-2023-4623/CVE-2023-4921 kernel: multiple CVEs |
description: | updated |
summary: |
[Debian] High CVE: - CVE-2023-42752/CVE-2023-4622/CVE-2023-37453/CVE-2023-42753/CVE-2023-4623/CVE-2023-4921 + CVE-2023-42755/CVE-2023-42752/CVE-2023-4622/CVE-2023-37453/CVE-2023-42753/CVE-2023-4623/CVE-2023-4921 kernel: multiple CVEs |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |