USN-6247-1: Linux kernel (OEM) vulnerabilities
25 July 2023
Several security issues were fixed in the Linux kernel.
Releases
Packages
- linux-oem-5.17 - Linux kernel for OEM systems
Details
David Leadbeater discovered that the netfilter IRC protocol tracking
implementation in the Linux Kernel incorrectly handled certain message
payloads in some situations. A remote attacker could possibly use this to
cause a denial of service or bypass firewall filtering. (CVE-2022-2663)
It was discovered that the IDT 77252 ATM PCI device driver in the Linux
kernel did not properly remove any pending timers during device exit,
resulting in a use-after-free vulnerability. A local attacker could
possibly use this to cause a denial of service (system crash) or execute
arbitrary code. (CVE-2022-3635)
It was discovered that the network queuing discipline implementation in the
Linux kernel contained a null pointer dereference in some situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2022-47929)
Lucas Leong discovered that the IPv6 SR implementation in the Linux kernel
did not properly validate SEG6 configuration attributes, leading to an out-
of-bounds read vulnerability. A privileged attacker could use this to
expose sensitive information (kernel memory). (CVE-2023-2860)
Mingi Cho discovered that the netfilter subsystem in the Linux kernel did
not properly validate the status of a nft chain while performing a lookup
by id, leading to a use-after-free vulnerability. An attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-31248)
Tanguy Dubroca discovered that the netfilter subsystem in the Linux kernel
did not properly handle certain pointer data type, leading to an out-of-
bounds write vulnerability. A privileged attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-35001)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 22.04
-
linux-image-5.17.0-1035-oem
-
5.17.0-1035.36
-
linux-image-oem-22.04
-
5.17.0.1035.33
-
linux-image-oem-22.04a
-
5.17.0.1035.33
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
Related notices
- USN-5792-1
- USN-5793-1
- USN-5792-2
- USN-5793-2
- USN-5793-3
- USN-5793-4
- USN-5854-1
- USN-5861-1
- USN-5862-1
- USN-5865-1
- USN-5877-1
- USN-5883-1
- USN-5924-1
- USN-5975-1
- USN-5791-1
- USN-5791-2
- USN-5791-3
- USN-5815-1
- USN-6001-1
- USN-6007-1
- USN-6013-1
- USN-6014-1
- USN-5727-1
- USN-5728-1
- USN-5729-1
- USN-5727-2
- USN-5728-2
- USN-5729-2
- USN-5728-3
- USN-5758-1
- USN-5774-1
- USN-5915-1
- USN-5917-1
- USN-5927-1
- USN-5934-1
- USN-5939-1
- USN-5940-1
- USN-5951-1
- USN-5981-1
- USN-5984-1
- USN-5991-1
- USN-6000-1
- USN-6009-1
- USN-6024-1
- USN-6025-1
- USN-6030-1
- USN-6040-1
- USN-6057-1
- USN-6134-1
- USN-6248-1
- LSN-0096-1
- USN-6246-1
- USN-6250-1
- USN-6251-1
- USN-6252-1
- USN-6254-1
- USN-6255-1
- USN-6260-1
- USN-6261-1
- USN-6285-1
- LSN-0097-1
- USN-6460-1