Packages
- linux - Linux kernel
- linux-aws - Linux kernel for Amazon Web Services (AWS) systems
- linux-laptop - Linux kernel for Lenovo X13s ARM laptops
- linux-lowlatency - Linux low latency kernel
- linux-oem-6.5 - Linux kernel for OEM systems
- linux-oracle - Linux kernel for Oracle Cloud systems
- linux-raspi - Linux kernel for Raspberry Pi systems
- linux-starfive - Linux kernel for StarFive processors
Details
Yu Hao discovered that the UBI driver in the Linux kernel did not properly
check for MTD with zero erasesize during device attachment. A local
privileged attacker could use this to cause a denial of service (system
crash). (CVE-2023-31085)
Bien Pham discovered that the netfiler subsystem in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local user could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-4244)
Maxim Levitsky discovered that the KVM nested virtualization (SVM)
implementation for AMD processors in the Linux kernel did not properly
handle x2AVIC MSRs. An attacker in a guest VM could use this to cause a
denial of service (host kernel crash). (CVE-2023-5090)
It was discovered that the SMB network file sharing...
Yu Hao discovered that the UBI driver in the Linux kernel did not properly
check for MTD with zero erasesize during device attachment. A local
privileged attacker could use this to cause a denial of service (system
crash). (CVE-2023-31085)
Bien Pham discovered that the netfiler subsystem in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local user could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-4244)
Maxim Levitsky discovered that the KVM nested virtualization (SVM)
implementation for AMD processors in the Linux kernel did not properly
handle x2AVIC MSRs. An attacker in a guest VM could use this to cause a
denial of service (host kernel crash). (CVE-2023-5090)
It was discovered that the SMB network file sharing protocol implementation
in the Linux kernel did not properly handle certain error conditions,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-5345)
Murray McAllister discovered that the VMware Virtual GPU DRM driver in the
Linux kernel did not properly handle memory objects when storing surfaces,
leading to a use-after-free vulnerability. A local attacker in a guest VM
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-5633)
Update instructions
After a standard system update you need to reboot your computer to make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.
References
Related notices
- USN-6716-1
- USN-6688-1
- USN-6681-1
- USN-6681-2
- USN-6681-3
- USN-6681-4
- USN-6607-1
- USN-6572-1
- USN-6537-1
- USN-6532-1
- USN-6716-1
- USN-6688-1
- USN-6681-1
- USN-6681-2
- USN-6681-3
- USN-6681-4
- USN-6607-1
- USN-6572-1
- USN-6537-1
- USN-6532-1
- USN-6520-1
- USN-6516-1
- USN-6502-1
- USN-6502-2
- USN-6502-3
- USN-6502-4
- USN-6497-1
- USN-6496-1
- USN-6496-2
- USN-6495-1
- USN-6495-2
- USN-6494-1
- USN-6494-2
- USN-6466-1
- USN-6461-1
- USN-6446-1
- USN-6446-2
- USN-6446-3
- USN-6445-1
- USN-6445-2
- USN-6444-1
- USN-6444-2
- LSN-0100-1
Have additional questions?