{"id":"USN-6024-1","summary":"linux, linux-aws, linux-azure, linux-gcp, linux-hwe-5.19, linux-kvm, linux-lowlatency, linux-oracle, linux-raspi vulnerabilities","details":"It was discovered that the Traffic-Control Index (TCINDEX) implementation\nin the Linux kernel contained a use-after-free vulnerability. A local\nattacker could use this to cause a denial of service (system crash) or\npossibly execute arbitrary code. (CVE-2023-1281)\n\nLin Ma discovered a race condition in the io_uring subsystem in the Linux\nkernel, leading to a null pointer dereference vulnerability. A local\nattacker could use this to cause a denial of service (system crash).\n(CVE-2023-0468)\n\nIt was discovered that a use-after-free vulnerability existed in the SGI\nGRU driver in the Linux kernel. A local attacker could possibly use this to\ncause a denial of service (system crash) or possibly execute arbitrary\ncode. (CVE-2022-3424)\n\nHyunwoo Kim discovered that the DVB Core driver in the Linux kernel did not\nproperly perform reference counting in some situations, leading to a use-\nafter-free vulnerability. A local attacker could use this to cause a denial\nof service (system crash) or possibly execute arbitrary code.\n(CVE-2022-41218)\n\nIt was discovered that the network queuing discipline implementation in the\nLinux kernel contained a null pointer dereference in some situations. A\nlocal attacker could use this to cause a denial of service (system crash).\n(CVE-2022-47929)\n\nThadeu Cascardo discovered that the io_uring subsystem contained a double-\nfree vulnerability in certain memory allocation error conditions. A local\nattacker could possibly use this to cause a denial of service (system\ncrash). (CVE-2023-1032)\n\nIt was discovered that the module decompression implementation in the Linux\nkernel did not properly handle return values in certain error conditions. A\nlocal attacker could use this to cause a denial of service (system crash).\n(CVE-2023-22997)\n\nLianhui Tang discovered that the MPLS implementation in the Linux kernel\ndid not properly handle certain sysctl allocation failure conditions,\nleading to a double-free vulnerability. An attacker could use this to cause\na denial of service or possibly execute arbitrary code. (CVE-2023-26545)\n\nIt was discovered that the NTFS file system implementation in the Linux\nkernel did not properly handle a loop termination condition, leading to an\nout-of-bounds read vulnerability. A local attacker could use this to cause\na denial of service (system crash) or possibly expose sensitive\ninformation. (CVE-2023-26606)\n\nWei Chen discovered that the DVB USB AZ6027 driver in the Linux kernel\ncontained a null pointer dereference when handling certain messages from\nuser space. A local attacker could use this to cause a denial of service\n(system crash). (CVE-2023-28328)\n\n","modified":"2026-02-10T04:43:04Z","published":"2023-04-19T01:17:25Z","related":["UBUNTU-CVE-2022-3424","UBUNTU-CVE-2022-41218","UBUNTU-CVE-2022-47929","UBUNTU-CVE-2023-0468","UBUNTU-CVE-2023-1032","UBUNTU-CVE-2023-1281","UBUNTU-CVE-2023-22997","UBUNTU-CVE-2023-26545","UBUNTU-CVE-2023-26606","UBUNTU-CVE-2023-28328"],"upstream":["CVE-2022-3424","CVE-2022-41218","CVE-2022-47929","CVE-2023-0468","CVE-2023-1032","CVE-2023-1281","CVE-2023-22997","CVE-2023-26545","CVE-2023-26606","CVE-2023-28328","UBUNTU-CVE-2022-3424","UBUNTU-CVE-2022-41218","UBUNTU-CVE-2022-47929","UBUNTU-CVE-2023-0468","UBUNTU-CVE-2023-1032","UBUNTU-CVE-2023-1281","UBUNTU-CVE-2023-22997","UBUNTU-CVE-2023-26545","UBUNTU-CVE-2023-26606","UBUNTU-CVE-2023-28328"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6024-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-3424"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-41218"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-47929"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-0468"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-1032"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-1281"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-22997"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-26545"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-26606"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-28328"}],"affected":[{"package":{"name":"linux-hwe-5.19","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/linux-hwe-5.19@5.19.0-40.41~22.04.1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.19.0-40.41~22.04.1"}]}],"versions":["5.19.0-28.29~22.04.1","5.19.0-32.33~22.04.1","5.19.0-35.36~22.04.1","5.19.0-38.39~22.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"linux-buildinfo-5.19.0-40-generic","binary_version":"5.19.0-40.41~22.04.1"},{"binary_name":"linux-buildinfo-5.19.0-40-generic-64k","binary_version":"5.19.0-40.41~22.04.1"},{"binary_name":"linux-buildinfo-5.19.0-40-generic-lpae","binary_version":"5.19.0-40.41~22.04.1"},{"binary_name":"linux-cloud-tools-5.19.0-40-generic","binary_version":"5.19.0-40.41~22.04.1"},{"binary_name":"linux-headers-5.19.0-40-generic","binary_version":"5.19.0-40.41~22.04.1"},{"binary_name":"linux-headers-5.19.0-40-generic-64k","binary_version":"5.19.0-40.41~22.04.1"},{"binary_name":"linux-headers-5.19.0-40-generic-lpae","binary_version":"5.19.0-40.41~22.04.1"},{"binary_name":"linux-hwe-5.19-cloud-tools-5.19.0-40","binary_version":"5.19.0-40.41~22.04.1"},{"binary_name":"linux-hwe-5.19-cloud-tools-common","binary_version":"5.19.0-40.41~22.04.1"},{"binary_name":"linux-hwe-5.19-headers-5.19.0-40","binary_version":"5.19.0-40.41~22.04.1"},{"binary_name":"linux-hwe-5.19-tools-5.19.0-40","binary_version":"5.19.0-40.41~22.04.1"},{"binary_name":"linux-hwe-5.19-tools-common","binary_version":"5.19.0-40.41~22.04.1"},{"binary_name":"linux-hwe-5.19-tools-host","binary_version":"5.19.0-40.41~22.04.1"},{"binary_name":"linux-image-5.19.0-40-generic","binary_version":"5.19.0-40.41~22.04.1"},{"binary_name":"linux-image-5.19.0-40-generic-lpae","binary_version":"5.19.0-40.41~22.04.1"},{"binary_name":"linux-image-unsigned-5.19.0-40-generic","binary_version":"5.19.0-40.41~22.04.1"},{"binary_name":"linux-image-unsigned-5.19.0-40-generic-64k","binary_version":"5.19.0-40.41~22.04.1"},{"binary_name":"linux-modules-5.19.0-40-generic","binary_version":"5.19.0-40.41~22.04.1"},{"binary_name":"linux-modules-5.19.0-40-generic-64k","binary_version":"5.19.0-40.41~22.04.1"},{"binary_name":"linux-modules-5.19.0-40-generic-lpae","binary_version":"5.19.0-40.41~22.04.1"},{"binary_name":"linux-modules-extra-5.19.0-40-generic","binary_version":"5.19.0-40.41~22.04.1"},{"binary_name":"linux-modules-ipu6-5.19.0-40-generic","binary_version":"5.19.0-40.41~22.04.1"},{"binary_name":"linux-modules-ivsc-5.19.0-40-generic","binary_version":"5.19.0-40.41~22.04.1"},{"binary_name":"linux-modules-iwlwifi-5.19.0-40-generic","binary_version":"5.19.0-40.41~22.04.1"},{"binary_name":"linux-source-5.19.0","binary_version":"5.19.0-40.41~22.04.1"},{"binary_name":"linux-tools-5.19.0-40-generic","binary_version":"5.19.0-40.41~22.04.1"},{"binary_name":"linux-tools-5.19.0-40-generic-64k","binary_version":"5.19.0-40.41~22.04.1"},{"binary_name":"linux-tools-5.19.0-40-generic-lpae","binary_version":"5.19.0-40.41~22.04.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6024-1.json","cves_map":{"ecosystem":"Ubuntu:22.04:LTS","cves":[{"id":"CVE-2022-3424","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-41218","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2022-47929","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2023-0468","severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2023-1032","severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2023-1281","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2023-22997","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2023-26545","severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2023-26606","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2023-28328","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}]}}}],"schema_version":"1.7.3"}