{"id":"USN-6150-1","summary":"linux-intel-iotg, linux-raspi vulnerabilities","details":"Patryk Sondej and Piotr Krysiuk discovered that a race condition existed in\nthe netfilter subsystem of the Linux kernel when processing batch requests,\nleading to a use-after-free vulnerability. A local attacker could use this\nto cause a denial of service (system crash) or possibly execute arbitrary\ncode. (CVE-2023-32233)\n\nGwangun Jung discovered that the Quick Fair Queueing scheduler\nimplementation in the Linux kernel contained an out-of-bounds write\nvulnerability. A local attacker could use this to cause a denial of service\n(system crash) or possibly execute arbitrary code. (CVE-2023-31436)\n\nReima Ishii discovered that the nested KVM implementation for Intel x86\nprocessors in the Linux kernel did not properly validate control registers\nin certain situations. An attacker in a guest VM could use this to cause a\ndenial of service (guest crash). (CVE-2023-30456)\n\nIt was discovered that the Broadcom FullMAC USB WiFi driver in the Linux\nkernel did not properly perform data buffer size validation in some\nsituations. A physically proximate attacker could use this to craft a\nmalicious USB device that when inserted, could cause a denial of service\n(system crash) or possibly expose sensitive information. (CVE-2023-1380)\n\nJean-Baptiste Cayrou discovered that the shiftfs file system in the Ubuntu\nLinux kernel contained a race condition when handling inode locking in some\nsituations. A local attacker could use this to cause a denial of service\n(kernel deadlock). (CVE-2023-2612)\n\n","modified":"2026-02-10T04:43:09Z","published":"2023-06-08T21:55:46Z","related":["UBUNTU-CVE-2023-1380","UBUNTU-CVE-2023-2612","UBUNTU-CVE-2023-30456","UBUNTU-CVE-2023-31436","UBUNTU-CVE-2023-32233"],"upstream":["CVE-2023-1380","CVE-2023-2612","CVE-2023-30456","CVE-2023-31436","CVE-2023-32233","UBUNTU-CVE-2023-1380","UBUNTU-CVE-2023-2612","UBUNTU-CVE-2023-30456","UBUNTU-CVE-2023-31436","UBUNTU-CVE-2023-32233"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6150-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-1380"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-2612"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-30456"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-31436"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-32233"}],"affected":[{"package":{"name":"linux-raspi","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/linux-raspi@5.4.0-1086.97?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.4.0-1086.97"}]}],"versions":["5.4.0-1007.7","5.4.0-1008.8","5.4.0-1011.11","5.4.0-1012.12","5.4.0-1013.13","5.4.0-1015.15","5.4.0-1016.17","5.4.0-1018.20","5.4.0-1019.21","5.4.0-1021.24","5.4.0-1022.25","5.4.0-1023.26","5.4.0-1025.28","5.4.0-1026.29","5.4.0-1028.31","5.4.0-1029.32","5.4.0-1030.33","5.4.0-1032.35","5.4.0-1033.36","5.4.0-1034.37","5.4.0-1035.38","5.4.0-1036.39","5.4.0-1038.41","5.4.0-1041.45","5.4.0-1042.46","5.4.0-1043.47","5.4.0-1044.48","5.4.0-1045.49","5.4.0-1046.50","5.4.0-1047.52","5.4.0-1048.53","5.4.0-1050.56","5.4.0-1052.58","5.4.0-1053.60","5.4.0-1055.62","5.4.0-1056.63","5.4.0-1058.65","5.4.0-1059.67","5.4.0-1060.68","5.4.0-1062.70","5.4.0-1065.75","5.4.0-1066.76","5.4.0-1068.78","5.4.0-1069.79","5.4.0-1070.80","5.4.0-1071.81","5.4.0-1073.84","5.4.0-1074.85","5.4.0-1077.88","5.4.0-1078.89","5.4.0-1079.90","5.4.0-1080.91","5.4.0-1081.92","5.4.0-1082.93","5.4.0-1083.94","5.4.0-1084.95","5.4.0-1085.96"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"linux-buildinfo-5.4.0-1086-raspi","binary_version":"5.4.0-1086.97"},{"binary_name":"linux-headers-5.4.0-1086-raspi","binary_version":"5.4.0-1086.97"},{"binary_name":"linux-image-5.4.0-1086-raspi","binary_version":"5.4.0-1086.97"},{"binary_name":"linux-modules-5.4.0-1086-raspi","binary_version":"5.4.0-1086.97"},{"binary_name":"linux-raspi-headers-5.4.0-1086","binary_version":"5.4.0-1086.97"},{"binary_name":"linux-raspi-tools-5.4.0-1086","binary_version":"5.4.0-1086.97"},{"binary_name":"linux-tools-5.4.0-1086-raspi","binary_version":"5.4.0-1086.97"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6150-1.json","cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"id":"CVE-2023-1380","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2023-2612","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2023-30456","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2023-31436","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2023-32233","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]}]}}},{"package":{"name":"linux-intel-iotg","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/linux-intel-iotg@5.15.0-1031.36?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.15.0-1031.36"}]}],"versions":["5.15.0-1004.6","5.15.0-1008.11","5.15.0-1010.14","5.15.0-1013.17","5.15.0-1015.20","5.15.0-1016.21","5.15.0-1017.22","5.15.0-1018.23","5.15.0-1021.26","5.15.0-1023.28","5.15.0-1025.30","5.15.0-1026.31","5.15.0-1027.32","5.15.0-1028.33","5.15.0-1030.35"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"linux-buildinfo-5.15.0-1031-intel-iotg","binary_version":"5.15.0-1031.36"},{"binary_name":"linux-cloud-tools-5.15.0-1031-intel-iotg","binary_version":"5.15.0-1031.36"},{"binary_name":"linux-headers-5.15.0-1031-intel-iotg","binary_version":"5.15.0-1031.36"},{"binary_name":"linux-image-unsigned-5.15.0-1031-intel-iotg","binary_version":"5.15.0-1031.36"},{"binary_name":"linux-intel-iotg-cloud-tools-5.15.0-1031","binary_version":"5.15.0-1031.36"},{"binary_name":"linux-intel-iotg-cloud-tools-common","binary_version":"5.15.0-1031.36"},{"binary_name":"linux-intel-iotg-headers-5.15.0-1031","binary_version":"5.15.0-1031.36"},{"binary_name":"linux-intel-iotg-tools-5.15.0-1031","binary_version":"5.15.0-1031.36"},{"binary_name":"linux-intel-iotg-tools-common","binary_version":"5.15.0-1031.36"},{"binary_name":"linux-intel-iotg-tools-host","binary_version":"5.15.0-1031.36"},{"binary_name":"linux-modules-5.15.0-1031-intel-iotg","binary_version":"5.15.0-1031.36"},{"binary_name":"linux-modules-extra-5.15.0-1031-intel-iotg","binary_version":"5.15.0-1031.36"},{"binary_name":"linux-modules-iwlwifi-5.15.0-1031-intel-iotg","binary_version":"5.15.0-1031.36"},{"binary_name":"linux-tools-5.15.0-1031-intel-iotg","binary_version":"5.15.0-1031.36"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6150-1.json","cves_map":{"ecosystem":"Ubuntu:22.04:LTS","cves":[{"id":"CVE-2023-1380","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2023-2612","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2023-30456","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2023-31436","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2023-32233","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]}]}}},{"package":{"name":"linux-raspi","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/linux-raspi@5.15.0-1030.32?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.15.0-1030.32"}]}],"versions":["5.13.0-1008.9","5.15.0-1002.2","5.15.0-1003.3","5.15.0-1004.4","5.15.0-1005.5","5.15.0-1006.6","5.15.0-1008.8","5.15.0-1011.13","5.15.0-1012.14","5.15.0-1013.15","5.15.0-1014.16","5.15.0-1015.17","5.15.0-1016.18","5.15.0-1017.19","5.15.0-1018.20","5.15.0-1021.23","5.15.0-1022.24","5.15.0-1023.25","5.15.0-1024.26","5.15.0-1025.27","5.15.0-1026.28","5.15.0-1027.29","5.15.0-1028.30","5.15.0-1029.31"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"linux-buildinfo-5.15.0-1030-raspi","binary_version":"5.15.0-1030.32"},{"binary_name":"linux-buildinfo-5.15.0-1030-raspi-nolpae","binary_version":"5.15.0-1030.32"},{"binary_name":"linux-headers-5.15.0-1030-raspi","binary_version":"5.15.0-1030.32"},{"binary_name":"linux-headers-5.15.0-1030-raspi-nolpae","binary_version":"5.15.0-1030.32"},{"binary_name":"linux-image-5.15.0-1030-raspi","binary_version":"5.15.0-1030.32"},{"binary_name":"linux-image-5.15.0-1030-raspi-nolpae","binary_version":"5.15.0-1030.32"},{"binary_name":"linux-modules-5.15.0-1030-raspi","binary_version":"5.15.0-1030.32"},{"binary_name":"linux-modules-5.15.0-1030-raspi-nolpae","binary_version":"5.15.0-1030.32"},{"binary_name":"linux-modules-extra-5.15.0-1030-raspi","binary_version":"5.15.0-1030.32"},{"binary_name":"linux-modules-extra-5.15.0-1030-raspi-nolpae","binary_version":"5.15.0-1030.32"},{"binary_name":"linux-raspi-headers-5.15.0-1030","binary_version":"5.15.0-1030.32"},{"binary_name":"linux-raspi-tools-5.15.0-1030","binary_version":"5.15.0-1030.32"},{"binary_name":"linux-tools-5.15.0-1030-raspi","binary_version":"5.15.0-1030.32"},{"binary_name":"linux-tools-5.15.0-1030-raspi-nolpae","binary_version":"5.15.0-1030.32"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6150-1.json","cves_map":{"ecosystem":"Ubuntu:22.04:LTS","cves":[{"id":"CVE-2023-1380","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2023-2612","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2023-30456","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2023-31436","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2023-32233","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]}]}}}],"schema_version":"1.7.3"}