{"id":"USN-6223-1","summary":"linux-azure-fde vulnerabilities","details":"It was discovered that the TUN/TAP driver in the Linux kernel did not\nproperly initialize socket data. A local attacker could use this to cause a\ndenial of service (system crash). (CVE-2023-1076)\n\nIt was discovered that the Real-Time Scheduling Class implementation in the\nLinux kernel contained a type confusion vulnerability in some situations. A\nlocal attacker could use this to cause a denial of service (system crash).\n(CVE-2023-1077)\n\nIt was discovered that the ASUS HID driver in the Linux kernel did not\nproperly handle device removal, leading to a use-after-free vulnerability.\nA local attacker with physical access could plug in a specially crafted USB\ndevice to cause a denial of service (system crash). (CVE-2023-1079)\n\nIt was discovered that the Xircom PCMCIA network device driver in the Linux\nkernel did not properly handle device removal events. A physically\nproximate attacker could use this to cause a denial of service (system\ncrash). (CVE-2023-1670)\n\nIt was discovered that a race condition existed in the Xen transport layer\nimplementation for the 9P file system protocol in the Linux kernel, leading\nto a use-after-free vulnerability. A local attacker could use this to cause\na denial of service (guest crash) or expose sensitive information (guest\nkernel memory). (CVE-2023-1859)\n\nJose Oliveira and Rodrigo Branco discovered that the Spectre Variant 2\nmitigations with prctl syscall were insufficient in some situations. A\nlocal attacker could possibly use this to expose sensitive information.\n(CVE-2023-1998)\n\nIt was discovered that the BigBen Interactive Kids' gamepad driver in the\nLinux kernel did not properly handle device removal, leading to a use-\nafter-free vulnerability. A local attacker with physical access could plug\nin a specially crafted USB device to cause a denial of service (system\ncrash). (CVE-2023-25012)\n\nIt was discovered that a use-after-free vulnerability existed in the HFS+\nfile system implementation in the Linux kernel. A local attacker could\npossibly use this to cause a denial of service (system crash).\n(CVE-2023-2985)\n\nHangyu Hua discovered that the Flower classifier implementation in the\nLinux kernel contained an out-of-bounds write vulnerability. An attacker\ncould use this to cause a denial of service (system crash) or possibly\nexecute arbitrary code. (CVE-2023-35788, LP: #2023577)\n\nIt was discovered that for some Intel processors the INVLPG instruction\nimplementation did not properly flush global TLB entries when PCIDs are\nenabled. An attacker could use this to expose sensitive information\n(kernel memory) or possibly cause undesired behaviors. (LP: #2023220)\n","modified":"2026-04-27T16:31:47.830322Z","published":"2023-07-12T19:31:57Z","related":["UBUNTU-CVE-2023-1076","UBUNTU-CVE-2023-1077","UBUNTU-CVE-2023-1079","UBUNTU-CVE-2023-1670","UBUNTU-CVE-2023-1859","UBUNTU-CVE-2023-1998","UBUNTU-CVE-2023-25012","UBUNTU-CVE-2023-2985","UBUNTU-CVE-2023-35788"],"upstream":["CVE-2023-1076","CVE-2023-1077","CVE-2023-1079","CVE-2023-1670","CVE-2023-1859","CVE-2023-1998","CVE-2023-25012","CVE-2023-2985","CVE-2023-35788","UBUNTU-CVE-2023-1076","UBUNTU-CVE-2023-1077","UBUNTU-CVE-2023-1079","UBUNTU-CVE-2023-1670","UBUNTU-CVE-2023-1859","UBUNTU-CVE-2023-1998","UBUNTU-CVE-2023-25012","UBUNTU-CVE-2023-2985","UBUNTU-CVE-2023-35788"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6223-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-1076"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-1077"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-1079"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-1670"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-1859"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-1998"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-2985"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-25012"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-35788"},{"type":"REPORT","url":"https://launchpad.net/bugs/2023220"},{"type":"REPORT","url":"https://launchpad.net/bugs/2023577"}],"affected":[{"package":{"name":"linux-azure-fde","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/linux-azure-fde@5.15.0-1041.48.1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.15.0-1041.48.1"}]}],"versions":["5.15.0-1019.24.1","5.15.0-1024.30.1","5.15.0-1029.36.1","5.15.0-1030.37.1","5.15.0-1031.38.1","5.15.0-1033.40.1","5.15.0-1034.41.1","5.15.0-1035.42.1","5.15.0-1036.43.1","5.15.0-1037.44.1","5.15.0-1038.45.1","5.15.0-1039.46.1"],"ecosystem_specific":{"binaries":[{"binary_version":"5.15.0-1041.48.1","binary_name":"linux-image-unsigned-5.15.0-1041-azure-fde"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:22.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-1076"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-1077"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2023-1079"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2023-1670"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-1859"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-1998"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-2985"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2023-25012"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2023-35788"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6223-1.json"}}],"schema_version":"1.7.5"}