{"id":"USN-6256-1","summary":"linux-iot vulnerabilities","details":"Jiasheng Jiang discovered that the HSA Linux kernel driver for AMD Radeon\nGPU devices did not properly validate memory allocation in certain\nsituations, leading to a null pointer dereference vulnerability. A local\nattacker could use this to cause a denial of service (system crash).\n(CVE-2022-3108)\n\nZheng Wang discovered that the Intel i915 graphics driver in the Linux\nkernel did not properly handle certain error conditions, leading to a\ndouble-free. A local attacker could possibly use this to cause a denial of\nservice (system crash). (CVE-2022-3707)\n\nIt was discovered that the infrared transceiver USB driver did not properly\nhandle USB control messages. A local attacker with physical access could\nplug in a specially crafted USB device to cause a denial of service (memory\nexhaustion). (CVE-2022-3903)\n\nHaowei Yan discovered that a race condition existed in the Layer 2\nTunneling Protocol (L2TP) implementation in the Linux kernel. A local\nattacker could possibly use this to cause a denial of service (system\ncrash). (CVE-2022-4129)\n\nJordy Zomer and Alexandra Sandulescu discovered that syscalls invoking the\ndo_prlimit() function in the Linux kernel did not properly handle\nspeculative execution barriers. A local attacker could use this to expose\nsensitive information (kernel memory). (CVE-2023-0458)\n\nJordy Zomer and Alexandra Sandulescu discovered that the Linux kernel did\nnot properly implement speculative execution barriers in usercopy functions\nin certain situations. A local attacker could use this to expose sensitive\ninformation (kernel memory). (CVE-2023-0459)\n\nIt was discovered that the Human Interface Device (HID) support driver in\nthe Linux kernel contained a type confusion vulnerability in some\nsituations. A local attacker could use this to cause a denial of service\n(system crash). (CVE-2023-1073)\n\nIt was discovered that a memory leak existed in the SCTP protocol\nimplementation in the Linux kernel. A local attacker could use this to\ncause a denial of service (memory exhaustion). (CVE-2023-1074)\n\nIt was discovered that the TLS subsystem in the Linux kernel contained a\ntype confusion vulnerability in some situations. A local attacker could use\nthis to cause a denial of service (system crash) or possibly expose\nsensitive information. (CVE-2023-1075)\n\nIt was discovered that the TUN/TAP driver in the Linux kernel did not\nproperly initialize socket data. A local attacker could use this to cause a\ndenial of service (system crash). (CVE-2023-1076)\n\nIt was discovered that the Real-Time Scheduling Class implementation in the\nLinux kernel contained a type confusion vulnerability in some situations. A\nlocal attacker could use this to cause a denial of service (system crash).\n(CVE-2023-1077)\n\nIt was discovered that the Reliable Datagram Sockets (RDS) protocol\nimplementation in the Linux kernel contained a type confusion vulnerability\nin some situations. An attacker could use this to cause a denial of service\n(system crash). (CVE-2023-1078)\n\nIt was discovered that the ASUS HID driver in the Linux kernel did not\nproperly handle device removal, leading to a use-after-free vulnerability.\nA local attacker with physical access could plug in a specially crafted USB\ndevice to cause a denial of service (system crash). (CVE-2023-1079)\n\nDuoming Zhou discovered that a race condition existed in the infrared\nreceiver/transceiver driver in the Linux kernel, leading to a use-after-\nfree vulnerability. A privileged attacker could use this to cause a denial\nof service (system crash) or possibly execute arbitrary code.\n(CVE-2023-1118)\n\nIt was discovered that the Traffic-Control Index (TCINDEX) implementation\nin the Linux kernel contained a use-after-free vulnerability. A local\nattacker could use this to cause a denial of service (system crash) or\npossibly execute arbitrary code. (CVE-2023-1281)\n\nIt was discovered that the Broadcom FullMAC USB WiFi driver in the Linux\nkernel did not properly perform data buffer size validation in some\nsituations. A physically proximate attacker could use this to craft a\nmalicious USB device that when inserted, could cause a denial of service\n(system crash) or possibly expose sensitive information. (CVE-2023-1380)\n\nXingyuan Mo discovered that the x86 KVM implementation in the Linux kernel\ndid not properly initialize some data structures. A local attacker could\nuse this to expose sensitive information (kernel memory). (CVE-2023-1513)\n\nIt was discovered that the Xircom PCMCIA network device driver in the Linux\nkernel did not properly handle device removal events. A physically\nproximate attacker could use this to cause a denial of service (system\ncrash). (CVE-2023-1670)\n\nIt was discovered that the Traffic-Control Index (TCINDEX) implementation\nin the Linux kernel did not properly perform filter deactivation in some\nsituations. A local attacker could possibly use this to gain elevated\nprivileges. Please note that with the fix for this CVE, kernel support for\nthe TCINDEX classifier has been removed. (CVE-2023-1829)\n\nIt was discovered that a race condition existed in the Xen transport layer\nimplementation for the 9P file system protocol in the Linux kernel, leading\nto a use-after-free vulnerability. A local attacker could use this to cause\na denial of service (guest crash) or expose sensitive information (guest\nkernel memory). (CVE-2023-1859)\n\nJose Oliveira and Rodrigo Branco discovered that the Spectre Variant 2\nmitigations with prctl syscall were insufficient in some situations. A\nlocal attacker could possibly use this to expose sensitive information.\n(CVE-2023-1998)\n\nIt was discovered that a use-after-free vulnerability existed in the iSCSI\nTCP implementation in the Linux kernel. A local attacker could possibly use\nthis to cause a denial of service (system crash). (CVE-2023-2162)\n\nIt was discovered that the BigBen Interactive Kids' gamepad driver in the\nLinux kernel did not properly handle device removal, leading to a use-\nafter-free vulnerability. A local attacker with physical access could plug\nin a specially crafted USB device to cause a denial of service (system\ncrash). (CVE-2023-25012)\n\nJean-Baptiste Cayrou discovered that the shiftfs file system in the Ubuntu\nLinux kernel contained a race condition when handling inode locking in some\nsituations. A local attacker could use this to cause a denial of service\n(kernel deadlock). (CVE-2023-2612)\n\nLianhui Tang discovered that the MPLS implementation in the Linux kernel\ndid not properly handle certain sysctl allocation failure conditions,\nleading to a double-free vulnerability. An attacker could use this to cause\na denial of service or possibly execute arbitrary code. (CVE-2023-26545)\n\nIt was discovered that a use-after-free vulnerability existed in the HFS+\nfile system implementation in the Linux kernel. A local attacker could\npossibly use this to cause a denial of service (system crash).\n(CVE-2023-2985)\n\nReima Ishii discovered that the nested KVM implementation for Intel x86\nprocessors in the Linux kernel did not properly validate control registers\nin certain situations. An attacker in a guest VM could use this to cause a\ndenial of service (guest crash). (CVE-2023-30456)\n\nGwangun Jung discovered that the Quick Fair Queueing scheduler\nimplementation in the Linux kernel contained an out-of-bounds write\nvulnerability. A local attacker could use this to cause a denial of service\n(system crash) or possibly execute arbitrary code. (CVE-2023-31436)\n\nSanan Hasanov discovered that the framebuffer console driver in the Linux\nkernel did not properly perform checks for font dimension limits. A local\nattacker could use this to cause a denial of service (system crash).\n(CVE-2023-3161)\n\nPatryk Sondej and Piotr Krysiuk discovered that a race condition existed in\nthe netfilter subsystem of the Linux kernel when processing batch requests,\nleading to a use-after-free vulnerability. A local attacker could use this\nto cause a denial of service (system crash) or possibly execute arbitrary\ncode. (CVE-2023-32233)\n\nIt was discovered that the NET/ROM protocol implementation in the Linux\nkernel contained a race condition in some situations, leading to a use-\nafter-free vulnerability. A local attacker could use this to cause a denial\nof service (system crash) or possibly execute arbitrary code.\n(CVE-2023-32269)\n\nHangyu Hua discovered that the Flower classifier implementation in the\nLinux kernel contained an out-of-bounds write vulnerability. An attacker\ncould use this to cause a denial of service (system crash) or possibly\nexecute arbitrary code. (CVE-2023-35788, LP: #2023577)\n\nIt was discovered that for some Intel processors the INVLPG instruction\nimplementation did not properly flush global TLB entries when PCIDs are\nenabled. An attacker could use this to expose sensitive information\n(kernel memory) or possibly cause undesired behaviors. (LP: #2023220)\n\n","modified":"2026-01-30T02:01:41.358133Z","published":"2023-07-27T12:26:27Z","related":["UBUNTU-CVE-2022-3108","UBUNTU-CVE-2022-3707","UBUNTU-CVE-2022-3903","UBUNTU-CVE-2022-4129","UBUNTU-CVE-2023-0458","UBUNTU-CVE-2023-0459","UBUNTU-CVE-2023-1073","UBUNTU-CVE-2023-1074","UBUNTU-CVE-2023-1075","UBUNTU-CVE-2023-1076","UBUNTU-CVE-2023-1077","UBUNTU-CVE-2023-1078","UBUNTU-CVE-2023-1079","UBUNTU-CVE-2023-1118","UBUNTU-CVE-2023-1281","UBUNTU-CVE-2023-1380","UBUNTU-CVE-2023-1513","UBUNTU-CVE-2023-1670","UBUNTU-CVE-2023-1829","UBUNTU-CVE-2023-1859","UBUNTU-CVE-2023-1998","UBUNTU-CVE-2023-2162","UBUNTU-CVE-2023-25012","UBUNTU-CVE-2023-2612","UBUNTU-CVE-2023-26545","UBUNTU-CVE-2023-2985","UBUNTU-CVE-2023-30456","UBUNTU-CVE-2023-31436","UBUNTU-CVE-2023-3161","UBUNTU-CVE-2023-32233","UBUNTU-CVE-2023-32269","UBUNTU-CVE-2023-35788"],"upstream":["CVE-2022-3108","CVE-2022-3707","CVE-2022-3903","CVE-2022-4129","CVE-2023-0458","CVE-2023-0459","CVE-2023-1073","CVE-2023-1074","CVE-2023-1075","CVE-2023-1076","CVE-2023-1077","CVE-2023-1078","CVE-2023-1079","CVE-2023-1118","CVE-2023-1281","CVE-2023-1380","CVE-2023-1513","CVE-2023-1670","CVE-2023-1829","CVE-2023-1859","CVE-2023-1998","CVE-2023-2162","CVE-2023-25012","CVE-2023-2612","CVE-2023-26545","CVE-2023-2985","CVE-2023-30456","CVE-2023-31436","CVE-2023-3161","CVE-2023-32233","CVE-2023-32269","CVE-2023-35788","UBUNTU-CVE-2022-3108","UBUNTU-CVE-2022-3707","UBUNTU-CVE-2022-3903","UBUNTU-CVE-2022-4129","UBUNTU-CVE-2023-0458","UBUNTU-CVE-2023-0459","UBUNTU-CVE-2023-1073","UBUNTU-CVE-2023-1074","UBUNTU-CVE-2023-1075","UBUNTU-CVE-2023-1076","UBUNTU-CVE-2023-1077","UBUNTU-CVE-2023-1078","UBUNTU-CVE-2023-1079","UBUNTU-CVE-2023-1118","UBUNTU-CVE-2023-1281","UBUNTU-CVE-2023-1380","UBUNTU-CVE-2023-1513","UBUNTU-CVE-2023-1670","UBUNTU-CVE-2023-1829","UBUNTU-CVE-2023-1859","UBUNTU-CVE-2023-1998","UBUNTU-CVE-2023-2162","UBUNTU-CVE-2023-25012","UBUNTU-CVE-2023-2612","UBUNTU-CVE-2023-26545","UBUNTU-CVE-2023-2985","UBUNTU-CVE-2023-30456","UBUNTU-CVE-2023-31436","UBUNTU-CVE-2023-3161","UBUNTU-CVE-2023-32233","UBUNTU-CVE-2023-32269","UBUNTU-CVE-2023-35788"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6256-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-3108"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-3707"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-3903"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-4129"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-0458"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-0459"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-1073"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-1074"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-1075"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-1076"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-1077"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-1078"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-1079"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-1118"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-1281"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-1380"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-1513"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-1670"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-1829"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-1859"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-1998"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-2162"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-2612"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-2985"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-3161"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-25012"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-26545"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-30456"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-31436"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-32233"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-32269"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-35788"},{"type":"REPORT","url":"https://launchpad.net/bugs/2023220"},{"type":"REPORT","url":"https://launchpad.net/bugs/2023577"}],"affected":[{"package":{"name":"linux-iot","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/linux-iot@5.4.0-1017.18?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.4.0-1017.18"}]}],"versions":["5.4.0-1001.3","5.4.0-1004.6","5.4.0-1005.7","5.4.0-1006.8","5.4.0-1009.11","5.4.0-1010.12","5.4.0-1011.13","5.4.0-1012.14","5.4.0-1013.15","5.4.0-1014.16"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"5.4.0-1017.18","binary_name":"linux-buildinfo-5.4.0-1017-iot"},{"binary_version":"5.4.0-1017.18","binary_name":"linux-headers-5.4.0-1017-iot"},{"binary_version":"5.4.0-1017.18","binary_name":"linux-image-5.4.0-1017-iot"},{"binary_version":"5.4.0-1017.18","binary_name":"linux-image-unsigned-5.4.0-1017-iot"},{"binary_version":"5.4.0-1017.18","binary_name":"linux-iot-headers-5.4.0-1017"},{"binary_version":"5.4.0-1017.18","binary_name":"linux-iot-tools-5.4.0-1017"},{"binary_version":"5.4.0-1017.18","binary_name":"linux-iot-tools-common"},{"binary_version":"5.4.0-1017.18","binary_name":"linux-modules-5.4.0-1017-iot"},{"binary_version":"5.4.0-1017.18","binary_name":"linux-tools-5.4.0-1017-iot"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6256-1.json","cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-3108"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-3707"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2022-3903"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-4129"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-0458"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-0459"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-1073"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-1074"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-1075"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-1076"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-1077"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-1078"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2023-1079"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"negligible"}],"id":"CVE-2023-1118"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2023-1281"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2023-1380"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2023-1513"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2023-1670"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2023-1829"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-1859"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-1998"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-2162"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-2612"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-2985"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-3161"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2023-25012"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-26545"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2023-30456"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2023-31436"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2023-32233"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-32269"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2023-35788"}]}}}],"schema_version":"1.7.3"}