{"id":"USN-6043-1","summary":"linux, linux-aws, linux-azure, linux-gcp, linux-hwe-5.19, linux-ibm, linux-kvm, linux-lowlatency, linux-oracle, linux-raspi vulnerabilities","details":"It was discovered that the Traffic-Control Index (TCINDEX) implementation\nin the Linux kernel did not properly perform filter deactivation in some\nsituations. A local attacker could possibly use this to gain elevated\nprivileges. Please note that with the fix for this CVE, kernel support for\nthe TCINDEX classifier has been removed. (CVE-2023-1829)\n\nIt was discovered that the OverlayFS implementation in the Linux kernel did\nnot properly handle copy up operation in some conditions. A local attacker\ncould possibly use this to gain elevated privileges. (CVE-2023-0386)\n\n","modified":"2026-02-10T04:43:06Z","published":"2023-04-26T13:39:51Z","related":["UBUNTU-CVE-2023-0386","UBUNTU-CVE-2023-1829"],"upstream":["CVE-2023-0386","CVE-2023-1829","UBUNTU-CVE-2023-0386","UBUNTU-CVE-2023-1829"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6043-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-0386"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-1829"}],"affected":[{"package":{"name":"linux-hwe-5.19","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/linux-hwe-5.19@5.19.0-41.42~22.04.1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.19.0-41.42~22.04.1"}]}],"versions":["5.19.0-28.29~22.04.1","5.19.0-32.33~22.04.1","5.19.0-35.36~22.04.1","5.19.0-38.39~22.04.1","5.19.0-40.41~22.04.1"],"ecosystem_specific":{"binaries":[{"binary_name":"linux-buildinfo-5.19.0-41-generic","binary_version":"5.19.0-41.42~22.04.1"},{"binary_name":"linux-buildinfo-5.19.0-41-generic-64k","binary_version":"5.19.0-41.42~22.04.1"},{"binary_name":"linux-buildinfo-5.19.0-41-generic-lpae","binary_version":"5.19.0-41.42~22.04.1"},{"binary_name":"linux-cloud-tools-5.19.0-41-generic","binary_version":"5.19.0-41.42~22.04.1"},{"binary_name":"linux-headers-5.19.0-41-generic","binary_version":"5.19.0-41.42~22.04.1"},{"binary_name":"linux-headers-5.19.0-41-generic-64k","binary_version":"5.19.0-41.42~22.04.1"},{"binary_name":"linux-headers-5.19.0-41-generic-lpae","binary_version":"5.19.0-41.42~22.04.1"},{"binary_name":"linux-hwe-5.19-cloud-tools-5.19.0-41","binary_version":"5.19.0-41.42~22.04.1"},{"binary_name":"linux-hwe-5.19-cloud-tools-common","binary_version":"5.19.0-41.42~22.04.1"},{"binary_name":"linux-hwe-5.19-headers-5.19.0-41","binary_version":"5.19.0-41.42~22.04.1"},{"binary_name":"linux-hwe-5.19-tools-5.19.0-41","binary_version":"5.19.0-41.42~22.04.1"},{"binary_name":"linux-hwe-5.19-tools-common","binary_version":"5.19.0-41.42~22.04.1"},{"binary_name":"linux-hwe-5.19-tools-host","binary_version":"5.19.0-41.42~22.04.1"},{"binary_name":"linux-image-5.19.0-41-generic","binary_version":"5.19.0-41.42~22.04.1"},{"binary_name":"linux-image-5.19.0-41-generic-lpae","binary_version":"5.19.0-41.42~22.04.1"},{"binary_name":"linux-image-unsigned-5.19.0-41-generic","binary_version":"5.19.0-41.42~22.04.1"},{"binary_name":"linux-image-unsigned-5.19.0-41-generic-64k","binary_version":"5.19.0-41.42~22.04.1"},{"binary_name":"linux-modules-5.19.0-41-generic","binary_version":"5.19.0-41.42~22.04.1"},{"binary_name":"linux-modules-5.19.0-41-generic-64k","binary_version":"5.19.0-41.42~22.04.1"},{"binary_name":"linux-modules-5.19.0-41-generic-lpae","binary_version":"5.19.0-41.42~22.04.1"},{"binary_name":"linux-modules-extra-5.19.0-41-generic","binary_version":"5.19.0-41.42~22.04.1"},{"binary_name":"linux-modules-ipu6-5.19.0-41-generic","binary_version":"5.19.0-41.42~22.04.1"},{"binary_name":"linux-modules-ivsc-5.19.0-41-generic","binary_version":"5.19.0-41.42~22.04.1"},{"binary_name":"linux-modules-iwlwifi-5.19.0-41-generic","binary_version":"5.19.0-41.42~22.04.1"},{"binary_name":"linux-source-5.19.0","binary_version":"5.19.0-41.42~22.04.1"},{"binary_name":"linux-tools-5.19.0-41-generic","binary_version":"5.19.0-41.42~22.04.1"},{"binary_name":"linux-tools-5.19.0-41-generic-64k","binary_version":"5.19.0-41.42~22.04.1"},{"binary_name":"linux-tools-5.19.0-41-generic-lpae","binary_version":"5.19.0-41.42~22.04.1"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:22.04:LTS","cves":[{"id":"CVE-2023-0386","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2023-1829","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6043-1.json"}}],"schema_version":"1.7.3"}