{"id":"USN-6052-1","summary":"linux-ibm-5.4, linux-snapdragon vulnerability","details":"It was discovered that the Traffic-Control Index (TCINDEX) implementation\nin the Linux kernel did not properly perform filter deactivation in some\nsituations. A local attacker could possibly use this to gain elevated\nprivileges. Please note that with the fix for this CVE, kernel support for\nthe TCINDEX classifier has been removed.\n\n","modified":"2026-02-10T04:43:07Z","published":"2023-05-01T12:19:43Z","related":["UBUNTU-CVE-2023-1829"],"upstream":["CVE-2023-1829","UBUNTU-CVE-2023-1829"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6052-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-1829"}],"affected":[{"package":{"name":"linux-ibm-5.4","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/linux-ibm-5.4@5.4.0-1048.53~18.04.1?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.4.0-1048.53~18.04.1"}]}],"versions":["5.4.0-1010.11~18.04.2","5.4.0-1012.13~18.04.1","5.4.0-1014.15~18.04.1","5.4.0-1015.16~18.04.1","5.4.0-1017.19~18.04.1","5.4.0-1018.20~18.04.1","5.4.0-1019.21~18.04.1","5.4.0-1020.22~18.04.1","5.4.0-1021.23~18.04.1","5.4.0-1023.25~18.04.1","5.4.0-1026.29~18.04.1","5.4.0-1028.32~18.04.1","5.4.0-1029.33~18.04.1","5.4.0-1031.35~18.04.1","5.4.0-1032.36~18.04.1","5.4.0-1033.37~18.04.1","5.4.0-1034.38~18.04.1","5.4.0-1036.41~18.04.1","5.4.0-1037.42~18.04.1","5.4.0-1040.45~18.04.2","5.4.0-1041.46~18.04.1","5.4.0-1042.47~18.04.1","5.4.0-1044.49~18.04.1","5.4.0-1045.50~18.04.1","5.4.0-1046.51~18.04.1","5.4.0-1047.52~18.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"5.4.0-1048.53~18.04.1","binary_name":"linux-buildinfo-5.4.0-1048-ibm"},{"binary_version":"5.4.0-1048.53~18.04.1","binary_name":"linux-headers-5.4.0-1048-ibm"},{"binary_version":"5.4.0-1048.53~18.04.1","binary_name":"linux-ibm-5.4-cloud-tools-common"},{"binary_version":"5.4.0-1048.53~18.04.1","binary_name":"linux-ibm-5.4-headers-5.4.0-1048"},{"binary_version":"5.4.0-1048.53~18.04.1","binary_name":"linux-ibm-5.4-source-5.4.0"},{"binary_version":"5.4.0-1048.53~18.04.1","binary_name":"linux-ibm-5.4-tools-5.4.0-1048"},{"binary_version":"5.4.0-1048.53~18.04.1","binary_name":"linux-ibm-5.4-tools-common"},{"binary_version":"5.4.0-1048.53~18.04.1","binary_name":"linux-image-unsigned-5.4.0-1048-ibm"},{"binary_version":"5.4.0-1048.53~18.04.1","binary_name":"linux-modules-5.4.0-1048-ibm"},{"binary_version":"5.4.0-1048.53~18.04.1","binary_name":"linux-modules-extra-5.4.0-1048-ibm"},{"binary_version":"5.4.0-1048.53~18.04.1","binary_name":"linux-tools-5.4.0-1048-ibm"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6052-1.json","cves_map":{"cves":[{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2023-1829"}],"ecosystem":"Ubuntu:18.04:LTS"}}},{"package":{"name":"linux-snapdragon","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/linux-snapdragon@4.15.0-1149.159?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-1149.159"}]}],"versions":["4.4.0-1077.82","4.4.0-1078.83","4.4.0-1079.84","4.4.0-1081.86","4.15.0-1053.57","4.15.0-1054.58","4.15.0-1055.59","4.15.0-1057.62","4.15.0-1058.64","4.15.0-1060.66","4.15.0-1062.69","4.15.0-1064.71","4.15.0-1065.72","4.15.0-1066.73","4.15.0-1067.74","4.15.0-1069.76","4.15.0-1070.77","4.15.0-1071.78","4.15.0-1072.79","4.15.0-1074.81","4.15.0-1076.83","4.15.0-1077.84","4.15.0-1079.86","4.15.0-1080.87","4.15.0-1081.88","4.15.0-1083.91","4.15.0-1084.92","4.15.0-1086.94","4.15.0-1087.95","4.15.0-1089.98","4.15.0-1090.99","4.15.0-1091.100","4.15.0-1093.102","4.15.0-1094.103","4.15.0-1095.104","4.15.0-1096.105","4.15.0-1097.106","4.15.0-1098.107","4.15.0-1099.108","4.15.0-1100.109","4.15.0-1101.110","4.15.0-1102.111","4.15.0-1103.112","4.15.0-1106.115","4.15.0-1109.118","4.15.0-1110.119","4.15.0-1111.120","4.15.0-1112.121","4.15.0-1113.122","4.15.0-1114.123","4.15.0-1115.124","4.15.0-1116.125","4.15.0-1118.127","4.15.0-1119.128","4.15.0-1120.129","4.15.0-1122.131","4.15.0-1123.132","4.15.0-1125.134","4.15.0-1126.135","4.15.0-1127.136","4.15.0-1129.138","4.15.0-1132.142","4.15.0-1133.143","4.15.0-1135.145","4.15.0-1136.146","4.15.0-1137.147","4.15.0-1138.148","4.15.0-1139.149","4.15.0-1142.152","4.15.0-1143.153","4.15.0-1144.154","4.15.0-1145.155","4.15.0-1146.156","4.15.0-1148.158"],"ecosystem_specific":{"binaries":[{"binary_version":"4.15.0-1149.159","binary_name":"linux-buildinfo-4.15.0-1149-snapdragon"},{"binary_version":"4.15.0-1149.159","binary_name":"linux-headers-4.15.0-1149-snapdragon"},{"binary_version":"4.15.0-1149.159","binary_name":"linux-image-4.15.0-1149-snapdragon"},{"binary_version":"4.15.0-1149.159","binary_name":"linux-modules-4.15.0-1149-snapdragon"},{"binary_version":"4.15.0-1149.159","binary_name":"linux-snapdragon-headers-4.15.0-1149"},{"binary_version":"4.15.0-1149.159","binary_name":"linux-snapdragon-tools-4.15.0-1149"},{"binary_version":"4.15.0-1149.159","binary_name":"linux-tools-4.15.0-1149-snapdragon"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6052-1.json","cves_map":{"cves":[{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2023-1829"}],"ecosystem":"Ubuntu:18.04:LTS"}}}],"schema_version":"1.7.3"}