{"id":"USN-6194-1","summary":"linux-oem-6.1 vulnerabilities","details":"\nHangyu Hua discovered that the Flower classifier implementation in the\nLinux kernel contained an out-of-bounds write vulnerability. An attacker\ncould use this to cause a denial of service (system crash) or possibly\nexecute arbitrary code. (CVE-2023-35788, LP: #2023577)\n\nXingyuan Mo and Gengjia Chen discovered that the io_uring subsystem in the\nLinux kernel did not properly handle locking when IOPOLL mode is being\nused. A local attacker could use this to cause a denial of service (system\ncrash). (CVE-2023-2430)\n\nWei Chen discovered that the InfiniBand RDMA communication manager\nimplementation in the Linux kernel contained an out-of-bounds read\nvulnerability. A local attacker could use this to cause a denial of service\n(system crash). (CVE-2023-2176)\n\nIt was discovered that for some Intel processors the INVLPG instruction\nimplementation did not properly flush global TLB entries when PCIDs are\nenabled. An attacker could use this to expose sensitive information\n(kernel memory) or possibly cause undesired behaviors. (LP: #2023220)\n","modified":"2026-05-23T01:48:30.906134866Z","published":"2023-06-29T19:13:02Z","related":["UBUNTU-CVE-2023-2176","UBUNTU-CVE-2023-2430","UBUNTU-CVE-2023-35788"],"upstream":["CVE-2023-2176","CVE-2023-2430","UBUNTU-CVE-2023-2176","UBUNTU-CVE-2023-2430"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6194-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-2176"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-2430"},{"type":"REPORT","url":"https://launchpad.net/bugs/2023220"},{"type":"REPORT","url":"https://launchpad.net/bugs/2023577"}],"affected":[{"package":{"name":"linux-oem-6.1","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/linux-oem-6.1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.1.0-1015.15"}]}],"versions":["6.1.0-1004.4","6.1.0-1006.6","6.1.0-1007.7","6.1.0-1008.8","6.1.0-1009.9","6.1.0-1010.10","6.1.0-1012.12","6.1.0-1013.13","6.1.0-1014.14"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"6.1.0-1015.15","binary_name":"linux-buildinfo-6.1.0-1015-oem"},{"binary_version":"6.1.0-1015.15","binary_name":"linux-headers-6.1.0-1015-oem"},{"binary_version":"6.1.0-1015.15","binary_name":"linux-image-unsigned-6.1.0-1015-oem"},{"binary_version":"6.1.0-1015.15","binary_name":"linux-modules-6.1.0-1015-oem"},{"binary_version":"6.1.0-1015.15","binary_name":"linux-modules-ipu6-6.1.0-1015-oem"},{"binary_version":"6.1.0-1015.15","binary_name":"linux-modules-ivsc-6.1.0-1015-oem"},{"binary_version":"6.1.0-1015.15","binary_name":"linux-modules-iwlwifi-6.1.0-1015-oem"},{"binary_version":"6.1.0-1015.15","binary_name":"linux-oem-6.1-headers-6.1.0-1015"},{"binary_version":"6.1.0-1015.15","binary_name":"linux-oem-6.1-tools-6.1.0-1015"},{"binary_version":"6.1.0-1015.15","binary_name":"linux-oem-6.1-tools-host"},{"binary_version":"6.1.0-1015.15","binary_name":"linux-tools-6.1.0-1015-oem"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6194-1.json","cves_map":{"ecosystem":"Ubuntu:22.04:LTS","cves":[{"id":"CVE-2023-2176","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2023-2430","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]}]}}}],"schema_version":"1.7.5"}