{"id":"USN-6412-1","summary":"linux, linux-aws, linux-aws-6.2, linux-azure, linux-azure-6.2, linux-azure-fde-6.2, linux-gcp, linux-gcp-6.2, linux-hwe-6.2, linux-kvm, linux-lowlatency, linux-lowlatency-hwe-6.2, linux-oracle, linux-raspi, linux-starfive vulnerabilities","details":"Hyunwoo Kim discovered that the DVB Core driver in the Linux kernel\ncontained a race condition during device removal, leading to a use-after-\nfree vulnerability. A physically proximate attacker could use this to cause\na denial of service (system crash) or possibly execute arbitrary code.\n(CVE-2022-45886, CVE-2022-45919)\n\nHyunwoo Kim discovered that the Technotrend/Hauppauge USB DEC driver in the\nLinux kernel did not properly handle device removal events. A physically\nproximate attacker could use this to cause a denial of service (system\ncrash). (CVE-2022-45887)\n\nIt was discovered that the NTFS file system implementation in the Linux\nkernel did not properly validate MFT flags in certain situations. An\nattacker could use this to construct a malicious NTFS image that, when\nmounted and operated on, could cause a denial of service (system crash).\n(CVE-2022-48425)\n\nIt was discovered that the IPv6 implementation in the Linux kernel\ncontained a high rate of hash collisions in connection lookup table. A\nremote attacker could use this to cause a denial of service (excessive CPU\nconsumption). (CVE-2023-1206)\n\nDaniel Trujillo, Johannes Wikner, and Kaveh Razavi discovered that some AMD\nprocessors utilising speculative execution and branch prediction may allow\nunauthorised memory reads via a speculative side-channel attack. A local\nattacker could use this to expose sensitive information, including kernel\nmemory. (CVE-2023-20569)\n\nIt was discovered that the IPv6 RPL protocol implementation in the Linux\nkernel did not properly handle user-supplied data. A remote attacker could\nuse this to cause a denial of service (system crash). (CVE-2023-2156)\n\nYang Lan discovered that the GFS2 file system implementation in the Linux\nkernel could attempt to dereference a null pointer in some situations. An\nattacker could use this to construct a malicious GFS2 image that, when\nmounted and operated on, could cause a denial of service (system crash).\n(CVE-2023-3212)\n\nIt was discovered that the KSMBD implementation in the Linux kernel did not\nproperly validate buffer sizes in certain operations, leading to an integer\nunderflow and out-of-bounds read vulnerability. A remote attacker could use\nthis to cause a denial of service (system crash) or possibly expose\nsensitive information. (CVE-2023-38427)\n\nChih-Yen Chang discovered that the KSMBD implementation in the Linux kernel\ndid not properly validate packet header sizes in certain situations,\nleading to an out-of-bounds read vulnerability. A remote attacker could use\nthis to cause a denial of service (system crash) or possibly expose\nsensitive information. (CVE-2023-38431)\n\nAndy Nguyen discovered that the KVM implementation for AMD processors in\nthe Linux kernel with Secure Encrypted Virtualization (SEV) contained a\nrace condition when accessing the GHCB page. A local attacker in a SEV\nguest VM could possibly use this to cause a denial of service (host system\ncrash). (CVE-2023-4155)\n\nIt was discovered that the TUN/TAP driver in the Linux kernel did not\nproperly initialize socket data. A local attacker could use this to cause a\ndenial of service (system crash). (CVE-2023-4194)\n\nMaxim Suhanov discovered that the exFAT file system implementation in the\nLinux kernel did not properly check a file name length, leading to an out-\nof-bounds write vulnerability. An attacker could use this to construct a\nmalicious exFAT image that, when mounted and operated on, could cause a\ndenial of service (system crash) or possibly execute arbitrary code.\n(CVE-2023-4273)\n\n","modified":"2026-02-10T04:43:21Z","published":"2023-10-05T14:27:13Z","related":["UBUNTU-CVE-2022-45886","UBUNTU-CVE-2022-45887","UBUNTU-CVE-2022-45919","UBUNTU-CVE-2022-48425","UBUNTU-CVE-2023-1206","UBUNTU-CVE-2023-20569","UBUNTU-CVE-2023-2156","UBUNTU-CVE-2023-3212","UBUNTU-CVE-2023-38427","UBUNTU-CVE-2023-38431","UBUNTU-CVE-2023-4155","UBUNTU-CVE-2023-4194","UBUNTU-CVE-2023-4273"],"upstream":["CVE-2022-45886","CVE-2022-45887","CVE-2022-45919","CVE-2022-48425","CVE-2023-1206","CVE-2023-20569","CVE-2023-2156","CVE-2023-3212","CVE-2023-38427","CVE-2023-38431","CVE-2023-4155","CVE-2023-4194","CVE-2023-4273","UBUNTU-CVE-2022-45886","UBUNTU-CVE-2022-45887","UBUNTU-CVE-2022-45919","UBUNTU-CVE-2022-48425","UBUNTU-CVE-2023-1206","UBUNTU-CVE-2023-20569","UBUNTU-CVE-2023-2156","UBUNTU-CVE-2023-3212","UBUNTU-CVE-2023-38427","UBUNTU-CVE-2023-38431","UBUNTU-CVE-2023-4155","UBUNTU-CVE-2023-4194","UBUNTU-CVE-2023-4273"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6412-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-45886"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-45887"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-45919"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-48425"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-1206"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-2156"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-3212"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-4155"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-4194"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-4273"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-20569"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-38427"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-38431"}],"affected":[{"package":{"name":"linux-aws-6.2","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/linux-aws-6.2@6.2.0-1013.13~22.04.1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.2.0-1013.13~22.04.1"}]}],"versions":["6.2.0-1005.5~22.04.1","6.2.0-1006.6~22.04.1","6.2.0-1007.7~22.04.1","6.2.0-1008.8~22.04.1","6.2.0-1009.9~22.04.3","6.2.0-1010.10~22.04.1","6.2.0-1011.11~22.04.1","6.2.0-1012.12~22.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"6.2.0-1013.13~22.04.1","binary_name":"linux-aws-6.2-cloud-tools-6.2.0-1013"},{"binary_version":"6.2.0-1013.13~22.04.1","binary_name":"linux-aws-6.2-headers-6.2.0-1013"},{"binary_version":"6.2.0-1013.13~22.04.1","binary_name":"linux-aws-6.2-tools-6.2.0-1013"},{"binary_version":"6.2.0-1013.13~22.04.1","binary_name":"linux-buildinfo-6.2.0-1013-aws"},{"binary_version":"6.2.0-1013.13~22.04.1","binary_name":"linux-cloud-tools-6.2.0-1013-aws"},{"binary_version":"6.2.0-1013.13~22.04.1","binary_name":"linux-headers-6.2.0-1013-aws"},{"binary_version":"6.2.0-1013.13~22.04.1","binary_name":"linux-image-unsigned-6.2.0-1013-aws"},{"binary_version":"6.2.0-1013.13~22.04.1","binary_name":"linux-modules-6.2.0-1013-aws"},{"binary_version":"6.2.0-1013.13~22.04.1","binary_name":"linux-modules-extra-6.2.0-1013-aws"},{"binary_version":"6.2.0-1013.13~22.04.1","binary_name":"linux-tools-6.2.0-1013-aws"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:22.04:LTS","cves":[{"id":"CVE-2022-45886","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2022-45887","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-45919","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2022-48425","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-1206","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-2156","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-3212","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2023-4155","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-4194","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-4273","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-20569","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"high"}]},{"id":"CVE-2023-38427","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-38431","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6412-1.json"}},{"package":{"name":"linux-azure-6.2","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/linux-azure-6.2@6.2.0-1014.14~22.04.1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.2.0-1014.14~22.04.1"}]}],"versions":["6.2.0-1005.5~22.04.1","6.2.0-1006.6~22.04.1","6.2.0-1007.7~22.04.1","6.2.0-1008.8~22.04.1","6.2.0-1009.9~22.04.3","6.2.0-1011.11~22.04.1","6.2.0-1012.12~22.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"6.2.0-1014.14~22.04.1","binary_name":"linux-azure-6.2-cloud-tools-6.2.0-1014"},{"binary_version":"6.2.0-1014.14~22.04.1","binary_name":"linux-azure-6.2-headers-6.2.0-1014"},{"binary_version":"6.2.0-1014.14~22.04.1","binary_name":"linux-azure-6.2-tools-6.2.0-1014"},{"binary_version":"6.2.0-1014.14~22.04.1","binary_name":"linux-buildinfo-6.2.0-1014-azure"},{"binary_version":"6.2.0-1014.14~22.04.1","binary_name":"linux-cloud-tools-6.2.0-1014-azure"},{"binary_version":"6.2.0-1014.14~22.04.1","binary_name":"linux-headers-6.2.0-1014-azure"},{"binary_version":"6.2.0-1014.14~22.04.1","binary_name":"linux-image-unsigned-6.2.0-1014-azure"},{"binary_version":"6.2.0-1014.14~22.04.1","binary_name":"linux-modules-6.2.0-1014-azure"},{"binary_version":"6.2.0-1014.14~22.04.1","binary_name":"linux-modules-extra-6.2.0-1014-azure"},{"binary_version":"6.2.0-1014.14~22.04.1","binary_name":"linux-tools-6.2.0-1014-azure"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:22.04:LTS","cves":[{"id":"CVE-2022-45886","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2022-45887","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-45919","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2022-48425","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-1206","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-2156","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-3212","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2023-4155","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-4194","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-4273","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-20569","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"high"}]},{"id":"CVE-2023-38427","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-38431","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6412-1.json"}},{"package":{"name":"linux-azure-fde-6.2","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/linux-azure-fde-6.2@6.2.0-1014.14~22.04.1.1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.2.0-1014.14~22.04.1.1"}]}],"versions":["6.2.0-1008.8~22.04.1.1","6.2.0-1009.9~22.04.3.1","6.2.0-1011.11~22.04.1.1","6.2.0-1012.12~22.04.1.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"6.2.0-1014.14~22.04.1.1","binary_name":"linux-image-unsigned-6.2.0-1014-azure-fde"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:22.04:LTS","cves":[{"id":"CVE-2022-45886","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2022-45887","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-45919","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2022-48425","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-1206","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-2156","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-3212","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2023-4155","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-4194","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-4273","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-20569","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"high"}]},{"id":"CVE-2023-38427","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-38431","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6412-1.json"}},{"package":{"name":"linux-gcp-6.2","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/linux-gcp-6.2@6.2.0-1016.18~22.04.1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.2.0-1016.18~22.04.1"}]}],"versions":["6.2.0-1009.9~22.04.3","6.2.0-1010.10~22.04.1","6.2.0-1011.11~22.04.1","6.2.0-1011.11~22.04.3","6.2.0-1012.12~22.04.1","6.2.0-1013.13~22.04.1","6.2.0-1014.14~22.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"6.2.0-1016.18~22.04.1","binary_name":"linux-buildinfo-6.2.0-1016-gcp"},{"binary_version":"6.2.0-1016.18~22.04.1","binary_name":"linux-gcp-6.2-headers-6.2.0-1016"},{"binary_version":"6.2.0-1016.18~22.04.1","binary_name":"linux-gcp-6.2-tools-6.2.0-1016"},{"binary_version":"6.2.0-1016.18~22.04.1","binary_name":"linux-headers-6.2.0-1016-gcp"},{"binary_version":"6.2.0-1016.18~22.04.1","binary_name":"linux-image-unsigned-6.2.0-1016-gcp"},{"binary_version":"6.2.0-1016.18~22.04.1","binary_name":"linux-modules-6.2.0-1016-gcp"},{"binary_version":"6.2.0-1016.18~22.04.1","binary_name":"linux-modules-extra-6.2.0-1016-gcp"},{"binary_version":"6.2.0-1016.18~22.04.1","binary_name":"linux-modules-iwlwifi-6.2.0-1016-gcp"},{"binary_version":"6.2.0-1016.18~22.04.1","binary_name":"linux-tools-6.2.0-1016-gcp"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:22.04:LTS","cves":[{"id":"CVE-2022-45886","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2022-45887","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-45919","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2022-48425","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-1206","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-2156","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-3212","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2023-4155","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-4194","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-4273","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-20569","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"high"}]},{"id":"CVE-2023-38427","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-38431","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6412-1.json"}},{"package":{"name":"linux-hwe-6.2","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/linux-hwe-6.2@6.2.0-34.34~22.04.1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.2.0-34.34~22.04.1"}]}],"versions":["6.2.0-25.25~22.04.2","6.2.0-26.26~22.04.1","6.2.0-31.31~22.04.1","6.2.0-32.32~22.04.1","6.2.0-33.33~22.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"6.2.0-34.34~22.04.1","binary_name":"linux-buildinfo-6.2.0-34-generic"},{"binary_version":"6.2.0-34.34~22.04.1","binary_name":"linux-buildinfo-6.2.0-34-generic-64k"},{"binary_version":"6.2.0-34.34~22.04.1","binary_name":"linux-buildinfo-6.2.0-34-generic-lpae"},{"binary_version":"6.2.0-34.34~22.04.1","binary_name":"linux-cloud-tools-6.2.0-34-generic"},{"binary_version":"6.2.0-34.34~22.04.1","binary_name":"linux-headers-6.2.0-34-generic"},{"binary_version":"6.2.0-34.34~22.04.1","binary_name":"linux-headers-6.2.0-34-generic-64k"},{"binary_version":"6.2.0-34.34~22.04.1","binary_name":"linux-headers-6.2.0-34-generic-lpae"},{"binary_version":"6.2.0-34.34~22.04.1","binary_name":"linux-hwe-6.2-cloud-tools-6.2.0-34"},{"binary_version":"6.2.0-34.34~22.04.1","binary_name":"linux-hwe-6.2-cloud-tools-common"},{"binary_version":"6.2.0-34.34~22.04.1","binary_name":"linux-hwe-6.2-headers-6.2.0-34"},{"binary_version":"6.2.0-34.34~22.04.1","binary_name":"linux-hwe-6.2-tools-6.2.0-34"},{"binary_version":"6.2.0-34.34~22.04.1","binary_name":"linux-hwe-6.2-tools-common"},{"binary_version":"6.2.0-34.34~22.04.1","binary_name":"linux-hwe-6.2-tools-host"},{"binary_version":"6.2.0-34.34~22.04.1","binary_name":"linux-image-6.2.0-34-generic"},{"binary_version":"6.2.0-34.34~22.04.1","binary_name":"linux-image-6.2.0-34-generic-lpae"},{"binary_version":"6.2.0-34.34~22.04.1","binary_name":"linux-image-unsigned-6.2.0-34-generic"},{"binary_version":"6.2.0-34.34~22.04.1","binary_name":"linux-image-unsigned-6.2.0-34-generic-64k"},{"binary_version":"6.2.0-34.34~22.04.1","binary_name":"linux-modules-6.2.0-34-generic"},{"binary_version":"6.2.0-34.34~22.04.1","binary_name":"linux-modules-6.2.0-34-generic-64k"},{"binary_version":"6.2.0-34.34~22.04.1","binary_name":"linux-modules-6.2.0-34-generic-lpae"},{"binary_version":"6.2.0-34.34~22.04.1","binary_name":"linux-modules-extra-6.2.0-34-generic"},{"binary_version":"6.2.0-34.34~22.04.1","binary_name":"linux-modules-ipu6-6.2.0-34-generic"},{"binary_version":"6.2.0-34.34~22.04.1","binary_name":"linux-modules-ivsc-6.2.0-34-generic"},{"binary_version":"6.2.0-34.34~22.04.1","binary_name":"linux-modules-iwlwifi-6.2.0-34-generic"},{"binary_version":"6.2.0-34.34~22.04.1","binary_name":"linux-source-6.2.0"},{"binary_version":"6.2.0-34.34~22.04.1","binary_name":"linux-tools-6.2.0-34-generic"},{"binary_version":"6.2.0-34.34~22.04.1","binary_name":"linux-tools-6.2.0-34-generic-64k"},{"binary_version":"6.2.0-34.34~22.04.1","binary_name":"linux-tools-6.2.0-34-generic-lpae"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:22.04:LTS","cves":[{"id":"CVE-2022-45886","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2022-45887","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-45919","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2022-48425","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-1206","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-2156","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-3212","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2023-4155","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-4194","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-4273","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-20569","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"high"}]},{"id":"CVE-2023-38427","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-38431","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6412-1.json"}},{"package":{"name":"linux-lowlatency-hwe-6.2","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/linux-lowlatency-hwe-6.2@6.2.0-1014.14~22.04.1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.2.0-1014.14~22.04.1"}]}],"versions":["6.2.0-1008.8~22.04.1","6.2.0-1009.9~22.04.1","6.2.0-1011.11~22.04.1","6.2.0-1012.12~22.04.1","6.2.0-1013.13~22.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"6.2.0-1014.14~22.04.1","binary_name":"linux-buildinfo-6.2.0-1014-lowlatency"},{"binary_version":"6.2.0-1014.14~22.04.1","binary_name":"linux-buildinfo-6.2.0-1014-lowlatency-64k"},{"binary_version":"6.2.0-1014.14~22.04.1","binary_name":"linux-cloud-tools-6.2.0-1014-lowlatency"},{"binary_version":"6.2.0-1014.14~22.04.1","binary_name":"linux-headers-6.2.0-1014-lowlatency"},{"binary_version":"6.2.0-1014.14~22.04.1","binary_name":"linux-headers-6.2.0-1014-lowlatency-64k"},{"binary_version":"6.2.0-1014.14~22.04.1","binary_name":"linux-image-unsigned-6.2.0-1014-lowlatency"},{"binary_version":"6.2.0-1014.14~22.04.1","binary_name":"linux-image-unsigned-6.2.0-1014-lowlatency-64k"},{"binary_version":"6.2.0-1014.14~22.04.1","binary_name":"linux-lowlatency-hwe-6.2-cloud-tools-6.2.0-1014"},{"binary_version":"6.2.0-1014.14~22.04.1","binary_name":"linux-lowlatency-hwe-6.2-cloud-tools-common"},{"binary_version":"6.2.0-1014.14~22.04.1","binary_name":"linux-lowlatency-hwe-6.2-headers-6.2.0-1014"},{"binary_version":"6.2.0-1014.14~22.04.1","binary_name":"linux-lowlatency-hwe-6.2-tools-6.2.0-1014"},{"binary_version":"6.2.0-1014.14~22.04.1","binary_name":"linux-lowlatency-hwe-6.2-tools-common"},{"binary_version":"6.2.0-1014.14~22.04.1","binary_name":"linux-lowlatency-hwe-6.2-tools-host"},{"binary_version":"6.2.0-1014.14~22.04.1","binary_name":"linux-modules-6.2.0-1014-lowlatency"},{"binary_version":"6.2.0-1014.14~22.04.1","binary_name":"linux-modules-6.2.0-1014-lowlatency-64k"},{"binary_version":"6.2.0-1014.14~22.04.1","binary_name":"linux-modules-ipu6-6.2.0-1014-lowlatency"},{"binary_version":"6.2.0-1014.14~22.04.1","binary_name":"linux-modules-ivsc-6.2.0-1014-lowlatency"},{"binary_version":"6.2.0-1014.14~22.04.1","binary_name":"linux-modules-iwlwifi-6.2.0-1014-lowlatency"},{"binary_version":"6.2.0-1014.14~22.04.1","binary_name":"linux-tools-6.2.0-1014-lowlatency"},{"binary_version":"6.2.0-1014.14~22.04.1","binary_name":"linux-tools-6.2.0-1014-lowlatency-64k"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:22.04:LTS","cves":[{"id":"CVE-2022-45886","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2022-45887","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-45919","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2022-48425","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-1206","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-2156","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-3212","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2023-4155","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-4194","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-4273","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-20569","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"high"}]},{"id":"CVE-2023-38427","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-38431","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6412-1.json"}}],"schema_version":"1.7.3"}