{"id":"USN-6466-1","summary":"linux-nvidia-6.2 vulnerabilities","details":"Hyunwoo Kim discovered that the DVB Core driver in the Linux kernel\ncontained a race condition during device removal, leading to a use-after-\nfree vulnerability. A physically proximate attacker could use this to cause\na denial of service (system crash) or possibly execute arbitrary code.\n(CVE-2022-45886, CVE-2022-45919)\n\nHyunwoo Kim discovered that the Technotrend/Hauppauge USB DEC driver in the\nLinux kernel did not properly handle device removal events. A physically\nproximate attacker could use this to cause a denial of service (system\ncrash). (CVE-2022-45887)\n\nIt was discovered that the NTFS file system implementation in the Linux\nkernel did not properly validate MFT flags in certain situations. An\nattacker could use this to construct a malicious NTFS image that, when\nmounted and operated on, could cause a denial of service (system crash).\n(CVE-2022-48425)\n\nIt was discovered that the IPv6 implementation in the Linux kernel\ncontained a high rate of hash collisions in connection lookup table. A\nremote attacker could use this to cause a denial of service (excessive CPU\nconsumption). (CVE-2023-1206)\n\nDaniel Trujillo, Johannes Wikner, and Kaveh Razavi discovered that some AMD\nprocessors utilising speculative execution and branch prediction may allow\nunauthorised memory reads via a speculative side-channel attack. A local\nattacker could use this to expose sensitive information, including kernel\nmemory. (CVE-2023-20569)\n\nJana Hofmann, Emanuele Vannacci, Cedric Fournet, Boris Kopf, and Oleksii\nOleksenko discovered that some AMD processors could leak stale data from\ndivision operations in certain situations. A local attacker could possibly\nuse this to expose sensitive information. (CVE-2023-20588)\n\nIt was discovered that the ARM64 KVM implementation in the Linux kernel did\nnot properly restrict hypervisor memory access. An attacker in a guest VM\ncould use this to execute arbitrary code in the host OS. (CVE-2023-21264)\n\nIt was discovered that the IPv6 RPL protocol implementation in the Linux\nkernel did not properly handle user-supplied data. A remote attacker could\nuse this to cause a denial of service (system crash). (CVE-2023-2156)\n\nYu Hao and Weiteng Chen discovered that the Bluetooth HCI UART driver in\nthe Linux kernel contained a race condition, leading to a null pointer\ndereference vulnerability. A local attacker could use this to cause a\ndenial of service (system crash). (CVE-2023-31083)\n\nYang Lan discovered that the GFS2 file system implementation in the Linux\nkernel could attempt to dereference a null pointer in some situations. An\nattacker could use this to construct a malicious GFS2 image that, when\nmounted and operated on, could cause a denial of service (system crash).\n(CVE-2023-3212)\n\nRoss Lagerwall discovered that the Xen netback backend driver in the Linux\nkernel did not properly handle certain unusual packets from a\nparavirtualized network frontend, leading to a buffer overflow. An attacker\nin a guest VM could use this to cause a denial of service (host system\ncrash) or possibly execute arbitrary code. (CVE-2023-34319)\n\nLin Ma discovered that the Netlink Transformation (XFRM) subsystem in the\nLinux kernel contained a null pointer dereference vulnerability in some\nsituations. A local privileged attacker could use this to cause a denial of\nservice (system crash). (CVE-2023-3772)\n\nIt was discovered that the KSMBD implementation in the Linux kernel did not\nproperly validate buffer sizes in certain operations, leading to an integer\nunderflow and out-of-bounds read vulnerability. A remote attacker could use\nthis to cause a denial of service (system crash) or possibly expose\nsensitive information. (CVE-2023-38427)\n\nChih-Yen Chang discovered that the KSMBD implementation in the Linux kernel\ndid not properly validate SMB request protocol IDs, leading to a out-of-\nbounds read vulnerability. A remote attacker could possibly use this to\ncause a denial of service (system crash). (CVE-2023-38430)\n\nChih-Yen Chang discovered that the KSMBD implementation in the Linux kernel\ndid not properly validate packet header sizes in certain situations,\nleading to an out-of-bounds read vulnerability. A remote attacker could use\nthis to cause a denial of service (system crash) or possibly expose\nsensitive information. (CVE-2023-38431)\n\nChih-Yen Chang discovered that the KSMBD implementation in the Linux kernel\ndid not properly validate command payload size, leading to a out-of-bounds\nread vulnerability. A remote attacker could possibly use this to cause a\ndenial of service (system crash). (CVE-2023-38432)\n\nIt was discovered that the NFC implementation in the Linux kernel contained\na use-after-free vulnerability when performing peer-to-peer communication\nin certain conditions. A privileged attacker could use this to cause a\ndenial of service (system crash) or possibly expose sensitive information\n(kernel memory). (CVE-2023-3863)\n\nLaurence Wit discovered that the KSMBD implementation in the Linux kernel\ndid not properly validate a buffer size in certain situations, leading to\nan out-of-bounds read vulnerability. A remote attacker could use this to\ncause a denial of service (system crash) or possibly expose sensitive\ninformation. (CVE-2023-3865)\n\nLaurence Wit discovered that the KSMBD implementation in the Linux kernel\ncontained a null pointer dereference vulnerability when handling handling\nchained requests. A remote attacker could use this to cause a denial of\nservice (system crash). (CVE-2023-3866)\n\nIt was discovered that the KSMBD implementation in the Linux kernel did not\nproperly handle session setup requests, leading to an out-of-bounds read\nvulnerability. A remote attacker could use this to expose sensitive\ninformation. (CVE-2023-3867)\n\nIt was discovered that the bluetooth subsystem in the Linux kernel did not\nproperly handle L2CAP socket release, leading to a use-after-free\nvulnerability. A local attacker could use this to cause a denial of service\n(system crash) or possibly execute arbitrary code. (CVE-2023-40283)\n\nIt was discovered that some network classifier implementations in the Linux\nkernel contained use-after-free vulnerabilities. A local attacker could use\nthis to cause a denial of service (system crash) or possibly execute\narbitrary code. (CVE-2023-4128)\n\nIt was discovered that the Siano USB MDTV receiver device driver in the\nLinux kernel did not properly handle device initialization failures in\ncertain situations, leading to a use-after-free vulnerability. A physically\nproximate attacker could use this cause a denial of service (system crash).\n(CVE-2023-4132)\n\nIt was discovered that a race condition existed in the Cypress touchscreen\ndriver in the Linux kernel during device removal, leading to a use-after-\nfree vulnerability. A physically proximate attacker could use this to cause\na denial of service (system crash) or possibly execute arbitrary code.\n(CVE-2023-4134)\n\nAndy Nguyen discovered that the KVM implementation for AMD processors in\nthe Linux kernel with Secure Encrypted Virtualization (SEV) contained a\nrace condition when accessing the GHCB page. A local attacker in a SEV\nguest VM could possibly use this to cause a denial of service (host system\ncrash). (CVE-2023-4155)\n\nIt was discovered that the TUN/TAP driver in the Linux kernel did not\nproperly initialize socket data. A local attacker could use this to cause a\ndenial of service (system crash). (CVE-2023-4194)\n\nBien Pham discovered that the netfiler subsystem in the Linux kernel\ncontained a race condition, leading to a use-after-free vulnerability. A\nlocal user could use this to cause a denial of service (system crash) or\npossibly execute arbitrary code. (CVE-2023-4244)\n\nMaxim Suhanov discovered that the exFAT file system implementation in the\nLinux kernel did not properly check a file name length, leading to an out-\nof-bounds write vulnerability. An attacker could use this to construct a\nmalicious exFAT image that, when mounted and operated on, could cause a\ndenial of service (system crash) or possibly execute arbitrary code.\n(CVE-2023-4273)\n\nKyle Zeng discovered that the networking stack implementation in the Linux\nkernel did not properly validate skb object size in certain conditions. An\nattacker could use this cause a denial of service (system crash) or\npossibly execute arbitrary code. (CVE-2023-42752)\n\nKyle Zeng discovered that the netfiler subsystem in the Linux kernel did\nnot properly calculate array offsets, leading to a out-of-bounds write\nvulnerability. A local user could use this to cause a denial of service\n(system crash) or possibly execute arbitrary code. (CVE-2023-42753)\n\nKyle Zeng discovered that the IPv4 Resource Reservation Protocol (RSVP)\nclassifier implementation in the Linux kernel contained an out-of-bounds\nread vulnerability. A local attacker could use this to cause a denial of\nservice (system crash). Please note that kernel packet classifier support\nfor RSVP has been removed to resolve this vulnerability. (CVE-2023-42755)\n\nKyle Zeng discovered that the netfilter subsystem in the Linux kernel\ncontained a race condition in IP set operations in certain situations. A\nlocal attacker could use this to cause a denial of service (system crash).\n(CVE-2023-42756)\n\nThelford Williams discovered that the Ceph file system messenger protocol\nimplementation in the Linux kernel did not properly validate frame segment\nlength in certain situation, leading to a buffer overflow vulnerability. A\nremote attacker could use this to cause a denial of service (system crash)\nor possibly execute arbitrary code. (CVE-2023-44466)\n\nLonial Con discovered that the netfilter subsystem in the Linux kernel\ncontained a memory leak when handling certain element flush operations. A\nlocal attacker could use this to expose sensitive information (kernel\nmemory). (CVE-2023-4569)\n\nBing-Jhong Billy Jheng discovered that the Unix domain socket\nimplementation in the Linux kernel contained a race condition in certain\nsituations, leading to a use-after-free vulnerability. A local attacker\ncould use this to cause a denial of service (system crash) or possibly\nexecute arbitrary code. (CVE-2023-4622)\n\nBudimir Markovic discovered that the qdisc implementation in the Linux\nkernel did not properly validate inner classes, leading to a use-after-free\nvulnerability. A local user could use this to cause a denial of service\n(system crash) or possibly execute arbitrary code. (CVE-2023-4623)\n\nAlex Birnberg discovered that the netfilter subsystem in the Linux kernel\ndid not properly validate register length, leading to an out-of- bounds\nwrite vulnerability. A local attacker could possibly use this to cause a\ndenial of service (system crash). (CVE-2023-4881)\n\nIt was discovered that the Quick Fair Queueing scheduler implementation in\nthe Linux kernel did not properly handle network packets in certain\nconditions, leading to a use after free vulnerability. A local attacker\ncould use this to cause a denial of service (system crash) or possibly\nexecute arbitrary code. (CVE-2023-4921)\n\nKevin Rich discovered that the netfilter subsystem in the Linux kernel did\nnot properly handle removal of rules from chain bindings in certain\ncircumstances, leading to a use-after-free vulnerability. A local attacker\ncould possibly use this to cause a denial of service (system crash) or\nexecute arbitrary code. (CVE-2023-5197)\n\n","modified":"2026-04-27T17:02:13.504091482Z","published":"2023-10-31T21:47:40Z","related":["UBUNTU-CVE-2022-45886","UBUNTU-CVE-2022-45887","UBUNTU-CVE-2022-45919","UBUNTU-CVE-2022-48425","UBUNTU-CVE-2023-1206","UBUNTU-CVE-2023-20569","UBUNTU-CVE-2023-20588","UBUNTU-CVE-2023-21264","UBUNTU-CVE-2023-2156","UBUNTU-CVE-2023-31083","UBUNTU-CVE-2023-3212","UBUNTU-CVE-2023-34319","UBUNTU-CVE-2023-3772","UBUNTU-CVE-2023-38427","UBUNTU-CVE-2023-38430","UBUNTU-CVE-2023-38431","UBUNTU-CVE-2023-38432","UBUNTU-CVE-2023-3863","UBUNTU-CVE-2023-3865","UBUNTU-CVE-2023-3866","UBUNTU-CVE-2023-3867","UBUNTU-CVE-2023-40283","UBUNTU-CVE-2023-4128","UBUNTU-CVE-2023-4132","UBUNTU-CVE-2023-4134","UBUNTU-CVE-2023-4155","UBUNTU-CVE-2023-4194","UBUNTU-CVE-2023-4244","UBUNTU-CVE-2023-4273","UBUNTU-CVE-2023-42752","UBUNTU-CVE-2023-42753","UBUNTU-CVE-2023-42755","UBUNTU-CVE-2023-42756","UBUNTU-CVE-2023-44466","UBUNTU-CVE-2023-4569","UBUNTU-CVE-2023-4622","UBUNTU-CVE-2023-4623","UBUNTU-CVE-2023-4881","UBUNTU-CVE-2023-4921","UBUNTU-CVE-2023-5197"],"upstream":["CVE-2022-45886","CVE-2022-45887","CVE-2022-45919","CVE-2022-48425","CVE-2023-1206","CVE-2023-20569","CVE-2023-20588","CVE-2023-21264","CVE-2023-2156","CVE-2023-31083","CVE-2023-3212","CVE-2023-34319","CVE-2023-3772","CVE-2023-38427","CVE-2023-38430","CVE-2023-38431","CVE-2023-38432","CVE-2023-3863","CVE-2023-3865","CVE-2023-3866","CVE-2023-3867","CVE-2023-40283","CVE-2023-4128","CVE-2023-4132","CVE-2023-4134","CVE-2023-4155","CVE-2023-4194","CVE-2023-4244","CVE-2023-4273","CVE-2023-42752","CVE-2023-42753","CVE-2023-42755","CVE-2023-42756","CVE-2023-44466","CVE-2023-4569","CVE-2023-4622","CVE-2023-4623","CVE-2023-4881","CVE-2023-4921","CVE-2023-5197","UBUNTU-CVE-2022-45886","UBUNTU-CVE-2022-45887","UBUNTU-CVE-2022-45919","UBUNTU-CVE-2022-48425","UBUNTU-CVE-2023-1206","UBUNTU-CVE-2023-20569","UBUNTU-CVE-2023-20588","UBUNTU-CVE-2023-21264","UBUNTU-CVE-2023-2156","UBUNTU-CVE-2023-31083","UBUNTU-CVE-2023-3212","UBUNTU-CVE-2023-34319","UBUNTU-CVE-2023-3772","UBUNTU-CVE-2023-38427","UBUNTU-CVE-2023-38430","UBUNTU-CVE-2023-38431","UBUNTU-CVE-2023-38432","UBUNTU-CVE-2023-3863","UBUNTU-CVE-2023-3865","UBUNTU-CVE-2023-3866","UBUNTU-CVE-2023-3867","UBUNTU-CVE-2023-40283","UBUNTU-CVE-2023-4128","UBUNTU-CVE-2023-4132","UBUNTU-CVE-2023-4134","UBUNTU-CVE-2023-4155","UBUNTU-CVE-2023-4194","UBUNTU-CVE-2023-4244","UBUNTU-CVE-2023-4273","UBUNTU-CVE-2023-42752","UBUNTU-CVE-2023-42753","UBUNTU-CVE-2023-42755","UBUNTU-CVE-2023-42756","UBUNTU-CVE-2023-44466","UBUNTU-CVE-2023-4569","UBUNTU-CVE-2023-4622","UBUNTU-CVE-2023-4623","UBUNTU-CVE-2023-4881","UBUNTU-CVE-2023-4921","UBUNTU-CVE-2023-5197"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6466-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-45886"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-45887"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-45919"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-48425"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-1206"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-2156"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-3212"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-3772"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-3863"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-3865"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-3866"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-3867"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-4128"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-4132"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-4134"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-4155"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-4194"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-4244"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-4273"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-4569"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-4622"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-4623"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-4881"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-4921"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-5197"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-20569"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-20588"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-21264"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-31083"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-34319"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-38427"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-38430"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-38431"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-38432"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-40283"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-42752"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-42753"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-42755"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-42756"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-44466"}],"affected":[{"package":{"name":"linux-nvidia-6.2","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/linux-nvidia-6.2@6.2.0-1011.11?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.2.0-1011.11"}]}],"versions":["6.2.0-1003.3~22.04.1","6.2.0-1009.9","6.2.0-1010.10"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"linux-buildinfo-6.2.0-1011-nvidia","binary_version":"6.2.0-1011.11"},{"binary_name":"linux-buildinfo-6.2.0-1011-nvidia-64k","binary_version":"6.2.0-1011.11"},{"binary_name":"linux-headers-6.2.0-1011-nvidia","binary_version":"6.2.0-1011.11"},{"binary_name":"linux-headers-6.2.0-1011-nvidia-64k","binary_version":"6.2.0-1011.11"},{"binary_name":"linux-image-unsigned-6.2.0-1011-nvidia","binary_version":"6.2.0-1011.11"},{"binary_name":"linux-image-unsigned-6.2.0-1011-nvidia-64k","binary_version":"6.2.0-1011.11"},{"binary_name":"linux-modules-6.2.0-1011-nvidia","binary_version":"6.2.0-1011.11"},{"binary_name":"linux-modules-6.2.0-1011-nvidia-64k","binary_version":"6.2.0-1011.11"},{"binary_name":"linux-modules-extra-6.2.0-1011-nvidia","binary_version":"6.2.0-1011.11"},{"binary_name":"linux-modules-nvidia-fs-6.2.0-1011-nvidia","binary_version":"6.2.0-1011.11"},{"binary_name":"linux-modules-nvidia-fs-6.2.0-1011-nvidia-64k","binary_version":"6.2.0-1011.11"},{"binary_name":"linux-nvidia-6.2-headers-6.2.0-1011","binary_version":"6.2.0-1011.11"},{"binary_name":"linux-nvidia-6.2-tools-6.2.0-1011","binary_version":"6.2.0-1011.11"},{"binary_name":"linux-nvidia-6.2-tools-host","binary_version":"6.2.0-1011.11"},{"binary_name":"linux-tools-6.2.0-1011-nvidia","binary_version":"6.2.0-1011.11"},{"binary_name":"linux-tools-6.2.0-1011-nvidia-64k","binary_version":"6.2.0-1011.11"}]},"database_specific":{"cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2022-45886"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-45887"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2022-45919"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-48425"},{"severity":[{"score":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-1206"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-2156"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2023-3212"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-3772"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"score":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-3863"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-3865"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-3866"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-3867"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2023-4128"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2023-4132"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2023-4134"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-4155"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-4194"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2023-4244"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-4273"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2023-4569"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2023-4622"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2023-4623"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2023-4881"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2023-4921"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2023-5197"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2023-20569"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2023-20588"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2023-21264"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2023-31083"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-34319"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-38427"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-38430"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-38431"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-38432"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2023-40283"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2023-42752"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2023-42753"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2023-42755"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-44466"}],"ecosystem":"Ubuntu:22.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6466-1.json"}}],"schema_version":"1.7.5"}