{"id":"USN-6701-4","summary":"linux-azure vulnerabilities","details":"Ruihan Li discovered that the bluetooth subsystem in the Linux kernel did\nnot properly perform permissions checks when handling HCI sockets. A\nphysically proximate attacker could use this to cause a denial of service\n(bluetooth communication). (CVE-2023-2002)\n\nIt was discovered that the NVIDIA Tegra XUSB pad controller driver in the\nLinux kernel did not properly handle return values in certain error\nconditions. A local attacker could use this to cause a denial of service\n(system crash). (CVE-2023-23000)\n\nIt was discovered that Spectre-BHB mitigations were missing for Ampere\nprocessors. A local attacker could potentially use this to expose sensitive\ninformation. (CVE-2023-3006)\n\nIt was discovered that the ext4 file system implementation in the Linux\nkernel did not properly handle block device modification while it is\nmounted. A privileged attacker could use this to cause a denial of service\n(system crash) or possibly expose sensitive information. (CVE-2023-34256)\n\nEric Dumazet discovered that the netfilter subsystem in the Linux kernel\ndid not properly handle DCCP conntrack buffers in certain situations,\nleading to an out-of-bounds read vulnerability. An attacker could possibly\nuse this to expose sensitive information (kernel memory). (CVE-2023-39197)\n\nIt was discovered that the Siano USB MDTV receiver device driver in the\nLinux kernel did not properly handle device initialization failures in\ncertain situations, leading to a use-after-free vulnerability. A physically\nproximate attacker could use this cause a denial of service (system crash).\n(CVE-2023-4132)\n\nPratyush Yadav discovered that the Xen network backend implementation in\nthe Linux kernel did not properly handle zero length data request, leading\nto a null pointer dereference vulnerability. An attacker in a guest VM\ncould possibly use this to cause a denial of service (host domain crash).\n(CVE-2023-46838)\n\nIt was discovered that a race condition existed in the AppleTalk networking\nsubsystem of the Linux kernel, leading to a use-after-free vulnerability. A\nlocal attacker could use this to cause a denial of service (system crash)\nor possibly execute arbitrary code. (CVE-2023-51781)\n\nAlon Zahavi discovered that the NVMe-oF/TCP subsystem of the Linux kernel\ndid not properly handle connect command payloads in certain situations,\nleading to an out-of-bounds read vulnerability. A remote attacker could use\nthis to expose sensitive information (kernel memory). (CVE-2023-6121)\n\nIt was discovered that the ext4 file system implementation in the Linux\nkernel did not properly handle the remount operation in certain cases,\nleading to a use-after-free vulnerability. A local attacker could use this\nto cause a denial of service (system crash) or possibly expose sensitive\ninformation. (CVE-2024-0775)\n\nNotselwyn discovered that the netfilter subsystem in the Linux kernel did\nnot properly handle verdict parameters in certain cases, leading to a use-\nafter-free vulnerability. A local attacker could use this to cause a denial\nof service (system crash) or possibly execute arbitrary code.\n(CVE-2024-1086)\n\nIt was discovered that a race condition existed in the SCSI Emulex\nLightPulse Fibre Channel driver in the Linux kernel when unregistering FCF\nand re-scanning an HBA FCF table, leading to a null pointer dereference\nvulnerability. A local attacker could use this to cause a denial of service\n(system crash). (CVE-2024-24855)\n","modified":"2026-02-10T04:43:38Z","published":"2024-04-09T13:53:55Z","related":["UBUNTU-CVE-2023-2002","UBUNTU-CVE-2023-23000","UBUNTU-CVE-2023-3006","UBUNTU-CVE-2023-34256","UBUNTU-CVE-2023-39197","UBUNTU-CVE-2023-4132","UBUNTU-CVE-2023-46838","UBUNTU-CVE-2023-51781","UBUNTU-CVE-2023-6121","UBUNTU-CVE-2024-0775","UBUNTU-CVE-2024-1086","UBUNTU-CVE-2024-24855"],"upstream":["CVE-2023-2002","CVE-2023-23000","CVE-2023-3006","CVE-2023-34256","CVE-2023-39197","CVE-2023-4132","CVE-2023-46838","CVE-2023-51781","CVE-2023-6121","CVE-2024-0775","CVE-2024-1086","CVE-2024-24855","UBUNTU-CVE-2023-2002","UBUNTU-CVE-2023-23000","UBUNTU-CVE-2023-3006","UBUNTU-CVE-2023-34256","UBUNTU-CVE-2023-39197","UBUNTU-CVE-2023-4132","UBUNTU-CVE-2023-46838","UBUNTU-CVE-2023-51781","UBUNTU-CVE-2023-6121","UBUNTU-CVE-2024-0775","UBUNTU-CVE-2024-1086","UBUNTU-CVE-2024-24855"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6701-4"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-2002"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-3006"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-4132"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-6121"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-23000"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-34256"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-39197"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-46838"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-51781"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-0775"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-1086"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-24855"}],"affected":[{"package":{"name":"linux-azure","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/linux-azure@4.15.0-1175.190~14.04.1?arch=source&distro=trusty/esm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-1175.190~14.04.1"}]}],"versions":["4.15.0-1023.24~14.04.1","4.15.0-1030.31~14.04.1","4.15.0-1031.32~14.04.1","4.15.0-1032.33~14.04.2","4.15.0-1035.36~14.04.2","4.15.0-1036.38~14.04.2","4.15.0-1037.39~14.04.2","4.15.0-1039.41~14.04.2","4.15.0-1040.44~14.04.1","4.15.0-1041.45~14.04.1","4.15.0-1042.46~14.04.1","4.15.0-1045.49~14.04.1","4.15.0-1046.50~14.04.1","4.15.0-1047.51~14.04.1","4.15.0-1049.54~14.04.1","4.15.0-1050.55~14.04.1","4.15.0-1051.56~14.04.1","4.15.0-1052.57~14.04.1","4.15.0-1055.60~14.04.1","4.15.0-1056.61~14.04.1","4.15.0-1057.62~14.04.1","4.15.0-1059.64~14.04.1","4.15.0-1060.65~14.04.1","4.15.0-1061.66~14.04.1","4.15.0-1063.68~14.04.1","4.15.0-1064.69~14.04.1","4.15.0-1066.71~14.04.1","4.15.0-1067.72~14.04.1","4.15.0-1069.74~14.04.1","4.15.0-1071.76~14.04.1","4.15.0-1074.79~14.04.1","4.15.0-1077.82~14.04.1","4.15.0-1082.92~14.04.1","4.15.0-1083.93~14.04.1","4.15.0-1089.99~14.04.1","4.15.0-1091.101~14.04.1","4.15.0-1092.102~14.04.1","4.15.0-1093.103~14.04.1","4.15.0-1095.105~14.04.1","4.15.0-1096.106~14.04.1","4.15.0-1098.109~14.04.1","4.15.0-1100.111~14.04.1","4.15.0-1102.113~14.04.1","4.15.0-1103.114~14.04.1","4.15.0-1106.118~14.04.1","4.15.0-1108.120~14.04.1","4.15.0-1109.121~14.04.1","4.15.0-1110.122~14.04.1","4.15.0-1111.123~14.04.1","4.15.0-1112.124~14.04.1","4.15.0-1113.126~14.04.1","4.15.0-1114.127~14.04.1","4.15.0-1115.128~14.04.1","4.15.0-1118.131~14.04.1","4.15.0-1121.134~14.04.1","4.15.0-1122.135~14.04.1","4.15.0-1123.136~14.04.1","4.15.0-1124.137~14.04.1","4.15.0-1125.138~14.04.1","4.15.0-1126.139~14.04.1","4.15.0-1127.140~14.04.1","4.15.0-1129.142~14.04.1","4.15.0-1130.143~14.04.1","4.15.0-1131.144~14.04.1","4.15.0-1133.146~14.04.1","4.15.0-1134.147~14.04.1","4.15.0-1136.149~14.04.1","4.15.0-1137.150~14.04.1","4.15.0-1138.151~14.04.1","4.15.0-1139.152~14.04.1","4.15.0-1142.156~14.04.1","4.15.0-1145.160~14.04.1","4.15.0-1146.161~14.04.1","4.15.0-1149.164~14.04.1","4.15.0-1150.165~14.04.1","4.15.0-1151.166~14.04.1","4.15.0-1153.168~14.04.1","4.15.0-1157.172~14.04.2","4.15.0-1158.173~14.04.1","4.15.0-1159.174~14.04.1","4.15.0-1162.177~14.04.1","4.15.0-1163.178~14.04.1","4.15.0-1164.179~14.04.1","4.15.0-1165.180~14.04.1","4.15.0-1166.181~14.04.1","4.15.0-1167.182~14.04.1","4.15.0-1168.183~14.04.1","4.15.0-1169.184~14.04.1","4.15.0-1170.185~14.04.1","4.15.0-1171.186~14.04.1","4.15.0-1172.187~14.04.1","4.15.0-1173.188~14.04.1","4.15.0-1174.189~14.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"4.15.0-1175.190~14.04.1","binary_name":"linux-azure-cloud-tools-4.15.0-1175"},{"binary_version":"4.15.0-1175.190~14.04.1","binary_name":"linux-azure-headers-4.15.0-1175"},{"binary_version":"4.15.0-1175.190~14.04.1","binary_name":"linux-azure-tools-4.15.0-1175"},{"binary_version":"4.15.0-1175.190~14.04.1","binary_name":"linux-buildinfo-4.15.0-1175-azure"},{"binary_version":"4.15.0-1175.190~14.04.1","binary_name":"linux-cloud-tools-4.15.0-1175-azure"},{"binary_version":"4.15.0-1175.190~14.04.1","binary_name":"linux-headers-4.15.0-1175-azure"},{"binary_version":"4.15.0-1175.190~14.04.1","binary_name":"linux-image-unsigned-4.15.0-1175-azure"},{"binary_version":"4.15.0-1175.190~14.04.1","binary_name":"linux-modules-4.15.0-1175-azure"},{"binary_version":"4.15.0-1175.190~14.04.1","binary_name":"linux-modules-extra-4.15.0-1175-azure"},{"binary_version":"4.15.0-1175.190~14.04.1","binary_name":"linux-tools-4.15.0-1175-azure"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6701-4.json","cves_map":{"ecosystem":"Ubuntu:Pro:14.04:LTS","cves":[{"id":"CVE-2023-2002","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-3006","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-4132","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2023-6121","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-23000","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-34256","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2023-39197","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-46838","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-51781","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}]},{"id":"CVE-2024-0775","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-1086","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}]},{"id":"CVE-2024-24855","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}]}}}],"schema_version":"1.7.3"}