Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
William Zhao discovered that a flaw in the Traffic Control (TC)
subsystem when using a specific networking configuration
(redirecting egress packets to ingress using TC action "mirred"),
may allow a local unprivileged user to cause a denial of service
(triggering a CPU soft lockup).
Jann Horn discovered that TLB flush operations are mishandled in the
KVM subsystem in certain KVM_VCPU_PREEMPTED situations, which may
allow an unprivileged guest user to compromise the guest kernel.
It was discovered that the networking stack permits attackers to
force hash collisions in the IPv6 connection lookup table, which may
result in denial of service (significant increase in the cost of
lookups, increased CPU utilization).
Jisoo Jang reported a heap out-of-bounds read in the brcmfmac Wi-Fi
driver. On systems using this driver, a local user could exploit
this to read sensitive information or to cause a denial of service.
Ruiahn Li reported an incorrect permissions check in the Bluetooth
subsystem. A local user could exploit this to reconfigure local
Bluetooth interfaces, resulting in information leaks, spoofing, or
denial of service (loss of connection).
Lucas Leong and Reno Robert discovered a time-of-check-to-time-of-
use flaw in the dpt_i2o SCSI controller driver. A local user with
access to a SCSI device using this driver could exploit this for
This flaw has been mitigated by removing support for the I2OUSRCMD
Kyle Zeng, Akshay Ajayan and Fish Wang discovered that missing
metadata validation may result in denial of service or potential
privilege escalation if a corrupted XFS disk image is mounted.
Zheng Zhang reported that improper handling of locking in the device
mapper implementation may result in denial of service.
It was discovered that missing sanitising in the f2fs file
system may result in denial of service if a malformed file
system is accessed.
It was discovered that missing initialization in ipvlan networking
may lead to an out-of-bounds write vulnerability, resulting in
denial of service or potentially the execution of arbitrary code.
The TOTE Robot tool found a flaw in the Btrfs filesystem driver that
can lead to a use-after-free. It's unclear whether an unprivileged
user can exploit this.
Yang Lan that missing validation in the GFS2 filesystem could result
in denial of service via a NULL pointer dereference when mounting a
malformed GFS2 filesystem.
It was discovered that an out-of-bounds memory access in relayfs
could result in denial of service or an information leak.
Davide Ornaghi discovered a flaw in the DECnet protocol
implementation which could lead to a null pointer dereference or
use-after-free. A local user can exploit this to cause a denial of service
(crash or memory corruption) and probably for privilege escalation.
This flaw has been mitigated by removing the DECnet protocol
Querijn Voet discovered a use-after-free in the io_uring subsystem,
which may result in denial of service or privilege escalation.
It was discovered that an out-of-bounds write in the traffic control
subsystem for the Quick Fair Queueing scheduler (QFQ) may result in
denial of service or privilege escalation.
CVE-2023-3609 / CVE-2023-3776 / CVE-2023-4128
It was discovered that a use-after-free in the cls_fw, cls_u32,
cls_route and network classifiers may result in denial of service or
potential local privilege escalation.
It was discovered that a use-after-free in the NFC implementation
may result in denial of service, an information leak or potential
local privilege escalation.
It was discovered that a use-after-free in Netfilter's
implementation of PIPAPO (PIle PAcket POlicies) may result in denial
of service or potential local privilege escalation for a user with
the CAP_NET_ADMIN capability in any user or network namespace.
A use-after-free in the driver for Siano SMS1xxx based MDTV
receivers may result in local denial of service.
Kevin Rich discovered a use-after-free in Netfilter when adding a
rule with NFTA_RULE_CHAIN_ID, which may result in local privilege
escalation for a user with the CAP_NET_ADMIN capability in any user
or network namespace.
A type confusion in the implementation of TUN/TAP network devices
may allow a local user to bypass network filters.
Maxim Suhanov discovered a stack overflow in the exFAT driver, which
may result in local denial of service via a malformed file system.
Jana Hofmann, Emanuele Vannacci, Cedric Fournet, Boris Koepf and
Oleksii Oleksenko discovered that on some AMD CPUs with the Zen1
micro architecture an integer division by zero may leave stale
quotient data from a previous division, resulting in a potential
leak of sensitive data.
A use-after-free was discovered in the in the Android binder driver,
which may result in local privilege escalation on systems where the
binder driver is loaded.
Ye Zhang and Nicolas Wu discovered a double-free in the io_uring
subsystem, which may result in denial of service or privilege
It was discovered that the DVB Core driver does not properly handle
locking of certain events, allowing a local user to cause a denial
Ross Lagerwall discovered a buffer overrun in Xen's netback driver
which may allow a Xen guest to cause denial of service to the
virtualisation host my sending malformed packets.
Hangyu Hua that an off-by-one in the Flower traffic classifier may
result in local of service or the execution of privilege escalation.
A use-after-free was discovered in Bluetooth L2CAP socket handling.
For the oldstable distribution (bullseye), these problems have been fixed
in version 5.10.191-1.
We recommend that you upgrade your linux packages.