Activity log for bug #2021927

Date Who What changed Old value New value Message
2023-05-31 03:15:00 Yue Tao bug added bug
2023-05-31 03:15:09 Yue Tao cve linked 2023-32233
2023-05-31 03:15:14 Yue Tao cve linked 2023-31436
2023-05-31 03:15:26 Yue Tao cve linked 2023-1859
2023-05-31 03:15:37 Yue Tao tags stx.9.0 stx.security
2023-05-31 03:16:17 Yue Tao summary [Debian] CVE:CVE-2023-32233/CVE-2023-31436/CVE-2023-31436/CVE-2023-1859: kernel: multiple CVEs [Debian] CVE:CVE-2023-32233/CVE-2023-31436/CVE-2023-2513/CVE-2023-1859: kernel: multiple CVEs
2023-05-31 03:16:22 Yue Tao cve linked 2023-2513
2023-06-04 13:21:19 Peng Zhang starlingx: assignee Peng Zhang (pzhang2)
2023-06-04 13:21:31 Peng Zhang starlingx: status Triaged In Progress
2023-06-06 06:06:19 Yue Tao summary [Debian] CVE:CVE-2023-32233/CVE-2023-31436/CVE-2023-2513/CVE-2023-1859: kernel: multiple CVEs [Debian] CVE:CVE-2023-32233/CVE-2023-31436/CVE-2023-2513/CVE-2023-1859/CVE-2023-2156: kernel: multiple CVEs
2023-06-06 06:06:24 Yue Tao cve linked 2023-2156
2023-06-08 01:54:37 Yue Tao description CVE-2023-32233: https://nvd.nist.gov/vuln/detail/CVE-2023-32233 In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled. CVE-2023-31436: https://nvd.nist.gov/vuln/detail/CVE-2023-31436 qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX. CVE-2023-2513: https://nvd.nist.gov/vuln/detail/CVE-2023-2513 A use-after-free vulnerability was found in the Linux kernel's ext4 filesystem in the way it handled the extra inode size for extended attributes. This flaw could allow a privileged local user to cause a system crash or other undefined behaviors. CVE-2023-1859: https://nvd.nist.gov/vuln/detail/CVE-2023-1859 A use-after-free flaw was found in xen_9pfs_front_removet in net/9p/trans_xen.c in Xen transport for 9pfs in the Linux Kernel. This flaw could allow a local attacker to crash the system due to a race problem, possibly leading to a kernel information leak. Base Score: High References: linux_5.10.180 CVE-2023-32233: https://nvd.nist.gov/vuln/detail/CVE-2023-32233 In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled. CVE-2023-31436: https://nvd.nist.gov/vuln/detail/CVE-2023-31436 qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX. CVE-2023-2513: https://nvd.nist.gov/vuln/detail/CVE-2023-2513 A use-after-free vulnerability was found in the Linux kernel's ext4 filesystem in the way it handled the extra inode size for extended attributes. This flaw could allow a privileged local user to cause a system crash or other undefined behaviors. CVE-2023-1859: https://nvd.nist.gov/vuln/detail/CVE-2023-1859 A use-after-free flaw was found in xen_9pfs_front_removet in net/9p/trans_xen.c in Xen transport for 9pfs in the Linux Kernel. This flaw could allow a local attacker to crash the system due to a race problem, possibly leading to a kernel information leak. CVE-2023-2156: https://nvd.nist.gov/vuln/detail/CVE-2023-2156 A flaw was found in the networking subsystem of the Linux kernel within the handling of the RPL protocol. This issue results from the lack of proper handling of user-supplied data, which can lead to an assertion failure. This may allow an unauthenticated remote attacker to create a denial of service condition on the system. CVE-2023-34256: https://nvd.nist.gov/vuln/detail/CVE-2023-34256 DISPUTED ** An issue was discovered in the Linux kernel before 6.3.3. There is an out-of-bounds read in crc16 in lib/crc16.c when called from fs/ext4/super.c because ext4_group_desc_csum does not properly check an offset. NOTE: this is disputed by third parties because the kernel is not intended to defend against attackers with the stated "When modifying the block device while it is mounted by the filesystem" access. Base Score: High References: linux_5.10.180
2023-06-08 01:54:44 Yue Tao cve linked 2023-34256
2023-06-08 01:54:59 Yue Tao summary [Debian] CVE:CVE-2023-32233/CVE-2023-31436/CVE-2023-2513/CVE-2023-1859/CVE-2023-2156: kernel: multiple CVEs [Debian] CVE:CVE-2023-32233/CVE-2023-31436/CVE-2023-2513/CVE-2023-1859/CVE-2023-2156/CVE-2023-34256: kernel: multiple CVEs
2023-06-09 15:17:15 OpenStack Infra starlingx: status In Progress Fix Released