April 19, 2023, 4:43 p.m. |

Ubuntu security notices ubuntu.com

It was discovered that the Traffic-Control Index (TCINDEX) implementation
in the Linux kernel contained a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-1281)

It was discovered that the Integrity Measurement Architecture (IMA)
implementation in the Linux kernel did not properly enforce policy in
certain conditions. A privileged attacker could use this to bypass Kernel
lockdown restrictions. (CVE-2022-21505)

It was discovered that the infrared transceiver USB driver …

access architecture bypass code conditions control crash cve denial of service driver free integrity kernel linux linux kernel local lockdown measurement messages oem physical policy privileged restrictions service system traffic transceiver usb use-after-free usn vulnerabilities vulnerability

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Senior Product Delivery Associate - Cybersecurity | CyberOps

@ JPMorgan Chase & Co. | NY, United States

Security Ops Infrastructure Engineer (Remote US):

@ RingCentral | Remote, USA

SOC Analyst-1

@ NTT DATA | Bengaluru, India