Thursday, November 30, 2023
FreeBSD Errata Notice FreeBSD-EN-23:16.openzfs
Hash: SHA512
=============================================================================
FreeBSD-EN-23:16.openzfs Errata Notice
The FreeBSD Project
Topic: OpenZFS data corruption
Category: contrib
Module: OpenZFS
Announced: 2023-12-01
Affects: All supported versions of FreeBSD.
Corrected: 2023-11-28 21:00:48 UTC (stable/14, 14.0-STABLE)
2023-12-01 00:38:38 UTC (releng/14.0, 14.0-RELEASE-p1)
2023-11-28 21:07:30 UTC (stable/13, 13.2-STABLE)
2023-12-01 00:38:47 UTC (releng/13.2, 13.2-RELEASE-p6)
2023-11-30 05:28:33 UTC (stable/12, 12.4-STABLE)
2023-12-01 00:40:23 UTC (releng/12.4, 12.4-RELEASE-p8)
For general information regarding FreeBSD Errata Notices and Security
Advisories, including descriptions of the fields above, security
branches, and the following sections, please visit
<URL:https://security.FreeBSD.org/>.
I. Background
FreeBSD has included a version of the powerful and feature-rich ZFS file
system beginning with FreeBSD 7.0 released in 2008. The ZFS implementation
in FreeBSD 12 and earlier is based on the Illumos ZFS codebase. In FreeBSD
13 and later OpenZFS is used as the ZFS implementation.
Sparse files in a file system refer to a technique that optimizes storage
space by allowing the creation of files with unallocated or unwritten gaps,
known as holes. When reading a file, holes appear as zero or NUL bytes.
Certain system calls can access hole location metadata, including lseek(2)
with SEEK_HOLE and copy_file_range(2).
In OpenZFS a dnode is a data structure used to represent and manage metadata
about files and directories. In file systems, "dirty" refers to data or
metadata that has been modified in memory but not yet written to the storage
device. Thus, a dirty dnode is one which has uncommitted data or metadata.
In FreeBSD 13.2 and FreeBSD 14.0 cp(1) uses copy_file_range(2) to perform the
data copying in the kernel. copy_file_range attempts to find file holes in
the source file and preserve them in the copy. In FreeBSD 12.4 cp does not
use copy_file_range.
II. Problem Description
A check did not test both the dnode itself and its data for dirtiness. This
provides a very small window of time while a file is being modified where the
dirtiness check can falsely report that the dnode is clean. If this happens
a hole may incorrectly be reported where data was written.
III. Impact
If an access occurs while a file is being modified and a hole is incorrectly
reported, the data may instead be interpreted as zero bytes. Any application
which checks for holes may be affected by this issue; if this occurs during a
file copy it will result in a corrupt copy that retains the incorrect data.
Note that the source file remains intact (a subsequent read will return the
correct data).
IV. Workaround
Setting the vfs.zfs.dmu_offset_next_sync sysctl to 0 disables forcing
TXG sync to find holes. This is an effective workaround that greatly
reduces the likelihood of encountering data corruption, although it does
not completely eliminate it. Note that with the workaround holes will
not be reported in recently dirtied files. See the zfs(4) man page for
more information of the impact of this sysctl setting.
The workaround should be removed once the system is updated to include the
fix described in this notice.
V. Solution
Upgrade your system to a supported FreeBSD stable or release / security
branch (releng) dated after the correction date, and reboot.
Perform one of the following:
1) To update your system via a binary patch:
Systems running a RELEASE version of FreeBSD on the amd64 or arm64 platforms,
or the i386 platfrom on FreeBSD 13 and earlier, can be updated via
the freebsd-update(8) utility:
# freebsd-update fetch
# freebsd-update install
# shutdown -r +10min "Rebooting to apply OpenZFS erratum update"
2) To update your system via a source code patch:
The following patches have been verified to apply to the applicable
FreeBSD release branches.
a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.
NOTE: The FreeBSD 14.0 patch includes additional bug fixes which were found
during the investigation of this issue. These bug fixes do not apply to
FreeBSD 13.2 or FreeBSD 12.4.
[FreeBSD 14.0]
# fetch https://security.FreeBSD.org/patches/EN-23:16/openzfs.14.patch
# fetch https://security.FreeBSD.org/patches/EN-23:16/openzfs.14.patch.asc
# gpg --verify openzfs.14.patch.asc
[FreeBSD 13.2]
# fetch https://security.FreeBSD.org/patches/EN-23:16/openzfs.13.patch
# fetch https://security.FreeBSD.org/patches/EN-23:16/openzfs.13.patch.asc
# gpg --verify openzfs.13.patch.asc
[FreeBSD 12.4]
# fetch https://security.FreeBSD.org/patches/EN-23:16/openzfs.12.patch
# fetch https://security.FreeBSD.org/patches/EN-23:16/openzfs.12.patch.asc
# gpg --verify openzfs.12.patch.asc
b) Apply the patch. Execute the following commands as root:
# cd /usr/src
# patch < /path/to/patch
c) Recompile your kernel as described in
<URL:https://docs.freebsd.org/en/books/handbook/kernelconfig/> and reboot the
system.
VI. Correction details
This issue is corrected as of the corresponding Git commit hash or Subversion
revision number in the following stable and release branches:
Branch/path Hash Revision
- -------------------------------------------------------------------------
stable/14/ 99385ec7c296 stable/14-n265836
releng/14.0/ 154870526943 releng/14.0-n265384
stable/13/ 5858f93a8b66 stable/13-n256744
releng/13.2/ 0bb76997ce58 releng/13.2-n254644
stable/12/ r373278
releng/12.4/ r373279
- -------------------------------------------------------------------------
For FreeBSD 13 and later:
Run the following command to see which files were modified by a
particular commit:
# git show --stat <commit hash>
Or visit the following URL, replacing NNNNNN with the hash:
<URL:https://cgit.freebsd.org/src/commit/?id=NNNNNN>
To determine the commit count in a working tree (for comparison against
nNNNNNN in the table above), run:
# git rev-list --count --first-parent HEAD
For FreeBSD 12 and earlier:
Run the following command to see which files were modified by a particular
revision, replacing NNNNNN with the revision number:
# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base
Or visit the following URL, replacing NNNNNN with the revision number:
<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>
VII. References
<URL:https://bugs.freebsd.org/275308>
<URL:https://github.com/openzfs/zfs/issues/11900>
<URL:https://github.com/openzfs/zfs/issues/15526>
<URL:https://github.com/openzfs/zfs/pull/15566>
<URL:https://github.com/openzfs/zfs/pull/15571>
The latest revision of this advisory is available at
<URL:https://security.FreeBSD.org/advisories/FreeBSD-EN-23:16.openzfs.asc>
-----BEGIN PGP SIGNATURE-----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=pM+u
-----END PGP SIGNATURE-----
FreeBSD Errata Notice FreeBSD-EN-23:15.sanitizer
Hash: SHA512
=============================================================================
FreeBSD-EN-23:15.sanitizer Errata Notice
The FreeBSD Project
Topic: Clang sanitizer failure with ASLR enabled
Category: contrib
Module: compiler-rt
Announced: 2023-12-01
Affects: FreeBSD 14.0
Corrected: 2023-11-25 09:05:09 UTC (stable/14, 14.0-STABLE)
2023-12-01 00:38:35 UTC (releng/14.0, 14.0-RELEASE-p1)
2023-11-25 09:05:14 UTC (stable/13, 13.2-STABLE)
For general information regarding FreeBSD Errata Notices and Security
Advisories, including descriptions of the fields above, security
branches, and the following sections, please visit
<URL:https://security.FreeBSD.org/>.
I. Background
Compiler-RT is an implementation of various compiler runtime support routines,
provided by the LLVM project. This library also provides a number of so-called
Sanitizers, which help to catch buffer overruns, thread data races, and so on:
AddressSanitizer, ThreadSanitizer, UndefinedBehaviorSanitizer, and more.
II. Problem Description
Some of the Sanitizers cannot work correctly when ASLR is enabled. Therefore, at
the initialization of such Sanitizers, ASLR is detected via procctl(2). If ASLR
is enabled, it is first disabled, and then the main executable containing the
Sanitizer is re-executed, after printing an appropriate message.
However, the Sanitizers work by intercepting various function calls, and by
mistake the already-intercepted procctl(2) function was used. This causes an
internal error, which usually results in a segfault.
III. Impact
Binaries linked to AddressSanitizer (using -fsanitize=address), MemorySanitizer
(using -fsanitize=memory) or ThreadSanitizer (using -fsanitize=thread) can crash
at startup with a segfault, if ASLR is enabled. Other binaries are not affected.
IV. Workaround
If ASLR is enabled system-wide, the problem can be worked around by running the
specific binary with proccontrol(1), to temporarily disable ASLR for only that
program. For example:
proccontrol -m aslr -s disable /path/to/example_program
V. Solution
Upgrade your system to a supported FreeBSD stable or release / security
branch (releng) dated after the correction date.
No reboot is necessary, but Sanitized binaries must be re-linked, because the
Sanitizer libraries are statically linked in.
Perform one of the following:
1) To update your system via a binary patch:
Systems running a RELEASE version of FreeBSD on the amd64 or arm64 platforms,
or the i386 platform on FreeBSD 13 and earlier, can be updated via
the freebsd-update(8) utility:
# freebsd-update fetch
# freebsd-update install
No reboot is necessary, but Sanitized binaries must be re-linked, because the
Sanitizer libraries are statically linked in.
2) To update your system via a source code patch:
The following patches have been verified to apply to the applicable
FreeBSD release branches.
a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.
# fetch https://security.FreeBSD.org/patches/EN-23:15/sanitizer.patch
# fetch https://security.FreeBSD.org/patches/EN-23:15/sanitizer.patch.asc
# gpg --verify sanitizer.patch.asc
b) Apply the patch. Execute the following commands as root:
# cd /usr/src
# patch < /path/to/patch
c) Recompile the operating system using buildworld and installworld as
described in <URL:https://www.FreeBSD.org/handbook/makeworld.html>.
VI. Correction details
This issue is corrected as of the corresponding Git commit hash or Subversion
revision number in the following stable and release branches:
Branch/path Hash Revision
- -------------------------------------------------------------------------
stable/14/ 1e4798e9677f stable/14-n265803
releng/14.0/ 78b4c762b20b releng/14.0-n265381
stable/13/ 7c25a53a2cb9 stable/13-n256726
- -------------------------------------------------------------------------
Run the following command to see which files were modified by a
particular commit:
# git show --stat <commit hash>
Or visit the following URL, replacing NNNNNN with the hash:
<URL:https://cgit.freebsd.org/src/commit/?id=NNNNNN>
To determine the commit count in a working tree (for comparison against
nNNNNNN in the table above), run:
# git rev-list --count --first-parent HEAD
VII. References
<URL:https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=275270>
The latest revision of this advisory is available at
<URL:https://security.FreeBSD.org/advisories/FreeBSD-EN-23:15.sanitizer.asc>
-----BEGIN PGP SIGNATURE-----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=EPbY
-----END PGP SIGNATURE-----
[USN-6496-2] Linux kernel vulnerabilities
wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmVo1TQFAwAAAAAACgkQZ0GeRcM5nt2w
+wf/RXAupEEmg6+WV5+HOKGbvLLL9D9irsqm0WVdUIBg/X4zJp8Q0vA3l6deCZgqw9aNE6QZuwgN
uS3obu1JwU8vZp1PgaaMtzpsnZUEBDitGDp961rbYtfSW1/6q23cmqA77E9g3kjHgUc9cqfimwt0
Y9Hk+G6vfhvnnltaqf2ISE9kLLDLP/P9bhq/GxYlzbzYtBNiK+NrUo/6QREmqK0UzJbMtDNATeXt
r5nRBPoR7oPP/fZLUjDAYr3wkR2KRKmo6mSalq+sVswot/9qUooSFid1C65glJE1PsNQPb7tA1wP
dP0DnvBtf7UHjhDWE1B5MSqiHJivGZWgSpkk3yFHqA==
=+Thh
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6496-2
November 30, 2023
linux-azure, linux-azure-5.15, linux-azure-fde, linux-azure-fde-5.15,
linux-gcp, linux-gcp-5.15, linux-gke, linux-gkeop, linux-gkeop-5.15
vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-azure: Linux kernel for Microsoft Azure Cloud systems
- linux-azure-fde: Linux kernel for Microsoft Azure CVM cloud systems
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-gke: Linux kernel for Google Container Engine (GKE) systems
- linux-gkeop: Linux kernel for Google Container Engine (GKE) systems
- linux-azure-5.15: Linux kernel for Microsoft Azure cloud systems
- linux-azure-fde-5.15: Linux kernel for Microsoft Azure CVM cloud systems
- linux-gcp-5.15: Linux kernel for Google Cloud Platform (GCP) systems
- linux-gkeop-5.15: Linux kernel for Google Container Engine (GKE) systems
Details:
Ivan D Barrera, Christopher Bednarz, Mustafa Ismail, and Shiraz Saleem
discovered that the InfiniBand RDMA driver in the Linux kernel did not
properly check for zero-length STAG or MR registration. A remote attacker
could possibly use this to execute arbitrary code. (CVE-2023-25775)
Yu Hao discovered that the UBI driver in the Linux kernel did not properly
check for MTD with zero erasesize during device attachment. A local
privileged attacker could use this to cause a denial of service (system
crash). (CVE-2023-31085)
Manfred Rudigier discovered that the Intel(R) PCI-Express Gigabit (igb)
Ethernet driver in the Linux kernel did not properly validate received
frames that are larger than the set MTU size, leading to a buffer overflow
vulnerability. An attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-45871)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS:
linux-image-5.15.0-1033-gkeop 5.15.0-1033.39
linux-image-5.15.0-1047-gcp 5.15.0-1047.55
linux-image-5.15.0-1047-gke 5.15.0-1047.52
linux-image-5.15.0-1052-azure 5.15.0-1052.60
linux-image-5.15.0-1052-azure-fde 5.15.0-1052.60.1
linux-image-azure-fde-lts-22.04 5.15.0.1052.60.30
linux-image-azure-lts-22.04 5.15.0.1052.48
linux-image-gcp-lts-22.04 5.15.0.1047.43
linux-image-gke 5.15.0.1047.46
linux-image-gke-5.15 5.15.0.1047.46
linux-image-gkeop 5.15.0.1033.32
linux-image-gkeop-5.15 5.15.0.1033.32
Ubuntu 20.04 LTS:
linux-image-5.15.0-1033-gkeop 5.15.0-1033.39~20.04.1
linux-image-5.15.0-1047-gcp 5.15.0-1047.55~20.04.1
linux-image-5.15.0-1052-azure 5.15.0-1052.60~20.04.1
linux-image-5.15.0-1052-azure-fde 5.15.0-1052.60~20.04.1.1
linux-image-azure 5.15.0.1052.60~20.04.41
linux-image-azure-cvm 5.15.0.1052.60~20.04.41
linux-image-azure-fde 5.15.0.1052.60~20.04.1.30
linux-image-gcp 5.15.0.1047.55~20.04.1
linux-image-gkeop-5.15 5.15.0.1033.39~20.04.29
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-6496-2
https://ubuntu.com/security/notices/USN-6496-1
CVE-2023-25775, CVE-2023-31085, CVE-2023-45871
Package Information:
https://launchpad.net/ubuntu/+source/linux-azure/5.15.0-1052.60
https://launchpad.net/ubuntu/+source/linux-azure-fde/5.15.0-1052.60.1
https://launchpad.net/ubuntu/+source/linux-gcp/5.15.0-1047.55
https://launchpad.net/ubuntu/+source/linux-gke/5.15.0-1047.52
https://launchpad.net/ubuntu/+source/linux-gkeop/5.15.0-1033.39
https://launchpad.net/ubuntu/+source/linux-azure-5.15/5.15.0-1052.60~20.04.1
https://launchpad.net/ubuntu/+source/linux-azure-fde-5.15/5.15.0-1052.60~20.04.1.1
https://launchpad.net/ubuntu/+source/linux-gcp-5.15/5.15.0-1047.55~20.04.1
https://launchpad.net/ubuntu/+source/linux-gkeop-5.15/5.15.0-1033.39~20.04.1
[USN-6502-4] Linux kernel vulnerabilities
wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmVo1VIFAwAAAAAACgkQZ0GeRcM5nt1A
0gf/SPgvQqNocdFtmhOoNLPQRysIuZmjlksrJvrFV1Fgbcv5oG8reCG2KErq37ADBchMM9Qi3xf2
KMlyF99BFvYD06m05r2S/mlwq3K1WUPsoZ+70klin5GJ/wMYrVVuAjMvz3JdrllOxueK2+lPExr2
cB3HeTVp0hAC97HWzmr7Cd2P+Y3LPZPm/koMRyWjGZsv2qmW1mIgGELAzSSVx7ZQwBD4sz34JkV0
IJM0ZyRxApy64mYkJPi+VCD4geXDbd5L8JDChMFkyUEiZyw1mHd5A479wqN2sT6r8rxSNvAenB2o
aMWy9Zhxhce2RKQp9RFx/CQlAeKxvj0jQvqLotXUtQ==
=gBUM
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6502-4
November 30, 2023
linux-azure, linux-azure-6.2, linux-azure-fde-6.2, linux-gcp,
linux-gcp-6.2 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 23.04
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-azure: Linux kernel for Microsoft Azure Cloud systems
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-azure-6.2: Linux kernel for Microsoft Azure cloud systems
- linux-azure-fde-6.2: Linux kernel for Microsoft Azure CVM cloud systems
- linux-gcp-6.2: Linux kernel for Google Cloud Platform (GCP) systems
Details:
Ivan D Barrera, Christopher Bednarz, Mustafa Ismail, and Shiraz Saleem
discovered that the InfiniBand RDMA driver in the Linux kernel did not
properly check for zero-length STAG or MR registration. A remote attacker
could possibly use this to execute arbitrary code. (CVE-2023-25775)
Yu Hao discovered that the UBI driver in the Linux kernel did not properly
check for MTD with zero erasesize during device attachment. A local
privileged attacker could use this to cause a denial of service (system
crash). (CVE-2023-31085)
Manfred Rudigier discovered that the Intel(R) PCI-Express Gigabit (igb)
Ethernet driver in the Linux kernel did not properly validate received
frames that are larger than the set MTU size, leading to a buffer overflow
vulnerability. An attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-45871)
Maxim Levitsky discovered that the KVM nested virtualization (SVM)
implementation for AMD processors in the Linux kernel did not properly
handle x2AVIC MSRs. An attacker in a guest VM could use this to cause a
denial of service (host kernel crash). (CVE-2023-5090)
It was discovered that the SMB network file sharing protocol implementation
in the Linux kernel did not properly handle certain error conditions,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-5345)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 23.04:
linux-image-6.2.0-1017-azure 6.2.0-1017.17
linux-image-6.2.0-1019-gcp 6.2.0-1019.21
linux-image-azure 6.2.0.1017.17
linux-image-gcp 6.2.0.1019.19
Ubuntu 22.04 LTS:
linux-image-6.2.0-1017-azure 6.2.0-1017.17~22.04.1
linux-image-6.2.0-1017-azure-fde 6.2.0-1017.17~22.04.1.1
linux-image-6.2.0-1019-gcp 6.2.0-1019.21~22.04.1
linux-image-azure 6.2.0.1017.17~22.04.1
linux-image-azure-fde 6.2.0.1017.17~22.04.1.14
linux-image-gcp 6.2.0.1019.21~22.04.1
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-6502-4
https://ubuntu.com/security/notices/USN-6502-1
CVE-2023-25775, CVE-2023-31085, CVE-2023-45871, CVE-2023-5090,
CVE-2023-5345
Package Information:
https://launchpad.net/ubuntu/+source/linux-azure/6.2.0-1017.17
https://launchpad.net/ubuntu/+source/linux-gcp/6.2.0-1019.21
https://launchpad.net/ubuntu/+source/linux-azure-6.2/6.2.0-1017.17~22.04.1
https://launchpad.net/ubuntu/+source/linux-azure-fde-6.2/6.2.0-1017.17~22.04.1.1
https://launchpad.net/ubuntu/+source/linux-gcp-6.2/6.2.0-1019.21~22.04.1
[USN-6495-2] Linux kernel vulnerabilities
wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmVo1SQFAwAAAAAACgkQZ0GeRcM5nt0Z
Kwf/fHmNMadtrUWg5hrX31myzXWq9+65KLbos2oyJXZOUP+BKxPxBS3vgIDyD84IPWvqT6LnuE8d
NhH1R+6vJykHLDWfbt6bGhBfPHEDA47pVB+bQsImFJVlJe/Q3+HHF87chqrmmJzcZzSJvxDZElPb
O65volyZHBvFutJev3/FuyDyzS8UVKbKF0wiy209ub5BH8kNPUUWIh8OL0s1KaI/M3QAiOG9yc98
sOeJZtQAQgKDpWvNsOQlI3BxM8pYLSjSJkdmEwjAGvcVPdOpnktLQGntbU13sm2+7rCJrwbZ6f3B
+MSATLZOSpun/UJHFq72Sg83VGemQoqIeXUe4qz74w==
=j/vT
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6495-2
November 30, 2023
linux-azure, linux-azure-5.4, linux-gcp, linux-gcp-5.4, linux-gkeop
vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-azure: Linux kernel for Microsoft Azure Cloud systems
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-gkeop: Linux kernel for Google Container Engine (GKE) systems
- linux-azure-5.4: Linux kernel for Microsoft Azure cloud systems
- linux-gcp-5.4: Linux kernel for Google Cloud Platform (GCP) systems
Details:
Yu Hao discovered that the UBI driver in the Linux kernel did not properly
check for MTD with zero erasesize during device attachment. A local
privileged attacker could use this to cause a denial of service (system
crash). (CVE-2023-31085)
Manfred Rudigier discovered that the Intel(R) PCI-Express Gigabit (igb)
Ethernet driver in the Linux kernel did not properly validate received
frames that are larger than the set MTU size, leading to a buffer overflow
vulnerability. An attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-45871)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.04 LTS:
linux-image-5.4.0-1081-gkeop 5.4.0-1081.85
linux-image-5.4.0-1118-gcp 5.4.0-1118.127
linux-image-5.4.0-1120-azure 5.4.0-1120.127
linux-image-azure-lts-20.04 5.4.0.1120.113
linux-image-gcp-lts-20.04 5.4.0.1118.120
linux-image-gkeop 5.4.0.1081.79
linux-image-gkeop-5.4 5.4.0.1081.79
Ubuntu 18.04 LTS (Available with Ubuntu Pro):
linux-image-5.4.0-1118-gcp 5.4.0-1118.127~18.04.1
linux-image-5.4.0-1120-azure 5.4.0-1120.127~18.04.1
linux-image-azure 5.4.0.1120.93
linux-image-gcp 5.4.0.1118.94
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-6495-2
https://ubuntu.com/security/notices/USN-6495-1
CVE-2023-31085, CVE-2023-45871
Package Information:
https://launchpad.net/ubuntu/+source/linux-azure/5.4.0-1120.127
https://launchpad.net/ubuntu/+source/linux-gcp/5.4.0-1118.127
https://launchpad.net/ubuntu/+source/linux-gkeop/5.4.0-1081.85
[USN-6494-2] Linux kernel vulnerabilities
wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmVo1RIFAwAAAAAACgkQZ0GeRcM5nt0c
0gf/dxC7h+llvVFh/c863jjqPHEnTiUnCQdSthnNMJm/S+X7RDQ/sbCaGkdwsL/mkKYZf6/FVU79
ctqSyiGc7CemBlyk2GKJ5v0l1ZsiVNS658YmY5XvkNgCHL1EPsc1kokBHgsRBO36LLAULlwVyUCc
2xf/XzJPdBAKRhbxOHyr73QNNUvZGyUGCnh1y07cSkFZYGhGWi1tIXDnSxZjZOT4pSJy3oNIgMaB
VSFR3qCZBUBC7JDPIKFLUM7n4PPBtPZojKHLtL2k2Fa9vKOsBf0p3kCOXhpQTBLOnj1BVyjKpjSr
+u7qZrMVUjslm8MjXF6koVriKF3x58DO2rVuYgbD9A==
=6xqT
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6494-2
November 30, 2023
linux-azure, linux-azure-4.15, linux-gcp, linux-gcp-4.15 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)
- Ubuntu 14.04 LTS (Available with Ubuntu Pro)
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-azure-4.15: Linux kernel for Microsoft Azure Cloud systems
- linux-gcp-4.15: Linux kernel for Google Cloud Platform (GCP) systems
- linux-azure: Linux kernel for Microsoft Azure Cloud systems
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
Details:
Yu Hao discovered that the UBI driver in the Linux kernel did not properly
check for MTD with zero erasesize during device attachment. A local
privileged attacker could use this to cause a denial of service (system
crash). (CVE-2023-31085)
Lucas Leong discovered that the netfilter subsystem in the Linux kernel did
not properly validate some attributes passed from userspace. A local
attacker could use this to cause a denial of service (system crash) or
possibly expose sensitive information (kernel memory). (CVE-2023-39189)
Sunjoo Park discovered that the netfilter subsystem in the Linux kernel did
not properly validate u32 packets content, leading to an out-of-bounds read
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-39192)
Lucas Leong discovered that the netfilter subsystem in the Linux kernel did
not properly validate SCTP data, leading to an out-of-bounds read
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-39193)
Lucas Leong discovered that the Netlink Transformation (XFRM) subsystem in
the Linux kernel did not properly handle state filters, leading to an out-
of-bounds read vulnerability. A privileged local attacker could use this to
cause a denial of service (system crash) or possibly expose sensitive
information. (CVE-2023-39194)
Kyle Zeng discovered that the IPv4 implementation in the Linux kernel did
not properly handle socket buffers (skb) when performing IP routing in
certain circumstances, leading to a null pointer dereference vulnerability.
A privileged attacker could use this to cause a denial of service (system
crash). (CVE-2023-42754)
It was discovered that the USB ENE card reader driver in the Linux kernel
did not properly allocate enough memory when processing the storage device
boot blocks. A local attacker could use this to cause a denial of service
(system crash). (CVE-2023-45862)
Manfred Rudigier discovered that the Intel(R) PCI-Express Gigabit (igb)
Ethernet driver in the Linux kernel did not properly validate received
frames that are larger than the set MTU size, leading to a buffer overflow
vulnerability. An attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-45871)
Budimir Markovic discovered that the perf subsystem in the Linux kernel did
not properly handle event groups, leading to an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-5717)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 LTS (Available with Ubuntu Pro):
linux-image-4.15.0-1157-gcp 4.15.0-1157.174
linux-image-4.15.0-1172-azure 4.15.0-1172.187
linux-image-azure-lts-18.04 4.15.0.1172.140
linux-image-gcp-lts-18.04 4.15.0.1157.171
Ubuntu 16.04 LTS (Available with Ubuntu Pro):
linux-image-4.15.0-1157-gcp 4.15.0-1157.174~16.04.1
linux-image-4.15.0-1172-azure 4.15.0-1172.187~16.04.1
linux-image-azure 4.15.0.1172.156
linux-image-gcp 4.15.0.1157.147
linux-image-gke 4.15.0.1157.147
Ubuntu 14.04 LTS (Available with Ubuntu Pro):
linux-image-4.15.0-1172-azure 4.15.0-1172.187~14.04.1
linux-image-azure 4.15.0.1172.138
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-6494-2
https://ubuntu.com/security/notices/USN-6494-1
CVE-2023-31085, CVE-2023-39189, CVE-2023-39192, CVE-2023-39193,
CVE-2023-39194, CVE-2023-42754, CVE-2023-45862, CVE-2023-45871,
CVE-2023-5717
Wednesday, November 29, 2023
[USN-6528-1] OpenJDK 8 vulnerabilities
Ubuntu Security Notice USN-6528-1
November 29, 2023
openjdk-8 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 23.10
- Ubuntu 23.04
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)
Summary:
Several security issues were fixed in OpenJDK.
Software Description:
- openjdk-8: Open Source Java implementation
Details:
It was discovered that the HotSpot VM implementation in OpenJDK did not
properly validate bytecode blocks in certain situations. An attacker could
possibly use this to cause a denial of service. (CVE-2022-40433)
Carter Kozak discovered that OpenJDK, when compiling with AVX-512
instruction support enabled, could produce code that resulted in memory
corruption in certain situations. An attacker targeting applications built
in this way could possibly use this to cause a denial of service or execute
arbitrary code. In Ubuntu, OpenJDK defaults to not using AVX-512
instructions. (CVE-2023-22025)
It was discovered that the CORBA implementation in OpenJDK did not properly
perform deserialization of IOR string objects. An attacker could possibly
use this to bypass Java sandbox restrictions. (CVE-2023-22067)
It was discovered that OpenJDK did not properly perform PKIX certification
path validation in certain situations. An attacker could use this to cause
a denial of service. (CVE-2023-22081)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 23.10:
openjdk-8-jdk 8u392-ga-1~23.10
openjdk-8-jdk-headless 8u392-ga-1~23.10
openjdk-8-jre 8u392-ga-1~23.10
openjdk-8-jre-headless 8u392-ga-1~23.10
openjdk-8-jre-zero 8u392-ga-1~23.10
Ubuntu 23.04:
openjdk-8-jdk 8u392-ga-1~23.04
openjdk-8-jdk-headless 8u392-ga-1~23.04
openjdk-8-jre 8u392-ga-1~23.04
openjdk-8-jre-headless 8u392-ga-1~23.04
openjdk-8-jre-zero 8u392-ga-1~23.04
Ubuntu 22.04 LTS:
openjdk-8-jdk 8u392-ga-1~22.04
openjdk-8-jdk-headless 8u392-ga-1~22.04
openjdk-8-jre 8u392-ga-1~22.04
openjdk-8-jre-headless 8u392-ga-1~22.04
openjdk-8-jre-zero 8u392-ga-1~22.04
Ubuntu 20.04 LTS:
openjdk-8-jdk 8u392-ga-1~20.04
openjdk-8-jdk-headless 8u392-ga-1~20.04
openjdk-8-jre 8u392-ga-1~20.04
openjdk-8-jre-headless 8u392-ga-1~20.04
openjdk-8-jre-zero 8u392-ga-1~20.04
Ubuntu 18.04 LTS (Available with Ubuntu Pro):
openjdk-8-jdk 8u392-ga-1~18.04
openjdk-8-jdk-headless 8u392-ga-1~18.04
openjdk-8-jre 8u392-ga-1~18.04
openjdk-8-jre-headless 8u392-ga-1~18.04
openjdk-8-jre-zero 8u392-ga-1~18.04
Ubuntu 16.04 LTS (Available with Ubuntu Pro):
openjdk-8-jdk 8u392-ga-1~16.04
openjdk-8-jdk-headless 8u392-ga-1~16.04
openjdk-8-jre 8u392-ga-1~16.04
openjdk-8-jre-headless 8u392-ga-1~16.04
openjdk-8-jre-jamvm 8u392-ga-1~16.04
openjdk-8-jre-zero 8u392-ga-1~16.04
This update uses a new upstream release, which includes additional
bug fixes. After a standard system update you need to restart any
Java applications to make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6528-1
CVE-2022-40433, CVE-2023-22025, CVE-2023-22067, CVE-2023-22081
Package Information:
https://launchpad.net/ubuntu/+source/openjdk-8/8u392-ga-1~23.10
https://launchpad.net/ubuntu/+source/openjdk-8/8u392-ga-1~23.04
https://launchpad.net/ubuntu/+source/openjdk-8/8u392-ga-1~22.04
https://launchpad.net/ubuntu/+source/openjdk-8/8u392-ga-1~20.04
[USN-6527-1] OpenJDK vulnerabilities
Ubuntu Security Notice USN-6527-1
November 29, 2023
openjdk-17, openjdk-21, openjdk-lts vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 23.10
- Ubuntu 23.04
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
Summary:
Several security issues were fixed in OpenJDK 17, OpenJDK 21, OpenJDK.
Software Description:
- openjdk-17: Open Source Java implementation
- openjdk-21: Open Source Java implementation
- openjdk-lts: Open Source Java implementation
Details:
Carter Kozak discovered that OpenJDK, when compiling with AVX-512
instruction support enabled, could produce code that resulted in memory
corruption in certain situations. An attacker targeting applications built
in this way could possibly use this to cause a denial of service or execute
arbitrary code. In Ubuntu, OpenJDK defaults to not using AVX-512
instructions. (CVE-2023-22025)
It was discovered that OpenJDK did not properly perform PKIX certification
path validation in certain situations. An attacker could use this to cause
a denial of service. (CVE-2023-22081)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 23.10:
openjdk-11-jdk 11.0.21+9-0ubuntu1~23.10
openjdk-11-jdk-headless 11.0.21+9-0ubuntu1~23.10
openjdk-11-jre 11.0.21+9-0ubuntu1~23.10
openjdk-11-jre-headless 11.0.21+9-0ubuntu1~23.10
openjdk-11-jre-zero 11.0.21+9-0ubuntu1~23.10
openjdk-17-jdk 17.0.9+9-1~23.10
openjdk-17-jdk-headless 17.0.9+9-1~23.10
openjdk-17-jre 17.0.9+9-1~23.10
openjdk-17-jre-headless 17.0.9+9-1~23.10
openjdk-17-jre-zero 17.0.9+9-1~23.10
openjdk-21-jdk 21.0.1+12-2~23.10
openjdk-21-jdk-headless 21.0.1+12-2~23.10
openjdk-21-jre 21.0.1+12-2~23.10
openjdk-21-jre-headless 21.0.1+12-2~23.10
openjdk-21-jre-zero 21.0.1+12-2~23.10
Ubuntu 23.04:
openjdk-11-jdk 11.0.21+9-0ubuntu1~23.04
openjdk-11-jdk-headless 11.0.21+9-0ubuntu1~23.04
openjdk-11-jre 11.0.21+9-0ubuntu1~23.04
openjdk-11-jre-headless 11.0.21+9-0ubuntu1~23.04
openjdk-11-jre-zero 11.0.21+9-0ubuntu1~23.04
openjdk-17-jdk 17.0.9+9-1~23.04
openjdk-17-jdk-headless 17.0.9+9-1~23.04
openjdk-17-jre 17.0.9+9-1~23.04
openjdk-17-jre-headless 17.0.9+9-1~23.04
openjdk-17-jre-zero 17.0.9+9-1~23.04
openjdk-21-jdk 21.0.1+12-2~23.04
openjdk-21-jdk-headless 21.0.1+12-2~23.04
openjdk-21-jre 21.0.1+12-2~23.04
openjdk-21-jre-headless 21.0.1+12-2~23.04
openjdk-21-jre-zero 21.0.1+12-2~23.04
Ubuntu 22.04 LTS:
openjdk-11-jdk 11.0.21+9-0ubuntu1~22.04
openjdk-11-jdk-headless 11.0.21+9-0ubuntu1~22.04
openjdk-11-jre 11.0.21+9-0ubuntu1~22.04
openjdk-11-jre-headless 11.0.21+9-0ubuntu1~22.04
openjdk-11-jre-zero 11.0.21+9-0ubuntu1~22.04
openjdk-17-jdk 17.0.9+9-1~22.04
openjdk-17-jdk-headless 17.0.9+9-1~22.04
openjdk-17-jre 17.0.9+9-1~22.04
openjdk-17-jre-headless 17.0.9+9-1~22.04
openjdk-17-jre-zero 17.0.9+9-1~22.04
Ubuntu 20.04 LTS:
openjdk-11-jdk 11.0.21+9-0ubuntu1~20.04
openjdk-11-jdk-headless 11.0.21+9-0ubuntu1~20.04
openjdk-11-jre 11.0.21+9-0ubuntu1~20.04
openjdk-11-jre-headless 11.0.21+9-0ubuntu1~20.04
openjdk-11-jre-zero 11.0.21+9-0ubuntu1~20.04
openjdk-17-jdk 17.0.9+9-1~20.04
openjdk-17-jdk-headless 17.0.9+9-1~20.04
openjdk-17-jre 17.0.9+9-1~20.04
openjdk-17-jre-headless 17.0.9+9-1~20.04
openjdk-17-jre-zero 17.0.9+9-1~20.04
Ubuntu 18.04 LTS (Available with Ubuntu Pro):
openjdk-11-jdk 11.0.21+9-0ubuntu1~18.04
openjdk-11-jdk-headless 11.0.21+9-0ubuntu1~18.04
openjdk-11-jre 11.0.21+9-0ubuntu1~18.04
openjdk-11-jre-headless 11.0.21+9-0ubuntu1~18.04
openjdk-11-jre-zero 11.0.21+9-0ubuntu1~18.04
openjdk-17-jdk 17.0.9+9-1~18.04
openjdk-17-jdk-headless 17.0.9+9-1~18.04
openjdk-17-jre 17.0.9+9-1~18.04
openjdk-17-jre-headless 17.0.9+9-1~18.04
openjdk-17-jre-zero 17.0.9+9-1~18.04
This update uses a new upstream release, which includes additional
bug fixes. After a standard system update you need to restart any
Java applications to make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6527-1
CVE-2023-22025, CVE-2023-22081
Package Information:
https://launchpad.net/ubuntu/+source/openjdk-17/17.0.9+9-1~23.10
https://launchpad.net/ubuntu/+source/openjdk-21/21.0.1+12-2~23.10
https://launchpad.net/ubuntu/+source/openjdk-lts/11.0.21+9-0ubuntu1~23.10
https://launchpad.net/ubuntu/+source/openjdk-17/17.0.9+9-1~23.04
https://launchpad.net/ubuntu/+source/openjdk-21/21.0.1+12-2~23.04
https://launchpad.net/ubuntu/+source/openjdk-lts/11.0.21+9-0ubuntu1~23.04
https://launchpad.net/ubuntu/+source/openjdk-17/17.0.9+9-1~22.04
https://launchpad.net/ubuntu/+source/openjdk-lts/11.0.21+9-0ubuntu1~22.04
https://launchpad.net/ubuntu/+source/openjdk-17/17.0.9+9-1~20.04
https://launchpad.net/ubuntu/+source/openjdk-lts/11.0.21+9-0ubuntu1~20.04
[USN-6526-1] GStreamer Bad Plugins vulnerabilities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=x40v
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6526-1
November 29, 2023
gst-plugins-bad1.0 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 23.10
- Ubuntu 23.04
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
Summary:
Several security issues were fixed in GStreamer Bad Plugins.
Software Description:
- gst-plugins-bad1.0: GStreamer plugins
Details:
It was discovered that GStreamer Bad Plugins incorrectly handled certain
media files. A remote attacker could use this issue to cause GStreamer
Bad Plugins to crash, resulting in a denial of service, or possibly
execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 23.10:
gstreamer1.0-plugins-bad 1.22.4-1ubuntu1.1
libgstreamer-plugins-bad1.0-0 1.22.4-1ubuntu1.1
Ubuntu 23.04:
gstreamer1.0-plugins-bad 1.22.1-1ubuntu1.1
libgstreamer-plugins-bad1.0-0 1.22.1-1ubuntu1.1
Ubuntu 22.04 LTS:
gstreamer1.0-plugins-bad 1.20.3-0ubuntu1.1
libgstreamer-plugins-bad1.0-0 1.20.3-0ubuntu1.1
Ubuntu 20.04 LTS:
gstreamer1.0-plugins-bad 1.16.3-0ubuntu1.1
libgstreamer-plugins-bad1.0-0 1.16.3-0ubuntu1.1
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6526-1
CVE-2023-37329, CVE-2023-40474, CVE-2023-40475, CVE-2023-40476,
CVE-2023-44429, CVE-2023-44446
Package Information:
https://launchpad.net/ubuntu/+source/gst-plugins-bad1.0/1.22.4-1ubuntu1.1
https://launchpad.net/ubuntu/+source/gst-plugins-bad1.0/1.22.1-1ubuntu1.1
https://launchpad.net/ubuntu/+source/gst-plugins-bad1.0/1.20.3-0ubuntu1.1
https://launchpad.net/ubuntu/+source/gst-plugins-bad1.0/1.16.3-0ubuntu1.1
[USN-6519-2] EC2 hibagent update
Ubuntu Security Notice USN-6519-2
November 29, 2023
ec2-hibinit-agent update
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)
Summary:
A security improvement was added to EC2 hibagent.
Software Description:
- ec2-hibinit-agent: Amazon EC2 hibernation agent
Details:
USN-6519-1 added IMDSv2 support to EC2 hibagent. This update provides
the corresponding update for Ubuntu 16.04 LTS.
Original advisory details:
The EC2 hibagent package has been updated to add IMDSv2 support, as IMDSv1
uses an insecure protocol and is no longer recommended.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 16.04 LTS (Available with Ubuntu Pro):
ec2-hibinit-agent 1.0.0-0ubuntu4~16.04.4+esm1
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6519-2
https://ubuntu.com/security/notices/USN-6519-1
https://launchpad.net/bugs/1941785
[USN-6525-1] pysha3 vulnerability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=QD4Y
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6525-1
November 29, 2023
pysha3 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
Summary:
pysha3 could be made to crash or run programs if it received specially
crafted data.
Software Description:
- pysha3: SHA-3 (Keccak) hash implementation
Details:
Nicky Mouha discovered that pysha incorrectly handled certain SHA-3
operations. An attacker could possibly use this issue to cause pysha3 to
crash, resulting in a denial of service, or possibly execute arbitrary
code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS:
python3-sha3 1.0.2-4.2ubuntu0.22.04.1
Ubuntu 20.04 LTS:
python3-sha3 1.0.2-4ubuntu0.1
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6525-1
CVE-2022-37454
Package Information:
https://launchpad.net/ubuntu/+source/pysha3/1.0.2-4.2ubuntu0.22.04.1
https://launchpad.net/ubuntu/+source/pysha3/1.0.2-4ubuntu0.1
[USN-6524-1] PyPy vulnerability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=v78h
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6524-1
November 29, 2023
pypy3 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
Summary:
PyPy could be made to crash or run programs if it received specially
crafted data.
Software Description:
- pypy3: fast alternative implementation of Python 3.x
Details:
Nicky Mouha discovered that PyPy incorrectly handled certain SHA-3
operations. An attacker could possibly use this issue to cause PyPy to
crash, resulting in a denial of service, or possibly execute arbitrary
code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS:
pypy3 7.3.9+dfsg-1ubuntu0.1
Ubuntu 20.04 LTS:
pypy3 7.3.1+dfsg-4ubuntu0.1
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6524-1
CVE-2022-37454
Package Information:
https://launchpad.net/ubuntu/+source/pypy3/7.3.9+dfsg-1ubuntu0.1
https://launchpad.net/ubuntu/+source/pypy3/7.3.1+dfsg-4ubuntu0.1
[USN-6521-1] GIMP vulnerabilities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=m2Pi
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6521-1
November 29, 2023
gimp vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 23.10
- Ubuntu 23.04
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
Summary:
GIMP could be made to crash or run programs as your login if it
opened a specially crafted file.
Software Description:
- gimp: GNU Image Manipulation Program
Details:
It was discovered that GIMP incorrectly handled certain image files. If a
user were tricked into opening a specially crafted image, an attacker could
use this issue to cause GIMP to crash, resulting in a denial of service, or
possibly execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 23.10:
gimp 2.10.34-1ubuntu0.23.10.1
Ubuntu 23.04:
gimp 2.10.34-1ubuntu0.23.04.1
Ubuntu 22.04 LTS:
gimp 2.10.30-1ubuntu0.1
Ubuntu 20.04 LTS:
gimp 2.10.18-1ubuntu0.1
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6521-1
CVE-2022-30067, CVE-2022-32990, CVE-2023-44441, CVE-2023-44442,
CVE-2023-44443, CVE-2023-44444
Package Information:
https://launchpad.net/ubuntu/+source/gimp/2.10.34-1ubuntu0.23.10.1
https://launchpad.net/ubuntu/+source/gimp/2.10.34-1ubuntu0.23.04.1
https://launchpad.net/ubuntu/+source/gimp/2.10.30-1ubuntu0.1
https://launchpad.net/ubuntu/+source/gimp/2.10.18-1ubuntu0.1
[USN-6523-1] u-boot-nezha vulnerability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=RHbY
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6523-1
November 29, 2023
u-boot-nezha vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 23.04
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in u-boot-nezha.
Software Description:
- u-boot-nezha: U-Boot for Allwinner Nezha board
Details:
It was discovered that U-Boot incorrectly handled certain USB DFU download
setup packets. A local attacker could use this issue to cause U-Boot to
crash, resulting in a denial of service, or possibly execute arbitrary
code. (CVE-2022-2347)
Nicolas Bidron and Nicolas Guigo discovered that U-Boot incorrectly handled
certain fragmented IP packets. A local attacker could use this issue to
cause U-Boot to crash, resulting in a denial of service, or possibly
execute arbitrary code. (CVE-2022-30552, CVE-2022-30790)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 23.04:
u-boot-nezha 2022.10-1089-g528ae9bc6c-0ubuntu1.23.04.2
Ubuntu 22.04 LTS:
u-boot-nezha 2022.04+git20220405.7446a472-0ubuntu0.4
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6523-1
CVE-2022-2347, CVE-2022-30552, CVE-2022-30790
Package Information:
https://launchpad.net/ubuntu/+source/u-boot-nezha/2022.10-1089-g528ae9bc6c-0ubuntu1.23.04.2
https://launchpad.net/ubuntu/+source/u-boot-nezha/2022.04+git20220405.7446a472-0ubuntu0.4
[USN-6522-1] FreeRDP vulnerabilities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=oJ1R
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6522-1
November 29, 2023
freerdp2 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 23.10
- Ubuntu 23.04
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
Summary:
Several security issues were fixed in FreeRDP.
Software Description:
- freerdp2: RDP client for Windows Terminal Services
Details:
It was discovered that FreeRDP incorrectly handled drive redirection. If a
user were tricked into connection to a malicious server, a remote attacker
could use this issue to cause FreeRDP to crash, resulting in a denial of
service, or possibly obtain sensitive information. (CVE-2022-41877)
It was discovered that FreeRDP incorrectly handled certain surface updates.
A remote attacker could use this issue to cause FreeRDP to crash, resulting
in a denial of service, or possibly execute arbitrary code.
(CVE-2023-39352, CVE-2023-39356)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 23.10:
libfreerdp2-2 2.10.0+dfsg1-1.1ubuntu1.1
Ubuntu 23.04:
libfreerdp2-2 2.10.0+dfsg1-1ubuntu0.3
Ubuntu 22.04 LTS:
libfreerdp2-2 2.6.1+dfsg1-3ubuntu2.5
Ubuntu 20.04 LTS:
libfreerdp2-2 2.2.0+dfsg1-0ubuntu0.20.04.6
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6522-1
CVE-2022-41877, CVE-2023-39352, CVE-2023-39356
Package Information:
https://launchpad.net/ubuntu/+source/freerdp2/2.10.0+dfsg1-1.1ubuntu1.1
https://launchpad.net/ubuntu/+source/freerdp2/2.10.0+dfsg1-1ubuntu0.3
https://launchpad.net/ubuntu/+source/freerdp2/2.6.1+dfsg1-3ubuntu2.5
https://launchpad.net/ubuntu/+source/freerdp2/2.2.0+dfsg1-0ubuntu0.20.04.6
PSA: My Scarlet Letter
Hash: SHA256
Note: I have not read emails or other correspondence since 11/18/2023,
and will not do so until next week, at the earliest.
My name is Glen, and I am an alcoholic.
This is my scarlet letter.
After having been severely concerned about several things in my personal
life, I tried to take a step back and regain my composure, but failed.
On 11/18/2023, I drank 3 bottles of wine with about 45 Xanax.
The intent here was quite clear.
I attempted to commit suicide.
I ended up in an insane asylum, for a bit over the past week or so.
I have recently been toxic to the Project, and cannot allow such
behavior to continue to affect the Project I love.
I need to leave.
As of this writing, gjb@ is dead. May he rest in peace.
Please, if you or are loved one are experiencing a crisis, please use your
local or national resources to seek help on suicide prevention, substance
abuse, alcohol abuse, and mental disorders.
Glen
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCAAdFiEEjRJAPC5sqwhs9k2jAxRYpUeP4pMFAmVm2j4ACgkQAxRYpUeP
4pPaiA//a5Jbv5ibcj9ixCaHnwsi3GOaTV9L42IJh94nCjxtAsdLyQXtf1lOh2na
2cNWPAX/5mQZfoBiGRwTDO8inp/Von0iIZrForksZjChNISPReEbzoWSIoo1xHTh
n86sRWHDX8AMUZmgKD6Y3tlHKGZdBh5/Ywb82a1w/1eaTDzgoLNPh/HjXrZb02kf
lD9qhEKy2hmuy8vBxh5REYsBAL++0JvSFekw1eifVplHNvV3f6TZIPajFGX5cFKm
fl11UGuf9CkfPtnjiANUALsH1eGZB6XmQij58MGKfXe96zZn7k43z8ed4EUlqXth
LlIuTBPeRaGa4bq29F1diuYnSpetUuf0zCczskyHaZPAUzHDq+tat7xnoGJCOY1F
Yai2KUzd/Aa9e/ygA8zxJ7gy3fqFpJKiLlXD07eVMPc7OuTU2OaxijpSnPzX5gpk
3ZJ6p2KWFrLnjvNYynqULUpmZYgeixZQMBNn2CeskhxR9+K1eP7v0YOcWLA1Xdsr
yRqp+17sPQM0d9zDgSj9XO1v0e3DAvuwjUPJ1SjhqsEtrnJ5K7ZBhQ8RUosEUoJG
mQyF6hQsboOoTw5Js7rKB3+qcWe7o/psO0a0ImTNxkj7L8L7SvLi7SOuWpR9NIDe
P6YgQ5KDCzi9W9KuaKMiC8sxZyd6YvZKNsrnuCzQzZpTifjcg6I=
=+Tgz
-----END PGP SIGNATURE-----
Tuesday, November 28, 2023
[USN-6508-2] poppler regression
Ubuntu Security Notice USN-6508-2
November 28, 2023
poppler regression
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
Summary:
USN-6508-1 caused some minor regressions in poppler.
Software Description:
- poppler: PDF rendering library
Details:
USN-6508-1 fixed vulnerabilities in poppler. The update introduced
one minor regression in Ubuntu 18.04 LTS. This update fixes the
problem.
We apologize for the inconvenience.
Original advisory details:
It was discovered that poppler incorrectly handled certain malformed PDF
files. If a user or an automated system were tricked into opening a
specially crafted PDF file, a remote attacker could possibly use this
issue to cause a denial of service. This issue only affected Ubuntu 16.04
LTS, Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-23804)
It was discovered that poppler incorrectly handled certain malformed PDF
files. If a user or an automated system were tricked into opening a
specially crafted PDF file, a remote attacker could possibly use this
issue to cause a denial of service. (CVE-2022-37050, CVE-2022-37051,
CVE-2022-37052, CVE-2022-38349)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 LTS (Available with Ubuntu Pro):
libpoppler73 0.62.0-2ubuntu2.14+esm3
poppler-utils 0.62.0-2ubuntu2.14+esm3
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6508-2
https://ubuntu.com/security/notices/USN-6508-1
https://launchpad.net/bugs/2045027
Re: FESCo Nominations are now Open!
There is still time to nominate yourself or someone else (with their knowledge and
approval) for FESCo https://fedoraproject.org/wiki/Development/SteeringCommittee/Nominations
Nominations will close tomorrow night so don't delay! :)
Kind regards,
Aoife
--
_______________________________________________
devel-announce mailing list -- devel-announce@lists.fedoraproject.org
To unsubscribe send an email to devel-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/devel-announce@lists.fedoraproject.org
Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
Re: Fedora Mindshare Committee election nominations are open!
There is still time to nominate yourself or someone else (with their knowledge and approval) for the Fedora Mindshare Committee
https://fedoraproject.org/wiki/Mindshare/Nominations
Nominations will close tomorrow night so don't delay! :)
Kind regards,
Aoife
--
_______________________________________________
devel-announce mailing list -- devel-announce@lists.fedoraproject.org
To unsubscribe send an email to devel-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/devel-announce@lists.fedoraproject.org
Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
Re: Fedora Council election nominations are open!
There is still time to nominate yourself or someone else (with their knowledge and approval) for the Fedora Council https://fedoraproject.org/wiki/Council/Nominations
Nominations will close tomorrow night so dont delay! :)
Kind regards,
Aoife
--
_______________________________________________
devel-announce mailing list -- devel-announce@lists.fedoraproject.org
To unsubscribe send an email to devel-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/devel-announce@lists.fedoraproject.org
Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
[USN-6502-3] Linux kernel (NVIDIA) vulnerabilities
wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmVmTowFAwAAAAAACgkQZ0GeRcM5nt2o
VAf+J48kPDaLeZw+0J+eyDHatzJWfKyUG1wqM3rqFM+6csGKCeXYGXOZ+E6JXYRmrFjTdgOb9mGm
SV3lZpJ2k1gzOLAG3NH+F2PBog7nZNrQVbxBtGL/VNsOY/Pz6Cf0utTJB36QF6RSpOZyY29fa4L1
/rb15XoXNvgpFpzVWUoZCely3MsyPBHQeaNwzQFffbuLmJGSf3vKtpYmk7gQ3INzzYxAXoP+UW1R
wJ99+K9brAHFZ3yRfSK8FJdVSjWjV0+ZyfwbQI4NFqKlcTcL1eAZFir1EWNVmY6/HUcp5ZB8iNAe
5xvCH9c4Pe+6anU75RDSG3Jflvvv8DwN+LYJeJXHag==
=UNUq
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6502-3
November 28, 2023
linux-nvidia-6.2 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-nvidia-6.2: Linux kernel for NVIDIA systems
Details:
Ivan D Barrera, Christopher Bednarz, Mustafa Ismail, and Shiraz Saleem
discovered that the InfiniBand RDMA driver in the Linux kernel did not
properly check for zero-length STAG or MR registration. A remote attacker
could possibly use this to execute arbitrary code. (CVE-2023-25775)
Yu Hao discovered that the UBI driver in the Linux kernel did not properly
check for MTD with zero erasesize during device attachment. A local
privileged attacker could use this to cause a denial of service (system
crash). (CVE-2023-31085)
Manfred Rudigier discovered that the Intel(R) PCI-Express Gigabit (igb)
Ethernet driver in the Linux kernel did not properly validate received
frames that are larger than the set MTU size, leading to a buffer overflow
vulnerability. An attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-45871)
Maxim Levitsky discovered that the KVM nested virtualization (SVM)
implementation for AMD processors in the Linux kernel did not properly
handle x2AVIC MSRs. An attacker in a guest VM could use this to cause a
denial of service (host kernel crash). (CVE-2023-5090)
It was discovered that the SMB network file sharing protocol implementation
in the Linux kernel did not properly handle certain error conditions,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-5345)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS:
linux-image-6.2.0-1012-nvidia 6.2.0-1012.12
linux-image-6.2.0-1012-nvidia-64k 6.2.0-1012.12
linux-image-nvidia-6.2 6.2.0.1012.14
linux-image-nvidia-64k-6.2 6.2.0.1012.14
linux-image-nvidia-64k-hwe-22.04 6.2.0.1012.14
linux-image-nvidia-hwe-22.04 6.2.0.1012.14
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-6502-3
https://ubuntu.com/security/notices/USN-6502-1
CVE-2023-25775, CVE-2023-31085, CVE-2023-45871, CVE-2023-5090,
CVE-2023-5345
Package Information:
https://launchpad.net/ubuntu/+source/linux-nvidia-6.2/6.2.0-1012.12
[USN-6520-1] Linux kernel (StarFive) vulnerabilities
wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmVmToEFAwAAAAAACgkQZ0GeRcM5nt25
1AgAodZB1yicV9GR8CzI+0jbwmDAsPLL4FqPVJqIhNAZaacagGkUy/kHWry0+KBwlLGROcnNohPL
J841fyCZq6R+ZF/HnymHF5/dqiMeChxmKjHE2cUm5/xVSMkqK/pn0BMT3ixKTZkx3OkWDVOaC6/r
bgpPuB6lUHRGAgA1DCGIRfXdxazTLpjjX8T9kDsfHkiQ1cg4zjg5KqIMFQAnGTd5E+e1VS+0zunb
C2l/ZNFSZ5AjFsGvBrFxVPIMZcTY2KpAqgN7mWuOfKulrUXHvTF03Jv40PRyPB6caeFe4DVHkjpJ
6S0/9GajCpQgSlD2vpg79YgywHdd50aYuzbcJQ8QIQ==
=jvfs
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6520-1
November 28, 2023
linux-starfive-6.2 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-starfive-6.2: Linux kernel for StarFive processors
Details:
Ivan D Barrera, Christopher Bednarz, Mustafa Ismail, and Shiraz Saleem
discovered that the InfiniBand RDMA driver in the Linux kernel did not
properly check for zero-length STAG or MR registration. A remote attacker
could possibly use this to execute arbitrary code. (CVE-2023-25775)
Yu Hao and Weiteng Chen discovered that the Bluetooth HCI UART driver in
the Linux kernel contained a race condition, leading to a null pointer
dereference vulnerability. A local attacker could use this to cause a
denial of service (system crash). (CVE-2023-31083)
Yu Hao discovered that the UBI driver in the Linux kernel did not properly
check for MTD with zero erasesize during device attachment. A local
privileged attacker could use this to cause a denial of service (system
crash). (CVE-2023-31085)
Lin Ma discovered that the Netlink Transformation (XFRM) subsystem in the
Linux kernel contained a null pointer dereference vulnerability in some
situations. A local privileged attacker could use this to cause a denial of
service (system crash). (CVE-2023-3772)
Chih-Yen Chang discovered that the KSMBD implementation in the Linux kernel
did not properly validate SMB request protocol IDs, leading to a out-of-
bounds read vulnerability. A remote attacker could possibly use this to
cause a denial of service (system crash). (CVE-2023-38430)
Chih-Yen Chang discovered that the KSMBD implementation in the Linux kernel
did not properly validate command payload size, leading to a out-of-bounds
read vulnerability. A remote attacker could possibly use this to cause a
denial of service (system crash). (CVE-2023-38432)
It was discovered that the NFC implementation in the Linux kernel contained
a use-after-free vulnerability when performing peer-to-peer communication
in certain conditions. A privileged attacker could use this to cause a
denial of service (system crash) or possibly expose sensitive information
(kernel memory). (CVE-2023-3863)
Laurence Wit discovered that the KSMBD implementation in the Linux kernel
did not properly validate a buffer size in certain situations, leading to
an out-of-bounds read vulnerability. A remote attacker could use this to
cause a denial of service (system crash) or possibly expose sensitive
information. (CVE-2023-3865)
Laurence Wit discovered that the KSMBD implementation in the Linux kernel
contained a null pointer dereference vulnerability when handling handling
chained requests. A remote attacker could use this to cause a denial of
service (system crash). (CVE-2023-3866)
It was discovered that the KSMBD implementation in the Linux kernel did not
properly handle session setup requests, leading to an out-of-bounds read
vulnerability. A remote attacker could use this to expose sensitive
information. (CVE-2023-3867)
It was discovered that the Siano USB MDTV receiver device driver in the
Linux kernel did not properly handle device initialization failures in
certain situations, leading to a use-after-free vulnerability. A physically
proximate attacker could use this cause a denial of service (system crash).
(CVE-2023-4132)
It was discovered that a race condition existed in the Cypress touchscreen
driver in the Linux kernel during device removal, leading to a use-after-
free vulnerability. A physically proximate attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-4134)
Thelford Williams discovered that the Ceph file system messenger protocol
implementation in the Linux kernel did not properly validate frame segment
length in certain situation, leading to a buffer overflow vulnerability. A
remote attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-44466)
Manfred Rudigier discovered that the Intel(R) PCI-Express Gigabit (igb)
Ethernet driver in the Linux kernel did not properly validate received
frames that are larger than the set MTU size, leading to a buffer overflow
vulnerability. An attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-45871)
Maxim Levitsky discovered that the KVM nested virtualization (SVM)
implementation for AMD processors in the Linux kernel did not properly
handle x2AVIC MSRs. An attacker in a guest VM could use this to cause a
denial of service (host kernel crash). (CVE-2023-5090)
It was discovered that the SMB network file sharing protocol implementation
in the Linux kernel did not properly handle certain error conditions,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-5345)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS:
linux-image-6.2.0-1009-starfive 6.2.0-1009.10~22.04.1
linux-image-starfive 6.2.0.1009.10~22.04.2
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-6520-1
CVE-2023-25775, CVE-2023-31083, CVE-2023-31085, CVE-2023-3772,
CVE-2023-38430, CVE-2023-38432, CVE-2023-3863, CVE-2023-3865,
CVE-2023-3866, CVE-2023-3867, CVE-2023-4132, CVE-2023-4134,
CVE-2023-44466, CVE-2023-45871, CVE-2023-5090, CVE-2023-5345
Package Information:
https://launchpad.net/ubuntu/+source/linux-starfive-6.2/6.2.0-1009.10~22.04.1
[USN-6519-1] EC2 hibagent update
Ubuntu Security Notice USN-6519-1
November 28, 2023
ec2-hibinit-agent update
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
Summary:
A security improvement was added to EC2 hibagent.
Software Description:
- ec2-hibinit-agent: Amazon EC2 hibernation agent
Details:
The EC2 hibagent package has been updated to add IMDSv2 support, as IMDSv1
uses an insecure protocol and is no longer recommended.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 LTS (Available with Ubuntu Pro):
ec2-hibinit-agent 1.0.0-0ubuntu4~18.04.6+esm1
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6519-1
https://launchpad.net/bugs/1941785
Fedora 37 End Of Life in one week
Fedora Linux 37 will go end of life for updates and support on 2023-12-05.
No more updates of any kind, including security updates or security
announcements, will be available for Fedora Linux 37 after the said
date. All the updates of Fedora Linux 37 being pushed to stable will also be stopped.
propose improvements or changes to it.
Regards,
Fedora Release Engineering
[1]https://fedoraproject.org/wiki/Fedora_Release_Life_Cycle#Maintenance_Schedule
[2]https://fedoraproject.org/wiki/Upgrading?rd=DistributionUpgrades
--
[USN-6518-1] AFFLIB vulnerability
wsB5BAABCAAjFiEE5rkwSLC9ntq84w397Dtram9gyMMFAmVmKqwFAwAAAAAACgkQ7Dtram9gyMNY
hQgAggqfMt+/eDHzBKCML0dASKs3VhXkVr2IjyV9OxPGiQO/+s3Fg1DzG/FR/qzDm+2GAY5sPXXX
5aQsiE+HjtLfLq76Kfc+5mmRhZSjitShQqonZQZ1WpPqqPFdfZOHE/809oOzCnJZLZdbneKdzsE5
flUzU/fgFeOBU0CzlVGKqgHghxjZdQ68Mk23NiXpe3vCLuxKZcZTLDV0VyBhJTDJpKt6Vh03abx5
9HurfGKiB6la5hBmyR6lnVICFl+540zGe5XEvIlt0H/TECTqmNTjL+Mvq4aA96Qj8BBfMI+5T2Lm
zz/kpt9+Kt6UF4Wh3C8ma2rEFhrUNii1TsA6OS4DQQ==
=OYLI
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6518-1
November 28, 2023
afflib vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)
Summary:
AFFLIB could be made to crash if it opened a specially crafted
file.
Software Description:
- afflib: Advanced Forensics Format Library
Details:
Luis Rocha discovered that AFFLIB incorrectly handled certain input files.
If a user or automated system were tricked into processing a specially
crafted AFF image file, a remote attacker could possibly use this issue
to cause a denial of service via application crash. (CVE-2018-8050)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 LTS (Available with Ubuntu Pro):
afflib-tools 3.7.16-2ubuntu0.1~esm1
libafflib0v5 3.7.16-2ubuntu0.1~esm1
Ubuntu 16.04 LTS (Available with Ubuntu Pro):
afflib-tools 3.7.7-3ubuntu0.1~esm1
libafflib0v5 3.7.7-3ubuntu0.1~esm1
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6518-1
CVE-2018-8050
OpenBSD Errata: November 29, 2023 (perl)
Binary updates for the amd64, arm64 and i386 platform are available
via the syspatch utility. Source code patches can be found on the
respective errata page:
https://www.openbsd.org/errata73.html
https://www.openbsd.org/errata74.html
[LSN-0099-1] Linux kernel vulnerability
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 ESM
- Ubuntu 22.04 LTS
- Ubuntu 14.04 ESM
Summary
Several security issues were fixed in the kernel.
Software Description
- linux - Linux kernel
- linux-aws - Linux kernel for Amazon Web Services (AWS) systems
- linux-azure - Linux kernel for Microsoft Azure Cloud systems
- linux-gcp - Linux kernel for Google Cloud Platform (GCP) systems
- linux-gke - Linux kernel for Google Container Engine (GKE) systems
- linux-gkeop - Linux kernel for Google Container Engine (GKE) systems
- linux-ibm - Linux kernel for IBM cloud systems
Details
It was discovered that the Xen netback driver in the Linux kernel did
not properly handle packets structured in certain ways. An attacker in a
guest VM could possibly use this to cause a denial of service (host NIC
availability). (CVE-2022-3643)
It was discovered that the virtual terminal driver in the Linux kernel
contained a use-after-free vulnerability. A local attacker could use
this to cause a denial of service (system crash) or possibly expose
sensitive information (kernel memory). (CVE-2023-3567)
It was discovered that the universal 32bit network packet classifier
implementation in the Linux kernel did not properly perform reference
counting in some situations, leading to a use-after-free vulnerability.
A local attacker could use this to cause a denial of service (system
crash) or possibly execute arbitrary code. (CVE-2023-3609)
It was discovered that the network packet classifier with
netfilter/firewall marks implementation in the Linux kernel did not
properly handle reference counting, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code.
(CVE-2023-3776)
Kevin Rich discovered that the netfilter subsystem in the Linux kernel
did not properly handle table rules flush in certain circumstances. A
local attacker could possibly use this to cause a denial of service
(system crash) or execute arbitrary code. (CVE-2023-3777)
Kevin Rich discovered that the netfilter subsystem in the Linux kernel
did not properly handle rule additions to bound chains in certain
circumstances. A local attacker could possibly use this to cause a
denial of service (system crash) or execute arbitrary code.
(CVE-2023-3995)
It was discovered that the netfilter subsystem in the Linux kernel did
not properly handle PIPAPO element removal, leading to a use-after-free
vulnerability. A local attacker could possibly use this to cause a
denial of service (system crash) or execute arbitrary code.
(CVE-2023-4004)
Bing-Jhong Billy Jheng discovered that the Unix domain socket
implementation in the Linux kernel contained a race condition in certain
situations, leading to a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-4622)
Budimir Markovic discovered that the qdisc implementation in the Linux
kernel did not properly validate inner classes, leading to a
use-after-free vulnerability. A local user could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-4623)
Alex Birnberg discovered that the netfilter subsystem in the Linux
kernel did not properly validate register length, leading to an out-of-
bounds write vulnerability. A local attacker could possibly use this to
cause a denial of service (system crash). (CVE-2023-4881)
Kevin Rich discovered that the netfilter subsystem in the Linux kernel
did not properly handle removal of rules from chain bindings in certain
circumstances, leading to a use-after-free vulnerability. A local
attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2023-5197)
Gwangun Jung discovered that the Quick Fair Queueing scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code.
(CVE-2023-31436)
Ross Lagerwall discovered that the Xen netback backend driver in the
Linux kernel did not properly handle certain unusual packets from a
paravirtualized network frontend, leading to a buffer overflow. An
attacker in a guest VM could use this to cause a denial of service (host
system crash) or possibly execute arbitrary code. (CVE-2023-34319)
It was discovered that the bluetooth subsystem in the Linux kernel did
not properly handle L2CAP socket release, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code.
(CVE-2023-40283)
Kyle Zeng discovered that the networking stack implementation in the
Linux kernel did not properly validate skb object size in certain
conditions. An attacker could use this cause a denial of service (system
crash) or possibly execute arbitrary code. (CVE-2023-42752)
Kyle Zeng discovered that the netfiler subsystem in the Linux kernel did
not properly calculate array offsets, leading to a out-of-bounds write
vulnerability. A local user could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-42753)
Update instructions
The problem can be corrected by updating your kernel livepatch to the
following versions:
Ubuntu 20.04 LTS
aws - 99.1
aws - 99.2
azure - 99.1
gcp - 99.1
gcp - 99.2
generic - 99.1
generic - 99.2
gke - 99.1
gke - 99.2
gkeop - 99.1
ibm - 99.1
ibm - 99.2
lowlatency - 99.1
lowlatency - 99.2
Ubuntu 18.04 LTS
aws - 99.1
azure - 99.1
gcp - 99.1
generic - 99.1
ibm - 99.1
lowlatency - 99.1
Ubuntu 16.04 ESM
aws - 99.1
azure - 99.1
gcp - 99.1
generic - 99.1
lowlatency - 99.1
Ubuntu 22.04 LTS
aws - 99.1
aws - 99.2
azure - 99.1
azure - 99.2
gcp - 99.1
gcp - 99.2
generic - 99.1
generic - 99.2
gke - 99.1
gke - 99.2
ibm - 99.1
ibm - 99.2
Ubuntu 14.04 ESM
generic - 99.1
lowlatency - 99.1
Support Information
Livepatches for supported LTS kernels will receive upgrades for a period
of up to 13 months after the build date of the kernel.
Livepatches for supported HWE kernels which are not based on an LTS
kernel version will receive upgrades for a period of up to 9 months
after the build date of the kernel, or until the end of support for that
kernel's non-LTS distro release version, whichever is sooner.
References
- CVE-2022-3643
- CVE-2023-3567
- CVE-2023-3609
- CVE-2023-3776
- CVE-2023-3777
- CVE-2023-3995
- CVE-2023-4004
- CVE-2023-4622
- CVE-2023-4623
- CVE-2023-4881
- CVE-2023-5197
- CVE-2023-31436
- CVE-2023-34319
- CVE-2023-40283
- CVE-2023-42752
- CVE-2023-42753