This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============7519673657725840560== Content-Language: en-US Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------1pzHSOuWeFhfUOkdXWl2fPpN"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --------------1pzHSOuWeFhfUOkdXWl2fPpN Content-Type: multipart/mixed; boundary="------------JfT3eBequU3ntDOILPLKYy3j"; protected-headers="v1" From: Rodrigo Figueiredo Zaiden <rodrigo.zaiden@canonical.com> Reply-To: security@ubuntu.com To: ubuntu-security-announce@lists.ubuntu.com Message-ID: <1ccf5e12-8285-4efb-ab84-de66c4dabad7@canonical.com> Subject: [USN-6537-1] Linux kernel (GCP) vulnerabilities
--------------JfT3eBequU3ntDOILPLKYy3j Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: base64
========================================================================== Ubuntu Security Notice USN-6537-1 December 06, 2023
linux-gcp vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 23.10
Summary:
Several security issues were fixed in the Linux kernel.
Software Description: - linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
Details:
Yu Hao discovered that the UBI driver in the Linux kernel did not properly check for MTD with zero erasesize during device attachment. A local privileged attacker could use this to cause a denial of service (system crash). (CVE-2023-31085)
Lucas Leong discovered that the netfilter subsystem in the Linux kernel did not properly validate some attributes passed from userspace. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information (kernel memory). (CVE-2023-39189)
Bien Pham discovered that the netfiler subsystem in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. A local user could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-4244)
Kyle Zeng discovered that the IPv4 implementation in the Linux kernel did not properly handle socket buffers (skb) when performing IP routing in certain circumstances, leading to a null pointer dereference vulnerability. A privileged attacker could use this to cause a denial of service (system crash). (CVE-2023-42754)
Yikebaer Aizezi discovered that the ext4 file system implementation in the Linux kernel contained a use-after-free vulnerability when handling inode extent metadata. An attacker could use this to construct a malicious ext4 file system image that, when mounted, could cause a denial of service (system crash). (CVE-2023-45898)
Maxim Levitsky discovered that the KVM nested virtualization (SVM) implementation for AMD processors in the Linux kernel did not properly handle x2AVIC MSRs. An attacker in a guest VM could use this to cause a denial of service (host kernel crash). (CVE-2023-5090)
Jason Wang discovered that the virtio ring implementation in the Linux kernel did not properly handle iov buffers in some situations. A local attacker in a guest VM could use this to cause a denial of service (host system crash). (CVE-2023-5158)
Alon Zahavi discovered that the NVMe-oF/TCP subsystem in the Linux kernel did not properly handle queue initialization failures in certain situations, leading to a use-after-free vulnerability. A remote attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-5178)
It was discovered that the SMB network file sharing protocol implementation in the Linux kernel did not properly handle certain error conditions, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-5345)
Murray McAllister discovered that the VMware Virtual GPU DRM driver in the Linux kernel did not properly handle memory objects when storing surfaces, leading to a use-after-free vulnerability. A local attacker in a guest VM could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-5633)
Budimir Markovic discovered that the perf subsystem in the Linux kernel did not properly handle event groups, leading to an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-5717)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 23.10: linux-image-6.5.0-1010-gcp 6.5.0-1010.10 linux-image-gcp 6.5.0.1010.10
After a standard system update you need to reboot your computer to make all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.
References: https://ubuntu.com/security/notices/USN-6537-1 CVE-2023-31085, CVE-2023-39189, CVE-2023-4244, CVE-2023-42754, CVE-2023-45898, CVE-2023-5090, CVE-2023-5158, CVE-2023-5178, CVE-2023-5345, CVE-2023-5633, CVE-2023-5717
Package Information: https://launchpad.net/ubuntu/+source/linux-gcp/6.5.0-1010.10
--------------JfT3eBequU3ntDOILPLKYy3j--
--------------1pzHSOuWeFhfUOkdXWl2fPpN Content-Type: application/pgp-signature; name="OpenPGP_signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="OpenPGP_signature.asc"
-----BEGIN PGP SIGNATURE-----
wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmVwjNAFAwAAAAAACgkQZ0GeRcM5nt2V CQf/cEhJH38CFhhdbZGlsKs4NIBSjdB2EvW0VkjJ6nyOA9O4cecLfKNNLA8vX6wYwrYDpQmpAfpP 5FXdtExmAdk9PmKX8RzRuHsrIkTNa8ElFm4Ih5a7EGpRV010u15doRXgG3t2L/ciNjBllERxZipF KMF8WOJZ5zg3DIDtDQw/RYJLQKeCVHp1ohb27DA5mHaBZVlr6hlnYd6UkMwNgemPNIJNi6ZC4q/K hB/QdfkI+ovAktw0ATSSADvA+yq/7x8nUvV63jz7CbPkR6laAHPAvDhE8Fm+7eWYy9ITBzeDzA1W IWkAH2OcZQCyoRFvWb8aS5hlRTc/m/l+raxVfE8tAw== =jPl2 -----END PGP SIGNATURE-----
--------------1pzHSOuWeFhfUOkdXWl2fPpN--
--===============7519673657725840560== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
Cg==
--===============7519673657725840560==--
|