Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2023.2737 linux security update 15 May 2023 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: linux kernel Publisher: Debian Operating System: Debian GNU/Linux Resolution: Patch/Upgrade CVE Names: CVE-2023-32233 CVE-2023-31436 CVE-2023-0386 Original Bulletin: http://www.debian.org/security/2023/dsa-5402 Comment: CVSS (Max): 7.8 CVE-2023-31436 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) CVSS Source: [NVD], Red Hat Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - - ------------------------------------------------------------------------- Debian Security Advisory DSA-5402-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso May 13, 2023 https://www.debian.org/security/faq - - ------------------------------------------------------------------------- Package : linux CVE ID : CVE-2023-0386 CVE-2023-31436 CVE-2023-32233 Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. CVE-2023-0386 It was discovered that under certain conditions the overlayfs filesystem implementation did not properly handle copy up operations. A local user permitted to mount overlay mounts in user namespaces can take advantage of this flaw for local privilege escalation. CVE-2023-31436 Gwangun Jung reported a a flaw causing heap out-of-bounds read/write errors in the traffic control subsystem for the Quick Fair Queueing scheduler (QFQ) which may result in information leak, denial of service or privilege escalation. CVE-2023-32233 Patryk Sondej and Piotr Krysiuk discovered a use-after-free flaw in the Netfilter nf_tables implementation when processing batch requests, which may result in local privilege escalation for a user with the CAP_NET_ADMIN capability in any user or network namespace. For the stable distribution (bullseye), these problems have been fixed in version 5.10.179-1. We recommend that you upgrade your linux packages. For the detailed security status of linux please refer to its security tracker page at: https://security-tracker.debian.org/tracker/linux Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org - -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmRfblBfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0S/ehAAimoZ2PphbMF53apge94ZKEnKKG2k43nEIDBumQsa8tFCmVxHKrxTV+qo 2OnkmuXO2W7kexlHNtnHfKie7pYI+0vLrxNQqyBBDHfUAvUC7cvVgZUG+O+K9v+r TY60UJBkVwW3bY99MUMtwSsy0pN7dHqc/YQTWacPYSVuZ/GRn5/PLhDu9p6vdROD BxYtcGF93I0EfGgjCqPZ16rivCwtIck4/GaQCBgypDa2N0h92Y/uTEebaA3LEC72 DuiJc1kPHpecGe11Xay1+KVt0q3CjwAxbjj740t/ySn+OzGqbSRpLk5IIsLuZL8F hh+tsB3PDTpO9yOVNokO7h0wlja03uVFyddwPf8jkv0fsFo26OTkl1aISA6/gmT2 hymNBwPs5OAxX2f7Fe9jwHllBlLCb+xwiejBcrdNUMOsG2Krd7B5ABlj4shQPylQ 9NxPHgk9GrCjBFcRaCPoQBaIw5AT7R3Rv7xkyH/XzlXCvuckiJlZMwIw7AVDnRtv orZ42xSxaZu1AyIVv48f2JinLrLTBIjj7BQrzq5M+9SXL3bGbv9ChzwoxSK7STc4 UJ13fZxmQbC50c0xmT1VbiYDIeE85cCOkuF+Heyqw3vJioFFl9tHEt8GT1FrHoUl 9IcX1l0CB62Sh7s8jdFnvSVur5ZfZbXyUIxWeNIHrF9PinQsVJY= =sqnY - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBZGGW1MkNZI30y1K9AQhktBAAhXLTuJCfw194WTGqWyBrIOHVBghc/ap0 k6cLJpcHVl521Fhm4hYHuphRuKHAh4JjzdINtFB45tCrbI+OymXXPxZFs+MmD7l1 LeZ0eCOxEq9HJI9xq+Zwjw8VGemq8dD8sRVI7ZjAhPelv1rGugKorq0w71/EaKV8 JHWtnDiKBXcW+hwXVp2n3JekHlNg0H7WpsRZYz1Fb2z3ERiQv+AzX100VwlXcX4H D1V62SUOtZFpd/WnypRbebWxNZqF+2ZWgSxJRO5gzvlwv0ErjdDso7X+rp48m0Ol 7bjbWHWuAMY5wUtTwthGpPyY05JaP6uRn1NCxjRUUsDJvX71lFn2UAkTPCJ+ViRP bZsyGfOcb3weiSm3+myY0O5sb6PvAkUl1jLszdJ6yrzbOm4/1p44RzMdETP5arAt jlSyoRxWabstKkLp5ovXYPW2hQz6tqEKKck7z8YFCJJG/XdQezhO2uBhIpwbUTkL GUhjnVXYRO47ukwe64/2nNUd0e/569yLunNYZ5/j3nPkcUbLCavyWPxuMo29T6UZ 2bwNOQW1n2WwN4G54hleK765Q3ArNJUburAehNLOKycLldxzVdS/5gAIuLO4Qp9y gt484tsge40eG/lqasPMgBaIGD3fQ+NcrC0f1F6zeCPouhMrJhV+QY8dF1WqpaJs KK3MKILwbNU= =7Msg -----END PGP SIGNATURE-----