-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2023.3555
               LSN-0095-1: Kernel Live Patch Security Notice
                               22 June 2023

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Kernel
Publisher:         Ubuntu
Operating System:  Ubuntu
Resolution:        Patch/Upgrade
CVE Names:         CVE-2023-32233 CVE-2023-31436 CVE-2023-2612
                   CVE-2023-1872 CVE-2023-1380 CVE-2023-0386

Original Bulletin: 
   https://ubuntu.com/security/notices/LSN-0095-1

Comment: CVSS (Max):  7.8 CVE-2023-32233 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
         CVSS Source: NVD
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

- --------------------------BEGIN INCLUDED TEXT--------------------

LSN-0095-1: Kernel Live Patch Security Notice

21 June 2023

Several security issues were fixed in the kernel.

Releases

  o Ubuntu 22.04 LTS
  o Ubuntu 20.04 LTS
  o Ubuntu 18.04 ESM

Software Description

  o aws - Linux kernel for Amazon Web Services (AWS) systems - (>= 5.4.0-1009,
    >= 5.4.0-1061, >= 5.15.0-1000)
  o aws-5.15 - Linux kernel for Amazon Web Services (AWS) systems - (>=
    5.15.0-1000)
  o aws-5.4 - Linux kernel for Amazon Web Services (AWS) systems - (>=
    5.4.0-1069)
  o azure - Linux kernel for Microsoft Azure Cloud systems - (>= 5.4.0-1010, >=
    5.15.0-1000)
  o azure-5.4 - Linux kernel for Microsoft Azure cloud systems - (>=
    5.4.0-1069)
  o gcp - Linux kernel for Google Cloud Platform (GCP) systems - (>=
    5.4.0-1009, >= 5.15.0-1000)
  o gcp-5.15 - Linux kernel for Google Cloud Platform (GCP) systems - (>=
    5.15.0-1000)
  o gcp-5.4 - Linux kernel for Google Cloud Platform (GCP) systems - (>=
    5.4.0-1069)
  o generic-5.4 - Linux kernel - (>= 5.4.0-26, >= 5.4.0-26)
  o gke - Linux kernel for Google Container Engine (GKE) systems - (>=
    5.4.0-1033, >= 5.15.0-1000)
  o gke-5.15 - Linux kernel for Google Container Engine (GKE) systems - (>=
    5.15.0-1000)
  o gke-5.4 - Linux kernel for Google Container Engine (GKE) systems - (>=
    5.4.0-1009)
  o gkeop - Linux kernel for Google Container Engine (GKE) systems - (>=
    5.4.0-1009)
  o gkeop-5.4 - Linux kernel for Google Container Engine (GKE) systems - (>=
    5.4.0-1007)
  o ibm - Linux kernel for IBM cloud systems - (>= 5.4.0-1009, >= 5.15.0-1000)
  o ibm-5.4 - Linux kernel for IBM cloud systems - (>= 5.4.0-1009)
  o linux - Linux kernel - (>= 5.15.0-71, >= 5.15.0-24)
  o lowlatency - Linux low latency kernel - (>= 5.15.0-25)
  o lowlatency-5.4 - Linux kernel - (>= 5.4.0-26, >= 5.4.0-26)

Details

It was discovered that the OverlayFS implementation in the Linux kernel did
not properly handle copy up operation in some conditions. A local attacker
could possibly use this to gain elevated privileges.( CVE-2023-0386 )

It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux
kernel did not properly perform data buffer size validation in some
situations. A physically proximate attacker could use this to craft a
malicious USB device that when inserted, could cause a denial of service
(system crash) or possibly expose sensitive information.( CVE-2023-1380 )

It was discovered that a race condition existed in the io_uring subsystem
in the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code.( CVE-2023-1872 )

Jean-Baptiste Cayrou discovered that the shiftfs file system in the Ubuntu
Linux kernel contained a race condition when handling inode locking in some
situations. A local attacker could use this to cause a denial of service
(kernel deadlock).( CVE-2023-2612 )

Gwangun Jung discovered that the Quick Fair Queueing scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code.( CVE-2023-31436 )

Patryk Sondej and Piotr Krysiuk discovered that a race condition existed in
the netfilter subsystem of the Linux kernel when processing batch requests,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code.( CVE-2023-32233 )

Checking update status

The problem can be corrected in these Livepatch versions:

  Kernel type   22.04 20.04 18.04
aws             95.4  95.4  -
aws-5.15        -     95.4  -
aws-5.4         -     -     95.4
azure           95.4  95.4  -
azure-5.4       -     -     95.4
gcp             95.4  95.4  -
gcp-5.15        -     95.4  -
gcp-5.4         -     -     95.4
generic-5.4     -     95.4  95.4
gke             95.4  95.4  -
gke-5.15        -     95.4  -
gke-5.4         -     -     95.4
gkeop           -     95.4  -
gkeop-5.4       -     -     95.4
ibm             95.4  95.4  -
ibm-5.4         -     -     95.4
linux           95.4  -     -
lowlatency      95.1  -     -
lowlatency-5.4  -     95.4  95.4

To check your kernel type and Livepatch version, enter this command:

canonical-livepatch status

References

  o CVE-2023-32233
  o CVE-2023-2612
  o CVE-2023-0386
  o CVE-2023-1872
  o CVE-2023-1380
  o CVE-2023-31436

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=BHHD
-----END PGP SIGNATURE-----