{"id":56159,"date":"2024-04-09T20:09:46","date_gmt":"2024-04-09T16:09:46","guid":{"rendered":"https:\/\/packetstormsecurity.com\/files\/177998\/LSN-0102-1.txt"},"modified":"2024-04-09T20:09:46","modified_gmt":"2024-04-09T16:09:46","slug":"kernel-live-patch-security-notice-lsn-0102-1","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/kernel-live-patch-security-notice-lsn-0102-1\/","title":{"rendered":"Kernel Live Patch Security Notice LSN-0102-1"},"content":{"rendered":"<p>Linux kernel vulnerabilities<\/p>\n<p>A security issue affects these releases of Ubuntu and its derivatives:<\/p>\n<p>&#8211; Ubuntu 20.04 LTS<br \/>&#8211; Ubuntu 18.04 LTS<br \/>&#8211; Ubuntu 16.04 ESM<br \/>&#8211; Ubuntu 22.04 LTS<br \/>&#8211; Ubuntu 14.04 ESM<\/p>\n<p>Summary<\/p>\n<p>Several security issues were fixed in the kernel.<\/p>\n<p>Software Description<\/p>\n<p>&#8211; linux &#8211; Linux kernel<br \/>&#8211; linux-aws &#8211; Linux kernel for Amazon Web Services (AWS) systems<br \/>&#8211; linux-azure &#8211; Linux kernel for Microsoft Azure Cloud systems<br \/>&#8211; linux-gcp &#8211; Linux kernel for Google Cloud Platform (GCP) systems<br \/>&#8211; linux-gke &#8211; Linux kernel for Google Container Engine (GKE) systems<br \/>&#8211; linux-gkeop &#8211; Linux kernel for Google Container Engine (GKE) systems<br \/>&#8211; linux-ibm &#8211; Linux kernel for IBM cloud systems<\/p>\n<p>Details<\/p>\n<p>It was discovered that a race condition existed in the io_uring<br \/>subsystem in the Linux kernel, leading to a use-after-free<br \/>vulnerability. A local attacker could use this to cause a denial of<br \/>service (system crash) or possibly execute arbitrary code.<br \/>(CVE-2023-1872)<\/p>\n<p>Lonial Con discovered that the netfilter subsystem in the Linux kernel<br \/>contained a memory leak when handling certain element flush operations.<br \/>A local attacker could use this to expose sensitive information (kernel<br \/>memory). (CVE-2023-4569)<\/p>\n<p>It was discovered that the TLS subsystem in the Linux kernel did not<br \/>properly perform cryptographic operations in some situations, leading to<br \/>a null pointer dereference vulnerability. A local attacker could use<br \/>this to cause a denial of service (system crash) or possibly execute<br \/>arbitrary code. (CVE-2023-6176)<\/p>\n<p>It was discovered that a race condition existed in the AppleTalk<br \/>networking subsystem of the Linux kernel, leading to a use-after-free<br \/>vulnerability. A local attacker could use this to cause a denial of<br \/>service (system crash) or possibly execute arbitrary code.<br \/>(CVE-2023-51781)<\/p>\n<p>Jann Horn discovered that the TLS subsystem in the Linux kernel did not<br \/>properly handle spliced messages, leading to an out-of-bounds write<br \/>vulnerability. A local attacker could use this to cause a denial of<br \/>service (system crash) or possibly execute arbitrary code.<br \/>(CVE-2024-0646)<\/p>\n<p>Notselwyn discovered that the netfilter subsystem in the Linux kernel<br \/>did not properly handle verdict parameters in certain cases, leading to<br \/>a use- after-free vulnerability. A local attacker could use this to<br \/>cause a denial of service (system crash) or possibly execute arbitrary<br \/>code. (CVE-2024-1086)<\/p>\n<p>Update instructions<\/p>\n<p>The problem can be corrected by updating your kernel livepatch to the<br \/>following versions:<\/p>\n<p>Ubuntu 20.04 LTS<br \/>aws &#8211; 102.1<br \/>azure &#8211; 102.1<br \/>gcp &#8211; 102.1<br \/>generic &#8211; 102.1<br \/>gke &#8211; 102.1<br \/>gkeop &#8211; 102.1<br \/>ibm &#8211; 102.1<br \/>lowlatency &#8211; 102.1<\/p>\n<p>Ubuntu 18.04 LTS<br \/>aws &#8211; 102.1<br \/>azure &#8211; 102.1<br \/>gcp &#8211; 102.1<br \/>generic &#8211; 102.1<br \/>lowlatency &#8211; 102.1<\/p>\n<p>Ubuntu 16.04 ESM<br \/>aws &#8211; 102.1<br \/>azure &#8211; 102.1<br \/>gcp &#8211; 102.1<br \/>generic &#8211; 102.1<br \/>lowlatency &#8211; 102.1<\/p>\n<p>Ubuntu 22.04 LTS<br \/>aws &#8211; 102.1<br \/>azure &#8211; 102.1<br \/>gcp &#8211; 102.1<br \/>generic &#8211; 102.1<br \/>gke &#8211; 102.1<br \/>ibm &#8211; 102.1<br \/>lowlatency &#8211; 102.1<\/p>\n<p>Ubuntu 14.04 ESM<br \/>generic &#8211; 102.1<br \/>lowlatency &#8211; 102.1<\/p>\n<p>Support Information<\/p>\n<p>Livepatches for supported LTS kernels will receive upgrades for a period<br \/>of up to 13 months after the build date of the kernel.<\/p>\n<p>Livepatches for supported HWE kernels which are not based on an LTS<br \/>kernel version will receive upgrades for a period of up to 9 months<br \/>after the build date of the kernel, or until the end of support for that<br \/>kernel\u2019s non-LTS distro release version, whichever is sooner.<\/p>\n<p>References<\/p>\n<p>&#8211; CVE-2023-1872<br \/>&#8211; CVE-2023-4569<br \/>&#8211; CVE-2023-6176<br \/>&#8211; CVE-2023-51781<br \/>&#8211; CVE-2024-0646<br \/>&#8211; CVE-2024-1086<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Linux kernel vulnerabilities A security issue affects these releases of Ubuntu and its derivatives: &#8211; Ubuntu 20.04 LTS&#8211; Ubuntu 18.04 LTS&#8211; Ubuntu 16.04 ESM&#8211; Ubuntu 22.04 LTS&#8211; Ubuntu 14.04 ESM Summary Several security issues were fixed in the kernel. Software Description &#8211; linux &#8211; Linux kernel&#8211; linux-aws &#8211; Linux kernel for Amazon Web Services (AWS) &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-56159","post","type-post","status-publish","format-standard","hentry","category-vulnerability"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/56159","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=56159"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/56159\/revisions"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=56159"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=56159"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=56159"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}