kubeadm.*.cgroupv1
failed due to a regression in Kernel 6.1.54, reported upstream.kubeadm.*.cgroupv1
failed due to a regression in Kernel 6.1.54, reported upstream.VERDICT: GO / WAIT / NO-GO
VERDICT: GO / WAIT / NO-GO
cl.ignition.kargs
failed due to an already known issue of Kernel warnings in Kernel 5.15.129cl.ignition.kargs
failed due to an already known issue of Kernel warnings in Kernel 5.15.129VERDICT: GO / WAIT / NO-GO
Subject: Announcing new releases Alpha 3732.0.0, Beta 3602.1.6, Stable 3510.2.8
Hello,
We are pleased to announce a new Flatcar Container Linux release for the Alpha, Beta, Stable channel.
Changes since Alpha 3717.0.0
nvidia.service
from /etc
on Azure because it's now part of /usr
(Flatcar#60)Changes since Beta 3602.1.5
Changes since Stable 3510.2.7
Best,
The Flatcar Container Linux Maintainers
Security fix: With the Alpha 3732.0.0, Beta 3602.1.6, Stable 3510.2.8 releases we ship fixes for the CVEs listed below.
Go
Linux
SDK: Python
nvidia-drivers
CVE-2023-25515 CVSSv3 score: 7.6(High)
NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability where unexpected untrusted data is parsed, which may lead to code execution, denial of service, escalation of privileges, data tampering, or information disclosure.
CVE-2023-25516 CVSSv3 score: n/a
NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where an unprivileged user can cause an integer overflow, which may lead to information disclosure and denial of service.
torcx
CVE-2023-20588 CVSSv3 score: 5.5(Medium)
A division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality.
CVE-2023-3772 CVSSv3 score: 4.4(Medium)
A flaw was found in the Linux kernel’s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer in xfrm_update_ae_params(), leading to a possible kernel crash and denial of service.
CVE-2023-40283 CVSSv3 score: 7.8(High)
An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_sock.c in the Linux kernel before 6.4.10. There is a use-after-free because the children of an sk are mishandled.
CVE-2023-4128 CVSSv3 score: n/a
A use-after-free flaw was found in net/sched/cls_fw.c in classifiers (cls_fw, cls_u32, and cls_route) in the Linux Kernel. This flaw allows a local attacker to perform a local privilege escalation due to incorrect handling of the existing filter, leading to a kernel information leak issue.
CVE-2023-4206 CVSSv3 score: n/a
A use-after-free vulnerability in the Linux kernel's net/sched: cls_route component can be exploited to achieve local privilege escalation. When route4_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free.
We recommend upgrading past commit b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8.
CVE-2023-4207 CVSSv3 score: n/a
A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. When fw_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free.
We recommend upgrading past commit 76e42ae831991c828cffa8c37736ebfb831ad5ec.
CVE-2023-4208 CVSSv3 score: n/a
A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. When u32_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free.
We recommend upgrading past commit 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81.
CVE-2023-4273 CVSSv3 score: 6.7(Medium)
A flaw was found in the exFAT driver of the Linux kernel. The vulnerability exists in the implementation of the file name reconstruction function, which is responsible for reading file name entries from a directory index and merging file name parts belonging to one file into a single long file name. Since the file name characters are copied into a stack variable, a local privileged attacker could use this flaw to overflow the kernel stack.
CVE-2023-4569 CVSSv3 score: 5.5(Medium)
A memory leak flaw was found in nft_set_catchall_flush in net/netfilter/nf_tables_api.c in the Linux Kernel. This issue may allow a local attacker to cause a double-deactivations of catchall elements, which results in a memory leak.
Go/No-Go Meeting for Alpha 3732.0.0, Beta 3602.1.6, Stable 3510.2.8
Pre-view images are available in https://bincache.flatcar-linux.net/images/amd64/$VERSION/
Tracking issue: https://github.com/flatcar/Flatcar/issues/1181
The Go/No-Go document is in our HackMD @flatcar namespace
Link: https://hackmd.io/WHLJb98ITamt-oMwW_MvXg?view
Please give your Go/No-Go vote with 💚 for Go, ❌ for No-Go, and ✋ for Wait.
Contributors & community feel free to put your suggestions, thoughts or comments on the document or here in the chat.
@MAINTAINER @MAINTAINER @MAINTAINER
The toot (from @flatcar) goes out after the changelog update has been published; it includes a link to the web changelog.
New Flatcar Alpha 3732.0.0, Beta 3602.1.6, Stable 3510.2.8 releases now available!
📦 Many package updates: Linux, nvidia-drivers, libnvme
🔒 CVE fixes & security patches: Linux, nvidia-drivers
📜 Release notes at the usual spot: https://www.flatcar.org/releases/
#linux #cloudnative #containers #updates
This goes in the #flatcar channel
Please welcome new Flatcar releases:
These releases include:
📦 Many package updates: Linux, nvidia-drivers, libnvme
🔒 CVE fixes & security patches: Linux, nvidia-drivers
📜 Release notes at the usual spot: https://www.flatcar.org/releases/