Kernel CVE
Overview
In version 3.4.4 of SFTP Gateway, or any version where you've run OS updates, you may be vulnerable to CVE-2023-3269.
CVE-2023-3269 is a vulnerability which exists in the memory management subsystem of the Linux kernel and exists in Linux kernel versions 6.1 - 6.4.
For more information on the CVE, check out the Ubuntu Security Report and this article which explains the CVE more in-depth.
Note: We do not recommend updating the kernel unless you're receiving security alerts due to CVE-2023-3269.
VM Vulnerability Check
To check your current kernel version, you can run this command:
uname -r
If you're inside the vulnerability range, 6.1 - 6.4, you may want to consider upgrading the kernel to version 6.5.5 which we have instructions for below.
However, before making any kernel updates or changes, we recommend exporting a backup artifact of your Users and Settings, which you can do by following our article on the upgrade/recovery process for SFTP Gateway.
Upgrading the Kernel Version
To upgrade the kernel to version 6.5.5, you will need to download the kernel image and modules, install them and then reboot the VM.
First, elevate your privileges to root:
sudo su
Download the 6.5.5 kernel image and modules using wget:
wget https://kernel.ubuntu.com/~kernel-ppa/mainline/v6.5.5/amd64/linux-image-unsigned-6.5.5-060505-generic_6.5.5-060505.202309230703_amd64.deb
 
wget https://kernel.ubuntu.com/~kernel-ppa/mainline/v6.5.5/amd64/linux-modules-6.5.5-060505-generic_6.5.5-060505.202309230703_amd64.deb
Give the image and modules execute permissions:
chmod +x *
Install the kernel:
sudo dpkg --install *.deb
Reboot the VM:
reboot
Rerun the command to check your kernel version:
uname -r
You should now see this output, showing you're on kernel version 6.5.5:
Linux 6.5.5-060505-generic