Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Linux
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Linux
ID: USN-5362-1
Distribution: Ubuntu
Plattformen: Ubuntu 20.04 LTS
Datum: Fr, 1. April 2022, 08:25
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0516
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42327
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25636
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0847
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4090
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0185
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942
Applikationen: Linux

Originalnachricht


--===============1804193278484669403==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="yaCOAERXi8slfN5d"
Content-Disposition: inline


--yaCOAERXi8slfN5d
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

==========================================================================
Ubuntu Security Notice USN-5362-1
April 01, 2022

linux-intel-5.13 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-intel-5.13: Linux kernel for Intel IOTG

Details:

Nick Gregory discovered that the Linux kernel incorrectly handled network
offload functionality. A local attacker could use this to cause a denial of
service or possibly execute arbitrary code. (CVE-2022-25636)

Enrico Barberis, Pietro Frigo, Marius Muench, Herbert Bos, and Cristiano
Giuffrida discovered that hardware mitigations added by ARM to their
processors to address Spectre-BTI were insufficient. A local attacker could
potentially use this to expose sensitive information. (CVE-2022-23960)

It was discovered that the BPF verifier in the Linux kernel did not
properly restrict pointer types in certain situations. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2022-23222)

Max Kellermann discovered that the Linux kernel incorrectly handled Unix
pipes. A local attacker could potentially use this to modify any file that
could be opened for reading. (CVE-2022-0847)

Yiqi Sun and Kevin Wang discovered that the cgroups implementation in the
Linux kernel did not properly restrict access to the cgroups v1
release_agent feature. A local attacker could use this to gain
administrative privileges. (CVE-2022-0492)

William Liu and Jamie Hill-Daniel discovered that the file system context
functionality in the Linux kernel contained an integer underflow
vulnerability, leading to an out-of-bounds write. A local attacker could
use this to cause a denial of service (system crash) or execute arbitrary
code. (CVE-2022-0185)

Enrico Barberis, Pietro Frigo, Marius Muench, Herbert Bos, and Cristiano
Giuffrida discovered that hardware mitigations added by Intel to their
processors to address Spectre-BTI were insufficient. A local attacker could
potentially use this to expose sensitive information. (CVE-2022-0001)

Jann Horn discovered a race condition in the Unix domain socket
implementation in the Linux kernel that could result in a read-after-free.
A local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2021-4083)

It was discovered that the NFS server implementation in the Linux kernel
contained an out-of-bounds write vulnerability. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2021-4090)

Kirill Tkhai discovered that the XFS file system implementation in the
Linux kernel did not calculate size correctly when pre-allocating space in
some situations. A local attacker could use this to expose sensitive
information. (CVE-2021-4155)

It was discovered that the AMD Radeon GPU driver in the Linux kernel did
not properly validate writes in the debugfs file system. A privileged
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2021-42327)

Sushma Venkatesh Reddy discovered that the Intel i915 graphics driver in
the Linux kernel did not perform a GPU TLB flush in some situations. A
local attacker could use this to cause a denial of service or possibly
execute arbitrary code. (CVE-2022-0330)

Samuel Page discovered that the Transparent Inter-Process Communication
(TIPC) protocol implementation in the Linux kernel contained a stack-based
buffer overflow. A remote attacker could use this to cause a denial of
service (system crash) for systems that have a TIPC bearer configured.
(CVE-2022-0435)

It was discovered that the KVM implementation for s390 systems in the Linux
kernel did not properly prevent memory operations on PVM guests that were
in non-protected mode. A local attacker could use this to obtain
unauthorized memory write access. (CVE-2022-0516)

It was discovered that the ICMPv6 implementation in the Linux kernel did
not properly deallocate memory in certain situations. A remote attacker
could possibly use this to cause a denial of service (memory exhaustion).
(CVE-2022-0742)

It was discovered that the VMware Virtual GPU driver in the Linux kernel
did not properly handle certain failure conditions, leading to a stale
entry in the file descriptor table. A local attacker could use this to
expose sensitive information or possibly gain administrative privileges.
(CVE-2022-22942)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
linux-image-5.13.0-1010-intel 5.13.0-1010.10
linux-image-intel 5.13.0.1010.11

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-5362-1
CVE-2021-4083, CVE-2021-4090, CVE-2021-4155, CVE-2021-42327,
CVE-2022-0001, CVE-2022-0185, CVE-2022-0330, CVE-2022-0435,
CVE-2022-0492, CVE-2022-0516, CVE-2022-0742, CVE-2022-0847,
CVE-2022-22942, CVE-2022-23222, CVE-2022-23960, CVE-2022-25636

Package Information:
https://launchpad.net/ubuntu/+source/linux-intel-5.13/5.13.0-1010.10


--yaCOAERXi8slfN5d
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=zAFO
-----END PGP SIGNATURE-----

--yaCOAERXi8slfN5d--


--===============1804193278484669403==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung