drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in Linux (Aktualisierung)
Name: |
Mehrere Probleme in Linux (Aktualisierung) |
|
ID: |
USN-5390-2 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 22.04 LTS |
|
Datum: |
Mi, 4. Mai 2022, 06:53 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1015
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016 |
|
Applikationen: |
Linux |
|
Update von: |
Mehrere Probleme in Linux |
|
Originalnachricht |
--===============0959627415132577150== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="LNXi9rY8VtTcDu+C" Content-Disposition: inline
--LNXi9rY8VtTcDu+C Content-Type: text/plain; charset=us-ascii Content-Disposition: inline
========================================================================== Ubuntu Security Notice USN-5390-2 May 03, 2022
linux-raspi vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description: - linux-raspi: Linux kernel for Raspberry Pi systems
Details:
David Bouman discovered that the netfilter subsystem in the Linux kernel did not properly validate passed user register indices. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2022-1015)
David Bouman discovered that the netfilter subsystem in the Linux kernel did not initialize memory in some situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2022-1016)
It was discovered that the ST21NFCA NFC driver in the Linux kernel did not properly validate the size of certain data in EVT_TRANSACTION events. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-26490)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 22.04 LTS: linux-image-5.15.0-1006-raspi 5.15.0-1006.6 linux-image-5.15.0-1006-raspi-nolpae 5.15.0-1006.6 linux-image-raspi 5.15.0.1006.6 linux-image-raspi-nolpae 5.15.0.1006.6
After a standard system update you need to reboot your computer to make all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.
References: https://ubuntu.com/security/notices/USN-5390-2 https://ubuntu.com/security/notices/USN-5390-1 CVE-2022-1015, CVE-2022-1016, CVE-2022-26490
Package Information: https://launchpad.net/ubuntu/+source/linux-raspi/5.15.0-1006.6
--LNXi9rY8VtTcDu+C Content-Type: application/pgp-signature; name="signature.asc"
-----BEGIN PGP SIGNATURE-----
iQIzBAABCgAdFiEEBAJL1M8q+hI0VIn8jRkUtPPTt5UFAmJxm3EACgkQjRkUtPPT t5VJDBAApblydGM6jihC+ojwRKNWCcY/ux7KpMHAo8cyc4ALX2vGCB5DjJqP8fCY it6k3uRPBnjddi2K4Hyk9jBU2p/kQgp6xea5H4Khp53wwIvZx7xKg/l+55A1KZQO u3xiHtGa6RVbIquwp+kNGebCmvzw2ABx+vndJtXgFbS1jB6gXqwlEXjNujjLjUgK CNBBnA3s16GsJ4BL6IM1aYG65YW+1Er7KXafbceiPW2/JR6TwAMyin4TH/pjO2Td /aE/86z52dMjovjsl2SsJXPtx4GPhjY+0g/MNEGob0mK/Drh6J1Kg7OdDWHrG97A 6rSUkq8/HW7QBqRlsyo0SM/YmNHy1phRjN0I4TkJxcMcRYozESL3rgeVOqbqTUUm xwyKm5wr8uNour5qigfEgugZs0H2R0JMAi3obDQLV76l4o1IBi1GPhtSSFzDQGT4 YZVA9FkbfXUnjdb3G0HTYadoKtW7O0Pdghpw4JJ7pSgwMbcipocx1YGTi4/PLxGn asHy2yocF2KIL4CyAjmFvqILSeFYd5qnAgiAHe2npzy/cS2Bm4Llk+nK/iG5mDWn ceYJO3WG0rANgBqODrgxmtw2RCd/CGvhWYUB2WlZaEJP5I1eqYTCTpnM+Ob84G+e 3jmrj1CsBlsZnYcAL/4VpYBfO2AxbVlgVoI13Lyg32jYF4q+Ly4= =N6xV -----END PGP SIGNATURE-----
--LNXi9rY8VtTcDu+C--
--===============0959627415132577150== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
--===============0959627415132577150==--
|
|
|
|