drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in Linux
Name: |
Mehrere Probleme in Linux |
|
ID: |
USN-6135-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 20.04 LTS, Ubuntu 22.04 LTS |
|
Datum: |
Fr, 2. Juni 2023, 23:49 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30456
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2612
https://launchpad.net/ubuntu/+source/linux-azure-fde-5.15/5.15.0-1039.46~20.04.1.1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31436
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32233 |
|
Applikationen: |
Linux |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============2115974014584358040== Content-Language: en-US Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------0mp8yt0w2dn0cxH40N9XLGus"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --------------0mp8yt0w2dn0cxH40N9XLGus Content-Type: multipart/mixed; boundary="------------6P24K7SFlIikSDqmfeb0rRui"; protected-headers="v1" From: Rodrigo Figueiredo Zaiden <rodrigo.zaiden@canonical.com> Reply-To: security@ubuntu.com To: ubuntu-security-announce@lists.ubuntu.com Message-ID: <ce99bce9-4291-c02a-8290-e9260b0e8e44@canonical.com> Subject: [USN-6135-1] Linux kernel (Azure CVM) vulnerabilities
--------------6P24K7SFlIikSDqmfeb0rRui Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: base64
========================================================================== Ubuntu Security Notice USN-6135-1 June 02, 2023
linux-azure-fde, linux-azure-fde-5.15 vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS - Ubuntu 20.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description: - linux-azure-fde: Linux kernel for Microsoft Azure CVM cloud systems - linux-azure-fde-5.15: Linux kernel for Microsoft Azure CVM cloud systems
Details:
Patryk Sondej and Piotr Krysiuk discovered that a race condition existed in the netfilter subsystem of the Linux kernel when processing batch requests, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-32233)
Gwangun Jung discovered that the Quick Fair Queueing scheduler implementation in the Linux kernel contained an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-31436)
Reima Ishii discovered that the nested KVM implementation for Intel x86 processors in the Linux kernel did not properly validate control registers in certain situations. An attacker in a guest VM could use this to cause a denial of service (guest crash). (CVE-2023-30456)
It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux kernel did not properly perform data buffer size validation in some situations. A physically proximate attacker could use this to craft a malicious USB device that when inserted, could cause a denial of service (system crash) or possibly expose sensitive information. (CVE-2023-1380)
Jean-Baptiste Cayrou discovered that the shiftfs file system in the Ubuntu Linux kernel contained a race condition when handling inode locking in some situations. A local attacker could use this to cause a denial of service (kernel deadlock). (CVE-2023-2612)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 22.04 LTS: linux-image-5.15.0-1039-azure-fde 5.15.0-1039.46.1 linux-image-azure-fde 5.15.0.1039.46.16
Ubuntu 20.04 LTS: linux-image-5.15.0-1039-azure-fde 5.15.0-1039.46~20.04.1.1 linux-image-azure-fde 5.15.0.1039.46~20.04.1.18
After a standard system update you need to reboot your computer to make all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.
References: https://ubuntu.com/security/notices/USN-6135-1 CVE-2023-1380, CVE-2023-2612, CVE-2023-30456, CVE-2023-31436, CVE-2023-32233
Package Information: https://launchpad.net/ubuntu/+source/linux-azure-fde/5.15.0-1039.46.1 https://launchpad.net/ubuntu/+source/linux-azure-fde-5.15/5.15.0-1039.46~20.04.1.1
--------------6P24K7SFlIikSDqmfeb0rRui--
--------------0mp8yt0w2dn0cxH40N9XLGus Content-Type: application/pgp-signature; name="OpenPGP_signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="OpenPGP_signature"
-----BEGIN PGP SIGNATURE-----
wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmR6EjQFAwAAAAAACgkQZ0GeRcM5nt1Z lQgAhpC7BfcLmnR2kiBwk5mLJJ35wHIu16C49ru2fjXgpYmwmH3RSIavXxW7NO9pObKVOuXFZW6h rl0C81zalmfxE0NRNnT47F8J9qMkquxbLt/O0TZ4UWWf6Pp0kxwvExc5j6lWuEqSrrklUT8wYS3L sSF+fci0/THgdIFBGrL7OSz0fSUqzZ3PqB2MdwS8jHlqDeEJoUalAkLqae1YLYkQ9ExNPuqrWPy2 r4BGmUYF4j/jetsUkuHA8FsM5OxhQB1crVvYIfQZBCFUzdObmscCSGZEGBkMAr1dlXBJPuQKfcA4 GpzUTFX6WcLofN7T+9JoGTx3pkjoXYi6h8+P/98+nw== =B/v6 -----END PGP SIGNATURE-----
--------------0mp8yt0w2dn0cxH40N9XLGus--
--===============2115974014584358040== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
Cg==
--===============2115974014584358040==--
|
|
|
|