Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Linux
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Linux
ID: USN-6256-1
Distribution: Ubuntu
Plattformen: Ubuntu 20.04 LTSubuntu-security-announce@lists.ubuntu.com
Datum: Do, 27. Juli 2023, 06:32
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1281
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1859
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3903
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3161
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26545
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1076
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3108
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1077
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2612
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2985
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30456
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1074
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2162
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1829
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3707
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31436
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1998
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1079
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4129
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32269
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1073
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32233
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1118
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25012
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1513
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1670
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0459
Applikationen: Linux

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============0986721223680671338==
Content-Language: en-US
Content-Type: multipart/signed; micalg=pgp-sha256;
protocol="application/pgp-signature";
boundary="------------Ij738I3fB0unFqxky8AHlNmC"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------Ij738I3fB0unFqxky8AHlNmC
Content-Type: multipart/mixed;
boundary="------------Yvi6eToMN93eu6qtZf14jbza";
protected-headers="v1"
From: Rodrigo Figueiredo Zaiden <rodrigo.zaiden@canonical.com>
Reply-To: security@ubuntu.com
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID: <703d6f4f-bcf0-7ee7-4cb9-086bc7a23af3@canonical.com>
Subject: [USN-6256-1] Linux kernel (IoT) vulnerabilities

--------------Yvi6eToMN93eu6qtZf14jbza
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64

==========================================================================
Ubuntu Security Notice USN-6256-1
July 26, 2023

linux-iot vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTSubuntu-security-announce@lists.ubuntu.com

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-iot: Linux kernel for IoT platforms

Details:

Jiasheng Jiang discovered that the HSA Linux kernel driver for AMD Radeon
GPU devices did not properly validate memory allocation in certain
situations, leading to a null pointer dereference vulnerability. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2022-3108)

Zheng Wang discovered that the Intel i915 graphics driver in the Linux
kernel did not properly handle certain error conditions, leading to a
double-free. A local attacker could possibly use this to cause a denial of
service (system crash). (CVE-2022-3707)

It was discovered that the infrared transceiver USB driver did not properly
handle USB control messages. A local attacker with physical access could
plug in a specially crafted USB device to cause a denial of service (memory
exhaustion). (CVE-2022-3903)

Haowei Yan discovered that a race condition existed in the Layer 2
Tunneling Protocol (L2TP) implementation in the Linux kernel. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2022-4129)

Jordy Zomer and Alexandra Sandulescu discovered that syscalls invoking the
do_prlimit() function in the Linux kernel did not properly handle
speculative execution barriers. A local attacker could use this to expose
sensitive information (kernel memory). (CVE-2023-0458)

Jordy Zomer and Alexandra Sandulescu discovered that the Linux kernel did
not properly implement speculative execution barriers in usercopy functions
in certain situations. A local attacker could use this to expose sensitive
information (kernel memory). (CVE-2023-0459)

It was discovered that the Human Interface Device (HID) support driver in
the Linux kernel contained a type confusion vulnerability in some
situations. A local attacker could use this to cause a denial of service
(system crash). (CVE-2023-1073)

It was discovered that a memory leak existed in the SCTP protocol
implementation in the Linux kernel. A local attacker could use this to
cause a denial of service (memory exhaustion). (CVE-2023-1074)

It was discovered that the TLS subsystem in the Linux kernel contained a
type confusion vulnerability in some situations. A local attacker could use
this to cause a denial of service (system crash) or possibly expose
sensitive information. (CVE-2023-1075)

It was discovered that the TUN/TAP driver in the Linux kernel did not
properly initialize socket data. A local attacker could use this to cause a
denial of service (system crash). (CVE-2023-1076)

It was discovered that the Real-Time Scheduling Class implementation in the
Linux kernel contained a type confusion vulnerability in some situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2023-1077)

It was discovered that the Reliable Datagram Sockets (RDS) protocol
implementation in the Linux kernel contained a type confusion vulnerability
in some situations. An attacker could use this to cause a denial of service
(system crash). (CVE-2023-1078)

It was discovered that the ASUS HID driver in the Linux kernel did not
properly handle device removal, leading to a use-after-free vulnerability.
A local attacker with physical access could plug in a specially crafted USB
device to cause a denial of service (system crash). (CVE-2023-1079)

Duoming Zhou discovered that a race condition existed in the infrared
receiver/transceiver driver in the Linux kernel, leading to a use-after-
free vulnerability. A privileged attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2023-1118)

It was discovered that the Traffic-Control Index (TCINDEX) implementation
in the Linux kernel contained a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-1281)

It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux
kernel did not properly perform data buffer size validation in some
situations. A physically proximate attacker could use this to craft a
malicious USB device that when inserted, could cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-1380)

Xingyuan Mo discovered that the x86 KVM implementation in the Linux kernel
did not properly initialize some data structures. A local attacker could
use this to expose sensitive information (kernel memory). (CVE-2023-1513)

It was discovered that the Xircom PCMCIA network device driver in the Linux
kernel did not properly handle device removal events. A physically
proximate attacker could use this to cause a denial of service (system
crash). (CVE-2023-1670)

It was discovered that the Traffic-Control Index (TCINDEX) implementation
in the Linux kernel did not properly perform filter deactivation in some
situations. A local attacker could possibly use this to gain elevated
privileges. Please note that with the fix for this CVE, kernel support for
the TCINDEX classifier has been removed. (CVE-2023-1829)

It was discovered that a race condition existed in the Xen transport layer
implementation for the 9P file system protocol in the Linux kernel, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service (guest crash) or expose sensitive information (guest
kernel memory). (CVE-2023-1859)

Jose Oliveira and Rodrigo Branco discovered that the Spectre Variant 2
mitigations with prctl syscall were insufficient in some situations. A
local attacker could possibly use this to expose sensitive information.
(CVE-2023-1998)

It was discovered that a use-after-free vulnerability existed in the iSCSI
TCP implementation in the Linux kernel. A local attacker could possibly use
this to cause a denial of service (system crash). (CVE-2023-2162)

It was discovered that the BigBen Interactive Kids' gamepad driver in the
Linux kernel did not properly handle device removal, leading to a use-
after-free vulnerability. A local attacker with physical access could plug
in a specially crafted USB device to cause a denial of service (system
crash). (CVE-2023-25012)

Jean-Baptiste Cayrou discovered that the shiftfs file system in the Ubuntu
Linux kernel contained a race condition when handling inode locking in some
situations. A local attacker could use this to cause a denial of service
(kernel deadlock). (CVE-2023-2612)

Lianhui Tang discovered that the MPLS implementation in the Linux kernel
did not properly handle certain sysctl allocation failure conditions,
leading to a double-free vulnerability. An attacker could use this to cause
a denial of service or possibly execute arbitrary code. (CVE-2023-26545)

It was discovered that a use-after-free vulnerability existed in the HFS+
file system implementation in the Linux kernel. A local attacker could
possibly use this to cause a denial of service (system crash).
(CVE-2023-2985)

Reima Ishii discovered that the nested KVM implementation for Intel x86
processors in the Linux kernel did not properly validate control registers
in certain situations. An attacker in a guest VM could use this to cause a
denial of service (guest crash). (CVE-2023-30456)

Gwangun Jung discovered that the Quick Fair Queueing scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-31436)

Sanan Hasanov discovered that the framebuffer console driver in the Linux
kernel did not properly perform checks for font dimension limits. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2023-3161)

Patryk Sondej and Piotr Krysiuk discovered that a race condition existed in
the netfilter subsystem of the Linux kernel when processing batch requests,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-32233)

It was discovered that the NET/ROM protocol implementation in the Linux
kernel contained a race condition in some situations, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2023-32269)

Hangyu Hua discovered that the Flower classifier implementation in the
Linux kernel contained an out-of-bounds write vulnerability. An attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-35788)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
linux-image-5.4.0-1017-iot 5.4.0-1017.18

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-6256-1
CVE-2022-3108, CVE-2022-3707, CVE-2022-3903, CVE-2022-4129,
CVE-2023-0458, CVE-2023-0459, CVE-2023-1073, CVE-2023-1074,
CVE-2023-1075, CVE-2023-1076, CVE-2023-1077, CVE-2023-1078,
CVE-2023-1079, CVE-2023-1118, CVE-2023-1281, CVE-2023-1380,
CVE-2023-1513, CVE-2023-1670, CVE-2023-1829, CVE-2023-1859,
CVE-2023-1998, CVE-2023-2162, CVE-2023-25012, CVE-2023-2612,
CVE-2023-26545, CVE-2023-2985, CVE-2023-30456, CVE-2023-31436,
CVE-2023-3161, CVE-2023-32233, CVE-2023-32269, CVE-2023-35788

Package Information:
https://launchpad.net/ubuntu/+source/linux-iot/5.4.0-1017.18

--------------Yvi6eToMN93eu6qtZf14jbza--

--------------Ij738I3fB0unFqxky8AHlNmC
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmTBi/wFAwAAAAAACgkQZ0GeRcM5nt32
Lgf/dnTNq9uhzyi+luNFsu3ORiDP87l5qd0q8VAfN2QtClDHKBkwDMLOgXgKjSTvl1UDnqFoK7XE
bB9jrFIBxcS4lqfn7gplEN6/jHc+9lXfDGXkkyj61XaV3kVGQ84uCwMxST6VHSwTn9jmB0W+yKiG
heuoet7R7PgcTRGB4Zu9xQ3V6+ncR4dQ+FO2vVGWJxGvWA3HAk/MFka+6oZjywCq6hLwyxmO7VWo
g423uUG3HWbeNbRQH7qTWVpiAXUeE6lQ+5WZrRZPUTouJR4Y+2UTnU6Bqbcc6cFu1r3egdY1Jj0w
A55v6PqJBleX+PQgnl7qdetX7jbZm4NXAu+4F0Jgaw==
=7i8Z
-----END PGP SIGNATURE-----

--------------Ij738I3fB0unFqxky8AHlNmC--


--===============0986721223680671338==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

Cg==

--===============0986721223680671338==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung