Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Linux (Aktualisierung)
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Linux (Aktualisierung)
ID: USN-7069-2
Distribution: Ubuntu
Plattformen: Ubuntu 14.04 LTS, Ubuntu 16.04 LTS
Datum: Do, 17. Oktober 2024, 22:00
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27051
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26641
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39494
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38611
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26960
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42244
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42089
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42271
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27436
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40901
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38630
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42157
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38621
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42229
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46673
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42280
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36971
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52528
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43858
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41073
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41097
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42223
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31076
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26602
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44940
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26810
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38627
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42284
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52510
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38602
Applikationen: Linux
Update von: Mehrere Probleme in Linux

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============4174201725675893009==
Content-Language: en-US
Content-Type: multipart/signed; micalg=pgp-sha256;
protocol="application/pgp-signature";
boundary="------------Ne0vcvczli3cq40QGxR3kvLS"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------Ne0vcvczli3cq40QGxR3kvLS
Content-Type: multipart/mixed;
boundary="------------7JkXX2FhtOMTaf45Ud30XKXt";
protected-headers="v1"
From: Rodrigo Figueiredo Zaiden <rodrigo.zaiden@canonical.com>
Reply-To: "Security@Ubuntu.com" <Security@ubuntu.com>
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID: <09a37bad-0d6d-4ac9-a863-36ad88e6e6e6@canonical.com>
Subject: [USN-7069-2] Linux kernel (Azure) vulnerabilities

--------------7JkXX2FhtOMTaf45Ud30XKXt
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64

==========================================================================
Ubuntu Security Notice USN-7069-2
October 17, 2024

linux-azure vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-azure: Linux kernel for Microsoft Azure Cloud systems

Details:

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- x86 architecture;
- Cryptographic API;
- CPU frequency scaling framework;
- HW tracing;
- ISDN/mISDN subsystem;
- Media drivers;
- Network drivers;
- NVME drivers;
- S/390 drivers;
- SCSI drivers;
- USB subsystem;
- VFIO drivers;
- Watchdog drivers;
- JFS file system;
- IRQ subsystem;
- Core kernel;
- Memory management;
- Amateur Radio drivers;
- IPv4 networking;
- IPv6 networking;
- IUCV driver;
- Network traffic control;
- TIPC protocol;
- XFRM subsystem;
- Integrity Measurement Architecture(IMA) framework;
- SoC Audio for Freescale CPUs drivers;
- USB sound devices;
(CVE-2024-36971, CVE-2024-42271, CVE-2024-38630, CVE-2024-38602,
CVE-2024-42223, CVE-2024-44940, CVE-2023-52528, CVE-2024-41097,
CVE-2024-27051, CVE-2024-42157, CVE-2024-46673, CVE-2024-39494,
CVE-2024-42089, CVE-2024-41073, CVE-2024-26810, CVE-2024-26960,
CVE-2024-38611, CVE-2024-31076, CVE-2024-26754, CVE-2023-52510,
CVE-2024-40941, CVE-2024-45016, CVE-2024-38627, CVE-2024-38621,
CVE-2024-39487, CVE-2024-27436, CVE-2024-40901, CVE-2024-26812,
CVE-2024-42244, CVE-2024-42229, CVE-2024-43858, CVE-2024-42280,
CVE-2024-26641, CVE-2024-42284, CVE-2024-26602)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 LTS
linux-image-4.15.0-1182-azure 4.15.0-1182.197~16.04.1
Available with Ubuntu Pro
linux-image-azure 4.15.0.1182.197~16.04.1
Available with Ubuntu Pro

Ubuntu 14.04 LTS
linux-image-4.15.0-1182-azure 4.15.0-1182.197~14.04.1
Available with Ubuntu Pro
linux-image-azure 4.15.0.1182.197~14.04.1
Available with Ubuntu Pro

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-7069-2
https://ubuntu.com/security/notices/USN-7069-1
CVE-2023-52510, CVE-2023-52528, CVE-2024-26602, CVE-2024-26641,
CVE-2024-26754, CVE-2024-26810, CVE-2024-26812, CVE-2024-26960,
CVE-2024-27051, CVE-2024-27436, CVE-2024-31076, CVE-2024-36971,
CVE-2024-38602, CVE-2024-38611, CVE-2024-38621, CVE-2024-38627,
CVE-2024-38630, CVE-2024-39487, CVE-2024-39494, CVE-2024-40901,
CVE-2024-40941, CVE-2024-41073, CVE-2024-41097, CVE-2024-42089,
CVE-2024-42157, CVE-2024-42223, CVE-2024-42229, CVE-2024-42244,
CVE-2024-42271, CVE-2024-42280, CVE-2024-42284, CVE-2024-43858,
CVE-2024-44940, CVE-2024-45016, CVE-2024-46673

--------------7JkXX2FhtOMTaf45Ud30XKXt--

--------------Ne0vcvczli3cq40QGxR3kvLS
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature.asc"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmcRSssFAwAAAAAACgkQZ0GeRcM5nt22
sQgAsVfzGcYNnxJMec/Osn99zivHcRr5DRbeL86Xa+BNV/VzrrxVfDb+RTaZLFIO75H3lg4NVIII
a9mjQXYqUrTPM2V9TGsgpEyvXIxIexQf5w9rrAcbxbhd2m1/D78/8DINNDJCJtcI69pWEBP9mpwn
EetnWaSoW8+DyOug1+6ohNkqfFW8aML5T8T11Fm3lJMbU4zO/r3KFWKvE8uXqo8N+t8SIavaZyxb
Cmoky7elYPyJaNpLSJNpCRBzLGO1Qrcyjv1IfZhRLi177feILqvAdqoziTb797FNSDJe7CaS2cay
6kBQrhffZQa1wPv1WvfYmy0jCm/48cRESoiSkrXQuA==
=7I50
-----END PGP SIGNATURE-----

--------------Ne0vcvczli3cq40QGxR3kvLS--


--===============4174201725675893009==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

Cg==

--===============4174201725675893009==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung