Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Linux
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Linux
ID: USN-7289-1
Distribution: Ubuntu
Plattformen: Ubuntu 22.04 LTS
Datum: Mo, 24. Februar 2025, 22:48
Referenzen: https://www.cve.org/CVERecord?id=CVE-2024-50209
https://www.cve.org/CVERecord?id=CVE-2024-50085
https://www.cve.org/CVERecord?id=CVE-2024-50143
https://www.cve.org/CVERecord?id=CVE-2024-53052
https://www.cve.org/CVERecord?id=CVE-2024-50292
https://www.cve.org/CVERecord?id=CVE-2024-50115
https://www.cve.org/CVERecord?id=CVE-2024-50101
https://www.cve.org/CVERecord?id=CVE-2024-50257
https://www.cve.org/CVERecord?id=CVE-2024-26718
https://www.cve.org/CVERecord?id=CVE-2024-50168
https://www.cve.org/CVERecord?id=CVE-2024-50162
https://www.cve.org/CVERecord?id=CVE-2024-50150
https://www.cve.org/CVERecord?id=CVE-2024-50160
https://www.cve.org/CVERecord?id=CVE-2024-53088
https://www.cve.org/CVERecord?id=CVE-2024-50262
https://www.cve.org/CVERecord?id=CVE-2024-53058
https://www.cve.org/CVERecord?id=CVE-2024-50237
https://www.cve.org/CVERecord?id=CVE-2024-50273
https://www.cve.org/CVERecord?id=CVE-2024-50099
https://www.cve.org/CVERecord?id=CVE-2024-50074
https://www.cve.org/CVERecord?id=CVE-2024-50103
https://www.cve.org/CVERecord?id=CVE-2024-50236
https://www.cve.org/CVERecord?id=CVE-2024-50058
https://www.cve.org/CVERecord?id=CVE-2024-39497
https://www.cve.org/CVERecord?id=CVE-2024-50163
https://www.cve.org/CVERecord?id=CVE-2024-50154
https://www.cve.org/CVERecord?id=CVE-2023-52913
https://www.cve.org/CVERecord?id=CVE-2024-53063
https://www.cve.org/CVERecord?id=CVE-2024-50295
https://www.cve.org/CVERecord?id=CVE-2024-50268
https://www.cve.org/CVERecord?id=CVE-2024-50201
https://www.cve.org/CVERecord?id=CVE-2024-50127
https://www.cve.org/CVERecord?id=CVE-2024-50218
https://www.cve.org/CVERecord?id=CVE-2024-40965
https://www.cve.org/CVERecord?id=CVE-2024-50156
https://www.cve.org/CVERecord?id=CVE-2024-50233
https://www.cve.org/CVERecord?id=CVE-2024-50279
https://www.cve.org/CVERecord?id=CVE-2024-50198
https://www.cve.org/CVERecord?id=CVE-2024-50229
https://www.cve.org/CVERecord?id=CVE-2024-50185
https://www.cve.org/CVERecord?id=CVE-2024-50269
https://www.cve.org/CVERecord?id=CVE-2024-53101
https://www.cve.org/CVERecord?id=CVE-2024-53066
https://www.cve.org/CVERecord?id=CVE-2024-50208
https://www.cve.org/CVERecord?id=CVE-2024-50086
https://www.cve.org/CVERecord?id=CVE-2024-50182
https://www.cve.org/CVERecord?id=CVE-2024-50230
https://www.cve.org/CVERecord?id=CVE-2024-50278
https://www.cve.org/CVERecord?id=CVE-2024-50287
https://www.cve.org/CVERecord?id=CVE-2024-50117
https://www.cve.org/CVERecord?id=CVE-2024-53097
https://www.cve.org/CVERecord?id=CVE-2024-41066
https://www.cve.org/CVERecord?id=CVE-2024-53042
https://www.cve.org/CVERecord?id=CVE-2024-50202
https://www.cve.org/CVERecord?id=CVE-2024-50251
https://www.cve.org/CVERecord?id=CVE-2024-50299
https://www.cve.org/CVERecord?id=CVE-2024-42291
https://www.cve.org/CVERecord?id=CVE-2024-40953
https://www.cve.org/CVERecord?id=CVE-2024-50142
https://www.cve.org/CVERecord?id=CVE-2024-50192
https://www.cve.org/CVERecord?id=CVE-2024-50128
https://www.cve.org/CVERecord?id=CVE-2024-35887
https://www.cve.org/CVERecord?id=CVE-2024-50072
https://www.cve.org/CVERecord?id=CVE-2024-50010
https://www.cve.org/CVERecord?id=CVE-2024-50249
https://www.cve.org/CVERecord?id=CVE-2024-50110
https://www.cve.org/CVERecord?id=CVE-2024-50259
https://www.cve.org/CVERecord?id=CVE-2024-53055
https://www.cve.org/CVERecord?id=CVE-2024-50302
https://www.cve.org/CVERecord?id=CVE-2024-50171
https://www.cve.org/CVERecord?id=CVE-2024-50141
https://www.cve.org/CVERecord?id=CVE-2024-50148
https://www.cve.org/CVERecord?id=CVE-2024-41080
https://www.cve.org/CVERecord?id=CVE-2024-50194
https://www.cve.org/CVERecord?id=CVE-2024-50245
https://www.cve.org/CVERecord?id=CVE-2024-50134
https://www.cve.org/CVERecord?id=CVE-2024-50205
https://www.cve.org/CVERecord?id=CVE-2024-50116
https://www.cve.org/CVERecord?id=CVE-2024-50036
https://www.cve.org/CVERecord?id=CVE-2024-50167
https://www.cve.org/CVERecord?id=CVE-2024-50290
https://www.cve.org/CVERecord?id=CVE-2024-50244
https://www.cve.org/CVERecord?id=CVE-2024-42252
https://www.cve.org/CVERecord?id=CVE-2024-50301
https://www.cve.org/CVERecord?id=CVE-2024-50151
https://www.cve.org/CVERecord?id=CVE-2024-53104
https://www.cve.org/CVERecord?id=CVE-2024-50083
https://www.cve.org/CVERecord?id=CVE-2024-50265
https://www.cve.org/CVERecord?id=CVE-2024-50282
https://www.cve.org/CVERecord?id=CVE-2024-50196
https://www.cve.org/CVERecord?id=CVE-2024-53059
https://www.cve.org/CVERecord?id=CVE-2024-50153
https://www.cve.org/CVERecord?id=CVE-2024-50082
https://www.cve.org/CVERecord?id=CVE-2024-50247
https://www.cve.org/CVERecord?id=CVE-2024-50267
https://www.cve.org/CVERecord?id=CVE-2024-50193
https://www.cve.org/CVERecord?id=CVE-2024-53061
https://www.cve.org/CVERecord?id=CVE-2024-50296
https://www.cve.org/CVERecord?id=CVE-2024-50234
https://www.cve.org/CVERecord?id=CVE-2024-50131
https://www.cve.org/CVERecord?id=CVE-2024-50232
https://www.cve.org/CVERecord?id=CVE-2024-50195
https://www.cve.org/CVERecord?id=CVE-2024-50199
Applikationen: Linux

Originalnachricht

--===============5574013300420695587==
Content-Type: multipart/signed; boundary="=-=-=";
micalg=pgp-sha512; protocol="application/pgp-signature"

--=-=-=
Content-Type: text/plain


==========================================================================
Ubuntu Security Notice USN-7289-1
February 24, 2025

linux-azure, linux-azure-fde, linux-gkeop, linux-nvidia, linux-oracle
vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-azure: Linux kernel for Microsoft Azure Cloud systems
- linux-azure-fde: Linux kernel for Microsoft Azure CVM cloud systems
- linux-gkeop: Linux kernel for Google Container Engine (GKE) systems
- linux-nvidia: Linux kernel for NVIDIA systems
- linux-oracle: Linux kernel for Oracle Cloud systems

Details:

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
- x86 architecture;
- Block layer subsystem;
- ACPI drivers;
- GPU drivers;
- HID subsystem;
- I2C subsystem;
- IIO ADC drivers;
- IIO subsystem;
- InfiniBand drivers;
- IOMMU subsystem;
- IRQ chip drivers;
- Multiple devices driver;
- Media drivers;
- Network drivers;
- STMicroelectronics network drivers;
- Parport drivers;
- Pin controllers subsystem;
- Direct Digital Synthesis drivers;
- TCM subsystem;
- TTY drivers;
- USB Dual Role (OTG-ready) Controller drivers;
- USB Serial drivers;
- USB Type-C support driver;
- USB Type-C Connector System Software Interface driver;
- BTRFS file system;
- File systems infrastructure;
- Network file system (NFS) client;
- NILFS2 file system;
- NTFS3 file system;
- SMB network file system;
- User-space API (UAPI);
- io_uring subsystem;
- BPF subsystem;
- Timer substystem drivers;
- Tracing infrastructure;
- Closures library;
- Memory management;
- Amateur Radio drivers;
- Bluetooth subsystem;
- Networking core;
- IPv4 networking;
- MAC80211 subsystem;
- Multipath TCP;
- Netfilter;
- Network traffic control;
- SCTP protocol;
- XFRM subsystem;
- Key management;
- FireWire sound drivers;
- HD-audio driver;
- QCOM ASoC drivers;
- STMicroelectronics SoC drivers;
- KVM core;
(CVE-2024-50196, CVE-2024-50199, CVE-2024-53055, CVE-2024-53101,
CVE-2024-50160, CVE-2024-50257, CVE-2024-50148, CVE-2024-50182,
CVE-2024-50162, CVE-2024-50249, CVE-2024-50127, CVE-2024-50115,
CVE-2024-50192, CVE-2024-50218, CVE-2024-50086, CVE-2024-50262,
CVE-2024-50201, CVE-2024-50082, CVE-2024-50110, CVE-2023-52913,
CVE-2024-50290, CVE-2024-50269, CVE-2024-50208, CVE-2024-50103,
CVE-2024-50194, CVE-2024-50237, CVE-2024-50245, CVE-2024-50128,
CVE-2024-53052, CVE-2024-50117, CVE-2024-42252, CVE-2024-50233,
CVE-2024-50058, CVE-2024-50229, CVE-2024-40965, CVE-2024-50265,
CVE-2024-50143, CVE-2024-50205, CVE-2024-50131, CVE-2024-50236,
CVE-2024-53066, CVE-2024-50268, CVE-2024-41066, CVE-2024-53088,
CVE-2024-50209, CVE-2024-40953, CVE-2024-50168, CVE-2024-50010,
CVE-2024-50195, CVE-2024-50171, CVE-2024-53058, CVE-2024-50267,
CVE-2024-53061, CVE-2024-53042, CVE-2024-53104, CVE-2024-50247,
CVE-2024-50101, CVE-2024-53063, CVE-2024-50167, CVE-2024-50273,
CVE-2024-50163, CVE-2024-50085, CVE-2024-50154, CVE-2024-50301,
CVE-2024-50259, CVE-2024-50292, CVE-2024-50185, CVE-2024-26718,
CVE-2024-50116, CVE-2024-50302, CVE-2024-50083, CVE-2024-50299,
CVE-2024-50036, CVE-2024-50251, CVE-2024-50202, CVE-2024-50099,
CVE-2024-50279, CVE-2024-50232, CVE-2024-53059, CVE-2024-50153,
CVE-2024-50156, CVE-2024-41080, CVE-2024-50193, CVE-2024-50287,
CVE-2024-50141, CVE-2024-50296, CVE-2024-50230, CVE-2024-50074,
CVE-2024-50234, CVE-2024-50142, CVE-2024-42291, CVE-2024-50151,
CVE-2024-50295, CVE-2024-50150, CVE-2024-50282, CVE-2024-50278,
CVE-2024-50198, CVE-2024-53097, CVE-2024-50244, CVE-2024-50134,
CVE-2024-39497, CVE-2024-50072, CVE-2024-35887)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS
linux-image-5.15.0-1060-gkeop 5.15.0-1060.68
linux-image-5.15.0-1072-nvidia 5.15.0-1072.73
linux-image-5.15.0-1072-nvidia-lowlatency 5.15.0-1072.73
linux-image-5.15.0-1075-oracle 5.15.0-1075.81
linux-image-5.15.0-1081-azure 5.15.0-1081.90
linux-image-5.15.0-1081-azure-fde 5.15.0-1081.90.1
linux-image-azure-fde-lts-22.04 5.15.0.1081.90.58
linux-image-azure-lts-22.04 5.15.0.1081.79
linux-image-gkeop 5.15.0.1060.59
linux-image-gkeop-5.15 5.15.0.1060.59
linux-image-nvidia 5.15.0.1072.72
linux-image-nvidia-lowlatency 5.15.0.1072.72
linux-image-oracle-lts-22.04 5.15.0.1075.71

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-7289-1
CVE-2023-52913, CVE-2024-26718, CVE-2024-35887, CVE-2024-39497,
CVE-2024-40953, CVE-2024-40965, CVE-2024-41066, CVE-2024-41080,
CVE-2024-42252, CVE-2024-42291, CVE-2024-50010, CVE-2024-50036,
CVE-2024-50058, CVE-2024-50072, CVE-2024-50074, CVE-2024-50082,
CVE-2024-50083, CVE-2024-50085, CVE-2024-50086, CVE-2024-50099,
CVE-2024-50101, CVE-2024-50103, CVE-2024-50110, CVE-2024-50115,
CVE-2024-50116, CVE-2024-50117, CVE-2024-50127, CVE-2024-50128,
CVE-2024-50131, CVE-2024-50134, CVE-2024-50141, CVE-2024-50142,
CVE-2024-50143, CVE-2024-50148, CVE-2024-50150, CVE-2024-50151,
CVE-2024-50153, CVE-2024-50154, CVE-2024-50156, CVE-2024-50160,
CVE-2024-50162, CVE-2024-50163, CVE-2024-50167, CVE-2024-50168,
CVE-2024-50171, CVE-2024-50182, CVE-2024-50185, CVE-2024-50192,
CVE-2024-50193, CVE-2024-50194, CVE-2024-50195, CVE-2024-50196,
CVE-2024-50198, CVE-2024-50199, CVE-2024-50201, CVE-2024-50202,
CVE-2024-50205, CVE-2024-50208, CVE-2024-50209, CVE-2024-50218,
CVE-2024-50229, CVE-2024-50230, CVE-2024-50232, CVE-2024-50233,
CVE-2024-50234, CVE-2024-50236, CVE-2024-50237, CVE-2024-50244,
CVE-2024-50245, CVE-2024-50247, CVE-2024-50249, CVE-2024-50251,
CVE-2024-50257, CVE-2024-50259, CVE-2024-50262, CVE-2024-50265,
CVE-2024-50267, CVE-2024-50268, CVE-2024-50269, CVE-2024-50273,
CVE-2024-50278, CVE-2024-50279, CVE-2024-50282, CVE-2024-50287,
CVE-2024-50290, CVE-2024-50292, CVE-2024-50295, CVE-2024-50296,
CVE-2024-50299, CVE-2024-50301, CVE-2024-50302, CVE-2024-53042,
CVE-2024-53052, CVE-2024-53055, CVE-2024-53058, CVE-2024-53059,
CVE-2024-53061, CVE-2024-53063, CVE-2024-53066, CVE-2024-53088,
CVE-2024-53097, CVE-2024-53101, CVE-2024-53104

Package Information:
https://launchpad.net/ubuntu/+source/linux-azure/5.15.0-1081.90
https://launchpad.net/ubuntu/+source/linux-azure-fde/5.15.0-1081.90.1
https://launchpad.net/ubuntu/+source/linux-gkeop/5.15.0-1060.68
https://launchpad.net/ubuntu/+source/linux-nvidia/5.15.0-1072.73
https://launchpad.net/ubuntu/+source/linux-oracle/5.15.0-1075.81

--=-=-=
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=/948
-----END PGP SIGNATURE-----
--=-=-=--


--===============5574013300420695587==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline


--===============5574013300420695587==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung