Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Linux
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Linux
ID: USN-7475-1
Distribution: Ubuntu
Plattformen: Ubuntu 22.04 LTS
Datum: Fr, 2. Mai 2025, 23:49
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50248
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0995
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56651
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21703
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21702
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21701
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21756
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21993
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21700
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56658
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50256
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35864
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57798
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26928
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46826
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26837
Applikationen: Linux

Originalnachricht

--===============7506860708938801275==
Content-Type: multipart/signed; boundary="=-=-=";
micalg=pgp-sha512; protocol="application/pgp-signature"

--=-=-=
Content-Type: text/plain

==========================================================================
Ubuntu Security Notice USN-7475-1
May 02, 2025

linux-xilinx-zynqmp vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-xilinx-zynqmp: Linux kernel for Xilinx ZynqMP processors

Details:

Jann Horn discovered that the watch_queue event notification subsystem in
the Linux kernel contained an out-of-bounds write vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
escalate their privileges. (CVE-2022-0995)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- iSCSI Boot Firmware Table Attributes driver;
- GPU drivers;
- Network drivers;
- File systems infrastructure;
- NTFS3 file system;
- SMB network file system;
- Network namespace;
- Ethernet bridge;
- Networking core;
- Ethtool driver;
- IPv6 networking;
- Network traffic control;
- VMware vSockets driver;
(CVE-2024-50248, CVE-2024-57798, CVE-2025-21702, CVE-2024-56651,
CVE-2024-26837, CVE-2025-21703, CVE-2024-46826, CVE-2025-21700,
CVE-2024-50256, CVE-2024-35864, CVE-2025-21756, CVE-2025-21993,
CVE-2024-26928, CVE-2024-56658, CVE-2025-21701)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS
linux-image-5.15.0-1046-xilinx-zynqmp 5.15.0-1046.50
linux-image-xilinx-zynqmp 5.15.0.1046.50

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-7475-1
CVE-2022-0995, CVE-2024-26837, CVE-2024-26928, CVE-2024-35864,
CVE-2024-46826, CVE-2024-50248, CVE-2024-50256, CVE-2024-56651,
CVE-2024-56658, CVE-2024-57798, CVE-2025-21700, CVE-2025-21701,
CVE-2025-21702, CVE-2025-21703, CVE-2025-21756, CVE-2025-21993

Package Information:
https://launchpad.net/ubuntu/+source/linux-xilinx-zynqmp/5.15.0-1046.50


--=-=-=
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=cnV2
-----END PGP SIGNATURE-----
--=-=-=--


--===============7506860708938801275==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline


--===============7506860708938801275==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung