Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Linux (Aktualisierung)
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Linux (Aktualisierung)
ID: USN-7591-5
Distribution: Ubuntu
Plattformen: Ubuntu 22.04 LTS
Datum: Fr, 4. Juli 2025, 23:24
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21994
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21992
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22056
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22060
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22007
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46753
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42230
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22025
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22089
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21957
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22097
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22010
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22044
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22035
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38637
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39728
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22014
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22008
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21964
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23138
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49636
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46821
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22018
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37785
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22081
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21968
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21956
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22045
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22086
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22079
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21996
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22063
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22066
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38152
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21970
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39735
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22073
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22054
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22004
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22071
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21981
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22005
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49728
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37889
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36945
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56664
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21962
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53034
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2312
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21963
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23136
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21991
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22055
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53144
Applikationen: Linux
Update von: Mehrere Probleme in Linux

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------wGg9rw8Q0HVytpvTcc0rrlEH
Content-Type: multipart/mixed;
boundary="------------NMIq29K4q91VUaQ7SLctp6F0";
protected-headers="v1"
From: Rodrigo Figueiredo Zaiden <rodrigo.zaiden@canonical.com>
Reply-To: security@ubuntu.com
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID: <aeb505a1-8b7a-45b4-9f39-fa0ed3d67406@canonical.com>
Subject: [USN-7591-5] Linux kernel (Intel IoTG) vulnerabilities

--------------NMIq29K4q91VUaQ7SLctp6F0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64

==========================================================================
Ubuntu Security Notice USN-7591-5
July 04, 2025

linux-intel-iotg vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-intel-iotg: Linux kernel for Intel IoT platforms

Details:

Michael Randrianantenaina discovered that the Bluetooth driver in the Linux
Kernel contained an improper access control vulnerability. A nearby
attacker could use this to connect a rougue device and possibly execute
arbitrary code. (CVE-2024-8805)

It was discovered that the CIFS network file system implementation in the
Linux kernel did not properly verify the target namespace when handling
upcalls. An attacker could use this to expose sensitive information.
(CVE-2025-2312)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- PowerPC architecture;
- x86 architecture;
- ACPI drivers;
- Clock framework and drivers;
- GPU drivers;
- HID subsystem;
- InfiniBand drivers;
- Media drivers;
- MemoryStick subsystem;
- Network drivers;
- Mellanox network drivers;
- NTB driver;
- PCI subsystem;
- Voltage and Current Regulator drivers;
- Remote Processor subsystem;
- SCSI subsystem;
- QCOM SoC drivers;
- Thermal drivers;
- BTRFS file system;
- Ext4 file system;
- JFS file system;
- Network file system (NFS) server daemon;
- NTFS3 file system;
- File systems infrastructure;
- Proc file system;
- SMB network file system;
- IPv6 networking;
- RDMA verbs API;
- SoC audio core drivers;
- Tracing infrastructure;
- Watch queue notification mechanism;
- 802.1Q VLAN protocol;
- Asynchronous Transfer Mode (ATM) subsystem;
- Bluetooth subsystem;
- Networking core;
- IPv4 networking;
- Netfilter;
- Network traffic control;
- SMC sockets;
- SoC Audio for Freescale CPUs drivers;
(CVE-2025-23138, CVE-2025-21956, CVE-2025-21970, CVE-2025-22025,
CVE-2024-46753, CVE-2025-21962, CVE-2025-37889, CVE-2025-21992,
CVE-2025-39728, CVE-2025-22054, CVE-2025-21959, CVE-2024-53144,
CVE-2022-49728, CVE-2024-58093, CVE-2025-38637, CVE-2025-21981,
CVE-2025-21963, CVE-2025-21968, CVE-2025-22014, CVE-2024-46812,
CVE-2025-22005, CVE-2025-21994, CVE-2025-22071, CVE-2025-22008,
CVE-2022-49636, CVE-2025-22007, CVE-2023-53034, CVE-2025-22035,
CVE-2025-22010, CVE-2025-22081, CVE-2025-22021, CVE-2024-46821,
CVE-2025-21999, CVE-2025-38575, CVE-2025-22073, CVE-2025-22004,
CVE-2024-42230, CVE-2025-21941, CVE-2024-56664, CVE-2025-22044,
CVE-2025-39735, CVE-2025-22060, CVE-2025-22055, CVE-2025-21957,
CVE-2025-21975, CVE-2025-22075, CVE-2025-22089, CVE-2025-37937,
CVE-2025-38152, CVE-2025-22020, CVE-2025-22066, CVE-2025-22056,
CVE-2025-22050, CVE-2025-21964, CVE-2025-21996, CVE-2025-22079,
CVE-2025-23136, CVE-2025-22063, CVE-2024-36945, CVE-2025-22097,
CVE-2025-37785, CVE-2025-21991, CVE-2025-22086, CVE-2025-22045,
CVE-2025-22018)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS
linux-image-5.15.0-1081-intel-iotg 5.15.0-1081.87
linux-image-intel-iotg 5.15.0.1081.81

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-7591-5
https://ubuntu.com/security/notices/USN-7591-4
https://ubuntu.com/security/notices/USN-7591-3
https://ubuntu.com/security/notices/USN-7591-2
https://ubuntu.com/security/notices/USN-7591-1
CVE-2022-49636, CVE-2022-49728, CVE-2023-53034, CVE-2024-36945,
CVE-2024-42230, CVE-2024-46753, CVE-2024-46812, CVE-2024-46821,
CVE-2024-53144, CVE-2024-56664, CVE-2024-58093, CVE-2024-8805,
CVE-2025-21941, CVE-2025-21956, CVE-2025-21957, CVE-2025-21959,
CVE-2025-21962, CVE-2025-21963, CVE-2025-21964, CVE-2025-21968,
CVE-2025-21970, CVE-2025-21975, CVE-2025-21981, CVE-2025-21991,
CVE-2025-21992, CVE-2025-21994, CVE-2025-21996, CVE-2025-21999,
CVE-2025-22004, CVE-2025-22005, CVE-2025-22007, CVE-2025-22008,
CVE-2025-22010, CVE-2025-22014, CVE-2025-22018, CVE-2025-22020,
CVE-2025-22021, CVE-2025-22025, CVE-2025-22035, CVE-2025-22044,
CVE-2025-22045, CVE-2025-22050, CVE-2025-22054, CVE-2025-22055,
CVE-2025-22056, CVE-2025-22060, CVE-2025-22063, CVE-2025-22066,
CVE-2025-22071, CVE-2025-22073, CVE-2025-22075, CVE-2025-22079,
CVE-2025-22081, CVE-2025-22086, CVE-2025-22089, CVE-2025-22097,
CVE-2025-2312, CVE-2025-23136, CVE-2025-23138, CVE-2025-37785,
CVE-2025-37889, CVE-2025-37937, CVE-2025-38152, CVE-2025-38575,
CVE-2025-38637, CVE-2025-39728, CVE-2025-39735

Package Information:
https://launchpad.net/ubuntu/+source/linux-intel-iotg/5.15.0-1081.87

--------------NMIq29K4q91VUaQ7SLctp6F0--

--------------wGg9rw8Q0HVytpvTcc0rrlEH
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature.asc"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmhn8wQFAwAAAAAACgkQZ0GeRcM5nt2E
rwf/cxSZT61CBkau8qZMdVV+b8PeuMmSKTW/IYkblulvDUU3PQ3biULn+Co030J1E8ZbWNPv0y6G
IRIK5SLVn6wH9kgxrvvFrMENN8PnXFfbTpIvgSrc16rPWQFTwFvOr6OkBtGRJUbwqREGzWBbeFZK
zbybKZLJ9FNXh9hg5fWe4iGjmGorJPanA4uEKkJMoCshqCG9EbXtz8a4nPpktcbn9QA3LTJz6rq9
6vZRlJV8NEHgHTGHTz6iQpJSRHq4ojA/8EjV34GDsZUbPcpZd/BYKT2Uu65FU5VsZWyZ6ZJhAq23
jt36SpCosFtIeBe5/zs2/PW6VL6iw8CriapSqu94cA==
=dPdo
-----END PGP SIGNATURE-----

--------------wGg9rw8Q0HVytpvTcc0rrlEH--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung