Login
Newsletter
Werbung

Sicherheit: Denial of Service in Linux
Aktuelle Meldungen Distributionen
Name: Denial of Service in Linux
ID: USN-5634-1
Distribution: Ubuntu
Plattformen: Ubuntu 22.04 LTS
Datum: Do, 22. September 2022, 21:53
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
Applikationen: Linux

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============6672300298682070829==
Content-Language: en-US
Content-Type: multipart/signed; micalg=pgp-sha256;
protocol="application/pgp-signature";
boundary="------------Vm3IsL9CVMQiwtOG2UUP0iXF"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------Vm3IsL9CVMQiwtOG2UUP0iXF
Content-Type: multipart/mixed;
boundary="------------oR0SOPcI8d0Qgyep88z8DMej";
protected-headers="v1"
From: Rodrigo Figueiredo Zaiden <rodrigo.zaiden@canonical.com>
Reply-To: security@ubuntu.com
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID: <60300b77-447e-d642-eb8f-d5e5c69d6df2@canonical.com>
Subject: [USN-5634-1] Linux kernel (OEM) vulnerability

--------------oR0SOPcI8d0Qgyep88z8DMej
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64

==========================================================================
Ubuntu Security Notice USN-5634-1
September 22, 2022

linux-oem-5.17 vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS

Summary:

The system could be made to crash if it received specially crafted
network traffic.

Software Description:
- linux-oem-5.17: Linux kernel for OEM systems

Details:

Domingo Dirutigliano and Nicola Guerrera discovered that the netfilter
subsystem in the Linux kernel did not properly handle rules that
truncated packets below the packet header size. When such rules are in
place, a remote attacker could possibly use this to cause a denial of
service (system crash).

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS:
linux-image-5.17.0-1017-oem 5.17.0-1017.18
linux-image-oem-22.04 5.17.0.1017.16
linux-image-oem-22.04a 5.17.0.1017.16

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-5634-1
CVE-2022-36946

Package Information:
https://launchpad.net/ubuntu/+source/linux-oem-5.17/5.17.0-1017.18
--------------oR0SOPcI8d0Qgyep88z8DMej--

--------------Vm3IsL9CVMQiwtOG2UUP0iXF
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmMspZsFAwAAAAAACgkQZ0GeRcM5nt3g
4gf7Bopj1rqS/BfaxMT3wwDqh6GCOPzShHhV40Biod/fXxdNfqxEyS95LC8kWFiX7epL5xZzIitc
1MN4L3tz4L3zo/DL2MglxrxYbjczZgPyuPQmBV/VgVfX7oxyQKLIaMlmJY5fk+CTAZ792Dwcjlcj
g8vh+StVF1yuF1/igeE/V5qoXkCiOGZimBgBuGOuafVf6Fie3FLyghs6+IUdu95Y/cVmlT5ATmOa
dG4A62gm7sZwW8XYqsp6vUPTkp1/ze+sf9WfQAKEb3/tlbqY5cRHMeuaz1vkhvqlYM0SYIoecwVI
271QFQs2D3ub23AKOleDfXYMHmUAEU5MkuvowSv3Ww==
=awpi
-----END PGP SIGNATURE-----

--------------Vm3IsL9CVMQiwtOG2UUP0iXF--


--===============6672300298682070829==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

Cg==

--===============6672300298682070829==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung