[Bug 2058192] Re: [MIR] lenovo-wwan-unlock

2024-07-15 Thread Steve Beattie
** Tags added: sec-4736

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058192

Title:
  [MIR] lenovo-wwan-unlock

To manage notifications about this bug go to:
https://bugs.launchpad.net/oem-priority/+bug/2058192/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2071717] Re: [MIR] linuxptp

2024-07-15 Thread Steve Beattie
** Tags added: sec-4733

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2071717

Title:
  [MIR] linuxptp

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linuxptp/+bug/2071717/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2066262] Re: [MIR] libdex

2024-06-21 Thread Steve Beattie
** Tags added: sec-4617

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2066262

Title:
  [MIR] libdex

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libdex/+bug/2066262/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2063062] [NEW] Please remove src:cryptojs ; unmaintained and deprecated upstream

2024-04-21 Thread Steve Beattie
Public bug reported:

The cryptojs library has been deprecated by upstream
https://github.com/brix/crypto-js?tab=readme-ov-file#discontinued and
recommends the native javascript Crypt library.

It has no reverse dependencies:

$ reverse-depends src:cryptojs
No reverse dependencies found
$ reverse-depends -b src:cryptojs
No reverse dependencies found

It has been removed from debian testing
https://tracker.debian.org/news/1486067/cryptojs-removed-from-testing/
and has https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056014

** Affects: cryptojs (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2063062

Title:
  Please remove src:cryptojs ; unmaintained and deprecated upstream

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/cryptojs/+bug/2063062/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060354] Re: Segfaults and assertion failures in Xorg's render/glyph.c

2024-04-08 Thread Steve Beattie
** Also affects: xorg-server (Ubuntu Noble)
   Importance: High
   Status: Triaged

** Also affects: xwayland (Ubuntu Noble)
   Importance: High
   Status: Triaged

** Also affects: xorg-server (Ubuntu Jammy)
   Importance: Undecided
   Status: New

** Also affects: xwayland (Ubuntu Jammy)
   Importance: Undecided
   Status: New

** Also affects: xorg-server (Ubuntu Mantic)
   Importance: Undecided
   Status: New

** Also affects: xwayland (Ubuntu Mantic)
   Importance: Undecided
   Status: New

** Also affects: xorg-server (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Also affects: xwayland (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Changed in: xorg-server (Ubuntu Focal)
   Importance: Undecided => High

** Changed in: xorg-server (Ubuntu Focal)
   Status: New => In Progress

** Changed in: xorg-server (Ubuntu Jammy)
   Importance: Undecided => High

** Changed in: xorg-server (Ubuntu Jammy)
   Status: New => In Progress

** Changed in: xorg-server (Ubuntu Mantic)
   Importance: Undecided => High

** Changed in: xorg-server (Ubuntu Mantic)
   Status: New => In Progress

** No longer affects: xwayland (Ubuntu Focal)

** Changed in: xwayland (Ubuntu Jammy)
   Importance: Undecided => High

** Changed in: xwayland (Ubuntu Jammy)
   Status: New => In Progress

** Changed in: xwayland (Ubuntu Mantic)
   Importance: Undecided => High

** Changed in: xwayland (Ubuntu Mantic)
   Status: New => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060354

Title:
  Segfaults and assertion failures in Xorg's render/glyph.c

To manage notifications about this bug go to:
https://bugs.launchpad.net/xorg-server/+bug/2060354/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060354] Re: Segfaults and assertion failures in Xorg's render/glyph.c

2024-04-08 Thread Steve Beattie
I have prepared test packages for ubuntu 22.04 LTS/jammy in the
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages PPA for both xorg-server:

  https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+sourcepub/15921802/+listing-archive-extra

and for xwayland:

  https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+sourcepub/15921798/+listing-archive-extra

I was able to reproduce the crash under Xwayland in a jammy vm with both
intellij and the glyph_memleak.c reproducer, and using the proposed
upstream patch seems to address the crash, but more testing is welcome.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060354

Title:
  Segfaults and assertion failures in Xorg's render/glyph.c

To manage notifications about this bug go to:
https://bugs.launchpad.net/xorg-server/+bug/2060354/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060354] Re: Segfaults and assertion failures in Xorg's render/glyph.c

2024-04-08 Thread Steve Beattie
The reproducer https://bugs.freedesktop.org/attachment.cgi?id=28621 from
the original 2009 bug report
https://bugs.freedesktop.org/show_bug.cgi?id=23286 does seem to work at
triggering this issue, at least under Xwalyand.

** Bug watch added: freedesktop.org Bugzilla #23286
   https://bugs.freedesktop.org/show_bug.cgi?id=23286

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060354

Title:
  Segfaults and assertion failures in Xorg's render/glyph.c

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xorg-server/+bug/2060354/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060354] Re: Segfaults and assertion failures in Xorg's render/glyph.c

2024-04-08 Thread Steve Beattie
Are people seeing this issue with any other Ubuntu releases, which also
received updates addressing CVE-2024-31083, or is this strictly
affecting the version in 22.04/jammy?

It looks like
https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/1476 has a
proposed fix, in
https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/1476.patch
.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060354

Title:
  Segfaults and assertion failures in Xorg's render/glyph.c

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xorg-server/+bug/2060354/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1597017] Re: mount rules grant excessive permissions

2024-03-29 Thread Steve Beattie
** Description changed:

+ SRU Team; the packages for focal-proposed and jammy-proposed are
+ intended as security updates prepared by the Ubuntu Security team (and
+ have built in a ppa with only the security pockets enabled). However,
+ because the fix makes mount rules in apparmor policy be treated more
+ restrictively than they were prior to this update, we would like these
+ packages to gain more widespread testing.
+ 
+ Risk of Regression:
+ 
+ The update for this issue causes the apparmor parser, the tool that
+ translates written policy into the enforcement data structures used by
+ the kernel, to generate more strict policy for mount rules, like the
+ example below. They are not common in apparmor policy generally, but can
+ appear in policies written for container managers to restrict
+ containers, and thus can potentially break container startup.
+ 
+ The packages prepared for focal-proposed and jammy-proposed have tested
+ with the versions of snapd, lxc, libvirt, and docker in the ubuntu
+ archive, but conainter managers outside of the ubunty archive may run
+ into issues, hence the need for testing and policy adjustments.
+ 
+ Original Report:
+ 
  The rule
-   mount options=(rw,make-slave) -> **,
+   mount options=(rw,make-slave) -> **,
  
  ends up allowing
-   mount -t proc proc /mnt
+   mount -t proc proc /mnt
  
  which it shouldn't as it should be restricted to commands with a make-
  slave flag

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1597017

Title:
  mount rules grant excessive permissions

To manage notifications about this bug go to:
https://bugs.launchpad.net/apparmor/+bug/1597017/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1597017] Re: mount rules grant excessive permissions

2024-03-06 Thread Steve Beattie
** Also affects: apparmor (Ubuntu)
   Importance: Undecided
   Status: New

** Also affects: apparmor (Ubuntu Jammy)
   Importance: Undecided
   Status: New

** Also affects: apparmor (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Changed in: apparmor (Ubuntu)
   Status: New => Fix Released

** Changed in: apparmor (Ubuntu Focal)
   Status: New => In Progress

** Changed in: apparmor (Ubuntu Jammy)
   Status: New => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1597017

Title:
  mount rules grant excessive permissions

To manage notifications about this bug go to:
https://bugs.launchpad.net/apparmor/+bug/1597017/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[USN-6628-2] Linux kernel (Intel IoTG) vulnerabilities

2024-02-14 Thread Steve Beattie
==
Ubuntu Security Notice USN-6628-2
February 15, 2024

linux-intel-iotg-5.15 vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-intel-iotg-5.15: Linux kernel for Intel IoT platforms

Details:

Quentin Minster discovered that a race condition existed in the KSMBD
implementation in the Linux kernel when handling sessions operations. A
remote attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-32250, CVE-2023-32252,
CVE-2023-32257)

Marek Marczykowski-Górecki discovered that the Xen event channel
infrastructure implementation in the Linux kernel contained a race
condition. An attacker in a guest VM could possibly use this to cause a
denial of service (paravirtualized device unavailability). (CVE-2023-34324)

Zheng Wang discovered a use-after-free in the Renesas Ethernet AVB driver
in the Linux kernel during device removal. A privileged attacker could use
this to cause a denial of service (system crash). (CVE-2023-35827)

Tom Dohrmann discovered that the Secure Encrypted Virtualization (SEV)
implementation for AMD processors in the Linux kernel contained a race
condition when accessing MMIO registers. A local attacker in a SEV guest VM
could possibly use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-46813)

It was discovered that the Microchip USB Ethernet driver in the Linux
kernel contained a race condition during device removal, leading to a use-
after-free vulnerability. A physically proximate attacker could use this to
cause a denial of service (system crash). (CVE-2023-6039)

Lin Ma discovered that the netfilter subsystem in the Linux kernel did not
properly validate network family support while creating a new netfilter
table. A local attacker could use this to cause a denial of service or
possibly execute arbitrary code. (CVE-2023-6040)

It was discovered that the TLS subsystem in the Linux kernel did not
properly perform cryptographic operations in some situations, leading to a
null pointer dereference vulnerability. A local attacker could use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-6176)

It was discovered that the CIFS network file system implementation in the
Linux kernel did not properly validate the server frame size in certain
situation, leading to an out-of-bounds read vulnerability. An attacker
could use this to construct a malicious CIFS image that, when operated on,
could cause a denial of service (system crash) or possibly expose sensitive
information. (CVE-2023-6606)

Xingyuan Mo discovered that the netfilter subsystem in the Linux kernel did
not properly handle dynset expressions passed from userspace, leading to a
null pointer dereference vulnerability. A local attacker could use this to
cause a denial of service (system crash). (CVE-2023-6622)

Xingyuan Mo discovered that the netfilter subsystem in the Linux kernel did
not properly handle inactive elements in its PIPAPO data structure, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-6817)

Budimir Markovic, Lucas De Marchi, and Pengfei Xu discovered that the perf
subsystem in the Linux kernel did not properly validate all event sizes
when attaching new events, leading to an out-of-bounds write vulnerability.
A local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-6931)

It was discovered that the IGMP protocol implementation in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-6932)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly check deactivated elements in certain situations, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2024-0193)

It was discovered that the TIPC protocol implementation in the Linux kernel
did not properly handle locking during tipc_crypto_key_revoke() operations.
A local attacker could use this to cause a denial of service (kernel
deadlock). (CVE-2024-0641)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
  linux-image-5.15.0-1048-intel-iotg  5.15.0-1048.54~20.04.1
  linux-image-intel   5.15.0.1048.54~20.04.38
  linux-image-intel-iotg  5.15.0.1048.54~20.04.38

After a 

[USN-6639-1] Linux kernel (OEM) vulnerabilities

2024-02-14 Thread Steve Beattie
==
Ubuntu Security Notice USN-6639-1
February 15, 2024

linux-oem-6.1 vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-oem-6.1: Linux kernel for OEM systems

Details:

It was discovered that a race condition existed in the ATM (Asynchronous
Transfer Mode) subsystem of the Linux kernel, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-51780)

It was discovered that a race condition existed in the AppleTalk networking
subsystem of the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-51781)

It was discovered that a race condition existed in the Rose X.25 protocol
implementation in the Linux kernel, leading to a use-after- free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-51782)

Alon Zahavi discovered that the NVMe-oF/TCP subsystem of the Linux kernel
did not properly handle connect command payloads in certain situations,
leading to an out-of-bounds read vulnerability. A remote attacker could use
this to expose sensitive information (kernel memory). (CVE-2023-6121)

Jann Horn discovered that a race condition existed in the Linux kernel when
handling io_uring over sockets, leading to a use-after-free vulnerability.
A local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-6531)

Xingyuan Mo discovered that the netfilter subsystem in the Linux kernel did
not properly handle dynset expressions passed from userspace, leading to a
null pointer dereference vulnerability. A local attacker could use this to
cause a denial of service (system crash). (CVE-2023-6622)

It was discovered that the IGMP protocol implementation in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-6932)

Robert Morris discovered that the CIFS network file system implementation
in the Linux kernel did not properly validate certain server commands
fields, leading to an out-of-bounds read vulnerability. An attacker could
use this to cause a denial of service (system crash) or possibly expose
sensitive information. (CVE-2024-0565)

Dan Carpenter discovered that the netfilter subsystem in the Linux kernel
did not store data in properly sized memory locations. A local user could
use this to cause a denial of service (system crash). (CVE-2024-0607)

Jann Horn discovered that the TLS subsystem in the Linux kernel did not
properly handle spliced messages, leading to an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2024-0646)

Yang Chaoming discovered that the KSMBD implementation in the Linux kernel
did not properly validate request buffer sizes, leading to an out-of-bounds
read vulnerability. An attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2024-22705)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS:
  linux-image-6.1.0-1033-oem  6.1.0-1033.33
  linux-image-oem-22.04   6.1.0.1033.34
  linux-image-oem-22.04a  6.1.0.1033.34
  linux-image-oem-22.04b  6.1.0.1033.34
  linux-image-oem-22.04c  6.1.0.1033.34

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
  https://ubuntu.com/security/notices/USN-6639-1
  CVE-2023-51780, CVE-2023-51781, CVE-2023-51782, CVE-2023-6121,
  CVE-2023-6531, CVE-2023-6622, CVE-2023-6932, CVE-2024-0565,
  CVE-2024-0607, CVE-2024-0646, CVE-2024-22705

Package Information:
  https://launchpad.net/ubuntu/+source/linux-oem-6.1/6.1.0-1033.33



signature.asc
Description: PGP signature



[USN-6635-1] Linux kernel (GCP) vulnerabilities

2024-02-14 Thread Steve Beattie
==
Ubuntu Security Notice USN-6635-1
February 14, 2024

linux-gcp-6.2 vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-gcp-6.2: Linux kernel for Google Cloud Platform (GCP) systems

Details:

It was discovered that the USB subsystem in the Linux kernel contained a
race condition while handling device descriptors in certain situations,
leading to a out-of-bounds read vulnerability. A local attacker could
possibly use this to cause a denial of service (system crash).
(CVE-2023-37453)

Lucas Leong discovered that the netfilter subsystem in the Linux kernel did
not properly validate some attributes passed from userspace. A local
attacker could use this to cause a denial of service (system crash) or
possibly expose sensitive information (kernel memory). (CVE-2023-39189)

Sunjoo Park discovered that the netfilter subsystem in the Linux kernel did
not properly validate u32 packets content, leading to an out-of-bounds read
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-39192)

Lucas Leong discovered that the netfilter subsystem in the Linux kernel did
not properly validate SCTP data, leading to an out-of-bounds read
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-39193)

Kyle Zeng discovered that the IPv4 implementation in the Linux kernel did
not properly handle socket buffers (skb) when performing IP routing in
certain circumstances, leading to a null pointer dereference vulnerability.
A privileged attacker could use this to cause a denial of service (system
crash). (CVE-2023-42754)

Jason Wang discovered that the virtio ring implementation in the Linux
kernel did not properly handle iov buffers in some situations. A local
attacker in a guest VM could use this to cause a denial of service (host
system crash). (CVE-2023-5158)

Alon Zahavi discovered that the NVMe-oF/TCP subsystem in the Linux kernel
did not properly handle queue initialization failures in certain
situations, leading to a use-after-free vulnerability. A remote attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-5178)

Budimir Markovic discovered that the perf subsystem in the Linux kernel did
not properly handle event groups, leading to an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-5717)

It was discovered that the CIFS network file system implementation in the
Linux kernel did not properly validate the server frame size in certain
situation, leading to an out-of-bounds read vulnerability. An attacker
could use this to construct a malicious CIFS image that, when operated on,
could cause a denial of service (system crash) or possibly expose sensitive
information. (CVE-2023-6606)

Xingyuan Mo discovered that the netfilter subsystem in the Linux kernel did
not properly handle inactive elements in its PIPAPO data structure, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-6817)

Budimir Markovic, Lucas De Marchi, and Pengfei Xu discovered that the perf
subsystem in the Linux kernel did not properly validate all event sizes
when attaching new events, leading to an out-of-bounds write vulnerability.
A local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-6931)

It was discovered that the IGMP protocol implementation in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-6932)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly check deactivated elements in certain situations, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2024-0193)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS:
  linux-image-6.2.0-1021-gcp  6.2.0-1021.23~22.04.1
  linux-image-gcp 6.2.0.1021.23~22.04.1

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall 

[USN-6608-2] Linux kernel (NVIDIA) vulnerabilities

2024-02-14 Thread Steve Beattie
==
Ubuntu Security Notice USN-6608-2
February 14, 2024

linux-nvidia-6.2 vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-nvidia-6.2: Linux kernel for NVIDIA systems

Details:

It was discovered that the CIFS network file system implementation in the
Linux kernel did not properly validate the server frame size in certain
situation, leading to an out-of-bounds read vulnerability. An attacker
could use this to construct a malicious CIFS image that, when operated on,
could cause a denial of service (system crash) or possibly expose sensitive
information. (CVE-2023-6606)

Xingyuan Mo discovered that the netfilter subsystem in the Linux kernel did
not properly handle inactive elements in its PIPAPO data structure, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-6817)

Budimir Markovic, Lucas De Marchi, and Pengfei Xu discovered that the perf
subsystem in the Linux kernel did not properly validate all event sizes
when attaching new events, leading to an out-of-bounds write vulnerability.
A local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-6931)

It was discovered that the IGMP protocol implementation in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-6932)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly check deactivated elements in certain situations, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2024-0193)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS:
  linux-image-6.2.0-1015-nvidia   6.2.0-1015.15
  linux-image-6.2.0-1015-nvidia-64k  6.2.0-1015.15
  linux-image-nvidia-6.2  6.2.0.1015.17
  linux-image-nvidia-64k-6.2  6.2.0.1015.17
  linux-image-nvidia-64k-hwe-22.04  6.2.0.1015.17
  linux-image-nvidia-hwe-22.046.2.0.1015.17

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
  https://ubuntu.com/security/notices/USN-6608-2
  https://ubuntu.com/security/notices/USN-6608-1
  CVE-2023-6606, CVE-2023-6817, CVE-2023-6931, CVE-2023-6932,
  CVE-2024-0193

Package Information:
  https://launchpad.net/ubuntu/+source/linux-nvidia-6.2/6.2.0-1015.15



signature.asc
Description: PGP signature



[USN-6626-2] Linux kernel vulnerabilities

2024-02-14 Thread Steve Beattie
==
Ubuntu Security Notice USN-6626-2
February 14, 2024

linux-lowlatency, linux-raspi vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-lowlatency: Linux low latency kernel
- linux-raspi: Linux kernel for Raspberry Pi systems

Details:

Quentin Minster discovered that a race condition existed in the KSMBD
implementation in the Linux kernel when handling sessions operations. A
remote attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-32250, CVE-2023-32252,
CVE-2023-32257)

Marek Marczykowski-Górecki discovered that the Xen event channel
infrastructure implementation in the Linux kernel contained a race
condition. An attacker in a guest VM could possibly use this to cause a
denial of service (paravirtualized device unavailability). (CVE-2023-34324)

Zheng Wang discovered a use-after-free in the Renesas Ethernet AVB driver
in the Linux kernel during device removal. A privileged attacker could use
this to cause a denial of service (system crash). (CVE-2023-35827)

Tom Dohrmann discovered that the Secure Encrypted Virtualization (SEV)
implementation for AMD processors in the Linux kernel contained a race
condition when accessing MMIO registers. A local attacker in a SEV guest VM
could possibly use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-46813)

It was discovered that the Microchip USB Ethernet driver in the Linux
kernel contained a race condition during device removal, leading to a use-
after-free vulnerability. A physically proximate attacker could use this to
cause a denial of service (system crash). (CVE-2023-6039)

It was discovered that the TLS subsystem in the Linux kernel did not
properly perform cryptographic operations in some situations, leading to a
null pointer dereference vulnerability. A local attacker could use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-6176)

Xingyuan Mo discovered that the netfilter subsystem in the Linux kernel did
not properly handle dynset expressions passed from userspace, leading to a
null pointer dereference vulnerability. A local attacker could use this to
cause a denial of service (system crash). (CVE-2023-6622)

It was discovered that the TIPC protocol implementation in the Linux kernel
did not properly handle locking during tipc_crypto_key_revoke() operations.
A local attacker could use this to cause a denial of service (kernel
deadlock). (CVE-2024-0641)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS:
  linux-image-5.15.0-1046-raspi   5.15.0-1046.49
  linux-image-5.15.0-94-lowlatency  5.15.0-94.104
  linux-image-5.15.0-94-lowlatency-64k  5.15.0-94.104
  linux-image-lowlatency  5.15.0.94.94
  linux-image-lowlatency-64k  5.15.0.94.94
  linux-image-raspi   5.15.0.1046.44
  linux-image-raspi-nolpae5.15.0.1046.44

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
  https://ubuntu.com/security/notices/USN-6626-2
  https://ubuntu.com/security/notices/USN-6626-1
  CVE-2023-32250, CVE-2023-32252, CVE-2023-32257, CVE-2023-34324,
  CVE-2023-35827, CVE-2023-46813, CVE-2023-6039, CVE-2023-6176,
  CVE-2023-6622, CVE-2024-0641

Package Information:
  https://launchpad.net/ubuntu/+source/linux-lowlatency/5.15.0-94.104
  https://launchpad.net/ubuntu/+source/linux-raspi/5.15.0-1046.49



signature.asc
Description: PGP signature



[USN-6528-1] OpenJDK 8 vulnerabilities

2023-11-29 Thread Steve Beattie
==
Ubuntu Security Notice USN-6528-1
November 29, 2023

openjdk-8 vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.10
- Ubuntu 23.04
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)

Summary:

Several security issues were fixed in OpenJDK.

Software Description:
- openjdk-8: Open Source Java implementation

Details:

It was discovered that the HotSpot VM implementation in OpenJDK did not
properly validate bytecode blocks in certain situations. An attacker could
possibly use this to cause a denial of service. (CVE-2022-40433)

Carter Kozak discovered that OpenJDK, when compiling with AVX-512
instruction support enabled, could produce code that resulted in memory
corruption in certain situations. An attacker targeting applications built
in this way could possibly use this to cause a denial of service or execute
arbitrary code. In Ubuntu, OpenJDK defaults to not using AVX-512
instructions. (CVE-2023-22025)

It was discovered that the CORBA implementation in OpenJDK did not properly
perform deserialization of IOR string objects. An attacker could possibly
use this to bypass Java sandbox restrictions. (CVE-2023-22067)

It was discovered that OpenJDK did not properly perform PKIX certification
path validation in certain situations. An attacker could use this to cause
a denial of service. (CVE-2023-22081)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.10:
  openjdk-8-jdk   8u392-ga-1~23.10
  openjdk-8-jdk-headless  8u392-ga-1~23.10
  openjdk-8-jre   8u392-ga-1~23.10
  openjdk-8-jre-headless  8u392-ga-1~23.10
  openjdk-8-jre-zero  8u392-ga-1~23.10

Ubuntu 23.04:
  openjdk-8-jdk   8u392-ga-1~23.04
  openjdk-8-jdk-headless  8u392-ga-1~23.04
  openjdk-8-jre   8u392-ga-1~23.04
  openjdk-8-jre-headless  8u392-ga-1~23.04
  openjdk-8-jre-zero  8u392-ga-1~23.04

Ubuntu 22.04 LTS:
  openjdk-8-jdk   8u392-ga-1~22.04
  openjdk-8-jdk-headless  8u392-ga-1~22.04
  openjdk-8-jre   8u392-ga-1~22.04
  openjdk-8-jre-headless  8u392-ga-1~22.04
  openjdk-8-jre-zero  8u392-ga-1~22.04

Ubuntu 20.04 LTS:
  openjdk-8-jdk   8u392-ga-1~20.04
  openjdk-8-jdk-headless  8u392-ga-1~20.04
  openjdk-8-jre   8u392-ga-1~20.04
  openjdk-8-jre-headless  8u392-ga-1~20.04
  openjdk-8-jre-zero  8u392-ga-1~20.04

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
  openjdk-8-jdk   8u392-ga-1~18.04
  openjdk-8-jdk-headless  8u392-ga-1~18.04
  openjdk-8-jre   8u392-ga-1~18.04
  openjdk-8-jre-headless  8u392-ga-1~18.04
  openjdk-8-jre-zero  8u392-ga-1~18.04

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
  openjdk-8-jdk   8u392-ga-1~16.04
  openjdk-8-jdk-headless  8u392-ga-1~16.04
  openjdk-8-jre   8u392-ga-1~16.04
  openjdk-8-jre-headless  8u392-ga-1~16.04
  openjdk-8-jre-jamvm 8u392-ga-1~16.04
  openjdk-8-jre-zero  8u392-ga-1~16.04

This update uses a new upstream release, which includes additional
bug fixes. After a standard system update you need to restart any
Java applications to make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6528-1
  CVE-2022-40433, CVE-2023-22025, CVE-2023-22067, CVE-2023-22081

Package Information:
  https://launchpad.net/ubuntu/+source/openjdk-8/8u392-ga-1~23.10
  https://launchpad.net/ubuntu/+source/openjdk-8/8u392-ga-1~23.04
  https://launchpad.net/ubuntu/+source/openjdk-8/8u392-ga-1~22.04
  https://launchpad.net/ubuntu/+source/openjdk-8/8u392-ga-1~20.04



signature.asc
Description: PGP signature



[USN-6527-1] OpenJDK vulnerabilities

2023-11-29 Thread Steve Beattie
==
Ubuntu Security Notice USN-6527-1
November 29, 2023

openjdk-17, openjdk-21, openjdk-lts vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.10
- Ubuntu 23.04
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)

Summary:

Several security issues were fixed in OpenJDK 17, OpenJDK 21, OpenJDK.

Software Description:
- openjdk-17: Open Source Java implementation
- openjdk-21: Open Source Java implementation
- openjdk-lts: Open Source Java implementation

Details:

Carter Kozak discovered that OpenJDK, when compiling with AVX-512
instruction support enabled, could produce code that resulted in memory
corruption in certain situations. An attacker targeting applications built
in this way could possibly use this to cause a denial of service or execute
arbitrary code. In Ubuntu, OpenJDK defaults to not using AVX-512
instructions. (CVE-2023-22025)

It was discovered that OpenJDK did not properly perform PKIX certification
path validation in certain situations. An attacker could use this to cause
a denial of service. (CVE-2023-22081)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.10:
  openjdk-11-jdk  11.0.21+9-0ubuntu1~23.10
  openjdk-11-jdk-headless 11.0.21+9-0ubuntu1~23.10
  openjdk-11-jre  11.0.21+9-0ubuntu1~23.10
  openjdk-11-jre-headless 11.0.21+9-0ubuntu1~23.10
  openjdk-11-jre-zero 11.0.21+9-0ubuntu1~23.10
  openjdk-17-jdk  17.0.9+9-1~23.10
  openjdk-17-jdk-headless 17.0.9+9-1~23.10
  openjdk-17-jre  17.0.9+9-1~23.10
  openjdk-17-jre-headless 17.0.9+9-1~23.10
  openjdk-17-jre-zero 17.0.9+9-1~23.10
  openjdk-21-jdk  21.0.1+12-2~23.10
  openjdk-21-jdk-headless 21.0.1+12-2~23.10
  openjdk-21-jre  21.0.1+12-2~23.10
  openjdk-21-jre-headless 21.0.1+12-2~23.10
  openjdk-21-jre-zero 21.0.1+12-2~23.10

Ubuntu 23.04:
  openjdk-11-jdk  11.0.21+9-0ubuntu1~23.04
  openjdk-11-jdk-headless 11.0.21+9-0ubuntu1~23.04
  openjdk-11-jre  11.0.21+9-0ubuntu1~23.04
  openjdk-11-jre-headless 11.0.21+9-0ubuntu1~23.04
  openjdk-11-jre-zero 11.0.21+9-0ubuntu1~23.04
  openjdk-17-jdk  17.0.9+9-1~23.04
  openjdk-17-jdk-headless 17.0.9+9-1~23.04
  openjdk-17-jre  17.0.9+9-1~23.04
  openjdk-17-jre-headless 17.0.9+9-1~23.04
  openjdk-17-jre-zero 17.0.9+9-1~23.04
  openjdk-21-jdk  21.0.1+12-2~23.04
  openjdk-21-jdk-headless 21.0.1+12-2~23.04
  openjdk-21-jre  21.0.1+12-2~23.04
  openjdk-21-jre-headless 21.0.1+12-2~23.04
  openjdk-21-jre-zero 21.0.1+12-2~23.04

Ubuntu 22.04 LTS:
  openjdk-11-jdk  11.0.21+9-0ubuntu1~22.04
  openjdk-11-jdk-headless 11.0.21+9-0ubuntu1~22.04
  openjdk-11-jre  11.0.21+9-0ubuntu1~22.04
  openjdk-11-jre-headless 11.0.21+9-0ubuntu1~22.04
  openjdk-11-jre-zero 11.0.21+9-0ubuntu1~22.04
  openjdk-17-jdk  17.0.9+9-1~22.04
  openjdk-17-jdk-headless 17.0.9+9-1~22.04
  openjdk-17-jre  17.0.9+9-1~22.04
  openjdk-17-jre-headless 17.0.9+9-1~22.04
  openjdk-17-jre-zero 17.0.9+9-1~22.04

Ubuntu 20.04 LTS:
  openjdk-11-jdk  11.0.21+9-0ubuntu1~20.04
  openjdk-11-jdk-headless 11.0.21+9-0ubuntu1~20.04
  openjdk-11-jre  11.0.21+9-0ubuntu1~20.04
  openjdk-11-jre-headless 11.0.21+9-0ubuntu1~20.04
  openjdk-11-jre-zero 11.0.21+9-0ubuntu1~20.04
  openjdk-17-jdk  17.0.9+9-1~20.04
  openjdk-17-jdk-headless 17.0.9+9-1~20.04
  openjdk-17-jre  17.0.9+9-1~20.04
  openjdk-17-jre-headless 17.0.9+9-1~20.04
  openjdk-17-jre-zero 17.0.9+9-1~20.04

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
  openjdk-11-jdk  11.0.21+9-0ubuntu1~18.04
  openjdk-11-jdk-headless 11.0.21+9-0ubuntu1~18.04
  openjdk-11-jre  11.0.21+9-0ubuntu1~18.04
  openjdk-11-jre-headless 11.0.21+9-0ubuntu1~18.04
  openjdk-11-jre-zero 11.0.21+9-0ubuntu1~18.04
  openjdk-17-jdk  17.0.9+9-1~18.04
  openjdk-17-jdk-headless 17.0.9+9-1~18.04
  openjdk-17-jre  17.0.9+9-1~18.04
  openjdk-17-jre-headless 17.0.9+9-1~18.04
  openjdk-17-jre-zero 17.0.9+9-1~18.04

This update uses a new upstream release, which includes additional
bug fixes. After a standard system update you need to restart any
Java applications to make all the necessary changes.

References:
  

[USN-6454-4] Linux kernel (StarFive) vulnerabilities

2023-11-01 Thread Steve Beattie
==
Ubuntu Security Notice USN-6454-4
November 01, 2023

linux-starfive vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.10

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-starfive: Linux kernel for StarFive processors

Details:

Kyle Zeng discovered that the netfilter subsystem in the Linux kernel
contained a race condition in IP set operations in certain situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2023-42756)

Alex Birnberg discovered that the netfilter subsystem in the Linux kernel
did not properly validate register length, leading to an out-of-bounds
write vulnerability. A local attacker could possibly use this to cause a
denial of service (system crash). (CVE-2023-4881)

It was discovered that the Quick Fair Queueing scheduler implementation in
the Linux kernel did not properly handle network packets in certain
conditions, leading to a use after free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-4921)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle removal of rules from chain bindings in certain
circumstances, leading to a use-after-free vulnerability. A local attacker
could possibly use this to cause a denial of service (system crash) or
execute arbitrary code. (CVE-2023-5197)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.10:
  linux-image-6.5.0-1003-starfive  6.5.0-1003.4
  linux-image-starfive6.5.0.1003.5

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
  https://ubuntu.com/security/notices/USN-6454-4
  https://ubuntu.com/security/notices/USN-6454-1
  CVE-2023-42756, CVE-2023-4881, CVE-2023-4921, CVE-2023-5197

Package Information:
  https://launchpad.net/ubuntu/+source/linux-starfive/6.5.0-1003.4



signature.asc
Description: PGP signature



[USN-6339-2] Linux kernel vulnerabilities

2023-09-08 Thread Steve Beattie
==
Ubuntu Security Notice USN-6339-2
September 08, 2023

linux-gcp-5.15, linux-gkeop-5.15 vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-gcp-5.15: Linux kernel for Google Cloud Platform (GCP) systems
- linux-gkeop-5.15: Linux kernel for Google Container Engine (GKE) systems

Details:

It was discovered that the NTFS file system implementation in the Linux
kernel did not properly validate MFT flags in certain situations. An
attacker could use this to construct a malicious NTFS image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2022-48425)

Zi Fan Tan discovered that the binder IPC implementation in the Linux
kernel contained a use-after-free vulnerability. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-21255)

It was discovered that a race condition existed in the f2fs file system in
the Linux kernel, leading to a null pointer dereference vulnerability. An
attacker could use this to construct a malicious f2fs image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2023-2898)

It was discovered that the DVB Core driver in the Linux kernel did not
properly handle locking events in certain situations. A local attacker
could use this to cause a denial of service (kernel deadlock).
(CVE-2023-31084)

Yang Lan discovered that the GFS2 file system implementation in the Linux
kernel could attempt to dereference a null pointer in some situations. An
attacker could use this to construct a malicious GFS2 image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2023-3212)

It was discovered that the KSMBD implementation in the Linux kernel did not
properly validate buffer sizes in certain operations, leading to an out-of-
bounds read vulnerability. A remote attacker could use this to cause a
denial of service (system crash) or possibly expose sensitive information.
(CVE-2023-38426, CVE-2023-38428)

It was discovered that the KSMBD implementation in the Linux kernel did not
properly calculate the size of certain buffers. A remote attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-38429)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
  linux-image-5.15.0-1027-gkeop   5.15.0-1027.32~20.04.1
  linux-image-5.15.0-1041-gcp 5.15.0-1041.49~20.04.1
  linux-image-gcp 5.15.0.1041.49~20.04.1
  linux-image-gkeop-5.15  5.15.0.1027.32~20.04.23

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
  https://ubuntu.com/security/notices/USN-6339-2
  https://ubuntu.com/security/notices/USN-6339-1
  CVE-2022-48425, CVE-2023-21255, CVE-2023-2898, CVE-2023-31084,
  CVE-2023-3212, CVE-2023-38426, CVE-2023-38428, CVE-2023-38429

Package Information:
  https://launchpad.net/ubuntu/+source/linux-gcp-5.15/5.15.0-1041.49~20.04.1
  https://launchpad.net/ubuntu/+source/linux-gkeop-5.15/5.15.0-1027.32~20.04.1



signature.asc
Description: PGP signature



[USN-6342-2] Linux kernel (Azure) vulnerabilities

2023-09-08 Thread Steve Beattie
==
Ubuntu Security Notice USN-6342-2
September 08, 2023

linux-azure, linux-azure-4.15 vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)
- Ubuntu 14.04 LTS (Available with Ubuntu Pro)

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-azure-4.15: Linux kernel for Microsoft Azure Cloud systems
- linux-azure: Linux kernel for Microsoft Azure Cloud systems

Details:

Tavis Ormandy discovered that some AMD processors did not properly handle
speculative execution of certain vector register instructions. A local
attacker could use this to expose sensitive information. (CVE-2023-20593)

Zheng Zhang discovered that the device-mapper implementation in the Linux
kernel did not properly handle locking during table_clear() operations. A
local attacker could use this to cause a denial of service (kernel
deadlock). (CVE-2023-2269)

It was discovered that a use-after-free vulnerability existed in the HFS+
file system implementation in the Linux kernel. A local attacker could
possibly use this to cause a denial of service (system crash).
(CVE-2023-2985)

It was discovered that the DVB Core driver in the Linux kernel did not
properly handle locking events in certain situations. A local attacker
could use this to cause a denial of service (kernel deadlock).
(CVE-2023-31084)

It was discovered that the Quick Fair Queueing network scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3611)

It was discovered that the network packet classifier with
netfilter/firewall marks implementation in the Linux kernel did not
properly handle reference counting, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3776)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
  linux-image-4.15.0-1169-azure   4.15.0-1169.184
  linux-image-azure-lts-18.04 4.15.0.1169.137

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
  linux-image-4.15.0-1169-azure   4.15.0-1169.184~16.04.1
  linux-image-azure   4.15.0.1169.153

Ubuntu 14.04 LTS (Available with Ubuntu Pro):
  linux-image-4.15.0-1169-azure   4.15.0-1169.184~14.04.1
  linux-image-azure   4.15.0.1169.135

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
  https://ubuntu.com/security/notices/USN-6342-2
  https://ubuntu.com/security/notices/USN-6342-1
  CVE-2023-20593, CVE-2023-2269, CVE-2023-2985, CVE-2023-31084,
  CVE-2023-3611, CVE-2023-3776



signature.asc
Description: PGP signature



[USN-6340-2] Linux kernel vulnerabilities

2023-09-08 Thread Steve Beattie
==
Ubuntu Security Notice USN-6340-2
September 08, 2023

linux-azure-5.4, linux-gcp-5.4, linux-gkeop, linux-raspi, linux-raspi-5.4,
linux-xilinx-zynqmp vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-gkeop: Linux kernel for Google Container Engine (GKE) systems
- linux-raspi: Linux kernel for Raspberry Pi systems
- linux-xilinx-zynqmp: Linux kernel for Xilinx ZynqMP processors
- linux-azure-5.4: Linux kernel for Microsoft Azure cloud systems
- linux-gcp-5.4: Linux kernel for Google Cloud Platform (GCP) systems
- linux-raspi-5.4: Linux kernel for Raspberry Pi systems

Details:

Ruihan Li discovered that the bluetooth subsystem in the Linux kernel did
not properly perform permissions checks when handling HCI sockets. A
physically proximate attacker could use this to cause a denial of service
(bluetooth communication). (CVE-2023-2002)

Zi Fan Tan discovered that the binder IPC implementation in the Linux
kernel contained a use-after-free vulnerability. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-21255)

Juan Jose Lopez Jaimez, Meador Inge, Simon Scannell, and Nenad Stojanovski
discovered that the BPF verifier in the Linux kernel did not properly mark
registers for precision tracking in certain situations, leading to an out-
of-bounds access vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-2163)

Zheng Zhang discovered that the device-mapper implementation in the Linux
kernel did not properly handle locking during table_clear() operations. A
local attacker could use this to cause a denial of service (kernel
deadlock). (CVE-2023-2269)

It was discovered that the DVB Core driver in the Linux kernel did not
properly handle locking events in certain situations. A local attacker
could use this to cause a denial of service (kernel deadlock).
(CVE-2023-31084)

It was discovered that the kernel->user space relay implementation in the
Linux kernel did not properly perform certain buffer calculations, leading
to an out-of-bounds read vulnerability. A local attacker could use this to
cause a denial of service (system crash) or expose sensitive information
(kernel memory). (CVE-2023-3268)

It was discovered that the video4linux driver for Philips based TV cards in
the Linux kernel contained a race condition during device removal, leading
to a use-after-free vulnerability. A physically proximate attacker could
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-35823)

It was discovered that the SDMC DM1105 PCI device driver in the Linux
kernel contained a race condition during device removal, leading to a use-
after-free vulnerability. A physically proximate attacker could use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-35824)

It was discovered that the Renesas USB controller driver in the Linux
kernel contained a race condition during device removal, leading to a use-
after-free vulnerability. A privileged attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-35828)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
  linux-image-5.4.0-1029-xilinx-zynqmp  5.4.0-1029.33
  linux-image-5.4.0-1076-gkeop5.4.0-1076.80
  linux-image-5.4.0-1093-raspi5.4.0-1093.104
  linux-image-gkeop   5.4.0.1076.74
  linux-image-gkeop-5.4   5.4.0.1076.74
  linux-image-raspi   5.4.0.1093.123
  linux-image-raspi-hwe-18.04 5.4.0.1093.123
  linux-image-raspi2  5.4.0.1093.123
  linux-image-raspi2-hwe-18.045.4.0.1093.123
  linux-image-xilinx-zynqmp   5.4.0.1029.31

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
  linux-image-5.4.0-1093-raspi5.4.0-1093.104~18.04.1
  linux-image-5.4.0-1112-gcp  5.4.0-1112.121~18.04.1
  linux-image-5.4.0-1115-azure5.4.0-1115.122~18.04.1
  linux-image-azure   5.4.0.1115.88
  linux-image-gcp 5.4.0.1112.88
  linux-image-raspi-hwe-18.04 5.4.0.1093.90

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,

[USN-6338-2] Linux kernel vulnerabilities

2023-09-08 Thread Steve Beattie
==
Ubuntu Security Notice USN-6338-2
September 08, 2023

linux-gcp, linux-gcp-6.2, linux-ibm, linux-oracle, linux-starfive
vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.04
- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-ibm: Linux kernel for IBM cloud systems
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-starfive: Linux kernel for StarFive processors
- linux-gcp-6.2: Linux kernel for Google Cloud Platform (GCP) systems

Details:

Zi Fan Tan discovered that the binder IPC implementation in the Linux
kernel contained a use-after-free vulnerability. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-21255)

It was discovered that a race condition existed in the f2fs file system in
the Linux kernel, leading to a null pointer dereference vulnerability. An
attacker could use this to construct a malicious f2fs image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2023-2898)

It was discovered that the DVB Core driver in the Linux kernel did not
properly handle locking events in certain situations. A local attacker
could use this to cause a denial of service (kernel deadlock).
(CVE-2023-31084)

Quentin Minster discovered that the KSMBD implementation in the Linux
kernel did not properly handle session setup requests. A remote attacker
could possibly use this to cause a denial of service (memory exhaustion).
(CVE-2023-32247)

Quentin Minster discovered that a race condition existed in the KSMBD
implementation in the Linux kernel when handling sessions operations. A
remote attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-32250, CVE-2023-32252,
CVE-2023-32257)

It was discovered that a race condition existed in the KSMBD implementation
in the Linux kernel when handling session connections, leading to a use-
after-free vulnerability. A remote attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-32258)

It was discovered that the KSMBD implementation in the Linux kernel did not
properly validate buffer sizes in certain operations, leading to an out-of-
bounds read vulnerability. A remote attacker could use this to cause a
denial of service (system crash) or possibly expose sensitive information.
(CVE-2023-38426, CVE-2023-38428)

It was discovered that the KSMBD implementation in the Linux kernel did not
properly calculate the size of certain buffers. A remote attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-38429)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.04:
  linux-image-6.2.0-1004-starfive  6.2.0-1004.5
  linux-image-6.2.0-1009-ibm  6.2.0-1009.9
  linux-image-6.2.0-1011-oracle   6.2.0-1011.11
  linux-image-6.2.0-1013-gcp  6.2.0-1013.13
  linux-image-gcp 6.2.0.1013.13
  linux-image-ibm 6.2.0.1009.9
  linux-image-oracle  6.2.0.1011.11
  linux-image-starfive6.2.0.1004.7

Ubuntu 22.04 LTS:
  linux-image-6.2.0-1013-gcp  6.2.0-1013.13~22.04.1
  linux-image-gcp 6.2.0.1013.13~22.04.1

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
  https://ubuntu.com/security/notices/USN-6338-2
  https://ubuntu.com/security/notices/USN-6338-1
  CVE-2023-21255, CVE-2023-2898, CVE-2023-31084, CVE-2023-32247,
  CVE-2023-32250, CVE-2023-32252, CVE-2023-32257, CVE-2023-32258,
  CVE-2023-38426, CVE-2023-38428, CVE-2023-38429

Package Information:
  https://launchpad.net/ubuntu/+source/linux-gcp/6.2.0-1013.13
  https://launchpad.net/ubuntu/+source/linux-ibm/6.2.0-1009.9
  https://launchpad.net/ubuntu/+source/linux-oracle/6.2.0-1011.11
  https://launchpad.net/ubuntu/+source/linux-starfive/6.2.0-1004.5
  https://launchpad.net/ubuntu/+source/linux-gcp-6.2/6.2.0-1013.13~22.04.1



signature.asc
Description: PGP signature



[USN-5804-1] Linux kernel vulnerabilities

2023-01-12 Thread Steve Beattie
==
Ubuntu Security Notice USN-5804-1
January 13, 2023

linux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15, linux-gcp,
linux-gcp-5.4, linux-hwe, linux-ibm, linux-kvm, linux-oracle,
linux-oracle-5.4, vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-ibm: Linux kernel for IBM cloud systems
- linux-kvm: Linux kernel for cloud environments
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-azure-4.15: Linux kernel for Microsoft Azure Cloud systems
- linux-gcp-5.4: Linux kernel for Google Cloud Platform (GCP) systems
- linux-oracle-5.4: Linux kernel for Oracle Cloud systems
- linux-aws-hwe: Linux kernel for Amazon Web Services (AWS-HWE) systems
- linux-hwe: Linux hardware enablement (HWE) kernel
- linux-azure: Linux kernel for Microsoft Azure Cloud systems

Details:

It was discovered that the NFSD implementation in the Linux kernel did not
properly handle some RPC messages, leading to a buffer overflow. A remote
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-43945)

Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation
in the Linux kernel contained multiple use-after-free vulnerabilities. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-42896)

It was discovered that the Xen netback driver in the Linux kernel did not
properly handle packets structured in certain ways. An attacker in a guest
VM could possibly use this to cause a denial of service (host NIC
availability). (CVE-2022-3643)

It was discovered that an integer overflow vulnerability existed in the
Bluetooth subsystem in the Linux kernel. A physically proximate attacker
could use this to cause a denial of service (system crash).
(CVE-2022-45934)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
  linux-image-5.4.0-1042-ibm  5.4.0-1042.47
  linux-image-5.4.0-1084-kvm  5.4.0-1084.90
  linux-image-5.4.0-1092-oracle   5.4.0-1092.101
  linux-image-5.4.0-1094-aws  5.4.0-1094.102
  linux-image-5.4.0-1098-gcp  5.4.0-1098.107
  linux-image-5.4.0-137-generic   5.4.0-137.154
  linux-image-5.4.0-137-generic-lpae  5.4.0-137.154
  linux-image-5.4.0-137-lowlatency  5.4.0-137.154
  linux-image-aws-lts-20.04   5.4.0.1094.91
  linux-image-gcp-lts-20.04   5.4.0.1098.100
  linux-image-generic 5.4.0.137.135
  linux-image-generic-lpae5.4.0.137.135
  linux-image-ibm 5.4.0.1042.68
  linux-image-ibm-lts-20.04   5.4.0.1042.68
  linux-image-kvm 5.4.0.1084.78
  linux-image-lowlatency  5.4.0.137.135
  linux-image-oem 5.4.0.137.135
  linux-image-oem-osp15.4.0.137.135
  linux-image-oracle-lts-20.045.4.0.1092.85
  linux-image-virtual 5.4.0.137.135

Ubuntu 18.04 LTS:
  linux-image-4.15.0-1134-kvm 4.15.0-1134.139
  linux-image-4.15.0-1159-azure   4.15.0-1159.174
  linux-image-4.15.0-202-generic  4.15.0-202.213
  linux-image-4.15.0-202-generic-lpae  4.15.0-202.213
  linux-image-4.15.0-202-lowlatency  4.15.0-202.213
  linux-image-5.4.0-1092-oracle   5.4.0-1092.101~18.04.1
  linux-image-5.4.0-1098-gcp  5.4.0-1098.107~18.04.1
  linux-image-azure-lts-18.04 4.15.0.1159.127
  linux-image-gcp 5.4.0.1098.74
  linux-image-generic 4.15.0.202.185
  linux-image-generic-lpae4.15.0.202.185
  linux-image-kvm 4.15.0.1134.125
  linux-image-lowlatency  4.15.0.202.185
  linux-image-oracle  5.4.0.1092.101~18.04.66
  linux-image-virtual 4.15.0.202.185

Ubuntu 16.04 ESM:
  linux-image-4.15.0-1143-gcp 4.15.0-1143.159~16.04.1
  linux-image-4.15.0-1148-aws-hwe  4.15.0-1148.160~16.04.1
  linux-image-4.15.0-202-generic  4.15.0-202.213~16.04.1
  linux-image-4.15.0-202-lowlatency  4.15.0-202.213~16.04.1
  linux-image-aws-hwe 4.15.0.1148.133
  linux-image-gcp 4.15.0.1143.135
  linux-image-generic-hwe-16.04   4.15.0.202.187
  linux-image-gke 4.15.0.1143.135
  linux-image-lowlatency-hwe-16.04  4.15.0.202.187
  linux-image-oem 4.15.0.202.187
  linux-image-virtual-hwe-16.04   4.15.0.202.187

Ubuntu 14.04 ESM:
  linux-image-4.15.0-1159-azure   4.15.0-1159.174~14.04.1
  linux-image-azure   4.15.0.1159.126

After a standard system update you need to 

[USN-5803-1] Linux kernel vulnerabilities

2023-01-12 Thread Steve Beattie
==
Ubuntu Security Notice USN-5803-1
January 13, 2023

linux, linux-aws, linux-aws-5.15, linux-azure, linux-azure-5.15,
linux-gcp, linux-gcp-5.15, linux-hwe-5.15, linux-ibm, linux-kvm,
linux-oracle, linux-raspi, vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-ibm: Linux kernel for IBM cloud systems
- linux-kvm: Linux kernel for cloud environments
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-azure: Linux kernel for Microsoft Azure Cloud systems
- linux-raspi: Linux kernel for Raspberry Pi systems
- linux-aws-5.15: Linux kernel for Amazon Web Services (AWS) systems
- linux-azure-5.15: Linux kernel for Microsoft Azure cloud systems
- linux-gcp-5.15: Linux kernel for Google Cloud Platform (GCP) systems
- linux-hwe-5.15: Linux hardware enablement (HWE) kernel

Details:

Kyle Zeng discovered that the sysctl implementation in the Linux kernel
contained a stack-based buffer overflow. A local attacker could use this to
cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-4378)

Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation
in the Linux kernel contained multiple use-after-free vulnerabilities. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-42896)

It was discovered that the Xen netback driver in the Linux kernel did not
properly handle packets structured in certain ways. An attacker in a guest
VM could possibly use this to cause a denial of service (host NIC
availability). (CVE-2022-3643)

It was discovered that an integer overflow vulnerability existed in the
Bluetooth subsystem in the Linux kernel. A physically proximate attacker
could use this to cause a denial of service (system crash).
(CVE-2022-45934)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.10:
  linux-image-5.19.0-1015-gcp 5.19.0-1015.16
  linux-image-5.19.0-1015-ibm 5.19.0-1015.16
  linux-image-5.19.0-1015-oracle  5.19.0-1015.17
  linux-image-5.19.0-1016-kvm 5.19.0-1016.17
  linux-image-5.19.0-1017-aws 5.19.0-1017.18
  linux-image-5.19.0-29-generic   5.19.0-29.30
  linux-image-5.19.0-29-generic-64k  5.19.0-29.30
  linux-image-5.19.0-29-generic-lpae  5.19.0-29.30
  linux-image-aws 5.19.0.1017.14
  linux-image-gcp 5.19.0.1015.12
  linux-image-generic 5.19.0.29.26
  linux-image-generic-64k 5.19.0.29.26
  linux-image-generic-lpae5.19.0.29.26
  linux-image-ibm 5.19.0.1015.12
  linux-image-kvm 5.19.0.1016.13
  linux-image-oem-22.04   5.19.0.29.26
  linux-image-oracle  5.19.0.1015.12
  linux-image-virtual 5.19.0.29.26

Ubuntu 22.04 LTS:
  linux-image-5.15.0-1023-ibm 5.15.0-1023.26
  linux-image-5.15.0-1023-raspi   5.15.0-1023.25
  linux-image-5.15.0-1023-raspi-nolpae  5.15.0-1023.25
  linux-image-5.15.0-1026-kvm 5.15.0-1026.31
  linux-image-5.15.0-1027-gcp 5.15.0-1027.34
  linux-image-5.15.0-1027-oracle  5.15.0-1027.33
  linux-image-5.15.0-1028-aws 5.15.0-1028.32
  linux-image-5.15.0-1031-azure   5.15.0-1031.38
  linux-image-5.15.0-58-generic   5.15.0-58.64
  linux-image-5.15.0-58-generic-64k  5.15.0-58.64
  linux-image-5.15.0-58-generic-lpae  5.15.0-58.64
  linux-image-aws 5.15.0.1028.26
  linux-image-aws-lts-22.04   5.15.0.1028.26
  linux-image-azure   5.15.0.1031.27
  linux-image-azure-lts-22.04 5.15.0.1031.27
  linux-image-gcp 5.15.0.1027.22
  linux-image-generic 5.15.0.58.56
  linux-image-generic-64k 5.15.0.58.56
  linux-image-generic-64k-hwe-22.04  5.15.0.58.56
  linux-image-generic-hwe-22.04   5.15.0.58.56
  linux-image-generic-lpae5.15.0.58.56
  linux-image-generic-lpae-hwe-22.04  5.15.0.58.56
  linux-image-ibm 5.15.0.1023.19
  linux-image-kvm 5.15.0.1026.22
  linux-image-oem-20.04   5.15.0.58.56
  linux-image-oracle  5.15.0.1027.22
  linux-image-raspi   5.15.0.1023.20
  linux-image-raspi-nolpae5.15.0.1023.20
  linux-image-virtual 5.15.0.58.56
  linux-image-virtual-hwe-22.04   5.15.0.58.56

Ubuntu 20.04 LTS:
  linux-image-5.15.0-1027-gcp 5.15.0-1027.34~20.04.1
  linux-image-5.15.0-1028-aws 5.15.0-1028.32~20.04.1
  linux-image-5.15.0-1031-azure   5.15.0-1031.38~20.04.1
  linux-image-5.15.0-58-generic   

[USN-5755-2] Linux kernel vulnerabilities

2022-12-03 Thread Steve Beattie
==
Ubuntu Security Notice USN-5755-2
December 02, 2022

linux-gcp-5.15, linux-gke, linux-gke-5.15 vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-gke: Linux kernel for Google Container Engine (GKE) systems
- linux-gcp-5.15: Linux kernel for Google Cloud Platform (GCP) systems
- linux-gke-5.15: Linux kernel for Google Container Engine (GKE) systems

Details:

It was discovered that the NFSD implementation in the Linux kernel did not
properly handle some RPC messages, leading to a buffer overflow. A remote
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-43945)

Jann Horn discovered that the Linux kernel did not properly track memory
allocations for anonymous VMA mappings in some situations, leading to
potential data structure reuse. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-42703)

It was discovered that a memory leak existed in the IPv6 implementation of
the Linux kernel. A local attacker could use this to cause a denial of
service (memory exhaustion). (CVE-2022-3524)

It was discovered that a race condition existed in the Bluetooth subsystem
in the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-3564)

It was discovered that the ISDN implementation of the Linux kernel
contained a use-after-free vulnerability. A privileged user could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3565)

It was discovered that the TCP implementation in the Linux kernel contained
a data race condition. An attacker could possibly use this to cause
undesired behaviors. (CVE-2022-3566)

It was discovered that the IPv6 implementation in the Linux kernel
contained a data race condition. An attacker could possibly use this to
cause undesired behaviors. (CVE-2022-3567)

It was discovered that the Realtek RTL8152 USB Ethernet adapter driver in
the Linux kernel did not properly handle certain error conditions. A local
attacker with physical access could plug in a specially crafted USB device
to cause a denial of service (memory exhaustion). (CVE-2022-3594)

It was discovered that a null pointer dereference existed in the NILFS2
file system implementation in the Linux kernel. A local attacker could use
this to cause a denial of service (system crash). (CVE-2022-3621)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS:
  linux-image-5.15.0-1023-gke 5.15.0-1023.28
  linux-image-gke 5.15.0.1023.22
  linux-image-gke-5.155.15.0.1023.22

Ubuntu 20.04 LTS:
  linux-image-5.15.0-1023-gke 5.15.0-1023.28~20.04.2
  linux-image-5.15.0-1025-gcp 5.15.0-1025.32~20.04.2
  linux-image-gcp 5.15.0.1025.32~20.04.1
  linux-image-gke-5.155.15.0.1023.28~20.04.1

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
  https://ubuntu.com/security/notices/USN-5755-2
  https://ubuntu.com/security/notices/USN-5755-1
  CVE-2022-3524, CVE-2022-3564, CVE-2022-3565, CVE-2022-3566,
  CVE-2022-3567, CVE-2022-3594, CVE-2022-3621, CVE-2022-42703,
  CVE-2022-43945

Package Information:
  https://launchpad.net/ubuntu/+source/linux-gke/5.15.0-1023.28
  https://launchpad.net/ubuntu/+source/linux-gcp-5.15/5.15.0-1025.32~20.04.2
  https://launchpad.net/ubuntu/+source/linux-gke-5.15/5.15.0-1023.28~20.04.2



signature.asc
Description: PGP signature



[USN-5728-1] Linux kernel vulnerabilities

2022-11-16 Thread Steve Beattie
==
Ubuntu Security Notice USN-5728-1
November 17, 2022

linux, linux-aws, linux-aws-5.4, linux-azure, linux-azure-5.4,
linux-bluefield, linux-gcp, linux-hwe-5.4, linux-ibm, linux-ibm-5.4,
linux-kvm, linux-oracle, linux-oracle-5.4, linux-raspi vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-azure: Linux kernel for Microsoft Azure Cloud systems
- linux-bluefield: Linux kernel for NVIDIA BlueField platforms
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-ibm: Linux kernel for IBM cloud systems
- linux-kvm: Linux kernel for cloud environments
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-raspi: Linux kernel for Raspberry Pi systems
- linux-aws-5.4: Linux kernel for Amazon Web Services (AWS) systems
- linux-azure-5.4: Linux kernel for Microsoft Azure cloud systems
- linux-hwe-5.4: Linux hardware enablement (HWE) kernel
- linux-ibm-5.4: Linux kernel for IBM cloud systems
- linux-oracle-5.4: Linux kernel for Oracle Cloud systems

Details:

Jann Horn discovered that the Linux kernel did not properly track memory
allocations for anonymous VMA mappings in some situations, leading to
potential data structure reuse. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-42703)

It was discovered that a race condition existed in the memory address space
accounting implementation in the Linux kernel, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-41222)

It was discovered that a race condition existed in the instruction emulator
of the Linux kernel on Arm 64-bit systems. A local attacker could use this
to cause a denial of service (system crash). (CVE-2022-20422)

It was discovered that the KVM implementation in the Linux kernel did not
properly handle virtual CPUs without APICs in certain situations. A local
attacker could possibly use this to cause a denial of service (host system
crash). (CVE-2022-2153)

Hao Sun and Jiacheng Xu discovered that the NILFS file system
implementation in the Linux kernel contained a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-2978)

Johannes Wikner and Kaveh Razavi discovered that for some Intel x86-64
processors, the Linux kernel's protections against speculative branch
target injection attacks were insufficient in some circumstances. A local
attacker could possibly use this to expose sensitive information.
(CVE-2022-29901)

Abhishek Shah discovered a race condition in the PF_KEYv2 implementation in
the Linux kernel. A local attacker could use this to cause a denial of
service (system crash) or possibly expose sensitive information (kernel
memory). (CVE-2022-3028)

It was discovered that the Netlink device interface implementation in the
Linux kernel did not properly handle certain error conditions, leading to a
use-after-free vulnerability with some network device drivers. A local
attacker with admin access to the network device could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-3625)

It was discovered that the IDT 77252 ATM PCI device driver in the Linux
kernel did not properly remove any pending timers during device exit,
resulting in a use-after-free vulnerability. A local attacker could
possibly use this to cause a denial of service (system crash) or execute
arbitrary code. (CVE-2022-3635)

Jann Horn discovered a race condition existed in the Linux kernel when
unmapping VMAs in certain situations, resulting in possible use-after-free
vulnerabilities. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2022-39188)

Xingyuan Mo and Gengjia Chen discovered that the Promise SuperTrak EX
storage controller driver in the Linux kernel did not properly handle
certain structures. A local attacker could potentially use this to expose
sensitive information (kernel memory). (CVE-2022-40768)

Sönke Huster discovered that a use-after-free vulnerability existed in the
WiFi driver stack in the Linux kernel. A physically proximate attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2022-42719)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
  linux-image-5.4.0-1037-ibm  5.4.0-1037.42
  

[USN-5727-1] Linux kernel vulnerabilities

2022-11-16 Thread Steve Beattie
==
Ubuntu Security Notice USN-5727-1
November 16, 2022

linux, linux-aws, linux-aws-hwe, linux-dell300x, linux-hwe, linux-kvm,
linux-oracle, linux-raspi2, linux-snapdragon vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS
- Ubuntu 16.04 ESM

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-dell300x: Linux kernel for Dell 300x platforms
- linux-kvm: Linux kernel for cloud environments
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-raspi2: Linux kernel for Raspberry Pi systems
- linux-snapdragon: Linux kernel for Qualcomm Snapdragon processors
- linux-aws-hwe: Linux kernel for Amazon Web Services (AWS-HWE) systems
- linux-hwe: Linux hardware enablement (HWE) kernel

Details:

It was discovered that a race condition existed in the instruction emulator
of the Linux kernel on Arm 64-bit systems. A local attacker could use this
to cause a denial of service (system crash). (CVE-2022-20422)

It was discovered that the KVM implementation in the Linux kernel did not
properly handle virtual CPUs without APICs in certain situations. A local
attacker could possibly use this to cause a denial of service (host system
crash). (CVE-2022-2153)

Hao Sun and Jiacheng Xu discovered that the NILFS file system
implementation in the Linux kernel contained a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-2978)

Abhishek Shah discovered a race condition in the PF_KEYv2 implementation in
the Linux kernel. A local attacker could use this to cause a denial of
service (system crash) or possibly expose sensitive information (kernel
memory). (CVE-2022-3028)

It was discovered that the IDT 77252 ATM PCI device driver in the Linux
kernel did not properly remove any pending timers during device exit,
resulting in a use-after-free vulnerability. A local attacker could
possibly use this to cause a denial of service (system crash) or execute
arbitrary code. (CVE-2022-3635)

It was discovered that the Netlink Transformation (XFRM) subsystem in the
Linux kernel contained a reference counting error. A local attacker could
use this to cause a denial of service (system crash). (CVE-2022-36879)

Xingyuan Mo and Gengjia Chen discovered that the Promise SuperTrak EX
storage controller driver in the Linux kernel did not properly handle
certain structures. A local attacker could potentially use this to expose
sensitive information (kernel memory). (CVE-2022-40768)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
  linux-image-4.15.0-1055-dell300x  4.15.0-1055.60
  linux-image-4.15.0-1108-oracle  4.15.0-1108.119
  linux-image-4.15.0-1121-raspi2  4.15.0-1121.129
  linux-image-4.15.0-1129-kvm 4.15.0-1129.134
  linux-image-4.15.0-1139-snapdragon  4.15.0-1139.149
  linux-image-4.15.0-1143-aws 4.15.0-1143.155
  linux-image-4.15.0-197-generic  4.15.0-197.208
  linux-image-4.15.0-197-generic-lpae  4.15.0-197.208
  linux-image-4.15.0-197-lowlatency  4.15.0-197.208
  linux-image-aws-lts-18.04   4.15.0.1143.143
  linux-image-dell300x4.15.0.1055.55
  linux-image-generic 4.15.0.197.182
  linux-image-generic-lpae4.15.0.197.182
  linux-image-kvm 4.15.0.1129.122
  linux-image-lowlatency  4.15.0.197.182
  linux-image-oracle-lts-18.044.15.0.1108.115
  linux-image-raspi2  4.15.0.1121.118
  linux-image-snapdragon  4.15.0.1139.140
  linux-image-virtual 4.15.0.197.182

Ubuntu 16.04 ESM:
  linux-image-4.15.0-1108-oracle  4.15.0-1108.119~16.04.1
  linux-image-4.15.0-1143-aws-hwe  4.15.0-1143.155~16.04.1
  linux-image-4.15.0-197-generic  4.15.0-197.208~16.04.1
  linux-image-4.15.0-197-lowlatency  4.15.0-197.208~16.04.1
  linux-image-aws-hwe 4.15.0.1143.130
  linux-image-generic-hwe-16.04   4.15.0.197.184
  linux-image-lowlatency-hwe-16.04  4.15.0.197.184
  linux-image-oem 4.15.0.197.184
  linux-image-oracle  4.15.0.1108.92
  linux-image-virtual-hwe-16.04   4.15.0.197.184

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
  

[USN-5729-1] Linux kernel vulnerabilities

2022-11-16 Thread Steve Beattie
==
Ubuntu Security Notice USN-5729-1
November 17, 2022

linux, linux-aws, linux-aws-5.15, linux-azure, linux-azure-5.15,
linux-gcp, linux-gke, linux-gkeop, linux-hwe-5.15, linux-ibm, linux-kvm,
linux-lowlatency, linux-lowlatency-hwe-5.15, linux-oracle,
linux-oracle-5.15 vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-azure: Linux kernel for Microsoft Azure Cloud systems
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-gke: Linux kernel for Google Container Engine (GKE) systems
- linux-gkeop: Linux kernel for Google Container Engine (GKE) systems
- linux-ibm: Linux kernel for IBM cloud systems
- linux-kvm: Linux kernel for cloud environments
- linux-lowlatency: Linux low latency kernel
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-aws-5.15: Linux kernel for Amazon Web Services (AWS) systems
- linux-azure-5.15: Linux kernel for Microsoft Azure cloud systems
- linux-hwe-5.15: Linux hardware enablement (HWE) kernel
- linux-lowlatency-hwe-5.15: Linux low latency kernel
- linux-oracle-5.15: Linux kernel for Oracle Cloud systems

Details:

It was discovered that a race condition existed in the instruction emulator
of the Linux kernel on Arm 64-bit systems. A local attacker could use this
to cause a denial of service (system crash). (CVE-2022-20422)

Hsin-Wei Hung discovered that the BPF subsystem in the Linux kernel
contained an out-of-bounds read vulnerability in the x86 JIT compiler. A
local attacker could possibly use this to cause a denial of service (system
crash) or expose sensitive information (kernel memory). (CVE-2022-2905)

Hao Sun and Jiacheng Xu discovered that the NILFS file system
implementation in the Linux kernel contained a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-2978)

Abhishek Shah discovered a race condition in the PF_KEYv2 implementation in
the Linux kernel. A local attacker could use this to cause a denial of
service (system crash) or possibly expose sensitive information (kernel
memory). (CVE-2022-3028)

It was discovered that the Netlink device interface implementation in the
Linux kernel did not properly handle certain error conditions, leading to a
use-after-free vulnerability with some network device drivers. A local
attacker with admin access to the network device could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-3625)

It was discovered that the IDT 77252 ATM PCI device driver in the Linux
kernel did not properly remove any pending timers during device exit,
resulting in a use-after-free vulnerability. A local attacker could
possibly use this to cause a denial of service (system crash) or execute
arbitrary code. (CVE-2022-3635)

Gwangun Jung discovered that the netfilter subsystem in the Linux kernel
did not properly prevent binding to an already bound chain. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2022-39190)

Xingyuan Mo and Gengjia Chen discovered that the Promise SuperTrak EX
storage controller driver in the Linux kernel did not properly handle
certain structures. A local attacker could potentially use this to expose
sensitive information (kernel memory). (CVE-2022-40768)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS:
  linux-image-5.15.0-1008-gkeop   5.15.0-1008.12
  linux-image-5.15.0-1018-ibm 5.15.0-1018.21
  linux-image-5.15.0-1020-gke 5.15.0-1020.25
  linux-image-5.15.0-1021-kvm 5.15.0-1021.26
  linux-image-5.15.0-1022-gcp 5.15.0-1022.29
  linux-image-5.15.0-1022-oracle  5.15.0-1022.28
  linux-image-5.15.0-1023-aws 5.15.0-1023.27
  linux-image-5.15.0-1023-azure   5.15.0-1023.29
  linux-image-5.15.0-53-generic   5.15.0-53.59
  linux-image-5.15.0-53-generic-64k  5.15.0-53.59
  linux-image-5.15.0-53-generic-lpae  5.15.0-53.59
  linux-image-5.15.0-53-lowlatency  5.15.0-53.59
  linux-image-5.15.0-53-lowlatency-64k  5.15.0-53.59
  linux-image-aws 5.15.0.1023.23
  linux-image-aws-lts-22.04   5.15.0.1023.23
  linux-image-azure   5.15.0.1023.22
  linux-image-azure-lts-22.04 5.15.0.1023.22
  linux-image-gcp 5.15.0.1022.19
  linux-image-generic 5.15.0.53.53
  linux-image-generic-64k 5.15.0.53.53
  linux-image-generic-64k-hwe-22.04  5.15.0.53.53
  linux-image-generic-hwe-22.04   5.15.0.53.53
  linux-image-generic-lpae5.15.0.53.53
  

[USN-5700-1] Linux kernel vulnerabilities

2022-10-26 Thread Steve Beattie
==
Ubuntu Security Notice USN-5700-1
October 26, 2022

linux, linux-aws, linux-azure, linux-gcp, linux-ibm, linux-kvm,
linux-lowlatency, linux-oracle, linux-raspi vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.10

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-azure: Linux kernel for Microsoft Azure Cloud systems
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-ibm: Linux kernel for IBM cloud systems
- linux-kvm: Linux kernel for cloud environments
- linux-lowlatency: Linux low latency kernel
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-raspi: Linux kernel for Raspberry Pi systems

Details:

David Bouman and Billy Jheng Bing Jhong discovered that a race condition
existed in the io_uring subsystem in the Linux kernel, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2022-2602)

Sönke Huster discovered that an integer overflow vulnerability existed in
the WiFi driver stack in the Linux kernel, leading to a buffer overflow. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-41674)

Sönke Huster discovered that a use-after-free vulnerability existed in the
WiFi driver stack in the Linux kernel. A physically proximate attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2022-42719)

Sönke Huster discovered that the WiFi driver stack in the Linux kernel did
not properly perform reference counting in some situations, leading to a
use-after-free vulnerability. A physically proximate attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2022-42720)

Sönke Huster discovered that the WiFi driver stack in the Linux kernel did
not properly handle BSSID/SSID lists in some situations. A physically
proximate attacker could use this to cause a denial of service (infinite
loop). (CVE-2022-42721)

Sönke Huster discovered that the WiFi driver stack in the Linux kernel
contained a NULL pointer dereference vulnerability in certain situations. A
physically proximate attacker could use this to cause a denial of service
(system crash). (CVE-2022-42722)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.10:
  linux-image-5.19.0-1006-raspi   5.19.0-1006.13
  linux-image-5.19.0-1006-raspi-nolpae  5.19.0-1006.13
  linux-image-5.19.0-1009-lowlatency  5.19.0-1009.10
  linux-image-5.19.0-1009-lowlatency-64k  5.19.0-1009.10
  linux-image-5.19.0-1010-azure   5.19.0-1010.11
  linux-image-5.19.0-1010-gcp 5.19.0-1010.11
  linux-image-5.19.0-1010-ibm 5.19.0-1010.11
  linux-image-5.19.0-1010-kvm 5.19.0-1010.11
  linux-image-5.19.0-1010-oracle  5.19.0-1010.11
  linux-image-5.19.0-1011-aws 5.19.0-1011.12
  linux-image-5.19.0-23-generic   5.19.0-23.24
  linux-image-5.19.0-23-generic-64k  5.19.0-23.24
  linux-image-5.19.0-23-generic-lpae  5.19.0-23.24
  linux-image-aws 5.19.0.1011.10
  linux-image-azure   5.19.0.1010.9
  linux-image-gcp 5.19.0.1010.9
  linux-image-generic 5.19.0.23.22
  linux-image-generic-64k 5.19.0.23.22
  linux-image-generic-lpae5.19.0.23.22
  linux-image-ibm 5.19.0.1010.9
  linux-image-kvm 5.19.0.1010.9
  linux-image-lowlatency  5.19.0.1009.8
  linux-image-lowlatency-64k  5.19.0.1009.8
  linux-image-oem-22.04   5.19.0.23.22
  linux-image-oracle  5.19.0.1010.9
  linux-image-raspi   5.19.0.1006.7
  linux-image-raspi-nolpae5.19.0.1006.7
  linux-image-virtual 5.19.0.23.22

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
  https://ubuntu.com/security/notices/USN-5700-1
  CVE-2022-2602, CVE-2022-41674, CVE-2022-42719, CVE-2022-42720,
  CVE-2022-42721, CVE-2022-42722

Package Information:
  https://launchpad.net/ubuntu/+source/linux/5.19.0-23.24
  https://launchpad.net/ubuntu/+source/linux-aws/5.19.0-1011.12
  

[USN-5688-1] Libksba vulnerability

2022-10-19 Thread Steve Beattie
==
Ubuntu Security Notice USN-5688-1
October 19, 2022

libksba vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM

Summary:

Libksba could be made to crash or run programs if it decoded specially
crafted data.

Software Description:
- libksba: X.509 and CMS support library

Details:

It was discovered that an integer overflow could be triggered in Libksba
when decoding certain data. An attacker could use this issue to cause a
denial of service (application crash) or possibly execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS:
  libksba81.6.0-2ubuntu0.1

Ubuntu 20.04 LTS:
  libksba81.3.5-2ubuntu0.20.04.1

Ubuntu 18.04 LTS:
  libksba81.3.5-2ubuntu0.18.04.1

Ubuntu 16.04 ESM:
  libksba81.3.3-1ubuntu0.16.04.1+esm1

Ubuntu 14.04 ESM:
  libksba81.3.0-3ubuntu0.14.04.2+esm1

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5688-1
  CVE-2022-3515

Package Information:
  https://launchpad.net/ubuntu/+source/libksba/1.6.0-2ubuntu0.1
  https://launchpad.net/ubuntu/+source/libksba/1.3.5-2ubuntu0.20.04.1
  https://launchpad.net/ubuntu/+source/libksba/1.3.5-2ubuntu0.18.04.1



signature.asc
Description: PGP signature



[USN-5622-1] Linux kernel vulnerabilities

2022-09-21 Thread Steve Beattie
==
Ubuntu Security Notice USN-5622-1
September 21, 2022

linux, linux-aws, linux-aws-5.4, linux-azure, linux-azure-5.4,
linux-bluefield, linux-gkeop, linux-hwe-5.4, linux-ibm, linux-ibm-5.4,
linux-kvm, linux-oracle, linux-oracle-5.4, linux-raspi vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-azure: Linux kernel for Microsoft Azure Cloud systems
- linux-bluefield: Linux kernel for NVIDIA BlueField platforms
- linux-gkeop: Linux kernel for Google Container Engine (GKE) systems
- linux-ibm: Linux kernel for IBM cloud systems
- linux-kvm: Linux kernel for cloud environments
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-raspi: Linux kernel for Raspberry Pi systems
- linux-aws-5.4: Linux kernel for Amazon Web Services (AWS) systems
- linux-azure-5.4: Linux kernel for Microsoft Azure cloud systems
- linux-hwe-5.4: Linux hardware enablement (HWE) kernel
- linux-ibm-5.4: Linux kernel for IBM cloud systems
- linux-oracle-5.4: Linux kernel for Oracle Cloud systems

Details:

It was discovered that the framebuffer driver on the Linux kernel did not
verify size limits when changing font or screen size, leading to an out-of-
bounds write. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2021-33655)

Moshe Kol, Amit Klein and Yossi Gilad discovered that the IP implementation
in the Linux kernel did not provide sufficient randomization when
calculating port offsets. An attacker could possibly use this to expose
sensitive information. (CVE-2022-1012, CVE-2022-32296)

Norbert Slusarek discovered that a race condition existed in the perf
subsystem in the Linux kernel, resulting in a use-after-free vulnerability.
A privileged local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-1729)

It was discovered that the device-mapper verity (dm-verity) driver in the
Linux kernel did not properly verify targets being loaded into the device-
mapper table. A privileged attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2022-2503)

Domingo Dirutigliano and Nicola Guerrera discovered that the netfilter
subsystem in the Linux kernel did not properly handle rules that truncated
packets below the packet header size. When such rules are in place, a
remote attacker could possibly use this to cause a denial of service
(system crash). (CVE-2022-36946)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
  linux-image-5.4.0-1033-ibm  5.4.0-1033.37
  linux-image-5.4.0-1046-bluefield  5.4.0-1046.51
  linux-image-5.4.0-1053-gkeop5.4.0-1053.56
  linux-image-5.4.0-1070-raspi5.4.0-1070.80
  linux-image-5.4.0-1075-kvm  5.4.0-1075.80
  linux-image-5.4.0-1083-oracle   5.4.0-1083.91
  linux-image-5.4.0-1085-aws  5.4.0-1085.92
  linux-image-5.4.0-1091-azure5.4.0-1091.96
  linux-image-5.4.0-126-generic   5.4.0-126.142
  linux-image-5.4.0-126-generic-lpae  5.4.0-126.142
  linux-image-5.4.0-126-lowlatency  5.4.0-126.142
  linux-image-aws-lts-20.04   5.4.0.1085.85
  linux-image-azure-lts-20.04 5.4.0.1091.88
  linux-image-bluefield   5.4.0.1046.45
  linux-image-generic 5.4.0.126.127
  linux-image-generic-lpae5.4.0.126.127
  linux-image-gkeop   5.4.0.1053.54
  linux-image-gkeop-5.4   5.4.0.1053.54
  linux-image-ibm 5.4.0.1033.62
  linux-image-ibm-lts-20.04   5.4.0.1033.62
  linux-image-kvm 5.4.0.1075.72
  linux-image-lowlatency  5.4.0.126.127
  linux-image-oem 5.4.0.126.127
  linux-image-oem-osp15.4.0.126.127
  linux-image-oracle-lts-20.045.4.0.1083.80
  linux-image-raspi   5.4.0.1070.103
  linux-image-raspi2  5.4.0.1070.103
  linux-image-virtual 5.4.0.126.127

Ubuntu 18.04 LTS:
  linux-image-5.4.0-1033-ibm  5.4.0-1033.37~18.04.1
  linux-image-5.4.0-1083-oracle   5.4.0-1083.91~18.04.1
  linux-image-5.4.0-1085-aws  5.4.0-1085.92~18.04.1
  linux-image-5.4.0-1091-azure5.4.0-1091.96~18.04.1
  linux-image-5.4.0-126-generic   5.4.0-126.142~18.04.1
  linux-image-5.4.0-126-generic-lpae  5.4.0-126.142~18.04.1
  linux-image-5.4.0-126-lowlatency  5.4.0-126.142~18.04.1
  linux-image-aws 5.4.0.1085.65
  linux-image-azure   5.4.0.1091.68
  linux-image-generic-hwe-18.04   5.4.0.126.142~18.04.106
  linux-image-generic-lpae-hwe-18.04  5.4.0.126.142~18.04.106
  

[USN-5621-1] Linux kernel vulnerabilities

2022-09-21 Thread Steve Beattie
==
Ubuntu Security Notice USN-5621-1
September 21, 2022

linux, linux-aws, linux-aws-hwe, linux-azure-4.15, linux-dell300x,
linux-gcp, linux-gcp-4.15, lnux-hwe, inux-kvm, linux-oracle, linux-raspi2,
linux-snapdragon vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS
- Ubuntu 16.04 ESM

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-azure-4.15: Linux kernel for Microsoft Azure Cloud systems
- linux-dell300x: Linux kernel for Dell 300x platforms
- linux-gcp-4.15: Linux kernel for Google Cloud Platform (GCP) systems
- linux-kvm: Linux kernel for cloud environments
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-raspi2: Linux kernel for Raspberry Pi systems
- linux-snapdragon: Linux kernel for Qualcomm Snapdragon processors
- linux-aws-hwe: Linux kernel for Amazon Web Services (AWS-HWE) systems
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-hwe: Linux hardware enablement (HWE) kernel

Details:

It was discovered that the framebuffer driver on the Linux kernel did not
verify size limits when changing font or screen size, leading to an out-of-
bounds write. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2021-33655)

Domingo Dirutigliano and Nicola Guerrera discovered that the netfilter
subsystem in the Linux kernel did not properly handle rules that truncated
packets below the packet header size. When such rules are in place, a
remote attacker could possibly use this to cause a denial of service
(system crash). (CVE-2022-36946)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
  linux-image-4.15.0-1053-dell300x  4.15.0-1053.58
  linux-image-4.15.0-1106-oracle  4.15.0-1106.117
  linux-image-4.15.0-1119-raspi2  4.15.0-1119.127
  linux-image-4.15.0-1127-kvm 4.15.0-1127.132
  linux-image-4.15.0-1136-gcp 4.15.0-1136.152
  linux-image-4.15.0-1137-snapdragon  4.15.0-1137.147
  linux-image-4.15.0-1141-aws 4.15.0-1141.152
  linux-image-4.15.0-1151-azure   4.15.0-1151.166
  linux-image-4.15.0-193-generic  4.15.0-193.204
  linux-image-4.15.0-193-generic-lpae  4.15.0-193.204
  linux-image-4.15.0-193-lowlatency  4.15.0-193.204
  linux-image-aws-lts-18.04   4.15.0.1141.141
  linux-image-azure-lts-18.04 4.15.0.1151.121
  linux-image-dell300x4.15.0.1053.53
  linux-image-gcp-lts-18.04   4.15.0.1136.152
  linux-image-generic 4.15.0.193.178
  linux-image-generic-lpae4.15.0.193.178
  linux-image-kvm 4.15.0.1127.120
  linux-image-lowlatency  4.15.0.193.178
  linux-image-oracle-lts-18.044.15.0.1106.113
  linux-image-raspi2  4.15.0.1119.116
  linux-image-snapdragon  4.15.0.1137.138
  linux-image-virtual 4.15.0.193.178

Ubuntu 16.04 ESM:
  linux-image-4.15.0-1106-oracle  4.15.0-1106.117~16.04.1
  linux-image-4.15.0-1136-gcp 4.15.0-1136.152~16.04.1
  linux-image-4.15.0-1141-aws-hwe  4.15.0-1141.152~16.04.1
  linux-image-4.15.0-193-generic  4.15.0-193.204~16.04.1
  linux-image-4.15.0-193-lowlatency  4.15.0-193.204~16.04.1
  linux-image-aws-hwe 4.15.0.1141.128
  linux-image-gcp 4.15.0.1136.130
  linux-image-generic-hwe-16.04   4.15.0.193.180
  linux-image-gke 4.15.0.1136.130
  linux-image-lowlatency-hwe-16.04  4.15.0.193.180
  linux-image-oem 4.15.0.193.180
  linux-image-oracle  4.15.0.1106.90
  linux-image-virtual-hwe-16.04   4.15.0.193.180

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
  https://ubuntu.com/security/notices/USN-5621-1
  CVE-2021-33655, CVE-2022-36946

Package Information:
  https://launchpad.net/ubuntu/+source/linux/4.15.0-193.204
  https://launchpad.net/ubuntu/+source/linux-aws/4.15.0-1141.152
  https://launchpad.net/ubuntu/+source/linux-azure-4.15/4.15.0-1151.166
  https://launchpad.net/ubuntu/+source/linux-dell300x/4.15.0-1053.58
  https://launchpad.net/ubuntu/+source/linux-gcp-4.15/4.15.0-1136.152
  https://launchpad.net/ubuntu/+source/linux-kvm/4.15.0-1127.132
  https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1106.117
  

[USN-5624-1] Linux kernel vulnerabilities

2022-09-21 Thread Steve Beattie
==
Ubuntu Security Notice USN-5624-1
September 21, 2022

linux, linux-aws, linux-aws-5.15, linux-azure, linux-azure-5.15,
linux-kvm, linux-lowlatency vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-azure: Linux kernel for Microsoft Azure Cloud systems
- linux-kvm: Linux kernel for cloud environments
- linux-lowlatency: Linux low latency kernel
- linux-aws-5.15: Linux kernel for Amazon Web Services (AWS) systems
- linux-azure-5.15: Linux kernel for Microsoft Azure cloud systems

Details:

It was discovered that the framebuffer driver on the Linux kernel did not
verify size limits when changing font or screen size, leading to an out-of-
bounds write. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2021-33655)

Duoming Zhou discovered that race conditions existed in the timer handling
implementation of the Linux kernel's Rose X.25 protocol layer, resulting in
use-after-free vulnerabilities. A local attacker could use this to cause a
denial of service (system crash). (CVE-2022-2318)

Roger Pau Monné discovered that the Xen virtual block driver in the Linux
kernel did not properly initialize memory pages to be used for shared
communication with the backend. A local attacker could use this to expose
sensitive information (guest kernel memory). (CVE-2022-26365)

Roger Pau Monné discovered that the Xen paravirtualization frontend in the
Linux kernel did not properly initialize memory pages to be used for shared
communication with the backend. A local attacker could use this to expose
sensitive information (guest kernel memory). (CVE-2022-33740)

It was discovered that the Xen paravirtualization frontend in the Linux
kernel incorrectly shared unrelated data when communicating with certain
backends. A local attacker could use this to cause a denial of service
(guest crash) or expose sensitive information (guest kernel memory).
(CVE-2022-33741, CVE-2022-33742)

Jan Beulich discovered that the Xen network device frontend driver in the
Linux kernel incorrectly handled socket buffers (skb) references when
communicating with certain backends. A local attacker could use this to
cause a denial of service (guest crash). (CVE-2022-33743)

Oleksandr Tyshchenko discovered that the Xen paravirtualization platform in
the Linux kernel on ARM platforms contained a race condition in certain
situations. An attacker in a guest VM could use this to cause a denial of
service in the host OS. (CVE-2022-33744)

It was discovered that the virtio RPMSG bus driver in the Linux kernel
contained a double-free vulnerability in certain error conditions. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2022-34494, CVE-2022-34495)

Domingo Dirutigliano and Nicola Guerrera discovered that the netfilter
subsystem in the Linux kernel did not properly handle rules that truncated
packets below the packet header size. When such rules are in place, a
remote attacker could possibly use this to cause a denial of service
(system crash). (CVE-2022-36946)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS:
  linux-image-5.15.0-1018-kvm 5.15.0-1018.22
  linux-image-5.15.0-1020-aws 5.15.0-1020.24
  linux-image-5.15.0-1020-azure   5.15.0-1020.25
  linux-image-5.15.0-48-generic   5.15.0-48.54
  linux-image-5.15.0-48-generic-64k  5.15.0-48.54
  linux-image-5.15.0-48-generic-lpae  5.15.0-48.54
  linux-image-5.15.0-48-lowlatency  5.15.0-48.54
  linux-image-5.15.0-48-lowlatency-64k  5.15.0-48.54
  linux-image-aws 5.15.0.1020.20
  linux-image-azure   5.15.0.1020.19
  linux-image-generic 5.15.0.48.48
  linux-image-generic-64k 5.15.0.48.48
  linux-image-generic-64k-hwe-22.04  5.15.0.48.48
  linux-image-generic-hwe-22.04   5.15.0.48.48
  linux-image-generic-lpae5.15.0.48.48
  linux-image-generic-lpae-hwe-22.04  5.15.0.48.48
  linux-image-kvm 5.15.0.1018.16
  linux-image-lowlatency  5.15.0.48.45
  linux-image-lowlatency-64k  5.15.0.48.45
  linux-image-lowlatency-64k-hwe-22.04  5.15.0.48.45
  linux-image-lowlatency-hwe-22.04  5.15.0.48.45
  linux-image-oem-20.04   5.15.0.48.48
  linux-image-virtual 5.15.0.48.48
  linux-image-virtual-hwe-22.04   5.15.0.48.48

Ubuntu 20.04 LTS:
  linux-image-5.15.0-1020-aws 5.15.0-1020.24~20.04.1
  linux-image-5.15.0-1020-azure   5.15.0-1020.25~20.04.1
  linux-image-aws 5.15.0.1020.24~20.04.12
  linux-image-azure

[USN-5594-1] Linux kernel vulnerabilities

2022-09-01 Thread Steve Beattie
==
Ubuntu Security Notice USN-5594-1
September 02, 2022

linux, linux-aws, linux-aws-5.15, linux-azure, linux-azure-5.15,
linux-gcp, linux-gcp-5.15, linux-gke, linux-gke-5.15, linux-gkeop,
linux-ibm, linux-kvm, linux-lowlatency vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-azure: Linux kernel for Microsoft Azure Cloud systems
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-gke: Linux kernel for Google Container Engine (GKE) systems
- linux-gkeop: Linux kernel for Google Container Engine (GKE) systems
- linux-ibm: Linux kernel for IBM cloud systems
- linux-kvm: Linux kernel for cloud environments
- linux-lowlatency: Linux low latency kernel
- linux-aws-5.15: Linux kernel for Amazon Web Services (AWS) systems
- linux-azure-5.15: Linux kernel for Microsoft Azure cloud systems
- linux-gcp-5.15: Linux kernel for Google Cloud Platform (GCP) systems
- linux-gke-5.15: Linux kernel for Google Container Engine (GKE) systems

Details:

Asaf Modelevsky discovered that the Intel(R) 10GbE PCI Express (ixgbe)
Ethernet driver for the Linux kernel performed insufficient control flow
management. A local attacker could possibly use this to cause a denial of
service. (CVE-2021-33061)

It was discovered that the IP implementation in the Linux kernel did not
provide sufficient randomization when calculating port offsets. An attacker
could possibly use this to expose sensitive information. (CVE-2022-1012)

Norbert Slusarek discovered that a race condition existed in the perf
subsystem in the Linux kernel, resulting in a use-after-free vulnerability.
A privileged local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-1729)

Qiuhao Li, Gaoning Pan, and Yongkang Jia discovered that the KVM hypervisor
implementation in the Linux kernel did not properly handle an illegal
instruction in a guest, resulting in a null pointer dereference. An
attacker in a guest VM could use this to cause a denial of service (system
crash) in the host OS. (CVE-2022-1852)

It was discovered that the UDF file system implementation in the Linux
kernel contained an out-of-bounds write vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2022-1943)

Gerald Lee discovered that the NTFS file system implementation in the Linux
kernel did not properly handle certain error conditions, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly expose sensitive information.
(CVE-2022-1973)

It was discovered that the device-mapper verity (dm-verity) driver in the
Linux kernel did not properly verify targets being loaded into the device-
mapper table. A privileged attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2022-2503)

Zheyu Ma discovered that the Intel iSMT SMBus host controller driver in the
Linux kernel contained an out-of-bounds write vulnerability. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2022-2873)

Selim Enes Karaduman discovered that a race condition existed in the pipe
buffers implementation of the Linux kernel. A local attacker could use this
to cause a denial of service (system crash) or possibly escalate
privileges. (CVE-2022-2959)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS:
  linux-image-5.15.0-1002-gkeop   5.15.0-1002.4
  linux-image-5.15.0-1013-ibm 5.15.0-1013.15
  linux-image-5.15.0-1015-gke 5.15.0-1015.18
  linux-image-5.15.0-1017-gcp 5.15.0-1017.23
  linux-image-5.15.0-1017-kvm 5.15.0-1017.21
  linux-image-5.15.0-1019-aws 5.15.0-1019.23
  linux-image-5.15.0-1019-azure   5.15.0-1019.24
  linux-image-5.15.0-47-generic   5.15.0-47.51
  linux-image-5.15.0-47-generic-64k  5.15.0-47.51
  linux-image-5.15.0-47-generic-lpae  5.15.0-47.51
  linux-image-5.15.0-47-lowlatency  5.15.0-47.53
  linux-image-5.15.0-47-lowlatency-64k  5.15.0-47.53
  linux-image-aws 5.15.0.1019.19
  linux-image-azure   5.15.0.1019.18
  linux-image-gcp 5.15.0.1017.15
  linux-image-generic 5.15.0.47.47
  linux-image-generic-64k 5.15.0.47.47
  linux-image-generic-64k-hwe-22.04  5.15.0.47.47
  linux-image-generic-hwe-22.04   5.15.0.47.47
  linux-image-generic-lpae5.15.0.47.47
  linux-image-generic-lpae-hwe-22.04  5.15.0.47.47
  linux-image-gke 

[USN-5590-1] Linux kernel (OEM) vulnerability

2022-08-30 Thread Steve Beattie
==
Ubuntu Security Notice USN-5590-1
August 30, 2022

linux-oem-5.14 vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS

Summary:

The system could be made to crash if it received specially crafted
network traffic.

Software Description:
- linux-oem-5.14: Linux kernel for OEM systems

Details:

Domingo Dirutigliano and Nicola Guerrera discovered that the netfilter
subsystem in the Linux kernel did not properly handle rules that truncated
packets below the packet header size. When such rules are in place, a
remote attacker could possibly use this to cause a denial of service
(system crash).

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
  linux-image-5.14.0-1050-oem 5.14.0-1050.57
  linux-image-oem-20.04   5.14.0.1050.46
  linux-image-oem-20.04b  5.14.0.1050.46
  linux-image-oem-20.04c  5.14.0.1050.46
  linux-image-oem-20.04d  5.14.0.1050.46

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
  https://ubuntu.com/security/notices/USN-5590-1
  CVE-2022-36946

Package Information:
  https://launchpad.net/ubuntu/+source/linux-oem-5.14/5.14.0-1050.57



signature.asc
Description: PGP signature



[USN-5582-1] Linux kernel (Azure CVM) vulnerabilities

2022-08-25 Thread Steve Beattie
==
Ubuntu Security Notice USN-5582-1
August 25, 2022

linux-azure-fde vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-azure-fde: Linux kernel for Microsoft Azure CVM cloud systems

Details:

Arthur Mongodin discovered that the netfilter subsystem in the Linux kernel
did not properly perform data validation. A local attacker could use this
to escalate privileges in certain situations. (CVE-2022-34918)

Zhenpeng Lin discovered that the network packet scheduler implementation in
the Linux kernel did not properly remove all references to a route filter
before freeing it in some situations. A local attacker could use this to
cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-2588)

It was discovered that the netfilter subsystem of the Linux kernel did not
prevent one nft object from referencing an nft set in another nft table,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-2586)

It was discovered that the block layer subsystem in the Linux kernel did
not properly initialize memory in some situations. A privileged local
attacker could use this to expose sensitive information (kernel memory).
(CVE-2022-0494)

Hu Jiahui discovered that multiple race conditions existed in the Advanced
Linux Sound Architecture (ALSA) framework, leading to use-after-free
vulnerabilities. A local attacker could use these to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2022-1048)

Minh Yuan discovered that the floppy disk driver in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2022-1652)

It was discovered that the Atheros ath9k wireless device driver in the
Linux kernel did not properly handle some error conditions, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-1679)

It was discovered that the Marvell NFC device driver implementation in the
Linux kernel did not properly perform memory cleanup operations in some
situations, leading to a use-after-free vulnerability. A local attacker
could possibly use this to cause a denial of service (system crash) or
execute arbitrary code. (CVE-2022-1734)

Duoming Zhou discovered a race condition in the NFC subsystem in the Linux
kernel, leading to a use-after-free vulnerability. A privileged local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-1974)

Duoming Zhou discovered that the NFC subsystem in the Linux kernel did not
properly prevent context switches from occurring during certain atomic
context operations. A privileged local attacker could use this to cause a
denial of service (system crash). (CVE-2022-1975)

Felix Fu discovered that the Sun RPC implementation in the Linux kernel did
not properly handle socket states, leading to a use-after-free
vulnerability. A remote attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2022-28893)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
  linux-image-5.4.0-1089-azure-fde  5.4.0-1089.94+cvm1.2
  linux-image-azure-fde   5.4.0.1089.94+cvm1.29

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
  https://ubuntu.com/security/notices/USN-5582-1
  CVE-2022-0494, CVE-2022-1048, CVE-2022-1652, CVE-2022-1679,
  CVE-2022-1734, CVE-2022-1974, CVE-2022-1975, CVE-2022-2586,
  CVE-2022-2588, CVE-2022-28893, CVE-2022-34918

Package Information:
  https://launchpad.net/ubuntu/+source/linux-azure-fde/5.4.0-1089.94+cvm1.2



signature.asc
Description: PGP signature



[USN-5577-1] Linux kernel (OEM) vulnerabilities

2022-08-23 Thread Steve Beattie
==
Ubuntu Security Notice USN-5577-1
August 24, 2022

linux-oem-5.14 vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-oem-5.14: Linux kernel for OEM systems

Details:

Asaf Modelevsky discovered that the Intel(R) 10GbE PCI Express (ixgbe)
Ethernet driver for the Linux kernel performed insufficient control flow
management. A local attacker could possibly use this to cause a denial of
service. (CVE-2021-33061)

It was discovered that the framebuffer driver on the Linux kernel did not
verify size limits when changing font or screen size, leading to an out-of-
bounds write. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2021-33655)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
  linux-image-5.14.0-1049-oem 5.14.0-1049.56
  linux-image-oem-20.04   5.14.0.1049.45
  linux-image-oem-20.04b  5.14.0.1049.45
  linux-image-oem-20.04c  5.14.0.1049.45
  linux-image-oem-20.04d  5.14.0.1049.45

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
  https://ubuntu.com/security/notices/USN-5577-1
  CVE-2021-33061, CVE-2021-33655

Package Information:
  https://launchpad.net/ubuntu/+source/linux-oem-5.14/5.14.0-1049.56



signature.asc
Description: PGP signature



[USN-5547-1] NVIDIA graphics drivers vulnerabilities

2022-08-03 Thread Steve Beattie
==
Ubuntu Security Notice USN-5547-1
August 03, 2022

nvidia-graphics-drivers-390, nvidia-graphics-drivers-450-server,
nvidia-graphics-drivers-470, nvidia-graphics-drivers-470-server,
nvidia-graphics-drivers-510, nvidia-graphics-drivers-510-server,
nvidia-graphics-drivers-515, nvidia-graphics-drivers-515-server
vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in NVIDIA graphics drivers.

Software Description:
- nvidia-graphics-drivers-390: NVIDIA binary X.Org driver
- nvidia-graphics-drivers-450-server: NVIDIA server driver
- nvidia-graphics-drivers-470: NVIDIA binary X.Org driver
- nvidia-graphics-drivers-470-server: NVIDIA server driver
- nvidia-graphics-drivers-510: NVIDIA binary X.Org driver
- nvidia-graphics-drivers-510-server: NVIDIA server driver
- nvidia-graphics-drivers-515: NVIDIA binary X.Org driver
- nvidia-graphics-drivers-515-server: NVIDIA server driver

Details:

Le Wu discovered that the NVIDIA graphics drivers did not properly perform
input validation in some situations. A local user could use this to cause a
denial of service or possibly execute arbitrary code. (CVE-2022-31607)

Tal Lossos discovered that the NVIDIA graphics drivers incorrectly handled
certain memory operations, leading to a null-pointer dereference. A local
attacker could use this to cause a denial of service. (CVE-2022-31615)

Artem S. Tashkinov discovered that the NVIDIA graphics drivers Dynamic
Boost D-Bus component did not properly restrict access to its endpoint.
When enabled in non-default configurations, a local attacker could use this
to cause a denial of service or possibly execute arbitrary code.
(CVE-2022-31608)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS:
  xserver-xorg-video-nvidia-390   390.154-0ubuntu0.22.04.1
  xserver-xorg-video-nvidia-440-server  450.203.03-0ubuntu0.22.04.1
  xserver-xorg-video-nvidia-450-server  450.203.03-0ubuntu0.22.04.1
  xserver-xorg-video-nvidia-460   470.141.03-0ubuntu0.22.04.1
  xserver-xorg-video-nvidia-460-server  470.141.03-0ubuntu0.22.04.1
  xserver-xorg-video-nvidia-465   470.141.03-0ubuntu0.22.04.1
  xserver-xorg-video-nvidia-470   470.141.03-0ubuntu0.22.04.1
  xserver-xorg-video-nvidia-470-server  470.141.03-0ubuntu0.22.04.1
  xserver-xorg-video-nvidia-495   510.85.02-0ubuntu0.22.04.1
  xserver-xorg-video-nvidia-510   510.85.02-0ubuntu0.22.04.1
  xserver-xorg-video-nvidia-510-server  510.85.02-0ubuntu0.22.04.1
  xserver-xorg-video-nvidia-515   515.65.01-0ubuntu0.22.04.1
  xserver-xorg-video-nvidia-515-server  515.65.01-0ubuntu0.22.04.1

Ubuntu 20.04 LTS:
  xserver-xorg-video-nvidia-390   390.154-0ubuntu0.20.04.1
  xserver-xorg-video-nvidia-440-server  450.203.03-0ubuntu0.20.04.1
  xserver-xorg-video-nvidia-450-server  450.203.03-0ubuntu0.20.04.1
  xserver-xorg-video-nvidia-460   470.141.03-0ubuntu0.20.04.1
  xserver-xorg-video-nvidia-460-server  470.141.03-0ubuntu0.20.04.1
  xserver-xorg-video-nvidia-465   470.141.03-0ubuntu0.20.04.1
  xserver-xorg-video-nvidia-470   470.141.03-0ubuntu0.20.04.1
  xserver-xorg-video-nvidia-470-server  470.141.03-0ubuntu0.20.04.1
  xserver-xorg-video-nvidia-495   510.85.02-0ubuntu0.20.04.1
  xserver-xorg-video-nvidia-510   510.85.02-0ubuntu0.20.04.1
  xserver-xorg-video-nvidia-510-server  510.85.02-0ubuntu0.20.04.1
  xserver-xorg-video-nvidia-515   515.65.01-0ubuntu0.20.04.1
  xserver-xorg-video-nvidia-515-server  515.65.01-0ubuntu0.20.04.1

Ubuntu 18.04 LTS:
  xserver-xorg-video-nvidia-390   390.154-0ubuntu0.18.04.1
  xserver-xorg-video-nvidia-440-server  450.203.03-0ubuntu0.18.04.1
  xserver-xorg-video-nvidia-450-server  450.203.03-0ubuntu0.18.04.1
  xserver-xorg-video-nvidia-460   470.141.03-0ubuntu0.18.04.1
  xserver-xorg-video-nvidia-460-server  470.141.03-0ubuntu0.18.04.1
  xserver-xorg-video-nvidia-465   470.141.03-0ubuntu0.18.04.1
  xserver-xorg-video-nvidia-470   470.141.03-0ubuntu0.18.04.1
  xserver-xorg-video-nvidia-470-server  470.141.03-0ubuntu0.18.04.1
  xserver-xorg-video-nvidia-495   510.85.02-0ubuntu0.18.04.1
  xserver-xorg-video-nvidia-510   510.85.02-0ubuntu0.18.04.1
  xserver-xorg-video-nvidia-510-server  510.85.02-0ubuntu0.18.04.1
  xserver-xorg-video-nvidia-515   515.65.01-0ubuntu0.18.04.1
  xserver-xorg-video-nvidia-515-server  515.65.01-0ubuntu0.18.04.1

After a standard system update you need to reboot your computer to make all
the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5547-1
  CVE-2022-31607, CVE-2022-31608, CVE-2022-31615

Package Information:
  
https://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-390/390.154-0ubuntu0.22.04.1
  

[USN-5544-1] Linux kernel vulnerabilities

2022-08-01 Thread Steve Beattie
==
Ubuntu Security Notice USN-5544-1
August 02, 2022

linux, linux-hwe-5.15, linux-lowlatency, linux-lowlatency-hwe-5.15
vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux: Linux kernel
- linux-lowlatency: Linux low latency kernel
- linux-hwe-5.15: Linux hardware enablement (HWE) kernel
- linux-lowlatency-hwe-5.15: Linux low latency kernel

Details:

It was discovered that the Atheros ath9k wireless device driver in the
Linux kernel did not properly handle some error conditions, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-1679)

Felix Fu discovered that the Sun RPC implementation in the Linux kernel did
not properly handle socket states, leading to a use-after-free
vulnerability. A remote attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2022-28893)

Arthur Mongodin discovered that the netfilter subsystem in the Linux kernel
did not properly perform data validation. A local attacker could use this
to escalate privileges in certain situations. (CVE-2022-34918)

Minh Yuan discovered that the floppy disk driver in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2022-1652)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS:
  linux-image-5.15.0-43-generic   5.15.0-43.46
  linux-image-5.15.0-43-generic-64k  5.15.0-43.46
  linux-image-5.15.0-43-generic-lpae  5.15.0-43.46
  linux-image-5.15.0-43-lowlatency  5.15.0-43.46
  linux-image-5.15.0-43-lowlatency-64k  5.15.0-43.46
  linux-image-generic 5.15.0.43.44
  linux-image-generic-64k 5.15.0.43.44
  linux-image-generic-64k-hwe-22.04  5.15.0.43.44
  linux-image-generic-hwe-22.04   5.15.0.43.44
  linux-image-generic-lpae5.15.0.43.44
  linux-image-generic-lpae-hwe-22.04  5.15.0.43.44
  linux-image-lowlatency  5.15.0.43.41
  linux-image-lowlatency-64k  5.15.0.43.41
  linux-image-lowlatency-64k-hwe-22.04  5.15.0.43.41
  linux-image-lowlatency-hwe-22.04  5.15.0.43.41
  linux-image-oem-20.04   5.15.0.43.44
  linux-image-virtual 5.15.0.43.44
  linux-image-virtual-hwe-22.04   5.15.0.43.44

Ubuntu 20.04 LTS:
  linux-image-5.15.0-43-generic   5.15.0-43.46~20.04.1
  linux-image-5.15.0-43-generic-64k  5.15.0-43.46~20.04.1
  linux-image-5.15.0-43-generic-lpae  5.15.0-43.46~20.04.1
  linux-image-5.15.0-43-lowlatency  5.15.0-43.46~20.04.1
  linux-image-5.15.0-43-lowlatency-64k  5.15.0-43.46~20.04.1
  linux-image-generic-64k-hwe-20.04  5.15.0.43.46~20.04.14
  linux-image-generic-hwe-20.04   5.15.0.43.46~20.04.14
  linux-image-generic-lpae-hwe-20.04  5.15.0.43.46~20.04.14
  linux-image-lowlatency-64k-hwe-20.04  5.15.0.43.46~20.04.13
  linux-image-lowlatency-hwe-20.04  5.15.0.43.46~20.04.13
  linux-image-virtual-hwe-20.04   5.15.0.43.46~20.04.14

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
  https://ubuntu.com/security/notices/USN-5544-1
  CVE-2022-1652, CVE-2022-1679, CVE-2022-28893, CVE-2022-34918

Package Information:
  https://launchpad.net/ubuntu/+source/linux/5.15.0-43.46
  https://launchpad.net/ubuntu/+source/linux-lowlatency/5.15.0-43.46
  https://launchpad.net/ubuntu/+source/linux-hwe-5.15/5.15.0-43.46~20.04.1
  
https://launchpad.net/ubuntu/+source/linux-lowlatency-hwe-5.15/5.15.0-43.46~20.04.1



signature.asc
Description: PGP signature



[USN-5541-1] Linux kernel (Azure) vulnerabilities

2022-07-28 Thread Steve Beattie
==
Ubuntu Security Notice USN-5541-1
July 28, 2022

linux-azure vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 ESM

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-azure: Linux kernel for Microsoft Azure Cloud systems

Details:

Eric Biederman discovered that the cgroup process migration implementation
in the Linux kernel did not perform permission checks correctly in some
situations. A local attacker could possibly use this to gain administrative
privileges. (CVE-2021-4197)

Jann Horn discovered that the FUSE file system in the Linux kernel
contained a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-1011)

Duoming Zhou discovered that the 6pack protocol implementation in the Linux
kernel did not handle detach events properly in some situations, leading to
a use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash). (CVE-2022-1198)

Duoming Zhou discovered that the AX.25 amateur radio protocol
implementation in the Linux kernel did not handle detach events properly in
some situations. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2022-1199)

Duoming Zhou discovered race conditions in the AX.25 amateur radio protocol
implementation in the Linux kernel during device detach operations. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2022-1204)

Duoming Zhou discovered race conditions in the AX.25 amateur radio protocol
implementation in the Linux kernel, leading to use-after-free
vulnerabilities. A local attacker could possibly use this to cause a denial
of service (system crash). (CVE-2022-1205)

It was discovered that the PF_KEYv2 implementation in the Linux kernel did
not properly initialize kernel memory in some situations. A local attacker
could use this to expose sensitive information (kernel memory).
(CVE-2022-1353)

It was discovered that the implementation of X.25 network protocols in the
Linux kernel did not terminate link layer sessions properly. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2022-1516)

Zheyu Ma discovered that the Silicon Motion SM712 framebuffer driver in the
Linux kernel did not properly handle very small reads. A local attacker
could use this to cause a denial of service (system crash). (CVE-2022-2380)

It was discovered that the 8 Devices USB2CAN interface implementation in
the Linux kernel did not properly handle certain error conditions, leading
to a double-free. A local attacker could possibly use this to cause a
denial of service (system crash). (CVE-2022-28388)

It was discovered that the Microchip CAN BUS Analyzer interface
implementation in the Linux kernel did not properly handle certain error
conditions, leading to a double-free. A local attacker could possibly use
this to cause a denial of service (system crash). (CVE-2022-28389)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 ESM:
  linux-image-4.15.0-1146-azure   4.15.0-1146.161~16.04.1
  linux-image-azure   4.15.0.1146.133

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
  https://ubuntu.com/security/notices/USN-5541-1
  CVE-2021-4197, CVE-2022-1011, CVE-2022-1198, CVE-2022-1199,
  CVE-2022-1204, CVE-2022-1205, CVE-2022-1353, CVE-2022-1516,
  CVE-2022-2380, CVE-2022-28388, CVE-2022-28389



signature.asc
Description: PGP signature



[USN-5539-1] Linux kernel vulnerabilities

2022-07-28 Thread Steve Beattie
==
Ubuntu Security Notice USN-5539-1
July 28, 2022

linux-bluefield, linux-gcp-5.4, linux-gke-5.4 vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-bluefield: Linux kernel for NVIDIA BlueField platforms
- linux-gcp-5.4: Linux kernel for Google Cloud Platform (GCP) systems
- linux-gke-5.4: Linux kernel for Google Container Engine (GKE) systems

Details:

It was discovered that the implementation of the 6pack and mkiss protocols
in the Linux kernel did not handle detach events properly in some
situations, leading to a use-after-free vulnerability. A local attacker
could possibly use this to cause a denial of service (system crash).
(CVE-2022-1195)

Duoming Zhou discovered that the AX.25 amateur radio protocol
implementation in the Linux kernel did not handle detach events properly in
some situations. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2022-1199)

Duoming Zhou discovered race conditions in the AX.25 amateur radio protocol
implementation in the Linux kernel during device detach operations. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2022-1204)

Duoming Zhou discovered race conditions in the AX.25 amateur radio protocol
implementation in the Linux kernel, leading to use-after-free
vulnerabilities. A local attacker could possibly use this to cause a denial
of service (system crash). (CVE-2022-1205)

Yongkang Jia discovered that the KVM hypervisor implementation in the Linux
kernel did not properly handle guest TLB mapping invalidation requests in
some situations. An attacker in a guest VM could use this to cause a denial
of service (system crash) in the host OS. (CVE-2022-1789)

It was discovered that the 8 Devices USB2CAN interface implementation in
the Linux kernel did not properly handle certain error conditions, leading
to a double-free. A local attacker could possibly use this to cause a
denial of service (system crash). (CVE-2022-28388)

Minh Yuan discovered that the floppy driver in the Linux kernel contained a
race condition in some situations, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-33981)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
  linux-image-5.4.0-1042-bluefield  5.4.0-1042.47
  linux-image-bluefield   5.4.0.1042.41

Ubuntu 18.04 LTS:
  linux-image-5.4.0-1078-gke  5.4.0-1078.84~18.04.1
  linux-image-5.4.0-1084-gcp  5.4.0-1084.92~18.04.1
  linux-image-gcp 5.4.0.1084.63
  linux-image-gke-5.4 5.4.0.1078.84~18.04.40

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
  https://ubuntu.com/security/notices/USN-5539-1
  CVE-2022-1195, CVE-2022-1199, CVE-2022-1204, CVE-2022-1205,
  CVE-2022-1789, CVE-2022-28388, CVE-2022-33981

Package Information:
  https://launchpad.net/ubuntu/+source/linux-bluefield/5.4.0-1042.47
  https://launchpad.net/ubuntu/+source/linux-gcp-5.4/5.4.0-1084.92~18.04.1
  https://launchpad.net/ubuntu/+source/linux-gke-5.4/5.4.0-1078.84~18.04.1



signature.asc
Description: PGP signature



[USN-5540-1] Linux kernel vulnerabilities

2022-07-28 Thread Steve Beattie
==
Ubuntu Security Notice USN-5540-1
July 28, 2022

linux, linux-aws, linux-kvm, linux-lts-xenial vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-kvm: Linux kernel for cloud environments
- linux-lts-xenial: Linux hardware enablement kernel from Xenial for Trusty

Details:

Liu Jian discovered that the IGMP protocol implementation in the Linux
kernel contained a race condition, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-20141)

It was discovered that the USB gadget subsystem in the Linux kernel did not
properly validate interface descriptor requests. An attacker could possibly
use this to cause a denial of service (system crash). (CVE-2022-25258)

It was discovered that the Remote NDIS (RNDIS) USB gadget implementation in
the Linux kernel did not properly validate the size of the RNDIS_MSG_SET
command. An attacker could possibly use this to expose sensitive
information (kernel memory). (CVE-2022-25375)

Arthur Mongodin discovered that the netfilter subsystem in the Linux kernel
did not properly perform data validation. A local attacker could use this
to escalate privileges in certain situations. (CVE-2022-34918)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 ESM:
  linux-image-4.4.0--kvm  4.4.0-.121
  linux-image-4.4.0-1146-aws  4.4.0-1146.161
  linux-image-4.4.0-230-generic   4.4.0-230.264
  linux-image-4.4.0-230-lowlatency  4.4.0-230.264
  linux-image-aws 4.4.0.1146.150
  linux-image-generic 4.4.0.230.236
  linux-image-kvm 4.4.0..108
  linux-image-lowlatency  4.4.0.230.236
  linux-image-virtual 4.4.0.230.236

Ubuntu 14.04 ESM:
  linux-image-4.4.0-1110-aws  4.4.0-1110.116
  linux-image-4.4.0-230-generic   4.4.0-230.264~14.04.1
  linux-image-4.4.0-230-lowlatency  4.4.0-230.264~14.04.1
  linux-image-aws 4.4.0.1110.107
  linux-image-generic-lts-xenial  4.4.0.230.200
  linux-image-lowlatency-lts-xenial  4.4.0.230.200
  linux-image-virtual-lts-xenial  4.4.0.230.200

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
  https://ubuntu.com/security/notices/USN-5540-1
  CVE-2022-20141, CVE-2022-25258, CVE-2022-25375, CVE-2022-34918



signature.asc
Description: PGP signature



[USN-5529-1] Linux kernel (OEM) vulnerabilities

2022-07-20 Thread Steve Beattie
==
Ubuntu Security Notice USN-5529-1
July 21, 2022

linux-oem-5.17 vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-oem-5.17: Linux kernel for OEM systems

Details:

It was discovered that the Atheros ath9k wireless device driver in the
Linux kernel did not properly handle some error conditions, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-1679)

Yongkang Jia discovered that the KVM hypervisor implementation in the Linux
kernel did not properly handle guest TLB mapping invalidation requests in
some situations. An attacker in a guest VM could use this to cause a denial
of service (system crash) in the host OS. (CVE-2022-1789)

Qiuhao Li, Gaoning Pan, and Yongkang Jia discovered that the KVM hypervisor
implementation in the Linux kernel did not properly handle an illegal
instruction in a guest, resulting in a null pointer dereference. An
attacker in a guest VM could use this to cause a denial of service (system
crash) in the host OS. (CVE-2022-1852)

Gerald Lee discovered that the NTFS file system implementation in the Linux
kernel did not properly handle certain error conditions, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly expose sensitive information.
(CVE-2022-1973)

It was discovered that the netfilter subsystem in the Linux kernel
contained a buffer overflow in certain situations. A local attacker could
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2022-2078)

It was discovered that some Intel processors did not completely perform
cleanup actions on multi-core shared buffers. A local attacker could
possibly use this to expose sensitive information. (CVE-2022-21123)

It was discovered that some Intel processors did not completely perform
cleanup actions on microarchitectural fill buffers. A local attacker could
possibly use this to expose sensitive information. (CVE-2022-21125)

It was discovered that some Intel processors did not properly perform
cleanup during specific special register write operations. A local attacker
could possibly use this to expose sensitive information. (CVE-2022-21166)

It was discovered that the virtio RPMSG bus driver in the Linux kernel
contained a double-free vulnerability in certain error conditions. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2022-34494, CVE-2022-34495)

Minh Yuan discovered that the floppy disk driver in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2022-1652)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS:
  linux-image-5.17.0-1013-oem 5.17.0-1013.14
  linux-image-oem-22.04   5.17.0.1013.12
  linux-image-oem-22.04a  5.17.0.1013.12

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
  https://ubuntu.com/security/notices/USN-5529-1
  CVE-2022-1652, CVE-2022-1679, CVE-2022-1789, CVE-2022-1852,
  CVE-2022-1973, CVE-2022-2078, CVE-2022-21123, CVE-2022-21125,
  CVE-2022-21166, CVE-2022-34494, CVE-2022-34495

Package Information:
  https://launchpad.net/ubuntu/+source/linux-oem-5.17/5.17.0-1013.14



signature.asc
Description: PGP signature



[USN-5517-1] Linux kernel (OEM) vulnerabilities

2022-07-13 Thread Steve Beattie
==
Ubuntu Security Notice USN-5517-1
July 13, 2022

linux-oem-5.14 vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-oem-5.14: Linux kernel for OEM systems

Details:

It was discovered that the Atheros ath9k wireless device driver in the
Linux kernel did not properly handle some error conditions, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-1679)

It was discovered that the virtio RPMSG bus driver in the Linux kernel
contained a double-free vulnerability in certain error conditions. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2022-34494)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
  linux-image-5.14.0-1045-oem 5.14.0-1045.51
  linux-image-oem-20.04   5.14.0.1045.41
  linux-image-oem-20.04b  5.14.0.1045.41
  linux-image-oem-20.04c  5.14.0.1045.41
  linux-image-oem-20.04d  5.14.0.1045.41

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
  https://ubuntu.com/security/notices/USN-5517-1
  CVE-2022-1679, CVE-2022-34494

Package Information:
  https://launchpad.net/ubuntu/+source/linux-oem-5.14/5.14.0-1045.51



signature.asc
Description: PGP signature



[USN-5518-1] Linux kernel vulnerabilities

2022-07-13 Thread Steve Beattie
==
Ubuntu Security Notice USN-5518-1
July 14, 2022

linux, linux-aws, linux-azure, linux-gcp, linux-gke, linux-ibm, linux-kvm,
linux-lowlatency, linux-oracle vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-azure: Linux kernel for Microsoft Azure Cloud systems
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-gke: Linux kernel for Google Container Engine (GKE) systems
- linux-ibm: Linux kernel for IBM cloud systems
- linux-kvm: Linux kernel for cloud environments
- linux-lowlatency: Linux low latency kernel
- linux-oracle: Linux kernel for Oracle Cloud systems

Details:

It was discovered that the eBPF implementation in the Linux kernel did not
properly prevent writes to kernel objects in BPF_BTF_LOAD commands. A
privileged local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-0500)

It was discovered that the Marvell NFC device driver implementation in the
Linux kernel did not properly perform memory cleanup operations in some
situations, leading to a use-after-free vulnerability. A local attacker
could possibly use this to cause a denial of service (system) or execute
arbitrary code. (CVE-2022-1734)

Yongkang Jia discovered that the KVM hypervisor implementation in the Linux
kernel did not properly handle guest TLB mapping invalidation requests in
some situations. An attacker in a guest VM could use this to cause a denial
of service in the host OS (system crash). (CVE-2022-1789)

Duoming Zhou discovered a race condition in the NFC subsystem in the Linux
kernel, leading to a use-after-free vulnerability. A privileged local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-1974)

Duoming Zhou discovered that the NFC subsystem in the Linux kernel did not
properly prevent context switches from occurring during certain atomic
context operations. A privileged local attacker could use this to cause a
denial of service (system crash). (CVE-2022-1975)

Minh Yuan discovered that the floppy driver in the Linux kernel contained a
race condition in some situations, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-33981)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS:
  linux-image-5.15.0-1010-ibm 5.15.0-1010.12
  linux-image-5.15.0-1011-gke 5.15.0-1011.14
  linux-image-5.15.0-1013-gcp 5.15.0-1013.18
  linux-image-5.15.0-1013-kvm 5.15.0-1013.16
  linux-image-5.15.0-1013-oracle  5.15.0-1013.17
  linux-image-5.15.0-1014-azure   5.15.0-1014.17
  linux-image-5.15.0-1015-aws 5.15.0-1015.19
  linux-image-5.15.0-41-generic   5.15.0-41.44
  linux-image-5.15.0-41-generic-64k  5.15.0-41.44
  linux-image-5.15.0-41-generic-lpae  5.15.0-41.44
  linux-image-5.15.0-41-lowlatency  5.15.0-41.44
  linux-image-5.15.0-41-lowlatency-64k  5.15.0-41.44
  linux-image-aws 5.15.0.1015.15
  linux-image-azure   5.15.0.1014.13
  linux-image-gcp 5.15.0.1013.11
  linux-image-generic 5.15.0.41.43
  linux-image-generic-64k 5.15.0.41.43
  linux-image-generic-64k-hwe-22.04  5.15.0.41.43
  linux-image-generic-hwe-22.04   5.15.0.41.43
  linux-image-generic-lpae5.15.0.41.43
  linux-image-generic-lpae-hwe-22.04  5.15.0.41.43
  linux-image-gke 5.15.0.1011.14
  linux-image-gke-5.155.15.0.1011.14
  linux-image-ibm 5.15.0.1010.9
  linux-image-kvm 5.15.0.1013.11
  linux-image-lowlatency  5.15.0.41.40
  linux-image-lowlatency-64k  5.15.0.41.40
  linux-image-lowlatency-64k-hwe-22.04  5.15.0.41.40
  linux-image-lowlatency-hwe-22.04  5.15.0.41.40
  linux-image-oem-20.04   5.15.0.41.43
  linux-image-oracle  5.15.0.1013.11
  linux-image-virtual 5.15.0.41.43
  linux-image-virtual-hwe-22.04   5.15.0.41.43

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
  

[USN-5515-1] Linux kernel vulnerabilities

2022-07-13 Thread Steve Beattie
==
Ubuntu Security Notice USN-5515-1
July 13, 2022

linux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15,
linux-gcp-4.15, linux-hwe, linux-kvm, linux-oracle, linux-raspi2,
linux-snapdragon vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS
- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-azure-4.15: Linux kernel for Microsoft Azure Cloud systems
- linux-gcp-4.15: Linux kernel for Google Cloud Platform (GCP) systems
- linux-kvm: Linux kernel for cloud environments
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-raspi2: Linux kernel for Raspberry Pi systems
- linux-snapdragon: Linux kernel for Qualcomm Snapdragon processors
- linux-aws-hwe: Linux kernel for Amazon Web Services (AWS-HWE) systems
- linux-hwe: Linux hardware enablement (HWE) kernel
- linux-azure: Linux kernel for Microsoft Azure Cloud systems

Details:

Eric Biederman discovered that the cgroup process migration implementation
in the Linux kernel did not perform permission checks correctly in some
situations. A local attacker could possibly use this to gain administrative
privileges. (CVE-2021-4197)

Jann Horn discovered that the FUSE file system in the Linux kernel
contained a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-1011)

Duoming Zhou discovered that the 6pack protocol implementation in the Linux
kernel did not handle detach events properly in some situations, leading to
a use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash). (CVE-2022-1198)

Duoming Zhou discovered that the AX.25 amateur radio protocol
implementation in the Linux kernel did not handle detach events properly in
some situations. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2022-1199)

Duoming Zhou discovered race conditions in the AX.25 amateur radio protocol
implementation in the Linux kernel during device detach operations. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2022-1204)

Duoming Zhou discovered race conditions in the AX.25 amateur radio protocol
implementation in the Linux kernel, leading to use-after-free
vulnerabilities. A local attacker could possibly use this to cause a denial
of service (system crash). (CVE-2022-1205)

It was discovered that the PF_KEYv2 implementation in the Linux kernel did
not properly initialize kernel memory in some situations. A local attacker
could use this to expose sensitive information (kernel memory).
(CVE-2022-1353)

It was discovered that the implementation of X.25 network protocols in the
Linux kernel did not terminate link layer sessions properly. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2022-1516)

Zheyu Ma discovered that the Silicon Motion SM712 framebuffer driver in the
Linux kernel did not properly handle very small reads. A local attacker
could use this to cause a denial of service (system crash). (CVE-2022-2380)

It was discovered that the Microchip CAN BUS Analyzer interface
implementation in the Linux kernel did not properly handle certain error
conditions, leading to a double-free. A local attacker could possibly use
this to cause a denial of service (system crash). (CVE-2022-28389)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
  linux-image-4.15.0-1102-oracle  4.15.0-1102.113
  linux-image-4.15.0-1115-raspi2  4.15.0-1115.123
  linux-image-4.15.0-1123-kvm 4.15.0-1123.128
  linux-image-4.15.0-1131-gcp 4.15.0-1131.147
  linux-image-4.15.0-1133-snapdragon  4.15.0-1133.143
  linux-image-4.15.0-1137-aws 4.15.0-1137.148
  linux-image-4.15.0-1146-azure   4.15.0-1146.161
  linux-image-4.15.0-189-generic  4.15.0-189.200
  linux-image-4.15.0-189-generic-lpae  4.15.0-189.200
  linux-image-4.15.0-189-lowlatency  4.15.0-189.200
  linux-image-aws-lts-18.04   4.15.0.1137.137
  linux-image-azure-lts-18.04 4.15.0.1146.116
  linux-image-gcp-lts-18.04   4.15.0.1131.147
  linux-image-generic 4.15.0.189.174
  linux-image-generic-lpae4.15.0.189.174
  linux-image-kvm 4.15.0.1123.116
  linux-image-lowlatency  4.15.0.189.174
  linux-image-oracle-lts-18.044.15.0.1102.109
  linux-image-raspi2  4.15.0.1115.112
  linux-image-snapdragon  4.15.0.1133.134
  linux-image-virtual 4.15.0.189.174

Ubuntu 16.04 ESM:
  linux-image-4.15.0-1137-aws-hwe  

[USN-5514-1] Linux kernel vulnerabilities

2022-07-13 Thread Steve Beattie
==
Ubuntu Security Notice USN-5514-1
July 13, 2022

linux, linux-aws, linux-azure, linux-azure-5.4, linux-azure-fde,
linux-gke, linux-gkeop, linux-hwe-5.4, linux-ibm, linux-kvm
vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-azure: Linux kernel for Microsoft Azure Cloud systems
- linux-azure-fde: Linux kernel for Microsoft Azure cloud systems
- linux-gke: Linux kernel for Google Container Engine (GKE) systems
- linux-gkeop: Linux kernel for Google Container Engine (GKE) systems
- linux-ibm: Linux kernel for IBM cloud systems
- linux-kvm: Linux kernel for cloud environments
- linux-azure-5.4: Linux kernel for Microsoft Azure cloud systems
- linux-hwe-5.4: Linux hardware enablement (HWE) kernel

Details:

It was discovered that the implementation of the 6pack and mkiss protocols
in the Linux kernel did not handle detach events properly in some
situations, leading to a use-after-free vulnerability. A local attacker
could possibly use this to cause a denial of service (system crash).
(CVE-2022-1195)

Duoming Zhou discovered that the AX.25 amateur radio protocol
implementation in the Linux kernel did not handle detach events properly in
some situations. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2022-1199)

Duoming Zhou discovered race conditions in the AX.25 amateur radio protocol
implementation in the Linux kernel during device detach operations. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2022-1204)

Duoming Zhou discovered race conditions in the AX.25 amateur radio protocol
implementation in the Linux kernel, leading to use-after-free
vulnerabilities. A local attacker could possibly use this to cause a denial
of service (system crash). (CVE-2022-1205)

Yongkang Jia discovered that the KVM hypervisor implementation in the Linux
kernel did not properly handle guest TLB mapping invalidation requests in
some situations. An attacker in a guest VM could use this to cause a denial
of service in the host OS (system crash). (CVE-2022-1789)

Minh Yuan discovered that the floppy driver in the Linux kernel contained a
race condition in some situations, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-33981)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
  linux-image-5.4.0-1029-ibm  5.4.0-1029.33
  linux-image-5.4.0-1049-gkeop5.4.0-1049.52
  linux-image-5.4.0-1071-kvm  5.4.0-1071.76
  linux-image-5.4.0-1078-gke  5.4.0-1078.84
  linux-image-5.4.0-1081-aws  5.4.0-1081.88
  linux-image-5.4.0-1086-azure5.4.0-1086.91
  linux-image-5.4.0-1086-azure-fde  5.4.0-1086.91+cvm1.1
  linux-image-5.4.0-122-generic   5.4.0-122.138
  linux-image-5.4.0-122-generic-lpae  5.4.0-122.138
  linux-image-5.4.0-122-lowlatency  5.4.0-122.138
  linux-image-aws-lts-20.04   5.4.0.1081.81
  linux-image-azure-fde   5.4.0.1086.91+cvm1.27
  linux-image-azure-lts-20.04 5.4.0.1086.83
  linux-image-generic 5.4.0.122.123
  linux-image-generic-lpae5.4.0.122.123
  linux-image-gke 5.4.0.1078.86
  linux-image-gke-5.4 5.4.0.1078.86
  linux-image-gkeop   5.4.0.1049.50
  linux-image-gkeop-5.4   5.4.0.1049.50
  linux-image-ibm 5.4.0.1029.58
  linux-image-ibm-lts-20.04   5.4.0.1029.58
  linux-image-kvm 5.4.0.1071.68
  linux-image-lowlatency  5.4.0.122.123
  linux-image-oem 5.4.0.122.123
  linux-image-oem-osp15.4.0.122.123
  linux-image-virtual 5.4.0.122.123

Ubuntu 18.04 LTS:
  linux-image-5.4.0-1086-azure5.4.0-1086.91~18.04.1
  linux-image-5.4.0-122-generic   5.4.0-122.138~18.04.1
  linux-image-5.4.0-122-generic-lpae  5.4.0-122.138~18.04.1
  linux-image-5.4.0-122-lowlatency  5.4.0-122.138~18.04.1
  linux-image-azure   5.4.0.1086.63
  linux-image-generic-hwe-18.04   5.4.0.122.138~18.04.102
  linux-image-generic-lpae-hwe-18.04  5.4.0.122.138~18.04.102
  linux-image-lowlatency-hwe-18.04  5.4.0.122.138~18.04.102
  linux-image-oem 5.4.0.122.138~18.04.102
  linux-image-oem-osp15.4.0.122.138~18.04.102
  linux-image-snapdragon-hwe-18.04  5.4.0.122.138~18.04.102
  linux-image-virtual-hwe-18.04   5.4.0.122.138~18.04.102

After a standard system update you need to reboot your computer to make
all the necessary changes.


[USN-5513-1] Linux kernel (AWS) vulnerabilities

2022-07-13 Thread Steve Beattie
==
Ubuntu Security Notice USN-5513-1
July 13, 2022

linux-aws vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.04 ESM

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems

Details:

Norbert Slusarek discovered a race condition in the CAN BCM networking
protocol of the Linux kernel leading to multiple use-after-free
vulnerabilities. A local attacker could use this issue to execute arbitrary
code. (CVE-2021-3609)

Likang Luo discovered that a race condition existed in the Bluetooth
subsystem of the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2021-3752)

It was discovered that the NFC subsystem in the Linux kernel contained a
use-after-free vulnerability in its NFC Controller Interface (NCI)
implementation. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2021-3760)

Szymon Heidrich discovered that the USB Gadget subsystem in the Linux
kernel did not properly restrict the size of control requests for certain
gadget types, leading to possible out of bounds reads or writes. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2021-39685)

It was discovered that the Ion Memory Manager subsystem in the Linux kernel
contained a use-after-free vulnerability. A local attacker could possibly
use this to cause a denial of service (system crash) or execute arbitrary
code. (CVE-2021-39714)

Eric Biederman discovered that the cgroup process migration implementation
in the Linux kernel did not perform permission checks correctly in some
situations. A local attacker could possibly use this to gain administrative
privileges. (CVE-2021-4197)

Lin Ma discovered that the NFC Controller Interface (NCI) implementation in
the Linux kernel contained a race condition, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2021-4202)

Sushma Venkatesh Reddy discovered that the Intel i915 graphics driver in
the Linux kernel did not perform a GPU TLB flush in some situations. A
local attacker could use this to cause a denial of service or possibly
execute arbitrary code. (CVE-2022-0330)

It was discovered that the PF_KEYv2 implementation in the Linux kernel did
not properly initialize kernel memory in some situations. A local attacker
could use this to expose sensitive information (kernel memory).
(CVE-2022-1353)

It was discovered that the virtual graphics memory manager implementation
in the Linux kernel was subject to a race condition, potentially leading to
an information leak. (CVE-2022-1419)

Minh Yuan discovered that the floppy disk driver in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2022-1652)

It was discovered that the Atheros ath9k wireless device driver in the
Linux kernel did not properly handle some error conditions, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-1679)

It was discovered that the Marvell NFC device driver implementation in the
Linux kernel did not properly perform memory cleanup operations in some
situations, leading to a use-after-free vulnerability. A local attacker
could possibly use this to cause a denial of service (system) or execute
arbitrary code. (CVE-2022-1734)

It was discovered that some Intel processors did not completely perform
cleanup actions on multi-core shared buffers. A local attacker could
possibly use this to expose sensitive information. (CVE-2022-21123)

It was discovered that some Intel processors did not completely perform
cleanup actions on microarchitectural fill buffers. A local attacker could
possibly use this to expose sensitive information. (CVE-2022-21125)

It was discovered that some Intel processors did not properly perform
cleanup during specific special register write operations. A local attacker
could possibly use this to expose sensitive information. (CVE-2022-21166)

It was discovered that the USB Gadget file system interface in the Linux
kernel contained a use-after-free vulnerability. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2022-24958)

赵子轩 discovered that the 802.2 LLC type 2 driver in the Linux kernel did not
properly perform reference counting in some 

[USN-5505-1] Linux kernel vulnerabilities

2022-07-07 Thread Steve Beattie
==
Ubuntu Security Notice USN-5505-1
July 07, 2022

linux-lts-xenial, linux-kvm vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-kvm: Linux kernel for cloud environments
- linux-lts-xenial: Linux hardware enablement kernel from Xenial for Trusty

Details:

Norbert Slusarek discovered a race condition in the CAN BCM networking
protocol of the Linux kernel leading to multiple use-after-free
vulnerabilities. A local attacker could use this issue to execute arbitrary
code. (CVE-2021-3609)

Likang Luo discovered that a race condition existed in the Bluetooth
subsystem of the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2021-3752)

It was discovered that the NFC subsystem in the Linux kernel contained a
use-after-free vulnerability in its NFC Controller Interface (NCI)
implementation. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2021-3760)

Szymon Heidrich discovered that the USB Gadget subsystem in the Linux
kernel did not properly restrict the size of control requests for certain
gadget types, leading to possible out of bounds reads or writes. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2021-39685)

It was discovered that the Ion Memory Manager subsystem in the Linux kernel
contained a use-after-free vulnerability. A local attacker could possibly
use this to cause a denial of service (system crash) or execute arbitrary
code. (CVE-2021-39714)

Eric Biederman discovered that the cgroup process migration implementation
in the Linux kernel did not perform permission checks correctly in some
situations. A local attacker could possibly use this to gain administrative
privileges. (CVE-2021-4197)

Lin Ma discovered that the NFC Controller Interface (NCI) implementation in
the Linux kernel contained a race condition, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2021-4202)

Sushma Venkatesh Reddy discovered that the Intel i915 graphics driver in
the Linux kernel did not perform a GPU TLB flush in some situations. A
local attacker could use this to cause a denial of service or possibly
execute arbitrary code. (CVE-2022-0330)

It was discovered that the PF_KEYv2 implementation in the Linux kernel did
not properly initialize kernel memory in some situations. A local attacker
could use this to expose sensitive information (kernel memory).
(CVE-2022-1353)

It was discovered that the virtual graphics memory manager implementation
in the Linux kernel was subject to a race condition, potentially leading to
an information leak. (CVE-2022-1419)

Minh Yuan discovered that the floppy disk driver in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2022-1652)

It was discovered that the Atheros ath9k wireless device driver in the
Linux kernel did not properly handle some error conditions, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-1679)

It was discovered that the Marvell NFC device driver implementation in the
Linux kernel did not properly perform memory cleanup operations in some
situations, leading to a use-after-free vulnerability. A local attacker
could possibly use this to cause a denial of service (system) or execute
arbitrary code. (CVE-2022-1734)

It was discovered that some Intel processors did not completely perform
cleanup actions on multi-core shared buffers. A local attacker could
possibly use this to expose sensitive information. (CVE-2022-21123)

It was discovered that some Intel processors did not completely perform
cleanup actions on microarchitectural fill buffers. A local attacker could
possibly use this to expose sensitive information. (CVE-2022-21125)

It was discovered that some Intel processors did not properly perform
cleanup during specific special register write operations. A local attacker
could possibly use this to expose sensitive information. (CVE-2022-21166)

It was discovered that the USB Gadget file system interface in the Linux
kernel contained a use-after-free vulnerability. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2022-24958)

赵子轩 discovered that the 

[USN-5500-1] Linux kernel vulnerabilities

2022-07-01 Thread Steve Beattie
==
Ubuntu Security Notice USN-5500-1
July 01, 2022

linux, linux-aws vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 ESM

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems

Details:

Eric Biederman discovered that the cgroup process migration implementation
in the Linux kernel did not perform permission checks correctly in some
situations. A local attacker could possibly use this to gain administrative
privileges. (CVE-2021-4197)

Lin Ma discovered that the NFC Controller Interface (NCI) implementation in
the Linux kernel contained a race condition, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2021-4202)

It was discovered that the PF_KEYv2 implementation in the Linux kernel did
not properly initialize kernel memory in some situations. A local attacker
could use this to expose sensitive information (kernel memory).
(CVE-2022-1353)

It was discovered that the virtual graphics memory manager implementation
in the Linux kernel was subject to a race condition, potentially leading to
an information leak. (CVE-2022-1419)

Minh Yuan discovered that the floppy disk driver in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2022-1652)

It was discovered that the Atheros ath9k wireless device driver in the
Linux kernel did not properly handle some error conditions, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-1679)

It was discovered that the Marvell NFC device driver implementation in the
Linux kernel did not properly perform memory cleanup operations in some
situations, leading to a use-after-free vulnerability. A local attacker
could possibly use this to cause a denial of service (system) or execute
arbitrary code. (CVE-2022-1734)

赵子轩 discovered that the 802.2 LLC type 2 driver in the Linux kernel did not
properly perform reference counting in some error conditions. A local
attacker could use this to cause a denial of service. (CVE-2022-28356)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 ESM:
  linux-image-4.4.0-1145-aws  4.4.0-1145.160
  linux-image-4.4.0-229-generic   4.4.0-229.263
  linux-image-4.4.0-229-lowlatency  4.4.0-229.263
  linux-image-aws 4.4.0.1145.149
  linux-image-generic 4.4.0.229.235
  linux-image-lowlatency  4.4.0.229.235
  linux-image-virtual 4.4.0.229.235

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
  https://ubuntu.com/security/notices/USN-5500-1
  CVE-2021-4197, CVE-2021-4202, CVE-2022-1353, CVE-2022-1419,
  CVE-2022-1652, CVE-2022-1679, CVE-2022-1734, CVE-2022-28356



signature.asc
Description: PGP signature



[USN-5485-2] Linux kernel (OEM) vulnerabilities

2022-07-01 Thread Steve Beattie
==
Ubuntu Security Notice USN-5485-2
July 01, 2022

linux-oem-5.14 vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS

Summary:

Several security issues were mitigated in the Linux kernel.

Software Description:
- linux-oem-5.14: Linux kernel for OEM systems

Details:

It was discovered that some Intel processors did not completely perform
cleanup actions on multi-core shared buffers. A local attacker could
possibly use this to expose sensitive information. (CVE-2022-21123)

It was discovered that some Intel processors did not completely perform
cleanup actions on microarchitectural fill buffers. A local attacker could
possibly use this to expose sensitive information. (CVE-2022-21125)

It was discovered that some Intel processors did not properly perform
cleanup during specific special register write operations. A local attacker
could possibly use this to expose sensitive information. (CVE-2022-21166)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
  linux-image-5.14.0-1044-oem 5.14.0-1044.49
  linux-image-oem-20.04   5.14.0.1044.40
  linux-image-oem-20.04b  5.14.0.1044.40
  linux-image-oem-20.04c  5.14.0.1044.40
  linux-image-oem-20.04d  5.14.0.1044.40

Please note that fully mitigating processor vulnerabilities requires
corresponding processor microcode/firmware updates.

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
  https://ubuntu.com/security/notices/USN-5485-2
  https://ubuntu.com/security/notices/USN-5485-1
  CVE-2022-21123, CVE-2022-21125, CVE-2022-21166

Package Information:
  https://launchpad.net/ubuntu/+source/linux-oem-5.14/5.14.0-1044.49



signature.asc
Description: PGP signature



[USN-5493-2] Linux kernel (HWE) vulnerability

2022-07-01 Thread Steve Beattie
==
Ubuntu Security Notice USN-5493-2
July 01, 2022

linux-hwe-5.13 vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS

Summary:

The system could be made to crash under certain conditions.

Software Description:
- linux-hwe-5.13: Linux hardware enablement (HWE) kernel

Details:

It was discovered that the 8 Devices USB2CAN interface implementation in
the Linux kernel did not properly handle certain error conditions, leading
to a double-free. A local attacker could possibly use this to cause a
denial of service (system crash).

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
  linux-image-5.13.0-52-generic   5.13.0-52.59~20.04.1
  linux-image-5.13.0-52-generic-64k  5.13.0-52.59~20.04.1
  linux-image-5.13.0-52-generic-lpae  5.13.0-52.59~20.04.1
  linux-image-5.13.0-52-lowlatency  5.13.0-52.59~20.04.1
  linux-image-generic-64k-hwe-20.04  5.13.0.52.59~20.04.31
  linux-image-generic-hwe-20.04   5.13.0.52.59~20.04.31
  linux-image-generic-lpae-hwe-20.04  5.13.0.52.59~20.04.31
  linux-image-lowlatency-hwe-20.04  5.13.0.52.59~20.04.31
  linux-image-virtual-hwe-20.04   5.13.0.52.59~20.04.31

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
  https://ubuntu.com/security/notices/USN-5493-2
  https://ubuntu.com/security/notices/USN-5493-1
  CVE-2022-28388

Package Information:
  https://launchpad.net/ubuntu/+source/linux-hwe-5.13/5.13.0-52.59~20.04.1



signature.asc
Description: PGP signature



[USN-5496-1] cloud-init vulnerability

2022-06-29 Thread Steve Beattie
==
Ubuntu Security Notice USN-5496-1
June 29, 2022

cloud-init vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS
- Ubuntu 21.10
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

cloud-init could be made to expose sensitive information.

Software Description:
- cloud-init: initialization and customization tool for cloud instances

Details:

Mike Stroyan discovered that cloud-init could log password hashes when
reporting schema failures. An attacker with access to these logs could
potentially use this to gain user credentials.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS:
  cloud-init  22.2-0ubuntu1~22.04.3

Ubuntu 21.10:
  cloud-init  22.2-0ubuntu1~21.10.3

Ubuntu 20.04 LTS:
  cloud-init  22.2-0ubuntu1~20.04.3

Ubuntu 18.04 LTS:
  cloud-init  22.2-0ubuntu1~18.04.3

In general, a standard system update will make the necessary changes.
Please note that sensitive information may have been logged to remote
logging aggregators as well as to the system journal, and removal of
such information may be required. Similarly, cloud-init configurations
that log in non-default locations may also require the removal of
sensitive information.

References:
  https://ubuntu.com/security/notices/USN-5496-1
  CVE-2022-2084

Package Information:
  https://launchpad.net/ubuntu/+source/cloud-init/22.2-0ubuntu1~22.04.3
  https://launchpad.net/ubuntu/+source/cloud-init/22.2-0ubuntu1~21.10.3
  https://launchpad.net/ubuntu/+source/cloud-init/22.2-0ubuntu1~20.04.3
  https://launchpad.net/ubuntu/+source/cloud-init/22.2-0ubuntu1~18.04.3



signature.asc
Description: PGP signature



[USN-5493-1] Linux kernel vulnerability

2022-06-26 Thread Steve Beattie
==
Ubuntu Security Notice USN-5493-1
June 27, 2022

linux, linux-hwe vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 21.10
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 ESM

Summary:

The system could be made to crash under certain conditions.

Software Description:
- linux: Linux kernel
- linux-hwe: Linux hardware enablement (HWE) kernel

Details:

It was discovered that the 8 Devices USB2CAN interface implementation in
the Linux kernel did not properly handle certain error conditions, leading
to a double-free. A local attacker could possibly use this to cause a
denial of service (system crash).

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 21.10:
  linux-image-5.13.0-52-generic   5.13.0-52.59
  linux-image-5.13.0-52-generic-64k  5.13.0-52.59
  linux-image-5.13.0-52-generic-lpae  5.13.0-52.59
  linux-image-5.13.0-52-lowlatency  5.13.0-52.59
  linux-image-generic 5.13.0.52.58
  linux-image-generic-64k 5.13.0.52.58
  linux-image-generic-lpae5.13.0.52.58
  linux-image-lowlatency  5.13.0.52.58
  linux-image-oem-20.04   5.13.0.52.58
  linux-image-virtual 5.13.0.52.58

Ubuntu 20.04 LTS:
  linux-image-5.4.0-121-generic   5.4.0-121.137
  linux-image-5.4.0-121-generic-lpae  5.4.0-121.137
  linux-image-5.4.0-121-lowlatency  5.4.0-121.137
  linux-image-generic 5.4.0.121.122
  linux-image-generic-lpae5.4.0.121.122
  linux-image-lowlatency  5.4.0.121.122
  linux-image-oem 5.4.0.121.122
  linux-image-oem-osp15.4.0.121.122
  linux-image-virtual 5.4.0.121.122

Ubuntu 18.04 LTS:
  linux-image-4.15.0-188-generic  4.15.0-188.199
  linux-image-4.15.0-188-generic-lpae  4.15.0-188.199
  linux-image-4.15.0-188-lowlatency  4.15.0-188.199
  linux-image-generic 4.15.0.188.173
  linux-image-generic-lpae4.15.0.188.173
  linux-image-lowlatency  4.15.0.188.173
  linux-image-virtual 4.15.0.188.173

Ubuntu 16.04 ESM:
  linux-image-4.15.0-188-generic  4.15.0-188.199~16.04.1
  linux-image-4.15.0-188-lowlatency  4.15.0-188.199~16.04.1
  linux-image-generic-hwe-16.04   4.15.0.188.175
  linux-image-lowlatency-hwe-16.04  4.15.0.188.175
  linux-image-oem 4.15.0.188.175
  linux-image-virtual-hwe-16.04   4.15.0.188.175

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
  https://ubuntu.com/security/notices/USN-5493-1
  CVE-2022-28388

Package Information:
  https://launchpad.net/ubuntu/+source/linux/5.13.0-52.59
  https://launchpad.net/ubuntu/+source/linux/5.4.0-121.137
  https://launchpad.net/ubuntu/+source/linux/4.15.0-188.199



signature.asc
Description: PGP signature



[USN-5484-1] Linux kernel vulnerabilities

2022-06-16 Thread Steve Beattie
==
Ubuntu Security Notice USN-5484-1
June 16, 2022

linux vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.04 ESM

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux: Linux kernel

Details:

It was discovered that the Linux kernel did not properly restrict access to
the kernel debugger when booted in secure boot environments. A privileged
attacker could use this to bypass UEFI Secure Boot restrictions.
(CVE-2022-21499)

It was discovered that a race condition existed in the network scheduling
subsystem of the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2021-39713)

It was discovered that some Intel processors did not completely perform
cleanup actions on multi-core shared buffers. A local attacker could
possibly use this to expose sensitive information. (CVE-2022-21123)

It was discovered that some Intel processors did not completely perform
cleanup actions on microarchitectural fill buffers. A local attacker could
possibly use this to expose sensitive information. (CVE-2022-21125)

It was discovered that some Intel processors did not properly perform
cleanup during specific special register write operations. A local attacker
could possibly use this to expose sensitive information. (CVE-2022-21166)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 ESM:
  linux-image-3.13.0-190-generic  3.13.0-190.241
  linux-image-3.13.0-190-lowlatency  3.13.0-190.241
  linux-image-generic 3.13.0.190.199
  linux-image-lowlatency  3.13.0.190.199
  linux-image-server  3.13.0.190.199
  linux-image-virtual 3.13.0.190.199

Please note that fully mitigating processor vulnerabilities requires
corresponding processor microcode/firmware updates.

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
  https://ubuntu.com/security/notices/USN-5484-1
  CVE-2021-39713, CVE-2022-21123, CVE-2022-21125, CVE-2022-21166,
  CVE-2022-21499



signature.asc
Description: PGP signature



[USN-5485-1] Linux kernel vulnerabilities

2022-06-16 Thread Steve Beattie
==
Ubuntu Security Notice USN-5485-1
June 17, 2022

linux, linux-aws, linux-aws-hwe, linux-aws-5.13, linux-aws-5.4,
linux-azure, linux-azure-4.15, linux-azure-5.13, linux-azure-5.4,
linux-azure-fde, linux-dell300x, linux-gcp, linux-gcp-4.15,
linux-gcp-5.13, linux-gcp-5.4, linux-gke, linux-gke-5.4, linux-gkeop,
linux-gkeop-5.4, linux-hwe, linux-hwe-5.13, linux-hwe-5.4, linux-ibm,
linux-ibm-5.4, linux-intel-5.13, linux-intel-iotg, linux-kvm,
linux-lowlatency, linux-oracle, linux-oracle-5.13, linux-oracle-5.4
vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS
- Ubuntu 21.10
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM

Summary:

Several security issues were addressed in the Linux kernel.

Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-azure: Linux kernel for Microsoft Azure Cloud systems
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-gke: Linux kernel for Google Container Engine (GKE) systems
- linux-ibm: Linux kernel for IBM cloud systems
- linux-intel-iotg: Linux kernel for Intel IoT platforms
- linux-kvm: Linux kernel for cloud environments
- linux-lowlatency: Linux low latency kernel
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-aws-5.13: Linux kernel for Amazon Web Services (AWS) systems
- linux-azure-5.13: Linux kernel for Microsoft Azure cloud systems
- linux-azure-fde: Linux kernel for Microsoft Azure cloud systems
- linux-gcp-5.13: Linux kernel for Google Cloud Platform (GCP) systems
- linux-gkeop: Linux kernel for Google Container Engine (GKE) systems
- linux-hwe-5.13: Linux hardware enablement (HWE) kernel
- linux-intel-5.13: Linux kernel for Intel IOTG
- linux-oracle-5.13: Linux kernel for Oracle Cloud systems
- linux-aws-5.4: Linux kernel for Amazon Web Services (AWS) systems
- linux-azure-4.15: Linux kernel for Microsoft Azure Cloud systems
- linux-azure-5.4: Linux kernel for Microsoft Azure cloud systems
- linux-dell300x: Linux kernel for Dell 300x platforms
- linux-gcp-4.15: Linux kernel for Google Cloud Platform (GCP) systems
- linux-gcp-5.4: Linux kernel for Google Cloud Platform (GCP) systems
- linux-gke-5.4: Linux kernel for Google Container Engine (GKE) systems
- linux-gkeop-5.4: Linux kernel for Google Container Engine (GKE) systems
- linux-hwe-5.4: Linux hardware enablement (HWE) kernel
- linux-ibm-5.4: Linux kernel for IBM cloud systems
- linux-oracle-5.4: Linux kernel for Oracle Cloud systems
- linux-aws-hwe: Linux kernel for Amazon Web Services (AWS-HWE) systems
- linux-hwe: Linux hardware enablement (HWE) kernel

Details:

It was discovered that some Intel processors did not completely perform
cleanup actions on multi-core shared buffers. A local attacker could
possibly use this to expose sensitive information. (CVE-2022-21123)

It was discovered that some Intel processors did not completely perform
cleanup actions on microarchitectural fill buffers. A local attacker could
possibly use this to expose sensitive information. (CVE-2022-21125)

It was discovered that some Intel processors did not properly perform
cleanup during specific special register write operations. A local attacker
could possibly use this to expose sensitive information. (CVE-2022-21166)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS:
  linux-image-5.15.0-1009-ibm 5.15.0-1009.11
  linux-image-5.15.0-1010-gcp 5.15.0-1010.15
  linux-image-5.15.0-1010-gke 5.15.0-1010.13
  linux-image-5.15.0-1010-intel-iotg  5.15.0-1010.14
  linux-image-5.15.0-1011-oracle  5.15.0-1011.15
  linux-image-5.15.0-1012-azure   5.15.0-1012.15
  linux-image-5.15.0-1012-kvm 5.15.0-1012.14
  linux-image-5.15.0-1013-aws 5.15.0-1013.17
  linux-image-5.15.0-39-generic   5.15.0-39.42
  linux-image-5.15.0-39-generic-64k  5.15.0-39.42
  linux-image-5.15.0-39-generic-lpae  5.15.0-39.42
  linux-image-5.15.0-39-lowlatency  5.15.0-39.42
  linux-image-5.15.0-39-lowlatency-64k  5.15.0-39.42
  linux-image-aws 5.15.0.1013.13
  linux-image-azure   5.15.0.1012.11
  linux-image-gcp 5.15.0.1010.9
  linux-image-generic 5.15.0.39.40
  linux-image-generic-hwe-22.04   5.15.0.39.40
  linux-image-generic-lpae5.15.0.39.40
  linux-image-generic-lpae-hwe-22.04  5.15.0.39.40
  linux-image-gke 5.15.0.1010.13
  linux-image-gke-5.155.15.0.1010.13
  linux-image-ibm 5.15.0.1009.8
  linux-image-intel-iotg  5.15.0.1010.10
  linux-image-kvm 5.15.0.1012.10
  linux-image-lowlatency  5.15.0.39.38
  linux-image-lowlatency-hwe-22.04  5.15.0.39.38
  linux-image-oem-20.04   5.15.0.39.40
  

[USN-5469-1] Linux kernel vulnerabilities

2022-06-08 Thread Steve Beattie
==
Ubuntu Security Notice USN-5469-1
June 08, 2022

linux, linux-aws, linux-azure, linux-gcp, linux-gke, linux-ibm,
linux-intel-iotg, linux-kvm, linux-lowlatency, linux-oracle, linux-raspi
vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-azure: Linux kernel for Microsoft Azure Cloud systems
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-gke: Linux kernel for Google Container Engine (GKE) systems
- linux-ibm: Linux kernel for IBM cloud systems
- linux-intel-iotg: Linux kernel for Intel IoT platforms
- linux-kvm: Linux kernel for cloud environments
- linux-lowlatency: Linux low latency kernel
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-raspi: Linux kernel for Raspberry Pi systems

Details:

It was discovered that the Linux kernel did not properly restrict access to
the kernel debugger when booted in secure boot environments. A privileged
attacker could use this to bypass UEFI Secure Boot restrictions.
(CVE-2022-21499)

Aaron Adams discovered that the netfilter subsystem in the Linux kernel did
not properly handle the removal of stateful expressions in some situations,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-1966)

Billy Jheng Bing Jhong discovered that the CIFS network file system
implementation in the Linux kernel did not properly validate arguments to
ioctl() in some situations. A local attacker could possibly use this to
cause a denial of service (system crash). (CVE-2022-0168)

Hu Jiahui discovered that multiple race conditions existed in the Advanced
Linux Sound Architecture (ALSA) framework, leading to use-after-free
vulnerabilities. A local attacker could use these to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2022-1048)

Qiuhao Li, Gaoning Pan and Yongkang Jia discovered that the KVM
implementation in the Linux kernel did not properly perform guest page
table updates in some situations. An attacker in a guest vm could possibly
use this to crash the host OS. (CVE-2022-1158)

It was discovered that the implementation of the 6pack and mkiss protocols
in the Linux kernel did not handle detach events properly in some
situations, leading to a use-after-free vulnerability. A local attacker
could possibly use this to cause a denial of service (system crash).
(CVE-2022-1195)

Duoming Zhou discovered that the 6pack protocol implementation in the Linux
kernel did not handle detach events properly in some situations, leading to
a use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash). (CVE-2022-1198)

Duoming Zhou discovered that the AX.25 amateur radio protocol
implementation in the Linux kernel did not handle detach events properly in
some situations. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2022-1199)

Duoming Zhou discovered race conditions in the AX.25 amateur radio protocol
implementation in the Linux kernel during device detach operations. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2022-1204)

Duoming Zhou discovered race conditions in the AX.25 amateur radio protocol
implementation in the Linux kernel, leading to use-after-free
vulnerabilities. A local attacker could possibly use this to cause a denial
of service (system crash). (CVE-2022-1205)

Qiuhao Li, Gaoning Pan, and Yongkang Jia discovered that the kvm
implementation in the Linux kernel did not handle releasing a virtual cpu
properly. A local attacker in a guest VM coud possibly use this to cause a
denial of service (host system crash). (CVE-2022-1263)

It was discovered that the PF_KEYv2 implementation in the Linux kernel did
not properly initialize kernel memory in some situations. A local attacker
could use this to expose sensitive information (kernel memory).
(CVE-2022-1353)

It was discovered that the implementation of X.25 network protocols in the
Linux kernel did not terminate link layer sessions properly. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2022-1516)

It was discovered that the ACRN Hypervisor Service Module implementation in
the Linux kernel did not properly deallocate memory in some situations. A
local privileged attacker could possibly use this to cause a denial of
service (memory exhaustion). (CVE-2022-1651)

It was discovered that the RxRPC session socket implementation in the Linux
kernel did not properly handle ioctls called 

[USN-5471-1] Linux kernel (OEM) vulnerabilities

2022-06-08 Thread Steve Beattie
==
Ubuntu Security Notice USN-5471-1
June 08, 2022

linux-oem-5.17 vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-oem-5.17: Linux kernel for OEM systems

Details:

It was discovered that the Linux kernel did not properly restrict access to
the kernel debugger when booted in secure boot environments. A privileged
attacker could use this to bypass UEFI Secure Boot restrictions.
(CVE-2022-21499)

Aaron Adams discovered that the netfilter subsystem in the Linux kernel did
not properly handle the removal of stateful expressions in some situations,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-1966)

It was discovered that the IP implementation in the Linux kernel did not
provide sufficient randomization when calculating port offsets. An attacker
could possibly use this to expose sensitive information. (CVE-2022-1012)

Duoming Zhou discovered race conditions in the AX.25 amateur radio protocol
implementation in the Linux kernel, leading to use-after-free
vulnerabilities. A local attacker could possibly use this to cause a denial
of service (system crash). (CVE-2022-1205)

It was discovered that the Marvell NFC device driver implementation in the
Linux kernel did not properly perform memory cleanup operations in some
situations, leading to a use-after-free vulnerability. A local attacker
could possibly use this to cause a denial of service (system) or execute
arbitrary code. (CVE-2022-1734)

Minh Yuan discovered that the floppy driver in the Linux kernel contained a
race condition in some situations, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-1836)

Ziming Zhang discovered that the netfilter subsystem in the Linux kernel
did not properly validate sets with multiple ranged fields. A local
attacker could use this to cause a denial of service or execute arbitrary
code. (CVE-2022-1972)

Joseph Ravichandran and Michael Wang discovered that the io_uring subsystem
in the Linux kernel did not properly initialize data in some situations. A
local attacker could use this to expose sensitive information (kernel
memory). (CVE-2022-29968)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS:
  linux-image-5.17.0-1011-oem 5.17.0-1011.12
  linux-image-oem-22.04   5.17.0.1011.10
  linux-image-oem-22.04a  5.17.0.1011.10

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
  https://ubuntu.com/security/notices/USN-5471-1
  CVE-2022-1012, CVE-2022-1205, CVE-2022-1734, CVE-2022-1836,
  CVE-2022-1966, CVE-2022-1972, CVE-2022-21499, CVE-2022-29968

Package Information:
  https://launchpad.net/ubuntu/+source/linux-oem-5.17/5.17.0-1011.12



signature.asc
Description: PGP signature



[USN-5470-1] Linux kernel (OEM) vulnerabilities

2022-06-08 Thread Steve Beattie
==
Ubuntu Security Notice USN-5470-1
June 08, 2022

linux-oem-5.14 vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-oem-5.14: Linux kernel for OEM systems

Details:

It was discovered that the Linux kernel did not properly restrict access to
the kernel debugger when booted in secure boot environments. A privileged
attacker could use this to bypass UEFI Secure Boot restrictions.
(CVE-2022-21499)

Aaron Adams discovered that the netfilter subsystem in the Linux kernel did
not properly handle the removal of stateful expressions in some situations,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-1966)

Minh Yuan discovered that the floppy driver in the Linux kernel contained a
race condition in some situations, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-1836)

Ziming Zhang discovered that the netfilter subsystem in the Linux kernel
did not properly validate sets with multiple ranged fields. A local
attacker could use this to cause a denial of service or execute arbitrary
code. (CVE-2022-1972)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
  linux-image-5.14.0-1042-oem 5.14.0-1042.47
  linux-image-oem-20.04   5.14.0.1042.38
  linux-image-oem-20.04b  5.14.0.1042.38
  linux-image-oem-20.04c  5.14.0.1042.38
  linux-image-oem-20.04d  5.14.0.1042.38

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
  https://ubuntu.com/security/notices/USN-5470-1
  CVE-2022-1836, CVE-2022-1966, CVE-2022-1972, CVE-2022-21499

Package Information:
  https://launchpad.net/ubuntu/+source/linux-oem-5.14/5.14.0-1042.47



signature.asc
Description: PGP signature



[USN-5468-1] Linux kernel vulnerabilities

2022-06-07 Thread Steve Beattie
==
Ubuntu Security Notice USN-5468-1
June 08, 2022

linux, linux-aws, linux-aws-5.13, linux-azure, linux-azure-5.13,
linux-gcp, linux-gcp-5.13, linux-hwe-5.13, linux-intel-5.13, linux-kvm,
linux-oracle, linux-oracle-5.13, linux-raspi vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 21.10
- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-azure: Linux kernel for Microsoft Azure Cloud systems
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-kvm: Linux kernel for cloud environments
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-raspi: Linux kernel for Raspberry Pi systems
- linux-aws-5.13: Linux kernel for Amazon Web Services (AWS) systems
- linux-azure-5.13: Linux kernel for Microsoft Azure cloud systems
- linux-gcp-5.13: Linux kernel for Google Cloud Platform (GCP) systems
- linux-hwe-5.13: Linux hardware enablement (HWE) kernel
- linux-intel-5.13: Linux kernel for Intel IOTG
- linux-oracle-5.13: Linux kernel for Oracle Cloud systems

Details:

It was discovered that the Linux kernel did not properly restrict access to
the kernel debugger when booted in secure boot environments. A privileged
attacker could use this to bypass UEFI Secure Boot restrictions.
(CVE-2022-21499)

Aaron Adams discovered that the netfilter subsystem in the Linux kernel did
not properly handle the removal of stateful expressions in some situations,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-1966)

Qiuhao Li, Gaoning Pan and Yongkang Jia discovered that the KVM
implementation in the Linux kernel did not properly perform guest page
table updates in some situations. An attacker in a guest vm could possibly
use this to crash the host OS. (CVE-2022-1158)

Ziming Zhang discovered that the netfilter subsystem in the Linux kernel
did not properly validate sets with multiple ranged fields. A local
attacker could use this to cause a denial of service or execute arbitrary
code. (CVE-2022-1972)

It was discovered that the USB Gadget file system interface in the Linux
kernel contained a use-after-free vulnerability. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2022-24958)

It was discovered that the EMS CAN/USB interface implementation in the
Linux kernel contained a double-free vulnerability when handling certain
error conditions. A local attacker could use this to cause a denial of
service (memory exhaustion). (CVE-2022-28390)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 21.10:
  linux-image-5.13.0-1027-kvm 5.13.0-1027.29
  linux-image-5.13.0-1028-aws 5.13.0-1028.31
  linux-image-5.13.0-1028-azure   5.13.0-1028.33
  linux-image-5.13.0-1030-gcp 5.13.0-1030.36
  linux-image-5.13.0-1031-raspi   5.13.0-1031.34
  linux-image-5.13.0-1031-raspi-nolpae  5.13.0-1031.34
  linux-image-5.13.0-1033-oracle  5.13.0-1033.39
  linux-image-5.13.0-48-generic   5.13.0-48.54
  linux-image-5.13.0-48-generic-64k  5.13.0-48.54
  linux-image-5.13.0-48-generic-lpae  5.13.0-48.54
  linux-image-5.13.0-48-lowlatency  5.13.0-48.54
  linux-image-aws 5.13.0.1028.28
  linux-image-azure   5.13.0.1028.27
  linux-image-gcp 5.13.0.1030.27
  linux-image-generic 5.13.0.48.56
  linux-image-generic-64k 5.13.0.48.56
  linux-image-generic-lpae5.13.0.48.56
  linux-image-gke 5.13.0.1030.27
  linux-image-kvm 5.13.0.1027.26
  linux-image-lowlatency  5.13.0.48.56
  linux-image-oem-20.04   5.13.0.48.56
  linux-image-oracle  5.13.0.1033.32
  linux-image-raspi   5.13.0.1031.35
  linux-image-raspi-nolpae5.13.0.1031.35
  linux-image-virtual 5.13.0.48.56

Ubuntu 20.04 LTS:
  linux-image-5.13.0-1014-intel   5.13.0-1014.15
  linux-image-5.13.0-1028-aws 5.13.0-1028.31~20.04.1
  linux-image-5.13.0-1028-azure   5.13.0-1028.33~20.04.1
  linux-image-5.13.0-1030-gcp 5.13.0-1030.36~20.04.1
  linux-image-5.13.0-1033-oracle  5.13.0-1033.39~20.04.1
  linux-image-5.13.0-48-generic   5.13.0-48.54~20.04.1
  linux-image-5.13.0-48-generic-64k  5.13.0-48.54~20.04.1
  linux-image-5.13.0-48-generic-lpae  5.13.0-48.54~20.04.1
  linux-image-5.13.0-48-lowlatency  5.13.0-48.54~20.04.1
  linux-image-aws 5.13.0.1028.31~20.04.22
  linux-image-azure   5.13.0.1028.33~20.04.17
  linux-image-gcp 5.13.0.1030.36~20.04.1
  linux-image-generic-64k-hwe-20.04  

[USN-5466-1] Linux kernel vulnerabilities

2022-06-07 Thread Steve Beattie
==
Ubuntu Security Notice USN-5466-1
June 08, 2022

linux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15, linux-gcp,
linux-hwe, linux-kvm, linux-oracle, linux-raspi2, linux-snapdragon
vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS
- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-azure-4.15: Linux kernel for Microsoft Azure Cloud systems
- linux-kvm: Linux kernel for cloud environments
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-raspi2: Linux kernel for Raspberry Pi systems
- linux-snapdragon: Linux kernel for Qualcomm Snapdragon processors
- linux-aws-hwe: Linux kernel for Amazon Web Services (AWS-HWE) systems
- linux-azure: Linux kernel for Microsoft Azure Cloud systems
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-hwe: Linux hardware enablement (HWE) kernel

Details:

It was discovered that the Linux kernel did not properly restrict access to
the kernel debugger when booted in secure boot environments. A privileged
attacker could use this to bypass UEFI Secure Boot restrictions.
(CVE-2022-21499)

Aaron Adams discovered that the netfilter subsystem in the Linux kernel did
not properly handle the removal of stateful expressions in some situations,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-1966)

It was discovered that the SCTP protocol implementation in the Linux kernel
did not properly verify VTAGs in some situations. A remote attacker could
possibly use this to cause a denial of service (connection disassociation).
(CVE-2021-3772)

It was discovered that the btrfs file system implementation in the Linux
kernel did not properly handle locking in certain error conditions. A local
attacker could use this to cause a denial of service (kernel deadlock).
(CVE-2021-4149)

David Bouman discovered that the netfilter subsystem in the Linux kernel
did not initialize memory in some situations. A local attacker could use
this to expose sensitive information (kernel memory). (CVE-2022-1016)

It was discovered that the virtual graphics memory manager implementation
in the Linux kernel was subject to a race condition, potentially leading to
an information leak. (CVE-2022-1419)

赵子轩 discovered that the 802.2 LLC type 2 driver in the Linux kernel did not
properly perform reference counting in some error conditions. A local
attacker could use this to cause a denial of service. (CVE-2022-28356)

It was discovered that the EMS CAN/USB interface implementation in the
Linux kernel contained a double-free vulnerability when handling certain
error conditions. A local attacker could use this to cause a denial of
service (memory exhaustion). (CVE-2022-28390)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
  linux-image-4.15.0-1098-oracle  4.15.0-1098.108
  linux-image-4.15.0-1114-raspi2  4.15.0-1114.122
  linux-image-4.15.0-1119-kvm 4.15.0-1119.123
  linux-image-4.15.0-1132-snapdragon  4.15.0-1132.142
  linux-image-4.15.0-1133-aws 4.15.0-1133.143
  linux-image-4.15.0-1142-azure   4.15.0-1142.156
  linux-image-4.15.0-184-generic  4.15.0-184.194
  linux-image-4.15.0-184-generic-lpae  4.15.0-184.194
  linux-image-4.15.0-184-lowlatency  4.15.0-184.194
  linux-image-aws-lts-18.04   4.15.0.1133.135
  linux-image-azure-lts-18.04 4.15.0.1142.114
  linux-image-generic 4.15.0.184.172
  linux-image-generic-lpae4.15.0.184.172
  linux-image-kvm 4.15.0.1119.114
  linux-image-lowlatency  4.15.0.184.172
  linux-image-oracle-lts-18.044.15.0.1098.107
  linux-image-raspi2  4.15.0.1114.111
  linux-image-snapdragon  4.15.0.1132.133
  linux-image-virtual 4.15.0.184.172

Ubuntu 16.04 ESM:
  linux-image-4.15.0-1098-oracle  4.15.0-1098.108~16.04.1
  linux-image-4.15.0-1127-gcp 4.15.0-1127.142~16.04.1
  linux-image-4.15.0-1133-aws-hwe  4.15.0-1133.143~16.04.1
  linux-image-4.15.0-1142-azure   4.15.0-1142.156~16.04.1
  linux-image-4.15.0-184-generic  4.15.0-184.194~16.04.1
  linux-image-4.15.0-184-lowlatency  4.15.0-184.194~16.04.1
  linux-image-aws-hwe 4.15.0.1133.122
  linux-image-azure   4.15.0.1142.131
  linux-image-gcp 4.15.0.1127.126
  linux-image-generic-hwe-16.04   4.15.0.184.173
  linux-image-gke 4.15.0.1127.126
  linux-image-lowlatency-hwe-16.04  4.15.0.184.173
  linux-image-oem 4.15.0.184.173
  linux-image-oracle  4.15.0.1098.85
  

[USN-5467-1] Linux kernel vulnerabilities

2022-06-07 Thread Steve Beattie
==
Ubuntu Security Notice USN-5467-1
June 08, 2022

linux, linux-aws, linux-aws-5.4, linux-azure, linux-azure-5.4,
linux-azure-fde, linux-gcp, linux-gke, linux-gke-5.4, linux-gkeop,
linux-gkeop-5.4, linux-hwe-5.4, linux-ibm, linux-ibm-5.4, linux-kvm,
linux-oracle, linux-oracle-5.4, linux-raspi, linux-raspi-5.4
vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-azure: Linux kernel for Microsoft Azure Cloud systems
- linux-azure-fde: Linux kernel for Microsoft Azure cloud systems
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-gke: Linux kernel for Google Container Engine (GKE) systems
- linux-gkeop: Linux kernel for Google Container Engine (GKE) systems
- linux-ibm: Linux kernel for IBM cloud systems
- linux-kvm: Linux kernel for cloud environments
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-raspi: Linux kernel for Raspberry Pi systems
- linux-aws-5.4: Linux kernel for Amazon Web Services (AWS) systems
- linux-azure-5.4: Linux kernel for Microsoft Azure cloud systems
- linux-gke-5.4: Linux kernel for Google Container Engine (GKE) systems
- linux-gkeop-5.4: Linux kernel for Google Container Engine (GKE) systems
- linux-hwe-5.4: Linux hardware enablement (HWE) kernel
- linux-ibm-5.4: Linux kernel for IBM cloud systems
- linux-oracle-5.4: Linux kernel for Oracle Cloud systems
- linux-raspi-5.4: Linux kernel for Raspberry Pi systems

Details:

It was discovered that the Linux kernel did not properly restrict access to
the kernel debugger when booted in secure boot environments. A privileged
attacker could use this to bypass UEFI Secure Boot restrictions.
(CVE-2022-21499)

Aaron Adams discovered that the netfilter subsystem in the Linux kernel did
not properly handle the removal of stateful expressions in some situations,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-1966)

It was discovered that the SCTP protocol implementation in the Linux kernel
did not properly verify VTAGs in some situations. A remote attacker could
possibly use this to cause a denial of service (connection disassociation).
(CVE-2021-3772)

Eric Biederman discovered that the cgroup process migration implementation
in the Linux kernel did not perform permission checks correctly in some
situations. A local attacker could possibly use this to gain administrative
privileges. (CVE-2021-4197)

Jann Horn discovered that the FUSE file system in the Linux kernel
contained a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-1011)

Qiuhao Li, Gaoning Pan and Yongkang Jia discovered that the KVM
implementation in the Linux kernel did not properly perform guest page
table updates in some situations. An attacker in a guest vm could possibly
use this to crash the host OS. (CVE-2022-1158)

Duoming Zhou discovered that the 6pack protocol implementation in the Linux
kernel did not handle detach events properly in some situations, leading to
a use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash). (CVE-2022-1198)

It was discovered that the PF_KEYv2 implementation in the Linux kernel did
not properly initialize kernel memory in some situations. A local attacker
could use this to expose sensitive information (kernel memory).
(CVE-2022-1353)

It was discovered that the implementation of X.25 network protocols in the
Linux kernel did not terminate link layer sessions properly. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2022-1516)

Demi Marie Obenour and Simon Gaiser discovered that several Xen para-
virtualization device frontends did not properly restrict the access rights
of device backends. An attacker could possibly use a malicious Xen backend
to gain access to memory pages of a guest VM or cause a denial of service
in the guest. (CVE-2022-23036, CVE-2022-23037, CVE-2022-23038,
CVE-2022-23039, CVE-2022-23040, CVE-2022-23041, CVE-2022-23042)

It was discovered that the USB Gadget file system interface in the Linux
kernel contained a use-after-free vulnerability. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2022-24958)

It was discovered that the USB SR9700 ethernet device driver for the Linux
kernel did not properly validate the length of requests from the device. A
physically proximate attacker could possibly use this to expose sensitive

[USN-5465-1] Linux kernel vulnerabilities

2022-06-07 Thread Steve Beattie
==
Ubuntu Security Notice USN-5465-1
June 08, 2022

linux, linux-aws, linux-kvm, linux-lts-xenial vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-kvm: Linux kernel for cloud environments
- linux-lts-xenial: Linux hardware enablement kernel from Xenial for Trusty

Details:

It was discovered that the Linux kernel did not properly restrict access to
the kernel debugger when booted in secure boot environments. A privileged
attacker could use this to bypass UEFI Secure Boot restrictions.
(CVE-2022-21499)

Aaron Adams discovered that the netfilter subsystem in the Linux kernel did
not properly handle the removal of stateful expressions in some situations,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-1966)

Jann Horn discovered that the Linux kernel did not properly enforce seccomp
restrictions in some situations. A local attacker could use this to bypass
intended seccomp sandbox restrictions. (CVE-2022-30594)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 ESM:
  linux-image-4.4.0-1108-kvm  4.4.0-1108.118
  linux-image-4.4.0-1143-aws  4.4.0-1143.158
  linux-image-4.4.0-227-generic   4.4.0-227.261
  linux-image-4.4.0-227-lowlatency  4.4.0-227.261
  linux-image-aws 4.4.0.1143.147
  linux-image-generic 4.4.0.227.233
  linux-image-kvm 4.4.0.1108.105
  linux-image-lowlatency  4.4.0.227.233
  linux-image-virtual 4.4.0.227.233

Ubuntu 14.04 ESM:
  linux-image-4.4.0-1107-aws  4.4.0-1107.113
  linux-image-4.4.0-227-generic   4.4.0-227.261~14.04.1
  linux-image-4.4.0-227-lowlatency  4.4.0-227.261~14.04.1
  linux-image-aws 4.4.0.1107.104
  linux-image-generic-lts-xenial  4.4.0.227.197
  linux-image-lowlatency-lts-xenial  4.4.0.227.197
  linux-image-virtual-lts-xenial  4.4.0.227.197

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
  https://ubuntu.com/security/notices/USN-5465-1
  CVE-2022-1966, CVE-2022-21499, CVE-2022-30594



signature.asc
Description: PGP signature



[USN-5442-2] Linux kernel vulnerabilities

2022-05-31 Thread Steve Beattie
==
Ubuntu Security Notice USN-5442-2
June 01, 2022

linux-gcp-5.4, linux-gkeop, linux-gkeop-5.4, linux-ibm-5.4, linux-oracle,
linux-oracle-5.4, linux-raspi, linux-raspi-5.4 vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-gkeop: Linux kernel for Google Container Engine (GKE) systems
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-raspi: Linux kernel for Raspberry Pi systems
- linux-gcp-5.4: Linux kernel for Google Cloud Platform (GCP) systems
- linux-gkeop-5.4: Linux kernel for Google Container Engine (GKE) systems
- linux-ibm-5.4: Linux kernel for IBM cloud systems
- linux-oracle-5.4: Linux kernel for Oracle Cloud systems
- linux-raspi-5.4: Linux kernel for Raspberry Pi systems

Details:

Kyle Zeng discovered that the Network Queuing and Scheduling subsystem of
the Linux kernel did not properly perform reference counting in some
situations, leading to a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or execute
arbitrary code. (CVE-2022-29581)

Bing-Jhong Billy Jheng discovered that the io_uring subsystem in the Linux
kernel contained in integer overflow. A local attacker could use this to
cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-1116)

Jann Horn discovered that the Linux kernel did not properly enforce seccomp
restrictions in some situations. A local attacker could use this to bypass
intended seccomp sandbox restrictions. (CVE-2022-30594)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
  linux-image-5.4.0-1043-gkeop5.4.0-1043.44
  linux-image-5.4.0-1062-raspi5.4.0-1062.70
  linux-image-5.4.0-1073-oracle   5.4.0-1073.79
  linux-image-gkeop   5.4.0.1043.46
  linux-image-gkeop-5.4   5.4.0.1043.46
  linux-image-oracle-lts-20.045.4.0.1073.73
  linux-image-raspi   5.4.0.1062.96
  linux-image-raspi2  5.4.0.1062.96

Ubuntu 18.04 LTS:
  linux-image-5.4.0-1023-ibm  5.4.0-1023.25~18.04.1
  linux-image-5.4.0-1043-gkeop5.4.0-1043.44~18.04.1
  linux-image-5.4.0-1062-raspi5.4.0-1062.70~18.04.1
  linux-image-5.4.0-1073-oracle   5.4.0-1073.79~18.04.1
  linux-image-5.4.0-1075-gcp  5.4.0-1075.80~18.04.1
  linux-image-gcp 5.4.0.1075.58
  linux-image-gkeop-5.4   5.4.0.1043.44~18.04.42
  linux-image-ibm 5.4.0.1023.39
  linux-image-oracle  5.4.0.1073.79~18.04.52
  linux-image-raspi-hwe-18.04 5.4.0.1062.63

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
  https://ubuntu.com/security/notices/USN-5442-2
  https://ubuntu.com/security/notices/USN-5442-1
  CVE-2022-1116, CVE-2022-29581, CVE-2022-30594

Package Information:
  https://launchpad.net/ubuntu/+source/linux-gkeop/5.4.0-1043.44
  https://launchpad.net/ubuntu/+source/linux-oracle/5.4.0-1073.79
  https://launchpad.net/ubuntu/+source/linux-raspi/5.4.0-1062.70
  https://launchpad.net/ubuntu/+source/linux-gcp-5.4/5.4.0-1075.80~18.04.1
  https://launchpad.net/ubuntu/+source/linux-gkeop-5.4/5.4.0-1043.44~18.04.1
  https://launchpad.net/ubuntu/+source/linux-ibm-5.4/5.4.0-1023.25~18.04.1
  https://launchpad.net/ubuntu/+source/linux-oracle-5.4/5.4.0-1073.79~18.04.1
  https://launchpad.net/ubuntu/+source/linux-raspi-5.4/5.4.0-1062.70~18.04.1



signature.asc
Description: PGP signature



[USN-5443-2] Linux kernel vulnerabilities

2022-05-31 Thread Steve Beattie
==
Ubuntu Security Notice USN-5443-2
June 01, 2022

linux-gcp-5.13, linux-oracle, linux-oracle-5.13 vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 21.10
- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-gcp-5.13: Linux kernel for Google Cloud Platform (GCP) systems
- linux-oracle-5.13: Linux kernel for Oracle Cloud systems

Details:

Kyle Zeng discovered that the Network Queuing and Scheduling subsystem of
the Linux kernel did not properly perform reference counting in some
situations, leading to a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or execute
arbitrary code. (CVE-2022-29581)

Jann Horn discovered that the Linux kernel did not properly enforce seccomp
restrictions in some situations. A local attacker could use this to bypass
intended seccomp sandbox restrictions. (CVE-2022-30594)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 21.10:
  linux-image-5.13.0-1030-oracle  5.13.0-1030.35
  linux-image-oracle  5.13.0.1030.30

Ubuntu 20.04 LTS:
  linux-image-5.13.0-1027-gcp 5.13.0-1027.32~20.04.1
  linux-image-5.13.0-1030-oracle  5.13.0-1030.35~20.04.1
  linux-image-gcp 5.13.0.1027.32~20.04.1
  linux-image-oracle  5.13.0.1030.35~20.04.1

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
  https://ubuntu.com/security/notices/USN-5443-2
  https://ubuntu.com/security/notices/USN-5443-1
  CVE-2022-29581, CVE-2022-30594

Package Information:
  https://launchpad.net/ubuntu/+source/linux-oracle/5.13.0-1030.35
  https://launchpad.net/ubuntu/+source/linux-gcp-5.13/5.13.0-1027.32~20.04.1
  https://launchpad.net/ubuntu/+source/linux-oracle-5.13/5.13.0-1030.35~20.04.1



signature.asc
Description: PGP signature



[Bug 1975523] Re: [MIR] Promote to main in Jammy and Kinetic

2022-05-31 Thread Steve Beattie
** Tags added: sec-1058

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1975523

Title:
  [MIR] Promote to main in Jammy and Kinetic

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ruby-webrick/+bug/1975523/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1963707] Re: [MIR] libqrtr-glib

2022-05-31 Thread Steve Beattie
** Tags added: sec-1057

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1963707

Title:
  [MIR] libqrtr-glib

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libqrtr-glib/+bug/1963707/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1972740] Re: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option

2022-05-18 Thread Steve Beattie
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-30594

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1972740

Title:
  Unprivileged users may use PTRACE_SEIZE to set
  PTRACE_O_SUSPEND_SECCOMP option

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1972740/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1972043] Re: Please add -ftrivial-auto-var-init=zero to default build flags

2022-05-16 Thread Steve Beattie
** Tags added: sec-994

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1972043

Title:
  Please add -ftrivial-auto-var-init=zero to default build flags

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dpkg/+bug/1972043/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[USN-5417-1] Linux kernel vulnerabilities

2022-05-11 Thread Steve Beattie
==
Ubuntu Security Notice USN-5417-1
May 12, 2022

linux, linux-aws, linux-aws-5.13, linux-azure, linux-azure-5.13,
linux-gcp, linux-gcp-5.13, linux-hwe-5.13, linux-kvm, linux-oracle,
linux-raspi vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 21.10
- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-azure: Linux kernel for Microsoft Azure Cloud systems
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-kvm: Linux kernel for cloud environments
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-raspi: Linux kernel for Raspberry Pi systems
- linux-aws-5.13: Linux kernel for Amazon Web Services (AWS) systems
- linux-azure-5.13: Linux kernel for Microsoft Azure cloud systems
- linux-gcp-5.13: Linux kernel for Google Cloud Platform (GCP) systems
- linux-hwe-5.13: Linux hardware enablement (HWE) kernel

Details:

Ke Sun, Alyssa Milburn, Henrique Kawakami, Emma Benoit, Igor Chervatyuk,
Lisa Aichele, and Thais Moreira Hamasaki discovered that the Spectre
Variant 2 mitigations for AMD processors on Linux were insufficient
in some situations. A local attacker could possibly use this to expose
sensitive information. (CVE-2021-26401)

It was discovered that the MMC/SD subsystem in the Linux kernel did
not properly handle read errors from SD cards in certain situations. An
attacker could possibly use this to expose sensitive information (kernel
memory). (CVE-2022-20008)

It was discovered that the USB gadget subsystem in the Linux kernel did not
properly validate interface descriptor requests. An attacker could possibly
use this to cause a denial of service (system crash). (CVE-2022-25258)

It was discovered that the Remote NDIS (RNDIS) USB gadget implementation in
the Linux kernel did not properly validate the size of the RNDIS_MSG_SET
command. An attacker could possibly use this to expose sensitive
information (kernel memory). (CVE-2022-25375)

It was discovered that the ST21NFCA NFC driver in the Linux kernel did not
properly validate the size of certain data in EVT_TRANSACTION events. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-26490)

It was discovered that the USB SR9700 ethernet device driver for the
Linux kernel did not properly validate the length of requests from the
device. A physically proximate attacker could possibly use this to expose
sensitive information (kernel memory). (CVE-2022-26966)

It was discovered that the Xilinx USB2 device gadget driver in the
Linux kernel did not properly validate endpoint indices from the host. A
physically proximate attacker could possibly use this to cause a denial
of service (system crash). (CVE-2022-27223)

Miaoqian Lin discovered that the RDMA Transport (RTRS) client
implementation in the Linux kernel contained a double-free when handling
certain error conditions. An attacker could use this to cause a denial
of service (system crash). (CVE-2022-29156)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 21.10:
  linux-image-5.13.0-1022-kvm 5.13.0-1022.23
  linux-image-5.13.0-1023-aws 5.13.0-1023.25
  linux-image-5.13.0-1023-azure   5.13.0-1023.27
  linux-image-5.13.0-1025-gcp 5.13.0-1025.30
  linux-image-5.13.0-1026-raspi   5.13.0-1026.28
  linux-image-5.13.0-1026-raspi-nolpae  5.13.0-1026.28
  linux-image-5.13.0-1028-oracle  5.13.0-1028.33
  linux-image-5.13.0-41-generic   5.13.0-41.46
  linux-image-5.13.0-41-generic-64k  5.13.0-41.46
  linux-image-5.13.0-41-generic-lpae  5.13.0-41.46
  linux-image-5.13.0-41-lowlatency  5.13.0-41.46
  linux-image-aws 5.13.0.1023.24
  linux-image-azure   5.13.0.1023.23
  linux-image-gcp 5.13.0.1025.23
  linux-image-generic 5.13.0.41.50
  linux-image-generic-64k 5.13.0.41.50
  linux-image-generic-lpae5.13.0.41.50
  linux-image-gke 5.13.0.1025.23
  linux-image-kvm 5.13.0.1022.22
  linux-image-lowlatency  5.13.0.41.50
  linux-image-oem-20.04   5.13.0.41.50
  linux-image-oracle  5.13.0.1028.28
  linux-image-raspi   5.13.0.1026.31
  linux-image-raspi-nolpae5.13.0.1026.31
  linux-image-virtual 5.13.0.41.50

Ubuntu 20.04 LTS:
  linux-image-5.13.0-1023-aws 5.13.0-1023.25~20.04.1
  linux-image-5.13.0-1023-azure   5.13.0-1023.27~20.04.1
  linux-image-5.13.0-1025-gcp 5.13.0-1025.30~20.04.1
  linux-image-5.13.0-41-generic   5.13.0-41.46~20.04.1
  linux-image-5.13.0-41-generic-64k  5.13.0-41.46~20.04.1
  

[USN-5418-1] Linux kernel vulnerabilities

2022-05-11 Thread Steve Beattie
==
Ubuntu Security Notice USN-5418-1
May 12, 2022

linux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15,
linux-dell300x, linux-gcp, linux-gcp-4.15, linux-hwe, linux-kvm,
linux-oracle, linux-snapdragon vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS
- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-azure-4.15: Linux kernel for Microsoft Azure Cloud systems
- linux-dell300x: Linux kernel for Dell 300x platforms
- linux-gcp-4.15: Linux kernel for Google Cloud Platform (GCP) systems
- linux-kvm: Linux kernel for cloud environments
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-snapdragon: Linux kernel for Qualcomm Snapdragon processors
- linux-aws-hwe: Linux kernel for Amazon Web Services (AWS-HWE) systems
- linux-azure: Linux kernel for Microsoft Azure Cloud systems
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-hwe: Linux hardware enablement (HWE) kernel

Details:

Ke Sun, Alyssa Milburn, Henrique Kawakami, Emma Benoit, Igor Chervatyuk,
Lisa Aichele, and Thais Moreira Hamasaki discovered that the Spectre
Variant 2 mitigations for AMD processors on Linux were insufficient
in some situations. A local attacker could possibly use this to expose
sensitive information. (CVE-2021-26401)

Demi Marie Obenour and Simon Gaiser discovered that several Xen para-
virtualization device frontends did not properly restrict the access
rights of device backends. An attacker could possibly use a malicious Xen
backend to gain access to memory pages of a guest VM or cause a denial
of service in the guest. (CVE-2022-23036, CVE-2022-23037, CVE-2022-23038,
CVE-2022-23039, CVE-2022-23040, CVE-2022-23042)

It was discovered that the USB Gadget file system interface in the Linux
kernel contained a use-after-free vulnerability. A local attacker could
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2022-24958)

It was discovered that the USB gadget subsystem in the Linux kernel did not
properly validate interface descriptor requests. An attacker could possibly
use this to cause a denial of service (system crash). (CVE-2022-25258)

It was discovered that the Remote NDIS (RNDIS) USB gadget implementation in
the Linux kernel did not properly validate the size of the RNDIS_MSG_SET
command. An attacker could possibly use this to expose sensitive
information (kernel memory). (CVE-2022-25375)

It was discovered that the ST21NFCA NFC driver in the Linux kernel did not
properly validate the size of certain data in EVT_TRANSACTION events. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-26490)

It was discovered that the USB SR9700 ethernet device driver for the
Linux kernel did not properly validate the length of requests from the
device. A physically proximate attacker could possibly use this to expose
sensitive information (kernel memory). (CVE-2022-26966)

It was discovered that the Xilinx USB2 device gadget driver in the
Linux kernel did not properly validate endpoint indices from the host. A
physically proximate attacker could possibly use this to cause a denial
of service (system crash). (CVE-2022-27223)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
  linux-image-4.15.0-1042-dell300x  4.15.0-1042.47
  linux-image-4.15.0-1093-oracle  4.15.0-1093.102
  linux-image-4.15.0-1114-kvm 4.15.0-1114.117
  linux-image-4.15.0-1122-gcp 4.15.0-1122.136
  linux-image-4.15.0-1127-snapdragon  4.15.0-1127.136
  linux-image-4.15.0-1128-aws 4.15.0-1128.137
  linux-image-4.15.0-1138-azure   4.15.0-1138.151
  linux-image-4.15.0-177-generic  4.15.0-177.186
  linux-image-4.15.0-177-generic-lpae  4.15.0-177.186
  linux-image-4.15.0-177-lowlatency  4.15.0-177.186
  linux-image-aws-lts-18.04   4.15.0.1128.131
  linux-image-azure-lts-18.04 4.15.0.1138.111
  linux-image-dell300x4.15.0.1042.44
  linux-image-gcp-lts-18.04   4.15.0.1122.141
  linux-image-generic 4.15.0.177.166
  linux-image-generic-lpae4.15.0.177.166
  linux-image-kvm 4.15.0.1114.110
  linux-image-lowlatency  4.15.0.177.166
  linux-image-oracle-lts-18.044.15.0.1093.103
  linux-image-snapdragon  4.15.0.1127.130
  linux-image-virtual 4.15.0.177.166

Ubuntu 16.04 ESM:
  linux-image-4.15.0-1093-oracle  4.15.0-1093.102~16.04.1
  linux-image-4.15.0-1122-gcp 4.15.0-1122.136~16.04.1
  linux-image-4.15.0-1128-aws-hwe  4.15.0-1128.137~16.04.1
  

[USN-5416-1] Linux kernel (OEM) vulnerabilities

2022-05-11 Thread Steve Beattie
==
Ubuntu Security Notice USN-5416-1
May 12, 2022

linux-oem-5.14 vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-oem-5.14: Linux kernel for OEM systems

Details:

Qiuhao Li, Gaoning Pan and Yongkang Jia discovered that the KVM
implementation in the Linux kernel did not properly perform guest page
table updates in some situations. An attacker in a guest vm could possibly
use this to crash the host OS. (CVE-2022-1158)

It was discovered that the implementation of X.25 network protocols in
the Linux kernel did not terminate link layer sessions properly. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2022-1516)

It was discovered that the 8 Devices USB2CAN interface implementation
in the Linux kernel did not properly handle certain error conditions,
leading to a double-free. A local attacker could possibly use this to
cause a denial of service (system crash). (CVE-2022-28388)

It was discovered that the Microchip CAN BUS Analyzer interface
implementation in the Linux kernel did not properly handle certain error
conditions, leading to a double-free. A local attacker could possibly
use this to cause a denial of service (system crash). (CVE-2022-28389)

It was discovered that the EMS CAN/USB interface implementation in the
Linux kernel contained a double-free vulnerability when handling certain
error conditions. A local attacker could use this to cause a denial of
service (memory exhaustion). (CVE-2022-28390)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
  linux-image-5.14.0-1036-oem 5.14.0-1036.40
  linux-image-oem-20.04   5.14.0.1036.33
  linux-image-oem-20.04b  5.14.0.1036.33
  linux-image-oem-20.04c  5.14.0.1036.33
  linux-image-oem-20.04d  5.14.0.1036.33

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
  https://ubuntu.com/security/notices/USN-5416-1
  CVE-2022-1158, CVE-2022-1516, CVE-2022-28388, CVE-2022-28389,
  CVE-2022-28390

Package Information:
  https://launchpad.net/ubuntu/+source/linux-oem-5.14/5.14.0-1036.40



signature.asc
Description: PGP signature



[USN-5413-1] Linux kernel vulnerabilities

2022-05-11 Thread Steve Beattie
==
Ubuntu Security Notice USN-5413-1
May 12, 2022

linux, linux-aws, linux-kvm, linux-lts-xenial vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-kvm: Linux kernel for cloud environments
- linux-lts-xenial: Linux hardware enablement kernel from Xenial for Trusty

Details:

Jeremy Cline discovered a use-after-free in the nouveau graphics driver
of the Linux kernel during device removal. A privileged or physically
proximate attacker could use this to cause a denial of service (system
crash). (CVE-2020-27820)

It was discovered that a race condition existed in the network scheduling
subsystem of the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2021-39713)

It was discovered that the Parallel NFS (pNFS) implementation in the Linux
kernel did not properly perform bounds checking in some situations. An
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2021-4157)

It was discovered that the ST21NFCA NFC driver in the Linux kernel did not
properly validate the size of certain data in EVT_TRANSACTION events. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-26490)

It was discovered that the Xilinx USB2 device gadget driver in the Linux
kernel did not properly validate endpoint indices from the host. A
physically proximate attacker could possibly use this to cause a denial of
service (system crash). (CVE-2022-27223)

It was discovered that the EMS CAN/USB interface implementation in the
Linux kernel contained a double-free vulnerability when handling certain
error conditions. A local attacker could use this to cause a denial of
service (memory exhaustion). (CVE-2022-28390)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 ESM:
  linux-image-4.4.0-1105-kvm  4.4.0-1105.114
  linux-image-4.4.0-1140-aws  4.4.0-1140.154
  linux-image-4.4.0-224-generic   4.4.0-224.257
  linux-image-4.4.0-224-lowlatency  4.4.0-224.257
  linux-image-aws 4.4.0.1140.145
  linux-image-generic 4.4.0.224.231
  linux-image-kvm 4.4.0.1105.103
  linux-image-lowlatency  4.4.0.224.231
  linux-image-virtual 4.4.0.224.231

Ubuntu 14.04 ESM:
  linux-image-4.4.0-224-generic   4.4.0-224.257~14.04.1
  linux-image-4.4.0-224-lowlatency  4.4.0-224.257~14.04.1
  linux-image-generic-lts-xenial  4.4.0.224.195
  linux-image-lowlatency-lts-xenial  4.4.0.224.195
  linux-image-virtual-lts-xenial  4.4.0.224.195

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
  https://ubuntu.com/security/notices/USN-5413-1
  CVE-2020-27820, CVE-2021-39713, CVE-2021-4157, CVE-2022-26490,
  CVE-2022-27223, CVE-2022-28390



signature.asc
Description: PGP signature



[USN-5415-1] Linux kernel vulnerabilities

2022-05-11 Thread Steve Beattie
==
Ubuntu Security Notice USN-5415-1
May 12, 2022

linux, linux-aws, linux-azure, linux-azure-5.4, linux-azure-fde,
linux-gcp, linux-gcp-5.4, linux-gke, linux-gkeop, linux-gkeop-5.4,
linux-hwe-5.4, linux-ibm, linux-ibm-5.4, linux-kvm, linux-oracle,
linux-oracle-5.4, linux-raspi, linux-raspi-5.4 vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-azure: Linux kernel for Microsoft Azure Cloud systems
- linux-azure-fde: Linux kernel for Microsoft Azure cloud systems
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-gke: Linux kernel for Google Container Engine (GKE) systems
- linux-gkeop: Linux kernel for Google Container Engine (GKE) systems
- linux-ibm: Linux kernel for IBM cloud systems
- linux-kvm: Linux kernel for cloud environments
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-raspi: Linux kernel for Raspberry Pi systems
- linux-azure-5.4: Linux kernel for Microsoft Azure cloud systems
- linux-gcp-5.4: Linux kernel for Google Cloud Platform (GCP) systems
- linux-gkeop-5.4: Linux kernel for Google Container Engine (GKE) systems
- linux-hwe-5.4: Linux hardware enablement (HWE) kernel
- linux-ibm-5.4: Linux kernel for IBM cloud systems
- linux-oracle-5.4: Linux kernel for Oracle Cloud systems
- linux-raspi-5.4: Linux kernel for Raspberry Pi systems

Details:

Jeremy Cline discovered a use-after-free in the nouveau graphics driver
of the Linux kernel during device removal. A privileged or physically
proximate attacker could use this to cause a denial of service (system
crash). (CVE-2020-27820)

Ke Sun, Alyssa Milburn, Henrique Kawakami, Emma Benoit, Igor Chervatyuk,
Lisa Aichele, and Thais Moreira Hamasaki discovered that the Spectre
Variant 2 mitigations for AMD processors on Linux were insufficient in some
situations. A local attacker could possibly use this to expose sensitive
information. (CVE-2021-26401)

David Bouman discovered that the netfilter subsystem in the Linux kernel
did not initialize memory in some situations. A local attacker could use
this to expose sensitive information (kernel memory). (CVE-2022-1016)

It was discovered that the MMC/SD subsystem in the Linux kernel did not
properly handle read errors from SD cards in certain situations. An
attacker could possibly use this to expose sensitive information (kernel
memory). (CVE-2022-20008)

It was discovered that the USB gadget subsystem in the Linux kernel did not
properly validate interface descriptor requests. An attacker could possibly
use this to cause a denial of service (system crash). (CVE-2022-25258)

It was discovered that the Remote NDIS (RNDIS) USB gadget implementation in
the Linux kernel did not properly validate the size of the RNDIS_MSG_SET
command. An attacker could possibly use this to expose sensitive
information (kernel memory). (CVE-2022-25375)

It was discovered that the ST21NFCA NFC driver in the Linux kernel did not
properly validate the size of certain data in EVT_TRANSACTION events. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-26490)

It was discovered that the Xilinx USB2 device gadget driver in the Linux
kernel did not properly validate endpoint indices from the host. A
physically proximate attacker could possibly use this to cause a denial of
service (system crash). (CVE-2022-27223)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
  linux-image-5.4.0-1021-ibm  5.4.0-1021.23
  linux-image-5.4.0-1040-gkeop5.4.0-1040.41
  linux-image-5.4.0-1060-raspi5.4.0-1060.68
  linux-image-5.4.0-1063-kvm  5.4.0-1063.66
  linux-image-5.4.0-1071-gke  5.4.0-1071.76
  linux-image-5.4.0-1071-oracle   5.4.0-1071.77
  linux-image-5.4.0-1073-aws  5.4.0-1073.78
  linux-image-5.4.0-1073-gcp  5.4.0-1073.78
  linux-image-5.4.0-1078-azure5.4.0-1078.81
  linux-image-5.4.0-1078-azure-fde  5.4.0-1078.81+cvm1.1
  linux-image-5.4.0-110-generic   5.4.0-110.124
  linux-image-5.4.0-110-generic-lpae  5.4.0-110.124
  linux-image-5.4.0-110-lowlatency  5.4.0-110.124
  linux-image-aws-lts-20.04   5.4.0.1073.75
  linux-image-azure-fde   5.4.0.1078.81+cvm1.22
  linux-image-azure-lts-20.04 5.4.0.1078.76
  linux-image-gcp-lts-20.04   5.4.0.1073.81
  linux-image-generic 5.4.0.110.114
  linux-image-generic-lpae5.4.0.110.114
  linux-image-gke 5.4.0.1071.80
  linux-image-gke-5.4 5.4.0.1071.80
  linux-image-gkeop   5.4.0.1040.43
  

[Bug 1892559] Re: [MIR] ccid opensc pcsc-lite

2022-05-11 Thread Steve Beattie
** Tags added: sec-407

** Tags added: sec-408 sec-409

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1892559

Title:
  [MIR] ccid opensc pcsc-lite

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ccid/+bug/1892559/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1965115] Re: [MIR] nullboot

2022-05-11 Thread Steve Beattie
** Tags added: sec-976

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1965115

Title:
  [MIR] nullboot

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nullboot/+bug/1965115/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1971895] Re: Warning messages from stat printed on installation with no user crontabs

2022-05-10 Thread Steve Beattie
** Also affects: cron (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Also affects: cron (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: cron (Ubuntu Xenial)
   Status: New => Triaged

** Changed in: cron (Ubuntu Bionic)
   Status: New => Triaged

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1971895

Title:
  Warning messages from stat printed on installation with no user
  crontabs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/cron/+bug/1971895/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1949186] Re: Missing Linux Kernel mitigations for 'SSB - Speculative Store Bypass' hardware vulnerabilities

2022-05-10 Thread Steve Beattie
** Changed in: linux-aws (Ubuntu)
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1949186

Title:
  Missing Linux Kernel mitigations for 'SSB - Speculative Store Bypass'
  hardware vulnerabilities

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-aws/+bug/1949186/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1950644] Re: ubuntu_ltp_syscalls / finit_module02 fails on v4.15 and other kernels

2022-05-10 Thread Steve Beattie
Hi, is this still on the kernel team's radar to address in trusty and in
the various linux-azure kernels?

Thanks!

** Changed in: linux-oem-5.14 (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-oem-5.13 (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-oem-5.10 (Ubuntu Trusty)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1950644

Title:
  ubuntu_ltp_syscalls / finit_module02 fails on v4.15 and other kernels

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1950644/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1951927] Re: Array overflow in au_procfs_plm_write

2022-05-10 Thread Steve Beattie
Thanks, making this public.

** Information type changed from Private Security to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1951927

Title:
  Array overflow in au_procfs_plm_write

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1951927/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1961528] Re: Security: Arbitrary shell command injection through PDF import or unpaper preprocessing

2022-05-10 Thread Steve Beattie
** Information type changed from Private Security to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1961528

Title:
  Security: Arbitrary shell command injection through PDF import or
  unpaper preprocessing

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ocrfeeder/+bug/1961528/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1967626] Re: 22.04 beta Network Manager still sets wrong IPv6 routing

2022-05-10 Thread Steve Beattie
Given that this issue is public in the freedesktop gitlab instance, I'm
making this issue public here as well.

** Information type changed from Private Security to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1967626

Title:
  22.04 beta Network Manager still sets wrong IPv6 routing

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/network-manager/+bug/1967626/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1961854] Re: Thunderbid saves accepted calendar events in different identity

2022-05-10 Thread Steve Beattie
Hi Bartłomiej, was this issue reported to mozilla? Do you have a bug
report there?

Thanks!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1961854

Title:
  Thunderbid saves accepted calendar events in different identity

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/thunderbird/+bug/1961854/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1970012] Re: package yaru-theme-gnome-shell 21.10.2 failed to install/upgrade: el subproceso nuevo paquete yaru-theme-gnome-shell script pre-installation devolvió el código de salida de error 1

2022-05-10 Thread Steve Beattie
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1970012

Title:
  package yaru-theme-gnome-shell 21.10.2 failed to install/upgrade: el
  subproceso nuevo paquete yaru-theme-gnome-shell script pre-
  installation devolvió el código de salida de error 1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/yaru-theme/+bug/1970012/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1971415] Re: Remote desktop is automatically enabled after login

2022-05-10 Thread Steve Beattie
Jeremy, is there any progress on this?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1971415

Title:
  Remote desktop is automatically enabled after login

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gnome-remote-desktop/+bug/1971415/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1972812] Re: The operating system does not ask for a password after unlocking the screen.

2022-05-10 Thread Steve Beattie
** Package changed: ubuntu => gnome-shell (Ubuntu)

** Information type changed from Private Security to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1972812

Title:
  The operating system does not ask for a password after unlocking the
  screen.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gnome-shell/+bug/1972812/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1214787] Re: busybox crashed with signal 7

2022-05-05 Thread Steve Beattie
** Information type changed from Private to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1214787

Title:
  busybox crashed with signal 7

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/busybox/+bug/1214787/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[USN-5390-2] Linux kernel (Raspberry Pi) vulnerabilities

2022-05-03 Thread Steve Beattie
==
Ubuntu Security Notice USN-5390-2
May 03, 2022

linux-raspi vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-raspi: Linux kernel for Raspberry Pi systems

Details:

David Bouman discovered that the netfilter subsystem in the Linux kernel
did not properly validate passed user register indices. A local attacker
could use this to cause a denial of service or possibly execute arbitrary
code. (CVE-2022-1015)

David Bouman discovered that the netfilter subsystem in the Linux kernel
did not initialize memory in some situations. A local attacker could use
this to expose sensitive information (kernel memory). (CVE-2022-1016)

It was discovered that the ST21NFCA NFC driver in the Linux kernel did not
properly validate the size of certain data in EVT_TRANSACTION events. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-26490)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS:
  linux-image-5.15.0-1006-raspi   5.15.0-1006.6
  linux-image-5.15.0-1006-raspi-nolpae  5.15.0-1006.6
  linux-image-raspi   5.15.0.1006.6
  linux-image-raspi-nolpae5.15.0.1006.6

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
  https://ubuntu.com/security/notices/USN-5390-2
  https://ubuntu.com/security/notices/USN-5390-1
  CVE-2022-1015, CVE-2022-1016, CVE-2022-26490

Package Information:
  https://launchpad.net/ubuntu/+source/linux-raspi/5.15.0-1006.6



signature.asc
Description: PGP signature



[USN-5390-1] Linux kernel vulnerabilities

2022-04-26 Thread Steve Beattie
==
Ubuntu Security Notice USN-5390-1
April 26, 2022

linux, linux-gcp, linux-ibm, linux-lowlatency vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux: Linux kernel
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-ibm: Linux kernel for IBM cloud systems
- linux-lowlatency: Linux low latency kernel

Details:

David Bouman discovered that the netfilter subsystem in the Linux kernel
did not properly validate passed user register indices. A local attacker
could use this to cause a denial of service or possibly execute arbitrary
code. (CVE-2022-1015)

David Bouman discovered that the netfilter subsystem in the Linux kernel
did not initialize memory in some situations. A local attacker could use
this to expose sensitive information (kernel memory). (CVE-2022-1016)

It was discovered that the ST21NFCA NFC driver in the Linux kernel did not
properly validate the size of certain data in EVT_TRANSACTION events. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-26490)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS:
  linux-image-5.15.0-1003-ibm 5.15.0-1003.3
  linux-image-5.15.0-1004-gcp 5.15.0-1004.7
  linux-image-5.15.0-27-generic   5.15.0-27.28
  linux-image-5.15.0-27-generic-64k  5.15.0-27.28
  linux-image-5.15.0-27-generic-lpae  5.15.0-27.28
  linux-image-5.15.0-27-lowlatency  5.15.0-27.28
  linux-image-5.15.0-27-lowlatency-64k  5.15.0-27.28
  linux-image-gcp 5.15.0.1004.5
  linux-image-generic 5.15.0.27.30
  linux-image-generic-64k 5.15.0.27.30
  linux-image-generic-lpae5.15.0.27.30
  linux-image-ibm 5.15.0.1003.4
  linux-image-lowlatency  5.15.0.27.28
  linux-image-lowlatency-64k  5.15.0.27.28
  linux-image-oem-20.04   5.15.0.27.30
  linux-image-virtual 5.15.0.27.30

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
  https://ubuntu.com/security/notices/USN-5390-1
  CVE-2022-1015, CVE-2022-1016, CVE-2022-26490

Package Information:
  https://launchpad.net/ubuntu/+source/linux/5.15.0-27.28
  https://launchpad.net/ubuntu/+source/linux-gcp/5.15.0-1004.7
  https://launchpad.net/ubuntu/+source/linux-ibm/5.15.0-1003.3
  https://launchpad.net/ubuntu/+source/linux-lowlatency/5.15.0-27.28



signature.asc
Description: PGP signature



[Bug 1970267] [NEW] Unable to save macaroons in MozillaCookieJar() under python3.10

2022-04-25 Thread Steve Beattie
Public bug reported:

Upstream bug report: https://github.com/go-macaroon-bakery/py-macaroon-
bakery/issues/88

See above for details, but the essential bug is that doing something
like the following:

client = httpbakery.Client(cookies=MozillaCookieJar(".cooklefile"))

if os.path.exists(client.cookies.filename):
client.cookies.load(ignore_discard=True)

response = client.request("POST", url=url, json=payload)
client.cookies.save(ignore_discard=True)

stated throwing a traceback under python3.10:

  [ELIDED]
File "/usr/lib/python3.10/http/cookiejar.py", line 2120, in save
  if cookie.has_nonstandard_attr(HTTPONLY_ATTR):
File "/usr/lib/python3.10/http/cookiejar.py", line 805, in 
has_nonstandard_attr
  return name in self._rest
  TypeError: argument of type 'NoneType' is not iterable

because py-macaroon-bakery creates a http.cookiejar.Cookie() object with
the rest field set to None, causing the writing out of a cookie file to
fail.

** Affects: py-macaroon-bakery (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1970267

Title:
  Unable to save macaroons in MozillaCookieJar() under python3.10

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/py-macaroon-bakery/+bug/1970267/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1969619] Re: RDP Sharing appears on by default in jammy

2022-04-21 Thread Steve Beattie
Hi, yes, from the Ubuntu Security team's perspective, this should go to
the security pocket.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1969619

Title:
  RDP Sharing appears on by default in jammy

To manage notifications about this bug go to:
https://bugs.launchpad.net/gnome-control-center/+bug/1969619/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[USN-5385-1] Linux kernel vulnerabilities

2022-04-21 Thread Steve Beattie
==
Ubuntu Security Notice USN-5385-1
April 21, 2022

linux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15,
linux-dell300x, linux-gcp, inux-gcp-4.15, linux-hwe, linux-kvm,
linux-oracle, linux-snapdragon vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS
- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-azure-4.15: Linux kernel for Microsoft Azure Cloud systems
- linux-dell300x: Linux kernel for Dell 300x platforms
- linux-gcp-4.15: Linux kernel for Google Cloud Platform (GCP) systems
- linux-kvm: Linux kernel for cloud environments
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-snapdragon: Linux kernel for Qualcomm Snapdragon processors
- linux-aws-hwe: Linux kernel for Amazon Web Services (AWS-HWE) systems
- linux-azure: Linux kernel for Microsoft Azure Cloud systems
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-hwe: Linux hardware enablement (HWE) kernel

Details:

Brendan Dolan-Gavitt discovered that the aQuantia AQtion Ethernet device
driver in the Linux kernel did not properly validate meta-data coming from
the device. A local attacker who can control an emulated device can use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2021-43975)

It was discovered that the UDF file system implementation in the Linux
kernel could attempt to dereference a null pointer in some situations. An
attacker could use this to construct a malicious UDF image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2022-0617)

Lyu Tao discovered that the NFS implementation in the Linux kernel did not
properly handle requests to open a directory on a regular file. A local
attacker could use this to expose sensitive information (kernel memory).
(CVE-2022-24448)

It was discovered that the YAM AX.25 device driver in the Linux kernel did
not properly deallocate memory in some error conditions. A local privileged
attacker could use this to cause a denial of service (kernel memory
exhaustion). (CVE-2022-24959)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
  linux-image-4.15.0-1041-dell300x  4.15.0-1041.46
  linux-image-4.15.0-1092-oracle  4.15.0-1092.101
  linux-image-4.15.0-1113-kvm 4.15.0-1113.116
  linux-image-4.15.0-1121-gcp 4.15.0-1121.135
  linux-image-4.15.0-1126-snapdragon  4.15.0-1126.135
  linux-image-4.15.0-1127-aws 4.15.0-1127.136
  linux-image-4.15.0-1137-azure   4.15.0-1137.150
  linux-image-4.15.0-176-generic  4.15.0-176.185
  linux-image-4.15.0-176-generic-lpae  4.15.0-176.185
  linux-image-4.15.0-176-lowlatency  4.15.0-176.185
  linux-image-aws-lts-18.04   4.15.0.1127.130
  linux-image-azure-lts-18.04 4.15.0.1137.110
  linux-image-dell300x4.15.0.1041.43
  linux-image-gcp-lts-18.04   4.15.0.1121.140
  linux-image-generic 4.15.0.176.165
  linux-image-generic-lpae4.15.0.176.165
  linux-image-kvm 4.15.0.1113.109
  linux-image-lowlatency  4.15.0.176.165
  linux-image-oracle-lts-18.044.15.0.1092.102
  linux-image-snapdragon  4.15.0.1126.129
  linux-image-virtual 4.15.0.176.165

Ubuntu 16.04 ESM:
  linux-image-4.15.0-1092-oracle  4.15.0-1092.101~16.04.1
  linux-image-4.15.0-1121-gcp 4.15.0-1121.135~16.04.1
  linux-image-4.15.0-1127-aws-hwe  4.15.0-1127.136~16.04.1
  linux-image-4.15.0-1137-azure   4.15.0-1137.150~16.04.1
  linux-image-4.15.0-176-generic  4.15.0-176.185~16.04.1
  linux-image-4.15.0-176-lowlatency  4.15.0-176.185~16.04.1
  linux-image-aws-hwe 4.15.0.1127.117
  linux-image-azure   4.15.0.1137.127
  linux-image-gcp 4.15.0.1121.122
  linux-image-generic-hwe-16.04   4.15.0.176.168
  linux-image-gke 4.15.0.1121.122
  linux-image-lowlatency-hwe-16.04  4.15.0.176.168
  linux-image-oem 4.15.0.176.168
  linux-image-oracle  4.15.0.1092.80
  linux-image-virtual-hwe-16.04   4.15.0.176.168

Ubuntu 14.04 ESM:
  linux-image-4.15.0-1137-azure   4.15.0-1137.150~14.04.1
  linux-image-azure   4.15.0.1137.109

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,

[USN-5384-1] Linux kernel vulnerabilities

2022-04-20 Thread Steve Beattie
==
Ubuntu Security Notice USN-5384-1
April 20, 2022

linux, linux-aws, linux-azure, linux-azure-5.4, linux-azure-fde,
linux-gcp, linux-gcp-5.4, linux-gke, linux-gke-5.4, linux-gkeop,
linux-gkeop-5.4, linux-hwe-5.4, linux-ibm, linux-ibm-5.4, linux-kvm,
linux-oracle, linux-oracle-5.4, linux-raspi, linux-raspi-5.4
vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-azure: Linux kernel for Microsoft Azure Cloud systems
- linux-azure-fde: Linux kernel for Microsoft Azure cloud systems
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-gke: Linux kernel for Google Container Engine (GKE) systems
- linux-gkeop: Linux kernel for Google Container Engine (GKE) systems
- linux-ibm: Linux kernel for IBM cloud systems
- linux-kvm: Linux kernel for cloud environments
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-raspi: Linux kernel for Raspberry Pi systems
- linux-azure-5.4: Linux kernel for Microsoft Azure cloud systems
- linux-gcp-5.4: Linux kernel for Google Cloud Platform (GCP) systems
- linux-gke-5.4: Linux kernel for Google Container Engine (GKE) systems
- linux-gkeop-5.4: Linux kernel for Google Container Engine (GKE) systems
- linux-hwe-5.4: Linux hardware enablement (HWE) kernel
- linux-ibm-5.4: Linux kernel for IBM cloud systems
- linux-oracle-5.4: Linux kernel for Oracle Cloud systems
- linux-raspi-5.4: Linux kernel for Raspberry Pi systems

Details:

It was discovered that the UDF file system implementation in the Linux
kernel could attempt to dereference a null pointer in some situations. An
attacker could use this to construct a malicious UDF image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2022-0617)

Lyu Tao discovered that the NFS implementation in the Linux kernel did not
properly handle requests to open a directory on a regular file. A local
attacker could use this to expose sensitive information (kernel memory).
(CVE-2022-24448)

It was discovered that the YAM AX.25 device driver in the Linux kernel did
not properly deallocate memory in some error conditions. A local privileged
attacker could use this to cause a denial of service (kernel memory
exhaustion). (CVE-2022-24959)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
  linux-image-5.4.0-1020-ibm  5.4.0-1020.22
  linux-image-5.4.0-1039-gkeop5.4.0-1039.40
  linux-image-5.4.0-1059-raspi5.4.0-1059.67
  linux-image-5.4.0-1062-kvm  5.4.0-1062.65
  linux-image-5.4.0-1068-gke  5.4.0-1068.71
  linux-image-5.4.0-1070-oracle   5.4.0-1070.76
  linux-image-5.4.0-1072-aws  5.4.0-1072.77
  linux-image-5.4.0-1072-gcp  5.4.0-1072.77
  linux-image-5.4.0-1076-azure-fde  5.4.0-1076.79+cvm1.1
  linux-image-5.4.0-1077-azure5.4.0-1077.80
  linux-image-5.4.0-109-generic   5.4.0-109.123
  linux-image-5.4.0-109-generic-lpae  5.4.0-109.123
  linux-image-5.4.0-109-lowlatency  5.4.0-109.123
  linux-image-aws-lts-20.04   5.4.0.1072.74
  linux-image-azure-fde   5.4.0.1076.79+cvm1.21
  linux-image-azure-lts-20.04 5.4.0.1077.75
  linux-image-gcp-lts-20.04   5.4.0.1072.80
  linux-image-generic 5.4.0.109.113
  linux-image-generic-lpae5.4.0.109.113
  linux-image-gke 5.4.0.1068.78
  linux-image-gke-5.4 5.4.0.1068.78
  linux-image-gkeop   5.4.0.1039.42
  linux-image-gkeop-5.4   5.4.0.1039.42
  linux-image-ibm 5.4.0.1020.20
  linux-image-ibm-lts-20.04   5.4.0.1020.20
  linux-image-kvm 5.4.0.1062.61
  linux-image-lowlatency  5.4.0.109.113
  linux-image-oem 5.4.0.109.113
  linux-image-oem-osp15.4.0.109.113
  linux-image-oracle-lts-20.045.4.0.1070.70
  linux-image-raspi   5.4.0.1059.93
  linux-image-raspi2  5.4.0.1059.93
  linux-image-virtual 5.4.0.109.113

Ubuntu 18.04 LTS:
  linux-image-5.4.0-1020-ibm  5.4.0-1020.22~18.04.1
  linux-image-5.4.0-1039-gkeop5.4.0-1039.40~18.04.1
  linux-image-5.4.0-1059-raspi5.4.0-1059.66~18.04.1
  linux-image-5.4.0-1068-gke  5.4.0-1068.71~18.04.1
  linux-image-5.4.0-1070-oracle   5.4.0-1070.76~18.04.1
  linux-image-5.4.0-1072-gcp  5.4.0-1072.77~18.04.1
  linux-image-5.4.0-1077-azure5.4.0-1077.80~18.04.1
  linux-image-5.4.0-109-generic   5.4.0-109.123~18.04.1
  linux-image-5.4.0-109-generic-lpae  5.4.0-109.123~18.04.1
  linux-image-5.4.0-109-lowlatency  5.4.0-109.123~18.04.1
  linux-image-azure   5.4.0.1077.56
  linux-image-gcp 

[USN-5383-1] Linux kernel vulnerabilities

2022-04-20 Thread Steve Beattie
==
Ubuntu Security Notice USN-5383-1
April 20, 2022

linux, linux-aws, linux-aws-5.13, linux-azure, linux-azure-5.13,
linux-gcp, linux-gcp-5.13, linux-hwe-5.13, linux-kvm, linux-oracle,
linux-oracle-5.13, linux-raspi vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 21.10
- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-azure: Linux kernel for Microsoft Azure Cloud systems
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-kvm: Linux kernel for cloud environments
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-raspi: Linux kernel for Raspberry Pi systems
- linux-aws-5.13: Linux kernel for Amazon Web Services (AWS) systems
- linux-azure-5.13: Linux kernel for Microsoft Azure cloud systems
- linux-gcp-5.13: Linux kernel for Google Cloud Platform (GCP) systems
- linux-hwe-5.13: Linux hardware enablement (HWE) kernel
- linux-oracle-5.13: Linux kernel for Oracle Cloud systems

Details:

David Bouman discovered that the netfilter subsystem in the Linux kernel
did not properly validate passed user register indices. A local attacker
could use this to cause a denial of service or possibly execute arbitrary
code. (CVE-2022-1015)

Brendan Dolan-Gavitt discovered that the Marvell WiFi-Ex USB device driver
in the Linux kernel did not properly handle some error conditions. A
physically proximate attacker could use this to cause a denial of service
(system crash). (CVE-2021-43976)

Wenqing Liu discovered that the f2fs file system implementation in the
Linux kernel did not properly validate inode types while performing garbage
collection. An attacker could use this to construct a malicious f2fs image
that, when mounted and operated on, could cause a denial of service (system
crash). (CVE-2021-44879)

It was discovered that the UDF file system implementation in the Linux
kernel could attempt to dereference a null pointer in some situations. An
attacker could use this to construct a malicious UDF image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2022-0617)

David Bouman discovered that the netfilter subsystem in the Linux kernel
did not initialize memory in some situations. A local attacker could use
this to expose sensitive information (kernel memory). (CVE-2022-1016)

Lyu Tao discovered that the NFS implementation in the Linux kernel did not
properly handle requests to open a directory on a regular file. A local
attacker could use this to expose sensitive information (kernel memory).
(CVE-2022-24448)

It was discovered that the VirtIO Bluetooth driver in the Linux kernel did
not properly deallocate memory in some error conditions. A local attacker
could possibly use this to cause a denial of service (memory exhaustion).
(CVE-2022-26878)

It was discovered that the YAM AX.25 device driver in the Linux kernel did
not properly deallocate memory in some error conditions. A local privileged
attacker could use this to cause a denial of service (kernel memory
exhaustion). (CVE-2022-24959)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 21.10:
  linux-image-5.13.0-1021-kvm 5.13.0-1021.22
  linux-image-5.13.0-1022-aws 5.13.0-1022.24
  linux-image-5.13.0-1022-azure   5.13.0-1022.26
  linux-image-5.13.0-1024-gcp 5.13.0-1024.29
  linux-image-5.13.0-1025-raspi   5.13.0-1025.27
  linux-image-5.13.0-1025-raspi-nolpae  5.13.0-1025.27
  linux-image-5.13.0-1027-oracle  5.13.0-1027.32
  linux-image-5.13.0-40-generic   5.13.0-40.45
  linux-image-5.13.0-40-generic-64k  5.13.0-40.45
  linux-image-5.13.0-40-generic-lpae  5.13.0-40.45
  linux-image-5.13.0-40-lowlatency  5.13.0-40.45
  linux-image-aws 5.13.0.1022.23
  linux-image-azure   5.13.0.1022.22
  linux-image-gcp 5.13.0.1024.22
  linux-image-generic 5.13.0.40.49
  linux-image-generic-64k 5.13.0.40.49
  linux-image-generic-lpae5.13.0.40.49
  linux-image-gke 5.13.0.1024.22
  linux-image-kvm 5.13.0.1021.21
  linux-image-lowlatency  5.13.0.40.49
  linux-image-oem-20.04   5.13.0.40.49
  linux-image-oracle  5.13.0.1027.27
  linux-image-raspi   5.13.0.1025.30
  linux-image-raspi-nolpae5.13.0.1025.30
  linux-image-virtual 5.13.0.40.49

Ubuntu 20.04 LTS:
  linux-image-5.13.0-1022-aws 5.13.0-1022.24~20.04.1
  linux-image-5.13.0-1022-azure   5.13.0-1022.26~20.04.1
  linux-image-5.13.0-1024-gcp 5.13.0-1024.29~20.04.1
  linux-image-5.13.0-1027-oracle  5.13.0-1027.32~20.04.1
  linux-image-5.13.0-40-generic   5.13.0-40.45~20.04.1
 

[USN-5381-1] Linux kernel (OEM) vulnerabilities

2022-04-20 Thread Steve Beattie
==
Ubuntu Security Notice USN-5381-1
April 20, 2022

linux-oem-5.14 vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-oem-5.14: Linux kernel for OEM systems

Details:

David Bouman discovered that the netfilter subsystem in the Linux kernel
did not properly validate passed user register indices. A local attacker
could use this to cause a denial of service or possibly execute arbitrary
code. (CVE-2022-1015)

It was discovered that the block layer subsystem in the Linux kernel did
not properly initialize memory in some situations. A privileged local
attacker could use this to expose sensitive information (kernel memory).
(CVE-2022-0494)

It was discovered that the DMA subsystem in the Linux kernel did not
properly ensure bounce buffers were completely overwritten by the DMA
device. A local attacker could use this to expose sensitive information
(kernel memory). (CVE-2022-0854)

Jann Horn discovered that the FUSE file system in the Linux kernel
contained a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-1011)

David Bouman discovered that the netfilter subsystem in the Linux kernel
did not initialize memory in some situations. A local attacker could use
this to expose sensitive information (kernel memory). (CVE-2022-1016)

Hu Jiahui discovered that multiple race conditions existed in the Advanced
Linux Sound Architecture (ALSA) framework, leading to use-after-free
vulnerabilities. A local attacker could use these to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2022-1048)

It was discovered that the USB Gadget file system interface in the Linux
kernel contained a use-after-free vulnerability. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2022-24958)

It was discovered that the ST21NFCA NFC driver in the Linux kernel
did not properly validate the size of certain data in EVT_TRANSACTION
events. A physically proximate attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-26490)

It was discovered that the USB SR9700 ethernet device driver for the
Linux kernel did not properly validate the length of requests from
the device. A physically proximate attacker could possibly use this
to expose sensitive information (kernel memory). (CVE-2022-26966)

It was discovered that the Xilinx USB2 device gadget driver in the
Linux kernel did not properly validate endpoint indices from the
host. A physically proximate attacker could possibly use this to
cause a denial of service (system crash). (CVE-2022-27223)

赵子轩 discovered that the 802.2 LLC type 2 driver in the Linux
kernel did not properly perform reference counting in some error
conditions. A local attacker could use this to cause a denial of
service. (CVE-2022-28356)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
  linux-image-5.14.0-1033-oem 5.14.0-1033.36
  linux-image-oem-20.04   5.14.0.1033.30
  linux-image-oem-20.04b  5.14.0.1033.30
  linux-image-oem-20.04c  5.14.0.1033.30
  linux-image-oem-20.04d  5.14.0.1033.30

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
  https://ubuntu.com/security/notices/USN-5381-1
  CVE-2022-0494, CVE-2022-0854, CVE-2022-1011, CVE-2022-1015,
  CVE-2022-1016, CVE-2022-1048, CVE-2022-24958, CVE-2022-26490,
  CVE-2022-26966, CVE-2022-27223, CVE-2022-28356

Package Information:
  https://launchpad.net/ubuntu/+source/linux-oem-5.14/5.14.0-1033.36



signature.asc
Description: PGP signature



[Bug 1926321] Re: [MIR] telegraf

2022-04-14 Thread Steve Beattie
** Tags added: sec-753

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926321

Title:
  [MIR] telegraf

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/telegraf/+bug/1926321/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1956617] Re: [MIR] protobuf-c

2022-04-14 Thread Steve Beattie
** Tags added: sec-754

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1956617

Title:
  [MIR] protobuf-c

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/protobuf-c/+bug/1956617/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1746629] Re: [MIR] libbluray

2022-04-14 Thread Steve Beattie
** Tags added: sec-751

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1746629

Title:
  [MIR] libbluray

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libbluray/+bug/1746629/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[USN-5377-1] Linux kernel (BlueField) vulnerabilities

2022-04-12 Thread Steve Beattie
==
Ubuntu Security Notice USN-5377-1
April 13, 2022

linux-bluefield vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-bluefield: Linux kernel for NVIDIA BlueField platforms

Details:

It was discovered that the network traffic control implementation in the
Linux kernel contained a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2022-1055)

Yiqi Sun and Kevin Wang discovered that the cgroups implementation in the
Linux kernel did not properly restrict access to the cgroups v1
release_agent feature. A local attacker could use this to gain
administrative privileges. (CVE-2022-0492)

Jürgen Groß discovered that the Xen subsystem within the Linux kernel did
not adequately limit the number of events driver domains (unprivileged PV
backends) could send to other guest VMs. An attacker in a driver domain
could use this to cause a denial of service in other guest VMs.
(CVE-2021-28711, CVE-2021-28712, CVE-2021-28713)

Jürgen Groß discovered that the Xen network backend driver in the Linux
kernel did not adequately limit the amount of queued packets when a guest
did not process them. An attacker in a guest VM can use this to cause a
denial of service (excessive kernel memory consumption) in the network
backend domain. (CVE-2021-28714, CVE-2021-28715)

It was discovered that the simulated networking device driver for the Linux
kernel did not properly initialize memory in certain situations. A local
attacker could use this to expose sensitive information (kernel memory).
(CVE-2021-4135)

Brendan Dolan-Gavitt discovered that the Marvell WiFi-Ex USB device driver
in the Linux kernel did not properly handle some error conditions. A
physically proximate attacker could use this to cause a denial of service
(system crash). (CVE-2021-43976)

It was discovered that the ARM Trusted Execution Environment (TEE)
subsystem in the Linux kernel contained a race condition leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service or possibly execute arbitrary code. (CVE-2021-44733)

It was discovered that the Phone Network protocol (PhoNet) implementation
in the Linux kernel did not properly perform reference counting in some
error conditions. A local attacker could possibly use this to cause a
denial of service (memory exhaustion). (CVE-2021-45095)

Wenqing Liu discovered that the f2fs file system in the Linux kernel did
not properly validate the last xattr entry in an inode. An attacker could
use this to construct a malicious f2fs image that, when mounted and
operated on, could cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2021-45469)

It was discovered that the Reliable Datagram Sockets (RDS) protocol
implementation in the Linux kernel did not properly deallocate memory in
some error conditions. A local attacker could possibly use this to cause a
denial of service (memory exhaustion). (CVE-2021-45480)

Samuel Page discovered that the Transparent Inter-Process Communication
(TIPC) protocol implementation in the Linux kernel contained a stack-based
buffer overflow. A remote attacker could use this to cause a denial of
service (system crash) for systems that have a TIPC bearer configured.
(CVE-2022-0435)

It was discovered that the IPsec implementation in the Linux kernel did not
properly allocate enough memory when performing ESP transformations,
leading to a heap-based buffer overflow. A local attacker could use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-27666)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
  linux-image-5.4.0-1032-bluefield  5.4.0-1032.35
  linux-image-bluefield   5.4.0.1032.33

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
  https://ubuntu.com/security/notices/USN-5377-1
  CVE-2021-28711, CVE-2021-28712, CVE-2021-28713, CVE-2021-28714,
  CVE-2021-28715, CVE-2021-4135, CVE-2021-43976, CVE-2021-44733,
  CVE-2021-45095, CVE-2021-45469, CVE-2021-45480, CVE-2022-0435,
  CVE-2022-0492, CVE-2022-1055, CVE-2022-27666

Package 

[Bug 1808537] Re: [bionic] ffmpeg update to 3.4.5

2022-04-12 Thread Steve Beattie
** Information type changed from Private Security to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1808537

Title:
  [bionic] ffmpeg update to 3.4.5

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ffmpeg/+bug/1808537/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

  1   2   3   4   5   6   7   8   9   10   >