[Bug 2058192] Re: [MIR] lenovo-wwan-unlock
** Tags added: sec-4736 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2058192 Title: [MIR] lenovo-wwan-unlock To manage notifications about this bug go to: https://bugs.launchpad.net/oem-priority/+bug/2058192/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2071717] Re: [MIR] linuxptp
** Tags added: sec-4733 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2071717 Title: [MIR] linuxptp To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linuxptp/+bug/2071717/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2066262] Re: [MIR] libdex
** Tags added: sec-4617 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2066262 Title: [MIR] libdex To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libdex/+bug/2066262/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2063062] [NEW] Please remove src:cryptojs ; unmaintained and deprecated upstream
Public bug reported: The cryptojs library has been deprecated by upstream https://github.com/brix/crypto-js?tab=readme-ov-file#discontinued and recommends the native javascript Crypt library. It has no reverse dependencies: $ reverse-depends src:cryptojs No reverse dependencies found $ reverse-depends -b src:cryptojs No reverse dependencies found It has been removed from debian testing https://tracker.debian.org/news/1486067/cryptojs-removed-from-testing/ and has https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056014 ** Affects: cryptojs (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2063062 Title: Please remove src:cryptojs ; unmaintained and deprecated upstream To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/cryptojs/+bug/2063062/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2060354] Re: Segfaults and assertion failures in Xorg's render/glyph.c
** Also affects: xorg-server (Ubuntu Noble) Importance: High Status: Triaged ** Also affects: xwayland (Ubuntu Noble) Importance: High Status: Triaged ** Also affects: xorg-server (Ubuntu Jammy) Importance: Undecided Status: New ** Also affects: xwayland (Ubuntu Jammy) Importance: Undecided Status: New ** Also affects: xorg-server (Ubuntu Mantic) Importance: Undecided Status: New ** Also affects: xwayland (Ubuntu Mantic) Importance: Undecided Status: New ** Also affects: xorg-server (Ubuntu Focal) Importance: Undecided Status: New ** Also affects: xwayland (Ubuntu Focal) Importance: Undecided Status: New ** Changed in: xorg-server (Ubuntu Focal) Importance: Undecided => High ** Changed in: xorg-server (Ubuntu Focal) Status: New => In Progress ** Changed in: xorg-server (Ubuntu Jammy) Importance: Undecided => High ** Changed in: xorg-server (Ubuntu Jammy) Status: New => In Progress ** Changed in: xorg-server (Ubuntu Mantic) Importance: Undecided => High ** Changed in: xorg-server (Ubuntu Mantic) Status: New => In Progress ** No longer affects: xwayland (Ubuntu Focal) ** Changed in: xwayland (Ubuntu Jammy) Importance: Undecided => High ** Changed in: xwayland (Ubuntu Jammy) Status: New => In Progress ** Changed in: xwayland (Ubuntu Mantic) Importance: Undecided => High ** Changed in: xwayland (Ubuntu Mantic) Status: New => In Progress -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2060354 Title: Segfaults and assertion failures in Xorg's render/glyph.c To manage notifications about this bug go to: https://bugs.launchpad.net/xorg-server/+bug/2060354/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2060354] Re: Segfaults and assertion failures in Xorg's render/glyph.c
I have prepared test packages for ubuntu 22.04 LTS/jammy in the https://launchpad.net/~ubuntu-security- proposed/+archive/ubuntu/ppa/+packages PPA for both xorg-server: https://launchpad.net/~ubuntu-security- proposed/+archive/ubuntu/ppa/+sourcepub/15921802/+listing-archive-extra and for xwayland: https://launchpad.net/~ubuntu-security- proposed/+archive/ubuntu/ppa/+sourcepub/15921798/+listing-archive-extra I was able to reproduce the crash under Xwayland in a jammy vm with both intellij and the glyph_memleak.c reproducer, and using the proposed upstream patch seems to address the crash, but more testing is welcome. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2060354 Title: Segfaults and assertion failures in Xorg's render/glyph.c To manage notifications about this bug go to: https://bugs.launchpad.net/xorg-server/+bug/2060354/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2060354] Re: Segfaults and assertion failures in Xorg's render/glyph.c
The reproducer https://bugs.freedesktop.org/attachment.cgi?id=28621 from the original 2009 bug report https://bugs.freedesktop.org/show_bug.cgi?id=23286 does seem to work at triggering this issue, at least under Xwalyand. ** Bug watch added: freedesktop.org Bugzilla #23286 https://bugs.freedesktop.org/show_bug.cgi?id=23286 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2060354 Title: Segfaults and assertion failures in Xorg's render/glyph.c To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xorg-server/+bug/2060354/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2060354] Re: Segfaults and assertion failures in Xorg's render/glyph.c
Are people seeing this issue with any other Ubuntu releases, which also received updates addressing CVE-2024-31083, or is this strictly affecting the version in 22.04/jammy? It looks like https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/1476 has a proposed fix, in https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/1476.patch . -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2060354 Title: Segfaults and assertion failures in Xorg's render/glyph.c To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xorg-server/+bug/2060354/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1597017] Re: mount rules grant excessive permissions
** Description changed: + SRU Team; the packages for focal-proposed and jammy-proposed are + intended as security updates prepared by the Ubuntu Security team (and + have built in a ppa with only the security pockets enabled). However, + because the fix makes mount rules in apparmor policy be treated more + restrictively than they were prior to this update, we would like these + packages to gain more widespread testing. + + Risk of Regression: + + The update for this issue causes the apparmor parser, the tool that + translates written policy into the enforcement data structures used by + the kernel, to generate more strict policy for mount rules, like the + example below. They are not common in apparmor policy generally, but can + appear in policies written for container managers to restrict + containers, and thus can potentially break container startup. + + The packages prepared for focal-proposed and jammy-proposed have tested + with the versions of snapd, lxc, libvirt, and docker in the ubuntu + archive, but conainter managers outside of the ubunty archive may run + into issues, hence the need for testing and policy adjustments. + + Original Report: + The rule - mount options=(rw,make-slave) -> **, + mount options=(rw,make-slave) -> **, ends up allowing - mount -t proc proc /mnt + mount -t proc proc /mnt which it shouldn't as it should be restricted to commands with a make- slave flag -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1597017 Title: mount rules grant excessive permissions To manage notifications about this bug go to: https://bugs.launchpad.net/apparmor/+bug/1597017/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1597017] Re: mount rules grant excessive permissions
** Also affects: apparmor (Ubuntu) Importance: Undecided Status: New ** Also affects: apparmor (Ubuntu Jammy) Importance: Undecided Status: New ** Also affects: apparmor (Ubuntu Focal) Importance: Undecided Status: New ** Changed in: apparmor (Ubuntu) Status: New => Fix Released ** Changed in: apparmor (Ubuntu Focal) Status: New => In Progress ** Changed in: apparmor (Ubuntu Jammy) Status: New => In Progress -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1597017 Title: mount rules grant excessive permissions To manage notifications about this bug go to: https://bugs.launchpad.net/apparmor/+bug/1597017/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[USN-6628-2] Linux kernel (Intel IoTG) vulnerabilities
== Ubuntu Security Notice USN-6628-2 February 15, 2024 linux-intel-iotg-5.15 vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux-intel-iotg-5.15: Linux kernel for Intel IoT platforms Details: Quentin Minster discovered that a race condition existed in the KSMBD implementation in the Linux kernel when handling sessions operations. A remote attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-32250, CVE-2023-32252, CVE-2023-32257) Marek Marczykowski-Górecki discovered that the Xen event channel infrastructure implementation in the Linux kernel contained a race condition. An attacker in a guest VM could possibly use this to cause a denial of service (paravirtualized device unavailability). (CVE-2023-34324) Zheng Wang discovered a use-after-free in the Renesas Ethernet AVB driver in the Linux kernel during device removal. A privileged attacker could use this to cause a denial of service (system crash). (CVE-2023-35827) Tom Dohrmann discovered that the Secure Encrypted Virtualization (SEV) implementation for AMD processors in the Linux kernel contained a race condition when accessing MMIO registers. A local attacker in a SEV guest VM could possibly use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-46813) It was discovered that the Microchip USB Ethernet driver in the Linux kernel contained a race condition during device removal, leading to a use- after-free vulnerability. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2023-6039) Lin Ma discovered that the netfilter subsystem in the Linux kernel did not properly validate network family support while creating a new netfilter table. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2023-6040) It was discovered that the TLS subsystem in the Linux kernel did not properly perform cryptographic operations in some situations, leading to a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-6176) It was discovered that the CIFS network file system implementation in the Linux kernel did not properly validate the server frame size in certain situation, leading to an out-of-bounds read vulnerability. An attacker could use this to construct a malicious CIFS image that, when operated on, could cause a denial of service (system crash) or possibly expose sensitive information. (CVE-2023-6606) Xingyuan Mo discovered that the netfilter subsystem in the Linux kernel did not properly handle dynset expressions passed from userspace, leading to a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service (system crash). (CVE-2023-6622) Xingyuan Mo discovered that the netfilter subsystem in the Linux kernel did not properly handle inactive elements in its PIPAPO data structure, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-6817) Budimir Markovic, Lucas De Marchi, and Pengfei Xu discovered that the perf subsystem in the Linux kernel did not properly validate all event sizes when attaching new events, leading to an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-6931) It was discovered that the IGMP protocol implementation in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-6932) Kevin Rich discovered that the netfilter subsystem in the Linux kernel did not properly check deactivated elements in certain situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2024-0193) It was discovered that the TIPC protocol implementation in the Linux kernel did not properly handle locking during tipc_crypto_key_revoke() operations. A local attacker could use this to cause a denial of service (kernel deadlock). (CVE-2024-0641) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS: linux-image-5.15.0-1048-intel-iotg 5.15.0-1048.54~20.04.1 linux-image-intel 5.15.0.1048.54~20.04.38 linux-image-intel-iotg 5.15.0.1048.54~20.04.38 After a
[USN-6639-1] Linux kernel (OEM) vulnerabilities
== Ubuntu Security Notice USN-6639-1 February 15, 2024 linux-oem-6.1 vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 22.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux-oem-6.1: Linux kernel for OEM systems Details: It was discovered that a race condition existed in the ATM (Asynchronous Transfer Mode) subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-51780) It was discovered that a race condition existed in the AppleTalk networking subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-51781) It was discovered that a race condition existed in the Rose X.25 protocol implementation in the Linux kernel, leading to a use-after- free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-51782) Alon Zahavi discovered that the NVMe-oF/TCP subsystem of the Linux kernel did not properly handle connect command payloads in certain situations, leading to an out-of-bounds read vulnerability. A remote attacker could use this to expose sensitive information (kernel memory). (CVE-2023-6121) Jann Horn discovered that a race condition existed in the Linux kernel when handling io_uring over sockets, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-6531) Xingyuan Mo discovered that the netfilter subsystem in the Linux kernel did not properly handle dynset expressions passed from userspace, leading to a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service (system crash). (CVE-2023-6622) It was discovered that the IGMP protocol implementation in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-6932) Robert Morris discovered that the CIFS network file system implementation in the Linux kernel did not properly validate certain server commands fields, leading to an out-of-bounds read vulnerability. An attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information. (CVE-2024-0565) Dan Carpenter discovered that the netfilter subsystem in the Linux kernel did not store data in properly sized memory locations. A local user could use this to cause a denial of service (system crash). (CVE-2024-0607) Jann Horn discovered that the TLS subsystem in the Linux kernel did not properly handle spliced messages, leading to an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2024-0646) Yang Chaoming discovered that the KSMBD implementation in the Linux kernel did not properly validate request buffer sizes, leading to an out-of-bounds read vulnerability. An attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information. (CVE-2024-22705) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 22.04 LTS: linux-image-6.1.0-1033-oem 6.1.0-1033.33 linux-image-oem-22.04 6.1.0.1033.34 linux-image-oem-22.04a 6.1.0.1033.34 linux-image-oem-22.04b 6.1.0.1033.34 linux-image-oem-22.04c 6.1.0.1033.34 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-6639-1 CVE-2023-51780, CVE-2023-51781, CVE-2023-51782, CVE-2023-6121, CVE-2023-6531, CVE-2023-6622, CVE-2023-6932, CVE-2024-0565, CVE-2024-0607, CVE-2024-0646, CVE-2024-22705 Package Information: https://launchpad.net/ubuntu/+source/linux-oem-6.1/6.1.0-1033.33 signature.asc Description: PGP signature
[USN-6635-1] Linux kernel (GCP) vulnerabilities
== Ubuntu Security Notice USN-6635-1 February 14, 2024 linux-gcp-6.2 vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 22.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux-gcp-6.2: Linux kernel for Google Cloud Platform (GCP) systems Details: It was discovered that the USB subsystem in the Linux kernel contained a race condition while handling device descriptors in certain situations, leading to a out-of-bounds read vulnerability. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2023-37453) Lucas Leong discovered that the netfilter subsystem in the Linux kernel did not properly validate some attributes passed from userspace. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information (kernel memory). (CVE-2023-39189) Sunjoo Park discovered that the netfilter subsystem in the Linux kernel did not properly validate u32 packets content, leading to an out-of-bounds read vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information. (CVE-2023-39192) Lucas Leong discovered that the netfilter subsystem in the Linux kernel did not properly validate SCTP data, leading to an out-of-bounds read vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information. (CVE-2023-39193) Kyle Zeng discovered that the IPv4 implementation in the Linux kernel did not properly handle socket buffers (skb) when performing IP routing in certain circumstances, leading to a null pointer dereference vulnerability. A privileged attacker could use this to cause a denial of service (system crash). (CVE-2023-42754) Jason Wang discovered that the virtio ring implementation in the Linux kernel did not properly handle iov buffers in some situations. A local attacker in a guest VM could use this to cause a denial of service (host system crash). (CVE-2023-5158) Alon Zahavi discovered that the NVMe-oF/TCP subsystem in the Linux kernel did not properly handle queue initialization failures in certain situations, leading to a use-after-free vulnerability. A remote attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-5178) Budimir Markovic discovered that the perf subsystem in the Linux kernel did not properly handle event groups, leading to an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-5717) It was discovered that the CIFS network file system implementation in the Linux kernel did not properly validate the server frame size in certain situation, leading to an out-of-bounds read vulnerability. An attacker could use this to construct a malicious CIFS image that, when operated on, could cause a denial of service (system crash) or possibly expose sensitive information. (CVE-2023-6606) Xingyuan Mo discovered that the netfilter subsystem in the Linux kernel did not properly handle inactive elements in its PIPAPO data structure, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-6817) Budimir Markovic, Lucas De Marchi, and Pengfei Xu discovered that the perf subsystem in the Linux kernel did not properly validate all event sizes when attaching new events, leading to an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-6931) It was discovered that the IGMP protocol implementation in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-6932) Kevin Rich discovered that the netfilter subsystem in the Linux kernel did not properly check deactivated elements in certain situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2024-0193) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 22.04 LTS: linux-image-6.2.0-1021-gcp 6.2.0-1021.23~22.04.1 linux-image-gcp 6.2.0.1021.23~22.04.1 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall
[USN-6608-2] Linux kernel (NVIDIA) vulnerabilities
== Ubuntu Security Notice USN-6608-2 February 14, 2024 linux-nvidia-6.2 vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 22.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux-nvidia-6.2: Linux kernel for NVIDIA systems Details: It was discovered that the CIFS network file system implementation in the Linux kernel did not properly validate the server frame size in certain situation, leading to an out-of-bounds read vulnerability. An attacker could use this to construct a malicious CIFS image that, when operated on, could cause a denial of service (system crash) or possibly expose sensitive information. (CVE-2023-6606) Xingyuan Mo discovered that the netfilter subsystem in the Linux kernel did not properly handle inactive elements in its PIPAPO data structure, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-6817) Budimir Markovic, Lucas De Marchi, and Pengfei Xu discovered that the perf subsystem in the Linux kernel did not properly validate all event sizes when attaching new events, leading to an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-6931) It was discovered that the IGMP protocol implementation in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-6932) Kevin Rich discovered that the netfilter subsystem in the Linux kernel did not properly check deactivated elements in certain situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2024-0193) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 22.04 LTS: linux-image-6.2.0-1015-nvidia 6.2.0-1015.15 linux-image-6.2.0-1015-nvidia-64k 6.2.0-1015.15 linux-image-nvidia-6.2 6.2.0.1015.17 linux-image-nvidia-64k-6.2 6.2.0.1015.17 linux-image-nvidia-64k-hwe-22.04 6.2.0.1015.17 linux-image-nvidia-hwe-22.046.2.0.1015.17 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-6608-2 https://ubuntu.com/security/notices/USN-6608-1 CVE-2023-6606, CVE-2023-6817, CVE-2023-6931, CVE-2023-6932, CVE-2024-0193 Package Information: https://launchpad.net/ubuntu/+source/linux-nvidia-6.2/6.2.0-1015.15 signature.asc Description: PGP signature
[USN-6626-2] Linux kernel vulnerabilities
== Ubuntu Security Notice USN-6626-2 February 14, 2024 linux-lowlatency, linux-raspi vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 22.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux-lowlatency: Linux low latency kernel - linux-raspi: Linux kernel for Raspberry Pi systems Details: Quentin Minster discovered that a race condition existed in the KSMBD implementation in the Linux kernel when handling sessions operations. A remote attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-32250, CVE-2023-32252, CVE-2023-32257) Marek Marczykowski-Górecki discovered that the Xen event channel infrastructure implementation in the Linux kernel contained a race condition. An attacker in a guest VM could possibly use this to cause a denial of service (paravirtualized device unavailability). (CVE-2023-34324) Zheng Wang discovered a use-after-free in the Renesas Ethernet AVB driver in the Linux kernel during device removal. A privileged attacker could use this to cause a denial of service (system crash). (CVE-2023-35827) Tom Dohrmann discovered that the Secure Encrypted Virtualization (SEV) implementation for AMD processors in the Linux kernel contained a race condition when accessing MMIO registers. A local attacker in a SEV guest VM could possibly use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-46813) It was discovered that the Microchip USB Ethernet driver in the Linux kernel contained a race condition during device removal, leading to a use- after-free vulnerability. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2023-6039) It was discovered that the TLS subsystem in the Linux kernel did not properly perform cryptographic operations in some situations, leading to a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-6176) Xingyuan Mo discovered that the netfilter subsystem in the Linux kernel did not properly handle dynset expressions passed from userspace, leading to a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service (system crash). (CVE-2023-6622) It was discovered that the TIPC protocol implementation in the Linux kernel did not properly handle locking during tipc_crypto_key_revoke() operations. A local attacker could use this to cause a denial of service (kernel deadlock). (CVE-2024-0641) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 22.04 LTS: linux-image-5.15.0-1046-raspi 5.15.0-1046.49 linux-image-5.15.0-94-lowlatency 5.15.0-94.104 linux-image-5.15.0-94-lowlatency-64k 5.15.0-94.104 linux-image-lowlatency 5.15.0.94.94 linux-image-lowlatency-64k 5.15.0.94.94 linux-image-raspi 5.15.0.1046.44 linux-image-raspi-nolpae5.15.0.1046.44 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-6626-2 https://ubuntu.com/security/notices/USN-6626-1 CVE-2023-32250, CVE-2023-32252, CVE-2023-32257, CVE-2023-34324, CVE-2023-35827, CVE-2023-46813, CVE-2023-6039, CVE-2023-6176, CVE-2023-6622, CVE-2024-0641 Package Information: https://launchpad.net/ubuntu/+source/linux-lowlatency/5.15.0-94.104 https://launchpad.net/ubuntu/+source/linux-raspi/5.15.0-1046.49 signature.asc Description: PGP signature
[USN-6528-1] OpenJDK 8 vulnerabilities
== Ubuntu Security Notice USN-6528-1 November 29, 2023 openjdk-8 vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 23.10 - Ubuntu 23.04 - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS (Available with Ubuntu Pro) - Ubuntu 16.04 LTS (Available with Ubuntu Pro) Summary: Several security issues were fixed in OpenJDK. Software Description: - openjdk-8: Open Source Java implementation Details: It was discovered that the HotSpot VM implementation in OpenJDK did not properly validate bytecode blocks in certain situations. An attacker could possibly use this to cause a denial of service. (CVE-2022-40433) Carter Kozak discovered that OpenJDK, when compiling with AVX-512 instruction support enabled, could produce code that resulted in memory corruption in certain situations. An attacker targeting applications built in this way could possibly use this to cause a denial of service or execute arbitrary code. In Ubuntu, OpenJDK defaults to not using AVX-512 instructions. (CVE-2023-22025) It was discovered that the CORBA implementation in OpenJDK did not properly perform deserialization of IOR string objects. An attacker could possibly use this to bypass Java sandbox restrictions. (CVE-2023-22067) It was discovered that OpenJDK did not properly perform PKIX certification path validation in certain situations. An attacker could use this to cause a denial of service. (CVE-2023-22081) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 23.10: openjdk-8-jdk 8u392-ga-1~23.10 openjdk-8-jdk-headless 8u392-ga-1~23.10 openjdk-8-jre 8u392-ga-1~23.10 openjdk-8-jre-headless 8u392-ga-1~23.10 openjdk-8-jre-zero 8u392-ga-1~23.10 Ubuntu 23.04: openjdk-8-jdk 8u392-ga-1~23.04 openjdk-8-jdk-headless 8u392-ga-1~23.04 openjdk-8-jre 8u392-ga-1~23.04 openjdk-8-jre-headless 8u392-ga-1~23.04 openjdk-8-jre-zero 8u392-ga-1~23.04 Ubuntu 22.04 LTS: openjdk-8-jdk 8u392-ga-1~22.04 openjdk-8-jdk-headless 8u392-ga-1~22.04 openjdk-8-jre 8u392-ga-1~22.04 openjdk-8-jre-headless 8u392-ga-1~22.04 openjdk-8-jre-zero 8u392-ga-1~22.04 Ubuntu 20.04 LTS: openjdk-8-jdk 8u392-ga-1~20.04 openjdk-8-jdk-headless 8u392-ga-1~20.04 openjdk-8-jre 8u392-ga-1~20.04 openjdk-8-jre-headless 8u392-ga-1~20.04 openjdk-8-jre-zero 8u392-ga-1~20.04 Ubuntu 18.04 LTS (Available with Ubuntu Pro): openjdk-8-jdk 8u392-ga-1~18.04 openjdk-8-jdk-headless 8u392-ga-1~18.04 openjdk-8-jre 8u392-ga-1~18.04 openjdk-8-jre-headless 8u392-ga-1~18.04 openjdk-8-jre-zero 8u392-ga-1~18.04 Ubuntu 16.04 LTS (Available with Ubuntu Pro): openjdk-8-jdk 8u392-ga-1~16.04 openjdk-8-jdk-headless 8u392-ga-1~16.04 openjdk-8-jre 8u392-ga-1~16.04 openjdk-8-jre-headless 8u392-ga-1~16.04 openjdk-8-jre-jamvm 8u392-ga-1~16.04 openjdk-8-jre-zero 8u392-ga-1~16.04 This update uses a new upstream release, which includes additional bug fixes. After a standard system update you need to restart any Java applications to make all the necessary changes. References: https://ubuntu.com/security/notices/USN-6528-1 CVE-2022-40433, CVE-2023-22025, CVE-2023-22067, CVE-2023-22081 Package Information: https://launchpad.net/ubuntu/+source/openjdk-8/8u392-ga-1~23.10 https://launchpad.net/ubuntu/+source/openjdk-8/8u392-ga-1~23.04 https://launchpad.net/ubuntu/+source/openjdk-8/8u392-ga-1~22.04 https://launchpad.net/ubuntu/+source/openjdk-8/8u392-ga-1~20.04 signature.asc Description: PGP signature
[USN-6527-1] OpenJDK vulnerabilities
== Ubuntu Security Notice USN-6527-1 November 29, 2023 openjdk-17, openjdk-21, openjdk-lts vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 23.10 - Ubuntu 23.04 - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS (Available with Ubuntu Pro) Summary: Several security issues were fixed in OpenJDK 17, OpenJDK 21, OpenJDK. Software Description: - openjdk-17: Open Source Java implementation - openjdk-21: Open Source Java implementation - openjdk-lts: Open Source Java implementation Details: Carter Kozak discovered that OpenJDK, when compiling with AVX-512 instruction support enabled, could produce code that resulted in memory corruption in certain situations. An attacker targeting applications built in this way could possibly use this to cause a denial of service or execute arbitrary code. In Ubuntu, OpenJDK defaults to not using AVX-512 instructions. (CVE-2023-22025) It was discovered that OpenJDK did not properly perform PKIX certification path validation in certain situations. An attacker could use this to cause a denial of service. (CVE-2023-22081) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 23.10: openjdk-11-jdk 11.0.21+9-0ubuntu1~23.10 openjdk-11-jdk-headless 11.0.21+9-0ubuntu1~23.10 openjdk-11-jre 11.0.21+9-0ubuntu1~23.10 openjdk-11-jre-headless 11.0.21+9-0ubuntu1~23.10 openjdk-11-jre-zero 11.0.21+9-0ubuntu1~23.10 openjdk-17-jdk 17.0.9+9-1~23.10 openjdk-17-jdk-headless 17.0.9+9-1~23.10 openjdk-17-jre 17.0.9+9-1~23.10 openjdk-17-jre-headless 17.0.9+9-1~23.10 openjdk-17-jre-zero 17.0.9+9-1~23.10 openjdk-21-jdk 21.0.1+12-2~23.10 openjdk-21-jdk-headless 21.0.1+12-2~23.10 openjdk-21-jre 21.0.1+12-2~23.10 openjdk-21-jre-headless 21.0.1+12-2~23.10 openjdk-21-jre-zero 21.0.1+12-2~23.10 Ubuntu 23.04: openjdk-11-jdk 11.0.21+9-0ubuntu1~23.04 openjdk-11-jdk-headless 11.0.21+9-0ubuntu1~23.04 openjdk-11-jre 11.0.21+9-0ubuntu1~23.04 openjdk-11-jre-headless 11.0.21+9-0ubuntu1~23.04 openjdk-11-jre-zero 11.0.21+9-0ubuntu1~23.04 openjdk-17-jdk 17.0.9+9-1~23.04 openjdk-17-jdk-headless 17.0.9+9-1~23.04 openjdk-17-jre 17.0.9+9-1~23.04 openjdk-17-jre-headless 17.0.9+9-1~23.04 openjdk-17-jre-zero 17.0.9+9-1~23.04 openjdk-21-jdk 21.0.1+12-2~23.04 openjdk-21-jdk-headless 21.0.1+12-2~23.04 openjdk-21-jre 21.0.1+12-2~23.04 openjdk-21-jre-headless 21.0.1+12-2~23.04 openjdk-21-jre-zero 21.0.1+12-2~23.04 Ubuntu 22.04 LTS: openjdk-11-jdk 11.0.21+9-0ubuntu1~22.04 openjdk-11-jdk-headless 11.0.21+9-0ubuntu1~22.04 openjdk-11-jre 11.0.21+9-0ubuntu1~22.04 openjdk-11-jre-headless 11.0.21+9-0ubuntu1~22.04 openjdk-11-jre-zero 11.0.21+9-0ubuntu1~22.04 openjdk-17-jdk 17.0.9+9-1~22.04 openjdk-17-jdk-headless 17.0.9+9-1~22.04 openjdk-17-jre 17.0.9+9-1~22.04 openjdk-17-jre-headless 17.0.9+9-1~22.04 openjdk-17-jre-zero 17.0.9+9-1~22.04 Ubuntu 20.04 LTS: openjdk-11-jdk 11.0.21+9-0ubuntu1~20.04 openjdk-11-jdk-headless 11.0.21+9-0ubuntu1~20.04 openjdk-11-jre 11.0.21+9-0ubuntu1~20.04 openjdk-11-jre-headless 11.0.21+9-0ubuntu1~20.04 openjdk-11-jre-zero 11.0.21+9-0ubuntu1~20.04 openjdk-17-jdk 17.0.9+9-1~20.04 openjdk-17-jdk-headless 17.0.9+9-1~20.04 openjdk-17-jre 17.0.9+9-1~20.04 openjdk-17-jre-headless 17.0.9+9-1~20.04 openjdk-17-jre-zero 17.0.9+9-1~20.04 Ubuntu 18.04 LTS (Available with Ubuntu Pro): openjdk-11-jdk 11.0.21+9-0ubuntu1~18.04 openjdk-11-jdk-headless 11.0.21+9-0ubuntu1~18.04 openjdk-11-jre 11.0.21+9-0ubuntu1~18.04 openjdk-11-jre-headless 11.0.21+9-0ubuntu1~18.04 openjdk-11-jre-zero 11.0.21+9-0ubuntu1~18.04 openjdk-17-jdk 17.0.9+9-1~18.04 openjdk-17-jdk-headless 17.0.9+9-1~18.04 openjdk-17-jre 17.0.9+9-1~18.04 openjdk-17-jre-headless 17.0.9+9-1~18.04 openjdk-17-jre-zero 17.0.9+9-1~18.04 This update uses a new upstream release, which includes additional bug fixes. After a standard system update you need to restart any Java applications to make all the necessary changes. References:
[USN-6454-4] Linux kernel (StarFive) vulnerabilities
== Ubuntu Security Notice USN-6454-4 November 01, 2023 linux-starfive vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 23.10 Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux-starfive: Linux kernel for StarFive processors Details: Kyle Zeng discovered that the netfilter subsystem in the Linux kernel contained a race condition in IP set operations in certain situations. A local attacker could use this to cause a denial of service (system crash). (CVE-2023-42756) Alex Birnberg discovered that the netfilter subsystem in the Linux kernel did not properly validate register length, leading to an out-of-bounds write vulnerability. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2023-4881) It was discovered that the Quick Fair Queueing scheduler implementation in the Linux kernel did not properly handle network packets in certain conditions, leading to a use after free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-4921) Kevin Rich discovered that the netfilter subsystem in the Linux kernel did not properly handle removal of rules from chain bindings in certain circumstances, leading to a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2023-5197) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 23.10: linux-image-6.5.0-1003-starfive 6.5.0-1003.4 linux-image-starfive6.5.0.1003.5 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-6454-4 https://ubuntu.com/security/notices/USN-6454-1 CVE-2023-42756, CVE-2023-4881, CVE-2023-4921, CVE-2023-5197 Package Information: https://launchpad.net/ubuntu/+source/linux-starfive/6.5.0-1003.4 signature.asc Description: PGP signature
[USN-6339-2] Linux kernel vulnerabilities
== Ubuntu Security Notice USN-6339-2 September 08, 2023 linux-gcp-5.15, linux-gkeop-5.15 vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux-gcp-5.15: Linux kernel for Google Cloud Platform (GCP) systems - linux-gkeop-5.15: Linux kernel for Google Container Engine (GKE) systems Details: It was discovered that the NTFS file system implementation in the Linux kernel did not properly validate MFT flags in certain situations. An attacker could use this to construct a malicious NTFS image that, when mounted and operated on, could cause a denial of service (system crash). (CVE-2022-48425) Zi Fan Tan discovered that the binder IPC implementation in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-21255) It was discovered that a race condition existed in the f2fs file system in the Linux kernel, leading to a null pointer dereference vulnerability. An attacker could use this to construct a malicious f2fs image that, when mounted and operated on, could cause a denial of service (system crash). (CVE-2023-2898) It was discovered that the DVB Core driver in the Linux kernel did not properly handle locking events in certain situations. A local attacker could use this to cause a denial of service (kernel deadlock). (CVE-2023-31084) Yang Lan discovered that the GFS2 file system implementation in the Linux kernel could attempt to dereference a null pointer in some situations. An attacker could use this to construct a malicious GFS2 image that, when mounted and operated on, could cause a denial of service (system crash). (CVE-2023-3212) It was discovered that the KSMBD implementation in the Linux kernel did not properly validate buffer sizes in certain operations, leading to an out-of- bounds read vulnerability. A remote attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information. (CVE-2023-38426, CVE-2023-38428) It was discovered that the KSMBD implementation in the Linux kernel did not properly calculate the size of certain buffers. A remote attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-38429) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS: linux-image-5.15.0-1027-gkeop 5.15.0-1027.32~20.04.1 linux-image-5.15.0-1041-gcp 5.15.0-1041.49~20.04.1 linux-image-gcp 5.15.0.1041.49~20.04.1 linux-image-gkeop-5.15 5.15.0.1027.32~20.04.23 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-6339-2 https://ubuntu.com/security/notices/USN-6339-1 CVE-2022-48425, CVE-2023-21255, CVE-2023-2898, CVE-2023-31084, CVE-2023-3212, CVE-2023-38426, CVE-2023-38428, CVE-2023-38429 Package Information: https://launchpad.net/ubuntu/+source/linux-gcp-5.15/5.15.0-1041.49~20.04.1 https://launchpad.net/ubuntu/+source/linux-gkeop-5.15/5.15.0-1027.32~20.04.1 signature.asc Description: PGP signature
[USN-6342-2] Linux kernel (Azure) vulnerabilities
== Ubuntu Security Notice USN-6342-2 September 08, 2023 linux-azure, linux-azure-4.15 vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 18.04 LTS (Available with Ubuntu Pro) - Ubuntu 16.04 LTS (Available with Ubuntu Pro) - Ubuntu 14.04 LTS (Available with Ubuntu Pro) Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux-azure-4.15: Linux kernel for Microsoft Azure Cloud systems - linux-azure: Linux kernel for Microsoft Azure Cloud systems Details: Tavis Ormandy discovered that some AMD processors did not properly handle speculative execution of certain vector register instructions. A local attacker could use this to expose sensitive information. (CVE-2023-20593) Zheng Zhang discovered that the device-mapper implementation in the Linux kernel did not properly handle locking during table_clear() operations. A local attacker could use this to cause a denial of service (kernel deadlock). (CVE-2023-2269) It was discovered that a use-after-free vulnerability existed in the HFS+ file system implementation in the Linux kernel. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2023-2985) It was discovered that the DVB Core driver in the Linux kernel did not properly handle locking events in certain situations. A local attacker could use this to cause a denial of service (kernel deadlock). (CVE-2023-31084) It was discovered that the Quick Fair Queueing network scheduler implementation in the Linux kernel contained an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-3611) It was discovered that the network packet classifier with netfilter/firewall marks implementation in the Linux kernel did not properly handle reference counting, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-3776) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 18.04 LTS (Available with Ubuntu Pro): linux-image-4.15.0-1169-azure 4.15.0-1169.184 linux-image-azure-lts-18.04 4.15.0.1169.137 Ubuntu 16.04 LTS (Available with Ubuntu Pro): linux-image-4.15.0-1169-azure 4.15.0-1169.184~16.04.1 linux-image-azure 4.15.0.1169.153 Ubuntu 14.04 LTS (Available with Ubuntu Pro): linux-image-4.15.0-1169-azure 4.15.0-1169.184~14.04.1 linux-image-azure 4.15.0.1169.135 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-6342-2 https://ubuntu.com/security/notices/USN-6342-1 CVE-2023-20593, CVE-2023-2269, CVE-2023-2985, CVE-2023-31084, CVE-2023-3611, CVE-2023-3776 signature.asc Description: PGP signature
[USN-6340-2] Linux kernel vulnerabilities
== Ubuntu Security Notice USN-6340-2 September 08, 2023 linux-azure-5.4, linux-gcp-5.4, linux-gkeop, linux-raspi, linux-raspi-5.4, linux-xilinx-zynqmp vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS (Available with Ubuntu Pro) Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux-gkeop: Linux kernel for Google Container Engine (GKE) systems - linux-raspi: Linux kernel for Raspberry Pi systems - linux-xilinx-zynqmp: Linux kernel for Xilinx ZynqMP processors - linux-azure-5.4: Linux kernel for Microsoft Azure cloud systems - linux-gcp-5.4: Linux kernel for Google Cloud Platform (GCP) systems - linux-raspi-5.4: Linux kernel for Raspberry Pi systems Details: Ruihan Li discovered that the bluetooth subsystem in the Linux kernel did not properly perform permissions checks when handling HCI sockets. A physically proximate attacker could use this to cause a denial of service (bluetooth communication). (CVE-2023-2002) Zi Fan Tan discovered that the binder IPC implementation in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-21255) Juan Jose Lopez Jaimez, Meador Inge, Simon Scannell, and Nenad Stojanovski discovered that the BPF verifier in the Linux kernel did not properly mark registers for precision tracking in certain situations, leading to an out- of-bounds access vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-2163) Zheng Zhang discovered that the device-mapper implementation in the Linux kernel did not properly handle locking during table_clear() operations. A local attacker could use this to cause a denial of service (kernel deadlock). (CVE-2023-2269) It was discovered that the DVB Core driver in the Linux kernel did not properly handle locking events in certain situations. A local attacker could use this to cause a denial of service (kernel deadlock). (CVE-2023-31084) It was discovered that the kernel->user space relay implementation in the Linux kernel did not properly perform certain buffer calculations, leading to an out-of-bounds read vulnerability. A local attacker could use this to cause a denial of service (system crash) or expose sensitive information (kernel memory). (CVE-2023-3268) It was discovered that the video4linux driver for Philips based TV cards in the Linux kernel contained a race condition during device removal, leading to a use-after-free vulnerability. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-35823) It was discovered that the SDMC DM1105 PCI device driver in the Linux kernel contained a race condition during device removal, leading to a use- after-free vulnerability. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-35824) It was discovered that the Renesas USB controller driver in the Linux kernel contained a race condition during device removal, leading to a use- after-free vulnerability. A privileged attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-35828) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS: linux-image-5.4.0-1029-xilinx-zynqmp 5.4.0-1029.33 linux-image-5.4.0-1076-gkeop5.4.0-1076.80 linux-image-5.4.0-1093-raspi5.4.0-1093.104 linux-image-gkeop 5.4.0.1076.74 linux-image-gkeop-5.4 5.4.0.1076.74 linux-image-raspi 5.4.0.1093.123 linux-image-raspi-hwe-18.04 5.4.0.1093.123 linux-image-raspi2 5.4.0.1093.123 linux-image-raspi2-hwe-18.045.4.0.1093.123 linux-image-xilinx-zynqmp 5.4.0.1029.31 Ubuntu 18.04 LTS (Available with Ubuntu Pro): linux-image-5.4.0-1093-raspi5.4.0-1093.104~18.04.1 linux-image-5.4.0-1112-gcp 5.4.0-1112.121~18.04.1 linux-image-5.4.0-1115-azure5.4.0-1115.122~18.04.1 linux-image-azure 5.4.0.1115.88 linux-image-gcp 5.4.0.1112.88 linux-image-raspi-hwe-18.04 5.4.0.1093.90 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
[USN-6338-2] Linux kernel vulnerabilities
== Ubuntu Security Notice USN-6338-2 September 08, 2023 linux-gcp, linux-gcp-6.2, linux-ibm, linux-oracle, linux-starfive vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 23.04 - Ubuntu 22.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems - linux-ibm: Linux kernel for IBM cloud systems - linux-oracle: Linux kernel for Oracle Cloud systems - linux-starfive: Linux kernel for StarFive processors - linux-gcp-6.2: Linux kernel for Google Cloud Platform (GCP) systems Details: Zi Fan Tan discovered that the binder IPC implementation in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-21255) It was discovered that a race condition existed in the f2fs file system in the Linux kernel, leading to a null pointer dereference vulnerability. An attacker could use this to construct a malicious f2fs image that, when mounted and operated on, could cause a denial of service (system crash). (CVE-2023-2898) It was discovered that the DVB Core driver in the Linux kernel did not properly handle locking events in certain situations. A local attacker could use this to cause a denial of service (kernel deadlock). (CVE-2023-31084) Quentin Minster discovered that the KSMBD implementation in the Linux kernel did not properly handle session setup requests. A remote attacker could possibly use this to cause a denial of service (memory exhaustion). (CVE-2023-32247) Quentin Minster discovered that a race condition existed in the KSMBD implementation in the Linux kernel when handling sessions operations. A remote attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-32250, CVE-2023-32252, CVE-2023-32257) It was discovered that a race condition existed in the KSMBD implementation in the Linux kernel when handling session connections, leading to a use- after-free vulnerability. A remote attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-32258) It was discovered that the KSMBD implementation in the Linux kernel did not properly validate buffer sizes in certain operations, leading to an out-of- bounds read vulnerability. A remote attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information. (CVE-2023-38426, CVE-2023-38428) It was discovered that the KSMBD implementation in the Linux kernel did not properly calculate the size of certain buffers. A remote attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-38429) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 23.04: linux-image-6.2.0-1004-starfive 6.2.0-1004.5 linux-image-6.2.0-1009-ibm 6.2.0-1009.9 linux-image-6.2.0-1011-oracle 6.2.0-1011.11 linux-image-6.2.0-1013-gcp 6.2.0-1013.13 linux-image-gcp 6.2.0.1013.13 linux-image-ibm 6.2.0.1009.9 linux-image-oracle 6.2.0.1011.11 linux-image-starfive6.2.0.1004.7 Ubuntu 22.04 LTS: linux-image-6.2.0-1013-gcp 6.2.0-1013.13~22.04.1 linux-image-gcp 6.2.0.1013.13~22.04.1 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-6338-2 https://ubuntu.com/security/notices/USN-6338-1 CVE-2023-21255, CVE-2023-2898, CVE-2023-31084, CVE-2023-32247, CVE-2023-32250, CVE-2023-32252, CVE-2023-32257, CVE-2023-32258, CVE-2023-38426, CVE-2023-38428, CVE-2023-38429 Package Information: https://launchpad.net/ubuntu/+source/linux-gcp/6.2.0-1013.13 https://launchpad.net/ubuntu/+source/linux-ibm/6.2.0-1009.9 https://launchpad.net/ubuntu/+source/linux-oracle/6.2.0-1011.11 https://launchpad.net/ubuntu/+source/linux-starfive/6.2.0-1004.5 https://launchpad.net/ubuntu/+source/linux-gcp-6.2/6.2.0-1013.13~22.04.1 signature.asc Description: PGP signature
[USN-5804-1] Linux kernel vulnerabilities
== Ubuntu Security Notice USN-5804-1 January 13, 2023 linux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15, linux-gcp, linux-gcp-5.4, linux-hwe, linux-ibm, linux-kvm, linux-oracle, linux-oracle-5.4, vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS - Ubuntu 16.04 ESM - Ubuntu 14.04 ESM Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems - linux-ibm: Linux kernel for IBM cloud systems - linux-kvm: Linux kernel for cloud environments - linux-oracle: Linux kernel for Oracle Cloud systems - linux-azure-4.15: Linux kernel for Microsoft Azure Cloud systems - linux-gcp-5.4: Linux kernel for Google Cloud Platform (GCP) systems - linux-oracle-5.4: Linux kernel for Oracle Cloud systems - linux-aws-hwe: Linux kernel for Amazon Web Services (AWS-HWE) systems - linux-hwe: Linux hardware enablement (HWE) kernel - linux-azure: Linux kernel for Microsoft Azure Cloud systems Details: It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-43945) Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-42896) It was discovered that the Xen netback driver in the Linux kernel did not properly handle packets structured in certain ways. An attacker in a guest VM could possibly use this to cause a denial of service (host NIC availability). (CVE-2022-3643) It was discovered that an integer overflow vulnerability existed in the Bluetooth subsystem in the Linux kernel. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2022-45934) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS: linux-image-5.4.0-1042-ibm 5.4.0-1042.47 linux-image-5.4.0-1084-kvm 5.4.0-1084.90 linux-image-5.4.0-1092-oracle 5.4.0-1092.101 linux-image-5.4.0-1094-aws 5.4.0-1094.102 linux-image-5.4.0-1098-gcp 5.4.0-1098.107 linux-image-5.4.0-137-generic 5.4.0-137.154 linux-image-5.4.0-137-generic-lpae 5.4.0-137.154 linux-image-5.4.0-137-lowlatency 5.4.0-137.154 linux-image-aws-lts-20.04 5.4.0.1094.91 linux-image-gcp-lts-20.04 5.4.0.1098.100 linux-image-generic 5.4.0.137.135 linux-image-generic-lpae5.4.0.137.135 linux-image-ibm 5.4.0.1042.68 linux-image-ibm-lts-20.04 5.4.0.1042.68 linux-image-kvm 5.4.0.1084.78 linux-image-lowlatency 5.4.0.137.135 linux-image-oem 5.4.0.137.135 linux-image-oem-osp15.4.0.137.135 linux-image-oracle-lts-20.045.4.0.1092.85 linux-image-virtual 5.4.0.137.135 Ubuntu 18.04 LTS: linux-image-4.15.0-1134-kvm 4.15.0-1134.139 linux-image-4.15.0-1159-azure 4.15.0-1159.174 linux-image-4.15.0-202-generic 4.15.0-202.213 linux-image-4.15.0-202-generic-lpae 4.15.0-202.213 linux-image-4.15.0-202-lowlatency 4.15.0-202.213 linux-image-5.4.0-1092-oracle 5.4.0-1092.101~18.04.1 linux-image-5.4.0-1098-gcp 5.4.0-1098.107~18.04.1 linux-image-azure-lts-18.04 4.15.0.1159.127 linux-image-gcp 5.4.0.1098.74 linux-image-generic 4.15.0.202.185 linux-image-generic-lpae4.15.0.202.185 linux-image-kvm 4.15.0.1134.125 linux-image-lowlatency 4.15.0.202.185 linux-image-oracle 5.4.0.1092.101~18.04.66 linux-image-virtual 4.15.0.202.185 Ubuntu 16.04 ESM: linux-image-4.15.0-1143-gcp 4.15.0-1143.159~16.04.1 linux-image-4.15.0-1148-aws-hwe 4.15.0-1148.160~16.04.1 linux-image-4.15.0-202-generic 4.15.0-202.213~16.04.1 linux-image-4.15.0-202-lowlatency 4.15.0-202.213~16.04.1 linux-image-aws-hwe 4.15.0.1148.133 linux-image-gcp 4.15.0.1143.135 linux-image-generic-hwe-16.04 4.15.0.202.187 linux-image-gke 4.15.0.1143.135 linux-image-lowlatency-hwe-16.04 4.15.0.202.187 linux-image-oem 4.15.0.202.187 linux-image-virtual-hwe-16.04 4.15.0.202.187 Ubuntu 14.04 ESM: linux-image-4.15.0-1159-azure 4.15.0-1159.174~14.04.1 linux-image-azure 4.15.0.1159.126 After a standard system update you need to
[USN-5803-1] Linux kernel vulnerabilities
== Ubuntu Security Notice USN-5803-1 January 13, 2023 linux, linux-aws, linux-aws-5.15, linux-azure, linux-azure-5.15, linux-gcp, linux-gcp-5.15, linux-hwe-5.15, linux-ibm, linux-kvm, linux-oracle, linux-raspi, vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 22.10 - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems - linux-ibm: Linux kernel for IBM cloud systems - linux-kvm: Linux kernel for cloud environments - linux-oracle: Linux kernel for Oracle Cloud systems - linux-azure: Linux kernel for Microsoft Azure Cloud systems - linux-raspi: Linux kernel for Raspberry Pi systems - linux-aws-5.15: Linux kernel for Amazon Web Services (AWS) systems - linux-azure-5.15: Linux kernel for Microsoft Azure cloud systems - linux-gcp-5.15: Linux kernel for Google Cloud Platform (GCP) systems - linux-hwe-5.15: Linux hardware enablement (HWE) kernel Details: Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-4378) Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-42896) It was discovered that the Xen netback driver in the Linux kernel did not properly handle packets structured in certain ways. An attacker in a guest VM could possibly use this to cause a denial of service (host NIC availability). (CVE-2022-3643) It was discovered that an integer overflow vulnerability existed in the Bluetooth subsystem in the Linux kernel. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2022-45934) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 22.10: linux-image-5.19.0-1015-gcp 5.19.0-1015.16 linux-image-5.19.0-1015-ibm 5.19.0-1015.16 linux-image-5.19.0-1015-oracle 5.19.0-1015.17 linux-image-5.19.0-1016-kvm 5.19.0-1016.17 linux-image-5.19.0-1017-aws 5.19.0-1017.18 linux-image-5.19.0-29-generic 5.19.0-29.30 linux-image-5.19.0-29-generic-64k 5.19.0-29.30 linux-image-5.19.0-29-generic-lpae 5.19.0-29.30 linux-image-aws 5.19.0.1017.14 linux-image-gcp 5.19.0.1015.12 linux-image-generic 5.19.0.29.26 linux-image-generic-64k 5.19.0.29.26 linux-image-generic-lpae5.19.0.29.26 linux-image-ibm 5.19.0.1015.12 linux-image-kvm 5.19.0.1016.13 linux-image-oem-22.04 5.19.0.29.26 linux-image-oracle 5.19.0.1015.12 linux-image-virtual 5.19.0.29.26 Ubuntu 22.04 LTS: linux-image-5.15.0-1023-ibm 5.15.0-1023.26 linux-image-5.15.0-1023-raspi 5.15.0-1023.25 linux-image-5.15.0-1023-raspi-nolpae 5.15.0-1023.25 linux-image-5.15.0-1026-kvm 5.15.0-1026.31 linux-image-5.15.0-1027-gcp 5.15.0-1027.34 linux-image-5.15.0-1027-oracle 5.15.0-1027.33 linux-image-5.15.0-1028-aws 5.15.0-1028.32 linux-image-5.15.0-1031-azure 5.15.0-1031.38 linux-image-5.15.0-58-generic 5.15.0-58.64 linux-image-5.15.0-58-generic-64k 5.15.0-58.64 linux-image-5.15.0-58-generic-lpae 5.15.0-58.64 linux-image-aws 5.15.0.1028.26 linux-image-aws-lts-22.04 5.15.0.1028.26 linux-image-azure 5.15.0.1031.27 linux-image-azure-lts-22.04 5.15.0.1031.27 linux-image-gcp 5.15.0.1027.22 linux-image-generic 5.15.0.58.56 linux-image-generic-64k 5.15.0.58.56 linux-image-generic-64k-hwe-22.04 5.15.0.58.56 linux-image-generic-hwe-22.04 5.15.0.58.56 linux-image-generic-lpae5.15.0.58.56 linux-image-generic-lpae-hwe-22.04 5.15.0.58.56 linux-image-ibm 5.15.0.1023.19 linux-image-kvm 5.15.0.1026.22 linux-image-oem-20.04 5.15.0.58.56 linux-image-oracle 5.15.0.1027.22 linux-image-raspi 5.15.0.1023.20 linux-image-raspi-nolpae5.15.0.1023.20 linux-image-virtual 5.15.0.58.56 linux-image-virtual-hwe-22.04 5.15.0.58.56 Ubuntu 20.04 LTS: linux-image-5.15.0-1027-gcp 5.15.0-1027.34~20.04.1 linux-image-5.15.0-1028-aws 5.15.0-1028.32~20.04.1 linux-image-5.15.0-1031-azure 5.15.0-1031.38~20.04.1 linux-image-5.15.0-58-generic
[USN-5755-2] Linux kernel vulnerabilities
== Ubuntu Security Notice USN-5755-2 December 02, 2022 linux-gcp-5.15, linux-gke, linux-gke-5.15 vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux-gke: Linux kernel for Google Container Engine (GKE) systems - linux-gcp-5.15: Linux kernel for Google Cloud Platform (GCP) systems - linux-gke-5.15: Linux kernel for Google Container Engine (GKE) systems Details: It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-43945) Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-42703) It was discovered that a memory leak existed in the IPv6 implementation of the Linux kernel. A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2022-3524) It was discovered that a race condition existed in the Bluetooth subsystem in the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-3564) It was discovered that the ISDN implementation of the Linux kernel contained a use-after-free vulnerability. A privileged user could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-3565) It was discovered that the TCP implementation in the Linux kernel contained a data race condition. An attacker could possibly use this to cause undesired behaviors. (CVE-2022-3566) It was discovered that the IPv6 implementation in the Linux kernel contained a data race condition. An attacker could possibly use this to cause undesired behaviors. (CVE-2022-3567) It was discovered that the Realtek RTL8152 USB Ethernet adapter driver in the Linux kernel did not properly handle certain error conditions. A local attacker with physical access could plug in a specially crafted USB device to cause a denial of service (memory exhaustion). (CVE-2022-3594) It was discovered that a null pointer dereference existed in the NILFS2 file system implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2022-3621) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 22.04 LTS: linux-image-5.15.0-1023-gke 5.15.0-1023.28 linux-image-gke 5.15.0.1023.22 linux-image-gke-5.155.15.0.1023.22 Ubuntu 20.04 LTS: linux-image-5.15.0-1023-gke 5.15.0-1023.28~20.04.2 linux-image-5.15.0-1025-gcp 5.15.0-1025.32~20.04.2 linux-image-gcp 5.15.0.1025.32~20.04.1 linux-image-gke-5.155.15.0.1023.28~20.04.1 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-5755-2 https://ubuntu.com/security/notices/USN-5755-1 CVE-2022-3524, CVE-2022-3564, CVE-2022-3565, CVE-2022-3566, CVE-2022-3567, CVE-2022-3594, CVE-2022-3621, CVE-2022-42703, CVE-2022-43945 Package Information: https://launchpad.net/ubuntu/+source/linux-gke/5.15.0-1023.28 https://launchpad.net/ubuntu/+source/linux-gcp-5.15/5.15.0-1025.32~20.04.2 https://launchpad.net/ubuntu/+source/linux-gke-5.15/5.15.0-1023.28~20.04.2 signature.asc Description: PGP signature
[USN-5728-1] Linux kernel vulnerabilities
== Ubuntu Security Notice USN-5728-1 November 17, 2022 linux, linux-aws, linux-aws-5.4, linux-azure, linux-azure-5.4, linux-bluefield, linux-gcp, linux-hwe-5.4, linux-ibm, linux-ibm-5.4, linux-kvm, linux-oracle, linux-oracle-5.4, linux-raspi vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-azure: Linux kernel for Microsoft Azure Cloud systems - linux-bluefield: Linux kernel for NVIDIA BlueField platforms - linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems - linux-ibm: Linux kernel for IBM cloud systems - linux-kvm: Linux kernel for cloud environments - linux-oracle: Linux kernel for Oracle Cloud systems - linux-raspi: Linux kernel for Raspberry Pi systems - linux-aws-5.4: Linux kernel for Amazon Web Services (AWS) systems - linux-azure-5.4: Linux kernel for Microsoft Azure cloud systems - linux-hwe-5.4: Linux hardware enablement (HWE) kernel - linux-ibm-5.4: Linux kernel for IBM cloud systems - linux-oracle-5.4: Linux kernel for Oracle Cloud systems Details: Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-42703) It was discovered that a race condition existed in the memory address space accounting implementation in the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-41222) It was discovered that a race condition existed in the instruction emulator of the Linux kernel on Arm 64-bit systems. A local attacker could use this to cause a denial of service (system crash). (CVE-2022-20422) It was discovered that the KVM implementation in the Linux kernel did not properly handle virtual CPUs without APICs in certain situations. A local attacker could possibly use this to cause a denial of service (host system crash). (CVE-2022-2153) Hao Sun and Jiacheng Xu discovered that the NILFS file system implementation in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-2978) Johannes Wikner and Kaveh Razavi discovered that for some Intel x86-64 processors, the Linux kernel's protections against speculative branch target injection attacks were insufficient in some circumstances. A local attacker could possibly use this to expose sensitive information. (CVE-2022-29901) Abhishek Shah discovered a race condition in the PF_KEYv2 implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information (kernel memory). (CVE-2022-3028) It was discovered that the Netlink device interface implementation in the Linux kernel did not properly handle certain error conditions, leading to a use-after-free vulnerability with some network device drivers. A local attacker with admin access to the network device could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-3625) It was discovered that the IDT 77252 ATM PCI device driver in the Linux kernel did not properly remove any pending timers during device exit, resulting in a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-3635) Jann Horn discovered a race condition existed in the Linux kernel when unmapping VMAs in certain situations, resulting in possible use-after-free vulnerabilities. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-39188) Xingyuan Mo and Gengjia Chen discovered that the Promise SuperTrak EX storage controller driver in the Linux kernel did not properly handle certain structures. A local attacker could potentially use this to expose sensitive information (kernel memory). (CVE-2022-40768) Sönke Huster discovered that a use-after-free vulnerability existed in the WiFi driver stack in the Linux kernel. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-42719) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS: linux-image-5.4.0-1037-ibm 5.4.0-1037.42
[USN-5727-1] Linux kernel vulnerabilities
== Ubuntu Security Notice USN-5727-1 November 16, 2022 linux, linux-aws, linux-aws-hwe, linux-dell300x, linux-hwe, linux-kvm, linux-oracle, linux-raspi2, linux-snapdragon vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 18.04 LTS - Ubuntu 16.04 ESM Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-dell300x: Linux kernel for Dell 300x platforms - linux-kvm: Linux kernel for cloud environments - linux-oracle: Linux kernel for Oracle Cloud systems - linux-raspi2: Linux kernel for Raspberry Pi systems - linux-snapdragon: Linux kernel for Qualcomm Snapdragon processors - linux-aws-hwe: Linux kernel for Amazon Web Services (AWS-HWE) systems - linux-hwe: Linux hardware enablement (HWE) kernel Details: It was discovered that a race condition existed in the instruction emulator of the Linux kernel on Arm 64-bit systems. A local attacker could use this to cause a denial of service (system crash). (CVE-2022-20422) It was discovered that the KVM implementation in the Linux kernel did not properly handle virtual CPUs without APICs in certain situations. A local attacker could possibly use this to cause a denial of service (host system crash). (CVE-2022-2153) Hao Sun and Jiacheng Xu discovered that the NILFS file system implementation in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-2978) Abhishek Shah discovered a race condition in the PF_KEYv2 implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information (kernel memory). (CVE-2022-3028) It was discovered that the IDT 77252 ATM PCI device driver in the Linux kernel did not properly remove any pending timers during device exit, resulting in a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-3635) It was discovered that the Netlink Transformation (XFRM) subsystem in the Linux kernel contained a reference counting error. A local attacker could use this to cause a denial of service (system crash). (CVE-2022-36879) Xingyuan Mo and Gengjia Chen discovered that the Promise SuperTrak EX storage controller driver in the Linux kernel did not properly handle certain structures. A local attacker could potentially use this to expose sensitive information (kernel memory). (CVE-2022-40768) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 18.04 LTS: linux-image-4.15.0-1055-dell300x 4.15.0-1055.60 linux-image-4.15.0-1108-oracle 4.15.0-1108.119 linux-image-4.15.0-1121-raspi2 4.15.0-1121.129 linux-image-4.15.0-1129-kvm 4.15.0-1129.134 linux-image-4.15.0-1139-snapdragon 4.15.0-1139.149 linux-image-4.15.0-1143-aws 4.15.0-1143.155 linux-image-4.15.0-197-generic 4.15.0-197.208 linux-image-4.15.0-197-generic-lpae 4.15.0-197.208 linux-image-4.15.0-197-lowlatency 4.15.0-197.208 linux-image-aws-lts-18.04 4.15.0.1143.143 linux-image-dell300x4.15.0.1055.55 linux-image-generic 4.15.0.197.182 linux-image-generic-lpae4.15.0.197.182 linux-image-kvm 4.15.0.1129.122 linux-image-lowlatency 4.15.0.197.182 linux-image-oracle-lts-18.044.15.0.1108.115 linux-image-raspi2 4.15.0.1121.118 linux-image-snapdragon 4.15.0.1139.140 linux-image-virtual 4.15.0.197.182 Ubuntu 16.04 ESM: linux-image-4.15.0-1108-oracle 4.15.0-1108.119~16.04.1 linux-image-4.15.0-1143-aws-hwe 4.15.0-1143.155~16.04.1 linux-image-4.15.0-197-generic 4.15.0-197.208~16.04.1 linux-image-4.15.0-197-lowlatency 4.15.0-197.208~16.04.1 linux-image-aws-hwe 4.15.0.1143.130 linux-image-generic-hwe-16.04 4.15.0.197.184 linux-image-lowlatency-hwe-16.04 4.15.0.197.184 linux-image-oem 4.15.0.197.184 linux-image-oracle 4.15.0.1108.92 linux-image-virtual-hwe-16.04 4.15.0.197.184 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References:
[USN-5729-1] Linux kernel vulnerabilities
== Ubuntu Security Notice USN-5729-1 November 17, 2022 linux, linux-aws, linux-aws-5.15, linux-azure, linux-azure-5.15, linux-gcp, linux-gke, linux-gkeop, linux-hwe-5.15, linux-ibm, linux-kvm, linux-lowlatency, linux-lowlatency-hwe-5.15, linux-oracle, linux-oracle-5.15 vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-azure: Linux kernel for Microsoft Azure Cloud systems - linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems - linux-gke: Linux kernel for Google Container Engine (GKE) systems - linux-gkeop: Linux kernel for Google Container Engine (GKE) systems - linux-ibm: Linux kernel for IBM cloud systems - linux-kvm: Linux kernel for cloud environments - linux-lowlatency: Linux low latency kernel - linux-oracle: Linux kernel for Oracle Cloud systems - linux-aws-5.15: Linux kernel for Amazon Web Services (AWS) systems - linux-azure-5.15: Linux kernel for Microsoft Azure cloud systems - linux-hwe-5.15: Linux hardware enablement (HWE) kernel - linux-lowlatency-hwe-5.15: Linux low latency kernel - linux-oracle-5.15: Linux kernel for Oracle Cloud systems Details: It was discovered that a race condition existed in the instruction emulator of the Linux kernel on Arm 64-bit systems. A local attacker could use this to cause a denial of service (system crash). (CVE-2022-20422) Hsin-Wei Hung discovered that the BPF subsystem in the Linux kernel contained an out-of-bounds read vulnerability in the x86 JIT compiler. A local attacker could possibly use this to cause a denial of service (system crash) or expose sensitive information (kernel memory). (CVE-2022-2905) Hao Sun and Jiacheng Xu discovered that the NILFS file system implementation in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-2978) Abhishek Shah discovered a race condition in the PF_KEYv2 implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information (kernel memory). (CVE-2022-3028) It was discovered that the Netlink device interface implementation in the Linux kernel did not properly handle certain error conditions, leading to a use-after-free vulnerability with some network device drivers. A local attacker with admin access to the network device could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-3625) It was discovered that the IDT 77252 ATM PCI device driver in the Linux kernel did not properly remove any pending timers during device exit, resulting in a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-3635) Gwangun Jung discovered that the netfilter subsystem in the Linux kernel did not properly prevent binding to an already bound chain. A local attacker could use this to cause a denial of service (system crash). (CVE-2022-39190) Xingyuan Mo and Gengjia Chen discovered that the Promise SuperTrak EX storage controller driver in the Linux kernel did not properly handle certain structures. A local attacker could potentially use this to expose sensitive information (kernel memory). (CVE-2022-40768) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 22.04 LTS: linux-image-5.15.0-1008-gkeop 5.15.0-1008.12 linux-image-5.15.0-1018-ibm 5.15.0-1018.21 linux-image-5.15.0-1020-gke 5.15.0-1020.25 linux-image-5.15.0-1021-kvm 5.15.0-1021.26 linux-image-5.15.0-1022-gcp 5.15.0-1022.29 linux-image-5.15.0-1022-oracle 5.15.0-1022.28 linux-image-5.15.0-1023-aws 5.15.0-1023.27 linux-image-5.15.0-1023-azure 5.15.0-1023.29 linux-image-5.15.0-53-generic 5.15.0-53.59 linux-image-5.15.0-53-generic-64k 5.15.0-53.59 linux-image-5.15.0-53-generic-lpae 5.15.0-53.59 linux-image-5.15.0-53-lowlatency 5.15.0-53.59 linux-image-5.15.0-53-lowlatency-64k 5.15.0-53.59 linux-image-aws 5.15.0.1023.23 linux-image-aws-lts-22.04 5.15.0.1023.23 linux-image-azure 5.15.0.1023.22 linux-image-azure-lts-22.04 5.15.0.1023.22 linux-image-gcp 5.15.0.1022.19 linux-image-generic 5.15.0.53.53 linux-image-generic-64k 5.15.0.53.53 linux-image-generic-64k-hwe-22.04 5.15.0.53.53 linux-image-generic-hwe-22.04 5.15.0.53.53 linux-image-generic-lpae5.15.0.53.53
[USN-5700-1] Linux kernel vulnerabilities
== Ubuntu Security Notice USN-5700-1 October 26, 2022 linux, linux-aws, linux-azure, linux-gcp, linux-ibm, linux-kvm, linux-lowlatency, linux-oracle, linux-raspi vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 22.10 Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-azure: Linux kernel for Microsoft Azure Cloud systems - linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems - linux-ibm: Linux kernel for IBM cloud systems - linux-kvm: Linux kernel for cloud environments - linux-lowlatency: Linux low latency kernel - linux-oracle: Linux kernel for Oracle Cloud systems - linux-raspi: Linux kernel for Raspberry Pi systems Details: David Bouman and Billy Jheng Bing Jhong discovered that a race condition existed in the io_uring subsystem in the Linux kernel, leading to a use- after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-2602) Sönke Huster discovered that an integer overflow vulnerability existed in the WiFi driver stack in the Linux kernel, leading to a buffer overflow. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-41674) Sönke Huster discovered that a use-after-free vulnerability existed in the WiFi driver stack in the Linux kernel. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-42719) Sönke Huster discovered that the WiFi driver stack in the Linux kernel did not properly perform reference counting in some situations, leading to a use-after-free vulnerability. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-42720) Sönke Huster discovered that the WiFi driver stack in the Linux kernel did not properly handle BSSID/SSID lists in some situations. A physically proximate attacker could use this to cause a denial of service (infinite loop). (CVE-2022-42721) Sönke Huster discovered that the WiFi driver stack in the Linux kernel contained a NULL pointer dereference vulnerability in certain situations. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2022-42722) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 22.10: linux-image-5.19.0-1006-raspi 5.19.0-1006.13 linux-image-5.19.0-1006-raspi-nolpae 5.19.0-1006.13 linux-image-5.19.0-1009-lowlatency 5.19.0-1009.10 linux-image-5.19.0-1009-lowlatency-64k 5.19.0-1009.10 linux-image-5.19.0-1010-azure 5.19.0-1010.11 linux-image-5.19.0-1010-gcp 5.19.0-1010.11 linux-image-5.19.0-1010-ibm 5.19.0-1010.11 linux-image-5.19.0-1010-kvm 5.19.0-1010.11 linux-image-5.19.0-1010-oracle 5.19.0-1010.11 linux-image-5.19.0-1011-aws 5.19.0-1011.12 linux-image-5.19.0-23-generic 5.19.0-23.24 linux-image-5.19.0-23-generic-64k 5.19.0-23.24 linux-image-5.19.0-23-generic-lpae 5.19.0-23.24 linux-image-aws 5.19.0.1011.10 linux-image-azure 5.19.0.1010.9 linux-image-gcp 5.19.0.1010.9 linux-image-generic 5.19.0.23.22 linux-image-generic-64k 5.19.0.23.22 linux-image-generic-lpae5.19.0.23.22 linux-image-ibm 5.19.0.1010.9 linux-image-kvm 5.19.0.1010.9 linux-image-lowlatency 5.19.0.1009.8 linux-image-lowlatency-64k 5.19.0.1009.8 linux-image-oem-22.04 5.19.0.23.22 linux-image-oracle 5.19.0.1010.9 linux-image-raspi 5.19.0.1006.7 linux-image-raspi-nolpae5.19.0.1006.7 linux-image-virtual 5.19.0.23.22 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-5700-1 CVE-2022-2602, CVE-2022-41674, CVE-2022-42719, CVE-2022-42720, CVE-2022-42721, CVE-2022-42722 Package Information: https://launchpad.net/ubuntu/+source/linux/5.19.0-23.24 https://launchpad.net/ubuntu/+source/linux-aws/5.19.0-1011.12
[USN-5688-1] Libksba vulnerability
== Ubuntu Security Notice USN-5688-1 October 19, 2022 libksba vulnerability == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS - Ubuntu 16.04 ESM - Ubuntu 14.04 ESM Summary: Libksba could be made to crash or run programs if it decoded specially crafted data. Software Description: - libksba: X.509 and CMS support library Details: It was discovered that an integer overflow could be triggered in Libksba when decoding certain data. An attacker could use this issue to cause a denial of service (application crash) or possibly execute arbitrary code. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 22.04 LTS: libksba81.6.0-2ubuntu0.1 Ubuntu 20.04 LTS: libksba81.3.5-2ubuntu0.20.04.1 Ubuntu 18.04 LTS: libksba81.3.5-2ubuntu0.18.04.1 Ubuntu 16.04 ESM: libksba81.3.3-1ubuntu0.16.04.1+esm1 Ubuntu 14.04 ESM: libksba81.3.0-3ubuntu0.14.04.2+esm1 In general, a standard system update will make all the necessary changes. References: https://ubuntu.com/security/notices/USN-5688-1 CVE-2022-3515 Package Information: https://launchpad.net/ubuntu/+source/libksba/1.6.0-2ubuntu0.1 https://launchpad.net/ubuntu/+source/libksba/1.3.5-2ubuntu0.20.04.1 https://launchpad.net/ubuntu/+source/libksba/1.3.5-2ubuntu0.18.04.1 signature.asc Description: PGP signature
[USN-5622-1] Linux kernel vulnerabilities
== Ubuntu Security Notice USN-5622-1 September 21, 2022 linux, linux-aws, linux-aws-5.4, linux-azure, linux-azure-5.4, linux-bluefield, linux-gkeop, linux-hwe-5.4, linux-ibm, linux-ibm-5.4, linux-kvm, linux-oracle, linux-oracle-5.4, linux-raspi vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-azure: Linux kernel for Microsoft Azure Cloud systems - linux-bluefield: Linux kernel for NVIDIA BlueField platforms - linux-gkeop: Linux kernel for Google Container Engine (GKE) systems - linux-ibm: Linux kernel for IBM cloud systems - linux-kvm: Linux kernel for cloud environments - linux-oracle: Linux kernel for Oracle Cloud systems - linux-raspi: Linux kernel for Raspberry Pi systems - linux-aws-5.4: Linux kernel for Amazon Web Services (AWS) systems - linux-azure-5.4: Linux kernel for Microsoft Azure cloud systems - linux-hwe-5.4: Linux hardware enablement (HWE) kernel - linux-ibm-5.4: Linux kernel for IBM cloud systems - linux-oracle-5.4: Linux kernel for Oracle Cloud systems Details: It was discovered that the framebuffer driver on the Linux kernel did not verify size limits when changing font or screen size, leading to an out-of- bounds write. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-33655) Moshe Kol, Amit Klein and Yossi Gilad discovered that the IP implementation in the Linux kernel did not provide sufficient randomization when calculating port offsets. An attacker could possibly use this to expose sensitive information. (CVE-2022-1012, CVE-2022-32296) Norbert Slusarek discovered that a race condition existed in the perf subsystem in the Linux kernel, resulting in a use-after-free vulnerability. A privileged local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-1729) It was discovered that the device-mapper verity (dm-verity) driver in the Linux kernel did not properly verify targets being loaded into the device- mapper table. A privileged attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-2503) Domingo Dirutigliano and Nicola Guerrera discovered that the netfilter subsystem in the Linux kernel did not properly handle rules that truncated packets below the packet header size. When such rules are in place, a remote attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-36946) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS: linux-image-5.4.0-1033-ibm 5.4.0-1033.37 linux-image-5.4.0-1046-bluefield 5.4.0-1046.51 linux-image-5.4.0-1053-gkeop5.4.0-1053.56 linux-image-5.4.0-1070-raspi5.4.0-1070.80 linux-image-5.4.0-1075-kvm 5.4.0-1075.80 linux-image-5.4.0-1083-oracle 5.4.0-1083.91 linux-image-5.4.0-1085-aws 5.4.0-1085.92 linux-image-5.4.0-1091-azure5.4.0-1091.96 linux-image-5.4.0-126-generic 5.4.0-126.142 linux-image-5.4.0-126-generic-lpae 5.4.0-126.142 linux-image-5.4.0-126-lowlatency 5.4.0-126.142 linux-image-aws-lts-20.04 5.4.0.1085.85 linux-image-azure-lts-20.04 5.4.0.1091.88 linux-image-bluefield 5.4.0.1046.45 linux-image-generic 5.4.0.126.127 linux-image-generic-lpae5.4.0.126.127 linux-image-gkeop 5.4.0.1053.54 linux-image-gkeop-5.4 5.4.0.1053.54 linux-image-ibm 5.4.0.1033.62 linux-image-ibm-lts-20.04 5.4.0.1033.62 linux-image-kvm 5.4.0.1075.72 linux-image-lowlatency 5.4.0.126.127 linux-image-oem 5.4.0.126.127 linux-image-oem-osp15.4.0.126.127 linux-image-oracle-lts-20.045.4.0.1083.80 linux-image-raspi 5.4.0.1070.103 linux-image-raspi2 5.4.0.1070.103 linux-image-virtual 5.4.0.126.127 Ubuntu 18.04 LTS: linux-image-5.4.0-1033-ibm 5.4.0-1033.37~18.04.1 linux-image-5.4.0-1083-oracle 5.4.0-1083.91~18.04.1 linux-image-5.4.0-1085-aws 5.4.0-1085.92~18.04.1 linux-image-5.4.0-1091-azure5.4.0-1091.96~18.04.1 linux-image-5.4.0-126-generic 5.4.0-126.142~18.04.1 linux-image-5.4.0-126-generic-lpae 5.4.0-126.142~18.04.1 linux-image-5.4.0-126-lowlatency 5.4.0-126.142~18.04.1 linux-image-aws 5.4.0.1085.65 linux-image-azure 5.4.0.1091.68 linux-image-generic-hwe-18.04 5.4.0.126.142~18.04.106 linux-image-generic-lpae-hwe-18.04 5.4.0.126.142~18.04.106
[USN-5621-1] Linux kernel vulnerabilities
== Ubuntu Security Notice USN-5621-1 September 21, 2022 linux, linux-aws, linux-aws-hwe, linux-azure-4.15, linux-dell300x, linux-gcp, linux-gcp-4.15, lnux-hwe, inux-kvm, linux-oracle, linux-raspi2, linux-snapdragon vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 18.04 LTS - Ubuntu 16.04 ESM Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-azure-4.15: Linux kernel for Microsoft Azure Cloud systems - linux-dell300x: Linux kernel for Dell 300x platforms - linux-gcp-4.15: Linux kernel for Google Cloud Platform (GCP) systems - linux-kvm: Linux kernel for cloud environments - linux-oracle: Linux kernel for Oracle Cloud systems - linux-raspi2: Linux kernel for Raspberry Pi systems - linux-snapdragon: Linux kernel for Qualcomm Snapdragon processors - linux-aws-hwe: Linux kernel for Amazon Web Services (AWS-HWE) systems - linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems - linux-hwe: Linux hardware enablement (HWE) kernel Details: It was discovered that the framebuffer driver on the Linux kernel did not verify size limits when changing font or screen size, leading to an out-of- bounds write. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-33655) Domingo Dirutigliano and Nicola Guerrera discovered that the netfilter subsystem in the Linux kernel did not properly handle rules that truncated packets below the packet header size. When such rules are in place, a remote attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-36946) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 18.04 LTS: linux-image-4.15.0-1053-dell300x 4.15.0-1053.58 linux-image-4.15.0-1106-oracle 4.15.0-1106.117 linux-image-4.15.0-1119-raspi2 4.15.0-1119.127 linux-image-4.15.0-1127-kvm 4.15.0-1127.132 linux-image-4.15.0-1136-gcp 4.15.0-1136.152 linux-image-4.15.0-1137-snapdragon 4.15.0-1137.147 linux-image-4.15.0-1141-aws 4.15.0-1141.152 linux-image-4.15.0-1151-azure 4.15.0-1151.166 linux-image-4.15.0-193-generic 4.15.0-193.204 linux-image-4.15.0-193-generic-lpae 4.15.0-193.204 linux-image-4.15.0-193-lowlatency 4.15.0-193.204 linux-image-aws-lts-18.04 4.15.0.1141.141 linux-image-azure-lts-18.04 4.15.0.1151.121 linux-image-dell300x4.15.0.1053.53 linux-image-gcp-lts-18.04 4.15.0.1136.152 linux-image-generic 4.15.0.193.178 linux-image-generic-lpae4.15.0.193.178 linux-image-kvm 4.15.0.1127.120 linux-image-lowlatency 4.15.0.193.178 linux-image-oracle-lts-18.044.15.0.1106.113 linux-image-raspi2 4.15.0.1119.116 linux-image-snapdragon 4.15.0.1137.138 linux-image-virtual 4.15.0.193.178 Ubuntu 16.04 ESM: linux-image-4.15.0-1106-oracle 4.15.0-1106.117~16.04.1 linux-image-4.15.0-1136-gcp 4.15.0-1136.152~16.04.1 linux-image-4.15.0-1141-aws-hwe 4.15.0-1141.152~16.04.1 linux-image-4.15.0-193-generic 4.15.0-193.204~16.04.1 linux-image-4.15.0-193-lowlatency 4.15.0-193.204~16.04.1 linux-image-aws-hwe 4.15.0.1141.128 linux-image-gcp 4.15.0.1136.130 linux-image-generic-hwe-16.04 4.15.0.193.180 linux-image-gke 4.15.0.1136.130 linux-image-lowlatency-hwe-16.04 4.15.0.193.180 linux-image-oem 4.15.0.193.180 linux-image-oracle 4.15.0.1106.90 linux-image-virtual-hwe-16.04 4.15.0.193.180 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-5621-1 CVE-2021-33655, CVE-2022-36946 Package Information: https://launchpad.net/ubuntu/+source/linux/4.15.0-193.204 https://launchpad.net/ubuntu/+source/linux-aws/4.15.0-1141.152 https://launchpad.net/ubuntu/+source/linux-azure-4.15/4.15.0-1151.166 https://launchpad.net/ubuntu/+source/linux-dell300x/4.15.0-1053.58 https://launchpad.net/ubuntu/+source/linux-gcp-4.15/4.15.0-1136.152 https://launchpad.net/ubuntu/+source/linux-kvm/4.15.0-1127.132 https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1106.117
[USN-5624-1] Linux kernel vulnerabilities
== Ubuntu Security Notice USN-5624-1 September 21, 2022 linux, linux-aws, linux-aws-5.15, linux-azure, linux-azure-5.15, linux-kvm, linux-lowlatency vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-azure: Linux kernel for Microsoft Azure Cloud systems - linux-kvm: Linux kernel for cloud environments - linux-lowlatency: Linux low latency kernel - linux-aws-5.15: Linux kernel for Amazon Web Services (AWS) systems - linux-azure-5.15: Linux kernel for Microsoft Azure cloud systems Details: It was discovered that the framebuffer driver on the Linux kernel did not verify size limits when changing font or screen size, leading to an out-of- bounds write. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-33655) Duoming Zhou discovered that race conditions existed in the timer handling implementation of the Linux kernel's Rose X.25 protocol layer, resulting in use-after-free vulnerabilities. A local attacker could use this to cause a denial of service (system crash). (CVE-2022-2318) Roger Pau Monné discovered that the Xen virtual block driver in the Linux kernel did not properly initialize memory pages to be used for shared communication with the backend. A local attacker could use this to expose sensitive information (guest kernel memory). (CVE-2022-26365) Roger Pau Monné discovered that the Xen paravirtualization frontend in the Linux kernel did not properly initialize memory pages to be used for shared communication with the backend. A local attacker could use this to expose sensitive information (guest kernel memory). (CVE-2022-33740) It was discovered that the Xen paravirtualization frontend in the Linux kernel incorrectly shared unrelated data when communicating with certain backends. A local attacker could use this to cause a denial of service (guest crash) or expose sensitive information (guest kernel memory). (CVE-2022-33741, CVE-2022-33742) Jan Beulich discovered that the Xen network device frontend driver in the Linux kernel incorrectly handled socket buffers (skb) references when communicating with certain backends. A local attacker could use this to cause a denial of service (guest crash). (CVE-2022-33743) Oleksandr Tyshchenko discovered that the Xen paravirtualization platform in the Linux kernel on ARM platforms contained a race condition in certain situations. An attacker in a guest VM could use this to cause a denial of service in the host OS. (CVE-2022-33744) It was discovered that the virtio RPMSG bus driver in the Linux kernel contained a double-free vulnerability in certain error conditions. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-34494, CVE-2022-34495) Domingo Dirutigliano and Nicola Guerrera discovered that the netfilter subsystem in the Linux kernel did not properly handle rules that truncated packets below the packet header size. When such rules are in place, a remote attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-36946) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 22.04 LTS: linux-image-5.15.0-1018-kvm 5.15.0-1018.22 linux-image-5.15.0-1020-aws 5.15.0-1020.24 linux-image-5.15.0-1020-azure 5.15.0-1020.25 linux-image-5.15.0-48-generic 5.15.0-48.54 linux-image-5.15.0-48-generic-64k 5.15.0-48.54 linux-image-5.15.0-48-generic-lpae 5.15.0-48.54 linux-image-5.15.0-48-lowlatency 5.15.0-48.54 linux-image-5.15.0-48-lowlatency-64k 5.15.0-48.54 linux-image-aws 5.15.0.1020.20 linux-image-azure 5.15.0.1020.19 linux-image-generic 5.15.0.48.48 linux-image-generic-64k 5.15.0.48.48 linux-image-generic-64k-hwe-22.04 5.15.0.48.48 linux-image-generic-hwe-22.04 5.15.0.48.48 linux-image-generic-lpae5.15.0.48.48 linux-image-generic-lpae-hwe-22.04 5.15.0.48.48 linux-image-kvm 5.15.0.1018.16 linux-image-lowlatency 5.15.0.48.45 linux-image-lowlatency-64k 5.15.0.48.45 linux-image-lowlatency-64k-hwe-22.04 5.15.0.48.45 linux-image-lowlatency-hwe-22.04 5.15.0.48.45 linux-image-oem-20.04 5.15.0.48.48 linux-image-virtual 5.15.0.48.48 linux-image-virtual-hwe-22.04 5.15.0.48.48 Ubuntu 20.04 LTS: linux-image-5.15.0-1020-aws 5.15.0-1020.24~20.04.1 linux-image-5.15.0-1020-azure 5.15.0-1020.25~20.04.1 linux-image-aws 5.15.0.1020.24~20.04.12 linux-image-azure
[USN-5594-1] Linux kernel vulnerabilities
== Ubuntu Security Notice USN-5594-1 September 02, 2022 linux, linux-aws, linux-aws-5.15, linux-azure, linux-azure-5.15, linux-gcp, linux-gcp-5.15, linux-gke, linux-gke-5.15, linux-gkeop, linux-ibm, linux-kvm, linux-lowlatency vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-azure: Linux kernel for Microsoft Azure Cloud systems - linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems - linux-gke: Linux kernel for Google Container Engine (GKE) systems - linux-gkeop: Linux kernel for Google Container Engine (GKE) systems - linux-ibm: Linux kernel for IBM cloud systems - linux-kvm: Linux kernel for cloud environments - linux-lowlatency: Linux low latency kernel - linux-aws-5.15: Linux kernel for Amazon Web Services (AWS) systems - linux-azure-5.15: Linux kernel for Microsoft Azure cloud systems - linux-gcp-5.15: Linux kernel for Google Cloud Platform (GCP) systems - linux-gke-5.15: Linux kernel for Google Container Engine (GKE) systems Details: Asaf Modelevsky discovered that the Intel(R) 10GbE PCI Express (ixgbe) Ethernet driver for the Linux kernel performed insufficient control flow management. A local attacker could possibly use this to cause a denial of service. (CVE-2021-33061) It was discovered that the IP implementation in the Linux kernel did not provide sufficient randomization when calculating port offsets. An attacker could possibly use this to expose sensitive information. (CVE-2022-1012) Norbert Slusarek discovered that a race condition existed in the perf subsystem in the Linux kernel, resulting in a use-after-free vulnerability. A privileged local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-1729) Qiuhao Li, Gaoning Pan, and Yongkang Jia discovered that the KVM hypervisor implementation in the Linux kernel did not properly handle an illegal instruction in a guest, resulting in a null pointer dereference. An attacker in a guest VM could use this to cause a denial of service (system crash) in the host OS. (CVE-2022-1852) It was discovered that the UDF file system implementation in the Linux kernel contained an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-1943) Gerald Lee discovered that the NTFS file system implementation in the Linux kernel did not properly handle certain error conditions, leading to a use- after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information. (CVE-2022-1973) It was discovered that the device-mapper verity (dm-verity) driver in the Linux kernel did not properly verify targets being loaded into the device- mapper table. A privileged attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-2503) Zheyu Ma discovered that the Intel iSMT SMBus host controller driver in the Linux kernel contained an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service (system crash). (CVE-2022-2873) Selim Enes Karaduman discovered that a race condition existed in the pipe buffers implementation of the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly escalate privileges. (CVE-2022-2959) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 22.04 LTS: linux-image-5.15.0-1002-gkeop 5.15.0-1002.4 linux-image-5.15.0-1013-ibm 5.15.0-1013.15 linux-image-5.15.0-1015-gke 5.15.0-1015.18 linux-image-5.15.0-1017-gcp 5.15.0-1017.23 linux-image-5.15.0-1017-kvm 5.15.0-1017.21 linux-image-5.15.0-1019-aws 5.15.0-1019.23 linux-image-5.15.0-1019-azure 5.15.0-1019.24 linux-image-5.15.0-47-generic 5.15.0-47.51 linux-image-5.15.0-47-generic-64k 5.15.0-47.51 linux-image-5.15.0-47-generic-lpae 5.15.0-47.51 linux-image-5.15.0-47-lowlatency 5.15.0-47.53 linux-image-5.15.0-47-lowlatency-64k 5.15.0-47.53 linux-image-aws 5.15.0.1019.19 linux-image-azure 5.15.0.1019.18 linux-image-gcp 5.15.0.1017.15 linux-image-generic 5.15.0.47.47 linux-image-generic-64k 5.15.0.47.47 linux-image-generic-64k-hwe-22.04 5.15.0.47.47 linux-image-generic-hwe-22.04 5.15.0.47.47 linux-image-generic-lpae5.15.0.47.47 linux-image-generic-lpae-hwe-22.04 5.15.0.47.47 linux-image-gke
[USN-5590-1] Linux kernel (OEM) vulnerability
== Ubuntu Security Notice USN-5590-1 August 30, 2022 linux-oem-5.14 vulnerability == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.04 LTS Summary: The system could be made to crash if it received specially crafted network traffic. Software Description: - linux-oem-5.14: Linux kernel for OEM systems Details: Domingo Dirutigliano and Nicola Guerrera discovered that the netfilter subsystem in the Linux kernel did not properly handle rules that truncated packets below the packet header size. When such rules are in place, a remote attacker could possibly use this to cause a denial of service (system crash). Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS: linux-image-5.14.0-1050-oem 5.14.0-1050.57 linux-image-oem-20.04 5.14.0.1050.46 linux-image-oem-20.04b 5.14.0.1050.46 linux-image-oem-20.04c 5.14.0.1050.46 linux-image-oem-20.04d 5.14.0.1050.46 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-5590-1 CVE-2022-36946 Package Information: https://launchpad.net/ubuntu/+source/linux-oem-5.14/5.14.0-1050.57 signature.asc Description: PGP signature
[USN-5582-1] Linux kernel (Azure CVM) vulnerabilities
== Ubuntu Security Notice USN-5582-1 August 25, 2022 linux-azure-fde vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux-azure-fde: Linux kernel for Microsoft Azure CVM cloud systems Details: Arthur Mongodin discovered that the netfilter subsystem in the Linux kernel did not properly perform data validation. A local attacker could use this to escalate privileges in certain situations. (CVE-2022-34918) Zhenpeng Lin discovered that the network packet scheduler implementation in the Linux kernel did not properly remove all references to a route filter before freeing it in some situations. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-2588) It was discovered that the netfilter subsystem of the Linux kernel did not prevent one nft object from referencing an nft set in another nft table, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-2586) It was discovered that the block layer subsystem in the Linux kernel did not properly initialize memory in some situations. A privileged local attacker could use this to expose sensitive information (kernel memory). (CVE-2022-0494) Hu Jiahui discovered that multiple race conditions existed in the Advanced Linux Sound Architecture (ALSA) framework, leading to use-after-free vulnerabilities. A local attacker could use these to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-1048) Minh Yuan discovered that the floppy disk driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-1652) It was discovered that the Atheros ath9k wireless device driver in the Linux kernel did not properly handle some error conditions, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-1679) It was discovered that the Marvell NFC device driver implementation in the Linux kernel did not properly perform memory cleanup operations in some situations, leading to a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-1734) Duoming Zhou discovered a race condition in the NFC subsystem in the Linux kernel, leading to a use-after-free vulnerability. A privileged local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-1974) Duoming Zhou discovered that the NFC subsystem in the Linux kernel did not properly prevent context switches from occurring during certain atomic context operations. A privileged local attacker could use this to cause a denial of service (system crash). (CVE-2022-1975) Felix Fu discovered that the Sun RPC implementation in the Linux kernel did not properly handle socket states, leading to a use-after-free vulnerability. A remote attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-28893) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS: linux-image-5.4.0-1089-azure-fde 5.4.0-1089.94+cvm1.2 linux-image-azure-fde 5.4.0.1089.94+cvm1.29 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-5582-1 CVE-2022-0494, CVE-2022-1048, CVE-2022-1652, CVE-2022-1679, CVE-2022-1734, CVE-2022-1974, CVE-2022-1975, CVE-2022-2586, CVE-2022-2588, CVE-2022-28893, CVE-2022-34918 Package Information: https://launchpad.net/ubuntu/+source/linux-azure-fde/5.4.0-1089.94+cvm1.2 signature.asc Description: PGP signature
[USN-5577-1] Linux kernel (OEM) vulnerabilities
== Ubuntu Security Notice USN-5577-1 August 24, 2022 linux-oem-5.14 vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux-oem-5.14: Linux kernel for OEM systems Details: Asaf Modelevsky discovered that the Intel(R) 10GbE PCI Express (ixgbe) Ethernet driver for the Linux kernel performed insufficient control flow management. A local attacker could possibly use this to cause a denial of service. (CVE-2021-33061) It was discovered that the framebuffer driver on the Linux kernel did not verify size limits when changing font or screen size, leading to an out-of- bounds write. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-33655) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS: linux-image-5.14.0-1049-oem 5.14.0-1049.56 linux-image-oem-20.04 5.14.0.1049.45 linux-image-oem-20.04b 5.14.0.1049.45 linux-image-oem-20.04c 5.14.0.1049.45 linux-image-oem-20.04d 5.14.0.1049.45 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-5577-1 CVE-2021-33061, CVE-2021-33655 Package Information: https://launchpad.net/ubuntu/+source/linux-oem-5.14/5.14.0-1049.56 signature.asc Description: PGP signature
[USN-5547-1] NVIDIA graphics drivers vulnerabilities
== Ubuntu Security Notice USN-5547-1 August 03, 2022 nvidia-graphics-drivers-390, nvidia-graphics-drivers-450-server, nvidia-graphics-drivers-470, nvidia-graphics-drivers-470-server, nvidia-graphics-drivers-510, nvidia-graphics-drivers-510-server, nvidia-graphics-drivers-515, nvidia-graphics-drivers-515-server vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS Summary: Several security issues were fixed in NVIDIA graphics drivers. Software Description: - nvidia-graphics-drivers-390: NVIDIA binary X.Org driver - nvidia-graphics-drivers-450-server: NVIDIA server driver - nvidia-graphics-drivers-470: NVIDIA binary X.Org driver - nvidia-graphics-drivers-470-server: NVIDIA server driver - nvidia-graphics-drivers-510: NVIDIA binary X.Org driver - nvidia-graphics-drivers-510-server: NVIDIA server driver - nvidia-graphics-drivers-515: NVIDIA binary X.Org driver - nvidia-graphics-drivers-515-server: NVIDIA server driver Details: Le Wu discovered that the NVIDIA graphics drivers did not properly perform input validation in some situations. A local user could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2022-31607) Tal Lossos discovered that the NVIDIA graphics drivers incorrectly handled certain memory operations, leading to a null-pointer dereference. A local attacker could use this to cause a denial of service. (CVE-2022-31615) Artem S. Tashkinov discovered that the NVIDIA graphics drivers Dynamic Boost D-Bus component did not properly restrict access to its endpoint. When enabled in non-default configurations, a local attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2022-31608) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 22.04 LTS: xserver-xorg-video-nvidia-390 390.154-0ubuntu0.22.04.1 xserver-xorg-video-nvidia-440-server 450.203.03-0ubuntu0.22.04.1 xserver-xorg-video-nvidia-450-server 450.203.03-0ubuntu0.22.04.1 xserver-xorg-video-nvidia-460 470.141.03-0ubuntu0.22.04.1 xserver-xorg-video-nvidia-460-server 470.141.03-0ubuntu0.22.04.1 xserver-xorg-video-nvidia-465 470.141.03-0ubuntu0.22.04.1 xserver-xorg-video-nvidia-470 470.141.03-0ubuntu0.22.04.1 xserver-xorg-video-nvidia-470-server 470.141.03-0ubuntu0.22.04.1 xserver-xorg-video-nvidia-495 510.85.02-0ubuntu0.22.04.1 xserver-xorg-video-nvidia-510 510.85.02-0ubuntu0.22.04.1 xserver-xorg-video-nvidia-510-server 510.85.02-0ubuntu0.22.04.1 xserver-xorg-video-nvidia-515 515.65.01-0ubuntu0.22.04.1 xserver-xorg-video-nvidia-515-server 515.65.01-0ubuntu0.22.04.1 Ubuntu 20.04 LTS: xserver-xorg-video-nvidia-390 390.154-0ubuntu0.20.04.1 xserver-xorg-video-nvidia-440-server 450.203.03-0ubuntu0.20.04.1 xserver-xorg-video-nvidia-450-server 450.203.03-0ubuntu0.20.04.1 xserver-xorg-video-nvidia-460 470.141.03-0ubuntu0.20.04.1 xserver-xorg-video-nvidia-460-server 470.141.03-0ubuntu0.20.04.1 xserver-xorg-video-nvidia-465 470.141.03-0ubuntu0.20.04.1 xserver-xorg-video-nvidia-470 470.141.03-0ubuntu0.20.04.1 xserver-xorg-video-nvidia-470-server 470.141.03-0ubuntu0.20.04.1 xserver-xorg-video-nvidia-495 510.85.02-0ubuntu0.20.04.1 xserver-xorg-video-nvidia-510 510.85.02-0ubuntu0.20.04.1 xserver-xorg-video-nvidia-510-server 510.85.02-0ubuntu0.20.04.1 xserver-xorg-video-nvidia-515 515.65.01-0ubuntu0.20.04.1 xserver-xorg-video-nvidia-515-server 515.65.01-0ubuntu0.20.04.1 Ubuntu 18.04 LTS: xserver-xorg-video-nvidia-390 390.154-0ubuntu0.18.04.1 xserver-xorg-video-nvidia-440-server 450.203.03-0ubuntu0.18.04.1 xserver-xorg-video-nvidia-450-server 450.203.03-0ubuntu0.18.04.1 xserver-xorg-video-nvidia-460 470.141.03-0ubuntu0.18.04.1 xserver-xorg-video-nvidia-460-server 470.141.03-0ubuntu0.18.04.1 xserver-xorg-video-nvidia-465 470.141.03-0ubuntu0.18.04.1 xserver-xorg-video-nvidia-470 470.141.03-0ubuntu0.18.04.1 xserver-xorg-video-nvidia-470-server 470.141.03-0ubuntu0.18.04.1 xserver-xorg-video-nvidia-495 510.85.02-0ubuntu0.18.04.1 xserver-xorg-video-nvidia-510 510.85.02-0ubuntu0.18.04.1 xserver-xorg-video-nvidia-510-server 510.85.02-0ubuntu0.18.04.1 xserver-xorg-video-nvidia-515 515.65.01-0ubuntu0.18.04.1 xserver-xorg-video-nvidia-515-server 515.65.01-0ubuntu0.18.04.1 After a standard system update you need to reboot your computer to make all the necessary changes. References: https://ubuntu.com/security/notices/USN-5547-1 CVE-2022-31607, CVE-2022-31608, CVE-2022-31615 Package Information: https://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-390/390.154-0ubuntu0.22.04.1
[USN-5544-1] Linux kernel vulnerabilities
== Ubuntu Security Notice USN-5544-1 August 02, 2022 linux, linux-hwe-5.15, linux-lowlatency, linux-lowlatency-hwe-5.15 vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux: Linux kernel - linux-lowlatency: Linux low latency kernel - linux-hwe-5.15: Linux hardware enablement (HWE) kernel - linux-lowlatency-hwe-5.15: Linux low latency kernel Details: It was discovered that the Atheros ath9k wireless device driver in the Linux kernel did not properly handle some error conditions, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-1679) Felix Fu discovered that the Sun RPC implementation in the Linux kernel did not properly handle socket states, leading to a use-after-free vulnerability. A remote attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-28893) Arthur Mongodin discovered that the netfilter subsystem in the Linux kernel did not properly perform data validation. A local attacker could use this to escalate privileges in certain situations. (CVE-2022-34918) Minh Yuan discovered that the floppy disk driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-1652) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 22.04 LTS: linux-image-5.15.0-43-generic 5.15.0-43.46 linux-image-5.15.0-43-generic-64k 5.15.0-43.46 linux-image-5.15.0-43-generic-lpae 5.15.0-43.46 linux-image-5.15.0-43-lowlatency 5.15.0-43.46 linux-image-5.15.0-43-lowlatency-64k 5.15.0-43.46 linux-image-generic 5.15.0.43.44 linux-image-generic-64k 5.15.0.43.44 linux-image-generic-64k-hwe-22.04 5.15.0.43.44 linux-image-generic-hwe-22.04 5.15.0.43.44 linux-image-generic-lpae5.15.0.43.44 linux-image-generic-lpae-hwe-22.04 5.15.0.43.44 linux-image-lowlatency 5.15.0.43.41 linux-image-lowlatency-64k 5.15.0.43.41 linux-image-lowlatency-64k-hwe-22.04 5.15.0.43.41 linux-image-lowlatency-hwe-22.04 5.15.0.43.41 linux-image-oem-20.04 5.15.0.43.44 linux-image-virtual 5.15.0.43.44 linux-image-virtual-hwe-22.04 5.15.0.43.44 Ubuntu 20.04 LTS: linux-image-5.15.0-43-generic 5.15.0-43.46~20.04.1 linux-image-5.15.0-43-generic-64k 5.15.0-43.46~20.04.1 linux-image-5.15.0-43-generic-lpae 5.15.0-43.46~20.04.1 linux-image-5.15.0-43-lowlatency 5.15.0-43.46~20.04.1 linux-image-5.15.0-43-lowlatency-64k 5.15.0-43.46~20.04.1 linux-image-generic-64k-hwe-20.04 5.15.0.43.46~20.04.14 linux-image-generic-hwe-20.04 5.15.0.43.46~20.04.14 linux-image-generic-lpae-hwe-20.04 5.15.0.43.46~20.04.14 linux-image-lowlatency-64k-hwe-20.04 5.15.0.43.46~20.04.13 linux-image-lowlatency-hwe-20.04 5.15.0.43.46~20.04.13 linux-image-virtual-hwe-20.04 5.15.0.43.46~20.04.14 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-5544-1 CVE-2022-1652, CVE-2022-1679, CVE-2022-28893, CVE-2022-34918 Package Information: https://launchpad.net/ubuntu/+source/linux/5.15.0-43.46 https://launchpad.net/ubuntu/+source/linux-lowlatency/5.15.0-43.46 https://launchpad.net/ubuntu/+source/linux-hwe-5.15/5.15.0-43.46~20.04.1 https://launchpad.net/ubuntu/+source/linux-lowlatency-hwe-5.15/5.15.0-43.46~20.04.1 signature.asc Description: PGP signature
[USN-5541-1] Linux kernel (Azure) vulnerabilities
== Ubuntu Security Notice USN-5541-1 July 28, 2022 linux-azure vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 16.04 ESM Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux-azure: Linux kernel for Microsoft Azure Cloud systems Details: Eric Biederman discovered that the cgroup process migration implementation in the Linux kernel did not perform permission checks correctly in some situations. A local attacker could possibly use this to gain administrative privileges. (CVE-2021-4197) Jann Horn discovered that the FUSE file system in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-1011) Duoming Zhou discovered that the 6pack protocol implementation in the Linux kernel did not handle detach events properly in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash). (CVE-2022-1198) Duoming Zhou discovered that the AX.25 amateur radio protocol implementation in the Linux kernel did not handle detach events properly in some situations. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-1199) Duoming Zhou discovered race conditions in the AX.25 amateur radio protocol implementation in the Linux kernel during device detach operations. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-1204) Duoming Zhou discovered race conditions in the AX.25 amateur radio protocol implementation in the Linux kernel, leading to use-after-free vulnerabilities. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-1205) It was discovered that the PF_KEYv2 implementation in the Linux kernel did not properly initialize kernel memory in some situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2022-1353) It was discovered that the implementation of X.25 network protocols in the Linux kernel did not terminate link layer sessions properly. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-1516) Zheyu Ma discovered that the Silicon Motion SM712 framebuffer driver in the Linux kernel did not properly handle very small reads. A local attacker could use this to cause a denial of service (system crash). (CVE-2022-2380) It was discovered that the 8 Devices USB2CAN interface implementation in the Linux kernel did not properly handle certain error conditions, leading to a double-free. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-28388) It was discovered that the Microchip CAN BUS Analyzer interface implementation in the Linux kernel did not properly handle certain error conditions, leading to a double-free. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-28389) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 ESM: linux-image-4.15.0-1146-azure 4.15.0-1146.161~16.04.1 linux-image-azure 4.15.0.1146.133 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-5541-1 CVE-2021-4197, CVE-2022-1011, CVE-2022-1198, CVE-2022-1199, CVE-2022-1204, CVE-2022-1205, CVE-2022-1353, CVE-2022-1516, CVE-2022-2380, CVE-2022-28388, CVE-2022-28389 signature.asc Description: PGP signature
[USN-5539-1] Linux kernel vulnerabilities
== Ubuntu Security Notice USN-5539-1 July 28, 2022 linux-bluefield, linux-gcp-5.4, linux-gke-5.4 vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux-bluefield: Linux kernel for NVIDIA BlueField platforms - linux-gcp-5.4: Linux kernel for Google Cloud Platform (GCP) systems - linux-gke-5.4: Linux kernel for Google Container Engine (GKE) systems Details: It was discovered that the implementation of the 6pack and mkiss protocols in the Linux kernel did not handle detach events properly in some situations, leading to a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-1195) Duoming Zhou discovered that the AX.25 amateur radio protocol implementation in the Linux kernel did not handle detach events properly in some situations. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-1199) Duoming Zhou discovered race conditions in the AX.25 amateur radio protocol implementation in the Linux kernel during device detach operations. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-1204) Duoming Zhou discovered race conditions in the AX.25 amateur radio protocol implementation in the Linux kernel, leading to use-after-free vulnerabilities. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-1205) Yongkang Jia discovered that the KVM hypervisor implementation in the Linux kernel did not properly handle guest TLB mapping invalidation requests in some situations. An attacker in a guest VM could use this to cause a denial of service (system crash) in the host OS. (CVE-2022-1789) It was discovered that the 8 Devices USB2CAN interface implementation in the Linux kernel did not properly handle certain error conditions, leading to a double-free. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-28388) Minh Yuan discovered that the floppy driver in the Linux kernel contained a race condition in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-33981) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS: linux-image-5.4.0-1042-bluefield 5.4.0-1042.47 linux-image-bluefield 5.4.0.1042.41 Ubuntu 18.04 LTS: linux-image-5.4.0-1078-gke 5.4.0-1078.84~18.04.1 linux-image-5.4.0-1084-gcp 5.4.0-1084.92~18.04.1 linux-image-gcp 5.4.0.1084.63 linux-image-gke-5.4 5.4.0.1078.84~18.04.40 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-5539-1 CVE-2022-1195, CVE-2022-1199, CVE-2022-1204, CVE-2022-1205, CVE-2022-1789, CVE-2022-28388, CVE-2022-33981 Package Information: https://launchpad.net/ubuntu/+source/linux-bluefield/5.4.0-1042.47 https://launchpad.net/ubuntu/+source/linux-gcp-5.4/5.4.0-1084.92~18.04.1 https://launchpad.net/ubuntu/+source/linux-gke-5.4/5.4.0-1078.84~18.04.1 signature.asc Description: PGP signature
[USN-5540-1] Linux kernel vulnerabilities
== Ubuntu Security Notice USN-5540-1 July 28, 2022 linux, linux-aws, linux-kvm, linux-lts-xenial vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 16.04 ESM - Ubuntu 14.04 ESM Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-kvm: Linux kernel for cloud environments - linux-lts-xenial: Linux hardware enablement kernel from Xenial for Trusty Details: Liu Jian discovered that the IGMP protocol implementation in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-20141) It was discovered that the USB gadget subsystem in the Linux kernel did not properly validate interface descriptor requests. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-25258) It was discovered that the Remote NDIS (RNDIS) USB gadget implementation in the Linux kernel did not properly validate the size of the RNDIS_MSG_SET command. An attacker could possibly use this to expose sensitive information (kernel memory). (CVE-2022-25375) Arthur Mongodin discovered that the netfilter subsystem in the Linux kernel did not properly perform data validation. A local attacker could use this to escalate privileges in certain situations. (CVE-2022-34918) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 ESM: linux-image-4.4.0--kvm 4.4.0-.121 linux-image-4.4.0-1146-aws 4.4.0-1146.161 linux-image-4.4.0-230-generic 4.4.0-230.264 linux-image-4.4.0-230-lowlatency 4.4.0-230.264 linux-image-aws 4.4.0.1146.150 linux-image-generic 4.4.0.230.236 linux-image-kvm 4.4.0..108 linux-image-lowlatency 4.4.0.230.236 linux-image-virtual 4.4.0.230.236 Ubuntu 14.04 ESM: linux-image-4.4.0-1110-aws 4.4.0-1110.116 linux-image-4.4.0-230-generic 4.4.0-230.264~14.04.1 linux-image-4.4.0-230-lowlatency 4.4.0-230.264~14.04.1 linux-image-aws 4.4.0.1110.107 linux-image-generic-lts-xenial 4.4.0.230.200 linux-image-lowlatency-lts-xenial 4.4.0.230.200 linux-image-virtual-lts-xenial 4.4.0.230.200 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-5540-1 CVE-2022-20141, CVE-2022-25258, CVE-2022-25375, CVE-2022-34918 signature.asc Description: PGP signature
[USN-5529-1] Linux kernel (OEM) vulnerabilities
== Ubuntu Security Notice USN-5529-1 July 21, 2022 linux-oem-5.17 vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 22.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux-oem-5.17: Linux kernel for OEM systems Details: It was discovered that the Atheros ath9k wireless device driver in the Linux kernel did not properly handle some error conditions, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-1679) Yongkang Jia discovered that the KVM hypervisor implementation in the Linux kernel did not properly handle guest TLB mapping invalidation requests in some situations. An attacker in a guest VM could use this to cause a denial of service (system crash) in the host OS. (CVE-2022-1789) Qiuhao Li, Gaoning Pan, and Yongkang Jia discovered that the KVM hypervisor implementation in the Linux kernel did not properly handle an illegal instruction in a guest, resulting in a null pointer dereference. An attacker in a guest VM could use this to cause a denial of service (system crash) in the host OS. (CVE-2022-1852) Gerald Lee discovered that the NTFS file system implementation in the Linux kernel did not properly handle certain error conditions, leading to a use- after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information. (CVE-2022-1973) It was discovered that the netfilter subsystem in the Linux kernel contained a buffer overflow in certain situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-2078) It was discovered that some Intel processors did not completely perform cleanup actions on multi-core shared buffers. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21123) It was discovered that some Intel processors did not completely perform cleanup actions on microarchitectural fill buffers. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21125) It was discovered that some Intel processors did not properly perform cleanup during specific special register write operations. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21166) It was discovered that the virtio RPMSG bus driver in the Linux kernel contained a double-free vulnerability in certain error conditions. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-34494, CVE-2022-34495) Minh Yuan discovered that the floppy disk driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-1652) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 22.04 LTS: linux-image-5.17.0-1013-oem 5.17.0-1013.14 linux-image-oem-22.04 5.17.0.1013.12 linux-image-oem-22.04a 5.17.0.1013.12 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-5529-1 CVE-2022-1652, CVE-2022-1679, CVE-2022-1789, CVE-2022-1852, CVE-2022-1973, CVE-2022-2078, CVE-2022-21123, CVE-2022-21125, CVE-2022-21166, CVE-2022-34494, CVE-2022-34495 Package Information: https://launchpad.net/ubuntu/+source/linux-oem-5.17/5.17.0-1013.14 signature.asc Description: PGP signature
[USN-5517-1] Linux kernel (OEM) vulnerabilities
== Ubuntu Security Notice USN-5517-1 July 13, 2022 linux-oem-5.14 vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux-oem-5.14: Linux kernel for OEM systems Details: It was discovered that the Atheros ath9k wireless device driver in the Linux kernel did not properly handle some error conditions, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-1679) It was discovered that the virtio RPMSG bus driver in the Linux kernel contained a double-free vulnerability in certain error conditions. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-34494) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS: linux-image-5.14.0-1045-oem 5.14.0-1045.51 linux-image-oem-20.04 5.14.0.1045.41 linux-image-oem-20.04b 5.14.0.1045.41 linux-image-oem-20.04c 5.14.0.1045.41 linux-image-oem-20.04d 5.14.0.1045.41 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-5517-1 CVE-2022-1679, CVE-2022-34494 Package Information: https://launchpad.net/ubuntu/+source/linux-oem-5.14/5.14.0-1045.51 signature.asc Description: PGP signature
[USN-5518-1] Linux kernel vulnerabilities
== Ubuntu Security Notice USN-5518-1 July 14, 2022 linux, linux-aws, linux-azure, linux-gcp, linux-gke, linux-ibm, linux-kvm, linux-lowlatency, linux-oracle vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 22.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-azure: Linux kernel for Microsoft Azure Cloud systems - linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems - linux-gke: Linux kernel for Google Container Engine (GKE) systems - linux-ibm: Linux kernel for IBM cloud systems - linux-kvm: Linux kernel for cloud environments - linux-lowlatency: Linux low latency kernel - linux-oracle: Linux kernel for Oracle Cloud systems Details: It was discovered that the eBPF implementation in the Linux kernel did not properly prevent writes to kernel objects in BPF_BTF_LOAD commands. A privileged local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-0500) It was discovered that the Marvell NFC device driver implementation in the Linux kernel did not properly perform memory cleanup operations in some situations, leading to a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system) or execute arbitrary code. (CVE-2022-1734) Yongkang Jia discovered that the KVM hypervisor implementation in the Linux kernel did not properly handle guest TLB mapping invalidation requests in some situations. An attacker in a guest VM could use this to cause a denial of service in the host OS (system crash). (CVE-2022-1789) Duoming Zhou discovered a race condition in the NFC subsystem in the Linux kernel, leading to a use-after-free vulnerability. A privileged local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-1974) Duoming Zhou discovered that the NFC subsystem in the Linux kernel did not properly prevent context switches from occurring during certain atomic context operations. A privileged local attacker could use this to cause a denial of service (system crash). (CVE-2022-1975) Minh Yuan discovered that the floppy driver in the Linux kernel contained a race condition in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-33981) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 22.04 LTS: linux-image-5.15.0-1010-ibm 5.15.0-1010.12 linux-image-5.15.0-1011-gke 5.15.0-1011.14 linux-image-5.15.0-1013-gcp 5.15.0-1013.18 linux-image-5.15.0-1013-kvm 5.15.0-1013.16 linux-image-5.15.0-1013-oracle 5.15.0-1013.17 linux-image-5.15.0-1014-azure 5.15.0-1014.17 linux-image-5.15.0-1015-aws 5.15.0-1015.19 linux-image-5.15.0-41-generic 5.15.0-41.44 linux-image-5.15.0-41-generic-64k 5.15.0-41.44 linux-image-5.15.0-41-generic-lpae 5.15.0-41.44 linux-image-5.15.0-41-lowlatency 5.15.0-41.44 linux-image-5.15.0-41-lowlatency-64k 5.15.0-41.44 linux-image-aws 5.15.0.1015.15 linux-image-azure 5.15.0.1014.13 linux-image-gcp 5.15.0.1013.11 linux-image-generic 5.15.0.41.43 linux-image-generic-64k 5.15.0.41.43 linux-image-generic-64k-hwe-22.04 5.15.0.41.43 linux-image-generic-hwe-22.04 5.15.0.41.43 linux-image-generic-lpae5.15.0.41.43 linux-image-generic-lpae-hwe-22.04 5.15.0.41.43 linux-image-gke 5.15.0.1011.14 linux-image-gke-5.155.15.0.1011.14 linux-image-ibm 5.15.0.1010.9 linux-image-kvm 5.15.0.1013.11 linux-image-lowlatency 5.15.0.41.40 linux-image-lowlatency-64k 5.15.0.41.40 linux-image-lowlatency-64k-hwe-22.04 5.15.0.41.40 linux-image-lowlatency-hwe-22.04 5.15.0.41.40 linux-image-oem-20.04 5.15.0.41.43 linux-image-oracle 5.15.0.1013.11 linux-image-virtual 5.15.0.41.43 linux-image-virtual-hwe-22.04 5.15.0.41.43 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References:
[USN-5515-1] Linux kernel vulnerabilities
== Ubuntu Security Notice USN-5515-1 July 13, 2022 linux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15, linux-gcp-4.15, linux-hwe, linux-kvm, linux-oracle, linux-raspi2, linux-snapdragon vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 18.04 LTS - Ubuntu 16.04 ESM - Ubuntu 14.04 ESM Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-azure-4.15: Linux kernel for Microsoft Azure Cloud systems - linux-gcp-4.15: Linux kernel for Google Cloud Platform (GCP) systems - linux-kvm: Linux kernel for cloud environments - linux-oracle: Linux kernel for Oracle Cloud systems - linux-raspi2: Linux kernel for Raspberry Pi systems - linux-snapdragon: Linux kernel for Qualcomm Snapdragon processors - linux-aws-hwe: Linux kernel for Amazon Web Services (AWS-HWE) systems - linux-hwe: Linux hardware enablement (HWE) kernel - linux-azure: Linux kernel for Microsoft Azure Cloud systems Details: Eric Biederman discovered that the cgroup process migration implementation in the Linux kernel did not perform permission checks correctly in some situations. A local attacker could possibly use this to gain administrative privileges. (CVE-2021-4197) Jann Horn discovered that the FUSE file system in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-1011) Duoming Zhou discovered that the 6pack protocol implementation in the Linux kernel did not handle detach events properly in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash). (CVE-2022-1198) Duoming Zhou discovered that the AX.25 amateur radio protocol implementation in the Linux kernel did not handle detach events properly in some situations. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-1199) Duoming Zhou discovered race conditions in the AX.25 amateur radio protocol implementation in the Linux kernel during device detach operations. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-1204) Duoming Zhou discovered race conditions in the AX.25 amateur radio protocol implementation in the Linux kernel, leading to use-after-free vulnerabilities. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-1205) It was discovered that the PF_KEYv2 implementation in the Linux kernel did not properly initialize kernel memory in some situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2022-1353) It was discovered that the implementation of X.25 network protocols in the Linux kernel did not terminate link layer sessions properly. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-1516) Zheyu Ma discovered that the Silicon Motion SM712 framebuffer driver in the Linux kernel did not properly handle very small reads. A local attacker could use this to cause a denial of service (system crash). (CVE-2022-2380) It was discovered that the Microchip CAN BUS Analyzer interface implementation in the Linux kernel did not properly handle certain error conditions, leading to a double-free. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-28389) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 18.04 LTS: linux-image-4.15.0-1102-oracle 4.15.0-1102.113 linux-image-4.15.0-1115-raspi2 4.15.0-1115.123 linux-image-4.15.0-1123-kvm 4.15.0-1123.128 linux-image-4.15.0-1131-gcp 4.15.0-1131.147 linux-image-4.15.0-1133-snapdragon 4.15.0-1133.143 linux-image-4.15.0-1137-aws 4.15.0-1137.148 linux-image-4.15.0-1146-azure 4.15.0-1146.161 linux-image-4.15.0-189-generic 4.15.0-189.200 linux-image-4.15.0-189-generic-lpae 4.15.0-189.200 linux-image-4.15.0-189-lowlatency 4.15.0-189.200 linux-image-aws-lts-18.04 4.15.0.1137.137 linux-image-azure-lts-18.04 4.15.0.1146.116 linux-image-gcp-lts-18.04 4.15.0.1131.147 linux-image-generic 4.15.0.189.174 linux-image-generic-lpae4.15.0.189.174 linux-image-kvm 4.15.0.1123.116 linux-image-lowlatency 4.15.0.189.174 linux-image-oracle-lts-18.044.15.0.1102.109 linux-image-raspi2 4.15.0.1115.112 linux-image-snapdragon 4.15.0.1133.134 linux-image-virtual 4.15.0.189.174 Ubuntu 16.04 ESM: linux-image-4.15.0-1137-aws-hwe
[USN-5514-1] Linux kernel vulnerabilities
== Ubuntu Security Notice USN-5514-1 July 13, 2022 linux, linux-aws, linux-azure, linux-azure-5.4, linux-azure-fde, linux-gke, linux-gkeop, linux-hwe-5.4, linux-ibm, linux-kvm vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-azure: Linux kernel for Microsoft Azure Cloud systems - linux-azure-fde: Linux kernel for Microsoft Azure cloud systems - linux-gke: Linux kernel for Google Container Engine (GKE) systems - linux-gkeop: Linux kernel for Google Container Engine (GKE) systems - linux-ibm: Linux kernel for IBM cloud systems - linux-kvm: Linux kernel for cloud environments - linux-azure-5.4: Linux kernel for Microsoft Azure cloud systems - linux-hwe-5.4: Linux hardware enablement (HWE) kernel Details: It was discovered that the implementation of the 6pack and mkiss protocols in the Linux kernel did not handle detach events properly in some situations, leading to a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-1195) Duoming Zhou discovered that the AX.25 amateur radio protocol implementation in the Linux kernel did not handle detach events properly in some situations. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-1199) Duoming Zhou discovered race conditions in the AX.25 amateur radio protocol implementation in the Linux kernel during device detach operations. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-1204) Duoming Zhou discovered race conditions in the AX.25 amateur radio protocol implementation in the Linux kernel, leading to use-after-free vulnerabilities. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-1205) Yongkang Jia discovered that the KVM hypervisor implementation in the Linux kernel did not properly handle guest TLB mapping invalidation requests in some situations. An attacker in a guest VM could use this to cause a denial of service in the host OS (system crash). (CVE-2022-1789) Minh Yuan discovered that the floppy driver in the Linux kernel contained a race condition in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-33981) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS: linux-image-5.4.0-1029-ibm 5.4.0-1029.33 linux-image-5.4.0-1049-gkeop5.4.0-1049.52 linux-image-5.4.0-1071-kvm 5.4.0-1071.76 linux-image-5.4.0-1078-gke 5.4.0-1078.84 linux-image-5.4.0-1081-aws 5.4.0-1081.88 linux-image-5.4.0-1086-azure5.4.0-1086.91 linux-image-5.4.0-1086-azure-fde 5.4.0-1086.91+cvm1.1 linux-image-5.4.0-122-generic 5.4.0-122.138 linux-image-5.4.0-122-generic-lpae 5.4.0-122.138 linux-image-5.4.0-122-lowlatency 5.4.0-122.138 linux-image-aws-lts-20.04 5.4.0.1081.81 linux-image-azure-fde 5.4.0.1086.91+cvm1.27 linux-image-azure-lts-20.04 5.4.0.1086.83 linux-image-generic 5.4.0.122.123 linux-image-generic-lpae5.4.0.122.123 linux-image-gke 5.4.0.1078.86 linux-image-gke-5.4 5.4.0.1078.86 linux-image-gkeop 5.4.0.1049.50 linux-image-gkeop-5.4 5.4.0.1049.50 linux-image-ibm 5.4.0.1029.58 linux-image-ibm-lts-20.04 5.4.0.1029.58 linux-image-kvm 5.4.0.1071.68 linux-image-lowlatency 5.4.0.122.123 linux-image-oem 5.4.0.122.123 linux-image-oem-osp15.4.0.122.123 linux-image-virtual 5.4.0.122.123 Ubuntu 18.04 LTS: linux-image-5.4.0-1086-azure5.4.0-1086.91~18.04.1 linux-image-5.4.0-122-generic 5.4.0-122.138~18.04.1 linux-image-5.4.0-122-generic-lpae 5.4.0-122.138~18.04.1 linux-image-5.4.0-122-lowlatency 5.4.0-122.138~18.04.1 linux-image-azure 5.4.0.1086.63 linux-image-generic-hwe-18.04 5.4.0.122.138~18.04.102 linux-image-generic-lpae-hwe-18.04 5.4.0.122.138~18.04.102 linux-image-lowlatency-hwe-18.04 5.4.0.122.138~18.04.102 linux-image-oem 5.4.0.122.138~18.04.102 linux-image-oem-osp15.4.0.122.138~18.04.102 linux-image-snapdragon-hwe-18.04 5.4.0.122.138~18.04.102 linux-image-virtual-hwe-18.04 5.4.0.122.138~18.04.102 After a standard system update you need to reboot your computer to make all the necessary changes.
[USN-5513-1] Linux kernel (AWS) vulnerabilities
== Ubuntu Security Notice USN-5513-1 July 13, 2022 linux-aws vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 14.04 ESM Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux-aws: Linux kernel for Amazon Web Services (AWS) systems Details: Norbert Slusarek discovered a race condition in the CAN BCM networking protocol of the Linux kernel leading to multiple use-after-free vulnerabilities. A local attacker could use this issue to execute arbitrary code. (CVE-2021-3609) Likang Luo discovered that a race condition existed in the Bluetooth subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-3752) It was discovered that the NFC subsystem in the Linux kernel contained a use-after-free vulnerability in its NFC Controller Interface (NCI) implementation. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2021-3760) Szymon Heidrich discovered that the USB Gadget subsystem in the Linux kernel did not properly restrict the size of control requests for certain gadget types, leading to possible out of bounds reads or writes. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-39685) It was discovered that the Ion Memory Manager subsystem in the Linux kernel contained a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2021-39714) Eric Biederman discovered that the cgroup process migration implementation in the Linux kernel did not perform permission checks correctly in some situations. A local attacker could possibly use this to gain administrative privileges. (CVE-2021-4197) Lin Ma discovered that the NFC Controller Interface (NCI) implementation in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-4202) Sushma Venkatesh Reddy discovered that the Intel i915 graphics driver in the Linux kernel did not perform a GPU TLB flush in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2022-0330) It was discovered that the PF_KEYv2 implementation in the Linux kernel did not properly initialize kernel memory in some situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2022-1353) It was discovered that the virtual graphics memory manager implementation in the Linux kernel was subject to a race condition, potentially leading to an information leak. (CVE-2022-1419) Minh Yuan discovered that the floppy disk driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-1652) It was discovered that the Atheros ath9k wireless device driver in the Linux kernel did not properly handle some error conditions, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-1679) It was discovered that the Marvell NFC device driver implementation in the Linux kernel did not properly perform memory cleanup operations in some situations, leading to a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system) or execute arbitrary code. (CVE-2022-1734) It was discovered that some Intel processors did not completely perform cleanup actions on multi-core shared buffers. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21123) It was discovered that some Intel processors did not completely perform cleanup actions on microarchitectural fill buffers. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21125) It was discovered that some Intel processors did not properly perform cleanup during specific special register write operations. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21166) It was discovered that the USB Gadget file system interface in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-24958) 赵子轩 discovered that the 802.2 LLC type 2 driver in the Linux kernel did not properly perform reference counting in some
[USN-5505-1] Linux kernel vulnerabilities
== Ubuntu Security Notice USN-5505-1 July 07, 2022 linux-lts-xenial, linux-kvm vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 16.04 ESM - Ubuntu 14.04 ESM Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux-kvm: Linux kernel for cloud environments - linux-lts-xenial: Linux hardware enablement kernel from Xenial for Trusty Details: Norbert Slusarek discovered a race condition in the CAN BCM networking protocol of the Linux kernel leading to multiple use-after-free vulnerabilities. A local attacker could use this issue to execute arbitrary code. (CVE-2021-3609) Likang Luo discovered that a race condition existed in the Bluetooth subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-3752) It was discovered that the NFC subsystem in the Linux kernel contained a use-after-free vulnerability in its NFC Controller Interface (NCI) implementation. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2021-3760) Szymon Heidrich discovered that the USB Gadget subsystem in the Linux kernel did not properly restrict the size of control requests for certain gadget types, leading to possible out of bounds reads or writes. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-39685) It was discovered that the Ion Memory Manager subsystem in the Linux kernel contained a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2021-39714) Eric Biederman discovered that the cgroup process migration implementation in the Linux kernel did not perform permission checks correctly in some situations. A local attacker could possibly use this to gain administrative privileges. (CVE-2021-4197) Lin Ma discovered that the NFC Controller Interface (NCI) implementation in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-4202) Sushma Venkatesh Reddy discovered that the Intel i915 graphics driver in the Linux kernel did not perform a GPU TLB flush in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2022-0330) It was discovered that the PF_KEYv2 implementation in the Linux kernel did not properly initialize kernel memory in some situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2022-1353) It was discovered that the virtual graphics memory manager implementation in the Linux kernel was subject to a race condition, potentially leading to an information leak. (CVE-2022-1419) Minh Yuan discovered that the floppy disk driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-1652) It was discovered that the Atheros ath9k wireless device driver in the Linux kernel did not properly handle some error conditions, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-1679) It was discovered that the Marvell NFC device driver implementation in the Linux kernel did not properly perform memory cleanup operations in some situations, leading to a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system) or execute arbitrary code. (CVE-2022-1734) It was discovered that some Intel processors did not completely perform cleanup actions on multi-core shared buffers. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21123) It was discovered that some Intel processors did not completely perform cleanup actions on microarchitectural fill buffers. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21125) It was discovered that some Intel processors did not properly perform cleanup during specific special register write operations. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21166) It was discovered that the USB Gadget file system interface in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-24958) 赵子轩 discovered that the
[USN-5500-1] Linux kernel vulnerabilities
== Ubuntu Security Notice USN-5500-1 July 01, 2022 linux, linux-aws vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 16.04 ESM Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services (AWS) systems Details: Eric Biederman discovered that the cgroup process migration implementation in the Linux kernel did not perform permission checks correctly in some situations. A local attacker could possibly use this to gain administrative privileges. (CVE-2021-4197) Lin Ma discovered that the NFC Controller Interface (NCI) implementation in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-4202) It was discovered that the PF_KEYv2 implementation in the Linux kernel did not properly initialize kernel memory in some situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2022-1353) It was discovered that the virtual graphics memory manager implementation in the Linux kernel was subject to a race condition, potentially leading to an information leak. (CVE-2022-1419) Minh Yuan discovered that the floppy disk driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-1652) It was discovered that the Atheros ath9k wireless device driver in the Linux kernel did not properly handle some error conditions, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-1679) It was discovered that the Marvell NFC device driver implementation in the Linux kernel did not properly perform memory cleanup operations in some situations, leading to a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system) or execute arbitrary code. (CVE-2022-1734) 赵子轩 discovered that the 802.2 LLC type 2 driver in the Linux kernel did not properly perform reference counting in some error conditions. A local attacker could use this to cause a denial of service. (CVE-2022-28356) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 ESM: linux-image-4.4.0-1145-aws 4.4.0-1145.160 linux-image-4.4.0-229-generic 4.4.0-229.263 linux-image-4.4.0-229-lowlatency 4.4.0-229.263 linux-image-aws 4.4.0.1145.149 linux-image-generic 4.4.0.229.235 linux-image-lowlatency 4.4.0.229.235 linux-image-virtual 4.4.0.229.235 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-5500-1 CVE-2021-4197, CVE-2021-4202, CVE-2022-1353, CVE-2022-1419, CVE-2022-1652, CVE-2022-1679, CVE-2022-1734, CVE-2022-28356 signature.asc Description: PGP signature
[USN-5485-2] Linux kernel (OEM) vulnerabilities
== Ubuntu Security Notice USN-5485-2 July 01, 2022 linux-oem-5.14 vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.04 LTS Summary: Several security issues were mitigated in the Linux kernel. Software Description: - linux-oem-5.14: Linux kernel for OEM systems Details: It was discovered that some Intel processors did not completely perform cleanup actions on multi-core shared buffers. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21123) It was discovered that some Intel processors did not completely perform cleanup actions on microarchitectural fill buffers. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21125) It was discovered that some Intel processors did not properly perform cleanup during specific special register write operations. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21166) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS: linux-image-5.14.0-1044-oem 5.14.0-1044.49 linux-image-oem-20.04 5.14.0.1044.40 linux-image-oem-20.04b 5.14.0.1044.40 linux-image-oem-20.04c 5.14.0.1044.40 linux-image-oem-20.04d 5.14.0.1044.40 Please note that fully mitigating processor vulnerabilities requires corresponding processor microcode/firmware updates. After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-5485-2 https://ubuntu.com/security/notices/USN-5485-1 CVE-2022-21123, CVE-2022-21125, CVE-2022-21166 Package Information: https://launchpad.net/ubuntu/+source/linux-oem-5.14/5.14.0-1044.49 signature.asc Description: PGP signature
[USN-5493-2] Linux kernel (HWE) vulnerability
== Ubuntu Security Notice USN-5493-2 July 01, 2022 linux-hwe-5.13 vulnerability == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.04 LTS Summary: The system could be made to crash under certain conditions. Software Description: - linux-hwe-5.13: Linux hardware enablement (HWE) kernel Details: It was discovered that the 8 Devices USB2CAN interface implementation in the Linux kernel did not properly handle certain error conditions, leading to a double-free. A local attacker could possibly use this to cause a denial of service (system crash). Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS: linux-image-5.13.0-52-generic 5.13.0-52.59~20.04.1 linux-image-5.13.0-52-generic-64k 5.13.0-52.59~20.04.1 linux-image-5.13.0-52-generic-lpae 5.13.0-52.59~20.04.1 linux-image-5.13.0-52-lowlatency 5.13.0-52.59~20.04.1 linux-image-generic-64k-hwe-20.04 5.13.0.52.59~20.04.31 linux-image-generic-hwe-20.04 5.13.0.52.59~20.04.31 linux-image-generic-lpae-hwe-20.04 5.13.0.52.59~20.04.31 linux-image-lowlatency-hwe-20.04 5.13.0.52.59~20.04.31 linux-image-virtual-hwe-20.04 5.13.0.52.59~20.04.31 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-5493-2 https://ubuntu.com/security/notices/USN-5493-1 CVE-2022-28388 Package Information: https://launchpad.net/ubuntu/+source/linux-hwe-5.13/5.13.0-52.59~20.04.1 signature.asc Description: PGP signature
[USN-5496-1] cloud-init vulnerability
== Ubuntu Security Notice USN-5496-1 June 29, 2022 cloud-init vulnerability == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 22.04 LTS - Ubuntu 21.10 - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS Summary: cloud-init could be made to expose sensitive information. Software Description: - cloud-init: initialization and customization tool for cloud instances Details: Mike Stroyan discovered that cloud-init could log password hashes when reporting schema failures. An attacker with access to these logs could potentially use this to gain user credentials. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 22.04 LTS: cloud-init 22.2-0ubuntu1~22.04.3 Ubuntu 21.10: cloud-init 22.2-0ubuntu1~21.10.3 Ubuntu 20.04 LTS: cloud-init 22.2-0ubuntu1~20.04.3 Ubuntu 18.04 LTS: cloud-init 22.2-0ubuntu1~18.04.3 In general, a standard system update will make the necessary changes. Please note that sensitive information may have been logged to remote logging aggregators as well as to the system journal, and removal of such information may be required. Similarly, cloud-init configurations that log in non-default locations may also require the removal of sensitive information. References: https://ubuntu.com/security/notices/USN-5496-1 CVE-2022-2084 Package Information: https://launchpad.net/ubuntu/+source/cloud-init/22.2-0ubuntu1~22.04.3 https://launchpad.net/ubuntu/+source/cloud-init/22.2-0ubuntu1~21.10.3 https://launchpad.net/ubuntu/+source/cloud-init/22.2-0ubuntu1~20.04.3 https://launchpad.net/ubuntu/+source/cloud-init/22.2-0ubuntu1~18.04.3 signature.asc Description: PGP signature
[USN-5493-1] Linux kernel vulnerability
== Ubuntu Security Notice USN-5493-1 June 27, 2022 linux, linux-hwe vulnerability == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 21.10 - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS - Ubuntu 16.04 ESM Summary: The system could be made to crash under certain conditions. Software Description: - linux: Linux kernel - linux-hwe: Linux hardware enablement (HWE) kernel Details: It was discovered that the 8 Devices USB2CAN interface implementation in the Linux kernel did not properly handle certain error conditions, leading to a double-free. A local attacker could possibly use this to cause a denial of service (system crash). Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 21.10: linux-image-5.13.0-52-generic 5.13.0-52.59 linux-image-5.13.0-52-generic-64k 5.13.0-52.59 linux-image-5.13.0-52-generic-lpae 5.13.0-52.59 linux-image-5.13.0-52-lowlatency 5.13.0-52.59 linux-image-generic 5.13.0.52.58 linux-image-generic-64k 5.13.0.52.58 linux-image-generic-lpae5.13.0.52.58 linux-image-lowlatency 5.13.0.52.58 linux-image-oem-20.04 5.13.0.52.58 linux-image-virtual 5.13.0.52.58 Ubuntu 20.04 LTS: linux-image-5.4.0-121-generic 5.4.0-121.137 linux-image-5.4.0-121-generic-lpae 5.4.0-121.137 linux-image-5.4.0-121-lowlatency 5.4.0-121.137 linux-image-generic 5.4.0.121.122 linux-image-generic-lpae5.4.0.121.122 linux-image-lowlatency 5.4.0.121.122 linux-image-oem 5.4.0.121.122 linux-image-oem-osp15.4.0.121.122 linux-image-virtual 5.4.0.121.122 Ubuntu 18.04 LTS: linux-image-4.15.0-188-generic 4.15.0-188.199 linux-image-4.15.0-188-generic-lpae 4.15.0-188.199 linux-image-4.15.0-188-lowlatency 4.15.0-188.199 linux-image-generic 4.15.0.188.173 linux-image-generic-lpae4.15.0.188.173 linux-image-lowlatency 4.15.0.188.173 linux-image-virtual 4.15.0.188.173 Ubuntu 16.04 ESM: linux-image-4.15.0-188-generic 4.15.0-188.199~16.04.1 linux-image-4.15.0-188-lowlatency 4.15.0-188.199~16.04.1 linux-image-generic-hwe-16.04 4.15.0.188.175 linux-image-lowlatency-hwe-16.04 4.15.0.188.175 linux-image-oem 4.15.0.188.175 linux-image-virtual-hwe-16.04 4.15.0.188.175 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-5493-1 CVE-2022-28388 Package Information: https://launchpad.net/ubuntu/+source/linux/5.13.0-52.59 https://launchpad.net/ubuntu/+source/linux/5.4.0-121.137 https://launchpad.net/ubuntu/+source/linux/4.15.0-188.199 signature.asc Description: PGP signature
[USN-5484-1] Linux kernel vulnerabilities
== Ubuntu Security Notice USN-5484-1 June 16, 2022 linux vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 14.04 ESM Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux: Linux kernel Details: It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. (CVE-2022-21499) It was discovered that a race condition existed in the network scheduling subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-39713) It was discovered that some Intel processors did not completely perform cleanup actions on multi-core shared buffers. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21123) It was discovered that some Intel processors did not completely perform cleanup actions on microarchitectural fill buffers. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21125) It was discovered that some Intel processors did not properly perform cleanup during specific special register write operations. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21166) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 14.04 ESM: linux-image-3.13.0-190-generic 3.13.0-190.241 linux-image-3.13.0-190-lowlatency 3.13.0-190.241 linux-image-generic 3.13.0.190.199 linux-image-lowlatency 3.13.0.190.199 linux-image-server 3.13.0.190.199 linux-image-virtual 3.13.0.190.199 Please note that fully mitigating processor vulnerabilities requires corresponding processor microcode/firmware updates. After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-5484-1 CVE-2021-39713, CVE-2022-21123, CVE-2022-21125, CVE-2022-21166, CVE-2022-21499 signature.asc Description: PGP signature
[USN-5485-1] Linux kernel vulnerabilities
== Ubuntu Security Notice USN-5485-1 June 17, 2022 linux, linux-aws, linux-aws-hwe, linux-aws-5.13, linux-aws-5.4, linux-azure, linux-azure-4.15, linux-azure-5.13, linux-azure-5.4, linux-azure-fde, linux-dell300x, linux-gcp, linux-gcp-4.15, linux-gcp-5.13, linux-gcp-5.4, linux-gke, linux-gke-5.4, linux-gkeop, linux-gkeop-5.4, linux-hwe, linux-hwe-5.13, linux-hwe-5.4, linux-ibm, linux-ibm-5.4, linux-intel-5.13, linux-intel-iotg, linux-kvm, linux-lowlatency, linux-oracle, linux-oracle-5.13, linux-oracle-5.4 vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 22.04 LTS - Ubuntu 21.10 - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS - Ubuntu 16.04 ESM - Ubuntu 14.04 ESM Summary: Several security issues were addressed in the Linux kernel. Software Description: - linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-azure: Linux kernel for Microsoft Azure Cloud systems - linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems - linux-gke: Linux kernel for Google Container Engine (GKE) systems - linux-ibm: Linux kernel for IBM cloud systems - linux-intel-iotg: Linux kernel for Intel IoT platforms - linux-kvm: Linux kernel for cloud environments - linux-lowlatency: Linux low latency kernel - linux-oracle: Linux kernel for Oracle Cloud systems - linux-aws-5.13: Linux kernel for Amazon Web Services (AWS) systems - linux-azure-5.13: Linux kernel for Microsoft Azure cloud systems - linux-azure-fde: Linux kernel for Microsoft Azure cloud systems - linux-gcp-5.13: Linux kernel for Google Cloud Platform (GCP) systems - linux-gkeop: Linux kernel for Google Container Engine (GKE) systems - linux-hwe-5.13: Linux hardware enablement (HWE) kernel - linux-intel-5.13: Linux kernel for Intel IOTG - linux-oracle-5.13: Linux kernel for Oracle Cloud systems - linux-aws-5.4: Linux kernel for Amazon Web Services (AWS) systems - linux-azure-4.15: Linux kernel for Microsoft Azure Cloud systems - linux-azure-5.4: Linux kernel for Microsoft Azure cloud systems - linux-dell300x: Linux kernel for Dell 300x platforms - linux-gcp-4.15: Linux kernel for Google Cloud Platform (GCP) systems - linux-gcp-5.4: Linux kernel for Google Cloud Platform (GCP) systems - linux-gke-5.4: Linux kernel for Google Container Engine (GKE) systems - linux-gkeop-5.4: Linux kernel for Google Container Engine (GKE) systems - linux-hwe-5.4: Linux hardware enablement (HWE) kernel - linux-ibm-5.4: Linux kernel for IBM cloud systems - linux-oracle-5.4: Linux kernel for Oracle Cloud systems - linux-aws-hwe: Linux kernel for Amazon Web Services (AWS-HWE) systems - linux-hwe: Linux hardware enablement (HWE) kernel Details: It was discovered that some Intel processors did not completely perform cleanup actions on multi-core shared buffers. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21123) It was discovered that some Intel processors did not completely perform cleanup actions on microarchitectural fill buffers. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21125) It was discovered that some Intel processors did not properly perform cleanup during specific special register write operations. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21166) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 22.04 LTS: linux-image-5.15.0-1009-ibm 5.15.0-1009.11 linux-image-5.15.0-1010-gcp 5.15.0-1010.15 linux-image-5.15.0-1010-gke 5.15.0-1010.13 linux-image-5.15.0-1010-intel-iotg 5.15.0-1010.14 linux-image-5.15.0-1011-oracle 5.15.0-1011.15 linux-image-5.15.0-1012-azure 5.15.0-1012.15 linux-image-5.15.0-1012-kvm 5.15.0-1012.14 linux-image-5.15.0-1013-aws 5.15.0-1013.17 linux-image-5.15.0-39-generic 5.15.0-39.42 linux-image-5.15.0-39-generic-64k 5.15.0-39.42 linux-image-5.15.0-39-generic-lpae 5.15.0-39.42 linux-image-5.15.0-39-lowlatency 5.15.0-39.42 linux-image-5.15.0-39-lowlatency-64k 5.15.0-39.42 linux-image-aws 5.15.0.1013.13 linux-image-azure 5.15.0.1012.11 linux-image-gcp 5.15.0.1010.9 linux-image-generic 5.15.0.39.40 linux-image-generic-hwe-22.04 5.15.0.39.40 linux-image-generic-lpae5.15.0.39.40 linux-image-generic-lpae-hwe-22.04 5.15.0.39.40 linux-image-gke 5.15.0.1010.13 linux-image-gke-5.155.15.0.1010.13 linux-image-ibm 5.15.0.1009.8 linux-image-intel-iotg 5.15.0.1010.10 linux-image-kvm 5.15.0.1012.10 linux-image-lowlatency 5.15.0.39.38 linux-image-lowlatency-hwe-22.04 5.15.0.39.38 linux-image-oem-20.04 5.15.0.39.40
[USN-5469-1] Linux kernel vulnerabilities
== Ubuntu Security Notice USN-5469-1 June 08, 2022 linux, linux-aws, linux-azure, linux-gcp, linux-gke, linux-ibm, linux-intel-iotg, linux-kvm, linux-lowlatency, linux-oracle, linux-raspi vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 22.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-azure: Linux kernel for Microsoft Azure Cloud systems - linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems - linux-gke: Linux kernel for Google Container Engine (GKE) systems - linux-ibm: Linux kernel for IBM cloud systems - linux-intel-iotg: Linux kernel for Intel IoT platforms - linux-kvm: Linux kernel for cloud environments - linux-lowlatency: Linux low latency kernel - linux-oracle: Linux kernel for Oracle Cloud systems - linux-raspi: Linux kernel for Raspberry Pi systems Details: It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. (CVE-2022-21499) Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-1966) Billy Jheng Bing Jhong discovered that the CIFS network file system implementation in the Linux kernel did not properly validate arguments to ioctl() in some situations. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-0168) Hu Jiahui discovered that multiple race conditions existed in the Advanced Linux Sound Architecture (ALSA) framework, leading to use-after-free vulnerabilities. A local attacker could use these to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-1048) Qiuhao Li, Gaoning Pan and Yongkang Jia discovered that the KVM implementation in the Linux kernel did not properly perform guest page table updates in some situations. An attacker in a guest vm could possibly use this to crash the host OS. (CVE-2022-1158) It was discovered that the implementation of the 6pack and mkiss protocols in the Linux kernel did not handle detach events properly in some situations, leading to a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-1195) Duoming Zhou discovered that the 6pack protocol implementation in the Linux kernel did not handle detach events properly in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash). (CVE-2022-1198) Duoming Zhou discovered that the AX.25 amateur radio protocol implementation in the Linux kernel did not handle detach events properly in some situations. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-1199) Duoming Zhou discovered race conditions in the AX.25 amateur radio protocol implementation in the Linux kernel during device detach operations. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-1204) Duoming Zhou discovered race conditions in the AX.25 amateur radio protocol implementation in the Linux kernel, leading to use-after-free vulnerabilities. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-1205) Qiuhao Li, Gaoning Pan, and Yongkang Jia discovered that the kvm implementation in the Linux kernel did not handle releasing a virtual cpu properly. A local attacker in a guest VM coud possibly use this to cause a denial of service (host system crash). (CVE-2022-1263) It was discovered that the PF_KEYv2 implementation in the Linux kernel did not properly initialize kernel memory in some situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2022-1353) It was discovered that the implementation of X.25 network protocols in the Linux kernel did not terminate link layer sessions properly. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-1516) It was discovered that the ACRN Hypervisor Service Module implementation in the Linux kernel did not properly deallocate memory in some situations. A local privileged attacker could possibly use this to cause a denial of service (memory exhaustion). (CVE-2022-1651) It was discovered that the RxRPC session socket implementation in the Linux kernel did not properly handle ioctls called
[USN-5471-1] Linux kernel (OEM) vulnerabilities
== Ubuntu Security Notice USN-5471-1 June 08, 2022 linux-oem-5.17 vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 22.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux-oem-5.17: Linux kernel for OEM systems Details: It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. (CVE-2022-21499) Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-1966) It was discovered that the IP implementation in the Linux kernel did not provide sufficient randomization when calculating port offsets. An attacker could possibly use this to expose sensitive information. (CVE-2022-1012) Duoming Zhou discovered race conditions in the AX.25 amateur radio protocol implementation in the Linux kernel, leading to use-after-free vulnerabilities. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-1205) It was discovered that the Marvell NFC device driver implementation in the Linux kernel did not properly perform memory cleanup operations in some situations, leading to a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system) or execute arbitrary code. (CVE-2022-1734) Minh Yuan discovered that the floppy driver in the Linux kernel contained a race condition in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-1836) Ziming Zhang discovered that the netfilter subsystem in the Linux kernel did not properly validate sets with multiple ranged fields. A local attacker could use this to cause a denial of service or execute arbitrary code. (CVE-2022-1972) Joseph Ravichandran and Michael Wang discovered that the io_uring subsystem in the Linux kernel did not properly initialize data in some situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2022-29968) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 22.04 LTS: linux-image-5.17.0-1011-oem 5.17.0-1011.12 linux-image-oem-22.04 5.17.0.1011.10 linux-image-oem-22.04a 5.17.0.1011.10 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-5471-1 CVE-2022-1012, CVE-2022-1205, CVE-2022-1734, CVE-2022-1836, CVE-2022-1966, CVE-2022-1972, CVE-2022-21499, CVE-2022-29968 Package Information: https://launchpad.net/ubuntu/+source/linux-oem-5.17/5.17.0-1011.12 signature.asc Description: PGP signature
[USN-5470-1] Linux kernel (OEM) vulnerabilities
== Ubuntu Security Notice USN-5470-1 June 08, 2022 linux-oem-5.14 vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux-oem-5.14: Linux kernel for OEM systems Details: It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. (CVE-2022-21499) Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-1966) Minh Yuan discovered that the floppy driver in the Linux kernel contained a race condition in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-1836) Ziming Zhang discovered that the netfilter subsystem in the Linux kernel did not properly validate sets with multiple ranged fields. A local attacker could use this to cause a denial of service or execute arbitrary code. (CVE-2022-1972) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS: linux-image-5.14.0-1042-oem 5.14.0-1042.47 linux-image-oem-20.04 5.14.0.1042.38 linux-image-oem-20.04b 5.14.0.1042.38 linux-image-oem-20.04c 5.14.0.1042.38 linux-image-oem-20.04d 5.14.0.1042.38 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-5470-1 CVE-2022-1836, CVE-2022-1966, CVE-2022-1972, CVE-2022-21499 Package Information: https://launchpad.net/ubuntu/+source/linux-oem-5.14/5.14.0-1042.47 signature.asc Description: PGP signature
[USN-5468-1] Linux kernel vulnerabilities
== Ubuntu Security Notice USN-5468-1 June 08, 2022 linux, linux-aws, linux-aws-5.13, linux-azure, linux-azure-5.13, linux-gcp, linux-gcp-5.13, linux-hwe-5.13, linux-intel-5.13, linux-kvm, linux-oracle, linux-oracle-5.13, linux-raspi vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 21.10 - Ubuntu 20.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-azure: Linux kernel for Microsoft Azure Cloud systems - linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems - linux-kvm: Linux kernel for cloud environments - linux-oracle: Linux kernel for Oracle Cloud systems - linux-raspi: Linux kernel for Raspberry Pi systems - linux-aws-5.13: Linux kernel for Amazon Web Services (AWS) systems - linux-azure-5.13: Linux kernel for Microsoft Azure cloud systems - linux-gcp-5.13: Linux kernel for Google Cloud Platform (GCP) systems - linux-hwe-5.13: Linux hardware enablement (HWE) kernel - linux-intel-5.13: Linux kernel for Intel IOTG - linux-oracle-5.13: Linux kernel for Oracle Cloud systems Details: It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. (CVE-2022-21499) Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-1966) Qiuhao Li, Gaoning Pan and Yongkang Jia discovered that the KVM implementation in the Linux kernel did not properly perform guest page table updates in some situations. An attacker in a guest vm could possibly use this to crash the host OS. (CVE-2022-1158) Ziming Zhang discovered that the netfilter subsystem in the Linux kernel did not properly validate sets with multiple ranged fields. A local attacker could use this to cause a denial of service or execute arbitrary code. (CVE-2022-1972) It was discovered that the USB Gadget file system interface in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-24958) It was discovered that the EMS CAN/USB interface implementation in the Linux kernel contained a double-free vulnerability when handling certain error conditions. A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2022-28390) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 21.10: linux-image-5.13.0-1027-kvm 5.13.0-1027.29 linux-image-5.13.0-1028-aws 5.13.0-1028.31 linux-image-5.13.0-1028-azure 5.13.0-1028.33 linux-image-5.13.0-1030-gcp 5.13.0-1030.36 linux-image-5.13.0-1031-raspi 5.13.0-1031.34 linux-image-5.13.0-1031-raspi-nolpae 5.13.0-1031.34 linux-image-5.13.0-1033-oracle 5.13.0-1033.39 linux-image-5.13.0-48-generic 5.13.0-48.54 linux-image-5.13.0-48-generic-64k 5.13.0-48.54 linux-image-5.13.0-48-generic-lpae 5.13.0-48.54 linux-image-5.13.0-48-lowlatency 5.13.0-48.54 linux-image-aws 5.13.0.1028.28 linux-image-azure 5.13.0.1028.27 linux-image-gcp 5.13.0.1030.27 linux-image-generic 5.13.0.48.56 linux-image-generic-64k 5.13.0.48.56 linux-image-generic-lpae5.13.0.48.56 linux-image-gke 5.13.0.1030.27 linux-image-kvm 5.13.0.1027.26 linux-image-lowlatency 5.13.0.48.56 linux-image-oem-20.04 5.13.0.48.56 linux-image-oracle 5.13.0.1033.32 linux-image-raspi 5.13.0.1031.35 linux-image-raspi-nolpae5.13.0.1031.35 linux-image-virtual 5.13.0.48.56 Ubuntu 20.04 LTS: linux-image-5.13.0-1014-intel 5.13.0-1014.15 linux-image-5.13.0-1028-aws 5.13.0-1028.31~20.04.1 linux-image-5.13.0-1028-azure 5.13.0-1028.33~20.04.1 linux-image-5.13.0-1030-gcp 5.13.0-1030.36~20.04.1 linux-image-5.13.0-1033-oracle 5.13.0-1033.39~20.04.1 linux-image-5.13.0-48-generic 5.13.0-48.54~20.04.1 linux-image-5.13.0-48-generic-64k 5.13.0-48.54~20.04.1 linux-image-5.13.0-48-generic-lpae 5.13.0-48.54~20.04.1 linux-image-5.13.0-48-lowlatency 5.13.0-48.54~20.04.1 linux-image-aws 5.13.0.1028.31~20.04.22 linux-image-azure 5.13.0.1028.33~20.04.17 linux-image-gcp 5.13.0.1030.36~20.04.1 linux-image-generic-64k-hwe-20.04
[USN-5466-1] Linux kernel vulnerabilities
== Ubuntu Security Notice USN-5466-1 June 08, 2022 linux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15, linux-gcp, linux-hwe, linux-kvm, linux-oracle, linux-raspi2, linux-snapdragon vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 18.04 LTS - Ubuntu 16.04 ESM - Ubuntu 14.04 ESM Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-azure-4.15: Linux kernel for Microsoft Azure Cloud systems - linux-kvm: Linux kernel for cloud environments - linux-oracle: Linux kernel for Oracle Cloud systems - linux-raspi2: Linux kernel for Raspberry Pi systems - linux-snapdragon: Linux kernel for Qualcomm Snapdragon processors - linux-aws-hwe: Linux kernel for Amazon Web Services (AWS-HWE) systems - linux-azure: Linux kernel for Microsoft Azure Cloud systems - linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems - linux-hwe: Linux hardware enablement (HWE) kernel Details: It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. (CVE-2022-21499) Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-1966) It was discovered that the SCTP protocol implementation in the Linux kernel did not properly verify VTAGs in some situations. A remote attacker could possibly use this to cause a denial of service (connection disassociation). (CVE-2021-3772) It was discovered that the btrfs file system implementation in the Linux kernel did not properly handle locking in certain error conditions. A local attacker could use this to cause a denial of service (kernel deadlock). (CVE-2021-4149) David Bouman discovered that the netfilter subsystem in the Linux kernel did not initialize memory in some situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2022-1016) It was discovered that the virtual graphics memory manager implementation in the Linux kernel was subject to a race condition, potentially leading to an information leak. (CVE-2022-1419) 赵子轩 discovered that the 802.2 LLC type 2 driver in the Linux kernel did not properly perform reference counting in some error conditions. A local attacker could use this to cause a denial of service. (CVE-2022-28356) It was discovered that the EMS CAN/USB interface implementation in the Linux kernel contained a double-free vulnerability when handling certain error conditions. A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2022-28390) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 18.04 LTS: linux-image-4.15.0-1098-oracle 4.15.0-1098.108 linux-image-4.15.0-1114-raspi2 4.15.0-1114.122 linux-image-4.15.0-1119-kvm 4.15.0-1119.123 linux-image-4.15.0-1132-snapdragon 4.15.0-1132.142 linux-image-4.15.0-1133-aws 4.15.0-1133.143 linux-image-4.15.0-1142-azure 4.15.0-1142.156 linux-image-4.15.0-184-generic 4.15.0-184.194 linux-image-4.15.0-184-generic-lpae 4.15.0-184.194 linux-image-4.15.0-184-lowlatency 4.15.0-184.194 linux-image-aws-lts-18.04 4.15.0.1133.135 linux-image-azure-lts-18.04 4.15.0.1142.114 linux-image-generic 4.15.0.184.172 linux-image-generic-lpae4.15.0.184.172 linux-image-kvm 4.15.0.1119.114 linux-image-lowlatency 4.15.0.184.172 linux-image-oracle-lts-18.044.15.0.1098.107 linux-image-raspi2 4.15.0.1114.111 linux-image-snapdragon 4.15.0.1132.133 linux-image-virtual 4.15.0.184.172 Ubuntu 16.04 ESM: linux-image-4.15.0-1098-oracle 4.15.0-1098.108~16.04.1 linux-image-4.15.0-1127-gcp 4.15.0-1127.142~16.04.1 linux-image-4.15.0-1133-aws-hwe 4.15.0-1133.143~16.04.1 linux-image-4.15.0-1142-azure 4.15.0-1142.156~16.04.1 linux-image-4.15.0-184-generic 4.15.0-184.194~16.04.1 linux-image-4.15.0-184-lowlatency 4.15.0-184.194~16.04.1 linux-image-aws-hwe 4.15.0.1133.122 linux-image-azure 4.15.0.1142.131 linux-image-gcp 4.15.0.1127.126 linux-image-generic-hwe-16.04 4.15.0.184.173 linux-image-gke 4.15.0.1127.126 linux-image-lowlatency-hwe-16.04 4.15.0.184.173 linux-image-oem 4.15.0.184.173 linux-image-oracle 4.15.0.1098.85
[USN-5467-1] Linux kernel vulnerabilities
== Ubuntu Security Notice USN-5467-1 June 08, 2022 linux, linux-aws, linux-aws-5.4, linux-azure, linux-azure-5.4, linux-azure-fde, linux-gcp, linux-gke, linux-gke-5.4, linux-gkeop, linux-gkeop-5.4, linux-hwe-5.4, linux-ibm, linux-ibm-5.4, linux-kvm, linux-oracle, linux-oracle-5.4, linux-raspi, linux-raspi-5.4 vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-azure: Linux kernel for Microsoft Azure Cloud systems - linux-azure-fde: Linux kernel for Microsoft Azure cloud systems - linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems - linux-gke: Linux kernel for Google Container Engine (GKE) systems - linux-gkeop: Linux kernel for Google Container Engine (GKE) systems - linux-ibm: Linux kernel for IBM cloud systems - linux-kvm: Linux kernel for cloud environments - linux-oracle: Linux kernel for Oracle Cloud systems - linux-raspi: Linux kernel for Raspberry Pi systems - linux-aws-5.4: Linux kernel for Amazon Web Services (AWS) systems - linux-azure-5.4: Linux kernel for Microsoft Azure cloud systems - linux-gke-5.4: Linux kernel for Google Container Engine (GKE) systems - linux-gkeop-5.4: Linux kernel for Google Container Engine (GKE) systems - linux-hwe-5.4: Linux hardware enablement (HWE) kernel - linux-ibm-5.4: Linux kernel for IBM cloud systems - linux-oracle-5.4: Linux kernel for Oracle Cloud systems - linux-raspi-5.4: Linux kernel for Raspberry Pi systems Details: It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. (CVE-2022-21499) Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-1966) It was discovered that the SCTP protocol implementation in the Linux kernel did not properly verify VTAGs in some situations. A remote attacker could possibly use this to cause a denial of service (connection disassociation). (CVE-2021-3772) Eric Biederman discovered that the cgroup process migration implementation in the Linux kernel did not perform permission checks correctly in some situations. A local attacker could possibly use this to gain administrative privileges. (CVE-2021-4197) Jann Horn discovered that the FUSE file system in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-1011) Qiuhao Li, Gaoning Pan and Yongkang Jia discovered that the KVM implementation in the Linux kernel did not properly perform guest page table updates in some situations. An attacker in a guest vm could possibly use this to crash the host OS. (CVE-2022-1158) Duoming Zhou discovered that the 6pack protocol implementation in the Linux kernel did not handle detach events properly in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash). (CVE-2022-1198) It was discovered that the PF_KEYv2 implementation in the Linux kernel did not properly initialize kernel memory in some situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2022-1353) It was discovered that the implementation of X.25 network protocols in the Linux kernel did not terminate link layer sessions properly. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-1516) Demi Marie Obenour and Simon Gaiser discovered that several Xen para- virtualization device frontends did not properly restrict the access rights of device backends. An attacker could possibly use a malicious Xen backend to gain access to memory pages of a guest VM or cause a denial of service in the guest. (CVE-2022-23036, CVE-2022-23037, CVE-2022-23038, CVE-2022-23039, CVE-2022-23040, CVE-2022-23041, CVE-2022-23042) It was discovered that the USB Gadget file system interface in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-24958) It was discovered that the USB SR9700 ethernet device driver for the Linux kernel did not properly validate the length of requests from the device. A physically proximate attacker could possibly use this to expose sensitive
[USN-5465-1] Linux kernel vulnerabilities
== Ubuntu Security Notice USN-5465-1 June 08, 2022 linux, linux-aws, linux-kvm, linux-lts-xenial vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 16.04 ESM - Ubuntu 14.04 ESM Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-kvm: Linux kernel for cloud environments - linux-lts-xenial: Linux hardware enablement kernel from Xenial for Trusty Details: It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. (CVE-2022-21499) Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-1966) Jann Horn discovered that the Linux kernel did not properly enforce seccomp restrictions in some situations. A local attacker could use this to bypass intended seccomp sandbox restrictions. (CVE-2022-30594) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 ESM: linux-image-4.4.0-1108-kvm 4.4.0-1108.118 linux-image-4.4.0-1143-aws 4.4.0-1143.158 linux-image-4.4.0-227-generic 4.4.0-227.261 linux-image-4.4.0-227-lowlatency 4.4.0-227.261 linux-image-aws 4.4.0.1143.147 linux-image-generic 4.4.0.227.233 linux-image-kvm 4.4.0.1108.105 linux-image-lowlatency 4.4.0.227.233 linux-image-virtual 4.4.0.227.233 Ubuntu 14.04 ESM: linux-image-4.4.0-1107-aws 4.4.0-1107.113 linux-image-4.4.0-227-generic 4.4.0-227.261~14.04.1 linux-image-4.4.0-227-lowlatency 4.4.0-227.261~14.04.1 linux-image-aws 4.4.0.1107.104 linux-image-generic-lts-xenial 4.4.0.227.197 linux-image-lowlatency-lts-xenial 4.4.0.227.197 linux-image-virtual-lts-xenial 4.4.0.227.197 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-5465-1 CVE-2022-1966, CVE-2022-21499, CVE-2022-30594 signature.asc Description: PGP signature
[USN-5442-2] Linux kernel vulnerabilities
== Ubuntu Security Notice USN-5442-2 June 01, 2022 linux-gcp-5.4, linux-gkeop, linux-gkeop-5.4, linux-ibm-5.4, linux-oracle, linux-oracle-5.4, linux-raspi, linux-raspi-5.4 vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux-gkeop: Linux kernel for Google Container Engine (GKE) systems - linux-oracle: Linux kernel for Oracle Cloud systems - linux-raspi: Linux kernel for Raspberry Pi systems - linux-gcp-5.4: Linux kernel for Google Cloud Platform (GCP) systems - linux-gkeop-5.4: Linux kernel for Google Container Engine (GKE) systems - linux-ibm-5.4: Linux kernel for IBM cloud systems - linux-oracle-5.4: Linux kernel for Oracle Cloud systems - linux-raspi-5.4: Linux kernel for Raspberry Pi systems Details: Kyle Zeng discovered that the Network Queuing and Scheduling subsystem of the Linux kernel did not properly perform reference counting in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-29581) Bing-Jhong Billy Jheng discovered that the io_uring subsystem in the Linux kernel contained in integer overflow. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-1116) Jann Horn discovered that the Linux kernel did not properly enforce seccomp restrictions in some situations. A local attacker could use this to bypass intended seccomp sandbox restrictions. (CVE-2022-30594) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS: linux-image-5.4.0-1043-gkeop5.4.0-1043.44 linux-image-5.4.0-1062-raspi5.4.0-1062.70 linux-image-5.4.0-1073-oracle 5.4.0-1073.79 linux-image-gkeop 5.4.0.1043.46 linux-image-gkeop-5.4 5.4.0.1043.46 linux-image-oracle-lts-20.045.4.0.1073.73 linux-image-raspi 5.4.0.1062.96 linux-image-raspi2 5.4.0.1062.96 Ubuntu 18.04 LTS: linux-image-5.4.0-1023-ibm 5.4.0-1023.25~18.04.1 linux-image-5.4.0-1043-gkeop5.4.0-1043.44~18.04.1 linux-image-5.4.0-1062-raspi5.4.0-1062.70~18.04.1 linux-image-5.4.0-1073-oracle 5.4.0-1073.79~18.04.1 linux-image-5.4.0-1075-gcp 5.4.0-1075.80~18.04.1 linux-image-gcp 5.4.0.1075.58 linux-image-gkeop-5.4 5.4.0.1043.44~18.04.42 linux-image-ibm 5.4.0.1023.39 linux-image-oracle 5.4.0.1073.79~18.04.52 linux-image-raspi-hwe-18.04 5.4.0.1062.63 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-5442-2 https://ubuntu.com/security/notices/USN-5442-1 CVE-2022-1116, CVE-2022-29581, CVE-2022-30594 Package Information: https://launchpad.net/ubuntu/+source/linux-gkeop/5.4.0-1043.44 https://launchpad.net/ubuntu/+source/linux-oracle/5.4.0-1073.79 https://launchpad.net/ubuntu/+source/linux-raspi/5.4.0-1062.70 https://launchpad.net/ubuntu/+source/linux-gcp-5.4/5.4.0-1075.80~18.04.1 https://launchpad.net/ubuntu/+source/linux-gkeop-5.4/5.4.0-1043.44~18.04.1 https://launchpad.net/ubuntu/+source/linux-ibm-5.4/5.4.0-1023.25~18.04.1 https://launchpad.net/ubuntu/+source/linux-oracle-5.4/5.4.0-1073.79~18.04.1 https://launchpad.net/ubuntu/+source/linux-raspi-5.4/5.4.0-1062.70~18.04.1 signature.asc Description: PGP signature
[USN-5443-2] Linux kernel vulnerabilities
== Ubuntu Security Notice USN-5443-2 June 01, 2022 linux-gcp-5.13, linux-oracle, linux-oracle-5.13 vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 21.10 - Ubuntu 20.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux-oracle: Linux kernel for Oracle Cloud systems - linux-gcp-5.13: Linux kernel for Google Cloud Platform (GCP) systems - linux-oracle-5.13: Linux kernel for Oracle Cloud systems Details: Kyle Zeng discovered that the Network Queuing and Scheduling subsystem of the Linux kernel did not properly perform reference counting in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-29581) Jann Horn discovered that the Linux kernel did not properly enforce seccomp restrictions in some situations. A local attacker could use this to bypass intended seccomp sandbox restrictions. (CVE-2022-30594) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 21.10: linux-image-5.13.0-1030-oracle 5.13.0-1030.35 linux-image-oracle 5.13.0.1030.30 Ubuntu 20.04 LTS: linux-image-5.13.0-1027-gcp 5.13.0-1027.32~20.04.1 linux-image-5.13.0-1030-oracle 5.13.0-1030.35~20.04.1 linux-image-gcp 5.13.0.1027.32~20.04.1 linux-image-oracle 5.13.0.1030.35~20.04.1 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-5443-2 https://ubuntu.com/security/notices/USN-5443-1 CVE-2022-29581, CVE-2022-30594 Package Information: https://launchpad.net/ubuntu/+source/linux-oracle/5.13.0-1030.35 https://launchpad.net/ubuntu/+source/linux-gcp-5.13/5.13.0-1027.32~20.04.1 https://launchpad.net/ubuntu/+source/linux-oracle-5.13/5.13.0-1030.35~20.04.1 signature.asc Description: PGP signature
[Bug 1975523] Re: [MIR] Promote to main in Jammy and Kinetic
** Tags added: sec-1058 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1975523 Title: [MIR] Promote to main in Jammy and Kinetic To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ruby-webrick/+bug/1975523/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1963707] Re: [MIR] libqrtr-glib
** Tags added: sec-1057 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1963707 Title: [MIR] libqrtr-glib To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libqrtr-glib/+bug/1963707/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1972740] Re: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-30594 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1972740 Title: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1972740/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1972043] Re: Please add -ftrivial-auto-var-init=zero to default build flags
** Tags added: sec-994 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1972043 Title: Please add -ftrivial-auto-var-init=zero to default build flags To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/dpkg/+bug/1972043/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[USN-5417-1] Linux kernel vulnerabilities
== Ubuntu Security Notice USN-5417-1 May 12, 2022 linux, linux-aws, linux-aws-5.13, linux-azure, linux-azure-5.13, linux-gcp, linux-gcp-5.13, linux-hwe-5.13, linux-kvm, linux-oracle, linux-raspi vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 21.10 - Ubuntu 20.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-azure: Linux kernel for Microsoft Azure Cloud systems - linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems - linux-kvm: Linux kernel for cloud environments - linux-oracle: Linux kernel for Oracle Cloud systems - linux-raspi: Linux kernel for Raspberry Pi systems - linux-aws-5.13: Linux kernel for Amazon Web Services (AWS) systems - linux-azure-5.13: Linux kernel for Microsoft Azure cloud systems - linux-gcp-5.13: Linux kernel for Google Cloud Platform (GCP) systems - linux-hwe-5.13: Linux hardware enablement (HWE) kernel Details: Ke Sun, Alyssa Milburn, Henrique Kawakami, Emma Benoit, Igor Chervatyuk, Lisa Aichele, and Thais Moreira Hamasaki discovered that the Spectre Variant 2 mitigations for AMD processors on Linux were insufficient in some situations. A local attacker could possibly use this to expose sensitive information. (CVE-2021-26401) It was discovered that the MMC/SD subsystem in the Linux kernel did not properly handle read errors from SD cards in certain situations. An attacker could possibly use this to expose sensitive information (kernel memory). (CVE-2022-20008) It was discovered that the USB gadget subsystem in the Linux kernel did not properly validate interface descriptor requests. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-25258) It was discovered that the Remote NDIS (RNDIS) USB gadget implementation in the Linux kernel did not properly validate the size of the RNDIS_MSG_SET command. An attacker could possibly use this to expose sensitive information (kernel memory). (CVE-2022-25375) It was discovered that the ST21NFCA NFC driver in the Linux kernel did not properly validate the size of certain data in EVT_TRANSACTION events. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-26490) It was discovered that the USB SR9700 ethernet device driver for the Linux kernel did not properly validate the length of requests from the device. A physically proximate attacker could possibly use this to expose sensitive information (kernel memory). (CVE-2022-26966) It was discovered that the Xilinx USB2 device gadget driver in the Linux kernel did not properly validate endpoint indices from the host. A physically proximate attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-27223) Miaoqian Lin discovered that the RDMA Transport (RTRS) client implementation in the Linux kernel contained a double-free when handling certain error conditions. An attacker could use this to cause a denial of service (system crash). (CVE-2022-29156) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 21.10: linux-image-5.13.0-1022-kvm 5.13.0-1022.23 linux-image-5.13.0-1023-aws 5.13.0-1023.25 linux-image-5.13.0-1023-azure 5.13.0-1023.27 linux-image-5.13.0-1025-gcp 5.13.0-1025.30 linux-image-5.13.0-1026-raspi 5.13.0-1026.28 linux-image-5.13.0-1026-raspi-nolpae 5.13.0-1026.28 linux-image-5.13.0-1028-oracle 5.13.0-1028.33 linux-image-5.13.0-41-generic 5.13.0-41.46 linux-image-5.13.0-41-generic-64k 5.13.0-41.46 linux-image-5.13.0-41-generic-lpae 5.13.0-41.46 linux-image-5.13.0-41-lowlatency 5.13.0-41.46 linux-image-aws 5.13.0.1023.24 linux-image-azure 5.13.0.1023.23 linux-image-gcp 5.13.0.1025.23 linux-image-generic 5.13.0.41.50 linux-image-generic-64k 5.13.0.41.50 linux-image-generic-lpae5.13.0.41.50 linux-image-gke 5.13.0.1025.23 linux-image-kvm 5.13.0.1022.22 linux-image-lowlatency 5.13.0.41.50 linux-image-oem-20.04 5.13.0.41.50 linux-image-oracle 5.13.0.1028.28 linux-image-raspi 5.13.0.1026.31 linux-image-raspi-nolpae5.13.0.1026.31 linux-image-virtual 5.13.0.41.50 Ubuntu 20.04 LTS: linux-image-5.13.0-1023-aws 5.13.0-1023.25~20.04.1 linux-image-5.13.0-1023-azure 5.13.0-1023.27~20.04.1 linux-image-5.13.0-1025-gcp 5.13.0-1025.30~20.04.1 linux-image-5.13.0-41-generic 5.13.0-41.46~20.04.1 linux-image-5.13.0-41-generic-64k 5.13.0-41.46~20.04.1
[USN-5418-1] Linux kernel vulnerabilities
== Ubuntu Security Notice USN-5418-1 May 12, 2022 linux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15, linux-dell300x, linux-gcp, linux-gcp-4.15, linux-hwe, linux-kvm, linux-oracle, linux-snapdragon vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 18.04 LTS - Ubuntu 16.04 ESM - Ubuntu 14.04 ESM Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-azure-4.15: Linux kernel for Microsoft Azure Cloud systems - linux-dell300x: Linux kernel for Dell 300x platforms - linux-gcp-4.15: Linux kernel for Google Cloud Platform (GCP) systems - linux-kvm: Linux kernel for cloud environments - linux-oracle: Linux kernel for Oracle Cloud systems - linux-snapdragon: Linux kernel for Qualcomm Snapdragon processors - linux-aws-hwe: Linux kernel for Amazon Web Services (AWS-HWE) systems - linux-azure: Linux kernel for Microsoft Azure Cloud systems - linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems - linux-hwe: Linux hardware enablement (HWE) kernel Details: Ke Sun, Alyssa Milburn, Henrique Kawakami, Emma Benoit, Igor Chervatyuk, Lisa Aichele, and Thais Moreira Hamasaki discovered that the Spectre Variant 2 mitigations for AMD processors on Linux were insufficient in some situations. A local attacker could possibly use this to expose sensitive information. (CVE-2021-26401) Demi Marie Obenour and Simon Gaiser discovered that several Xen para- virtualization device frontends did not properly restrict the access rights of device backends. An attacker could possibly use a malicious Xen backend to gain access to memory pages of a guest VM or cause a denial of service in the guest. (CVE-2022-23036, CVE-2022-23037, CVE-2022-23038, CVE-2022-23039, CVE-2022-23040, CVE-2022-23042) It was discovered that the USB Gadget file system interface in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-24958) It was discovered that the USB gadget subsystem in the Linux kernel did not properly validate interface descriptor requests. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-25258) It was discovered that the Remote NDIS (RNDIS) USB gadget implementation in the Linux kernel did not properly validate the size of the RNDIS_MSG_SET command. An attacker could possibly use this to expose sensitive information (kernel memory). (CVE-2022-25375) It was discovered that the ST21NFCA NFC driver in the Linux kernel did not properly validate the size of certain data in EVT_TRANSACTION events. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-26490) It was discovered that the USB SR9700 ethernet device driver for the Linux kernel did not properly validate the length of requests from the device. A physically proximate attacker could possibly use this to expose sensitive information (kernel memory). (CVE-2022-26966) It was discovered that the Xilinx USB2 device gadget driver in the Linux kernel did not properly validate endpoint indices from the host. A physically proximate attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-27223) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 18.04 LTS: linux-image-4.15.0-1042-dell300x 4.15.0-1042.47 linux-image-4.15.0-1093-oracle 4.15.0-1093.102 linux-image-4.15.0-1114-kvm 4.15.0-1114.117 linux-image-4.15.0-1122-gcp 4.15.0-1122.136 linux-image-4.15.0-1127-snapdragon 4.15.0-1127.136 linux-image-4.15.0-1128-aws 4.15.0-1128.137 linux-image-4.15.0-1138-azure 4.15.0-1138.151 linux-image-4.15.0-177-generic 4.15.0-177.186 linux-image-4.15.0-177-generic-lpae 4.15.0-177.186 linux-image-4.15.0-177-lowlatency 4.15.0-177.186 linux-image-aws-lts-18.04 4.15.0.1128.131 linux-image-azure-lts-18.04 4.15.0.1138.111 linux-image-dell300x4.15.0.1042.44 linux-image-gcp-lts-18.04 4.15.0.1122.141 linux-image-generic 4.15.0.177.166 linux-image-generic-lpae4.15.0.177.166 linux-image-kvm 4.15.0.1114.110 linux-image-lowlatency 4.15.0.177.166 linux-image-oracle-lts-18.044.15.0.1093.103 linux-image-snapdragon 4.15.0.1127.130 linux-image-virtual 4.15.0.177.166 Ubuntu 16.04 ESM: linux-image-4.15.0-1093-oracle 4.15.0-1093.102~16.04.1 linux-image-4.15.0-1122-gcp 4.15.0-1122.136~16.04.1 linux-image-4.15.0-1128-aws-hwe 4.15.0-1128.137~16.04.1
[USN-5416-1] Linux kernel (OEM) vulnerabilities
== Ubuntu Security Notice USN-5416-1 May 12, 2022 linux-oem-5.14 vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux-oem-5.14: Linux kernel for OEM systems Details: Qiuhao Li, Gaoning Pan and Yongkang Jia discovered that the KVM implementation in the Linux kernel did not properly perform guest page table updates in some situations. An attacker in a guest vm could possibly use this to crash the host OS. (CVE-2022-1158) It was discovered that the implementation of X.25 network protocols in the Linux kernel did not terminate link layer sessions properly. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-1516) It was discovered that the 8 Devices USB2CAN interface implementation in the Linux kernel did not properly handle certain error conditions, leading to a double-free. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-28388) It was discovered that the Microchip CAN BUS Analyzer interface implementation in the Linux kernel did not properly handle certain error conditions, leading to a double-free. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-28389) It was discovered that the EMS CAN/USB interface implementation in the Linux kernel contained a double-free vulnerability when handling certain error conditions. A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2022-28390) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS: linux-image-5.14.0-1036-oem 5.14.0-1036.40 linux-image-oem-20.04 5.14.0.1036.33 linux-image-oem-20.04b 5.14.0.1036.33 linux-image-oem-20.04c 5.14.0.1036.33 linux-image-oem-20.04d 5.14.0.1036.33 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-5416-1 CVE-2022-1158, CVE-2022-1516, CVE-2022-28388, CVE-2022-28389, CVE-2022-28390 Package Information: https://launchpad.net/ubuntu/+source/linux-oem-5.14/5.14.0-1036.40 signature.asc Description: PGP signature
[USN-5413-1] Linux kernel vulnerabilities
== Ubuntu Security Notice USN-5413-1 May 12, 2022 linux, linux-aws, linux-kvm, linux-lts-xenial vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 16.04 ESM - Ubuntu 14.04 ESM Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-kvm: Linux kernel for cloud environments - linux-lts-xenial: Linux hardware enablement kernel from Xenial for Trusty Details: Jeremy Cline discovered a use-after-free in the nouveau graphics driver of the Linux kernel during device removal. A privileged or physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2020-27820) It was discovered that a race condition existed in the network scheduling subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-39713) It was discovered that the Parallel NFS (pNFS) implementation in the Linux kernel did not properly perform bounds checking in some situations. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-4157) It was discovered that the ST21NFCA NFC driver in the Linux kernel did not properly validate the size of certain data in EVT_TRANSACTION events. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-26490) It was discovered that the Xilinx USB2 device gadget driver in the Linux kernel did not properly validate endpoint indices from the host. A physically proximate attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-27223) It was discovered that the EMS CAN/USB interface implementation in the Linux kernel contained a double-free vulnerability when handling certain error conditions. A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2022-28390) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 ESM: linux-image-4.4.0-1105-kvm 4.4.0-1105.114 linux-image-4.4.0-1140-aws 4.4.0-1140.154 linux-image-4.4.0-224-generic 4.4.0-224.257 linux-image-4.4.0-224-lowlatency 4.4.0-224.257 linux-image-aws 4.4.0.1140.145 linux-image-generic 4.4.0.224.231 linux-image-kvm 4.4.0.1105.103 linux-image-lowlatency 4.4.0.224.231 linux-image-virtual 4.4.0.224.231 Ubuntu 14.04 ESM: linux-image-4.4.0-224-generic 4.4.0-224.257~14.04.1 linux-image-4.4.0-224-lowlatency 4.4.0-224.257~14.04.1 linux-image-generic-lts-xenial 4.4.0.224.195 linux-image-lowlatency-lts-xenial 4.4.0.224.195 linux-image-virtual-lts-xenial 4.4.0.224.195 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-5413-1 CVE-2020-27820, CVE-2021-39713, CVE-2021-4157, CVE-2022-26490, CVE-2022-27223, CVE-2022-28390 signature.asc Description: PGP signature
[USN-5415-1] Linux kernel vulnerabilities
== Ubuntu Security Notice USN-5415-1 May 12, 2022 linux, linux-aws, linux-azure, linux-azure-5.4, linux-azure-fde, linux-gcp, linux-gcp-5.4, linux-gke, linux-gkeop, linux-gkeop-5.4, linux-hwe-5.4, linux-ibm, linux-ibm-5.4, linux-kvm, linux-oracle, linux-oracle-5.4, linux-raspi, linux-raspi-5.4 vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-azure: Linux kernel for Microsoft Azure Cloud systems - linux-azure-fde: Linux kernel for Microsoft Azure cloud systems - linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems - linux-gke: Linux kernel for Google Container Engine (GKE) systems - linux-gkeop: Linux kernel for Google Container Engine (GKE) systems - linux-ibm: Linux kernel for IBM cloud systems - linux-kvm: Linux kernel for cloud environments - linux-oracle: Linux kernel for Oracle Cloud systems - linux-raspi: Linux kernel for Raspberry Pi systems - linux-azure-5.4: Linux kernel for Microsoft Azure cloud systems - linux-gcp-5.4: Linux kernel for Google Cloud Platform (GCP) systems - linux-gkeop-5.4: Linux kernel for Google Container Engine (GKE) systems - linux-hwe-5.4: Linux hardware enablement (HWE) kernel - linux-ibm-5.4: Linux kernel for IBM cloud systems - linux-oracle-5.4: Linux kernel for Oracle Cloud systems - linux-raspi-5.4: Linux kernel for Raspberry Pi systems Details: Jeremy Cline discovered a use-after-free in the nouveau graphics driver of the Linux kernel during device removal. A privileged or physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2020-27820) Ke Sun, Alyssa Milburn, Henrique Kawakami, Emma Benoit, Igor Chervatyuk, Lisa Aichele, and Thais Moreira Hamasaki discovered that the Spectre Variant 2 mitigations for AMD processors on Linux were insufficient in some situations. A local attacker could possibly use this to expose sensitive information. (CVE-2021-26401) David Bouman discovered that the netfilter subsystem in the Linux kernel did not initialize memory in some situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2022-1016) It was discovered that the MMC/SD subsystem in the Linux kernel did not properly handle read errors from SD cards in certain situations. An attacker could possibly use this to expose sensitive information (kernel memory). (CVE-2022-20008) It was discovered that the USB gadget subsystem in the Linux kernel did not properly validate interface descriptor requests. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-25258) It was discovered that the Remote NDIS (RNDIS) USB gadget implementation in the Linux kernel did not properly validate the size of the RNDIS_MSG_SET command. An attacker could possibly use this to expose sensitive information (kernel memory). (CVE-2022-25375) It was discovered that the ST21NFCA NFC driver in the Linux kernel did not properly validate the size of certain data in EVT_TRANSACTION events. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-26490) It was discovered that the Xilinx USB2 device gadget driver in the Linux kernel did not properly validate endpoint indices from the host. A physically proximate attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-27223) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS: linux-image-5.4.0-1021-ibm 5.4.0-1021.23 linux-image-5.4.0-1040-gkeop5.4.0-1040.41 linux-image-5.4.0-1060-raspi5.4.0-1060.68 linux-image-5.4.0-1063-kvm 5.4.0-1063.66 linux-image-5.4.0-1071-gke 5.4.0-1071.76 linux-image-5.4.0-1071-oracle 5.4.0-1071.77 linux-image-5.4.0-1073-aws 5.4.0-1073.78 linux-image-5.4.0-1073-gcp 5.4.0-1073.78 linux-image-5.4.0-1078-azure5.4.0-1078.81 linux-image-5.4.0-1078-azure-fde 5.4.0-1078.81+cvm1.1 linux-image-5.4.0-110-generic 5.4.0-110.124 linux-image-5.4.0-110-generic-lpae 5.4.0-110.124 linux-image-5.4.0-110-lowlatency 5.4.0-110.124 linux-image-aws-lts-20.04 5.4.0.1073.75 linux-image-azure-fde 5.4.0.1078.81+cvm1.22 linux-image-azure-lts-20.04 5.4.0.1078.76 linux-image-gcp-lts-20.04 5.4.0.1073.81 linux-image-generic 5.4.0.110.114 linux-image-generic-lpae5.4.0.110.114 linux-image-gke 5.4.0.1071.80 linux-image-gke-5.4 5.4.0.1071.80 linux-image-gkeop 5.4.0.1040.43
[Bug 1892559] Re: [MIR] ccid opensc pcsc-lite
** Tags added: sec-407 ** Tags added: sec-408 sec-409 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1892559 Title: [MIR] ccid opensc pcsc-lite To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ccid/+bug/1892559/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1965115] Re: [MIR] nullboot
** Tags added: sec-976 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1965115 Title: [MIR] nullboot To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nullboot/+bug/1965115/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1971895] Re: Warning messages from stat printed on installation with no user crontabs
** Also affects: cron (Ubuntu Bionic) Importance: Undecided Status: New ** Also affects: cron (Ubuntu Xenial) Importance: Undecided Status: New ** Changed in: cron (Ubuntu Xenial) Status: New => Triaged ** Changed in: cron (Ubuntu Bionic) Status: New => Triaged -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1971895 Title: Warning messages from stat printed on installation with no user crontabs To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/cron/+bug/1971895/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1949186] Re: Missing Linux Kernel mitigations for 'SSB - Speculative Store Bypass' hardware vulnerabilities
** Changed in: linux-aws (Ubuntu) Status: New => Incomplete -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1949186 Title: Missing Linux Kernel mitigations for 'SSB - Speculative Store Bypass' hardware vulnerabilities To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-aws/+bug/1949186/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1950644] Re: ubuntu_ltp_syscalls / finit_module02 fails on v4.15 and other kernels
Hi, is this still on the kernel team's radar to address in trusty and in the various linux-azure kernels? Thanks! ** Changed in: linux-oem-5.14 (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-oem-5.13 (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-oem-5.10 (Ubuntu Trusty) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1950644 Title: ubuntu_ltp_syscalls / finit_module02 fails on v4.15 and other kernels To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1950644/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1951927] Re: Array overflow in au_procfs_plm_write
Thanks, making this public. ** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1951927 Title: Array overflow in au_procfs_plm_write To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1951927/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1961528] Re: Security: Arbitrary shell command injection through PDF import or unpaper preprocessing
** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1961528 Title: Security: Arbitrary shell command injection through PDF import or unpaper preprocessing To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ocrfeeder/+bug/1961528/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1967626] Re: 22.04 beta Network Manager still sets wrong IPv6 routing
Given that this issue is public in the freedesktop gitlab instance, I'm making this issue public here as well. ** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1967626 Title: 22.04 beta Network Manager still sets wrong IPv6 routing To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/network-manager/+bug/1967626/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1961854] Re: Thunderbid saves accepted calendar events in different identity
Hi Bartłomiej, was this issue reported to mozilla? Do you have a bug report there? Thanks! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1961854 Title: Thunderbid saves accepted calendar events in different identity To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/thunderbird/+bug/1961854/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1970012] Re: package yaru-theme-gnome-shell 21.10.2 failed to install/upgrade: el subproceso nuevo paquete yaru-theme-gnome-shell script pre-installation devolvió el código de salida de error 1
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1970012 Title: package yaru-theme-gnome-shell 21.10.2 failed to install/upgrade: el subproceso nuevo paquete yaru-theme-gnome-shell script pre- installation devolvió el código de salida de error 1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/yaru-theme/+bug/1970012/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1971415] Re: Remote desktop is automatically enabled after login
Jeremy, is there any progress on this? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1971415 Title: Remote desktop is automatically enabled after login To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-remote-desktop/+bug/1971415/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1972812] Re: The operating system does not ask for a password after unlocking the screen.
** Package changed: ubuntu => gnome-shell (Ubuntu) ** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1972812 Title: The operating system does not ask for a password after unlocking the screen. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-shell/+bug/1972812/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1214787] Re: busybox crashed with signal 7
** Information type changed from Private to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1214787 Title: busybox crashed with signal 7 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/busybox/+bug/1214787/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[USN-5390-2] Linux kernel (Raspberry Pi) vulnerabilities
== Ubuntu Security Notice USN-5390-2 May 03, 2022 linux-raspi vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 22.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux-raspi: Linux kernel for Raspberry Pi systems Details: David Bouman discovered that the netfilter subsystem in the Linux kernel did not properly validate passed user register indices. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2022-1015) David Bouman discovered that the netfilter subsystem in the Linux kernel did not initialize memory in some situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2022-1016) It was discovered that the ST21NFCA NFC driver in the Linux kernel did not properly validate the size of certain data in EVT_TRANSACTION events. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-26490) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 22.04 LTS: linux-image-5.15.0-1006-raspi 5.15.0-1006.6 linux-image-5.15.0-1006-raspi-nolpae 5.15.0-1006.6 linux-image-raspi 5.15.0.1006.6 linux-image-raspi-nolpae5.15.0.1006.6 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-5390-2 https://ubuntu.com/security/notices/USN-5390-1 CVE-2022-1015, CVE-2022-1016, CVE-2022-26490 Package Information: https://launchpad.net/ubuntu/+source/linux-raspi/5.15.0-1006.6 signature.asc Description: PGP signature
[USN-5390-1] Linux kernel vulnerabilities
== Ubuntu Security Notice USN-5390-1 April 26, 2022 linux, linux-gcp, linux-ibm, linux-lowlatency vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 22.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux: Linux kernel - linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems - linux-ibm: Linux kernel for IBM cloud systems - linux-lowlatency: Linux low latency kernel Details: David Bouman discovered that the netfilter subsystem in the Linux kernel did not properly validate passed user register indices. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2022-1015) David Bouman discovered that the netfilter subsystem in the Linux kernel did not initialize memory in some situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2022-1016) It was discovered that the ST21NFCA NFC driver in the Linux kernel did not properly validate the size of certain data in EVT_TRANSACTION events. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-26490) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 22.04 LTS: linux-image-5.15.0-1003-ibm 5.15.0-1003.3 linux-image-5.15.0-1004-gcp 5.15.0-1004.7 linux-image-5.15.0-27-generic 5.15.0-27.28 linux-image-5.15.0-27-generic-64k 5.15.0-27.28 linux-image-5.15.0-27-generic-lpae 5.15.0-27.28 linux-image-5.15.0-27-lowlatency 5.15.0-27.28 linux-image-5.15.0-27-lowlatency-64k 5.15.0-27.28 linux-image-gcp 5.15.0.1004.5 linux-image-generic 5.15.0.27.30 linux-image-generic-64k 5.15.0.27.30 linux-image-generic-lpae5.15.0.27.30 linux-image-ibm 5.15.0.1003.4 linux-image-lowlatency 5.15.0.27.28 linux-image-lowlatency-64k 5.15.0.27.28 linux-image-oem-20.04 5.15.0.27.30 linux-image-virtual 5.15.0.27.30 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-5390-1 CVE-2022-1015, CVE-2022-1016, CVE-2022-26490 Package Information: https://launchpad.net/ubuntu/+source/linux/5.15.0-27.28 https://launchpad.net/ubuntu/+source/linux-gcp/5.15.0-1004.7 https://launchpad.net/ubuntu/+source/linux-ibm/5.15.0-1003.3 https://launchpad.net/ubuntu/+source/linux-lowlatency/5.15.0-27.28 signature.asc Description: PGP signature
[Bug 1970267] [NEW] Unable to save macaroons in MozillaCookieJar() under python3.10
Public bug reported: Upstream bug report: https://github.com/go-macaroon-bakery/py-macaroon- bakery/issues/88 See above for details, but the essential bug is that doing something like the following: client = httpbakery.Client(cookies=MozillaCookieJar(".cooklefile")) if os.path.exists(client.cookies.filename): client.cookies.load(ignore_discard=True) response = client.request("POST", url=url, json=payload) client.cookies.save(ignore_discard=True) stated throwing a traceback under python3.10: [ELIDED] File "/usr/lib/python3.10/http/cookiejar.py", line 2120, in save if cookie.has_nonstandard_attr(HTTPONLY_ATTR): File "/usr/lib/python3.10/http/cookiejar.py", line 805, in has_nonstandard_attr return name in self._rest TypeError: argument of type 'NoneType' is not iterable because py-macaroon-bakery creates a http.cookiejar.Cookie() object with the rest field set to None, causing the writing out of a cookie file to fail. ** Affects: py-macaroon-bakery (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1970267 Title: Unable to save macaroons in MozillaCookieJar() under python3.10 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/py-macaroon-bakery/+bug/1970267/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1969619] Re: RDP Sharing appears on by default in jammy
Hi, yes, from the Ubuntu Security team's perspective, this should go to the security pocket. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1969619 Title: RDP Sharing appears on by default in jammy To manage notifications about this bug go to: https://bugs.launchpad.net/gnome-control-center/+bug/1969619/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[USN-5385-1] Linux kernel vulnerabilities
== Ubuntu Security Notice USN-5385-1 April 21, 2022 linux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15, linux-dell300x, linux-gcp, inux-gcp-4.15, linux-hwe, linux-kvm, linux-oracle, linux-snapdragon vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 18.04 LTS - Ubuntu 16.04 ESM - Ubuntu 14.04 ESM Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-azure-4.15: Linux kernel for Microsoft Azure Cloud systems - linux-dell300x: Linux kernel for Dell 300x platforms - linux-gcp-4.15: Linux kernel for Google Cloud Platform (GCP) systems - linux-kvm: Linux kernel for cloud environments - linux-oracle: Linux kernel for Oracle Cloud systems - linux-snapdragon: Linux kernel for Qualcomm Snapdragon processors - linux-aws-hwe: Linux kernel for Amazon Web Services (AWS-HWE) systems - linux-azure: Linux kernel for Microsoft Azure Cloud systems - linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems - linux-hwe: Linux hardware enablement (HWE) kernel Details: Brendan Dolan-Gavitt discovered that the aQuantia AQtion Ethernet device driver in the Linux kernel did not properly validate meta-data coming from the device. A local attacker who can control an emulated device can use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-43975) It was discovered that the UDF file system implementation in the Linux kernel could attempt to dereference a null pointer in some situations. An attacker could use this to construct a malicious UDF image that, when mounted and operated on, could cause a denial of service (system crash). (CVE-2022-0617) Lyu Tao discovered that the NFS implementation in the Linux kernel did not properly handle requests to open a directory on a regular file. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2022-24448) It was discovered that the YAM AX.25 device driver in the Linux kernel did not properly deallocate memory in some error conditions. A local privileged attacker could use this to cause a denial of service (kernel memory exhaustion). (CVE-2022-24959) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 18.04 LTS: linux-image-4.15.0-1041-dell300x 4.15.0-1041.46 linux-image-4.15.0-1092-oracle 4.15.0-1092.101 linux-image-4.15.0-1113-kvm 4.15.0-1113.116 linux-image-4.15.0-1121-gcp 4.15.0-1121.135 linux-image-4.15.0-1126-snapdragon 4.15.0-1126.135 linux-image-4.15.0-1127-aws 4.15.0-1127.136 linux-image-4.15.0-1137-azure 4.15.0-1137.150 linux-image-4.15.0-176-generic 4.15.0-176.185 linux-image-4.15.0-176-generic-lpae 4.15.0-176.185 linux-image-4.15.0-176-lowlatency 4.15.0-176.185 linux-image-aws-lts-18.04 4.15.0.1127.130 linux-image-azure-lts-18.04 4.15.0.1137.110 linux-image-dell300x4.15.0.1041.43 linux-image-gcp-lts-18.04 4.15.0.1121.140 linux-image-generic 4.15.0.176.165 linux-image-generic-lpae4.15.0.176.165 linux-image-kvm 4.15.0.1113.109 linux-image-lowlatency 4.15.0.176.165 linux-image-oracle-lts-18.044.15.0.1092.102 linux-image-snapdragon 4.15.0.1126.129 linux-image-virtual 4.15.0.176.165 Ubuntu 16.04 ESM: linux-image-4.15.0-1092-oracle 4.15.0-1092.101~16.04.1 linux-image-4.15.0-1121-gcp 4.15.0-1121.135~16.04.1 linux-image-4.15.0-1127-aws-hwe 4.15.0-1127.136~16.04.1 linux-image-4.15.0-1137-azure 4.15.0-1137.150~16.04.1 linux-image-4.15.0-176-generic 4.15.0-176.185~16.04.1 linux-image-4.15.0-176-lowlatency 4.15.0-176.185~16.04.1 linux-image-aws-hwe 4.15.0.1127.117 linux-image-azure 4.15.0.1137.127 linux-image-gcp 4.15.0.1121.122 linux-image-generic-hwe-16.04 4.15.0.176.168 linux-image-gke 4.15.0.1121.122 linux-image-lowlatency-hwe-16.04 4.15.0.176.168 linux-image-oem 4.15.0.176.168 linux-image-oracle 4.15.0.1092.80 linux-image-virtual-hwe-16.04 4.15.0.176.168 Ubuntu 14.04 ESM: linux-image-4.15.0-1137-azure 4.15.0-1137.150~14.04.1 linux-image-azure 4.15.0.1137.109 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
[USN-5384-1] Linux kernel vulnerabilities
== Ubuntu Security Notice USN-5384-1 April 20, 2022 linux, linux-aws, linux-azure, linux-azure-5.4, linux-azure-fde, linux-gcp, linux-gcp-5.4, linux-gke, linux-gke-5.4, linux-gkeop, linux-gkeop-5.4, linux-hwe-5.4, linux-ibm, linux-ibm-5.4, linux-kvm, linux-oracle, linux-oracle-5.4, linux-raspi, linux-raspi-5.4 vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-azure: Linux kernel for Microsoft Azure Cloud systems - linux-azure-fde: Linux kernel for Microsoft Azure cloud systems - linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems - linux-gke: Linux kernel for Google Container Engine (GKE) systems - linux-gkeop: Linux kernel for Google Container Engine (GKE) systems - linux-ibm: Linux kernel for IBM cloud systems - linux-kvm: Linux kernel for cloud environments - linux-oracle: Linux kernel for Oracle Cloud systems - linux-raspi: Linux kernel for Raspberry Pi systems - linux-azure-5.4: Linux kernel for Microsoft Azure cloud systems - linux-gcp-5.4: Linux kernel for Google Cloud Platform (GCP) systems - linux-gke-5.4: Linux kernel for Google Container Engine (GKE) systems - linux-gkeop-5.4: Linux kernel for Google Container Engine (GKE) systems - linux-hwe-5.4: Linux hardware enablement (HWE) kernel - linux-ibm-5.4: Linux kernel for IBM cloud systems - linux-oracle-5.4: Linux kernel for Oracle Cloud systems - linux-raspi-5.4: Linux kernel for Raspberry Pi systems Details: It was discovered that the UDF file system implementation in the Linux kernel could attempt to dereference a null pointer in some situations. An attacker could use this to construct a malicious UDF image that, when mounted and operated on, could cause a denial of service (system crash). (CVE-2022-0617) Lyu Tao discovered that the NFS implementation in the Linux kernel did not properly handle requests to open a directory on a regular file. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2022-24448) It was discovered that the YAM AX.25 device driver in the Linux kernel did not properly deallocate memory in some error conditions. A local privileged attacker could use this to cause a denial of service (kernel memory exhaustion). (CVE-2022-24959) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS: linux-image-5.4.0-1020-ibm 5.4.0-1020.22 linux-image-5.4.0-1039-gkeop5.4.0-1039.40 linux-image-5.4.0-1059-raspi5.4.0-1059.67 linux-image-5.4.0-1062-kvm 5.4.0-1062.65 linux-image-5.4.0-1068-gke 5.4.0-1068.71 linux-image-5.4.0-1070-oracle 5.4.0-1070.76 linux-image-5.4.0-1072-aws 5.4.0-1072.77 linux-image-5.4.0-1072-gcp 5.4.0-1072.77 linux-image-5.4.0-1076-azure-fde 5.4.0-1076.79+cvm1.1 linux-image-5.4.0-1077-azure5.4.0-1077.80 linux-image-5.4.0-109-generic 5.4.0-109.123 linux-image-5.4.0-109-generic-lpae 5.4.0-109.123 linux-image-5.4.0-109-lowlatency 5.4.0-109.123 linux-image-aws-lts-20.04 5.4.0.1072.74 linux-image-azure-fde 5.4.0.1076.79+cvm1.21 linux-image-azure-lts-20.04 5.4.0.1077.75 linux-image-gcp-lts-20.04 5.4.0.1072.80 linux-image-generic 5.4.0.109.113 linux-image-generic-lpae5.4.0.109.113 linux-image-gke 5.4.0.1068.78 linux-image-gke-5.4 5.4.0.1068.78 linux-image-gkeop 5.4.0.1039.42 linux-image-gkeop-5.4 5.4.0.1039.42 linux-image-ibm 5.4.0.1020.20 linux-image-ibm-lts-20.04 5.4.0.1020.20 linux-image-kvm 5.4.0.1062.61 linux-image-lowlatency 5.4.0.109.113 linux-image-oem 5.4.0.109.113 linux-image-oem-osp15.4.0.109.113 linux-image-oracle-lts-20.045.4.0.1070.70 linux-image-raspi 5.4.0.1059.93 linux-image-raspi2 5.4.0.1059.93 linux-image-virtual 5.4.0.109.113 Ubuntu 18.04 LTS: linux-image-5.4.0-1020-ibm 5.4.0-1020.22~18.04.1 linux-image-5.4.0-1039-gkeop5.4.0-1039.40~18.04.1 linux-image-5.4.0-1059-raspi5.4.0-1059.66~18.04.1 linux-image-5.4.0-1068-gke 5.4.0-1068.71~18.04.1 linux-image-5.4.0-1070-oracle 5.4.0-1070.76~18.04.1 linux-image-5.4.0-1072-gcp 5.4.0-1072.77~18.04.1 linux-image-5.4.0-1077-azure5.4.0-1077.80~18.04.1 linux-image-5.4.0-109-generic 5.4.0-109.123~18.04.1 linux-image-5.4.0-109-generic-lpae 5.4.0-109.123~18.04.1 linux-image-5.4.0-109-lowlatency 5.4.0-109.123~18.04.1 linux-image-azure 5.4.0.1077.56 linux-image-gcp
[USN-5383-1] Linux kernel vulnerabilities
== Ubuntu Security Notice USN-5383-1 April 20, 2022 linux, linux-aws, linux-aws-5.13, linux-azure, linux-azure-5.13, linux-gcp, linux-gcp-5.13, linux-hwe-5.13, linux-kvm, linux-oracle, linux-oracle-5.13, linux-raspi vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 21.10 - Ubuntu 20.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-azure: Linux kernel for Microsoft Azure Cloud systems - linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems - linux-kvm: Linux kernel for cloud environments - linux-oracle: Linux kernel for Oracle Cloud systems - linux-raspi: Linux kernel for Raspberry Pi systems - linux-aws-5.13: Linux kernel for Amazon Web Services (AWS) systems - linux-azure-5.13: Linux kernel for Microsoft Azure cloud systems - linux-gcp-5.13: Linux kernel for Google Cloud Platform (GCP) systems - linux-hwe-5.13: Linux hardware enablement (HWE) kernel - linux-oracle-5.13: Linux kernel for Oracle Cloud systems Details: David Bouman discovered that the netfilter subsystem in the Linux kernel did not properly validate passed user register indices. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2022-1015) Brendan Dolan-Gavitt discovered that the Marvell WiFi-Ex USB device driver in the Linux kernel did not properly handle some error conditions. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2021-43976) Wenqing Liu discovered that the f2fs file system implementation in the Linux kernel did not properly validate inode types while performing garbage collection. An attacker could use this to construct a malicious f2fs image that, when mounted and operated on, could cause a denial of service (system crash). (CVE-2021-44879) It was discovered that the UDF file system implementation in the Linux kernel could attempt to dereference a null pointer in some situations. An attacker could use this to construct a malicious UDF image that, when mounted and operated on, could cause a denial of service (system crash). (CVE-2022-0617) David Bouman discovered that the netfilter subsystem in the Linux kernel did not initialize memory in some situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2022-1016) Lyu Tao discovered that the NFS implementation in the Linux kernel did not properly handle requests to open a directory on a regular file. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2022-24448) It was discovered that the VirtIO Bluetooth driver in the Linux kernel did not properly deallocate memory in some error conditions. A local attacker could possibly use this to cause a denial of service (memory exhaustion). (CVE-2022-26878) It was discovered that the YAM AX.25 device driver in the Linux kernel did not properly deallocate memory in some error conditions. A local privileged attacker could use this to cause a denial of service (kernel memory exhaustion). (CVE-2022-24959) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 21.10: linux-image-5.13.0-1021-kvm 5.13.0-1021.22 linux-image-5.13.0-1022-aws 5.13.0-1022.24 linux-image-5.13.0-1022-azure 5.13.0-1022.26 linux-image-5.13.0-1024-gcp 5.13.0-1024.29 linux-image-5.13.0-1025-raspi 5.13.0-1025.27 linux-image-5.13.0-1025-raspi-nolpae 5.13.0-1025.27 linux-image-5.13.0-1027-oracle 5.13.0-1027.32 linux-image-5.13.0-40-generic 5.13.0-40.45 linux-image-5.13.0-40-generic-64k 5.13.0-40.45 linux-image-5.13.0-40-generic-lpae 5.13.0-40.45 linux-image-5.13.0-40-lowlatency 5.13.0-40.45 linux-image-aws 5.13.0.1022.23 linux-image-azure 5.13.0.1022.22 linux-image-gcp 5.13.0.1024.22 linux-image-generic 5.13.0.40.49 linux-image-generic-64k 5.13.0.40.49 linux-image-generic-lpae5.13.0.40.49 linux-image-gke 5.13.0.1024.22 linux-image-kvm 5.13.0.1021.21 linux-image-lowlatency 5.13.0.40.49 linux-image-oem-20.04 5.13.0.40.49 linux-image-oracle 5.13.0.1027.27 linux-image-raspi 5.13.0.1025.30 linux-image-raspi-nolpae5.13.0.1025.30 linux-image-virtual 5.13.0.40.49 Ubuntu 20.04 LTS: linux-image-5.13.0-1022-aws 5.13.0-1022.24~20.04.1 linux-image-5.13.0-1022-azure 5.13.0-1022.26~20.04.1 linux-image-5.13.0-1024-gcp 5.13.0-1024.29~20.04.1 linux-image-5.13.0-1027-oracle 5.13.0-1027.32~20.04.1 linux-image-5.13.0-40-generic 5.13.0-40.45~20.04.1
[USN-5381-1] Linux kernel (OEM) vulnerabilities
== Ubuntu Security Notice USN-5381-1 April 20, 2022 linux-oem-5.14 vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux-oem-5.14: Linux kernel for OEM systems Details: David Bouman discovered that the netfilter subsystem in the Linux kernel did not properly validate passed user register indices. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2022-1015) It was discovered that the block layer subsystem in the Linux kernel did not properly initialize memory in some situations. A privileged local attacker could use this to expose sensitive information (kernel memory). (CVE-2022-0494) It was discovered that the DMA subsystem in the Linux kernel did not properly ensure bounce buffers were completely overwritten by the DMA device. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2022-0854) Jann Horn discovered that the FUSE file system in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-1011) David Bouman discovered that the netfilter subsystem in the Linux kernel did not initialize memory in some situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2022-1016) Hu Jiahui discovered that multiple race conditions existed in the Advanced Linux Sound Architecture (ALSA) framework, leading to use-after-free vulnerabilities. A local attacker could use these to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-1048) It was discovered that the USB Gadget file system interface in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-24958) It was discovered that the ST21NFCA NFC driver in the Linux kernel did not properly validate the size of certain data in EVT_TRANSACTION events. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-26490) It was discovered that the USB SR9700 ethernet device driver for the Linux kernel did not properly validate the length of requests from the device. A physically proximate attacker could possibly use this to expose sensitive information (kernel memory). (CVE-2022-26966) It was discovered that the Xilinx USB2 device gadget driver in the Linux kernel did not properly validate endpoint indices from the host. A physically proximate attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-27223) 赵子轩 discovered that the 802.2 LLC type 2 driver in the Linux kernel did not properly perform reference counting in some error conditions. A local attacker could use this to cause a denial of service. (CVE-2022-28356) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS: linux-image-5.14.0-1033-oem 5.14.0-1033.36 linux-image-oem-20.04 5.14.0.1033.30 linux-image-oem-20.04b 5.14.0.1033.30 linux-image-oem-20.04c 5.14.0.1033.30 linux-image-oem-20.04d 5.14.0.1033.30 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-5381-1 CVE-2022-0494, CVE-2022-0854, CVE-2022-1011, CVE-2022-1015, CVE-2022-1016, CVE-2022-1048, CVE-2022-24958, CVE-2022-26490, CVE-2022-26966, CVE-2022-27223, CVE-2022-28356 Package Information: https://launchpad.net/ubuntu/+source/linux-oem-5.14/5.14.0-1033.36 signature.asc Description: PGP signature
[Bug 1926321] Re: [MIR] telegraf
** Tags added: sec-753 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1926321 Title: [MIR] telegraf To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/telegraf/+bug/1926321/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1956617] Re: [MIR] protobuf-c
** Tags added: sec-754 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1956617 Title: [MIR] protobuf-c To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/protobuf-c/+bug/1956617/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1746629] Re: [MIR] libbluray
** Tags added: sec-751 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1746629 Title: [MIR] libbluray To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libbluray/+bug/1746629/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[USN-5377-1] Linux kernel (BlueField) vulnerabilities
== Ubuntu Security Notice USN-5377-1 April 13, 2022 linux-bluefield vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux-bluefield: Linux kernel for NVIDIA BlueField platforms Details: It was discovered that the network traffic control implementation in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-1055) Yiqi Sun and Kevin Wang discovered that the cgroups implementation in the Linux kernel did not properly restrict access to the cgroups v1 release_agent feature. A local attacker could use this to gain administrative privileges. (CVE-2022-0492) Jürgen Groß discovered that the Xen subsystem within the Linux kernel did not adequately limit the number of events driver domains (unprivileged PV backends) could send to other guest VMs. An attacker in a driver domain could use this to cause a denial of service in other guest VMs. (CVE-2021-28711, CVE-2021-28712, CVE-2021-28713) Jürgen Groß discovered that the Xen network backend driver in the Linux kernel did not adequately limit the amount of queued packets when a guest did not process them. An attacker in a guest VM can use this to cause a denial of service (excessive kernel memory consumption) in the network backend domain. (CVE-2021-28714, CVE-2021-28715) It was discovered that the simulated networking device driver for the Linux kernel did not properly initialize memory in certain situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2021-4135) Brendan Dolan-Gavitt discovered that the Marvell WiFi-Ex USB device driver in the Linux kernel did not properly handle some error conditions. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2021-43976) It was discovered that the ARM Trusted Execution Environment (TEE) subsystem in the Linux kernel contained a race condition leading to a use- after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2021-44733) It was discovered that the Phone Network protocol (PhoNet) implementation in the Linux kernel did not properly perform reference counting in some error conditions. A local attacker could possibly use this to cause a denial of service (memory exhaustion). (CVE-2021-45095) Wenqing Liu discovered that the f2fs file system in the Linux kernel did not properly validate the last xattr entry in an inode. An attacker could use this to construct a malicious f2fs image that, when mounted and operated on, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-45469) It was discovered that the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel did not properly deallocate memory in some error conditions. A local attacker could possibly use this to cause a denial of service (memory exhaustion). (CVE-2021-45480) Samuel Page discovered that the Transparent Inter-Process Communication (TIPC) protocol implementation in the Linux kernel contained a stack-based buffer overflow. A remote attacker could use this to cause a denial of service (system crash) for systems that have a TIPC bearer configured. (CVE-2022-0435) It was discovered that the IPsec implementation in the Linux kernel did not properly allocate enough memory when performing ESP transformations, leading to a heap-based buffer overflow. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-27666) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS: linux-image-5.4.0-1032-bluefield 5.4.0-1032.35 linux-image-bluefield 5.4.0.1032.33 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-5377-1 CVE-2021-28711, CVE-2021-28712, CVE-2021-28713, CVE-2021-28714, CVE-2021-28715, CVE-2021-4135, CVE-2021-43976, CVE-2021-44733, CVE-2021-45095, CVE-2021-45469, CVE-2021-45480, CVE-2022-0435, CVE-2022-0492, CVE-2022-1055, CVE-2022-27666 Package
[Bug 1808537] Re: [bionic] ffmpeg update to 3.4.5
** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1808537 Title: [bionic] ffmpeg update to 3.4.5 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ffmpeg/+bug/1808537/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs