Thursday, March 21, 2024

[USN-6704-2] Linux kernel (Raspberry Pi) vulnerabilities

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmX8PdIFAwAAAAAACgkQZ0GeRcM5nt0q
6Qf/VDmLVf0D5X5gBQQfeiYEsW26bEFR39pq6Ap9HIY0sGtYnOF+7ZYoZHFa1Xo0I4QoEFMNDfdW
+x6xHO8bVHo6vjANvkPPmWnDOMsndgv01vwn3/AYVJhJMVzZ+esDzlWSYrA9NbSRgadDPLtRLPTd
dWZnKE0yCVIoiUy3WwYKwYK/vyXRplZYFJ45D7qGmMZ/hqJBHp+smsDmyWE2no1wirMTkXWShEJ9
OUOAFjXa45c40qZ3V5JdVQpR3zMLY820yLyzsU2A5h5Qjm432bqCs92OWUANdyoAQ9B3m2Mczjgy
2bnhWwiVW8iwPwm330QASlBjZm5WAgnDQdA99FKIjA==
=+lvu
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6704-2
March 21, 2024

linux-raspi vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-raspi: Linux kernel for Raspberry Pi systems

Details:

It was discovered that the NVIDIA Tegra XUSB pad controller driver in the
Linux kernel did not properly handle return values in certain error
conditions. A local attacker could use this to cause a denial of service
(system crash). (CVE-2023-23000)

Quentin Minster discovered that the KSMBD implementation in the Linux
kernel did not properly handle session setup requests. A remote attacker
could possibly use this to cause a denial of service (memory exhaustion).
(CVE-2023-32247)

Lonial Con discovered that the netfilter subsystem in the Linux kernel did
not properly handle element deactivation in certain cases, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2024-1085)

Notselwyn discovered that the netfilter subsystem in the Linux kernel did
not properly handle verdict parameters in certain cases, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2024-1086)

It was discovered that a race condition existed in the SCSI Emulex
LightPulse Fibre Channel driver in the Linux kernel when unregistering FCF
and re-scanning an HBA FCF table, leading to a null pointer dereference
vulnerability. A local attacker could use this to cause a denial of service
(system crash). (CVE-2024-24855)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS:
linux-image-5.15.0-1049-raspi 5.15.0-1049.52
linux-image-raspi 5.15.0.1049.47
linux-image-raspi-nolpae 5.15.0.1049.47

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-6704-2
https://ubuntu.com/security/notices/USN-6704-1
CVE-2023-23000, CVE-2023-32247, CVE-2024-1085, CVE-2024-1086,
CVE-2024-24855

Package Information:
https://launchpad.net/ubuntu/+source/linux-raspi/5.15.0-1049.52

No comments:

Post a Comment