Thursday, July 4, 2024

[USN-6872-2] Linux kernel vulnerabilities

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmaG/5MFAwAAAAAACgkQZ0GeRcM5nt0F
2wgAjk01tm1vFBRj/SL1bEauNrT5400GKpCj8gzGIiiSFM1ikrY6mtV9RAeOX9SNQU0Mi9exFvCp
VcCf1LAIYqOsPOEqkUGm4yNwfeIOCB8N2m4o4DdNvVvXQMFUot8J8ytlOPdHjz+tnAmg9TKTfyca
bRSRH+9V21i83bNJ1P5tqAE8qJIQAD9WpGL7ZAiJFloawrDQTprWH10pdvjYWOqyancIamg+qrqW
5/1izxbEZjjTOKslrAHXc9IS2swtOZhnhO8OEroPM1amS03MMyp1OWGKj+OJtBV36HPTP5rCJlTl
p2IMtrh71Q3AoqL39Zo99N5+eAmDE89p1AEHyRpyiw==
=9zm0
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6872-2
July 04, 2024

linux-lowlatency, linux-lowlatency-hwe-6.5 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.10
- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-lowlatency: Linux low latency kernel
- linux-lowlatency-hwe-6.5: Linux low latency kernel

Details:

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystem:
- Netfilter;
(CVE-2024-26809, CVE-2024-26643, CVE-2024-26925, CVE-2024-26924)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.10
linux-image-6.5.0-42-lowlatency 6.5.0-42.42.1
linux-image-6.5.0-42-lowlatency-64k 6.5.0-42.42.1
linux-image-lowlatency 6.5.0.42.42.1
linux-image-lowlatency-64k 6.5.0.42.42.1

Ubuntu 22.04 LTS
linux-image-6.5.0-42-lowlatency 6.5.0-42.42.1~22.04.1
linux-image-6.5.0-42-lowlatency-64k 6.5.0-42.42.1~22.04.1
linux-image-lowlatency-64k-hwe-22.04 6.5.0.42.42.1~22.04.1
linux-image-lowlatency-hwe-22.04 6.5.0.42.42.1~22.04.1

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-6872-2
https://ubuntu.com/security/notices/USN-6872-1
CVE-2024-26643, CVE-2024-26809, CVE-2024-26924, CVE-2024-26925

Package Information:
https://launchpad.net/ubuntu/+source/linux-lowlatency/6.5.0-42.42.1

https://launchpad.net/ubuntu/+source/linux-lowlatency-hwe-6.5/6.5.0-42.42.1~22.04.1

No comments:

Post a Comment