Home[1] Files[2] News[3] Contact[4] Add New[5]
- Ubuntu Security Notice USN-5390-2[6]
- Authored by Ubuntu[7] | Site security.ubuntu.com[8]
-
Ubuntu Security Notice 5390-2 - David Bouman discovered that the netfilter subsystem in the Linux kernel did not properly validate passed user register indices. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. David Bouman discovered that the netfilter subsystem in the Linux kernel did not initialize memory in some situations. A local attacker could use this to expose sensitive information.
- systems | linux[9], ubuntu[10]
- advisories | CVE-2022-1015[11], CVE-2022-1016[12], CVE-2022-26490[13]
- SHA-256 |
360e866dc51e067344a3c2f5e702ffdd692299bf8bc29ec6c987ef25420ab7d1
- Download[14] | Favorite[15] | View[16]
Change Mirror[17] Download[18]
==========================================================================
Ubuntu Security Notice USN-5390-2
May 03, 2022
linux-raspi vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-raspi: Linux kernel for Raspberry Pi systems
Details:
David Bouman discovered that the netfilter subsystem in the Linux kernel
did not properly validate passed user register indices. A local attacker
could use this to cause a denial of service or possibly execute arbitrary
code. (CVE-2022-1015)
David Bouman discovered that the netfilter subsystem in the Linux kernel
did not initialize memory in some situations. A local attacker could use
this to expose sensitive information (kernel memory). (CVE-2022-1016)
It was discovered that the ST21NFCA NFC driver in the Linux kernel did not
properly validate the size of certain data in EVT_TRANSACTION events. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-26490)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS:
linux-image-5.15.0-1006-raspi 5.15.0-1006.6
linux-image-5.15.0-1006-raspi-nolpae 5.15.0-1006.6
linux-image-raspi 5.15.0.1006.6
linux-image-raspi-nolpae 5.15.0.1006.6
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-5390-2
https://ubuntu.com/security/notices/USN-5390-1
CVE-2022-1015, CVE-2022-1016, CVE-2022-26490
Package Information:
https://launchpad.net/ubuntu/+source/linux-raspi/5.15.0-1006.6
File Tags
- ActiveX[23] (932)
- Advisory[24] (77,242)
- Arbitrary[25] (15,058)
- BBS[26] (2,859)
- Bypass[27] (1,550)
- CGI[28] (1,010)
- Code Execution[29] (6,627)
- Conference[30] (668)
- Cracker[31] (797)
- CSRF[32] (3,268)
- DoS[33] (21,737)
- Encryption[34] (2,330)
- Exploit[35] (49,659)
- File Inclusion[36] (4,142)
- File Upload[37] (938)
- Firewall[38] (821)
- Info Disclosure[39] (2,542)
- Intrusion Detection[40] (850)
- Java[41] (2,780)
- JavaScript[42] (792)
- Kernel[43] (5,998)
- Local[44] (13,977)
- Magazine[45] (586)
- Overflow[46] (12,125)
- Perl[47] (1,410)
- PHP[48] (5,038)
- Proof of Concept[49] (2,276)
- Protocol[50] (3,290)
- Python[51] (1,389)
- Remote[52] (29,590)
- Root[53] (3,441)
- Ruby[54] (574)
- Scanner[55] (1,629)
- Security Tool[56] (7,672)
- Shell[57] (3,054)
- Shellcode[58] (1,201)
- Sniffer[59] (879)
- Spoof[60] (2,077)
- SQL Injection[61] (15,975)
- TCP[62] (2,350)
- Trojan[63] (672)
- UDP[64] (866)
- Virus[65] (658)
- Vulnerability[66] (30,363)
- Web[67] (8,972)
- Whitepaper[68] (3,710)
- x86[69] (942)
- XSS[70] (17,290)
- Other[71]
File Archives
- May 2022[72]
- April 2022[73]
- March 2022[74]
- February 2022[75]
- January 2022[76]
- December 2021[77]
- November 2021[78]
- October 2021[79]
- September 2021[80]
- August 2021[81]
- July 2021[82]
- June 2021[83]
- Older[84]
Systems
- AIX[85] (425)
- Apple[86] (1,875)
- BSD[87] (368)
- CentOS[88] (55)
- Cisco[89] (1,911)
- Debian[90] (5,948)
- Fedora[91] (1,690)
- FreeBSD[92] (1,241)
- Gentoo[93] (4,152)
- HPUX[94] (877)
- iOS[95] (317)
- iPhone[96] (108)
- IRIX[97] (220)
- Juniper[98] (67)
- Linux[99] (41,939)
- Mac OS X[100] (683)
- Mandriva[101] (3,105)
- NetBSD[102] (255)
- OpenBSD[103] (478)
- RedHat[104] (11,373)
- Slackware[105] (941)
- Solaris[106] (1,606)
- SUSE[107] (1,444)
- Ubuntu[108] (7,748)
- UNIX[109] (9,051)
- UnixWare[110] (184)
- Windows[111] (6,377)
- Other[112]
- Services
- Security Services[123]
- Hosting By
- Rokasec[124]
Read more https://packetstormsecurity.com/files/166947/USN-5390-2.txt