126 Linux kernel Vulnerabilities Lets Attackers Exploit 78 Linux Sub-Systems

Users of Ubuntu 22.04 LTS are urged to update their systems immediately following a significant security patch issued by Canonical to address several critical vulnerabilities in the Linux kernel for Xilinx ZynqMP processors. The Linux kernel for Xilinx Zynq UltraScale+ MPSoC (ZynqMP) is a specialized version of the Linux kernel that is tailored to support the features […] The post 126 Linux kernel Vulnerabilities Lets Attackers Exploit 78 Linux Sub-Systems appeared first on Cyber Security News.

Jan 21, 2025 - 11:43
 0
126 Linux kernel Vulnerabilities Lets Attackers Exploit 78 Linux Sub-Systems

Users of Ubuntu 22.04 LTS are urged to update their systems immediately following a significant security patch issued by Canonical to address several critical vulnerabilities in the Linux kernel for Xilinx ZynqMP processors.

The Linux kernel for Xilinx Zynq UltraScale+ MPSoC (ZynqMP) is a specialized version of the Linux kernel that is tailored to support the features and hardware of the Xilinx Zynq UltraScale+ MPSoC family of processors.

These processors combine a quad-core ARM Cortex-A53 (64-bit) application processor, a dual-core ARM Cortex-R5 (32-bit) real-time processor, an ARM Mali-400 GPU, and programmable logic (FPGA).

The Linux kernel provides a robust foundation for both embedded and general-purpose applications on these devices.

If it is left unpatched, these flaws could allow attackers to compromise systems, potentially leading to unauthorized access or disruption.

“Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system”.

The patch resolves hundreds of CVEs, spanning vulnerabilities in subsystems, architectures, drivers, and protocols. A complete list of addressed CVEs is provided in the official security notice.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Linux Kernel Update Brings Security Fixes and Enhancements

The latest Linux kernel update delivers critical security patches and performance improvements across multiple subsystems:

  • Architectures: Updates for ARM32, x86, RISC-V, and S390.
  • File Systems: Enhanced security and performance for BTRFS, Ext4, GFS2, Ceph, NFS, JFS, and F2FS.
  • Drivers: Fixes for GPU, USB, Bluetooth, GPIO, Ethernet bonding, and InfiniBand drivers.
  • Networking: Improvements to TCP, SCTP, IPv4, IPv6, Netfilter, and more.
  • Security Frameworks: Updates for SELinux and access control modules.
  • Core Components: Optimizations for memory management and tracing infrastructure.

Here’s the updated table with links for each associated CVE:

Category/SubsystemDetailsAssociated CVEs
ArchitecturesARM32, RISC-V, S390, x86CVE-2024-49938, CVE-2024-49966, CVE-2024-50013, CVE-2024-50093
Block Layer SubsystemStorage block layer managementCVE-2024-49944, CVE-2024-50046, CVE-2024-50096
ACPI DriversAdvanced Configuration and Power InterfaceCVE-2024-49985, CVE-2024-50040
Drivers CoreCore drivers across subsystemsCVE-2024-49924, CVE-2024-49981
ATA over Ethernet (AOE)ATA protocol over EthernetCVE-2024-49877, CVE-2024-49975
TPM Device DriverTrusted Platform ModuleCVE-2024-49902, CVE-2024-49903
Clock Framework and DriversTiming and synchronization driversCVE-2024-50062, CVE-2024-49997
EFI CoreExtensible Firmware Interface core functionalityCVE-2024-49977, CVE-2024-50024
GPU DriversGraphics processing unit driversCVE-2024-50038, CVE-2024-50008
File SystemsExt4, BTRFS, Ceph, NFS (client/server/superblock), NILFS2, GFS2, F2FS, JFSCVE-2024-49936, CVE-2024-49892, CVE-2024-50049
Networking CoreIPv4, IPv6, CAN, Multipath TCP, MAC80211CVE-2024-49863, CVE-2024-50033, CVE-2024-50015
USB DriversUSB Device Class, USB Type-C Port ControllerCVE-2024-50019, CVE-2024-50059
Bluetooth SubsystemBluetooth stackCVE-2024-49913, CVE-2024-50044
Kernel SecuritySELinux, Simplified Mandatory Access Control Kernel frameworkCVE-2024-49948, CVE-2024-50095
Media DriversAmlogic Meson SoC drivers, AudioScience HPI, USB soundCVE-2024-49973, CVE-2024-50038
Memory ManagementKernel-level memory managementCVE-2024-49871, CVE-2024-50001
Perf EventsPerformance monitoring eventsCVE-2024-49967, CVE-2024-49954
Tracing InfrastructureKernel tracing frameworkCVE-2024-49995, CVE-2024-49957

In addition to subsystem updates, Ubuntu has also released security updates addressing vulnerabilities affecting other systems.

Here’s the updated table with links embedded in the CVE identifiers:

Missing CVEsAffected Area
CVE-2024-49907Kernel memory management subsystem
CVE-2024-50062Clock framework and drivers
CVE-2024-36893ACPI drivers
CVE-2024-49903TPM device driver
CVE-2024-49886USB drivers
CVE-2024-50180Ethernet bonding drivers
CVE-2024-47757Networking Core
CVE-2024-49938Architectures (x86)
CVE-2024-47709Network Traffic Control
CVE-2024-49884Media drivers
CVE-2024-49977EFI core
CVE-2024-47734InfiniBand drivers
CVE-2024-49963GPU drivers
CVE-2024-47747Bluetooth subsystem
CVE-2024-50008GPU drivers
CVE-2024-47696File systems (Ceph, NFS)
CVE-2024-50038GPU drivers
CVE-2024-46695USB Type-C Port Controller Manager
CVE-2024-47705Media drivers
CVE-2024-49957Tracing infrastructure
CVE-2024-38538IPv6 Networking
CVE-2024-50019USB drivers
CVE-2024-38544IPv4 Networking
CVE-2024-50003SELinux security module
CVE-2024-50095Simplified Mandatory Access Control Kernel Framework
CVE-2024-50000File systems infrastructure
CVE-2024-49981Drivers core
CVE-2024-49863Networking core
CVE-2024-47710IPv4 networking
CVE-2024-49983Multipath TCP

The vulnerabilities affect multiple subsystems and components within the Linux kernel, underscoring the complexity and breadth of the issues. For the full list, visit the Ubuntu Security Notice (USN-7166-4).

Canonical has provided a targeted kernel update to address these issues. The affected package is linux-xilinx-zynqmp, and the updated version is 5.15.0-1039.43. Users are advised to check their current version and upgrade immediately to ensure their systems are secure.

To apply the update, users should execute the following commands in their terminal:

sudo apt update
sudo apt upgrade
sudo reboot

Rebooting is critical to ensure all fixes are applied, and the newly updated kernel is used.

This patch introduces changes to the Application Binary Interface (ABI), requiring recompilation and reinstallation of any third-party kernel modules.

However, for most users who have not manually removed standard kernel metapackages (e.g., linux-generic), this process will be automated during the upgrade.

This update is part of Canonical’s ongoing commitment to ensuring the security and stability of its open-source operating system.

Given the severity and scope of the vulnerabilities, Ubuntu users are strongly encouraged to update their systems as soon as possible to avoid potential exploitation.

Integrating Application Security into Your CI/CD Workflows Using Jenkins & Jira -> Free Webinar

The post 126 Linux kernel Vulnerabilities Lets Attackers Exploit 78 Linux Sub-Systems appeared first on Cyber Security News.

What's Your Reaction?

like

dislike

love

funny

angry

sad

wow