126 Linux kernel Vulnerabilities Lets Attackers Exploit 78 Linux Sub-Systems
Users of Ubuntu 22.04 LTS are urged to update their systems immediately following a significant security patch issued by Canonical to address several critical vulnerabilities in the Linux kernel for Xilinx ZynqMP processors. The Linux kernel for Xilinx Zynq UltraScale+ MPSoC (ZynqMP) is a specialized version of the Linux kernel that is tailored to support the features […] The post 126 Linux kernel Vulnerabilities Lets Attackers Exploit 78 Linux Sub-Systems appeared first on Cyber Security News.
Users of Ubuntu 22.04 LTS are urged to update their systems immediately following a significant security patch issued by Canonical to address several critical vulnerabilities in the Linux kernel for Xilinx ZynqMP processors.
The Linux kernel for Xilinx Zynq UltraScale+ MPSoC (ZynqMP) is a specialized version of the Linux kernel that is tailored to support the features and hardware of the Xilinx Zynq UltraScale+ MPSoC family of processors.
These processors combine a quad-core ARM Cortex-A53 (64-bit) application processor, a dual-core ARM Cortex-R5 (32-bit) real-time processor, an ARM Mali-400 GPU, and programmable logic (FPGA).
The Linux kernel provides a robust foundation for both embedded and general-purpose applications on these devices.
If it is left unpatched, these flaws could allow attackers to compromise systems, potentially leading to unauthorized access or disruption.
“Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system”.
The patch resolves hundreds of CVEs, spanning vulnerabilities in subsystems, architectures, drivers, and protocols. A complete list of addressed CVEs is provided in the official security notice.
Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free
Linux Kernel Update Brings Security Fixes and Enhancements
The latest Linux kernel update delivers critical security patches and performance improvements across multiple subsystems:
- Architectures: Updates for ARM32, x86, RISC-V, and S390.
- File Systems: Enhanced security and performance for BTRFS, Ext4, GFS2, Ceph, NFS, JFS, and F2FS.
- Drivers: Fixes for GPU, USB, Bluetooth, GPIO, Ethernet bonding, and InfiniBand drivers.
- Networking: Improvements to TCP, SCTP, IPv4, IPv6, Netfilter, and more.
- Security Frameworks: Updates for SELinux and access control modules.
- Core Components: Optimizations for memory management and tracing infrastructure.
Here’s the updated table with links for each associated CVE:
Category/Subsystem Details Associated CVEs Architectures ARM32, RISC-V, S390, x86 CVE-2024-49938, CVE-2024-49966, CVE-2024-50013, CVE-2024-50093 Block Layer Subsystem Storage block layer management CVE-2024-49944, CVE-2024-50046, CVE-2024-50096 ACPI Drivers Advanced Configuration and Power Interface CVE-2024-49985, CVE-2024-50040 Drivers Core Core drivers across subsystems CVE-2024-49924, CVE-2024-49981 ATA over Ethernet (AOE) ATA protocol over Ethernet CVE-2024-49877, CVE-2024-49975 TPM Device Driver Trusted Platform Module CVE-2024-49902, CVE-2024-49903 Clock Framework and Drivers Timing and synchronization drivers CVE-2024-50062, CVE-2024-49997 EFI Core Extensible Firmware Interface core functionality CVE-2024-49977, CVE-2024-50024 GPU Drivers Graphics processing unit drivers CVE-2024-50038, CVE-2024-50008 File Systems Ext4, BTRFS, Ceph, NFS (client/server/superblock), NILFS2, GFS2, F2FS, JFS CVE-2024-49936, CVE-2024-49892, CVE-2024-50049 Networking Core IPv4, IPv6, CAN, Multipath TCP, MAC80211 CVE-2024-49863, CVE-2024-50033, CVE-2024-50015 USB Drivers USB Device Class, USB Type-C Port Controller CVE-2024-50019, CVE-2024-50059 Bluetooth Subsystem Bluetooth stack CVE-2024-49913, CVE-2024-50044 Kernel Security SELinux, Simplified Mandatory Access Control Kernel framework CVE-2024-49948, CVE-2024-50095 Media Drivers Amlogic Meson SoC drivers, AudioScience HPI, USB sound CVE-2024-49973, CVE-2024-50038 Memory Management Kernel-level memory management CVE-2024-49871, CVE-2024-50001 Perf Events Performance monitoring events CVE-2024-49967, CVE-2024-49954 Tracing Infrastructure Kernel tracing framework CVE-2024-49995, CVE-2024-49957
In addition to subsystem updates, Ubuntu has also released security updates addressing vulnerabilities affecting other systems.
Here’s the updated table with links embedded in the CVE identifiers:
Missing CVEs Affected Area CVE-2024-49907 Kernel memory management subsystem CVE-2024-50062 Clock framework and drivers CVE-2024-36893 ACPI drivers CVE-2024-49903 TPM device driver CVE-2024-49886 USB drivers CVE-2024-50180 Ethernet bonding drivers CVE-2024-47757 Networking Core CVE-2024-49938 Architectures (x86) CVE-2024-47709 Network Traffic Control CVE-2024-49884 Media drivers CVE-2024-49977 EFI core CVE-2024-47734 InfiniBand drivers CVE-2024-49963 GPU drivers CVE-2024-47747 Bluetooth subsystem CVE-2024-50008 GPU drivers CVE-2024-47696 File systems (Ceph, NFS) CVE-2024-50038 GPU drivers CVE-2024-46695 USB Type-C Port Controller Manager CVE-2024-47705 Media drivers CVE-2024-49957 Tracing infrastructure CVE-2024-38538 IPv6 Networking CVE-2024-50019 USB drivers CVE-2024-38544 IPv4 Networking CVE-2024-50003 SELinux security module CVE-2024-50095 Simplified Mandatory Access Control Kernel Framework CVE-2024-50000 File systems infrastructure CVE-2024-49981 Drivers core CVE-2024-49863 Networking core CVE-2024-47710 IPv4 networking CVE-2024-49983 Multipath TCP
The vulnerabilities affect multiple subsystems and components within the Linux kernel, underscoring the complexity and breadth of the issues. For the full list, visit the Ubuntu Security Notice (USN-7166-4).
Canonical has provided a targeted kernel update to address these issues. The affected package is linux-xilinx-zynqmp
, and the updated version is 5.15.0-1039.43. Users are advised to check their current version and upgrade immediately to ensure their systems are secure.
To apply the update, users should execute the following commands in their terminal:
sudo apt update
sudo apt upgrade
sudo reboot
Rebooting is critical to ensure all fixes are applied, and the newly updated kernel is used.
This patch introduces changes to the Application Binary Interface (ABI), requiring recompilation and reinstallation of any third-party kernel modules.
However, for most users who have not manually removed standard kernel metapackages (e.g., linux-generic
), this process will be automated during the upgrade.
This update is part of Canonical’s ongoing commitment to ensuring the security and stability of its open-source operating system.
Given the severity and scope of the vulnerabilities, Ubuntu users are strongly encouraged to update their systems as soon as possible to avoid potential exploitation.
Integrating Application Security into Your CI/CD Workflows Using Jenkins & Jira -> Free Webinar
The post 126 Linux kernel Vulnerabilities Lets Attackers Exploit 78 Linux Sub-Systems appeared first on Cyber Security News.
What's Your Reaction?