![]() Both of them could allow a local attacker in a guest virtual machine to cause a denial of service (guest crash) or possibly execute arbitrary code.Īlso for Ubuntu 22.04 LTS and 20.04 LTS systems running Linux kernel 5.15 LTS, as well as for Ubuntu 20.04 LTS and 18.04 LTS systems running Linux kernel 5.4 LTS, the new security updates fix CVE-2022-3176, a use-after-free vulnerability discovered by Eric Biggers in the io_uring subsystem that could allow a local attacker to cause a denial of service (system crash) or execute arbitrary code, CVE-2022-36879, a flaw discovered in the Netlink Transformation (XFRM) subsystem that could allow a local attacker to cause a denial of service (system crash), as well as CVE-2022-26373, an issue affecting Intel CPUs with eIBRS (Enhanced Indirect Branch Restricted Speculation) that could allow a local attacker to expose sensitive information. CLION LINUX KERNEL UPDATEThe new Ubuntu Linux kernel security updates come about three weeks after the previous security update and patch a total of 16 vulnerabilities for Ubuntu 22.04 LTS (Jammy Jellyfish), Ubuntu 20.04 LTS (Focal Fossa), Ubuntu 18.04 LTS (Bionic Beaver), and Ubuntu 16.04 ESM (Xenial Xerus).įor Ubuntu 22.04 LTS and Ubuntu 20.04 LTS systems running Linux kernel 5.15 LTS, the new kernel updates address CVE-2022-1882, a race condition discovered by Selim Enes Karaduman in the general notification queue implementation, as well as CVE-2022-39189, a security flaw discovered by Google Project Zero’s Jann Horn in the KVM subsystem. Canonical released today new Linux kernel security patches for all supported Ubuntu releases to address various security vulnerabilities discovered in the upstream kernel packages. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |