![]() ![]() These flaws affected Ubuntu 21.10, 20.04 LTS, and 18.04 LTS systems. ![]() The same goes for CVE-2022-27223, a vulnerability discovered in the Xilinx USB2 device gadget driver that could allow a physically proximate attacker to crash the system by causing a denial of service (DoS attack). It also patches CVE-2022-25258, a security issue discovered in the USB gadget subsystem that could allow an attacker to cause a denial of service (system crash), CVE-2022-25375, a flaw discovered in the ST21NFCA NFC driver that could allow a physically proximate attacker to cause a denial of service (system crash) or execute arbitrary code, as well as CVE-2022-25375, a vulnerability discovered in the Remote NDIS (RNDIS) USB gadget implementation that could allow an attacker to expose sensitive information (kernel memory). ![]() This affects all Ubuntu releases and could allow a local attacker to expose sensitive information. The new Ubuntu kernel security updates address CVE-2021-26401, a flaw discovered by Ke Sun, Alyssa Milburn, Henrique Kawakami, Emma Benoit, Igor Chervatyuk, Lisa Aichele, and Thais Moreira Hamasaki in the Spectre Variant 2 mitigations for AMD processors that made them insufficient in some situations. Canonical today published a new set of Linux kernel security updates for all supported Ubuntu Linux releases, except the recently released Ubuntu 22.04 LTS (Jammy Jellyfish) which already received its first kernel update last week.įollowing the recent major kernel security update for Debian GNU/Linux 11 systems, now Canonical released kernel updates for Ubuntu 21.10 (Impish Indri), Ubuntu 20.04 LTS (Focal Fossa), Ubuntu 18.04 LTS (Bionic Beaver), as well as Ubuntu 16.04 and 14.04 ESM releases to address a total of 17 vulnerabilities. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |