USN-7173-1: Linux kernel vulnerabilities

Publication date

17 December 2024

Overview

Several security issues were fixed in the Linux kernel.


Packages

  • linux - Linux kernel
  • linux-gcp - Linux kernel for Google Cloud Platform (GCP) systems
  • linux-gcp-5.4 - Linux kernel for Google Cloud Platform (GCP) systems
  • linux-hwe-5.4 - Linux hardware enablement (HWE) kernel
  • linux-kvm - Linux kernel for cloud environments
  • linux-raspi - Linux kernel for Raspberry Pi systems

Details

Ziming Zhang discovered that the DRM driver for VMware Virtual GPU did not
properly handle certain error conditions, leading to a NULL pointer
dereference. A local attacker could possibly trigger this vulnerability to
cause a denial of service. (CVE-2022-38096)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:

  • GPU drivers;
  • Network drivers;
  • SCSI subsystem;
  • Ext4 file system;
  • Bluetooth subsystem;
  • Memory management;
  • Amateur Radio drivers;
  • Network traffic control;
  • Sun RPC protocol;
  • VMware vSockets driver

Ziming Zhang discovered that the DRM driver for VMware Virtual GPU did not
properly handle certain error conditions, leading to a NULL pointer
dereference. A local attacker could possibly trigger this vulnerability to
cause a denial of service. (CVE-2022-38096)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:

  • GPU drivers;
  • Network drivers;
  • SCSI subsystem;
  • Ext4 file system;
  • Bluetooth subsystem;
  • Memory management;
  • Amateur Radio drivers;
  • Network traffic control;
  • Sun RPC protocol;
  • VMware vSockets driver

Update instructions

After a standard system update you need to reboot your computer to make all the necessary changes.

Learn more about how to get the fixes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
20.04 focal linux-image-5.4.0-1121-raspi –  5.4.0-1121.133
linux-image-5.4.0-1125-kvm –  5.4.0-1125.133
linux-image-5.4.0-1141-gcp –  5.4.0-1141.150
linux-image-5.4.0-204-generic –  5.4.0-204.224
linux-image-5.4.0-204-generic-lpae –  5.4.0-204.224
linux-image-5.4.0-204-lowlatency –  5.4.0-204.224
linux-image-gcp-lts-20.04 –  5.4.0.1141.143
linux-image-generic –  5.4.0.204.200
linux-image-generic-lpae –  5.4.0.204.200
linux-image-kvm –  5.4.0.1125.121
linux-image-lowlatency –  5.4.0.204.200
linux-image-oem –  5.4.0.204.200
linux-image-oem-osp1 –  5.4.0.204.200
linux-image-raspi –  5.4.0.1121.151
linux-image-raspi2 –  5.4.0.1121.151
linux-image-virtual –  5.4.0.204.200
18.04 bionic linux-image-5.4.0-1141-gcp –  5.4.0-1141.150~18.04.1  
linux-image-5.4.0-204-generic –  5.4.0-204.224~18.04.1  
linux-image-5.4.0-204-lowlatency –  5.4.0-204.224~18.04.1  
linux-image-gcp –  5.4.0.1141.150~18.04.1  
linux-image-generic-hwe-18.04 –  5.4.0.204.224~18.04.1  
linux-image-lowlatency-hwe-18.04 –  5.4.0.204.224~18.04.1  
linux-image-oem –  5.4.0.204.224~18.04.1  
linux-image-oem-osp1 –  5.4.0.204.224~18.04.1  
linux-image-snapdragon-hwe-18.04 –  5.4.0.204.224~18.04.1  
linux-image-virtual-hwe-18.04 –  5.4.0.204.224~18.04.1  

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›