Home > Operation and Maintenance > Nginx > Canonical releases Ubuntu kernel security update, fixes three high-risk vulnerabilities

Canonical releases Ubuntu kernel security update, fixes three high-risk vulnerabilities

WBOY
Release: 2023-07-05 14:37:06
forward
643 people have browsed it

According to news on June 30, Canonical today launched a Linux Kernel security update for all supported Ubuntu distributions, fixing three high-risk vulnerabilities in previous versions.

Canonical 发布 Ubuntu 内核安全更新,修复三个高危漏洞

IT Home hereby attaches the applicable Ubuntu version:

  • Ubuntu 23.04 (Lunar Lobster) running Linux Kernel 6.2
  • Ubuntu 22.10 (Kinetic Kudu) running Linux Kernel 5.19
  • Ubuntu 22.04 LTS (Jammy Jellyfish) running Linux Kernel 5.15 LTS or 5.19 HWE
  • Running Linux Kernel 5.4 or 5.15 HWE Ubuntu 20.04 LTS (Focal Fossa)
  • Ubuntu 18.04 ESM running Linux Kernel 5.4 HWE

This update mainly fixes the following 3 security vulnerabilities:

CVE -2023-35788:

An out-of-bounds write vulnerability discovered by Hangyu Hua in the Linux kernel's Flower classifier implementation could allow an attacker to cause a denial of service (system crash) or execute arbitrary code.

CVE-2023-2430:

Exists in Ubuntu 22.10 and Ubuntu 22.04 LTS distributions running Linux Kernel 5.19

This vulnerability was discovered by Xingyuan Mo and Gengjia Chen, Exists in the io_uring subsystem, allowing local attackers to cause a denial of service.

Intel Processor Vulnerability:

The new Linux kernel security update also fixes a flaw affecting Intel processors where the INVLPG instruction implementation fails to properly refresh global TLB entries when PCID is enabled. caused by. This flaw could allow an attacker to expose sensitive information (kernel memory) or could cause unexpected behavior.

The above is the detailed content of Canonical releases Ubuntu kernel security update, fixes three high-risk vulnerabilities. For more information, please follow other related articles on the PHP Chinese website!

Related labels:
source:51cto.com
Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Popular Tutorials
More>
Latest Downloads
More>
Web Effects
Website Source Code
Website Materials
Front End Template