Linux Kernel Vulnerabilities in Ubuntu Let Hackers Launch DOS Attack & Execute Arbitrary Code

by Esmeralda McKenzie
Linux Kernel Vulnerabilities in Ubuntu Let Hackers Launch DOS Attack & Execute Arbitrary Code

Linux Kernel Vulnerabilities in Ubuntu Let Hackers Launch DOS Attack & Execute Arbitrary Code

Linux kernel

Several security vulnerabilities were now not too long ago addressed by Canonical in both Graphviz and the Linux kernel of Ubuntu.

Fresh discoveries encompass null pointer dereference vulnerabilities in Graphviz and deplorable going thru of indirect department prediction isolation between L1 and L2 VMs in the KVM VMX implementation of the Linux kernel.

Affected Programs

Right here below, we like now talked about your complete affected applications:-

  • graphviz – prosperous scrape of graph drawing tools
  • linux – Linux kernel
  • linux-oem-6.0 – Linux kernel for OEM programs
  • linux-aws – Linux kernel for Amazon Web Companies and products (AWS) programs
  • linux-azure – Linux kernel for Microsoft Azure Cloud programs
  • linux-gcp – Linux kernel for Google Cloud Platform (GCP) programs
  • linux-ibm – Linux kernel for IBM cloud programs
  • linux-kvm – Linux kernel for cloud environments
  • linux-lowlatency – Linux low latency kernel
  • linux-oracle – Linux kernel for Oracle Cloud programs
  • linux-raspi – Linux kernel for Raspberry Pi programs

Graphviz flaw

Graphviz is prone to being exploited thru a specially crafted input file, which would possibly per chance per chance per chance trigger complications fancy denial of service.

Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and 14.04 ESM are the trusty variations plagued by this downside. The graphviz application used to be came across to be a victim of vulnerabilities linked to a null pointer dereference.

A buffer overflow vulnerability has also been exhibit in graphviz that would possibly per chance per chance per chance lead to arbitrary code execution.

Rather then this, here below we like now talked about the considerations that graphviz eager:-

  • CVE-2018-10196
  • CVE-2019-11023
  • CVE-2020-18032

Linux Kernel Flaws

In accordance with the ubuntu account, There’s a possibility of exposure of comely files from the host OS or other visitor VMs if indirect department prediction isolation is improperly dealt with between L1 and L2 virtual machines.

It has now not too long ago been came across that the Xen network backend driver in the Linux kernel, in obvious circumstances, exhibited a bustle situation when going thru dropped packets and would possibly per chance per chance per chance now not address them well.

The use of this vulnerability, a hacker would possibly per chance per chance per chance trigger a kernel impasse, produce arbitrary code and trigger a gadget break by exploiting it.

The Linux kernel’s implementation of the USB Procedure file gadget incorporates a bustle situation that would possibly per chance per chance per chance lead to utilize-after-free vulnerabilities in some circumstances, and Gerald Lee came across this vulnerability.

Definite indirect department prediction assaults weren’t adequately true by the prctl syscall implementation in the Linux kernel, came across by security analysts José Oliveira and Rodrigo Branco.

This potential that, comely files would possibly per chance per chance per chance doubtlessly be uncovered if a neighborhood attacker extinct this form.

ALSA (Evolved Linux Sound Structure) and io_uring, are both subsystems of the Linux kernel that like one use-after-free vulnerability. Not most tantalizing that, even the CIFS network file gadget also incorporates the same flaw.

An integer overflow vulnerability exists in the Linux kernel’s RNDIS USB driver. An attacker with physical obtain admission to to the gadget can insert a USB instrument with malicious code, doubtlessly leading to a denial of service or the execution of arbitrary code.

“Linux kernel (OEM) vulnerabilities IN network queuing discipline implementation in the Linux kernel were came across to like a use-after-free vulnerability. A local attacker would possibly per chance per chance per chance use this to trigger a denial of service (gadget break) or produce arbitrary code. (CVE-2023-1281)”

Multiple security points were exhibit in Thunderbird. If a particular person were tricked into opening a specially crafted web scrape in a browsing context, an attacker would possibly per chance per chance per chance doubtlessly exploit these to trigger a denial of service, wreck comely files, bypass security restrictions, unhealthy-scrape
tracing, or executing arbitrary code. (CVE-2023-25152, CVE-2023-28162, CVE-2023-28176)

Rather then this, here below we like now talked about the considerations that the Linux kernel eager:-

  • CVE-2022-4382
  • CVE-2022-42328
  • CVE-2022-2196
  • CVE-2023-0469
  • CVE-2023-0045
  • CVE-2023-0266
  • CVE-2023-23559
  • CVE-2022-42329
  • CVE-2023-1195

Solution

To factual this area, it’s a have to to update your gadget to the following variations of the applications that we like now talked about below:-

  • Ubuntu 20.04: graphviz – 2.42.2-3ubuntu0.1~esm1
  • Ubuntu 18.04: graphviz – 2.40.1-2ubuntu0.1~esm1
  • Ubuntu 14.04: graphviz – 2.36.0-0ubuntu3.2+esm1
  • Ubuntu 22.10:-
  • linux-image-5.19.0-38-generic-lpae – 5.19.0-38.39
  • linux-image-virtual – 5.19.0.38.34
  • linux-image-5.19.0-1015-raspi – 5.19.0-1015.22
  • linux-image-generic-64k – 5.19.0.38.34
  • linux-image-5.19.0-38-generic-64k – 5.19.0-38.39
  • linux-image-aws – 5.19.0.1022.19
  • linux-image-gcp – 5.19.0.1019.16
  • linux-image-ibm – 5.19.0.1019.16
  • linux-image-5.19.0-1019-ibm – 5.19.0-1019.21
  • linux-image-5.19.0-1021-lowlatency – 5.19.0-1021.22
  • linux-image-5.19.0-1021-lowlatency-64k – 5.19.0-1021.22
  • linux-image-5.19.0-1022-aws – 5.19.0-1022.23
  • linux-image-azure – 5.19.0.1022.18
  • linux-image-raspi-nolpae – 5.19.0.1015.14
  • linux-image-5.19.0-1015-raspi-nolpae – 5.19.0-1015.22
  • linux-image-5.19.0-1019-gcp – 5.19.0-1019.21
  • linux-image-5.19.0-1020-kvm – 5.19.0-1020.21
  • linux-image-lowlatency-64k – 5.19.0.1021.17
  • linux-image-oracle – 5.19.0.1019.16
  • linux-image-generic – 5.19.0.38.34
  • linux-image-raspi – 5.19.0.1015.14
  • linux-image-5.19.0-1022-azure – 5.19.0-1022.23
  • linux-image-kvm – 5.19.0.1020.17
  • linux-image-5.19.0-38-generic – 5.19.0-38.39
  • linux-image-generic-lpae – 5.19.0.38.34
  • linux-image-5.19.0-1019-oracle – 5.19.0-1019.22
  • linux-image-lowlatency – 5.19.0.1021.17

Furthermore, Canonical affirmed that for your complete vital changes to steal enact, customers have to reboot their computers after a worn gadget update.

You would apply up on the standard vulnerability fixes at Ubuntu Security Notices.

Connected Be taught

  • Linux Kernel Use-After-Free RCE Vulnerability Let Attackers Manufacture Arbitrary Code
  • Sleek DDoS Botnet Malware Infecting Home windows, Linux, and IoT Gadgets
  • Sleek Chinese Malware Framework Attack Home windows, Linux & Mac Systems

Source credit : cybersecuritynews.com

Related Posts