Is your Ubuntu 16.04 LTS system at risk? A newly disclosed set of high-impact security vulnerabilities in the Linux kernel (linux-fips) could allow attackers to compromise sensitive systems. This urgent security update addresses 11 critical CVEs, including flaws in GPU drivers, file systems, and USB sound devices.
Security Advisory Overview
Affected Systems:
Ubuntu 16.04 LTS (Xenial Xerus)
Derivatives relying on the linux-fips kernel
Severity: Moderate to High (Multiple privilege escalation & denial-of-service risks)
Key Vulnerabilities Patched
This update resolves critical security flaws in:
✅ Block Layer Subsystem (CVE-2024-42301)
✅ GPU Drivers (CVE-2024-26966, CVE-2024-56551)
✅ File Systems (Ext4, JFFS2, JFS – CVE-2024-47701, CVE-2021-47211)
✅ USB Sound Devices (CVE-2024-57850)
✅ Sun RPC Protocol (CVE-2024-56596)
Full CVE List:
CVE-2021-47211, CVE-2021-47353, CVE-2023-52458
CVE-2024-26966, CVE-2024-42301, CVE-2024-47701
CVE-2024-53155, CVE-2024-53168, CVE-2024-56551
CVE-2024-56596, CVE-2024-57850
How to Apply the Update
⚠️ Action Required: Systems running Ubuntu 16.04 LTS must install the latest linux-fips kernel immediately.
Update Instructions:
For Ubuntu Pro Users:
sudo apt update && sudo apt upgrade linux-image-4.4.0-1114-fips
Package version: 4.4.0-1114.121
Standard Ubuntu Users:
sudo apt update && sudo apt upgrade linux-image-fips
Package version: 4.4.0.1114.115
Reboot Required:
sudo reboot
⚠️ Important Note: Due to an ABI change, third-party kernel modules must be recompiled.
Why This Update Matters
Prevents privilege escalation attacks
Fixes denial-of-service (DoS) vulnerabilities
Maintains FIPS compliance for regulated environments
Additional Resources
🔗 Ubuntu Security Notice USN-7554-3
🔗 CVE Database References

Nenhum comentário:
Postar um comentário