FERRAMENTAS LINUX: Critical Linux Kernel (FIPS) Vulnerabilities Patched – USN-7608-2 Security Update

quarta-feira, 2 de julho de 2025

Critical Linux Kernel (FIPS) Vulnerabilities Patched – USN-7608-2 Security Update

 

Ubuntu



Ubuntu USN-7608-2 patches critical Linux kernel (FIPS) vulnerabilities affecting AWS, GCP, and memory management. Learn update steps, CVE details (CVE-2025-38001, CVE-2025-37997), and security best practices to prevent exploits. Includes FAQ & reboot requirements.

Published: July 1, 2025 | Last Updated: July 1, 2025

🔍 Overview: High-Risk Linux Kernel Security Flaws Addressed

The Linux kernel (FIPS-compliant versions) has been updated to patch multiple critical vulnerabilities affecting AWS, GCP, and general FIPS deployments. These flaws could allow privilege escalation, memory corruption, or full system compromise if exploited.

Affected subsystems include:

 GPU drivers (CVE-2025-38001)

 SMB network file system (CVE-2025-37997)

 Memory management (CVE-2025-37890)

✔ Netfilter & traffic control (CVE-2024-53051)


🚨 Immediate Action Required: Systems running Linux-FIPS, Linux-AWS-FIPS, or Linux-GCP-FIPS must apply updates and reboot to mitigate risks.


📦 Affected Packages & Update Instructions

1. Vulnerable Linux Kernel Packages

DistributionPackageFixed Version
Ubuntu 22.04 (Jammy)linux-aws-fips5.15.0-1087.94+fips1
Ubuntu 22.04 (Jammy)linux-gcp-fips5.15.0-1086.95+fips1
Ubuntu 22.04 (Jammy)linux-fips5.15.0-143.153+fips1

2. How to Apply the Patch

  • Run:

    bash
    sudo apt update && sudo apt upgrade -y
  • Reboot required for changes to take effect.

  • ⚠️ ABI Change Alert: Third-party kernel modules must be recompiled after update.

🔒 Pro Tip: Reduce exposure with Ubuntu Pro (free for 5 machines), extending security coverage to 25,000+ packages.


📌 Key Security Fixes & CVE Details

CVE IDSeverityImpact
CVE-2025-38001CriticalGPU driver privilege escalation
CVE-2025-37997HighSMB file system RCE risk
CVE-2025-37890HighMemory corruption in kernel allocator
CVE-2024-53051MediumNetfilter bypass vulnerability

🔗 Official References:


❓ Frequently Asked Questions (FAQ)

Q: Do I need to reboot after updating?

A: Yes. Kernel updates require a reboot for full mitigation.

Q: What if I use custom kernel modules?

A: Due to ABI changes, recompile modules using dkms or vendor-provided scripts.

Q: Is Ubuntu Pro necessary for security?

A: For extended 10-year patches on 25,000+ packages, Ubuntu Pro is recommended.


🚀 Final Recommendations for SysAdmins

  1. Patch immediately – Delaying increases exploit risk.

  2. Monitor logs for unusual activity (e.g., dmesgjournalctl).

  3. Enforce least privilege to limit attack surfaces.

💡 Did You Know? Over 60% of cloud breaches stem from unpatched kernel vulnerabilities. Stay ahead with automated updates.

Nenhum comentário:

Postar um comentário