Skip to content

Releases: cloudfoundry/bosh-linux-stemcell-builder

ubuntu jammy v1.785

05 Mar 23:29
Compare
Choose a tag to compare

Metadata:

BOSH Agent Version: 2.736.0
Kernel Version: 5.15.0.134.133

USNs:

Title: USN-7306-1 -- GNU binutils vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7306-1
Priorities: medium
Description:
It was discovered that GNU binutils in nm tool is affected by an incorrect access control. An attacker could possibly use this issue to cause a crash. This issue only affected Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, and Ubuntu 24.10. (CVE-2024-57360) It was discovered that GNU binutils incorrectly handled certain inputs. An attacker could possibly use this issue to cause a crash or execute arbitrary code. (CVE-2025-0840) Update Instructions: Run sudo pro fix USN-7306-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: binutils - 2.38-4ubuntu2.7 binutils-aarch64-linux-gnu - 2.38-4ubuntu2.7 binutils-alpha-linux-gnu - 2.38-4ubuntu2.7 binutils-arm-linux-gnueabi - 2.38-4ubuntu2.7 binutils-arm-linux-gnueabihf - 2.38-4ubuntu2.7 binutils-common - 2.38-4ubuntu2.7 binutils-dev - 2.38-4ubuntu2.7 binutils-doc - 2.38-4ubuntu2.7 binutils-for-build - 2.38-4ubuntu2.7 binutils-for-host - 2.38-4ubuntu2.7 binutils-hppa-linux-gnu - 2.38-4ubuntu2.7 binutils-hppa64-linux-gnu - 2.38-4ubuntu2.7 binutils-i686-gnu - 2.38-4ubuntu2.7 binutils-i686-kfreebsd-gnu - 2.38-4ubuntu2.7 binutils-i686-linux-gnu - 2.38-4ubuntu2.7 binutils-ia64-linux-gnu - 2.38-4ubuntu2.7 binutils-m68k-linux-gnu - 2.38-4ubuntu2.7 binutils-multiarch - 2.38-4ubuntu2.7 binutils-multiarch-dev - 2.38-4ubuntu2.7 binutils-powerpc-linux-gnu - 2.38-4ubuntu2.7 binutils-powerpc64-linux-gnu - 2.38-4ubuntu2.7 binutils-powerpc64le-linux-gnu - 2.38-4ubuntu2.7 binutils-riscv64-linux-gnu - 2.38-4ubuntu2.7 binutils-s390x-linux-gnu - 2.38-4ubuntu2.7 binutils-sh4-linux-gnu - 2.38-4ubuntu2.7 binutils-source - 2.38-4ubuntu2.7 binutils-sparc64-linux-gnu - 2.38-4ubuntu2.7 binutils-x86-64-kfreebsd-gnu - 2.38-4ubuntu2.7 binutils-x86-64-linux-gnu - 2.38-4ubuntu2.7 binutils-x86-64-linux-gnux32 - 2.38-4ubuntu2.7 libbinutils - 2.38-4ubuntu2.7 libctf-nobfd0 - 2.38-4ubuntu2.7 libctf0 - 2.38-4ubuntu2.7 No subscription required
CVEs:

Title: USN-7314-1 -- Kerberos vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7314-1
Priorities: medium,negligible,low
Description:
It was discovered that Kerberos incorrectly handled certain memory operations. A remote attacker could possibly use this issue to cause Kerberos to consume memory,leading to a denial of service. (CVE-2024-26458, CVE-2024-26461) It was discovered that Kerberos incorrectly handled certain memory operations. A remote attacker could possibly use this issue to cause Kerberos to consume memory,leading to a denial of service. This issue only affected Ubuntu 24.04 LTS. (CVE-2024-26462) It was discovered that the Kerberos kadmind daemon incorrectly handled log files when incremental propagation was enabled. An authenticated attacker could use this issue to cause kadmind to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2025-24528) Update Instructions: Run sudo pro fix USN-7314-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: krb5-admin-server - 1.19.2-2ubuntu0.6 krb5-doc - 1.19.2-2ubuntu0.6 krb5-gss-samples - 1.19.2-2ubuntu0.6 krb5-k5tls - 1.19.2-2ubuntu0.6 krb5-kdc - 1.19.2-2ubuntu0.6 krb5-kdc-ldap - 1.19.2-2ubuntu0.6 krb5-kpropd - 1.19.2-2ubuntu0.6 krb5-locales - 1.19.2-2ubuntu0.6 krb5-multidev - 1.19.2-2ubuntu0.6 krb5-otp - 1.19.2-2ubuntu0.6 krb5-pkinit - 1.19.2-2ubuntu0.6 krb5-user - 1.19.2-2ubuntu0.6 libgssapi-krb5-2 - 1.19.2-2ubuntu0.6 libgssrpc4 - 1.19.2-2ubuntu0.6 libk5crypto3 - 1.19.2-2ubuntu0.6 libkadm5clnt-mit12 - 1.19.2-2ubuntu0.6 libkadm5srv-mit12 - 1.19.2-2ubuntu0.6 libkdb5-10 - 1.19.2-2ubuntu0.6 libkrad-dev - 1.19.2-2ubuntu0.6 libkrad0 - 1.19.2-2ubuntu0.6 libkrb5-3 - 1.19.2-2ubuntu0.6 libkrb5-dev - 1.19.2-2ubuntu0.6 libkrb5support0 - 1.19.2-2ubuntu0.6 No subscription required
CVEs:

Title: USN-7327-1 -- Linux kernel vulnerability
URL: https://ubuntu.com/security/notices/USN-7327-1
Priorities: high
Description:
A security issues was discovered in the Linux kernel. An attacker could possibly use this to compromise the system. This update corrects flaws in the following subsystems: - Block layer subsystem; (CVE-2024-56672) Update Instructions: Run sudo pro fix USN-7327-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-5.15.0-134-generic - 5.15.0-134.145 linux-buildinfo-5.15.0-134-generic-64k - 5.15.0-134.145 linux-buildinfo-5.15.0-134-generic-lpae - 5.15.0-134.145 linux-buildinfo-5.15.0-134-lowlatency - 5.15.0-134.145 linux-buildinfo-5.15.0-134-lowlatency-64k - 5.15.0-134.145 linux-cloud-tools-5.15.0-134 - 5.15.0-134.145 linux-cloud-tools-5.15.0-134-generic - 5.15.0-134.145 linux-cloud-tools-5.15.0-134-lowlatency - 5.15.0-134.145 linux-cloud-tools-common - 5.15.0-134.145 linux-doc - 5.15.0-134.145 linux-headers-5.15.0-134 - 5.15.0-134.145 linux-headers-5.15.0-134-generic - 5.15.0-134.145 linux-headers-5.15.0-134-generic-64k - 5.15.0-134.145 linux-headers-5.15.0-134-generic-lpae - 5.15.0-134.145 linux-headers-5.15.0-134-lowlatency - 5.15.0-134.145 linux-headers-5.15.0-134-lowlatency-64k - 5.15.0-134.145 linux-image-5.15.0-134-generic - 5.15.0-134.145 linux-image-5.15.0-134-generic-64k - 5.15.0-134.145 linux-image-5.15.0-134-generic-lpae - 5.15.0-134.145 linux-image-5.15.0-134-lowlatency - 5.15.0-134.145 linux-image-5.15.0-134-lowlatency-64k - 5.15.0-134.145 linux-image-unsigned-5.15.0-134-generic - 5.15.0-134.145 linux-image-unsigned-5.15.0-134-generic-64k - 5.15.0-134.145 linux-image-unsigned-5.15.0-134-lowlatency - 5.15.0-134.145 linux-image-unsigned-5.15.0-134-lowlatency-64k - 5.15.0-134.145 linux-libc-dev - 5.15.0-134.145 linux-lowlatency-cloud-tools-5.15.0-134 - 5.15.0-134.145 linux-lowlatency-headers-5.15.0-134 - 5.15.0-134.145 linux-lowlatency-tools-5.15.0-134 - 5.15.0-134.145 linux-modules-5.15.0-134-generic - 5.15.0-134.145 linux-modules-5.15.0-134-generic-64k - 5.15.0-134.145 linux-modules-5.15.0-134-generic-lpae - 5.15.0-134.145 linux-modules-5.15.0-134-lowlatency - 5.15.0-134.145 linux-modules-5.15.0-134-lowlatency-64k - 5.15.0-134.145 linux-modules-extra-5.15.0-134-generic - 5.15.0-134.145 linux-modules-iwlwifi-5.15.0-134-generic - 5.15.0-134.145 linux-modules-iwlwifi-5.15.0-134-lowlatency - 5.15.0-134.145 linux-source-5.15.0 - 5.15.0-134.145 linux-tools-5.15.0-134 - 5.15.0-134.145 linux-tools-5.15.0-134-generic - 5.15.0-134.145 linux-tools-5.15.0-134-generic-64k - 5.15.0-134.145 linux-tools-5.15.0-134-generic-lpae - 5.15.0-134.145 linux-tools-5.15.0-134-lowlatency - 5.15.0-134.145 linux-tools-5.15.0-134-lowlatency-64k - 5.15.0-134.145 linux-tools-common - 5.15.0-134.145 linux-tools-host - 5.15.0-134.145 No subscription required linux-cloud-tools-lowlatency - 5.15.0.134.121 linux-cloud-tools-lowlatency-hwe-20.04 - 5.15.0.134.121 linux-cloud-tools-lowlatency-hwe-20.04-edge - 5.15.0.134.121 linux-headers-lowlatency - 5.15.0.134.121 linux-headers-lowlatency-64k - 5.15.0.134.121 linux-headers-lowlatency-64k-hwe-20.04 - 5.15.0.134.121 linux-headers-lowlatency-64k-hwe-20.04-edge - 5.15.0.134.121 linux-headers-lowlatency-hwe-20.04 - 5.15.0.134.121 linux-headers-lowlatency-hwe-20.04-edge - 5.15.0.134.121 linux-image-lowlatency - 5.15.0.134.121 linux-image-lowlatency-64k - 5.15.0.134.121 linux-image-lowlatency-64k-hwe-20.04 - 5.15.0.134.121 linux-image-lowlatency-64k-hwe-20.04-edge - 5.15.0.134.121 linux-image-lowlatency-hwe-20.04 - 5.15.0.134.121 linux-image-lowlatency-hwe-20.04-edge - 5.15.0.134.121 linux-lowlatency - 5.15.0.134.121 linux-lowlatency-64k - 5.15.0.134.121 linux-lowlatency-64k-hwe-20.04 - 5.15.0.134.121 linux-lowlatency-64k-hwe-20.04-edge - 5.15.0.134.121 linux-lowlatency-hwe-20.04 - 5.15.0.134.121 linux-lowlatency-hwe-20.04-edge - 5.15.0.134.121 linux-tools-lowlatency - 5.15.0.134.121 linux-tools-lowlatency-64k - 5.15.0.134.121 linux-tools-lowlatency-64k-hwe-20.04 - 5.15.0.134.121 linux-tools-lowlatency-64k-hwe-20.04-edge - 5.15.0.134.121 linux-tools-lowlatency-hwe-20.04 - 5.15.0.134.121 linux-tools-lowlatency-hwe-20.04-edge - 5.15.0.134.121 No subscription required linux-cloud-tools-generic - 5.15.0.134.133 linux-cloud-tools-generic-hwe-20.04 - 5.15.0.134.133 linux-cloud-tools-generic-hwe-20.04-edge - 5.15.0.134.133 linux-cloud-tools-virtual - 5.15.0.134.133 linux-cloud-tools-virtual-hwe-20.04 - 5.15.0.134.133 linux-cloud-tools-virtual-hwe-20.04-edge - 5.15.0.134.133 linux-crashdump - 5.15.0.134.133 linux-generic - 5.15.0.134.133 linux-generic-64k - 5.15.0.134.133 linux-generic-64k-hwe-20.04 - 5.15.0.134.133 linux-generic-64k-hwe-20.04-edge - 5.15.0.134.133 linux-generic-hwe-20.04 - 5.15.0.134.133 linux-generic-hwe-20.04-edge - 5.15.0.134.133 linux-generic-lpae - 5.15.0.134.133 linux-generic-lpae-hwe-20.04 - 5.15.0.134.133 linux-generic-lpae-hwe-20.04-edge - 5.15.0.134.133 linux-headers-generic - 5.15.0.134.133 linux-headers-generic-64k - 5.15.0.134.133 linux-headers-generic-64k-hwe-20.04 - 5.15.0.134.133 linux-headers-generic-64k-hwe-20.04-edge - 5.15.0.134.133 linux-headers-generic-hwe-20.04 - 5.15.0.134.133 linux-headers-generic-hwe-20.04-edge - 5.15.0.134.133 linux-headers-generic-lpae - 5.15.0.134.133 linux-headers-generic-lpae-hwe-20.04 - 5.15.0.134.133 linux-headers-generic-lpae-hwe-20.04-edge - 5.15.0.134.133 linux-headers-oem-20.04 - 5.15.0.134.133 linux-headers-virtual - 5.15.0.134.133 linux-headers-virtual-hwe-20.04 - 5.15.0.134.133 linux-headers-...

Read more

ubuntu jammy v1.775

25 Feb 09:50
Compare
Choose a tag to compare

Metadata:

BOSH Agent Version: 2.734.0
Kernel Version: 5.15.0.133.132

USNs:

Title: USN-7241-1 -- Bind vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7241-1
Priorities: medium
Description:
Toshifumi Sakaguchi discovered that Bind incorrectly handled many records in the additional section. A remote attacker could possibly use this issue to cause Bind to consume CPU resources, leading to a denial of service. (CVE-2024-11187) Jean-François Billaud discovered that the Bind DNS-over-HTTPS implementation incorrectly handled a heavy query load. A remote attacker could possibly use this issue to cause Bind to consume resources, leading to a denial of service. (CVE-2024-12705) Update Instructions: Run sudo pro fix USN-7241-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: bind9 - 1:9.18.30-0ubuntu0.22.04.2 bind9-dev - 1:9.18.30-0ubuntu0.22.04.2 bind9-dnsutils - 1:9.18.30-0ubuntu0.22.04.2 bind9-doc - 1:9.18.30-0ubuntu0.22.04.2 bind9-host - 1:9.18.30-0ubuntu0.22.04.2 bind9-libs - 1:9.18.30-0ubuntu0.22.04.2 bind9-utils - 1:9.18.30-0ubuntu0.22.04.2 bind9utils - 1:9.18.30-0ubuntu0.22.04.2 dnsutils - 1:9.18.30-0ubuntu0.22.04.2 No subscription required
CVEs:

Title: USN-7244-1 -- Jinja2 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7244-1
Priorities: medium
Description:
It was discovered that Jinja2 incorrectly handled certain filenames when compiling template content. An attacker could possibly use this issue to execute arbitrary code. (CVE-2024-56201) It was discovered that Jinja2 incorrectly handled string formatting calls. An attacker could possibly use this issue to execute arbitrary code. (CVE-2024-56326) Update Instructions: Run sudo pro fix USN-7244-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-jinja2-doc - 3.0.3-1ubuntu0.3 python3-jinja2 - 3.0.3-1ubuntu0.3 No subscription required
CVEs:

Title: USN-7257-1 -- Kerberos vulnerability
URL: https://ubuntu.com/security/notices/USN-7257-1
Priorities: medium
Description:
Goldberg, Miro Haller, Nadia Heninger, Mike Milano, Dan Shumow, Marc Stevens, and Adam Suhl discovered that Kerberos incorrectly authenticated certain responses. An attacker able to intercept communications between a RADIUS client and server could possibly use this issue to forge responses, bypass authentication, and access network devices and services. This update introduces support for the Message-Authenticator attribute in non-EAP authentication methods for communications between Kerberos and a RADIUS server. Update Instructions: Run sudo pro fix USN-7257-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: krb5-admin-server - 1.19.2-2ubuntu0.5 krb5-doc - 1.19.2-2ubuntu0.5 krb5-gss-samples - 1.19.2-2ubuntu0.5 krb5-k5tls - 1.19.2-2ubuntu0.5 krb5-kdc - 1.19.2-2ubuntu0.5 krb5-kdc-ldap - 1.19.2-2ubuntu0.5 krb5-kpropd - 1.19.2-2ubuntu0.5 krb5-locales - 1.19.2-2ubuntu0.5 krb5-multidev - 1.19.2-2ubuntu0.5 krb5-otp - 1.19.2-2ubuntu0.5 krb5-pkinit - 1.19.2-2ubuntu0.5 krb5-user - 1.19.2-2ubuntu0.5 libgssapi-krb5-2 - 1.19.2-2ubuntu0.5 libgssrpc4 - 1.19.2-2ubuntu0.5 libk5crypto3 - 1.19.2-2ubuntu0.5 libkadm5clnt-mit12 - 1.19.2-2ubuntu0.5 libkadm5srv-mit12 - 1.19.2-2ubuntu0.5 libkdb5-10 - 1.19.2-2ubuntu0.5 libkrad-dev - 1.19.2-2ubuntu0.5 libkrad0 - 1.19.2-2ubuntu0.5 libkrb5-3 - 1.19.2-2ubuntu0.5 libkrb5-dev - 1.19.2-2ubuntu0.5 libkrb5support0 - 1.19.2-2ubuntu0.5 No subscription required
CVEs:

Title: USN-7259-1 -- GNU C Library vulnerability
URL: https://ubuntu.com/security/notices/USN-7259-1
Priorities: medium
Description:
It was discovered that GNU C Library incorrectly handled memory when using the assert function. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. Update Instructions: Run sudo pro fix USN-7259-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: glibc-doc - 2.35-0ubuntu3.9 glibc-source - 2.35-0ubuntu3.9 libc-bin - 2.35-0ubuntu3.9 libc-dev-bin - 2.35-0ubuntu3.9 libc-devtools - 2.35-0ubuntu3.9 libc6 - 2.35-0ubuntu3.9 libc6-amd64 - 2.35-0ubuntu3.9 libc6-dev - 2.35-0ubuntu3.9 libc6-dev-amd64 - 2.35-0ubuntu3.9 libc6-dev-i386 - 2.35-0ubuntu3.9 libc6-dev-s390 - 2.35-0ubuntu3.9 libc6-dev-x32 - 2.35-0ubuntu3.9 libc6-i386 - 2.35-0ubuntu3.9 libc6-prof - 2.35-0ubuntu3.9 libc6-s390 - 2.35-0ubuntu3.9 libc6-x32 - 2.35-0ubuntu3.9 locales - 2.35-0ubuntu3.9 locales-all - 2.35-0ubuntu3.9 nscd - 2.35-0ubuntu3.9 No subscription required
CVEs:

Title: USN-7261-1 -- Vim vulnerability
URL: https://ubuntu.com/security/notices/USN-7261-1
Priorities: medium
Description:
It was discovered that Vim incorrectly handled certain internal calls when scrolling a window. An attacker could possibly use this issue to cause a denial of service. Update Instructions: Run sudo pro fix USN-7261-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: vim - 2:8.2.3995-1ubuntu2.23 vim-athena - 2:8.2.3995-1ubuntu2.23 vim-common - 2:8.2.3995-1ubuntu2.23 vim-doc - 2:8.2.3995-1ubuntu2.23 vim-gtk - 2:8.2.3995-1ubuntu2.23 vim-gtk3 - 2:8.2.3995-1ubuntu2.23 vim-gui-common - 2:8.2.3995-1ubuntu2.23 vim-nox - 2:8.2.3995-1ubuntu2.23 vim-runtime - 2:8.2.3995-1ubuntu2.23 vim-tiny - 2:8.2.3995-1ubuntu2.23 xxd - 2:8.2.3995-1ubuntu2.23 No subscription required
CVEs:

Title: USN-7269-1 -- Intel Microcode vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7269-1
Priorities: medium
Description:
Ke Sun, Paul Grosen and Alyssa Milburn discovered that some Intel® Processors did not properly implement Finite State Machines (FSMs) in Hardware Logic. A local privileged attacker could use this issue to cause a denial of service. (CVE-2024-31068) It was discovered that some Intel® Processors with Intel® SGX did not properly restrict access to the EDECCSSA user leaf function. A local authenticated attacker could use this issue to cause a denial of service. (CVE-2024-36293) Ke Sun, Alyssa Milburn, Benoit Morgan, and Erik Bjorge discovered that the UEFI firmware for some Intel® processors did not properly restrict access. An authenticated local attacker could use this issue to cause a denial of service. (CVE-2024-39279) Update Instructions: Run sudo pro fix USN-7269-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: intel-microcode - 3.20250211.0ubuntu0.22.04.1 No subscription required
CVEs:

Title: USN-7275-1 -- Libtasn1 vulnerability
URL: https://ubuntu.com/security/notices/USN-7275-1
Priorities: medium
Description:
Bing Shi discovered that Libtasn1 inefficiently handled certificates. An attacker could possibly use this issue to increase resource utilization leading to a denial of service. Update Instructions: Run sudo pro fix USN-7275-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libtasn1-6 - 4.18.0-4ubuntu0.1 libtasn1-6-dev - 4.18.0-4ubuntu0.1 libtasn1-bin - 4.18.0-4ubuntu0.1 libtasn1-doc - 4.18.0-4ubuntu0.1 No subscription required
CVEs:

Title: USN-7278-1 -- OpenSSL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7278-1
Priorities: low
Description:
George Pantelakis and Alicja Kario discovered that OpenSSL had a timing side-channel when performing ECDSA signature computations. A remote attacker could possibly use this issue to recover private data. (CVE-2024-13176) It was discovered that OpenSSL incorrectly handled certain memory operations when using low-level GF(2^m) elliptic curve APIs with untrusted explicit values for the field polynomial. When being used in this uncommon fashion, a remote attacker could use this issue to cause OpenSSL to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2024-9143) Update Instructions: Run sudo pro fix USN-7278-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libssl-dev - 3.0.2-0ubuntu1.19 libssl-doc - 3.0.2-0ubuntu1.19 libssl3 - 3.0.2-0ubuntu1.19 openssl - 3.0.2-0ubuntu1.19 No subscription required
CVEs:

Title: USN-7280-1 -- Python vulnerability
URL: https://ubuntu.com/security/notices/USN-7280-1
Priorities: medium
Description:
It was discovered that Python incorrectly handled parsing domain names that included square brackets. A remote attacker could possibly use this issue to perform a Server-Side Request Forgery (SSRF) attack. Update Instructions: Run sudo pro fix USN-7280-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: idle-python3.10 - 3.10.12-122.04.9 libpython3.10 - 3.10.12-122.04.9 libpython3.10-dev - 3.10.12-122.04.9 libpython3.10-minimal - 3.10.12-122.04.9 libpython3.10-stdlib - 3.10.12-122.04.9 libpython3.10-testsuite - 3.10.12-122.04.9 python3.10 - 3.10.12-1~22.04.9 python3...

Read more

ubuntu jammy v1.737

29 Jan 19:18
Compare
Choose a tag to compare

Metadata:

BOSH Agent Version: 2.723.0
Kernel Version: 5.15.0.131.129

What's Changed

  • Disable cloud logging to avoid a bug in the current version of the google-guest-agent package by @jpalermo in #413

Full Changelog: ubuntu-jammy/v1.719...ubuntu-jammy/v1.737

USNs:

Title: USN-7218-1 -- Python vulnerability
URL: https://ubuntu.com/security/notices/USN-7218-1
Priorities: medium
Description:
It was discovered that Python incorrectly handled parsing bracketed hosts. A remote attacker could possibly use this issue to perform a Server-Side Request Forgery (SSRF) attack. Update Instructions: Run sudo pro fix USN-7218-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: idle-python3.10 - 3.10.12-122.04.8 libpython3.10 - 3.10.12-122.04.8 libpython3.10-dev - 3.10.12-122.04.8 libpython3.10-minimal - 3.10.12-122.04.8 libpython3.10-stdlib - 3.10.12-122.04.8 libpython3.10-testsuite - 3.10.12-122.04.8 python3.10 - 3.10.12-122.04.8 python3.10-dev - 3.10.12-122.04.8 python3.10-doc - 3.10.12-122.04.8 python3.10-examples - 3.10.12-122.04.8 python3.10-full - 3.10.12-122.04.8 python3.10-minimal - 3.10.12-122.04.8 python3.10-nopie - 3.10.12-122.04.8 python3.10-venv - 3.10.12-122.04.8 No subscription required
CVEs:

Title: USN-7220-1 -- Vim vulnerability
URL: https://ubuntu.com/security/notices/USN-7220-1
Priorities: medium
Description:
It was discovered that Vim incorrectly handled memory when closing buffers with the visual mode active. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. Update Instructions: Run sudo pro fix USN-7220-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: vim - 2:8.2.3995-1ubuntu2.22 vim-athena - 2:8.2.3995-1ubuntu2.22 vim-common - 2:8.2.3995-1ubuntu2.22 vim-doc - 2:8.2.3995-1ubuntu2.22 vim-gtk - 2:8.2.3995-1ubuntu2.22 vim-gtk3 - 2:8.2.3995-1ubuntu2.22 vim-gui-common - 2:8.2.3995-1ubuntu2.22 vim-nox - 2:8.2.3995-1ubuntu2.22 vim-runtime - 2:8.2.3995-1ubuntu2.22 vim-tiny - 2:8.2.3995-1ubuntu2.22 xxd - 2:8.2.3995-1ubuntu2.22 No subscription required
CVEs:

Title: USN-7235-1 -- Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7235-1
Priorities: high,medium
Description:
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Netfilter; - Network traffic control; - VMware vSockets driver; (CVE-2024-53164, CVE-2024-53103, CVE-2024-53141) Update Instructions: Run sudo pro fix USN-7235-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-5.15.0-1059-gkeop - 5.15.0-1059.67 linux-cloud-tools-5.15.0-1059-gkeop - 5.15.0-1059.67 linux-gkeop-cloud-tools-5.15.0-1059 - 5.15.0-1059.67 linux-gkeop-headers-5.15.0-1059 - 5.15.0-1059.67 linux-gkeop-tools-5.15.0-1059 - 5.15.0-1059.67 linux-headers-5.15.0-1059-gkeop - 5.15.0-1059.67 linux-image-5.15.0-1059-gkeop - 5.15.0-1059.67 linux-image-unsigned-5.15.0-1059-gkeop - 5.15.0-1059.67 linux-modules-5.15.0-1059-gkeop - 5.15.0-1059.67 linux-modules-extra-5.15.0-1059-gkeop - 5.15.0-1059.67 linux-tools-5.15.0-1059-gkeop - 5.15.0-1059.67 No subscription required linux-buildinfo-5.15.0-1069-ibm - 5.15.0-1069.72 linux-headers-5.15.0-1069-ibm - 5.15.0-1069.72 linux-ibm-cloud-tools-common - 5.15.0-1069.72 linux-ibm-headers-5.15.0-1069 - 5.15.0-1069.72 linux-ibm-source-5.15.0 - 5.15.0-1069.72 linux-ibm-tools-5.15.0-1069 - 5.15.0-1069.72 linux-ibm-tools-common - 5.15.0-1069.72 linux-image-5.15.0-1069-ibm - 5.15.0-1069.72 linux-image-unsigned-5.15.0-1069-ibm - 5.15.0-1069.72 linux-modules-5.15.0-1069-ibm - 5.15.0-1069.72 linux-modules-extra-5.15.0-1069-ibm - 5.15.0-1069.72 linux-tools-5.15.0-1069-ibm - 5.15.0-1069.72 No subscription required linux-buildinfo-5.15.0-1071-nvidia - 5.15.0-1071.72 linux-buildinfo-5.15.0-1071-nvidia-lowlatency - 5.15.0-1071.72 linux-cloud-tools-5.15.0-1071-nvidia - 5.15.0-1071.72 linux-cloud-tools-5.15.0-1071-nvidia-lowlatency - 5.15.0-1071.72 linux-headers-5.15.0-1071-nvidia - 5.15.0-1071.72 linux-headers-5.15.0-1071-nvidia-lowlatency - 5.15.0-1071.72 linux-image-5.15.0-1071-nvidia - 5.15.0-1071.72 linux-image-5.15.0-1071-nvidia-lowlatency - 5.15.0-1071.72 linux-image-unsigned-5.15.0-1071-nvidia - 5.15.0-1071.72 linux-image-unsigned-5.15.0-1071-nvidia-lowlatency - 5.15.0-1071.72 linux-modules-5.15.0-1071-nvidia - 5.15.0-1071.72 linux-modules-5.15.0-1071-nvidia-lowlatency - 5.15.0-1071.72 linux-modules-extra-5.15.0-1071-nvidia - 5.15.0-1071.72 linux-modules-nvidia-fs-5.15.0-1071-nvidia - 5.15.0-1071.72 linux-modules-nvidia-fs-5.15.0-1071-nvidia-lowlatency - 5.15.0-1071.72 linux-nvidia-cloud-tools-5.15.0-1071 - 5.15.0-1071.72 linux-nvidia-cloud-tools-common - 5.15.0-1071.72 linux-nvidia-headers-5.15.0-1071 - 5.15.0-1071.72 linux-nvidia-tools-5.15.0-1071 - 5.15.0-1071.72 linux-nvidia-tools-common - 5.15.0-1071.72 linux-nvidia-tools-host - 5.15.0-1071.72 linux-tools-5.15.0-1071-nvidia - 5.15.0-1071.72 linux-tools-5.15.0-1071-nvidia-lowlatency - 5.15.0-1071.72 No subscription required linux-buildinfo-5.15.0-1071-raspi - 5.15.0-1071.74 linux-headers-5.15.0-1071-raspi - 5.15.0-1071.74 linux-image-5.15.0-1071-raspi - 5.15.0-1071.74 linux-modules-5.15.0-1071-raspi - 5.15.0-1071.74 linux-modules-extra-5.15.0-1071-raspi - 5.15.0-1071.74 linux-raspi-headers-5.15.0-1071 - 5.15.0-1071.74 linux-raspi-tools-5.15.0-1071 - 5.15.0-1071.74 linux-tools-5.15.0-1071-raspi - 5.15.0-1071.74 No subscription required linux-buildinfo-5.15.0-1072-intel-iotg - 5.15.0-1072.78 linux-cloud-tools-5.15.0-1072-intel-iotg - 5.15.0-1072.78 linux-headers-5.15.0-1072-intel-iotg - 5.15.0-1072.78 linux-image-5.15.0-1072-intel-iotg - 5.15.0-1072.78 linux-image-unsigned-5.15.0-1072-intel-iotg - 5.15.0-1072.78 linux-intel-iotg-cloud-tools-5.15.0-1072 - 5.15.0-1072.78 linux-intel-iotg-cloud-tools-common - 5.15.0-1072.78 linux-intel-iotg-headers-5.15.0-1072 - 5.15.0-1072.78 linux-intel-iotg-tools-5.15.0-1072 - 5.15.0-1072.78 linux-intel-iotg-tools-common - 5.15.0-1072.78 linux-intel-iotg-tools-host - 5.15.0-1072.78 linux-modules-5.15.0-1072-intel-iotg - 5.15.0-1072.78 linux-modules-extra-5.15.0-1072-intel-iotg - 5.15.0-1072.78 linux-modules-iwlwifi-5.15.0-1072-intel-iotg - 5.15.0-1072.78 linux-tools-5.15.0-1072-intel-iotg - 5.15.0-1072.78 No subscription required linux-buildinfo-5.15.0-1073-kvm - 5.15.0-1073.78 linux-headers-5.15.0-1073-kvm - 5.15.0-1073.78 linux-image-5.15.0-1073-kvm - 5.15.0-1073.78 linux-image-unsigned-5.15.0-1073-kvm - 5.15.0-1073.78 linux-kvm-headers-5.15.0-1073 - 5.15.0-1073.78 linux-kvm-tools-5.15.0-1073 - 5.15.0-1073.78 linux-modules-5.15.0-1073-kvm - 5.15.0-1073.78 linux-tools-5.15.0-1073-kvm - 5.15.0-1073.78 No subscription required linux-buildinfo-5.15.0-1073-gke - 5.15.0-1073.79 linux-gke-headers-5.15.0-1073 - 5.15.0-1073.79 linux-gke-tools-5.15.0-1073 - 5.15.0-1073.79 linux-headers-5.15.0-1073-gke - 5.15.0-1073.79 linux-image-5.15.0-1073-gke - 5.15.0-1073.79 linux-image-unsigned-5.15.0-1073-gke - 5.15.0-1073.79 linux-modules-5.15.0-1073-gke - 5.15.0-1073.79 linux-modules-extra-5.15.0-1073-gke - 5.15.0-1073.79 linux-tools-5.15.0-1073-gke - 5.15.0-1073.79 No subscription required linux-buildinfo-5.15.0-1074-oracle - 5.15.0-1074.80 linux-headers-5.15.0-1074-oracle - 5.15.0-1074.80 linux-image-5.15.0-1074-oracle - 5.15.0-1074.80 linux-image-unsigned-5.15.0-1074-oracle - 5.15.0-1074.80 linux-modules-5.15.0-1074-oracle - 5.15.0-1074.80 linux-modules-extra-5.15.0-1074-oracle - 5.15.0-1074.80 linux-oracle-headers-5.15.0-1074 - 5.15.0-1074.80 linux-oracle-tools-5.15.0-1074 - 5.15.0-1074.80 linux-tools-5.15.0-1074-oracle - 5.15.0-1074.80 No subscription required linux-buildinfo-5.15.0-1075-gcp - 5.15.0-1075.84 linux-gcp-headers-5.15.0-1075 - 5.15.0-1075.84 linux-gcp-tools-5.15.0-1075 - 5.15.0-1075.84 linux-headers-5.15.0-1075-gcp - 5.15.0-1075.84 linux-image-5.15.0-1075-gcp - 5.15.0-1075.84 linux-image-unsigned-5.15.0-1075-gcp - 5.15.0-1075.84 linux-modules-5.15.0-1075-gcp - 5.15.0-1075.84 linux-modules-extra-5.15.0-1075-gcp - 5.15.0-1075.84 linux-tools-5.15.0-1075-gcp - 5.15.0-1075.84 No subscription required linux-azure-cloud-tools-5.15.0-1079 - 5.15.0-1079.88 linux-azure-headers-5.15.0-1079 - 5.15.0-1079.88 linux-azure-tools-5.15.0-1079 - 5.15.0-1079.88 linux-buildinfo-5.15.0-1079-azure - 5.15.0-1079.88 linux-cloud-tools-5.15.0-1079-azure - 5.15.0-1079.88 linux-headers-5.15.0-1079-azure - 5.15.0-1079.88 linux-image-5.15.0-1079-azure - 5.15.0-1079.88 linux-image-unsigned-5.15.0-1079-azure - 5.15.0-1079.88 linux-modules-5.15.0-1079-azure - 5.15.0-1079.88 linux-modules-extra-5.15.0-1079-azure - 5.15.0-1079.88 linux-modules-involflt-5.15.0-1079-azure - 5.15.0-1079.88 linux-tools-5.15.0-1079-azure - 5.15.0-1079.88 No subscription required linux-buildinfo-5.15.0-131-generic - 5.15.0-131.141 linux-buildinfo-5.15.0-131-generic-64k - 5.15.0-131.141 linux-buildinfo-5.15.0-131-generic-lpae - 5.15.0-131.141 linux-buildinfo-5.15.0-131-lowlatency - 5.15.0-131.141 linux-buildinfo-5.15.0-131-lowlatency-64k - 5.15.0-131.141 linux-cloud-tools-5.15.0-131 - 5.15.0-131.141 linux-cloud-tools-5.15.0-131-generic - 5.15.0-131.141 linux-cloud-tools-5.15.0-131-lowlatency - 5.15.0-131.141 linux-cloud-tools-common - 5.15.0-131.141 linux-doc - 5.15.0-131.141 linux-headers-5.15.0-131 - 5.15.0-131.141 linux-headers-5.15.0-131-generic - 5.15.0-131.141 linux-headers-5.15.0-131-generic-64k - 5.15.0-131.141 linux-headers-5.15.0-131-generic-...

Read more

ubuntu jammy v1.719

16 Jan 21:58
Compare
Choose a tag to compare

Metadata:

BOSH Agent Version: 2.719.0
Kernel Version: 5.15.0.130.128

What's Changed

  • jq has been added to gce-compute-image-packages as a package dependency by @jpalermo in #406

Full Changelog: ubuntu-jammy/v1.708...ubuntu-jammy/v1.719

USNs:

Title: USN-7182-1 -- Ceph vulnerability
URL: https://ubuntu.com/security/notices/USN-7182-1
Priorities: medium
Description:
It was discovered that Ceph incorrectly handled unsupported JWT algorithms in the RadosGW gateway. An attacker could possibly use this issue to bypass certain authentication checks and restrictions. Update Instructions: Run sudo pro fix USN-7182-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ceph - 17.2.7-0ubuntu0.22.04.2 ceph-base - 17.2.7-0ubuntu0.22.04.2 ceph-common - 17.2.7-0ubuntu0.22.04.2 ceph-fuse - 17.2.7-0ubuntu0.22.04.2 ceph-grafana-dashboards - 17.2.7-0ubuntu0.22.04.2 ceph-immutable-object-cache - 17.2.7-0ubuntu0.22.04.2 ceph-mds - 17.2.7-0ubuntu0.22.04.2 ceph-mgr - 17.2.7-0ubuntu0.22.04.2 ceph-mgr-cephadm - 17.2.7-0ubuntu0.22.04.2 ceph-mgr-dashboard - 17.2.7-0ubuntu0.22.04.2 ceph-mgr-diskprediction-local - 17.2.7-0ubuntu0.22.04.2 ceph-mgr-k8sevents - 17.2.7-0ubuntu0.22.04.2 ceph-mgr-modules-core - 17.2.7-0ubuntu0.22.04.2 ceph-mgr-rook - 17.2.7-0ubuntu0.22.04.2 ceph-mon - 17.2.7-0ubuntu0.22.04.2 ceph-osd - 17.2.7-0ubuntu0.22.04.2 ceph-prometheus-alerts - 17.2.7-0ubuntu0.22.04.2 ceph-resource-agents - 17.2.7-0ubuntu0.22.04.2 ceph-volume - 17.2.7-0ubuntu0.22.04.2 cephadm - 17.2.7-0ubuntu0.22.04.2 cephfs-mirror - 17.2.7-0ubuntu0.22.04.2 cephfs-shell - 17.2.7-0ubuntu0.22.04.2 crimson-osd - 17.2.7-0ubuntu0.22.04.2 libcephfs-dev - 17.2.7-0ubuntu0.22.04.2 libcephfs-java - 17.2.7-0ubuntu0.22.04.2 libcephfs-jni - 17.2.7-0ubuntu0.22.04.2 libcephfs2 - 17.2.7-0ubuntu0.22.04.2 librados-dev - 17.2.7-0ubuntu0.22.04.2 librados2 - 17.2.7-0ubuntu0.22.04.2 libradospp-dev - 17.2.7-0ubuntu0.22.04.2 libradosstriper-dev - 17.2.7-0ubuntu0.22.04.2 libradosstriper1 - 17.2.7-0ubuntu0.22.04.2 librbd-dev - 17.2.7-0ubuntu0.22.04.2 librbd1 - 17.2.7-0ubuntu0.22.04.2 librgw-dev - 17.2.7-0ubuntu0.22.04.2 librgw2 - 17.2.7-0ubuntu0.22.04.2 libsqlite3-mod-ceph - 17.2.7-0ubuntu0.22.04.2 libsqlite3-mod-ceph-dev - 17.2.7-0ubuntu0.22.04.2 python3-ceph - 17.2.7-0ubuntu0.22.04.2 python3-ceph-argparse - 17.2.7-0ubuntu0.22.04.2 python3-ceph-common - 17.2.7-0ubuntu0.22.04.2 python3-cephfs - 17.2.7-0ubuntu0.22.04.2 python3-rados - 17.2.7-0ubuntu0.22.04.2 python3-rbd - 17.2.7-0ubuntu0.22.04.2 python3-rgw - 17.2.7-0ubuntu0.22.04.2 rados-objclass-dev - 17.2.7-0ubuntu0.22.04.2 radosgw - 17.2.7-0ubuntu0.22.04.2 rbd-fuse - 17.2.7-0ubuntu0.22.04.2 rbd-mirror - 17.2.7-0ubuntu0.22.04.2 rbd-nbd - 17.2.7-0ubuntu0.22.04.2 No subscription required
CVEs:

Title: USN-7206-1 -- rsync vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7206-1
Priorities: medium,high
Description:
Simon Scannell, Pedro Gallegos, and Jasiel Spelman discovered that rsync did not properly handle checksum lengths. An attacker could use this issue to execute arbitrary code. (CVE-2024-12084) Simon Scannell, Pedro Gallegos, and Jasiel Spelman discovered that rsync compared checksums with uninitialized memory. An attacker could exploit this issue to leak sensitive information. (CVE-2024-12085) Simon Scannell, Pedro Gallegos, and Jasiel Spelman discovered that rsync incorrectly handled file checksums. A malicious server could use this to expose arbitrary client files. (CVE-2024-12086) Simon Scannell, Pedro Gallegos, and Jasiel Spelman discovered that rsync mishandled symlinks for some settings. An attacker could exploit this to write files outside the intended directory. (CVE-2024-12087) Simon Scannell, Pedro Gallegos, and Jasiel Spelman discovered that rsync failed to verify symbolic link destinations for some settings. An attacker could exploit this for path traversal attacks. (CVE-2024-12088) Aleksei Gorban discovered a race condition in rsync's handling of symbolic links. An attacker could use this to access sensitive information or escalate privileges. (CVE-2024-12747) Update Instructions: Run sudo pro fix USN-7206-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: rsync - 3.2.7-0ubuntu0.22.04.3 No subscription required
CVEs:

ubuntu jammy v1.708

06 Jan 19:48
Compare
Choose a tag to compare

Metadata:

BOSH Agent Version: 2.716.0
Kernel Version: 5.15.0.130.128

Full Changelog: ubuntu-jammy/v1.682...ubuntu-jammy/v1.708

USNs:

Title: USN-7174-1 -- GStreamer vulnerability
URL: https://ubuntu.com/security/notices/USN-7174-1
Priorities: medium
Description:
Antonio Morales discovered that GStreamer incorrectly handled allocating memory for certain buffers. An attacker could use this issue to cause GStreamer to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run sudo pro fix USN-7174-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-gstreamer-1.0 - 1.20.3-0ubuntu1.1 gstreamer1.0-tools - 1.20.3-0ubuntu1.1 libgstreamer1.0-0 - 1.20.3-0ubuntu1.1 libgstreamer1.0-dev - 1.20.3-0ubuntu1.1 No subscription required
CVEs:

Title: USN-7179-1 -- Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7179-1
Priorities: high,medium
Description:
Andy Nguyen discovered that the Bluetooth L2CAP implementation in the Linux kernel contained a type-confusion error. A physically proximate remote attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2020-12351) Andy Nguyen discovered that the Bluetooth A2MP implementation in the Linux kernel did not properly initialize memory in some situations. A physically proximate remote attacker could use this to expose sensitive information (kernel memory). (CVE-2020-12352) Andy Nguyen discovered that the Bluetooth HCI event packet parser in the Linux kernel did not properly handle event advertisements of certain sizes, leading to a heap-based buffer overflow. A physically proximate remote attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2020-24490) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - GPU drivers; - Media drivers; - Network drivers; - SMB network file system; - Bluetooth subsystem; - Amateur Radio drivers; - Network traffic control; - VMware vSockets driver; (CVE-2024-43904, CVE-2024-35963, CVE-2024-35967, CVE-2024-40973, CVE-2024-26822, CVE-2024-35965, CVE-2024-40910, CVE-2024-38553, CVE-2024-53057, CVE-2024-50264, CVE-2024-35966) Update Instructions: Run sudo pro fix USN-7179-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-5.15.0-1057-gkeop - 5.15.0-1057.64 linux-cloud-tools-5.15.0-1057-gkeop - 5.15.0-1057.64 linux-gkeop-cloud-tools-5.15.0-1057 - 5.15.0-1057.64 linux-gkeop-headers-5.15.0-1057 - 5.15.0-1057.64 linux-gkeop-tools-5.15.0-1057 - 5.15.0-1057.64 linux-headers-5.15.0-1057-gkeop - 5.15.0-1057.64 linux-image-5.15.0-1057-gkeop - 5.15.0-1057.64 linux-image-unsigned-5.15.0-1057-gkeop - 5.15.0-1057.64 linux-modules-5.15.0-1057-gkeop - 5.15.0-1057.64 linux-modules-extra-5.15.0-1057-gkeop - 5.15.0-1057.64 linux-tools-5.15.0-1057-gkeop - 5.15.0-1057.64 No subscription required linux-buildinfo-5.15.0-1067-ibm - 5.15.0-1067.70 linux-headers-5.15.0-1067-ibm - 5.15.0-1067.70 linux-ibm-cloud-tools-common - 5.15.0-1067.70 linux-ibm-headers-5.15.0-1067 - 5.15.0-1067.70 linux-ibm-source-5.15.0 - 5.15.0-1067.70 linux-ibm-tools-5.15.0-1067 - 5.15.0-1067.70 linux-ibm-tools-common - 5.15.0-1067.70 linux-image-5.15.0-1067-ibm - 5.15.0-1067.70 linux-image-unsigned-5.15.0-1067-ibm - 5.15.0-1067.70 linux-modules-5.15.0-1067-ibm - 5.15.0-1067.70 linux-modules-extra-5.15.0-1067-ibm - 5.15.0-1067.70 linux-tools-5.15.0-1067-ibm - 5.15.0-1067.70 No subscription required linux-buildinfo-5.15.0-1071-kvm - 5.15.0-1071.76 linux-headers-5.15.0-1071-kvm - 5.15.0-1071.76 linux-image-5.15.0-1071-kvm - 5.15.0-1071.76 linux-image-unsigned-5.15.0-1071-kvm - 5.15.0-1071.76 linux-kvm-headers-5.15.0-1071 - 5.15.0-1071.76 linux-kvm-tools-5.15.0-1071 - 5.15.0-1071.76 linux-modules-5.15.0-1071-kvm - 5.15.0-1071.76 linux-tools-5.15.0-1071-kvm - 5.15.0-1071.76 No subscription required linux-buildinfo-5.15.0-128-lowlatency - 5.15.0-128.138 linux-buildinfo-5.15.0-128-lowlatency-64k - 5.15.0-128.138 linux-cloud-tools-5.15.0-128-lowlatency - 5.15.0-128.138 linux-headers-5.15.0-128-lowlatency - 5.15.0-128.138 linux-headers-5.15.0-128-lowlatency-64k - 5.15.0-128.138 linux-image-5.15.0-128-lowlatency - 5.15.0-128.138 linux-image-5.15.0-128-lowlatency-64k - 5.15.0-128.138 linux-image-unsigned-5.15.0-128-lowlatency - 5.15.0-128.138 linux-image-unsigned-5.15.0-128-lowlatency-64k - 5.15.0-128.138 linux-lowlatency-cloud-tools-5.15.0-128 - 5.15.0-128.138 linux-lowlatency-headers-5.15.0-128 - 5.15.0-128.138 linux-lowlatency-tools-5.15.0-128 - 5.15.0-128.138 linux-modules-5.15.0-128-lowlatency - 5.15.0-128.138 linux-modules-5.15.0-128-lowlatency-64k - 5.15.0-128.138 linux-modules-iwlwifi-5.15.0-128-lowlatency - 5.15.0-128.138 linux-tools-5.15.0-128-lowlatency - 5.15.0-128.138 linux-tools-5.15.0-128-lowlatency-64k - 5.15.0-128.138 No subscription required linux-buildinfo-5.15.0-130-generic - 5.15.0-130.140 linux-buildinfo-5.15.0-130-generic-64k - 5.15.0-130.140 linux-buildinfo-5.15.0-130-generic-lpae - 5.15.0-130.140 linux-cloud-tools-5.15.0-130 - 5.15.0-130.140 linux-cloud-tools-5.15.0-130-generic - 5.15.0-130.140 linux-cloud-tools-common - 5.15.0-130.140 linux-doc - 5.15.0-130.140 linux-headers-5.15.0-130 - 5.15.0-130.140 linux-headers-5.15.0-130-generic - 5.15.0-130.140 linux-headers-5.15.0-130-generic-64k - 5.15.0-130.140 linux-headers-5.15.0-130-generic-lpae - 5.15.0-130.140 linux-image-5.15.0-130-generic - 5.15.0-130.140 linux-image-5.15.0-130-generic-64k - 5.15.0-130.140 linux-image-5.15.0-130-generic-lpae - 5.15.0-130.140 linux-image-unsigned-5.15.0-130-generic - 5.15.0-130.140 linux-image-unsigned-5.15.0-130-generic-64k - 5.15.0-130.140 linux-libc-dev - 5.15.0-130.140 linux-modules-5.15.0-130-generic - 5.15.0-130.140 linux-modules-5.15.0-130-generic-64k - 5.15.0-130.140 linux-modules-5.15.0-130-generic-lpae - 5.15.0-130.140 linux-modules-extra-5.15.0-130-generic - 5.15.0-130.140 linux-modules-iwlwifi-5.15.0-130-generic - 5.15.0-130.140 linux-source-5.15.0 - 5.15.0-130.140 linux-tools-5.15.0-130 - 5.15.0-130.140 linux-tools-5.15.0-130-generic - 5.15.0-130.140 linux-tools-5.15.0-130-generic-64k - 5.15.0-130.140 linux-tools-5.15.0-130-generic-lpae - 5.15.0-130.140 linux-tools-common - 5.15.0-130.140 linux-tools-host - 5.15.0-130.140 No subscription required linux-cloud-tools-gkeop - 5.15.0.1057.56 linux-cloud-tools-gkeop-5.15 - 5.15.0.1057.56 linux-gkeop - 5.15.0.1057.56 linux-gkeop-5.15 - 5.15.0.1057.56 linux-headers-gkeop - 5.15.0.1057.56 linux-headers-gkeop-5.15 - 5.15.0.1057.56 linux-image-gkeop - 5.15.0.1057.56 linux-image-gkeop-5.15 - 5.15.0.1057.56 linux-modules-extra-gkeop - 5.15.0.1057.56 linux-modules-extra-gkeop-5.15 - 5.15.0.1057.56 linux-tools-gkeop - 5.15.0.1057.56 linux-tools-gkeop-5.15 - 5.15.0.1057.56 No subscription required linux-headers-ibm - 5.15.0.1067.63 linux-ibm - 5.15.0.1067.63 linux-image-ibm - 5.15.0.1067.63 linux-tools-ibm - 5.15.0.1067.63 No subscription required linux-headers-kvm - 5.15.0.1071.67 linux-image-kvm - 5.15.0.1071.67 linux-kvm - 5.15.0.1071.67 linux-tools-kvm - 5.15.0.1071.67 No subscription required linux-cloud-tools-lowlatency - 5.15.0.128.116 linux-cloud-tools-lowlatency-hwe-20.04 - 5.15.0.128.116 linux-cloud-tools-lowlatency-hwe-20.04-edge - 5.15.0.128.116 linux-headers-lowlatency - 5.15.0.128.116 linux-headers-lowlatency-64k - 5.15.0.128.116 linux-headers-lowlatency-64k-hwe-20.04 - 5.15.0.128.116 linux-headers-lowlatency-64k-hwe-20.04-edge - 5.15.0.128.116 linux-headers-lowlatency-hwe-20.04 - 5.15.0.128.116 linux-headers-lowlatency-hwe-20.04-edge - 5.15.0.128.116 linux-image-lowlatency - 5.15.0.128.116 linux-image-lowlatency-64k - 5.15.0.128.116 linux-image-lowlatency-64k-hwe-20.04 - 5.15.0.128.116 linux-image-lowlatency-64k-hwe-20.04-edge - 5.15.0.128.116 linux-image-lowlatency-hwe-20.04 - 5.15.0.128.116 linux-image-lowlatency-hwe-20.04-edge - 5.15.0.128.116 linux-lowlatency - 5.15.0.128.116 linux-lowlatency-64k - 5.15.0.128.116 linux-lowlatency-64k-hwe-20.04 - 5.15.0.128.116 linux-lowlatency-64k-hwe-20.04-edge - 5.15.0.128.116 linux-lowlatency-hwe-20.04 - 5.15.0.128.116 linux-lowlatency-hwe-20.04-edge - 5.15.0.128.116 linux-tools-lowlatency - 5.15.0.128.116 linux-tools-lowlatency-64k - 5.15.0.128.116 linux-tools-lowlatency-64k-hwe-20.04 - 5.15.0.128.116 linux-tools-lowlatency-64k-hwe-20.04-edge - 5.15.0.128.116 linux-tools-lowlatency-hwe-20.04 - 5.15.0.128.116 linux-tools-lowlatency-hwe-20.04-edge - 5.15.0.128.116 No subscription required linux-cloud-tools-generic - 5.15.0.130.128 linux-cloud-tools-generic-hwe-20.04 - 5.15.0.130.128 linux-cloud-tools-generic-hwe-20.04-edge - 5.15.0.130.128 linux-cloud-tools-virtual - 5.15.0.130.128 linux-cloud-tools-virtual-hwe-20.04 - 5.15.0.130.128 linux-cloud-tools-virtual-hwe-20.04-edge - 5.15.0.130.128 linux-crashdump - 5.15.0.130.128 linux-generic - 5.15.0.130.128 linux-generic-64k - 5.15.0.130.128 linux-generic-64k-hwe-20.04 - 5.15.0.130.128 linux-generic-64k-hwe-20.04-edge - 5.15.0.130.128 linux-generic-hwe-20.04 - 5.15.0.130.128 linux-generic-hwe-20.04-edge - 5.15.0.130.128 linux-generic-lpae - 5.15.0.130.128 linux-generic-lpae-hwe-20.04 - 5.15.0.130.128 linux-generic-lpae-hwe-20.04-edge - 5.15.0.130.128 linux-headers-generic - 5.15.0.130.128 linux-headers-generic-64k - 5.15.0.130.128 linux-headers-generic-64k-hwe-20.04 - 5.15.0.130.128 linux-headers-generic-64k-hwe-20.04-edge - 5.15.0.130.128 linux-headers-generic-hwe-20.04 - 5.15.0.130.128 linux-headers-generic-hwe-20.04-edge - 5.15.0.130.128 linux-headers-generic-lpae - 5.15.0.130.12...

Read more

ubuntu jammy v1.682

17 Dec 23:33
Compare
Choose a tag to compare

Metadata:

BOSH Agent Version: 2.705.0
Kernel Version: 5.15.0.127.126

USNs:

Title: USN-7125-1 -- RapidJSON vulnerability
URL: https://ubuntu.com/security/notices/USN-7125-1
Priorities: medium
Description:
It was discovered that RapidJSON incorrectly parsed numbers written in scientific notation, leading to an integer underflow. An attacker could possibly use this issue to cause a denial of service, or execute arbitrary code. Update Instructions: Run sudo pro fix USN-7125-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: rapidjson-dev - 1.1.0+dfsg2-7ubuntu0.1esm1 rapidjson-doc - 1.1.0+dfsg2-7ubuntu0.1esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
CVEs:

Title: USN-7129-1 -- TinyGLTF vulnerability
URL: https://ubuntu.com/security/notices/USN-7129-1
Priorities: medium
Description:
It was discovered that TinyGLTF performed file path expansion in an insecure way on certain inputs. An attacker could possibly use this issue to cause a denial of service, or execute arbitrary code. Update Instructions: Run sudo pro fix USN-7129-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libtinygltf-dev - 2.5.0+dfsg-4ubuntu0.1 libtinygltf1d - 2.5.0+dfsg-4ubuntu0.1 No subscription required
CVEs:

Title: USN-7132-1 -- PostgreSQL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7132-1
Priorities: medium
Description:
It was discovered that PostgreSQL incorrectly tracked tables with row security. A remote attacker could possibly use this issue to perform forbidden reads and modifications. (CVE-2024-10976) Jacob Champion discovered that PostgreSQL clients used untrusted server error messages. An attacker that is able to intercept network communications could possibly use this issue to inject error messages that could be interpreted as valid query results. (CVE-2024-10977) Tom Lane discovered that PostgreSQL incorrectly handled certain privilege assignments. A remote attacker could possibly use this issue to view or change different rows from those intended. (CVE-2024-10978) Coby Abrams discovered that PostgreSQL incorrectly handled environment variables. A remote attacker could possibly use this issue to execute arbitrary code. (CVE-2024-10979) Update Instructions: Run sudo pro fix USN-7132-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libecpg-compat3 - 14.15-0ubuntu0.22.04.1 libecpg-dev - 14.15-0ubuntu0.22.04.1 libecpg6 - 14.15-0ubuntu0.22.04.1 libpgtypes3 - 14.15-0ubuntu0.22.04.1 libpq-dev - 14.15-0ubuntu0.22.04.1 libpq5 - 14.15-0ubuntu0.22.04.1 postgresql-14 - 14.15-0ubuntu0.22.04.1 postgresql-client-14 - 14.15-0ubuntu0.22.04.1 postgresql-doc-14 - 14.15-0ubuntu0.22.04.1 postgresql-plperl-14 - 14.15-0ubuntu0.22.04.1 postgresql-plpython3-14 - 14.15-0ubuntu0.22.04.1 postgresql-pltcl-14 - 14.15-0ubuntu0.22.04.1 postgresql-server-dev-14 - 14.15-0ubuntu0.22.04.1 No subscription required
CVEs:

Title: USN-7137-1 -- recutils vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7137-1
Priorities: medium,low
Description:
It was discovered that recutils incorrectly handled memory when parsing comments with the recparser utility. An attacker could possibly use this issue to cause a denial of service or run arbitrary commands. (CVE-2021-46019, CVE-2021-46021, CVE-2021-46022) It was discovered that recutils incorrectly handled memory when parsing CSV files. An attacker could possibly use this issue to cause a denial of service or run arbitrary commands. (CVE-2019-11637, CVE-2019-11638, CVE-2019-11639, CVE-2019-11640) It was discovered that recutils incorrectly handled memory when parsing maliciously crafted recfiles. An attacker could possibly use this issue to cause a denial of service. (CVE-2019-6455, CVE-2019-6456, CVE-2019-6457, CVE-2019-6458, CVE-2019-6459, CVE-2019-6460) Update Instructions: Run sudo pro fix USN-7137-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: librec-dev - 1.8-1ubuntu0.22.04.1esm1 librec1 - 1.8-1ubuntu0.22.04.1esm1 recutils - 1.8-1ubuntu0.22.04.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
CVEs:

Title: USN-7142-1 -- WebKitGTK vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7142-1
Priorities: high
Description:
Several security issues were discovered in the WebKitGTK Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution. Update Instructions: Run sudo pro fix USN-7142-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-javascriptcoregtk-4.0 - 2.46.4-0ubuntu0.22.04.1 gir1.2-javascriptcoregtk-4.1 - 2.46.4-0ubuntu0.22.04.1 gir1.2-javascriptcoregtk-6.0 - 2.46.4-0ubuntu0.22.04.1 gir1.2-webkit-6.0 - 2.46.4-0ubuntu0.22.04.1 gir1.2-webkit2-4.0 - 2.46.4-0ubuntu0.22.04.1 gir1.2-webkit2-4.1 - 2.46.4-0ubuntu0.22.04.1 libjavascriptcoregtk-4.0-18 - 2.46.4-0ubuntu0.22.04.1 libjavascriptcoregtk-4.0-bin - 2.46.4-0ubuntu0.22.04.1 libjavascriptcoregtk-4.0-dev - 2.46.4-0ubuntu0.22.04.1 libjavascriptcoregtk-4.1-0 - 2.46.4-0ubuntu0.22.04.1 libjavascriptcoregtk-4.1-dev - 2.46.4-0ubuntu0.22.04.1 libjavascriptcoregtk-6.0-1 - 2.46.4-0ubuntu0.22.04.1 libjavascriptcoregtk-6.0-dev - 2.46.4-0ubuntu0.22.04.1 libwebkit2gtk-4.0-37 - 2.46.4-0ubuntu0.22.04.1 libwebkit2gtk-4.0-dev - 2.46.4-0ubuntu0.22.04.1 libwebkit2gtk-4.0-doc - 2.46.4-0ubuntu0.22.04.1 libwebkit2gtk-4.1-0 - 2.46.4-0ubuntu0.22.04.1 libwebkit2gtk-4.1-dev - 2.46.4-0ubuntu0.22.04.1 libwebkitgtk-6.0-4 - 2.46.4-0ubuntu0.22.04.1 libwebkitgtk-6.0-dev - 2.46.4-0ubuntu0.22.04.1 webkit2gtk-driver - 2.46.4-0ubuntu0.22.04.1 No subscription required
CVEs:

Title: USN-7144-1 -- Linux kernel (Intel IoTG) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7144-1
Priorities: high,low,medium
Description:
Supraja Sridhara, Benedict Schlüter, Mark Kuhne, Andrin Bertschi, and Shweta Shinde discovered that the Confidential Computing framework in the Linux kernel for x86 platforms did not properly handle 32-bit emulation on TDX and SEV. An attacker with access to the VMM could use this to cause a denial of service (guest crash) or possibly execute arbitrary code. (CVE-2024-25744) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PowerPC architecture; - RISC-V architecture; - User-Mode Linux (UML); - x86 architecture; - Block layer subsystem; - Android drivers; - Serial ATA and Parallel ATA drivers; - ATM drivers; - Drivers core; - Null block device driver; - Character device driver; - ARM SCMI message protocol; - GPU drivers; - HID subsystem; - Hardware monitoring drivers; - I3C subsystem; - InfiniBand drivers; - Input Device core drivers; - Input Device (Miscellaneous) drivers; - IOMMU subsystem; - IRQ chip drivers; - ISDN/mISDN subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - VMware VMCI Driver; - MMC subsystem; - Ethernet bonding driver; - Network drivers; - Mellanox network drivers; - Near Field Communication (NFC) drivers; - NVME drivers; - Device tree and open firmware driver; - Parport drivers; - PCI subsystem; - Pin controllers subsystem; - Remote Processor subsystem; - S/390 drivers; - SCSI subsystem; - QCOM SoC drivers; - Direct Digital Synthesis drivers; - Thunderbolt and USB4 drivers; - TTY drivers; - Userspace I/O drivers; - DesignWare USB3 driver; - USB Gadget drivers; - USB Host Controller drivers; - USB Type-C Connector System Software Interface driver; - USB over IP driver; - Virtio Host (VHOST) subsystem; - File systems infrastructure; - BTRFS file system; - Ext4 file system; - F2FS file system; - JFS file system; - NILFS2 file system; - File system notification infrastructure; - NTFS3 file system; - Proc file system; - SMB network file system; - Bitmap API; - Objagg library; - Perf events; - Virtio network driver; - KCM (Kernel Connection Multiplexor) sockets driver; - Network traffic control; - Control group (cgroup); - DMA mapping infrastructure; - Locking primitives; - Padata parallel execution mechanism; - RCU subsystem; - Scheduler infrastructure; - Tracing infrastructure; - Radix Tree data structure library; - Kernel userspace event delivery library; - ...

Read more

ubuntu jammy v1.651

22 Nov 20:20
Compare
Choose a tag to compare

Full Changelog: ubuntu-jammy/v1.639...ubuntu-jammy/v1.651

Metadata:

BOSH Agent Version: 2.698.0
Kernel Version: 5.15.0.126.125

USNs:

Title: USN-7111-1 -- Go vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7111-1
Priorities: medium
Description:
Philippe Antoine discovered that Go incorrectly handled crafted HTTP/2 streams. An attacker could possibly use this issue to cause a denial of service. (CVE-2022-41723) Marten Seemann discovered that Go did not properly manage memory under certain circumstances. An attacker could possibly use this issue to cause a panic resulting in a denial of service. (CVE-2022-41724) Ameya Darshan and Jakob Ackermann discovered that Go did not properly validate the amount of memory and disk files ReadForm can consume. An attacker could possibly use this issue to cause a panic resulting in a denial of service. (CVE-2022-41725) Jakob Ackermann discovered that Go incorrectly handled multipart forms. An attacker could possibly use this issue to consume an excessive amount of resources, resulting in a denial of service. (CVE-2023-24536) It was discovered that Go did not properly validate the "//go:cgo_" directives during compilation. An attacker could possibly use this issue to inject arbitrary code during compile time. (CVE-2023-39323) Bartek Nowotarski was discovered that the Go net/http module did not properly handle the requests when request's headers exceed MaxHeaderBytes. An attacker could possibly use this issue to cause a panic resulting into a denial of service. (CVE-2023-45288) Bartek Nowotarski discovered that the Go net/http module did not properly validate the total size of the parsed form when parsing a multipart form. An attacker could possibly use this issue to cause a panic resulting into a denial of service. (CVE-2023-45290) John Howard discovered that the Go crypto/x509 module did not properly handle a certificate chain which contains a certificate with an unknown public key algorithm. An attacker could possibly use this issue to cause a panic resulting into a denial of service. (CVE-2024-24783) Juho Nurminen discovered that the Go net/mail module did not properly handle comments within display names in the ParseAddressList function. An attacker could possibly use this issue to cause a panic resulting into a denial of service. (CVE-2024-24784) Yufan You discovered that the Go archive/zip module did not properly handle certain types of invalid zip files differs from the behavior of most zip implementations. An attacker could possibly use this issue to cause a panic resulting into a denial of service. (CVE-2024-24789) Geoff Franks discovered that the Go net/http module did not properly handle responses to requests with an "Expect: 100-continue" header under certain circumstances. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-24791) It was discovered that the Go parser module did not properly handle deeply nested literal values. An attacker could possibly use this issue to cause a panic resulting in a denial of service. (CVE-2024-34155) Md Sakib Anwar discovered that the Go encoding/gob module did not properly handle message decoding under certain circumstances. An attacker could possibly use this issue to cause a panic resulting in a denial of service. (CVE-2024-34156) It was discovered that the Go build module did not properly handle certain build tag lines with deeply nested expressions. An attacker could possibly use this issue to cause a panic resulting in a denial of service. (CVE-2024-34158) Update Instructions: Run sudo pro fix USN-7111-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: golang-1.17 - 1.17.13-3ubuntu1.3 golang-1.17-doc - 1.17.13-3ubuntu1.3 golang-1.17-go - 1.17.13-3ubuntu1.3 golang-1.17-src - 1.17.13-3ubuntu1.3 No subscription required
CVEs:

Title: USN-7113-1 -- WebKitGTK vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7113-1
Priorities: medium
Description:
Several security issues were discovered in the WebKitGTK Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution. Update Instructions: Run sudo pro fix USN-7113-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-javascriptcoregtk-4.0 - 2.46.3-0ubuntu0.22.04.1 gir1.2-javascriptcoregtk-4.1 - 2.46.3-0ubuntu0.22.04.1 gir1.2-javascriptcoregtk-6.0 - 2.46.3-0ubuntu0.22.04.1 gir1.2-webkit-6.0 - 2.46.3-0ubuntu0.22.04.1 gir1.2-webkit2-4.0 - 2.46.3-0ubuntu0.22.04.1 gir1.2-webkit2-4.1 - 2.46.3-0ubuntu0.22.04.1 libjavascriptcoregtk-4.0-18 - 2.46.3-0ubuntu0.22.04.1 libjavascriptcoregtk-4.0-bin - 2.46.3-0ubuntu0.22.04.1 libjavascriptcoregtk-4.0-dev - 2.46.3-0ubuntu0.22.04.1 libjavascriptcoregtk-4.1-0 - 2.46.3-0ubuntu0.22.04.1 libjavascriptcoregtk-4.1-dev - 2.46.3-0ubuntu0.22.04.1 libjavascriptcoregtk-6.0-1 - 2.46.3-0ubuntu0.22.04.1 libjavascriptcoregtk-6.0-dev - 2.46.3-0ubuntu0.22.04.1 libwebkit2gtk-4.0-37 - 2.46.3-0ubuntu0.22.04.1 libwebkit2gtk-4.0-dev - 2.46.3-0ubuntu0.22.04.1 libwebkit2gtk-4.0-doc - 2.46.3-0ubuntu0.22.04.1 libwebkit2gtk-4.1-0 - 2.46.3-0ubuntu0.22.04.1 libwebkit2gtk-4.1-dev - 2.46.3-0ubuntu0.22.04.1 libwebkitgtk-6.0-4 - 2.46.3-0ubuntu0.22.04.1 libwebkitgtk-6.0-dev - 2.46.3-0ubuntu0.22.04.1 webkit2gtk-driver - 2.46.3-0ubuntu0.22.04.1 No subscription required
CVEs:

Title: USN-7114-1 -- GLib vulnerability
URL: https://ubuntu.com/security/notices/USN-7114-1
Priorities: medium
Description:
It was discovered that Glib incorrectly handled certain trailing characters. An attacker could possibly use this issue to cause a crash or other undefined behavior. Update Instructions: Run sudo pro fix USN-7114-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libglib2.0-0 - 2.72.4-0ubuntu2.4 libglib2.0-bin - 2.72.4-0ubuntu2.4 libglib2.0-data - 2.72.4-0ubuntu2.4 libglib2.0-dev - 2.72.4-0ubuntu2.4 libglib2.0-dev-bin - 2.72.4-0ubuntu2.4 libglib2.0-doc - 2.72.4-0ubuntu2.4 libglib2.0-tests - 2.72.4-0ubuntu2.4 No subscription required
CVEs:

Title: USN-7117-1 -- needrestart and Module::ScanDeps vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7117-1
Priorities: medium,high
Description:
Qualys discovered that needrestart passed unsanitized data to a library (libmodule-scandeps-perl) which expects safe input. A local attacker could possibly use this issue to execute arbitrary code as root. (CVE-2024-11003) Qualys discovered that the library libmodule-scandeps-perl incorrectly parsed perl code. This could allow a local attacker to execute arbitrary shell commands. (CVE-2024-10224) Qualys discovered that needrestart incorrectly used the PYTHONPATH environment variable to spawn a new Python interpreter. A local attacker could possibly use this issue to execute arbitrary code as root. (CVE-2024-48990) Qualys discovered that needrestart incorrectly checked the path to the Python interpreter. A local attacker could possibly use this issue to win a race condition and execute arbitrary code as root. (CVE-2024-48991) Qualys discovered that needrestart incorrectly used the RUBYLIB environment variable to spawn a new Ruby interpreter. A local attacker could possibly use this issue to execute arbitrary code as root. (CVE-2024-48992) Update Instructions: Run sudo pro fix USN-7117-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libmodule-scandeps-perl - 1.31-1ubuntu0.1 No subscription required needrestart - 3.5-5ubuntu2.2 No subscription required
CVEs:

Title: USN-7120-1 -- Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7120-1
Priorities: high,medium
Description:
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - File systems infrastructure; - Network traffic control; (CVE-2024-46800, CVE-2024-43882) Update Instructions: Run sudo pro fix USN-7120-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1018-gcp - 6.8.0-1018.2022.04.1 linux-buildinfo-6.8.0-1018-nvidia - 6.8.0-1018.2022.04.1 linux-buildinfo-6.8.0-1018-nvidia-64k - 6.8.0-1018.2022.04.1 linux-cloud-tools-nvidia-6.8 - 6.8.0-1018.2022.04.1 linux-cloud-tools-nvidia-hwe-22.04 - 6.8.0-1018.2...

Read more

ubuntu jammy v1.639

13 Nov 02:11
Compare
Choose a tag to compare

Metadata:

BOSH Agent Version: 2.698.0
Kernel Version: 5.15.0.125.124

Full Changelog: ubuntu-jammy/v1.631...ubuntu-jammy/v1.639

USNs:

Title: USN-7091-1 -- Ruby vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7091-1
Priorities: medium
Description:
It was discovered that Ruby incorrectly handled parsing of an XML document that has specific XML characters in an attribute value using REXML gem. An attacker could use this issue to cause Ruby to crash, resulting in a denial of service. This issue only affected in Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-35176, CVE-2024-39908, CVE-2024-41123) It was discovered that Ruby incorrectly handled parsing of an XML document that has many entity expansions with SAX2 or pull parser API. An attacker could use this issue to cause Ruby to crash, resulting in a denial of service. (CVE-2024-41946) It was discovered that Ruby incorrectly handled parsing of an XML document that has many digits in a hex numeric character reference. An attacker could use this issue to cause Ruby to crash, resulting in a denial of service. (CVE-2024-49761) Update Instructions: Run sudo pro fix USN-7091-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libruby3.0 - 3.0.2-7ubuntu2.8 ruby3.0 - 3.0.2-7ubuntu2.8 ruby3.0-dev - 3.0.2-7ubuntu2.8 ruby3.0-doc - 3.0.2-7ubuntu2.8 No subscription required
CVEs:

Title: USN-7093-1 -- Werkzeug vulnerability
URL: https://ubuntu.com/security/notices/USN-7093-1
Priorities: medium
Description:
It was discovered that Werkzeug incorrectly handled multiple form submission requests. A remote attacker could possibly use this issue to cause Werkzeug to consume resources, leading to a denial of service. Update Instructions: Run sudo pro fix USN-7093-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-werkzeug-doc - 2.0.2+dfsg1-1ubuntu0.22.04.3 python3-werkzeug - 2.0.2+dfsg1-1ubuntu0.22.04.3 No subscription required
CVEs:

Title: USN-7095-1 -- Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7095-1
Priorities: low,medium
Description:
Chenyuan Yang discovered that the USB Gadget subsystem in the Linux kernel did not properly check for the device to be enabled before writing. A local attacker could possibly use this to cause a denial of service. (CVE-2024-25741) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - MIPS architecture; - PA-RISC architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - x86 architecture; - Cryptographic API; - Serial ATA and Parallel ATA drivers; - Null block device driver; - Bluetooth drivers; - Cdrom driver; - Clock framework and drivers; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - Cirrus firmware drivers; - GPIO subsystem; - GPU drivers; - I2C subsystem; - IIO subsystem; - InfiniBand drivers; - ISDN/mISDN subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - Fastrpc Driver; - Network drivers; - Microsoft Azure Network Adapter (MANA) driver; - Near Field Communication (NFC) drivers; - NVME drivers; - NVMEM (Non Volatile Memory) drivers; - PCI subsystem; - Pin controllers subsystem; - x86 platform drivers; - S/390 drivers; - SCSI drivers; - Thermal drivers; - TTY drivers; - UFS subsystem; - USB DSL drivers; - USB core drivers; - DesignWare USB3 driver; - USB Gadget drivers; - USB Serial drivers; - VFIO drivers; - VHOST drivers; - File systems infrastructure; - BTRFS file system; - GFS2 file system; - JFFS2 file system; - JFS file system; - Network file systems library; - Network file system client; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - Memory management; - Netfilter; - Tracing infrastructure; - io_uring subsystem; - BPF subsystem; - Core kernel; - Bluetooth subsystem; - CAN network layer; - Ceph Core library; - Networking core; - IPv4 networking; - IPv6 networking; - IUCV driver; - MAC80211 subsystem; - Network traffic control; - Sun RPC protocol; - Wireless networking; - AMD SoC Alsa drivers; - SoC Audio for Freescale CPUs drivers; - MediaTek ASoC drivers; - SoC audio core drivers; - SOF drivers; - Sound sequencer drivers; (CVE-2024-42271, CVE-2024-42068, CVE-2024-42086, CVE-2024-42132, CVE-2024-42074, CVE-2024-41017, CVE-2024-42090, CVE-2024-42280, CVE-2024-41030, CVE-2024-41037, CVE-2024-42248, CVE-2024-42084, CVE-2024-41057, CVE-2024-42252, CVE-2024-41055, CVE-2024-42158, CVE-2024-42097, CVE-2024-42101, CVE-2024-42095, CVE-2024-41084, CVE-2024-41051, CVE-2024-41032, CVE-2024-41046, CVE-2024-42231, CVE-2024-42133, CVE-2024-42089, CVE-2024-41062, CVE-2024-41033, CVE-2024-41012, CVE-2024-41077, CVE-2024-41064, CVE-2024-41082, CVE-2024-41090, CVE-2024-42065, CVE-2024-41096, CVE-2024-42119, CVE-2024-41054, CVE-2024-42064, CVE-2024-42253, CVE-2024-42237, CVE-2024-42120, CVE-2024-41066, CVE-2024-41083, CVE-2024-42129, CVE-2024-41085, CVE-2024-41058, CVE-2024-42146, CVE-2024-42156, CVE-2024-42076, CVE-2024-42149, CVE-2024-42069, CVE-2024-41039, CVE-2024-42110, CVE-2024-42150, CVE-2024-41015, CVE-2024-39486, CVE-2024-42144, CVE-2024-42131, CVE-2024-42087, CVE-2024-42091, CVE-2024-42236, CVE-2024-42088, CVE-2024-42112, CVE-2024-42142, CVE-2024-42082, CVE-2024-42111, CVE-2024-41028, CVE-2024-45001, CVE-2024-42077, CVE-2024-42102, CVE-2024-42239, CVE-2024-42140, CVE-2024-41091, CVE-2024-41050, CVE-2024-41034, CVE-2024-43858, CVE-2024-42145, CVE-2024-42227, CVE-2024-41029, CVE-2024-42230, CVE-2024-42096, CVE-2024-42238, CVE-2024-41027, CVE-2024-42063, CVE-2024-41023, CVE-2024-41041, CVE-2024-41038, CVE-2024-41073, CVE-2024-41067, CVE-2024-41025, CVE-2024-42152, CVE-2024-42247, CVE-2024-41065, CVE-2024-42121, CVE-2024-42157, CVE-2024-42080, CVE-2024-41076, CVE-2024-41059, CVE-2024-42108, CVE-2024-42251, CVE-2024-42093, CVE-2024-42130, CVE-2024-42126, CVE-2024-42079, CVE-2024-42246, CVE-2024-41081, CVE-2024-42092, CVE-2024-43855, CVE-2024-42235, CVE-2024-42118, CVE-2024-42067, CVE-2024-41047, CVE-2024-42155, CVE-2024-41010, CVE-2024-41061, CVE-2024-41007, CVE-2024-42245, CVE-2024-42106, CVE-2024-42066, CVE-2024-41078, CVE-2024-42113, CVE-2024-41087, CVE-2024-41092, CVE-2024-42234, CVE-2024-42124, CVE-2024-42100, CVE-2024-42128, CVE-2024-41072, CVE-2024-41022, CVE-2024-41049, CVE-2024-42229, CVE-2024-42225, CVE-2024-41052, CVE-2024-42151, CVE-2024-41094, CVE-2024-41098, CVE-2024-41035, CVE-2024-41042, CVE-2024-42114, CVE-2024-42250, CVE-2024-41095, CVE-2024-42138, CVE-2024-42241, CVE-2024-42103, CVE-2024-42094, CVE-2024-41045, CVE-2024-41075, CVE-2024-42073, CVE-2024-42153, CVE-2024-41048, CVE-2024-42085, CVE-2024-41074, CVE-2024-42244, CVE-2024-41018, CVE-2024-41079, CVE-2024-42127, CVE-2023-52887, CVE-2023-52888, CVE-2024-41071, CVE-2024-41020, CVE-2024-41036, CVE-2024-42117, CVE-2024-41068, CVE-2024-41056, CVE-2024-39487, CVE-2024-42243, CVE-2024-41019, CVE-2024-41070, CVE-2024-41044, CVE-2024-41060, CVE-2024-41088, CVE-2024-41021, CVE-2024-41053, CVE-2024-42137, CVE-2024-41086, CVE-2024-42104, CVE-2024-42109, CVE-2024-42105, CVE-2024-42136, CVE-2024-41080, CVE-2024-42098, CVE-2024-41093, CVE-2024-41063, CVE-2024-42161, CVE-2024-42147, CVE-2024-42223, CVE-2024-41097, CVE-2024-41069, CVE-2024-42240, CVE-2024-42135, CVE-2024-42070, CVE-2024-41089, CVE-2024-42141, CVE-2024-42115, CVE-2024-41031, CVE-2024-42232) Update Instructions: Run sudo pro fix USN-7095-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1017-nvidia - 6.8.0-1017.1922.04.1 linux-buildinfo-6.8.0-1017-nvidia-64k - 6.8.0-1017.1922.04.1 linux-cloud-tools-nvidia-6.8 - 6.8.0-1017.1922.04.1 linux-cloud-tools-nvidia-hwe-22.04 - 6.8.0-1017.1922.04.1 linux-cloud-tools-nvidia-hwe-22.04-edge - 6.8.0-1017.1922.04.1 linux-headers-6.8.0-1017-nvidia - 6.8.0-1017.1922.04.1 linux-headers-6.8.0-1017-nvidia-64k - 6.8.0-1017.1922.04.1 linux-headers-nvidia-6.8 - 6.8.0-1017.1922.04.1 linux-headers-nvidia-64k-6.8 - 6.8.0-1017.1922.04.1 linux-headers-nvidia-64k-hwe-22.04 - 6.8.0-1017.1922.04.1 linux-headers-nvidia-64k-hwe-22.04-edge - 6.8.0-1017.1922.04.1 linux-headers-nvidia-hwe-22.04 - 6.8.0-1017.1922.04.1 linux-headers-nvidia-hwe-22.04-edge - 6.8.0-1017.1922.04.1 linux-image-6.8.0-1017-nvidia - 6.8.0-1017.1922.04.1 linux-image-6.8.0-1017-nvidia-64k - 6.8.0-1017.1922.04.1 linux-image-nvidia-6.8 - 6.8.0-1017.1922.04.1 linux-image-nvidia-64k-6.8 - 6.8.0-1017.1922.04.1 linux-image-nvidia-64k-hwe-22.04 - 6.8.0-1017.1922.04.1 linux-image-nvidia-64k-hwe-22.04-edge - 6.8.0-1017.1922.04.1 linux-image-nvidia-hwe-22.04 - 6.8.0-1017.1922.04.1 linux-image-nvidia-hwe-22.04-edge - 6.8.0-1017.1922.04.1 linux-image-uc-6.8.0-1017-nvidia - 6.8.0-1017.1922.04.1 linux-image-uc-6.8.0-1017-nvidia-64k - 6.8.0-1017.1922.04.1 linux-image-unsigned-6.8.0-1017-nvidia - 6.8.0-1017.1922.04.1 linux-image-unsigned-6.8.0-1017-nvidia-64k - 6.8.0-1017.1922.04.1 linux-modules-6.8.0-1017-nvidia - 6.8.0-1017.1922.04.1 linux-modules-6.8.0-1017-nvidia-64k - 6.8.0-1017.1922.04.1 linux-modules-extra-6.8.0-1017-nvidia - 6.8.0-1017.1922.04.1 linux-modules-nvidia-fs-6.8.0-1017-nvidia - 6...

Read more

ubuntu jammy v1.631

04 Nov 18:09
Compare
Choose a tag to compare

What's Changed

  • Default apt sources are restored once stemcell is built by @selzoc in #384

Full Changelog: ubuntu-jammy/v1.621...ubuntu-jammy/v1.631

Metadata:

BOSH Agent Version: 2.696.0
Kernel Version: 5.15.0.124.124

USNs:

Title: USN-7021-5: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7021-5
Priorities: unknown,medium,high
Description:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:

Title: USN-7072-2: Linux kernel (GKE) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7072-2
Priorities: unknown,high,medium
Description:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:

Title: USN-7087-1 -- libarchive vulnerability
URL: https://ubuntu.com/security/notices/USN-7087-1
Priorities: medium
Description:
It was discovered that libarchive incorrectly handled certain RAR archive files. If a user or automated system were tricked into processing a specially crafted RAR archive, an attacker could use this issue to cause libarchive to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run sudo pro fix USN-7087-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libarchive-dev - 3.6.0-1ubuntu1.3 libarchive-tools - 3.6.0-1ubuntu1.3 libarchive13 - 3.6.0-1ubuntu1.3 No subscription required
CVEs:

Title: USN-7089-1 -- Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7089-1
Priorities: medium,low
Description:
Chenyuan Yang discovered that the USB Gadget subsystem in the Linux kernel did not properly check for the device to be enabled before writing. A local attacker could possibly use this to cause a denial of service. (CVE-2024-25741) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - MIPS architecture; - PA-RISC architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - x86 architecture; - Cryptographic API; - Serial ATA and Parallel ATA drivers; - Null block device driver; - Bluetooth drivers; - Cdrom driver; - Clock framework and drivers; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - Cirrus firmware drivers; - GPIO subsystem; - GPU drivers; - I2C subsystem; - IIO subsystem; - InfiniBand drivers; - ISDN/mISDN subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - Fastrpc Driver; - Network drivers; - Microsoft Azure Network Adapter (MANA) driver; - Near Field Communication (NFC) drivers; - NVME drivers; - NVMEM (Non Volatile Memory) drivers; - PCI subsystem; - Pin controllers subsystem; - x86 platform drivers; - S/390 drivers; - SCSI drivers; - Thermal drivers; - TTY drivers; - UFS subsystem; - USB DSL drivers; - USB core drivers; - DesignWare USB3 driver; - USB Gadget drivers; - USB Serial drivers; - VFIO drivers; - VHOST drivers; - File systems infrastructure; - BTRFS file system; - GFS2 file system; - JFFS2 file system; - JFS file system; - Network file systems library; - Network file system client; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - Memory management; - Netfilter; - Tracing infrastructure; - io_uring subsystem; - BPF subsystem; - Core kernel; - Bluetooth subsystem; - CAN network layer; - Ceph Core library; - Networking core; - IPv4 networking; - IPv6 networking; - IUCV driver; - MAC80211 subsystem; - Network traffic control; - Sun RPC protocol; - Wireless networking; - AMD SoC Alsa drivers; - SoC Audio for Freescale CPUs drivers; - MediaTek ASoC drivers; - SoC audio core drivers; - SOF drivers; - Sound sequencer drivers; (CVE-2024-41079, CVE-2024-41058, CVE-2024-41029, CVE-2024-42253, CVE-2024-41075, CVE-2024-42280, CVE-2024-42102, CVE-2024-41055, CVE-2024-41025, CVE-2024-42124, CVE-2024-41060, CVE-2024-41027, CVE-2024-42145, CVE-2024-42146, CVE-2024-42251, CVE-2024-41081, CVE-2024-42065, CVE-2024-42129, CVE-2024-41031, CVE-2024-41035, CVE-2024-41047, CVE-2023-52888, CVE-2024-42248, CVE-2024-41039, CVE-2024-42119, CVE-2024-41038, CVE-2024-42150, CVE-2024-42073, CVE-2024-42089, CVE-2024-41007, CVE-2024-42120, CVE-2024-42069, CVE-2024-41096, CVE-2024-42153, CVE-2024-41012, CVE-2024-42151, CVE-2024-42241, CVE-2024-42126, CVE-2024-42092, CVE-2024-42231, CVE-2024-41032, CVE-2024-41076, CVE-2024-42136, CVE-2024-41078, CVE-2024-41068, CVE-2024-41070, CVE-2024-41091, CVE-2024-42063, CVE-2024-42157, CVE-2024-42118, CVE-2024-41046, CVE-2024-41023, CVE-2024-42094, CVE-2024-41042, CVE-2024-41034, CVE-2024-42096, CVE-2024-42105, CVE-2024-41051, CVE-2024-42239, CVE-2024-42117, CVE-2024-41019, CVE-2024-41033, CVE-2024-42223, CVE-2024-41098, CVE-2024-41052, CVE-2024-41036, CVE-2024-41087, CVE-2024-42115, CVE-2024-41057, CVE-2024-42161, CVE-2024-42240, CVE-2024-41093, CVE-2024-42097, CVE-2024-42077, CVE-2024-41062, CVE-2024-42156, CVE-2024-41077, CVE-2024-42235, CVE-2024-41085, CVE-2023-52887, CVE-2024-42237, CVE-2024-41061, CVE-2024-41073, CVE-2024-42087, CVE-2024-41086, CVE-2024-41044, CVE-2024-41066, CVE-2024-42128, CVE-2024-42144, CVE-2024-42227, CVE-2024-41020, CVE-2024-41015, CVE-2024-42232, CVE-2024-41072, CVE-2024-41030, CVE-2024-42098, CVE-2024-42121, CVE-2024-42080, CVE-2024-41071, CVE-2024-42225, CVE-2024-42064, CVE-2024-42246, CVE-2024-42113, CVE-2024-41082, CVE-2024-42095, CVE-2024-41080, CVE-2024-41056, CVE-2024-42147, CVE-2024-41069, CVE-2024-42135, CVE-2024-42245, CVE-2024-42244, CVE-2024-42271, CVE-2024-41084, CVE-2024-42234, CVE-2024-41064, CVE-2024-42108, CVE-2024-41090, CVE-2024-42079, CVE-2024-42138, CVE-2024-42127, CVE-2024-42149, CVE-2024-41067, CVE-2024-42130, CVE-2024-42086, CVE-2024-41045, CVE-2024-42088, CVE-2024-42131, CVE-2024-41063, CVE-2024-42111, CVE-2024-41088, CVE-2024-42110, CVE-2024-41074, CVE-2024-41041, CVE-2024-39487, CVE-2024-42076, CVE-2024-42091, CVE-2024-42132, CVE-2024-42100, CVE-2024-41010, CVE-2024-42093, CVE-2024-41048, CVE-2024-41059, CVE-2024-42137, CVE-2024-41065, CVE-2024-42067, CVE-2024-42140, CVE-2024-42250, CVE-2024-42084, CVE-2024-42155, CVE-2024-41021, CVE-2024-41089, CVE-2024-42106, CVE-2024-41083, CVE-2024-42112, CVE-2024-42101, CVE-2024-42229, CVE-2024-41053, CVE-2024-42074, CVE-2024-42252, CVE-2024-41018, CVE-2024-41095, CVE-2024-42090, CVE-2024-41097, CVE-2024-42236, CVE-2024-42109, CVE-2024-42158, CVE-2024-43858, CVE-2024-42133, CVE-2024-42066, CVE-2024-41094, CVE-2024-39486, CVE-2024-41050, CVE-2024-41028, CVE-2024-42114, CVE-2024-41049, CVE-2024-42070, CVE-2024-42243, CVE-2024-41092, CVE-2024-43855, CVE-2024-42103, CVE-2024-41022, CVE-2024-42142, CVE-2024-42238, CVE-2024-42152, CVE-2024-41037, CVE-2024-42230, CVE-2024-42082, CVE-2024-42085, CVE-2024-42104, CVE-2024-41017, CVE-2024-41054, CVE-2024-42068, CVE-2024-42141, CVE-2024-42247) Update Instructions: Run sudo pro fix USN-7089-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1017-gcp - 6.8.0-1017.1922.04.1 linux-gcp - 6.8.0-1017.1922.04.1 linux-gcp-6.8-headers-6.8.0-1017 - 6.8.0-1017.1922.04.1 linux-gcp-6.8-tools-6.8.0-1017 - 6.8.0-1017.1922.04.1 linux-gcp-edge - 6.8.0-1017.1922.04.1 linux-headers-6.8.0-1017-gcp - 6.8.0-1017.1922.04.1 linux-headers-gcp - 6.8.0-1017.1922.04.1 linux-headers-gcp-edge - 6.8.0-1017.1922.04.1 linux-image-6.8.0-1017-gcp - 6.8.0-1017.1922.04.1 linux-image-gcp - 6.8.0-1017.1922.04.1 linux-image-gcp-edge - 6.8.0-1017.1922.04.1 linux-image-unsigned-6.8.0-1017-gcp - 6.8.0-1017.1922.04.1 linux-modules-6.8.0-1017-gcp - 6.8.0-1017.1922.04.1 linux-modules-extra-6.8.0-1017-gcp - 6.8.0-1017.1922.04.1 linux-modules-extra-gcp - 6.8.0-1017.1922.04.1 linux-modules-extra-gcp-edge - 6.8.0-1017.1922.04.1 linux-tools-6.8.0-1017-gcp - 6.8.0-1017.1922.04.1 linux-tools-gcp - 6.8.0-1017.1922.04.1 linux-tools-gcp-edge - 6.8.0-1017.1922.04.1 No subscription required linux-azure - 6.8.0-1017.2022.04.1 linux-azure-6.8-cloud-tools-6.8.0-1017 - 6.8.0-1017.2022.04.1 linux-azure-6.8-headers-6.8.0-1017 - 6.8.0-1017.2022.04.1 linux-azure-6.8-tools-6.8.0-1017 - 6.8.0-1017.2022.04.1 linux-azure-edge - 6.8.0-1017.2022.04.1 linux-azure-fde - 6.8.0-1017.20~22.04.1 linux-...

Read more

ubuntu jammy v1.621

21 Oct 22:07
Compare
Choose a tag to compare

Metadata:

BOSH Agent Version: 2.695.0
Kernel Version: 5.15.0.124.124

USNs:

Title: USN-7064-1: nano vulnerability
URL: https://ubuntu.com/security/notices/USN-7064-1
Priorities: medium
Description:
It was discovered that nano allowed a possible privilege escalation
through an insecure temporary file. If nano was killed while editing, the
permissions granted to the emergency save file could be used by an
attacker to escalate privileges using a malicious symlink.
CVEs:

Title: USN-7070-1: libarchive vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7070-1
Priorities: critical,high
Description:
It was discovered that libarchive mishandled certain memory checks,
which could result in a NULL pointer dereference. An attacker could
potentially use this issue to cause a denial of service. This issue
only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS,
Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-36227)

It was discovered that libarchive mishandled certain memory operations,
which could result in an out-of-bounds memory access. An attacker could
potentially use this issue to cause a denial of service. This issue only
affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS.
(CVE-2024-48957, CVE-2024-48958)
CVEs:

Title: USN-7071-1: Linux kernel vulnerability
URL: https://ubuntu.com/security/notices/USN-7071-1
Priorities: medium
Description:
A security issue was discovered in the Linux kernel.
An attacker could possibly use this to compromise the system.
This update corrects flaws in the following subsystems:

Title: USN-7072-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7072-1
Priorities: unknown,high,medium
Description:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:

Title: USN-7076-1: Linux kernel (Azure) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7076-1
Priorities: unknown,high,medium
Description:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems: