Canonical USN OVAL Generator 1 5.11.1 2024-09-28T15:29:19 Copyright (C) 2024 Canonical LTD. All rights reserved. This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, version 3 of the License. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License version 3 for more details. You should have received a copy of the GNU General Public License version 3 along with this program. If not, see http://www.gnu.org/licenses/. Check that Ubuntu 24.04 LTS (noble) is installed. USN-6663-3 -- OpenSSL update Ubuntu 24.04 LTS USN-6663-1 provided a security update for OpenSSL. This update provides the corresponding update for Ubuntu 24.04 LTS. Original advisory details: As a security improvement, OpenSSL will now return deterministic random bytes instead of an error when detecting wrong padding in PKCS#1 v1.5 RSA to prevent its use in possible Bleichenbacher timing attacks. Update Instructions: Run `sudo pro fix USN-6663-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libssl3t64 - 3.0.13-0ubuntu3.1 libssl-dev - 3.0.13-0ubuntu3.1 openssl - 3.0.13-0ubuntu3.1 libssl-doc - 3.0.13-0ubuntu3.1 No subscription required None https://launchpad.net/bugs/2054090 USN-6673-3 -- python-cryptography vulnerability Ubuntu 24.04 LTS USN-6673-1 provided a security update for python-cryptography. This update provides the corresponding update for Ubuntu 24.04 LTS. Original advisory details: It was discovered that python-cryptography incorrectly handled memory operations when processing mismatched PKCS#12 keys. A remote attacker could possibly use this issue to cause python-cryptography to crash, leading to a denial of service. This issue only affected Ubuntu 23.10. (CVE-2024-26130) Update Instructions: Run `sudo pro fix USN-6673-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-cryptography - 41.0.7-4ubuntu0.1 python-cryptography-doc - 41.0.7-4ubuntu0.1 No subscription required Medium CVE-2024-26130 USN-6715-2 -- unixODBC vulnerability Ubuntu 24.04 LTS USN-6715-1 fixed a vulnerability in unixODBC. This update provides the corresponding fix for Ubuntu 24.04 LTS. Original advisory details: It was discovered that unixODBC incorrectly handled certain bytes. An attacker could use this issue to execute arbitrary code or cause a crash. Update Instructions: Run `sudo pro fix USN-6715-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libodbc2 - 2.3.12-1ubuntu0.24.04.1 unixodbc-dev - 2.3.12-1ubuntu0.24.04.1 unixodbc-common - 2.3.12-1ubuntu0.24.04.1 unixodbc - 2.3.12-1ubuntu0.24.04.1 odbcinst - 2.3.12-1ubuntu0.24.04.1 libodbcinst2 - 2.3.12-1ubuntu0.24.04.1 libodbccr2 - 2.3.12-1ubuntu0.24.04.1 No subscription required Medium CVE-2024-1013 USN-6718-3 -- curl vulnerabilities Ubuntu 24.04 LTS USN-6718-1 fixed vulnerabilities in curl. This update provides the corresponding updates for Ubuntu 24.04 LTS. Original advisory details: Dan Fandrich discovered that curl would incorrectly use the default set of protocols when a parameter option disabled all protocols without adding any, contrary to expectations. This issue only affected Ubuntu 23.10. (CVE-2024-2004) It was discovered that curl incorrectly handled memory when limiting the amount of headers when HTTP/2 server push is allowed. A remote attacker could possibly use this issue to cause curl to consume resources, leading to a denial of service. (CVE-2024-2398) Update Instructions: Run `sudo pro fix USN-6718-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libcurl4-gnutls-dev - 8.5.0-2ubuntu10.1 libcurl4-openssl-dev - 8.5.0-2ubuntu10.1 libcurl3t64-gnutls - 8.5.0-2ubuntu10.1 libcurl4-doc - 8.5.0-2ubuntu10.1 curl - 8.5.0-2ubuntu10.1 libcurl4t64 - 8.5.0-2ubuntu10.1 No subscription required Medium CVE-2024-2004 CVE-2024-2398 USN-6729-3 -- Apache HTTP Server vulnerabilities Ubuntu 24.04 LTS USN-6729-1 fixed vulnerabilities in Apache HTTP Server. This update provides the corresponding updates for Ubuntu 24.04 LTS. Original advisory details: Orange Tsai discovered that the Apache HTTP Server incorrectly handled validating certain input. A remote attacker could possibly use this issue to perform HTTP request splitting attacks. (CVE-2023-38709) Keran Mu and Jianjun Chen discovered that the Apache HTTP Server incorrectly handled validating certain input. A remote attacker could possibly use this issue to perform HTTP request splitting attacks. (CVE-2024-24795) Bartek Nowotarski discovered that the Apache HTTP Server HTTP/2 module incorrectly handled endless continuation frames. A remote attacker could possibly use this issue to cause the server to consume resources, leading to a denial of service. (CVE-2024-27316) Update Instructions: Run `sudo pro fix USN-6729-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: apache2-data - 2.4.58-1ubuntu8.1 libapache2-mod-md - 2.4.58-1ubuntu8.1 apache2-utils - 2.4.58-1ubuntu8.1 apache2-dev - 2.4.58-1ubuntu8.1 apache2-suexec-pristine - 2.4.58-1ubuntu8.1 apache2-suexec-custom - 2.4.58-1ubuntu8.1 apache2 - 2.4.58-1ubuntu8.1 apache2-doc - 2.4.58-1ubuntu8.1 libapache2-mod-proxy-uwsgi - 2.4.58-1ubuntu8.1 apache2-ssl-dev - 2.4.58-1ubuntu8.1 apache2-bin - 2.4.58-1ubuntu8.1 No subscription required Medium CVE-2023-38709 CVE-2024-24795 CVE-2024-27316 USN-6733-2 -- GnuTLS vulnerabilities Ubuntu 24.04 LTS USN-6733-1 fixed vulnerabilities in GnuTLS. This update provides the corresponding updates for Ubuntu 24.04 LTS. Original advisory details: It was discovered that GnuTLS had a timing side-channel when performing certain ECDSA operations. A remote attacker could possibly use this issue to recover sensitive information. (CVE-2024-28834) It was discovered that GnuTLS incorrectly handled verifying certain PEM bundles. A remote attacker could possibly use this issue to cause GnuTLS to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 23.10. (CVE-2024-28835) Update Instructions: Run `sudo pro fix USN-6733-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libgnutls-openssl27t64 - 3.8.3-1.1ubuntu3.1 libgnutls-dane0t64 - 3.8.3-1.1ubuntu3.1 libgnutls28-dev - 3.8.3-1.1ubuntu3.1 gnutls-doc - 3.8.3-1.1ubuntu3.1 libgnutls30t64 - 3.8.3-1.1ubuntu3.1 gnutls-bin - 3.8.3-1.1ubuntu3.1 No subscription required Medium CVE-2024-28834 CVE-2024-28835 USN-6734-2 -- libvirt vulnerabilities Ubuntu 24.04 LTS USN-6734-1 fixed vulnerabilities in libvirt. This update provides the corresponding updates for Ubuntu 24.04 LTS. Original advisory details: Alexander Kuznetsov discovered that libvirt incorrectly handled certain API calls. An attacker could possibly use this issue to cause libvirt to crash, resulting in a denial of service. (CVE-2024-1441) It was discovered that libvirt incorrectly handled certain RPC library API calls. An attacker could possibly use this issue to cause libvirt to crash, resulting in a denial of service. (CVE-2024-2494) Update Instructions: Run `sudo pro fix USN-6734-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libvirt-clients-qemu - 10.0.0-2ubuntu8.1 libvirt-dev - 10.0.0-2ubuntu8.1 libvirt-wireshark - 10.0.0-2ubuntu8.1 libvirt-daemon-driver-qemu - 10.0.0-2ubuntu8.1 libvirt-login-shell - 10.0.0-2ubuntu8.1 libvirt-daemon-system-sysv - 10.0.0-2ubuntu8.1 libvirt-daemon-driver-lxc - 10.0.0-2ubuntu8.1 libnss-libvirt - 10.0.0-2ubuntu8.1 libvirt-daemon - 10.0.0-2ubuntu8.1 libvirt-daemon-config-nwfilter - 10.0.0-2ubuntu8.1 libvirt-daemon-driver-storage-iscsi-direct - 10.0.0-2ubuntu8.1 libvirt-daemon-config-network - 10.0.0-2ubuntu8.1 libvirt-l10n - 10.0.0-2ubuntu8.1 libvirt-clients - 10.0.0-2ubuntu8.1 libvirt-daemon-driver-storage-zfs - 10.0.0-2ubuntu8.1 libvirt-daemon-driver-xen - 10.0.0-2ubuntu8.1 libvirt-daemon-driver-vbox - 10.0.0-2ubuntu8.1 libvirt-daemon-driver-storage-gluster - 10.0.0-2ubuntu8.1 libvirt-daemon-system - 10.0.0-2ubuntu8.1 libvirt0 - 10.0.0-2ubuntu8.1 libvirt-daemon-system-systemd - 10.0.0-2ubuntu8.1 libvirt-sanlock - 10.0.0-2ubuntu8.1 libvirt-daemon-driver-storage-rbd - 10.0.0-2ubuntu8.1 libvirt-doc - 10.0.0-2ubuntu8.1 No subscription required Medium CVE-2024-1441 CVE-2024-2494 USN-6736-2 -- klibc vulnerabilities Ubuntu 24.04 LTS USN-6736-1 fixed vulnerabilities in klibc. This update provides the corresponding updates for Ubuntu 24.04 LTS. Original advisory details: It was discovered that zlib, vendored in klibc, incorrectly handled pointer arithmetic. An attacker could use this issue to cause klibc to crash or to possibly execute arbitrary code. (CVE-2016-9840, CVE-2016-9841) Danilo Ramos discovered that zlib, vendored in klibc, incorrectly handled memory when performing certain deflating operations. An attacker could use this issue to cause klibc to crash or to possibly execute arbitrary code. (CVE-2018-25032) Evgeny Legerov discovered that zlib, vendored in klibc, incorrectly handled memory when performing certain inflate operations. An attacker could use this issue to cause klibc to crash or to possibly execute arbitrary code. (CVE-2022-37434) Update Instructions: Run `sudo pro fix USN-6736-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: klibc-utils - 2.0.13-4ubuntu0.1 libklibc - 2.0.13-4ubuntu0.1 libklibc-dev - 2.0.13-4ubuntu0.1 No subscription required Medium CVE-2016-9840 CVE-2016-9841 CVE-2018-25032 CVE-2022-37434 USN-6737-2 -- GNU C Library vulnerability Ubuntu 24.04 LTS USN-6737-1 fixed a vulnerability in the GNU C Library. This update provides the corresponding update for Ubuntu 24.04 LTS. Original advisory details: Charles Fol discovered that the GNU C Library iconv feature incorrectly handled certain input sequences. An attacker could use this issue to cause the GNU C Library to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6737-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libc-bin - 2.39-0ubuntu8.1 glibc-doc - 2.39-0ubuntu8.1 locales-all - 2.39-0ubuntu8.1 libc6-i386 - 2.39-0ubuntu8.1 libc6-s390 - 2.39-0ubuntu8.1 libc6-dev-i386 - 2.39-0ubuntu8.1 libc6-dev-s390 - 2.39-0ubuntu8.1 libc6-dev - 2.39-0ubuntu8.1 libc6-amd64 - 2.39-0ubuntu8.1 libc6-x32 - 2.39-0ubuntu8.1 libc6-dev-amd64 - 2.39-0ubuntu8.1 libc-dev-bin - 2.39-0ubuntu8.1 libc6 - 2.39-0ubuntu8.1 nscd - 2.39-0ubuntu8.1 libc-devtools - 2.39-0ubuntu8.1 glibc-source - 2.39-0ubuntu8.1 libc6-dev-x32 - 2.39-0ubuntu8.1 locales - 2.39-0ubuntu8.1 No subscription required Medium CVE-2024-2961 USN-6744-3 -- Pillow vulnerability Ubuntu 24.04 LTS USN-6744-1 fixed a vulnerability in Pillow. This update provides the corresponding updates for Ubuntu 24.04 LTS. Original advisory details: Hugo van Kemenade discovered that Pillow was not properly performing bounds checks when processing an ICC file, which could lead to a buffer overflow. If a user or automated system were tricked into processing a specially crafted ICC file, an attacker could possibly use this issue to cause a denial of service or execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6744-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-pil.imagetk - 10.2.0-1ubuntu1 python-pil-doc - 10.2.0-1ubuntu1 python3-pil - 10.2.0-1ubuntu1 No subscription required Medium CVE-2024-28219 USN-6746-2 -- Google Guest Agent and Google OS Config Agent vulnerability Ubuntu 24.04 LTS USN-6746-1 fixed vulnerabilities in Google Guest Agent and Google OS Config Agent. This update provides the corresponding update for Ubuntu 24.04 LTS. Original advisory details: It was discovered that Google Guest Agent and Google OS Config Agent incorrectly handled certain JSON files. An attacker could possibly use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-6746-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: google-guest-agent - 20240213.00-0ubuntu3.1 No subscription required google-osconfig-agent - 20240320.00-0ubuntu1~24.04.1 No subscription required Medium CVE-2024-24786 USN-6754-2 -- nghttp2 vulnerability Ubuntu 24.04 LTS USN-6754-1 fixed vulnerabilities in nghttp2. This update provides the corresponding update for Ubuntu 24.04 LTS. Original advisory details: It was discovered that nghttp2 incorrectly handled the HTTP/2 implementation. A remote attacker could possibly use this issue to cause nghttp2 to consume resources, leading to a denial of service. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2019-9511, CVE-2019-9513) It was discovered that nghttp2 incorrectly handled request cancellation. A remote attacker could possibly use this issue to cause nghttp2 to consume resources, leading to a denial of service. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2023-44487) It was discovered that nghttp2 could be made to process an unlimited number of HTTP/2 CONTINUATION frames. A remote attacker could possibly use this issue to cause nghttp2 to consume resources, leading to a denial of service. (CVE-2024-28182) Update Instructions: Run `sudo pro fix USN-6754-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libnghttp2-14 - 1.59.0-1ubuntu0.1 libnghttp2-doc - 1.59.0-1ubuntu0.1 libnghttp2-dev - 1.59.0-1ubuntu0.1 nghttp2-proxy - 1.59.0-1ubuntu0.1 nghttp2 - 1.59.0-1ubuntu0.1 nghttp2-client - 1.59.0-1ubuntu0.1 nghttp2-server - 1.59.0-1ubuntu0.1 No subscription required Medium CVE-2024-28182 USN-6756-1 -- less vulnerability Ubuntu 24.04 LTS It was discovered that less mishandled newline characters in file names. If a user or automated system were tricked into opening specially crafted files, an attacker could possibly use this issue to execute arbitrary commands on the host. Update Instructions: Run `sudo pro fix USN-6756-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: less - 590-2ubuntu2.1 No subscription required Medium CVE-2024-32487 USN-6759-1 -- FreeRDP vulnerabilities Ubuntu 24.04 LTS It was discovered that FreeRDP incorrectly handled certain memory operations. If a user were tricked into connecting to a malicious server, a remote attacker could possibly use this issue to cause FreeRDP to crash, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-6759-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libwinpr3-dev - 3.5.1+dfsg1-0ubuntu1 libfreerdp-server3-3 - 3.5.1+dfsg1-0ubuntu1 winpr3-utils - 3.5.1+dfsg1-0ubuntu1 libfreerdp-shadow3-3 - 3.5.1+dfsg1-0ubuntu1 freerdp3-dev - 3.5.1+dfsg1-0ubuntu1 freerdp3-shadow-x11 - 3.5.1+dfsg1-0ubuntu1 libfreerdp3-3 - 3.5.1+dfsg1-0ubuntu1 libfreerdp-client3-3 - 3.5.1+dfsg1-0ubuntu1 freerdp3-wayland - 3.5.1+dfsg1-0ubuntu1 libwinpr-tools3-3 - 3.5.1+dfsg1-0ubuntu1 libfreerdp-shadow-subsystem3-3 - 3.5.1+dfsg1-0ubuntu1 freerdp3-x11 - 3.5.1+dfsg1-0ubuntu1 libwinpr3-3 - 3.5.1+dfsg1-0ubuntu1 No subscription required Medium CVE-2024-32658 CVE-2024-32659 CVE-2024-32660 CVE-2024-32661 CVE-2024-32662 USN-6761-1 -- Anope vulnerability Ubuntu 24.04 LTS It was discovered that Anope did not properly process credentials for suspended accounts. An attacker could possibly use this issue to normally login to the platform as a suspended user after changing their password. Update Instructions: Run `sudo pro fix USN-6761-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: anope - 2.0.12-1ubuntu1 No subscription required Medium CVE-2024-30187 USN-6763-1 -- libvirt vulnerability Ubuntu 24.04 LTS Martin Širokov discovered that libvirt incorrectly handled certain memory operations. A local attacker could possibly use this issue to access virtproxyd without authorization. Update Instructions: Run `sudo pro fix USN-6763-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libvirt-clients-qemu - 10.0.0-2ubuntu8.2 libvirt-dev - 10.0.0-2ubuntu8.2 libvirt-wireshark - 10.0.0-2ubuntu8.2 libvirt-daemon-driver-qemu - 10.0.0-2ubuntu8.2 libvirt-login-shell - 10.0.0-2ubuntu8.2 libvirt-daemon-system-sysv - 10.0.0-2ubuntu8.2 libvirt-daemon-driver-lxc - 10.0.0-2ubuntu8.2 libnss-libvirt - 10.0.0-2ubuntu8.2 libvirt-daemon - 10.0.0-2ubuntu8.2 libvirt-daemon-config-nwfilter - 10.0.0-2ubuntu8.2 libvirt-daemon-driver-storage-iscsi-direct - 10.0.0-2ubuntu8.2 libvirt-daemon-config-network - 10.0.0-2ubuntu8.2 libvirt-l10n - 10.0.0-2ubuntu8.2 libvirt-clients - 10.0.0-2ubuntu8.2 libvirt-daemon-driver-storage-zfs - 10.0.0-2ubuntu8.2 libvirt-daemon-driver-xen - 10.0.0-2ubuntu8.2 libvirt-daemon-driver-vbox - 10.0.0-2ubuntu8.2 libvirt-daemon-driver-storage-gluster - 10.0.0-2ubuntu8.2 libvirt-daemon-system - 10.0.0-2ubuntu8.2 libvirt0 - 10.0.0-2ubuntu8.2 libvirt-daemon-system-systemd - 10.0.0-2ubuntu8.2 libvirt-sanlock - 10.0.0-2ubuntu8.2 libvirt-daemon-driver-storage-rbd - 10.0.0-2ubuntu8.2 libvirt-doc - 10.0.0-2ubuntu8.2 No subscription required Medium CVE-2024-4418 USN-6768-1 -- GLib vulnerability Ubuntu 24.04 LTS Alicia Boya García discovered that GLib incorrectly handled signal subscriptions. A local attacker could use this issue to spoof D-Bus signals resulting in a variety of impacts including possible privilege escalation. Update Instructions: Run `sudo pro fix USN-6768-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-glib-2.0 - 2.80.0-6ubuntu3.1 libgirepository-2.0-dev - 2.80.0-6ubuntu3.1 gir1.2-girepository-3.0-dev - 2.80.0-6ubuntu3.1 libglib2.0-0t64 - 2.80.0-6ubuntu3.1 libglib2.0-tests - 2.80.0-6ubuntu3.1 gir1.2-glib-2.0-dev - 2.80.0-6ubuntu3.1 libgirepository-2.0-0 - 2.80.0-6ubuntu3.1 gir1.2-girepository-3.0 - 2.80.0-6ubuntu3.1 libglib2.0-data - 2.80.0-6ubuntu3.1 libglib2.0-doc - 2.80.0-6ubuntu3.1 libglib2.0-bin - 2.80.0-6ubuntu3.1 libglib2.0-dev - 2.80.0-6ubuntu3.1 libglib2.0-dev-bin - 2.80.0-6ubuntu3.1 No subscription required Medium CVE-2024-34397 USN-6770-1 -- Fossil regression Ubuntu 24.04 LTS USN-6729-1 fixed vulnerabilities in Apache HTTP Server. The update lead to the discovery of a regression in Fossil with regards to the handling of POST requests that do not have a Content-Length field set. This update fixes the problem. We apologize for the inconvenience. Update Instructions: Run `sudo pro fix USN-6770-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: fossil - 1:2.23-1ubuntu0.1 No subscription required None https://launchpad.net/bugs/2064509 USN-6771-1 -- SQL parse vulnerability Ubuntu 24.04 LTS It was discovered that SQL parse incorrectly handled certain nested lists. An attacker could possibly use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-6771-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-sqlparse-doc - 0.4.4-1ubuntu0.1 python3-sqlparse - 0.4.4-1ubuntu0.1 sqlformat - 0.4.4-1ubuntu0.1 No subscription required Medium CVE-2024-4340 USN-6773-1 -- .NET vulnerabilities Ubuntu 24.04 LTS It was discovered that .NET did not properly handle memory in it's Double Parse routine. An attacker could possibly use this issue to achieve remote code execution. (CVE-2024-30045) It was discovered that .NET did not properly handle the usage of a shared resource. An attacker could possibly use this to cause a dead-lock condition, resulting in a denial of service. (CVE-2024-30046) Update Instructions: Run `sudo pro fix USN-6773-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: dotnet-sdk-8.0 - 8.0.105-0ubuntu1~24.04.1 netstandard-targeting-pack-2.1-8.0 - 8.0.105-0ubuntu1~24.04.1 dotnet-sdk-8.0-source-built-artifacts - 8.0.105-0ubuntu1~24.04.1 dotnet-sdk-dbg-8.0 - 8.0.105-0ubuntu1~24.04.1 dotnet-templates-8.0 - 8.0.105-0ubuntu1~24.04.1 No subscription required dotnet8 - 8.0.105-8.0.5-0ubuntu1~24.04.1 No subscription required aspnetcore-runtime-8.0 - 8.0.5-0ubuntu1~24.04.1 dotnet-apphost-pack-8.0 - 8.0.5-0ubuntu1~24.04.1 dotnet-hostfxr-8.0 - 8.0.5-0ubuntu1~24.04.1 aspnetcore-runtime-dbg-8.0 - 8.0.5-0ubuntu1~24.04.1 dotnet-runtime-dbg-8.0 - 8.0.5-0ubuntu1~24.04.1 dotnet-runtime-8.0 - 8.0.5-0ubuntu1~24.04.1 dotnet-host-8.0 - 8.0.5-0ubuntu1~24.04.1 aspnetcore-targeting-pack-8.0 - 8.0.5-0ubuntu1~24.04.1 dotnet-targeting-pack-8.0 - 8.0.5-0ubuntu1~24.04.1 No subscription required Medium CVE-2024-30045 CVE-2024-30046 USN-6780-1 -- idna vulnerability Ubuntu 24.04 LTS Guido Vranken discovered that idna did not properly manage certain inputs, which could lead to significant resource consumption. An attacker could possibly use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-6780-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-idna - 3.6-2ubuntu0.1 No subscription required Medium CVE-2024-3651 USN-6784-1 -- cJSON vulnerabilities Ubuntu 24.04 LTS It was discovered that cJSON incorrectly handled certain input. An attacker could possibly use this issue to cause cJSON to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 23.10. (CVE-2023-50471, CVE-2023-50472) Luo Jin discovered that cJSON incorrectly handled certain input. An attacker could possibly use this issue to cause cJSON to crash, resulting in a denial of service. (CVE-2024-31755) Update Instructions: Run `sudo pro fix USN-6784-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libcjson-dev - 1.7.17-1ubuntu0.1~esm2 libcjson1 - 1.7.17-1ubuntu0.1~esm2 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2023-50471 CVE-2023-50472 CVE-2024-31755 USN-6785-1 -- GNOME Remote Desktop vulnerability Ubuntu 24.04 LTS Matthias Gerstner discovered that GNOME Remote Desktop incorrectly performed certain user validation checks. A local attacker could possibly use this issue to obtain sensitive information, or take control of remote desktop connections. Update Instructions: Run `sudo pro fix USN-6785-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gnome-remote-desktop - 46.2-1~ubuntu24.04.2 No subscription required Medium CVE-2024-5148 USN-6787-1 -- Jinja2 vulnerability Ubuntu 24.04 LTS It was discovered that Jinja2 incorrectly handled certain HTML attributes that were accepted by the xmlattr filter. An attacker could use this issue to inject arbitrary HTML attribute keys and values to potentially execute a cross-site scripting (XSS) attack. Update Instructions: Run `sudo pro fix USN-6787-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-jinja2-doc - 3.1.2-1ubuntu1.1 python3-jinja2 - 3.1.2-1ubuntu1.1 No subscription required Medium CVE-2024-34064 USN-6788-1 -- WebKitGTK vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the WebKitGTK Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution. Update Instructions: Run `sudo pro fix USN-6788-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-javascriptcoregtk-4.1 - 2.44.2-0ubuntu0.24.04.1 libjavascriptcoregtk-6.0-1 - 2.44.2-0ubuntu0.24.04.1 libjavascriptcoregtk-bin - 2.44.2-0ubuntu0.24.04.1 libwebkitgtk-doc - 2.44.2-0ubuntu0.24.04.1 gir1.2-webkit2-4.1 - 2.44.2-0ubuntu0.24.04.1 libwebkitgtk-6.0-dev - 2.44.2-0ubuntu0.24.04.1 libjavascriptcoregtk-4.1-0 - 2.44.2-0ubuntu0.24.04.1 libwebkit2gtk-4.1-0 - 2.44.2-0ubuntu0.24.04.1 libwebkit2gtk-4.1-dev - 2.44.2-0ubuntu0.24.04.1 libwebkit2gtk-4.0-doc - 2.44.2-0ubuntu0.24.04.1 libjavascriptcoregtk-4.1-dev - 2.44.2-0ubuntu0.24.04.1 libjavascriptcoregtk-6.0-dev - 2.44.2-0ubuntu0.24.04.1 gir1.2-javascriptcoregtk-6.0 - 2.44.2-0ubuntu0.24.04.1 webkit2gtk-driver - 2.44.2-0ubuntu0.24.04.1 libjavascriptcoregtk-4.0-bin - 2.44.2-0ubuntu0.24.04.1 libwebkitgtk-6.0-4 - 2.44.2-0ubuntu0.24.04.1 gir1.2-webkit-6.0 - 2.44.2-0ubuntu0.24.04.1 No subscription required Medium CVE-2024-27834 USN-6789-1 -- LibreOffice vulnerability Ubuntu 24.04 LTS Amel Bouziane-Leblond discovered that LibreOffice incorrectly handled graphic on-click bindings. If a user were tricked into clicking a graphic in a specially crafted document, a remote attacker could possibly run arbitrary script. Update Instructions: Run `sudo pro fix USN-6789-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libreoffice-nlpsolver - 4:0.9+LibO24.2.3-0ubuntu0.24.04.2 No subscription required libreoffice-wiki-publisher - 4:1.2.0+LibO24.2.3-0ubuntu0.24.04.2 No subscription required fonts-opensymbol - 4:102.12+LibO24.2.3-0ubuntu0.24.04.2 No subscription required libreoffice-evolution - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-en-gb - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-librelogo - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ml - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-zh-cn - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-subsequentcheckbase - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-mk - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-id - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-mr - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-style-tango - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-pt-br - 4:24.2.3-0ubuntu0.24.04.2 libreofficekit-data - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-core - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-it - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-uk - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-fr - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-gnome - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-fi - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-nl - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-uiconfig-math - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-uz - 4:24.2.3-0ubuntu0.24.04.2 libreoffice - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-sdbc-mysql - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-nb - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-mn - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ne - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-nl - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-uiconfig-writer - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-nn - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-fi - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-dz - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-nr - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-fr - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-report-builder-bin - 4:24.2.3-0ubuntu0.24.04.2 libofficebean-java - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-qt6 - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-vi - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-nso - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-qt5 - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-nogui - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-math-nogui - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-style-karasa-jaga - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ve - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-gu - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-om - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-gl - 4:24.2.3-0ubuntu0.24.04.2 python3-access2base - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-en-us - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ga - 4:24.2.3-0ubuntu0.24.04.2 libuno-cppu3t64 - 4:24.2.3-0ubuntu0.24.04.2 liblibreofficekitgtk - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-gd - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-km - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-kn - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-ko - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-st - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-dev-common - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-sr - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-cs - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ts - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-sv - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-script-provider-bsh - 4:24.2.3-0ubuntu0.24.04.2 gir1.2-lokdocview-0.1 - 4:24.2.3-0ubuntu0.24.04.2 ure-java - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-report-builder-bin-nogui - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ka - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-uiconfig-common - 4:24.2.3-0ubuntu0.24.04.2 libridl-java - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-ca - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-zh-tw - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-sl - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-sk - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-style-breeze - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-si - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-da - 4:24.2.3-0ubuntu0.24.04.2 libreofficekit-dev - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-de - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-common - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-pl - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-pa-in - 4:24.2.3-0ubuntu0.24.04.2 libuno-purpenvhelpergcc3-3t64 - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-uiconfig-report-builder - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-pt - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-base-nogui - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-gtk3 - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-math - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-vi - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-gtk4 - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-tr - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-hi - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-gug - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-sdbc-hsqldb - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-draw-nogui - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-calc - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-base-drivers - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-style-colibre - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ta - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-sdbc-firebird - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-tg - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-te - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-th - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-id - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-lv - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-hu - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-lt - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ss - 4:24.2.3-0ubuntu0.24.04.2 libunoloader-java - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-uiconfig-impress - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-eu - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-et - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-script-provider-js - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-es - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-el - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-eo - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-style-sifr - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-zh-cn - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ug - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-smoketest-data - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ko - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-zu - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-impress - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-java-common - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-eu - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-et - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-es - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-km - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-uiconfig-draw - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-el - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-uiconfig-calc - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-kk - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-dev-gui - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-be - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-szl - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-bg - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-tn - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-bn - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-plasma - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-ja - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-br - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-bs - 4:24.2.3-0ubuntu0.24.04.2 liblibreoffice-java - 4:24.2.3-0ubuntu0.24.04.2 libunoil-java - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-style-yaru - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-base-core - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-ru - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ru - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-rw - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-is - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-style-elementary - 4:24.2.3-0ubuntu0.24.04.2 python3-uno - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-fa - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-am - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ro - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-en-za - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-style-sukapura - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ca - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-sl - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-calc-nogui - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-sk - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-sv - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-cs - 4:24.2.3-0ubuntu0.24.04.2 python3-scriptforge - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-dev-doc - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-common - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-za - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-cy - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-oc - 4:24.2.3-0ubuntu0.24.04.2 libjurt-java - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-base - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-gl - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-om - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-or - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-pt-br - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-kmr - 4:24.2.3-0ubuntu0.24.04.2 uno-libs-private - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ast - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-hu - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-hr - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-script-provider-python - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-writer-nogui - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-hy - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-he - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-officebean - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-dev - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-report-builder - 4:24.2.3-0ubuntu0.24.04.2 libuno-sal3t64 - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-tr - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-hi - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-kf5 - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-dz - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-pt - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ja - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-pl - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-sdbc-postgresql - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-writer - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-de - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-da - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-uiconfig-base - 4:24.2.3-0ubuntu0.24.04.2 ure - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-impress-nogui - 4:24.2.3-0ubuntu0.24.04.2 libjuh-java - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-it - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-xh - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-af - 4:24.2.3-0ubuntu0.24.04.2 libuno-cppuhelpergcc3-3t64 - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-zh-tw - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-en-gb - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-draw - 4:24.2.3-0ubuntu0.24.04.2 libuno-salhelpergcc3-3t64 - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-core-nogui - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-as - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ar - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-in - 4:24.2.3-0ubuntu0.24.04.2 No subscription required Medium CVE-2024-3044 USN-6790-1 -- amavisd-new vulnerability Ubuntu 24.04 LTS It was discovered that amavisd-new incorrectly handled certain MIME email messages with multiple boundary parameters. A remote attacker could possibly use this issue to bypass checks for banned files or malware. Update Instructions: Run `sudo pro fix USN-6790-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: amavisd-new-postfix - 1:2.13.0-3ubuntu2 amavisd-new - 1:2.13.0-3ubuntu2 No subscription required Medium CVE-2024-28054 USN-6791-1 -- Unbound vulnerability Ubuntu 24.04 LTS It was discovered that Unbound could take part in a denial of service amplification attack known as DNSBomb. This update introduces certain resource limits to make the impact from Unbound significantly lower. Update Instructions: Run `sudo pro fix USN-6791-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: unbound - 1.19.2-1ubuntu3.1 python3-unbound - 1.19.2-1ubuntu3.1 libunbound8 - 1.19.2-1ubuntu3.1 unbound-anchor - 1.19.2-1ubuntu3.1 unbound-host - 1.19.2-1ubuntu3.1 libunbound-dev - 1.19.2-1ubuntu3.1 No subscription required Low CVE-2024-33655 USN-6793-1 -- Git vulnerabilities Ubuntu 24.04 LTS It was discovered that Git incorrectly handled certain submodules. An attacker could possibly use this issue to execute arbitrary code. This issue was fixed in Ubuntu 22.04 LTS, Ubuntu 23.10 and Ubuntu 24.04 LTS. (CVE-2024-32002) It was discovered that Git incorrectly handled certain cloned repositories. An attacker could possibly use this issue to execute arbitrary code. (CVE-2024-32004) It was discovered that Git incorrectly handled local clones with hardlinked files/directories. An attacker could possibly use this issue to place a specialized repository on their target's local system. (CVE-2024-32020) It was discovered that Git incorrectly handled certain symlinks. An attacker could possibly use this issue to impact availability and integrity creating hardlinked arbitrary files into users repository's objects/directory. (CVE-2024-32021) It was discovered that Git incorrectly handled certain cloned repositories. An attacker could possibly use this issue to execute arbitrary code. (CVE-2024-32465) Update Instructions: Run `sudo pro fix USN-6793-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: git - 1:2.43.0-1ubuntu7.1 gitweb - 1:2.43.0-1ubuntu7.1 git-gui - 1:2.43.0-1ubuntu7.1 git-daemon-sysvinit - 1:2.43.0-1ubuntu7.1 gitk - 1:2.43.0-1ubuntu7.1 git-all - 1:2.43.0-1ubuntu7.1 git-mediawiki - 1:2.43.0-1ubuntu7.1 git-daemon-run - 1:2.43.0-1ubuntu7.1 git-man - 1:2.43.0-1ubuntu7.1 git-doc - 1:2.43.0-1ubuntu7.1 git-svn - 1:2.43.0-1ubuntu7.1 git-cvs - 1:2.43.0-1ubuntu7.1 git-email - 1:2.43.0-1ubuntu7.1 No subscription required Medium CVE-2024-32002 CVE-2024-32004 CVE-2024-32020 CVE-2024-32021 CVE-2024-32465 USN-6794-1 -- FRR vulnerabilities Ubuntu 24.04 LTS It was discovered that FRR incorrectly handled certain malformed BGP and OSPF packets. A remote attacker could use this issue to cause FRR to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6794-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: frr - 8.4.4-1.1ubuntu6.1 frr-rpki-rtrlib - 8.4.4-1.1ubuntu6.1 frr-snmp - 8.4.4-1.1ubuntu6.1 frr-doc - 8.4.4-1.1ubuntu6.1 frr-pythontools - 8.4.4-1.1ubuntu6.1 No subscription required Medium CVE-2024-31948 CVE-2024-31950 CVE-2024-31951 CVE-2024-34088 USN-6796-1 -- TPM2 Software Stack vulnerabilities Ubuntu 24.04 LTS Fergus Dall discovered that TPM2 Software Stack did not properly handle layer arrays. An attacker could possibly use this issue to cause TPM2 Software Stack to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2023-22745) Jurgen Repp and Andreas Fuchs discovered that TPM2 Software Stack did not validate the quote data after deserialization. An attacker could generate an arbitrary quote and cause TPM2 Software Stack to have unknown behavior. (CVE-2024-29040) Update Instructions: Run `sudo pro fix USN-6796-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libtss2-esys-3.0.2-0t64 - 4.0.1-7.1ubuntu5.1 libtss2-sys1t64 - 4.0.1-7.1ubuntu5.1 libtss2-mu-4.0.1-0t64 - 4.0.1-7.1ubuntu5.1 libtss2-tcti-spi-helper0t64 - 4.0.1-7.1ubuntu5.1 libtss2-tcti-libtpms0t64 - 4.0.1-7.1ubuntu5.1 libtss2-doc - 4.0.1-7.1ubuntu5.1 libtss2-tcti-swtpm0t64 - 4.0.1-7.1ubuntu5.1 libtss2-tcti-device0t64 - 4.0.1-7.1ubuntu5.1 libtss2-rc0t64 - 4.0.1-7.1ubuntu5.1 libtss2-fapi1t64 - 4.0.1-7.1ubuntu5.1 libtss2-tcti-mssim0t64 - 4.0.1-7.1ubuntu5.1 libtss2-policy0t64 - 4.0.1-7.1ubuntu5.1 libtss2-tcti-pcap0t64 - 4.0.1-7.1ubuntu5.1 libtss2-tctildr0t64 - 4.0.1-7.1ubuntu5.1 libtss2-dev - 4.0.1-7.1ubuntu5.1 libtss2-tcti-cmd0t64 - 4.0.1-7.1ubuntu5.1 No subscription required Medium CVE-2023-22745 CVE-2024-29040 USN-6797-1 -- Intel Microcode vulnerabilities Ubuntu 24.04 LTS It was discovered that some 3rd and 4th Generation Intel® Xeon® Processors did not properly restrict access to certain hardware features when using Intel® SGX or Intel® TDX. This may allow a privileged local user to potentially further escalate their privileges on the system. This issue only affected Ubuntu 23.10, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 LTS and Ubuntu 16.04 LTS. (CVE-2023-22655) It was discovered that some Intel® Atom® Processors did not properly clear register state when performing various operations. A local attacker could use this to obtain sensitive information via a transient execution attack. This issue only affected Ubuntu 23.10, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 LTS and Ubuntu 16.04 LTS. (CVE-2023-28746) It was discovered that some Intel® Processors did not properly clear the state of various hardware structures when switching execution contexts. A local attacker could use this to access privileged information. This issue only affected Ubuntu 23.10, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 LTS and Ubuntu 16.04 LTS. (CVE-2023-38575) It was discovered that some Intel® Processors did not properly enforce bus lock regulator protections. A remote attacker could use this to cause a denial of service. This issue only affected Ubuntu 23.10, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 LTS and Ubuntu 16.04 LTS. (CVE-2023-39368) It was discovered that some Intel® Xeon® D Processors did not properly calculate the SGX base key when using Intel® SGX. A privileged local attacker could use this to obtain sensitive information. This issue only affected Ubuntu 23.10, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 LTS and Ubuntu 16.04 LTS. (CVE-2023-43490) It was discovered that some Intel® Processors did not properly protect against concurrent accesses. A local attacker could use this to obtain sensitive information. (CVE-2023-45733) It was discovered that some Intel® Processors TDX module software did not properly validate input. A privileged local attacker could use this information to potentially further escalate their privileges on the system. (CVE-2023-45745, CVE-2023-47855) It was discovered that some Intel® Core™ Ultra processors did not properly handle particular instruction sequences. A local attacker could use this issue to cause a denial of service. (CVE-2023-46103) Update Instructions: Run `sudo pro fix USN-6797-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: intel-microcode - 3.20240514.0ubuntu0.24.04.1 No subscription required Medium CVE-2023-22655 CVE-2023-28746 CVE-2023-38575 CVE-2023-39368 CVE-2023-43490 CVE-2023-45733 CVE-2023-45745 CVE-2023-46103 CVE-2023-47855 USN-6798-1 -- GStreamer Base Plugins vulnerability Ubuntu 24.04 LTS It was discovered that GStreamer Base Plugins incorrectly handled certain EXIF metadata. An attacker could possibly use this issue to execute arbitrary code or cause a crash. Update Instructions: Run `sudo pro fix USN-6798-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gstreamer1.0-plugins-base - 1.24.2-1ubuntu0.1 libgstreamer-plugins-base1.0-0 - 1.24.2-1ubuntu0.1 gstreamer1.0-x - 1.24.2-1ubuntu0.1 libgstreamer-gl1.0-0 - 1.24.2-1ubuntu0.1 gstreamer1.0-gl - 1.24.2-1ubuntu0.1 libgstreamer-plugins-base1.0-dev - 1.24.2-1ubuntu0.1 gir1.2-gst-plugins-base-1.0 - 1.24.2-1ubuntu0.1 gstreamer1.0-alsa - 1.24.2-1ubuntu0.1 gstreamer1.0-plugins-base-apps - 1.24.2-1ubuntu0.1 No subscription required Medium CVE-2024-4453 USN-6799-1 -- Werkzeug vulnerability Ubuntu 24.04 LTS It was discovered that the debugger in Werkzeug was not restricted to trusted hosts. A remote attacker could possibly use this issue to execute code on the host under certain circumstances. Update Instructions: Run `sudo pro fix USN-6799-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-werkzeug - 3.0.1-3ubuntu0.1 python-werkzeug-doc - 3.0.1-3ubuntu0.1 No subscription required Medium CVE-2024-34069 USN-6801-1 -- PyMySQL vulnerability Ubuntu 24.04 LTS It was discovered that PyMySQL incorrectly escaped untrusted JSON input. An attacker could possibly use this issue to perform SQL injection attacks. Update Instructions: Run `sudo pro fix USN-6801-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-pymysql - 1.0.2-2ubuntu1.1 python-pymysql-doc - 1.0.2-2ubuntu1.1 No subscription required Medium CVE-2024-36039 USN-6802-1 -- PostgreSQL vulnerability Ubuntu 24.04 LTS Lukas Fittl discovered that PostgreSQL incorrectly performed authorization in the built-in pg_stats_ext and pg_stats_ext_exprs views. An unprivileged database user can use this issue to read most common values and other statistics from CREATE STATISTICS commands of other users. NOTE: This update will only fix fresh PostgreSQL installations. Current PostgreSQL installations will remain vulnerable to this issue until manual steps are performed. Please see the instructions in the changelog located at /usr/share/doc/postgresql-*/changelog.Debian.gz after the updated packages have been installed, or in the PostgreSQL release notes located here: https://www.postgresql.org/docs/16/release-16-3.html https://www.postgresql.org/docs/15/release-15-7.html https://www.postgresql.org/docs/14/release-14-12.html Update Instructions: Run `sudo pro fix USN-6802-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: postgresql-server-dev-16 - 16.3-0ubuntu0.24.04.1 libecpg6 - 16.3-0ubuntu0.24.04.1 postgresql-pltcl-16 - 16.3-0ubuntu0.24.04.1 libpq-dev - 16.3-0ubuntu0.24.04.1 postgresql-16 - 16.3-0ubuntu0.24.04.1 libpgtypes3 - 16.3-0ubuntu0.24.04.1 libecpg-dev - 16.3-0ubuntu0.24.04.1 postgresql-plperl-16 - 16.3-0ubuntu0.24.04.1 libpq5 - 16.3-0ubuntu0.24.04.1 postgresql-client-16 - 16.3-0ubuntu0.24.04.1 postgresql-doc-16 - 16.3-0ubuntu0.24.04.1 postgresql-plpython3-16 - 16.3-0ubuntu0.24.04.1 libecpg-compat3 - 16.3-0ubuntu0.24.04.1 No subscription required Medium CVE-2024-4317 USN-6803-1 -- FFmpeg vulnerabilities Ubuntu 24.04 LTS Zeng Yunxiang and Song Jiaxuan discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 24.04 LTS. (CVE-2023-49501) Zeng Yunxiang and Song Jiaxuan discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 23.10 and Ubuntu 24.04 LTS. (CVE-2023-49502) Zhang Ling and Zeng Yunxiang discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 23.10 and Ubuntu 24.04 LTS. (CVE-2023-49528) Zeng Yunxiang discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 23.10 and Ubuntu 24.04 LTS. (CVE-2023-50007) Zeng Yunxiang and Song Jiaxuan discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 23.10 and Ubuntu 24.04 LTS. (CVE-2023-50008) Zeng Yunxiang discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 23.10. (CVE-2023-50009) Zeng Yunxiang discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu 23.10. (CVE-2023-50010) Zeng Yunxiang and Li Zeyuan discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 22.04 LTS and Ubuntu 23.10. (CVE-2023-51793) Zeng Yunxiang discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu 23.10. (CVE-2023-51794, CVE-2023-51798) Zeng Yunxiang discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 23.10. (CVE-2023-51795, CVE-2023-51796) It was discovered that discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 23.10 and Ubuntu 24.04 LTS. (CVE-2024-31578) It was discovered that discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 23.10 and Ubuntu 24.04 LTS. (CVE-2024-31582) It was discovered that discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 23.10. (CVE-2024-31585) Update Instructions: Run `sudo pro fix USN-6803-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ffmpeg - 7:6.1.1-3ubuntu5+esm1 ffmpeg-doc - 7:6.1.1-3ubuntu5+esm1 libavcodec-dev - 7:6.1.1-3ubuntu5+esm1 libavcodec-extra - 7:6.1.1-3ubuntu5+esm1 libavcodec-extra60 - 7:6.1.1-3ubuntu5+esm1 libavcodec60 - 7:6.1.1-3ubuntu5+esm1 libavdevice-dev - 7:6.1.1-3ubuntu5+esm1 libavdevice60 - 7:6.1.1-3ubuntu5+esm1 libavfilter-dev - 7:6.1.1-3ubuntu5+esm1 libavfilter-extra - 7:6.1.1-3ubuntu5+esm1 libavfilter-extra9 - 7:6.1.1-3ubuntu5+esm1 libavfilter9 - 7:6.1.1-3ubuntu5+esm1 libavformat-dev - 7:6.1.1-3ubuntu5+esm1 libavformat-extra - 7:6.1.1-3ubuntu5+esm1 libavformat-extra60 - 7:6.1.1-3ubuntu5+esm1 libavformat60 - 7:6.1.1-3ubuntu5+esm1 libavutil-dev - 7:6.1.1-3ubuntu5+esm1 libavutil58 - 7:6.1.1-3ubuntu5+esm1 libpostproc-dev - 7:6.1.1-3ubuntu5+esm1 libpostproc57 - 7:6.1.1-3ubuntu5+esm1 libswresample-dev - 7:6.1.1-3ubuntu5+esm1 libswresample4 - 7:6.1.1-3ubuntu5+esm1 libswscale-dev - 7:6.1.1-3ubuntu5+esm1 libswscale7 - 7:6.1.1-3ubuntu5+esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2023-49501 CVE-2023-49502 CVE-2023-49528 CVE-2023-50007 CVE-2023-50008 CVE-2023-50009 CVE-2023-50010 CVE-2023-51793 CVE-2023-51794 CVE-2023-51795 CVE-2023-51796 CVE-2023-51798 CVE-2024-31578 CVE-2024-31582 CVE-2024-31585 USN-6804-1 -- GNU C Library vulnerabilities Ubuntu 24.04 LTS It was discovered that GNU C Library nscd daemon contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service (system crash). (CVE-2024-33599) It was discovered that GNU C Library nscd daemon did not properly check the cache content, leading to a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service (system crash). (CVE-2024-33600) It was discovered that GNU C Library nscd daemon did not properly validate memory allocation in certain situations, leading to a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service (system crash). (CVE-2024-33601) It was discovered that GNU C Library nscd daemon did not properly handle memory allocation, which could lead to memory corruption. A local attacker could use this to cause a denial of service (system crash). (CVE-2024-33602) Update Instructions: Run `sudo pro fix USN-6804-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libc-bin - 2.39-0ubuntu8.2 glibc-doc - 2.39-0ubuntu8.2 libc6-i386 - 2.39-0ubuntu8.2 libc6-s390 - 2.39-0ubuntu8.2 libc6-dev-i386 - 2.39-0ubuntu8.2 nscd - 2.39-0ubuntu8.2 libc6-dev-x32 - 2.39-0ubuntu8.2 libc6-dev - 2.39-0ubuntu8.2 libc6-amd64 - 2.39-0ubuntu8.2 libc6-x32 - 2.39-0ubuntu8.2 libc6-dev-amd64 - 2.39-0ubuntu8.2 libc-dev-bin - 2.39-0ubuntu8.2 libc6 - 2.39-0ubuntu8.2 locales-all - 2.39-0ubuntu8.2 libc-devtools - 2.39-0ubuntu8.2 glibc-source - 2.39-0ubuntu8.2 libc6-dev-s390 - 2.39-0ubuntu8.2 locales - 2.39-0ubuntu8.2 No subscription required Medium CVE-2024-33599 CVE-2024-33600 CVE-2024-33601 CVE-2024-33602 USN-6805-1 -- libarchive vulnerability Ubuntu 24.04 LTS It was discovered that libarchive incorrectly handled certain RAR archive files. An attacker could possibly use this issue to execute arbitrary code or cause a crash. Update Instructions: Run `sudo pro fix USN-6805-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libarchive-dev - 3.7.2-2ubuntu0.1 libarchive13t64 - 3.7.2-2ubuntu0.1 libarchive-tools - 3.7.2-2ubuntu0.1 No subscription required Medium CVE-2024-26256 USN-6806-1 -- GDK-PixBuf vulnerability Ubuntu 24.04 LTS Pedro Ribeiro and Vitor Pedreira discovered that the GDK-PixBuf library did not properly handle certain ANI files. An attacker could use this flaw to cause GDK-PixBuf to crash, resulting in a denial of service, or to possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6806-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libgdk-pixbuf-2.0-dev - 2.42.10+dfsg-3ubuntu3.1 gdk-pixbuf-tests - 2.42.10+dfsg-3ubuntu3.1 libgdk-pixbuf2.0-common - 2.42.10+dfsg-3ubuntu3.1 libgdk-pixbuf2.0-bin - 2.42.10+dfsg-3ubuntu3.1 libgdk-pixbuf2.0-doc - 2.42.10+dfsg-3ubuntu3.1 gir1.2-gdkpixbuf-2.0 - 2.42.10+dfsg-3ubuntu3.1 libgdk-pixbuf-2.0-0 - 2.42.10+dfsg-3ubuntu3.1 No subscription required Medium CVE-2022-48622 USN-6810-1 -- OpenJDK 8 vulnerabilities Ubuntu 24.04 LTS It was discovered that the Hotspot component of OpenJDK 8 incorrectly handled certain exceptions with specially crafted long messages. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-21011) Vladimir Kondratyev discovered that the Hotspot component of OpenJDK 8 incorrectly handled address offset calculations in the C1 compiler. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-21068) Yakov Shafranovich discovered that OpenJDK 8 did not properly manage memory in the Pack200 archive format. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-21085) It was discovered that the Hotspot component of OpenJDK 8 incorrectly handled array accesses in the C2 compiler. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-21094) Update Instructions: Run `sudo pro fix USN-6810-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-8-doc - 8u412-ga-1~24.04.2 openjdk-8-jdk - 8u412-ga-1~24.04.2 openjdk-8-jre-headless - 8u412-ga-1~24.04.2 openjdk-8-jre - 8u412-ga-1~24.04.2 openjdk-8-jdk-headless - 8u412-ga-1~24.04.2 openjdk-8-source - 8u412-ga-1~24.04.2 openjdk-8-jre-zero - 8u412-ga-1~24.04.2 openjdk-8-demo - 8u412-ga-1~24.04.2 No subscription required Medium CVE-2024-21011 CVE-2024-21068 CVE-2024-21085 CVE-2024-21094 USN-6814-1 -- libvpx vulnerability Ubuntu 24.04 LTS Xiantong Hou discovered that libvpx did not properly handle certain malformed media files. If an application using libvpx opened a specially crafted file, a remote attacker could cause a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6814-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libvpx-dev - 1.14.0-1ubuntu2.1 libvpx9 - 1.14.0-1ubuntu2.1 libvpx-doc - 1.14.0-1ubuntu2.1 vpx-tools - 1.14.0-1ubuntu2.1 No subscription required Medium CVE-2024-5197 USN-6815-1 -- AOM vulnerability Ubuntu 24.04 LTS Xiantong Hou discovered that AOM did not properly handle certain malformed media files. If an application using AOM opened a specially crafted file, a remote attacker could cause a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6815-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libaom-doc - 3.8.2-2ubuntu0.1 libaom-dev - 3.8.2-2ubuntu0.1 libaom3 - 3.8.2-2ubuntu0.1 aom-tools - 3.8.2-2ubuntu0.1 No subscription required Medium CVE-2024-5171 USN-6816-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Ziming Zhang discovered that the DRM driver for VMware Virtual GPU did not properly handle certain error conditions, leading to a NULL pointer dereference. A local attacker could possibly trigger this vulnerability to cause a denial of service. (CVE-2022-38096) Zheng Wang discovered that the Broadcom FullMAC WLAN driver in the Linux kernel contained a race condition during device removal, leading to a use- after-free vulnerability. A physically proximate attacker could possibly use this to cause a denial of service (system crash). (CVE-2023-47233) It was discovered that the ATA over Ethernet (AoE) driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2023-6270) It was discovered that the Atheros 802.11ac wireless driver did not properly validate certain data structures, leading to a NULL pointer dereference. An attacker could possibly use this to cause a denial of service. (CVE-2023-7042) It was discovered that the Intel Data Streaming and Intel Analytics Accelerator drivers in the Linux kernel allowed direct access to the devices for unprivileged users and virtual machines. A local attacker could use this to cause a denial of service. (CVE-2024-21823) Gui-Dong Han discovered that the software RAID driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. A privileged attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-23307) Bai Jiaju discovered that the Xceive XC4000 silicon tuner device driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-24861) Chenyuan Yang discovered that the Unsorted Block Images (UBI) flash device volume management subsystem did not properly validate logical eraseblock sizes in certain situations. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-25739) It was discovered that the MediaTek SoC Gigabit Ethernet driver in the Linux kernel contained a race condition when stopping the device. A local attacker could possibly use this to cause a denial of service (device unavailability). (CVE-2024-27432) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - PowerPC architecture; - x86 architecture; - Block layer subsystem; - ACPI drivers; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Cryptographic API; - DPLL subsystem; - ARM SCMI message protocol; - EFI core; - GPU drivers; - InfiniBand drivers; - IOMMU subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - MMC subsystem; - Network drivers; - NTB driver; - NVME drivers; - PCI subsystem; - Powercap sysfs driver; - SCSI drivers; - Freescale SoC drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - TTY drivers; - USB subsystem; - DesignWare USB3 driver; - VFIO drivers; - Backlight driver; - Virtio drivers; - Xen hypervisor drivers; - AFS file system; - File systems infrastructure; - BTRFS file system; - debug file system; - Ext4 file system; - F2FS file system; - FAT file system; - Network file system client; - NILFS2 file system; - Overlay file system; - Pstore file system; - Diskquota system; - SMB network file system; - UBI file system; - io_uring subsystem; - BPF subsystem; - Core kernel; - Memory management; - Bluetooth subsystem; - Networking core; - HSR network protocol; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - IEEE 802.15.4 subsystem; - Netfilter; - Packet sockets; - Network traffic control; - Sun RPC protocol; - ALSA SH drivers; - SOF drivers; - USB sound devices; - KVM core; (CVE-2024-35822, CVE-2024-26859, CVE-2024-26967, CVE-2024-27053, CVE-2024-27064, CVE-2024-27437, CVE-2024-26931, CVE-2024-26870, CVE-2024-26927, CVE-2024-26880, CVE-2024-35789, CVE-2024-26929, CVE-2024-27034, CVE-2024-26816, CVE-2024-26896, CVE-2024-26975, CVE-2024-26972, CVE-2024-26937, CVE-2024-27032, CVE-2024-26871, CVE-2024-26655, CVE-2024-35829, CVE-2024-26886, CVE-2023-52653, CVE-2024-27028, CVE-2024-26877, CVE-2024-26898, CVE-2024-35796, CVE-2024-27065, CVE-2024-35807, CVE-2024-26966, CVE-2024-35826, CVE-2024-27067, CVE-2024-27039, CVE-2024-35811, CVE-2024-26895, CVE-2024-26814, CVE-2024-26893, CVE-2023-52649, CVE-2024-35801, CVE-2023-52648, CVE-2024-27048, CVE-2024-26934, CVE-2024-27049, CVE-2024-26890, CVE-2024-26874, CVE-2022-48669, CVE-2023-52661, CVE-2024-27436, CVE-2024-27058, CVE-2024-26935, CVE-2024-26956, CVE-2024-26960, CVE-2024-26976, CVE-2024-27041, CVE-2024-26873, CVE-2024-26946, CVE-2024-27080, CVE-2024-27432, CVE-2023-52650, CVE-2024-26879, CVE-2023-52647, CVE-2024-27435, CVE-2024-27038, CVE-2024-26951, CVE-2024-27390, CVE-2024-26863, CVE-2024-26959, CVE-2024-35794, CVE-2024-26889, CVE-2024-35845, CVE-2024-27433, CVE-2024-26961, CVE-2024-35803, CVE-2024-26653, CVE-2024-26939, CVE-2024-26872, CVE-2024-26979, CVE-2024-26973, CVE-2024-27029, CVE-2024-35831, CVE-2024-26892, CVE-2024-26888, CVE-2024-27074, CVE-2024-35844, CVE-2024-26938, CVE-2024-26953, CVE-2024-27391, CVE-2024-35843, CVE-2024-27040, CVE-2024-26875, CVE-2024-27026, CVE-2024-26978, CVE-2024-26882, CVE-2023-52652, CVE-2023-52662, CVE-2024-26963, CVE-2024-26962, CVE-2024-27051, CVE-2024-27068, CVE-2024-26881, CVE-2024-35800, CVE-2024-26964, CVE-2024-27389, CVE-2024-27043, CVE-2024-26901, CVE-2024-26941, CVE-2024-35798, CVE-2024-35799, CVE-2024-26952, CVE-2024-26654, CVE-2024-27046, CVE-2024-35810, CVE-2024-27050, CVE-2024-27063, CVE-2024-26954, CVE-2024-26884, CVE-2024-27047, CVE-2024-26932, CVE-2024-26883, CVE-2024-26943, CVE-2024-26651, CVE-2024-26815, CVE-2024-26948, CVE-2024-27066, CVE-2024-27037, CVE-2024-35806, CVE-2024-26869, CVE-2024-26878, CVE-2024-26810, CVE-2024-35797, CVE-2024-27073, CVE-2024-26812, CVE-2024-26933, CVE-2024-26809, CVE-2024-26894, CVE-2024-35813, CVE-2024-27033, CVE-2024-26876, CVE-2024-27076, CVE-2024-27045, CVE-2024-27079, CVE-2024-26861, CVE-2024-26957, CVE-2024-26864, CVE-2024-26866, CVE-2024-35814, CVE-2024-26813, CVE-2024-27388, CVE-2024-27042, CVE-2024-26862, CVE-2024-26968, CVE-2024-26940, CVE-2024-27027, CVE-2024-35793, CVE-2024-35874, CVE-2024-27035, CVE-2024-26958, CVE-2024-26887, CVE-2024-35809, CVE-2024-26930, CVE-2024-35819, CVE-2024-27392, CVE-2024-35808, CVE-2023-52644, CVE-2024-35828, CVE-2024-26657, CVE-2024-26969, CVE-2024-27434, CVE-2024-35821, CVE-2023-52663, CVE-2024-27078, CVE-2024-35787, CVE-2024-27044, CVE-2024-26848, CVE-2024-26955, CVE-2024-26899, CVE-2024-27077, CVE-2024-26897, CVE-2024-26945, CVE-2024-26885, CVE-2024-27069, CVE-2024-27070, CVE-2024-27054, CVE-2024-35795, CVE-2024-35817, CVE-2024-35827, CVE-2024-26656, CVE-2024-26860, CVE-2024-26942, CVE-2023-52659, CVE-2024-26865, CVE-2024-26868, CVE-2024-26947, CVE-2024-35788, CVE-2024-26950, CVE-2024-27030, CVE-2024-26949, CVE-2024-26900, CVE-2024-26971, CVE-2024-35805, CVE-2024-26977, CVE-2024-26944, CVE-2024-27036, CVE-2024-26965, CVE-2024-26891, CVE-2024-27071, CVE-2024-27075, CVE-2024-27072, CVE-2024-35830, CVE-2024-27052, CVE-2024-26970, CVE-2024-27031) Update Instructions: Run `sudo pro fix USN-6816-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-raspi-tools-6.8.0-1005 - 6.8.0-1005.5 linux-buildinfo-6.8.0-1005-raspi - 6.8.0-1005.5 linux-tools-raspi - 6.8.0-1005.5 linux-tools-6.8.0-1005-raspi - 6.8.0-1005.5 linux-headers-raspi - 6.8.0-1005.5 linux-image-6.8.0-1005-raspi - 6.8.0-1005.5 linux-headers-6.8.0-1005-raspi - 6.8.0-1005.5 linux-raspi-headers-6.8.0-1005 - 6.8.0-1005.5 linux-image-raspi - 6.8.0-1005.5 linux-modules-6.8.0-1005-raspi - 6.8.0-1005.5 linux-raspi - 6.8.0-1005.5 No subscription required linux-modules-extra-6.8.0-1006-ibm - 6.8.0-1006.6 linux-modules-6.8.0-1006-ibm - 6.8.0-1006.6 linux-ibm-tools-6.8.0-1006 - 6.8.0-1006.6 linux-image-unsigned-6.8.0-1006-ibm - 6.8.0-1006.6 linux-ibm-source-6.8.0 - 6.8.0-1006.6 linux-tools-ibm - 6.8.0-1006.6 linux-tools-ibm-lts-24.04 - 6.8.0-1006.6 linux-image-ibm - 6.8.0-1006.6 linux-image-ibm-classic - 6.8.0-1006.6 linux-headers-ibm-lts-24.04 - 6.8.0-1006.6 linux-modules-iwlwifi-6.8.0-1006-ibm - 6.8.0-1006.6 linux-tools-ibm-classic - 6.8.0-1006.6 linux-tools-6.8.0-1006-ibm - 6.8.0-1006.6 linux-headers-6.8.0-1006-ibm - 6.8.0-1006.6 linux-image-6.8.0-1006-ibm - 6.8.0-1006.6 linux-modules-iwlwifi-ibm-classic - 6.8.0-1006.6 linux-ibm-lts-24.04 - 6.8.0-1006.6 linux-ibm-classic - 6.8.0-1006.6 linux-modules-iwlwifi-ibm - 6.8.0-1006.6 linux-image-ibm-lts-24.04 - 6.8.0-1006.6 linux-ibm-headers-6.8.0-1006 - 6.8.0-1006.6 linux-headers-ibm-classic - 6.8.0-1006.6 linux-ibm - 6.8.0-1006.6 linux-ibm-cloud-tools-common - 6.8.0-1006.6 linux-headers-ibm - 6.8.0-1006.6 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1006.6 linux-buildinfo-6.8.0-1006-ibm - 6.8.0-1006.6 No subscription required linux-generic-hwe-24.04 - 6.8.0-35.35 linux-tools-common - 6.8.0-35.35 linux-headers-oem-20.04 - 6.8.0-35.35 linux-cloud-tools-virtual - 6.8.0-35.35 linux-headers-generic-lpae - 6.8.0-35.35 linux-modules-iwlwifi-oem-20.04d - 6.8.0-35.35 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-35.35 linux-headers-laptop-23.10 - 6.8.0-35.35 linux-kvm - 6.8.0-35.35 linux-tools-6.8.0-35 - 6.8.0-35.35 linux-virtual-hwe-24.04 - 6.8.0-35.35 linux-tools-generic-64k - 6.8.0-35.35 linux-image-virtual - 6.8.0-35.35 linux-doc - 6.8.0-35.35 linux-virtual-hwe-24.04-edge - 6.8.0-35.35 linux-image-generic-64k - 6.8.0-35.35 linux-modules-usbio-generic - 6.8.0-35.35 linux-image-generic - 6.8.0-35.35 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-35.35 linux-image-oem-20.04d - 6.8.0-35.35 linux-headers-virtual-hwe-24.04 - 6.8.0-35.35 linux-tools-oem-20.04d - 6.8.0-35.35 linux-headers-virtual-hwe-24.04-edge - 6.8.0-35.35 linux-buildinfo-6.8.0-35-generic-64k - 6.8.0-35.35 linux-cloud-tools-virtual-hwe-24.04-edge - 6.8.0-35.35 linux-image-virtual-hwe-24.04 - 6.8.0-35.35 linux-modules-usbio-6.8.0-35-generic - 6.8.0-35.35 linux-modules-ipu6-generic-hwe-24.04-edge - 6.8.0-35.35 linux-tools-generic-hwe-24.04-edge - 6.8.0-35.35 linux-tools-oem-20.04c - 6.8.0-35.35 linux-modules-ipu6-6.8.0-35-generic - 6.8.0-35.35 linux-tools-oem-20.04b - 6.8.0-35.35 linux-modules-6.8.0-35-generic-64k - 6.8.0-35.35 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-35.35 linux-tools-virtual-hwe-24.04-edge - 6.8.0-35.35 linux-headers-generic-64k-hwe-24.04-edge - 6.8.0-35.35 linux-modules-iwlwifi-6.8.0-35-generic - 6.8.0-35.35 linux-modules-6.8.0-35-generic - 6.8.0-35.35 linux-crashdump - 6.8.0-35.35 linux-image-extra-virtual-hwe-24.04 - 6.8.0-35.35 linux-buildinfo-6.8.0-35-generic - 6.8.0-35.35 linux-headers-6.8.0-35-generic-64k - 6.8.0-35.35 linux-modules-iwlwifi-generic - 6.8.0-35.35 linux-modules-extra-6.8.0-35-generic - 6.8.0-35.35 linux-source - 6.8.0-35.35 linux-image-extra-virtual-hwe-24.04-edge - 6.8.0-35.35 linux-oem-22.04 - 6.8.0-35.35 linux-image-virtual-hwe-24.04-edge - 6.8.0-35.35 linux-tools-generic-hwe-24.04 - 6.8.0-35.35 linux-headers-kvm - 6.8.0-35.35 linux-tools-generic-lpae - 6.8.0-35.35 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-35.35 linux-virtual - 6.8.0-35.35 linux-tools-oem-22.04 - 6.8.0-35.35 linux-tools-generic - 6.8.0-35.35 linux-laptop-23.10 - 6.8.0-35.35 linux-image-generic-64k-hwe-24.04-edge - 6.8.0-35.35 linux-tools-6.8.0-35-generic-64k - 6.8.0-35.35 linux-tools-6.8.0-35-generic - 6.8.0-35.35 linux-image-uc-generic - 6.8.0-35.35 linux-cloud-tools-generic - 6.8.0-35.35 linux-image-uc-generic-hwe-24.04-edge - 6.8.0-35.35 linux-image-oem-20.04c - 6.8.0-35.35 linux-image-oem-20.04b - 6.8.0-35.35 linux-generic-lpae - 6.8.0-35.35 linux-tools-host - 6.8.0-35.35 linux-headers-generic-64k - 6.8.0-35.35 linux-headers-generic-64k-hwe-24.04 - 6.8.0-35.35 linux-oem-20.04 - 6.8.0-35.35 linux-generic - 6.8.0-35.35 linux-image-oem-20.04 - 6.8.0-35.35 linux-oem-20.04d - 6.8.0-35.35 linux-headers-generic-hwe-24.04 - 6.8.0-35.35 linux-oem-20.04c - 6.8.0-35.35 linux-image-oem-22.04 - 6.8.0-35.35 linux-headers-6.8.0-35-generic - 6.8.0-35.35 linux-generic-64k-hwe-24.04-edge - 6.8.0-35.35 linux-lib-rust-6.8.0-35-generic - 6.8.0-35.35 linux-image-generic-hwe-24.04 - 6.8.0-35.35 linux-headers-6.8.0-35 - 6.8.0-35.35 linux-tools-oem-20.04 - 6.8.0-35.35 linux-cloud-tools-common - 6.8.0-35.35 linux-image-generic-lpae - 6.8.0-35.35 linux-oem-20.04b - 6.8.0-35.35 linux-image-extra-virtual - 6.8.0-35.35 linux-modules-ipu6-generic - 6.8.0-35.35 linux-tools-virtual-hwe-24.04 - 6.8.0-35.35 linux-image-laptop-23.10 - 6.8.0-35.35 linux-image-generic-hwe-24.04-edge - 6.8.0-35.35 linux-cloud-tools-6.8.0-35-generic - 6.8.0-35.35 linux-modules-usbio-generic-hwe-24.04-edge - 6.8.0-35.35 linux-tools-generic-64k-hwe-24.04-edge - 6.8.0-35.35 linux-image-generic-64k-hwe-24.04 - 6.8.0-35.35 linux-image-uc-generic-hwe-24.04 - 6.8.0-35.35 linux-cloud-tools-generic-hwe-24.04-edge - 6.8.0-35.35 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-35.35 linux-modules-iwlwifi-oem-20.04 - 6.8.0-35.35 linux-headers-generic-hwe-24.04-edge - 6.8.0-35.35 linux-generic-64k - 6.8.0-35.35 linux-headers-generic - 6.8.0-35.35 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.8.0-35.35 linux-tools-laptop-23.10 - 6.8.0-35.35 linux-libc-dev - 6.8.0-35.35 linux-modules-iwlwifi-oem-22.04 - 6.8.0-35.35 linux-headers-virtual - 6.8.0-35.35 linux-image-kvm - 6.8.0-35.35 linux-source-6.8.0 - 6.8.0-35.35 linux-headers-oem-22.04 - 6.8.0-35.35 linux-generic-hwe-24.04-edge - 6.8.0-35.35 linux-tools-generic-64k-hwe-24.04 - 6.8.0-35.35 linux-tools-kvm - 6.8.0-35.35 linux-image-unsigned-6.8.0-35-generic-64k - 6.8.0-35.35 linux-headers-oem-20.04b - 6.8.0-35.35 linux-headers-oem-20.04c - 6.8.0-35.35 linux-tools-virtual - 6.8.0-35.35 linux-headers-oem-20.04d - 6.8.0-35.35 linux-cloud-tools-6.8.0-35 - 6.8.0-35.35 linux-generic-64k-hwe-24.04 - 6.8.0-35.35 linux-image-unsigned-6.8.0-35-generic - 6.8.0-35.35 No subscription required linux-image-uc-6.8.0-35-generic-64k - 6.8.0-35.35+1 linux-image-6.8.0-35-generic - 6.8.0-35.35+1 linux-image-uc-6.8.0-35-generic - 6.8.0-35.35+1 linux-image-6.8.0-35-generic-64k - 6.8.0-35.35+1 No subscription required linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-35.35.1 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.8.0-35.35.1 linux-buildinfo-6.8.0-35-lowlatency - 6.8.0-35.35.1 linux-headers-lowlatency-64k - 6.8.0-35.35.1 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.8.0-35.35.1 linux-image-6.8.0-35-lowlatency-64k - 6.8.0-35.35.1 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.8.0-35.35.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-35.35.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-35.35.1 linux-lowlatency-tools-common - 6.8.0-35.35.1 linux-lowlatency-cloud-tools-common - 6.8.0-35.35.1 linux-tools-lowlatency - 6.8.0-35.35.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-35.35.1 linux-lowlatency-tools-host - 6.8.0-35.35.1 linux-lowlatency-64k - 6.8.0-35.35.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-35.35.1 linux-tools-6.8.0-35-lowlatency - 6.8.0-35.35.1 linux-tools-lowlatency-hwe-22.04-edge - 6.8.0-35.35.1 linux-image-lowlatency-hwe-22.04-edge - 6.8.0-35.35.1 linux-modules-iwlwifi-lowlatency - 6.8.0-35.35.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-35.35.1 linux-headers-lowlatency-hwe-22.04-edge - 6.8.0-35.35.1 linux-buildinfo-6.8.0-35-lowlatency-64k - 6.8.0-35.35.1 linux-lowlatency-headers-6.8.0-35 - 6.8.0-35.35.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-35.35.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-35.35.1 linux-headers-6.8.0-35-lowlatency - 6.8.0-35.35.1 linux-cloud-tools-6.8.0-35-lowlatency - 6.8.0-35.35.1 linux-lowlatency - 6.8.0-35.35.1 linux-headers-lowlatency-hwe-22.04 - 6.8.0-35.35.1 linux-lowlatency-hwe-22.04-edge - 6.8.0-35.35.1 linux-image-lowlatency-64k-hwe-22.04-edge - 6.8.0-35.35.1 linux-tools-lowlatency-64k-hwe-22.04 - 6.8.0-35.35.1 linux-modules-iwlwifi-6.8.0-35-lowlatency - 6.8.0-35.35.1 linux-image-unsigned-6.8.0-35-lowlatency-64k - 6.8.0-35.35.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-35.35.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-35.35.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-35.35.1 linux-headers-6.8.0-35-lowlatency-64k - 6.8.0-35.35.1 linux-tools-lowlatency-64k - 6.8.0-35.35.1 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.8.0-35.35.1 linux-lowlatency-cloud-tools-6.8.0-35 - 6.8.0-35.35.1 linux-modules-6.8.0-35-lowlatency-64k - 6.8.0-35.35.1 linux-image-unsigned-6.8.0-35-lowlatency - 6.8.0-35.35.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-35.35.1 linux-lowlatency-hwe-22.04 - 6.8.0-35.35.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-35.35.1 linux-modules-6.8.0-35-lowlatency - 6.8.0-35.35.1 linux-headers-lowlatency-64k-hwe-22.04 - 6.8.0-35.35.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-35.35.1 linux-lowlatency-64k-hwe-22.04-edge - 6.8.0-35.35.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-35.35.1 linux-tools-6.8.0-35-lowlatency-64k - 6.8.0-35.35.1 linux-image-6.8.0-35-lowlatency - 6.8.0-35.35.1 linux-image-lowlatency-64k - 6.8.0-35.35.1 linux-cloud-tools-lowlatency - 6.8.0-35.35.1 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.8.0-35.35.1 linux-lowlatency-lib-rust-6.8.0-35-lowlatency - 6.8.0-35.35.1 linux-cloud-tools-lowlatency-hwe-22.04 - 6.8.0-35.35.1 linux-image-lowlatency-hwe-22.04 - 6.8.0-35.35.1 linux-lowlatency-hwe-20.04 - 6.8.0-35.35.1 linux-lowlatency-tools-6.8.0-35 - 6.8.0-35.35.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-35.35.1 linux-headers-lowlatency - 6.8.0-35.35.1 linux-tools-lowlatency-hwe-22.04 - 6.8.0-35.35.1 linux-lowlatency-64k-hwe-22.04 - 6.8.0-35.35.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-35.35.1 linux-image-lowlatency-64k-hwe-22.04 - 6.8.0-35.35.1 linux-image-lowlatency - 6.8.0-35.35.1 No subscription required High CVE-2022-38096 CVE-2022-48669 CVE-2023-47233 CVE-2023-52644 CVE-2023-52647 CVE-2023-52648 CVE-2023-52649 CVE-2023-52650 CVE-2023-52652 CVE-2023-52653 CVE-2023-52659 CVE-2023-52661 CVE-2023-52662 CVE-2023-52663 CVE-2023-6270 CVE-2023-7042 CVE-2024-21823 CVE-2024-23307 CVE-2024-24861 CVE-2024-25739 CVE-2024-26651 CVE-2024-26653 CVE-2024-26654 CVE-2024-26655 CVE-2024-26656 CVE-2024-26657 CVE-2024-26809 CVE-2024-26810 CVE-2024-26812 CVE-2024-26813 CVE-2024-26814 CVE-2024-26815 CVE-2024-26816 CVE-2024-26848 CVE-2024-26859 CVE-2024-26860 CVE-2024-26861 CVE-2024-26862 CVE-2024-26863 CVE-2024-26864 CVE-2024-26865 CVE-2024-26866 CVE-2024-26868 CVE-2024-26869 CVE-2024-26870 CVE-2024-26871 CVE-2024-26872 CVE-2024-26873 CVE-2024-26874 CVE-2024-26875 CVE-2024-26876 CVE-2024-26877 CVE-2024-26878 CVE-2024-26879 CVE-2024-26880 CVE-2024-26881 CVE-2024-26882 CVE-2024-26883 CVE-2024-26884 CVE-2024-26885 CVE-2024-26886 CVE-2024-26887 CVE-2024-26888 CVE-2024-26889 CVE-2024-26890 CVE-2024-26891 CVE-2024-26892 CVE-2024-26893 CVE-2024-26894 CVE-2024-26895 CVE-2024-26896 CVE-2024-26897 CVE-2024-26898 CVE-2024-26899 CVE-2024-26900 CVE-2024-26901 CVE-2024-26927 CVE-2024-26929 CVE-2024-26930 CVE-2024-26931 CVE-2024-26932 CVE-2024-26933 CVE-2024-26934 CVE-2024-26935 CVE-2024-26937 CVE-2024-26938 CVE-2024-26939 CVE-2024-26940 CVE-2024-26941 CVE-2024-26942 CVE-2024-26943 CVE-2024-26944 CVE-2024-26945 CVE-2024-26946 CVE-2024-26947 CVE-2024-26948 CVE-2024-26949 CVE-2024-26950 CVE-2024-26951 CVE-2024-26952 CVE-2024-26953 CVE-2024-26954 CVE-2024-26955 CVE-2024-26956 CVE-2024-26957 CVE-2024-26958 CVE-2024-26959 CVE-2024-26960 CVE-2024-26961 CVE-2024-26962 CVE-2024-26963 CVE-2024-26964 CVE-2024-26965 CVE-2024-26966 CVE-2024-26967 CVE-2024-26968 CVE-2024-26969 CVE-2024-26970 CVE-2024-26971 CVE-2024-26972 CVE-2024-26973 CVE-2024-26975 CVE-2024-26976 CVE-2024-26977 CVE-2024-26978 CVE-2024-27026 CVE-2024-27027 CVE-2024-27028 CVE-2024-27029 CVE-2024-27030 CVE-2024-27031 CVE-2024-27032 CVE-2024-27033 CVE-2024-27034 CVE-2024-27035 CVE-2024-27036 CVE-2024-27037 CVE-2024-27038 CVE-2024-27039 CVE-2024-27040 CVE-2024-27041 CVE-2024-27042 CVE-2024-27043 CVE-2024-27044 CVE-2024-27045 CVE-2024-27046 CVE-2024-27047 CVE-2024-27048 CVE-2024-27049 CVE-2024-27050 CVE-2024-27051 CVE-2024-27052 CVE-2024-27053 CVE-2024-27054 CVE-2024-27058 CVE-2024-27063 CVE-2024-27064 CVE-2024-27065 CVE-2024-27066 CVE-2024-27067 CVE-2024-27068 CVE-2024-27069 CVE-2024-27070 CVE-2024-27071 CVE-2024-27072 CVE-2024-27073 CVE-2024-27074 CVE-2024-27075 CVE-2024-27076 CVE-2024-27077 CVE-2024-27078 CVE-2024-27079 CVE-2024-27080 CVE-2024-27388 CVE-2024-27389 CVE-2024-27390 CVE-2024-27391 CVE-2024-27392 CVE-2024-27432 CVE-2024-27433 CVE-2024-27434 CVE-2024-27435 CVE-2024-27436 CVE-2024-27437 CVE-2024-35787 CVE-2024-35788 CVE-2024-35789 CVE-2024-35793 CVE-2024-35794 CVE-2024-35795 CVE-2024-35796 CVE-2024-35797 CVE-2024-35798 CVE-2024-35799 CVE-2024-35800 CVE-2024-35801 CVE-2024-35803 CVE-2024-35805 CVE-2024-35806 CVE-2024-35807 CVE-2024-35808 CVE-2024-35809 CVE-2024-35810 CVE-2024-35811 CVE-2024-35813 CVE-2024-35814 CVE-2024-35817 CVE-2024-35819 CVE-2024-35821 CVE-2024-35822 CVE-2024-35826 CVE-2024-35827 CVE-2024-35828 CVE-2024-35829 CVE-2024-35830 CVE-2024-35831 CVE-2024-35843 CVE-2024-35844 CVE-2024-35845 CVE-2024-35874 USN-6817-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Ziming Zhang discovered that the DRM driver for VMware Virtual GPU did not properly handle certain error conditions, leading to a NULL pointer dereference. A local attacker could possibly trigger this vulnerability to cause a denial of service. (CVE-2022-38096) Zheng Wang discovered that the Broadcom FullMAC WLAN driver in the Linux kernel contained a race condition during device removal, leading to a use- after-free vulnerability. A physically proximate attacker could possibly use this to cause a denial of service (system crash). (CVE-2023-47233) It was discovered that the ATA over Ethernet (AoE) driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2023-6270) It was discovered that the Atheros 802.11ac wireless driver did not properly validate certain data structures, leading to a NULL pointer dereference. An attacker could possibly use this to cause a denial of service. (CVE-2023-7042) Gui-Dong Han discovered that the software RAID driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. A privileged attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-23307) Bai Jiaju discovered that the Xceive XC4000 silicon tuner device driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-24861) Chenyuan Yang discovered that the Unsorted Block Images (UBI) flash device volume management subsystem did not properly validate logical eraseblock sizes in certain situations. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-25739) It was discovered that the MediaTek SoC Gigabit Ethernet driver in the Linux kernel contained a race condition when stopping the device. A local attacker could possibly use this to cause a denial of service (device unavailability). (CVE-2024-27432) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - PowerPC architecture; - x86 architecture; - Block layer subsystem; - ACPI drivers; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Cryptographic API; - DPLL subsystem; - ARM SCMI message protocol; - EFI core; - GPU drivers; - InfiniBand drivers; - IOMMU subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - MMC subsystem; - Network drivers; - NTB driver; - NVME drivers; - PCI subsystem; - Powercap sysfs driver; - SCSI drivers; - Freescale SoC drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - TTY drivers; - USB subsystem; - DesignWare USB3 driver; - VFIO drivers; - Backlight driver; - Virtio drivers; - Xen hypervisor drivers; - AFS file system; - File systems infrastructure; - BTRFS file system; - debug file system; - Ext4 file system; - F2FS file system; - FAT file system; - Network file system client; - NILFS2 file system; - Overlay file system; - Pstore file system; - Diskquota system; - SMB network file system; - UBI file system; - io_uring subsystem; - BPF subsystem; - Core kernel; - Memory management; - Bluetooth subsystem; - Networking core; - HSR network protocol; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - IEEE 802.15.4 subsystem; - Netfilter; - Packet sockets; - Network traffic control; - Sun RPC protocol; - ALSA SH drivers; - SOF drivers; - USB sound devices; - KVM core; (CVE-2024-26859, CVE-2024-26944, CVE-2024-27049, CVE-2024-26868, CVE-2024-26932, CVE-2024-35843, CVE-2024-35814, CVE-2024-26866, CVE-2024-26941, CVE-2024-27080, CVE-2024-26938, CVE-2024-26889, CVE-2024-27075, CVE-2024-27077, CVE-2024-26864, CVE-2024-35787, CVE-2024-27071, CVE-2024-26880, CVE-2024-26961, CVE-2024-26945, CVE-2024-26863, CVE-2024-35795, CVE-2024-27045, CVE-2024-27066, CVE-2024-27046, CVE-2024-26816, CVE-2024-27069, CVE-2024-26861, CVE-2024-26968, CVE-2024-26963, CVE-2024-26878, CVE-2024-27073, CVE-2024-35806, CVE-2024-26951, CVE-2024-26954, CVE-2024-27026, CVE-2024-26956, CVE-2024-35811, CVE-2024-35803, CVE-2024-26964, CVE-2024-26848, CVE-2024-27434, CVE-2024-35844, CVE-2024-26977, CVE-2024-27031, CVE-2024-35813, CVE-2024-26960, CVE-2024-27067, CVE-2024-26937, CVE-2024-26884, CVE-2024-26656, CVE-2024-27068, CVE-2024-26871, CVE-2023-52653, CVE-2024-26939, CVE-2024-26967, CVE-2024-26966, CVE-2024-27043, CVE-2024-26814, CVE-2024-35829, CVE-2024-26973, CVE-2024-35810, CVE-2024-26877, CVE-2024-27392, CVE-2024-35805, CVE-2024-26875, CVE-2024-26970, CVE-2024-26657, CVE-2024-26874, CVE-2024-26971, CVE-2024-26872, CVE-2024-35798, CVE-2024-26931, CVE-2024-26948, CVE-2024-26883, CVE-2024-26955, CVE-2024-27039, CVE-2024-27038, CVE-2024-27065, CVE-2024-26899, CVE-2024-27048, CVE-2024-35874, CVE-2024-35845, CVE-2024-35799, CVE-2024-35827, CVE-2024-26935, CVE-2024-27079, CVE-2024-35821, CVE-2024-26950, CVE-2024-26879, CVE-2024-26940, CVE-2024-35788, CVE-2024-26891, CVE-2024-27063, CVE-2024-27433, CVE-2024-27036, CVE-2024-35819, CVE-2024-26969, CVE-2024-27044, CVE-2024-27028, CVE-2024-27070, CVE-2023-52649, CVE-2024-27435, CVE-2024-35830, CVE-2024-26929, CVE-2024-26653, CVE-2024-26887, CVE-2024-26869, CVE-2024-26942, CVE-2024-35822, CVE-2024-26979, CVE-2024-26881, CVE-2024-26655, CVE-2024-26975, CVE-2023-52650, CVE-2024-26651, CVE-2024-35828, CVE-2024-26965, CVE-2024-27437, CVE-2024-35794, CVE-2024-26962, CVE-2024-27058, CVE-2024-27076, CVE-2024-27035, CVE-2024-27074, CVE-2024-27027, CVE-2024-26860, CVE-2024-27042, CVE-2024-27390, CVE-2024-26815, CVE-2023-52662, CVE-2024-27051, CVE-2024-35796, CVE-2024-27047, CVE-2024-26930, CVE-2024-26865, CVE-2024-27064, CVE-2024-35826, CVE-2024-26885, CVE-2024-26873, CVE-2024-26943, CVE-2024-26893, CVE-2024-27030, CVE-2024-26976, CVE-2024-35793, CVE-2024-26952, CVE-2023-52644, CVE-2024-35797, CVE-2024-27029, CVE-2024-26927, CVE-2024-26812, CVE-2024-27432, CVE-2024-26897, CVE-2024-26890, CVE-2024-26972, CVE-2024-35800, CVE-2024-27032, CVE-2024-27052, CVE-2023-52647, CVE-2024-26898, CVE-2023-52652, CVE-2024-35808, CVE-2024-26876, CVE-2024-26933, CVE-2024-26862, CVE-2024-27033, CVE-2023-52663, CVE-2024-27041, CVE-2023-52648, CVE-2024-26888, CVE-2024-26957, CVE-2024-26953, CVE-2023-52659, CVE-2024-27436, CVE-2024-27040, CVE-2024-27054, CVE-2024-27050, CVE-2024-26886, CVE-2023-52661, CVE-2024-35831, CVE-2024-26946, CVE-2024-26949, CVE-2024-26809, CVE-2024-26892, CVE-2024-26654, CVE-2024-26901, CVE-2024-27053, CVE-2024-26882, CVE-2024-35809, CVE-2024-26978, CVE-2024-27037, CVE-2024-27391, CVE-2024-27034, CVE-2024-26895, CVE-2024-35817, CVE-2024-26900, CVE-2024-26896, CVE-2024-26958, CVE-2024-35801, CVE-2024-27388, CVE-2024-26934, CVE-2024-27078, CVE-2024-35789, CVE-2024-26894, CVE-2024-27389, CVE-2024-35807, CVE-2024-27072, CVE-2024-26947, CVE-2024-26870, CVE-2024-26813, CVE-2022-48669, CVE-2024-26959, CVE-2024-26810) Update Instructions: Run `sudo pro fix USN-6817-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-gcp-headers-6.8.0-1008 - 6.8.0-1008.9 linux-image-gcp - 6.8.0-1008.9 linux-modules-extra-6.8.0-1008-gcp - 6.8.0-1008.9 linux-headers-6.8.0-1008-gcp - 6.8.0-1008.9 linux-modules-6.8.0-1008-gcp - 6.8.0-1008.9 linux-tools-gcp - 6.8.0-1008.9 linux-gcp - 6.8.0-1008.9 linux-modules-iwlwifi-gcp - 6.8.0-1008.9 linux-gcp-tools-6.8.0-1008 - 6.8.0-1008.9 linux-headers-gcp - 6.8.0-1008.9 linux-image-unsigned-6.8.0-1008-gcp - 6.8.0-1008.9 linux-modules-iwlwifi-6.8.0-1008-gcp - 6.8.0-1008.9 linux-image-6.8.0-1008-gcp - 6.8.0-1008.9 linux-modules-extra-gcp - 6.8.0-1008.9 linux-buildinfo-6.8.0-1008-gcp - 6.8.0-1008.9 linux-tools-6.8.0-1008-gcp - 6.8.0-1008.9 No subscription required linux-modules-extra-aws - 6.8.0-1009.9 linux-tools-aws - 6.8.0-1009.9 linux-aws-tools-6.8.0-1009 - 6.8.0-1009.9 linux-cloud-tools-6.8.0-1009-aws - 6.8.0-1009.9 linux-image-aws - 6.8.0-1009.9 linux-image-6.8.0-1009-aws - 6.8.0-1009.9 linux-aws-cloud-tools-6.8.0-1009 - 6.8.0-1009.9 linux-headers-6.8.0-1009-aws - 6.8.0-1009.9 linux-image-unsigned-6.8.0-1009-aws - 6.8.0-1009.9 linux-modules-6.8.0-1009-aws - 6.8.0-1009.9 linux-aws - 6.8.0-1009.9 linux-headers-aws - 6.8.0-1009.9 linux-buildinfo-6.8.0-1009-aws - 6.8.0-1009.9 linux-aws-headers-6.8.0-1009 - 6.8.0-1009.9 linux-tools-6.8.0-1009-aws - 6.8.0-1009.9 linux-modules-extra-6.8.0-1009-aws - 6.8.0-1009.9 No subscription required High CVE-2022-38096 CVE-2022-48669 CVE-2023-47233 CVE-2023-52644 CVE-2023-52647 CVE-2023-52648 CVE-2023-52649 CVE-2023-52650 CVE-2023-52652 CVE-2023-52653 CVE-2023-52659 CVE-2023-52661 CVE-2023-52662 CVE-2023-52663 CVE-2023-6270 CVE-2023-7042 CVE-2024-23307 CVE-2024-24861 CVE-2024-25739 CVE-2024-26651 CVE-2024-26653 CVE-2024-26654 CVE-2024-26655 CVE-2024-26656 CVE-2024-26657 CVE-2024-26809 CVE-2024-26810 CVE-2024-26812 CVE-2024-26813 CVE-2024-26814 CVE-2024-26815 CVE-2024-26816 CVE-2024-26848 CVE-2024-26859 CVE-2024-26860 CVE-2024-26861 CVE-2024-26862 CVE-2024-26863 CVE-2024-26864 CVE-2024-26865 CVE-2024-26866 CVE-2024-26868 CVE-2024-26869 CVE-2024-26870 CVE-2024-26871 CVE-2024-26872 CVE-2024-26873 CVE-2024-26874 CVE-2024-26875 CVE-2024-26876 CVE-2024-26877 CVE-2024-26878 CVE-2024-26879 CVE-2024-26880 CVE-2024-26881 CVE-2024-26882 CVE-2024-26883 CVE-2024-26884 CVE-2024-26885 CVE-2024-26886 CVE-2024-26887 CVE-2024-26888 CVE-2024-26889 CVE-2024-26890 CVE-2024-26891 CVE-2024-26892 CVE-2024-26893 CVE-2024-26894 CVE-2024-26895 CVE-2024-26896 CVE-2024-26897 CVE-2024-26898 CVE-2024-26899 CVE-2024-26900 CVE-2024-26901 CVE-2024-26927 CVE-2024-26929 CVE-2024-26930 CVE-2024-26931 CVE-2024-26932 CVE-2024-26933 CVE-2024-26934 CVE-2024-26935 CVE-2024-26937 CVE-2024-26938 CVE-2024-26939 CVE-2024-26940 CVE-2024-26941 CVE-2024-26942 CVE-2024-26943 CVE-2024-26944 CVE-2024-26945 CVE-2024-26946 CVE-2024-26947 CVE-2024-26948 CVE-2024-26949 CVE-2024-26950 CVE-2024-26951 CVE-2024-26952 CVE-2024-26953 CVE-2024-26954 CVE-2024-26955 CVE-2024-26956 CVE-2024-26957 CVE-2024-26958 CVE-2024-26959 CVE-2024-26960 CVE-2024-26961 CVE-2024-26962 CVE-2024-26963 CVE-2024-26964 CVE-2024-26965 CVE-2024-26966 CVE-2024-26967 CVE-2024-26968 CVE-2024-26969 CVE-2024-26970 CVE-2024-26971 CVE-2024-26972 CVE-2024-26973 CVE-2024-26975 CVE-2024-26976 CVE-2024-26977 CVE-2024-26978 CVE-2024-27026 CVE-2024-27027 CVE-2024-27028 CVE-2024-27029 CVE-2024-27030 CVE-2024-27031 CVE-2024-27032 CVE-2024-27033 CVE-2024-27034 CVE-2024-27035 CVE-2024-27036 CVE-2024-27037 CVE-2024-27038 CVE-2024-27039 CVE-2024-27040 CVE-2024-27041 CVE-2024-27042 CVE-2024-27043 CVE-2024-27044 CVE-2024-27045 CVE-2024-27046 CVE-2024-27047 CVE-2024-27048 CVE-2024-27049 CVE-2024-27050 CVE-2024-27051 CVE-2024-27052 CVE-2024-27053 CVE-2024-27054 CVE-2024-27058 CVE-2024-27063 CVE-2024-27064 CVE-2024-27065 CVE-2024-27066 CVE-2024-27067 CVE-2024-27068 CVE-2024-27069 CVE-2024-27070 CVE-2024-27071 CVE-2024-27072 CVE-2024-27073 CVE-2024-27074 CVE-2024-27075 CVE-2024-27076 CVE-2024-27077 CVE-2024-27078 CVE-2024-27079 CVE-2024-27080 CVE-2024-27388 CVE-2024-27389 CVE-2024-27390 CVE-2024-27391 CVE-2024-27392 CVE-2024-27432 CVE-2024-27433 CVE-2024-27434 CVE-2024-27435 CVE-2024-27436 CVE-2024-27437 CVE-2024-35787 CVE-2024-35788 CVE-2024-35789 CVE-2024-35793 CVE-2024-35794 CVE-2024-35795 CVE-2024-35796 CVE-2024-35797 CVE-2024-35798 CVE-2024-35799 CVE-2024-35800 CVE-2024-35801 CVE-2024-35803 CVE-2024-35805 CVE-2024-35806 CVE-2024-35807 CVE-2024-35808 CVE-2024-35809 CVE-2024-35810 CVE-2024-35811 CVE-2024-35813 CVE-2024-35814 CVE-2024-35817 CVE-2024-35819 CVE-2024-35821 CVE-2024-35822 CVE-2024-35826 CVE-2024-35827 CVE-2024-35828 CVE-2024-35829 CVE-2024-35830 CVE-2024-35831 CVE-2024-35843 CVE-2024-35844 CVE-2024-35845 CVE-2024-35874 USN-6817-2 -- Linux kernel (OEM) vulnerabilities Ubuntu 24.04 LTS Ziming Zhang discovered that the DRM driver for VMware Virtual GPU did not properly handle certain error conditions, leading to a NULL pointer dereference. A local attacker could possibly trigger this vulnerability to cause a denial of service. (CVE-2022-38096) Zheng Wang discovered that the Broadcom FullMAC WLAN driver in the Linux kernel contained a race condition during device removal, leading to a use- after-free vulnerability. A physically proximate attacker could possibly use this to cause a denial of service (system crash). (CVE-2023-47233) It was discovered that the ATA over Ethernet (AoE) driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2023-6270) It was discovered that the Atheros 802.11ac wireless driver did not properly validate certain data structures, leading to a NULL pointer dereference. An attacker could possibly use this to cause a denial of service. (CVE-2023-7042) Gui-Dong Han discovered that the software RAID driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. A privileged attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-23307) Bai Jiaju discovered that the Xceive XC4000 silicon tuner device driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-24861) Chenyuan Yang discovered that the Unsorted Block Images (UBI) flash device volume management subsystem did not properly validate logical eraseblock sizes in certain situations. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-25739) It was discovered that the MediaTek SoC Gigabit Ethernet driver in the Linux kernel contained a race condition when stopping the device. A local attacker could possibly use this to cause a denial of service (device unavailability). (CVE-2024-27432) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - PowerPC architecture; - x86 architecture; - Block layer subsystem; - ACPI drivers; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Cryptographic API; - DPLL subsystem; - ARM SCMI message protocol; - EFI core; - GPU drivers; - InfiniBand drivers; - IOMMU subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - MMC subsystem; - Network drivers; - NTB driver; - NVME drivers; - PCI subsystem; - Powercap sysfs driver; - SCSI drivers; - Freescale SoC drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - TTY drivers; - USB subsystem; - DesignWare USB3 driver; - VFIO drivers; - Backlight driver; - Virtio drivers; - Xen hypervisor drivers; - AFS file system; - File systems infrastructure; - BTRFS file system; - debug file system; - Ext4 file system; - F2FS file system; - FAT file system; - Network file system client; - NILFS2 file system; - Overlay file system; - Pstore file system; - Diskquota system; - SMB network file system; - UBI file system; - io_uring subsystem; - BPF subsystem; - Core kernel; - Memory management; - Bluetooth subsystem; - Networking core; - HSR network protocol; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - IEEE 802.15.4 subsystem; - Netfilter; - Packet sockets; - Network traffic control; - Sun RPC protocol; - ALSA SH drivers; - SOF drivers; - USB sound devices; - KVM core; (CVE-2024-26859, CVE-2024-26944, CVE-2024-27049, CVE-2024-26868, CVE-2024-26932, CVE-2024-35843, CVE-2024-35814, CVE-2024-26866, CVE-2024-26941, CVE-2024-27080, CVE-2024-26938, CVE-2024-26889, CVE-2024-27075, CVE-2024-27077, CVE-2024-26864, CVE-2024-35787, CVE-2024-27071, CVE-2024-26880, CVE-2024-26961, CVE-2024-26945, CVE-2024-26863, CVE-2024-35795, CVE-2024-27045, CVE-2024-27066, CVE-2024-27046, CVE-2024-26816, CVE-2024-27069, CVE-2024-26861, CVE-2024-26968, CVE-2024-26963, CVE-2024-26878, CVE-2024-27073, CVE-2024-35806, CVE-2024-26951, CVE-2024-26954, CVE-2024-27026, CVE-2024-26956, CVE-2024-35811, CVE-2024-35803, CVE-2024-26964, CVE-2024-26848, CVE-2024-27434, CVE-2024-35844, CVE-2024-26977, CVE-2024-27031, CVE-2024-35813, CVE-2024-26960, CVE-2024-27067, CVE-2024-26937, CVE-2024-26884, CVE-2024-26656, CVE-2024-27068, CVE-2024-26871, CVE-2023-52653, CVE-2024-26939, CVE-2024-26967, CVE-2024-26966, CVE-2024-27043, CVE-2024-26814, CVE-2024-35829, CVE-2024-26973, CVE-2024-35810, CVE-2024-26877, CVE-2024-27392, CVE-2024-35805, CVE-2024-26875, CVE-2024-26970, CVE-2024-26657, CVE-2024-26874, CVE-2024-26971, CVE-2024-26872, CVE-2024-35798, CVE-2024-26931, CVE-2024-26948, CVE-2024-26883, CVE-2024-26955, CVE-2024-27039, CVE-2024-27038, CVE-2024-27065, CVE-2024-26899, CVE-2024-27048, CVE-2024-35874, CVE-2024-35845, CVE-2024-35799, CVE-2024-35827, CVE-2024-26935, CVE-2024-27079, CVE-2024-35821, CVE-2024-26950, CVE-2024-26879, CVE-2024-26940, CVE-2024-35788, CVE-2024-26891, CVE-2024-27063, CVE-2024-27433, CVE-2024-27036, CVE-2024-35819, CVE-2024-26969, CVE-2024-27044, CVE-2024-27028, CVE-2024-27070, CVE-2023-52649, CVE-2024-27435, CVE-2024-35830, CVE-2024-26929, CVE-2024-26653, CVE-2024-26887, CVE-2024-26869, CVE-2024-26942, CVE-2024-35822, CVE-2024-26979, CVE-2024-26881, CVE-2024-26655, CVE-2024-26975, CVE-2023-52650, CVE-2024-26651, CVE-2024-35828, CVE-2024-26965, CVE-2024-27437, CVE-2024-35794, CVE-2024-26962, CVE-2024-27058, CVE-2024-27076, CVE-2024-27035, CVE-2024-27074, CVE-2024-27027, CVE-2024-26860, CVE-2024-27042, CVE-2024-27390, CVE-2024-26815, CVE-2023-52662, CVE-2024-27051, CVE-2024-35796, CVE-2024-27047, CVE-2024-26930, CVE-2024-26865, CVE-2024-27064, CVE-2024-35826, CVE-2024-26885, CVE-2024-26873, CVE-2024-26943, CVE-2024-26893, CVE-2024-27030, CVE-2024-26976, CVE-2024-35793, CVE-2024-26952, CVE-2023-52644, CVE-2024-35797, CVE-2024-27029, CVE-2024-26927, CVE-2024-26812, CVE-2024-27432, CVE-2024-26897, CVE-2024-26890, CVE-2024-26972, CVE-2024-35800, CVE-2024-27032, CVE-2024-27052, CVE-2023-52647, CVE-2024-26898, CVE-2023-52652, CVE-2024-35808, CVE-2024-26876, CVE-2024-26933, CVE-2024-26862, CVE-2024-27033, CVE-2023-52663, CVE-2024-27041, CVE-2023-52648, CVE-2024-26888, CVE-2024-26957, CVE-2024-26953, CVE-2023-52659, CVE-2024-27436, CVE-2024-27040, CVE-2024-27054, CVE-2024-27050, CVE-2024-26886, CVE-2023-52661, CVE-2024-35831, CVE-2024-26946, CVE-2024-26949, CVE-2024-26809, CVE-2024-26892, CVE-2024-26654, CVE-2024-26901, CVE-2024-27053, CVE-2024-26882, CVE-2024-35809, CVE-2024-26978, CVE-2024-27037, CVE-2024-27391, CVE-2024-27034, CVE-2024-26895, CVE-2024-35817, CVE-2024-26900, CVE-2024-26896, CVE-2024-26958, CVE-2024-35801, CVE-2024-27388, CVE-2024-26934, CVE-2024-27078, CVE-2024-35789, CVE-2024-26894, CVE-2024-27389, CVE-2024-35807, CVE-2024-27072, CVE-2024-26947, CVE-2024-26870, CVE-2024-26813, CVE-2022-48669, CVE-2024-26959, CVE-2024-26810) Update Instructions: Run `sudo pro fix USN-6817-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-modules-ipu6-6.8.0-1006-oem - 6.8.0-1006.6 linux-image-6.8.0-1006-oem - 6.8.0-1006.6 linux-tools-6.8.0-1006-oem - 6.8.0-1006.6 linux-headers-6.8.0-1006-oem - 6.8.0-1006.6 linux-image-uc-6.8.0-1006-oem - 6.8.0-1006.6 linux-oem-6.8-tools-6.8.0-1006 - 6.8.0-1006.6 linux-oem-6.8-headers-6.8.0-1006 - 6.8.0-1006.6 linux-image-unsigned-6.8.0-1006-oem - 6.8.0-1006.6 linux-buildinfo-6.8.0-1006-oem - 6.8.0-1006.6 linux-modules-iwlwifi-6.8.0-1006-oem - 6.8.0-1006.6 linux-modules-6.8.0-1006-oem - 6.8.0-1006.6 linux-modules-usbio-6.8.0-1006-oem - 6.8.0-1006.6 No subscription required linux-tools-oem-24.04 - 6.8.0-1006.6+1 linux-image-oem-24.04 - 6.8.0-1006.6+1 linux-image-uc-oem-24.04a - 6.8.0-1006.6+1 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1006.6+1 linux-image-uc-oem-24.04 - 6.8.0-1006.6+1 linux-image-oem-24.04a - 6.8.0-1006.6+1 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1006.6+1 linux-modules-usbio-oem-24.04 - 6.8.0-1006.6+1 linux-modules-ipu6-oem-24.04a - 6.8.0-1006.6+1 linux-headers-oem-24.04a - 6.8.0-1006.6+1 linux-tools-oem-24.04a - 6.8.0-1006.6+1 linux-modules-usbio-oem-24.04a - 6.8.0-1006.6+1 linux-oem-24.04a - 6.8.0-1006.6+1 linux-modules-ipu6-oem-24.04 - 6.8.0-1006.6+1 linux-oem-24.04 - 6.8.0-1006.6+1 linux-headers-oem-24.04 - 6.8.0-1006.6+1 No subscription required High CVE-2022-38096 CVE-2022-48669 CVE-2023-47233 CVE-2023-52644 CVE-2023-52647 CVE-2023-52648 CVE-2023-52649 CVE-2023-52650 CVE-2023-52652 CVE-2023-52653 CVE-2023-52659 CVE-2023-52661 CVE-2023-52662 CVE-2023-52663 CVE-2023-6270 CVE-2023-7042 CVE-2024-23307 CVE-2024-24861 CVE-2024-25739 CVE-2024-26651 CVE-2024-26653 CVE-2024-26654 CVE-2024-26655 CVE-2024-26656 CVE-2024-26657 CVE-2024-26809 CVE-2024-26810 CVE-2024-26812 CVE-2024-26813 CVE-2024-26814 CVE-2024-26815 CVE-2024-26816 CVE-2024-26848 CVE-2024-26859 CVE-2024-26860 CVE-2024-26861 CVE-2024-26862 CVE-2024-26863 CVE-2024-26864 CVE-2024-26865 CVE-2024-26866 CVE-2024-26868 CVE-2024-26869 CVE-2024-26870 CVE-2024-26871 CVE-2024-26872 CVE-2024-26873 CVE-2024-26874 CVE-2024-26875 CVE-2024-26876 CVE-2024-26877 CVE-2024-26878 CVE-2024-26879 CVE-2024-26880 CVE-2024-26881 CVE-2024-26882 CVE-2024-26883 CVE-2024-26884 CVE-2024-26885 CVE-2024-26886 CVE-2024-26887 CVE-2024-26888 CVE-2024-26889 CVE-2024-26890 CVE-2024-26891 CVE-2024-26892 CVE-2024-26893 CVE-2024-26894 CVE-2024-26895 CVE-2024-26896 CVE-2024-26897 CVE-2024-26898 CVE-2024-26899 CVE-2024-26900 CVE-2024-26901 CVE-2024-26927 CVE-2024-26929 CVE-2024-26930 CVE-2024-26931 CVE-2024-26932 CVE-2024-26933 CVE-2024-26934 CVE-2024-26935 CVE-2024-26937 CVE-2024-26938 CVE-2024-26939 CVE-2024-26940 CVE-2024-26941 CVE-2024-26942 CVE-2024-26943 CVE-2024-26944 CVE-2024-26945 CVE-2024-26946 CVE-2024-26947 CVE-2024-26948 CVE-2024-26949 CVE-2024-26950 CVE-2024-26951 CVE-2024-26952 CVE-2024-26953 CVE-2024-26954 CVE-2024-26955 CVE-2024-26956 CVE-2024-26957 CVE-2024-26958 CVE-2024-26959 CVE-2024-26960 CVE-2024-26961 CVE-2024-26962 CVE-2024-26963 CVE-2024-26964 CVE-2024-26965 CVE-2024-26966 CVE-2024-26967 CVE-2024-26968 CVE-2024-26969 CVE-2024-26970 CVE-2024-26971 CVE-2024-26972 CVE-2024-26973 CVE-2024-26975 CVE-2024-26976 CVE-2024-26977 CVE-2024-26978 CVE-2024-27026 CVE-2024-27027 CVE-2024-27028 CVE-2024-27029 CVE-2024-27030 CVE-2024-27031 CVE-2024-27032 CVE-2024-27033 CVE-2024-27034 CVE-2024-27035 CVE-2024-27036 CVE-2024-27037 CVE-2024-27038 CVE-2024-27039 CVE-2024-27040 CVE-2024-27041 CVE-2024-27042 CVE-2024-27043 CVE-2024-27044 CVE-2024-27045 CVE-2024-27046 CVE-2024-27047 CVE-2024-27048 CVE-2024-27049 CVE-2024-27050 CVE-2024-27051 CVE-2024-27052 CVE-2024-27053 CVE-2024-27054 CVE-2024-27058 CVE-2024-27063 CVE-2024-27064 CVE-2024-27065 CVE-2024-27066 CVE-2024-27067 CVE-2024-27068 CVE-2024-27069 CVE-2024-27070 CVE-2024-27071 CVE-2024-27072 CVE-2024-27073 CVE-2024-27074 CVE-2024-27075 CVE-2024-27076 CVE-2024-27077 CVE-2024-27078 CVE-2024-27079 CVE-2024-27080 CVE-2024-27388 CVE-2024-27389 CVE-2024-27390 CVE-2024-27391 CVE-2024-27392 CVE-2024-27432 CVE-2024-27433 CVE-2024-27434 CVE-2024-27435 CVE-2024-27436 CVE-2024-27437 CVE-2024-35787 CVE-2024-35788 CVE-2024-35789 CVE-2024-35793 CVE-2024-35794 CVE-2024-35795 CVE-2024-35796 CVE-2024-35797 CVE-2024-35798 CVE-2024-35799 CVE-2024-35800 CVE-2024-35801 CVE-2024-35803 CVE-2024-35805 CVE-2024-35806 CVE-2024-35807 CVE-2024-35808 CVE-2024-35809 CVE-2024-35810 CVE-2024-35811 CVE-2024-35813 CVE-2024-35814 CVE-2024-35817 CVE-2024-35819 CVE-2024-35821 CVE-2024-35822 CVE-2024-35826 CVE-2024-35827 CVE-2024-35828 CVE-2024-35829 CVE-2024-35830 CVE-2024-35831 CVE-2024-35843 CVE-2024-35844 CVE-2024-35845 CVE-2024-35874 USN-6817-3 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Ziming Zhang discovered that the DRM driver for VMware Virtual GPU did not properly handle certain error conditions, leading to a NULL pointer dereference. A local attacker could possibly trigger this vulnerability to cause a denial of service. (CVE-2022-38096) Zheng Wang discovered that the Broadcom FullMAC WLAN driver in the Linux kernel contained a race condition during device removal, leading to a use- after-free vulnerability. A physically proximate attacker could possibly use this to cause a denial of service (system crash). (CVE-2023-47233) It was discovered that the ATA over Ethernet (AoE) driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2023-6270) It was discovered that the Atheros 802.11ac wireless driver did not properly validate certain data structures, leading to a NULL pointer dereference. An attacker could possibly use this to cause a denial of service. (CVE-2023-7042) Gui-Dong Han discovered that the software RAID driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. A privileged attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-23307) Bai Jiaju discovered that the Xceive XC4000 silicon tuner device driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-24861) Chenyuan Yang discovered that the Unsorted Block Images (UBI) flash device volume management subsystem did not properly validate logical eraseblock sizes in certain situations. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-25739) It was discovered that the MediaTek SoC Gigabit Ethernet driver in the Linux kernel contained a race condition when stopping the device. A local attacker could possibly use this to cause a denial of service (device unavailability). (CVE-2024-27432) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - PowerPC architecture; - x86 architecture; - Block layer subsystem; - ACPI drivers; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Cryptographic API; - DPLL subsystem; - ARM SCMI message protocol; - EFI core; - GPU drivers; - InfiniBand drivers; - IOMMU subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - MMC subsystem; - Network drivers; - NTB driver; - NVME drivers; - PCI subsystem; - Powercap sysfs driver; - SCSI drivers; - Freescale SoC drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - TTY drivers; - USB subsystem; - DesignWare USB3 driver; - VFIO drivers; - Backlight driver; - Virtio drivers; - Xen hypervisor drivers; - AFS file system; - File systems infrastructure; - BTRFS file system; - debug file system; - Ext4 file system; - F2FS file system; - FAT file system; - Network file system client; - NILFS2 file system; - Overlay file system; - Pstore file system; - Diskquota system; - SMB network file system; - UBI file system; - io_uring subsystem; - BPF subsystem; - Core kernel; - Memory management; - Bluetooth subsystem; - Networking core; - HSR network protocol; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - IEEE 802.15.4 subsystem; - Netfilter; - Packet sockets; - Network traffic control; - Sun RPC protocol; - ALSA SH drivers; - SOF drivers; - USB sound devices; - KVM core; (CVE-2024-26859, CVE-2024-26944, CVE-2024-27049, CVE-2024-26868, CVE-2024-26932, CVE-2024-35843, CVE-2024-35814, CVE-2024-26866, CVE-2024-26941, CVE-2024-27080, CVE-2024-26938, CVE-2024-26889, CVE-2024-27075, CVE-2024-27077, CVE-2024-26864, CVE-2024-35787, CVE-2024-27071, CVE-2024-26880, CVE-2024-26961, CVE-2024-26945, CVE-2024-26863, CVE-2024-35795, CVE-2024-27045, CVE-2024-27066, CVE-2024-27046, CVE-2024-26816, CVE-2024-27069, CVE-2024-26861, CVE-2024-26968, CVE-2024-26963, CVE-2024-26878, CVE-2024-27073, CVE-2024-35806, CVE-2024-26951, CVE-2024-26954, CVE-2024-27026, CVE-2024-26956, CVE-2024-35811, CVE-2024-35803, CVE-2024-26964, CVE-2024-26848, CVE-2024-27434, CVE-2024-35844, CVE-2024-26977, CVE-2024-27031, CVE-2024-35813, CVE-2024-26960, CVE-2024-27067, CVE-2024-26937, CVE-2024-26884, CVE-2024-26656, CVE-2024-27068, CVE-2024-26871, CVE-2023-52653, CVE-2024-26939, CVE-2024-26967, CVE-2024-26966, CVE-2024-27043, CVE-2024-26814, CVE-2024-35829, CVE-2024-26973, CVE-2024-35810, CVE-2024-26877, CVE-2024-27392, CVE-2024-35805, CVE-2024-26875, CVE-2024-26970, CVE-2024-26657, CVE-2024-26874, CVE-2024-26971, CVE-2024-26872, CVE-2024-35798, CVE-2024-26931, CVE-2024-26948, CVE-2024-26883, CVE-2024-26955, CVE-2024-27039, CVE-2024-27038, CVE-2024-27065, CVE-2024-26899, CVE-2024-27048, CVE-2024-35874, CVE-2024-35845, CVE-2024-35799, CVE-2024-35827, CVE-2024-26935, CVE-2024-27079, CVE-2024-35821, CVE-2024-26950, CVE-2024-26879, CVE-2024-26940, CVE-2024-35788, CVE-2024-26891, CVE-2024-27063, CVE-2024-27433, CVE-2024-27036, CVE-2024-35819, CVE-2024-26969, CVE-2024-27044, CVE-2024-27028, CVE-2024-27070, CVE-2023-52649, CVE-2024-27435, CVE-2024-35830, CVE-2024-26929, CVE-2024-26653, CVE-2024-26887, CVE-2024-26869, CVE-2024-26942, CVE-2024-35822, CVE-2024-26979, CVE-2024-26881, CVE-2024-26655, CVE-2024-26975, CVE-2023-52650, CVE-2024-26651, CVE-2024-35828, CVE-2024-26965, CVE-2024-27437, CVE-2024-35794, CVE-2024-26962, CVE-2024-27058, CVE-2024-27076, CVE-2024-27035, CVE-2024-27074, CVE-2024-27027, CVE-2024-26860, CVE-2024-27042, CVE-2024-27390, CVE-2024-26815, CVE-2023-52662, CVE-2024-27051, CVE-2024-35796, CVE-2024-27047, CVE-2024-26930, CVE-2024-26865, CVE-2024-27064, CVE-2024-35826, CVE-2024-26885, CVE-2024-26873, CVE-2024-26943, CVE-2024-26893, CVE-2024-27030, CVE-2024-26976, CVE-2024-35793, CVE-2024-26952, CVE-2023-52644, CVE-2024-35797, CVE-2024-27029, CVE-2024-26927, CVE-2024-26812, CVE-2024-27432, CVE-2024-26897, CVE-2024-26890, CVE-2024-26972, CVE-2024-35800, CVE-2024-27032, CVE-2024-27052, CVE-2023-52647, CVE-2024-26898, CVE-2023-52652, CVE-2024-35808, CVE-2024-26876, CVE-2024-26933, CVE-2024-26862, CVE-2024-27033, CVE-2023-52663, CVE-2024-27041, CVE-2023-52648, CVE-2024-26888, CVE-2024-26957, CVE-2024-26953, CVE-2023-52659, CVE-2024-27436, CVE-2024-27040, CVE-2024-27054, CVE-2024-27050, CVE-2024-26886, CVE-2023-52661, CVE-2024-35831, CVE-2024-26946, CVE-2024-26949, CVE-2024-26809, CVE-2024-26892, CVE-2024-26654, CVE-2024-26901, CVE-2024-27053, CVE-2024-26882, CVE-2024-35809, CVE-2024-26978, CVE-2024-27037, CVE-2024-27391, CVE-2024-27034, CVE-2024-26895, CVE-2024-35817, CVE-2024-26900, CVE-2024-26896, CVE-2024-26958, CVE-2024-35801, CVE-2024-27388, CVE-2024-26934, CVE-2024-27078, CVE-2024-35789, CVE-2024-26894, CVE-2024-27389, CVE-2024-35807, CVE-2024-27072, CVE-2024-26947, CVE-2024-26870, CVE-2024-26813, CVE-2022-48669, CVE-2024-26959, CVE-2024-26810) Update Instructions: Run `sudo pro fix USN-6817-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-gke-headers-6.8.0-1004 - 6.8.0-1004.7 linux-modules-iwlwifi-6.8.0-1004-gke - 6.8.0-1004.7 linux-tools-gke - 6.8.0-1004.7 linux-image-6.8.0-1004-gke - 6.8.0-1004.7 linux-modules-extra-6.8.0-1004-gke - 6.8.0-1004.7 linux-gke - 6.8.0-1004.7 linux-buildinfo-6.8.0-1004-gke - 6.8.0-1004.7 linux-image-gke - 6.8.0-1004.7 linux-gke-tools-6.8.0-1004 - 6.8.0-1004.7 linux-headers-gke - 6.8.0-1004.7 linux-modules-6.8.0-1004-gke - 6.8.0-1004.7 linux-modules-iwlwifi-gke - 6.8.0-1004.7 linux-headers-6.8.0-1004-gke - 6.8.0-1004.7 linux-image-unsigned-6.8.0-1004-gke - 6.8.0-1004.7 linux-tools-6.8.0-1004-gke - 6.8.0-1004.7 No subscription required linux-image-6.8.0-1008-azure - 6.8.0-1008.8 linux-image-azure-fde - 6.8.0-1008.8 linux-azure-tools-6.8.0-1008 - 6.8.0-1008.8 linux-azure - 6.8.0-1008.8 linux-azure-headers-6.8.0-1008 - 6.8.0-1008.8 linux-image-azure - 6.8.0-1008.8 linux-modules-iwlwifi-6.8.0-1008-azure - 6.8.0-1008.8 linux-cloud-tools-azure - 6.8.0-1008.8 linux-headers-6.8.0-1008-azure - 6.8.0-1008.8 linux-tools-azure - 6.8.0-1008.8 linux-modules-iwlwifi-azure - 6.8.0-1008.8 linux-image-unsigned-6.8.0-1008-azure - 6.8.0-1008.8 linux-modules-extra-azure - 6.8.0-1008.8 linux-image-6.8.0-1008-azure-fde - 6.8.0-1008.8 linux-buildinfo-6.8.0-1008-azure - 6.8.0-1008.8 linux-azure-fde - 6.8.0-1008.8 linux-tools-6.8.0-1008-azure - 6.8.0-1008.8 linux-modules-6.8.0-1008-azure - 6.8.0-1008.8 linux-azure-cloud-tools-6.8.0-1008 - 6.8.0-1008.8 linux-headers-azure - 6.8.0-1008.8 linux-cloud-tools-6.8.0-1008-azure - 6.8.0-1008.8 linux-modules-extra-6.8.0-1008-azure - 6.8.0-1008.8 No subscription required High CVE-2022-38096 CVE-2022-48669 CVE-2023-47233 CVE-2023-52644 CVE-2023-52647 CVE-2023-52648 CVE-2023-52649 CVE-2023-52650 CVE-2023-52652 CVE-2023-52653 CVE-2023-52659 CVE-2023-52661 CVE-2023-52662 CVE-2023-52663 CVE-2023-6270 CVE-2023-7042 CVE-2024-23307 CVE-2024-24861 CVE-2024-25739 CVE-2024-26651 CVE-2024-26653 CVE-2024-26654 CVE-2024-26655 CVE-2024-26656 CVE-2024-26657 CVE-2024-26809 CVE-2024-26810 CVE-2024-26812 CVE-2024-26813 CVE-2024-26814 CVE-2024-26815 CVE-2024-26816 CVE-2024-26848 CVE-2024-26859 CVE-2024-26860 CVE-2024-26861 CVE-2024-26862 CVE-2024-26863 CVE-2024-26864 CVE-2024-26865 CVE-2024-26866 CVE-2024-26868 CVE-2024-26869 CVE-2024-26870 CVE-2024-26871 CVE-2024-26872 CVE-2024-26873 CVE-2024-26874 CVE-2024-26875 CVE-2024-26876 CVE-2024-26877 CVE-2024-26878 CVE-2024-26879 CVE-2024-26880 CVE-2024-26881 CVE-2024-26882 CVE-2024-26883 CVE-2024-26884 CVE-2024-26885 CVE-2024-26886 CVE-2024-26887 CVE-2024-26888 CVE-2024-26889 CVE-2024-26890 CVE-2024-26891 CVE-2024-26892 CVE-2024-26893 CVE-2024-26894 CVE-2024-26895 CVE-2024-26896 CVE-2024-26897 CVE-2024-26898 CVE-2024-26899 CVE-2024-26900 CVE-2024-26901 CVE-2024-26927 CVE-2024-26929 CVE-2024-26930 CVE-2024-26931 CVE-2024-26932 CVE-2024-26933 CVE-2024-26934 CVE-2024-26935 CVE-2024-26937 CVE-2024-26938 CVE-2024-26939 CVE-2024-26940 CVE-2024-26941 CVE-2024-26942 CVE-2024-26943 CVE-2024-26944 CVE-2024-26945 CVE-2024-26946 CVE-2024-26947 CVE-2024-26948 CVE-2024-26949 CVE-2024-26950 CVE-2024-26951 CVE-2024-26952 CVE-2024-26953 CVE-2024-26954 CVE-2024-26955 CVE-2024-26956 CVE-2024-26957 CVE-2024-26958 CVE-2024-26959 CVE-2024-26960 CVE-2024-26961 CVE-2024-26962 CVE-2024-26963 CVE-2024-26964 CVE-2024-26965 CVE-2024-26966 CVE-2024-26967 CVE-2024-26968 CVE-2024-26969 CVE-2024-26970 CVE-2024-26971 CVE-2024-26972 CVE-2024-26973 CVE-2024-26975 CVE-2024-26976 CVE-2024-26977 CVE-2024-26978 CVE-2024-27026 CVE-2024-27027 CVE-2024-27028 CVE-2024-27029 CVE-2024-27030 CVE-2024-27031 CVE-2024-27032 CVE-2024-27033 CVE-2024-27034 CVE-2024-27035 CVE-2024-27036 CVE-2024-27037 CVE-2024-27038 CVE-2024-27039 CVE-2024-27040 CVE-2024-27041 CVE-2024-27042 CVE-2024-27043 CVE-2024-27044 CVE-2024-27045 CVE-2024-27046 CVE-2024-27047 CVE-2024-27048 CVE-2024-27049 CVE-2024-27050 CVE-2024-27051 CVE-2024-27052 CVE-2024-27053 CVE-2024-27054 CVE-2024-27058 CVE-2024-27063 CVE-2024-27064 CVE-2024-27065 CVE-2024-27066 CVE-2024-27067 CVE-2024-27068 CVE-2024-27069 CVE-2024-27070 CVE-2024-27071 CVE-2024-27072 CVE-2024-27073 CVE-2024-27074 CVE-2024-27075 CVE-2024-27076 CVE-2024-27077 CVE-2024-27078 CVE-2024-27079 CVE-2024-27080 CVE-2024-27388 CVE-2024-27389 CVE-2024-27390 CVE-2024-27391 CVE-2024-27392 CVE-2024-27432 CVE-2024-27433 CVE-2024-27434 CVE-2024-27435 CVE-2024-27436 CVE-2024-27437 CVE-2024-35787 CVE-2024-35788 CVE-2024-35789 CVE-2024-35793 CVE-2024-35794 CVE-2024-35795 CVE-2024-35796 CVE-2024-35797 CVE-2024-35798 CVE-2024-35799 CVE-2024-35800 CVE-2024-35801 CVE-2024-35803 CVE-2024-35805 CVE-2024-35806 CVE-2024-35807 CVE-2024-35808 CVE-2024-35809 CVE-2024-35810 CVE-2024-35811 CVE-2024-35813 CVE-2024-35814 CVE-2024-35817 CVE-2024-35819 CVE-2024-35821 CVE-2024-35822 CVE-2024-35826 CVE-2024-35827 CVE-2024-35828 CVE-2024-35829 CVE-2024-35830 CVE-2024-35831 CVE-2024-35843 CVE-2024-35844 CVE-2024-35845 CVE-2024-35874 USN-6823-1 -- MySQL vulnerabilities Ubuntu 24.04 LTS Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 8.0.37 in Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 23.10, and Ubuntu 24.04 LTS. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information: https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-37.html https://www.oracle.com/security-alerts/cpuapr2024.html Update Instructions: Run `sudo pro fix USN-6823-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: mysql-client - 8.0.37-0ubuntu0.24.04.1 libmysqlclient-dev - 8.0.37-0ubuntu0.24.04.1 mysql-testsuite-8.0 - 8.0.37-0ubuntu0.24.04.1 mysql-router - 8.0.37-0ubuntu0.24.04.1 mysql-server - 8.0.37-0ubuntu0.24.04.1 libmysqlclient21 - 8.0.37-0ubuntu0.24.04.1 mysql-client-core-8.0 - 8.0.37-0ubuntu0.24.04.1 mysql-server-core-8.0 - 8.0.37-0ubuntu0.24.04.1 mysql-server-8.0 - 8.0.37-0ubuntu0.24.04.1 mysql-testsuite - 8.0.37-0ubuntu0.24.04.1 mysql-client-8.0 - 8.0.37-0ubuntu0.24.04.1 mysql-source-8.0 - 8.0.37-0ubuntu0.24.04.1 No subscription required Medium CVE-2024-20994 CVE-2024-20998 CVE-2024-21000 CVE-2024-21008 CVE-2024-21009 CVE-2024-21013 CVE-2024-21047 CVE-2024-21054 CVE-2024-21060 CVE-2024-21062 CVE-2024-21069 CVE-2024-21087 CVE-2024-21096 CVE-2024-21102 USN-6827-1 -- LibTIFF vulnerability Ubuntu 24.04 LTS It was discovered that LibTIFF incorrectly handled memory when performing certain cropping operations, leading to a heap buffer overflow. An attacker could use this issue to cause a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6827-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libtiff-opengl - 4.5.1+git230720-4ubuntu2.1 libtiff5-dev - 4.5.1+git230720-4ubuntu2.1 libtiff-dev - 4.5.1+git230720-4ubuntu2.1 libtiffxx6 - 4.5.1+git230720-4ubuntu2.1 libtiff6 - 4.5.1+git230720-4ubuntu2.1 libtiff-tools - 4.5.1+git230720-4ubuntu2.1 libtiff-doc - 4.5.1+git230720-4ubuntu2.1 No subscription required Low CVE-2023-3164 USN-6830-1 -- libndp vulnerability Ubuntu 24.04 LTS It was discovered that libndp incorrectly handled certain malformed IPv6 router advertisement packets. A local attacker could use this issue to cause NetworkManager to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6830-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libndp0 - 1.8-1fakesync1ubuntu0.24.04.1 libndp-dev - 1.8-1fakesync1ubuntu0.24.04.1 libndp-tools - 1.8-1fakesync1ubuntu0.24.04.1 No subscription required Medium CVE-2024-5564 USN-6832-1 -- Virtuoso Open-Source Edition vulnerabilities Ubuntu 24.04 LTS Jingzhou Fu discovered that Virtuoso Open-Source Edition incorrectly handled certain crafted SQL statements. An attacker could possibly use this issue to crash the program, resulting in a denial of service. (CVE-2023-31607, CVE-2023-31608, CVE-2023-31609, CVE-2023-31610, CVE-2023-31611, CVE-2023-31616, CVE-2023-31617, CVE-2023-31618, CVE-2023-31619, CVE-2023-31623, CVE-2023-31625, CVE-2023-31628) Jingzhou Fu discovered that Virtuoso Open-Source Edition incorrectly handled certain crafted SQL statements. An attacker could possibly use this issue to crash the program, resulting in a denial of service. This issue only affects Ubuntu 22.04 LTS, Ubuntu 23.10 and Ubuntu 24.04 LTS. (CVE-2023-31612, CVE-2023-31613, CVE-2023-31614, CVE-2023-31615) Update Instructions: Run `sudo pro fix USN-6832-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: virtuoso-vad-demo - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vad-sparqldemo - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vad-rdfmappers - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vsp-startpage - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vad-isparql - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-opensource-7-bin - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-server - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vad-tutorial - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-minimal - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-opensource - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vad-ods - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-opensource-7 - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vad-syncml - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vad-doc - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vad-conductor - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 libvirtodbc0 - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 libvirtuoso5.5-cil - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vad-bpel - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-opensource-7-common - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2023-31607 CVE-2023-31608 CVE-2023-31609 CVE-2023-31610 CVE-2023-31611 CVE-2023-31612 CVE-2023-31613 CVE-2023-31614 CVE-2023-31615 CVE-2023-31616 CVE-2023-31617 CVE-2023-31618 CVE-2023-31619 CVE-2023-31623 CVE-2023-31625 CVE-2023-31628 USN-6833-1 -- VTE vulnerability Ubuntu 24.04 LTS Siddharth Dushantha discovered that VTE incorrectly handled large window resize escape sequences. An attacker could possibly use this issue to consume resources, leading to a denial of service. Update Instructions: Run `sudo pro fix USN-6833-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libvte-2.91-gtk4-dev - 0.76.0-1ubuntu0.1 libvte-2.91-common - 0.76.0-1ubuntu0.1 gir1.2-vte-3.91 - 0.76.0-1ubuntu0.1 gir1.2-vte-2.91 - 0.76.0-1ubuntu0.1 libvte-2.91-doc - 0.76.0-1ubuntu0.1 libvte-2.91-gtk4-0 - 0.76.0-1ubuntu0.1 libvte-2.91-0 - 0.76.0-1ubuntu0.1 libvte-2.91-gtk4-doc - 0.76.0-1ubuntu0.1 libvte-2.91-dev - 0.76.0-1ubuntu0.1 No subscription required Medium CVE-2024-37535 USN-6835-1 -- Ghostscript vulnerabilities Ubuntu 24.04 LTS It was discovered that Ghostscript did not properly restrict eexec seeds to those specified by the Type 1 Font Format standard when SAFER mode is used. An attacker could use this issue to bypass SAFER restrictions and cause unspecified impact. (CVE-2023-52722) This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 23.10. Thomas Rinsma discovered that Ghostscript did not prevent changes to uniprint device argument strings after SAFER is activated, resulting in a format-string vulnerability. An attacker could possibly use this to execute arbitrary code. (CVE-2024-29510) Zdenek Hutyra discovered that Ghostscript did not properly perform path reduction when validating paths. An attacker could use this to access file locations outside of those allowed by SAFER policy and possibly execute arbitrary code. (CVE-2024-33869) Zdenek Hutyra discovered that Ghostscript did not properly check arguments when reducing paths. An attacker could use this to access file locations outside of those allowed by SAFER policy. (CVE-2024-33870) Zdenek Hutyra discovered that the "Driver" parameter for Ghostscript's "opvp"/"oprp" device allowed specifying the name of an arbitrary dynamic library to load. An attacker could use this to execute arbitrary code. (CVE-2024-33871) Update Instructions: Run `sudo pro fix USN-6835-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ghostscript - 10.02.1~dfsg1-0ubuntu7.1 libgs10-common - 10.02.1~dfsg1-0ubuntu7.1 libgs10 - 10.02.1~dfsg1-0ubuntu7.1 libgs-common - 10.02.1~dfsg1-0ubuntu7.1 libgs-dev - 10.02.1~dfsg1-0ubuntu7.1 ghostscript-doc - 10.02.1~dfsg1-0ubuntu7.1 No subscription required Medium CVE-2023-52722 CVE-2024-29510 CVE-2024-33869 CVE-2024-33870 CVE-2024-33871 USN-6836-1 -- SSSD vulnerability Ubuntu 24.04 LTS It was discovered that SSSD did not always correctly apply the GPO policy for authenticated users, contrary to expectations. This could result in improper authorization or improper access to resources. Update Instructions: Run `sudo pro fix USN-6836-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libsss-certmap-dev - 2.9.4-1.1ubuntu6.1 libipa-hbac-dev - 2.9.4-1.1ubuntu6.1 sssd-ad - 2.9.4-1.1ubuntu6.1 libsss-sudo - 2.9.4-1.1ubuntu6.1 libsss-nss-idmap0 - 2.9.4-1.1ubuntu6.1 libnss-sss - 2.9.4-1.1ubuntu6.1 sssd-ipa - 2.9.4-1.1ubuntu6.1 sssd-passkey - 2.9.4-1.1ubuntu6.1 libipa-hbac0t64 - 2.9.4-1.1ubuntu6.1 libsss-idmap-dev - 2.9.4-1.1ubuntu6.1 python3-libsss-nss-idmap - 2.9.4-1.1ubuntu6.1 sssd-common - 2.9.4-1.1ubuntu6.1 python3-sss - 2.9.4-1.1ubuntu6.1 libpam-sss - 2.9.4-1.1ubuntu6.1 sssd - 2.9.4-1.1ubuntu6.1 libsss-idmap0 - 2.9.4-1.1ubuntu6.1 sssd-idp - 2.9.4-1.1ubuntu6.1 libsss-nss-idmap-dev - 2.9.4-1.1ubuntu6.1 sssd-kcm - 2.9.4-1.1ubuntu6.1 libsss-certmap0 - 2.9.4-1.1ubuntu6.1 python3-libipa-hbac - 2.9.4-1.1ubuntu6.1 sssd-ldap - 2.9.4-1.1ubuntu6.1 sssd-tools - 2.9.4-1.1ubuntu6.1 sssd-ad-common - 2.9.4-1.1ubuntu6.1 sssd-krb5-common - 2.9.4-1.1ubuntu6.1 sssd-dbus - 2.9.4-1.1ubuntu6.1 sssd-krb5 - 2.9.4-1.1ubuntu6.1 sssd-proxy - 2.9.4-1.1ubuntu6.1 No subscription required Medium CVE-2023-3758 USN-6837-1 -- Rack vulnerabilities Ubuntu 24.04 LTS It was discovered that Rack incorrectly handled Multipart MIME parsing. A remote attacker could possibly use this issue to cause Rack to consume resources, leading to a denial of service. This issue only affected Ubuntu 23.10. (CVE-2023-27530) It was discovered that Rack incorrectly parsed certain media types. A remote attacker could possibly use this issue to cause Rack to consume resources, leading to a denial of service. (CVE-2024-25126) It was discovered that Rack incorrectly handled certain Range headers. A remote attacker could possibly use this issue to cause Rack to create large responses, leading to a denial of service. This issue only affected Ubuntu 24.04 LTS. (CVE-2024-26141) It was discovered that Rack incorrectly handled certain crafted headers. A remote attacker could possibly use this issue to cause Rack to consume resources, leading to a denial of service. This issue only affected Ubuntu 24.04 LTS. (CVE-2024-26146) Update Instructions: Run `sudo pro fix USN-6837-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ruby-rack - 2.2.7-1ubuntu0.1 No subscription required Medium CVE-2023-27530 CVE-2024-25126 CVE-2024-26141 CVE-2024-26146 USN-6838-1 -- Ruby vulnerabilities Ubuntu 24.04 LTS It was discovered that Ruby RDoc incorrectly parsed certain YAML files. If a user or automated system were tricked into parsing a specially crafted .rdoc_options file, a remote attacker could possibly use this issue to execute arbitrary code. (CVE-2024-27281) It was discovered that the Ruby regex compiler incorrectly handled certain memory operations. A remote attacker could possibly use this issue to obtain sensitive memory contents. (CVE-2024-27282) Update Instructions: Run `sudo pro fix USN-6838-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ruby3.2 - 3.2.3-1ubuntu0.24.04.1 ruby3.2-doc - 3.2.3-1ubuntu0.24.04.1 ruby3.2-dev - 3.2.3-1ubuntu0.24.04.1 libruby3.2 - 3.2.3-1ubuntu0.24.04.1 No subscription required Medium CVE-2024-27281 CVE-2024-27282 USN-6839-1 -- MariaDB vulnerability Ubuntu 24.04 LTS A security issue was discovered in MariaDB and this update includes new upstream MariaDB versions to fix the issue. MariaDB has been updated to 10.6.18 in Ubuntu 22.04 LTS and to 10.11.8 in Ubuntu 23.10 and Ubuntu 24.04 LTS. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Update Instructions: Run `sudo pro fix USN-6839-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: mariadb-plugin-provider-lzo - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-cracklib-password-check - 1:10.11.8-0ubuntu0.24.04.1 mariadb-backup - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-connect - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-spider - 1:10.11.8-0ubuntu0.24.04.1 libmariadb-dev - 1:10.11.8-0ubuntu0.24.04.1 libmariadb3 - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-s3 - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-provider-bzip2 - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-provider-lzma - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-provider-snappy - 1:10.11.8-0ubuntu0.24.04.1 mariadb-client - 1:10.11.8-0ubuntu0.24.04.1 libmariadbd19t64 - 1:10.11.8-0ubuntu0.24.04.1 mariadb-server-core - 1:10.11.8-0ubuntu0.24.04.1 mariadb-server-10.5 - 1:10.11.8-0ubuntu0.24.04.1 mariadb-test-data - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-provider-lz4 - 1:10.11.8-0ubuntu0.24.04.1 mariadb-client-core - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-rocksdb - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-gssapi-client - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-mroonga - 1:10.11.8-0ubuntu0.24.04.1 libmariadbd-dev - 1:10.11.8-0ubuntu0.24.04.1 libmariadb-dev-compat - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-gssapi-server - 1:10.11.8-0ubuntu0.24.04.1 mariadb-server - 1:10.11.8-0ubuntu0.24.04.1 mariadb-common - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-hashicorp-key-management - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-oqgraph - 1:10.11.8-0ubuntu0.24.04.1 mariadb-test - 1:10.11.8-0ubuntu0.24.04.1 No subscription required Medium CVE-2024-21096 USN-6841-1 -- PHP vulnerability Ubuntu 24.04 LTS It was discovered that PHP could early return in the filter_var function resulting in invalid user information being treated as valid user information. An attacker could possibly use this issue to expose raw user input information. Update Instructions: Run `sudo pro fix USN-6841-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: php8.3-cgi - 8.3.6-0ubuntu0.24.04.1 php8.3-xsl - 8.3.6-0ubuntu0.24.04.1 php8.3-fpm - 8.3.6-0ubuntu0.24.04.1 php8.3-phpdbg - 8.3.6-0ubuntu0.24.04.1 php8.3-zip - 8.3.6-0ubuntu0.24.04.1 php8.3-curl - 8.3.6-0ubuntu0.24.04.1 php8.3-ldap - 8.3.6-0ubuntu0.24.04.1 php8.3-gmp - 8.3.6-0ubuntu0.24.04.1 php8.3-sqlite3 - 8.3.6-0ubuntu0.24.04.1 php8.3-gd - 8.3.6-0ubuntu0.24.04.1 php8.3-common - 8.3.6-0ubuntu0.24.04.1 php8.3-enchant - 8.3.6-0ubuntu0.24.04.1 php8.3-odbc - 8.3.6-0ubuntu0.24.04.1 php8.3-cli - 8.3.6-0ubuntu0.24.04.1 php8.3-mbstring - 8.3.6-0ubuntu0.24.04.1 php8.3-pgsql - 8.3.6-0ubuntu0.24.04.1 php8.3-mysql - 8.3.6-0ubuntu0.24.04.1 php8.3-dba - 8.3.6-0ubuntu0.24.04.1 libapache2-mod-php8.3 - 8.3.6-0ubuntu0.24.04.1 php8.3-soap - 8.3.6-0ubuntu0.24.04.1 php8.3-opcache - 8.3.6-0ubuntu0.24.04.1 php8.3-sybase - 8.3.6-0ubuntu0.24.04.1 php8.3-pspell - 8.3.6-0ubuntu0.24.04.1 libphp8.3-embed - 8.3.6-0ubuntu0.24.04.1 php8.3-bz2 - 8.3.6-0ubuntu0.24.04.1 php8.3-dev - 8.3.6-0ubuntu0.24.04.1 php8.3 - 8.3.6-0ubuntu0.24.04.1 php8.3-tidy - 8.3.6-0ubuntu0.24.04.1 php8.3-interbase - 8.3.6-0ubuntu0.24.04.1 php8.3-readline - 8.3.6-0ubuntu0.24.04.1 php8.3-intl - 8.3.6-0ubuntu0.24.04.1 php8.3-imap - 8.3.6-0ubuntu0.24.04.1 php8.3-xml - 8.3.6-0ubuntu0.24.04.1 php8.3-bcmath - 8.3.6-0ubuntu0.24.04.1 php8.3-snmp - 8.3.6-0ubuntu0.24.04.1 No subscription required Medium CVE-2024-5458 USN-6843-1 -- Plasma Workspace vulnerability Ubuntu 24.04 LTS Fabian Vogt discovered that Plasma Workspace incorrectly handled connections via ICE. A local attacker could possibly use this issue to gain access to another user's session manager and execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6843-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: plasma-workspace-dev - 4:5.27.11-0ubuntu4.1 libweather-ion7 - 4:5.27.11-0ubuntu4.1 libkfontinst5 - 4:5.27.11-0ubuntu4.1 libcolorcorrect5 - 4:5.27.11-0ubuntu4.1 libkworkspace5-5 - 4:5.27.11-0ubuntu4.1 plasma-workspace-data - 4:5.27.11-0ubuntu4.1 plasma-workspace-wayland - 4:5.27.11-0ubuntu4.1 sddm-theme-breeze - 4:5.27.11-0ubuntu4.1 libplasma-geolocation-interface5 - 4:5.27.11-0ubuntu4.1 libnotificationmanager1 - 4:5.27.11-0ubuntu4.1 libkfontinstui5 - 4:5.27.11-0ubuntu4.1 libtaskmanager6 - 4:5.27.11-0ubuntu4.1 plasma-workspace - 4:5.27.11-0ubuntu4.1 No subscription required Medium CVE-2024-36041 USN-6844-1 -- CUPS vulnerability Ubuntu 24.04 LTS Rory McNamara discovered that when starting the cupsd server with a Listen configuration item, the cupsd process fails to validate if bind call passed. An attacker could possibly trick cupsd to perform an arbitrary chmod of the provided argument, providing world-writable access to the target. Update Instructions: Run `sudo pro fix USN-6844-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libcups2-dev - 2.4.7-1.2ubuntu7.1 cups-bsd - 2.4.7-1.2ubuntu7.1 cups-common - 2.4.7-1.2ubuntu7.1 cups-core-drivers - 2.4.7-1.2ubuntu7.1 cups-server-common - 2.4.7-1.2ubuntu7.1 cups-client - 2.4.7-1.2ubuntu7.1 libcupsimage2t64 - 2.4.7-1.2ubuntu7.1 libcupsimage2-dev - 2.4.7-1.2ubuntu7.1 cups-ipp-utils - 2.4.7-1.2ubuntu7.1 cups-ppdc - 2.4.7-1.2ubuntu7.1 cups - 2.4.7-1.2ubuntu7.1 libcups2t64 - 2.4.7-1.2ubuntu7.1 cups-daemon - 2.4.7-1.2ubuntu7.1 No subscription required Medium CVE-2024-35235 USN-6844-2 -- CUPS regression Ubuntu 24.04 LTS USN-6844-1 fixed vulnerabilities in the CUPS package. The update lead to the discovery of a regression in CUPS with regards to how the cupsd daemon handles Listen configuration directive. This update fixes the problem. We apologize for the inconvenience. Original advisory details: Rory McNamara discovered that when starting the cupsd server with a Listen configuration item, the cupsd process fails to validate if bind call passed. An attacker could possibly trick cupsd to perform an arbitrary chmod of the provided argument, providing world-writable access to the target. Update Instructions: Run `sudo pro fix USN-6844-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libcups2-dev - 2.4.7-1.2ubuntu7.2 cups-bsd - 2.4.7-1.2ubuntu7.2 cups-common - 2.4.7-1.2ubuntu7.2 cups-core-drivers - 2.4.7-1.2ubuntu7.2 cups-server-common - 2.4.7-1.2ubuntu7.2 cups-client - 2.4.7-1.2ubuntu7.2 libcupsimage2t64 - 2.4.7-1.2ubuntu7.2 libcupsimage2-dev - 2.4.7-1.2ubuntu7.2 cups-ipp-utils - 2.4.7-1.2ubuntu7.2 cups-ppdc - 2.4.7-1.2ubuntu7.2 cups - 2.4.7-1.2ubuntu7.2 libcups2t64 - 2.4.7-1.2ubuntu7.2 cups-daemon - 2.4.7-1.2ubuntu7.2 No subscription required None https://launchpad.net/bugs/2070315 USN-6851-1 -- Netplan vulnerabilities Ubuntu 24.04 LTS Andreas Hasenack discovered that netplan incorrectly handled the permissions for netdev files containing wireguard configuration. An attacker could use this to obtain wireguard secret keys. It was discovered that netplan configuration could be manipulated into injecting arbitrary commands while setting up network interfaces. An attacker could use this to execute arbitrary commands or escalate privileges. Update Instructions: Run `sudo pro fix USN-6851-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: netplan.io - 1.0-2ubuntu1.1 netplan-generator - 1.0-2ubuntu1.1 libnetplan1 - 1.0-2ubuntu1.1 python3-netplan - 1.0-2ubuntu1.1 libnetplan-dev - 1.0-2ubuntu1.1 No subscription required Medium CVE-2022-4968 https://launchpad.net/bugs/2066258 https://launchpad.net/bugs/1987842 https://launchpad.net/bugs/2065738 USN-6851-2 -- Netplan regression Ubuntu 24.04 LTS USN-6851-1 fixed vulnerabilities in Netplan. The update lead to the discovery of a regression in netplan which caused systemctl enable to fail on systems where systemd is not running. This update fixes the problem. We apologize for the inconvenience. Original advisory details: Andreas Hasenack discovered that netplan incorrectly handled the permissions for netdev files containing wireguard configuration. An attacker could use this to obtain wireguard secret keys. It was discovered that netplan configuration could be manipulated into injecting arbitrary commands while setting up network interfaces. An attacker could use this to execute arbitrary commands or escalate privileges. Update Instructions: Run `sudo pro fix USN-6851-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: netplan.io - 1.0-2ubuntu1.2 netplan-generator - 1.0-2ubuntu1.2 libnetplan1 - 1.0-2ubuntu1.2 python3-netplan - 1.0-2ubuntu1.2 libnetplan-dev - 1.0-2ubuntu1.2 No subscription required None https://launchpad.net/bugs/2071333 USN-6852-1 -- Wget vulnerability Ubuntu 24.04 LTS It was discovered that Wget incorrectly handled semicolons in the userinfo subcomponent of a URI. A remote attacker could possibly trick a user into connecting to a different host than expected. Update Instructions: Run `sudo pro fix USN-6852-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: wget - 1.21.4-1ubuntu4.1 No subscription required Medium CVE-2024-38428 USN-6855-1 -- libcdio vulnerability Ubuntu 24.04 LTS Mansour Gashasbi discovered that libcdio incorrectly handled certain memory operations when parsing an ISO file, leading to a buffer overflow vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6855-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libiso9660-dev - 2.1.0-4.1ubuntu1.2 libiso9660-11t64 - 2.1.0-4.1ubuntu1.2 libcdio-utils - 2.1.0-4.1ubuntu1.2 libcdio19t64 - 2.1.0-4.1ubuntu1.2 libiso9660++0t64 - 2.1.0-4.1ubuntu1.2 libudf-dev - 2.1.0-4.1ubuntu1.2 libcdio++1t64 - 2.1.0-4.1ubuntu1.2 libiso9660++-dev - 2.1.0-4.1ubuntu1.2 libudf0t64 - 2.1.0-4.1ubuntu1.2 libcdio++-dev - 2.1.0-4.1ubuntu1.2 libcdio-dev - 2.1.0-4.1ubuntu1.2 No subscription required Medium CVE-2024-36600 USN-6859-1 -- OpenSSH vulnerability Ubuntu 24.04 LTS It was discovered that OpenSSH incorrectly handled signal management. A remote attacker could use this issue to bypass authentication and remotely access systems without proper credentials. Update Instructions: Run `sudo pro fix USN-6859-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openssh-client - 1:9.6p1-3ubuntu13.3 openssh-server - 1:9.6p1-3ubuntu13.3 ssh-askpass-gnome - 1:9.6p1-3ubuntu13.3 ssh - 1:9.6p1-3ubuntu13.3 openssh-tests - 1:9.6p1-3ubuntu13.3 openssh-sftp-server - 1:9.6p1-3ubuntu13.3 No subscription required High CVE-2024-6387 USN-6860-1 -- OpenVPN vulnerabilities Ubuntu 24.04 LTS Reynir Björnsson discovered that OpenVPN incorrectly handled terminating client connections. A remote authenticated client could possibly use this issue to keep the connection active, bypassing certain security policies. This issue only affected Ubuntu 23.10, and Ubuntu 24.04 LTS. (CVE-2024-28882) Reynir Björnsson discovered that OpenVPN incorrectly handled certain control channel messages with nonprintable characters. A remote attacker could possibly use this issue to cause OpenVPN to consume resources, or fill up log files with garbage, leading to a denial of service. (CVE-2024-5594) Update Instructions: Run `sudo pro fix USN-6860-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openvpn - 2.6.9-1ubuntu4.1 No subscription required Medium CVE-2024-28882 CVE-2024-5594 USN-6863-1 -- Linux kernel vulnerability Ubuntu 24.04 LTS A security issue was discovered in the Linux kernel. An attacker could possibly use it to compromise the system. This update corrects flaws in the following subsystem: - Netfilter; (CVE-2024-26924) Update Instructions: Run `sudo pro fix USN-6863-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-headers-6.8.0-1006-raspi - 6.8.0-1006.6 linux-raspi-tools-6.8.0-1006 - 6.8.0-1006.6 linux-buildinfo-6.8.0-1006-raspi - 6.8.0-1006.6 linux-tools-raspi - 6.8.0-1006.6 linux-tools-6.8.0-1006-raspi - 6.8.0-1006.6 linux-image-6.8.0-1006-raspi - 6.8.0-1006.6 linux-headers-raspi - 6.8.0-1006.6 linux-modules-6.8.0-1006-raspi - 6.8.0-1006.6 linux-raspi-headers-6.8.0-1006 - 6.8.0-1006.6 linux-raspi - 6.8.0-1006.6 linux-image-raspi - 6.8.0-1006.6 No subscription required linux-image-ibm-lts-24.04 - 6.8.0-1007.7 linux-ibm-tools-6.8.0-1007 - 6.8.0-1007.7 linux-ibm-source-6.8.0 - 6.8.0-1007.7 linux-modules-6.8.0-1007-ibm - 6.8.0-1007.7 linux-headers-6.8.0-1007-ibm - 6.8.0-1007.7 linux-tools-6.8.0-1007-ibm - 6.8.0-1007.7 linux-image-unsigned-6.8.0-1007-ibm - 6.8.0-1007.7 linux-tools-ibm-lts-24.04 - 6.8.0-1007.7 linux-image-6.8.0-1007-ibm - 6.8.0-1007.7 linux-modules-extra-6.8.0-1007-ibm - 6.8.0-1007.7 linux-image-ibm - 6.8.0-1007.7 linux-image-ibm-classic - 6.8.0-1007.7 linux-headers-ibm-lts-24.04 - 6.8.0-1007.7 linux-tools-ibm-classic - 6.8.0-1007.7 linux-tools-ibm - 6.8.0-1007.7 linux-ibm-lts-24.04 - 6.8.0-1007.7 linux-ibm-classic - 6.8.0-1007.7 linux-modules-iwlwifi-ibm - 6.8.0-1007.7 linux-modules-iwlwifi-6.8.0-1007-ibm - 6.8.0-1007.7 linux-ibm-headers-6.8.0-1007 - 6.8.0-1007.7 linux-headers-ibm-classic - 6.8.0-1007.7 linux-ibm - 6.8.0-1007.7 linux-ibm-cloud-tools-common - 6.8.0-1007.7 linux-buildinfo-6.8.0-1007-ibm - 6.8.0-1007.7 linux-headers-ibm - 6.8.0-1007.7 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1007.7 linux-modules-iwlwifi-ibm-classic - 6.8.0-1007.7 No subscription required linux-modules-extra-6.8.0-1008-nvidia - 6.8.0-1008.8 linux-image-uc-6.8.0-1008-nvidia-64k - 6.8.0-1008.8 linux-headers-6.8.0-1008-nvidia-64k - 6.8.0-1008.8 linux-tools-6.8.0-1008-nvidia - 6.8.0-1008.8 linux-image-nvidia-64k - 6.8.0-1008.8 linux-nvidia-tools-6.8.0-1008 - 6.8.0-1008.8 linux-tools-nvidia - 6.8.0-1008.8 linux-headers-6.8.0-1008-nvidia - 6.8.0-1008.8 linux-nvidia-64k - 6.8.0-1008.8 linux-cloud-tools-nvidia - 6.8.0-1008.8 linux-modules-nvidia-fs-nvidia - 6.8.0-1008.8 linux-buildinfo-6.8.0-1008-nvidia-64k - 6.8.0-1008.8 linux-modules-nvidia-fs-6.8.0-1008-nvidia-64k - 6.8.0-1008.8 linux-tools-6.8.0-1008-nvidia-64k - 6.8.0-1008.8 linux-tools-nvidia-64k - 6.8.0-1008.8 linux-nvidia-headers-6.8.0-1008 - 6.8.0-1008.8 linux-image-nvidia - 6.8.0-1008.8 linux-modules-6.8.0-1008-nvidia - 6.8.0-1008.8 linux-buildinfo-6.8.0-1008-nvidia - 6.8.0-1008.8 linux-modules-nvidia-fs-6.8.0-1008-nvidia - 6.8.0-1008.8 linux-image-6.8.0-1008-nvidia-64k - 6.8.0-1008.8 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1008.8 linux-nvidia - 6.8.0-1008.8 linux-nvidia-tools-host - 6.8.0-1008.8 linux-modules-6.8.0-1008-nvidia-64k - 6.8.0-1008.8 linux-image-unsigned-6.8.0-1008-nvidia - 6.8.0-1008.8 linux-image-uc-6.8.0-1008-nvidia - 6.8.0-1008.8 linux-headers-nvidia - 6.8.0-1008.8 linux-headers-nvidia-64k - 6.8.0-1008.8 linux-image-6.8.0-1008-nvidia - 6.8.0-1008.8 linux-image-unsigned-6.8.0-1008-nvidia-64k - 6.8.0-1008.8 No subscription required linux-generic-hwe-24.04 - 6.8.0-36.36 linux-tools-common - 6.8.0-36.36 linux-modules-6.8.0-36-generic-64k - 6.8.0-36.36 linux-image-unsigned-6.8.0-36-generic-64k - 6.8.0-36.36 linux-headers-oem-20.04 - 6.8.0-36.36 linux-cloud-tools-virtual - 6.8.0-36.36 linux-tools-generic-hwe-24.04-edge - 6.8.0-36.36 linux-headers-generic-lpae - 6.8.0-36.36 linux-modules-iwlwifi-6.8.0-36-generic - 6.8.0-36.36 linux-image-6.8.0-36-generic - 6.8.0-36.36 linux-modules-6.8.0-36-generic - 6.8.0-36.36 linux-headers-laptop-23.10 - 6.8.0-36.36 linux-kvm - 6.8.0-36.36 linux-virtual-hwe-24.04 - 6.8.0-36.36 linux-tools-generic-64k - 6.8.0-36.36 linux-image-virtual - 6.8.0-36.36 linux-tools-oem-20.04b - 6.8.0-36.36 linux-doc - 6.8.0-36.36 linux-image-generic-64k - 6.8.0-36.36 linux-modules-usbio-generic - 6.8.0-36.36 linux-image-generic - 6.8.0-36.36 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-36.36 linux-image-oem-20.04d - 6.8.0-36.36 linux-headers-virtual-hwe-24.04 - 6.8.0-36.36 linux-tools-oem-20.04d - 6.8.0-36.36 linux-headers-virtual-hwe-24.04-edge - 6.8.0-36.36 linux-tools-virtual-hwe-24.04-edge - 6.8.0-36.36 linux-cloud-tools-virtual-hwe-24.04-edge - 6.8.0-36.36 linux-image-virtual-hwe-24.04 - 6.8.0-36.36 linux-modules-ipu6-generic-hwe-24.04-edge - 6.8.0-36.36 linux-tools-oem-20.04 - 6.8.0-36.36 linux-tools-oem-20.04c - 6.8.0-36.36 linux-image-unsigned-6.8.0-36-generic - 6.8.0-36.36 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-36.36 linux-headers-generic-64k-hwe-24.04-edge - 6.8.0-36.36 linux-headers-6.8.0-36-generic - 6.8.0-36.36 linux-crashdump - 6.8.0-36.36 linux-image-extra-virtual-hwe-24.04 - 6.8.0-36.36 linux-modules-iwlwifi-oem-20.04d - 6.8.0-36.36 linux-modules-iwlwifi-generic - 6.8.0-36.36 linux-modules-extra-6.8.0-36-generic - 6.8.0-36.36 linux-image-extra-virtual-hwe-24.04-edge - 6.8.0-36.36 linux-oem-22.04 - 6.8.0-36.36 linux-cloud-tools-6.8.0-36-generic - 6.8.0-36.36 linux-image-virtual-hwe-24.04-edge - 6.8.0-36.36 linux-headers-kvm - 6.8.0-36.36 linux-tools-generic-lpae - 6.8.0-36.36 linux-cloud-tools-generic - 6.8.0-36.36 linux-virtual - 6.8.0-36.36 linux-tools-oem-22.04 - 6.8.0-36.36 linux-laptop-23.10 - 6.8.0-36.36 linux-tools-virtual - 6.8.0-36.36 linux-tools-generic - 6.8.0-36.36 linux-tools-6.8.0-36-generic-64k - 6.8.0-36.36 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-36.36 linux-image-generic-64k-hwe-24.04-edge - 6.8.0-36.36 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-36.36 linux-modules-usbio-6.8.0-36-generic - 6.8.0-36.36 linux-image-uc-generic-hwe-24.04-edge - 6.8.0-36.36 linux-image-oem-20.04c - 6.8.0-36.36 linux-image-oem-20.04b - 6.8.0-36.36 linux-generic-lpae - 6.8.0-36.36 linux-tools-host - 6.8.0-36.36 linux-image-uc-6.8.0-36-generic-64k - 6.8.0-36.36 linux-headers-generic-64k - 6.8.0-36.36 linux-headers-generic-64k-hwe-24.04 - 6.8.0-36.36 linux-oem-20.04 - 6.8.0-36.36 linux-generic - 6.8.0-36.36 linux-image-oem-20.04 - 6.8.0-36.36 linux-oem-20.04d - 6.8.0-36.36 linux-headers-generic-hwe-24.04 - 6.8.0-36.36 linux-oem-20.04c - 6.8.0-36.36 linux-image-oem-22.04 - 6.8.0-36.36 linux-image-uc-generic - 6.8.0-36.36 linux-generic-64k-hwe-24.04-edge - 6.8.0-36.36 linux-lib-rust-6.8.0-36-generic - 6.8.0-36.36 linux-image-generic-hwe-24.04 - 6.8.0-36.36 linux-headers-6.8.0-36 - 6.8.0-36.36 linux-modules-ipu6-6.8.0-36-generic - 6.8.0-36.36 linux-virtual-hwe-24.04-edge - 6.8.0-36.36 linux-cloud-tools-common - 6.8.0-36.36 linux-image-generic-lpae - 6.8.0-36.36 linux-image-6.8.0-36-generic-64k - 6.8.0-36.36 linux-oem-20.04b - 6.8.0-36.36 linux-source - 6.8.0-36.36 linux-image-extra-virtual - 6.8.0-36.36 linux-tools-6.8.0-36-generic - 6.8.0-36.36 linux-tools-generic-64k-hwe-24.04-edge - 6.8.0-36.36 linux-modules-ipu6-generic - 6.8.0-36.36 linux-tools-virtual-hwe-24.04 - 6.8.0-36.36 linux-image-laptop-23.10 - 6.8.0-36.36 linux-libc-dev - 6.8.0-36.36 linux-tools-6.8.0-36 - 6.8.0-36.36 linux-image-generic-hwe-24.04-edge - 6.8.0-36.36 linux-modules-usbio-generic-hwe-24.04-edge - 6.8.0-36.36 linux-image-generic-64k-hwe-24.04 - 6.8.0-36.36 linux-image-uc-generic-hwe-24.04 - 6.8.0-36.36 linux-cloud-tools-generic-hwe-24.04-edge - 6.8.0-36.36 linux-buildinfo-6.8.0-36-generic - 6.8.0-36.36 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-36.36 linux-modules-iwlwifi-oem-20.04 - 6.8.0-36.36 linux-modules-iwlwifi-oem-22.04 - 6.8.0-36.36 linux-headers-generic-hwe-24.04-edge - 6.8.0-36.36 linux-buildinfo-6.8.0-36-generic-64k - 6.8.0-36.36 linux-headers-generic - 6.8.0-36.36 linux-cloud-tools-6.8.0-36 - 6.8.0-36.36 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.8.0-36.36 linux-headers-6.8.0-36-generic-64k - 6.8.0-36.36 linux-tools-laptop-23.10 - 6.8.0-36.36 linux-tools-generic-hwe-24.04 - 6.8.0-36.36 linux-headers-virtual - 6.8.0-36.36 linux-image-kvm - 6.8.0-36.36 linux-source-6.8.0 - 6.8.0-36.36 linux-headers-oem-22.04 - 6.8.0-36.36 linux-generic-hwe-24.04-edge - 6.8.0-36.36 linux-tools-generic-64k-hwe-24.04 - 6.8.0-36.36 linux-tools-kvm - 6.8.0-36.36 linux-headers-oem-20.04b - 6.8.0-36.36 linux-headers-oem-20.04c - 6.8.0-36.36 linux-image-uc-6.8.0-36-generic - 6.8.0-36.36 linux-headers-oem-20.04d - 6.8.0-36.36 linux-generic-64k - 6.8.0-36.36 linux-generic-64k-hwe-24.04 - 6.8.0-36.36 No subscription required linux-headers-6.8.0-36-lowlatency - 6.8.0-36.36.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-36.36.1 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.8.0-36.36.1 linux-modules-iwlwifi-6.8.0-36-lowlatency - 6.8.0-36.36.1 linux-headers-lowlatency-64k - 6.8.0-36.36.1 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.8.0-36.36.1 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.8.0-36.36.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-36.36.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-36.36.1 linux-lowlatency-tools-common - 6.8.0-36.36.1 linux-lowlatency-cloud-tools-common - 6.8.0-36.36.1 linux-tools-lowlatency - 6.8.0-36.36.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-36.36.1 linux-lowlatency-tools-host - 6.8.0-36.36.1 linux-modules-6.8.0-36-lowlatency - 6.8.0-36.36.1 linux-lowlatency-64k - 6.8.0-36.36.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-36.36.1 linux-tools-lowlatency-hwe-22.04-edge - 6.8.0-36.36.1 linux-image-lowlatency-hwe-22.04-edge - 6.8.0-36.36.1 linux-lowlatency-lib-rust-6.8.0-36-lowlatency - 6.8.0-36.36.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-36.36.1 linux-headers-lowlatency-hwe-22.04-edge - 6.8.0-36.36.1 linux-image-lowlatency-64k - 6.8.0-36.36.1 linux-buildinfo-6.8.0-36-lowlatency - 6.8.0-36.36.1 linux-lowlatency-headers-6.8.0-36 - 6.8.0-36.36.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-36.36.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-36.36.1 linux-lowlatency - 6.8.0-36.36.1 linux-headers-lowlatency-hwe-22.04 - 6.8.0-36.36.1 linux-lowlatency-hwe-22.04-edge - 6.8.0-36.36.1 linux-image-lowlatency-64k-hwe-22.04-edge - 6.8.0-36.36.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-36.36.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-36.36.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-36.36.1 linux-image-unsigned-6.8.0-36-lowlatency - 6.8.0-36.36.1 linux-tools-6.8.0-36-lowlatency-64k - 6.8.0-36.36.1 linux-tools-lowlatency-64k - 6.8.0-36.36.1 linux-tools-6.8.0-36-lowlatency - 6.8.0-36.36.1 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.8.0-36.36.1 linux-cloud-tools-6.8.0-36-lowlatency - 6.8.0-36.36.1 linux-image-6.8.0-36-lowlatency - 6.8.0-36.36.1 linux-tools-lowlatency-64k-hwe-22.04 - 6.8.0-36.36.1 linux-headers-lowlatency - 6.8.0-36.36.1 linux-modules-iwlwifi-lowlatency - 6.8.0-36.36.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-36.36.1 linux-headers-lowlatency-64k-hwe-22.04 - 6.8.0-36.36.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-36.36.1 linux-headers-6.8.0-36-lowlatency-64k - 6.8.0-36.36.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-36.36.1 linux-tools-lowlatency-hwe-22.04 - 6.8.0-36.36.1 linux-cloud-tools-lowlatency - 6.8.0-36.36.1 linux-lowlatency-64k-hwe-22.04-edge - 6.8.0-36.36.1 linux-image-unsigned-6.8.0-36-lowlatency-64k - 6.8.0-36.36.1 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.8.0-36.36.1 linux-cloud-tools-lowlatency-hwe-22.04 - 6.8.0-36.36.1 linux-image-lowlatency-hwe-22.04 - 6.8.0-36.36.1 linux-lowlatency-hwe-20.04 - 6.8.0-36.36.1 linux-lowlatency-tools-6.8.0-36 - 6.8.0-36.36.1 linux-buildinfo-6.8.0-36-lowlatency-64k - 6.8.0-36.36.1 linux-modules-6.8.0-36-lowlatency-64k - 6.8.0-36.36.1 linux-lowlatency-cloud-tools-6.8.0-36 - 6.8.0-36.36.1 linux-image-6.8.0-36-lowlatency-64k - 6.8.0-36.36.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-36.36.1 linux-lowlatency-hwe-22.04 - 6.8.0-36.36.1 linux-lowlatency-64k-hwe-22.04 - 6.8.0-36.36.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-36.36.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-36.36.1 linux-image-lowlatency-64k-hwe-22.04 - 6.8.0-36.36.1 linux-image-lowlatency - 6.8.0-36.36.1 No subscription required High CVE-2024-26924 USN-6864-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS It was discovered that the Intel Data Streaming and Intel Analytics Accelerator drivers in the Linux kernel allowed direct access to the devices for unprivileged users and virtual machines. A local attacker could use this to cause a denial of service. (CVE-2024-21823) A security issue was discovered in the Linux kernel. An attacker could possibly use it to compromise the system. This update corrects flaws in the following subsystem: - Netfilter; (CVE-2024-26924) Update Instructions: Run `sudo pro fix USN-6864-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-modules-iwlwifi-intel - 6.8.0-1006.13 linux-modules-6.8.0-1006-intel - 6.8.0-1006.13 linux-headers-6.8.0-1006-intel - 6.8.0-1006.13 linux-headers-intel - 6.8.0-1006.13 linux-intel - 6.8.0-1006.13 linux-intel-cloud-tools-6.8.0-1006 - 6.8.0-1006.13 linux-tools-intel - 6.8.0-1006.13 linux-intel-headers-6.8.0-1006 - 6.8.0-1006.13 linux-image-intel - 6.8.0-1006.13 linux-modules-extra-6.8.0-1006-intel - 6.8.0-1006.13 linux-modules-extra-intel - 6.8.0-1006.13 linux-buildinfo-6.8.0-1006-intel - 6.8.0-1006.13 linux-cloud-tools-6.8.0-1006-intel - 6.8.0-1006.13 linux-image-unsigned-6.8.0-1006-intel - 6.8.0-1006.13 linux-intel-tools-6.8.0-1006 - 6.8.0-1006.13 linux-tools-6.8.0-1006-intel - 6.8.0-1006.13 linux-modules-iwlwifi-6.8.0-1006-intel - 6.8.0-1006.13 linux-image-6.8.0-1006-intel - 6.8.0-1006.13 No subscription required linux-gcp-headers-6.8.0-1009 - 6.8.0-1009.10 linux-tools-6.8.0-1009-gcp - 6.8.0-1009.10 linux-tools-gcp - 6.8.0-1009.10 linux-gcp-tools-6.8.0-1009 - 6.8.0-1009.10 linux-modules-6.8.0-1009-gcp - 6.8.0-1009.10 linux-gcp - 6.8.0-1009.10 linux-image-unsigned-6.8.0-1009-gcp - 6.8.0-1009.10 linux-modules-extra-6.8.0-1009-gcp - 6.8.0-1009.10 linux-modules-iwlwifi-gcp - 6.8.0-1009.10 linux-buildinfo-6.8.0-1009-gcp - 6.8.0-1009.10 linux-image-6.8.0-1009-gcp - 6.8.0-1009.10 linux-headers-gcp - 6.8.0-1009.10 linux-modules-iwlwifi-6.8.0-1009-gcp - 6.8.0-1009.10 linux-headers-6.8.0-1009-gcp - 6.8.0-1009.10 linux-image-gcp - 6.8.0-1009.10 linux-modules-extra-gcp - 6.8.0-1009.10 No subscription required High CVE-2024-21823 CVE-2024-26924 USN-6864-2 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS It was discovered that the Intel Data Streaming and Intel Analytics Accelerator drivers in the Linux kernel allowed direct access to the devices for unprivileged users and virtual machines. A local attacker could use this to cause a denial of service. (CVE-2024-21823) A security issue was discovered in the Linux kernel. An attacker could possibly use it to compromise the system. This update corrects flaws in the following subsystem: - Netfilter; (CVE-2024-26924) Update Instructions: Run `sudo pro fix USN-6864-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-modules-iwlwifi-oem-24.04a - 6.8.0-1007.7 linux-headers-6.8.0-1007-oem - 6.8.0-1007.7 linux-modules-usbio-6.8.0-1007-oem - 6.8.0-1007.7 linux-modules-ipu6-6.8.0-1007-oem - 6.8.0-1007.7 linux-image-oem-24.04 - 6.8.0-1007.7 linux-image-6.8.0-1007-oem - 6.8.0-1007.7 linux-image-uc-oem-24.04a - 6.8.0-1007.7 linux-tools-oem-24.04 - 6.8.0-1007.7 linux-oem-6.8-headers-6.8.0-1007 - 6.8.0-1007.7 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1007.7 linux-image-uc-oem-24.04 - 6.8.0-1007.7 linux-image-oem-24.04a - 6.8.0-1007.7 linux-modules-usbio-oem-24.04 - 6.8.0-1007.7 linux-modules-ipu6-oem-24.04a - 6.8.0-1007.7 linux-headers-oem-24.04a - 6.8.0-1007.7 linux-modules-iwlwifi-6.8.0-1007-oem - 6.8.0-1007.7 linux-oem-6.8-tools-6.8.0-1007 - 6.8.0-1007.7 linux-modules-usbio-oem-24.04a - 6.8.0-1007.7 linux-tools-oem-24.04a - 6.8.0-1007.7 linux-image-unsigned-6.8.0-1007-oem - 6.8.0-1007.7 linux-modules-6.8.0-1007-oem - 6.8.0-1007.7 linux-buildinfo-6.8.0-1007-oem - 6.8.0-1007.7 linux-oem-24.04a - 6.8.0-1007.7 linux-image-uc-6.8.0-1007-oem - 6.8.0-1007.7 linux-modules-ipu6-oem-24.04 - 6.8.0-1007.7 linux-tools-6.8.0-1007-oem - 6.8.0-1007.7 linux-oem-24.04 - 6.8.0-1007.7 linux-headers-oem-24.04 - 6.8.0-1007.7 No subscription required linux-modules-extra-aws - 6.8.0-1010.10 linux-tools-aws - 6.8.0-1010.10 linux-tools-6.8.0-1010-aws - 6.8.0-1010.10 linux-modules-6.8.0-1010-aws - 6.8.0-1010.10 linux-modules-extra-6.8.0-1010-aws - 6.8.0-1010.10 linux-aws-headers-6.8.0-1010 - 6.8.0-1010.10 linux-headers-6.8.0-1010-aws - 6.8.0-1010.10 linux-aws-tools-6.8.0-1010 - 6.8.0-1010.10 linux-aws-cloud-tools-6.8.0-1010 - 6.8.0-1010.10 linux-buildinfo-6.8.0-1010-aws - 6.8.0-1010.10 linux-image-6.8.0-1010-aws - 6.8.0-1010.10 linux-headers-aws - 6.8.0-1010.10 linux-image-aws - 6.8.0-1010.10 linux-aws - 6.8.0-1010.10 linux-cloud-tools-6.8.0-1010-aws - 6.8.0-1010.10 linux-image-unsigned-6.8.0-1010-aws - 6.8.0-1010.10 No subscription required High CVE-2024-21823 CVE-2024-26924 USN-6864-3 -- Linux kernel (GKE) vulnerabilities Ubuntu 24.04 LTS It was discovered that the Intel Data Streaming and Intel Analytics Accelerator drivers in the Linux kernel allowed direct access to the devices for unprivileged users and virtual machines. A local attacker could use this to cause a denial of service. (CVE-2024-21823) A security issue was discovered in the Linux kernel. An attacker could possibly use it to compromise the system. This update corrects flaws in the following subsystem: - Netfilter; (CVE-2024-26924) Update Instructions: Run `sudo pro fix USN-6864-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1005-gke - 6.8.0-1005.8 linux-gke - 6.8.0-1005.8 linux-gke-headers-6.8.0-1005 - 6.8.0-1005.8 linux-gke-tools-6.8.0-1005 - 6.8.0-1005.8 linux-headers-6.8.0-1005-gke - 6.8.0-1005.8 linux-headers-gke - 6.8.0-1005.8 linux-image-6.8.0-1005-gke - 6.8.0-1005.8 linux-image-gke - 6.8.0-1005.8 linux-image-unsigned-6.8.0-1005-gke - 6.8.0-1005.8 linux-modules-6.8.0-1005-gke - 6.8.0-1005.8 linux-modules-extra-6.8.0-1005-gke - 6.8.0-1005.8 linux-modules-iwlwifi-6.8.0-1005-gke - 6.8.0-1005.8 linux-modules-iwlwifi-gke - 6.8.0-1005.8 linux-tools-6.8.0-1005-gke - 6.8.0-1005.8 linux-tools-gke - 6.8.0-1005.8 No subscription required High CVE-2024-21823 CVE-2024-26924 USN-6875-1 -- Linux kernel (Azure) vulnerabilities Ubuntu 24.04 LTS It was discovered that the Intel Data Streaming and Intel Analytics Accelerator drivers in the Linux kernel allowed direct access to the devices for unprivileged users and virtual machines. A local attacker could use this to cause a denial of service. (CVE-2024-21823) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Microsoft Azure Network Adapter (MANA) driver; - Netfilter; (CVE-2024-35901, CVE-2024-26924) Update Instructions: Run `sudo pro fix USN-6875-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-image-azure-fde - 6.8.0-1009.9 linux-azure-tools-6.8.0-1009 - 6.8.0-1009.9 linux-azure - 6.8.0-1009.9 linux-azure-headers-6.8.0-1009 - 6.8.0-1009.9 linux-modules-6.8.0-1009-azure - 6.8.0-1009.9 linux-image-azure - 6.8.0-1009.9 linux-azure-cloud-tools-6.8.0-1009 - 6.8.0-1009.9 linux-cloud-tools-azure - 6.8.0-1009.9 linux-tools-azure - 6.8.0-1009.9 linux-headers-6.8.0-1009-azure - 6.8.0-1009.9 linux-modules-iwlwifi-azure - 6.8.0-1009.9 linux-cloud-tools-6.8.0-1009-azure - 6.8.0-1009.9 linux-buildinfo-6.8.0-1009-azure - 6.8.0-1009.9 linux-modules-extra-azure - 6.8.0-1009.9 linux-tools-6.8.0-1009-azure - 6.8.0-1009.9 linux-image-6.8.0-1009-azure-fde - 6.8.0-1009.9 linux-image-unsigned-6.8.0-1009-azure - 6.8.0-1009.9 linux-azure-fde - 6.8.0-1009.9 linux-image-6.8.0-1009-azure - 6.8.0-1009.9 linux-modules-iwlwifi-6.8.0-1009-azure - 6.8.0-1009.9 linux-headers-azure - 6.8.0-1009.9 linux-modules-extra-6.8.0-1009-azure - 6.8.0-1009.9 No subscription required High CVE-2024-21823 CVE-2024-26924 CVE-2024-35901 USN-6877-1 -- LibreOffice vulnerability Ubuntu 24.04 LTS It was discovered that LibreOffice incorrectly performed TLS certificate verification when the LibreOfficeKit library is being used by third-party components. A remote attacker could possibly use this issue to obtain sensitive information. Update Instructions: Run `sudo pro fix USN-6877-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libreoffice-nlpsolver - 4:0.9+LibO24.2.4-0ubuntu0.24.04.2 No subscription required libreoffice-wiki-publisher - 4:1.2.0+LibO24.2.4-0ubuntu0.24.04.2 No subscription required fonts-opensymbol - 4:102.12+LibO24.2.4-0ubuntu0.24.04.2 No subscription required libreoffice-evolution - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-en-gb - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-librelogo - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ml - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-zh-cn - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-subsequentcheckbase - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-mk - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-id - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-mr - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-style-tango - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-pt-br - 4:24.2.4-0ubuntu0.24.04.2 libreofficekit-data - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-core - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-it - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-uk - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-fr - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-gnome - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-fi - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-nl - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-uiconfig-math - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-uz - 4:24.2.4-0ubuntu0.24.04.2 libreoffice - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-sdbc-mysql - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-nb - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-mn - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ne - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-nl - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-uiconfig-writer - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-nn - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-fi - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-dz - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-nr - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-fr - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-report-builder-bin - 4:24.2.4-0ubuntu0.24.04.2 libofficebean-java - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-qt6 - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-vi - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-nso - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-qt5 - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-nogui - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-math-nogui - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-style-karasa-jaga - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ve - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-gu - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-om - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-gl - 4:24.2.4-0ubuntu0.24.04.2 python3-access2base - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-en-us - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ga - 4:24.2.4-0ubuntu0.24.04.2 libuno-cppu3t64 - 4:24.2.4-0ubuntu0.24.04.2 liblibreofficekitgtk - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-gd - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-km - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-kn - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-ko - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-st - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-dev-common - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-sr - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-cs - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ts - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-sv - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-script-provider-bsh - 4:24.2.4-0ubuntu0.24.04.2 gir1.2-lokdocview-0.1 - 4:24.2.4-0ubuntu0.24.04.2 ure-java - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-report-builder-bin-nogui - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ka - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-uiconfig-common - 4:24.2.4-0ubuntu0.24.04.2 libridl-java - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-ca - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-zh-tw - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-sl - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-sk - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-style-breeze - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-si - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-da - 4:24.2.4-0ubuntu0.24.04.2 libreofficekit-dev - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-de - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-common - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-pl - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-pa-in - 4:24.2.4-0ubuntu0.24.04.2 libuno-purpenvhelpergcc3-3t64 - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-uiconfig-report-builder - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-pt - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-base-nogui - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-gtk3 - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-math - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-vi - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-gtk4 - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-tr - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-hi - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-gug - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-sdbc-hsqldb - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-draw-nogui - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-calc - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-base-drivers - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-style-colibre - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ta - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-sdbc-firebird - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-tg - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-te - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-th - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-id - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-lv - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-hu - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-lt - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ss - 4:24.2.4-0ubuntu0.24.04.2 libunoloader-java - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-uiconfig-impress - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-eu - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-et - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-script-provider-js - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-es - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-el - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-eo - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-style-sifr - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-zh-cn - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ug - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-smoketest-data - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ko - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-zu - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-impress - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-java-common - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-eu - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-et - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-es - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-km - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-uiconfig-draw - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-el - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-uiconfig-calc - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-kk - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-dev-gui - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-be - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-szl - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-bg - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-tn - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-bn - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-plasma - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-ja - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-br - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-bs - 4:24.2.4-0ubuntu0.24.04.2 liblibreoffice-java - 4:24.2.4-0ubuntu0.24.04.2 libunoil-java - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-style-yaru - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-base-core - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-ru - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ru - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-rw - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-is - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-style-elementary - 4:24.2.4-0ubuntu0.24.04.2 python3-uno - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-fa - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-am - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ro - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-en-za - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-style-sukapura - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ca - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-sl - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-calc-nogui - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-sk - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-sv - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-cs - 4:24.2.4-0ubuntu0.24.04.2 python3-scriptforge - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-dev-doc - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-common - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-za - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-cy - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-oc - 4:24.2.4-0ubuntu0.24.04.2 libjurt-java - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-base - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-gl - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-om - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-or - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-pt-br - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-kmr - 4:24.2.4-0ubuntu0.24.04.2 uno-libs-private - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ast - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-hu - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-hr - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-script-provider-python - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-writer-nogui - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-hy - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-he - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-officebean - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-dev - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-report-builder - 4:24.2.4-0ubuntu0.24.04.2 libuno-sal3t64 - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-tr - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-hi - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-kf5 - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-dz - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-pt - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ja - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-pl - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-sdbc-postgresql - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-writer - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-de - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-da - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-uiconfig-base - 4:24.2.4-0ubuntu0.24.04.2 ure - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-impress-nogui - 4:24.2.4-0ubuntu0.24.04.2 libjuh-java - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-it - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-xh - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-af - 4:24.2.4-0ubuntu0.24.04.2 libuno-cppuhelpergcc3-3t64 - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-zh-tw - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-en-gb - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-draw - 4:24.2.4-0ubuntu0.24.04.2 libuno-salhelpergcc3-3t64 - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-core-nogui - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-as - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ar - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-in - 4:24.2.4-0ubuntu0.24.04.2 No subscription required Medium CVE-2024-5261 USN-6878-1 -- Linux kernel (Oracle) vulnerabilities Ubuntu 24.04 LTS Ziming Zhang discovered that the DRM driver for VMware Virtual GPU did not properly handle certain error conditions, leading to a NULL pointer dereference. A local attacker could possibly trigger this vulnerability to cause a denial of service. (CVE-2022-38096) Zheng Wang discovered that the Broadcom FullMAC WLAN driver in the Linux kernel contained a race condition during device removal, leading to a use- after-free vulnerability. A physically proximate attacker could possibly use this to cause a denial of service (system crash). (CVE-2023-47233) It was discovered that the ATA over Ethernet (AoE) driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2023-6270) It was discovered that the Atheros 802.11ac wireless driver did not properly validate certain data structures, leading to a NULL pointer dereference. An attacker could possibly use this to cause a denial of service. (CVE-2023-7042) It was discovered that the Intel Data Streaming and Intel Analytics Accelerator drivers in the Linux kernel allowed direct access to the devices for unprivileged users and virtual machines. A local attacker could use this to cause a denial of service. (CVE-2024-21823) Gui-Dong Han discovered that the software RAID driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. A privileged attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-23307) Bai Jiaju discovered that the Xceive XC4000 silicon tuner device driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-24861) Chenyuan Yang discovered that the Unsorted Block Images (UBI) flash device volume management subsystem did not properly validate logical eraseblock sizes in certain situations. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-25739) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - PowerPC architecture; - x86 architecture; - Block layer subsystem; - ACPI drivers; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Cryptographic API; - DPLL subsystem; - ARM SCMI message protocol; - EFI core; - GPU drivers; - InfiniBand drivers; - IOMMU subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - MMC subsystem; - Network drivers; - NTB driver; - NVME drivers; - PCI subsystem; - Powercap sysfs driver; - SCSI drivers; - Freescale SoC drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - TTY drivers; - USB subsystem; - DesignWare USB3 driver; - VFIO drivers; - Backlight driver; - Virtio drivers; - Xen hypervisor drivers; - File systems infrastructure; - BTRFS file system; - debug file system; - Ext4 file system; - F2FS file system; - FAT file system; - Network file system client; - NILFS2 file system; - Overlay file system; - Pstore file system; - Diskquota system; - SMB network file system; - UBI file system; - io_uring subsystem; - BPF subsystem; - Core kernel; - PCI iomap interfaces; - Memory management; - Bluetooth subsystem; - Networking core; - HSR network protocol; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - IEEE 802.15.4 subsystem; - Netfilter; - Packet sockets; - Network traffic control; - Sun RPC protocol; - ALSA SH drivers; - SOF drivers; - USB sound devices; - KVM core; (CVE-2024-27032, CVE-2024-26868, CVE-2024-26879, CVE-2024-27033, CVE-2024-26943, CVE-2024-27040, CVE-2024-26950, CVE-2023-52650, CVE-2023-52649, CVE-2023-52644, CVE-2024-26899, CVE-2024-27432, CVE-2024-35806, CVE-2024-26871, CVE-2024-35845, CVE-2024-35799, CVE-2024-26945, CVE-2024-35805, CVE-2024-27041, CVE-2024-26860, CVE-2024-26930, CVE-2024-26941, CVE-2024-26960, CVE-2024-27034, CVE-2024-26891, CVE-2024-35793, CVE-2024-26963, CVE-2024-27029, CVE-2024-26890, CVE-2024-27074, CVE-2024-27079, CVE-2024-27053, CVE-2024-27070, CVE-2024-35821, CVE-2024-27067, CVE-2024-27051, CVE-2024-27026, CVE-2024-26961, CVE-2024-27050, CVE-2024-26939, CVE-2024-26897, CVE-2024-26878, CVE-2024-27433, CVE-2024-26885, CVE-2024-35810, CVE-2024-35829, CVE-2024-26965, CVE-2024-26875, CVE-2024-26966, CVE-2024-27078, CVE-2024-35874, CVE-2023-52661, CVE-2024-35794, CVE-2024-35787, CVE-2024-26874, CVE-2024-27054, CVE-2024-26940, CVE-2024-26859, CVE-2024-27044, CVE-2024-26948, CVE-2024-26882, CVE-2023-52653, CVE-2024-27071, CVE-2024-27065, CVE-2024-26877, CVE-2024-26929, CVE-2024-27064, CVE-2024-35803, CVE-2024-27066, CVE-2024-27028, CVE-2024-27072, CVE-2024-26876, CVE-2024-27039, CVE-2024-27435, CVE-2024-27434, CVE-2024-26812, CVE-2024-27030, CVE-2024-26816, CVE-2024-26873, CVE-2024-35808, CVE-2024-27389, CVE-2024-27075, CVE-2024-27038, CVE-2024-35828, CVE-2024-26946, CVE-2024-26655, CVE-2023-52662, CVE-2024-27077, CVE-2024-27076, CVE-2024-35795, CVE-2024-26933, CVE-2024-35789, CVE-2024-26972, CVE-2023-52663, CVE-2024-27031, CVE-2024-27069, CVE-2024-26813, CVE-2023-52659, CVE-2024-26862, CVE-2024-26962, CVE-2024-26654, CVE-2024-26815, CVE-2024-26978, CVE-2024-26976, CVE-2024-26893, CVE-2024-35809, CVE-2024-27027, CVE-2024-26864, CVE-2024-27048, CVE-2024-27046, CVE-2024-26869, CVE-2024-35827, CVE-2024-26951, CVE-2024-26942, CVE-2024-26870, CVE-2024-27437, CVE-2024-26931, CVE-2024-27036, CVE-2022-48669, CVE-2024-26898, CVE-2024-26970, CVE-2024-26886, CVE-2024-26944, CVE-2024-26865, CVE-2024-26896, CVE-2024-26895, CVE-2024-26947, CVE-2024-26880, CVE-2024-35811, CVE-2024-26975, CVE-2024-27391, CVE-2024-35796, CVE-2024-27043, CVE-2024-26949, CVE-2024-26653, CVE-2024-35814, CVE-2024-26964, CVE-2023-52652, CVE-2024-27047, CVE-2024-35830, CVE-2024-26900, CVE-2024-26810, CVE-2024-26956, CVE-2024-35817, CVE-2024-26887, CVE-2024-26809, CVE-2024-27045, CVE-2024-26656, CVE-2024-26971, CVE-2024-26866, CVE-2024-26861, CVE-2024-26968, CVE-2024-26881, CVE-2024-27063, CVE-2024-35807, CVE-2024-35797, CVE-2024-35822, CVE-2024-35813, CVE-2024-27073, CVE-2024-26954, CVE-2024-26888, CVE-2024-26955, CVE-2024-26894, CVE-2024-35844, CVE-2024-26958, CVE-2024-26952, CVE-2024-35798, CVE-2024-26969, CVE-2024-26967, CVE-2024-35800, CVE-2024-35819, CVE-2024-26937, CVE-2024-26927, CVE-2024-26883, CVE-2024-26934, CVE-2024-27392, CVE-2024-27068, CVE-2024-26889, CVE-2024-26892, CVE-2024-27390, CVE-2024-26657, CVE-2024-27388, CVE-2024-27049, CVE-2024-26935, CVE-2024-35831, CVE-2024-26884, CVE-2024-26938, CVE-2024-27037, CVE-2024-26977, CVE-2024-26953, CVE-2024-26973, CVE-2024-26932, CVE-2024-26901, CVE-2024-35843, CVE-2024-26872, CVE-2024-26959, CVE-2024-27035, CVE-2024-35826, CVE-2024-27436, CVE-2024-26651, CVE-2024-26957, CVE-2024-26863, CVE-2024-27042, CVE-2024-26814, CVE-2023-52647, CVE-2024-27080, CVE-2024-27052, CVE-2024-27058, CVE-2024-35801, CVE-2023-52648) Update Instructions: Run `sudo pro fix USN-6878-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-modules-extra-6.8.0-1006-oracle - 6.8.0-1006.6 linux-headers-oracle - 6.8.0-1006.6 linux-modules-6.8.0-1006-oracle-64k - 6.8.0-1006.6 linux-image-oracle - 6.8.0-1006.6 linux-tools-6.8.0-1006-oracle - 6.8.0-1006.6 linux-image-oracle-64k - 6.8.0-1006.6 linux-image-unsigned-6.8.0-1006-oracle - 6.8.0-1006.6 linux-tools-oracle-64k - 6.8.0-1006.6 linux-modules-6.8.0-1006-oracle - 6.8.0-1006.6 linux-oracle-headers-6.8.0-1006 - 6.8.0-1006.6 linux-image-6.8.0-1006-oracle - 6.8.0-1006.6 linux-oracle-64k - 6.8.0-1006.6 linux-tools-6.8.0-1006-oracle-64k - 6.8.0-1006.6 linux-modules-iwlwifi-6.8.0-1006-oracle - 6.8.0-1006.6 linux-tools-oracle - 6.8.0-1006.6 linux-headers-6.8.0-1006-oracle - 6.8.0-1006.6 linux-headers-oracle-64k - 6.8.0-1006.6 linux-buildinfo-6.8.0-1006-oracle-64k - 6.8.0-1006.6 linux-headers-6.8.0-1006-oracle-64k - 6.8.0-1006.6 linux-oracle-tools-6.8.0-1006 - 6.8.0-1006.6 linux-image-6.8.0-1006-oracle-64k - 6.8.0-1006.6 linux-image-unsigned-6.8.0-1006-oracle-64k - 6.8.0-1006.6 linux-oracle - 6.8.0-1006.6 linux-modules-extra-6.8.0-1006-oracle-64k - 6.8.0-1006.6 linux-modules-iwlwifi-oracle - 6.8.0-1006.6 linux-buildinfo-6.8.0-1006-oracle - 6.8.0-1006.6 No subscription required High CVE-2022-38096 CVE-2022-48669 CVE-2023-47233 CVE-2023-52644 CVE-2023-52647 CVE-2023-52648 CVE-2023-52649 CVE-2023-52650 CVE-2023-52652 CVE-2023-52653 CVE-2023-52659 CVE-2023-52661 CVE-2023-52662 CVE-2023-52663 CVE-2023-6270 CVE-2023-7042 CVE-2024-21823 CVE-2024-23307 CVE-2024-24861 CVE-2024-25739 CVE-2024-26651 CVE-2024-26653 CVE-2024-26654 CVE-2024-26655 CVE-2024-26656 CVE-2024-26657 CVE-2024-26809 CVE-2024-26810 CVE-2024-26812 CVE-2024-26813 CVE-2024-26814 CVE-2024-26815 CVE-2024-26816 CVE-2024-26859 CVE-2024-26860 CVE-2024-26861 CVE-2024-26862 CVE-2024-26863 CVE-2024-26864 CVE-2024-26865 CVE-2024-26866 CVE-2024-26868 CVE-2024-26869 CVE-2024-26870 CVE-2024-26871 CVE-2024-26872 CVE-2024-26873 CVE-2024-26874 CVE-2024-26875 CVE-2024-26876 CVE-2024-26877 CVE-2024-26878 CVE-2024-26879 CVE-2024-26880 CVE-2024-26881 CVE-2024-26882 CVE-2024-26883 CVE-2024-26884 CVE-2024-26885 CVE-2024-26886 CVE-2024-26887 CVE-2024-26888 CVE-2024-26889 CVE-2024-26890 CVE-2024-26891 CVE-2024-26892 CVE-2024-26893 CVE-2024-26894 CVE-2024-26895 CVE-2024-26896 CVE-2024-26897 CVE-2024-26898 CVE-2024-26899 CVE-2024-26900 CVE-2024-26901 CVE-2024-26927 CVE-2024-26929 CVE-2024-26930 CVE-2024-26931 CVE-2024-26932 CVE-2024-26933 CVE-2024-26934 CVE-2024-26935 CVE-2024-26937 CVE-2024-26938 CVE-2024-26939 CVE-2024-26940 CVE-2024-26941 CVE-2024-26942 CVE-2024-26943 CVE-2024-26944 CVE-2024-26945 CVE-2024-26946 CVE-2024-26947 CVE-2024-26948 CVE-2024-26949 CVE-2024-26950 CVE-2024-26951 CVE-2024-26952 CVE-2024-26953 CVE-2024-26954 CVE-2024-26955 CVE-2024-26956 CVE-2024-26957 CVE-2024-26958 CVE-2024-26959 CVE-2024-26960 CVE-2024-26961 CVE-2024-26962 CVE-2024-26963 CVE-2024-26964 CVE-2024-26965 CVE-2024-26966 CVE-2024-26967 CVE-2024-26968 CVE-2024-26969 CVE-2024-26970 CVE-2024-26971 CVE-2024-26972 CVE-2024-26973 CVE-2024-26975 CVE-2024-26976 CVE-2024-26977 CVE-2024-26978 CVE-2024-27026 CVE-2024-27027 CVE-2024-27028 CVE-2024-27029 CVE-2024-27030 CVE-2024-27031 CVE-2024-27032 CVE-2024-27033 CVE-2024-27034 CVE-2024-27035 CVE-2024-27036 CVE-2024-27037 CVE-2024-27038 CVE-2024-27039 CVE-2024-27040 CVE-2024-27041 CVE-2024-27042 CVE-2024-27043 CVE-2024-27044 CVE-2024-27045 CVE-2024-27046 CVE-2024-27047 CVE-2024-27048 CVE-2024-27049 CVE-2024-27050 CVE-2024-27051 CVE-2024-27052 CVE-2024-27053 CVE-2024-27054 CVE-2024-27058 CVE-2024-27063 CVE-2024-27064 CVE-2024-27065 CVE-2024-27066 CVE-2024-27067 CVE-2024-27068 CVE-2024-27069 CVE-2024-27070 CVE-2024-27071 CVE-2024-27072 CVE-2024-27073 CVE-2024-27074 CVE-2024-27075 CVE-2024-27076 CVE-2024-27077 CVE-2024-27078 CVE-2024-27079 CVE-2024-27080 CVE-2024-27388 CVE-2024-27389 CVE-2024-27390 CVE-2024-27391 CVE-2024-27392 CVE-2024-27432 CVE-2024-27433 CVE-2024-27434 CVE-2024-27435 CVE-2024-27436 CVE-2024-27437 CVE-2024-35787 CVE-2024-35789 CVE-2024-35793 CVE-2024-35794 CVE-2024-35795 CVE-2024-35796 CVE-2024-35797 CVE-2024-35798 CVE-2024-35799 CVE-2024-35800 CVE-2024-35801 CVE-2024-35803 CVE-2024-35805 CVE-2024-35806 CVE-2024-35807 CVE-2024-35808 CVE-2024-35809 CVE-2024-35810 CVE-2024-35811 CVE-2024-35813 CVE-2024-35814 CVE-2024-35817 CVE-2024-35819 CVE-2024-35821 CVE-2024-35822 CVE-2024-35826 CVE-2024-35827 CVE-2024-35828 CVE-2024-35829 CVE-2024-35830 CVE-2024-35831 CVE-2024-35843 CVE-2024-35844 CVE-2024-35845 CVE-2024-35874 USN-6879-1 -- Virtuoso Open-Source Edition vulnerabilities Ubuntu 24.04 LTS Jingzhou Fu discovered that Virtuoso Open-Source Edition incorrectly handled certain crafted SQL statements. An attacker could possibly use this issue to crash the program, resulting in a denial of service. (CVE-2023-31620, CVE-2023-31622, CVE-2023-31624, CVE-2023-31626, CVE-2023-31627, CVE-2023-31629, CVE-2023-31630, CVE-2023-31631, CVE-2023-48951) Jingzhou Fu discovered that Virtuoso Open-Source Edition incorrectly handled certain crafted SQL statements. An attacker could possibly use this issue to crash the program, resulting in a denial of service. This issue only affects Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2023-48945, CVE-2023-48946, CVE-2023-48947, CVE-2023-48950) Update Instructions: Run `sudo pro fix USN-6879-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libvirtodbc0 - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 libvirtuoso5.5-cil - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-minimal - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-opensource - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-opensource-7 - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-opensource-7-bin - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-opensource-7-common - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-server - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-bpel - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-conductor - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-demo - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-doc - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-isparql - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-ods - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-rdfmappers - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-sparqldemo - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-syncml - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-tutorial - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vsp-startpage - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2023-31620 CVE-2023-31622 CVE-2023-31624 CVE-2023-31626 CVE-2023-31627 CVE-2023-31629 CVE-2023-31630 CVE-2023-31631 CVE-2023-48945 CVE-2023-48946 CVE-2023-48947 CVE-2023-48950 CVE-2023-48951 USN-6882-1 -- Cinder vulnerability Ubuntu 24.04 LTS Martin Kaesberger discovered that Cinder incorrectly handled QCOW2 image processing. An authenticated user could use this issue to access arbitrary files on the server, possibly exposing sensitive information. Update Instructions: Run `sudo pro fix USN-6882-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: cinder-api - 2:24.0.0-0ubuntu1.2 cinder-backup - 2:24.0.0-0ubuntu1.2 cinder-common - 2:24.0.0-0ubuntu1.2 cinder-scheduler - 2:24.0.0-0ubuntu1.2 cinder-volume - 2:24.0.0-0ubuntu1.2 python3-cinder - 2:24.0.0-0ubuntu1.2 No subscription required Medium CVE-2024-32498 USN-6883-1 -- OpenStack Glance vulnerability Ubuntu 24.04 LTS Martin Kaesberger discovered that Glance incorrectly handled QCOW2 image processing. An authenticated user could use this issue to access arbitrary files on the server, possibly exposing sensitive information. Update Instructions: Run `sudo pro fix USN-6883-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: glance - 2:28.0.1-0ubuntu1.2 glance-api - 2:28.0.1-0ubuntu1.2 glance-common - 2:28.0.1-0ubuntu1.2 python-glance-doc - 2:28.0.1-0ubuntu1.2 python3-glance - 2:28.0.1-0ubuntu1.2 No subscription required Medium CVE-2024-32498 USN-6884-1 -- Nova vulnerability Ubuntu 24.04 LTS Martin Kaesberger discovered that Nova incorrectly handled QCOW2 image processing. An authenticated user could use this issue to access arbitrary files on the server, possibly exposing sensitive information. Update Instructions: Run `sudo pro fix USN-6884-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: nova-ajax-console-proxy - 3:29.0.1-0ubuntu1.3 nova-api - 3:29.0.1-0ubuntu1.3 nova-api-metadata - 3:29.0.1-0ubuntu1.3 nova-api-os-compute - 3:29.0.1-0ubuntu1.3 nova-api-os-volume - 3:29.0.1-0ubuntu1.3 nova-cells - 3:29.0.1-0ubuntu1.3 nova-common - 3:29.0.1-0ubuntu1.3 nova-compute - 3:29.0.1-0ubuntu1.3 nova-compute-ironic - 3:29.0.1-0ubuntu1.3 nova-compute-kvm - 3:29.0.1-0ubuntu1.3 nova-compute-libvirt - 3:29.0.1-0ubuntu1.3 nova-compute-lxc - 3:29.0.1-0ubuntu1.3 nova-compute-qemu - 3:29.0.1-0ubuntu1.3 nova-compute-vmware - 3:29.0.1-0ubuntu1.3 nova-compute-xen - 3:29.0.1-0ubuntu1.3 nova-conductor - 3:29.0.1-0ubuntu1.3 nova-doc - 3:29.0.1-0ubuntu1.3 nova-novncproxy - 3:29.0.1-0ubuntu1.3 nova-scheduler - 3:29.0.1-0ubuntu1.3 nova-serialproxy - 3:29.0.1-0ubuntu1.3 nova-spiceproxy - 3:29.0.1-0ubuntu1.3 nova-volume - 3:29.0.1-0ubuntu1.3 python3-nova - 3:29.0.1-0ubuntu1.3 No subscription required Medium CVE-2024-32498 USN-6885-1 -- Apache HTTP Server vulnerabilities Ubuntu 24.04 LTS Marc Stern discovered that the Apache HTTP Server incorrectly handled serving WebSocket protocol upgrades over HTTP/2 connections. A remote attacker could possibly use this issue to cause the server to crash, resulting in a denial of service. (CVE-2024-36387) Orange Tsai discovered that the Apache HTTP Server mod_proxy module incorrectly sent certain request URLs with incorrect encodings to backends. A remote attacker could possibly use this issue to bypass authentication. (CVE-2024-38473) Orange Tsai discovered that the Apache HTTP Server mod_rewrite module incorrectly handled certain substitutions. A remote attacker could possibly use this issue to execute scripts in directories not directly reachable by any URL, or cause a denial of service. Some environments may require using the new UnsafeAllow3F flag to handle unsafe substitutions. (CVE-2024-38474, CVE-2024-38475, CVE-2024-39573) Orange Tsai discovered that the Apache HTTP Server incorrectly handled certain response headers. A remote attacker could possibly use this issue to obtain sensitive information, execute local scripts, or perform SSRF attacks. (CVE-2024-38476) Orange Tsai discovered that the Apache HTTP Server mod_proxy module incorrectly handled certain requests. A remote attacker could possibly use this issue to cause the server to crash, resulting in a denial of service. (CVE-2024-38477) It was discovered that the Apache HTTP Server incorrectly handled certain handlers configured via AddType. A remote attacker could possibly use this issue to obtain source code. (CVE-2024-39884) Update Instructions: Run `sudo pro fix USN-6885-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: apache2 - 2.4.58-1ubuntu8.2 apache2-bin - 2.4.58-1ubuntu8.2 apache2-data - 2.4.58-1ubuntu8.2 apache2-dev - 2.4.58-1ubuntu8.2 apache2-doc - 2.4.58-1ubuntu8.2 apache2-ssl-dev - 2.4.58-1ubuntu8.2 apache2-suexec-custom - 2.4.58-1ubuntu8.2 apache2-suexec-pristine - 2.4.58-1ubuntu8.2 apache2-utils - 2.4.58-1ubuntu8.2 libapache2-mod-md - 2.4.58-1ubuntu8.2 libapache2-mod-proxy-uwsgi - 2.4.58-1ubuntu8.2 No subscription required Medium CVE-2024-36387 CVE-2024-38473 CVE-2024-38474 CVE-2024-38475 CVE-2024-38476 CVE-2024-38477 CVE-2024-39573 CVE-2024-39884 USN-6885-2 -- Apache HTTP Server regression Ubuntu 24.04 LTS USN-6885-1 fixed vulnerabilities in Apache HTTP Server. One of the security fixes introduced a regression when proxying requests to a HTTP/2 server. This update fixes the problem. We apologize for the inconvenience. Original advisory details: Marc Stern discovered that the Apache HTTP Server incorrectly handled serving WebSocket protocol upgrades over HTTP/2 connections. A remote attacker could possibly use this issue to cause the server to crash, resulting in a denial of service. (CVE-2024-36387) Orange Tsai discovered that the Apache HTTP Server mod_proxy module incorrectly sent certain request URLs with incorrect encodings to backends. A remote attacker could possibly use this issue to bypass authentication. (CVE-2024-38473) Orange Tsai discovered that the Apache HTTP Server mod_rewrite module incorrectly handled certain substitutions. A remote attacker could possibly use this issue to execute scripts in directories not directly reachable by any URL, or cause a denial of service. Some environments may require using the new UnsafeAllow3F flag to handle unsafe substitutions. (CVE-2024-38474, CVE-2024-38475, CVE-2024-39573) Orange Tsai discovered that the Apache HTTP Server incorrectly handled certain response headers. A remote attacker could possibly use this issue to obtain sensitive information, execute local scripts, or perform SSRF attacks. (CVE-2024-38476) Orange Tsai discovered that the Apache HTTP Server mod_proxy module incorrectly handled certain requests. A remote attacker could possibly use this issue to cause the server to crash, resulting in a denial of service. (CVE-2024-38477) It was discovered that the Apache HTTP Server incorrectly handled certain handlers configured via AddType. A remote attacker could possibly use this issue to obtain source code. (CVE-2024-39884) Update Instructions: Run `sudo pro fix USN-6885-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: apache2 - 2.4.58-1ubuntu8.3 apache2-bin - 2.4.58-1ubuntu8.3 apache2-data - 2.4.58-1ubuntu8.3 apache2-dev - 2.4.58-1ubuntu8.3 apache2-doc - 2.4.58-1ubuntu8.3 apache2-ssl-dev - 2.4.58-1ubuntu8.3 apache2-suexec-custom - 2.4.58-1ubuntu8.3 apache2-suexec-pristine - 2.4.58-1ubuntu8.3 apache2-utils - 2.4.58-1ubuntu8.3 libapache2-mod-md - 2.4.58-1ubuntu8.3 libapache2-mod-proxy-uwsgi - 2.4.58-1ubuntu8.3 No subscription required None https://launchpad.net/bugs/2072648 USN-6886-1 -- Go vulnerabilities Ubuntu 24.04 LTS It was discovered that the Go net/http module did not properly handle the requests when request\'s headers exceed MaxHeaderBytes. An attacker could possibly use this issue to cause a panic resulting into a denial of service. This issue only affected Go 1.21 in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-45288) It was discovered that the Go net/http module did not properly validate the subdomain match or exact match of the initial domain. An attacker could possibly use this issue to read sensitive information. This issue only affected Go 1.21 in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-45289) It was discovered that the Go net/http module did not properly validate the total size of the parsed form when parsing a multipart form. An attacker could possibly use this issue to cause a panic resulting into a denial of service. This issue only affected Go 1.21 in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-45290) It was discovered that the Go crypto/x509 module did not properly handle a certificate chain which contains a certificate with an unknown public key algorithm. An attacker could possibly use this issue to cause a panic resulting into a denial of service. This issue only affected Go 1.21 in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2024-24783) It was discovered that the Go net/mail module did not properly handle comments within display names in the ParseAddressList function. An attacker could possibly use this issue to cause a panic resulting into a denial of service. This issue only affected Go 1.21 in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2024-24784) It was discovered that the Go html/template module did not validate errors returned from MarshalJSON methods. An attacker could possibly use this issue to inject arbitrary code into the Go template. This issue only affected Go 1.21 in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2024-24785) It was discovered that the Go net module did not properly validate the DNS message in response to a query. An attacker could possibly use this issue to cause a panic resulting into a denial of service. This issue only affected Go 1.22. (CVE-2024-24788) It was discovered that the Go archive/zip module did not properly handle certain types of invalid zip files differs from the behavior of most zip implementations. An attacker could possibly use this issue to cause a panic resulting into a denial of service. (CVE-2024-24789) It was discovered that the Go net/netip module did not work as expected for IPv4-mapped IPv6 addresses in various Is methods. An attacker could possibly use this issue to cause a panic resulting into a denial of service. (CVE-2024-24790) Update Instructions: Run `sudo pro fix USN-6886-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: golang-1.21 - 1.21.9-1ubuntu0.1 golang-1.21-doc - 1.21.9-1ubuntu0.1 golang-1.21-go - 1.21.9-1ubuntu0.1 golang-1.21-src - 1.21.9-1ubuntu0.1 No subscription required golang-1.22 - 1.22.2-2ubuntu0.1 golang-1.22-doc - 1.22.2-2ubuntu0.1 golang-1.22-go - 1.22.2-2ubuntu0.1 golang-1.22-src - 1.22.2-2ubuntu0.1 No subscription required Medium CVE-2023-45288 CVE-2023-45289 CVE-2023-45290 CVE-2024-24783 CVE-2024-24784 CVE-2024-24785 CVE-2024-24788 CVE-2024-24789 CVE-2024-24790 USN-6887-1 -- OpenSSH vulnerability Ubuntu 24.04 LTS Philippos Giavridis, Jacky Wei En Kung, Daniel Hugenroth, and Alastair Beresford discovered that the OpenSSH ObscureKeystrokeTiming feature did not work as expected. A remote attacker could possibly use this issue to determine timing information about keystrokes. Update Instructions: Run `sudo pro fix USN-6887-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openssh-client - 1:9.6p1-3ubuntu13.4 openssh-server - 1:9.6p1-3ubuntu13.4 openssh-sftp-server - 1:9.6p1-3ubuntu13.4 openssh-tests - 1:9.6p1-3ubuntu13.4 ssh - 1:9.6p1-3ubuntu13.4 ssh-askpass-gnome - 1:9.6p1-3ubuntu13.4 No subscription required Medium CVE-2024-39894 USN-6888-1 -- Django vulnerabilities Ubuntu 24.04 LTS Elias Myllymäki discovered that Django incorrectly handled certain inputs with a large number of brackets. A remote attacker could possibly use this issue to cause Django to consume resources or stop responding, resulting in a denial of service. (CVE-2024-38875) It was discovered that Django incorrectly handled authenticating users with unusable passwords. A remote attacker could possibly use this issue to perform a timing attack and enumerate users. (CVE-2024-39329) Josh Schneier discovered that Django incorrectly handled file path validation when the storage class is being derived. A remote attacker could possibly use this issue to save files into arbitrary directories. (CVE-2024-39330) It was discovered that Django incorrectly handled certain long strings that included a specific set of characters. A remote attacker could possibly use this issue to cause Django to consume resources or stop responding, resulting in a denial of service. (CVE-2024-39614) Update Instructions: Run `sudo pro fix USN-6888-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-django-doc - 3:4.2.11-1ubuntu1.1 python3-django - 3:4.2.11-1ubuntu1.1 No subscription required Medium CVE-2024-38875 CVE-2024-39329 CVE-2024-39330 CVE-2024-39614 USN-6889-1 -- .NET vulnerabilities Ubuntu 24.04 LTS It was discovered that .NET did not properly handle object deserialization. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-30105) Radek Zikmund discovered that .NET did not properly manage memory. An attacker could use this issue to cause a denial of service or possibly execute arbitrary code. (CVE-2024-35264) It was discovered that .NET did not properly parse X.509 Content and ObjectIdentifiers. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-38095) Update Instructions: Run `sudo pro fix USN-6889-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: dotnet-sdk-8.0 - 8.0.107-0ubuntu1~24.04.1 dotnet-sdk-8.0-source-built-artifacts - 8.0.107-0ubuntu1~24.04.1 dotnet-sdk-dbg-8.0 - 8.0.107-0ubuntu1~24.04.1 dotnet-templates-8.0 - 8.0.107-0ubuntu1~24.04.1 netstandard-targeting-pack-2.1-8.0 - 8.0.107-0ubuntu1~24.04.1 No subscription required dotnet8 - 8.0.107-8.0.7-0ubuntu1~24.04.1 No subscription required aspnetcore-runtime-8.0 - 8.0.7-0ubuntu1~24.04.1 aspnetcore-runtime-dbg-8.0 - 8.0.7-0ubuntu1~24.04.1 aspnetcore-targeting-pack-8.0 - 8.0.7-0ubuntu1~24.04.1 dotnet-apphost-pack-8.0 - 8.0.7-0ubuntu1~24.04.1 dotnet-host-8.0 - 8.0.7-0ubuntu1~24.04.1 dotnet-hostfxr-8.0 - 8.0.7-0ubuntu1~24.04.1 dotnet-runtime-8.0 - 8.0.7-0ubuntu1~24.04.1 dotnet-runtime-dbg-8.0 - 8.0.7-0ubuntu1~24.04.1 dotnet-targeting-pack-8.0 - 8.0.7-0ubuntu1~24.04.1 No subscription required Medium CVE-2024-30105 CVE-2024-35264 CVE-2024-38095 USN-6893-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS It was discovered that a race condition existed in the Bluetooth subsystem in the Linux kernel when modifying certain settings values through debugfs. A privileged local attacker could use this to cause a denial of service. (CVE-2024-24857, CVE-2024-24858, CVE-2024-24859) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - RISC-V architecture; - S390 architecture; - x86 architecture; - Block layer subsystem; - Compute Acceleration Framework; - Accessibility subsystem; - Android drivers; - Drivers core; - Bluetooth drivers; - Clock framework and drivers; - Data acquisition framework and drivers; - Cryptographic API; - Buffer Sharing and Synchronization framework; - GPU drivers; - On-Chip Interconnect management framework; - IOMMU subsystem; - Multiple devices driver; - Media drivers; - VMware VMCI Driver; - Network drivers; - Microsoft Azure Network Adapter (MANA) driver; - Device tree and open firmware driver; - Chrome hardware platform drivers; - i.MX PM domains; - TI SCI PM domains driver; - S/390 drivers; - SCSI drivers; - SPI subsystem; - Thermal drivers; - TTY drivers; - USB subsystem; - Framebuffer layer; - BTRFS file system; - Network file system server daemon; - NILFS2 file system; - File systems infrastructure; - Pstore file system; - SMB network file system; - BPF subsystem; - Bluetooth subsystem; - Netfilter; - io_uring subsystem; - Core kernel; - Extra boot config (XBC); - Memory management; - Amateur Radio drivers; - B.A.T.M.A.N. meshing protocol; - Ethernet bridge; - Networking core; - IPv4 networking; - IPv6 networking; - Multipath TCP; - NFC subsystem; - RDS protocol; - Network traffic control; - SMC sockets; - Sun RPC protocol; - TLS protocol; - Unix domain sockets; - Wireless networking; - eXpress Data Path; - SELinux security module; (CVE-2024-35967, CVE-2024-35886, CVE-2024-26999, CVE-2024-27008, CVE-2024-26988, CVE-2024-35980, CVE-2024-26982, CVE-2024-35946, CVE-2024-35918, CVE-2024-27015, CVE-2024-35900, CVE-2024-35942, CVE-2024-35879, CVE-2024-35961, CVE-2024-35944, CVE-2024-35934, CVE-2024-35978, CVE-2024-35938, CVE-2024-27003, CVE-2024-35976, CVE-2024-36019, CVE-2024-35880, CVE-2024-35866, CVE-2024-35929, CVE-2024-35917, CVE-2024-35912, CVE-2024-35896, CVE-2024-26986, CVE-2024-35951, CVE-2024-35958, CVE-2024-26997, CVE-2024-35965, CVE-2024-35953, CVE-2024-26993, CVE-2024-26991, CVE-2024-35892, CVE-2024-36026, CVE-2024-35882, CVE-2024-35964, CVE-2024-35865, CVE-2024-35897, CVE-2024-26981, CVE-2024-35872, CVE-2024-36027, CVE-2024-26983, CVE-2024-35909, CVE-2024-35985, CVE-2024-35875, CVE-2024-35890, CVE-2024-26922, CVE-2024-26994, CVE-2024-35903, CVE-2024-35936, CVE-2024-35904, CVE-2024-27013, CVE-2024-36025, CVE-2024-26980, CVE-2024-27006, CVE-2024-35861, CVE-2024-35864, CVE-2024-27018, CVE-2024-36022, CVE-2024-26990, CVE-2024-35968, CVE-2024-35860, CVE-2024-36024, CVE-2024-35933, CVE-2024-27019, CVE-2024-35925, CVE-2024-35950, CVE-2024-35915, CVE-2024-35916, CVE-2024-35956, CVE-2024-36020, CVE-2024-35873, CVE-2024-27002, CVE-2024-35963, CVE-2024-35959, CVE-2024-35937, CVE-2024-27011, CVE-2024-27020, CVE-2024-35883, CVE-2024-35913, CVE-2024-35910, CVE-2024-27021, CVE-2024-35921, CVE-2024-35905, CVE-2024-27010, CVE-2024-35981, CVE-2024-35885, CVE-2024-35955, CVE-2024-35894, CVE-2024-35969, CVE-2024-36018, CVE-2024-35867, CVE-2024-27007, CVE-2024-35908, CVE-2024-26985, CVE-2024-27016, CVE-2024-35960, CVE-2024-35935, CVE-2024-35932, CVE-2024-35957, CVE-2024-27001, CVE-2024-35871, CVE-2024-35907, CVE-2024-35878, CVE-2024-35979, CVE-2024-35972, CVE-2024-35975, CVE-2024-35877, CVE-2024-35926, CVE-2024-26817, CVE-2024-35899, CVE-2024-27004, CVE-2024-35920, CVE-2024-35924, CVE-2024-35977, CVE-2024-35930, CVE-2024-35911, CVE-2024-26996, CVE-2024-27005, CVE-2024-35870, CVE-2024-35982, CVE-2024-35895, CVE-2024-35943, CVE-2024-35902, CVE-2024-35919, CVE-2024-35973, CVE-2024-35931, CVE-2024-35888, CVE-2024-35914, CVE-2024-35970, CVE-2024-36023, CVE-2024-27012, CVE-2024-35939, CVE-2024-26984, CVE-2024-35884, CVE-2024-35901, CVE-2024-26811, CVE-2024-35966, CVE-2024-35891, CVE-2024-35887, CVE-2024-35945, CVE-2024-35971, CVE-2024-35862, CVE-2024-26987, CVE-2024-26921, CVE-2024-26989, CVE-2024-35952, CVE-2024-27009, CVE-2024-35893, CVE-2024-26995, CVE-2024-26925, CVE-2024-35868, CVE-2024-35954, CVE-2024-35922, CVE-2024-27000, CVE-2024-36021, CVE-2024-27014, CVE-2024-35940, CVE-2024-26992, CVE-2024-26926, CVE-2024-35927, CVE-2024-35863, CVE-2024-27022, CVE-2024-26998, CVE-2024-27017, CVE-2024-26928, CVE-2024-35889, CVE-2024-35898, CVE-2024-35869, CVE-2024-26936, CVE-2024-26923, CVE-2023-52699, CVE-2024-35974) Update Instructions: Run `sudo pro fix USN-6893-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1007-intel - 6.8.0-1007.14 linux-cloud-tools-6.8.0-1007-intel - 6.8.0-1007.14 linux-headers-6.8.0-1007-intel - 6.8.0-1007.14 linux-headers-intel - 6.8.0-1007.14 linux-image-6.8.0-1007-intel - 6.8.0-1007.14 linux-image-intel - 6.8.0-1007.14 linux-image-unsigned-6.8.0-1007-intel - 6.8.0-1007.14 linux-intel - 6.8.0-1007.14 linux-intel-cloud-tools-6.8.0-1007 - 6.8.0-1007.14 linux-intel-headers-6.8.0-1007 - 6.8.0-1007.14 linux-intel-tools-6.8.0-1007 - 6.8.0-1007.14 linux-modules-6.8.0-1007-intel - 6.8.0-1007.14 linux-modules-extra-6.8.0-1007-intel - 6.8.0-1007.14 linux-modules-extra-intel - 6.8.0-1007.14 linux-modules-iwlwifi-6.8.0-1007-intel - 6.8.0-1007.14 linux-modules-iwlwifi-intel - 6.8.0-1007.14 linux-tools-6.8.0-1007-intel - 6.8.0-1007.14 linux-tools-intel - 6.8.0-1007.14 No subscription required linux-buildinfo-6.8.0-1007-raspi - 6.8.0-1007.7 linux-headers-6.8.0-1007-raspi - 6.8.0-1007.7 linux-headers-raspi - 6.8.0-1007.7 linux-image-6.8.0-1007-raspi - 6.8.0-1007.7 linux-image-raspi - 6.8.0-1007.7 linux-modules-6.8.0-1007-raspi - 6.8.0-1007.7 linux-raspi - 6.8.0-1007.7 linux-raspi-headers-6.8.0-1007 - 6.8.0-1007.7 linux-raspi-tools-6.8.0-1007 - 6.8.0-1007.7 linux-tools-6.8.0-1007-raspi - 6.8.0-1007.7 linux-tools-raspi - 6.8.0-1007.7 No subscription required linux-buildinfo-6.8.0-1008-ibm - 6.8.0-1008.8 linux-buildinfo-6.8.0-1008-oem - 6.8.0-1008.8 linux-headers-6.8.0-1008-ibm - 6.8.0-1008.8 linux-headers-6.8.0-1008-oem - 6.8.0-1008.8 linux-headers-ibm - 6.8.0-1008.8 linux-headers-ibm-classic - 6.8.0-1008.8 linux-headers-ibm-lts-24.04 - 6.8.0-1008.8 linux-headers-oem-24.04 - 6.8.0-1008.8 linux-headers-oem-24.04a - 6.8.0-1008.8 linux-ibm - 6.8.0-1008.8 linux-ibm-classic - 6.8.0-1008.8 linux-ibm-cloud-tools-common - 6.8.0-1008.8 linux-ibm-headers-6.8.0-1008 - 6.8.0-1008.8 linux-ibm-lts-24.04 - 6.8.0-1008.8 linux-ibm-source-6.8.0 - 6.8.0-1008.8 linux-ibm-tools-6.8.0-1008 - 6.8.0-1008.8 linux-image-6.8.0-1008-ibm - 6.8.0-1008.8 linux-image-6.8.0-1008-oem - 6.8.0-1008.8 linux-image-ibm - 6.8.0-1008.8 linux-image-ibm-classic - 6.8.0-1008.8 linux-image-ibm-lts-24.04 - 6.8.0-1008.8 linux-image-oem-24.04 - 6.8.0-1008.8 linux-image-oem-24.04a - 6.8.0-1008.8 linux-image-uc-6.8.0-1008-oem - 6.8.0-1008.8 linux-image-uc-oem-24.04 - 6.8.0-1008.8 linux-image-uc-oem-24.04a - 6.8.0-1008.8 linux-image-unsigned-6.8.0-1008-ibm - 6.8.0-1008.8 linux-image-unsigned-6.8.0-1008-oem - 6.8.0-1008.8 linux-modules-6.8.0-1008-ibm - 6.8.0-1008.8 linux-modules-6.8.0-1008-oem - 6.8.0-1008.8 linux-modules-extra-6.8.0-1008-ibm - 6.8.0-1008.8 linux-modules-ipu6-6.8.0-1008-oem - 6.8.0-1008.8 linux-modules-ipu6-oem-24.04 - 6.8.0-1008.8 linux-modules-ipu6-oem-24.04a - 6.8.0-1008.8 linux-modules-iwlwifi-6.8.0-1008-ibm - 6.8.0-1008.8 linux-modules-iwlwifi-6.8.0-1008-oem - 6.8.0-1008.8 linux-modules-iwlwifi-ibm - 6.8.0-1008.8 linux-modules-iwlwifi-ibm-classic - 6.8.0-1008.8 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1008.8 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1008.8 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1008.8 linux-modules-usbio-6.8.0-1008-oem - 6.8.0-1008.8 linux-modules-usbio-oem-24.04 - 6.8.0-1008.8 linux-modules-usbio-oem-24.04a - 6.8.0-1008.8 linux-oem-24.04 - 6.8.0-1008.8 linux-oem-24.04a - 6.8.0-1008.8 linux-oem-6.8-headers-6.8.0-1008 - 6.8.0-1008.8 linux-oem-6.8-tools-6.8.0-1008 - 6.8.0-1008.8 linux-tools-6.8.0-1008-ibm - 6.8.0-1008.8 linux-tools-6.8.0-1008-oem - 6.8.0-1008.8 linux-tools-ibm - 6.8.0-1008.8 linux-tools-ibm-classic - 6.8.0-1008.8 linux-tools-ibm-lts-24.04 - 6.8.0-1008.8 linux-tools-oem-24.04 - 6.8.0-1008.8 linux-tools-oem-24.04a - 6.8.0-1008.8 No subscription required linux-azure - 6.8.0-1010.10 linux-azure-cloud-tools-6.8.0-1010 - 6.8.0-1010.10 linux-azure-fde - 6.8.0-1010.10 linux-azure-headers-6.8.0-1010 - 6.8.0-1010.10 linux-azure-tools-6.8.0-1010 - 6.8.0-1010.10 linux-buildinfo-6.8.0-1010-azure - 6.8.0-1010.10 linux-cloud-tools-6.8.0-1010-azure - 6.8.0-1010.10 linux-cloud-tools-azure - 6.8.0-1010.10 linux-headers-6.8.0-1010-azure - 6.8.0-1010.10 linux-headers-azure - 6.8.0-1010.10 linux-image-6.8.0-1010-azure - 6.8.0-1010.10 linux-image-6.8.0-1010-azure-fde - 6.8.0-1010.10 linux-image-azure - 6.8.0-1010.10 linux-image-azure-fde - 6.8.0-1010.10 linux-image-unsigned-6.8.0-1010-azure - 6.8.0-1010.10 linux-modules-6.8.0-1010-azure - 6.8.0-1010.10 linux-modules-extra-6.8.0-1010-azure - 6.8.0-1010.10 linux-modules-extra-azure - 6.8.0-1010.10 linux-modules-iwlwifi-6.8.0-1010-azure - 6.8.0-1010.10 linux-modules-iwlwifi-azure - 6.8.0-1010.10 linux-tools-6.8.0-1010-azure - 6.8.0-1010.10 linux-tools-azure - 6.8.0-1010.10 No subscription required linux-buildinfo-6.8.0-1010-gcp - 6.8.0-1010.11 linux-gcp - 6.8.0-1010.11 linux-gcp-headers-6.8.0-1010 - 6.8.0-1010.11 linux-gcp-tools-6.8.0-1010 - 6.8.0-1010.11 linux-headers-6.8.0-1010-gcp - 6.8.0-1010.11 linux-headers-gcp - 6.8.0-1010.11 linux-image-6.8.0-1010-gcp - 6.8.0-1010.11 linux-image-gcp - 6.8.0-1010.11 linux-image-unsigned-6.8.0-1010-gcp - 6.8.0-1010.11 linux-modules-6.8.0-1010-gcp - 6.8.0-1010.11 linux-modules-extra-6.8.0-1010-gcp - 6.8.0-1010.11 linux-modules-extra-gcp - 6.8.0-1010.11 linux-modules-iwlwifi-6.8.0-1010-gcp - 6.8.0-1010.11 linux-modules-iwlwifi-gcp - 6.8.0-1010.11 linux-tools-6.8.0-1010-gcp - 6.8.0-1010.11 linux-tools-gcp - 6.8.0-1010.11 No subscription required linux-buildinfo-6.8.0-38-generic - 6.8.0-38.38 linux-buildinfo-6.8.0-38-generic-64k - 6.8.0-38.38 linux-cloud-tools-6.8.0-38 - 6.8.0-38.38 linux-cloud-tools-6.8.0-38-generic - 6.8.0-38.38 linux-cloud-tools-common - 6.8.0-38.38 linux-cloud-tools-generic - 6.8.0-38.38 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-38.38 linux-cloud-tools-generic-hwe-24.04-edge - 6.8.0-38.38 linux-cloud-tools-virtual - 6.8.0-38.38 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-38.38 linux-cloud-tools-virtual-hwe-24.04-edge - 6.8.0-38.38 linux-crashdump - 6.8.0-38.38 linux-doc - 6.8.0-38.38 linux-generic - 6.8.0-38.38 linux-generic-64k - 6.8.0-38.38 linux-generic-64k-hwe-24.04 - 6.8.0-38.38 linux-generic-64k-hwe-24.04-edge - 6.8.0-38.38 linux-generic-hwe-24.04 - 6.8.0-38.38 linux-generic-hwe-24.04-edge - 6.8.0-38.38 linux-generic-lpae - 6.8.0-38.38 linux-headers-6.8.0-38 - 6.8.0-38.38 linux-headers-6.8.0-38-generic - 6.8.0-38.38 linux-headers-6.8.0-38-generic-64k - 6.8.0-38.38 linux-headers-generic - 6.8.0-38.38 linux-headers-generic-64k - 6.8.0-38.38 linux-headers-generic-64k-hwe-24.04 - 6.8.0-38.38 linux-headers-generic-64k-hwe-24.04-edge - 6.8.0-38.38 linux-headers-generic-hwe-24.04 - 6.8.0-38.38 linux-headers-generic-hwe-24.04-edge - 6.8.0-38.38 linux-headers-generic-lpae - 6.8.0-38.38 linux-headers-kvm - 6.8.0-38.38 linux-headers-laptop-23.10 - 6.8.0-38.38 linux-headers-oem-20.04 - 6.8.0-38.38 linux-headers-oem-20.04b - 6.8.0-38.38 linux-headers-oem-20.04c - 6.8.0-38.38 linux-headers-oem-20.04d - 6.8.0-38.38 linux-headers-oem-22.04 - 6.8.0-38.38 linux-headers-virtual - 6.8.0-38.38 linux-headers-virtual-hwe-24.04 - 6.8.0-38.38 linux-headers-virtual-hwe-24.04-edge - 6.8.0-38.38 linux-image-6.8.0-38-generic - 6.8.0-38.38 linux-image-6.8.0-38-generic-64k - 6.8.0-38.38 linux-image-extra-virtual - 6.8.0-38.38 linux-image-extra-virtual-hwe-24.04 - 6.8.0-38.38 linux-image-extra-virtual-hwe-24.04-edge - 6.8.0-38.38 linux-image-generic - 6.8.0-38.38 linux-image-generic-64k - 6.8.0-38.38 linux-image-generic-64k-hwe-24.04 - 6.8.0-38.38 linux-image-generic-64k-hwe-24.04-edge - 6.8.0-38.38 linux-image-generic-hwe-24.04 - 6.8.0-38.38 linux-image-generic-hwe-24.04-edge - 6.8.0-38.38 linux-image-generic-lpae - 6.8.0-38.38 linux-image-kvm - 6.8.0-38.38 linux-image-laptop-23.10 - 6.8.0-38.38 linux-image-oem-20.04 - 6.8.0-38.38 linux-image-oem-20.04b - 6.8.0-38.38 linux-image-oem-20.04c - 6.8.0-38.38 linux-image-oem-20.04d - 6.8.0-38.38 linux-image-oem-22.04 - 6.8.0-38.38 linux-image-uc-6.8.0-38-generic - 6.8.0-38.38 linux-image-uc-6.8.0-38-generic-64k - 6.8.0-38.38 linux-image-uc-generic - 6.8.0-38.38 linux-image-uc-generic-hwe-24.04 - 6.8.0-38.38 linux-image-uc-generic-hwe-24.04-edge - 6.8.0-38.38 linux-image-unsigned-6.8.0-38-generic - 6.8.0-38.38 linux-image-unsigned-6.8.0-38-generic-64k - 6.8.0-38.38 linux-image-virtual - 6.8.0-38.38 linux-image-virtual-hwe-24.04 - 6.8.0-38.38 linux-image-virtual-hwe-24.04-edge - 6.8.0-38.38 linux-kvm - 6.8.0-38.38 linux-laptop-23.10 - 6.8.0-38.38 linux-lib-rust-6.8.0-38-generic - 6.8.0-38.38 linux-libc-dev - 6.8.0-38.38 linux-modules-6.8.0-38-generic - 6.8.0-38.38 linux-modules-6.8.0-38-generic-64k - 6.8.0-38.38 linux-modules-extra-6.8.0-38-generic - 6.8.0-38.38 linux-modules-ipu6-6.8.0-38-generic - 6.8.0-38.38 linux-modules-ipu6-generic - 6.8.0-38.38 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-38.38 linux-modules-ipu6-generic-hwe-24.04-edge - 6.8.0-38.38 linux-modules-iwlwifi-6.8.0-38-generic - 6.8.0-38.38 linux-modules-iwlwifi-generic - 6.8.0-38.38 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-38.38 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.8.0-38.38 linux-modules-iwlwifi-oem-20.04 - 6.8.0-38.38 linux-modules-iwlwifi-oem-20.04d - 6.8.0-38.38 linux-modules-iwlwifi-oem-22.04 - 6.8.0-38.38 linux-modules-usbio-6.8.0-38-generic - 6.8.0-38.38 linux-modules-usbio-generic - 6.8.0-38.38 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-38.38 linux-modules-usbio-generic-hwe-24.04-edge - 6.8.0-38.38 linux-oem-20.04 - 6.8.0-38.38 linux-oem-20.04b - 6.8.0-38.38 linux-oem-20.04c - 6.8.0-38.38 linux-oem-20.04d - 6.8.0-38.38 linux-oem-22.04 - 6.8.0-38.38 linux-source - 6.8.0-38.38 linux-source-6.8.0 - 6.8.0-38.38 linux-tools-6.8.0-38 - 6.8.0-38.38 linux-tools-6.8.0-38-generic - 6.8.0-38.38 linux-tools-6.8.0-38-generic-64k - 6.8.0-38.38 linux-tools-common - 6.8.0-38.38 linux-tools-generic - 6.8.0-38.38 linux-tools-generic-64k - 6.8.0-38.38 linux-tools-generic-64k-hwe-24.04 - 6.8.0-38.38 linux-tools-generic-64k-hwe-24.04-edge - 6.8.0-38.38 linux-tools-generic-hwe-24.04 - 6.8.0-38.38 linux-tools-generic-hwe-24.04-edge - 6.8.0-38.38 linux-tools-generic-lpae - 6.8.0-38.38 linux-tools-host - 6.8.0-38.38 linux-tools-kvm - 6.8.0-38.38 linux-tools-laptop-23.10 - 6.8.0-38.38 linux-tools-oem-20.04 - 6.8.0-38.38 linux-tools-oem-20.04b - 6.8.0-38.38 linux-tools-oem-20.04c - 6.8.0-38.38 linux-tools-oem-20.04d - 6.8.0-38.38 linux-tools-oem-22.04 - 6.8.0-38.38 linux-tools-virtual - 6.8.0-38.38 linux-tools-virtual-hwe-24.04 - 6.8.0-38.38 linux-tools-virtual-hwe-24.04-edge - 6.8.0-38.38 linux-virtual - 6.8.0-38.38 linux-virtual-hwe-24.04 - 6.8.0-38.38 linux-virtual-hwe-24.04-edge - 6.8.0-38.38 No subscription required linux-buildinfo-6.8.0-38-lowlatency - 6.8.0-38.38.1 linux-buildinfo-6.8.0-38-lowlatency-64k - 6.8.0-38.38.1 linux-cloud-tools-6.8.0-38-lowlatency - 6.8.0-38.38.1 linux-cloud-tools-lowlatency - 6.8.0-38.38.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-38.38.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-38.38.1 linux-cloud-tools-lowlatency-hwe-22.04 - 6.8.0-38.38.1 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.8.0-38.38.1 linux-headers-6.8.0-38-lowlatency - 6.8.0-38.38.1 linux-headers-6.8.0-38-lowlatency-64k - 6.8.0-38.38.1 linux-headers-lowlatency - 6.8.0-38.38.1 linux-headers-lowlatency-64k - 6.8.0-38.38.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-38.38.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-38.38.1 linux-headers-lowlatency-64k-hwe-22.04 - 6.8.0-38.38.1 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.8.0-38.38.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-38.38.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-38.38.1 linux-headers-lowlatency-hwe-22.04 - 6.8.0-38.38.1 linux-headers-lowlatency-hwe-22.04-edge - 6.8.0-38.38.1 linux-image-6.8.0-38-lowlatency - 6.8.0-38.38.1 linux-image-6.8.0-38-lowlatency-64k - 6.8.0-38.38.1 linux-image-lowlatency - 6.8.0-38.38.1 linux-image-lowlatency-64k - 6.8.0-38.38.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-38.38.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-38.38.1 linux-image-lowlatency-64k-hwe-22.04 - 6.8.0-38.38.1 linux-image-lowlatency-64k-hwe-22.04-edge - 6.8.0-38.38.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-38.38.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-38.38.1 linux-image-lowlatency-hwe-22.04 - 6.8.0-38.38.1 linux-image-lowlatency-hwe-22.04-edge - 6.8.0-38.38.1 linux-image-unsigned-6.8.0-38-lowlatency - 6.8.0-38.38.1 linux-image-unsigned-6.8.0-38-lowlatency-64k - 6.8.0-38.38.1 linux-lowlatency - 6.8.0-38.38.1 linux-lowlatency-64k - 6.8.0-38.38.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-38.38.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-38.38.1 linux-lowlatency-64k-hwe-22.04 - 6.8.0-38.38.1 linux-lowlatency-64k-hwe-22.04-edge - 6.8.0-38.38.1 linux-lowlatency-cloud-tools-6.8.0-38 - 6.8.0-38.38.1 linux-lowlatency-cloud-tools-common - 6.8.0-38.38.1 linux-lowlatency-headers-6.8.0-38 - 6.8.0-38.38.1 linux-lowlatency-hwe-20.04 - 6.8.0-38.38.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-38.38.1 linux-lowlatency-hwe-22.04 - 6.8.0-38.38.1 linux-lowlatency-hwe-22.04-edge - 6.8.0-38.38.1 linux-lowlatency-lib-rust-6.8.0-38-lowlatency - 6.8.0-38.38.1 linux-lowlatency-tools-6.8.0-38 - 6.8.0-38.38.1 linux-lowlatency-tools-common - 6.8.0-38.38.1 linux-lowlatency-tools-host - 6.8.0-38.38.1 linux-modules-6.8.0-38-lowlatency - 6.8.0-38.38.1 linux-modules-6.8.0-38-lowlatency-64k - 6.8.0-38.38.1 linux-modules-iwlwifi-6.8.0-38-lowlatency - 6.8.0-38.38.1 linux-modules-iwlwifi-lowlatency - 6.8.0-38.38.1 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.8.0-38.38.1 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.8.0-38.38.1 linux-tools-6.8.0-38-lowlatency - 6.8.0-38.38.1 linux-tools-6.8.0-38-lowlatency-64k - 6.8.0-38.38.1 linux-tools-lowlatency - 6.8.0-38.38.1 linux-tools-lowlatency-64k - 6.8.0-38.38.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-38.38.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-38.38.1 linux-tools-lowlatency-64k-hwe-22.04 - 6.8.0-38.38.1 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.8.0-38.38.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-38.38.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-38.38.1 linux-tools-lowlatency-hwe-22.04 - 6.8.0-38.38.1 linux-tools-lowlatency-hwe-22.04-edge - 6.8.0-38.38.1 No subscription required High CVE-2023-52699 CVE-2024-24857 CVE-2024-24858 CVE-2024-24859 CVE-2024-26811 CVE-2024-26817 CVE-2024-26921 CVE-2024-26922 CVE-2024-26923 CVE-2024-26925 CVE-2024-26926 CVE-2024-26928 CVE-2024-26936 CVE-2024-26980 CVE-2024-26981 CVE-2024-26982 CVE-2024-26983 CVE-2024-26984 CVE-2024-26985 CVE-2024-26986 CVE-2024-26987 CVE-2024-26988 CVE-2024-26989 CVE-2024-26990 CVE-2024-26991 CVE-2024-26992 CVE-2024-26993 CVE-2024-26994 CVE-2024-26995 CVE-2024-26996 CVE-2024-26997 CVE-2024-26998 CVE-2024-26999 CVE-2024-27000 CVE-2024-27001 CVE-2024-27002 CVE-2024-27003 CVE-2024-27004 CVE-2024-27005 CVE-2024-27006 CVE-2024-27007 CVE-2024-27008 CVE-2024-27009 CVE-2024-27010 CVE-2024-27011 CVE-2024-27012 CVE-2024-27013 CVE-2024-27014 CVE-2024-27015 CVE-2024-27016 CVE-2024-27017 CVE-2024-27018 CVE-2024-27019 CVE-2024-27020 CVE-2024-27021 CVE-2024-27022 CVE-2024-35860 CVE-2024-35861 CVE-2024-35862 CVE-2024-35863 CVE-2024-35864 CVE-2024-35865 CVE-2024-35866 CVE-2024-35867 CVE-2024-35868 CVE-2024-35869 CVE-2024-35870 CVE-2024-35871 CVE-2024-35872 CVE-2024-35873 CVE-2024-35875 CVE-2024-35877 CVE-2024-35878 CVE-2024-35879 CVE-2024-35880 CVE-2024-35882 CVE-2024-35883 CVE-2024-35884 CVE-2024-35885 CVE-2024-35886 CVE-2024-35887 CVE-2024-35888 CVE-2024-35889 CVE-2024-35890 CVE-2024-35891 CVE-2024-35892 CVE-2024-35893 CVE-2024-35894 CVE-2024-35895 CVE-2024-35896 CVE-2024-35897 CVE-2024-35898 CVE-2024-35899 CVE-2024-35900 CVE-2024-35901 CVE-2024-35902 CVE-2024-35903 CVE-2024-35904 CVE-2024-35905 CVE-2024-35907 CVE-2024-35908 CVE-2024-35909 CVE-2024-35910 CVE-2024-35911 CVE-2024-35912 CVE-2024-35913 CVE-2024-35914 CVE-2024-35915 CVE-2024-35916 CVE-2024-35917 CVE-2024-35919 CVE-2024-35920 CVE-2024-35921 CVE-2024-35922 CVE-2024-35924 CVE-2024-35925 CVE-2024-35926 CVE-2024-35927 CVE-2024-35929 CVE-2024-35930 CVE-2024-35931 CVE-2024-35932 CVE-2024-35933 CVE-2024-35934 CVE-2024-35935 CVE-2024-35936 CVE-2024-35937 CVE-2024-35938 CVE-2024-35939 CVE-2024-35940 CVE-2024-35942 CVE-2024-35943 CVE-2024-35944 CVE-2024-35945 CVE-2024-35946 CVE-2024-35950 CVE-2024-35951 CVE-2024-35952 CVE-2024-35953 CVE-2024-35954 CVE-2024-35955 CVE-2024-35956 CVE-2024-35957 CVE-2024-35958 CVE-2024-35959 CVE-2024-35960 CVE-2024-35961 CVE-2024-35963 CVE-2024-35964 CVE-2024-35965 CVE-2024-35966 CVE-2024-35967 CVE-2024-35968 CVE-2024-35969 CVE-2024-35970 CVE-2024-35971 CVE-2024-35972 CVE-2024-35973 CVE-2024-35974 CVE-2024-35975 CVE-2024-35976 CVE-2024-35977 CVE-2024-35978 CVE-2024-35979 CVE-2024-35980 CVE-2024-35981 CVE-2024-35982 CVE-2024-35985 CVE-2024-36018 CVE-2024-36019 CVE-2024-36020 CVE-2024-36021 CVE-2024-36022 CVE-2024-36023 CVE-2024-36024 CVE-2024-36025 CVE-2024-36026 CVE-2024-36027 USN-6893-2 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS It was discovered that a race condition existed in the Bluetooth subsystem in the Linux kernel when modifying certain settings values through debugfs. A privileged local attacker could use this to cause a denial of service. (CVE-2024-24857, CVE-2024-24858, CVE-2024-24859) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - RISC-V architecture; - S390 architecture; - x86 architecture; - Block layer subsystem; - Compute Acceleration Framework; - Accessibility subsystem; - Android drivers; - Drivers core; - Bluetooth drivers; - Clock framework and drivers; - Data acquisition framework and drivers; - Cryptographic API; - Buffer Sharing and Synchronization framework; - GPU drivers; - On-Chip Interconnect management framework; - IOMMU subsystem; - Multiple devices driver; - Media drivers; - VMware VMCI Driver; - Network drivers; - Microsoft Azure Network Adapter (MANA) driver; - Device tree and open firmware driver; - Chrome hardware platform drivers; - i.MX PM domains; - TI SCI PM domains driver; - S/390 drivers; - SCSI drivers; - SPI subsystem; - Thermal drivers; - TTY drivers; - USB subsystem; - Framebuffer layer; - BTRFS file system; - Network file system server daemon; - NILFS2 file system; - File systems infrastructure; - Pstore file system; - SMB network file system; - BPF subsystem; - Bluetooth subsystem; - Netfilter; - io_uring subsystem; - Core kernel; - Extra boot config (XBC); - Memory management; - Amateur Radio drivers; - B.A.T.M.A.N. meshing protocol; - Ethernet bridge; - Networking core; - IPv4 networking; - IPv6 networking; - Multipath TCP; - NFC subsystem; - RDS protocol; - Network traffic control; - SMC sockets; - Sun RPC protocol; - TLS protocol; - Unix domain sockets; - Wireless networking; - eXpress Data Path; - SELinux security module; (CVE-2024-35976, CVE-2024-35873, CVE-2024-35959, CVE-2024-27012, CVE-2024-36025, CVE-2024-35868, CVE-2024-26995, CVE-2024-35916, CVE-2024-36023, CVE-2024-35964, CVE-2024-35890, CVE-2024-26980, CVE-2024-35950, CVE-2024-27006, CVE-2024-35955, CVE-2024-35885, CVE-2024-35960, CVE-2024-35932, CVE-2024-26986, CVE-2024-35884, CVE-2024-35860, CVE-2024-36020, CVE-2024-35930, CVE-2024-35919, CVE-2024-27020, CVE-2024-26928, CVE-2024-35903, CVE-2024-35907, CVE-2024-35904, CVE-2024-35972, CVE-2024-35892, CVE-2024-26921, CVE-2024-35869, CVE-2024-35957, CVE-2024-35967, CVE-2024-35927, CVE-2024-35946, CVE-2024-27000, CVE-2024-35943, CVE-2024-35902, CVE-2024-27013, CVE-2024-35968, CVE-2024-35970, CVE-2024-35865, CVE-2024-36022, CVE-2024-26993, CVE-2024-36027, CVE-2024-35895, CVE-2024-35908, CVE-2024-35901, CVE-2024-35872, CVE-2024-26925, CVE-2024-35917, CVE-2024-35898, CVE-2024-35861, CVE-2024-35900, CVE-2024-26984, CVE-2024-35891, CVE-2023-52699, CVE-2024-35961, CVE-2024-35951, CVE-2024-36019, CVE-2024-27021, CVE-2024-35939, CVE-2024-26997, CVE-2024-26999, CVE-2024-35897, CVE-2024-35896, CVE-2024-26817, CVE-2024-35875, CVE-2024-35935, CVE-2024-27015, CVE-2024-26982, CVE-2024-35958, CVE-2024-26989, CVE-2024-26922, CVE-2024-26811, CVE-2024-27003, CVE-2024-35920, CVE-2024-27007, CVE-2024-35879, CVE-2024-35979, CVE-2024-35978, CVE-2024-35914, CVE-2024-35938, CVE-2024-35913, CVE-2024-26985, CVE-2024-35915, CVE-2024-35974, CVE-2024-27001, CVE-2024-35940, CVE-2024-35867, CVE-2024-26994, CVE-2024-35886, CVE-2024-35899, CVE-2024-27022, CVE-2024-35910, CVE-2024-35893, CVE-2024-27010, CVE-2024-36024, CVE-2024-26926, CVE-2024-26923, CVE-2024-26990, CVE-2024-35912, CVE-2024-26987, CVE-2024-35966, CVE-2024-35977, CVE-2024-35866, CVE-2024-35975, CVE-2024-35965, CVE-2024-35933, CVE-2024-26936, CVE-2024-35889, CVE-2024-35863, CVE-2024-27002, CVE-2024-27018, CVE-2024-36021, CVE-2024-27019, CVE-2024-35921, CVE-2024-35870, CVE-2024-35956, CVE-2024-27016, CVE-2024-26996, CVE-2024-35878, CVE-2024-26988, CVE-2024-35888, CVE-2024-35936, CVE-2024-27014, CVE-2024-35883, CVE-2024-35862, CVE-2024-35945, CVE-2024-26983, CVE-2024-35982, CVE-2024-35924, CVE-2024-27004, CVE-2024-27008, CVE-2024-35963, CVE-2024-35909, CVE-2024-35911, CVE-2024-35973, CVE-2024-35887, CVE-2024-27009, CVE-2024-35980, CVE-2024-36026, CVE-2024-35969, CVE-2024-35954, CVE-2024-35864, CVE-2024-35953, CVE-2024-26998, CVE-2024-35931, CVE-2024-26981, CVE-2024-35971, CVE-2024-35934, CVE-2024-35929, CVE-2024-35918, CVE-2024-35937, CVE-2024-36018, CVE-2024-35877, CVE-2024-35925, CVE-2024-35981, CVE-2024-35985, CVE-2024-35942, CVE-2024-35922, CVE-2024-35952, CVE-2024-27011, CVE-2024-35944, CVE-2024-35905, CVE-2024-35880, CVE-2024-35882, CVE-2024-27005, CVE-2024-26991, CVE-2024-35871, CVE-2024-35926, CVE-2024-26992, CVE-2024-35894, CVE-2024-27017) Update Instructions: Run `sudo pro fix USN-6893-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1006-gke - 6.8.0-1006.9 linux-gke - 6.8.0-1006.9 linux-gke-headers-6.8.0-1006 - 6.8.0-1006.9 linux-gke-tools-6.8.0-1006 - 6.8.0-1006.9 linux-headers-6.8.0-1006-gke - 6.8.0-1006.9 linux-headers-gke - 6.8.0-1006.9 linux-image-6.8.0-1006-gke - 6.8.0-1006.9 linux-image-gke - 6.8.0-1006.9 linux-image-unsigned-6.8.0-1006-gke - 6.8.0-1006.9 linux-modules-6.8.0-1006-gke - 6.8.0-1006.9 linux-modules-extra-6.8.0-1006-gke - 6.8.0-1006.9 linux-modules-iwlwifi-6.8.0-1006-gke - 6.8.0-1006.9 linux-modules-iwlwifi-gke - 6.8.0-1006.9 linux-tools-6.8.0-1006-gke - 6.8.0-1006.9 linux-tools-gke - 6.8.0-1006.9 No subscription required linux-buildinfo-6.8.0-1009-nvidia - 6.8.0-1009.9 linux-buildinfo-6.8.0-1009-nvidia-64k - 6.8.0-1009.9 linux-cloud-tools-nvidia - 6.8.0-1009.9 linux-headers-6.8.0-1009-nvidia - 6.8.0-1009.9 linux-headers-6.8.0-1009-nvidia-64k - 6.8.0-1009.9 linux-headers-nvidia - 6.8.0-1009.9 linux-headers-nvidia-64k - 6.8.0-1009.9 linux-image-6.8.0-1009-nvidia - 6.8.0-1009.9 linux-image-6.8.0-1009-nvidia-64k - 6.8.0-1009.9 linux-image-nvidia - 6.8.0-1009.9 linux-image-nvidia-64k - 6.8.0-1009.9 linux-image-uc-6.8.0-1009-nvidia - 6.8.0-1009.9 linux-image-uc-6.8.0-1009-nvidia-64k - 6.8.0-1009.9 linux-image-unsigned-6.8.0-1009-nvidia - 6.8.0-1009.9 linux-image-unsigned-6.8.0-1009-nvidia-64k - 6.8.0-1009.9 linux-modules-6.8.0-1009-nvidia - 6.8.0-1009.9 linux-modules-6.8.0-1009-nvidia-64k - 6.8.0-1009.9 linux-modules-extra-6.8.0-1009-nvidia - 6.8.0-1009.9 linux-modules-nvidia-fs-6.8.0-1009-nvidia - 6.8.0-1009.9 linux-modules-nvidia-fs-6.8.0-1009-nvidia-64k - 6.8.0-1009.9 linux-modules-nvidia-fs-nvidia - 6.8.0-1009.9 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1009.9 linux-nvidia - 6.8.0-1009.9 linux-nvidia-64k - 6.8.0-1009.9 linux-nvidia-headers-6.8.0-1009 - 6.8.0-1009.9 linux-nvidia-tools-6.8.0-1009 - 6.8.0-1009.9 linux-nvidia-tools-host - 6.8.0-1009.9 linux-tools-6.8.0-1009-nvidia - 6.8.0-1009.9 linux-tools-6.8.0-1009-nvidia-64k - 6.8.0-1009.9 linux-tools-nvidia - 6.8.0-1009.9 linux-tools-nvidia-64k - 6.8.0-1009.9 No subscription required High CVE-2023-52699 CVE-2024-24857 CVE-2024-24858 CVE-2024-24859 CVE-2024-26811 CVE-2024-26817 CVE-2024-26921 CVE-2024-26922 CVE-2024-26923 CVE-2024-26925 CVE-2024-26926 CVE-2024-26928 CVE-2024-26936 CVE-2024-26980 CVE-2024-26981 CVE-2024-26982 CVE-2024-26983 CVE-2024-26984 CVE-2024-26985 CVE-2024-26986 CVE-2024-26987 CVE-2024-26988 CVE-2024-26989 CVE-2024-26990 CVE-2024-26991 CVE-2024-26992 CVE-2024-26993 CVE-2024-26994 CVE-2024-26995 CVE-2024-26996 CVE-2024-26997 CVE-2024-26998 CVE-2024-26999 CVE-2024-27000 CVE-2024-27001 CVE-2024-27002 CVE-2024-27003 CVE-2024-27004 CVE-2024-27005 CVE-2024-27006 CVE-2024-27007 CVE-2024-27008 CVE-2024-27009 CVE-2024-27010 CVE-2024-27011 CVE-2024-27012 CVE-2024-27013 CVE-2024-27014 CVE-2024-27015 CVE-2024-27016 CVE-2024-27017 CVE-2024-27018 CVE-2024-27019 CVE-2024-27020 CVE-2024-27021 CVE-2024-27022 CVE-2024-35860 CVE-2024-35861 CVE-2024-35862 CVE-2024-35863 CVE-2024-35864 CVE-2024-35865 CVE-2024-35866 CVE-2024-35867 CVE-2024-35868 CVE-2024-35869 CVE-2024-35870 CVE-2024-35871 CVE-2024-35872 CVE-2024-35873 CVE-2024-35875 CVE-2024-35877 CVE-2024-35878 CVE-2024-35879 CVE-2024-35880 CVE-2024-35882 CVE-2024-35883 CVE-2024-35884 CVE-2024-35885 CVE-2024-35886 CVE-2024-35887 CVE-2024-35888 CVE-2024-35889 CVE-2024-35890 CVE-2024-35891 CVE-2024-35892 CVE-2024-35893 CVE-2024-35894 CVE-2024-35895 CVE-2024-35896 CVE-2024-35897 CVE-2024-35898 CVE-2024-35899 CVE-2024-35900 CVE-2024-35901 CVE-2024-35902 CVE-2024-35903 CVE-2024-35904 CVE-2024-35905 CVE-2024-35907 CVE-2024-35908 CVE-2024-35909 CVE-2024-35910 CVE-2024-35911 CVE-2024-35912 CVE-2024-35913 CVE-2024-35914 CVE-2024-35915 CVE-2024-35916 CVE-2024-35917 CVE-2024-35919 CVE-2024-35920 CVE-2024-35921 CVE-2024-35922 CVE-2024-35924 CVE-2024-35925 CVE-2024-35926 CVE-2024-35927 CVE-2024-35929 CVE-2024-35930 CVE-2024-35931 CVE-2024-35932 CVE-2024-35933 CVE-2024-35934 CVE-2024-35935 CVE-2024-35936 CVE-2024-35937 CVE-2024-35938 CVE-2024-35939 CVE-2024-35940 CVE-2024-35942 CVE-2024-35943 CVE-2024-35944 CVE-2024-35945 CVE-2024-35946 CVE-2024-35950 CVE-2024-35951 CVE-2024-35952 CVE-2024-35953 CVE-2024-35954 CVE-2024-35955 CVE-2024-35956 CVE-2024-35957 CVE-2024-35958 CVE-2024-35959 CVE-2024-35960 CVE-2024-35961 CVE-2024-35963 CVE-2024-35964 CVE-2024-35965 CVE-2024-35966 CVE-2024-35967 CVE-2024-35968 CVE-2024-35969 CVE-2024-35970 CVE-2024-35971 CVE-2024-35972 CVE-2024-35973 CVE-2024-35974 CVE-2024-35975 CVE-2024-35976 CVE-2024-35977 CVE-2024-35978 CVE-2024-35979 CVE-2024-35980 CVE-2024-35981 CVE-2024-35982 CVE-2024-35985 CVE-2024-36018 CVE-2024-36019 CVE-2024-36020 CVE-2024-36021 CVE-2024-36022 CVE-2024-36023 CVE-2024-36024 CVE-2024-36025 CVE-2024-36026 CVE-2024-36027 USN-6893-3 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS It was discovered that a race condition existed in the Bluetooth subsystem in the Linux kernel when modifying certain settings values through debugfs. A privileged local attacker could use this to cause a denial of service. (CVE-2024-24857, CVE-2024-24858, CVE-2024-24859) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - RISC-V architecture; - S390 architecture; - x86 architecture; - Block layer subsystem; - Compute Acceleration Framework; - Accessibility subsystem; - Android drivers; - Drivers core; - Bluetooth drivers; - Clock framework and drivers; - Data acquisition framework and drivers; - Cryptographic API; - Buffer Sharing and Synchronization framework; - GPU drivers; - On-Chip Interconnect management framework; - IOMMU subsystem; - Multiple devices driver; - Media drivers; - VMware VMCI Driver; - Network drivers; - Microsoft Azure Network Adapter (MANA) driver; - Device tree and open firmware driver; - Chrome hardware platform drivers; - i.MX PM domains; - TI SCI PM domains driver; - S/390 drivers; - SCSI drivers; - SPI subsystem; - Thermal drivers; - TTY drivers; - USB subsystem; - Framebuffer layer; - BTRFS file system; - Network file system server daemon; - NILFS2 file system; - File systems infrastructure; - Pstore file system; - SMB network file system; - BPF subsystem; - Bluetooth subsystem; - Netfilter; - io_uring subsystem; - Core kernel; - Extra boot config (XBC); - Memory management; - Amateur Radio drivers; - B.A.T.M.A.N. meshing protocol; - Ethernet bridge; - Networking core; - IPv4 networking; - IPv6 networking; - Multipath TCP; - NFC subsystem; - RDS protocol; - Network traffic control; - SMC sockets; - Sun RPC protocol; - TLS protocol; - Unix domain sockets; - Wireless networking; - eXpress Data Path; - SELinux security module; (CVE-2024-35955, CVE-2024-35921, CVE-2024-35946, CVE-2024-35934, CVE-2024-26993, CVE-2024-35899, CVE-2024-35952, CVE-2024-35894, CVE-2024-35886, CVE-2024-35872, CVE-2024-35970, CVE-2024-35936, CVE-2024-35907, CVE-2024-27013, CVE-2024-35910, CVE-2024-27009, CVE-2024-35875, CVE-2024-36021, CVE-2024-26923, CVE-2024-26997, CVE-2024-35978, CVE-2024-35981, CVE-2024-27015, CVE-2024-26928, CVE-2024-35963, CVE-2024-35897, CVE-2024-27020, CVE-2024-35922, CVE-2024-27001, CVE-2024-27011, CVE-2024-35940, CVE-2024-35871, CVE-2024-35900, CVE-2024-35869, CVE-2024-35905, CVE-2024-35974, CVE-2024-35873, CVE-2024-35882, CVE-2024-35914, CVE-2024-35956, CVE-2024-35887, CVE-2024-35920, CVE-2024-27018, CVE-2024-35880, CVE-2024-35943, CVE-2024-35912, CVE-2024-35979, CVE-2024-35862, CVE-2024-36019, CVE-2024-35950, CVE-2024-35977, CVE-2024-35918, CVE-2024-26992, CVE-2024-35884, CVE-2024-35916, CVE-2024-26817, CVE-2024-35959, CVE-2024-35909, CVE-2024-35933, CVE-2024-35982, CVE-2024-26996, CVE-2024-35980, CVE-2024-36018, CVE-2024-26925, CVE-2024-35929, CVE-2024-35971, CVE-2024-26990, CVE-2024-35885, CVE-2024-36025, CVE-2024-26998, CVE-2024-35930, CVE-2024-26982, CVE-2024-36022, CVE-2024-35895, CVE-2024-35902, CVE-2024-35911, CVE-2024-27002, CVE-2024-35968, CVE-2024-35861, CVE-2024-35903, CVE-2024-36026, CVE-2024-35896, CVE-2024-35945, CVE-2024-26936, CVE-2024-35954, CVE-2024-26985, CVE-2024-35908, CVE-2024-35924, CVE-2024-35938, CVE-2024-26991, CVE-2024-27017, CVE-2024-26922, CVE-2024-35919, CVE-2024-35915, CVE-2024-35985, CVE-2024-26995, CVE-2024-35870, CVE-2024-27010, CVE-2024-35904, CVE-2024-26999, CVE-2024-26983, CVE-2024-35939, CVE-2024-35865, CVE-2024-35860, CVE-2024-35944, CVE-2024-27021, CVE-2024-27016, CVE-2024-27004, CVE-2024-27019, CVE-2024-36027, CVE-2024-35890, CVE-2024-35975, CVE-2024-35901, CVE-2024-35967, CVE-2024-26986, CVE-2024-35957, CVE-2024-35937, CVE-2024-26988, CVE-2024-35972, CVE-2024-35926, CVE-2024-26926, CVE-2024-35964, CVE-2024-26994, CVE-2024-35889, CVE-2024-26981, CVE-2024-36024, CVE-2024-27022, CVE-2024-35935, CVE-2024-26811, CVE-2024-35932, CVE-2024-35866, CVE-2024-27008, CVE-2024-27012, CVE-2024-36023, CVE-2024-35931, CVE-2024-35888, CVE-2024-26989, CVE-2024-35868, CVE-2024-35976, CVE-2024-35953, CVE-2024-36020, CVE-2024-35893, CVE-2024-35961, CVE-2024-35965, CVE-2024-35892, CVE-2024-35942, CVE-2024-35958, CVE-2024-27014, CVE-2024-35867, CVE-2024-27003, CVE-2024-27007, CVE-2024-35951, CVE-2024-35973, CVE-2024-35863, CVE-2024-26984, CVE-2024-35898, CVE-2024-35960, CVE-2024-27005, CVE-2024-35917, CVE-2024-35927, CVE-2024-26980, CVE-2024-35877, CVE-2024-35925, CVE-2024-26921, CVE-2024-35913, CVE-2023-52699, CVE-2024-26987, CVE-2024-27006, CVE-2024-35878, CVE-2024-35864, CVE-2024-35969, CVE-2024-35883, CVE-2024-35891, CVE-2024-35879, CVE-2024-27000, CVE-2024-35966) Update Instructions: Run `sudo pro fix USN-6893-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-aws - 6.8.0-1011.12 linux-aws-cloud-tools-6.8.0-1011 - 6.8.0-1011.12 linux-aws-headers-6.8.0-1011 - 6.8.0-1011.12 linux-aws-tools-6.8.0-1011 - 6.8.0-1011.12 linux-buildinfo-6.8.0-1011-aws - 6.8.0-1011.12 linux-cloud-tools-6.8.0-1011-aws - 6.8.0-1011.12 linux-headers-6.8.0-1011-aws - 6.8.0-1011.12 linux-headers-aws - 6.8.0-1011.12 linux-image-6.8.0-1011-aws - 6.8.0-1011.12 linux-image-aws - 6.8.0-1011.12 linux-image-unsigned-6.8.0-1011-aws - 6.8.0-1011.12 linux-modules-6.8.0-1011-aws - 6.8.0-1011.12 linux-modules-extra-6.8.0-1011-aws - 6.8.0-1011.12 linux-modules-extra-aws - 6.8.0-1011.12 linux-tools-6.8.0-1011-aws - 6.8.0-1011.12 linux-tools-aws - 6.8.0-1011.12 No subscription required High CVE-2023-52699 CVE-2024-24857 CVE-2024-24858 CVE-2024-24859 CVE-2024-26811 CVE-2024-26817 CVE-2024-26921 CVE-2024-26922 CVE-2024-26923 CVE-2024-26925 CVE-2024-26926 CVE-2024-26928 CVE-2024-26936 CVE-2024-26980 CVE-2024-26981 CVE-2024-26982 CVE-2024-26983 CVE-2024-26984 CVE-2024-26985 CVE-2024-26986 CVE-2024-26987 CVE-2024-26988 CVE-2024-26989 CVE-2024-26990 CVE-2024-26991 CVE-2024-26992 CVE-2024-26993 CVE-2024-26994 CVE-2024-26995 CVE-2024-26996 CVE-2024-26997 CVE-2024-26998 CVE-2024-26999 CVE-2024-27000 CVE-2024-27001 CVE-2024-27002 CVE-2024-27003 CVE-2024-27004 CVE-2024-27005 CVE-2024-27006 CVE-2024-27007 CVE-2024-27008 CVE-2024-27009 CVE-2024-27010 CVE-2024-27011 CVE-2024-27012 CVE-2024-27013 CVE-2024-27014 CVE-2024-27015 CVE-2024-27016 CVE-2024-27017 CVE-2024-27018 CVE-2024-27019 CVE-2024-27020 CVE-2024-27021 CVE-2024-27022 CVE-2024-35860 CVE-2024-35861 CVE-2024-35862 CVE-2024-35863 CVE-2024-35864 CVE-2024-35865 CVE-2024-35866 CVE-2024-35867 CVE-2024-35868 CVE-2024-35869 CVE-2024-35870 CVE-2024-35871 CVE-2024-35872 CVE-2024-35873 CVE-2024-35875 CVE-2024-35877 CVE-2024-35878 CVE-2024-35879 CVE-2024-35880 CVE-2024-35882 CVE-2024-35883 CVE-2024-35884 CVE-2024-35885 CVE-2024-35886 CVE-2024-35887 CVE-2024-35888 CVE-2024-35889 CVE-2024-35890 CVE-2024-35891 CVE-2024-35892 CVE-2024-35893 CVE-2024-35894 CVE-2024-35895 CVE-2024-35896 CVE-2024-35897 CVE-2024-35898 CVE-2024-35899 CVE-2024-35900 CVE-2024-35901 CVE-2024-35902 CVE-2024-35903 CVE-2024-35904 CVE-2024-35905 CVE-2024-35907 CVE-2024-35908 CVE-2024-35909 CVE-2024-35910 CVE-2024-35911 CVE-2024-35912 CVE-2024-35913 CVE-2024-35914 CVE-2024-35915 CVE-2024-35916 CVE-2024-35917 CVE-2024-35919 CVE-2024-35920 CVE-2024-35921 CVE-2024-35922 CVE-2024-35924 CVE-2024-35925 CVE-2024-35926 CVE-2024-35927 CVE-2024-35929 CVE-2024-35930 CVE-2024-35931 CVE-2024-35932 CVE-2024-35933 CVE-2024-35934 CVE-2024-35935 CVE-2024-35936 CVE-2024-35937 CVE-2024-35938 CVE-2024-35939 CVE-2024-35940 CVE-2024-35942 CVE-2024-35943 CVE-2024-35944 CVE-2024-35945 CVE-2024-35946 CVE-2024-35950 CVE-2024-35951 CVE-2024-35952 CVE-2024-35953 CVE-2024-35954 CVE-2024-35955 CVE-2024-35956 CVE-2024-35957 CVE-2024-35958 CVE-2024-35959 CVE-2024-35960 CVE-2024-35961 CVE-2024-35963 CVE-2024-35964 CVE-2024-35965 CVE-2024-35966 CVE-2024-35967 CVE-2024-35968 CVE-2024-35969 CVE-2024-35970 CVE-2024-35971 CVE-2024-35972 CVE-2024-35973 CVE-2024-35974 CVE-2024-35975 CVE-2024-35976 CVE-2024-35977 CVE-2024-35978 CVE-2024-35979 CVE-2024-35980 CVE-2024-35981 CVE-2024-35982 CVE-2024-35985 CVE-2024-36018 CVE-2024-36019 CVE-2024-36020 CVE-2024-36021 CVE-2024-36022 CVE-2024-36023 CVE-2024-36024 CVE-2024-36025 CVE-2024-36026 CVE-2024-36027 USN-6897-1 -- Ghostscript vulnerabilities Ubuntu 24.04 LTS It was discovered that Ghostscript incorrectly handled certain long PDF filter names. An attacker could possibly use this issue to cause Ghostscript to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-29506) It was discovered that Ghostscript incorrectly handled certain API parameters. An attacker could possibly use this issue to cause Ghostscript to crash, resulting in a denial of service. This issue only affected Ubuntu 24.04 LTS. (CVE-2024-29507) It was discovered that Ghostscript incorrectly handled certain BaseFont names. An attacker could use this issue to cause Ghostscript to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2024-29508) It was discovered that Ghostscript incorrectly handled certain PDF passwords that contained NULL bytes. An attacker could use this issue to cause Ghostscript to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-29509) It was discovered that Ghostscript incorrectly handled certain certain file paths when doing OCR. An attacker could use this issue to read arbitrary files and write error messages to arbitrary files. This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-29511) Update Instructions: Run `sudo pro fix USN-6897-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ghostscript - 10.02.1~dfsg1-0ubuntu7.3 ghostscript-doc - 10.02.1~dfsg1-0ubuntu7.3 libgs-common - 10.02.1~dfsg1-0ubuntu7.3 libgs-dev - 10.02.1~dfsg1-0ubuntu7.3 libgs10 - 10.02.1~dfsg1-0ubuntu7.3 libgs10-common - 10.02.1~dfsg1-0ubuntu7.3 No subscription required Medium CVE-2024-29506 CVE-2024-29507 CVE-2024-29508 CVE-2024-29509 CVE-2024-29511 USN-6899-1 -- GTK vulnerability Ubuntu 24.04 LTS It was discovered that GTK would attempt to load modules from the current directory, contrary to expectations. If users started GTK applications from shared directories, a local attacker could use this issue to execute arbitrary code, and possibly escalate privileges. Update Instructions: Run `sudo pro fix USN-6899-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-gtk-2.0 - 2.24.33-4ubuntu1.1 gtk2-engines-pixbuf - 2.24.33-4ubuntu1.1 libgail-common - 2.24.33-4ubuntu1.1 libgail-dev - 2.24.33-4ubuntu1.1 libgail-doc - 2.24.33-4ubuntu1.1 libgail18t64 - 2.24.33-4ubuntu1.1 libgtk2.0-0t64 - 2.24.33-4ubuntu1.1 libgtk2.0-bin - 2.24.33-4ubuntu1.1 libgtk2.0-common - 2.24.33-4ubuntu1.1 libgtk2.0-dev - 2.24.33-4ubuntu1.1 libgtk2.0-doc - 2.24.33-4ubuntu1.1 No subscription required gir1.2-gtk-3.0 - 3.24.41-4ubuntu1.1 gtk-3-examples - 3.24.41-4ubuntu1.1 gtk-update-icon-cache - 3.24.41-4ubuntu1.1 libgail-3-0t64 - 3.24.41-4ubuntu1.1 libgail-3-dev - 3.24.41-4ubuntu1.1 libgail-3-doc - 3.24.41-4ubuntu1.1 libgtk-3-0t64 - 3.24.41-4ubuntu1.1 libgtk-3-bin - 3.24.41-4ubuntu1.1 libgtk-3-common - 3.24.41-4ubuntu1.1 libgtk-3-dev - 3.24.41-4ubuntu1.1 libgtk-3-doc - 3.24.41-4ubuntu1.1 No subscription required Medium CVE-2024-6655 USN-6902-1 -- Apache HTTP Server vulnerability Ubuntu 24.04 LTS It was discovered that the Apache HTTP Server incorrectly handled certain handlers configured via AddType. A remote attacker could possibly use this issue to obtain source code. Update Instructions: Run `sudo pro fix USN-6902-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: apache2 - 2.4.58-1ubuntu8.4 apache2-bin - 2.4.58-1ubuntu8.4 apache2-data - 2.4.58-1ubuntu8.4 apache2-dev - 2.4.58-1ubuntu8.4 apache2-doc - 2.4.58-1ubuntu8.4 apache2-ssl-dev - 2.4.58-1ubuntu8.4 apache2-suexec-custom - 2.4.58-1ubuntu8.4 apache2-suexec-pristine - 2.4.58-1ubuntu8.4 apache2-utils - 2.4.58-1ubuntu8.4 libapache2-mod-md - 2.4.58-1ubuntu8.4 libapache2-mod-proxy-uwsgi - 2.4.58-1ubuntu8.4 No subscription required Medium CVE-2024-40725 USN-6904-1 -- PyMongo vulnerability Ubuntu 24.04 LTS It was discovered that PyMongo incorrectly handled certain BSON. An attacker could possibly use this issue to read sensitive information or cause a crash. Update Instructions: Run `sudo pro fix USN-6904-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-pymongo-doc - 3.11.0-1ubuntu0.24.04.1 python3-bson - 3.11.0-1ubuntu0.24.04.1 python3-bson-ext - 3.11.0-1ubuntu0.24.04.1 python3-gridfs - 3.11.0-1ubuntu0.24.04.1 python3-pymongo - 3.11.0-1ubuntu0.24.04.1 python3-pymongo-ext - 3.11.0-1ubuntu0.24.04.1 No subscription required Medium CVE-2024-5629 USN-6906-1 -- python-zipp vulnerability Ubuntu 24.04 LTS It was discovered that python-zipp did not properly handle the zip files with malformed names. An attacker could possibly use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-6906-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-zipp - 1.0.0-6ubuntu0.1 No subscription required Medium CVE-2024-5569 USN-6907-1 -- Squid vulnerability Ubuntu 24.04 LTS Joshua Rogers discovered that Squid did not properly handle multi-byte characters during Edge Side Includes (ESI) processing. A remote attacker could possibly use this issue to cause a memory corruption error, leading to a denial of service. Update Instructions: Run `sudo pro fix USN-6907-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: squid - 6.6-1ubuntu5.1 squid-cgi - 6.6-1ubuntu5.1 squid-common - 6.6-1ubuntu5.1 squid-openssl - 6.6-1ubuntu5.1 squid-purge - 6.6-1ubuntu5.1 squidclient - 6.6-1ubuntu5.1 No subscription required Medium CVE-2024-37894 USN-6909-1 -- Bind vulnerabilities Ubuntu 24.04 LTS It was discovered that Bind incorrectly handled a flood of DNS messages over TCP. A remote attacker could possibly use this issue to cause Bind to become unstable, resulting in a denial of service. (CVE-2024-0760) Toshifumi Sakaguchi discovered that Bind incorrectly handled having a very large number of RRs existing at the same time. A remote attacker could possibly use this issue to cause Bind to consume resources, leading to a denial of service. (CVE-2024-1737) It was discovered that Bind incorrectly handled a large number of SIG(0) signed requests. A remote attacker could possibly use this issue to cause Bind to consume resources, leading to a denial of service. (CVE-2024-1975) Daniel Stränger discovered that Bind incorrectly handled serving both stable cache data and authoritative zone content. A remote attacker could possibly use this issue to cause Bind to crash, resulting in a denial of service. (CVE-2024-4076) On Ubuntu 20.04 LTS, Bind has been updated from 9.16 to 9.18. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information: https://kb.isc.org/docs/changes-to-be-aware-of-when-moving-from-bind-916-to-918 Update Instructions: Run `sudo pro fix USN-6909-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: bind9 - 1:9.18.28-0ubuntu0.24.04.1 bind9-dev - 1:9.18.28-0ubuntu0.24.04.1 bind9-dnsutils - 1:9.18.28-0ubuntu0.24.04.1 bind9-doc - 1:9.18.28-0ubuntu0.24.04.1 bind9-host - 1:9.18.28-0ubuntu0.24.04.1 bind9-libs - 1:9.18.28-0ubuntu0.24.04.1 bind9-utils - 1:9.18.28-0ubuntu0.24.04.1 bind9utils - 1:9.18.28-0ubuntu0.24.04.1 dnsutils - 1:9.18.28-0ubuntu0.24.04.1 No subscription required Medium CVE-2024-0760 CVE-2024-1737 CVE-2024-1975 CVE-2024-4076 USN-6911-1 -- Nova vulnerability Ubuntu 24.04 LTS Arnaud Morin discovered that Nova incorrectly handled certain raw format images. An authenticated user could use this issue to access arbitrary files on the server, possibly exposing sensitive information. Update Instructions: Run `sudo pro fix USN-6911-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: nova-ajax-console-proxy - 3:29.0.1-0ubuntu1.4 nova-api - 3:29.0.1-0ubuntu1.4 nova-api-metadata - 3:29.0.1-0ubuntu1.4 nova-api-os-compute - 3:29.0.1-0ubuntu1.4 nova-api-os-volume - 3:29.0.1-0ubuntu1.4 nova-cells - 3:29.0.1-0ubuntu1.4 nova-common - 3:29.0.1-0ubuntu1.4 nova-compute - 3:29.0.1-0ubuntu1.4 nova-compute-ironic - 3:29.0.1-0ubuntu1.4 nova-compute-kvm - 3:29.0.1-0ubuntu1.4 nova-compute-libvirt - 3:29.0.1-0ubuntu1.4 nova-compute-lxc - 3:29.0.1-0ubuntu1.4 nova-compute-qemu - 3:29.0.1-0ubuntu1.4 nova-compute-vmware - 3:29.0.1-0ubuntu1.4 nova-compute-xen - 3:29.0.1-0ubuntu1.4 nova-conductor - 3:29.0.1-0ubuntu1.4 nova-doc - 3:29.0.1-0ubuntu1.4 nova-novncproxy - 3:29.0.1-0ubuntu1.4 nova-scheduler - 3:29.0.1-0ubuntu1.4 nova-serialproxy - 3:29.0.1-0ubuntu1.4 nova-spiceproxy - 3:29.0.1-0ubuntu1.4 nova-volume - 3:29.0.1-0ubuntu1.4 python3-nova - 3:29.0.1-0ubuntu1.4 No subscription required Medium CVE-2024-40767 USN-6912-1 -- provd vulnerability Ubuntu 24.04 LTS James Henstridge discovered that provd incorrectly handled environment variables. A local attacker could possibly use this issue to run arbitrary programs and escalate privileges. Update Instructions: Run `sudo pro fix USN-6912-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: provd - 0.1.2+24.04 No subscription required Medium CVE-2024-6714 https://bugs.launchpad.net/ubuntu/+source/provd/+bug/2071574 USN-6915-1 -- poppler vulnerability Ubuntu 24.04 LTS It was discovered that poppler incorrectly handled certain malformed PDF. An attacker could possibly use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-6915-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-poppler-0.18 - 24.02.0-1ubuntu9.1 libpoppler-cpp-dev - 24.02.0-1ubuntu9.1 libpoppler-cpp0t64 - 24.02.0-1ubuntu9.1 libpoppler-dev - 24.02.0-1ubuntu9.1 libpoppler-glib-dev - 24.02.0-1ubuntu9.1 libpoppler-glib-doc - 24.02.0-1ubuntu9.1 libpoppler-glib8t64 - 24.02.0-1ubuntu9.1 libpoppler-private-dev - 24.02.0-1ubuntu9.1 libpoppler-qt5-1t64 - 24.02.0-1ubuntu9.1 libpoppler-qt5-dev - 24.02.0-1ubuntu9.1 libpoppler-qt6-3t64 - 24.02.0-1ubuntu9.1 libpoppler-qt6-dev - 24.02.0-1ubuntu9.1 libpoppler134 - 24.02.0-1ubuntu9.1 poppler-utils - 24.02.0-1ubuntu9.1 No subscription required Low CVE-2024-6239 USN-6918-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS It was discovered that a race condition existed in the Bluetooth subsystem in the Linux kernel when modifying certain settings values through debugfs. A privileged local attacker could use this to cause a denial of service. Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - RISC-V architecture; - S390 architecture; - x86 architecture; - Block layer subsystem; - Compute Acceleration Framework; - Accessibility subsystem; - Android drivers; - Drivers core; - Bluetooth drivers; - Clock framework and drivers; - Data acquisition framework and drivers; - Cryptographic API; - Buffer Sharing and Synchronization framework; - GPU drivers; - On-Chip Interconnect management framework; - IOMMU subsystem; - Multiple devices driver; - Media drivers; - VMware VMCI Driver; - Network drivers; - Microsoft Azure Network Adapter (MANA) driver; - Device tree and open firmware driver; - Chrome hardware platform drivers; - i.MX PM domains; - TI SCI PM domains driver; - S/390 drivers; - SCSI drivers; - SPI subsystem; - Thermal drivers; - TTY drivers; - USB subsystem; - Framebuffer layer; - BTRFS file system; - Network file system server daemon; - NILFS2 file system; - File systems infrastructure; - Pstore file system; - SMB network file system; - BPF subsystem; - Bluetooth subsystem; - Netfilter; - io_uring subsystem; - Core kernel; - Extra boot config (XBC); - Memory management; - Amateur Radio drivers; - B.A.T.M.A.N. meshing protocol; - Ethernet bridge; - Networking core; - IPv4 networking; - IPv6 networking; - Multipath TCP; - NFC subsystem; - RDS protocol; - Network traffic control; - SMC sockets; - Sun RPC protocol; - TLS protocol; - Unix domain sockets; - Wireless networking; - eXpress Data Path; - SELinux security module; (CVE-2024-26988, CVE-2024-36023, CVE-2024-35869, CVE-2024-35938, CVE-2024-27000, CVE-2024-35880, CVE-2024-35915, CVE-2024-35959, CVE-2024-35883, CVE-2024-35886, CVE-2024-35976, CVE-2024-35903, CVE-2024-35980, CVE-2024-27020, CVE-2024-35955, CVE-2024-35964, CVE-2024-26980, CVE-2024-35882, CVE-2024-35927, CVE-2024-35884, CVE-2024-35914, CVE-2024-35905, CVE-2024-26925, CVE-2024-35885, CVE-2024-26990, CVE-2024-27012, CVE-2024-35969, CVE-2024-35862, CVE-2024-35956, CVE-2024-35971, CVE-2024-27022, CVE-2024-35935, CVE-2024-26992, CVE-2024-27010, CVE-2024-35892, CVE-2024-26999, CVE-2024-26989, CVE-2024-35963, CVE-2024-35981, CVE-2024-26997, CVE-2024-35920, CVE-2024-35918, CVE-2024-35933, CVE-2024-35867, CVE-2024-35904, CVE-2024-35890, CVE-2024-35968, CVE-2024-35917, CVE-2024-35897, CVE-2024-26922, CVE-2024-36026, CVE-2024-27013, CVE-2024-26991, CVE-2024-26996, CVE-2024-35873, CVE-2024-26987, CVE-2024-35895, CVE-2024-36027, CVE-2024-35896, CVE-2024-35894, CVE-2024-26983, CVE-2024-35966, CVE-2024-35967, CVE-2024-35945, CVE-2024-27003, CVE-2024-35939, CVE-2024-35861, CVE-2024-26985, CVE-2024-27015, CVE-2024-35982, CVE-2024-35912, CVE-2024-35979, CVE-2024-35879, CVE-2024-26982, CVE-2024-35891, CVE-2024-35925, CVE-2024-35870, CVE-2024-27021, CVE-2024-35866, CVE-2024-27014, CVE-2024-27001, CVE-2024-27004, CVE-2024-35953, CVE-2024-36021, CVE-2024-35931, CVE-2024-27007, CVE-2024-35922, CVE-2024-35872, CVE-2024-35926, CVE-2024-27016, CVE-2024-26984, CVE-2024-35919, CVE-2024-35911, CVE-2024-26923, CVE-2024-35929, CVE-2024-35887, CVE-2024-35893, CVE-2024-35898, CVE-2024-35930, CVE-2024-35934, CVE-2024-35916, CVE-2024-35877, CVE-2024-26926, CVE-2024-35974, CVE-2024-36018, CVE-2024-27002, CVE-2024-35975, CVE-2024-35864, CVE-2024-35958, CVE-2024-35944, CVE-2024-35985, CVE-2024-35940, CVE-2024-35900, CVE-2024-27018, CVE-2024-26936, CVE-2024-36024, CVE-2024-26998, CVE-2024-35954, CVE-2024-35878, CVE-2024-26928, CVE-2024-35952, CVE-2024-36020, CVE-2024-26986, CVE-2024-35950, CVE-2024-35957, CVE-2024-35909, CVE-2024-27005, CVE-2024-35978, CVE-2024-35875, CVE-2024-35943, CVE-2024-35970, CVE-2024-35863, CVE-2024-26993, CVE-2024-35865, CVE-2024-26995, CVE-2024-35888, CVE-2024-35899, CVE-2024-35868, CVE-2023-52699, CVE-2024-26994, CVE-2024-26817, CVE-2024-35902, CVE-2024-35977, CVE-2024-35961, CVE-2024-36025, CVE-2024-35936, CVE-2024-35913, CVE-2024-27017, CVE-2024-35889, CVE-2024-35972, CVE-2024-35901, CVE-2024-26921, CVE-2024-26924, CVE-2024-35951, CVE-2024-35860, CVE-2024-35907, CVE-2024-35910, CVE-2024-36022, CVE-2024-27019, CVE-2024-27009, CVE-2024-26981, CVE-2024-35973, CVE-2024-35965, CVE-2024-36019, CVE-2024-35871, CVE-2024-27008, CVE-2024-26811, CVE-2024-35908, CVE-2024-35921, CVE-2024-35942, CVE-2024-35946, CVE-2024-35924, CVE-2024-27011, CVE-2024-35960, CVE-2024-27006, CVE-2024-35937, CVE-2024-35932) Update Instructions: Run `sudo pro fix USN-6918-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1008-oracle - 6.8.0-1008.8 linux-buildinfo-6.8.0-1008-oracle-64k - 6.8.0-1008.8 linux-headers-6.8.0-1008-oracle - 6.8.0-1008.8 linux-headers-6.8.0-1008-oracle-64k - 6.8.0-1008.8 linux-headers-oracle - 6.8.0-1008.8 linux-headers-oracle-64k - 6.8.0-1008.8 linux-image-6.8.0-1008-oracle - 6.8.0-1008.8 linux-image-6.8.0-1008-oracle-64k - 6.8.0-1008.8 linux-image-oracle - 6.8.0-1008.8 linux-image-oracle-64k - 6.8.0-1008.8 linux-image-unsigned-6.8.0-1008-oracle - 6.8.0-1008.8 linux-image-unsigned-6.8.0-1008-oracle-64k - 6.8.0-1008.8 linux-modules-6.8.0-1008-oracle - 6.8.0-1008.8 linux-modules-6.8.0-1008-oracle-64k - 6.8.0-1008.8 linux-modules-extra-6.8.0-1008-oracle - 6.8.0-1008.8 linux-modules-extra-6.8.0-1008-oracle-64k - 6.8.0-1008.8 linux-modules-iwlwifi-6.8.0-1008-oracle - 6.8.0-1008.8 linux-modules-iwlwifi-oracle - 6.8.0-1008.8 linux-oracle - 6.8.0-1008.8 linux-oracle-64k - 6.8.0-1008.8 linux-oracle-headers-6.8.0-1008 - 6.8.0-1008.8 linux-oracle-tools-6.8.0-1008 - 6.8.0-1008.8 linux-tools-6.8.0-1008-oracle - 6.8.0-1008.8 linux-tools-6.8.0-1008-oracle-64k - 6.8.0-1008.8 linux-tools-oracle - 6.8.0-1008.8 linux-tools-oracle-64k - 6.8.0-1008.8 No subscription required High CVE-2023-52699 CVE-2024-24857 CVE-2024-24858 CVE-2024-24859 CVE-2024-26811 CVE-2024-26817 CVE-2024-26921 CVE-2024-26922 CVE-2024-26923 CVE-2024-26924 CVE-2024-26925 CVE-2024-26926 CVE-2024-26928 CVE-2024-26936 CVE-2024-26980 CVE-2024-26981 CVE-2024-26982 CVE-2024-26983 CVE-2024-26984 CVE-2024-26985 CVE-2024-26986 CVE-2024-26987 CVE-2024-26988 CVE-2024-26989 CVE-2024-26990 CVE-2024-26991 CVE-2024-26992 CVE-2024-26993 CVE-2024-26994 CVE-2024-26995 CVE-2024-26996 CVE-2024-26997 CVE-2024-26998 CVE-2024-26999 CVE-2024-27000 CVE-2024-27001 CVE-2024-27002 CVE-2024-27003 CVE-2024-27004 CVE-2024-27005 CVE-2024-27006 CVE-2024-27007 CVE-2024-27008 CVE-2024-27009 CVE-2024-27010 CVE-2024-27011 CVE-2024-27012 CVE-2024-27013 CVE-2024-27014 CVE-2024-27015 CVE-2024-27016 CVE-2024-27017 CVE-2024-27018 CVE-2024-27019 CVE-2024-27020 CVE-2024-27021 CVE-2024-27022 CVE-2024-35860 CVE-2024-35861 CVE-2024-35862 CVE-2024-35863 CVE-2024-35864 CVE-2024-35865 CVE-2024-35866 CVE-2024-35867 CVE-2024-35868 CVE-2024-35869 CVE-2024-35870 CVE-2024-35871 CVE-2024-35872 CVE-2024-35873 CVE-2024-35875 CVE-2024-35877 CVE-2024-35878 CVE-2024-35879 CVE-2024-35880 CVE-2024-35882 CVE-2024-35883 CVE-2024-35884 CVE-2024-35885 CVE-2024-35886 CVE-2024-35887 CVE-2024-35888 CVE-2024-35889 CVE-2024-35890 CVE-2024-35891 CVE-2024-35892 CVE-2024-35893 CVE-2024-35894 CVE-2024-35895 CVE-2024-35896 CVE-2024-35897 CVE-2024-35898 CVE-2024-35899 CVE-2024-35900 CVE-2024-35901 CVE-2024-35902 CVE-2024-35903 CVE-2024-35904 CVE-2024-35905 CVE-2024-35907 CVE-2024-35908 CVE-2024-35909 CVE-2024-35910 CVE-2024-35911 CVE-2024-35912 CVE-2024-35913 CVE-2024-35914 CVE-2024-35915 CVE-2024-35916 CVE-2024-35917 CVE-2024-35919 CVE-2024-35920 CVE-2024-35921 CVE-2024-35922 CVE-2024-35924 CVE-2024-35925 CVE-2024-35926 CVE-2024-35927 CVE-2024-35929 CVE-2024-35930 CVE-2024-35931 CVE-2024-35932 CVE-2024-35933 CVE-2024-35934 CVE-2024-35935 CVE-2024-35936 CVE-2024-35937 CVE-2024-35938 CVE-2024-35939 CVE-2024-35940 CVE-2024-35942 CVE-2024-35943 CVE-2024-35944 CVE-2024-35945 CVE-2024-35946 CVE-2024-35950 CVE-2024-35951 CVE-2024-35952 CVE-2024-35953 CVE-2024-35954 CVE-2024-35955 CVE-2024-35956 CVE-2024-35957 CVE-2024-35958 CVE-2024-35959 CVE-2024-35960 CVE-2024-35961 CVE-2024-35963 CVE-2024-35964 CVE-2024-35965 CVE-2024-35966 CVE-2024-35967 CVE-2024-35968 CVE-2024-35969 CVE-2024-35970 CVE-2024-35971 CVE-2024-35972 CVE-2024-35973 CVE-2024-35974 CVE-2024-35975 CVE-2024-35976 CVE-2024-35977 CVE-2024-35978 CVE-2024-35979 CVE-2024-35980 CVE-2024-35981 CVE-2024-35982 CVE-2024-35985 CVE-2024-36018 CVE-2024-36019 CVE-2024-36020 CVE-2024-36021 CVE-2024-36022 CVE-2024-36023 CVE-2024-36024 CVE-2024-36025 CVE-2024-36026 CVE-2024-36027 USN-6921-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Benedict Schlüter, Supraja Sridhara, Andrin Bertschi, and Shweta Shinde discovered that an untrusted hypervisor could inject malicious #VC interrupts and compromise the security guarantees of AMD SEV-SNP. This flaw is known as WeSee. A local attacker in control of the hypervisor could use this to expose sensitive information or possibly execute arbitrary code in the trusted execution environment. (CVE-2024-25742) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - DMA engine subsystem; - HID subsystem; - I2C subsystem; - PHY drivers; - TTY drivers; - IPv4 networking; (CVE-2024-35990, CVE-2024-35997, CVE-2024-35992, CVE-2024-35984, CVE-2024-36008, CVE-2024-36016) Update Instructions: Run `sudo pro fix USN-6921-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1007-gke - 6.8.0-1007.10 linux-gke - 6.8.0-1007.10 linux-gke-headers-6.8.0-1007 - 6.8.0-1007.10 linux-gke-tools-6.8.0-1007 - 6.8.0-1007.10 linux-headers-6.8.0-1007-gke - 6.8.0-1007.10 linux-headers-gke - 6.8.0-1007.10 linux-image-6.8.0-1007-gke - 6.8.0-1007.10 linux-image-gke - 6.8.0-1007.10 linux-image-unsigned-6.8.0-1007-gke - 6.8.0-1007.10 linux-modules-6.8.0-1007-gke - 6.8.0-1007.10 linux-modules-extra-6.8.0-1007-gke - 6.8.0-1007.10 linux-modules-iwlwifi-6.8.0-1007-gke - 6.8.0-1007.10 linux-modules-iwlwifi-gke - 6.8.0-1007.10 linux-tools-6.8.0-1007-gke - 6.8.0-1007.10 linux-tools-gke - 6.8.0-1007.10 No subscription required linux-buildinfo-6.8.0-1008-raspi - 6.8.0-1008.8 linux-headers-6.8.0-1008-raspi - 6.8.0-1008.8 linux-headers-raspi - 6.8.0-1008.8 linux-image-6.8.0-1008-raspi - 6.8.0-1008.8 linux-image-raspi - 6.8.0-1008.8 linux-modules-6.8.0-1008-raspi - 6.8.0-1008.8 linux-raspi - 6.8.0-1008.8 linux-raspi-headers-6.8.0-1008 - 6.8.0-1008.8 linux-raspi-tools-6.8.0-1008 - 6.8.0-1008.8 linux-tools-6.8.0-1008-raspi - 6.8.0-1008.8 linux-tools-raspi - 6.8.0-1008.8 No subscription required linux-buildinfo-6.8.0-1009-ibm - 6.8.0-1009.9 linux-buildinfo-6.8.0-1009-oem - 6.8.0-1009.9 linux-headers-6.8.0-1009-ibm - 6.8.0-1009.9 linux-headers-6.8.0-1009-oem - 6.8.0-1009.9 linux-headers-ibm - 6.8.0-1009.9 linux-headers-ibm-classic - 6.8.0-1009.9 linux-headers-ibm-lts-24.04 - 6.8.0-1009.9 linux-headers-oem-24.04 - 6.8.0-1009.9 linux-headers-oem-24.04a - 6.8.0-1009.9 linux-ibm - 6.8.0-1009.9 linux-ibm-classic - 6.8.0-1009.9 linux-ibm-cloud-tools-common - 6.8.0-1009.9 linux-ibm-headers-6.8.0-1009 - 6.8.0-1009.9 linux-ibm-lts-24.04 - 6.8.0-1009.9 linux-ibm-source-6.8.0 - 6.8.0-1009.9 linux-ibm-tools-6.8.0-1009 - 6.8.0-1009.9 linux-image-6.8.0-1009-ibm - 6.8.0-1009.9 linux-image-6.8.0-1009-oem - 6.8.0-1009.9 linux-image-ibm - 6.8.0-1009.9 linux-image-ibm-classic - 6.8.0-1009.9 linux-image-ibm-lts-24.04 - 6.8.0-1009.9 linux-image-oem-24.04 - 6.8.0-1009.9 linux-image-oem-24.04a - 6.8.0-1009.9 linux-image-uc-6.8.0-1009-oem - 6.8.0-1009.9 linux-image-uc-oem-24.04 - 6.8.0-1009.9 linux-image-uc-oem-24.04a - 6.8.0-1009.9 linux-image-unsigned-6.8.0-1009-ibm - 6.8.0-1009.9 linux-image-unsigned-6.8.0-1009-oem - 6.8.0-1009.9 linux-modules-6.8.0-1009-ibm - 6.8.0-1009.9 linux-modules-6.8.0-1009-oem - 6.8.0-1009.9 linux-modules-extra-6.8.0-1009-ibm - 6.8.0-1009.9 linux-modules-ipu6-6.8.0-1009-oem - 6.8.0-1009.9 linux-modules-ipu6-oem-24.04 - 6.8.0-1009.9 linux-modules-ipu6-oem-24.04a - 6.8.0-1009.9 linux-modules-iwlwifi-6.8.0-1009-ibm - 6.8.0-1009.9 linux-modules-iwlwifi-6.8.0-1009-oem - 6.8.0-1009.9 linux-modules-iwlwifi-ibm - 6.8.0-1009.9 linux-modules-iwlwifi-ibm-classic - 6.8.0-1009.9 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1009.9 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1009.9 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1009.9 linux-modules-usbio-6.8.0-1009-oem - 6.8.0-1009.9 linux-modules-usbio-oem-24.04 - 6.8.0-1009.9 linux-modules-usbio-oem-24.04a - 6.8.0-1009.9 linux-oem-24.04 - 6.8.0-1009.9 linux-oem-24.04a - 6.8.0-1009.9 linux-oem-6.8-headers-6.8.0-1009 - 6.8.0-1009.9 linux-oem-6.8-tools-6.8.0-1009 - 6.8.0-1009.9 linux-tools-6.8.0-1009-ibm - 6.8.0-1009.9 linux-tools-6.8.0-1009-oem - 6.8.0-1009.9 linux-tools-ibm - 6.8.0-1009.9 linux-tools-ibm-classic - 6.8.0-1009.9 linux-tools-ibm-lts-24.04 - 6.8.0-1009.9 linux-tools-oem-24.04 - 6.8.0-1009.9 linux-tools-oem-24.04a - 6.8.0-1009.9 No subscription required linux-buildinfo-6.8.0-1010-nvidia - 6.8.0-1010.10 linux-buildinfo-6.8.0-1010-nvidia-64k - 6.8.0-1010.10 linux-cloud-tools-nvidia - 6.8.0-1010.10 linux-headers-6.8.0-1010-nvidia - 6.8.0-1010.10 linux-headers-6.8.0-1010-nvidia-64k - 6.8.0-1010.10 linux-headers-nvidia - 6.8.0-1010.10 linux-headers-nvidia-64k - 6.8.0-1010.10 linux-image-6.8.0-1010-nvidia - 6.8.0-1010.10 linux-image-6.8.0-1010-nvidia-64k - 6.8.0-1010.10 linux-image-nvidia - 6.8.0-1010.10 linux-image-nvidia-64k - 6.8.0-1010.10 linux-image-uc-6.8.0-1010-nvidia - 6.8.0-1010.10 linux-image-uc-6.8.0-1010-nvidia-64k - 6.8.0-1010.10 linux-image-unsigned-6.8.0-1010-nvidia - 6.8.0-1010.10 linux-image-unsigned-6.8.0-1010-nvidia-64k - 6.8.0-1010.10 linux-modules-6.8.0-1010-nvidia - 6.8.0-1010.10 linux-modules-6.8.0-1010-nvidia-64k - 6.8.0-1010.10 linux-modules-extra-6.8.0-1010-nvidia - 6.8.0-1010.10 linux-modules-nvidia-fs-6.8.0-1010-nvidia - 6.8.0-1010.10 linux-modules-nvidia-fs-6.8.0-1010-nvidia-64k - 6.8.0-1010.10 linux-modules-nvidia-fs-nvidia - 6.8.0-1010.10 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1010.10 linux-nvidia - 6.8.0-1010.10 linux-nvidia-64k - 6.8.0-1010.10 linux-nvidia-headers-6.8.0-1010 - 6.8.0-1010.10 linux-nvidia-tools-6.8.0-1010 - 6.8.0-1010.10 linux-nvidia-tools-host - 6.8.0-1010.10 linux-tools-6.8.0-1010-nvidia - 6.8.0-1010.10 linux-tools-6.8.0-1010-nvidia-64k - 6.8.0-1010.10 linux-tools-nvidia - 6.8.0-1010.10 linux-tools-nvidia-64k - 6.8.0-1010.10 No subscription required linux-buildinfo-6.8.0-1011-gcp - 6.8.0-1011.12 linux-gcp - 6.8.0-1011.12 linux-gcp-headers-6.8.0-1011 - 6.8.0-1011.12 linux-gcp-tools-6.8.0-1011 - 6.8.0-1011.12 linux-headers-6.8.0-1011-gcp - 6.8.0-1011.12 linux-headers-gcp - 6.8.0-1011.12 linux-image-6.8.0-1011-gcp - 6.8.0-1011.12 linux-image-gcp - 6.8.0-1011.12 linux-image-unsigned-6.8.0-1011-gcp - 6.8.0-1011.12 linux-modules-6.8.0-1011-gcp - 6.8.0-1011.12 linux-modules-extra-6.8.0-1011-gcp - 6.8.0-1011.12 linux-modules-extra-gcp - 6.8.0-1011.12 linux-modules-iwlwifi-6.8.0-1011-gcp - 6.8.0-1011.12 linux-modules-iwlwifi-gcp - 6.8.0-1011.12 linux-tools-6.8.0-1011-gcp - 6.8.0-1011.12 linux-tools-gcp - 6.8.0-1011.12 No subscription required linux-aws - 6.8.0-1012.13 linux-aws-cloud-tools-6.8.0-1012 - 6.8.0-1012.13 linux-aws-headers-6.8.0-1012 - 6.8.0-1012.13 linux-aws-tools-6.8.0-1012 - 6.8.0-1012.13 linux-buildinfo-6.8.0-1012-aws - 6.8.0-1012.13 linux-cloud-tools-6.8.0-1012-aws - 6.8.0-1012.13 linux-headers-6.8.0-1012-aws - 6.8.0-1012.13 linux-headers-aws - 6.8.0-1012.13 linux-image-6.8.0-1012-aws - 6.8.0-1012.13 linux-image-aws - 6.8.0-1012.13 linux-image-unsigned-6.8.0-1012-aws - 6.8.0-1012.13 linux-modules-6.8.0-1012-aws - 6.8.0-1012.13 linux-modules-extra-6.8.0-1012-aws - 6.8.0-1012.13 linux-modules-extra-aws - 6.8.0-1012.13 linux-tools-6.8.0-1012-aws - 6.8.0-1012.13 linux-tools-aws - 6.8.0-1012.13 No subscription required linux-buildinfo-6.8.0-39-generic - 6.8.0-39.39 linux-buildinfo-6.8.0-39-generic-64k - 6.8.0-39.39 linux-cloud-tools-6.8.0-39 - 6.8.0-39.39 linux-cloud-tools-6.8.0-39-generic - 6.8.0-39.39 linux-cloud-tools-common - 6.8.0-39.39 linux-cloud-tools-generic - 6.8.0-39.39 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-39.39 linux-cloud-tools-generic-hwe-24.04-edge - 6.8.0-39.39 linux-cloud-tools-virtual - 6.8.0-39.39 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-39.39 linux-cloud-tools-virtual-hwe-24.04-edge - 6.8.0-39.39 linux-crashdump - 6.8.0-39.39 linux-doc - 6.8.0-39.39 linux-generic - 6.8.0-39.39 linux-generic-64k - 6.8.0-39.39 linux-generic-64k-hwe-24.04 - 6.8.0-39.39 linux-generic-64k-hwe-24.04-edge - 6.8.0-39.39 linux-generic-hwe-24.04 - 6.8.0-39.39 linux-generic-hwe-24.04-edge - 6.8.0-39.39 linux-generic-lpae - 6.8.0-39.39 linux-headers-6.8.0-39 - 6.8.0-39.39 linux-headers-6.8.0-39-generic - 6.8.0-39.39 linux-headers-6.8.0-39-generic-64k - 6.8.0-39.39 linux-headers-generic - 6.8.0-39.39 linux-headers-generic-64k - 6.8.0-39.39 linux-headers-generic-64k-hwe-24.04 - 6.8.0-39.39 linux-headers-generic-64k-hwe-24.04-edge - 6.8.0-39.39 linux-headers-generic-hwe-24.04 - 6.8.0-39.39 linux-headers-generic-hwe-24.04-edge - 6.8.0-39.39 linux-headers-generic-lpae - 6.8.0-39.39 linux-headers-kvm - 6.8.0-39.39 linux-headers-laptop-23.10 - 6.8.0-39.39 linux-headers-oem-20.04 - 6.8.0-39.39 linux-headers-oem-20.04b - 6.8.0-39.39 linux-headers-oem-20.04c - 6.8.0-39.39 linux-headers-oem-20.04d - 6.8.0-39.39 linux-headers-oem-22.04 - 6.8.0-39.39 linux-headers-virtual - 6.8.0-39.39 linux-headers-virtual-hwe-24.04 - 6.8.0-39.39 linux-headers-virtual-hwe-24.04-edge - 6.8.0-39.39 linux-image-6.8.0-39-generic - 6.8.0-39.39 linux-image-6.8.0-39-generic-64k - 6.8.0-39.39 linux-image-extra-virtual - 6.8.0-39.39 linux-image-extra-virtual-hwe-24.04 - 6.8.0-39.39 linux-image-extra-virtual-hwe-24.04-edge - 6.8.0-39.39 linux-image-generic - 6.8.0-39.39 linux-image-generic-64k - 6.8.0-39.39 linux-image-generic-64k-hwe-24.04 - 6.8.0-39.39 linux-image-generic-64k-hwe-24.04-edge - 6.8.0-39.39 linux-image-generic-hwe-24.04 - 6.8.0-39.39 linux-image-generic-hwe-24.04-edge - 6.8.0-39.39 linux-image-generic-lpae - 6.8.0-39.39 linux-image-kvm - 6.8.0-39.39 linux-image-laptop-23.10 - 6.8.0-39.39 linux-image-oem-20.04 - 6.8.0-39.39 linux-image-oem-20.04b - 6.8.0-39.39 linux-image-oem-20.04c - 6.8.0-39.39 linux-image-oem-20.04d - 6.8.0-39.39 linux-image-oem-22.04 - 6.8.0-39.39 linux-image-uc-6.8.0-39-generic - 6.8.0-39.39 linux-image-uc-6.8.0-39-generic-64k - 6.8.0-39.39 linux-image-uc-generic - 6.8.0-39.39 linux-image-uc-generic-hwe-24.04 - 6.8.0-39.39 linux-image-uc-generic-hwe-24.04-edge - 6.8.0-39.39 linux-image-unsigned-6.8.0-39-generic - 6.8.0-39.39 linux-image-unsigned-6.8.0-39-generic-64k - 6.8.0-39.39 linux-image-virtual - 6.8.0-39.39 linux-image-virtual-hwe-24.04 - 6.8.0-39.39 linux-image-virtual-hwe-24.04-edge - 6.8.0-39.39 linux-kvm - 6.8.0-39.39 linux-laptop-23.10 - 6.8.0-39.39 linux-lib-rust-6.8.0-39-generic - 6.8.0-39.39 linux-libc-dev - 6.8.0-39.39 linux-modules-6.8.0-39-generic - 6.8.0-39.39 linux-modules-6.8.0-39-generic-64k - 6.8.0-39.39 linux-modules-extra-6.8.0-39-generic - 6.8.0-39.39 linux-modules-ipu6-6.8.0-39-generic - 6.8.0-39.39 linux-modules-ipu6-generic - 6.8.0-39.39 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-39.39 linux-modules-ipu6-generic-hwe-24.04-edge - 6.8.0-39.39 linux-modules-iwlwifi-6.8.0-39-generic - 6.8.0-39.39 linux-modules-iwlwifi-generic - 6.8.0-39.39 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-39.39 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.8.0-39.39 linux-modules-iwlwifi-oem-20.04 - 6.8.0-39.39 linux-modules-iwlwifi-oem-20.04d - 6.8.0-39.39 linux-modules-iwlwifi-oem-22.04 - 6.8.0-39.39 linux-modules-usbio-6.8.0-39-generic - 6.8.0-39.39 linux-modules-usbio-generic - 6.8.0-39.39 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-39.39 linux-modules-usbio-generic-hwe-24.04-edge - 6.8.0-39.39 linux-oem-20.04 - 6.8.0-39.39 linux-oem-20.04b - 6.8.0-39.39 linux-oem-20.04c - 6.8.0-39.39 linux-oem-20.04d - 6.8.0-39.39 linux-oem-22.04 - 6.8.0-39.39 linux-source - 6.8.0-39.39 linux-source-6.8.0 - 6.8.0-39.39 linux-tools-6.8.0-39 - 6.8.0-39.39 linux-tools-6.8.0-39-generic - 6.8.0-39.39 linux-tools-6.8.0-39-generic-64k - 6.8.0-39.39 linux-tools-common - 6.8.0-39.39 linux-tools-generic - 6.8.0-39.39 linux-tools-generic-64k - 6.8.0-39.39 linux-tools-generic-64k-hwe-24.04 - 6.8.0-39.39 linux-tools-generic-64k-hwe-24.04-edge - 6.8.0-39.39 linux-tools-generic-hwe-24.04 - 6.8.0-39.39 linux-tools-generic-hwe-24.04-edge - 6.8.0-39.39 linux-tools-generic-lpae - 6.8.0-39.39 linux-tools-host - 6.8.0-39.39 linux-tools-kvm - 6.8.0-39.39 linux-tools-laptop-23.10 - 6.8.0-39.39 linux-tools-oem-20.04 - 6.8.0-39.39 linux-tools-oem-20.04b - 6.8.0-39.39 linux-tools-oem-20.04c - 6.8.0-39.39 linux-tools-oem-20.04d - 6.8.0-39.39 linux-tools-oem-22.04 - 6.8.0-39.39 linux-tools-virtual - 6.8.0-39.39 linux-tools-virtual-hwe-24.04 - 6.8.0-39.39 linux-tools-virtual-hwe-24.04-edge - 6.8.0-39.39 linux-virtual - 6.8.0-39.39 linux-virtual-hwe-24.04 - 6.8.0-39.39 linux-virtual-hwe-24.04-edge - 6.8.0-39.39 No subscription required High CVE-2024-25742 CVE-2024-35984 CVE-2024-35990 CVE-2024-35992 CVE-2024-35997 CVE-2024-36008 CVE-2024-36016 USN-6921-2 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Benedict Schlüter, Supraja Sridhara, Andrin Bertschi, and Shweta Shinde discovered that an untrusted hypervisor could inject malicious #VC interrupts and compromise the security guarantees of AMD SEV-SNP. This flaw is known as WeSee. A local attacker in control of the hypervisor could use this to expose sensitive information or possibly execute arbitrary code in the trusted execution environment. (CVE-2024-25742) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - DMA engine subsystem; - HID subsystem; - I2C subsystem; - PHY drivers; - TTY drivers; - IPv4 networking; (CVE-2024-35997, CVE-2024-36016, CVE-2024-35990, CVE-2024-35984, CVE-2024-35992, CVE-2024-36008) Update Instructions: Run `sudo pro fix USN-6921-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-39-lowlatency - 6.8.0-39.39.1 linux-buildinfo-6.8.0-39-lowlatency-64k - 6.8.0-39.39.1 linux-cloud-tools-6.8.0-39-lowlatency - 6.8.0-39.39.1 linux-cloud-tools-lowlatency - 6.8.0-39.39.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-39.39.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-39.39.1 linux-cloud-tools-lowlatency-hwe-22.04 - 6.8.0-39.39.1 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.8.0-39.39.1 linux-headers-6.8.0-39-lowlatency - 6.8.0-39.39.1 linux-headers-6.8.0-39-lowlatency-64k - 6.8.0-39.39.1 linux-headers-lowlatency - 6.8.0-39.39.1 linux-headers-lowlatency-64k - 6.8.0-39.39.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-39.39.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-39.39.1 linux-headers-lowlatency-64k-hwe-22.04 - 6.8.0-39.39.1 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.8.0-39.39.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-39.39.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-39.39.1 linux-headers-lowlatency-hwe-22.04 - 6.8.0-39.39.1 linux-headers-lowlatency-hwe-22.04-edge - 6.8.0-39.39.1 linux-image-6.8.0-39-lowlatency - 6.8.0-39.39.1 linux-image-6.8.0-39-lowlatency-64k - 6.8.0-39.39.1 linux-image-lowlatency - 6.8.0-39.39.1 linux-image-lowlatency-64k - 6.8.0-39.39.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-39.39.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-39.39.1 linux-image-lowlatency-64k-hwe-22.04 - 6.8.0-39.39.1 linux-image-lowlatency-64k-hwe-22.04-edge - 6.8.0-39.39.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-39.39.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-39.39.1 linux-image-lowlatency-hwe-22.04 - 6.8.0-39.39.1 linux-image-lowlatency-hwe-22.04-edge - 6.8.0-39.39.1 linux-image-unsigned-6.8.0-39-lowlatency - 6.8.0-39.39.1 linux-image-unsigned-6.8.0-39-lowlatency-64k - 6.8.0-39.39.1 linux-lowlatency - 6.8.0-39.39.1 linux-lowlatency-64k - 6.8.0-39.39.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-39.39.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-39.39.1 linux-lowlatency-64k-hwe-22.04 - 6.8.0-39.39.1 linux-lowlatency-64k-hwe-22.04-edge - 6.8.0-39.39.1 linux-lowlatency-cloud-tools-6.8.0-39 - 6.8.0-39.39.1 linux-lowlatency-cloud-tools-common - 6.8.0-39.39.1 linux-lowlatency-headers-6.8.0-39 - 6.8.0-39.39.1 linux-lowlatency-hwe-20.04 - 6.8.0-39.39.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-39.39.1 linux-lowlatency-hwe-22.04 - 6.8.0-39.39.1 linux-lowlatency-hwe-22.04-edge - 6.8.0-39.39.1 linux-lowlatency-lib-rust-6.8.0-39-lowlatency - 6.8.0-39.39.1 linux-lowlatency-tools-6.8.0-39 - 6.8.0-39.39.1 linux-lowlatency-tools-common - 6.8.0-39.39.1 linux-lowlatency-tools-host - 6.8.0-39.39.1 linux-modules-6.8.0-39-lowlatency - 6.8.0-39.39.1 linux-modules-6.8.0-39-lowlatency-64k - 6.8.0-39.39.1 linux-modules-iwlwifi-6.8.0-39-lowlatency - 6.8.0-39.39.1 linux-modules-iwlwifi-lowlatency - 6.8.0-39.39.1 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.8.0-39.39.1 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.8.0-39.39.1 linux-tools-6.8.0-39-lowlatency - 6.8.0-39.39.1 linux-tools-6.8.0-39-lowlatency-64k - 6.8.0-39.39.1 linux-tools-lowlatency - 6.8.0-39.39.1 linux-tools-lowlatency-64k - 6.8.0-39.39.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-39.39.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-39.39.1 linux-tools-lowlatency-64k-hwe-22.04 - 6.8.0-39.39.1 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.8.0-39.39.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-39.39.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-39.39.1 linux-tools-lowlatency-hwe-22.04 - 6.8.0-39.39.1 linux-tools-lowlatency-hwe-22.04-edge - 6.8.0-39.39.1 No subscription required High CVE-2024-25742 CVE-2024-35984 CVE-2024-35990 CVE-2024-35992 CVE-2024-35997 CVE-2024-36008 CVE-2024-36016 USN-6929-1 -- OpenJDK 8 vulnerabilities Ubuntu 24.04 LTS It was discovered that the Hotspot component of OpenJDK 8 was not properly performing bounds when handling certain UTF-8 strings, which could lead to a buffer overflow. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-21131) It was discovered that the Hotspot component of OpenJDK 8 could be made to run into an infinite loop. If an automated system were tricked into processing excessively large symbols, an attacker could possibly use this issue to cause a denial of service. (CVE-2024-21138) It was discovered that the Hotspot component of OpenJDK 8 did not properly perform range check elimination. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. (CVE-2024-21140) Yakov Shafranovich discovered that the Concurrency component of OpenJDK 8 incorrectly performed header validation in the Pack200 archive format. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-21144) Sergey Bylokhov discovered that OpenJDK 8 did not properly manage memory when handling 2D images. An attacker could possibly use this issue to obtain sensitive information. (CVE-2024-21145) It was discovered that the Hotspot component of OpenJDK 8 incorrectly handled memory when performing range check elimination under certain circumstances. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. (CVE-2024-21147) Update Instructions: Run `sudo pro fix USN-6929-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-8-demo - 8u422-b05-1~24.04 openjdk-8-doc - 8u422-b05-1~24.04 openjdk-8-jdk - 8u422-b05-1~24.04 openjdk-8-jdk-headless - 8u422-b05-1~24.04 openjdk-8-jre - 8u422-b05-1~24.04 openjdk-8-jre-headless - 8u422-b05-1~24.04 openjdk-8-jre-zero - 8u422-b05-1~24.04 openjdk-8-source - 8u422-b05-1~24.04 No subscription required Medium CVE-2024-21131 CVE-2024-21138 CVE-2024-21140 CVE-2024-21144 CVE-2024-21145 CVE-2024-21147 USN-6930-1 -- OpenJDK 11 vulnerabilities Ubuntu 24.04 LTS It was discovered that the Hotspot component of OpenJDK 11 was not properly performing bounds when handling certain UTF-8 strings, which could lead to a buffer overflow. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-21131) It was discovered that the Hotspot component of OpenJDK 11 could be made to run into an infinite loop. If an automated system were tricked into processing excessively large symbols, an attacker could possibly use this issue to cause a denial of service. (CVE-2024-21138) It was discovered that the Hotspot component of OpenJDK 11 did not properly perform range check elimination. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. (CVE-2024-21140) Yakov Shafranovich discovered that the Concurrency component of OpenJDK 11 incorrectly performed header validation in the Pack200 archive format. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-21144) Sergey Bylokhov discovered that OpenJDK 11 did not properly manage memory when handling 2D images. An attacker could possibly use this issue to obtain sensitive information. (CVE-2024-21145) It was discovered that the Hotspot component of OpenJDK 11 incorrectly handled memory when performing range check elimination under certain circumstances. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. (CVE-2024-21147) Update Instructions: Run `sudo pro fix USN-6930-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-11-demo - 11.0.24+8-1ubuntu3~24.04.1 openjdk-11-doc - 11.0.24+8-1ubuntu3~24.04.1 openjdk-11-jdk - 11.0.24+8-1ubuntu3~24.04.1 openjdk-11-jdk-headless - 11.0.24+8-1ubuntu3~24.04.1 openjdk-11-jre - 11.0.24+8-1ubuntu3~24.04.1 openjdk-11-jre-headless - 11.0.24+8-1ubuntu3~24.04.1 openjdk-11-jre-zero - 11.0.24+8-1ubuntu3~24.04.1 openjdk-11-source - 11.0.24+8-1ubuntu3~24.04.1 No subscription required Medium CVE-2024-21131 CVE-2024-21138 CVE-2024-21140 CVE-2024-21144 CVE-2024-21145 CVE-2024-21147 USN-6931-1 -- OpenJDK 17 vulnerabilities Ubuntu 24.04 LTS It was discovered that the Hotspot component of OpenJDK 17 was not properly performing bounds when handling certain UTF-8 strings, which could lead to a buffer overflow. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-21131) It was discovered that the Hotspot component of OpenJDK 17 could be made to run into an infinite loop. If an automated system were tricked into processing excessively large symbols, an attacker could possibly use this issue to cause a denial of service. (CVE-2024-21138) It was discovered that the Hotspot component of OpenJDK 17 did not properly perform range check elimination. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. (CVE-2024-21140) Sergey Bylokhov discovered that OpenJDK 17 did not properly manage memory when handling 2D images. An attacker could possibly use this issue to obtain sensitive information. (CVE-2024-21145) It was discovered that the Hotspot component of OpenJDK 17 incorrectly handled memory when performing range check elimination under certain circumstances. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. (CVE-2024-21147) Update Instructions: Run `sudo pro fix USN-6931-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-17-demo - 17.0.12+7-1ubuntu2~24.04 openjdk-17-doc - 17.0.12+7-1ubuntu2~24.04 openjdk-17-jdk - 17.0.12+7-1ubuntu2~24.04 openjdk-17-jdk-headless - 17.0.12+7-1ubuntu2~24.04 openjdk-17-jre - 17.0.12+7-1ubuntu2~24.04 openjdk-17-jre-headless - 17.0.12+7-1ubuntu2~24.04 openjdk-17-jre-zero - 17.0.12+7-1ubuntu2~24.04 openjdk-17-source - 17.0.12+7-1ubuntu2~24.04 No subscription required Medium CVE-2024-21131 CVE-2024-21138 CVE-2024-21140 CVE-2024-21145 CVE-2024-21147 USN-6932-1 -- OpenJDK 21 vulnerabilities Ubuntu 24.04 LTS It was discovered that the Hotspot component of OpenJDK 21 was not properly performing bounds when handling certain UTF-8 strings, which could lead to a buffer overflow. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-21131) It was discovered that the Hotspot component of OpenJDK 21 could be made to run into an infinite loop. If an automated system were tricked into processing excessively large symbols, an attacker could possibly use this issue to cause a denial of service. (CVE-2024-21138) It was discovered that the Hotspot component of OpenJDK 21 did not properly perform range check elimination. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. (CVE-2024-21140) Sergey Bylokhov discovered that OpenJDK 21 did not properly manage memory when handling 2D images. An attacker could possibly use this issue to obtain sensitive information. (CVE-2024-21145) It was discovered that the Hotspot component of OpenJDK 21 incorrectly handled memory when performing range check elimination under certain circumstances. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. (CVE-2024-21147) Update Instructions: Run `sudo pro fix USN-6932-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-21-demo - 21.0.4+7-1ubuntu2~24.04 openjdk-21-doc - 21.0.4+7-1ubuntu2~24.04 openjdk-21-jdk - 21.0.4+7-1ubuntu2~24.04 openjdk-21-jdk-headless - 21.0.4+7-1ubuntu2~24.04 openjdk-21-jre - 21.0.4+7-1ubuntu2~24.04 openjdk-21-jre-headless - 21.0.4+7-1ubuntu2~24.04 openjdk-21-jre-zero - 21.0.4+7-1ubuntu2~24.04 openjdk-21-source - 21.0.4+7-1ubuntu2~24.04 openjdk-21-testsupport - 21.0.4+7-1ubuntu2~24.04 No subscription required Medium CVE-2024-21131 CVE-2024-21138 CVE-2024-21140 CVE-2024-21145 CVE-2024-21147 USN-6934-1 -- MySQL vulnerabilities Ubuntu 24.04 LTS Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 8.0.39 in Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 24.04 LTS. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information: https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-38.html https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-39.html https://www.oracle.com/security-alerts/cpujul2024.html Update Instructions: Run `sudo pro fix USN-6934-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libmysqlclient-dev - 8.0.39-0ubuntu0.24.04.1 libmysqlclient21 - 8.0.39-0ubuntu0.24.04.1 mysql-client - 8.0.39-0ubuntu0.24.04.1 mysql-client-8.0 - 8.0.39-0ubuntu0.24.04.1 mysql-client-core-8.0 - 8.0.39-0ubuntu0.24.04.1 mysql-router - 8.0.39-0ubuntu0.24.04.1 mysql-server - 8.0.39-0ubuntu0.24.04.1 mysql-server-8.0 - 8.0.39-0ubuntu0.24.04.1 mysql-server-core-8.0 - 8.0.39-0ubuntu0.24.04.1 mysql-source-8.0 - 8.0.39-0ubuntu0.24.04.1 mysql-testsuite - 8.0.39-0ubuntu0.24.04.1 mysql-testsuite-8.0 - 8.0.39-0ubuntu0.24.04.1 No subscription required Medium CVE-2024-20996 CVE-2024-21125 CVE-2024-21127 CVE-2024-21129 CVE-2024-21130 CVE-2024-21134 CVE-2024-21142 CVE-2024-21162 CVE-2024-21163 CVE-2024-21165 CVE-2024-21171 CVE-2024-21173 CVE-2024-21177 CVE-2024-21179 CVE-2024-21185 USN-6937-1 -- OpenSSL vulnerabilities Ubuntu 24.04 LTS It was discovered that OpenSSL incorrectly handled TLSv1.3 sessions when certain non-default TLS server configurations were in use. A remote attacker could possibly use this issue to cause OpenSSL to consume resources, leading to a denial of service. (CVE-2024-2511) It was discovered that OpenSSL incorrectly handled checking excessively long DSA keys or parameters. A remote attacker could possibly use this issue to cause OpenSSL to consume resources, leading to a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-4603) William Ahern discovered that OpenSSL incorrectly handled certain memory operations in a rarely-used API. A remote attacker could use this issue to cause OpenSSL to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2024-4741) Joseph Birr-Pixton discovered that OpenSSL incorrectly handled calling a certain API with an empty supported client protocols buffer. A remote attacker could possibly use this issue to obtain sensitive information, or cause OpenSSL to crash, resulting in a denial of service. (CVE-2024-5535) Update Instructions: Run `sudo pro fix USN-6937-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libssl-dev - 3.0.13-0ubuntu3.2 libssl-doc - 3.0.13-0ubuntu3.2 libssl3t64 - 3.0.13-0ubuntu3.2 openssl - 3.0.13-0ubuntu3.2 No subscription required Low CVE-2024-2511 CVE-2024-4603 CVE-2024-4741 CVE-2024-5535 USN-6939-1 -- Exim vulnerability Ubuntu 24.04 LTS Phillip Szelat discovered that Exim misparses multiline MIME header filenames. A remote attacker could use this issue to bypass a MIME filename extension-blocking protection mechanism and possibly deliver executable attachments to the mailboxes of end users. Update Instructions: Run `sudo pro fix USN-6939-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: exim4 - 4.97-4ubuntu4.1 exim4-base - 4.97-4ubuntu4.1 exim4-config - 4.97-4ubuntu4.1 exim4-daemon-heavy - 4.97-4ubuntu4.1 exim4-daemon-light - 4.97-4ubuntu4.1 exim4-dev - 4.97-4ubuntu4.1 eximon4 - 4.97-4ubuntu4.1 No subscription required Medium CVE-2024-39929 USN-6940-1 -- snapd vulnerabilities Ubuntu 24.04 LTS Neil McPhail discovered that snapd did not properly restrict writes to the $HOME/bin path in the AppArmor profile for snaps using the home plug. An attacker who could convince a user to install a malicious snap could use this vulnerability to escape the snap sandbox. (CVE-2024-1724) Zeyad Gouda discovered that snapd failed to properly check the file type when extracting a snap. An attacker who could convince a user to install a malicious snap containing non-regular files could then cause snapd to block indefinitely while trying to read from such files and cause a denial of service. (CVE-2024-29068) Zeyad Gouda discovered that snapd failed to properly check the destination of symbolic links when extracting a snap. An attacker who could convince a user to install a malicious snap containing crafted symbolic links could then cause snapd to write out the contents of the symbolic link destination into a world-readable directory. This in-turn could allow a local unprivileged user to gain access to privileged information. (CVE-2024-29069) Update Instructions: Run `sudo pro fix USN-6940-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: golang-github-snapcore-snapd-dev - 2.63+24.04ubuntu0.1 golang-github-ubuntu-core-snappy-dev - 2.63+24.04ubuntu0.1 snap-confine - 2.63+24.04ubuntu0.1 snapd - 2.63+24.04ubuntu0.1 snapd-xdg-open - 2.63+24.04ubuntu0.1 ubuntu-core-launcher - 2.63+24.04ubuntu0.1 ubuntu-core-snapd-units - 2.63+24.04ubuntu0.1 ubuntu-snappy - 2.63+24.04ubuntu0.1 ubuntu-snappy-cli - 2.63+24.04ubuntu0.1 No subscription required Medium CVE-2024-1724 CVE-2024-29068 CVE-2024-29069 USN-6941-1 -- Python vulnerability Ubuntu 24.04 LTS It was discovered that the Python ipaddress module contained incorrect information about which IP address ranges were considered “private” or “globally reachable”. This could possibly result in applications applying incorrect security policies. Update Instructions: Run `sudo pro fix USN-6941-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: idle-python3.12 - 3.12.3-1ubuntu0.1 libpython3.12-dev - 3.12.3-1ubuntu0.1 libpython3.12-minimal - 3.12.3-1ubuntu0.1 libpython3.12-stdlib - 3.12.3-1ubuntu0.1 libpython3.12-testsuite - 3.12.3-1ubuntu0.1 libpython3.12t64 - 3.12.3-1ubuntu0.1 python3.12 - 3.12.3-1ubuntu0.1 python3.12-dev - 3.12.3-1ubuntu0.1 python3.12-doc - 3.12.3-1ubuntu0.1 python3.12-examples - 3.12.3-1ubuntu0.1 python3.12-full - 3.12.3-1ubuntu0.1 python3.12-minimal - 3.12.3-1ubuntu0.1 python3.12-nopie - 3.12.3-1ubuntu0.1 python3.12-venv - 3.12.3-1ubuntu0.1 No subscription required Low CVE-2024-4032 USN-6942-1 -- Gross vulnerability Ubuntu 24.04 LTS It was discovered that Gross incorrectly handled memory when composing log entries. An attacker could possibly use this issue to cause Gross to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6942-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gross - 1.0.2-4ubuntu0.24.04.1 No subscription required Medium CVE-2023-52159 USN-6944-1 -- curl vulnerability Ubuntu 24.04 LTS Dov Murik discovered that curl incorrectly handled parsing ASN.1 Generalized Time fields. A remote attacker could use this issue to cause curl to crash, resulting in a denial of service, or possibly obtain sensitive memory contents. Update Instructions: Run `sudo pro fix USN-6944-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: curl - 8.5.0-2ubuntu10.2 libcurl3t64-gnutls - 8.5.0-2ubuntu10.2 libcurl4-doc - 8.5.0-2ubuntu10.2 libcurl4-gnutls-dev - 8.5.0-2ubuntu10.2 libcurl4-openssl-dev - 8.5.0-2ubuntu10.2 libcurl4t64 - 8.5.0-2ubuntu10.2 No subscription required Medium CVE-2024-7264 USN-6945-1 -- wpa_supplicant and hostapd vulnerability Ubuntu 24.04 LTS Rory McNamara discovered that wpa_supplicant could be made to load arbitrary shared objects by unprivileged users that have access to the control interface. An attacker could use this to escalate privileges to root. Update Instructions: Run `sudo pro fix USN-6945-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: eapoltest - 2:2.10-21ubuntu0.1 hostapd - 2:2.10-21ubuntu0.1 libwpa-client-dev - 2:2.10-21ubuntu0.1 wpagui - 2:2.10-21ubuntu0.1 wpasupplicant - 2:2.10-21ubuntu0.1 No subscription required Medium CVE-2024-5290 https://launchpad.net/bugs/2067613 USN-6946-1 -- Django vulnerabilities Ubuntu 24.04 LTS It was discovered that Django incorrectly handled certain strings in floatformat function. An attacker could possibly use this issue to cause a memory exhaustion. (CVE-2024-41989) It was discovered that Django incorrectly handled very large inputs. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-41990) It was discovered that Django in AdminURLFieldWidget incorrectly handled certain inputs with a very large number of Unicode characters. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-41991) It was discovered that Django incorrectly handled certain JSON objects. An attacker could possibly use this issue to cause a potential SQL injection. This issue only affected Ubuntu 22.04 LTS, and Ubuntu 24.04 LTS. (CVE-2024-42005) Update Instructions: Run `sudo pro fix USN-6946-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-django-doc - 3:4.2.11-1ubuntu1.2 python3-django - 3:4.2.11-1ubuntu1.2 No subscription required Medium CVE-2024-41989 CVE-2024-41990 CVE-2024-41991 CVE-2024-42005 USN-6947-1 -- Kerberos vulnerabilities Ubuntu 24.04 LTS It was discovered that Kerberos incorrectly handled GSS message tokens where an unwrapped token could appear to be truncated. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-37370) It was discovered that Kerberos incorrectly handled GSS message tokens when sent a token with invalid length fields. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-37371) Update Instructions: Run `sudo pro fix USN-6947-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: krb5-admin-server - 1.20.1-6ubuntu2.1 krb5-doc - 1.20.1-6ubuntu2.1 krb5-gss-samples - 1.20.1-6ubuntu2.1 krb5-k5tls - 1.20.1-6ubuntu2.1 krb5-kdc - 1.20.1-6ubuntu2.1 krb5-kdc-ldap - 1.20.1-6ubuntu2.1 krb5-kpropd - 1.20.1-6ubuntu2.1 krb5-locales - 1.20.1-6ubuntu2.1 krb5-multidev - 1.20.1-6ubuntu2.1 krb5-otp - 1.20.1-6ubuntu2.1 krb5-pkinit - 1.20.1-6ubuntu2.1 krb5-user - 1.20.1-6ubuntu2.1 libgssapi-krb5-2 - 1.20.1-6ubuntu2.1 libgssrpc4t64 - 1.20.1-6ubuntu2.1 libk5crypto3 - 1.20.1-6ubuntu2.1 libkadm5clnt-mit12 - 1.20.1-6ubuntu2.1 libkadm5srv-mit12 - 1.20.1-6ubuntu2.1 libkdb5-10t64 - 1.20.1-6ubuntu2.1 libkrad-dev - 1.20.1-6ubuntu2.1 libkrad0 - 1.20.1-6ubuntu2.1 libkrb5-3 - 1.20.1-6ubuntu2.1 libkrb5-dev - 1.20.1-6ubuntu2.1 libkrb5support0 - 1.20.1-6ubuntu2.1 No subscription required Medium CVE-2024-37370 CVE-2024-37371 USN-6949-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - ARM64 architecture; - M68K architecture; - OpenRISC architecture; - PowerPC architecture; - RISC-V architecture; - x86 architecture; - Block layer subsystem; - Accessibility subsystem; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - DMA engine subsystem; - DPLL subsystem; - FireWire subsystem; - EFI core; - Qualcomm firmware drivers; - GPIO subsystem; - GPU drivers; - Microsoft Hyper-V drivers; - InfiniBand drivers; - IOMMU subsystem; - IRQ chip drivers; - Macintosh device drivers; - Multiple devices driver; - Media drivers; - EEPROM drivers; - MMC subsystem; - Network drivers; - STMicroelectronics network drivers; - Device tree and open firmware driver; - HiSilicon SoC PMU drivers; - PHY drivers; - Pin controllers subsystem; - Remote Processor subsystem; - S/390 drivers; - SCSI drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - Userspace I/O drivers; - USB subsystem; - DesignWare USB3 driver; - ACRN Hypervisor Service Module driver; - Virtio drivers; - 9P distributed file system; - BTRFS file system; - eCrypt file system; - EROFS file system; - File systems infrastructure; - GFS2 file system; - JFFS2 file system; - Network file systems library; - Network file system client; - Network file system server daemon; - NILFS2 file system; - Proc file system; - SMB network file system; - Tracing file system; - Mellanox drivers; - Memory management; - Socket messages infrastructure; - Slab allocator; - Tracing infrastructure; - User-space API (UAPI); - Core kernel; - BPF subsystem; - DMA mapping infrastructure; - RCU subsystem; - Dynamic debug library; - KUnit library; - Maple Tree data structure library; - Heterogeneous memory management; - Amateur Radio drivers; - Bluetooth subsystem; - Ethernet bridge; - Networking core; - IPv4 networking; - IPv6 networking; - Multipath TCP; - Netfilter; - NET/ROM layer; - NFC subsystem; - NSH protocol; - Open vSwitch; - Phonet protocol; - SMC sockets; - TIPC protocol; - Unix domain sockets; - Wireless networking; - Key management; - ALSA framework; - HD-audio driver; - Kirkwood ASoC drivers; - MediaTek ASoC drivers; (CVE-2024-36006, CVE-2024-36922, CVE-2024-38567, CVE-2024-38584, CVE-2024-36923, CVE-2024-36892, CVE-2024-35855, CVE-2024-35853, CVE-2024-38562, CVE-2024-36920, CVE-2024-38543, CVE-2024-38576, CVE-2024-38572, CVE-2024-36898, CVE-2024-38560, CVE-2024-36004, CVE-2024-36956, CVE-2024-36881, CVE-2024-36977, CVE-2024-36955, CVE-2024-36906, CVE-2024-36013, CVE-2024-36884, CVE-2024-38563, CVE-2024-36966, CVE-2024-38547, CVE-2024-38594, CVE-2024-36926, CVE-2024-38587, CVE-2024-38566, CVE-2024-27400, CVE-2024-36941, CVE-2024-36017, CVE-2024-38544, CVE-2024-36899, CVE-2024-35851, CVE-2024-38577, CVE-2024-38590, CVE-2024-38568, CVE-2024-38559, CVE-2024-38611, CVE-2024-36887, CVE-2024-36886, CVE-2024-35996, CVE-2024-38612, CVE-2024-36925, CVE-2024-38586, CVE-2024-38596, CVE-2024-36932, CVE-2024-39482, CVE-2024-38585, CVE-2024-36033, CVE-2024-38614, CVE-2024-35852, CVE-2024-36908, CVE-2024-36939, CVE-2024-36963, CVE-2024-27401, CVE-2024-36029, CVE-2024-38540, CVE-2024-38565, CVE-2024-36927, CVE-2024-36910, CVE-2024-42134, CVE-2024-36888, CVE-2024-35859, CVE-2024-36911, CVE-2024-35947, CVE-2024-36940, CVE-2024-36921, CVE-2024-36913, CVE-2024-36943, CVE-2024-35986, CVE-2024-38616, CVE-2024-36900, CVE-2024-36954, CVE-2024-36915, CVE-2024-38602, CVE-2024-41011, CVE-2024-35991, CVE-2024-36909, CVE-2024-38603, CVE-2023-52882, CVE-2024-36953, CVE-2024-38599, CVE-2024-38574, CVE-2024-36967, CVE-2024-36895, CVE-2024-36003, CVE-2024-36961, CVE-2024-38545, CVE-2024-38538, CVE-2024-36001, CVE-2024-36912, CVE-2024-36952, CVE-2024-38550, CVE-2024-38570, CVE-2024-36969, CVE-2024-38595, CVE-2024-35849, CVE-2024-36936, CVE-2024-35949, CVE-2024-36009, CVE-2024-35987, CVE-2024-38541, CVE-2024-38564, CVE-2024-36032, CVE-2024-38615, CVE-2024-36960, CVE-2024-36934, CVE-2024-36951, CVE-2024-35999, CVE-2024-38551, CVE-2024-36903, CVE-2024-36931, CVE-2024-38593, CVE-2024-36938, CVE-2024-38607, CVE-2024-36928, CVE-2024-38552, CVE-2024-36002, CVE-2024-38605, CVE-2024-38582, CVE-2024-36933, CVE-2024-38620, CVE-2024-27395, CVE-2024-27396, CVE-2024-36012, CVE-2024-38591, CVE-2024-38597, CVE-2024-36889, CVE-2024-36964, CVE-2024-38606, CVE-2024-38553, CVE-2024-36945, CVE-2024-35848, CVE-2024-36962, CVE-2024-36947, CVE-2024-27399, CVE-2024-38546, CVE-2024-38583, CVE-2024-38573, CVE-2024-35850, CVE-2024-38549, CVE-2024-38588, CVE-2024-38610, CVE-2024-36917, CVE-2024-36957, CVE-2024-35846, CVE-2024-38579, CVE-2024-36965, CVE-2024-35857, CVE-2024-38548, CVE-2024-36975, CVE-2024-36919, CVE-2024-38542, CVE-2024-36948, CVE-2024-36011, CVE-2024-38556, CVE-2024-36897, CVE-2024-38557, CVE-2024-36890, CVE-2024-36882, CVE-2024-38613, CVE-2024-36914, CVE-2024-35998, CVE-2024-36958, CVE-2024-38580, CVE-2024-36896, CVE-2024-36891, CVE-2024-36924, CVE-2024-38589, CVE-2024-38592, CVE-2024-36904, CVE-2024-36894, CVE-2024-36028, CVE-2024-36014, CVE-2024-36880, CVE-2024-36944, CVE-2024-38598, CVE-2024-36929, CVE-2024-36883, CVE-2024-35858, CVE-2024-38555, CVE-2024-36005, CVE-2024-38539, CVE-2024-35994, CVE-2024-36030, CVE-2024-27394, CVE-2024-36930, CVE-2024-36937, CVE-2024-38561, CVE-2024-38578, CVE-2024-36959, CVE-2024-36935, CVE-2024-36916, CVE-2024-36902, CVE-2024-38604, CVE-2024-38554, CVE-2024-38575, CVE-2024-36918, CVE-2024-36979, CVE-2024-35854, CVE-2024-36968, CVE-2024-38558, CVE-2024-36000, CVE-2024-27398, CVE-2024-35983, CVE-2024-36949, CVE-2024-38600, CVE-2024-36950, CVE-2024-36946, CVE-2024-36031, CVE-2024-35847, CVE-2024-36905, CVE-2024-38571, CVE-2024-36007, CVE-2024-35856, CVE-2024-38601, CVE-2024-38569, CVE-2024-38617, CVE-2024-35988, CVE-2024-35989, CVE-2024-35993, CVE-2024-36893, CVE-2024-36901) Update Instructions: Run `sudo pro fix USN-6949-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1008-gke - 6.8.0-1008.11 linux-gke - 6.8.0-1008.11 linux-gke-headers-6.8.0-1008 - 6.8.0-1008.11 linux-gke-tools-6.8.0-1008 - 6.8.0-1008.11 linux-headers-6.8.0-1008-gke - 6.8.0-1008.11 linux-headers-gke - 6.8.0-1008.11 linux-image-6.8.0-1008-gke - 6.8.0-1008.11 linux-image-gke - 6.8.0-1008.11 linux-image-unsigned-6.8.0-1008-gke - 6.8.0-1008.11 linux-modules-6.8.0-1008-gke - 6.8.0-1008.11 linux-modules-extra-6.8.0-1008-gke - 6.8.0-1008.11 linux-modules-iwlwifi-6.8.0-1008-gke - 6.8.0-1008.11 linux-modules-iwlwifi-gke - 6.8.0-1008.11 linux-tools-6.8.0-1008-gke - 6.8.0-1008.11 linux-tools-gke - 6.8.0-1008.11 No subscription required linux-buildinfo-6.8.0-1010-ibm - 6.8.0-1010.10 linux-headers-6.8.0-1010-ibm - 6.8.0-1010.10 linux-headers-ibm - 6.8.0-1010.10 linux-headers-ibm-classic - 6.8.0-1010.10 linux-headers-ibm-lts-24.04 - 6.8.0-1010.10 linux-ibm - 6.8.0-1010.10 linux-ibm-classic - 6.8.0-1010.10 linux-ibm-cloud-tools-common - 6.8.0-1010.10 linux-ibm-headers-6.8.0-1010 - 6.8.0-1010.10 linux-ibm-lts-24.04 - 6.8.0-1010.10 linux-ibm-source-6.8.0 - 6.8.0-1010.10 linux-ibm-tools-6.8.0-1010 - 6.8.0-1010.10 linux-image-6.8.0-1010-ibm - 6.8.0-1010.10 linux-image-ibm - 6.8.0-1010.10 linux-image-ibm-classic - 6.8.0-1010.10 linux-image-ibm-lts-24.04 - 6.8.0-1010.10 linux-image-unsigned-6.8.0-1010-ibm - 6.8.0-1010.10 linux-modules-6.8.0-1010-ibm - 6.8.0-1010.10 linux-modules-extra-6.8.0-1010-ibm - 6.8.0-1010.10 linux-modules-iwlwifi-6.8.0-1010-ibm - 6.8.0-1010.10 linux-modules-iwlwifi-ibm - 6.8.0-1010.10 linux-modules-iwlwifi-ibm-classic - 6.8.0-1010.10 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1010.10 linux-tools-6.8.0-1010-ibm - 6.8.0-1010.10 linux-tools-ibm - 6.8.0-1010.10 linux-tools-ibm-classic - 6.8.0-1010.10 linux-tools-ibm-lts-24.04 - 6.8.0-1010.10 No subscription required linux-buildinfo-6.8.0-1011-nvidia - 6.8.0-1011.11 linux-buildinfo-6.8.0-1011-nvidia-64k - 6.8.0-1011.11 linux-cloud-tools-nvidia - 6.8.0-1011.11 linux-headers-6.8.0-1011-nvidia - 6.8.0-1011.11 linux-headers-6.8.0-1011-nvidia-64k - 6.8.0-1011.11 linux-headers-nvidia - 6.8.0-1011.11 linux-headers-nvidia-64k - 6.8.0-1011.11 linux-image-6.8.0-1011-nvidia - 6.8.0-1011.11 linux-image-6.8.0-1011-nvidia-64k - 6.8.0-1011.11 linux-image-nvidia - 6.8.0-1011.11 linux-image-nvidia-64k - 6.8.0-1011.11 linux-image-uc-6.8.0-1011-nvidia - 6.8.0-1011.11 linux-image-uc-6.8.0-1011-nvidia-64k - 6.8.0-1011.11 linux-image-unsigned-6.8.0-1011-nvidia - 6.8.0-1011.11 linux-image-unsigned-6.8.0-1011-nvidia-64k - 6.8.0-1011.11 linux-modules-6.8.0-1011-nvidia - 6.8.0-1011.11 linux-modules-6.8.0-1011-nvidia-64k - 6.8.0-1011.11 linux-modules-extra-6.8.0-1011-nvidia - 6.8.0-1011.11 linux-modules-nvidia-fs-6.8.0-1011-nvidia - 6.8.0-1011.11 linux-modules-nvidia-fs-6.8.0-1011-nvidia-64k - 6.8.0-1011.11 linux-modules-nvidia-fs-nvidia - 6.8.0-1011.11 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1011.11 linux-nvidia - 6.8.0-1011.11 linux-nvidia-64k - 6.8.0-1011.11 linux-nvidia-headers-6.8.0-1011 - 6.8.0-1011.11 linux-nvidia-tools-6.8.0-1011 - 6.8.0-1011.11 linux-nvidia-tools-host - 6.8.0-1011.11 linux-tools-6.8.0-1011-nvidia - 6.8.0-1011.11 linux-tools-6.8.0-1011-nvidia-64k - 6.8.0-1011.11 linux-tools-nvidia - 6.8.0-1011.11 linux-tools-nvidia-64k - 6.8.0-1011.11 No subscription required linux-buildinfo-6.8.0-1012-gcp - 6.8.0-1012.13 linux-gcp - 6.8.0-1012.13 linux-gcp-headers-6.8.0-1012 - 6.8.0-1012.13 linux-gcp-tools-6.8.0-1012 - 6.8.0-1012.13 linux-headers-6.8.0-1012-gcp - 6.8.0-1012.13 linux-headers-gcp - 6.8.0-1012.13 linux-image-6.8.0-1012-gcp - 6.8.0-1012.13 linux-image-gcp - 6.8.0-1012.13 linux-image-unsigned-6.8.0-1012-gcp - 6.8.0-1012.13 linux-modules-6.8.0-1012-gcp - 6.8.0-1012.13 linux-modules-extra-6.8.0-1012-gcp - 6.8.0-1012.13 linux-modules-extra-gcp - 6.8.0-1012.13 linux-modules-iwlwifi-6.8.0-1012-gcp - 6.8.0-1012.13 linux-modules-iwlwifi-gcp - 6.8.0-1012.13 linux-tools-6.8.0-1012-gcp - 6.8.0-1012.13 linux-tools-gcp - 6.8.0-1012.13 No subscription required linux-aws - 6.8.0-1013.14 linux-aws-cloud-tools-6.8.0-1013 - 6.8.0-1013.14 linux-aws-headers-6.8.0-1013 - 6.8.0-1013.14 linux-aws-tools-6.8.0-1013 - 6.8.0-1013.14 linux-buildinfo-6.8.0-1013-aws - 6.8.0-1013.14 linux-cloud-tools-6.8.0-1013-aws - 6.8.0-1013.14 linux-headers-6.8.0-1013-aws - 6.8.0-1013.14 linux-headers-aws - 6.8.0-1013.14 linux-image-6.8.0-1013-aws - 6.8.0-1013.14 linux-image-aws - 6.8.0-1013.14 linux-image-unsigned-6.8.0-1013-aws - 6.8.0-1013.14 linux-modules-6.8.0-1013-aws - 6.8.0-1013.14 linux-modules-extra-6.8.0-1013-aws - 6.8.0-1013.14 linux-modules-extra-aws - 6.8.0-1013.14 linux-tools-6.8.0-1013-aws - 6.8.0-1013.14 linux-tools-aws - 6.8.0-1013.14 No subscription required linux-buildinfo-6.8.0-40-generic - 6.8.0-40.40 linux-buildinfo-6.8.0-40-generic-64k - 6.8.0-40.40 linux-cloud-tools-6.8.0-40 - 6.8.0-40.40 linux-cloud-tools-6.8.0-40-generic - 6.8.0-40.40 linux-cloud-tools-common - 6.8.0-40.40 linux-cloud-tools-generic - 6.8.0-40.40 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-40.40 linux-cloud-tools-generic-hwe-24.04-edge - 6.8.0-40.40 linux-cloud-tools-virtual - 6.8.0-40.40 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-40.40 linux-cloud-tools-virtual-hwe-24.04-edge - 6.8.0-40.40 linux-crashdump - 6.8.0-40.40 linux-doc - 6.8.0-40.40 linux-generic - 6.8.0-40.40 linux-generic-64k - 6.8.0-40.40 linux-generic-64k-hwe-24.04 - 6.8.0-40.40 linux-generic-64k-hwe-24.04-edge - 6.8.0-40.40 linux-generic-hwe-24.04 - 6.8.0-40.40 linux-generic-hwe-24.04-edge - 6.8.0-40.40 linux-generic-lpae - 6.8.0-40.40 linux-headers-6.8.0-40 - 6.8.0-40.40 linux-headers-6.8.0-40-generic - 6.8.0-40.40 linux-headers-6.8.0-40-generic-64k - 6.8.0-40.40 linux-headers-generic - 6.8.0-40.40 linux-headers-generic-64k - 6.8.0-40.40 linux-headers-generic-64k-hwe-24.04 - 6.8.0-40.40 linux-headers-generic-64k-hwe-24.04-edge - 6.8.0-40.40 linux-headers-generic-hwe-24.04 - 6.8.0-40.40 linux-headers-generic-hwe-24.04-edge - 6.8.0-40.40 linux-headers-generic-lpae - 6.8.0-40.40 linux-headers-kvm - 6.8.0-40.40 linux-headers-laptop-23.10 - 6.8.0-40.40 linux-headers-oem-20.04 - 6.8.0-40.40 linux-headers-oem-20.04b - 6.8.0-40.40 linux-headers-oem-20.04c - 6.8.0-40.40 linux-headers-oem-20.04d - 6.8.0-40.40 linux-headers-oem-22.04 - 6.8.0-40.40 linux-headers-virtual - 6.8.0-40.40 linux-headers-virtual-hwe-24.04 - 6.8.0-40.40 linux-headers-virtual-hwe-24.04-edge - 6.8.0-40.40 linux-image-6.8.0-40-generic - 6.8.0-40.40 linux-image-6.8.0-40-generic-64k - 6.8.0-40.40 linux-image-extra-virtual - 6.8.0-40.40 linux-image-extra-virtual-hwe-24.04 - 6.8.0-40.40 linux-image-extra-virtual-hwe-24.04-edge - 6.8.0-40.40 linux-image-generic - 6.8.0-40.40 linux-image-generic-64k - 6.8.0-40.40 linux-image-generic-64k-hwe-24.04 - 6.8.0-40.40 linux-image-generic-64k-hwe-24.04-edge - 6.8.0-40.40 linux-image-generic-hwe-24.04 - 6.8.0-40.40 linux-image-generic-hwe-24.04-edge - 6.8.0-40.40 linux-image-generic-lpae - 6.8.0-40.40 linux-image-kvm - 6.8.0-40.40 linux-image-laptop-23.10 - 6.8.0-40.40 linux-image-oem-20.04 - 6.8.0-40.40 linux-image-oem-20.04b - 6.8.0-40.40 linux-image-oem-20.04c - 6.8.0-40.40 linux-image-oem-20.04d - 6.8.0-40.40 linux-image-oem-22.04 - 6.8.0-40.40 linux-image-uc-6.8.0-40-generic - 6.8.0-40.40 linux-image-uc-6.8.0-40-generic-64k - 6.8.0-40.40 linux-image-uc-generic - 6.8.0-40.40 linux-image-uc-generic-hwe-24.04 - 6.8.0-40.40 linux-image-uc-generic-hwe-24.04-edge - 6.8.0-40.40 linux-image-unsigned-6.8.0-40-generic - 6.8.0-40.40 linux-image-unsigned-6.8.0-40-generic-64k - 6.8.0-40.40 linux-image-virtual - 6.8.0-40.40 linux-image-virtual-hwe-24.04 - 6.8.0-40.40 linux-image-virtual-hwe-24.04-edge - 6.8.0-40.40 linux-kvm - 6.8.0-40.40 linux-laptop-23.10 - 6.8.0-40.40 linux-lib-rust-6.8.0-40-generic - 6.8.0-40.40 linux-libc-dev - 6.8.0-40.40 linux-modules-6.8.0-40-generic - 6.8.0-40.40 linux-modules-6.8.0-40-generic-64k - 6.8.0-40.40 linux-modules-extra-6.8.0-40-generic - 6.8.0-40.40 linux-modules-ipu6-6.8.0-40-generic - 6.8.0-40.40 linux-modules-ipu6-generic - 6.8.0-40.40 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-40.40 linux-modules-ipu6-generic-hwe-24.04-edge - 6.8.0-40.40 linux-modules-iwlwifi-6.8.0-40-generic - 6.8.0-40.40 linux-modules-iwlwifi-generic - 6.8.0-40.40 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-40.40 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.8.0-40.40 linux-modules-iwlwifi-oem-20.04 - 6.8.0-40.40 linux-modules-iwlwifi-oem-20.04d - 6.8.0-40.40 linux-modules-iwlwifi-oem-22.04 - 6.8.0-40.40 linux-modules-usbio-6.8.0-40-generic - 6.8.0-40.40 linux-modules-usbio-generic - 6.8.0-40.40 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-40.40 linux-modules-usbio-generic-hwe-24.04-edge - 6.8.0-40.40 linux-oem-20.04 - 6.8.0-40.40 linux-oem-20.04b - 6.8.0-40.40 linux-oem-20.04c - 6.8.0-40.40 linux-oem-20.04d - 6.8.0-40.40 linux-oem-22.04 - 6.8.0-40.40 linux-source - 6.8.0-40.40 linux-source-6.8.0 - 6.8.0-40.40 linux-tools-6.8.0-40 - 6.8.0-40.40 linux-tools-6.8.0-40-generic - 6.8.0-40.40 linux-tools-6.8.0-40-generic-64k - 6.8.0-40.40 linux-tools-common - 6.8.0-40.40 linux-tools-generic - 6.8.0-40.40 linux-tools-generic-64k - 6.8.0-40.40 linux-tools-generic-64k-hwe-24.04 - 6.8.0-40.40 linux-tools-generic-64k-hwe-24.04-edge - 6.8.0-40.40 linux-tools-generic-hwe-24.04 - 6.8.0-40.40 linux-tools-generic-hwe-24.04-edge - 6.8.0-40.40 linux-tools-generic-lpae - 6.8.0-40.40 linux-tools-host - 6.8.0-40.40 linux-tools-kvm - 6.8.0-40.40 linux-tools-laptop-23.10 - 6.8.0-40.40 linux-tools-oem-20.04 - 6.8.0-40.40 linux-tools-oem-20.04b - 6.8.0-40.40 linux-tools-oem-20.04c - 6.8.0-40.40 linux-tools-oem-20.04d - 6.8.0-40.40 linux-tools-oem-22.04 - 6.8.0-40.40 linux-tools-virtual - 6.8.0-40.40 linux-tools-virtual-hwe-24.04 - 6.8.0-40.40 linux-tools-virtual-hwe-24.04-edge - 6.8.0-40.40 linux-virtual - 6.8.0-40.40 linux-virtual-hwe-24.04 - 6.8.0-40.40 linux-virtual-hwe-24.04-edge - 6.8.0-40.40 No subscription required High CVE-2023-52882 CVE-2024-27394 CVE-2024-27395 CVE-2024-27396 CVE-2024-27398 CVE-2024-27399 CVE-2024-27400 CVE-2024-27401 CVE-2024-35846 CVE-2024-35847 CVE-2024-35848 CVE-2024-35849 CVE-2024-35850 CVE-2024-35851 CVE-2024-35852 CVE-2024-35853 CVE-2024-35854 CVE-2024-35855 CVE-2024-35856 CVE-2024-35857 CVE-2024-35858 CVE-2024-35859 CVE-2024-35947 CVE-2024-35949 CVE-2024-35983 CVE-2024-35986 CVE-2024-35987 CVE-2024-35988 CVE-2024-35989 CVE-2024-35991 CVE-2024-35993 CVE-2024-35994 CVE-2024-35996 CVE-2024-35998 CVE-2024-35999 CVE-2024-36000 CVE-2024-36001 CVE-2024-36002 CVE-2024-36003 CVE-2024-36004 CVE-2024-36005 CVE-2024-36006 CVE-2024-36007 CVE-2024-36009 CVE-2024-36011 CVE-2024-36012 CVE-2024-36013 CVE-2024-36014 CVE-2024-36017 CVE-2024-36028 CVE-2024-36029 CVE-2024-36030 CVE-2024-36031 CVE-2024-36032 CVE-2024-36033 CVE-2024-36880 CVE-2024-36881 CVE-2024-36882 CVE-2024-36883 CVE-2024-36884 CVE-2024-36886 CVE-2024-36887 CVE-2024-36888 CVE-2024-36889 CVE-2024-36890 CVE-2024-36891 CVE-2024-36892 CVE-2024-36893 CVE-2024-36894 CVE-2024-36895 CVE-2024-36896 CVE-2024-36897 CVE-2024-36898 CVE-2024-36899 CVE-2024-36900 CVE-2024-36901 CVE-2024-36902 CVE-2024-36903 CVE-2024-36904 CVE-2024-36905 CVE-2024-36906 CVE-2024-36908 CVE-2024-36909 CVE-2024-36910 CVE-2024-36911 CVE-2024-36912 CVE-2024-36913 CVE-2024-36914 CVE-2024-36915 CVE-2024-36916 CVE-2024-36917 CVE-2024-36918 CVE-2024-36919 CVE-2024-36920 CVE-2024-36921 CVE-2024-36922 CVE-2024-36923 CVE-2024-36924 CVE-2024-36925 CVE-2024-36926 CVE-2024-36927 CVE-2024-36928 CVE-2024-36929 CVE-2024-36930 CVE-2024-36931 CVE-2024-36932 CVE-2024-36933 CVE-2024-36934 CVE-2024-36935 CVE-2024-36936 CVE-2024-36937 CVE-2024-36938 CVE-2024-36939 CVE-2024-36940 CVE-2024-36941 CVE-2024-36943 CVE-2024-36944 CVE-2024-36945 CVE-2024-36946 CVE-2024-36947 CVE-2024-36948 CVE-2024-36949 CVE-2024-36950 CVE-2024-36951 CVE-2024-36952 CVE-2024-36953 CVE-2024-36954 CVE-2024-36955 CVE-2024-36956 CVE-2024-36957 CVE-2024-36958 CVE-2024-36959 CVE-2024-36960 CVE-2024-36961 CVE-2024-36962 CVE-2024-36963 CVE-2024-36964 CVE-2024-36965 CVE-2024-36966 CVE-2024-36967 CVE-2024-36968 CVE-2024-36969 CVE-2024-36975 CVE-2024-36977 CVE-2024-36979 CVE-2024-38538 CVE-2024-38539 CVE-2024-38540 CVE-2024-38541 CVE-2024-38542 CVE-2024-38543 CVE-2024-38544 CVE-2024-38545 CVE-2024-38546 CVE-2024-38547 CVE-2024-38548 CVE-2024-38549 CVE-2024-38550 CVE-2024-38551 CVE-2024-38552 CVE-2024-38553 CVE-2024-38554 CVE-2024-38555 CVE-2024-38556 CVE-2024-38557 CVE-2024-38558 CVE-2024-38559 CVE-2024-38560 CVE-2024-38561 CVE-2024-38562 CVE-2024-38563 CVE-2024-38564 CVE-2024-38565 CVE-2024-38566 CVE-2024-38567 CVE-2024-38568 CVE-2024-38569 CVE-2024-38570 CVE-2024-38571 CVE-2024-38572 CVE-2024-38573 CVE-2024-38574 CVE-2024-38575 CVE-2024-38576 CVE-2024-38577 CVE-2024-38578 CVE-2024-38579 CVE-2024-38580 CVE-2024-38582 CVE-2024-38583 CVE-2024-38584 CVE-2024-38585 CVE-2024-38586 CVE-2024-38587 CVE-2024-38588 CVE-2024-38589 CVE-2024-38590 CVE-2024-38591 CVE-2024-38592 CVE-2024-38593 CVE-2024-38594 CVE-2024-38595 CVE-2024-38596 CVE-2024-38597 CVE-2024-38598 CVE-2024-38599 CVE-2024-38600 CVE-2024-38601 CVE-2024-38602 CVE-2024-38603 CVE-2024-38604 CVE-2024-38605 CVE-2024-38606 CVE-2024-38607 CVE-2024-38610 CVE-2024-38611 CVE-2024-38612 CVE-2024-38613 CVE-2024-38614 CVE-2024-38615 CVE-2024-38616 CVE-2024-38617 CVE-2024-38620 CVE-2024-39482 CVE-2024-41011 CVE-2024-42134 USN-6949-2 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - ARM64 architecture; - M68K architecture; - OpenRISC architecture; - PowerPC architecture; - RISC-V architecture; - x86 architecture; - Block layer subsystem; - Accessibility subsystem; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - DMA engine subsystem; - DPLL subsystem; - FireWire subsystem; - EFI core; - Qualcomm firmware drivers; - GPIO subsystem; - GPU drivers; - Microsoft Hyper-V drivers; - InfiniBand drivers; - IOMMU subsystem; - IRQ chip drivers; - Macintosh device drivers; - Multiple devices driver; - Media drivers; - EEPROM drivers; - MMC subsystem; - Network drivers; - STMicroelectronics network drivers; - Device tree and open firmware driver; - HiSilicon SoC PMU drivers; - PHY drivers; - Pin controllers subsystem; - Remote Processor subsystem; - S/390 drivers; - SCSI drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - Userspace I/O drivers; - USB subsystem; - DesignWare USB3 driver; - ACRN Hypervisor Service Module driver; - Virtio drivers; - 9P distributed file system; - BTRFS file system; - eCrypt file system; - EROFS file system; - File systems infrastructure; - GFS2 file system; - JFFS2 file system; - Network file systems library; - Network file system client; - Network file system server daemon; - NILFS2 file system; - Proc file system; - SMB network file system; - Tracing file system; - Mellanox drivers; - Memory management; - Socket messages infrastructure; - Slab allocator; - Tracing infrastructure; - User-space API (UAPI); - Core kernel; - BPF subsystem; - DMA mapping infrastructure; - RCU subsystem; - Dynamic debug library; - KUnit library; - Maple Tree data structure library; - Heterogeneous memory management; - Amateur Radio drivers; - Bluetooth subsystem; - Ethernet bridge; - Networking core; - IPv4 networking; - IPv6 networking; - Multipath TCP; - Netfilter; - NET/ROM layer; - NFC subsystem; - NSH protocol; - Open vSwitch; - Phonet protocol; - SMC sockets; - TIPC protocol; - Unix domain sockets; - Wireless networking; - Key management; - ALSA framework; - HD-audio driver; - Kirkwood ASoC drivers; - MediaTek ASoC drivers; (CVE-2024-36006, CVE-2024-36922, CVE-2024-38567, CVE-2024-38584, CVE-2024-36923, CVE-2024-36892, CVE-2024-35855, CVE-2024-35853, CVE-2024-38562, CVE-2024-36920, CVE-2024-38543, CVE-2024-38576, CVE-2024-38572, CVE-2024-36898, CVE-2024-38560, CVE-2024-36004, CVE-2024-36956, CVE-2024-36881, CVE-2024-36977, CVE-2024-36955, CVE-2024-36906, CVE-2024-36013, CVE-2024-36884, CVE-2024-38563, CVE-2024-36966, CVE-2024-38547, CVE-2024-38594, CVE-2024-36926, CVE-2024-38587, CVE-2024-38566, CVE-2024-27400, CVE-2024-36941, CVE-2024-36017, CVE-2024-38544, CVE-2024-36899, CVE-2024-35851, CVE-2024-38577, CVE-2024-38590, CVE-2024-38568, CVE-2024-38559, CVE-2024-38611, CVE-2024-36887, CVE-2024-36886, CVE-2024-35996, CVE-2024-38612, CVE-2024-36925, CVE-2024-38586, CVE-2024-38596, CVE-2024-36932, CVE-2024-39482, CVE-2024-38585, CVE-2024-36033, CVE-2024-38614, CVE-2024-35852, CVE-2024-36908, CVE-2024-36939, CVE-2024-36963, CVE-2024-27401, CVE-2024-36029, CVE-2024-38540, CVE-2024-38565, CVE-2024-36927, CVE-2024-36910, CVE-2024-42134, CVE-2024-36888, CVE-2024-35859, CVE-2024-36911, CVE-2024-35947, CVE-2024-36940, CVE-2024-36921, CVE-2024-36913, CVE-2024-36943, CVE-2024-35986, CVE-2024-38616, CVE-2024-36900, CVE-2024-36954, CVE-2024-36915, CVE-2024-38602, CVE-2024-41011, CVE-2024-35991, CVE-2024-36909, CVE-2024-38603, CVE-2023-52882, CVE-2024-36953, CVE-2024-38599, CVE-2024-38574, CVE-2024-36967, CVE-2024-36895, CVE-2024-36003, CVE-2024-36961, CVE-2024-38545, CVE-2024-38538, CVE-2024-36001, CVE-2024-36912, CVE-2024-36952, CVE-2024-38550, CVE-2024-38570, CVE-2024-36969, CVE-2024-38595, CVE-2024-35849, CVE-2024-36936, CVE-2024-35949, CVE-2024-36009, CVE-2024-35987, CVE-2024-38541, CVE-2024-38564, CVE-2024-36032, CVE-2024-38615, CVE-2024-36960, CVE-2024-36934, CVE-2024-36951, CVE-2024-35999, CVE-2024-38551, CVE-2024-36903, CVE-2024-36931, CVE-2024-38593, CVE-2024-36938, CVE-2024-38607, CVE-2024-36928, CVE-2024-38552, CVE-2024-36002, CVE-2024-38605, CVE-2024-38582, CVE-2024-36933, CVE-2024-38620, CVE-2024-27395, CVE-2024-27396, CVE-2024-36012, CVE-2024-38591, CVE-2024-38597, CVE-2024-36889, CVE-2024-36964, CVE-2024-38606, CVE-2024-38553, CVE-2024-36945, CVE-2024-35848, CVE-2024-36962, CVE-2024-36947, CVE-2024-27399, CVE-2024-38546, CVE-2024-38583, CVE-2024-38573, CVE-2024-35850, CVE-2024-38549, CVE-2024-38588, CVE-2024-38610, CVE-2024-36917, CVE-2024-36957, CVE-2024-35846, CVE-2024-38579, CVE-2024-36965, CVE-2024-35857, CVE-2024-38548, CVE-2024-36975, CVE-2024-36919, CVE-2024-38542, CVE-2024-36948, CVE-2024-36011, CVE-2024-38556, CVE-2024-36897, CVE-2024-38557, CVE-2024-36890, CVE-2024-36882, CVE-2024-38613, CVE-2024-36914, CVE-2024-35998, CVE-2024-36958, CVE-2024-38580, CVE-2024-36896, CVE-2024-36891, CVE-2024-36924, CVE-2024-38589, CVE-2024-38592, CVE-2024-36904, CVE-2024-36894, CVE-2024-36028, CVE-2024-36014, CVE-2024-36880, CVE-2024-36944, CVE-2024-38598, CVE-2024-36929, CVE-2024-36883, CVE-2024-35858, CVE-2024-38555, CVE-2024-36005, CVE-2024-38539, CVE-2024-35994, CVE-2024-36030, CVE-2024-27394, CVE-2024-36930, CVE-2024-36937, CVE-2024-38561, CVE-2024-38578, CVE-2024-36959, CVE-2024-36935, CVE-2024-36916, CVE-2024-36902, CVE-2024-38604, CVE-2024-38554, CVE-2024-38575, CVE-2024-36918, CVE-2024-36979, CVE-2024-35854, CVE-2024-36968, CVE-2024-38558, CVE-2024-36000, CVE-2024-27398, CVE-2024-35983, CVE-2024-36949, CVE-2024-38600, CVE-2024-36950, CVE-2024-36946, CVE-2024-36031, CVE-2024-35847, CVE-2024-36905, CVE-2024-38571, CVE-2024-36007, CVE-2024-35856, CVE-2024-38601, CVE-2024-38569, CVE-2024-38617, CVE-2024-35988, CVE-2024-35989, CVE-2024-35993, CVE-2024-36893, CVE-2024-36901) Update Instructions: Run `sudo pro fix USN-6949-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1009-raspi - 6.8.0-1009.10 linux-headers-6.8.0-1009-raspi - 6.8.0-1009.10 linux-headers-raspi - 6.8.0-1009.10 linux-image-6.8.0-1009-raspi - 6.8.0-1009.10 linux-image-raspi - 6.8.0-1009.10 linux-modules-6.8.0-1009-raspi - 6.8.0-1009.10 linux-raspi - 6.8.0-1009.10 linux-raspi-headers-6.8.0-1009 - 6.8.0-1009.10 linux-raspi-tools-6.8.0-1009 - 6.8.0-1009.10 linux-tools-6.8.0-1009-raspi - 6.8.0-1009.10 linux-tools-raspi - 6.8.0-1009.10 No subscription required linux-buildinfo-6.8.0-40-lowlatency - 6.8.0-40.40.1 linux-buildinfo-6.8.0-40-lowlatency-64k - 6.8.0-40.40.1 linux-cloud-tools-6.8.0-40-lowlatency - 6.8.0-40.40.1 linux-cloud-tools-lowlatency - 6.8.0-40.40.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-40.40.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-40.40.1 linux-cloud-tools-lowlatency-hwe-22.04 - 6.8.0-40.40.1 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.8.0-40.40.1 linux-headers-6.8.0-40-lowlatency - 6.8.0-40.40.1 linux-headers-6.8.0-40-lowlatency-64k - 6.8.0-40.40.1 linux-headers-lowlatency - 6.8.0-40.40.1 linux-headers-lowlatency-64k - 6.8.0-40.40.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-40.40.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-40.40.1 linux-headers-lowlatency-64k-hwe-22.04 - 6.8.0-40.40.1 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.8.0-40.40.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-40.40.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-40.40.1 linux-headers-lowlatency-hwe-22.04 - 6.8.0-40.40.1 linux-headers-lowlatency-hwe-22.04-edge - 6.8.0-40.40.1 linux-image-6.8.0-40-lowlatency - 6.8.0-40.40.1 linux-image-6.8.0-40-lowlatency-64k - 6.8.0-40.40.1 linux-image-lowlatency - 6.8.0-40.40.1 linux-image-lowlatency-64k - 6.8.0-40.40.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-40.40.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-40.40.1 linux-image-lowlatency-64k-hwe-22.04 - 6.8.0-40.40.1 linux-image-lowlatency-64k-hwe-22.04-edge - 6.8.0-40.40.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-40.40.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-40.40.1 linux-image-lowlatency-hwe-22.04 - 6.8.0-40.40.1 linux-image-lowlatency-hwe-22.04-edge - 6.8.0-40.40.1 linux-image-unsigned-6.8.0-40-lowlatency - 6.8.0-40.40.1 linux-image-unsigned-6.8.0-40-lowlatency-64k - 6.8.0-40.40.1 linux-lowlatency - 6.8.0-40.40.1 linux-lowlatency-64k - 6.8.0-40.40.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-40.40.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-40.40.1 linux-lowlatency-64k-hwe-22.04 - 6.8.0-40.40.1 linux-lowlatency-64k-hwe-22.04-edge - 6.8.0-40.40.1 linux-lowlatency-cloud-tools-6.8.0-40 - 6.8.0-40.40.1 linux-lowlatency-cloud-tools-common - 6.8.0-40.40.1 linux-lowlatency-headers-6.8.0-40 - 6.8.0-40.40.1 linux-lowlatency-hwe-20.04 - 6.8.0-40.40.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-40.40.1 linux-lowlatency-hwe-22.04 - 6.8.0-40.40.1 linux-lowlatency-hwe-22.04-edge - 6.8.0-40.40.1 linux-lowlatency-lib-rust-6.8.0-40-lowlatency - 6.8.0-40.40.1 linux-lowlatency-tools-6.8.0-40 - 6.8.0-40.40.1 linux-lowlatency-tools-common - 6.8.0-40.40.1 linux-lowlatency-tools-host - 6.8.0-40.40.1 linux-modules-6.8.0-40-lowlatency - 6.8.0-40.40.1 linux-modules-6.8.0-40-lowlatency-64k - 6.8.0-40.40.1 linux-modules-iwlwifi-6.8.0-40-lowlatency - 6.8.0-40.40.1 linux-modules-iwlwifi-lowlatency - 6.8.0-40.40.1 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.8.0-40.40.1 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.8.0-40.40.1 linux-tools-6.8.0-40-lowlatency - 6.8.0-40.40.1 linux-tools-6.8.0-40-lowlatency-64k - 6.8.0-40.40.1 linux-tools-lowlatency - 6.8.0-40.40.1 linux-tools-lowlatency-64k - 6.8.0-40.40.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-40.40.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-40.40.1 linux-tools-lowlatency-64k-hwe-22.04 - 6.8.0-40.40.1 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.8.0-40.40.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-40.40.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-40.40.1 linux-tools-lowlatency-hwe-22.04 - 6.8.0-40.40.1 linux-tools-lowlatency-hwe-22.04-edge - 6.8.0-40.40.1 No subscription required High CVE-2023-52882 CVE-2024-27394 CVE-2024-27395 CVE-2024-27396 CVE-2024-27398 CVE-2024-27399 CVE-2024-27400 CVE-2024-27401 CVE-2024-35846 CVE-2024-35847 CVE-2024-35848 CVE-2024-35849 CVE-2024-35850 CVE-2024-35851 CVE-2024-35852 CVE-2024-35853 CVE-2024-35854 CVE-2024-35855 CVE-2024-35856 CVE-2024-35857 CVE-2024-35858 CVE-2024-35859 CVE-2024-35947 CVE-2024-35949 CVE-2024-35983 CVE-2024-35986 CVE-2024-35987 CVE-2024-35988 CVE-2024-35989 CVE-2024-35991 CVE-2024-35993 CVE-2024-35994 CVE-2024-35996 CVE-2024-35998 CVE-2024-35999 CVE-2024-36000 CVE-2024-36001 CVE-2024-36002 CVE-2024-36003 CVE-2024-36004 CVE-2024-36005 CVE-2024-36006 CVE-2024-36007 CVE-2024-36009 CVE-2024-36011 CVE-2024-36012 CVE-2024-36013 CVE-2024-36014 CVE-2024-36017 CVE-2024-36028 CVE-2024-36029 CVE-2024-36030 CVE-2024-36031 CVE-2024-36032 CVE-2024-36033 CVE-2024-36880 CVE-2024-36881 CVE-2024-36882 CVE-2024-36883 CVE-2024-36884 CVE-2024-36886 CVE-2024-36887 CVE-2024-36888 CVE-2024-36889 CVE-2024-36890 CVE-2024-36891 CVE-2024-36892 CVE-2024-36893 CVE-2024-36894 CVE-2024-36895 CVE-2024-36896 CVE-2024-36897 CVE-2024-36898 CVE-2024-36899 CVE-2024-36900 CVE-2024-36901 CVE-2024-36902 CVE-2024-36903 CVE-2024-36904 CVE-2024-36905 CVE-2024-36906 CVE-2024-36908 CVE-2024-36909 CVE-2024-36910 CVE-2024-36911 CVE-2024-36912 CVE-2024-36913 CVE-2024-36914 CVE-2024-36915 CVE-2024-36916 CVE-2024-36917 CVE-2024-36918 CVE-2024-36919 CVE-2024-36920 CVE-2024-36921 CVE-2024-36922 CVE-2024-36923 CVE-2024-36924 CVE-2024-36925 CVE-2024-36926 CVE-2024-36927 CVE-2024-36928 CVE-2024-36929 CVE-2024-36930 CVE-2024-36931 CVE-2024-36932 CVE-2024-36933 CVE-2024-36934 CVE-2024-36935 CVE-2024-36936 CVE-2024-36937 CVE-2024-36938 CVE-2024-36939 CVE-2024-36940 CVE-2024-36941 CVE-2024-36943 CVE-2024-36944 CVE-2024-36945 CVE-2024-36946 CVE-2024-36947 CVE-2024-36948 CVE-2024-36949 CVE-2024-36950 CVE-2024-36951 CVE-2024-36952 CVE-2024-36953 CVE-2024-36954 CVE-2024-36955 CVE-2024-36956 CVE-2024-36957 CVE-2024-36958 CVE-2024-36959 CVE-2024-36960 CVE-2024-36961 CVE-2024-36962 CVE-2024-36963 CVE-2024-36964 CVE-2024-36965 CVE-2024-36966 CVE-2024-36967 CVE-2024-36968 CVE-2024-36969 CVE-2024-36975 CVE-2024-36977 CVE-2024-36979 CVE-2024-38538 CVE-2024-38539 CVE-2024-38540 CVE-2024-38541 CVE-2024-38542 CVE-2024-38543 CVE-2024-38544 CVE-2024-38545 CVE-2024-38546 CVE-2024-38547 CVE-2024-38548 CVE-2024-38549 CVE-2024-38550 CVE-2024-38551 CVE-2024-38552 CVE-2024-38553 CVE-2024-38554 CVE-2024-38555 CVE-2024-38556 CVE-2024-38557 CVE-2024-38558 CVE-2024-38559 CVE-2024-38560 CVE-2024-38561 CVE-2024-38562 CVE-2024-38563 CVE-2024-38564 CVE-2024-38565 CVE-2024-38566 CVE-2024-38567 CVE-2024-38568 CVE-2024-38569 CVE-2024-38570 CVE-2024-38571 CVE-2024-38572 CVE-2024-38573 CVE-2024-38574 CVE-2024-38575 CVE-2024-38576 CVE-2024-38577 CVE-2024-38578 CVE-2024-38579 CVE-2024-38580 CVE-2024-38582 CVE-2024-38583 CVE-2024-38584 CVE-2024-38585 CVE-2024-38586 CVE-2024-38587 CVE-2024-38588 CVE-2024-38589 CVE-2024-38590 CVE-2024-38591 CVE-2024-38592 CVE-2024-38593 CVE-2024-38594 CVE-2024-38595 CVE-2024-38596 CVE-2024-38597 CVE-2024-38598 CVE-2024-38599 CVE-2024-38600 CVE-2024-38601 CVE-2024-38602 CVE-2024-38603 CVE-2024-38604 CVE-2024-38605 CVE-2024-38606 CVE-2024-38607 CVE-2024-38610 CVE-2024-38611 CVE-2024-38612 CVE-2024-38613 CVE-2024-38614 CVE-2024-38615 CVE-2024-38616 CVE-2024-38617 CVE-2024-38620 CVE-2024-39482 CVE-2024-41011 CVE-2024-42134 USN-6952-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Benedict Schlüter, Supraja Sridhara, Andrin Bertschi, and Shweta Shinde discovered that an untrusted hypervisor could inject malicious #VC interrupts and compromise the security guarantees of AMD SEV-SNP. This flaw is known as WeSee. A local attacker in control of the hypervisor could use this to expose sensitive information or possibly execute arbitrary code in the trusted execution environment. (CVE-2024-25742) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - ARM64 architecture; - M68K architecture; - OpenRISC architecture; - PowerPC architecture; - RISC-V architecture; - x86 architecture; - Block layer subsystem; - Accessibility subsystem; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - DMA engine subsystem; - DPLL subsystem; - FireWire subsystem; - EFI core; - Qualcomm firmware drivers; - GPIO subsystem; - GPU drivers; - HID subsystem; - Microsoft Hyper-V drivers; - I2C subsystem; - InfiniBand drivers; - IOMMU subsystem; - IRQ chip drivers; - Macintosh device drivers; - Multiple devices driver; - Media drivers; - EEPROM drivers; - MMC subsystem; - Network drivers; - STMicroelectronics network drivers; - Device tree and open firmware driver; - HiSilicon SoC PMU drivers; - PHY drivers; - Pin controllers subsystem; - Remote Processor subsystem; - S/390 drivers; - SCSI drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - TTY drivers; - Userspace I/O drivers; - USB subsystem; - DesignWare USB3 driver; - ACRN Hypervisor Service Module driver; - Virtio drivers; - 9P distributed file system; - BTRFS file system; - eCrypt file system; - EROFS file system; - File systems infrastructure; - GFS2 file system; - JFFS2 file system; - Network file systems library; - Network file system client; - Network file system server daemon; - NILFS2 file system; - Proc file system; - SMB network file system; - Tracing file system; - Mellanox drivers; - Memory management; - Socket messages infrastructure; - Slab allocator; - Tracing infrastructure; - User-space API (UAPI); - Core kernel; - BPF subsystem; - DMA mapping infrastructure; - RCU subsystem; - Dynamic debug library; - KUnit library; - Maple Tree data structure library; - Heterogeneous memory management; - Amateur Radio drivers; - Bluetooth subsystem; - Ethernet bridge; - Networking core; - IPv4 networking; - IPv6 networking; - Multipath TCP; - Netfilter; - NET/ROM layer; - NFC subsystem; - NSH protocol; - Open vSwitch; - Phonet protocol; - SMC sockets; - TIPC protocol; - Unix domain sockets; - Wireless networking; - Key management; - ALSA framework; - HD-audio driver; - Kirkwood ASoC drivers; - MediaTek ASoC drivers; (CVE-2024-38601, CVE-2024-36935, CVE-2024-35991, CVE-2024-36032, CVE-2024-35988, CVE-2024-36886, CVE-2024-36913, CVE-2024-36928, CVE-2024-38553, CVE-2024-36927, CVE-2024-38615, CVE-2024-36958, CVE-2024-36977, CVE-2024-36889, CVE-2024-38554, CVE-2024-38590, CVE-2024-42134, CVE-2024-35857, CVE-2024-35850, CVE-2024-35986, CVE-2024-36921, CVE-2024-38569, CVE-2024-36966, CVE-2024-38542, CVE-2024-38585, CVE-2024-36884, CVE-2024-36006, CVE-2024-38577, CVE-2024-36016, CVE-2024-38584, CVE-2024-36887, CVE-2024-38598, CVE-2024-35994, CVE-2024-38603, CVE-2024-35998, CVE-2024-27401, CVE-2024-35852, CVE-2024-36944, CVE-2024-38572, CVE-2024-36917, CVE-2024-36943, CVE-2024-36009, CVE-2024-38587, CVE-2024-35949, CVE-2024-36945, CVE-2024-36004, CVE-2024-36919, CVE-2024-27398, CVE-2024-38582, CVE-2024-35847, CVE-2024-38580, CVE-2024-38602, CVE-2024-36916, CVE-2024-36903, CVE-2024-38555, CVE-2024-36952, CVE-2024-38589, CVE-2024-27394, CVE-2024-36933, CVE-2024-36975, CVE-2024-38591, CVE-2024-38612, CVE-2024-36939, CVE-2024-35983, CVE-2024-38607, CVE-2024-36929, CVE-2024-35849, CVE-2024-36941, CVE-2024-35858, CVE-2024-38599, CVE-2024-35996, CVE-2024-36031, CVE-2024-36931, CVE-2024-35990, CVE-2024-35851, CVE-2024-38556, CVE-2024-36000, CVE-2024-36910, CVE-2024-38573, CVE-2024-36906, CVE-2024-36951, CVE-2024-38604, CVE-2024-38613, CVE-2024-38547, CVE-2024-36014, CVE-2024-36949, CVE-2024-36033, CVE-2024-38597, CVE-2024-36880, CVE-2024-38594, CVE-2024-36894, CVE-2024-38546, CVE-2024-36947, CVE-2024-38541, CVE-2024-35989, CVE-2024-27399, CVE-2024-38550, CVE-2024-36922, CVE-2024-36008, CVE-2024-38540, CVE-2024-36924, CVE-2024-36892, CVE-2024-38549, CVE-2024-36882, CVE-2024-36908, CVE-2024-38566, CVE-2024-36005, CVE-2024-38583, CVE-2024-36968, CVE-2024-36017, CVE-2024-38565, CVE-2024-36881, CVE-2024-38611, CVE-2024-36897, CVE-2024-38560, CVE-2024-36923, CVE-2024-38575, CVE-2024-36899, CVE-2024-38570, CVE-2024-36898, CVE-2024-36896, CVE-2024-38559, CVE-2024-38588, CVE-2024-38606, CVE-2024-38551, CVE-2024-36891, CVE-2024-38567, CVE-2024-36895, CVE-2024-35993, CVE-2024-38552, CVE-2024-36925, CVE-2024-36964, CVE-2024-36888, CVE-2024-36956, CVE-2024-36946, CVE-2024-38600, CVE-2024-35997, CVE-2024-36912, CVE-2024-35984, CVE-2024-35848, CVE-2024-38545, CVE-2024-38563, CVE-2024-36918, CVE-2024-36001, CVE-2024-36957, CVE-2024-38576, CVE-2024-36030, CVE-2024-38574, CVE-2024-36963, CVE-2024-36890, CVE-2024-36960, CVE-2024-36901, CVE-2024-38614, CVE-2024-35859, CVE-2024-38593, CVE-2024-36904, CVE-2024-36012, CVE-2024-38578, CVE-2024-36011, CVE-2024-36930, CVE-2024-36938, CVE-2024-36893, CVE-2024-35987, CVE-2024-36905, CVE-2024-35853, CVE-2024-36003, CVE-2024-38562, CVE-2024-38617, CVE-2024-35855, CVE-2024-36965, CVE-2024-38596, CVE-2024-38558, CVE-2024-38568, CVE-2024-36955, CVE-2024-36029, CVE-2024-36967, CVE-2024-36940, CVE-2024-38595, CVE-2024-36028, CVE-2024-38610, CVE-2024-36911, CVE-2024-35999, CVE-2024-35854, CVE-2024-38571, CVE-2024-38548, CVE-2024-36948, CVE-2024-36002, CVE-2024-36961, CVE-2024-36900, CVE-2024-36932, CVE-2024-36902, CVE-2024-35992, CVE-2024-36914, CVE-2024-38592, CVE-2024-38616, CVE-2024-27400, CVE-2024-36937, CVE-2024-36920, CVE-2024-38586, CVE-2024-36909, CVE-2024-35846, CVE-2024-39482, CVE-2024-38579, CVE-2024-38539, CVE-2024-27395, CVE-2024-36962, CVE-2024-36013, CVE-2024-27396, CVE-2024-38557, CVE-2024-36953, CVE-2024-41011, CVE-2023-52882, CVE-2024-36969, CVE-2024-36007, CVE-2024-35856, CVE-2024-38605, CVE-2024-36915, CVE-2024-36979, CVE-2024-36954, CVE-2024-38538, CVE-2024-36950, CVE-2024-36926, CVE-2024-38544, CVE-2024-36959, CVE-2024-38561, CVE-2024-36883, CVE-2024-36936, CVE-2024-38564, CVE-2024-38543, CVE-2024-36934, CVE-2024-35947, CVE-2024-38620) Update Instructions: Run `sudo pro fix USN-6952-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1010-oracle - 6.8.0-1010.10 linux-buildinfo-6.8.0-1010-oracle-64k - 6.8.0-1010.10 linux-headers-6.8.0-1010-oracle - 6.8.0-1010.10 linux-headers-6.8.0-1010-oracle-64k - 6.8.0-1010.10 linux-headers-oracle - 6.8.0-1010.10 linux-headers-oracle-64k - 6.8.0-1010.10 linux-image-6.8.0-1010-oracle - 6.8.0-1010.10 linux-image-6.8.0-1010-oracle-64k - 6.8.0-1010.10 linux-image-oracle - 6.8.0-1010.10 linux-image-oracle-64k - 6.8.0-1010.10 linux-image-unsigned-6.8.0-1010-oracle - 6.8.0-1010.10 linux-image-unsigned-6.8.0-1010-oracle-64k - 6.8.0-1010.10 linux-modules-6.8.0-1010-oracle - 6.8.0-1010.10 linux-modules-6.8.0-1010-oracle-64k - 6.8.0-1010.10 linux-modules-extra-6.8.0-1010-oracle - 6.8.0-1010.10 linux-modules-extra-6.8.0-1010-oracle-64k - 6.8.0-1010.10 linux-modules-iwlwifi-6.8.0-1010-oracle - 6.8.0-1010.10 linux-modules-iwlwifi-oracle - 6.8.0-1010.10 linux-oracle - 6.8.0-1010.10 linux-oracle-64k - 6.8.0-1010.10 linux-oracle-headers-6.8.0-1010 - 6.8.0-1010.10 linux-oracle-tools-6.8.0-1010 - 6.8.0-1010.10 linux-tools-6.8.0-1010-oracle - 6.8.0-1010.10 linux-tools-6.8.0-1010-oracle-64k - 6.8.0-1010.10 linux-tools-oracle - 6.8.0-1010.10 linux-tools-oracle-64k - 6.8.0-1010.10 No subscription required linux-buildinfo-6.8.0-1011-nvidia-lowlatency - 6.8.0-1011.11.1 linux-buildinfo-6.8.0-1011-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1011.11.1 linux-headers-6.8.0-1011-nvidia-lowlatency - 6.8.0-1011.11.1 linux-headers-6.8.0-1011-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-headers-nvidia-lowlatency - 6.8.0-1011.11.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-image-6.8.0-1011-nvidia-lowlatency - 6.8.0-1011.11.1 linux-image-6.8.0-1011-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-image-nvidia-lowlatency - 6.8.0-1011.11.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-image-uc-6.8.0-1011-nvidia-lowlatency - 6.8.0-1011.11.1 linux-image-uc-6.8.0-1011-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-image-unsigned-6.8.0-1011-nvidia-lowlatency - 6.8.0-1011.11.1 linux-image-unsigned-6.8.0-1011-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-modules-6.8.0-1011-nvidia-lowlatency - 6.8.0-1011.11.1 linux-modules-6.8.0-1011-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-modules-extra-6.8.0-1011-nvidia-lowlatency - 6.8.0-1011.11.1 linux-modules-nvidia-fs-6.8.0-1011-nvidia-lowlatency - 6.8.0-1011.11.1 linux-modules-nvidia-fs-6.8.0-1011-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1011.11.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-nvidia-lowlatency - 6.8.0-1011.11.1 linux-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-nvidia-lowlatency-headers-6.8.0-1011 - 6.8.0-1011.11.1 linux-nvidia-lowlatency-tools-6.8.0-1011 - 6.8.0-1011.11.1 linux-nvidia-lowlatency-tools-host - 6.8.0-1011.11.1 linux-tools-6.8.0-1011-nvidia-lowlatency - 6.8.0-1011.11.1 linux-tools-6.8.0-1011-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-tools-nvidia-lowlatency - 6.8.0-1011.11.1 linux-tools-nvidia-lowlatency-64k - 6.8.0-1011.11.1 No subscription required High CVE-2023-52882 CVE-2024-25742 CVE-2024-27394 CVE-2024-27395 CVE-2024-27396 CVE-2024-27398 CVE-2024-27399 CVE-2024-27400 CVE-2024-27401 CVE-2024-35846 CVE-2024-35847 CVE-2024-35848 CVE-2024-35849 CVE-2024-35850 CVE-2024-35851 CVE-2024-35852 CVE-2024-35853 CVE-2024-35854 CVE-2024-35855 CVE-2024-35856 CVE-2024-35857 CVE-2024-35858 CVE-2024-35859 CVE-2024-35947 CVE-2024-35949 CVE-2024-35983 CVE-2024-35984 CVE-2024-35986 CVE-2024-35987 CVE-2024-35988 CVE-2024-35989 CVE-2024-35990 CVE-2024-35991 CVE-2024-35992 CVE-2024-35993 CVE-2024-35994 CVE-2024-35996 CVE-2024-35997 CVE-2024-35998 CVE-2024-35999 CVE-2024-36000 CVE-2024-36001 CVE-2024-36002 CVE-2024-36003 CVE-2024-36004 CVE-2024-36005 CVE-2024-36006 CVE-2024-36007 CVE-2024-36008 CVE-2024-36009 CVE-2024-36011 CVE-2024-36012 CVE-2024-36013 CVE-2024-36014 CVE-2024-36016 CVE-2024-36017 CVE-2024-36028 CVE-2024-36029 CVE-2024-36030 CVE-2024-36031 CVE-2024-36032 CVE-2024-36033 CVE-2024-36880 CVE-2024-36881 CVE-2024-36882 CVE-2024-36883 CVE-2024-36884 CVE-2024-36886 CVE-2024-36887 CVE-2024-36888 CVE-2024-36889 CVE-2024-36890 CVE-2024-36891 CVE-2024-36892 CVE-2024-36893 CVE-2024-36894 CVE-2024-36895 CVE-2024-36896 CVE-2024-36897 CVE-2024-36898 CVE-2024-36899 CVE-2024-36900 CVE-2024-36901 CVE-2024-36902 CVE-2024-36903 CVE-2024-36904 CVE-2024-36905 CVE-2024-36906 CVE-2024-36908 CVE-2024-36909 CVE-2024-36910 CVE-2024-36911 CVE-2024-36912 CVE-2024-36913 CVE-2024-36914 CVE-2024-36915 CVE-2024-36916 CVE-2024-36917 CVE-2024-36918 CVE-2024-36919 CVE-2024-36920 CVE-2024-36921 CVE-2024-36922 CVE-2024-36923 CVE-2024-36924 CVE-2024-36925 CVE-2024-36926 CVE-2024-36927 CVE-2024-36928 CVE-2024-36929 CVE-2024-36930 CVE-2024-36931 CVE-2024-36932 CVE-2024-36933 CVE-2024-36934 CVE-2024-36935 CVE-2024-36936 CVE-2024-36937 CVE-2024-36938 CVE-2024-36939 CVE-2024-36940 CVE-2024-36941 CVE-2024-36943 CVE-2024-36944 CVE-2024-36945 CVE-2024-36946 CVE-2024-36947 CVE-2024-36948 CVE-2024-36949 CVE-2024-36950 CVE-2024-36951 CVE-2024-36952 CVE-2024-36953 CVE-2024-36954 CVE-2024-36955 CVE-2024-36956 CVE-2024-36957 CVE-2024-36958 CVE-2024-36959 CVE-2024-36960 CVE-2024-36961 CVE-2024-36962 CVE-2024-36963 CVE-2024-36964 CVE-2024-36965 CVE-2024-36966 CVE-2024-36967 CVE-2024-36968 CVE-2024-36969 CVE-2024-36975 CVE-2024-36977 CVE-2024-36979 CVE-2024-38538 CVE-2024-38539 CVE-2024-38540 CVE-2024-38541 CVE-2024-38542 CVE-2024-38543 CVE-2024-38544 CVE-2024-38545 CVE-2024-38546 CVE-2024-38547 CVE-2024-38548 CVE-2024-38549 CVE-2024-38550 CVE-2024-38551 CVE-2024-38552 CVE-2024-38553 CVE-2024-38554 CVE-2024-38555 CVE-2024-38556 CVE-2024-38557 CVE-2024-38558 CVE-2024-38559 CVE-2024-38560 CVE-2024-38561 CVE-2024-38562 CVE-2024-38563 CVE-2024-38564 CVE-2024-38565 CVE-2024-38566 CVE-2024-38567 CVE-2024-38568 CVE-2024-38569 CVE-2024-38570 CVE-2024-38571 CVE-2024-38572 CVE-2024-38573 CVE-2024-38574 CVE-2024-38575 CVE-2024-38576 CVE-2024-38577 CVE-2024-38578 CVE-2024-38579 CVE-2024-38580 CVE-2024-38582 CVE-2024-38583 CVE-2024-38584 CVE-2024-38585 CVE-2024-38586 CVE-2024-38587 CVE-2024-38588 CVE-2024-38589 CVE-2024-38590 CVE-2024-38591 CVE-2024-38592 CVE-2024-38593 CVE-2024-38594 CVE-2024-38595 CVE-2024-38596 CVE-2024-38597 CVE-2024-38598 CVE-2024-38599 CVE-2024-38600 CVE-2024-38601 CVE-2024-38602 CVE-2024-38603 CVE-2024-38604 CVE-2024-38605 CVE-2024-38606 CVE-2024-38607 CVE-2024-38610 CVE-2024-38611 CVE-2024-38612 CVE-2024-38613 CVE-2024-38614 CVE-2024-38615 CVE-2024-38616 CVE-2024-38617 CVE-2024-38620 CVE-2024-39482 CVE-2024-41011 CVE-2024-42134 USN-6952-2 -- Linux kernel (Azure) vulnerabilities Ubuntu 24.04 LTS Benedict Schlüter, Supraja Sridhara, Andrin Bertschi, and Shweta Shinde discovered that an untrusted hypervisor could inject malicious #VC interrupts and compromise the security guarantees of AMD SEV-SNP. This flaw is known as WeSee. A local attacker in control of the hypervisor could use this to expose sensitive information or possibly execute arbitrary code in the trusted execution environment. (CVE-2024-25742) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - ARM64 architecture; - M68K architecture; - OpenRISC architecture; - PowerPC architecture; - RISC-V architecture; - x86 architecture; - Block layer subsystem; - Accessibility subsystem; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - DMA engine subsystem; - DPLL subsystem; - FireWire subsystem; - EFI core; - Qualcomm firmware drivers; - GPIO subsystem; - GPU drivers; - HID subsystem; - Microsoft Hyper-V drivers; - I2C subsystem; - InfiniBand drivers; - IOMMU subsystem; - IRQ chip drivers; - Macintosh device drivers; - Multiple devices driver; - Media drivers; - EEPROM drivers; - MMC subsystem; - Network drivers; - STMicroelectronics network drivers; - Device tree and open firmware driver; - HiSilicon SoC PMU drivers; - PHY drivers; - Pin controllers subsystem; - Remote Processor subsystem; - S/390 drivers; - SCSI drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - TTY drivers; - Userspace I/O drivers; - USB subsystem; - DesignWare USB3 driver; - ACRN Hypervisor Service Module driver; - Virtio drivers; - 9P distributed file system; - BTRFS file system; - eCrypt file system; - EROFS file system; - File systems infrastructure; - GFS2 file system; - JFFS2 file system; - Network file systems library; - Network file system client; - Network file system server daemon; - NILFS2 file system; - Proc file system; - SMB network file system; - Tracing file system; - Mellanox drivers; - Memory management; - Socket messages infrastructure; - Slab allocator; - Tracing infrastructure; - User-space API (UAPI); - Core kernel; - BPF subsystem; - DMA mapping infrastructure; - RCU subsystem; - Dynamic debug library; - KUnit library; - Maple Tree data structure library; - Heterogeneous memory management; - Amateur Radio drivers; - Bluetooth subsystem; - Ethernet bridge; - Networking core; - IPv4 networking; - IPv6 networking; - Multipath TCP; - Netfilter; - NET/ROM layer; - NFC subsystem; - NSH protocol; - Open vSwitch; - Phonet protocol; - SMC sockets; - TIPC protocol; - Unix domain sockets; - Wireless networking; - Key management; - ALSA framework; - HD-audio driver; - Kirkwood ASoC drivers; - MediaTek ASoC drivers; (CVE-2024-38601, CVE-2024-36935, CVE-2024-35991, CVE-2024-36032, CVE-2024-35988, CVE-2024-36886, CVE-2024-36913, CVE-2024-36928, CVE-2024-38553, CVE-2024-36927, CVE-2024-38615, CVE-2024-36958, CVE-2024-36977, CVE-2024-36889, CVE-2024-38554, CVE-2024-38590, CVE-2024-42134, CVE-2024-35857, CVE-2024-35850, CVE-2024-35986, CVE-2024-36921, CVE-2024-38569, CVE-2024-36966, CVE-2024-38542, CVE-2024-38585, CVE-2024-36884, CVE-2024-36006, CVE-2024-38577, CVE-2024-36016, CVE-2024-38584, CVE-2024-36887, CVE-2024-38598, CVE-2024-35994, CVE-2024-38603, CVE-2024-35998, CVE-2024-27401, CVE-2024-35852, CVE-2024-36944, CVE-2024-38572, CVE-2024-36917, CVE-2024-36943, CVE-2024-36009, CVE-2024-38587, CVE-2024-35949, CVE-2024-36945, CVE-2024-36004, CVE-2024-36919, CVE-2024-27398, CVE-2024-38582, CVE-2024-35847, CVE-2024-38580, CVE-2024-38602, CVE-2024-36916, CVE-2024-36903, CVE-2024-38555, CVE-2024-36952, CVE-2024-38589, CVE-2024-27394, CVE-2024-36933, CVE-2024-36975, CVE-2024-38591, CVE-2024-38612, CVE-2024-36939, CVE-2024-35983, CVE-2024-38607, CVE-2024-36929, CVE-2024-35849, CVE-2024-36941, CVE-2024-35858, CVE-2024-38599, CVE-2024-35996, CVE-2024-36031, CVE-2024-36931, CVE-2024-35990, CVE-2024-35851, CVE-2024-38556, CVE-2024-36000, CVE-2024-36910, CVE-2024-38573, CVE-2024-36906, CVE-2024-36951, CVE-2024-38604, CVE-2024-38613, CVE-2024-38547, CVE-2024-36014, CVE-2024-36949, CVE-2024-36033, CVE-2024-38597, CVE-2024-36880, CVE-2024-38594, CVE-2024-36894, CVE-2024-38546, CVE-2024-36947, CVE-2024-38541, CVE-2024-35989, CVE-2024-27399, CVE-2024-38550, CVE-2024-36922, CVE-2024-36008, CVE-2024-38540, CVE-2024-36924, CVE-2024-36892, CVE-2024-38549, CVE-2024-36882, CVE-2024-36908, CVE-2024-38566, CVE-2024-36005, CVE-2024-38583, CVE-2024-36968, CVE-2024-36017, CVE-2024-38565, CVE-2024-36881, CVE-2024-38611, CVE-2024-36897, CVE-2024-38560, CVE-2024-36923, CVE-2024-38575, CVE-2024-36899, CVE-2024-38570, CVE-2024-36898, CVE-2024-36896, CVE-2024-38559, CVE-2024-38588, CVE-2024-38606, CVE-2024-38551, CVE-2024-36891, CVE-2024-38567, CVE-2024-36895, CVE-2024-35993, CVE-2024-38552, CVE-2024-36925, CVE-2024-36964, CVE-2024-36888, CVE-2024-36956, CVE-2024-36946, CVE-2024-38600, CVE-2024-35997, CVE-2024-36912, CVE-2024-35984, CVE-2024-35848, CVE-2024-38545, CVE-2024-38563, CVE-2024-36918, CVE-2024-36001, CVE-2024-36957, CVE-2024-38576, CVE-2024-36030, CVE-2024-38574, CVE-2024-36963, CVE-2024-36890, CVE-2024-36960, CVE-2024-36901, CVE-2024-38614, CVE-2024-35859, CVE-2024-38593, CVE-2024-36904, CVE-2024-36012, CVE-2024-38578, CVE-2024-36011, CVE-2024-36930, CVE-2024-36938, CVE-2024-36893, CVE-2024-35987, CVE-2024-36905, CVE-2024-35853, CVE-2024-36003, CVE-2024-38562, CVE-2024-38617, CVE-2024-35855, CVE-2024-36965, CVE-2024-38596, CVE-2024-38558, CVE-2024-38568, CVE-2024-36955, CVE-2024-36029, CVE-2024-36967, CVE-2024-36940, CVE-2024-38595, CVE-2024-36028, CVE-2024-38610, CVE-2024-36911, CVE-2024-35999, CVE-2024-35854, CVE-2024-38571, CVE-2024-38548, CVE-2024-36948, CVE-2024-36002, CVE-2024-36961, CVE-2024-36900, CVE-2024-36932, CVE-2024-36902, CVE-2024-35992, CVE-2024-36914, CVE-2024-38592, CVE-2024-38616, CVE-2024-27400, CVE-2024-36937, CVE-2024-36920, CVE-2024-38586, CVE-2024-36909, CVE-2024-35846, CVE-2024-39482, CVE-2024-38579, CVE-2024-38539, CVE-2024-27395, CVE-2024-36962, CVE-2024-36013, CVE-2024-27396, CVE-2024-38557, CVE-2024-36953, CVE-2024-41011, CVE-2023-52882, CVE-2024-36969, CVE-2024-36007, CVE-2024-35856, CVE-2024-38605, CVE-2024-36915, CVE-2024-36979, CVE-2024-36954, CVE-2024-38538, CVE-2024-36950, CVE-2024-36926, CVE-2024-38544, CVE-2024-36959, CVE-2024-38561, CVE-2024-36883, CVE-2024-36936, CVE-2024-38564, CVE-2024-38543, CVE-2024-36934, CVE-2024-35947, CVE-2024-38620) Update Instructions: Run `sudo pro fix USN-6952-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-azure - 6.8.0-1012.14 linux-azure-cloud-tools-6.8.0-1012 - 6.8.0-1012.14 linux-azure-fde - 6.8.0-1012.14 linux-azure-headers-6.8.0-1012 - 6.8.0-1012.14 linux-azure-tools-6.8.0-1012 - 6.8.0-1012.14 linux-buildinfo-6.8.0-1012-azure - 6.8.0-1012.14 linux-cloud-tools-6.8.0-1012-azure - 6.8.0-1012.14 linux-cloud-tools-azure - 6.8.0-1012.14 linux-headers-6.8.0-1012-azure - 6.8.0-1012.14 linux-headers-azure - 6.8.0-1012.14 linux-image-6.8.0-1012-azure - 6.8.0-1012.14 linux-image-6.8.0-1012-azure-fde - 6.8.0-1012.14 linux-image-azure - 6.8.0-1012.14 linux-image-azure-fde - 6.8.0-1012.14 linux-image-unsigned-6.8.0-1012-azure - 6.8.0-1012.14 linux-modules-6.8.0-1012-azure - 6.8.0-1012.14 linux-modules-extra-6.8.0-1012-azure - 6.8.0-1012.14 linux-modules-extra-azure - 6.8.0-1012.14 linux-modules-involflt-6.8.0-1012-azure - 6.8.0-1012.14 linux-modules-involflt-azure - 6.8.0-1012.14 linux-modules-iwlwifi-6.8.0-1012-azure - 6.8.0-1012.14 linux-modules-iwlwifi-azure - 6.8.0-1012.14 linux-tools-6.8.0-1012-azure - 6.8.0-1012.14 linux-tools-azure - 6.8.0-1012.14 No subscription required High CVE-2023-52882 CVE-2024-25742 CVE-2024-27394 CVE-2024-27395 CVE-2024-27396 CVE-2024-27398 CVE-2024-27399 CVE-2024-27400 CVE-2024-27401 CVE-2024-35846 CVE-2024-35847 CVE-2024-35848 CVE-2024-35849 CVE-2024-35850 CVE-2024-35851 CVE-2024-35852 CVE-2024-35853 CVE-2024-35854 CVE-2024-35855 CVE-2024-35856 CVE-2024-35857 CVE-2024-35858 CVE-2024-35859 CVE-2024-35947 CVE-2024-35949 CVE-2024-35983 CVE-2024-35984 CVE-2024-35986 CVE-2024-35987 CVE-2024-35988 CVE-2024-35989 CVE-2024-35990 CVE-2024-35991 CVE-2024-35992 CVE-2024-35993 CVE-2024-35994 CVE-2024-35996 CVE-2024-35997 CVE-2024-35998 CVE-2024-35999 CVE-2024-36000 CVE-2024-36001 CVE-2024-36002 CVE-2024-36003 CVE-2024-36004 CVE-2024-36005 CVE-2024-36006 CVE-2024-36007 CVE-2024-36008 CVE-2024-36009 CVE-2024-36011 CVE-2024-36012 CVE-2024-36013 CVE-2024-36014 CVE-2024-36016 CVE-2024-36017 CVE-2024-36028 CVE-2024-36029 CVE-2024-36030 CVE-2024-36031 CVE-2024-36032 CVE-2024-36033 CVE-2024-36880 CVE-2024-36881 CVE-2024-36882 CVE-2024-36883 CVE-2024-36884 CVE-2024-36886 CVE-2024-36887 CVE-2024-36888 CVE-2024-36889 CVE-2024-36890 CVE-2024-36891 CVE-2024-36892 CVE-2024-36893 CVE-2024-36894 CVE-2024-36895 CVE-2024-36896 CVE-2024-36897 CVE-2024-36898 CVE-2024-36899 CVE-2024-36900 CVE-2024-36901 CVE-2024-36902 CVE-2024-36903 CVE-2024-36904 CVE-2024-36905 CVE-2024-36906 CVE-2024-36908 CVE-2024-36909 CVE-2024-36910 CVE-2024-36911 CVE-2024-36912 CVE-2024-36913 CVE-2024-36914 CVE-2024-36915 CVE-2024-36916 CVE-2024-36917 CVE-2024-36918 CVE-2024-36919 CVE-2024-36920 CVE-2024-36921 CVE-2024-36922 CVE-2024-36923 CVE-2024-36924 CVE-2024-36925 CVE-2024-36926 CVE-2024-36927 CVE-2024-36928 CVE-2024-36929 CVE-2024-36930 CVE-2024-36931 CVE-2024-36932 CVE-2024-36933 CVE-2024-36934 CVE-2024-36935 CVE-2024-36936 CVE-2024-36937 CVE-2024-36938 CVE-2024-36939 CVE-2024-36940 CVE-2024-36941 CVE-2024-36943 CVE-2024-36944 CVE-2024-36945 CVE-2024-36946 CVE-2024-36947 CVE-2024-36948 CVE-2024-36949 CVE-2024-36950 CVE-2024-36951 CVE-2024-36952 CVE-2024-36953 CVE-2024-36954 CVE-2024-36955 CVE-2024-36956 CVE-2024-36957 CVE-2024-36958 CVE-2024-36959 CVE-2024-36960 CVE-2024-36961 CVE-2024-36962 CVE-2024-36963 CVE-2024-36964 CVE-2024-36965 CVE-2024-36966 CVE-2024-36967 CVE-2024-36968 CVE-2024-36969 CVE-2024-36975 CVE-2024-36977 CVE-2024-36979 CVE-2024-38538 CVE-2024-38539 CVE-2024-38540 CVE-2024-38541 CVE-2024-38542 CVE-2024-38543 CVE-2024-38544 CVE-2024-38545 CVE-2024-38546 CVE-2024-38547 CVE-2024-38548 CVE-2024-38549 CVE-2024-38550 CVE-2024-38551 CVE-2024-38552 CVE-2024-38553 CVE-2024-38554 CVE-2024-38555 CVE-2024-38556 CVE-2024-38557 CVE-2024-38558 CVE-2024-38559 CVE-2024-38560 CVE-2024-38561 CVE-2024-38562 CVE-2024-38563 CVE-2024-38564 CVE-2024-38565 CVE-2024-38566 CVE-2024-38567 CVE-2024-38568 CVE-2024-38569 CVE-2024-38570 CVE-2024-38571 CVE-2024-38572 CVE-2024-38573 CVE-2024-38574 CVE-2024-38575 CVE-2024-38576 CVE-2024-38577 CVE-2024-38578 CVE-2024-38579 CVE-2024-38580 CVE-2024-38582 CVE-2024-38583 CVE-2024-38584 CVE-2024-38585 CVE-2024-38586 CVE-2024-38587 CVE-2024-38588 CVE-2024-38589 CVE-2024-38590 CVE-2024-38591 CVE-2024-38592 CVE-2024-38593 CVE-2024-38594 CVE-2024-38595 CVE-2024-38596 CVE-2024-38597 CVE-2024-38598 CVE-2024-38599 CVE-2024-38600 CVE-2024-38601 CVE-2024-38602 CVE-2024-38603 CVE-2024-38604 CVE-2024-38605 CVE-2024-38606 CVE-2024-38607 CVE-2024-38610 CVE-2024-38611 CVE-2024-38612 CVE-2024-38613 CVE-2024-38614 CVE-2024-38615 CVE-2024-38616 CVE-2024-38617 CVE-2024-38620 CVE-2024-39482 CVE-2024-41011 CVE-2024-42134 USN-6955-1 -- Linux kernel (OEM) vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - ARM64 architecture; - M68K architecture; - OpenRISC architecture; - PowerPC architecture; - RISC-V architecture; - x86 architecture; - Block layer subsystem; - Accessibility subsystem; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - DMA engine subsystem; - DPLL subsystem; - FireWire subsystem; - EFI core; - Qualcomm firmware drivers; - GPIO subsystem; - GPU drivers; - Microsoft Hyper-V drivers; - InfiniBand drivers; - IOMMU subsystem; - IRQ chip drivers; - Macintosh device drivers; - Multiple devices driver; - Media drivers; - EEPROM drivers; - MMC subsystem; - Network drivers; - STMicroelectronics network drivers; - Device tree and open firmware driver; - HiSilicon SoC PMU drivers; - PHY drivers; - Pin controllers subsystem; - Remote Processor subsystem; - S/390 drivers; - SCSI drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - Userspace I/O drivers; - USB subsystem; - DesignWare USB3 driver; - ACRN Hypervisor Service Module driver; - Virtio drivers; - 9P distributed file system; - BTRFS file system; - eCrypt file system; - EROFS file system; - File systems infrastructure; - GFS2 file system; - JFFS2 file system; - Network file systems library; - Network file system client; - Network file system server daemon; - NILFS2 file system; - Proc file system; - SMB network file system; - Tracing file system; - Mellanox drivers; - Memory management; - Socket messages infrastructure; - Slab allocator; - Tracing infrastructure; - User-space API (UAPI); - Core kernel; - BPF subsystem; - DMA mapping infrastructure; - RCU subsystem; - Dynamic debug library; - KUnit library; - Maple Tree data structure library; - Heterogeneous memory management; - Amateur Radio drivers; - Bluetooth subsystem; - Ethernet bridge; - Networking core; - IPv4 networking; - IPv6 networking; - Multipath TCP; - Netfilter; - NET/ROM layer; - NFC subsystem; - NSH protocol; - Open vSwitch; - Phonet protocol; - SMC sockets; - TIPC protocol; - Unix domain sockets; - Wireless networking; - Key management; - ALSA framework; - HD-audio driver; - Kirkwood ASoC drivers; - MediaTek ASoC drivers; (CVE-2024-35987, CVE-2024-36931, CVE-2024-38614, CVE-2024-35857, CVE-2024-36949, CVE-2024-38599, CVE-2024-35994, CVE-2024-35849, CVE-2024-36916, CVE-2024-38590, CVE-2024-36944, CVE-2024-38561, CVE-2024-38538, CVE-2024-36017, CVE-2024-38593, CVE-2024-36028, CVE-2024-36960, CVE-2024-36002, CVE-2024-36967, CVE-2024-36898, CVE-2024-35989, CVE-2024-36975, CVE-2024-38578, CVE-2024-38582, CVE-2024-38588, CVE-2024-38579, CVE-2024-38617, CVE-2024-36901, CVE-2024-38550, CVE-2023-52882, CVE-2024-38603, CVE-2024-38620, CVE-2024-36956, CVE-2024-36880, CVE-2024-36895, CVE-2024-36979, CVE-2024-36887, CVE-2024-27396, CVE-2024-27400, CVE-2024-36952, CVE-2024-36886, CVE-2024-36905, CVE-2024-36883, CVE-2024-38540, CVE-2024-38605, CVE-2024-36029, CVE-2024-36934, CVE-2024-27395, CVE-2024-36000, CVE-2024-38549, CVE-2024-35999, CVE-2024-38585, CVE-2024-38589, CVE-2024-38565, CVE-2024-36917, CVE-2024-36930, CVE-2024-36940, CVE-2024-36900, CVE-2024-35850, CVE-2024-38592, CVE-2024-38553, CVE-2024-36929, CVE-2024-36915, CVE-2024-36004, CVE-2024-38573, CVE-2024-36941, CVE-2024-38607, CVE-2024-36009, CVE-2024-27398, CVE-2024-36909, CVE-2024-35848, CVE-2024-36950, CVE-2024-38564, CVE-2024-36947, CVE-2024-38613, CVE-2024-38570, CVE-2024-38612, CVE-2024-38580, CVE-2024-38557, CVE-2024-36959, CVE-2024-27399, CVE-2024-41011, CVE-2024-36928, CVE-2024-38543, CVE-2024-38541, CVE-2024-38583, CVE-2024-35855, CVE-2024-38611, CVE-2024-36891, CVE-2024-38587, CVE-2024-35851, CVE-2024-38546, CVE-2024-38596, CVE-2024-35998, CVE-2024-35991, CVE-2024-36965, CVE-2024-36925, CVE-2024-36894, CVE-2024-38567, CVE-2024-38572, CVE-2024-36882, CVE-2024-38594, CVE-2024-38563, CVE-2024-38616, CVE-2024-36951, CVE-2024-36005, CVE-2024-42134, CVE-2024-38602, CVE-2024-36014, CVE-2024-38601, CVE-2024-36001, CVE-2024-38575, CVE-2024-27401, CVE-2024-36961, CVE-2024-38576, CVE-2024-36935, CVE-2024-36893, CVE-2024-38562, CVE-2024-36904, CVE-2024-36939, CVE-2024-38591, CVE-2024-38539, CVE-2024-36030, CVE-2024-36920, CVE-2024-39482, CVE-2024-36977, CVE-2024-36013, CVE-2024-35856, CVE-2024-36922, CVE-2024-36033, CVE-2024-35859, CVE-2024-36919, CVE-2024-35846, CVE-2024-36913, CVE-2024-35854, CVE-2024-36924, CVE-2024-38547, CVE-2024-38551, CVE-2024-36899, CVE-2024-36932, CVE-2024-38545, CVE-2024-36966, CVE-2024-36911, CVE-2024-36946, CVE-2024-36906, CVE-2024-38595, CVE-2024-36012, CVE-2024-38552, CVE-2024-36933, CVE-2024-36936, CVE-2024-38548, CVE-2024-38558, CVE-2024-36006, CVE-2024-36908, CVE-2024-36892, CVE-2024-35988, CVE-2024-35993, CVE-2024-36914, CVE-2024-36896, CVE-2024-38615, CVE-2024-36890, CVE-2024-36969, CVE-2024-38559, CVE-2024-36964, CVE-2024-38560, CVE-2024-38574, CVE-2024-36962, CVE-2024-38542, CVE-2024-36926, CVE-2024-36968, CVE-2024-36032, CVE-2024-38544, CVE-2024-36938, CVE-2024-38597, CVE-2024-38577, CVE-2024-36958, CVE-2024-36945, CVE-2024-36943, CVE-2024-38610, CVE-2024-36927, CVE-2024-38554, CVE-2024-38555, CVE-2024-36031, CVE-2024-36011, CVE-2024-38569, CVE-2024-35847, CVE-2024-36921, CVE-2024-38606, CVE-2024-35949, CVE-2024-35947, CVE-2024-36889, CVE-2024-36884, CVE-2024-36954, CVE-2024-36902, CVE-2024-36007, CVE-2024-38586, CVE-2024-36918, CVE-2024-38571, CVE-2024-36955, CVE-2024-36888, CVE-2024-38556, CVE-2024-38604, CVE-2024-27394, CVE-2024-38600, CVE-2024-35983, CVE-2024-38568, CVE-2024-38566, CVE-2024-35853, CVE-2024-35858, CVE-2024-36910, CVE-2024-36903, CVE-2024-36881, CVE-2024-36937, CVE-2024-36957, CVE-2024-36912, CVE-2024-36948, CVE-2024-36953, CVE-2024-35996, CVE-2024-36963, CVE-2024-36923, CVE-2024-35852, CVE-2024-38598, CVE-2024-36003, CVE-2024-35986, CVE-2024-38584) Update Instructions: Run `sudo pro fix USN-6955-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1010-oem - 6.8.0-1010.10 linux-headers-6.8.0-1010-oem - 6.8.0-1010.10 linux-headers-oem-24.04 - 6.8.0-1010.10 linux-headers-oem-24.04a - 6.8.0-1010.10 linux-image-6.8.0-1010-oem - 6.8.0-1010.10 linux-image-oem-24.04 - 6.8.0-1010.10 linux-image-oem-24.04a - 6.8.0-1010.10 linux-image-uc-6.8.0-1010-oem - 6.8.0-1010.10 linux-image-uc-oem-24.04 - 6.8.0-1010.10 linux-image-uc-oem-24.04a - 6.8.0-1010.10 linux-image-unsigned-6.8.0-1010-oem - 6.8.0-1010.10 linux-modules-6.8.0-1010-oem - 6.8.0-1010.10 linux-modules-ipu6-6.8.0-1010-oem - 6.8.0-1010.10 linux-modules-ipu6-oem-24.04 - 6.8.0-1010.10 linux-modules-ipu6-oem-24.04a - 6.8.0-1010.10 linux-modules-iwlwifi-6.8.0-1010-oem - 6.8.0-1010.10 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1010.10 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1010.10 linux-modules-usbio-6.8.0-1010-oem - 6.8.0-1010.10 linux-modules-usbio-oem-24.04 - 6.8.0-1010.10 linux-modules-usbio-oem-24.04a - 6.8.0-1010.10 linux-oem-24.04 - 6.8.0-1010.10 linux-oem-24.04a - 6.8.0-1010.10 linux-oem-6.8-headers-6.8.0-1010 - 6.8.0-1010.10 linux-oem-6.8-tools-6.8.0-1010 - 6.8.0-1010.10 linux-tools-6.8.0-1010-oem - 6.8.0-1010.10 linux-tools-oem-24.04 - 6.8.0-1010.10 linux-tools-oem-24.04a - 6.8.0-1010.10 No subscription required High CVE-2023-52882 CVE-2024-27394 CVE-2024-27395 CVE-2024-27396 CVE-2024-27398 CVE-2024-27399 CVE-2024-27400 CVE-2024-27401 CVE-2024-35846 CVE-2024-35847 CVE-2024-35848 CVE-2024-35849 CVE-2024-35850 CVE-2024-35851 CVE-2024-35852 CVE-2024-35853 CVE-2024-35854 CVE-2024-35855 CVE-2024-35856 CVE-2024-35857 CVE-2024-35858 CVE-2024-35859 CVE-2024-35947 CVE-2024-35949 CVE-2024-35983 CVE-2024-35986 CVE-2024-35987 CVE-2024-35988 CVE-2024-35989 CVE-2024-35991 CVE-2024-35993 CVE-2024-35994 CVE-2024-35996 CVE-2024-35998 CVE-2024-35999 CVE-2024-36000 CVE-2024-36001 CVE-2024-36002 CVE-2024-36003 CVE-2024-36004 CVE-2024-36005 CVE-2024-36006 CVE-2024-36007 CVE-2024-36009 CVE-2024-36011 CVE-2024-36012 CVE-2024-36013 CVE-2024-36014 CVE-2024-36017 CVE-2024-36028 CVE-2024-36029 CVE-2024-36030 CVE-2024-36031 CVE-2024-36032 CVE-2024-36033 CVE-2024-36880 CVE-2024-36881 CVE-2024-36882 CVE-2024-36883 CVE-2024-36884 CVE-2024-36886 CVE-2024-36887 CVE-2024-36888 CVE-2024-36889 CVE-2024-36890 CVE-2024-36891 CVE-2024-36892 CVE-2024-36893 CVE-2024-36894 CVE-2024-36895 CVE-2024-36896 CVE-2024-36898 CVE-2024-36899 CVE-2024-36900 CVE-2024-36901 CVE-2024-36902 CVE-2024-36903 CVE-2024-36904 CVE-2024-36905 CVE-2024-36906 CVE-2024-36908 CVE-2024-36909 CVE-2024-36910 CVE-2024-36911 CVE-2024-36912 CVE-2024-36913 CVE-2024-36914 CVE-2024-36915 CVE-2024-36916 CVE-2024-36917 CVE-2024-36918 CVE-2024-36919 CVE-2024-36920 CVE-2024-36921 CVE-2024-36922 CVE-2024-36923 CVE-2024-36924 CVE-2024-36925 CVE-2024-36926 CVE-2024-36927 CVE-2024-36928 CVE-2024-36929 CVE-2024-36930 CVE-2024-36931 CVE-2024-36932 CVE-2024-36933 CVE-2024-36934 CVE-2024-36935 CVE-2024-36936 CVE-2024-36937 CVE-2024-36938 CVE-2024-36939 CVE-2024-36940 CVE-2024-36941 CVE-2024-36943 CVE-2024-36944 CVE-2024-36945 CVE-2024-36946 CVE-2024-36947 CVE-2024-36948 CVE-2024-36949 CVE-2024-36950 CVE-2024-36951 CVE-2024-36952 CVE-2024-36953 CVE-2024-36954 CVE-2024-36955 CVE-2024-36956 CVE-2024-36957 CVE-2024-36958 CVE-2024-36959 CVE-2024-36960 CVE-2024-36961 CVE-2024-36962 CVE-2024-36963 CVE-2024-36964 CVE-2024-36965 CVE-2024-36966 CVE-2024-36967 CVE-2024-36968 CVE-2024-36969 CVE-2024-36975 CVE-2024-36977 CVE-2024-36979 CVE-2024-38538 CVE-2024-38539 CVE-2024-38540 CVE-2024-38541 CVE-2024-38542 CVE-2024-38543 CVE-2024-38544 CVE-2024-38545 CVE-2024-38546 CVE-2024-38547 CVE-2024-38548 CVE-2024-38549 CVE-2024-38550 CVE-2024-38551 CVE-2024-38552 CVE-2024-38553 CVE-2024-38554 CVE-2024-38555 CVE-2024-38556 CVE-2024-38557 CVE-2024-38558 CVE-2024-38559 CVE-2024-38560 CVE-2024-38561 CVE-2024-38562 CVE-2024-38563 CVE-2024-38564 CVE-2024-38565 CVE-2024-38566 CVE-2024-38567 CVE-2024-38568 CVE-2024-38569 CVE-2024-38570 CVE-2024-38571 CVE-2024-38572 CVE-2024-38573 CVE-2024-38574 CVE-2024-38575 CVE-2024-38576 CVE-2024-38577 CVE-2024-38578 CVE-2024-38579 CVE-2024-38580 CVE-2024-38582 CVE-2024-38583 CVE-2024-38584 CVE-2024-38585 CVE-2024-38586 CVE-2024-38587 CVE-2024-38588 CVE-2024-38589 CVE-2024-38590 CVE-2024-38591 CVE-2024-38592 CVE-2024-38593 CVE-2024-38594 CVE-2024-38595 CVE-2024-38596 CVE-2024-38597 CVE-2024-38598 CVE-2024-38599 CVE-2024-38600 CVE-2024-38601 CVE-2024-38602 CVE-2024-38603 CVE-2024-38604 CVE-2024-38605 CVE-2024-38606 CVE-2024-38607 CVE-2024-38610 CVE-2024-38611 CVE-2024-38612 CVE-2024-38613 CVE-2024-38614 CVE-2024-38615 CVE-2024-38616 CVE-2024-38617 CVE-2024-38620 CVE-2024-39482 CVE-2024-41011 CVE-2024-42134 USN-6959-1 -- .NET vulnerability Ubuntu 24.04 LTS It was discovered that .NET suffered from an information disclosure vulnerability. An attacker could potentially use this issue to read targeted email messages. Update Instructions: Run `sudo pro fix USN-6959-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: dotnet-sdk-8.0 - 8.0.108-0ubuntu1~24.04.1 dotnet-sdk-8.0-source-built-artifacts - 8.0.108-0ubuntu1~24.04.1 dotnet-sdk-dbg-8.0 - 8.0.108-0ubuntu1~24.04.1 dotnet-templates-8.0 - 8.0.108-0ubuntu1~24.04.1 netstandard-targeting-pack-2.1-8.0 - 8.0.108-0ubuntu1~24.04.1 No subscription required dotnet8 - 8.0.108-8.0.8-0ubuntu1~24.04.1 No subscription required aspnetcore-runtime-8.0 - 8.0.8-0ubuntu1~24.04.1 aspnetcore-runtime-dbg-8.0 - 8.0.8-0ubuntu1~24.04.1 aspnetcore-targeting-pack-8.0 - 8.0.8-0ubuntu1~24.04.1 dotnet-apphost-pack-8.0 - 8.0.8-0ubuntu1~24.04.1 dotnet-host-8.0 - 8.0.8-0ubuntu1~24.04.1 dotnet-hostfxr-8.0 - 8.0.8-0ubuntu1~24.04.1 dotnet-runtime-8.0 - 8.0.8-0ubuntu1~24.04.1 dotnet-runtime-dbg-8.0 - 8.0.8-0ubuntu1~24.04.1 dotnet-targeting-pack-8.0 - 8.0.8-0ubuntu1~24.04.1 No subscription required Medium CVE-2024-38167 USN-6961-1 -- BusyBox vulnerabilities Ubuntu 24.04 LTS It was discovered that BusyBox did not properly validate user input when performing certain arithmetic operations. If a user or automated system were tricked into processing a specially crafted file, an attacker could possibly use this issue to cause a denial of service, or execute arbitrary code. (CVE-2022-48174) It was discovered that BusyBox incorrectly managed memory when evaluating certain awk expressions. An attacker could possibly use this issue to cause a denial of service, or execute arbitrary code. This issue only affected Ubuntu 24.04 LTS. (CVE-2023-42363, CVE-2023-42364, CVE-2023-42365) Update Instructions: Run `sudo pro fix USN-6961-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: busybox - 1:1.36.1-6ubuntu3.1 busybox-initramfs - 1:1.36.1-6ubuntu3.1 busybox-static - 1:1.36.1-6ubuntu3.1 busybox-syslogd - 1:1.36.1-6ubuntu3.1 udhcpc - 1:1.36.1-6ubuntu3.1 udhcpd - 1:1.36.1-6ubuntu3.1 No subscription required Medium CVE-2022-48174 CVE-2023-42363 CVE-2023-42364 CVE-2023-42365 USN-6962-1 -- LibreOffice vulnerability Ubuntu 24.04 LTS It was discovered that LibreOffice incorrectly allowed users to enable macros when a cryptographic signature failed to validate. If a user were tricked into opening a specially crafted document, a remote attacker could possibly execute arbitrary macros. Update Instructions: Run `sudo pro fix USN-6962-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libreoffice-nlpsolver - 4:0.9+LibO24.2.5-0ubuntu0.24.04.2 No subscription required libreoffice-wiki-publisher - 4:1.2.0+LibO24.2.5-0ubuntu0.24.04.2 No subscription required fonts-opensymbol - 4:102.12+LibO24.2.5-0ubuntu0.24.04.2 No subscription required gir1.2-lokdocview-0.1 - 4:24.2.5-0ubuntu0.24.04.2 libjuh-java - 4:24.2.5-0ubuntu0.24.04.2 libjurt-java - 4:24.2.5-0ubuntu0.24.04.2 liblibreoffice-java - 4:24.2.5-0ubuntu0.24.04.2 liblibreofficekitgtk - 4:24.2.5-0ubuntu0.24.04.2 libofficebean-java - 4:24.2.5-0ubuntu0.24.04.2 libreoffice - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-base - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-base-core - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-base-drivers - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-base-nogui - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-calc - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-calc-nogui - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-common - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-core - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-core-nogui - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-dev - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-dev-common - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-dev-doc - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-dev-gui - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-draw - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-draw-nogui - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-evolution - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-gnome - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-gtk3 - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-gtk4 - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-ca - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-common - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-cs - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-da - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-de - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-dz - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-el - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-en-gb - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-en-us - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-es - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-et - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-eu - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-fi - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-fr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-gl - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-hi - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-hu - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-id - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-it - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-ja - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-km - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-ko - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-nl - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-om - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-pl - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-pt - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-pt-br - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-ru - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-sk - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-sl - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-sv - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-tr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-vi - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-zh-cn - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-zh-tw - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-impress - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-impress-nogui - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-java-common - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-kf5 - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-af - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-am - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ar - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-as - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ast - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-be - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-bg - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-bn - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-br - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-bs - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ca - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-cs - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-cy - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-da - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-de - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-dz - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-el - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-en-gb - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-en-za - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-eo - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-es - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-et - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-eu - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-fa - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-fi - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-fr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ga - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-gd - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-gl - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-gu - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-gug - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-he - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-hi - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-hr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-hu - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-hy - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-id - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-in - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-is - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-it - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ja - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ka - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-kk - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-km - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-kmr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-kn - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ko - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-lt - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-lv - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-mk - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ml - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-mn - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-mr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-nb - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ne - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-nl - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-nn - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-nr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-nso - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-oc - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-om - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-or - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-pa-in - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-pl - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-pt - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-pt-br - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ro - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ru - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-rw - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-si - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-sk - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-sl - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-sr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ss - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-st - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-sv - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-szl - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ta - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-te - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-tg - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-th - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-tn - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-tr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ts - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ug - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-uk - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-uz - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ve - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-vi - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-xh - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-za - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-zh-cn - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-zh-tw - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-zu - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-librelogo - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-math - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-math-nogui - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-nogui - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-officebean - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-plasma - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-qt5 - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-qt6 - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-report-builder - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-report-builder-bin - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-report-builder-bin-nogui - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-script-provider-bsh - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-script-provider-js - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-script-provider-python - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-sdbc-firebird - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-sdbc-hsqldb - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-sdbc-mysql - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-sdbc-postgresql - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-smoketest-data - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-style-breeze - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-style-colibre - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-style-elementary - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-style-karasa-jaga - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-style-sifr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-style-sukapura - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-style-tango - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-style-yaru - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-subsequentcheckbase - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-uiconfig-base - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-uiconfig-calc - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-uiconfig-common - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-uiconfig-draw - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-uiconfig-impress - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-uiconfig-math - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-uiconfig-report-builder - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-uiconfig-writer - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-writer - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-writer-nogui - 4:24.2.5-0ubuntu0.24.04.2 libreofficekit-data - 4:24.2.5-0ubuntu0.24.04.2 libreofficekit-dev - 4:24.2.5-0ubuntu0.24.04.2 libridl-java - 4:24.2.5-0ubuntu0.24.04.2 libuno-cppu3t64 - 4:24.2.5-0ubuntu0.24.04.2 libuno-cppuhelpergcc3-3t64 - 4:24.2.5-0ubuntu0.24.04.2 libuno-purpenvhelpergcc3-3t64 - 4:24.2.5-0ubuntu0.24.04.2 libuno-sal3t64 - 4:24.2.5-0ubuntu0.24.04.2 libuno-salhelpergcc3-3t64 - 4:24.2.5-0ubuntu0.24.04.2 libunoil-java - 4:24.2.5-0ubuntu0.24.04.2 libunoloader-java - 4:24.2.5-0ubuntu0.24.04.2 python3-access2base - 4:24.2.5-0ubuntu0.24.04.2 python3-scriptforge - 4:24.2.5-0ubuntu0.24.04.2 python3-uno - 4:24.2.5-0ubuntu0.24.04.2 uno-libs-private - 4:24.2.5-0ubuntu0.24.04.2 ure - 4:24.2.5-0ubuntu0.24.04.2 ure-java - 4:24.2.5-0ubuntu0.24.04.2 No subscription required Medium CVE-2024-6472 USN-6963-1 -- GNOME Shell vulnerability Ubuntu 24.04 LTS It was discovered that GNOME Shell incorrectly opened the portal helper automatically when detecting a captive network portal. A remote attacker could possibly use this issue to load arbitrary web pages containing JavaScript, leading to resource consumption or other attacks. Update Instructions: Run `sudo pro fix USN-6963-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gnome-shell - 46.0-0ubuntu6~24.04.3 gnome-shell-common - 46.0-0ubuntu6~24.04.3 gnome-shell-extension-prefs - 46.0-0ubuntu6~24.04.3 No subscription required Medium CVE-2024-36472 USN-6964-1 -- ORC vulnerability Ubuntu 24.04 LTS Noriko Totsuka discovered that ORC incorrectly handled certain crafted file. An attacker could possibly use this issue to execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6964-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: liborc-0.4-0t64 - 1:0.4.38-1ubuntu0.1 liborc-0.4-dev - 1:0.4.38-1ubuntu0.1 liborc-0.4-dev-bin - 1:0.4.38-1ubuntu0.1 liborc-0.4-doc - 1:0.4.38-1ubuntu0.1 No subscription required Medium CVE-2024-40897 USN-6967-1 -- Intel Microcode vulnerabilities Ubuntu 24.04 LTS It was discovered that some Intel® Core™ Ultra Processors did not properly isolate the stream cache. A local authenticated user could potentially use this to escalate their privileges. (CVE-2023-42667) It was discovered that some Intel® Processors did not properly isolate the stream cache. A local authenticated user could potentially use this to escalate their privileges. (CVE-2023-49141) It was discovered that some Intel® Processors did not correctly transition between the executive monitor and SMI transfer monitor (STM). A privileged local attacker could use this to escalate their privileges. (CVE-2024-24853) It was discovered that some 3rd, 4th, and 5th Generation Intel® Xeon® Processors failed to properly implement a protection mechanism. A local attacker could use this to potentially escalate their privileges. (CVE-2024-24980) It was discovered that some 3rd Generation Intel Xeon Scalable Processors did not properly handle mirrored regions with different values. A privileged local user could use this to cause a denial of service (system crash). (CVE-2024-25939) Update Instructions: Run `sudo pro fix USN-6967-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: intel-microcode - 3.20240813.0ubuntu0.24.04.2 No subscription required Medium CVE-2023-42667 CVE-2023-49141 CVE-2024-24853 CVE-2024-24980 CVE-2024-25939 USN-6968-1 -- PostgreSQL vulnerability Ubuntu 24.04 LTS Noah Misch discovered that PostgreSQL incorrectly handled certain SQL objects. An attacker could possibly use this issue to execute arbitrary SQL functions as the superuser. Update Instructions: Run `sudo pro fix USN-6968-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libecpg-compat3 - 16.4-0ubuntu0.24.04.1 libecpg-dev - 16.4-0ubuntu0.24.04.1 libecpg6 - 16.4-0ubuntu0.24.04.1 libpgtypes3 - 16.4-0ubuntu0.24.04.1 libpq-dev - 16.4-0ubuntu0.24.04.1 libpq5 - 16.4-0ubuntu0.24.04.1 postgresql-16 - 16.4-0ubuntu0.24.04.1 postgresql-client-16 - 16.4-0ubuntu0.24.04.1 postgresql-doc-16 - 16.4-0ubuntu0.24.04.1 postgresql-plperl-16 - 16.4-0ubuntu0.24.04.1 postgresql-plpython3-16 - 16.4-0ubuntu0.24.04.1 postgresql-pltcl-16 - 16.4-0ubuntu0.24.04.1 postgresql-server-dev-16 - 16.4-0ubuntu0.24.04.1 No subscription required Medium CVE-2024-7348 USN-6969-1 -- Cacti vulnerabilities Ubuntu 24.04 LTS It was discovered that Cacti did not properly apply checks to the "Package Import" feature. An attacker could possibly use this issue to perform arbitrary code execution. This issue only affected Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS and Ubuntu 18.04 LTS. (CVE-2024-25641) It was discovered that Cacti did not properly sanitize values when using javascript based API. A remote attacker could possibly use this issue to inject arbitrary javascript code resulting into cross-site scripting vulnerability. This issue only affected Ubuntu 24.04 LTS. (CVE-2024-29894) It was discovered that Cacti did not properly sanitize values when managing data queries. A remote attacker could possibly use this issue to inject arbitrary javascript code resulting into cross-site scripting vulnerability. (CVE-2024-31443) It was discovered that Cacti did not properly sanitize values when reading tree rules with Automation API. A remote attacker could possibly use this issue to inject arbitrary javascript code resulting into cross-site scripting vulnerability. (CVE-2024-31444) It was discovered that Cacti did not properly sanitize "get_request_var('filter')" values in the "api_automation.php" file. A remote attacker could possibly use this issue to perform SQL injection attacks. This issue only affected Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS and Ubuntu 18.04 LTS. (CVE-2024-31445) It was discovered that Cacti did not properly sanitize data stored in "form_save()" function in the "graph_template_inputs.php" file. A remote attacker could possibly use this issue to perform SQL injection attacks. (CVE-2024-31458) It was discovered that Cacti did not properly validate the file urls from the lib/plugin.php file. An attacker could possibly use this issue to perform arbitrary code execution. (CVE-2024-31459) It was discovered that Cacti did not properly validate the data stored in the "automation_tree_rules.php". A remote attacker could possibly use this issue to perform SQL injection attacks. This issue only affected Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS and Ubuntu 18.04 LTS. (CVE-2024-31460) It was discovered that Cacti did not properly verify the user password. An attacker could possibly use this issue to bypass authentication mechanism. This issue only affected Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS and Ubuntu 18.04 LTS. (CVE-2024-34360) Update Instructions: Run `sudo pro fix USN-6969-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: cacti - 1.2.26+ds1-1ubuntu0.1 No subscription required Medium CVE-2024-25641 CVE-2024-29894 CVE-2024-31443 CVE-2024-31444 CVE-2024-31445 CVE-2024-31458 CVE-2024-31459 CVE-2024-31460 CVE-2024-34340 USN-6975-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - User-Mode Linux (UML); - MMC subsystem; (CVE-2024-39292, CVE-2024-39484) Update Instructions: Run `sudo pro fix USN-6975-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1009-gke - 6.8.0-1009.12 linux-gke - 6.8.0-1009.12 linux-gke-headers-6.8.0-1009 - 6.8.0-1009.12 linux-gke-tools-6.8.0-1009 - 6.8.0-1009.12 linux-headers-6.8.0-1009-gke - 6.8.0-1009.12 linux-headers-gke - 6.8.0-1009.12 linux-image-6.8.0-1009-gke - 6.8.0-1009.12 linux-image-gke - 6.8.0-1009.12 linux-image-unsigned-6.8.0-1009-gke - 6.8.0-1009.12 linux-modules-6.8.0-1009-gke - 6.8.0-1009.12 linux-modules-extra-6.8.0-1009-gke - 6.8.0-1009.12 linux-modules-iwlwifi-6.8.0-1009-gke - 6.8.0-1009.12 linux-modules-iwlwifi-gke - 6.8.0-1009.12 linux-tools-6.8.0-1009-gke - 6.8.0-1009.12 linux-tools-gke - 6.8.0-1009.12 No subscription required linux-buildinfo-6.8.0-1010-raspi - 6.8.0-1010.11 linux-headers-6.8.0-1010-raspi - 6.8.0-1010.11 linux-headers-raspi - 6.8.0-1010.11 linux-image-6.8.0-1010-raspi - 6.8.0-1010.11 linux-image-raspi - 6.8.0-1010.11 linux-modules-6.8.0-1010-raspi - 6.8.0-1010.11 linux-raspi - 6.8.0-1010.11 linux-raspi-headers-6.8.0-1010 - 6.8.0-1010.11 linux-raspi-tools-6.8.0-1010 - 6.8.0-1010.11 linux-tools-6.8.0-1010-raspi - 6.8.0-1010.11 linux-tools-raspi - 6.8.0-1010.11 No subscription required linux-buildinfo-6.8.0-1011-ibm - 6.8.0-1011.11 linux-buildinfo-6.8.0-1011-oem - 6.8.0-1011.11 linux-buildinfo-6.8.0-1011-oracle - 6.8.0-1011.11 linux-buildinfo-6.8.0-1011-oracle-64k - 6.8.0-1011.11 linux-headers-6.8.0-1011-ibm - 6.8.0-1011.11 linux-headers-6.8.0-1011-oem - 6.8.0-1011.11 linux-headers-6.8.0-1011-oracle - 6.8.0-1011.11 linux-headers-6.8.0-1011-oracle-64k - 6.8.0-1011.11 linux-headers-ibm - 6.8.0-1011.11 linux-headers-ibm-classic - 6.8.0-1011.11 linux-headers-ibm-lts-24.04 - 6.8.0-1011.11 linux-headers-oem-24.04 - 6.8.0-1011.11 linux-headers-oem-24.04a - 6.8.0-1011.11 linux-headers-oracle - 6.8.0-1011.11 linux-headers-oracle-64k - 6.8.0-1011.11 linux-ibm - 6.8.0-1011.11 linux-ibm-classic - 6.8.0-1011.11 linux-ibm-cloud-tools-common - 6.8.0-1011.11 linux-ibm-headers-6.8.0-1011 - 6.8.0-1011.11 linux-ibm-lts-24.04 - 6.8.0-1011.11 linux-ibm-source-6.8.0 - 6.8.0-1011.11 linux-ibm-tools-6.8.0-1011 - 6.8.0-1011.11 linux-image-6.8.0-1011-ibm - 6.8.0-1011.11 linux-image-6.8.0-1011-oem - 6.8.0-1011.11 linux-image-6.8.0-1011-oracle - 6.8.0-1011.11 linux-image-6.8.0-1011-oracle-64k - 6.8.0-1011.11 linux-image-ibm - 6.8.0-1011.11 linux-image-ibm-classic - 6.8.0-1011.11 linux-image-ibm-lts-24.04 - 6.8.0-1011.11 linux-image-oem-24.04 - 6.8.0-1011.11 linux-image-oem-24.04a - 6.8.0-1011.11 linux-image-oracle - 6.8.0-1011.11 linux-image-oracle-64k - 6.8.0-1011.11 linux-image-uc-6.8.0-1011-oem - 6.8.0-1011.11 linux-image-uc-oem-24.04 - 6.8.0-1011.11 linux-image-uc-oem-24.04a - 6.8.0-1011.11 linux-image-unsigned-6.8.0-1011-ibm - 6.8.0-1011.11 linux-image-unsigned-6.8.0-1011-oem - 6.8.0-1011.11 linux-image-unsigned-6.8.0-1011-oracle - 6.8.0-1011.11 linux-image-unsigned-6.8.0-1011-oracle-64k - 6.8.0-1011.11 linux-modules-6.8.0-1011-ibm - 6.8.0-1011.11 linux-modules-6.8.0-1011-oem - 6.8.0-1011.11 linux-modules-6.8.0-1011-oracle - 6.8.0-1011.11 linux-modules-6.8.0-1011-oracle-64k - 6.8.0-1011.11 linux-modules-extra-6.8.0-1011-ibm - 6.8.0-1011.11 linux-modules-extra-6.8.0-1011-oracle - 6.8.0-1011.11 linux-modules-extra-6.8.0-1011-oracle-64k - 6.8.0-1011.11 linux-modules-ipu6-6.8.0-1011-oem - 6.8.0-1011.11 linux-modules-ipu6-oem-24.04 - 6.8.0-1011.11 linux-modules-ipu6-oem-24.04a - 6.8.0-1011.11 linux-modules-iwlwifi-6.8.0-1011-ibm - 6.8.0-1011.11 linux-modules-iwlwifi-6.8.0-1011-oem - 6.8.0-1011.11 linux-modules-iwlwifi-6.8.0-1011-oracle - 6.8.0-1011.11 linux-modules-iwlwifi-ibm - 6.8.0-1011.11 linux-modules-iwlwifi-ibm-classic - 6.8.0-1011.11 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1011.11 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1011.11 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1011.11 linux-modules-iwlwifi-oracle - 6.8.0-1011.11 linux-modules-usbio-6.8.0-1011-oem - 6.8.0-1011.11 linux-modules-usbio-oem-24.04 - 6.8.0-1011.11 linux-modules-usbio-oem-24.04a - 6.8.0-1011.11 linux-oem-24.04 - 6.8.0-1011.11 linux-oem-24.04a - 6.8.0-1011.11 linux-oem-6.8-headers-6.8.0-1011 - 6.8.0-1011.11 linux-oem-6.8-tools-6.8.0-1011 - 6.8.0-1011.11 linux-oracle - 6.8.0-1011.11 linux-oracle-64k - 6.8.0-1011.11 linux-oracle-headers-6.8.0-1011 - 6.8.0-1011.11 linux-oracle-tools-6.8.0-1011 - 6.8.0-1011.11 linux-tools-6.8.0-1011-ibm - 6.8.0-1011.11 linux-tools-6.8.0-1011-oem - 6.8.0-1011.11 linux-tools-6.8.0-1011-oracle - 6.8.0-1011.11 linux-tools-6.8.0-1011-oracle-64k - 6.8.0-1011.11 linux-tools-ibm - 6.8.0-1011.11 linux-tools-ibm-classic - 6.8.0-1011.11 linux-tools-ibm-lts-24.04 - 6.8.0-1011.11 linux-tools-oem-24.04 - 6.8.0-1011.11 linux-tools-oem-24.04a - 6.8.0-1011.11 linux-tools-oracle - 6.8.0-1011.11 linux-tools-oracle-64k - 6.8.0-1011.11 No subscription required linux-buildinfo-6.8.0-1012-nvidia - 6.8.0-1012.12 linux-buildinfo-6.8.0-1012-nvidia-64k - 6.8.0-1012.12 linux-cloud-tools-nvidia - 6.8.0-1012.12 linux-headers-6.8.0-1012-nvidia - 6.8.0-1012.12 linux-headers-6.8.0-1012-nvidia-64k - 6.8.0-1012.12 linux-headers-nvidia - 6.8.0-1012.12 linux-headers-nvidia-64k - 6.8.0-1012.12 linux-image-6.8.0-1012-nvidia - 6.8.0-1012.12 linux-image-6.8.0-1012-nvidia-64k - 6.8.0-1012.12 linux-image-nvidia - 6.8.0-1012.12 linux-image-nvidia-64k - 6.8.0-1012.12 linux-image-uc-6.8.0-1012-nvidia - 6.8.0-1012.12 linux-image-uc-6.8.0-1012-nvidia-64k - 6.8.0-1012.12 linux-image-unsigned-6.8.0-1012-nvidia - 6.8.0-1012.12 linux-image-unsigned-6.8.0-1012-nvidia-64k - 6.8.0-1012.12 linux-modules-6.8.0-1012-nvidia - 6.8.0-1012.12 linux-modules-6.8.0-1012-nvidia-64k - 6.8.0-1012.12 linux-modules-extra-6.8.0-1012-nvidia - 6.8.0-1012.12 linux-modules-nvidia-fs-6.8.0-1012-nvidia - 6.8.0-1012.12 linux-modules-nvidia-fs-6.8.0-1012-nvidia-64k - 6.8.0-1012.12 linux-modules-nvidia-fs-nvidia - 6.8.0-1012.12 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1012.12 linux-nvidia - 6.8.0-1012.12 linux-nvidia-64k - 6.8.0-1012.12 linux-nvidia-headers-6.8.0-1012 - 6.8.0-1012.12 linux-nvidia-tools-6.8.0-1012 - 6.8.0-1012.12 linux-nvidia-tools-host - 6.8.0-1012.12 linux-tools-6.8.0-1012-nvidia - 6.8.0-1012.12 linux-tools-6.8.0-1012-nvidia-64k - 6.8.0-1012.12 linux-tools-nvidia - 6.8.0-1012.12 linux-tools-nvidia-64k - 6.8.0-1012.12 No subscription required linux-buildinfo-6.8.0-1012-nvidia-lowlatency - 6.8.0-1012.12.1 linux-buildinfo-6.8.0-1012-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1012.12.1 linux-headers-6.8.0-1012-nvidia-lowlatency - 6.8.0-1012.12.1 linux-headers-6.8.0-1012-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-headers-nvidia-lowlatency - 6.8.0-1012.12.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-image-6.8.0-1012-nvidia-lowlatency - 6.8.0-1012.12.1 linux-image-6.8.0-1012-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-image-nvidia-lowlatency - 6.8.0-1012.12.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-image-uc-6.8.0-1012-nvidia-lowlatency - 6.8.0-1012.12.1 linux-image-uc-6.8.0-1012-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-image-unsigned-6.8.0-1012-nvidia-lowlatency - 6.8.0-1012.12.1 linux-image-unsigned-6.8.0-1012-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-modules-6.8.0-1012-nvidia-lowlatency - 6.8.0-1012.12.1 linux-modules-6.8.0-1012-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-modules-extra-6.8.0-1012-nvidia-lowlatency - 6.8.0-1012.12.1 linux-modules-nvidia-fs-6.8.0-1012-nvidia-lowlatency - 6.8.0-1012.12.1 linux-modules-nvidia-fs-6.8.0-1012-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1012.12.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-nvidia-lowlatency - 6.8.0-1012.12.1 linux-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-nvidia-lowlatency-headers-6.8.0-1012 - 6.8.0-1012.12.1 linux-nvidia-lowlatency-tools-6.8.0-1012 - 6.8.0-1012.12.1 linux-nvidia-lowlatency-tools-host - 6.8.0-1012.12.1 linux-tools-6.8.0-1012-nvidia-lowlatency - 6.8.0-1012.12.1 linux-tools-6.8.0-1012-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-tools-nvidia-lowlatency - 6.8.0-1012.12.1 linux-tools-nvidia-lowlatency-64k - 6.8.0-1012.12.1 No subscription required linux-buildinfo-6.8.0-1013-gcp - 6.8.0-1013.14 linux-gcp - 6.8.0-1013.14 linux-gcp-headers-6.8.0-1013 - 6.8.0-1013.14 linux-gcp-tools-6.8.0-1013 - 6.8.0-1013.14 linux-headers-6.8.0-1013-gcp - 6.8.0-1013.14 linux-headers-gcp - 6.8.0-1013.14 linux-image-6.8.0-1013-gcp - 6.8.0-1013.14 linux-image-gcp - 6.8.0-1013.14 linux-image-unsigned-6.8.0-1013-gcp - 6.8.0-1013.14 linux-modules-6.8.0-1013-gcp - 6.8.0-1013.14 linux-modules-extra-6.8.0-1013-gcp - 6.8.0-1013.14 linux-modules-extra-gcp - 6.8.0-1013.14 linux-tools-6.8.0-1013-gcp - 6.8.0-1013.14 linux-tools-gcp - 6.8.0-1013.14 No subscription required linux-azure - 6.8.0-1013.15 linux-azure-cloud-tools-6.8.0-1013 - 6.8.0-1013.15 linux-azure-fde - 6.8.0-1013.15 linux-azure-headers-6.8.0-1013 - 6.8.0-1013.15 linux-azure-tools-6.8.0-1013 - 6.8.0-1013.15 linux-buildinfo-6.8.0-1013-azure - 6.8.0-1013.15 linux-cloud-tools-6.8.0-1013-azure - 6.8.0-1013.15 linux-cloud-tools-azure - 6.8.0-1013.15 linux-headers-6.8.0-1013-azure - 6.8.0-1013.15 linux-headers-azure - 6.8.0-1013.15 linux-image-6.8.0-1013-azure - 6.8.0-1013.15 linux-image-6.8.0-1013-azure-fde - 6.8.0-1013.15 linux-image-azure - 6.8.0-1013.15 linux-image-azure-fde - 6.8.0-1013.15 linux-image-unsigned-6.8.0-1013-azure - 6.8.0-1013.15 linux-modules-6.8.0-1013-azure - 6.8.0-1013.15 linux-modules-extra-6.8.0-1013-azure - 6.8.0-1013.15 linux-modules-extra-azure - 6.8.0-1013.15 linux-modules-involflt-6.8.0-1013-azure - 6.8.0-1013.15 linux-modules-involflt-azure - 6.8.0-1013.15 linux-modules-iwlwifi-6.8.0-1013-azure - 6.8.0-1013.15 linux-modules-iwlwifi-azure - 6.8.0-1013.15 linux-tools-6.8.0-1013-azure - 6.8.0-1013.15 linux-tools-azure - 6.8.0-1013.15 No subscription required linux-aws - 6.8.0-1014.15 linux-aws-cloud-tools-6.8.0-1014 - 6.8.0-1014.15 linux-aws-headers-6.8.0-1014 - 6.8.0-1014.15 linux-aws-tools-6.8.0-1014 - 6.8.0-1014.15 linux-buildinfo-6.8.0-1014-aws - 6.8.0-1014.15 linux-cloud-tools-6.8.0-1014-aws - 6.8.0-1014.15 linux-headers-6.8.0-1014-aws - 6.8.0-1014.15 linux-headers-aws - 6.8.0-1014.15 linux-image-6.8.0-1014-aws - 6.8.0-1014.15 linux-image-aws - 6.8.0-1014.15 linux-image-unsigned-6.8.0-1014-aws - 6.8.0-1014.15 linux-modules-6.8.0-1014-aws - 6.8.0-1014.15 linux-modules-extra-6.8.0-1014-aws - 6.8.0-1014.15 linux-modules-extra-aws - 6.8.0-1014.15 linux-tools-6.8.0-1014-aws - 6.8.0-1014.15 linux-tools-aws - 6.8.0-1014.15 No subscription required linux-buildinfo-6.8.0-41-generic - 6.8.0-41.41 linux-buildinfo-6.8.0-41-generic-64k - 6.8.0-41.41 linux-cloud-tools-6.8.0-41 - 6.8.0-41.41 linux-cloud-tools-6.8.0-41-generic - 6.8.0-41.41 linux-cloud-tools-common - 6.8.0-41.41 linux-cloud-tools-generic - 6.8.0-41.41 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-41.41 linux-cloud-tools-generic-hwe-24.04-edge - 6.8.0-41.41 linux-cloud-tools-virtual - 6.8.0-41.41 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-41.41 linux-cloud-tools-virtual-hwe-24.04-edge - 6.8.0-41.41 linux-crashdump - 6.8.0-41.41 linux-doc - 6.8.0-41.41 linux-generic - 6.8.0-41.41 linux-generic-64k - 6.8.0-41.41 linux-generic-64k-hwe-24.04 - 6.8.0-41.41 linux-generic-64k-hwe-24.04-edge - 6.8.0-41.41 linux-generic-hwe-24.04 - 6.8.0-41.41 linux-generic-hwe-24.04-edge - 6.8.0-41.41 linux-generic-lpae - 6.8.0-41.41 linux-headers-6.8.0-41 - 6.8.0-41.41 linux-headers-6.8.0-41-generic - 6.8.0-41.41 linux-headers-6.8.0-41-generic-64k - 6.8.0-41.41 linux-headers-generic - 6.8.0-41.41 linux-headers-generic-64k - 6.8.0-41.41 linux-headers-generic-64k-hwe-24.04 - 6.8.0-41.41 linux-headers-generic-64k-hwe-24.04-edge - 6.8.0-41.41 linux-headers-generic-hwe-24.04 - 6.8.0-41.41 linux-headers-generic-hwe-24.04-edge - 6.8.0-41.41 linux-headers-generic-lpae - 6.8.0-41.41 linux-headers-kvm - 6.8.0-41.41 linux-headers-laptop-23.10 - 6.8.0-41.41 linux-headers-oem-20.04 - 6.8.0-41.41 linux-headers-oem-20.04b - 6.8.0-41.41 linux-headers-oem-20.04c - 6.8.0-41.41 linux-headers-oem-20.04d - 6.8.0-41.41 linux-headers-oem-22.04 - 6.8.0-41.41 linux-headers-virtual - 6.8.0-41.41 linux-headers-virtual-hwe-24.04 - 6.8.0-41.41 linux-headers-virtual-hwe-24.04-edge - 6.8.0-41.41 linux-image-6.8.0-41-generic - 6.8.0-41.41 linux-image-6.8.0-41-generic-64k - 6.8.0-41.41 linux-image-extra-virtual - 6.8.0-41.41 linux-image-extra-virtual-hwe-24.04 - 6.8.0-41.41 linux-image-extra-virtual-hwe-24.04-edge - 6.8.0-41.41 linux-image-generic - 6.8.0-41.41 linux-image-generic-64k - 6.8.0-41.41 linux-image-generic-64k-hwe-24.04 - 6.8.0-41.41 linux-image-generic-64k-hwe-24.04-edge - 6.8.0-41.41 linux-image-generic-hwe-24.04 - 6.8.0-41.41 linux-image-generic-hwe-24.04-edge - 6.8.0-41.41 linux-image-generic-lpae - 6.8.0-41.41 linux-image-kvm - 6.8.0-41.41 linux-image-laptop-23.10 - 6.8.0-41.41 linux-image-oem-20.04 - 6.8.0-41.41 linux-image-oem-20.04b - 6.8.0-41.41 linux-image-oem-20.04c - 6.8.0-41.41 linux-image-oem-20.04d - 6.8.0-41.41 linux-image-oem-22.04 - 6.8.0-41.41 linux-image-uc-6.8.0-41-generic - 6.8.0-41.41 linux-image-uc-6.8.0-41-generic-64k - 6.8.0-41.41 linux-image-uc-generic - 6.8.0-41.41 linux-image-uc-generic-hwe-24.04 - 6.8.0-41.41 linux-image-uc-generic-hwe-24.04-edge - 6.8.0-41.41 linux-image-unsigned-6.8.0-41-generic - 6.8.0-41.41 linux-image-unsigned-6.8.0-41-generic-64k - 6.8.0-41.41 linux-image-virtual - 6.8.0-41.41 linux-image-virtual-hwe-24.04 - 6.8.0-41.41 linux-image-virtual-hwe-24.04-edge - 6.8.0-41.41 linux-kvm - 6.8.0-41.41 linux-laptop-23.10 - 6.8.0-41.41 linux-lib-rust-6.8.0-41-generic - 6.8.0-41.41 linux-libc-dev - 6.8.0-41.41 linux-modules-6.8.0-41-generic - 6.8.0-41.41 linux-modules-6.8.0-41-generic-64k - 6.8.0-41.41 linux-modules-extra-6.8.0-41-generic - 6.8.0-41.41 linux-modules-ipu6-6.8.0-41-generic - 6.8.0-41.41 linux-modules-ipu6-generic - 6.8.0-41.41 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-41.41 linux-modules-ipu6-generic-hwe-24.04-edge - 6.8.0-41.41 linux-modules-iwlwifi-6.8.0-41-generic - 6.8.0-41.41 linux-modules-iwlwifi-generic - 6.8.0-41.41 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-41.41 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.8.0-41.41 linux-modules-iwlwifi-oem-20.04 - 6.8.0-41.41 linux-modules-iwlwifi-oem-20.04d - 6.8.0-41.41 linux-modules-iwlwifi-oem-22.04 - 6.8.0-41.41 linux-modules-usbio-6.8.0-41-generic - 6.8.0-41.41 linux-modules-usbio-generic - 6.8.0-41.41 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-41.41 linux-modules-usbio-generic-hwe-24.04-edge - 6.8.0-41.41 linux-oem-20.04 - 6.8.0-41.41 linux-oem-20.04b - 6.8.0-41.41 linux-oem-20.04c - 6.8.0-41.41 linux-oem-20.04d - 6.8.0-41.41 linux-oem-22.04 - 6.8.0-41.41 linux-source - 6.8.0-41.41 linux-source-6.8.0 - 6.8.0-41.41 linux-tools-6.8.0-41 - 6.8.0-41.41 linux-tools-6.8.0-41-generic - 6.8.0-41.41 linux-tools-6.8.0-41-generic-64k - 6.8.0-41.41 linux-tools-common - 6.8.0-41.41 linux-tools-generic - 6.8.0-41.41 linux-tools-generic-64k - 6.8.0-41.41 linux-tools-generic-64k-hwe-24.04 - 6.8.0-41.41 linux-tools-generic-64k-hwe-24.04-edge - 6.8.0-41.41 linux-tools-generic-hwe-24.04 - 6.8.0-41.41 linux-tools-generic-hwe-24.04-edge - 6.8.0-41.41 linux-tools-generic-lpae - 6.8.0-41.41 linux-tools-host - 6.8.0-41.41 linux-tools-kvm - 6.8.0-41.41 linux-tools-laptop-23.10 - 6.8.0-41.41 linux-tools-oem-20.04 - 6.8.0-41.41 linux-tools-oem-20.04b - 6.8.0-41.41 linux-tools-oem-20.04c - 6.8.0-41.41 linux-tools-oem-20.04d - 6.8.0-41.41 linux-tools-oem-22.04 - 6.8.0-41.41 linux-tools-virtual - 6.8.0-41.41 linux-tools-virtual-hwe-24.04 - 6.8.0-41.41 linux-tools-virtual-hwe-24.04-edge - 6.8.0-41.41 linux-virtual - 6.8.0-41.41 linux-virtual-hwe-24.04 - 6.8.0-41.41 linux-virtual-hwe-24.04-edge - 6.8.0-41.41 No subscription required linux-buildinfo-6.8.0-41-lowlatency - 6.8.0-41.41.1 linux-buildinfo-6.8.0-41-lowlatency-64k - 6.8.0-41.41.1 linux-cloud-tools-6.8.0-41-lowlatency - 6.8.0-41.41.1 linux-cloud-tools-lowlatency - 6.8.0-41.41.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-41.41.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-41.41.1 linux-cloud-tools-lowlatency-hwe-22.04 - 6.8.0-41.41.1 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.8.0-41.41.1 linux-headers-6.8.0-41-lowlatency - 6.8.0-41.41.1 linux-headers-6.8.0-41-lowlatency-64k - 6.8.0-41.41.1 linux-headers-lowlatency - 6.8.0-41.41.1 linux-headers-lowlatency-64k - 6.8.0-41.41.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-41.41.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-41.41.1 linux-headers-lowlatency-64k-hwe-22.04 - 6.8.0-41.41.1 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.8.0-41.41.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-41.41.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-41.41.1 linux-headers-lowlatency-hwe-22.04 - 6.8.0-41.41.1 linux-headers-lowlatency-hwe-22.04-edge - 6.8.0-41.41.1 linux-image-6.8.0-41-lowlatency - 6.8.0-41.41.1 linux-image-6.8.0-41-lowlatency-64k - 6.8.0-41.41.1 linux-image-lowlatency - 6.8.0-41.41.1 linux-image-lowlatency-64k - 6.8.0-41.41.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-41.41.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-41.41.1 linux-image-lowlatency-64k-hwe-22.04 - 6.8.0-41.41.1 linux-image-lowlatency-64k-hwe-22.04-edge - 6.8.0-41.41.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-41.41.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-41.41.1 linux-image-lowlatency-hwe-22.04 - 6.8.0-41.41.1 linux-image-lowlatency-hwe-22.04-edge - 6.8.0-41.41.1 linux-image-unsigned-6.8.0-41-lowlatency - 6.8.0-41.41.1 linux-image-unsigned-6.8.0-41-lowlatency-64k - 6.8.0-41.41.1 linux-lowlatency - 6.8.0-41.41.1 linux-lowlatency-64k - 6.8.0-41.41.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-41.41.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-41.41.1 linux-lowlatency-64k-hwe-22.04 - 6.8.0-41.41.1 linux-lowlatency-64k-hwe-22.04-edge - 6.8.0-41.41.1 linux-lowlatency-cloud-tools-6.8.0-41 - 6.8.0-41.41.1 linux-lowlatency-cloud-tools-common - 6.8.0-41.41.1 linux-lowlatency-headers-6.8.0-41 - 6.8.0-41.41.1 linux-lowlatency-hwe-20.04 - 6.8.0-41.41.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-41.41.1 linux-lowlatency-hwe-22.04 - 6.8.0-41.41.1 linux-lowlatency-hwe-22.04-edge - 6.8.0-41.41.1 linux-lowlatency-lib-rust-6.8.0-41-lowlatency - 6.8.0-41.41.1 linux-lowlatency-tools-6.8.0-41 - 6.8.0-41.41.1 linux-lowlatency-tools-common - 6.8.0-41.41.1 linux-lowlatency-tools-host - 6.8.0-41.41.1 linux-modules-6.8.0-41-lowlatency - 6.8.0-41.41.1 linux-modules-6.8.0-41-lowlatency-64k - 6.8.0-41.41.1 linux-modules-iwlwifi-6.8.0-41-lowlatency - 6.8.0-41.41.1 linux-modules-iwlwifi-lowlatency - 6.8.0-41.41.1 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.8.0-41.41.1 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.8.0-41.41.1 linux-tools-6.8.0-41-lowlatency - 6.8.0-41.41.1 linux-tools-6.8.0-41-lowlatency-64k - 6.8.0-41.41.1 linux-tools-lowlatency - 6.8.0-41.41.1 linux-tools-lowlatency-64k - 6.8.0-41.41.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-41.41.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-41.41.1 linux-tools-lowlatency-64k-hwe-22.04 - 6.8.0-41.41.1 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.8.0-41.41.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-41.41.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-41.41.1 linux-tools-lowlatency-hwe-22.04 - 6.8.0-41.41.1 linux-tools-lowlatency-hwe-22.04-edge - 6.8.0-41.41.1 No subscription required Medium CVE-2024-39292 CVE-2024-39484 USN-6977-1 -- QEMU vulnerabilities Ubuntu 24.04 LTS It was discovered that QEMU did not properly handle certain memory operations, which could result in a buffer overflow. An attacker could potentially use this issue to cause a denial of service. (CVE-2024-26327) It was discovered that QEMU did not properly handle certain memory operations, which could result in an out-of-bounds memory access. An attacker could potentially use this issue to cause a denial of service. (CVE-2024-26328) Update Instructions: Run `sudo pro fix USN-6977-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: qemu-block-extra - 1:8.2.2+ds-0ubuntu1.2 qemu-block-supplemental - 1:8.2.2+ds-0ubuntu1.2 qemu-guest-agent - 1:8.2.2+ds-0ubuntu1.2 qemu-system - 1:8.2.2+ds-0ubuntu1.2 qemu-system-arm - 1:8.2.2+ds-0ubuntu1.2 qemu-system-common - 1:8.2.2+ds-0ubuntu1.2 qemu-system-data - 1:8.2.2+ds-0ubuntu1.2 qemu-system-gui - 1:8.2.2+ds-0ubuntu1.2 qemu-system-mips - 1:8.2.2+ds-0ubuntu1.2 qemu-system-misc - 1:8.2.2+ds-0ubuntu1.2 qemu-system-modules-opengl - 1:8.2.2+ds-0ubuntu1.2 qemu-system-modules-spice - 1:8.2.2+ds-0ubuntu1.2 qemu-system-ppc - 1:8.2.2+ds-0ubuntu1.2 qemu-system-s390x - 1:8.2.2+ds-0ubuntu1.2 qemu-system-sparc - 1:8.2.2+ds-0ubuntu1.2 qemu-system-x86 - 1:8.2.2+ds-0ubuntu1.2 qemu-system-x86-xen - 1:8.2.2+ds-0ubuntu1.2 qemu-system-xen - 1:8.2.2+ds-0ubuntu1.2 qemu-user - 1:8.2.2+ds-0ubuntu1.2 qemu-user-binfmt - 1:8.2.2+ds-0ubuntu1.2 qemu-user-static - 1:8.2.2+ds-0ubuntu1.2 qemu-utils - 1:8.2.2+ds-0ubuntu1.2 No subscription required Medium CVE-2024-26327 CVE-2024-26328 USN-6982-1 -- Dovecot vulnerabilities Ubuntu 24.04 LTS It was discovered that Dovecot did not not properly have restrictions on ithe size of address headers. A remote attacker could possibly use this issue to cause denial of service. (CVE-2024-23184, CVE-2024-23185) Update Instructions: Run `sudo pro fix USN-6982-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: dovecot-auth-lua - 1:2.3.21+dfsg1-2ubuntu6 dovecot-core - 1:2.3.21+dfsg1-2ubuntu6 dovecot-dev - 1:2.3.21+dfsg1-2ubuntu6 dovecot-gssapi - 1:2.3.21+dfsg1-2ubuntu6 dovecot-imapd - 1:2.3.21+dfsg1-2ubuntu6 dovecot-ldap - 1:2.3.21+dfsg1-2ubuntu6 dovecot-lmtpd - 1:2.3.21+dfsg1-2ubuntu6 dovecot-managesieved - 1:2.3.21+dfsg1-2ubuntu6 dovecot-mysql - 1:2.3.21+dfsg1-2ubuntu6 dovecot-pgsql - 1:2.3.21+dfsg1-2ubuntu6 dovecot-pop3d - 1:2.3.21+dfsg1-2ubuntu6 dovecot-sieve - 1:2.3.21+dfsg1-2ubuntu6 dovecot-solr - 1:2.3.21+dfsg1-2ubuntu6 dovecot-sqlite - 1:2.3.21+dfsg1-2ubuntu6 dovecot-submissiond - 1:2.3.21+dfsg1-2ubuntu6 No subscription required Medium CVE-2024-23184 CVE-2024-23185 USN-6983-1 -- FFmpeg vulnerability Ubuntu 24.04 LTS Zeng Yunxiang discovered that FFmpeg incorrectly handled memory during video encoding. An attacker could possibly use this issue to perform a denial of service, or execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6983-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ffmpeg - 7:6.1.1-3ubuntu5+esm2 ffmpeg-doc - 7:6.1.1-3ubuntu5+esm2 libavcodec-dev - 7:6.1.1-3ubuntu5+esm2 libavcodec-extra - 7:6.1.1-3ubuntu5+esm2 libavcodec-extra60 - 7:6.1.1-3ubuntu5+esm2 libavcodec60 - 7:6.1.1-3ubuntu5+esm2 libavdevice-dev - 7:6.1.1-3ubuntu5+esm2 libavdevice60 - 7:6.1.1-3ubuntu5+esm2 libavfilter-dev - 7:6.1.1-3ubuntu5+esm2 libavfilter-extra - 7:6.1.1-3ubuntu5+esm2 libavfilter-extra9 - 7:6.1.1-3ubuntu5+esm2 libavfilter9 - 7:6.1.1-3ubuntu5+esm2 libavformat-dev - 7:6.1.1-3ubuntu5+esm2 libavformat-extra - 7:6.1.1-3ubuntu5+esm2 libavformat-extra60 - 7:6.1.1-3ubuntu5+esm2 libavformat60 - 7:6.1.1-3ubuntu5+esm2 libavutil-dev - 7:6.1.1-3ubuntu5+esm2 libavutil58 - 7:6.1.1-3ubuntu5+esm2 libpostproc-dev - 7:6.1.1-3ubuntu5+esm2 libpostproc57 - 7:6.1.1-3ubuntu5+esm2 libswresample-dev - 7:6.1.1-3ubuntu5+esm2 libswresample4 - 7:6.1.1-3ubuntu5+esm2 libswscale-dev - 7:6.1.1-3ubuntu5+esm2 libswscale7 - 7:6.1.1-3ubuntu5+esm2 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2024-32230 USN-6984-1 -- WebOb vulnerability Ubuntu 24.04 LTS It was discovered that WebOb incorrectly handled certain URLs. An attacker could possibly use this issue to control a redirect or forward to another URL. Update Instructions: Run `sudo pro fix USN-6984-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-webob-doc - 1:1.8.7-1ubuntu0.1.24.04.1 python3-webob - 1:1.8.7-1ubuntu0.1.24.04.1 No subscription required Medium CVE-2024-42353 USN-6986-1 -- OpenSSL vulnerability Ubuntu 24.04 LTS David Benjamin discovered that OpenSSL incorrectly handled certain X.509 certificates. An attacker could possible use this issue to cause a denial of service or expose sensitive information. Update Instructions: Run `sudo pro fix USN-6986-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libssl-dev - 3.0.13-0ubuntu3.4 libssl-doc - 3.0.13-0ubuntu3.4 libssl3t64 - 3.0.13-0ubuntu3.4 openssl - 3.0.13-0ubuntu3.4 No subscription required Medium CVE-2024-6119 USN-6987-1 -- Django vulnerabilities Ubuntu 24.04 LTS It was discovered that Django incorrectly handled certain inputs. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-45230) It was discovered that Django incorrectly handled certain email sending failures. A remote attacker could possibly use this issue to enumerate user emails by issuing password reset requests and observing the outcomes. (CVE-2024-45231) Update Instructions: Run `sudo pro fix USN-6987-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-django-doc - 3:4.2.11-1ubuntu1.3 python3-django - 3:4.2.11-1ubuntu1.3 No subscription required Medium CVE-2024-45230 CVE-2024-45231 USN-6988-1 -- Twisted vulnerabilities Ubuntu 24.04 LTS It was discovered that Twisted incorrectly handled response order when processing multiple HTTP requests. A remote attacker could possibly use this issue to delay and manipulate responses. This issue only affected Ubuntu 24.04 LTS. (CVE-2024-41671) It was discovered that Twisted did not properly sanitize certain input. An attacker could use this vulnerability to possibly execute an HTML injection leading to a cross-site scripting (XSS) attack. (CVE-2024-41810) Update Instructions: Run `sudo pro fix USN-6988-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-twisted - 24.3.0-1ubuntu0.1 twisted-doc - 24.3.0-1ubuntu0.1 No subscription required Medium CVE-2024-41671 CVE-2024-41810 USN-6989-1 -- OpenStack vulnerability Ubuntu 24.04 LTS Dan Smith, Julia Kreger and Jay Faulkner discovered that in image processing for Ironic, a specially crafted image could be used by an authenticated user to exploit undesired behaviors in qemu-img, including possible unauthorized access to potentially sensitive data. Update Instructions: Run `sudo pro fix USN-6989-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ironic-api - 1:24.1.1-0ubuntu1.2 ironic-common - 1:24.1.1-0ubuntu1.2 ironic-conductor - 1:24.1.1-0ubuntu1.2 python3-ironic - 1:24.1.1-0ubuntu1.2 No subscription required Medium CVE-2024-44082 USN-6990-1 -- znc vulnerability Ubuntu 24.04 LTS Johannes Kuhn (DasBrain) discovered that znc incorrectly handled user input under certain operations. An attacker could possibly use this issue to execute arbitrary code on a user's system if the user was tricked into joining a malicious server. Update Instructions: Run `sudo pro fix USN-6990-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: znc-backlog - 0.20180824+1.9.0-2ubuntu0.1~esm2 Available with Ubuntu Pro: https://ubuntu.com/pro znc-push - 1.0.0+git20190521.78d0385+1.9.0-2ubuntu0.1~esm2 Available with Ubuntu Pro: https://ubuntu.com/pro znc - 1.9.0-2ubuntu0.1~esm2 znc-dev - 1.9.0-2ubuntu0.1~esm2 znc-perl - 1.9.0-2ubuntu0.1~esm2 znc-python - 1.9.0-2ubuntu0.1~esm2 znc-tcl - 1.9.0-2ubuntu0.1~esm2 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2024-39844 USN-6991-1 -- AIOHTTP vulnerability Ubuntu 24.04 LTS It was discovered that AIOHTTP did not properly restrict file access when the 'follow_symlinks' option was set to True. A remote attacker could possibly use this issue to access unauthorized files on the system. Update Instructions: Run `sudo pro fix USN-6991-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-aiohttp-doc - 3.9.1-1ubuntu0.1 python3-aiohttp - 3.9.1-1ubuntu0.1 No subscription required Medium CVE-2024-23334 USN-6993-1 -- Vim vulnerabilities Ubuntu 24.04 LTS It was discovered that Vim incorrectly handled memory when closing a window, leading to a double-free vulnerability. If a user was tricked into opening a specially crafted file, an attacker could crash the application, leading to a denial of service, or possibly achieve code execution with user privileges. (CVE-2024-41957) It was discovered that Vim incorrectly handled memory when adding a new file to an argument list, leading to a use-after-free. If a user was tricked into opening a specially crafted file, an attacker could crash the application, leading to a denial of service. (CVE-2024-43374) Update Instructions: Run `sudo pro fix USN-6993-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: vim - 2:9.1.0016-1ubuntu7.2 vim-athena - 2:9.1.0016-1ubuntu7.2 vim-common - 2:9.1.0016-1ubuntu7.2 vim-doc - 2:9.1.0016-1ubuntu7.2 vim-gtk3 - 2:9.1.0016-1ubuntu7.2 vim-gui-common - 2:9.1.0016-1ubuntu7.2 vim-motif - 2:9.1.0016-1ubuntu7.2 vim-nox - 2:9.1.0016-1ubuntu7.2 vim-runtime - 2:9.1.0016-1ubuntu7.2 vim-tiny - 2:9.1.0016-1ubuntu7.2 xxd - 2:9.1.0016-1ubuntu7.2 No subscription required Medium CVE-2024-41957 CVE-2024-43374 USN-6996-1 -- WebKitGTK vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the WebKitGTK Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution. Update Instructions: Run `sudo pro fix USN-6996-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-javascriptcoregtk-4.1 - 2.44.3-0ubuntu0.24.04.1 gir1.2-javascriptcoregtk-6.0 - 2.44.3-0ubuntu0.24.04.1 gir1.2-webkit-6.0 - 2.44.3-0ubuntu0.24.04.1 gir1.2-webkit2-4.1 - 2.44.3-0ubuntu0.24.04.1 libjavascriptcoregtk-4.0-bin - 2.44.3-0ubuntu0.24.04.1 libjavascriptcoregtk-4.1-0 - 2.44.3-0ubuntu0.24.04.1 libjavascriptcoregtk-4.1-dev - 2.44.3-0ubuntu0.24.04.1 libjavascriptcoregtk-6.0-1 - 2.44.3-0ubuntu0.24.04.1 libjavascriptcoregtk-6.0-dev - 2.44.3-0ubuntu0.24.04.1 libjavascriptcoregtk-bin - 2.44.3-0ubuntu0.24.04.1 libwebkit2gtk-4.0-doc - 2.44.3-0ubuntu0.24.04.1 libwebkit2gtk-4.1-0 - 2.44.3-0ubuntu0.24.04.1 libwebkit2gtk-4.1-dev - 2.44.3-0ubuntu0.24.04.1 libwebkitgtk-6.0-4 - 2.44.3-0ubuntu0.24.04.1 libwebkitgtk-6.0-dev - 2.44.3-0ubuntu0.24.04.1 libwebkitgtk-doc - 2.44.3-0ubuntu0.24.04.1 webkit2gtk-driver - 2.44.3-0ubuntu0.24.04.1 No subscription required Medium CVE-2024-40776 CVE-2024-40779 CVE-2024-40780 CVE-2024-40782 CVE-2024-40789 CVE-2024-4558 USN-6997-1 -- LibTIFF vulnerability Ubuntu 24.04 LTS It was discovered that LibTIFF incorrectly handled memory. An attacker could possibly use this issue to cause the application to crash, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-6997-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libtiff-dev - 4.5.1+git230720-4ubuntu2.2 libtiff-doc - 4.5.1+git230720-4ubuntu2.2 libtiff-opengl - 4.5.1+git230720-4ubuntu2.2 libtiff-tools - 4.5.1+git230720-4ubuntu2.2 libtiff5-dev - 4.5.1+git230720-4ubuntu2.2 libtiff6 - 4.5.1+git230720-4ubuntu2.2 libtiffxx6 - 4.5.1+git230720-4ubuntu2.2 No subscription required Medium CVE-2024-7006 USN-6998-1 -- Unbound vulnerabilities Ubuntu 24.04 LTS It was discovered that Unbound incorrectly handled string comparisons, which could lead to a NULL pointer dereference. An attacker could potentially use this issue to cause a denial of service. (CVE-2024-43167) It was discovered that Unbound incorrectly handled memory in cfg_mark_ports, which could lead to a heap buffer overflow. A local attacker could potentially use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-43168) Update Instructions: Run `sudo pro fix USN-6998-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libunbound-dev - 1.19.2-1ubuntu3.2 libunbound8 - 1.19.2-1ubuntu3.2 python3-unbound - 1.19.2-1ubuntu3.2 unbound - 1.19.2-1ubuntu3.2 unbound-anchor - 1.19.2-1ubuntu3.2 unbound-host - 1.19.2-1ubuntu3.2 No subscription required Medium CVE-2024-43167 CVE-2024-43168 USN-6999-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Chenyuan Yang discovered that the CEC driver driver in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2024-23848) It was discovered that the JFS file system contained an out-of-bounds read vulnerability when printing xattr debug information. A local attacker could use this to cause a denial of service (system crash). (CVE-2024-40902) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PA-RISC architecture; - PowerPC architecture; - RISC-V architecture; - x86 architecture; - Block layer subsystem; - ACPI drivers; - Drivers core; - Null block device driver; - Character device driver; - TPM device driver; - Clock framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - Buffer Sharing and Synchronization framework; - DMA engine subsystem; - EFI core; - FPGA Framework; - GPU drivers; - Greybus drivers; - HID subsystem; - HW tracing; - I2C subsystem; - IIO subsystem; - InfiniBand drivers; - Input Device (Mouse) drivers; - Mailbox framework; - Media drivers; - Microchip PCI driver; - VMware VMCI Driver; - Network drivers; - PCI subsystem; - x86 platform drivers; - PTP clock framework; - S/390 drivers; - SCSI drivers; - SoundWire subsystem; - Sonic Silicon Backplane drivers; - Greybus lights staging drivers; - Thermal drivers; - TTY drivers; - USB subsystem; - VFIO drivers; - Framebuffer layer; - Watchdog drivers; - 9P distributed file system; - BTRFS file system; - File systems infrastructure; - Ext4 file system; - F2FS file system; - JFS file system; - Network file system server daemon; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - Tracing file system; - Tracing infrastructure; - io_uring subsystem; - Core kernel; - BPF subsystem; - Kernel debugger infrastructure; - DMA mapping infrastructure; - IRQ subsystem; - Memory management; - 9P file system network protocol; - Amateur Radio drivers; - B.A.T.M.A.N. meshing protocol; - Ethernet bridge; - Networking core; - Ethtool driver; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - Netfilter; - NET/ROM layer; - NFC subsystem; - Network traffic control; - Sun RPC protocol; - TIPC protocol; - TLS protocol; - Unix domain sockets; - Wireless networking; - XFRM subsystem; - AppArmor security module; - Integrity Measurement Architecture(IMA) framework; - Landlock security; - Linux Security Modules (LSM) Framework; - SELinux security module; - Simplified Mandatory Access Control Kernel framework; - ALSA framework; - HD-audio driver; - SOF drivers; - KVM core; (CVE-2024-40911, CVE-2024-37356, CVE-2024-40935, CVE-2024-40944, CVE-2024-41003, CVE-2024-40990, CVE-2024-40952, CVE-2024-40940, CVE-2024-40930, CVE-2024-40985, CVE-2024-40941, CVE-2024-38630, CVE-2024-39466, CVE-2024-40933, CVE-2024-38624, CVE-2024-40924, CVE-2024-40945, CVE-2024-40899, CVE-2024-38622, CVE-2024-40979, CVE-2024-36484, CVE-2024-41004, CVE-2024-39474, CVE-2022-48772, CVE-2024-36244, CVE-2024-38664, CVE-2024-40925, CVE-2024-40980, CVE-2024-39480, CVE-2024-36270, CVE-2024-40936, CVE-2024-40904, CVE-2024-38635, CVE-2024-40927, CVE-2024-36481, CVE-2024-40929, CVE-2024-40958, CVE-2024-36978, CVE-2024-40992, CVE-2024-40908, CVE-2024-39504, CVE-2024-41001, CVE-2024-40967, CVE-2023-52884, CVE-2024-40997, CVE-2024-40903, CVE-2024-40913, CVE-2024-34030, CVE-2024-39473, CVE-2024-40966, CVE-2024-40951, CVE-2024-40902, CVE-2024-40982, CVE-2024-40923, CVE-2024-39467, CVE-2024-40910, CVE-2024-40909, CVE-2024-39463, CVE-2024-40974, CVE-2024-41002, CVE-2024-39464, CVE-2024-39496, CVE-2024-41040, CVE-2024-39469, CVE-2024-39500, CVE-2024-39510, CVE-2024-38627, CVE-2024-32936, CVE-2024-40975, CVE-2024-38390, CVE-2024-40959, CVE-2024-41006, CVE-2024-40986, CVE-2024-40987, CVE-2024-40922, CVE-2024-40983, CVE-2024-37354, CVE-2024-38637, CVE-2024-39277, CVE-2024-40943, CVE-2024-39371, CVE-2024-40921, CVE-2024-40953, CVE-2024-38634, CVE-2024-38659, CVE-2024-39492, CVE-2024-40976, CVE-2024-40906, CVE-2024-40965, CVE-2024-38667, CVE-2024-39498, CVE-2024-38628, CVE-2024-38661, CVE-2024-38663, CVE-2024-40998, CVE-2024-40948, CVE-2024-38306, CVE-2024-40928, CVE-2024-39468, CVE-2024-39494, CVE-2024-39505, CVE-2024-40963, CVE-2024-39499, CVE-2024-39506, CVE-2024-40995, CVE-2024-39491, CVE-2024-40900, CVE-2024-39478, CVE-2024-39490, CVE-2024-39291, CVE-2024-40981, CVE-2024-40926, CVE-2024-40939, CVE-2024-38385, CVE-2024-39483, CVE-2024-40989, CVE-2024-40955, CVE-2024-39501, CVE-2024-38381, CVE-2024-33621, CVE-2024-40964, CVE-2024-42148, CVE-2024-36286, CVE-2024-38629, CVE-2024-39509, CVE-2024-39298, CVE-2024-36489, CVE-2024-34777, CVE-2024-40957, CVE-2024-40919, CVE-2024-39462, CVE-2024-39495, CVE-2024-39497, CVE-2024-38636, CVE-2024-36281, CVE-2024-39479, CVE-2024-40932, CVE-2024-36288, CVE-2024-38623, CVE-2024-40969, CVE-2024-40931, CVE-2024-36971, CVE-2024-40934, CVE-2024-36015, CVE-2024-39485, CVE-2024-40996, CVE-2024-39507, CVE-2024-36973, CVE-2024-38625, CVE-2024-39301, CVE-2024-34027, CVE-2024-37026, CVE-2024-40960, CVE-2024-37078, CVE-2024-40912, CVE-2024-40988, CVE-2024-41005, CVE-2024-39276, CVE-2024-38662, CVE-2024-39502, CVE-2024-36479, CVE-2024-40947, CVE-2024-38780, CVE-2024-38388, CVE-2024-40917, CVE-2024-36974, CVE-2024-40970, CVE-2024-40901, CVE-2024-38384, CVE-2024-39475, CVE-2024-40949, CVE-2024-37021, CVE-2024-38633, CVE-2024-39503, CVE-2024-41000, CVE-2024-33847, CVE-2024-35247, CVE-2024-40968, CVE-2024-33619, CVE-2024-38619, CVE-2024-40984, CVE-2024-36478, CVE-2024-39493, CVE-2024-42078, CVE-2024-40954, CVE-2024-40978, CVE-2024-39508, CVE-2024-40915, CVE-2024-39489, CVE-2024-40920, CVE-2024-38618, CVE-2024-40938, CVE-2024-39296, CVE-2024-40962, CVE-2024-39470, CVE-2024-39481, CVE-2024-40977, CVE-2024-38621, CVE-2024-40971, CVE-2024-31076, CVE-2024-36972, CVE-2024-39471, CVE-2024-40994, CVE-2024-40973, CVE-2024-40916, CVE-2024-40942, CVE-2024-40956, CVE-2024-39465, CVE-2024-40914, CVE-2024-40937, CVE-2024-40918, CVE-2024-40905, CVE-2024-39488, CVE-2024-38632, CVE-2024-39461, CVE-2024-40999, CVE-2024-40972, CVE-2024-36477, CVE-2024-40961) Update Instructions: Run `sudo pro fix USN-6999-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1010-gke - 6.8.0-1010.13 linux-gke - 6.8.0-1010.13 linux-gke-headers-6.8.0-1010 - 6.8.0-1010.13 linux-gke-tools-6.8.0-1010 - 6.8.0-1010.13 linux-headers-6.8.0-1010-gke - 6.8.0-1010.13 linux-headers-gke - 6.8.0-1010.13 linux-image-6.8.0-1010-gke - 6.8.0-1010.13 linux-image-gke - 6.8.0-1010.13 linux-image-unsigned-6.8.0-1010-gke - 6.8.0-1010.13 linux-modules-6.8.0-1010-gke - 6.8.0-1010.13 linux-modules-extra-6.8.0-1010-gke - 6.8.0-1010.13 linux-modules-iwlwifi-6.8.0-1010-gke - 6.8.0-1010.13 linux-modules-iwlwifi-gke - 6.8.0-1010.13 linux-tools-6.8.0-1010-gke - 6.8.0-1010.13 linux-tools-gke - 6.8.0-1010.13 No subscription required linux-buildinfo-6.8.0-1012-ibm - 6.8.0-1012.12 linux-buildinfo-6.8.0-1012-oem - 6.8.0-1012.12 linux-buildinfo-6.8.0-1012-oracle - 6.8.0-1012.12 linux-buildinfo-6.8.0-1012-oracle-64k - 6.8.0-1012.12 linux-headers-6.8.0-1012-ibm - 6.8.0-1012.12 linux-headers-6.8.0-1012-oem - 6.8.0-1012.12 linux-headers-6.8.0-1012-oracle - 6.8.0-1012.12 linux-headers-6.8.0-1012-oracle-64k - 6.8.0-1012.12 linux-headers-ibm - 6.8.0-1012.12 linux-headers-ibm-classic - 6.8.0-1012.12 linux-headers-ibm-lts-24.04 - 6.8.0-1012.12 linux-headers-oem-24.04 - 6.8.0-1012.12 linux-headers-oem-24.04a - 6.8.0-1012.12 linux-headers-oracle - 6.8.0-1012.12 linux-headers-oracle-64k - 6.8.0-1012.12 linux-ibm - 6.8.0-1012.12 linux-ibm-classic - 6.8.0-1012.12 linux-ibm-cloud-tools-common - 6.8.0-1012.12 linux-ibm-headers-6.8.0-1012 - 6.8.0-1012.12 linux-ibm-lts-24.04 - 6.8.0-1012.12 linux-ibm-source-6.8.0 - 6.8.0-1012.12 linux-ibm-tools-6.8.0-1012 - 6.8.0-1012.12 linux-image-6.8.0-1012-ibm - 6.8.0-1012.12 linux-image-6.8.0-1012-oem - 6.8.0-1012.12 linux-image-6.8.0-1012-oracle - 6.8.0-1012.12 linux-image-6.8.0-1012-oracle-64k - 6.8.0-1012.12 linux-image-ibm - 6.8.0-1012.12 linux-image-ibm-classic - 6.8.0-1012.12 linux-image-ibm-lts-24.04 - 6.8.0-1012.12 linux-image-oem-24.04 - 6.8.0-1012.12 linux-image-oem-24.04a - 6.8.0-1012.12 linux-image-oracle - 6.8.0-1012.12 linux-image-oracle-64k - 6.8.0-1012.12 linux-image-uc-6.8.0-1012-oem - 6.8.0-1012.12 linux-image-uc-oem-24.04 - 6.8.0-1012.12 linux-image-uc-oem-24.04a - 6.8.0-1012.12 linux-image-unsigned-6.8.0-1012-ibm - 6.8.0-1012.12 linux-image-unsigned-6.8.0-1012-oem - 6.8.0-1012.12 linux-image-unsigned-6.8.0-1012-oracle - 6.8.0-1012.12 linux-image-unsigned-6.8.0-1012-oracle-64k - 6.8.0-1012.12 linux-modules-6.8.0-1012-ibm - 6.8.0-1012.12 linux-modules-6.8.0-1012-oem - 6.8.0-1012.12 linux-modules-6.8.0-1012-oracle - 6.8.0-1012.12 linux-modules-6.8.0-1012-oracle-64k - 6.8.0-1012.12 linux-modules-extra-6.8.0-1012-ibm - 6.8.0-1012.12 linux-modules-extra-6.8.0-1012-oracle - 6.8.0-1012.12 linux-modules-extra-6.8.0-1012-oracle-64k - 6.8.0-1012.12 linux-modules-ipu6-6.8.0-1012-oem - 6.8.0-1012.12 linux-modules-ipu6-oem-24.04 - 6.8.0-1012.12 linux-modules-ipu6-oem-24.04a - 6.8.0-1012.12 linux-modules-iwlwifi-6.8.0-1012-ibm - 6.8.0-1012.12 linux-modules-iwlwifi-6.8.0-1012-oem - 6.8.0-1012.12 linux-modules-iwlwifi-6.8.0-1012-oracle - 6.8.0-1012.12 linux-modules-iwlwifi-ibm - 6.8.0-1012.12 linux-modules-iwlwifi-ibm-classic - 6.8.0-1012.12 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1012.12 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1012.12 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1012.12 linux-modules-iwlwifi-oracle - 6.8.0-1012.12 linux-modules-usbio-6.8.0-1012-oem - 6.8.0-1012.12 linux-modules-usbio-oem-24.04 - 6.8.0-1012.12 linux-modules-usbio-oem-24.04a - 6.8.0-1012.12 linux-oem-24.04 - 6.8.0-1012.12 linux-oem-24.04a - 6.8.0-1012.12 linux-oem-6.8-headers-6.8.0-1012 - 6.8.0-1012.12 linux-oem-6.8-tools-6.8.0-1012 - 6.8.0-1012.12 linux-oracle - 6.8.0-1012.12 linux-oracle-64k - 6.8.0-1012.12 linux-oracle-headers-6.8.0-1012 - 6.8.0-1012.12 linux-oracle-tools-6.8.0-1012 - 6.8.0-1012.12 linux-tools-6.8.0-1012-ibm - 6.8.0-1012.12 linux-tools-6.8.0-1012-oem - 6.8.0-1012.12 linux-tools-6.8.0-1012-oracle - 6.8.0-1012.12 linux-tools-6.8.0-1012-oracle-64k - 6.8.0-1012.12 linux-tools-ibm - 6.8.0-1012.12 linux-tools-ibm-classic - 6.8.0-1012.12 linux-tools-ibm-lts-24.04 - 6.8.0-1012.12 linux-tools-oem-24.04 - 6.8.0-1012.12 linux-tools-oem-24.04a - 6.8.0-1012.12 linux-tools-oracle - 6.8.0-1012.12 linux-tools-oracle-64k - 6.8.0-1012.12 No subscription required linux-buildinfo-6.8.0-1014-gcp - 6.8.0-1014.16 linux-gcp - 6.8.0-1014.16 linux-gcp-headers-6.8.0-1014 - 6.8.0-1014.16 linux-gcp-tools-6.8.0-1014 - 6.8.0-1014.16 linux-headers-6.8.0-1014-gcp - 6.8.0-1014.16 linux-headers-gcp - 6.8.0-1014.16 linux-image-6.8.0-1014-gcp - 6.8.0-1014.16 linux-image-gcp - 6.8.0-1014.16 linux-image-unsigned-6.8.0-1014-gcp - 6.8.0-1014.16 linux-modules-6.8.0-1014-gcp - 6.8.0-1014.16 linux-modules-extra-6.8.0-1014-gcp - 6.8.0-1014.16 linux-modules-extra-gcp - 6.8.0-1014.16 linux-tools-6.8.0-1014-gcp - 6.8.0-1014.16 linux-tools-gcp - 6.8.0-1014.16 No subscription required linux-aws - 6.8.0-1015.16 linux-aws-cloud-tools-6.8.0-1015 - 6.8.0-1015.16 linux-aws-headers-6.8.0-1015 - 6.8.0-1015.16 linux-aws-tools-6.8.0-1015 - 6.8.0-1015.16 linux-buildinfo-6.8.0-1015-aws - 6.8.0-1015.16 linux-cloud-tools-6.8.0-1015-aws - 6.8.0-1015.16 linux-headers-6.8.0-1015-aws - 6.8.0-1015.16 linux-headers-aws - 6.8.0-1015.16 linux-image-6.8.0-1015-aws - 6.8.0-1015.16 linux-image-aws - 6.8.0-1015.16 linux-image-unsigned-6.8.0-1015-aws - 6.8.0-1015.16 linux-modules-6.8.0-1015-aws - 6.8.0-1015.16 linux-modules-extra-6.8.0-1015-aws - 6.8.0-1015.16 linux-modules-extra-aws - 6.8.0-1015.16 linux-tools-6.8.0-1015-aws - 6.8.0-1015.16 linux-tools-aws - 6.8.0-1015.16 No subscription required linux-buildinfo-6.8.0-44-generic - 6.8.0-44.44 linux-buildinfo-6.8.0-44-generic-64k - 6.8.0-44.44 linux-cloud-tools-6.8.0-44 - 6.8.0-44.44 linux-cloud-tools-6.8.0-44-generic - 6.8.0-44.44 linux-cloud-tools-common - 6.8.0-44.44 linux-cloud-tools-generic - 6.8.0-44.44 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-44.44 linux-cloud-tools-generic-hwe-24.04-edge - 6.8.0-44.44 linux-cloud-tools-virtual - 6.8.0-44.44 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-44.44 linux-cloud-tools-virtual-hwe-24.04-edge - 6.8.0-44.44 linux-crashdump - 6.8.0-44.44 linux-doc - 6.8.0-44.44 linux-generic - 6.8.0-44.44 linux-generic-64k - 6.8.0-44.44 linux-generic-64k-hwe-24.04 - 6.8.0-44.44 linux-generic-64k-hwe-24.04-edge - 6.8.0-44.44 linux-generic-hwe-24.04 - 6.8.0-44.44 linux-generic-hwe-24.04-edge - 6.8.0-44.44 linux-generic-lpae - 6.8.0-44.44 linux-headers-6.8.0-44 - 6.8.0-44.44 linux-headers-6.8.0-44-generic - 6.8.0-44.44 linux-headers-6.8.0-44-generic-64k - 6.8.0-44.44 linux-headers-generic - 6.8.0-44.44 linux-headers-generic-64k - 6.8.0-44.44 linux-headers-generic-64k-hwe-24.04 - 6.8.0-44.44 linux-headers-generic-64k-hwe-24.04-edge - 6.8.0-44.44 linux-headers-generic-hwe-24.04 - 6.8.0-44.44 linux-headers-generic-hwe-24.04-edge - 6.8.0-44.44 linux-headers-generic-lpae - 6.8.0-44.44 linux-headers-kvm - 6.8.0-44.44 linux-headers-laptop-23.10 - 6.8.0-44.44 linux-headers-oem-20.04 - 6.8.0-44.44 linux-headers-oem-20.04b - 6.8.0-44.44 linux-headers-oem-20.04c - 6.8.0-44.44 linux-headers-oem-20.04d - 6.8.0-44.44 linux-headers-oem-22.04 - 6.8.0-44.44 linux-headers-virtual - 6.8.0-44.44 linux-headers-virtual-hwe-24.04 - 6.8.0-44.44 linux-headers-virtual-hwe-24.04-edge - 6.8.0-44.44 linux-image-6.8.0-44-generic - 6.8.0-44.44 linux-image-6.8.0-44-generic-64k - 6.8.0-44.44 linux-image-extra-virtual - 6.8.0-44.44 linux-image-extra-virtual-hwe-24.04 - 6.8.0-44.44 linux-image-extra-virtual-hwe-24.04-edge - 6.8.0-44.44 linux-image-generic - 6.8.0-44.44 linux-image-generic-64k - 6.8.0-44.44 linux-image-generic-64k-hwe-24.04 - 6.8.0-44.44 linux-image-generic-64k-hwe-24.04-edge - 6.8.0-44.44 linux-image-generic-hwe-24.04 - 6.8.0-44.44 linux-image-generic-hwe-24.04-edge - 6.8.0-44.44 linux-image-generic-lpae - 6.8.0-44.44 linux-image-kvm - 6.8.0-44.44 linux-image-laptop-23.10 - 6.8.0-44.44 linux-image-oem-20.04 - 6.8.0-44.44 linux-image-oem-20.04b - 6.8.0-44.44 linux-image-oem-20.04c - 6.8.0-44.44 linux-image-oem-20.04d - 6.8.0-44.44 linux-image-oem-22.04 - 6.8.0-44.44 linux-image-uc-6.8.0-44-generic - 6.8.0-44.44 linux-image-uc-6.8.0-44-generic-64k - 6.8.0-44.44 linux-image-uc-generic - 6.8.0-44.44 linux-image-uc-generic-hwe-24.04 - 6.8.0-44.44 linux-image-uc-generic-hwe-24.04-edge - 6.8.0-44.44 linux-image-unsigned-6.8.0-44-generic - 6.8.0-44.44 linux-image-unsigned-6.8.0-44-generic-64k - 6.8.0-44.44 linux-image-virtual - 6.8.0-44.44 linux-image-virtual-hwe-24.04 - 6.8.0-44.44 linux-image-virtual-hwe-24.04-edge - 6.8.0-44.44 linux-kvm - 6.8.0-44.44 linux-laptop-23.10 - 6.8.0-44.44 linux-lib-rust-6.8.0-44-generic - 6.8.0-44.44 linux-libc-dev - 6.8.0-44.44 linux-modules-6.8.0-44-generic - 6.8.0-44.44 linux-modules-6.8.0-44-generic-64k - 6.8.0-44.44 linux-modules-extra-6.8.0-44-generic - 6.8.0-44.44 linux-modules-ipu6-6.8.0-44-generic - 6.8.0-44.44 linux-modules-ipu6-generic - 6.8.0-44.44 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-44.44 linux-modules-ipu6-generic-hwe-24.04-edge - 6.8.0-44.44 linux-modules-iwlwifi-6.8.0-44-generic - 6.8.0-44.44 linux-modules-iwlwifi-generic - 6.8.0-44.44 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-44.44 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.8.0-44.44 linux-modules-iwlwifi-oem-20.04 - 6.8.0-44.44 linux-modules-iwlwifi-oem-20.04d - 6.8.0-44.44 linux-modules-iwlwifi-oem-22.04 - 6.8.0-44.44 linux-modules-usbio-6.8.0-44-generic - 6.8.0-44.44 linux-modules-usbio-generic - 6.8.0-44.44 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-44.44 linux-modules-usbio-generic-hwe-24.04-edge - 6.8.0-44.44 linux-oem-20.04 - 6.8.0-44.44 linux-oem-20.04b - 6.8.0-44.44 linux-oem-20.04c - 6.8.0-44.44 linux-oem-20.04d - 6.8.0-44.44 linux-oem-22.04 - 6.8.0-44.44 linux-source - 6.8.0-44.44 linux-source-6.8.0 - 6.8.0-44.44 linux-tools-6.8.0-44 - 6.8.0-44.44 linux-tools-6.8.0-44-generic - 6.8.0-44.44 linux-tools-6.8.0-44-generic-64k - 6.8.0-44.44 linux-tools-common - 6.8.0-44.44 linux-tools-generic - 6.8.0-44.44 linux-tools-generic-64k - 6.8.0-44.44 linux-tools-generic-64k-hwe-24.04 - 6.8.0-44.44 linux-tools-generic-64k-hwe-24.04-edge - 6.8.0-44.44 linux-tools-generic-hwe-24.04 - 6.8.0-44.44 linux-tools-generic-hwe-24.04-edge - 6.8.0-44.44 linux-tools-generic-lpae - 6.8.0-44.44 linux-tools-host - 6.8.0-44.44 linux-tools-kvm - 6.8.0-44.44 linux-tools-laptop-23.10 - 6.8.0-44.44 linux-tools-oem-20.04 - 6.8.0-44.44 linux-tools-oem-20.04b - 6.8.0-44.44 linux-tools-oem-20.04c - 6.8.0-44.44 linux-tools-oem-20.04d - 6.8.0-44.44 linux-tools-oem-22.04 - 6.8.0-44.44 linux-tools-virtual - 6.8.0-44.44 linux-tools-virtual-hwe-24.04 - 6.8.0-44.44 linux-tools-virtual-hwe-24.04-edge - 6.8.0-44.44 linux-virtual - 6.8.0-44.44 linux-virtual-hwe-24.04 - 6.8.0-44.44 linux-virtual-hwe-24.04-edge - 6.8.0-44.44 No subscription required linux-buildinfo-6.8.0-44-lowlatency - 6.8.0-44.44.1 linux-buildinfo-6.8.0-44-lowlatency-64k - 6.8.0-44.44.1 linux-cloud-tools-6.8.0-44-lowlatency - 6.8.0-44.44.1 linux-cloud-tools-lowlatency - 6.8.0-44.44.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-44.44.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-44.44.1 linux-cloud-tools-lowlatency-hwe-22.04 - 6.8.0-44.44.1 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.8.0-44.44.1 linux-headers-6.8.0-44-lowlatency - 6.8.0-44.44.1 linux-headers-6.8.0-44-lowlatency-64k - 6.8.0-44.44.1 linux-headers-lowlatency - 6.8.0-44.44.1 linux-headers-lowlatency-64k - 6.8.0-44.44.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-44.44.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-44.44.1 linux-headers-lowlatency-64k-hwe-22.04 - 6.8.0-44.44.1 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.8.0-44.44.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-44.44.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-44.44.1 linux-headers-lowlatency-hwe-22.04 - 6.8.0-44.44.1 linux-headers-lowlatency-hwe-22.04-edge - 6.8.0-44.44.1 linux-image-6.8.0-44-lowlatency - 6.8.0-44.44.1 linux-image-6.8.0-44-lowlatency-64k - 6.8.0-44.44.1 linux-image-lowlatency - 6.8.0-44.44.1 linux-image-lowlatency-64k - 6.8.0-44.44.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-44.44.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-44.44.1 linux-image-lowlatency-64k-hwe-22.04 - 6.8.0-44.44.1 linux-image-lowlatency-64k-hwe-22.04-edge - 6.8.0-44.44.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-44.44.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-44.44.1 linux-image-lowlatency-hwe-22.04 - 6.8.0-44.44.1 linux-image-lowlatency-hwe-22.04-edge - 6.8.0-44.44.1 linux-image-unsigned-6.8.0-44-lowlatency - 6.8.0-44.44.1 linux-image-unsigned-6.8.0-44-lowlatency-64k - 6.8.0-44.44.1 linux-lowlatency - 6.8.0-44.44.1 linux-lowlatency-64k - 6.8.0-44.44.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-44.44.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-44.44.1 linux-lowlatency-64k-hwe-22.04 - 6.8.0-44.44.1 linux-lowlatency-64k-hwe-22.04-edge - 6.8.0-44.44.1 linux-lowlatency-cloud-tools-6.8.0-44 - 6.8.0-44.44.1 linux-lowlatency-cloud-tools-common - 6.8.0-44.44.1 linux-lowlatency-headers-6.8.0-44 - 6.8.0-44.44.1 linux-lowlatency-hwe-20.04 - 6.8.0-44.44.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-44.44.1 linux-lowlatency-hwe-22.04 - 6.8.0-44.44.1 linux-lowlatency-hwe-22.04-edge - 6.8.0-44.44.1 linux-lowlatency-lib-rust-6.8.0-44-lowlatency - 6.8.0-44.44.1 linux-lowlatency-tools-6.8.0-44 - 6.8.0-44.44.1 linux-lowlatency-tools-common - 6.8.0-44.44.1 linux-lowlatency-tools-host - 6.8.0-44.44.1 linux-modules-6.8.0-44-lowlatency - 6.8.0-44.44.1 linux-modules-6.8.0-44-lowlatency-64k - 6.8.0-44.44.1 linux-modules-iwlwifi-6.8.0-44-lowlatency - 6.8.0-44.44.1 linux-modules-iwlwifi-lowlatency - 6.8.0-44.44.1 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.8.0-44.44.1 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.8.0-44.44.1 linux-tools-6.8.0-44-lowlatency - 6.8.0-44.44.1 linux-tools-6.8.0-44-lowlatency-64k - 6.8.0-44.44.1 linux-tools-lowlatency - 6.8.0-44.44.1 linux-tools-lowlatency-64k - 6.8.0-44.44.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-44.44.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-44.44.1 linux-tools-lowlatency-64k-hwe-22.04 - 6.8.0-44.44.1 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.8.0-44.44.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-44.44.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-44.44.1 linux-tools-lowlatency-hwe-22.04 - 6.8.0-44.44.1 linux-tools-lowlatency-hwe-22.04-edge - 6.8.0-44.44.1 No subscription required High CVE-2022-48772 CVE-2023-52884 CVE-2024-23848 CVE-2024-31076 CVE-2024-32936 CVE-2024-33619 CVE-2024-33621 CVE-2024-33847 CVE-2024-34027 CVE-2024-34030 CVE-2024-34777 CVE-2024-35247 CVE-2024-36015 CVE-2024-36244 CVE-2024-36270 CVE-2024-36281 CVE-2024-36286 CVE-2024-36288 CVE-2024-36477 CVE-2024-36478 CVE-2024-36479 CVE-2024-36481 CVE-2024-36484 CVE-2024-36489 CVE-2024-36971 CVE-2024-36972 CVE-2024-36973 CVE-2024-36974 CVE-2024-36978 CVE-2024-37021 CVE-2024-37026 CVE-2024-37078 CVE-2024-37354 CVE-2024-37356 CVE-2024-38306 CVE-2024-38381 CVE-2024-38384 CVE-2024-38385 CVE-2024-38388 CVE-2024-38390 CVE-2024-38618 CVE-2024-38619 CVE-2024-38621 CVE-2024-38622 CVE-2024-38623 CVE-2024-38624 CVE-2024-38625 CVE-2024-38627 CVE-2024-38628 CVE-2024-38629 CVE-2024-38630 CVE-2024-38632 CVE-2024-38633 CVE-2024-38634 CVE-2024-38635 CVE-2024-38636 CVE-2024-38637 CVE-2024-38659 CVE-2024-38661 CVE-2024-38662 CVE-2024-38663 CVE-2024-38664 CVE-2024-38667 CVE-2024-38780 CVE-2024-39276 CVE-2024-39277 CVE-2024-39291 CVE-2024-39296 CVE-2024-39298 CVE-2024-39301 CVE-2024-39371 CVE-2024-39461 CVE-2024-39462 CVE-2024-39463 CVE-2024-39464 CVE-2024-39465 CVE-2024-39466 CVE-2024-39467 CVE-2024-39468 CVE-2024-39469 CVE-2024-39470 CVE-2024-39471 CVE-2024-39473 CVE-2024-39474 CVE-2024-39475 CVE-2024-39478 CVE-2024-39479 CVE-2024-39480 CVE-2024-39481 CVE-2024-39483 CVE-2024-39485 CVE-2024-39488 CVE-2024-39489 CVE-2024-39490 CVE-2024-39491 CVE-2024-39492 CVE-2024-39493 CVE-2024-39494 CVE-2024-39495 CVE-2024-39496 CVE-2024-39497 CVE-2024-39498 CVE-2024-39499 CVE-2024-39500 CVE-2024-39501 CVE-2024-39502 CVE-2024-39503 CVE-2024-39504 CVE-2024-39505 CVE-2024-39506 CVE-2024-39507 CVE-2024-39508 CVE-2024-39509 CVE-2024-39510 CVE-2024-40899 CVE-2024-40900 CVE-2024-40901 CVE-2024-40902 CVE-2024-40903 CVE-2024-40904 CVE-2024-40905 CVE-2024-40906 CVE-2024-40908 CVE-2024-40909 CVE-2024-40910 CVE-2024-40911 CVE-2024-40912 CVE-2024-40913 CVE-2024-40914 CVE-2024-40915 CVE-2024-40916 CVE-2024-40917 CVE-2024-40918 CVE-2024-40919 CVE-2024-40920 CVE-2024-40921 CVE-2024-40922 CVE-2024-40923 CVE-2024-40924 CVE-2024-40925 CVE-2024-40926 CVE-2024-40927 CVE-2024-40928 CVE-2024-40929 CVE-2024-40930 CVE-2024-40931 CVE-2024-40932 CVE-2024-40933 CVE-2024-40934 CVE-2024-40935 CVE-2024-40936 CVE-2024-40937 CVE-2024-40938 CVE-2024-40939 CVE-2024-40940 CVE-2024-40941 CVE-2024-40942 CVE-2024-40943 CVE-2024-40944 CVE-2024-40945 CVE-2024-40947 CVE-2024-40948 CVE-2024-40949 CVE-2024-40951 CVE-2024-40952 CVE-2024-40953 CVE-2024-40954 CVE-2024-40955 CVE-2024-40956 CVE-2024-40957 CVE-2024-40958 CVE-2024-40959 CVE-2024-40960 CVE-2024-40961 CVE-2024-40962 CVE-2024-40963 CVE-2024-40964 CVE-2024-40965 CVE-2024-40966 CVE-2024-40967 CVE-2024-40968 CVE-2024-40969 CVE-2024-40970 CVE-2024-40971 CVE-2024-40972 CVE-2024-40973 CVE-2024-40974 CVE-2024-40975 CVE-2024-40976 CVE-2024-40977 CVE-2024-40978 CVE-2024-40979 CVE-2024-40980 CVE-2024-40981 CVE-2024-40982 CVE-2024-40983 CVE-2024-40984 CVE-2024-40985 CVE-2024-40986 CVE-2024-40987 CVE-2024-40988 CVE-2024-40989 CVE-2024-40990 CVE-2024-40992 CVE-2024-40994 CVE-2024-40995 CVE-2024-40996 CVE-2024-40997 CVE-2024-40998 CVE-2024-40999 CVE-2024-41000 CVE-2024-41001 CVE-2024-41002 CVE-2024-41003 CVE-2024-41004 CVE-2024-41005 CVE-2024-41006 CVE-2024-41040 CVE-2024-42078 CVE-2024-42148 USN-6999-2 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Chenyuan Yang discovered that the CEC driver driver in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2024-23848) It was discovered that the JFS file system contained an out-of-bounds read vulnerability when printing xattr debug information. A local attacker could use this to cause a denial of service (system crash). (CVE-2024-40902) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PA-RISC architecture; - PowerPC architecture; - RISC-V architecture; - x86 architecture; - Block layer subsystem; - ACPI drivers; - Drivers core; - Null block device driver; - Character device driver; - TPM device driver; - Clock framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - Buffer Sharing and Synchronization framework; - DMA engine subsystem; - EFI core; - FPGA Framework; - GPU drivers; - Greybus drivers; - HID subsystem; - HW tracing; - I2C subsystem; - IIO subsystem; - InfiniBand drivers; - Input Device (Mouse) drivers; - Mailbox framework; - Media drivers; - Microchip PCI driver; - VMware VMCI Driver; - Network drivers; - PCI subsystem; - x86 platform drivers; - PTP clock framework; - S/390 drivers; - SCSI drivers; - SoundWire subsystem; - Sonic Silicon Backplane drivers; - Greybus lights staging drivers; - Thermal drivers; - TTY drivers; - USB subsystem; - VFIO drivers; - Framebuffer layer; - Watchdog drivers; - 9P distributed file system; - BTRFS file system; - File systems infrastructure; - Ext4 file system; - F2FS file system; - JFS file system; - Network file system server daemon; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - Tracing file system; - IOMMU subsystem; - Tracing infrastructure; - io_uring subsystem; - Core kernel; - BPF subsystem; - Kernel debugger infrastructure; - DMA mapping infrastructure; - IRQ subsystem; - Memory management; - 9P file system network protocol; - Amateur Radio drivers; - B.A.T.M.A.N. meshing protocol; - Ethernet bridge; - Networking core; - Ethtool driver; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - Netfilter; - NET/ROM layer; - NFC subsystem; - Network traffic control; - Sun RPC protocol; - TIPC protocol; - TLS protocol; - Unix domain sockets; - Wireless networking; - XFRM subsystem; - AppArmor security module; - Integrity Measurement Architecture(IMA) framework; - Landlock security; - Linux Security Modules (LSM) Framework; - SELinux security module; - Simplified Mandatory Access Control Kernel framework; - ALSA framework; - HD-audio driver; - SOF drivers; - KVM core; (CVE-2024-40978, CVE-2024-39504, CVE-2024-39483, CVE-2024-36478, CVE-2024-40928, CVE-2024-36971, CVE-2024-40947, CVE-2024-31076, CVE-2024-40934, CVE-2024-40909, CVE-2024-40962, CVE-2024-38635, CVE-2024-38632, CVE-2024-40912, CVE-2024-40967, CVE-2024-39492, CVE-2024-40974, CVE-2024-39466, CVE-2024-40939, CVE-2024-40988, CVE-2024-40951, CVE-2024-41005, CVE-2024-40968, CVE-2024-39493, CVE-2024-40949, CVE-2022-48772, CVE-2024-40944, CVE-2024-40998, CVE-2024-39490, CVE-2024-39467, CVE-2024-42078, CVE-2024-40953, CVE-2024-40990, CVE-2024-40902, CVE-2024-39461, CVE-2024-39301, CVE-2024-36978, CVE-2024-39475, CVE-2024-39496, CVE-2024-40901, CVE-2024-40985, CVE-2024-33621, CVE-2024-38663, CVE-2024-39497, CVE-2024-40937, CVE-2024-40941, CVE-2024-40987, CVE-2024-40918, CVE-2024-32936, CVE-2024-40999, CVE-2024-40938, CVE-2024-39488, CVE-2024-39510, CVE-2024-40924, CVE-2024-38661, CVE-2024-40989, CVE-2024-39509, CVE-2024-40983, CVE-2024-39471, CVE-2024-39502, CVE-2024-39508, CVE-2024-39371, CVE-2024-40982, CVE-2024-40910, CVE-2024-40903, CVE-2024-39296, CVE-2024-39507, CVE-2024-40906, CVE-2024-37354, CVE-2024-40905, CVE-2024-34027, CVE-2024-38618, CVE-2024-40900, CVE-2024-39469, CVE-2024-38662, CVE-2024-35247, CVE-2024-40922, CVE-2024-40926, CVE-2024-39503, CVE-2024-40899, CVE-2024-40977, CVE-2024-38634, CVE-2024-40933, CVE-2024-40992, CVE-2024-40904, CVE-2024-36479, CVE-2024-40996, CVE-2024-40957, CVE-2024-40931, CVE-2024-39291, CVE-2024-38780, CVE-2024-39277, CVE-2024-38628, CVE-2024-40932, CVE-2024-41004, CVE-2024-33847, CVE-2024-40972, CVE-2024-40945, CVE-2023-52884, CVE-2024-38664, CVE-2024-39462, CVE-2024-40965, CVE-2024-38388, CVE-2024-40916, CVE-2024-36489, CVE-2024-40975, CVE-2024-40942, CVE-2024-40995, CVE-2024-40997, CVE-2024-38385, CVE-2024-40911, CVE-2024-39474, CVE-2024-39470, CVE-2024-41000, CVE-2024-36015, CVE-2024-38633, CVE-2024-40943, CVE-2024-39489, CVE-2024-36477, CVE-2024-39491, CVE-2024-40919, CVE-2024-40914, CVE-2024-40966, CVE-2024-41002, CVE-2024-40960, CVE-2024-38624, CVE-2024-40964, CVE-2024-40936, CVE-2024-40913, CVE-2024-40955, CVE-2024-37026, CVE-2024-38384, CVE-2024-37078, CVE-2024-36244, CVE-2024-38622, CVE-2024-39485, CVE-2024-39479, CVE-2024-39505, CVE-2024-36973, CVE-2024-39498, CVE-2024-40908, CVE-2024-37356, CVE-2024-39480, CVE-2024-38381, CVE-2024-40940, CVE-2024-40980, CVE-2024-39276, CVE-2024-39499, CVE-2024-36484, CVE-2024-38636, CVE-2024-38390, CVE-2024-38619, CVE-2024-39478, CVE-2024-40959, CVE-2024-36288, CVE-2024-40935, CVE-2024-41006, CVE-2024-38625, CVE-2024-36972, CVE-2024-39298, CVE-2024-39468, CVE-2024-40970, CVE-2024-37021, CVE-2024-40981, CVE-2024-40921, CVE-2024-34777, CVE-2024-39500, CVE-2024-40927, CVE-2024-40979, CVE-2024-38627, CVE-2024-39501, CVE-2024-39481, CVE-2024-40917, CVE-2024-40956, CVE-2024-42148, CVE-2024-36481, CVE-2024-40925, CVE-2024-40986, CVE-2024-40948, CVE-2024-41003, CVE-2024-39506, CVE-2024-40952, CVE-2024-38306, CVE-2024-40971, CVE-2024-41001, CVE-2024-40973, CVE-2024-36281, CVE-2024-40923, CVE-2024-39473, CVE-2024-38637, CVE-2024-40984, CVE-2024-39463, CVE-2024-41040, CVE-2024-38623, CVE-2024-40954, CVE-2024-36286, CVE-2024-38667, CVE-2024-39465, CVE-2024-40915, CVE-2024-33619, CVE-2024-40920, CVE-2024-40969, CVE-2024-38659, CVE-2024-34030, CVE-2024-38630, CVE-2024-40976, CVE-2024-36974, CVE-2024-40930, CVE-2024-39464, CVE-2024-38621, CVE-2024-40958, CVE-2024-40994, CVE-2024-39494, CVE-2024-40961, CVE-2024-39495, CVE-2024-40963, CVE-2024-36270, CVE-2024-38629, CVE-2024-40929) Update Instructions: Run `sudo pro fix USN-6999-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1011-raspi - 6.8.0-1011.12 linux-headers-6.8.0-1011-raspi - 6.8.0-1011.12 linux-headers-raspi - 6.8.0-1011.12 linux-image-6.8.0-1011-raspi - 6.8.0-1011.12 linux-image-raspi - 6.8.0-1011.12 linux-modules-6.8.0-1011-raspi - 6.8.0-1011.12 linux-raspi - 6.8.0-1011.12 linux-raspi-headers-6.8.0-1011 - 6.8.0-1011.12 linux-raspi-tools-6.8.0-1011 - 6.8.0-1011.12 linux-tools-6.8.0-1011-raspi - 6.8.0-1011.12 linux-tools-raspi - 6.8.0-1011.12 No subscription required High CVE-2022-48772 CVE-2023-52884 CVE-2024-23848 CVE-2024-31076 CVE-2024-32936 CVE-2024-33619 CVE-2024-33621 CVE-2024-33847 CVE-2024-34027 CVE-2024-34030 CVE-2024-34777 CVE-2024-35247 CVE-2024-36015 CVE-2024-36244 CVE-2024-36270 CVE-2024-36281 CVE-2024-36286 CVE-2024-36288 CVE-2024-36477 CVE-2024-36478 CVE-2024-36479 CVE-2024-36481 CVE-2024-36484 CVE-2024-36489 CVE-2024-36971 CVE-2024-36972 CVE-2024-36973 CVE-2024-36974 CVE-2024-36978 CVE-2024-37021 CVE-2024-37026 CVE-2024-37078 CVE-2024-37354 CVE-2024-37356 CVE-2024-38306 CVE-2024-38381 CVE-2024-38384 CVE-2024-38385 CVE-2024-38388 CVE-2024-38390 CVE-2024-38618 CVE-2024-38619 CVE-2024-38621 CVE-2024-38622 CVE-2024-38623 CVE-2024-38624 CVE-2024-38625 CVE-2024-38627 CVE-2024-38628 CVE-2024-38629 CVE-2024-38630 CVE-2024-38632 CVE-2024-38633 CVE-2024-38634 CVE-2024-38635 CVE-2024-38636 CVE-2024-38637 CVE-2024-38659 CVE-2024-38661 CVE-2024-38662 CVE-2024-38663 CVE-2024-38664 CVE-2024-38667 CVE-2024-38780 CVE-2024-39276 CVE-2024-39277 CVE-2024-39291 CVE-2024-39296 CVE-2024-39298 CVE-2024-39301 CVE-2024-39371 CVE-2024-39461 CVE-2024-39462 CVE-2024-39463 CVE-2024-39464 CVE-2024-39465 CVE-2024-39466 CVE-2024-39467 CVE-2024-39468 CVE-2024-39469 CVE-2024-39470 CVE-2024-39471 CVE-2024-39473 CVE-2024-39474 CVE-2024-39475 CVE-2024-39478 CVE-2024-39479 CVE-2024-39480 CVE-2024-39481 CVE-2024-39483 CVE-2024-39485 CVE-2024-39488 CVE-2024-39489 CVE-2024-39490 CVE-2024-39491 CVE-2024-39492 CVE-2024-39493 CVE-2024-39494 CVE-2024-39495 CVE-2024-39496 CVE-2024-39497 CVE-2024-39498 CVE-2024-39499 CVE-2024-39500 CVE-2024-39501 CVE-2024-39502 CVE-2024-39503 CVE-2024-39504 CVE-2024-39505 CVE-2024-39506 CVE-2024-39507 CVE-2024-39508 CVE-2024-39509 CVE-2024-39510 CVE-2024-40899 CVE-2024-40900 CVE-2024-40901 CVE-2024-40902 CVE-2024-40903 CVE-2024-40904 CVE-2024-40905 CVE-2024-40906 CVE-2024-40908 CVE-2024-40909 CVE-2024-40910 CVE-2024-40911 CVE-2024-40912 CVE-2024-40913 CVE-2024-40914 CVE-2024-40915 CVE-2024-40916 CVE-2024-40917 CVE-2024-40918 CVE-2024-40919 CVE-2024-40920 CVE-2024-40921 CVE-2024-40922 CVE-2024-40923 CVE-2024-40924 CVE-2024-40925 CVE-2024-40926 CVE-2024-40927 CVE-2024-40928 CVE-2024-40929 CVE-2024-40930 CVE-2024-40931 CVE-2024-40932 CVE-2024-40933 CVE-2024-40934 CVE-2024-40935 CVE-2024-40936 CVE-2024-40937 CVE-2024-40938 CVE-2024-40939 CVE-2024-40940 CVE-2024-40941 CVE-2024-40942 CVE-2024-40943 CVE-2024-40944 CVE-2024-40945 CVE-2024-40947 CVE-2024-40948 CVE-2024-40949 CVE-2024-40951 CVE-2024-40952 CVE-2024-40953 CVE-2024-40954 CVE-2024-40955 CVE-2024-40956 CVE-2024-40957 CVE-2024-40958 CVE-2024-40959 CVE-2024-40960 CVE-2024-40961 CVE-2024-40962 CVE-2024-40963 CVE-2024-40964 CVE-2024-40965 CVE-2024-40966 CVE-2024-40967 CVE-2024-40968 CVE-2024-40969 CVE-2024-40970 CVE-2024-40971 CVE-2024-40972 CVE-2024-40973 CVE-2024-40974 CVE-2024-40975 CVE-2024-40976 CVE-2024-40977 CVE-2024-40978 CVE-2024-40979 CVE-2024-40980 CVE-2024-40981 CVE-2024-40982 CVE-2024-40983 CVE-2024-40984 CVE-2024-40985 CVE-2024-40986 CVE-2024-40987 CVE-2024-40988 CVE-2024-40989 CVE-2024-40990 CVE-2024-40992 CVE-2024-40994 CVE-2024-40995 CVE-2024-40996 CVE-2024-40997 CVE-2024-40998 CVE-2024-40999 CVE-2024-41000 CVE-2024-41001 CVE-2024-41002 CVE-2024-41003 CVE-2024-41004 CVE-2024-41005 CVE-2024-41006 CVE-2024-41040 CVE-2024-42078 CVE-2024-42148 USN-7000-1 -- Expat vulnerabilities Ubuntu 24.04 LTS Shang-Hung Wan discovered that Expat did not properly handle certain function calls when a negative input length was provided. An attacker could use this issue to cause a denial of service or possibly execute arbitrary code. (CVE-2024-45490) Shang-Hung Wan discovered that Expat did not properly handle the potential for an integer overflow on 32-bit platforms. An attacker could use this issue to cause a denial of service or possibly execute arbitrary code. (CVE-2024-45491, CVE-2024-45492) Update Instructions: Run `sudo pro fix USN-7000-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: expat - 2.6.1-2ubuntu0.1 libexpat1 - 2.6.1-2ubuntu0.1 libexpat1-dev - 2.6.1-2ubuntu0.1 No subscription required Medium CVE-2024-45490 CVE-2024-45491 CVE-2024-45492 USN-7001-2 -- xmltok library vulnerabilities Ubuntu 24.04 LTS USN-7001-1 fixed vulnerabilities in xmltol library. This update provides the corresponding updates for Ubuntu 24.04 LTS. Original advisory details: Shang-Hung Wan discovered that Expat, contained within the xmltok library, did not properly handle certain function calls when a negative input length was provided. An attacker could use this issue to cause a denial of service or possibly execute arbitrary code. (CVE-2024-45490) Shang-Hung Wan discovered that Expat, contained within the xmltok library, did not properly handle the potential for an integer overflow on 32-bit platforms. An attacker could use this issue to cause a denial of service or possibly execute arbitrary code. (CVE-2024-45491) Update Instructions: Run `sudo pro fix USN-7001-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libxmltok1-dev - 1.2-4.1ubuntu2.24.0.4.1+esm1 libxmltok1t64 - 1.2-4.1ubuntu2.24.0.4.1+esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2024-45490 CVE-2024-45491 USN-7002-1 -- Setuptools vulnerability Ubuntu 24.04 LTS It was discovered that setuptools was vulnerable to remote code execution. An attacker could possibly use this issue to execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7002-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-setuptools-doc - 68.1.2-2ubuntu1.1 python3-pkg-resources - 68.1.2-2ubuntu1.1 python3-setuptools - 68.1.2-2ubuntu1.1 python3-setuptools-whl - 68.1.2-2ubuntu1.1 No subscription required Medium CVE-2024-6345 USN-7004-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Chenyuan Yang discovered that the CEC driver driver in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2024-23848) It was discovered that the JFS file system contained an out-of-bounds read vulnerability when printing xattr debug information. A local attacker could use this to cause a denial of service (system crash). (CVE-2024-40902) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PA-RISC architecture; - PowerPC architecture; - RISC-V architecture; - x86 architecture; - Block layer subsystem; - ACPI drivers; - Drivers core; - Null block device driver; - Character device driver; - TPM device driver; - Clock framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - Buffer Sharing and Synchronization framework; - DMA engine subsystem; - EFI core; - FPGA Framework; - GPU drivers; - Greybus drivers; - HID subsystem; - HW tracing; - I2C subsystem; - IIO subsystem; - InfiniBand drivers; - Input Device (Mouse) drivers; - Mailbox framework; - Media drivers; - Microchip PCI driver; - VMware VMCI Driver; - Network drivers; - PCI subsystem; - x86 platform drivers; - PTP clock framework; - S/390 drivers; - SCSI drivers; - SoundWire subsystem; - Sonic Silicon Backplane drivers; - Greybus lights staging drivers; - Thermal drivers; - TTY drivers; - USB subsystem; - VFIO drivers; - Framebuffer layer; - Watchdog drivers; - 9P distributed file system; - BTRFS file system; - File systems infrastructure; - Ext4 file system; - F2FS file system; - JFS file system; - Network file system server daemon; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - Tracing file system; - IOMMU subsystem; - Tracing infrastructure; - io_uring subsystem; - Core kernel; - BPF subsystem; - Kernel debugger infrastructure; - DMA mapping infrastructure; - IRQ subsystem; - Memory management; - 9P file system network protocol; - Amateur Radio drivers; - B.A.T.M.A.N. meshing protocol; - Ethernet bridge; - Networking core; - Ethtool driver; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - Netfilter; - NET/ROM layer; - NFC subsystem; - Network traffic control; - Sun RPC protocol; - TIPC protocol; - TLS protocol; - Unix domain sockets; - Wireless networking; - XFRM subsystem; - AppArmor security module; - Integrity Measurement Architecture(IMA) framework; - Landlock security; - Linux Security Modules (LSM) Framework; - SELinux security module; - Simplified Mandatory Access Control Kernel framework; - ALSA framework; - HD-audio driver; - SOF drivers; - KVM core; (CVE-2024-36270, CVE-2024-38627, CVE-2024-39508, CVE-2024-41001, CVE-2024-38634, CVE-2024-40979, CVE-2024-40903, CVE-2024-34030, CVE-2024-38621, CVE-2024-34027, CVE-2024-39504, CVE-2024-38385, CVE-2024-36288, CVE-2024-39301, CVE-2024-38628, CVE-2024-42270, CVE-2024-39507, CVE-2024-36286, CVE-2024-40960, CVE-2024-36479, CVE-2024-41002, CVE-2024-36974, CVE-2024-40943, CVE-2024-40976, CVE-2024-38662, CVE-2024-40995, CVE-2024-39497, CVE-2024-31076, CVE-2024-39371, CVE-2024-40983, CVE-2024-40985, CVE-2024-38618, CVE-2024-40914, CVE-2024-40989, CVE-2024-40973, CVE-2024-38663, CVE-2024-39463, CVE-2024-38633, CVE-2024-36978, CVE-2024-40970, CVE-2024-40932, CVE-2024-39480, CVE-2024-39471, CVE-2024-40962, CVE-2024-40986, CVE-2024-40937, CVE-2024-39469, CVE-2024-40904, CVE-2024-39466, CVE-2024-38388, CVE-2024-39494, CVE-2024-41004, CVE-2024-38381, CVE-2022-48772, CVE-2024-33847, CVE-2024-40969, CVE-2024-40957, CVE-2024-40933, CVE-2024-37354, CVE-2024-39468, CVE-2024-40917, CVE-2024-38623, CVE-2024-40958, CVE-2024-39502, CVE-2024-38384, CVE-2024-39506, CVE-2024-40940, CVE-2024-34777, CVE-2024-41005, CVE-2024-39470, CVE-2024-39464, CVE-2024-39492, CVE-2024-38629, CVE-2024-39505, CVE-2024-40952, CVE-2024-40941, CVE-2024-39474, CVE-2024-38664, CVE-2024-40929, CVE-2024-39489, CVE-2024-40953, CVE-2024-40916, CVE-2024-40911, CVE-2024-32936, CVE-2024-40934, CVE-2024-37078, CVE-2024-39483, CVE-2024-40967, CVE-2024-40924, CVE-2024-39462, CVE-2024-40981, CVE-2024-36281, CVE-2024-39291, CVE-2024-39481, CVE-2024-40978, CVE-2024-38622, CVE-2024-39503, CVE-2024-40956, CVE-2023-52884, CVE-2024-39498, CVE-2024-38661, CVE-2024-40918, CVE-2024-39479, CVE-2024-40915, CVE-2024-39501, CVE-2024-39488, CVE-2024-40925, CVE-2024-40930, CVE-2024-40961, CVE-2024-40951, CVE-2024-38636, CVE-2024-39491, CVE-2024-39495, CVE-2024-39509, CVE-2024-40947, CVE-2024-36477, CVE-2024-36478, CVE-2024-42148, CVE-2024-39473, CVE-2024-39510, CVE-2024-40923, CVE-2024-38624, CVE-2024-38659, CVE-2024-36971, CVE-2024-38625, CVE-2024-40913, CVE-2024-35247, CVE-2024-36481, CVE-2024-36484, CVE-2024-40928, CVE-2024-40927, CVE-2024-40944, CVE-2024-39485, CVE-2024-36244, CVE-2024-40910, CVE-2024-40945, CVE-2024-33621, CVE-2024-38667, CVE-2024-40992, CVE-2024-40908, CVE-2024-40901, CVE-2024-40906, CVE-2024-38390, CVE-2024-40900, CVE-2024-41006, CVE-2024-40968, CVE-2024-40966, CVE-2024-40977, CVE-2024-33619, CVE-2024-39496, CVE-2024-38630, CVE-2024-40920, CVE-2024-39499, CVE-2024-40899, CVE-2024-41003, CVE-2024-40964, CVE-2024-40922, CVE-2024-38632, CVE-2024-40931, CVE-2024-40982, CVE-2024-40971, CVE-2024-39277, CVE-2024-39467, CVE-2024-36015, CVE-2024-40954, CVE-2024-40938, CVE-2024-40921, CVE-2024-39296, CVE-2024-41040, CVE-2024-40965, CVE-2024-39465, CVE-2024-40984, CVE-2024-39478, CVE-2024-40990, CVE-2024-40926, CVE-2024-40980, CVE-2024-40905, CVE-2024-39475, CVE-2024-40959, CVE-2024-40902, CVE-2024-38780, CVE-2024-40935, CVE-2024-37021, CVE-2024-40997, CVE-2024-40936, CVE-2024-40987, CVE-2024-40939, CVE-2024-37026, CVE-2024-36973, CVE-2024-40972, CVE-2024-42078, CVE-2024-38306, CVE-2024-40949, CVE-2024-36489, CVE-2024-38637, CVE-2024-40912, CVE-2024-39276, CVE-2024-39493, CVE-2024-40994, CVE-2024-40948, CVE-2024-36972, CVE-2024-40942, CVE-2024-37356, CVE-2024-38619, CVE-2024-40988, CVE-2024-38635, CVE-2024-41000, CVE-2024-40955, CVE-2024-40999, CVE-2024-40974, CVE-2024-39490, CVE-2024-39298, CVE-2024-40975, CVE-2024-40998, CVE-2024-40996, CVE-2024-40963, CVE-2024-40909, CVE-2024-40919, CVE-2024-39500, CVE-2024-39461) Update Instructions: Run `sudo pro fix USN-7004-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-azure - 6.8.0-1014.16 linux-azure-cloud-tools-6.8.0-1014 - 6.8.0-1014.16 linux-azure-fde - 6.8.0-1014.16 linux-azure-headers-6.8.0-1014 - 6.8.0-1014.16 linux-azure-tools-6.8.0-1014 - 6.8.0-1014.16 linux-buildinfo-6.8.0-1014-azure - 6.8.0-1014.16 linux-cloud-tools-6.8.0-1014-azure - 6.8.0-1014.16 linux-cloud-tools-azure - 6.8.0-1014.16 linux-headers-6.8.0-1014-azure - 6.8.0-1014.16 linux-headers-azure - 6.8.0-1014.16 linux-image-6.8.0-1014-azure - 6.8.0-1014.16 linux-image-6.8.0-1014-azure-fde - 6.8.0-1014.16 linux-image-azure - 6.8.0-1014.16 linux-image-azure-fde - 6.8.0-1014.16 linux-image-unsigned-6.8.0-1014-azure - 6.8.0-1014.16 linux-modules-6.8.0-1014-azure - 6.8.0-1014.16 linux-modules-extra-6.8.0-1014-azure - 6.8.0-1014.16 linux-modules-extra-azure - 6.8.0-1014.16 linux-modules-involflt-6.8.0-1014-azure - 6.8.0-1014.16 linux-modules-involflt-azure - 6.8.0-1014.16 linux-modules-iwlwifi-6.8.0-1014-azure - 6.8.0-1014.16 linux-modules-iwlwifi-azure - 6.8.0-1014.16 linux-tools-6.8.0-1014-azure - 6.8.0-1014.16 linux-tools-azure - 6.8.0-1014.16 No subscription required High CVE-2022-48772 CVE-2023-52884 CVE-2024-23848 CVE-2024-31076 CVE-2024-32936 CVE-2024-33619 CVE-2024-33621 CVE-2024-33847 CVE-2024-34027 CVE-2024-34030 CVE-2024-34777 CVE-2024-35247 CVE-2024-36015 CVE-2024-36244 CVE-2024-36270 CVE-2024-36281 CVE-2024-36286 CVE-2024-36288 CVE-2024-36477 CVE-2024-36478 CVE-2024-36479 CVE-2024-36481 CVE-2024-36484 CVE-2024-36489 CVE-2024-36971 CVE-2024-36972 CVE-2024-36973 CVE-2024-36974 CVE-2024-36978 CVE-2024-37021 CVE-2024-37026 CVE-2024-37078 CVE-2024-37354 CVE-2024-37356 CVE-2024-38306 CVE-2024-38381 CVE-2024-38384 CVE-2024-38385 CVE-2024-38388 CVE-2024-38390 CVE-2024-38618 CVE-2024-38619 CVE-2024-38621 CVE-2024-38622 CVE-2024-38623 CVE-2024-38624 CVE-2024-38625 CVE-2024-38627 CVE-2024-38628 CVE-2024-38629 CVE-2024-38630 CVE-2024-38632 CVE-2024-38633 CVE-2024-38634 CVE-2024-38635 CVE-2024-38636 CVE-2024-38637 CVE-2024-38659 CVE-2024-38661 CVE-2024-38662 CVE-2024-38663 CVE-2024-38664 CVE-2024-38667 CVE-2024-38780 CVE-2024-39276 CVE-2024-39277 CVE-2024-39291 CVE-2024-39296 CVE-2024-39298 CVE-2024-39301 CVE-2024-39371 CVE-2024-39461 CVE-2024-39462 CVE-2024-39463 CVE-2024-39464 CVE-2024-39465 CVE-2024-39466 CVE-2024-39467 CVE-2024-39468 CVE-2024-39469 CVE-2024-39470 CVE-2024-39471 CVE-2024-39473 CVE-2024-39474 CVE-2024-39475 CVE-2024-39478 CVE-2024-39479 CVE-2024-39480 CVE-2024-39481 CVE-2024-39483 CVE-2024-39485 CVE-2024-39488 CVE-2024-39489 CVE-2024-39490 CVE-2024-39491 CVE-2024-39492 CVE-2024-39493 CVE-2024-39494 CVE-2024-39495 CVE-2024-39496 CVE-2024-39497 CVE-2024-39498 CVE-2024-39499 CVE-2024-39500 CVE-2024-39501 CVE-2024-39502 CVE-2024-39503 CVE-2024-39504 CVE-2024-39505 CVE-2024-39506 CVE-2024-39507 CVE-2024-39508 CVE-2024-39509 CVE-2024-39510 CVE-2024-40899 CVE-2024-40900 CVE-2024-40901 CVE-2024-40902 CVE-2024-40903 CVE-2024-40904 CVE-2024-40905 CVE-2024-40906 CVE-2024-40908 CVE-2024-40909 CVE-2024-40910 CVE-2024-40911 CVE-2024-40912 CVE-2024-40913 CVE-2024-40914 CVE-2024-40915 CVE-2024-40916 CVE-2024-40917 CVE-2024-40918 CVE-2024-40919 CVE-2024-40920 CVE-2024-40921 CVE-2024-40922 CVE-2024-40923 CVE-2024-40924 CVE-2024-40925 CVE-2024-40926 CVE-2024-40927 CVE-2024-40928 CVE-2024-40929 CVE-2024-40930 CVE-2024-40931 CVE-2024-40932 CVE-2024-40933 CVE-2024-40934 CVE-2024-40935 CVE-2024-40936 CVE-2024-40937 CVE-2024-40938 CVE-2024-40939 CVE-2024-40940 CVE-2024-40941 CVE-2024-40942 CVE-2024-40943 CVE-2024-40944 CVE-2024-40945 CVE-2024-40947 CVE-2024-40948 CVE-2024-40949 CVE-2024-40951 CVE-2024-40952 CVE-2024-40953 CVE-2024-40954 CVE-2024-40955 CVE-2024-40956 CVE-2024-40957 CVE-2024-40958 CVE-2024-40959 CVE-2024-40960 CVE-2024-40961 CVE-2024-40962 CVE-2024-40963 CVE-2024-40964 CVE-2024-40965 CVE-2024-40966 CVE-2024-40967 CVE-2024-40968 CVE-2024-40969 CVE-2024-40970 CVE-2024-40971 CVE-2024-40972 CVE-2024-40973 CVE-2024-40974 CVE-2024-40975 CVE-2024-40976 CVE-2024-40977 CVE-2024-40978 CVE-2024-40979 CVE-2024-40980 CVE-2024-40981 CVE-2024-40982 CVE-2024-40983 CVE-2024-40984 CVE-2024-40985 CVE-2024-40986 CVE-2024-40987 CVE-2024-40988 CVE-2024-40989 CVE-2024-40990 CVE-2024-40992 CVE-2024-40994 CVE-2024-40995 CVE-2024-40996 CVE-2024-40997 CVE-2024-40998 CVE-2024-40999 CVE-2024-41000 CVE-2024-41001 CVE-2024-41002 CVE-2024-41003 CVE-2024-41004 CVE-2024-41005 CVE-2024-41006 CVE-2024-41040 CVE-2024-42078 CVE-2024-42148 CVE-2024-42270 USN-7005-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Chenyuan Yang discovered that the CEC driver driver in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2024-23848) It was discovered that the JFS file system contained an out-of-bounds read vulnerability when printing xattr debug information. A local attacker could use this to cause a denial of service (system crash). (CVE-2024-40902) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PA-RISC architecture; - PowerPC architecture; - RISC-V architecture; - x86 architecture; - Block layer subsystem; - ACPI drivers; - Drivers core; - Null block device driver; - Character device driver; - Clock framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - Buffer Sharing and Synchronization framework; - DMA engine subsystem; - EFI core; - FPGA Framework; - GPU drivers; - Greybus drivers; - HID subsystem; - HW tracing; - I2C subsystem; - IIO subsystem; - InfiniBand drivers; - Input Device (Mouse) drivers; - Mailbox framework; - Media drivers; - Microchip PCI driver; - VMware VMCI Driver; - Network drivers; - PCI subsystem; - x86 platform drivers; - PTP clock framework; - S/390 drivers; - SCSI drivers; - SoundWire subsystem; - Sonic Silicon Backplane drivers; - Greybus lights staging drivers; - Thermal drivers; - TTY drivers; - USB subsystem; - VFIO drivers; - Framebuffer layer; - Watchdog drivers; - 9P distributed file system; - BTRFS file system; - File systems infrastructure; - Ext4 file system; - F2FS file system; - JFS file system; - Network file system server daemon; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - Tracing file system; - IOMMU subsystem; - Tracing infrastructure; - io_uring subsystem; - Core kernel; - BPF subsystem; - Kernel debugger infrastructure; - DMA mapping infrastructure; - IRQ subsystem; - Memory management; - 9P file system network protocol; - Amateur Radio drivers; - B.A.T.M.A.N. meshing protocol; - Ethernet bridge; - Networking core; - Ethtool driver; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - Netfilter; - NET/ROM layer; - NFC subsystem; - Network traffic control; - Sun RPC protocol; - TIPC protocol; - TLS protocol; - Unix domain sockets; - Wireless networking; - XFRM subsystem; - AppArmor security module; - Integrity Measurement Architecture(IMA) framework; - Landlock security; - Linux Security Modules (LSM) Framework; - SELinux security module; - Simplified Mandatory Access Control Kernel framework; - ALSA framework; - HD-audio driver; - SOF drivers; - KVM core; (CVE-2024-40963, CVE-2024-40994, CVE-2024-36481, CVE-2024-39301, CVE-2024-38390, CVE-2024-40976, CVE-2024-40934, CVE-2024-40902, CVE-2024-40916, CVE-2024-39298, CVE-2024-38659, CVE-2024-38384, CVE-2024-38635, CVE-2024-39494, CVE-2024-40926, CVE-2024-40956, CVE-2024-40948, CVE-2024-40920, CVE-2024-38624, CVE-2024-39498, CVE-2024-38780, CVE-2024-39503, CVE-2024-40919, CVE-2024-39505, CVE-2024-40988, CVE-2024-36972, CVE-2024-36974, CVE-2024-39495, CVE-2024-40992, CVE-2024-36015, CVE-2024-38618, CVE-2024-39478, CVE-2024-40975, CVE-2024-39507, CVE-2024-39479, CVE-2024-39291, CVE-2024-40925, CVE-2024-39493, CVE-2024-41005, CVE-2024-40932, CVE-2024-39467, CVE-2024-40973, CVE-2024-38634, CVE-2024-34027, CVE-2024-39462, CVE-2024-40949, CVE-2024-40908, CVE-2024-40929, CVE-2024-38662, CVE-2024-39489, CVE-2024-40953, CVE-2024-38306, CVE-2024-40915, CVE-2024-39470, CVE-2024-40969, CVE-2024-31076, CVE-2024-38663, CVE-2024-38629, CVE-2024-38633, CVE-2024-40959, CVE-2024-39475, CVE-2024-40947, CVE-2024-40971, CVE-2024-40979, CVE-2024-40996, CVE-2024-36484, CVE-2024-40960, CVE-2022-48772, CVE-2024-33619, CVE-2024-40923, CVE-2024-41006, CVE-2024-39474, CVE-2024-40944, CVE-2024-39473, CVE-2024-39469, CVE-2024-40914, CVE-2024-40900, CVE-2023-52884, CVE-2024-40931, CVE-2024-38664, CVE-2024-41004, CVE-2024-38636, CVE-2024-41001, CVE-2024-39497, CVE-2024-40974, CVE-2024-42078, CVE-2024-40954, CVE-2024-39483, CVE-2024-40978, CVE-2024-40952, CVE-2024-39481, CVE-2024-40955, CVE-2024-39471, CVE-2024-41000, CVE-2024-40972, CVE-2024-40957, CVE-2024-40913, CVE-2024-36478, CVE-2024-40984, CVE-2024-40990, CVE-2024-39510, CVE-2024-38381, CVE-2024-39277, CVE-2024-39464, CVE-2024-40995, CVE-2024-40905, CVE-2024-40986, CVE-2024-36971, CVE-2024-39480, CVE-2024-40938, CVE-2024-39509, CVE-2024-40982, CVE-2024-39500, CVE-2024-37026, CVE-2024-40965, CVE-2024-40961, CVE-2024-40989, CVE-2024-36973, CVE-2024-39504, CVE-2024-37354, CVE-2024-39488, CVE-2024-38661, CVE-2024-40998, CVE-2024-36489, CVE-2024-37021, CVE-2024-40917, CVE-2024-36281, CVE-2024-40964, CVE-2024-39496, CVE-2024-40980, CVE-2024-39465, CVE-2024-40983, CVE-2024-40936, CVE-2024-40899, CVE-2024-40933, CVE-2024-36288, CVE-2024-36286, CVE-2024-40987, CVE-2024-40939, CVE-2024-38667, CVE-2024-38628, CVE-2024-40977, CVE-2024-39276, CVE-2024-40941, CVE-2024-39491, CVE-2024-37078, CVE-2024-36978, CVE-2024-38623, CVE-2024-40962, CVE-2024-40935, CVE-2024-40997, CVE-2024-40981, CVE-2024-40922, CVE-2024-39461, CVE-2024-40999, CVE-2024-40918, CVE-2024-40927, CVE-2024-42148, CVE-2024-39371, CVE-2024-40985, CVE-2024-34030, CVE-2024-39485, CVE-2024-39296, CVE-2024-39466, CVE-2024-40909, CVE-2024-39492, CVE-2024-39502, CVE-2024-40903, CVE-2024-41040, CVE-2024-40968, CVE-2024-41003, CVE-2024-39499, CVE-2024-39508, CVE-2024-34777, CVE-2024-38627, CVE-2024-40930, CVE-2024-38388, CVE-2024-39490, CVE-2024-40906, CVE-2024-40940, CVE-2024-40937, CVE-2024-40911, CVE-2024-38385, CVE-2024-36244, CVE-2024-38622, CVE-2024-40958, CVE-2024-41002, CVE-2024-38621, CVE-2024-40970, CVE-2024-40904, CVE-2024-40928, CVE-2024-40967, CVE-2024-40951, CVE-2024-38637, CVE-2024-37356, CVE-2024-39463, CVE-2024-40912, CVE-2024-33847, CVE-2024-39468, CVE-2024-40942, CVE-2024-40910, CVE-2024-38625, CVE-2024-35247, CVE-2024-36479, CVE-2024-40943, CVE-2024-32936, CVE-2024-38630, CVE-2024-39501, CVE-2024-40966, CVE-2024-40921, CVE-2024-40924, CVE-2024-39506, CVE-2024-36270, CVE-2024-33621, CVE-2024-40945, CVE-2024-40901, CVE-2024-38632, CVE-2024-38619) Update Instructions: Run `sudo pro fix USN-7005-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-cloud-tools-nvidia - 6.8.0-1013.13 linux-headers-nvidia - 6.8.0-1013.13 linux-headers-nvidia-64k - 6.8.0-1013.13 linux-image-nvidia - 6.8.0-1013.13 linux-image-nvidia-64k - 6.8.0-1013.13 linux-modules-nvidia-fs-nvidia - 6.8.0-1013.13 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1013.13 linux-nvidia - 6.8.0-1013.13 linux-nvidia-64k - 6.8.0-1013.13 linux-tools-nvidia - 6.8.0-1013.13 linux-tools-nvidia-64k - 6.8.0-1013.13 No subscription required linux-buildinfo-6.8.0-1013-nvidia - 6.8.0-1013.14 linux-buildinfo-6.8.0-1013-nvidia-64k - 6.8.0-1013.14 linux-headers-6.8.0-1013-nvidia - 6.8.0-1013.14 linux-headers-6.8.0-1013-nvidia-64k - 6.8.0-1013.14 linux-image-6.8.0-1013-nvidia - 6.8.0-1013.14 linux-image-6.8.0-1013-nvidia-64k - 6.8.0-1013.14 linux-image-uc-6.8.0-1013-nvidia - 6.8.0-1013.14 linux-image-uc-6.8.0-1013-nvidia-64k - 6.8.0-1013.14 linux-image-unsigned-6.8.0-1013-nvidia - 6.8.0-1013.14 linux-image-unsigned-6.8.0-1013-nvidia-64k - 6.8.0-1013.14 linux-modules-6.8.0-1013-nvidia - 6.8.0-1013.14 linux-modules-6.8.0-1013-nvidia-64k - 6.8.0-1013.14 linux-modules-extra-6.8.0-1013-nvidia - 6.8.0-1013.14 linux-modules-nvidia-fs-6.8.0-1013-nvidia - 6.8.0-1013.14 linux-modules-nvidia-fs-6.8.0-1013-nvidia-64k - 6.8.0-1013.14 linux-nvidia-headers-6.8.0-1013 - 6.8.0-1013.14 linux-nvidia-tools-6.8.0-1013 - 6.8.0-1013.14 linux-nvidia-tools-host - 6.8.0-1013.14 linux-tools-6.8.0-1013-nvidia - 6.8.0-1013.14 linux-tools-6.8.0-1013-nvidia-64k - 6.8.0-1013.14 No subscription required linux-buildinfo-6.8.0-1013-nvidia-lowlatency - 6.8.0-1013.14.1 linux-buildinfo-6.8.0-1013-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1013.14.1 linux-headers-6.8.0-1013-nvidia-lowlatency - 6.8.0-1013.14.1 linux-headers-6.8.0-1013-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-headers-nvidia-lowlatency - 6.8.0-1013.14.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-image-6.8.0-1013-nvidia-lowlatency - 6.8.0-1013.14.1 linux-image-6.8.0-1013-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-image-nvidia-lowlatency - 6.8.0-1013.14.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-image-uc-6.8.0-1013-nvidia-lowlatency - 6.8.0-1013.14.1 linux-image-uc-6.8.0-1013-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-image-unsigned-6.8.0-1013-nvidia-lowlatency - 6.8.0-1013.14.1 linux-image-unsigned-6.8.0-1013-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-modules-6.8.0-1013-nvidia-lowlatency - 6.8.0-1013.14.1 linux-modules-6.8.0-1013-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-modules-extra-6.8.0-1013-nvidia-lowlatency - 6.8.0-1013.14.1 linux-modules-nvidia-fs-6.8.0-1013-nvidia-lowlatency - 6.8.0-1013.14.1 linux-modules-nvidia-fs-6.8.0-1013-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1013.14.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-nvidia-lowlatency - 6.8.0-1013.14.1 linux-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-nvidia-lowlatency-headers-6.8.0-1013 - 6.8.0-1013.14.1 linux-nvidia-lowlatency-tools-6.8.0-1013 - 6.8.0-1013.14.1 linux-nvidia-lowlatency-tools-host - 6.8.0-1013.14.1 linux-tools-6.8.0-1013-nvidia-lowlatency - 6.8.0-1013.14.1 linux-tools-6.8.0-1013-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-tools-nvidia-lowlatency - 6.8.0-1013.14.1 linux-tools-nvidia-lowlatency-64k - 6.8.0-1013.14.1 No subscription required High CVE-2022-48772 CVE-2023-52884 CVE-2024-23848 CVE-2024-31076 CVE-2024-32936 CVE-2024-33619 CVE-2024-33621 CVE-2024-33847 CVE-2024-34027 CVE-2024-34030 CVE-2024-34777 CVE-2024-35247 CVE-2024-36015 CVE-2024-36244 CVE-2024-36270 CVE-2024-36281 CVE-2024-36286 CVE-2024-36288 CVE-2024-36478 CVE-2024-36479 CVE-2024-36481 CVE-2024-36484 CVE-2024-36489 CVE-2024-36971 CVE-2024-36972 CVE-2024-36973 CVE-2024-36974 CVE-2024-36978 CVE-2024-37021 CVE-2024-37026 CVE-2024-37078 CVE-2024-37354 CVE-2024-37356 CVE-2024-38306 CVE-2024-38381 CVE-2024-38384 CVE-2024-38385 CVE-2024-38388 CVE-2024-38390 CVE-2024-38618 CVE-2024-38619 CVE-2024-38621 CVE-2024-38622 CVE-2024-38623 CVE-2024-38624 CVE-2024-38625 CVE-2024-38627 CVE-2024-38628 CVE-2024-38629 CVE-2024-38630 CVE-2024-38632 CVE-2024-38633 CVE-2024-38634 CVE-2024-38635 CVE-2024-38636 CVE-2024-38637 CVE-2024-38659 CVE-2024-38661 CVE-2024-38662 CVE-2024-38663 CVE-2024-38664 CVE-2024-38667 CVE-2024-38780 CVE-2024-39276 CVE-2024-39277 CVE-2024-39291 CVE-2024-39296 CVE-2024-39298 CVE-2024-39301 CVE-2024-39371 CVE-2024-39461 CVE-2024-39462 CVE-2024-39463 CVE-2024-39464 CVE-2024-39465 CVE-2024-39466 CVE-2024-39467 CVE-2024-39468 CVE-2024-39469 CVE-2024-39470 CVE-2024-39471 CVE-2024-39473 CVE-2024-39474 CVE-2024-39475 CVE-2024-39478 CVE-2024-39479 CVE-2024-39480 CVE-2024-39481 CVE-2024-39483 CVE-2024-39485 CVE-2024-39488 CVE-2024-39489 CVE-2024-39490 CVE-2024-39491 CVE-2024-39492 CVE-2024-39493 CVE-2024-39494 CVE-2024-39495 CVE-2024-39496 CVE-2024-39497 CVE-2024-39498 CVE-2024-39499 CVE-2024-39500 CVE-2024-39501 CVE-2024-39502 CVE-2024-39503 CVE-2024-39504 CVE-2024-39505 CVE-2024-39506 CVE-2024-39507 CVE-2024-39508 CVE-2024-39509 CVE-2024-39510 CVE-2024-40899 CVE-2024-40900 CVE-2024-40901 CVE-2024-40902 CVE-2024-40903 CVE-2024-40904 CVE-2024-40905 CVE-2024-40906 CVE-2024-40908 CVE-2024-40909 CVE-2024-40910 CVE-2024-40911 CVE-2024-40912 CVE-2024-40913 CVE-2024-40914 CVE-2024-40915 CVE-2024-40916 CVE-2024-40917 CVE-2024-40918 CVE-2024-40919 CVE-2024-40920 CVE-2024-40921 CVE-2024-40922 CVE-2024-40923 CVE-2024-40924 CVE-2024-40925 CVE-2024-40926 CVE-2024-40927 CVE-2024-40928 CVE-2024-40929 CVE-2024-40930 CVE-2024-40931 CVE-2024-40932 CVE-2024-40933 CVE-2024-40934 CVE-2024-40935 CVE-2024-40936 CVE-2024-40937 CVE-2024-40938 CVE-2024-40939 CVE-2024-40940 CVE-2024-40941 CVE-2024-40942 CVE-2024-40943 CVE-2024-40944 CVE-2024-40945 CVE-2024-40947 CVE-2024-40948 CVE-2024-40949 CVE-2024-40951 CVE-2024-40952 CVE-2024-40953 CVE-2024-40954 CVE-2024-40955 CVE-2024-40956 CVE-2024-40957 CVE-2024-40958 CVE-2024-40959 CVE-2024-40960 CVE-2024-40961 CVE-2024-40962 CVE-2024-40963 CVE-2024-40964 CVE-2024-40965 CVE-2024-40966 CVE-2024-40967 CVE-2024-40968 CVE-2024-40969 CVE-2024-40970 CVE-2024-40971 CVE-2024-40972 CVE-2024-40973 CVE-2024-40974 CVE-2024-40975 CVE-2024-40976 CVE-2024-40977 CVE-2024-40978 CVE-2024-40979 CVE-2024-40980 CVE-2024-40981 CVE-2024-40982 CVE-2024-40983 CVE-2024-40984 CVE-2024-40985 CVE-2024-40986 CVE-2024-40987 CVE-2024-40988 CVE-2024-40989 CVE-2024-40990 CVE-2024-40992 CVE-2024-40994 CVE-2024-40995 CVE-2024-40996 CVE-2024-40997 CVE-2024-40998 CVE-2024-40999 CVE-2024-41000 CVE-2024-41001 CVE-2024-41002 CVE-2024-41003 CVE-2024-41004 CVE-2024-41005 CVE-2024-41006 CVE-2024-41040 CVE-2024-42078 CVE-2024-42148 USN-7010-1 -- DCMTK vulnerabilities Ubuntu 24.04 LTS Jinsheng Ba discovered that DCMTK incorrectly handled certain requests. If a user or an automated system were tricked into opening a certain specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 20.04 LTS. (CVE-2021-41687, CVE-2021-41688, CVE-2021-41689, CVE-2021-41690) Sharon Brizinov and Noam Moshe discovered that DCMTK incorrectly handled pointers. If a user or an automated system were tricked into opening a certain specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 20.04 LTS. (CVE-2022-2121) It was discovered that DCMTK incorrectly handled certain inputs. If a user or an automated system were tricked into opening a certain specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 20.04 LTS. (CVE-2022-43272) It was discovered that DCMTK incorrectly handled certain inputs. If a user or an automated system were tricked into opening a certain specially crafted input file, a remote attacker could possibly use this issue to execute arbitrary code. This issue was only addressed in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2024-28130) It was discovered that DCMTK incorrectly handled memory when processing an invalid incoming DIMSE message. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-34508, CVE-2024-34509) Update Instructions: Run `sudo pro fix USN-7010-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: dcmtk - 3.6.7-9.1ubuntu0.1~esm1 dcmtk-doc - 3.6.7-9.1ubuntu0.1~esm1 libdcmtk-dev - 3.6.7-9.1ubuntu0.1~esm1 libdcmtk17t64 - 3.6.7-9.1ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2021-41687 CVE-2021-41688 CVE-2021-41689 CVE-2021-41690 CVE-2022-2121 CVE-2022-43272 CVE-2024-28130 CVE-2024-34508 CVE-2024-34509 USN-7011-1 -- ClamAV vulnerabilities Ubuntu 24.04 LTS It was discovered that ClamAV incorrectly handled certain PDF files. A remote attacker could possibly use this issue to cause ClamAV to crash, resulting in a denial of service. (CVE-2024-20505) It was discovered that ClamAV incorrectly handled logfile privileges. A local attacker could use this issue to cause ClamAV to overwrite arbitrary files, possibly leading to privilege escalation. (CVE-2024-20506) Update Instructions: Run `sudo pro fix USN-7011-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: clamav - 1.0.7+dfsg-0ubuntu0.24.04.1 clamav-base - 1.0.7+dfsg-0ubuntu0.24.04.1 clamav-daemon - 1.0.7+dfsg-0ubuntu0.24.04.1 clamav-docs - 1.0.7+dfsg-0ubuntu0.24.04.1 clamav-freshclam - 1.0.7+dfsg-0ubuntu0.24.04.1 clamav-milter - 1.0.7+dfsg-0ubuntu0.24.04.1 clamav-testfiles - 1.0.7+dfsg-0ubuntu0.24.04.1 clamdscan - 1.0.7+dfsg-0ubuntu0.24.04.1 libclamav-dev - 1.0.7+dfsg-0ubuntu0.24.04.1 libclamav11t64 - 1.0.7+dfsg-0ubuntu0.24.04.1 No subscription required Medium CVE-2024-20505 CVE-2024-20506 USN-7012-1 -- curl vulnerability Ubuntu 24.04 LTS Hiroki Kurosawa discovered that curl incorrectly handled certain OCSP responses. This could result in bad certificates not being checked properly, contrary to expectations. Update Instructions: Run `sudo pro fix USN-7012-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: curl - 8.5.0-2ubuntu10.4 libcurl3t64-gnutls - 8.5.0-2ubuntu10.4 libcurl4-doc - 8.5.0-2ubuntu10.4 libcurl4-gnutls-dev - 8.5.0-2ubuntu10.4 libcurl4-openssl-dev - 8.5.0-2ubuntu10.4 libcurl4t64 - 8.5.0-2ubuntu10.4 No subscription required Medium CVE-2024-8096 USN-7014-1 -- nginx vulnerability Ubuntu 24.04 LTS It was discovered that the nginx ngx_http_mp4 module incorrectly handled certain malformed mp4 files. In environments where the mp4 directive is in use, a remote attacker could possibly use this issue to cause nginx to crash, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-7014-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libnginx-mod-http-geoip - 1.24.0-2ubuntu7.1 libnginx-mod-http-image-filter - 1.24.0-2ubuntu7.1 libnginx-mod-http-perl - 1.24.0-2ubuntu7.1 libnginx-mod-http-xslt-filter - 1.24.0-2ubuntu7.1 libnginx-mod-mail - 1.24.0-2ubuntu7.1 libnginx-mod-stream - 1.24.0-2ubuntu7.1 libnginx-mod-stream-geoip - 1.24.0-2ubuntu7.1 nginx - 1.24.0-2ubuntu7.1 nginx-common - 1.24.0-2ubuntu7.1 nginx-core - 1.24.0-2ubuntu7.1 nginx-dev - 1.24.0-2ubuntu7.1 nginx-doc - 1.24.0-2ubuntu7.1 nginx-extras - 1.24.0-2ubuntu7.1 nginx-full - 1.24.0-2ubuntu7.1 nginx-light - 1.24.0-2ubuntu7.1 No subscription required Medium CVE-2024-7347 USN-7015-1 -- Python vulnerabilities Ubuntu 24.04 LTS It was discovered that the Python email module incorrectly parsed email addresses that contain special characters. A remote attacker could possibly use this issue to bypass certain protection mechanisms. (CVE-2023-27043) It was discovered that Python allowed excessive backtracking while parsing certain tarfile headers. A remote attacker could possibly use this issue to cause Python to consume resources, leading to a denial of service. (CVE-2024-6232) It was discovered that the Python email module incorrectly quoted newlines for email headers. A remote attacker could possibly use this issue to perform header injection. (CVE-2024-6923) It was discovered that the Python http.cookies module incorrectly handled parsing cookies that contained backslashes for quoted characters. A remote attacker could possibly use this issue to cause Python to consume resources, leading to a denial of service. (CVE-2024-7592) It was discovered that the Python zipfile module incorrectly handled certain malformed zip files. A remote attacker could possibly use this issue to cause Python to stop responding, resulting in a denial of service. (CVE-2024-8088) Update Instructions: Run `sudo pro fix USN-7015-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: idle-python3.12 - 3.12.3-1ubuntu0.2 libpython3.12-dev - 3.12.3-1ubuntu0.2 libpython3.12-minimal - 3.12.3-1ubuntu0.2 libpython3.12-stdlib - 3.12.3-1ubuntu0.2 libpython3.12-testsuite - 3.12.3-1ubuntu0.2 libpython3.12t64 - 3.12.3-1ubuntu0.2 python3.12 - 3.12.3-1ubuntu0.2 python3.12-dev - 3.12.3-1ubuntu0.2 python3.12-doc - 3.12.3-1ubuntu0.2 python3.12-examples - 3.12.3-1ubuntu0.2 python3.12-full - 3.12.3-1ubuntu0.2 python3.12-minimal - 3.12.3-1ubuntu0.2 python3.12-nopie - 3.12.3-1ubuntu0.2 python3.12-venv - 3.12.3-1ubuntu0.2 No subscription required Medium CVE-2023-27043 CVE-2024-6232 CVE-2024-6923 CVE-2024-7592 CVE-2024-8088 USN-7016-1 -- FRR vulnerability Ubuntu 24.04 LTS Iggy Frankovic discovered that FRR incorrectly handled certain BGP messages. A remote attacker could possibly use this issue to cause FRR to crash, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-7016-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: frr - 8.4.4-1.1ubuntu6.2 frr-doc - 8.4.4-1.1ubuntu6.2 frr-pythontools - 8.4.4-1.1ubuntu6.2 frr-rpki-rtrlib - 8.4.4-1.1ubuntu6.2 frr-snmp - 8.4.4-1.1ubuntu6.2 No subscription required Medium CVE-2024-44070 USN-7020-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - GPU drivers; - Network drivers; - SCSI drivers; - F2FS file system; - BPF subsystem; - IPv4 networking; (CVE-2024-42160, CVE-2024-42159, CVE-2024-42154, CVE-2024-41009, CVE-2024-42228, CVE-2024-42224) Update Instructions: Run `sudo pro fix USN-7020-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1011-gke - 6.8.0-1011.14 linux-gke - 6.8.0-1011.14 linux-gke-headers-6.8.0-1011 - 6.8.0-1011.14 linux-gke-tools-6.8.0-1011 - 6.8.0-1011.14 linux-headers-6.8.0-1011-gke - 6.8.0-1011.14 linux-headers-gke - 6.8.0-1011.14 linux-image-6.8.0-1011-gke - 6.8.0-1011.14 linux-image-gke - 6.8.0-1011.14 linux-image-unsigned-6.8.0-1011-gke - 6.8.0-1011.14 linux-modules-6.8.0-1011-gke - 6.8.0-1011.14 linux-modules-extra-6.8.0-1011-gke - 6.8.0-1011.14 linux-modules-iwlwifi-6.8.0-1011-gke - 6.8.0-1011.14 linux-modules-iwlwifi-gke - 6.8.0-1011.14 linux-tools-6.8.0-1011-gke - 6.8.0-1011.14 linux-tools-gke - 6.8.0-1011.14 No subscription required linux-buildinfo-6.8.0-1013-ibm - 6.8.0-1013.13 linux-buildinfo-6.8.0-1013-oem - 6.8.0-1013.13 linux-buildinfo-6.8.0-1013-oracle - 6.8.0-1013.13 linux-buildinfo-6.8.0-1013-oracle-64k - 6.8.0-1013.13 linux-headers-6.8.0-1013-ibm - 6.8.0-1013.13 linux-headers-6.8.0-1013-oem - 6.8.0-1013.13 linux-headers-6.8.0-1013-oracle - 6.8.0-1013.13 linux-headers-6.8.0-1013-oracle-64k - 6.8.0-1013.13 linux-headers-ibm - 6.8.0-1013.13 linux-headers-ibm-classic - 6.8.0-1013.13 linux-headers-ibm-lts-24.04 - 6.8.0-1013.13 linux-headers-oem-24.04 - 6.8.0-1013.13 linux-headers-oem-24.04a - 6.8.0-1013.13 linux-headers-oracle - 6.8.0-1013.13 linux-headers-oracle-64k - 6.8.0-1013.13 linux-ibm - 6.8.0-1013.13 linux-ibm-classic - 6.8.0-1013.13 linux-ibm-cloud-tools-common - 6.8.0-1013.13 linux-ibm-headers-6.8.0-1013 - 6.8.0-1013.13 linux-ibm-lts-24.04 - 6.8.0-1013.13 linux-ibm-source-6.8.0 - 6.8.0-1013.13 linux-ibm-tools-6.8.0-1013 - 6.8.0-1013.13 linux-image-6.8.0-1013-ibm - 6.8.0-1013.13 linux-image-6.8.0-1013-oem - 6.8.0-1013.13 linux-image-6.8.0-1013-oracle - 6.8.0-1013.13 linux-image-6.8.0-1013-oracle-64k - 6.8.0-1013.13 linux-image-ibm - 6.8.0-1013.13 linux-image-ibm-classic - 6.8.0-1013.13 linux-image-ibm-lts-24.04 - 6.8.0-1013.13 linux-image-oem-24.04 - 6.8.0-1013.13 linux-image-oem-24.04a - 6.8.0-1013.13 linux-image-oracle - 6.8.0-1013.13 linux-image-oracle-64k - 6.8.0-1013.13 linux-image-uc-6.8.0-1013-oem - 6.8.0-1013.13 linux-image-uc-oem-24.04 - 6.8.0-1013.13 linux-image-uc-oem-24.04a - 6.8.0-1013.13 linux-image-unsigned-6.8.0-1013-ibm - 6.8.0-1013.13 linux-image-unsigned-6.8.0-1013-oem - 6.8.0-1013.13 linux-image-unsigned-6.8.0-1013-oracle - 6.8.0-1013.13 linux-image-unsigned-6.8.0-1013-oracle-64k - 6.8.0-1013.13 linux-modules-6.8.0-1013-ibm - 6.8.0-1013.13 linux-modules-6.8.0-1013-oem - 6.8.0-1013.13 linux-modules-6.8.0-1013-oracle - 6.8.0-1013.13 linux-modules-6.8.0-1013-oracle-64k - 6.8.0-1013.13 linux-modules-extra-6.8.0-1013-ibm - 6.8.0-1013.13 linux-modules-extra-6.8.0-1013-oracle - 6.8.0-1013.13 linux-modules-extra-6.8.0-1013-oracle-64k - 6.8.0-1013.13 linux-modules-ipu6-6.8.0-1013-oem - 6.8.0-1013.13 linux-modules-ipu6-oem-24.04 - 6.8.0-1013.13 linux-modules-ipu6-oem-24.04a - 6.8.0-1013.13 linux-modules-iwlwifi-6.8.0-1013-ibm - 6.8.0-1013.13 linux-modules-iwlwifi-6.8.0-1013-oem - 6.8.0-1013.13 linux-modules-iwlwifi-ibm - 6.8.0-1013.13 linux-modules-iwlwifi-ibm-classic - 6.8.0-1013.13 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1013.13 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1013.13 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1013.13 linux-modules-usbio-6.8.0-1013-oem - 6.8.0-1013.13 linux-modules-usbio-oem-24.04 - 6.8.0-1013.13 linux-modules-usbio-oem-24.04a - 6.8.0-1013.13 linux-oem-24.04 - 6.8.0-1013.13 linux-oem-24.04a - 6.8.0-1013.13 linux-oem-6.8-headers-6.8.0-1013 - 6.8.0-1013.13 linux-oem-6.8-tools-6.8.0-1013 - 6.8.0-1013.13 linux-oracle - 6.8.0-1013.13 linux-oracle-64k - 6.8.0-1013.13 linux-oracle-headers-6.8.0-1013 - 6.8.0-1013.13 linux-oracle-tools-6.8.0-1013 - 6.8.0-1013.13 linux-tools-6.8.0-1013-ibm - 6.8.0-1013.13 linux-tools-6.8.0-1013-oem - 6.8.0-1013.13 linux-tools-6.8.0-1013-oracle - 6.8.0-1013.13 linux-tools-6.8.0-1013-oracle-64k - 6.8.0-1013.13 linux-tools-ibm - 6.8.0-1013.13 linux-tools-ibm-classic - 6.8.0-1013.13 linux-tools-ibm-lts-24.04 - 6.8.0-1013.13 linux-tools-oem-24.04 - 6.8.0-1013.13 linux-tools-oem-24.04a - 6.8.0-1013.13 linux-tools-oracle - 6.8.0-1013.13 linux-tools-oracle-64k - 6.8.0-1013.13 No subscription required linux-buildinfo-6.8.0-1014-nvidia - 6.8.0-1014.15 linux-buildinfo-6.8.0-1014-nvidia-64k - 6.8.0-1014.15 linux-cloud-tools-nvidia - 6.8.0-1014.15 linux-headers-6.8.0-1014-nvidia - 6.8.0-1014.15 linux-headers-6.8.0-1014-nvidia-64k - 6.8.0-1014.15 linux-headers-nvidia - 6.8.0-1014.15 linux-headers-nvidia-64k - 6.8.0-1014.15 linux-image-6.8.0-1014-nvidia - 6.8.0-1014.15 linux-image-6.8.0-1014-nvidia-64k - 6.8.0-1014.15 linux-image-nvidia - 6.8.0-1014.15 linux-image-nvidia-64k - 6.8.0-1014.15 linux-image-uc-6.8.0-1014-nvidia - 6.8.0-1014.15 linux-image-uc-6.8.0-1014-nvidia-64k - 6.8.0-1014.15 linux-image-unsigned-6.8.0-1014-nvidia - 6.8.0-1014.15 linux-image-unsigned-6.8.0-1014-nvidia-64k - 6.8.0-1014.15 linux-modules-6.8.0-1014-nvidia - 6.8.0-1014.15 linux-modules-6.8.0-1014-nvidia-64k - 6.8.0-1014.15 linux-modules-extra-6.8.0-1014-nvidia - 6.8.0-1014.15 linux-modules-nvidia-fs-6.8.0-1014-nvidia - 6.8.0-1014.15 linux-modules-nvidia-fs-6.8.0-1014-nvidia-64k - 6.8.0-1014.15 linux-modules-nvidia-fs-nvidia - 6.8.0-1014.15 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1014.15 linux-nvidia - 6.8.0-1014.15 linux-nvidia-64k - 6.8.0-1014.15 linux-nvidia-headers-6.8.0-1014 - 6.8.0-1014.15 linux-nvidia-tools-6.8.0-1014 - 6.8.0-1014.15 linux-nvidia-tools-host - 6.8.0-1014.15 linux-tools-6.8.0-1014-nvidia - 6.8.0-1014.15 linux-tools-6.8.0-1014-nvidia-64k - 6.8.0-1014.15 linux-tools-nvidia - 6.8.0-1014.15 linux-tools-nvidia-64k - 6.8.0-1014.15 No subscription required linux-buildinfo-6.8.0-1014-nvidia-lowlatency - 6.8.0-1014.15.1 linux-buildinfo-6.8.0-1014-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1014.15.1 linux-headers-6.8.0-1014-nvidia-lowlatency - 6.8.0-1014.15.1 linux-headers-6.8.0-1014-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-headers-nvidia-lowlatency - 6.8.0-1014.15.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-image-6.8.0-1014-nvidia-lowlatency - 6.8.0-1014.15.1 linux-image-6.8.0-1014-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-image-nvidia-lowlatency - 6.8.0-1014.15.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-image-uc-6.8.0-1014-nvidia-lowlatency - 6.8.0-1014.15.1 linux-image-uc-6.8.0-1014-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-image-unsigned-6.8.0-1014-nvidia-lowlatency - 6.8.0-1014.15.1 linux-image-unsigned-6.8.0-1014-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-modules-6.8.0-1014-nvidia-lowlatency - 6.8.0-1014.15.1 linux-modules-6.8.0-1014-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-modules-extra-6.8.0-1014-nvidia-lowlatency - 6.8.0-1014.15.1 linux-modules-nvidia-fs-6.8.0-1014-nvidia-lowlatency - 6.8.0-1014.15.1 linux-modules-nvidia-fs-6.8.0-1014-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1014.15.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-nvidia-lowlatency - 6.8.0-1014.15.1 linux-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-nvidia-lowlatency-headers-6.8.0-1014 - 6.8.0-1014.15.1 linux-nvidia-lowlatency-tools-6.8.0-1014 - 6.8.0-1014.15.1 linux-nvidia-lowlatency-tools-host - 6.8.0-1014.15.1 linux-tools-6.8.0-1014-nvidia-lowlatency - 6.8.0-1014.15.1 linux-tools-6.8.0-1014-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-tools-nvidia-lowlatency - 6.8.0-1014.15.1 linux-tools-nvidia-lowlatency-64k - 6.8.0-1014.15.1 No subscription required linux-buildinfo-6.8.0-1015-gcp - 6.8.0-1015.17 linux-gcp - 6.8.0-1015.17 linux-gcp-headers-6.8.0-1015 - 6.8.0-1015.17 linux-gcp-tools-6.8.0-1015 - 6.8.0-1015.17 linux-headers-6.8.0-1015-gcp - 6.8.0-1015.17 linux-headers-gcp - 6.8.0-1015.17 linux-image-6.8.0-1015-gcp - 6.8.0-1015.17 linux-image-gcp - 6.8.0-1015.17 linux-image-unsigned-6.8.0-1015-gcp - 6.8.0-1015.17 linux-modules-6.8.0-1015-gcp - 6.8.0-1015.17 linux-modules-extra-6.8.0-1015-gcp - 6.8.0-1015.17 linux-modules-extra-gcp - 6.8.0-1015.17 linux-tools-6.8.0-1015-gcp - 6.8.0-1015.17 linux-tools-gcp - 6.8.0-1015.17 No subscription required linux-aws - 6.8.0-1016.17 linux-aws-cloud-tools-6.8.0-1016 - 6.8.0-1016.17 linux-aws-headers-6.8.0-1016 - 6.8.0-1016.17 linux-aws-tools-6.8.0-1016 - 6.8.0-1016.17 linux-buildinfo-6.8.0-1016-aws - 6.8.0-1016.17 linux-cloud-tools-6.8.0-1016-aws - 6.8.0-1016.17 linux-headers-6.8.0-1016-aws - 6.8.0-1016.17 linux-headers-aws - 6.8.0-1016.17 linux-image-6.8.0-1016-aws - 6.8.0-1016.17 linux-image-aws - 6.8.0-1016.17 linux-image-unsigned-6.8.0-1016-aws - 6.8.0-1016.17 linux-modules-6.8.0-1016-aws - 6.8.0-1016.17 linux-modules-extra-6.8.0-1016-aws - 6.8.0-1016.17 linux-modules-extra-aws - 6.8.0-1016.17 linux-tools-6.8.0-1016-aws - 6.8.0-1016.17 linux-tools-aws - 6.8.0-1016.17 No subscription required linux-buildinfo-6.8.0-45-generic - 6.8.0-45.45 linux-buildinfo-6.8.0-45-generic-64k - 6.8.0-45.45 linux-cloud-tools-6.8.0-45 - 6.8.0-45.45 linux-cloud-tools-6.8.0-45-generic - 6.8.0-45.45 linux-cloud-tools-common - 6.8.0-45.45 linux-cloud-tools-generic - 6.8.0-45.45 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-45.45 linux-cloud-tools-generic-hwe-24.04-edge - 6.8.0-45.45 linux-cloud-tools-virtual - 6.8.0-45.45 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-45.45 linux-cloud-tools-virtual-hwe-24.04-edge - 6.8.0-45.45 linux-crashdump - 6.8.0-45.45 linux-doc - 6.8.0-45.45 linux-generic - 6.8.0-45.45 linux-generic-64k - 6.8.0-45.45 linux-generic-64k-hwe-24.04 - 6.8.0-45.45 linux-generic-64k-hwe-24.04-edge - 6.8.0-45.45 linux-generic-hwe-24.04 - 6.8.0-45.45 linux-generic-hwe-24.04-edge - 6.8.0-45.45 linux-generic-lpae - 6.8.0-45.45 linux-headers-6.8.0-45 - 6.8.0-45.45 linux-headers-6.8.0-45-generic - 6.8.0-45.45 linux-headers-6.8.0-45-generic-64k - 6.8.0-45.45 linux-headers-generic - 6.8.0-45.45 linux-headers-generic-64k - 6.8.0-45.45 linux-headers-generic-64k-hwe-24.04 - 6.8.0-45.45 linux-headers-generic-64k-hwe-24.04-edge - 6.8.0-45.45 linux-headers-generic-hwe-24.04 - 6.8.0-45.45 linux-headers-generic-hwe-24.04-edge - 6.8.0-45.45 linux-headers-generic-lpae - 6.8.0-45.45 linux-headers-kvm - 6.8.0-45.45 linux-headers-laptop-23.10 - 6.8.0-45.45 linux-headers-oem-20.04 - 6.8.0-45.45 linux-headers-oem-20.04b - 6.8.0-45.45 linux-headers-oem-20.04c - 6.8.0-45.45 linux-headers-oem-20.04d - 6.8.0-45.45 linux-headers-oem-22.04 - 6.8.0-45.45 linux-headers-virtual - 6.8.0-45.45 linux-headers-virtual-hwe-24.04 - 6.8.0-45.45 linux-headers-virtual-hwe-24.04-edge - 6.8.0-45.45 linux-image-6.8.0-45-generic - 6.8.0-45.45 linux-image-6.8.0-45-generic-64k - 6.8.0-45.45 linux-image-extra-virtual - 6.8.0-45.45 linux-image-extra-virtual-hwe-24.04 - 6.8.0-45.45 linux-image-extra-virtual-hwe-24.04-edge - 6.8.0-45.45 linux-image-generic - 6.8.0-45.45 linux-image-generic-64k - 6.8.0-45.45 linux-image-generic-64k-hwe-24.04 - 6.8.0-45.45 linux-image-generic-64k-hwe-24.04-edge - 6.8.0-45.45 linux-image-generic-hwe-24.04 - 6.8.0-45.45 linux-image-generic-hwe-24.04-edge - 6.8.0-45.45 linux-image-generic-lpae - 6.8.0-45.45 linux-image-kvm - 6.8.0-45.45 linux-image-laptop-23.10 - 6.8.0-45.45 linux-image-oem-20.04 - 6.8.0-45.45 linux-image-oem-20.04b - 6.8.0-45.45 linux-image-oem-20.04c - 6.8.0-45.45 linux-image-oem-20.04d - 6.8.0-45.45 linux-image-oem-22.04 - 6.8.0-45.45 linux-image-uc-6.8.0-45-generic - 6.8.0-45.45 linux-image-uc-6.8.0-45-generic-64k - 6.8.0-45.45 linux-image-uc-generic - 6.8.0-45.45 linux-image-uc-generic-hwe-24.04 - 6.8.0-45.45 linux-image-uc-generic-hwe-24.04-edge - 6.8.0-45.45 linux-image-unsigned-6.8.0-45-generic - 6.8.0-45.45 linux-image-unsigned-6.8.0-45-generic-64k - 6.8.0-45.45 linux-image-virtual - 6.8.0-45.45 linux-image-virtual-hwe-24.04 - 6.8.0-45.45 linux-image-virtual-hwe-24.04-edge - 6.8.0-45.45 linux-kvm - 6.8.0-45.45 linux-laptop-23.10 - 6.8.0-45.45 linux-lib-rust-6.8.0-45-generic - 6.8.0-45.45 linux-libc-dev - 6.8.0-45.45 linux-modules-6.8.0-45-generic - 6.8.0-45.45 linux-modules-6.8.0-45-generic-64k - 6.8.0-45.45 linux-modules-extra-6.8.0-45-generic - 6.8.0-45.45 linux-modules-ipu6-6.8.0-45-generic - 6.8.0-45.45 linux-modules-ipu6-generic - 6.8.0-45.45 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-45.45 linux-modules-ipu6-generic-hwe-24.04-edge - 6.8.0-45.45 linux-modules-iwlwifi-6.8.0-45-generic - 6.8.0-45.45 linux-modules-iwlwifi-generic - 6.8.0-45.45 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-45.45 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.8.0-45.45 linux-modules-iwlwifi-oem-20.04 - 6.8.0-45.45 linux-modules-iwlwifi-oem-20.04d - 6.8.0-45.45 linux-modules-iwlwifi-oem-22.04 - 6.8.0-45.45 linux-modules-usbio-6.8.0-45-generic - 6.8.0-45.45 linux-modules-usbio-generic - 6.8.0-45.45 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-45.45 linux-modules-usbio-generic-hwe-24.04-edge - 6.8.0-45.45 linux-oem-20.04 - 6.8.0-45.45 linux-oem-20.04b - 6.8.0-45.45 linux-oem-20.04c - 6.8.0-45.45 linux-oem-20.04d - 6.8.0-45.45 linux-oem-22.04 - 6.8.0-45.45 linux-source - 6.8.0-45.45 linux-source-6.8.0 - 6.8.0-45.45 linux-tools-6.8.0-45 - 6.8.0-45.45 linux-tools-6.8.0-45-generic - 6.8.0-45.45 linux-tools-6.8.0-45-generic-64k - 6.8.0-45.45 linux-tools-common - 6.8.0-45.45 linux-tools-generic - 6.8.0-45.45 linux-tools-generic-64k - 6.8.0-45.45 linux-tools-generic-64k-hwe-24.04 - 6.8.0-45.45 linux-tools-generic-64k-hwe-24.04-edge - 6.8.0-45.45 linux-tools-generic-hwe-24.04 - 6.8.0-45.45 linux-tools-generic-hwe-24.04-edge - 6.8.0-45.45 linux-tools-generic-lpae - 6.8.0-45.45 linux-tools-host - 6.8.0-45.45 linux-tools-kvm - 6.8.0-45.45 linux-tools-laptop-23.10 - 6.8.0-45.45 linux-tools-oem-20.04 - 6.8.0-45.45 linux-tools-oem-20.04b - 6.8.0-45.45 linux-tools-oem-20.04c - 6.8.0-45.45 linux-tools-oem-20.04d - 6.8.0-45.45 linux-tools-oem-22.04 - 6.8.0-45.45 linux-tools-virtual - 6.8.0-45.45 linux-tools-virtual-hwe-24.04 - 6.8.0-45.45 linux-tools-virtual-hwe-24.04-edge - 6.8.0-45.45 linux-virtual - 6.8.0-45.45 linux-virtual-hwe-24.04 - 6.8.0-45.45 linux-virtual-hwe-24.04-edge - 6.8.0-45.45 No subscription required linux-buildinfo-6.8.0-45-lowlatency - 6.8.0-45.45.1 linux-buildinfo-6.8.0-45-lowlatency-64k - 6.8.0-45.45.1 linux-cloud-tools-6.8.0-45-lowlatency - 6.8.0-45.45.1 linux-cloud-tools-lowlatency - 6.8.0-45.45.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-45.45.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-45.45.1 linux-cloud-tools-lowlatency-hwe-22.04 - 6.8.0-45.45.1 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.8.0-45.45.1 linux-headers-6.8.0-45-lowlatency - 6.8.0-45.45.1 linux-headers-6.8.0-45-lowlatency-64k - 6.8.0-45.45.1 linux-headers-lowlatency - 6.8.0-45.45.1 linux-headers-lowlatency-64k - 6.8.0-45.45.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-45.45.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-45.45.1 linux-headers-lowlatency-64k-hwe-22.04 - 6.8.0-45.45.1 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.8.0-45.45.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-45.45.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-45.45.1 linux-headers-lowlatency-hwe-22.04 - 6.8.0-45.45.1 linux-headers-lowlatency-hwe-22.04-edge - 6.8.0-45.45.1 linux-image-6.8.0-45-lowlatency - 6.8.0-45.45.1 linux-image-6.8.0-45-lowlatency-64k - 6.8.0-45.45.1 linux-image-lowlatency - 6.8.0-45.45.1 linux-image-lowlatency-64k - 6.8.0-45.45.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-45.45.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-45.45.1 linux-image-lowlatency-64k-hwe-22.04 - 6.8.0-45.45.1 linux-image-lowlatency-64k-hwe-22.04-edge - 6.8.0-45.45.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-45.45.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-45.45.1 linux-image-lowlatency-hwe-22.04 - 6.8.0-45.45.1 linux-image-lowlatency-hwe-22.04-edge - 6.8.0-45.45.1 linux-image-unsigned-6.8.0-45-lowlatency - 6.8.0-45.45.1 linux-image-unsigned-6.8.0-45-lowlatency-64k - 6.8.0-45.45.1 linux-lowlatency - 6.8.0-45.45.1 linux-lowlatency-64k - 6.8.0-45.45.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-45.45.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-45.45.1 linux-lowlatency-64k-hwe-22.04 - 6.8.0-45.45.1 linux-lowlatency-64k-hwe-22.04-edge - 6.8.0-45.45.1 linux-lowlatency-cloud-tools-6.8.0-45 - 6.8.0-45.45.1 linux-lowlatency-cloud-tools-common - 6.8.0-45.45.1 linux-lowlatency-headers-6.8.0-45 - 6.8.0-45.45.1 linux-lowlatency-hwe-20.04 - 6.8.0-45.45.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-45.45.1 linux-lowlatency-hwe-22.04 - 6.8.0-45.45.1 linux-lowlatency-hwe-22.04-edge - 6.8.0-45.45.1 linux-lowlatency-lib-rust-6.8.0-45-lowlatency - 6.8.0-45.45.1 linux-lowlatency-tools-6.8.0-45 - 6.8.0-45.45.1 linux-lowlatency-tools-common - 6.8.0-45.45.1 linux-lowlatency-tools-host - 6.8.0-45.45.1 linux-modules-6.8.0-45-lowlatency - 6.8.0-45.45.1 linux-modules-6.8.0-45-lowlatency-64k - 6.8.0-45.45.1 linux-modules-iwlwifi-6.8.0-45-lowlatency - 6.8.0-45.45.1 linux-modules-iwlwifi-lowlatency - 6.8.0-45.45.1 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.8.0-45.45.1 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.8.0-45.45.1 linux-tools-6.8.0-45-lowlatency - 6.8.0-45.45.1 linux-tools-6.8.0-45-lowlatency-64k - 6.8.0-45.45.1 linux-tools-lowlatency - 6.8.0-45.45.1 linux-tools-lowlatency-64k - 6.8.0-45.45.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-45.45.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-45.45.1 linux-tools-lowlatency-64k-hwe-22.04 - 6.8.0-45.45.1 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.8.0-45.45.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-45.45.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-45.45.1 linux-tools-lowlatency-hwe-22.04 - 6.8.0-45.45.1 linux-tools-lowlatency-hwe-22.04-edge - 6.8.0-45.45.1 No subscription required Medium CVE-2024-41009 CVE-2024-42154 CVE-2024-42159 CVE-2024-42160 CVE-2024-42224 CVE-2024-42228 USN-7020-2 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - GPU drivers; - Network drivers; - SCSI drivers; - F2FS file system; - BPF subsystem; - IPv4 networking; (CVE-2024-42160, CVE-2024-42159, CVE-2024-42154, CVE-2024-41009, CVE-2024-42228, CVE-2024-42224) Update Instructions: Run `sudo pro fix USN-7020-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-azure - 6.8.0-1015.17 linux-azure-cloud-tools-6.8.0-1015 - 6.8.0-1015.17 linux-azure-fde - 6.8.0-1015.17 linux-azure-headers-6.8.0-1015 - 6.8.0-1015.17 linux-azure-tools-6.8.0-1015 - 6.8.0-1015.17 linux-buildinfo-6.8.0-1015-azure - 6.8.0-1015.17 linux-cloud-tools-6.8.0-1015-azure - 6.8.0-1015.17 linux-cloud-tools-azure - 6.8.0-1015.17 linux-headers-6.8.0-1015-azure - 6.8.0-1015.17 linux-headers-azure - 6.8.0-1015.17 linux-image-6.8.0-1015-azure - 6.8.0-1015.17 linux-image-6.8.0-1015-azure-fde - 6.8.0-1015.17 linux-image-azure - 6.8.0-1015.17 linux-image-azure-fde - 6.8.0-1015.17 linux-image-unsigned-6.8.0-1015-azure - 6.8.0-1015.17 linux-modules-6.8.0-1015-azure - 6.8.0-1015.17 linux-modules-extra-6.8.0-1015-azure - 6.8.0-1015.17 linux-modules-extra-azure - 6.8.0-1015.17 linux-modules-involflt-6.8.0-1015-azure - 6.8.0-1015.17 linux-modules-involflt-azure - 6.8.0-1015.17 linux-modules-iwlwifi-6.8.0-1015-azure - 6.8.0-1015.17 linux-modules-iwlwifi-azure - 6.8.0-1015.17 linux-tools-6.8.0-1015-azure - 6.8.0-1015.17 linux-tools-azure - 6.8.0-1015.17 No subscription required Medium CVE-2024-41009 CVE-2024-42154 CVE-2024-42159 CVE-2024-42160 CVE-2024-42224 CVE-2024-42228 USN-7020-3 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - GPU drivers; - Network drivers; - SCSI drivers; - F2FS file system; - BPF subsystem; - IPv4 networking; (CVE-2024-42160, CVE-2024-42159, CVE-2024-42224, CVE-2024-41009, CVE-2024-42154, CVE-2024-42228) Update Instructions: Run `sudo pro fix USN-7020-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1012-raspi - 6.8.0-1012.13 linux-headers-6.8.0-1012-raspi - 6.8.0-1012.13 linux-headers-raspi - 6.8.0-1012.13 linux-image-6.8.0-1012-raspi - 6.8.0-1012.13 linux-image-raspi - 6.8.0-1012.13 linux-modules-6.8.0-1012-raspi - 6.8.0-1012.13 linux-raspi - 6.8.0-1012.13 linux-raspi-headers-6.8.0-1012 - 6.8.0-1012.13 linux-raspi-tools-6.8.0-1012 - 6.8.0-1012.13 linux-tools-6.8.0-1012-raspi - 6.8.0-1012.13 linux-tools-raspi - 6.8.0-1012.13 No subscription required Medium CVE-2024-41009 CVE-2024-42154 CVE-2024-42159 CVE-2024-42160 CVE-2024-42224 CVE-2024-42228 USN-7027-1 -- Emacs vulnerabilities Ubuntu 24.04 LTS It was discovered that Emacs incorrectly handled input sanitization. An attacker could possibly use this issue to execute arbitrary commands. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-45939) Xi Lu discovered that Emacs incorrectly handled input sanitization. An attacker could possibly use this issue to execute arbitrary commands. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-48337) Xi Lu discovered that Emacs incorrectly handled input sanitization. An attacker could possibly use this issue to execute arbitrary commands. This issue only affected Ubuntu 22.04 LTS. (CVE-2022-48338) Xi Lu discovered that Emacs incorrectly handled input sanitization. An attacker could possibly use this issue to execute arbitrary commands. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-48339) It was discovered that Emacs incorrectly handled filename sanitization. An attacker could possibly use this issue to execute arbitrary commands. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-28617) It was discovered that Emacs incorrectly handled certain crafted files. An attacker could possibly use this issue to crash the program, resulting in a denial of service. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2024-30203, CVE-2024-30204, CVE-2024-30205) It was discovered that Emacs incorrectly handled certain crafted files. An attacker could possibly use this issue to execute arbitrary commands. (CVE-2024-39331) Update Instructions: Run `sudo pro fix USN-7027-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: emacs - 1:29.3+1-1ubuntu2+esm1 emacs-bin-common - 1:29.3+1-1ubuntu2+esm1 emacs-common - 1:29.3+1-1ubuntu2+esm1 emacs-el - 1:29.3+1-1ubuntu2+esm1 emacs-gtk - 1:29.3+1-1ubuntu2+esm1 emacs-lucid - 1:29.3+1-1ubuntu2+esm1 emacs-nox - 1:29.3+1-1ubuntu2+esm1 emacs-pgtk - 1:29.3+1-1ubuntu2+esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2022-45939 CVE-2022-48337 CVE-2022-48338 CVE-2022-48339 CVE-2023-28617 CVE-2024-30203 CVE-2024-30204 CVE-2024-30205 CVE-2024-39331 https://launchpad.net/bugs/2070418 USN-7031-1 -- Puma vulnerability Ubuntu 24.04 LTS It was discovered that Puma incorrectly handled parsing certain headers. A remote attacker could possibly use this issue to overwrite header values set by intermediate proxies by providing duplicate headers containing underscore characters. Update Instructions: Run `sudo pro fix USN-7031-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: puma - 6.4.2-4ubuntu4.3 No subscription required Medium CVE-2024-45614 USN-7032-1 -- Tomcat vulnerability Ubuntu 24.04 LTS It was discovered that Tomcat incorrectly handled HTTP trailer headers. A remote attacker could possibly use this issue to perform HTTP request smuggling. Update Instructions: Run `sudo pro fix USN-7032-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libtomcat9-java - 9.0.70-2ubuntu0.1 No subscription required Medium CVE-2023-46589 USN-7033-1 -- Intel Microcode vulnerabilities Ubuntu 24.04 LTS It was discovered that some Intel(R) Processors did not properly restrict access to the Running Average Power Limit (RAPL) interface. This may allow a local privileged attacker to obtain sensitive information. (CVE-2024-23984) It was discovered that some Intel(R) Processors did not properly implement finite state machines (FSMs) in hardware logic. This may allow a local privileged attacker to cause a denial of service (system crash). (CVE-2024-24968) Update Instructions: Run `sudo pro fix USN-7033-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: intel-microcode - 3.20240910.0ubuntu0.24.04.1 No subscription required Medium CVE-2024-23984 CVE-2024-24968 USN-7037-1 -- OpenJPEG vulnerability Ubuntu 24.04 LTS It was discovered that OpenJPEG could enter a large loop and continuously print warning messages when given specially crafted input. An attacker could potentially use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-7037-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libopenjp2-7 - 2.5.0-2ubuntu0.1 libopenjp2-7-dev - 2.5.0-2ubuntu0.1 libopenjp2-tools - 2.5.0-2ubuntu0.1 libopenjpip-dec-server - 2.5.0-2ubuntu0.1 libopenjpip-server - 2.5.0-2ubuntu0.1 libopenjpip-viewer - 2.5.0-2ubuntu0.1 libopenjpip7 - 2.5.0-2ubuntu0.1 openjpeg-doc - 2.5.0-2ubuntu0.1 No subscription required Medium CVE-2023-39327 USN-7038-1 -- APR vulnerability Ubuntu 24.04 LTS Thomas Stangner discovered a permission vulnerability in the Apache Portable Runtime (APR) library. A local attacker could possibly use this issue to read named shared memory segments, potentially exposing sensitive application data. Update Instructions: Run `sudo pro fix USN-7038-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libapr1-dev - 1.7.2-3.1ubuntu0.1 libapr1t64 - 1.7.2-3.1ubuntu0.1 No subscription required Medium CVE-2023-49582 USN-7041-1 -- CUPS vulnerability Ubuntu 24.04 LTS Simone Margaritelli discovered that CUPS incorrectly sanitized IPP data when creating PPD files. A remote attacker could possibly use this issue to manipulate PPD files and execute arbitrary code when a printer is used. Update Instructions: Run `sudo pro fix USN-7041-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: cups - 2.4.7-1.2ubuntu7.3 cups-bsd - 2.4.7-1.2ubuntu7.3 cups-client - 2.4.7-1.2ubuntu7.3 cups-common - 2.4.7-1.2ubuntu7.3 cups-core-drivers - 2.4.7-1.2ubuntu7.3 cups-daemon - 2.4.7-1.2ubuntu7.3 cups-ipp-utils - 2.4.7-1.2ubuntu7.3 cups-ppdc - 2.4.7-1.2ubuntu7.3 cups-server-common - 2.4.7-1.2ubuntu7.3 libcups2-dev - 2.4.7-1.2ubuntu7.3 libcups2t64 - 2.4.7-1.2ubuntu7.3 libcupsimage2-dev - 2.4.7-1.2ubuntu7.3 libcupsimage2t64 - 2.4.7-1.2ubuntu7.3 No subscription required Medium CVE-2024-47175 USN-7042-1 -- cups-browsed vulnerability Ubuntu 24.04 LTS Simone Margaritelli discovered that cups-browsed could be used to create arbitrary printers from outside the local network. In combination with issues in other printing components, a remote attacker could possibly use this issue to connect to a system, created manipulated PPD files, and execute arbitrary code when a printer is used. This update disables support for the legacy CUPS printer discovery protocol. Update Instructions: Run `sudo pro fix USN-7042-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: cups-browsed - 2.0.0-0ubuntu10.1 cups-browsed-tests - 2.0.0-0ubuntu10.1 No subscription required Medium CVE-2024-47176 USN-7044-1 -- libcupsfilters vulnerability Ubuntu 24.04 LTS Simone Margaritelli discovered that libcupsfilters incorrectly sanitized IPP data when creating PPD files. A remote attacker could possibly use this issue to manipulate PPD files and execute arbitrary code when a printer is used. Update Instructions: Run `sudo pro fix USN-7044-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libcupsfilters-dev - 2.0.0-0ubuntu7.1 libcupsfilters-tests - 2.0.0-0ubuntu7.1 libcupsfilters2-common - 2.0.0-0ubuntu7.1 libcupsfilters2t64 - 2.0.0-0ubuntu7.1 No subscription required Medium CVE-2024-47076 USN-7045-1 -- libppd vulnerability Ubuntu 24.04 LTS Simone Margaritelli discovered that libppd incorrectly sanitized IPP data when creating PPD files. A remote attacker could possibly use this issue to manipulate PPD files and execute arbitrary code when a printer is used. Update Instructions: Run `sudo pro fix USN-7045-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libppd-dev - 2:2.0.0-0ubuntu4.1 libppd-tests - 2:2.0.0-0ubuntu4.1 libppd-utils - 2:2.0.0-0ubuntu4.1 libppd2 - 2:2.0.0-0ubuntu4.1 libppd2-common - 2:2.0.0-0ubuntu4.1 ppdc - 2:2.0.0-0ubuntu4.1 No subscription required Medium CVE-2024-47175 LSN-0104-1 -- Kernel Live Patch Security Notice Ubuntu 24.04 LTS It was discovered that the ATA over Ethernet (AoE) driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code.(CVE-2023-6270) It was discovered that a race condition existed in the AppleTalk networking subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code.(CVE-2023-51781) In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_rbtree: skip end interval element from gc rbtree lazy gc on insert might collect an end interval element that has been just added in this transactions, skip end interval elements that are not yet active.(CVE-2024-26581) In the Linux kernel, the following vulnerability has been resolved: net: qualcomm: rmnet: fix global oob in rmnet_policy The variable rmnet_link_ops assign a *bigger* maxtype which leads to a global out-of- bounds read when parsing the netlink attributes.(CVE-2024-26597) To check your kernel type and Livepatch version, enter this command: canonical-livepatch status lkp_Ubuntu_6_8_0[_|\d]+_aws_(\d+) - 104 lkp_Ubuntu_6_8_0[_|\d]+_gcp_(\d+) - 104 lkp_Ubuntu_6_8_0[_|\d]+_linux_(\d+) - 104 lkp_Ubuntu_6_8_0[_|\d]+_ibm_(\d+) - 104 Livepatch subscription required High CVE-2023-6270 CVE-2023-51781 CVE-2024-26597 CVE-2024-26581 LSN-0105-1 -- Kernel Live Patch Security Notice Ubuntu 24.04 LTS It was discovered that the ATA over Ethernet (AoE) driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code.(CVE-2023-6270) It was discovered that the netfilter connection tracker for netlink in the Linux kernel did not properly perform reference counting in some error conditions. A local attacker could possibly use this to cause a denial of service (memory exhaustion).(CVE-2023-7192) In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: disallow anonymous set with timeout flag Anonymous sets are never used with timeout from userspace, reject this. Exception to this rule is NFT_SET_EVAL to ensure legacy meters still work.(CVE-2024-26642) In the Linux kernel, the following vulnerability has been resolved: cifs: fix underflow in parse_server_interfaces() In this loop, we step through the buffer and after each item we check if the size_left is greater than the minimum size we need. However, the problem is that 'bytes_left' is type ssize_t while sizeof() is type size_t. That means that because of type promotion, the comparison is done as an unsigned and if we have negative bytes left the loop continues instead of ending.(CVE-2024-26828) In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: do not free live element (CVE-2024-26924) To check your kernel type and Livepatch version, enter this command: canonical-livepatch status lkp_Ubuntu_6_8_0[_|\d]+_aws_(\d+) - 105 lkp_Ubuntu_6_8_0[_|\d]+_azure_(\d+) - 105 lkp_Ubuntu_6_8_0[_|\d]+_gcp_(\d+) - 105 lkp_Ubuntu_6_8_0[_|\d]+_linux_(\d+) - 105 lkp_Ubuntu_6_8_0[_|\d]+_ibm_(\d+) - 105 Livepatch subscription required High CVE-2023-7192 CVE-2024-26642 CVE-2023-6270 CVE-2024-26828 CVE-2024-26924 LSN-0106-1 -- Kernel Live Patch Security Notice Ubuntu 24.04 LTS In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: disallow timeout for anonymous sets Never used from userspace, disallow these parameters.(CVE-2023-52620) In the Linux kernel, the following vulnerability has been resolved: tls: fix race between tx work scheduling and socket close Similarly to previous commit, the submitting thread (recvmsg/sendmsg) may exit as soon as the async crypto handler calls complete(). Reorder scheduling the work before calling complete(). This seems more logical in the first place, as it's the inverse order of what the submitting thread will do.(CVE-2024-26585) In the Linux kernel, the following vulnerability has been resolved: tty: n_gsm: fix possible out-of-bounds in gsm0_receive() Assuming the following: - side A configures the n_gsm in basic option mode - side B sends the header of a basic option mode frame with data length 1 - side A switches to advanced option mode - side B sends 2 data bytes which exceeds gsm->len Reason: gsm->len is not used in advanced option mode. - side A switches to basic option mode - side B keeps sending until gsm0_receive() writes past gsm->buf Reason: Neither gsm->state nor gsm->len have been reset after reconfiguration. Fix this by changing gsm->count to gsm->len comparison from equal to less than. Also add upper limit checks against the constant MAX_MRU in gsm0_receive() and gsm1_receive() to harden against memory corruption of gsm->len and gsm->mru. All other checks remain as we still need to limit the data according to the user configuration and actual payload size.(CVE-2024-36016) To check your kernel type and Livepatch version, enter this command: canonical-livepatch status lkp_Ubuntu_6_8_0[_|\d]+_aws_(\d+) - 106 lkp_Ubuntu_6_8_0[_|\d]+_azure_(\d+) - 106 lkp_Ubuntu_6_8_0[_|\d]+_gcp_(\d+) - 106 lkp_Ubuntu_6_8_0[_|\d]+_linux_(\d+) - 106 lkp_Ubuntu_6_8_0[_|\d]+_ibm_(\d+) - 106 Livepatch subscription required High CVE-2024-36016 CVE-2024-26585 CVE-2023-52620 /etc/lsb-release ^[\s\S]*DISTRIB_CODENAME=([a-z]+)$ 1 oval:com.ubuntu.noble:var:681610000000 oval:com.ubuntu.noble:var:681610000020 oval:com.ubuntu.noble:var:681610000040 oval:com.ubuntu.noble:var:681610000060 oval:com.ubuntu.noble:var:681610000080 oval:com.ubuntu.noble:var:681710000000 oval:com.ubuntu.noble:var:681710000020 oval:com.ubuntu.noble:var:681720000000 oval:com.ubuntu.noble:var:681730000000 oval:com.ubuntu.noble:var:681730000020 oval:com.ubuntu.noble:var:686310000000 oval:com.ubuntu.noble:var:686310000020 oval:com.ubuntu.noble:var:686310000040 oval:com.ubuntu.noble:var:686310000060 oval:com.ubuntu.noble:var:686310000080 oval:com.ubuntu.noble:var:686410000000 oval:com.ubuntu.noble:var:686410000020 oval:com.ubuntu.noble:var:686420000000 oval:com.ubuntu.noble:var:686420000020 oval:com.ubuntu.noble:var:686430000000 oval:com.ubuntu.noble:var:687510000000 oval:com.ubuntu.noble:var:687810000000 oval:com.ubuntu.noble:var:689310000000 oval:com.ubuntu.noble:var:689310000020 oval:com.ubuntu.noble:var:689310000040 oval:com.ubuntu.noble:var:689310000060 oval:com.ubuntu.noble:var:689310000080 oval:com.ubuntu.noble:var:689310000100 oval:com.ubuntu.noble:var:689310000120 oval:com.ubuntu.noble:var:689320000000 oval:com.ubuntu.noble:var:689320000020 oval:com.ubuntu.noble:var:689330000000 oval:com.ubuntu.noble:var:691810000000 oval:com.ubuntu.noble:var:692110000000 oval:com.ubuntu.noble:var:692110000020 oval:com.ubuntu.noble:var:692110000040 oval:com.ubuntu.noble:var:692110000060 oval:com.ubuntu.noble:var:692110000080 oval:com.ubuntu.noble:var:692110000100 oval:com.ubuntu.noble:var:692110000120 oval:com.ubuntu.noble:var:692120000000 oval:com.ubuntu.noble:var:694910000000 oval:com.ubuntu.noble:var:694910000020 oval:com.ubuntu.noble:var:694910000040 oval:com.ubuntu.noble:var:694910000060 oval:com.ubuntu.noble:var:694910000080 oval:com.ubuntu.noble:var:694910000100 oval:com.ubuntu.noble:var:694920000000 oval:com.ubuntu.noble:var:694920000020 oval:com.ubuntu.noble:var:695210000000 oval:com.ubuntu.noble:var:695210000020 oval:com.ubuntu.noble:var:695220000000 oval:com.ubuntu.noble:var:695510000000 oval:com.ubuntu.noble:var:697510000000 oval:com.ubuntu.noble:var:697510000020 oval:com.ubuntu.noble:var:697510000040 oval:com.ubuntu.noble:var:697510000060 oval:com.ubuntu.noble:var:697510000080 oval:com.ubuntu.noble:var:697510000100 oval:com.ubuntu.noble:var:697510000120 oval:com.ubuntu.noble:var:697510000140 oval:com.ubuntu.noble:var:697510000160 oval:com.ubuntu.noble:var:697510000180 oval:com.ubuntu.noble:var:699910000000 oval:com.ubuntu.noble:var:699910000020 oval:com.ubuntu.noble:var:699910000040 oval:com.ubuntu.noble:var:699910000060 oval:com.ubuntu.noble:var:699910000080 oval:com.ubuntu.noble:var:699910000100 oval:com.ubuntu.noble:var:699920000000 oval:com.ubuntu.noble:var:700410000000 oval:com.ubuntu.noble:var:700510000000 oval:com.ubuntu.noble:var:700510000020 oval:com.ubuntu.noble:var:702010000000 oval:com.ubuntu.noble:var:702010000020 oval:com.ubuntu.noble:var:702010000040 oval:com.ubuntu.noble:var:702010000060 oval:com.ubuntu.noble:var:702010000080 oval:com.ubuntu.noble:var:702010000100 oval:com.ubuntu.noble:var:702010000120 oval:com.ubuntu.noble:var:702010000140 oval:com.ubuntu.noble:var:702020000000 oval:com.ubuntu.noble:var:702030000000 /snap/bin/canonical-livepatch /proc/modules 1 /snap/bin/canonical-livepatch /proc/modules 1 /snap/bin/canonical-livepatch /proc/modules 1 unix noble 0:3.0.13-0ubuntu3.1 0:41.0.7-4ubuntu0.1 0:2.3.12-1ubuntu0.24.04.1 0:8.5.0-2ubuntu10.1 0:2.4.58-1ubuntu8.1 0:3.8.3-1.1ubuntu3.1 0:10.0.0-2ubuntu8.1 0:2.0.13-4ubuntu0.1 0:2.39-0ubuntu8.1 0:10.2.0-1ubuntu1 0:20240213.00-0ubuntu3.1 0:20240320.00-0ubuntu1~24.04.1 0:1.59.0-1ubuntu0.1 0:590-2ubuntu2.1 0:3.5.1+dfsg1-0ubuntu1 0:2.0.12-1ubuntu1 0:10.0.0-2ubuntu8.2 0:2.80.0-6ubuntu3.1 1:2.23-1ubuntu0.1 0:0.4.4-1ubuntu0.1 0:8.0.105-0ubuntu1~24.04.1 0:8.0.105-8.0.5-0ubuntu1~24.04.1 0:8.0.5-0ubuntu1~24.04.1 0:3.6-2ubuntu0.1 0:1.7.17-1ubuntu0.1~esm2 0:46.2-1~ubuntu24.04.2 0:3.1.2-1ubuntu1.1 0:2.44.2-0ubuntu0.24.04.1 4:0.9+LibO24.2.3-0ubuntu0.24.04.2 4:1.2.0+LibO24.2.3-0ubuntu0.24.04.2 4:102.12+LibO24.2.3-0ubuntu0.24.04.2 4:24.2.3-0ubuntu0.24.04.2 1:2.13.0-3ubuntu2 0:1.19.2-1ubuntu3.1 1:2.43.0-1ubuntu7.1 0:8.4.4-1.1ubuntu6.1 0:4.0.1-7.1ubuntu5.1 0:3.20240514.0ubuntu0.24.04.1 0:1.24.2-1ubuntu0.1 0:3.0.1-3ubuntu0.1 0:1.0.2-2ubuntu1.1 0:16.3-0ubuntu0.24.04.1 7:6.1.1-3ubuntu5+esm1 0:2.39-0ubuntu8.2 0:3.7.2-2ubuntu0.1 0:2.42.10+dfsg-3ubuntu3.1 0:8u412-ga-1~24.04.2 0:1.14.0-1ubuntu2.1 0:3.8.2-2ubuntu0.1 6.8.0-\d+(-raspi) 0:6.8.0-1005 6.8.0-\d+(-ibm) 0:6.8.0-1006 6.8.0-\d+(-generic|-generic-64k) 0:6.8.0-35 6.8.0-\d+(-generic|-generic-64k) 0:6.8.0-35 6.8.0-\d+(-lowlatency|-lowlatency-64k) 0:6.8.0-35 6.8.0-\d+(-gcp) 0:6.8.0-1008 6.8.0-\d+(-aws) 0:6.8.0-1009 6.8.0-\d+(-oem) 0:6.8.0-1006 6.8.0-\d+(-gke) 0:6.8.0-1004 6.8.0-\d+(-azure|-azure-fde) 0:6.8.0-1008 0:8.0.37-0ubuntu0.24.04.1 0:4.5.1+git230720-4ubuntu2.1 0:1.8-1fakesync1ubuntu0.24.04.1 0:7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 0:0.76.0-1ubuntu0.1 0:10.02.1~dfsg1-0ubuntu7.1 0:2.9.4-1.1ubuntu6.1 0:2.2.7-1ubuntu0.1 0:3.2.3-1ubuntu0.24.04.1 1:10.11.8-0ubuntu0.24.04.1 0:8.3.6-0ubuntu0.24.04.1 4:5.27.11-0ubuntu4.1 0:2.4.7-1.2ubuntu7.1 0:2.4.7-1.2ubuntu7.2 0:1.0-2ubuntu1.1 0:1.0-2ubuntu1.2 0:1.21.4-1ubuntu4.1 0:2.1.0-4.1ubuntu1.2 1:9.6p1-3ubuntu13.3 0:2.6.9-1ubuntu4.1 6.8.0-\d+(-raspi) 0:6.8.0-1006 6.8.0-\d+(-ibm) 0:6.8.0-1007 6.8.0-\d+(-nvidia|-nvidia-64k) 0:6.8.0-1008 6.8.0-\d+(-generic|-generic-64k) 0:6.8.0-36 6.8.0-\d+(-lowlatency|-lowlatency-64k) 0:6.8.0-36 6.8.0-\d+(-intel) 0:6.8.0-1006 6.8.0-\d+(-gcp) 0:6.8.0-1009 6.8.0-\d+(-oem) 0:6.8.0-1007 6.8.0-\d+(-aws) 0:6.8.0-1010 6.8.0-\d+(-gke) 0:6.8.0-1005 6.8.0-\d+(-azure|-azure-fde) 0:6.8.0-1009 4:0.9+LibO24.2.4-0ubuntu0.24.04.2 4:1.2.0+LibO24.2.4-0ubuntu0.24.04.2 4:102.12+LibO24.2.4-0ubuntu0.24.04.2 4:24.2.4-0ubuntu0.24.04.2 6.8.0-\d+(-oracle|-oracle-64k) 0:6.8.0-1006 0:7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 2:24.0.0-0ubuntu1.2 2:28.0.1-0ubuntu1.2 3:29.0.1-0ubuntu1.3 0:2.4.58-1ubuntu8.2 0:2.4.58-1ubuntu8.3 0:1.21.9-1ubuntu0.1 0:1.22.2-2ubuntu0.1 1:9.6p1-3ubuntu13.4 3:4.2.11-1ubuntu1.1 0:8.0.107-0ubuntu1~24.04.1 0:8.0.107-8.0.7-0ubuntu1~24.04.1 0:8.0.7-0ubuntu1~24.04.1 6.8.0-\d+(-intel) 0:6.8.0-1007 6.8.0-\d+(-raspi) 0:6.8.0-1007 6.8.0-\d+(-ibm|-oem) 0:6.8.0-1008 6.8.0-\d+(-azure|-azure-fde) 0:6.8.0-1010 6.8.0-\d+(-gcp) 0:6.8.0-1010 6.8.0-\d+(-generic|-generic-64k) 0:6.8.0-38 6.8.0-\d+(-lowlatency|-lowlatency-64k) 0:6.8.0-38 6.8.0-\d+(-gke) 0:6.8.0-1006 6.8.0-\d+(-nvidia|-nvidia-64k) 0:6.8.0-1009 6.8.0-\d+(-aws) 0:6.8.0-1011 0:10.02.1~dfsg1-0ubuntu7.3 0:2.24.33-4ubuntu1.1 0:3.24.41-4ubuntu1.1 0:2.4.58-1ubuntu8.4 0:3.11.0-1ubuntu0.24.04.1 0:1.0.0-6ubuntu0.1 0:6.6-1ubuntu5.1 1:9.18.28-0ubuntu0.24.04.1 3:29.0.1-0ubuntu1.4 0:0.1.2+24.04 0:24.02.0-1ubuntu9.1 6.8.0-\d+(-oracle|-oracle-64k) 0:6.8.0-1008 6.8.0-\d+(-gke) 0:6.8.0-1007 6.8.0-\d+(-raspi) 0:6.8.0-1008 6.8.0-\d+(-ibm|-oem) 0:6.8.0-1009 6.8.0-\d+(-nvidia|-nvidia-64k) 0:6.8.0-1010 6.8.0-\d+(-gcp) 0:6.8.0-1011 6.8.0-\d+(-aws) 0:6.8.0-1012 6.8.0-\d+(-generic|-generic-64k) 0:6.8.0-39 6.8.0-\d+(-lowlatency|-lowlatency-64k) 0:6.8.0-39 0:8u422-b05-1~24.04 0:11.0.24+8-1ubuntu3~24.04.1 0:17.0.12+7-1ubuntu2~24.04 0:21.0.4+7-1ubuntu2~24.04 0:8.0.39-0ubuntu0.24.04.1 0:3.0.13-0ubuntu3.2 0:4.97-4ubuntu4.1 0:2.63+24.04ubuntu0.1 0:3.12.3-1ubuntu0.1 0:1.0.2-4ubuntu0.24.04.1 0:8.5.0-2ubuntu10.2 2:2.10-21ubuntu0.1 3:4.2.11-1ubuntu1.2 0:1.20.1-6ubuntu2.1 6.8.0-\d+(-gke) 0:6.8.0-1008 6.8.0-\d+(-ibm) 0:6.8.0-1010 6.8.0-\d+(-nvidia|-nvidia-64k) 0:6.8.0-1011 6.8.0-\d+(-gcp) 0:6.8.0-1012 6.8.0-\d+(-aws) 0:6.8.0-1013 6.8.0-\d+(-generic|-generic-64k) 0:6.8.0-40 6.8.0-\d+(-raspi) 0:6.8.0-1009 6.8.0-\d+(-lowlatency|-lowlatency-64k) 0:6.8.0-40 6.8.0-\d+(-oracle|-oracle-64k) 0:6.8.0-1010 6.8.0-\d+(-nvidia-lowlatency|-nvidia-lowlatency-64k) 0:6.8.0-1011 6.8.0-\d+(-azure|-azure-fde) 0:6.8.0-1012 6.8.0-\d+(-oem) 0:6.8.0-1010 0:8.0.108-0ubuntu1~24.04.1 0:8.0.108-8.0.8-0ubuntu1~24.04.1 0:8.0.8-0ubuntu1~24.04.1 1:1.36.1-6ubuntu3.1 4:0.9+LibO24.2.5-0ubuntu0.24.04.2 4:1.2.0+LibO24.2.5-0ubuntu0.24.04.2 4:102.12+LibO24.2.5-0ubuntu0.24.04.2 4:24.2.5-0ubuntu0.24.04.2 0:46.0-0ubuntu6~24.04.3 1:0.4.38-1ubuntu0.1 0:3.20240813.0ubuntu0.24.04.2 0:16.4-0ubuntu0.24.04.1 0:1.2.26+ds1-1ubuntu0.1 6.8.0-\d+(-gke) 0:6.8.0-1009 6.8.0-\d+(-raspi) 0:6.8.0-1010 6.8.0-\d+(-ibm|-oem|-oracle|-oracle-64k) 0:6.8.0-1011 6.8.0-\d+(-nvidia|-nvidia-64k) 0:6.8.0-1012 6.8.0-\d+(-nvidia-lowlatency|-nvidia-lowlatency-64k) 0:6.8.0-1012 6.8.0-\d+(-gcp) 0:6.8.0-1013 6.8.0-\d+(-azure|-azure-fde) 0:6.8.0-1013 6.8.0-\d+(-aws) 0:6.8.0-1014 6.8.0-\d+(-generic|-generic-64k) 0:6.8.0-41 6.8.0-\d+(-lowlatency|-lowlatency-64k) 0:6.8.0-41 1:8.2.2+ds-0ubuntu1.2 1:2.3.21+dfsg1-2ubuntu6 7:6.1.1-3ubuntu5+esm2 1:1.8.7-1ubuntu0.1.24.04.1 0:3.0.13-0ubuntu3.4 3:4.2.11-1ubuntu1.3 0:24.3.0-1ubuntu0.1 1:24.1.1-0ubuntu1.2 0:0.20180824+1.9.0-2ubuntu0.1~esm2 0:1.0.0+git20190521.78d0385+1.9.0-2ubuntu0.1~esm2 0:1.9.0-2ubuntu0.1~esm2 0:3.9.1-1ubuntu0.1 2:9.1.0016-1ubuntu7.2 0:2.44.3-0ubuntu0.24.04.1 0:4.5.1+git230720-4ubuntu2.2 0:1.19.2-1ubuntu3.2 6.8.0-\d+(-gke) 0:6.8.0-1010 6.8.0-\d+(-ibm|-oem|-oracle|-oracle-64k) 0:6.8.0-1012 6.8.0-\d+(-gcp) 0:6.8.0-1014 6.8.0-\d+(-aws) 0:6.8.0-1015 6.8.0-\d+(-generic|-generic-64k) 0:6.8.0-44 6.8.0-\d+(-lowlatency|-lowlatency-64k) 0:6.8.0-44 6.8.0-\d+(-raspi) 0:6.8.0-1011 0:2.6.1-2ubuntu0.1 0:1.2-4.1ubuntu2.24.0.4.1+esm1 0:68.1.2-2ubuntu1.1 6.8.0-\d+(-azure|-azure-fde) 0:6.8.0-1014 6.8.0-\d+(-nvidia|-nvidia-64k) 0:6.8.0-1013 6.8.0-\d+(-nvidia-lowlatency|-nvidia-lowlatency-64k) 0:6.8.0-1013 0:3.6.7-9.1ubuntu0.1~esm1 0:1.0.7+dfsg-0ubuntu0.24.04.1 0:8.5.0-2ubuntu10.4 0:1.24.0-2ubuntu7.1 0:3.12.3-1ubuntu0.2 0:8.4.4-1.1ubuntu6.2 6.8.0-\d+(-gke) 0:6.8.0-1011 6.8.0-\d+(-ibm|-oem|-oracle|-oracle-64k) 0:6.8.0-1013 6.8.0-\d+(-nvidia|-nvidia-64k) 0:6.8.0-1014 6.8.0-\d+(-nvidia-lowlatency|-nvidia-lowlatency-64k) 0:6.8.0-1014 6.8.0-\d+(-gcp) 0:6.8.0-1015 6.8.0-\d+(-aws) 0:6.8.0-1016 6.8.0-\d+(-generic|-generic-64k) 0:6.8.0-45 6.8.0-\d+(-lowlatency|-lowlatency-64k) 0:6.8.0-45 6.8.0-\d+(-azure|-azure-fde) 0:6.8.0-1015 6.8.0-\d+(-raspi) 0:6.8.0-1012 1:29.3+1-1ubuntu2+esm1 0:6.4.2-4ubuntu4.3 0:9.0.70-2ubuntu0.1 0:3.20240910.0ubuntu0.24.04.1 0:2.5.0-2ubuntu0.1 0:1.7.2-3.1ubuntu0.1 0:2.4.7-1.2ubuntu7.3 0:2.0.0-0ubuntu10.1 0:2.0.0-0ubuntu7.1 2:2.0.0-0ubuntu4.1 0 104 0 105 0 106 libssl3t64 libssl-dev openssl libssl-doc python3-cryptography python-cryptography-doc libodbc2 unixodbc-dev unixodbc-common unixodbc odbcinst libodbcinst2 libodbccr2 libcurl4-gnutls-dev libcurl4-openssl-dev libcurl3t64-gnutls libcurl4-doc curl libcurl4t64 apache2-data libapache2-mod-md apache2-utils apache2-dev apache2-suexec-pristine apache2-suexec-custom apache2 apache2-doc libapache2-mod-proxy-uwsgi apache2-ssl-dev apache2-bin libgnutls-openssl27t64 libgnutls-dane0t64 libgnutls28-dev gnutls-doc libgnutls30t64 gnutls-bin libvirt-clients-qemu libvirt-dev libvirt-wireshark libvirt-daemon-driver-qemu libvirt-login-shell libvirt-daemon-system-sysv libvirt-daemon-driver-lxc libnss-libvirt libvirt-daemon libvirt-daemon-config-nwfilter libvirt-daemon-driver-storage-iscsi-direct libvirt-daemon-config-network libvirt-l10n libvirt-clients libvirt-daemon-driver-storage-zfs libvirt-daemon-driver-xen libvirt-daemon-driver-vbox libvirt-daemon-driver-storage-gluster libvirt-daemon-system libvirt0 libvirt-daemon-system-systemd libvirt-sanlock libvirt-daemon-driver-storage-rbd libvirt-doc klibc-utils libklibc libklibc-dev libc-bin glibc-doc locales-all libc6-i386 libc6-s390 libc6-dev-i386 libc6-dev-s390 libc6-dev libc6-amd64 libc6-x32 libc6-dev-amd64 libc-dev-bin libc6 nscd libc-devtools glibc-source libc6-dev-x32 locales python3-pil.imagetk python-pil-doc python3-pil google-guest-agent google-osconfig-agent libnghttp2-14 libnghttp2-doc libnghttp2-dev nghttp2-proxy nghttp2 nghttp2-client nghttp2-server less libwinpr3-dev libfreerdp-server3-3 winpr3-utils libfreerdp-shadow3-3 freerdp3-dev freerdp3-shadow-x11 libfreerdp3-3 libfreerdp-client3-3 freerdp3-wayland libwinpr-tools3-3 libfreerdp-shadow-subsystem3-3 freerdp3-x11 libwinpr3-3 anope libvirt-clients-qemu libvirt-dev libvirt-wireshark libvirt-daemon-driver-qemu libvirt-login-shell libvirt-daemon-system-sysv libvirt-daemon-driver-lxc libnss-libvirt libvirt-daemon libvirt-daemon-config-nwfilter libvirt-daemon-driver-storage-iscsi-direct libvirt-daemon-config-network libvirt-l10n libvirt-clients libvirt-daemon-driver-storage-zfs libvirt-daemon-driver-xen libvirt-daemon-driver-vbox libvirt-daemon-driver-storage-gluster libvirt-daemon-system libvirt0 libvirt-daemon-system-systemd libvirt-sanlock libvirt-daemon-driver-storage-rbd libvirt-doc gir1.2-glib-2.0 libgirepository-2.0-dev gir1.2-girepository-3.0-dev libglib2.0-0t64 libglib2.0-tests gir1.2-glib-2.0-dev libgirepository-2.0-0 gir1.2-girepository-3.0 libglib2.0-data libglib2.0-doc libglib2.0-bin libglib2.0-dev libglib2.0-dev-bin fossil python-sqlparse-doc python3-sqlparse sqlformat dotnet-sdk-8.0 netstandard-targeting-pack-2.1-8.0 dotnet-sdk-8.0-source-built-artifacts dotnet-sdk-dbg-8.0 dotnet-templates-8.0 dotnet8 aspnetcore-runtime-8.0 dotnet-apphost-pack-8.0 dotnet-hostfxr-8.0 aspnetcore-runtime-dbg-8.0 dotnet-runtime-dbg-8.0 dotnet-runtime-8.0 dotnet-host-8.0 aspnetcore-targeting-pack-8.0 dotnet-targeting-pack-8.0 python3-idna libcjson-dev libcjson1 gnome-remote-desktop python-jinja2-doc python3-jinja2 gir1.2-javascriptcoregtk-4.1 libjavascriptcoregtk-6.0-1 libjavascriptcoregtk-bin libwebkitgtk-doc gir1.2-webkit2-4.1 libwebkitgtk-6.0-dev libjavascriptcoregtk-4.1-0 libwebkit2gtk-4.1-0 libwebkit2gtk-4.1-dev libwebkit2gtk-4.0-doc libjavascriptcoregtk-4.1-dev libjavascriptcoregtk-6.0-dev gir1.2-javascriptcoregtk-6.0 webkit2gtk-driver libjavascriptcoregtk-4.0-bin libwebkitgtk-6.0-4 gir1.2-webkit-6.0 libreoffice-nlpsolver libreoffice-wiki-publisher fonts-opensymbol libreoffice-evolution libreoffice-help-en-gb libreoffice-librelogo libreoffice-l10n-ml libreoffice-help-zh-cn libreoffice-subsequentcheckbase libreoffice-l10n-mk libreoffice-help-id libreoffice-l10n-mr libreoffice-style-tango libreoffice-help-pt-br libreofficekit-data libreoffice-core libreoffice-help-it libreoffice-l10n-uk libreoffice-l10n-fr libreoffice-gnome libreoffice-l10n-fi libreoffice-help-nl libreoffice-uiconfig-math libreoffice-l10n-uz libreoffice libreoffice-sdbc-mysql libreoffice-l10n-nb libreoffice-l10n-mn libreoffice-l10n-ne libreoffice-l10n-nl libreoffice-uiconfig-writer libreoffice-l10n-nn libreoffice-help-fi libreoffice-l10n-dz libreoffice-l10n-nr libreoffice-help-fr libreoffice-report-builder-bin libofficebean-java libreoffice-qt6 libreoffice-l10n-vi libreoffice-l10n-nso libreoffice-qt5 libreoffice-nogui libreoffice-math-nogui libreoffice-style-karasa-jaga libreoffice-l10n-ve libreoffice-l10n-gu libreoffice-help-om libreoffice-l10n-gl python3-access2base libreoffice-help-en-us libreoffice-l10n-ga libuno-cppu3t64 liblibreofficekitgtk libreoffice-l10n-gd libreoffice-help-km libreoffice-l10n-kn libreoffice-help-ko libreoffice-l10n-st libreoffice-dev-common libreoffice-l10n-sr libreoffice-help-cs libreoffice-l10n-ts libreoffice-l10n-sv libreoffice-script-provider-bsh gir1.2-lokdocview-0.1 ure-java libreoffice-report-builder-bin-nogui libreoffice-l10n-ka libreoffice-uiconfig-common libridl-java libreoffice-help-ca libreoffice-l10n-zh-tw libreoffice-l10n-sl libreoffice-l10n-sk libreoffice-style-breeze libreoffice-l10n-si libreoffice-l10n-da libreofficekit-dev libreoffice-l10n-de libreoffice-common libreoffice-help-pl libreoffice-l10n-pa-in libuno-purpenvhelpergcc3-3t64 libreoffice-uiconfig-report-builder libreoffice-help-pt libreoffice-base-nogui libreoffice-gtk3 libreoffice-math libreoffice-help-vi libreoffice-gtk4 libreoffice-l10n-tr libreoffice-help-hi libreoffice-l10n-gug libreoffice-sdbc-hsqldb libreoffice-draw-nogui libreoffice-calc libreoffice-base-drivers libreoffice-style-colibre libreoffice-l10n-ta libreoffice-sdbc-firebird libreoffice-l10n-tg libreoffice-l10n-te libreoffice-l10n-th libreoffice-l10n-id libreoffice-l10n-lv libreoffice-help-hu libreoffice-l10n-lt libreoffice-l10n-ss libunoloader-java libreoffice-uiconfig-impress libreoffice-l10n-eu libreoffice-l10n-et libreoffice-script-provider-js libreoffice-l10n-es libreoffice-l10n-el libreoffice-l10n-eo libreoffice-style-sifr libreoffice-l10n-zh-cn libreoffice-l10n-ug libreoffice-smoketest-data libreoffice-l10n-ko libreoffice-l10n-zu libreoffice-impress libreoffice-java-common libreoffice-help-eu libreoffice-help-et libreoffice-help-es libreoffice-l10n-km libreoffice-uiconfig-draw libreoffice-help-el libreoffice-uiconfig-calc libreoffice-l10n-kk libreoffice-dev-gui libreoffice-l10n-be libreoffice-l10n-szl libreoffice-l10n-bg libreoffice-l10n-tn libreoffice-l10n-bn libreoffice-plasma libreoffice-help-ja libreoffice-l10n-br libreoffice-l10n-bs liblibreoffice-java libunoil-java libreoffice-style-yaru libreoffice-base-core libreoffice-help-ru libreoffice-l10n-ru libreoffice-l10n-rw libreoffice-l10n-is libreoffice-style-elementary python3-uno libreoffice-l10n-fa libreoffice-l10n-am libreoffice-l10n-ro libreoffice-l10n-en-za libreoffice-style-sukapura libreoffice-l10n-ca libreoffice-help-sl libreoffice-calc-nogui libreoffice-help-sk libreoffice-help-sv libreoffice-l10n-cs python3-scriptforge libreoffice-dev-doc libreoffice-help-common libreoffice-l10n-za libreoffice-l10n-cy libreoffice-l10n-oc libjurt-java libreoffice-base libreoffice-help-gl libreoffice-l10n-om libreoffice-l10n-or libreoffice-l10n-pt-br libreoffice-l10n-kmr uno-libs-private libreoffice-l10n-ast libreoffice-l10n-hu libreoffice-l10n-hr libreoffice-script-provider-python libreoffice-writer-nogui libreoffice-l10n-hy libreoffice-l10n-he libreoffice-officebean libreoffice-dev libreoffice-report-builder libuno-sal3t64 libreoffice-help-tr libreoffice-l10n-hi libreoffice-kf5 libreoffice-help-dz libreoffice-l10n-pt libreoffice-l10n-ja libreoffice-l10n-pl libreoffice-sdbc-postgresql libreoffice-writer libreoffice-help-de libreoffice-help-da libreoffice-uiconfig-base ure libreoffice-impress-nogui libjuh-java libreoffice-l10n-it libreoffice-l10n-xh libreoffice-l10n-af libuno-cppuhelpergcc3-3t64 libreoffice-help-zh-tw libreoffice-l10n-en-gb libreoffice-draw libuno-salhelpergcc3-3t64 libreoffice-core-nogui libreoffice-l10n-as libreoffice-l10n-ar libreoffice-l10n-in amavisd-new-postfix amavisd-new unbound python3-unbound libunbound8 unbound-anchor unbound-host libunbound-dev git gitweb git-gui git-daemon-sysvinit gitk git-all git-mediawiki git-daemon-run git-man git-doc git-svn git-cvs git-email frr frr-rpki-rtrlib frr-snmp frr-doc frr-pythontools libtss2-esys-3.0.2-0t64 libtss2-sys1t64 libtss2-mu-4.0.1-0t64 libtss2-tcti-spi-helper0t64 libtss2-tcti-libtpms0t64 libtss2-doc libtss2-tcti-swtpm0t64 libtss2-tcti-device0t64 libtss2-rc0t64 libtss2-fapi1t64 libtss2-tcti-mssim0t64 libtss2-policy0t64 libtss2-tcti-pcap0t64 libtss2-tctildr0t64 libtss2-dev libtss2-tcti-cmd0t64 intel-microcode gstreamer1.0-plugins-base libgstreamer-plugins-base1.0-0 gstreamer1.0-x libgstreamer-gl1.0-0 gstreamer1.0-gl libgstreamer-plugins-base1.0-dev gir1.2-gst-plugins-base-1.0 gstreamer1.0-alsa gstreamer1.0-plugins-base-apps python3-werkzeug python-werkzeug-doc python3-pymysql python-pymysql-doc postgresql-server-dev-16 libecpg6 postgresql-pltcl-16 libpq-dev postgresql-16 libpgtypes3 libecpg-dev postgresql-plperl-16 libpq5 postgresql-client-16 postgresql-doc-16 postgresql-plpython3-16 libecpg-compat3 ffmpeg ffmpeg-doc libavcodec-dev libavcodec-extra libavcodec-extra60 libavcodec60 libavdevice-dev libavdevice60 libavfilter-dev libavfilter-extra libavfilter-extra9 libavfilter9 libavformat-dev libavformat-extra libavformat-extra60 libavformat60 libavutil-dev libavutil58 libpostproc-dev libpostproc57 libswresample-dev libswresample4 libswscale-dev libswscale7 libc-bin glibc-doc libc6-i386 libc6-s390 libc6-dev-i386 nscd libc6-dev-x32 libc6-dev libc6-amd64 libc6-x32 libc6-dev-amd64 libc-dev-bin libc6 locales-all libc-devtools glibc-source libc6-dev-s390 locales libarchive-dev libarchive13t64 libarchive-tools libgdk-pixbuf-2.0-dev gdk-pixbuf-tests libgdk-pixbuf2.0-common libgdk-pixbuf2.0-bin libgdk-pixbuf2.0-doc gir1.2-gdkpixbuf-2.0 libgdk-pixbuf-2.0-0 openjdk-8-doc openjdk-8-jdk openjdk-8-jre-headless openjdk-8-jre openjdk-8-jdk-headless openjdk-8-source openjdk-8-jre-zero openjdk-8-demo libvpx-dev libvpx9 libvpx-doc vpx-tools libaom-doc libaom-dev libaom3 aom-tools 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: mysql-client libmysqlclient-dev mysql-testsuite-8.0 mysql-router mysql-server libmysqlclient21 mysql-client-core-8.0 mysql-server-core-8.0 mysql-server-8.0 mysql-testsuite mysql-client-8.0 mysql-source-8.0 libtiff-opengl libtiff5-dev libtiff-dev libtiffxx6 libtiff6 libtiff-tools libtiff-doc libndp0 libndp-dev libndp-tools virtuoso-vad-demo virtuoso-vad-sparqldemo virtuoso-vad-rdfmappers virtuoso-vsp-startpage virtuoso-vad-isparql virtuoso-opensource-7-bin virtuoso-server virtuoso-vad-tutorial virtuoso-minimal virtuoso-opensource virtuoso-vad-ods virtuoso-opensource-7 virtuoso-vad-syncml virtuoso-vad-doc virtuoso-vad-conductor libvirtodbc0 libvirtuoso5.5-cil virtuoso-vad-bpel virtuoso-opensource-7-common libvte-2.91-gtk4-dev libvte-2.91-common gir1.2-vte-3.91 gir1.2-vte-2.91 libvte-2.91-doc libvte-2.91-gtk4-0 libvte-2.91-0 libvte-2.91-gtk4-doc libvte-2.91-dev ghostscript libgs10-common libgs10 libgs-common libgs-dev ghostscript-doc libsss-certmap-dev libipa-hbac-dev sssd-ad libsss-sudo libsss-nss-idmap0 libnss-sss sssd-ipa sssd-passkey libipa-hbac0t64 libsss-idmap-dev python3-libsss-nss-idmap sssd-common python3-sss libpam-sss sssd libsss-idmap0 sssd-idp libsss-nss-idmap-dev sssd-kcm libsss-certmap0 python3-libipa-hbac sssd-ldap sssd-tools sssd-ad-common sssd-krb5-common sssd-dbus sssd-krb5 sssd-proxy ruby-rack ruby3.2 ruby3.2-doc ruby3.2-dev libruby3.2 mariadb-plugin-provider-lzo mariadb-plugin-cracklib-password-check mariadb-backup mariadb-plugin-connect mariadb-plugin-spider libmariadb-dev libmariadb3 mariadb-plugin-s3 mariadb-plugin-provider-bzip2 mariadb-plugin-provider-lzma mariadb-plugin-provider-snappy mariadb-client libmariadbd19t64 mariadb-server-core mariadb-server-10.5 mariadb-test-data mariadb-plugin-provider-lz4 mariadb-client-core mariadb-plugin-rocksdb mariadb-plugin-gssapi-client mariadb-plugin-mroonga libmariadbd-dev libmariadb-dev-compat mariadb-plugin-gssapi-server mariadb-server mariadb-common mariadb-plugin-hashicorp-key-management mariadb-plugin-oqgraph mariadb-test php8.3-cgi php8.3-xsl php8.3-fpm php8.3-phpdbg php8.3-zip php8.3-curl php8.3-ldap php8.3-gmp php8.3-sqlite3 php8.3-gd php8.3-common php8.3-enchant php8.3-odbc php8.3-cli php8.3-mbstring php8.3-pgsql php8.3-mysql php8.3-dba libapache2-mod-php8.3 php8.3-soap php8.3-opcache php8.3-sybase php8.3-pspell libphp8.3-embed php8.3-bz2 php8.3-dev php8.3 php8.3-tidy php8.3-interbase php8.3-readline php8.3-intl php8.3-imap php8.3-xml php8.3-bcmath php8.3-snmp plasma-workspace-dev libweather-ion7 libkfontinst5 libcolorcorrect5 libkworkspace5-5 plasma-workspace-data plasma-workspace-wayland sddm-theme-breeze libplasma-geolocation-interface5 libnotificationmanager1 libkfontinstui5 libtaskmanager6 plasma-workspace libcups2-dev cups-bsd cups-common cups-core-drivers cups-server-common cups-client libcupsimage2t64 libcupsimage2-dev cups-ipp-utils cups-ppdc cups libcups2t64 cups-daemon libcups2-dev cups-bsd cups-common cups-core-drivers cups-server-common cups-client libcupsimage2t64 libcupsimage2-dev cups-ipp-utils cups-ppdc cups libcups2t64 cups-daemon netplan.io netplan-generator libnetplan1 python3-netplan libnetplan-dev netplan.io netplan-generator libnetplan1 python3-netplan libnetplan-dev wget libiso9660-dev libiso9660-11t64 libcdio-utils libcdio19t64 libiso9660++0t64 libudf-dev libcdio++1t64 libiso9660++-dev libudf0t64 libcdio++-dev libcdio-dev openssh-client openssh-server ssh-askpass-gnome ssh openssh-tests openssh-sftp-server openvpn 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: libreoffice-nlpsolver libreoffice-wiki-publisher fonts-opensymbol libreoffice-evolution libreoffice-help-en-gb libreoffice-librelogo libreoffice-l10n-ml libreoffice-help-zh-cn libreoffice-subsequentcheckbase libreoffice-l10n-mk libreoffice-help-id libreoffice-l10n-mr libreoffice-style-tango libreoffice-help-pt-br libreofficekit-data libreoffice-core libreoffice-help-it libreoffice-l10n-uk libreoffice-l10n-fr libreoffice-gnome libreoffice-l10n-fi libreoffice-help-nl libreoffice-uiconfig-math libreoffice-l10n-uz libreoffice libreoffice-sdbc-mysql libreoffice-l10n-nb libreoffice-l10n-mn libreoffice-l10n-ne libreoffice-l10n-nl libreoffice-uiconfig-writer libreoffice-l10n-nn libreoffice-help-fi libreoffice-l10n-dz libreoffice-l10n-nr libreoffice-help-fr libreoffice-report-builder-bin libofficebean-java libreoffice-qt6 libreoffice-l10n-vi libreoffice-l10n-nso libreoffice-qt5 libreoffice-nogui libreoffice-math-nogui libreoffice-style-karasa-jaga libreoffice-l10n-ve libreoffice-l10n-gu libreoffice-help-om libreoffice-l10n-gl python3-access2base libreoffice-help-en-us libreoffice-l10n-ga libuno-cppu3t64 liblibreofficekitgtk libreoffice-l10n-gd libreoffice-help-km libreoffice-l10n-kn libreoffice-help-ko libreoffice-l10n-st libreoffice-dev-common libreoffice-l10n-sr libreoffice-help-cs libreoffice-l10n-ts libreoffice-l10n-sv libreoffice-script-provider-bsh gir1.2-lokdocview-0.1 ure-java libreoffice-report-builder-bin-nogui libreoffice-l10n-ka libreoffice-uiconfig-common libridl-java libreoffice-help-ca libreoffice-l10n-zh-tw libreoffice-l10n-sl libreoffice-l10n-sk libreoffice-style-breeze libreoffice-l10n-si libreoffice-l10n-da libreofficekit-dev libreoffice-l10n-de libreoffice-common libreoffice-help-pl libreoffice-l10n-pa-in libuno-purpenvhelpergcc3-3t64 libreoffice-uiconfig-report-builder libreoffice-help-pt libreoffice-base-nogui libreoffice-gtk3 libreoffice-math libreoffice-help-vi libreoffice-gtk4 libreoffice-l10n-tr libreoffice-help-hi libreoffice-l10n-gug libreoffice-sdbc-hsqldb libreoffice-draw-nogui libreoffice-calc libreoffice-base-drivers libreoffice-style-colibre libreoffice-l10n-ta libreoffice-sdbc-firebird libreoffice-l10n-tg libreoffice-l10n-te libreoffice-l10n-th libreoffice-l10n-id libreoffice-l10n-lv libreoffice-help-hu libreoffice-l10n-lt libreoffice-l10n-ss libunoloader-java libreoffice-uiconfig-impress libreoffice-l10n-eu libreoffice-l10n-et libreoffice-script-provider-js libreoffice-l10n-es libreoffice-l10n-el libreoffice-l10n-eo libreoffice-style-sifr libreoffice-l10n-zh-cn libreoffice-l10n-ug libreoffice-smoketest-data libreoffice-l10n-ko libreoffice-l10n-zu libreoffice-impress libreoffice-java-common libreoffice-help-eu libreoffice-help-et libreoffice-help-es libreoffice-l10n-km libreoffice-uiconfig-draw libreoffice-help-el libreoffice-uiconfig-calc libreoffice-l10n-kk libreoffice-dev-gui libreoffice-l10n-be libreoffice-l10n-szl libreoffice-l10n-bg libreoffice-l10n-tn libreoffice-l10n-bn libreoffice-plasma libreoffice-help-ja libreoffice-l10n-br libreoffice-l10n-bs liblibreoffice-java libunoil-java libreoffice-style-yaru libreoffice-base-core libreoffice-help-ru libreoffice-l10n-ru libreoffice-l10n-rw libreoffice-l10n-is libreoffice-style-elementary python3-uno libreoffice-l10n-fa libreoffice-l10n-am libreoffice-l10n-ro libreoffice-l10n-en-za libreoffice-style-sukapura libreoffice-l10n-ca libreoffice-help-sl libreoffice-calc-nogui libreoffice-help-sk libreoffice-help-sv libreoffice-l10n-cs python3-scriptforge libreoffice-dev-doc libreoffice-help-common libreoffice-l10n-za libreoffice-l10n-cy libreoffice-l10n-oc libjurt-java libreoffice-base libreoffice-help-gl libreoffice-l10n-om libreoffice-l10n-or libreoffice-l10n-pt-br libreoffice-l10n-kmr uno-libs-private libreoffice-l10n-ast libreoffice-l10n-hu libreoffice-l10n-hr libreoffice-script-provider-python libreoffice-writer-nogui libreoffice-l10n-hy libreoffice-l10n-he libreoffice-officebean libreoffice-dev libreoffice-report-builder libuno-sal3t64 libreoffice-help-tr libreoffice-l10n-hi libreoffice-kf5 libreoffice-help-dz libreoffice-l10n-pt libreoffice-l10n-ja libreoffice-l10n-pl libreoffice-sdbc-postgresql libreoffice-writer libreoffice-help-de libreoffice-help-da libreoffice-uiconfig-base ure libreoffice-impress-nogui libjuh-java libreoffice-l10n-it libreoffice-l10n-xh libreoffice-l10n-af libuno-cppuhelpergcc3-3t64 libreoffice-help-zh-tw libreoffice-l10n-en-gb libreoffice-draw libuno-salhelpergcc3-3t64 libreoffice-core-nogui libreoffice-l10n-as libreoffice-l10n-ar libreoffice-l10n-in 0: libvirtodbc0 libvirtuoso5.5-cil virtuoso-minimal virtuoso-opensource virtuoso-opensource-7 virtuoso-opensource-7-bin virtuoso-opensource-7-common virtuoso-server virtuoso-vad-bpel virtuoso-vad-conductor virtuoso-vad-demo virtuoso-vad-doc virtuoso-vad-isparql virtuoso-vad-ods virtuoso-vad-rdfmappers virtuoso-vad-sparqldemo virtuoso-vad-syncml virtuoso-vad-tutorial virtuoso-vsp-startpage cinder-api cinder-backup cinder-common cinder-scheduler cinder-volume python3-cinder glance glance-api glance-common python-glance-doc python3-glance nova-ajax-console-proxy nova-api nova-api-metadata nova-api-os-compute nova-api-os-volume nova-cells nova-common nova-compute nova-compute-ironic nova-compute-kvm nova-compute-libvirt nova-compute-lxc nova-compute-qemu nova-compute-vmware nova-compute-xen nova-conductor nova-doc nova-novncproxy nova-scheduler nova-serialproxy nova-spiceproxy nova-volume python3-nova apache2 apache2-bin apache2-data apache2-dev apache2-doc apache2-ssl-dev apache2-suexec-custom apache2-suexec-pristine apache2-utils libapache2-mod-md libapache2-mod-proxy-uwsgi apache2 apache2-bin apache2-data apache2-dev apache2-doc apache2-ssl-dev apache2-suexec-custom apache2-suexec-pristine apache2-utils libapache2-mod-md libapache2-mod-proxy-uwsgi golang-1.21 golang-1.21-doc golang-1.21-go golang-1.21-src golang-1.22 golang-1.22-doc golang-1.22-go golang-1.22-src openssh-client openssh-server openssh-sftp-server openssh-tests ssh ssh-askpass-gnome python-django-doc python3-django dotnet-sdk-8.0 dotnet-sdk-8.0-source-built-artifacts dotnet-sdk-dbg-8.0 dotnet-templates-8.0 netstandard-targeting-pack-2.1-8.0 dotnet8 aspnetcore-runtime-8.0 aspnetcore-runtime-dbg-8.0 aspnetcore-targeting-pack-8.0 dotnet-apphost-pack-8.0 dotnet-host-8.0 dotnet-hostfxr-8.0 dotnet-runtime-8.0 dotnet-runtime-dbg-8.0 dotnet-targeting-pack-8.0 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: ghostscript ghostscript-doc libgs-common libgs-dev libgs10 libgs10-common gir1.2-gtk-2.0 gtk2-engines-pixbuf libgail-common libgail-dev libgail-doc libgail18t64 libgtk2.0-0t64 libgtk2.0-bin libgtk2.0-common libgtk2.0-dev libgtk2.0-doc gir1.2-gtk-3.0 gtk-3-examples gtk-update-icon-cache libgail-3-0t64 libgail-3-dev libgail-3-doc libgtk-3-0t64 libgtk-3-bin libgtk-3-common libgtk-3-dev libgtk-3-doc apache2 apache2-bin apache2-data apache2-dev apache2-doc apache2-ssl-dev apache2-suexec-custom apache2-suexec-pristine apache2-utils libapache2-mod-md libapache2-mod-proxy-uwsgi python-pymongo-doc python3-bson python3-bson-ext python3-gridfs python3-pymongo python3-pymongo-ext python3-zipp squid squid-cgi squid-common squid-openssl squid-purge squidclient bind9 bind9-dev bind9-dnsutils bind9-doc bind9-host bind9-libs bind9-utils bind9utils dnsutils nova-ajax-console-proxy nova-api nova-api-metadata nova-api-os-compute nova-api-os-volume nova-cells nova-common nova-compute nova-compute-ironic nova-compute-kvm nova-compute-libvirt nova-compute-lxc nova-compute-qemu nova-compute-vmware nova-compute-xen nova-conductor nova-doc nova-novncproxy nova-scheduler nova-serialproxy nova-spiceproxy nova-volume python3-nova provd gir1.2-poppler-0.18 libpoppler-cpp-dev libpoppler-cpp0t64 libpoppler-dev libpoppler-glib-dev libpoppler-glib-doc libpoppler-glib8t64 libpoppler-private-dev libpoppler-qt5-1t64 libpoppler-qt5-dev libpoppler-qt6-3t64 libpoppler-qt6-dev libpoppler134 poppler-utils 0: 0: 0: 0: 0: 0: 0: 0: 0: openjdk-8-demo openjdk-8-doc openjdk-8-jdk openjdk-8-jdk-headless openjdk-8-jre openjdk-8-jre-headless openjdk-8-jre-zero openjdk-8-source openjdk-11-demo openjdk-11-doc openjdk-11-jdk openjdk-11-jdk-headless openjdk-11-jre openjdk-11-jre-headless openjdk-11-jre-zero openjdk-11-source openjdk-17-demo openjdk-17-doc openjdk-17-jdk openjdk-17-jdk-headless openjdk-17-jre openjdk-17-jre-headless openjdk-17-jre-zero openjdk-17-source openjdk-21-demo openjdk-21-doc openjdk-21-jdk openjdk-21-jdk-headless openjdk-21-jre openjdk-21-jre-headless openjdk-21-jre-zero openjdk-21-source openjdk-21-testsupport libmysqlclient-dev libmysqlclient21 mysql-client mysql-client-8.0 mysql-client-core-8.0 mysql-router mysql-server mysql-server-8.0 mysql-server-core-8.0 mysql-source-8.0 mysql-testsuite mysql-testsuite-8.0 libssl-dev libssl-doc libssl3t64 openssl exim4 exim4-base exim4-config exim4-daemon-heavy exim4-daemon-light exim4-dev eximon4 golang-github-snapcore-snapd-dev golang-github-ubuntu-core-snappy-dev snap-confine snapd snapd-xdg-open ubuntu-core-launcher ubuntu-core-snapd-units ubuntu-snappy ubuntu-snappy-cli idle-python3.12 libpython3.12-dev libpython3.12-minimal libpython3.12-stdlib libpython3.12-testsuite libpython3.12t64 python3.12 python3.12-dev python3.12-doc python3.12-examples python3.12-full python3.12-minimal python3.12-nopie python3.12-venv gross curl libcurl3t64-gnutls libcurl4-doc libcurl4-gnutls-dev libcurl4-openssl-dev libcurl4t64 eapoltest hostapd libwpa-client-dev wpagui wpasupplicant python-django-doc python3-django krb5-admin-server krb5-doc krb5-gss-samples krb5-k5tls krb5-kdc krb5-kdc-ldap krb5-kpropd krb5-locales krb5-multidev krb5-otp krb5-pkinit krb5-user libgssapi-krb5-2 libgssrpc4t64 libk5crypto3 libkadm5clnt-mit12 libkadm5srv-mit12 libkdb5-10t64 libkrad-dev libkrad0 libkrb5-3 libkrb5-dev libkrb5support0 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: dotnet-sdk-8.0 dotnet-sdk-8.0-source-built-artifacts dotnet-sdk-dbg-8.0 dotnet-templates-8.0 netstandard-targeting-pack-2.1-8.0 dotnet8 aspnetcore-runtime-8.0 aspnetcore-runtime-dbg-8.0 aspnetcore-targeting-pack-8.0 dotnet-apphost-pack-8.0 dotnet-host-8.0 dotnet-hostfxr-8.0 dotnet-runtime-8.0 dotnet-runtime-dbg-8.0 dotnet-targeting-pack-8.0 busybox busybox-initramfs busybox-static busybox-syslogd udhcpc udhcpd libreoffice-nlpsolver libreoffice-wiki-publisher fonts-opensymbol gir1.2-lokdocview-0.1 libjuh-java libjurt-java liblibreoffice-java liblibreofficekitgtk libofficebean-java libreoffice libreoffice-base libreoffice-base-core libreoffice-base-drivers libreoffice-base-nogui libreoffice-calc libreoffice-calc-nogui libreoffice-common libreoffice-core libreoffice-core-nogui libreoffice-dev libreoffice-dev-common libreoffice-dev-doc libreoffice-dev-gui libreoffice-draw libreoffice-draw-nogui libreoffice-evolution libreoffice-gnome libreoffice-gtk3 libreoffice-gtk4 libreoffice-help-ca libreoffice-help-common libreoffice-help-cs libreoffice-help-da libreoffice-help-de libreoffice-help-dz libreoffice-help-el libreoffice-help-en-gb libreoffice-help-en-us libreoffice-help-es libreoffice-help-et libreoffice-help-eu libreoffice-help-fi libreoffice-help-fr libreoffice-help-gl libreoffice-help-hi libreoffice-help-hu libreoffice-help-id libreoffice-help-it libreoffice-help-ja libreoffice-help-km libreoffice-help-ko libreoffice-help-nl libreoffice-help-om libreoffice-help-pl libreoffice-help-pt libreoffice-help-pt-br libreoffice-help-ru libreoffice-help-sk libreoffice-help-sl libreoffice-help-sv libreoffice-help-tr libreoffice-help-vi libreoffice-help-zh-cn libreoffice-help-zh-tw libreoffice-impress libreoffice-impress-nogui libreoffice-java-common libreoffice-kf5 libreoffice-l10n-af libreoffice-l10n-am libreoffice-l10n-ar libreoffice-l10n-as libreoffice-l10n-ast libreoffice-l10n-be libreoffice-l10n-bg libreoffice-l10n-bn libreoffice-l10n-br libreoffice-l10n-bs libreoffice-l10n-ca libreoffice-l10n-cs libreoffice-l10n-cy libreoffice-l10n-da libreoffice-l10n-de libreoffice-l10n-dz libreoffice-l10n-el libreoffice-l10n-en-gb libreoffice-l10n-en-za libreoffice-l10n-eo libreoffice-l10n-es libreoffice-l10n-et libreoffice-l10n-eu libreoffice-l10n-fa libreoffice-l10n-fi libreoffice-l10n-fr libreoffice-l10n-ga libreoffice-l10n-gd libreoffice-l10n-gl libreoffice-l10n-gu libreoffice-l10n-gug libreoffice-l10n-he libreoffice-l10n-hi libreoffice-l10n-hr libreoffice-l10n-hu libreoffice-l10n-hy libreoffice-l10n-id libreoffice-l10n-in libreoffice-l10n-is libreoffice-l10n-it libreoffice-l10n-ja libreoffice-l10n-ka libreoffice-l10n-kk libreoffice-l10n-km libreoffice-l10n-kmr libreoffice-l10n-kn libreoffice-l10n-ko libreoffice-l10n-lt libreoffice-l10n-lv libreoffice-l10n-mk libreoffice-l10n-ml libreoffice-l10n-mn libreoffice-l10n-mr libreoffice-l10n-nb libreoffice-l10n-ne libreoffice-l10n-nl libreoffice-l10n-nn libreoffice-l10n-nr libreoffice-l10n-nso libreoffice-l10n-oc libreoffice-l10n-om libreoffice-l10n-or libreoffice-l10n-pa-in libreoffice-l10n-pl libreoffice-l10n-pt libreoffice-l10n-pt-br libreoffice-l10n-ro libreoffice-l10n-ru libreoffice-l10n-rw libreoffice-l10n-si libreoffice-l10n-sk libreoffice-l10n-sl libreoffice-l10n-sr libreoffice-l10n-ss libreoffice-l10n-st libreoffice-l10n-sv libreoffice-l10n-szl libreoffice-l10n-ta libreoffice-l10n-te libreoffice-l10n-tg libreoffice-l10n-th libreoffice-l10n-tn libreoffice-l10n-tr libreoffice-l10n-ts libreoffice-l10n-ug libreoffice-l10n-uk libreoffice-l10n-uz libreoffice-l10n-ve libreoffice-l10n-vi libreoffice-l10n-xh libreoffice-l10n-za libreoffice-l10n-zh-cn libreoffice-l10n-zh-tw libreoffice-l10n-zu libreoffice-librelogo libreoffice-math libreoffice-math-nogui libreoffice-nogui libreoffice-officebean libreoffice-plasma libreoffice-qt5 libreoffice-qt6 libreoffice-report-builder libreoffice-report-builder-bin libreoffice-report-builder-bin-nogui libreoffice-script-provider-bsh libreoffice-script-provider-js libreoffice-script-provider-python libreoffice-sdbc-firebird libreoffice-sdbc-hsqldb libreoffice-sdbc-mysql libreoffice-sdbc-postgresql libreoffice-smoketest-data libreoffice-style-breeze libreoffice-style-colibre libreoffice-style-elementary libreoffice-style-karasa-jaga libreoffice-style-sifr libreoffice-style-sukapura libreoffice-style-tango libreoffice-style-yaru libreoffice-subsequentcheckbase libreoffice-uiconfig-base libreoffice-uiconfig-calc libreoffice-uiconfig-common libreoffice-uiconfig-draw libreoffice-uiconfig-impress libreoffice-uiconfig-math libreoffice-uiconfig-report-builder libreoffice-uiconfig-writer libreoffice-writer libreoffice-writer-nogui libreofficekit-data libreofficekit-dev libridl-java libuno-cppu3t64 libuno-cppuhelpergcc3-3t64 libuno-purpenvhelpergcc3-3t64 libuno-sal3t64 libuno-salhelpergcc3-3t64 libunoil-java libunoloader-java python3-access2base python3-scriptforge python3-uno uno-libs-private ure ure-java gnome-shell gnome-shell-common gnome-shell-extension-prefs liborc-0.4-0t64 liborc-0.4-dev liborc-0.4-dev-bin liborc-0.4-doc intel-microcode libecpg-compat3 libecpg-dev libecpg6 libpgtypes3 libpq-dev libpq5 postgresql-16 postgresql-client-16 postgresql-doc-16 postgresql-plperl-16 postgresql-plpython3-16 postgresql-pltcl-16 postgresql-server-dev-16 cacti 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: qemu-block-extra qemu-block-supplemental qemu-guest-agent qemu-system qemu-system-arm qemu-system-common qemu-system-data qemu-system-gui qemu-system-mips qemu-system-misc qemu-system-modules-opengl qemu-system-modules-spice qemu-system-ppc qemu-system-s390x qemu-system-sparc qemu-system-x86 qemu-system-x86-xen qemu-system-xen qemu-user qemu-user-binfmt qemu-user-static qemu-utils dovecot-auth-lua dovecot-core dovecot-dev dovecot-gssapi dovecot-imapd dovecot-ldap dovecot-lmtpd dovecot-managesieved dovecot-mysql dovecot-pgsql dovecot-pop3d dovecot-sieve dovecot-solr dovecot-sqlite dovecot-submissiond ffmpeg ffmpeg-doc libavcodec-dev libavcodec-extra libavcodec-extra60 libavcodec60 libavdevice-dev libavdevice60 libavfilter-dev libavfilter-extra libavfilter-extra9 libavfilter9 libavformat-dev libavformat-extra libavformat-extra60 libavformat60 libavutil-dev libavutil58 libpostproc-dev libpostproc57 libswresample-dev libswresample4 libswscale-dev libswscale7 python-webob-doc python3-webob libssl-dev libssl-doc libssl3t64 openssl python-django-doc python3-django python3-twisted twisted-doc ironic-api ironic-common ironic-conductor python3-ironic znc-backlog znc-push znc znc-dev znc-perl znc-python znc-tcl python-aiohttp-doc python3-aiohttp vim vim-athena vim-common vim-doc vim-gtk3 vim-gui-common vim-motif vim-nox vim-runtime vim-tiny xxd gir1.2-javascriptcoregtk-4.1 gir1.2-javascriptcoregtk-6.0 gir1.2-webkit-6.0 gir1.2-webkit2-4.1 libjavascriptcoregtk-4.0-bin libjavascriptcoregtk-4.1-0 libjavascriptcoregtk-4.1-dev libjavascriptcoregtk-6.0-1 libjavascriptcoregtk-6.0-dev libjavascriptcoregtk-bin libwebkit2gtk-4.0-doc libwebkit2gtk-4.1-0 libwebkit2gtk-4.1-dev libwebkitgtk-6.0-4 libwebkitgtk-6.0-dev libwebkitgtk-doc webkit2gtk-driver libtiff-dev libtiff-doc libtiff-opengl libtiff-tools libtiff5-dev libtiff6 libtiffxx6 libunbound-dev libunbound8 python3-unbound unbound unbound-anchor unbound-host 0: 0: 0: 0: 0: 0: 0: expat libexpat1 libexpat1-dev libxmltok1-dev libxmltok1t64 python-setuptools-doc python3-pkg-resources python3-setuptools python3-setuptools-whl 0: 0: 0: dcmtk dcmtk-doc libdcmtk-dev libdcmtk17t64 clamav clamav-base clamav-daemon clamav-docs clamav-freshclam clamav-milter clamav-testfiles clamdscan libclamav-dev libclamav11t64 curl libcurl3t64-gnutls libcurl4-doc libcurl4-gnutls-dev libcurl4-openssl-dev libcurl4t64 libnginx-mod-http-geoip libnginx-mod-http-image-filter libnginx-mod-http-perl libnginx-mod-http-xslt-filter libnginx-mod-mail libnginx-mod-stream libnginx-mod-stream-geoip nginx nginx-common nginx-core nginx-dev nginx-doc nginx-extras nginx-full nginx-light idle-python3.12 libpython3.12-dev libpython3.12-minimal libpython3.12-stdlib libpython3.12-testsuite libpython3.12t64 python3.12 python3.12-dev python3.12-doc python3.12-examples python3.12-full python3.12-minimal python3.12-nopie python3.12-venv frr frr-doc frr-pythontools frr-rpki-rtrlib frr-snmp 0: 0: 0: 0: 0: 0: 0: 0: 0: 0: emacs emacs-bin-common emacs-common emacs-el emacs-gtk emacs-lucid emacs-nox emacs-pgtk puma libtomcat9-java intel-microcode libopenjp2-7 libopenjp2-7-dev libopenjp2-tools libopenjpip-dec-server libopenjpip-server libopenjpip-viewer libopenjpip7 openjpeg-doc libapr1-dev libapr1t64 cups cups-bsd cups-client cups-common cups-core-drivers cups-daemon cups-ipp-utils cups-ppdc cups-server-common libcups2-dev libcups2t64 libcupsimage2-dev libcupsimage2t64 cups-browsed cups-browsed-tests libcupsfilters-dev libcupsfilters-tests libcupsfilters2-common libcupsfilters2t64 libppd-dev libppd-tests libppd-utils libppd2 libppd2-common ppdc lkp_Ubuntu_6_8_0[_|\d]+_aws_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_gcp_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_linux_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_ibm_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_aws_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_azure_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_gcp_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_linux_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_ibm_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_aws_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_azure_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_gcp_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_linux_(\d+) lkp_Ubuntu_6_8_0[_|\d]+_ibm_(\d+)