Canonical USN OVAL Generator
1
5.11.1
2024-09-28T15:29:19
Copyright (C) 2024 Canonical LTD. All rights reserved. This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, version 3 of the License. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License version 3 for more details. You should have received a copy of the GNU General Public License version 3 along with this program. If not, see http://www.gnu.org/licenses/.
Check that Ubuntu 24.04 LTS (noble) is installed.
USN-6663-3 -- OpenSSL update
Ubuntu 24.04 LTS
USN-6663-1 provided a security update for OpenSSL. This update provides the corresponding update for Ubuntu 24.04 LTS. Original advisory details: As a security improvement, OpenSSL will now return deterministic random bytes instead of an error when detecting wrong padding in PKCS#1 v1.5 RSA to prevent its use in possible Bleichenbacher timing attacks. Update Instructions: Run `sudo pro fix USN-6663-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libssl3t64 - 3.0.13-0ubuntu3.1 libssl-dev - 3.0.13-0ubuntu3.1 openssl - 3.0.13-0ubuntu3.1 libssl-doc - 3.0.13-0ubuntu3.1 No subscription required
None
https://launchpad.net/bugs/2054090
USN-6673-3 -- python-cryptography vulnerability
Ubuntu 24.04 LTS
USN-6673-1 provided a security update for python-cryptography. This update provides the corresponding update for Ubuntu 24.04 LTS. Original advisory details: It was discovered that python-cryptography incorrectly handled memory operations when processing mismatched PKCS#12 keys. A remote attacker could possibly use this issue to cause python-cryptography to crash, leading to a denial of service. This issue only affected Ubuntu 23.10. (CVE-2024-26130) Update Instructions: Run `sudo pro fix USN-6673-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-cryptography - 41.0.7-4ubuntu0.1 python-cryptography-doc - 41.0.7-4ubuntu0.1 No subscription required
Medium
CVE-2024-26130
USN-6715-2 -- unixODBC vulnerability
Ubuntu 24.04 LTS
USN-6715-1 fixed a vulnerability in unixODBC. This update provides the corresponding fix for Ubuntu 24.04 LTS. Original advisory details: It was discovered that unixODBC incorrectly handled certain bytes. An attacker could use this issue to execute arbitrary code or cause a crash. Update Instructions: Run `sudo pro fix USN-6715-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libodbc2 - 2.3.12-1ubuntu0.24.04.1 unixodbc-dev - 2.3.12-1ubuntu0.24.04.1 unixodbc-common - 2.3.12-1ubuntu0.24.04.1 unixodbc - 2.3.12-1ubuntu0.24.04.1 odbcinst - 2.3.12-1ubuntu0.24.04.1 libodbcinst2 - 2.3.12-1ubuntu0.24.04.1 libodbccr2 - 2.3.12-1ubuntu0.24.04.1 No subscription required
Medium
CVE-2024-1013
USN-6718-3 -- curl vulnerabilities
Ubuntu 24.04 LTS
USN-6718-1 fixed vulnerabilities in curl. This update provides the corresponding updates for Ubuntu 24.04 LTS. Original advisory details: Dan Fandrich discovered that curl would incorrectly use the default set of protocols when a parameter option disabled all protocols without adding any, contrary to expectations. This issue only affected Ubuntu 23.10. (CVE-2024-2004) It was discovered that curl incorrectly handled memory when limiting the amount of headers when HTTP/2 server push is allowed. A remote attacker could possibly use this issue to cause curl to consume resources, leading to a denial of service. (CVE-2024-2398) Update Instructions: Run `sudo pro fix USN-6718-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libcurl4-gnutls-dev - 8.5.0-2ubuntu10.1 libcurl4-openssl-dev - 8.5.0-2ubuntu10.1 libcurl3t64-gnutls - 8.5.0-2ubuntu10.1 libcurl4-doc - 8.5.0-2ubuntu10.1 curl - 8.5.0-2ubuntu10.1 libcurl4t64 - 8.5.0-2ubuntu10.1 No subscription required
Medium
CVE-2024-2004
CVE-2024-2398
USN-6729-3 -- Apache HTTP Server vulnerabilities
Ubuntu 24.04 LTS
USN-6729-1 fixed vulnerabilities in Apache HTTP Server. This update provides the corresponding updates for Ubuntu 24.04 LTS. Original advisory details: Orange Tsai discovered that the Apache HTTP Server incorrectly handled validating certain input. A remote attacker could possibly use this issue to perform HTTP request splitting attacks. (CVE-2023-38709) Keran Mu and Jianjun Chen discovered that the Apache HTTP Server incorrectly handled validating certain input. A remote attacker could possibly use this issue to perform HTTP request splitting attacks. (CVE-2024-24795) Bartek Nowotarski discovered that the Apache HTTP Server HTTP/2 module incorrectly handled endless continuation frames. A remote attacker could possibly use this issue to cause the server to consume resources, leading to a denial of service. (CVE-2024-27316) Update Instructions: Run `sudo pro fix USN-6729-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: apache2-data - 2.4.58-1ubuntu8.1 libapache2-mod-md - 2.4.58-1ubuntu8.1 apache2-utils - 2.4.58-1ubuntu8.1 apache2-dev - 2.4.58-1ubuntu8.1 apache2-suexec-pristine - 2.4.58-1ubuntu8.1 apache2-suexec-custom - 2.4.58-1ubuntu8.1 apache2 - 2.4.58-1ubuntu8.1 apache2-doc - 2.4.58-1ubuntu8.1 libapache2-mod-proxy-uwsgi - 2.4.58-1ubuntu8.1 apache2-ssl-dev - 2.4.58-1ubuntu8.1 apache2-bin - 2.4.58-1ubuntu8.1 No subscription required
Medium
CVE-2023-38709
CVE-2024-24795
CVE-2024-27316
USN-6733-2 -- GnuTLS vulnerabilities
Ubuntu 24.04 LTS
USN-6733-1 fixed vulnerabilities in GnuTLS. This update provides the corresponding updates for Ubuntu 24.04 LTS. Original advisory details: It was discovered that GnuTLS had a timing side-channel when performing certain ECDSA operations. A remote attacker could possibly use this issue to recover sensitive information. (CVE-2024-28834) It was discovered that GnuTLS incorrectly handled verifying certain PEM bundles. A remote attacker could possibly use this issue to cause GnuTLS to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 23.10. (CVE-2024-28835) Update Instructions: Run `sudo pro fix USN-6733-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libgnutls-openssl27t64 - 3.8.3-1.1ubuntu3.1 libgnutls-dane0t64 - 3.8.3-1.1ubuntu3.1 libgnutls28-dev - 3.8.3-1.1ubuntu3.1 gnutls-doc - 3.8.3-1.1ubuntu3.1 libgnutls30t64 - 3.8.3-1.1ubuntu3.1 gnutls-bin - 3.8.3-1.1ubuntu3.1 No subscription required
Medium
CVE-2024-28834
CVE-2024-28835
USN-6734-2 -- libvirt vulnerabilities
Ubuntu 24.04 LTS
USN-6734-1 fixed vulnerabilities in libvirt. This update provides the corresponding updates for Ubuntu 24.04 LTS. Original advisory details: Alexander Kuznetsov discovered that libvirt incorrectly handled certain API calls. An attacker could possibly use this issue to cause libvirt to crash, resulting in a denial of service. (CVE-2024-1441) It was discovered that libvirt incorrectly handled certain RPC library API calls. An attacker could possibly use this issue to cause libvirt to crash, resulting in a denial of service. (CVE-2024-2494) Update Instructions: Run `sudo pro fix USN-6734-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libvirt-clients-qemu - 10.0.0-2ubuntu8.1 libvirt-dev - 10.0.0-2ubuntu8.1 libvirt-wireshark - 10.0.0-2ubuntu8.1 libvirt-daemon-driver-qemu - 10.0.0-2ubuntu8.1 libvirt-login-shell - 10.0.0-2ubuntu8.1 libvirt-daemon-system-sysv - 10.0.0-2ubuntu8.1 libvirt-daemon-driver-lxc - 10.0.0-2ubuntu8.1 libnss-libvirt - 10.0.0-2ubuntu8.1 libvirt-daemon - 10.0.0-2ubuntu8.1 libvirt-daemon-config-nwfilter - 10.0.0-2ubuntu8.1 libvirt-daemon-driver-storage-iscsi-direct - 10.0.0-2ubuntu8.1 libvirt-daemon-config-network - 10.0.0-2ubuntu8.1 libvirt-l10n - 10.0.0-2ubuntu8.1 libvirt-clients - 10.0.0-2ubuntu8.1 libvirt-daemon-driver-storage-zfs - 10.0.0-2ubuntu8.1 libvirt-daemon-driver-xen - 10.0.0-2ubuntu8.1 libvirt-daemon-driver-vbox - 10.0.0-2ubuntu8.1 libvirt-daemon-driver-storage-gluster - 10.0.0-2ubuntu8.1 libvirt-daemon-system - 10.0.0-2ubuntu8.1 libvirt0 - 10.0.0-2ubuntu8.1 libvirt-daemon-system-systemd - 10.0.0-2ubuntu8.1 libvirt-sanlock - 10.0.0-2ubuntu8.1 libvirt-daemon-driver-storage-rbd - 10.0.0-2ubuntu8.1 libvirt-doc - 10.0.0-2ubuntu8.1 No subscription required
Medium
CVE-2024-1441
CVE-2024-2494
USN-6736-2 -- klibc vulnerabilities
Ubuntu 24.04 LTS
USN-6736-1 fixed vulnerabilities in klibc. This update provides the corresponding updates for Ubuntu 24.04 LTS. Original advisory details: It was discovered that zlib, vendored in klibc, incorrectly handled pointer arithmetic. An attacker could use this issue to cause klibc to crash or to possibly execute arbitrary code. (CVE-2016-9840, CVE-2016-9841) Danilo Ramos discovered that zlib, vendored in klibc, incorrectly handled memory when performing certain deflating operations. An attacker could use this issue to cause klibc to crash or to possibly execute arbitrary code. (CVE-2018-25032) Evgeny Legerov discovered that zlib, vendored in klibc, incorrectly handled memory when performing certain inflate operations. An attacker could use this issue to cause klibc to crash or to possibly execute arbitrary code. (CVE-2022-37434) Update Instructions: Run `sudo pro fix USN-6736-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: klibc-utils - 2.0.13-4ubuntu0.1 libklibc - 2.0.13-4ubuntu0.1 libklibc-dev - 2.0.13-4ubuntu0.1 No subscription required
Medium
CVE-2016-9840
CVE-2016-9841
CVE-2018-25032
CVE-2022-37434
USN-6737-2 -- GNU C Library vulnerability
Ubuntu 24.04 LTS
USN-6737-1 fixed a vulnerability in the GNU C Library. This update provides the corresponding update for Ubuntu 24.04 LTS. Original advisory details: Charles Fol discovered that the GNU C Library iconv feature incorrectly handled certain input sequences. An attacker could use this issue to cause the GNU C Library to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6737-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libc-bin - 2.39-0ubuntu8.1 glibc-doc - 2.39-0ubuntu8.1 locales-all - 2.39-0ubuntu8.1 libc6-i386 - 2.39-0ubuntu8.1 libc6-s390 - 2.39-0ubuntu8.1 libc6-dev-i386 - 2.39-0ubuntu8.1 libc6-dev-s390 - 2.39-0ubuntu8.1 libc6-dev - 2.39-0ubuntu8.1 libc6-amd64 - 2.39-0ubuntu8.1 libc6-x32 - 2.39-0ubuntu8.1 libc6-dev-amd64 - 2.39-0ubuntu8.1 libc-dev-bin - 2.39-0ubuntu8.1 libc6 - 2.39-0ubuntu8.1 nscd - 2.39-0ubuntu8.1 libc-devtools - 2.39-0ubuntu8.1 glibc-source - 2.39-0ubuntu8.1 libc6-dev-x32 - 2.39-0ubuntu8.1 locales - 2.39-0ubuntu8.1 No subscription required
Medium
CVE-2024-2961
USN-6744-3 -- Pillow vulnerability
Ubuntu 24.04 LTS
USN-6744-1 fixed a vulnerability in Pillow. This update provides the corresponding updates for Ubuntu 24.04 LTS. Original advisory details: Hugo van Kemenade discovered that Pillow was not properly performing bounds checks when processing an ICC file, which could lead to a buffer overflow. If a user or automated system were tricked into processing a specially crafted ICC file, an attacker could possibly use this issue to cause a denial of service or execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6744-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-pil.imagetk - 10.2.0-1ubuntu1 python-pil-doc - 10.2.0-1ubuntu1 python3-pil - 10.2.0-1ubuntu1 No subscription required
Medium
CVE-2024-28219
USN-6746-2 -- Google Guest Agent and Google OS Config Agent vulnerability
Ubuntu 24.04 LTS
USN-6746-1 fixed vulnerabilities in Google Guest Agent and Google OS Config Agent. This update provides the corresponding update for Ubuntu 24.04 LTS. Original advisory details: It was discovered that Google Guest Agent and Google OS Config Agent incorrectly handled certain JSON files. An attacker could possibly use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-6746-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: google-guest-agent - 20240213.00-0ubuntu3.1 No subscription required google-osconfig-agent - 20240320.00-0ubuntu1~24.04.1 No subscription required
Medium
CVE-2024-24786
USN-6754-2 -- nghttp2 vulnerability
Ubuntu 24.04 LTS
USN-6754-1 fixed vulnerabilities in nghttp2. This update provides the corresponding update for Ubuntu 24.04 LTS. Original advisory details: It was discovered that nghttp2 incorrectly handled the HTTP/2 implementation. A remote attacker could possibly use this issue to cause nghttp2 to consume resources, leading to a denial of service. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2019-9511, CVE-2019-9513) It was discovered that nghttp2 incorrectly handled request cancellation. A remote attacker could possibly use this issue to cause nghttp2 to consume resources, leading to a denial of service. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2023-44487) It was discovered that nghttp2 could be made to process an unlimited number of HTTP/2 CONTINUATION frames. A remote attacker could possibly use this issue to cause nghttp2 to consume resources, leading to a denial of service. (CVE-2024-28182) Update Instructions: Run `sudo pro fix USN-6754-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libnghttp2-14 - 1.59.0-1ubuntu0.1 libnghttp2-doc - 1.59.0-1ubuntu0.1 libnghttp2-dev - 1.59.0-1ubuntu0.1 nghttp2-proxy - 1.59.0-1ubuntu0.1 nghttp2 - 1.59.0-1ubuntu0.1 nghttp2-client - 1.59.0-1ubuntu0.1 nghttp2-server - 1.59.0-1ubuntu0.1 No subscription required
Medium
CVE-2024-28182
USN-6756-1 -- less vulnerability
Ubuntu 24.04 LTS
It was discovered that less mishandled newline characters in file names. If a user or automated system were tricked into opening specially crafted files, an attacker could possibly use this issue to execute arbitrary commands on the host. Update Instructions: Run `sudo pro fix USN-6756-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: less - 590-2ubuntu2.1 No subscription required
Medium
CVE-2024-32487
USN-6759-1 -- FreeRDP vulnerabilities
Ubuntu 24.04 LTS
It was discovered that FreeRDP incorrectly handled certain memory operations. If a user were tricked into connecting to a malicious server, a remote attacker could possibly use this issue to cause FreeRDP to crash, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-6759-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libwinpr3-dev - 3.5.1+dfsg1-0ubuntu1 libfreerdp-server3-3 - 3.5.1+dfsg1-0ubuntu1 winpr3-utils - 3.5.1+dfsg1-0ubuntu1 libfreerdp-shadow3-3 - 3.5.1+dfsg1-0ubuntu1 freerdp3-dev - 3.5.1+dfsg1-0ubuntu1 freerdp3-shadow-x11 - 3.5.1+dfsg1-0ubuntu1 libfreerdp3-3 - 3.5.1+dfsg1-0ubuntu1 libfreerdp-client3-3 - 3.5.1+dfsg1-0ubuntu1 freerdp3-wayland - 3.5.1+dfsg1-0ubuntu1 libwinpr-tools3-3 - 3.5.1+dfsg1-0ubuntu1 libfreerdp-shadow-subsystem3-3 - 3.5.1+dfsg1-0ubuntu1 freerdp3-x11 - 3.5.1+dfsg1-0ubuntu1 libwinpr3-3 - 3.5.1+dfsg1-0ubuntu1 No subscription required
Medium
CVE-2024-32658
CVE-2024-32659
CVE-2024-32660
CVE-2024-32661
CVE-2024-32662
USN-6761-1 -- Anope vulnerability
Ubuntu 24.04 LTS
It was discovered that Anope did not properly process credentials for suspended accounts. An attacker could possibly use this issue to normally login to the platform as a suspended user after changing their password. Update Instructions: Run `sudo pro fix USN-6761-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: anope - 2.0.12-1ubuntu1 No subscription required
Medium
CVE-2024-30187
USN-6763-1 -- libvirt vulnerability
Ubuntu 24.04 LTS
Martin Širokov discovered that libvirt incorrectly handled certain memory operations. A local attacker could possibly use this issue to access virtproxyd without authorization. Update Instructions: Run `sudo pro fix USN-6763-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libvirt-clients-qemu - 10.0.0-2ubuntu8.2 libvirt-dev - 10.0.0-2ubuntu8.2 libvirt-wireshark - 10.0.0-2ubuntu8.2 libvirt-daemon-driver-qemu - 10.0.0-2ubuntu8.2 libvirt-login-shell - 10.0.0-2ubuntu8.2 libvirt-daemon-system-sysv - 10.0.0-2ubuntu8.2 libvirt-daemon-driver-lxc - 10.0.0-2ubuntu8.2 libnss-libvirt - 10.0.0-2ubuntu8.2 libvirt-daemon - 10.0.0-2ubuntu8.2 libvirt-daemon-config-nwfilter - 10.0.0-2ubuntu8.2 libvirt-daemon-driver-storage-iscsi-direct - 10.0.0-2ubuntu8.2 libvirt-daemon-config-network - 10.0.0-2ubuntu8.2 libvirt-l10n - 10.0.0-2ubuntu8.2 libvirt-clients - 10.0.0-2ubuntu8.2 libvirt-daemon-driver-storage-zfs - 10.0.0-2ubuntu8.2 libvirt-daemon-driver-xen - 10.0.0-2ubuntu8.2 libvirt-daemon-driver-vbox - 10.0.0-2ubuntu8.2 libvirt-daemon-driver-storage-gluster - 10.0.0-2ubuntu8.2 libvirt-daemon-system - 10.0.0-2ubuntu8.2 libvirt0 - 10.0.0-2ubuntu8.2 libvirt-daemon-system-systemd - 10.0.0-2ubuntu8.2 libvirt-sanlock - 10.0.0-2ubuntu8.2 libvirt-daemon-driver-storage-rbd - 10.0.0-2ubuntu8.2 libvirt-doc - 10.0.0-2ubuntu8.2 No subscription required
Medium
CVE-2024-4418
USN-6768-1 -- GLib vulnerability
Ubuntu 24.04 LTS
Alicia Boya García discovered that GLib incorrectly handled signal subscriptions. A local attacker could use this issue to spoof D-Bus signals resulting in a variety of impacts including possible privilege escalation. Update Instructions: Run `sudo pro fix USN-6768-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-glib-2.0 - 2.80.0-6ubuntu3.1 libgirepository-2.0-dev - 2.80.0-6ubuntu3.1 gir1.2-girepository-3.0-dev - 2.80.0-6ubuntu3.1 libglib2.0-0t64 - 2.80.0-6ubuntu3.1 libglib2.0-tests - 2.80.0-6ubuntu3.1 gir1.2-glib-2.0-dev - 2.80.0-6ubuntu3.1 libgirepository-2.0-0 - 2.80.0-6ubuntu3.1 gir1.2-girepository-3.0 - 2.80.0-6ubuntu3.1 libglib2.0-data - 2.80.0-6ubuntu3.1 libglib2.0-doc - 2.80.0-6ubuntu3.1 libglib2.0-bin - 2.80.0-6ubuntu3.1 libglib2.0-dev - 2.80.0-6ubuntu3.1 libglib2.0-dev-bin - 2.80.0-6ubuntu3.1 No subscription required
Medium
CVE-2024-34397
USN-6770-1 -- Fossil regression
Ubuntu 24.04 LTS
USN-6729-1 fixed vulnerabilities in Apache HTTP Server. The update lead to the discovery of a regression in Fossil with regards to the handling of POST requests that do not have a Content-Length field set. This update fixes the problem. We apologize for the inconvenience. Update Instructions: Run `sudo pro fix USN-6770-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: fossil - 1:2.23-1ubuntu0.1 No subscription required
None
https://launchpad.net/bugs/2064509
USN-6771-1 -- SQL parse vulnerability
Ubuntu 24.04 LTS
It was discovered that SQL parse incorrectly handled certain nested lists. An attacker could possibly use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-6771-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-sqlparse-doc - 0.4.4-1ubuntu0.1 python3-sqlparse - 0.4.4-1ubuntu0.1 sqlformat - 0.4.4-1ubuntu0.1 No subscription required
Medium
CVE-2024-4340
USN-6773-1 -- .NET vulnerabilities
Ubuntu 24.04 LTS
It was discovered that .NET did not properly handle memory in it's Double Parse routine. An attacker could possibly use this issue to achieve remote code execution. (CVE-2024-30045) It was discovered that .NET did not properly handle the usage of a shared resource. An attacker could possibly use this to cause a dead-lock condition, resulting in a denial of service. (CVE-2024-30046) Update Instructions: Run `sudo pro fix USN-6773-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: dotnet-sdk-8.0 - 8.0.105-0ubuntu1~24.04.1 netstandard-targeting-pack-2.1-8.0 - 8.0.105-0ubuntu1~24.04.1 dotnet-sdk-8.0-source-built-artifacts - 8.0.105-0ubuntu1~24.04.1 dotnet-sdk-dbg-8.0 - 8.0.105-0ubuntu1~24.04.1 dotnet-templates-8.0 - 8.0.105-0ubuntu1~24.04.1 No subscription required dotnet8 - 8.0.105-8.0.5-0ubuntu1~24.04.1 No subscription required aspnetcore-runtime-8.0 - 8.0.5-0ubuntu1~24.04.1 dotnet-apphost-pack-8.0 - 8.0.5-0ubuntu1~24.04.1 dotnet-hostfxr-8.0 - 8.0.5-0ubuntu1~24.04.1 aspnetcore-runtime-dbg-8.0 - 8.0.5-0ubuntu1~24.04.1 dotnet-runtime-dbg-8.0 - 8.0.5-0ubuntu1~24.04.1 dotnet-runtime-8.0 - 8.0.5-0ubuntu1~24.04.1 dotnet-host-8.0 - 8.0.5-0ubuntu1~24.04.1 aspnetcore-targeting-pack-8.0 - 8.0.5-0ubuntu1~24.04.1 dotnet-targeting-pack-8.0 - 8.0.5-0ubuntu1~24.04.1 No subscription required
Medium
CVE-2024-30045
CVE-2024-30046
USN-6780-1 -- idna vulnerability
Ubuntu 24.04 LTS
Guido Vranken discovered that idna did not properly manage certain inputs, which could lead to significant resource consumption. An attacker could possibly use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-6780-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-idna - 3.6-2ubuntu0.1 No subscription required
Medium
CVE-2024-3651
USN-6784-1 -- cJSON vulnerabilities
Ubuntu 24.04 LTS
It was discovered that cJSON incorrectly handled certain input. An attacker could possibly use this issue to cause cJSON to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 23.10. (CVE-2023-50471, CVE-2023-50472) Luo Jin discovered that cJSON incorrectly handled certain input. An attacker could possibly use this issue to cause cJSON to crash, resulting in a denial of service. (CVE-2024-31755) Update Instructions: Run `sudo pro fix USN-6784-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libcjson-dev - 1.7.17-1ubuntu0.1~esm2 libcjson1 - 1.7.17-1ubuntu0.1~esm2 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2023-50471
CVE-2023-50472
CVE-2024-31755
USN-6785-1 -- GNOME Remote Desktop vulnerability
Ubuntu 24.04 LTS
Matthias Gerstner discovered that GNOME Remote Desktop incorrectly performed certain user validation checks. A local attacker could possibly use this issue to obtain sensitive information, or take control of remote desktop connections. Update Instructions: Run `sudo pro fix USN-6785-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gnome-remote-desktop - 46.2-1~ubuntu24.04.2 No subscription required
Medium
CVE-2024-5148
USN-6787-1 -- Jinja2 vulnerability
Ubuntu 24.04 LTS
It was discovered that Jinja2 incorrectly handled certain HTML attributes that were accepted by the xmlattr filter. An attacker could use this issue to inject arbitrary HTML attribute keys and values to potentially execute a cross-site scripting (XSS) attack. Update Instructions: Run `sudo pro fix USN-6787-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-jinja2-doc - 3.1.2-1ubuntu1.1 python3-jinja2 - 3.1.2-1ubuntu1.1 No subscription required
Medium
CVE-2024-34064
USN-6788-1 -- WebKitGTK vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the WebKitGTK Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution. Update Instructions: Run `sudo pro fix USN-6788-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-javascriptcoregtk-4.1 - 2.44.2-0ubuntu0.24.04.1 libjavascriptcoregtk-6.0-1 - 2.44.2-0ubuntu0.24.04.1 libjavascriptcoregtk-bin - 2.44.2-0ubuntu0.24.04.1 libwebkitgtk-doc - 2.44.2-0ubuntu0.24.04.1 gir1.2-webkit2-4.1 - 2.44.2-0ubuntu0.24.04.1 libwebkitgtk-6.0-dev - 2.44.2-0ubuntu0.24.04.1 libjavascriptcoregtk-4.1-0 - 2.44.2-0ubuntu0.24.04.1 libwebkit2gtk-4.1-0 - 2.44.2-0ubuntu0.24.04.1 libwebkit2gtk-4.1-dev - 2.44.2-0ubuntu0.24.04.1 libwebkit2gtk-4.0-doc - 2.44.2-0ubuntu0.24.04.1 libjavascriptcoregtk-4.1-dev - 2.44.2-0ubuntu0.24.04.1 libjavascriptcoregtk-6.0-dev - 2.44.2-0ubuntu0.24.04.1 gir1.2-javascriptcoregtk-6.0 - 2.44.2-0ubuntu0.24.04.1 webkit2gtk-driver - 2.44.2-0ubuntu0.24.04.1 libjavascriptcoregtk-4.0-bin - 2.44.2-0ubuntu0.24.04.1 libwebkitgtk-6.0-4 - 2.44.2-0ubuntu0.24.04.1 gir1.2-webkit-6.0 - 2.44.2-0ubuntu0.24.04.1 No subscription required
Medium
CVE-2024-27834
USN-6789-1 -- LibreOffice vulnerability
Ubuntu 24.04 LTS
Amel Bouziane-Leblond discovered that LibreOffice incorrectly handled graphic on-click bindings. If a user were tricked into clicking a graphic in a specially crafted document, a remote attacker could possibly run arbitrary script. Update Instructions: Run `sudo pro fix USN-6789-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libreoffice-nlpsolver - 4:0.9+LibO24.2.3-0ubuntu0.24.04.2 No subscription required libreoffice-wiki-publisher - 4:1.2.0+LibO24.2.3-0ubuntu0.24.04.2 No subscription required fonts-opensymbol - 4:102.12+LibO24.2.3-0ubuntu0.24.04.2 No subscription required libreoffice-evolution - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-en-gb - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-librelogo - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ml - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-zh-cn - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-subsequentcheckbase - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-mk - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-id - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-mr - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-style-tango - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-pt-br - 4:24.2.3-0ubuntu0.24.04.2 libreofficekit-data - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-core - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-it - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-uk - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-fr - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-gnome - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-fi - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-nl - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-uiconfig-math - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-uz - 4:24.2.3-0ubuntu0.24.04.2 libreoffice - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-sdbc-mysql - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-nb - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-mn - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ne - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-nl - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-uiconfig-writer - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-nn - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-fi - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-dz - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-nr - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-fr - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-report-builder-bin - 4:24.2.3-0ubuntu0.24.04.2 libofficebean-java - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-qt6 - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-vi - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-nso - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-qt5 - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-nogui - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-math-nogui - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-style-karasa-jaga - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ve - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-gu - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-om - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-gl - 4:24.2.3-0ubuntu0.24.04.2 python3-access2base - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-en-us - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ga - 4:24.2.3-0ubuntu0.24.04.2 libuno-cppu3t64 - 4:24.2.3-0ubuntu0.24.04.2 liblibreofficekitgtk - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-gd - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-km - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-kn - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-ko - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-st - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-dev-common - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-sr - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-cs - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ts - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-sv - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-script-provider-bsh - 4:24.2.3-0ubuntu0.24.04.2 gir1.2-lokdocview-0.1 - 4:24.2.3-0ubuntu0.24.04.2 ure-java - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-report-builder-bin-nogui - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ka - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-uiconfig-common - 4:24.2.3-0ubuntu0.24.04.2 libridl-java - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-ca - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-zh-tw - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-sl - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-sk - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-style-breeze - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-si - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-da - 4:24.2.3-0ubuntu0.24.04.2 libreofficekit-dev - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-de - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-common - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-pl - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-pa-in - 4:24.2.3-0ubuntu0.24.04.2 libuno-purpenvhelpergcc3-3t64 - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-uiconfig-report-builder - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-pt - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-base-nogui - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-gtk3 - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-math - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-vi - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-gtk4 - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-tr - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-hi - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-gug - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-sdbc-hsqldb - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-draw-nogui - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-calc - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-base-drivers - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-style-colibre - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ta - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-sdbc-firebird - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-tg - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-te - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-th - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-id - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-lv - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-hu - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-lt - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ss - 4:24.2.3-0ubuntu0.24.04.2 libunoloader-java - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-uiconfig-impress - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-eu - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-et - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-script-provider-js - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-es - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-el - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-eo - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-style-sifr - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-zh-cn - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ug - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-smoketest-data - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ko - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-zu - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-impress - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-java-common - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-eu - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-et - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-es - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-km - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-uiconfig-draw - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-el - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-uiconfig-calc - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-kk - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-dev-gui - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-be - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-szl - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-bg - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-tn - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-bn - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-plasma - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-ja - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-br - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-bs - 4:24.2.3-0ubuntu0.24.04.2 liblibreoffice-java - 4:24.2.3-0ubuntu0.24.04.2 libunoil-java - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-style-yaru - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-base-core - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-ru - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ru - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-rw - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-is - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-style-elementary - 4:24.2.3-0ubuntu0.24.04.2 python3-uno - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-fa - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-am - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ro - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-en-za - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-style-sukapura - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ca - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-sl - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-calc-nogui - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-sk - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-sv - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-cs - 4:24.2.3-0ubuntu0.24.04.2 python3-scriptforge - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-dev-doc - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-common - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-za - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-cy - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-oc - 4:24.2.3-0ubuntu0.24.04.2 libjurt-java - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-base - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-gl - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-om - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-or - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-pt-br - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-kmr - 4:24.2.3-0ubuntu0.24.04.2 uno-libs-private - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ast - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-hu - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-hr - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-script-provider-python - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-writer-nogui - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-hy - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-he - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-officebean - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-dev - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-report-builder - 4:24.2.3-0ubuntu0.24.04.2 libuno-sal3t64 - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-tr - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-hi - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-kf5 - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-dz - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-pt - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ja - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-pl - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-sdbc-postgresql - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-writer - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-de - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-da - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-uiconfig-base - 4:24.2.3-0ubuntu0.24.04.2 ure - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-impress-nogui - 4:24.2.3-0ubuntu0.24.04.2 libjuh-java - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-it - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-xh - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-af - 4:24.2.3-0ubuntu0.24.04.2 libuno-cppuhelpergcc3-3t64 - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-zh-tw - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-en-gb - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-draw - 4:24.2.3-0ubuntu0.24.04.2 libuno-salhelpergcc3-3t64 - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-core-nogui - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-as - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ar - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-in - 4:24.2.3-0ubuntu0.24.04.2 No subscription required
Medium
CVE-2024-3044
USN-6790-1 -- amavisd-new vulnerability
Ubuntu 24.04 LTS
It was discovered that amavisd-new incorrectly handled certain MIME email messages with multiple boundary parameters. A remote attacker could possibly use this issue to bypass checks for banned files or malware. Update Instructions: Run `sudo pro fix USN-6790-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: amavisd-new-postfix - 1:2.13.0-3ubuntu2 amavisd-new - 1:2.13.0-3ubuntu2 No subscription required
Medium
CVE-2024-28054
USN-6791-1 -- Unbound vulnerability
Ubuntu 24.04 LTS
It was discovered that Unbound could take part in a denial of service amplification attack known as DNSBomb. This update introduces certain resource limits to make the impact from Unbound significantly lower. Update Instructions: Run `sudo pro fix USN-6791-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: unbound - 1.19.2-1ubuntu3.1 python3-unbound - 1.19.2-1ubuntu3.1 libunbound8 - 1.19.2-1ubuntu3.1 unbound-anchor - 1.19.2-1ubuntu3.1 unbound-host - 1.19.2-1ubuntu3.1 libunbound-dev - 1.19.2-1ubuntu3.1 No subscription required
Low
CVE-2024-33655
USN-6793-1 -- Git vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Git incorrectly handled certain submodules. An attacker could possibly use this issue to execute arbitrary code. This issue was fixed in Ubuntu 22.04 LTS, Ubuntu 23.10 and Ubuntu 24.04 LTS. (CVE-2024-32002) It was discovered that Git incorrectly handled certain cloned repositories. An attacker could possibly use this issue to execute arbitrary code. (CVE-2024-32004) It was discovered that Git incorrectly handled local clones with hardlinked files/directories. An attacker could possibly use this issue to place a specialized repository on their target's local system. (CVE-2024-32020) It was discovered that Git incorrectly handled certain symlinks. An attacker could possibly use this issue to impact availability and integrity creating hardlinked arbitrary files into users repository's objects/directory. (CVE-2024-32021) It was discovered that Git incorrectly handled certain cloned repositories. An attacker could possibly use this issue to execute arbitrary code. (CVE-2024-32465) Update Instructions: Run `sudo pro fix USN-6793-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: git - 1:2.43.0-1ubuntu7.1 gitweb - 1:2.43.0-1ubuntu7.1 git-gui - 1:2.43.0-1ubuntu7.1 git-daemon-sysvinit - 1:2.43.0-1ubuntu7.1 gitk - 1:2.43.0-1ubuntu7.1 git-all - 1:2.43.0-1ubuntu7.1 git-mediawiki - 1:2.43.0-1ubuntu7.1 git-daemon-run - 1:2.43.0-1ubuntu7.1 git-man - 1:2.43.0-1ubuntu7.1 git-doc - 1:2.43.0-1ubuntu7.1 git-svn - 1:2.43.0-1ubuntu7.1 git-cvs - 1:2.43.0-1ubuntu7.1 git-email - 1:2.43.0-1ubuntu7.1 No subscription required
Medium
CVE-2024-32002
CVE-2024-32004
CVE-2024-32020
CVE-2024-32021
CVE-2024-32465
USN-6794-1 -- FRR vulnerabilities
Ubuntu 24.04 LTS
It was discovered that FRR incorrectly handled certain malformed BGP and OSPF packets. A remote attacker could use this issue to cause FRR to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6794-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: frr - 8.4.4-1.1ubuntu6.1 frr-rpki-rtrlib - 8.4.4-1.1ubuntu6.1 frr-snmp - 8.4.4-1.1ubuntu6.1 frr-doc - 8.4.4-1.1ubuntu6.1 frr-pythontools - 8.4.4-1.1ubuntu6.1 No subscription required
Medium
CVE-2024-31948
CVE-2024-31950
CVE-2024-31951
CVE-2024-34088
USN-6796-1 -- TPM2 Software Stack vulnerabilities
Ubuntu 24.04 LTS
Fergus Dall discovered that TPM2 Software Stack did not properly handle layer arrays. An attacker could possibly use this issue to cause TPM2 Software Stack to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2023-22745) Jurgen Repp and Andreas Fuchs discovered that TPM2 Software Stack did not validate the quote data after deserialization. An attacker could generate an arbitrary quote and cause TPM2 Software Stack to have unknown behavior. (CVE-2024-29040) Update Instructions: Run `sudo pro fix USN-6796-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libtss2-esys-3.0.2-0t64 - 4.0.1-7.1ubuntu5.1 libtss2-sys1t64 - 4.0.1-7.1ubuntu5.1 libtss2-mu-4.0.1-0t64 - 4.0.1-7.1ubuntu5.1 libtss2-tcti-spi-helper0t64 - 4.0.1-7.1ubuntu5.1 libtss2-tcti-libtpms0t64 - 4.0.1-7.1ubuntu5.1 libtss2-doc - 4.0.1-7.1ubuntu5.1 libtss2-tcti-swtpm0t64 - 4.0.1-7.1ubuntu5.1 libtss2-tcti-device0t64 - 4.0.1-7.1ubuntu5.1 libtss2-rc0t64 - 4.0.1-7.1ubuntu5.1 libtss2-fapi1t64 - 4.0.1-7.1ubuntu5.1 libtss2-tcti-mssim0t64 - 4.0.1-7.1ubuntu5.1 libtss2-policy0t64 - 4.0.1-7.1ubuntu5.1 libtss2-tcti-pcap0t64 - 4.0.1-7.1ubuntu5.1 libtss2-tctildr0t64 - 4.0.1-7.1ubuntu5.1 libtss2-dev - 4.0.1-7.1ubuntu5.1 libtss2-tcti-cmd0t64 - 4.0.1-7.1ubuntu5.1 No subscription required
Medium
CVE-2023-22745
CVE-2024-29040
USN-6797-1 -- Intel Microcode vulnerabilities
Ubuntu 24.04 LTS
It was discovered that some 3rd and 4th Generation Intel® Xeon® Processors did not properly restrict access to certain hardware features when using Intel® SGX or Intel® TDX. This may allow a privileged local user to potentially further escalate their privileges on the system. This issue only affected Ubuntu 23.10, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 LTS and Ubuntu 16.04 LTS. (CVE-2023-22655) It was discovered that some Intel® Atom® Processors did not properly clear register state when performing various operations. A local attacker could use this to obtain sensitive information via a transient execution attack. This issue only affected Ubuntu 23.10, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 LTS and Ubuntu 16.04 LTS. (CVE-2023-28746) It was discovered that some Intel® Processors did not properly clear the state of various hardware structures when switching execution contexts. A local attacker could use this to access privileged information. This issue only affected Ubuntu 23.10, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 LTS and Ubuntu 16.04 LTS. (CVE-2023-38575) It was discovered that some Intel® Processors did not properly enforce bus lock regulator protections. A remote attacker could use this to cause a denial of service. This issue only affected Ubuntu 23.10, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 LTS and Ubuntu 16.04 LTS. (CVE-2023-39368) It was discovered that some Intel® Xeon® D Processors did not properly calculate the SGX base key when using Intel® SGX. A privileged local attacker could use this to obtain sensitive information. This issue only affected Ubuntu 23.10, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 LTS and Ubuntu 16.04 LTS. (CVE-2023-43490) It was discovered that some Intel® Processors did not properly protect against concurrent accesses. A local attacker could use this to obtain sensitive information. (CVE-2023-45733) It was discovered that some Intel® Processors TDX module software did not properly validate input. A privileged local attacker could use this information to potentially further escalate their privileges on the system. (CVE-2023-45745, CVE-2023-47855) It was discovered that some Intel® Core™ Ultra processors did not properly handle particular instruction sequences. A local attacker could use this issue to cause a denial of service. (CVE-2023-46103) Update Instructions: Run `sudo pro fix USN-6797-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: intel-microcode - 3.20240514.0ubuntu0.24.04.1 No subscription required
Medium
CVE-2023-22655
CVE-2023-28746
CVE-2023-38575
CVE-2023-39368
CVE-2023-43490
CVE-2023-45733
CVE-2023-45745
CVE-2023-46103
CVE-2023-47855
USN-6798-1 -- GStreamer Base Plugins vulnerability
Ubuntu 24.04 LTS
It was discovered that GStreamer Base Plugins incorrectly handled certain EXIF metadata. An attacker could possibly use this issue to execute arbitrary code or cause a crash. Update Instructions: Run `sudo pro fix USN-6798-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gstreamer1.0-plugins-base - 1.24.2-1ubuntu0.1 libgstreamer-plugins-base1.0-0 - 1.24.2-1ubuntu0.1 gstreamer1.0-x - 1.24.2-1ubuntu0.1 libgstreamer-gl1.0-0 - 1.24.2-1ubuntu0.1 gstreamer1.0-gl - 1.24.2-1ubuntu0.1 libgstreamer-plugins-base1.0-dev - 1.24.2-1ubuntu0.1 gir1.2-gst-plugins-base-1.0 - 1.24.2-1ubuntu0.1 gstreamer1.0-alsa - 1.24.2-1ubuntu0.1 gstreamer1.0-plugins-base-apps - 1.24.2-1ubuntu0.1 No subscription required
Medium
CVE-2024-4453
USN-6799-1 -- Werkzeug vulnerability
Ubuntu 24.04 LTS
It was discovered that the debugger in Werkzeug was not restricted to trusted hosts. A remote attacker could possibly use this issue to execute code on the host under certain circumstances. Update Instructions: Run `sudo pro fix USN-6799-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-werkzeug - 3.0.1-3ubuntu0.1 python-werkzeug-doc - 3.0.1-3ubuntu0.1 No subscription required
Medium
CVE-2024-34069
USN-6801-1 -- PyMySQL vulnerability
Ubuntu 24.04 LTS
It was discovered that PyMySQL incorrectly escaped untrusted JSON input. An attacker could possibly use this issue to perform SQL injection attacks. Update Instructions: Run `sudo pro fix USN-6801-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-pymysql - 1.0.2-2ubuntu1.1 python-pymysql-doc - 1.0.2-2ubuntu1.1 No subscription required
Medium
CVE-2024-36039
USN-6802-1 -- PostgreSQL vulnerability
Ubuntu 24.04 LTS
Lukas Fittl discovered that PostgreSQL incorrectly performed authorization in the built-in pg_stats_ext and pg_stats_ext_exprs views. An unprivileged database user can use this issue to read most common values and other statistics from CREATE STATISTICS commands of other users. NOTE: This update will only fix fresh PostgreSQL installations. Current PostgreSQL installations will remain vulnerable to this issue until manual steps are performed. Please see the instructions in the changelog located at /usr/share/doc/postgresql-*/changelog.Debian.gz after the updated packages have been installed, or in the PostgreSQL release notes located here: https://www.postgresql.org/docs/16/release-16-3.html https://www.postgresql.org/docs/15/release-15-7.html https://www.postgresql.org/docs/14/release-14-12.html Update Instructions: Run `sudo pro fix USN-6802-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: postgresql-server-dev-16 - 16.3-0ubuntu0.24.04.1 libecpg6 - 16.3-0ubuntu0.24.04.1 postgresql-pltcl-16 - 16.3-0ubuntu0.24.04.1 libpq-dev - 16.3-0ubuntu0.24.04.1 postgresql-16 - 16.3-0ubuntu0.24.04.1 libpgtypes3 - 16.3-0ubuntu0.24.04.1 libecpg-dev - 16.3-0ubuntu0.24.04.1 postgresql-plperl-16 - 16.3-0ubuntu0.24.04.1 libpq5 - 16.3-0ubuntu0.24.04.1 postgresql-client-16 - 16.3-0ubuntu0.24.04.1 postgresql-doc-16 - 16.3-0ubuntu0.24.04.1 postgresql-plpython3-16 - 16.3-0ubuntu0.24.04.1 libecpg-compat3 - 16.3-0ubuntu0.24.04.1 No subscription required
Medium
CVE-2024-4317
USN-6803-1 -- FFmpeg vulnerabilities
Ubuntu 24.04 LTS
Zeng Yunxiang and Song Jiaxuan discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 24.04 LTS. (CVE-2023-49501) Zeng Yunxiang and Song Jiaxuan discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 23.10 and Ubuntu 24.04 LTS. (CVE-2023-49502) Zhang Ling and Zeng Yunxiang discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 23.10 and Ubuntu 24.04 LTS. (CVE-2023-49528) Zeng Yunxiang discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 23.10 and Ubuntu 24.04 LTS. (CVE-2023-50007) Zeng Yunxiang and Song Jiaxuan discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 23.10 and Ubuntu 24.04 LTS. (CVE-2023-50008) Zeng Yunxiang discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 23.10. (CVE-2023-50009) Zeng Yunxiang discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu 23.10. (CVE-2023-50010) Zeng Yunxiang and Li Zeyuan discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 22.04 LTS and Ubuntu 23.10. (CVE-2023-51793) Zeng Yunxiang discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu 23.10. (CVE-2023-51794, CVE-2023-51798) Zeng Yunxiang discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 23.10. (CVE-2023-51795, CVE-2023-51796) It was discovered that discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 23.10 and Ubuntu 24.04 LTS. (CVE-2024-31578) It was discovered that discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 23.10 and Ubuntu 24.04 LTS. (CVE-2024-31582) It was discovered that discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 23.10. (CVE-2024-31585) Update Instructions: Run `sudo pro fix USN-6803-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ffmpeg - 7:6.1.1-3ubuntu5+esm1 ffmpeg-doc - 7:6.1.1-3ubuntu5+esm1 libavcodec-dev - 7:6.1.1-3ubuntu5+esm1 libavcodec-extra - 7:6.1.1-3ubuntu5+esm1 libavcodec-extra60 - 7:6.1.1-3ubuntu5+esm1 libavcodec60 - 7:6.1.1-3ubuntu5+esm1 libavdevice-dev - 7:6.1.1-3ubuntu5+esm1 libavdevice60 - 7:6.1.1-3ubuntu5+esm1 libavfilter-dev - 7:6.1.1-3ubuntu5+esm1 libavfilter-extra - 7:6.1.1-3ubuntu5+esm1 libavfilter-extra9 - 7:6.1.1-3ubuntu5+esm1 libavfilter9 - 7:6.1.1-3ubuntu5+esm1 libavformat-dev - 7:6.1.1-3ubuntu5+esm1 libavformat-extra - 7:6.1.1-3ubuntu5+esm1 libavformat-extra60 - 7:6.1.1-3ubuntu5+esm1 libavformat60 - 7:6.1.1-3ubuntu5+esm1 libavutil-dev - 7:6.1.1-3ubuntu5+esm1 libavutil58 - 7:6.1.1-3ubuntu5+esm1 libpostproc-dev - 7:6.1.1-3ubuntu5+esm1 libpostproc57 - 7:6.1.1-3ubuntu5+esm1 libswresample-dev - 7:6.1.1-3ubuntu5+esm1 libswresample4 - 7:6.1.1-3ubuntu5+esm1 libswscale-dev - 7:6.1.1-3ubuntu5+esm1 libswscale7 - 7:6.1.1-3ubuntu5+esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2023-49501
CVE-2023-49502
CVE-2023-49528
CVE-2023-50007
CVE-2023-50008
CVE-2023-50009
CVE-2023-50010
CVE-2023-51793
CVE-2023-51794
CVE-2023-51795
CVE-2023-51796
CVE-2023-51798
CVE-2024-31578
CVE-2024-31582
CVE-2024-31585
USN-6804-1 -- GNU C Library vulnerabilities
Ubuntu 24.04 LTS
It was discovered that GNU C Library nscd daemon contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service (system crash). (CVE-2024-33599) It was discovered that GNU C Library nscd daemon did not properly check the cache content, leading to a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service (system crash). (CVE-2024-33600) It was discovered that GNU C Library nscd daemon did not properly validate memory allocation in certain situations, leading to a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service (system crash). (CVE-2024-33601) It was discovered that GNU C Library nscd daemon did not properly handle memory allocation, which could lead to memory corruption. A local attacker could use this to cause a denial of service (system crash). (CVE-2024-33602) Update Instructions: Run `sudo pro fix USN-6804-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libc-bin - 2.39-0ubuntu8.2 glibc-doc - 2.39-0ubuntu8.2 libc6-i386 - 2.39-0ubuntu8.2 libc6-s390 - 2.39-0ubuntu8.2 libc6-dev-i386 - 2.39-0ubuntu8.2 nscd - 2.39-0ubuntu8.2 libc6-dev-x32 - 2.39-0ubuntu8.2 libc6-dev - 2.39-0ubuntu8.2 libc6-amd64 - 2.39-0ubuntu8.2 libc6-x32 - 2.39-0ubuntu8.2 libc6-dev-amd64 - 2.39-0ubuntu8.2 libc-dev-bin - 2.39-0ubuntu8.2 libc6 - 2.39-0ubuntu8.2 locales-all - 2.39-0ubuntu8.2 libc-devtools - 2.39-0ubuntu8.2 glibc-source - 2.39-0ubuntu8.2 libc6-dev-s390 - 2.39-0ubuntu8.2 locales - 2.39-0ubuntu8.2 No subscription required
Medium
CVE-2024-33599
CVE-2024-33600
CVE-2024-33601
CVE-2024-33602
USN-6805-1 -- libarchive vulnerability
Ubuntu 24.04 LTS
It was discovered that libarchive incorrectly handled certain RAR archive files. An attacker could possibly use this issue to execute arbitrary code or cause a crash. Update Instructions: Run `sudo pro fix USN-6805-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libarchive-dev - 3.7.2-2ubuntu0.1 libarchive13t64 - 3.7.2-2ubuntu0.1 libarchive-tools - 3.7.2-2ubuntu0.1 No subscription required
Medium
CVE-2024-26256
USN-6806-1 -- GDK-PixBuf vulnerability
Ubuntu 24.04 LTS
Pedro Ribeiro and Vitor Pedreira discovered that the GDK-PixBuf library did not properly handle certain ANI files. An attacker could use this flaw to cause GDK-PixBuf to crash, resulting in a denial of service, or to possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6806-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libgdk-pixbuf-2.0-dev - 2.42.10+dfsg-3ubuntu3.1 gdk-pixbuf-tests - 2.42.10+dfsg-3ubuntu3.1 libgdk-pixbuf2.0-common - 2.42.10+dfsg-3ubuntu3.1 libgdk-pixbuf2.0-bin - 2.42.10+dfsg-3ubuntu3.1 libgdk-pixbuf2.0-doc - 2.42.10+dfsg-3ubuntu3.1 gir1.2-gdkpixbuf-2.0 - 2.42.10+dfsg-3ubuntu3.1 libgdk-pixbuf-2.0-0 - 2.42.10+dfsg-3ubuntu3.1 No subscription required
Medium
CVE-2022-48622
USN-6810-1 -- OpenJDK 8 vulnerabilities
Ubuntu 24.04 LTS
It was discovered that the Hotspot component of OpenJDK 8 incorrectly handled certain exceptions with specially crafted long messages. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-21011) Vladimir Kondratyev discovered that the Hotspot component of OpenJDK 8 incorrectly handled address offset calculations in the C1 compiler. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-21068) Yakov Shafranovich discovered that OpenJDK 8 did not properly manage memory in the Pack200 archive format. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-21085) It was discovered that the Hotspot component of OpenJDK 8 incorrectly handled array accesses in the C2 compiler. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-21094) Update Instructions: Run `sudo pro fix USN-6810-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-8-doc - 8u412-ga-1~24.04.2 openjdk-8-jdk - 8u412-ga-1~24.04.2 openjdk-8-jre-headless - 8u412-ga-1~24.04.2 openjdk-8-jre - 8u412-ga-1~24.04.2 openjdk-8-jdk-headless - 8u412-ga-1~24.04.2 openjdk-8-source - 8u412-ga-1~24.04.2 openjdk-8-jre-zero - 8u412-ga-1~24.04.2 openjdk-8-demo - 8u412-ga-1~24.04.2 No subscription required
Medium
CVE-2024-21011
CVE-2024-21068
CVE-2024-21085
CVE-2024-21094
USN-6814-1 -- libvpx vulnerability
Ubuntu 24.04 LTS
Xiantong Hou discovered that libvpx did not properly handle certain malformed media files. If an application using libvpx opened a specially crafted file, a remote attacker could cause a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6814-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libvpx-dev - 1.14.0-1ubuntu2.1 libvpx9 - 1.14.0-1ubuntu2.1 libvpx-doc - 1.14.0-1ubuntu2.1 vpx-tools - 1.14.0-1ubuntu2.1 No subscription required
Medium
CVE-2024-5197
USN-6815-1 -- AOM vulnerability
Ubuntu 24.04 LTS
Xiantong Hou discovered that AOM did not properly handle certain malformed media files. If an application using AOM opened a specially crafted file, a remote attacker could cause a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6815-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libaom-doc - 3.8.2-2ubuntu0.1 libaom-dev - 3.8.2-2ubuntu0.1 libaom3 - 3.8.2-2ubuntu0.1 aom-tools - 3.8.2-2ubuntu0.1 No subscription required
Medium
CVE-2024-5171
USN-6816-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Ziming Zhang discovered that the DRM driver for VMware Virtual GPU did not properly handle certain error conditions, leading to a NULL pointer dereference. A local attacker could possibly trigger this vulnerability to cause a denial of service. (CVE-2022-38096) Zheng Wang discovered that the Broadcom FullMAC WLAN driver in the Linux kernel contained a race condition during device removal, leading to a use- after-free vulnerability. A physically proximate attacker could possibly use this to cause a denial of service (system crash). (CVE-2023-47233) It was discovered that the ATA over Ethernet (AoE) driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2023-6270) It was discovered that the Atheros 802.11ac wireless driver did not properly validate certain data structures, leading to a NULL pointer dereference. An attacker could possibly use this to cause a denial of service. (CVE-2023-7042) It was discovered that the Intel Data Streaming and Intel Analytics Accelerator drivers in the Linux kernel allowed direct access to the devices for unprivileged users and virtual machines. A local attacker could use this to cause a denial of service. (CVE-2024-21823) Gui-Dong Han discovered that the software RAID driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. A privileged attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-23307) Bai Jiaju discovered that the Xceive XC4000 silicon tuner device driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-24861) Chenyuan Yang discovered that the Unsorted Block Images (UBI) flash device volume management subsystem did not properly validate logical eraseblock sizes in certain situations. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-25739) It was discovered that the MediaTek SoC Gigabit Ethernet driver in the Linux kernel contained a race condition when stopping the device. A local attacker could possibly use this to cause a denial of service (device unavailability). (CVE-2024-27432) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - PowerPC architecture; - x86 architecture; - Block layer subsystem; - ACPI drivers; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Cryptographic API; - DPLL subsystem; - ARM SCMI message protocol; - EFI core; - GPU drivers; - InfiniBand drivers; - IOMMU subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - MMC subsystem; - Network drivers; - NTB driver; - NVME drivers; - PCI subsystem; - Powercap sysfs driver; - SCSI drivers; - Freescale SoC drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - TTY drivers; - USB subsystem; - DesignWare USB3 driver; - VFIO drivers; - Backlight driver; - Virtio drivers; - Xen hypervisor drivers; - AFS file system; - File systems infrastructure; - BTRFS file system; - debug file system; - Ext4 file system; - F2FS file system; - FAT file system; - Network file system client; - NILFS2 file system; - Overlay file system; - Pstore file system; - Diskquota system; - SMB network file system; - UBI file system; - io_uring subsystem; - BPF subsystem; - Core kernel; - Memory management; - Bluetooth subsystem; - Networking core; - HSR network protocol; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - IEEE 802.15.4 subsystem; - Netfilter; - Packet sockets; - Network traffic control; - Sun RPC protocol; - ALSA SH drivers; - SOF drivers; - USB sound devices; - KVM core; (CVE-2024-35822, CVE-2024-26859, CVE-2024-26967, CVE-2024-27053, CVE-2024-27064, CVE-2024-27437, CVE-2024-26931, CVE-2024-26870, CVE-2024-26927, CVE-2024-26880, CVE-2024-35789, CVE-2024-26929, CVE-2024-27034, CVE-2024-26816, CVE-2024-26896, CVE-2024-26975, CVE-2024-26972, CVE-2024-26937, CVE-2024-27032, CVE-2024-26871, CVE-2024-26655, CVE-2024-35829, CVE-2024-26886, CVE-2023-52653, CVE-2024-27028, CVE-2024-26877, CVE-2024-26898, CVE-2024-35796, CVE-2024-27065, CVE-2024-35807, CVE-2024-26966, CVE-2024-35826, CVE-2024-27067, CVE-2024-27039, CVE-2024-35811, CVE-2024-26895, CVE-2024-26814, CVE-2024-26893, CVE-2023-52649, CVE-2024-35801, CVE-2023-52648, CVE-2024-27048, CVE-2024-26934, CVE-2024-27049, CVE-2024-26890, CVE-2024-26874, CVE-2022-48669, CVE-2023-52661, CVE-2024-27436, CVE-2024-27058, CVE-2024-26935, CVE-2024-26956, CVE-2024-26960, CVE-2024-26976, CVE-2024-27041, CVE-2024-26873, CVE-2024-26946, CVE-2024-27080, CVE-2024-27432, CVE-2023-52650, CVE-2024-26879, CVE-2023-52647, CVE-2024-27435, CVE-2024-27038, CVE-2024-26951, CVE-2024-27390, CVE-2024-26863, CVE-2024-26959, CVE-2024-35794, CVE-2024-26889, CVE-2024-35845, CVE-2024-27433, CVE-2024-26961, CVE-2024-35803, CVE-2024-26653, CVE-2024-26939, CVE-2024-26872, CVE-2024-26979, CVE-2024-26973, CVE-2024-27029, CVE-2024-35831, CVE-2024-26892, CVE-2024-26888, CVE-2024-27074, CVE-2024-35844, CVE-2024-26938, CVE-2024-26953, CVE-2024-27391, CVE-2024-35843, CVE-2024-27040, CVE-2024-26875, CVE-2024-27026, CVE-2024-26978, CVE-2024-26882, CVE-2023-52652, CVE-2023-52662, CVE-2024-26963, CVE-2024-26962, CVE-2024-27051, CVE-2024-27068, CVE-2024-26881, CVE-2024-35800, CVE-2024-26964, CVE-2024-27389, CVE-2024-27043, CVE-2024-26901, CVE-2024-26941, CVE-2024-35798, CVE-2024-35799, CVE-2024-26952, CVE-2024-26654, CVE-2024-27046, CVE-2024-35810, CVE-2024-27050, CVE-2024-27063, CVE-2024-26954, CVE-2024-26884, CVE-2024-27047, CVE-2024-26932, CVE-2024-26883, CVE-2024-26943, CVE-2024-26651, CVE-2024-26815, CVE-2024-26948, CVE-2024-27066, CVE-2024-27037, CVE-2024-35806, CVE-2024-26869, CVE-2024-26878, CVE-2024-26810, CVE-2024-35797, CVE-2024-27073, CVE-2024-26812, CVE-2024-26933, CVE-2024-26809, CVE-2024-26894, CVE-2024-35813, CVE-2024-27033, CVE-2024-26876, CVE-2024-27076, CVE-2024-27045, CVE-2024-27079, CVE-2024-26861, CVE-2024-26957, CVE-2024-26864, CVE-2024-26866, CVE-2024-35814, CVE-2024-26813, CVE-2024-27388, CVE-2024-27042, CVE-2024-26862, CVE-2024-26968, CVE-2024-26940, CVE-2024-27027, CVE-2024-35793, CVE-2024-35874, CVE-2024-27035, CVE-2024-26958, CVE-2024-26887, CVE-2024-35809, CVE-2024-26930, CVE-2024-35819, CVE-2024-27392, CVE-2024-35808, CVE-2023-52644, CVE-2024-35828, CVE-2024-26657, CVE-2024-26969, CVE-2024-27434, CVE-2024-35821, CVE-2023-52663, CVE-2024-27078, CVE-2024-35787, CVE-2024-27044, CVE-2024-26848, CVE-2024-26955, CVE-2024-26899, CVE-2024-27077, CVE-2024-26897, CVE-2024-26945, CVE-2024-26885, CVE-2024-27069, CVE-2024-27070, CVE-2024-27054, CVE-2024-35795, CVE-2024-35817, CVE-2024-35827, CVE-2024-26656, CVE-2024-26860, CVE-2024-26942, CVE-2023-52659, CVE-2024-26865, CVE-2024-26868, CVE-2024-26947, CVE-2024-35788, CVE-2024-26950, CVE-2024-27030, CVE-2024-26949, CVE-2024-26900, CVE-2024-26971, CVE-2024-35805, CVE-2024-26977, CVE-2024-26944, CVE-2024-27036, CVE-2024-26965, CVE-2024-26891, CVE-2024-27071, CVE-2024-27075, CVE-2024-27072, CVE-2024-35830, CVE-2024-27052, CVE-2024-26970, CVE-2024-27031) Update Instructions: Run `sudo pro fix USN-6816-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-raspi-tools-6.8.0-1005 - 6.8.0-1005.5 linux-buildinfo-6.8.0-1005-raspi - 6.8.0-1005.5 linux-tools-raspi - 6.8.0-1005.5 linux-tools-6.8.0-1005-raspi - 6.8.0-1005.5 linux-headers-raspi - 6.8.0-1005.5 linux-image-6.8.0-1005-raspi - 6.8.0-1005.5 linux-headers-6.8.0-1005-raspi - 6.8.0-1005.5 linux-raspi-headers-6.8.0-1005 - 6.8.0-1005.5 linux-image-raspi - 6.8.0-1005.5 linux-modules-6.8.0-1005-raspi - 6.8.0-1005.5 linux-raspi - 6.8.0-1005.5 No subscription required linux-modules-extra-6.8.0-1006-ibm - 6.8.0-1006.6 linux-modules-6.8.0-1006-ibm - 6.8.0-1006.6 linux-ibm-tools-6.8.0-1006 - 6.8.0-1006.6 linux-image-unsigned-6.8.0-1006-ibm - 6.8.0-1006.6 linux-ibm-source-6.8.0 - 6.8.0-1006.6 linux-tools-ibm - 6.8.0-1006.6 linux-tools-ibm-lts-24.04 - 6.8.0-1006.6 linux-image-ibm - 6.8.0-1006.6 linux-image-ibm-classic - 6.8.0-1006.6 linux-headers-ibm-lts-24.04 - 6.8.0-1006.6 linux-modules-iwlwifi-6.8.0-1006-ibm - 6.8.0-1006.6 linux-tools-ibm-classic - 6.8.0-1006.6 linux-tools-6.8.0-1006-ibm - 6.8.0-1006.6 linux-headers-6.8.0-1006-ibm - 6.8.0-1006.6 linux-image-6.8.0-1006-ibm - 6.8.0-1006.6 linux-modules-iwlwifi-ibm-classic - 6.8.0-1006.6 linux-ibm-lts-24.04 - 6.8.0-1006.6 linux-ibm-classic - 6.8.0-1006.6 linux-modules-iwlwifi-ibm - 6.8.0-1006.6 linux-image-ibm-lts-24.04 - 6.8.0-1006.6 linux-ibm-headers-6.8.0-1006 - 6.8.0-1006.6 linux-headers-ibm-classic - 6.8.0-1006.6 linux-ibm - 6.8.0-1006.6 linux-ibm-cloud-tools-common - 6.8.0-1006.6 linux-headers-ibm - 6.8.0-1006.6 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1006.6 linux-buildinfo-6.8.0-1006-ibm - 6.8.0-1006.6 No subscription required linux-generic-hwe-24.04 - 6.8.0-35.35 linux-tools-common - 6.8.0-35.35 linux-headers-oem-20.04 - 6.8.0-35.35 linux-cloud-tools-virtual - 6.8.0-35.35 linux-headers-generic-lpae - 6.8.0-35.35 linux-modules-iwlwifi-oem-20.04d - 6.8.0-35.35 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-35.35 linux-headers-laptop-23.10 - 6.8.0-35.35 linux-kvm - 6.8.0-35.35 linux-tools-6.8.0-35 - 6.8.0-35.35 linux-virtual-hwe-24.04 - 6.8.0-35.35 linux-tools-generic-64k - 6.8.0-35.35 linux-image-virtual - 6.8.0-35.35 linux-doc - 6.8.0-35.35 linux-virtual-hwe-24.04-edge - 6.8.0-35.35 linux-image-generic-64k - 6.8.0-35.35 linux-modules-usbio-generic - 6.8.0-35.35 linux-image-generic - 6.8.0-35.35 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-35.35 linux-image-oem-20.04d - 6.8.0-35.35 linux-headers-virtual-hwe-24.04 - 6.8.0-35.35 linux-tools-oem-20.04d - 6.8.0-35.35 linux-headers-virtual-hwe-24.04-edge - 6.8.0-35.35 linux-buildinfo-6.8.0-35-generic-64k - 6.8.0-35.35 linux-cloud-tools-virtual-hwe-24.04-edge - 6.8.0-35.35 linux-image-virtual-hwe-24.04 - 6.8.0-35.35 linux-modules-usbio-6.8.0-35-generic - 6.8.0-35.35 linux-modules-ipu6-generic-hwe-24.04-edge - 6.8.0-35.35 linux-tools-generic-hwe-24.04-edge - 6.8.0-35.35 linux-tools-oem-20.04c - 6.8.0-35.35 linux-modules-ipu6-6.8.0-35-generic - 6.8.0-35.35 linux-tools-oem-20.04b - 6.8.0-35.35 linux-modules-6.8.0-35-generic-64k - 6.8.0-35.35 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-35.35 linux-tools-virtual-hwe-24.04-edge - 6.8.0-35.35 linux-headers-generic-64k-hwe-24.04-edge - 6.8.0-35.35 linux-modules-iwlwifi-6.8.0-35-generic - 6.8.0-35.35 linux-modules-6.8.0-35-generic - 6.8.0-35.35 linux-crashdump - 6.8.0-35.35 linux-image-extra-virtual-hwe-24.04 - 6.8.0-35.35 linux-buildinfo-6.8.0-35-generic - 6.8.0-35.35 linux-headers-6.8.0-35-generic-64k - 6.8.0-35.35 linux-modules-iwlwifi-generic - 6.8.0-35.35 linux-modules-extra-6.8.0-35-generic - 6.8.0-35.35 linux-source - 6.8.0-35.35 linux-image-extra-virtual-hwe-24.04-edge - 6.8.0-35.35 linux-oem-22.04 - 6.8.0-35.35 linux-image-virtual-hwe-24.04-edge - 6.8.0-35.35 linux-tools-generic-hwe-24.04 - 6.8.0-35.35 linux-headers-kvm - 6.8.0-35.35 linux-tools-generic-lpae - 6.8.0-35.35 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-35.35 linux-virtual - 6.8.0-35.35 linux-tools-oem-22.04 - 6.8.0-35.35 linux-tools-generic - 6.8.0-35.35 linux-laptop-23.10 - 6.8.0-35.35 linux-image-generic-64k-hwe-24.04-edge - 6.8.0-35.35 linux-tools-6.8.0-35-generic-64k - 6.8.0-35.35 linux-tools-6.8.0-35-generic - 6.8.0-35.35 linux-image-uc-generic - 6.8.0-35.35 linux-cloud-tools-generic - 6.8.0-35.35 linux-image-uc-generic-hwe-24.04-edge - 6.8.0-35.35 linux-image-oem-20.04c - 6.8.0-35.35 linux-image-oem-20.04b - 6.8.0-35.35 linux-generic-lpae - 6.8.0-35.35 linux-tools-host - 6.8.0-35.35 linux-headers-generic-64k - 6.8.0-35.35 linux-headers-generic-64k-hwe-24.04 - 6.8.0-35.35 linux-oem-20.04 - 6.8.0-35.35 linux-generic - 6.8.0-35.35 linux-image-oem-20.04 - 6.8.0-35.35 linux-oem-20.04d - 6.8.0-35.35 linux-headers-generic-hwe-24.04 - 6.8.0-35.35 linux-oem-20.04c - 6.8.0-35.35 linux-image-oem-22.04 - 6.8.0-35.35 linux-headers-6.8.0-35-generic - 6.8.0-35.35 linux-generic-64k-hwe-24.04-edge - 6.8.0-35.35 linux-lib-rust-6.8.0-35-generic - 6.8.0-35.35 linux-image-generic-hwe-24.04 - 6.8.0-35.35 linux-headers-6.8.0-35 - 6.8.0-35.35 linux-tools-oem-20.04 - 6.8.0-35.35 linux-cloud-tools-common - 6.8.0-35.35 linux-image-generic-lpae - 6.8.0-35.35 linux-oem-20.04b - 6.8.0-35.35 linux-image-extra-virtual - 6.8.0-35.35 linux-modules-ipu6-generic - 6.8.0-35.35 linux-tools-virtual-hwe-24.04 - 6.8.0-35.35 linux-image-laptop-23.10 - 6.8.0-35.35 linux-image-generic-hwe-24.04-edge - 6.8.0-35.35 linux-cloud-tools-6.8.0-35-generic - 6.8.0-35.35 linux-modules-usbio-generic-hwe-24.04-edge - 6.8.0-35.35 linux-tools-generic-64k-hwe-24.04-edge - 6.8.0-35.35 linux-image-generic-64k-hwe-24.04 - 6.8.0-35.35 linux-image-uc-generic-hwe-24.04 - 6.8.0-35.35 linux-cloud-tools-generic-hwe-24.04-edge - 6.8.0-35.35 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-35.35 linux-modules-iwlwifi-oem-20.04 - 6.8.0-35.35 linux-headers-generic-hwe-24.04-edge - 6.8.0-35.35 linux-generic-64k - 6.8.0-35.35 linux-headers-generic - 6.8.0-35.35 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.8.0-35.35 linux-tools-laptop-23.10 - 6.8.0-35.35 linux-libc-dev - 6.8.0-35.35 linux-modules-iwlwifi-oem-22.04 - 6.8.0-35.35 linux-headers-virtual - 6.8.0-35.35 linux-image-kvm - 6.8.0-35.35 linux-source-6.8.0 - 6.8.0-35.35 linux-headers-oem-22.04 - 6.8.0-35.35 linux-generic-hwe-24.04-edge - 6.8.0-35.35 linux-tools-generic-64k-hwe-24.04 - 6.8.0-35.35 linux-tools-kvm - 6.8.0-35.35 linux-image-unsigned-6.8.0-35-generic-64k - 6.8.0-35.35 linux-headers-oem-20.04b - 6.8.0-35.35 linux-headers-oem-20.04c - 6.8.0-35.35 linux-tools-virtual - 6.8.0-35.35 linux-headers-oem-20.04d - 6.8.0-35.35 linux-cloud-tools-6.8.0-35 - 6.8.0-35.35 linux-generic-64k-hwe-24.04 - 6.8.0-35.35 linux-image-unsigned-6.8.0-35-generic - 6.8.0-35.35 No subscription required linux-image-uc-6.8.0-35-generic-64k - 6.8.0-35.35+1 linux-image-6.8.0-35-generic - 6.8.0-35.35+1 linux-image-uc-6.8.0-35-generic - 6.8.0-35.35+1 linux-image-6.8.0-35-generic-64k - 6.8.0-35.35+1 No subscription required linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-35.35.1 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.8.0-35.35.1 linux-buildinfo-6.8.0-35-lowlatency - 6.8.0-35.35.1 linux-headers-lowlatency-64k - 6.8.0-35.35.1 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.8.0-35.35.1 linux-image-6.8.0-35-lowlatency-64k - 6.8.0-35.35.1 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.8.0-35.35.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-35.35.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-35.35.1 linux-lowlatency-tools-common - 6.8.0-35.35.1 linux-lowlatency-cloud-tools-common - 6.8.0-35.35.1 linux-tools-lowlatency - 6.8.0-35.35.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-35.35.1 linux-lowlatency-tools-host - 6.8.0-35.35.1 linux-lowlatency-64k - 6.8.0-35.35.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-35.35.1 linux-tools-6.8.0-35-lowlatency - 6.8.0-35.35.1 linux-tools-lowlatency-hwe-22.04-edge - 6.8.0-35.35.1 linux-image-lowlatency-hwe-22.04-edge - 6.8.0-35.35.1 linux-modules-iwlwifi-lowlatency - 6.8.0-35.35.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-35.35.1 linux-headers-lowlatency-hwe-22.04-edge - 6.8.0-35.35.1 linux-buildinfo-6.8.0-35-lowlatency-64k - 6.8.0-35.35.1 linux-lowlatency-headers-6.8.0-35 - 6.8.0-35.35.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-35.35.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-35.35.1 linux-headers-6.8.0-35-lowlatency - 6.8.0-35.35.1 linux-cloud-tools-6.8.0-35-lowlatency - 6.8.0-35.35.1 linux-lowlatency - 6.8.0-35.35.1 linux-headers-lowlatency-hwe-22.04 - 6.8.0-35.35.1 linux-lowlatency-hwe-22.04-edge - 6.8.0-35.35.1 linux-image-lowlatency-64k-hwe-22.04-edge - 6.8.0-35.35.1 linux-tools-lowlatency-64k-hwe-22.04 - 6.8.0-35.35.1 linux-modules-iwlwifi-6.8.0-35-lowlatency - 6.8.0-35.35.1 linux-image-unsigned-6.8.0-35-lowlatency-64k - 6.8.0-35.35.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-35.35.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-35.35.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-35.35.1 linux-headers-6.8.0-35-lowlatency-64k - 6.8.0-35.35.1 linux-tools-lowlatency-64k - 6.8.0-35.35.1 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.8.0-35.35.1 linux-lowlatency-cloud-tools-6.8.0-35 - 6.8.0-35.35.1 linux-modules-6.8.0-35-lowlatency-64k - 6.8.0-35.35.1 linux-image-unsigned-6.8.0-35-lowlatency - 6.8.0-35.35.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-35.35.1 linux-lowlatency-hwe-22.04 - 6.8.0-35.35.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-35.35.1 linux-modules-6.8.0-35-lowlatency - 6.8.0-35.35.1 linux-headers-lowlatency-64k-hwe-22.04 - 6.8.0-35.35.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-35.35.1 linux-lowlatency-64k-hwe-22.04-edge - 6.8.0-35.35.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-35.35.1 linux-tools-6.8.0-35-lowlatency-64k - 6.8.0-35.35.1 linux-image-6.8.0-35-lowlatency - 6.8.0-35.35.1 linux-image-lowlatency-64k - 6.8.0-35.35.1 linux-cloud-tools-lowlatency - 6.8.0-35.35.1 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.8.0-35.35.1 linux-lowlatency-lib-rust-6.8.0-35-lowlatency - 6.8.0-35.35.1 linux-cloud-tools-lowlatency-hwe-22.04 - 6.8.0-35.35.1 linux-image-lowlatency-hwe-22.04 - 6.8.0-35.35.1 linux-lowlatency-hwe-20.04 - 6.8.0-35.35.1 linux-lowlatency-tools-6.8.0-35 - 6.8.0-35.35.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-35.35.1 linux-headers-lowlatency - 6.8.0-35.35.1 linux-tools-lowlatency-hwe-22.04 - 6.8.0-35.35.1 linux-lowlatency-64k-hwe-22.04 - 6.8.0-35.35.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-35.35.1 linux-image-lowlatency-64k-hwe-22.04 - 6.8.0-35.35.1 linux-image-lowlatency - 6.8.0-35.35.1 No subscription required
High
CVE-2022-38096
CVE-2022-48669
CVE-2023-47233
CVE-2023-52644
CVE-2023-52647
CVE-2023-52648
CVE-2023-52649
CVE-2023-52650
CVE-2023-52652
CVE-2023-52653
CVE-2023-52659
CVE-2023-52661
CVE-2023-52662
CVE-2023-52663
CVE-2023-6270
CVE-2023-7042
CVE-2024-21823
CVE-2024-23307
CVE-2024-24861
CVE-2024-25739
CVE-2024-26651
CVE-2024-26653
CVE-2024-26654
CVE-2024-26655
CVE-2024-26656
CVE-2024-26657
CVE-2024-26809
CVE-2024-26810
CVE-2024-26812
CVE-2024-26813
CVE-2024-26814
CVE-2024-26815
CVE-2024-26816
CVE-2024-26848
CVE-2024-26859
CVE-2024-26860
CVE-2024-26861
CVE-2024-26862
CVE-2024-26863
CVE-2024-26864
CVE-2024-26865
CVE-2024-26866
CVE-2024-26868
CVE-2024-26869
CVE-2024-26870
CVE-2024-26871
CVE-2024-26872
CVE-2024-26873
CVE-2024-26874
CVE-2024-26875
CVE-2024-26876
CVE-2024-26877
CVE-2024-26878
CVE-2024-26879
CVE-2024-26880
CVE-2024-26881
CVE-2024-26882
CVE-2024-26883
CVE-2024-26884
CVE-2024-26885
CVE-2024-26886
CVE-2024-26887
CVE-2024-26888
CVE-2024-26889
CVE-2024-26890
CVE-2024-26891
CVE-2024-26892
CVE-2024-26893
CVE-2024-26894
CVE-2024-26895
CVE-2024-26896
CVE-2024-26897
CVE-2024-26898
CVE-2024-26899
CVE-2024-26900
CVE-2024-26901
CVE-2024-26927
CVE-2024-26929
CVE-2024-26930
CVE-2024-26931
CVE-2024-26932
CVE-2024-26933
CVE-2024-26934
CVE-2024-26935
CVE-2024-26937
CVE-2024-26938
CVE-2024-26939
CVE-2024-26940
CVE-2024-26941
CVE-2024-26942
CVE-2024-26943
CVE-2024-26944
CVE-2024-26945
CVE-2024-26946
CVE-2024-26947
CVE-2024-26948
CVE-2024-26949
CVE-2024-26950
CVE-2024-26951
CVE-2024-26952
CVE-2024-26953
CVE-2024-26954
CVE-2024-26955
CVE-2024-26956
CVE-2024-26957
CVE-2024-26958
CVE-2024-26959
CVE-2024-26960
CVE-2024-26961
CVE-2024-26962
CVE-2024-26963
CVE-2024-26964
CVE-2024-26965
CVE-2024-26966
CVE-2024-26967
CVE-2024-26968
CVE-2024-26969
CVE-2024-26970
CVE-2024-26971
CVE-2024-26972
CVE-2024-26973
CVE-2024-26975
CVE-2024-26976
CVE-2024-26977
CVE-2024-26978
CVE-2024-27026
CVE-2024-27027
CVE-2024-27028
CVE-2024-27029
CVE-2024-27030
CVE-2024-27031
CVE-2024-27032
CVE-2024-27033
CVE-2024-27034
CVE-2024-27035
CVE-2024-27036
CVE-2024-27037
CVE-2024-27038
CVE-2024-27039
CVE-2024-27040
CVE-2024-27041
CVE-2024-27042
CVE-2024-27043
CVE-2024-27044
CVE-2024-27045
CVE-2024-27046
CVE-2024-27047
CVE-2024-27048
CVE-2024-27049
CVE-2024-27050
CVE-2024-27051
CVE-2024-27052
CVE-2024-27053
CVE-2024-27054
CVE-2024-27058
CVE-2024-27063
CVE-2024-27064
CVE-2024-27065
CVE-2024-27066
CVE-2024-27067
CVE-2024-27068
CVE-2024-27069
CVE-2024-27070
CVE-2024-27071
CVE-2024-27072
CVE-2024-27073
CVE-2024-27074
CVE-2024-27075
CVE-2024-27076
CVE-2024-27077
CVE-2024-27078
CVE-2024-27079
CVE-2024-27080
CVE-2024-27388
CVE-2024-27389
CVE-2024-27390
CVE-2024-27391
CVE-2024-27392
CVE-2024-27432
CVE-2024-27433
CVE-2024-27434
CVE-2024-27435
CVE-2024-27436
CVE-2024-27437
CVE-2024-35787
CVE-2024-35788
CVE-2024-35789
CVE-2024-35793
CVE-2024-35794
CVE-2024-35795
CVE-2024-35796
CVE-2024-35797
CVE-2024-35798
CVE-2024-35799
CVE-2024-35800
CVE-2024-35801
CVE-2024-35803
CVE-2024-35805
CVE-2024-35806
CVE-2024-35807
CVE-2024-35808
CVE-2024-35809
CVE-2024-35810
CVE-2024-35811
CVE-2024-35813
CVE-2024-35814
CVE-2024-35817
CVE-2024-35819
CVE-2024-35821
CVE-2024-35822
CVE-2024-35826
CVE-2024-35827
CVE-2024-35828
CVE-2024-35829
CVE-2024-35830
CVE-2024-35831
CVE-2024-35843
CVE-2024-35844
CVE-2024-35845
CVE-2024-35874
USN-6817-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Ziming Zhang discovered that the DRM driver for VMware Virtual GPU did not properly handle certain error conditions, leading to a NULL pointer dereference. A local attacker could possibly trigger this vulnerability to cause a denial of service. (CVE-2022-38096) Zheng Wang discovered that the Broadcom FullMAC WLAN driver in the Linux kernel contained a race condition during device removal, leading to a use- after-free vulnerability. A physically proximate attacker could possibly use this to cause a denial of service (system crash). (CVE-2023-47233) It was discovered that the ATA over Ethernet (AoE) driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2023-6270) It was discovered that the Atheros 802.11ac wireless driver did not properly validate certain data structures, leading to a NULL pointer dereference. An attacker could possibly use this to cause a denial of service. (CVE-2023-7042) Gui-Dong Han discovered that the software RAID driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. A privileged attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-23307) Bai Jiaju discovered that the Xceive XC4000 silicon tuner device driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-24861) Chenyuan Yang discovered that the Unsorted Block Images (UBI) flash device volume management subsystem did not properly validate logical eraseblock sizes in certain situations. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-25739) It was discovered that the MediaTek SoC Gigabit Ethernet driver in the Linux kernel contained a race condition when stopping the device. A local attacker could possibly use this to cause a denial of service (device unavailability). (CVE-2024-27432) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - PowerPC architecture; - x86 architecture; - Block layer subsystem; - ACPI drivers; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Cryptographic API; - DPLL subsystem; - ARM SCMI message protocol; - EFI core; - GPU drivers; - InfiniBand drivers; - IOMMU subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - MMC subsystem; - Network drivers; - NTB driver; - NVME drivers; - PCI subsystem; - Powercap sysfs driver; - SCSI drivers; - Freescale SoC drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - TTY drivers; - USB subsystem; - DesignWare USB3 driver; - VFIO drivers; - Backlight driver; - Virtio drivers; - Xen hypervisor drivers; - AFS file system; - File systems infrastructure; - BTRFS file system; - debug file system; - Ext4 file system; - F2FS file system; - FAT file system; - Network file system client; - NILFS2 file system; - Overlay file system; - Pstore file system; - Diskquota system; - SMB network file system; - UBI file system; - io_uring subsystem; - BPF subsystem; - Core kernel; - Memory management; - Bluetooth subsystem; - Networking core; - HSR network protocol; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - IEEE 802.15.4 subsystem; - Netfilter; - Packet sockets; - Network traffic control; - Sun RPC protocol; - ALSA SH drivers; - SOF drivers; - USB sound devices; - KVM core; (CVE-2024-26859, CVE-2024-26944, CVE-2024-27049, CVE-2024-26868, CVE-2024-26932, CVE-2024-35843, CVE-2024-35814, CVE-2024-26866, CVE-2024-26941, CVE-2024-27080, CVE-2024-26938, CVE-2024-26889, CVE-2024-27075, CVE-2024-27077, CVE-2024-26864, CVE-2024-35787, CVE-2024-27071, CVE-2024-26880, CVE-2024-26961, CVE-2024-26945, CVE-2024-26863, CVE-2024-35795, CVE-2024-27045, CVE-2024-27066, CVE-2024-27046, CVE-2024-26816, CVE-2024-27069, CVE-2024-26861, CVE-2024-26968, CVE-2024-26963, CVE-2024-26878, CVE-2024-27073, CVE-2024-35806, CVE-2024-26951, CVE-2024-26954, CVE-2024-27026, CVE-2024-26956, CVE-2024-35811, CVE-2024-35803, CVE-2024-26964, CVE-2024-26848, CVE-2024-27434, CVE-2024-35844, CVE-2024-26977, CVE-2024-27031, CVE-2024-35813, CVE-2024-26960, CVE-2024-27067, CVE-2024-26937, CVE-2024-26884, CVE-2024-26656, CVE-2024-27068, CVE-2024-26871, CVE-2023-52653, CVE-2024-26939, CVE-2024-26967, CVE-2024-26966, CVE-2024-27043, CVE-2024-26814, CVE-2024-35829, CVE-2024-26973, CVE-2024-35810, CVE-2024-26877, CVE-2024-27392, CVE-2024-35805, CVE-2024-26875, CVE-2024-26970, CVE-2024-26657, CVE-2024-26874, CVE-2024-26971, CVE-2024-26872, CVE-2024-35798, CVE-2024-26931, CVE-2024-26948, CVE-2024-26883, CVE-2024-26955, CVE-2024-27039, CVE-2024-27038, CVE-2024-27065, CVE-2024-26899, CVE-2024-27048, CVE-2024-35874, CVE-2024-35845, CVE-2024-35799, CVE-2024-35827, CVE-2024-26935, CVE-2024-27079, CVE-2024-35821, CVE-2024-26950, CVE-2024-26879, CVE-2024-26940, CVE-2024-35788, CVE-2024-26891, CVE-2024-27063, CVE-2024-27433, CVE-2024-27036, CVE-2024-35819, CVE-2024-26969, CVE-2024-27044, CVE-2024-27028, CVE-2024-27070, CVE-2023-52649, CVE-2024-27435, CVE-2024-35830, CVE-2024-26929, CVE-2024-26653, CVE-2024-26887, CVE-2024-26869, CVE-2024-26942, CVE-2024-35822, CVE-2024-26979, CVE-2024-26881, CVE-2024-26655, CVE-2024-26975, CVE-2023-52650, CVE-2024-26651, CVE-2024-35828, CVE-2024-26965, CVE-2024-27437, CVE-2024-35794, CVE-2024-26962, CVE-2024-27058, CVE-2024-27076, CVE-2024-27035, CVE-2024-27074, CVE-2024-27027, CVE-2024-26860, CVE-2024-27042, CVE-2024-27390, CVE-2024-26815, CVE-2023-52662, CVE-2024-27051, CVE-2024-35796, CVE-2024-27047, CVE-2024-26930, CVE-2024-26865, CVE-2024-27064, CVE-2024-35826, CVE-2024-26885, CVE-2024-26873, CVE-2024-26943, CVE-2024-26893, CVE-2024-27030, CVE-2024-26976, CVE-2024-35793, CVE-2024-26952, CVE-2023-52644, CVE-2024-35797, CVE-2024-27029, CVE-2024-26927, CVE-2024-26812, CVE-2024-27432, CVE-2024-26897, CVE-2024-26890, CVE-2024-26972, CVE-2024-35800, CVE-2024-27032, CVE-2024-27052, CVE-2023-52647, CVE-2024-26898, CVE-2023-52652, CVE-2024-35808, CVE-2024-26876, CVE-2024-26933, CVE-2024-26862, CVE-2024-27033, CVE-2023-52663, CVE-2024-27041, CVE-2023-52648, CVE-2024-26888, CVE-2024-26957, CVE-2024-26953, CVE-2023-52659, CVE-2024-27436, CVE-2024-27040, CVE-2024-27054, CVE-2024-27050, CVE-2024-26886, CVE-2023-52661, CVE-2024-35831, CVE-2024-26946, CVE-2024-26949, CVE-2024-26809, CVE-2024-26892, CVE-2024-26654, CVE-2024-26901, CVE-2024-27053, CVE-2024-26882, CVE-2024-35809, CVE-2024-26978, CVE-2024-27037, CVE-2024-27391, CVE-2024-27034, CVE-2024-26895, CVE-2024-35817, CVE-2024-26900, CVE-2024-26896, CVE-2024-26958, CVE-2024-35801, CVE-2024-27388, CVE-2024-26934, CVE-2024-27078, CVE-2024-35789, CVE-2024-26894, CVE-2024-27389, CVE-2024-35807, CVE-2024-27072, CVE-2024-26947, CVE-2024-26870, CVE-2024-26813, CVE-2022-48669, CVE-2024-26959, CVE-2024-26810) Update Instructions: Run `sudo pro fix USN-6817-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-gcp-headers-6.8.0-1008 - 6.8.0-1008.9 linux-image-gcp - 6.8.0-1008.9 linux-modules-extra-6.8.0-1008-gcp - 6.8.0-1008.9 linux-headers-6.8.0-1008-gcp - 6.8.0-1008.9 linux-modules-6.8.0-1008-gcp - 6.8.0-1008.9 linux-tools-gcp - 6.8.0-1008.9 linux-gcp - 6.8.0-1008.9 linux-modules-iwlwifi-gcp - 6.8.0-1008.9 linux-gcp-tools-6.8.0-1008 - 6.8.0-1008.9 linux-headers-gcp - 6.8.0-1008.9 linux-image-unsigned-6.8.0-1008-gcp - 6.8.0-1008.9 linux-modules-iwlwifi-6.8.0-1008-gcp - 6.8.0-1008.9 linux-image-6.8.0-1008-gcp - 6.8.0-1008.9 linux-modules-extra-gcp - 6.8.0-1008.9 linux-buildinfo-6.8.0-1008-gcp - 6.8.0-1008.9 linux-tools-6.8.0-1008-gcp - 6.8.0-1008.9 No subscription required linux-modules-extra-aws - 6.8.0-1009.9 linux-tools-aws - 6.8.0-1009.9 linux-aws-tools-6.8.0-1009 - 6.8.0-1009.9 linux-cloud-tools-6.8.0-1009-aws - 6.8.0-1009.9 linux-image-aws - 6.8.0-1009.9 linux-image-6.8.0-1009-aws - 6.8.0-1009.9 linux-aws-cloud-tools-6.8.0-1009 - 6.8.0-1009.9 linux-headers-6.8.0-1009-aws - 6.8.0-1009.9 linux-image-unsigned-6.8.0-1009-aws - 6.8.0-1009.9 linux-modules-6.8.0-1009-aws - 6.8.0-1009.9 linux-aws - 6.8.0-1009.9 linux-headers-aws - 6.8.0-1009.9 linux-buildinfo-6.8.0-1009-aws - 6.8.0-1009.9 linux-aws-headers-6.8.0-1009 - 6.8.0-1009.9 linux-tools-6.8.0-1009-aws - 6.8.0-1009.9 linux-modules-extra-6.8.0-1009-aws - 6.8.0-1009.9 No subscription required
High
CVE-2022-38096
CVE-2022-48669
CVE-2023-47233
CVE-2023-52644
CVE-2023-52647
CVE-2023-52648
CVE-2023-52649
CVE-2023-52650
CVE-2023-52652
CVE-2023-52653
CVE-2023-52659
CVE-2023-52661
CVE-2023-52662
CVE-2023-52663
CVE-2023-6270
CVE-2023-7042
CVE-2024-23307
CVE-2024-24861
CVE-2024-25739
CVE-2024-26651
CVE-2024-26653
CVE-2024-26654
CVE-2024-26655
CVE-2024-26656
CVE-2024-26657
CVE-2024-26809
CVE-2024-26810
CVE-2024-26812
CVE-2024-26813
CVE-2024-26814
CVE-2024-26815
CVE-2024-26816
CVE-2024-26848
CVE-2024-26859
CVE-2024-26860
CVE-2024-26861
CVE-2024-26862
CVE-2024-26863
CVE-2024-26864
CVE-2024-26865
CVE-2024-26866
CVE-2024-26868
CVE-2024-26869
CVE-2024-26870
CVE-2024-26871
CVE-2024-26872
CVE-2024-26873
CVE-2024-26874
CVE-2024-26875
CVE-2024-26876
CVE-2024-26877
CVE-2024-26878
CVE-2024-26879
CVE-2024-26880
CVE-2024-26881
CVE-2024-26882
CVE-2024-26883
CVE-2024-26884
CVE-2024-26885
CVE-2024-26886
CVE-2024-26887
CVE-2024-26888
CVE-2024-26889
CVE-2024-26890
CVE-2024-26891
CVE-2024-26892
CVE-2024-26893
CVE-2024-26894
CVE-2024-26895
CVE-2024-26896
CVE-2024-26897
CVE-2024-26898
CVE-2024-26899
CVE-2024-26900
CVE-2024-26901
CVE-2024-26927
CVE-2024-26929
CVE-2024-26930
CVE-2024-26931
CVE-2024-26932
CVE-2024-26933
CVE-2024-26934
CVE-2024-26935
CVE-2024-26937
CVE-2024-26938
CVE-2024-26939
CVE-2024-26940
CVE-2024-26941
CVE-2024-26942
CVE-2024-26943
CVE-2024-26944
CVE-2024-26945
CVE-2024-26946
CVE-2024-26947
CVE-2024-26948
CVE-2024-26949
CVE-2024-26950
CVE-2024-26951
CVE-2024-26952
CVE-2024-26953
CVE-2024-26954
CVE-2024-26955
CVE-2024-26956
CVE-2024-26957
CVE-2024-26958
CVE-2024-26959
CVE-2024-26960
CVE-2024-26961
CVE-2024-26962
CVE-2024-26963
CVE-2024-26964
CVE-2024-26965
CVE-2024-26966
CVE-2024-26967
CVE-2024-26968
CVE-2024-26969
CVE-2024-26970
CVE-2024-26971
CVE-2024-26972
CVE-2024-26973
CVE-2024-26975
CVE-2024-26976
CVE-2024-26977
CVE-2024-26978
CVE-2024-27026
CVE-2024-27027
CVE-2024-27028
CVE-2024-27029
CVE-2024-27030
CVE-2024-27031
CVE-2024-27032
CVE-2024-27033
CVE-2024-27034
CVE-2024-27035
CVE-2024-27036
CVE-2024-27037
CVE-2024-27038
CVE-2024-27039
CVE-2024-27040
CVE-2024-27041
CVE-2024-27042
CVE-2024-27043
CVE-2024-27044
CVE-2024-27045
CVE-2024-27046
CVE-2024-27047
CVE-2024-27048
CVE-2024-27049
CVE-2024-27050
CVE-2024-27051
CVE-2024-27052
CVE-2024-27053
CVE-2024-27054
CVE-2024-27058
CVE-2024-27063
CVE-2024-27064
CVE-2024-27065
CVE-2024-27066
CVE-2024-27067
CVE-2024-27068
CVE-2024-27069
CVE-2024-27070
CVE-2024-27071
CVE-2024-27072
CVE-2024-27073
CVE-2024-27074
CVE-2024-27075
CVE-2024-27076
CVE-2024-27077
CVE-2024-27078
CVE-2024-27079
CVE-2024-27080
CVE-2024-27388
CVE-2024-27389
CVE-2024-27390
CVE-2024-27391
CVE-2024-27392
CVE-2024-27432
CVE-2024-27433
CVE-2024-27434
CVE-2024-27435
CVE-2024-27436
CVE-2024-27437
CVE-2024-35787
CVE-2024-35788
CVE-2024-35789
CVE-2024-35793
CVE-2024-35794
CVE-2024-35795
CVE-2024-35796
CVE-2024-35797
CVE-2024-35798
CVE-2024-35799
CVE-2024-35800
CVE-2024-35801
CVE-2024-35803
CVE-2024-35805
CVE-2024-35806
CVE-2024-35807
CVE-2024-35808
CVE-2024-35809
CVE-2024-35810
CVE-2024-35811
CVE-2024-35813
CVE-2024-35814
CVE-2024-35817
CVE-2024-35819
CVE-2024-35821
CVE-2024-35822
CVE-2024-35826
CVE-2024-35827
CVE-2024-35828
CVE-2024-35829
CVE-2024-35830
CVE-2024-35831
CVE-2024-35843
CVE-2024-35844
CVE-2024-35845
CVE-2024-35874
USN-6817-2 -- Linux kernel (OEM) vulnerabilities
Ubuntu 24.04 LTS
Ziming Zhang discovered that the DRM driver for VMware Virtual GPU did not properly handle certain error conditions, leading to a NULL pointer dereference. A local attacker could possibly trigger this vulnerability to cause a denial of service. (CVE-2022-38096) Zheng Wang discovered that the Broadcom FullMAC WLAN driver in the Linux kernel contained a race condition during device removal, leading to a use- after-free vulnerability. A physically proximate attacker could possibly use this to cause a denial of service (system crash). (CVE-2023-47233) It was discovered that the ATA over Ethernet (AoE) driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2023-6270) It was discovered that the Atheros 802.11ac wireless driver did not properly validate certain data structures, leading to a NULL pointer dereference. An attacker could possibly use this to cause a denial of service. (CVE-2023-7042) Gui-Dong Han discovered that the software RAID driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. A privileged attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-23307) Bai Jiaju discovered that the Xceive XC4000 silicon tuner device driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-24861) Chenyuan Yang discovered that the Unsorted Block Images (UBI) flash device volume management subsystem did not properly validate logical eraseblock sizes in certain situations. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-25739) It was discovered that the MediaTek SoC Gigabit Ethernet driver in the Linux kernel contained a race condition when stopping the device. A local attacker could possibly use this to cause a denial of service (device unavailability). (CVE-2024-27432) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - PowerPC architecture; - x86 architecture; - Block layer subsystem; - ACPI drivers; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Cryptographic API; - DPLL subsystem; - ARM SCMI message protocol; - EFI core; - GPU drivers; - InfiniBand drivers; - IOMMU subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - MMC subsystem; - Network drivers; - NTB driver; - NVME drivers; - PCI subsystem; - Powercap sysfs driver; - SCSI drivers; - Freescale SoC drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - TTY drivers; - USB subsystem; - DesignWare USB3 driver; - VFIO drivers; - Backlight driver; - Virtio drivers; - Xen hypervisor drivers; - AFS file system; - File systems infrastructure; - BTRFS file system; - debug file system; - Ext4 file system; - F2FS file system; - FAT file system; - Network file system client; - NILFS2 file system; - Overlay file system; - Pstore file system; - Diskquota system; - SMB network file system; - UBI file system; - io_uring subsystem; - BPF subsystem; - Core kernel; - Memory management; - Bluetooth subsystem; - Networking core; - HSR network protocol; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - IEEE 802.15.4 subsystem; - Netfilter; - Packet sockets; - Network traffic control; - Sun RPC protocol; - ALSA SH drivers; - SOF drivers; - USB sound devices; - KVM core; (CVE-2024-26859, CVE-2024-26944, CVE-2024-27049, CVE-2024-26868, CVE-2024-26932, CVE-2024-35843, CVE-2024-35814, CVE-2024-26866, CVE-2024-26941, CVE-2024-27080, CVE-2024-26938, CVE-2024-26889, CVE-2024-27075, CVE-2024-27077, CVE-2024-26864, CVE-2024-35787, CVE-2024-27071, CVE-2024-26880, CVE-2024-26961, CVE-2024-26945, CVE-2024-26863, CVE-2024-35795, CVE-2024-27045, CVE-2024-27066, CVE-2024-27046, CVE-2024-26816, CVE-2024-27069, CVE-2024-26861, CVE-2024-26968, CVE-2024-26963, CVE-2024-26878, CVE-2024-27073, CVE-2024-35806, CVE-2024-26951, CVE-2024-26954, CVE-2024-27026, CVE-2024-26956, CVE-2024-35811, CVE-2024-35803, CVE-2024-26964, CVE-2024-26848, CVE-2024-27434, CVE-2024-35844, CVE-2024-26977, CVE-2024-27031, CVE-2024-35813, CVE-2024-26960, CVE-2024-27067, CVE-2024-26937, CVE-2024-26884, CVE-2024-26656, CVE-2024-27068, CVE-2024-26871, CVE-2023-52653, CVE-2024-26939, CVE-2024-26967, CVE-2024-26966, CVE-2024-27043, CVE-2024-26814, CVE-2024-35829, CVE-2024-26973, CVE-2024-35810, CVE-2024-26877, CVE-2024-27392, CVE-2024-35805, CVE-2024-26875, CVE-2024-26970, CVE-2024-26657, CVE-2024-26874, CVE-2024-26971, CVE-2024-26872, CVE-2024-35798, CVE-2024-26931, CVE-2024-26948, CVE-2024-26883, CVE-2024-26955, CVE-2024-27039, CVE-2024-27038, CVE-2024-27065, CVE-2024-26899, CVE-2024-27048, CVE-2024-35874, CVE-2024-35845, CVE-2024-35799, CVE-2024-35827, CVE-2024-26935, CVE-2024-27079, CVE-2024-35821, CVE-2024-26950, CVE-2024-26879, CVE-2024-26940, CVE-2024-35788, CVE-2024-26891, CVE-2024-27063, CVE-2024-27433, CVE-2024-27036, CVE-2024-35819, CVE-2024-26969, CVE-2024-27044, CVE-2024-27028, CVE-2024-27070, CVE-2023-52649, CVE-2024-27435, CVE-2024-35830, CVE-2024-26929, CVE-2024-26653, CVE-2024-26887, CVE-2024-26869, CVE-2024-26942, CVE-2024-35822, CVE-2024-26979, CVE-2024-26881, CVE-2024-26655, CVE-2024-26975, CVE-2023-52650, CVE-2024-26651, CVE-2024-35828, CVE-2024-26965, CVE-2024-27437, CVE-2024-35794, CVE-2024-26962, CVE-2024-27058, CVE-2024-27076, CVE-2024-27035, CVE-2024-27074, CVE-2024-27027, CVE-2024-26860, CVE-2024-27042, CVE-2024-27390, CVE-2024-26815, CVE-2023-52662, CVE-2024-27051, CVE-2024-35796, CVE-2024-27047, CVE-2024-26930, CVE-2024-26865, CVE-2024-27064, CVE-2024-35826, CVE-2024-26885, CVE-2024-26873, CVE-2024-26943, CVE-2024-26893, CVE-2024-27030, CVE-2024-26976, CVE-2024-35793, CVE-2024-26952, CVE-2023-52644, CVE-2024-35797, CVE-2024-27029, CVE-2024-26927, CVE-2024-26812, CVE-2024-27432, CVE-2024-26897, CVE-2024-26890, CVE-2024-26972, CVE-2024-35800, CVE-2024-27032, CVE-2024-27052, CVE-2023-52647, CVE-2024-26898, CVE-2023-52652, CVE-2024-35808, CVE-2024-26876, CVE-2024-26933, CVE-2024-26862, CVE-2024-27033, CVE-2023-52663, CVE-2024-27041, CVE-2023-52648, CVE-2024-26888, CVE-2024-26957, CVE-2024-26953, CVE-2023-52659, CVE-2024-27436, CVE-2024-27040, CVE-2024-27054, CVE-2024-27050, CVE-2024-26886, CVE-2023-52661, CVE-2024-35831, CVE-2024-26946, CVE-2024-26949, CVE-2024-26809, CVE-2024-26892, CVE-2024-26654, CVE-2024-26901, CVE-2024-27053, CVE-2024-26882, CVE-2024-35809, CVE-2024-26978, CVE-2024-27037, CVE-2024-27391, CVE-2024-27034, CVE-2024-26895, CVE-2024-35817, CVE-2024-26900, CVE-2024-26896, CVE-2024-26958, CVE-2024-35801, CVE-2024-27388, CVE-2024-26934, CVE-2024-27078, CVE-2024-35789, CVE-2024-26894, CVE-2024-27389, CVE-2024-35807, CVE-2024-27072, CVE-2024-26947, CVE-2024-26870, CVE-2024-26813, CVE-2022-48669, CVE-2024-26959, CVE-2024-26810) Update Instructions: Run `sudo pro fix USN-6817-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-modules-ipu6-6.8.0-1006-oem - 6.8.0-1006.6 linux-image-6.8.0-1006-oem - 6.8.0-1006.6 linux-tools-6.8.0-1006-oem - 6.8.0-1006.6 linux-headers-6.8.0-1006-oem - 6.8.0-1006.6 linux-image-uc-6.8.0-1006-oem - 6.8.0-1006.6 linux-oem-6.8-tools-6.8.0-1006 - 6.8.0-1006.6 linux-oem-6.8-headers-6.8.0-1006 - 6.8.0-1006.6 linux-image-unsigned-6.8.0-1006-oem - 6.8.0-1006.6 linux-buildinfo-6.8.0-1006-oem - 6.8.0-1006.6 linux-modules-iwlwifi-6.8.0-1006-oem - 6.8.0-1006.6 linux-modules-6.8.0-1006-oem - 6.8.0-1006.6 linux-modules-usbio-6.8.0-1006-oem - 6.8.0-1006.6 No subscription required linux-tools-oem-24.04 - 6.8.0-1006.6+1 linux-image-oem-24.04 - 6.8.0-1006.6+1 linux-image-uc-oem-24.04a - 6.8.0-1006.6+1 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1006.6+1 linux-image-uc-oem-24.04 - 6.8.0-1006.6+1 linux-image-oem-24.04a - 6.8.0-1006.6+1 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1006.6+1 linux-modules-usbio-oem-24.04 - 6.8.0-1006.6+1 linux-modules-ipu6-oem-24.04a - 6.8.0-1006.6+1 linux-headers-oem-24.04a - 6.8.0-1006.6+1 linux-tools-oem-24.04a - 6.8.0-1006.6+1 linux-modules-usbio-oem-24.04a - 6.8.0-1006.6+1 linux-oem-24.04a - 6.8.0-1006.6+1 linux-modules-ipu6-oem-24.04 - 6.8.0-1006.6+1 linux-oem-24.04 - 6.8.0-1006.6+1 linux-headers-oem-24.04 - 6.8.0-1006.6+1 No subscription required
High
CVE-2022-38096
CVE-2022-48669
CVE-2023-47233
CVE-2023-52644
CVE-2023-52647
CVE-2023-52648
CVE-2023-52649
CVE-2023-52650
CVE-2023-52652
CVE-2023-52653
CVE-2023-52659
CVE-2023-52661
CVE-2023-52662
CVE-2023-52663
CVE-2023-6270
CVE-2023-7042
CVE-2024-23307
CVE-2024-24861
CVE-2024-25739
CVE-2024-26651
CVE-2024-26653
CVE-2024-26654
CVE-2024-26655
CVE-2024-26656
CVE-2024-26657
CVE-2024-26809
CVE-2024-26810
CVE-2024-26812
CVE-2024-26813
CVE-2024-26814
CVE-2024-26815
CVE-2024-26816
CVE-2024-26848
CVE-2024-26859
CVE-2024-26860
CVE-2024-26861
CVE-2024-26862
CVE-2024-26863
CVE-2024-26864
CVE-2024-26865
CVE-2024-26866
CVE-2024-26868
CVE-2024-26869
CVE-2024-26870
CVE-2024-26871
CVE-2024-26872
CVE-2024-26873
CVE-2024-26874
CVE-2024-26875
CVE-2024-26876
CVE-2024-26877
CVE-2024-26878
CVE-2024-26879
CVE-2024-26880
CVE-2024-26881
CVE-2024-26882
CVE-2024-26883
CVE-2024-26884
CVE-2024-26885
CVE-2024-26886
CVE-2024-26887
CVE-2024-26888
CVE-2024-26889
CVE-2024-26890
CVE-2024-26891
CVE-2024-26892
CVE-2024-26893
CVE-2024-26894
CVE-2024-26895
CVE-2024-26896
CVE-2024-26897
CVE-2024-26898
CVE-2024-26899
CVE-2024-26900
CVE-2024-26901
CVE-2024-26927
CVE-2024-26929
CVE-2024-26930
CVE-2024-26931
CVE-2024-26932
CVE-2024-26933
CVE-2024-26934
CVE-2024-26935
CVE-2024-26937
CVE-2024-26938
CVE-2024-26939
CVE-2024-26940
CVE-2024-26941
CVE-2024-26942
CVE-2024-26943
CVE-2024-26944
CVE-2024-26945
CVE-2024-26946
CVE-2024-26947
CVE-2024-26948
CVE-2024-26949
CVE-2024-26950
CVE-2024-26951
CVE-2024-26952
CVE-2024-26953
CVE-2024-26954
CVE-2024-26955
CVE-2024-26956
CVE-2024-26957
CVE-2024-26958
CVE-2024-26959
CVE-2024-26960
CVE-2024-26961
CVE-2024-26962
CVE-2024-26963
CVE-2024-26964
CVE-2024-26965
CVE-2024-26966
CVE-2024-26967
CVE-2024-26968
CVE-2024-26969
CVE-2024-26970
CVE-2024-26971
CVE-2024-26972
CVE-2024-26973
CVE-2024-26975
CVE-2024-26976
CVE-2024-26977
CVE-2024-26978
CVE-2024-27026
CVE-2024-27027
CVE-2024-27028
CVE-2024-27029
CVE-2024-27030
CVE-2024-27031
CVE-2024-27032
CVE-2024-27033
CVE-2024-27034
CVE-2024-27035
CVE-2024-27036
CVE-2024-27037
CVE-2024-27038
CVE-2024-27039
CVE-2024-27040
CVE-2024-27041
CVE-2024-27042
CVE-2024-27043
CVE-2024-27044
CVE-2024-27045
CVE-2024-27046
CVE-2024-27047
CVE-2024-27048
CVE-2024-27049
CVE-2024-27050
CVE-2024-27051
CVE-2024-27052
CVE-2024-27053
CVE-2024-27054
CVE-2024-27058
CVE-2024-27063
CVE-2024-27064
CVE-2024-27065
CVE-2024-27066
CVE-2024-27067
CVE-2024-27068
CVE-2024-27069
CVE-2024-27070
CVE-2024-27071
CVE-2024-27072
CVE-2024-27073
CVE-2024-27074
CVE-2024-27075
CVE-2024-27076
CVE-2024-27077
CVE-2024-27078
CVE-2024-27079
CVE-2024-27080
CVE-2024-27388
CVE-2024-27389
CVE-2024-27390
CVE-2024-27391
CVE-2024-27392
CVE-2024-27432
CVE-2024-27433
CVE-2024-27434
CVE-2024-27435
CVE-2024-27436
CVE-2024-27437
CVE-2024-35787
CVE-2024-35788
CVE-2024-35789
CVE-2024-35793
CVE-2024-35794
CVE-2024-35795
CVE-2024-35796
CVE-2024-35797
CVE-2024-35798
CVE-2024-35799
CVE-2024-35800
CVE-2024-35801
CVE-2024-35803
CVE-2024-35805
CVE-2024-35806
CVE-2024-35807
CVE-2024-35808
CVE-2024-35809
CVE-2024-35810
CVE-2024-35811
CVE-2024-35813
CVE-2024-35814
CVE-2024-35817
CVE-2024-35819
CVE-2024-35821
CVE-2024-35822
CVE-2024-35826
CVE-2024-35827
CVE-2024-35828
CVE-2024-35829
CVE-2024-35830
CVE-2024-35831
CVE-2024-35843
CVE-2024-35844
CVE-2024-35845
CVE-2024-35874
USN-6817-3 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Ziming Zhang discovered that the DRM driver for VMware Virtual GPU did not properly handle certain error conditions, leading to a NULL pointer dereference. A local attacker could possibly trigger this vulnerability to cause a denial of service. (CVE-2022-38096) Zheng Wang discovered that the Broadcom FullMAC WLAN driver in the Linux kernel contained a race condition during device removal, leading to a use- after-free vulnerability. A physically proximate attacker could possibly use this to cause a denial of service (system crash). (CVE-2023-47233) It was discovered that the ATA over Ethernet (AoE) driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2023-6270) It was discovered that the Atheros 802.11ac wireless driver did not properly validate certain data structures, leading to a NULL pointer dereference. An attacker could possibly use this to cause a denial of service. (CVE-2023-7042) Gui-Dong Han discovered that the software RAID driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. A privileged attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-23307) Bai Jiaju discovered that the Xceive XC4000 silicon tuner device driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-24861) Chenyuan Yang discovered that the Unsorted Block Images (UBI) flash device volume management subsystem did not properly validate logical eraseblock sizes in certain situations. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-25739) It was discovered that the MediaTek SoC Gigabit Ethernet driver in the Linux kernel contained a race condition when stopping the device. A local attacker could possibly use this to cause a denial of service (device unavailability). (CVE-2024-27432) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - PowerPC architecture; - x86 architecture; - Block layer subsystem; - ACPI drivers; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Cryptographic API; - DPLL subsystem; - ARM SCMI message protocol; - EFI core; - GPU drivers; - InfiniBand drivers; - IOMMU subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - MMC subsystem; - Network drivers; - NTB driver; - NVME drivers; - PCI subsystem; - Powercap sysfs driver; - SCSI drivers; - Freescale SoC drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - TTY drivers; - USB subsystem; - DesignWare USB3 driver; - VFIO drivers; - Backlight driver; - Virtio drivers; - Xen hypervisor drivers; - AFS file system; - File systems infrastructure; - BTRFS file system; - debug file system; - Ext4 file system; - F2FS file system; - FAT file system; - Network file system client; - NILFS2 file system; - Overlay file system; - Pstore file system; - Diskquota system; - SMB network file system; - UBI file system; - io_uring subsystem; - BPF subsystem; - Core kernel; - Memory management; - Bluetooth subsystem; - Networking core; - HSR network protocol; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - IEEE 802.15.4 subsystem; - Netfilter; - Packet sockets; - Network traffic control; - Sun RPC protocol; - ALSA SH drivers; - SOF drivers; - USB sound devices; - KVM core; (CVE-2024-26859, CVE-2024-26944, CVE-2024-27049, CVE-2024-26868, CVE-2024-26932, CVE-2024-35843, CVE-2024-35814, CVE-2024-26866, CVE-2024-26941, CVE-2024-27080, CVE-2024-26938, CVE-2024-26889, CVE-2024-27075, CVE-2024-27077, CVE-2024-26864, CVE-2024-35787, CVE-2024-27071, CVE-2024-26880, CVE-2024-26961, CVE-2024-26945, CVE-2024-26863, CVE-2024-35795, CVE-2024-27045, CVE-2024-27066, CVE-2024-27046, CVE-2024-26816, CVE-2024-27069, CVE-2024-26861, CVE-2024-26968, CVE-2024-26963, CVE-2024-26878, CVE-2024-27073, CVE-2024-35806, CVE-2024-26951, CVE-2024-26954, CVE-2024-27026, CVE-2024-26956, CVE-2024-35811, CVE-2024-35803, CVE-2024-26964, CVE-2024-26848, CVE-2024-27434, CVE-2024-35844, CVE-2024-26977, CVE-2024-27031, CVE-2024-35813, CVE-2024-26960, CVE-2024-27067, CVE-2024-26937, CVE-2024-26884, CVE-2024-26656, CVE-2024-27068, CVE-2024-26871, CVE-2023-52653, CVE-2024-26939, CVE-2024-26967, CVE-2024-26966, CVE-2024-27043, CVE-2024-26814, CVE-2024-35829, CVE-2024-26973, CVE-2024-35810, CVE-2024-26877, CVE-2024-27392, CVE-2024-35805, CVE-2024-26875, CVE-2024-26970, CVE-2024-26657, CVE-2024-26874, CVE-2024-26971, CVE-2024-26872, CVE-2024-35798, CVE-2024-26931, CVE-2024-26948, CVE-2024-26883, CVE-2024-26955, CVE-2024-27039, CVE-2024-27038, CVE-2024-27065, CVE-2024-26899, CVE-2024-27048, CVE-2024-35874, CVE-2024-35845, CVE-2024-35799, CVE-2024-35827, CVE-2024-26935, CVE-2024-27079, CVE-2024-35821, CVE-2024-26950, CVE-2024-26879, CVE-2024-26940, CVE-2024-35788, CVE-2024-26891, CVE-2024-27063, CVE-2024-27433, CVE-2024-27036, CVE-2024-35819, CVE-2024-26969, CVE-2024-27044, CVE-2024-27028, CVE-2024-27070, CVE-2023-52649, CVE-2024-27435, CVE-2024-35830, CVE-2024-26929, CVE-2024-26653, CVE-2024-26887, CVE-2024-26869, CVE-2024-26942, CVE-2024-35822, CVE-2024-26979, CVE-2024-26881, CVE-2024-26655, CVE-2024-26975, CVE-2023-52650, CVE-2024-26651, CVE-2024-35828, CVE-2024-26965, CVE-2024-27437, CVE-2024-35794, CVE-2024-26962, CVE-2024-27058, CVE-2024-27076, CVE-2024-27035, CVE-2024-27074, CVE-2024-27027, CVE-2024-26860, CVE-2024-27042, CVE-2024-27390, CVE-2024-26815, CVE-2023-52662, CVE-2024-27051, CVE-2024-35796, CVE-2024-27047, CVE-2024-26930, CVE-2024-26865, CVE-2024-27064, CVE-2024-35826, CVE-2024-26885, CVE-2024-26873, CVE-2024-26943, CVE-2024-26893, CVE-2024-27030, CVE-2024-26976, CVE-2024-35793, CVE-2024-26952, CVE-2023-52644, CVE-2024-35797, CVE-2024-27029, CVE-2024-26927, CVE-2024-26812, CVE-2024-27432, CVE-2024-26897, CVE-2024-26890, CVE-2024-26972, CVE-2024-35800, CVE-2024-27032, CVE-2024-27052, CVE-2023-52647, CVE-2024-26898, CVE-2023-52652, CVE-2024-35808, CVE-2024-26876, CVE-2024-26933, CVE-2024-26862, CVE-2024-27033, CVE-2023-52663, CVE-2024-27041, CVE-2023-52648, CVE-2024-26888, CVE-2024-26957, CVE-2024-26953, CVE-2023-52659, CVE-2024-27436, CVE-2024-27040, CVE-2024-27054, CVE-2024-27050, CVE-2024-26886, CVE-2023-52661, CVE-2024-35831, CVE-2024-26946, CVE-2024-26949, CVE-2024-26809, CVE-2024-26892, CVE-2024-26654, CVE-2024-26901, CVE-2024-27053, CVE-2024-26882, CVE-2024-35809, CVE-2024-26978, CVE-2024-27037, CVE-2024-27391, CVE-2024-27034, CVE-2024-26895, CVE-2024-35817, CVE-2024-26900, CVE-2024-26896, CVE-2024-26958, CVE-2024-35801, CVE-2024-27388, CVE-2024-26934, CVE-2024-27078, CVE-2024-35789, CVE-2024-26894, CVE-2024-27389, CVE-2024-35807, CVE-2024-27072, CVE-2024-26947, CVE-2024-26870, CVE-2024-26813, CVE-2022-48669, CVE-2024-26959, CVE-2024-26810) Update Instructions: Run `sudo pro fix USN-6817-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-gke-headers-6.8.0-1004 - 6.8.0-1004.7 linux-modules-iwlwifi-6.8.0-1004-gke - 6.8.0-1004.7 linux-tools-gke - 6.8.0-1004.7 linux-image-6.8.0-1004-gke - 6.8.0-1004.7 linux-modules-extra-6.8.0-1004-gke - 6.8.0-1004.7 linux-gke - 6.8.0-1004.7 linux-buildinfo-6.8.0-1004-gke - 6.8.0-1004.7 linux-image-gke - 6.8.0-1004.7 linux-gke-tools-6.8.0-1004 - 6.8.0-1004.7 linux-headers-gke - 6.8.0-1004.7 linux-modules-6.8.0-1004-gke - 6.8.0-1004.7 linux-modules-iwlwifi-gke - 6.8.0-1004.7 linux-headers-6.8.0-1004-gke - 6.8.0-1004.7 linux-image-unsigned-6.8.0-1004-gke - 6.8.0-1004.7 linux-tools-6.8.0-1004-gke - 6.8.0-1004.7 No subscription required linux-image-6.8.0-1008-azure - 6.8.0-1008.8 linux-image-azure-fde - 6.8.0-1008.8 linux-azure-tools-6.8.0-1008 - 6.8.0-1008.8 linux-azure - 6.8.0-1008.8 linux-azure-headers-6.8.0-1008 - 6.8.0-1008.8 linux-image-azure - 6.8.0-1008.8 linux-modules-iwlwifi-6.8.0-1008-azure - 6.8.0-1008.8 linux-cloud-tools-azure - 6.8.0-1008.8 linux-headers-6.8.0-1008-azure - 6.8.0-1008.8 linux-tools-azure - 6.8.0-1008.8 linux-modules-iwlwifi-azure - 6.8.0-1008.8 linux-image-unsigned-6.8.0-1008-azure - 6.8.0-1008.8 linux-modules-extra-azure - 6.8.0-1008.8 linux-image-6.8.0-1008-azure-fde - 6.8.0-1008.8 linux-buildinfo-6.8.0-1008-azure - 6.8.0-1008.8 linux-azure-fde - 6.8.0-1008.8 linux-tools-6.8.0-1008-azure - 6.8.0-1008.8 linux-modules-6.8.0-1008-azure - 6.8.0-1008.8 linux-azure-cloud-tools-6.8.0-1008 - 6.8.0-1008.8 linux-headers-azure - 6.8.0-1008.8 linux-cloud-tools-6.8.0-1008-azure - 6.8.0-1008.8 linux-modules-extra-6.8.0-1008-azure - 6.8.0-1008.8 No subscription required
High
CVE-2022-38096
CVE-2022-48669
CVE-2023-47233
CVE-2023-52644
CVE-2023-52647
CVE-2023-52648
CVE-2023-52649
CVE-2023-52650
CVE-2023-52652
CVE-2023-52653
CVE-2023-52659
CVE-2023-52661
CVE-2023-52662
CVE-2023-52663
CVE-2023-6270
CVE-2023-7042
CVE-2024-23307
CVE-2024-24861
CVE-2024-25739
CVE-2024-26651
CVE-2024-26653
CVE-2024-26654
CVE-2024-26655
CVE-2024-26656
CVE-2024-26657
CVE-2024-26809
CVE-2024-26810
CVE-2024-26812
CVE-2024-26813
CVE-2024-26814
CVE-2024-26815
CVE-2024-26816
CVE-2024-26848
CVE-2024-26859
CVE-2024-26860
CVE-2024-26861
CVE-2024-26862
CVE-2024-26863
CVE-2024-26864
CVE-2024-26865
CVE-2024-26866
CVE-2024-26868
CVE-2024-26869
CVE-2024-26870
CVE-2024-26871
CVE-2024-26872
CVE-2024-26873
CVE-2024-26874
CVE-2024-26875
CVE-2024-26876
CVE-2024-26877
CVE-2024-26878
CVE-2024-26879
CVE-2024-26880
CVE-2024-26881
CVE-2024-26882
CVE-2024-26883
CVE-2024-26884
CVE-2024-26885
CVE-2024-26886
CVE-2024-26887
CVE-2024-26888
CVE-2024-26889
CVE-2024-26890
CVE-2024-26891
CVE-2024-26892
CVE-2024-26893
CVE-2024-26894
CVE-2024-26895
CVE-2024-26896
CVE-2024-26897
CVE-2024-26898
CVE-2024-26899
CVE-2024-26900
CVE-2024-26901
CVE-2024-26927
CVE-2024-26929
CVE-2024-26930
CVE-2024-26931
CVE-2024-26932
CVE-2024-26933
CVE-2024-26934
CVE-2024-26935
CVE-2024-26937
CVE-2024-26938
CVE-2024-26939
CVE-2024-26940
CVE-2024-26941
CVE-2024-26942
CVE-2024-26943
CVE-2024-26944
CVE-2024-26945
CVE-2024-26946
CVE-2024-26947
CVE-2024-26948
CVE-2024-26949
CVE-2024-26950
CVE-2024-26951
CVE-2024-26952
CVE-2024-26953
CVE-2024-26954
CVE-2024-26955
CVE-2024-26956
CVE-2024-26957
CVE-2024-26958
CVE-2024-26959
CVE-2024-26960
CVE-2024-26961
CVE-2024-26962
CVE-2024-26963
CVE-2024-26964
CVE-2024-26965
CVE-2024-26966
CVE-2024-26967
CVE-2024-26968
CVE-2024-26969
CVE-2024-26970
CVE-2024-26971
CVE-2024-26972
CVE-2024-26973
CVE-2024-26975
CVE-2024-26976
CVE-2024-26977
CVE-2024-26978
CVE-2024-27026
CVE-2024-27027
CVE-2024-27028
CVE-2024-27029
CVE-2024-27030
CVE-2024-27031
CVE-2024-27032
CVE-2024-27033
CVE-2024-27034
CVE-2024-27035
CVE-2024-27036
CVE-2024-27037
CVE-2024-27038
CVE-2024-27039
CVE-2024-27040
CVE-2024-27041
CVE-2024-27042
CVE-2024-27043
CVE-2024-27044
CVE-2024-27045
CVE-2024-27046
CVE-2024-27047
CVE-2024-27048
CVE-2024-27049
CVE-2024-27050
CVE-2024-27051
CVE-2024-27052
CVE-2024-27053
CVE-2024-27054
CVE-2024-27058
CVE-2024-27063
CVE-2024-27064
CVE-2024-27065
CVE-2024-27066
CVE-2024-27067
CVE-2024-27068
CVE-2024-27069
CVE-2024-27070
CVE-2024-27071
CVE-2024-27072
CVE-2024-27073
CVE-2024-27074
CVE-2024-27075
CVE-2024-27076
CVE-2024-27077
CVE-2024-27078
CVE-2024-27079
CVE-2024-27080
CVE-2024-27388
CVE-2024-27389
CVE-2024-27390
CVE-2024-27391
CVE-2024-27392
CVE-2024-27432
CVE-2024-27433
CVE-2024-27434
CVE-2024-27435
CVE-2024-27436
CVE-2024-27437
CVE-2024-35787
CVE-2024-35788
CVE-2024-35789
CVE-2024-35793
CVE-2024-35794
CVE-2024-35795
CVE-2024-35796
CVE-2024-35797
CVE-2024-35798
CVE-2024-35799
CVE-2024-35800
CVE-2024-35801
CVE-2024-35803
CVE-2024-35805
CVE-2024-35806
CVE-2024-35807
CVE-2024-35808
CVE-2024-35809
CVE-2024-35810
CVE-2024-35811
CVE-2024-35813
CVE-2024-35814
CVE-2024-35817
CVE-2024-35819
CVE-2024-35821
CVE-2024-35822
CVE-2024-35826
CVE-2024-35827
CVE-2024-35828
CVE-2024-35829
CVE-2024-35830
CVE-2024-35831
CVE-2024-35843
CVE-2024-35844
CVE-2024-35845
CVE-2024-35874
USN-6823-1 -- MySQL vulnerabilities
Ubuntu 24.04 LTS
Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 8.0.37 in Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 23.10, and Ubuntu 24.04 LTS. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information: https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-37.html https://www.oracle.com/security-alerts/cpuapr2024.html Update Instructions: Run `sudo pro fix USN-6823-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: mysql-client - 8.0.37-0ubuntu0.24.04.1 libmysqlclient-dev - 8.0.37-0ubuntu0.24.04.1 mysql-testsuite-8.0 - 8.0.37-0ubuntu0.24.04.1 mysql-router - 8.0.37-0ubuntu0.24.04.1 mysql-server - 8.0.37-0ubuntu0.24.04.1 libmysqlclient21 - 8.0.37-0ubuntu0.24.04.1 mysql-client-core-8.0 - 8.0.37-0ubuntu0.24.04.1 mysql-server-core-8.0 - 8.0.37-0ubuntu0.24.04.1 mysql-server-8.0 - 8.0.37-0ubuntu0.24.04.1 mysql-testsuite - 8.0.37-0ubuntu0.24.04.1 mysql-client-8.0 - 8.0.37-0ubuntu0.24.04.1 mysql-source-8.0 - 8.0.37-0ubuntu0.24.04.1 No subscription required
Medium
CVE-2024-20994
CVE-2024-20998
CVE-2024-21000
CVE-2024-21008
CVE-2024-21009
CVE-2024-21013
CVE-2024-21047
CVE-2024-21054
CVE-2024-21060
CVE-2024-21062
CVE-2024-21069
CVE-2024-21087
CVE-2024-21096
CVE-2024-21102
USN-6827-1 -- LibTIFF vulnerability
Ubuntu 24.04 LTS
It was discovered that LibTIFF incorrectly handled memory when performing certain cropping operations, leading to a heap buffer overflow. An attacker could use this issue to cause a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6827-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libtiff-opengl - 4.5.1+git230720-4ubuntu2.1 libtiff5-dev - 4.5.1+git230720-4ubuntu2.1 libtiff-dev - 4.5.1+git230720-4ubuntu2.1 libtiffxx6 - 4.5.1+git230720-4ubuntu2.1 libtiff6 - 4.5.1+git230720-4ubuntu2.1 libtiff-tools - 4.5.1+git230720-4ubuntu2.1 libtiff-doc - 4.5.1+git230720-4ubuntu2.1 No subscription required
Low
CVE-2023-3164
USN-6830-1 -- libndp vulnerability
Ubuntu 24.04 LTS
It was discovered that libndp incorrectly handled certain malformed IPv6 router advertisement packets. A local attacker could use this issue to cause NetworkManager to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6830-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libndp0 - 1.8-1fakesync1ubuntu0.24.04.1 libndp-dev - 1.8-1fakesync1ubuntu0.24.04.1 libndp-tools - 1.8-1fakesync1ubuntu0.24.04.1 No subscription required
Medium
CVE-2024-5564
USN-6832-1 -- Virtuoso Open-Source Edition vulnerabilities
Ubuntu 24.04 LTS
Jingzhou Fu discovered that Virtuoso Open-Source Edition incorrectly handled certain crafted SQL statements. An attacker could possibly use this issue to crash the program, resulting in a denial of service. (CVE-2023-31607, CVE-2023-31608, CVE-2023-31609, CVE-2023-31610, CVE-2023-31611, CVE-2023-31616, CVE-2023-31617, CVE-2023-31618, CVE-2023-31619, CVE-2023-31623, CVE-2023-31625, CVE-2023-31628) Jingzhou Fu discovered that Virtuoso Open-Source Edition incorrectly handled certain crafted SQL statements. An attacker could possibly use this issue to crash the program, resulting in a denial of service. This issue only affects Ubuntu 22.04 LTS, Ubuntu 23.10 and Ubuntu 24.04 LTS. (CVE-2023-31612, CVE-2023-31613, CVE-2023-31614, CVE-2023-31615) Update Instructions: Run `sudo pro fix USN-6832-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: virtuoso-vad-demo - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vad-sparqldemo - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vad-rdfmappers - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vsp-startpage - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vad-isparql - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-opensource-7-bin - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-server - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vad-tutorial - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-minimal - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-opensource - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vad-ods - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-opensource-7 - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vad-syncml - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vad-doc - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vad-conductor - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 libvirtodbc0 - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 libvirtuoso5.5-cil - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vad-bpel - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-opensource-7-common - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2023-31607
CVE-2023-31608
CVE-2023-31609
CVE-2023-31610
CVE-2023-31611
CVE-2023-31612
CVE-2023-31613
CVE-2023-31614
CVE-2023-31615
CVE-2023-31616
CVE-2023-31617
CVE-2023-31618
CVE-2023-31619
CVE-2023-31623
CVE-2023-31625
CVE-2023-31628
USN-6833-1 -- VTE vulnerability
Ubuntu 24.04 LTS
Siddharth Dushantha discovered that VTE incorrectly handled large window resize escape sequences. An attacker could possibly use this issue to consume resources, leading to a denial of service. Update Instructions: Run `sudo pro fix USN-6833-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libvte-2.91-gtk4-dev - 0.76.0-1ubuntu0.1 libvte-2.91-common - 0.76.0-1ubuntu0.1 gir1.2-vte-3.91 - 0.76.0-1ubuntu0.1 gir1.2-vte-2.91 - 0.76.0-1ubuntu0.1 libvte-2.91-doc - 0.76.0-1ubuntu0.1 libvte-2.91-gtk4-0 - 0.76.0-1ubuntu0.1 libvte-2.91-0 - 0.76.0-1ubuntu0.1 libvte-2.91-gtk4-doc - 0.76.0-1ubuntu0.1 libvte-2.91-dev - 0.76.0-1ubuntu0.1 No subscription required
Medium
CVE-2024-37535
USN-6835-1 -- Ghostscript vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Ghostscript did not properly restrict eexec seeds to those specified by the Type 1 Font Format standard when SAFER mode is used. An attacker could use this issue to bypass SAFER restrictions and cause unspecified impact. (CVE-2023-52722) This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 23.10. Thomas Rinsma discovered that Ghostscript did not prevent changes to uniprint device argument strings after SAFER is activated, resulting in a format-string vulnerability. An attacker could possibly use this to execute arbitrary code. (CVE-2024-29510) Zdenek Hutyra discovered that Ghostscript did not properly perform path reduction when validating paths. An attacker could use this to access file locations outside of those allowed by SAFER policy and possibly execute arbitrary code. (CVE-2024-33869) Zdenek Hutyra discovered that Ghostscript did not properly check arguments when reducing paths. An attacker could use this to access file locations outside of those allowed by SAFER policy. (CVE-2024-33870) Zdenek Hutyra discovered that the "Driver" parameter for Ghostscript's "opvp"/"oprp" device allowed specifying the name of an arbitrary dynamic library to load. An attacker could use this to execute arbitrary code. (CVE-2024-33871) Update Instructions: Run `sudo pro fix USN-6835-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ghostscript - 10.02.1~dfsg1-0ubuntu7.1 libgs10-common - 10.02.1~dfsg1-0ubuntu7.1 libgs10 - 10.02.1~dfsg1-0ubuntu7.1 libgs-common - 10.02.1~dfsg1-0ubuntu7.1 libgs-dev - 10.02.1~dfsg1-0ubuntu7.1 ghostscript-doc - 10.02.1~dfsg1-0ubuntu7.1 No subscription required
Medium
CVE-2023-52722
CVE-2024-29510
CVE-2024-33869
CVE-2024-33870
CVE-2024-33871
USN-6836-1 -- SSSD vulnerability
Ubuntu 24.04 LTS
It was discovered that SSSD did not always correctly apply the GPO policy for authenticated users, contrary to expectations. This could result in improper authorization or improper access to resources. Update Instructions: Run `sudo pro fix USN-6836-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libsss-certmap-dev - 2.9.4-1.1ubuntu6.1 libipa-hbac-dev - 2.9.4-1.1ubuntu6.1 sssd-ad - 2.9.4-1.1ubuntu6.1 libsss-sudo - 2.9.4-1.1ubuntu6.1 libsss-nss-idmap0 - 2.9.4-1.1ubuntu6.1 libnss-sss - 2.9.4-1.1ubuntu6.1 sssd-ipa - 2.9.4-1.1ubuntu6.1 sssd-passkey - 2.9.4-1.1ubuntu6.1 libipa-hbac0t64 - 2.9.4-1.1ubuntu6.1 libsss-idmap-dev - 2.9.4-1.1ubuntu6.1 python3-libsss-nss-idmap - 2.9.4-1.1ubuntu6.1 sssd-common - 2.9.4-1.1ubuntu6.1 python3-sss - 2.9.4-1.1ubuntu6.1 libpam-sss - 2.9.4-1.1ubuntu6.1 sssd - 2.9.4-1.1ubuntu6.1 libsss-idmap0 - 2.9.4-1.1ubuntu6.1 sssd-idp - 2.9.4-1.1ubuntu6.1 libsss-nss-idmap-dev - 2.9.4-1.1ubuntu6.1 sssd-kcm - 2.9.4-1.1ubuntu6.1 libsss-certmap0 - 2.9.4-1.1ubuntu6.1 python3-libipa-hbac - 2.9.4-1.1ubuntu6.1 sssd-ldap - 2.9.4-1.1ubuntu6.1 sssd-tools - 2.9.4-1.1ubuntu6.1 sssd-ad-common - 2.9.4-1.1ubuntu6.1 sssd-krb5-common - 2.9.4-1.1ubuntu6.1 sssd-dbus - 2.9.4-1.1ubuntu6.1 sssd-krb5 - 2.9.4-1.1ubuntu6.1 sssd-proxy - 2.9.4-1.1ubuntu6.1 No subscription required
Medium
CVE-2023-3758
USN-6837-1 -- Rack vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Rack incorrectly handled Multipart MIME parsing. A remote attacker could possibly use this issue to cause Rack to consume resources, leading to a denial of service. This issue only affected Ubuntu 23.10. (CVE-2023-27530) It was discovered that Rack incorrectly parsed certain media types. A remote attacker could possibly use this issue to cause Rack to consume resources, leading to a denial of service. (CVE-2024-25126) It was discovered that Rack incorrectly handled certain Range headers. A remote attacker could possibly use this issue to cause Rack to create large responses, leading to a denial of service. This issue only affected Ubuntu 24.04 LTS. (CVE-2024-26141) It was discovered that Rack incorrectly handled certain crafted headers. A remote attacker could possibly use this issue to cause Rack to consume resources, leading to a denial of service. This issue only affected Ubuntu 24.04 LTS. (CVE-2024-26146) Update Instructions: Run `sudo pro fix USN-6837-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ruby-rack - 2.2.7-1ubuntu0.1 No subscription required
Medium
CVE-2023-27530
CVE-2024-25126
CVE-2024-26141
CVE-2024-26146
USN-6838-1 -- Ruby vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Ruby RDoc incorrectly parsed certain YAML files. If a user or automated system were tricked into parsing a specially crafted .rdoc_options file, a remote attacker could possibly use this issue to execute arbitrary code. (CVE-2024-27281) It was discovered that the Ruby regex compiler incorrectly handled certain memory operations. A remote attacker could possibly use this issue to obtain sensitive memory contents. (CVE-2024-27282) Update Instructions: Run `sudo pro fix USN-6838-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ruby3.2 - 3.2.3-1ubuntu0.24.04.1 ruby3.2-doc - 3.2.3-1ubuntu0.24.04.1 ruby3.2-dev - 3.2.3-1ubuntu0.24.04.1 libruby3.2 - 3.2.3-1ubuntu0.24.04.1 No subscription required
Medium
CVE-2024-27281
CVE-2024-27282
USN-6839-1 -- MariaDB vulnerability
Ubuntu 24.04 LTS
A security issue was discovered in MariaDB and this update includes new upstream MariaDB versions to fix the issue. MariaDB has been updated to 10.6.18 in Ubuntu 22.04 LTS and to 10.11.8 in Ubuntu 23.10 and Ubuntu 24.04 LTS. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Update Instructions: Run `sudo pro fix USN-6839-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: mariadb-plugin-provider-lzo - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-cracklib-password-check - 1:10.11.8-0ubuntu0.24.04.1 mariadb-backup - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-connect - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-spider - 1:10.11.8-0ubuntu0.24.04.1 libmariadb-dev - 1:10.11.8-0ubuntu0.24.04.1 libmariadb3 - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-s3 - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-provider-bzip2 - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-provider-lzma - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-provider-snappy - 1:10.11.8-0ubuntu0.24.04.1 mariadb-client - 1:10.11.8-0ubuntu0.24.04.1 libmariadbd19t64 - 1:10.11.8-0ubuntu0.24.04.1 mariadb-server-core - 1:10.11.8-0ubuntu0.24.04.1 mariadb-server-10.5 - 1:10.11.8-0ubuntu0.24.04.1 mariadb-test-data - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-provider-lz4 - 1:10.11.8-0ubuntu0.24.04.1 mariadb-client-core - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-rocksdb - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-gssapi-client - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-mroonga - 1:10.11.8-0ubuntu0.24.04.1 libmariadbd-dev - 1:10.11.8-0ubuntu0.24.04.1 libmariadb-dev-compat - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-gssapi-server - 1:10.11.8-0ubuntu0.24.04.1 mariadb-server - 1:10.11.8-0ubuntu0.24.04.1 mariadb-common - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-hashicorp-key-management - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-oqgraph - 1:10.11.8-0ubuntu0.24.04.1 mariadb-test - 1:10.11.8-0ubuntu0.24.04.1 No subscription required
Medium
CVE-2024-21096
USN-6841-1 -- PHP vulnerability
Ubuntu 24.04 LTS
It was discovered that PHP could early return in the filter_var function resulting in invalid user information being treated as valid user information. An attacker could possibly use this issue to expose raw user input information. Update Instructions: Run `sudo pro fix USN-6841-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: php8.3-cgi - 8.3.6-0ubuntu0.24.04.1 php8.3-xsl - 8.3.6-0ubuntu0.24.04.1 php8.3-fpm - 8.3.6-0ubuntu0.24.04.1 php8.3-phpdbg - 8.3.6-0ubuntu0.24.04.1 php8.3-zip - 8.3.6-0ubuntu0.24.04.1 php8.3-curl - 8.3.6-0ubuntu0.24.04.1 php8.3-ldap - 8.3.6-0ubuntu0.24.04.1 php8.3-gmp - 8.3.6-0ubuntu0.24.04.1 php8.3-sqlite3 - 8.3.6-0ubuntu0.24.04.1 php8.3-gd - 8.3.6-0ubuntu0.24.04.1 php8.3-common - 8.3.6-0ubuntu0.24.04.1 php8.3-enchant - 8.3.6-0ubuntu0.24.04.1 php8.3-odbc - 8.3.6-0ubuntu0.24.04.1 php8.3-cli - 8.3.6-0ubuntu0.24.04.1 php8.3-mbstring - 8.3.6-0ubuntu0.24.04.1 php8.3-pgsql - 8.3.6-0ubuntu0.24.04.1 php8.3-mysql - 8.3.6-0ubuntu0.24.04.1 php8.3-dba - 8.3.6-0ubuntu0.24.04.1 libapache2-mod-php8.3 - 8.3.6-0ubuntu0.24.04.1 php8.3-soap - 8.3.6-0ubuntu0.24.04.1 php8.3-opcache - 8.3.6-0ubuntu0.24.04.1 php8.3-sybase - 8.3.6-0ubuntu0.24.04.1 php8.3-pspell - 8.3.6-0ubuntu0.24.04.1 libphp8.3-embed - 8.3.6-0ubuntu0.24.04.1 php8.3-bz2 - 8.3.6-0ubuntu0.24.04.1 php8.3-dev - 8.3.6-0ubuntu0.24.04.1 php8.3 - 8.3.6-0ubuntu0.24.04.1 php8.3-tidy - 8.3.6-0ubuntu0.24.04.1 php8.3-interbase - 8.3.6-0ubuntu0.24.04.1 php8.3-readline - 8.3.6-0ubuntu0.24.04.1 php8.3-intl - 8.3.6-0ubuntu0.24.04.1 php8.3-imap - 8.3.6-0ubuntu0.24.04.1 php8.3-xml - 8.3.6-0ubuntu0.24.04.1 php8.3-bcmath - 8.3.6-0ubuntu0.24.04.1 php8.3-snmp - 8.3.6-0ubuntu0.24.04.1 No subscription required
Medium
CVE-2024-5458
USN-6843-1 -- Plasma Workspace vulnerability
Ubuntu 24.04 LTS
Fabian Vogt discovered that Plasma Workspace incorrectly handled connections via ICE. A local attacker could possibly use this issue to gain access to another user's session manager and execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6843-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: plasma-workspace-dev - 4:5.27.11-0ubuntu4.1 libweather-ion7 - 4:5.27.11-0ubuntu4.1 libkfontinst5 - 4:5.27.11-0ubuntu4.1 libcolorcorrect5 - 4:5.27.11-0ubuntu4.1 libkworkspace5-5 - 4:5.27.11-0ubuntu4.1 plasma-workspace-data - 4:5.27.11-0ubuntu4.1 plasma-workspace-wayland - 4:5.27.11-0ubuntu4.1 sddm-theme-breeze - 4:5.27.11-0ubuntu4.1 libplasma-geolocation-interface5 - 4:5.27.11-0ubuntu4.1 libnotificationmanager1 - 4:5.27.11-0ubuntu4.1 libkfontinstui5 - 4:5.27.11-0ubuntu4.1 libtaskmanager6 - 4:5.27.11-0ubuntu4.1 plasma-workspace - 4:5.27.11-0ubuntu4.1 No subscription required
Medium
CVE-2024-36041
USN-6844-1 -- CUPS vulnerability
Ubuntu 24.04 LTS
Rory McNamara discovered that when starting the cupsd server with a Listen configuration item, the cupsd process fails to validate if bind call passed. An attacker could possibly trick cupsd to perform an arbitrary chmod of the provided argument, providing world-writable access to the target. Update Instructions: Run `sudo pro fix USN-6844-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libcups2-dev - 2.4.7-1.2ubuntu7.1 cups-bsd - 2.4.7-1.2ubuntu7.1 cups-common - 2.4.7-1.2ubuntu7.1 cups-core-drivers - 2.4.7-1.2ubuntu7.1 cups-server-common - 2.4.7-1.2ubuntu7.1 cups-client - 2.4.7-1.2ubuntu7.1 libcupsimage2t64 - 2.4.7-1.2ubuntu7.1 libcupsimage2-dev - 2.4.7-1.2ubuntu7.1 cups-ipp-utils - 2.4.7-1.2ubuntu7.1 cups-ppdc - 2.4.7-1.2ubuntu7.1 cups - 2.4.7-1.2ubuntu7.1 libcups2t64 - 2.4.7-1.2ubuntu7.1 cups-daemon - 2.4.7-1.2ubuntu7.1 No subscription required
Medium
CVE-2024-35235
USN-6844-2 -- CUPS regression
Ubuntu 24.04 LTS
USN-6844-1 fixed vulnerabilities in the CUPS package. The update lead to the discovery of a regression in CUPS with regards to how the cupsd daemon handles Listen configuration directive. This update fixes the problem. We apologize for the inconvenience. Original advisory details: Rory McNamara discovered that when starting the cupsd server with a Listen configuration item, the cupsd process fails to validate if bind call passed. An attacker could possibly trick cupsd to perform an arbitrary chmod of the provided argument, providing world-writable access to the target. Update Instructions: Run `sudo pro fix USN-6844-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libcups2-dev - 2.4.7-1.2ubuntu7.2 cups-bsd - 2.4.7-1.2ubuntu7.2 cups-common - 2.4.7-1.2ubuntu7.2 cups-core-drivers - 2.4.7-1.2ubuntu7.2 cups-server-common - 2.4.7-1.2ubuntu7.2 cups-client - 2.4.7-1.2ubuntu7.2 libcupsimage2t64 - 2.4.7-1.2ubuntu7.2 libcupsimage2-dev - 2.4.7-1.2ubuntu7.2 cups-ipp-utils - 2.4.7-1.2ubuntu7.2 cups-ppdc - 2.4.7-1.2ubuntu7.2 cups - 2.4.7-1.2ubuntu7.2 libcups2t64 - 2.4.7-1.2ubuntu7.2 cups-daemon - 2.4.7-1.2ubuntu7.2 No subscription required
None
https://launchpad.net/bugs/2070315
USN-6851-1 -- Netplan vulnerabilities
Ubuntu 24.04 LTS
Andreas Hasenack discovered that netplan incorrectly handled the permissions for netdev files containing wireguard configuration. An attacker could use this to obtain wireguard secret keys. It was discovered that netplan configuration could be manipulated into injecting arbitrary commands while setting up network interfaces. An attacker could use this to execute arbitrary commands or escalate privileges. Update Instructions: Run `sudo pro fix USN-6851-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: netplan.io - 1.0-2ubuntu1.1 netplan-generator - 1.0-2ubuntu1.1 libnetplan1 - 1.0-2ubuntu1.1 python3-netplan - 1.0-2ubuntu1.1 libnetplan-dev - 1.0-2ubuntu1.1 No subscription required
Medium
CVE-2022-4968
https://launchpad.net/bugs/2066258
https://launchpad.net/bugs/1987842
https://launchpad.net/bugs/2065738
USN-6851-2 -- Netplan regression
Ubuntu 24.04 LTS
USN-6851-1 fixed vulnerabilities in Netplan. The update lead to the discovery of a regression in netplan which caused systemctl enable to fail on systems where systemd is not running. This update fixes the problem. We apologize for the inconvenience. Original advisory details: Andreas Hasenack discovered that netplan incorrectly handled the permissions for netdev files containing wireguard configuration. An attacker could use this to obtain wireguard secret keys. It was discovered that netplan configuration could be manipulated into injecting arbitrary commands while setting up network interfaces. An attacker could use this to execute arbitrary commands or escalate privileges. Update Instructions: Run `sudo pro fix USN-6851-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: netplan.io - 1.0-2ubuntu1.2 netplan-generator - 1.0-2ubuntu1.2 libnetplan1 - 1.0-2ubuntu1.2 python3-netplan - 1.0-2ubuntu1.2 libnetplan-dev - 1.0-2ubuntu1.2 No subscription required
None
https://launchpad.net/bugs/2071333
USN-6852-1 -- Wget vulnerability
Ubuntu 24.04 LTS
It was discovered that Wget incorrectly handled semicolons in the userinfo subcomponent of a URI. A remote attacker could possibly trick a user into connecting to a different host than expected. Update Instructions: Run `sudo pro fix USN-6852-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: wget - 1.21.4-1ubuntu4.1 No subscription required
Medium
CVE-2024-38428
USN-6855-1 -- libcdio vulnerability
Ubuntu 24.04 LTS
Mansour Gashasbi discovered that libcdio incorrectly handled certain memory operations when parsing an ISO file, leading to a buffer overflow vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6855-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libiso9660-dev - 2.1.0-4.1ubuntu1.2 libiso9660-11t64 - 2.1.0-4.1ubuntu1.2 libcdio-utils - 2.1.0-4.1ubuntu1.2 libcdio19t64 - 2.1.0-4.1ubuntu1.2 libiso9660++0t64 - 2.1.0-4.1ubuntu1.2 libudf-dev - 2.1.0-4.1ubuntu1.2 libcdio++1t64 - 2.1.0-4.1ubuntu1.2 libiso9660++-dev - 2.1.0-4.1ubuntu1.2 libudf0t64 - 2.1.0-4.1ubuntu1.2 libcdio++-dev - 2.1.0-4.1ubuntu1.2 libcdio-dev - 2.1.0-4.1ubuntu1.2 No subscription required
Medium
CVE-2024-36600
USN-6859-1 -- OpenSSH vulnerability
Ubuntu 24.04 LTS
It was discovered that OpenSSH incorrectly handled signal management. A remote attacker could use this issue to bypass authentication and remotely access systems without proper credentials. Update Instructions: Run `sudo pro fix USN-6859-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openssh-client - 1:9.6p1-3ubuntu13.3 openssh-server - 1:9.6p1-3ubuntu13.3 ssh-askpass-gnome - 1:9.6p1-3ubuntu13.3 ssh - 1:9.6p1-3ubuntu13.3 openssh-tests - 1:9.6p1-3ubuntu13.3 openssh-sftp-server - 1:9.6p1-3ubuntu13.3 No subscription required
High
CVE-2024-6387
USN-6860-1 -- OpenVPN vulnerabilities
Ubuntu 24.04 LTS
Reynir Björnsson discovered that OpenVPN incorrectly handled terminating client connections. A remote authenticated client could possibly use this issue to keep the connection active, bypassing certain security policies. This issue only affected Ubuntu 23.10, and Ubuntu 24.04 LTS. (CVE-2024-28882) Reynir Björnsson discovered that OpenVPN incorrectly handled certain control channel messages with nonprintable characters. A remote attacker could possibly use this issue to cause OpenVPN to consume resources, or fill up log files with garbage, leading to a denial of service. (CVE-2024-5594) Update Instructions: Run `sudo pro fix USN-6860-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openvpn - 2.6.9-1ubuntu4.1 No subscription required
Medium
CVE-2024-28882
CVE-2024-5594
USN-6863-1 -- Linux kernel vulnerability
Ubuntu 24.04 LTS
A security issue was discovered in the Linux kernel. An attacker could possibly use it to compromise the system. This update corrects flaws in the following subsystem: - Netfilter; (CVE-2024-26924) Update Instructions: Run `sudo pro fix USN-6863-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-headers-6.8.0-1006-raspi - 6.8.0-1006.6 linux-raspi-tools-6.8.0-1006 - 6.8.0-1006.6 linux-buildinfo-6.8.0-1006-raspi - 6.8.0-1006.6 linux-tools-raspi - 6.8.0-1006.6 linux-tools-6.8.0-1006-raspi - 6.8.0-1006.6 linux-image-6.8.0-1006-raspi - 6.8.0-1006.6 linux-headers-raspi - 6.8.0-1006.6 linux-modules-6.8.0-1006-raspi - 6.8.0-1006.6 linux-raspi-headers-6.8.0-1006 - 6.8.0-1006.6 linux-raspi - 6.8.0-1006.6 linux-image-raspi - 6.8.0-1006.6 No subscription required linux-image-ibm-lts-24.04 - 6.8.0-1007.7 linux-ibm-tools-6.8.0-1007 - 6.8.0-1007.7 linux-ibm-source-6.8.0 - 6.8.0-1007.7 linux-modules-6.8.0-1007-ibm - 6.8.0-1007.7 linux-headers-6.8.0-1007-ibm - 6.8.0-1007.7 linux-tools-6.8.0-1007-ibm - 6.8.0-1007.7 linux-image-unsigned-6.8.0-1007-ibm - 6.8.0-1007.7 linux-tools-ibm-lts-24.04 - 6.8.0-1007.7 linux-image-6.8.0-1007-ibm - 6.8.0-1007.7 linux-modules-extra-6.8.0-1007-ibm - 6.8.0-1007.7 linux-image-ibm - 6.8.0-1007.7 linux-image-ibm-classic - 6.8.0-1007.7 linux-headers-ibm-lts-24.04 - 6.8.0-1007.7 linux-tools-ibm-classic - 6.8.0-1007.7 linux-tools-ibm - 6.8.0-1007.7 linux-ibm-lts-24.04 - 6.8.0-1007.7 linux-ibm-classic - 6.8.0-1007.7 linux-modules-iwlwifi-ibm - 6.8.0-1007.7 linux-modules-iwlwifi-6.8.0-1007-ibm - 6.8.0-1007.7 linux-ibm-headers-6.8.0-1007 - 6.8.0-1007.7 linux-headers-ibm-classic - 6.8.0-1007.7 linux-ibm - 6.8.0-1007.7 linux-ibm-cloud-tools-common - 6.8.0-1007.7 linux-buildinfo-6.8.0-1007-ibm - 6.8.0-1007.7 linux-headers-ibm - 6.8.0-1007.7 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1007.7 linux-modules-iwlwifi-ibm-classic - 6.8.0-1007.7 No subscription required linux-modules-extra-6.8.0-1008-nvidia - 6.8.0-1008.8 linux-image-uc-6.8.0-1008-nvidia-64k - 6.8.0-1008.8 linux-headers-6.8.0-1008-nvidia-64k - 6.8.0-1008.8 linux-tools-6.8.0-1008-nvidia - 6.8.0-1008.8 linux-image-nvidia-64k - 6.8.0-1008.8 linux-nvidia-tools-6.8.0-1008 - 6.8.0-1008.8 linux-tools-nvidia - 6.8.0-1008.8 linux-headers-6.8.0-1008-nvidia - 6.8.0-1008.8 linux-nvidia-64k - 6.8.0-1008.8 linux-cloud-tools-nvidia - 6.8.0-1008.8 linux-modules-nvidia-fs-nvidia - 6.8.0-1008.8 linux-buildinfo-6.8.0-1008-nvidia-64k - 6.8.0-1008.8 linux-modules-nvidia-fs-6.8.0-1008-nvidia-64k - 6.8.0-1008.8 linux-tools-6.8.0-1008-nvidia-64k - 6.8.0-1008.8 linux-tools-nvidia-64k - 6.8.0-1008.8 linux-nvidia-headers-6.8.0-1008 - 6.8.0-1008.8 linux-image-nvidia - 6.8.0-1008.8 linux-modules-6.8.0-1008-nvidia - 6.8.0-1008.8 linux-buildinfo-6.8.0-1008-nvidia - 6.8.0-1008.8 linux-modules-nvidia-fs-6.8.0-1008-nvidia - 6.8.0-1008.8 linux-image-6.8.0-1008-nvidia-64k - 6.8.0-1008.8 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1008.8 linux-nvidia - 6.8.0-1008.8 linux-nvidia-tools-host - 6.8.0-1008.8 linux-modules-6.8.0-1008-nvidia-64k - 6.8.0-1008.8 linux-image-unsigned-6.8.0-1008-nvidia - 6.8.0-1008.8 linux-image-uc-6.8.0-1008-nvidia - 6.8.0-1008.8 linux-headers-nvidia - 6.8.0-1008.8 linux-headers-nvidia-64k - 6.8.0-1008.8 linux-image-6.8.0-1008-nvidia - 6.8.0-1008.8 linux-image-unsigned-6.8.0-1008-nvidia-64k - 6.8.0-1008.8 No subscription required linux-generic-hwe-24.04 - 6.8.0-36.36 linux-tools-common - 6.8.0-36.36 linux-modules-6.8.0-36-generic-64k - 6.8.0-36.36 linux-image-unsigned-6.8.0-36-generic-64k - 6.8.0-36.36 linux-headers-oem-20.04 - 6.8.0-36.36 linux-cloud-tools-virtual - 6.8.0-36.36 linux-tools-generic-hwe-24.04-edge - 6.8.0-36.36 linux-headers-generic-lpae - 6.8.0-36.36 linux-modules-iwlwifi-6.8.0-36-generic - 6.8.0-36.36 linux-image-6.8.0-36-generic - 6.8.0-36.36 linux-modules-6.8.0-36-generic - 6.8.0-36.36 linux-headers-laptop-23.10 - 6.8.0-36.36 linux-kvm - 6.8.0-36.36 linux-virtual-hwe-24.04 - 6.8.0-36.36 linux-tools-generic-64k - 6.8.0-36.36 linux-image-virtual - 6.8.0-36.36 linux-tools-oem-20.04b - 6.8.0-36.36 linux-doc - 6.8.0-36.36 linux-image-generic-64k - 6.8.0-36.36 linux-modules-usbio-generic - 6.8.0-36.36 linux-image-generic - 6.8.0-36.36 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-36.36 linux-image-oem-20.04d - 6.8.0-36.36 linux-headers-virtual-hwe-24.04 - 6.8.0-36.36 linux-tools-oem-20.04d - 6.8.0-36.36 linux-headers-virtual-hwe-24.04-edge - 6.8.0-36.36 linux-tools-virtual-hwe-24.04-edge - 6.8.0-36.36 linux-cloud-tools-virtual-hwe-24.04-edge - 6.8.0-36.36 linux-image-virtual-hwe-24.04 - 6.8.0-36.36 linux-modules-ipu6-generic-hwe-24.04-edge - 6.8.0-36.36 linux-tools-oem-20.04 - 6.8.0-36.36 linux-tools-oem-20.04c - 6.8.0-36.36 linux-image-unsigned-6.8.0-36-generic - 6.8.0-36.36 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-36.36 linux-headers-generic-64k-hwe-24.04-edge - 6.8.0-36.36 linux-headers-6.8.0-36-generic - 6.8.0-36.36 linux-crashdump - 6.8.0-36.36 linux-image-extra-virtual-hwe-24.04 - 6.8.0-36.36 linux-modules-iwlwifi-oem-20.04d - 6.8.0-36.36 linux-modules-iwlwifi-generic - 6.8.0-36.36 linux-modules-extra-6.8.0-36-generic - 6.8.0-36.36 linux-image-extra-virtual-hwe-24.04-edge - 6.8.0-36.36 linux-oem-22.04 - 6.8.0-36.36 linux-cloud-tools-6.8.0-36-generic - 6.8.0-36.36 linux-image-virtual-hwe-24.04-edge - 6.8.0-36.36 linux-headers-kvm - 6.8.0-36.36 linux-tools-generic-lpae - 6.8.0-36.36 linux-cloud-tools-generic - 6.8.0-36.36 linux-virtual - 6.8.0-36.36 linux-tools-oem-22.04 - 6.8.0-36.36 linux-laptop-23.10 - 6.8.0-36.36 linux-tools-virtual - 6.8.0-36.36 linux-tools-generic - 6.8.0-36.36 linux-tools-6.8.0-36-generic-64k - 6.8.0-36.36 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-36.36 linux-image-generic-64k-hwe-24.04-edge - 6.8.0-36.36 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-36.36 linux-modules-usbio-6.8.0-36-generic - 6.8.0-36.36 linux-image-uc-generic-hwe-24.04-edge - 6.8.0-36.36 linux-image-oem-20.04c - 6.8.0-36.36 linux-image-oem-20.04b - 6.8.0-36.36 linux-generic-lpae - 6.8.0-36.36 linux-tools-host - 6.8.0-36.36 linux-image-uc-6.8.0-36-generic-64k - 6.8.0-36.36 linux-headers-generic-64k - 6.8.0-36.36 linux-headers-generic-64k-hwe-24.04 - 6.8.0-36.36 linux-oem-20.04 - 6.8.0-36.36 linux-generic - 6.8.0-36.36 linux-image-oem-20.04 - 6.8.0-36.36 linux-oem-20.04d - 6.8.0-36.36 linux-headers-generic-hwe-24.04 - 6.8.0-36.36 linux-oem-20.04c - 6.8.0-36.36 linux-image-oem-22.04 - 6.8.0-36.36 linux-image-uc-generic - 6.8.0-36.36 linux-generic-64k-hwe-24.04-edge - 6.8.0-36.36 linux-lib-rust-6.8.0-36-generic - 6.8.0-36.36 linux-image-generic-hwe-24.04 - 6.8.0-36.36 linux-headers-6.8.0-36 - 6.8.0-36.36 linux-modules-ipu6-6.8.0-36-generic - 6.8.0-36.36 linux-virtual-hwe-24.04-edge - 6.8.0-36.36 linux-cloud-tools-common - 6.8.0-36.36 linux-image-generic-lpae - 6.8.0-36.36 linux-image-6.8.0-36-generic-64k - 6.8.0-36.36 linux-oem-20.04b - 6.8.0-36.36 linux-source - 6.8.0-36.36 linux-image-extra-virtual - 6.8.0-36.36 linux-tools-6.8.0-36-generic - 6.8.0-36.36 linux-tools-generic-64k-hwe-24.04-edge - 6.8.0-36.36 linux-modules-ipu6-generic - 6.8.0-36.36 linux-tools-virtual-hwe-24.04 - 6.8.0-36.36 linux-image-laptop-23.10 - 6.8.0-36.36 linux-libc-dev - 6.8.0-36.36 linux-tools-6.8.0-36 - 6.8.0-36.36 linux-image-generic-hwe-24.04-edge - 6.8.0-36.36 linux-modules-usbio-generic-hwe-24.04-edge - 6.8.0-36.36 linux-image-generic-64k-hwe-24.04 - 6.8.0-36.36 linux-image-uc-generic-hwe-24.04 - 6.8.0-36.36 linux-cloud-tools-generic-hwe-24.04-edge - 6.8.0-36.36 linux-buildinfo-6.8.0-36-generic - 6.8.0-36.36 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-36.36 linux-modules-iwlwifi-oem-20.04 - 6.8.0-36.36 linux-modules-iwlwifi-oem-22.04 - 6.8.0-36.36 linux-headers-generic-hwe-24.04-edge - 6.8.0-36.36 linux-buildinfo-6.8.0-36-generic-64k - 6.8.0-36.36 linux-headers-generic - 6.8.0-36.36 linux-cloud-tools-6.8.0-36 - 6.8.0-36.36 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.8.0-36.36 linux-headers-6.8.0-36-generic-64k - 6.8.0-36.36 linux-tools-laptop-23.10 - 6.8.0-36.36 linux-tools-generic-hwe-24.04 - 6.8.0-36.36 linux-headers-virtual - 6.8.0-36.36 linux-image-kvm - 6.8.0-36.36 linux-source-6.8.0 - 6.8.0-36.36 linux-headers-oem-22.04 - 6.8.0-36.36 linux-generic-hwe-24.04-edge - 6.8.0-36.36 linux-tools-generic-64k-hwe-24.04 - 6.8.0-36.36 linux-tools-kvm - 6.8.0-36.36 linux-headers-oem-20.04b - 6.8.0-36.36 linux-headers-oem-20.04c - 6.8.0-36.36 linux-image-uc-6.8.0-36-generic - 6.8.0-36.36 linux-headers-oem-20.04d - 6.8.0-36.36 linux-generic-64k - 6.8.0-36.36 linux-generic-64k-hwe-24.04 - 6.8.0-36.36 No subscription required linux-headers-6.8.0-36-lowlatency - 6.8.0-36.36.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-36.36.1 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.8.0-36.36.1 linux-modules-iwlwifi-6.8.0-36-lowlatency - 6.8.0-36.36.1 linux-headers-lowlatency-64k - 6.8.0-36.36.1 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.8.0-36.36.1 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.8.0-36.36.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-36.36.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-36.36.1 linux-lowlatency-tools-common - 6.8.0-36.36.1 linux-lowlatency-cloud-tools-common - 6.8.0-36.36.1 linux-tools-lowlatency - 6.8.0-36.36.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-36.36.1 linux-lowlatency-tools-host - 6.8.0-36.36.1 linux-modules-6.8.0-36-lowlatency - 6.8.0-36.36.1 linux-lowlatency-64k - 6.8.0-36.36.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-36.36.1 linux-tools-lowlatency-hwe-22.04-edge - 6.8.0-36.36.1 linux-image-lowlatency-hwe-22.04-edge - 6.8.0-36.36.1 linux-lowlatency-lib-rust-6.8.0-36-lowlatency - 6.8.0-36.36.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-36.36.1 linux-headers-lowlatency-hwe-22.04-edge - 6.8.0-36.36.1 linux-image-lowlatency-64k - 6.8.0-36.36.1 linux-buildinfo-6.8.0-36-lowlatency - 6.8.0-36.36.1 linux-lowlatency-headers-6.8.0-36 - 6.8.0-36.36.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-36.36.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-36.36.1 linux-lowlatency - 6.8.0-36.36.1 linux-headers-lowlatency-hwe-22.04 - 6.8.0-36.36.1 linux-lowlatency-hwe-22.04-edge - 6.8.0-36.36.1 linux-image-lowlatency-64k-hwe-22.04-edge - 6.8.0-36.36.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-36.36.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-36.36.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-36.36.1 linux-image-unsigned-6.8.0-36-lowlatency - 6.8.0-36.36.1 linux-tools-6.8.0-36-lowlatency-64k - 6.8.0-36.36.1 linux-tools-lowlatency-64k - 6.8.0-36.36.1 linux-tools-6.8.0-36-lowlatency - 6.8.0-36.36.1 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.8.0-36.36.1 linux-cloud-tools-6.8.0-36-lowlatency - 6.8.0-36.36.1 linux-image-6.8.0-36-lowlatency - 6.8.0-36.36.1 linux-tools-lowlatency-64k-hwe-22.04 - 6.8.0-36.36.1 linux-headers-lowlatency - 6.8.0-36.36.1 linux-modules-iwlwifi-lowlatency - 6.8.0-36.36.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-36.36.1 linux-headers-lowlatency-64k-hwe-22.04 - 6.8.0-36.36.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-36.36.1 linux-headers-6.8.0-36-lowlatency-64k - 6.8.0-36.36.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-36.36.1 linux-tools-lowlatency-hwe-22.04 - 6.8.0-36.36.1 linux-cloud-tools-lowlatency - 6.8.0-36.36.1 linux-lowlatency-64k-hwe-22.04-edge - 6.8.0-36.36.1 linux-image-unsigned-6.8.0-36-lowlatency-64k - 6.8.0-36.36.1 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.8.0-36.36.1 linux-cloud-tools-lowlatency-hwe-22.04 - 6.8.0-36.36.1 linux-image-lowlatency-hwe-22.04 - 6.8.0-36.36.1 linux-lowlatency-hwe-20.04 - 6.8.0-36.36.1 linux-lowlatency-tools-6.8.0-36 - 6.8.0-36.36.1 linux-buildinfo-6.8.0-36-lowlatency-64k - 6.8.0-36.36.1 linux-modules-6.8.0-36-lowlatency-64k - 6.8.0-36.36.1 linux-lowlatency-cloud-tools-6.8.0-36 - 6.8.0-36.36.1 linux-image-6.8.0-36-lowlatency-64k - 6.8.0-36.36.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-36.36.1 linux-lowlatency-hwe-22.04 - 6.8.0-36.36.1 linux-lowlatency-64k-hwe-22.04 - 6.8.0-36.36.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-36.36.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-36.36.1 linux-image-lowlatency-64k-hwe-22.04 - 6.8.0-36.36.1 linux-image-lowlatency - 6.8.0-36.36.1 No subscription required
High
CVE-2024-26924
USN-6864-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
It was discovered that the Intel Data Streaming and Intel Analytics Accelerator drivers in the Linux kernel allowed direct access to the devices for unprivileged users and virtual machines. A local attacker could use this to cause a denial of service. (CVE-2024-21823) A security issue was discovered in the Linux kernel. An attacker could possibly use it to compromise the system. This update corrects flaws in the following subsystem: - Netfilter; (CVE-2024-26924) Update Instructions: Run `sudo pro fix USN-6864-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-modules-iwlwifi-intel - 6.8.0-1006.13 linux-modules-6.8.0-1006-intel - 6.8.0-1006.13 linux-headers-6.8.0-1006-intel - 6.8.0-1006.13 linux-headers-intel - 6.8.0-1006.13 linux-intel - 6.8.0-1006.13 linux-intel-cloud-tools-6.8.0-1006 - 6.8.0-1006.13 linux-tools-intel - 6.8.0-1006.13 linux-intel-headers-6.8.0-1006 - 6.8.0-1006.13 linux-image-intel - 6.8.0-1006.13 linux-modules-extra-6.8.0-1006-intel - 6.8.0-1006.13 linux-modules-extra-intel - 6.8.0-1006.13 linux-buildinfo-6.8.0-1006-intel - 6.8.0-1006.13 linux-cloud-tools-6.8.0-1006-intel - 6.8.0-1006.13 linux-image-unsigned-6.8.0-1006-intel - 6.8.0-1006.13 linux-intel-tools-6.8.0-1006 - 6.8.0-1006.13 linux-tools-6.8.0-1006-intel - 6.8.0-1006.13 linux-modules-iwlwifi-6.8.0-1006-intel - 6.8.0-1006.13 linux-image-6.8.0-1006-intel - 6.8.0-1006.13 No subscription required linux-gcp-headers-6.8.0-1009 - 6.8.0-1009.10 linux-tools-6.8.0-1009-gcp - 6.8.0-1009.10 linux-tools-gcp - 6.8.0-1009.10 linux-gcp-tools-6.8.0-1009 - 6.8.0-1009.10 linux-modules-6.8.0-1009-gcp - 6.8.0-1009.10 linux-gcp - 6.8.0-1009.10 linux-image-unsigned-6.8.0-1009-gcp - 6.8.0-1009.10 linux-modules-extra-6.8.0-1009-gcp - 6.8.0-1009.10 linux-modules-iwlwifi-gcp - 6.8.0-1009.10 linux-buildinfo-6.8.0-1009-gcp - 6.8.0-1009.10 linux-image-6.8.0-1009-gcp - 6.8.0-1009.10 linux-headers-gcp - 6.8.0-1009.10 linux-modules-iwlwifi-6.8.0-1009-gcp - 6.8.0-1009.10 linux-headers-6.8.0-1009-gcp - 6.8.0-1009.10 linux-image-gcp - 6.8.0-1009.10 linux-modules-extra-gcp - 6.8.0-1009.10 No subscription required
High
CVE-2024-21823
CVE-2024-26924
USN-6864-2 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
It was discovered that the Intel Data Streaming and Intel Analytics Accelerator drivers in the Linux kernel allowed direct access to the devices for unprivileged users and virtual machines. A local attacker could use this to cause a denial of service. (CVE-2024-21823) A security issue was discovered in the Linux kernel. An attacker could possibly use it to compromise the system. This update corrects flaws in the following subsystem: - Netfilter; (CVE-2024-26924) Update Instructions: Run `sudo pro fix USN-6864-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-modules-iwlwifi-oem-24.04a - 6.8.0-1007.7 linux-headers-6.8.0-1007-oem - 6.8.0-1007.7 linux-modules-usbio-6.8.0-1007-oem - 6.8.0-1007.7 linux-modules-ipu6-6.8.0-1007-oem - 6.8.0-1007.7 linux-image-oem-24.04 - 6.8.0-1007.7 linux-image-6.8.0-1007-oem - 6.8.0-1007.7 linux-image-uc-oem-24.04a - 6.8.0-1007.7 linux-tools-oem-24.04 - 6.8.0-1007.7 linux-oem-6.8-headers-6.8.0-1007 - 6.8.0-1007.7 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1007.7 linux-image-uc-oem-24.04 - 6.8.0-1007.7 linux-image-oem-24.04a - 6.8.0-1007.7 linux-modules-usbio-oem-24.04 - 6.8.0-1007.7 linux-modules-ipu6-oem-24.04a - 6.8.0-1007.7 linux-headers-oem-24.04a - 6.8.0-1007.7 linux-modules-iwlwifi-6.8.0-1007-oem - 6.8.0-1007.7 linux-oem-6.8-tools-6.8.0-1007 - 6.8.0-1007.7 linux-modules-usbio-oem-24.04a - 6.8.0-1007.7 linux-tools-oem-24.04a - 6.8.0-1007.7 linux-image-unsigned-6.8.0-1007-oem - 6.8.0-1007.7 linux-modules-6.8.0-1007-oem - 6.8.0-1007.7 linux-buildinfo-6.8.0-1007-oem - 6.8.0-1007.7 linux-oem-24.04a - 6.8.0-1007.7 linux-image-uc-6.8.0-1007-oem - 6.8.0-1007.7 linux-modules-ipu6-oem-24.04 - 6.8.0-1007.7 linux-tools-6.8.0-1007-oem - 6.8.0-1007.7 linux-oem-24.04 - 6.8.0-1007.7 linux-headers-oem-24.04 - 6.8.0-1007.7 No subscription required linux-modules-extra-aws - 6.8.0-1010.10 linux-tools-aws - 6.8.0-1010.10 linux-tools-6.8.0-1010-aws - 6.8.0-1010.10 linux-modules-6.8.0-1010-aws - 6.8.0-1010.10 linux-modules-extra-6.8.0-1010-aws - 6.8.0-1010.10 linux-aws-headers-6.8.0-1010 - 6.8.0-1010.10 linux-headers-6.8.0-1010-aws - 6.8.0-1010.10 linux-aws-tools-6.8.0-1010 - 6.8.0-1010.10 linux-aws-cloud-tools-6.8.0-1010 - 6.8.0-1010.10 linux-buildinfo-6.8.0-1010-aws - 6.8.0-1010.10 linux-image-6.8.0-1010-aws - 6.8.0-1010.10 linux-headers-aws - 6.8.0-1010.10 linux-image-aws - 6.8.0-1010.10 linux-aws - 6.8.0-1010.10 linux-cloud-tools-6.8.0-1010-aws - 6.8.0-1010.10 linux-image-unsigned-6.8.0-1010-aws - 6.8.0-1010.10 No subscription required
High
CVE-2024-21823
CVE-2024-26924
USN-6864-3 -- Linux kernel (GKE) vulnerabilities
Ubuntu 24.04 LTS
It was discovered that the Intel Data Streaming and Intel Analytics Accelerator drivers in the Linux kernel allowed direct access to the devices for unprivileged users and virtual machines. A local attacker could use this to cause a denial of service. (CVE-2024-21823) A security issue was discovered in the Linux kernel. An attacker could possibly use it to compromise the system. This update corrects flaws in the following subsystem: - Netfilter; (CVE-2024-26924) Update Instructions: Run `sudo pro fix USN-6864-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1005-gke - 6.8.0-1005.8 linux-gke - 6.8.0-1005.8 linux-gke-headers-6.8.0-1005 - 6.8.0-1005.8 linux-gke-tools-6.8.0-1005 - 6.8.0-1005.8 linux-headers-6.8.0-1005-gke - 6.8.0-1005.8 linux-headers-gke - 6.8.0-1005.8 linux-image-6.8.0-1005-gke - 6.8.0-1005.8 linux-image-gke - 6.8.0-1005.8 linux-image-unsigned-6.8.0-1005-gke - 6.8.0-1005.8 linux-modules-6.8.0-1005-gke - 6.8.0-1005.8 linux-modules-extra-6.8.0-1005-gke - 6.8.0-1005.8 linux-modules-iwlwifi-6.8.0-1005-gke - 6.8.0-1005.8 linux-modules-iwlwifi-gke - 6.8.0-1005.8 linux-tools-6.8.0-1005-gke - 6.8.0-1005.8 linux-tools-gke - 6.8.0-1005.8 No subscription required
High
CVE-2024-21823
CVE-2024-26924
USN-6875-1 -- Linux kernel (Azure) vulnerabilities
Ubuntu 24.04 LTS
It was discovered that the Intel Data Streaming and Intel Analytics Accelerator drivers in the Linux kernel allowed direct access to the devices for unprivileged users and virtual machines. A local attacker could use this to cause a denial of service. (CVE-2024-21823) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Microsoft Azure Network Adapter (MANA) driver; - Netfilter; (CVE-2024-35901, CVE-2024-26924) Update Instructions: Run `sudo pro fix USN-6875-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-image-azure-fde - 6.8.0-1009.9 linux-azure-tools-6.8.0-1009 - 6.8.0-1009.9 linux-azure - 6.8.0-1009.9 linux-azure-headers-6.8.0-1009 - 6.8.0-1009.9 linux-modules-6.8.0-1009-azure - 6.8.0-1009.9 linux-image-azure - 6.8.0-1009.9 linux-azure-cloud-tools-6.8.0-1009 - 6.8.0-1009.9 linux-cloud-tools-azure - 6.8.0-1009.9 linux-tools-azure - 6.8.0-1009.9 linux-headers-6.8.0-1009-azure - 6.8.0-1009.9 linux-modules-iwlwifi-azure - 6.8.0-1009.9 linux-cloud-tools-6.8.0-1009-azure - 6.8.0-1009.9 linux-buildinfo-6.8.0-1009-azure - 6.8.0-1009.9 linux-modules-extra-azure - 6.8.0-1009.9 linux-tools-6.8.0-1009-azure - 6.8.0-1009.9 linux-image-6.8.0-1009-azure-fde - 6.8.0-1009.9 linux-image-unsigned-6.8.0-1009-azure - 6.8.0-1009.9 linux-azure-fde - 6.8.0-1009.9 linux-image-6.8.0-1009-azure - 6.8.0-1009.9 linux-modules-iwlwifi-6.8.0-1009-azure - 6.8.0-1009.9 linux-headers-azure - 6.8.0-1009.9 linux-modules-extra-6.8.0-1009-azure - 6.8.0-1009.9 No subscription required
High
CVE-2024-21823
CVE-2024-26924
CVE-2024-35901
USN-6877-1 -- LibreOffice vulnerability
Ubuntu 24.04 LTS
It was discovered that LibreOffice incorrectly performed TLS certificate verification when the LibreOfficeKit library is being used by third-party components. A remote attacker could possibly use this issue to obtain sensitive information. Update Instructions: Run `sudo pro fix USN-6877-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libreoffice-nlpsolver - 4:0.9+LibO24.2.4-0ubuntu0.24.04.2 No subscription required libreoffice-wiki-publisher - 4:1.2.0+LibO24.2.4-0ubuntu0.24.04.2 No subscription required fonts-opensymbol - 4:102.12+LibO24.2.4-0ubuntu0.24.04.2 No subscription required libreoffice-evolution - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-en-gb - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-librelogo - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ml - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-zh-cn - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-subsequentcheckbase - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-mk - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-id - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-mr - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-style-tango - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-pt-br - 4:24.2.4-0ubuntu0.24.04.2 libreofficekit-data - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-core - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-it - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-uk - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-fr - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-gnome - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-fi - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-nl - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-uiconfig-math - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-uz - 4:24.2.4-0ubuntu0.24.04.2 libreoffice - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-sdbc-mysql - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-nb - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-mn - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ne - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-nl - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-uiconfig-writer - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-nn - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-fi - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-dz - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-nr - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-fr - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-report-builder-bin - 4:24.2.4-0ubuntu0.24.04.2 libofficebean-java - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-qt6 - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-vi - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-nso - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-qt5 - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-nogui - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-math-nogui - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-style-karasa-jaga - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ve - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-gu - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-om - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-gl - 4:24.2.4-0ubuntu0.24.04.2 python3-access2base - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-en-us - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ga - 4:24.2.4-0ubuntu0.24.04.2 libuno-cppu3t64 - 4:24.2.4-0ubuntu0.24.04.2 liblibreofficekitgtk - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-gd - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-km - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-kn - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-ko - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-st - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-dev-common - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-sr - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-cs - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ts - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-sv - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-script-provider-bsh - 4:24.2.4-0ubuntu0.24.04.2 gir1.2-lokdocview-0.1 - 4:24.2.4-0ubuntu0.24.04.2 ure-java - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-report-builder-bin-nogui - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ka - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-uiconfig-common - 4:24.2.4-0ubuntu0.24.04.2 libridl-java - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-ca - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-zh-tw - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-sl - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-sk - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-style-breeze - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-si - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-da - 4:24.2.4-0ubuntu0.24.04.2 libreofficekit-dev - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-de - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-common - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-pl - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-pa-in - 4:24.2.4-0ubuntu0.24.04.2 libuno-purpenvhelpergcc3-3t64 - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-uiconfig-report-builder - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-pt - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-base-nogui - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-gtk3 - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-math - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-vi - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-gtk4 - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-tr - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-hi - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-gug - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-sdbc-hsqldb - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-draw-nogui - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-calc - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-base-drivers - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-style-colibre - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ta - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-sdbc-firebird - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-tg - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-te - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-th - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-id - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-lv - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-hu - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-lt - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ss - 4:24.2.4-0ubuntu0.24.04.2 libunoloader-java - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-uiconfig-impress - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-eu - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-et - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-script-provider-js - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-es - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-el - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-eo - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-style-sifr - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-zh-cn - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ug - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-smoketest-data - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ko - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-zu - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-impress - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-java-common - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-eu - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-et - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-es - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-km - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-uiconfig-draw - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-el - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-uiconfig-calc - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-kk - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-dev-gui - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-be - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-szl - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-bg - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-tn - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-bn - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-plasma - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-ja - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-br - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-bs - 4:24.2.4-0ubuntu0.24.04.2 liblibreoffice-java - 4:24.2.4-0ubuntu0.24.04.2 libunoil-java - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-style-yaru - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-base-core - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-ru - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ru - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-rw - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-is - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-style-elementary - 4:24.2.4-0ubuntu0.24.04.2 python3-uno - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-fa - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-am - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ro - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-en-za - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-style-sukapura - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ca - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-sl - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-calc-nogui - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-sk - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-sv - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-cs - 4:24.2.4-0ubuntu0.24.04.2 python3-scriptforge - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-dev-doc - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-common - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-za - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-cy - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-oc - 4:24.2.4-0ubuntu0.24.04.2 libjurt-java - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-base - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-gl - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-om - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-or - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-pt-br - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-kmr - 4:24.2.4-0ubuntu0.24.04.2 uno-libs-private - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ast - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-hu - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-hr - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-script-provider-python - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-writer-nogui - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-hy - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-he - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-officebean - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-dev - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-report-builder - 4:24.2.4-0ubuntu0.24.04.2 libuno-sal3t64 - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-tr - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-hi - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-kf5 - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-dz - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-pt - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ja - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-pl - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-sdbc-postgresql - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-writer - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-de - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-da - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-uiconfig-base - 4:24.2.4-0ubuntu0.24.04.2 ure - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-impress-nogui - 4:24.2.4-0ubuntu0.24.04.2 libjuh-java - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-it - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-xh - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-af - 4:24.2.4-0ubuntu0.24.04.2 libuno-cppuhelpergcc3-3t64 - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-zh-tw - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-en-gb - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-draw - 4:24.2.4-0ubuntu0.24.04.2 libuno-salhelpergcc3-3t64 - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-core-nogui - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-as - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ar - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-in - 4:24.2.4-0ubuntu0.24.04.2 No subscription required
Medium
CVE-2024-5261
USN-6878-1 -- Linux kernel (Oracle) vulnerabilities
Ubuntu 24.04 LTS
Ziming Zhang discovered that the DRM driver for VMware Virtual GPU did not properly handle certain error conditions, leading to a NULL pointer dereference. A local attacker could possibly trigger this vulnerability to cause a denial of service. (CVE-2022-38096) Zheng Wang discovered that the Broadcom FullMAC WLAN driver in the Linux kernel contained a race condition during device removal, leading to a use- after-free vulnerability. A physically proximate attacker could possibly use this to cause a denial of service (system crash). (CVE-2023-47233) It was discovered that the ATA over Ethernet (AoE) driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2023-6270) It was discovered that the Atheros 802.11ac wireless driver did not properly validate certain data structures, leading to a NULL pointer dereference. An attacker could possibly use this to cause a denial of service. (CVE-2023-7042) It was discovered that the Intel Data Streaming and Intel Analytics Accelerator drivers in the Linux kernel allowed direct access to the devices for unprivileged users and virtual machines. A local attacker could use this to cause a denial of service. (CVE-2024-21823) Gui-Dong Han discovered that the software RAID driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. A privileged attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-23307) Bai Jiaju discovered that the Xceive XC4000 silicon tuner device driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-24861) Chenyuan Yang discovered that the Unsorted Block Images (UBI) flash device volume management subsystem did not properly validate logical eraseblock sizes in certain situations. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-25739) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - PowerPC architecture; - x86 architecture; - Block layer subsystem; - ACPI drivers; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Cryptographic API; - DPLL subsystem; - ARM SCMI message protocol; - EFI core; - GPU drivers; - InfiniBand drivers; - IOMMU subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - MMC subsystem; - Network drivers; - NTB driver; - NVME drivers; - PCI subsystem; - Powercap sysfs driver; - SCSI drivers; - Freescale SoC drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - TTY drivers; - USB subsystem; - DesignWare USB3 driver; - VFIO drivers; - Backlight driver; - Virtio drivers; - Xen hypervisor drivers; - File systems infrastructure; - BTRFS file system; - debug file system; - Ext4 file system; - F2FS file system; - FAT file system; - Network file system client; - NILFS2 file system; - Overlay file system; - Pstore file system; - Diskquota system; - SMB network file system; - UBI file system; - io_uring subsystem; - BPF subsystem; - Core kernel; - PCI iomap interfaces; - Memory management; - Bluetooth subsystem; - Networking core; - HSR network protocol; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - IEEE 802.15.4 subsystem; - Netfilter; - Packet sockets; - Network traffic control; - Sun RPC protocol; - ALSA SH drivers; - SOF drivers; - USB sound devices; - KVM core; (CVE-2024-27032, CVE-2024-26868, CVE-2024-26879, CVE-2024-27033, CVE-2024-26943, CVE-2024-27040, CVE-2024-26950, CVE-2023-52650, CVE-2023-52649, CVE-2023-52644, CVE-2024-26899, CVE-2024-27432, CVE-2024-35806, CVE-2024-26871, CVE-2024-35845, CVE-2024-35799, CVE-2024-26945, CVE-2024-35805, CVE-2024-27041, CVE-2024-26860, CVE-2024-26930, CVE-2024-26941, CVE-2024-26960, CVE-2024-27034, CVE-2024-26891, CVE-2024-35793, CVE-2024-26963, CVE-2024-27029, CVE-2024-26890, CVE-2024-27074, CVE-2024-27079, CVE-2024-27053, CVE-2024-27070, CVE-2024-35821, CVE-2024-27067, CVE-2024-27051, CVE-2024-27026, CVE-2024-26961, CVE-2024-27050, CVE-2024-26939, CVE-2024-26897, CVE-2024-26878, CVE-2024-27433, CVE-2024-26885, CVE-2024-35810, CVE-2024-35829, CVE-2024-26965, CVE-2024-26875, CVE-2024-26966, CVE-2024-27078, CVE-2024-35874, CVE-2023-52661, CVE-2024-35794, CVE-2024-35787, CVE-2024-26874, CVE-2024-27054, CVE-2024-26940, CVE-2024-26859, CVE-2024-27044, CVE-2024-26948, CVE-2024-26882, CVE-2023-52653, CVE-2024-27071, CVE-2024-27065, CVE-2024-26877, CVE-2024-26929, CVE-2024-27064, CVE-2024-35803, CVE-2024-27066, CVE-2024-27028, CVE-2024-27072, CVE-2024-26876, CVE-2024-27039, CVE-2024-27435, CVE-2024-27434, CVE-2024-26812, CVE-2024-27030, CVE-2024-26816, CVE-2024-26873, CVE-2024-35808, CVE-2024-27389, CVE-2024-27075, CVE-2024-27038, CVE-2024-35828, CVE-2024-26946, CVE-2024-26655, CVE-2023-52662, CVE-2024-27077, CVE-2024-27076, CVE-2024-35795, CVE-2024-26933, CVE-2024-35789, CVE-2024-26972, CVE-2023-52663, CVE-2024-27031, CVE-2024-27069, CVE-2024-26813, CVE-2023-52659, CVE-2024-26862, CVE-2024-26962, CVE-2024-26654, CVE-2024-26815, CVE-2024-26978, CVE-2024-26976, CVE-2024-26893, CVE-2024-35809, CVE-2024-27027, CVE-2024-26864, CVE-2024-27048, CVE-2024-27046, CVE-2024-26869, CVE-2024-35827, CVE-2024-26951, CVE-2024-26942, CVE-2024-26870, CVE-2024-27437, CVE-2024-26931, CVE-2024-27036, CVE-2022-48669, CVE-2024-26898, CVE-2024-26970, CVE-2024-26886, CVE-2024-26944, CVE-2024-26865, CVE-2024-26896, CVE-2024-26895, CVE-2024-26947, CVE-2024-26880, CVE-2024-35811, CVE-2024-26975, CVE-2024-27391, CVE-2024-35796, CVE-2024-27043, CVE-2024-26949, CVE-2024-26653, CVE-2024-35814, CVE-2024-26964, CVE-2023-52652, CVE-2024-27047, CVE-2024-35830, CVE-2024-26900, CVE-2024-26810, CVE-2024-26956, CVE-2024-35817, CVE-2024-26887, CVE-2024-26809, CVE-2024-27045, CVE-2024-26656, CVE-2024-26971, CVE-2024-26866, CVE-2024-26861, CVE-2024-26968, CVE-2024-26881, CVE-2024-27063, CVE-2024-35807, CVE-2024-35797, CVE-2024-35822, CVE-2024-35813, CVE-2024-27073, CVE-2024-26954, CVE-2024-26888, CVE-2024-26955, CVE-2024-26894, CVE-2024-35844, CVE-2024-26958, CVE-2024-26952, CVE-2024-35798, CVE-2024-26969, CVE-2024-26967, CVE-2024-35800, CVE-2024-35819, CVE-2024-26937, CVE-2024-26927, CVE-2024-26883, CVE-2024-26934, CVE-2024-27392, CVE-2024-27068, CVE-2024-26889, CVE-2024-26892, CVE-2024-27390, CVE-2024-26657, CVE-2024-27388, CVE-2024-27049, CVE-2024-26935, CVE-2024-35831, CVE-2024-26884, CVE-2024-26938, CVE-2024-27037, CVE-2024-26977, CVE-2024-26953, CVE-2024-26973, CVE-2024-26932, CVE-2024-26901, CVE-2024-35843, CVE-2024-26872, CVE-2024-26959, CVE-2024-27035, CVE-2024-35826, CVE-2024-27436, CVE-2024-26651, CVE-2024-26957, CVE-2024-26863, CVE-2024-27042, CVE-2024-26814, CVE-2023-52647, CVE-2024-27080, CVE-2024-27052, CVE-2024-27058, CVE-2024-35801, CVE-2023-52648) Update Instructions: Run `sudo pro fix USN-6878-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-modules-extra-6.8.0-1006-oracle - 6.8.0-1006.6 linux-headers-oracle - 6.8.0-1006.6 linux-modules-6.8.0-1006-oracle-64k - 6.8.0-1006.6 linux-image-oracle - 6.8.0-1006.6 linux-tools-6.8.0-1006-oracle - 6.8.0-1006.6 linux-image-oracle-64k - 6.8.0-1006.6 linux-image-unsigned-6.8.0-1006-oracle - 6.8.0-1006.6 linux-tools-oracle-64k - 6.8.0-1006.6 linux-modules-6.8.0-1006-oracle - 6.8.0-1006.6 linux-oracle-headers-6.8.0-1006 - 6.8.0-1006.6 linux-image-6.8.0-1006-oracle - 6.8.0-1006.6 linux-oracle-64k - 6.8.0-1006.6 linux-tools-6.8.0-1006-oracle-64k - 6.8.0-1006.6 linux-modules-iwlwifi-6.8.0-1006-oracle - 6.8.0-1006.6 linux-tools-oracle - 6.8.0-1006.6 linux-headers-6.8.0-1006-oracle - 6.8.0-1006.6 linux-headers-oracle-64k - 6.8.0-1006.6 linux-buildinfo-6.8.0-1006-oracle-64k - 6.8.0-1006.6 linux-headers-6.8.0-1006-oracle-64k - 6.8.0-1006.6 linux-oracle-tools-6.8.0-1006 - 6.8.0-1006.6 linux-image-6.8.0-1006-oracle-64k - 6.8.0-1006.6 linux-image-unsigned-6.8.0-1006-oracle-64k - 6.8.0-1006.6 linux-oracle - 6.8.0-1006.6 linux-modules-extra-6.8.0-1006-oracle-64k - 6.8.0-1006.6 linux-modules-iwlwifi-oracle - 6.8.0-1006.6 linux-buildinfo-6.8.0-1006-oracle - 6.8.0-1006.6 No subscription required
High
CVE-2022-38096
CVE-2022-48669
CVE-2023-47233
CVE-2023-52644
CVE-2023-52647
CVE-2023-52648
CVE-2023-52649
CVE-2023-52650
CVE-2023-52652
CVE-2023-52653
CVE-2023-52659
CVE-2023-52661
CVE-2023-52662
CVE-2023-52663
CVE-2023-6270
CVE-2023-7042
CVE-2024-21823
CVE-2024-23307
CVE-2024-24861
CVE-2024-25739
CVE-2024-26651
CVE-2024-26653
CVE-2024-26654
CVE-2024-26655
CVE-2024-26656
CVE-2024-26657
CVE-2024-26809
CVE-2024-26810
CVE-2024-26812
CVE-2024-26813
CVE-2024-26814
CVE-2024-26815
CVE-2024-26816
CVE-2024-26859
CVE-2024-26860
CVE-2024-26861
CVE-2024-26862
CVE-2024-26863
CVE-2024-26864
CVE-2024-26865
CVE-2024-26866
CVE-2024-26868
CVE-2024-26869
CVE-2024-26870
CVE-2024-26871
CVE-2024-26872
CVE-2024-26873
CVE-2024-26874
CVE-2024-26875
CVE-2024-26876
CVE-2024-26877
CVE-2024-26878
CVE-2024-26879
CVE-2024-26880
CVE-2024-26881
CVE-2024-26882
CVE-2024-26883
CVE-2024-26884
CVE-2024-26885
CVE-2024-26886
CVE-2024-26887
CVE-2024-26888
CVE-2024-26889
CVE-2024-26890
CVE-2024-26891
CVE-2024-26892
CVE-2024-26893
CVE-2024-26894
CVE-2024-26895
CVE-2024-26896
CVE-2024-26897
CVE-2024-26898
CVE-2024-26899
CVE-2024-26900
CVE-2024-26901
CVE-2024-26927
CVE-2024-26929
CVE-2024-26930
CVE-2024-26931
CVE-2024-26932
CVE-2024-26933
CVE-2024-26934
CVE-2024-26935
CVE-2024-26937
CVE-2024-26938
CVE-2024-26939
CVE-2024-26940
CVE-2024-26941
CVE-2024-26942
CVE-2024-26943
CVE-2024-26944
CVE-2024-26945
CVE-2024-26946
CVE-2024-26947
CVE-2024-26948
CVE-2024-26949
CVE-2024-26950
CVE-2024-26951
CVE-2024-26952
CVE-2024-26953
CVE-2024-26954
CVE-2024-26955
CVE-2024-26956
CVE-2024-26957
CVE-2024-26958
CVE-2024-26959
CVE-2024-26960
CVE-2024-26961
CVE-2024-26962
CVE-2024-26963
CVE-2024-26964
CVE-2024-26965
CVE-2024-26966
CVE-2024-26967
CVE-2024-26968
CVE-2024-26969
CVE-2024-26970
CVE-2024-26971
CVE-2024-26972
CVE-2024-26973
CVE-2024-26975
CVE-2024-26976
CVE-2024-26977
CVE-2024-26978
CVE-2024-27026
CVE-2024-27027
CVE-2024-27028
CVE-2024-27029
CVE-2024-27030
CVE-2024-27031
CVE-2024-27032
CVE-2024-27033
CVE-2024-27034
CVE-2024-27035
CVE-2024-27036
CVE-2024-27037
CVE-2024-27038
CVE-2024-27039
CVE-2024-27040
CVE-2024-27041
CVE-2024-27042
CVE-2024-27043
CVE-2024-27044
CVE-2024-27045
CVE-2024-27046
CVE-2024-27047
CVE-2024-27048
CVE-2024-27049
CVE-2024-27050
CVE-2024-27051
CVE-2024-27052
CVE-2024-27053
CVE-2024-27054
CVE-2024-27058
CVE-2024-27063
CVE-2024-27064
CVE-2024-27065
CVE-2024-27066
CVE-2024-27067
CVE-2024-27068
CVE-2024-27069
CVE-2024-27070
CVE-2024-27071
CVE-2024-27072
CVE-2024-27073
CVE-2024-27074
CVE-2024-27075
CVE-2024-27076
CVE-2024-27077
CVE-2024-27078
CVE-2024-27079
CVE-2024-27080
CVE-2024-27388
CVE-2024-27389
CVE-2024-27390
CVE-2024-27391
CVE-2024-27392
CVE-2024-27432
CVE-2024-27433
CVE-2024-27434
CVE-2024-27435
CVE-2024-27436
CVE-2024-27437
CVE-2024-35787
CVE-2024-35789
CVE-2024-35793
CVE-2024-35794
CVE-2024-35795
CVE-2024-35796
CVE-2024-35797
CVE-2024-35798
CVE-2024-35799
CVE-2024-35800
CVE-2024-35801
CVE-2024-35803
CVE-2024-35805
CVE-2024-35806
CVE-2024-35807
CVE-2024-35808
CVE-2024-35809
CVE-2024-35810
CVE-2024-35811
CVE-2024-35813
CVE-2024-35814
CVE-2024-35817
CVE-2024-35819
CVE-2024-35821
CVE-2024-35822
CVE-2024-35826
CVE-2024-35827
CVE-2024-35828
CVE-2024-35829
CVE-2024-35830
CVE-2024-35831
CVE-2024-35843
CVE-2024-35844
CVE-2024-35845
CVE-2024-35874
USN-6879-1 -- Virtuoso Open-Source Edition vulnerabilities
Ubuntu 24.04 LTS
Jingzhou Fu discovered that Virtuoso Open-Source Edition incorrectly handled certain crafted SQL statements. An attacker could possibly use this issue to crash the program, resulting in a denial of service. (CVE-2023-31620, CVE-2023-31622, CVE-2023-31624, CVE-2023-31626, CVE-2023-31627, CVE-2023-31629, CVE-2023-31630, CVE-2023-31631, CVE-2023-48951) Jingzhou Fu discovered that Virtuoso Open-Source Edition incorrectly handled certain crafted SQL statements. An attacker could possibly use this issue to crash the program, resulting in a denial of service. This issue only affects Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2023-48945, CVE-2023-48946, CVE-2023-48947, CVE-2023-48950) Update Instructions: Run `sudo pro fix USN-6879-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libvirtodbc0 - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 libvirtuoso5.5-cil - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-minimal - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-opensource - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-opensource-7 - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-opensource-7-bin - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-opensource-7-common - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-server - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-bpel - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-conductor - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-demo - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-doc - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-isparql - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-ods - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-rdfmappers - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-sparqldemo - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-syncml - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-tutorial - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vsp-startpage - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2023-31620
CVE-2023-31622
CVE-2023-31624
CVE-2023-31626
CVE-2023-31627
CVE-2023-31629
CVE-2023-31630
CVE-2023-31631
CVE-2023-48945
CVE-2023-48946
CVE-2023-48947
CVE-2023-48950
CVE-2023-48951
USN-6882-1 -- Cinder vulnerability
Ubuntu 24.04 LTS
Martin Kaesberger discovered that Cinder incorrectly handled QCOW2 image processing. An authenticated user could use this issue to access arbitrary files on the server, possibly exposing sensitive information. Update Instructions: Run `sudo pro fix USN-6882-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: cinder-api - 2:24.0.0-0ubuntu1.2 cinder-backup - 2:24.0.0-0ubuntu1.2 cinder-common - 2:24.0.0-0ubuntu1.2 cinder-scheduler - 2:24.0.0-0ubuntu1.2 cinder-volume - 2:24.0.0-0ubuntu1.2 python3-cinder - 2:24.0.0-0ubuntu1.2 No subscription required
Medium
CVE-2024-32498
USN-6883-1 -- OpenStack Glance vulnerability
Ubuntu 24.04 LTS
Martin Kaesberger discovered that Glance incorrectly handled QCOW2 image processing. An authenticated user could use this issue to access arbitrary files on the server, possibly exposing sensitive information. Update Instructions: Run `sudo pro fix USN-6883-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: glance - 2:28.0.1-0ubuntu1.2 glance-api - 2:28.0.1-0ubuntu1.2 glance-common - 2:28.0.1-0ubuntu1.2 python-glance-doc - 2:28.0.1-0ubuntu1.2 python3-glance - 2:28.0.1-0ubuntu1.2 No subscription required
Medium
CVE-2024-32498
USN-6884-1 -- Nova vulnerability
Ubuntu 24.04 LTS
Martin Kaesberger discovered that Nova incorrectly handled QCOW2 image processing. An authenticated user could use this issue to access arbitrary files on the server, possibly exposing sensitive information. Update Instructions: Run `sudo pro fix USN-6884-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: nova-ajax-console-proxy - 3:29.0.1-0ubuntu1.3 nova-api - 3:29.0.1-0ubuntu1.3 nova-api-metadata - 3:29.0.1-0ubuntu1.3 nova-api-os-compute - 3:29.0.1-0ubuntu1.3 nova-api-os-volume - 3:29.0.1-0ubuntu1.3 nova-cells - 3:29.0.1-0ubuntu1.3 nova-common - 3:29.0.1-0ubuntu1.3 nova-compute - 3:29.0.1-0ubuntu1.3 nova-compute-ironic - 3:29.0.1-0ubuntu1.3 nova-compute-kvm - 3:29.0.1-0ubuntu1.3 nova-compute-libvirt - 3:29.0.1-0ubuntu1.3 nova-compute-lxc - 3:29.0.1-0ubuntu1.3 nova-compute-qemu - 3:29.0.1-0ubuntu1.3 nova-compute-vmware - 3:29.0.1-0ubuntu1.3 nova-compute-xen - 3:29.0.1-0ubuntu1.3 nova-conductor - 3:29.0.1-0ubuntu1.3 nova-doc - 3:29.0.1-0ubuntu1.3 nova-novncproxy - 3:29.0.1-0ubuntu1.3 nova-scheduler - 3:29.0.1-0ubuntu1.3 nova-serialproxy - 3:29.0.1-0ubuntu1.3 nova-spiceproxy - 3:29.0.1-0ubuntu1.3 nova-volume - 3:29.0.1-0ubuntu1.3 python3-nova - 3:29.0.1-0ubuntu1.3 No subscription required
Medium
CVE-2024-32498
USN-6885-1 -- Apache HTTP Server vulnerabilities
Ubuntu 24.04 LTS
Marc Stern discovered that the Apache HTTP Server incorrectly handled serving WebSocket protocol upgrades over HTTP/2 connections. A remote attacker could possibly use this issue to cause the server to crash, resulting in a denial of service. (CVE-2024-36387) Orange Tsai discovered that the Apache HTTP Server mod_proxy module incorrectly sent certain request URLs with incorrect encodings to backends. A remote attacker could possibly use this issue to bypass authentication. (CVE-2024-38473) Orange Tsai discovered that the Apache HTTP Server mod_rewrite module incorrectly handled certain substitutions. A remote attacker could possibly use this issue to execute scripts in directories not directly reachable by any URL, or cause a denial of service. Some environments may require using the new UnsafeAllow3F flag to handle unsafe substitutions. (CVE-2024-38474, CVE-2024-38475, CVE-2024-39573) Orange Tsai discovered that the Apache HTTP Server incorrectly handled certain response headers. A remote attacker could possibly use this issue to obtain sensitive information, execute local scripts, or perform SSRF attacks. (CVE-2024-38476) Orange Tsai discovered that the Apache HTTP Server mod_proxy module incorrectly handled certain requests. A remote attacker could possibly use this issue to cause the server to crash, resulting in a denial of service. (CVE-2024-38477) It was discovered that the Apache HTTP Server incorrectly handled certain handlers configured via AddType. A remote attacker could possibly use this issue to obtain source code. (CVE-2024-39884) Update Instructions: Run `sudo pro fix USN-6885-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: apache2 - 2.4.58-1ubuntu8.2 apache2-bin - 2.4.58-1ubuntu8.2 apache2-data - 2.4.58-1ubuntu8.2 apache2-dev - 2.4.58-1ubuntu8.2 apache2-doc - 2.4.58-1ubuntu8.2 apache2-ssl-dev - 2.4.58-1ubuntu8.2 apache2-suexec-custom - 2.4.58-1ubuntu8.2 apache2-suexec-pristine - 2.4.58-1ubuntu8.2 apache2-utils - 2.4.58-1ubuntu8.2 libapache2-mod-md - 2.4.58-1ubuntu8.2 libapache2-mod-proxy-uwsgi - 2.4.58-1ubuntu8.2 No subscription required
Medium
CVE-2024-36387
CVE-2024-38473
CVE-2024-38474
CVE-2024-38475
CVE-2024-38476
CVE-2024-38477
CVE-2024-39573
CVE-2024-39884
USN-6885-2 -- Apache HTTP Server regression
Ubuntu 24.04 LTS
USN-6885-1 fixed vulnerabilities in Apache HTTP Server. One of the security fixes introduced a regression when proxying requests to a HTTP/2 server. This update fixes the problem. We apologize for the inconvenience. Original advisory details: Marc Stern discovered that the Apache HTTP Server incorrectly handled serving WebSocket protocol upgrades over HTTP/2 connections. A remote attacker could possibly use this issue to cause the server to crash, resulting in a denial of service. (CVE-2024-36387) Orange Tsai discovered that the Apache HTTP Server mod_proxy module incorrectly sent certain request URLs with incorrect encodings to backends. A remote attacker could possibly use this issue to bypass authentication. (CVE-2024-38473) Orange Tsai discovered that the Apache HTTP Server mod_rewrite module incorrectly handled certain substitutions. A remote attacker could possibly use this issue to execute scripts in directories not directly reachable by any URL, or cause a denial of service. Some environments may require using the new UnsafeAllow3F flag to handle unsafe substitutions. (CVE-2024-38474, CVE-2024-38475, CVE-2024-39573) Orange Tsai discovered that the Apache HTTP Server incorrectly handled certain response headers. A remote attacker could possibly use this issue to obtain sensitive information, execute local scripts, or perform SSRF attacks. (CVE-2024-38476) Orange Tsai discovered that the Apache HTTP Server mod_proxy module incorrectly handled certain requests. A remote attacker could possibly use this issue to cause the server to crash, resulting in a denial of service. (CVE-2024-38477) It was discovered that the Apache HTTP Server incorrectly handled certain handlers configured via AddType. A remote attacker could possibly use this issue to obtain source code. (CVE-2024-39884) Update Instructions: Run `sudo pro fix USN-6885-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: apache2 - 2.4.58-1ubuntu8.3 apache2-bin - 2.4.58-1ubuntu8.3 apache2-data - 2.4.58-1ubuntu8.3 apache2-dev - 2.4.58-1ubuntu8.3 apache2-doc - 2.4.58-1ubuntu8.3 apache2-ssl-dev - 2.4.58-1ubuntu8.3 apache2-suexec-custom - 2.4.58-1ubuntu8.3 apache2-suexec-pristine - 2.4.58-1ubuntu8.3 apache2-utils - 2.4.58-1ubuntu8.3 libapache2-mod-md - 2.4.58-1ubuntu8.3 libapache2-mod-proxy-uwsgi - 2.4.58-1ubuntu8.3 No subscription required
None
https://launchpad.net/bugs/2072648
USN-6886-1 -- Go vulnerabilities
Ubuntu 24.04 LTS
It was discovered that the Go net/http module did not properly handle the requests when request\'s headers exceed MaxHeaderBytes. An attacker could possibly use this issue to cause a panic resulting into a denial of service. This issue only affected Go 1.21 in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-45288) It was discovered that the Go net/http module did not properly validate the subdomain match or exact match of the initial domain. An attacker could possibly use this issue to read sensitive information. This issue only affected Go 1.21 in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-45289) It was discovered that the Go net/http module did not properly validate the total size of the parsed form when parsing a multipart form. An attacker could possibly use this issue to cause a panic resulting into a denial of service. This issue only affected Go 1.21 in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-45290) It was discovered that the Go crypto/x509 module did not properly handle a certificate chain which contains a certificate with an unknown public key algorithm. An attacker could possibly use this issue to cause a panic resulting into a denial of service. This issue only affected Go 1.21 in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2024-24783) It was discovered that the Go net/mail module did not properly handle comments within display names in the ParseAddressList function. An attacker could possibly use this issue to cause a panic resulting into a denial of service. This issue only affected Go 1.21 in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2024-24784) It was discovered that the Go html/template module did not validate errors returned from MarshalJSON methods. An attacker could possibly use this issue to inject arbitrary code into the Go template. This issue only affected Go 1.21 in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2024-24785) It was discovered that the Go net module did not properly validate the DNS message in response to a query. An attacker could possibly use this issue to cause a panic resulting into a denial of service. This issue only affected Go 1.22. (CVE-2024-24788) It was discovered that the Go archive/zip module did not properly handle certain types of invalid zip files differs from the behavior of most zip implementations. An attacker could possibly use this issue to cause a panic resulting into a denial of service. (CVE-2024-24789) It was discovered that the Go net/netip module did not work as expected for IPv4-mapped IPv6 addresses in various Is methods. An attacker could possibly use this issue to cause a panic resulting into a denial of service. (CVE-2024-24790) Update Instructions: Run `sudo pro fix USN-6886-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: golang-1.21 - 1.21.9-1ubuntu0.1 golang-1.21-doc - 1.21.9-1ubuntu0.1 golang-1.21-go - 1.21.9-1ubuntu0.1 golang-1.21-src - 1.21.9-1ubuntu0.1 No subscription required golang-1.22 - 1.22.2-2ubuntu0.1 golang-1.22-doc - 1.22.2-2ubuntu0.1 golang-1.22-go - 1.22.2-2ubuntu0.1 golang-1.22-src - 1.22.2-2ubuntu0.1 No subscription required
Medium
CVE-2023-45288
CVE-2023-45289
CVE-2023-45290
CVE-2024-24783
CVE-2024-24784
CVE-2024-24785
CVE-2024-24788
CVE-2024-24789
CVE-2024-24790
USN-6887-1 -- OpenSSH vulnerability
Ubuntu 24.04 LTS
Philippos Giavridis, Jacky Wei En Kung, Daniel Hugenroth, and Alastair Beresford discovered that the OpenSSH ObscureKeystrokeTiming feature did not work as expected. A remote attacker could possibly use this issue to determine timing information about keystrokes. Update Instructions: Run `sudo pro fix USN-6887-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openssh-client - 1:9.6p1-3ubuntu13.4 openssh-server - 1:9.6p1-3ubuntu13.4 openssh-sftp-server - 1:9.6p1-3ubuntu13.4 openssh-tests - 1:9.6p1-3ubuntu13.4 ssh - 1:9.6p1-3ubuntu13.4 ssh-askpass-gnome - 1:9.6p1-3ubuntu13.4 No subscription required
Medium
CVE-2024-39894
USN-6888-1 -- Django vulnerabilities
Ubuntu 24.04 LTS
Elias Myllymäki discovered that Django incorrectly handled certain inputs with a large number of brackets. A remote attacker could possibly use this issue to cause Django to consume resources or stop responding, resulting in a denial of service. (CVE-2024-38875) It was discovered that Django incorrectly handled authenticating users with unusable passwords. A remote attacker could possibly use this issue to perform a timing attack and enumerate users. (CVE-2024-39329) Josh Schneier discovered that Django incorrectly handled file path validation when the storage class is being derived. A remote attacker could possibly use this issue to save files into arbitrary directories. (CVE-2024-39330) It was discovered that Django incorrectly handled certain long strings that included a specific set of characters. A remote attacker could possibly use this issue to cause Django to consume resources or stop responding, resulting in a denial of service. (CVE-2024-39614) Update Instructions: Run `sudo pro fix USN-6888-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-django-doc - 3:4.2.11-1ubuntu1.1 python3-django - 3:4.2.11-1ubuntu1.1 No subscription required
Medium
CVE-2024-38875
CVE-2024-39329
CVE-2024-39330
CVE-2024-39614
USN-6889-1 -- .NET vulnerabilities
Ubuntu 24.04 LTS
It was discovered that .NET did not properly handle object deserialization. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-30105) Radek Zikmund discovered that .NET did not properly manage memory. An attacker could use this issue to cause a denial of service or possibly execute arbitrary code. (CVE-2024-35264) It was discovered that .NET did not properly parse X.509 Content and ObjectIdentifiers. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-38095) Update Instructions: Run `sudo pro fix USN-6889-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: dotnet-sdk-8.0 - 8.0.107-0ubuntu1~24.04.1 dotnet-sdk-8.0-source-built-artifacts - 8.0.107-0ubuntu1~24.04.1 dotnet-sdk-dbg-8.0 - 8.0.107-0ubuntu1~24.04.1 dotnet-templates-8.0 - 8.0.107-0ubuntu1~24.04.1 netstandard-targeting-pack-2.1-8.0 - 8.0.107-0ubuntu1~24.04.1 No subscription required dotnet8 - 8.0.107-8.0.7-0ubuntu1~24.04.1 No subscription required aspnetcore-runtime-8.0 - 8.0.7-0ubuntu1~24.04.1 aspnetcore-runtime-dbg-8.0 - 8.0.7-0ubuntu1~24.04.1 aspnetcore-targeting-pack-8.0 - 8.0.7-0ubuntu1~24.04.1 dotnet-apphost-pack-8.0 - 8.0.7-0ubuntu1~24.04.1 dotnet-host-8.0 - 8.0.7-0ubuntu1~24.04.1 dotnet-hostfxr-8.0 - 8.0.7-0ubuntu1~24.04.1 dotnet-runtime-8.0 - 8.0.7-0ubuntu1~24.04.1 dotnet-runtime-dbg-8.0 - 8.0.7-0ubuntu1~24.04.1 dotnet-targeting-pack-8.0 - 8.0.7-0ubuntu1~24.04.1 No subscription required
Medium
CVE-2024-30105
CVE-2024-35264
CVE-2024-38095
USN-6893-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
It was discovered that a race condition existed in the Bluetooth subsystem in the Linux kernel when modifying certain settings values through debugfs. A privileged local attacker could use this to cause a denial of service. (CVE-2024-24857, CVE-2024-24858, CVE-2024-24859) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - RISC-V architecture; - S390 architecture; - x86 architecture; - Block layer subsystem; - Compute Acceleration Framework; - Accessibility subsystem; - Android drivers; - Drivers core; - Bluetooth drivers; - Clock framework and drivers; - Data acquisition framework and drivers; - Cryptographic API; - Buffer Sharing and Synchronization framework; - GPU drivers; - On-Chip Interconnect management framework; - IOMMU subsystem; - Multiple devices driver; - Media drivers; - VMware VMCI Driver; - Network drivers; - Microsoft Azure Network Adapter (MANA) driver; - Device tree and open firmware driver; - Chrome hardware platform drivers; - i.MX PM domains; - TI SCI PM domains driver; - S/390 drivers; - SCSI drivers; - SPI subsystem; - Thermal drivers; - TTY drivers; - USB subsystem; - Framebuffer layer; - BTRFS file system; - Network file system server daemon; - NILFS2 file system; - File systems infrastructure; - Pstore file system; - SMB network file system; - BPF subsystem; - Bluetooth subsystem; - Netfilter; - io_uring subsystem; - Core kernel; - Extra boot config (XBC); - Memory management; - Amateur Radio drivers; - B.A.T.M.A.N. meshing protocol; - Ethernet bridge; - Networking core; - IPv4 networking; - IPv6 networking; - Multipath TCP; - NFC subsystem; - RDS protocol; - Network traffic control; - SMC sockets; - Sun RPC protocol; - TLS protocol; - Unix domain sockets; - Wireless networking; - eXpress Data Path; - SELinux security module; (CVE-2024-35967, CVE-2024-35886, CVE-2024-26999, CVE-2024-27008, CVE-2024-26988, CVE-2024-35980, CVE-2024-26982, CVE-2024-35946, CVE-2024-35918, CVE-2024-27015, CVE-2024-35900, CVE-2024-35942, CVE-2024-35879, CVE-2024-35961, CVE-2024-35944, CVE-2024-35934, CVE-2024-35978, CVE-2024-35938, CVE-2024-27003, CVE-2024-35976, CVE-2024-36019, CVE-2024-35880, CVE-2024-35866, CVE-2024-35929, CVE-2024-35917, CVE-2024-35912, CVE-2024-35896, CVE-2024-26986, CVE-2024-35951, CVE-2024-35958, CVE-2024-26997, CVE-2024-35965, CVE-2024-35953, CVE-2024-26993, CVE-2024-26991, CVE-2024-35892, CVE-2024-36026, CVE-2024-35882, CVE-2024-35964, CVE-2024-35865, CVE-2024-35897, CVE-2024-26981, CVE-2024-35872, CVE-2024-36027, CVE-2024-26983, CVE-2024-35909, CVE-2024-35985, CVE-2024-35875, CVE-2024-35890, CVE-2024-26922, CVE-2024-26994, CVE-2024-35903, CVE-2024-35936, CVE-2024-35904, CVE-2024-27013, CVE-2024-36025, CVE-2024-26980, CVE-2024-27006, CVE-2024-35861, CVE-2024-35864, CVE-2024-27018, CVE-2024-36022, CVE-2024-26990, CVE-2024-35968, CVE-2024-35860, CVE-2024-36024, CVE-2024-35933, CVE-2024-27019, CVE-2024-35925, CVE-2024-35950, CVE-2024-35915, CVE-2024-35916, CVE-2024-35956, CVE-2024-36020, CVE-2024-35873, CVE-2024-27002, CVE-2024-35963, CVE-2024-35959, CVE-2024-35937, CVE-2024-27011, CVE-2024-27020, CVE-2024-35883, CVE-2024-35913, CVE-2024-35910, CVE-2024-27021, CVE-2024-35921, CVE-2024-35905, CVE-2024-27010, CVE-2024-35981, CVE-2024-35885, CVE-2024-35955, CVE-2024-35894, CVE-2024-35969, CVE-2024-36018, CVE-2024-35867, CVE-2024-27007, CVE-2024-35908, CVE-2024-26985, CVE-2024-27016, CVE-2024-35960, CVE-2024-35935, CVE-2024-35932, CVE-2024-35957, CVE-2024-27001, CVE-2024-35871, CVE-2024-35907, CVE-2024-35878, CVE-2024-35979, CVE-2024-35972, CVE-2024-35975, CVE-2024-35877, CVE-2024-35926, CVE-2024-26817, CVE-2024-35899, CVE-2024-27004, CVE-2024-35920, CVE-2024-35924, CVE-2024-35977, CVE-2024-35930, CVE-2024-35911, CVE-2024-26996, CVE-2024-27005, CVE-2024-35870, CVE-2024-35982, CVE-2024-35895, CVE-2024-35943, CVE-2024-35902, CVE-2024-35919, CVE-2024-35973, CVE-2024-35931, CVE-2024-35888, CVE-2024-35914, CVE-2024-35970, CVE-2024-36023, CVE-2024-27012, CVE-2024-35939, CVE-2024-26984, CVE-2024-35884, CVE-2024-35901, CVE-2024-26811, CVE-2024-35966, CVE-2024-35891, CVE-2024-35887, CVE-2024-35945, CVE-2024-35971, CVE-2024-35862, CVE-2024-26987, CVE-2024-26921, CVE-2024-26989, CVE-2024-35952, CVE-2024-27009, CVE-2024-35893, CVE-2024-26995, CVE-2024-26925, CVE-2024-35868, CVE-2024-35954, CVE-2024-35922, CVE-2024-27000, CVE-2024-36021, CVE-2024-27014, CVE-2024-35940, CVE-2024-26992, CVE-2024-26926, CVE-2024-35927, CVE-2024-35863, CVE-2024-27022, CVE-2024-26998, CVE-2024-27017, CVE-2024-26928, CVE-2024-35889, CVE-2024-35898, CVE-2024-35869, CVE-2024-26936, CVE-2024-26923, CVE-2023-52699, CVE-2024-35974) Update Instructions: Run `sudo pro fix USN-6893-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1007-intel - 6.8.0-1007.14 linux-cloud-tools-6.8.0-1007-intel - 6.8.0-1007.14 linux-headers-6.8.0-1007-intel - 6.8.0-1007.14 linux-headers-intel - 6.8.0-1007.14 linux-image-6.8.0-1007-intel - 6.8.0-1007.14 linux-image-intel - 6.8.0-1007.14 linux-image-unsigned-6.8.0-1007-intel - 6.8.0-1007.14 linux-intel - 6.8.0-1007.14 linux-intel-cloud-tools-6.8.0-1007 - 6.8.0-1007.14 linux-intel-headers-6.8.0-1007 - 6.8.0-1007.14 linux-intel-tools-6.8.0-1007 - 6.8.0-1007.14 linux-modules-6.8.0-1007-intel - 6.8.0-1007.14 linux-modules-extra-6.8.0-1007-intel - 6.8.0-1007.14 linux-modules-extra-intel - 6.8.0-1007.14 linux-modules-iwlwifi-6.8.0-1007-intel - 6.8.0-1007.14 linux-modules-iwlwifi-intel - 6.8.0-1007.14 linux-tools-6.8.0-1007-intel - 6.8.0-1007.14 linux-tools-intel - 6.8.0-1007.14 No subscription required linux-buildinfo-6.8.0-1007-raspi - 6.8.0-1007.7 linux-headers-6.8.0-1007-raspi - 6.8.0-1007.7 linux-headers-raspi - 6.8.0-1007.7 linux-image-6.8.0-1007-raspi - 6.8.0-1007.7 linux-image-raspi - 6.8.0-1007.7 linux-modules-6.8.0-1007-raspi - 6.8.0-1007.7 linux-raspi - 6.8.0-1007.7 linux-raspi-headers-6.8.0-1007 - 6.8.0-1007.7 linux-raspi-tools-6.8.0-1007 - 6.8.0-1007.7 linux-tools-6.8.0-1007-raspi - 6.8.0-1007.7 linux-tools-raspi - 6.8.0-1007.7 No subscription required linux-buildinfo-6.8.0-1008-ibm - 6.8.0-1008.8 linux-buildinfo-6.8.0-1008-oem - 6.8.0-1008.8 linux-headers-6.8.0-1008-ibm - 6.8.0-1008.8 linux-headers-6.8.0-1008-oem - 6.8.0-1008.8 linux-headers-ibm - 6.8.0-1008.8 linux-headers-ibm-classic - 6.8.0-1008.8 linux-headers-ibm-lts-24.04 - 6.8.0-1008.8 linux-headers-oem-24.04 - 6.8.0-1008.8 linux-headers-oem-24.04a - 6.8.0-1008.8 linux-ibm - 6.8.0-1008.8 linux-ibm-classic - 6.8.0-1008.8 linux-ibm-cloud-tools-common - 6.8.0-1008.8 linux-ibm-headers-6.8.0-1008 - 6.8.0-1008.8 linux-ibm-lts-24.04 - 6.8.0-1008.8 linux-ibm-source-6.8.0 - 6.8.0-1008.8 linux-ibm-tools-6.8.0-1008 - 6.8.0-1008.8 linux-image-6.8.0-1008-ibm - 6.8.0-1008.8 linux-image-6.8.0-1008-oem - 6.8.0-1008.8 linux-image-ibm - 6.8.0-1008.8 linux-image-ibm-classic - 6.8.0-1008.8 linux-image-ibm-lts-24.04 - 6.8.0-1008.8 linux-image-oem-24.04 - 6.8.0-1008.8 linux-image-oem-24.04a - 6.8.0-1008.8 linux-image-uc-6.8.0-1008-oem - 6.8.0-1008.8 linux-image-uc-oem-24.04 - 6.8.0-1008.8 linux-image-uc-oem-24.04a - 6.8.0-1008.8 linux-image-unsigned-6.8.0-1008-ibm - 6.8.0-1008.8 linux-image-unsigned-6.8.0-1008-oem - 6.8.0-1008.8 linux-modules-6.8.0-1008-ibm - 6.8.0-1008.8 linux-modules-6.8.0-1008-oem - 6.8.0-1008.8 linux-modules-extra-6.8.0-1008-ibm - 6.8.0-1008.8 linux-modules-ipu6-6.8.0-1008-oem - 6.8.0-1008.8 linux-modules-ipu6-oem-24.04 - 6.8.0-1008.8 linux-modules-ipu6-oem-24.04a - 6.8.0-1008.8 linux-modules-iwlwifi-6.8.0-1008-ibm - 6.8.0-1008.8 linux-modules-iwlwifi-6.8.0-1008-oem - 6.8.0-1008.8 linux-modules-iwlwifi-ibm - 6.8.0-1008.8 linux-modules-iwlwifi-ibm-classic - 6.8.0-1008.8 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1008.8 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1008.8 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1008.8 linux-modules-usbio-6.8.0-1008-oem - 6.8.0-1008.8 linux-modules-usbio-oem-24.04 - 6.8.0-1008.8 linux-modules-usbio-oem-24.04a - 6.8.0-1008.8 linux-oem-24.04 - 6.8.0-1008.8 linux-oem-24.04a - 6.8.0-1008.8 linux-oem-6.8-headers-6.8.0-1008 - 6.8.0-1008.8 linux-oem-6.8-tools-6.8.0-1008 - 6.8.0-1008.8 linux-tools-6.8.0-1008-ibm - 6.8.0-1008.8 linux-tools-6.8.0-1008-oem - 6.8.0-1008.8 linux-tools-ibm - 6.8.0-1008.8 linux-tools-ibm-classic - 6.8.0-1008.8 linux-tools-ibm-lts-24.04 - 6.8.0-1008.8 linux-tools-oem-24.04 - 6.8.0-1008.8 linux-tools-oem-24.04a - 6.8.0-1008.8 No subscription required linux-azure - 6.8.0-1010.10 linux-azure-cloud-tools-6.8.0-1010 - 6.8.0-1010.10 linux-azure-fde - 6.8.0-1010.10 linux-azure-headers-6.8.0-1010 - 6.8.0-1010.10 linux-azure-tools-6.8.0-1010 - 6.8.0-1010.10 linux-buildinfo-6.8.0-1010-azure - 6.8.0-1010.10 linux-cloud-tools-6.8.0-1010-azure - 6.8.0-1010.10 linux-cloud-tools-azure - 6.8.0-1010.10 linux-headers-6.8.0-1010-azure - 6.8.0-1010.10 linux-headers-azure - 6.8.0-1010.10 linux-image-6.8.0-1010-azure - 6.8.0-1010.10 linux-image-6.8.0-1010-azure-fde - 6.8.0-1010.10 linux-image-azure - 6.8.0-1010.10 linux-image-azure-fde - 6.8.0-1010.10 linux-image-unsigned-6.8.0-1010-azure - 6.8.0-1010.10 linux-modules-6.8.0-1010-azure - 6.8.0-1010.10 linux-modules-extra-6.8.0-1010-azure - 6.8.0-1010.10 linux-modules-extra-azure - 6.8.0-1010.10 linux-modules-iwlwifi-6.8.0-1010-azure - 6.8.0-1010.10 linux-modules-iwlwifi-azure - 6.8.0-1010.10 linux-tools-6.8.0-1010-azure - 6.8.0-1010.10 linux-tools-azure - 6.8.0-1010.10 No subscription required linux-buildinfo-6.8.0-1010-gcp - 6.8.0-1010.11 linux-gcp - 6.8.0-1010.11 linux-gcp-headers-6.8.0-1010 - 6.8.0-1010.11 linux-gcp-tools-6.8.0-1010 - 6.8.0-1010.11 linux-headers-6.8.0-1010-gcp - 6.8.0-1010.11 linux-headers-gcp - 6.8.0-1010.11 linux-image-6.8.0-1010-gcp - 6.8.0-1010.11 linux-image-gcp - 6.8.0-1010.11 linux-image-unsigned-6.8.0-1010-gcp - 6.8.0-1010.11 linux-modules-6.8.0-1010-gcp - 6.8.0-1010.11 linux-modules-extra-6.8.0-1010-gcp - 6.8.0-1010.11 linux-modules-extra-gcp - 6.8.0-1010.11 linux-modules-iwlwifi-6.8.0-1010-gcp - 6.8.0-1010.11 linux-modules-iwlwifi-gcp - 6.8.0-1010.11 linux-tools-6.8.0-1010-gcp - 6.8.0-1010.11 linux-tools-gcp - 6.8.0-1010.11 No subscription required linux-buildinfo-6.8.0-38-generic - 6.8.0-38.38 linux-buildinfo-6.8.0-38-generic-64k - 6.8.0-38.38 linux-cloud-tools-6.8.0-38 - 6.8.0-38.38 linux-cloud-tools-6.8.0-38-generic - 6.8.0-38.38 linux-cloud-tools-common - 6.8.0-38.38 linux-cloud-tools-generic - 6.8.0-38.38 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-38.38 linux-cloud-tools-generic-hwe-24.04-edge - 6.8.0-38.38 linux-cloud-tools-virtual - 6.8.0-38.38 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-38.38 linux-cloud-tools-virtual-hwe-24.04-edge - 6.8.0-38.38 linux-crashdump - 6.8.0-38.38 linux-doc - 6.8.0-38.38 linux-generic - 6.8.0-38.38 linux-generic-64k - 6.8.0-38.38 linux-generic-64k-hwe-24.04 - 6.8.0-38.38 linux-generic-64k-hwe-24.04-edge - 6.8.0-38.38 linux-generic-hwe-24.04 - 6.8.0-38.38 linux-generic-hwe-24.04-edge - 6.8.0-38.38 linux-generic-lpae - 6.8.0-38.38 linux-headers-6.8.0-38 - 6.8.0-38.38 linux-headers-6.8.0-38-generic - 6.8.0-38.38 linux-headers-6.8.0-38-generic-64k - 6.8.0-38.38 linux-headers-generic - 6.8.0-38.38 linux-headers-generic-64k - 6.8.0-38.38 linux-headers-generic-64k-hwe-24.04 - 6.8.0-38.38 linux-headers-generic-64k-hwe-24.04-edge - 6.8.0-38.38 linux-headers-generic-hwe-24.04 - 6.8.0-38.38 linux-headers-generic-hwe-24.04-edge - 6.8.0-38.38 linux-headers-generic-lpae - 6.8.0-38.38 linux-headers-kvm - 6.8.0-38.38 linux-headers-laptop-23.10 - 6.8.0-38.38 linux-headers-oem-20.04 - 6.8.0-38.38 linux-headers-oem-20.04b - 6.8.0-38.38 linux-headers-oem-20.04c - 6.8.0-38.38 linux-headers-oem-20.04d - 6.8.0-38.38 linux-headers-oem-22.04 - 6.8.0-38.38 linux-headers-virtual - 6.8.0-38.38 linux-headers-virtual-hwe-24.04 - 6.8.0-38.38 linux-headers-virtual-hwe-24.04-edge - 6.8.0-38.38 linux-image-6.8.0-38-generic - 6.8.0-38.38 linux-image-6.8.0-38-generic-64k - 6.8.0-38.38 linux-image-extra-virtual - 6.8.0-38.38 linux-image-extra-virtual-hwe-24.04 - 6.8.0-38.38 linux-image-extra-virtual-hwe-24.04-edge - 6.8.0-38.38 linux-image-generic - 6.8.0-38.38 linux-image-generic-64k - 6.8.0-38.38 linux-image-generic-64k-hwe-24.04 - 6.8.0-38.38 linux-image-generic-64k-hwe-24.04-edge - 6.8.0-38.38 linux-image-generic-hwe-24.04 - 6.8.0-38.38 linux-image-generic-hwe-24.04-edge - 6.8.0-38.38 linux-image-generic-lpae - 6.8.0-38.38 linux-image-kvm - 6.8.0-38.38 linux-image-laptop-23.10 - 6.8.0-38.38 linux-image-oem-20.04 - 6.8.0-38.38 linux-image-oem-20.04b - 6.8.0-38.38 linux-image-oem-20.04c - 6.8.0-38.38 linux-image-oem-20.04d - 6.8.0-38.38 linux-image-oem-22.04 - 6.8.0-38.38 linux-image-uc-6.8.0-38-generic - 6.8.0-38.38 linux-image-uc-6.8.0-38-generic-64k - 6.8.0-38.38 linux-image-uc-generic - 6.8.0-38.38 linux-image-uc-generic-hwe-24.04 - 6.8.0-38.38 linux-image-uc-generic-hwe-24.04-edge - 6.8.0-38.38 linux-image-unsigned-6.8.0-38-generic - 6.8.0-38.38 linux-image-unsigned-6.8.0-38-generic-64k - 6.8.0-38.38 linux-image-virtual - 6.8.0-38.38 linux-image-virtual-hwe-24.04 - 6.8.0-38.38 linux-image-virtual-hwe-24.04-edge - 6.8.0-38.38 linux-kvm - 6.8.0-38.38 linux-laptop-23.10 - 6.8.0-38.38 linux-lib-rust-6.8.0-38-generic - 6.8.0-38.38 linux-libc-dev - 6.8.0-38.38 linux-modules-6.8.0-38-generic - 6.8.0-38.38 linux-modules-6.8.0-38-generic-64k - 6.8.0-38.38 linux-modules-extra-6.8.0-38-generic - 6.8.0-38.38 linux-modules-ipu6-6.8.0-38-generic - 6.8.0-38.38 linux-modules-ipu6-generic - 6.8.0-38.38 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-38.38 linux-modules-ipu6-generic-hwe-24.04-edge - 6.8.0-38.38 linux-modules-iwlwifi-6.8.0-38-generic - 6.8.0-38.38 linux-modules-iwlwifi-generic - 6.8.0-38.38 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-38.38 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.8.0-38.38 linux-modules-iwlwifi-oem-20.04 - 6.8.0-38.38 linux-modules-iwlwifi-oem-20.04d - 6.8.0-38.38 linux-modules-iwlwifi-oem-22.04 - 6.8.0-38.38 linux-modules-usbio-6.8.0-38-generic - 6.8.0-38.38 linux-modules-usbio-generic - 6.8.0-38.38 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-38.38 linux-modules-usbio-generic-hwe-24.04-edge - 6.8.0-38.38 linux-oem-20.04 - 6.8.0-38.38 linux-oem-20.04b - 6.8.0-38.38 linux-oem-20.04c - 6.8.0-38.38 linux-oem-20.04d - 6.8.0-38.38 linux-oem-22.04 - 6.8.0-38.38 linux-source - 6.8.0-38.38 linux-source-6.8.0 - 6.8.0-38.38 linux-tools-6.8.0-38 - 6.8.0-38.38 linux-tools-6.8.0-38-generic - 6.8.0-38.38 linux-tools-6.8.0-38-generic-64k - 6.8.0-38.38 linux-tools-common - 6.8.0-38.38 linux-tools-generic - 6.8.0-38.38 linux-tools-generic-64k - 6.8.0-38.38 linux-tools-generic-64k-hwe-24.04 - 6.8.0-38.38 linux-tools-generic-64k-hwe-24.04-edge - 6.8.0-38.38 linux-tools-generic-hwe-24.04 - 6.8.0-38.38 linux-tools-generic-hwe-24.04-edge - 6.8.0-38.38 linux-tools-generic-lpae - 6.8.0-38.38 linux-tools-host - 6.8.0-38.38 linux-tools-kvm - 6.8.0-38.38 linux-tools-laptop-23.10 - 6.8.0-38.38 linux-tools-oem-20.04 - 6.8.0-38.38 linux-tools-oem-20.04b - 6.8.0-38.38 linux-tools-oem-20.04c - 6.8.0-38.38 linux-tools-oem-20.04d - 6.8.0-38.38 linux-tools-oem-22.04 - 6.8.0-38.38 linux-tools-virtual - 6.8.0-38.38 linux-tools-virtual-hwe-24.04 - 6.8.0-38.38 linux-tools-virtual-hwe-24.04-edge - 6.8.0-38.38 linux-virtual - 6.8.0-38.38 linux-virtual-hwe-24.04 - 6.8.0-38.38 linux-virtual-hwe-24.04-edge - 6.8.0-38.38 No subscription required linux-buildinfo-6.8.0-38-lowlatency - 6.8.0-38.38.1 linux-buildinfo-6.8.0-38-lowlatency-64k - 6.8.0-38.38.1 linux-cloud-tools-6.8.0-38-lowlatency - 6.8.0-38.38.1 linux-cloud-tools-lowlatency - 6.8.0-38.38.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-38.38.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-38.38.1 linux-cloud-tools-lowlatency-hwe-22.04 - 6.8.0-38.38.1 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.8.0-38.38.1 linux-headers-6.8.0-38-lowlatency - 6.8.0-38.38.1 linux-headers-6.8.0-38-lowlatency-64k - 6.8.0-38.38.1 linux-headers-lowlatency - 6.8.0-38.38.1 linux-headers-lowlatency-64k - 6.8.0-38.38.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-38.38.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-38.38.1 linux-headers-lowlatency-64k-hwe-22.04 - 6.8.0-38.38.1 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.8.0-38.38.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-38.38.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-38.38.1 linux-headers-lowlatency-hwe-22.04 - 6.8.0-38.38.1 linux-headers-lowlatency-hwe-22.04-edge - 6.8.0-38.38.1 linux-image-6.8.0-38-lowlatency - 6.8.0-38.38.1 linux-image-6.8.0-38-lowlatency-64k - 6.8.0-38.38.1 linux-image-lowlatency - 6.8.0-38.38.1 linux-image-lowlatency-64k - 6.8.0-38.38.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-38.38.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-38.38.1 linux-image-lowlatency-64k-hwe-22.04 - 6.8.0-38.38.1 linux-image-lowlatency-64k-hwe-22.04-edge - 6.8.0-38.38.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-38.38.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-38.38.1 linux-image-lowlatency-hwe-22.04 - 6.8.0-38.38.1 linux-image-lowlatency-hwe-22.04-edge - 6.8.0-38.38.1 linux-image-unsigned-6.8.0-38-lowlatency - 6.8.0-38.38.1 linux-image-unsigned-6.8.0-38-lowlatency-64k - 6.8.0-38.38.1 linux-lowlatency - 6.8.0-38.38.1 linux-lowlatency-64k - 6.8.0-38.38.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-38.38.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-38.38.1 linux-lowlatency-64k-hwe-22.04 - 6.8.0-38.38.1 linux-lowlatency-64k-hwe-22.04-edge - 6.8.0-38.38.1 linux-lowlatency-cloud-tools-6.8.0-38 - 6.8.0-38.38.1 linux-lowlatency-cloud-tools-common - 6.8.0-38.38.1 linux-lowlatency-headers-6.8.0-38 - 6.8.0-38.38.1 linux-lowlatency-hwe-20.04 - 6.8.0-38.38.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-38.38.1 linux-lowlatency-hwe-22.04 - 6.8.0-38.38.1 linux-lowlatency-hwe-22.04-edge - 6.8.0-38.38.1 linux-lowlatency-lib-rust-6.8.0-38-lowlatency - 6.8.0-38.38.1 linux-lowlatency-tools-6.8.0-38 - 6.8.0-38.38.1 linux-lowlatency-tools-common - 6.8.0-38.38.1 linux-lowlatency-tools-host - 6.8.0-38.38.1 linux-modules-6.8.0-38-lowlatency - 6.8.0-38.38.1 linux-modules-6.8.0-38-lowlatency-64k - 6.8.0-38.38.1 linux-modules-iwlwifi-6.8.0-38-lowlatency - 6.8.0-38.38.1 linux-modules-iwlwifi-lowlatency - 6.8.0-38.38.1 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.8.0-38.38.1 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.8.0-38.38.1 linux-tools-6.8.0-38-lowlatency - 6.8.0-38.38.1 linux-tools-6.8.0-38-lowlatency-64k - 6.8.0-38.38.1 linux-tools-lowlatency - 6.8.0-38.38.1 linux-tools-lowlatency-64k - 6.8.0-38.38.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-38.38.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-38.38.1 linux-tools-lowlatency-64k-hwe-22.04 - 6.8.0-38.38.1 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.8.0-38.38.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-38.38.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-38.38.1 linux-tools-lowlatency-hwe-22.04 - 6.8.0-38.38.1 linux-tools-lowlatency-hwe-22.04-edge - 6.8.0-38.38.1 No subscription required
High
CVE-2023-52699
CVE-2024-24857
CVE-2024-24858
CVE-2024-24859
CVE-2024-26811
CVE-2024-26817
CVE-2024-26921
CVE-2024-26922
CVE-2024-26923
CVE-2024-26925
CVE-2024-26926
CVE-2024-26928
CVE-2024-26936
CVE-2024-26980
CVE-2024-26981
CVE-2024-26982
CVE-2024-26983
CVE-2024-26984
CVE-2024-26985
CVE-2024-26986
CVE-2024-26987
CVE-2024-26988
CVE-2024-26989
CVE-2024-26990
CVE-2024-26991
CVE-2024-26992
CVE-2024-26993
CVE-2024-26994
CVE-2024-26995
CVE-2024-26996
CVE-2024-26997
CVE-2024-26998
CVE-2024-26999
CVE-2024-27000
CVE-2024-27001
CVE-2024-27002
CVE-2024-27003
CVE-2024-27004
CVE-2024-27005
CVE-2024-27006
CVE-2024-27007
CVE-2024-27008
CVE-2024-27009
CVE-2024-27010
CVE-2024-27011
CVE-2024-27012
CVE-2024-27013
CVE-2024-27014
CVE-2024-27015
CVE-2024-27016
CVE-2024-27017
CVE-2024-27018
CVE-2024-27019
CVE-2024-27020
CVE-2024-27021
CVE-2024-27022
CVE-2024-35860
CVE-2024-35861
CVE-2024-35862
CVE-2024-35863
CVE-2024-35864
CVE-2024-35865
CVE-2024-35866
CVE-2024-35867
CVE-2024-35868
CVE-2024-35869
CVE-2024-35870
CVE-2024-35871
CVE-2024-35872
CVE-2024-35873
CVE-2024-35875
CVE-2024-35877
CVE-2024-35878
CVE-2024-35879
CVE-2024-35880
CVE-2024-35882
CVE-2024-35883
CVE-2024-35884
CVE-2024-35885
CVE-2024-35886
CVE-2024-35887
CVE-2024-35888
CVE-2024-35889
CVE-2024-35890
CVE-2024-35891
CVE-2024-35892
CVE-2024-35893
CVE-2024-35894
CVE-2024-35895
CVE-2024-35896
CVE-2024-35897
CVE-2024-35898
CVE-2024-35899
CVE-2024-35900
CVE-2024-35901
CVE-2024-35902
CVE-2024-35903
CVE-2024-35904
CVE-2024-35905
CVE-2024-35907
CVE-2024-35908
CVE-2024-35909
CVE-2024-35910
CVE-2024-35911
CVE-2024-35912
CVE-2024-35913
CVE-2024-35914
CVE-2024-35915
CVE-2024-35916
CVE-2024-35917
CVE-2024-35919
CVE-2024-35920
CVE-2024-35921
CVE-2024-35922
CVE-2024-35924
CVE-2024-35925
CVE-2024-35926
CVE-2024-35927
CVE-2024-35929
CVE-2024-35930
CVE-2024-35931
CVE-2024-35932
CVE-2024-35933
CVE-2024-35934
CVE-2024-35935
CVE-2024-35936
CVE-2024-35937
CVE-2024-35938
CVE-2024-35939
CVE-2024-35940
CVE-2024-35942
CVE-2024-35943
CVE-2024-35944
CVE-2024-35945
CVE-2024-35946
CVE-2024-35950
CVE-2024-35951
CVE-2024-35952
CVE-2024-35953
CVE-2024-35954
CVE-2024-35955
CVE-2024-35956
CVE-2024-35957
CVE-2024-35958
CVE-2024-35959
CVE-2024-35960
CVE-2024-35961
CVE-2024-35963
CVE-2024-35964
CVE-2024-35965
CVE-2024-35966
CVE-2024-35967
CVE-2024-35968
CVE-2024-35969
CVE-2024-35970
CVE-2024-35971
CVE-2024-35972
CVE-2024-35973
CVE-2024-35974
CVE-2024-35975
CVE-2024-35976
CVE-2024-35977
CVE-2024-35978
CVE-2024-35979
CVE-2024-35980
CVE-2024-35981
CVE-2024-35982
CVE-2024-35985
CVE-2024-36018
CVE-2024-36019
CVE-2024-36020
CVE-2024-36021
CVE-2024-36022
CVE-2024-36023
CVE-2024-36024
CVE-2024-36025
CVE-2024-36026
CVE-2024-36027
USN-6893-2 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
It was discovered that a race condition existed in the Bluetooth subsystem in the Linux kernel when modifying certain settings values through debugfs. A privileged local attacker could use this to cause a denial of service. (CVE-2024-24857, CVE-2024-24858, CVE-2024-24859) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - RISC-V architecture; - S390 architecture; - x86 architecture; - Block layer subsystem; - Compute Acceleration Framework; - Accessibility subsystem; - Android drivers; - Drivers core; - Bluetooth drivers; - Clock framework and drivers; - Data acquisition framework and drivers; - Cryptographic API; - Buffer Sharing and Synchronization framework; - GPU drivers; - On-Chip Interconnect management framework; - IOMMU subsystem; - Multiple devices driver; - Media drivers; - VMware VMCI Driver; - Network drivers; - Microsoft Azure Network Adapter (MANA) driver; - Device tree and open firmware driver; - Chrome hardware platform drivers; - i.MX PM domains; - TI SCI PM domains driver; - S/390 drivers; - SCSI drivers; - SPI subsystem; - Thermal drivers; - TTY drivers; - USB subsystem; - Framebuffer layer; - BTRFS file system; - Network file system server daemon; - NILFS2 file system; - File systems infrastructure; - Pstore file system; - SMB network file system; - BPF subsystem; - Bluetooth subsystem; - Netfilter; - io_uring subsystem; - Core kernel; - Extra boot config (XBC); - Memory management; - Amateur Radio drivers; - B.A.T.M.A.N. meshing protocol; - Ethernet bridge; - Networking core; - IPv4 networking; - IPv6 networking; - Multipath TCP; - NFC subsystem; - RDS protocol; - Network traffic control; - SMC sockets; - Sun RPC protocol; - TLS protocol; - Unix domain sockets; - Wireless networking; - eXpress Data Path; - SELinux security module; (CVE-2024-35976, CVE-2024-35873, CVE-2024-35959, CVE-2024-27012, CVE-2024-36025, CVE-2024-35868, CVE-2024-26995, CVE-2024-35916, CVE-2024-36023, CVE-2024-35964, CVE-2024-35890, CVE-2024-26980, CVE-2024-35950, CVE-2024-27006, CVE-2024-35955, CVE-2024-35885, CVE-2024-35960, CVE-2024-35932, CVE-2024-26986, CVE-2024-35884, CVE-2024-35860, CVE-2024-36020, CVE-2024-35930, CVE-2024-35919, CVE-2024-27020, CVE-2024-26928, CVE-2024-35903, CVE-2024-35907, CVE-2024-35904, CVE-2024-35972, CVE-2024-35892, CVE-2024-26921, CVE-2024-35869, CVE-2024-35957, CVE-2024-35967, CVE-2024-35927, CVE-2024-35946, CVE-2024-27000, CVE-2024-35943, CVE-2024-35902, CVE-2024-27013, CVE-2024-35968, CVE-2024-35970, CVE-2024-35865, CVE-2024-36022, CVE-2024-26993, CVE-2024-36027, CVE-2024-35895, CVE-2024-35908, CVE-2024-35901, CVE-2024-35872, CVE-2024-26925, CVE-2024-35917, CVE-2024-35898, CVE-2024-35861, CVE-2024-35900, CVE-2024-26984, CVE-2024-35891, CVE-2023-52699, CVE-2024-35961, CVE-2024-35951, CVE-2024-36019, CVE-2024-27021, CVE-2024-35939, CVE-2024-26997, CVE-2024-26999, CVE-2024-35897, CVE-2024-35896, CVE-2024-26817, CVE-2024-35875, CVE-2024-35935, CVE-2024-27015, CVE-2024-26982, CVE-2024-35958, CVE-2024-26989, CVE-2024-26922, CVE-2024-26811, CVE-2024-27003, CVE-2024-35920, CVE-2024-27007, CVE-2024-35879, CVE-2024-35979, CVE-2024-35978, CVE-2024-35914, CVE-2024-35938, CVE-2024-35913, CVE-2024-26985, CVE-2024-35915, CVE-2024-35974, CVE-2024-27001, CVE-2024-35940, CVE-2024-35867, CVE-2024-26994, CVE-2024-35886, CVE-2024-35899, CVE-2024-27022, CVE-2024-35910, CVE-2024-35893, CVE-2024-27010, CVE-2024-36024, CVE-2024-26926, CVE-2024-26923, CVE-2024-26990, CVE-2024-35912, CVE-2024-26987, CVE-2024-35966, CVE-2024-35977, CVE-2024-35866, CVE-2024-35975, CVE-2024-35965, CVE-2024-35933, CVE-2024-26936, CVE-2024-35889, CVE-2024-35863, CVE-2024-27002, CVE-2024-27018, CVE-2024-36021, CVE-2024-27019, CVE-2024-35921, CVE-2024-35870, CVE-2024-35956, CVE-2024-27016, CVE-2024-26996, CVE-2024-35878, CVE-2024-26988, CVE-2024-35888, CVE-2024-35936, CVE-2024-27014, CVE-2024-35883, CVE-2024-35862, CVE-2024-35945, CVE-2024-26983, CVE-2024-35982, CVE-2024-35924, CVE-2024-27004, CVE-2024-27008, CVE-2024-35963, CVE-2024-35909, CVE-2024-35911, CVE-2024-35973, CVE-2024-35887, CVE-2024-27009, CVE-2024-35980, CVE-2024-36026, CVE-2024-35969, CVE-2024-35954, CVE-2024-35864, CVE-2024-35953, CVE-2024-26998, CVE-2024-35931, CVE-2024-26981, CVE-2024-35971, CVE-2024-35934, CVE-2024-35929, CVE-2024-35918, CVE-2024-35937, CVE-2024-36018, CVE-2024-35877, CVE-2024-35925, CVE-2024-35981, CVE-2024-35985, CVE-2024-35942, CVE-2024-35922, CVE-2024-35952, CVE-2024-27011, CVE-2024-35944, CVE-2024-35905, CVE-2024-35880, CVE-2024-35882, CVE-2024-27005, CVE-2024-26991, CVE-2024-35871, CVE-2024-35926, CVE-2024-26992, CVE-2024-35894, CVE-2024-27017) Update Instructions: Run `sudo pro fix USN-6893-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1006-gke - 6.8.0-1006.9 linux-gke - 6.8.0-1006.9 linux-gke-headers-6.8.0-1006 - 6.8.0-1006.9 linux-gke-tools-6.8.0-1006 - 6.8.0-1006.9 linux-headers-6.8.0-1006-gke - 6.8.0-1006.9 linux-headers-gke - 6.8.0-1006.9 linux-image-6.8.0-1006-gke - 6.8.0-1006.9 linux-image-gke - 6.8.0-1006.9 linux-image-unsigned-6.8.0-1006-gke - 6.8.0-1006.9 linux-modules-6.8.0-1006-gke - 6.8.0-1006.9 linux-modules-extra-6.8.0-1006-gke - 6.8.0-1006.9 linux-modules-iwlwifi-6.8.0-1006-gke - 6.8.0-1006.9 linux-modules-iwlwifi-gke - 6.8.0-1006.9 linux-tools-6.8.0-1006-gke - 6.8.0-1006.9 linux-tools-gke - 6.8.0-1006.9 No subscription required linux-buildinfo-6.8.0-1009-nvidia - 6.8.0-1009.9 linux-buildinfo-6.8.0-1009-nvidia-64k - 6.8.0-1009.9 linux-cloud-tools-nvidia - 6.8.0-1009.9 linux-headers-6.8.0-1009-nvidia - 6.8.0-1009.9 linux-headers-6.8.0-1009-nvidia-64k - 6.8.0-1009.9 linux-headers-nvidia - 6.8.0-1009.9 linux-headers-nvidia-64k - 6.8.0-1009.9 linux-image-6.8.0-1009-nvidia - 6.8.0-1009.9 linux-image-6.8.0-1009-nvidia-64k - 6.8.0-1009.9 linux-image-nvidia - 6.8.0-1009.9 linux-image-nvidia-64k - 6.8.0-1009.9 linux-image-uc-6.8.0-1009-nvidia - 6.8.0-1009.9 linux-image-uc-6.8.0-1009-nvidia-64k - 6.8.0-1009.9 linux-image-unsigned-6.8.0-1009-nvidia - 6.8.0-1009.9 linux-image-unsigned-6.8.0-1009-nvidia-64k - 6.8.0-1009.9 linux-modules-6.8.0-1009-nvidia - 6.8.0-1009.9 linux-modules-6.8.0-1009-nvidia-64k - 6.8.0-1009.9 linux-modules-extra-6.8.0-1009-nvidia - 6.8.0-1009.9 linux-modules-nvidia-fs-6.8.0-1009-nvidia - 6.8.0-1009.9 linux-modules-nvidia-fs-6.8.0-1009-nvidia-64k - 6.8.0-1009.9 linux-modules-nvidia-fs-nvidia - 6.8.0-1009.9 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1009.9 linux-nvidia - 6.8.0-1009.9 linux-nvidia-64k - 6.8.0-1009.9 linux-nvidia-headers-6.8.0-1009 - 6.8.0-1009.9 linux-nvidia-tools-6.8.0-1009 - 6.8.0-1009.9 linux-nvidia-tools-host - 6.8.0-1009.9 linux-tools-6.8.0-1009-nvidia - 6.8.0-1009.9 linux-tools-6.8.0-1009-nvidia-64k - 6.8.0-1009.9 linux-tools-nvidia - 6.8.0-1009.9 linux-tools-nvidia-64k - 6.8.0-1009.9 No subscription required
High
CVE-2023-52699
CVE-2024-24857
CVE-2024-24858
CVE-2024-24859
CVE-2024-26811
CVE-2024-26817
CVE-2024-26921
CVE-2024-26922
CVE-2024-26923
CVE-2024-26925
CVE-2024-26926
CVE-2024-26928
CVE-2024-26936
CVE-2024-26980
CVE-2024-26981
CVE-2024-26982
CVE-2024-26983
CVE-2024-26984
CVE-2024-26985
CVE-2024-26986
CVE-2024-26987
CVE-2024-26988
CVE-2024-26989
CVE-2024-26990
CVE-2024-26991
CVE-2024-26992
CVE-2024-26993
CVE-2024-26994
CVE-2024-26995
CVE-2024-26996
CVE-2024-26997
CVE-2024-26998
CVE-2024-26999
CVE-2024-27000
CVE-2024-27001
CVE-2024-27002
CVE-2024-27003
CVE-2024-27004
CVE-2024-27005
CVE-2024-27006
CVE-2024-27007
CVE-2024-27008
CVE-2024-27009
CVE-2024-27010
CVE-2024-27011
CVE-2024-27012
CVE-2024-27013
CVE-2024-27014
CVE-2024-27015
CVE-2024-27016
CVE-2024-27017
CVE-2024-27018
CVE-2024-27019
CVE-2024-27020
CVE-2024-27021
CVE-2024-27022
CVE-2024-35860
CVE-2024-35861
CVE-2024-35862
CVE-2024-35863
CVE-2024-35864
CVE-2024-35865
CVE-2024-35866
CVE-2024-35867
CVE-2024-35868
CVE-2024-35869
CVE-2024-35870
CVE-2024-35871
CVE-2024-35872
CVE-2024-35873
CVE-2024-35875
CVE-2024-35877
CVE-2024-35878
CVE-2024-35879
CVE-2024-35880
CVE-2024-35882
CVE-2024-35883
CVE-2024-35884
CVE-2024-35885
CVE-2024-35886
CVE-2024-35887
CVE-2024-35888
CVE-2024-35889
CVE-2024-35890
CVE-2024-35891
CVE-2024-35892
CVE-2024-35893
CVE-2024-35894
CVE-2024-35895
CVE-2024-35896
CVE-2024-35897
CVE-2024-35898
CVE-2024-35899
CVE-2024-35900
CVE-2024-35901
CVE-2024-35902
CVE-2024-35903
CVE-2024-35904
CVE-2024-35905
CVE-2024-35907
CVE-2024-35908
CVE-2024-35909
CVE-2024-35910
CVE-2024-35911
CVE-2024-35912
CVE-2024-35913
CVE-2024-35914
CVE-2024-35915
CVE-2024-35916
CVE-2024-35917
CVE-2024-35919
CVE-2024-35920
CVE-2024-35921
CVE-2024-35922
CVE-2024-35924
CVE-2024-35925
CVE-2024-35926
CVE-2024-35927
CVE-2024-35929
CVE-2024-35930
CVE-2024-35931
CVE-2024-35932
CVE-2024-35933
CVE-2024-35934
CVE-2024-35935
CVE-2024-35936
CVE-2024-35937
CVE-2024-35938
CVE-2024-35939
CVE-2024-35940
CVE-2024-35942
CVE-2024-35943
CVE-2024-35944
CVE-2024-35945
CVE-2024-35946
CVE-2024-35950
CVE-2024-35951
CVE-2024-35952
CVE-2024-35953
CVE-2024-35954
CVE-2024-35955
CVE-2024-35956
CVE-2024-35957
CVE-2024-35958
CVE-2024-35959
CVE-2024-35960
CVE-2024-35961
CVE-2024-35963
CVE-2024-35964
CVE-2024-35965
CVE-2024-35966
CVE-2024-35967
CVE-2024-35968
CVE-2024-35969
CVE-2024-35970
CVE-2024-35971
CVE-2024-35972
CVE-2024-35973
CVE-2024-35974
CVE-2024-35975
CVE-2024-35976
CVE-2024-35977
CVE-2024-35978
CVE-2024-35979
CVE-2024-35980
CVE-2024-35981
CVE-2024-35982
CVE-2024-35985
CVE-2024-36018
CVE-2024-36019
CVE-2024-36020
CVE-2024-36021
CVE-2024-36022
CVE-2024-36023
CVE-2024-36024
CVE-2024-36025
CVE-2024-36026
CVE-2024-36027
USN-6893-3 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
It was discovered that a race condition existed in the Bluetooth subsystem in the Linux kernel when modifying certain settings values through debugfs. A privileged local attacker could use this to cause a denial of service. (CVE-2024-24857, CVE-2024-24858, CVE-2024-24859) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - RISC-V architecture; - S390 architecture; - x86 architecture; - Block layer subsystem; - Compute Acceleration Framework; - Accessibility subsystem; - Android drivers; - Drivers core; - Bluetooth drivers; - Clock framework and drivers; - Data acquisition framework and drivers; - Cryptographic API; - Buffer Sharing and Synchronization framework; - GPU drivers; - On-Chip Interconnect management framework; - IOMMU subsystem; - Multiple devices driver; - Media drivers; - VMware VMCI Driver; - Network drivers; - Microsoft Azure Network Adapter (MANA) driver; - Device tree and open firmware driver; - Chrome hardware platform drivers; - i.MX PM domains; - TI SCI PM domains driver; - S/390 drivers; - SCSI drivers; - SPI subsystem; - Thermal drivers; - TTY drivers; - USB subsystem; - Framebuffer layer; - BTRFS file system; - Network file system server daemon; - NILFS2 file system; - File systems infrastructure; - Pstore file system; - SMB network file system; - BPF subsystem; - Bluetooth subsystem; - Netfilter; - io_uring subsystem; - Core kernel; - Extra boot config (XBC); - Memory management; - Amateur Radio drivers; - B.A.T.M.A.N. meshing protocol; - Ethernet bridge; - Networking core; - IPv4 networking; - IPv6 networking; - Multipath TCP; - NFC subsystem; - RDS protocol; - Network traffic control; - SMC sockets; - Sun RPC protocol; - TLS protocol; - Unix domain sockets; - Wireless networking; - eXpress Data Path; - SELinux security module; (CVE-2024-35955, CVE-2024-35921, CVE-2024-35946, CVE-2024-35934, CVE-2024-26993, CVE-2024-35899, CVE-2024-35952, CVE-2024-35894, CVE-2024-35886, CVE-2024-35872, CVE-2024-35970, CVE-2024-35936, CVE-2024-35907, CVE-2024-27013, CVE-2024-35910, CVE-2024-27009, CVE-2024-35875, CVE-2024-36021, CVE-2024-26923, CVE-2024-26997, CVE-2024-35978, CVE-2024-35981, CVE-2024-27015, CVE-2024-26928, CVE-2024-35963, CVE-2024-35897, CVE-2024-27020, CVE-2024-35922, CVE-2024-27001, CVE-2024-27011, CVE-2024-35940, CVE-2024-35871, CVE-2024-35900, CVE-2024-35869, CVE-2024-35905, CVE-2024-35974, CVE-2024-35873, CVE-2024-35882, CVE-2024-35914, CVE-2024-35956, CVE-2024-35887, CVE-2024-35920, CVE-2024-27018, CVE-2024-35880, CVE-2024-35943, CVE-2024-35912, CVE-2024-35979, CVE-2024-35862, CVE-2024-36019, CVE-2024-35950, CVE-2024-35977, CVE-2024-35918, CVE-2024-26992, CVE-2024-35884, CVE-2024-35916, CVE-2024-26817, CVE-2024-35959, CVE-2024-35909, CVE-2024-35933, CVE-2024-35982, CVE-2024-26996, CVE-2024-35980, CVE-2024-36018, CVE-2024-26925, CVE-2024-35929, CVE-2024-35971, CVE-2024-26990, CVE-2024-35885, CVE-2024-36025, CVE-2024-26998, CVE-2024-35930, CVE-2024-26982, CVE-2024-36022, CVE-2024-35895, CVE-2024-35902, CVE-2024-35911, CVE-2024-27002, CVE-2024-35968, CVE-2024-35861, CVE-2024-35903, CVE-2024-36026, CVE-2024-35896, CVE-2024-35945, CVE-2024-26936, CVE-2024-35954, CVE-2024-26985, CVE-2024-35908, CVE-2024-35924, CVE-2024-35938, CVE-2024-26991, CVE-2024-27017, CVE-2024-26922, CVE-2024-35919, CVE-2024-35915, CVE-2024-35985, CVE-2024-26995, CVE-2024-35870, CVE-2024-27010, CVE-2024-35904, CVE-2024-26999, CVE-2024-26983, CVE-2024-35939, CVE-2024-35865, CVE-2024-35860, CVE-2024-35944, CVE-2024-27021, CVE-2024-27016, CVE-2024-27004, CVE-2024-27019, CVE-2024-36027, CVE-2024-35890, CVE-2024-35975, CVE-2024-35901, CVE-2024-35967, CVE-2024-26986, CVE-2024-35957, CVE-2024-35937, CVE-2024-26988, CVE-2024-35972, CVE-2024-35926, CVE-2024-26926, CVE-2024-35964, CVE-2024-26994, CVE-2024-35889, CVE-2024-26981, CVE-2024-36024, CVE-2024-27022, CVE-2024-35935, CVE-2024-26811, CVE-2024-35932, CVE-2024-35866, CVE-2024-27008, CVE-2024-27012, CVE-2024-36023, CVE-2024-35931, CVE-2024-35888, CVE-2024-26989, CVE-2024-35868, CVE-2024-35976, CVE-2024-35953, CVE-2024-36020, CVE-2024-35893, CVE-2024-35961, CVE-2024-35965, CVE-2024-35892, CVE-2024-35942, CVE-2024-35958, CVE-2024-27014, CVE-2024-35867, CVE-2024-27003, CVE-2024-27007, CVE-2024-35951, CVE-2024-35973, CVE-2024-35863, CVE-2024-26984, CVE-2024-35898, CVE-2024-35960, CVE-2024-27005, CVE-2024-35917, CVE-2024-35927, CVE-2024-26980, CVE-2024-35877, CVE-2024-35925, CVE-2024-26921, CVE-2024-35913, CVE-2023-52699, CVE-2024-26987, CVE-2024-27006, CVE-2024-35878, CVE-2024-35864, CVE-2024-35969, CVE-2024-35883, CVE-2024-35891, CVE-2024-35879, CVE-2024-27000, CVE-2024-35966) Update Instructions: Run `sudo pro fix USN-6893-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-aws - 6.8.0-1011.12 linux-aws-cloud-tools-6.8.0-1011 - 6.8.0-1011.12 linux-aws-headers-6.8.0-1011 - 6.8.0-1011.12 linux-aws-tools-6.8.0-1011 - 6.8.0-1011.12 linux-buildinfo-6.8.0-1011-aws - 6.8.0-1011.12 linux-cloud-tools-6.8.0-1011-aws - 6.8.0-1011.12 linux-headers-6.8.0-1011-aws - 6.8.0-1011.12 linux-headers-aws - 6.8.0-1011.12 linux-image-6.8.0-1011-aws - 6.8.0-1011.12 linux-image-aws - 6.8.0-1011.12 linux-image-unsigned-6.8.0-1011-aws - 6.8.0-1011.12 linux-modules-6.8.0-1011-aws - 6.8.0-1011.12 linux-modules-extra-6.8.0-1011-aws - 6.8.0-1011.12 linux-modules-extra-aws - 6.8.0-1011.12 linux-tools-6.8.0-1011-aws - 6.8.0-1011.12 linux-tools-aws - 6.8.0-1011.12 No subscription required
High
CVE-2023-52699
CVE-2024-24857
CVE-2024-24858
CVE-2024-24859
CVE-2024-26811
CVE-2024-26817
CVE-2024-26921
CVE-2024-26922
CVE-2024-26923
CVE-2024-26925
CVE-2024-26926
CVE-2024-26928
CVE-2024-26936
CVE-2024-26980
CVE-2024-26981
CVE-2024-26982
CVE-2024-26983
CVE-2024-26984
CVE-2024-26985
CVE-2024-26986
CVE-2024-26987
CVE-2024-26988
CVE-2024-26989
CVE-2024-26990
CVE-2024-26991
CVE-2024-26992
CVE-2024-26993
CVE-2024-26994
CVE-2024-26995
CVE-2024-26996
CVE-2024-26997
CVE-2024-26998
CVE-2024-26999
CVE-2024-27000
CVE-2024-27001
CVE-2024-27002
CVE-2024-27003
CVE-2024-27004
CVE-2024-27005
CVE-2024-27006
CVE-2024-27007
CVE-2024-27008
CVE-2024-27009
CVE-2024-27010
CVE-2024-27011
CVE-2024-27012
CVE-2024-27013
CVE-2024-27014
CVE-2024-27015
CVE-2024-27016
CVE-2024-27017
CVE-2024-27018
CVE-2024-27019
CVE-2024-27020
CVE-2024-27021
CVE-2024-27022
CVE-2024-35860
CVE-2024-35861
CVE-2024-35862
CVE-2024-35863
CVE-2024-35864
CVE-2024-35865
CVE-2024-35866
CVE-2024-35867
CVE-2024-35868
CVE-2024-35869
CVE-2024-35870
CVE-2024-35871
CVE-2024-35872
CVE-2024-35873
CVE-2024-35875
CVE-2024-35877
CVE-2024-35878
CVE-2024-35879
CVE-2024-35880
CVE-2024-35882
CVE-2024-35883
CVE-2024-35884
CVE-2024-35885
CVE-2024-35886
CVE-2024-35887
CVE-2024-35888
CVE-2024-35889
CVE-2024-35890
CVE-2024-35891
CVE-2024-35892
CVE-2024-35893
CVE-2024-35894
CVE-2024-35895
CVE-2024-35896
CVE-2024-35897
CVE-2024-35898
CVE-2024-35899
CVE-2024-35900
CVE-2024-35901
CVE-2024-35902
CVE-2024-35903
CVE-2024-35904
CVE-2024-35905
CVE-2024-35907
CVE-2024-35908
CVE-2024-35909
CVE-2024-35910
CVE-2024-35911
CVE-2024-35912
CVE-2024-35913
CVE-2024-35914
CVE-2024-35915
CVE-2024-35916
CVE-2024-35917
CVE-2024-35919
CVE-2024-35920
CVE-2024-35921
CVE-2024-35922
CVE-2024-35924
CVE-2024-35925
CVE-2024-35926
CVE-2024-35927
CVE-2024-35929
CVE-2024-35930
CVE-2024-35931
CVE-2024-35932
CVE-2024-35933
CVE-2024-35934
CVE-2024-35935
CVE-2024-35936
CVE-2024-35937
CVE-2024-35938
CVE-2024-35939
CVE-2024-35940
CVE-2024-35942
CVE-2024-35943
CVE-2024-35944
CVE-2024-35945
CVE-2024-35946
CVE-2024-35950
CVE-2024-35951
CVE-2024-35952
CVE-2024-35953
CVE-2024-35954
CVE-2024-35955
CVE-2024-35956
CVE-2024-35957
CVE-2024-35958
CVE-2024-35959
CVE-2024-35960
CVE-2024-35961
CVE-2024-35963
CVE-2024-35964
CVE-2024-35965
CVE-2024-35966
CVE-2024-35967
CVE-2024-35968
CVE-2024-35969
CVE-2024-35970
CVE-2024-35971
CVE-2024-35972
CVE-2024-35973
CVE-2024-35974
CVE-2024-35975
CVE-2024-35976
CVE-2024-35977
CVE-2024-35978
CVE-2024-35979
CVE-2024-35980
CVE-2024-35981
CVE-2024-35982
CVE-2024-35985
CVE-2024-36018
CVE-2024-36019
CVE-2024-36020
CVE-2024-36021
CVE-2024-36022
CVE-2024-36023
CVE-2024-36024
CVE-2024-36025
CVE-2024-36026
CVE-2024-36027
USN-6897-1 -- Ghostscript vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Ghostscript incorrectly handled certain long PDF filter names. An attacker could possibly use this issue to cause Ghostscript to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-29506) It was discovered that Ghostscript incorrectly handled certain API parameters. An attacker could possibly use this issue to cause Ghostscript to crash, resulting in a denial of service. This issue only affected Ubuntu 24.04 LTS. (CVE-2024-29507) It was discovered that Ghostscript incorrectly handled certain BaseFont names. An attacker could use this issue to cause Ghostscript to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2024-29508) It was discovered that Ghostscript incorrectly handled certain PDF passwords that contained NULL bytes. An attacker could use this issue to cause Ghostscript to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-29509) It was discovered that Ghostscript incorrectly handled certain certain file paths when doing OCR. An attacker could use this issue to read arbitrary files and write error messages to arbitrary files. This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-29511) Update Instructions: Run `sudo pro fix USN-6897-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ghostscript - 10.02.1~dfsg1-0ubuntu7.3 ghostscript-doc - 10.02.1~dfsg1-0ubuntu7.3 libgs-common - 10.02.1~dfsg1-0ubuntu7.3 libgs-dev - 10.02.1~dfsg1-0ubuntu7.3 libgs10 - 10.02.1~dfsg1-0ubuntu7.3 libgs10-common - 10.02.1~dfsg1-0ubuntu7.3 No subscription required
Medium
CVE-2024-29506
CVE-2024-29507
CVE-2024-29508
CVE-2024-29509
CVE-2024-29511
USN-6899-1 -- GTK vulnerability
Ubuntu 24.04 LTS
It was discovered that GTK would attempt to load modules from the current directory, contrary to expectations. If users started GTK applications from shared directories, a local attacker could use this issue to execute arbitrary code, and possibly escalate privileges. Update Instructions: Run `sudo pro fix USN-6899-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-gtk-2.0 - 2.24.33-4ubuntu1.1 gtk2-engines-pixbuf - 2.24.33-4ubuntu1.1 libgail-common - 2.24.33-4ubuntu1.1 libgail-dev - 2.24.33-4ubuntu1.1 libgail-doc - 2.24.33-4ubuntu1.1 libgail18t64 - 2.24.33-4ubuntu1.1 libgtk2.0-0t64 - 2.24.33-4ubuntu1.1 libgtk2.0-bin - 2.24.33-4ubuntu1.1 libgtk2.0-common - 2.24.33-4ubuntu1.1 libgtk2.0-dev - 2.24.33-4ubuntu1.1 libgtk2.0-doc - 2.24.33-4ubuntu1.1 No subscription required gir1.2-gtk-3.0 - 3.24.41-4ubuntu1.1 gtk-3-examples - 3.24.41-4ubuntu1.1 gtk-update-icon-cache - 3.24.41-4ubuntu1.1 libgail-3-0t64 - 3.24.41-4ubuntu1.1 libgail-3-dev - 3.24.41-4ubuntu1.1 libgail-3-doc - 3.24.41-4ubuntu1.1 libgtk-3-0t64 - 3.24.41-4ubuntu1.1 libgtk-3-bin - 3.24.41-4ubuntu1.1 libgtk-3-common - 3.24.41-4ubuntu1.1 libgtk-3-dev - 3.24.41-4ubuntu1.1 libgtk-3-doc - 3.24.41-4ubuntu1.1 No subscription required
Medium
CVE-2024-6655
USN-6902-1 -- Apache HTTP Server vulnerability
Ubuntu 24.04 LTS
It was discovered that the Apache HTTP Server incorrectly handled certain handlers configured via AddType. A remote attacker could possibly use this issue to obtain source code. Update Instructions: Run `sudo pro fix USN-6902-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: apache2 - 2.4.58-1ubuntu8.4 apache2-bin - 2.4.58-1ubuntu8.4 apache2-data - 2.4.58-1ubuntu8.4 apache2-dev - 2.4.58-1ubuntu8.4 apache2-doc - 2.4.58-1ubuntu8.4 apache2-ssl-dev - 2.4.58-1ubuntu8.4 apache2-suexec-custom - 2.4.58-1ubuntu8.4 apache2-suexec-pristine - 2.4.58-1ubuntu8.4 apache2-utils - 2.4.58-1ubuntu8.4 libapache2-mod-md - 2.4.58-1ubuntu8.4 libapache2-mod-proxy-uwsgi - 2.4.58-1ubuntu8.4 No subscription required
Medium
CVE-2024-40725
USN-6904-1 -- PyMongo vulnerability
Ubuntu 24.04 LTS
It was discovered that PyMongo incorrectly handled certain BSON. An attacker could possibly use this issue to read sensitive information or cause a crash. Update Instructions: Run `sudo pro fix USN-6904-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-pymongo-doc - 3.11.0-1ubuntu0.24.04.1 python3-bson - 3.11.0-1ubuntu0.24.04.1 python3-bson-ext - 3.11.0-1ubuntu0.24.04.1 python3-gridfs - 3.11.0-1ubuntu0.24.04.1 python3-pymongo - 3.11.0-1ubuntu0.24.04.1 python3-pymongo-ext - 3.11.0-1ubuntu0.24.04.1 No subscription required
Medium
CVE-2024-5629
USN-6906-1 -- python-zipp vulnerability
Ubuntu 24.04 LTS
It was discovered that python-zipp did not properly handle the zip files with malformed names. An attacker could possibly use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-6906-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-zipp - 1.0.0-6ubuntu0.1 No subscription required
Medium
CVE-2024-5569
USN-6907-1 -- Squid vulnerability
Ubuntu 24.04 LTS
Joshua Rogers discovered that Squid did not properly handle multi-byte characters during Edge Side Includes (ESI) processing. A remote attacker could possibly use this issue to cause a memory corruption error, leading to a denial of service. Update Instructions: Run `sudo pro fix USN-6907-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: squid - 6.6-1ubuntu5.1 squid-cgi - 6.6-1ubuntu5.1 squid-common - 6.6-1ubuntu5.1 squid-openssl - 6.6-1ubuntu5.1 squid-purge - 6.6-1ubuntu5.1 squidclient - 6.6-1ubuntu5.1 No subscription required
Medium
CVE-2024-37894
USN-6909-1 -- Bind vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Bind incorrectly handled a flood of DNS messages over TCP. A remote attacker could possibly use this issue to cause Bind to become unstable, resulting in a denial of service. (CVE-2024-0760) Toshifumi Sakaguchi discovered that Bind incorrectly handled having a very large number of RRs existing at the same time. A remote attacker could possibly use this issue to cause Bind to consume resources, leading to a denial of service. (CVE-2024-1737) It was discovered that Bind incorrectly handled a large number of SIG(0) signed requests. A remote attacker could possibly use this issue to cause Bind to consume resources, leading to a denial of service. (CVE-2024-1975) Daniel Stränger discovered that Bind incorrectly handled serving both stable cache data and authoritative zone content. A remote attacker could possibly use this issue to cause Bind to crash, resulting in a denial of service. (CVE-2024-4076) On Ubuntu 20.04 LTS, Bind has been updated from 9.16 to 9.18. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information: https://kb.isc.org/docs/changes-to-be-aware-of-when-moving-from-bind-916-to-918 Update Instructions: Run `sudo pro fix USN-6909-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: bind9 - 1:9.18.28-0ubuntu0.24.04.1 bind9-dev - 1:9.18.28-0ubuntu0.24.04.1 bind9-dnsutils - 1:9.18.28-0ubuntu0.24.04.1 bind9-doc - 1:9.18.28-0ubuntu0.24.04.1 bind9-host - 1:9.18.28-0ubuntu0.24.04.1 bind9-libs - 1:9.18.28-0ubuntu0.24.04.1 bind9-utils - 1:9.18.28-0ubuntu0.24.04.1 bind9utils - 1:9.18.28-0ubuntu0.24.04.1 dnsutils - 1:9.18.28-0ubuntu0.24.04.1 No subscription required
Medium
CVE-2024-0760
CVE-2024-1737
CVE-2024-1975
CVE-2024-4076
USN-6911-1 -- Nova vulnerability
Ubuntu 24.04 LTS
Arnaud Morin discovered that Nova incorrectly handled certain raw format images. An authenticated user could use this issue to access arbitrary files on the server, possibly exposing sensitive information. Update Instructions: Run `sudo pro fix USN-6911-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: nova-ajax-console-proxy - 3:29.0.1-0ubuntu1.4 nova-api - 3:29.0.1-0ubuntu1.4 nova-api-metadata - 3:29.0.1-0ubuntu1.4 nova-api-os-compute - 3:29.0.1-0ubuntu1.4 nova-api-os-volume - 3:29.0.1-0ubuntu1.4 nova-cells - 3:29.0.1-0ubuntu1.4 nova-common - 3:29.0.1-0ubuntu1.4 nova-compute - 3:29.0.1-0ubuntu1.4 nova-compute-ironic - 3:29.0.1-0ubuntu1.4 nova-compute-kvm - 3:29.0.1-0ubuntu1.4 nova-compute-libvirt - 3:29.0.1-0ubuntu1.4 nova-compute-lxc - 3:29.0.1-0ubuntu1.4 nova-compute-qemu - 3:29.0.1-0ubuntu1.4 nova-compute-vmware - 3:29.0.1-0ubuntu1.4 nova-compute-xen - 3:29.0.1-0ubuntu1.4 nova-conductor - 3:29.0.1-0ubuntu1.4 nova-doc - 3:29.0.1-0ubuntu1.4 nova-novncproxy - 3:29.0.1-0ubuntu1.4 nova-scheduler - 3:29.0.1-0ubuntu1.4 nova-serialproxy - 3:29.0.1-0ubuntu1.4 nova-spiceproxy - 3:29.0.1-0ubuntu1.4 nova-volume - 3:29.0.1-0ubuntu1.4 python3-nova - 3:29.0.1-0ubuntu1.4 No subscription required
Medium
CVE-2024-40767
USN-6912-1 -- provd vulnerability
Ubuntu 24.04 LTS
James Henstridge discovered that provd incorrectly handled environment variables. A local attacker could possibly use this issue to run arbitrary programs and escalate privileges. Update Instructions: Run `sudo pro fix USN-6912-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: provd - 0.1.2+24.04 No subscription required
Medium
CVE-2024-6714
https://bugs.launchpad.net/ubuntu/+source/provd/+bug/2071574
USN-6915-1 -- poppler vulnerability
Ubuntu 24.04 LTS
It was discovered that poppler incorrectly handled certain malformed PDF. An attacker could possibly use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-6915-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-poppler-0.18 - 24.02.0-1ubuntu9.1 libpoppler-cpp-dev - 24.02.0-1ubuntu9.1 libpoppler-cpp0t64 - 24.02.0-1ubuntu9.1 libpoppler-dev - 24.02.0-1ubuntu9.1 libpoppler-glib-dev - 24.02.0-1ubuntu9.1 libpoppler-glib-doc - 24.02.0-1ubuntu9.1 libpoppler-glib8t64 - 24.02.0-1ubuntu9.1 libpoppler-private-dev - 24.02.0-1ubuntu9.1 libpoppler-qt5-1t64 - 24.02.0-1ubuntu9.1 libpoppler-qt5-dev - 24.02.0-1ubuntu9.1 libpoppler-qt6-3t64 - 24.02.0-1ubuntu9.1 libpoppler-qt6-dev - 24.02.0-1ubuntu9.1 libpoppler134 - 24.02.0-1ubuntu9.1 poppler-utils - 24.02.0-1ubuntu9.1 No subscription required
Low
CVE-2024-6239
USN-6918-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
It was discovered that a race condition existed in the Bluetooth subsystem in the Linux kernel when modifying certain settings values through debugfs. A privileged local attacker could use this to cause a denial of service. Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - RISC-V architecture; - S390 architecture; - x86 architecture; - Block layer subsystem; - Compute Acceleration Framework; - Accessibility subsystem; - Android drivers; - Drivers core; - Bluetooth drivers; - Clock framework and drivers; - Data acquisition framework and drivers; - Cryptographic API; - Buffer Sharing and Synchronization framework; - GPU drivers; - On-Chip Interconnect management framework; - IOMMU subsystem; - Multiple devices driver; - Media drivers; - VMware VMCI Driver; - Network drivers; - Microsoft Azure Network Adapter (MANA) driver; - Device tree and open firmware driver; - Chrome hardware platform drivers; - i.MX PM domains; - TI SCI PM domains driver; - S/390 drivers; - SCSI drivers; - SPI subsystem; - Thermal drivers; - TTY drivers; - USB subsystem; - Framebuffer layer; - BTRFS file system; - Network file system server daemon; - NILFS2 file system; - File systems infrastructure; - Pstore file system; - SMB network file system; - BPF subsystem; - Bluetooth subsystem; - Netfilter; - io_uring subsystem; - Core kernel; - Extra boot config (XBC); - Memory management; - Amateur Radio drivers; - B.A.T.M.A.N. meshing protocol; - Ethernet bridge; - Networking core; - IPv4 networking; - IPv6 networking; - Multipath TCP; - NFC subsystem; - RDS protocol; - Network traffic control; - SMC sockets; - Sun RPC protocol; - TLS protocol; - Unix domain sockets; - Wireless networking; - eXpress Data Path; - SELinux security module; (CVE-2024-26988, CVE-2024-36023, CVE-2024-35869, CVE-2024-35938, CVE-2024-27000, CVE-2024-35880, CVE-2024-35915, CVE-2024-35959, CVE-2024-35883, CVE-2024-35886, CVE-2024-35976, CVE-2024-35903, CVE-2024-35980, CVE-2024-27020, CVE-2024-35955, CVE-2024-35964, CVE-2024-26980, CVE-2024-35882, CVE-2024-35927, CVE-2024-35884, CVE-2024-35914, CVE-2024-35905, CVE-2024-26925, CVE-2024-35885, CVE-2024-26990, CVE-2024-27012, CVE-2024-35969, CVE-2024-35862, CVE-2024-35956, CVE-2024-35971, CVE-2024-27022, CVE-2024-35935, CVE-2024-26992, CVE-2024-27010, CVE-2024-35892, CVE-2024-26999, CVE-2024-26989, CVE-2024-35963, CVE-2024-35981, CVE-2024-26997, CVE-2024-35920, CVE-2024-35918, CVE-2024-35933, CVE-2024-35867, CVE-2024-35904, CVE-2024-35890, CVE-2024-35968, CVE-2024-35917, CVE-2024-35897, CVE-2024-26922, CVE-2024-36026, CVE-2024-27013, CVE-2024-26991, CVE-2024-26996, CVE-2024-35873, CVE-2024-26987, CVE-2024-35895, CVE-2024-36027, CVE-2024-35896, CVE-2024-35894, CVE-2024-26983, CVE-2024-35966, CVE-2024-35967, CVE-2024-35945, CVE-2024-27003, CVE-2024-35939, CVE-2024-35861, CVE-2024-26985, CVE-2024-27015, CVE-2024-35982, CVE-2024-35912, CVE-2024-35979, CVE-2024-35879, CVE-2024-26982, CVE-2024-35891, CVE-2024-35925, CVE-2024-35870, CVE-2024-27021, CVE-2024-35866, CVE-2024-27014, CVE-2024-27001, CVE-2024-27004, CVE-2024-35953, CVE-2024-36021, CVE-2024-35931, CVE-2024-27007, CVE-2024-35922, CVE-2024-35872, CVE-2024-35926, CVE-2024-27016, CVE-2024-26984, CVE-2024-35919, CVE-2024-35911, CVE-2024-26923, CVE-2024-35929, CVE-2024-35887, CVE-2024-35893, CVE-2024-35898, CVE-2024-35930, CVE-2024-35934, CVE-2024-35916, CVE-2024-35877, CVE-2024-26926, CVE-2024-35974, CVE-2024-36018, CVE-2024-27002, CVE-2024-35975, CVE-2024-35864, CVE-2024-35958, CVE-2024-35944, CVE-2024-35985, CVE-2024-35940, CVE-2024-35900, CVE-2024-27018, CVE-2024-26936, CVE-2024-36024, CVE-2024-26998, CVE-2024-35954, CVE-2024-35878, CVE-2024-26928, CVE-2024-35952, CVE-2024-36020, CVE-2024-26986, CVE-2024-35950, CVE-2024-35957, CVE-2024-35909, CVE-2024-27005, CVE-2024-35978, CVE-2024-35875, CVE-2024-35943, CVE-2024-35970, CVE-2024-35863, CVE-2024-26993, CVE-2024-35865, CVE-2024-26995, CVE-2024-35888, CVE-2024-35899, CVE-2024-35868, CVE-2023-52699, CVE-2024-26994, CVE-2024-26817, CVE-2024-35902, CVE-2024-35977, CVE-2024-35961, CVE-2024-36025, CVE-2024-35936, CVE-2024-35913, CVE-2024-27017, CVE-2024-35889, CVE-2024-35972, CVE-2024-35901, CVE-2024-26921, CVE-2024-26924, CVE-2024-35951, CVE-2024-35860, CVE-2024-35907, CVE-2024-35910, CVE-2024-36022, CVE-2024-27019, CVE-2024-27009, CVE-2024-26981, CVE-2024-35973, CVE-2024-35965, CVE-2024-36019, CVE-2024-35871, CVE-2024-27008, CVE-2024-26811, CVE-2024-35908, CVE-2024-35921, CVE-2024-35942, CVE-2024-35946, CVE-2024-35924, CVE-2024-27011, CVE-2024-35960, CVE-2024-27006, CVE-2024-35937, CVE-2024-35932) Update Instructions: Run `sudo pro fix USN-6918-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1008-oracle - 6.8.0-1008.8 linux-buildinfo-6.8.0-1008-oracle-64k - 6.8.0-1008.8 linux-headers-6.8.0-1008-oracle - 6.8.0-1008.8 linux-headers-6.8.0-1008-oracle-64k - 6.8.0-1008.8 linux-headers-oracle - 6.8.0-1008.8 linux-headers-oracle-64k - 6.8.0-1008.8 linux-image-6.8.0-1008-oracle - 6.8.0-1008.8 linux-image-6.8.0-1008-oracle-64k - 6.8.0-1008.8 linux-image-oracle - 6.8.0-1008.8 linux-image-oracle-64k - 6.8.0-1008.8 linux-image-unsigned-6.8.0-1008-oracle - 6.8.0-1008.8 linux-image-unsigned-6.8.0-1008-oracle-64k - 6.8.0-1008.8 linux-modules-6.8.0-1008-oracle - 6.8.0-1008.8 linux-modules-6.8.0-1008-oracle-64k - 6.8.0-1008.8 linux-modules-extra-6.8.0-1008-oracle - 6.8.0-1008.8 linux-modules-extra-6.8.0-1008-oracle-64k - 6.8.0-1008.8 linux-modules-iwlwifi-6.8.0-1008-oracle - 6.8.0-1008.8 linux-modules-iwlwifi-oracle - 6.8.0-1008.8 linux-oracle - 6.8.0-1008.8 linux-oracle-64k - 6.8.0-1008.8 linux-oracle-headers-6.8.0-1008 - 6.8.0-1008.8 linux-oracle-tools-6.8.0-1008 - 6.8.0-1008.8 linux-tools-6.8.0-1008-oracle - 6.8.0-1008.8 linux-tools-6.8.0-1008-oracle-64k - 6.8.0-1008.8 linux-tools-oracle - 6.8.0-1008.8 linux-tools-oracle-64k - 6.8.0-1008.8 No subscription required
High
CVE-2023-52699
CVE-2024-24857
CVE-2024-24858
CVE-2024-24859
CVE-2024-26811
CVE-2024-26817
CVE-2024-26921
CVE-2024-26922
CVE-2024-26923
CVE-2024-26924
CVE-2024-26925
CVE-2024-26926
CVE-2024-26928
CVE-2024-26936
CVE-2024-26980
CVE-2024-26981
CVE-2024-26982
CVE-2024-26983
CVE-2024-26984
CVE-2024-26985
CVE-2024-26986
CVE-2024-26987
CVE-2024-26988
CVE-2024-26989
CVE-2024-26990
CVE-2024-26991
CVE-2024-26992
CVE-2024-26993
CVE-2024-26994
CVE-2024-26995
CVE-2024-26996
CVE-2024-26997
CVE-2024-26998
CVE-2024-26999
CVE-2024-27000
CVE-2024-27001
CVE-2024-27002
CVE-2024-27003
CVE-2024-27004
CVE-2024-27005
CVE-2024-27006
CVE-2024-27007
CVE-2024-27008
CVE-2024-27009
CVE-2024-27010
CVE-2024-27011
CVE-2024-27012
CVE-2024-27013
CVE-2024-27014
CVE-2024-27015
CVE-2024-27016
CVE-2024-27017
CVE-2024-27018
CVE-2024-27019
CVE-2024-27020
CVE-2024-27021
CVE-2024-27022
CVE-2024-35860
CVE-2024-35861
CVE-2024-35862
CVE-2024-35863
CVE-2024-35864
CVE-2024-35865
CVE-2024-35866
CVE-2024-35867
CVE-2024-35868
CVE-2024-35869
CVE-2024-35870
CVE-2024-35871
CVE-2024-35872
CVE-2024-35873
CVE-2024-35875
CVE-2024-35877
CVE-2024-35878
CVE-2024-35879
CVE-2024-35880
CVE-2024-35882
CVE-2024-35883
CVE-2024-35884
CVE-2024-35885
CVE-2024-35886
CVE-2024-35887
CVE-2024-35888
CVE-2024-35889
CVE-2024-35890
CVE-2024-35891
CVE-2024-35892
CVE-2024-35893
CVE-2024-35894
CVE-2024-35895
CVE-2024-35896
CVE-2024-35897
CVE-2024-35898
CVE-2024-35899
CVE-2024-35900
CVE-2024-35901
CVE-2024-35902
CVE-2024-35903
CVE-2024-35904
CVE-2024-35905
CVE-2024-35907
CVE-2024-35908
CVE-2024-35909
CVE-2024-35910
CVE-2024-35911
CVE-2024-35912
CVE-2024-35913
CVE-2024-35914
CVE-2024-35915
CVE-2024-35916
CVE-2024-35917
CVE-2024-35919
CVE-2024-35920
CVE-2024-35921
CVE-2024-35922
CVE-2024-35924
CVE-2024-35925
CVE-2024-35926
CVE-2024-35927
CVE-2024-35929
CVE-2024-35930
CVE-2024-35931
CVE-2024-35932
CVE-2024-35933
CVE-2024-35934
CVE-2024-35935
CVE-2024-35936
CVE-2024-35937
CVE-2024-35938
CVE-2024-35939
CVE-2024-35940
CVE-2024-35942
CVE-2024-35943
CVE-2024-35944
CVE-2024-35945
CVE-2024-35946
CVE-2024-35950
CVE-2024-35951
CVE-2024-35952
CVE-2024-35953
CVE-2024-35954
CVE-2024-35955
CVE-2024-35956
CVE-2024-35957
CVE-2024-35958
CVE-2024-35959
CVE-2024-35960
CVE-2024-35961
CVE-2024-35963
CVE-2024-35964
CVE-2024-35965
CVE-2024-35966
CVE-2024-35967
CVE-2024-35968
CVE-2024-35969
CVE-2024-35970
CVE-2024-35971
CVE-2024-35972
CVE-2024-35973
CVE-2024-35974
CVE-2024-35975
CVE-2024-35976
CVE-2024-35977
CVE-2024-35978
CVE-2024-35979
CVE-2024-35980
CVE-2024-35981
CVE-2024-35982
CVE-2024-35985
CVE-2024-36018
CVE-2024-36019
CVE-2024-36020
CVE-2024-36021
CVE-2024-36022
CVE-2024-36023
CVE-2024-36024
CVE-2024-36025
CVE-2024-36026
CVE-2024-36027
USN-6921-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Benedict Schlüter, Supraja Sridhara, Andrin Bertschi, and Shweta Shinde discovered that an untrusted hypervisor could inject malicious #VC interrupts and compromise the security guarantees of AMD SEV-SNP. This flaw is known as WeSee. A local attacker in control of the hypervisor could use this to expose sensitive information or possibly execute arbitrary code in the trusted execution environment. (CVE-2024-25742) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - DMA engine subsystem; - HID subsystem; - I2C subsystem; - PHY drivers; - TTY drivers; - IPv4 networking; (CVE-2024-35990, CVE-2024-35997, CVE-2024-35992, CVE-2024-35984, CVE-2024-36008, CVE-2024-36016) Update Instructions: Run `sudo pro fix USN-6921-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1007-gke - 6.8.0-1007.10 linux-gke - 6.8.0-1007.10 linux-gke-headers-6.8.0-1007 - 6.8.0-1007.10 linux-gke-tools-6.8.0-1007 - 6.8.0-1007.10 linux-headers-6.8.0-1007-gke - 6.8.0-1007.10 linux-headers-gke - 6.8.0-1007.10 linux-image-6.8.0-1007-gke - 6.8.0-1007.10 linux-image-gke - 6.8.0-1007.10 linux-image-unsigned-6.8.0-1007-gke - 6.8.0-1007.10 linux-modules-6.8.0-1007-gke - 6.8.0-1007.10 linux-modules-extra-6.8.0-1007-gke - 6.8.0-1007.10 linux-modules-iwlwifi-6.8.0-1007-gke - 6.8.0-1007.10 linux-modules-iwlwifi-gke - 6.8.0-1007.10 linux-tools-6.8.0-1007-gke - 6.8.0-1007.10 linux-tools-gke - 6.8.0-1007.10 No subscription required linux-buildinfo-6.8.0-1008-raspi - 6.8.0-1008.8 linux-headers-6.8.0-1008-raspi - 6.8.0-1008.8 linux-headers-raspi - 6.8.0-1008.8 linux-image-6.8.0-1008-raspi - 6.8.0-1008.8 linux-image-raspi - 6.8.0-1008.8 linux-modules-6.8.0-1008-raspi - 6.8.0-1008.8 linux-raspi - 6.8.0-1008.8 linux-raspi-headers-6.8.0-1008 - 6.8.0-1008.8 linux-raspi-tools-6.8.0-1008 - 6.8.0-1008.8 linux-tools-6.8.0-1008-raspi - 6.8.0-1008.8 linux-tools-raspi - 6.8.0-1008.8 No subscription required linux-buildinfo-6.8.0-1009-ibm - 6.8.0-1009.9 linux-buildinfo-6.8.0-1009-oem - 6.8.0-1009.9 linux-headers-6.8.0-1009-ibm - 6.8.0-1009.9 linux-headers-6.8.0-1009-oem - 6.8.0-1009.9 linux-headers-ibm - 6.8.0-1009.9 linux-headers-ibm-classic - 6.8.0-1009.9 linux-headers-ibm-lts-24.04 - 6.8.0-1009.9 linux-headers-oem-24.04 - 6.8.0-1009.9 linux-headers-oem-24.04a - 6.8.0-1009.9 linux-ibm - 6.8.0-1009.9 linux-ibm-classic - 6.8.0-1009.9 linux-ibm-cloud-tools-common - 6.8.0-1009.9 linux-ibm-headers-6.8.0-1009 - 6.8.0-1009.9 linux-ibm-lts-24.04 - 6.8.0-1009.9 linux-ibm-source-6.8.0 - 6.8.0-1009.9 linux-ibm-tools-6.8.0-1009 - 6.8.0-1009.9 linux-image-6.8.0-1009-ibm - 6.8.0-1009.9 linux-image-6.8.0-1009-oem - 6.8.0-1009.9 linux-image-ibm - 6.8.0-1009.9 linux-image-ibm-classic - 6.8.0-1009.9 linux-image-ibm-lts-24.04 - 6.8.0-1009.9 linux-image-oem-24.04 - 6.8.0-1009.9 linux-image-oem-24.04a - 6.8.0-1009.9 linux-image-uc-6.8.0-1009-oem - 6.8.0-1009.9 linux-image-uc-oem-24.04 - 6.8.0-1009.9 linux-image-uc-oem-24.04a - 6.8.0-1009.9 linux-image-unsigned-6.8.0-1009-ibm - 6.8.0-1009.9 linux-image-unsigned-6.8.0-1009-oem - 6.8.0-1009.9 linux-modules-6.8.0-1009-ibm - 6.8.0-1009.9 linux-modules-6.8.0-1009-oem - 6.8.0-1009.9 linux-modules-extra-6.8.0-1009-ibm - 6.8.0-1009.9 linux-modules-ipu6-6.8.0-1009-oem - 6.8.0-1009.9 linux-modules-ipu6-oem-24.04 - 6.8.0-1009.9 linux-modules-ipu6-oem-24.04a - 6.8.0-1009.9 linux-modules-iwlwifi-6.8.0-1009-ibm - 6.8.0-1009.9 linux-modules-iwlwifi-6.8.0-1009-oem - 6.8.0-1009.9 linux-modules-iwlwifi-ibm - 6.8.0-1009.9 linux-modules-iwlwifi-ibm-classic - 6.8.0-1009.9 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1009.9 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1009.9 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1009.9 linux-modules-usbio-6.8.0-1009-oem - 6.8.0-1009.9 linux-modules-usbio-oem-24.04 - 6.8.0-1009.9 linux-modules-usbio-oem-24.04a - 6.8.0-1009.9 linux-oem-24.04 - 6.8.0-1009.9 linux-oem-24.04a - 6.8.0-1009.9 linux-oem-6.8-headers-6.8.0-1009 - 6.8.0-1009.9 linux-oem-6.8-tools-6.8.0-1009 - 6.8.0-1009.9 linux-tools-6.8.0-1009-ibm - 6.8.0-1009.9 linux-tools-6.8.0-1009-oem - 6.8.0-1009.9 linux-tools-ibm - 6.8.0-1009.9 linux-tools-ibm-classic - 6.8.0-1009.9 linux-tools-ibm-lts-24.04 - 6.8.0-1009.9 linux-tools-oem-24.04 - 6.8.0-1009.9 linux-tools-oem-24.04a - 6.8.0-1009.9 No subscription required linux-buildinfo-6.8.0-1010-nvidia - 6.8.0-1010.10 linux-buildinfo-6.8.0-1010-nvidia-64k - 6.8.0-1010.10 linux-cloud-tools-nvidia - 6.8.0-1010.10 linux-headers-6.8.0-1010-nvidia - 6.8.0-1010.10 linux-headers-6.8.0-1010-nvidia-64k - 6.8.0-1010.10 linux-headers-nvidia - 6.8.0-1010.10 linux-headers-nvidia-64k - 6.8.0-1010.10 linux-image-6.8.0-1010-nvidia - 6.8.0-1010.10 linux-image-6.8.0-1010-nvidia-64k - 6.8.0-1010.10 linux-image-nvidia - 6.8.0-1010.10 linux-image-nvidia-64k - 6.8.0-1010.10 linux-image-uc-6.8.0-1010-nvidia - 6.8.0-1010.10 linux-image-uc-6.8.0-1010-nvidia-64k - 6.8.0-1010.10 linux-image-unsigned-6.8.0-1010-nvidia - 6.8.0-1010.10 linux-image-unsigned-6.8.0-1010-nvidia-64k - 6.8.0-1010.10 linux-modules-6.8.0-1010-nvidia - 6.8.0-1010.10 linux-modules-6.8.0-1010-nvidia-64k - 6.8.0-1010.10 linux-modules-extra-6.8.0-1010-nvidia - 6.8.0-1010.10 linux-modules-nvidia-fs-6.8.0-1010-nvidia - 6.8.0-1010.10 linux-modules-nvidia-fs-6.8.0-1010-nvidia-64k - 6.8.0-1010.10 linux-modules-nvidia-fs-nvidia - 6.8.0-1010.10 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1010.10 linux-nvidia - 6.8.0-1010.10 linux-nvidia-64k - 6.8.0-1010.10 linux-nvidia-headers-6.8.0-1010 - 6.8.0-1010.10 linux-nvidia-tools-6.8.0-1010 - 6.8.0-1010.10 linux-nvidia-tools-host - 6.8.0-1010.10 linux-tools-6.8.0-1010-nvidia - 6.8.0-1010.10 linux-tools-6.8.0-1010-nvidia-64k - 6.8.0-1010.10 linux-tools-nvidia - 6.8.0-1010.10 linux-tools-nvidia-64k - 6.8.0-1010.10 No subscription required linux-buildinfo-6.8.0-1011-gcp - 6.8.0-1011.12 linux-gcp - 6.8.0-1011.12 linux-gcp-headers-6.8.0-1011 - 6.8.0-1011.12 linux-gcp-tools-6.8.0-1011 - 6.8.0-1011.12 linux-headers-6.8.0-1011-gcp - 6.8.0-1011.12 linux-headers-gcp - 6.8.0-1011.12 linux-image-6.8.0-1011-gcp - 6.8.0-1011.12 linux-image-gcp - 6.8.0-1011.12 linux-image-unsigned-6.8.0-1011-gcp - 6.8.0-1011.12 linux-modules-6.8.0-1011-gcp - 6.8.0-1011.12 linux-modules-extra-6.8.0-1011-gcp - 6.8.0-1011.12 linux-modules-extra-gcp - 6.8.0-1011.12 linux-modules-iwlwifi-6.8.0-1011-gcp - 6.8.0-1011.12 linux-modules-iwlwifi-gcp - 6.8.0-1011.12 linux-tools-6.8.0-1011-gcp - 6.8.0-1011.12 linux-tools-gcp - 6.8.0-1011.12 No subscription required linux-aws - 6.8.0-1012.13 linux-aws-cloud-tools-6.8.0-1012 - 6.8.0-1012.13 linux-aws-headers-6.8.0-1012 - 6.8.0-1012.13 linux-aws-tools-6.8.0-1012 - 6.8.0-1012.13 linux-buildinfo-6.8.0-1012-aws - 6.8.0-1012.13 linux-cloud-tools-6.8.0-1012-aws - 6.8.0-1012.13 linux-headers-6.8.0-1012-aws - 6.8.0-1012.13 linux-headers-aws - 6.8.0-1012.13 linux-image-6.8.0-1012-aws - 6.8.0-1012.13 linux-image-aws - 6.8.0-1012.13 linux-image-unsigned-6.8.0-1012-aws - 6.8.0-1012.13 linux-modules-6.8.0-1012-aws - 6.8.0-1012.13 linux-modules-extra-6.8.0-1012-aws - 6.8.0-1012.13 linux-modules-extra-aws - 6.8.0-1012.13 linux-tools-6.8.0-1012-aws - 6.8.0-1012.13 linux-tools-aws - 6.8.0-1012.13 No subscription required linux-buildinfo-6.8.0-39-generic - 6.8.0-39.39 linux-buildinfo-6.8.0-39-generic-64k - 6.8.0-39.39 linux-cloud-tools-6.8.0-39 - 6.8.0-39.39 linux-cloud-tools-6.8.0-39-generic - 6.8.0-39.39 linux-cloud-tools-common - 6.8.0-39.39 linux-cloud-tools-generic - 6.8.0-39.39 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-39.39 linux-cloud-tools-generic-hwe-24.04-edge - 6.8.0-39.39 linux-cloud-tools-virtual - 6.8.0-39.39 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-39.39 linux-cloud-tools-virtual-hwe-24.04-edge - 6.8.0-39.39 linux-crashdump - 6.8.0-39.39 linux-doc - 6.8.0-39.39 linux-generic - 6.8.0-39.39 linux-generic-64k - 6.8.0-39.39 linux-generic-64k-hwe-24.04 - 6.8.0-39.39 linux-generic-64k-hwe-24.04-edge - 6.8.0-39.39 linux-generic-hwe-24.04 - 6.8.0-39.39 linux-generic-hwe-24.04-edge - 6.8.0-39.39 linux-generic-lpae - 6.8.0-39.39 linux-headers-6.8.0-39 - 6.8.0-39.39 linux-headers-6.8.0-39-generic - 6.8.0-39.39 linux-headers-6.8.0-39-generic-64k - 6.8.0-39.39 linux-headers-generic - 6.8.0-39.39 linux-headers-generic-64k - 6.8.0-39.39 linux-headers-generic-64k-hwe-24.04 - 6.8.0-39.39 linux-headers-generic-64k-hwe-24.04-edge - 6.8.0-39.39 linux-headers-generic-hwe-24.04 - 6.8.0-39.39 linux-headers-generic-hwe-24.04-edge - 6.8.0-39.39 linux-headers-generic-lpae - 6.8.0-39.39 linux-headers-kvm - 6.8.0-39.39 linux-headers-laptop-23.10 - 6.8.0-39.39 linux-headers-oem-20.04 - 6.8.0-39.39 linux-headers-oem-20.04b - 6.8.0-39.39 linux-headers-oem-20.04c - 6.8.0-39.39 linux-headers-oem-20.04d - 6.8.0-39.39 linux-headers-oem-22.04 - 6.8.0-39.39 linux-headers-virtual - 6.8.0-39.39 linux-headers-virtual-hwe-24.04 - 6.8.0-39.39 linux-headers-virtual-hwe-24.04-edge - 6.8.0-39.39 linux-image-6.8.0-39-generic - 6.8.0-39.39 linux-image-6.8.0-39-generic-64k - 6.8.0-39.39 linux-image-extra-virtual - 6.8.0-39.39 linux-image-extra-virtual-hwe-24.04 - 6.8.0-39.39 linux-image-extra-virtual-hwe-24.04-edge - 6.8.0-39.39 linux-image-generic - 6.8.0-39.39 linux-image-generic-64k - 6.8.0-39.39 linux-image-generic-64k-hwe-24.04 - 6.8.0-39.39 linux-image-generic-64k-hwe-24.04-edge - 6.8.0-39.39 linux-image-generic-hwe-24.04 - 6.8.0-39.39 linux-image-generic-hwe-24.04-edge - 6.8.0-39.39 linux-image-generic-lpae - 6.8.0-39.39 linux-image-kvm - 6.8.0-39.39 linux-image-laptop-23.10 - 6.8.0-39.39 linux-image-oem-20.04 - 6.8.0-39.39 linux-image-oem-20.04b - 6.8.0-39.39 linux-image-oem-20.04c - 6.8.0-39.39 linux-image-oem-20.04d - 6.8.0-39.39 linux-image-oem-22.04 - 6.8.0-39.39 linux-image-uc-6.8.0-39-generic - 6.8.0-39.39 linux-image-uc-6.8.0-39-generic-64k - 6.8.0-39.39 linux-image-uc-generic - 6.8.0-39.39 linux-image-uc-generic-hwe-24.04 - 6.8.0-39.39 linux-image-uc-generic-hwe-24.04-edge - 6.8.0-39.39 linux-image-unsigned-6.8.0-39-generic - 6.8.0-39.39 linux-image-unsigned-6.8.0-39-generic-64k - 6.8.0-39.39 linux-image-virtual - 6.8.0-39.39 linux-image-virtual-hwe-24.04 - 6.8.0-39.39 linux-image-virtual-hwe-24.04-edge - 6.8.0-39.39 linux-kvm - 6.8.0-39.39 linux-laptop-23.10 - 6.8.0-39.39 linux-lib-rust-6.8.0-39-generic - 6.8.0-39.39 linux-libc-dev - 6.8.0-39.39 linux-modules-6.8.0-39-generic - 6.8.0-39.39 linux-modules-6.8.0-39-generic-64k - 6.8.0-39.39 linux-modules-extra-6.8.0-39-generic - 6.8.0-39.39 linux-modules-ipu6-6.8.0-39-generic - 6.8.0-39.39 linux-modules-ipu6-generic - 6.8.0-39.39 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-39.39 linux-modules-ipu6-generic-hwe-24.04-edge - 6.8.0-39.39 linux-modules-iwlwifi-6.8.0-39-generic - 6.8.0-39.39 linux-modules-iwlwifi-generic - 6.8.0-39.39 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-39.39 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.8.0-39.39 linux-modules-iwlwifi-oem-20.04 - 6.8.0-39.39 linux-modules-iwlwifi-oem-20.04d - 6.8.0-39.39 linux-modules-iwlwifi-oem-22.04 - 6.8.0-39.39 linux-modules-usbio-6.8.0-39-generic - 6.8.0-39.39 linux-modules-usbio-generic - 6.8.0-39.39 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-39.39 linux-modules-usbio-generic-hwe-24.04-edge - 6.8.0-39.39 linux-oem-20.04 - 6.8.0-39.39 linux-oem-20.04b - 6.8.0-39.39 linux-oem-20.04c - 6.8.0-39.39 linux-oem-20.04d - 6.8.0-39.39 linux-oem-22.04 - 6.8.0-39.39 linux-source - 6.8.0-39.39 linux-source-6.8.0 - 6.8.0-39.39 linux-tools-6.8.0-39 - 6.8.0-39.39 linux-tools-6.8.0-39-generic - 6.8.0-39.39 linux-tools-6.8.0-39-generic-64k - 6.8.0-39.39 linux-tools-common - 6.8.0-39.39 linux-tools-generic - 6.8.0-39.39 linux-tools-generic-64k - 6.8.0-39.39 linux-tools-generic-64k-hwe-24.04 - 6.8.0-39.39 linux-tools-generic-64k-hwe-24.04-edge - 6.8.0-39.39 linux-tools-generic-hwe-24.04 - 6.8.0-39.39 linux-tools-generic-hwe-24.04-edge - 6.8.0-39.39 linux-tools-generic-lpae - 6.8.0-39.39 linux-tools-host - 6.8.0-39.39 linux-tools-kvm - 6.8.0-39.39 linux-tools-laptop-23.10 - 6.8.0-39.39 linux-tools-oem-20.04 - 6.8.0-39.39 linux-tools-oem-20.04b - 6.8.0-39.39 linux-tools-oem-20.04c - 6.8.0-39.39 linux-tools-oem-20.04d - 6.8.0-39.39 linux-tools-oem-22.04 - 6.8.0-39.39 linux-tools-virtual - 6.8.0-39.39 linux-tools-virtual-hwe-24.04 - 6.8.0-39.39 linux-tools-virtual-hwe-24.04-edge - 6.8.0-39.39 linux-virtual - 6.8.0-39.39 linux-virtual-hwe-24.04 - 6.8.0-39.39 linux-virtual-hwe-24.04-edge - 6.8.0-39.39 No subscription required
High
CVE-2024-25742
CVE-2024-35984
CVE-2024-35990
CVE-2024-35992
CVE-2024-35997
CVE-2024-36008
CVE-2024-36016
USN-6921-2 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Benedict Schlüter, Supraja Sridhara, Andrin Bertschi, and Shweta Shinde discovered that an untrusted hypervisor could inject malicious #VC interrupts and compromise the security guarantees of AMD SEV-SNP. This flaw is known as WeSee. A local attacker in control of the hypervisor could use this to expose sensitive information or possibly execute arbitrary code in the trusted execution environment. (CVE-2024-25742) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - DMA engine subsystem; - HID subsystem; - I2C subsystem; - PHY drivers; - TTY drivers; - IPv4 networking; (CVE-2024-35997, CVE-2024-36016, CVE-2024-35990, CVE-2024-35984, CVE-2024-35992, CVE-2024-36008) Update Instructions: Run `sudo pro fix USN-6921-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-39-lowlatency - 6.8.0-39.39.1 linux-buildinfo-6.8.0-39-lowlatency-64k - 6.8.0-39.39.1 linux-cloud-tools-6.8.0-39-lowlatency - 6.8.0-39.39.1 linux-cloud-tools-lowlatency - 6.8.0-39.39.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-39.39.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-39.39.1 linux-cloud-tools-lowlatency-hwe-22.04 - 6.8.0-39.39.1 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.8.0-39.39.1 linux-headers-6.8.0-39-lowlatency - 6.8.0-39.39.1 linux-headers-6.8.0-39-lowlatency-64k - 6.8.0-39.39.1 linux-headers-lowlatency - 6.8.0-39.39.1 linux-headers-lowlatency-64k - 6.8.0-39.39.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-39.39.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-39.39.1 linux-headers-lowlatency-64k-hwe-22.04 - 6.8.0-39.39.1 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.8.0-39.39.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-39.39.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-39.39.1 linux-headers-lowlatency-hwe-22.04 - 6.8.0-39.39.1 linux-headers-lowlatency-hwe-22.04-edge - 6.8.0-39.39.1 linux-image-6.8.0-39-lowlatency - 6.8.0-39.39.1 linux-image-6.8.0-39-lowlatency-64k - 6.8.0-39.39.1 linux-image-lowlatency - 6.8.0-39.39.1 linux-image-lowlatency-64k - 6.8.0-39.39.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-39.39.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-39.39.1 linux-image-lowlatency-64k-hwe-22.04 - 6.8.0-39.39.1 linux-image-lowlatency-64k-hwe-22.04-edge - 6.8.0-39.39.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-39.39.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-39.39.1 linux-image-lowlatency-hwe-22.04 - 6.8.0-39.39.1 linux-image-lowlatency-hwe-22.04-edge - 6.8.0-39.39.1 linux-image-unsigned-6.8.0-39-lowlatency - 6.8.0-39.39.1 linux-image-unsigned-6.8.0-39-lowlatency-64k - 6.8.0-39.39.1 linux-lowlatency - 6.8.0-39.39.1 linux-lowlatency-64k - 6.8.0-39.39.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-39.39.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-39.39.1 linux-lowlatency-64k-hwe-22.04 - 6.8.0-39.39.1 linux-lowlatency-64k-hwe-22.04-edge - 6.8.0-39.39.1 linux-lowlatency-cloud-tools-6.8.0-39 - 6.8.0-39.39.1 linux-lowlatency-cloud-tools-common - 6.8.0-39.39.1 linux-lowlatency-headers-6.8.0-39 - 6.8.0-39.39.1 linux-lowlatency-hwe-20.04 - 6.8.0-39.39.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-39.39.1 linux-lowlatency-hwe-22.04 - 6.8.0-39.39.1 linux-lowlatency-hwe-22.04-edge - 6.8.0-39.39.1 linux-lowlatency-lib-rust-6.8.0-39-lowlatency - 6.8.0-39.39.1 linux-lowlatency-tools-6.8.0-39 - 6.8.0-39.39.1 linux-lowlatency-tools-common - 6.8.0-39.39.1 linux-lowlatency-tools-host - 6.8.0-39.39.1 linux-modules-6.8.0-39-lowlatency - 6.8.0-39.39.1 linux-modules-6.8.0-39-lowlatency-64k - 6.8.0-39.39.1 linux-modules-iwlwifi-6.8.0-39-lowlatency - 6.8.0-39.39.1 linux-modules-iwlwifi-lowlatency - 6.8.0-39.39.1 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.8.0-39.39.1 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.8.0-39.39.1 linux-tools-6.8.0-39-lowlatency - 6.8.0-39.39.1 linux-tools-6.8.0-39-lowlatency-64k - 6.8.0-39.39.1 linux-tools-lowlatency - 6.8.0-39.39.1 linux-tools-lowlatency-64k - 6.8.0-39.39.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-39.39.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-39.39.1 linux-tools-lowlatency-64k-hwe-22.04 - 6.8.0-39.39.1 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.8.0-39.39.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-39.39.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-39.39.1 linux-tools-lowlatency-hwe-22.04 - 6.8.0-39.39.1 linux-tools-lowlatency-hwe-22.04-edge - 6.8.0-39.39.1 No subscription required
High
CVE-2024-25742
CVE-2024-35984
CVE-2024-35990
CVE-2024-35992
CVE-2024-35997
CVE-2024-36008
CVE-2024-36016
USN-6929-1 -- OpenJDK 8 vulnerabilities
Ubuntu 24.04 LTS
It was discovered that the Hotspot component of OpenJDK 8 was not properly performing bounds when handling certain UTF-8 strings, which could lead to a buffer overflow. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-21131) It was discovered that the Hotspot component of OpenJDK 8 could be made to run into an infinite loop. If an automated system were tricked into processing excessively large symbols, an attacker could possibly use this issue to cause a denial of service. (CVE-2024-21138) It was discovered that the Hotspot component of OpenJDK 8 did not properly perform range check elimination. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. (CVE-2024-21140) Yakov Shafranovich discovered that the Concurrency component of OpenJDK 8 incorrectly performed header validation in the Pack200 archive format. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-21144) Sergey Bylokhov discovered that OpenJDK 8 did not properly manage memory when handling 2D images. An attacker could possibly use this issue to obtain sensitive information. (CVE-2024-21145) It was discovered that the Hotspot component of OpenJDK 8 incorrectly handled memory when performing range check elimination under certain circumstances. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. (CVE-2024-21147) Update Instructions: Run `sudo pro fix USN-6929-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-8-demo - 8u422-b05-1~24.04 openjdk-8-doc - 8u422-b05-1~24.04 openjdk-8-jdk - 8u422-b05-1~24.04 openjdk-8-jdk-headless - 8u422-b05-1~24.04 openjdk-8-jre - 8u422-b05-1~24.04 openjdk-8-jre-headless - 8u422-b05-1~24.04 openjdk-8-jre-zero - 8u422-b05-1~24.04 openjdk-8-source - 8u422-b05-1~24.04 No subscription required
Medium
CVE-2024-21131
CVE-2024-21138
CVE-2024-21140
CVE-2024-21144
CVE-2024-21145
CVE-2024-21147
USN-6930-1 -- OpenJDK 11 vulnerabilities
Ubuntu 24.04 LTS
It was discovered that the Hotspot component of OpenJDK 11 was not properly performing bounds when handling certain UTF-8 strings, which could lead to a buffer overflow. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-21131) It was discovered that the Hotspot component of OpenJDK 11 could be made to run into an infinite loop. If an automated system were tricked into processing excessively large symbols, an attacker could possibly use this issue to cause a denial of service. (CVE-2024-21138) It was discovered that the Hotspot component of OpenJDK 11 did not properly perform range check elimination. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. (CVE-2024-21140) Yakov Shafranovich discovered that the Concurrency component of OpenJDK 11 incorrectly performed header validation in the Pack200 archive format. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-21144) Sergey Bylokhov discovered that OpenJDK 11 did not properly manage memory when handling 2D images. An attacker could possibly use this issue to obtain sensitive information. (CVE-2024-21145) It was discovered that the Hotspot component of OpenJDK 11 incorrectly handled memory when performing range check elimination under certain circumstances. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. (CVE-2024-21147) Update Instructions: Run `sudo pro fix USN-6930-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-11-demo - 11.0.24+8-1ubuntu3~24.04.1 openjdk-11-doc - 11.0.24+8-1ubuntu3~24.04.1 openjdk-11-jdk - 11.0.24+8-1ubuntu3~24.04.1 openjdk-11-jdk-headless - 11.0.24+8-1ubuntu3~24.04.1 openjdk-11-jre - 11.0.24+8-1ubuntu3~24.04.1 openjdk-11-jre-headless - 11.0.24+8-1ubuntu3~24.04.1 openjdk-11-jre-zero - 11.0.24+8-1ubuntu3~24.04.1 openjdk-11-source - 11.0.24+8-1ubuntu3~24.04.1 No subscription required
Medium
CVE-2024-21131
CVE-2024-21138
CVE-2024-21140
CVE-2024-21144
CVE-2024-21145
CVE-2024-21147
USN-6931-1 -- OpenJDK 17 vulnerabilities
Ubuntu 24.04 LTS
It was discovered that the Hotspot component of OpenJDK 17 was not properly performing bounds when handling certain UTF-8 strings, which could lead to a buffer overflow. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-21131) It was discovered that the Hotspot component of OpenJDK 17 could be made to run into an infinite loop. If an automated system were tricked into processing excessively large symbols, an attacker could possibly use this issue to cause a denial of service. (CVE-2024-21138) It was discovered that the Hotspot component of OpenJDK 17 did not properly perform range check elimination. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. (CVE-2024-21140) Sergey Bylokhov discovered that OpenJDK 17 did not properly manage memory when handling 2D images. An attacker could possibly use this issue to obtain sensitive information. (CVE-2024-21145) It was discovered that the Hotspot component of OpenJDK 17 incorrectly handled memory when performing range check elimination under certain circumstances. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. (CVE-2024-21147) Update Instructions: Run `sudo pro fix USN-6931-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-17-demo - 17.0.12+7-1ubuntu2~24.04 openjdk-17-doc - 17.0.12+7-1ubuntu2~24.04 openjdk-17-jdk - 17.0.12+7-1ubuntu2~24.04 openjdk-17-jdk-headless - 17.0.12+7-1ubuntu2~24.04 openjdk-17-jre - 17.0.12+7-1ubuntu2~24.04 openjdk-17-jre-headless - 17.0.12+7-1ubuntu2~24.04 openjdk-17-jre-zero - 17.0.12+7-1ubuntu2~24.04 openjdk-17-source - 17.0.12+7-1ubuntu2~24.04 No subscription required
Medium
CVE-2024-21131
CVE-2024-21138
CVE-2024-21140
CVE-2024-21145
CVE-2024-21147
USN-6932-1 -- OpenJDK 21 vulnerabilities
Ubuntu 24.04 LTS
It was discovered that the Hotspot component of OpenJDK 21 was not properly performing bounds when handling certain UTF-8 strings, which could lead to a buffer overflow. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-21131) It was discovered that the Hotspot component of OpenJDK 21 could be made to run into an infinite loop. If an automated system were tricked into processing excessively large symbols, an attacker could possibly use this issue to cause a denial of service. (CVE-2024-21138) It was discovered that the Hotspot component of OpenJDK 21 did not properly perform range check elimination. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. (CVE-2024-21140) Sergey Bylokhov discovered that OpenJDK 21 did not properly manage memory when handling 2D images. An attacker could possibly use this issue to obtain sensitive information. (CVE-2024-21145) It was discovered that the Hotspot component of OpenJDK 21 incorrectly handled memory when performing range check elimination under certain circumstances. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. (CVE-2024-21147) Update Instructions: Run `sudo pro fix USN-6932-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-21-demo - 21.0.4+7-1ubuntu2~24.04 openjdk-21-doc - 21.0.4+7-1ubuntu2~24.04 openjdk-21-jdk - 21.0.4+7-1ubuntu2~24.04 openjdk-21-jdk-headless - 21.0.4+7-1ubuntu2~24.04 openjdk-21-jre - 21.0.4+7-1ubuntu2~24.04 openjdk-21-jre-headless - 21.0.4+7-1ubuntu2~24.04 openjdk-21-jre-zero - 21.0.4+7-1ubuntu2~24.04 openjdk-21-source - 21.0.4+7-1ubuntu2~24.04 openjdk-21-testsupport - 21.0.4+7-1ubuntu2~24.04 No subscription required
Medium
CVE-2024-21131
CVE-2024-21138
CVE-2024-21140
CVE-2024-21145
CVE-2024-21147
USN-6934-1 -- MySQL vulnerabilities
Ubuntu 24.04 LTS
Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 8.0.39 in Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 24.04 LTS. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information: https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-38.html https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-39.html https://www.oracle.com/security-alerts/cpujul2024.html Update Instructions: Run `sudo pro fix USN-6934-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libmysqlclient-dev - 8.0.39-0ubuntu0.24.04.1 libmysqlclient21 - 8.0.39-0ubuntu0.24.04.1 mysql-client - 8.0.39-0ubuntu0.24.04.1 mysql-client-8.0 - 8.0.39-0ubuntu0.24.04.1 mysql-client-core-8.0 - 8.0.39-0ubuntu0.24.04.1 mysql-router - 8.0.39-0ubuntu0.24.04.1 mysql-server - 8.0.39-0ubuntu0.24.04.1 mysql-server-8.0 - 8.0.39-0ubuntu0.24.04.1 mysql-server-core-8.0 - 8.0.39-0ubuntu0.24.04.1 mysql-source-8.0 - 8.0.39-0ubuntu0.24.04.1 mysql-testsuite - 8.0.39-0ubuntu0.24.04.1 mysql-testsuite-8.0 - 8.0.39-0ubuntu0.24.04.1 No subscription required
Medium
CVE-2024-20996
CVE-2024-21125
CVE-2024-21127
CVE-2024-21129
CVE-2024-21130
CVE-2024-21134
CVE-2024-21142
CVE-2024-21162
CVE-2024-21163
CVE-2024-21165
CVE-2024-21171
CVE-2024-21173
CVE-2024-21177
CVE-2024-21179
CVE-2024-21185
USN-6937-1 -- OpenSSL vulnerabilities
Ubuntu 24.04 LTS
It was discovered that OpenSSL incorrectly handled TLSv1.3 sessions when certain non-default TLS server configurations were in use. A remote attacker could possibly use this issue to cause OpenSSL to consume resources, leading to a denial of service. (CVE-2024-2511) It was discovered that OpenSSL incorrectly handled checking excessively long DSA keys or parameters. A remote attacker could possibly use this issue to cause OpenSSL to consume resources, leading to a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-4603) William Ahern discovered that OpenSSL incorrectly handled certain memory operations in a rarely-used API. A remote attacker could use this issue to cause OpenSSL to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2024-4741) Joseph Birr-Pixton discovered that OpenSSL incorrectly handled calling a certain API with an empty supported client protocols buffer. A remote attacker could possibly use this issue to obtain sensitive information, or cause OpenSSL to crash, resulting in a denial of service. (CVE-2024-5535) Update Instructions: Run `sudo pro fix USN-6937-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libssl-dev - 3.0.13-0ubuntu3.2 libssl-doc - 3.0.13-0ubuntu3.2 libssl3t64 - 3.0.13-0ubuntu3.2 openssl - 3.0.13-0ubuntu3.2 No subscription required
Low
CVE-2024-2511
CVE-2024-4603
CVE-2024-4741
CVE-2024-5535
USN-6939-1 -- Exim vulnerability
Ubuntu 24.04 LTS
Phillip Szelat discovered that Exim misparses multiline MIME header filenames. A remote attacker could use this issue to bypass a MIME filename extension-blocking protection mechanism and possibly deliver executable attachments to the mailboxes of end users. Update Instructions: Run `sudo pro fix USN-6939-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: exim4 - 4.97-4ubuntu4.1 exim4-base - 4.97-4ubuntu4.1 exim4-config - 4.97-4ubuntu4.1 exim4-daemon-heavy - 4.97-4ubuntu4.1 exim4-daemon-light - 4.97-4ubuntu4.1 exim4-dev - 4.97-4ubuntu4.1 eximon4 - 4.97-4ubuntu4.1 No subscription required
Medium
CVE-2024-39929
USN-6940-1 -- snapd vulnerabilities
Ubuntu 24.04 LTS
Neil McPhail discovered that snapd did not properly restrict writes to the $HOME/bin path in the AppArmor profile for snaps using the home plug. An attacker who could convince a user to install a malicious snap could use this vulnerability to escape the snap sandbox. (CVE-2024-1724) Zeyad Gouda discovered that snapd failed to properly check the file type when extracting a snap. An attacker who could convince a user to install a malicious snap containing non-regular files could then cause snapd to block indefinitely while trying to read from such files and cause a denial of service. (CVE-2024-29068) Zeyad Gouda discovered that snapd failed to properly check the destination of symbolic links when extracting a snap. An attacker who could convince a user to install a malicious snap containing crafted symbolic links could then cause snapd to write out the contents of the symbolic link destination into a world-readable directory. This in-turn could allow a local unprivileged user to gain access to privileged information. (CVE-2024-29069) Update Instructions: Run `sudo pro fix USN-6940-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: golang-github-snapcore-snapd-dev - 2.63+24.04ubuntu0.1 golang-github-ubuntu-core-snappy-dev - 2.63+24.04ubuntu0.1 snap-confine - 2.63+24.04ubuntu0.1 snapd - 2.63+24.04ubuntu0.1 snapd-xdg-open - 2.63+24.04ubuntu0.1 ubuntu-core-launcher - 2.63+24.04ubuntu0.1 ubuntu-core-snapd-units - 2.63+24.04ubuntu0.1 ubuntu-snappy - 2.63+24.04ubuntu0.1 ubuntu-snappy-cli - 2.63+24.04ubuntu0.1 No subscription required
Medium
CVE-2024-1724
CVE-2024-29068
CVE-2024-29069
USN-6941-1 -- Python vulnerability
Ubuntu 24.04 LTS
It was discovered that the Python ipaddress module contained incorrect information about which IP address ranges were considered “private” or “globally reachable”. This could possibly result in applications applying incorrect security policies. Update Instructions: Run `sudo pro fix USN-6941-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: idle-python3.12 - 3.12.3-1ubuntu0.1 libpython3.12-dev - 3.12.3-1ubuntu0.1 libpython3.12-minimal - 3.12.3-1ubuntu0.1 libpython3.12-stdlib - 3.12.3-1ubuntu0.1 libpython3.12-testsuite - 3.12.3-1ubuntu0.1 libpython3.12t64 - 3.12.3-1ubuntu0.1 python3.12 - 3.12.3-1ubuntu0.1 python3.12-dev - 3.12.3-1ubuntu0.1 python3.12-doc - 3.12.3-1ubuntu0.1 python3.12-examples - 3.12.3-1ubuntu0.1 python3.12-full - 3.12.3-1ubuntu0.1 python3.12-minimal - 3.12.3-1ubuntu0.1 python3.12-nopie - 3.12.3-1ubuntu0.1 python3.12-venv - 3.12.3-1ubuntu0.1 No subscription required
Low
CVE-2024-4032
USN-6942-1 -- Gross vulnerability
Ubuntu 24.04 LTS
It was discovered that Gross incorrectly handled memory when composing log entries. An attacker could possibly use this issue to cause Gross to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6942-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gross - 1.0.2-4ubuntu0.24.04.1 No subscription required
Medium
CVE-2023-52159
USN-6944-1 -- curl vulnerability
Ubuntu 24.04 LTS
Dov Murik discovered that curl incorrectly handled parsing ASN.1 Generalized Time fields. A remote attacker could use this issue to cause curl to crash, resulting in a denial of service, or possibly obtain sensitive memory contents. Update Instructions: Run `sudo pro fix USN-6944-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: curl - 8.5.0-2ubuntu10.2 libcurl3t64-gnutls - 8.5.0-2ubuntu10.2 libcurl4-doc - 8.5.0-2ubuntu10.2 libcurl4-gnutls-dev - 8.5.0-2ubuntu10.2 libcurl4-openssl-dev - 8.5.0-2ubuntu10.2 libcurl4t64 - 8.5.0-2ubuntu10.2 No subscription required
Medium
CVE-2024-7264
USN-6945-1 -- wpa_supplicant and hostapd vulnerability
Ubuntu 24.04 LTS
Rory McNamara discovered that wpa_supplicant could be made to load arbitrary shared objects by unprivileged users that have access to the control interface. An attacker could use this to escalate privileges to root. Update Instructions: Run `sudo pro fix USN-6945-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: eapoltest - 2:2.10-21ubuntu0.1 hostapd - 2:2.10-21ubuntu0.1 libwpa-client-dev - 2:2.10-21ubuntu0.1 wpagui - 2:2.10-21ubuntu0.1 wpasupplicant - 2:2.10-21ubuntu0.1 No subscription required
Medium
CVE-2024-5290
https://launchpad.net/bugs/2067613
USN-6946-1 -- Django vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Django incorrectly handled certain strings in floatformat function. An attacker could possibly use this issue to cause a memory exhaustion. (CVE-2024-41989) It was discovered that Django incorrectly handled very large inputs. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-41990) It was discovered that Django in AdminURLFieldWidget incorrectly handled certain inputs with a very large number of Unicode characters. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-41991) It was discovered that Django incorrectly handled certain JSON objects. An attacker could possibly use this issue to cause a potential SQL injection. This issue only affected Ubuntu 22.04 LTS, and Ubuntu 24.04 LTS. (CVE-2024-42005) Update Instructions: Run `sudo pro fix USN-6946-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-django-doc - 3:4.2.11-1ubuntu1.2 python3-django - 3:4.2.11-1ubuntu1.2 No subscription required
Medium
CVE-2024-41989
CVE-2024-41990
CVE-2024-41991
CVE-2024-42005
USN-6947-1 -- Kerberos vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Kerberos incorrectly handled GSS message tokens where an unwrapped token could appear to be truncated. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-37370) It was discovered that Kerberos incorrectly handled GSS message tokens when sent a token with invalid length fields. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-37371) Update Instructions: Run `sudo pro fix USN-6947-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: krb5-admin-server - 1.20.1-6ubuntu2.1 krb5-doc - 1.20.1-6ubuntu2.1 krb5-gss-samples - 1.20.1-6ubuntu2.1 krb5-k5tls - 1.20.1-6ubuntu2.1 krb5-kdc - 1.20.1-6ubuntu2.1 krb5-kdc-ldap - 1.20.1-6ubuntu2.1 krb5-kpropd - 1.20.1-6ubuntu2.1 krb5-locales - 1.20.1-6ubuntu2.1 krb5-multidev - 1.20.1-6ubuntu2.1 krb5-otp - 1.20.1-6ubuntu2.1 krb5-pkinit - 1.20.1-6ubuntu2.1 krb5-user - 1.20.1-6ubuntu2.1 libgssapi-krb5-2 - 1.20.1-6ubuntu2.1 libgssrpc4t64 - 1.20.1-6ubuntu2.1 libk5crypto3 - 1.20.1-6ubuntu2.1 libkadm5clnt-mit12 - 1.20.1-6ubuntu2.1 libkadm5srv-mit12 - 1.20.1-6ubuntu2.1 libkdb5-10t64 - 1.20.1-6ubuntu2.1 libkrad-dev - 1.20.1-6ubuntu2.1 libkrad0 - 1.20.1-6ubuntu2.1 libkrb5-3 - 1.20.1-6ubuntu2.1 libkrb5-dev - 1.20.1-6ubuntu2.1 libkrb5support0 - 1.20.1-6ubuntu2.1 No subscription required
Medium
CVE-2024-37370
CVE-2024-37371
USN-6949-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - ARM64 architecture; - M68K architecture; - OpenRISC architecture; - PowerPC architecture; - RISC-V architecture; - x86 architecture; - Block layer subsystem; - Accessibility subsystem; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - DMA engine subsystem; - DPLL subsystem; - FireWire subsystem; - EFI core; - Qualcomm firmware drivers; - GPIO subsystem; - GPU drivers; - Microsoft Hyper-V drivers; - InfiniBand drivers; - IOMMU subsystem; - IRQ chip drivers; - Macintosh device drivers; - Multiple devices driver; - Media drivers; - EEPROM drivers; - MMC subsystem; - Network drivers; - STMicroelectronics network drivers; - Device tree and open firmware driver; - HiSilicon SoC PMU drivers; - PHY drivers; - Pin controllers subsystem; - Remote Processor subsystem; - S/390 drivers; - SCSI drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - Userspace I/O drivers; - USB subsystem; - DesignWare USB3 driver; - ACRN Hypervisor Service Module driver; - Virtio drivers; - 9P distributed file system; - BTRFS file system; - eCrypt file system; - EROFS file system; - File systems infrastructure; - GFS2 file system; - JFFS2 file system; - Network file systems library; - Network file system client; - Network file system server daemon; - NILFS2 file system; - Proc file system; - SMB network file system; - Tracing file system; - Mellanox drivers; - Memory management; - Socket messages infrastructure; - Slab allocator; - Tracing infrastructure; - User-space API (UAPI); - Core kernel; - BPF subsystem; - DMA mapping infrastructure; - RCU subsystem; - Dynamic debug library; - KUnit library; - Maple Tree data structure library; - Heterogeneous memory management; - Amateur Radio drivers; - Bluetooth subsystem; - Ethernet bridge; - Networking core; - IPv4 networking; - IPv6 networking; - Multipath TCP; - Netfilter; - NET/ROM layer; - NFC subsystem; - NSH protocol; - Open vSwitch; - Phonet protocol; - SMC sockets; - TIPC protocol; - Unix domain sockets; - Wireless networking; - Key management; - ALSA framework; - HD-audio driver; - Kirkwood ASoC drivers; - MediaTek ASoC drivers; (CVE-2024-36006, CVE-2024-36922, CVE-2024-38567, CVE-2024-38584, CVE-2024-36923, CVE-2024-36892, CVE-2024-35855, CVE-2024-35853, CVE-2024-38562, CVE-2024-36920, CVE-2024-38543, CVE-2024-38576, CVE-2024-38572, CVE-2024-36898, CVE-2024-38560, CVE-2024-36004, CVE-2024-36956, CVE-2024-36881, CVE-2024-36977, CVE-2024-36955, CVE-2024-36906, CVE-2024-36013, CVE-2024-36884, CVE-2024-38563, CVE-2024-36966, CVE-2024-38547, CVE-2024-38594, CVE-2024-36926, CVE-2024-38587, CVE-2024-38566, CVE-2024-27400, CVE-2024-36941, CVE-2024-36017, CVE-2024-38544, CVE-2024-36899, CVE-2024-35851, CVE-2024-38577, CVE-2024-38590, CVE-2024-38568, CVE-2024-38559, CVE-2024-38611, CVE-2024-36887, CVE-2024-36886, CVE-2024-35996, CVE-2024-38612, CVE-2024-36925, CVE-2024-38586, CVE-2024-38596, CVE-2024-36932, CVE-2024-39482, CVE-2024-38585, CVE-2024-36033, CVE-2024-38614, CVE-2024-35852, CVE-2024-36908, CVE-2024-36939, CVE-2024-36963, CVE-2024-27401, CVE-2024-36029, CVE-2024-38540, CVE-2024-38565, CVE-2024-36927, CVE-2024-36910, CVE-2024-42134, CVE-2024-36888, CVE-2024-35859, CVE-2024-36911, CVE-2024-35947, CVE-2024-36940, CVE-2024-36921, CVE-2024-36913, CVE-2024-36943, CVE-2024-35986, CVE-2024-38616, CVE-2024-36900, CVE-2024-36954, CVE-2024-36915, CVE-2024-38602, CVE-2024-41011, CVE-2024-35991, CVE-2024-36909, CVE-2024-38603, CVE-2023-52882, CVE-2024-36953, CVE-2024-38599, CVE-2024-38574, CVE-2024-36967, CVE-2024-36895, CVE-2024-36003, CVE-2024-36961, CVE-2024-38545, CVE-2024-38538, CVE-2024-36001, CVE-2024-36912, CVE-2024-36952, CVE-2024-38550, CVE-2024-38570, CVE-2024-36969, CVE-2024-38595, CVE-2024-35849, CVE-2024-36936, CVE-2024-35949, CVE-2024-36009, CVE-2024-35987, CVE-2024-38541, CVE-2024-38564, CVE-2024-36032, CVE-2024-38615, CVE-2024-36960, CVE-2024-36934, CVE-2024-36951, CVE-2024-35999, CVE-2024-38551, CVE-2024-36903, CVE-2024-36931, CVE-2024-38593, CVE-2024-36938, CVE-2024-38607, CVE-2024-36928, CVE-2024-38552, CVE-2024-36002, CVE-2024-38605, CVE-2024-38582, CVE-2024-36933, CVE-2024-38620, CVE-2024-27395, CVE-2024-27396, CVE-2024-36012, CVE-2024-38591, CVE-2024-38597, CVE-2024-36889, CVE-2024-36964, CVE-2024-38606, CVE-2024-38553, CVE-2024-36945, CVE-2024-35848, CVE-2024-36962, CVE-2024-36947, CVE-2024-27399, CVE-2024-38546, CVE-2024-38583, CVE-2024-38573, CVE-2024-35850, CVE-2024-38549, CVE-2024-38588, CVE-2024-38610, CVE-2024-36917, CVE-2024-36957, CVE-2024-35846, CVE-2024-38579, CVE-2024-36965, CVE-2024-35857, CVE-2024-38548, CVE-2024-36975, CVE-2024-36919, CVE-2024-38542, CVE-2024-36948, CVE-2024-36011, CVE-2024-38556, CVE-2024-36897, CVE-2024-38557, CVE-2024-36890, CVE-2024-36882, CVE-2024-38613, CVE-2024-36914, CVE-2024-35998, CVE-2024-36958, CVE-2024-38580, CVE-2024-36896, CVE-2024-36891, CVE-2024-36924, CVE-2024-38589, CVE-2024-38592, CVE-2024-36904, CVE-2024-36894, CVE-2024-36028, CVE-2024-36014, CVE-2024-36880, CVE-2024-36944, CVE-2024-38598, CVE-2024-36929, CVE-2024-36883, CVE-2024-35858, CVE-2024-38555, CVE-2024-36005, CVE-2024-38539, CVE-2024-35994, CVE-2024-36030, CVE-2024-27394, CVE-2024-36930, CVE-2024-36937, CVE-2024-38561, CVE-2024-38578, CVE-2024-36959, CVE-2024-36935, CVE-2024-36916, CVE-2024-36902, CVE-2024-38604, CVE-2024-38554, CVE-2024-38575, CVE-2024-36918, CVE-2024-36979, CVE-2024-35854, CVE-2024-36968, CVE-2024-38558, CVE-2024-36000, CVE-2024-27398, CVE-2024-35983, CVE-2024-36949, CVE-2024-38600, CVE-2024-36950, CVE-2024-36946, CVE-2024-36031, CVE-2024-35847, CVE-2024-36905, CVE-2024-38571, CVE-2024-36007, CVE-2024-35856, CVE-2024-38601, CVE-2024-38569, CVE-2024-38617, CVE-2024-35988, CVE-2024-35989, CVE-2024-35993, CVE-2024-36893, CVE-2024-36901) Update Instructions: Run `sudo pro fix USN-6949-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1008-gke - 6.8.0-1008.11 linux-gke - 6.8.0-1008.11 linux-gke-headers-6.8.0-1008 - 6.8.0-1008.11 linux-gke-tools-6.8.0-1008 - 6.8.0-1008.11 linux-headers-6.8.0-1008-gke - 6.8.0-1008.11 linux-headers-gke - 6.8.0-1008.11 linux-image-6.8.0-1008-gke - 6.8.0-1008.11 linux-image-gke - 6.8.0-1008.11 linux-image-unsigned-6.8.0-1008-gke - 6.8.0-1008.11 linux-modules-6.8.0-1008-gke - 6.8.0-1008.11 linux-modules-extra-6.8.0-1008-gke - 6.8.0-1008.11 linux-modules-iwlwifi-6.8.0-1008-gke - 6.8.0-1008.11 linux-modules-iwlwifi-gke - 6.8.0-1008.11 linux-tools-6.8.0-1008-gke - 6.8.0-1008.11 linux-tools-gke - 6.8.0-1008.11 No subscription required linux-buildinfo-6.8.0-1010-ibm - 6.8.0-1010.10 linux-headers-6.8.0-1010-ibm - 6.8.0-1010.10 linux-headers-ibm - 6.8.0-1010.10 linux-headers-ibm-classic - 6.8.0-1010.10 linux-headers-ibm-lts-24.04 - 6.8.0-1010.10 linux-ibm - 6.8.0-1010.10 linux-ibm-classic - 6.8.0-1010.10 linux-ibm-cloud-tools-common - 6.8.0-1010.10 linux-ibm-headers-6.8.0-1010 - 6.8.0-1010.10 linux-ibm-lts-24.04 - 6.8.0-1010.10 linux-ibm-source-6.8.0 - 6.8.0-1010.10 linux-ibm-tools-6.8.0-1010 - 6.8.0-1010.10 linux-image-6.8.0-1010-ibm - 6.8.0-1010.10 linux-image-ibm - 6.8.0-1010.10 linux-image-ibm-classic - 6.8.0-1010.10 linux-image-ibm-lts-24.04 - 6.8.0-1010.10 linux-image-unsigned-6.8.0-1010-ibm - 6.8.0-1010.10 linux-modules-6.8.0-1010-ibm - 6.8.0-1010.10 linux-modules-extra-6.8.0-1010-ibm - 6.8.0-1010.10 linux-modules-iwlwifi-6.8.0-1010-ibm - 6.8.0-1010.10 linux-modules-iwlwifi-ibm - 6.8.0-1010.10 linux-modules-iwlwifi-ibm-classic - 6.8.0-1010.10 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1010.10 linux-tools-6.8.0-1010-ibm - 6.8.0-1010.10 linux-tools-ibm - 6.8.0-1010.10 linux-tools-ibm-classic - 6.8.0-1010.10 linux-tools-ibm-lts-24.04 - 6.8.0-1010.10 No subscription required linux-buildinfo-6.8.0-1011-nvidia - 6.8.0-1011.11 linux-buildinfo-6.8.0-1011-nvidia-64k - 6.8.0-1011.11 linux-cloud-tools-nvidia - 6.8.0-1011.11 linux-headers-6.8.0-1011-nvidia - 6.8.0-1011.11 linux-headers-6.8.0-1011-nvidia-64k - 6.8.0-1011.11 linux-headers-nvidia - 6.8.0-1011.11 linux-headers-nvidia-64k - 6.8.0-1011.11 linux-image-6.8.0-1011-nvidia - 6.8.0-1011.11 linux-image-6.8.0-1011-nvidia-64k - 6.8.0-1011.11 linux-image-nvidia - 6.8.0-1011.11 linux-image-nvidia-64k - 6.8.0-1011.11 linux-image-uc-6.8.0-1011-nvidia - 6.8.0-1011.11 linux-image-uc-6.8.0-1011-nvidia-64k - 6.8.0-1011.11 linux-image-unsigned-6.8.0-1011-nvidia - 6.8.0-1011.11 linux-image-unsigned-6.8.0-1011-nvidia-64k - 6.8.0-1011.11 linux-modules-6.8.0-1011-nvidia - 6.8.0-1011.11 linux-modules-6.8.0-1011-nvidia-64k - 6.8.0-1011.11 linux-modules-extra-6.8.0-1011-nvidia - 6.8.0-1011.11 linux-modules-nvidia-fs-6.8.0-1011-nvidia - 6.8.0-1011.11 linux-modules-nvidia-fs-6.8.0-1011-nvidia-64k - 6.8.0-1011.11 linux-modules-nvidia-fs-nvidia - 6.8.0-1011.11 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1011.11 linux-nvidia - 6.8.0-1011.11 linux-nvidia-64k - 6.8.0-1011.11 linux-nvidia-headers-6.8.0-1011 - 6.8.0-1011.11 linux-nvidia-tools-6.8.0-1011 - 6.8.0-1011.11 linux-nvidia-tools-host - 6.8.0-1011.11 linux-tools-6.8.0-1011-nvidia - 6.8.0-1011.11 linux-tools-6.8.0-1011-nvidia-64k - 6.8.0-1011.11 linux-tools-nvidia - 6.8.0-1011.11 linux-tools-nvidia-64k - 6.8.0-1011.11 No subscription required linux-buildinfo-6.8.0-1012-gcp - 6.8.0-1012.13 linux-gcp - 6.8.0-1012.13 linux-gcp-headers-6.8.0-1012 - 6.8.0-1012.13 linux-gcp-tools-6.8.0-1012 - 6.8.0-1012.13 linux-headers-6.8.0-1012-gcp - 6.8.0-1012.13 linux-headers-gcp - 6.8.0-1012.13 linux-image-6.8.0-1012-gcp - 6.8.0-1012.13 linux-image-gcp - 6.8.0-1012.13 linux-image-unsigned-6.8.0-1012-gcp - 6.8.0-1012.13 linux-modules-6.8.0-1012-gcp - 6.8.0-1012.13 linux-modules-extra-6.8.0-1012-gcp - 6.8.0-1012.13 linux-modules-extra-gcp - 6.8.0-1012.13 linux-modules-iwlwifi-6.8.0-1012-gcp - 6.8.0-1012.13 linux-modules-iwlwifi-gcp - 6.8.0-1012.13 linux-tools-6.8.0-1012-gcp - 6.8.0-1012.13 linux-tools-gcp - 6.8.0-1012.13 No subscription required linux-aws - 6.8.0-1013.14 linux-aws-cloud-tools-6.8.0-1013 - 6.8.0-1013.14 linux-aws-headers-6.8.0-1013 - 6.8.0-1013.14 linux-aws-tools-6.8.0-1013 - 6.8.0-1013.14 linux-buildinfo-6.8.0-1013-aws - 6.8.0-1013.14 linux-cloud-tools-6.8.0-1013-aws - 6.8.0-1013.14 linux-headers-6.8.0-1013-aws - 6.8.0-1013.14 linux-headers-aws - 6.8.0-1013.14 linux-image-6.8.0-1013-aws - 6.8.0-1013.14 linux-image-aws - 6.8.0-1013.14 linux-image-unsigned-6.8.0-1013-aws - 6.8.0-1013.14 linux-modules-6.8.0-1013-aws - 6.8.0-1013.14 linux-modules-extra-6.8.0-1013-aws - 6.8.0-1013.14 linux-modules-extra-aws - 6.8.0-1013.14 linux-tools-6.8.0-1013-aws - 6.8.0-1013.14 linux-tools-aws - 6.8.0-1013.14 No subscription required linux-buildinfo-6.8.0-40-generic - 6.8.0-40.40 linux-buildinfo-6.8.0-40-generic-64k - 6.8.0-40.40 linux-cloud-tools-6.8.0-40 - 6.8.0-40.40 linux-cloud-tools-6.8.0-40-generic - 6.8.0-40.40 linux-cloud-tools-common - 6.8.0-40.40 linux-cloud-tools-generic - 6.8.0-40.40 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-40.40 linux-cloud-tools-generic-hwe-24.04-edge - 6.8.0-40.40 linux-cloud-tools-virtual - 6.8.0-40.40 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-40.40 linux-cloud-tools-virtual-hwe-24.04-edge - 6.8.0-40.40 linux-crashdump - 6.8.0-40.40 linux-doc - 6.8.0-40.40 linux-generic - 6.8.0-40.40 linux-generic-64k - 6.8.0-40.40 linux-generic-64k-hwe-24.04 - 6.8.0-40.40 linux-generic-64k-hwe-24.04-edge - 6.8.0-40.40 linux-generic-hwe-24.04 - 6.8.0-40.40 linux-generic-hwe-24.04-edge - 6.8.0-40.40 linux-generic-lpae - 6.8.0-40.40 linux-headers-6.8.0-40 - 6.8.0-40.40 linux-headers-6.8.0-40-generic - 6.8.0-40.40 linux-headers-6.8.0-40-generic-64k - 6.8.0-40.40 linux-headers-generic - 6.8.0-40.40 linux-headers-generic-64k - 6.8.0-40.40 linux-headers-generic-64k-hwe-24.04 - 6.8.0-40.40 linux-headers-generic-64k-hwe-24.04-edge - 6.8.0-40.40 linux-headers-generic-hwe-24.04 - 6.8.0-40.40 linux-headers-generic-hwe-24.04-edge - 6.8.0-40.40 linux-headers-generic-lpae - 6.8.0-40.40 linux-headers-kvm - 6.8.0-40.40 linux-headers-laptop-23.10 - 6.8.0-40.40 linux-headers-oem-20.04 - 6.8.0-40.40 linux-headers-oem-20.04b - 6.8.0-40.40 linux-headers-oem-20.04c - 6.8.0-40.40 linux-headers-oem-20.04d - 6.8.0-40.40 linux-headers-oem-22.04 - 6.8.0-40.40 linux-headers-virtual - 6.8.0-40.40 linux-headers-virtual-hwe-24.04 - 6.8.0-40.40 linux-headers-virtual-hwe-24.04-edge - 6.8.0-40.40 linux-image-6.8.0-40-generic - 6.8.0-40.40 linux-image-6.8.0-40-generic-64k - 6.8.0-40.40 linux-image-extra-virtual - 6.8.0-40.40 linux-image-extra-virtual-hwe-24.04 - 6.8.0-40.40 linux-image-extra-virtual-hwe-24.04-edge - 6.8.0-40.40 linux-image-generic - 6.8.0-40.40 linux-image-generic-64k - 6.8.0-40.40 linux-image-generic-64k-hwe-24.04 - 6.8.0-40.40 linux-image-generic-64k-hwe-24.04-edge - 6.8.0-40.40 linux-image-generic-hwe-24.04 - 6.8.0-40.40 linux-image-generic-hwe-24.04-edge - 6.8.0-40.40 linux-image-generic-lpae - 6.8.0-40.40 linux-image-kvm - 6.8.0-40.40 linux-image-laptop-23.10 - 6.8.0-40.40 linux-image-oem-20.04 - 6.8.0-40.40 linux-image-oem-20.04b - 6.8.0-40.40 linux-image-oem-20.04c - 6.8.0-40.40 linux-image-oem-20.04d - 6.8.0-40.40 linux-image-oem-22.04 - 6.8.0-40.40 linux-image-uc-6.8.0-40-generic - 6.8.0-40.40 linux-image-uc-6.8.0-40-generic-64k - 6.8.0-40.40 linux-image-uc-generic - 6.8.0-40.40 linux-image-uc-generic-hwe-24.04 - 6.8.0-40.40 linux-image-uc-generic-hwe-24.04-edge - 6.8.0-40.40 linux-image-unsigned-6.8.0-40-generic - 6.8.0-40.40 linux-image-unsigned-6.8.0-40-generic-64k - 6.8.0-40.40 linux-image-virtual - 6.8.0-40.40 linux-image-virtual-hwe-24.04 - 6.8.0-40.40 linux-image-virtual-hwe-24.04-edge - 6.8.0-40.40 linux-kvm - 6.8.0-40.40 linux-laptop-23.10 - 6.8.0-40.40 linux-lib-rust-6.8.0-40-generic - 6.8.0-40.40 linux-libc-dev - 6.8.0-40.40 linux-modules-6.8.0-40-generic - 6.8.0-40.40 linux-modules-6.8.0-40-generic-64k - 6.8.0-40.40 linux-modules-extra-6.8.0-40-generic - 6.8.0-40.40 linux-modules-ipu6-6.8.0-40-generic - 6.8.0-40.40 linux-modules-ipu6-generic - 6.8.0-40.40 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-40.40 linux-modules-ipu6-generic-hwe-24.04-edge - 6.8.0-40.40 linux-modules-iwlwifi-6.8.0-40-generic - 6.8.0-40.40 linux-modules-iwlwifi-generic - 6.8.0-40.40 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-40.40 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.8.0-40.40 linux-modules-iwlwifi-oem-20.04 - 6.8.0-40.40 linux-modules-iwlwifi-oem-20.04d - 6.8.0-40.40 linux-modules-iwlwifi-oem-22.04 - 6.8.0-40.40 linux-modules-usbio-6.8.0-40-generic - 6.8.0-40.40 linux-modules-usbio-generic - 6.8.0-40.40 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-40.40 linux-modules-usbio-generic-hwe-24.04-edge - 6.8.0-40.40 linux-oem-20.04 - 6.8.0-40.40 linux-oem-20.04b - 6.8.0-40.40 linux-oem-20.04c - 6.8.0-40.40 linux-oem-20.04d - 6.8.0-40.40 linux-oem-22.04 - 6.8.0-40.40 linux-source - 6.8.0-40.40 linux-source-6.8.0 - 6.8.0-40.40 linux-tools-6.8.0-40 - 6.8.0-40.40 linux-tools-6.8.0-40-generic - 6.8.0-40.40 linux-tools-6.8.0-40-generic-64k - 6.8.0-40.40 linux-tools-common - 6.8.0-40.40 linux-tools-generic - 6.8.0-40.40 linux-tools-generic-64k - 6.8.0-40.40 linux-tools-generic-64k-hwe-24.04 - 6.8.0-40.40 linux-tools-generic-64k-hwe-24.04-edge - 6.8.0-40.40 linux-tools-generic-hwe-24.04 - 6.8.0-40.40 linux-tools-generic-hwe-24.04-edge - 6.8.0-40.40 linux-tools-generic-lpae - 6.8.0-40.40 linux-tools-host - 6.8.0-40.40 linux-tools-kvm - 6.8.0-40.40 linux-tools-laptop-23.10 - 6.8.0-40.40 linux-tools-oem-20.04 - 6.8.0-40.40 linux-tools-oem-20.04b - 6.8.0-40.40 linux-tools-oem-20.04c - 6.8.0-40.40 linux-tools-oem-20.04d - 6.8.0-40.40 linux-tools-oem-22.04 - 6.8.0-40.40 linux-tools-virtual - 6.8.0-40.40 linux-tools-virtual-hwe-24.04 - 6.8.0-40.40 linux-tools-virtual-hwe-24.04-edge - 6.8.0-40.40 linux-virtual - 6.8.0-40.40 linux-virtual-hwe-24.04 - 6.8.0-40.40 linux-virtual-hwe-24.04-edge - 6.8.0-40.40 No subscription required
High
CVE-2023-52882
CVE-2024-27394
CVE-2024-27395
CVE-2024-27396
CVE-2024-27398
CVE-2024-27399
CVE-2024-27400
CVE-2024-27401
CVE-2024-35846
CVE-2024-35847
CVE-2024-35848
CVE-2024-35849
CVE-2024-35850
CVE-2024-35851
CVE-2024-35852
CVE-2024-35853
CVE-2024-35854
CVE-2024-35855
CVE-2024-35856
CVE-2024-35857
CVE-2024-35858
CVE-2024-35859
CVE-2024-35947
CVE-2024-35949
CVE-2024-35983
CVE-2024-35986
CVE-2024-35987
CVE-2024-35988
CVE-2024-35989
CVE-2024-35991
CVE-2024-35993
CVE-2024-35994
CVE-2024-35996
CVE-2024-35998
CVE-2024-35999
CVE-2024-36000
CVE-2024-36001
CVE-2024-36002
CVE-2024-36003
CVE-2024-36004
CVE-2024-36005
CVE-2024-36006
CVE-2024-36007
CVE-2024-36009
CVE-2024-36011
CVE-2024-36012
CVE-2024-36013
CVE-2024-36014
CVE-2024-36017
CVE-2024-36028
CVE-2024-36029
CVE-2024-36030
CVE-2024-36031
CVE-2024-36032
CVE-2024-36033
CVE-2024-36880
CVE-2024-36881
CVE-2024-36882
CVE-2024-36883
CVE-2024-36884
CVE-2024-36886
CVE-2024-36887
CVE-2024-36888
CVE-2024-36889
CVE-2024-36890
CVE-2024-36891
CVE-2024-36892
CVE-2024-36893
CVE-2024-36894
CVE-2024-36895
CVE-2024-36896
CVE-2024-36897
CVE-2024-36898
CVE-2024-36899
CVE-2024-36900
CVE-2024-36901
CVE-2024-36902
CVE-2024-36903
CVE-2024-36904
CVE-2024-36905
CVE-2024-36906
CVE-2024-36908
CVE-2024-36909
CVE-2024-36910
CVE-2024-36911
CVE-2024-36912
CVE-2024-36913
CVE-2024-36914
CVE-2024-36915
CVE-2024-36916
CVE-2024-36917
CVE-2024-36918
CVE-2024-36919
CVE-2024-36920
CVE-2024-36921
CVE-2024-36922
CVE-2024-36923
CVE-2024-36924
CVE-2024-36925
CVE-2024-36926
CVE-2024-36927
CVE-2024-36928
CVE-2024-36929
CVE-2024-36930
CVE-2024-36931
CVE-2024-36932
CVE-2024-36933
CVE-2024-36934
CVE-2024-36935
CVE-2024-36936
CVE-2024-36937
CVE-2024-36938
CVE-2024-36939
CVE-2024-36940
CVE-2024-36941
CVE-2024-36943
CVE-2024-36944
CVE-2024-36945
CVE-2024-36946
CVE-2024-36947
CVE-2024-36948
CVE-2024-36949
CVE-2024-36950
CVE-2024-36951
CVE-2024-36952
CVE-2024-36953
CVE-2024-36954
CVE-2024-36955
CVE-2024-36956
CVE-2024-36957
CVE-2024-36958
CVE-2024-36959
CVE-2024-36960
CVE-2024-36961
CVE-2024-36962
CVE-2024-36963
CVE-2024-36964
CVE-2024-36965
CVE-2024-36966
CVE-2024-36967
CVE-2024-36968
CVE-2024-36969
CVE-2024-36975
CVE-2024-36977
CVE-2024-36979
CVE-2024-38538
CVE-2024-38539
CVE-2024-38540
CVE-2024-38541
CVE-2024-38542
CVE-2024-38543
CVE-2024-38544
CVE-2024-38545
CVE-2024-38546
CVE-2024-38547
CVE-2024-38548
CVE-2024-38549
CVE-2024-38550
CVE-2024-38551
CVE-2024-38552
CVE-2024-38553
CVE-2024-38554
CVE-2024-38555
CVE-2024-38556
CVE-2024-38557
CVE-2024-38558
CVE-2024-38559
CVE-2024-38560
CVE-2024-38561
CVE-2024-38562
CVE-2024-38563
CVE-2024-38564
CVE-2024-38565
CVE-2024-38566
CVE-2024-38567
CVE-2024-38568
CVE-2024-38569
CVE-2024-38570
CVE-2024-38571
CVE-2024-38572
CVE-2024-38573
CVE-2024-38574
CVE-2024-38575
CVE-2024-38576
CVE-2024-38577
CVE-2024-38578
CVE-2024-38579
CVE-2024-38580
CVE-2024-38582
CVE-2024-38583
CVE-2024-38584
CVE-2024-38585
CVE-2024-38586
CVE-2024-38587
CVE-2024-38588
CVE-2024-38589
CVE-2024-38590
CVE-2024-38591
CVE-2024-38592
CVE-2024-38593
CVE-2024-38594
CVE-2024-38595
CVE-2024-38596
CVE-2024-38597
CVE-2024-38598
CVE-2024-38599
CVE-2024-38600
CVE-2024-38601
CVE-2024-38602
CVE-2024-38603
CVE-2024-38604
CVE-2024-38605
CVE-2024-38606
CVE-2024-38607
CVE-2024-38610
CVE-2024-38611
CVE-2024-38612
CVE-2024-38613
CVE-2024-38614
CVE-2024-38615
CVE-2024-38616
CVE-2024-38617
CVE-2024-38620
CVE-2024-39482
CVE-2024-41011
CVE-2024-42134
USN-6949-2 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - ARM64 architecture; - M68K architecture; - OpenRISC architecture; - PowerPC architecture; - RISC-V architecture; - x86 architecture; - Block layer subsystem; - Accessibility subsystem; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - DMA engine subsystem; - DPLL subsystem; - FireWire subsystem; - EFI core; - Qualcomm firmware drivers; - GPIO subsystem; - GPU drivers; - Microsoft Hyper-V drivers; - InfiniBand drivers; - IOMMU subsystem; - IRQ chip drivers; - Macintosh device drivers; - Multiple devices driver; - Media drivers; - EEPROM drivers; - MMC subsystem; - Network drivers; - STMicroelectronics network drivers; - Device tree and open firmware driver; - HiSilicon SoC PMU drivers; - PHY drivers; - Pin controllers subsystem; - Remote Processor subsystem; - S/390 drivers; - SCSI drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - Userspace I/O drivers; - USB subsystem; - DesignWare USB3 driver; - ACRN Hypervisor Service Module driver; - Virtio drivers; - 9P distributed file system; - BTRFS file system; - eCrypt file system; - EROFS file system; - File systems infrastructure; - GFS2 file system; - JFFS2 file system; - Network file systems library; - Network file system client; - Network file system server daemon; - NILFS2 file system; - Proc file system; - SMB network file system; - Tracing file system; - Mellanox drivers; - Memory management; - Socket messages infrastructure; - Slab allocator; - Tracing infrastructure; - User-space API (UAPI); - Core kernel; - BPF subsystem; - DMA mapping infrastructure; - RCU subsystem; - Dynamic debug library; - KUnit library; - Maple Tree data structure library; - Heterogeneous memory management; - Amateur Radio drivers; - Bluetooth subsystem; - Ethernet bridge; - Networking core; - IPv4 networking; - IPv6 networking; - Multipath TCP; - Netfilter; - NET/ROM layer; - NFC subsystem; - NSH protocol; - Open vSwitch; - Phonet protocol; - SMC sockets; - TIPC protocol; - Unix domain sockets; - Wireless networking; - Key management; - ALSA framework; - HD-audio driver; - Kirkwood ASoC drivers; - MediaTek ASoC drivers; (CVE-2024-36006, CVE-2024-36922, CVE-2024-38567, CVE-2024-38584, CVE-2024-36923, CVE-2024-36892, CVE-2024-35855, CVE-2024-35853, CVE-2024-38562, CVE-2024-36920, CVE-2024-38543, CVE-2024-38576, CVE-2024-38572, CVE-2024-36898, CVE-2024-38560, CVE-2024-36004, CVE-2024-36956, CVE-2024-36881, CVE-2024-36977, CVE-2024-36955, CVE-2024-36906, CVE-2024-36013, CVE-2024-36884, CVE-2024-38563, CVE-2024-36966, CVE-2024-38547, CVE-2024-38594, CVE-2024-36926, CVE-2024-38587, CVE-2024-38566, CVE-2024-27400, CVE-2024-36941, CVE-2024-36017, CVE-2024-38544, CVE-2024-36899, CVE-2024-35851, CVE-2024-38577, CVE-2024-38590, CVE-2024-38568, CVE-2024-38559, CVE-2024-38611, CVE-2024-36887, CVE-2024-36886, CVE-2024-35996, CVE-2024-38612, CVE-2024-36925, CVE-2024-38586, CVE-2024-38596, CVE-2024-36932, CVE-2024-39482, CVE-2024-38585, CVE-2024-36033, CVE-2024-38614, CVE-2024-35852, CVE-2024-36908, CVE-2024-36939, CVE-2024-36963, CVE-2024-27401, CVE-2024-36029, CVE-2024-38540, CVE-2024-38565, CVE-2024-36927, CVE-2024-36910, CVE-2024-42134, CVE-2024-36888, CVE-2024-35859, CVE-2024-36911, CVE-2024-35947, CVE-2024-36940, CVE-2024-36921, CVE-2024-36913, CVE-2024-36943, CVE-2024-35986, CVE-2024-38616, CVE-2024-36900, CVE-2024-36954, CVE-2024-36915, CVE-2024-38602, CVE-2024-41011, CVE-2024-35991, CVE-2024-36909, CVE-2024-38603, CVE-2023-52882, CVE-2024-36953, CVE-2024-38599, CVE-2024-38574, CVE-2024-36967, CVE-2024-36895, CVE-2024-36003, CVE-2024-36961, CVE-2024-38545, CVE-2024-38538, CVE-2024-36001, CVE-2024-36912, CVE-2024-36952, CVE-2024-38550, CVE-2024-38570, CVE-2024-36969, CVE-2024-38595, CVE-2024-35849, CVE-2024-36936, CVE-2024-35949, CVE-2024-36009, CVE-2024-35987, CVE-2024-38541, CVE-2024-38564, CVE-2024-36032, CVE-2024-38615, CVE-2024-36960, CVE-2024-36934, CVE-2024-36951, CVE-2024-35999, CVE-2024-38551, CVE-2024-36903, CVE-2024-36931, CVE-2024-38593, CVE-2024-36938, CVE-2024-38607, CVE-2024-36928, CVE-2024-38552, CVE-2024-36002, CVE-2024-38605, CVE-2024-38582, CVE-2024-36933, CVE-2024-38620, CVE-2024-27395, CVE-2024-27396, CVE-2024-36012, CVE-2024-38591, CVE-2024-38597, CVE-2024-36889, CVE-2024-36964, CVE-2024-38606, CVE-2024-38553, CVE-2024-36945, CVE-2024-35848, CVE-2024-36962, CVE-2024-36947, CVE-2024-27399, CVE-2024-38546, CVE-2024-38583, CVE-2024-38573, CVE-2024-35850, CVE-2024-38549, CVE-2024-38588, CVE-2024-38610, CVE-2024-36917, CVE-2024-36957, CVE-2024-35846, CVE-2024-38579, CVE-2024-36965, CVE-2024-35857, CVE-2024-38548, CVE-2024-36975, CVE-2024-36919, CVE-2024-38542, CVE-2024-36948, CVE-2024-36011, CVE-2024-38556, CVE-2024-36897, CVE-2024-38557, CVE-2024-36890, CVE-2024-36882, CVE-2024-38613, CVE-2024-36914, CVE-2024-35998, CVE-2024-36958, CVE-2024-38580, CVE-2024-36896, CVE-2024-36891, CVE-2024-36924, CVE-2024-38589, CVE-2024-38592, CVE-2024-36904, CVE-2024-36894, CVE-2024-36028, CVE-2024-36014, CVE-2024-36880, CVE-2024-36944, CVE-2024-38598, CVE-2024-36929, CVE-2024-36883, CVE-2024-35858, CVE-2024-38555, CVE-2024-36005, CVE-2024-38539, CVE-2024-35994, CVE-2024-36030, CVE-2024-27394, CVE-2024-36930, CVE-2024-36937, CVE-2024-38561, CVE-2024-38578, CVE-2024-36959, CVE-2024-36935, CVE-2024-36916, CVE-2024-36902, CVE-2024-38604, CVE-2024-38554, CVE-2024-38575, CVE-2024-36918, CVE-2024-36979, CVE-2024-35854, CVE-2024-36968, CVE-2024-38558, CVE-2024-36000, CVE-2024-27398, CVE-2024-35983, CVE-2024-36949, CVE-2024-38600, CVE-2024-36950, CVE-2024-36946, CVE-2024-36031, CVE-2024-35847, CVE-2024-36905, CVE-2024-38571, CVE-2024-36007, CVE-2024-35856, CVE-2024-38601, CVE-2024-38569, CVE-2024-38617, CVE-2024-35988, CVE-2024-35989, CVE-2024-35993, CVE-2024-36893, CVE-2024-36901) Update Instructions: Run `sudo pro fix USN-6949-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1009-raspi - 6.8.0-1009.10 linux-headers-6.8.0-1009-raspi - 6.8.0-1009.10 linux-headers-raspi - 6.8.0-1009.10 linux-image-6.8.0-1009-raspi - 6.8.0-1009.10 linux-image-raspi - 6.8.0-1009.10 linux-modules-6.8.0-1009-raspi - 6.8.0-1009.10 linux-raspi - 6.8.0-1009.10 linux-raspi-headers-6.8.0-1009 - 6.8.0-1009.10 linux-raspi-tools-6.8.0-1009 - 6.8.0-1009.10 linux-tools-6.8.0-1009-raspi - 6.8.0-1009.10 linux-tools-raspi - 6.8.0-1009.10 No subscription required linux-buildinfo-6.8.0-40-lowlatency - 6.8.0-40.40.1 linux-buildinfo-6.8.0-40-lowlatency-64k - 6.8.0-40.40.1 linux-cloud-tools-6.8.0-40-lowlatency - 6.8.0-40.40.1 linux-cloud-tools-lowlatency - 6.8.0-40.40.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-40.40.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-40.40.1 linux-cloud-tools-lowlatency-hwe-22.04 - 6.8.0-40.40.1 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.8.0-40.40.1 linux-headers-6.8.0-40-lowlatency - 6.8.0-40.40.1 linux-headers-6.8.0-40-lowlatency-64k - 6.8.0-40.40.1 linux-headers-lowlatency - 6.8.0-40.40.1 linux-headers-lowlatency-64k - 6.8.0-40.40.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-40.40.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-40.40.1 linux-headers-lowlatency-64k-hwe-22.04 - 6.8.0-40.40.1 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.8.0-40.40.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-40.40.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-40.40.1 linux-headers-lowlatency-hwe-22.04 - 6.8.0-40.40.1 linux-headers-lowlatency-hwe-22.04-edge - 6.8.0-40.40.1 linux-image-6.8.0-40-lowlatency - 6.8.0-40.40.1 linux-image-6.8.0-40-lowlatency-64k - 6.8.0-40.40.1 linux-image-lowlatency - 6.8.0-40.40.1 linux-image-lowlatency-64k - 6.8.0-40.40.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-40.40.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-40.40.1 linux-image-lowlatency-64k-hwe-22.04 - 6.8.0-40.40.1 linux-image-lowlatency-64k-hwe-22.04-edge - 6.8.0-40.40.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-40.40.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-40.40.1 linux-image-lowlatency-hwe-22.04 - 6.8.0-40.40.1 linux-image-lowlatency-hwe-22.04-edge - 6.8.0-40.40.1 linux-image-unsigned-6.8.0-40-lowlatency - 6.8.0-40.40.1 linux-image-unsigned-6.8.0-40-lowlatency-64k - 6.8.0-40.40.1 linux-lowlatency - 6.8.0-40.40.1 linux-lowlatency-64k - 6.8.0-40.40.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-40.40.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-40.40.1 linux-lowlatency-64k-hwe-22.04 - 6.8.0-40.40.1 linux-lowlatency-64k-hwe-22.04-edge - 6.8.0-40.40.1 linux-lowlatency-cloud-tools-6.8.0-40 - 6.8.0-40.40.1 linux-lowlatency-cloud-tools-common - 6.8.0-40.40.1 linux-lowlatency-headers-6.8.0-40 - 6.8.0-40.40.1 linux-lowlatency-hwe-20.04 - 6.8.0-40.40.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-40.40.1 linux-lowlatency-hwe-22.04 - 6.8.0-40.40.1 linux-lowlatency-hwe-22.04-edge - 6.8.0-40.40.1 linux-lowlatency-lib-rust-6.8.0-40-lowlatency - 6.8.0-40.40.1 linux-lowlatency-tools-6.8.0-40 - 6.8.0-40.40.1 linux-lowlatency-tools-common - 6.8.0-40.40.1 linux-lowlatency-tools-host - 6.8.0-40.40.1 linux-modules-6.8.0-40-lowlatency - 6.8.0-40.40.1 linux-modules-6.8.0-40-lowlatency-64k - 6.8.0-40.40.1 linux-modules-iwlwifi-6.8.0-40-lowlatency - 6.8.0-40.40.1 linux-modules-iwlwifi-lowlatency - 6.8.0-40.40.1 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.8.0-40.40.1 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.8.0-40.40.1 linux-tools-6.8.0-40-lowlatency - 6.8.0-40.40.1 linux-tools-6.8.0-40-lowlatency-64k - 6.8.0-40.40.1 linux-tools-lowlatency - 6.8.0-40.40.1 linux-tools-lowlatency-64k - 6.8.0-40.40.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-40.40.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-40.40.1 linux-tools-lowlatency-64k-hwe-22.04 - 6.8.0-40.40.1 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.8.0-40.40.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-40.40.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-40.40.1 linux-tools-lowlatency-hwe-22.04 - 6.8.0-40.40.1 linux-tools-lowlatency-hwe-22.04-edge - 6.8.0-40.40.1 No subscription required
High
CVE-2023-52882
CVE-2024-27394
CVE-2024-27395
CVE-2024-27396
CVE-2024-27398
CVE-2024-27399
CVE-2024-27400
CVE-2024-27401
CVE-2024-35846
CVE-2024-35847
CVE-2024-35848
CVE-2024-35849
CVE-2024-35850
CVE-2024-35851
CVE-2024-35852
CVE-2024-35853
CVE-2024-35854
CVE-2024-35855
CVE-2024-35856
CVE-2024-35857
CVE-2024-35858
CVE-2024-35859
CVE-2024-35947
CVE-2024-35949
CVE-2024-35983
CVE-2024-35986
CVE-2024-35987
CVE-2024-35988
CVE-2024-35989
CVE-2024-35991
CVE-2024-35993
CVE-2024-35994
CVE-2024-35996
CVE-2024-35998
CVE-2024-35999
CVE-2024-36000
CVE-2024-36001
CVE-2024-36002
CVE-2024-36003
CVE-2024-36004
CVE-2024-36005
CVE-2024-36006
CVE-2024-36007
CVE-2024-36009
CVE-2024-36011
CVE-2024-36012
CVE-2024-36013
CVE-2024-36014
CVE-2024-36017
CVE-2024-36028
CVE-2024-36029
CVE-2024-36030
CVE-2024-36031
CVE-2024-36032
CVE-2024-36033
CVE-2024-36880
CVE-2024-36881
CVE-2024-36882
CVE-2024-36883
CVE-2024-36884
CVE-2024-36886
CVE-2024-36887
CVE-2024-36888
CVE-2024-36889
CVE-2024-36890
CVE-2024-36891
CVE-2024-36892
CVE-2024-36893
CVE-2024-36894
CVE-2024-36895
CVE-2024-36896
CVE-2024-36897
CVE-2024-36898
CVE-2024-36899
CVE-2024-36900
CVE-2024-36901
CVE-2024-36902
CVE-2024-36903
CVE-2024-36904
CVE-2024-36905
CVE-2024-36906
CVE-2024-36908
CVE-2024-36909
CVE-2024-36910
CVE-2024-36911
CVE-2024-36912
CVE-2024-36913
CVE-2024-36914
CVE-2024-36915
CVE-2024-36916
CVE-2024-36917
CVE-2024-36918
CVE-2024-36919
CVE-2024-36920
CVE-2024-36921
CVE-2024-36922
CVE-2024-36923
CVE-2024-36924
CVE-2024-36925
CVE-2024-36926
CVE-2024-36927
CVE-2024-36928
CVE-2024-36929
CVE-2024-36930
CVE-2024-36931
CVE-2024-36932
CVE-2024-36933
CVE-2024-36934
CVE-2024-36935
CVE-2024-36936
CVE-2024-36937
CVE-2024-36938
CVE-2024-36939
CVE-2024-36940
CVE-2024-36941
CVE-2024-36943
CVE-2024-36944
CVE-2024-36945
CVE-2024-36946
CVE-2024-36947
CVE-2024-36948
CVE-2024-36949
CVE-2024-36950
CVE-2024-36951
CVE-2024-36952
CVE-2024-36953
CVE-2024-36954
CVE-2024-36955
CVE-2024-36956
CVE-2024-36957
CVE-2024-36958
CVE-2024-36959
CVE-2024-36960
CVE-2024-36961
CVE-2024-36962
CVE-2024-36963
CVE-2024-36964
CVE-2024-36965
CVE-2024-36966
CVE-2024-36967
CVE-2024-36968
CVE-2024-36969
CVE-2024-36975
CVE-2024-36977
CVE-2024-36979
CVE-2024-38538
CVE-2024-38539
CVE-2024-38540
CVE-2024-38541
CVE-2024-38542
CVE-2024-38543
CVE-2024-38544
CVE-2024-38545
CVE-2024-38546
CVE-2024-38547
CVE-2024-38548
CVE-2024-38549
CVE-2024-38550
CVE-2024-38551
CVE-2024-38552
CVE-2024-38553
CVE-2024-38554
CVE-2024-38555
CVE-2024-38556
CVE-2024-38557
CVE-2024-38558
CVE-2024-38559
CVE-2024-38560
CVE-2024-38561
CVE-2024-38562
CVE-2024-38563
CVE-2024-38564
CVE-2024-38565
CVE-2024-38566
CVE-2024-38567
CVE-2024-38568
CVE-2024-38569
CVE-2024-38570
CVE-2024-38571
CVE-2024-38572
CVE-2024-38573
CVE-2024-38574
CVE-2024-38575
CVE-2024-38576
CVE-2024-38577
CVE-2024-38578
CVE-2024-38579
CVE-2024-38580
CVE-2024-38582
CVE-2024-38583
CVE-2024-38584
CVE-2024-38585
CVE-2024-38586
CVE-2024-38587
CVE-2024-38588
CVE-2024-38589
CVE-2024-38590
CVE-2024-38591
CVE-2024-38592
CVE-2024-38593
CVE-2024-38594
CVE-2024-38595
CVE-2024-38596
CVE-2024-38597
CVE-2024-38598
CVE-2024-38599
CVE-2024-38600
CVE-2024-38601
CVE-2024-38602
CVE-2024-38603
CVE-2024-38604
CVE-2024-38605
CVE-2024-38606
CVE-2024-38607
CVE-2024-38610
CVE-2024-38611
CVE-2024-38612
CVE-2024-38613
CVE-2024-38614
CVE-2024-38615
CVE-2024-38616
CVE-2024-38617
CVE-2024-38620
CVE-2024-39482
CVE-2024-41011
CVE-2024-42134
USN-6952-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Benedict Schlüter, Supraja Sridhara, Andrin Bertschi, and Shweta Shinde discovered that an untrusted hypervisor could inject malicious #VC interrupts and compromise the security guarantees of AMD SEV-SNP. This flaw is known as WeSee. A local attacker in control of the hypervisor could use this to expose sensitive information or possibly execute arbitrary code in the trusted execution environment. (CVE-2024-25742) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - ARM64 architecture; - M68K architecture; - OpenRISC architecture; - PowerPC architecture; - RISC-V architecture; - x86 architecture; - Block layer subsystem; - Accessibility subsystem; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - DMA engine subsystem; - DPLL subsystem; - FireWire subsystem; - EFI core; - Qualcomm firmware drivers; - GPIO subsystem; - GPU drivers; - HID subsystem; - Microsoft Hyper-V drivers; - I2C subsystem; - InfiniBand drivers; - IOMMU subsystem; - IRQ chip drivers; - Macintosh device drivers; - Multiple devices driver; - Media drivers; - EEPROM drivers; - MMC subsystem; - Network drivers; - STMicroelectronics network drivers; - Device tree and open firmware driver; - HiSilicon SoC PMU drivers; - PHY drivers; - Pin controllers subsystem; - Remote Processor subsystem; - S/390 drivers; - SCSI drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - TTY drivers; - Userspace I/O drivers; - USB subsystem; - DesignWare USB3 driver; - ACRN Hypervisor Service Module driver; - Virtio drivers; - 9P distributed file system; - BTRFS file system; - eCrypt file system; - EROFS file system; - File systems infrastructure; - GFS2 file system; - JFFS2 file system; - Network file systems library; - Network file system client; - Network file system server daemon; - NILFS2 file system; - Proc file system; - SMB network file system; - Tracing file system; - Mellanox drivers; - Memory management; - Socket messages infrastructure; - Slab allocator; - Tracing infrastructure; - User-space API (UAPI); - Core kernel; - BPF subsystem; - DMA mapping infrastructure; - RCU subsystem; - Dynamic debug library; - KUnit library; - Maple Tree data structure library; - Heterogeneous memory management; - Amateur Radio drivers; - Bluetooth subsystem; - Ethernet bridge; - Networking core; - IPv4 networking; - IPv6 networking; - Multipath TCP; - Netfilter; - NET/ROM layer; - NFC subsystem; - NSH protocol; - Open vSwitch; - Phonet protocol; - SMC sockets; - TIPC protocol; - Unix domain sockets; - Wireless networking; - Key management; - ALSA framework; - HD-audio driver; - Kirkwood ASoC drivers; - MediaTek ASoC drivers; (CVE-2024-38601, CVE-2024-36935, CVE-2024-35991, CVE-2024-36032, CVE-2024-35988, CVE-2024-36886, CVE-2024-36913, CVE-2024-36928, CVE-2024-38553, CVE-2024-36927, CVE-2024-38615, CVE-2024-36958, CVE-2024-36977, CVE-2024-36889, CVE-2024-38554, CVE-2024-38590, CVE-2024-42134, CVE-2024-35857, CVE-2024-35850, CVE-2024-35986, CVE-2024-36921, CVE-2024-38569, CVE-2024-36966, CVE-2024-38542, CVE-2024-38585, CVE-2024-36884, CVE-2024-36006, CVE-2024-38577, CVE-2024-36016, CVE-2024-38584, CVE-2024-36887, CVE-2024-38598, CVE-2024-35994, CVE-2024-38603, CVE-2024-35998, CVE-2024-27401, CVE-2024-35852, CVE-2024-36944, CVE-2024-38572, CVE-2024-36917, CVE-2024-36943, CVE-2024-36009, CVE-2024-38587, CVE-2024-35949, CVE-2024-36945, CVE-2024-36004, CVE-2024-36919, CVE-2024-27398, CVE-2024-38582, CVE-2024-35847, CVE-2024-38580, CVE-2024-38602, CVE-2024-36916, CVE-2024-36903, CVE-2024-38555, CVE-2024-36952, CVE-2024-38589, CVE-2024-27394, CVE-2024-36933, CVE-2024-36975, CVE-2024-38591, CVE-2024-38612, CVE-2024-36939, CVE-2024-35983, CVE-2024-38607, CVE-2024-36929, CVE-2024-35849, CVE-2024-36941, CVE-2024-35858, CVE-2024-38599, CVE-2024-35996, CVE-2024-36031, CVE-2024-36931, CVE-2024-35990, CVE-2024-35851, CVE-2024-38556, CVE-2024-36000, CVE-2024-36910, CVE-2024-38573, CVE-2024-36906, CVE-2024-36951, CVE-2024-38604, CVE-2024-38613, CVE-2024-38547, CVE-2024-36014, CVE-2024-36949, CVE-2024-36033, CVE-2024-38597, CVE-2024-36880, CVE-2024-38594, CVE-2024-36894, CVE-2024-38546, CVE-2024-36947, CVE-2024-38541, CVE-2024-35989, CVE-2024-27399, CVE-2024-38550, CVE-2024-36922, CVE-2024-36008, CVE-2024-38540, CVE-2024-36924, CVE-2024-36892, CVE-2024-38549, CVE-2024-36882, CVE-2024-36908, CVE-2024-38566, CVE-2024-36005, CVE-2024-38583, CVE-2024-36968, CVE-2024-36017, CVE-2024-38565, CVE-2024-36881, CVE-2024-38611, CVE-2024-36897, CVE-2024-38560, CVE-2024-36923, CVE-2024-38575, CVE-2024-36899, CVE-2024-38570, CVE-2024-36898, CVE-2024-36896, CVE-2024-38559, CVE-2024-38588, CVE-2024-38606, CVE-2024-38551, CVE-2024-36891, CVE-2024-38567, CVE-2024-36895, CVE-2024-35993, CVE-2024-38552, CVE-2024-36925, CVE-2024-36964, CVE-2024-36888, CVE-2024-36956, CVE-2024-36946, CVE-2024-38600, CVE-2024-35997, CVE-2024-36912, CVE-2024-35984, CVE-2024-35848, CVE-2024-38545, CVE-2024-38563, CVE-2024-36918, CVE-2024-36001, CVE-2024-36957, CVE-2024-38576, CVE-2024-36030, CVE-2024-38574, CVE-2024-36963, CVE-2024-36890, CVE-2024-36960, CVE-2024-36901, CVE-2024-38614, CVE-2024-35859, CVE-2024-38593, CVE-2024-36904, CVE-2024-36012, CVE-2024-38578, CVE-2024-36011, CVE-2024-36930, CVE-2024-36938, CVE-2024-36893, CVE-2024-35987, CVE-2024-36905, CVE-2024-35853, CVE-2024-36003, CVE-2024-38562, CVE-2024-38617, CVE-2024-35855, CVE-2024-36965, CVE-2024-38596, CVE-2024-38558, CVE-2024-38568, CVE-2024-36955, CVE-2024-36029, CVE-2024-36967, CVE-2024-36940, CVE-2024-38595, CVE-2024-36028, CVE-2024-38610, CVE-2024-36911, CVE-2024-35999, CVE-2024-35854, CVE-2024-38571, CVE-2024-38548, CVE-2024-36948, CVE-2024-36002, CVE-2024-36961, CVE-2024-36900, CVE-2024-36932, CVE-2024-36902, CVE-2024-35992, CVE-2024-36914, CVE-2024-38592, CVE-2024-38616, CVE-2024-27400, CVE-2024-36937, CVE-2024-36920, CVE-2024-38586, CVE-2024-36909, CVE-2024-35846, CVE-2024-39482, CVE-2024-38579, CVE-2024-38539, CVE-2024-27395, CVE-2024-36962, CVE-2024-36013, CVE-2024-27396, CVE-2024-38557, CVE-2024-36953, CVE-2024-41011, CVE-2023-52882, CVE-2024-36969, CVE-2024-36007, CVE-2024-35856, CVE-2024-38605, CVE-2024-36915, CVE-2024-36979, CVE-2024-36954, CVE-2024-38538, CVE-2024-36950, CVE-2024-36926, CVE-2024-38544, CVE-2024-36959, CVE-2024-38561, CVE-2024-36883, CVE-2024-36936, CVE-2024-38564, CVE-2024-38543, CVE-2024-36934, CVE-2024-35947, CVE-2024-38620) Update Instructions: Run `sudo pro fix USN-6952-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1010-oracle - 6.8.0-1010.10 linux-buildinfo-6.8.0-1010-oracle-64k - 6.8.0-1010.10 linux-headers-6.8.0-1010-oracle - 6.8.0-1010.10 linux-headers-6.8.0-1010-oracle-64k - 6.8.0-1010.10 linux-headers-oracle - 6.8.0-1010.10 linux-headers-oracle-64k - 6.8.0-1010.10 linux-image-6.8.0-1010-oracle - 6.8.0-1010.10 linux-image-6.8.0-1010-oracle-64k - 6.8.0-1010.10 linux-image-oracle - 6.8.0-1010.10 linux-image-oracle-64k - 6.8.0-1010.10 linux-image-unsigned-6.8.0-1010-oracle - 6.8.0-1010.10 linux-image-unsigned-6.8.0-1010-oracle-64k - 6.8.0-1010.10 linux-modules-6.8.0-1010-oracle - 6.8.0-1010.10 linux-modules-6.8.0-1010-oracle-64k - 6.8.0-1010.10 linux-modules-extra-6.8.0-1010-oracle - 6.8.0-1010.10 linux-modules-extra-6.8.0-1010-oracle-64k - 6.8.0-1010.10 linux-modules-iwlwifi-6.8.0-1010-oracle - 6.8.0-1010.10 linux-modules-iwlwifi-oracle - 6.8.0-1010.10 linux-oracle - 6.8.0-1010.10 linux-oracle-64k - 6.8.0-1010.10 linux-oracle-headers-6.8.0-1010 - 6.8.0-1010.10 linux-oracle-tools-6.8.0-1010 - 6.8.0-1010.10 linux-tools-6.8.0-1010-oracle - 6.8.0-1010.10 linux-tools-6.8.0-1010-oracle-64k - 6.8.0-1010.10 linux-tools-oracle - 6.8.0-1010.10 linux-tools-oracle-64k - 6.8.0-1010.10 No subscription required linux-buildinfo-6.8.0-1011-nvidia-lowlatency - 6.8.0-1011.11.1 linux-buildinfo-6.8.0-1011-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1011.11.1 linux-headers-6.8.0-1011-nvidia-lowlatency - 6.8.0-1011.11.1 linux-headers-6.8.0-1011-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-headers-nvidia-lowlatency - 6.8.0-1011.11.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-image-6.8.0-1011-nvidia-lowlatency - 6.8.0-1011.11.1 linux-image-6.8.0-1011-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-image-nvidia-lowlatency - 6.8.0-1011.11.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-image-uc-6.8.0-1011-nvidia-lowlatency - 6.8.0-1011.11.1 linux-image-uc-6.8.0-1011-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-image-unsigned-6.8.0-1011-nvidia-lowlatency - 6.8.0-1011.11.1 linux-image-unsigned-6.8.0-1011-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-modules-6.8.0-1011-nvidia-lowlatency - 6.8.0-1011.11.1 linux-modules-6.8.0-1011-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-modules-extra-6.8.0-1011-nvidia-lowlatency - 6.8.0-1011.11.1 linux-modules-nvidia-fs-6.8.0-1011-nvidia-lowlatency - 6.8.0-1011.11.1 linux-modules-nvidia-fs-6.8.0-1011-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1011.11.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-nvidia-lowlatency - 6.8.0-1011.11.1 linux-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-nvidia-lowlatency-headers-6.8.0-1011 - 6.8.0-1011.11.1 linux-nvidia-lowlatency-tools-6.8.0-1011 - 6.8.0-1011.11.1 linux-nvidia-lowlatency-tools-host - 6.8.0-1011.11.1 linux-tools-6.8.0-1011-nvidia-lowlatency - 6.8.0-1011.11.1 linux-tools-6.8.0-1011-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-tools-nvidia-lowlatency - 6.8.0-1011.11.1 linux-tools-nvidia-lowlatency-64k - 6.8.0-1011.11.1 No subscription required
High
CVE-2023-52882
CVE-2024-25742
CVE-2024-27394
CVE-2024-27395
CVE-2024-27396
CVE-2024-27398
CVE-2024-27399
CVE-2024-27400
CVE-2024-27401
CVE-2024-35846
CVE-2024-35847
CVE-2024-35848
CVE-2024-35849
CVE-2024-35850
CVE-2024-35851
CVE-2024-35852
CVE-2024-35853
CVE-2024-35854
CVE-2024-35855
CVE-2024-35856
CVE-2024-35857
CVE-2024-35858
CVE-2024-35859
CVE-2024-35947
CVE-2024-35949
CVE-2024-35983
CVE-2024-35984
CVE-2024-35986
CVE-2024-35987
CVE-2024-35988
CVE-2024-35989
CVE-2024-35990
CVE-2024-35991
CVE-2024-35992
CVE-2024-35993
CVE-2024-35994
CVE-2024-35996
CVE-2024-35997
CVE-2024-35998
CVE-2024-35999
CVE-2024-36000
CVE-2024-36001
CVE-2024-36002
CVE-2024-36003
CVE-2024-36004
CVE-2024-36005
CVE-2024-36006
CVE-2024-36007
CVE-2024-36008
CVE-2024-36009
CVE-2024-36011
CVE-2024-36012
CVE-2024-36013
CVE-2024-36014
CVE-2024-36016
CVE-2024-36017
CVE-2024-36028
CVE-2024-36029
CVE-2024-36030
CVE-2024-36031
CVE-2024-36032
CVE-2024-36033
CVE-2024-36880
CVE-2024-36881
CVE-2024-36882
CVE-2024-36883
CVE-2024-36884
CVE-2024-36886
CVE-2024-36887
CVE-2024-36888
CVE-2024-36889
CVE-2024-36890
CVE-2024-36891
CVE-2024-36892
CVE-2024-36893
CVE-2024-36894
CVE-2024-36895
CVE-2024-36896
CVE-2024-36897
CVE-2024-36898
CVE-2024-36899
CVE-2024-36900
CVE-2024-36901
CVE-2024-36902
CVE-2024-36903
CVE-2024-36904
CVE-2024-36905
CVE-2024-36906
CVE-2024-36908
CVE-2024-36909
CVE-2024-36910
CVE-2024-36911
CVE-2024-36912
CVE-2024-36913
CVE-2024-36914
CVE-2024-36915
CVE-2024-36916
CVE-2024-36917
CVE-2024-36918
CVE-2024-36919
CVE-2024-36920
CVE-2024-36921
CVE-2024-36922
CVE-2024-36923
CVE-2024-36924
CVE-2024-36925
CVE-2024-36926
CVE-2024-36927
CVE-2024-36928
CVE-2024-36929
CVE-2024-36930
CVE-2024-36931
CVE-2024-36932
CVE-2024-36933
CVE-2024-36934
CVE-2024-36935
CVE-2024-36936
CVE-2024-36937
CVE-2024-36938
CVE-2024-36939
CVE-2024-36940
CVE-2024-36941
CVE-2024-36943
CVE-2024-36944
CVE-2024-36945
CVE-2024-36946
CVE-2024-36947
CVE-2024-36948
CVE-2024-36949
CVE-2024-36950
CVE-2024-36951
CVE-2024-36952
CVE-2024-36953
CVE-2024-36954
CVE-2024-36955
CVE-2024-36956
CVE-2024-36957
CVE-2024-36958
CVE-2024-36959
CVE-2024-36960
CVE-2024-36961
CVE-2024-36962
CVE-2024-36963
CVE-2024-36964
CVE-2024-36965
CVE-2024-36966
CVE-2024-36967
CVE-2024-36968
CVE-2024-36969
CVE-2024-36975
CVE-2024-36977
CVE-2024-36979
CVE-2024-38538
CVE-2024-38539
CVE-2024-38540
CVE-2024-38541
CVE-2024-38542
CVE-2024-38543
CVE-2024-38544
CVE-2024-38545
CVE-2024-38546
CVE-2024-38547
CVE-2024-38548
CVE-2024-38549
CVE-2024-38550
CVE-2024-38551
CVE-2024-38552
CVE-2024-38553
CVE-2024-38554
CVE-2024-38555
CVE-2024-38556
CVE-2024-38557
CVE-2024-38558
CVE-2024-38559
CVE-2024-38560
CVE-2024-38561
CVE-2024-38562
CVE-2024-38563
CVE-2024-38564
CVE-2024-38565
CVE-2024-38566
CVE-2024-38567
CVE-2024-38568
CVE-2024-38569
CVE-2024-38570
CVE-2024-38571
CVE-2024-38572
CVE-2024-38573
CVE-2024-38574
CVE-2024-38575
CVE-2024-38576
CVE-2024-38577
CVE-2024-38578
CVE-2024-38579
CVE-2024-38580
CVE-2024-38582
CVE-2024-38583
CVE-2024-38584
CVE-2024-38585
CVE-2024-38586
CVE-2024-38587
CVE-2024-38588
CVE-2024-38589
CVE-2024-38590
CVE-2024-38591
CVE-2024-38592
CVE-2024-38593
CVE-2024-38594
CVE-2024-38595
CVE-2024-38596
CVE-2024-38597
CVE-2024-38598
CVE-2024-38599
CVE-2024-38600
CVE-2024-38601
CVE-2024-38602
CVE-2024-38603
CVE-2024-38604
CVE-2024-38605
CVE-2024-38606
CVE-2024-38607
CVE-2024-38610
CVE-2024-38611
CVE-2024-38612
CVE-2024-38613
CVE-2024-38614
CVE-2024-38615
CVE-2024-38616
CVE-2024-38617
CVE-2024-38620
CVE-2024-39482
CVE-2024-41011
CVE-2024-42134
USN-6952-2 -- Linux kernel (Azure) vulnerabilities
Ubuntu 24.04 LTS
Benedict Schlüter, Supraja Sridhara, Andrin Bertschi, and Shweta Shinde discovered that an untrusted hypervisor could inject malicious #VC interrupts and compromise the security guarantees of AMD SEV-SNP. This flaw is known as WeSee. A local attacker in control of the hypervisor could use this to expose sensitive information or possibly execute arbitrary code in the trusted execution environment. (CVE-2024-25742) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - ARM64 architecture; - M68K architecture; - OpenRISC architecture; - PowerPC architecture; - RISC-V architecture; - x86 architecture; - Block layer subsystem; - Accessibility subsystem; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - DMA engine subsystem; - DPLL subsystem; - FireWire subsystem; - EFI core; - Qualcomm firmware drivers; - GPIO subsystem; - GPU drivers; - HID subsystem; - Microsoft Hyper-V drivers; - I2C subsystem; - InfiniBand drivers; - IOMMU subsystem; - IRQ chip drivers; - Macintosh device drivers; - Multiple devices driver; - Media drivers; - EEPROM drivers; - MMC subsystem; - Network drivers; - STMicroelectronics network drivers; - Device tree and open firmware driver; - HiSilicon SoC PMU drivers; - PHY drivers; - Pin controllers subsystem; - Remote Processor subsystem; - S/390 drivers; - SCSI drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - TTY drivers; - Userspace I/O drivers; - USB subsystem; - DesignWare USB3 driver; - ACRN Hypervisor Service Module driver; - Virtio drivers; - 9P distributed file system; - BTRFS file system; - eCrypt file system; - EROFS file system; - File systems infrastructure; - GFS2 file system; - JFFS2 file system; - Network file systems library; - Network file system client; - Network file system server daemon; - NILFS2 file system; - Proc file system; - SMB network file system; - Tracing file system; - Mellanox drivers; - Memory management; - Socket messages infrastructure; - Slab allocator; - Tracing infrastructure; - User-space API (UAPI); - Core kernel; - BPF subsystem; - DMA mapping infrastructure; - RCU subsystem; - Dynamic debug library; - KUnit library; - Maple Tree data structure library; - Heterogeneous memory management; - Amateur Radio drivers; - Bluetooth subsystem; - Ethernet bridge; - Networking core; - IPv4 networking; - IPv6 networking; - Multipath TCP; - Netfilter; - NET/ROM layer; - NFC subsystem; - NSH protocol; - Open vSwitch; - Phonet protocol; - SMC sockets; - TIPC protocol; - Unix domain sockets; - Wireless networking; - Key management; - ALSA framework; - HD-audio driver; - Kirkwood ASoC drivers; - MediaTek ASoC drivers; (CVE-2024-38601, CVE-2024-36935, CVE-2024-35991, CVE-2024-36032, CVE-2024-35988, CVE-2024-36886, CVE-2024-36913, CVE-2024-36928, CVE-2024-38553, CVE-2024-36927, CVE-2024-38615, CVE-2024-36958, CVE-2024-36977, CVE-2024-36889, CVE-2024-38554, CVE-2024-38590, CVE-2024-42134, CVE-2024-35857, CVE-2024-35850, CVE-2024-35986, CVE-2024-36921, CVE-2024-38569, CVE-2024-36966, CVE-2024-38542, CVE-2024-38585, CVE-2024-36884, CVE-2024-36006, CVE-2024-38577, CVE-2024-36016, CVE-2024-38584, CVE-2024-36887, CVE-2024-38598, CVE-2024-35994, CVE-2024-38603, CVE-2024-35998, CVE-2024-27401, CVE-2024-35852, CVE-2024-36944, CVE-2024-38572, CVE-2024-36917, CVE-2024-36943, CVE-2024-36009, CVE-2024-38587, CVE-2024-35949, CVE-2024-36945, CVE-2024-36004, CVE-2024-36919, CVE-2024-27398, CVE-2024-38582, CVE-2024-35847, CVE-2024-38580, CVE-2024-38602, CVE-2024-36916, CVE-2024-36903, CVE-2024-38555, CVE-2024-36952, CVE-2024-38589, CVE-2024-27394, CVE-2024-36933, CVE-2024-36975, CVE-2024-38591, CVE-2024-38612, CVE-2024-36939, CVE-2024-35983, CVE-2024-38607, CVE-2024-36929, CVE-2024-35849, CVE-2024-36941, CVE-2024-35858, CVE-2024-38599, CVE-2024-35996, CVE-2024-36031, CVE-2024-36931, CVE-2024-35990, CVE-2024-35851, CVE-2024-38556, CVE-2024-36000, CVE-2024-36910, CVE-2024-38573, CVE-2024-36906, CVE-2024-36951, CVE-2024-38604, CVE-2024-38613, CVE-2024-38547, CVE-2024-36014, CVE-2024-36949, CVE-2024-36033, CVE-2024-38597, CVE-2024-36880, CVE-2024-38594, CVE-2024-36894, CVE-2024-38546, CVE-2024-36947, CVE-2024-38541, CVE-2024-35989, CVE-2024-27399, CVE-2024-38550, CVE-2024-36922, CVE-2024-36008, CVE-2024-38540, CVE-2024-36924, CVE-2024-36892, CVE-2024-38549, CVE-2024-36882, CVE-2024-36908, CVE-2024-38566, CVE-2024-36005, CVE-2024-38583, CVE-2024-36968, CVE-2024-36017, CVE-2024-38565, CVE-2024-36881, CVE-2024-38611, CVE-2024-36897, CVE-2024-38560, CVE-2024-36923, CVE-2024-38575, CVE-2024-36899, CVE-2024-38570, CVE-2024-36898, CVE-2024-36896, CVE-2024-38559, CVE-2024-38588, CVE-2024-38606, CVE-2024-38551, CVE-2024-36891, CVE-2024-38567, CVE-2024-36895, CVE-2024-35993, CVE-2024-38552, CVE-2024-36925, CVE-2024-36964, CVE-2024-36888, CVE-2024-36956, CVE-2024-36946, CVE-2024-38600, CVE-2024-35997, CVE-2024-36912, CVE-2024-35984, CVE-2024-35848, CVE-2024-38545, CVE-2024-38563, CVE-2024-36918, CVE-2024-36001, CVE-2024-36957, CVE-2024-38576, CVE-2024-36030, CVE-2024-38574, CVE-2024-36963, CVE-2024-36890, CVE-2024-36960, CVE-2024-36901, CVE-2024-38614, CVE-2024-35859, CVE-2024-38593, CVE-2024-36904, CVE-2024-36012, CVE-2024-38578, CVE-2024-36011, CVE-2024-36930, CVE-2024-36938, CVE-2024-36893, CVE-2024-35987, CVE-2024-36905, CVE-2024-35853, CVE-2024-36003, CVE-2024-38562, CVE-2024-38617, CVE-2024-35855, CVE-2024-36965, CVE-2024-38596, CVE-2024-38558, CVE-2024-38568, CVE-2024-36955, CVE-2024-36029, CVE-2024-36967, CVE-2024-36940, CVE-2024-38595, CVE-2024-36028, CVE-2024-38610, CVE-2024-36911, CVE-2024-35999, CVE-2024-35854, CVE-2024-38571, CVE-2024-38548, CVE-2024-36948, CVE-2024-36002, CVE-2024-36961, CVE-2024-36900, CVE-2024-36932, CVE-2024-36902, CVE-2024-35992, CVE-2024-36914, CVE-2024-38592, CVE-2024-38616, CVE-2024-27400, CVE-2024-36937, CVE-2024-36920, CVE-2024-38586, CVE-2024-36909, CVE-2024-35846, CVE-2024-39482, CVE-2024-38579, CVE-2024-38539, CVE-2024-27395, CVE-2024-36962, CVE-2024-36013, CVE-2024-27396, CVE-2024-38557, CVE-2024-36953, CVE-2024-41011, CVE-2023-52882, CVE-2024-36969, CVE-2024-36007, CVE-2024-35856, CVE-2024-38605, CVE-2024-36915, CVE-2024-36979, CVE-2024-36954, CVE-2024-38538, CVE-2024-36950, CVE-2024-36926, CVE-2024-38544, CVE-2024-36959, CVE-2024-38561, CVE-2024-36883, CVE-2024-36936, CVE-2024-38564, CVE-2024-38543, CVE-2024-36934, CVE-2024-35947, CVE-2024-38620) Update Instructions: Run `sudo pro fix USN-6952-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-azure - 6.8.0-1012.14 linux-azure-cloud-tools-6.8.0-1012 - 6.8.0-1012.14 linux-azure-fde - 6.8.0-1012.14 linux-azure-headers-6.8.0-1012 - 6.8.0-1012.14 linux-azure-tools-6.8.0-1012 - 6.8.0-1012.14 linux-buildinfo-6.8.0-1012-azure - 6.8.0-1012.14 linux-cloud-tools-6.8.0-1012-azure - 6.8.0-1012.14 linux-cloud-tools-azure - 6.8.0-1012.14 linux-headers-6.8.0-1012-azure - 6.8.0-1012.14 linux-headers-azure - 6.8.0-1012.14 linux-image-6.8.0-1012-azure - 6.8.0-1012.14 linux-image-6.8.0-1012-azure-fde - 6.8.0-1012.14 linux-image-azure - 6.8.0-1012.14 linux-image-azure-fde - 6.8.0-1012.14 linux-image-unsigned-6.8.0-1012-azure - 6.8.0-1012.14 linux-modules-6.8.0-1012-azure - 6.8.0-1012.14 linux-modules-extra-6.8.0-1012-azure - 6.8.0-1012.14 linux-modules-extra-azure - 6.8.0-1012.14 linux-modules-involflt-6.8.0-1012-azure - 6.8.0-1012.14 linux-modules-involflt-azure - 6.8.0-1012.14 linux-modules-iwlwifi-6.8.0-1012-azure - 6.8.0-1012.14 linux-modules-iwlwifi-azure - 6.8.0-1012.14 linux-tools-6.8.0-1012-azure - 6.8.0-1012.14 linux-tools-azure - 6.8.0-1012.14 No subscription required
High
CVE-2023-52882
CVE-2024-25742
CVE-2024-27394
CVE-2024-27395
CVE-2024-27396
CVE-2024-27398
CVE-2024-27399
CVE-2024-27400
CVE-2024-27401
CVE-2024-35846
CVE-2024-35847
CVE-2024-35848
CVE-2024-35849
CVE-2024-35850
CVE-2024-35851
CVE-2024-35852
CVE-2024-35853
CVE-2024-35854
CVE-2024-35855
CVE-2024-35856
CVE-2024-35857
CVE-2024-35858
CVE-2024-35859
CVE-2024-35947
CVE-2024-35949
CVE-2024-35983
CVE-2024-35984
CVE-2024-35986
CVE-2024-35987
CVE-2024-35988
CVE-2024-35989
CVE-2024-35990
CVE-2024-35991
CVE-2024-35992
CVE-2024-35993
CVE-2024-35994
CVE-2024-35996
CVE-2024-35997
CVE-2024-35998
CVE-2024-35999
CVE-2024-36000
CVE-2024-36001
CVE-2024-36002
CVE-2024-36003
CVE-2024-36004
CVE-2024-36005
CVE-2024-36006
CVE-2024-36007
CVE-2024-36008
CVE-2024-36009
CVE-2024-36011
CVE-2024-36012
CVE-2024-36013
CVE-2024-36014
CVE-2024-36016
CVE-2024-36017
CVE-2024-36028
CVE-2024-36029
CVE-2024-36030
CVE-2024-36031
CVE-2024-36032
CVE-2024-36033
CVE-2024-36880
CVE-2024-36881
CVE-2024-36882
CVE-2024-36883
CVE-2024-36884
CVE-2024-36886
CVE-2024-36887
CVE-2024-36888
CVE-2024-36889
CVE-2024-36890
CVE-2024-36891
CVE-2024-36892
CVE-2024-36893
CVE-2024-36894
CVE-2024-36895
CVE-2024-36896
CVE-2024-36897
CVE-2024-36898
CVE-2024-36899
CVE-2024-36900
CVE-2024-36901
CVE-2024-36902
CVE-2024-36903
CVE-2024-36904
CVE-2024-36905
CVE-2024-36906
CVE-2024-36908
CVE-2024-36909
CVE-2024-36910
CVE-2024-36911
CVE-2024-36912
CVE-2024-36913
CVE-2024-36914
CVE-2024-36915
CVE-2024-36916
CVE-2024-36917
CVE-2024-36918
CVE-2024-36919
CVE-2024-36920
CVE-2024-36921
CVE-2024-36922
CVE-2024-36923
CVE-2024-36924
CVE-2024-36925
CVE-2024-36926
CVE-2024-36927
CVE-2024-36928
CVE-2024-36929
CVE-2024-36930
CVE-2024-36931
CVE-2024-36932
CVE-2024-36933
CVE-2024-36934
CVE-2024-36935
CVE-2024-36936
CVE-2024-36937
CVE-2024-36938
CVE-2024-36939
CVE-2024-36940
CVE-2024-36941
CVE-2024-36943
CVE-2024-36944
CVE-2024-36945
CVE-2024-36946
CVE-2024-36947
CVE-2024-36948
CVE-2024-36949
CVE-2024-36950
CVE-2024-36951
CVE-2024-36952
CVE-2024-36953
CVE-2024-36954
CVE-2024-36955
CVE-2024-36956
CVE-2024-36957
CVE-2024-36958
CVE-2024-36959
CVE-2024-36960
CVE-2024-36961
CVE-2024-36962
CVE-2024-36963
CVE-2024-36964
CVE-2024-36965
CVE-2024-36966
CVE-2024-36967
CVE-2024-36968
CVE-2024-36969
CVE-2024-36975
CVE-2024-36977
CVE-2024-36979
CVE-2024-38538
CVE-2024-38539
CVE-2024-38540
CVE-2024-38541
CVE-2024-38542
CVE-2024-38543
CVE-2024-38544
CVE-2024-38545
CVE-2024-38546
CVE-2024-38547
CVE-2024-38548
CVE-2024-38549
CVE-2024-38550
CVE-2024-38551
CVE-2024-38552
CVE-2024-38553
CVE-2024-38554
CVE-2024-38555
CVE-2024-38556
CVE-2024-38557
CVE-2024-38558
CVE-2024-38559
CVE-2024-38560
CVE-2024-38561
CVE-2024-38562
CVE-2024-38563
CVE-2024-38564
CVE-2024-38565
CVE-2024-38566
CVE-2024-38567
CVE-2024-38568
CVE-2024-38569
CVE-2024-38570
CVE-2024-38571
CVE-2024-38572
CVE-2024-38573
CVE-2024-38574
CVE-2024-38575
CVE-2024-38576
CVE-2024-38577
CVE-2024-38578
CVE-2024-38579
CVE-2024-38580
CVE-2024-38582
CVE-2024-38583
CVE-2024-38584
CVE-2024-38585
CVE-2024-38586
CVE-2024-38587
CVE-2024-38588
CVE-2024-38589
CVE-2024-38590
CVE-2024-38591
CVE-2024-38592
CVE-2024-38593
CVE-2024-38594
CVE-2024-38595
CVE-2024-38596
CVE-2024-38597
CVE-2024-38598
CVE-2024-38599
CVE-2024-38600
CVE-2024-38601
CVE-2024-38602
CVE-2024-38603
CVE-2024-38604
CVE-2024-38605
CVE-2024-38606
CVE-2024-38607
CVE-2024-38610
CVE-2024-38611
CVE-2024-38612
CVE-2024-38613
CVE-2024-38614
CVE-2024-38615
CVE-2024-38616
CVE-2024-38617
CVE-2024-38620
CVE-2024-39482
CVE-2024-41011
CVE-2024-42134
USN-6955-1 -- Linux kernel (OEM) vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - ARM64 architecture; - M68K architecture; - OpenRISC architecture; - PowerPC architecture; - RISC-V architecture; - x86 architecture; - Block layer subsystem; - Accessibility subsystem; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - DMA engine subsystem; - DPLL subsystem; - FireWire subsystem; - EFI core; - Qualcomm firmware drivers; - GPIO subsystem; - GPU drivers; - Microsoft Hyper-V drivers; - InfiniBand drivers; - IOMMU subsystem; - IRQ chip drivers; - Macintosh device drivers; - Multiple devices driver; - Media drivers; - EEPROM drivers; - MMC subsystem; - Network drivers; - STMicroelectronics network drivers; - Device tree and open firmware driver; - HiSilicon SoC PMU drivers; - PHY drivers; - Pin controllers subsystem; - Remote Processor subsystem; - S/390 drivers; - SCSI drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - Userspace I/O drivers; - USB subsystem; - DesignWare USB3 driver; - ACRN Hypervisor Service Module driver; - Virtio drivers; - 9P distributed file system; - BTRFS file system; - eCrypt file system; - EROFS file system; - File systems infrastructure; - GFS2 file system; - JFFS2 file system; - Network file systems library; - Network file system client; - Network file system server daemon; - NILFS2 file system; - Proc file system; - SMB network file system; - Tracing file system; - Mellanox drivers; - Memory management; - Socket messages infrastructure; - Slab allocator; - Tracing infrastructure; - User-space API (UAPI); - Core kernel; - BPF subsystem; - DMA mapping infrastructure; - RCU subsystem; - Dynamic debug library; - KUnit library; - Maple Tree data structure library; - Heterogeneous memory management; - Amateur Radio drivers; - Bluetooth subsystem; - Ethernet bridge; - Networking core; - IPv4 networking; - IPv6 networking; - Multipath TCP; - Netfilter; - NET/ROM layer; - NFC subsystem; - NSH protocol; - Open vSwitch; - Phonet protocol; - SMC sockets; - TIPC protocol; - Unix domain sockets; - Wireless networking; - Key management; - ALSA framework; - HD-audio driver; - Kirkwood ASoC drivers; - MediaTek ASoC drivers; (CVE-2024-35987, CVE-2024-36931, CVE-2024-38614, CVE-2024-35857, CVE-2024-36949, CVE-2024-38599, CVE-2024-35994, CVE-2024-35849, CVE-2024-36916, CVE-2024-38590, CVE-2024-36944, CVE-2024-38561, CVE-2024-38538, CVE-2024-36017, CVE-2024-38593, CVE-2024-36028, CVE-2024-36960, CVE-2024-36002, CVE-2024-36967, CVE-2024-36898, CVE-2024-35989, CVE-2024-36975, CVE-2024-38578, CVE-2024-38582, CVE-2024-38588, CVE-2024-38579, CVE-2024-38617, CVE-2024-36901, CVE-2024-38550, CVE-2023-52882, CVE-2024-38603, CVE-2024-38620, CVE-2024-36956, CVE-2024-36880, CVE-2024-36895, CVE-2024-36979, CVE-2024-36887, CVE-2024-27396, CVE-2024-27400, CVE-2024-36952, CVE-2024-36886, CVE-2024-36905, CVE-2024-36883, CVE-2024-38540, CVE-2024-38605, CVE-2024-36029, CVE-2024-36934, CVE-2024-27395, CVE-2024-36000, CVE-2024-38549, CVE-2024-35999, CVE-2024-38585, CVE-2024-38589, CVE-2024-38565, CVE-2024-36917, CVE-2024-36930, CVE-2024-36940, CVE-2024-36900, CVE-2024-35850, CVE-2024-38592, CVE-2024-38553, CVE-2024-36929, CVE-2024-36915, CVE-2024-36004, CVE-2024-38573, CVE-2024-36941, CVE-2024-38607, CVE-2024-36009, CVE-2024-27398, CVE-2024-36909, CVE-2024-35848, CVE-2024-36950, CVE-2024-38564, CVE-2024-36947, CVE-2024-38613, CVE-2024-38570, CVE-2024-38612, CVE-2024-38580, CVE-2024-38557, CVE-2024-36959, CVE-2024-27399, CVE-2024-41011, CVE-2024-36928, CVE-2024-38543, CVE-2024-38541, CVE-2024-38583, CVE-2024-35855, CVE-2024-38611, CVE-2024-36891, CVE-2024-38587, CVE-2024-35851, CVE-2024-38546, CVE-2024-38596, CVE-2024-35998, CVE-2024-35991, CVE-2024-36965, CVE-2024-36925, CVE-2024-36894, CVE-2024-38567, CVE-2024-38572, CVE-2024-36882, CVE-2024-38594, CVE-2024-38563, CVE-2024-38616, CVE-2024-36951, CVE-2024-36005, CVE-2024-42134, CVE-2024-38602, CVE-2024-36014, CVE-2024-38601, CVE-2024-36001, CVE-2024-38575, CVE-2024-27401, CVE-2024-36961, CVE-2024-38576, CVE-2024-36935, CVE-2024-36893, CVE-2024-38562, CVE-2024-36904, CVE-2024-36939, CVE-2024-38591, CVE-2024-38539, CVE-2024-36030, CVE-2024-36920, CVE-2024-39482, CVE-2024-36977, CVE-2024-36013, CVE-2024-35856, CVE-2024-36922, CVE-2024-36033, CVE-2024-35859, CVE-2024-36919, CVE-2024-35846, CVE-2024-36913, CVE-2024-35854, CVE-2024-36924, CVE-2024-38547, CVE-2024-38551, CVE-2024-36899, CVE-2024-36932, CVE-2024-38545, CVE-2024-36966, CVE-2024-36911, CVE-2024-36946, CVE-2024-36906, CVE-2024-38595, CVE-2024-36012, CVE-2024-38552, CVE-2024-36933, CVE-2024-36936, CVE-2024-38548, CVE-2024-38558, CVE-2024-36006, CVE-2024-36908, CVE-2024-36892, CVE-2024-35988, CVE-2024-35993, CVE-2024-36914, CVE-2024-36896, CVE-2024-38615, CVE-2024-36890, CVE-2024-36969, CVE-2024-38559, CVE-2024-36964, CVE-2024-38560, CVE-2024-38574, CVE-2024-36962, CVE-2024-38542, CVE-2024-36926, CVE-2024-36968, CVE-2024-36032, CVE-2024-38544, CVE-2024-36938, CVE-2024-38597, CVE-2024-38577, CVE-2024-36958, CVE-2024-36945, CVE-2024-36943, CVE-2024-38610, CVE-2024-36927, CVE-2024-38554, CVE-2024-38555, CVE-2024-36031, CVE-2024-36011, CVE-2024-38569, CVE-2024-35847, CVE-2024-36921, CVE-2024-38606, CVE-2024-35949, CVE-2024-35947, CVE-2024-36889, CVE-2024-36884, CVE-2024-36954, CVE-2024-36902, CVE-2024-36007, CVE-2024-38586, CVE-2024-36918, CVE-2024-38571, CVE-2024-36955, CVE-2024-36888, CVE-2024-38556, CVE-2024-38604, CVE-2024-27394, CVE-2024-38600, CVE-2024-35983, CVE-2024-38568, CVE-2024-38566, CVE-2024-35853, CVE-2024-35858, CVE-2024-36910, CVE-2024-36903, CVE-2024-36881, CVE-2024-36937, CVE-2024-36957, CVE-2024-36912, CVE-2024-36948, CVE-2024-36953, CVE-2024-35996, CVE-2024-36963, CVE-2024-36923, CVE-2024-35852, CVE-2024-38598, CVE-2024-36003, CVE-2024-35986, CVE-2024-38584) Update Instructions: Run `sudo pro fix USN-6955-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1010-oem - 6.8.0-1010.10 linux-headers-6.8.0-1010-oem - 6.8.0-1010.10 linux-headers-oem-24.04 - 6.8.0-1010.10 linux-headers-oem-24.04a - 6.8.0-1010.10 linux-image-6.8.0-1010-oem - 6.8.0-1010.10 linux-image-oem-24.04 - 6.8.0-1010.10 linux-image-oem-24.04a - 6.8.0-1010.10 linux-image-uc-6.8.0-1010-oem - 6.8.0-1010.10 linux-image-uc-oem-24.04 - 6.8.0-1010.10 linux-image-uc-oem-24.04a - 6.8.0-1010.10 linux-image-unsigned-6.8.0-1010-oem - 6.8.0-1010.10 linux-modules-6.8.0-1010-oem - 6.8.0-1010.10 linux-modules-ipu6-6.8.0-1010-oem - 6.8.0-1010.10 linux-modules-ipu6-oem-24.04 - 6.8.0-1010.10 linux-modules-ipu6-oem-24.04a - 6.8.0-1010.10 linux-modules-iwlwifi-6.8.0-1010-oem - 6.8.0-1010.10 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1010.10 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1010.10 linux-modules-usbio-6.8.0-1010-oem - 6.8.0-1010.10 linux-modules-usbio-oem-24.04 - 6.8.0-1010.10 linux-modules-usbio-oem-24.04a - 6.8.0-1010.10 linux-oem-24.04 - 6.8.0-1010.10 linux-oem-24.04a - 6.8.0-1010.10 linux-oem-6.8-headers-6.8.0-1010 - 6.8.0-1010.10 linux-oem-6.8-tools-6.8.0-1010 - 6.8.0-1010.10 linux-tools-6.8.0-1010-oem - 6.8.0-1010.10 linux-tools-oem-24.04 - 6.8.0-1010.10 linux-tools-oem-24.04a - 6.8.0-1010.10 No subscription required
High
CVE-2023-52882
CVE-2024-27394
CVE-2024-27395
CVE-2024-27396
CVE-2024-27398
CVE-2024-27399
CVE-2024-27400
CVE-2024-27401
CVE-2024-35846
CVE-2024-35847
CVE-2024-35848
CVE-2024-35849
CVE-2024-35850
CVE-2024-35851
CVE-2024-35852
CVE-2024-35853
CVE-2024-35854
CVE-2024-35855
CVE-2024-35856
CVE-2024-35857
CVE-2024-35858
CVE-2024-35859
CVE-2024-35947
CVE-2024-35949
CVE-2024-35983
CVE-2024-35986
CVE-2024-35987
CVE-2024-35988
CVE-2024-35989
CVE-2024-35991
CVE-2024-35993
CVE-2024-35994
CVE-2024-35996
CVE-2024-35998
CVE-2024-35999
CVE-2024-36000
CVE-2024-36001
CVE-2024-36002
CVE-2024-36003
CVE-2024-36004
CVE-2024-36005
CVE-2024-36006
CVE-2024-36007
CVE-2024-36009
CVE-2024-36011
CVE-2024-36012
CVE-2024-36013
CVE-2024-36014
CVE-2024-36017
CVE-2024-36028
CVE-2024-36029
CVE-2024-36030
CVE-2024-36031
CVE-2024-36032
CVE-2024-36033
CVE-2024-36880
CVE-2024-36881
CVE-2024-36882
CVE-2024-36883
CVE-2024-36884
CVE-2024-36886
CVE-2024-36887
CVE-2024-36888
CVE-2024-36889
CVE-2024-36890
CVE-2024-36891
CVE-2024-36892
CVE-2024-36893
CVE-2024-36894
CVE-2024-36895
CVE-2024-36896
CVE-2024-36898
CVE-2024-36899
CVE-2024-36900
CVE-2024-36901
CVE-2024-36902
CVE-2024-36903
CVE-2024-36904
CVE-2024-36905
CVE-2024-36906
CVE-2024-36908
CVE-2024-36909
CVE-2024-36910
CVE-2024-36911
CVE-2024-36912
CVE-2024-36913
CVE-2024-36914
CVE-2024-36915
CVE-2024-36916
CVE-2024-36917
CVE-2024-36918
CVE-2024-36919
CVE-2024-36920
CVE-2024-36921
CVE-2024-36922
CVE-2024-36923
CVE-2024-36924
CVE-2024-36925
CVE-2024-36926
CVE-2024-36927
CVE-2024-36928
CVE-2024-36929
CVE-2024-36930
CVE-2024-36931
CVE-2024-36932
CVE-2024-36933
CVE-2024-36934
CVE-2024-36935
CVE-2024-36936
CVE-2024-36937
CVE-2024-36938
CVE-2024-36939
CVE-2024-36940
CVE-2024-36941
CVE-2024-36943
CVE-2024-36944
CVE-2024-36945
CVE-2024-36946
CVE-2024-36947
CVE-2024-36948
CVE-2024-36949
CVE-2024-36950
CVE-2024-36951
CVE-2024-36952
CVE-2024-36953
CVE-2024-36954
CVE-2024-36955
CVE-2024-36956
CVE-2024-36957
CVE-2024-36958
CVE-2024-36959
CVE-2024-36960
CVE-2024-36961
CVE-2024-36962
CVE-2024-36963
CVE-2024-36964
CVE-2024-36965
CVE-2024-36966
CVE-2024-36967
CVE-2024-36968
CVE-2024-36969
CVE-2024-36975
CVE-2024-36977
CVE-2024-36979
CVE-2024-38538
CVE-2024-38539
CVE-2024-38540
CVE-2024-38541
CVE-2024-38542
CVE-2024-38543
CVE-2024-38544
CVE-2024-38545
CVE-2024-38546
CVE-2024-38547
CVE-2024-38548
CVE-2024-38549
CVE-2024-38550
CVE-2024-38551
CVE-2024-38552
CVE-2024-38553
CVE-2024-38554
CVE-2024-38555
CVE-2024-38556
CVE-2024-38557
CVE-2024-38558
CVE-2024-38559
CVE-2024-38560
CVE-2024-38561
CVE-2024-38562
CVE-2024-38563
CVE-2024-38564
CVE-2024-38565
CVE-2024-38566
CVE-2024-38567
CVE-2024-38568
CVE-2024-38569
CVE-2024-38570
CVE-2024-38571
CVE-2024-38572
CVE-2024-38573
CVE-2024-38574
CVE-2024-38575
CVE-2024-38576
CVE-2024-38577
CVE-2024-38578
CVE-2024-38579
CVE-2024-38580
CVE-2024-38582
CVE-2024-38583
CVE-2024-38584
CVE-2024-38585
CVE-2024-38586
CVE-2024-38587
CVE-2024-38588
CVE-2024-38589
CVE-2024-38590
CVE-2024-38591
CVE-2024-38592
CVE-2024-38593
CVE-2024-38594
CVE-2024-38595
CVE-2024-38596
CVE-2024-38597
CVE-2024-38598
CVE-2024-38599
CVE-2024-38600
CVE-2024-38601
CVE-2024-38602
CVE-2024-38603
CVE-2024-38604
CVE-2024-38605
CVE-2024-38606
CVE-2024-38607
CVE-2024-38610
CVE-2024-38611
CVE-2024-38612
CVE-2024-38613
CVE-2024-38614
CVE-2024-38615
CVE-2024-38616
CVE-2024-38617
CVE-2024-38620
CVE-2024-39482
CVE-2024-41011
CVE-2024-42134
USN-6959-1 -- .NET vulnerability
Ubuntu 24.04 LTS
It was discovered that .NET suffered from an information disclosure vulnerability. An attacker could potentially use this issue to read targeted email messages. Update Instructions: Run `sudo pro fix USN-6959-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: dotnet-sdk-8.0 - 8.0.108-0ubuntu1~24.04.1 dotnet-sdk-8.0-source-built-artifacts - 8.0.108-0ubuntu1~24.04.1 dotnet-sdk-dbg-8.0 - 8.0.108-0ubuntu1~24.04.1 dotnet-templates-8.0 - 8.0.108-0ubuntu1~24.04.1 netstandard-targeting-pack-2.1-8.0 - 8.0.108-0ubuntu1~24.04.1 No subscription required dotnet8 - 8.0.108-8.0.8-0ubuntu1~24.04.1 No subscription required aspnetcore-runtime-8.0 - 8.0.8-0ubuntu1~24.04.1 aspnetcore-runtime-dbg-8.0 - 8.0.8-0ubuntu1~24.04.1 aspnetcore-targeting-pack-8.0 - 8.0.8-0ubuntu1~24.04.1 dotnet-apphost-pack-8.0 - 8.0.8-0ubuntu1~24.04.1 dotnet-host-8.0 - 8.0.8-0ubuntu1~24.04.1 dotnet-hostfxr-8.0 - 8.0.8-0ubuntu1~24.04.1 dotnet-runtime-8.0 - 8.0.8-0ubuntu1~24.04.1 dotnet-runtime-dbg-8.0 - 8.0.8-0ubuntu1~24.04.1 dotnet-targeting-pack-8.0 - 8.0.8-0ubuntu1~24.04.1 No subscription required
Medium
CVE-2024-38167
USN-6961-1 -- BusyBox vulnerabilities
Ubuntu 24.04 LTS
It was discovered that BusyBox did not properly validate user input when performing certain arithmetic operations. If a user or automated system were tricked into processing a specially crafted file, an attacker could possibly use this issue to cause a denial of service, or execute arbitrary code. (CVE-2022-48174) It was discovered that BusyBox incorrectly managed memory when evaluating certain awk expressions. An attacker could possibly use this issue to cause a denial of service, or execute arbitrary code. This issue only affected Ubuntu 24.04 LTS. (CVE-2023-42363, CVE-2023-42364, CVE-2023-42365) Update Instructions: Run `sudo pro fix USN-6961-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: busybox - 1:1.36.1-6ubuntu3.1 busybox-initramfs - 1:1.36.1-6ubuntu3.1 busybox-static - 1:1.36.1-6ubuntu3.1 busybox-syslogd - 1:1.36.1-6ubuntu3.1 udhcpc - 1:1.36.1-6ubuntu3.1 udhcpd - 1:1.36.1-6ubuntu3.1 No subscription required
Medium
CVE-2022-48174
CVE-2023-42363
CVE-2023-42364
CVE-2023-42365
USN-6962-1 -- LibreOffice vulnerability
Ubuntu 24.04 LTS
It was discovered that LibreOffice incorrectly allowed users to enable macros when a cryptographic signature failed to validate. If a user were tricked into opening a specially crafted document, a remote attacker could possibly execute arbitrary macros. Update Instructions: Run `sudo pro fix USN-6962-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libreoffice-nlpsolver - 4:0.9+LibO24.2.5-0ubuntu0.24.04.2 No subscription required libreoffice-wiki-publisher - 4:1.2.0+LibO24.2.5-0ubuntu0.24.04.2 No subscription required fonts-opensymbol - 4:102.12+LibO24.2.5-0ubuntu0.24.04.2 No subscription required gir1.2-lokdocview-0.1 - 4:24.2.5-0ubuntu0.24.04.2 libjuh-java - 4:24.2.5-0ubuntu0.24.04.2 libjurt-java - 4:24.2.5-0ubuntu0.24.04.2 liblibreoffice-java - 4:24.2.5-0ubuntu0.24.04.2 liblibreofficekitgtk - 4:24.2.5-0ubuntu0.24.04.2 libofficebean-java - 4:24.2.5-0ubuntu0.24.04.2 libreoffice - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-base - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-base-core - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-base-drivers - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-base-nogui - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-calc - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-calc-nogui - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-common - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-core - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-core-nogui - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-dev - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-dev-common - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-dev-doc - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-dev-gui - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-draw - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-draw-nogui - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-evolution - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-gnome - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-gtk3 - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-gtk4 - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-ca - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-common - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-cs - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-da - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-de - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-dz - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-el - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-en-gb - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-en-us - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-es - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-et - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-eu - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-fi - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-fr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-gl - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-hi - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-hu - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-id - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-it - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-ja - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-km - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-ko - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-nl - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-om - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-pl - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-pt - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-pt-br - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-ru - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-sk - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-sl - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-sv - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-tr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-vi - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-zh-cn - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-zh-tw - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-impress - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-impress-nogui - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-java-common - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-kf5 - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-af - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-am - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ar - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-as - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ast - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-be - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-bg - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-bn - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-br - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-bs - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ca - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-cs - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-cy - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-da - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-de - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-dz - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-el - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-en-gb - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-en-za - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-eo - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-es - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-et - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-eu - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-fa - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-fi - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-fr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ga - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-gd - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-gl - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-gu - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-gug - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-he - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-hi - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-hr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-hu - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-hy - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-id - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-in - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-is - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-it - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ja - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ka - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-kk - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-km - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-kmr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-kn - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ko - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-lt - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-lv - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-mk - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ml - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-mn - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-mr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-nb - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ne - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-nl - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-nn - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-nr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-nso - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-oc - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-om - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-or - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-pa-in - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-pl - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-pt - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-pt-br - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ro - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ru - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-rw - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-si - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-sk - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-sl - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-sr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ss - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-st - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-sv - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-szl - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ta - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-te - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-tg - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-th - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-tn - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-tr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ts - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ug - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-uk - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-uz - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ve - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-vi - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-xh - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-za - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-zh-cn - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-zh-tw - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-zu - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-librelogo - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-math - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-math-nogui - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-nogui - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-officebean - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-plasma - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-qt5 - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-qt6 - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-report-builder - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-report-builder-bin - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-report-builder-bin-nogui - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-script-provider-bsh - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-script-provider-js - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-script-provider-python - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-sdbc-firebird - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-sdbc-hsqldb - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-sdbc-mysql - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-sdbc-postgresql - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-smoketest-data - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-style-breeze - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-style-colibre - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-style-elementary - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-style-karasa-jaga - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-style-sifr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-style-sukapura - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-style-tango - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-style-yaru - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-subsequentcheckbase - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-uiconfig-base - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-uiconfig-calc - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-uiconfig-common - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-uiconfig-draw - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-uiconfig-impress - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-uiconfig-math - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-uiconfig-report-builder - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-uiconfig-writer - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-writer - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-writer-nogui - 4:24.2.5-0ubuntu0.24.04.2 libreofficekit-data - 4:24.2.5-0ubuntu0.24.04.2 libreofficekit-dev - 4:24.2.5-0ubuntu0.24.04.2 libridl-java - 4:24.2.5-0ubuntu0.24.04.2 libuno-cppu3t64 - 4:24.2.5-0ubuntu0.24.04.2 libuno-cppuhelpergcc3-3t64 - 4:24.2.5-0ubuntu0.24.04.2 libuno-purpenvhelpergcc3-3t64 - 4:24.2.5-0ubuntu0.24.04.2 libuno-sal3t64 - 4:24.2.5-0ubuntu0.24.04.2 libuno-salhelpergcc3-3t64 - 4:24.2.5-0ubuntu0.24.04.2 libunoil-java - 4:24.2.5-0ubuntu0.24.04.2 libunoloader-java - 4:24.2.5-0ubuntu0.24.04.2 python3-access2base - 4:24.2.5-0ubuntu0.24.04.2 python3-scriptforge - 4:24.2.5-0ubuntu0.24.04.2 python3-uno - 4:24.2.5-0ubuntu0.24.04.2 uno-libs-private - 4:24.2.5-0ubuntu0.24.04.2 ure - 4:24.2.5-0ubuntu0.24.04.2 ure-java - 4:24.2.5-0ubuntu0.24.04.2 No subscription required
Medium
CVE-2024-6472
USN-6963-1 -- GNOME Shell vulnerability
Ubuntu 24.04 LTS
It was discovered that GNOME Shell incorrectly opened the portal helper automatically when detecting a captive network portal. A remote attacker could possibly use this issue to load arbitrary web pages containing JavaScript, leading to resource consumption or other attacks. Update Instructions: Run `sudo pro fix USN-6963-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gnome-shell - 46.0-0ubuntu6~24.04.3 gnome-shell-common - 46.0-0ubuntu6~24.04.3 gnome-shell-extension-prefs - 46.0-0ubuntu6~24.04.3 No subscription required
Medium
CVE-2024-36472
USN-6964-1 -- ORC vulnerability
Ubuntu 24.04 LTS
Noriko Totsuka discovered that ORC incorrectly handled certain crafted file. An attacker could possibly use this issue to execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6964-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: liborc-0.4-0t64 - 1:0.4.38-1ubuntu0.1 liborc-0.4-dev - 1:0.4.38-1ubuntu0.1 liborc-0.4-dev-bin - 1:0.4.38-1ubuntu0.1 liborc-0.4-doc - 1:0.4.38-1ubuntu0.1 No subscription required
Medium
CVE-2024-40897
USN-6967-1 -- Intel Microcode vulnerabilities
Ubuntu 24.04 LTS
It was discovered that some Intel® Core™ Ultra Processors did not properly isolate the stream cache. A local authenticated user could potentially use this to escalate their privileges. (CVE-2023-42667) It was discovered that some Intel® Processors did not properly isolate the stream cache. A local authenticated user could potentially use this to escalate their privileges. (CVE-2023-49141) It was discovered that some Intel® Processors did not correctly transition between the executive monitor and SMI transfer monitor (STM). A privileged local attacker could use this to escalate their privileges. (CVE-2024-24853) It was discovered that some 3rd, 4th, and 5th Generation Intel® Xeon® Processors failed to properly implement a protection mechanism. A local attacker could use this to potentially escalate their privileges. (CVE-2024-24980) It was discovered that some 3rd Generation Intel Xeon Scalable Processors did not properly handle mirrored regions with different values. A privileged local user could use this to cause a denial of service (system crash). (CVE-2024-25939) Update Instructions: Run `sudo pro fix USN-6967-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: intel-microcode - 3.20240813.0ubuntu0.24.04.2 No subscription required
Medium
CVE-2023-42667
CVE-2023-49141
CVE-2024-24853
CVE-2024-24980
CVE-2024-25939
USN-6968-1 -- PostgreSQL vulnerability
Ubuntu 24.04 LTS
Noah Misch discovered that PostgreSQL incorrectly handled certain SQL objects. An attacker could possibly use this issue to execute arbitrary SQL functions as the superuser. Update Instructions: Run `sudo pro fix USN-6968-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libecpg-compat3 - 16.4-0ubuntu0.24.04.1 libecpg-dev - 16.4-0ubuntu0.24.04.1 libecpg6 - 16.4-0ubuntu0.24.04.1 libpgtypes3 - 16.4-0ubuntu0.24.04.1 libpq-dev - 16.4-0ubuntu0.24.04.1 libpq5 - 16.4-0ubuntu0.24.04.1 postgresql-16 - 16.4-0ubuntu0.24.04.1 postgresql-client-16 - 16.4-0ubuntu0.24.04.1 postgresql-doc-16 - 16.4-0ubuntu0.24.04.1 postgresql-plperl-16 - 16.4-0ubuntu0.24.04.1 postgresql-plpython3-16 - 16.4-0ubuntu0.24.04.1 postgresql-pltcl-16 - 16.4-0ubuntu0.24.04.1 postgresql-server-dev-16 - 16.4-0ubuntu0.24.04.1 No subscription required
Medium
CVE-2024-7348
USN-6969-1 -- Cacti vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Cacti did not properly apply checks to the "Package Import" feature. An attacker could possibly use this issue to perform arbitrary code execution. This issue only affected Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS and Ubuntu 18.04 LTS. (CVE-2024-25641) It was discovered that Cacti did not properly sanitize values when using javascript based API. A remote attacker could possibly use this issue to inject arbitrary javascript code resulting into cross-site scripting vulnerability. This issue only affected Ubuntu 24.04 LTS. (CVE-2024-29894) It was discovered that Cacti did not properly sanitize values when managing data queries. A remote attacker could possibly use this issue to inject arbitrary javascript code resulting into cross-site scripting vulnerability. (CVE-2024-31443) It was discovered that Cacti did not properly sanitize values when reading tree rules with Automation API. A remote attacker could possibly use this issue to inject arbitrary javascript code resulting into cross-site scripting vulnerability. (CVE-2024-31444) It was discovered that Cacti did not properly sanitize "get_request_var('filter')" values in the "api_automation.php" file. A remote attacker could possibly use this issue to perform SQL injection attacks. This issue only affected Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS and Ubuntu 18.04 LTS. (CVE-2024-31445) It was discovered that Cacti did not properly sanitize data stored in "form_save()" function in the "graph_template_inputs.php" file. A remote attacker could possibly use this issue to perform SQL injection attacks. (CVE-2024-31458) It was discovered that Cacti did not properly validate the file urls from the lib/plugin.php file. An attacker could possibly use this issue to perform arbitrary code execution. (CVE-2024-31459) It was discovered that Cacti did not properly validate the data stored in the "automation_tree_rules.php". A remote attacker could possibly use this issue to perform SQL injection attacks. This issue only affected Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS and Ubuntu 18.04 LTS. (CVE-2024-31460) It was discovered that Cacti did not properly verify the user password. An attacker could possibly use this issue to bypass authentication mechanism. This issue only affected Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS and Ubuntu 18.04 LTS. (CVE-2024-34360) Update Instructions: Run `sudo pro fix USN-6969-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: cacti - 1.2.26+ds1-1ubuntu0.1 No subscription required
Medium
CVE-2024-25641
CVE-2024-29894
CVE-2024-31443
CVE-2024-31444
CVE-2024-31445
CVE-2024-31458
CVE-2024-31459
CVE-2024-31460
CVE-2024-34340
USN-6975-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - User-Mode Linux (UML); - MMC subsystem; (CVE-2024-39292, CVE-2024-39484) Update Instructions: Run `sudo pro fix USN-6975-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1009-gke - 6.8.0-1009.12 linux-gke - 6.8.0-1009.12 linux-gke-headers-6.8.0-1009 - 6.8.0-1009.12 linux-gke-tools-6.8.0-1009 - 6.8.0-1009.12 linux-headers-6.8.0-1009-gke - 6.8.0-1009.12 linux-headers-gke - 6.8.0-1009.12 linux-image-6.8.0-1009-gke - 6.8.0-1009.12 linux-image-gke - 6.8.0-1009.12 linux-image-unsigned-6.8.0-1009-gke - 6.8.0-1009.12 linux-modules-6.8.0-1009-gke - 6.8.0-1009.12 linux-modules-extra-6.8.0-1009-gke - 6.8.0-1009.12 linux-modules-iwlwifi-6.8.0-1009-gke - 6.8.0-1009.12 linux-modules-iwlwifi-gke - 6.8.0-1009.12 linux-tools-6.8.0-1009-gke - 6.8.0-1009.12 linux-tools-gke - 6.8.0-1009.12 No subscription required linux-buildinfo-6.8.0-1010-raspi - 6.8.0-1010.11 linux-headers-6.8.0-1010-raspi - 6.8.0-1010.11 linux-headers-raspi - 6.8.0-1010.11 linux-image-6.8.0-1010-raspi - 6.8.0-1010.11 linux-image-raspi - 6.8.0-1010.11 linux-modules-6.8.0-1010-raspi - 6.8.0-1010.11 linux-raspi - 6.8.0-1010.11 linux-raspi-headers-6.8.0-1010 - 6.8.0-1010.11 linux-raspi-tools-6.8.0-1010 - 6.8.0-1010.11 linux-tools-6.8.0-1010-raspi - 6.8.0-1010.11 linux-tools-raspi - 6.8.0-1010.11 No subscription required linux-buildinfo-6.8.0-1011-ibm - 6.8.0-1011.11 linux-buildinfo-6.8.0-1011-oem - 6.8.0-1011.11 linux-buildinfo-6.8.0-1011-oracle - 6.8.0-1011.11 linux-buildinfo-6.8.0-1011-oracle-64k - 6.8.0-1011.11 linux-headers-6.8.0-1011-ibm - 6.8.0-1011.11 linux-headers-6.8.0-1011-oem - 6.8.0-1011.11 linux-headers-6.8.0-1011-oracle - 6.8.0-1011.11 linux-headers-6.8.0-1011-oracle-64k - 6.8.0-1011.11 linux-headers-ibm - 6.8.0-1011.11 linux-headers-ibm-classic - 6.8.0-1011.11 linux-headers-ibm-lts-24.04 - 6.8.0-1011.11 linux-headers-oem-24.04 - 6.8.0-1011.11 linux-headers-oem-24.04a - 6.8.0-1011.11 linux-headers-oracle - 6.8.0-1011.11 linux-headers-oracle-64k - 6.8.0-1011.11 linux-ibm - 6.8.0-1011.11 linux-ibm-classic - 6.8.0-1011.11 linux-ibm-cloud-tools-common - 6.8.0-1011.11 linux-ibm-headers-6.8.0-1011 - 6.8.0-1011.11 linux-ibm-lts-24.04 - 6.8.0-1011.11 linux-ibm-source-6.8.0 - 6.8.0-1011.11 linux-ibm-tools-6.8.0-1011 - 6.8.0-1011.11 linux-image-6.8.0-1011-ibm - 6.8.0-1011.11 linux-image-6.8.0-1011-oem - 6.8.0-1011.11 linux-image-6.8.0-1011-oracle - 6.8.0-1011.11 linux-image-6.8.0-1011-oracle-64k - 6.8.0-1011.11 linux-image-ibm - 6.8.0-1011.11 linux-image-ibm-classic - 6.8.0-1011.11 linux-image-ibm-lts-24.04 - 6.8.0-1011.11 linux-image-oem-24.04 - 6.8.0-1011.11 linux-image-oem-24.04a - 6.8.0-1011.11 linux-image-oracle - 6.8.0-1011.11 linux-image-oracle-64k - 6.8.0-1011.11 linux-image-uc-6.8.0-1011-oem - 6.8.0-1011.11 linux-image-uc-oem-24.04 - 6.8.0-1011.11 linux-image-uc-oem-24.04a - 6.8.0-1011.11 linux-image-unsigned-6.8.0-1011-ibm - 6.8.0-1011.11 linux-image-unsigned-6.8.0-1011-oem - 6.8.0-1011.11 linux-image-unsigned-6.8.0-1011-oracle - 6.8.0-1011.11 linux-image-unsigned-6.8.0-1011-oracle-64k - 6.8.0-1011.11 linux-modules-6.8.0-1011-ibm - 6.8.0-1011.11 linux-modules-6.8.0-1011-oem - 6.8.0-1011.11 linux-modules-6.8.0-1011-oracle - 6.8.0-1011.11 linux-modules-6.8.0-1011-oracle-64k - 6.8.0-1011.11 linux-modules-extra-6.8.0-1011-ibm - 6.8.0-1011.11 linux-modules-extra-6.8.0-1011-oracle - 6.8.0-1011.11 linux-modules-extra-6.8.0-1011-oracle-64k - 6.8.0-1011.11 linux-modules-ipu6-6.8.0-1011-oem - 6.8.0-1011.11 linux-modules-ipu6-oem-24.04 - 6.8.0-1011.11 linux-modules-ipu6-oem-24.04a - 6.8.0-1011.11 linux-modules-iwlwifi-6.8.0-1011-ibm - 6.8.0-1011.11 linux-modules-iwlwifi-6.8.0-1011-oem - 6.8.0-1011.11 linux-modules-iwlwifi-6.8.0-1011-oracle - 6.8.0-1011.11 linux-modules-iwlwifi-ibm - 6.8.0-1011.11 linux-modules-iwlwifi-ibm-classic - 6.8.0-1011.11 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1011.11 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1011.11 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1011.11 linux-modules-iwlwifi-oracle - 6.8.0-1011.11 linux-modules-usbio-6.8.0-1011-oem - 6.8.0-1011.11 linux-modules-usbio-oem-24.04 - 6.8.0-1011.11 linux-modules-usbio-oem-24.04a - 6.8.0-1011.11 linux-oem-24.04 - 6.8.0-1011.11 linux-oem-24.04a - 6.8.0-1011.11 linux-oem-6.8-headers-6.8.0-1011 - 6.8.0-1011.11 linux-oem-6.8-tools-6.8.0-1011 - 6.8.0-1011.11 linux-oracle - 6.8.0-1011.11 linux-oracle-64k - 6.8.0-1011.11 linux-oracle-headers-6.8.0-1011 - 6.8.0-1011.11 linux-oracle-tools-6.8.0-1011 - 6.8.0-1011.11 linux-tools-6.8.0-1011-ibm - 6.8.0-1011.11 linux-tools-6.8.0-1011-oem - 6.8.0-1011.11 linux-tools-6.8.0-1011-oracle - 6.8.0-1011.11 linux-tools-6.8.0-1011-oracle-64k - 6.8.0-1011.11 linux-tools-ibm - 6.8.0-1011.11 linux-tools-ibm-classic - 6.8.0-1011.11 linux-tools-ibm-lts-24.04 - 6.8.0-1011.11 linux-tools-oem-24.04 - 6.8.0-1011.11 linux-tools-oem-24.04a - 6.8.0-1011.11 linux-tools-oracle - 6.8.0-1011.11 linux-tools-oracle-64k - 6.8.0-1011.11 No subscription required linux-buildinfo-6.8.0-1012-nvidia - 6.8.0-1012.12 linux-buildinfo-6.8.0-1012-nvidia-64k - 6.8.0-1012.12 linux-cloud-tools-nvidia - 6.8.0-1012.12 linux-headers-6.8.0-1012-nvidia - 6.8.0-1012.12 linux-headers-6.8.0-1012-nvidia-64k - 6.8.0-1012.12 linux-headers-nvidia - 6.8.0-1012.12 linux-headers-nvidia-64k - 6.8.0-1012.12 linux-image-6.8.0-1012-nvidia - 6.8.0-1012.12 linux-image-6.8.0-1012-nvidia-64k - 6.8.0-1012.12 linux-image-nvidia - 6.8.0-1012.12 linux-image-nvidia-64k - 6.8.0-1012.12 linux-image-uc-6.8.0-1012-nvidia - 6.8.0-1012.12 linux-image-uc-6.8.0-1012-nvidia-64k - 6.8.0-1012.12 linux-image-unsigned-6.8.0-1012-nvidia - 6.8.0-1012.12 linux-image-unsigned-6.8.0-1012-nvidia-64k - 6.8.0-1012.12 linux-modules-6.8.0-1012-nvidia - 6.8.0-1012.12 linux-modules-6.8.0-1012-nvidia-64k - 6.8.0-1012.12 linux-modules-extra-6.8.0-1012-nvidia - 6.8.0-1012.12 linux-modules-nvidia-fs-6.8.0-1012-nvidia - 6.8.0-1012.12 linux-modules-nvidia-fs-6.8.0-1012-nvidia-64k - 6.8.0-1012.12 linux-modules-nvidia-fs-nvidia - 6.8.0-1012.12 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1012.12 linux-nvidia - 6.8.0-1012.12 linux-nvidia-64k - 6.8.0-1012.12 linux-nvidia-headers-6.8.0-1012 - 6.8.0-1012.12 linux-nvidia-tools-6.8.0-1012 - 6.8.0-1012.12 linux-nvidia-tools-host - 6.8.0-1012.12 linux-tools-6.8.0-1012-nvidia - 6.8.0-1012.12 linux-tools-6.8.0-1012-nvidia-64k - 6.8.0-1012.12 linux-tools-nvidia - 6.8.0-1012.12 linux-tools-nvidia-64k - 6.8.0-1012.12 No subscription required linux-buildinfo-6.8.0-1012-nvidia-lowlatency - 6.8.0-1012.12.1 linux-buildinfo-6.8.0-1012-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1012.12.1 linux-headers-6.8.0-1012-nvidia-lowlatency - 6.8.0-1012.12.1 linux-headers-6.8.0-1012-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-headers-nvidia-lowlatency - 6.8.0-1012.12.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-image-6.8.0-1012-nvidia-lowlatency - 6.8.0-1012.12.1 linux-image-6.8.0-1012-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-image-nvidia-lowlatency - 6.8.0-1012.12.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-image-uc-6.8.0-1012-nvidia-lowlatency - 6.8.0-1012.12.1 linux-image-uc-6.8.0-1012-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-image-unsigned-6.8.0-1012-nvidia-lowlatency - 6.8.0-1012.12.1 linux-image-unsigned-6.8.0-1012-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-modules-6.8.0-1012-nvidia-lowlatency - 6.8.0-1012.12.1 linux-modules-6.8.0-1012-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-modules-extra-6.8.0-1012-nvidia-lowlatency - 6.8.0-1012.12.1 linux-modules-nvidia-fs-6.8.0-1012-nvidia-lowlatency - 6.8.0-1012.12.1 linux-modules-nvidia-fs-6.8.0-1012-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1012.12.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-nvidia-lowlatency - 6.8.0-1012.12.1 linux-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-nvidia-lowlatency-headers-6.8.0-1012 - 6.8.0-1012.12.1 linux-nvidia-lowlatency-tools-6.8.0-1012 - 6.8.0-1012.12.1 linux-nvidia-lowlatency-tools-host - 6.8.0-1012.12.1 linux-tools-6.8.0-1012-nvidia-lowlatency - 6.8.0-1012.12.1 linux-tools-6.8.0-1012-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-tools-nvidia-lowlatency - 6.8.0-1012.12.1 linux-tools-nvidia-lowlatency-64k - 6.8.0-1012.12.1 No subscription required linux-buildinfo-6.8.0-1013-gcp - 6.8.0-1013.14 linux-gcp - 6.8.0-1013.14 linux-gcp-headers-6.8.0-1013 - 6.8.0-1013.14 linux-gcp-tools-6.8.0-1013 - 6.8.0-1013.14 linux-headers-6.8.0-1013-gcp - 6.8.0-1013.14 linux-headers-gcp - 6.8.0-1013.14 linux-image-6.8.0-1013-gcp - 6.8.0-1013.14 linux-image-gcp - 6.8.0-1013.14 linux-image-unsigned-6.8.0-1013-gcp - 6.8.0-1013.14 linux-modules-6.8.0-1013-gcp - 6.8.0-1013.14 linux-modules-extra-6.8.0-1013-gcp - 6.8.0-1013.14 linux-modules-extra-gcp - 6.8.0-1013.14 linux-tools-6.8.0-1013-gcp - 6.8.0-1013.14 linux-tools-gcp - 6.8.0-1013.14 No subscription required linux-azure - 6.8.0-1013.15 linux-azure-cloud-tools-6.8.0-1013 - 6.8.0-1013.15 linux-azure-fde - 6.8.0-1013.15 linux-azure-headers-6.8.0-1013 - 6.8.0-1013.15 linux-azure-tools-6.8.0-1013 - 6.8.0-1013.15 linux-buildinfo-6.8.0-1013-azure - 6.8.0-1013.15 linux-cloud-tools-6.8.0-1013-azure - 6.8.0-1013.15 linux-cloud-tools-azure - 6.8.0-1013.15 linux-headers-6.8.0-1013-azure - 6.8.0-1013.15 linux-headers-azure - 6.8.0-1013.15 linux-image-6.8.0-1013-azure - 6.8.0-1013.15 linux-image-6.8.0-1013-azure-fde - 6.8.0-1013.15 linux-image-azure - 6.8.0-1013.15 linux-image-azure-fde - 6.8.0-1013.15 linux-image-unsigned-6.8.0-1013-azure - 6.8.0-1013.15 linux-modules-6.8.0-1013-azure - 6.8.0-1013.15 linux-modules-extra-6.8.0-1013-azure - 6.8.0-1013.15 linux-modules-extra-azure - 6.8.0-1013.15 linux-modules-involflt-6.8.0-1013-azure - 6.8.0-1013.15 linux-modules-involflt-azure - 6.8.0-1013.15 linux-modules-iwlwifi-6.8.0-1013-azure - 6.8.0-1013.15 linux-modules-iwlwifi-azure - 6.8.0-1013.15 linux-tools-6.8.0-1013-azure - 6.8.0-1013.15 linux-tools-azure - 6.8.0-1013.15 No subscription required linux-aws - 6.8.0-1014.15 linux-aws-cloud-tools-6.8.0-1014 - 6.8.0-1014.15 linux-aws-headers-6.8.0-1014 - 6.8.0-1014.15 linux-aws-tools-6.8.0-1014 - 6.8.0-1014.15 linux-buildinfo-6.8.0-1014-aws - 6.8.0-1014.15 linux-cloud-tools-6.8.0-1014-aws - 6.8.0-1014.15 linux-headers-6.8.0-1014-aws - 6.8.0-1014.15 linux-headers-aws - 6.8.0-1014.15 linux-image-6.8.0-1014-aws - 6.8.0-1014.15 linux-image-aws - 6.8.0-1014.15 linux-image-unsigned-6.8.0-1014-aws - 6.8.0-1014.15 linux-modules-6.8.0-1014-aws - 6.8.0-1014.15 linux-modules-extra-6.8.0-1014-aws - 6.8.0-1014.15 linux-modules-extra-aws - 6.8.0-1014.15 linux-tools-6.8.0-1014-aws - 6.8.0-1014.15 linux-tools-aws - 6.8.0-1014.15 No subscription required linux-buildinfo-6.8.0-41-generic - 6.8.0-41.41 linux-buildinfo-6.8.0-41-generic-64k - 6.8.0-41.41 linux-cloud-tools-6.8.0-41 - 6.8.0-41.41 linux-cloud-tools-6.8.0-41-generic - 6.8.0-41.41 linux-cloud-tools-common - 6.8.0-41.41 linux-cloud-tools-generic - 6.8.0-41.41 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-41.41 linux-cloud-tools-generic-hwe-24.04-edge - 6.8.0-41.41 linux-cloud-tools-virtual - 6.8.0-41.41 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-41.41 linux-cloud-tools-virtual-hwe-24.04-edge - 6.8.0-41.41 linux-crashdump - 6.8.0-41.41 linux-doc - 6.8.0-41.41 linux-generic - 6.8.0-41.41 linux-generic-64k - 6.8.0-41.41 linux-generic-64k-hwe-24.04 - 6.8.0-41.41 linux-generic-64k-hwe-24.04-edge - 6.8.0-41.41 linux-generic-hwe-24.04 - 6.8.0-41.41 linux-generic-hwe-24.04-edge - 6.8.0-41.41 linux-generic-lpae - 6.8.0-41.41 linux-headers-6.8.0-41 - 6.8.0-41.41 linux-headers-6.8.0-41-generic - 6.8.0-41.41 linux-headers-6.8.0-41-generic-64k - 6.8.0-41.41 linux-headers-generic - 6.8.0-41.41 linux-headers-generic-64k - 6.8.0-41.41 linux-headers-generic-64k-hwe-24.04 - 6.8.0-41.41 linux-headers-generic-64k-hwe-24.04-edge - 6.8.0-41.41 linux-headers-generic-hwe-24.04 - 6.8.0-41.41 linux-headers-generic-hwe-24.04-edge - 6.8.0-41.41 linux-headers-generic-lpae - 6.8.0-41.41 linux-headers-kvm - 6.8.0-41.41 linux-headers-laptop-23.10 - 6.8.0-41.41 linux-headers-oem-20.04 - 6.8.0-41.41 linux-headers-oem-20.04b - 6.8.0-41.41 linux-headers-oem-20.04c - 6.8.0-41.41 linux-headers-oem-20.04d - 6.8.0-41.41 linux-headers-oem-22.04 - 6.8.0-41.41 linux-headers-virtual - 6.8.0-41.41 linux-headers-virtual-hwe-24.04 - 6.8.0-41.41 linux-headers-virtual-hwe-24.04-edge - 6.8.0-41.41 linux-image-6.8.0-41-generic - 6.8.0-41.41 linux-image-6.8.0-41-generic-64k - 6.8.0-41.41 linux-image-extra-virtual - 6.8.0-41.41 linux-image-extra-virtual-hwe-24.04 - 6.8.0-41.41 linux-image-extra-virtual-hwe-24.04-edge - 6.8.0-41.41 linux-image-generic - 6.8.0-41.41 linux-image-generic-64k - 6.8.0-41.41 linux-image-generic-64k-hwe-24.04 - 6.8.0-41.41 linux-image-generic-64k-hwe-24.04-edge - 6.8.0-41.41 linux-image-generic-hwe-24.04 - 6.8.0-41.41 linux-image-generic-hwe-24.04-edge - 6.8.0-41.41 linux-image-generic-lpae - 6.8.0-41.41 linux-image-kvm - 6.8.0-41.41 linux-image-laptop-23.10 - 6.8.0-41.41 linux-image-oem-20.04 - 6.8.0-41.41 linux-image-oem-20.04b - 6.8.0-41.41 linux-image-oem-20.04c - 6.8.0-41.41 linux-image-oem-20.04d - 6.8.0-41.41 linux-image-oem-22.04 - 6.8.0-41.41 linux-image-uc-6.8.0-41-generic - 6.8.0-41.41 linux-image-uc-6.8.0-41-generic-64k - 6.8.0-41.41 linux-image-uc-generic - 6.8.0-41.41 linux-image-uc-generic-hwe-24.04 - 6.8.0-41.41 linux-image-uc-generic-hwe-24.04-edge - 6.8.0-41.41 linux-image-unsigned-6.8.0-41-generic - 6.8.0-41.41 linux-image-unsigned-6.8.0-41-generic-64k - 6.8.0-41.41 linux-image-virtual - 6.8.0-41.41 linux-image-virtual-hwe-24.04 - 6.8.0-41.41 linux-image-virtual-hwe-24.04-edge - 6.8.0-41.41 linux-kvm - 6.8.0-41.41 linux-laptop-23.10 - 6.8.0-41.41 linux-lib-rust-6.8.0-41-generic - 6.8.0-41.41 linux-libc-dev - 6.8.0-41.41 linux-modules-6.8.0-41-generic - 6.8.0-41.41 linux-modules-6.8.0-41-generic-64k - 6.8.0-41.41 linux-modules-extra-6.8.0-41-generic - 6.8.0-41.41 linux-modules-ipu6-6.8.0-41-generic - 6.8.0-41.41 linux-modules-ipu6-generic - 6.8.0-41.41 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-41.41 linux-modules-ipu6-generic-hwe-24.04-edge - 6.8.0-41.41 linux-modules-iwlwifi-6.8.0-41-generic - 6.8.0-41.41 linux-modules-iwlwifi-generic - 6.8.0-41.41 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-41.41 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.8.0-41.41 linux-modules-iwlwifi-oem-20.04 - 6.8.0-41.41 linux-modules-iwlwifi-oem-20.04d - 6.8.0-41.41 linux-modules-iwlwifi-oem-22.04 - 6.8.0-41.41 linux-modules-usbio-6.8.0-41-generic - 6.8.0-41.41 linux-modules-usbio-generic - 6.8.0-41.41 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-41.41 linux-modules-usbio-generic-hwe-24.04-edge - 6.8.0-41.41 linux-oem-20.04 - 6.8.0-41.41 linux-oem-20.04b - 6.8.0-41.41 linux-oem-20.04c - 6.8.0-41.41 linux-oem-20.04d - 6.8.0-41.41 linux-oem-22.04 - 6.8.0-41.41 linux-source - 6.8.0-41.41 linux-source-6.8.0 - 6.8.0-41.41 linux-tools-6.8.0-41 - 6.8.0-41.41 linux-tools-6.8.0-41-generic - 6.8.0-41.41 linux-tools-6.8.0-41-generic-64k - 6.8.0-41.41 linux-tools-common - 6.8.0-41.41 linux-tools-generic - 6.8.0-41.41 linux-tools-generic-64k - 6.8.0-41.41 linux-tools-generic-64k-hwe-24.04 - 6.8.0-41.41 linux-tools-generic-64k-hwe-24.04-edge - 6.8.0-41.41 linux-tools-generic-hwe-24.04 - 6.8.0-41.41 linux-tools-generic-hwe-24.04-edge - 6.8.0-41.41 linux-tools-generic-lpae - 6.8.0-41.41 linux-tools-host - 6.8.0-41.41 linux-tools-kvm - 6.8.0-41.41 linux-tools-laptop-23.10 - 6.8.0-41.41 linux-tools-oem-20.04 - 6.8.0-41.41 linux-tools-oem-20.04b - 6.8.0-41.41 linux-tools-oem-20.04c - 6.8.0-41.41 linux-tools-oem-20.04d - 6.8.0-41.41 linux-tools-oem-22.04 - 6.8.0-41.41 linux-tools-virtual - 6.8.0-41.41 linux-tools-virtual-hwe-24.04 - 6.8.0-41.41 linux-tools-virtual-hwe-24.04-edge - 6.8.0-41.41 linux-virtual - 6.8.0-41.41 linux-virtual-hwe-24.04 - 6.8.0-41.41 linux-virtual-hwe-24.04-edge - 6.8.0-41.41 No subscription required linux-buildinfo-6.8.0-41-lowlatency - 6.8.0-41.41.1 linux-buildinfo-6.8.0-41-lowlatency-64k - 6.8.0-41.41.1 linux-cloud-tools-6.8.0-41-lowlatency - 6.8.0-41.41.1 linux-cloud-tools-lowlatency - 6.8.0-41.41.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-41.41.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-41.41.1 linux-cloud-tools-lowlatency-hwe-22.04 - 6.8.0-41.41.1 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.8.0-41.41.1 linux-headers-6.8.0-41-lowlatency - 6.8.0-41.41.1 linux-headers-6.8.0-41-lowlatency-64k - 6.8.0-41.41.1 linux-headers-lowlatency - 6.8.0-41.41.1 linux-headers-lowlatency-64k - 6.8.0-41.41.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-41.41.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-41.41.1 linux-headers-lowlatency-64k-hwe-22.04 - 6.8.0-41.41.1 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.8.0-41.41.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-41.41.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-41.41.1 linux-headers-lowlatency-hwe-22.04 - 6.8.0-41.41.1 linux-headers-lowlatency-hwe-22.04-edge - 6.8.0-41.41.1 linux-image-6.8.0-41-lowlatency - 6.8.0-41.41.1 linux-image-6.8.0-41-lowlatency-64k - 6.8.0-41.41.1 linux-image-lowlatency - 6.8.0-41.41.1 linux-image-lowlatency-64k - 6.8.0-41.41.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-41.41.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-41.41.1 linux-image-lowlatency-64k-hwe-22.04 - 6.8.0-41.41.1 linux-image-lowlatency-64k-hwe-22.04-edge - 6.8.0-41.41.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-41.41.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-41.41.1 linux-image-lowlatency-hwe-22.04 - 6.8.0-41.41.1 linux-image-lowlatency-hwe-22.04-edge - 6.8.0-41.41.1 linux-image-unsigned-6.8.0-41-lowlatency - 6.8.0-41.41.1 linux-image-unsigned-6.8.0-41-lowlatency-64k - 6.8.0-41.41.1 linux-lowlatency - 6.8.0-41.41.1 linux-lowlatency-64k - 6.8.0-41.41.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-41.41.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-41.41.1 linux-lowlatency-64k-hwe-22.04 - 6.8.0-41.41.1 linux-lowlatency-64k-hwe-22.04-edge - 6.8.0-41.41.1 linux-lowlatency-cloud-tools-6.8.0-41 - 6.8.0-41.41.1 linux-lowlatency-cloud-tools-common - 6.8.0-41.41.1 linux-lowlatency-headers-6.8.0-41 - 6.8.0-41.41.1 linux-lowlatency-hwe-20.04 - 6.8.0-41.41.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-41.41.1 linux-lowlatency-hwe-22.04 - 6.8.0-41.41.1 linux-lowlatency-hwe-22.04-edge - 6.8.0-41.41.1 linux-lowlatency-lib-rust-6.8.0-41-lowlatency - 6.8.0-41.41.1 linux-lowlatency-tools-6.8.0-41 - 6.8.0-41.41.1 linux-lowlatency-tools-common - 6.8.0-41.41.1 linux-lowlatency-tools-host - 6.8.0-41.41.1 linux-modules-6.8.0-41-lowlatency - 6.8.0-41.41.1 linux-modules-6.8.0-41-lowlatency-64k - 6.8.0-41.41.1 linux-modules-iwlwifi-6.8.0-41-lowlatency - 6.8.0-41.41.1 linux-modules-iwlwifi-lowlatency - 6.8.0-41.41.1 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.8.0-41.41.1 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.8.0-41.41.1 linux-tools-6.8.0-41-lowlatency - 6.8.0-41.41.1 linux-tools-6.8.0-41-lowlatency-64k - 6.8.0-41.41.1 linux-tools-lowlatency - 6.8.0-41.41.1 linux-tools-lowlatency-64k - 6.8.0-41.41.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-41.41.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-41.41.1 linux-tools-lowlatency-64k-hwe-22.04 - 6.8.0-41.41.1 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.8.0-41.41.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-41.41.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-41.41.1 linux-tools-lowlatency-hwe-22.04 - 6.8.0-41.41.1 linux-tools-lowlatency-hwe-22.04-edge - 6.8.0-41.41.1 No subscription required
Medium
CVE-2024-39292
CVE-2024-39484
USN-6977-1 -- QEMU vulnerabilities
Ubuntu 24.04 LTS
It was discovered that QEMU did not properly handle certain memory operations, which could result in a buffer overflow. An attacker could potentially use this issue to cause a denial of service. (CVE-2024-26327) It was discovered that QEMU did not properly handle certain memory operations, which could result in an out-of-bounds memory access. An attacker could potentially use this issue to cause a denial of service. (CVE-2024-26328) Update Instructions: Run `sudo pro fix USN-6977-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: qemu-block-extra - 1:8.2.2+ds-0ubuntu1.2 qemu-block-supplemental - 1:8.2.2+ds-0ubuntu1.2 qemu-guest-agent - 1:8.2.2+ds-0ubuntu1.2 qemu-system - 1:8.2.2+ds-0ubuntu1.2 qemu-system-arm - 1:8.2.2+ds-0ubuntu1.2 qemu-system-common - 1:8.2.2+ds-0ubuntu1.2 qemu-system-data - 1:8.2.2+ds-0ubuntu1.2 qemu-system-gui - 1:8.2.2+ds-0ubuntu1.2 qemu-system-mips - 1:8.2.2+ds-0ubuntu1.2 qemu-system-misc - 1:8.2.2+ds-0ubuntu1.2 qemu-system-modules-opengl - 1:8.2.2+ds-0ubuntu1.2 qemu-system-modules-spice - 1:8.2.2+ds-0ubuntu1.2 qemu-system-ppc - 1:8.2.2+ds-0ubuntu1.2 qemu-system-s390x - 1:8.2.2+ds-0ubuntu1.2 qemu-system-sparc - 1:8.2.2+ds-0ubuntu1.2 qemu-system-x86 - 1:8.2.2+ds-0ubuntu1.2 qemu-system-x86-xen - 1:8.2.2+ds-0ubuntu1.2 qemu-system-xen - 1:8.2.2+ds-0ubuntu1.2 qemu-user - 1:8.2.2+ds-0ubuntu1.2 qemu-user-binfmt - 1:8.2.2+ds-0ubuntu1.2 qemu-user-static - 1:8.2.2+ds-0ubuntu1.2 qemu-utils - 1:8.2.2+ds-0ubuntu1.2 No subscription required
Medium
CVE-2024-26327
CVE-2024-26328
USN-6982-1 -- Dovecot vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Dovecot did not not properly have restrictions on ithe size of address headers. A remote attacker could possibly use this issue to cause denial of service. (CVE-2024-23184, CVE-2024-23185) Update Instructions: Run `sudo pro fix USN-6982-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: dovecot-auth-lua - 1:2.3.21+dfsg1-2ubuntu6 dovecot-core - 1:2.3.21+dfsg1-2ubuntu6 dovecot-dev - 1:2.3.21+dfsg1-2ubuntu6 dovecot-gssapi - 1:2.3.21+dfsg1-2ubuntu6 dovecot-imapd - 1:2.3.21+dfsg1-2ubuntu6 dovecot-ldap - 1:2.3.21+dfsg1-2ubuntu6 dovecot-lmtpd - 1:2.3.21+dfsg1-2ubuntu6 dovecot-managesieved - 1:2.3.21+dfsg1-2ubuntu6 dovecot-mysql - 1:2.3.21+dfsg1-2ubuntu6 dovecot-pgsql - 1:2.3.21+dfsg1-2ubuntu6 dovecot-pop3d - 1:2.3.21+dfsg1-2ubuntu6 dovecot-sieve - 1:2.3.21+dfsg1-2ubuntu6 dovecot-solr - 1:2.3.21+dfsg1-2ubuntu6 dovecot-sqlite - 1:2.3.21+dfsg1-2ubuntu6 dovecot-submissiond - 1:2.3.21+dfsg1-2ubuntu6 No subscription required
Medium
CVE-2024-23184
CVE-2024-23185
USN-6983-1 -- FFmpeg vulnerability
Ubuntu 24.04 LTS
Zeng Yunxiang discovered that FFmpeg incorrectly handled memory during video encoding. An attacker could possibly use this issue to perform a denial of service, or execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6983-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ffmpeg - 7:6.1.1-3ubuntu5+esm2 ffmpeg-doc - 7:6.1.1-3ubuntu5+esm2 libavcodec-dev - 7:6.1.1-3ubuntu5+esm2 libavcodec-extra - 7:6.1.1-3ubuntu5+esm2 libavcodec-extra60 - 7:6.1.1-3ubuntu5+esm2 libavcodec60 - 7:6.1.1-3ubuntu5+esm2 libavdevice-dev - 7:6.1.1-3ubuntu5+esm2 libavdevice60 - 7:6.1.1-3ubuntu5+esm2 libavfilter-dev - 7:6.1.1-3ubuntu5+esm2 libavfilter-extra - 7:6.1.1-3ubuntu5+esm2 libavfilter-extra9 - 7:6.1.1-3ubuntu5+esm2 libavfilter9 - 7:6.1.1-3ubuntu5+esm2 libavformat-dev - 7:6.1.1-3ubuntu5+esm2 libavformat-extra - 7:6.1.1-3ubuntu5+esm2 libavformat-extra60 - 7:6.1.1-3ubuntu5+esm2 libavformat60 - 7:6.1.1-3ubuntu5+esm2 libavutil-dev - 7:6.1.1-3ubuntu5+esm2 libavutil58 - 7:6.1.1-3ubuntu5+esm2 libpostproc-dev - 7:6.1.1-3ubuntu5+esm2 libpostproc57 - 7:6.1.1-3ubuntu5+esm2 libswresample-dev - 7:6.1.1-3ubuntu5+esm2 libswresample4 - 7:6.1.1-3ubuntu5+esm2 libswscale-dev - 7:6.1.1-3ubuntu5+esm2 libswscale7 - 7:6.1.1-3ubuntu5+esm2 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2024-32230
USN-6984-1 -- WebOb vulnerability
Ubuntu 24.04 LTS
It was discovered that WebOb incorrectly handled certain URLs. An attacker could possibly use this issue to control a redirect or forward to another URL. Update Instructions: Run `sudo pro fix USN-6984-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-webob-doc - 1:1.8.7-1ubuntu0.1.24.04.1 python3-webob - 1:1.8.7-1ubuntu0.1.24.04.1 No subscription required
Medium
CVE-2024-42353
USN-6986-1 -- OpenSSL vulnerability
Ubuntu 24.04 LTS
David Benjamin discovered that OpenSSL incorrectly handled certain X.509 certificates. An attacker could possible use this issue to cause a denial of service or expose sensitive information. Update Instructions: Run `sudo pro fix USN-6986-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libssl-dev - 3.0.13-0ubuntu3.4 libssl-doc - 3.0.13-0ubuntu3.4 libssl3t64 - 3.0.13-0ubuntu3.4 openssl - 3.0.13-0ubuntu3.4 No subscription required
Medium
CVE-2024-6119
USN-6987-1 -- Django vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Django incorrectly handled certain inputs. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-45230) It was discovered that Django incorrectly handled certain email sending failures. A remote attacker could possibly use this issue to enumerate user emails by issuing password reset requests and observing the outcomes. (CVE-2024-45231) Update Instructions: Run `sudo pro fix USN-6987-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-django-doc - 3:4.2.11-1ubuntu1.3 python3-django - 3:4.2.11-1ubuntu1.3 No subscription required
Medium
CVE-2024-45230
CVE-2024-45231
USN-6988-1 -- Twisted vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Twisted incorrectly handled response order when processing multiple HTTP requests. A remote attacker could possibly use this issue to delay and manipulate responses. This issue only affected Ubuntu 24.04 LTS. (CVE-2024-41671) It was discovered that Twisted did not properly sanitize certain input. An attacker could use this vulnerability to possibly execute an HTML injection leading to a cross-site scripting (XSS) attack. (CVE-2024-41810) Update Instructions: Run `sudo pro fix USN-6988-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-twisted - 24.3.0-1ubuntu0.1 twisted-doc - 24.3.0-1ubuntu0.1 No subscription required
Medium
CVE-2024-41671
CVE-2024-41810
USN-6989-1 -- OpenStack vulnerability
Ubuntu 24.04 LTS
Dan Smith, Julia Kreger and Jay Faulkner discovered that in image processing for Ironic, a specially crafted image could be used by an authenticated user to exploit undesired behaviors in qemu-img, including possible unauthorized access to potentially sensitive data. Update Instructions: Run `sudo pro fix USN-6989-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ironic-api - 1:24.1.1-0ubuntu1.2 ironic-common - 1:24.1.1-0ubuntu1.2 ironic-conductor - 1:24.1.1-0ubuntu1.2 python3-ironic - 1:24.1.1-0ubuntu1.2 No subscription required
Medium
CVE-2024-44082
USN-6990-1 -- znc vulnerability
Ubuntu 24.04 LTS
Johannes Kuhn (DasBrain) discovered that znc incorrectly handled user input under certain operations. An attacker could possibly use this issue to execute arbitrary code on a user's system if the user was tricked into joining a malicious server. Update Instructions: Run `sudo pro fix USN-6990-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: znc-backlog - 0.20180824+1.9.0-2ubuntu0.1~esm2 Available with Ubuntu Pro: https://ubuntu.com/pro znc-push - 1.0.0+git20190521.78d0385+1.9.0-2ubuntu0.1~esm2 Available with Ubuntu Pro: https://ubuntu.com/pro znc - 1.9.0-2ubuntu0.1~esm2 znc-dev - 1.9.0-2ubuntu0.1~esm2 znc-perl - 1.9.0-2ubuntu0.1~esm2 znc-python - 1.9.0-2ubuntu0.1~esm2 znc-tcl - 1.9.0-2ubuntu0.1~esm2 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2024-39844
USN-6991-1 -- AIOHTTP vulnerability
Ubuntu 24.04 LTS
It was discovered that AIOHTTP did not properly restrict file access when the 'follow_symlinks' option was set to True. A remote attacker could possibly use this issue to access unauthorized files on the system. Update Instructions: Run `sudo pro fix USN-6991-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-aiohttp-doc - 3.9.1-1ubuntu0.1 python3-aiohttp - 3.9.1-1ubuntu0.1 No subscription required
Medium
CVE-2024-23334
USN-6993-1 -- Vim vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Vim incorrectly handled memory when closing a window, leading to a double-free vulnerability. If a user was tricked into opening a specially crafted file, an attacker could crash the application, leading to a denial of service, or possibly achieve code execution with user privileges. (CVE-2024-41957) It was discovered that Vim incorrectly handled memory when adding a new file to an argument list, leading to a use-after-free. If a user was tricked into opening a specially crafted file, an attacker could crash the application, leading to a denial of service. (CVE-2024-43374) Update Instructions: Run `sudo pro fix USN-6993-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: vim - 2:9.1.0016-1ubuntu7.2 vim-athena - 2:9.1.0016-1ubuntu7.2 vim-common - 2:9.1.0016-1ubuntu7.2 vim-doc - 2:9.1.0016-1ubuntu7.2 vim-gtk3 - 2:9.1.0016-1ubuntu7.2 vim-gui-common - 2:9.1.0016-1ubuntu7.2 vim-motif - 2:9.1.0016-1ubuntu7.2 vim-nox - 2:9.1.0016-1ubuntu7.2 vim-runtime - 2:9.1.0016-1ubuntu7.2 vim-tiny - 2:9.1.0016-1ubuntu7.2 xxd - 2:9.1.0016-1ubuntu7.2 No subscription required
Medium
CVE-2024-41957
CVE-2024-43374
USN-6996-1 -- WebKitGTK vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the WebKitGTK Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution. Update Instructions: Run `sudo pro fix USN-6996-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-javascriptcoregtk-4.1 - 2.44.3-0ubuntu0.24.04.1 gir1.2-javascriptcoregtk-6.0 - 2.44.3-0ubuntu0.24.04.1 gir1.2-webkit-6.0 - 2.44.3-0ubuntu0.24.04.1 gir1.2-webkit2-4.1 - 2.44.3-0ubuntu0.24.04.1 libjavascriptcoregtk-4.0-bin - 2.44.3-0ubuntu0.24.04.1 libjavascriptcoregtk-4.1-0 - 2.44.3-0ubuntu0.24.04.1 libjavascriptcoregtk-4.1-dev - 2.44.3-0ubuntu0.24.04.1 libjavascriptcoregtk-6.0-1 - 2.44.3-0ubuntu0.24.04.1 libjavascriptcoregtk-6.0-dev - 2.44.3-0ubuntu0.24.04.1 libjavascriptcoregtk-bin - 2.44.3-0ubuntu0.24.04.1 libwebkit2gtk-4.0-doc - 2.44.3-0ubuntu0.24.04.1 libwebkit2gtk-4.1-0 - 2.44.3-0ubuntu0.24.04.1 libwebkit2gtk-4.1-dev - 2.44.3-0ubuntu0.24.04.1 libwebkitgtk-6.0-4 - 2.44.3-0ubuntu0.24.04.1 libwebkitgtk-6.0-dev - 2.44.3-0ubuntu0.24.04.1 libwebkitgtk-doc - 2.44.3-0ubuntu0.24.04.1 webkit2gtk-driver - 2.44.3-0ubuntu0.24.04.1 No subscription required
Medium
CVE-2024-40776
CVE-2024-40779
CVE-2024-40780
CVE-2024-40782
CVE-2024-40789
CVE-2024-4558
USN-6997-1 -- LibTIFF vulnerability
Ubuntu 24.04 LTS
It was discovered that LibTIFF incorrectly handled memory. An attacker could possibly use this issue to cause the application to crash, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-6997-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libtiff-dev - 4.5.1+git230720-4ubuntu2.2 libtiff-doc - 4.5.1+git230720-4ubuntu2.2 libtiff-opengl - 4.5.1+git230720-4ubuntu2.2 libtiff-tools - 4.5.1+git230720-4ubuntu2.2 libtiff5-dev - 4.5.1+git230720-4ubuntu2.2 libtiff6 - 4.5.1+git230720-4ubuntu2.2 libtiffxx6 - 4.5.1+git230720-4ubuntu2.2 No subscription required
Medium
CVE-2024-7006
USN-6998-1 -- Unbound vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Unbound incorrectly handled string comparisons, which could lead to a NULL pointer dereference. An attacker could potentially use this issue to cause a denial of service. (CVE-2024-43167) It was discovered that Unbound incorrectly handled memory in cfg_mark_ports, which could lead to a heap buffer overflow. A local attacker could potentially use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-43168) Update Instructions: Run `sudo pro fix USN-6998-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libunbound-dev - 1.19.2-1ubuntu3.2 libunbound8 - 1.19.2-1ubuntu3.2 python3-unbound - 1.19.2-1ubuntu3.2 unbound - 1.19.2-1ubuntu3.2 unbound-anchor - 1.19.2-1ubuntu3.2 unbound-host - 1.19.2-1ubuntu3.2 No subscription required
Medium
CVE-2024-43167
CVE-2024-43168
USN-6999-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Chenyuan Yang discovered that the CEC driver driver in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2024-23848) It was discovered that the JFS file system contained an out-of-bounds read vulnerability when printing xattr debug information. A local attacker could use this to cause a denial of service (system crash). (CVE-2024-40902) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PA-RISC architecture; - PowerPC architecture; - RISC-V architecture; - x86 architecture; - Block layer subsystem; - ACPI drivers; - Drivers core; - Null block device driver; - Character device driver; - TPM device driver; - Clock framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - Buffer Sharing and Synchronization framework; - DMA engine subsystem; - EFI core; - FPGA Framework; - GPU drivers; - Greybus drivers; - HID subsystem; - HW tracing; - I2C subsystem; - IIO subsystem; - InfiniBand drivers; - Input Device (Mouse) drivers; - Mailbox framework; - Media drivers; - Microchip PCI driver; - VMware VMCI Driver; - Network drivers; - PCI subsystem; - x86 platform drivers; - PTP clock framework; - S/390 drivers; - SCSI drivers; - SoundWire subsystem; - Sonic Silicon Backplane drivers; - Greybus lights staging drivers; - Thermal drivers; - TTY drivers; - USB subsystem; - VFIO drivers; - Framebuffer layer; - Watchdog drivers; - 9P distributed file system; - BTRFS file system; - File systems infrastructure; - Ext4 file system; - F2FS file system; - JFS file system; - Network file system server daemon; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - Tracing file system; - Tracing infrastructure; - io_uring subsystem; - Core kernel; - BPF subsystem; - Kernel debugger infrastructure; - DMA mapping infrastructure; - IRQ subsystem; - Memory management; - 9P file system network protocol; - Amateur Radio drivers; - B.A.T.M.A.N. meshing protocol; - Ethernet bridge; - Networking core; - Ethtool driver; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - Netfilter; - NET/ROM layer; - NFC subsystem; - Network traffic control; - Sun RPC protocol; - TIPC protocol; - TLS protocol; - Unix domain sockets; - Wireless networking; - XFRM subsystem; - AppArmor security module; - Integrity Measurement Architecture(IMA) framework; - Landlock security; - Linux Security Modules (LSM) Framework; - SELinux security module; - Simplified Mandatory Access Control Kernel framework; - ALSA framework; - HD-audio driver; - SOF drivers; - KVM core; (CVE-2024-40911, CVE-2024-37356, CVE-2024-40935, CVE-2024-40944, CVE-2024-41003, CVE-2024-40990, CVE-2024-40952, CVE-2024-40940, CVE-2024-40930, CVE-2024-40985, CVE-2024-40941, CVE-2024-38630, CVE-2024-39466, CVE-2024-40933, CVE-2024-38624, CVE-2024-40924, CVE-2024-40945, CVE-2024-40899, CVE-2024-38622, CVE-2024-40979, CVE-2024-36484, CVE-2024-41004, CVE-2024-39474, CVE-2022-48772, CVE-2024-36244, CVE-2024-38664, CVE-2024-40925, CVE-2024-40980, CVE-2024-39480, CVE-2024-36270, CVE-2024-40936, CVE-2024-40904, CVE-2024-38635, CVE-2024-40927, CVE-2024-36481, CVE-2024-40929, CVE-2024-40958, CVE-2024-36978, CVE-2024-40992, CVE-2024-40908, CVE-2024-39504, CVE-2024-41001, CVE-2024-40967, CVE-2023-52884, CVE-2024-40997, CVE-2024-40903, CVE-2024-40913, CVE-2024-34030, CVE-2024-39473, CVE-2024-40966, CVE-2024-40951, CVE-2024-40902, CVE-2024-40982, CVE-2024-40923, CVE-2024-39467, CVE-2024-40910, CVE-2024-40909, CVE-2024-39463, CVE-2024-40974, CVE-2024-41002, CVE-2024-39464, CVE-2024-39496, CVE-2024-41040, CVE-2024-39469, CVE-2024-39500, CVE-2024-39510, CVE-2024-38627, CVE-2024-32936, CVE-2024-40975, CVE-2024-38390, CVE-2024-40959, CVE-2024-41006, CVE-2024-40986, CVE-2024-40987, CVE-2024-40922, CVE-2024-40983, CVE-2024-37354, CVE-2024-38637, CVE-2024-39277, CVE-2024-40943, CVE-2024-39371, CVE-2024-40921, CVE-2024-40953, CVE-2024-38634, CVE-2024-38659, CVE-2024-39492, CVE-2024-40976, CVE-2024-40906, CVE-2024-40965, CVE-2024-38667, CVE-2024-39498, CVE-2024-38628, CVE-2024-38661, CVE-2024-38663, CVE-2024-40998, CVE-2024-40948, CVE-2024-38306, CVE-2024-40928, CVE-2024-39468, CVE-2024-39494, CVE-2024-39505, CVE-2024-40963, CVE-2024-39499, CVE-2024-39506, CVE-2024-40995, CVE-2024-39491, CVE-2024-40900, CVE-2024-39478, CVE-2024-39490, CVE-2024-39291, CVE-2024-40981, CVE-2024-40926, CVE-2024-40939, CVE-2024-38385, CVE-2024-39483, CVE-2024-40989, CVE-2024-40955, CVE-2024-39501, CVE-2024-38381, CVE-2024-33621, CVE-2024-40964, CVE-2024-42148, CVE-2024-36286, CVE-2024-38629, CVE-2024-39509, CVE-2024-39298, CVE-2024-36489, CVE-2024-34777, CVE-2024-40957, CVE-2024-40919, CVE-2024-39462, CVE-2024-39495, CVE-2024-39497, CVE-2024-38636, CVE-2024-36281, CVE-2024-39479, CVE-2024-40932, CVE-2024-36288, CVE-2024-38623, CVE-2024-40969, CVE-2024-40931, CVE-2024-36971, CVE-2024-40934, CVE-2024-36015, CVE-2024-39485, CVE-2024-40996, CVE-2024-39507, CVE-2024-36973, CVE-2024-38625, CVE-2024-39301, CVE-2024-34027, CVE-2024-37026, CVE-2024-40960, CVE-2024-37078, CVE-2024-40912, CVE-2024-40988, CVE-2024-41005, CVE-2024-39276, CVE-2024-38662, CVE-2024-39502, CVE-2024-36479, CVE-2024-40947, CVE-2024-38780, CVE-2024-38388, CVE-2024-40917, CVE-2024-36974, CVE-2024-40970, CVE-2024-40901, CVE-2024-38384, CVE-2024-39475, CVE-2024-40949, CVE-2024-37021, CVE-2024-38633, CVE-2024-39503, CVE-2024-41000, CVE-2024-33847, CVE-2024-35247, CVE-2024-40968, CVE-2024-33619, CVE-2024-38619, CVE-2024-40984, CVE-2024-36478, CVE-2024-39493, CVE-2024-42078, CVE-2024-40954, CVE-2024-40978, CVE-2024-39508, CVE-2024-40915, CVE-2024-39489, CVE-2024-40920, CVE-2024-38618, CVE-2024-40938, CVE-2024-39296, CVE-2024-40962, CVE-2024-39470, CVE-2024-39481, CVE-2024-40977, CVE-2024-38621, CVE-2024-40971, CVE-2024-31076, CVE-2024-36972, CVE-2024-39471, CVE-2024-40994, CVE-2024-40973, CVE-2024-40916, CVE-2024-40942, CVE-2024-40956, CVE-2024-39465, CVE-2024-40914, CVE-2024-40937, CVE-2024-40918, CVE-2024-40905, CVE-2024-39488, CVE-2024-38632, CVE-2024-39461, CVE-2024-40999, CVE-2024-40972, CVE-2024-36477, CVE-2024-40961) Update Instructions: Run `sudo pro fix USN-6999-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1010-gke - 6.8.0-1010.13 linux-gke - 6.8.0-1010.13 linux-gke-headers-6.8.0-1010 - 6.8.0-1010.13 linux-gke-tools-6.8.0-1010 - 6.8.0-1010.13 linux-headers-6.8.0-1010-gke - 6.8.0-1010.13 linux-headers-gke - 6.8.0-1010.13 linux-image-6.8.0-1010-gke - 6.8.0-1010.13 linux-image-gke - 6.8.0-1010.13 linux-image-unsigned-6.8.0-1010-gke - 6.8.0-1010.13 linux-modules-6.8.0-1010-gke - 6.8.0-1010.13 linux-modules-extra-6.8.0-1010-gke - 6.8.0-1010.13 linux-modules-iwlwifi-6.8.0-1010-gke - 6.8.0-1010.13 linux-modules-iwlwifi-gke - 6.8.0-1010.13 linux-tools-6.8.0-1010-gke - 6.8.0-1010.13 linux-tools-gke - 6.8.0-1010.13 No subscription required linux-buildinfo-6.8.0-1012-ibm - 6.8.0-1012.12 linux-buildinfo-6.8.0-1012-oem - 6.8.0-1012.12 linux-buildinfo-6.8.0-1012-oracle - 6.8.0-1012.12 linux-buildinfo-6.8.0-1012-oracle-64k - 6.8.0-1012.12 linux-headers-6.8.0-1012-ibm - 6.8.0-1012.12 linux-headers-6.8.0-1012-oem - 6.8.0-1012.12 linux-headers-6.8.0-1012-oracle - 6.8.0-1012.12 linux-headers-6.8.0-1012-oracle-64k - 6.8.0-1012.12 linux-headers-ibm - 6.8.0-1012.12 linux-headers-ibm-classic - 6.8.0-1012.12 linux-headers-ibm-lts-24.04 - 6.8.0-1012.12 linux-headers-oem-24.04 - 6.8.0-1012.12 linux-headers-oem-24.04a - 6.8.0-1012.12 linux-headers-oracle - 6.8.0-1012.12 linux-headers-oracle-64k - 6.8.0-1012.12 linux-ibm - 6.8.0-1012.12 linux-ibm-classic - 6.8.0-1012.12 linux-ibm-cloud-tools-common - 6.8.0-1012.12 linux-ibm-headers-6.8.0-1012 - 6.8.0-1012.12 linux-ibm-lts-24.04 - 6.8.0-1012.12 linux-ibm-source-6.8.0 - 6.8.0-1012.12 linux-ibm-tools-6.8.0-1012 - 6.8.0-1012.12 linux-image-6.8.0-1012-ibm - 6.8.0-1012.12 linux-image-6.8.0-1012-oem - 6.8.0-1012.12 linux-image-6.8.0-1012-oracle - 6.8.0-1012.12 linux-image-6.8.0-1012-oracle-64k - 6.8.0-1012.12 linux-image-ibm - 6.8.0-1012.12 linux-image-ibm-classic - 6.8.0-1012.12 linux-image-ibm-lts-24.04 - 6.8.0-1012.12 linux-image-oem-24.04 - 6.8.0-1012.12 linux-image-oem-24.04a - 6.8.0-1012.12 linux-image-oracle - 6.8.0-1012.12 linux-image-oracle-64k - 6.8.0-1012.12 linux-image-uc-6.8.0-1012-oem - 6.8.0-1012.12 linux-image-uc-oem-24.04 - 6.8.0-1012.12 linux-image-uc-oem-24.04a - 6.8.0-1012.12 linux-image-unsigned-6.8.0-1012-ibm - 6.8.0-1012.12 linux-image-unsigned-6.8.0-1012-oem - 6.8.0-1012.12 linux-image-unsigned-6.8.0-1012-oracle - 6.8.0-1012.12 linux-image-unsigned-6.8.0-1012-oracle-64k - 6.8.0-1012.12 linux-modules-6.8.0-1012-ibm - 6.8.0-1012.12 linux-modules-6.8.0-1012-oem - 6.8.0-1012.12 linux-modules-6.8.0-1012-oracle - 6.8.0-1012.12 linux-modules-6.8.0-1012-oracle-64k - 6.8.0-1012.12 linux-modules-extra-6.8.0-1012-ibm - 6.8.0-1012.12 linux-modules-extra-6.8.0-1012-oracle - 6.8.0-1012.12 linux-modules-extra-6.8.0-1012-oracle-64k - 6.8.0-1012.12 linux-modules-ipu6-6.8.0-1012-oem - 6.8.0-1012.12 linux-modules-ipu6-oem-24.04 - 6.8.0-1012.12 linux-modules-ipu6-oem-24.04a - 6.8.0-1012.12 linux-modules-iwlwifi-6.8.0-1012-ibm - 6.8.0-1012.12 linux-modules-iwlwifi-6.8.0-1012-oem - 6.8.0-1012.12 linux-modules-iwlwifi-6.8.0-1012-oracle - 6.8.0-1012.12 linux-modules-iwlwifi-ibm - 6.8.0-1012.12 linux-modules-iwlwifi-ibm-classic - 6.8.0-1012.12 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1012.12 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1012.12 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1012.12 linux-modules-iwlwifi-oracle - 6.8.0-1012.12 linux-modules-usbio-6.8.0-1012-oem - 6.8.0-1012.12 linux-modules-usbio-oem-24.04 - 6.8.0-1012.12 linux-modules-usbio-oem-24.04a - 6.8.0-1012.12 linux-oem-24.04 - 6.8.0-1012.12 linux-oem-24.04a - 6.8.0-1012.12 linux-oem-6.8-headers-6.8.0-1012 - 6.8.0-1012.12 linux-oem-6.8-tools-6.8.0-1012 - 6.8.0-1012.12 linux-oracle - 6.8.0-1012.12 linux-oracle-64k - 6.8.0-1012.12 linux-oracle-headers-6.8.0-1012 - 6.8.0-1012.12 linux-oracle-tools-6.8.0-1012 - 6.8.0-1012.12 linux-tools-6.8.0-1012-ibm - 6.8.0-1012.12 linux-tools-6.8.0-1012-oem - 6.8.0-1012.12 linux-tools-6.8.0-1012-oracle - 6.8.0-1012.12 linux-tools-6.8.0-1012-oracle-64k - 6.8.0-1012.12 linux-tools-ibm - 6.8.0-1012.12 linux-tools-ibm-classic - 6.8.0-1012.12 linux-tools-ibm-lts-24.04 - 6.8.0-1012.12 linux-tools-oem-24.04 - 6.8.0-1012.12 linux-tools-oem-24.04a - 6.8.0-1012.12 linux-tools-oracle - 6.8.0-1012.12 linux-tools-oracle-64k - 6.8.0-1012.12 No subscription required linux-buildinfo-6.8.0-1014-gcp - 6.8.0-1014.16 linux-gcp - 6.8.0-1014.16 linux-gcp-headers-6.8.0-1014 - 6.8.0-1014.16 linux-gcp-tools-6.8.0-1014 - 6.8.0-1014.16 linux-headers-6.8.0-1014-gcp - 6.8.0-1014.16 linux-headers-gcp - 6.8.0-1014.16 linux-image-6.8.0-1014-gcp - 6.8.0-1014.16 linux-image-gcp - 6.8.0-1014.16 linux-image-unsigned-6.8.0-1014-gcp - 6.8.0-1014.16 linux-modules-6.8.0-1014-gcp - 6.8.0-1014.16 linux-modules-extra-6.8.0-1014-gcp - 6.8.0-1014.16 linux-modules-extra-gcp - 6.8.0-1014.16 linux-tools-6.8.0-1014-gcp - 6.8.0-1014.16 linux-tools-gcp - 6.8.0-1014.16 No subscription required linux-aws - 6.8.0-1015.16 linux-aws-cloud-tools-6.8.0-1015 - 6.8.0-1015.16 linux-aws-headers-6.8.0-1015 - 6.8.0-1015.16 linux-aws-tools-6.8.0-1015 - 6.8.0-1015.16 linux-buildinfo-6.8.0-1015-aws - 6.8.0-1015.16 linux-cloud-tools-6.8.0-1015-aws - 6.8.0-1015.16 linux-headers-6.8.0-1015-aws - 6.8.0-1015.16 linux-headers-aws - 6.8.0-1015.16 linux-image-6.8.0-1015-aws - 6.8.0-1015.16 linux-image-aws - 6.8.0-1015.16 linux-image-unsigned-6.8.0-1015-aws - 6.8.0-1015.16 linux-modules-6.8.0-1015-aws - 6.8.0-1015.16 linux-modules-extra-6.8.0-1015-aws - 6.8.0-1015.16 linux-modules-extra-aws - 6.8.0-1015.16 linux-tools-6.8.0-1015-aws - 6.8.0-1015.16 linux-tools-aws - 6.8.0-1015.16 No subscription required linux-buildinfo-6.8.0-44-generic - 6.8.0-44.44 linux-buildinfo-6.8.0-44-generic-64k - 6.8.0-44.44 linux-cloud-tools-6.8.0-44 - 6.8.0-44.44 linux-cloud-tools-6.8.0-44-generic - 6.8.0-44.44 linux-cloud-tools-common - 6.8.0-44.44 linux-cloud-tools-generic - 6.8.0-44.44 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-44.44 linux-cloud-tools-generic-hwe-24.04-edge - 6.8.0-44.44 linux-cloud-tools-virtual - 6.8.0-44.44 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-44.44 linux-cloud-tools-virtual-hwe-24.04-edge - 6.8.0-44.44 linux-crashdump - 6.8.0-44.44 linux-doc - 6.8.0-44.44 linux-generic - 6.8.0-44.44 linux-generic-64k - 6.8.0-44.44 linux-generic-64k-hwe-24.04 - 6.8.0-44.44 linux-generic-64k-hwe-24.04-edge - 6.8.0-44.44 linux-generic-hwe-24.04 - 6.8.0-44.44 linux-generic-hwe-24.04-edge - 6.8.0-44.44 linux-generic-lpae - 6.8.0-44.44 linux-headers-6.8.0-44 - 6.8.0-44.44 linux-headers-6.8.0-44-generic - 6.8.0-44.44 linux-headers-6.8.0-44-generic-64k - 6.8.0-44.44 linux-headers-generic - 6.8.0-44.44 linux-headers-generic-64k - 6.8.0-44.44 linux-headers-generic-64k-hwe-24.04 - 6.8.0-44.44 linux-headers-generic-64k-hwe-24.04-edge - 6.8.0-44.44 linux-headers-generic-hwe-24.04 - 6.8.0-44.44 linux-headers-generic-hwe-24.04-edge - 6.8.0-44.44 linux-headers-generic-lpae - 6.8.0-44.44 linux-headers-kvm - 6.8.0-44.44 linux-headers-laptop-23.10 - 6.8.0-44.44 linux-headers-oem-20.04 - 6.8.0-44.44 linux-headers-oem-20.04b - 6.8.0-44.44 linux-headers-oem-20.04c - 6.8.0-44.44 linux-headers-oem-20.04d - 6.8.0-44.44 linux-headers-oem-22.04 - 6.8.0-44.44 linux-headers-virtual - 6.8.0-44.44 linux-headers-virtual-hwe-24.04 - 6.8.0-44.44 linux-headers-virtual-hwe-24.04-edge - 6.8.0-44.44 linux-image-6.8.0-44-generic - 6.8.0-44.44 linux-image-6.8.0-44-generic-64k - 6.8.0-44.44 linux-image-extra-virtual - 6.8.0-44.44 linux-image-extra-virtual-hwe-24.04 - 6.8.0-44.44 linux-image-extra-virtual-hwe-24.04-edge - 6.8.0-44.44 linux-image-generic - 6.8.0-44.44 linux-image-generic-64k - 6.8.0-44.44 linux-image-generic-64k-hwe-24.04 - 6.8.0-44.44 linux-image-generic-64k-hwe-24.04-edge - 6.8.0-44.44 linux-image-generic-hwe-24.04 - 6.8.0-44.44 linux-image-generic-hwe-24.04-edge - 6.8.0-44.44 linux-image-generic-lpae - 6.8.0-44.44 linux-image-kvm - 6.8.0-44.44 linux-image-laptop-23.10 - 6.8.0-44.44 linux-image-oem-20.04 - 6.8.0-44.44 linux-image-oem-20.04b - 6.8.0-44.44 linux-image-oem-20.04c - 6.8.0-44.44 linux-image-oem-20.04d - 6.8.0-44.44 linux-image-oem-22.04 - 6.8.0-44.44 linux-image-uc-6.8.0-44-generic - 6.8.0-44.44 linux-image-uc-6.8.0-44-generic-64k - 6.8.0-44.44 linux-image-uc-generic - 6.8.0-44.44 linux-image-uc-generic-hwe-24.04 - 6.8.0-44.44 linux-image-uc-generic-hwe-24.04-edge - 6.8.0-44.44 linux-image-unsigned-6.8.0-44-generic - 6.8.0-44.44 linux-image-unsigned-6.8.0-44-generic-64k - 6.8.0-44.44 linux-image-virtual - 6.8.0-44.44 linux-image-virtual-hwe-24.04 - 6.8.0-44.44 linux-image-virtual-hwe-24.04-edge - 6.8.0-44.44 linux-kvm - 6.8.0-44.44 linux-laptop-23.10 - 6.8.0-44.44 linux-lib-rust-6.8.0-44-generic - 6.8.0-44.44 linux-libc-dev - 6.8.0-44.44 linux-modules-6.8.0-44-generic - 6.8.0-44.44 linux-modules-6.8.0-44-generic-64k - 6.8.0-44.44 linux-modules-extra-6.8.0-44-generic - 6.8.0-44.44 linux-modules-ipu6-6.8.0-44-generic - 6.8.0-44.44 linux-modules-ipu6-generic - 6.8.0-44.44 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-44.44 linux-modules-ipu6-generic-hwe-24.04-edge - 6.8.0-44.44 linux-modules-iwlwifi-6.8.0-44-generic - 6.8.0-44.44 linux-modules-iwlwifi-generic - 6.8.0-44.44 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-44.44 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.8.0-44.44 linux-modules-iwlwifi-oem-20.04 - 6.8.0-44.44 linux-modules-iwlwifi-oem-20.04d - 6.8.0-44.44 linux-modules-iwlwifi-oem-22.04 - 6.8.0-44.44 linux-modules-usbio-6.8.0-44-generic - 6.8.0-44.44 linux-modules-usbio-generic - 6.8.0-44.44 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-44.44 linux-modules-usbio-generic-hwe-24.04-edge - 6.8.0-44.44 linux-oem-20.04 - 6.8.0-44.44 linux-oem-20.04b - 6.8.0-44.44 linux-oem-20.04c - 6.8.0-44.44 linux-oem-20.04d - 6.8.0-44.44 linux-oem-22.04 - 6.8.0-44.44 linux-source - 6.8.0-44.44 linux-source-6.8.0 - 6.8.0-44.44 linux-tools-6.8.0-44 - 6.8.0-44.44 linux-tools-6.8.0-44-generic - 6.8.0-44.44 linux-tools-6.8.0-44-generic-64k - 6.8.0-44.44 linux-tools-common - 6.8.0-44.44 linux-tools-generic - 6.8.0-44.44 linux-tools-generic-64k - 6.8.0-44.44 linux-tools-generic-64k-hwe-24.04 - 6.8.0-44.44 linux-tools-generic-64k-hwe-24.04-edge - 6.8.0-44.44 linux-tools-generic-hwe-24.04 - 6.8.0-44.44 linux-tools-generic-hwe-24.04-edge - 6.8.0-44.44 linux-tools-generic-lpae - 6.8.0-44.44 linux-tools-host - 6.8.0-44.44 linux-tools-kvm - 6.8.0-44.44 linux-tools-laptop-23.10 - 6.8.0-44.44 linux-tools-oem-20.04 - 6.8.0-44.44 linux-tools-oem-20.04b - 6.8.0-44.44 linux-tools-oem-20.04c - 6.8.0-44.44 linux-tools-oem-20.04d - 6.8.0-44.44 linux-tools-oem-22.04 - 6.8.0-44.44 linux-tools-virtual - 6.8.0-44.44 linux-tools-virtual-hwe-24.04 - 6.8.0-44.44 linux-tools-virtual-hwe-24.04-edge - 6.8.0-44.44 linux-virtual - 6.8.0-44.44 linux-virtual-hwe-24.04 - 6.8.0-44.44 linux-virtual-hwe-24.04-edge - 6.8.0-44.44 No subscription required linux-buildinfo-6.8.0-44-lowlatency - 6.8.0-44.44.1 linux-buildinfo-6.8.0-44-lowlatency-64k - 6.8.0-44.44.1 linux-cloud-tools-6.8.0-44-lowlatency - 6.8.0-44.44.1 linux-cloud-tools-lowlatency - 6.8.0-44.44.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-44.44.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-44.44.1 linux-cloud-tools-lowlatency-hwe-22.04 - 6.8.0-44.44.1 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.8.0-44.44.1 linux-headers-6.8.0-44-lowlatency - 6.8.0-44.44.1 linux-headers-6.8.0-44-lowlatency-64k - 6.8.0-44.44.1 linux-headers-lowlatency - 6.8.0-44.44.1 linux-headers-lowlatency-64k - 6.8.0-44.44.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-44.44.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-44.44.1 linux-headers-lowlatency-64k-hwe-22.04 - 6.8.0-44.44.1 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.8.0-44.44.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-44.44.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-44.44.1 linux-headers-lowlatency-hwe-22.04 - 6.8.0-44.44.1 linux-headers-lowlatency-hwe-22.04-edge - 6.8.0-44.44.1 linux-image-6.8.0-44-lowlatency - 6.8.0-44.44.1 linux-image-6.8.0-44-lowlatency-64k - 6.8.0-44.44.1 linux-image-lowlatency - 6.8.0-44.44.1 linux-image-lowlatency-64k - 6.8.0-44.44.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-44.44.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-44.44.1 linux-image-lowlatency-64k-hwe-22.04 - 6.8.0-44.44.1 linux-image-lowlatency-64k-hwe-22.04-edge - 6.8.0-44.44.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-44.44.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-44.44.1 linux-image-lowlatency-hwe-22.04 - 6.8.0-44.44.1 linux-image-lowlatency-hwe-22.04-edge - 6.8.0-44.44.1 linux-image-unsigned-6.8.0-44-lowlatency - 6.8.0-44.44.1 linux-image-unsigned-6.8.0-44-lowlatency-64k - 6.8.0-44.44.1 linux-lowlatency - 6.8.0-44.44.1 linux-lowlatency-64k - 6.8.0-44.44.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-44.44.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-44.44.1 linux-lowlatency-64k-hwe-22.04 - 6.8.0-44.44.1 linux-lowlatency-64k-hwe-22.04-edge - 6.8.0-44.44.1 linux-lowlatency-cloud-tools-6.8.0-44 - 6.8.0-44.44.1 linux-lowlatency-cloud-tools-common - 6.8.0-44.44.1 linux-lowlatency-headers-6.8.0-44 - 6.8.0-44.44.1 linux-lowlatency-hwe-20.04 - 6.8.0-44.44.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-44.44.1 linux-lowlatency-hwe-22.04 - 6.8.0-44.44.1 linux-lowlatency-hwe-22.04-edge - 6.8.0-44.44.1 linux-lowlatency-lib-rust-6.8.0-44-lowlatency - 6.8.0-44.44.1 linux-lowlatency-tools-6.8.0-44 - 6.8.0-44.44.1 linux-lowlatency-tools-common - 6.8.0-44.44.1 linux-lowlatency-tools-host - 6.8.0-44.44.1 linux-modules-6.8.0-44-lowlatency - 6.8.0-44.44.1 linux-modules-6.8.0-44-lowlatency-64k - 6.8.0-44.44.1 linux-modules-iwlwifi-6.8.0-44-lowlatency - 6.8.0-44.44.1 linux-modules-iwlwifi-lowlatency - 6.8.0-44.44.1 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.8.0-44.44.1 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.8.0-44.44.1 linux-tools-6.8.0-44-lowlatency - 6.8.0-44.44.1 linux-tools-6.8.0-44-lowlatency-64k - 6.8.0-44.44.1 linux-tools-lowlatency - 6.8.0-44.44.1 linux-tools-lowlatency-64k - 6.8.0-44.44.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-44.44.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-44.44.1 linux-tools-lowlatency-64k-hwe-22.04 - 6.8.0-44.44.1 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.8.0-44.44.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-44.44.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-44.44.1 linux-tools-lowlatency-hwe-22.04 - 6.8.0-44.44.1 linux-tools-lowlatency-hwe-22.04-edge - 6.8.0-44.44.1 No subscription required
High
CVE-2022-48772
CVE-2023-52884
CVE-2024-23848
CVE-2024-31076
CVE-2024-32936
CVE-2024-33619
CVE-2024-33621
CVE-2024-33847
CVE-2024-34027
CVE-2024-34030
CVE-2024-34777
CVE-2024-35247
CVE-2024-36015
CVE-2024-36244
CVE-2024-36270
CVE-2024-36281
CVE-2024-36286
CVE-2024-36288
CVE-2024-36477
CVE-2024-36478
CVE-2024-36479
CVE-2024-36481
CVE-2024-36484
CVE-2024-36489
CVE-2024-36971
CVE-2024-36972
CVE-2024-36973
CVE-2024-36974
CVE-2024-36978
CVE-2024-37021
CVE-2024-37026
CVE-2024-37078
CVE-2024-37354
CVE-2024-37356
CVE-2024-38306
CVE-2024-38381
CVE-2024-38384
CVE-2024-38385
CVE-2024-38388
CVE-2024-38390
CVE-2024-38618
CVE-2024-38619
CVE-2024-38621
CVE-2024-38622
CVE-2024-38623
CVE-2024-38624
CVE-2024-38625
CVE-2024-38627
CVE-2024-38628
CVE-2024-38629
CVE-2024-38630
CVE-2024-38632
CVE-2024-38633
CVE-2024-38634
CVE-2024-38635
CVE-2024-38636
CVE-2024-38637
CVE-2024-38659
CVE-2024-38661
CVE-2024-38662
CVE-2024-38663
CVE-2024-38664
CVE-2024-38667
CVE-2024-38780
CVE-2024-39276
CVE-2024-39277
CVE-2024-39291
CVE-2024-39296
CVE-2024-39298
CVE-2024-39301
CVE-2024-39371
CVE-2024-39461
CVE-2024-39462
CVE-2024-39463
CVE-2024-39464
CVE-2024-39465
CVE-2024-39466
CVE-2024-39467
CVE-2024-39468
CVE-2024-39469
CVE-2024-39470
CVE-2024-39471
CVE-2024-39473
CVE-2024-39474
CVE-2024-39475
CVE-2024-39478
CVE-2024-39479
CVE-2024-39480
CVE-2024-39481
CVE-2024-39483
CVE-2024-39485
CVE-2024-39488
CVE-2024-39489
CVE-2024-39490
CVE-2024-39491
CVE-2024-39492
CVE-2024-39493
CVE-2024-39494
CVE-2024-39495
CVE-2024-39496
CVE-2024-39497
CVE-2024-39498
CVE-2024-39499
CVE-2024-39500
CVE-2024-39501
CVE-2024-39502
CVE-2024-39503
CVE-2024-39504
CVE-2024-39505
CVE-2024-39506
CVE-2024-39507
CVE-2024-39508
CVE-2024-39509
CVE-2024-39510
CVE-2024-40899
CVE-2024-40900
CVE-2024-40901
CVE-2024-40902
CVE-2024-40903
CVE-2024-40904
CVE-2024-40905
CVE-2024-40906
CVE-2024-40908
CVE-2024-40909
CVE-2024-40910
CVE-2024-40911
CVE-2024-40912
CVE-2024-40913
CVE-2024-40914
CVE-2024-40915
CVE-2024-40916
CVE-2024-40917
CVE-2024-40918
CVE-2024-40919
CVE-2024-40920
CVE-2024-40921
CVE-2024-40922
CVE-2024-40923
CVE-2024-40924
CVE-2024-40925
CVE-2024-40926
CVE-2024-40927
CVE-2024-40928
CVE-2024-40929
CVE-2024-40930
CVE-2024-40931
CVE-2024-40932
CVE-2024-40933
CVE-2024-40934
CVE-2024-40935
CVE-2024-40936
CVE-2024-40937
CVE-2024-40938
CVE-2024-40939
CVE-2024-40940
CVE-2024-40941
CVE-2024-40942
CVE-2024-40943
CVE-2024-40944
CVE-2024-40945
CVE-2024-40947
CVE-2024-40948
CVE-2024-40949
CVE-2024-40951
CVE-2024-40952
CVE-2024-40953
CVE-2024-40954
CVE-2024-40955
CVE-2024-40956
CVE-2024-40957
CVE-2024-40958
CVE-2024-40959
CVE-2024-40960
CVE-2024-40961
CVE-2024-40962
CVE-2024-40963
CVE-2024-40964
CVE-2024-40965
CVE-2024-40966
CVE-2024-40967
CVE-2024-40968
CVE-2024-40969
CVE-2024-40970
CVE-2024-40971
CVE-2024-40972
CVE-2024-40973
CVE-2024-40974
CVE-2024-40975
CVE-2024-40976
CVE-2024-40977
CVE-2024-40978
CVE-2024-40979
CVE-2024-40980
CVE-2024-40981
CVE-2024-40982
CVE-2024-40983
CVE-2024-40984
CVE-2024-40985
CVE-2024-40986
CVE-2024-40987
CVE-2024-40988
CVE-2024-40989
CVE-2024-40990
CVE-2024-40992
CVE-2024-40994
CVE-2024-40995
CVE-2024-40996
CVE-2024-40997
CVE-2024-40998
CVE-2024-40999
CVE-2024-41000
CVE-2024-41001
CVE-2024-41002
CVE-2024-41003
CVE-2024-41004
CVE-2024-41005
CVE-2024-41006
CVE-2024-41040
CVE-2024-42078
CVE-2024-42148
USN-6999-2 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Chenyuan Yang discovered that the CEC driver driver in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2024-23848) It was discovered that the JFS file system contained an out-of-bounds read vulnerability when printing xattr debug information. A local attacker could use this to cause a denial of service (system crash). (CVE-2024-40902) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PA-RISC architecture; - PowerPC architecture; - RISC-V architecture; - x86 architecture; - Block layer subsystem; - ACPI drivers; - Drivers core; - Null block device driver; - Character device driver; - TPM device driver; - Clock framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - Buffer Sharing and Synchronization framework; - DMA engine subsystem; - EFI core; - FPGA Framework; - GPU drivers; - Greybus drivers; - HID subsystem; - HW tracing; - I2C subsystem; - IIO subsystem; - InfiniBand drivers; - Input Device (Mouse) drivers; - Mailbox framework; - Media drivers; - Microchip PCI driver; - VMware VMCI Driver; - Network drivers; - PCI subsystem; - x86 platform drivers; - PTP clock framework; - S/390 drivers; - SCSI drivers; - SoundWire subsystem; - Sonic Silicon Backplane drivers; - Greybus lights staging drivers; - Thermal drivers; - TTY drivers; - USB subsystem; - VFIO drivers; - Framebuffer layer; - Watchdog drivers; - 9P distributed file system; - BTRFS file system; - File systems infrastructure; - Ext4 file system; - F2FS file system; - JFS file system; - Network file system server daemon; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - Tracing file system; - IOMMU subsystem; - Tracing infrastructure; - io_uring subsystem; - Core kernel; - BPF subsystem; - Kernel debugger infrastructure; - DMA mapping infrastructure; - IRQ subsystem; - Memory management; - 9P file system network protocol; - Amateur Radio drivers; - B.A.T.M.A.N. meshing protocol; - Ethernet bridge; - Networking core; - Ethtool driver; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - Netfilter; - NET/ROM layer; - NFC subsystem; - Network traffic control; - Sun RPC protocol; - TIPC protocol; - TLS protocol; - Unix domain sockets; - Wireless networking; - XFRM subsystem; - AppArmor security module; - Integrity Measurement Architecture(IMA) framework; - Landlock security; - Linux Security Modules (LSM) Framework; - SELinux security module; - Simplified Mandatory Access Control Kernel framework; - ALSA framework; - HD-audio driver; - SOF drivers; - KVM core; (CVE-2024-40978, CVE-2024-39504, CVE-2024-39483, CVE-2024-36478, CVE-2024-40928, CVE-2024-36971, CVE-2024-40947, CVE-2024-31076, CVE-2024-40934, CVE-2024-40909, CVE-2024-40962, CVE-2024-38635, CVE-2024-38632, CVE-2024-40912, CVE-2024-40967, CVE-2024-39492, CVE-2024-40974, CVE-2024-39466, CVE-2024-40939, CVE-2024-40988, CVE-2024-40951, CVE-2024-41005, CVE-2024-40968, CVE-2024-39493, CVE-2024-40949, CVE-2022-48772, CVE-2024-40944, CVE-2024-40998, CVE-2024-39490, CVE-2024-39467, CVE-2024-42078, CVE-2024-40953, CVE-2024-40990, CVE-2024-40902, CVE-2024-39461, CVE-2024-39301, CVE-2024-36978, CVE-2024-39475, CVE-2024-39496, CVE-2024-40901, CVE-2024-40985, CVE-2024-33621, CVE-2024-38663, CVE-2024-39497, CVE-2024-40937, CVE-2024-40941, CVE-2024-40987, CVE-2024-40918, CVE-2024-32936, CVE-2024-40999, CVE-2024-40938, CVE-2024-39488, CVE-2024-39510, CVE-2024-40924, CVE-2024-38661, CVE-2024-40989, CVE-2024-39509, CVE-2024-40983, CVE-2024-39471, CVE-2024-39502, CVE-2024-39508, CVE-2024-39371, CVE-2024-40982, CVE-2024-40910, CVE-2024-40903, CVE-2024-39296, CVE-2024-39507, CVE-2024-40906, CVE-2024-37354, CVE-2024-40905, CVE-2024-34027, CVE-2024-38618, CVE-2024-40900, CVE-2024-39469, CVE-2024-38662, CVE-2024-35247, CVE-2024-40922, CVE-2024-40926, CVE-2024-39503, CVE-2024-40899, CVE-2024-40977, CVE-2024-38634, CVE-2024-40933, CVE-2024-40992, CVE-2024-40904, CVE-2024-36479, CVE-2024-40996, CVE-2024-40957, CVE-2024-40931, CVE-2024-39291, CVE-2024-38780, CVE-2024-39277, CVE-2024-38628, CVE-2024-40932, CVE-2024-41004, CVE-2024-33847, CVE-2024-40972, CVE-2024-40945, CVE-2023-52884, CVE-2024-38664, CVE-2024-39462, CVE-2024-40965, CVE-2024-38388, CVE-2024-40916, CVE-2024-36489, CVE-2024-40975, CVE-2024-40942, CVE-2024-40995, CVE-2024-40997, CVE-2024-38385, CVE-2024-40911, CVE-2024-39474, CVE-2024-39470, CVE-2024-41000, CVE-2024-36015, CVE-2024-38633, CVE-2024-40943, CVE-2024-39489, CVE-2024-36477, CVE-2024-39491, CVE-2024-40919, CVE-2024-40914, CVE-2024-40966, CVE-2024-41002, CVE-2024-40960, CVE-2024-38624, CVE-2024-40964, CVE-2024-40936, CVE-2024-40913, CVE-2024-40955, CVE-2024-37026, CVE-2024-38384, CVE-2024-37078, CVE-2024-36244, CVE-2024-38622, CVE-2024-39485, CVE-2024-39479, CVE-2024-39505, CVE-2024-36973, CVE-2024-39498, CVE-2024-40908, CVE-2024-37356, CVE-2024-39480, CVE-2024-38381, CVE-2024-40940, CVE-2024-40980, CVE-2024-39276, CVE-2024-39499, CVE-2024-36484, CVE-2024-38636, CVE-2024-38390, CVE-2024-38619, CVE-2024-39478, CVE-2024-40959, CVE-2024-36288, CVE-2024-40935, CVE-2024-41006, CVE-2024-38625, CVE-2024-36972, CVE-2024-39298, CVE-2024-39468, CVE-2024-40970, CVE-2024-37021, CVE-2024-40981, CVE-2024-40921, CVE-2024-34777, CVE-2024-39500, CVE-2024-40927, CVE-2024-40979, CVE-2024-38627, CVE-2024-39501, CVE-2024-39481, CVE-2024-40917, CVE-2024-40956, CVE-2024-42148, CVE-2024-36481, CVE-2024-40925, CVE-2024-40986, CVE-2024-40948, CVE-2024-41003, CVE-2024-39506, CVE-2024-40952, CVE-2024-38306, CVE-2024-40971, CVE-2024-41001, CVE-2024-40973, CVE-2024-36281, CVE-2024-40923, CVE-2024-39473, CVE-2024-38637, CVE-2024-40984, CVE-2024-39463, CVE-2024-41040, CVE-2024-38623, CVE-2024-40954, CVE-2024-36286, CVE-2024-38667, CVE-2024-39465, CVE-2024-40915, CVE-2024-33619, CVE-2024-40920, CVE-2024-40969, CVE-2024-38659, CVE-2024-34030, CVE-2024-38630, CVE-2024-40976, CVE-2024-36974, CVE-2024-40930, CVE-2024-39464, CVE-2024-38621, CVE-2024-40958, CVE-2024-40994, CVE-2024-39494, CVE-2024-40961, CVE-2024-39495, CVE-2024-40963, CVE-2024-36270, CVE-2024-38629, CVE-2024-40929) Update Instructions: Run `sudo pro fix USN-6999-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1011-raspi - 6.8.0-1011.12 linux-headers-6.8.0-1011-raspi - 6.8.0-1011.12 linux-headers-raspi - 6.8.0-1011.12 linux-image-6.8.0-1011-raspi - 6.8.0-1011.12 linux-image-raspi - 6.8.0-1011.12 linux-modules-6.8.0-1011-raspi - 6.8.0-1011.12 linux-raspi - 6.8.0-1011.12 linux-raspi-headers-6.8.0-1011 - 6.8.0-1011.12 linux-raspi-tools-6.8.0-1011 - 6.8.0-1011.12 linux-tools-6.8.0-1011-raspi - 6.8.0-1011.12 linux-tools-raspi - 6.8.0-1011.12 No subscription required
High
CVE-2022-48772
CVE-2023-52884
CVE-2024-23848
CVE-2024-31076
CVE-2024-32936
CVE-2024-33619
CVE-2024-33621
CVE-2024-33847
CVE-2024-34027
CVE-2024-34030
CVE-2024-34777
CVE-2024-35247
CVE-2024-36015
CVE-2024-36244
CVE-2024-36270
CVE-2024-36281
CVE-2024-36286
CVE-2024-36288
CVE-2024-36477
CVE-2024-36478
CVE-2024-36479
CVE-2024-36481
CVE-2024-36484
CVE-2024-36489
CVE-2024-36971
CVE-2024-36972
CVE-2024-36973
CVE-2024-36974
CVE-2024-36978
CVE-2024-37021
CVE-2024-37026
CVE-2024-37078
CVE-2024-37354
CVE-2024-37356
CVE-2024-38306
CVE-2024-38381
CVE-2024-38384
CVE-2024-38385
CVE-2024-38388
CVE-2024-38390
CVE-2024-38618
CVE-2024-38619
CVE-2024-38621
CVE-2024-38622
CVE-2024-38623
CVE-2024-38624
CVE-2024-38625
CVE-2024-38627
CVE-2024-38628
CVE-2024-38629
CVE-2024-38630
CVE-2024-38632
CVE-2024-38633
CVE-2024-38634
CVE-2024-38635
CVE-2024-38636
CVE-2024-38637
CVE-2024-38659
CVE-2024-38661
CVE-2024-38662
CVE-2024-38663
CVE-2024-38664
CVE-2024-38667
CVE-2024-38780
CVE-2024-39276
CVE-2024-39277
CVE-2024-39291
CVE-2024-39296
CVE-2024-39298
CVE-2024-39301
CVE-2024-39371
CVE-2024-39461
CVE-2024-39462
CVE-2024-39463
CVE-2024-39464
CVE-2024-39465
CVE-2024-39466
CVE-2024-39467
CVE-2024-39468
CVE-2024-39469
CVE-2024-39470
CVE-2024-39471
CVE-2024-39473
CVE-2024-39474
CVE-2024-39475
CVE-2024-39478
CVE-2024-39479
CVE-2024-39480
CVE-2024-39481
CVE-2024-39483
CVE-2024-39485
CVE-2024-39488
CVE-2024-39489
CVE-2024-39490
CVE-2024-39491
CVE-2024-39492
CVE-2024-39493
CVE-2024-39494
CVE-2024-39495
CVE-2024-39496
CVE-2024-39497
CVE-2024-39498
CVE-2024-39499
CVE-2024-39500
CVE-2024-39501
CVE-2024-39502
CVE-2024-39503
CVE-2024-39504
CVE-2024-39505
CVE-2024-39506
CVE-2024-39507
CVE-2024-39508
CVE-2024-39509
CVE-2024-39510
CVE-2024-40899
CVE-2024-40900
CVE-2024-40901
CVE-2024-40902
CVE-2024-40903
CVE-2024-40904
CVE-2024-40905
CVE-2024-40906
CVE-2024-40908
CVE-2024-40909
CVE-2024-40910
CVE-2024-40911
CVE-2024-40912
CVE-2024-40913
CVE-2024-40914
CVE-2024-40915
CVE-2024-40916
CVE-2024-40917
CVE-2024-40918
CVE-2024-40919
CVE-2024-40920
CVE-2024-40921
CVE-2024-40922
CVE-2024-40923
CVE-2024-40924
CVE-2024-40925
CVE-2024-40926
CVE-2024-40927
CVE-2024-40928
CVE-2024-40929
CVE-2024-40930
CVE-2024-40931
CVE-2024-40932
CVE-2024-40933
CVE-2024-40934
CVE-2024-40935
CVE-2024-40936
CVE-2024-40937
CVE-2024-40938
CVE-2024-40939
CVE-2024-40940
CVE-2024-40941
CVE-2024-40942
CVE-2024-40943
CVE-2024-40944
CVE-2024-40945
CVE-2024-40947
CVE-2024-40948
CVE-2024-40949
CVE-2024-40951
CVE-2024-40952
CVE-2024-40953
CVE-2024-40954
CVE-2024-40955
CVE-2024-40956
CVE-2024-40957
CVE-2024-40958
CVE-2024-40959
CVE-2024-40960
CVE-2024-40961
CVE-2024-40962
CVE-2024-40963
CVE-2024-40964
CVE-2024-40965
CVE-2024-40966
CVE-2024-40967
CVE-2024-40968
CVE-2024-40969
CVE-2024-40970
CVE-2024-40971
CVE-2024-40972
CVE-2024-40973
CVE-2024-40974
CVE-2024-40975
CVE-2024-40976
CVE-2024-40977
CVE-2024-40978
CVE-2024-40979
CVE-2024-40980
CVE-2024-40981
CVE-2024-40982
CVE-2024-40983
CVE-2024-40984
CVE-2024-40985
CVE-2024-40986
CVE-2024-40987
CVE-2024-40988
CVE-2024-40989
CVE-2024-40990
CVE-2024-40992
CVE-2024-40994
CVE-2024-40995
CVE-2024-40996
CVE-2024-40997
CVE-2024-40998
CVE-2024-40999
CVE-2024-41000
CVE-2024-41001
CVE-2024-41002
CVE-2024-41003
CVE-2024-41004
CVE-2024-41005
CVE-2024-41006
CVE-2024-41040
CVE-2024-42078
CVE-2024-42148
USN-7000-1 -- Expat vulnerabilities
Ubuntu 24.04 LTS
Shang-Hung Wan discovered that Expat did not properly handle certain function calls when a negative input length was provided. An attacker could use this issue to cause a denial of service or possibly execute arbitrary code. (CVE-2024-45490) Shang-Hung Wan discovered that Expat did not properly handle the potential for an integer overflow on 32-bit platforms. An attacker could use this issue to cause a denial of service or possibly execute arbitrary code. (CVE-2024-45491, CVE-2024-45492) Update Instructions: Run `sudo pro fix USN-7000-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: expat - 2.6.1-2ubuntu0.1 libexpat1 - 2.6.1-2ubuntu0.1 libexpat1-dev - 2.6.1-2ubuntu0.1 No subscription required
Medium
CVE-2024-45490
CVE-2024-45491
CVE-2024-45492
USN-7001-2 -- xmltok library vulnerabilities
Ubuntu 24.04 LTS
USN-7001-1 fixed vulnerabilities in xmltol library. This update provides the corresponding updates for Ubuntu 24.04 LTS. Original advisory details: Shang-Hung Wan discovered that Expat, contained within the xmltok library, did not properly handle certain function calls when a negative input length was provided. An attacker could use this issue to cause a denial of service or possibly execute arbitrary code. (CVE-2024-45490) Shang-Hung Wan discovered that Expat, contained within the xmltok library, did not properly handle the potential for an integer overflow on 32-bit platforms. An attacker could use this issue to cause a denial of service or possibly execute arbitrary code. (CVE-2024-45491) Update Instructions: Run `sudo pro fix USN-7001-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libxmltok1-dev - 1.2-4.1ubuntu2.24.0.4.1+esm1 libxmltok1t64 - 1.2-4.1ubuntu2.24.0.4.1+esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2024-45490
CVE-2024-45491
USN-7002-1 -- Setuptools vulnerability
Ubuntu 24.04 LTS
It was discovered that setuptools was vulnerable to remote code execution. An attacker could possibly use this issue to execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7002-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-setuptools-doc - 68.1.2-2ubuntu1.1 python3-pkg-resources - 68.1.2-2ubuntu1.1 python3-setuptools - 68.1.2-2ubuntu1.1 python3-setuptools-whl - 68.1.2-2ubuntu1.1 No subscription required
Medium
CVE-2024-6345
USN-7004-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Chenyuan Yang discovered that the CEC driver driver in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2024-23848) It was discovered that the JFS file system contained an out-of-bounds read vulnerability when printing xattr debug information. A local attacker could use this to cause a denial of service (system crash). (CVE-2024-40902) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PA-RISC architecture; - PowerPC architecture; - RISC-V architecture; - x86 architecture; - Block layer subsystem; - ACPI drivers; - Drivers core; - Null block device driver; - Character device driver; - TPM device driver; - Clock framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - Buffer Sharing and Synchronization framework; - DMA engine subsystem; - EFI core; - FPGA Framework; - GPU drivers; - Greybus drivers; - HID subsystem; - HW tracing; - I2C subsystem; - IIO subsystem; - InfiniBand drivers; - Input Device (Mouse) drivers; - Mailbox framework; - Media drivers; - Microchip PCI driver; - VMware VMCI Driver; - Network drivers; - PCI subsystem; - x86 platform drivers; - PTP clock framework; - S/390 drivers; - SCSI drivers; - SoundWire subsystem; - Sonic Silicon Backplane drivers; - Greybus lights staging drivers; - Thermal drivers; - TTY drivers; - USB subsystem; - VFIO drivers; - Framebuffer layer; - Watchdog drivers; - 9P distributed file system; - BTRFS file system; - File systems infrastructure; - Ext4 file system; - F2FS file system; - JFS file system; - Network file system server daemon; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - Tracing file system; - IOMMU subsystem; - Tracing infrastructure; - io_uring subsystem; - Core kernel; - BPF subsystem; - Kernel debugger infrastructure; - DMA mapping infrastructure; - IRQ subsystem; - Memory management; - 9P file system network protocol; - Amateur Radio drivers; - B.A.T.M.A.N. meshing protocol; - Ethernet bridge; - Networking core; - Ethtool driver; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - Netfilter; - NET/ROM layer; - NFC subsystem; - Network traffic control; - Sun RPC protocol; - TIPC protocol; - TLS protocol; - Unix domain sockets; - Wireless networking; - XFRM subsystem; - AppArmor security module; - Integrity Measurement Architecture(IMA) framework; - Landlock security; - Linux Security Modules (LSM) Framework; - SELinux security module; - Simplified Mandatory Access Control Kernel framework; - ALSA framework; - HD-audio driver; - SOF drivers; - KVM core; (CVE-2024-36270, CVE-2024-38627, CVE-2024-39508, CVE-2024-41001, CVE-2024-38634, CVE-2024-40979, CVE-2024-40903, CVE-2024-34030, CVE-2024-38621, CVE-2024-34027, CVE-2024-39504, CVE-2024-38385, CVE-2024-36288, CVE-2024-39301, CVE-2024-38628, CVE-2024-42270, CVE-2024-39507, CVE-2024-36286, CVE-2024-40960, CVE-2024-36479, CVE-2024-41002, CVE-2024-36974, CVE-2024-40943, CVE-2024-40976, CVE-2024-38662, CVE-2024-40995, CVE-2024-39497, CVE-2024-31076, CVE-2024-39371, CVE-2024-40983, CVE-2024-40985, CVE-2024-38618, CVE-2024-40914, CVE-2024-40989, CVE-2024-40973, CVE-2024-38663, CVE-2024-39463, CVE-2024-38633, CVE-2024-36978, CVE-2024-40970, CVE-2024-40932, CVE-2024-39480, CVE-2024-39471, CVE-2024-40962, CVE-2024-40986, CVE-2024-40937, CVE-2024-39469, CVE-2024-40904, CVE-2024-39466, CVE-2024-38388, CVE-2024-39494, CVE-2024-41004, CVE-2024-38381, CVE-2022-48772, CVE-2024-33847, CVE-2024-40969, CVE-2024-40957, CVE-2024-40933, CVE-2024-37354, CVE-2024-39468, CVE-2024-40917, CVE-2024-38623, CVE-2024-40958, CVE-2024-39502, CVE-2024-38384, CVE-2024-39506, CVE-2024-40940, CVE-2024-34777, CVE-2024-41005, CVE-2024-39470, CVE-2024-39464, CVE-2024-39492, CVE-2024-38629, CVE-2024-39505, CVE-2024-40952, CVE-2024-40941, CVE-2024-39474, CVE-2024-38664, CVE-2024-40929, CVE-2024-39489, CVE-2024-40953, CVE-2024-40916, CVE-2024-40911, CVE-2024-32936, CVE-2024-40934, CVE-2024-37078, CVE-2024-39483, CVE-2024-40967, CVE-2024-40924, CVE-2024-39462, CVE-2024-40981, CVE-2024-36281, CVE-2024-39291, CVE-2024-39481, CVE-2024-40978, CVE-2024-38622, CVE-2024-39503, CVE-2024-40956, CVE-2023-52884, CVE-2024-39498, CVE-2024-38661, CVE-2024-40918, CVE-2024-39479, CVE-2024-40915, CVE-2024-39501, CVE-2024-39488, CVE-2024-40925, CVE-2024-40930, CVE-2024-40961, CVE-2024-40951, CVE-2024-38636, CVE-2024-39491, CVE-2024-39495, CVE-2024-39509, CVE-2024-40947, CVE-2024-36477, CVE-2024-36478, CVE-2024-42148, CVE-2024-39473, CVE-2024-39510, CVE-2024-40923, CVE-2024-38624, CVE-2024-38659, CVE-2024-36971, CVE-2024-38625, CVE-2024-40913, CVE-2024-35247, CVE-2024-36481, CVE-2024-36484, CVE-2024-40928, CVE-2024-40927, CVE-2024-40944, CVE-2024-39485, CVE-2024-36244, CVE-2024-40910, CVE-2024-40945, CVE-2024-33621, CVE-2024-38667, CVE-2024-40992, CVE-2024-40908, CVE-2024-40901, CVE-2024-40906, CVE-2024-38390, CVE-2024-40900, CVE-2024-41006, CVE-2024-40968, CVE-2024-40966, CVE-2024-40977, CVE-2024-33619, CVE-2024-39496, CVE-2024-38630, CVE-2024-40920, CVE-2024-39499, CVE-2024-40899, CVE-2024-41003, CVE-2024-40964, CVE-2024-40922, CVE-2024-38632, CVE-2024-40931, CVE-2024-40982, CVE-2024-40971, CVE-2024-39277, CVE-2024-39467, CVE-2024-36015, CVE-2024-40954, CVE-2024-40938, CVE-2024-40921, CVE-2024-39296, CVE-2024-41040, CVE-2024-40965, CVE-2024-39465, CVE-2024-40984, CVE-2024-39478, CVE-2024-40990, CVE-2024-40926, CVE-2024-40980, CVE-2024-40905, CVE-2024-39475, CVE-2024-40959, CVE-2024-40902, CVE-2024-38780, CVE-2024-40935, CVE-2024-37021, CVE-2024-40997, CVE-2024-40936, CVE-2024-40987, CVE-2024-40939, CVE-2024-37026, CVE-2024-36973, CVE-2024-40972, CVE-2024-42078, CVE-2024-38306, CVE-2024-40949, CVE-2024-36489, CVE-2024-38637, CVE-2024-40912, CVE-2024-39276, CVE-2024-39493, CVE-2024-40994, CVE-2024-40948, CVE-2024-36972, CVE-2024-40942, CVE-2024-37356, CVE-2024-38619, CVE-2024-40988, CVE-2024-38635, CVE-2024-41000, CVE-2024-40955, CVE-2024-40999, CVE-2024-40974, CVE-2024-39490, CVE-2024-39298, CVE-2024-40975, CVE-2024-40998, CVE-2024-40996, CVE-2024-40963, CVE-2024-40909, CVE-2024-40919, CVE-2024-39500, CVE-2024-39461) Update Instructions: Run `sudo pro fix USN-7004-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-azure - 6.8.0-1014.16 linux-azure-cloud-tools-6.8.0-1014 - 6.8.0-1014.16 linux-azure-fde - 6.8.0-1014.16 linux-azure-headers-6.8.0-1014 - 6.8.0-1014.16 linux-azure-tools-6.8.0-1014 - 6.8.0-1014.16 linux-buildinfo-6.8.0-1014-azure - 6.8.0-1014.16 linux-cloud-tools-6.8.0-1014-azure - 6.8.0-1014.16 linux-cloud-tools-azure - 6.8.0-1014.16 linux-headers-6.8.0-1014-azure - 6.8.0-1014.16 linux-headers-azure - 6.8.0-1014.16 linux-image-6.8.0-1014-azure - 6.8.0-1014.16 linux-image-6.8.0-1014-azure-fde - 6.8.0-1014.16 linux-image-azure - 6.8.0-1014.16 linux-image-azure-fde - 6.8.0-1014.16 linux-image-unsigned-6.8.0-1014-azure - 6.8.0-1014.16 linux-modules-6.8.0-1014-azure - 6.8.0-1014.16 linux-modules-extra-6.8.0-1014-azure - 6.8.0-1014.16 linux-modules-extra-azure - 6.8.0-1014.16 linux-modules-involflt-6.8.0-1014-azure - 6.8.0-1014.16 linux-modules-involflt-azure - 6.8.0-1014.16 linux-modules-iwlwifi-6.8.0-1014-azure - 6.8.0-1014.16 linux-modules-iwlwifi-azure - 6.8.0-1014.16 linux-tools-6.8.0-1014-azure - 6.8.0-1014.16 linux-tools-azure - 6.8.0-1014.16 No subscription required
High
CVE-2022-48772
CVE-2023-52884
CVE-2024-23848
CVE-2024-31076
CVE-2024-32936
CVE-2024-33619
CVE-2024-33621
CVE-2024-33847
CVE-2024-34027
CVE-2024-34030
CVE-2024-34777
CVE-2024-35247
CVE-2024-36015
CVE-2024-36244
CVE-2024-36270
CVE-2024-36281
CVE-2024-36286
CVE-2024-36288
CVE-2024-36477
CVE-2024-36478
CVE-2024-36479
CVE-2024-36481
CVE-2024-36484
CVE-2024-36489
CVE-2024-36971
CVE-2024-36972
CVE-2024-36973
CVE-2024-36974
CVE-2024-36978
CVE-2024-37021
CVE-2024-37026
CVE-2024-37078
CVE-2024-37354
CVE-2024-37356
CVE-2024-38306
CVE-2024-38381
CVE-2024-38384
CVE-2024-38385
CVE-2024-38388
CVE-2024-38390
CVE-2024-38618
CVE-2024-38619
CVE-2024-38621
CVE-2024-38622
CVE-2024-38623
CVE-2024-38624
CVE-2024-38625
CVE-2024-38627
CVE-2024-38628
CVE-2024-38629
CVE-2024-38630
CVE-2024-38632
CVE-2024-38633
CVE-2024-38634
CVE-2024-38635
CVE-2024-38636
CVE-2024-38637
CVE-2024-38659
CVE-2024-38661
CVE-2024-38662
CVE-2024-38663
CVE-2024-38664
CVE-2024-38667
CVE-2024-38780
CVE-2024-39276
CVE-2024-39277
CVE-2024-39291
CVE-2024-39296
CVE-2024-39298
CVE-2024-39301
CVE-2024-39371
CVE-2024-39461
CVE-2024-39462
CVE-2024-39463
CVE-2024-39464
CVE-2024-39465
CVE-2024-39466
CVE-2024-39467
CVE-2024-39468
CVE-2024-39469
CVE-2024-39470
CVE-2024-39471
CVE-2024-39473
CVE-2024-39474
CVE-2024-39475
CVE-2024-39478
CVE-2024-39479
CVE-2024-39480
CVE-2024-39481
CVE-2024-39483
CVE-2024-39485
CVE-2024-39488
CVE-2024-39489
CVE-2024-39490
CVE-2024-39491
CVE-2024-39492
CVE-2024-39493
CVE-2024-39494
CVE-2024-39495
CVE-2024-39496
CVE-2024-39497
CVE-2024-39498
CVE-2024-39499
CVE-2024-39500
CVE-2024-39501
CVE-2024-39502
CVE-2024-39503
CVE-2024-39504
CVE-2024-39505
CVE-2024-39506
CVE-2024-39507
CVE-2024-39508
CVE-2024-39509
CVE-2024-39510
CVE-2024-40899
CVE-2024-40900
CVE-2024-40901
CVE-2024-40902
CVE-2024-40903
CVE-2024-40904
CVE-2024-40905
CVE-2024-40906
CVE-2024-40908
CVE-2024-40909
CVE-2024-40910
CVE-2024-40911
CVE-2024-40912
CVE-2024-40913
CVE-2024-40914
CVE-2024-40915
CVE-2024-40916
CVE-2024-40917
CVE-2024-40918
CVE-2024-40919
CVE-2024-40920
CVE-2024-40921
CVE-2024-40922
CVE-2024-40923
CVE-2024-40924
CVE-2024-40925
CVE-2024-40926
CVE-2024-40927
CVE-2024-40928
CVE-2024-40929
CVE-2024-40930
CVE-2024-40931
CVE-2024-40932
CVE-2024-40933
CVE-2024-40934
CVE-2024-40935
CVE-2024-40936
CVE-2024-40937
CVE-2024-40938
CVE-2024-40939
CVE-2024-40940
CVE-2024-40941
CVE-2024-40942
CVE-2024-40943
CVE-2024-40944
CVE-2024-40945
CVE-2024-40947
CVE-2024-40948
CVE-2024-40949
CVE-2024-40951
CVE-2024-40952
CVE-2024-40953
CVE-2024-40954
CVE-2024-40955
CVE-2024-40956
CVE-2024-40957
CVE-2024-40958
CVE-2024-40959
CVE-2024-40960
CVE-2024-40961
CVE-2024-40962
CVE-2024-40963
CVE-2024-40964
CVE-2024-40965
CVE-2024-40966
CVE-2024-40967
CVE-2024-40968
CVE-2024-40969
CVE-2024-40970
CVE-2024-40971
CVE-2024-40972
CVE-2024-40973
CVE-2024-40974
CVE-2024-40975
CVE-2024-40976
CVE-2024-40977
CVE-2024-40978
CVE-2024-40979
CVE-2024-40980
CVE-2024-40981
CVE-2024-40982
CVE-2024-40983
CVE-2024-40984
CVE-2024-40985
CVE-2024-40986
CVE-2024-40987
CVE-2024-40988
CVE-2024-40989
CVE-2024-40990
CVE-2024-40992
CVE-2024-40994
CVE-2024-40995
CVE-2024-40996
CVE-2024-40997
CVE-2024-40998
CVE-2024-40999
CVE-2024-41000
CVE-2024-41001
CVE-2024-41002
CVE-2024-41003
CVE-2024-41004
CVE-2024-41005
CVE-2024-41006
CVE-2024-41040
CVE-2024-42078
CVE-2024-42148
CVE-2024-42270
USN-7005-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Chenyuan Yang discovered that the CEC driver driver in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2024-23848) It was discovered that the JFS file system contained an out-of-bounds read vulnerability when printing xattr debug information. A local attacker could use this to cause a denial of service (system crash). (CVE-2024-40902) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PA-RISC architecture; - PowerPC architecture; - RISC-V architecture; - x86 architecture; - Block layer subsystem; - ACPI drivers; - Drivers core; - Null block device driver; - Character device driver; - Clock framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - Buffer Sharing and Synchronization framework; - DMA engine subsystem; - EFI core; - FPGA Framework; - GPU drivers; - Greybus drivers; - HID subsystem; - HW tracing; - I2C subsystem; - IIO subsystem; - InfiniBand drivers; - Input Device (Mouse) drivers; - Mailbox framework; - Media drivers; - Microchip PCI driver; - VMware VMCI Driver; - Network drivers; - PCI subsystem; - x86 platform drivers; - PTP clock framework; - S/390 drivers; - SCSI drivers; - SoundWire subsystem; - Sonic Silicon Backplane drivers; - Greybus lights staging drivers; - Thermal drivers; - TTY drivers; - USB subsystem; - VFIO drivers; - Framebuffer layer; - Watchdog drivers; - 9P distributed file system; - BTRFS file system; - File systems infrastructure; - Ext4 file system; - F2FS file system; - JFS file system; - Network file system server daemon; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - Tracing file system; - IOMMU subsystem; - Tracing infrastructure; - io_uring subsystem; - Core kernel; - BPF subsystem; - Kernel debugger infrastructure; - DMA mapping infrastructure; - IRQ subsystem; - Memory management; - 9P file system network protocol; - Amateur Radio drivers; - B.A.T.M.A.N. meshing protocol; - Ethernet bridge; - Networking core; - Ethtool driver; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - Netfilter; - NET/ROM layer; - NFC subsystem; - Network traffic control; - Sun RPC protocol; - TIPC protocol; - TLS protocol; - Unix domain sockets; - Wireless networking; - XFRM subsystem; - AppArmor security module; - Integrity Measurement Architecture(IMA) framework; - Landlock security; - Linux Security Modules (LSM) Framework; - SELinux security module; - Simplified Mandatory Access Control Kernel framework; - ALSA framework; - HD-audio driver; - SOF drivers; - KVM core; (CVE-2024-40963, CVE-2024-40994, CVE-2024-36481, CVE-2024-39301, CVE-2024-38390, CVE-2024-40976, CVE-2024-40934, CVE-2024-40902, CVE-2024-40916, CVE-2024-39298, CVE-2024-38659, CVE-2024-38384, CVE-2024-38635, CVE-2024-39494, CVE-2024-40926, CVE-2024-40956, CVE-2024-40948, CVE-2024-40920, CVE-2024-38624, CVE-2024-39498, CVE-2024-38780, CVE-2024-39503, CVE-2024-40919, CVE-2024-39505, CVE-2024-40988, CVE-2024-36972, CVE-2024-36974, CVE-2024-39495, CVE-2024-40992, CVE-2024-36015, CVE-2024-38618, CVE-2024-39478, CVE-2024-40975, CVE-2024-39507, CVE-2024-39479, CVE-2024-39291, CVE-2024-40925, CVE-2024-39493, CVE-2024-41005, CVE-2024-40932, CVE-2024-39467, CVE-2024-40973, CVE-2024-38634, CVE-2024-34027, CVE-2024-39462, CVE-2024-40949, CVE-2024-40908, CVE-2024-40929, CVE-2024-38662, CVE-2024-39489, CVE-2024-40953, CVE-2024-38306, CVE-2024-40915, CVE-2024-39470, CVE-2024-40969, CVE-2024-31076, CVE-2024-38663, CVE-2024-38629, CVE-2024-38633, CVE-2024-40959, CVE-2024-39475, CVE-2024-40947, CVE-2024-40971, CVE-2024-40979, CVE-2024-40996, CVE-2024-36484, CVE-2024-40960, CVE-2022-48772, CVE-2024-33619, CVE-2024-40923, CVE-2024-41006, CVE-2024-39474, CVE-2024-40944, CVE-2024-39473, CVE-2024-39469, CVE-2024-40914, CVE-2024-40900, CVE-2023-52884, CVE-2024-40931, CVE-2024-38664, CVE-2024-41004, CVE-2024-38636, CVE-2024-41001, CVE-2024-39497, CVE-2024-40974, CVE-2024-42078, CVE-2024-40954, CVE-2024-39483, CVE-2024-40978, CVE-2024-40952, CVE-2024-39481, CVE-2024-40955, CVE-2024-39471, CVE-2024-41000, CVE-2024-40972, CVE-2024-40957, CVE-2024-40913, CVE-2024-36478, CVE-2024-40984, CVE-2024-40990, CVE-2024-39510, CVE-2024-38381, CVE-2024-39277, CVE-2024-39464, CVE-2024-40995, CVE-2024-40905, CVE-2024-40986, CVE-2024-36971, CVE-2024-39480, CVE-2024-40938, CVE-2024-39509, CVE-2024-40982, CVE-2024-39500, CVE-2024-37026, CVE-2024-40965, CVE-2024-40961, CVE-2024-40989, CVE-2024-36973, CVE-2024-39504, CVE-2024-37354, CVE-2024-39488, CVE-2024-38661, CVE-2024-40998, CVE-2024-36489, CVE-2024-37021, CVE-2024-40917, CVE-2024-36281, CVE-2024-40964, CVE-2024-39496, CVE-2024-40980, CVE-2024-39465, CVE-2024-40983, CVE-2024-40936, CVE-2024-40899, CVE-2024-40933, CVE-2024-36288, CVE-2024-36286, CVE-2024-40987, CVE-2024-40939, CVE-2024-38667, CVE-2024-38628, CVE-2024-40977, CVE-2024-39276, CVE-2024-40941, CVE-2024-39491, CVE-2024-37078, CVE-2024-36978, CVE-2024-38623, CVE-2024-40962, CVE-2024-40935, CVE-2024-40997, CVE-2024-40981, CVE-2024-40922, CVE-2024-39461, CVE-2024-40999, CVE-2024-40918, CVE-2024-40927, CVE-2024-42148, CVE-2024-39371, CVE-2024-40985, CVE-2024-34030, CVE-2024-39485, CVE-2024-39296, CVE-2024-39466, CVE-2024-40909, CVE-2024-39492, CVE-2024-39502, CVE-2024-40903, CVE-2024-41040, CVE-2024-40968, CVE-2024-41003, CVE-2024-39499, CVE-2024-39508, CVE-2024-34777, CVE-2024-38627, CVE-2024-40930, CVE-2024-38388, CVE-2024-39490, CVE-2024-40906, CVE-2024-40940, CVE-2024-40937, CVE-2024-40911, CVE-2024-38385, CVE-2024-36244, CVE-2024-38622, CVE-2024-40958, CVE-2024-41002, CVE-2024-38621, CVE-2024-40970, CVE-2024-40904, CVE-2024-40928, CVE-2024-40967, CVE-2024-40951, CVE-2024-38637, CVE-2024-37356, CVE-2024-39463, CVE-2024-40912, CVE-2024-33847, CVE-2024-39468, CVE-2024-40942, CVE-2024-40910, CVE-2024-38625, CVE-2024-35247, CVE-2024-36479, CVE-2024-40943, CVE-2024-32936, CVE-2024-38630, CVE-2024-39501, CVE-2024-40966, CVE-2024-40921, CVE-2024-40924, CVE-2024-39506, CVE-2024-36270, CVE-2024-33621, CVE-2024-40945, CVE-2024-40901, CVE-2024-38632, CVE-2024-38619) Update Instructions: Run `sudo pro fix USN-7005-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-cloud-tools-nvidia - 6.8.0-1013.13 linux-headers-nvidia - 6.8.0-1013.13 linux-headers-nvidia-64k - 6.8.0-1013.13 linux-image-nvidia - 6.8.0-1013.13 linux-image-nvidia-64k - 6.8.0-1013.13 linux-modules-nvidia-fs-nvidia - 6.8.0-1013.13 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1013.13 linux-nvidia - 6.8.0-1013.13 linux-nvidia-64k - 6.8.0-1013.13 linux-tools-nvidia - 6.8.0-1013.13 linux-tools-nvidia-64k - 6.8.0-1013.13 No subscription required linux-buildinfo-6.8.0-1013-nvidia - 6.8.0-1013.14 linux-buildinfo-6.8.0-1013-nvidia-64k - 6.8.0-1013.14 linux-headers-6.8.0-1013-nvidia - 6.8.0-1013.14 linux-headers-6.8.0-1013-nvidia-64k - 6.8.0-1013.14 linux-image-6.8.0-1013-nvidia - 6.8.0-1013.14 linux-image-6.8.0-1013-nvidia-64k - 6.8.0-1013.14 linux-image-uc-6.8.0-1013-nvidia - 6.8.0-1013.14 linux-image-uc-6.8.0-1013-nvidia-64k - 6.8.0-1013.14 linux-image-unsigned-6.8.0-1013-nvidia - 6.8.0-1013.14 linux-image-unsigned-6.8.0-1013-nvidia-64k - 6.8.0-1013.14 linux-modules-6.8.0-1013-nvidia - 6.8.0-1013.14 linux-modules-6.8.0-1013-nvidia-64k - 6.8.0-1013.14 linux-modules-extra-6.8.0-1013-nvidia - 6.8.0-1013.14 linux-modules-nvidia-fs-6.8.0-1013-nvidia - 6.8.0-1013.14 linux-modules-nvidia-fs-6.8.0-1013-nvidia-64k - 6.8.0-1013.14 linux-nvidia-headers-6.8.0-1013 - 6.8.0-1013.14 linux-nvidia-tools-6.8.0-1013 - 6.8.0-1013.14 linux-nvidia-tools-host - 6.8.0-1013.14 linux-tools-6.8.0-1013-nvidia - 6.8.0-1013.14 linux-tools-6.8.0-1013-nvidia-64k - 6.8.0-1013.14 No subscription required linux-buildinfo-6.8.0-1013-nvidia-lowlatency - 6.8.0-1013.14.1 linux-buildinfo-6.8.0-1013-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1013.14.1 linux-headers-6.8.0-1013-nvidia-lowlatency - 6.8.0-1013.14.1 linux-headers-6.8.0-1013-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-headers-nvidia-lowlatency - 6.8.0-1013.14.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-image-6.8.0-1013-nvidia-lowlatency - 6.8.0-1013.14.1 linux-image-6.8.0-1013-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-image-nvidia-lowlatency - 6.8.0-1013.14.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-image-uc-6.8.0-1013-nvidia-lowlatency - 6.8.0-1013.14.1 linux-image-uc-6.8.0-1013-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-image-unsigned-6.8.0-1013-nvidia-lowlatency - 6.8.0-1013.14.1 linux-image-unsigned-6.8.0-1013-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-modules-6.8.0-1013-nvidia-lowlatency - 6.8.0-1013.14.1 linux-modules-6.8.0-1013-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-modules-extra-6.8.0-1013-nvidia-lowlatency - 6.8.0-1013.14.1 linux-modules-nvidia-fs-6.8.0-1013-nvidia-lowlatency - 6.8.0-1013.14.1 linux-modules-nvidia-fs-6.8.0-1013-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1013.14.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-nvidia-lowlatency - 6.8.0-1013.14.1 linux-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-nvidia-lowlatency-headers-6.8.0-1013 - 6.8.0-1013.14.1 linux-nvidia-lowlatency-tools-6.8.0-1013 - 6.8.0-1013.14.1 linux-nvidia-lowlatency-tools-host - 6.8.0-1013.14.1 linux-tools-6.8.0-1013-nvidia-lowlatency - 6.8.0-1013.14.1 linux-tools-6.8.0-1013-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-tools-nvidia-lowlatency - 6.8.0-1013.14.1 linux-tools-nvidia-lowlatency-64k - 6.8.0-1013.14.1 No subscription required
High
CVE-2022-48772
CVE-2023-52884
CVE-2024-23848
CVE-2024-31076
CVE-2024-32936
CVE-2024-33619
CVE-2024-33621
CVE-2024-33847
CVE-2024-34027
CVE-2024-34030
CVE-2024-34777
CVE-2024-35247
CVE-2024-36015
CVE-2024-36244
CVE-2024-36270
CVE-2024-36281
CVE-2024-36286
CVE-2024-36288
CVE-2024-36478
CVE-2024-36479
CVE-2024-36481
CVE-2024-36484
CVE-2024-36489
CVE-2024-36971
CVE-2024-36972
CVE-2024-36973
CVE-2024-36974
CVE-2024-36978
CVE-2024-37021
CVE-2024-37026
CVE-2024-37078
CVE-2024-37354
CVE-2024-37356
CVE-2024-38306
CVE-2024-38381
CVE-2024-38384
CVE-2024-38385
CVE-2024-38388
CVE-2024-38390
CVE-2024-38618
CVE-2024-38619
CVE-2024-38621
CVE-2024-38622
CVE-2024-38623
CVE-2024-38624
CVE-2024-38625
CVE-2024-38627
CVE-2024-38628
CVE-2024-38629
CVE-2024-38630
CVE-2024-38632
CVE-2024-38633
CVE-2024-38634
CVE-2024-38635
CVE-2024-38636
CVE-2024-38637
CVE-2024-38659
CVE-2024-38661
CVE-2024-38662
CVE-2024-38663
CVE-2024-38664
CVE-2024-38667
CVE-2024-38780
CVE-2024-39276
CVE-2024-39277
CVE-2024-39291
CVE-2024-39296
CVE-2024-39298
CVE-2024-39301
CVE-2024-39371
CVE-2024-39461
CVE-2024-39462
CVE-2024-39463
CVE-2024-39464
CVE-2024-39465
CVE-2024-39466
CVE-2024-39467
CVE-2024-39468
CVE-2024-39469
CVE-2024-39470
CVE-2024-39471
CVE-2024-39473
CVE-2024-39474
CVE-2024-39475
CVE-2024-39478
CVE-2024-39479
CVE-2024-39480
CVE-2024-39481
CVE-2024-39483
CVE-2024-39485
CVE-2024-39488
CVE-2024-39489
CVE-2024-39490
CVE-2024-39491
CVE-2024-39492
CVE-2024-39493
CVE-2024-39494
CVE-2024-39495
CVE-2024-39496
CVE-2024-39497
CVE-2024-39498
CVE-2024-39499
CVE-2024-39500
CVE-2024-39501
CVE-2024-39502
CVE-2024-39503
CVE-2024-39504
CVE-2024-39505
CVE-2024-39506
CVE-2024-39507
CVE-2024-39508
CVE-2024-39509
CVE-2024-39510
CVE-2024-40899
CVE-2024-40900
CVE-2024-40901
CVE-2024-40902
CVE-2024-40903
CVE-2024-40904
CVE-2024-40905
CVE-2024-40906
CVE-2024-40908
CVE-2024-40909
CVE-2024-40910
CVE-2024-40911
CVE-2024-40912
CVE-2024-40913
CVE-2024-40914
CVE-2024-40915
CVE-2024-40916
CVE-2024-40917
CVE-2024-40918
CVE-2024-40919
CVE-2024-40920
CVE-2024-40921
CVE-2024-40922
CVE-2024-40923
CVE-2024-40924
CVE-2024-40925
CVE-2024-40926
CVE-2024-40927
CVE-2024-40928
CVE-2024-40929
CVE-2024-40930
CVE-2024-40931
CVE-2024-40932
CVE-2024-40933
CVE-2024-40934
CVE-2024-40935
CVE-2024-40936
CVE-2024-40937
CVE-2024-40938
CVE-2024-40939
CVE-2024-40940
CVE-2024-40941
CVE-2024-40942
CVE-2024-40943
CVE-2024-40944
CVE-2024-40945
CVE-2024-40947
CVE-2024-40948
CVE-2024-40949
CVE-2024-40951
CVE-2024-40952
CVE-2024-40953
CVE-2024-40954
CVE-2024-40955
CVE-2024-40956
CVE-2024-40957
CVE-2024-40958
CVE-2024-40959
CVE-2024-40960
CVE-2024-40961
CVE-2024-40962
CVE-2024-40963
CVE-2024-40964
CVE-2024-40965
CVE-2024-40966
CVE-2024-40967
CVE-2024-40968
CVE-2024-40969
CVE-2024-40970
CVE-2024-40971
CVE-2024-40972
CVE-2024-40973
CVE-2024-40974
CVE-2024-40975
CVE-2024-40976
CVE-2024-40977
CVE-2024-40978
CVE-2024-40979
CVE-2024-40980
CVE-2024-40981
CVE-2024-40982
CVE-2024-40983
CVE-2024-40984
CVE-2024-40985
CVE-2024-40986
CVE-2024-40987
CVE-2024-40988
CVE-2024-40989
CVE-2024-40990
CVE-2024-40992
CVE-2024-40994
CVE-2024-40995
CVE-2024-40996
CVE-2024-40997
CVE-2024-40998
CVE-2024-40999
CVE-2024-41000
CVE-2024-41001
CVE-2024-41002
CVE-2024-41003
CVE-2024-41004
CVE-2024-41005
CVE-2024-41006
CVE-2024-41040
CVE-2024-42078
CVE-2024-42148
USN-7010-1 -- DCMTK vulnerabilities
Ubuntu 24.04 LTS
Jinsheng Ba discovered that DCMTK incorrectly handled certain requests. If a user or an automated system were tricked into opening a certain specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 20.04 LTS. (CVE-2021-41687, CVE-2021-41688, CVE-2021-41689, CVE-2021-41690) Sharon Brizinov and Noam Moshe discovered that DCMTK incorrectly handled pointers. If a user or an automated system were tricked into opening a certain specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 20.04 LTS. (CVE-2022-2121) It was discovered that DCMTK incorrectly handled certain inputs. If a user or an automated system were tricked into opening a certain specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 20.04 LTS. (CVE-2022-43272) It was discovered that DCMTK incorrectly handled certain inputs. If a user or an automated system were tricked into opening a certain specially crafted input file, a remote attacker could possibly use this issue to execute arbitrary code. This issue was only addressed in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2024-28130) It was discovered that DCMTK incorrectly handled memory when processing an invalid incoming DIMSE message. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-34508, CVE-2024-34509) Update Instructions: Run `sudo pro fix USN-7010-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: dcmtk - 3.6.7-9.1ubuntu0.1~esm1 dcmtk-doc - 3.6.7-9.1ubuntu0.1~esm1 libdcmtk-dev - 3.6.7-9.1ubuntu0.1~esm1 libdcmtk17t64 - 3.6.7-9.1ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2021-41687
CVE-2021-41688
CVE-2021-41689
CVE-2021-41690
CVE-2022-2121
CVE-2022-43272
CVE-2024-28130
CVE-2024-34508
CVE-2024-34509
USN-7011-1 -- ClamAV vulnerabilities
Ubuntu 24.04 LTS
It was discovered that ClamAV incorrectly handled certain PDF files. A remote attacker could possibly use this issue to cause ClamAV to crash, resulting in a denial of service. (CVE-2024-20505) It was discovered that ClamAV incorrectly handled logfile privileges. A local attacker could use this issue to cause ClamAV to overwrite arbitrary files, possibly leading to privilege escalation. (CVE-2024-20506) Update Instructions: Run `sudo pro fix USN-7011-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: clamav - 1.0.7+dfsg-0ubuntu0.24.04.1 clamav-base - 1.0.7+dfsg-0ubuntu0.24.04.1 clamav-daemon - 1.0.7+dfsg-0ubuntu0.24.04.1 clamav-docs - 1.0.7+dfsg-0ubuntu0.24.04.1 clamav-freshclam - 1.0.7+dfsg-0ubuntu0.24.04.1 clamav-milter - 1.0.7+dfsg-0ubuntu0.24.04.1 clamav-testfiles - 1.0.7+dfsg-0ubuntu0.24.04.1 clamdscan - 1.0.7+dfsg-0ubuntu0.24.04.1 libclamav-dev - 1.0.7+dfsg-0ubuntu0.24.04.1 libclamav11t64 - 1.0.7+dfsg-0ubuntu0.24.04.1 No subscription required
Medium
CVE-2024-20505
CVE-2024-20506
USN-7012-1 -- curl vulnerability
Ubuntu 24.04 LTS
Hiroki Kurosawa discovered that curl incorrectly handled certain OCSP responses. This could result in bad certificates not being checked properly, contrary to expectations. Update Instructions: Run `sudo pro fix USN-7012-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: curl - 8.5.0-2ubuntu10.4 libcurl3t64-gnutls - 8.5.0-2ubuntu10.4 libcurl4-doc - 8.5.0-2ubuntu10.4 libcurl4-gnutls-dev - 8.5.0-2ubuntu10.4 libcurl4-openssl-dev - 8.5.0-2ubuntu10.4 libcurl4t64 - 8.5.0-2ubuntu10.4 No subscription required
Medium
CVE-2024-8096
USN-7014-1 -- nginx vulnerability
Ubuntu 24.04 LTS
It was discovered that the nginx ngx_http_mp4 module incorrectly handled certain malformed mp4 files. In environments where the mp4 directive is in use, a remote attacker could possibly use this issue to cause nginx to crash, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-7014-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libnginx-mod-http-geoip - 1.24.0-2ubuntu7.1 libnginx-mod-http-image-filter - 1.24.0-2ubuntu7.1 libnginx-mod-http-perl - 1.24.0-2ubuntu7.1 libnginx-mod-http-xslt-filter - 1.24.0-2ubuntu7.1 libnginx-mod-mail - 1.24.0-2ubuntu7.1 libnginx-mod-stream - 1.24.0-2ubuntu7.1 libnginx-mod-stream-geoip - 1.24.0-2ubuntu7.1 nginx - 1.24.0-2ubuntu7.1 nginx-common - 1.24.0-2ubuntu7.1 nginx-core - 1.24.0-2ubuntu7.1 nginx-dev - 1.24.0-2ubuntu7.1 nginx-doc - 1.24.0-2ubuntu7.1 nginx-extras - 1.24.0-2ubuntu7.1 nginx-full - 1.24.0-2ubuntu7.1 nginx-light - 1.24.0-2ubuntu7.1 No subscription required
Medium
CVE-2024-7347
USN-7015-1 -- Python vulnerabilities
Ubuntu 24.04 LTS
It was discovered that the Python email module incorrectly parsed email addresses that contain special characters. A remote attacker could possibly use this issue to bypass certain protection mechanisms. (CVE-2023-27043) It was discovered that Python allowed excessive backtracking while parsing certain tarfile headers. A remote attacker could possibly use this issue to cause Python to consume resources, leading to a denial of service. (CVE-2024-6232) It was discovered that the Python email module incorrectly quoted newlines for email headers. A remote attacker could possibly use this issue to perform header injection. (CVE-2024-6923) It was discovered that the Python http.cookies module incorrectly handled parsing cookies that contained backslashes for quoted characters. A remote attacker could possibly use this issue to cause Python to consume resources, leading to a denial of service. (CVE-2024-7592) It was discovered that the Python zipfile module incorrectly handled certain malformed zip files. A remote attacker could possibly use this issue to cause Python to stop responding, resulting in a denial of service. (CVE-2024-8088) Update Instructions: Run `sudo pro fix USN-7015-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: idle-python3.12 - 3.12.3-1ubuntu0.2 libpython3.12-dev - 3.12.3-1ubuntu0.2 libpython3.12-minimal - 3.12.3-1ubuntu0.2 libpython3.12-stdlib - 3.12.3-1ubuntu0.2 libpython3.12-testsuite - 3.12.3-1ubuntu0.2 libpython3.12t64 - 3.12.3-1ubuntu0.2 python3.12 - 3.12.3-1ubuntu0.2 python3.12-dev - 3.12.3-1ubuntu0.2 python3.12-doc - 3.12.3-1ubuntu0.2 python3.12-examples - 3.12.3-1ubuntu0.2 python3.12-full - 3.12.3-1ubuntu0.2 python3.12-minimal - 3.12.3-1ubuntu0.2 python3.12-nopie - 3.12.3-1ubuntu0.2 python3.12-venv - 3.12.3-1ubuntu0.2 No subscription required
Medium
CVE-2023-27043
CVE-2024-6232
CVE-2024-6923
CVE-2024-7592
CVE-2024-8088
USN-7016-1 -- FRR vulnerability
Ubuntu 24.04 LTS
Iggy Frankovic discovered that FRR incorrectly handled certain BGP messages. A remote attacker could possibly use this issue to cause FRR to crash, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-7016-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: frr - 8.4.4-1.1ubuntu6.2 frr-doc - 8.4.4-1.1ubuntu6.2 frr-pythontools - 8.4.4-1.1ubuntu6.2 frr-rpki-rtrlib - 8.4.4-1.1ubuntu6.2 frr-snmp - 8.4.4-1.1ubuntu6.2 No subscription required
Medium
CVE-2024-44070
USN-7020-1 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - GPU drivers; - Network drivers; - SCSI drivers; - F2FS file system; - BPF subsystem; - IPv4 networking; (CVE-2024-42160, CVE-2024-42159, CVE-2024-42154, CVE-2024-41009, CVE-2024-42228, CVE-2024-42224) Update Instructions: Run `sudo pro fix USN-7020-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1011-gke - 6.8.0-1011.14 linux-gke - 6.8.0-1011.14 linux-gke-headers-6.8.0-1011 - 6.8.0-1011.14 linux-gke-tools-6.8.0-1011 - 6.8.0-1011.14 linux-headers-6.8.0-1011-gke - 6.8.0-1011.14 linux-headers-gke - 6.8.0-1011.14 linux-image-6.8.0-1011-gke - 6.8.0-1011.14 linux-image-gke - 6.8.0-1011.14 linux-image-unsigned-6.8.0-1011-gke - 6.8.0-1011.14 linux-modules-6.8.0-1011-gke - 6.8.0-1011.14 linux-modules-extra-6.8.0-1011-gke - 6.8.0-1011.14 linux-modules-iwlwifi-6.8.0-1011-gke - 6.8.0-1011.14 linux-modules-iwlwifi-gke - 6.8.0-1011.14 linux-tools-6.8.0-1011-gke - 6.8.0-1011.14 linux-tools-gke - 6.8.0-1011.14 No subscription required linux-buildinfo-6.8.0-1013-ibm - 6.8.0-1013.13 linux-buildinfo-6.8.0-1013-oem - 6.8.0-1013.13 linux-buildinfo-6.8.0-1013-oracle - 6.8.0-1013.13 linux-buildinfo-6.8.0-1013-oracle-64k - 6.8.0-1013.13 linux-headers-6.8.0-1013-ibm - 6.8.0-1013.13 linux-headers-6.8.0-1013-oem - 6.8.0-1013.13 linux-headers-6.8.0-1013-oracle - 6.8.0-1013.13 linux-headers-6.8.0-1013-oracle-64k - 6.8.0-1013.13 linux-headers-ibm - 6.8.0-1013.13 linux-headers-ibm-classic - 6.8.0-1013.13 linux-headers-ibm-lts-24.04 - 6.8.0-1013.13 linux-headers-oem-24.04 - 6.8.0-1013.13 linux-headers-oem-24.04a - 6.8.0-1013.13 linux-headers-oracle - 6.8.0-1013.13 linux-headers-oracle-64k - 6.8.0-1013.13 linux-ibm - 6.8.0-1013.13 linux-ibm-classic - 6.8.0-1013.13 linux-ibm-cloud-tools-common - 6.8.0-1013.13 linux-ibm-headers-6.8.0-1013 - 6.8.0-1013.13 linux-ibm-lts-24.04 - 6.8.0-1013.13 linux-ibm-source-6.8.0 - 6.8.0-1013.13 linux-ibm-tools-6.8.0-1013 - 6.8.0-1013.13 linux-image-6.8.0-1013-ibm - 6.8.0-1013.13 linux-image-6.8.0-1013-oem - 6.8.0-1013.13 linux-image-6.8.0-1013-oracle - 6.8.0-1013.13 linux-image-6.8.0-1013-oracle-64k - 6.8.0-1013.13 linux-image-ibm - 6.8.0-1013.13 linux-image-ibm-classic - 6.8.0-1013.13 linux-image-ibm-lts-24.04 - 6.8.0-1013.13 linux-image-oem-24.04 - 6.8.0-1013.13 linux-image-oem-24.04a - 6.8.0-1013.13 linux-image-oracle - 6.8.0-1013.13 linux-image-oracle-64k - 6.8.0-1013.13 linux-image-uc-6.8.0-1013-oem - 6.8.0-1013.13 linux-image-uc-oem-24.04 - 6.8.0-1013.13 linux-image-uc-oem-24.04a - 6.8.0-1013.13 linux-image-unsigned-6.8.0-1013-ibm - 6.8.0-1013.13 linux-image-unsigned-6.8.0-1013-oem - 6.8.0-1013.13 linux-image-unsigned-6.8.0-1013-oracle - 6.8.0-1013.13 linux-image-unsigned-6.8.0-1013-oracle-64k - 6.8.0-1013.13 linux-modules-6.8.0-1013-ibm - 6.8.0-1013.13 linux-modules-6.8.0-1013-oem - 6.8.0-1013.13 linux-modules-6.8.0-1013-oracle - 6.8.0-1013.13 linux-modules-6.8.0-1013-oracle-64k - 6.8.0-1013.13 linux-modules-extra-6.8.0-1013-ibm - 6.8.0-1013.13 linux-modules-extra-6.8.0-1013-oracle - 6.8.0-1013.13 linux-modules-extra-6.8.0-1013-oracle-64k - 6.8.0-1013.13 linux-modules-ipu6-6.8.0-1013-oem - 6.8.0-1013.13 linux-modules-ipu6-oem-24.04 - 6.8.0-1013.13 linux-modules-ipu6-oem-24.04a - 6.8.0-1013.13 linux-modules-iwlwifi-6.8.0-1013-ibm - 6.8.0-1013.13 linux-modules-iwlwifi-6.8.0-1013-oem - 6.8.0-1013.13 linux-modules-iwlwifi-ibm - 6.8.0-1013.13 linux-modules-iwlwifi-ibm-classic - 6.8.0-1013.13 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1013.13 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1013.13 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1013.13 linux-modules-usbio-6.8.0-1013-oem - 6.8.0-1013.13 linux-modules-usbio-oem-24.04 - 6.8.0-1013.13 linux-modules-usbio-oem-24.04a - 6.8.0-1013.13 linux-oem-24.04 - 6.8.0-1013.13 linux-oem-24.04a - 6.8.0-1013.13 linux-oem-6.8-headers-6.8.0-1013 - 6.8.0-1013.13 linux-oem-6.8-tools-6.8.0-1013 - 6.8.0-1013.13 linux-oracle - 6.8.0-1013.13 linux-oracle-64k - 6.8.0-1013.13 linux-oracle-headers-6.8.0-1013 - 6.8.0-1013.13 linux-oracle-tools-6.8.0-1013 - 6.8.0-1013.13 linux-tools-6.8.0-1013-ibm - 6.8.0-1013.13 linux-tools-6.8.0-1013-oem - 6.8.0-1013.13 linux-tools-6.8.0-1013-oracle - 6.8.0-1013.13 linux-tools-6.8.0-1013-oracle-64k - 6.8.0-1013.13 linux-tools-ibm - 6.8.0-1013.13 linux-tools-ibm-classic - 6.8.0-1013.13 linux-tools-ibm-lts-24.04 - 6.8.0-1013.13 linux-tools-oem-24.04 - 6.8.0-1013.13 linux-tools-oem-24.04a - 6.8.0-1013.13 linux-tools-oracle - 6.8.0-1013.13 linux-tools-oracle-64k - 6.8.0-1013.13 No subscription required linux-buildinfo-6.8.0-1014-nvidia - 6.8.0-1014.15 linux-buildinfo-6.8.0-1014-nvidia-64k - 6.8.0-1014.15 linux-cloud-tools-nvidia - 6.8.0-1014.15 linux-headers-6.8.0-1014-nvidia - 6.8.0-1014.15 linux-headers-6.8.0-1014-nvidia-64k - 6.8.0-1014.15 linux-headers-nvidia - 6.8.0-1014.15 linux-headers-nvidia-64k - 6.8.0-1014.15 linux-image-6.8.0-1014-nvidia - 6.8.0-1014.15 linux-image-6.8.0-1014-nvidia-64k - 6.8.0-1014.15 linux-image-nvidia - 6.8.0-1014.15 linux-image-nvidia-64k - 6.8.0-1014.15 linux-image-uc-6.8.0-1014-nvidia - 6.8.0-1014.15 linux-image-uc-6.8.0-1014-nvidia-64k - 6.8.0-1014.15 linux-image-unsigned-6.8.0-1014-nvidia - 6.8.0-1014.15 linux-image-unsigned-6.8.0-1014-nvidia-64k - 6.8.0-1014.15 linux-modules-6.8.0-1014-nvidia - 6.8.0-1014.15 linux-modules-6.8.0-1014-nvidia-64k - 6.8.0-1014.15 linux-modules-extra-6.8.0-1014-nvidia - 6.8.0-1014.15 linux-modules-nvidia-fs-6.8.0-1014-nvidia - 6.8.0-1014.15 linux-modules-nvidia-fs-6.8.0-1014-nvidia-64k - 6.8.0-1014.15 linux-modules-nvidia-fs-nvidia - 6.8.0-1014.15 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1014.15 linux-nvidia - 6.8.0-1014.15 linux-nvidia-64k - 6.8.0-1014.15 linux-nvidia-headers-6.8.0-1014 - 6.8.0-1014.15 linux-nvidia-tools-6.8.0-1014 - 6.8.0-1014.15 linux-nvidia-tools-host - 6.8.0-1014.15 linux-tools-6.8.0-1014-nvidia - 6.8.0-1014.15 linux-tools-6.8.0-1014-nvidia-64k - 6.8.0-1014.15 linux-tools-nvidia - 6.8.0-1014.15 linux-tools-nvidia-64k - 6.8.0-1014.15 No subscription required linux-buildinfo-6.8.0-1014-nvidia-lowlatency - 6.8.0-1014.15.1 linux-buildinfo-6.8.0-1014-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1014.15.1 linux-headers-6.8.0-1014-nvidia-lowlatency - 6.8.0-1014.15.1 linux-headers-6.8.0-1014-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-headers-nvidia-lowlatency - 6.8.0-1014.15.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-image-6.8.0-1014-nvidia-lowlatency - 6.8.0-1014.15.1 linux-image-6.8.0-1014-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-image-nvidia-lowlatency - 6.8.0-1014.15.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-image-uc-6.8.0-1014-nvidia-lowlatency - 6.8.0-1014.15.1 linux-image-uc-6.8.0-1014-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-image-unsigned-6.8.0-1014-nvidia-lowlatency - 6.8.0-1014.15.1 linux-image-unsigned-6.8.0-1014-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-modules-6.8.0-1014-nvidia-lowlatency - 6.8.0-1014.15.1 linux-modules-6.8.0-1014-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-modules-extra-6.8.0-1014-nvidia-lowlatency - 6.8.0-1014.15.1 linux-modules-nvidia-fs-6.8.0-1014-nvidia-lowlatency - 6.8.0-1014.15.1 linux-modules-nvidia-fs-6.8.0-1014-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1014.15.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-nvidia-lowlatency - 6.8.0-1014.15.1 linux-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-nvidia-lowlatency-headers-6.8.0-1014 - 6.8.0-1014.15.1 linux-nvidia-lowlatency-tools-6.8.0-1014 - 6.8.0-1014.15.1 linux-nvidia-lowlatency-tools-host - 6.8.0-1014.15.1 linux-tools-6.8.0-1014-nvidia-lowlatency - 6.8.0-1014.15.1 linux-tools-6.8.0-1014-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-tools-nvidia-lowlatency - 6.8.0-1014.15.1 linux-tools-nvidia-lowlatency-64k - 6.8.0-1014.15.1 No subscription required linux-buildinfo-6.8.0-1015-gcp - 6.8.0-1015.17 linux-gcp - 6.8.0-1015.17 linux-gcp-headers-6.8.0-1015 - 6.8.0-1015.17 linux-gcp-tools-6.8.0-1015 - 6.8.0-1015.17 linux-headers-6.8.0-1015-gcp - 6.8.0-1015.17 linux-headers-gcp - 6.8.0-1015.17 linux-image-6.8.0-1015-gcp - 6.8.0-1015.17 linux-image-gcp - 6.8.0-1015.17 linux-image-unsigned-6.8.0-1015-gcp - 6.8.0-1015.17 linux-modules-6.8.0-1015-gcp - 6.8.0-1015.17 linux-modules-extra-6.8.0-1015-gcp - 6.8.0-1015.17 linux-modules-extra-gcp - 6.8.0-1015.17 linux-tools-6.8.0-1015-gcp - 6.8.0-1015.17 linux-tools-gcp - 6.8.0-1015.17 No subscription required linux-aws - 6.8.0-1016.17 linux-aws-cloud-tools-6.8.0-1016 - 6.8.0-1016.17 linux-aws-headers-6.8.0-1016 - 6.8.0-1016.17 linux-aws-tools-6.8.0-1016 - 6.8.0-1016.17 linux-buildinfo-6.8.0-1016-aws - 6.8.0-1016.17 linux-cloud-tools-6.8.0-1016-aws - 6.8.0-1016.17 linux-headers-6.8.0-1016-aws - 6.8.0-1016.17 linux-headers-aws - 6.8.0-1016.17 linux-image-6.8.0-1016-aws - 6.8.0-1016.17 linux-image-aws - 6.8.0-1016.17 linux-image-unsigned-6.8.0-1016-aws - 6.8.0-1016.17 linux-modules-6.8.0-1016-aws - 6.8.0-1016.17 linux-modules-extra-6.8.0-1016-aws - 6.8.0-1016.17 linux-modules-extra-aws - 6.8.0-1016.17 linux-tools-6.8.0-1016-aws - 6.8.0-1016.17 linux-tools-aws - 6.8.0-1016.17 No subscription required linux-buildinfo-6.8.0-45-generic - 6.8.0-45.45 linux-buildinfo-6.8.0-45-generic-64k - 6.8.0-45.45 linux-cloud-tools-6.8.0-45 - 6.8.0-45.45 linux-cloud-tools-6.8.0-45-generic - 6.8.0-45.45 linux-cloud-tools-common - 6.8.0-45.45 linux-cloud-tools-generic - 6.8.0-45.45 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-45.45 linux-cloud-tools-generic-hwe-24.04-edge - 6.8.0-45.45 linux-cloud-tools-virtual - 6.8.0-45.45 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-45.45 linux-cloud-tools-virtual-hwe-24.04-edge - 6.8.0-45.45 linux-crashdump - 6.8.0-45.45 linux-doc - 6.8.0-45.45 linux-generic - 6.8.0-45.45 linux-generic-64k - 6.8.0-45.45 linux-generic-64k-hwe-24.04 - 6.8.0-45.45 linux-generic-64k-hwe-24.04-edge - 6.8.0-45.45 linux-generic-hwe-24.04 - 6.8.0-45.45 linux-generic-hwe-24.04-edge - 6.8.0-45.45 linux-generic-lpae - 6.8.0-45.45 linux-headers-6.8.0-45 - 6.8.0-45.45 linux-headers-6.8.0-45-generic - 6.8.0-45.45 linux-headers-6.8.0-45-generic-64k - 6.8.0-45.45 linux-headers-generic - 6.8.0-45.45 linux-headers-generic-64k - 6.8.0-45.45 linux-headers-generic-64k-hwe-24.04 - 6.8.0-45.45 linux-headers-generic-64k-hwe-24.04-edge - 6.8.0-45.45 linux-headers-generic-hwe-24.04 - 6.8.0-45.45 linux-headers-generic-hwe-24.04-edge - 6.8.0-45.45 linux-headers-generic-lpae - 6.8.0-45.45 linux-headers-kvm - 6.8.0-45.45 linux-headers-laptop-23.10 - 6.8.0-45.45 linux-headers-oem-20.04 - 6.8.0-45.45 linux-headers-oem-20.04b - 6.8.0-45.45 linux-headers-oem-20.04c - 6.8.0-45.45 linux-headers-oem-20.04d - 6.8.0-45.45 linux-headers-oem-22.04 - 6.8.0-45.45 linux-headers-virtual - 6.8.0-45.45 linux-headers-virtual-hwe-24.04 - 6.8.0-45.45 linux-headers-virtual-hwe-24.04-edge - 6.8.0-45.45 linux-image-6.8.0-45-generic - 6.8.0-45.45 linux-image-6.8.0-45-generic-64k - 6.8.0-45.45 linux-image-extra-virtual - 6.8.0-45.45 linux-image-extra-virtual-hwe-24.04 - 6.8.0-45.45 linux-image-extra-virtual-hwe-24.04-edge - 6.8.0-45.45 linux-image-generic - 6.8.0-45.45 linux-image-generic-64k - 6.8.0-45.45 linux-image-generic-64k-hwe-24.04 - 6.8.0-45.45 linux-image-generic-64k-hwe-24.04-edge - 6.8.0-45.45 linux-image-generic-hwe-24.04 - 6.8.0-45.45 linux-image-generic-hwe-24.04-edge - 6.8.0-45.45 linux-image-generic-lpae - 6.8.0-45.45 linux-image-kvm - 6.8.0-45.45 linux-image-laptop-23.10 - 6.8.0-45.45 linux-image-oem-20.04 - 6.8.0-45.45 linux-image-oem-20.04b - 6.8.0-45.45 linux-image-oem-20.04c - 6.8.0-45.45 linux-image-oem-20.04d - 6.8.0-45.45 linux-image-oem-22.04 - 6.8.0-45.45 linux-image-uc-6.8.0-45-generic - 6.8.0-45.45 linux-image-uc-6.8.0-45-generic-64k - 6.8.0-45.45 linux-image-uc-generic - 6.8.0-45.45 linux-image-uc-generic-hwe-24.04 - 6.8.0-45.45 linux-image-uc-generic-hwe-24.04-edge - 6.8.0-45.45 linux-image-unsigned-6.8.0-45-generic - 6.8.0-45.45 linux-image-unsigned-6.8.0-45-generic-64k - 6.8.0-45.45 linux-image-virtual - 6.8.0-45.45 linux-image-virtual-hwe-24.04 - 6.8.0-45.45 linux-image-virtual-hwe-24.04-edge - 6.8.0-45.45 linux-kvm - 6.8.0-45.45 linux-laptop-23.10 - 6.8.0-45.45 linux-lib-rust-6.8.0-45-generic - 6.8.0-45.45 linux-libc-dev - 6.8.0-45.45 linux-modules-6.8.0-45-generic - 6.8.0-45.45 linux-modules-6.8.0-45-generic-64k - 6.8.0-45.45 linux-modules-extra-6.8.0-45-generic - 6.8.0-45.45 linux-modules-ipu6-6.8.0-45-generic - 6.8.0-45.45 linux-modules-ipu6-generic - 6.8.0-45.45 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-45.45 linux-modules-ipu6-generic-hwe-24.04-edge - 6.8.0-45.45 linux-modules-iwlwifi-6.8.0-45-generic - 6.8.0-45.45 linux-modules-iwlwifi-generic - 6.8.0-45.45 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-45.45 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.8.0-45.45 linux-modules-iwlwifi-oem-20.04 - 6.8.0-45.45 linux-modules-iwlwifi-oem-20.04d - 6.8.0-45.45 linux-modules-iwlwifi-oem-22.04 - 6.8.0-45.45 linux-modules-usbio-6.8.0-45-generic - 6.8.0-45.45 linux-modules-usbio-generic - 6.8.0-45.45 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-45.45 linux-modules-usbio-generic-hwe-24.04-edge - 6.8.0-45.45 linux-oem-20.04 - 6.8.0-45.45 linux-oem-20.04b - 6.8.0-45.45 linux-oem-20.04c - 6.8.0-45.45 linux-oem-20.04d - 6.8.0-45.45 linux-oem-22.04 - 6.8.0-45.45 linux-source - 6.8.0-45.45 linux-source-6.8.0 - 6.8.0-45.45 linux-tools-6.8.0-45 - 6.8.0-45.45 linux-tools-6.8.0-45-generic - 6.8.0-45.45 linux-tools-6.8.0-45-generic-64k - 6.8.0-45.45 linux-tools-common - 6.8.0-45.45 linux-tools-generic - 6.8.0-45.45 linux-tools-generic-64k - 6.8.0-45.45 linux-tools-generic-64k-hwe-24.04 - 6.8.0-45.45 linux-tools-generic-64k-hwe-24.04-edge - 6.8.0-45.45 linux-tools-generic-hwe-24.04 - 6.8.0-45.45 linux-tools-generic-hwe-24.04-edge - 6.8.0-45.45 linux-tools-generic-lpae - 6.8.0-45.45 linux-tools-host - 6.8.0-45.45 linux-tools-kvm - 6.8.0-45.45 linux-tools-laptop-23.10 - 6.8.0-45.45 linux-tools-oem-20.04 - 6.8.0-45.45 linux-tools-oem-20.04b - 6.8.0-45.45 linux-tools-oem-20.04c - 6.8.0-45.45 linux-tools-oem-20.04d - 6.8.0-45.45 linux-tools-oem-22.04 - 6.8.0-45.45 linux-tools-virtual - 6.8.0-45.45 linux-tools-virtual-hwe-24.04 - 6.8.0-45.45 linux-tools-virtual-hwe-24.04-edge - 6.8.0-45.45 linux-virtual - 6.8.0-45.45 linux-virtual-hwe-24.04 - 6.8.0-45.45 linux-virtual-hwe-24.04-edge - 6.8.0-45.45 No subscription required linux-buildinfo-6.8.0-45-lowlatency - 6.8.0-45.45.1 linux-buildinfo-6.8.0-45-lowlatency-64k - 6.8.0-45.45.1 linux-cloud-tools-6.8.0-45-lowlatency - 6.8.0-45.45.1 linux-cloud-tools-lowlatency - 6.8.0-45.45.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-45.45.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-45.45.1 linux-cloud-tools-lowlatency-hwe-22.04 - 6.8.0-45.45.1 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.8.0-45.45.1 linux-headers-6.8.0-45-lowlatency - 6.8.0-45.45.1 linux-headers-6.8.0-45-lowlatency-64k - 6.8.0-45.45.1 linux-headers-lowlatency - 6.8.0-45.45.1 linux-headers-lowlatency-64k - 6.8.0-45.45.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-45.45.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-45.45.1 linux-headers-lowlatency-64k-hwe-22.04 - 6.8.0-45.45.1 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.8.0-45.45.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-45.45.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-45.45.1 linux-headers-lowlatency-hwe-22.04 - 6.8.0-45.45.1 linux-headers-lowlatency-hwe-22.04-edge - 6.8.0-45.45.1 linux-image-6.8.0-45-lowlatency - 6.8.0-45.45.1 linux-image-6.8.0-45-lowlatency-64k - 6.8.0-45.45.1 linux-image-lowlatency - 6.8.0-45.45.1 linux-image-lowlatency-64k - 6.8.0-45.45.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-45.45.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-45.45.1 linux-image-lowlatency-64k-hwe-22.04 - 6.8.0-45.45.1 linux-image-lowlatency-64k-hwe-22.04-edge - 6.8.0-45.45.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-45.45.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-45.45.1 linux-image-lowlatency-hwe-22.04 - 6.8.0-45.45.1 linux-image-lowlatency-hwe-22.04-edge - 6.8.0-45.45.1 linux-image-unsigned-6.8.0-45-lowlatency - 6.8.0-45.45.1 linux-image-unsigned-6.8.0-45-lowlatency-64k - 6.8.0-45.45.1 linux-lowlatency - 6.8.0-45.45.1 linux-lowlatency-64k - 6.8.0-45.45.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-45.45.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-45.45.1 linux-lowlatency-64k-hwe-22.04 - 6.8.0-45.45.1 linux-lowlatency-64k-hwe-22.04-edge - 6.8.0-45.45.1 linux-lowlatency-cloud-tools-6.8.0-45 - 6.8.0-45.45.1 linux-lowlatency-cloud-tools-common - 6.8.0-45.45.1 linux-lowlatency-headers-6.8.0-45 - 6.8.0-45.45.1 linux-lowlatency-hwe-20.04 - 6.8.0-45.45.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-45.45.1 linux-lowlatency-hwe-22.04 - 6.8.0-45.45.1 linux-lowlatency-hwe-22.04-edge - 6.8.0-45.45.1 linux-lowlatency-lib-rust-6.8.0-45-lowlatency - 6.8.0-45.45.1 linux-lowlatency-tools-6.8.0-45 - 6.8.0-45.45.1 linux-lowlatency-tools-common - 6.8.0-45.45.1 linux-lowlatency-tools-host - 6.8.0-45.45.1 linux-modules-6.8.0-45-lowlatency - 6.8.0-45.45.1 linux-modules-6.8.0-45-lowlatency-64k - 6.8.0-45.45.1 linux-modules-iwlwifi-6.8.0-45-lowlatency - 6.8.0-45.45.1 linux-modules-iwlwifi-lowlatency - 6.8.0-45.45.1 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.8.0-45.45.1 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.8.0-45.45.1 linux-tools-6.8.0-45-lowlatency - 6.8.0-45.45.1 linux-tools-6.8.0-45-lowlatency-64k - 6.8.0-45.45.1 linux-tools-lowlatency - 6.8.0-45.45.1 linux-tools-lowlatency-64k - 6.8.0-45.45.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-45.45.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-45.45.1 linux-tools-lowlatency-64k-hwe-22.04 - 6.8.0-45.45.1 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.8.0-45.45.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-45.45.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-45.45.1 linux-tools-lowlatency-hwe-22.04 - 6.8.0-45.45.1 linux-tools-lowlatency-hwe-22.04-edge - 6.8.0-45.45.1 No subscription required
Medium
CVE-2024-41009
CVE-2024-42154
CVE-2024-42159
CVE-2024-42160
CVE-2024-42224
CVE-2024-42228
USN-7020-2 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - GPU drivers; - Network drivers; - SCSI drivers; - F2FS file system; - BPF subsystem; - IPv4 networking; (CVE-2024-42160, CVE-2024-42159, CVE-2024-42154, CVE-2024-41009, CVE-2024-42228, CVE-2024-42224) Update Instructions: Run `sudo pro fix USN-7020-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-azure - 6.8.0-1015.17 linux-azure-cloud-tools-6.8.0-1015 - 6.8.0-1015.17 linux-azure-fde - 6.8.0-1015.17 linux-azure-headers-6.8.0-1015 - 6.8.0-1015.17 linux-azure-tools-6.8.0-1015 - 6.8.0-1015.17 linux-buildinfo-6.8.0-1015-azure - 6.8.0-1015.17 linux-cloud-tools-6.8.0-1015-azure - 6.8.0-1015.17 linux-cloud-tools-azure - 6.8.0-1015.17 linux-headers-6.8.0-1015-azure - 6.8.0-1015.17 linux-headers-azure - 6.8.0-1015.17 linux-image-6.8.0-1015-azure - 6.8.0-1015.17 linux-image-6.8.0-1015-azure-fde - 6.8.0-1015.17 linux-image-azure - 6.8.0-1015.17 linux-image-azure-fde - 6.8.0-1015.17 linux-image-unsigned-6.8.0-1015-azure - 6.8.0-1015.17 linux-modules-6.8.0-1015-azure - 6.8.0-1015.17 linux-modules-extra-6.8.0-1015-azure - 6.8.0-1015.17 linux-modules-extra-azure - 6.8.0-1015.17 linux-modules-involflt-6.8.0-1015-azure - 6.8.0-1015.17 linux-modules-involflt-azure - 6.8.0-1015.17 linux-modules-iwlwifi-6.8.0-1015-azure - 6.8.0-1015.17 linux-modules-iwlwifi-azure - 6.8.0-1015.17 linux-tools-6.8.0-1015-azure - 6.8.0-1015.17 linux-tools-azure - 6.8.0-1015.17 No subscription required
Medium
CVE-2024-41009
CVE-2024-42154
CVE-2024-42159
CVE-2024-42160
CVE-2024-42224
CVE-2024-42228
USN-7020-3 -- Linux kernel vulnerabilities
Ubuntu 24.04 LTS
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - GPU drivers; - Network drivers; - SCSI drivers; - F2FS file system; - BPF subsystem; - IPv4 networking; (CVE-2024-42160, CVE-2024-42159, CVE-2024-42224, CVE-2024-41009, CVE-2024-42154, CVE-2024-42228) Update Instructions: Run `sudo pro fix USN-7020-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1012-raspi - 6.8.0-1012.13 linux-headers-6.8.0-1012-raspi - 6.8.0-1012.13 linux-headers-raspi - 6.8.0-1012.13 linux-image-6.8.0-1012-raspi - 6.8.0-1012.13 linux-image-raspi - 6.8.0-1012.13 linux-modules-6.8.0-1012-raspi - 6.8.0-1012.13 linux-raspi - 6.8.0-1012.13 linux-raspi-headers-6.8.0-1012 - 6.8.0-1012.13 linux-raspi-tools-6.8.0-1012 - 6.8.0-1012.13 linux-tools-6.8.0-1012-raspi - 6.8.0-1012.13 linux-tools-raspi - 6.8.0-1012.13 No subscription required
Medium
CVE-2024-41009
CVE-2024-42154
CVE-2024-42159
CVE-2024-42160
CVE-2024-42224
CVE-2024-42228
USN-7027-1 -- Emacs vulnerabilities
Ubuntu 24.04 LTS
It was discovered that Emacs incorrectly handled input sanitization. An attacker could possibly use this issue to execute arbitrary commands. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-45939) Xi Lu discovered that Emacs incorrectly handled input sanitization. An attacker could possibly use this issue to execute arbitrary commands. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-48337) Xi Lu discovered that Emacs incorrectly handled input sanitization. An attacker could possibly use this issue to execute arbitrary commands. This issue only affected Ubuntu 22.04 LTS. (CVE-2022-48338) Xi Lu discovered that Emacs incorrectly handled input sanitization. An attacker could possibly use this issue to execute arbitrary commands. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-48339) It was discovered that Emacs incorrectly handled filename sanitization. An attacker could possibly use this issue to execute arbitrary commands. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-28617) It was discovered that Emacs incorrectly handled certain crafted files. An attacker could possibly use this issue to crash the program, resulting in a denial of service. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2024-30203, CVE-2024-30204, CVE-2024-30205) It was discovered that Emacs incorrectly handled certain crafted files. An attacker could possibly use this issue to execute arbitrary commands. (CVE-2024-39331) Update Instructions: Run `sudo pro fix USN-7027-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: emacs - 1:29.3+1-1ubuntu2+esm1 emacs-bin-common - 1:29.3+1-1ubuntu2+esm1 emacs-common - 1:29.3+1-1ubuntu2+esm1 emacs-el - 1:29.3+1-1ubuntu2+esm1 emacs-gtk - 1:29.3+1-1ubuntu2+esm1 emacs-lucid - 1:29.3+1-1ubuntu2+esm1 emacs-nox - 1:29.3+1-1ubuntu2+esm1 emacs-pgtk - 1:29.3+1-1ubuntu2+esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
Medium
CVE-2022-45939
CVE-2022-48337
CVE-2022-48338
CVE-2022-48339
CVE-2023-28617
CVE-2024-30203
CVE-2024-30204
CVE-2024-30205
CVE-2024-39331
https://launchpad.net/bugs/2070418
USN-7031-1 -- Puma vulnerability
Ubuntu 24.04 LTS
It was discovered that Puma incorrectly handled parsing certain headers. A remote attacker could possibly use this issue to overwrite header values set by intermediate proxies by providing duplicate headers containing underscore characters. Update Instructions: Run `sudo pro fix USN-7031-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: puma - 6.4.2-4ubuntu4.3 No subscription required
Medium
CVE-2024-45614
USN-7032-1 -- Tomcat vulnerability
Ubuntu 24.04 LTS
It was discovered that Tomcat incorrectly handled HTTP trailer headers. A remote attacker could possibly use this issue to perform HTTP request smuggling. Update Instructions: Run `sudo pro fix USN-7032-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libtomcat9-java - 9.0.70-2ubuntu0.1 No subscription required
Medium
CVE-2023-46589
USN-7033-1 -- Intel Microcode vulnerabilities
Ubuntu 24.04 LTS
It was discovered that some Intel(R) Processors did not properly restrict access to the Running Average Power Limit (RAPL) interface. This may allow a local privileged attacker to obtain sensitive information. (CVE-2024-23984) It was discovered that some Intel(R) Processors did not properly implement finite state machines (FSMs) in hardware logic. This may allow a local privileged attacker to cause a denial of service (system crash). (CVE-2024-24968) Update Instructions: Run `sudo pro fix USN-7033-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: intel-microcode - 3.20240910.0ubuntu0.24.04.1 No subscription required
Medium
CVE-2024-23984
CVE-2024-24968
USN-7037-1 -- OpenJPEG vulnerability
Ubuntu 24.04 LTS
It was discovered that OpenJPEG could enter a large loop and continuously print warning messages when given specially crafted input. An attacker could potentially use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-7037-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libopenjp2-7 - 2.5.0-2ubuntu0.1 libopenjp2-7-dev - 2.5.0-2ubuntu0.1 libopenjp2-tools - 2.5.0-2ubuntu0.1 libopenjpip-dec-server - 2.5.0-2ubuntu0.1 libopenjpip-server - 2.5.0-2ubuntu0.1 libopenjpip-viewer - 2.5.0-2ubuntu0.1 libopenjpip7 - 2.5.0-2ubuntu0.1 openjpeg-doc - 2.5.0-2ubuntu0.1 No subscription required
Medium
CVE-2023-39327
USN-7038-1 -- APR vulnerability
Ubuntu 24.04 LTS
Thomas Stangner discovered a permission vulnerability in the Apache Portable Runtime (APR) library. A local attacker could possibly use this issue to read named shared memory segments, potentially exposing sensitive application data. Update Instructions: Run `sudo pro fix USN-7038-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libapr1-dev - 1.7.2-3.1ubuntu0.1 libapr1t64 - 1.7.2-3.1ubuntu0.1 No subscription required
Medium
CVE-2023-49582
USN-7041-1 -- CUPS vulnerability
Ubuntu 24.04 LTS
Simone Margaritelli discovered that CUPS incorrectly sanitized IPP data when creating PPD files. A remote attacker could possibly use this issue to manipulate PPD files and execute arbitrary code when a printer is used. Update Instructions: Run `sudo pro fix USN-7041-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: cups - 2.4.7-1.2ubuntu7.3 cups-bsd - 2.4.7-1.2ubuntu7.3 cups-client - 2.4.7-1.2ubuntu7.3 cups-common - 2.4.7-1.2ubuntu7.3 cups-core-drivers - 2.4.7-1.2ubuntu7.3 cups-daemon - 2.4.7-1.2ubuntu7.3 cups-ipp-utils - 2.4.7-1.2ubuntu7.3 cups-ppdc - 2.4.7-1.2ubuntu7.3 cups-server-common - 2.4.7-1.2ubuntu7.3 libcups2-dev - 2.4.7-1.2ubuntu7.3 libcups2t64 - 2.4.7-1.2ubuntu7.3 libcupsimage2-dev - 2.4.7-1.2ubuntu7.3 libcupsimage2t64 - 2.4.7-1.2ubuntu7.3 No subscription required
Medium
CVE-2024-47175
USN-7042-1 -- cups-browsed vulnerability
Ubuntu 24.04 LTS
Simone Margaritelli discovered that cups-browsed could be used to create arbitrary printers from outside the local network. In combination with issues in other printing components, a remote attacker could possibly use this issue to connect to a system, created manipulated PPD files, and execute arbitrary code when a printer is used. This update disables support for the legacy CUPS printer discovery protocol. Update Instructions: Run `sudo pro fix USN-7042-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: cups-browsed - 2.0.0-0ubuntu10.1 cups-browsed-tests - 2.0.0-0ubuntu10.1 No subscription required
Medium
CVE-2024-47176
USN-7044-1 -- libcupsfilters vulnerability
Ubuntu 24.04 LTS
Simone Margaritelli discovered that libcupsfilters incorrectly sanitized IPP data when creating PPD files. A remote attacker could possibly use this issue to manipulate PPD files and execute arbitrary code when a printer is used. Update Instructions: Run `sudo pro fix USN-7044-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libcupsfilters-dev - 2.0.0-0ubuntu7.1 libcupsfilters-tests - 2.0.0-0ubuntu7.1 libcupsfilters2-common - 2.0.0-0ubuntu7.1 libcupsfilters2t64 - 2.0.0-0ubuntu7.1 No subscription required
Medium
CVE-2024-47076
USN-7045-1 -- libppd vulnerability
Ubuntu 24.04 LTS
Simone Margaritelli discovered that libppd incorrectly sanitized IPP data when creating PPD files. A remote attacker could possibly use this issue to manipulate PPD files and execute arbitrary code when a printer is used. Update Instructions: Run `sudo pro fix USN-7045-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libppd-dev - 2:2.0.0-0ubuntu4.1 libppd-tests - 2:2.0.0-0ubuntu4.1 libppd-utils - 2:2.0.0-0ubuntu4.1 libppd2 - 2:2.0.0-0ubuntu4.1 libppd2-common - 2:2.0.0-0ubuntu4.1 ppdc - 2:2.0.0-0ubuntu4.1 No subscription required
Medium
CVE-2024-47175
LSN-0104-1 -- Kernel Live Patch Security Notice
Ubuntu 24.04 LTS
It was discovered that the ATA over Ethernet (AoE) driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code.(CVE-2023-6270) It was discovered that a race condition existed in the AppleTalk networking subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code.(CVE-2023-51781) In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_rbtree: skip end interval element from gc rbtree lazy gc on insert might collect an end interval element that has been just added in this transactions, skip end interval elements that are not yet active.(CVE-2024-26581) In the Linux kernel, the following vulnerability has been resolved: net: qualcomm: rmnet: fix global oob in rmnet_policy The variable rmnet_link_ops assign a *bigger* maxtype which leads to a global out-of- bounds read when parsing the netlink attributes.(CVE-2024-26597) To check your kernel type and Livepatch version, enter this command: canonical-livepatch status lkp_Ubuntu_6_8_0[_|\d]+_aws_(\d+) - 104 lkp_Ubuntu_6_8_0[_|\d]+_gcp_(\d+) - 104 lkp_Ubuntu_6_8_0[_|\d]+_linux_(\d+) - 104 lkp_Ubuntu_6_8_0[_|\d]+_ibm_(\d+) - 104 Livepatch subscription required
High
CVE-2023-6270
CVE-2023-51781
CVE-2024-26597
CVE-2024-26581
LSN-0105-1 -- Kernel Live Patch Security Notice
Ubuntu 24.04 LTS
It was discovered that the ATA over Ethernet (AoE) driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code.(CVE-2023-6270) It was discovered that the netfilter connection tracker for netlink in the Linux kernel did not properly perform reference counting in some error conditions. A local attacker could possibly use this to cause a denial of service (memory exhaustion).(CVE-2023-7192) In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: disallow anonymous set with timeout flag Anonymous sets are never used with timeout from userspace, reject this. Exception to this rule is NFT_SET_EVAL to ensure legacy meters still work.(CVE-2024-26642) In the Linux kernel, the following vulnerability has been resolved: cifs: fix underflow in parse_server_interfaces() In this loop, we step through the buffer and after each item we check if the size_left is greater than the minimum size we need. However, the problem is that 'bytes_left' is type ssize_t while sizeof() is type size_t. That means that because of type promotion, the comparison is done as an unsigned and if we have negative bytes left the loop continues instead of ending.(CVE-2024-26828) In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: do not free live element (CVE-2024-26924) To check your kernel type and Livepatch version, enter this command: canonical-livepatch status lkp_Ubuntu_6_8_0[_|\d]+_aws_(\d+) - 105 lkp_Ubuntu_6_8_0[_|\d]+_azure_(\d+) - 105 lkp_Ubuntu_6_8_0[_|\d]+_gcp_(\d+) - 105 lkp_Ubuntu_6_8_0[_|\d]+_linux_(\d+) - 105 lkp_Ubuntu_6_8_0[_|\d]+_ibm_(\d+) - 105 Livepatch subscription required
High
CVE-2023-7192
CVE-2024-26642
CVE-2023-6270
CVE-2024-26828
CVE-2024-26924
LSN-0106-1 -- Kernel Live Patch Security Notice
Ubuntu 24.04 LTS
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: disallow timeout for anonymous sets Never used from userspace, disallow these parameters.(CVE-2023-52620) In the Linux kernel, the following vulnerability has been resolved: tls: fix race between tx work scheduling and socket close Similarly to previous commit, the submitting thread (recvmsg/sendmsg) may exit as soon as the async crypto handler calls complete(). Reorder scheduling the work before calling complete(). This seems more logical in the first place, as it's the inverse order of what the submitting thread will do.(CVE-2024-26585) In the Linux kernel, the following vulnerability has been resolved: tty: n_gsm: fix possible out-of-bounds in gsm0_receive() Assuming the following: - side A configures the n_gsm in basic option mode - side B sends the header of a basic option mode frame with data length 1 - side A switches to advanced option mode - side B sends 2 data bytes which exceeds gsm->len Reason: gsm->len is not used in advanced option mode. - side A switches to basic option mode - side B keeps sending until gsm0_receive() writes past gsm->buf Reason: Neither gsm->state nor gsm->len have been reset after reconfiguration. Fix this by changing gsm->count to gsm->len comparison from equal to less than. Also add upper limit checks against the constant MAX_MRU in gsm0_receive() and gsm1_receive() to harden against memory corruption of gsm->len and gsm->mru. All other checks remain as we still need to limit the data according to the user configuration and actual payload size.(CVE-2024-36016) To check your kernel type and Livepatch version, enter this command: canonical-livepatch status lkp_Ubuntu_6_8_0[_|\d]+_aws_(\d+) - 106 lkp_Ubuntu_6_8_0[_|\d]+_azure_(\d+) - 106 lkp_Ubuntu_6_8_0[_|\d]+_gcp_(\d+) - 106 lkp_Ubuntu_6_8_0[_|\d]+_linux_(\d+) - 106 lkp_Ubuntu_6_8_0[_|\d]+_ibm_(\d+) - 106 Livepatch subscription required
High
CVE-2024-36016
CVE-2024-26585
CVE-2023-52620
/etc/lsb-release
^[\s\S]*DISTRIB_CODENAME=([a-z]+)$
1
oval:com.ubuntu.noble:var:681610000000
oval:com.ubuntu.noble:var:681610000020
oval:com.ubuntu.noble:var:681610000040
oval:com.ubuntu.noble:var:681610000060
oval:com.ubuntu.noble:var:681610000080
oval:com.ubuntu.noble:var:681710000000
oval:com.ubuntu.noble:var:681710000020
oval:com.ubuntu.noble:var:681720000000
oval:com.ubuntu.noble:var:681730000000
oval:com.ubuntu.noble:var:681730000020
oval:com.ubuntu.noble:var:686310000000
oval:com.ubuntu.noble:var:686310000020
oval:com.ubuntu.noble:var:686310000040
oval:com.ubuntu.noble:var:686310000060
oval:com.ubuntu.noble:var:686310000080
oval:com.ubuntu.noble:var:686410000000
oval:com.ubuntu.noble:var:686410000020
oval:com.ubuntu.noble:var:686420000000
oval:com.ubuntu.noble:var:686420000020
oval:com.ubuntu.noble:var:686430000000
oval:com.ubuntu.noble:var:687510000000
oval:com.ubuntu.noble:var:687810000000
oval:com.ubuntu.noble:var:689310000000
oval:com.ubuntu.noble:var:689310000020
oval:com.ubuntu.noble:var:689310000040
oval:com.ubuntu.noble:var:689310000060
oval:com.ubuntu.noble:var:689310000080
oval:com.ubuntu.noble:var:689310000100
oval:com.ubuntu.noble:var:689310000120
oval:com.ubuntu.noble:var:689320000000
oval:com.ubuntu.noble:var:689320000020
oval:com.ubuntu.noble:var:689330000000
oval:com.ubuntu.noble:var:691810000000
oval:com.ubuntu.noble:var:692110000000
oval:com.ubuntu.noble:var:692110000020
oval:com.ubuntu.noble:var:692110000040
oval:com.ubuntu.noble:var:692110000060
oval:com.ubuntu.noble:var:692110000080
oval:com.ubuntu.noble:var:692110000100
oval:com.ubuntu.noble:var:692110000120
oval:com.ubuntu.noble:var:692120000000
oval:com.ubuntu.noble:var:694910000000
oval:com.ubuntu.noble:var:694910000020
oval:com.ubuntu.noble:var:694910000040
oval:com.ubuntu.noble:var:694910000060
oval:com.ubuntu.noble:var:694910000080
oval:com.ubuntu.noble:var:694910000100
oval:com.ubuntu.noble:var:694920000000
oval:com.ubuntu.noble:var:694920000020
oval:com.ubuntu.noble:var:695210000000
oval:com.ubuntu.noble:var:695210000020
oval:com.ubuntu.noble:var:695220000000
oval:com.ubuntu.noble:var:695510000000
oval:com.ubuntu.noble:var:697510000000
oval:com.ubuntu.noble:var:697510000020
oval:com.ubuntu.noble:var:697510000040
oval:com.ubuntu.noble:var:697510000060
oval:com.ubuntu.noble:var:697510000080
oval:com.ubuntu.noble:var:697510000100
oval:com.ubuntu.noble:var:697510000120
oval:com.ubuntu.noble:var:697510000140
oval:com.ubuntu.noble:var:697510000160
oval:com.ubuntu.noble:var:697510000180
oval:com.ubuntu.noble:var:699910000000
oval:com.ubuntu.noble:var:699910000020
oval:com.ubuntu.noble:var:699910000040
oval:com.ubuntu.noble:var:699910000060
oval:com.ubuntu.noble:var:699910000080
oval:com.ubuntu.noble:var:699910000100
oval:com.ubuntu.noble:var:699920000000
oval:com.ubuntu.noble:var:700410000000
oval:com.ubuntu.noble:var:700510000000
oval:com.ubuntu.noble:var:700510000020
oval:com.ubuntu.noble:var:702010000000
oval:com.ubuntu.noble:var:702010000020
oval:com.ubuntu.noble:var:702010000040
oval:com.ubuntu.noble:var:702010000060
oval:com.ubuntu.noble:var:702010000080
oval:com.ubuntu.noble:var:702010000100
oval:com.ubuntu.noble:var:702010000120
oval:com.ubuntu.noble:var:702010000140
oval:com.ubuntu.noble:var:702020000000
oval:com.ubuntu.noble:var:702030000000
/snap/bin/canonical-livepatch
/proc/modules
1
/snap/bin/canonical-livepatch
/proc/modules
1
/snap/bin/canonical-livepatch
/proc/modules
1
unix
noble
0:3.0.13-0ubuntu3.1
0:41.0.7-4ubuntu0.1
0:2.3.12-1ubuntu0.24.04.1
0:8.5.0-2ubuntu10.1
0:2.4.58-1ubuntu8.1
0:3.8.3-1.1ubuntu3.1
0:10.0.0-2ubuntu8.1
0:2.0.13-4ubuntu0.1
0:2.39-0ubuntu8.1
0:10.2.0-1ubuntu1
0:20240213.00-0ubuntu3.1
0:20240320.00-0ubuntu1~24.04.1
0:1.59.0-1ubuntu0.1
0:590-2ubuntu2.1
0:3.5.1+dfsg1-0ubuntu1
0:2.0.12-1ubuntu1
0:10.0.0-2ubuntu8.2
0:2.80.0-6ubuntu3.1
1:2.23-1ubuntu0.1
0:0.4.4-1ubuntu0.1
0:8.0.105-0ubuntu1~24.04.1
0:8.0.105-8.0.5-0ubuntu1~24.04.1
0:8.0.5-0ubuntu1~24.04.1
0:3.6-2ubuntu0.1
0:1.7.17-1ubuntu0.1~esm2
0:46.2-1~ubuntu24.04.2
0:3.1.2-1ubuntu1.1
0:2.44.2-0ubuntu0.24.04.1
4:0.9+LibO24.2.3-0ubuntu0.24.04.2
4:1.2.0+LibO24.2.3-0ubuntu0.24.04.2
4:102.12+LibO24.2.3-0ubuntu0.24.04.2
4:24.2.3-0ubuntu0.24.04.2
1:2.13.0-3ubuntu2
0:1.19.2-1ubuntu3.1
1:2.43.0-1ubuntu7.1
0:8.4.4-1.1ubuntu6.1
0:4.0.1-7.1ubuntu5.1
0:3.20240514.0ubuntu0.24.04.1
0:1.24.2-1ubuntu0.1
0:3.0.1-3ubuntu0.1
0:1.0.2-2ubuntu1.1
0:16.3-0ubuntu0.24.04.1
7:6.1.1-3ubuntu5+esm1
0:2.39-0ubuntu8.2
0:3.7.2-2ubuntu0.1
0:2.42.10+dfsg-3ubuntu3.1
0:8u412-ga-1~24.04.2
0:1.14.0-1ubuntu2.1
0:3.8.2-2ubuntu0.1
6.8.0-\d+(-raspi)
0:6.8.0-1005
6.8.0-\d+(-ibm)
0:6.8.0-1006
6.8.0-\d+(-generic|-generic-64k)
0:6.8.0-35
6.8.0-\d+(-generic|-generic-64k)
0:6.8.0-35
6.8.0-\d+(-lowlatency|-lowlatency-64k)
0:6.8.0-35
6.8.0-\d+(-gcp)
0:6.8.0-1008
6.8.0-\d+(-aws)
0:6.8.0-1009
6.8.0-\d+(-oem)
0:6.8.0-1006
6.8.0-\d+(-gke)
0:6.8.0-1004
6.8.0-\d+(-azure|-azure-fde)
0:6.8.0-1008
0:8.0.37-0ubuntu0.24.04.1
0:4.5.1+git230720-4ubuntu2.1
0:1.8-1fakesync1ubuntu0.24.04.1
0:7.2.5.1+dfsg1-0.8ubuntu0.1~esm1
0:0.76.0-1ubuntu0.1
0:10.02.1~dfsg1-0ubuntu7.1
0:2.9.4-1.1ubuntu6.1
0:2.2.7-1ubuntu0.1
0:3.2.3-1ubuntu0.24.04.1
1:10.11.8-0ubuntu0.24.04.1
0:8.3.6-0ubuntu0.24.04.1
4:5.27.11-0ubuntu4.1
0:2.4.7-1.2ubuntu7.1
0:2.4.7-1.2ubuntu7.2
0:1.0-2ubuntu1.1
0:1.0-2ubuntu1.2
0:1.21.4-1ubuntu4.1
0:2.1.0-4.1ubuntu1.2
1:9.6p1-3ubuntu13.3
0:2.6.9-1ubuntu4.1
6.8.0-\d+(-raspi)
0:6.8.0-1006
6.8.0-\d+(-ibm)
0:6.8.0-1007
6.8.0-\d+(-nvidia|-nvidia-64k)
0:6.8.0-1008
6.8.0-\d+(-generic|-generic-64k)
0:6.8.0-36
6.8.0-\d+(-lowlatency|-lowlatency-64k)
0:6.8.0-36
6.8.0-\d+(-intel)
0:6.8.0-1006
6.8.0-\d+(-gcp)
0:6.8.0-1009
6.8.0-\d+(-oem)
0:6.8.0-1007
6.8.0-\d+(-aws)
0:6.8.0-1010
6.8.0-\d+(-gke)
0:6.8.0-1005
6.8.0-\d+(-azure|-azure-fde)
0:6.8.0-1009
4:0.9+LibO24.2.4-0ubuntu0.24.04.2
4:1.2.0+LibO24.2.4-0ubuntu0.24.04.2
4:102.12+LibO24.2.4-0ubuntu0.24.04.2
4:24.2.4-0ubuntu0.24.04.2
6.8.0-\d+(-oracle|-oracle-64k)
0:6.8.0-1006
0:7.2.5.1+dfsg1-0.8ubuntu0.1~esm2
2:24.0.0-0ubuntu1.2
2:28.0.1-0ubuntu1.2
3:29.0.1-0ubuntu1.3
0:2.4.58-1ubuntu8.2
0:2.4.58-1ubuntu8.3
0:1.21.9-1ubuntu0.1
0:1.22.2-2ubuntu0.1
1:9.6p1-3ubuntu13.4
3:4.2.11-1ubuntu1.1
0:8.0.107-0ubuntu1~24.04.1
0:8.0.107-8.0.7-0ubuntu1~24.04.1
0:8.0.7-0ubuntu1~24.04.1
6.8.0-\d+(-intel)
0:6.8.0-1007
6.8.0-\d+(-raspi)
0:6.8.0-1007
6.8.0-\d+(-ibm|-oem)
0:6.8.0-1008
6.8.0-\d+(-azure|-azure-fde)
0:6.8.0-1010
6.8.0-\d+(-gcp)
0:6.8.0-1010
6.8.0-\d+(-generic|-generic-64k)
0:6.8.0-38
6.8.0-\d+(-lowlatency|-lowlatency-64k)
0:6.8.0-38
6.8.0-\d+(-gke)
0:6.8.0-1006
6.8.0-\d+(-nvidia|-nvidia-64k)
0:6.8.0-1009
6.8.0-\d+(-aws)
0:6.8.0-1011
0:10.02.1~dfsg1-0ubuntu7.3
0:2.24.33-4ubuntu1.1
0:3.24.41-4ubuntu1.1
0:2.4.58-1ubuntu8.4
0:3.11.0-1ubuntu0.24.04.1
0:1.0.0-6ubuntu0.1
0:6.6-1ubuntu5.1
1:9.18.28-0ubuntu0.24.04.1
3:29.0.1-0ubuntu1.4
0:0.1.2+24.04
0:24.02.0-1ubuntu9.1
6.8.0-\d+(-oracle|-oracle-64k)
0:6.8.0-1008
6.8.0-\d+(-gke)
0:6.8.0-1007
6.8.0-\d+(-raspi)
0:6.8.0-1008
6.8.0-\d+(-ibm|-oem)
0:6.8.0-1009
6.8.0-\d+(-nvidia|-nvidia-64k)
0:6.8.0-1010
6.8.0-\d+(-gcp)
0:6.8.0-1011
6.8.0-\d+(-aws)
0:6.8.0-1012
6.8.0-\d+(-generic|-generic-64k)
0:6.8.0-39
6.8.0-\d+(-lowlatency|-lowlatency-64k)
0:6.8.0-39
0:8u422-b05-1~24.04
0:11.0.24+8-1ubuntu3~24.04.1
0:17.0.12+7-1ubuntu2~24.04
0:21.0.4+7-1ubuntu2~24.04
0:8.0.39-0ubuntu0.24.04.1
0:3.0.13-0ubuntu3.2
0:4.97-4ubuntu4.1
0:2.63+24.04ubuntu0.1
0:3.12.3-1ubuntu0.1
0:1.0.2-4ubuntu0.24.04.1
0:8.5.0-2ubuntu10.2
2:2.10-21ubuntu0.1
3:4.2.11-1ubuntu1.2
0:1.20.1-6ubuntu2.1
6.8.0-\d+(-gke)
0:6.8.0-1008
6.8.0-\d+(-ibm)
0:6.8.0-1010
6.8.0-\d+(-nvidia|-nvidia-64k)
0:6.8.0-1011
6.8.0-\d+(-gcp)
0:6.8.0-1012
6.8.0-\d+(-aws)
0:6.8.0-1013
6.8.0-\d+(-generic|-generic-64k)
0:6.8.0-40
6.8.0-\d+(-raspi)
0:6.8.0-1009
6.8.0-\d+(-lowlatency|-lowlatency-64k)
0:6.8.0-40
6.8.0-\d+(-oracle|-oracle-64k)
0:6.8.0-1010
6.8.0-\d+(-nvidia-lowlatency|-nvidia-lowlatency-64k)
0:6.8.0-1011
6.8.0-\d+(-azure|-azure-fde)
0:6.8.0-1012
6.8.0-\d+(-oem)
0:6.8.0-1010
0:8.0.108-0ubuntu1~24.04.1
0:8.0.108-8.0.8-0ubuntu1~24.04.1
0:8.0.8-0ubuntu1~24.04.1
1:1.36.1-6ubuntu3.1
4:0.9+LibO24.2.5-0ubuntu0.24.04.2
4:1.2.0+LibO24.2.5-0ubuntu0.24.04.2
4:102.12+LibO24.2.5-0ubuntu0.24.04.2
4:24.2.5-0ubuntu0.24.04.2
0:46.0-0ubuntu6~24.04.3
1:0.4.38-1ubuntu0.1
0:3.20240813.0ubuntu0.24.04.2
0:16.4-0ubuntu0.24.04.1
0:1.2.26+ds1-1ubuntu0.1
6.8.0-\d+(-gke)
0:6.8.0-1009
6.8.0-\d+(-raspi)
0:6.8.0-1010
6.8.0-\d+(-ibm|-oem|-oracle|-oracle-64k)
0:6.8.0-1011
6.8.0-\d+(-nvidia|-nvidia-64k)
0:6.8.0-1012
6.8.0-\d+(-nvidia-lowlatency|-nvidia-lowlatency-64k)
0:6.8.0-1012
6.8.0-\d+(-gcp)
0:6.8.0-1013
6.8.0-\d+(-azure|-azure-fde)
0:6.8.0-1013
6.8.0-\d+(-aws)
0:6.8.0-1014
6.8.0-\d+(-generic|-generic-64k)
0:6.8.0-41
6.8.0-\d+(-lowlatency|-lowlatency-64k)
0:6.8.0-41
1:8.2.2+ds-0ubuntu1.2
1:2.3.21+dfsg1-2ubuntu6
7:6.1.1-3ubuntu5+esm2
1:1.8.7-1ubuntu0.1.24.04.1
0:3.0.13-0ubuntu3.4
3:4.2.11-1ubuntu1.3
0:24.3.0-1ubuntu0.1
1:24.1.1-0ubuntu1.2
0:0.20180824+1.9.0-2ubuntu0.1~esm2
0:1.0.0+git20190521.78d0385+1.9.0-2ubuntu0.1~esm2
0:1.9.0-2ubuntu0.1~esm2
0:3.9.1-1ubuntu0.1
2:9.1.0016-1ubuntu7.2
0:2.44.3-0ubuntu0.24.04.1
0:4.5.1+git230720-4ubuntu2.2
0:1.19.2-1ubuntu3.2
6.8.0-\d+(-gke)
0:6.8.0-1010
6.8.0-\d+(-ibm|-oem|-oracle|-oracle-64k)
0:6.8.0-1012
6.8.0-\d+(-gcp)
0:6.8.0-1014
6.8.0-\d+(-aws)
0:6.8.0-1015
6.8.0-\d+(-generic|-generic-64k)
0:6.8.0-44
6.8.0-\d+(-lowlatency|-lowlatency-64k)
0:6.8.0-44
6.8.0-\d+(-raspi)
0:6.8.0-1011
0:2.6.1-2ubuntu0.1
0:1.2-4.1ubuntu2.24.0.4.1+esm1
0:68.1.2-2ubuntu1.1
6.8.0-\d+(-azure|-azure-fde)
0:6.8.0-1014
6.8.0-\d+(-nvidia|-nvidia-64k)
0:6.8.0-1013
6.8.0-\d+(-nvidia-lowlatency|-nvidia-lowlatency-64k)
0:6.8.0-1013
0:3.6.7-9.1ubuntu0.1~esm1
0:1.0.7+dfsg-0ubuntu0.24.04.1
0:8.5.0-2ubuntu10.4
0:1.24.0-2ubuntu7.1
0:3.12.3-1ubuntu0.2
0:8.4.4-1.1ubuntu6.2
6.8.0-\d+(-gke)
0:6.8.0-1011
6.8.0-\d+(-ibm|-oem|-oracle|-oracle-64k)
0:6.8.0-1013
6.8.0-\d+(-nvidia|-nvidia-64k)
0:6.8.0-1014
6.8.0-\d+(-nvidia-lowlatency|-nvidia-lowlatency-64k)
0:6.8.0-1014
6.8.0-\d+(-gcp)
0:6.8.0-1015
6.8.0-\d+(-aws)
0:6.8.0-1016
6.8.0-\d+(-generic|-generic-64k)
0:6.8.0-45
6.8.0-\d+(-lowlatency|-lowlatency-64k)
0:6.8.0-45
6.8.0-\d+(-azure|-azure-fde)
0:6.8.0-1015
6.8.0-\d+(-raspi)
0:6.8.0-1012
1:29.3+1-1ubuntu2+esm1
0:6.4.2-4ubuntu4.3
0:9.0.70-2ubuntu0.1
0:3.20240910.0ubuntu0.24.04.1
0:2.5.0-2ubuntu0.1
0:1.7.2-3.1ubuntu0.1
0:2.4.7-1.2ubuntu7.3
0:2.0.0-0ubuntu10.1
0:2.0.0-0ubuntu7.1
2:2.0.0-0ubuntu4.1
0
104
0
105
0
106
libssl3t64
libssl-dev
openssl
libssl-doc
python3-cryptography
python-cryptography-doc
libodbc2
unixodbc-dev
unixodbc-common
unixodbc
odbcinst
libodbcinst2
libodbccr2
libcurl4-gnutls-dev
libcurl4-openssl-dev
libcurl3t64-gnutls
libcurl4-doc
curl
libcurl4t64
apache2-data
libapache2-mod-md
apache2-utils
apache2-dev
apache2-suexec-pristine
apache2-suexec-custom
apache2
apache2-doc
libapache2-mod-proxy-uwsgi
apache2-ssl-dev
apache2-bin
libgnutls-openssl27t64
libgnutls-dane0t64
libgnutls28-dev
gnutls-doc
libgnutls30t64
gnutls-bin
libvirt-clients-qemu
libvirt-dev
libvirt-wireshark
libvirt-daemon-driver-qemu
libvirt-login-shell
libvirt-daemon-system-sysv
libvirt-daemon-driver-lxc
libnss-libvirt
libvirt-daemon
libvirt-daemon-config-nwfilter
libvirt-daemon-driver-storage-iscsi-direct
libvirt-daemon-config-network
libvirt-l10n
libvirt-clients
libvirt-daemon-driver-storage-zfs
libvirt-daemon-driver-xen
libvirt-daemon-driver-vbox
libvirt-daemon-driver-storage-gluster
libvirt-daemon-system
libvirt0
libvirt-daemon-system-systemd
libvirt-sanlock
libvirt-daemon-driver-storage-rbd
libvirt-doc
klibc-utils
libklibc
libklibc-dev
libc-bin
glibc-doc
locales-all
libc6-i386
libc6-s390
libc6-dev-i386
libc6-dev-s390
libc6-dev
libc6-amd64
libc6-x32
libc6-dev-amd64
libc-dev-bin
libc6
nscd
libc-devtools
glibc-source
libc6-dev-x32
locales
python3-pil.imagetk
python-pil-doc
python3-pil
google-guest-agent
google-osconfig-agent
libnghttp2-14
libnghttp2-doc
libnghttp2-dev
nghttp2-proxy
nghttp2
nghttp2-client
nghttp2-server
less
libwinpr3-dev
libfreerdp-server3-3
winpr3-utils
libfreerdp-shadow3-3
freerdp3-dev
freerdp3-shadow-x11
libfreerdp3-3
libfreerdp-client3-3
freerdp3-wayland
libwinpr-tools3-3
libfreerdp-shadow-subsystem3-3
freerdp3-x11
libwinpr3-3
anope
libvirt-clients-qemu
libvirt-dev
libvirt-wireshark
libvirt-daemon-driver-qemu
libvirt-login-shell
libvirt-daemon-system-sysv
libvirt-daemon-driver-lxc
libnss-libvirt
libvirt-daemon
libvirt-daemon-config-nwfilter
libvirt-daemon-driver-storage-iscsi-direct
libvirt-daemon-config-network
libvirt-l10n
libvirt-clients
libvirt-daemon-driver-storage-zfs
libvirt-daemon-driver-xen
libvirt-daemon-driver-vbox
libvirt-daemon-driver-storage-gluster
libvirt-daemon-system
libvirt0
libvirt-daemon-system-systemd
libvirt-sanlock
libvirt-daemon-driver-storage-rbd
libvirt-doc
gir1.2-glib-2.0
libgirepository-2.0-dev
gir1.2-girepository-3.0-dev
libglib2.0-0t64
libglib2.0-tests
gir1.2-glib-2.0-dev
libgirepository-2.0-0
gir1.2-girepository-3.0
libglib2.0-data
libglib2.0-doc
libglib2.0-bin
libglib2.0-dev
libglib2.0-dev-bin
fossil
python-sqlparse-doc
python3-sqlparse
sqlformat
dotnet-sdk-8.0
netstandard-targeting-pack-2.1-8.0
dotnet-sdk-8.0-source-built-artifacts
dotnet-sdk-dbg-8.0
dotnet-templates-8.0
dotnet8
aspnetcore-runtime-8.0
dotnet-apphost-pack-8.0
dotnet-hostfxr-8.0
aspnetcore-runtime-dbg-8.0
dotnet-runtime-dbg-8.0
dotnet-runtime-8.0
dotnet-host-8.0
aspnetcore-targeting-pack-8.0
dotnet-targeting-pack-8.0
python3-idna
libcjson-dev
libcjson1
gnome-remote-desktop
python-jinja2-doc
python3-jinja2
gir1.2-javascriptcoregtk-4.1
libjavascriptcoregtk-6.0-1
libjavascriptcoregtk-bin
libwebkitgtk-doc
gir1.2-webkit2-4.1
libwebkitgtk-6.0-dev
libjavascriptcoregtk-4.1-0
libwebkit2gtk-4.1-0
libwebkit2gtk-4.1-dev
libwebkit2gtk-4.0-doc
libjavascriptcoregtk-4.1-dev
libjavascriptcoregtk-6.0-dev
gir1.2-javascriptcoregtk-6.0
webkit2gtk-driver
libjavascriptcoregtk-4.0-bin
libwebkitgtk-6.0-4
gir1.2-webkit-6.0
libreoffice-nlpsolver
libreoffice-wiki-publisher
fonts-opensymbol
libreoffice-evolution
libreoffice-help-en-gb
libreoffice-librelogo
libreoffice-l10n-ml
libreoffice-help-zh-cn
libreoffice-subsequentcheckbase
libreoffice-l10n-mk
libreoffice-help-id
libreoffice-l10n-mr
libreoffice-style-tango
libreoffice-help-pt-br
libreofficekit-data
libreoffice-core
libreoffice-help-it
libreoffice-l10n-uk
libreoffice-l10n-fr
libreoffice-gnome
libreoffice-l10n-fi
libreoffice-help-nl
libreoffice-uiconfig-math
libreoffice-l10n-uz
libreoffice
libreoffice-sdbc-mysql
libreoffice-l10n-nb
libreoffice-l10n-mn
libreoffice-l10n-ne
libreoffice-l10n-nl
libreoffice-uiconfig-writer
libreoffice-l10n-nn
libreoffice-help-fi
libreoffice-l10n-dz
libreoffice-l10n-nr
libreoffice-help-fr
libreoffice-report-builder-bin
libofficebean-java
libreoffice-qt6
libreoffice-l10n-vi
libreoffice-l10n-nso
libreoffice-qt5
libreoffice-nogui
libreoffice-math-nogui
libreoffice-style-karasa-jaga
libreoffice-l10n-ve
libreoffice-l10n-gu
libreoffice-help-om
libreoffice-l10n-gl
python3-access2base
libreoffice-help-en-us
libreoffice-l10n-ga
libuno-cppu3t64
liblibreofficekitgtk
libreoffice-l10n-gd
libreoffice-help-km
libreoffice-l10n-kn
libreoffice-help-ko
libreoffice-l10n-st
libreoffice-dev-common
libreoffice-l10n-sr
libreoffice-help-cs
libreoffice-l10n-ts
libreoffice-l10n-sv
libreoffice-script-provider-bsh
gir1.2-lokdocview-0.1
ure-java
libreoffice-report-builder-bin-nogui
libreoffice-l10n-ka
libreoffice-uiconfig-common
libridl-java
libreoffice-help-ca
libreoffice-l10n-zh-tw
libreoffice-l10n-sl
libreoffice-l10n-sk
libreoffice-style-breeze
libreoffice-l10n-si
libreoffice-l10n-da
libreofficekit-dev
libreoffice-l10n-de
libreoffice-common
libreoffice-help-pl
libreoffice-l10n-pa-in
libuno-purpenvhelpergcc3-3t64
libreoffice-uiconfig-report-builder
libreoffice-help-pt
libreoffice-base-nogui
libreoffice-gtk3
libreoffice-math
libreoffice-help-vi
libreoffice-gtk4
libreoffice-l10n-tr
libreoffice-help-hi
libreoffice-l10n-gug
libreoffice-sdbc-hsqldb
libreoffice-draw-nogui
libreoffice-calc
libreoffice-base-drivers
libreoffice-style-colibre
libreoffice-l10n-ta
libreoffice-sdbc-firebird
libreoffice-l10n-tg
libreoffice-l10n-te
libreoffice-l10n-th
libreoffice-l10n-id
libreoffice-l10n-lv
libreoffice-help-hu
libreoffice-l10n-lt
libreoffice-l10n-ss
libunoloader-java
libreoffice-uiconfig-impress
libreoffice-l10n-eu
libreoffice-l10n-et
libreoffice-script-provider-js
libreoffice-l10n-es
libreoffice-l10n-el
libreoffice-l10n-eo
libreoffice-style-sifr
libreoffice-l10n-zh-cn
libreoffice-l10n-ug
libreoffice-smoketest-data
libreoffice-l10n-ko
libreoffice-l10n-zu
libreoffice-impress
libreoffice-java-common
libreoffice-help-eu
libreoffice-help-et
libreoffice-help-es
libreoffice-l10n-km
libreoffice-uiconfig-draw
libreoffice-help-el
libreoffice-uiconfig-calc
libreoffice-l10n-kk
libreoffice-dev-gui
libreoffice-l10n-be
libreoffice-l10n-szl
libreoffice-l10n-bg
libreoffice-l10n-tn
libreoffice-l10n-bn
libreoffice-plasma
libreoffice-help-ja
libreoffice-l10n-br
libreoffice-l10n-bs
liblibreoffice-java
libunoil-java
libreoffice-style-yaru
libreoffice-base-core
libreoffice-help-ru
libreoffice-l10n-ru
libreoffice-l10n-rw
libreoffice-l10n-is
libreoffice-style-elementary
python3-uno
libreoffice-l10n-fa
libreoffice-l10n-am
libreoffice-l10n-ro
libreoffice-l10n-en-za
libreoffice-style-sukapura
libreoffice-l10n-ca
libreoffice-help-sl
libreoffice-calc-nogui
libreoffice-help-sk
libreoffice-help-sv
libreoffice-l10n-cs
python3-scriptforge
libreoffice-dev-doc
libreoffice-help-common
libreoffice-l10n-za
libreoffice-l10n-cy
libreoffice-l10n-oc
libjurt-java
libreoffice-base
libreoffice-help-gl
libreoffice-l10n-om
libreoffice-l10n-or
libreoffice-l10n-pt-br
libreoffice-l10n-kmr
uno-libs-private
libreoffice-l10n-ast
libreoffice-l10n-hu
libreoffice-l10n-hr
libreoffice-script-provider-python
libreoffice-writer-nogui
libreoffice-l10n-hy
libreoffice-l10n-he
libreoffice-officebean
libreoffice-dev
libreoffice-report-builder
libuno-sal3t64
libreoffice-help-tr
libreoffice-l10n-hi
libreoffice-kf5
libreoffice-help-dz
libreoffice-l10n-pt
libreoffice-l10n-ja
libreoffice-l10n-pl
libreoffice-sdbc-postgresql
libreoffice-writer
libreoffice-help-de
libreoffice-help-da
libreoffice-uiconfig-base
ure
libreoffice-impress-nogui
libjuh-java
libreoffice-l10n-it
libreoffice-l10n-xh
libreoffice-l10n-af
libuno-cppuhelpergcc3-3t64
libreoffice-help-zh-tw
libreoffice-l10n-en-gb
libreoffice-draw
libuno-salhelpergcc3-3t64
libreoffice-core-nogui
libreoffice-l10n-as
libreoffice-l10n-ar
libreoffice-l10n-in
amavisd-new-postfix
amavisd-new
unbound
python3-unbound
libunbound8
unbound-anchor
unbound-host
libunbound-dev
git
gitweb
git-gui
git-daemon-sysvinit
gitk
git-all
git-mediawiki
git-daemon-run
git-man
git-doc
git-svn
git-cvs
git-email
frr
frr-rpki-rtrlib
frr-snmp
frr-doc
frr-pythontools
libtss2-esys-3.0.2-0t64
libtss2-sys1t64
libtss2-mu-4.0.1-0t64
libtss2-tcti-spi-helper0t64
libtss2-tcti-libtpms0t64
libtss2-doc
libtss2-tcti-swtpm0t64
libtss2-tcti-device0t64
libtss2-rc0t64
libtss2-fapi1t64
libtss2-tcti-mssim0t64
libtss2-policy0t64
libtss2-tcti-pcap0t64
libtss2-tctildr0t64
libtss2-dev
libtss2-tcti-cmd0t64
intel-microcode
gstreamer1.0-plugins-base
libgstreamer-plugins-base1.0-0
gstreamer1.0-x
libgstreamer-gl1.0-0
gstreamer1.0-gl
libgstreamer-plugins-base1.0-dev
gir1.2-gst-plugins-base-1.0
gstreamer1.0-alsa
gstreamer1.0-plugins-base-apps
python3-werkzeug
python-werkzeug-doc
python3-pymysql
python-pymysql-doc
postgresql-server-dev-16
libecpg6
postgresql-pltcl-16
libpq-dev
postgresql-16
libpgtypes3
libecpg-dev
postgresql-plperl-16
libpq5
postgresql-client-16
postgresql-doc-16
postgresql-plpython3-16
libecpg-compat3
ffmpeg
ffmpeg-doc
libavcodec-dev
libavcodec-extra
libavcodec-extra60
libavcodec60
libavdevice-dev
libavdevice60
libavfilter-dev
libavfilter-extra
libavfilter-extra9
libavfilter9
libavformat-dev
libavformat-extra
libavformat-extra60
libavformat60
libavutil-dev
libavutil58
libpostproc-dev
libpostproc57
libswresample-dev
libswresample4
libswscale-dev
libswscale7
libc-bin
glibc-doc
libc6-i386
libc6-s390
libc6-dev-i386
nscd
libc6-dev-x32
libc6-dev
libc6-amd64
libc6-x32
libc6-dev-amd64
libc-dev-bin
libc6
locales-all
libc-devtools
glibc-source
libc6-dev-s390
locales
libarchive-dev
libarchive13t64
libarchive-tools
libgdk-pixbuf-2.0-dev
gdk-pixbuf-tests
libgdk-pixbuf2.0-common
libgdk-pixbuf2.0-bin
libgdk-pixbuf2.0-doc
gir1.2-gdkpixbuf-2.0
libgdk-pixbuf-2.0-0
openjdk-8-doc
openjdk-8-jdk
openjdk-8-jre-headless
openjdk-8-jre
openjdk-8-jdk-headless
openjdk-8-source
openjdk-8-jre-zero
openjdk-8-demo
libvpx-dev
libvpx9
libvpx-doc
vpx-tools
libaom-doc
libaom-dev
libaom3
aom-tools
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
mysql-client
libmysqlclient-dev
mysql-testsuite-8.0
mysql-router
mysql-server
libmysqlclient21
mysql-client-core-8.0
mysql-server-core-8.0
mysql-server-8.0
mysql-testsuite
mysql-client-8.0
mysql-source-8.0
libtiff-opengl
libtiff5-dev
libtiff-dev
libtiffxx6
libtiff6
libtiff-tools
libtiff-doc
libndp0
libndp-dev
libndp-tools
virtuoso-vad-demo
virtuoso-vad-sparqldemo
virtuoso-vad-rdfmappers
virtuoso-vsp-startpage
virtuoso-vad-isparql
virtuoso-opensource-7-bin
virtuoso-server
virtuoso-vad-tutorial
virtuoso-minimal
virtuoso-opensource
virtuoso-vad-ods
virtuoso-opensource-7
virtuoso-vad-syncml
virtuoso-vad-doc
virtuoso-vad-conductor
libvirtodbc0
libvirtuoso5.5-cil
virtuoso-vad-bpel
virtuoso-opensource-7-common
libvte-2.91-gtk4-dev
libvte-2.91-common
gir1.2-vte-3.91
gir1.2-vte-2.91
libvte-2.91-doc
libvte-2.91-gtk4-0
libvte-2.91-0
libvte-2.91-gtk4-doc
libvte-2.91-dev
ghostscript
libgs10-common
libgs10
libgs-common
libgs-dev
ghostscript-doc
libsss-certmap-dev
libipa-hbac-dev
sssd-ad
libsss-sudo
libsss-nss-idmap0
libnss-sss
sssd-ipa
sssd-passkey
libipa-hbac0t64
libsss-idmap-dev
python3-libsss-nss-idmap
sssd-common
python3-sss
libpam-sss
sssd
libsss-idmap0
sssd-idp
libsss-nss-idmap-dev
sssd-kcm
libsss-certmap0
python3-libipa-hbac
sssd-ldap
sssd-tools
sssd-ad-common
sssd-krb5-common
sssd-dbus
sssd-krb5
sssd-proxy
ruby-rack
ruby3.2
ruby3.2-doc
ruby3.2-dev
libruby3.2
mariadb-plugin-provider-lzo
mariadb-plugin-cracklib-password-check
mariadb-backup
mariadb-plugin-connect
mariadb-plugin-spider
libmariadb-dev
libmariadb3
mariadb-plugin-s3
mariadb-plugin-provider-bzip2
mariadb-plugin-provider-lzma
mariadb-plugin-provider-snappy
mariadb-client
libmariadbd19t64
mariadb-server-core
mariadb-server-10.5
mariadb-test-data
mariadb-plugin-provider-lz4
mariadb-client-core
mariadb-plugin-rocksdb
mariadb-plugin-gssapi-client
mariadb-plugin-mroonga
libmariadbd-dev
libmariadb-dev-compat
mariadb-plugin-gssapi-server
mariadb-server
mariadb-common
mariadb-plugin-hashicorp-key-management
mariadb-plugin-oqgraph
mariadb-test
php8.3-cgi
php8.3-xsl
php8.3-fpm
php8.3-phpdbg
php8.3-zip
php8.3-curl
php8.3-ldap
php8.3-gmp
php8.3-sqlite3
php8.3-gd
php8.3-common
php8.3-enchant
php8.3-odbc
php8.3-cli
php8.3-mbstring
php8.3-pgsql
php8.3-mysql
php8.3-dba
libapache2-mod-php8.3
php8.3-soap
php8.3-opcache
php8.3-sybase
php8.3-pspell
libphp8.3-embed
php8.3-bz2
php8.3-dev
php8.3
php8.3-tidy
php8.3-interbase
php8.3-readline
php8.3-intl
php8.3-imap
php8.3-xml
php8.3-bcmath
php8.3-snmp
plasma-workspace-dev
libweather-ion7
libkfontinst5
libcolorcorrect5
libkworkspace5-5
plasma-workspace-data
plasma-workspace-wayland
sddm-theme-breeze
libplasma-geolocation-interface5
libnotificationmanager1
libkfontinstui5
libtaskmanager6
plasma-workspace
libcups2-dev
cups-bsd
cups-common
cups-core-drivers
cups-server-common
cups-client
libcupsimage2t64
libcupsimage2-dev
cups-ipp-utils
cups-ppdc
cups
libcups2t64
cups-daemon
libcups2-dev
cups-bsd
cups-common
cups-core-drivers
cups-server-common
cups-client
libcupsimage2t64
libcupsimage2-dev
cups-ipp-utils
cups-ppdc
cups
libcups2t64
cups-daemon
netplan.io
netplan-generator
libnetplan1
python3-netplan
libnetplan-dev
netplan.io
netplan-generator
libnetplan1
python3-netplan
libnetplan-dev
wget
libiso9660-dev
libiso9660-11t64
libcdio-utils
libcdio19t64
libiso9660++0t64
libudf-dev
libcdio++1t64
libiso9660++-dev
libudf0t64
libcdio++-dev
libcdio-dev
openssh-client
openssh-server
ssh-askpass-gnome
ssh
openssh-tests
openssh-sftp-server
openvpn
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
libreoffice-nlpsolver
libreoffice-wiki-publisher
fonts-opensymbol
libreoffice-evolution
libreoffice-help-en-gb
libreoffice-librelogo
libreoffice-l10n-ml
libreoffice-help-zh-cn
libreoffice-subsequentcheckbase
libreoffice-l10n-mk
libreoffice-help-id
libreoffice-l10n-mr
libreoffice-style-tango
libreoffice-help-pt-br
libreofficekit-data
libreoffice-core
libreoffice-help-it
libreoffice-l10n-uk
libreoffice-l10n-fr
libreoffice-gnome
libreoffice-l10n-fi
libreoffice-help-nl
libreoffice-uiconfig-math
libreoffice-l10n-uz
libreoffice
libreoffice-sdbc-mysql
libreoffice-l10n-nb
libreoffice-l10n-mn
libreoffice-l10n-ne
libreoffice-l10n-nl
libreoffice-uiconfig-writer
libreoffice-l10n-nn
libreoffice-help-fi
libreoffice-l10n-dz
libreoffice-l10n-nr
libreoffice-help-fr
libreoffice-report-builder-bin
libofficebean-java
libreoffice-qt6
libreoffice-l10n-vi
libreoffice-l10n-nso
libreoffice-qt5
libreoffice-nogui
libreoffice-math-nogui
libreoffice-style-karasa-jaga
libreoffice-l10n-ve
libreoffice-l10n-gu
libreoffice-help-om
libreoffice-l10n-gl
python3-access2base
libreoffice-help-en-us
libreoffice-l10n-ga
libuno-cppu3t64
liblibreofficekitgtk
libreoffice-l10n-gd
libreoffice-help-km
libreoffice-l10n-kn
libreoffice-help-ko
libreoffice-l10n-st
libreoffice-dev-common
libreoffice-l10n-sr
libreoffice-help-cs
libreoffice-l10n-ts
libreoffice-l10n-sv
libreoffice-script-provider-bsh
gir1.2-lokdocview-0.1
ure-java
libreoffice-report-builder-bin-nogui
libreoffice-l10n-ka
libreoffice-uiconfig-common
libridl-java
libreoffice-help-ca
libreoffice-l10n-zh-tw
libreoffice-l10n-sl
libreoffice-l10n-sk
libreoffice-style-breeze
libreoffice-l10n-si
libreoffice-l10n-da
libreofficekit-dev
libreoffice-l10n-de
libreoffice-common
libreoffice-help-pl
libreoffice-l10n-pa-in
libuno-purpenvhelpergcc3-3t64
libreoffice-uiconfig-report-builder
libreoffice-help-pt
libreoffice-base-nogui
libreoffice-gtk3
libreoffice-math
libreoffice-help-vi
libreoffice-gtk4
libreoffice-l10n-tr
libreoffice-help-hi
libreoffice-l10n-gug
libreoffice-sdbc-hsqldb
libreoffice-draw-nogui
libreoffice-calc
libreoffice-base-drivers
libreoffice-style-colibre
libreoffice-l10n-ta
libreoffice-sdbc-firebird
libreoffice-l10n-tg
libreoffice-l10n-te
libreoffice-l10n-th
libreoffice-l10n-id
libreoffice-l10n-lv
libreoffice-help-hu
libreoffice-l10n-lt
libreoffice-l10n-ss
libunoloader-java
libreoffice-uiconfig-impress
libreoffice-l10n-eu
libreoffice-l10n-et
libreoffice-script-provider-js
libreoffice-l10n-es
libreoffice-l10n-el
libreoffice-l10n-eo
libreoffice-style-sifr
libreoffice-l10n-zh-cn
libreoffice-l10n-ug
libreoffice-smoketest-data
libreoffice-l10n-ko
libreoffice-l10n-zu
libreoffice-impress
libreoffice-java-common
libreoffice-help-eu
libreoffice-help-et
libreoffice-help-es
libreoffice-l10n-km
libreoffice-uiconfig-draw
libreoffice-help-el
libreoffice-uiconfig-calc
libreoffice-l10n-kk
libreoffice-dev-gui
libreoffice-l10n-be
libreoffice-l10n-szl
libreoffice-l10n-bg
libreoffice-l10n-tn
libreoffice-l10n-bn
libreoffice-plasma
libreoffice-help-ja
libreoffice-l10n-br
libreoffice-l10n-bs
liblibreoffice-java
libunoil-java
libreoffice-style-yaru
libreoffice-base-core
libreoffice-help-ru
libreoffice-l10n-ru
libreoffice-l10n-rw
libreoffice-l10n-is
libreoffice-style-elementary
python3-uno
libreoffice-l10n-fa
libreoffice-l10n-am
libreoffice-l10n-ro
libreoffice-l10n-en-za
libreoffice-style-sukapura
libreoffice-l10n-ca
libreoffice-help-sl
libreoffice-calc-nogui
libreoffice-help-sk
libreoffice-help-sv
libreoffice-l10n-cs
python3-scriptforge
libreoffice-dev-doc
libreoffice-help-common
libreoffice-l10n-za
libreoffice-l10n-cy
libreoffice-l10n-oc
libjurt-java
libreoffice-base
libreoffice-help-gl
libreoffice-l10n-om
libreoffice-l10n-or
libreoffice-l10n-pt-br
libreoffice-l10n-kmr
uno-libs-private
libreoffice-l10n-ast
libreoffice-l10n-hu
libreoffice-l10n-hr
libreoffice-script-provider-python
libreoffice-writer-nogui
libreoffice-l10n-hy
libreoffice-l10n-he
libreoffice-officebean
libreoffice-dev
libreoffice-report-builder
libuno-sal3t64
libreoffice-help-tr
libreoffice-l10n-hi
libreoffice-kf5
libreoffice-help-dz
libreoffice-l10n-pt
libreoffice-l10n-ja
libreoffice-l10n-pl
libreoffice-sdbc-postgresql
libreoffice-writer
libreoffice-help-de
libreoffice-help-da
libreoffice-uiconfig-base
ure
libreoffice-impress-nogui
libjuh-java
libreoffice-l10n-it
libreoffice-l10n-xh
libreoffice-l10n-af
libuno-cppuhelpergcc3-3t64
libreoffice-help-zh-tw
libreoffice-l10n-en-gb
libreoffice-draw
libuno-salhelpergcc3-3t64
libreoffice-core-nogui
libreoffice-l10n-as
libreoffice-l10n-ar
libreoffice-l10n-in
0:
libvirtodbc0
libvirtuoso5.5-cil
virtuoso-minimal
virtuoso-opensource
virtuoso-opensource-7
virtuoso-opensource-7-bin
virtuoso-opensource-7-common
virtuoso-server
virtuoso-vad-bpel
virtuoso-vad-conductor
virtuoso-vad-demo
virtuoso-vad-doc
virtuoso-vad-isparql
virtuoso-vad-ods
virtuoso-vad-rdfmappers
virtuoso-vad-sparqldemo
virtuoso-vad-syncml
virtuoso-vad-tutorial
virtuoso-vsp-startpage
cinder-api
cinder-backup
cinder-common
cinder-scheduler
cinder-volume
python3-cinder
glance
glance-api
glance-common
python-glance-doc
python3-glance
nova-ajax-console-proxy
nova-api
nova-api-metadata
nova-api-os-compute
nova-api-os-volume
nova-cells
nova-common
nova-compute
nova-compute-ironic
nova-compute-kvm
nova-compute-libvirt
nova-compute-lxc
nova-compute-qemu
nova-compute-vmware
nova-compute-xen
nova-conductor
nova-doc
nova-novncproxy
nova-scheduler
nova-serialproxy
nova-spiceproxy
nova-volume
python3-nova
apache2
apache2-bin
apache2-data
apache2-dev
apache2-doc
apache2-ssl-dev
apache2-suexec-custom
apache2-suexec-pristine
apache2-utils
libapache2-mod-md
libapache2-mod-proxy-uwsgi
apache2
apache2-bin
apache2-data
apache2-dev
apache2-doc
apache2-ssl-dev
apache2-suexec-custom
apache2-suexec-pristine
apache2-utils
libapache2-mod-md
libapache2-mod-proxy-uwsgi
golang-1.21
golang-1.21-doc
golang-1.21-go
golang-1.21-src
golang-1.22
golang-1.22-doc
golang-1.22-go
golang-1.22-src
openssh-client
openssh-server
openssh-sftp-server
openssh-tests
ssh
ssh-askpass-gnome
python-django-doc
python3-django
dotnet-sdk-8.0
dotnet-sdk-8.0-source-built-artifacts
dotnet-sdk-dbg-8.0
dotnet-templates-8.0
netstandard-targeting-pack-2.1-8.0
dotnet8
aspnetcore-runtime-8.0
aspnetcore-runtime-dbg-8.0
aspnetcore-targeting-pack-8.0
dotnet-apphost-pack-8.0
dotnet-host-8.0
dotnet-hostfxr-8.0
dotnet-runtime-8.0
dotnet-runtime-dbg-8.0
dotnet-targeting-pack-8.0
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
ghostscript
ghostscript-doc
libgs-common
libgs-dev
libgs10
libgs10-common
gir1.2-gtk-2.0
gtk2-engines-pixbuf
libgail-common
libgail-dev
libgail-doc
libgail18t64
libgtk2.0-0t64
libgtk2.0-bin
libgtk2.0-common
libgtk2.0-dev
libgtk2.0-doc
gir1.2-gtk-3.0
gtk-3-examples
gtk-update-icon-cache
libgail-3-0t64
libgail-3-dev
libgail-3-doc
libgtk-3-0t64
libgtk-3-bin
libgtk-3-common
libgtk-3-dev
libgtk-3-doc
apache2
apache2-bin
apache2-data
apache2-dev
apache2-doc
apache2-ssl-dev
apache2-suexec-custom
apache2-suexec-pristine
apache2-utils
libapache2-mod-md
libapache2-mod-proxy-uwsgi
python-pymongo-doc
python3-bson
python3-bson-ext
python3-gridfs
python3-pymongo
python3-pymongo-ext
python3-zipp
squid
squid-cgi
squid-common
squid-openssl
squid-purge
squidclient
bind9
bind9-dev
bind9-dnsutils
bind9-doc
bind9-host
bind9-libs
bind9-utils
bind9utils
dnsutils
nova-ajax-console-proxy
nova-api
nova-api-metadata
nova-api-os-compute
nova-api-os-volume
nova-cells
nova-common
nova-compute
nova-compute-ironic
nova-compute-kvm
nova-compute-libvirt
nova-compute-lxc
nova-compute-qemu
nova-compute-vmware
nova-compute-xen
nova-conductor
nova-doc
nova-novncproxy
nova-scheduler
nova-serialproxy
nova-spiceproxy
nova-volume
python3-nova
provd
gir1.2-poppler-0.18
libpoppler-cpp-dev
libpoppler-cpp0t64
libpoppler-dev
libpoppler-glib-dev
libpoppler-glib-doc
libpoppler-glib8t64
libpoppler-private-dev
libpoppler-qt5-1t64
libpoppler-qt5-dev
libpoppler-qt6-3t64
libpoppler-qt6-dev
libpoppler134
poppler-utils
0:
0:
0:
0:
0:
0:
0:
0:
0:
openjdk-8-demo
openjdk-8-doc
openjdk-8-jdk
openjdk-8-jdk-headless
openjdk-8-jre
openjdk-8-jre-headless
openjdk-8-jre-zero
openjdk-8-source
openjdk-11-demo
openjdk-11-doc
openjdk-11-jdk
openjdk-11-jdk-headless
openjdk-11-jre
openjdk-11-jre-headless
openjdk-11-jre-zero
openjdk-11-source
openjdk-17-demo
openjdk-17-doc
openjdk-17-jdk
openjdk-17-jdk-headless
openjdk-17-jre
openjdk-17-jre-headless
openjdk-17-jre-zero
openjdk-17-source
openjdk-21-demo
openjdk-21-doc
openjdk-21-jdk
openjdk-21-jdk-headless
openjdk-21-jre
openjdk-21-jre-headless
openjdk-21-jre-zero
openjdk-21-source
openjdk-21-testsupport
libmysqlclient-dev
libmysqlclient21
mysql-client
mysql-client-8.0
mysql-client-core-8.0
mysql-router
mysql-server
mysql-server-8.0
mysql-server-core-8.0
mysql-source-8.0
mysql-testsuite
mysql-testsuite-8.0
libssl-dev
libssl-doc
libssl3t64
openssl
exim4
exim4-base
exim4-config
exim4-daemon-heavy
exim4-daemon-light
exim4-dev
eximon4
golang-github-snapcore-snapd-dev
golang-github-ubuntu-core-snappy-dev
snap-confine
snapd
snapd-xdg-open
ubuntu-core-launcher
ubuntu-core-snapd-units
ubuntu-snappy
ubuntu-snappy-cli
idle-python3.12
libpython3.12-dev
libpython3.12-minimal
libpython3.12-stdlib
libpython3.12-testsuite
libpython3.12t64
python3.12
python3.12-dev
python3.12-doc
python3.12-examples
python3.12-full
python3.12-minimal
python3.12-nopie
python3.12-venv
gross
curl
libcurl3t64-gnutls
libcurl4-doc
libcurl4-gnutls-dev
libcurl4-openssl-dev
libcurl4t64
eapoltest
hostapd
libwpa-client-dev
wpagui
wpasupplicant
python-django-doc
python3-django
krb5-admin-server
krb5-doc
krb5-gss-samples
krb5-k5tls
krb5-kdc
krb5-kdc-ldap
krb5-kpropd
krb5-locales
krb5-multidev
krb5-otp
krb5-pkinit
krb5-user
libgssapi-krb5-2
libgssrpc4t64
libk5crypto3
libkadm5clnt-mit12
libkadm5srv-mit12
libkdb5-10t64
libkrad-dev
libkrad0
libkrb5-3
libkrb5-dev
libkrb5support0
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
dotnet-sdk-8.0
dotnet-sdk-8.0-source-built-artifacts
dotnet-sdk-dbg-8.0
dotnet-templates-8.0
netstandard-targeting-pack-2.1-8.0
dotnet8
aspnetcore-runtime-8.0
aspnetcore-runtime-dbg-8.0
aspnetcore-targeting-pack-8.0
dotnet-apphost-pack-8.0
dotnet-host-8.0
dotnet-hostfxr-8.0
dotnet-runtime-8.0
dotnet-runtime-dbg-8.0
dotnet-targeting-pack-8.0
busybox
busybox-initramfs
busybox-static
busybox-syslogd
udhcpc
udhcpd
libreoffice-nlpsolver
libreoffice-wiki-publisher
fonts-opensymbol
gir1.2-lokdocview-0.1
libjuh-java
libjurt-java
liblibreoffice-java
liblibreofficekitgtk
libofficebean-java
libreoffice
libreoffice-base
libreoffice-base-core
libreoffice-base-drivers
libreoffice-base-nogui
libreoffice-calc
libreoffice-calc-nogui
libreoffice-common
libreoffice-core
libreoffice-core-nogui
libreoffice-dev
libreoffice-dev-common
libreoffice-dev-doc
libreoffice-dev-gui
libreoffice-draw
libreoffice-draw-nogui
libreoffice-evolution
libreoffice-gnome
libreoffice-gtk3
libreoffice-gtk4
libreoffice-help-ca
libreoffice-help-common
libreoffice-help-cs
libreoffice-help-da
libreoffice-help-de
libreoffice-help-dz
libreoffice-help-el
libreoffice-help-en-gb
libreoffice-help-en-us
libreoffice-help-es
libreoffice-help-et
libreoffice-help-eu
libreoffice-help-fi
libreoffice-help-fr
libreoffice-help-gl
libreoffice-help-hi
libreoffice-help-hu
libreoffice-help-id
libreoffice-help-it
libreoffice-help-ja
libreoffice-help-km
libreoffice-help-ko
libreoffice-help-nl
libreoffice-help-om
libreoffice-help-pl
libreoffice-help-pt
libreoffice-help-pt-br
libreoffice-help-ru
libreoffice-help-sk
libreoffice-help-sl
libreoffice-help-sv
libreoffice-help-tr
libreoffice-help-vi
libreoffice-help-zh-cn
libreoffice-help-zh-tw
libreoffice-impress
libreoffice-impress-nogui
libreoffice-java-common
libreoffice-kf5
libreoffice-l10n-af
libreoffice-l10n-am
libreoffice-l10n-ar
libreoffice-l10n-as
libreoffice-l10n-ast
libreoffice-l10n-be
libreoffice-l10n-bg
libreoffice-l10n-bn
libreoffice-l10n-br
libreoffice-l10n-bs
libreoffice-l10n-ca
libreoffice-l10n-cs
libreoffice-l10n-cy
libreoffice-l10n-da
libreoffice-l10n-de
libreoffice-l10n-dz
libreoffice-l10n-el
libreoffice-l10n-en-gb
libreoffice-l10n-en-za
libreoffice-l10n-eo
libreoffice-l10n-es
libreoffice-l10n-et
libreoffice-l10n-eu
libreoffice-l10n-fa
libreoffice-l10n-fi
libreoffice-l10n-fr
libreoffice-l10n-ga
libreoffice-l10n-gd
libreoffice-l10n-gl
libreoffice-l10n-gu
libreoffice-l10n-gug
libreoffice-l10n-he
libreoffice-l10n-hi
libreoffice-l10n-hr
libreoffice-l10n-hu
libreoffice-l10n-hy
libreoffice-l10n-id
libreoffice-l10n-in
libreoffice-l10n-is
libreoffice-l10n-it
libreoffice-l10n-ja
libreoffice-l10n-ka
libreoffice-l10n-kk
libreoffice-l10n-km
libreoffice-l10n-kmr
libreoffice-l10n-kn
libreoffice-l10n-ko
libreoffice-l10n-lt
libreoffice-l10n-lv
libreoffice-l10n-mk
libreoffice-l10n-ml
libreoffice-l10n-mn
libreoffice-l10n-mr
libreoffice-l10n-nb
libreoffice-l10n-ne
libreoffice-l10n-nl
libreoffice-l10n-nn
libreoffice-l10n-nr
libreoffice-l10n-nso
libreoffice-l10n-oc
libreoffice-l10n-om
libreoffice-l10n-or
libreoffice-l10n-pa-in
libreoffice-l10n-pl
libreoffice-l10n-pt
libreoffice-l10n-pt-br
libreoffice-l10n-ro
libreoffice-l10n-ru
libreoffice-l10n-rw
libreoffice-l10n-si
libreoffice-l10n-sk
libreoffice-l10n-sl
libreoffice-l10n-sr
libreoffice-l10n-ss
libreoffice-l10n-st
libreoffice-l10n-sv
libreoffice-l10n-szl
libreoffice-l10n-ta
libreoffice-l10n-te
libreoffice-l10n-tg
libreoffice-l10n-th
libreoffice-l10n-tn
libreoffice-l10n-tr
libreoffice-l10n-ts
libreoffice-l10n-ug
libreoffice-l10n-uk
libreoffice-l10n-uz
libreoffice-l10n-ve
libreoffice-l10n-vi
libreoffice-l10n-xh
libreoffice-l10n-za
libreoffice-l10n-zh-cn
libreoffice-l10n-zh-tw
libreoffice-l10n-zu
libreoffice-librelogo
libreoffice-math
libreoffice-math-nogui
libreoffice-nogui
libreoffice-officebean
libreoffice-plasma
libreoffice-qt5
libreoffice-qt6
libreoffice-report-builder
libreoffice-report-builder-bin
libreoffice-report-builder-bin-nogui
libreoffice-script-provider-bsh
libreoffice-script-provider-js
libreoffice-script-provider-python
libreoffice-sdbc-firebird
libreoffice-sdbc-hsqldb
libreoffice-sdbc-mysql
libreoffice-sdbc-postgresql
libreoffice-smoketest-data
libreoffice-style-breeze
libreoffice-style-colibre
libreoffice-style-elementary
libreoffice-style-karasa-jaga
libreoffice-style-sifr
libreoffice-style-sukapura
libreoffice-style-tango
libreoffice-style-yaru
libreoffice-subsequentcheckbase
libreoffice-uiconfig-base
libreoffice-uiconfig-calc
libreoffice-uiconfig-common
libreoffice-uiconfig-draw
libreoffice-uiconfig-impress
libreoffice-uiconfig-math
libreoffice-uiconfig-report-builder
libreoffice-uiconfig-writer
libreoffice-writer
libreoffice-writer-nogui
libreofficekit-data
libreofficekit-dev
libridl-java
libuno-cppu3t64
libuno-cppuhelpergcc3-3t64
libuno-purpenvhelpergcc3-3t64
libuno-sal3t64
libuno-salhelpergcc3-3t64
libunoil-java
libunoloader-java
python3-access2base
python3-scriptforge
python3-uno
uno-libs-private
ure
ure-java
gnome-shell
gnome-shell-common
gnome-shell-extension-prefs
liborc-0.4-0t64
liborc-0.4-dev
liborc-0.4-dev-bin
liborc-0.4-doc
intel-microcode
libecpg-compat3
libecpg-dev
libecpg6
libpgtypes3
libpq-dev
libpq5
postgresql-16
postgresql-client-16
postgresql-doc-16
postgresql-plperl-16
postgresql-plpython3-16
postgresql-pltcl-16
postgresql-server-dev-16
cacti
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
qemu-block-extra
qemu-block-supplemental
qemu-guest-agent
qemu-system
qemu-system-arm
qemu-system-common
qemu-system-data
qemu-system-gui
qemu-system-mips
qemu-system-misc
qemu-system-modules-opengl
qemu-system-modules-spice
qemu-system-ppc
qemu-system-s390x
qemu-system-sparc
qemu-system-x86
qemu-system-x86-xen
qemu-system-xen
qemu-user
qemu-user-binfmt
qemu-user-static
qemu-utils
dovecot-auth-lua
dovecot-core
dovecot-dev
dovecot-gssapi
dovecot-imapd
dovecot-ldap
dovecot-lmtpd
dovecot-managesieved
dovecot-mysql
dovecot-pgsql
dovecot-pop3d
dovecot-sieve
dovecot-solr
dovecot-sqlite
dovecot-submissiond
ffmpeg
ffmpeg-doc
libavcodec-dev
libavcodec-extra
libavcodec-extra60
libavcodec60
libavdevice-dev
libavdevice60
libavfilter-dev
libavfilter-extra
libavfilter-extra9
libavfilter9
libavformat-dev
libavformat-extra
libavformat-extra60
libavformat60
libavutil-dev
libavutil58
libpostproc-dev
libpostproc57
libswresample-dev
libswresample4
libswscale-dev
libswscale7
python-webob-doc
python3-webob
libssl-dev
libssl-doc
libssl3t64
openssl
python-django-doc
python3-django
python3-twisted
twisted-doc
ironic-api
ironic-common
ironic-conductor
python3-ironic
znc-backlog
znc-push
znc
znc-dev
znc-perl
znc-python
znc-tcl
python-aiohttp-doc
python3-aiohttp
vim
vim-athena
vim-common
vim-doc
vim-gtk3
vim-gui-common
vim-motif
vim-nox
vim-runtime
vim-tiny
xxd
gir1.2-javascriptcoregtk-4.1
gir1.2-javascriptcoregtk-6.0
gir1.2-webkit-6.0
gir1.2-webkit2-4.1
libjavascriptcoregtk-4.0-bin
libjavascriptcoregtk-4.1-0
libjavascriptcoregtk-4.1-dev
libjavascriptcoregtk-6.0-1
libjavascriptcoregtk-6.0-dev
libjavascriptcoregtk-bin
libwebkit2gtk-4.0-doc
libwebkit2gtk-4.1-0
libwebkit2gtk-4.1-dev
libwebkitgtk-6.0-4
libwebkitgtk-6.0-dev
libwebkitgtk-doc
webkit2gtk-driver
libtiff-dev
libtiff-doc
libtiff-opengl
libtiff-tools
libtiff5-dev
libtiff6
libtiffxx6
libunbound-dev
libunbound8
python3-unbound
unbound
unbound-anchor
unbound-host
0:
0:
0:
0:
0:
0:
0:
expat
libexpat1
libexpat1-dev
libxmltok1-dev
libxmltok1t64
python-setuptools-doc
python3-pkg-resources
python3-setuptools
python3-setuptools-whl
0:
0:
0:
dcmtk
dcmtk-doc
libdcmtk-dev
libdcmtk17t64
clamav
clamav-base
clamav-daemon
clamav-docs
clamav-freshclam
clamav-milter
clamav-testfiles
clamdscan
libclamav-dev
libclamav11t64
curl
libcurl3t64-gnutls
libcurl4-doc
libcurl4-gnutls-dev
libcurl4-openssl-dev
libcurl4t64
libnginx-mod-http-geoip
libnginx-mod-http-image-filter
libnginx-mod-http-perl
libnginx-mod-http-xslt-filter
libnginx-mod-mail
libnginx-mod-stream
libnginx-mod-stream-geoip
nginx
nginx-common
nginx-core
nginx-dev
nginx-doc
nginx-extras
nginx-full
nginx-light
idle-python3.12
libpython3.12-dev
libpython3.12-minimal
libpython3.12-stdlib
libpython3.12-testsuite
libpython3.12t64
python3.12
python3.12-dev
python3.12-doc
python3.12-examples
python3.12-full
python3.12-minimal
python3.12-nopie
python3.12-venv
frr
frr-doc
frr-pythontools
frr-rpki-rtrlib
frr-snmp
0:
0:
0:
0:
0:
0:
0:
0:
0:
0:
emacs
emacs-bin-common
emacs-common
emacs-el
emacs-gtk
emacs-lucid
emacs-nox
emacs-pgtk
puma
libtomcat9-java
intel-microcode
libopenjp2-7
libopenjp2-7-dev
libopenjp2-tools
libopenjpip-dec-server
libopenjpip-server
libopenjpip-viewer
libopenjpip7
openjpeg-doc
libapr1-dev
libapr1t64
cups
cups-bsd
cups-client
cups-common
cups-core-drivers
cups-daemon
cups-ipp-utils
cups-ppdc
cups-server-common
libcups2-dev
libcups2t64
libcupsimage2-dev
libcupsimage2t64
cups-browsed
cups-browsed-tests
libcupsfilters-dev
libcupsfilters-tests
libcupsfilters2-common
libcupsfilters2t64
libppd-dev
libppd-tests
libppd-utils
libppd2
libppd2-common
ppdc
lkp_Ubuntu_6_8_0[_|\d]+_aws_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_gcp_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_linux_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_ibm_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_aws_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_azure_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_gcp_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_linux_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_ibm_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_aws_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_azure_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_gcp_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_linux_(\d+)
lkp_Ubuntu_6_8_0[_|\d]+_ibm_(\d+)