Canonical USN OVAL Generator 1 5.11.1 2024-05-04T09:24:46 Copyright (C) 2024 Canonical LTD. All rights reserved. This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, version 3 of the License. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License version 3 for more details. You should have received a copy of the GNU General Public License version 3 along with this program. If not, see http://www.gnu.org/licenses/. USN-6374-2 -- Mutt vulnerabilities Ubuntu 23.10 USN-6374-1 fixed vulnerabilities in Mutt. This update provides the corresponding updates for Ubuntu 23.10. Original advisory details: It was discovered that Mutt incorrectly handled certain email header contents. If a user were tricked into opening a specially crafted message, a remote attacker could possibly use this issue to cause a denial of service. (CVE-2023-4874, CVE-2023-4875) Update Instructions: Run `sudo pro fix USN-6374-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: mutt - 2.2.9-1ubuntu0.23.10.1 No subscription required Medium CVE-2023-4874 CVE-2023-4875 USN-6402-2 -- LibTomMath vulnerability Ubuntu 23.10 USN-6402-1 fixed vulnerabilities in LibTomMath. This update provides the corresponding updates for Ubuntu 23.10. Original advisory details: It was discovered that LibTomMath incorrectly handled certain inputs. An attacker could possibly use this issue to execute arbitrary code and cause a denial of service (DoS). Update Instructions: Run `sudo pro fix USN-6402-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libtommath-dev - 1.2.0-6ubuntu0.23.10.1 libtommath-doc - 1.2.0-6ubuntu0.23.10.1 libtommath1 - 1.2.0-6ubuntu0.23.10.1 No subscription required Medium CVE-2023-36328 USN-6422-2 -- Ring vulnerabilities Ubuntu 23.10 It was discovered that Ring incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to execute arbitrary code. (CVE-2021-37706) It was discovered that Ring incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. (CVE-2023-27585) Original advisory details: It was discovered that Ring incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to execute arbitrary code. (CVE-2021-37706) It was discovered that Ring incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2021-43299, CVE-2021-43300, CVE-2021-43301, CVE-2021-43302, CVE-2021-43303, CVE-2021-43804, CVE-2021-43845, CVE-2022-21723, CVE-2022-23537, CVE-2022-23547, CVE-2022-23608, CVE-2022-24754, CVE-2022-24763, CVE-2022-24764, CVE-2022-24793, CVE-2022-31031, CVE-2022-39244) It was discovered that Ring incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 20.04 LTS. (CVE-2022-21722) It was discovered that Ring incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. (CVE-2023-27585) Update Instructions: Run `sudo pro fix USN-6422-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: jami - 20230206.0~ds2-1.3ubuntu0.1 jami-daemon - 20230206.0~ds2-1.3ubuntu0.1 No subscription required Medium CVE-2021-37706 CVE-2023-27585 USN-6423-2 -- CUE vulnerability Ubuntu 23.10 USN-6423-1 fixed a vulnerability in CUE. This update provides the corresponding updates for Ubuntu 23.10. Original advisory details: It was discovered that CUE incorrectly handled certain files. An attacker could possibly use this issue to expose sensitive information or execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6423-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libcue-dev - 2.2.1-4ubuntu1 libcue2 - 2.2.1-4ubuntu1 No subscription required Medium CVE-2023-43641 USN-6425-3 -- Samba vulnerabilities Ubuntu 23.10 USN-6425-1 fixed vulnerabilities in Samba. This update provides the corresponding updates for Ubuntu 23.10. Original advisory details: Sri Nagasubramanian discovered that the Samba acl_xattr VFS module incorrectly handled read-only files. When Samba is configured to ignore system ACLs, a remote attacker could possibly use this issue to truncate read-only files. (CVE-2023-4091) Andrew Bartlett discovered that Samba incorrectly handled the DirSync control. A remote attacker with an RODC DC account could possibly use this issue to obtain all domain secrets. (CVE-2023-4154) Andrew Bartlett discovered that Samba incorrectly handled the rpcecho development server. A remote attacker could possibly use this issue to cause Samba to stop responding, resulting in a denial of service. (CVE-2023-42669) Kirin van der Veer discovered that Samba incorrectly handled certain RPC service listeners. A remote attacker could possibly use this issue to cause Samba to start multiple incompatible RPC listeners, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS, and Ubuntu 23.04. (CVE-2023-42670) Update Instructions: Run `sudo pro fix USN-6425-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ldb-tools - 2:2.7.2+samba4.18.6+dfsg-1ubuntu2.1 libldb-dev - 2:2.7.2+samba4.18.6+dfsg-1ubuntu2.1 libldb2 - 2:2.7.2+samba4.18.6+dfsg-1ubuntu2.1 python3-ldb - 2:2.7.2+samba4.18.6+dfsg-1ubuntu2.1 python3-ldb-dev - 2:2.7.2+samba4.18.6+dfsg-1ubuntu2.1 No subscription required ctdb - 2:4.18.6+dfsg-1ubuntu2.1 libnss-winbind - 2:4.18.6+dfsg-1ubuntu2.1 libpam-winbind - 2:4.18.6+dfsg-1ubuntu2.1 libsmbclient - 2:4.18.6+dfsg-1ubuntu2.1 libsmbclient-dev - 2:4.18.6+dfsg-1ubuntu2.1 libwbclient-dev - 2:4.18.6+dfsg-1ubuntu2.1 libwbclient0 - 2:4.18.6+dfsg-1ubuntu2.1 python3-samba - 2:4.18.6+dfsg-1ubuntu2.1 registry-tools - 2:4.18.6+dfsg-1ubuntu2.1 samba - 2:4.18.6+dfsg-1ubuntu2.1 samba-ad-dc - 2:4.18.6+dfsg-1ubuntu2.1 samba-ad-provision - 2:4.18.6+dfsg-1ubuntu2.1 samba-common - 2:4.18.6+dfsg-1ubuntu2.1 samba-common-bin - 2:4.18.6+dfsg-1ubuntu2.1 samba-dev - 2:4.18.6+dfsg-1ubuntu2.1 samba-dsdb-modules - 2:4.18.6+dfsg-1ubuntu2.1 samba-libs - 2:4.18.6+dfsg-1ubuntu2.1 samba-testsuite - 2:4.18.6+dfsg-1ubuntu2.1 samba-vfs-modules - 2:4.18.6+dfsg-1ubuntu2.1 smbclient - 2:4.18.6+dfsg-1ubuntu2.1 winbind - 2:4.18.6+dfsg-1ubuntu2.1 No subscription required Medium CVE-2023-4091 CVE-2023-4154 CVE-2023-42669 CVE-2023-42670 USN-6427-2 -- .NET vulnerability Ubuntu 23.10 USN-6427-1 fixed a vulnerability in .NET. This update provides the corresponding update for .NET 8. Original advisory details: It was discovered that the .NET Kestrel web server did not properly handle HTTP/2 requests. A remote attacker could possibly use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-6427-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: aspnetcore-runtime-8.0 - 8.0.0~rc2-0ubuntu1 aspnetcore-targeting-pack-8.0 - 8.0.0~rc2-0ubuntu1 dotnet-apphost-pack-8.0 - 8.0.0~rc2-0ubuntu1 dotnet-host-8.0 - 8.0.0~rc2-0ubuntu1 dotnet-hostfxr-8.0 - 8.0.0~rc2-0ubuntu1 dotnet-runtime-8.0 - 8.0.0~rc2-0ubuntu1 dotnet-targeting-pack-8.0 - 8.0.0~rc2-0ubuntu1 No subscription required dotnet8 - 8.0.100-8.0.0~rc2-0ubuntu1 No subscription required dotnet-sdk-8.0 - 8.0.100~rc2-0ubuntu1 dotnet-sdk-8.0-source-built-artifacts - 8.0.100~rc2-0ubuntu1 dotnet-templates-8.0 - 8.0.100~rc2-0ubuntu1 netstandard-targeting-pack-2.1-8.0 - 8.0.100~rc2-0ubuntu1 No subscription required Medium CVE-2023-44487 USN-6429-3 -- curl vulnerabilities Ubuntu 23.10 USN-6429-1 fixed vulnerabilities in curl. This update provides the corresponding updates for Ubuntu 23.10. Original advisory details: Jay Satiro discovered that curl incorrectly handled hostnames when using a SOCKS5 proxy. In environments where curl is configured to use a SOCKS5 proxy, a remote attacker could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu 22.04 LTS, and Ubuntu 23.04. (CVE-2023-38545) It was discovered that curl incorrectly handled cookies when an application duplicated certain handles. A local attacker could possibly create a cookie file and inject arbitrary cookies into subsequent connections. (CVE-2023-38546) Update Instructions: Run `sudo pro fix USN-6429-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: curl - 8.2.1-1ubuntu3.1 libcurl3-gnutls - 8.2.1-1ubuntu3.1 libcurl3-nss - 8.2.1-1ubuntu3.1 libcurl4 - 8.2.1-1ubuntu3.1 libcurl4-doc - 8.2.1-1ubuntu3.1 libcurl4-gnutls-dev - 8.2.1-1ubuntu3.1 libcurl4-nss-dev - 8.2.1-1ubuntu3.1 libcurl4-openssl-dev - 8.2.1-1ubuntu3.1 No subscription required High CVE-2023-38545 CVE-2023-38546 USN-6433-1 -- Ghostscript vulnerability Ubuntu 23.10 It was discovered that Ghostscript incorrectly handled certain PDF documents. If a user or automated system were tricked into opening a specially crafted PDF file, a remote attacker could use this issue to execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6433-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ghostscript - 10.01.2~dfsg1-0ubuntu2.1 ghostscript-doc - 10.01.2~dfsg1-0ubuntu2.1 ghostscript-x - 10.01.2~dfsg1-0ubuntu2.1 libgs-common - 10.01.2~dfsg1-0ubuntu2.1 libgs-dev - 10.01.2~dfsg1-0ubuntu2.1 libgs10 - 10.01.2~dfsg1-0ubuntu2.1 libgs10-common - 10.01.2~dfsg1-0ubuntu2.1 libgs9-common - 10.01.2~dfsg1-0ubuntu2.1 No subscription required Medium CVE-2023-43115 USN-6438-1 -- .NET vulnerabilities Ubuntu 23.10 Kevin Jones discovered that .NET did not properly process certain X.509 certificates. An attacker could possibly use this issue to cause a denial of service. (CVE-2023-36799) It was discovered that the .NET Kestrel web server did not properly handle HTTP/2 requests. A remote attacker could possibly use this issue to cause a denial of service. (CVE-2023-44487) Update Instructions: Run `sudo pro fix USN-6438-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: aspnetcore-runtime-6.0 - 6.0.123-0ubuntu1 aspnetcore-targeting-pack-6.0 - 6.0.123-0ubuntu1 dotnet-apphost-pack-6.0 - 6.0.123-0ubuntu1 dotnet-host - 6.0.123-0ubuntu1 dotnet-hostfxr-6.0 - 6.0.123-0ubuntu1 dotnet-runtime-6.0 - 6.0.123-0ubuntu1 dotnet-sdk-6.0 - 6.0.123-0ubuntu1 dotnet-sdk-6.0-source-built-artifacts - 6.0.123-0ubuntu1 dotnet-targeting-pack-6.0 - 6.0.123-0ubuntu1 dotnet-templates-6.0 - 6.0.123-0ubuntu1 dotnet6 - 6.0.123-0ubuntu1 netstandard-targeting-pack-2.1 - 6.0.123-0ubuntu1 No subscription required aspnetcore-runtime-7.0 - 7.0.112-0ubuntu1 aspnetcore-targeting-pack-7.0 - 7.0.112-0ubuntu1 dotnet-apphost-pack-7.0 - 7.0.112-0ubuntu1 dotnet-host-7.0 - 7.0.112-0ubuntu1 dotnet-hostfxr-7.0 - 7.0.112-0ubuntu1 dotnet-runtime-7.0 - 7.0.112-0ubuntu1 dotnet-sdk-7.0 - 7.0.112-0ubuntu1 dotnet-sdk-7.0-source-built-artifacts - 7.0.112-0ubuntu1 dotnet-targeting-pack-7.0 - 7.0.112-0ubuntu1 dotnet-templates-7.0 - 7.0.112-0ubuntu1 dotnet7 - 7.0.112-0ubuntu1 netstandard-targeting-pack-2.1-7.0 - 7.0.112-0ubuntu1 No subscription required Medium CVE-2023-36799 CVE-2023-44487 USN-6438-2 -- .Net regressions Ubuntu 23.10 USN-6438-1 fixed vulnerabilities in .Net. It was discovered that the fix for [CVE-2023-36799](https://ubuntu.com/security/CVE-2023-36799) was incomplete. This update fixes the problem. Original advisory details: Kevin Jones discovered that .NET did not properly process certain X.509 certificates. An attacker could possibly use this issue to cause a denial of service. (CVE-2023-36799) It was discovered that the .NET Kestrel web server did not properly handle HTTP/2 requests. A remote attacker could possibly use this issue to cause a denial of service. (CVE-2023-44487) Update Instructions: Run `sudo pro fix USN-6438-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: aspnetcore-runtime-6.0 - 6.0.124-0ubuntu1~23.10.1 aspnetcore-targeting-pack-6.0 - 6.0.124-0ubuntu1~23.10.1 dotnet-apphost-pack-6.0 - 6.0.124-0ubuntu1~23.10.1 dotnet-host - 6.0.124-0ubuntu1~23.10.1 dotnet-hostfxr-6.0 - 6.0.124-0ubuntu1~23.10.1 dotnet-runtime-6.0 - 6.0.124-0ubuntu1~23.10.1 dotnet-sdk-6.0 - 6.0.124-0ubuntu1~23.10.1 dotnet-sdk-6.0-source-built-artifacts - 6.0.124-0ubuntu1~23.10.1 dotnet-targeting-pack-6.0 - 6.0.124-0ubuntu1~23.10.1 dotnet-templates-6.0 - 6.0.124-0ubuntu1~23.10.1 dotnet6 - 6.0.124-0ubuntu1~23.10.1 netstandard-targeting-pack-2.1 - 6.0.124-0ubuntu1~23.10.1 No subscription required aspnetcore-runtime-7.0 - 7.0.113-0ubuntu1~23.10.1 aspnetcore-targeting-pack-7.0 - 7.0.113-0ubuntu1~23.10.1 dotnet-apphost-pack-7.0 - 7.0.113-0ubuntu1~23.10.1 dotnet-host-7.0 - 7.0.113-0ubuntu1~23.10.1 dotnet-hostfxr-7.0 - 7.0.113-0ubuntu1~23.10.1 dotnet-runtime-7.0 - 7.0.113-0ubuntu1~23.10.1 dotnet-sdk-7.0 - 7.0.113-0ubuntu1~23.10.1 dotnet-sdk-7.0-source-built-artifacts - 7.0.113-0ubuntu1~23.10.1 dotnet-targeting-pack-7.0 - 7.0.113-0ubuntu1~23.10.1 dotnet-templates-7.0 - 7.0.113-0ubuntu1~23.10.1 dotnet7 - 7.0.113-0ubuntu1~23.10.1 netstandard-targeting-pack-2.1-7.0 - 7.0.113-0ubuntu1~23.10.1 No subscription required Medium CVE-2023-36799 https://launchpad.net/bugs/2040207 https://launchpad.net/bugs/2040208 USN-6448-1 -- Sofia-SIP vulnerability Ubuntu 23.10 Xu Biang discovered that Sofia-SIP did not properly manage memory when handling STUN packets. An attacker could use this issue to cause Sofia-SIP to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6448-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libsofia-sip-ua-dev - 1.12.11+20110422.1+1e14eea~dfsg-4ubuntu1.23.10.1 libsofia-sip-ua-glib-dev - 1.12.11+20110422.1+1e14eea~dfsg-4ubuntu1.23.10.1 libsofia-sip-ua-glib3 - 1.12.11+20110422.1+1e14eea~dfsg-4ubuntu1.23.10.1 libsofia-sip-ua0 - 1.12.11+20110422.1+1e14eea~dfsg-4ubuntu1.23.10.1 sofia-sip-bin - 1.12.11+20110422.1+1e14eea~dfsg-4ubuntu1.23.10.1 sofia-sip-doc - 1.12.11+20110422.1+1e14eea~dfsg-4ubuntu1.23.10.1 No subscription required Medium CVE-2023-32307 USN-6450-1 -- OpenSSL vulnerabilities Ubuntu 23.10 Tony Battersby discovered that OpenSSL incorrectly handled key and initialization vector (IV) lengths. This could lead to truncation issues and result in loss of confidentiality for some symmetric cipher modes. (CVE-2023-5363) Juerg Wullschleger discovered that OpenSSL incorrectly handled the AES-SIV cipher. This could lead to empty data entries being ignored, resulting in certain applications being misled. This issue only affected Ubuntu 22.04 LTS and Ubuntu 23.04. (CVE-2023-2975) It was discovered that OpenSSL incorrectly handled checking excessively long DH keys or parameters. A remote attacker could possibly use this issue to cause OpenSSL to consume resources, leading to a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 23.04. (CVE-2023-3446, CVE-2023-3817) Update Instructions: Run `sudo pro fix USN-6450-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libssl-dev - 3.0.10-1ubuntu2.1 libssl-doc - 3.0.10-1ubuntu2.1 libssl3 - 3.0.10-1ubuntu2.1 openssl - 3.0.10-1ubuntu2.1 No subscription required Medium CVE-2023-2975 CVE-2023-3446 CVE-2023-3817 CVE-2023-5363 USN-6452-1 -- Vim vulnerabilities Ubuntu 23.10 It was discovered that Vim could be made to divide by zero. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 23.04. (CVE-2023-3896) It was discovered that Vim did not properly manage memory. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2023-4733, CVE-2023-4750) It was discovered that Vim contained an arithmetic overflow. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 22.04 LTS, Ubuntu 23.04, and Ubuntu 23.10. (CVE-2023-4734) It was discovered that Vim could be made to write out of bounds. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2023-4735, CVE-2023-5344) It was discovered that Vim could be made to write out of bounds. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 23.04 and Ubuntu 23.10. (CVE-2023-4738) It was discovered that Vim could be made to write out of bounds. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 23.04. (CVE-2023-4751) It was discovered that Vim did not properly manage memory. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 23.04, and Ubuntu 23.10. (CVE-2023-4752, CVE-2023-5535) It was discovered that Vim could be made to write out of bounds. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 23.04, and Ubuntu 23.10. (CVE-2023-4781) It was discovered that Vim could be made to dereference invalid memory. An attacker could possibly use this issue to cause a denial of service. (CVE-2023-5441) Update Instructions: Run `sudo pro fix USN-6452-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: vim - 2:9.0.1672-1ubuntu2.1 vim-athena - 2:9.0.1672-1ubuntu2.1 vim-common - 2:9.0.1672-1ubuntu2.1 vim-doc - 2:9.0.1672-1ubuntu2.1 vim-gtk3 - 2:9.0.1672-1ubuntu2.1 vim-gui-common - 2:9.0.1672-1ubuntu2.1 vim-motif - 2:9.0.1672-1ubuntu2.1 vim-nox - 2:9.0.1672-1ubuntu2.1 vim-runtime - 2:9.0.1672-1ubuntu2.1 vim-tiny - 2:9.0.1672-1ubuntu2.1 xxd - 2:9.0.1672-1ubuntu2.1 No subscription required Medium CVE-2023-3896 CVE-2023-4733 CVE-2023-4734 CVE-2023-4735 CVE-2023-4738 CVE-2023-4750 CVE-2023-4751 CVE-2023-4752 CVE-2023-4781 CVE-2023-5344 CVE-2023-5441 CVE-2023-5535 USN-6453-1 -- X.Org X Server vulnerabilities Ubuntu 23.10 Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled prepending values to certain properties. An attacker could possibly use this issue to cause the X Server to crash, execute arbitrary code, or escalate privileges. (CVE-2023-5367) Sri discovered that the X.Org X Server incorrectly handled detroying windows in certain legacy multi-screen setups. An attacker could possibly use this issue to cause the X Server to crash, execute arbitrary code, or escalate privileges. (CVE-2023-5380) Update Instructions: Run `sudo pro fix USN-6453-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: xnest - 2:21.1.7-3ubuntu2.1 xorg-server-source - 2:21.1.7-3ubuntu2.1 xserver-common - 2:21.1.7-3ubuntu2.1 xserver-xephyr - 2:21.1.7-3ubuntu2.1 xserver-xorg-core - 2:21.1.7-3ubuntu2.1 xserver-xorg-dev - 2:21.1.7-3ubuntu2.1 xserver-xorg-legacy - 2:21.1.7-3ubuntu2.1 xvfb - 2:21.1.7-3ubuntu2.1 No subscription required xwayland - 2:23.2.0-1ubuntu0.1 No subscription required Medium CVE-2023-5367 CVE-2023-5380 USN-6454-1 -- Linux kernel vulnerabilities Ubuntu 23.10 Kyle Zeng discovered that the netfilter subsystem in the Linux kernel contained a race condition in IP set operations in certain situations. A local attacker could use this to cause a denial of service (system crash). (CVE-2023-42756) Alex Birnberg discovered that the netfilter subsystem in the Linux kernel did not properly validate register length, leading to an out-of- bounds write vulnerability. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2023-4881) It was discovered that the Quick Fair Queueing scheduler implementation in the Linux kernel did not properly handle network packets in certain conditions, leading to a use after free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-4921) Kevin Rich discovered that the netfilter subsystem in the Linux kernel did not properly handle removal of rules from chain bindings in certain circumstances, leading to a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2023-5197) Update Instructions: Run `sudo pro fix USN-6454-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.5.0-10-generic - 6.5.0-10.10 linux-buildinfo-6.5.0-10-generic-64k - 6.5.0-10.10 linux-cloud-tools-6.5.0-10 - 6.5.0-10.10 linux-cloud-tools-6.5.0-10-generic - 6.5.0-10.10 linux-cloud-tools-common - 6.5.0-10.10 linux-doc - 6.5.0-10.10 linux-headers-6.5.0-10 - 6.5.0-10.10 linux-headers-6.5.0-10-generic - 6.5.0-10.10 linux-headers-6.5.0-10-generic-64k - 6.5.0-10.10 linux-image-6.5.0-10-generic - 6.5.0-10.10 linux-image-6.5.0-10-generic-64k - 6.5.0-10.10 linux-image-uc-6.5.0-10-generic - 6.5.0-10.10 linux-image-uc-6.5.0-10-generic-64k - 6.5.0-10.10 linux-image-unsigned-6.5.0-10-generic - 6.5.0-10.10 linux-image-unsigned-6.5.0-10-generic-64k - 6.5.0-10.10 linux-lib-rust-6.5.0-10-generic - 6.5.0-10.10 linux-libc-dev - 6.5.0-10.10 linux-modules-6.5.0-10-generic - 6.5.0-10.10 linux-modules-6.5.0-10-generic-64k - 6.5.0-10.10 linux-modules-extra-6.5.0-10-generic - 6.5.0-10.10 linux-modules-ipu6-6.5.0-10-generic - 6.5.0-10.10 linux-modules-ivsc-6.5.0-10-generic - 6.5.0-10.10 linux-modules-iwlwifi-6.5.0-10-generic - 6.5.0-10.10 linux-source-6.5.0 - 6.5.0-10.10 linux-tools-6.5.0-10 - 6.5.0-10.10 linux-tools-6.5.0-10-generic - 6.5.0-10.10 linux-tools-6.5.0-10-generic-64k - 6.5.0-10.10 linux-tools-common - 6.5.0-10.10 linux-tools-host - 6.5.0-10.10 No subscription required linux-buildinfo-6.5.0-10-lowlatency - 6.5.0-10.10.1 linux-buildinfo-6.5.0-10-lowlatency-64k - 6.5.0-10.10.1 linux-cloud-tools-6.5.0-10-lowlatency - 6.5.0-10.10.1 linux-headers-6.5.0-10-lowlatency - 6.5.0-10.10.1 linux-headers-6.5.0-10-lowlatency-64k - 6.5.0-10.10.1 linux-image-6.5.0-10-lowlatency - 6.5.0-10.10.1 linux-image-6.5.0-10-lowlatency-64k - 6.5.0-10.10.1 linux-image-unsigned-6.5.0-10-lowlatency - 6.5.0-10.10.1 linux-image-unsigned-6.5.0-10-lowlatency-64k - 6.5.0-10.10.1 linux-lowlatency-cloud-tools-6.5.0-10 - 6.5.0-10.10.1 linux-lowlatency-cloud-tools-common - 6.5.0-10.10.1 linux-lowlatency-headers-6.5.0-10 - 6.5.0-10.10.1 linux-lowlatency-lib-rust-6.5.0-10-lowlatency - 6.5.0-10.10.1 linux-lowlatency-tools-6.5.0-10 - 6.5.0-10.10.1 linux-lowlatency-tools-common - 6.5.0-10.10.1 linux-lowlatency-tools-host - 6.5.0-10.10.1 linux-modules-6.5.0-10-lowlatency - 6.5.0-10.10.1 linux-modules-6.5.0-10-lowlatency-64k - 6.5.0-10.10.1 linux-modules-iwlwifi-6.5.0-10-lowlatency - 6.5.0-10.10.1 linux-tools-6.5.0-10-lowlatency - 6.5.0-10.10.1 linux-tools-6.5.0-10-lowlatency-64k - 6.5.0-10.10.1 No subscription required linux-cloud-tools-lowlatency - 6.5.0.10.10.10 linux-cloud-tools-lowlatency-hwe-20.04 - 6.5.0.10.10.10 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.5.0.10.10.10 linux-cloud-tools-lowlatency-hwe-22.04 - 6.5.0.10.10.10 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.5.0.10.10.10 linux-headers-lowlatency - 6.5.0.10.10.10 linux-headers-lowlatency-64k - 6.5.0.10.10.10 linux-headers-lowlatency-64k-hwe-20.04 - 6.5.0.10.10.10 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.5.0.10.10.10 linux-headers-lowlatency-64k-hwe-22.04 - 6.5.0.10.10.10 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.5.0.10.10.10 linux-headers-lowlatency-hwe-20.04 - 6.5.0.10.10.10 linux-headers-lowlatency-hwe-20.04-edge - 6.5.0.10.10.10 linux-headers-lowlatency-hwe-22.04 - 6.5.0.10.10.10 linux-headers-lowlatency-hwe-22.04-edge - 6.5.0.10.10.10 linux-image-lowlatency - 6.5.0.10.10.10 linux-image-lowlatency-64k - 6.5.0.10.10.10 linux-image-lowlatency-64k-hwe-20.04 - 6.5.0.10.10.10 linux-image-lowlatency-64k-hwe-20.04-edge - 6.5.0.10.10.10 linux-image-lowlatency-64k-hwe-22.04 - 6.5.0.10.10.10 linux-image-lowlatency-64k-hwe-22.04-edge - 6.5.0.10.10.10 linux-image-lowlatency-hwe-20.04 - 6.5.0.10.10.10 linux-image-lowlatency-hwe-20.04-edge - 6.5.0.10.10.10 linux-image-lowlatency-hwe-22.04 - 6.5.0.10.10.10 linux-image-lowlatency-hwe-22.04-edge - 6.5.0.10.10.10 linux-lowlatency - 6.5.0.10.10.10 linux-lowlatency-64k - 6.5.0.10.10.10 linux-lowlatency-64k-hwe-20.04 - 6.5.0.10.10.10 linux-lowlatency-64k-hwe-20.04-edge - 6.5.0.10.10.10 linux-lowlatency-64k-hwe-22.04 - 6.5.0.10.10.10 linux-lowlatency-64k-hwe-22.04-edge - 6.5.0.10.10.10 linux-lowlatency-hwe-20.04 - 6.5.0.10.10.10 linux-lowlatency-hwe-20.04-edge - 6.5.0.10.10.10 linux-lowlatency-hwe-22.04 - 6.5.0.10.10.10 linux-lowlatency-hwe-22.04-edge - 6.5.0.10.10.10 linux-modules-iwlwifi-lowlatency - 6.5.0.10.10.10 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.5.0.10.10.10 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.5.0.10.10.10 linux-tools-lowlatency - 6.5.0.10.10.10 linux-tools-lowlatency-64k - 6.5.0.10.10.10 linux-tools-lowlatency-64k-hwe-20.04 - 6.5.0.10.10.10 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.5.0.10.10.10 linux-tools-lowlatency-64k-hwe-22.04 - 6.5.0.10.10.10 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.5.0.10.10.10 linux-tools-lowlatency-hwe-20.04 - 6.5.0.10.10.10 linux-tools-lowlatency-hwe-20.04-edge - 6.5.0.10.10.10 linux-tools-lowlatency-hwe-22.04 - 6.5.0.10.10.10 linux-tools-lowlatency-hwe-22.04-edge - 6.5.0.10.10.10 No subscription required linux-cloud-tools-generic - 6.5.0.10.12 linux-cloud-tools-generic-hwe-22.04 - 6.5.0.10.12 linux-cloud-tools-generic-hwe-22.04-edge - 6.5.0.10.12 linux-cloud-tools-virtual - 6.5.0.10.12 linux-cloud-tools-virtual-hwe-22.04 - 6.5.0.10.12 linux-cloud-tools-virtual-hwe-22.04-edge - 6.5.0.10.12 linux-crashdump - 6.5.0.10.12 linux-generic - 6.5.0.10.12 linux-generic-64k - 6.5.0.10.12 linux-generic-64k-hwe-22.04 - 6.5.0.10.12 linux-generic-64k-hwe-22.04-edge - 6.5.0.10.12 linux-generic-hwe-22.04 - 6.5.0.10.12 linux-generic-hwe-22.04-edge - 6.5.0.10.12 linux-generic-lpae - 6.5.0.10.12 linux-headers-generic - 6.5.0.10.12 linux-headers-generic-64k - 6.5.0.10.12 linux-headers-generic-64k-hwe-22.04 - 6.5.0.10.12 linux-headers-generic-64k-hwe-22.04-edge - 6.5.0.10.12 linux-headers-generic-hwe-22.04 - 6.5.0.10.12 linux-headers-generic-hwe-22.04-edge - 6.5.0.10.12 linux-headers-generic-lpae - 6.5.0.10.12 linux-headers-kvm - 6.5.0.10.12 linux-headers-oem-22.04 - 6.5.0.10.12 linux-headers-virtual - 6.5.0.10.12 linux-headers-virtual-hwe-22.04 - 6.5.0.10.12 linux-headers-virtual-hwe-22.04-edge - 6.5.0.10.12 linux-image-extra-virtual - 6.5.0.10.12 linux-image-extra-virtual-hwe-22.04 - 6.5.0.10.12 linux-image-extra-virtual-hwe-22.04-edge - 6.5.0.10.12 linux-image-generic - 6.5.0.10.12 linux-image-generic-64k - 6.5.0.10.12 linux-image-generic-64k-hwe-22.04 - 6.5.0.10.12 linux-image-generic-64k-hwe-22.04-edge - 6.5.0.10.12 linux-image-generic-hwe-22.04 - 6.5.0.10.12 linux-image-generic-hwe-22.04-edge - 6.5.0.10.12 linux-image-generic-lpae - 6.5.0.10.12 linux-image-kvm - 6.5.0.10.12 linux-image-oem-22.04 - 6.5.0.10.12 linux-image-uc-generic - 6.5.0.10.12 linux-image-uc-generic-hwe-22.04 - 6.5.0.10.12 linux-image-uc-generic-hwe-22.04-edge - 6.5.0.10.12 linux-image-virtual - 6.5.0.10.12 linux-image-virtual-hwe-22.04 - 6.5.0.10.12 linux-image-virtual-hwe-22.04-edge - 6.5.0.10.12 linux-kvm - 6.5.0.10.12 linux-modules-ipu6-generic - 6.5.0.10.12 linux-modules-ipu6-generic-hwe-22.04 - 6.5.0.10.12 linux-modules-ipu6-generic-hwe-22.04-edge - 6.5.0.10.12 linux-modules-ipu6-oem-22.04 - 6.5.0.10.12 linux-modules-ivsc-generic - 6.5.0.10.12 linux-modules-ivsc-generic-hwe-22.04 - 6.5.0.10.12 linux-modules-ivsc-generic-hwe-22.04-edge - 6.5.0.10.12 linux-modules-ivsc-oem-22.04 - 6.5.0.10.12 linux-modules-iwlwifi-generic - 6.5.0.10.12 linux-modules-iwlwifi-generic-hwe-22.04 - 6.5.0.10.12 linux-modules-iwlwifi-generic-hwe-22.04-edge - 6.5.0.10.12 linux-modules-iwlwifi-oem-22.04 - 6.5.0.10.12 linux-oem-22.04 - 6.5.0.10.12 linux-source - 6.5.0.10.12 linux-tools-generic - 6.5.0.10.12 linux-tools-generic-64k - 6.5.0.10.12 linux-tools-generic-64k-hwe-22.04 - 6.5.0.10.12 linux-tools-generic-64k-hwe-22.04-edge - 6.5.0.10.12 linux-tools-generic-hwe-22.04 - 6.5.0.10.12 linux-tools-generic-hwe-22.04-edge - 6.5.0.10.12 linux-tools-generic-lpae - 6.5.0.10.12 linux-tools-kvm - 6.5.0.10.12 linux-tools-oem-22.04 - 6.5.0.10.12 linux-tools-virtual - 6.5.0.10.12 linux-tools-virtual-hwe-22.04 - 6.5.0.10.12 linux-tools-virtual-hwe-22.04-edge - 6.5.0.10.12 linux-virtual - 6.5.0.10.12 linux-virtual-hwe-22.04 - 6.5.0.10.12 linux-virtual-hwe-22.04-edge - 6.5.0.10.12 No subscription required High CVE-2023-42756 CVE-2023-4921 CVE-2023-5197 USN-6454-2 -- Linux kernel vulnerabilities Ubuntu 23.10 Kyle Zeng discovered that the netfilter subsystem in the Linux kernel contained a race condition in IP set operations in certain situations. A local attacker could use this to cause a denial of service (system crash). (CVE-2023-42756) Alex Birnberg discovered that the netfilter subsystem in the Linux kernel did not properly validate register length, leading to an out-of- bounds write vulnerability. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2023-4881) It was discovered that the Quick Fair Queueing scheduler implementation in the Linux kernel did not properly handle network packets in certain conditions, leading to a use after free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-4921) Kevin Rich discovered that the netfilter subsystem in the Linux kernel did not properly handle removal of rules from chain bindings in certain circumstances, leading to a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2023-5197) Update Instructions: Run `sudo pro fix USN-6454-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.5.0-1006-raspi - 6.5.0-1006.8 linux-headers-6.5.0-1006-raspi - 6.5.0-1006.8 linux-image-6.5.0-1006-raspi - 6.5.0-1006.8 linux-modules-6.5.0-1006-raspi - 6.5.0-1006.8 linux-modules-extra-6.5.0-1006-raspi - 6.5.0-1006.8 linux-raspi-headers-6.5.0-1006 - 6.5.0-1006.8 linux-raspi-tools-6.5.0-1006 - 6.5.0-1006.8 linux-tools-6.5.0-1006-raspi - 6.5.0-1006.8 No subscription required linux-azure-cloud-tools-6.5.0-1008 - 6.5.0-1008.8 linux-azure-headers-6.5.0-1008 - 6.5.0-1008.8 linux-azure-tools-6.5.0-1008 - 6.5.0-1008.8 linux-buildinfo-6.5.0-1008-azure - 6.5.0-1008.8 linux-buildinfo-6.5.0-1008-gcp - 6.5.0-1008.8 linux-cloud-tools-6.5.0-1008-azure - 6.5.0-1008.8 linux-gcp-headers-6.5.0-1008 - 6.5.0-1008.8 linux-gcp-tools-6.5.0-1008 - 6.5.0-1008.8 linux-headers-6.5.0-1008-azure - 6.5.0-1008.8 linux-headers-6.5.0-1008-gcp - 6.5.0-1008.8 linux-image-6.5.0-1008-azure - 6.5.0-1008.8 linux-image-6.5.0-1008-azure-fde - 6.5.0-1008.8 linux-image-6.5.0-1008-gcp - 6.5.0-1008.8 linux-image-unsigned-6.5.0-1008-azure - 6.5.0-1008.8 linux-image-unsigned-6.5.0-1008-gcp - 6.5.0-1008.8 linux-modules-6.5.0-1008-azure - 6.5.0-1008.8 linux-modules-6.5.0-1008-gcp - 6.5.0-1008.8 linux-modules-extra-6.5.0-1008-azure - 6.5.0-1008.8 linux-modules-extra-6.5.0-1008-gcp - 6.5.0-1008.8 linux-modules-iwlwifi-6.5.0-1008-azure - 6.5.0-1008.8 linux-modules-iwlwifi-6.5.0-1008-gcp - 6.5.0-1008.8 linux-tools-6.5.0-1008-azure - 6.5.0-1008.8 linux-tools-6.5.0-1008-gcp - 6.5.0-1008.8 No subscription required linux-aws-cloud-tools-6.5.0-1009 - 6.5.0-1009.9 linux-aws-headers-6.5.0-1009 - 6.5.0-1009.9 linux-aws-tools-6.5.0-1009 - 6.5.0-1009.9 linux-buildinfo-6.5.0-1009-aws - 6.5.0-1009.9 linux-cloud-tools-6.5.0-1009-aws - 6.5.0-1009.9 linux-headers-6.5.0-1009-aws - 6.5.0-1009.9 linux-image-6.5.0-1009-aws - 6.5.0-1009.9 linux-image-unsigned-6.5.0-1009-aws - 6.5.0-1009.9 linux-modules-6.5.0-1009-aws - 6.5.0-1009.9 linux-modules-extra-6.5.0-1009-aws - 6.5.0-1009.9 linux-tools-6.5.0-1009-aws - 6.5.0-1009.9 No subscription required linux-buildinfo-6.5.0-1011-oracle - 6.5.0-1011.11 linux-headers-6.5.0-1011-oracle - 6.5.0-1011.11 linux-image-6.5.0-1011-oracle - 6.5.0-1011.11 linux-image-unsigned-6.5.0-1011-oracle - 6.5.0-1011.11 linux-modules-6.5.0-1011-oracle - 6.5.0-1011.11 linux-modules-extra-6.5.0-1011-oracle - 6.5.0-1011.11 linux-modules-iwlwifi-6.5.0-1011-oracle - 6.5.0-1011.11 linux-oracle-headers-6.5.0-1011 - 6.5.0-1011.11 linux-oracle-tools-6.5.0-1011 - 6.5.0-1011.11 linux-tools-6.5.0-1011-oracle - 6.5.0-1011.11 No subscription required linux-headers-raspi - 6.5.0.1006.7 linux-headers-raspi-nolpae - 6.5.0.1006.7 linux-image-raspi - 6.5.0.1006.7 linux-image-raspi-nolpae - 6.5.0.1006.7 linux-modules-extra-raspi - 6.5.0.1006.7 linux-modules-extra-raspi-nolpae - 6.5.0.1006.7 linux-raspi - 6.5.0.1006.7 linux-raspi-nolpae - 6.5.0.1006.7 linux-tools-raspi - 6.5.0.1006.7 linux-tools-raspi-nolpae - 6.5.0.1006.7 No subscription required linux-azure - 6.5.0.1008.10 linux-azure-fde - 6.5.0.1008.10 linux-cloud-tools-azure - 6.5.0.1008.10 linux-headers-azure - 6.5.0.1008.10 linux-image-azure - 6.5.0.1008.10 linux-image-azure-fde - 6.5.0.1008.10 linux-modules-extra-azure - 6.5.0.1008.10 linux-modules-iwlwifi-azure - 6.5.0.1008.10 linux-tools-azure - 6.5.0.1008.10 No subscription required linux-gcp - 6.5.0.1008.8 linux-headers-gcp - 6.5.0.1008.8 linux-image-gcp - 6.5.0.1008.8 linux-modules-extra-gcp - 6.5.0.1008.8 linux-modules-iwlwifi-gcp - 6.5.0.1008.8 linux-tools-gcp - 6.5.0.1008.8 No subscription required linux-aws - 6.5.0.1009.9 linux-headers-aws - 6.5.0.1009.9 linux-image-aws - 6.5.0.1009.9 linux-modules-extra-aws - 6.5.0.1009.9 linux-tools-aws - 6.5.0.1009.9 No subscription required linux-headers-oracle - 6.5.0.1011.11 linux-image-oracle - 6.5.0.1011.11 linux-modules-iwlwifi-oracle - 6.5.0.1011.11 linux-oracle - 6.5.0.1011.11 linux-tools-oracle - 6.5.0.1011.11 No subscription required High CVE-2023-42756 CVE-2023-4921 CVE-2023-5197 USN-6454-3 -- Linux kernel (ARM laptop) vulnerabilities Ubuntu 23.10 Kyle Zeng discovered that the netfilter subsystem in the Linux kernel contained a race condition in IP set operations in certain situations. A local attacker could use this to cause a denial of service (system crash). (CVE-2023-42756) Alex Birnberg discovered that the netfilter subsystem in the Linux kernel did not properly validate register length, leading to an out-of- bounds write vulnerability. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2023-4881) It was discovered that the Quick Fair Queueing scheduler implementation in the Linux kernel did not properly handle network packets in certain conditions, leading to a use after free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-4921) Kevin Rich discovered that the netfilter subsystem in the Linux kernel did not properly handle removal of rules from chain bindings in certain circumstances, leading to a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2023-5197) Update Instructions: Run `sudo pro fix USN-6454-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.5.0-1005-laptop - 6.5.0-1005.8 linux-headers-6.5.0-1005-laptop - 6.5.0-1005.8 linux-image-6.5.0-1005-laptop - 6.5.0-1005.8 linux-laptop-headers-6.5.0-1005 - 6.5.0-1005.8 linux-laptop-tools-6.5.0-1005 - 6.5.0-1005.8 linux-laptop-tools-common - 6.5.0-1005.8 linux-laptop-tools-host - 6.5.0-1005.8 linux-modules-6.5.0-1005-laptop - 6.5.0-1005.8 linux-tools-6.5.0-1005-laptop - 6.5.0-1005.8 No subscription required linux-headers-laptop-23.10 - 6.5.0.1005.8 linux-image-laptop-23.10 - 6.5.0.1005.8 linux-laptop-23.10 - 6.5.0.1005.8 linux-tools-laptop-23.10 - 6.5.0.1005.8 No subscription required High CVE-2023-42756 CVE-2023-4921 CVE-2023-5197 USN-6454-4 -- Linux kernel (StarFive) vulnerabilities Ubuntu 23.10 Kyle Zeng discovered that the netfilter subsystem in the Linux kernel contained a race condition in IP set operations in certain situations. A local attacker could use this to cause a denial of service (system crash). (CVE-2023-42756) Alex Birnberg discovered that the netfilter subsystem in the Linux kernel did not properly validate register length, leading to an out-of- bounds write vulnerability. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2023-4881) It was discovered that the Quick Fair Queueing scheduler implementation in the Linux kernel did not properly handle network packets in certain conditions, leading to a use after free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-4921) Kevin Rich discovered that the netfilter subsystem in the Linux kernel did not properly handle removal of rules from chain bindings in certain circumstances, leading to a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2023-5197) Update Instructions: Run `sudo pro fix USN-6454-4` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.5.0-1003-starfive - 6.5.0-1003.4 linux-headers-6.5.0-1003-starfive - 6.5.0-1003.4 linux-image-6.5.0-1003-starfive - 6.5.0-1003.4 linux-modules-6.5.0-1003-starfive - 6.5.0-1003.4 linux-modules-extra-6.5.0-1003-starfive - 6.5.0-1003.4 linux-starfive-headers-6.5.0-1003 - 6.5.0-1003.4 linux-starfive-tools-6.5.0-1003 - 6.5.0-1003.4 linux-tools-6.5.0-1003-starfive - 6.5.0-1003.4 No subscription required linux-headers-starfive - 6.5.0.1003.5 linux-image-starfive - 6.5.0.1003.5 linux-starfive - 6.5.0.1003.5 linux-tools-starfive - 6.5.0.1003.5 No subscription required High CVE-2023-42756 CVE-2023-4921 CVE-2023-5197 USN-6455-1 -- Exim vulnerabilities Ubuntu 23.10 It was discovered that Exim incorrectly handled validation of user-supplied data, which could lead to memory corruption. A remote attacker could possibly use this issue to execute arbitrary code. (CVE-2023-42117) It was discovered that Exim incorrectly handled validation of user-supplied data, which could lead to an out-of-bounds read. An attacker could possibly use this issue to expose sensitive information. (CVE-2023-42119) Update Instructions: Run `sudo pro fix USN-6455-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: exim4 - 4.96-17ubuntu2.1 exim4-base - 4.96-17ubuntu2.1 exim4-config - 4.96-17ubuntu2.1 exim4-daemon-heavy - 4.96-17ubuntu2.1 exim4-daemon-light - 4.96-17ubuntu2.1 exim4-dev - 4.96-17ubuntu2.1 eximon4 - 4.96-17ubuntu2.1 No subscription required Medium CVE-2023-42117 CVE-2023-42119 USN-6459-1 -- MySQL vulnerabilities Ubuntu 23.10 Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 8.0.35 in Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 23.04, and Ubuntu 23.10. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information: https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-35.html https://www.oracle.com/security-alerts/cpuoct2023.html Update Instructions: Run `sudo pro fix USN-6459-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libmysqlclient-dev - 8.0.35-0ubuntu0.23.10.1 libmysqlclient21 - 8.0.35-0ubuntu0.23.10.1 mysql-client - 8.0.35-0ubuntu0.23.10.1 mysql-client-8.0 - 8.0.35-0ubuntu0.23.10.1 mysql-client-core-8.0 - 8.0.35-0ubuntu0.23.10.1 mysql-router - 8.0.35-0ubuntu0.23.10.1 mysql-server - 8.0.35-0ubuntu0.23.10.1 mysql-server-8.0 - 8.0.35-0ubuntu0.23.10.1 mysql-server-core-8.0 - 8.0.35-0ubuntu0.23.10.1 mysql-source-8.0 - 8.0.35-0ubuntu0.23.10.1 mysql-testsuite - 8.0.35-0ubuntu0.23.10.1 mysql-testsuite-8.0 - 8.0.35-0ubuntu0.23.10.1 No subscription required Medium CVE-2023-22032 CVE-2023-22059 CVE-2023-22064 CVE-2023-22066 CVE-2023-22068 CVE-2023-22070 CVE-2023-22078 CVE-2023-22079 CVE-2023-22084 CVE-2023-22092 CVE-2023-22097 CVE-2023-22103 CVE-2023-22112 CVE-2023-22114 USN-6463-1 -- Open VM Tools vulnerabilities Ubuntu 23.10 It was discovered that Open VM Tools incorrectly handled SAML tokens. A remote attacker Guest Operations privileges could possibly use this issue to escalate privileges. (CVE-2023-34058) Matthias Gerstner discovered that Open VM Tools incorrectly handled file descriptors when dropping privileges. A local attacker could possibly use this issue to hijack /dev/uinput and simulate user inputs. (CVE-2023-34059) Update Instructions: Run `sudo pro fix USN-6463-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: open-vm-tools - 2:12.3.0-1ubuntu0.1 open-vm-tools-containerinfo - 2:12.3.0-1ubuntu0.1 open-vm-tools-desktop - 2:12.3.0-1ubuntu0.1 open-vm-tools-dev - 2:12.3.0-1ubuntu0.1 open-vm-tools-salt-minion - 2:12.3.0-1ubuntu0.1 open-vm-tools-sdmp - 2:12.3.0-1ubuntu0.1 No subscription required Medium CVE-2023-34058 CVE-2023-34059 USN-6468-1 -- Thunderbird vulnerabilities Ubuntu 23.10 Multiple security issues were discovered in Thunderbird. If a user were tricked into opening a specially crafted website in a browsing context, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information, bypass security restrictions, cross-site tracing, or execute arbitrary code. (CVE-2023-5724, CVE-2023-5728, CVE-2023-5730, CVE-2023-5732) Kelsey Gilbert discovered that Thunderbird did not properly manage certain browser prompts and dialogs due to an insufficient activation-delay. An attacker could potentially exploit this issue to perform clickjacking. (CVE-2023-5721) Shaheen Fazim discovered that Thunderbird did not properly validate the URLs open by installed WebExtension. An attacker could potentially exploit this issue to obtain sensitive information. (CVE-2023-5725) Update Instructions: Run `sudo pro fix USN-6468-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: thunderbird - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-dev - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-gnome-support - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-af - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-ar - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-ast - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-be - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-bg - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-bn - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-bn-bd - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-br - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-ca - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-cak - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-cs - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-cy - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-da - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-de - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-dsb - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-el - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-en - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-en-gb - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-en-us - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-es - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-es-ar - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-es-es - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-et - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-eu - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-fa - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-fi - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-fr - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-fy - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-fy-nl - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-ga - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-ga-ie - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-gd - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-gl - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-he - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-hr - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-hsb - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-hu - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-hy - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-id - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-is - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-it - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-ja - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-ka - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-kab - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-kk - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-ko - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-lt - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-lv - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-mk - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-ms - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-nb - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-nb-no - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-nl - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-nn - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-nn-no - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-pa - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-pa-in - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-pl - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-pt - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-pt-br - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-pt-pt - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-rm - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-ro - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-ru - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-si - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-sk - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-sl - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-sq - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-sr - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-sv - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-sv-se - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-ta - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-ta-lk - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-th - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-tr - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-uk - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-uz - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-vi - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-zh-cn - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-zh-hans - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-zh-hant - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-locale-zh-tw - 1:115.4.1+build1-0ubuntu0.23.10.1 thunderbird-mozsymbols - 1:115.4.1+build1-0ubuntu0.23.10.1 xul-ext-calendar-timezones - 1:115.4.1+build1-0ubuntu0.23.10.1 xul-ext-gdata-provider - 1:115.4.1+build1-0ubuntu0.23.10.1 xul-ext-lightning - 1:115.4.1+build1-0ubuntu0.23.10.1 No subscription required Medium CVE-2023-5721 CVE-2023-5732 CVE-2023-5724 CVE-2023-5725 CVE-2023-5728 CVE-2023-5730 USN-6470-1 -- Axis vulnerability Ubuntu 23.10 It was discovered that Axis incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2023-40743) Update Instructions: Run `sudo pro fix USN-6470-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libaxis-java - 1.4-28+deb10u1build0.23.10.1 libaxis-java-doc - 1.4-28+deb10u1build0.23.10.1 No subscription required Medium CVE-2023-40743 USN-6471-1 -- libsndfile vulnerability Ubuntu 23.10 It was discovered that libsndfile contained multiple arithmetic overflows. If a user or automated system were tricked into processing a specially crafted audio file, an attacker could possibly use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-6471-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libsndfile1 - 1.2.2-1ubuntu0.23.10.1 libsndfile1-dev - 1.2.2-1ubuntu0.23.10.1 sndfile-programs - 1.2.2-1ubuntu0.23.10.1 No subscription required Medium CVE-2022-33065 USN-6473-1 -- urllib3 vulnerabilities Ubuntu 23.10 It was discovered that urllib3 didn't strip HTTP Authorization header on cross-origin redirects. A remote attacker could possibly use this issue to obtain sensitive information. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2018-25091) It was discovered that urllib3 didn't strip HTTP Cookie header on cross-origin redirects. A remote attacker could possibly use this issue to obtain sensitive information. (CVE-2023-43804) It was discovered that urllib3 didn't strip HTTP body on status code 303 redirects under certain circumstances. A remote attacker could possibly use this issue to obtain sensitive information. (CVE-2023-45803) Update Instructions: Run `sudo pro fix USN-6473-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-urllib3 - 1.26.16-1ubuntu0.1 No subscription required Medium CVE-2018-25091 CVE-2023-43804 CVE-2023-45803 USN-6473-2 -- pip vulnerabilities Ubuntu 23.10 USN-6473-1 fixed vulnerabilities in urllib3. This update provides the corresponding updates for the urllib3 module bundled into pip. Original advisory details: It was discovered that urllib3 didn't strip HTTP Authorization header on cross-origin redirects. A remote attacker could possibly use this issue to obtain sensitive information. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2018-25091) It was discovered that urllib3 didn't strip HTTP Cookie header on cross-origin redirects. A remote attacker could possibly use this issue to obtain sensitive information. (CVE-2023-43804) It was discovered that urllib3 didn't strip HTTP body on status code 303 redirects under certain circumstances. A remote attacker could possibly use this issue to obtain sensitive information. (CVE-2023-45803) Update Instructions: Run `sudo pro fix USN-6473-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-pip - 23.2+dfsg-1ubuntu0.1 python3-pip-whl - 23.2+dfsg-1ubuntu0.1 No subscription required Medium CVE-2018-25091 CVE-2023-43804 CVE-2023-45803 USN-6476-1 -- Memcached vulnerabilities Ubuntu 23.10 It was discovered that Memcached incorrectly handled certain multiget requests in proxy mode. A remote attacker could use this issue to cause Memcached to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2023-46852) It was discovered that Memcached incorrectly handled certain proxy requests in proxy mode. A remote attacker could use this issue to cause Memcached to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2023-46853) Update Instructions: Run `sudo pro fix USN-6476-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: memcached - 1.6.21-1ubuntu0.23.10.1 No subscription required Medium CVE-2023-46852 CVE-2023-46853 USN-6477-1 -- procps-ng vulnerability Ubuntu 23.10 It was discovered that the procps-ng ps tool incorrectly handled memory. An attacker could possibly use this issue to cause procps-ng to crash, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-6477-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libproc2-0 - 2:4.0.3-1ubuntu1.23.10.1 libproc2-dev - 2:4.0.3-1ubuntu1.23.10.1 procps - 2:4.0.3-1ubuntu1.23.10.1 No subscription required Low CVE-2023-4016 USN-6480-1 -- .NET vulnerabilities Ubuntu 23.10 Barry Dorrans discovered that .NET did not properly implement certain security features for Blazor server forms. An attacker could possibly use this issue to bypass validation, which could trigger unintended actions. (CVE-2023-36558) Piotr Bazydlo discovered that .NET did not properly handle untrusted URIs provided to System.Net.WebRequest.Create. An attacker could possibly use this issue to inject arbitrary commands to backend FTP servers. (CVE-2023-36049) Update Instructions: Run `sudo pro fix USN-6480-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: aspnetcore-runtime-6.0 - 6.0.125-0ubuntu1~23.10.1 aspnetcore-targeting-pack-6.0 - 6.0.125-0ubuntu1~23.10.1 dotnet-apphost-pack-6.0 - 6.0.125-0ubuntu1~23.10.1 dotnet-host - 6.0.125-0ubuntu1~23.10.1 dotnet-hostfxr-6.0 - 6.0.125-0ubuntu1~23.10.1 dotnet-runtime-6.0 - 6.0.125-0ubuntu1~23.10.1 dotnet-sdk-6.0 - 6.0.125-0ubuntu1~23.10.1 dotnet-sdk-6.0-source-built-artifacts - 6.0.125-0ubuntu1~23.10.1 dotnet-targeting-pack-6.0 - 6.0.125-0ubuntu1~23.10.1 dotnet-templates-6.0 - 6.0.125-0ubuntu1~23.10.1 dotnet6 - 6.0.125-0ubuntu1~23.10.1 netstandard-targeting-pack-2.1 - 6.0.125-0ubuntu1~23.10.1 No subscription required aspnetcore-runtime-7.0 - 7.0.114-0ubuntu1~23.10.1 aspnetcore-targeting-pack-7.0 - 7.0.114-0ubuntu1~23.10.1 dotnet-apphost-pack-7.0 - 7.0.114-0ubuntu1~23.10.1 dotnet-host-7.0 - 7.0.114-0ubuntu1~23.10.1 dotnet-hostfxr-7.0 - 7.0.114-0ubuntu1~23.10.1 dotnet-runtime-7.0 - 7.0.114-0ubuntu1~23.10.1 dotnet-sdk-7.0 - 7.0.114-0ubuntu1~23.10.1 dotnet-sdk-7.0-source-built-artifacts - 7.0.114-0ubuntu1~23.10.1 dotnet-targeting-pack-7.0 - 7.0.114-0ubuntu1~23.10.1 dotnet-templates-7.0 - 7.0.114-0ubuntu1~23.10.1 dotnet7 - 7.0.114-0ubuntu1~23.10.1 netstandard-targeting-pack-2.1-7.0 - 7.0.114-0ubuntu1~23.10.1 No subscription required aspnetcore-runtime-8.0 - 8.0.0-0ubuntu1~23.10.1 aspnetcore-targeting-pack-8.0 - 8.0.0-0ubuntu1~23.10.1 dotnet-apphost-pack-8.0 - 8.0.0-0ubuntu1~23.10.1 dotnet-host-8.0 - 8.0.0-0ubuntu1~23.10.1 dotnet-hostfxr-8.0 - 8.0.0-0ubuntu1~23.10.1 dotnet-runtime-8.0 - 8.0.0-0ubuntu1~23.10.1 dotnet-targeting-pack-8.0 - 8.0.0-0ubuntu1~23.10.1 No subscription required dotnet-sdk-8.0 - 8.0.100-0ubuntu1~23.10.1 dotnet-sdk-8.0-source-built-artifacts - 8.0.100-0ubuntu1~23.10.1 dotnet-templates-8.0 - 8.0.100-0ubuntu1~23.10.1 netstandard-targeting-pack-2.1-8.0 - 8.0.100-0ubuntu1~23.10.1 No subscription required dotnet8 - 8.0.100-8.0.0-0ubuntu1~23.10.1 No subscription required Medium CVE-2023-36049 CVE-2023-36558 USN-6481-1 -- FRR vulnerabilities Ubuntu 23.10 It was discovered that FRR incorrectly handled certain malformed NLRI data. A remote attacker could possibly use this issue to cause FRR to crash, resulting in a denial of service. (CVE-2023-46752) It was discovered that FRR incorrectly handled certain BGP UPDATE messages. A remote attacker could possibly use this issue to cause FRR to crash, resulting in a denial of service. (CVE-2023-46753) Update Instructions: Run `sudo pro fix USN-6481-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: frr - 8.4.4-1.1ubuntu1.1 frr-doc - 8.4.4-1.1ubuntu1.1 frr-pythontools - 8.4.4-1.1ubuntu1.1 frr-rpki-rtrlib - 8.4.4-1.1ubuntu1.1 frr-snmp - 8.4.4-1.1ubuntu1.1 No subscription required Medium CVE-2023-46752 CVE-2023-46753 USN-6483-1 -- HTML Tidy vulnerability Ubuntu 23.10 Neeraj Pal discovered that HTML Tidy incorrectly handled parsing certain HTML data. If a user or automated system were tricked into parsing specially crafted HTML data, a remote attacker could cause HTML Tidy to consume resources, leading to a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6483-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libtidy-dev - 2:5.6.0-11ubuntu0.23.10.1 libtidy5deb1 - 2:5.6.0-11ubuntu0.23.10.1 tidy - 2:5.6.0-11ubuntu0.23.10.1 No subscription required Medium CVE-2021-33391 USN-6484-1 -- OpenVPN vulnerabilities Ubuntu 23.10 It was discovered that OpenVPN incorrectly handled the --fragment option in certain configurations. A remote attacker could possibly use this issue to cause OpenVPN to crash, resulting in a denial of service. (CVE-2023-46849) It was discovered that OpenVPN incorrectly handled certain memory operations. A remote attacker could use this issue to cause OpenVPN to crash, obtain sensitive information, or possibly execute arbitrary code. (CVE-2023-46850) Update Instructions: Run `sudo pro fix USN-6484-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openvpn - 2.6.5-0ubuntu1.1 No subscription required Medium CVE-2023-46849 CVE-2023-46850 USN-6485-1 -- Intel Microcode vulnerability Ubuntu 23.10 Benoit Morgan, Paul Grosen, Thais Moreira Hamasaki, Ke Sun, Alyssa Milburn, Hisham Shafi, Nir Shlomovich, Tavis Ormandy, Daniel Moghimi, Josh Eads, Salman Qazi, Alexandra Sandulescu, Andy Nguyen, Eduardo Vela, Doug Kwan, and Kostik Shtoyk discovered that some Intel(R) Processors did not properly handle certain sequences of processor instructions. A local attacker could possibly use this to cause a core hang (resulting in a denial of service), gain access to sensitive information or possibly escalate their privileges. Update Instructions: Run `sudo pro fix USN-6485-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: intel-microcode - 3.20231114.0ubuntu0.23.10.1 No subscription required High CVE-2023-23583 USN-6486-1 -- iniParser vulnerability Ubuntu 23.10 It was discovered that iniParser incorrectly handled certain files. An attacker could possibly use this issue to cause a crash. Update Instructions: Run `sudo pro fix USN-6486-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libiniparser-dev - 4.1-6ubuntu0.23.10.1 libiniparser-doc - 4.1-6ubuntu0.23.10.1 libiniparser1 - 4.1-6ubuntu0.23.10.1 No subscription required Medium CVE-2023-33461 USN-6487-1 -- Avahi vulnerabilities Ubuntu 23.10 Evgeny Vereshchagin discovered that Avahi contained several reachable assertions, which could lead to intentional assertion failures when specially crafted user input was given. An attacker could possibly use this issue to cause a denial of service. (CVE-2023-38469, CVE-2023-38470, CVE-2023-38471, CVE-2023-38472, CVE-2023-38473) Update Instructions: Run `sudo pro fix USN-6487-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: avahi-autoipd - 0.8-10ubuntu1.1 avahi-daemon - 0.8-10ubuntu1.1 avahi-discover - 0.8-10ubuntu1.1 avahi-dnsconfd - 0.8-10ubuntu1.1 avahi-ui-utils - 0.8-10ubuntu1.1 avahi-utils - 0.8-10ubuntu1.1 gir1.2-avahi-0.6 - 0.8-10ubuntu1.1 libavahi-client-dev - 0.8-10ubuntu1.1 libavahi-client3 - 0.8-10ubuntu1.1 libavahi-common-data - 0.8-10ubuntu1.1 libavahi-common-dev - 0.8-10ubuntu1.1 libavahi-common3 - 0.8-10ubuntu1.1 libavahi-compat-libdnssd-dev - 0.8-10ubuntu1.1 libavahi-compat-libdnssd1 - 0.8-10ubuntu1.1 libavahi-core-dev - 0.8-10ubuntu1.1 libavahi-core7 - 0.8-10ubuntu1.1 libavahi-glib-dev - 0.8-10ubuntu1.1 libavahi-glib1 - 0.8-10ubuntu1.1 libavahi-gobject-dev - 0.8-10ubuntu1.1 libavahi-gobject0 - 0.8-10ubuntu1.1 libavahi-ui-gtk3-0 - 0.8-10ubuntu1.1 libavahi-ui-gtk3-dev - 0.8-10ubuntu1.1 python3-avahi - 0.8-10ubuntu1.1 No subscription required Medium CVE-2023-38469 CVE-2023-38470 CVE-2023-38471 CVE-2023-38472 CVE-2023-38473 USN-6488-1 -- strongSwan vulnerability Ubuntu 23.10 Florian Picca discovered that strongSwan incorrectly handled certain DH public values. A remote attacker could use this issue to cause strongSwan to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6488-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: charon-cmd - 5.9.11-1ubuntu1.1 charon-systemd - 5.9.11-1ubuntu1.1 libcharon-extauth-plugins - 5.9.11-1ubuntu1.1 libcharon-extra-plugins - 5.9.11-1ubuntu1.1 libstrongswan - 5.9.11-1ubuntu1.1 libstrongswan-extra-plugins - 5.9.11-1ubuntu1.1 libstrongswan-standard-plugins - 5.9.11-1ubuntu1.1 strongswan - 5.9.11-1ubuntu1.1 strongswan-charon - 5.9.11-1ubuntu1.1 strongswan-libcharon - 5.9.11-1ubuntu1.1 strongswan-nm - 5.9.11-1ubuntu1.1 strongswan-pki - 5.9.11-1ubuntu1.1 strongswan-starter - 5.9.11-1ubuntu1.1 strongswan-swanctl - 5.9.11-1ubuntu1.1 No subscription required Medium CVE-2023-41913 USN-6490-1 -- WebKitGTK vulnerabilities Ubuntu 23.10 Several security issues were discovered in the WebKitGTK Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution. Update Instructions: Run `sudo pro fix USN-6490-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-javascriptcoregtk-4.0 - 2.42.2-0ubuntu0.23.10.1 gir1.2-javascriptcoregtk-4.1 - 2.42.2-0ubuntu0.23.10.1 gir1.2-javascriptcoregtk-6.0 - 2.42.2-0ubuntu0.23.10.1 gir1.2-webkit-6.0 - 2.42.2-0ubuntu0.23.10.1 gir1.2-webkit2-4.0 - 2.42.2-0ubuntu0.23.10.1 gir1.2-webkit2-4.1 - 2.42.2-0ubuntu0.23.10.1 libjavascriptcoregtk-4.0-18 - 2.42.2-0ubuntu0.23.10.1 libjavascriptcoregtk-4.0-bin - 2.42.2-0ubuntu0.23.10.1 libjavascriptcoregtk-4.0-dev - 2.42.2-0ubuntu0.23.10.1 libjavascriptcoregtk-4.1-0 - 2.42.2-0ubuntu0.23.10.1 libjavascriptcoregtk-4.1-dev - 2.42.2-0ubuntu0.23.10.1 libjavascriptcoregtk-6.0-1 - 2.42.2-0ubuntu0.23.10.1 libjavascriptcoregtk-6.0-dev - 2.42.2-0ubuntu0.23.10.1 libwebkit2gtk-4.0-37 - 2.42.2-0ubuntu0.23.10.1 libwebkit2gtk-4.0-dev - 2.42.2-0ubuntu0.23.10.1 libwebkit2gtk-4.0-doc - 2.42.2-0ubuntu0.23.10.1 libwebkit2gtk-4.1-0 - 2.42.2-0ubuntu0.23.10.1 libwebkit2gtk-4.1-dev - 2.42.2-0ubuntu0.23.10.1 libwebkitgtk-6.0-4 - 2.42.2-0ubuntu0.23.10.1 libwebkitgtk-6.0-dev - 2.42.2-0ubuntu0.23.10.1 webkit2gtk-driver - 2.42.2-0ubuntu0.23.10.1 No subscription required Medium CVE-2023-41983 CVE-2023-42852 USN-6493-1 -- hibagent update Ubuntu 23.10 On Ubuntu 20.04 LTS and Ubuntu 22.04 LTS, the hibagent package has been updated to add IMDSv2 support, as IMDSv1 uses an insecure protocol and is no longer recommended. In addition, on all releases, hibagent has been updated to do nothing if ODH is configured. Update Instructions: Run `sudo pro fix USN-6493-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: hibagent - 1.0.1+git20230216.9ac1209f7-0ubuntu1.23.10.1 No subscription required None https://launchpad.net/bugs/2043739 USN-6498-1 -- FRR vulnerabilities Ubuntu 23.10 It was discovered that FRR incorrectly handled certain BGP messages. A remote attacker could possibly use this issue to cause FRR to crash, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-6498-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: frr - 8.4.4-1.1ubuntu1.2 frr-doc - 8.4.4-1.1ubuntu1.2 frr-pythontools - 8.4.4-1.1ubuntu1.2 frr-rpki-rtrlib - 8.4.4-1.1ubuntu1.2 frr-snmp - 8.4.4-1.1ubuntu1.2 No subscription required Medium CVE-2023-38406 CVE-2023-38407 CVE-2023-47234 CVE-2023-47235 USN-6499-1 -- GnuTLS vulnerability Ubuntu 23.10 It was discovered that GnuTLS had a timing side-channel when handling certain RSA-PSK key exchanges. A remote attacker could possibly use this issue to recover sensitive information. Update Instructions: Run `sudo pro fix USN-6499-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gnutls-bin - 3.8.1-4ubuntu1.1 gnutls-doc - 3.8.1-4ubuntu1.1 libgnutls-dane0 - 3.8.1-4ubuntu1.1 libgnutls-openssl27 - 3.8.1-4ubuntu1.1 libgnutls28-dev - 3.8.1-4ubuntu1.1 libgnutls30 - 3.8.1-4ubuntu1.1 No subscription required Medium CVE-2023-5981 USN-6500-1 -- Squid vulnerabilities Ubuntu 23.10 Joshua Rogers discovered that Squid incorrectly handled validating certain SSL certificates. A remote attacker could possibly use this issue to cause Squid to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS, Ubuntu 23.04, and Ubuntu 23.10. (CVE-2023-46724) Joshua Rogers discovered that Squid incorrectly handled the Gopher protocol. A remote attacker could possibly use this issue to cause Squid to crash, resulting in a denial of service. Gopher support has been disabled in this update. This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 23.04. (CVE-2023-46728) Keran Mu and Jianjun Chen discovered that Squid incorrectly handled the chunked decoder. A remote attacker could possibly use this issue to perform HTTP request smuggling attacks. (CVE-2023-46846) Joshua Rogers discovered that Squid incorrectly handled HTTP Digest Authentication. A remote attacker could possibly use this issue to cause Squid to crash, resulting in a denial of service. (CVE-2023-46847) Joshua Rogers discovered that Squid incorrectly handled certain FTP urls. A remote attacker could possibly use this issue to cause Squid to crash, resulting in a denial of service. (CVE-2023-46848) Update Instructions: Run `sudo pro fix USN-6500-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: squid - 6.1-2ubuntu1.1 squid-cgi - 6.1-2ubuntu1.1 squid-common - 6.1-2ubuntu1.1 squid-openssl - 6.1-2ubuntu1.1 squid-purge - 6.1-2ubuntu1.1 squidclient - 6.1-2ubuntu1.1 No subscription required Medium CVE-2023-46724 CVE-2023-46728 CVE-2023-46846 CVE-2023-46847 CVE-2023-46848 USN-6501-1 -- RabbitMQ vulnerability Ubuntu 23.10 It was discovered that RabbitMQ incorrectly handled certain HTTP requests. An attacker could possibly use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-6501-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: rabbitmq-server - 3.12.1-1ubuntu0.1 No subscription required Medium CVE-2023-46118 USN-6503-1 -- Linux kernel vulnerabilities Ubuntu 23.10 Yu Hao discovered that the UBI driver in the Linux kernel did not properly check for MTD with zero erasesize during device attachment. A local privileged attacker could use this to cause a denial of service (system crash). (CVE-2023-31085) Bien Pham discovered that the netfiler subsystem in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. A local user could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-4244) Maxim Levitsky discovered that the KVM nested virtualization (SVM) implementation for AMD processors in the Linux kernel did not properly handle x2AVIC MSRs. An attacker in a guest VM could use this to cause a denial of service (host kernel crash). (CVE-2023-5090) It was discovered that the SMB network file sharing protocol implementation in the Linux kernel did not properly handle certain error conditions, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-5345) Murray McAllister discovered that the VMware Virtual GPU DRM driver in the Linux kernel did not properly handle memory objects when storing surfaces, leading to a use-after-free vulnerability. A local attacker in a guest VM could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-5633) Update Instructions: Run `sudo pro fix USN-6503-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.5.0-1004-starfive - 6.5.0-1004.5 linux-headers-6.5.0-1004-starfive - 6.5.0-1004.5 linux-image-6.5.0-1004-starfive - 6.5.0-1004.5 linux-modules-6.5.0-1004-starfive - 6.5.0-1004.5 linux-modules-extra-6.5.0-1004-starfive - 6.5.0-1004.5 linux-starfive-headers-6.5.0-1004 - 6.5.0-1004.5 linux-starfive-tools-6.5.0-1004 - 6.5.0-1004.5 linux-tools-6.5.0-1004-starfive - 6.5.0-1004.5 No subscription required linux-buildinfo-6.5.0-1006-laptop - 6.5.0-1006.9 linux-headers-6.5.0-1006-laptop - 6.5.0-1006.9 linux-image-6.5.0-1006-laptop - 6.5.0-1006.9 linux-laptop-headers-6.5.0-1006 - 6.5.0-1006.9 linux-laptop-tools-6.5.0-1006 - 6.5.0-1006.9 linux-laptop-tools-common - 6.5.0-1006.9 linux-laptop-tools-host - 6.5.0-1006.9 linux-modules-6.5.0-1006-laptop - 6.5.0-1006.9 linux-tools-6.5.0-1006-laptop - 6.5.0-1006.9 No subscription required linux-buildinfo-6.5.0-1007-raspi - 6.5.0-1007.9 linux-headers-6.5.0-1007-raspi - 6.5.0-1007.9 linux-image-6.5.0-1007-raspi - 6.5.0-1007.9 linux-modules-6.5.0-1007-raspi - 6.5.0-1007.9 linux-modules-extra-6.5.0-1007-raspi - 6.5.0-1007.9 linux-raspi-headers-6.5.0-1007 - 6.5.0-1007.9 linux-raspi-tools-6.5.0-1007 - 6.5.0-1007.9 linux-tools-6.5.0-1007-raspi - 6.5.0-1007.9 No subscription required linux-aws-cloud-tools-6.5.0-1010 - 6.5.0-1010.10 linux-aws-headers-6.5.0-1010 - 6.5.0-1010.10 linux-aws-tools-6.5.0-1010 - 6.5.0-1010.10 linux-buildinfo-6.5.0-1010-aws - 6.5.0-1010.10 linux-cloud-tools-6.5.0-1010-aws - 6.5.0-1010.10 linux-headers-6.5.0-1010-aws - 6.5.0-1010.10 linux-image-6.5.0-1010-aws - 6.5.0-1010.10 linux-image-unsigned-6.5.0-1010-aws - 6.5.0-1010.10 linux-modules-6.5.0-1010-aws - 6.5.0-1010.10 linux-modules-extra-6.5.0-1010-aws - 6.5.0-1010.10 linux-tools-6.5.0-1010-aws - 6.5.0-1010.10 No subscription required linux-buildinfo-6.5.0-1012-oracle - 6.5.0-1012.12 linux-headers-6.5.0-1012-oracle - 6.5.0-1012.12 linux-image-6.5.0-1012-oracle - 6.5.0-1012.12 linux-image-unsigned-6.5.0-1012-oracle - 6.5.0-1012.12 linux-modules-6.5.0-1012-oracle - 6.5.0-1012.12 linux-modules-extra-6.5.0-1012-oracle - 6.5.0-1012.12 linux-modules-iwlwifi-6.5.0-1012-oracle - 6.5.0-1012.12 linux-oracle-headers-6.5.0-1012 - 6.5.0-1012.12 linux-oracle-tools-6.5.0-1012 - 6.5.0-1012.12 linux-tools-6.5.0-1012-oracle - 6.5.0-1012.12 No subscription required linux-buildinfo-6.5.0-13-generic - 6.5.0-13.13 linux-buildinfo-6.5.0-13-generic-64k - 6.5.0-13.13 linux-cloud-tools-6.5.0-13 - 6.5.0-13.13 linux-cloud-tools-6.5.0-13-generic - 6.5.0-13.13 linux-cloud-tools-common - 6.5.0-13.13 linux-doc - 6.5.0-13.13 linux-headers-6.5.0-13 - 6.5.0-13.13 linux-headers-6.5.0-13-generic - 6.5.0-13.13 linux-headers-6.5.0-13-generic-64k - 6.5.0-13.13 linux-image-6.5.0-13-generic - 6.5.0-13.13 linux-image-6.5.0-13-generic-64k - 6.5.0-13.13 linux-image-uc-6.5.0-13-generic - 6.5.0-13.13 linux-image-uc-6.5.0-13-generic-64k - 6.5.0-13.13 linux-image-unsigned-6.5.0-13-generic - 6.5.0-13.13 linux-image-unsigned-6.5.0-13-generic-64k - 6.5.0-13.13 linux-lib-rust-6.5.0-13-generic - 6.5.0-13.13 linux-libc-dev - 6.5.0-13.13 linux-modules-6.5.0-13-generic - 6.5.0-13.13 linux-modules-6.5.0-13-generic-64k - 6.5.0-13.13 linux-modules-extra-6.5.0-13-generic - 6.5.0-13.13 linux-modules-ipu6-6.5.0-13-generic - 6.5.0-13.13 linux-modules-ivsc-6.5.0-13-generic - 6.5.0-13.13 linux-modules-iwlwifi-6.5.0-13-generic - 6.5.0-13.13 linux-source-6.5.0 - 6.5.0-13.13 linux-tools-6.5.0-13 - 6.5.0-13.13 linux-tools-6.5.0-13-generic - 6.5.0-13.13 linux-tools-6.5.0-13-generic-64k - 6.5.0-13.13 linux-tools-common - 6.5.0-13.13 linux-tools-host - 6.5.0-13.13 No subscription required linux-buildinfo-6.5.0-13-lowlatency - 6.5.0-13.13.1 linux-buildinfo-6.5.0-13-lowlatency-64k - 6.5.0-13.13.1 linux-cloud-tools-6.5.0-13-lowlatency - 6.5.0-13.13.1 linux-headers-6.5.0-13-lowlatency - 6.5.0-13.13.1 linux-headers-6.5.0-13-lowlatency-64k - 6.5.0-13.13.1 linux-image-6.5.0-13-lowlatency - 6.5.0-13.13.1 linux-image-6.5.0-13-lowlatency-64k - 6.5.0-13.13.1 linux-image-unsigned-6.5.0-13-lowlatency - 6.5.0-13.13.1 linux-image-unsigned-6.5.0-13-lowlatency-64k - 6.5.0-13.13.1 linux-lowlatency-cloud-tools-6.5.0-13 - 6.5.0-13.13.1 linux-lowlatency-cloud-tools-common - 6.5.0-13.13.1 linux-lowlatency-headers-6.5.0-13 - 6.5.0-13.13.1 linux-lowlatency-lib-rust-6.5.0-13-lowlatency - 6.5.0-13.13.1 linux-lowlatency-tools-6.5.0-13 - 6.5.0-13.13.1 linux-lowlatency-tools-common - 6.5.0-13.13.1 linux-lowlatency-tools-host - 6.5.0-13.13.1 linux-modules-6.5.0-13-lowlatency - 6.5.0-13.13.1 linux-modules-6.5.0-13-lowlatency-64k - 6.5.0-13.13.1 linux-modules-iwlwifi-6.5.0-13-lowlatency - 6.5.0-13.13.1 linux-tools-6.5.0-13-lowlatency - 6.5.0-13.13.1 linux-tools-6.5.0-13-lowlatency-64k - 6.5.0-13.13.1 No subscription required linux-headers-starfive - 6.5.0.1004.6 linux-image-starfive - 6.5.0.1004.6 linux-starfive - 6.5.0.1004.6 linux-tools-starfive - 6.5.0.1004.6 No subscription required linux-headers-laptop-23.10 - 6.5.0.1006.9 linux-image-laptop-23.10 - 6.5.0.1006.9 linux-laptop-23.10 - 6.5.0.1006.9 linux-tools-laptop-23.10 - 6.5.0.1006.9 No subscription required linux-headers-raspi - 6.5.0.1007.8 linux-headers-raspi-nolpae - 6.5.0.1007.8 linux-image-raspi - 6.5.0.1007.8 linux-image-raspi-nolpae - 6.5.0.1007.8 linux-modules-extra-raspi - 6.5.0.1007.8 linux-modules-extra-raspi-nolpae - 6.5.0.1007.8 linux-raspi - 6.5.0.1007.8 linux-raspi-nolpae - 6.5.0.1007.8 linux-tools-raspi - 6.5.0.1007.8 linux-tools-raspi-nolpae - 6.5.0.1007.8 No subscription required linux-aws - 6.5.0.1010.10 linux-headers-aws - 6.5.0.1010.10 linux-image-aws - 6.5.0.1010.10 linux-modules-extra-aws - 6.5.0.1010.10 linux-tools-aws - 6.5.0.1010.10 No subscription required linux-headers-oracle - 6.5.0.1012.12 linux-image-oracle - 6.5.0.1012.12 linux-modules-iwlwifi-oracle - 6.5.0.1012.12 linux-oracle - 6.5.0.1012.12 linux-tools-oracle - 6.5.0.1012.12 No subscription required linux-cloud-tools-lowlatency - 6.5.0.13.13.11 linux-cloud-tools-lowlatency-hwe-20.04 - 6.5.0.13.13.11 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.5.0.13.13.11 linux-cloud-tools-lowlatency-hwe-22.04 - 6.5.0.13.13.11 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.5.0.13.13.11 linux-headers-lowlatency - 6.5.0.13.13.11 linux-headers-lowlatency-64k - 6.5.0.13.13.11 linux-headers-lowlatency-64k-hwe-20.04 - 6.5.0.13.13.11 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.5.0.13.13.11 linux-headers-lowlatency-64k-hwe-22.04 - 6.5.0.13.13.11 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.5.0.13.13.11 linux-headers-lowlatency-hwe-20.04 - 6.5.0.13.13.11 linux-headers-lowlatency-hwe-20.04-edge - 6.5.0.13.13.11 linux-headers-lowlatency-hwe-22.04 - 6.5.0.13.13.11 linux-headers-lowlatency-hwe-22.04-edge - 6.5.0.13.13.11 linux-image-lowlatency - 6.5.0.13.13.11 linux-image-lowlatency-64k - 6.5.0.13.13.11 linux-image-lowlatency-64k-hwe-20.04 - 6.5.0.13.13.11 linux-image-lowlatency-64k-hwe-20.04-edge - 6.5.0.13.13.11 linux-image-lowlatency-64k-hwe-22.04 - 6.5.0.13.13.11 linux-image-lowlatency-64k-hwe-22.04-edge - 6.5.0.13.13.11 linux-image-lowlatency-hwe-20.04 - 6.5.0.13.13.11 linux-image-lowlatency-hwe-20.04-edge - 6.5.0.13.13.11 linux-image-lowlatency-hwe-22.04 - 6.5.0.13.13.11 linux-image-lowlatency-hwe-22.04-edge - 6.5.0.13.13.11 linux-lowlatency - 6.5.0.13.13.11 linux-lowlatency-64k - 6.5.0.13.13.11 linux-lowlatency-64k-hwe-20.04 - 6.5.0.13.13.11 linux-lowlatency-64k-hwe-20.04-edge - 6.5.0.13.13.11 linux-lowlatency-64k-hwe-22.04 - 6.5.0.13.13.11 linux-lowlatency-64k-hwe-22.04-edge - 6.5.0.13.13.11 linux-lowlatency-hwe-20.04 - 6.5.0.13.13.11 linux-lowlatency-hwe-20.04-edge - 6.5.0.13.13.11 linux-lowlatency-hwe-22.04 - 6.5.0.13.13.11 linux-lowlatency-hwe-22.04-edge - 6.5.0.13.13.11 linux-modules-iwlwifi-lowlatency - 6.5.0.13.13.11 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.5.0.13.13.11 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.5.0.13.13.11 linux-tools-lowlatency - 6.5.0.13.13.11 linux-tools-lowlatency-64k - 6.5.0.13.13.11 linux-tools-lowlatency-64k-hwe-20.04 - 6.5.0.13.13.11 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.5.0.13.13.11 linux-tools-lowlatency-64k-hwe-22.04 - 6.5.0.13.13.11 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.5.0.13.13.11 linux-tools-lowlatency-hwe-20.04 - 6.5.0.13.13.11 linux-tools-lowlatency-hwe-20.04-edge - 6.5.0.13.13.11 linux-tools-lowlatency-hwe-22.04 - 6.5.0.13.13.11 linux-tools-lowlatency-hwe-22.04-edge - 6.5.0.13.13.11 No subscription required linux-cloud-tools-generic - 6.5.0.13.15 linux-cloud-tools-generic-hwe-22.04 - 6.5.0.13.15 linux-cloud-tools-generic-hwe-22.04-edge - 6.5.0.13.15 linux-cloud-tools-virtual - 6.5.0.13.15 linux-cloud-tools-virtual-hwe-22.04 - 6.5.0.13.15 linux-cloud-tools-virtual-hwe-22.04-edge - 6.5.0.13.15 linux-crashdump - 6.5.0.13.15 linux-generic - 6.5.0.13.15 linux-generic-64k - 6.5.0.13.15 linux-generic-64k-hwe-22.04 - 6.5.0.13.15 linux-generic-64k-hwe-22.04-edge - 6.5.0.13.15 linux-generic-hwe-22.04 - 6.5.0.13.15 linux-generic-hwe-22.04-edge - 6.5.0.13.15 linux-generic-lpae - 6.5.0.13.15 linux-headers-generic - 6.5.0.13.15 linux-headers-generic-64k - 6.5.0.13.15 linux-headers-generic-64k-hwe-22.04 - 6.5.0.13.15 linux-headers-generic-64k-hwe-22.04-edge - 6.5.0.13.15 linux-headers-generic-hwe-22.04 - 6.5.0.13.15 linux-headers-generic-hwe-22.04-edge - 6.5.0.13.15 linux-headers-generic-lpae - 6.5.0.13.15 linux-headers-kvm - 6.5.0.13.15 linux-headers-oem-22.04 - 6.5.0.13.15 linux-headers-virtual - 6.5.0.13.15 linux-headers-virtual-hwe-22.04 - 6.5.0.13.15 linux-headers-virtual-hwe-22.04-edge - 6.5.0.13.15 linux-image-extra-virtual - 6.5.0.13.15 linux-image-extra-virtual-hwe-22.04 - 6.5.0.13.15 linux-image-extra-virtual-hwe-22.04-edge - 6.5.0.13.15 linux-image-generic - 6.5.0.13.15 linux-image-generic-64k - 6.5.0.13.15 linux-image-generic-64k-hwe-22.04 - 6.5.0.13.15 linux-image-generic-64k-hwe-22.04-edge - 6.5.0.13.15 linux-image-generic-hwe-22.04 - 6.5.0.13.15 linux-image-generic-hwe-22.04-edge - 6.5.0.13.15 linux-image-generic-lpae - 6.5.0.13.15 linux-image-kvm - 6.5.0.13.15 linux-image-oem-22.04 - 6.5.0.13.15 linux-image-uc-generic - 6.5.0.13.15 linux-image-uc-generic-hwe-22.04 - 6.5.0.13.15 linux-image-uc-generic-hwe-22.04-edge - 6.5.0.13.15 linux-image-virtual - 6.5.0.13.15 linux-image-virtual-hwe-22.04 - 6.5.0.13.15 linux-image-virtual-hwe-22.04-edge - 6.5.0.13.15 linux-kvm - 6.5.0.13.15 linux-modules-ipu6-generic - 6.5.0.13.15 linux-modules-ipu6-generic-hwe-22.04 - 6.5.0.13.15 linux-modules-ipu6-generic-hwe-22.04-edge - 6.5.0.13.15 linux-modules-ipu6-oem-22.04 - 6.5.0.13.15 linux-modules-ivsc-generic - 6.5.0.13.15 linux-modules-ivsc-generic-hwe-22.04 - 6.5.0.13.15 linux-modules-ivsc-generic-hwe-22.04-edge - 6.5.0.13.15 linux-modules-ivsc-oem-22.04 - 6.5.0.13.15 linux-modules-iwlwifi-generic - 6.5.0.13.15 linux-modules-iwlwifi-generic-hwe-22.04 - 6.5.0.13.15 linux-modules-iwlwifi-generic-hwe-22.04-edge - 6.5.0.13.15 linux-modules-iwlwifi-oem-22.04 - 6.5.0.13.15 linux-oem-22.04 - 6.5.0.13.15 linux-source - 6.5.0.13.15 linux-tools-generic - 6.5.0.13.15 linux-tools-generic-64k - 6.5.0.13.15 linux-tools-generic-64k-hwe-22.04 - 6.5.0.13.15 linux-tools-generic-64k-hwe-22.04-edge - 6.5.0.13.15 linux-tools-generic-hwe-22.04 - 6.5.0.13.15 linux-tools-generic-hwe-22.04-edge - 6.5.0.13.15 linux-tools-generic-lpae - 6.5.0.13.15 linux-tools-kvm - 6.5.0.13.15 linux-tools-oem-22.04 - 6.5.0.13.15 linux-tools-virtual - 6.5.0.13.15 linux-tools-virtual-hwe-22.04 - 6.5.0.13.15 linux-tools-virtual-hwe-22.04-edge - 6.5.0.13.15 linux-virtual - 6.5.0.13.15 linux-virtual-hwe-22.04 - 6.5.0.13.15 linux-virtual-hwe-22.04-edge - 6.5.0.13.15 No subscription required High CVE-2023-31085 CVE-2023-4244 CVE-2023-5090 CVE-2023-5345 CVE-2023-5633 USN-6504-1 -- tracker-miners vulnerability Ubuntu 23.10 It was discovered that tracker-miners incorrectly handled sandboxing. If a second security issue was discovered in tracker-miners, an attacker could possibly use this issue in combination with it to escape the sandbox. Update Instructions: Run `sudo pro fix USN-6504-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: tracker-extract - 3.4.6-0ubuntu0.23.10.1 tracker-miner-fs - 3.4.6-0ubuntu0.23.10.1 No subscription required Medium CVE-2023-5557 USN-6505-1 -- nghttp2 vulnerability Ubuntu 23.10 It was discovered that nghttp2 incorrectly handled request cancellation. A remote attacker could possibly use this issue to cause nghttp2 to consume resources, leading to a denial of service. Update Instructions: Run `sudo pro fix USN-6505-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libnghttp2-14 - 1.55.1-1ubuntu0.1 libnghttp2-dev - 1.55.1-1ubuntu0.1 libnghttp2-doc - 1.55.1-1ubuntu0.1 nghttp2 - 1.55.1-1ubuntu0.1 nghttp2-client - 1.55.1-1ubuntu0.1 nghttp2-proxy - 1.55.1-1ubuntu0.1 nghttp2-server - 1.55.1-1ubuntu0.1 No subscription required Medium CVE-2023-44487 USN-6506-1 -- Apache HTTP Server vulnerabilities Ubuntu 23.10 David Shoon discovered that the Apache HTTP Server mod_macro module incorrectly handled certain memory operations. A remote attacker could possibly use this issue to cause the server to crash, resulting in a denial of service. (CVE-2023-31122) Prof. Sven Dietrich, Isa Jafarov, Prof. Heejo Lee, and Choongin Lee discovered that the Apache HTTP Server incorrectly handled certain HTTP/2 connections. A remote attacker could possibly use this issue to cause the server to consume resources, leading to a denial of service. This issue only affected Ubuntu 23.04, and Ubuntu 23.10. (CVE-2023-43622) Will Dormann and David Warren discovered that the Apache HTTP Server incorrectly handled memory when handling HTTP/2 connections. A remote attacker could possibly use this issue to cause the server to consume resources, leading to a denial of service. (CVE-2023-45802) Update Instructions: Run `sudo pro fix USN-6506-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: apache2 - 2.4.57-2ubuntu2.1 apache2-bin - 2.4.57-2ubuntu2.1 apache2-data - 2.4.57-2ubuntu2.1 apache2-dev - 2.4.57-2ubuntu2.1 apache2-doc - 2.4.57-2ubuntu2.1 apache2-ssl-dev - 2.4.57-2ubuntu2.1 apache2-suexec-custom - 2.4.57-2ubuntu2.1 apache2-suexec-pristine - 2.4.57-2ubuntu2.1 apache2-utils - 2.4.57-2ubuntu2.1 libapache2-mod-md - 2.4.57-2ubuntu2.1 libapache2-mod-proxy-uwsgi - 2.4.57-2ubuntu2.1 No subscription required Medium CVE-2023-31122 CVE-2023-43622 CVE-2023-45802 USN-6507-1 -- GlusterFS vulnerability Ubuntu 23.10 It was discovered that GlusterFS incorrectly handled certain memory operations. A remote attacker could possibly use this issue to cause GlusterFS to crash, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-6507-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: glusterfs-cli - 10.3-5ubuntu0.1 glusterfs-client - 10.3-5ubuntu0.1 glusterfs-common - 10.3-5ubuntu0.1 glusterfs-server - 10.3-5ubuntu0.1 libgfapi0 - 10.3-5ubuntu0.1 libgfchangelog0 - 10.3-5ubuntu0.1 libgfrpc0 - 10.3-5ubuntu0.1 libgfxdr0 - 10.3-5ubuntu0.1 libglusterd0 - 10.3-5ubuntu0.1 libglusterfs-dev - 10.3-5ubuntu0.1 libglusterfs0 - 10.3-5ubuntu0.1 No subscription required Medium CVE-2022-48340 USN-6515-1 -- Thunderbird vulnerabilities Ubuntu 23.10 Multiple security issues were discovered in Thunderbird. If a user were tricked into opening a specially crafted website in a browsing context, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information, bypass security restrictions, cross-site tracing, or execute arbitrary code. (CVE-2023-6206, CVE-2023-6212) It was discovered that Thudnerbird did not properly manage memory when images were created on the canvas element. An attacker could potentially exploit this issue to obtain sensitive information. (CVE-2023-6204) It discovered that Thunderbird incorrectly handled certain memory when using a MessagePort. An attacker could potentially exploit this issue to cause a denial of service. (CVE-2023-6205) It discovered that Thunderbird incorrectly did not properly manage ownership in ReadableByteStreams. An attacker could potentially exploit this issue to cause a denial of service. (CVE-2023-6207) It discovered that Thudnerbird incorrectly did not properly manage copy operations when using Selection API in X11. An attacker could potentially exploit this issue to obtain sensitive information. (CVE-2023-6208) Rachmat Abdul Rokhim discovered that Thunderbird incorrectly handled parsing of relative URLS starting with "///". An attacker could potentially exploit this issue to cause a denial of service. (CVE-2023-6209) Update Instructions: Run `sudo pro fix USN-6515-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: thunderbird - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-dev - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-gnome-support - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-af - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-ar - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-ast - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-be - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-bg - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-bn - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-bn-bd - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-br - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-ca - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-cak - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-cs - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-cy - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-da - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-de - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-dsb - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-el - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-en - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-en-gb - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-en-us - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-es - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-es-ar - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-es-es - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-et - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-eu - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-fa - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-fi - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-fr - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-fy - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-fy-nl - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-ga - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-ga-ie - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-gd - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-gl - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-he - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-hr - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-hsb - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-hu - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-hy - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-id - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-is - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-it - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-ja - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-ka - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-kab - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-kk - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-ko - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-lt - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-lv - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-mk - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-ms - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-nb - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-nb-no - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-nl - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-nn - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-nn-no - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-pa - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-pa-in - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-pl - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-pt - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-pt-br - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-pt-pt - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-rm - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-ro - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-ru - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-si - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-sk - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-sl - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-sq - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-sr - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-sv - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-sv-se - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-ta - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-ta-lk - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-th - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-tr - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-uk - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-uz - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-vi - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-zh-cn - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-zh-hans - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-zh-hant - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-locale-zh-tw - 1:115.5.0+build1-0ubuntu0.23.10.1 thunderbird-mozsymbols - 1:115.5.0+build1-0ubuntu0.23.10.1 xul-ext-calendar-timezones - 1:115.5.0+build1-0ubuntu0.23.10.1 xul-ext-gdata-provider - 1:115.5.0+build1-0ubuntu0.23.10.1 xul-ext-lightning - 1:115.5.0+build1-0ubuntu0.23.10.1 No subscription required Medium CVE-2023-6204 CVE-2023-6205 CVE-2023-6206 CVE-2023-6207 CVE-2023-6208 CVE-2023-6209 CVE-2023-6212 USN-6517-1 -- Perl vulnerabilities Ubuntu 23.10 It was discovered that Perl incorrectly handled printing certain warning messages. An attacker could possibly use this issue to cause Perl to consume resources, leading to a denial of service. This issue only affected Ubuntu 22.04 LTS. (CVE-2022-48522) Nathan Mills discovered that Perl incorrectly handled certain regular expressions. An attacker could use this issue to cause Perl to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2023-47038) Update Instructions: Run `sudo pro fix USN-6517-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libperl-dev - 5.36.0-9ubuntu1.1 libperl5.36 - 5.36.0-9ubuntu1.1 perl - 5.36.0-9ubuntu1.1 perl-base - 5.36.0-9ubuntu1.1 perl-debug - 5.36.0-9ubuntu1.1 perl-doc - 5.36.0-9ubuntu1.1 perl-modules-5.36 - 5.36.0-9ubuntu1.1 No subscription required Medium CVE-2022-48522 CVE-2023-47038 USN-6521-1 -- GIMP vulnerabilities Ubuntu 23.10 It was discovered that GIMP incorrectly handled certain image files. If a user were tricked into opening a specially crafted image, an attacker could use this issue to cause GIMP to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6521-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gimp - 2.10.34-1ubuntu0.23.10.1 gimp-data - 2.10.34-1ubuntu0.23.10.1 libgimp2.0 - 2.10.34-1ubuntu0.23.10.1 libgimp2.0-dev - 2.10.34-1ubuntu0.23.10.1 libgimp2.0-doc - 2.10.34-1ubuntu0.23.10.1 No subscription required Medium CVE-2022-30067 CVE-2022-32990 CVE-2023-44441 CVE-2023-44442 CVE-2023-44443 CVE-2023-44444 USN-6522-1 -- FreeRDP vulnerabilities Ubuntu 23.10 It was discovered that FreeRDP incorrectly handled drive redirection. If a user were tricked into connection to a malicious server, a remote attacker could use this issue to cause FreeRDP to crash, resulting in a denial of service, or possibly obtain sensitive information. (CVE-2022-41877) It was discovered that FreeRDP incorrectly handled certain surface updates. A remote attacker could use this issue to cause FreeRDP to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2023-39352, CVE-2023-39356) Update Instructions: Run `sudo pro fix USN-6522-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: freerdp2-dev - 2.10.0+dfsg1-1.1ubuntu1.1 freerdp2-shadow-x11 - 2.10.0+dfsg1-1.1ubuntu1.1 freerdp2-wayland - 2.10.0+dfsg1-1.1ubuntu1.1 freerdp2-x11 - 2.10.0+dfsg1-1.1ubuntu1.1 libfreerdp-client2-2 - 2.10.0+dfsg1-1.1ubuntu1.1 libfreerdp-server2-2 - 2.10.0+dfsg1-1.1ubuntu1.1 libfreerdp-shadow-subsystem2-2 - 2.10.0+dfsg1-1.1ubuntu1.1 libfreerdp-shadow2-2 - 2.10.0+dfsg1-1.1ubuntu1.1 libfreerdp2-2 - 2.10.0+dfsg1-1.1ubuntu1.1 libuwac0-0 - 2.10.0+dfsg1-1.1ubuntu1.1 libuwac0-dev - 2.10.0+dfsg1-1.1ubuntu1.1 libwinpr-tools2-2 - 2.10.0+dfsg1-1.1ubuntu1.1 libwinpr2-2 - 2.10.0+dfsg1-1.1ubuntu1.1 libwinpr2-dev - 2.10.0+dfsg1-1.1ubuntu1.1 winpr-utils - 2.10.0+dfsg1-1.1ubuntu1.1 No subscription required Medium CVE-2022-41877 CVE-2023-39352 CVE-2023-39356 USN-6526-1 -- GStreamer Bad Plugins vulnerabilities Ubuntu 23.10 It was discovered that GStreamer Bad Plugins incorrectly handled certain media files. A remote attacker could use this issue to cause GStreamer Bad Plugins to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6526-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-gst-plugins-bad-1.0 - 1.22.4-1ubuntu1.1 gstreamer1.0-opencv - 1.22.4-1ubuntu1.1 gstreamer1.0-plugins-bad - 1.22.4-1ubuntu1.1 gstreamer1.0-plugins-bad-apps - 1.22.4-1ubuntu1.1 libgstreamer-opencv1.0-0 - 1.22.4-1ubuntu1.1 libgstreamer-plugins-bad1.0-0 - 1.22.4-1ubuntu1.1 libgstreamer-plugins-bad1.0-dev - 1.22.4-1ubuntu1.1 No subscription required Medium CVE-2023-37329 CVE-2023-40474 CVE-2023-40475 CVE-2023-40476 CVE-2023-44429 CVE-2023-44446 USN-6527-1 -- OpenJDK vulnerabilities Ubuntu 23.10 Carter Kozak discovered that OpenJDK, when compiling with AVX-512 instruction support enabled, could produce code that resulted in memory corruption in certain situations. An attacker targeting applications built in this way could possibly use this to cause a denial of service or execute arbitrary code. In Ubuntu, OpenJDK defaults to not using AVX-512 instructions. (CVE-2023-22025) It was discovered that OpenJDK did not properly perform PKIX certification path validation in certain situations. An attacker could use this to cause a denial of service. (CVE-2023-22081) Update Instructions: Run `sudo pro fix USN-6527-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-11-demo - 11.0.21+9-0ubuntu1~23.10 openjdk-11-doc - 11.0.21+9-0ubuntu1~23.10 openjdk-11-jdk - 11.0.21+9-0ubuntu1~23.10 openjdk-11-jdk-headless - 11.0.21+9-0ubuntu1~23.10 openjdk-11-jre - 11.0.21+9-0ubuntu1~23.10 openjdk-11-jre-headless - 11.0.21+9-0ubuntu1~23.10 openjdk-11-jre-zero - 11.0.21+9-0ubuntu1~23.10 openjdk-11-source - 11.0.21+9-0ubuntu1~23.10 No subscription required openjdk-17-demo - 17.0.9+9-1~23.10 openjdk-17-doc - 17.0.9+9-1~23.10 openjdk-17-jdk - 17.0.9+9-1~23.10 openjdk-17-jdk-headless - 17.0.9+9-1~23.10 openjdk-17-jre - 17.0.9+9-1~23.10 openjdk-17-jre-headless - 17.0.9+9-1~23.10 openjdk-17-jre-zero - 17.0.9+9-1~23.10 openjdk-17-source - 17.0.9+9-1~23.10 No subscription required openjdk-21-demo - 21.0.1+12-2~23.10 openjdk-21-doc - 21.0.1+12-2~23.10 openjdk-21-jdk - 21.0.1+12-2~23.10 openjdk-21-jdk-headless - 21.0.1+12-2~23.10 openjdk-21-jre - 21.0.1+12-2~23.10 openjdk-21-jre-headless - 21.0.1+12-2~23.10 openjdk-21-jre-zero - 21.0.1+12-2~23.10 openjdk-21-source - 21.0.1+12-2~23.10 No subscription required Medium CVE-2023-22025 CVE-2023-22081 USN-6528-1 -- OpenJDK 8 vulnerabilities Ubuntu 23.10 It was discovered that the HotSpot VM implementation in OpenJDK did not properly validate bytecode blocks in certain situations. An attacker could possibly use this to cause a denial of service. (CVE-2022-40433) Carter Kozak discovered that OpenJDK, when compiling with AVX-512 instruction support enabled, could produce code that resulted in memory corruption in certain situations. An attacker targeting applications built in this way could possibly use this to cause a denial of service or execute arbitrary code. In Ubuntu, OpenJDK defaults to not using AVX-512 instructions. (CVE-2023-22025) It was discovered that the CORBA implementation in OpenJDK did not properly perform deserialization of IOR string objects. An attacker could possibly use this to bypass Java sandbox restrictions. (CVE-2023-22067) It was discovered that OpenJDK did not properly perform PKIX certification path validation in certain situations. An attacker could use this to cause a denial of service. (CVE-2023-22081) Update Instructions: Run `sudo pro fix USN-6528-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-8-demo - 8u392-ga-1~23.10 openjdk-8-doc - 8u392-ga-1~23.10 openjdk-8-jdk - 8u392-ga-1~23.10 openjdk-8-jdk-headless - 8u392-ga-1~23.10 openjdk-8-jre - 8u392-ga-1~23.10 openjdk-8-jre-headless - 8u392-ga-1~23.10 openjdk-8-jre-zero - 8u392-ga-1~23.10 openjdk-8-source - 8u392-ga-1~23.10 No subscription required Medium CVE-2023-22025 CVE-2023-22067 CVE-2023-22081 USN-6529-1 -- Request Tracker vulnerabilities Ubuntu 23.10 It was discovered that Request Tracker incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to obtain sensitive information. (CVE-2021-38562, CVE-2022-25802, CVE-2023-41259, CVE-2023-41260) Update Instructions: Run `sudo pro fix USN-6529-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: request-tracker4 - 4.4.4+dfsg-2ubuntu1.23.10.1 rt4-apache2 - 4.4.4+dfsg-2ubuntu1.23.10.1 rt4-clients - 4.4.4+dfsg-2ubuntu1.23.10.1 rt4-db-mysql - 4.4.4+dfsg-2ubuntu1.23.10.1 rt4-db-postgresql - 4.4.4+dfsg-2ubuntu1.23.10.1 rt4-db-sqlite - 4.4.4+dfsg-2ubuntu1.23.10.1 rt4-doc-html - 4.4.4+dfsg-2ubuntu1.23.10.1 rt4-fcgi - 4.4.4+dfsg-2ubuntu1.23.10.1 rt4-standalone - 4.4.4+dfsg-2ubuntu1.23.10.1 No subscription required Medium CVE-2021-38562 CVE-2022-25802 CVE-2023-41259 CVE-2023-41260 USN-6535-1 -- curl vulnerabilities Ubuntu 23.10 Harry Sintonen discovered that curl incorrectly handled mixed case cookie domains. A remote attacker could possibly use this issue to set cookies that get sent to different and unrelated sites and domains. (CVE-2023-46218) Maksymilian Arciemowicz discovered that curl incorrectly handled long file names when saving HSTS data. This could result in curl losing HSTS data, and subsequent requests to a site would be done without it, contrary to expectations. This issue only affected Ubuntu 23.04 and Ubuntu 23.10. (CVE-2023-46219) Update Instructions: Run `sudo pro fix USN-6535-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: curl - 8.2.1-1ubuntu3.2 libcurl3-gnutls - 8.2.1-1ubuntu3.2 libcurl3-nss - 8.2.1-1ubuntu3.2 libcurl4 - 8.2.1-1ubuntu3.2 libcurl4-doc - 8.2.1-1ubuntu3.2 libcurl4-gnutls-dev - 8.2.1-1ubuntu3.2 libcurl4-nss-dev - 8.2.1-1ubuntu3.2 libcurl4-openssl-dev - 8.2.1-1ubuntu3.2 No subscription required Medium CVE-2023-46218 CVE-2023-46219 USN-6536-1 -- Linux kernel vulnerabilities Ubuntu 23.10 Lucas Leong discovered that the netfilter subsystem in the Linux kernel did not properly validate some attributes passed from userspace. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information (kernel memory). (CVE-2023-39189) Kyle Zeng discovered that the IPv4 implementation in the Linux kernel did not properly handle socket buffers (skb) when performing IP routing in certain circumstances, leading to a null pointer dereference vulnerability. A privileged attacker could use this to cause a denial of service (system crash). (CVE-2023-42754) Yikebaer Aizezi discovered that the ext4 file system implementation in the Linux kernel contained a use-after-free vulnerability when handling inode extent metadata. An attacker could use this to construct a malicious ext4 file system image that, when mounted, could cause a denial of service (system crash). (CVE-2023-45898) Jason Wang discovered that the virtio ring implementation in the Linux kernel did not properly handle iov buffers in some situations. A local attacker in a guest VM could use this to cause a denial of service (host system crash). (CVE-2023-5158) Alon Zahavi discovered that the NVMe-oF/TCP subsystem in the Linux kernel did not properly handle queue initialization failures in certain situations, leading to a use-after-free vulnerability. A remote attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-5178) Budimir Markovic discovered that the perf subsystem in the Linux kernel did not properly handle event groups, leading to an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-5717) Update Instructions: Run `sudo pro fix USN-6536-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.5.0-1005-starfive - 6.5.0-1005.6 linux-headers-6.5.0-1005-starfive - 6.5.0-1005.6 linux-image-6.5.0-1005-starfive - 6.5.0-1005.6 linux-modules-6.5.0-1005-starfive - 6.5.0-1005.6 linux-modules-extra-6.5.0-1005-starfive - 6.5.0-1005.6 linux-starfive-headers-6.5.0-1005 - 6.5.0-1005.6 linux-starfive-tools-6.5.0-1005 - 6.5.0-1005.6 linux-tools-6.5.0-1005-starfive - 6.5.0-1005.6 No subscription required linux-buildinfo-6.5.0-1007-laptop - 6.5.0-1007.10 linux-headers-6.5.0-1007-laptop - 6.5.0-1007.10 linux-image-6.5.0-1007-laptop - 6.5.0-1007.10 linux-laptop-headers-6.5.0-1007 - 6.5.0-1007.10 linux-laptop-tools-6.5.0-1007 - 6.5.0-1007.10 linux-modules-6.5.0-1007-laptop - 6.5.0-1007.10 linux-tools-6.5.0-1007-laptop - 6.5.0-1007.10 No subscription required linux-buildinfo-6.5.0-1008-raspi - 6.5.0-1008.11 linux-headers-6.5.0-1008-raspi - 6.5.0-1008.11 linux-image-6.5.0-1008-raspi - 6.5.0-1008.11 linux-modules-6.5.0-1008-raspi - 6.5.0-1008.11 linux-modules-extra-6.5.0-1008-raspi - 6.5.0-1008.11 linux-raspi-headers-6.5.0-1008 - 6.5.0-1008.11 linux-raspi-tools-6.5.0-1008 - 6.5.0-1008.11 linux-tools-6.5.0-1008-raspi - 6.5.0-1008.11 No subscription required linux-aws-cloud-tools-6.5.0-1011 - 6.5.0-1011.11 linux-aws-headers-6.5.0-1011 - 6.5.0-1011.11 linux-aws-tools-6.5.0-1011 - 6.5.0-1011.11 linux-buildinfo-6.5.0-1011-aws - 6.5.0-1011.11 linux-cloud-tools-6.5.0-1011-aws - 6.5.0-1011.11 linux-headers-6.5.0-1011-aws - 6.5.0-1011.11 linux-image-6.5.0-1011-aws - 6.5.0-1011.11 linux-image-unsigned-6.5.0-1011-aws - 6.5.0-1011.11 linux-modules-6.5.0-1011-aws - 6.5.0-1011.11 linux-modules-extra-6.5.0-1011-aws - 6.5.0-1011.11 linux-tools-6.5.0-1011-aws - 6.5.0-1011.11 No subscription required linux-buildinfo-6.5.0-1013-oracle - 6.5.0-1013.13 linux-headers-6.5.0-1013-oracle - 6.5.0-1013.13 linux-image-6.5.0-1013-oracle - 6.5.0-1013.13 linux-image-unsigned-6.5.0-1013-oracle - 6.5.0-1013.13 linux-modules-6.5.0-1013-oracle - 6.5.0-1013.13 linux-modules-extra-6.5.0-1013-oracle - 6.5.0-1013.13 linux-modules-iwlwifi-6.5.0-1013-oracle - 6.5.0-1013.13 linux-oracle-headers-6.5.0-1013 - 6.5.0-1013.13 linux-oracle-tools-6.5.0-1013 - 6.5.0-1013.13 linux-tools-6.5.0-1013-oracle - 6.5.0-1013.13 No subscription required linux-buildinfo-6.5.0-14-generic - 6.5.0-14.14 linux-buildinfo-6.5.0-14-generic-64k - 6.5.0-14.14 linux-cloud-tools-6.5.0-14 - 6.5.0-14.14 linux-cloud-tools-6.5.0-14-generic - 6.5.0-14.14 linux-cloud-tools-common - 6.5.0-14.14 linux-doc - 6.5.0-14.14 linux-headers-6.5.0-14 - 6.5.0-14.14 linux-headers-6.5.0-14-generic - 6.5.0-14.14 linux-headers-6.5.0-14-generic-64k - 6.5.0-14.14 linux-image-6.5.0-14-generic - 6.5.0-14.14 linux-image-6.5.0-14-generic-64k - 6.5.0-14.14 linux-image-uc-6.5.0-14-generic - 6.5.0-14.14 linux-image-uc-6.5.0-14-generic-64k - 6.5.0-14.14 linux-image-unsigned-6.5.0-14-generic - 6.5.0-14.14 linux-image-unsigned-6.5.0-14-generic-64k - 6.5.0-14.14 linux-lib-rust-6.5.0-14-generic - 6.5.0-14.14 linux-libc-dev - 6.5.0-14.14 linux-modules-6.5.0-14-generic - 6.5.0-14.14 linux-modules-6.5.0-14-generic-64k - 6.5.0-14.14 linux-modules-extra-6.5.0-14-generic - 6.5.0-14.14 linux-modules-ipu6-6.5.0-14-generic - 6.5.0-14.14 linux-modules-ivsc-6.5.0-14-generic - 6.5.0-14.14 linux-modules-iwlwifi-6.5.0-14-generic - 6.5.0-14.14 linux-source-6.5.0 - 6.5.0-14.14 linux-tools-6.5.0-14 - 6.5.0-14.14 linux-tools-6.5.0-14-generic - 6.5.0-14.14 linux-tools-6.5.0-14-generic-64k - 6.5.0-14.14 linux-tools-common - 6.5.0-14.14 linux-tools-host - 6.5.0-14.14 No subscription required linux-buildinfo-6.5.0-14-lowlatency - 6.5.0-14.14.1 linux-buildinfo-6.5.0-14-lowlatency-64k - 6.5.0-14.14.1 linux-cloud-tools-6.5.0-14-lowlatency - 6.5.0-14.14.1 linux-headers-6.5.0-14-lowlatency - 6.5.0-14.14.1 linux-headers-6.5.0-14-lowlatency-64k - 6.5.0-14.14.1 linux-image-6.5.0-14-lowlatency - 6.5.0-14.14.1 linux-image-6.5.0-14-lowlatency-64k - 6.5.0-14.14.1 linux-image-unsigned-6.5.0-14-lowlatency - 6.5.0-14.14.1 linux-image-unsigned-6.5.0-14-lowlatency-64k - 6.5.0-14.14.1 linux-lowlatency-cloud-tools-6.5.0-14 - 6.5.0-14.14.1 linux-lowlatency-cloud-tools-common - 6.5.0-14.14.1 linux-lowlatency-headers-6.5.0-14 - 6.5.0-14.14.1 linux-lowlatency-lib-rust-6.5.0-14-lowlatency - 6.5.0-14.14.1 linux-lowlatency-tools-6.5.0-14 - 6.5.0-14.14.1 linux-lowlatency-tools-common - 6.5.0-14.14.1 linux-lowlatency-tools-host - 6.5.0-14.14.1 linux-modules-6.5.0-14-lowlatency - 6.5.0-14.14.1 linux-modules-6.5.0-14-lowlatency-64k - 6.5.0-14.14.1 linux-modules-iwlwifi-6.5.0-14-lowlatency - 6.5.0-14.14.1 linux-tools-6.5.0-14-lowlatency - 6.5.0-14.14.1 linux-tools-6.5.0-14-lowlatency-64k - 6.5.0-14.14.1 No subscription required linux-headers-starfive - 6.5.0.1005.7 linux-image-starfive - 6.5.0.1005.7 linux-starfive - 6.5.0.1005.7 linux-tools-starfive - 6.5.0.1005.7 No subscription required linux-headers-laptop-23.10 - 6.5.0.1007.10 linux-image-laptop-23.10 - 6.5.0.1007.10 linux-laptop-23.10 - 6.5.0.1007.10 linux-tools-laptop-23.10 - 6.5.0.1007.10 No subscription required linux-headers-raspi - 6.5.0.1008.9 linux-headers-raspi-nolpae - 6.5.0.1008.9 linux-image-raspi - 6.5.0.1008.9 linux-image-raspi-nolpae - 6.5.0.1008.9 linux-modules-extra-raspi - 6.5.0.1008.9 linux-modules-extra-raspi-nolpae - 6.5.0.1008.9 linux-raspi - 6.5.0.1008.9 linux-raspi-nolpae - 6.5.0.1008.9 linux-tools-raspi - 6.5.0.1008.9 linux-tools-raspi-nolpae - 6.5.0.1008.9 No subscription required linux-aws - 6.5.0.1011.11 linux-headers-aws - 6.5.0.1011.11 linux-image-aws - 6.5.0.1011.11 linux-modules-extra-aws - 6.5.0.1011.11 linux-tools-aws - 6.5.0.1011.11 No subscription required linux-headers-oracle - 6.5.0.1013.13 linux-image-oracle - 6.5.0.1013.13 linux-modules-iwlwifi-oracle - 6.5.0.1013.13 linux-oracle - 6.5.0.1013.13 linux-tools-oracle - 6.5.0.1013.13 No subscription required linux-cloud-tools-lowlatency - 6.5.0.14.14.12 linux-cloud-tools-lowlatency-hwe-20.04 - 6.5.0.14.14.12 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.5.0.14.14.12 linux-cloud-tools-lowlatency-hwe-22.04 - 6.5.0.14.14.12 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.5.0.14.14.12 linux-headers-lowlatency - 6.5.0.14.14.12 linux-headers-lowlatency-64k - 6.5.0.14.14.12 linux-headers-lowlatency-64k-hwe-20.04 - 6.5.0.14.14.12 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.5.0.14.14.12 linux-headers-lowlatency-64k-hwe-22.04 - 6.5.0.14.14.12 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.5.0.14.14.12 linux-headers-lowlatency-hwe-20.04 - 6.5.0.14.14.12 linux-headers-lowlatency-hwe-20.04-edge - 6.5.0.14.14.12 linux-headers-lowlatency-hwe-22.04 - 6.5.0.14.14.12 linux-headers-lowlatency-hwe-22.04-edge - 6.5.0.14.14.12 linux-image-lowlatency - 6.5.0.14.14.12 linux-image-lowlatency-64k - 6.5.0.14.14.12 linux-image-lowlatency-64k-hwe-20.04 - 6.5.0.14.14.12 linux-image-lowlatency-64k-hwe-20.04-edge - 6.5.0.14.14.12 linux-image-lowlatency-64k-hwe-22.04 - 6.5.0.14.14.12 linux-image-lowlatency-64k-hwe-22.04-edge - 6.5.0.14.14.12 linux-image-lowlatency-hwe-20.04 - 6.5.0.14.14.12 linux-image-lowlatency-hwe-20.04-edge - 6.5.0.14.14.12 linux-image-lowlatency-hwe-22.04 - 6.5.0.14.14.12 linux-image-lowlatency-hwe-22.04-edge - 6.5.0.14.14.12 linux-lowlatency - 6.5.0.14.14.12 linux-lowlatency-64k - 6.5.0.14.14.12 linux-lowlatency-64k-hwe-20.04 - 6.5.0.14.14.12 linux-lowlatency-64k-hwe-20.04-edge - 6.5.0.14.14.12 linux-lowlatency-64k-hwe-22.04 - 6.5.0.14.14.12 linux-lowlatency-64k-hwe-22.04-edge - 6.5.0.14.14.12 linux-lowlatency-hwe-20.04 - 6.5.0.14.14.12 linux-lowlatency-hwe-20.04-edge - 6.5.0.14.14.12 linux-lowlatency-hwe-22.04 - 6.5.0.14.14.12 linux-lowlatency-hwe-22.04-edge - 6.5.0.14.14.12 linux-modules-iwlwifi-lowlatency - 6.5.0.14.14.12 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.5.0.14.14.12 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.5.0.14.14.12 linux-tools-lowlatency - 6.5.0.14.14.12 linux-tools-lowlatency-64k - 6.5.0.14.14.12 linux-tools-lowlatency-64k-hwe-20.04 - 6.5.0.14.14.12 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.5.0.14.14.12 linux-tools-lowlatency-64k-hwe-22.04 - 6.5.0.14.14.12 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.5.0.14.14.12 linux-tools-lowlatency-hwe-20.04 - 6.5.0.14.14.12 linux-tools-lowlatency-hwe-20.04-edge - 6.5.0.14.14.12 linux-tools-lowlatency-hwe-22.04 - 6.5.0.14.14.12 linux-tools-lowlatency-hwe-22.04-edge - 6.5.0.14.14.12 No subscription required linux-cloud-tools-generic - 6.5.0.14.16 linux-cloud-tools-generic-hwe-22.04 - 6.5.0.14.16 linux-cloud-tools-generic-hwe-22.04-edge - 6.5.0.14.16 linux-cloud-tools-virtual - 6.5.0.14.16 linux-cloud-tools-virtual-hwe-22.04 - 6.5.0.14.16 linux-cloud-tools-virtual-hwe-22.04-edge - 6.5.0.14.16 linux-crashdump - 6.5.0.14.16 linux-generic - 6.5.0.14.16 linux-generic-64k - 6.5.0.14.16 linux-generic-64k-hwe-22.04 - 6.5.0.14.16 linux-generic-64k-hwe-22.04-edge - 6.5.0.14.16 linux-generic-hwe-22.04 - 6.5.0.14.16 linux-generic-hwe-22.04-edge - 6.5.0.14.16 linux-generic-lpae - 6.5.0.14.16 linux-headers-generic - 6.5.0.14.16 linux-headers-generic-64k - 6.5.0.14.16 linux-headers-generic-64k-hwe-22.04 - 6.5.0.14.16 linux-headers-generic-64k-hwe-22.04-edge - 6.5.0.14.16 linux-headers-generic-hwe-22.04 - 6.5.0.14.16 linux-headers-generic-hwe-22.04-edge - 6.5.0.14.16 linux-headers-generic-lpae - 6.5.0.14.16 linux-headers-kvm - 6.5.0.14.16 linux-headers-oem-22.04 - 6.5.0.14.16 linux-headers-virtual - 6.5.0.14.16 linux-headers-virtual-hwe-22.04 - 6.5.0.14.16 linux-headers-virtual-hwe-22.04-edge - 6.5.0.14.16 linux-image-extra-virtual - 6.5.0.14.16 linux-image-extra-virtual-hwe-22.04 - 6.5.0.14.16 linux-image-extra-virtual-hwe-22.04-edge - 6.5.0.14.16 linux-image-generic - 6.5.0.14.16 linux-image-generic-64k - 6.5.0.14.16 linux-image-generic-64k-hwe-22.04 - 6.5.0.14.16 linux-image-generic-64k-hwe-22.04-edge - 6.5.0.14.16 linux-image-generic-hwe-22.04 - 6.5.0.14.16 linux-image-generic-hwe-22.04-edge - 6.5.0.14.16 linux-image-generic-lpae - 6.5.0.14.16 linux-image-kvm - 6.5.0.14.16 linux-image-oem-22.04 - 6.5.0.14.16 linux-image-uc-generic - 6.5.0.14.16 linux-image-uc-generic-hwe-22.04 - 6.5.0.14.16 linux-image-uc-generic-hwe-22.04-edge - 6.5.0.14.16 linux-image-virtual - 6.5.0.14.16 linux-image-virtual-hwe-22.04 - 6.5.0.14.16 linux-image-virtual-hwe-22.04-edge - 6.5.0.14.16 linux-kvm - 6.5.0.14.16 linux-modules-ipu6-generic - 6.5.0.14.16 linux-modules-ipu6-generic-hwe-22.04 - 6.5.0.14.16 linux-modules-ipu6-generic-hwe-22.04-edge - 6.5.0.14.16 linux-modules-ipu6-oem-22.04 - 6.5.0.14.16 linux-modules-ivsc-generic - 6.5.0.14.16 linux-modules-ivsc-generic-hwe-22.04 - 6.5.0.14.16 linux-modules-ivsc-generic-hwe-22.04-edge - 6.5.0.14.16 linux-modules-ivsc-oem-22.04 - 6.5.0.14.16 linux-modules-iwlwifi-generic - 6.5.0.14.16 linux-modules-iwlwifi-generic-hwe-22.04 - 6.5.0.14.16 linux-modules-iwlwifi-generic-hwe-22.04-edge - 6.5.0.14.16 linux-modules-iwlwifi-oem-22.04 - 6.5.0.14.16 linux-oem-22.04 - 6.5.0.14.16 linux-source - 6.5.0.14.16 linux-tools-generic - 6.5.0.14.16 linux-tools-generic-64k - 6.5.0.14.16 linux-tools-generic-64k-hwe-22.04 - 6.5.0.14.16 linux-tools-generic-64k-hwe-22.04-edge - 6.5.0.14.16 linux-tools-generic-hwe-22.04 - 6.5.0.14.16 linux-tools-generic-hwe-22.04-edge - 6.5.0.14.16 linux-tools-generic-lpae - 6.5.0.14.16 linux-tools-kvm - 6.5.0.14.16 linux-tools-oem-22.04 - 6.5.0.14.16 linux-tools-virtual - 6.5.0.14.16 linux-tools-virtual-hwe-22.04 - 6.5.0.14.16 linux-tools-virtual-hwe-22.04-edge - 6.5.0.14.16 linux-virtual - 6.5.0.14.16 linux-virtual-hwe-22.04 - 6.5.0.14.16 linux-virtual-hwe-22.04-edge - 6.5.0.14.16 No subscription required Medium CVE-2023-39189 CVE-2023-42754 CVE-2023-45898 CVE-2023-5158 CVE-2023-5178 CVE-2023-5717 USN-6537-1 -- Linux kernel (GCP) vulnerabilities Ubuntu 23.10 Yu Hao discovered that the UBI driver in the Linux kernel did not properly check for MTD with zero erasesize during device attachment. A local privileged attacker could use this to cause a denial of service (system crash). (CVE-2023-31085) Lucas Leong discovered that the netfilter subsystem in the Linux kernel did not properly validate some attributes passed from userspace. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information (kernel memory). (CVE-2023-39189) Bien Pham discovered that the netfiler subsystem in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. A local user could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-4244) Kyle Zeng discovered that the IPv4 implementation in the Linux kernel did not properly handle socket buffers (skb) when performing IP routing in certain circumstances, leading to a null pointer dereference vulnerability. A privileged attacker could use this to cause a denial of service (system crash). (CVE-2023-42754) Yikebaer Aizezi discovered that the ext4 file system implementation in the Linux kernel contained a use-after-free vulnerability when handling inode extent metadata. An attacker could use this to construct a malicious ext4 file system image that, when mounted, could cause a denial of service (system crash). (CVE-2023-45898) Maxim Levitsky discovered that the KVM nested virtualization (SVM) implementation for AMD processors in the Linux kernel did not properly handle x2AVIC MSRs. An attacker in a guest VM could use this to cause a denial of service (host kernel crash). (CVE-2023-5090) Jason Wang discovered that the virtio ring implementation in the Linux kernel did not properly handle iov buffers in some situations. A local attacker in a guest VM could use this to cause a denial of service (host system crash). (CVE-2023-5158) Alon Zahavi discovered that the NVMe-oF/TCP subsystem in the Linux kernel did not properly handle queue initialization failures in certain situations, leading to a use-after-free vulnerability. A remote attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-5178) It was discovered that the SMB network file sharing protocol implementation in the Linux kernel did not properly handle certain error conditions, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-5345) Murray McAllister discovered that the VMware Virtual GPU DRM driver in the Linux kernel did not properly handle memory objects when storing surfaces, leading to a use-after-free vulnerability. A local attacker in a guest VM could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-5633) Budimir Markovic discovered that the perf subsystem in the Linux kernel did not properly handle event groups, leading to an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-5717) Update Instructions: Run `sudo pro fix USN-6537-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.5.0-1010-gcp - 6.5.0-1010.10 linux-gcp-headers-6.5.0-1010 - 6.5.0-1010.10 linux-gcp-tools-6.5.0-1010 - 6.5.0-1010.10 linux-headers-6.5.0-1010-gcp - 6.5.0-1010.10 linux-image-6.5.0-1010-gcp - 6.5.0-1010.10 linux-image-unsigned-6.5.0-1010-gcp - 6.5.0-1010.10 linux-modules-6.5.0-1010-gcp - 6.5.0-1010.10 linux-modules-extra-6.5.0-1010-gcp - 6.5.0-1010.10 linux-modules-iwlwifi-6.5.0-1010-gcp - 6.5.0-1010.10 linux-tools-6.5.0-1010-gcp - 6.5.0-1010.10 No subscription required linux-gcp - 6.5.0.1010.10 linux-headers-gcp - 6.5.0.1010.10 linux-image-gcp - 6.5.0.1010.10 linux-modules-extra-gcp - 6.5.0.1010.10 linux-modules-iwlwifi-gcp - 6.5.0.1010.10 linux-tools-gcp - 6.5.0.1010.10 No subscription required High CVE-2023-31085 CVE-2023-39189 CVE-2023-4244 CVE-2023-42754 CVE-2023-45898 CVE-2023-5090 CVE-2023-5158 CVE-2023-5178 CVE-2023-5345 CVE-2023-5633 CVE-2023-5717 USN-6538-1 -- PostgreSQL vulnerabilities Ubuntu 23.10 Jingzhou Fu discovered that PostgreSQL incorrectly handled certain unknown arguments in aggregate function calls. A remote attacker could possibly use this issue to obtain sensitive information. (CVE-2023-5868) Pedro Gallegos discovered that PostgreSQL incorrectly handled modifying certain SQL array values. A remote attacker could use this issue to obtain sensitive information, or possibly execute arbitrary code. (CVE-2023-5869) Hemanth Sandrana and Mahendrakar Srinivasarao discovered that PostgreSQL allowed the pg_signal_backend role to signal certain superuser processes, contrary to expectations. (CVE-2023-5870) Update Instructions: Run `sudo pro fix USN-6538-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libecpg-compat3 - 15.5-0ubuntu0.23.10.1 libecpg-dev - 15.5-0ubuntu0.23.10.1 libecpg6 - 15.5-0ubuntu0.23.10.1 libpgtypes3 - 15.5-0ubuntu0.23.10.1 libpq-dev - 15.5-0ubuntu0.23.10.1 libpq5 - 15.5-0ubuntu0.23.10.1 postgresql-15 - 15.5-0ubuntu0.23.10.1 postgresql-client-15 - 15.5-0ubuntu0.23.10.1 postgresql-doc-15 - 15.5-0ubuntu0.23.10.1 postgresql-plperl-15 - 15.5-0ubuntu0.23.10.1 postgresql-plpython3-15 - 15.5-0ubuntu0.23.10.1 postgresql-pltcl-15 - 15.5-0ubuntu0.23.10.1 postgresql-server-dev-15 - 15.5-0ubuntu0.23.10.1 No subscription required Medium CVE-2023-5868 CVE-2023-5869 CVE-2023-5870 USN-6539-1 -- python-cryptography vulnerabilities Ubuntu 23.10 It was discovered that the python-cryptography Cipher.update_into function would incorrectly accept objects with immutable buffers. This would result in corrupted output, contrary to expectations. This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 23.04. (CVE-2023-23931) It was dicovered that python-cryptography incorrectly handled loading certain PKCS7 certificates. A remote attacker could possibly use this issue to cause python-cryptography to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS, Ubuntu 23.04, and Ubuntu 23.10. (CVE-2023-49083) Update Instructions: Run `sudo pro fix USN-6539-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-cryptography-doc - 38.0.4-4ubuntu0.23.10.1 python3-cryptography - 38.0.4-4ubuntu0.23.10.1 No subscription required Medium CVE-2023-23931 CVE-2023-49083 USN-6540-1 -- BlueZ vulnerability Ubuntu 23.10 It was discovered that BlueZ did not properly restrict non-bonded devices from injecting HID events into the input subsystem. This could allow a physically proximate attacker to inject keystrokes and execute arbitrary commands whilst the device is discoverable. Update Instructions: Run `sudo pro fix USN-6540-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: bluetooth - 5.68-0ubuntu1.1 bluez - 5.68-0ubuntu1.1 bluez-cups - 5.68-0ubuntu1.1 bluez-hcidump - 5.68-0ubuntu1.1 bluez-meshd - 5.68-0ubuntu1.1 bluez-obexd - 5.68-0ubuntu1.1 bluez-tests - 5.68-0ubuntu1.1 libbluetooth-dev - 5.68-0ubuntu1.1 libbluetooth3 - 5.68-0ubuntu1.1 No subscription required Medium CVE-2023-45866 USN-6543-1 -- GNU Tar vulnerability Ubuntu 23.10 It was discovered that tar incorrectly handled extended attributes in PAX archives. An attacker could use this issue to cause tar to crash, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-6543-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: tar - 1.34+dfsg-1.2ubuntu1.1 tar-scripts - 1.34+dfsg-1.2ubuntu1.1 No subscription required Medium CVE-2023-39804 USN-6545-1 -- WebKitGTK vulnerabilities Ubuntu 23.10 Several security issues were discovered in the WebKitGTK Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution. Update Instructions: Run `sudo pro fix USN-6545-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-javascriptcoregtk-4.0 - 2.42.3-0ubuntu0.23.10.1 gir1.2-javascriptcoregtk-4.1 - 2.42.3-0ubuntu0.23.10.1 gir1.2-javascriptcoregtk-6.0 - 2.42.3-0ubuntu0.23.10.1 gir1.2-webkit-6.0 - 2.42.3-0ubuntu0.23.10.1 gir1.2-webkit2-4.0 - 2.42.3-0ubuntu0.23.10.1 gir1.2-webkit2-4.1 - 2.42.3-0ubuntu0.23.10.1 libjavascriptcoregtk-4.0-18 - 2.42.3-0ubuntu0.23.10.1 libjavascriptcoregtk-4.0-bin - 2.42.3-0ubuntu0.23.10.1 libjavascriptcoregtk-4.0-dev - 2.42.3-0ubuntu0.23.10.1 libjavascriptcoregtk-4.1-0 - 2.42.3-0ubuntu0.23.10.1 libjavascriptcoregtk-4.1-dev - 2.42.3-0ubuntu0.23.10.1 libjavascriptcoregtk-6.0-1 - 2.42.3-0ubuntu0.23.10.1 libjavascriptcoregtk-6.0-dev - 2.42.3-0ubuntu0.23.10.1 libwebkit2gtk-4.0-37 - 2.42.3-0ubuntu0.23.10.1 libwebkit2gtk-4.0-dev - 2.42.3-0ubuntu0.23.10.1 libwebkit2gtk-4.0-doc - 2.42.3-0ubuntu0.23.10.1 libwebkit2gtk-4.1-0 - 2.42.3-0ubuntu0.23.10.1 libwebkit2gtk-4.1-dev - 2.42.3-0ubuntu0.23.10.1 libwebkitgtk-6.0-4 - 2.42.3-0ubuntu0.23.10.1 libwebkitgtk-6.0-dev - 2.42.3-0ubuntu0.23.10.1 webkit2gtk-driver - 2.42.3-0ubuntu0.23.10.1 No subscription required Medium CVE-2023-42916 CVE-2023-42917 USN-6546-1 -- LibreOffice vulnerabilities Ubuntu 23.10 Reginaldo Silva discovered that LibreOffice incorrectly handled filenames when passing embedded videos to GStreamer. If a user were tricked into opening a specially crafted file, a remote attacker could possibly use this issue to execute arbitrary GStreamer plugins. (CVE-2023-6185) Reginaldo Silva discovered that LibreOffice incorrectly handled certain non-typical hyperlinks. If a user were tricked into opening a specially crafted file, a remote attacker could possibly use this issue to execute arbitrary scripts. (CVE-2023-6186) Update Instructions: Run `sudo pro fix USN-6546-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libreoffice-nlpsolver - 4:0.9+LibO7.6.4-0ubuntu0.23.10.1 No subscription required libreoffice-wiki-publisher - 4:1.2.0+LibO7.6.4-0ubuntu0.23.10.1 No subscription required fonts-opensymbol - 4:102.12+LibO7.6.4-0ubuntu0.23.10.1 No subscription required gir1.2-lokdocview-0.1 - 4:7.6.4-0ubuntu0.23.10.1 libjuh-java - 4:7.6.4-0ubuntu0.23.10.1 libjurt-java - 4:7.6.4-0ubuntu0.23.10.1 liblibreoffice-java - 4:7.6.4-0ubuntu0.23.10.1 liblibreofficekitgtk - 4:7.6.4-0ubuntu0.23.10.1 libofficebean-java - 4:7.6.4-0ubuntu0.23.10.1 libreoffice - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-base - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-base-core - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-base-drivers - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-base-nogui - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-calc - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-calc-nogui - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-common - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-core - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-core-nogui - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-dev - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-dev-common - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-dev-doc - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-dev-gui - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-draw - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-draw-nogui - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-evolution - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-gnome - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-gtk3 - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-gtk4 - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-help-ca - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-help-common - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-help-cs - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-help-da - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-help-de - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-help-dz - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-help-el - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-help-en-gb - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-help-en-us - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-help-es - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-help-et - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-help-eu - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-help-fi - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-help-fr - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-help-gl - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-help-hi - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-help-hu - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-help-id - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-help-it - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-help-ja - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-help-km - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-help-ko - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-help-nl - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-help-om - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-help-pl - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-help-pt - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-help-pt-br - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-help-ru - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-help-sk - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-help-sl - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-help-sv - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-help-tr - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-help-vi - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-help-zh-cn - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-help-zh-tw - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-impress - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-impress-nogui - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-java-common - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-kf5 - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-af - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-am - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-ar - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-as - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-ast - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-be - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-bg - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-bn - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-br - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-bs - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-ca - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-cs - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-cy - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-da - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-de - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-dz - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-el - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-en-gb - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-en-za - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-eo - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-es - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-et - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-eu - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-fa - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-fi - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-fr - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-ga - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-gd - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-gl - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-gu - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-gug - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-he - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-hi - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-hr - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-hu - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-id - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-in - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-is - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-it - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-ja - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-ka - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-kk - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-km - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-kmr - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-kn - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-ko - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-lt - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-lv - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-mk - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-ml - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-mn - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-mr - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-nb - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-ne - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-nl - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-nn - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-nr - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-nso - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-oc - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-om - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-or - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-pa-in - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-pl - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-pt - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-pt-br - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-ro - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-ru - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-rw - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-si - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-sk - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-sl - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-sr - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-ss - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-st - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-sv - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-szl - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-ta - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-te - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-tg - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-th - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-tn - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-tr - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-ts - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-ug - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-uk - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-uz - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-ve - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-vi - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-xh - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-za - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-zh-cn - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-zh-tw - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-l10n-zu - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-librelogo - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-math - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-math-nogui - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-nogui - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-officebean - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-plasma - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-qt5 - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-qt6 - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-report-builder - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-report-builder-bin - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-report-builder-bin-nogui - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-script-provider-bsh - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-script-provider-js - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-script-provider-python - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-sdbc-firebird - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-sdbc-hsqldb - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-sdbc-mysql - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-sdbc-postgresql - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-smoketest-data - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-style-breeze - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-style-colibre - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-style-elementary - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-style-karasa-jaga - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-style-sifr - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-style-sukapura - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-style-tango - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-style-yaru - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-subsequentcheckbase - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-uiconfig-base - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-uiconfig-calc - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-uiconfig-common - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-uiconfig-draw - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-uiconfig-impress - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-uiconfig-math - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-uiconfig-report-builder - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-uiconfig-writer - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-writer - 4:7.6.4-0ubuntu0.23.10.1 libreoffice-writer-nogui - 4:7.6.4-0ubuntu0.23.10.1 libreofficekit-data - 4:7.6.4-0ubuntu0.23.10.1 libreofficekit-dev - 4:7.6.4-0ubuntu0.23.10.1 libridl-java - 4:7.6.4-0ubuntu0.23.10.1 libuno-cppu3 - 4:7.6.4-0ubuntu0.23.10.1 libuno-cppuhelpergcc3-3 - 4:7.6.4-0ubuntu0.23.10.1 libuno-purpenvhelpergcc3-3 - 4:7.6.4-0ubuntu0.23.10.1 libuno-sal3 - 4:7.6.4-0ubuntu0.23.10.1 libuno-salhelpergcc3-3 - 4:7.6.4-0ubuntu0.23.10.1 libunoil-java - 4:7.6.4-0ubuntu0.23.10.1 libunoloader-java - 4:7.6.4-0ubuntu0.23.10.1 python3-access2base - 4:7.6.4-0ubuntu0.23.10.1 python3-scriptforge - 4:7.6.4-0ubuntu0.23.10.1 python3-uno - 4:7.6.4-0ubuntu0.23.10.1 uno-libs-private - 4:7.6.4-0ubuntu0.23.10.1 ure - 4:7.6.4-0ubuntu0.23.10.1 ure-java - 4:7.6.4-0ubuntu0.23.10.1 No subscription required Medium CVE-2023-6185 CVE-2023-6186 USN-6551-1 -- Ghostscript vulnerability Ubuntu 23.10 It was discovered that Ghostscript incorrectly handled writing TIFF files. A remote attacker could possibly use this issue to cause Ghostscript to crash, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-6551-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ghostscript - 10.01.2~dfsg1-0ubuntu2.2 ghostscript-doc - 10.01.2~dfsg1-0ubuntu2.2 ghostscript-x - 10.01.2~dfsg1-0ubuntu2.2 libgs-common - 10.01.2~dfsg1-0ubuntu2.2 libgs-dev - 10.01.2~dfsg1-0ubuntu2.2 libgs10 - 10.01.2~dfsg1-0ubuntu2.2 libgs10-common - 10.01.2~dfsg1-0ubuntu2.2 libgs9-common - 10.01.2~dfsg1-0ubuntu2.2 No subscription required Medium CVE-2023-46751 USN-6554-1 -- GNOME Settings vulnerability Ubuntu 23.10 Zygmunt Krynicki discovered that GNOME Settings did not accurately reflect the SSH remote login status when the system was configured to use systemd socket activation for OpenSSH. Remote SSH access may be unknowingly enabled, contrary to expectation. Update Instructions: Run `sudo pro fix USN-6554-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gnome-control-center - 1:45.0-1ubuntu3.1 gnome-control-center-data - 1:45.0-1ubuntu3.1 gnome-control-center-dev - 1:45.0-1ubuntu3.1 gnome-control-center-faces - 1:45.0-1ubuntu3.1 No subscription required Medium CVE-2023-5616 USN-6555-1 -- X.Org X Server vulnerabilities Ubuntu 23.10 Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled XKB button actions. An attacker could possibly use this issue to cause the X Server to crash, execute arbitrary code, or escalate privileges. (CVE-2023-6377) Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled memory when processing the RRChangeOutputProperty and RRChangeProviderProperty APIs. An attacker could possibly use this issue to cause the X Server to crash, or obtain sensitive information. (CVE-2023-6478) Update Instructions: Run `sudo pro fix USN-6555-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: xnest - 2:21.1.7-3ubuntu2.4 xorg-server-source - 2:21.1.7-3ubuntu2.4 xserver-common - 2:21.1.7-3ubuntu2.4 xserver-xephyr - 2:21.1.7-3ubuntu2.4 xserver-xorg-core - 2:21.1.7-3ubuntu2.4 xserver-xorg-dev - 2:21.1.7-3ubuntu2.4 xserver-xorg-legacy - 2:21.1.7-3ubuntu2.4 xvfb - 2:21.1.7-3ubuntu2.4 No subscription required xwayland - 2:23.2.0-1ubuntu0.3 No subscription required Medium CVE-2023-6377 CVE-2023-6478 USN-6556-1 -- Budgie Extras vulnerabilities Ubuntu 23.10 It was discovered that Budgie Extras incorrectly handled certain temporary file paths. An attacker could possibly use this issue to inject false information or deny access to the application. (CVE-2023-49342, CVE-2023-49343, CVE-2023-49347) Matthias Gerstner discovered that Budgie Extras incorrectly handled certain temporary file paths. A local attacker could use this to inject arbitrary PNG data in this path and have it displayed on the victim's desktop or deny access to the application. (CVE-2023-49344) Matthias Gerstner discovered that Budgie Extras incorrectly handled certain temporary file paths. A local attacker could use this to inject false information or deny access to the application. (CVE-2023-49345, CVE-2023-49346) Update Instructions: Run `sudo pro fix USN-6556-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: budgie-app-launcher-applet - 1.7.0-3.0ubuntu1 budgie-applications-menu-applet - 1.7.0-3.0ubuntu1 budgie-brightness-controller-applet - 1.7.0-3.0ubuntu1 budgie-clockworks-applet - 1.7.0-3.0ubuntu1 budgie-countdown-applet - 1.7.0-3.0ubuntu1 budgie-dropby-applet - 1.7.0-3.0ubuntu1 budgie-extras-common - 1.7.0-3.0ubuntu1 budgie-extras-daemon - 1.7.0-3.0ubuntu1 budgie-fuzzyclock-applet - 1.7.0-3.0ubuntu1 budgie-hotcorners-applet - 1.7.0-3.0ubuntu1 budgie-kangaroo-applet - 1.7.0-3.0ubuntu1 budgie-keyboard-autoswitch-applet - 1.7.0-3.0ubuntu1 budgie-network-manager-applet - 1.7.0-3.0ubuntu1 budgie-previews - 1.7.0-3.0ubuntu1 budgie-quickchar - 1.7.0-3.0ubuntu1 budgie-quicknote-applet - 1.7.0-3.0ubuntu1 budgie-recentlyused-applet - 1.7.0-3.0ubuntu1 budgie-rotation-lock-applet - 1.7.0-3.0ubuntu1 budgie-showtime-applet - 1.7.0-3.0ubuntu1 budgie-takeabreak-applet - 1.7.0-3.0ubuntu1 budgie-trash-applet - 1.7.0-3.0ubuntu1 budgie-visualspace-applet - 1.7.0-3.0ubuntu1 budgie-wallstreet - 1.7.0-3.0ubuntu1 budgie-weathershow-applet - 1.7.0-3.0ubuntu1 budgie-window-shuffler - 1.7.0-3.0ubuntu1 budgie-workspace-stopwatch-applet - 1.7.0-3.0ubuntu1 budgie-workspace-wallpaper-applet - 1.7.0-3.0ubuntu1 No subscription required Medium CVE-2023-49342 CVE-2023-49343 CVE-2023-49344 CVE-2023-49345 CVE-2023-49346 CVE-2023-49347 USN-6557-1 -- Vim vulnerabilities Ubuntu 23.10 It was discovered that Vim could be made to dereference invalid memory. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-1725) It was discovered that Vim could be made to recurse infinitely. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-1771) It was discovered that Vim could be made to write out of bounds with a put command. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 22.04 LTS. (CVE-2022-1886) It was discovered that Vim could be made to write out of bounds. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 14.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-1897, CVE-2022-2000) It was discovered that Vim did not properly manage memory in the spell command. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 22.04 LTS. (CVE-2022-2042) It was discovered that Vim did not properly manage memory. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2023-46246, CVE-2023-48231) It was discovered that Vim could be made to divide by zero. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 23.04 and Ubuntu 23.10. (CVE-2023-48232) It was discovered that Vim contained multiple arithmetic overflows. An attacker could possibly use these issues to cause a denial of service. (CVE-2023-48233, CVE-2023-48234, CVE-2023-48235, CVE-2023-48236, CVE-2023-48237) It was discovered that Vim did not properly manage memory in the substitute command. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 22.04 LTS, Ubuntu 23.04, and Ubuntu 23.10. (CVE-2023-48706) Update Instructions: Run `sudo pro fix USN-6557-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: vim - 2:9.0.1672-1ubuntu2.2 vim-athena - 2:9.0.1672-1ubuntu2.2 vim-common - 2:9.0.1672-1ubuntu2.2 vim-doc - 2:9.0.1672-1ubuntu2.2 vim-gtk3 - 2:9.0.1672-1ubuntu2.2 vim-gui-common - 2:9.0.1672-1ubuntu2.2 vim-motif - 2:9.0.1672-1ubuntu2.2 vim-nox - 2:9.0.1672-1ubuntu2.2 vim-runtime - 2:9.0.1672-1ubuntu2.2 vim-tiny - 2:9.0.1672-1ubuntu2.2 xxd - 2:9.0.1672-1ubuntu2.2 No subscription required Medium CVE-2022-1725 CVE-2022-1771 CVE-2022-1886 CVE-2022-1897 CVE-2022-2000 CVE-2022-2042 CVE-2023-46246 CVE-2023-48231 CVE-2023-48232 CVE-2023-48233 CVE-2023-48234 CVE-2023-48235 CVE-2023-48236 CVE-2023-48237 CVE-2023-48706 USN-6558-1 -- audiofile vulnerabilities Ubuntu 23.10 It was discovered that audiofile could be made to dereference invalid memory. If a user or an automated system were tricked into opening a specially crafted file, an attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2018-13440) It was discovered that audiofile could be made to write out of bounds. If a user or an automated system were tricked into opening a specially crafted file, an attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2018-17095) It was discovered that audiofile could be made to dereference invalid memory. If a user or an automated system were tricked into opening a specially crafted file, an attacker could possibly use this issue to cause a denial of service. (CVE-2019-13147) It was discovered that audiofile could be made to leak memory. If a user or an automated system were tricked into opening a specially crafted file, an attacker could possibly use this issue to obtain sensitive information. (CVE-2022-24599) Update Instructions: Run `sudo pro fix USN-6558-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: audiofile-tools - 0.3.6-5+deb10u1build0.23.10.1 libaudiofile-dev - 0.3.6-5+deb10u1build0.23.10.1 libaudiofile1 - 0.3.6-5+deb10u1build0.23.10.1 No subscription required Medium CVE-2018-13440 CVE-2018-17095 CVE-2019-13147 CVE-2022-24599 USN-6559-1 -- ZooKeeper vulnerabilities Ubuntu 23.10 It was discovered that ZooKeeper incorrectly handled authorization for the getACL() command. A remote attacker could possibly use this issue to obtain sensitive information. This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2019-0201) Damien Diederen discovered that ZooKeeper incorrectly handled authorization if SASL Quorum Peer authentication is enabled. An attacker could possibly use this issue to bypass ZooKeeper's authorization system. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 23.04 and Ubuntu 23.10. (CVE-2023-44981) Update Instructions: Run `sudo pro fix USN-6559-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libzookeeper-java - 3.8.0-11ubuntu0.1 libzookeeper-java-doc - 3.8.0-11ubuntu0.1 libzookeeper-mt-dev - 3.8.0-11ubuntu0.1 libzookeeper-mt2 - 3.8.0-11ubuntu0.1 libzookeeper-st-dev - 3.8.0-11ubuntu0.1 libzookeeper-st2 - 3.8.0-11ubuntu0.1 python3-zookeeper - 3.8.0-11ubuntu0.1 zookeeper - 3.8.0-11ubuntu0.1 zookeeper-bin - 3.8.0-11ubuntu0.1 zookeeperd - 3.8.0-11ubuntu0.1 No subscription required Medium CVE-2019-0201 CVE-2023-44981 USN-6560-1 -- OpenSSH vulnerabilities Ubuntu 23.10 Fabian Bäumer, Marcus Brinkmann, Jörg Schwenk discovered that the SSH protocol was vulnerable to a prefix truncation attack. If a remote attacker was able to intercept SSH communications, extension negotiation messages could be truncated, possibly leading to certain algorithms and features being downgraded. This issue is known as the Terrapin attack. This update adds protocol extensions to mitigate this issue. (CVE-2023-48795) Luci Stanescu discovered that OpenSSH incorrectly added destination constraints when smartcard keys were added to ssh-agent, contrary to expectations. This issue only affected Ubuntu 22.04 LTS, and Ubuntu 23.04. (CVE-2023-28531) Update Instructions: Run `sudo pro fix USN-6560-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openssh-client - 1:9.3p1-1ubuntu3.1 openssh-server - 1:9.3p1-1ubuntu3.1 openssh-sftp-server - 1:9.3p1-1ubuntu3.1 openssh-tests - 1:9.3p1-1ubuntu3.1 ssh - 1:9.3p1-1ubuntu3.1 ssh-askpass-gnome - 1:9.3p1-1ubuntu3.1 No subscription required Medium CVE-2023-28531 CVE-2023-48795 USN-6561-1 -- libssh vulnerability Ubuntu 23.10 Fabian Bäumer, Marcus Brinkmann, Jörg Schwenk discovered that the SSH protocol was vulnerable to a prefix truncation attack. If a remote attacker was able to intercept SSH communications, extension negotiation messages could be truncated, possibly leading to certain algorithms and features being downgraded. This issue is known as the Terrapin attack. This update adds protocol extensions to mitigate this issue. Update Instructions: Run `sudo pro fix USN-6561-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libssh-4 - 0.10.5-3ubuntu1.1 libssh-dev - 0.10.5-3ubuntu1.1 libssh-doc - 0.10.5-3ubuntu1.1 libssh-gcrypt-4 - 0.10.5-3ubuntu1.1 libssh-gcrypt-dev - 0.10.5-3ubuntu1.1 No subscription required Medium CVE-2023-48795 USN-6563-1 -- Thunderbird vulnerabilities Ubuntu 23.10 Multiple security issues were discovered in Thunderbird. If a user were tricked into opening a specially crafted website in a browsing context, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information, bypass security restrictions, cross-site tracing, or execute arbitrary code.(CVE-2023-6857, CVE-2023-6858, CVE-2023-6859, CVE-2023-6861, CVE-2023-6862, CVE-2023-6863, CVE-2023-6864) Marcus Brinkmann discovered that Thunderbird did not properly parse a PGP/MIME payload that contains digitally signed text. An attacker could potentially exploit this issue to spoof an email message. (CVE-2023-50762) Marcus Brinkmann discovered that Thunderbird did not properly compare the signature creation date with the message date and time when using digitally signed S/MIME email message. An attacker could potentially exploit this issue to spoof date and time of an email message. (CVE-2023-50761) DoHyun Lee discovered that Thunderbird did not properly manage memory when used on systems with the Mesa VM driver. An attacker could potentially exploit this issue to execute arbitrary code. (CVE-2023-6856) Andrew Osmond discovered that Thunderbird did not properly validate the textures produced by remote decoders. An attacker could potentially exploit this issue to escape the sandbox. (CVE-2023-6860) Update Instructions: Run `sudo pro fix USN-6563-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: thunderbird - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-dev - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-gnome-support - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-af - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-ar - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-ast - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-be - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-bg - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-bn - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-bn-bd - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-br - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-ca - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-cak - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-cs - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-cy - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-da - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-de - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-dsb - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-el - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-en - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-en-gb - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-en-us - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-es - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-es-ar - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-es-es - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-et - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-eu - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-fa - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-fi - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-fr - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-fy - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-fy-nl - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-ga - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-ga-ie - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-gd - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-gl - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-he - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-hr - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-hsb - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-hu - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-hy - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-id - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-is - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-it - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-ja - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-ka - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-kab - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-kk - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-ko - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-lt - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-lv - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-mk - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-ms - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-nb - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-nb-no - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-nl - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-nn - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-nn-no - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-pa - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-pa-in - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-pl - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-pt - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-pt-br - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-pt-pt - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-rm - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-ro - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-ru - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-si - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-sk - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-sl - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-sq - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-sr - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-sv - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-sv-se - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-ta - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-ta-lk - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-th - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-tr - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-uk - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-uz - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-vi - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-zh-cn - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-zh-hans - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-zh-hant - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-locale-zh-tw - 1:115.6.0+build2-0ubuntu0.23.10.1 thunderbird-mozsymbols - 1:115.6.0+build2-0ubuntu0.23.10.1 xul-ext-calendar-timezones - 1:115.6.0+build2-0ubuntu0.23.10.1 xul-ext-gdata-provider - 1:115.6.0+build2-0ubuntu0.23.10.1 xul-ext-lightning - 1:115.6.0+build2-0ubuntu0.23.10.1 No subscription required Medium CVE-2023-50762 CVE-2023-50761 CVE-2023-6856 CVE-2023-6857 CVE-2023-6858 CVE-2023-6859 CVE-2023-6860 CVE-2023-6861 CVE-2023-6862 CVE-2023-6863 CVE-2023-6864 USN-6565-1 -- OpenSSH vulnerabilities Ubuntu 23.10 It was discovered that OpenSSH incorrectly handled supplemental groups when running helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand as a different user. An attacker could possibly use this issue to escalate privileges. This issue only affected Ubuntu 20.04 LTS. (CVE-2021-41617) It was discovered that OpenSSH incorrectly added destination constraints when PKCS#11 token keys were added to ssh-agent, contrary to expectations. This issue only affected Ubuntu 22.04 LTS, and Ubuntu 23.04. (CVE-2023-51384) It was discovered that OpenSSH incorrectly handled user names or host names with shell metacharacters. An attacker could possibly use this issue to perform OS command injection. (CVE-2023-51385) Update Instructions: Run `sudo pro fix USN-6565-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openssh-client - 1:9.3p1-1ubuntu3.2 openssh-server - 1:9.3p1-1ubuntu3.2 openssh-sftp-server - 1:9.3p1-1ubuntu3.2 openssh-tests - 1:9.3p1-1ubuntu3.2 ssh - 1:9.3p1-1ubuntu3.2 ssh-askpass-gnome - 1:9.3p1-1ubuntu3.2 No subscription required Medium CVE-2021-41617 CVE-2023-51384 CVE-2023-51385 USN-6566-1 -- SQLite vulnerabilities Ubuntu 23.10 It was discovered that SQLite incorrectly handled certain protection mechanisms when using a CLI script with the --safe option, contrary to expectations. This issue only affected Ubuntu 22.04 LTS. (CVE-2022-46908) It was discovered that SQLite incorrectly handled certain memory operations in the sessions extension. A remote attacker could possibly use this issue to cause SQLite to crash, resulting in a denial of service. (CVE-2023-7104) Update Instructions: Run `sudo pro fix USN-6566-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: lemon - 3.42.0-1ubuntu0.1 libsqlite3-0 - 3.42.0-1ubuntu0.1 libsqlite3-dev - 3.42.0-1ubuntu0.1 libsqlite3-tcl - 3.42.0-1ubuntu0.1 sqlite3 - 3.42.0-1ubuntu0.1 sqlite3-doc - 3.42.0-1ubuntu0.1 sqlite3-tools - 3.42.0-1ubuntu0.1 No subscription required Medium CVE-2022-46908 CVE-2023-7104 USN-6567-1 -- QEMU vulnerabilities Ubuntu 23.10 Gaoning Pan and Xingwei Li discovered that QEMU incorrectly handled the USB xHCI controller device. A privileged guest attacker could possibly use this issue to cause QEMU to crash, leading to a denial of service. This issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2020-14394) It was discovered that QEMU incorrectly handled the TCG Accelerator. A local attacker could use this issue to cause QEMU to crash, leading to a denial of service, or possibly execute arbitrary code and esclate privileges. This issue only affected Ubuntu 20.04 LTS. (CVE-2020-24165) It was discovered that QEMU incorrectly handled the Intel HD audio device. A malicious guest attacker could use this issue to cause QEMU to crash, leading to a denial of service. This issue only affected Ubuntu 22.04 LTS. (CVE-2021-3611) It was discovered that QEMU incorrectly handled the ATI VGA device. A malicious guest attacker could use this issue to cause QEMU to crash, leading to a denial of service. This issue only affected Ubuntu 20.04 LTS. (CVE-2021-3638) It was discovered that QEMU incorrectly handled the VMWare paravirtual RDMA device. A malicious guest attacker could use this issue to cause QEMU to crash, leading to a denial of service. (CVE-2023-1544) It was discovered that QEMU incorrectly handled the 9p passthrough filesystem. A malicious guest attacker could possibly use this issue to open special files and escape the exported 9p tree. This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 23.04. (CVE-2023-2861) It was discovered that QEMU incorrectly handled the virtual crypto device. A malicious guest attacker could use this issue to cause QEMU to crash, leading to a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 23.04. (CVE-2023-3180) It was discovered that QEMU incorrectly handled the built-in VNC server. A remote authenticated attacker could possibly use this issue to cause QEMU to stop responding, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 23.04. (CVE-2023-3255) It was discovered that QEMU incorrectly handled net device hot-unplugging. A malicious guest attacker could use this issue to cause QEMU to crash, leading to a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 23.04. (CVE-2023-3301) It was discovered that QEMU incorrectly handled the built-in VNC server. A remote attacker could possibly use this issue to cause QEMU to crash, resulting in a denial of service. This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 23.04. (CVE-2023-3354) It was discovered that QEMU incorrectly handled NVME devices. A malicious guest attacker could use this issue to cause QEMU to crash, leading to a denial of service. This issue only affected Ubuntu 23.10. (CVE-2023-40360) It was discovered that QEMU incorrectly handled NVME devices. A malicious guest attacker could use this issue to cause QEMU to crash, leading to a denial of service, or possibly obtain sensitive information. This issue only affected Ubuntu 23.10. (CVE-2023-4135) It was discovered that QEMU incorrectly handled SCSI devices. A malicious guest attacker could use this issue to cause QEMU to crash, leading to a denial of service. This issue only affected Ubuntu 23.04 and Ubuntu 23.10. (CVE-2023-42467) It was discovered that QEMU incorrectly handled certain disk offsets. A malicious guest attacker could possibly use this issue to gain control of the host in certain nested virtualization scenarios. (CVE-2023-5088) Update Instructions: Run `sudo pro fix USN-6567-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: qemu-block-extra - 1:8.0.4+dfsg-1ubuntu3.23.10.2 qemu-guest-agent - 1:8.0.4+dfsg-1ubuntu3.23.10.2 qemu-system - 1:8.0.4+dfsg-1ubuntu3.23.10.2 qemu-system-arm - 1:8.0.4+dfsg-1ubuntu3.23.10.2 qemu-system-common - 1:8.0.4+dfsg-1ubuntu3.23.10.2 qemu-system-data - 1:8.0.4+dfsg-1ubuntu3.23.10.2 qemu-system-gui - 1:8.0.4+dfsg-1ubuntu3.23.10.2 qemu-system-mips - 1:8.0.4+dfsg-1ubuntu3.23.10.2 qemu-system-misc - 1:8.0.4+dfsg-1ubuntu3.23.10.2 qemu-system-ppc - 1:8.0.4+dfsg-1ubuntu3.23.10.2 qemu-system-s390x - 1:8.0.4+dfsg-1ubuntu3.23.10.2 qemu-system-sparc - 1:8.0.4+dfsg-1ubuntu3.23.10.2 qemu-system-x86 - 1:8.0.4+dfsg-1ubuntu3.23.10.2 qemu-system-x86-xen - 1:8.0.4+dfsg-1ubuntu3.23.10.2 qemu-system-xen - 1:8.0.4+dfsg-1ubuntu3.23.10.2 qemu-user - 1:8.0.4+dfsg-1ubuntu3.23.10.2 qemu-user-binfmt - 1:8.0.4+dfsg-1ubuntu3.23.10.2 qemu-user-static - 1:8.0.4+dfsg-1ubuntu3.23.10.2 qemu-utils - 1:8.0.4+dfsg-1ubuntu3.23.10.2 No subscription required Medium CVE-2020-14394 CVE-2020-24165 CVE-2021-3611 CVE-2021-3638 CVE-2023-1544 CVE-2023-2861 CVE-2023-3180 CVE-2023-3255 CVE-2023-3301 CVE-2023-3354 CVE-2023-40360 CVE-2023-4135 CVE-2023-42467 CVE-2023-5088 USN-6568-1 -- ClamAV update Ubuntu 23.10 The ClamAV package was updated to a new upstream version to remain compatible with signature database downloads. Update Instructions: Run `sudo pro fix USN-6568-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: clamav - 1.0.4+dfsg-0ubuntu0.23.10.1 clamav-base - 1.0.4+dfsg-0ubuntu0.23.10.1 clamav-daemon - 1.0.4+dfsg-0ubuntu0.23.10.1 clamav-docs - 1.0.4+dfsg-0ubuntu0.23.10.1 clamav-freshclam - 1.0.4+dfsg-0ubuntu0.23.10.1 clamav-milter - 1.0.4+dfsg-0ubuntu0.23.10.1 clamav-testfiles - 1.0.4+dfsg-0ubuntu0.23.10.1 clamdscan - 1.0.4+dfsg-0ubuntu0.23.10.1 libclamav-dev - 1.0.4+dfsg-0ubuntu0.23.10.1 libclamav11 - 1.0.4+dfsg-0ubuntu0.23.10.1 No subscription required None https://launchpad.net/bugs/2046581 USN-6569-1 -- libclamunrar vulnerabilities Ubuntu 23.10 it was discovered that libclamunrar incorrectly handled directories when extracting RAR archives. A remote attacker could possibly use this issue to overwrite arbitrary files and execute arbitrary code. This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 23.04. (CVE-2022-30333) It was discovered that libclamunrar incorrectly validated certain structures when extracting RAR archives. A remote attacker could possibly use this issue to execute arbitrary code. (CVE-2023-40477) Update Instructions: Run `sudo pro fix USN-6569-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: clamav-testfiles-rar - 1.0.4-0ubuntu0.23.10.1 libclamunrar - 1.0.4-0ubuntu0.23.10.1 libclamunrar11 - 1.0.4-0ubuntu0.23.10.1 No subscription required Medium CVE-2022-30333 CVE-2023-40477 USN-6572-1 -- Linux kernel (Azure) vulnerabilities Ubuntu 23.10 Yu Hao discovered that the UBI driver in the Linux kernel did not properly check for MTD with zero erasesize during device attachment. A local privileged attacker could use this to cause a denial of service (system crash). (CVE-2023-31085) Bien Pham discovered that the netfiler subsystem in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. A local user could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-4244) Maxim Levitsky discovered that the KVM nested virtualization (SVM) implementation for AMD processors in the Linux kernel did not properly handle x2AVIC MSRs. An attacker in a guest VM could use this to cause a denial of service (host kernel crash). (CVE-2023-5090) It was discovered that the SMB network file sharing protocol implementation in the Linux kernel did not properly handle certain error conditions, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-5345) Murray McAllister discovered that the VMware Virtual GPU DRM driver in the Linux kernel did not properly handle memory objects when storing surfaces, leading to a use-after-free vulnerability. A local attacker in a guest VM could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-5633) Update Instructions: Run `sudo pro fix USN-6572-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-azure-cloud-tools-6.5.0-1009 - 6.5.0-1009.9 linux-azure-headers-6.5.0-1009 - 6.5.0-1009.9 linux-azure-tools-6.5.0-1009 - 6.5.0-1009.9 linux-buildinfo-6.5.0-1009-azure - 6.5.0-1009.9 linux-cloud-tools-6.5.0-1009-azure - 6.5.0-1009.9 linux-headers-6.5.0-1009-azure - 6.5.0-1009.9 linux-image-6.5.0-1009-azure - 6.5.0-1009.9 linux-image-6.5.0-1009-azure-fde - 6.5.0-1009.9 linux-image-unsigned-6.5.0-1009-azure - 6.5.0-1009.9 linux-modules-6.5.0-1009-azure - 6.5.0-1009.9 linux-modules-extra-6.5.0-1009-azure - 6.5.0-1009.9 linux-modules-iwlwifi-6.5.0-1009-azure - 6.5.0-1009.9 linux-tools-6.5.0-1009-azure - 6.5.0-1009.9 No subscription required linux-azure - 6.5.0.1009.11 linux-azure-fde - 6.5.0.1009.11 linux-cloud-tools-azure - 6.5.0.1009.11 linux-headers-azure - 6.5.0.1009.11 linux-image-azure - 6.5.0.1009.11 linux-image-azure-fde - 6.5.0.1009.11 linux-modules-extra-azure - 6.5.0.1009.11 linux-modules-iwlwifi-azure - 6.5.0.1009.11 linux-tools-azure - 6.5.0.1009.11 No subscription required High CVE-2023-31085 CVE-2023-4244 CVE-2023-5090 CVE-2023-5345 CVE-2023-5633 USN-6573-1 -- Linux kernel (Azure) vulnerabilities Ubuntu 23.10 Lucas Leong discovered that the netfilter subsystem in the Linux kernel did not properly validate some attributes passed from userspace. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information (kernel memory). (CVE-2023-39189) Kyle Zeng discovered that the IPv4 implementation in the Linux kernel did not properly handle socket buffers (skb) when performing IP routing in certain circumstances, leading to a null pointer dereference vulnerability. A privileged attacker could use this to cause a denial of service (system crash). (CVE-2023-42754) Yikebaer Aizezi discovered that the ext4 file system implementation in the Linux kernel contained a use-after-free vulnerability when handling inode extent metadata. An attacker could use this to construct a malicious ext4 file system image that, when mounted, could cause a denial of service (system crash). (CVE-2023-45898) Jason Wang discovered that the virtio ring implementation in the Linux kernel did not properly handle iov buffers in some situations. A local attacker in a guest VM could use this to cause a denial of service (host system crash). (CVE-2023-5158) Alon Zahavi discovered that the NVMe-oF/TCP subsystem in the Linux kernel did not properly handle queue initialization failures in certain situations, leading to a use-after-free vulnerability. A remote attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-5178) Budimir Markovic discovered that the perf subsystem in the Linux kernel did not properly handle event groups, leading to an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-5717) Update Instructions: Run `sudo pro fix USN-6573-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-azure-cloud-tools-6.5.0-1010 - 6.5.0-1010.10 linux-azure-headers-6.5.0-1010 - 6.5.0-1010.10 linux-azure-tools-6.5.0-1010 - 6.5.0-1010.10 linux-buildinfo-6.5.0-1010-azure - 6.5.0-1010.10 linux-cloud-tools-6.5.0-1010-azure - 6.5.0-1010.10 linux-headers-6.5.0-1010-azure - 6.5.0-1010.10 linux-image-6.5.0-1010-azure - 6.5.0-1010.10 linux-image-6.5.0-1010-azure-fde - 6.5.0-1010.10 linux-image-unsigned-6.5.0-1010-azure - 6.5.0-1010.10 linux-modules-6.5.0-1010-azure - 6.5.0-1010.10 linux-modules-extra-6.5.0-1010-azure - 6.5.0-1010.10 linux-modules-iwlwifi-6.5.0-1010-azure - 6.5.0-1010.10 linux-tools-6.5.0-1010-azure - 6.5.0-1010.10 No subscription required linux-azure - 6.5.0.1010.12 linux-azure-fde - 6.5.0.1010.12 linux-cloud-tools-azure - 6.5.0.1010.12 linux-headers-azure - 6.5.0.1010.12 linux-image-azure - 6.5.0.1010.12 linux-image-azure-fde - 6.5.0.1010.12 linux-modules-extra-azure - 6.5.0.1010.12 linux-modules-iwlwifi-azure - 6.5.0.1010.12 linux-tools-azure - 6.5.0.1010.12 No subscription required Medium CVE-2023-39189 CVE-2023-42754 CVE-2023-45898 CVE-2023-5158 CVE-2023-5178 CVE-2023-5717 USN-6574-1 -- Go vulnerabilities Ubuntu 23.10 Takeshi Kaneko discovered that Go did not properly handle comments and special tags in the script context of html/template module. An attacker could possibly use this issue to inject Javascript code and perform a cross site scripting attack. This issue only affected Go 1.20 in Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu 23.04. (CVE-2023-39318, CVE-2023-39319) It was discovered that Go did not properly validate the "//go:cgo_" directives during compilation. An attacker could possibly use this issue to inject arbitrary code during compile time. (CVE-2023-39323) It was discovered that Go did not limit the number of simultaneously executing handler goroutines in the net/http module. An attacker could possibly use this issue to cause a panic resulting into a denial of service. (CVE-2023-39325, CVE-2023-44487) It was discovered that the Go net/http module did not properly validate the chunk extensions reading from a request or response body. An attacker could possibly use this issue to read sensitive information. (CVE-2023-39326) It was discovered that Go did not properly validate the insecure "git://" protocol when using go get to fetch a module with the ".git" suffix. An attacker could possibly use this issue to bypass secure protocol checks. (CVE-2023-45285) Update Instructions: Run `sudo pro fix USN-6574-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: golang-1.20 - 1.20.8-1ubuntu0.23.10.1 golang-1.20-doc - 1.20.8-1ubuntu0.23.10.1 golang-1.20-go - 1.20.8-1ubuntu0.23.10.1 golang-1.20-src - 1.20.8-1ubuntu0.23.10.1 No subscription required golang-1.21 - 1.21.1-1ubuntu0.23.10.1 golang-1.21-doc - 1.21.1-1ubuntu0.23.10.1 golang-1.21-go - 1.21.1-1ubuntu0.23.10.1 golang-1.21-src - 1.21.1-1ubuntu0.23.10.1 No subscription required Medium CVE-2023-39318 CVE-2023-39319 CVE-2023-39323 CVE-2023-39325 CVE-2023-39326 CVE-2023-44487 CVE-2023-45285 USN-6575-1 -- Twisted vulnerabilities Ubuntu 23.10 It was discovered that Twisted incorrectly escaped host headers in certain 404 responses. A remote attacker could possibly use this issue to perform HTML and script injection attacks. This issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-39348) It was discovered that Twisted incorrectly handled response order when processing multiple HTTP requests. A remote attacker could possibly use this issue to delay responses and manipulate the responses of second requests. (CVE-2023-46137) Update Instructions: Run `sudo pro fix USN-6575-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-twisted - 22.4.0-4ubuntu0.23.10.1 twisted-doc - 22.4.0-4ubuntu0.23.10.1 No subscription required Medium CVE-2022-39348 CVE-2023-46137 USN-6578-1 -- .NET vulnerabilities Ubuntu 23.10 Vishal Mishra and Anita Gaud discovered that .NET did not properly validate X.509 certificates with malformed signatures. An attacker could possibly use this issue to bypass an application's typical authentication logic. (CVE-2024-0057) Morgan Brown discovered that .NET did not properly handle requests from unauthenticated clients. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-21319) Update Instructions: Run `sudo pro fix USN-6578-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: aspnetcore-runtime-6.0 - 6.0.126-0ubuntu1~23.10.1 aspnetcore-targeting-pack-6.0 - 6.0.126-0ubuntu1~23.10.1 dotnet-apphost-pack-6.0 - 6.0.126-0ubuntu1~23.10.1 dotnet-host - 6.0.126-0ubuntu1~23.10.1 dotnet-hostfxr-6.0 - 6.0.126-0ubuntu1~23.10.1 dotnet-runtime-6.0 - 6.0.126-0ubuntu1~23.10.1 dotnet-sdk-6.0 - 6.0.126-0ubuntu1~23.10.1 dotnet-sdk-6.0-source-built-artifacts - 6.0.126-0ubuntu1~23.10.1 dotnet-targeting-pack-6.0 - 6.0.126-0ubuntu1~23.10.1 dotnet-templates-6.0 - 6.0.126-0ubuntu1~23.10.1 dotnet6 - 6.0.126-0ubuntu1~23.10.1 netstandard-targeting-pack-2.1 - 6.0.126-0ubuntu1~23.10.1 No subscription required aspnetcore-runtime-7.0 - 7.0.115-0ubuntu1~23.10.1 aspnetcore-targeting-pack-7.0 - 7.0.115-0ubuntu1~23.10.1 dotnet-apphost-pack-7.0 - 7.0.115-0ubuntu1~23.10.1 dotnet-host-7.0 - 7.0.115-0ubuntu1~23.10.1 dotnet-hostfxr-7.0 - 7.0.115-0ubuntu1~23.10.1 dotnet-runtime-7.0 - 7.0.115-0ubuntu1~23.10.1 dotnet-sdk-7.0 - 7.0.115-0ubuntu1~23.10.1 dotnet-sdk-7.0-source-built-artifacts - 7.0.115-0ubuntu1~23.10.1 dotnet-targeting-pack-7.0 - 7.0.115-0ubuntu1~23.10.1 dotnet-templates-7.0 - 7.0.115-0ubuntu1~23.10.1 dotnet7 - 7.0.115-0ubuntu1~23.10.1 netstandard-targeting-pack-2.1-7.0 - 7.0.115-0ubuntu1~23.10.1 No subscription required aspnetcore-runtime-8.0 - 8.0.1-0ubuntu1~23.10.1 aspnetcore-targeting-pack-8.0 - 8.0.1-0ubuntu1~23.10.1 dotnet-apphost-pack-8.0 - 8.0.1-0ubuntu1~23.10.1 dotnet-host-8.0 - 8.0.1-0ubuntu1~23.10.1 dotnet-hostfxr-8.0 - 8.0.1-0ubuntu1~23.10.1 dotnet-runtime-8.0 - 8.0.1-0ubuntu1~23.10.1 dotnet-targeting-pack-8.0 - 8.0.1-0ubuntu1~23.10.1 No subscription required dotnet-sdk-8.0 - 8.0.101-0ubuntu1~23.10.1 dotnet-sdk-8.0-source-built-artifacts - 8.0.101-0ubuntu1~23.10.1 dotnet-templates-8.0 - 8.0.101-0ubuntu1~23.10.1 netstandard-targeting-pack-2.1-8.0 - 8.0.101-0ubuntu1~23.10.1 No subscription required dotnet8 - 8.0.101-8.0.1-0ubuntu1~23.10.1 No subscription required Medium CVE-2024-0057 CVE-2024-21319 USN-6579-2 -- Xerces-C++ vulnerability Ubuntu 23.10 USN-6579-1 fixed a vulnerability in Xerces-C++. This update provides the corresponding update for Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 23.04 and Ubuntu 23.10. Original advisory details: It was discovered that Xerces-C++ was not properly handling memory management operations when parsing XML data containing external DTDs, which could trigger a use-after-free error. If a user or automated system were tricked into processing a specially crafted XML document, an attacker could possibly use this issue to cause a denial of service or execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6579-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libxerces-c-dev - 3.2.4+debian-1ubuntu0.23.10.1 libxerces-c-doc - 3.2.4+debian-1ubuntu0.23.10.1 libxerces-c-samples - 3.2.4+debian-1ubuntu0.23.10.1 libxerces-c3.2 - 3.2.4+debian-1ubuntu0.23.10.1 No subscription required Medium CVE-2018-1311 USN-6580-1 -- w3m vulnerability Ubuntu 23.10 It was discovered that w3m incorrectly handled certain HTML files. An attacker could possibly use this issue to cause a crash or execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6580-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: w3m - 0.5.3+git20230121-2ubuntu0.23.10.1 w3m-img - 0.5.3+git20230121-2ubuntu0.23.10.1 No subscription required Medium CVE-2023-4255 USN-6582-1 -- WebKitGTK vulnerability Ubuntu 23.10 Several security issues were discovered in the WebKitGTK Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution. Update Instructions: Run `sudo pro fix USN-6582-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-javascriptcoregtk-4.0 - 2.42.4-0ubuntu0.23.10.1 gir1.2-javascriptcoregtk-4.1 - 2.42.4-0ubuntu0.23.10.1 gir1.2-javascriptcoregtk-6.0 - 2.42.4-0ubuntu0.23.10.1 gir1.2-webkit-6.0 - 2.42.4-0ubuntu0.23.10.1 gir1.2-webkit2-4.0 - 2.42.4-0ubuntu0.23.10.1 gir1.2-webkit2-4.1 - 2.42.4-0ubuntu0.23.10.1 libjavascriptcoregtk-4.0-18 - 2.42.4-0ubuntu0.23.10.1 libjavascriptcoregtk-4.0-bin - 2.42.4-0ubuntu0.23.10.1 libjavascriptcoregtk-4.0-dev - 2.42.4-0ubuntu0.23.10.1 libjavascriptcoregtk-4.1-0 - 2.42.4-0ubuntu0.23.10.1 libjavascriptcoregtk-4.1-dev - 2.42.4-0ubuntu0.23.10.1 libjavascriptcoregtk-6.0-1 - 2.42.4-0ubuntu0.23.10.1 libjavascriptcoregtk-6.0-dev - 2.42.4-0ubuntu0.23.10.1 libwebkit2gtk-4.0-37 - 2.42.4-0ubuntu0.23.10.1 libwebkit2gtk-4.0-dev - 2.42.4-0ubuntu0.23.10.1 libwebkit2gtk-4.0-doc - 2.42.4-0ubuntu0.23.10.1 libwebkit2gtk-4.1-0 - 2.42.4-0ubuntu0.23.10.1 libwebkit2gtk-4.1-dev - 2.42.4-0ubuntu0.23.10.1 libwebkitgtk-6.0-4 - 2.42.4-0ubuntu0.23.10.1 libwebkitgtk-6.0-dev - 2.42.4-0ubuntu0.23.10.1 webkit2gtk-driver - 2.42.4-0ubuntu0.23.10.1 No subscription required Medium CVE-2023-42883 USN-6585-1 -- libssh2 vulnerability Ubuntu 23.10 Fabian Bäumer, Marcus Brinkmann, Jörg Schwenk discovered that the SSH protocol was vulnerable to a prefix truncation attack. If a remote attacker was able to intercept SSH communications, extension negotiation messages could be truncated, possibly leading to certain algorithms and features being downgraded. This issue is known as the Terrapin attack. This update adds protocol extensions to mitigate this issue. Update Instructions: Run `sudo pro fix USN-6585-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libssh2-1 - 1.11.0-2ubuntu0.1 libssh2-1-dev - 1.11.0-2ubuntu0.1 No subscription required Medium CVE-2023-48795 USN-6586-1 -- FreeImage vulnerabilities Ubuntu 23.10 It was discovered that FreeImage incorrectly handled certain memory operations. If a user were tricked into opening a crafted TIFF file, a remote attacker could use this issue to cause a heap buffer overflow, resulting in a denial of service attack. This issue only affected Ubuntu 16.04 LTS and Ubuntu 20.04 LTS. (CVE-2019-12211) It was discovered that FreeImage incorrectly processed images under certain circumstances. If a user were tricked into opening a crafted TIFF file, a remote attacker could possibly use this issue to cause a stack exhaustion condition, resulting in a denial of service attack. This issue only affected Ubuntu 16.04 LTS and Ubuntu 20.04 LTS. (CVE-2019-12213) It was discovered that FreeImage incorrectly processed certain images. If a user or automated system were tricked into opening a specially crafted image file, a remote attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2020-21427, CVE-2020-21428) It was discovered that FreeImage incorrectly processed certain images. If a user or automated system were tricked into opening a specially crafted PFM file, an attacker could possibly use this issue to cause a denial of service. (CVE-2020-22524) Update Instructions: Run `sudo pro fix USN-6586-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libfreeimage-dev - 3.18.0+ds2-9.1ubuntu0.1 libfreeimage3 - 3.18.0+ds2-9.1ubuntu0.1 libfreeimageplus-dev - 3.18.0+ds2-9.1ubuntu0.1 libfreeimageplus-doc - 3.18.0+ds2-9.1ubuntu0.1 libfreeimageplus3 - 3.18.0+ds2-9.1ubuntu0.1 No subscription required Medium CVE-2019-12211 CVE-2019-12213 CVE-2020-21427 CVE-2020-21428 CVE-2020-22524 USN-6587-1 -- X.Org X Server vulnerabilities Ubuntu 23.10 Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled memory when processing the DeviceFocusEvent and ProcXIQueryPointer APIs. An attacker could possibly use this issue to cause the X Server to crash, obtain sensitive information, or execute arbitrary code. (CVE-2023-6816) Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled reattaching to a different master device. An attacker could use this issue to cause the X Server to crash, leading to a denial of service, or possibly execute arbitrary code. (CVE-2024-0229) Olivier Fourdan and Donn Seeley discovered that the X.Org X Server incorrectly labeled GLX PBuffers when used with SELinux. An attacker could use this issue to cause the X Server to crash, leading to a denial of service. (CVE-2024-0408) Olivier Fourdan discovered that the X.Org X Server incorrectly handled the curser code when used with SELinux. An attacker could use this issue to cause the X Server to crash, leading to a denial of service. (CVE-2024-0409) Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled memory when processing the XISendDeviceHierarchyEvent API. An attacker could possibly use this issue to cause the X Server to crash, or execute arbitrary code. (CVE-2024-21885) Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled devices being disabled. An attacker could possibly use this issue to cause the X Server to crash, or execute arbitrary code. (CVE-2024-21886) Update Instructions: Run `sudo pro fix USN-6587-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: xnest - 2:21.1.7-3ubuntu2.6 xorg-server-source - 2:21.1.7-3ubuntu2.6 xserver-common - 2:21.1.7-3ubuntu2.6 xserver-xephyr - 2:21.1.7-3ubuntu2.6 xserver-xorg-core - 2:21.1.7-3ubuntu2.6 xserver-xorg-dev - 2:21.1.7-3ubuntu2.6 xserver-xorg-legacy - 2:21.1.7-3ubuntu2.6 xvfb - 2:21.1.7-3ubuntu2.6 No subscription required xwayland - 2:23.2.0-1ubuntu0.4 No subscription required Medium CVE-2023-6816 CVE-2024-0229 CVE-2024-0408 CVE-2024-0409 CVE-2024-21885 CVE-2024-21886 USN-6587-3 -- X.Org X Server regression Ubuntu 23.10 USN-6587-1 fixed vulnerabilities in X.Org X Server. The fix was incomplete resulting in a possible regression. This update fixes the problem. We apologize for the inconvenience. Original advisory details: Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled memory when processing the DeviceFocusEvent and ProcXIQueryPointer APIs. An attacker could possibly use this issue to cause the X Server to crash, obtain sensitive information, or execute arbitrary code. (CVE-2023-6816) Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled reattaching to a different master device. An attacker could use this issue to cause the X Server to crash, leading to a denial of service, or possibly execute arbitrary code. (CVE-2024-0229) Olivier Fourdan and Donn Seeley discovered that the X.Org X Server incorrectly labeled GLX PBuffers when used with SELinux. An attacker could use this issue to cause the X Server to crash, leading to a denial of service. (CVE-2024-0408) Olivier Fourdan discovered that the X.Org X Server incorrectly handled the curser code when used with SELinux. An attacker could use this issue to cause the X Server to crash, leading to a denial of service. (CVE-2024-0409) Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled memory when processing the XISendDeviceHierarchyEvent API. An attacker could possibly use this issue to cause the X Server to crash, or execute arbitrary code. (CVE-2024-21885) Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled devices being disabled. An attacker could possibly use this issue to cause the X Server to crash, or execute arbitrary code. (CVE-2024-21886) Update Instructions: Run `sudo pro fix USN-6587-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: xnest - 2:21.1.7-3ubuntu2.7 xorg-server-source - 2:21.1.7-3ubuntu2.7 xserver-common - 2:21.1.7-3ubuntu2.7 xserver-xephyr - 2:21.1.7-3ubuntu2.7 xserver-xorg-core - 2:21.1.7-3ubuntu2.7 xserver-xorg-dev - 2:21.1.7-3ubuntu2.7 xserver-xorg-legacy - 2:21.1.7-3ubuntu2.7 xvfb - 2:21.1.7-3ubuntu2.7 No subscription required None https://launchpad.net/bugs/2051536 USN-6588-1 -- PAM vulnerability Ubuntu 23.10 Matthias Gerstner discovered that the PAM pam_namespace module incorrectly handled special files when performing directory checks. A local attacker could possibly use this issue to cause PAM to stop responding, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-6588-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libpam-doc - 1.5.2-6ubuntu1.1 libpam-modules - 1.5.2-6ubuntu1.1 libpam-modules-bin - 1.5.2-6ubuntu1.1 libpam-runtime - 1.5.2-6ubuntu1.1 libpam0g - 1.5.2-6ubuntu1.1 libpam0g-dev - 1.5.2-6ubuntu1.1 No subscription required Medium CVE-2024-22365 USN-6589-1 -- FileZilla vulnerability Ubuntu 23.10 Fabian Baeumer, Marcus Brinkmann and Joerg Schwenk discovered that the SSH protocol used in FileZilla is prone to a prefix truncation attack, known as the "Terrapin attack". A remote attacker could use this issue to downgrade or disable some security features and obtain sensitive information. Update Instructions: Run `sudo pro fix USN-6589-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: filezilla - 3.65.0-3ubuntu0.1 filezilla-common - 3.65.0-3ubuntu0.1 No subscription required Medium CVE-2023-48795 USN-6591-1 -- Postfix vulnerability Ubuntu 23.10 Timo Longin discovered that Postfix incorrectly handled certain email line endings. A remote attacker could possibly use this issue to bypass an email authentication mechanism, allowing domain spoofing and potential spamming. Please note that certain configuration changes are required to address this issue. They are not enabled by default for backward compatibility. Information can be found at https://www.postfix.org/smtp-smuggling.html. Update Instructions: Run `sudo pro fix USN-6591-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: postfix - 3.8.1-2ubuntu0.1 postfix-cdb - 3.8.1-2ubuntu0.1 postfix-doc - 3.8.1-2ubuntu0.1 postfix-ldap - 3.8.1-2ubuntu0.1 postfix-lmdb - 3.8.1-2ubuntu0.1 postfix-mysql - 3.8.1-2ubuntu0.1 postfix-pcre - 3.8.1-2ubuntu0.1 postfix-pgsql - 3.8.1-2ubuntu0.1 postfix-sqlite - 3.8.1-2ubuntu0.1 No subscription required Medium CVE-2023-51764 https://bugs.launchpad.net/ubuntu/+source/postfix/+bug/2049337 USN-6591-2 -- Postfix update Ubuntu 23.10 USN-6591-1 fixed vulnerabilities in Postfix. A fix with less risk of regression has been made available since the last update. This update updates the fix and aligns with the latest configuration guidelines regarding this vulnerability. We apologize for the inconvenience. Original advisory details: Timo Longin discovered that Postfix incorrectly handled certain email line endings. A remote attacker could possibly use this issue to bypass an email authentication mechanism, allowing domain spoofing and potential spamming. Please note that certain configuration changes are required to address this issue. They are not enabled by default for backward compatibility. Information can be found at https://www.postfix.org/smtp-smuggling.html. Update Instructions: Run `sudo pro fix USN-6591-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: postfix - 3.8.1-2ubuntu0.2 postfix-cdb - 3.8.1-2ubuntu0.2 postfix-doc - 3.8.1-2ubuntu0.2 postfix-ldap - 3.8.1-2ubuntu0.2 postfix-lmdb - 3.8.1-2ubuntu0.2 postfix-mysql - 3.8.1-2ubuntu0.2 postfix-pcre - 3.8.1-2ubuntu0.2 postfix-pgsql - 3.8.1-2ubuntu0.2 postfix-sqlite - 3.8.1-2ubuntu0.2 No subscription required Medium CVE-2023-51764 https://bugs.launchpad.net/ubuntu/+source/postfix/+bug/2049337 https://bugs.launchpad.net/ubuntu/+source/postfix/+bug/2050834 USN-6592-1 -- libssh vulnerabilities Ubuntu 23.10 It was discovered that libssh incorrectly handled the ProxyCommand and the ProxyJump features. A remote attacker could possibly use this issue to inject malicious code into the command of the features mentioned through the hostname parameter. (CVE-2023-6004) It was discovered that libssh incorrectly handled return codes when performing message digest operations. A remote attacker could possibly use this issue to cause libssh to crash, obtain sensitive information, or execute arbitrary code. (CVE-2023-6918) Update Instructions: Run `sudo pro fix USN-6592-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libssh-4 - 0.10.5-3ubuntu1.2 libssh-dev - 0.10.5-3ubuntu1.2 libssh-doc - 0.10.5-3ubuntu1.2 libssh-gcrypt-4 - 0.10.5-3ubuntu1.2 libssh-gcrypt-dev - 0.10.5-3ubuntu1.2 No subscription required Medium CVE-2023-6004 CVE-2023-6918 USN-6593-1 -- GnuTLS vulnerabilities Ubuntu 23.10 It was discovered that GnuTLS had a timing side-channel when processing malformed ciphertexts in RSA-PSK ClientKeyExchange. A remote attacker could possibly use this issue to recover sensitive information. (CVE-2024-0553) It was discovered that GnuTLS incorrectly handled certain certificate chains with a cross-signing loop. A remote attacker could possibly use this issue to cause GnuTLS to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS, Ubuntu 23.04, and Ubuntu 23.10. (CVE-2024-0567) Update Instructions: Run `sudo pro fix USN-6593-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gnutls-bin - 3.8.1-4ubuntu1.2 gnutls-doc - 3.8.1-4ubuntu1.2 libgnutls-dane0 - 3.8.1-4ubuntu1.2 libgnutls-openssl27 - 3.8.1-4ubuntu1.2 libgnutls28-dev - 3.8.1-4ubuntu1.2 libgnutls30 - 3.8.1-4ubuntu1.2 No subscription required Medium CVE-2024-0553 CVE-2024-0567 USN-6594-1 -- Squid vulnerabilities Ubuntu 23.10 Joshua Rogers discovered that Squid incorrectly handled HTTP message processing. A remote attacker could possibly use this issue to cause Squid to crash, resulting in a denial of service. (CVE-2023-49285) Joshua Rogers discovered that Squid incorrectly handled Helper process management. A remote attacker could possibly use this issue to cause Squid to crash, resulting in a denial of service. (CVE-2023-49286) Joshua Rogers discovered that Squid incorrectly handled HTTP request parsing. A remote attacker could possibly use this issue to cause Squid to crash, resulting in a denial of service. (CVE-2023-50269) Update Instructions: Run `sudo pro fix USN-6594-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: squid - 6.1-2ubuntu1.2 squid-cgi - 6.1-2ubuntu1.2 squid-common - 6.1-2ubuntu1.2 squid-openssl - 6.1-2ubuntu1.2 squid-purge - 6.1-2ubuntu1.2 squidclient - 6.1-2ubuntu1.2 No subscription required Medium CVE-2023-49285 CVE-2023-49286 CVE-2023-50269 USN-6597-1 -- Puma vulnerability Ubuntu 23.10 It was discovered that Puma incorrectly handled parsing chunked transfer encoding bodies. A remote attacker could possibly use this issue to cause Puma to consume resources, leading to a denial of service. Update Instructions: Run `sudo pro fix USN-6597-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: puma - 5.6.5-4ubuntu2.1 No subscription required Medium CVE-2024-21647 USN-6598-1 -- Paramiko vulnerability Ubuntu 23.10 Fabian Bäumer, Marcus Brinkmann, Jörg Schwenk discovered that the SSH protocol was vulnerable to a prefix truncation attack. If a remote attacker was able to intercept SSH communications, extension negotiation messages could be truncated, possibly leading to certain algorithms and features being downgraded. This issue is known as the Terrapin attack. This update adds protocol extensions to mitigate this issue. Update Instructions: Run `sudo pro fix USN-6598-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: paramiko-doc - 2.12.0-2ubuntu1.23.10.2 python3-paramiko - 2.12.0-2ubuntu1.23.10.2 No subscription required Medium CVE-2023-48795 USN-6599-1 -- Jinja2 vulnerabilities Ubuntu 23.10 Yeting Li discovered that Jinja incorrectly handled certain regex. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 14.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS. (CVE-2020-28493) It was discovered that Jinja incorrectly handled certain HTML passed with xmlatter filter. An attacker could inject arbitrary HTML attributes keys and values potentially leading to XSS. (CVE-2024-22195) Update Instructions: Run `sudo pro fix USN-6599-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-jinja2-doc - 3.1.2-1ubuntu0.23.10.1 python3-jinja2 - 3.1.2-1ubuntu0.23.10.1 No subscription required Medium CVE-2020-28493 CVE-2024-22195 USN-6600-1 -- MariaDB vulnerabilities Ubuntu 23.10 Several security issues were discovered in MariaDB and this update includes new upstream MariaDB versions to fix these issues. MariaDB has been updated to 10.3.39 in Ubuntu 20.04 LTS, 10.6.16 in Ubuntu 22.04 LTS and 10.11.6 in Ubuntu 23.10. CVE-2022-47015 only affected the MariaDB packages in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Update Instructions: Run `sudo pro fix USN-6600-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libmariadb-dev - 1:10.11.6-0ubuntu0.23.10.2 libmariadb-dev-compat - 1:10.11.6-0ubuntu0.23.10.2 libmariadb3 - 1:10.11.6-0ubuntu0.23.10.2 libmariadbd-dev - 1:10.11.6-0ubuntu0.23.10.2 libmariadbd19 - 1:10.11.6-0ubuntu0.23.10.2 mariadb-backup - 1:10.11.6-0ubuntu0.23.10.2 mariadb-client - 1:10.11.6-0ubuntu0.23.10.2 mariadb-client-core - 1:10.11.6-0ubuntu0.23.10.2 mariadb-common - 1:10.11.6-0ubuntu0.23.10.2 mariadb-plugin-connect - 1:10.11.6-0ubuntu0.23.10.2 mariadb-plugin-cracklib-password-check - 1:10.11.6-0ubuntu0.23.10.2 mariadb-plugin-gssapi-client - 1:10.11.6-0ubuntu0.23.10.2 mariadb-plugin-gssapi-server - 1:10.11.6-0ubuntu0.23.10.2 mariadb-plugin-hashicorp-key-management - 1:10.11.6-0ubuntu0.23.10.2 mariadb-plugin-mroonga - 1:10.11.6-0ubuntu0.23.10.2 mariadb-plugin-oqgraph - 1:10.11.6-0ubuntu0.23.10.2 mariadb-plugin-provider-bzip2 - 1:10.11.6-0ubuntu0.23.10.2 mariadb-plugin-provider-lz4 - 1:10.11.6-0ubuntu0.23.10.2 mariadb-plugin-provider-lzma - 1:10.11.6-0ubuntu0.23.10.2 mariadb-plugin-provider-lzo - 1:10.11.6-0ubuntu0.23.10.2 mariadb-plugin-provider-snappy - 1:10.11.6-0ubuntu0.23.10.2 mariadb-plugin-rocksdb - 1:10.11.6-0ubuntu0.23.10.2 mariadb-plugin-s3 - 1:10.11.6-0ubuntu0.23.10.2 mariadb-plugin-spider - 1:10.11.6-0ubuntu0.23.10.2 mariadb-server - 1:10.11.6-0ubuntu0.23.10.2 mariadb-server-10.5 - 1:10.11.6-0ubuntu0.23.10.2 mariadb-server-core - 1:10.11.6-0ubuntu0.23.10.2 mariadb-test - 1:10.11.6-0ubuntu0.23.10.2 mariadb-test-data - 1:10.11.6-0ubuntu0.23.10.2 No subscription required Medium CVE-2022-47015 CVE-2023-22084 USN-6608-1 -- Linux kernel vulnerabilities Ubuntu 23.10 It was discovered that the CIFS network file system implementation in the Linux kernel did not properly validate the server frame size in certain situation, leading to an out-of-bounds read vulnerability. An attacker could use this to construct a malicious CIFS image that, when operated on, could cause a denial of service (system crash) or possibly expose sensitive information. (CVE-2023-6606) Xingyuan Mo discovered that the netfilter subsystem in the Linux kernel did not properly handle inactive elements in its PIPAPO data structure, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-6817) Budimir Markovic, Lucas De Marchi, and Pengfei Xu discovered that the perf subsystem in the Linux kernel did not properly validate all event sizes when attaching new events, leading to an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-6931) It was discovered that the IGMP protocol implementation in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-6932) Kevin Rich discovered that the netfilter subsystem in the Linux kernel did not properly check deactivated elements in certain situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2024-0193) Update Instructions: Run `sudo pro fix USN-6608-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.5.0-1006-starfive - 6.5.0-1006.7 linux-headers-6.5.0-1006-starfive - 6.5.0-1006.7 linux-image-6.5.0-1006-starfive - 6.5.0-1006.7 linux-modules-6.5.0-1006-starfive - 6.5.0-1006.7 linux-modules-extra-6.5.0-1006-starfive - 6.5.0-1006.7 linux-starfive-headers-6.5.0-1006 - 6.5.0-1006.7 linux-starfive-tools-6.5.0-1006 - 6.5.0-1006.7 linux-tools-6.5.0-1006-starfive - 6.5.0-1006.7 No subscription required linux-buildinfo-6.5.0-1008-laptop - 6.5.0-1008.11 linux-headers-6.5.0-1008-laptop - 6.5.0-1008.11 linux-image-6.5.0-1008-laptop - 6.5.0-1008.11 linux-laptop-headers-6.5.0-1008 - 6.5.0-1008.11 linux-laptop-tools-6.5.0-1008 - 6.5.0-1008.11 linux-modules-6.5.0-1008-laptop - 6.5.0-1008.11 linux-tools-6.5.0-1008-laptop - 6.5.0-1008.11 No subscription required linux-buildinfo-6.5.0-1009-raspi - 6.5.0-1009.12 linux-headers-6.5.0-1009-raspi - 6.5.0-1009.12 linux-image-6.5.0-1009-raspi - 6.5.0-1009.12 linux-modules-6.5.0-1009-raspi - 6.5.0-1009.12 linux-modules-extra-6.5.0-1009-raspi - 6.5.0-1009.12 linux-raspi-headers-6.5.0-1009 - 6.5.0-1009.12 linux-raspi-tools-6.5.0-1009 - 6.5.0-1009.12 linux-tools-6.5.0-1009-raspi - 6.5.0-1009.12 No subscription required linux-azure-cloud-tools-6.5.0-1011 - 6.5.0-1011.11 linux-azure-headers-6.5.0-1011 - 6.5.0-1011.11 linux-azure-tools-6.5.0-1011 - 6.5.0-1011.11 linux-buildinfo-6.5.0-1011-azure - 6.5.0-1011.11 linux-buildinfo-6.5.0-1011-gcp - 6.5.0-1011.11 linux-cloud-tools-6.5.0-1011-azure - 6.5.0-1011.11 linux-gcp-headers-6.5.0-1011 - 6.5.0-1011.11 linux-gcp-tools-6.5.0-1011 - 6.5.0-1011.11 linux-headers-6.5.0-1011-azure - 6.5.0-1011.11 linux-headers-6.5.0-1011-gcp - 6.5.0-1011.11 linux-image-6.5.0-1011-azure - 6.5.0-1011.11 linux-image-6.5.0-1011-azure-fde - 6.5.0-1011.11 linux-image-6.5.0-1011-gcp - 6.5.0-1011.11 linux-image-unsigned-6.5.0-1011-azure - 6.5.0-1011.11 linux-image-unsigned-6.5.0-1011-gcp - 6.5.0-1011.11 linux-modules-6.5.0-1011-azure - 6.5.0-1011.11 linux-modules-6.5.0-1011-gcp - 6.5.0-1011.11 linux-modules-extra-6.5.0-1011-azure - 6.5.0-1011.11 linux-modules-extra-6.5.0-1011-gcp - 6.5.0-1011.11 linux-modules-iwlwifi-6.5.0-1011-azure - 6.5.0-1011.11 linux-modules-iwlwifi-6.5.0-1011-gcp - 6.5.0-1011.11 linux-tools-6.5.0-1011-azure - 6.5.0-1011.11 linux-tools-6.5.0-1011-gcp - 6.5.0-1011.11 No subscription required linux-aws-cloud-tools-6.5.0-1012 - 6.5.0-1012.12 linux-aws-headers-6.5.0-1012 - 6.5.0-1012.12 linux-aws-tools-6.5.0-1012 - 6.5.0-1012.12 linux-buildinfo-6.5.0-1012-aws - 6.5.0-1012.12 linux-cloud-tools-6.5.0-1012-aws - 6.5.0-1012.12 linux-headers-6.5.0-1012-aws - 6.5.0-1012.12 linux-image-6.5.0-1012-aws - 6.5.0-1012.12 linux-image-unsigned-6.5.0-1012-aws - 6.5.0-1012.12 linux-modules-6.5.0-1012-aws - 6.5.0-1012.12 linux-modules-extra-6.5.0-1012-aws - 6.5.0-1012.12 linux-tools-6.5.0-1012-aws - 6.5.0-1012.12 No subscription required linux-buildinfo-6.5.0-1014-oracle - 6.5.0-1014.14 linux-headers-6.5.0-1014-oracle - 6.5.0-1014.14 linux-image-6.5.0-1014-oracle - 6.5.0-1014.14 linux-image-unsigned-6.5.0-1014-oracle - 6.5.0-1014.14 linux-modules-6.5.0-1014-oracle - 6.5.0-1014.14 linux-modules-extra-6.5.0-1014-oracle - 6.5.0-1014.14 linux-modules-iwlwifi-6.5.0-1014-oracle - 6.5.0-1014.14 linux-oracle-headers-6.5.0-1014 - 6.5.0-1014.14 linux-oracle-tools-6.5.0-1014 - 6.5.0-1014.14 linux-tools-6.5.0-1014-oracle - 6.5.0-1014.14 No subscription required linux-buildinfo-6.5.0-15-generic - 6.5.0-15.15 linux-buildinfo-6.5.0-15-generic-64k - 6.5.0-15.15 linux-cloud-tools-6.5.0-15 - 6.5.0-15.15 linux-cloud-tools-6.5.0-15-generic - 6.5.0-15.15 linux-cloud-tools-common - 6.5.0-15.15 linux-doc - 6.5.0-15.15 linux-headers-6.5.0-15 - 6.5.0-15.15 linux-headers-6.5.0-15-generic - 6.5.0-15.15 linux-headers-6.5.0-15-generic-64k - 6.5.0-15.15 linux-image-6.5.0-15-generic - 6.5.0-15.15 linux-image-6.5.0-15-generic-64k - 6.5.0-15.15 linux-image-uc-6.5.0-15-generic - 6.5.0-15.15 linux-image-uc-6.5.0-15-generic-64k - 6.5.0-15.15 linux-image-unsigned-6.5.0-15-generic - 6.5.0-15.15 linux-image-unsigned-6.5.0-15-generic-64k - 6.5.0-15.15 linux-lib-rust-6.5.0-15-generic - 6.5.0-15.15 linux-libc-dev - 6.5.0-15.15 linux-modules-6.5.0-15-generic - 6.5.0-15.15 linux-modules-6.5.0-15-generic-64k - 6.5.0-15.15 linux-modules-extra-6.5.0-15-generic - 6.5.0-15.15 linux-modules-ipu6-6.5.0-15-generic - 6.5.0-15.15 linux-modules-ivsc-6.5.0-15-generic - 6.5.0-15.15 linux-modules-iwlwifi-6.5.0-15-generic - 6.5.0-15.15 linux-source-6.5.0 - 6.5.0-15.15 linux-tools-6.5.0-15 - 6.5.0-15.15 linux-tools-6.5.0-15-generic - 6.5.0-15.15 linux-tools-6.5.0-15-generic-64k - 6.5.0-15.15 linux-tools-common - 6.5.0-15.15 linux-tools-host - 6.5.0-15.15 No subscription required linux-buildinfo-6.5.0-15-lowlatency - 6.5.0-15.15.1 linux-buildinfo-6.5.0-15-lowlatency-64k - 6.5.0-15.15.1 linux-cloud-tools-6.5.0-15-lowlatency - 6.5.0-15.15.1 linux-headers-6.5.0-15-lowlatency - 6.5.0-15.15.1 linux-headers-6.5.0-15-lowlatency-64k - 6.5.0-15.15.1 linux-image-6.5.0-15-lowlatency - 6.5.0-15.15.1 linux-image-6.5.0-15-lowlatency-64k - 6.5.0-15.15.1 linux-image-unsigned-6.5.0-15-lowlatency - 6.5.0-15.15.1 linux-image-unsigned-6.5.0-15-lowlatency-64k - 6.5.0-15.15.1 linux-lowlatency-cloud-tools-6.5.0-15 - 6.5.0-15.15.1 linux-lowlatency-cloud-tools-common - 6.5.0-15.15.1 linux-lowlatency-headers-6.5.0-15 - 6.5.0-15.15.1 linux-lowlatency-lib-rust-6.5.0-15-lowlatency - 6.5.0-15.15.1 linux-lowlatency-tools-6.5.0-15 - 6.5.0-15.15.1 linux-lowlatency-tools-common - 6.5.0-15.15.1 linux-lowlatency-tools-host - 6.5.0-15.15.1 linux-modules-6.5.0-15-lowlatency - 6.5.0-15.15.1 linux-modules-6.5.0-15-lowlatency-64k - 6.5.0-15.15.1 linux-modules-iwlwifi-6.5.0-15-lowlatency - 6.5.0-15.15.1 linux-tools-6.5.0-15-lowlatency - 6.5.0-15.15.1 linux-tools-6.5.0-15-lowlatency-64k - 6.5.0-15.15.1 No subscription required linux-headers-starfive - 6.5.0.1006.8 linux-image-starfive - 6.5.0.1006.8 linux-starfive - 6.5.0.1006.8 linux-tools-starfive - 6.5.0.1006.8 No subscription required linux-headers-laptop-23.10 - 6.5.0.1008.11 linux-image-laptop-23.10 - 6.5.0.1008.11 linux-laptop-23.10 - 6.5.0.1008.11 linux-tools-laptop-23.10 - 6.5.0.1008.11 No subscription required linux-headers-raspi - 6.5.0.1009.10 linux-headers-raspi-nolpae - 6.5.0.1009.10 linux-image-raspi - 6.5.0.1009.10 linux-image-raspi-nolpae - 6.5.0.1009.10 linux-modules-extra-raspi - 6.5.0.1009.10 linux-modules-extra-raspi-nolpae - 6.5.0.1009.10 linux-raspi - 6.5.0.1009.10 linux-raspi-nolpae - 6.5.0.1009.10 linux-tools-raspi - 6.5.0.1009.10 linux-tools-raspi-nolpae - 6.5.0.1009.10 No subscription required linux-gcp - 6.5.0.1011.11 linux-headers-gcp - 6.5.0.1011.11 linux-image-gcp - 6.5.0.1011.11 linux-modules-extra-gcp - 6.5.0.1011.11 linux-modules-iwlwifi-gcp - 6.5.0.1011.11 linux-tools-gcp - 6.5.0.1011.11 No subscription required linux-azure - 6.5.0.1011.13 linux-azure-fde - 6.5.0.1011.13 linux-cloud-tools-azure - 6.5.0.1011.13 linux-headers-azure - 6.5.0.1011.13 linux-image-azure - 6.5.0.1011.13 linux-image-azure-fde - 6.5.0.1011.13 linux-modules-extra-azure - 6.5.0.1011.13 linux-modules-iwlwifi-azure - 6.5.0.1011.13 linux-tools-azure - 6.5.0.1011.13 No subscription required linux-aws - 6.5.0.1012.12 linux-headers-aws - 6.5.0.1012.12 linux-image-aws - 6.5.0.1012.12 linux-modules-extra-aws - 6.5.0.1012.12 linux-tools-aws - 6.5.0.1012.12 No subscription required linux-headers-oracle - 6.5.0.1014.14 linux-image-oracle - 6.5.0.1014.14 linux-modules-iwlwifi-oracle - 6.5.0.1014.14 linux-oracle - 6.5.0.1014.14 linux-tools-oracle - 6.5.0.1014.14 No subscription required linux-cloud-tools-lowlatency - 6.5.0.15.15.13 linux-cloud-tools-lowlatency-hwe-20.04 - 6.5.0.15.15.13 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.5.0.15.15.13 linux-cloud-tools-lowlatency-hwe-22.04 - 6.5.0.15.15.13 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.5.0.15.15.13 linux-headers-lowlatency - 6.5.0.15.15.13 linux-headers-lowlatency-64k - 6.5.0.15.15.13 linux-headers-lowlatency-64k-hwe-20.04 - 6.5.0.15.15.13 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.5.0.15.15.13 linux-headers-lowlatency-64k-hwe-22.04 - 6.5.0.15.15.13 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.5.0.15.15.13 linux-headers-lowlatency-hwe-20.04 - 6.5.0.15.15.13 linux-headers-lowlatency-hwe-20.04-edge - 6.5.0.15.15.13 linux-headers-lowlatency-hwe-22.04 - 6.5.0.15.15.13 linux-headers-lowlatency-hwe-22.04-edge - 6.5.0.15.15.13 linux-image-lowlatency - 6.5.0.15.15.13 linux-image-lowlatency-64k - 6.5.0.15.15.13 linux-image-lowlatency-64k-hwe-20.04 - 6.5.0.15.15.13 linux-image-lowlatency-64k-hwe-20.04-edge - 6.5.0.15.15.13 linux-image-lowlatency-64k-hwe-22.04 - 6.5.0.15.15.13 linux-image-lowlatency-64k-hwe-22.04-edge - 6.5.0.15.15.13 linux-image-lowlatency-hwe-20.04 - 6.5.0.15.15.13 linux-image-lowlatency-hwe-20.04-edge - 6.5.0.15.15.13 linux-image-lowlatency-hwe-22.04 - 6.5.0.15.15.13 linux-image-lowlatency-hwe-22.04-edge - 6.5.0.15.15.13 linux-lowlatency - 6.5.0.15.15.13 linux-lowlatency-64k - 6.5.0.15.15.13 linux-lowlatency-64k-hwe-20.04 - 6.5.0.15.15.13 linux-lowlatency-64k-hwe-20.04-edge - 6.5.0.15.15.13 linux-lowlatency-64k-hwe-22.04 - 6.5.0.15.15.13 linux-lowlatency-64k-hwe-22.04-edge - 6.5.0.15.15.13 linux-lowlatency-hwe-20.04 - 6.5.0.15.15.13 linux-lowlatency-hwe-20.04-edge - 6.5.0.15.15.13 linux-lowlatency-hwe-22.04 - 6.5.0.15.15.13 linux-lowlatency-hwe-22.04-edge - 6.5.0.15.15.13 linux-modules-iwlwifi-lowlatency - 6.5.0.15.15.13 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.5.0.15.15.13 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.5.0.15.15.13 linux-tools-lowlatency - 6.5.0.15.15.13 linux-tools-lowlatency-64k - 6.5.0.15.15.13 linux-tools-lowlatency-64k-hwe-20.04 - 6.5.0.15.15.13 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.5.0.15.15.13 linux-tools-lowlatency-64k-hwe-22.04 - 6.5.0.15.15.13 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.5.0.15.15.13 linux-tools-lowlatency-hwe-20.04 - 6.5.0.15.15.13 linux-tools-lowlatency-hwe-20.04-edge - 6.5.0.15.15.13 linux-tools-lowlatency-hwe-22.04 - 6.5.0.15.15.13 linux-tools-lowlatency-hwe-22.04-edge - 6.5.0.15.15.13 No subscription required linux-cloud-tools-generic - 6.5.0.15.17 linux-cloud-tools-generic-hwe-22.04 - 6.5.0.15.17 linux-cloud-tools-generic-hwe-22.04-edge - 6.5.0.15.17 linux-cloud-tools-virtual - 6.5.0.15.17 linux-cloud-tools-virtual-hwe-22.04 - 6.5.0.15.17 linux-cloud-tools-virtual-hwe-22.04-edge - 6.5.0.15.17 linux-crashdump - 6.5.0.15.17 linux-generic - 6.5.0.15.17 linux-generic-64k - 6.5.0.15.17 linux-generic-64k-hwe-22.04 - 6.5.0.15.17 linux-generic-64k-hwe-22.04-edge - 6.5.0.15.17 linux-generic-hwe-22.04 - 6.5.0.15.17 linux-generic-hwe-22.04-edge - 6.5.0.15.17 linux-generic-lpae - 6.5.0.15.17 linux-headers-generic - 6.5.0.15.17 linux-headers-generic-64k - 6.5.0.15.17 linux-headers-generic-64k-hwe-22.04 - 6.5.0.15.17 linux-headers-generic-64k-hwe-22.04-edge - 6.5.0.15.17 linux-headers-generic-hwe-22.04 - 6.5.0.15.17 linux-headers-generic-hwe-22.04-edge - 6.5.0.15.17 linux-headers-generic-lpae - 6.5.0.15.17 linux-headers-kvm - 6.5.0.15.17 linux-headers-oem-22.04 - 6.5.0.15.17 linux-headers-virtual - 6.5.0.15.17 linux-headers-virtual-hwe-22.04 - 6.5.0.15.17 linux-headers-virtual-hwe-22.04-edge - 6.5.0.15.17 linux-image-extra-virtual - 6.5.0.15.17 linux-image-extra-virtual-hwe-22.04 - 6.5.0.15.17 linux-image-extra-virtual-hwe-22.04-edge - 6.5.0.15.17 linux-image-generic - 6.5.0.15.17 linux-image-generic-64k - 6.5.0.15.17 linux-image-generic-64k-hwe-22.04 - 6.5.0.15.17 linux-image-generic-64k-hwe-22.04-edge - 6.5.0.15.17 linux-image-generic-hwe-22.04 - 6.5.0.15.17 linux-image-generic-hwe-22.04-edge - 6.5.0.15.17 linux-image-generic-lpae - 6.5.0.15.17 linux-image-kvm - 6.5.0.15.17 linux-image-oem-22.04 - 6.5.0.15.17 linux-image-uc-generic - 6.5.0.15.17 linux-image-uc-generic-hwe-22.04 - 6.5.0.15.17 linux-image-uc-generic-hwe-22.04-edge - 6.5.0.15.17 linux-image-virtual - 6.5.0.15.17 linux-image-virtual-hwe-22.04 - 6.5.0.15.17 linux-image-virtual-hwe-22.04-edge - 6.5.0.15.17 linux-kvm - 6.5.0.15.17 linux-modules-ipu6-generic - 6.5.0.15.17 linux-modules-ipu6-generic-hwe-22.04 - 6.5.0.15.17 linux-modules-ipu6-generic-hwe-22.04-edge - 6.5.0.15.17 linux-modules-ipu6-oem-22.04 - 6.5.0.15.17 linux-modules-ivsc-generic - 6.5.0.15.17 linux-modules-ivsc-generic-hwe-22.04 - 6.5.0.15.17 linux-modules-ivsc-generic-hwe-22.04-edge - 6.5.0.15.17 linux-modules-ivsc-oem-22.04 - 6.5.0.15.17 linux-modules-iwlwifi-generic - 6.5.0.15.17 linux-modules-iwlwifi-generic-hwe-22.04 - 6.5.0.15.17 linux-modules-iwlwifi-generic-hwe-22.04-edge - 6.5.0.15.17 linux-modules-iwlwifi-oem-22.04 - 6.5.0.15.17 linux-oem-22.04 - 6.5.0.15.17 linux-source - 6.5.0.15.17 linux-tools-generic - 6.5.0.15.17 linux-tools-generic-64k - 6.5.0.15.17 linux-tools-generic-64k-hwe-22.04 - 6.5.0.15.17 linux-tools-generic-64k-hwe-22.04-edge - 6.5.0.15.17 linux-tools-generic-hwe-22.04 - 6.5.0.15.17 linux-tools-generic-hwe-22.04-edge - 6.5.0.15.17 linux-tools-generic-lpae - 6.5.0.15.17 linux-tools-kvm - 6.5.0.15.17 linux-tools-oem-22.04 - 6.5.0.15.17 linux-tools-virtual - 6.5.0.15.17 linux-tools-virtual-hwe-22.04 - 6.5.0.15.17 linux-tools-virtual-hwe-22.04-edge - 6.5.0.15.17 linux-virtual - 6.5.0.15.17 linux-virtual-hwe-22.04 - 6.5.0.15.17 linux-virtual-hwe-22.04-edge - 6.5.0.15.17 No subscription required High CVE-2023-6606 CVE-2023-6817 CVE-2023-6931 CVE-2023-6932 CVE-2024-0193 USN-6611-1 -- Exim vulnerability Ubuntu 23.10 It was discovered that Exim incorrectly handled certain requests. A remote attacker could possibly use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. Update Instructions: Run `sudo pro fix USN-6611-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: exim4 - 4.96-17ubuntu2.2 exim4-base - 4.96-17ubuntu2.2 exim4-config - 4.96-17ubuntu2.2 exim4-daemon-heavy - 4.96-17ubuntu2.2 exim4-daemon-light - 4.96-17ubuntu2.2 exim4-dev - 4.96-17ubuntu2.2 eximon4 - 4.96-17ubuntu2.2 No subscription required Medium CVE-2023-51766 USN-6612-1 -- TinyXML vulnerability Ubuntu 23.10 It was discovered that TinyXML incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted XML file, a remote attacker could possibly use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-6612-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libtinyxml-dev - 2.6.2-6ubuntu0.23.10.1 libtinyxml-doc - 2.6.2-6ubuntu0.23.10.1 libtinyxml2.6.2v5 - 2.6.2-6ubuntu0.23.10.1 No subscription required Medium CVE-2023-34194 USN-6613-1 -- Ceph vulnerability Ubuntu 23.10 Lucas Henry discovered that Ceph incorrectly handled specially crafted POST requests. An uprivileged user could use this to bypass Ceph's authorization checks and upload a file to any bucket. Update Instructions: Run `sudo pro fix USN-6613-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ceph - 18.2.0-0ubuntu3.1 ceph-base - 18.2.0-0ubuntu3.1 ceph-common - 18.2.0-0ubuntu3.1 ceph-fuse - 18.2.0-0ubuntu3.1 ceph-grafana-dashboards - 18.2.0-0ubuntu3.1 ceph-immutable-object-cache - 18.2.0-0ubuntu3.1 ceph-mds - 18.2.0-0ubuntu3.1 ceph-mgr - 18.2.0-0ubuntu3.1 ceph-mgr-cephadm - 18.2.0-0ubuntu3.1 ceph-mgr-dashboard - 18.2.0-0ubuntu3.1 ceph-mgr-diskprediction-local - 18.2.0-0ubuntu3.1 ceph-mgr-k8sevents - 18.2.0-0ubuntu3.1 ceph-mgr-modules-core - 18.2.0-0ubuntu3.1 ceph-mgr-rook - 18.2.0-0ubuntu3.1 ceph-mon - 18.2.0-0ubuntu3.1 ceph-osd - 18.2.0-0ubuntu3.1 ceph-prometheus-alerts - 18.2.0-0ubuntu3.1 ceph-resource-agents - 18.2.0-0ubuntu3.1 ceph-volume - 18.2.0-0ubuntu3.1 cephadm - 18.2.0-0ubuntu3.1 cephfs-mirror - 18.2.0-0ubuntu3.1 cephfs-shell - 18.2.0-0ubuntu3.1 crimson-osd - 18.2.0-0ubuntu3.1 libcephfs-dev - 18.2.0-0ubuntu3.1 libcephfs-java - 18.2.0-0ubuntu3.1 libcephfs-jni - 18.2.0-0ubuntu3.1 libcephfs2 - 18.2.0-0ubuntu3.1 librados-dev - 18.2.0-0ubuntu3.1 librados2 - 18.2.0-0ubuntu3.1 libradospp-dev - 18.2.0-0ubuntu3.1 libradosstriper-dev - 18.2.0-0ubuntu3.1 libradosstriper1 - 18.2.0-0ubuntu3.1 librbd-dev - 18.2.0-0ubuntu3.1 librbd1 - 18.2.0-0ubuntu3.1 librgw-dev - 18.2.0-0ubuntu3.1 librgw2 - 18.2.0-0ubuntu3.1 libsqlite3-mod-ceph - 18.2.0-0ubuntu3.1 libsqlite3-mod-ceph-dev - 18.2.0-0ubuntu3.1 python3-ceph - 18.2.0-0ubuntu3.1 python3-ceph-argparse - 18.2.0-0ubuntu3.1 python3-ceph-common - 18.2.0-0ubuntu3.1 python3-cephfs - 18.2.0-0ubuntu3.1 python3-rados - 18.2.0-0ubuntu3.1 python3-rbd - 18.2.0-0ubuntu3.1 python3-rgw - 18.2.0-0ubuntu3.1 rados-objclass-dev - 18.2.0-0ubuntu3.1 radosgw - 18.2.0-0ubuntu3.1 rbd-fuse - 18.2.0-0ubuntu3.1 rbd-mirror - 18.2.0-0ubuntu3.1 rbd-nbd - 18.2.0-0ubuntu3.1 No subscription required Medium CVE-2023-43040 USN-6614-1 -- amanda vulnerability Ubuntu 23.10 It was discovered that amanda did not properly check certain arguments. A local unprivileged attacker could possibly use this issue to perform a privilege escalation attack. Update Instructions: Run `sudo pro fix USN-6614-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: amanda-client - 1:3.5.1-11ubuntu0.23.10.1 amanda-common - 1:3.5.1-11ubuntu0.23.10.1 amanda-server - 1:3.5.1-11ubuntu0.23.10.1 No subscription required Medium CVE-2023-30577 USN-6615-1 -- MySQL vulnerabilities Ubuntu 23.10 Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 8.0.36 in Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 23.10. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information: https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-36.html https://www.oracle.com/security-alerts/cpujan2024.html Update Instructions: Run `sudo pro fix USN-6615-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libmysqlclient-dev - 8.0.36-0ubuntu0.23.10.1 libmysqlclient21 - 8.0.36-0ubuntu0.23.10.1 mysql-client - 8.0.36-0ubuntu0.23.10.1 mysql-client-8.0 - 8.0.36-0ubuntu0.23.10.1 mysql-client-core-8.0 - 8.0.36-0ubuntu0.23.10.1 mysql-router - 8.0.36-0ubuntu0.23.10.1 mysql-server - 8.0.36-0ubuntu0.23.10.1 mysql-server-8.0 - 8.0.36-0ubuntu0.23.10.1 mysql-server-core-8.0 - 8.0.36-0ubuntu0.23.10.1 mysql-source-8.0 - 8.0.36-0ubuntu0.23.10.1 mysql-testsuite - 8.0.36-0ubuntu0.23.10.1 mysql-testsuite-8.0 - 8.0.36-0ubuntu0.23.10.1 No subscription required Medium CVE-2024-20960 CVE-2024-20961 CVE-2024-20962 CVE-2024-20963 CVE-2024-20964 CVE-2024-20965 CVE-2024-20966 CVE-2024-20967 CVE-2024-20969 CVE-2024-20970 CVE-2024-20971 CVE-2024-20972 CVE-2024-20973 CVE-2024-20974 CVE-2024-20976 CVE-2024-20977 CVE-2024-20978 CVE-2024-20981 CVE-2024-20982 CVE-2024-20983 CVE-2024-20984 CVE-2024-20985 USN-6618-1 -- Pillow vulnerabilities Ubuntu 23.10 It was discovered that Pillow incorrectly handled certain long text arguments. An attacker could possibly use this issue to cause Pillow to consume resources, leading to a denial of service. This issue only affected Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2023-44271) Duarte Santos discovered that Pillow incorrectly handled the environment parameter to PIL.ImageMath.eval. An attacker could possibly use this issue to execute arbitrary code. (CVE-2023-50447) Update Instructions: Run `sudo pro fix USN-6618-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-pil-doc - 10.0.0-1ubuntu0.1 python3-pil - 10.0.0-1ubuntu0.1 python3-pil.imagetk - 10.0.0-1ubuntu0.1 No subscription required Medium CVE-2023-44271 CVE-2023-50447 USN-6619-1 -- runC vulnerability Ubuntu 23.10 Rory McNamara discovered that runC did not properly manage internal file descriptor while managing containers. An attacker could possibly use this issue to obtain sensitive information or bypass container restrictions. Update Instructions: Run `sudo pro fix USN-6619-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: golang-github-opencontainers-runc-dev - 1.1.7-0ubuntu2.2 runc - 1.1.7-0ubuntu2.2 No subscription required High CVE-2024-21626 USN-6620-1 -- GNU C Library vulnerabilities Ubuntu 23.10 It was discovered that the GNU C Library incorrectly handled the syslog() function call. A local attacker could use this issue to execute arbitrary code and possibly escalate privileges. Update Instructions: Run `sudo pro fix USN-6620-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: glibc-doc - 2.38-1ubuntu6.1 glibc-source - 2.38-1ubuntu6.1 libc-bin - 2.38-1ubuntu6.1 libc-dev-bin - 2.38-1ubuntu6.1 libc-devtools - 2.38-1ubuntu6.1 libc6 - 2.38-1ubuntu6.1 libc6-amd64 - 2.38-1ubuntu6.1 libc6-dev - 2.38-1ubuntu6.1 libc6-dev-amd64 - 2.38-1ubuntu6.1 libc6-dev-i386 - 2.38-1ubuntu6.1 libc6-dev-s390 - 2.38-1ubuntu6.1 libc6-dev-x32 - 2.38-1ubuntu6.1 libc6-i386 - 2.38-1ubuntu6.1 libc6-prof - 2.38-1ubuntu6.1 libc6-s390 - 2.38-1ubuntu6.1 libc6-x32 - 2.38-1ubuntu6.1 locales - 2.38-1ubuntu6.1 locales-all - 2.38-1ubuntu6.1 nscd - 2.38-1ubuntu6.1 No subscription required Medium CVE-2023-6246 CVE-2023-6779 CVE-2023-6780 USN-6622-1 -- OpenSSL vulnerabilities Ubuntu 23.10 David Benjamin discovered that OpenSSL incorrectly handled excessively long X9.42 DH keys. A remote attacker could possibly use this issue to cause OpenSSL to consume resources, leading to a denial of service. (CVE-2023-5678) Sverker Eriksson discovered that OpenSSL incorrectly handled POLY1304 MAC on the PowerPC architecture. A remote attacker could use this issue to cause OpenSSL to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 22.04 LTS and Ubuntu 23.04. (CVE-2023-6129) It was discovered that OpenSSL incorrectly handled excessively long RSA public keys. A remote attacker could possibly use this issue to cause OpenSSL to consume resources, leading to a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 23.04. (CVE-2023-6237) Bahaa Naamneh discovered that OpenSSL incorrectly handled certain malformed PKCS12 files. A remote attacker could possibly use this issue to cause OpenSSL to crash, resulting in a denial of service. (CVE-2024-0727) Update Instructions: Run `sudo pro fix USN-6622-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libssl-dev - 3.0.10-1ubuntu2.2 libssl-doc - 3.0.10-1ubuntu2.2 libssl3 - 3.0.10-1ubuntu2.2 openssl - 3.0.10-1ubuntu2.2 No subscription required Low CVE-2023-5678 CVE-2023-6129 CVE-2023-6237 CVE-2024-0727 USN-6623-1 -- Django vulnerability Ubuntu 23.10 It was discovered that Django incorrectly handled certain inputs that uses intcomma template filter. An attacker could possibly use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-6623-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-django-doc - 3:4.2.4-1ubuntu2.1 python3-django - 3:4.2.4-1ubuntu2.1 No subscription required Medium CVE-2024-24680 USN-6624-1 -- Linux kernel vulnerabilities Ubuntu 23.10 Marek Marczykowski-Górecki discovered that the Xen event channel infrastructure implementation in the Linux kernel contained a race condition. An attacker in a guest VM could possibly use this to cause a denial of service (paravirtualized device unavailability). (CVE-2023-34324) Zheng Wang discovered a use-after-free in the Renesas Ethernet AVB driver in the Linux kernel during device removal. A privileged attacker could use this to cause a denial of service (system crash). (CVE-2023-35827) Tom Dohrmann discovered that the Secure Encrypted Virtualization (SEV) implementation for AMD processors in the Linux kernel contained a race condition when accessing MMIO registers. A local attacker in a SEV guest VM could possibly use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-46813) It was discovered that the io_uring subsystem in the Linux kernel contained a race condition, leading to a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service (system crash). (CVE-2023-46862) It was discovered that the netfilter subsystem in the Linux kernel did not properly validate inner tunnel netlink attributes, leading to a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service (system crash). (CVE-2023-5972) It was discovered that the TLS subsystem in the Linux kernel did not properly perform cryptographic operations in some situations, leading to a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-6176) Jann Horn discovered that a race condition existed in the Linux kernel when handling io_uring over sockets, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-6531) Xingyuan Mo discovered that the netfilter subsystem in the Linux kernel did not properly handle dynset expressions passed from userspace, leading to a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service (system crash). (CVE-2023-6622) It was discovered that the TIPC protocol implementation in the Linux kernel did not properly handle locking during tipc_crypto_key_revoke() operations. A local attacker could use this to cause a denial of service (kernel deadlock). (CVE-2024-0641) Update Instructions: Run `sudo pro fix USN-6624-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.5.0-1007-starfive - 6.5.0-1007.8 linux-headers-6.5.0-1007-starfive - 6.5.0-1007.8 linux-image-6.5.0-1007-starfive - 6.5.0-1007.8 linux-modules-6.5.0-1007-starfive - 6.5.0-1007.8 linux-modules-extra-6.5.0-1007-starfive - 6.5.0-1007.8 linux-starfive-headers-6.5.0-1007 - 6.5.0-1007.8 linux-starfive-tools-6.5.0-1007 - 6.5.0-1007.8 linux-tools-6.5.0-1007-starfive - 6.5.0-1007.8 No subscription required linux-buildinfo-6.5.0-1009-laptop - 6.5.0-1009.12 linux-headers-6.5.0-1009-laptop - 6.5.0-1009.12 linux-image-6.5.0-1009-laptop - 6.5.0-1009.12 linux-laptop-headers-6.5.0-1009 - 6.5.0-1009.12 linux-laptop-tools-6.5.0-1009 - 6.5.0-1009.12 linux-modules-6.5.0-1009-laptop - 6.5.0-1009.12 linux-tools-6.5.0-1009-laptop - 6.5.0-1009.12 No subscription required linux-buildinfo-6.5.0-1010-raspi - 6.5.0-1010.13 linux-headers-6.5.0-1010-raspi - 6.5.0-1010.13 linux-image-6.5.0-1010-raspi - 6.5.0-1010.13 linux-modules-6.5.0-1010-raspi - 6.5.0-1010.13 linux-modules-extra-6.5.0-1010-raspi - 6.5.0-1010.13 linux-raspi-headers-6.5.0-1010 - 6.5.0-1010.13 linux-raspi-tools-6.5.0-1010 - 6.5.0-1010.13 linux-tools-6.5.0-1010-raspi - 6.5.0-1010.13 No subscription required linux-aws-cloud-tools-6.5.0-1013 - 6.5.0-1013.13 linux-aws-headers-6.5.0-1013 - 6.5.0-1013.13 linux-aws-tools-6.5.0-1013 - 6.5.0-1013.13 linux-buildinfo-6.5.0-1013-aws - 6.5.0-1013.13 linux-buildinfo-6.5.0-1013-gcp - 6.5.0-1013.13 linux-cloud-tools-6.5.0-1013-aws - 6.5.0-1013.13 linux-gcp-headers-6.5.0-1013 - 6.5.0-1013.13 linux-gcp-tools-6.5.0-1013 - 6.5.0-1013.13 linux-headers-6.5.0-1013-aws - 6.5.0-1013.13 linux-headers-6.5.0-1013-gcp - 6.5.0-1013.13 linux-image-6.5.0-1013-aws - 6.5.0-1013.13 linux-image-6.5.0-1013-gcp - 6.5.0-1013.13 linux-image-unsigned-6.5.0-1013-aws - 6.5.0-1013.13 linux-image-unsigned-6.5.0-1013-gcp - 6.5.0-1013.13 linux-modules-6.5.0-1013-aws - 6.5.0-1013.13 linux-modules-6.5.0-1013-gcp - 6.5.0-1013.13 linux-modules-extra-6.5.0-1013-aws - 6.5.0-1013.13 linux-modules-extra-6.5.0-1013-gcp - 6.5.0-1013.13 linux-modules-ipu6-6.5.0-1013-aws - 6.5.0-1013.13 linux-modules-ivsc-6.5.0-1013-aws - 6.5.0-1013.13 linux-modules-iwlwifi-6.5.0-1013-aws - 6.5.0-1013.13 linux-modules-iwlwifi-6.5.0-1013-gcp - 6.5.0-1013.13 linux-tools-6.5.0-1013-aws - 6.5.0-1013.13 linux-tools-6.5.0-1013-gcp - 6.5.0-1013.13 No subscription required linux-buildinfo-6.5.0-1015-oracle - 6.5.0-1015.15 linux-headers-6.5.0-1015-oracle - 6.5.0-1015.15 linux-image-6.5.0-1015-oracle - 6.5.0-1015.15 linux-image-unsigned-6.5.0-1015-oracle - 6.5.0-1015.15 linux-modules-6.5.0-1015-oracle - 6.5.0-1015.15 linux-modules-extra-6.5.0-1015-oracle - 6.5.0-1015.15 linux-modules-iwlwifi-6.5.0-1015-oracle - 6.5.0-1015.15 linux-oracle-headers-6.5.0-1015 - 6.5.0-1015.15 linux-oracle-tools-6.5.0-1015 - 6.5.0-1015.15 linux-tools-6.5.0-1015-oracle - 6.5.0-1015.15 No subscription required linux-buildinfo-6.5.0-17-generic - 6.5.0-17.17 linux-buildinfo-6.5.0-17-generic-64k - 6.5.0-17.17 linux-cloud-tools-6.5.0-17 - 6.5.0-17.17 linux-cloud-tools-6.5.0-17-generic - 6.5.0-17.17 linux-cloud-tools-common - 6.5.0-17.17 linux-doc - 6.5.0-17.17 linux-headers-6.5.0-17 - 6.5.0-17.17 linux-headers-6.5.0-17-generic - 6.5.0-17.17 linux-headers-6.5.0-17-generic-64k - 6.5.0-17.17 linux-image-6.5.0-17-generic - 6.5.0-17.17 linux-image-6.5.0-17-generic-64k - 6.5.0-17.17 linux-image-uc-6.5.0-17-generic - 6.5.0-17.17 linux-image-uc-6.5.0-17-generic-64k - 6.5.0-17.17 linux-image-unsigned-6.5.0-17-generic - 6.5.0-17.17 linux-image-unsigned-6.5.0-17-generic-64k - 6.5.0-17.17 linux-lib-rust-6.5.0-17-generic - 6.5.0-17.17 linux-libc-dev - 6.5.0-17.17 linux-modules-6.5.0-17-generic - 6.5.0-17.17 linux-modules-6.5.0-17-generic-64k - 6.5.0-17.17 linux-modules-extra-6.5.0-17-generic - 6.5.0-17.17 linux-modules-ipu6-6.5.0-17-generic - 6.5.0-17.17 linux-modules-ivsc-6.5.0-17-generic - 6.5.0-17.17 linux-modules-iwlwifi-6.5.0-17-generic - 6.5.0-17.17 linux-source-6.5.0 - 6.5.0-17.17 linux-tools-6.5.0-17 - 6.5.0-17.17 linux-tools-6.5.0-17-generic - 6.5.0-17.17 linux-tools-6.5.0-17-generic-64k - 6.5.0-17.17 linux-tools-common - 6.5.0-17.17 linux-tools-host - 6.5.0-17.17 No subscription required linux-buildinfo-6.5.0-17-lowlatency - 6.5.0-17.17.1 linux-buildinfo-6.5.0-17-lowlatency-64k - 6.5.0-17.17.1 linux-cloud-tools-6.5.0-17-lowlatency - 6.5.0-17.17.1 linux-headers-6.5.0-17-lowlatency - 6.5.0-17.17.1 linux-headers-6.5.0-17-lowlatency-64k - 6.5.0-17.17.1 linux-image-6.5.0-17-lowlatency - 6.5.0-17.17.1 linux-image-6.5.0-17-lowlatency-64k - 6.5.0-17.17.1 linux-image-unsigned-6.5.0-17-lowlatency - 6.5.0-17.17.1 linux-image-unsigned-6.5.0-17-lowlatency-64k - 6.5.0-17.17.1 linux-lowlatency-cloud-tools-6.5.0-17 - 6.5.0-17.17.1 linux-lowlatency-cloud-tools-common - 6.5.0-17.17.1 linux-lowlatency-headers-6.5.0-17 - 6.5.0-17.17.1 linux-lowlatency-lib-rust-6.5.0-17-lowlatency - 6.5.0-17.17.1 linux-lowlatency-tools-6.5.0-17 - 6.5.0-17.17.1 linux-lowlatency-tools-common - 6.5.0-17.17.1 linux-lowlatency-tools-host - 6.5.0-17.17.1 linux-modules-6.5.0-17-lowlatency - 6.5.0-17.17.1 linux-modules-6.5.0-17-lowlatency-64k - 6.5.0-17.17.1 linux-modules-iwlwifi-6.5.0-17-lowlatency - 6.5.0-17.17.1 linux-tools-6.5.0-17-lowlatency - 6.5.0-17.17.1 linux-tools-6.5.0-17-lowlatency-64k - 6.5.0-17.17.1 No subscription required linux-headers-starfive - 6.5.0.1007.9 linux-image-starfive - 6.5.0.1007.9 linux-starfive - 6.5.0.1007.9 linux-tools-starfive - 6.5.0.1007.9 No subscription required linux-headers-laptop-23.10 - 6.5.0.1009.12 linux-image-laptop-23.10 - 6.5.0.1009.12 linux-laptop-23.10 - 6.5.0.1009.12 linux-tools-laptop-23.10 - 6.5.0.1009.12 No subscription required linux-headers-raspi - 6.5.0.1010.11 linux-headers-raspi-nolpae - 6.5.0.1010.11 linux-image-raspi - 6.5.0.1010.11 linux-image-raspi-nolpae - 6.5.0.1010.11 linux-modules-extra-raspi - 6.5.0.1010.11 linux-modules-extra-raspi-nolpae - 6.5.0.1010.11 linux-raspi - 6.5.0.1010.11 linux-raspi-nolpae - 6.5.0.1010.11 linux-tools-raspi - 6.5.0.1010.11 linux-tools-raspi-nolpae - 6.5.0.1010.11 No subscription required linux-aws - 6.5.0.1013.13 linux-gcp - 6.5.0.1013.13 linux-headers-aws - 6.5.0.1013.13 linux-headers-gcp - 6.5.0.1013.13 linux-image-aws - 6.5.0.1013.13 linux-image-gcp - 6.5.0.1013.13 linux-modules-extra-aws - 6.5.0.1013.13 linux-modules-extra-gcp - 6.5.0.1013.13 linux-modules-iwlwifi-gcp - 6.5.0.1013.13 linux-tools-aws - 6.5.0.1013.13 linux-tools-gcp - 6.5.0.1013.13 No subscription required linux-headers-oracle - 6.5.0.1015.15 linux-image-oracle - 6.5.0.1015.15 linux-modules-iwlwifi-oracle - 6.5.0.1015.15 linux-oracle - 6.5.0.1015.15 linux-tools-oracle - 6.5.0.1015.15 No subscription required linux-cloud-tools-lowlatency - 6.5.0.17.17.14 linux-cloud-tools-lowlatency-hwe-20.04 - 6.5.0.17.17.14 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.5.0.17.17.14 linux-cloud-tools-lowlatency-hwe-22.04 - 6.5.0.17.17.14 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.5.0.17.17.14 linux-headers-lowlatency - 6.5.0.17.17.14 linux-headers-lowlatency-64k - 6.5.0.17.17.14 linux-headers-lowlatency-64k-hwe-20.04 - 6.5.0.17.17.14 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.5.0.17.17.14 linux-headers-lowlatency-64k-hwe-22.04 - 6.5.0.17.17.14 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.5.0.17.17.14 linux-headers-lowlatency-hwe-20.04 - 6.5.0.17.17.14 linux-headers-lowlatency-hwe-20.04-edge - 6.5.0.17.17.14 linux-headers-lowlatency-hwe-22.04 - 6.5.0.17.17.14 linux-headers-lowlatency-hwe-22.04-edge - 6.5.0.17.17.14 linux-image-lowlatency - 6.5.0.17.17.14 linux-image-lowlatency-64k - 6.5.0.17.17.14 linux-image-lowlatency-64k-hwe-20.04 - 6.5.0.17.17.14 linux-image-lowlatency-64k-hwe-20.04-edge - 6.5.0.17.17.14 linux-image-lowlatency-64k-hwe-22.04 - 6.5.0.17.17.14 linux-image-lowlatency-64k-hwe-22.04-edge - 6.5.0.17.17.14 linux-image-lowlatency-hwe-20.04 - 6.5.0.17.17.14 linux-image-lowlatency-hwe-20.04-edge - 6.5.0.17.17.14 linux-image-lowlatency-hwe-22.04 - 6.5.0.17.17.14 linux-image-lowlatency-hwe-22.04-edge - 6.5.0.17.17.14 linux-lowlatency - 6.5.0.17.17.14 linux-lowlatency-64k - 6.5.0.17.17.14 linux-lowlatency-64k-hwe-20.04 - 6.5.0.17.17.14 linux-lowlatency-64k-hwe-20.04-edge - 6.5.0.17.17.14 linux-lowlatency-64k-hwe-22.04 - 6.5.0.17.17.14 linux-lowlatency-64k-hwe-22.04-edge - 6.5.0.17.17.14 linux-lowlatency-hwe-20.04 - 6.5.0.17.17.14 linux-lowlatency-hwe-20.04-edge - 6.5.0.17.17.14 linux-lowlatency-hwe-22.04 - 6.5.0.17.17.14 linux-lowlatency-hwe-22.04-edge - 6.5.0.17.17.14 linux-modules-iwlwifi-lowlatency - 6.5.0.17.17.14 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.5.0.17.17.14 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.5.0.17.17.14 linux-tools-lowlatency - 6.5.0.17.17.14 linux-tools-lowlatency-64k - 6.5.0.17.17.14 linux-tools-lowlatency-64k-hwe-20.04 - 6.5.0.17.17.14 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.5.0.17.17.14 linux-tools-lowlatency-64k-hwe-22.04 - 6.5.0.17.17.14 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.5.0.17.17.14 linux-tools-lowlatency-hwe-20.04 - 6.5.0.17.17.14 linux-tools-lowlatency-hwe-20.04-edge - 6.5.0.17.17.14 linux-tools-lowlatency-hwe-22.04 - 6.5.0.17.17.14 linux-tools-lowlatency-hwe-22.04-edge - 6.5.0.17.17.14 No subscription required linux-cloud-tools-generic - 6.5.0.17.19 linux-cloud-tools-generic-hwe-22.04 - 6.5.0.17.19 linux-cloud-tools-generic-hwe-22.04-edge - 6.5.0.17.19 linux-cloud-tools-virtual - 6.5.0.17.19 linux-cloud-tools-virtual-hwe-22.04 - 6.5.0.17.19 linux-cloud-tools-virtual-hwe-22.04-edge - 6.5.0.17.19 linux-crashdump - 6.5.0.17.19 linux-generic - 6.5.0.17.19 linux-generic-64k - 6.5.0.17.19 linux-generic-64k-hwe-22.04 - 6.5.0.17.19 linux-generic-64k-hwe-22.04-edge - 6.5.0.17.19 linux-generic-hwe-22.04 - 6.5.0.17.19 linux-generic-hwe-22.04-edge - 6.5.0.17.19 linux-generic-lpae - 6.5.0.17.19 linux-headers-generic - 6.5.0.17.19 linux-headers-generic-64k - 6.5.0.17.19 linux-headers-generic-64k-hwe-22.04 - 6.5.0.17.19 linux-headers-generic-64k-hwe-22.04-edge - 6.5.0.17.19 linux-headers-generic-hwe-22.04 - 6.5.0.17.19 linux-headers-generic-hwe-22.04-edge - 6.5.0.17.19 linux-headers-generic-lpae - 6.5.0.17.19 linux-headers-kvm - 6.5.0.17.19 linux-headers-oem-20.04 - 6.5.0.17.19 linux-headers-oem-20.04b - 6.5.0.17.19 linux-headers-oem-20.04c - 6.5.0.17.19 linux-headers-oem-20.04d - 6.5.0.17.19 linux-headers-oem-22.04 - 6.5.0.17.19 linux-headers-virtual - 6.5.0.17.19 linux-headers-virtual-hwe-22.04 - 6.5.0.17.19 linux-headers-virtual-hwe-22.04-edge - 6.5.0.17.19 linux-image-extra-virtual - 6.5.0.17.19 linux-image-extra-virtual-hwe-22.04 - 6.5.0.17.19 linux-image-extra-virtual-hwe-22.04-edge - 6.5.0.17.19 linux-image-generic - 6.5.0.17.19 linux-image-generic-64k - 6.5.0.17.19 linux-image-generic-64k-hwe-22.04 - 6.5.0.17.19 linux-image-generic-64k-hwe-22.04-edge - 6.5.0.17.19 linux-image-generic-hwe-22.04 - 6.5.0.17.19 linux-image-generic-hwe-22.04-edge - 6.5.0.17.19 linux-image-generic-lpae - 6.5.0.17.19 linux-image-kvm - 6.5.0.17.19 linux-image-oem-20.04 - 6.5.0.17.19 linux-image-oem-20.04b - 6.5.0.17.19 linux-image-oem-20.04c - 6.5.0.17.19 linux-image-oem-20.04d - 6.5.0.17.19 linux-image-oem-22.04 - 6.5.0.17.19 linux-image-uc-generic - 6.5.0.17.19 linux-image-uc-generic-hwe-22.04 - 6.5.0.17.19 linux-image-uc-generic-hwe-22.04-edge - 6.5.0.17.19 linux-image-virtual - 6.5.0.17.19 linux-image-virtual-hwe-22.04 - 6.5.0.17.19 linux-image-virtual-hwe-22.04-edge - 6.5.0.17.19 linux-kvm - 6.5.0.17.19 linux-modules-ipu6-generic - 6.5.0.17.19 linux-modules-ipu6-generic-hwe-22.04 - 6.5.0.17.19 linux-modules-ipu6-generic-hwe-22.04-edge - 6.5.0.17.19 linux-modules-ipu6-oem-22.04 - 6.5.0.17.19 linux-modules-ivsc-generic - 6.5.0.17.19 linux-modules-ivsc-generic-hwe-22.04 - 6.5.0.17.19 linux-modules-ivsc-generic-hwe-22.04-edge - 6.5.0.17.19 linux-modules-ivsc-oem-22.04 - 6.5.0.17.19 linux-modules-iwlwifi-generic - 6.5.0.17.19 linux-modules-iwlwifi-generic-hwe-22.04 - 6.5.0.17.19 linux-modules-iwlwifi-generic-hwe-22.04-edge - 6.5.0.17.19 linux-modules-iwlwifi-oem-20.04 - 6.5.0.17.19 linux-modules-iwlwifi-oem-20.04d - 6.5.0.17.19 linux-modules-iwlwifi-oem-22.04 - 6.5.0.17.19 linux-oem-20.04 - 6.5.0.17.19 linux-oem-20.04b - 6.5.0.17.19 linux-oem-20.04c - 6.5.0.17.19 linux-oem-20.04d - 6.5.0.17.19 linux-oem-22.04 - 6.5.0.17.19 linux-source - 6.5.0.17.19 linux-tools-generic - 6.5.0.17.19 linux-tools-generic-64k - 6.5.0.17.19 linux-tools-generic-64k-hwe-22.04 - 6.5.0.17.19 linux-tools-generic-64k-hwe-22.04-edge - 6.5.0.17.19 linux-tools-generic-hwe-22.04 - 6.5.0.17.19 linux-tools-generic-hwe-22.04-edge - 6.5.0.17.19 linux-tools-generic-lpae - 6.5.0.17.19 linux-tools-kvm - 6.5.0.17.19 linux-tools-oem-20.04 - 6.5.0.17.19 linux-tools-oem-20.04b - 6.5.0.17.19 linux-tools-oem-20.04c - 6.5.0.17.19 linux-tools-oem-20.04d - 6.5.0.17.19 linux-tools-oem-22.04 - 6.5.0.17.19 linux-tools-virtual - 6.5.0.17.19 linux-tools-virtual-hwe-22.04 - 6.5.0.17.19 linux-tools-virtual-hwe-22.04-edge - 6.5.0.17.19 linux-virtual - 6.5.0.17.19 linux-virtual-hwe-22.04 - 6.5.0.17.19 linux-virtual-hwe-22.04-edge - 6.5.0.17.19 No subscription required High CVE-2023-34324 CVE-2023-35827 CVE-2023-46813 CVE-2023-46862 CVE-2023-5972 CVE-2023-6176 CVE-2023-6531 CVE-2023-6622 CVE-2024-0641 USN-6630-1 -- Glance_store vulnerability Ubuntu 23.10 It was discovered that Glance_store incorrectly handled logging when the DEBUG log level is enabled. A local attacker could use this issue to obtain access_key values. Update Instructions: Run `sudo pro fix USN-6630-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-glance-store-doc - 4.6.1-0ubuntu1.1 python3-glance-store - 4.6.1-0ubuntu1.1 No subscription required Medium CVE-2024-1141 USN-6631-1 -- WebKitGTK vulnerabilities Ubuntu 23.10 Several security issues were discovered in the WebKitGTK Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution. Update Instructions: Run `sudo pro fix USN-6631-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-javascriptcoregtk-4.0 - 2.42.5-0ubuntu0.23.10.2 gir1.2-javascriptcoregtk-4.1 - 2.42.5-0ubuntu0.23.10.2 gir1.2-javascriptcoregtk-6.0 - 2.42.5-0ubuntu0.23.10.2 gir1.2-webkit-6.0 - 2.42.5-0ubuntu0.23.10.2 gir1.2-webkit2-4.0 - 2.42.5-0ubuntu0.23.10.2 gir1.2-webkit2-4.1 - 2.42.5-0ubuntu0.23.10.2 libjavascriptcoregtk-4.0-18 - 2.42.5-0ubuntu0.23.10.2 libjavascriptcoregtk-4.0-bin - 2.42.5-0ubuntu0.23.10.2 libjavascriptcoregtk-4.0-dev - 2.42.5-0ubuntu0.23.10.2 libjavascriptcoregtk-4.1-0 - 2.42.5-0ubuntu0.23.10.2 libjavascriptcoregtk-4.1-dev - 2.42.5-0ubuntu0.23.10.2 libjavascriptcoregtk-6.0-1 - 2.42.5-0ubuntu0.23.10.2 libjavascriptcoregtk-6.0-dev - 2.42.5-0ubuntu0.23.10.2 libwebkit2gtk-4.0-37 - 2.42.5-0ubuntu0.23.10.2 libwebkit2gtk-4.0-dev - 2.42.5-0ubuntu0.23.10.2 libwebkit2gtk-4.0-doc - 2.42.5-0ubuntu0.23.10.2 libwebkit2gtk-4.1-0 - 2.42.5-0ubuntu0.23.10.2 libwebkit2gtk-4.1-dev - 2.42.5-0ubuntu0.23.10.2 libwebkitgtk-6.0-4 - 2.42.5-0ubuntu0.23.10.2 libwebkitgtk-6.0-dev - 2.42.5-0ubuntu0.23.10.2 webkit2gtk-driver - 2.42.5-0ubuntu0.23.10.2 No subscription required Medium CVE-2024-23206 CVE-2024-23213 CVE-2024-23222 USN-6633-1 -- Bind vulnerabilities Ubuntu 23.10 Shoham Danino, Anat Bremler-Barr, Yehuda Afek, and Yuval Shavitt discovered that Bind incorrectly handled parsing large DNS messages. A remote attacker could possibly use this issue to cause Bind to consume resources, leading to a denial of service. (CVE-2023-4408) Elias Heftrig, Haya Schulmann, Niklas Vogel, and Michael Waidner discovered that Bind icorrectly handled validating DNSSEC messages. A remote attacker could possibly use this issue to cause Bind to consume resources, leading to a denial of service. (CVE-2023-50387) It was discovered that Bind incorrectly handled preparing an NSEC3 closest encloser proof. A remote attacker could possibly use this issue to cause Bind to consume resources, leading to a denial of service. (CVE-2023-50868) It was discovered that Bind incorrectly handled reverse zone queries when nxdomain-redirect is enabled. A remote attacker could possibly use this issue to cause Bind to crash, leading to a denial of service. (CVE-2023-5517) It was discovered that Bind incorrectly handled recursive resolution when both DNS64 and serve-stable were enabled. A remote attacker could possibly use this issue to cause Bind to crash, leading to a denial of service. (CVE-2023-5679) Update Instructions: Run `sudo pro fix USN-6633-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: bind9 - 1:9.18.18-0ubuntu2.1 bind9-dev - 1:9.18.18-0ubuntu2.1 bind9-dnsutils - 1:9.18.18-0ubuntu2.1 bind9-doc - 1:9.18.18-0ubuntu2.1 bind9-host - 1:9.18.18-0ubuntu2.1 bind9-libs - 1:9.18.18-0ubuntu2.1 bind9-utils - 1:9.18.18-0ubuntu2.1 bind9utils - 1:9.18.18-0ubuntu2.1 dnsutils - 1:9.18.18-0ubuntu2.1 No subscription required Medium CVE-2023-4408 CVE-2023-50387 CVE-2023-50868 CVE-2023-5517 CVE-2023-5679 USN-6634-1 -- .NET vulnerabilities Ubuntu 23.10 Brennan Conroy discovered that .NET with SignalR did not properly handle malicious clients. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-21386) Bahaa Naamneh discovered that .NET with OpenSSL support did not properly parse X509 certificates. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-21404) Update Instructions: Run `sudo pro fix USN-6634-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: aspnetcore-runtime-6.0 - 6.0.127-0ubuntu1~23.10.1 aspnetcore-targeting-pack-6.0 - 6.0.127-0ubuntu1~23.10.1 dotnet-apphost-pack-6.0 - 6.0.127-0ubuntu1~23.10.1 dotnet-host - 6.0.127-0ubuntu1~23.10.1 dotnet-hostfxr-6.0 - 6.0.127-0ubuntu1~23.10.1 dotnet-runtime-6.0 - 6.0.127-0ubuntu1~23.10.1 dotnet-sdk-6.0 - 6.0.127-0ubuntu1~23.10.1 dotnet-sdk-6.0-source-built-artifacts - 6.0.127-0ubuntu1~23.10.1 dotnet-targeting-pack-6.0 - 6.0.127-0ubuntu1~23.10.1 dotnet-templates-6.0 - 6.0.127-0ubuntu1~23.10.1 dotnet6 - 6.0.127-0ubuntu1~23.10.1 netstandard-targeting-pack-2.1 - 6.0.127-0ubuntu1~23.10.1 No subscription required aspnetcore-runtime-7.0 - 7.0.116-0ubuntu1~23.10.1 aspnetcore-targeting-pack-7.0 - 7.0.116-0ubuntu1~23.10.1 dotnet-apphost-pack-7.0 - 7.0.116-0ubuntu1~23.10.1 dotnet-host-7.0 - 7.0.116-0ubuntu1~23.10.1 dotnet-hostfxr-7.0 - 7.0.116-0ubuntu1~23.10.1 dotnet-runtime-7.0 - 7.0.116-0ubuntu1~23.10.1 dotnet-sdk-7.0 - 7.0.116-0ubuntu1~23.10.1 dotnet-sdk-7.0-source-built-artifacts - 7.0.116-0ubuntu1~23.10.1 dotnet-targeting-pack-7.0 - 7.0.116-0ubuntu1~23.10.1 dotnet-templates-7.0 - 7.0.116-0ubuntu1~23.10.1 dotnet7 - 7.0.116-0ubuntu1~23.10.1 netstandard-targeting-pack-2.1-7.0 - 7.0.116-0ubuntu1~23.10.1 No subscription required dotnet-sdk-8.0 - 8.0.102-0ubuntu1~23.10.1 dotnet-sdk-8.0-source-built-artifacts - 8.0.102-0ubuntu1~23.10.1 dotnet-templates-8.0 - 8.0.102-0ubuntu1~23.10.1 netstandard-targeting-pack-2.1-8.0 - 8.0.102-0ubuntu1~23.10.1 No subscription required dotnet8 - 8.0.102-8.0.2-0ubuntu1~23.10.1 No subscription required aspnetcore-runtime-8.0 - 8.0.2-0ubuntu1~23.10.1 aspnetcore-targeting-pack-8.0 - 8.0.2-0ubuntu1~23.10.1 dotnet-apphost-pack-8.0 - 8.0.2-0ubuntu1~23.10.1 dotnet-host-8.0 - 8.0.2-0ubuntu1~23.10.1 dotnet-hostfxr-8.0 - 8.0.2-0ubuntu1~23.10.1 dotnet-runtime-8.0 - 8.0.2-0ubuntu1~23.10.1 dotnet-targeting-pack-8.0 - 8.0.2-0ubuntu1~23.10.1 No subscription required Medium CVE-2024-21386 CVE-2024-21404 USN-6636-1 -- ClamAV vulnerabilities Ubuntu 23.10 It was discovered that ClamAV incorrectly handled parsing certain OLE2 files. A remote attacker could possibly use this issue to cause ClamAV to crash, resulting in a denial of service. (CVE-2024-20290) Amit Schendel discovered that the ClamAV ClamD service incorrectly handled the VirusEvent feature. An attacker able to connect to ClamD could possibly use this issue to execute arbitrary code. (CVE-2024-20328) Update Instructions: Run `sudo pro fix USN-6636-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: clamav - 1.0.5+dfsg-0ubuntu0.23.10.1 clamav-base - 1.0.5+dfsg-0ubuntu0.23.10.1 clamav-daemon - 1.0.5+dfsg-0ubuntu0.23.10.1 clamav-docs - 1.0.5+dfsg-0ubuntu0.23.10.1 clamav-freshclam - 1.0.5+dfsg-0ubuntu0.23.10.1 clamav-milter - 1.0.5+dfsg-0ubuntu0.23.10.1 clamav-testfiles - 1.0.5+dfsg-0ubuntu0.23.10.1 clamdscan - 1.0.5+dfsg-0ubuntu0.23.10.1 libclamav-dev - 1.0.5+dfsg-0ubuntu0.23.10.1 libclamav11 - 1.0.5+dfsg-0ubuntu0.23.10.1 No subscription required Medium CVE-2024-20290 CVE-2024-20328 USN-6638-1 -- EDK II vulnerabilities Ubuntu 23.10 Marc Beatove discovered buffer overflows exit in EDK2. An attacker on the local network could potentially use this to impact availability or possibly cause remote code execution. (CVE-2022-36763, CVE-2022-36764, CVE-2022-36765) It was discovered that a buffer overflows exists in EDK2's Network Package An attacker on the local network could potentially use these to impact availability or possibly cause remote code execution. (CVE-2023-45230, CVE-2023-45234, CVE-2023-45235) It was discovered that an out-of-bounds read exists in EDK2's Network Package An attacker on the local network could potentially use this to impact confidentiality. (CVE-2023-45231) It was discovered that infinite-loops exists in EDK2's Network Package An attacker on the local network could potentially use these to impact availability. (CVE-2023-45232, CVE-2023-45233) Mate Kukri discovered that an insecure default to allow UEFI Shell in EDK2 was left enabled in Ubuntu's EDK2. An attacker could use this to bypass Secure Boot. (CVE-2023-48733) Update Instructions: Run `sudo pro fix USN-6638-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: efi-shell-aa64 - 2023.05-2ubuntu0.1 efi-shell-arm - 2023.05-2ubuntu0.1 efi-shell-ia32 - 2023.05-2ubuntu0.1 efi-shell-x64 - 2023.05-2ubuntu0.1 ovmf - 2023.05-2ubuntu0.1 ovmf-ia32 - 2023.05-2ubuntu0.1 qemu-efi-aarch64 - 2023.05-2ubuntu0.1 qemu-efi-arm - 2023.05-2ubuntu0.1 No subscription required Medium CVE-2022-36763 CVE-2022-36764 CVE-2022-36765 CVE-2023-45230 CVE-2023-45231 CVE-2023-45232 CVE-2023-45233 CVE-2023-45234 CVE-2023-45235 CVE-2023-48733 https://bugs.launchpad.net/ubuntu/+source/edk2/+bug/2040137 USN-6640-1 -- shadow vulnerability Ubuntu 23.10 It was discovered that shadow was not properly sanitizing memory when running the password utility. An attacker could possibly use this issue to retrieve a password from memory, exposing sensitive information. Update Instructions: Run `sudo pro fix USN-6640-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libsubid-dev - 1:4.13+dfsg1-1ubuntu1.1 libsubid4 - 1:4.13+dfsg1-1ubuntu1.1 login - 1:4.13+dfsg1-1ubuntu1.1 passwd - 1:4.13+dfsg1-1ubuntu1.1 uidmap - 1:4.13+dfsg1-1ubuntu1.1 No subscription required Low CVE-2023-4641 USN-6643-1 -- NPM IP vulnerability Ubuntu 23.10 Emre Durmaz discovered that NPM IP package incorrectly distinguished between private and public IP addresses. A remote attacker could possibly use this issue to perform Server-Side Request Forgery (SSRF) attacks. Update Instructions: Run `sudo pro fix USN-6643-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: node-ip - 2.0.0+~1.1.0-1ubuntu0.1 No subscription required Medium CVE-2023-42282 USN-6644-1 -- LibTIFF vulnerabilities Ubuntu 23.10 It was discovered that LibTIFF incorrectly handled certain files. If a user were tricked into opening a specially crafted file, an attacker could possibly use this issue to cause the application to crash, resulting in a denial of service. (CVE-2023-52356) It was discovered that LibTIFF incorrectly handled certain image files with the tiffcp utility. If a user were tricked into opening a specially crafted image file, an attacker could possibly use this issue to cause tiffcp to crash, resulting in a denial of service. (CVE-2023-6228) It was discovered that LibTIFF incorrectly handled certain files. If a user were tricked into opening a specially crafted file, an attacker could possibly use this issue to cause the application to consume resources, resulting in a denial of service. (CVE-2023-6277) Update Instructions: Run `sudo pro fix USN-6644-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libtiff-dev - 4.5.1+git230720-1ubuntu1.1 libtiff-doc - 4.5.1+git230720-1ubuntu1.1 libtiff-opengl - 4.5.1+git230720-1ubuntu1.1 libtiff-tools - 4.5.1+git230720-1ubuntu1.1 libtiff5-dev - 4.5.1+git230720-1ubuntu1.1 libtiff6 - 4.5.1+git230720-1ubuntu1.1 libtiffxx6 - 4.5.1+git230720-1ubuntu1.1 No subscription required Medium CVE-2023-52356 CVE-2023-6228 CVE-2023-6277 USN-6651-1 -- Linux kernel vulnerabilities Ubuntu 23.10 It was discovered that a race condition existed in the ATM (Asynchronous Transfer Mode) subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-51780) It was discovered that a race condition existed in the AppleTalk networking subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-51781) Zhenghan Wang discovered that the generic ID allocator implementation in the Linux kernel did not properly check for null bitmap when releasing IDs. A local attacker could use this to cause a denial of service (system crash). (CVE-2023-6915) Robert Morris discovered that the CIFS network file system implementation in the Linux kernel did not properly validate certain server commands fields, leading to an out-of-bounds read vulnerability. An attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information. (CVE-2024-0565) Jann Horn discovered that the io_uring subsystem in the Linux kernel did not properly handle the release of certain buffer rings. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2024-0582) Jann Horn discovered that the TLS subsystem in the Linux kernel did not properly handle spliced messages, leading to an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2024-0646) Update Instructions: Run `sudo pro fix USN-6651-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.5.0-1008-starfive - 6.5.0-1008.9 linux-headers-6.5.0-1008-starfive - 6.5.0-1008.9 linux-image-6.5.0-1008-starfive - 6.5.0-1008.9 linux-modules-6.5.0-1008-starfive - 6.5.0-1008.9 linux-modules-extra-6.5.0-1008-starfive - 6.5.0-1008.9 linux-starfive-headers-6.5.0-1008 - 6.5.0-1008.9 linux-starfive-tools-6.5.0-1008 - 6.5.0-1008.9 linux-tools-6.5.0-1008-starfive - 6.5.0-1008.9 No subscription required linux-buildinfo-6.5.0-1010-laptop - 6.5.0-1010.13 linux-headers-6.5.0-1010-laptop - 6.5.0-1010.13 linux-image-6.5.0-1010-laptop - 6.5.0-1010.13 linux-laptop-headers-6.5.0-1010 - 6.5.0-1010.13 linux-laptop-tools-6.5.0-1010 - 6.5.0-1010.13 linux-modules-6.5.0-1010-laptop - 6.5.0-1010.13 linux-tools-6.5.0-1010-laptop - 6.5.0-1010.13 No subscription required linux-buildinfo-6.5.0-1011-raspi - 6.5.0-1011.14 linux-headers-6.5.0-1011-raspi - 6.5.0-1011.14 linux-image-6.5.0-1011-raspi - 6.5.0-1011.14 linux-modules-6.5.0-1011-raspi - 6.5.0-1011.14 linux-modules-extra-6.5.0-1011-raspi - 6.5.0-1011.14 linux-raspi-headers-6.5.0-1011 - 6.5.0-1011.14 linux-raspi-tools-6.5.0-1011 - 6.5.0-1011.14 linux-tools-6.5.0-1011-raspi - 6.5.0-1011.14 No subscription required linux-aws-cloud-tools-6.5.0-1014 - 6.5.0-1014.14 linux-aws-headers-6.5.0-1014 - 6.5.0-1014.14 linux-aws-tools-6.5.0-1014 - 6.5.0-1014.14 linux-buildinfo-6.5.0-1014-aws - 6.5.0-1014.14 linux-buildinfo-6.5.0-1014-gcp - 6.5.0-1014.14 linux-cloud-tools-6.5.0-1014-aws - 6.5.0-1014.14 linux-gcp-headers-6.5.0-1014 - 6.5.0-1014.14 linux-gcp-tools-6.5.0-1014 - 6.5.0-1014.14 linux-headers-6.5.0-1014-aws - 6.5.0-1014.14 linux-headers-6.5.0-1014-gcp - 6.5.0-1014.14 linux-image-6.5.0-1014-aws - 6.5.0-1014.14 linux-image-6.5.0-1014-gcp - 6.5.0-1014.14 linux-image-unsigned-6.5.0-1014-aws - 6.5.0-1014.14 linux-image-unsigned-6.5.0-1014-gcp - 6.5.0-1014.14 linux-modules-6.5.0-1014-aws - 6.5.0-1014.14 linux-modules-6.5.0-1014-gcp - 6.5.0-1014.14 linux-modules-extra-6.5.0-1014-aws - 6.5.0-1014.14 linux-modules-extra-6.5.0-1014-gcp - 6.5.0-1014.14 linux-modules-iwlwifi-6.5.0-1014-gcp - 6.5.0-1014.14 linux-tools-6.5.0-1014-aws - 6.5.0-1014.14 linux-tools-6.5.0-1014-gcp - 6.5.0-1014.14 No subscription required linux-buildinfo-6.5.0-1016-oracle - 6.5.0-1016.16 linux-headers-6.5.0-1016-oracle - 6.5.0-1016.16 linux-image-6.5.0-1016-oracle - 6.5.0-1016.16 linux-image-unsigned-6.5.0-1016-oracle - 6.5.0-1016.16 linux-modules-6.5.0-1016-oracle - 6.5.0-1016.16 linux-modules-extra-6.5.0-1016-oracle - 6.5.0-1016.16 linux-modules-iwlwifi-6.5.0-1016-oracle - 6.5.0-1016.16 linux-oracle-headers-6.5.0-1016 - 6.5.0-1016.16 linux-oracle-tools-6.5.0-1016 - 6.5.0-1016.16 linux-tools-6.5.0-1016-oracle - 6.5.0-1016.16 No subscription required linux-buildinfo-6.5.0-21-generic - 6.5.0-21.21 linux-buildinfo-6.5.0-21-generic-64k - 6.5.0-21.21 linux-cloud-tools-6.5.0-21 - 6.5.0-21.21 linux-cloud-tools-6.5.0-21-generic - 6.5.0-21.21 linux-cloud-tools-common - 6.5.0-21.21 linux-doc - 6.5.0-21.21 linux-headers-6.5.0-21 - 6.5.0-21.21 linux-headers-6.5.0-21-generic - 6.5.0-21.21 linux-headers-6.5.0-21-generic-64k - 6.5.0-21.21 linux-image-6.5.0-21-generic - 6.5.0-21.21 linux-image-6.5.0-21-generic-64k - 6.5.0-21.21 linux-image-uc-6.5.0-21-generic - 6.5.0-21.21 linux-image-uc-6.5.0-21-generic-64k - 6.5.0-21.21 linux-image-unsigned-6.5.0-21-generic - 6.5.0-21.21 linux-image-unsigned-6.5.0-21-generic-64k - 6.5.0-21.21 linux-lib-rust-6.5.0-21-generic - 6.5.0-21.21 linux-libc-dev - 6.5.0-21.21 linux-modules-6.5.0-21-generic - 6.5.0-21.21 linux-modules-6.5.0-21-generic-64k - 6.5.0-21.21 linux-modules-extra-6.5.0-21-generic - 6.5.0-21.21 linux-modules-ipu6-6.5.0-21-generic - 6.5.0-21.21 linux-modules-ivsc-6.5.0-21-generic - 6.5.0-21.21 linux-modules-iwlwifi-6.5.0-21-generic - 6.5.0-21.21 linux-source-6.5.0 - 6.5.0-21.21 linux-tools-6.5.0-21 - 6.5.0-21.21 linux-tools-6.5.0-21-generic - 6.5.0-21.21 linux-tools-6.5.0-21-generic-64k - 6.5.0-21.21 linux-tools-common - 6.5.0-21.21 linux-tools-host - 6.5.0-21.21 No subscription required linux-headers-starfive - 6.5.0.1008.10 linux-image-starfive - 6.5.0.1008.10 linux-starfive - 6.5.0.1008.10 linux-tools-starfive - 6.5.0.1008.10 No subscription required linux-headers-laptop-23.10 - 6.5.0.1010.13 linux-image-laptop-23.10 - 6.5.0.1010.13 linux-laptop-23.10 - 6.5.0.1010.13 linux-tools-laptop-23.10 - 6.5.0.1010.13 No subscription required linux-headers-raspi - 6.5.0.1011.12 linux-headers-raspi-nolpae - 6.5.0.1011.12 linux-image-raspi - 6.5.0.1011.12 linux-image-raspi-nolpae - 6.5.0.1011.12 linux-modules-extra-raspi - 6.5.0.1011.12 linux-modules-extra-raspi-nolpae - 6.5.0.1011.12 linux-raspi - 6.5.0.1011.12 linux-raspi-nolpae - 6.5.0.1011.12 linux-tools-raspi - 6.5.0.1011.12 linux-tools-raspi-nolpae - 6.5.0.1011.12 No subscription required linux-aws - 6.5.0.1014.14 linux-gcp - 6.5.0.1014.14 linux-headers-aws - 6.5.0.1014.14 linux-headers-gcp - 6.5.0.1014.14 linux-image-aws - 6.5.0.1014.14 linux-image-gcp - 6.5.0.1014.14 linux-modules-extra-aws - 6.5.0.1014.14 linux-modules-extra-gcp - 6.5.0.1014.14 linux-modules-iwlwifi-gcp - 6.5.0.1014.14 linux-tools-aws - 6.5.0.1014.14 linux-tools-gcp - 6.5.0.1014.14 No subscription required linux-headers-oracle - 6.5.0.1016.16 linux-image-oracle - 6.5.0.1016.16 linux-modules-iwlwifi-oracle - 6.5.0.1016.16 linux-oracle - 6.5.0.1016.16 linux-tools-oracle - 6.5.0.1016.16 No subscription required linux-cloud-tools-generic - 6.5.0.21.20 linux-cloud-tools-generic-hwe-22.04 - 6.5.0.21.20 linux-cloud-tools-generic-hwe-22.04-edge - 6.5.0.21.20 linux-cloud-tools-virtual - 6.5.0.21.20 linux-cloud-tools-virtual-hwe-22.04 - 6.5.0.21.20 linux-cloud-tools-virtual-hwe-22.04-edge - 6.5.0.21.20 linux-crashdump - 6.5.0.21.20 linux-generic - 6.5.0.21.20 linux-generic-64k - 6.5.0.21.20 linux-generic-64k-hwe-22.04 - 6.5.0.21.20 linux-generic-64k-hwe-22.04-edge - 6.5.0.21.20 linux-generic-hwe-22.04 - 6.5.0.21.20 linux-generic-hwe-22.04-edge - 6.5.0.21.20 linux-generic-lpae - 6.5.0.21.20 linux-headers-generic - 6.5.0.21.20 linux-headers-generic-64k - 6.5.0.21.20 linux-headers-generic-64k-hwe-22.04 - 6.5.0.21.20 linux-headers-generic-64k-hwe-22.04-edge - 6.5.0.21.20 linux-headers-generic-hwe-22.04 - 6.5.0.21.20 linux-headers-generic-hwe-22.04-edge - 6.5.0.21.20 linux-headers-generic-lpae - 6.5.0.21.20 linux-headers-kvm - 6.5.0.21.20 linux-headers-oem-20.04 - 6.5.0.21.20 linux-headers-oem-20.04b - 6.5.0.21.20 linux-headers-oem-20.04c - 6.5.0.21.20 linux-headers-oem-20.04d - 6.5.0.21.20 linux-headers-oem-22.04 - 6.5.0.21.20 linux-headers-virtual - 6.5.0.21.20 linux-headers-virtual-hwe-22.04 - 6.5.0.21.20 linux-headers-virtual-hwe-22.04-edge - 6.5.0.21.20 linux-image-extra-virtual - 6.5.0.21.20 linux-image-extra-virtual-hwe-22.04 - 6.5.0.21.20 linux-image-extra-virtual-hwe-22.04-edge - 6.5.0.21.20 linux-image-generic - 6.5.0.21.20 linux-image-generic-64k - 6.5.0.21.20 linux-image-generic-64k-hwe-22.04 - 6.5.0.21.20 linux-image-generic-64k-hwe-22.04-edge - 6.5.0.21.20 linux-image-generic-hwe-22.04 - 6.5.0.21.20 linux-image-generic-hwe-22.04-edge - 6.5.0.21.20 linux-image-generic-lpae - 6.5.0.21.20 linux-image-kvm - 6.5.0.21.20 linux-image-oem-20.04 - 6.5.0.21.20 linux-image-oem-20.04b - 6.5.0.21.20 linux-image-oem-20.04c - 6.5.0.21.20 linux-image-oem-20.04d - 6.5.0.21.20 linux-image-oem-22.04 - 6.5.0.21.20 linux-image-uc-generic - 6.5.0.21.20 linux-image-uc-generic-hwe-22.04 - 6.5.0.21.20 linux-image-uc-generic-hwe-22.04-edge - 6.5.0.21.20 linux-image-virtual - 6.5.0.21.20 linux-image-virtual-hwe-22.04 - 6.5.0.21.20 linux-image-virtual-hwe-22.04-edge - 6.5.0.21.20 linux-kvm - 6.5.0.21.20 linux-modules-ipu6-generic - 6.5.0.21.20 linux-modules-ipu6-generic-hwe-22.04 - 6.5.0.21.20 linux-modules-ipu6-generic-hwe-22.04-edge - 6.5.0.21.20 linux-modules-ipu6-oem-22.04 - 6.5.0.21.20 linux-modules-ivsc-generic - 6.5.0.21.20 linux-modules-ivsc-generic-hwe-22.04 - 6.5.0.21.20 linux-modules-ivsc-generic-hwe-22.04-edge - 6.5.0.21.20 linux-modules-ivsc-oem-22.04 - 6.5.0.21.20 linux-modules-iwlwifi-generic - 6.5.0.21.20 linux-modules-iwlwifi-generic-hwe-22.04 - 6.5.0.21.20 linux-modules-iwlwifi-generic-hwe-22.04-edge - 6.5.0.21.20 linux-modules-iwlwifi-oem-20.04 - 6.5.0.21.20 linux-modules-iwlwifi-oem-20.04d - 6.5.0.21.20 linux-modules-iwlwifi-oem-22.04 - 6.5.0.21.20 linux-oem-20.04 - 6.5.0.21.20 linux-oem-20.04b - 6.5.0.21.20 linux-oem-20.04c - 6.5.0.21.20 linux-oem-20.04d - 6.5.0.21.20 linux-oem-22.04 - 6.5.0.21.20 linux-source - 6.5.0.21.20 linux-tools-generic - 6.5.0.21.20 linux-tools-generic-64k - 6.5.0.21.20 linux-tools-generic-64k-hwe-22.04 - 6.5.0.21.20 linux-tools-generic-64k-hwe-22.04-edge - 6.5.0.21.20 linux-tools-generic-hwe-22.04 - 6.5.0.21.20 linux-tools-generic-hwe-22.04-edge - 6.5.0.21.20 linux-tools-generic-lpae - 6.5.0.21.20 linux-tools-kvm - 6.5.0.21.20 linux-tools-oem-20.04 - 6.5.0.21.20 linux-tools-oem-20.04b - 6.5.0.21.20 linux-tools-oem-20.04c - 6.5.0.21.20 linux-tools-oem-20.04d - 6.5.0.21.20 linux-tools-oem-22.04 - 6.5.0.21.20 linux-tools-virtual - 6.5.0.21.20 linux-tools-virtual-hwe-22.04 - 6.5.0.21.20 linux-tools-virtual-hwe-22.04-edge - 6.5.0.21.20 linux-virtual - 6.5.0.21.20 linux-virtual-hwe-22.04 - 6.5.0.21.20 linux-virtual-hwe-22.04-edge - 6.5.0.21.20 No subscription required High CVE-2023-51780 CVE-2023-51781 CVE-2023-6915 CVE-2024-0565 CVE-2024-0582 CVE-2024-0646 USN-6651-2 -- Linux kernel vulnerabilities Ubuntu 23.10 It was discovered that a race condition existed in the ATM (Asynchronous Transfer Mode) subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-51780) It was discovered that a race condition existed in the AppleTalk networking subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-51781) Zhenghan Wang discovered that the generic ID allocator implementation in the Linux kernel did not properly check for null bitmap when releasing IDs. A local attacker could use this to cause a denial of service (system crash). (CVE-2023-6915) Robert Morris discovered that the CIFS network file system implementation in the Linux kernel did not properly validate certain server commands fields, leading to an out-of-bounds read vulnerability. An attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information. (CVE-2024-0565) Jann Horn discovered that the io_uring subsystem in the Linux kernel did not properly handle the release of certain buffer rings. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2024-0582) Jann Horn discovered that the TLS subsystem in the Linux kernel did not properly handle spliced messages, leading to an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2024-0646) Update Instructions: Run `sudo pro fix USN-6651-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.5.0-21-lowlatency - 6.5.0-21.21.1 linux-buildinfo-6.5.0-21-lowlatency-64k - 6.5.0-21.21.1 linux-cloud-tools-6.5.0-21-lowlatency - 6.5.0-21.21.1 linux-headers-6.5.0-21-lowlatency - 6.5.0-21.21.1 linux-headers-6.5.0-21-lowlatency-64k - 6.5.0-21.21.1 linux-image-6.5.0-21-lowlatency - 6.5.0-21.21.1 linux-image-6.5.0-21-lowlatency-64k - 6.5.0-21.21.1 linux-image-unsigned-6.5.0-21-lowlatency - 6.5.0-21.21.1 linux-image-unsigned-6.5.0-21-lowlatency-64k - 6.5.0-21.21.1 linux-lowlatency-cloud-tools-6.5.0-21 - 6.5.0-21.21.1 linux-lowlatency-cloud-tools-common - 6.5.0-21.21.1 linux-lowlatency-headers-6.5.0-21 - 6.5.0-21.21.1 linux-lowlatency-lib-rust-6.5.0-21-lowlatency - 6.5.0-21.21.1 linux-lowlatency-tools-6.5.0-21 - 6.5.0-21.21.1 linux-lowlatency-tools-common - 6.5.0-21.21.1 linux-lowlatency-tools-host - 6.5.0-21.21.1 linux-modules-6.5.0-21-lowlatency - 6.5.0-21.21.1 linux-modules-6.5.0-21-lowlatency-64k - 6.5.0-21.21.1 linux-modules-iwlwifi-6.5.0-21-lowlatency - 6.5.0-21.21.1 linux-tools-6.5.0-21-lowlatency - 6.5.0-21.21.1 linux-tools-6.5.0-21-lowlatency-64k - 6.5.0-21.21.1 No subscription required linux-cloud-tools-lowlatency - 6.5.0.21.21.15 linux-cloud-tools-lowlatency-hwe-20.04 - 6.5.0.21.21.15 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.5.0.21.21.15 linux-cloud-tools-lowlatency-hwe-22.04 - 6.5.0.21.21.15 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.5.0.21.21.15 linux-headers-lowlatency - 6.5.0.21.21.15 linux-headers-lowlatency-64k - 6.5.0.21.21.15 linux-headers-lowlatency-64k-hwe-20.04 - 6.5.0.21.21.15 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.5.0.21.21.15 linux-headers-lowlatency-64k-hwe-22.04 - 6.5.0.21.21.15 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.5.0.21.21.15 linux-headers-lowlatency-hwe-20.04 - 6.5.0.21.21.15 linux-headers-lowlatency-hwe-20.04-edge - 6.5.0.21.21.15 linux-headers-lowlatency-hwe-22.04 - 6.5.0.21.21.15 linux-headers-lowlatency-hwe-22.04-edge - 6.5.0.21.21.15 linux-image-lowlatency - 6.5.0.21.21.15 linux-image-lowlatency-64k - 6.5.0.21.21.15 linux-image-lowlatency-64k-hwe-20.04 - 6.5.0.21.21.15 linux-image-lowlatency-64k-hwe-20.04-edge - 6.5.0.21.21.15 linux-image-lowlatency-64k-hwe-22.04 - 6.5.0.21.21.15 linux-image-lowlatency-64k-hwe-22.04-edge - 6.5.0.21.21.15 linux-image-lowlatency-hwe-20.04 - 6.5.0.21.21.15 linux-image-lowlatency-hwe-20.04-edge - 6.5.0.21.21.15 linux-image-lowlatency-hwe-22.04 - 6.5.0.21.21.15 linux-image-lowlatency-hwe-22.04-edge - 6.5.0.21.21.15 linux-lowlatency - 6.5.0.21.21.15 linux-lowlatency-64k - 6.5.0.21.21.15 linux-lowlatency-64k-hwe-20.04 - 6.5.0.21.21.15 linux-lowlatency-64k-hwe-20.04-edge - 6.5.0.21.21.15 linux-lowlatency-64k-hwe-22.04 - 6.5.0.21.21.15 linux-lowlatency-64k-hwe-22.04-edge - 6.5.0.21.21.15 linux-lowlatency-hwe-20.04 - 6.5.0.21.21.15 linux-lowlatency-hwe-20.04-edge - 6.5.0.21.21.15 linux-lowlatency-hwe-22.04 - 6.5.0.21.21.15 linux-lowlatency-hwe-22.04-edge - 6.5.0.21.21.15 linux-modules-iwlwifi-lowlatency - 6.5.0.21.21.15 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.5.0.21.21.15 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.5.0.21.21.15 linux-tools-lowlatency - 6.5.0.21.21.15 linux-tools-lowlatency-64k - 6.5.0.21.21.15 linux-tools-lowlatency-64k-hwe-20.04 - 6.5.0.21.21.15 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.5.0.21.21.15 linux-tools-lowlatency-64k-hwe-22.04 - 6.5.0.21.21.15 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.5.0.21.21.15 linux-tools-lowlatency-hwe-20.04 - 6.5.0.21.21.15 linux-tools-lowlatency-hwe-20.04-edge - 6.5.0.21.21.15 linux-tools-lowlatency-hwe-22.04 - 6.5.0.21.21.15 linux-tools-lowlatency-hwe-22.04-edge - 6.5.0.21.21.15 No subscription required High CVE-2023-51780 CVE-2023-51781 CVE-2023-6915 CVE-2024-0565 CVE-2024-0582 CVE-2024-0646 USN-6652-1 -- Linux kernel (Azure) vulnerabilities Ubuntu 23.10 Marek Marczykowski-Górecki discovered that the Xen event channel infrastructure implementation in the Linux kernel contained a race condition. An attacker in a guest VM could possibly use this to cause a denial of service (paravirtualized device unavailability). (CVE-2023-34324) Zheng Wang discovered a use-after-free in the Renesas Ethernet AVB driver in the Linux kernel during device removal. A privileged attacker could use this to cause a denial of service (system crash). (CVE-2023-35827) Tom Dohrmann discovered that the Secure Encrypted Virtualization (SEV) implementation for AMD processors in the Linux kernel contained a race condition when accessing MMIO registers. A local attacker in a SEV guest VM could possibly use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-46813) It was discovered that the io_uring subsystem in the Linux kernel contained a race condition, leading to a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service (system crash). (CVE-2023-46862) It was discovered that a race condition existed in the ATM (Asynchronous Transfer Mode) subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-51780) It was discovered that a race condition existed in the AppleTalk networking subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-51781) It was discovered that the netfilter subsystem in the Linux kernel did not properly validate inner tunnel netlink attributes, leading to a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service (system crash). (CVE-2023-5972) It was discovered that the TLS subsystem in the Linux kernel did not properly perform cryptographic operations in some situations, leading to a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-6176) Jann Horn discovered that a race condition existed in the Linux kernel when handling io_uring over sockets, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-6531) Xingyuan Mo discovered that the netfilter subsystem in the Linux kernel did not properly handle dynset expressions passed from userspace, leading to a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service (system crash). (CVE-2023-6622) Zhenghan Wang discovered that the generic ID allocator implementation in the Linux kernel did not properly check for null bitmap when releasing IDs. A local attacker could use this to cause a denial of service (system crash). (CVE-2023-6915) Robert Morris discovered that the CIFS network file system implementation in the Linux kernel did not properly validate certain server commands fields, leading to an out-of-bounds read vulnerability. An attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information. (CVE-2024-0565) Jann Horn discovered that the io_uring subsystem in the Linux kernel did not properly handle the release of certain buffer rings. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2024-0582) It was discovered that the TIPC protocol implementation in the Linux kernel did not properly handle locking during tipc_crypto_key_revoke() operations. A local attacker could use this to cause a denial of service (kernel deadlock). (CVE-2024-0641) Jann Horn discovered that the TLS subsystem in the Linux kernel did not properly handle spliced messages, leading to an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2024-0646) Update Instructions: Run `sudo pro fix USN-6652-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-azure-cloud-tools-6.5.0-1015 - 6.5.0-1015.15 linux-azure-headers-6.5.0-1015 - 6.5.0-1015.15 linux-azure-tools-6.5.0-1015 - 6.5.0-1015.15 linux-buildinfo-6.5.0-1015-azure - 6.5.0-1015.15 linux-cloud-tools-6.5.0-1015-azure - 6.5.0-1015.15 linux-headers-6.5.0-1015-azure - 6.5.0-1015.15 linux-image-6.5.0-1015-azure - 6.5.0-1015.15 linux-image-6.5.0-1015-azure-fde - 6.5.0-1015.15 linux-image-unsigned-6.5.0-1015-azure - 6.5.0-1015.15 linux-modules-6.5.0-1015-azure - 6.5.0-1015.15 linux-modules-extra-6.5.0-1015-azure - 6.5.0-1015.15 linux-modules-ipu6-6.5.0-1015-azure - 6.5.0-1015.15 linux-modules-ivsc-6.5.0-1015-azure - 6.5.0-1015.15 linux-modules-iwlwifi-6.5.0-1015-azure - 6.5.0-1015.15 linux-tools-6.5.0-1015-azure - 6.5.0-1015.15 No subscription required linux-azure - 6.5.0.1015.17 linux-azure-fde - 6.5.0.1015.17 linux-cloud-tools-azure - 6.5.0.1015.17 linux-headers-azure - 6.5.0.1015.17 linux-image-azure - 6.5.0.1015.17 linux-image-azure-fde - 6.5.0.1015.17 linux-modules-extra-azure - 6.5.0.1015.17 linux-modules-ipu6-azure - 6.5.0.1015.17 linux-modules-ivsc-azure - 6.5.0.1015.17 linux-modules-iwlwifi-azure - 6.5.0.1015.17 linux-tools-azure - 6.5.0.1015.17 No subscription required High CVE-2023-34324 CVE-2023-35827 CVE-2023-46813 CVE-2023-46862 CVE-2023-51780 CVE-2023-51781 CVE-2023-5972 CVE-2023-6176 CVE-2023-6531 CVE-2023-6622 CVE-2023-6915 CVE-2024-0565 CVE-2024-0582 CVE-2024-0641 CVE-2024-0646 USN-6654-1 -- Roundcube Webmail vulnerability Ubuntu 23.10 It was discovered that Roundcube Webmail incorrectly sanitized characters in the linkrefs text messages. An attacker could possibly use this issue to execute a cross-site scripting (XSS) attack. (CVE-2023-43770) Update Instructions: Run `sudo pro fix USN-6654-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: roundcube - 1.6.2+dfsg-1ubuntu0.1 roundcube-core - 1.6.2+dfsg-1ubuntu0.1 roundcube-mysql - 1.6.2+dfsg-1ubuntu0.1 roundcube-pgsql - 1.6.2+dfsg-1ubuntu0.1 roundcube-plugins - 1.6.2+dfsg-1ubuntu0.1 roundcube-sqlite3 - 1.6.2+dfsg-1ubuntu0.1 No subscription required Medium CVE-2023-43770 USN-6656-1 -- PostgreSQL vulnerability Ubuntu 23.10 It was discovered that PostgreSQL incorrectly handled dropping privileges when handling REFRESH MATERIALIZED VIEW CONCURRENTLY commands. If a user or automatic system were tricked into running a specially crafted command, a remote attacker could possibly use this issue to execute arbitrary SQL functions. Update Instructions: Run `sudo pro fix USN-6656-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libecpg-compat3 - 15.6-0ubuntu0.23.10.1 libecpg-dev - 15.6-0ubuntu0.23.10.1 libecpg6 - 15.6-0ubuntu0.23.10.1 libpgtypes3 - 15.6-0ubuntu0.23.10.1 libpq-dev - 15.6-0ubuntu0.23.10.1 libpq5 - 15.6-0ubuntu0.23.10.1 postgresql-15 - 15.6-0ubuntu0.23.10.1 postgresql-client-15 - 15.6-0ubuntu0.23.10.1 postgresql-doc-15 - 15.6-0ubuntu0.23.10.1 postgresql-plperl-15 - 15.6-0ubuntu0.23.10.1 postgresql-plpython3-15 - 15.6-0ubuntu0.23.10.1 postgresql-pltcl-15 - 15.6-0ubuntu0.23.10.1 postgresql-server-dev-15 - 15.6-0ubuntu0.23.10.1 No subscription required Medium CVE-2024-0985 USN-6657-1 -- Dnsmasq vulnerabilities Ubuntu 23.10 Elias Heftrig, Haya Schulmann, Niklas Vogel, and Michael Waidner discovered that Dnsmasq icorrectly handled validating DNSSEC messages. A remote attacker could possibly use this issue to cause Dnsmasq to consume resources, leading to a denial of service. (CVE-2023-50387) It was discovered that Dnsmasq incorrectly handled preparing an NSEC3 closest encloser proof. A remote attacker could possibly use this issue to cause Dnsmasq to consume resources, leading to a denial of service. (CVE-2023-50868) It was discovered that Dnsmasq incorrectly set the maximum EDNS.0 UDP packet size as required by DNS Flag Day 2020. This issue only affected Ubuntu 23.10. (CVE-2023-28450) Update Instructions: Run `sudo pro fix USN-6657-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: dnsmasq - 2.90-0ubuntu0.23.10.1 dnsmasq-base - 2.90-0ubuntu0.23.10.1 dnsmasq-base-lua - 2.90-0ubuntu0.23.10.1 dnsmasq-utils - 2.90-0ubuntu0.23.10.1 No subscription required Medium CVE-2023-28450 CVE-2023-50387 CVE-2023-50868 USN-6658-1 -- libxml2 vulnerability Ubuntu 23.10 It was discovered that libxml2 incorrectly handled certain XML documents. A remote attacker could possibly use this issue to cause libxml2 to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6658-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libxml2 - 2.9.14+dfsg-1.3ubuntu0.1 libxml2-dev - 2.9.14+dfsg-1.3ubuntu0.1 libxml2-doc - 2.9.14+dfsg-1.3ubuntu0.1 libxml2-utils - 2.9.14+dfsg-1.3ubuntu0.1 python3-libxml2 - 2.9.14+dfsg-1.3ubuntu0.1 No subscription required Medium CVE-2024-25062 USN-6660-1 -- OpenJDK 11 vulnerabilities Ubuntu 23.10 Yi Yang discovered that the Hotspot component of OpenJDK 11 incorrectly handled array accesses in the C1 compiler. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. (CVE-2024-20918) It was discovered that the Hotspot component of OpenJDK 11 did not properly verify bytecode in certain situations. An attacker could possibly use this issue to bypass Java sandbox restrictions. (CVE-2024-20919) It was discovered that the Hotspot component of OpenJDK 11 had an optimization flaw when generating range check loop predicates. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. (CVE-2024-20921) Valentin Eudeline discovered that OpenJDK 11 incorrectly handled certain options in the Nashorn JavaScript subcomponent. An attacker could possibly use this issue to execute arbitrary code. (CVE-2024-20926) It was discovered that OpenJDK 11 could produce debug logs that contained private keys used for digital signatures. An attacker could possibly use this issue to obtain sensitive information. (CVE-2024-20945) Hubert Kario discovered that the TLS implementation in OpenJDK 11 had a timing side-channel and incorrectly handled RSA padding. A remote attacker could possibly use this issue to recover sensitive information. (CVE-2024-20952) Update Instructions: Run `sudo pro fix USN-6660-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-11-demo - 11.0.22+7-0ubuntu2~23.10.1 openjdk-11-doc - 11.0.22+7-0ubuntu2~23.10.1 openjdk-11-jdk - 11.0.22+7-0ubuntu2~23.10.1 openjdk-11-jdk-headless - 11.0.22+7-0ubuntu2~23.10.1 openjdk-11-jre - 11.0.22+7-0ubuntu2~23.10.1 openjdk-11-jre-headless - 11.0.22+7-0ubuntu2~23.10.1 openjdk-11-jre-zero - 11.0.22+7-0ubuntu2~23.10.1 openjdk-11-source - 11.0.22+7-0ubuntu2~23.10.1 No subscription required Medium CVE-2024-20918 CVE-2024-20919 CVE-2024-20921 CVE-2024-20926 CVE-2024-20945 CVE-2024-20952 USN-6661-1 -- OpenJDK 17 vulnerabilities Ubuntu 23.10 Yi Yang discovered that the Hotspot component of OpenJDK 17 incorrectly handled array accesses in the C1 compiler. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. (CVE-2024-20918) It was discovered that the Hotspot component of OpenJDK 17 did not properly verify bytecode in certain situations. An attacker could possibly use this issue to bypass Java sandbox restrictions. (CVE-2024-20919) It was discovered that the Hotspot component of OpenJDK 17 had an optimization flaw when generating range check loop predicates. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. (CVE-2024-20921) Yakov Shafranovich discovered that OpenJDK 17 incorrectly handled ZIP archives that have file and directory entries with the same name. An attacker could possibly use this issue to bypass Java sandbox restrictions. (CVE-2024-20932) It was discovered that OpenJDK 17 could produce debug logs that contained private keys used for digital signatures. An attacker could possibly use this issue to obtain sensitive information. (CVE-2024-20945) Hubert Kario discovered that the TLS implementation in OpenJDK 17 had a timing side-channel and incorrectly handled RSA padding. A remote attacker could possibly use this issue to recover sensitive information. (CVE-2024-20952) Update Instructions: Run `sudo pro fix USN-6661-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-17-demo - 17.0.10+7-1~23.10.1 openjdk-17-doc - 17.0.10+7-1~23.10.1 openjdk-17-jdk - 17.0.10+7-1~23.10.1 openjdk-17-jdk-headless - 17.0.10+7-1~23.10.1 openjdk-17-jre - 17.0.10+7-1~23.10.1 openjdk-17-jre-headless - 17.0.10+7-1~23.10.1 openjdk-17-jre-zero - 17.0.10+7-1~23.10.1 openjdk-17-source - 17.0.10+7-1~23.10.1 No subscription required Medium CVE-2024-20918 CVE-2024-20919 CVE-2024-20921 CVE-2024-20932 CVE-2024-20945 CVE-2024-20952 USN-6662-1 -- OpenJDK 21 vulnerabilities Ubuntu 23.10 Yi Yang discovered that the Hotspot component of OpenJDK 21 incorrectly handled array accesses in the C1 compiler. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. (CVE-2024-20918) It was discovered that the Hotspot component of OpenJDK 21 did not properly verify bytecode in certain situations. An attacker could possibly use this issue to bypass Java sandbox restrictions. (CVE-2024-20919) It was discovered that the Hotspot component of OpenJDK 21 had an optimization flaw when generating range check loop predicates. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. (CVE-2024-20921) It was discovered that OpenJDK 21 could produce debug logs that contained private keys used for digital signatures. An attacker could possibly use this issue to obtain sensitive information. (CVE-2024-20945) Hubert Kario discovered that the TLS implementation in OpenJDK 21 had a timing side-channel and incorrectly handled RSA padding. A remote attacker could possibly use this issue to recover sensitive information. (CVE-2024-20952) Update Instructions: Run `sudo pro fix USN-6662-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-21-demo - 21.0.2+13-1~23.10.1 openjdk-21-doc - 21.0.2+13-1~23.10.1 openjdk-21-jdk - 21.0.2+13-1~23.10.1 openjdk-21-jdk-headless - 21.0.2+13-1~23.10.1 openjdk-21-jre - 21.0.2+13-1~23.10.1 openjdk-21-jre-headless - 21.0.2+13-1~23.10.1 openjdk-21-jre-zero - 21.0.2+13-1~23.10.1 openjdk-21-source - 21.0.2+13-1~23.10.1 No subscription required Medium CVE-2024-20918 CVE-2024-20919 CVE-2024-20921 CVE-2024-20945 CVE-2024-20952 USN-6663-1 -- OpenSSL update Ubuntu 23.10 As a security improvement, OpenSSL will now return deterministic random bytes instead of an error when detecting wrong padding in PKCS#1 v1.5 RSA to prevent its use in possible Bleichenbacher timing attacks. Update Instructions: Run `sudo pro fix USN-6663-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libssl-dev - 3.0.10-1ubuntu2.3 libssl-doc - 3.0.10-1ubuntu2.3 libssl3 - 3.0.10-1ubuntu2.3 openssl - 3.0.10-1ubuntu2.3 No subscription required None https://launchpad.net/bugs/2054090 USN-6664-1 -- less vulnerability Ubuntu 23.10 It was discovered that less incorrectly handled certain file names. An attacker could possibly use this issue to cause a crash or execute arbitrary commands. Update Instructions: Run `sudo pro fix USN-6664-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: less - 590-2ubuntu0.23.10.1 No subscription required Medium CVE-2022-48624 USN-6665-1 -- Unbound vulnerabilities Ubuntu 23.10 Elias Heftrig, Haya Schulmann, Niklas Vogel, and Michael Waidner discovered that Unbound incorrectly handled validating DNSSEC messages. A remote attacker could possibly use this issue to cause Unbound to consume resources, leading to a denial of service. (CVE-2023-50387) It was discovered that Unbound incorrectly handled preparing an NSEC3 closest encloser proof. A remote attacker could possibly use this issue to cause Unbound to consume resources, leading to a denial of service. (CVE-2023-50868) Update Instructions: Run `sudo pro fix USN-6665-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libunbound-dev - 1.17.1-2ubuntu0.1 libunbound8 - 1.17.1-2ubuntu0.1 python3-unbound - 1.17.1-2ubuntu0.1 unbound - 1.17.1-2ubuntu0.1 unbound-anchor - 1.17.1-2ubuntu0.1 unbound-host - 1.17.1-2ubuntu0.1 No subscription required Medium CVE-2023-50387 CVE-2023-50868 USN-6666-1 -- libuv vulnerability Ubuntu 23.10 It was discovered that libuv incorrectly truncated certain hostnames. A remote attacker could possibly use this issue with specially crafted hostnames to bypass certain checks. Update Instructions: Run `sudo pro fix USN-6666-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libuv1 - 1.44.2-1ubuntu0.1 libuv1-dev - 1.44.2-1ubuntu0.1 No subscription required Medium CVE-2024-24806 USN-6669-1 -- Thunderbird vulnerabilities Ubuntu 23.10 Multiple security issues were discovered in Thunderbird. If a user were tricked into opening a specially crafted website in a browsing context, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information, bypass security restrictions, cross-site tracing, or execute arbitrary code. (CVE-2024-0741, CVE-2024-0742, CVE-2024-0747, CVE-2024-0749, CVE-2024-0750, CVE-2024-0751, CVE-2024-0753, CVE-2024-0755, CVE-2024-1547, CVE-2024-1548, CVE-2024-1549, CVE-2024-1550, CVE-2024-1553, CVE-2024-1936) Cornel Ionce discovered that Thunderbird did not properly manage memory when opening the print preview dialog. An attacker could potentially exploit this issue to cause a denial of service. (CVE-2024-0746) Alfred Peters discovered that Thunderbird did not properly manage memory when storing and re-accessing data on a networking channel. An attacker could potentially exploit this issue to cause a denial of service. (CVE-2024-1546) Johan Carlsson discovered that Thunderbird incorrectly handled Set-Cookie response headers in multipart HTTP responses. An attacker could potentially exploit this issue to inject arbitrary cookie values. (CVE-2024-1551) Gary Kwong discovered that Thunderbird incorrectly generated codes on 32-bit ARM devices, which could lead to unexpected numeric conversions or undefined behaviour. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-1552) Update Instructions: Run `sudo pro fix USN-6669-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: thunderbird - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-dev - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-gnome-support - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-af - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-ar - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-ast - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-be - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-bg - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-bn - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-bn-bd - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-br - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-ca - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-cak - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-cs - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-cy - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-da - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-de - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-dsb - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-el - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-en - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-en-gb - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-en-us - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-es - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-es-ar - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-es-es - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-et - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-eu - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-fa - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-fi - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-fr - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-fy - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-fy-nl - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-ga - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-ga-ie - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-gd - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-gl - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-he - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-hr - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-hsb - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-hu - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-hy - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-id - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-is - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-it - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-ja - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-ka - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-kab - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-kk - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-ko - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-lt - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-lv - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-mk - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-ms - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-nb - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-nb-no - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-nl - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-nn - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-nn-no - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-pa - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-pa-in - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-pl - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-pt - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-pt-br - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-pt-pt - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-rm - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-ro - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-ru - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-si - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-sk - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-sl - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-sq - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-sr - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-sv - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-sv-se - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-ta - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-ta-lk - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-th - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-tr - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-uk - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-uz - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-vi - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-zh-cn - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-zh-hans - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-zh-hant - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-locale-zh-tw - 1:115.8.1+build1-0ubuntu0.23.10.1 thunderbird-mozsymbols - 1:115.8.1+build1-0ubuntu0.23.10.1 xul-ext-calendar-timezones - 1:115.8.1+build1-0ubuntu0.23.10.1 xul-ext-gdata-provider - 1:115.8.1+build1-0ubuntu0.23.10.1 xul-ext-lightning - 1:115.8.1+build1-0ubuntu0.23.10.1 No subscription required Medium CVE-2024-0741 CVE-2024-0742 CVE-2024-0746 CVE-2024-0747 CVE-2024-0749 CVE-2024-0750 CVE-2024-0751 CVE-2024-0753 CVE-2024-0755 CVE-2024-1546 CVE-2024-1547 CVE-2024-1548 CVE-2024-1549 CVE-2024-1550 CVE-2024-1551 CVE-2024-1552 CVE-2024-1553 CVE-2024-1936 USN-6672-1 -- Node.js vulnerabilities Ubuntu 23.10 Morgan Jones discovered that Node.js incorrectly handled certain inputs that leads to false positive errors during some cryptographic operations. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 23.10. (CVE-2023-23919) It was discovered that Node.js incorrectly handled certain inputs leaded to a untrusted search path vulnerability. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to perform a privilege escalation. (CVE-2023-23920) Matt Caswell discovered that Node.js incorrectly handled certain inputs with specially crafted ASN.1 object identifiers or data containing them. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 22.04 LTS. (CVE-2023-2650) Update Instructions: Run `sudo pro fix USN-6672-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libnode-dev - 18.13.0+dfsg1-1ubuntu2.1 libnode108 - 18.13.0+dfsg1-1ubuntu2.1 nodejs - 18.13.0+dfsg1-1ubuntu2.1 nodejs-doc - 18.13.0+dfsg1-1ubuntu2.1 No subscription required Medium CVE-2023-23919 CVE-2023-23920 CVE-2023-2650 USN-6673-1 -- python-cryptography vulnerabilities Ubuntu 23.10 Hubert Kario discovered that python-cryptography incorrectly handled errors returned by the OpenSSL API when processing incorrect padding in RSA PKCS#1 v1.5. A remote attacker could possibly use this issue to expose confidential or sensitive information. (CVE-2023-50782) It was discovered that python-cryptography incorrectly handled memory operations when processing mismatched PKCS#12 keys. A remote attacker could possibly use this issue to cause python-cryptography to crash, leading to a denial of service. This issue only affected Ubuntu 23.10. (CVE-2024-26130) Update Instructions: Run `sudo pro fix USN-6673-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-cryptography-doc - 38.0.4-4ubuntu0.23.10.2 python3-cryptography - 38.0.4-4ubuntu0.23.10.2 No subscription required Medium CVE-2023-50782 CVE-2024-26130 USN-6674-1 -- Django vulnerability Ubuntu 23.10 Seokchan Yoon discovered that the Django Truncator function incorrectly handled very long HTML input. A remote attacker could possibly use this issue to cause Django to consume resources, leading to a denial of service. Update Instructions: Run `sudo pro fix USN-6674-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-django-doc - 3:4.2.4-1ubuntu2.2 python3-django - 3:4.2.4-1ubuntu2.2 No subscription required Medium CVE-2024-27351 USN-6676-1 -- c-ares vulnerability Ubuntu 23.10 Vojtěch Vobr discovered that c-ares incorrectly handled user input from local configuration files. An attacker could possibly use this issue to cause a denial of service via application crash. Update Instructions: Run `sudo pro fix USN-6676-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libc-ares-dev - 1.19.1-3ubuntu0.1 libc-ares2 - 1.19.1-3ubuntu0.1 No subscription required Medium CVE-2024-25629 USN-6677-1 -- libde265 vulnerabilities Ubuntu 23.10 It was discovered that libde265 could be made to dereference invalid memory. If a user or automated system were tricked into opening a specially crafted file, an attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-27102) It was discovered that libde265 could be made to write out of bounds. If a user or automated system were tricked into opening a specially crafted file, an attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2023-27103) It was discovered that libde265 could be made to write out of bounds. If a user or automated system were tricked into opening a specially crafted file, an attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2023-43887, CVE-2023-47471, CVE-2023-49465, CVE-2023-49467, CVE-2023-49468) Update Instructions: Run `sudo pro fix USN-6677-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libde265-0 - 1.0.12-2ubuntu0.1 libde265-dev - 1.0.12-2ubuntu0.1 libde265-examples - 1.0.12-2ubuntu0.1 No subscription required Medium CVE-2023-27102 CVE-2023-27103 CVE-2023-43887 CVE-2023-47471 CVE-2023-49465 CVE-2023-49467 CVE-2023-49468 USN-6678-1 -- libgit2 vulnerabilities Ubuntu 23.10 It was discovered that libgit2 mishandled equivalent filenames on NTFS partitions. If a user or automated system were tricked into cloning a specially crafted repository, an attacker could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2020-12278, CVE-2020-12279) It was discovered that libgit2 did not perform certificate checking by default. An attacker could possibly use this issue to perform a machine-in-the-middle attack. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2023-22742) It was discovered that libgit2 could be made to run into an infinite loop. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 23.10. (CVE-2024-24575) It was discovered that libgit2 did not properly manage memory. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-24577) Update Instructions: Run `sudo pro fix USN-6678-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libgit2-1.5 - 1.5.1+ds-1ubuntu1.1 libgit2-dev - 1.5.1+ds-1ubuntu1.1 libgit2-fixtures - 1.5.1+ds-1ubuntu1.1 No subscription required Medium CVE-2020-12278 CVE-2020-12279 CVE-2023-22742 CVE-2024-24575 CVE-2024-24577 USN-6679-1 -- FRR vulnerability Ubuntu 23.10 It was discovered that FRR incorrectly handled certain malformed OSPF LSA packets. A remote attacker could possibly use this issue to cause FRR to crash, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-6679-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: frr - 8.4.4-1.1ubuntu1.3 frr-doc - 8.4.4-1.1ubuntu1.3 frr-pythontools - 8.4.4-1.1ubuntu1.3 frr-rpki-rtrlib - 8.4.4-1.1ubuntu1.3 frr-snmp - 8.4.4-1.1ubuntu1.3 No subscription required Medium CVE-2024-27913 USN-6680-1 -- Linux kernel vulnerabilities Ubuntu 23.10 黄思聪 discovered that the NFC Controller Interface (NCI) implementation in the Linux kernel did not properly handle certain memory allocation failure conditions, leading to a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service (system crash). (CVE-2023-46343) It was discovered that a race condition existed in the Bluetooth subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-51779) It was discovered that a race condition existed in the Rose X.25 protocol implementation in the Linux kernel, leading to a use-after- free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-51782) Alon Zahavi discovered that the NVMe-oF/TCP subsystem of the Linux kernel did not properly handle connect command payloads in certain situations, leading to an out-of-bounds read vulnerability. A remote attacker could use this to expose sensitive information (kernel memory). (CVE-2023-6121) Jann Horn discovered that the io_uring subsystem in the Linux kernel contained an out-of-bounds access vulnerability. A local attacker could use this to cause a denial of service (system crash). (CVE-2023-6560) Dan Carpenter discovered that the netfilter subsystem in the Linux kernel did not store data in properly sized memory locations. A local user could use this to cause a denial of service (system crash). (CVE-2024-0607) Supraja Sridhara, Benedict Schlüter, Mark Kuhne, Andrin Bertschi, and Shweta Shinde discovered that the Confidential Computing framework in the Linux kernel for x86 platforms did not properly handle 32-bit emulation on TDX and SEV. An attacker with access to the VMM could use this to cause a denial of service (guest crash) or possibly execute arbitrary code. (CVE-2024-25744) Update Instructions: Run `sudo pro fix USN-6680-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.5.0-1009-starfive - 6.5.0-1009.10 linux-headers-6.5.0-1009-starfive - 6.5.0-1009.10 linux-image-6.5.0-1009-starfive - 6.5.0-1009.10 linux-modules-6.5.0-1009-starfive - 6.5.0-1009.10 linux-modules-extra-6.5.0-1009-starfive - 6.5.0-1009.10 linux-starfive-headers-6.5.0-1009 - 6.5.0-1009.10 linux-starfive-tools-6.5.0-1009 - 6.5.0-1009.10 linux-tools-6.5.0-1009-starfive - 6.5.0-1009.10 No subscription required linux-buildinfo-6.5.0-1011-laptop - 6.5.0-1011.14 linux-headers-6.5.0-1011-laptop - 6.5.0-1011.14 linux-image-6.5.0-1011-laptop - 6.5.0-1011.14 linux-laptop-headers-6.5.0-1011 - 6.5.0-1011.14 linux-laptop-tools-6.5.0-1011 - 6.5.0-1011.14 linux-modules-6.5.0-1011-laptop - 6.5.0-1011.14 linux-tools-6.5.0-1011-laptop - 6.5.0-1011.14 No subscription required linux-buildinfo-6.5.0-1012-raspi - 6.5.0-1012.15 linux-headers-6.5.0-1012-raspi - 6.5.0-1012.15 linux-image-6.5.0-1012-raspi - 6.5.0-1012.15 linux-modules-6.5.0-1012-raspi - 6.5.0-1012.15 linux-modules-extra-6.5.0-1012-raspi - 6.5.0-1012.15 linux-raspi-headers-6.5.0-1012 - 6.5.0-1012.15 linux-raspi-tools-6.5.0-1012 - 6.5.0-1012.15 linux-tools-6.5.0-1012-raspi - 6.5.0-1012.15 No subscription required linux-buildinfo-6.5.0-1015-gcp - 6.5.0-1015.15 linux-gcp-headers-6.5.0-1015 - 6.5.0-1015.15 linux-gcp-tools-6.5.0-1015 - 6.5.0-1015.15 linux-headers-6.5.0-1015-gcp - 6.5.0-1015.15 linux-image-6.5.0-1015-gcp - 6.5.0-1015.15 linux-image-unsigned-6.5.0-1015-gcp - 6.5.0-1015.15 linux-modules-6.5.0-1015-gcp - 6.5.0-1015.15 linux-modules-extra-6.5.0-1015-gcp - 6.5.0-1015.15 linux-modules-iwlwifi-6.5.0-1015-gcp - 6.5.0-1015.15 linux-tools-6.5.0-1015-gcp - 6.5.0-1015.15 No subscription required linux-buildinfo-6.5.0-1018-oracle - 6.5.0-1018.18 linux-buildinfo-6.5.0-1018-oracle-64k - 6.5.0-1018.18 linux-headers-6.5.0-1018-oracle - 6.5.0-1018.18 linux-headers-6.5.0-1018-oracle-64k - 6.5.0-1018.18 linux-image-6.5.0-1018-oracle - 6.5.0-1018.18 linux-image-6.5.0-1018-oracle-64k - 6.5.0-1018.18 linux-image-unsigned-6.5.0-1018-oracle - 6.5.0-1018.18 linux-image-unsigned-6.5.0-1018-oracle-64k - 6.5.0-1018.18 linux-modules-6.5.0-1018-oracle - 6.5.0-1018.18 linux-modules-6.5.0-1018-oracle-64k - 6.5.0-1018.18 linux-modules-extra-6.5.0-1018-oracle - 6.5.0-1018.18 linux-modules-extra-6.5.0-1018-oracle-64k - 6.5.0-1018.18 linux-modules-iwlwifi-6.5.0-1018-oracle - 6.5.0-1018.18 linux-oracle-headers-6.5.0-1018 - 6.5.0-1018.18 linux-oracle-tools-6.5.0-1018 - 6.5.0-1018.18 linux-tools-6.5.0-1018-oracle - 6.5.0-1018.18 linux-tools-6.5.0-1018-oracle-64k - 6.5.0-1018.18 No subscription required linux-buildinfo-6.5.0-25-generic - 6.5.0-25.25 linux-buildinfo-6.5.0-25-generic-64k - 6.5.0-25.25 linux-cloud-tools-6.5.0-25 - 6.5.0-25.25 linux-cloud-tools-6.5.0-25-generic - 6.5.0-25.25 linux-cloud-tools-common - 6.5.0-25.25 linux-doc - 6.5.0-25.25 linux-headers-6.5.0-25 - 6.5.0-25.25 linux-headers-6.5.0-25-generic - 6.5.0-25.25 linux-headers-6.5.0-25-generic-64k - 6.5.0-25.25 linux-image-6.5.0-25-generic - 6.5.0-25.25 linux-image-6.5.0-25-generic-64k - 6.5.0-25.25 linux-image-uc-6.5.0-25-generic - 6.5.0-25.25 linux-image-uc-6.5.0-25-generic-64k - 6.5.0-25.25 linux-image-unsigned-6.5.0-25-generic - 6.5.0-25.25 linux-image-unsigned-6.5.0-25-generic-64k - 6.5.0-25.25 linux-lib-rust-6.5.0-25-generic - 6.5.0-25.25 linux-libc-dev - 6.5.0-25.25 linux-modules-6.5.0-25-generic - 6.5.0-25.25 linux-modules-6.5.0-25-generic-64k - 6.5.0-25.25 linux-modules-extra-6.5.0-25-generic - 6.5.0-25.25 linux-modules-ipu6-6.5.0-25-generic - 6.5.0-25.25 linux-modules-ivsc-6.5.0-25-generic - 6.5.0-25.25 linux-modules-iwlwifi-6.5.0-25-generic - 6.5.0-25.25 linux-source-6.5.0 - 6.5.0-25.25 linux-tools-6.5.0-25 - 6.5.0-25.25 linux-tools-6.5.0-25-generic - 6.5.0-25.25 linux-tools-6.5.0-25-generic-64k - 6.5.0-25.25 linux-tools-common - 6.5.0-25.25 linux-tools-host - 6.5.0-25.25 No subscription required linux-buildinfo-6.5.0-25-lowlatency - 6.5.0-25.25.1 linux-buildinfo-6.5.0-25-lowlatency-64k - 6.5.0-25.25.1 linux-cloud-tools-6.5.0-25-lowlatency - 6.5.0-25.25.1 linux-headers-6.5.0-25-lowlatency - 6.5.0-25.25.1 linux-headers-6.5.0-25-lowlatency-64k - 6.5.0-25.25.1 linux-image-6.5.0-25-lowlatency - 6.5.0-25.25.1 linux-image-6.5.0-25-lowlatency-64k - 6.5.0-25.25.1 linux-image-unsigned-6.5.0-25-lowlatency - 6.5.0-25.25.1 linux-image-unsigned-6.5.0-25-lowlatency-64k - 6.5.0-25.25.1 linux-lowlatency-cloud-tools-6.5.0-25 - 6.5.0-25.25.1 linux-lowlatency-cloud-tools-common - 6.5.0-25.25.1 linux-lowlatency-headers-6.5.0-25 - 6.5.0-25.25.1 linux-lowlatency-lib-rust-6.5.0-25-lowlatency - 6.5.0-25.25.1 linux-lowlatency-tools-6.5.0-25 - 6.5.0-25.25.1 linux-lowlatency-tools-common - 6.5.0-25.25.1 linux-lowlatency-tools-host - 6.5.0-25.25.1 linux-modules-6.5.0-25-lowlatency - 6.5.0-25.25.1 linux-modules-6.5.0-25-lowlatency-64k - 6.5.0-25.25.1 linux-modules-iwlwifi-6.5.0-25-lowlatency - 6.5.0-25.25.1 linux-tools-6.5.0-25-lowlatency - 6.5.0-25.25.1 linux-tools-6.5.0-25-lowlatency-64k - 6.5.0-25.25.1 No subscription required linux-headers-starfive - 6.5.0.1009.11 linux-image-starfive - 6.5.0.1009.11 linux-starfive - 6.5.0.1009.11 linux-tools-starfive - 6.5.0.1009.11 No subscription required linux-headers-laptop-23.10 - 6.5.0.1011.14 linux-image-laptop-23.10 - 6.5.0.1011.14 linux-laptop-23.10 - 6.5.0.1011.14 linux-tools-laptop-23.10 - 6.5.0.1011.14 No subscription required linux-headers-raspi - 6.5.0.1012.13 linux-headers-raspi-nolpae - 6.5.0.1012.13 linux-image-raspi - 6.5.0.1012.13 linux-image-raspi-nolpae - 6.5.0.1012.13 linux-modules-extra-raspi - 6.5.0.1012.13 linux-modules-extra-raspi-nolpae - 6.5.0.1012.13 linux-raspi - 6.5.0.1012.13 linux-raspi-nolpae - 6.5.0.1012.13 linux-tools-raspi - 6.5.0.1012.13 linux-tools-raspi-nolpae - 6.5.0.1012.13 No subscription required linux-gcp - 6.5.0.1015.15 linux-headers-gcp - 6.5.0.1015.15 linux-image-gcp - 6.5.0.1015.15 linux-modules-extra-gcp - 6.5.0.1015.15 linux-modules-iwlwifi-gcp - 6.5.0.1015.15 linux-tools-gcp - 6.5.0.1015.15 No subscription required linux-headers-oracle - 6.5.0.1018.20 linux-headers-oracle-64k - 6.5.0.1018.20 linux-image-oracle - 6.5.0.1018.20 linux-image-oracle-64k - 6.5.0.1018.20 linux-modules-iwlwifi-oracle - 6.5.0.1018.20 linux-oracle - 6.5.0.1018.20 linux-oracle-64k - 6.5.0.1018.20 linux-tools-oracle - 6.5.0.1018.20 linux-tools-oracle-64k - 6.5.0.1018.20 No subscription required linux-cloud-tools-generic - 6.5.0.25.25 linux-cloud-tools-generic-hwe-22.04 - 6.5.0.25.25 linux-cloud-tools-generic-hwe-22.04-edge - 6.5.0.25.25 linux-cloud-tools-virtual - 6.5.0.25.25 linux-cloud-tools-virtual-hwe-22.04 - 6.5.0.25.25 linux-cloud-tools-virtual-hwe-22.04-edge - 6.5.0.25.25 linux-crashdump - 6.5.0.25.25 linux-generic - 6.5.0.25.25 linux-generic-64k - 6.5.0.25.25 linux-generic-64k-hwe-22.04 - 6.5.0.25.25 linux-generic-64k-hwe-22.04-edge - 6.5.0.25.25 linux-generic-hwe-22.04 - 6.5.0.25.25 linux-generic-hwe-22.04-edge - 6.5.0.25.25 linux-generic-lpae - 6.5.0.25.25 linux-headers-generic - 6.5.0.25.25 linux-headers-generic-64k - 6.5.0.25.25 linux-headers-generic-64k-hwe-22.04 - 6.5.0.25.25 linux-headers-generic-64k-hwe-22.04-edge - 6.5.0.25.25 linux-headers-generic-hwe-22.04 - 6.5.0.25.25 linux-headers-generic-hwe-22.04-edge - 6.5.0.25.25 linux-headers-generic-lpae - 6.5.0.25.25 linux-headers-kvm - 6.5.0.25.25 linux-headers-oem-20.04 - 6.5.0.25.25 linux-headers-oem-20.04b - 6.5.0.25.25 linux-headers-oem-20.04c - 6.5.0.25.25 linux-headers-oem-20.04d - 6.5.0.25.25 linux-headers-oem-22.04 - 6.5.0.25.25 linux-headers-virtual - 6.5.0.25.25 linux-headers-virtual-hwe-22.04 - 6.5.0.25.25 linux-headers-virtual-hwe-22.04-edge - 6.5.0.25.25 linux-image-extra-virtual - 6.5.0.25.25 linux-image-extra-virtual-hwe-22.04 - 6.5.0.25.25 linux-image-extra-virtual-hwe-22.04-edge - 6.5.0.25.25 linux-image-generic - 6.5.0.25.25 linux-image-generic-64k - 6.5.0.25.25 linux-image-generic-64k-hwe-22.04 - 6.5.0.25.25 linux-image-generic-64k-hwe-22.04-edge - 6.5.0.25.25 linux-image-generic-hwe-22.04 - 6.5.0.25.25 linux-image-generic-hwe-22.04-edge - 6.5.0.25.25 linux-image-generic-lpae - 6.5.0.25.25 linux-image-kvm - 6.5.0.25.25 linux-image-oem-20.04 - 6.5.0.25.25 linux-image-oem-20.04b - 6.5.0.25.25 linux-image-oem-20.04c - 6.5.0.25.25 linux-image-oem-20.04d - 6.5.0.25.25 linux-image-oem-22.04 - 6.5.0.25.25 linux-image-uc-generic - 6.5.0.25.25 linux-image-uc-generic-hwe-22.04 - 6.5.0.25.25 linux-image-uc-generic-hwe-22.04-edge - 6.5.0.25.25 linux-image-virtual - 6.5.0.25.25 linux-image-virtual-hwe-22.04 - 6.5.0.25.25 linux-image-virtual-hwe-22.04-edge - 6.5.0.25.25 linux-kvm - 6.5.0.25.25 linux-modules-ipu6-generic - 6.5.0.25.25 linux-modules-ipu6-generic-hwe-22.04 - 6.5.0.25.25 linux-modules-ipu6-generic-hwe-22.04-edge - 6.5.0.25.25 linux-modules-ipu6-oem-22.04 - 6.5.0.25.25 linux-modules-ivsc-generic - 6.5.0.25.25 linux-modules-ivsc-generic-hwe-22.04 - 6.5.0.25.25 linux-modules-ivsc-generic-hwe-22.04-edge - 6.5.0.25.25 linux-modules-ivsc-oem-22.04 - 6.5.0.25.25 linux-modules-iwlwifi-generic - 6.5.0.25.25 linux-modules-iwlwifi-generic-hwe-22.04 - 6.5.0.25.25 linux-modules-iwlwifi-generic-hwe-22.04-edge - 6.5.0.25.25 linux-modules-iwlwifi-oem-20.04 - 6.5.0.25.25 linux-modules-iwlwifi-oem-20.04d - 6.5.0.25.25 linux-modules-iwlwifi-oem-22.04 - 6.5.0.25.25 linux-oem-20.04 - 6.5.0.25.25 linux-oem-20.04b - 6.5.0.25.25 linux-oem-20.04c - 6.5.0.25.25 linux-oem-20.04d - 6.5.0.25.25 linux-oem-22.04 - 6.5.0.25.25 linux-source - 6.5.0.25.25 linux-tools-generic - 6.5.0.25.25 linux-tools-generic-64k - 6.5.0.25.25 linux-tools-generic-64k-hwe-22.04 - 6.5.0.25.25 linux-tools-generic-64k-hwe-22.04-edge - 6.5.0.25.25 linux-tools-generic-hwe-22.04 - 6.5.0.25.25 linux-tools-generic-hwe-22.04-edge - 6.5.0.25.25 linux-tools-generic-lpae - 6.5.0.25.25 linux-tools-kvm - 6.5.0.25.25 linux-tools-oem-20.04 - 6.5.0.25.25 linux-tools-oem-20.04b - 6.5.0.25.25 linux-tools-oem-20.04c - 6.5.0.25.25 linux-tools-oem-20.04d - 6.5.0.25.25 linux-tools-oem-22.04 - 6.5.0.25.25 linux-tools-virtual - 6.5.0.25.25 linux-tools-virtual-hwe-22.04 - 6.5.0.25.25 linux-tools-virtual-hwe-22.04-edge - 6.5.0.25.25 linux-virtual - 6.5.0.25.25 linux-virtual-hwe-22.04 - 6.5.0.25.25 linux-virtual-hwe-22.04-edge - 6.5.0.25.25 No subscription required linux-cloud-tools-lowlatency - 6.5.0.25.25.16 linux-cloud-tools-lowlatency-hwe-20.04 - 6.5.0.25.25.16 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.5.0.25.25.16 linux-cloud-tools-lowlatency-hwe-22.04 - 6.5.0.25.25.16 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.5.0.25.25.16 linux-headers-lowlatency - 6.5.0.25.25.16 linux-headers-lowlatency-64k - 6.5.0.25.25.16 linux-headers-lowlatency-64k-hwe-20.04 - 6.5.0.25.25.16 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.5.0.25.25.16 linux-headers-lowlatency-64k-hwe-22.04 - 6.5.0.25.25.16 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.5.0.25.25.16 linux-headers-lowlatency-hwe-20.04 - 6.5.0.25.25.16 linux-headers-lowlatency-hwe-20.04-edge - 6.5.0.25.25.16 linux-headers-lowlatency-hwe-22.04 - 6.5.0.25.25.16 linux-headers-lowlatency-hwe-22.04-edge - 6.5.0.25.25.16 linux-image-lowlatency - 6.5.0.25.25.16 linux-image-lowlatency-64k - 6.5.0.25.25.16 linux-image-lowlatency-64k-hwe-20.04 - 6.5.0.25.25.16 linux-image-lowlatency-64k-hwe-20.04-edge - 6.5.0.25.25.16 linux-image-lowlatency-64k-hwe-22.04 - 6.5.0.25.25.16 linux-image-lowlatency-64k-hwe-22.04-edge - 6.5.0.25.25.16 linux-image-lowlatency-hwe-20.04 - 6.5.0.25.25.16 linux-image-lowlatency-hwe-20.04-edge - 6.5.0.25.25.16 linux-image-lowlatency-hwe-22.04 - 6.5.0.25.25.16 linux-image-lowlatency-hwe-22.04-edge - 6.5.0.25.25.16 linux-lowlatency - 6.5.0.25.25.16 linux-lowlatency-64k - 6.5.0.25.25.16 linux-lowlatency-64k-hwe-20.04 - 6.5.0.25.25.16 linux-lowlatency-64k-hwe-20.04-edge - 6.5.0.25.25.16 linux-lowlatency-64k-hwe-22.04 - 6.5.0.25.25.16 linux-lowlatency-64k-hwe-22.04-edge - 6.5.0.25.25.16 linux-lowlatency-hwe-20.04 - 6.5.0.25.25.16 linux-lowlatency-hwe-20.04-edge - 6.5.0.25.25.16 linux-lowlatency-hwe-22.04 - 6.5.0.25.25.16 linux-lowlatency-hwe-22.04-edge - 6.5.0.25.25.16 linux-modules-iwlwifi-lowlatency - 6.5.0.25.25.16 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.5.0.25.25.16 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.5.0.25.25.16 linux-tools-lowlatency - 6.5.0.25.25.16 linux-tools-lowlatency-64k - 6.5.0.25.25.16 linux-tools-lowlatency-64k-hwe-20.04 - 6.5.0.25.25.16 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.5.0.25.25.16 linux-tools-lowlatency-64k-hwe-22.04 - 6.5.0.25.25.16 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.5.0.25.25.16 linux-tools-lowlatency-hwe-20.04 - 6.5.0.25.25.16 linux-tools-lowlatency-hwe-20.04-edge - 6.5.0.25.25.16 linux-tools-lowlatency-hwe-22.04 - 6.5.0.25.25.16 linux-tools-lowlatency-hwe-22.04-edge - 6.5.0.25.25.16 No subscription required Medium CVE-2023-46343 CVE-2023-51779 CVE-2023-51782 CVE-2023-6121 CVE-2023-6560 CVE-2024-0607 CVE-2024-25744 USN-6680-2 -- Linux kernel vulnerabilities Ubuntu 23.10 黄思聪 discovered that the NFC Controller Interface (NCI) implementation in the Linux kernel did not properly handle certain memory allocation failure conditions, leading to a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service (system crash). (CVE-2023-46343) It was discovered that a race condition existed in the Bluetooth subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-51779) It was discovered that a race condition existed in the Rose X.25 protocol implementation in the Linux kernel, leading to a use-after- free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-51782) Alon Zahavi discovered that the NVMe-oF/TCP subsystem of the Linux kernel did not properly handle connect command payloads in certain situations, leading to an out-of-bounds read vulnerability. A remote attacker could use this to expose sensitive information (kernel memory). (CVE-2023-6121) Jann Horn discovered that the io_uring subsystem in the Linux kernel contained an out-of-bounds access vulnerability. A local attacker could use this to cause a denial of service (system crash). (CVE-2023-6560) Dan Carpenter discovered that the netfilter subsystem in the Linux kernel did not store data in properly sized memory locations. A local user could use this to cause a denial of service (system crash). (CVE-2024-0607) Supraja Sridhara, Benedict Schlüter, Mark Kuhne, Andrin Bertschi, and Shweta Shinde discovered that the Confidential Computing framework in the Linux kernel for x86 platforms did not properly handle 32-bit emulation on TDX and SEV. An attacker with access to the VMM could use this to cause a denial of service (guest crash) or possibly execute arbitrary code. (CVE-2024-25744) Update Instructions: Run `sudo pro fix USN-6680-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-azure-cloud-tools-6.5.0-1016 - 6.5.0-1016.16 linux-azure-headers-6.5.0-1016 - 6.5.0-1016.16 linux-azure-tools-6.5.0-1016 - 6.5.0-1016.16 linux-buildinfo-6.5.0-1016-azure - 6.5.0-1016.16 linux-cloud-tools-6.5.0-1016-azure - 6.5.0-1016.16 linux-headers-6.5.0-1016-azure - 6.5.0-1016.16 linux-image-6.5.0-1016-azure - 6.5.0-1016.16 linux-image-6.5.0-1016-azure-fde - 6.5.0-1016.16 linux-image-unsigned-6.5.0-1016-azure - 6.5.0-1016.16 linux-modules-6.5.0-1016-azure - 6.5.0-1016.16 linux-modules-extra-6.5.0-1016-azure - 6.5.0-1016.16 linux-modules-ipu6-6.5.0-1016-azure - 6.5.0-1016.16 linux-modules-ivsc-6.5.0-1016-azure - 6.5.0-1016.16 linux-modules-iwlwifi-6.5.0-1016-azure - 6.5.0-1016.16 linux-tools-6.5.0-1016-azure - 6.5.0-1016.16 No subscription required linux-azure - 6.5.0.1016.18 linux-azure-fde - 6.5.0.1016.18 linux-cloud-tools-azure - 6.5.0.1016.18 linux-headers-azure - 6.5.0.1016.18 linux-image-azure - 6.5.0.1016.18 linux-image-azure-fde - 6.5.0.1016.18 linux-modules-extra-azure - 6.5.0.1016.18 linux-modules-ipu6-azure - 6.5.0.1016.18 linux-modules-ivsc-azure - 6.5.0.1016.18 linux-modules-iwlwifi-azure - 6.5.0.1016.18 linux-tools-azure - 6.5.0.1016.18 No subscription required Medium CVE-2023-46343 CVE-2023-51779 CVE-2023-51782 CVE-2023-6121 CVE-2023-6560 CVE-2024-0607 CVE-2024-25744 USN-6680-3 -- Linux kernel (AWS) vulnerabilities Ubuntu 23.10 黄思聪 discovered that the NFC Controller Interface (NCI) implementation in the Linux kernel did not properly handle certain memory allocation failure conditions, leading to a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service (system crash). (CVE-2023-46343) It was discovered that a race condition existed in the Bluetooth subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-51779) It was discovered that a race condition existed in the Rose X.25 protocol implementation in the Linux kernel, leading to a use-after- free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-51782) Alon Zahavi discovered that the NVMe-oF/TCP subsystem of the Linux kernel did not properly handle connect command payloads in certain situations, leading to an out-of-bounds read vulnerability. A remote attacker could use this to expose sensitive information (kernel memory). (CVE-2023-6121) Jann Horn discovered that the io_uring subsystem in the Linux kernel contained an out-of-bounds access vulnerability. A local attacker could use this to cause a denial of service (system crash). (CVE-2023-6560) Dan Carpenter discovered that the netfilter subsystem in the Linux kernel did not store data in properly sized memory locations. A local user could use this to cause a denial of service (system crash). (CVE-2024-0607) Supraja Sridhara, Benedict Schlüter, Mark Kuhne, Andrin Bertschi, and Shweta Shinde discovered that the Confidential Computing framework in the Linux kernel for x86 platforms did not properly handle 32-bit emulation on TDX and SEV. An attacker with access to the VMM could use this to cause a denial of service (guest crash) or possibly execute arbitrary code. (CVE-2024-25744) Update Instructions: Run `sudo pro fix USN-6680-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-aws-cloud-tools-6.5.0-1015 - 6.5.0-1015.15 linux-aws-headers-6.5.0-1015 - 6.5.0-1015.15 linux-aws-tools-6.5.0-1015 - 6.5.0-1015.15 linux-buildinfo-6.5.0-1015-aws - 6.5.0-1015.15 linux-cloud-tools-6.5.0-1015-aws - 6.5.0-1015.15 linux-headers-6.5.0-1015-aws - 6.5.0-1015.15 linux-image-6.5.0-1015-aws - 6.5.0-1015.15 linux-image-unsigned-6.5.0-1015-aws - 6.5.0-1015.15 linux-modules-6.5.0-1015-aws - 6.5.0-1015.15 linux-modules-extra-6.5.0-1015-aws - 6.5.0-1015.15 linux-tools-6.5.0-1015-aws - 6.5.0-1015.15 No subscription required linux-aws - 6.5.0.1015.15 linux-headers-aws - 6.5.0.1015.15 linux-image-aws - 6.5.0.1015.15 linux-modules-extra-aws - 6.5.0.1015.15 linux-tools-aws - 6.5.0.1015.15 No subscription required Medium CVE-2023-46343 CVE-2023-51779 CVE-2023-51782 CVE-2023-6121 CVE-2023-6560 CVE-2024-0607 CVE-2024-25744 USN-6689-1 -- Rack vulnerabilities Ubuntu 23.10 It was discovered that Rack incorrectly parse some headers. An attacker could possibly use this issue to cause a denial of service. (CVE-2023-27539, CVE-2024-26141, CVE-2024-26146) Update Instructions: Run `sudo pro fix USN-6689-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ruby-rack - 2.2.4-3ubuntu0.1 No subscription required Medium CVE-2023-27539 CVE-2024-26141 CVE-2024-26146 USN-6690-1 -- Open vSwitch vulnerabilities Ubuntu 23.10 Timothy Redaelli and Haresh Khandelwal discovered that Open vSwitch incorrectly handled certain crafted Geneve packets when hardware offloading via the netlink path is enabled. A remote attacker could possibly use this issue to cause Open vSwitch to crash, leading to a denial of service. (CVE-2023-3966) It was discovered that Open vSwitch incorrectly handled certain ICMPv6 Neighbor Advertisement packets. A remote attacker could possibly use this issue to redirect traffic to arbitrary IP addresses. (CVE-2023-5366) Update Instructions: Run `sudo pro fix USN-6690-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openvswitch-common - 3.2.2-0ubuntu0.23.10.1 openvswitch-doc - 3.2.2-0ubuntu0.23.10.1 openvswitch-ipsec - 3.2.2-0ubuntu0.23.10.1 openvswitch-pki - 3.2.2-0ubuntu0.23.10.1 openvswitch-source - 3.2.2-0ubuntu0.23.10.1 openvswitch-switch - 3.2.2-0ubuntu0.23.10.1 openvswitch-switch-dpdk - 3.2.2-0ubuntu0.23.10.1 openvswitch-test - 3.2.2-0ubuntu0.23.10.1 openvswitch-testcontroller - 3.2.2-0ubuntu0.23.10.1 openvswitch-vtep - 3.2.2-0ubuntu0.23.10.1 python3-openvswitch - 3.2.2-0ubuntu0.23.10.1 No subscription required Medium CVE-2023-3966 CVE-2023-5366 USN-6691-1 -- OVN vulnerability Ubuntu 23.10 It was discovered that OVN incorrectly enabled OVS Bidirectional Forwarding Detection on logical ports. A remote attacker could possibly use this issue to disrupt traffic. Update Instructions: Run `sudo pro fix USN-6691-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ovn-central - 23.09.0-1ubuntu0.1 ovn-common - 23.09.0-1ubuntu0.1 ovn-controller-vtep - 23.09.0-1ubuntu0.1 ovn-doc - 23.09.0-1ubuntu0.1 ovn-docker - 23.09.0-1ubuntu0.1 ovn-host - 23.09.0-1ubuntu0.1 ovn-ic - 23.09.0-1ubuntu0.1 ovn-ic-db - 23.09.0-1ubuntu0.1 No subscription required Medium CVE-2024-2182 USN-6693-1 -- .NET vulnerability Ubuntu 23.10 It was discovered that .NET did not properly handle certain specially crafted requests. An attacker could potentially use this issue to cause a resource leak, leading to a denial of service. Update Instructions: Run `sudo pro fix USN-6693-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: aspnetcore-runtime-7.0 - 7.0.117-0ubuntu1~23.10.1 aspnetcore-targeting-pack-7.0 - 7.0.117-0ubuntu1~23.10.1 dotnet-apphost-pack-7.0 - 7.0.117-0ubuntu1~23.10.1 dotnet-host-7.0 - 7.0.117-0ubuntu1~23.10.1 dotnet-hostfxr-7.0 - 7.0.117-0ubuntu1~23.10.1 dotnet-runtime-7.0 - 7.0.117-0ubuntu1~23.10.1 dotnet-sdk-7.0 - 7.0.117-0ubuntu1~23.10.1 dotnet-sdk-7.0-source-built-artifacts - 7.0.117-0ubuntu1~23.10.1 dotnet-targeting-pack-7.0 - 7.0.117-0ubuntu1~23.10.1 dotnet-templates-7.0 - 7.0.117-0ubuntu1~23.10.1 dotnet7 - 7.0.117-0ubuntu1~23.10.1 netstandard-targeting-pack-2.1-7.0 - 7.0.117-0ubuntu1~23.10.1 No subscription required dotnet-sdk-8.0 - 8.0.103-0ubuntu1~23.10.1 dotnet-sdk-8.0-source-built-artifacts - 8.0.103-0ubuntu1~23.10.1 dotnet-templates-8.0 - 8.0.103-0ubuntu1~23.10.1 netstandard-targeting-pack-2.1-8.0 - 8.0.103-0ubuntu1~23.10.1 No subscription required dotnet8 - 8.0.103-8.0.3-0ubuntu1~23.10.1 No subscription required aspnetcore-runtime-8.0 - 8.0.3-0ubuntu1~23.10.1 aspnetcore-targeting-pack-8.0 - 8.0.3-0ubuntu1~23.10.1 dotnet-apphost-pack-8.0 - 8.0.3-0ubuntu1~23.10.1 dotnet-host-8.0 - 8.0.3-0ubuntu1~23.10.1 dotnet-hostfxr-8.0 - 8.0.3-0ubuntu1~23.10.1 dotnet-runtime-8.0 - 8.0.3-0ubuntu1~23.10.1 dotnet-targeting-pack-8.0 - 8.0.3-0ubuntu1~23.10.1 No subscription required Medium CVE-2024-21392 USN-6694-1 -- Expat vulnerabilities Ubuntu 23.10 It was discovered that Expat could be made to consume large amounts of resources. If a user or automated system were tricked into processing specially crafted input, an attacker could possibly use this issue to cause a denial of service. (CVE-2023-52425, CVE-2024-28757) Update Instructions: Run `sudo pro fix USN-6694-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: expat - 2.5.0-2ubuntu0.1 libexpat1 - 2.5.0-2ubuntu0.1 libexpat1-dev - 2.5.0-2ubuntu0.1 No subscription required Medium CVE-2023-52425 CVE-2024-28757 USN-6695-1 -- TeX Live vulnerabilities Ubuntu 23.10 It was discovered that TeX Live incorrectly handled certain memory operations in the embedded axodraw2 tool. An attacker could possibly use this issue to cause TeX Live to crash, resulting in a denial of service. This issue only affected Ubuntu 20.04 LTS. (CVE-2019-18604) It was discovered that TeX Live allowed documents to make arbitrary network requests. If a user or automated system were tricked into opening a specially crafted document, a remote attacker could possibly use this issue to exfiltrate sensitive information, or perform other network-related attacks. This issue only affected Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2023-32668) It was discovered that TeX Live incorrectly handled certain TrueType fonts. If a user or automated system were tricked into opening a specially crafted TrueType font, a remote attacker could use this issue to cause TeX Live to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2024-25262) Update Instructions: Run `sudo pro fix USN-6695-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libkpathsea-dev - 2023.20230311.66589-6ubuntu0.1 libkpathsea6 - 2023.20230311.66589-6ubuntu0.1 libptexenc-dev - 2023.20230311.66589-6ubuntu0.1 libptexenc1 - 2023.20230311.66589-6ubuntu0.1 libsynctex-dev - 2023.20230311.66589-6ubuntu0.1 libsynctex2 - 2023.20230311.66589-6ubuntu0.1 libtexlua-dev - 2023.20230311.66589-6ubuntu0.1 libtexlua53 - 2023.20230311.66589-6ubuntu0.1 libtexlua53-5 - 2023.20230311.66589-6ubuntu0.1 libtexlua53-dev - 2023.20230311.66589-6ubuntu0.1 libtexluajit-dev - 2023.20230311.66589-6ubuntu0.1 libtexluajit2 - 2023.20230311.66589-6ubuntu0.1 texlive-binaries - 2023.20230311.66589-6ubuntu0.1 texlive-binaries-sse2 - 2023.20230311.66589-6ubuntu0.1 No subscription required Medium CVE-2019-18604 CVE-2023-32668 CVE-2024-25262 USN-6696-1 -- OpenJDK 8 vulnerabilities Ubuntu 23.10 Yi Yang discovered that the Hotspot component of OpenJDK 8 incorrectly handled array accesses in the C1 compiler. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. (CVE-2024-20918) It was discovered that the Hotspot component of OpenJDK 8 did not properly verify bytecode in certain situations. An attacker could possibly use this issue to bypass Java sandbox restrictions. (CVE-2024-20919) It was discovered that the Hotspot component of OpenJDK 8 had an optimization flaw when generating range check loop predicates. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. (CVE-2024-20921) Valentin Eudeline discovered that OpenJDK 8 incorrectly handled certain options in the Nashorn JavaScript subcomponent. An attacker could possibly use this issue to execute arbitrary code. (CVE-2024-20926) It was discovered that OpenJDK 8 could produce debug logs that contained private keys used for digital signatures. An attacker could possibly use this issue to obtain sensitive information. (CVE-2024-20945) Hubert Kario discovered that the TLS implementation in OpenJDK 8 had a timing side-channel and incorrectly handled RSA padding. A remote attacker could possibly use this issue to recover sensitive information. (CVE-2024-20952) Update Instructions: Run `sudo pro fix USN-6696-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-8-demo - 8u402-ga-2ubuntu1~23.10.1 openjdk-8-doc - 8u402-ga-2ubuntu1~23.10.1 openjdk-8-jdk - 8u402-ga-2ubuntu1~23.10.1 openjdk-8-jdk-headless - 8u402-ga-2ubuntu1~23.10.1 openjdk-8-jre - 8u402-ga-2ubuntu1~23.10.1 openjdk-8-jre-headless - 8u402-ga-2ubuntu1~23.10.1 openjdk-8-jre-zero - 8u402-ga-2ubuntu1~23.10.1 openjdk-8-source - 8u402-ga-2ubuntu1~23.10.1 No subscription required Medium CVE-2024-20918 CVE-2024-20919 CVE-2024-20921 CVE-2024-20926 CVE-2024-20945 CVE-2024-20952 USN-6698-1 -- Vim vulnerability Ubuntu 23.10 Zhen Zhou discovered that Vim did not properly manage memory. An attacker could possibly use this issue to cause a denial of service Update Instructions: Run `sudo pro fix USN-6698-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: vim - 2:9.0.1672-1ubuntu2.3 vim-athena - 2:9.0.1672-1ubuntu2.3 vim-common - 2:9.0.1672-1ubuntu2.3 vim-doc - 2:9.0.1672-1ubuntu2.3 vim-gtk3 - 2:9.0.1672-1ubuntu2.3 vim-gui-common - 2:9.0.1672-1ubuntu2.3 vim-motif - 2:9.0.1672-1ubuntu2.3 vim-nox - 2:9.0.1672-1ubuntu2.3 vim-runtime - 2:9.0.1672-1ubuntu2.3 vim-tiny - 2:9.0.1672-1ubuntu2.3 xxd - 2:9.0.1672-1ubuntu2.3 No subscription required Low CVE-2024-22667 USN-6707-1 -- Linux kernel vulnerabilities Ubuntu 23.10 Lonial Con discovered that the netfilter subsystem in the Linux kernel did not properly handle element deactivation in certain cases, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2024-1085) Notselwyn discovered that the netfilter subsystem in the Linux kernel did not properly handle verdict parameters in certain cases, leading to a use- after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2024-1086) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Network drivers; - PWM drivers; (CVE-2024-26597, CVE-2024-26599) Update Instructions: Run `sudo pro fix USN-6707-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.5.0-1010-starfive - 6.5.0-1010.11 linux-headers-6.5.0-1010-starfive - 6.5.0-1010.11 linux-image-6.5.0-1010-starfive - 6.5.0-1010.11 linux-modules-6.5.0-1010-starfive - 6.5.0-1010.11 linux-modules-extra-6.5.0-1010-starfive - 6.5.0-1010.11 linux-starfive-headers-6.5.0-1010 - 6.5.0-1010.11 linux-starfive-tools-6.5.0-1010 - 6.5.0-1010.11 linux-tools-6.5.0-1010-starfive - 6.5.0-1010.11 No subscription required linux-buildinfo-6.5.0-1013-raspi - 6.5.0-1013.16 linux-headers-6.5.0-1013-raspi - 6.5.0-1013.16 linux-image-6.5.0-1013-raspi - 6.5.0-1013.16 linux-modules-6.5.0-1013-raspi - 6.5.0-1013.16 linux-modules-extra-6.5.0-1013-raspi - 6.5.0-1013.16 linux-raspi-headers-6.5.0-1013 - 6.5.0-1013.16 linux-raspi-tools-6.5.0-1013 - 6.5.0-1013.16 linux-tools-6.5.0-1013-raspi - 6.5.0-1013.16 No subscription required linux-buildinfo-6.5.0-1016-gcp - 6.5.0-1016.16 linux-gcp-headers-6.5.0-1016 - 6.5.0-1016.16 linux-gcp-tools-6.5.0-1016 - 6.5.0-1016.16 linux-headers-6.5.0-1016-gcp - 6.5.0-1016.16 linux-image-6.5.0-1016-gcp - 6.5.0-1016.16 linux-image-unsigned-6.5.0-1016-gcp - 6.5.0-1016.16 linux-modules-6.5.0-1016-gcp - 6.5.0-1016.16 linux-modules-extra-6.5.0-1016-gcp - 6.5.0-1016.16 linux-modules-iwlwifi-6.5.0-1016-gcp - 6.5.0-1016.16 linux-tools-6.5.0-1016-gcp - 6.5.0-1016.16 No subscription required linux-azure-cloud-tools-6.5.0-1017 - 6.5.0-1017.17 linux-azure-headers-6.5.0-1017 - 6.5.0-1017.17 linux-azure-tools-6.5.0-1017 - 6.5.0-1017.17 linux-buildinfo-6.5.0-1017-azure - 6.5.0-1017.17 linux-cloud-tools-6.5.0-1017-azure - 6.5.0-1017.17 linux-headers-6.5.0-1017-azure - 6.5.0-1017.17 linux-image-6.5.0-1017-azure - 6.5.0-1017.17 linux-image-6.5.0-1017-azure-fde - 6.5.0-1017.17 linux-image-unsigned-6.5.0-1017-azure - 6.5.0-1017.17 linux-modules-6.5.0-1017-azure - 6.5.0-1017.17 linux-modules-extra-6.5.0-1017-azure - 6.5.0-1017.17 linux-modules-ipu6-6.5.0-1017-azure - 6.5.0-1017.17 linux-modules-ivsc-6.5.0-1017-azure - 6.5.0-1017.17 linux-modules-iwlwifi-6.5.0-1017-azure - 6.5.0-1017.17 linux-tools-6.5.0-1017-azure - 6.5.0-1017.17 No subscription required linux-buildinfo-6.5.0-1019-oracle - 6.5.0-1019.19 linux-buildinfo-6.5.0-1019-oracle-64k - 6.5.0-1019.19 linux-headers-6.5.0-1019-oracle - 6.5.0-1019.19 linux-headers-6.5.0-1019-oracle-64k - 6.5.0-1019.19 linux-image-6.5.0-1019-oracle - 6.5.0-1019.19 linux-image-6.5.0-1019-oracle-64k - 6.5.0-1019.19 linux-image-unsigned-6.5.0-1019-oracle - 6.5.0-1019.19 linux-image-unsigned-6.5.0-1019-oracle-64k - 6.5.0-1019.19 linux-modules-6.5.0-1019-oracle - 6.5.0-1019.19 linux-modules-6.5.0-1019-oracle-64k - 6.5.0-1019.19 linux-modules-extra-6.5.0-1019-oracle - 6.5.0-1019.19 linux-modules-extra-6.5.0-1019-oracle-64k - 6.5.0-1019.19 linux-modules-iwlwifi-6.5.0-1019-oracle - 6.5.0-1019.19 linux-oracle-headers-6.5.0-1019 - 6.5.0-1019.19 linux-oracle-tools-6.5.0-1019 - 6.5.0-1019.19 linux-tools-6.5.0-1019-oracle - 6.5.0-1019.19 linux-tools-6.5.0-1019-oracle-64k - 6.5.0-1019.19 No subscription required linux-buildinfo-6.5.0-26-generic - 6.5.0-26.26 linux-buildinfo-6.5.0-26-generic-64k - 6.5.0-26.26 linux-cloud-tools-6.5.0-26 - 6.5.0-26.26 linux-cloud-tools-6.5.0-26-generic - 6.5.0-26.26 linux-cloud-tools-common - 6.5.0-26.26 linux-doc - 6.5.0-26.26 linux-headers-6.5.0-26 - 6.5.0-26.26 linux-headers-6.5.0-26-generic - 6.5.0-26.26 linux-headers-6.5.0-26-generic-64k - 6.5.0-26.26 linux-image-6.5.0-26-generic - 6.5.0-26.26 linux-image-6.5.0-26-generic-64k - 6.5.0-26.26 linux-image-uc-6.5.0-26-generic - 6.5.0-26.26 linux-image-uc-6.5.0-26-generic-64k - 6.5.0-26.26 linux-image-unsigned-6.5.0-26-generic - 6.5.0-26.26 linux-image-unsigned-6.5.0-26-generic-64k - 6.5.0-26.26 linux-lib-rust-6.5.0-26-generic - 6.5.0-26.26 linux-libc-dev - 6.5.0-26.26 linux-modules-6.5.0-26-generic - 6.5.0-26.26 linux-modules-6.5.0-26-generic-64k - 6.5.0-26.26 linux-modules-extra-6.5.0-26-generic - 6.5.0-26.26 linux-modules-ipu6-6.5.0-26-generic - 6.5.0-26.26 linux-modules-ivsc-6.5.0-26-generic - 6.5.0-26.26 linux-modules-iwlwifi-6.5.0-26-generic - 6.5.0-26.26 linux-source-6.5.0 - 6.5.0-26.26 linux-tools-6.5.0-26 - 6.5.0-26.26 linux-tools-6.5.0-26-generic - 6.5.0-26.26 linux-tools-6.5.0-26-generic-64k - 6.5.0-26.26 linux-tools-common - 6.5.0-26.26 linux-tools-host - 6.5.0-26.26 No subscription required linux-buildinfo-6.5.0-26-lowlatency - 6.5.0-26.26.1 linux-buildinfo-6.5.0-26-lowlatency-64k - 6.5.0-26.26.1 linux-cloud-tools-6.5.0-26-lowlatency - 6.5.0-26.26.1 linux-headers-6.5.0-26-lowlatency - 6.5.0-26.26.1 linux-headers-6.5.0-26-lowlatency-64k - 6.5.0-26.26.1 linux-image-6.5.0-26-lowlatency - 6.5.0-26.26.1 linux-image-6.5.0-26-lowlatency-64k - 6.5.0-26.26.1 linux-image-unsigned-6.5.0-26-lowlatency - 6.5.0-26.26.1 linux-image-unsigned-6.5.0-26-lowlatency-64k - 6.5.0-26.26.1 linux-lowlatency-cloud-tools-6.5.0-26 - 6.5.0-26.26.1 linux-lowlatency-cloud-tools-common - 6.5.0-26.26.1 linux-lowlatency-headers-6.5.0-26 - 6.5.0-26.26.1 linux-lowlatency-lib-rust-6.5.0-26-lowlatency - 6.5.0-26.26.1 linux-lowlatency-tools-6.5.0-26 - 6.5.0-26.26.1 linux-lowlatency-tools-common - 6.5.0-26.26.1 linux-lowlatency-tools-host - 6.5.0-26.26.1 linux-modules-6.5.0-26-lowlatency - 6.5.0-26.26.1 linux-modules-6.5.0-26-lowlatency-64k - 6.5.0-26.26.1 linux-modules-iwlwifi-6.5.0-26-lowlatency - 6.5.0-26.26.1 linux-tools-6.5.0-26-lowlatency - 6.5.0-26.26.1 linux-tools-6.5.0-26-lowlatency-64k - 6.5.0-26.26.1 No subscription required linux-headers-starfive - 6.5.0.1010.12 linux-image-starfive - 6.5.0.1010.12 linux-starfive - 6.5.0.1010.12 linux-tools-starfive - 6.5.0.1010.12 No subscription required linux-headers-raspi - 6.5.0.1013.14 linux-headers-raspi-nolpae - 6.5.0.1013.14 linux-image-raspi - 6.5.0.1013.14 linux-image-raspi-nolpae - 6.5.0.1013.14 linux-modules-extra-raspi - 6.5.0.1013.14 linux-modules-extra-raspi-nolpae - 6.5.0.1013.14 linux-raspi - 6.5.0.1013.14 linux-raspi-nolpae - 6.5.0.1013.14 linux-tools-raspi - 6.5.0.1013.14 linux-tools-raspi-nolpae - 6.5.0.1013.14 No subscription required linux-gcp - 6.5.0.1016.16 linux-headers-gcp - 6.5.0.1016.16 linux-image-gcp - 6.5.0.1016.16 linux-modules-extra-gcp - 6.5.0.1016.16 linux-modules-iwlwifi-gcp - 6.5.0.1016.16 linux-tools-gcp - 6.5.0.1016.16 No subscription required linux-azure - 6.5.0.1017.19 linux-azure-fde - 6.5.0.1017.19 linux-cloud-tools-azure - 6.5.0.1017.19 linux-headers-azure - 6.5.0.1017.19 linux-image-azure - 6.5.0.1017.19 linux-image-azure-fde - 6.5.0.1017.19 linux-modules-extra-azure - 6.5.0.1017.19 linux-modules-ipu6-azure - 6.5.0.1017.19 linux-modules-ivsc-azure - 6.5.0.1017.19 linux-modules-iwlwifi-azure - 6.5.0.1017.19 linux-tools-azure - 6.5.0.1017.19 No subscription required linux-headers-oracle - 6.5.0.1019.21 linux-headers-oracle-64k - 6.5.0.1019.21 linux-image-oracle - 6.5.0.1019.21 linux-image-oracle-64k - 6.5.0.1019.21 linux-modules-iwlwifi-oracle - 6.5.0.1019.21 linux-oracle - 6.5.0.1019.21 linux-oracle-64k - 6.5.0.1019.21 linux-tools-oracle - 6.5.0.1019.21 linux-tools-oracle-64k - 6.5.0.1019.21 No subscription required linux-cloud-tools-generic - 6.5.0.26.26 linux-cloud-tools-generic-hwe-22.04 - 6.5.0.26.26 linux-cloud-tools-generic-hwe-22.04-edge - 6.5.0.26.26 linux-cloud-tools-virtual - 6.5.0.26.26 linux-cloud-tools-virtual-hwe-22.04 - 6.5.0.26.26 linux-cloud-tools-virtual-hwe-22.04-edge - 6.5.0.26.26 linux-crashdump - 6.5.0.26.26 linux-generic - 6.5.0.26.26 linux-generic-64k - 6.5.0.26.26 linux-generic-64k-hwe-22.04 - 6.5.0.26.26 linux-generic-64k-hwe-22.04-edge - 6.5.0.26.26 linux-generic-hwe-22.04 - 6.5.0.26.26 linux-generic-hwe-22.04-edge - 6.5.0.26.26 linux-generic-lpae - 6.5.0.26.26 linux-headers-generic - 6.5.0.26.26 linux-headers-generic-64k - 6.5.0.26.26 linux-headers-generic-64k-hwe-22.04 - 6.5.0.26.26 linux-headers-generic-64k-hwe-22.04-edge - 6.5.0.26.26 linux-headers-generic-hwe-22.04 - 6.5.0.26.26 linux-headers-generic-hwe-22.04-edge - 6.5.0.26.26 linux-headers-generic-lpae - 6.5.0.26.26 linux-headers-kvm - 6.5.0.26.26 linux-headers-oem-20.04 - 6.5.0.26.26 linux-headers-oem-20.04b - 6.5.0.26.26 linux-headers-oem-20.04c - 6.5.0.26.26 linux-headers-oem-20.04d - 6.5.0.26.26 linux-headers-oem-22.04 - 6.5.0.26.26 linux-headers-virtual - 6.5.0.26.26 linux-headers-virtual-hwe-22.04 - 6.5.0.26.26 linux-headers-virtual-hwe-22.04-edge - 6.5.0.26.26 linux-image-extra-virtual - 6.5.0.26.26 linux-image-extra-virtual-hwe-22.04 - 6.5.0.26.26 linux-image-extra-virtual-hwe-22.04-edge - 6.5.0.26.26 linux-image-generic - 6.5.0.26.26 linux-image-generic-64k - 6.5.0.26.26 linux-image-generic-64k-hwe-22.04 - 6.5.0.26.26 linux-image-generic-64k-hwe-22.04-edge - 6.5.0.26.26 linux-image-generic-hwe-22.04 - 6.5.0.26.26 linux-image-generic-hwe-22.04-edge - 6.5.0.26.26 linux-image-generic-lpae - 6.5.0.26.26 linux-image-kvm - 6.5.0.26.26 linux-image-oem-20.04 - 6.5.0.26.26 linux-image-oem-20.04b - 6.5.0.26.26 linux-image-oem-20.04c - 6.5.0.26.26 linux-image-oem-20.04d - 6.5.0.26.26 linux-image-oem-22.04 - 6.5.0.26.26 linux-image-uc-generic - 6.5.0.26.26 linux-image-uc-generic-hwe-22.04 - 6.5.0.26.26 linux-image-uc-generic-hwe-22.04-edge - 6.5.0.26.26 linux-image-virtual - 6.5.0.26.26 linux-image-virtual-hwe-22.04 - 6.5.0.26.26 linux-image-virtual-hwe-22.04-edge - 6.5.0.26.26 linux-kvm - 6.5.0.26.26 linux-modules-ipu6-generic - 6.5.0.26.26 linux-modules-ipu6-generic-hwe-22.04 - 6.5.0.26.26 linux-modules-ipu6-generic-hwe-22.04-edge - 6.5.0.26.26 linux-modules-ipu6-oem-22.04 - 6.5.0.26.26 linux-modules-ivsc-generic - 6.5.0.26.26 linux-modules-ivsc-generic-hwe-22.04 - 6.5.0.26.26 linux-modules-ivsc-generic-hwe-22.04-edge - 6.5.0.26.26 linux-modules-ivsc-oem-22.04 - 6.5.0.26.26 linux-modules-iwlwifi-generic - 6.5.0.26.26 linux-modules-iwlwifi-generic-hwe-22.04 - 6.5.0.26.26 linux-modules-iwlwifi-generic-hwe-22.04-edge - 6.5.0.26.26 linux-modules-iwlwifi-oem-20.04 - 6.5.0.26.26 linux-modules-iwlwifi-oem-20.04d - 6.5.0.26.26 linux-modules-iwlwifi-oem-22.04 - 6.5.0.26.26 linux-oem-20.04 - 6.5.0.26.26 linux-oem-20.04b - 6.5.0.26.26 linux-oem-20.04c - 6.5.0.26.26 linux-oem-20.04d - 6.5.0.26.26 linux-oem-22.04 - 6.5.0.26.26 linux-source - 6.5.0.26.26 linux-tools-generic - 6.5.0.26.26 linux-tools-generic-64k - 6.5.0.26.26 linux-tools-generic-64k-hwe-22.04 - 6.5.0.26.26 linux-tools-generic-64k-hwe-22.04-edge - 6.5.0.26.26 linux-tools-generic-hwe-22.04 - 6.5.0.26.26 linux-tools-generic-hwe-22.04-edge - 6.5.0.26.26 linux-tools-generic-lpae - 6.5.0.26.26 linux-tools-kvm - 6.5.0.26.26 linux-tools-oem-20.04 - 6.5.0.26.26 linux-tools-oem-20.04b - 6.5.0.26.26 linux-tools-oem-20.04c - 6.5.0.26.26 linux-tools-oem-20.04d - 6.5.0.26.26 linux-tools-oem-22.04 - 6.5.0.26.26 linux-tools-virtual - 6.5.0.26.26 linux-tools-virtual-hwe-22.04 - 6.5.0.26.26 linux-tools-virtual-hwe-22.04-edge - 6.5.0.26.26 linux-virtual - 6.5.0.26.26 linux-virtual-hwe-22.04 - 6.5.0.26.26 linux-virtual-hwe-22.04-edge - 6.5.0.26.26 No subscription required linux-cloud-tools-lowlatency - 6.5.0.26.26.17 linux-cloud-tools-lowlatency-hwe-20.04 - 6.5.0.26.26.17 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.5.0.26.26.17 linux-cloud-tools-lowlatency-hwe-22.04 - 6.5.0.26.26.17 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.5.0.26.26.17 linux-headers-lowlatency - 6.5.0.26.26.17 linux-headers-lowlatency-64k - 6.5.0.26.26.17 linux-headers-lowlatency-64k-hwe-20.04 - 6.5.0.26.26.17 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.5.0.26.26.17 linux-headers-lowlatency-64k-hwe-22.04 - 6.5.0.26.26.17 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.5.0.26.26.17 linux-headers-lowlatency-hwe-20.04 - 6.5.0.26.26.17 linux-headers-lowlatency-hwe-20.04-edge - 6.5.0.26.26.17 linux-headers-lowlatency-hwe-22.04 - 6.5.0.26.26.17 linux-headers-lowlatency-hwe-22.04-edge - 6.5.0.26.26.17 linux-image-lowlatency - 6.5.0.26.26.17 linux-image-lowlatency-64k - 6.5.0.26.26.17 linux-image-lowlatency-64k-hwe-20.04 - 6.5.0.26.26.17 linux-image-lowlatency-64k-hwe-20.04-edge - 6.5.0.26.26.17 linux-image-lowlatency-64k-hwe-22.04 - 6.5.0.26.26.17 linux-image-lowlatency-64k-hwe-22.04-edge - 6.5.0.26.26.17 linux-image-lowlatency-hwe-20.04 - 6.5.0.26.26.17 linux-image-lowlatency-hwe-20.04-edge - 6.5.0.26.26.17 linux-image-lowlatency-hwe-22.04 - 6.5.0.26.26.17 linux-image-lowlatency-hwe-22.04-edge - 6.5.0.26.26.17 linux-lowlatency - 6.5.0.26.26.17 linux-lowlatency-64k - 6.5.0.26.26.17 linux-lowlatency-64k-hwe-20.04 - 6.5.0.26.26.17 linux-lowlatency-64k-hwe-20.04-edge - 6.5.0.26.26.17 linux-lowlatency-64k-hwe-22.04 - 6.5.0.26.26.17 linux-lowlatency-64k-hwe-22.04-edge - 6.5.0.26.26.17 linux-lowlatency-hwe-20.04 - 6.5.0.26.26.17 linux-lowlatency-hwe-20.04-edge - 6.5.0.26.26.17 linux-lowlatency-hwe-22.04 - 6.5.0.26.26.17 linux-lowlatency-hwe-22.04-edge - 6.5.0.26.26.17 linux-modules-iwlwifi-lowlatency - 6.5.0.26.26.17 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.5.0.26.26.17 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.5.0.26.26.17 linux-tools-lowlatency - 6.5.0.26.26.17 linux-tools-lowlatency-64k - 6.5.0.26.26.17 linux-tools-lowlatency-64k-hwe-20.04 - 6.5.0.26.26.17 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.5.0.26.26.17 linux-tools-lowlatency-64k-hwe-22.04 - 6.5.0.26.26.17 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.5.0.26.26.17 linux-tools-lowlatency-hwe-20.04 - 6.5.0.26.26.17 linux-tools-lowlatency-hwe-20.04-edge - 6.5.0.26.26.17 linux-tools-lowlatency-hwe-22.04 - 6.5.0.26.26.17 linux-tools-lowlatency-hwe-22.04-edge - 6.5.0.26.26.17 No subscription required High CVE-2024-1085 CVE-2024-1086 CVE-2024-26597 CVE-2024-26599 USN-6707-2 -- Linux kernel (ARM laptop) vulnerabilities Ubuntu 23.10 Lonial Con discovered that the netfilter subsystem in the Linux kernel did not properly handle element deactivation in certain cases, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2024-1085) Notselwyn discovered that the netfilter subsystem in the Linux kernel did not properly handle verdict parameters in certain cases, leading to a use- after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2024-1086) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Network drivers; - PWM drivers; (CVE-2024-26597, CVE-2024-26599) Update Instructions: Run `sudo pro fix USN-6707-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.5.0-1012-laptop - 6.5.0-1012.15 linux-headers-6.5.0-1012-laptop - 6.5.0-1012.15 linux-image-6.5.0-1012-laptop - 6.5.0-1012.15 linux-laptop-headers-6.5.0-1012 - 6.5.0-1012.15 linux-laptop-tools-6.5.0-1012 - 6.5.0-1012.15 linux-modules-6.5.0-1012-laptop - 6.5.0-1012.15 linux-tools-6.5.0-1012-laptop - 6.5.0-1012.15 No subscription required linux-headers-laptop-23.10 - 6.5.0.1012.15 linux-image-laptop-23.10 - 6.5.0.1012.15 linux-laptop-23.10 - 6.5.0.1012.15 linux-tools-laptop-23.10 - 6.5.0.1012.15 No subscription required High CVE-2024-1085 CVE-2024-1086 CVE-2024-26597 CVE-2024-26599 USN-6707-3 -- Linux kernel (AWS) vulnerabilities Ubuntu 23.10 Lonial Con discovered that the netfilter subsystem in the Linux kernel did not properly handle element deactivation in certain cases, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2024-1085) Notselwyn discovered that the netfilter subsystem in the Linux kernel did not properly handle verdict parameters in certain cases, leading to a use- after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2024-1086) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Network drivers; - PWM drivers; (CVE-2024-26597, CVE-2024-26599) Update Instructions: Run `sudo pro fix USN-6707-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-aws-cloud-tools-6.5.0-1016 - 6.5.0-1016.16 linux-aws-headers-6.5.0-1016 - 6.5.0-1016.16 linux-aws-tools-6.5.0-1016 - 6.5.0-1016.16 linux-buildinfo-6.5.0-1016-aws - 6.5.0-1016.16 linux-cloud-tools-6.5.0-1016-aws - 6.5.0-1016.16 linux-headers-6.5.0-1016-aws - 6.5.0-1016.16 linux-image-6.5.0-1016-aws - 6.5.0-1016.16 linux-image-unsigned-6.5.0-1016-aws - 6.5.0-1016.16 linux-modules-6.5.0-1016-aws - 6.5.0-1016.16 linux-modules-extra-6.5.0-1016-aws - 6.5.0-1016.16 linux-tools-6.5.0-1016-aws - 6.5.0-1016.16 No subscription required linux-aws - 6.5.0.1016.16 linux-headers-aws - 6.5.0.1016.16 linux-image-aws - 6.5.0.1016.16 linux-modules-extra-aws - 6.5.0.1016.16 linux-tools-aws - 6.5.0.1016.16 No subscription required High CVE-2024-1085 CVE-2024-1086 CVE-2024-26597 CVE-2024-26599 USN-6713-1 -- QPDF vulnerability Ubuntu 23.10 It was discovered that QPDF incorrectly handled certain memory operations when decoding JSON files. If a user or automated system were tricked into processing a specially crafted JSON file, QPDF could be made to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6713-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libqpdf-dev - 11.5.0-1ubuntu1.1 libqpdf29 - 11.5.0-1ubuntu1.1 qpdf - 11.5.0-1ubuntu1.1 No subscription required Medium CVE-2024-24246 USN-6714-1 -- Debian Goodies vulnerability Ubuntu 23.10 It was discovered that debmany in Debian Goodies incorrectly handled certain deb files. An attacker could possibly use this issue to execute arbitrary shell commands. Update Instructions: Run `sudo pro fix USN-6714-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: debian-goodies - 0.88.1ubuntu1.2 No subscription required Low CVE-2023-27635 USN-6715-1 -- unixODBC vulnerability Ubuntu 23.10 It was discovered that unixODBC incorrectly handled certain bytes. An attacker could use this issue to execute arbitrary code or cause a crash. Update Instructions: Run `sudo pro fix USN-6715-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libodbc2 - 2.3.12-1ubuntu0.23.10.1 libodbccr2 - 2.3.12-1ubuntu0.23.10.1 libodbcinst2 - 2.3.12-1ubuntu0.23.10.1 odbcinst - 2.3.12-1ubuntu0.23.10.1 unixodbc - 2.3.12-1ubuntu0.23.10.1 unixodbc-common - 2.3.12-1ubuntu0.23.10.1 unixodbc-dev - 2.3.12-1ubuntu0.23.10.1 No subscription required Medium CVE-2024-1013 USN-6717-1 -- Thunderbird vulnerabilities Ubuntu 23.10 Multiple security issues were discovered in Thunderbird. If a user were tricked into opening a specially crafted website in a browsing context, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information, bypass security restrictions, cross-site tracing, or execute arbitrary code. (CVE-2024-0743, CVE-2024-2611, CVE-2024-2614) Hubert Kario discovered that Thunderbird had a timing side-channel when performing RSA decryption. A remote attacker could possibly use this issue to recover sensitive information. (CVE-2023-5388) Gary Kwong discovered that Thunderbird incorrectly updated return registers for JIT code on Armv7-A systems. An attacker could potentially exploit this issue to execute arbitrary code. (CVE-2024-2607) Ronald Crane discovered that Thunderbird did not properly manage memory during character encoding. An attacker could potentially exploit this issue to cause a denial of service. (CVE-2024-2608) Georg Felber and Marco Squarcina discovered that Thunderbird incorrectly handled html and body tags. An attacker who was able to inject markup into a page otherwise protected by a Content Security Policy may have been able obtain sensitive information. (CVE-2024-2610) Ronald Crane discovered a use-after-free in Thunderbird when handling code in SafeRefPtr. An attacker could potentially exploit this issue to cause a denial of service, or execute arbitrary code. (CVE-2024-2612) Ryan VanderMeulen and Dan Minor discovered that Thunderbird did not properly manage memory conditions in ICU. An attacker could potentially exploit this issue to cause a denial of service. (CVE-2024-2616) Update Instructions: Run `sudo pro fix USN-6717-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: thunderbird - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-dev - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-gnome-support - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-af - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-ar - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-ast - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-be - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-bg - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-bn - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-bn-bd - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-br - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-ca - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-cak - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-cs - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-cy - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-da - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-de - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-dsb - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-el - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-en - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-en-gb - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-en-us - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-es - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-es-ar - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-es-es - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-et - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-eu - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-fa - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-fi - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-fr - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-fy - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-fy-nl - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-ga - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-ga-ie - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-gd - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-gl - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-he - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-hr - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-hsb - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-hu - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-hy - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-id - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-is - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-it - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-ja - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-ka - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-kab - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-kk - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-ko - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-lt - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-lv - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-mk - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-ms - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-nb - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-nb-no - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-nl - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-nn - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-nn-no - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-pa - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-pa-in - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-pl - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-pt - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-pt-br - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-pt-pt - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-rm - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-ro - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-ru - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-si - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-sk - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-sl - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-sq - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-sr - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-sv - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-sv-se - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-ta - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-ta-lk - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-th - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-tr - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-uk - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-uz - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-vi - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-zh-cn - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-zh-hans - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-zh-hant - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-locale-zh-tw - 1:115.9.0+build1-0ubuntu0.23.10.1 thunderbird-mozsymbols - 1:115.9.0+build1-0ubuntu0.23.10.1 xul-ext-calendar-timezones - 1:115.9.0+build1-0ubuntu0.23.10.1 xul-ext-gdata-provider - 1:115.9.0+build1-0ubuntu0.23.10.1 xul-ext-lightning - 1:115.9.0+build1-0ubuntu0.23.10.1 No subscription required Medium CVE-2024-0743 CVE-2023-5388 CVE-2024-2607 CVE-2024-2608 CVE-2024-2610 CVE-2024-2611 CVE-2024-2612 CVE-2024-2614 CVE-2024-2616 USN-6718-1 -- curl vulnerabilities Ubuntu 23.10 Dan Fandrich discovered that curl would incorrectly use the default set of protocols when a parameter option disabled all protocols without adding any, contrary to expectations. This issue only affected Ubuntu 23.10. (CVE-2024-2004) It was discovered that curl incorrectly handled memory when limiting the amount of headers when HTTP/2 server push is allowed. A remote attacker could possibly use this issue to cause curl to consume resources, leading to a denial of service. (CVE-2024-2398) Update Instructions: Run `sudo pro fix USN-6718-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: curl - 8.2.1-1ubuntu3.3 libcurl3-gnutls - 8.2.1-1ubuntu3.3 libcurl3-nss - 8.2.1-1ubuntu3.3 libcurl4 - 8.2.1-1ubuntu3.3 libcurl4-doc - 8.2.1-1ubuntu3.3 libcurl4-gnutls-dev - 8.2.1-1ubuntu3.3 libcurl4-nss-dev - 8.2.1-1ubuntu3.3 libcurl4-openssl-dev - 8.2.1-1ubuntu3.3 No subscription required Medium CVE-2024-2004 CVE-2024-2398 USN-6719-1 -- util-linux vulnerability Ubuntu 23.10 Skyler Ferrante discovered that the util-linux wall command did not filter escape sequences from command line arguments. A local attacker could possibly use this issue to obtain sensitive information. Update Instructions: Run `sudo pro fix USN-6719-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: bsdutils - 1:2.39.1-4ubuntu2.1 No subscription required bsdextrautils - 2.39.1-4ubuntu2.1 eject - 2.39.1-4ubuntu2.1 fdisk - 2.39.1-4ubuntu2.1 libblkid-dev - 2.39.1-4ubuntu2.1 libblkid1 - 2.39.1-4ubuntu2.1 libfdisk-dev - 2.39.1-4ubuntu2.1 libfdisk1 - 2.39.1-4ubuntu2.1 libmount-dev - 2.39.1-4ubuntu2.1 libmount1 - 2.39.1-4ubuntu2.1 libsmartcols-dev - 2.39.1-4ubuntu2.1 libsmartcols1 - 2.39.1-4ubuntu2.1 libuuid1 - 2.39.1-4ubuntu2.1 mount - 2.39.1-4ubuntu2.1 rfkill - 2.39.1-4ubuntu2.1 util-linux - 2.39.1-4ubuntu2.1 util-linux-extra - 2.39.1-4ubuntu2.1 util-linux-locales - 2.39.1-4ubuntu2.1 uuid-dev - 2.39.1-4ubuntu2.1 uuid-runtime - 2.39.1-4ubuntu2.1 No subscription required Medium CVE-2024-28085 USN-6719-2 -- util-linux vulnerability Ubuntu 23.10 USN-6719-1 fixed a vulnerability in util-linux. Unfortunately, it was discovered that the fix did not fully address the issue. This update removes the setgid permission bit from the wall and write utilities. Original advisory details: Skyler Ferrante discovered that the util-linux wall command did not filter escape sequences from command line arguments. A local attacker could possibly use this issue to obtain sensitive information. Update Instructions: Run `sudo pro fix USN-6719-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: bsdutils - 1:2.39.1-4ubuntu2.2 No subscription required bsdextrautils - 2.39.1-4ubuntu2.2 eject - 2.39.1-4ubuntu2.2 fdisk - 2.39.1-4ubuntu2.2 libblkid-dev - 2.39.1-4ubuntu2.2 libblkid1 - 2.39.1-4ubuntu2.2 libfdisk-dev - 2.39.1-4ubuntu2.2 libfdisk1 - 2.39.1-4ubuntu2.2 libmount-dev - 2.39.1-4ubuntu2.2 libmount1 - 2.39.1-4ubuntu2.2 libsmartcols-dev - 2.39.1-4ubuntu2.2 libsmartcols1 - 2.39.1-4ubuntu2.2 libuuid1 - 2.39.1-4ubuntu2.2 mount - 2.39.1-4ubuntu2.2 rfkill - 2.39.1-4ubuntu2.2 util-linux - 2.39.1-4ubuntu2.2 util-linux-extra - 2.39.1-4ubuntu2.2 util-linux-locales - 2.39.1-4ubuntu2.2 uuid-dev - 2.39.1-4ubuntu2.2 uuid-runtime - 2.39.1-4ubuntu2.2 No subscription required Medium CVE-2024-28085 USN-6721-1 -- X.Org X Server vulnerabilities Ubuntu 23.10 It was discovered that X.Org X Server incorrectly handled certain data. An attacker could possibly use this issue to expose sensitive information. (CVE-2024-31080, CVE-2024-31081, CVE-2024-31082) It was discovered that X.Org X Server incorrectly handled certain glyphs. An attacker could possibly use this issue to cause a crash or expose sensitive information. (CVE-2024-31083) Update Instructions: Run `sudo pro fix USN-6721-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: xnest - 2:21.1.7-3ubuntu2.8 xorg-server-source - 2:21.1.7-3ubuntu2.8 xserver-common - 2:21.1.7-3ubuntu2.8 xserver-xephyr - 2:21.1.7-3ubuntu2.8 xserver-xorg-core - 2:21.1.7-3ubuntu2.8 xserver-xorg-dev - 2:21.1.7-3ubuntu2.8 xserver-xorg-legacy - 2:21.1.7-3ubuntu2.8 xvfb - 2:21.1.7-3ubuntu2.8 No subscription required xwayland - 2:23.2.0-1ubuntu0.5 No subscription required Medium CVE-2024-31080 CVE-2024-31081 CVE-2024-31082 CVE-2024-31083 USN-6721-2 -- X.Org X Server regression Ubuntu 23.10 USN-6721-1 fixed vulnerabilities in X.Org X Server. That fix was incomplete resulting in a regression. This update fixes the problem. We apologize for the inconvenience. Original advisory details: It was discovered that X.Org X Server incorrectly handled certain data. An attacker could possibly use this issue to expose sensitive information. (CVE-2024-31080, CVE-2024-31081, CVE-2024-31082) It was discovered that X.Org X Server incorrectly handled certain glyphs. An attacker could possibly use this issue to cause a crash or expose sensitive information. (CVE-2024-31083) Update Instructions: Run `sudo pro fix USN-6721-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: xnest - 2:21.1.7-3ubuntu2.9 xorg-server-source - 2:21.1.7-3ubuntu2.9 xserver-common - 2:21.1.7-3ubuntu2.9 xserver-xephyr - 2:21.1.7-3ubuntu2.9 xserver-xorg-core - 2:21.1.7-3ubuntu2.9 xserver-xorg-dev - 2:21.1.7-3ubuntu2.9 xserver-xorg-legacy - 2:21.1.7-3ubuntu2.9 xvfb - 2:21.1.7-3ubuntu2.9 No subscription required xwayland - 2:23.2.0-1ubuntu0.6 No subscription required None https://launchpad.net/bugs/2060354 USN-6724-1 -- Linux kernel vulnerabilities Ubuntu 23.10 Pratyush Yadav discovered that the Xen network backend implementation in the Linux kernel did not properly handle zero length data request, leading to a null pointer dereference vulnerability. An attacker in a guest VM could possibly use this to cause a denial of service (host domain crash). (CVE-2023-46838) It was discovered that the Habana's AI Processors driver in the Linux kernel did not properly initialize certain data structures before passing them to user space. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2023-50431) It was discovered that the device mapper driver in the Linux kernel did not properly validate target size during certain memory allocations. A local attacker could use this to cause a denial of service (system crash). (CVE-2023-52429, CVE-2024-23851) It was discovered that the CIFS network file system implementation in the Linux kernel did not properly validate certain SMB messages, leading to an out-of-bounds read vulnerability. An attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information. (CVE-2023-6610) Yang Chaoming discovered that the KSMBD implementation in the Linux kernel did not properly validate request buffer sizes, leading to an out-of-bounds read vulnerability. An attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information. (CVE-2024-22705) Chenyuan Yang discovered that the btrfs file system in the Linux kernel did not properly handle read operations on newly created subvolumes in certain conditions. A local attacker could use this to cause a denial of service (system crash). (CVE-2024-23850) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Android drivers; - Userspace I/O drivers; - F2FS file system; - SMB network file system; - Networking core; (CVE-2023-52434, CVE-2023-52436, CVE-2023-52435, CVE-2023-52439, CVE-2023-52438) Update Instructions: Run `sudo pro fix USN-6724-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.5.0-1011-starfive - 6.5.0-1011.12 linux-headers-6.5.0-1011-starfive - 6.5.0-1011.12 linux-image-6.5.0-1011-starfive - 6.5.0-1011.12 linux-modules-6.5.0-1011-starfive - 6.5.0-1011.12 linux-modules-extra-6.5.0-1011-starfive - 6.5.0-1011.12 linux-starfive-headers-6.5.0-1011 - 6.5.0-1011.12 linux-starfive-tools-6.5.0-1011 - 6.5.0-1011.12 linux-tools-6.5.0-1011-starfive - 6.5.0-1011.12 No subscription required linux-buildinfo-6.5.0-1013-laptop - 6.5.0-1013.16 linux-headers-6.5.0-1013-laptop - 6.5.0-1013.16 linux-image-6.5.0-1013-laptop - 6.5.0-1013.16 linux-laptop-headers-6.5.0-1013 - 6.5.0-1013.16 linux-laptop-tools-6.5.0-1013 - 6.5.0-1013.16 linux-modules-6.5.0-1013-laptop - 6.5.0-1013.16 linux-tools-6.5.0-1013-laptop - 6.5.0-1013.16 No subscription required linux-aws-cloud-tools-6.5.0-1017 - 6.5.0-1017.17 linux-aws-headers-6.5.0-1017 - 6.5.0-1017.17 linux-aws-tools-6.5.0-1017 - 6.5.0-1017.17 linux-buildinfo-6.5.0-1017-aws - 6.5.0-1017.17 linux-buildinfo-6.5.0-1017-gcp - 6.5.0-1017.17 linux-cloud-tools-6.5.0-1017-aws - 6.5.0-1017.17 linux-gcp-headers-6.5.0-1017 - 6.5.0-1017.17 linux-gcp-tools-6.5.0-1017 - 6.5.0-1017.17 linux-headers-6.5.0-1017-aws - 6.5.0-1017.17 linux-headers-6.5.0-1017-gcp - 6.5.0-1017.17 linux-image-6.5.0-1017-aws - 6.5.0-1017.17 linux-image-6.5.0-1017-gcp - 6.5.0-1017.17 linux-image-unsigned-6.5.0-1017-aws - 6.5.0-1017.17 linux-image-unsigned-6.5.0-1017-gcp - 6.5.0-1017.17 linux-modules-6.5.0-1017-aws - 6.5.0-1017.17 linux-modules-6.5.0-1017-gcp - 6.5.0-1017.17 linux-modules-extra-6.5.0-1017-aws - 6.5.0-1017.17 linux-modules-extra-6.5.0-1017-gcp - 6.5.0-1017.17 linux-modules-iwlwifi-6.5.0-1017-gcp - 6.5.0-1017.17 linux-tools-6.5.0-1017-aws - 6.5.0-1017.17 linux-tools-6.5.0-1017-gcp - 6.5.0-1017.17 No subscription required linux-azure-cloud-tools-6.5.0-1018 - 6.5.0-1018.19 linux-azure-headers-6.5.0-1018 - 6.5.0-1018.19 linux-azure-tools-6.5.0-1018 - 6.5.0-1018.19 linux-buildinfo-6.5.0-1018-azure - 6.5.0-1018.19 linux-cloud-tools-6.5.0-1018-azure - 6.5.0-1018.19 linux-headers-6.5.0-1018-azure - 6.5.0-1018.19 linux-image-6.5.0-1018-azure - 6.5.0-1018.19 linux-image-6.5.0-1018-azure-fde - 6.5.0-1018.19 linux-image-unsigned-6.5.0-1018-azure - 6.5.0-1018.19 linux-modules-6.5.0-1018-azure - 6.5.0-1018.19 linux-modules-extra-6.5.0-1018-azure - 6.5.0-1018.19 linux-modules-iwlwifi-6.5.0-1018-azure - 6.5.0-1018.19 linux-tools-6.5.0-1018-azure - 6.5.0-1018.19 No subscription required linux-buildinfo-6.5.0-1020-oracle - 6.5.0-1020.20 linux-buildinfo-6.5.0-1020-oracle-64k - 6.5.0-1020.20 linux-headers-6.5.0-1020-oracle - 6.5.0-1020.20 linux-headers-6.5.0-1020-oracle-64k - 6.5.0-1020.20 linux-image-6.5.0-1020-oracle - 6.5.0-1020.20 linux-image-6.5.0-1020-oracle-64k - 6.5.0-1020.20 linux-image-unsigned-6.5.0-1020-oracle - 6.5.0-1020.20 linux-image-unsigned-6.5.0-1020-oracle-64k - 6.5.0-1020.20 linux-modules-6.5.0-1020-oracle - 6.5.0-1020.20 linux-modules-6.5.0-1020-oracle-64k - 6.5.0-1020.20 linux-modules-extra-6.5.0-1020-oracle - 6.5.0-1020.20 linux-modules-extra-6.5.0-1020-oracle-64k - 6.5.0-1020.20 linux-modules-iwlwifi-6.5.0-1020-oracle - 6.5.0-1020.20 linux-oracle-headers-6.5.0-1020 - 6.5.0-1020.20 linux-oracle-tools-6.5.0-1020 - 6.5.0-1020.20 linux-tools-6.5.0-1020-oracle - 6.5.0-1020.20 linux-tools-6.5.0-1020-oracle-64k - 6.5.0-1020.20 No subscription required linux-buildinfo-6.5.0-27-generic - 6.5.0-27.28 linux-buildinfo-6.5.0-27-generic-64k - 6.5.0-27.28 linux-cloud-tools-6.5.0-27 - 6.5.0-27.28 linux-cloud-tools-6.5.0-27-generic - 6.5.0-27.28 linux-cloud-tools-common - 6.5.0-27.28 linux-doc - 6.5.0-27.28 linux-headers-6.5.0-27 - 6.5.0-27.28 linux-headers-6.5.0-27-generic - 6.5.0-27.28 linux-headers-6.5.0-27-generic-64k - 6.5.0-27.28 linux-image-6.5.0-27-generic - 6.5.0-27.28 linux-image-6.5.0-27-generic-64k - 6.5.0-27.28 linux-image-uc-6.5.0-27-generic - 6.5.0-27.28 linux-image-uc-6.5.0-27-generic-64k - 6.5.0-27.28 linux-image-unsigned-6.5.0-27-generic - 6.5.0-27.28 linux-image-unsigned-6.5.0-27-generic-64k - 6.5.0-27.28 linux-lib-rust-6.5.0-27-generic - 6.5.0-27.28 linux-libc-dev - 6.5.0-27.28 linux-modules-6.5.0-27-generic - 6.5.0-27.28 linux-modules-6.5.0-27-generic-64k - 6.5.0-27.28 linux-modules-extra-6.5.0-27-generic - 6.5.0-27.28 linux-modules-ipu6-6.5.0-27-generic - 6.5.0-27.28 linux-modules-ivsc-6.5.0-27-generic - 6.5.0-27.28 linux-modules-iwlwifi-6.5.0-27-generic - 6.5.0-27.28 linux-source-6.5.0 - 6.5.0-27.28 linux-tools-6.5.0-27 - 6.5.0-27.28 linux-tools-6.5.0-27-generic - 6.5.0-27.28 linux-tools-6.5.0-27-generic-64k - 6.5.0-27.28 linux-tools-common - 6.5.0-27.28 linux-tools-host - 6.5.0-27.28 No subscription required linux-buildinfo-6.5.0-27-lowlatency - 6.5.0-27.28.1 linux-buildinfo-6.5.0-27-lowlatency-64k - 6.5.0-27.28.1 linux-cloud-tools-6.5.0-27-lowlatency - 6.5.0-27.28.1 linux-headers-6.5.0-27-lowlatency - 6.5.0-27.28.1 linux-headers-6.5.0-27-lowlatency-64k - 6.5.0-27.28.1 linux-image-6.5.0-27-lowlatency - 6.5.0-27.28.1 linux-image-6.5.0-27-lowlatency-64k - 6.5.0-27.28.1 linux-image-unsigned-6.5.0-27-lowlatency - 6.5.0-27.28.1 linux-image-unsigned-6.5.0-27-lowlatency-64k - 6.5.0-27.28.1 linux-lowlatency-cloud-tools-6.5.0-27 - 6.5.0-27.28.1 linux-lowlatency-cloud-tools-common - 6.5.0-27.28.1 linux-lowlatency-headers-6.5.0-27 - 6.5.0-27.28.1 linux-lowlatency-lib-rust-6.5.0-27-lowlatency - 6.5.0-27.28.1 linux-lowlatency-tools-6.5.0-27 - 6.5.0-27.28.1 linux-lowlatency-tools-common - 6.5.0-27.28.1 linux-lowlatency-tools-host - 6.5.0-27.28.1 linux-modules-6.5.0-27-lowlatency - 6.5.0-27.28.1 linux-modules-6.5.0-27-lowlatency-64k - 6.5.0-27.28.1 linux-modules-iwlwifi-6.5.0-27-lowlatency - 6.5.0-27.28.1 linux-tools-6.5.0-27-lowlatency - 6.5.0-27.28.1 linux-tools-6.5.0-27-lowlatency-64k - 6.5.0-27.28.1 No subscription required linux-headers-starfive - 6.5.0.1011.13 linux-image-starfive - 6.5.0.1011.13 linux-starfive - 6.5.0.1011.13 linux-tools-starfive - 6.5.0.1011.13 No subscription required linux-headers-laptop-23.10 - 6.5.0.1013.16 linux-image-laptop-23.10 - 6.5.0.1013.16 linux-laptop-23.10 - 6.5.0.1013.16 linux-tools-laptop-23.10 - 6.5.0.1013.16 No subscription required linux-aws - 6.5.0.1017.17 linux-gcp - 6.5.0.1017.17 linux-headers-aws - 6.5.0.1017.17 linux-headers-gcp - 6.5.0.1017.17 linux-image-aws - 6.5.0.1017.17 linux-image-gcp - 6.5.0.1017.17 linux-modules-extra-aws - 6.5.0.1017.17 linux-modules-extra-gcp - 6.5.0.1017.17 linux-modules-iwlwifi-gcp - 6.5.0.1017.17 linux-tools-aws - 6.5.0.1017.17 linux-tools-gcp - 6.5.0.1017.17 No subscription required linux-azure - 6.5.0.1018.22 linux-azure-fde - 6.5.0.1018.22 linux-cloud-tools-azure - 6.5.0.1018.22 linux-headers-azure - 6.5.0.1018.22 linux-image-azure - 6.5.0.1018.22 linux-image-azure-fde - 6.5.0.1018.22 linux-modules-extra-azure - 6.5.0.1018.22 linux-modules-iwlwifi-azure - 6.5.0.1018.22 linux-tools-azure - 6.5.0.1018.22 No subscription required linux-headers-oracle - 6.5.0.1020.22 linux-headers-oracle-64k - 6.5.0.1020.22 linux-image-oracle - 6.5.0.1020.22 linux-image-oracle-64k - 6.5.0.1020.22 linux-modules-iwlwifi-oracle - 6.5.0.1020.22 linux-oracle - 6.5.0.1020.22 linux-oracle-64k - 6.5.0.1020.22 linux-tools-oracle - 6.5.0.1020.22 linux-tools-oracle-64k - 6.5.0.1020.22 No subscription required linux-cloud-tools-generic - 6.5.0.27.27 linux-cloud-tools-generic-hwe-22.04 - 6.5.0.27.27 linux-cloud-tools-generic-hwe-22.04-edge - 6.5.0.27.27 linux-cloud-tools-virtual - 6.5.0.27.27 linux-cloud-tools-virtual-hwe-22.04 - 6.5.0.27.27 linux-cloud-tools-virtual-hwe-22.04-edge - 6.5.0.27.27 linux-crashdump - 6.5.0.27.27 linux-generic - 6.5.0.27.27 linux-generic-64k - 6.5.0.27.27 linux-generic-64k-hwe-22.04 - 6.5.0.27.27 linux-generic-64k-hwe-22.04-edge - 6.5.0.27.27 linux-generic-hwe-22.04 - 6.5.0.27.27 linux-generic-hwe-22.04-edge - 6.5.0.27.27 linux-generic-lpae - 6.5.0.27.27 linux-headers-generic - 6.5.0.27.27 linux-headers-generic-64k - 6.5.0.27.27 linux-headers-generic-64k-hwe-22.04 - 6.5.0.27.27 linux-headers-generic-64k-hwe-22.04-edge - 6.5.0.27.27 linux-headers-generic-hwe-22.04 - 6.5.0.27.27 linux-headers-generic-hwe-22.04-edge - 6.5.0.27.27 linux-headers-generic-lpae - 6.5.0.27.27 linux-headers-kvm - 6.5.0.27.27 linux-headers-oem-20.04 - 6.5.0.27.27 linux-headers-oem-20.04b - 6.5.0.27.27 linux-headers-oem-20.04c - 6.5.0.27.27 linux-headers-oem-20.04d - 6.5.0.27.27 linux-headers-oem-22.04 - 6.5.0.27.27 linux-headers-virtual - 6.5.0.27.27 linux-headers-virtual-hwe-22.04 - 6.5.0.27.27 linux-headers-virtual-hwe-22.04-edge - 6.5.0.27.27 linux-image-extra-virtual - 6.5.0.27.27 linux-image-extra-virtual-hwe-22.04 - 6.5.0.27.27 linux-image-extra-virtual-hwe-22.04-edge - 6.5.0.27.27 linux-image-generic - 6.5.0.27.27 linux-image-generic-64k - 6.5.0.27.27 linux-image-generic-64k-hwe-22.04 - 6.5.0.27.27 linux-image-generic-64k-hwe-22.04-edge - 6.5.0.27.27 linux-image-generic-hwe-22.04 - 6.5.0.27.27 linux-image-generic-hwe-22.04-edge - 6.5.0.27.27 linux-image-generic-lpae - 6.5.0.27.27 linux-image-kvm - 6.5.0.27.27 linux-image-oem-20.04 - 6.5.0.27.27 linux-image-oem-20.04b - 6.5.0.27.27 linux-image-oem-20.04c - 6.5.0.27.27 linux-image-oem-20.04d - 6.5.0.27.27 linux-image-oem-22.04 - 6.5.0.27.27 linux-image-uc-generic - 6.5.0.27.27 linux-image-uc-generic-hwe-22.04 - 6.5.0.27.27 linux-image-uc-generic-hwe-22.04-edge - 6.5.0.27.27 linux-image-virtual - 6.5.0.27.27 linux-image-virtual-hwe-22.04 - 6.5.0.27.27 linux-image-virtual-hwe-22.04-edge - 6.5.0.27.27 linux-kvm - 6.5.0.27.27 linux-modules-ipu6-generic - 6.5.0.27.27 linux-modules-ipu6-generic-hwe-22.04 - 6.5.0.27.27 linux-modules-ipu6-generic-hwe-22.04-edge - 6.5.0.27.27 linux-modules-ipu6-oem-22.04 - 6.5.0.27.27 linux-modules-ivsc-generic - 6.5.0.27.27 linux-modules-ivsc-generic-hwe-22.04 - 6.5.0.27.27 linux-modules-ivsc-generic-hwe-22.04-edge - 6.5.0.27.27 linux-modules-ivsc-oem-22.04 - 6.5.0.27.27 linux-modules-iwlwifi-generic - 6.5.0.27.27 linux-modules-iwlwifi-generic-hwe-22.04 - 6.5.0.27.27 linux-modules-iwlwifi-generic-hwe-22.04-edge - 6.5.0.27.27 linux-modules-iwlwifi-oem-20.04 - 6.5.0.27.27 linux-modules-iwlwifi-oem-20.04d - 6.5.0.27.27 linux-modules-iwlwifi-oem-22.04 - 6.5.0.27.27 linux-oem-20.04 - 6.5.0.27.27 linux-oem-20.04b - 6.5.0.27.27 linux-oem-20.04c - 6.5.0.27.27 linux-oem-20.04d - 6.5.0.27.27 linux-oem-22.04 - 6.5.0.27.27 linux-source - 6.5.0.27.27 linux-tools-generic - 6.5.0.27.27 linux-tools-generic-64k - 6.5.0.27.27 linux-tools-generic-64k-hwe-22.04 - 6.5.0.27.27 linux-tools-generic-64k-hwe-22.04-edge - 6.5.0.27.27 linux-tools-generic-hwe-22.04 - 6.5.0.27.27 linux-tools-generic-hwe-22.04-edge - 6.5.0.27.27 linux-tools-generic-lpae - 6.5.0.27.27 linux-tools-kvm - 6.5.0.27.27 linux-tools-oem-20.04 - 6.5.0.27.27 linux-tools-oem-20.04b - 6.5.0.27.27 linux-tools-oem-20.04c - 6.5.0.27.27 linux-tools-oem-20.04d - 6.5.0.27.27 linux-tools-oem-22.04 - 6.5.0.27.27 linux-tools-virtual - 6.5.0.27.27 linux-tools-virtual-hwe-22.04 - 6.5.0.27.27 linux-tools-virtual-hwe-22.04-edge - 6.5.0.27.27 linux-virtual - 6.5.0.27.27 linux-virtual-hwe-22.04 - 6.5.0.27.27 linux-virtual-hwe-22.04-edge - 6.5.0.27.27 No subscription required linux-cloud-tools-lowlatency - 6.5.0.27.28.18 linux-cloud-tools-lowlatency-hwe-20.04 - 6.5.0.27.28.18 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.5.0.27.28.18 linux-cloud-tools-lowlatency-hwe-22.04 - 6.5.0.27.28.18 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.5.0.27.28.18 linux-headers-lowlatency - 6.5.0.27.28.18 linux-headers-lowlatency-64k - 6.5.0.27.28.18 linux-headers-lowlatency-64k-hwe-20.04 - 6.5.0.27.28.18 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.5.0.27.28.18 linux-headers-lowlatency-64k-hwe-22.04 - 6.5.0.27.28.18 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.5.0.27.28.18 linux-headers-lowlatency-hwe-20.04 - 6.5.0.27.28.18 linux-headers-lowlatency-hwe-20.04-edge - 6.5.0.27.28.18 linux-headers-lowlatency-hwe-22.04 - 6.5.0.27.28.18 linux-headers-lowlatency-hwe-22.04-edge - 6.5.0.27.28.18 linux-image-lowlatency - 6.5.0.27.28.18 linux-image-lowlatency-64k - 6.5.0.27.28.18 linux-image-lowlatency-64k-hwe-20.04 - 6.5.0.27.28.18 linux-image-lowlatency-64k-hwe-20.04-edge - 6.5.0.27.28.18 linux-image-lowlatency-64k-hwe-22.04 - 6.5.0.27.28.18 linux-image-lowlatency-64k-hwe-22.04-edge - 6.5.0.27.28.18 linux-image-lowlatency-hwe-20.04 - 6.5.0.27.28.18 linux-image-lowlatency-hwe-20.04-edge - 6.5.0.27.28.18 linux-image-lowlatency-hwe-22.04 - 6.5.0.27.28.18 linux-image-lowlatency-hwe-22.04-edge - 6.5.0.27.28.18 linux-lowlatency - 6.5.0.27.28.18 linux-lowlatency-64k - 6.5.0.27.28.18 linux-lowlatency-64k-hwe-20.04 - 6.5.0.27.28.18 linux-lowlatency-64k-hwe-20.04-edge - 6.5.0.27.28.18 linux-lowlatency-64k-hwe-22.04 - 6.5.0.27.28.18 linux-lowlatency-64k-hwe-22.04-edge - 6.5.0.27.28.18 linux-lowlatency-hwe-20.04 - 6.5.0.27.28.18 linux-lowlatency-hwe-20.04-edge - 6.5.0.27.28.18 linux-lowlatency-hwe-22.04 - 6.5.0.27.28.18 linux-lowlatency-hwe-22.04-edge - 6.5.0.27.28.18 linux-modules-iwlwifi-lowlatency - 6.5.0.27.28.18 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.5.0.27.28.18 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.5.0.27.28.18 linux-tools-lowlatency - 6.5.0.27.28.18 linux-tools-lowlatency-64k - 6.5.0.27.28.18 linux-tools-lowlatency-64k-hwe-20.04 - 6.5.0.27.28.18 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.5.0.27.28.18 linux-tools-lowlatency-64k-hwe-22.04 - 6.5.0.27.28.18 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.5.0.27.28.18 linux-tools-lowlatency-hwe-20.04 - 6.5.0.27.28.18 linux-tools-lowlatency-hwe-20.04-edge - 6.5.0.27.28.18 linux-tools-lowlatency-hwe-22.04 - 6.5.0.27.28.18 linux-tools-lowlatency-hwe-22.04-edge - 6.5.0.27.28.18 No subscription required Medium CVE-2023-46838 CVE-2023-50431 CVE-2023-52429 CVE-2023-52434 CVE-2023-52435 CVE-2023-52436 CVE-2023-52438 CVE-2023-52439 CVE-2023-6610 CVE-2024-22705 CVE-2024-23850 CVE-2024-23851 USN-6724-2 -- Linux kernel vulnerabilities Ubuntu 23.10 Pratyush Yadav discovered that the Xen network backend implementation in the Linux kernel did not properly handle zero length data request, leading to a null pointer dereference vulnerability. An attacker in a guest VM could possibly use this to cause a denial of service (host domain crash). (CVE-2023-46838) It was discovered that the Habana's AI Processors driver in the Linux kernel did not properly initialize certain data structures before passing them to user space. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2023-50431) It was discovered that the device mapper driver in the Linux kernel did not properly validate target size during certain memory allocations. A local attacker could use this to cause a denial of service (system crash). (CVE-2023-52429, CVE-2024-23851) It was discovered that the CIFS network file system implementation in the Linux kernel did not properly validate certain SMB messages, leading to an out-of-bounds read vulnerability. An attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information. (CVE-2023-6610) Yang Chaoming discovered that the KSMBD implementation in the Linux kernel did not properly validate request buffer sizes, leading to an out-of-bounds read vulnerability. An attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information. (CVE-2024-22705) Chenyuan Yang discovered that the btrfs file system in the Linux kernel did not properly handle read operations on newly created subvolumes in certain conditions. A local attacker could use this to cause a denial of service (system crash). (CVE-2024-23850) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Android drivers; - Userspace I/O drivers; - F2FS file system; - SMB network file system; - Networking core; (CVE-2023-52434, CVE-2023-52436, CVE-2023-52435, CVE-2023-52439, CVE-2023-52438) Update Instructions: Run `sudo pro fix USN-6724-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.5.0-1014-raspi - 6.5.0-1014.17 linux-headers-6.5.0-1014-raspi - 6.5.0-1014.17 linux-image-6.5.0-1014-raspi - 6.5.0-1014.17 linux-modules-6.5.0-1014-raspi - 6.5.0-1014.17 linux-modules-extra-6.5.0-1014-raspi - 6.5.0-1014.17 linux-raspi-headers-6.5.0-1014 - 6.5.0-1014.17 linux-raspi-tools-6.5.0-1014 - 6.5.0-1014.17 linux-tools-6.5.0-1014-raspi - 6.5.0-1014.17 No subscription required linux-headers-raspi - 6.5.0.1014.15 linux-headers-raspi-nolpae - 6.5.0.1014.15 linux-image-raspi - 6.5.0.1014.15 linux-image-raspi-nolpae - 6.5.0.1014.15 linux-modules-extra-raspi - 6.5.0.1014.15 linux-modules-extra-raspi-nolpae - 6.5.0.1014.15 linux-raspi - 6.5.0.1014.15 linux-raspi-nolpae - 6.5.0.1014.15 linux-tools-raspi - 6.5.0.1014.15 linux-tools-raspi-nolpae - 6.5.0.1014.15 No subscription required Medium CVE-2023-46838 CVE-2023-50431 CVE-2023-52429 CVE-2023-52434 CVE-2023-52435 CVE-2023-52436 CVE-2023-52438 CVE-2023-52439 CVE-2023-6610 CVE-2024-22705 CVE-2024-23850 CVE-2024-23851 USN-6727-1 -- NSS vulnerabilities Ubuntu 23.10 It was discovered that NSS incorrectly handled padding when checking PKCS#1 certificates. A remote attacker could possibly use this issue to perform Bleichenbacher-like attacks and recover private data. This issue only affected Ubuntu 20.04 LTS. (CVE-2023-4421) It was discovered that NSS had a timing side-channel when performing RSA decryption. A remote attacker could possibly use this issue to recover private data. (CVE-2023-5388) It was discovered that NSS had a timing side-channel when using certain NIST curves. A remote attacker could possibly use this issue to recover private data. (CVE-2023-6135) The NSS package contained outdated CA certificates. This update refreshes the NSS package to version 3.98 which includes the latest CA certificate bundle and other security improvements. Update Instructions: Run `sudo pro fix USN-6727-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libnss3 - 2:3.98-0ubuntu0.23.10.1 libnss3-dev - 2:3.98-0ubuntu0.23.10.1 libnss3-tools - 2:3.98-0ubuntu0.23.10.1 No subscription required Medium CVE-2023-4421 CVE-2023-5388 CVE-2023-6135 USN-6728-1 -- Squid vulnerabilities Ubuntu 23.10 Joshua Rogers discovered that Squid incorrectly handled collapsed forwarding. A remote attacker could possibly use this issue to cause Squid to crash, resulting in a denial of service. This issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-49288) Joshua Rogers discovered that Squid incorrectly handled certain structural elements. A remote attacker could possibly use this issue to cause Squid to crash, resulting in a denial of service. (CVE-2023-5824) Joshua Rogers discovered that Squid incorrectly handled Cache Manager error responses. A remote trusted client can possibly use this issue to cause Squid to crash, resulting in a denial of service. (CVE-2024-23638) Joshua Rogers discovered that Squid incorrectly handled the HTTP Chunked decoder. A remote attacker could possibly use this issue to cause Squid to stop responding, resulting in a denial of service. (CVE-2024-25111) Joshua Rogers discovered that Squid incorrectly handled HTTP header parsing. A remote trusted client can possibly use this issue to cause Squid to crash, resulting in a denial of service. (CVE-2024-25617) Update Instructions: Run `sudo pro fix USN-6728-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: squid - 6.1-2ubuntu1.3 squid-cgi - 6.1-2ubuntu1.3 squid-common - 6.1-2ubuntu1.3 squid-openssl - 6.1-2ubuntu1.3 squid-purge - 6.1-2ubuntu1.3 squidclient - 6.1-2ubuntu1.3 No subscription required Medium CVE-2023-49288 CVE-2023-5824 CVE-2024-23638 CVE-2024-25111 CVE-2024-25617 USN-6729-1 -- Apache HTTP Server vulnerabilities Ubuntu 23.10 Orange Tsai discovered that the Apache HTTP Server incorrectly handled validating certain input. A remote attacker could possibly use this issue to perform HTTP request splitting attacks. (CVE-2023-38709) Keran Mu and Jianjun Chen discovered that the Apache HTTP Server incorrectly handled validating certain input. A remote attacker could possibly use this issue to perform HTTP request splitting attacks. (CVE-2024-24795) Bartek Nowotarski discovered that the Apache HTTP Server HTTP/2 module incorrectly handled endless continuation frames. A remote attacker could possibly use this issue to cause the server to consume resources, leading to a denial of service. (CVE-2024-27316) Update Instructions: Run `sudo pro fix USN-6729-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: apache2 - 2.4.57-2ubuntu2.4 apache2-bin - 2.4.57-2ubuntu2.4 apache2-data - 2.4.57-2ubuntu2.4 apache2-dev - 2.4.57-2ubuntu2.4 apache2-doc - 2.4.57-2ubuntu2.4 apache2-ssl-dev - 2.4.57-2ubuntu2.4 apache2-suexec-custom - 2.4.57-2ubuntu2.4 apache2-suexec-pristine - 2.4.57-2ubuntu2.4 apache2-utils - 2.4.57-2ubuntu2.4 libapache2-mod-md - 2.4.57-2ubuntu2.4 libapache2-mod-proxy-uwsgi - 2.4.57-2ubuntu2.4 No subscription required Medium CVE-2023-38709 CVE-2024-24795 CVE-2024-27316 USN-6731-1 -- YARD vulnerabilities Ubuntu 23.10 It was discovered that YARD before 0.9.11 does not block relative paths with an initial ../ sequence, which allows attackers to conduct directory traversal attacks and read arbitrary files. This issue only affected Ubuntu 16.04 LTS. (CVE-2017-17042) It was discovered that yard before 0.9.20 is affected by a path traversal vulnerability, allowing HTTP requests to access arbitrary files under certain conditions. This issue only affected Ubuntu 18.04 LTS. (CVE-2019-1020001) Aviv Keller discovered that the "frames.html" file within the Yard Doc's generated documentation is vulnerable to Cross-Site Scripting (XSS) attacks due to inadequate sanitization of user input within the JavaScript segment of the "frames.erb" template file. (CVE-2024-27285) Update Instructions: Run `sudo pro fix USN-6731-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: yard - 0.9.28-2ubuntu0.1 yard-doc - 0.9.28-2ubuntu0.1 No subscription required Medium CVE-2017-17042 CVE-2019-1020001 CVE-2024-27285 USN-6732-1 -- WebKitGTK vulnerabilities Ubuntu 23.10 Several security issues were discovered in the WebKitGTK Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution. Update Instructions: Run `sudo pro fix USN-6732-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-javascriptcoregtk-4.0 - 2.44.0-0ubuntu0.23.10.1 gir1.2-javascriptcoregtk-4.1 - 2.44.0-0ubuntu0.23.10.1 gir1.2-javascriptcoregtk-6.0 - 2.44.0-0ubuntu0.23.10.1 gir1.2-webkit-6.0 - 2.44.0-0ubuntu0.23.10.1 gir1.2-webkit2-4.0 - 2.44.0-0ubuntu0.23.10.1 gir1.2-webkit2-4.1 - 2.44.0-0ubuntu0.23.10.1 libjavascriptcoregtk-4.0-18 - 2.44.0-0ubuntu0.23.10.1 libjavascriptcoregtk-4.0-bin - 2.44.0-0ubuntu0.23.10.1 libjavascriptcoregtk-4.0-dev - 2.44.0-0ubuntu0.23.10.1 libjavascriptcoregtk-4.1-0 - 2.44.0-0ubuntu0.23.10.1 libjavascriptcoregtk-4.1-dev - 2.44.0-0ubuntu0.23.10.1 libjavascriptcoregtk-6.0-1 - 2.44.0-0ubuntu0.23.10.1 libjavascriptcoregtk-6.0-dev - 2.44.0-0ubuntu0.23.10.1 libwebkit2gtk-4.0-37 - 2.44.0-0ubuntu0.23.10.1 libwebkit2gtk-4.0-dev - 2.44.0-0ubuntu0.23.10.1 libwebkit2gtk-4.0-doc - 2.44.0-0ubuntu0.23.10.1 libwebkit2gtk-4.1-0 - 2.44.0-0ubuntu0.23.10.1 libwebkit2gtk-4.1-dev - 2.44.0-0ubuntu0.23.10.1 libwebkitgtk-6.0-4 - 2.44.0-0ubuntu0.23.10.1 libwebkitgtk-6.0-dev - 2.44.0-0ubuntu0.23.10.1 webkit2gtk-driver - 2.44.0-0ubuntu0.23.10.1 No subscription required Medium CVE-2023-42843 CVE-2023-42950 CVE-2023-42956 CVE-2024-23252 CVE-2024-23254 CVE-2024-23263 CVE-2024-23280 CVE-2024-23284 USN-6733-1 -- GnuTLS vulnerabilities Ubuntu 23.10 It was discovered that GnuTLS had a timing side-channel when performing certain ECDSA operations. A remote attacker could possibly use this issue to recover sensitive information. (CVE-2024-28834) It was discovered that GnuTLS incorrectly handled verifying certain PEM bundles. A remote attacker could possibly use this issue to cause GnuTLS to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 23.10. (CVE-2024-28835) Update Instructions: Run `sudo pro fix USN-6733-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gnutls-bin - 3.8.1-4ubuntu1.3 gnutls-doc - 3.8.1-4ubuntu1.3 libgnutls-dane0 - 3.8.1-4ubuntu1.3 libgnutls-openssl27 - 3.8.1-4ubuntu1.3 libgnutls28-dev - 3.8.1-4ubuntu1.3 libgnutls30 - 3.8.1-4ubuntu1.3 No subscription required Medium CVE-2024-28834 CVE-2024-28835 USN-6734-1 -- libvirt vulnerabilities Ubuntu 23.10 Alexander Kuznetsov discovered that libvirt incorrectly handled certain API calls. An attacker could possibly use this issue to cause libvirt to crash, resulting in a denial of service. (CVE-2024-1441) It was discovered that libvirt incorrectly handled certain RPC library API calls. An attacker could possibly use this issue to cause libvirt to crash, resulting in a denial of service. (CVE-2024-2494) It was discovered that libvirt incorrectly handled detaching certain host interfaces. An attacker could possibly use this issue to cause libvirt to crash, resulting in a denial of service. (CVE-2024-2496) Update Instructions: Run `sudo pro fix USN-6734-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libnss-libvirt - 9.6.0-1ubuntu1.1 libvirt-clients - 9.6.0-1ubuntu1.1 libvirt-clients-qemu - 9.6.0-1ubuntu1.1 libvirt-daemon - 9.6.0-1ubuntu1.1 libvirt-daemon-config-network - 9.6.0-1ubuntu1.1 libvirt-daemon-config-nwfilter - 9.6.0-1ubuntu1.1 libvirt-daemon-driver-lxc - 9.6.0-1ubuntu1.1 libvirt-daemon-driver-qemu - 9.6.0-1ubuntu1.1 libvirt-daemon-driver-storage-gluster - 9.6.0-1ubuntu1.1 libvirt-daemon-driver-storage-iscsi-direct - 9.6.0-1ubuntu1.1 libvirt-daemon-driver-storage-rbd - 9.6.0-1ubuntu1.1 libvirt-daemon-driver-storage-zfs - 9.6.0-1ubuntu1.1 libvirt-daemon-driver-vbox - 9.6.0-1ubuntu1.1 libvirt-daemon-driver-xen - 9.6.0-1ubuntu1.1 libvirt-daemon-system - 9.6.0-1ubuntu1.1 libvirt-daemon-system-systemd - 9.6.0-1ubuntu1.1 libvirt-daemon-system-sysv - 9.6.0-1ubuntu1.1 libvirt-dev - 9.6.0-1ubuntu1.1 libvirt-doc - 9.6.0-1ubuntu1.1 libvirt-l10n - 9.6.0-1ubuntu1.1 libvirt-login-shell - 9.6.0-1ubuntu1.1 libvirt-sanlock - 9.6.0-1ubuntu1.1 libvirt-wireshark - 9.6.0-1ubuntu1.1 libvirt0 - 9.6.0-1ubuntu1.1 No subscription required Medium CVE-2024-1441 CVE-2024-2494 CVE-2024-2496 USN-6735-1 -- Node.js vulnerabilities Ubuntu 23.10 It was discovered that Node.js incorrectly handled the use of invalid public keys while creating an x509 certificate. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 23.10. (CVE-2023-30588) It was discovered that Node.js incorrectly handled the use of CRLF sequences to delimit HTTP requests. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to obtain unauthorised access. This issue only affected Ubuntu 23.10. (CVE-2023-30589) It was discovered that Node.js incorrectly described the generateKeys() function in the documentation. This inconsistency could possibly lead to security issues in applications that use these APIs. (CVE-2023-30590) Update Instructions: Run `sudo pro fix USN-6735-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libnode-dev - 18.13.0+dfsg1-1ubuntu2.2 libnode108 - 18.13.0+dfsg1-1ubuntu2.2 nodejs - 18.13.0+dfsg1-1ubuntu2.2 nodejs-doc - 18.13.0+dfsg1-1ubuntu2.2 No subscription required Medium CVE-2023-30588 CVE-2023-30589 CVE-2023-30590 USN-6736-1 -- klibc vulnerabilities Ubuntu 23.10 It was discovered that zlib, vendored in klibc, incorrectly handled pointer arithmetic. An attacker could use this issue to cause klibc to crash or to possibly execute arbitrary code. (CVE-2016-9840, CVE-2016-9841) Danilo Ramos discovered that zlib, vendored in klibc, incorrectly handled memory when performing certain deflating operations. An attacker could use this issue to cause klibc to crash or to possibly execute arbitrary code. (CVE-2018-25032) Evgeny Legerov discovered that zlib, vendored in klibc, incorrectly handled memory when performing certain inflate operations. An attacker could use this issue to cause klibc to crash or to possibly execute arbitrary code. (CVE-2022-37434) Update Instructions: Run `sudo pro fix USN-6736-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: klibc-utils - 2.0.13-1ubuntu0.1 libklibc - 2.0.13-1ubuntu0.1 libklibc-dev - 2.0.13-1ubuntu0.1 No subscription required Medium CVE-2016-9840 CVE-2016-9841 CVE-2018-25032 CVE-2022-37434 USN-6737-1 -- GNU C Library vulnerability Ubuntu 23.10 Charles Fol discovered that the GNU C Library iconv feature incorrectly handled certain input sequences. An attacker could use this issue to cause the GNU C Library to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6737-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: glibc-doc - 2.38-1ubuntu6.2 glibc-source - 2.38-1ubuntu6.2 libc-bin - 2.38-1ubuntu6.2 libc-dev-bin - 2.38-1ubuntu6.2 libc-devtools - 2.38-1ubuntu6.2 libc6 - 2.38-1ubuntu6.2 libc6-amd64 - 2.38-1ubuntu6.2 libc6-dev - 2.38-1ubuntu6.2 libc6-dev-amd64 - 2.38-1ubuntu6.2 libc6-dev-i386 - 2.38-1ubuntu6.2 libc6-dev-s390 - 2.38-1ubuntu6.2 libc6-dev-x32 - 2.38-1ubuntu6.2 libc6-i386 - 2.38-1ubuntu6.2 libc6-prof - 2.38-1ubuntu6.2 libc6-s390 - 2.38-1ubuntu6.2 libc6-x32 - 2.38-1ubuntu6.2 locales - 2.38-1ubuntu6.2 locales-all - 2.38-1ubuntu6.2 nscd - 2.38-1ubuntu6.2 No subscription required Medium CVE-2024-2961 USN-6743-1 -- Linux kernel vulnerabilities Ubuntu 23.10 Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - JFS file system; - BPF subsystem; - Netfilter; (CVE-2023-52600, CVE-2024-26589, CVE-2024-26591, CVE-2024-26581, CVE-2023-52603) Update Instructions: Run `sudo pro fix USN-6743-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.5.0-1012-starfive - 6.5.0-1012.13 linux-headers-6.5.0-1012-starfive - 6.5.0-1012.13 linux-image-6.5.0-1012-starfive - 6.5.0-1012.13 linux-modules-6.5.0-1012-starfive - 6.5.0-1012.13 linux-modules-extra-6.5.0-1012-starfive - 6.5.0-1012.13 linux-starfive-headers-6.5.0-1012 - 6.5.0-1012.13 linux-starfive-tools-6.5.0-1012 - 6.5.0-1012.13 linux-tools-6.5.0-1012-starfive - 6.5.0-1012.13 No subscription required linux-buildinfo-6.5.0-1014-laptop - 6.5.0-1014.17 linux-headers-6.5.0-1014-laptop - 6.5.0-1014.17 linux-image-6.5.0-1014-laptop - 6.5.0-1014.17 linux-laptop-headers-6.5.0-1014 - 6.5.0-1014.17 linux-laptop-tools-6.5.0-1014 - 6.5.0-1014.17 linux-modules-6.5.0-1014-laptop - 6.5.0-1014.17 linux-tools-6.5.0-1014-laptop - 6.5.0-1014.17 No subscription required linux-buildinfo-6.5.0-1015-raspi - 6.5.0-1015.18 linux-headers-6.5.0-1015-raspi - 6.5.0-1015.18 linux-image-6.5.0-1015-raspi - 6.5.0-1015.18 linux-modules-6.5.0-1015-raspi - 6.5.0-1015.18 linux-modules-extra-6.5.0-1015-raspi - 6.5.0-1015.18 linux-raspi-headers-6.5.0-1015 - 6.5.0-1015.18 linux-raspi-tools-6.5.0-1015 - 6.5.0-1015.18 linux-tools-6.5.0-1015-raspi - 6.5.0-1015.18 No subscription required linux-aws-cloud-tools-6.5.0-1018 - 6.5.0-1018.18 linux-aws-headers-6.5.0-1018 - 6.5.0-1018.18 linux-aws-tools-6.5.0-1018 - 6.5.0-1018.18 linux-buildinfo-6.5.0-1018-aws - 6.5.0-1018.18 linux-buildinfo-6.5.0-1018-gcp - 6.5.0-1018.18 linux-cloud-tools-6.5.0-1018-aws - 6.5.0-1018.18 linux-gcp-headers-6.5.0-1018 - 6.5.0-1018.18 linux-gcp-tools-6.5.0-1018 - 6.5.0-1018.18 linux-headers-6.5.0-1018-aws - 6.5.0-1018.18 linux-headers-6.5.0-1018-gcp - 6.5.0-1018.18 linux-image-6.5.0-1018-aws - 6.5.0-1018.18 linux-image-6.5.0-1018-gcp - 6.5.0-1018.18 linux-image-unsigned-6.5.0-1018-aws - 6.5.0-1018.18 linux-image-unsigned-6.5.0-1018-gcp - 6.5.0-1018.18 linux-modules-6.5.0-1018-aws - 6.5.0-1018.18 linux-modules-6.5.0-1018-gcp - 6.5.0-1018.18 linux-modules-extra-6.5.0-1018-aws - 6.5.0-1018.18 linux-modules-extra-6.5.0-1018-gcp - 6.5.0-1018.18 linux-modules-iwlwifi-6.5.0-1018-gcp - 6.5.0-1018.18 linux-tools-6.5.0-1018-aws - 6.5.0-1018.18 linux-tools-6.5.0-1018-gcp - 6.5.0-1018.18 No subscription required linux-azure-cloud-tools-6.5.0-1019 - 6.5.0-1019.20 linux-azure-headers-6.5.0-1019 - 6.5.0-1019.20 linux-azure-tools-6.5.0-1019 - 6.5.0-1019.20 linux-buildinfo-6.5.0-1019-azure - 6.5.0-1019.20 linux-cloud-tools-6.5.0-1019-azure - 6.5.0-1019.20 linux-headers-6.5.0-1019-azure - 6.5.0-1019.20 linux-image-6.5.0-1019-azure - 6.5.0-1019.20 linux-image-6.5.0-1019-azure-fde - 6.5.0-1019.20 linux-image-unsigned-6.5.0-1019-azure - 6.5.0-1019.20 linux-modules-6.5.0-1019-azure - 6.5.0-1019.20 linux-modules-extra-6.5.0-1019-azure - 6.5.0-1019.20 linux-modules-iwlwifi-6.5.0-1019-azure - 6.5.0-1019.20 linux-tools-6.5.0-1019-azure - 6.5.0-1019.20 No subscription required linux-buildinfo-6.5.0-1021-oracle - 6.5.0-1021.21 linux-buildinfo-6.5.0-1021-oracle-64k - 6.5.0-1021.21 linux-headers-6.5.0-1021-oracle - 6.5.0-1021.21 linux-headers-6.5.0-1021-oracle-64k - 6.5.0-1021.21 linux-image-6.5.0-1021-oracle - 6.5.0-1021.21 linux-image-6.5.0-1021-oracle-64k - 6.5.0-1021.21 linux-image-unsigned-6.5.0-1021-oracle - 6.5.0-1021.21 linux-image-unsigned-6.5.0-1021-oracle-64k - 6.5.0-1021.21 linux-modules-6.5.0-1021-oracle - 6.5.0-1021.21 linux-modules-6.5.0-1021-oracle-64k - 6.5.0-1021.21 linux-modules-extra-6.5.0-1021-oracle - 6.5.0-1021.21 linux-modules-extra-6.5.0-1021-oracle-64k - 6.5.0-1021.21 linux-modules-iwlwifi-6.5.0-1021-oracle - 6.5.0-1021.21 linux-oracle-headers-6.5.0-1021 - 6.5.0-1021.21 linux-oracle-tools-6.5.0-1021 - 6.5.0-1021.21 linux-tools-6.5.0-1021-oracle - 6.5.0-1021.21 linux-tools-6.5.0-1021-oracle-64k - 6.5.0-1021.21 No subscription required linux-buildinfo-6.5.0-28-generic - 6.5.0-28.29 linux-buildinfo-6.5.0-28-generic-64k - 6.5.0-28.29 linux-cloud-tools-6.5.0-28 - 6.5.0-28.29 linux-cloud-tools-6.5.0-28-generic - 6.5.0-28.29 linux-cloud-tools-common - 6.5.0-28.29 linux-doc - 6.5.0-28.29 linux-headers-6.5.0-28 - 6.5.0-28.29 linux-headers-6.5.0-28-generic - 6.5.0-28.29 linux-headers-6.5.0-28-generic-64k - 6.5.0-28.29 linux-image-6.5.0-28-generic - 6.5.0-28.29 linux-image-6.5.0-28-generic-64k - 6.5.0-28.29 linux-image-uc-6.5.0-28-generic - 6.5.0-28.29 linux-image-uc-6.5.0-28-generic-64k - 6.5.0-28.29 linux-image-unsigned-6.5.0-28-generic - 6.5.0-28.29 linux-image-unsigned-6.5.0-28-generic-64k - 6.5.0-28.29 linux-lib-rust-6.5.0-28-generic - 6.5.0-28.29 linux-libc-dev - 6.5.0-28.29 linux-modules-6.5.0-28-generic - 6.5.0-28.29 linux-modules-6.5.0-28-generic-64k - 6.5.0-28.29 linux-modules-extra-6.5.0-28-generic - 6.5.0-28.29 linux-modules-ipu6-6.5.0-28-generic - 6.5.0-28.29 linux-modules-ivsc-6.5.0-28-generic - 6.5.0-28.29 linux-modules-iwlwifi-6.5.0-28-generic - 6.5.0-28.29 linux-source-6.5.0 - 6.5.0-28.29 linux-tools-6.5.0-28 - 6.5.0-28.29 linux-tools-6.5.0-28-generic - 6.5.0-28.29 linux-tools-6.5.0-28-generic-64k - 6.5.0-28.29 linux-tools-common - 6.5.0-28.29 linux-tools-host - 6.5.0-28.29 No subscription required linux-buildinfo-6.5.0-28-lowlatency - 6.5.0-28.29.1 linux-buildinfo-6.5.0-28-lowlatency-64k - 6.5.0-28.29.1 linux-cloud-tools-6.5.0-28-lowlatency - 6.5.0-28.29.1 linux-headers-6.5.0-28-lowlatency - 6.5.0-28.29.1 linux-headers-6.5.0-28-lowlatency-64k - 6.5.0-28.29.1 linux-image-6.5.0-28-lowlatency - 6.5.0-28.29.1 linux-image-6.5.0-28-lowlatency-64k - 6.5.0-28.29.1 linux-image-unsigned-6.5.0-28-lowlatency - 6.5.0-28.29.1 linux-image-unsigned-6.5.0-28-lowlatency-64k - 6.5.0-28.29.1 linux-lowlatency-cloud-tools-6.5.0-28 - 6.5.0-28.29.1 linux-lowlatency-cloud-tools-common - 6.5.0-28.29.1 linux-lowlatency-headers-6.5.0-28 - 6.5.0-28.29.1 linux-lowlatency-lib-rust-6.5.0-28-lowlatency - 6.5.0-28.29.1 linux-lowlatency-tools-6.5.0-28 - 6.5.0-28.29.1 linux-lowlatency-tools-common - 6.5.0-28.29.1 linux-lowlatency-tools-host - 6.5.0-28.29.1 linux-modules-6.5.0-28-lowlatency - 6.5.0-28.29.1 linux-modules-6.5.0-28-lowlatency-64k - 6.5.0-28.29.1 linux-modules-iwlwifi-6.5.0-28-lowlatency - 6.5.0-28.29.1 linux-tools-6.5.0-28-lowlatency - 6.5.0-28.29.1 linux-tools-6.5.0-28-lowlatency-64k - 6.5.0-28.29.1 No subscription required linux-headers-starfive - 6.5.0.1012.14 linux-image-starfive - 6.5.0.1012.14 linux-starfive - 6.5.0.1012.14 linux-tools-starfive - 6.5.0.1012.14 No subscription required linux-headers-laptop-23.10 - 6.5.0.1014.17 linux-image-laptop-23.10 - 6.5.0.1014.17 linux-laptop-23.10 - 6.5.0.1014.17 linux-tools-laptop-23.10 - 6.5.0.1014.17 No subscription required linux-headers-raspi - 6.5.0.1015.16 linux-headers-raspi-nolpae - 6.5.0.1015.16 linux-image-raspi - 6.5.0.1015.16 linux-image-raspi-nolpae - 6.5.0.1015.16 linux-modules-extra-raspi - 6.5.0.1015.16 linux-modules-extra-raspi-nolpae - 6.5.0.1015.16 linux-raspi - 6.5.0.1015.16 linux-raspi-nolpae - 6.5.0.1015.16 linux-tools-raspi - 6.5.0.1015.16 linux-tools-raspi-nolpae - 6.5.0.1015.16 No subscription required linux-aws - 6.5.0.1018.18 linux-gcp - 6.5.0.1018.18 linux-headers-aws - 6.5.0.1018.18 linux-headers-gcp - 6.5.0.1018.18 linux-image-aws - 6.5.0.1018.18 linux-image-gcp - 6.5.0.1018.18 linux-modules-extra-aws - 6.5.0.1018.18 linux-modules-extra-gcp - 6.5.0.1018.18 linux-modules-iwlwifi-gcp - 6.5.0.1018.18 linux-tools-aws - 6.5.0.1018.18 linux-tools-gcp - 6.5.0.1018.18 No subscription required linux-azure - 6.5.0.1019.23 linux-azure-fde - 6.5.0.1019.23 linux-cloud-tools-azure - 6.5.0.1019.23 linux-headers-azure - 6.5.0.1019.23 linux-image-azure - 6.5.0.1019.23 linux-image-azure-fde - 6.5.0.1019.23 linux-modules-extra-azure - 6.5.0.1019.23 linux-modules-iwlwifi-azure - 6.5.0.1019.23 linux-tools-azure - 6.5.0.1019.23 No subscription required linux-headers-oracle - 6.5.0.1021.23 linux-headers-oracle-64k - 6.5.0.1021.23 linux-image-oracle - 6.5.0.1021.23 linux-image-oracle-64k - 6.5.0.1021.23 linux-modules-iwlwifi-oracle - 6.5.0.1021.23 linux-oracle - 6.5.0.1021.23 linux-oracle-64k - 6.5.0.1021.23 linux-tools-oracle - 6.5.0.1021.23 linux-tools-oracle-64k - 6.5.0.1021.23 No subscription required linux-cloud-tools-generic - 6.5.0.28.28 linux-cloud-tools-generic-hwe-22.04 - 6.5.0.28.28 linux-cloud-tools-generic-hwe-22.04-edge - 6.5.0.28.28 linux-cloud-tools-virtual - 6.5.0.28.28 linux-cloud-tools-virtual-hwe-22.04 - 6.5.0.28.28 linux-cloud-tools-virtual-hwe-22.04-edge - 6.5.0.28.28 linux-crashdump - 6.5.0.28.28 linux-generic - 6.5.0.28.28 linux-generic-64k - 6.5.0.28.28 linux-generic-64k-hwe-22.04 - 6.5.0.28.28 linux-generic-64k-hwe-22.04-edge - 6.5.0.28.28 linux-generic-hwe-22.04 - 6.5.0.28.28 linux-generic-hwe-22.04-edge - 6.5.0.28.28 linux-generic-lpae - 6.5.0.28.28 linux-headers-generic - 6.5.0.28.28 linux-headers-generic-64k - 6.5.0.28.28 linux-headers-generic-64k-hwe-22.04 - 6.5.0.28.28 linux-headers-generic-64k-hwe-22.04-edge - 6.5.0.28.28 linux-headers-generic-hwe-22.04 - 6.5.0.28.28 linux-headers-generic-hwe-22.04-edge - 6.5.0.28.28 linux-headers-generic-lpae - 6.5.0.28.28 linux-headers-kvm - 6.5.0.28.28 linux-headers-oem-20.04 - 6.5.0.28.28 linux-headers-oem-20.04b - 6.5.0.28.28 linux-headers-oem-20.04c - 6.5.0.28.28 linux-headers-oem-20.04d - 6.5.0.28.28 linux-headers-oem-22.04 - 6.5.0.28.28 linux-headers-virtual - 6.5.0.28.28 linux-headers-virtual-hwe-22.04 - 6.5.0.28.28 linux-headers-virtual-hwe-22.04-edge - 6.5.0.28.28 linux-image-extra-virtual - 6.5.0.28.28 linux-image-extra-virtual-hwe-22.04 - 6.5.0.28.28 linux-image-extra-virtual-hwe-22.04-edge - 6.5.0.28.28 linux-image-generic - 6.5.0.28.28 linux-image-generic-64k - 6.5.0.28.28 linux-image-generic-64k-hwe-22.04 - 6.5.0.28.28 linux-image-generic-64k-hwe-22.04-edge - 6.5.0.28.28 linux-image-generic-hwe-22.04 - 6.5.0.28.28 linux-image-generic-hwe-22.04-edge - 6.5.0.28.28 linux-image-generic-lpae - 6.5.0.28.28 linux-image-kvm - 6.5.0.28.28 linux-image-oem-20.04 - 6.5.0.28.28 linux-image-oem-20.04b - 6.5.0.28.28 linux-image-oem-20.04c - 6.5.0.28.28 linux-image-oem-20.04d - 6.5.0.28.28 linux-image-oem-22.04 - 6.5.0.28.28 linux-image-uc-generic - 6.5.0.28.28 linux-image-uc-generic-hwe-22.04 - 6.5.0.28.28 linux-image-uc-generic-hwe-22.04-edge - 6.5.0.28.28 linux-image-virtual - 6.5.0.28.28 linux-image-virtual-hwe-22.04 - 6.5.0.28.28 linux-image-virtual-hwe-22.04-edge - 6.5.0.28.28 linux-kvm - 6.5.0.28.28 linux-modules-ipu6-generic - 6.5.0.28.28 linux-modules-ipu6-generic-hwe-22.04 - 6.5.0.28.28 linux-modules-ipu6-generic-hwe-22.04-edge - 6.5.0.28.28 linux-modules-ipu6-oem-22.04 - 6.5.0.28.28 linux-modules-ivsc-generic - 6.5.0.28.28 linux-modules-ivsc-generic-hwe-22.04 - 6.5.0.28.28 linux-modules-ivsc-generic-hwe-22.04-edge - 6.5.0.28.28 linux-modules-ivsc-oem-22.04 - 6.5.0.28.28 linux-modules-iwlwifi-generic - 6.5.0.28.28 linux-modules-iwlwifi-generic-hwe-22.04 - 6.5.0.28.28 linux-modules-iwlwifi-generic-hwe-22.04-edge - 6.5.0.28.28 linux-modules-iwlwifi-oem-20.04 - 6.5.0.28.28 linux-modules-iwlwifi-oem-20.04d - 6.5.0.28.28 linux-modules-iwlwifi-oem-22.04 - 6.5.0.28.28 linux-oem-20.04 - 6.5.0.28.28 linux-oem-20.04b - 6.5.0.28.28 linux-oem-20.04c - 6.5.0.28.28 linux-oem-20.04d - 6.5.0.28.28 linux-oem-22.04 - 6.5.0.28.28 linux-source - 6.5.0.28.28 linux-tools-generic - 6.5.0.28.28 linux-tools-generic-64k - 6.5.0.28.28 linux-tools-generic-64k-hwe-22.04 - 6.5.0.28.28 linux-tools-generic-64k-hwe-22.04-edge - 6.5.0.28.28 linux-tools-generic-hwe-22.04 - 6.5.0.28.28 linux-tools-generic-hwe-22.04-edge - 6.5.0.28.28 linux-tools-generic-lpae - 6.5.0.28.28 linux-tools-kvm - 6.5.0.28.28 linux-tools-oem-20.04 - 6.5.0.28.28 linux-tools-oem-20.04b - 6.5.0.28.28 linux-tools-oem-20.04c - 6.5.0.28.28 linux-tools-oem-20.04d - 6.5.0.28.28 linux-tools-oem-22.04 - 6.5.0.28.28 linux-tools-virtual - 6.5.0.28.28 linux-tools-virtual-hwe-22.04 - 6.5.0.28.28 linux-tools-virtual-hwe-22.04-edge - 6.5.0.28.28 linux-virtual - 6.5.0.28.28 linux-virtual-hwe-22.04 - 6.5.0.28.28 linux-virtual-hwe-22.04-edge - 6.5.0.28.28 No subscription required linux-cloud-tools-lowlatency - 6.5.0.28.29.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.5.0.28.29.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.5.0.28.29.1 linux-cloud-tools-lowlatency-hwe-22.04 - 6.5.0.28.29.1 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.5.0.28.29.1 linux-headers-lowlatency - 6.5.0.28.29.1 linux-headers-lowlatency-64k - 6.5.0.28.29.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.5.0.28.29.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.5.0.28.29.1 linux-headers-lowlatency-64k-hwe-22.04 - 6.5.0.28.29.1 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.5.0.28.29.1 linux-headers-lowlatency-hwe-20.04 - 6.5.0.28.29.1 linux-headers-lowlatency-hwe-20.04-edge - 6.5.0.28.29.1 linux-headers-lowlatency-hwe-22.04 - 6.5.0.28.29.1 linux-headers-lowlatency-hwe-22.04-edge - 6.5.0.28.29.1 linux-image-lowlatency - 6.5.0.28.29.1 linux-image-lowlatency-64k - 6.5.0.28.29.1 linux-image-lowlatency-64k-hwe-20.04 - 6.5.0.28.29.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.5.0.28.29.1 linux-image-lowlatency-64k-hwe-22.04 - 6.5.0.28.29.1 linux-image-lowlatency-64k-hwe-22.04-edge - 6.5.0.28.29.1 linux-image-lowlatency-hwe-20.04 - 6.5.0.28.29.1 linux-image-lowlatency-hwe-20.04-edge - 6.5.0.28.29.1 linux-image-lowlatency-hwe-22.04 - 6.5.0.28.29.1 linux-image-lowlatency-hwe-22.04-edge - 6.5.0.28.29.1 linux-lowlatency - 6.5.0.28.29.1 linux-lowlatency-64k - 6.5.0.28.29.1 linux-lowlatency-64k-hwe-20.04 - 6.5.0.28.29.1 linux-lowlatency-64k-hwe-20.04-edge - 6.5.0.28.29.1 linux-lowlatency-64k-hwe-22.04 - 6.5.0.28.29.1 linux-lowlatency-64k-hwe-22.04-edge - 6.5.0.28.29.1 linux-lowlatency-hwe-20.04 - 6.5.0.28.29.1 linux-lowlatency-hwe-20.04-edge - 6.5.0.28.29.1 linux-lowlatency-hwe-22.04 - 6.5.0.28.29.1 linux-lowlatency-hwe-22.04-edge - 6.5.0.28.29.1 linux-modules-iwlwifi-lowlatency - 6.5.0.28.29.1 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.5.0.28.29.1 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.5.0.28.29.1 linux-tools-lowlatency - 6.5.0.28.29.1 linux-tools-lowlatency-64k - 6.5.0.28.29.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.5.0.28.29.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.5.0.28.29.1 linux-tools-lowlatency-64k-hwe-22.04 - 6.5.0.28.29.1 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.5.0.28.29.1 linux-tools-lowlatency-hwe-20.04 - 6.5.0.28.29.1 linux-tools-lowlatency-hwe-20.04-edge - 6.5.0.28.29.1 linux-tools-lowlatency-hwe-22.04 - 6.5.0.28.29.1 linux-tools-lowlatency-hwe-22.04-edge - 6.5.0.28.29.1 No subscription required Medium CVE-2023-52600 CVE-2023-52603 CVE-2024-26581 CVE-2024-26589 CVE-2024-26591 USN-6744-1 -- Pillow vulnerability Ubuntu 23.10 Hugo van Kemenade discovered that Pillow was not properly performing bounds checks when processing an ICC file, which could lead to a buffer overflow. If a user or automated system were tricked into processing a specially crafted ICC file, an attacker could possibly use this issue to cause a denial of service or execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6744-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-pil-doc - 10.0.0-1ubuntu0.2 python3-pil - 10.0.0-1ubuntu0.2 python3-pil.imagetk - 10.0.0-1ubuntu0.2 No subscription required Medium CVE-2024-28219 USN-6746-1 -- Google Guest Agent and Google OS Config Agent vulnerability Ubuntu 23.10 It was discovered that Google Guest Agent and Google OS Config Agent incorrectly handled certain JSON files. An attacker could possibly use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-6746-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: google-osconfig-agent - 20230504.00-0ubuntu2.2 No subscription required google-guest-agent - 20231004.02-0ubuntu1~23.10.3 No subscription required Medium CVE-2024-24786 USN-6748-1 -- Sanitize vulnerabilities Ubuntu 23.10 It was discovered that Sanitize incorrectly handled noscript elements under certain circumstances. An attacker could possibly use this issue to execute a cross-site scripting (XSS) attack. This issue only affected Ubuntu 22.04 LTS. (CVE-2023-23627) It was discovered that Sanitize incorrectly handled style elements under certain circumstances. An attacker could possibly use this issue to execute a cross-site scripting (XSS) attack. (CVE-2023-36823) Update Instructions: Run `sudo pro fix USN-6748-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ruby-sanitize - 6.0.0-1.1ubuntu0.23.10.1 No subscription required Medium CVE-2023-23627 CVE-2023-36823 USN-6749-1 -- FreeRDP vulnerabilities Ubuntu 23.10 It was discovered that FreeRDP incorrectly handled certain context resets. If a user were tricked into connecting to a malicious server, a remote attacker could use this issue to cause FreeRDP to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2024-22211) Evgeny Legerov discovered that FreeRDP incorrectly handled certain memory operations. If a user were tricked into connecting to a malicious server, a remote attacker could use this issue to cause FreeRDP to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2024-32039, CVE-2024-32040) Evgeny Legerov discovered that FreeRDP incorrectly handled certain memory operations. If a user were tricked into connecting to a malicious server, a remote attacker could possibly use this issue to cause FreeRDP to crash, resulting in a denial of service. (CVE-2024-32041, CVE-2024-32458, CVE-2024-32460) Evgeny Legerov discovered that FreeRDP incorrectly handled certain memory operations. A remote attacker could possibly use this issue to cause FreeRDP clients and servers to crash, resulting in a denial of service. (CVE-2024-32459) Update Instructions: Run `sudo pro fix USN-6749-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: freerdp2-dev - 2.10.0+dfsg1-1.1ubuntu1.2 freerdp2-shadow-x11 - 2.10.0+dfsg1-1.1ubuntu1.2 freerdp2-wayland - 2.10.0+dfsg1-1.1ubuntu1.2 freerdp2-x11 - 2.10.0+dfsg1-1.1ubuntu1.2 libfreerdp-client2-2 - 2.10.0+dfsg1-1.1ubuntu1.2 libfreerdp-server2-2 - 2.10.0+dfsg1-1.1ubuntu1.2 libfreerdp-shadow-subsystem2-2 - 2.10.0+dfsg1-1.1ubuntu1.2 libfreerdp-shadow2-2 - 2.10.0+dfsg1-1.1ubuntu1.2 libfreerdp2-2 - 2.10.0+dfsg1-1.1ubuntu1.2 libuwac0-0 - 2.10.0+dfsg1-1.1ubuntu1.2 libuwac0-dev - 2.10.0+dfsg1-1.1ubuntu1.2 libwinpr-tools2-2 - 2.10.0+dfsg1-1.1ubuntu1.2 libwinpr2-2 - 2.10.0+dfsg1-1.1ubuntu1.2 libwinpr2-dev - 2.10.0+dfsg1-1.1ubuntu1.2 winpr-utils - 2.10.0+dfsg1-1.1ubuntu1.2 No subscription required Medium CVE-2024-22211 CVE-2024-32039 CVE-2024-32040 CVE-2024-32041 CVE-2024-32458 CVE-2024-32459 CVE-2024-32460 USN-6750-1 -- Thunderbird vulnerabilities Ubuntu 23.10 Multiple security issues were discovered in Thunderbird. If a user were tricked into opening a specially crafted website in a browsing context, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information, bypass security restrictions, cross-site tracing, or execute arbitrary code. (CVE-2024-2609, CVE-2024-3852, CVE-2024-3864) Bartek Nowotarski discovered that Thunderbird did not properly limit HTTP/2 CONTINUATION frames. An attacker could potentially exploit this issue to cause a denial of service. (CVE-2024-3302) Lukas Bernhard discovered that Thunderbird did not properly manage memory during JIT optimisations, leading to an out-of-bounds read vulnerability. An attacker could possibly use this issue to cause a denial of service or expose sensitive information. (CVE-2024-3854) Lukas Bernhard discovered that Thunderbird did not properly manage memory when handling JIT created code during garbage collection. An attacker could potentially exploit this issue to cause a denial of service, or execute arbitrary code. (CVE-2024-3857) Ronald Crane discovered that Thunderbird did not properly manage memory in the OpenType sanitizer on 32-bit devices, leading to an out-of-bounds read vulnerability. An attacker could possibly use this issue to cause a denial of service or expose sensitive information. (CVE-2024-3859) Ronald Crane discovered that Thunderbird did not properly manage memory when handling an AlignedBuffer. An attacker could potentially exploit this issue to cause denial of service, or execute arbitrary code. (CVE-2024-3861) Update Instructions: Run `sudo pro fix USN-6750-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: thunderbird - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-dev - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-gnome-support - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-af - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-ar - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-ast - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-be - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-bg - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-bn - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-bn-bd - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-br - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-ca - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-cak - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-cs - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-cy - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-da - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-de - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-dsb - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-el - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-en - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-en-gb - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-en-us - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-es - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-es-ar - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-es-es - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-et - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-eu - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-fa - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-fi - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-fr - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-fy - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-fy-nl - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-ga - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-ga-ie - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-gd - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-gl - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-he - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-hr - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-hsb - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-hu - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-hy - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-id - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-is - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-it - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-ja - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-ka - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-kab - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-kk - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-ko - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-lt - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-lv - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-mk - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-ms - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-nb - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-nb-no - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-nl - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-nn - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-nn-no - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-pa - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-pa-in - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-pl - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-pt - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-pt-br - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-pt-pt - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-rm - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-ro - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-ru - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-si - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-sk - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-sl - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-sq - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-sr - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-sv - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-sv-se - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-ta - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-ta-lk - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-th - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-tr - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-uk - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-uz - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-vi - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-zh-cn - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-zh-hans - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-zh-hant - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-locale-zh-tw - 1:115.10.1+build1-0ubuntu0.23.10.1 thunderbird-mozsymbols - 1:115.10.1+build1-0ubuntu0.23.10.1 xul-ext-calendar-timezones - 1:115.10.1+build1-0ubuntu0.23.10.1 xul-ext-gdata-provider - 1:115.10.1+build1-0ubuntu0.23.10.1 xul-ext-lightning - 1:115.10.1+build1-0ubuntu0.23.10.1 No subscription required Medium CVE-2024-3852 CVE-2024-3854 CVE-2024-3857 CVE-2024-2609 CVE-2024-3859 CVE-2024-3861 CVE-2024-3302 CVE-2024-3864 USN-6752-1 -- FreeRDP vulnerabilities Ubuntu 23.10 It was discovered that FreeRDP incorrectly handled certain memory operations. If a user were tricked into connecting to a malicious server, a remote attacker could possibly use this issue to cause FreeRDP to crash, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-6752-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: freerdp2-dev - 2.10.0+dfsg1-1.1ubuntu1.3 freerdp2-shadow-x11 - 2.10.0+dfsg1-1.1ubuntu1.3 freerdp2-wayland - 2.10.0+dfsg1-1.1ubuntu1.3 freerdp2-x11 - 2.10.0+dfsg1-1.1ubuntu1.3 libfreerdp-client2-2 - 2.10.0+dfsg1-1.1ubuntu1.3 libfreerdp-server2-2 - 2.10.0+dfsg1-1.1ubuntu1.3 libfreerdp-shadow-subsystem2-2 - 2.10.0+dfsg1-1.1ubuntu1.3 libfreerdp-shadow2-2 - 2.10.0+dfsg1-1.1ubuntu1.3 libfreerdp2-2 - 2.10.0+dfsg1-1.1ubuntu1.3 libuwac0-0 - 2.10.0+dfsg1-1.1ubuntu1.3 libuwac0-dev - 2.10.0+dfsg1-1.1ubuntu1.3 libwinpr-tools2-2 - 2.10.0+dfsg1-1.1ubuntu1.3 libwinpr2-2 - 2.10.0+dfsg1-1.1ubuntu1.3 libwinpr2-dev - 2.10.0+dfsg1-1.1ubuntu1.3 winpr-utils - 2.10.0+dfsg1-1.1ubuntu1.3 No subscription required Low CVE-2024-32658 CVE-2024-32659 CVE-2024-32660 CVE-2024-32661 USN-6754-1 -- nghttp2 vulnerabilities Ubuntu 23.10 It was discovered that nghttp2 incorrectly handled the HTTP/2 implementation. A remote attacker could possibly use this issue to cause nghttp2 to consume resources, leading to a denial of service. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2019-9511, CVE-2019-9513) It was discovered that nghttp2 incorrectly handled request cancellation. A remote attacker could possibly use this issue to cause nghttp2 to consume resources, leading to a denial of service. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2023-44487) It was discovered that nghttp2 could be made to process an unlimited number of HTTP/2 CONTINUATION frames. A remote attacker could possibly use this issue to cause nghttp2 to consume resources, leading to a denial of service. (CVE-2024-28182) Update Instructions: Run `sudo pro fix USN-6754-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libnghttp2-14 - 1.55.1-1ubuntu0.2 libnghttp2-dev - 1.55.1-1ubuntu0.2 libnghttp2-doc - 1.55.1-1ubuntu0.2 nghttp2 - 1.55.1-1ubuntu0.2 nghttp2-client - 1.55.1-1ubuntu0.2 nghttp2-proxy - 1.55.1-1ubuntu0.2 nghttp2-server - 1.55.1-1ubuntu0.2 No subscription required Medium CVE-2019-9511 CVE-2019-9513 CVE-2023-44487 CVE-2024-28182 USN-6755-1 -- GNU cpio vulnerabilities Ubuntu 23.10 Ingo Brückl discovered that cpio contained a path traversal vulnerability. If a user or automated system were tricked into extracting a specially crafted cpio archive, an attacker could possibly use this issue to write arbitrary files outside the target directory on the host, even if using the option --no-absolute-filenames. Update Instructions: Run `sudo pro fix USN-6755-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: cpio - 2.13+dfsg-7.1ubuntu0.1 cpio-win32 - 2.13+dfsg-7.1ubuntu0.1 No subscription required Medium CVE-2023-7207 USN-6756-1 -- less vulnerability Ubuntu 23.10 It was discovered that less mishandled newline characters in file names. If a user or automated system were tricked into opening specially crafted files, an attacker could possibly use this issue to execute arbitrary commands on the host. Update Instructions: Run `sudo pro fix USN-6756-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: less - 590-2ubuntu0.23.10.2 No subscription required Medium CVE-2024-32487 USN-6757-2 -- PHP vulnerabilities Ubuntu 23.10 USN-6757-1 fixed vulnerabilities in PHP. Unfortunately these fixes were incomplete for Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 23.10. This update fixes the problem. Original advisory details: It was discovered that PHP incorrectly handled PHP_CLI_SERVER_WORKERS variable. An attacker could possibly use this issue to cause a crash or execute arbitrary code. This issue only affected Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-4900) It was discovered that PHP incorrectly handled certain cookies. An attacker could possibly use this issue to cookie by pass. (CVE-2024-2756) It was discovered that PHP incorrectly handled some passwords. An attacker could possibly use this issue to cause an account takeover attack. (CVE-2024-3096) Update Instructions: Run `sudo pro fix USN-6757-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libapache2-mod-php8.2 - 8.2.10-2ubuntu2.1 libphp8.2-embed - 8.2.10-2ubuntu2.1 php8.2 - 8.2.10-2ubuntu2.1 php8.2-bcmath - 8.2.10-2ubuntu2.1 php8.2-bz2 - 8.2.10-2ubuntu2.1 php8.2-cgi - 8.2.10-2ubuntu2.1 php8.2-cli - 8.2.10-2ubuntu2.1 php8.2-common - 8.2.10-2ubuntu2.1 php8.2-curl - 8.2.10-2ubuntu2.1 php8.2-dba - 8.2.10-2ubuntu2.1 php8.2-dev - 8.2.10-2ubuntu2.1 php8.2-enchant - 8.2.10-2ubuntu2.1 php8.2-fpm - 8.2.10-2ubuntu2.1 php8.2-gd - 8.2.10-2ubuntu2.1 php8.2-gmp - 8.2.10-2ubuntu2.1 php8.2-imap - 8.2.10-2ubuntu2.1 php8.2-interbase - 8.2.10-2ubuntu2.1 php8.2-intl - 8.2.10-2ubuntu2.1 php8.2-ldap - 8.2.10-2ubuntu2.1 php8.2-mbstring - 8.2.10-2ubuntu2.1 php8.2-mysql - 8.2.10-2ubuntu2.1 php8.2-odbc - 8.2.10-2ubuntu2.1 php8.2-opcache - 8.2.10-2ubuntu2.1 php8.2-pgsql - 8.2.10-2ubuntu2.1 php8.2-phpdbg - 8.2.10-2ubuntu2.1 php8.2-pspell - 8.2.10-2ubuntu2.1 php8.2-readline - 8.2.10-2ubuntu2.1 php8.2-snmp - 8.2.10-2ubuntu2.1 php8.2-soap - 8.2.10-2ubuntu2.1 php8.2-sqlite3 - 8.2.10-2ubuntu2.1 php8.2-sybase - 8.2.10-2ubuntu2.1 php8.2-tidy - 8.2.10-2ubuntu2.1 php8.2-xml - 8.2.10-2ubuntu2.1 php8.2-xsl - 8.2.10-2ubuntu2.1 php8.2-zip - 8.2.10-2ubuntu2.1 No subscription required Medium CVE-2022-4900 CVE-2024-2756 CVE-2024-3096 USN-6760-1 -- Gerbv vulnerability Ubuntu 23.10 George-Andrei Iosif and David Fernandez Gonzalez discovered that Gerbv did not properly initialize a data structure when parsing certain nested RS-274X format files. If a user were tricked into opening a specially crafted file, an attacker could possibly use this issue to cause a denial of service (application crash). Update Instructions: Run `sudo pro fix USN-6760-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gerbv - 2.9.8-1ubuntu0.1 No subscription required Low CVE-2023-4508 USN-6761-1 -- Anope vulnerability Ubuntu 23.10 It was discovered that Anope did not properly process credentials for suspended accounts. An attacker could possibly use this issue to normally login to the platform as a suspended user after changing their password. Update Instructions: Run `sudo pro fix USN-6761-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: anope - 2.0.12-1ubuntu0.23.10.1 No subscription required Medium CVE-2024-30187 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 2.2.9-1ubuntu0.23.10.1 1.2.0-6ubuntu0.23.10.1 20230206.0~ds2-1.3ubuntu0.1 2.2.1-4ubuntu1 2:2.7.2+samba4.18.6+dfsg-1ubuntu2.1 2:4.18.6+dfsg-1ubuntu2.1 8.0.0~rc2-0ubuntu1 8.0.100-8.0.0~rc2-0ubuntu1 8.0.100~rc2-0ubuntu1 8.2.1-1ubuntu3.1 10.01.2~dfsg1-0ubuntu2.1 6.0.123-0ubuntu1 7.0.112-0ubuntu1 6.0.124-0ubuntu1~23.10.1 7.0.113-0ubuntu1~23.10.1 1.12.11+20110422.1+1e14eea~dfsg-4ubuntu1.23.10.1 3.0.10-1ubuntu2.1 2:9.0.1672-1ubuntu2.1 2:21.1.7-3ubuntu2.1 2:23.2.0-1ubuntu0.1 6.5.0-10.10 6.5.0-10.10.1 6.5.0-1006.8 6.5.0-1008.8 6.5.0-1009.9 6.5.0-1011.11 6.5.0-1005.8 6.5.0-1003.4 4.96-17ubuntu2.1 8.0.35-0ubuntu0.23.10.1 2:12.3.0-1ubuntu0.1 1:115.4.1+build1-0ubuntu0.23.10.1 1.4-28+deb10u1build0.23.10.1 1.2.2-1ubuntu0.23.10.1 1.26.16-1ubuntu0.1 23.2+dfsg-1ubuntu0.1 1.6.21-1ubuntu0.23.10.1 2:4.0.3-1ubuntu1.23.10.1 6.0.125-0ubuntu1~23.10.1 7.0.114-0ubuntu1~23.10.1 8.0.0-0ubuntu1~23.10.1 8.0.100-0ubuntu1~23.10.1 8.0.100-8.0.0-0ubuntu1~23.10.1 8.4.4-1.1ubuntu1.1 2:5.6.0-11ubuntu0.23.10.1 2.6.5-0ubuntu1.1 3.20231114.0ubuntu0.23.10.1 4.1-6ubuntu0.23.10.1 0.8-10ubuntu1.1 5.9.11-1ubuntu1.1 2.42.2-0ubuntu0.23.10.1 1.0.1+git20230216.9ac1209f7-0ubuntu1.23.10.1 8.4.4-1.1ubuntu1.2 3.8.1-4ubuntu1.1 6.1-2ubuntu1.1 3.12.1-1ubuntu0.1 6.5.0-1004.5 6.5.0-1006.9 6.5.0-1007.9 6.5.0-1010.10 6.5.0-1012.12 6.5.0-13.13 6.5.0-13.13.1 3.4.6-0ubuntu0.23.10.1 1.55.1-1ubuntu0.1 2.4.57-2ubuntu2.1 10.3-5ubuntu0.1 1:115.5.0+build1-0ubuntu0.23.10.1 5.36.0-9ubuntu1.1 2.10.34-1ubuntu0.23.10.1 2.10.0+dfsg1-1.1ubuntu1.1 1.22.4-1ubuntu1.1 11.0.21+9-0ubuntu1~23.10 17.0.9+9-1~23.10 21.0.1+12-2~23.10 8u392-ga-1~23.10 4.4.4+dfsg-2ubuntu1.23.10.1 8.2.1-1ubuntu3.2 6.5.0-1005.6 6.5.0-1007.10 6.5.0-1008.11 6.5.0-1011.11 6.5.0-1013.13 6.5.0-14.14 6.5.0-14.14.1 6.5.0-1010.10 15.5-0ubuntu0.23.10.1 38.0.4-4ubuntu0.23.10.1 5.68-0ubuntu1.1 1.34+dfsg-1.2ubuntu1.1 2.42.3-0ubuntu0.23.10.1 4:0.9+LibO7.6.4-0ubuntu0.23.10.1 4:1.2.0+LibO7.6.4-0ubuntu0.23.10.1 4:102.12+LibO7.6.4-0ubuntu0.23.10.1 4:7.6.4-0ubuntu0.23.10.1 10.01.2~dfsg1-0ubuntu2.2 1:45.0-1ubuntu3.1 2:21.1.7-3ubuntu2.4 2:23.2.0-1ubuntu0.3 1.7.0-3.0ubuntu1 2:9.0.1672-1ubuntu2.2 0.3.6-5+deb10u1build0.23.10.1 3.8.0-11ubuntu0.1 1:9.3p1-1ubuntu3.1 0.10.5-3ubuntu1.1 1:115.6.0+build2-0ubuntu0.23.10.1 1:9.3p1-1ubuntu3.2 3.42.0-1ubuntu0.1 1:8.0.4+dfsg-1ubuntu3.23.10.2 1.0.4+dfsg-0ubuntu0.23.10.1 1.0.4-0ubuntu0.23.10.1 6.5.0-1009.9 6.5.0-1010.10 1.20.8-1ubuntu0.23.10.1 1.21.1-1ubuntu0.23.10.1 22.4.0-4ubuntu0.23.10.1 6.0.126-0ubuntu1~23.10.1 7.0.115-0ubuntu1~23.10.1 8.0.1-0ubuntu1~23.10.1 8.0.101-0ubuntu1~23.10.1 8.0.101-8.0.1-0ubuntu1~23.10.1 3.2.4+debian-1ubuntu0.23.10.1 0.5.3+git20230121-2ubuntu0.23.10.1 2.42.4-0ubuntu0.23.10.1 1.11.0-2ubuntu0.1 3.18.0+ds2-9.1ubuntu0.1 2:21.1.7-3ubuntu2.6 2:23.2.0-1ubuntu0.4 2:21.1.7-3ubuntu2.7 1.5.2-6ubuntu1.1 3.65.0-3ubuntu0.1 3.8.1-2ubuntu0.1 3.8.1-2ubuntu0.2 0.10.5-3ubuntu1.2 3.8.1-4ubuntu1.2 6.1-2ubuntu1.2 5.6.5-4ubuntu2.1 2.12.0-2ubuntu1.23.10.2 3.1.2-1ubuntu0.23.10.1 1:10.11.6-0ubuntu0.23.10.2 6.5.0-1006.7 6.5.0-1008.11 6.5.0-1009.12 6.5.0-1011.11 6.5.0-1012.12 6.5.0-1014.14 6.5.0-15.15 6.5.0-15.15.1 4.96-17ubuntu2.2 2.6.2-6ubuntu0.23.10.1 18.2.0-0ubuntu3.1 1:3.5.1-11ubuntu0.23.10.1 8.0.36-0ubuntu0.23.10.1 10.0.0-1ubuntu0.1 1.1.7-0ubuntu2.2 2.38-1ubuntu6.1 3.0.10-1ubuntu2.2 3:4.2.4-1ubuntu2.1 6.5.0-1007.8 6.5.0-1009.12 6.5.0-1010.13 6.5.0-1013.13 6.5.0-1015.15 6.5.0-17.17 6.5.0-17.17.1 4.6.1-0ubuntu1.1 2.42.5-0ubuntu0.23.10.2 1:9.18.18-0ubuntu2.1 6.0.127-0ubuntu1~23.10.1 7.0.116-0ubuntu1~23.10.1 8.0.102-0ubuntu1~23.10.1 8.0.102-8.0.2-0ubuntu1~23.10.1 8.0.2-0ubuntu1~23.10.1 1.0.5+dfsg-0ubuntu0.23.10.1 2023.05-2ubuntu0.1 1:4.13+dfsg1-1ubuntu1.1 2.0.0+~1.1.0-1ubuntu0.1 4.5.1+git230720-1ubuntu1.1 6.5.0-1008.9 6.5.0-1010.13 6.5.0-1011.14 6.5.0-1014.14 6.5.0-1016.16 6.5.0-21.21 6.5.0-21.21.1 6.5.0-1015.15 1.6.2+dfsg-1ubuntu0.1 15.6-0ubuntu0.23.10.1 2.90-0ubuntu0.23.10.1 2.9.14+dfsg-1.3ubuntu0.1 11.0.22+7-0ubuntu2~23.10.1 17.0.10+7-1~23.10.1 21.0.2+13-1~23.10.1 3.0.10-1ubuntu2.3 590-2ubuntu0.23.10.1 1.17.1-2ubuntu0.1 1.44.2-1ubuntu0.1 1:115.8.1+build1-0ubuntu0.23.10.1 18.13.0+dfsg1-1ubuntu2.1 38.0.4-4ubuntu0.23.10.2 3:4.2.4-1ubuntu2.2 1.19.1-3ubuntu0.1 1.0.12-2ubuntu0.1 1.5.1+ds-1ubuntu1.1 8.4.4-1.1ubuntu1.3 6.5.0-1009.10 6.5.0-1011.14 6.5.0-1012.15 6.5.0-1015.15 6.5.0-1018.18 6.5.0-25.25 6.5.0-25.25.1 6.5.0-1016.16 6.5.0-1015.15 2.2.4-3ubuntu0.1 3.2.2-0ubuntu0.23.10.1 23.09.0-1ubuntu0.1 7.0.117-0ubuntu1~23.10.1 8.0.103-0ubuntu1~23.10.1 8.0.103-8.0.3-0ubuntu1~23.10.1 8.0.3-0ubuntu1~23.10.1 2.5.0-2ubuntu0.1 2023.20230311.66589-6ubuntu0.1 8u402-ga-2ubuntu1~23.10.1 2:9.0.1672-1ubuntu2.3 6.5.0-1010.11 6.5.0-1013.16 6.5.0-1016.16 6.5.0-1017.17 6.5.0-1019.19 6.5.0-26.26 6.5.0-26.26.1 6.5.0-1012.15 6.5.0-1016.16 11.5.0-1ubuntu1.1 0.88.1ubuntu1.2 2.3.12-1ubuntu0.23.10.1 1:115.9.0+build1-0ubuntu0.23.10.1 8.2.1-1ubuntu3.3 1:2.39.1-4ubuntu2.1 2.39.1-4ubuntu2.1 1:2.39.1-4ubuntu2.2 2.39.1-4ubuntu2.2 2:21.1.7-3ubuntu2.8 2:23.2.0-1ubuntu0.5 2:21.1.7-3ubuntu2.9 2:23.2.0-1ubuntu0.6 6.5.0-1011.12 6.5.0-1013.16 6.5.0-1017.17 6.5.0-1018.19 6.5.0-1020.20 6.5.0-27.28 6.5.0-27.28.1 6.5.0-1014.17 2:3.98-0ubuntu0.23.10.1 6.1-2ubuntu1.3 2.4.57-2ubuntu2.4 0.9.28-2ubuntu0.1 2.44.0-0ubuntu0.23.10.1 3.8.1-4ubuntu1.3 9.6.0-1ubuntu1.1 18.13.0+dfsg1-1ubuntu2.2 2.0.13-1ubuntu0.1 2.38-1ubuntu6.2 6.5.0-1012.13 6.5.0-1014.17 6.5.0-1015.18 6.5.0-1018.18 6.5.0-1019.20 6.5.0-1021.21 6.5.0-28.29 6.5.0-28.29.1 10.0.0-1ubuntu0.2 20230504.00-0ubuntu2.2 20231004.02-0ubuntu1~23.10.3 6.0.0-1.1ubuntu0.23.10.1 2.10.0+dfsg1-1.1ubuntu1.2 1:115.10.1+build1-0ubuntu0.23.10.1 2.10.0+dfsg1-1.1ubuntu1.3 1.55.1-1ubuntu0.2 2.13+dfsg-7.1ubuntu0.1 590-2ubuntu0.23.10.2 8.2.10-2ubuntu2.1 2.9.8-1ubuntu0.1 2.0.12-1ubuntu0.23.10.1 ^mutt(?::\w+|)\s+(.*)$ ^libtommath-dev(?::\w+|)\s+(.*)$ ^libtommath-doc(?::\w+|)\s+(.*)$ ^libtommath1(?::\w+|)\s+(.*)$ ^jami(?::\w+|)\s+(.*)$ ^jami-daemon(?::\w+|)\s+(.*)$ ^libcue-dev(?::\w+|)\s+(.*)$ ^libcue2(?::\w+|)\s+(.*)$ ^ldb-tools(?::\w+|)\s+(.*)$ ^libldb-dev(?::\w+|)\s+(.*)$ ^libldb2(?::\w+|)\s+(.*)$ ^python3-ldb(?::\w+|)\s+(.*)$ ^python3-ldb-dev(?::\w+|)\s+(.*)$ ^ctdb(?::\w+|)\s+(.*)$ ^libnss-winbind(?::\w+|)\s+(.*)$ ^libpam-winbind(?::\w+|)\s+(.*)$ ^libsmbclient(?::\w+|)\s+(.*)$ ^libsmbclient-dev(?::\w+|)\s+(.*)$ ^libwbclient-dev(?::\w+|)\s+(.*)$ ^libwbclient0(?::\w+|)\s+(.*)$ ^python3-samba(?::\w+|)\s+(.*)$ ^registry-tools(?::\w+|)\s+(.*)$ ^samba(?::\w+|)\s+(.*)$ ^samba-ad-dc(?::\w+|)\s+(.*)$ ^samba-ad-provision(?::\w+|)\s+(.*)$ ^samba-common(?::\w+|)\s+(.*)$ ^samba-common-bin(?::\w+|)\s+(.*)$ ^samba-dev(?::\w+|)\s+(.*)$ ^samba-dsdb-modules(?::\w+|)\s+(.*)$ ^samba-libs(?::\w+|)\s+(.*)$ ^samba-testsuite(?::\w+|)\s+(.*)$ ^samba-vfs-modules(?::\w+|)\s+(.*)$ ^smbclient(?::\w+|)\s+(.*)$ ^winbind(?::\w+|)\s+(.*)$ ^aspnetcore-runtime-8.0(?::\w+|)\s+(.*)$ ^aspnetcore-targeting-pack-8.0(?::\w+|)\s+(.*)$ ^dotnet-apphost-pack-8.0(?::\w+|)\s+(.*)$ ^dotnet-host-8.0(?::\w+|)\s+(.*)$ ^dotnet-hostfxr-8.0(?::\w+|)\s+(.*)$ ^dotnet-runtime-8.0(?::\w+|)\s+(.*)$ ^dotnet-targeting-pack-8.0(?::\w+|)\s+(.*)$ ^dotnet8(?::\w+|)\s+(.*)$ ^dotnet-sdk-8.0(?::\w+|)\s+(.*)$ ^dotnet-sdk-8.0-source-built-artifacts(?::\w+|)\s+(.*)$ ^dotnet-templates-8.0(?::\w+|)\s+(.*)$ ^netstandard-targeting-pack-2.1-8.0(?::\w+|)\s+(.*)$ ^curl(?::\w+|)\s+(.*)$ ^libcurl3-gnutls(?::\w+|)\s+(.*)$ ^libcurl3-nss(?::\w+|)\s+(.*)$ ^libcurl4(?::\w+|)\s+(.*)$ ^libcurl4-doc(?::\w+|)\s+(.*)$ ^libcurl4-gnutls-dev(?::\w+|)\s+(.*)$ ^libcurl4-nss-dev(?::\w+|)\s+(.*)$ ^libcurl4-openssl-dev(?::\w+|)\s+(.*)$ ^ghostscript(?::\w+|)\s+(.*)$ ^ghostscript-doc(?::\w+|)\s+(.*)$ ^ghostscript-x(?::\w+|)\s+(.*)$ ^libgs-common(?::\w+|)\s+(.*)$ ^libgs-dev(?::\w+|)\s+(.*)$ ^libgs10(?::\w+|)\s+(.*)$ ^libgs10-common(?::\w+|)\s+(.*)$ ^libgs9-common(?::\w+|)\s+(.*)$ ^aspnetcore-runtime-6.0(?::\w+|)\s+(.*)$ ^aspnetcore-targeting-pack-6.0(?::\w+|)\s+(.*)$ ^dotnet-apphost-pack-6.0(?::\w+|)\s+(.*)$ ^dotnet-host(?::\w+|)\s+(.*)$ ^dotnet-hostfxr-6.0(?::\w+|)\s+(.*)$ ^dotnet-runtime-6.0(?::\w+|)\s+(.*)$ ^dotnet-sdk-6.0(?::\w+|)\s+(.*)$ ^dotnet-sdk-6.0-source-built-artifacts(?::\w+|)\s+(.*)$ ^dotnet-targeting-pack-6.0(?::\w+|)\s+(.*)$ ^dotnet-templates-6.0(?::\w+|)\s+(.*)$ ^dotnet6(?::\w+|)\s+(.*)$ ^netstandard-targeting-pack-2.1(?::\w+|)\s+(.*)$ ^aspnetcore-runtime-7.0(?::\w+|)\s+(.*)$ ^aspnetcore-targeting-pack-7.0(?::\w+|)\s+(.*)$ ^dotnet-apphost-pack-7.0(?::\w+|)\s+(.*)$ ^dotnet-host-7.0(?::\w+|)\s+(.*)$ ^dotnet-hostfxr-7.0(?::\w+|)\s+(.*)$ ^dotnet-runtime-7.0(?::\w+|)\s+(.*)$ ^dotnet-sdk-7.0(?::\w+|)\s+(.*)$ ^dotnet-sdk-7.0-source-built-artifacts(?::\w+|)\s+(.*)$ ^dotnet-targeting-pack-7.0(?::\w+|)\s+(.*)$ ^dotnet-templates-7.0(?::\w+|)\s+(.*)$ ^dotnet7(?::\w+|)\s+(.*)$ ^netstandard-targeting-pack-2.1-7.0(?::\w+|)\s+(.*)$ ^aspnetcore-runtime-6.0(?::\w+|)\s+(.*)$ ^aspnetcore-targeting-pack-6.0(?::\w+|)\s+(.*)$ ^dotnet-apphost-pack-6.0(?::\w+|)\s+(.*)$ ^dotnet-host(?::\w+|)\s+(.*)$ ^dotnet-hostfxr-6.0(?::\w+|)\s+(.*)$ ^dotnet-runtime-6.0(?::\w+|)\s+(.*)$ ^dotnet-sdk-6.0(?::\w+|)\s+(.*)$ ^dotnet-sdk-6.0-source-built-artifacts(?::\w+|)\s+(.*)$ ^dotnet-targeting-pack-6.0(?::\w+|)\s+(.*)$ ^dotnet-templates-6.0(?::\w+|)\s+(.*)$ ^dotnet6(?::\w+|)\s+(.*)$ ^netstandard-targeting-pack-2.1(?::\w+|)\s+(.*)$ ^aspnetcore-runtime-7.0(?::\w+|)\s+(.*)$ ^aspnetcore-targeting-pack-7.0(?::\w+|)\s+(.*)$ ^dotnet-apphost-pack-7.0(?::\w+|)\s+(.*)$ ^dotnet-host-7.0(?::\w+|)\s+(.*)$ ^dotnet-hostfxr-7.0(?::\w+|)\s+(.*)$ ^dotnet-runtime-7.0(?::\w+|)\s+(.*)$ ^dotnet-sdk-7.0(?::\w+|)\s+(.*)$ ^dotnet-sdk-7.0-source-built-artifacts(?::\w+|)\s+(.*)$ ^dotnet-targeting-pack-7.0(?::\w+|)\s+(.*)$ ^dotnet-templates-7.0(?::\w+|)\s+(.*)$ ^dotnet7(?::\w+|)\s+(.*)$ ^netstandard-targeting-pack-2.1-7.0(?::\w+|)\s+(.*)$ ^libsofia-sip-ua-dev(?::\w+|)\s+(.*)$ ^libsofia-sip-ua-glib-dev(?::\w+|)\s+(.*)$ ^libsofia-sip-ua-glib3(?::\w+|)\s+(.*)$ ^libsofia-sip-ua0(?::\w+|)\s+(.*)$ ^sofia-sip-bin(?::\w+|)\s+(.*)$ ^sofia-sip-doc(?::\w+|)\s+(.*)$ ^libssl-dev(?::\w+|)\s+(.*)$ ^libssl-doc(?::\w+|)\s+(.*)$ ^libssl3(?::\w+|)\s+(.*)$ ^openssl(?::\w+|)\s+(.*)$ ^vim(?::\w+|)\s+(.*)$ ^vim-athena(?::\w+|)\s+(.*)$ ^vim-common(?::\w+|)\s+(.*)$ ^vim-doc(?::\w+|)\s+(.*)$ ^vim-gtk3(?::\w+|)\s+(.*)$ ^vim-gui-common(?::\w+|)\s+(.*)$ ^vim-motif(?::\w+|)\s+(.*)$ ^vim-nox(?::\w+|)\s+(.*)$ ^vim-runtime(?::\w+|)\s+(.*)$ ^vim-tiny(?::\w+|)\s+(.*)$ ^xxd(?::\w+|)\s+(.*)$ ^xnest(?::\w+|)\s+(.*)$ ^xorg-server-source(?::\w+|)\s+(.*)$ ^xserver-common(?::\w+|)\s+(.*)$ ^xserver-xephyr(?::\w+|)\s+(.*)$ ^xserver-xorg-core(?::\w+|)\s+(.*)$ ^xserver-xorg-dev(?::\w+|)\s+(.*)$ ^xserver-xorg-legacy(?::\w+|)\s+(.*)$ ^xvfb(?::\w+|)\s+(.*)$ ^xwayland(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-generic|-generic-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-lowlatency|-lowlatency-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-raspi)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-azure|-azure-fde|-gcp)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-aws)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-oracle)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-laptop)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-starfive)(?::\w+|)\s+(.*)$ ^exim4(?::\w+|)\s+(.*)$ ^exim4-base(?::\w+|)\s+(.*)$ ^exim4-config(?::\w+|)\s+(.*)$ ^exim4-daemon-heavy(?::\w+|)\s+(.*)$ ^exim4-daemon-light(?::\w+|)\s+(.*)$ ^exim4-dev(?::\w+|)\s+(.*)$ ^eximon4(?::\w+|)\s+(.*)$ ^libmysqlclient-dev(?::\w+|)\s+(.*)$ ^libmysqlclient21(?::\w+|)\s+(.*)$ ^mysql-client(?::\w+|)\s+(.*)$ ^mysql-client-8.0(?::\w+|)\s+(.*)$ ^mysql-client-core-8.0(?::\w+|)\s+(.*)$ ^mysql-router(?::\w+|)\s+(.*)$ ^mysql-server(?::\w+|)\s+(.*)$ ^mysql-server-8.0(?::\w+|)\s+(.*)$ ^mysql-server-core-8.0(?::\w+|)\s+(.*)$ ^mysql-source-8.0(?::\w+|)\s+(.*)$ ^mysql-testsuite(?::\w+|)\s+(.*)$ ^mysql-testsuite-8.0(?::\w+|)\s+(.*)$ ^open-vm-tools(?::\w+|)\s+(.*)$ ^open-vm-tools-containerinfo(?::\w+|)\s+(.*)$ ^open-vm-tools-desktop(?::\w+|)\s+(.*)$ ^open-vm-tools-dev(?::\w+|)\s+(.*)$ ^open-vm-tools-salt-minion(?::\w+|)\s+(.*)$ ^open-vm-tools-sdmp(?::\w+|)\s+(.*)$ ^thunderbird(?::\w+|)\s+(.*)$ ^thunderbird-dev(?::\w+|)\s+(.*)$ ^thunderbird-gnome-support(?::\w+|)\s+(.*)$ ^thunderbird-locale-af(?::\w+|)\s+(.*)$ ^thunderbird-locale-ar(?::\w+|)\s+(.*)$ ^thunderbird-locale-ast(?::\w+|)\s+(.*)$ ^thunderbird-locale-be(?::\w+|)\s+(.*)$ ^thunderbird-locale-bg(?::\w+|)\s+(.*)$ ^thunderbird-locale-bn(?::\w+|)\s+(.*)$ ^thunderbird-locale-bn-bd(?::\w+|)\s+(.*)$ ^thunderbird-locale-br(?::\w+|)\s+(.*)$ ^thunderbird-locale-ca(?::\w+|)\s+(.*)$ ^thunderbird-locale-cak(?::\w+|)\s+(.*)$ ^thunderbird-locale-cs(?::\w+|)\s+(.*)$ ^thunderbird-locale-cy(?::\w+|)\s+(.*)$ ^thunderbird-locale-da(?::\w+|)\s+(.*)$ ^thunderbird-locale-de(?::\w+|)\s+(.*)$ ^thunderbird-locale-dsb(?::\w+|)\s+(.*)$ ^thunderbird-locale-el(?::\w+|)\s+(.*)$ ^thunderbird-locale-en(?::\w+|)\s+(.*)$ ^thunderbird-locale-en-gb(?::\w+|)\s+(.*)$ ^thunderbird-locale-en-us(?::\w+|)\s+(.*)$ ^thunderbird-locale-es(?::\w+|)\s+(.*)$ ^thunderbird-locale-es-ar(?::\w+|)\s+(.*)$ ^thunderbird-locale-es-es(?::\w+|)\s+(.*)$ ^thunderbird-locale-et(?::\w+|)\s+(.*)$ ^thunderbird-locale-eu(?::\w+|)\s+(.*)$ ^thunderbird-locale-fa(?::\w+|)\s+(.*)$ ^thunderbird-locale-fi(?::\w+|)\s+(.*)$ ^thunderbird-locale-fr(?::\w+|)\s+(.*)$ ^thunderbird-locale-fy(?::\w+|)\s+(.*)$ ^thunderbird-locale-fy-nl(?::\w+|)\s+(.*)$ ^thunderbird-locale-ga(?::\w+|)\s+(.*)$ ^thunderbird-locale-ga-ie(?::\w+|)\s+(.*)$ ^thunderbird-locale-gd(?::\w+|)\s+(.*)$ ^thunderbird-locale-gl(?::\w+|)\s+(.*)$ ^thunderbird-locale-he(?::\w+|)\s+(.*)$ ^thunderbird-locale-hr(?::\w+|)\s+(.*)$ ^thunderbird-locale-hsb(?::\w+|)\s+(.*)$ ^thunderbird-locale-hu(?::\w+|)\s+(.*)$ ^thunderbird-locale-hy(?::\w+|)\s+(.*)$ ^thunderbird-locale-id(?::\w+|)\s+(.*)$ ^thunderbird-locale-is(?::\w+|)\s+(.*)$ ^thunderbird-locale-it(?::\w+|)\s+(.*)$ ^thunderbird-locale-ja(?::\w+|)\s+(.*)$ ^thunderbird-locale-ka(?::\w+|)\s+(.*)$ ^thunderbird-locale-kab(?::\w+|)\s+(.*)$ ^thunderbird-locale-kk(?::\w+|)\s+(.*)$ ^thunderbird-locale-ko(?::\w+|)\s+(.*)$ ^thunderbird-locale-lt(?::\w+|)\s+(.*)$ ^thunderbird-locale-lv(?::\w+|)\s+(.*)$ ^thunderbird-locale-mk(?::\w+|)\s+(.*)$ ^thunderbird-locale-ms(?::\w+|)\s+(.*)$ ^thunderbird-locale-nb(?::\w+|)\s+(.*)$ ^thunderbird-locale-nb-no(?::\w+|)\s+(.*)$ ^thunderbird-locale-nl(?::\w+|)\s+(.*)$ ^thunderbird-locale-nn(?::\w+|)\s+(.*)$ ^thunderbird-locale-nn-no(?::\w+|)\s+(.*)$ ^thunderbird-locale-pa(?::\w+|)\s+(.*)$ ^thunderbird-locale-pa-in(?::\w+|)\s+(.*)$ ^thunderbird-locale-pl(?::\w+|)\s+(.*)$ ^thunderbird-locale-pt(?::\w+|)\s+(.*)$ ^thunderbird-locale-pt-br(?::\w+|)\s+(.*)$ ^thunderbird-locale-pt-pt(?::\w+|)\s+(.*)$ ^thunderbird-locale-rm(?::\w+|)\s+(.*)$ ^thunderbird-locale-ro(?::\w+|)\s+(.*)$ ^thunderbird-locale-ru(?::\w+|)\s+(.*)$ ^thunderbird-locale-si(?::\w+|)\s+(.*)$ ^thunderbird-locale-sk(?::\w+|)\s+(.*)$ ^thunderbird-locale-sl(?::\w+|)\s+(.*)$ ^thunderbird-locale-sq(?::\w+|)\s+(.*)$ ^thunderbird-locale-sr(?::\w+|)\s+(.*)$ ^thunderbird-locale-sv(?::\w+|)\s+(.*)$ ^thunderbird-locale-sv-se(?::\w+|)\s+(.*)$ ^thunderbird-locale-ta(?::\w+|)\s+(.*)$ ^thunderbird-locale-ta-lk(?::\w+|)\s+(.*)$ ^thunderbird-locale-th(?::\w+|)\s+(.*)$ ^thunderbird-locale-tr(?::\w+|)\s+(.*)$ ^thunderbird-locale-uk(?::\w+|)\s+(.*)$ ^thunderbird-locale-uz(?::\w+|)\s+(.*)$ ^thunderbird-locale-vi(?::\w+|)\s+(.*)$ ^thunderbird-locale-zh-cn(?::\w+|)\s+(.*)$ ^thunderbird-locale-zh-hans(?::\w+|)\s+(.*)$ ^thunderbird-locale-zh-hant(?::\w+|)\s+(.*)$ ^thunderbird-locale-zh-tw(?::\w+|)\s+(.*)$ ^thunderbird-mozsymbols(?::\w+|)\s+(.*)$ ^xul-ext-calendar-timezones(?::\w+|)\s+(.*)$ ^xul-ext-gdata-provider(?::\w+|)\s+(.*)$ ^xul-ext-lightning(?::\w+|)\s+(.*)$ ^libaxis-java(?::\w+|)\s+(.*)$ ^libaxis-java-doc(?::\w+|)\s+(.*)$ ^libsndfile1(?::\w+|)\s+(.*)$ ^libsndfile1-dev(?::\w+|)\s+(.*)$ ^sndfile-programs(?::\w+|)\s+(.*)$ ^python3-urllib3(?::\w+|)\s+(.*)$ ^python3-pip(?::\w+|)\s+(.*)$ ^python3-pip-whl(?::\w+|)\s+(.*)$ ^memcached(?::\w+|)\s+(.*)$ ^libproc2-0(?::\w+|)\s+(.*)$ ^libproc2-dev(?::\w+|)\s+(.*)$ ^procps(?::\w+|)\s+(.*)$ ^aspnetcore-runtime-6.0(?::\w+|)\s+(.*)$ ^aspnetcore-targeting-pack-6.0(?::\w+|)\s+(.*)$ ^dotnet-apphost-pack-6.0(?::\w+|)\s+(.*)$ ^dotnet-host(?::\w+|)\s+(.*)$ ^dotnet-hostfxr-6.0(?::\w+|)\s+(.*)$ ^dotnet-runtime-6.0(?::\w+|)\s+(.*)$ ^dotnet-sdk-6.0(?::\w+|)\s+(.*)$ ^dotnet-sdk-6.0-source-built-artifacts(?::\w+|)\s+(.*)$ ^dotnet-targeting-pack-6.0(?::\w+|)\s+(.*)$ ^dotnet-templates-6.0(?::\w+|)\s+(.*)$ ^dotnet6(?::\w+|)\s+(.*)$ ^netstandard-targeting-pack-2.1(?::\w+|)\s+(.*)$ ^aspnetcore-runtime-7.0(?::\w+|)\s+(.*)$ ^aspnetcore-targeting-pack-7.0(?::\w+|)\s+(.*)$ ^dotnet-apphost-pack-7.0(?::\w+|)\s+(.*)$ ^dotnet-host-7.0(?::\w+|)\s+(.*)$ ^dotnet-hostfxr-7.0(?::\w+|)\s+(.*)$ ^dotnet-runtime-7.0(?::\w+|)\s+(.*)$ ^dotnet-sdk-7.0(?::\w+|)\s+(.*)$ ^dotnet-sdk-7.0-source-built-artifacts(?::\w+|)\s+(.*)$ ^dotnet-targeting-pack-7.0(?::\w+|)\s+(.*)$ ^dotnet-templates-7.0(?::\w+|)\s+(.*)$ ^dotnet7(?::\w+|)\s+(.*)$ ^netstandard-targeting-pack-2.1-7.0(?::\w+|)\s+(.*)$ ^aspnetcore-runtime-8.0(?::\w+|)\s+(.*)$ ^aspnetcore-targeting-pack-8.0(?::\w+|)\s+(.*)$ ^dotnet-apphost-pack-8.0(?::\w+|)\s+(.*)$ ^dotnet-host-8.0(?::\w+|)\s+(.*)$ ^dotnet-hostfxr-8.0(?::\w+|)\s+(.*)$ ^dotnet-runtime-8.0(?::\w+|)\s+(.*)$ ^dotnet-targeting-pack-8.0(?::\w+|)\s+(.*)$ ^dotnet-sdk-8.0(?::\w+|)\s+(.*)$ ^dotnet-sdk-8.0-source-built-artifacts(?::\w+|)\s+(.*)$ ^dotnet-templates-8.0(?::\w+|)\s+(.*)$ ^netstandard-targeting-pack-2.1-8.0(?::\w+|)\s+(.*)$ ^dotnet8(?::\w+|)\s+(.*)$ ^frr(?::\w+|)\s+(.*)$ ^frr-doc(?::\w+|)\s+(.*)$ ^frr-pythontools(?::\w+|)\s+(.*)$ ^frr-rpki-rtrlib(?::\w+|)\s+(.*)$ ^frr-snmp(?::\w+|)\s+(.*)$ ^libtidy-dev(?::\w+|)\s+(.*)$ ^libtidy5deb1(?::\w+|)\s+(.*)$ ^tidy(?::\w+|)\s+(.*)$ ^openvpn(?::\w+|)\s+(.*)$ ^intel-microcode(?::\w+|)\s+(.*)$ ^libiniparser-dev(?::\w+|)\s+(.*)$ ^libiniparser-doc(?::\w+|)\s+(.*)$ ^libiniparser1(?::\w+|)\s+(.*)$ ^avahi-autoipd(?::\w+|)\s+(.*)$ ^avahi-daemon(?::\w+|)\s+(.*)$ ^avahi-discover(?::\w+|)\s+(.*)$ ^avahi-dnsconfd(?::\w+|)\s+(.*)$ ^avahi-ui-utils(?::\w+|)\s+(.*)$ ^avahi-utils(?::\w+|)\s+(.*)$ ^gir1.2-avahi-0.6(?::\w+|)\s+(.*)$ ^libavahi-client-dev(?::\w+|)\s+(.*)$ ^libavahi-client3(?::\w+|)\s+(.*)$ ^libavahi-common-data(?::\w+|)\s+(.*)$ ^libavahi-common-dev(?::\w+|)\s+(.*)$ ^libavahi-common3(?::\w+|)\s+(.*)$ ^libavahi-compat-libdnssd-dev(?::\w+|)\s+(.*)$ ^libavahi-compat-libdnssd1(?::\w+|)\s+(.*)$ ^libavahi-core-dev(?::\w+|)\s+(.*)$ ^libavahi-core7(?::\w+|)\s+(.*)$ ^libavahi-glib-dev(?::\w+|)\s+(.*)$ ^libavahi-glib1(?::\w+|)\s+(.*)$ ^libavahi-gobject-dev(?::\w+|)\s+(.*)$ ^libavahi-gobject0(?::\w+|)\s+(.*)$ ^libavahi-ui-gtk3-0(?::\w+|)\s+(.*)$ ^libavahi-ui-gtk3-dev(?::\w+|)\s+(.*)$ ^python3-avahi(?::\w+|)\s+(.*)$ ^charon-cmd(?::\w+|)\s+(.*)$ ^charon-systemd(?::\w+|)\s+(.*)$ ^libcharon-extauth-plugins(?::\w+|)\s+(.*)$ ^libcharon-extra-plugins(?::\w+|)\s+(.*)$ ^libstrongswan(?::\w+|)\s+(.*)$ ^libstrongswan-extra-plugins(?::\w+|)\s+(.*)$ ^libstrongswan-standard-plugins(?::\w+|)\s+(.*)$ ^strongswan(?::\w+|)\s+(.*)$ ^strongswan-charon(?::\w+|)\s+(.*)$ ^strongswan-libcharon(?::\w+|)\s+(.*)$ ^strongswan-nm(?::\w+|)\s+(.*)$ ^strongswan-pki(?::\w+|)\s+(.*)$ ^strongswan-starter(?::\w+|)\s+(.*)$ ^strongswan-swanctl(?::\w+|)\s+(.*)$ ^gir1.2-javascriptcoregtk-4.0(?::\w+|)\s+(.*)$ ^gir1.2-javascriptcoregtk-4.1(?::\w+|)\s+(.*)$ ^gir1.2-javascriptcoregtk-6.0(?::\w+|)\s+(.*)$ ^gir1.2-webkit-6.0(?::\w+|)\s+(.*)$ ^gir1.2-webkit2-4.0(?::\w+|)\s+(.*)$ ^gir1.2-webkit2-4.1(?::\w+|)\s+(.*)$ ^libjavascriptcoregtk-4.0-18(?::\w+|)\s+(.*)$ ^libjavascriptcoregtk-4.0-bin(?::\w+|)\s+(.*)$ ^libjavascriptcoregtk-4.0-dev(?::\w+|)\s+(.*)$ ^libjavascriptcoregtk-4.1-0(?::\w+|)\s+(.*)$ ^libjavascriptcoregtk-4.1-dev(?::\w+|)\s+(.*)$ ^libjavascriptcoregtk-6.0-1(?::\w+|)\s+(.*)$ ^libjavascriptcoregtk-6.0-dev(?::\w+|)\s+(.*)$ ^libwebkit2gtk-4.0-37(?::\w+|)\s+(.*)$ ^libwebkit2gtk-4.0-dev(?::\w+|)\s+(.*)$ ^libwebkit2gtk-4.0-doc(?::\w+|)\s+(.*)$ ^libwebkit2gtk-4.1-0(?::\w+|)\s+(.*)$ ^libwebkit2gtk-4.1-dev(?::\w+|)\s+(.*)$ ^libwebkitgtk-6.0-4(?::\w+|)\s+(.*)$ ^libwebkitgtk-6.0-dev(?::\w+|)\s+(.*)$ ^webkit2gtk-driver(?::\w+|)\s+(.*)$ ^hibagent(?::\w+|)\s+(.*)$ ^frr(?::\w+|)\s+(.*)$ ^frr-doc(?::\w+|)\s+(.*)$ ^frr-pythontools(?::\w+|)\s+(.*)$ ^frr-rpki-rtrlib(?::\w+|)\s+(.*)$ ^frr-snmp(?::\w+|)\s+(.*)$ ^gnutls-bin(?::\w+|)\s+(.*)$ ^gnutls-doc(?::\w+|)\s+(.*)$ ^libgnutls-dane0(?::\w+|)\s+(.*)$ ^libgnutls-openssl27(?::\w+|)\s+(.*)$ ^libgnutls28-dev(?::\w+|)\s+(.*)$ ^libgnutls30(?::\w+|)\s+(.*)$ ^squid(?::\w+|)\s+(.*)$ ^squid-cgi(?::\w+|)\s+(.*)$ ^squid-common(?::\w+|)\s+(.*)$ ^squid-openssl(?::\w+|)\s+(.*)$ ^squid-purge(?::\w+|)\s+(.*)$ ^squidclient(?::\w+|)\s+(.*)$ ^rabbitmq-server(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-starfive)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-laptop)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-raspi)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-aws)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-oracle)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-generic|-generic-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-lowlatency|-lowlatency-64k)(?::\w+|)\s+(.*)$ ^tracker-extract(?::\w+|)\s+(.*)$ ^tracker-miner-fs(?::\w+|)\s+(.*)$ ^libnghttp2-14(?::\w+|)\s+(.*)$ ^libnghttp2-dev(?::\w+|)\s+(.*)$ ^libnghttp2-doc(?::\w+|)\s+(.*)$ ^nghttp2(?::\w+|)\s+(.*)$ ^nghttp2-client(?::\w+|)\s+(.*)$ ^nghttp2-proxy(?::\w+|)\s+(.*)$ ^nghttp2-server(?::\w+|)\s+(.*)$ ^apache2(?::\w+|)\s+(.*)$ ^apache2-bin(?::\w+|)\s+(.*)$ ^apache2-data(?::\w+|)\s+(.*)$ ^apache2-dev(?::\w+|)\s+(.*)$ ^apache2-doc(?::\w+|)\s+(.*)$ ^apache2-ssl-dev(?::\w+|)\s+(.*)$ ^apache2-suexec-custom(?::\w+|)\s+(.*)$ ^apache2-suexec-pristine(?::\w+|)\s+(.*)$ ^apache2-utils(?::\w+|)\s+(.*)$ ^libapache2-mod-md(?::\w+|)\s+(.*)$ ^libapache2-mod-proxy-uwsgi(?::\w+|)\s+(.*)$ ^glusterfs-cli(?::\w+|)\s+(.*)$ ^glusterfs-client(?::\w+|)\s+(.*)$ ^glusterfs-common(?::\w+|)\s+(.*)$ ^glusterfs-server(?::\w+|)\s+(.*)$ ^libgfapi0(?::\w+|)\s+(.*)$ ^libgfchangelog0(?::\w+|)\s+(.*)$ ^libgfrpc0(?::\w+|)\s+(.*)$ ^libgfxdr0(?::\w+|)\s+(.*)$ ^libglusterd0(?::\w+|)\s+(.*)$ ^libglusterfs-dev(?::\w+|)\s+(.*)$ ^libglusterfs0(?::\w+|)\s+(.*)$ ^thunderbird(?::\w+|)\s+(.*)$ ^thunderbird-dev(?::\w+|)\s+(.*)$ ^thunderbird-gnome-support(?::\w+|)\s+(.*)$ ^thunderbird-locale-af(?::\w+|)\s+(.*)$ ^thunderbird-locale-ar(?::\w+|)\s+(.*)$ ^thunderbird-locale-ast(?::\w+|)\s+(.*)$ ^thunderbird-locale-be(?::\w+|)\s+(.*)$ ^thunderbird-locale-bg(?::\w+|)\s+(.*)$ ^thunderbird-locale-bn(?::\w+|)\s+(.*)$ ^thunderbird-locale-bn-bd(?::\w+|)\s+(.*)$ ^thunderbird-locale-br(?::\w+|)\s+(.*)$ ^thunderbird-locale-ca(?::\w+|)\s+(.*)$ ^thunderbird-locale-cak(?::\w+|)\s+(.*)$ ^thunderbird-locale-cs(?::\w+|)\s+(.*)$ ^thunderbird-locale-cy(?::\w+|)\s+(.*)$ ^thunderbird-locale-da(?::\w+|)\s+(.*)$ ^thunderbird-locale-de(?::\w+|)\s+(.*)$ ^thunderbird-locale-dsb(?::\w+|)\s+(.*)$ ^thunderbird-locale-el(?::\w+|)\s+(.*)$ ^thunderbird-locale-en(?::\w+|)\s+(.*)$ ^thunderbird-locale-en-gb(?::\w+|)\s+(.*)$ ^thunderbird-locale-en-us(?::\w+|)\s+(.*)$ ^thunderbird-locale-es(?::\w+|)\s+(.*)$ ^thunderbird-locale-es-ar(?::\w+|)\s+(.*)$ ^thunderbird-locale-es-es(?::\w+|)\s+(.*)$ ^thunderbird-locale-et(?::\w+|)\s+(.*)$ ^thunderbird-locale-eu(?::\w+|)\s+(.*)$ ^thunderbird-locale-fa(?::\w+|)\s+(.*)$ ^thunderbird-locale-fi(?::\w+|)\s+(.*)$ ^thunderbird-locale-fr(?::\w+|)\s+(.*)$ ^thunderbird-locale-fy(?::\w+|)\s+(.*)$ ^thunderbird-locale-fy-nl(?::\w+|)\s+(.*)$ ^thunderbird-locale-ga(?::\w+|)\s+(.*)$ ^thunderbird-locale-ga-ie(?::\w+|)\s+(.*)$ ^thunderbird-locale-gd(?::\w+|)\s+(.*)$ ^thunderbird-locale-gl(?::\w+|)\s+(.*)$ ^thunderbird-locale-he(?::\w+|)\s+(.*)$ ^thunderbird-locale-hr(?::\w+|)\s+(.*)$ ^thunderbird-locale-hsb(?::\w+|)\s+(.*)$ ^thunderbird-locale-hu(?::\w+|)\s+(.*)$ ^thunderbird-locale-hy(?::\w+|)\s+(.*)$ ^thunderbird-locale-id(?::\w+|)\s+(.*)$ ^thunderbird-locale-is(?::\w+|)\s+(.*)$ ^thunderbird-locale-it(?::\w+|)\s+(.*)$ ^thunderbird-locale-ja(?::\w+|)\s+(.*)$ ^thunderbird-locale-ka(?::\w+|)\s+(.*)$ ^thunderbird-locale-kab(?::\w+|)\s+(.*)$ ^thunderbird-locale-kk(?::\w+|)\s+(.*)$ ^thunderbird-locale-ko(?::\w+|)\s+(.*)$ ^thunderbird-locale-lt(?::\w+|)\s+(.*)$ ^thunderbird-locale-lv(?::\w+|)\s+(.*)$ ^thunderbird-locale-mk(?::\w+|)\s+(.*)$ ^thunderbird-locale-ms(?::\w+|)\s+(.*)$ ^thunderbird-locale-nb(?::\w+|)\s+(.*)$ ^thunderbird-locale-nb-no(?::\w+|)\s+(.*)$ ^thunderbird-locale-nl(?::\w+|)\s+(.*)$ ^thunderbird-locale-nn(?::\w+|)\s+(.*)$ ^thunderbird-locale-nn-no(?::\w+|)\s+(.*)$ ^thunderbird-locale-pa(?::\w+|)\s+(.*)$ ^thunderbird-locale-pa-in(?::\w+|)\s+(.*)$ ^thunderbird-locale-pl(?::\w+|)\s+(.*)$ ^thunderbird-locale-pt(?::\w+|)\s+(.*)$ ^thunderbird-locale-pt-br(?::\w+|)\s+(.*)$ ^thunderbird-locale-pt-pt(?::\w+|)\s+(.*)$ ^thunderbird-locale-rm(?::\w+|)\s+(.*)$ ^thunderbird-locale-ro(?::\w+|)\s+(.*)$ ^thunderbird-locale-ru(?::\w+|)\s+(.*)$ ^thunderbird-locale-si(?::\w+|)\s+(.*)$ ^thunderbird-locale-sk(?::\w+|)\s+(.*)$ ^thunderbird-locale-sl(?::\w+|)\s+(.*)$ ^thunderbird-locale-sq(?::\w+|)\s+(.*)$ ^thunderbird-locale-sr(?::\w+|)\s+(.*)$ ^thunderbird-locale-sv(?::\w+|)\s+(.*)$ ^thunderbird-locale-sv-se(?::\w+|)\s+(.*)$ ^thunderbird-locale-ta(?::\w+|)\s+(.*)$ ^thunderbird-locale-ta-lk(?::\w+|)\s+(.*)$ ^thunderbird-locale-th(?::\w+|)\s+(.*)$ ^thunderbird-locale-tr(?::\w+|)\s+(.*)$ ^thunderbird-locale-uk(?::\w+|)\s+(.*)$ ^thunderbird-locale-uz(?::\w+|)\s+(.*)$ ^thunderbird-locale-vi(?::\w+|)\s+(.*)$ ^thunderbird-locale-zh-cn(?::\w+|)\s+(.*)$ ^thunderbird-locale-zh-hans(?::\w+|)\s+(.*)$ ^thunderbird-locale-zh-hant(?::\w+|)\s+(.*)$ ^thunderbird-locale-zh-tw(?::\w+|)\s+(.*)$ ^thunderbird-mozsymbols(?::\w+|)\s+(.*)$ ^xul-ext-calendar-timezones(?::\w+|)\s+(.*)$ ^xul-ext-gdata-provider(?::\w+|)\s+(.*)$ ^xul-ext-lightning(?::\w+|)\s+(.*)$ ^libperl-dev(?::\w+|)\s+(.*)$ ^libperl5.36(?::\w+|)\s+(.*)$ ^perl(?::\w+|)\s+(.*)$ ^perl-base(?::\w+|)\s+(.*)$ ^perl-debug(?::\w+|)\s+(.*)$ ^perl-doc(?::\w+|)\s+(.*)$ ^perl-modules-5.36(?::\w+|)\s+(.*)$ ^gimp(?::\w+|)\s+(.*)$ ^gimp-data(?::\w+|)\s+(.*)$ ^libgimp2.0(?::\w+|)\s+(.*)$ ^libgimp2.0-dev(?::\w+|)\s+(.*)$ ^libgimp2.0-doc(?::\w+|)\s+(.*)$ ^freerdp2-dev(?::\w+|)\s+(.*)$ ^freerdp2-shadow-x11(?::\w+|)\s+(.*)$ ^freerdp2-wayland(?::\w+|)\s+(.*)$ ^freerdp2-x11(?::\w+|)\s+(.*)$ ^libfreerdp-client2-2(?::\w+|)\s+(.*)$ ^libfreerdp-server2-2(?::\w+|)\s+(.*)$ ^libfreerdp-shadow-subsystem2-2(?::\w+|)\s+(.*)$ ^libfreerdp-shadow2-2(?::\w+|)\s+(.*)$ ^libfreerdp2-2(?::\w+|)\s+(.*)$ ^libuwac0-0(?::\w+|)\s+(.*)$ ^libuwac0-dev(?::\w+|)\s+(.*)$ ^libwinpr-tools2-2(?::\w+|)\s+(.*)$ ^libwinpr2-2(?::\w+|)\s+(.*)$ ^libwinpr2-dev(?::\w+|)\s+(.*)$ ^winpr-utils(?::\w+|)\s+(.*)$ ^gir1.2-gst-plugins-bad-1.0(?::\w+|)\s+(.*)$ ^gstreamer1.0-opencv(?::\w+|)\s+(.*)$ ^gstreamer1.0-plugins-bad(?::\w+|)\s+(.*)$ ^gstreamer1.0-plugins-bad-apps(?::\w+|)\s+(.*)$ ^libgstreamer-opencv1.0-0(?::\w+|)\s+(.*)$ ^libgstreamer-plugins-bad1.0-0(?::\w+|)\s+(.*)$ ^libgstreamer-plugins-bad1.0-dev(?::\w+|)\s+(.*)$ ^openjdk-11-demo(?::\w+|)\s+(.*)$ ^openjdk-11-doc(?::\w+|)\s+(.*)$ ^openjdk-11-jdk(?::\w+|)\s+(.*)$ ^openjdk-11-jdk-headless(?::\w+|)\s+(.*)$ ^openjdk-11-jre(?::\w+|)\s+(.*)$ ^openjdk-11-jre-headless(?::\w+|)\s+(.*)$ ^openjdk-11-jre-zero(?::\w+|)\s+(.*)$ ^openjdk-11-source(?::\w+|)\s+(.*)$ ^openjdk-17-demo(?::\w+|)\s+(.*)$ ^openjdk-17-doc(?::\w+|)\s+(.*)$ ^openjdk-17-jdk(?::\w+|)\s+(.*)$ ^openjdk-17-jdk-headless(?::\w+|)\s+(.*)$ ^openjdk-17-jre(?::\w+|)\s+(.*)$ ^openjdk-17-jre-headless(?::\w+|)\s+(.*)$ ^openjdk-17-jre-zero(?::\w+|)\s+(.*)$ ^openjdk-17-source(?::\w+|)\s+(.*)$ ^openjdk-21-demo(?::\w+|)\s+(.*)$ ^openjdk-21-doc(?::\w+|)\s+(.*)$ ^openjdk-21-jdk(?::\w+|)\s+(.*)$ ^openjdk-21-jdk-headless(?::\w+|)\s+(.*)$ ^openjdk-21-jre(?::\w+|)\s+(.*)$ ^openjdk-21-jre-headless(?::\w+|)\s+(.*)$ ^openjdk-21-jre-zero(?::\w+|)\s+(.*)$ ^openjdk-21-source(?::\w+|)\s+(.*)$ ^openjdk-8-demo(?::\w+|)\s+(.*)$ ^openjdk-8-doc(?::\w+|)\s+(.*)$ ^openjdk-8-jdk(?::\w+|)\s+(.*)$ ^openjdk-8-jdk-headless(?::\w+|)\s+(.*)$ ^openjdk-8-jre(?::\w+|)\s+(.*)$ ^openjdk-8-jre-headless(?::\w+|)\s+(.*)$ ^openjdk-8-jre-zero(?::\w+|)\s+(.*)$ ^openjdk-8-source(?::\w+|)\s+(.*)$ ^request-tracker4(?::\w+|)\s+(.*)$ ^rt4-apache2(?::\w+|)\s+(.*)$ ^rt4-clients(?::\w+|)\s+(.*)$ ^rt4-db-mysql(?::\w+|)\s+(.*)$ ^rt4-db-postgresql(?::\w+|)\s+(.*)$ ^rt4-db-sqlite(?::\w+|)\s+(.*)$ ^rt4-doc-html(?::\w+|)\s+(.*)$ ^rt4-fcgi(?::\w+|)\s+(.*)$ ^rt4-standalone(?::\w+|)\s+(.*)$ ^curl(?::\w+|)\s+(.*)$ ^libcurl3-gnutls(?::\w+|)\s+(.*)$ ^libcurl3-nss(?::\w+|)\s+(.*)$ ^libcurl4(?::\w+|)\s+(.*)$ ^libcurl4-doc(?::\w+|)\s+(.*)$ ^libcurl4-gnutls-dev(?::\w+|)\s+(.*)$ ^libcurl4-nss-dev(?::\w+|)\s+(.*)$ ^libcurl4-openssl-dev(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-starfive)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-laptop)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-raspi)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-aws)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-oracle)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-generic|-generic-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-lowlatency|-lowlatency-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-gcp)(?::\w+|)\s+(.*)$ ^libecpg-compat3(?::\w+|)\s+(.*)$ ^libecpg-dev(?::\w+|)\s+(.*)$ ^libecpg6(?::\w+|)\s+(.*)$ ^libpgtypes3(?::\w+|)\s+(.*)$ ^libpq-dev(?::\w+|)\s+(.*)$ ^libpq5(?::\w+|)\s+(.*)$ ^postgresql-15(?::\w+|)\s+(.*)$ ^postgresql-client-15(?::\w+|)\s+(.*)$ ^postgresql-doc-15(?::\w+|)\s+(.*)$ ^postgresql-plperl-15(?::\w+|)\s+(.*)$ ^postgresql-plpython3-15(?::\w+|)\s+(.*)$ ^postgresql-pltcl-15(?::\w+|)\s+(.*)$ ^postgresql-server-dev-15(?::\w+|)\s+(.*)$ ^python-cryptography-doc(?::\w+|)\s+(.*)$ ^python3-cryptography(?::\w+|)\s+(.*)$ ^bluetooth(?::\w+|)\s+(.*)$ ^bluez(?::\w+|)\s+(.*)$ ^bluez-cups(?::\w+|)\s+(.*)$ ^bluez-hcidump(?::\w+|)\s+(.*)$ ^bluez-meshd(?::\w+|)\s+(.*)$ ^bluez-obexd(?::\w+|)\s+(.*)$ ^bluez-tests(?::\w+|)\s+(.*)$ ^libbluetooth-dev(?::\w+|)\s+(.*)$ ^libbluetooth3(?::\w+|)\s+(.*)$ ^tar(?::\w+|)\s+(.*)$ ^tar-scripts(?::\w+|)\s+(.*)$ ^gir1.2-javascriptcoregtk-4.0(?::\w+|)\s+(.*)$ ^gir1.2-javascriptcoregtk-4.1(?::\w+|)\s+(.*)$ ^gir1.2-javascriptcoregtk-6.0(?::\w+|)\s+(.*)$ ^gir1.2-webkit-6.0(?::\w+|)\s+(.*)$ ^gir1.2-webkit2-4.0(?::\w+|)\s+(.*)$ ^gir1.2-webkit2-4.1(?::\w+|)\s+(.*)$ ^libjavascriptcoregtk-4.0-18(?::\w+|)\s+(.*)$ ^libjavascriptcoregtk-4.0-bin(?::\w+|)\s+(.*)$ ^libjavascriptcoregtk-4.0-dev(?::\w+|)\s+(.*)$ ^libjavascriptcoregtk-4.1-0(?::\w+|)\s+(.*)$ ^libjavascriptcoregtk-4.1-dev(?::\w+|)\s+(.*)$ ^libjavascriptcoregtk-6.0-1(?::\w+|)\s+(.*)$ ^libjavascriptcoregtk-6.0-dev(?::\w+|)\s+(.*)$ ^libwebkit2gtk-4.0-37(?::\w+|)\s+(.*)$ ^libwebkit2gtk-4.0-dev(?::\w+|)\s+(.*)$ ^libwebkit2gtk-4.0-doc(?::\w+|)\s+(.*)$ ^libwebkit2gtk-4.1-0(?::\w+|)\s+(.*)$ ^libwebkit2gtk-4.1-dev(?::\w+|)\s+(.*)$ ^libwebkitgtk-6.0-4(?::\w+|)\s+(.*)$ ^libwebkitgtk-6.0-dev(?::\w+|)\s+(.*)$ ^webkit2gtk-driver(?::\w+|)\s+(.*)$ ^libreoffice-nlpsolver(?::\w+|)\s+(.*)$ ^libreoffice-wiki-publisher(?::\w+|)\s+(.*)$ ^fonts-opensymbol(?::\w+|)\s+(.*)$ ^gir1.2-lokdocview-0.1(?::\w+|)\s+(.*)$ ^libjuh-java(?::\w+|)\s+(.*)$ ^libjurt-java(?::\w+|)\s+(.*)$ ^liblibreoffice-java(?::\w+|)\s+(.*)$ ^liblibreofficekitgtk(?::\w+|)\s+(.*)$ ^libofficebean-java(?::\w+|)\s+(.*)$ ^libreoffice(?::\w+|)\s+(.*)$ ^libreoffice-base(?::\w+|)\s+(.*)$ ^libreoffice-base-core(?::\w+|)\s+(.*)$ ^libreoffice-base-drivers(?::\w+|)\s+(.*)$ ^libreoffice-base-nogui(?::\w+|)\s+(.*)$ ^libreoffice-calc(?::\w+|)\s+(.*)$ ^libreoffice-calc-nogui(?::\w+|)\s+(.*)$ ^libreoffice-common(?::\w+|)\s+(.*)$ ^libreoffice-core(?::\w+|)\s+(.*)$ ^libreoffice-core-nogui(?::\w+|)\s+(.*)$ ^libreoffice-dev(?::\w+|)\s+(.*)$ ^libreoffice-dev-common(?::\w+|)\s+(.*)$ ^libreoffice-dev-doc(?::\w+|)\s+(.*)$ ^libreoffice-dev-gui(?::\w+|)\s+(.*)$ ^libreoffice-draw(?::\w+|)\s+(.*)$ ^libreoffice-draw-nogui(?::\w+|)\s+(.*)$ ^libreoffice-evolution(?::\w+|)\s+(.*)$ ^libreoffice-gnome(?::\w+|)\s+(.*)$ ^libreoffice-gtk3(?::\w+|)\s+(.*)$ ^libreoffice-gtk4(?::\w+|)\s+(.*)$ ^libreoffice-help-ca(?::\w+|)\s+(.*)$ ^libreoffice-help-common(?::\w+|)\s+(.*)$ ^libreoffice-help-cs(?::\w+|)\s+(.*)$ ^libreoffice-help-da(?::\w+|)\s+(.*)$ ^libreoffice-help-de(?::\w+|)\s+(.*)$ ^libreoffice-help-dz(?::\w+|)\s+(.*)$ ^libreoffice-help-el(?::\w+|)\s+(.*)$ ^libreoffice-help-en-gb(?::\w+|)\s+(.*)$ ^libreoffice-help-en-us(?::\w+|)\s+(.*)$ ^libreoffice-help-es(?::\w+|)\s+(.*)$ ^libreoffice-help-et(?::\w+|)\s+(.*)$ ^libreoffice-help-eu(?::\w+|)\s+(.*)$ ^libreoffice-help-fi(?::\w+|)\s+(.*)$ ^libreoffice-help-fr(?::\w+|)\s+(.*)$ ^libreoffice-help-gl(?::\w+|)\s+(.*)$ ^libreoffice-help-hi(?::\w+|)\s+(.*)$ ^libreoffice-help-hu(?::\w+|)\s+(.*)$ ^libreoffice-help-id(?::\w+|)\s+(.*)$ ^libreoffice-help-it(?::\w+|)\s+(.*)$ ^libreoffice-help-ja(?::\w+|)\s+(.*)$ ^libreoffice-help-km(?::\w+|)\s+(.*)$ ^libreoffice-help-ko(?::\w+|)\s+(.*)$ ^libreoffice-help-nl(?::\w+|)\s+(.*)$ ^libreoffice-help-om(?::\w+|)\s+(.*)$ ^libreoffice-help-pl(?::\w+|)\s+(.*)$ ^libreoffice-help-pt(?::\w+|)\s+(.*)$ ^libreoffice-help-pt-br(?::\w+|)\s+(.*)$ ^libreoffice-help-ru(?::\w+|)\s+(.*)$ ^libreoffice-help-sk(?::\w+|)\s+(.*)$ ^libreoffice-help-sl(?::\w+|)\s+(.*)$ ^libreoffice-help-sv(?::\w+|)\s+(.*)$ ^libreoffice-help-tr(?::\w+|)\s+(.*)$ ^libreoffice-help-vi(?::\w+|)\s+(.*)$ ^libreoffice-help-zh-cn(?::\w+|)\s+(.*)$ ^libreoffice-help-zh-tw(?::\w+|)\s+(.*)$ ^libreoffice-impress(?::\w+|)\s+(.*)$ ^libreoffice-impress-nogui(?::\w+|)\s+(.*)$ ^libreoffice-java-common(?::\w+|)\s+(.*)$ ^libreoffice-kf5(?::\w+|)\s+(.*)$ ^libreoffice-l10n-af(?::\w+|)\s+(.*)$ ^libreoffice-l10n-am(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ar(?::\w+|)\s+(.*)$ ^libreoffice-l10n-as(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ast(?::\w+|)\s+(.*)$ ^libreoffice-l10n-be(?::\w+|)\s+(.*)$ ^libreoffice-l10n-bg(?::\w+|)\s+(.*)$ ^libreoffice-l10n-bn(?::\w+|)\s+(.*)$ ^libreoffice-l10n-br(?::\w+|)\s+(.*)$ ^libreoffice-l10n-bs(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ca(?::\w+|)\s+(.*)$ ^libreoffice-l10n-cs(?::\w+|)\s+(.*)$ ^libreoffice-l10n-cy(?::\w+|)\s+(.*)$ ^libreoffice-l10n-da(?::\w+|)\s+(.*)$ ^libreoffice-l10n-de(?::\w+|)\s+(.*)$ ^libreoffice-l10n-dz(?::\w+|)\s+(.*)$ ^libreoffice-l10n-el(?::\w+|)\s+(.*)$ ^libreoffice-l10n-en-gb(?::\w+|)\s+(.*)$ ^libreoffice-l10n-en-za(?::\w+|)\s+(.*)$ ^libreoffice-l10n-eo(?::\w+|)\s+(.*)$ ^libreoffice-l10n-es(?::\w+|)\s+(.*)$ ^libreoffice-l10n-et(?::\w+|)\s+(.*)$ ^libreoffice-l10n-eu(?::\w+|)\s+(.*)$ ^libreoffice-l10n-fa(?::\w+|)\s+(.*)$ ^libreoffice-l10n-fi(?::\w+|)\s+(.*)$ ^libreoffice-l10n-fr(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ga(?::\w+|)\s+(.*)$ ^libreoffice-l10n-gd(?::\w+|)\s+(.*)$ ^libreoffice-l10n-gl(?::\w+|)\s+(.*)$ ^libreoffice-l10n-gu(?::\w+|)\s+(.*)$ ^libreoffice-l10n-gug(?::\w+|)\s+(.*)$ ^libreoffice-l10n-he(?::\w+|)\s+(.*)$ ^libreoffice-l10n-hi(?::\w+|)\s+(.*)$ ^libreoffice-l10n-hr(?::\w+|)\s+(.*)$ ^libreoffice-l10n-hu(?::\w+|)\s+(.*)$ ^libreoffice-l10n-id(?::\w+|)\s+(.*)$ ^libreoffice-l10n-in(?::\w+|)\s+(.*)$ ^libreoffice-l10n-is(?::\w+|)\s+(.*)$ ^libreoffice-l10n-it(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ja(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ka(?::\w+|)\s+(.*)$ ^libreoffice-l10n-kk(?::\w+|)\s+(.*)$ ^libreoffice-l10n-km(?::\w+|)\s+(.*)$ ^libreoffice-l10n-kmr(?::\w+|)\s+(.*)$ ^libreoffice-l10n-kn(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ko(?::\w+|)\s+(.*)$ ^libreoffice-l10n-lt(?::\w+|)\s+(.*)$ ^libreoffice-l10n-lv(?::\w+|)\s+(.*)$ ^libreoffice-l10n-mk(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ml(?::\w+|)\s+(.*)$ ^libreoffice-l10n-mn(?::\w+|)\s+(.*)$ ^libreoffice-l10n-mr(?::\w+|)\s+(.*)$ ^libreoffice-l10n-nb(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ne(?::\w+|)\s+(.*)$ ^libreoffice-l10n-nl(?::\w+|)\s+(.*)$ ^libreoffice-l10n-nn(?::\w+|)\s+(.*)$ ^libreoffice-l10n-nr(?::\w+|)\s+(.*)$ ^libreoffice-l10n-nso(?::\w+|)\s+(.*)$ ^libreoffice-l10n-oc(?::\w+|)\s+(.*)$ ^libreoffice-l10n-om(?::\w+|)\s+(.*)$ ^libreoffice-l10n-or(?::\w+|)\s+(.*)$ ^libreoffice-l10n-pa-in(?::\w+|)\s+(.*)$ ^libreoffice-l10n-pl(?::\w+|)\s+(.*)$ ^libreoffice-l10n-pt(?::\w+|)\s+(.*)$ ^libreoffice-l10n-pt-br(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ro(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ru(?::\w+|)\s+(.*)$ ^libreoffice-l10n-rw(?::\w+|)\s+(.*)$ ^libreoffice-l10n-si(?::\w+|)\s+(.*)$ ^libreoffice-l10n-sk(?::\w+|)\s+(.*)$ ^libreoffice-l10n-sl(?::\w+|)\s+(.*)$ ^libreoffice-l10n-sr(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ss(?::\w+|)\s+(.*)$ ^libreoffice-l10n-st(?::\w+|)\s+(.*)$ ^libreoffice-l10n-sv(?::\w+|)\s+(.*)$ ^libreoffice-l10n-szl(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ta(?::\w+|)\s+(.*)$ ^libreoffice-l10n-te(?::\w+|)\s+(.*)$ ^libreoffice-l10n-tg(?::\w+|)\s+(.*)$ ^libreoffice-l10n-th(?::\w+|)\s+(.*)$ ^libreoffice-l10n-tn(?::\w+|)\s+(.*)$ ^libreoffice-l10n-tr(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ts(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ug(?::\w+|)\s+(.*)$ ^libreoffice-l10n-uk(?::\w+|)\s+(.*)$ ^libreoffice-l10n-uz(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ve(?::\w+|)\s+(.*)$ ^libreoffice-l10n-vi(?::\w+|)\s+(.*)$ ^libreoffice-l10n-xh(?::\w+|)\s+(.*)$ ^libreoffice-l10n-za(?::\w+|)\s+(.*)$ ^libreoffice-l10n-zh-cn(?::\w+|)\s+(.*)$ ^libreoffice-l10n-zh-tw(?::\w+|)\s+(.*)$ ^libreoffice-l10n-zu(?::\w+|)\s+(.*)$ ^libreoffice-librelogo(?::\w+|)\s+(.*)$ ^libreoffice-math(?::\w+|)\s+(.*)$ ^libreoffice-math-nogui(?::\w+|)\s+(.*)$ ^libreoffice-nogui(?::\w+|)\s+(.*)$ ^libreoffice-officebean(?::\w+|)\s+(.*)$ ^libreoffice-plasma(?::\w+|)\s+(.*)$ ^libreoffice-qt5(?::\w+|)\s+(.*)$ ^libreoffice-qt6(?::\w+|)\s+(.*)$ ^libreoffice-report-builder(?::\w+|)\s+(.*)$ ^libreoffice-report-builder-bin(?::\w+|)\s+(.*)$ ^libreoffice-report-builder-bin-nogui(?::\w+|)\s+(.*)$ ^libreoffice-script-provider-bsh(?::\w+|)\s+(.*)$ ^libreoffice-script-provider-js(?::\w+|)\s+(.*)$ ^libreoffice-script-provider-python(?::\w+|)\s+(.*)$ ^libreoffice-sdbc-firebird(?::\w+|)\s+(.*)$ ^libreoffice-sdbc-hsqldb(?::\w+|)\s+(.*)$ ^libreoffice-sdbc-mysql(?::\w+|)\s+(.*)$ ^libreoffice-sdbc-postgresql(?::\w+|)\s+(.*)$ ^libreoffice-smoketest-data(?::\w+|)\s+(.*)$ ^libreoffice-style-breeze(?::\w+|)\s+(.*)$ ^libreoffice-style-colibre(?::\w+|)\s+(.*)$ ^libreoffice-style-elementary(?::\w+|)\s+(.*)$ ^libreoffice-style-karasa-jaga(?::\w+|)\s+(.*)$ ^libreoffice-style-sifr(?::\w+|)\s+(.*)$ ^libreoffice-style-sukapura(?::\w+|)\s+(.*)$ ^libreoffice-style-tango(?::\w+|)\s+(.*)$ ^libreoffice-style-yaru(?::\w+|)\s+(.*)$ ^libreoffice-subsequentcheckbase(?::\w+|)\s+(.*)$ ^libreoffice-uiconfig-base(?::\w+|)\s+(.*)$ ^libreoffice-uiconfig-calc(?::\w+|)\s+(.*)$ ^libreoffice-uiconfig-common(?::\w+|)\s+(.*)$ ^libreoffice-uiconfig-draw(?::\w+|)\s+(.*)$ ^libreoffice-uiconfig-impress(?::\w+|)\s+(.*)$ ^libreoffice-uiconfig-math(?::\w+|)\s+(.*)$ ^libreoffice-uiconfig-report-builder(?::\w+|)\s+(.*)$ ^libreoffice-uiconfig-writer(?::\w+|)\s+(.*)$ ^libreoffice-writer(?::\w+|)\s+(.*)$ ^libreoffice-writer-nogui(?::\w+|)\s+(.*)$ ^libreofficekit-data(?::\w+|)\s+(.*)$ ^libreofficekit-dev(?::\w+|)\s+(.*)$ ^libridl-java(?::\w+|)\s+(.*)$ ^libuno-cppu3(?::\w+|)\s+(.*)$ ^libuno-cppuhelpergcc3-3(?::\w+|)\s+(.*)$ ^libuno-purpenvhelpergcc3-3(?::\w+|)\s+(.*)$ ^libuno-sal3(?::\w+|)\s+(.*)$ ^libuno-salhelpergcc3-3(?::\w+|)\s+(.*)$ ^libunoil-java(?::\w+|)\s+(.*)$ ^libunoloader-java(?::\w+|)\s+(.*)$ ^python3-access2base(?::\w+|)\s+(.*)$ ^python3-scriptforge(?::\w+|)\s+(.*)$ ^python3-uno(?::\w+|)\s+(.*)$ ^uno-libs-private(?::\w+|)\s+(.*)$ ^ure(?::\w+|)\s+(.*)$ ^ure-java(?::\w+|)\s+(.*)$ ^ghostscript(?::\w+|)\s+(.*)$ ^ghostscript-doc(?::\w+|)\s+(.*)$ ^ghostscript-x(?::\w+|)\s+(.*)$ ^libgs-common(?::\w+|)\s+(.*)$ ^libgs-dev(?::\w+|)\s+(.*)$ ^libgs10(?::\w+|)\s+(.*)$ ^libgs10-common(?::\w+|)\s+(.*)$ ^libgs9-common(?::\w+|)\s+(.*)$ ^gnome-control-center(?::\w+|)\s+(.*)$ ^gnome-control-center-data(?::\w+|)\s+(.*)$ ^gnome-control-center-dev(?::\w+|)\s+(.*)$ ^gnome-control-center-faces(?::\w+|)\s+(.*)$ ^xnest(?::\w+|)\s+(.*)$ ^xorg-server-source(?::\w+|)\s+(.*)$ ^xserver-common(?::\w+|)\s+(.*)$ ^xserver-xephyr(?::\w+|)\s+(.*)$ ^xserver-xorg-core(?::\w+|)\s+(.*)$ ^xserver-xorg-dev(?::\w+|)\s+(.*)$ ^xserver-xorg-legacy(?::\w+|)\s+(.*)$ ^xvfb(?::\w+|)\s+(.*)$ ^xwayland(?::\w+|)\s+(.*)$ ^budgie-app-launcher-applet(?::\w+|)\s+(.*)$ ^budgie-applications-menu-applet(?::\w+|)\s+(.*)$ ^budgie-brightness-controller-applet(?::\w+|)\s+(.*)$ ^budgie-clockworks-applet(?::\w+|)\s+(.*)$ ^budgie-countdown-applet(?::\w+|)\s+(.*)$ ^budgie-dropby-applet(?::\w+|)\s+(.*)$ ^budgie-extras-common(?::\w+|)\s+(.*)$ ^budgie-extras-daemon(?::\w+|)\s+(.*)$ ^budgie-fuzzyclock-applet(?::\w+|)\s+(.*)$ ^budgie-hotcorners-applet(?::\w+|)\s+(.*)$ ^budgie-kangaroo-applet(?::\w+|)\s+(.*)$ ^budgie-keyboard-autoswitch-applet(?::\w+|)\s+(.*)$ ^budgie-network-manager-applet(?::\w+|)\s+(.*)$ ^budgie-previews(?::\w+|)\s+(.*)$ ^budgie-quickchar(?::\w+|)\s+(.*)$ ^budgie-quicknote-applet(?::\w+|)\s+(.*)$ ^budgie-recentlyused-applet(?::\w+|)\s+(.*)$ ^budgie-rotation-lock-applet(?::\w+|)\s+(.*)$ ^budgie-showtime-applet(?::\w+|)\s+(.*)$ ^budgie-takeabreak-applet(?::\w+|)\s+(.*)$ ^budgie-trash-applet(?::\w+|)\s+(.*)$ ^budgie-visualspace-applet(?::\w+|)\s+(.*)$ ^budgie-wallstreet(?::\w+|)\s+(.*)$ ^budgie-weathershow-applet(?::\w+|)\s+(.*)$ ^budgie-window-shuffler(?::\w+|)\s+(.*)$ ^budgie-workspace-stopwatch-applet(?::\w+|)\s+(.*)$ ^budgie-workspace-wallpaper-applet(?::\w+|)\s+(.*)$ ^vim(?::\w+|)\s+(.*)$ ^vim-athena(?::\w+|)\s+(.*)$ ^vim-common(?::\w+|)\s+(.*)$ ^vim-doc(?::\w+|)\s+(.*)$ ^vim-gtk3(?::\w+|)\s+(.*)$ ^vim-gui-common(?::\w+|)\s+(.*)$ ^vim-motif(?::\w+|)\s+(.*)$ ^vim-nox(?::\w+|)\s+(.*)$ ^vim-runtime(?::\w+|)\s+(.*)$ ^vim-tiny(?::\w+|)\s+(.*)$ ^xxd(?::\w+|)\s+(.*)$ ^audiofile-tools(?::\w+|)\s+(.*)$ ^libaudiofile-dev(?::\w+|)\s+(.*)$ ^libaudiofile1(?::\w+|)\s+(.*)$ ^libzookeeper-java(?::\w+|)\s+(.*)$ ^libzookeeper-java-doc(?::\w+|)\s+(.*)$ ^libzookeeper-mt-dev(?::\w+|)\s+(.*)$ ^libzookeeper-mt2(?::\w+|)\s+(.*)$ ^libzookeeper-st-dev(?::\w+|)\s+(.*)$ ^libzookeeper-st2(?::\w+|)\s+(.*)$ ^python3-zookeeper(?::\w+|)\s+(.*)$ ^zookeeper(?::\w+|)\s+(.*)$ ^zookeeper-bin(?::\w+|)\s+(.*)$ ^zookeeperd(?::\w+|)\s+(.*)$ ^openssh-client(?::\w+|)\s+(.*)$ ^openssh-server(?::\w+|)\s+(.*)$ ^openssh-sftp-server(?::\w+|)\s+(.*)$ ^openssh-tests(?::\w+|)\s+(.*)$ ^ssh(?::\w+|)\s+(.*)$ ^ssh-askpass-gnome(?::\w+|)\s+(.*)$ ^libssh-4(?::\w+|)\s+(.*)$ ^libssh-dev(?::\w+|)\s+(.*)$ ^libssh-doc(?::\w+|)\s+(.*)$ ^libssh-gcrypt-4(?::\w+|)\s+(.*)$ ^libssh-gcrypt-dev(?::\w+|)\s+(.*)$ ^thunderbird(?::\w+|)\s+(.*)$ ^thunderbird-dev(?::\w+|)\s+(.*)$ ^thunderbird-gnome-support(?::\w+|)\s+(.*)$ ^thunderbird-locale-af(?::\w+|)\s+(.*)$ ^thunderbird-locale-ar(?::\w+|)\s+(.*)$ ^thunderbird-locale-ast(?::\w+|)\s+(.*)$ ^thunderbird-locale-be(?::\w+|)\s+(.*)$ ^thunderbird-locale-bg(?::\w+|)\s+(.*)$ ^thunderbird-locale-bn(?::\w+|)\s+(.*)$ ^thunderbird-locale-bn-bd(?::\w+|)\s+(.*)$ ^thunderbird-locale-br(?::\w+|)\s+(.*)$ ^thunderbird-locale-ca(?::\w+|)\s+(.*)$ ^thunderbird-locale-cak(?::\w+|)\s+(.*)$ ^thunderbird-locale-cs(?::\w+|)\s+(.*)$ ^thunderbird-locale-cy(?::\w+|)\s+(.*)$ ^thunderbird-locale-da(?::\w+|)\s+(.*)$ ^thunderbird-locale-de(?::\w+|)\s+(.*)$ ^thunderbird-locale-dsb(?::\w+|)\s+(.*)$ ^thunderbird-locale-el(?::\w+|)\s+(.*)$ ^thunderbird-locale-en(?::\w+|)\s+(.*)$ ^thunderbird-locale-en-gb(?::\w+|)\s+(.*)$ ^thunderbird-locale-en-us(?::\w+|)\s+(.*)$ ^thunderbird-locale-es(?::\w+|)\s+(.*)$ ^thunderbird-locale-es-ar(?::\w+|)\s+(.*)$ ^thunderbird-locale-es-es(?::\w+|)\s+(.*)$ ^thunderbird-locale-et(?::\w+|)\s+(.*)$ ^thunderbird-locale-eu(?::\w+|)\s+(.*)$ ^thunderbird-locale-fa(?::\w+|)\s+(.*)$ ^thunderbird-locale-fi(?::\w+|)\s+(.*)$ ^thunderbird-locale-fr(?::\w+|)\s+(.*)$ ^thunderbird-locale-fy(?::\w+|)\s+(.*)$ ^thunderbird-locale-fy-nl(?::\w+|)\s+(.*)$ ^thunderbird-locale-ga(?::\w+|)\s+(.*)$ ^thunderbird-locale-ga-ie(?::\w+|)\s+(.*)$ ^thunderbird-locale-gd(?::\w+|)\s+(.*)$ ^thunderbird-locale-gl(?::\w+|)\s+(.*)$ ^thunderbird-locale-he(?::\w+|)\s+(.*)$ ^thunderbird-locale-hr(?::\w+|)\s+(.*)$ ^thunderbird-locale-hsb(?::\w+|)\s+(.*)$ ^thunderbird-locale-hu(?::\w+|)\s+(.*)$ ^thunderbird-locale-hy(?::\w+|)\s+(.*)$ ^thunderbird-locale-id(?::\w+|)\s+(.*)$ ^thunderbird-locale-is(?::\w+|)\s+(.*)$ ^thunderbird-locale-it(?::\w+|)\s+(.*)$ ^thunderbird-locale-ja(?::\w+|)\s+(.*)$ ^thunderbird-locale-ka(?::\w+|)\s+(.*)$ ^thunderbird-locale-kab(?::\w+|)\s+(.*)$ ^thunderbird-locale-kk(?::\w+|)\s+(.*)$ ^thunderbird-locale-ko(?::\w+|)\s+(.*)$ ^thunderbird-locale-lt(?::\w+|)\s+(.*)$ ^thunderbird-locale-lv(?::\w+|)\s+(.*)$ ^thunderbird-locale-mk(?::\w+|)\s+(.*)$ ^thunderbird-locale-ms(?::\w+|)\s+(.*)$ ^thunderbird-locale-nb(?::\w+|)\s+(.*)$ ^thunderbird-locale-nb-no(?::\w+|)\s+(.*)$ ^thunderbird-locale-nl(?::\w+|)\s+(.*)$ ^thunderbird-locale-nn(?::\w+|)\s+(.*)$ ^thunderbird-locale-nn-no(?::\w+|)\s+(.*)$ ^thunderbird-locale-pa(?::\w+|)\s+(.*)$ ^thunderbird-locale-pa-in(?::\w+|)\s+(.*)$ ^thunderbird-locale-pl(?::\w+|)\s+(.*)$ ^thunderbird-locale-pt(?::\w+|)\s+(.*)$ ^thunderbird-locale-pt-br(?::\w+|)\s+(.*)$ ^thunderbird-locale-pt-pt(?::\w+|)\s+(.*)$ ^thunderbird-locale-rm(?::\w+|)\s+(.*)$ ^thunderbird-locale-ro(?::\w+|)\s+(.*)$ ^thunderbird-locale-ru(?::\w+|)\s+(.*)$ ^thunderbird-locale-si(?::\w+|)\s+(.*)$ ^thunderbird-locale-sk(?::\w+|)\s+(.*)$ ^thunderbird-locale-sl(?::\w+|)\s+(.*)$ ^thunderbird-locale-sq(?::\w+|)\s+(.*)$ ^thunderbird-locale-sr(?::\w+|)\s+(.*)$ ^thunderbird-locale-sv(?::\w+|)\s+(.*)$ ^thunderbird-locale-sv-se(?::\w+|)\s+(.*)$ ^thunderbird-locale-ta(?::\w+|)\s+(.*)$ ^thunderbird-locale-ta-lk(?::\w+|)\s+(.*)$ ^thunderbird-locale-th(?::\w+|)\s+(.*)$ ^thunderbird-locale-tr(?::\w+|)\s+(.*)$ ^thunderbird-locale-uk(?::\w+|)\s+(.*)$ ^thunderbird-locale-uz(?::\w+|)\s+(.*)$ ^thunderbird-locale-vi(?::\w+|)\s+(.*)$ ^thunderbird-locale-zh-cn(?::\w+|)\s+(.*)$ ^thunderbird-locale-zh-hans(?::\w+|)\s+(.*)$ ^thunderbird-locale-zh-hant(?::\w+|)\s+(.*)$ ^thunderbird-locale-zh-tw(?::\w+|)\s+(.*)$ ^thunderbird-mozsymbols(?::\w+|)\s+(.*)$ ^xul-ext-calendar-timezones(?::\w+|)\s+(.*)$ ^xul-ext-gdata-provider(?::\w+|)\s+(.*)$ ^xul-ext-lightning(?::\w+|)\s+(.*)$ ^openssh-client(?::\w+|)\s+(.*)$ ^openssh-server(?::\w+|)\s+(.*)$ ^openssh-sftp-server(?::\w+|)\s+(.*)$ ^openssh-tests(?::\w+|)\s+(.*)$ ^ssh(?::\w+|)\s+(.*)$ ^ssh-askpass-gnome(?::\w+|)\s+(.*)$ ^lemon(?::\w+|)\s+(.*)$ ^libsqlite3-0(?::\w+|)\s+(.*)$ ^libsqlite3-dev(?::\w+|)\s+(.*)$ ^libsqlite3-tcl(?::\w+|)\s+(.*)$ ^sqlite3(?::\w+|)\s+(.*)$ ^sqlite3-doc(?::\w+|)\s+(.*)$ ^sqlite3-tools(?::\w+|)\s+(.*)$ ^qemu-block-extra(?::\w+|)\s+(.*)$ ^qemu-guest-agent(?::\w+|)\s+(.*)$ ^qemu-system(?::\w+|)\s+(.*)$ ^qemu-system-arm(?::\w+|)\s+(.*)$ ^qemu-system-common(?::\w+|)\s+(.*)$ ^qemu-system-data(?::\w+|)\s+(.*)$ ^qemu-system-gui(?::\w+|)\s+(.*)$ ^qemu-system-mips(?::\w+|)\s+(.*)$ ^qemu-system-misc(?::\w+|)\s+(.*)$ ^qemu-system-ppc(?::\w+|)\s+(.*)$ ^qemu-system-s390x(?::\w+|)\s+(.*)$ ^qemu-system-sparc(?::\w+|)\s+(.*)$ ^qemu-system-x86(?::\w+|)\s+(.*)$ ^qemu-system-x86-xen(?::\w+|)\s+(.*)$ ^qemu-system-xen(?::\w+|)\s+(.*)$ ^qemu-user(?::\w+|)\s+(.*)$ ^qemu-user-binfmt(?::\w+|)\s+(.*)$ ^qemu-user-static(?::\w+|)\s+(.*)$ ^qemu-utils(?::\w+|)\s+(.*)$ ^clamav(?::\w+|)\s+(.*)$ ^clamav-base(?::\w+|)\s+(.*)$ ^clamav-daemon(?::\w+|)\s+(.*)$ ^clamav-docs(?::\w+|)\s+(.*)$ ^clamav-freshclam(?::\w+|)\s+(.*)$ ^clamav-milter(?::\w+|)\s+(.*)$ ^clamav-testfiles(?::\w+|)\s+(.*)$ ^clamdscan(?::\w+|)\s+(.*)$ ^libclamav-dev(?::\w+|)\s+(.*)$ ^libclamav11(?::\w+|)\s+(.*)$ ^clamav-testfiles-rar(?::\w+|)\s+(.*)$ ^libclamunrar(?::\w+|)\s+(.*)$ ^libclamunrar11(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-azure|-azure-fde)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-azure|-azure-fde)(?::\w+|)\s+(.*)$ ^golang-1.20(?::\w+|)\s+(.*)$ ^golang-1.20-doc(?::\w+|)\s+(.*)$ ^golang-1.20-go(?::\w+|)\s+(.*)$ ^golang-1.20-src(?::\w+|)\s+(.*)$ ^golang-1.21(?::\w+|)\s+(.*)$ ^golang-1.21-doc(?::\w+|)\s+(.*)$ ^golang-1.21-go(?::\w+|)\s+(.*)$ ^golang-1.21-src(?::\w+|)\s+(.*)$ ^python3-twisted(?::\w+|)\s+(.*)$ ^twisted-doc(?::\w+|)\s+(.*)$ ^aspnetcore-runtime-6.0(?::\w+|)\s+(.*)$ ^aspnetcore-targeting-pack-6.0(?::\w+|)\s+(.*)$ ^dotnet-apphost-pack-6.0(?::\w+|)\s+(.*)$ ^dotnet-host(?::\w+|)\s+(.*)$ ^dotnet-hostfxr-6.0(?::\w+|)\s+(.*)$ ^dotnet-runtime-6.0(?::\w+|)\s+(.*)$ ^dotnet-sdk-6.0(?::\w+|)\s+(.*)$ ^dotnet-sdk-6.0-source-built-artifacts(?::\w+|)\s+(.*)$ ^dotnet-targeting-pack-6.0(?::\w+|)\s+(.*)$ ^dotnet-templates-6.0(?::\w+|)\s+(.*)$ ^dotnet6(?::\w+|)\s+(.*)$ ^netstandard-targeting-pack-2.1(?::\w+|)\s+(.*)$ ^aspnetcore-runtime-7.0(?::\w+|)\s+(.*)$ ^aspnetcore-targeting-pack-7.0(?::\w+|)\s+(.*)$ ^dotnet-apphost-pack-7.0(?::\w+|)\s+(.*)$ ^dotnet-host-7.0(?::\w+|)\s+(.*)$ ^dotnet-hostfxr-7.0(?::\w+|)\s+(.*)$ ^dotnet-runtime-7.0(?::\w+|)\s+(.*)$ ^dotnet-sdk-7.0(?::\w+|)\s+(.*)$ ^dotnet-sdk-7.0-source-built-artifacts(?::\w+|)\s+(.*)$ ^dotnet-targeting-pack-7.0(?::\w+|)\s+(.*)$ ^dotnet-templates-7.0(?::\w+|)\s+(.*)$ ^dotnet7(?::\w+|)\s+(.*)$ ^netstandard-targeting-pack-2.1-7.0(?::\w+|)\s+(.*)$ ^aspnetcore-runtime-8.0(?::\w+|)\s+(.*)$ ^aspnetcore-targeting-pack-8.0(?::\w+|)\s+(.*)$ ^dotnet-apphost-pack-8.0(?::\w+|)\s+(.*)$ ^dotnet-host-8.0(?::\w+|)\s+(.*)$ ^dotnet-hostfxr-8.0(?::\w+|)\s+(.*)$ ^dotnet-runtime-8.0(?::\w+|)\s+(.*)$ ^dotnet-targeting-pack-8.0(?::\w+|)\s+(.*)$ ^dotnet-sdk-8.0(?::\w+|)\s+(.*)$ ^dotnet-sdk-8.0-source-built-artifacts(?::\w+|)\s+(.*)$ ^dotnet-templates-8.0(?::\w+|)\s+(.*)$ ^netstandard-targeting-pack-2.1-8.0(?::\w+|)\s+(.*)$ ^dotnet8(?::\w+|)\s+(.*)$ ^libxerces-c-dev(?::\w+|)\s+(.*)$ ^libxerces-c-doc(?::\w+|)\s+(.*)$ ^libxerces-c-samples(?::\w+|)\s+(.*)$ ^libxerces-c3.2(?::\w+|)\s+(.*)$ ^w3m(?::\w+|)\s+(.*)$ ^w3m-img(?::\w+|)\s+(.*)$ ^gir1.2-javascriptcoregtk-4.0(?::\w+|)\s+(.*)$ ^gir1.2-javascriptcoregtk-4.1(?::\w+|)\s+(.*)$ ^gir1.2-javascriptcoregtk-6.0(?::\w+|)\s+(.*)$ ^gir1.2-webkit-6.0(?::\w+|)\s+(.*)$ ^gir1.2-webkit2-4.0(?::\w+|)\s+(.*)$ ^gir1.2-webkit2-4.1(?::\w+|)\s+(.*)$ ^libjavascriptcoregtk-4.0-18(?::\w+|)\s+(.*)$ ^libjavascriptcoregtk-4.0-bin(?::\w+|)\s+(.*)$ ^libjavascriptcoregtk-4.0-dev(?::\w+|)\s+(.*)$ ^libjavascriptcoregtk-4.1-0(?::\w+|)\s+(.*)$ ^libjavascriptcoregtk-4.1-dev(?::\w+|)\s+(.*)$ ^libjavascriptcoregtk-6.0-1(?::\w+|)\s+(.*)$ ^libjavascriptcoregtk-6.0-dev(?::\w+|)\s+(.*)$ ^libwebkit2gtk-4.0-37(?::\w+|)\s+(.*)$ ^libwebkit2gtk-4.0-dev(?::\w+|)\s+(.*)$ ^libwebkit2gtk-4.0-doc(?::\w+|)\s+(.*)$ ^libwebkit2gtk-4.1-0(?::\w+|)\s+(.*)$ ^libwebkit2gtk-4.1-dev(?::\w+|)\s+(.*)$ ^libwebkitgtk-6.0-4(?::\w+|)\s+(.*)$ ^libwebkitgtk-6.0-dev(?::\w+|)\s+(.*)$ ^webkit2gtk-driver(?::\w+|)\s+(.*)$ ^libssh2-1(?::\w+|)\s+(.*)$ ^libssh2-1-dev(?::\w+|)\s+(.*)$ ^libfreeimage-dev(?::\w+|)\s+(.*)$ ^libfreeimage3(?::\w+|)\s+(.*)$ ^libfreeimageplus-dev(?::\w+|)\s+(.*)$ ^libfreeimageplus-doc(?::\w+|)\s+(.*)$ ^libfreeimageplus3(?::\w+|)\s+(.*)$ ^xnest(?::\w+|)\s+(.*)$ ^xorg-server-source(?::\w+|)\s+(.*)$ ^xserver-common(?::\w+|)\s+(.*)$ ^xserver-xephyr(?::\w+|)\s+(.*)$ ^xserver-xorg-core(?::\w+|)\s+(.*)$ ^xserver-xorg-dev(?::\w+|)\s+(.*)$ ^xserver-xorg-legacy(?::\w+|)\s+(.*)$ ^xvfb(?::\w+|)\s+(.*)$ ^xwayland(?::\w+|)\s+(.*)$ ^xnest(?::\w+|)\s+(.*)$ ^xorg-server-source(?::\w+|)\s+(.*)$ ^xserver-common(?::\w+|)\s+(.*)$ ^xserver-xephyr(?::\w+|)\s+(.*)$ ^xserver-xorg-core(?::\w+|)\s+(.*)$ ^xserver-xorg-dev(?::\w+|)\s+(.*)$ ^xserver-xorg-legacy(?::\w+|)\s+(.*)$ ^xvfb(?::\w+|)\s+(.*)$ ^libpam-doc(?::\w+|)\s+(.*)$ ^libpam-modules(?::\w+|)\s+(.*)$ ^libpam-modules-bin(?::\w+|)\s+(.*)$ ^libpam-runtime(?::\w+|)\s+(.*)$ ^libpam0g(?::\w+|)\s+(.*)$ ^libpam0g-dev(?::\w+|)\s+(.*)$ ^filezilla(?::\w+|)\s+(.*)$ ^filezilla-common(?::\w+|)\s+(.*)$ ^postfix(?::\w+|)\s+(.*)$ ^postfix-cdb(?::\w+|)\s+(.*)$ ^postfix-doc(?::\w+|)\s+(.*)$ ^postfix-ldap(?::\w+|)\s+(.*)$ ^postfix-lmdb(?::\w+|)\s+(.*)$ ^postfix-mysql(?::\w+|)\s+(.*)$ ^postfix-pcre(?::\w+|)\s+(.*)$ ^postfix-pgsql(?::\w+|)\s+(.*)$ ^postfix-sqlite(?::\w+|)\s+(.*)$ ^postfix(?::\w+|)\s+(.*)$ ^postfix-cdb(?::\w+|)\s+(.*)$ ^postfix-doc(?::\w+|)\s+(.*)$ ^postfix-ldap(?::\w+|)\s+(.*)$ ^postfix-lmdb(?::\w+|)\s+(.*)$ ^postfix-mysql(?::\w+|)\s+(.*)$ ^postfix-pcre(?::\w+|)\s+(.*)$ ^postfix-pgsql(?::\w+|)\s+(.*)$ ^postfix-sqlite(?::\w+|)\s+(.*)$ ^libssh-4(?::\w+|)\s+(.*)$ ^libssh-dev(?::\w+|)\s+(.*)$ ^libssh-doc(?::\w+|)\s+(.*)$ ^libssh-gcrypt-4(?::\w+|)\s+(.*)$ ^libssh-gcrypt-dev(?::\w+|)\s+(.*)$ ^gnutls-bin(?::\w+|)\s+(.*)$ ^gnutls-doc(?::\w+|)\s+(.*)$ ^libgnutls-dane0(?::\w+|)\s+(.*)$ ^libgnutls-openssl27(?::\w+|)\s+(.*)$ ^libgnutls28-dev(?::\w+|)\s+(.*)$ ^libgnutls30(?::\w+|)\s+(.*)$ ^squid(?::\w+|)\s+(.*)$ ^squid-cgi(?::\w+|)\s+(.*)$ ^squid-common(?::\w+|)\s+(.*)$ ^squid-openssl(?::\w+|)\s+(.*)$ ^squid-purge(?::\w+|)\s+(.*)$ ^squidclient(?::\w+|)\s+(.*)$ ^puma(?::\w+|)\s+(.*)$ ^paramiko-doc(?::\w+|)\s+(.*)$ ^python3-paramiko(?::\w+|)\s+(.*)$ ^python-jinja2-doc(?::\w+|)\s+(.*)$ ^python3-jinja2(?::\w+|)\s+(.*)$ ^libmariadb-dev(?::\w+|)\s+(.*)$ ^libmariadb-dev-compat(?::\w+|)\s+(.*)$ ^libmariadb3(?::\w+|)\s+(.*)$ ^libmariadbd-dev(?::\w+|)\s+(.*)$ ^libmariadbd19(?::\w+|)\s+(.*)$ ^mariadb-backup(?::\w+|)\s+(.*)$ ^mariadb-client(?::\w+|)\s+(.*)$ ^mariadb-client-core(?::\w+|)\s+(.*)$ ^mariadb-common(?::\w+|)\s+(.*)$ ^mariadb-plugin-connect(?::\w+|)\s+(.*)$ ^mariadb-plugin-cracklib-password-check(?::\w+|)\s+(.*)$ ^mariadb-plugin-gssapi-client(?::\w+|)\s+(.*)$ ^mariadb-plugin-gssapi-server(?::\w+|)\s+(.*)$ ^mariadb-plugin-hashicorp-key-management(?::\w+|)\s+(.*)$ ^mariadb-plugin-mroonga(?::\w+|)\s+(.*)$ ^mariadb-plugin-oqgraph(?::\w+|)\s+(.*)$ ^mariadb-plugin-provider-bzip2(?::\w+|)\s+(.*)$ ^mariadb-plugin-provider-lz4(?::\w+|)\s+(.*)$ ^mariadb-plugin-provider-lzma(?::\w+|)\s+(.*)$ ^mariadb-plugin-provider-lzo(?::\w+|)\s+(.*)$ ^mariadb-plugin-provider-snappy(?::\w+|)\s+(.*)$ ^mariadb-plugin-rocksdb(?::\w+|)\s+(.*)$ ^mariadb-plugin-s3(?::\w+|)\s+(.*)$ ^mariadb-plugin-spider(?::\w+|)\s+(.*)$ ^mariadb-server(?::\w+|)\s+(.*)$ ^mariadb-server-10.5(?::\w+|)\s+(.*)$ ^mariadb-server-core(?::\w+|)\s+(.*)$ ^mariadb-test(?::\w+|)\s+(.*)$ ^mariadb-test-data(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-starfive)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-laptop)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-raspi)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-azure|-azure-fde|-gcp)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-aws)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-oracle)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-generic|-generic-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-lowlatency|-lowlatency-64k)(?::\w+|)\s+(.*)$ ^exim4(?::\w+|)\s+(.*)$ ^exim4-base(?::\w+|)\s+(.*)$ ^exim4-config(?::\w+|)\s+(.*)$ ^exim4-daemon-heavy(?::\w+|)\s+(.*)$ ^exim4-daemon-light(?::\w+|)\s+(.*)$ ^exim4-dev(?::\w+|)\s+(.*)$ ^eximon4(?::\w+|)\s+(.*)$ ^libtinyxml-dev(?::\w+|)\s+(.*)$ ^libtinyxml-doc(?::\w+|)\s+(.*)$ ^libtinyxml2.6.2v5(?::\w+|)\s+(.*)$ ^ceph(?::\w+|)\s+(.*)$ ^ceph-base(?::\w+|)\s+(.*)$ ^ceph-common(?::\w+|)\s+(.*)$ ^ceph-fuse(?::\w+|)\s+(.*)$ ^ceph-grafana-dashboards(?::\w+|)\s+(.*)$ ^ceph-immutable-object-cache(?::\w+|)\s+(.*)$ ^ceph-mds(?::\w+|)\s+(.*)$ ^ceph-mgr(?::\w+|)\s+(.*)$ ^ceph-mgr-cephadm(?::\w+|)\s+(.*)$ ^ceph-mgr-dashboard(?::\w+|)\s+(.*)$ ^ceph-mgr-diskprediction-local(?::\w+|)\s+(.*)$ ^ceph-mgr-k8sevents(?::\w+|)\s+(.*)$ ^ceph-mgr-modules-core(?::\w+|)\s+(.*)$ ^ceph-mgr-rook(?::\w+|)\s+(.*)$ ^ceph-mon(?::\w+|)\s+(.*)$ ^ceph-osd(?::\w+|)\s+(.*)$ ^ceph-prometheus-alerts(?::\w+|)\s+(.*)$ ^ceph-resource-agents(?::\w+|)\s+(.*)$ ^ceph-volume(?::\w+|)\s+(.*)$ ^cephadm(?::\w+|)\s+(.*)$ ^cephfs-mirror(?::\w+|)\s+(.*)$ ^cephfs-shell(?::\w+|)\s+(.*)$ ^crimson-osd(?::\w+|)\s+(.*)$ ^libcephfs-dev(?::\w+|)\s+(.*)$ ^libcephfs-java(?::\w+|)\s+(.*)$ ^libcephfs-jni(?::\w+|)\s+(.*)$ ^libcephfs2(?::\w+|)\s+(.*)$ ^librados-dev(?::\w+|)\s+(.*)$ ^librados2(?::\w+|)\s+(.*)$ ^libradospp-dev(?::\w+|)\s+(.*)$ ^libradosstriper-dev(?::\w+|)\s+(.*)$ ^libradosstriper1(?::\w+|)\s+(.*)$ ^librbd-dev(?::\w+|)\s+(.*)$ ^librbd1(?::\w+|)\s+(.*)$ ^librgw-dev(?::\w+|)\s+(.*)$ ^librgw2(?::\w+|)\s+(.*)$ ^libsqlite3-mod-ceph(?::\w+|)\s+(.*)$ ^libsqlite3-mod-ceph-dev(?::\w+|)\s+(.*)$ ^python3-ceph(?::\w+|)\s+(.*)$ ^python3-ceph-argparse(?::\w+|)\s+(.*)$ ^python3-ceph-common(?::\w+|)\s+(.*)$ ^python3-cephfs(?::\w+|)\s+(.*)$ ^python3-rados(?::\w+|)\s+(.*)$ ^python3-rbd(?::\w+|)\s+(.*)$ ^python3-rgw(?::\w+|)\s+(.*)$ ^rados-objclass-dev(?::\w+|)\s+(.*)$ ^radosgw(?::\w+|)\s+(.*)$ ^rbd-fuse(?::\w+|)\s+(.*)$ ^rbd-mirror(?::\w+|)\s+(.*)$ ^rbd-nbd(?::\w+|)\s+(.*)$ ^amanda-client(?::\w+|)\s+(.*)$ ^amanda-common(?::\w+|)\s+(.*)$ ^amanda-server(?::\w+|)\s+(.*)$ ^libmysqlclient-dev(?::\w+|)\s+(.*)$ ^libmysqlclient21(?::\w+|)\s+(.*)$ ^mysql-client(?::\w+|)\s+(.*)$ ^mysql-client-8.0(?::\w+|)\s+(.*)$ ^mysql-client-core-8.0(?::\w+|)\s+(.*)$ ^mysql-router(?::\w+|)\s+(.*)$ ^mysql-server(?::\w+|)\s+(.*)$ ^mysql-server-8.0(?::\w+|)\s+(.*)$ ^mysql-server-core-8.0(?::\w+|)\s+(.*)$ ^mysql-source-8.0(?::\w+|)\s+(.*)$ ^mysql-testsuite(?::\w+|)\s+(.*)$ ^mysql-testsuite-8.0(?::\w+|)\s+(.*)$ ^python-pil-doc(?::\w+|)\s+(.*)$ ^python3-pil(?::\w+|)\s+(.*)$ ^python3-pil.imagetk(?::\w+|)\s+(.*)$ ^golang-github-opencontainers-runc-dev(?::\w+|)\s+(.*)$ ^runc(?::\w+|)\s+(.*)$ ^glibc-doc(?::\w+|)\s+(.*)$ ^glibc-source(?::\w+|)\s+(.*)$ ^libc-bin(?::\w+|)\s+(.*)$ ^libc-dev-bin(?::\w+|)\s+(.*)$ ^libc-devtools(?::\w+|)\s+(.*)$ ^libc6(?::\w+|)\s+(.*)$ ^libc6-amd64(?::\w+|)\s+(.*)$ ^libc6-dev(?::\w+|)\s+(.*)$ ^libc6-dev-amd64(?::\w+|)\s+(.*)$ ^libc6-dev-i386(?::\w+|)\s+(.*)$ ^libc6-dev-s390(?::\w+|)\s+(.*)$ ^libc6-dev-x32(?::\w+|)\s+(.*)$ ^libc6-i386(?::\w+|)\s+(.*)$ ^libc6-prof(?::\w+|)\s+(.*)$ ^libc6-s390(?::\w+|)\s+(.*)$ ^libc6-x32(?::\w+|)\s+(.*)$ ^locales(?::\w+|)\s+(.*)$ ^locales-all(?::\w+|)\s+(.*)$ ^nscd(?::\w+|)\s+(.*)$ ^libssl-dev(?::\w+|)\s+(.*)$ ^libssl-doc(?::\w+|)\s+(.*)$ ^libssl3(?::\w+|)\s+(.*)$ ^openssl(?::\w+|)\s+(.*)$ ^python-django-doc(?::\w+|)\s+(.*)$ ^python3-django(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-starfive)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-laptop)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-raspi)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-aws|-gcp)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-oracle)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-generic|-generic-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-lowlatency|-lowlatency-64k)(?::\w+|)\s+(.*)$ ^python-glance-store-doc(?::\w+|)\s+(.*)$ ^python3-glance-store(?::\w+|)\s+(.*)$ ^gir1.2-javascriptcoregtk-4.0(?::\w+|)\s+(.*)$ ^gir1.2-javascriptcoregtk-4.1(?::\w+|)\s+(.*)$ ^gir1.2-javascriptcoregtk-6.0(?::\w+|)\s+(.*)$ ^gir1.2-webkit-6.0(?::\w+|)\s+(.*)$ ^gir1.2-webkit2-4.0(?::\w+|)\s+(.*)$ ^gir1.2-webkit2-4.1(?::\w+|)\s+(.*)$ ^libjavascriptcoregtk-4.0-18(?::\w+|)\s+(.*)$ ^libjavascriptcoregtk-4.0-bin(?::\w+|)\s+(.*)$ ^libjavascriptcoregtk-4.0-dev(?::\w+|)\s+(.*)$ ^libjavascriptcoregtk-4.1-0(?::\w+|)\s+(.*)$ ^libjavascriptcoregtk-4.1-dev(?::\w+|)\s+(.*)$ ^libjavascriptcoregtk-6.0-1(?::\w+|)\s+(.*)$ ^libjavascriptcoregtk-6.0-dev(?::\w+|)\s+(.*)$ ^libwebkit2gtk-4.0-37(?::\w+|)\s+(.*)$ ^libwebkit2gtk-4.0-dev(?::\w+|)\s+(.*)$ ^libwebkit2gtk-4.0-doc(?::\w+|)\s+(.*)$ ^libwebkit2gtk-4.1-0(?::\w+|)\s+(.*)$ ^libwebkit2gtk-4.1-dev(?::\w+|)\s+(.*)$ ^libwebkitgtk-6.0-4(?::\w+|)\s+(.*)$ ^libwebkitgtk-6.0-dev(?::\w+|)\s+(.*)$ ^webkit2gtk-driver(?::\w+|)\s+(.*)$ ^bind9(?::\w+|)\s+(.*)$ ^bind9-dev(?::\w+|)\s+(.*)$ ^bind9-dnsutils(?::\w+|)\s+(.*)$ ^bind9-doc(?::\w+|)\s+(.*)$ ^bind9-host(?::\w+|)\s+(.*)$ ^bind9-libs(?::\w+|)\s+(.*)$ ^bind9-utils(?::\w+|)\s+(.*)$ ^bind9utils(?::\w+|)\s+(.*)$ ^dnsutils(?::\w+|)\s+(.*)$ ^aspnetcore-runtime-6.0(?::\w+|)\s+(.*)$ ^aspnetcore-targeting-pack-6.0(?::\w+|)\s+(.*)$ ^dotnet-apphost-pack-6.0(?::\w+|)\s+(.*)$ ^dotnet-host(?::\w+|)\s+(.*)$ ^dotnet-hostfxr-6.0(?::\w+|)\s+(.*)$ ^dotnet-runtime-6.0(?::\w+|)\s+(.*)$ ^dotnet-sdk-6.0(?::\w+|)\s+(.*)$ ^dotnet-sdk-6.0-source-built-artifacts(?::\w+|)\s+(.*)$ ^dotnet-targeting-pack-6.0(?::\w+|)\s+(.*)$ ^dotnet-templates-6.0(?::\w+|)\s+(.*)$ ^dotnet6(?::\w+|)\s+(.*)$ ^netstandard-targeting-pack-2.1(?::\w+|)\s+(.*)$ ^aspnetcore-runtime-7.0(?::\w+|)\s+(.*)$ ^aspnetcore-targeting-pack-7.0(?::\w+|)\s+(.*)$ ^dotnet-apphost-pack-7.0(?::\w+|)\s+(.*)$ ^dotnet-host-7.0(?::\w+|)\s+(.*)$ ^dotnet-hostfxr-7.0(?::\w+|)\s+(.*)$ ^dotnet-runtime-7.0(?::\w+|)\s+(.*)$ ^dotnet-sdk-7.0(?::\w+|)\s+(.*)$ ^dotnet-sdk-7.0-source-built-artifacts(?::\w+|)\s+(.*)$ ^dotnet-targeting-pack-7.0(?::\w+|)\s+(.*)$ ^dotnet-templates-7.0(?::\w+|)\s+(.*)$ ^dotnet7(?::\w+|)\s+(.*)$ ^netstandard-targeting-pack-2.1-7.0(?::\w+|)\s+(.*)$ ^dotnet-sdk-8.0(?::\w+|)\s+(.*)$ ^dotnet-sdk-8.0-source-built-artifacts(?::\w+|)\s+(.*)$ ^dotnet-templates-8.0(?::\w+|)\s+(.*)$ ^netstandard-targeting-pack-2.1-8.0(?::\w+|)\s+(.*)$ ^dotnet8(?::\w+|)\s+(.*)$ ^aspnetcore-runtime-8.0(?::\w+|)\s+(.*)$ ^aspnetcore-targeting-pack-8.0(?::\w+|)\s+(.*)$ ^dotnet-apphost-pack-8.0(?::\w+|)\s+(.*)$ ^dotnet-host-8.0(?::\w+|)\s+(.*)$ ^dotnet-hostfxr-8.0(?::\w+|)\s+(.*)$ ^dotnet-runtime-8.0(?::\w+|)\s+(.*)$ ^dotnet-targeting-pack-8.0(?::\w+|)\s+(.*)$ ^clamav(?::\w+|)\s+(.*)$ ^clamav-base(?::\w+|)\s+(.*)$ ^clamav-daemon(?::\w+|)\s+(.*)$ ^clamav-docs(?::\w+|)\s+(.*)$ ^clamav-freshclam(?::\w+|)\s+(.*)$ ^clamav-milter(?::\w+|)\s+(.*)$ ^clamav-testfiles(?::\w+|)\s+(.*)$ ^clamdscan(?::\w+|)\s+(.*)$ ^libclamav-dev(?::\w+|)\s+(.*)$ ^libclamav11(?::\w+|)\s+(.*)$ ^efi-shell-aa64(?::\w+|)\s+(.*)$ ^efi-shell-arm(?::\w+|)\s+(.*)$ ^efi-shell-ia32(?::\w+|)\s+(.*)$ ^efi-shell-x64(?::\w+|)\s+(.*)$ ^ovmf(?::\w+|)\s+(.*)$ ^ovmf-ia32(?::\w+|)\s+(.*)$ ^qemu-efi-aarch64(?::\w+|)\s+(.*)$ ^qemu-efi-arm(?::\w+|)\s+(.*)$ ^libsubid-dev(?::\w+|)\s+(.*)$ ^libsubid4(?::\w+|)\s+(.*)$ ^login(?::\w+|)\s+(.*)$ ^passwd(?::\w+|)\s+(.*)$ ^uidmap(?::\w+|)\s+(.*)$ ^node-ip(?::\w+|)\s+(.*)$ ^libtiff-dev(?::\w+|)\s+(.*)$ ^libtiff-doc(?::\w+|)\s+(.*)$ ^libtiff-opengl(?::\w+|)\s+(.*)$ ^libtiff-tools(?::\w+|)\s+(.*)$ ^libtiff5-dev(?::\w+|)\s+(.*)$ ^libtiff6(?::\w+|)\s+(.*)$ ^libtiffxx6(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-starfive)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-laptop)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-raspi)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-aws|-gcp)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-oracle)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-generic|-generic-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-lowlatency|-lowlatency-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-azure|-azure-fde)(?::\w+|)\s+(.*)$ ^roundcube(?::\w+|)\s+(.*)$ ^roundcube-core(?::\w+|)\s+(.*)$ ^roundcube-mysql(?::\w+|)\s+(.*)$ ^roundcube-pgsql(?::\w+|)\s+(.*)$ ^roundcube-plugins(?::\w+|)\s+(.*)$ ^roundcube-sqlite3(?::\w+|)\s+(.*)$ ^libecpg-compat3(?::\w+|)\s+(.*)$ ^libecpg-dev(?::\w+|)\s+(.*)$ ^libecpg6(?::\w+|)\s+(.*)$ ^libpgtypes3(?::\w+|)\s+(.*)$ ^libpq-dev(?::\w+|)\s+(.*)$ ^libpq5(?::\w+|)\s+(.*)$ ^postgresql-15(?::\w+|)\s+(.*)$ ^postgresql-client-15(?::\w+|)\s+(.*)$ ^postgresql-doc-15(?::\w+|)\s+(.*)$ ^postgresql-plperl-15(?::\w+|)\s+(.*)$ ^postgresql-plpython3-15(?::\w+|)\s+(.*)$ ^postgresql-pltcl-15(?::\w+|)\s+(.*)$ ^postgresql-server-dev-15(?::\w+|)\s+(.*)$ ^dnsmasq(?::\w+|)\s+(.*)$ ^dnsmasq-base(?::\w+|)\s+(.*)$ ^dnsmasq-base-lua(?::\w+|)\s+(.*)$ ^dnsmasq-utils(?::\w+|)\s+(.*)$ ^libxml2(?::\w+|)\s+(.*)$ ^libxml2-dev(?::\w+|)\s+(.*)$ ^libxml2-doc(?::\w+|)\s+(.*)$ ^libxml2-utils(?::\w+|)\s+(.*)$ ^python3-libxml2(?::\w+|)\s+(.*)$ ^openjdk-11-demo(?::\w+|)\s+(.*)$ ^openjdk-11-doc(?::\w+|)\s+(.*)$ ^openjdk-11-jdk(?::\w+|)\s+(.*)$ ^openjdk-11-jdk-headless(?::\w+|)\s+(.*)$ ^openjdk-11-jre(?::\w+|)\s+(.*)$ ^openjdk-11-jre-headless(?::\w+|)\s+(.*)$ ^openjdk-11-jre-zero(?::\w+|)\s+(.*)$ ^openjdk-11-source(?::\w+|)\s+(.*)$ ^openjdk-17-demo(?::\w+|)\s+(.*)$ ^openjdk-17-doc(?::\w+|)\s+(.*)$ ^openjdk-17-jdk(?::\w+|)\s+(.*)$ ^openjdk-17-jdk-headless(?::\w+|)\s+(.*)$ ^openjdk-17-jre(?::\w+|)\s+(.*)$ ^openjdk-17-jre-headless(?::\w+|)\s+(.*)$ ^openjdk-17-jre-zero(?::\w+|)\s+(.*)$ ^openjdk-17-source(?::\w+|)\s+(.*)$ ^openjdk-21-demo(?::\w+|)\s+(.*)$ ^openjdk-21-doc(?::\w+|)\s+(.*)$ ^openjdk-21-jdk(?::\w+|)\s+(.*)$ ^openjdk-21-jdk-headless(?::\w+|)\s+(.*)$ ^openjdk-21-jre(?::\w+|)\s+(.*)$ ^openjdk-21-jre-headless(?::\w+|)\s+(.*)$ ^openjdk-21-jre-zero(?::\w+|)\s+(.*)$ ^openjdk-21-source(?::\w+|)\s+(.*)$ ^libssl-dev(?::\w+|)\s+(.*)$ ^libssl-doc(?::\w+|)\s+(.*)$ ^libssl3(?::\w+|)\s+(.*)$ ^openssl(?::\w+|)\s+(.*)$ ^less(?::\w+|)\s+(.*)$ ^libunbound-dev(?::\w+|)\s+(.*)$ ^libunbound8(?::\w+|)\s+(.*)$ ^python3-unbound(?::\w+|)\s+(.*)$ ^unbound(?::\w+|)\s+(.*)$ ^unbound-anchor(?::\w+|)\s+(.*)$ ^unbound-host(?::\w+|)\s+(.*)$ ^libuv1(?::\w+|)\s+(.*)$ ^libuv1-dev(?::\w+|)\s+(.*)$ ^thunderbird(?::\w+|)\s+(.*)$ ^thunderbird-dev(?::\w+|)\s+(.*)$ ^thunderbird-gnome-support(?::\w+|)\s+(.*)$ ^thunderbird-locale-af(?::\w+|)\s+(.*)$ ^thunderbird-locale-ar(?::\w+|)\s+(.*)$ ^thunderbird-locale-ast(?::\w+|)\s+(.*)$ ^thunderbird-locale-be(?::\w+|)\s+(.*)$ ^thunderbird-locale-bg(?::\w+|)\s+(.*)$ ^thunderbird-locale-bn(?::\w+|)\s+(.*)$ ^thunderbird-locale-bn-bd(?::\w+|)\s+(.*)$ ^thunderbird-locale-br(?::\w+|)\s+(.*)$ ^thunderbird-locale-ca(?::\w+|)\s+(.*)$ ^thunderbird-locale-cak(?::\w+|)\s+(.*)$ ^thunderbird-locale-cs(?::\w+|)\s+(.*)$ ^thunderbird-locale-cy(?::\w+|)\s+(.*)$ ^thunderbird-locale-da(?::\w+|)\s+(.*)$ ^thunderbird-locale-de(?::\w+|)\s+(.*)$ ^thunderbird-locale-dsb(?::\w+|)\s+(.*)$ ^thunderbird-locale-el(?::\w+|)\s+(.*)$ ^thunderbird-locale-en(?::\w+|)\s+(.*)$ ^thunderbird-locale-en-gb(?::\w+|)\s+(.*)$ ^thunderbird-locale-en-us(?::\w+|)\s+(.*)$ ^thunderbird-locale-es(?::\w+|)\s+(.*)$ ^thunderbird-locale-es-ar(?::\w+|)\s+(.*)$ ^thunderbird-locale-es-es(?::\w+|)\s+(.*)$ ^thunderbird-locale-et(?::\w+|)\s+(.*)$ ^thunderbird-locale-eu(?::\w+|)\s+(.*)$ ^thunderbird-locale-fa(?::\w+|)\s+(.*)$ ^thunderbird-locale-fi(?::\w+|)\s+(.*)$ ^thunderbird-locale-fr(?::\w+|)\s+(.*)$ ^thunderbird-locale-fy(?::\w+|)\s+(.*)$ ^thunderbird-locale-fy-nl(?::\w+|)\s+(.*)$ ^thunderbird-locale-ga(?::\w+|)\s+(.*)$ ^thunderbird-locale-ga-ie(?::\w+|)\s+(.*)$ ^thunderbird-locale-gd(?::\w+|)\s+(.*)$ ^thunderbird-locale-gl(?::\w+|)\s+(.*)$ ^thunderbird-locale-he(?::\w+|)\s+(.*)$ ^thunderbird-locale-hr(?::\w+|)\s+(.*)$ ^thunderbird-locale-hsb(?::\w+|)\s+(.*)$ ^thunderbird-locale-hu(?::\w+|)\s+(.*)$ ^thunderbird-locale-hy(?::\w+|)\s+(.*)$ ^thunderbird-locale-id(?::\w+|)\s+(.*)$ ^thunderbird-locale-is(?::\w+|)\s+(.*)$ ^thunderbird-locale-it(?::\w+|)\s+(.*)$ ^thunderbird-locale-ja(?::\w+|)\s+(.*)$ ^thunderbird-locale-ka(?::\w+|)\s+(.*)$ ^thunderbird-locale-kab(?::\w+|)\s+(.*)$ ^thunderbird-locale-kk(?::\w+|)\s+(.*)$ ^thunderbird-locale-ko(?::\w+|)\s+(.*)$ ^thunderbird-locale-lt(?::\w+|)\s+(.*)$ ^thunderbird-locale-lv(?::\w+|)\s+(.*)$ ^thunderbird-locale-mk(?::\w+|)\s+(.*)$ ^thunderbird-locale-ms(?::\w+|)\s+(.*)$ ^thunderbird-locale-nb(?::\w+|)\s+(.*)$ ^thunderbird-locale-nb-no(?::\w+|)\s+(.*)$ ^thunderbird-locale-nl(?::\w+|)\s+(.*)$ ^thunderbird-locale-nn(?::\w+|)\s+(.*)$ ^thunderbird-locale-nn-no(?::\w+|)\s+(.*)$ ^thunderbird-locale-pa(?::\w+|)\s+(.*)$ ^thunderbird-locale-pa-in(?::\w+|)\s+(.*)$ ^thunderbird-locale-pl(?::\w+|)\s+(.*)$ ^thunderbird-locale-pt(?::\w+|)\s+(.*)$ ^thunderbird-locale-pt-br(?::\w+|)\s+(.*)$ ^thunderbird-locale-pt-pt(?::\w+|)\s+(.*)$ ^thunderbird-locale-rm(?::\w+|)\s+(.*)$ ^thunderbird-locale-ro(?::\w+|)\s+(.*)$ ^thunderbird-locale-ru(?::\w+|)\s+(.*)$ ^thunderbird-locale-si(?::\w+|)\s+(.*)$ ^thunderbird-locale-sk(?::\w+|)\s+(.*)$ ^thunderbird-locale-sl(?::\w+|)\s+(.*)$ ^thunderbird-locale-sq(?::\w+|)\s+(.*)$ ^thunderbird-locale-sr(?::\w+|)\s+(.*)$ ^thunderbird-locale-sv(?::\w+|)\s+(.*)$ ^thunderbird-locale-sv-se(?::\w+|)\s+(.*)$ ^thunderbird-locale-ta(?::\w+|)\s+(.*)$ ^thunderbird-locale-ta-lk(?::\w+|)\s+(.*)$ ^thunderbird-locale-th(?::\w+|)\s+(.*)$ ^thunderbird-locale-tr(?::\w+|)\s+(.*)$ ^thunderbird-locale-uk(?::\w+|)\s+(.*)$ ^thunderbird-locale-uz(?::\w+|)\s+(.*)$ ^thunderbird-locale-vi(?::\w+|)\s+(.*)$ ^thunderbird-locale-zh-cn(?::\w+|)\s+(.*)$ ^thunderbird-locale-zh-hans(?::\w+|)\s+(.*)$ ^thunderbird-locale-zh-hant(?::\w+|)\s+(.*)$ ^thunderbird-locale-zh-tw(?::\w+|)\s+(.*)$ ^thunderbird-mozsymbols(?::\w+|)\s+(.*)$ ^xul-ext-calendar-timezones(?::\w+|)\s+(.*)$ ^xul-ext-gdata-provider(?::\w+|)\s+(.*)$ ^xul-ext-lightning(?::\w+|)\s+(.*)$ ^libnode-dev(?::\w+|)\s+(.*)$ ^libnode108(?::\w+|)\s+(.*)$ ^nodejs(?::\w+|)\s+(.*)$ ^nodejs-doc(?::\w+|)\s+(.*)$ ^python-cryptography-doc(?::\w+|)\s+(.*)$ ^python3-cryptography(?::\w+|)\s+(.*)$ ^python-django-doc(?::\w+|)\s+(.*)$ ^python3-django(?::\w+|)\s+(.*)$ ^libc-ares-dev(?::\w+|)\s+(.*)$ ^libc-ares2(?::\w+|)\s+(.*)$ ^libde265-0(?::\w+|)\s+(.*)$ ^libde265-dev(?::\w+|)\s+(.*)$ ^libde265-examples(?::\w+|)\s+(.*)$ ^libgit2-1.5(?::\w+|)\s+(.*)$ ^libgit2-dev(?::\w+|)\s+(.*)$ ^libgit2-fixtures(?::\w+|)\s+(.*)$ ^frr(?::\w+|)\s+(.*)$ ^frr-doc(?::\w+|)\s+(.*)$ ^frr-pythontools(?::\w+|)\s+(.*)$ ^frr-rpki-rtrlib(?::\w+|)\s+(.*)$ ^frr-snmp(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-starfive)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-laptop)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-raspi)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-gcp)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-oracle|-oracle-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-generic|-generic-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-lowlatency|-lowlatency-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-azure|-azure-fde)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-aws)(?::\w+|)\s+(.*)$ ^ruby-rack(?::\w+|)\s+(.*)$ ^openvswitch-common(?::\w+|)\s+(.*)$ ^openvswitch-doc(?::\w+|)\s+(.*)$ ^openvswitch-ipsec(?::\w+|)\s+(.*)$ ^openvswitch-pki(?::\w+|)\s+(.*)$ ^openvswitch-source(?::\w+|)\s+(.*)$ ^openvswitch-switch(?::\w+|)\s+(.*)$ ^openvswitch-switch-dpdk(?::\w+|)\s+(.*)$ ^openvswitch-test(?::\w+|)\s+(.*)$ ^openvswitch-testcontroller(?::\w+|)\s+(.*)$ ^openvswitch-vtep(?::\w+|)\s+(.*)$ ^python3-openvswitch(?::\w+|)\s+(.*)$ ^ovn-central(?::\w+|)\s+(.*)$ ^ovn-common(?::\w+|)\s+(.*)$ ^ovn-controller-vtep(?::\w+|)\s+(.*)$ ^ovn-doc(?::\w+|)\s+(.*)$ ^ovn-docker(?::\w+|)\s+(.*)$ ^ovn-host(?::\w+|)\s+(.*)$ ^ovn-ic(?::\w+|)\s+(.*)$ ^ovn-ic-db(?::\w+|)\s+(.*)$ ^aspnetcore-runtime-7.0(?::\w+|)\s+(.*)$ ^aspnetcore-targeting-pack-7.0(?::\w+|)\s+(.*)$ ^dotnet-apphost-pack-7.0(?::\w+|)\s+(.*)$ ^dotnet-host-7.0(?::\w+|)\s+(.*)$ ^dotnet-hostfxr-7.0(?::\w+|)\s+(.*)$ ^dotnet-runtime-7.0(?::\w+|)\s+(.*)$ ^dotnet-sdk-7.0(?::\w+|)\s+(.*)$ ^dotnet-sdk-7.0-source-built-artifacts(?::\w+|)\s+(.*)$ ^dotnet-targeting-pack-7.0(?::\w+|)\s+(.*)$ ^dotnet-templates-7.0(?::\w+|)\s+(.*)$ ^dotnet7(?::\w+|)\s+(.*)$ ^netstandard-targeting-pack-2.1-7.0(?::\w+|)\s+(.*)$ ^dotnet-sdk-8.0(?::\w+|)\s+(.*)$ ^dotnet-sdk-8.0-source-built-artifacts(?::\w+|)\s+(.*)$ ^dotnet-templates-8.0(?::\w+|)\s+(.*)$ ^netstandard-targeting-pack-2.1-8.0(?::\w+|)\s+(.*)$ ^dotnet8(?::\w+|)\s+(.*)$ ^aspnetcore-runtime-8.0(?::\w+|)\s+(.*)$ ^aspnetcore-targeting-pack-8.0(?::\w+|)\s+(.*)$ ^dotnet-apphost-pack-8.0(?::\w+|)\s+(.*)$ ^dotnet-host-8.0(?::\w+|)\s+(.*)$ ^dotnet-hostfxr-8.0(?::\w+|)\s+(.*)$ ^dotnet-runtime-8.0(?::\w+|)\s+(.*)$ ^dotnet-targeting-pack-8.0(?::\w+|)\s+(.*)$ ^expat(?::\w+|)\s+(.*)$ ^libexpat1(?::\w+|)\s+(.*)$ ^libexpat1-dev(?::\w+|)\s+(.*)$ ^libkpathsea-dev(?::\w+|)\s+(.*)$ ^libkpathsea6(?::\w+|)\s+(.*)$ ^libptexenc-dev(?::\w+|)\s+(.*)$ ^libptexenc1(?::\w+|)\s+(.*)$ ^libsynctex-dev(?::\w+|)\s+(.*)$ ^libsynctex2(?::\w+|)\s+(.*)$ ^libtexlua-dev(?::\w+|)\s+(.*)$ ^libtexlua53(?::\w+|)\s+(.*)$ ^libtexlua53-5(?::\w+|)\s+(.*)$ ^libtexlua53-dev(?::\w+|)\s+(.*)$ ^libtexluajit-dev(?::\w+|)\s+(.*)$ ^libtexluajit2(?::\w+|)\s+(.*)$ ^texlive-binaries(?::\w+|)\s+(.*)$ ^texlive-binaries-sse2(?::\w+|)\s+(.*)$ ^openjdk-8-demo(?::\w+|)\s+(.*)$ ^openjdk-8-doc(?::\w+|)\s+(.*)$ ^openjdk-8-jdk(?::\w+|)\s+(.*)$ ^openjdk-8-jdk-headless(?::\w+|)\s+(.*)$ ^openjdk-8-jre(?::\w+|)\s+(.*)$ ^openjdk-8-jre-headless(?::\w+|)\s+(.*)$ ^openjdk-8-jre-zero(?::\w+|)\s+(.*)$ ^openjdk-8-source(?::\w+|)\s+(.*)$ ^vim(?::\w+|)\s+(.*)$ ^vim-athena(?::\w+|)\s+(.*)$ ^vim-common(?::\w+|)\s+(.*)$ ^vim-doc(?::\w+|)\s+(.*)$ ^vim-gtk3(?::\w+|)\s+(.*)$ ^vim-gui-common(?::\w+|)\s+(.*)$ ^vim-motif(?::\w+|)\s+(.*)$ ^vim-nox(?::\w+|)\s+(.*)$ ^vim-runtime(?::\w+|)\s+(.*)$ ^vim-tiny(?::\w+|)\s+(.*)$ ^xxd(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-starfive)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-raspi)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-gcp)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-azure|-azure-fde)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-oracle|-oracle-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-generic|-generic-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-lowlatency|-lowlatency-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-laptop)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-aws)(?::\w+|)\s+(.*)$ ^libqpdf-dev(?::\w+|)\s+(.*)$ ^libqpdf29(?::\w+|)\s+(.*)$ ^qpdf(?::\w+|)\s+(.*)$ ^debian-goodies(?::\w+|)\s+(.*)$ ^libodbc2(?::\w+|)\s+(.*)$ ^libodbccr2(?::\w+|)\s+(.*)$ ^libodbcinst2(?::\w+|)\s+(.*)$ ^odbcinst(?::\w+|)\s+(.*)$ ^unixodbc(?::\w+|)\s+(.*)$ ^unixodbc-common(?::\w+|)\s+(.*)$ ^unixodbc-dev(?::\w+|)\s+(.*)$ ^thunderbird(?::\w+|)\s+(.*)$ ^thunderbird-dev(?::\w+|)\s+(.*)$ ^thunderbird-gnome-support(?::\w+|)\s+(.*)$ ^thunderbird-locale-af(?::\w+|)\s+(.*)$ ^thunderbird-locale-ar(?::\w+|)\s+(.*)$ ^thunderbird-locale-ast(?::\w+|)\s+(.*)$ ^thunderbird-locale-be(?::\w+|)\s+(.*)$ ^thunderbird-locale-bg(?::\w+|)\s+(.*)$ ^thunderbird-locale-bn(?::\w+|)\s+(.*)$ ^thunderbird-locale-bn-bd(?::\w+|)\s+(.*)$ ^thunderbird-locale-br(?::\w+|)\s+(.*)$ ^thunderbird-locale-ca(?::\w+|)\s+(.*)$ ^thunderbird-locale-cak(?::\w+|)\s+(.*)$ ^thunderbird-locale-cs(?::\w+|)\s+(.*)$ ^thunderbird-locale-cy(?::\w+|)\s+(.*)$ ^thunderbird-locale-da(?::\w+|)\s+(.*)$ ^thunderbird-locale-de(?::\w+|)\s+(.*)$ ^thunderbird-locale-dsb(?::\w+|)\s+(.*)$ ^thunderbird-locale-el(?::\w+|)\s+(.*)$ ^thunderbird-locale-en(?::\w+|)\s+(.*)$ ^thunderbird-locale-en-gb(?::\w+|)\s+(.*)$ ^thunderbird-locale-en-us(?::\w+|)\s+(.*)$ ^thunderbird-locale-es(?::\w+|)\s+(.*)$ ^thunderbird-locale-es-ar(?::\w+|)\s+(.*)$ ^thunderbird-locale-es-es(?::\w+|)\s+(.*)$ ^thunderbird-locale-et(?::\w+|)\s+(.*)$ ^thunderbird-locale-eu(?::\w+|)\s+(.*)$ ^thunderbird-locale-fa(?::\w+|)\s+(.*)$ ^thunderbird-locale-fi(?::\w+|)\s+(.*)$ ^thunderbird-locale-fr(?::\w+|)\s+(.*)$ ^thunderbird-locale-fy(?::\w+|)\s+(.*)$ ^thunderbird-locale-fy-nl(?::\w+|)\s+(.*)$ ^thunderbird-locale-ga(?::\w+|)\s+(.*)$ ^thunderbird-locale-ga-ie(?::\w+|)\s+(.*)$ ^thunderbird-locale-gd(?::\w+|)\s+(.*)$ ^thunderbird-locale-gl(?::\w+|)\s+(.*)$ ^thunderbird-locale-he(?::\w+|)\s+(.*)$ ^thunderbird-locale-hr(?::\w+|)\s+(.*)$ ^thunderbird-locale-hsb(?::\w+|)\s+(.*)$ ^thunderbird-locale-hu(?::\w+|)\s+(.*)$ ^thunderbird-locale-hy(?::\w+|)\s+(.*)$ ^thunderbird-locale-id(?::\w+|)\s+(.*)$ ^thunderbird-locale-is(?::\w+|)\s+(.*)$ ^thunderbird-locale-it(?::\w+|)\s+(.*)$ ^thunderbird-locale-ja(?::\w+|)\s+(.*)$ ^thunderbird-locale-ka(?::\w+|)\s+(.*)$ ^thunderbird-locale-kab(?::\w+|)\s+(.*)$ ^thunderbird-locale-kk(?::\w+|)\s+(.*)$ ^thunderbird-locale-ko(?::\w+|)\s+(.*)$ ^thunderbird-locale-lt(?::\w+|)\s+(.*)$ ^thunderbird-locale-lv(?::\w+|)\s+(.*)$ ^thunderbird-locale-mk(?::\w+|)\s+(.*)$ ^thunderbird-locale-ms(?::\w+|)\s+(.*)$ ^thunderbird-locale-nb(?::\w+|)\s+(.*)$ ^thunderbird-locale-nb-no(?::\w+|)\s+(.*)$ ^thunderbird-locale-nl(?::\w+|)\s+(.*)$ ^thunderbird-locale-nn(?::\w+|)\s+(.*)$ ^thunderbird-locale-nn-no(?::\w+|)\s+(.*)$ ^thunderbird-locale-pa(?::\w+|)\s+(.*)$ ^thunderbird-locale-pa-in(?::\w+|)\s+(.*)$ ^thunderbird-locale-pl(?::\w+|)\s+(.*)$ ^thunderbird-locale-pt(?::\w+|)\s+(.*)$ ^thunderbird-locale-pt-br(?::\w+|)\s+(.*)$ ^thunderbird-locale-pt-pt(?::\w+|)\s+(.*)$ ^thunderbird-locale-rm(?::\w+|)\s+(.*)$ ^thunderbird-locale-ro(?::\w+|)\s+(.*)$ ^thunderbird-locale-ru(?::\w+|)\s+(.*)$ ^thunderbird-locale-si(?::\w+|)\s+(.*)$ ^thunderbird-locale-sk(?::\w+|)\s+(.*)$ ^thunderbird-locale-sl(?::\w+|)\s+(.*)$ ^thunderbird-locale-sq(?::\w+|)\s+(.*)$ ^thunderbird-locale-sr(?::\w+|)\s+(.*)$ ^thunderbird-locale-sv(?::\w+|)\s+(.*)$ ^thunderbird-locale-sv-se(?::\w+|)\s+(.*)$ ^thunderbird-locale-ta(?::\w+|)\s+(.*)$ ^thunderbird-locale-ta-lk(?::\w+|)\s+(.*)$ ^thunderbird-locale-th(?::\w+|)\s+(.*)$ ^thunderbird-locale-tr(?::\w+|)\s+(.*)$ ^thunderbird-locale-uk(?::\w+|)\s+(.*)$ ^thunderbird-locale-uz(?::\w+|)\s+(.*)$ ^thunderbird-locale-vi(?::\w+|)\s+(.*)$ ^thunderbird-locale-zh-cn(?::\w+|)\s+(.*)$ ^thunderbird-locale-zh-hans(?::\w+|)\s+(.*)$ ^thunderbird-locale-zh-hant(?::\w+|)\s+(.*)$ ^thunderbird-locale-zh-tw(?::\w+|)\s+(.*)$ ^thunderbird-mozsymbols(?::\w+|)\s+(.*)$ ^xul-ext-calendar-timezones(?::\w+|)\s+(.*)$ ^xul-ext-gdata-provider(?::\w+|)\s+(.*)$ ^xul-ext-lightning(?::\w+|)\s+(.*)$ ^curl(?::\w+|)\s+(.*)$ ^libcurl3-gnutls(?::\w+|)\s+(.*)$ ^libcurl3-nss(?::\w+|)\s+(.*)$ ^libcurl4(?::\w+|)\s+(.*)$ ^libcurl4-doc(?::\w+|)\s+(.*)$ ^libcurl4-gnutls-dev(?::\w+|)\s+(.*)$ ^libcurl4-nss-dev(?::\w+|)\s+(.*)$ ^libcurl4-openssl-dev(?::\w+|)\s+(.*)$ ^bsdutils(?::\w+|)\s+(.*)$ ^bsdextrautils(?::\w+|)\s+(.*)$ ^eject(?::\w+|)\s+(.*)$ ^fdisk(?::\w+|)\s+(.*)$ ^libblkid-dev(?::\w+|)\s+(.*)$ ^libblkid1(?::\w+|)\s+(.*)$ ^libfdisk-dev(?::\w+|)\s+(.*)$ ^libfdisk1(?::\w+|)\s+(.*)$ ^libmount-dev(?::\w+|)\s+(.*)$ ^libmount1(?::\w+|)\s+(.*)$ ^libsmartcols-dev(?::\w+|)\s+(.*)$ ^libsmartcols1(?::\w+|)\s+(.*)$ ^libuuid1(?::\w+|)\s+(.*)$ ^mount(?::\w+|)\s+(.*)$ ^rfkill(?::\w+|)\s+(.*)$ ^util-linux(?::\w+|)\s+(.*)$ ^util-linux-extra(?::\w+|)\s+(.*)$ ^util-linux-locales(?::\w+|)\s+(.*)$ ^uuid-dev(?::\w+|)\s+(.*)$ ^uuid-runtime(?::\w+|)\s+(.*)$ ^bsdutils(?::\w+|)\s+(.*)$ ^bsdextrautils(?::\w+|)\s+(.*)$ ^eject(?::\w+|)\s+(.*)$ ^fdisk(?::\w+|)\s+(.*)$ ^libblkid-dev(?::\w+|)\s+(.*)$ ^libblkid1(?::\w+|)\s+(.*)$ ^libfdisk-dev(?::\w+|)\s+(.*)$ ^libfdisk1(?::\w+|)\s+(.*)$ ^libmount-dev(?::\w+|)\s+(.*)$ ^libmount1(?::\w+|)\s+(.*)$ ^libsmartcols-dev(?::\w+|)\s+(.*)$ ^libsmartcols1(?::\w+|)\s+(.*)$ ^libuuid1(?::\w+|)\s+(.*)$ ^mount(?::\w+|)\s+(.*)$ ^rfkill(?::\w+|)\s+(.*)$ ^util-linux(?::\w+|)\s+(.*)$ ^util-linux-extra(?::\w+|)\s+(.*)$ ^util-linux-locales(?::\w+|)\s+(.*)$ ^uuid-dev(?::\w+|)\s+(.*)$ ^uuid-runtime(?::\w+|)\s+(.*)$ ^xnest(?::\w+|)\s+(.*)$ ^xorg-server-source(?::\w+|)\s+(.*)$ ^xserver-common(?::\w+|)\s+(.*)$ ^xserver-xephyr(?::\w+|)\s+(.*)$ ^xserver-xorg-core(?::\w+|)\s+(.*)$ ^xserver-xorg-dev(?::\w+|)\s+(.*)$ ^xserver-xorg-legacy(?::\w+|)\s+(.*)$ ^xvfb(?::\w+|)\s+(.*)$ ^xwayland(?::\w+|)\s+(.*)$ ^xnest(?::\w+|)\s+(.*)$ ^xorg-server-source(?::\w+|)\s+(.*)$ ^xserver-common(?::\w+|)\s+(.*)$ ^xserver-xephyr(?::\w+|)\s+(.*)$ ^xserver-xorg-core(?::\w+|)\s+(.*)$ ^xserver-xorg-dev(?::\w+|)\s+(.*)$ ^xserver-xorg-legacy(?::\w+|)\s+(.*)$ ^xvfb(?::\w+|)\s+(.*)$ ^xwayland(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-starfive)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-laptop)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-aws|-gcp)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-azure|-azure-fde)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-oracle|-oracle-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-generic|-generic-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-lowlatency|-lowlatency-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-raspi)(?::\w+|)\s+(.*)$ ^libnss3(?::\w+|)\s+(.*)$ ^libnss3-dev(?::\w+|)\s+(.*)$ ^libnss3-tools(?::\w+|)\s+(.*)$ ^squid(?::\w+|)\s+(.*)$ ^squid-cgi(?::\w+|)\s+(.*)$ ^squid-common(?::\w+|)\s+(.*)$ ^squid-openssl(?::\w+|)\s+(.*)$ ^squid-purge(?::\w+|)\s+(.*)$ ^squidclient(?::\w+|)\s+(.*)$ ^apache2(?::\w+|)\s+(.*)$ ^apache2-bin(?::\w+|)\s+(.*)$ ^apache2-data(?::\w+|)\s+(.*)$ ^apache2-dev(?::\w+|)\s+(.*)$ ^apache2-doc(?::\w+|)\s+(.*)$ ^apache2-ssl-dev(?::\w+|)\s+(.*)$ ^apache2-suexec-custom(?::\w+|)\s+(.*)$ ^apache2-suexec-pristine(?::\w+|)\s+(.*)$ ^apache2-utils(?::\w+|)\s+(.*)$ ^libapache2-mod-md(?::\w+|)\s+(.*)$ ^libapache2-mod-proxy-uwsgi(?::\w+|)\s+(.*)$ ^yard(?::\w+|)\s+(.*)$ ^yard-doc(?::\w+|)\s+(.*)$ ^gir1.2-javascriptcoregtk-4.0(?::\w+|)\s+(.*)$ ^gir1.2-javascriptcoregtk-4.1(?::\w+|)\s+(.*)$ ^gir1.2-javascriptcoregtk-6.0(?::\w+|)\s+(.*)$ ^gir1.2-webkit-6.0(?::\w+|)\s+(.*)$ ^gir1.2-webkit2-4.0(?::\w+|)\s+(.*)$ ^gir1.2-webkit2-4.1(?::\w+|)\s+(.*)$ ^libjavascriptcoregtk-4.0-18(?::\w+|)\s+(.*)$ ^libjavascriptcoregtk-4.0-bin(?::\w+|)\s+(.*)$ ^libjavascriptcoregtk-4.0-dev(?::\w+|)\s+(.*)$ ^libjavascriptcoregtk-4.1-0(?::\w+|)\s+(.*)$ ^libjavascriptcoregtk-4.1-dev(?::\w+|)\s+(.*)$ ^libjavascriptcoregtk-6.0-1(?::\w+|)\s+(.*)$ ^libjavascriptcoregtk-6.0-dev(?::\w+|)\s+(.*)$ ^libwebkit2gtk-4.0-37(?::\w+|)\s+(.*)$ ^libwebkit2gtk-4.0-dev(?::\w+|)\s+(.*)$ ^libwebkit2gtk-4.0-doc(?::\w+|)\s+(.*)$ ^libwebkit2gtk-4.1-0(?::\w+|)\s+(.*)$ ^libwebkit2gtk-4.1-dev(?::\w+|)\s+(.*)$ ^libwebkitgtk-6.0-4(?::\w+|)\s+(.*)$ ^libwebkitgtk-6.0-dev(?::\w+|)\s+(.*)$ ^webkit2gtk-driver(?::\w+|)\s+(.*)$ ^gnutls-bin(?::\w+|)\s+(.*)$ ^gnutls-doc(?::\w+|)\s+(.*)$ ^libgnutls-dane0(?::\w+|)\s+(.*)$ ^libgnutls-openssl27(?::\w+|)\s+(.*)$ ^libgnutls28-dev(?::\w+|)\s+(.*)$ ^libgnutls30(?::\w+|)\s+(.*)$ ^libnss-libvirt(?::\w+|)\s+(.*)$ ^libvirt-clients(?::\w+|)\s+(.*)$ ^libvirt-clients-qemu(?::\w+|)\s+(.*)$ ^libvirt-daemon(?::\w+|)\s+(.*)$ ^libvirt-daemon-config-network(?::\w+|)\s+(.*)$ ^libvirt-daemon-config-nwfilter(?::\w+|)\s+(.*)$ ^libvirt-daemon-driver-lxc(?::\w+|)\s+(.*)$ ^libvirt-daemon-driver-qemu(?::\w+|)\s+(.*)$ ^libvirt-daemon-driver-storage-gluster(?::\w+|)\s+(.*)$ ^libvirt-daemon-driver-storage-iscsi-direct(?::\w+|)\s+(.*)$ ^libvirt-daemon-driver-storage-rbd(?::\w+|)\s+(.*)$ ^libvirt-daemon-driver-storage-zfs(?::\w+|)\s+(.*)$ ^libvirt-daemon-driver-vbox(?::\w+|)\s+(.*)$ ^libvirt-daemon-driver-xen(?::\w+|)\s+(.*)$ ^libvirt-daemon-system(?::\w+|)\s+(.*)$ ^libvirt-daemon-system-systemd(?::\w+|)\s+(.*)$ ^libvirt-daemon-system-sysv(?::\w+|)\s+(.*)$ ^libvirt-dev(?::\w+|)\s+(.*)$ ^libvirt-doc(?::\w+|)\s+(.*)$ ^libvirt-l10n(?::\w+|)\s+(.*)$ ^libvirt-login-shell(?::\w+|)\s+(.*)$ ^libvirt-sanlock(?::\w+|)\s+(.*)$ ^libvirt-wireshark(?::\w+|)\s+(.*)$ ^libvirt0(?::\w+|)\s+(.*)$ ^libnode-dev(?::\w+|)\s+(.*)$ ^libnode108(?::\w+|)\s+(.*)$ ^nodejs(?::\w+|)\s+(.*)$ ^nodejs-doc(?::\w+|)\s+(.*)$ ^klibc-utils(?::\w+|)\s+(.*)$ ^libklibc(?::\w+|)\s+(.*)$ ^libklibc-dev(?::\w+|)\s+(.*)$ ^glibc-doc(?::\w+|)\s+(.*)$ ^glibc-source(?::\w+|)\s+(.*)$ ^libc-bin(?::\w+|)\s+(.*)$ ^libc-dev-bin(?::\w+|)\s+(.*)$ ^libc-devtools(?::\w+|)\s+(.*)$ ^libc6(?::\w+|)\s+(.*)$ ^libc6-amd64(?::\w+|)\s+(.*)$ ^libc6-dev(?::\w+|)\s+(.*)$ ^libc6-dev-amd64(?::\w+|)\s+(.*)$ ^libc6-dev-i386(?::\w+|)\s+(.*)$ ^libc6-dev-s390(?::\w+|)\s+(.*)$ ^libc6-dev-x32(?::\w+|)\s+(.*)$ ^libc6-i386(?::\w+|)\s+(.*)$ ^libc6-prof(?::\w+|)\s+(.*)$ ^libc6-s390(?::\w+|)\s+(.*)$ ^libc6-x32(?::\w+|)\s+(.*)$ ^locales(?::\w+|)\s+(.*)$ ^locales-all(?::\w+|)\s+(.*)$ ^nscd(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-starfive)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-laptop)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-raspi)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-aws|-gcp)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-azure|-azure-fde)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-oracle|-oracle-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-generic|-generic-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.5.0-\d+(?:-lowlatency|-lowlatency-64k)(?::\w+|)\s+(.*)$ ^python-pil-doc(?::\w+|)\s+(.*)$ ^python3-pil(?::\w+|)\s+(.*)$ ^python3-pil.imagetk(?::\w+|)\s+(.*)$ ^google-osconfig-agent(?::\w+|)\s+(.*)$ ^google-guest-agent(?::\w+|)\s+(.*)$ ^ruby-sanitize(?::\w+|)\s+(.*)$ ^freerdp2-dev(?::\w+|)\s+(.*)$ ^freerdp2-shadow-x11(?::\w+|)\s+(.*)$ ^freerdp2-wayland(?::\w+|)\s+(.*)$ ^freerdp2-x11(?::\w+|)\s+(.*)$ ^libfreerdp-client2-2(?::\w+|)\s+(.*)$ ^libfreerdp-server2-2(?::\w+|)\s+(.*)$ ^libfreerdp-shadow-subsystem2-2(?::\w+|)\s+(.*)$ ^libfreerdp-shadow2-2(?::\w+|)\s+(.*)$ ^libfreerdp2-2(?::\w+|)\s+(.*)$ ^libuwac0-0(?::\w+|)\s+(.*)$ ^libuwac0-dev(?::\w+|)\s+(.*)$ ^libwinpr-tools2-2(?::\w+|)\s+(.*)$ ^libwinpr2-2(?::\w+|)\s+(.*)$ ^libwinpr2-dev(?::\w+|)\s+(.*)$ ^winpr-utils(?::\w+|)\s+(.*)$ ^thunderbird(?::\w+|)\s+(.*)$ ^thunderbird-dev(?::\w+|)\s+(.*)$ ^thunderbird-gnome-support(?::\w+|)\s+(.*)$ ^thunderbird-locale-af(?::\w+|)\s+(.*)$ ^thunderbird-locale-ar(?::\w+|)\s+(.*)$ ^thunderbird-locale-ast(?::\w+|)\s+(.*)$ ^thunderbird-locale-be(?::\w+|)\s+(.*)$ ^thunderbird-locale-bg(?::\w+|)\s+(.*)$ ^thunderbird-locale-bn(?::\w+|)\s+(.*)$ ^thunderbird-locale-bn-bd(?::\w+|)\s+(.*)$ ^thunderbird-locale-br(?::\w+|)\s+(.*)$ ^thunderbird-locale-ca(?::\w+|)\s+(.*)$ ^thunderbird-locale-cak(?::\w+|)\s+(.*)$ ^thunderbird-locale-cs(?::\w+|)\s+(.*)$ ^thunderbird-locale-cy(?::\w+|)\s+(.*)$ ^thunderbird-locale-da(?::\w+|)\s+(.*)$ ^thunderbird-locale-de(?::\w+|)\s+(.*)$ ^thunderbird-locale-dsb(?::\w+|)\s+(.*)$ ^thunderbird-locale-el(?::\w+|)\s+(.*)$ ^thunderbird-locale-en(?::\w+|)\s+(.*)$ ^thunderbird-locale-en-gb(?::\w+|)\s+(.*)$ ^thunderbird-locale-en-us(?::\w+|)\s+(.*)$ ^thunderbird-locale-es(?::\w+|)\s+(.*)$ ^thunderbird-locale-es-ar(?::\w+|)\s+(.*)$ ^thunderbird-locale-es-es(?::\w+|)\s+(.*)$ ^thunderbird-locale-et(?::\w+|)\s+(.*)$ ^thunderbird-locale-eu(?::\w+|)\s+(.*)$ ^thunderbird-locale-fa(?::\w+|)\s+(.*)$ ^thunderbird-locale-fi(?::\w+|)\s+(.*)$ ^thunderbird-locale-fr(?::\w+|)\s+(.*)$ ^thunderbird-locale-fy(?::\w+|)\s+(.*)$ ^thunderbird-locale-fy-nl(?::\w+|)\s+(.*)$ ^thunderbird-locale-ga(?::\w+|)\s+(.*)$ ^thunderbird-locale-ga-ie(?::\w+|)\s+(.*)$ ^thunderbird-locale-gd(?::\w+|)\s+(.*)$ ^thunderbird-locale-gl(?::\w+|)\s+(.*)$ ^thunderbird-locale-he(?::\w+|)\s+(.*)$ ^thunderbird-locale-hr(?::\w+|)\s+(.*)$ ^thunderbird-locale-hsb(?::\w+|)\s+(.*)$ ^thunderbird-locale-hu(?::\w+|)\s+(.*)$ ^thunderbird-locale-hy(?::\w+|)\s+(.*)$ ^thunderbird-locale-id(?::\w+|)\s+(.*)$ ^thunderbird-locale-is(?::\w+|)\s+(.*)$ ^thunderbird-locale-it(?::\w+|)\s+(.*)$ ^thunderbird-locale-ja(?::\w+|)\s+(.*)$ ^thunderbird-locale-ka(?::\w+|)\s+(.*)$ ^thunderbird-locale-kab(?::\w+|)\s+(.*)$ ^thunderbird-locale-kk(?::\w+|)\s+(.*)$ ^thunderbird-locale-ko(?::\w+|)\s+(.*)$ ^thunderbird-locale-lt(?::\w+|)\s+(.*)$ ^thunderbird-locale-lv(?::\w+|)\s+(.*)$ ^thunderbird-locale-mk(?::\w+|)\s+(.*)$ ^thunderbird-locale-ms(?::\w+|)\s+(.*)$ ^thunderbird-locale-nb(?::\w+|)\s+(.*)$ ^thunderbird-locale-nb-no(?::\w+|)\s+(.*)$ ^thunderbird-locale-nl(?::\w+|)\s+(.*)$ ^thunderbird-locale-nn(?::\w+|)\s+(.*)$ ^thunderbird-locale-nn-no(?::\w+|)\s+(.*)$ ^thunderbird-locale-pa(?::\w+|)\s+(.*)$ ^thunderbird-locale-pa-in(?::\w+|)\s+(.*)$ ^thunderbird-locale-pl(?::\w+|)\s+(.*)$ ^thunderbird-locale-pt(?::\w+|)\s+(.*)$ ^thunderbird-locale-pt-br(?::\w+|)\s+(.*)$ ^thunderbird-locale-pt-pt(?::\w+|)\s+(.*)$ ^thunderbird-locale-rm(?::\w+|)\s+(.*)$ ^thunderbird-locale-ro(?::\w+|)\s+(.*)$ ^thunderbird-locale-ru(?::\w+|)\s+(.*)$ ^thunderbird-locale-si(?::\w+|)\s+(.*)$ ^thunderbird-locale-sk(?::\w+|)\s+(.*)$ ^thunderbird-locale-sl(?::\w+|)\s+(.*)$ ^thunderbird-locale-sq(?::\w+|)\s+(.*)$ ^thunderbird-locale-sr(?::\w+|)\s+(.*)$ ^thunderbird-locale-sv(?::\w+|)\s+(.*)$ ^thunderbird-locale-sv-se(?::\w+|)\s+(.*)$ ^thunderbird-locale-ta(?::\w+|)\s+(.*)$ ^thunderbird-locale-ta-lk(?::\w+|)\s+(.*)$ ^thunderbird-locale-th(?::\w+|)\s+(.*)$ ^thunderbird-locale-tr(?::\w+|)\s+(.*)$ ^thunderbird-locale-uk(?::\w+|)\s+(.*)$ ^thunderbird-locale-uz(?::\w+|)\s+(.*)$ ^thunderbird-locale-vi(?::\w+|)\s+(.*)$ ^thunderbird-locale-zh-cn(?::\w+|)\s+(.*)$ ^thunderbird-locale-zh-hans(?::\w+|)\s+(.*)$ ^thunderbird-locale-zh-hant(?::\w+|)\s+(.*)$ ^thunderbird-locale-zh-tw(?::\w+|)\s+(.*)$ ^thunderbird-mozsymbols(?::\w+|)\s+(.*)$ ^xul-ext-calendar-timezones(?::\w+|)\s+(.*)$ ^xul-ext-gdata-provider(?::\w+|)\s+(.*)$ ^xul-ext-lightning(?::\w+|)\s+(.*)$ ^freerdp2-dev(?::\w+|)\s+(.*)$ ^freerdp2-shadow-x11(?::\w+|)\s+(.*)$ ^freerdp2-wayland(?::\w+|)\s+(.*)$ ^freerdp2-x11(?::\w+|)\s+(.*)$ ^libfreerdp-client2-2(?::\w+|)\s+(.*)$ ^libfreerdp-server2-2(?::\w+|)\s+(.*)$ ^libfreerdp-shadow-subsystem2-2(?::\w+|)\s+(.*)$ ^libfreerdp-shadow2-2(?::\w+|)\s+(.*)$ ^libfreerdp2-2(?::\w+|)\s+(.*)$ ^libuwac0-0(?::\w+|)\s+(.*)$ ^libuwac0-dev(?::\w+|)\s+(.*)$ ^libwinpr-tools2-2(?::\w+|)\s+(.*)$ ^libwinpr2-2(?::\w+|)\s+(.*)$ ^libwinpr2-dev(?::\w+|)\s+(.*)$ ^winpr-utils(?::\w+|)\s+(.*)$ ^libnghttp2-14(?::\w+|)\s+(.*)$ ^libnghttp2-dev(?::\w+|)\s+(.*)$ ^libnghttp2-doc(?::\w+|)\s+(.*)$ ^nghttp2(?::\w+|)\s+(.*)$ ^nghttp2-client(?::\w+|)\s+(.*)$ ^nghttp2-proxy(?::\w+|)\s+(.*)$ ^nghttp2-server(?::\w+|)\s+(.*)$ ^cpio(?::\w+|)\s+(.*)$ ^cpio-win32(?::\w+|)\s+(.*)$ ^less(?::\w+|)\s+(.*)$ ^libapache2-mod-php8.2(?::\w+|)\s+(.*)$ ^libphp8.2-embed(?::\w+|)\s+(.*)$ ^php8.2(?::\w+|)\s+(.*)$ ^php8.2-bcmath(?::\w+|)\s+(.*)$ ^php8.2-bz2(?::\w+|)\s+(.*)$ ^php8.2-cgi(?::\w+|)\s+(.*)$ ^php8.2-cli(?::\w+|)\s+(.*)$ ^php8.2-common(?::\w+|)\s+(.*)$ ^php8.2-curl(?::\w+|)\s+(.*)$ ^php8.2-dba(?::\w+|)\s+(.*)$ ^php8.2-dev(?::\w+|)\s+(.*)$ ^php8.2-enchant(?::\w+|)\s+(.*)$ ^php8.2-fpm(?::\w+|)\s+(.*)$ ^php8.2-gd(?::\w+|)\s+(.*)$ ^php8.2-gmp(?::\w+|)\s+(.*)$ ^php8.2-imap(?::\w+|)\s+(.*)$ ^php8.2-interbase(?::\w+|)\s+(.*)$ ^php8.2-intl(?::\w+|)\s+(.*)$ ^php8.2-ldap(?::\w+|)\s+(.*)$ ^php8.2-mbstring(?::\w+|)\s+(.*)$ ^php8.2-mysql(?::\w+|)\s+(.*)$ ^php8.2-odbc(?::\w+|)\s+(.*)$ ^php8.2-opcache(?::\w+|)\s+(.*)$ ^php8.2-pgsql(?::\w+|)\s+(.*)$ ^php8.2-phpdbg(?::\w+|)\s+(.*)$ ^php8.2-pspell(?::\w+|)\s+(.*)$ ^php8.2-readline(?::\w+|)\s+(.*)$ ^php8.2-snmp(?::\w+|)\s+(.*)$ ^php8.2-soap(?::\w+|)\s+(.*)$ ^php8.2-sqlite3(?::\w+|)\s+(.*)$ ^php8.2-sybase(?::\w+|)\s+(.*)$ ^php8.2-tidy(?::\w+|)\s+(.*)$ ^php8.2-xml(?::\w+|)\s+(.*)$ ^php8.2-xsl(?::\w+|)\s+(.*)$ ^php8.2-zip(?::\w+|)\s+(.*)$ ^gerbv(?::\w+|)\s+(.*)$ ^anope(?::\w+|)\s+(.*)$