Canonical USN OVAL Generator 1 5.11.1 2024-09-27T23:29:16 Copyright (C) 2024 Canonical LTD. All rights reserved. This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, version 3 of the License. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License version 3 for more details. You should have received a copy of the GNU General Public License version 3 along with this program. If not, see http://www.gnu.org/licenses/. USN-6663-3 -- OpenSSL update Ubuntu 24.04 LTS USN-6663-1 provided a security update for OpenSSL. This update provides the corresponding update for Ubuntu 24.04 LTS. Original advisory details: As a security improvement, OpenSSL will now return deterministic random bytes instead of an error when detecting wrong padding in PKCS#1 v1.5 RSA to prevent its use in possible Bleichenbacher timing attacks. Update Instructions: Run `sudo pro fix USN-6663-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libssl3t64 - 3.0.13-0ubuntu3.1 libssl-dev - 3.0.13-0ubuntu3.1 openssl - 3.0.13-0ubuntu3.1 libssl-doc - 3.0.13-0ubuntu3.1 No subscription required None https://launchpad.net/bugs/2054090 USN-6673-3 -- python-cryptography vulnerability Ubuntu 24.04 LTS USN-6673-1 provided a security update for python-cryptography. This update provides the corresponding update for Ubuntu 24.04 LTS. Original advisory details: It was discovered that python-cryptography incorrectly handled memory operations when processing mismatched PKCS#12 keys. A remote attacker could possibly use this issue to cause python-cryptography to crash, leading to a denial of service. This issue only affected Ubuntu 23.10. (CVE-2024-26130) Update Instructions: Run `sudo pro fix USN-6673-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-cryptography - 41.0.7-4ubuntu0.1 python-cryptography-doc - 41.0.7-4ubuntu0.1 No subscription required Medium CVE-2024-26130 USN-6715-2 -- unixODBC vulnerability Ubuntu 24.04 LTS USN-6715-1 fixed a vulnerability in unixODBC. This update provides the corresponding fix for Ubuntu 24.04 LTS. Original advisory details: It was discovered that unixODBC incorrectly handled certain bytes. An attacker could use this issue to execute arbitrary code or cause a crash. Update Instructions: Run `sudo pro fix USN-6715-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libodbc2 - 2.3.12-1ubuntu0.24.04.1 unixodbc-dev - 2.3.12-1ubuntu0.24.04.1 unixodbc-common - 2.3.12-1ubuntu0.24.04.1 unixodbc - 2.3.12-1ubuntu0.24.04.1 odbcinst - 2.3.12-1ubuntu0.24.04.1 libodbcinst2 - 2.3.12-1ubuntu0.24.04.1 libodbccr2 - 2.3.12-1ubuntu0.24.04.1 No subscription required Medium CVE-2024-1013 USN-6718-3 -- curl vulnerabilities Ubuntu 24.04 LTS USN-6718-1 fixed vulnerabilities in curl. This update provides the corresponding updates for Ubuntu 24.04 LTS. Original advisory details: Dan Fandrich discovered that curl would incorrectly use the default set of protocols when a parameter option disabled all protocols without adding any, contrary to expectations. This issue only affected Ubuntu 23.10. (CVE-2024-2004) It was discovered that curl incorrectly handled memory when limiting the amount of headers when HTTP/2 server push is allowed. A remote attacker could possibly use this issue to cause curl to consume resources, leading to a denial of service. (CVE-2024-2398) Update Instructions: Run `sudo pro fix USN-6718-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libcurl4-gnutls-dev - 8.5.0-2ubuntu10.1 libcurl4-openssl-dev - 8.5.0-2ubuntu10.1 libcurl3t64-gnutls - 8.5.0-2ubuntu10.1 libcurl4-doc - 8.5.0-2ubuntu10.1 curl - 8.5.0-2ubuntu10.1 libcurl4t64 - 8.5.0-2ubuntu10.1 No subscription required Medium CVE-2024-2004 CVE-2024-2398 USN-6729-3 -- Apache HTTP Server vulnerabilities Ubuntu 24.04 LTS USN-6729-1 fixed vulnerabilities in Apache HTTP Server. This update provides the corresponding updates for Ubuntu 24.04 LTS. Original advisory details: Orange Tsai discovered that the Apache HTTP Server incorrectly handled validating certain input. A remote attacker could possibly use this issue to perform HTTP request splitting attacks. (CVE-2023-38709) Keran Mu and Jianjun Chen discovered that the Apache HTTP Server incorrectly handled validating certain input. A remote attacker could possibly use this issue to perform HTTP request splitting attacks. (CVE-2024-24795) Bartek Nowotarski discovered that the Apache HTTP Server HTTP/2 module incorrectly handled endless continuation frames. A remote attacker could possibly use this issue to cause the server to consume resources, leading to a denial of service. (CVE-2024-27316) Update Instructions: Run `sudo pro fix USN-6729-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: apache2-data - 2.4.58-1ubuntu8.1 libapache2-mod-md - 2.4.58-1ubuntu8.1 apache2-utils - 2.4.58-1ubuntu8.1 apache2-dev - 2.4.58-1ubuntu8.1 apache2-suexec-pristine - 2.4.58-1ubuntu8.1 apache2-suexec-custom - 2.4.58-1ubuntu8.1 apache2 - 2.4.58-1ubuntu8.1 apache2-doc - 2.4.58-1ubuntu8.1 libapache2-mod-proxy-uwsgi - 2.4.58-1ubuntu8.1 apache2-ssl-dev - 2.4.58-1ubuntu8.1 apache2-bin - 2.4.58-1ubuntu8.1 No subscription required Medium CVE-2023-38709 CVE-2024-24795 CVE-2024-27316 USN-6733-2 -- GnuTLS vulnerabilities Ubuntu 24.04 LTS USN-6733-1 fixed vulnerabilities in GnuTLS. This update provides the corresponding updates for Ubuntu 24.04 LTS. Original advisory details: It was discovered that GnuTLS had a timing side-channel when performing certain ECDSA operations. A remote attacker could possibly use this issue to recover sensitive information. (CVE-2024-28834) It was discovered that GnuTLS incorrectly handled verifying certain PEM bundles. A remote attacker could possibly use this issue to cause GnuTLS to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 23.10. (CVE-2024-28835) Update Instructions: Run `sudo pro fix USN-6733-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libgnutls-openssl27t64 - 3.8.3-1.1ubuntu3.1 libgnutls-dane0t64 - 3.8.3-1.1ubuntu3.1 libgnutls28-dev - 3.8.3-1.1ubuntu3.1 gnutls-doc - 3.8.3-1.1ubuntu3.1 libgnutls30t64 - 3.8.3-1.1ubuntu3.1 gnutls-bin - 3.8.3-1.1ubuntu3.1 No subscription required Medium CVE-2024-28834 CVE-2024-28835 USN-6734-2 -- libvirt vulnerabilities Ubuntu 24.04 LTS USN-6734-1 fixed vulnerabilities in libvirt. This update provides the corresponding updates for Ubuntu 24.04 LTS. Original advisory details: Alexander Kuznetsov discovered that libvirt incorrectly handled certain API calls. An attacker could possibly use this issue to cause libvirt to crash, resulting in a denial of service. (CVE-2024-1441) It was discovered that libvirt incorrectly handled certain RPC library API calls. An attacker could possibly use this issue to cause libvirt to crash, resulting in a denial of service. (CVE-2024-2494) Update Instructions: Run `sudo pro fix USN-6734-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libvirt-clients-qemu - 10.0.0-2ubuntu8.1 libvirt-dev - 10.0.0-2ubuntu8.1 libvirt-wireshark - 10.0.0-2ubuntu8.1 libvirt-daemon-driver-qemu - 10.0.0-2ubuntu8.1 libvirt-login-shell - 10.0.0-2ubuntu8.1 libvirt-daemon-system-sysv - 10.0.0-2ubuntu8.1 libvirt-daemon-driver-lxc - 10.0.0-2ubuntu8.1 libnss-libvirt - 10.0.0-2ubuntu8.1 libvirt-daemon - 10.0.0-2ubuntu8.1 libvirt-daemon-config-nwfilter - 10.0.0-2ubuntu8.1 libvirt-daemon-driver-storage-iscsi-direct - 10.0.0-2ubuntu8.1 libvirt-daemon-config-network - 10.0.0-2ubuntu8.1 libvirt-l10n - 10.0.0-2ubuntu8.1 libvirt-clients - 10.0.0-2ubuntu8.1 libvirt-daemon-driver-storage-zfs - 10.0.0-2ubuntu8.1 libvirt-daemon-driver-xen - 10.0.0-2ubuntu8.1 libvirt-daemon-driver-vbox - 10.0.0-2ubuntu8.1 libvirt-daemon-driver-storage-gluster - 10.0.0-2ubuntu8.1 libvirt-daemon-system - 10.0.0-2ubuntu8.1 libvirt0 - 10.0.0-2ubuntu8.1 libvirt-daemon-system-systemd - 10.0.0-2ubuntu8.1 libvirt-sanlock - 10.0.0-2ubuntu8.1 libvirt-daemon-driver-storage-rbd - 10.0.0-2ubuntu8.1 libvirt-doc - 10.0.0-2ubuntu8.1 No subscription required Medium CVE-2024-1441 CVE-2024-2494 USN-6736-2 -- klibc vulnerabilities Ubuntu 24.04 LTS USN-6736-1 fixed vulnerabilities in klibc. This update provides the corresponding updates for Ubuntu 24.04 LTS. Original advisory details: It was discovered that zlib, vendored in klibc, incorrectly handled pointer arithmetic. An attacker could use this issue to cause klibc to crash or to possibly execute arbitrary code. (CVE-2016-9840, CVE-2016-9841) Danilo Ramos discovered that zlib, vendored in klibc, incorrectly handled memory when performing certain deflating operations. An attacker could use this issue to cause klibc to crash or to possibly execute arbitrary code. (CVE-2018-25032) Evgeny Legerov discovered that zlib, vendored in klibc, incorrectly handled memory when performing certain inflate operations. An attacker could use this issue to cause klibc to crash or to possibly execute arbitrary code. (CVE-2022-37434) Update Instructions: Run `sudo pro fix USN-6736-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: klibc-utils - 2.0.13-4ubuntu0.1 libklibc - 2.0.13-4ubuntu0.1 libklibc-dev - 2.0.13-4ubuntu0.1 No subscription required Medium CVE-2016-9840 CVE-2016-9841 CVE-2018-25032 CVE-2022-37434 USN-6737-2 -- GNU C Library vulnerability Ubuntu 24.04 LTS USN-6737-1 fixed a vulnerability in the GNU C Library. This update provides the corresponding update for Ubuntu 24.04 LTS. Original advisory details: Charles Fol discovered that the GNU C Library iconv feature incorrectly handled certain input sequences. An attacker could use this issue to cause the GNU C Library to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6737-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libc-bin - 2.39-0ubuntu8.1 glibc-doc - 2.39-0ubuntu8.1 locales-all - 2.39-0ubuntu8.1 libc6-i386 - 2.39-0ubuntu8.1 libc6-s390 - 2.39-0ubuntu8.1 libc6-dev-i386 - 2.39-0ubuntu8.1 libc6-dev-s390 - 2.39-0ubuntu8.1 libc6-dev - 2.39-0ubuntu8.1 libc6-amd64 - 2.39-0ubuntu8.1 libc6-x32 - 2.39-0ubuntu8.1 libc6-dev-amd64 - 2.39-0ubuntu8.1 libc-dev-bin - 2.39-0ubuntu8.1 libc6 - 2.39-0ubuntu8.1 nscd - 2.39-0ubuntu8.1 libc-devtools - 2.39-0ubuntu8.1 glibc-source - 2.39-0ubuntu8.1 libc6-dev-x32 - 2.39-0ubuntu8.1 locales - 2.39-0ubuntu8.1 No subscription required Medium CVE-2024-2961 USN-6744-3 -- Pillow vulnerability Ubuntu 24.04 LTS USN-6744-1 fixed a vulnerability in Pillow. This update provides the corresponding updates for Ubuntu 24.04 LTS. Original advisory details: Hugo van Kemenade discovered that Pillow was not properly performing bounds checks when processing an ICC file, which could lead to a buffer overflow. If a user or automated system were tricked into processing a specially crafted ICC file, an attacker could possibly use this issue to cause a denial of service or execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6744-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-pil.imagetk - 10.2.0-1ubuntu1 python-pil-doc - 10.2.0-1ubuntu1 python3-pil - 10.2.0-1ubuntu1 No subscription required Medium CVE-2024-28219 USN-6746-2 -- Google Guest Agent and Google OS Config Agent vulnerability Ubuntu 24.04 LTS USN-6746-1 fixed vulnerabilities in Google Guest Agent and Google OS Config Agent. This update provides the corresponding update for Ubuntu 24.04 LTS. Original advisory details: It was discovered that Google Guest Agent and Google OS Config Agent incorrectly handled certain JSON files. An attacker could possibly use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-6746-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: google-guest-agent - 20240213.00-0ubuntu3.1 No subscription required google-osconfig-agent - 20240320.00-0ubuntu1~24.04.1 No subscription required Medium CVE-2024-24786 USN-6754-2 -- nghttp2 vulnerability Ubuntu 24.04 LTS USN-6754-1 fixed vulnerabilities in nghttp2. This update provides the corresponding update for Ubuntu 24.04 LTS. Original advisory details: It was discovered that nghttp2 incorrectly handled the HTTP/2 implementation. A remote attacker could possibly use this issue to cause nghttp2 to consume resources, leading to a denial of service. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2019-9511, CVE-2019-9513) It was discovered that nghttp2 incorrectly handled request cancellation. A remote attacker could possibly use this issue to cause nghttp2 to consume resources, leading to a denial of service. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2023-44487) It was discovered that nghttp2 could be made to process an unlimited number of HTTP/2 CONTINUATION frames. A remote attacker could possibly use this issue to cause nghttp2 to consume resources, leading to a denial of service. (CVE-2024-28182) Update Instructions: Run `sudo pro fix USN-6754-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libnghttp2-14 - 1.59.0-1ubuntu0.1 libnghttp2-doc - 1.59.0-1ubuntu0.1 libnghttp2-dev - 1.59.0-1ubuntu0.1 nghttp2-proxy - 1.59.0-1ubuntu0.1 nghttp2 - 1.59.0-1ubuntu0.1 nghttp2-client - 1.59.0-1ubuntu0.1 nghttp2-server - 1.59.0-1ubuntu0.1 No subscription required Medium CVE-2024-28182 USN-6756-1 -- less vulnerability Ubuntu 24.04 LTS It was discovered that less mishandled newline characters in file names. If a user or automated system were tricked into opening specially crafted files, an attacker could possibly use this issue to execute arbitrary commands on the host. Update Instructions: Run `sudo pro fix USN-6756-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: less - 590-2ubuntu2.1 No subscription required Medium CVE-2024-32487 USN-6759-1 -- FreeRDP vulnerabilities Ubuntu 24.04 LTS It was discovered that FreeRDP incorrectly handled certain memory operations. If a user were tricked into connecting to a malicious server, a remote attacker could possibly use this issue to cause FreeRDP to crash, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-6759-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libwinpr3-dev - 3.5.1+dfsg1-0ubuntu1 libfreerdp-server3-3 - 3.5.1+dfsg1-0ubuntu1 winpr3-utils - 3.5.1+dfsg1-0ubuntu1 libfreerdp-shadow3-3 - 3.5.1+dfsg1-0ubuntu1 freerdp3-dev - 3.5.1+dfsg1-0ubuntu1 freerdp3-shadow-x11 - 3.5.1+dfsg1-0ubuntu1 libfreerdp3-3 - 3.5.1+dfsg1-0ubuntu1 libfreerdp-client3-3 - 3.5.1+dfsg1-0ubuntu1 freerdp3-wayland - 3.5.1+dfsg1-0ubuntu1 libwinpr-tools3-3 - 3.5.1+dfsg1-0ubuntu1 libfreerdp-shadow-subsystem3-3 - 3.5.1+dfsg1-0ubuntu1 freerdp3-x11 - 3.5.1+dfsg1-0ubuntu1 libwinpr3-3 - 3.5.1+dfsg1-0ubuntu1 No subscription required Medium CVE-2024-32658 CVE-2024-32659 CVE-2024-32660 CVE-2024-32661 CVE-2024-32662 USN-6761-1 -- Anope vulnerability Ubuntu 24.04 LTS It was discovered that Anope did not properly process credentials for suspended accounts. An attacker could possibly use this issue to normally login to the platform as a suspended user after changing their password. Update Instructions: Run `sudo pro fix USN-6761-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: anope - 2.0.12-1ubuntu1 No subscription required Medium CVE-2024-30187 USN-6763-1 -- libvirt vulnerability Ubuntu 24.04 LTS Martin Širokov discovered that libvirt incorrectly handled certain memory operations. A local attacker could possibly use this issue to access virtproxyd without authorization. Update Instructions: Run `sudo pro fix USN-6763-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libvirt-clients-qemu - 10.0.0-2ubuntu8.2 libvirt-dev - 10.0.0-2ubuntu8.2 libvirt-wireshark - 10.0.0-2ubuntu8.2 libvirt-daemon-driver-qemu - 10.0.0-2ubuntu8.2 libvirt-login-shell - 10.0.0-2ubuntu8.2 libvirt-daemon-system-sysv - 10.0.0-2ubuntu8.2 libvirt-daemon-driver-lxc - 10.0.0-2ubuntu8.2 libnss-libvirt - 10.0.0-2ubuntu8.2 libvirt-daemon - 10.0.0-2ubuntu8.2 libvirt-daemon-config-nwfilter - 10.0.0-2ubuntu8.2 libvirt-daemon-driver-storage-iscsi-direct - 10.0.0-2ubuntu8.2 libvirt-daemon-config-network - 10.0.0-2ubuntu8.2 libvirt-l10n - 10.0.0-2ubuntu8.2 libvirt-clients - 10.0.0-2ubuntu8.2 libvirt-daemon-driver-storage-zfs - 10.0.0-2ubuntu8.2 libvirt-daemon-driver-xen - 10.0.0-2ubuntu8.2 libvirt-daemon-driver-vbox - 10.0.0-2ubuntu8.2 libvirt-daemon-driver-storage-gluster - 10.0.0-2ubuntu8.2 libvirt-daemon-system - 10.0.0-2ubuntu8.2 libvirt0 - 10.0.0-2ubuntu8.2 libvirt-daemon-system-systemd - 10.0.0-2ubuntu8.2 libvirt-sanlock - 10.0.0-2ubuntu8.2 libvirt-daemon-driver-storage-rbd - 10.0.0-2ubuntu8.2 libvirt-doc - 10.0.0-2ubuntu8.2 No subscription required Medium CVE-2024-4418 USN-6768-1 -- GLib vulnerability Ubuntu 24.04 LTS Alicia Boya García discovered that GLib incorrectly handled signal subscriptions. A local attacker could use this issue to spoof D-Bus signals resulting in a variety of impacts including possible privilege escalation. Update Instructions: Run `sudo pro fix USN-6768-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-glib-2.0 - 2.80.0-6ubuntu3.1 libgirepository-2.0-dev - 2.80.0-6ubuntu3.1 gir1.2-girepository-3.0-dev - 2.80.0-6ubuntu3.1 libglib2.0-0t64 - 2.80.0-6ubuntu3.1 libglib2.0-tests - 2.80.0-6ubuntu3.1 gir1.2-glib-2.0-dev - 2.80.0-6ubuntu3.1 libgirepository-2.0-0 - 2.80.0-6ubuntu3.1 gir1.2-girepository-3.0 - 2.80.0-6ubuntu3.1 libglib2.0-data - 2.80.0-6ubuntu3.1 libglib2.0-doc - 2.80.0-6ubuntu3.1 libglib2.0-bin - 2.80.0-6ubuntu3.1 libglib2.0-dev - 2.80.0-6ubuntu3.1 libglib2.0-dev-bin - 2.80.0-6ubuntu3.1 No subscription required Medium CVE-2024-34397 USN-6770-1 -- Fossil regression Ubuntu 24.04 LTS USN-6729-1 fixed vulnerabilities in Apache HTTP Server. The update lead to the discovery of a regression in Fossil with regards to the handling of POST requests that do not have a Content-Length field set. This update fixes the problem. We apologize for the inconvenience. Update Instructions: Run `sudo pro fix USN-6770-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: fossil - 1:2.23-1ubuntu0.1 No subscription required None https://launchpad.net/bugs/2064509 USN-6771-1 -- SQL parse vulnerability Ubuntu 24.04 LTS It was discovered that SQL parse incorrectly handled certain nested lists. An attacker could possibly use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-6771-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-sqlparse-doc - 0.4.4-1ubuntu0.1 python3-sqlparse - 0.4.4-1ubuntu0.1 sqlformat - 0.4.4-1ubuntu0.1 No subscription required Medium CVE-2024-4340 USN-6773-1 -- .NET vulnerabilities Ubuntu 24.04 LTS It was discovered that .NET did not properly handle memory in it's Double Parse routine. An attacker could possibly use this issue to achieve remote code execution. (CVE-2024-30045) It was discovered that .NET did not properly handle the usage of a shared resource. An attacker could possibly use this to cause a dead-lock condition, resulting in a denial of service. (CVE-2024-30046) Update Instructions: Run `sudo pro fix USN-6773-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: dotnet-sdk-8.0 - 8.0.105-0ubuntu1~24.04.1 netstandard-targeting-pack-2.1-8.0 - 8.0.105-0ubuntu1~24.04.1 dotnet-sdk-8.0-source-built-artifacts - 8.0.105-0ubuntu1~24.04.1 dotnet-sdk-dbg-8.0 - 8.0.105-0ubuntu1~24.04.1 dotnet-templates-8.0 - 8.0.105-0ubuntu1~24.04.1 No subscription required dotnet8 - 8.0.105-8.0.5-0ubuntu1~24.04.1 No subscription required aspnetcore-runtime-8.0 - 8.0.5-0ubuntu1~24.04.1 dotnet-apphost-pack-8.0 - 8.0.5-0ubuntu1~24.04.1 dotnet-hostfxr-8.0 - 8.0.5-0ubuntu1~24.04.1 aspnetcore-runtime-dbg-8.0 - 8.0.5-0ubuntu1~24.04.1 dotnet-runtime-dbg-8.0 - 8.0.5-0ubuntu1~24.04.1 dotnet-runtime-8.0 - 8.0.5-0ubuntu1~24.04.1 dotnet-host-8.0 - 8.0.5-0ubuntu1~24.04.1 aspnetcore-targeting-pack-8.0 - 8.0.5-0ubuntu1~24.04.1 dotnet-targeting-pack-8.0 - 8.0.5-0ubuntu1~24.04.1 No subscription required Medium CVE-2024-30045 CVE-2024-30046 USN-6780-1 -- idna vulnerability Ubuntu 24.04 LTS Guido Vranken discovered that idna did not properly manage certain inputs, which could lead to significant resource consumption. An attacker could possibly use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-6780-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-idna - 3.6-2ubuntu0.1 No subscription required Medium CVE-2024-3651 USN-6784-1 -- cJSON vulnerabilities Ubuntu 24.04 LTS It was discovered that cJSON incorrectly handled certain input. An attacker could possibly use this issue to cause cJSON to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 23.10. (CVE-2023-50471, CVE-2023-50472) Luo Jin discovered that cJSON incorrectly handled certain input. An attacker could possibly use this issue to cause cJSON to crash, resulting in a denial of service. (CVE-2024-31755) Update Instructions: Run `sudo pro fix USN-6784-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libcjson-dev - 1.7.17-1ubuntu0.1~esm2 libcjson1 - 1.7.17-1ubuntu0.1~esm2 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2023-50471 CVE-2023-50472 CVE-2024-31755 USN-6785-1 -- GNOME Remote Desktop vulnerability Ubuntu 24.04 LTS Matthias Gerstner discovered that GNOME Remote Desktop incorrectly performed certain user validation checks. A local attacker could possibly use this issue to obtain sensitive information, or take control of remote desktop connections. Update Instructions: Run `sudo pro fix USN-6785-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gnome-remote-desktop - 46.2-1~ubuntu24.04.2 No subscription required Medium CVE-2024-5148 USN-6787-1 -- Jinja2 vulnerability Ubuntu 24.04 LTS It was discovered that Jinja2 incorrectly handled certain HTML attributes that were accepted by the xmlattr filter. An attacker could use this issue to inject arbitrary HTML attribute keys and values to potentially execute a cross-site scripting (XSS) attack. Update Instructions: Run `sudo pro fix USN-6787-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-jinja2-doc - 3.1.2-1ubuntu1.1 python3-jinja2 - 3.1.2-1ubuntu1.1 No subscription required Medium CVE-2024-34064 USN-6788-1 -- WebKitGTK vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the WebKitGTK Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution. Update Instructions: Run `sudo pro fix USN-6788-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-javascriptcoregtk-4.1 - 2.44.2-0ubuntu0.24.04.1 libjavascriptcoregtk-6.0-1 - 2.44.2-0ubuntu0.24.04.1 libjavascriptcoregtk-bin - 2.44.2-0ubuntu0.24.04.1 libwebkitgtk-doc - 2.44.2-0ubuntu0.24.04.1 gir1.2-webkit2-4.1 - 2.44.2-0ubuntu0.24.04.1 libwebkitgtk-6.0-dev - 2.44.2-0ubuntu0.24.04.1 libjavascriptcoregtk-4.1-0 - 2.44.2-0ubuntu0.24.04.1 libwebkit2gtk-4.1-0 - 2.44.2-0ubuntu0.24.04.1 libwebkit2gtk-4.1-dev - 2.44.2-0ubuntu0.24.04.1 libwebkit2gtk-4.0-doc - 2.44.2-0ubuntu0.24.04.1 libjavascriptcoregtk-4.1-dev - 2.44.2-0ubuntu0.24.04.1 libjavascriptcoregtk-6.0-dev - 2.44.2-0ubuntu0.24.04.1 gir1.2-javascriptcoregtk-6.0 - 2.44.2-0ubuntu0.24.04.1 webkit2gtk-driver - 2.44.2-0ubuntu0.24.04.1 libjavascriptcoregtk-4.0-bin - 2.44.2-0ubuntu0.24.04.1 libwebkitgtk-6.0-4 - 2.44.2-0ubuntu0.24.04.1 gir1.2-webkit-6.0 - 2.44.2-0ubuntu0.24.04.1 No subscription required Medium CVE-2024-27834 USN-6789-1 -- LibreOffice vulnerability Ubuntu 24.04 LTS Amel Bouziane-Leblond discovered that LibreOffice incorrectly handled graphic on-click bindings. If a user were tricked into clicking a graphic in a specially crafted document, a remote attacker could possibly run arbitrary script. Update Instructions: Run `sudo pro fix USN-6789-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libreoffice-nlpsolver - 4:0.9+LibO24.2.3-0ubuntu0.24.04.2 No subscription required libreoffice-wiki-publisher - 4:1.2.0+LibO24.2.3-0ubuntu0.24.04.2 No subscription required fonts-opensymbol - 4:102.12+LibO24.2.3-0ubuntu0.24.04.2 No subscription required libreoffice-evolution - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-en-gb - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-librelogo - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ml - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-zh-cn - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-subsequentcheckbase - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-mk - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-id - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-mr - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-style-tango - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-pt-br - 4:24.2.3-0ubuntu0.24.04.2 libreofficekit-data - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-core - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-it - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-uk - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-fr - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-gnome - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-fi - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-nl - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-uiconfig-math - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-uz - 4:24.2.3-0ubuntu0.24.04.2 libreoffice - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-sdbc-mysql - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-nb - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-mn - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ne - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-nl - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-uiconfig-writer - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-nn - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-fi - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-dz - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-nr - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-fr - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-report-builder-bin - 4:24.2.3-0ubuntu0.24.04.2 libofficebean-java - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-qt6 - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-vi - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-nso - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-qt5 - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-nogui - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-math-nogui - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-style-karasa-jaga - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ve - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-gu - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-om - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-gl - 4:24.2.3-0ubuntu0.24.04.2 python3-access2base - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-en-us - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ga - 4:24.2.3-0ubuntu0.24.04.2 libuno-cppu3t64 - 4:24.2.3-0ubuntu0.24.04.2 liblibreofficekitgtk - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-gd - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-km - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-kn - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-ko - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-st - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-dev-common - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-sr - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-cs - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ts - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-sv - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-script-provider-bsh - 4:24.2.3-0ubuntu0.24.04.2 gir1.2-lokdocview-0.1 - 4:24.2.3-0ubuntu0.24.04.2 ure-java - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-report-builder-bin-nogui - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ka - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-uiconfig-common - 4:24.2.3-0ubuntu0.24.04.2 libridl-java - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-ca - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-zh-tw - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-sl - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-sk - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-style-breeze - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-si - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-da - 4:24.2.3-0ubuntu0.24.04.2 libreofficekit-dev - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-de - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-common - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-pl - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-pa-in - 4:24.2.3-0ubuntu0.24.04.2 libuno-purpenvhelpergcc3-3t64 - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-uiconfig-report-builder - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-pt - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-base-nogui - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-gtk3 - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-math - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-vi - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-gtk4 - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-tr - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-hi - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-gug - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-sdbc-hsqldb - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-draw-nogui - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-calc - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-base-drivers - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-style-colibre - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ta - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-sdbc-firebird - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-tg - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-te - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-th - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-id - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-lv - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-hu - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-lt - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ss - 4:24.2.3-0ubuntu0.24.04.2 libunoloader-java - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-uiconfig-impress - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-eu - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-et - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-script-provider-js - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-es - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-el - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-eo - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-style-sifr - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-zh-cn - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ug - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-smoketest-data - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ko - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-zu - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-impress - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-java-common - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-eu - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-et - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-es - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-km - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-uiconfig-draw - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-el - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-uiconfig-calc - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-kk - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-dev-gui - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-be - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-szl - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-bg - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-tn - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-bn - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-plasma - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-ja - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-br - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-bs - 4:24.2.3-0ubuntu0.24.04.2 liblibreoffice-java - 4:24.2.3-0ubuntu0.24.04.2 libunoil-java - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-style-yaru - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-base-core - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-ru - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ru - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-rw - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-is - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-style-elementary - 4:24.2.3-0ubuntu0.24.04.2 python3-uno - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-fa - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-am - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ro - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-en-za - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-style-sukapura - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ca - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-sl - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-calc-nogui - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-sk - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-sv - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-cs - 4:24.2.3-0ubuntu0.24.04.2 python3-scriptforge - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-dev-doc - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-common - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-za - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-cy - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-oc - 4:24.2.3-0ubuntu0.24.04.2 libjurt-java - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-base - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-gl - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-om - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-or - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-pt-br - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-kmr - 4:24.2.3-0ubuntu0.24.04.2 uno-libs-private - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ast - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-hu - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-hr - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-script-provider-python - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-writer-nogui - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-hy - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-he - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-officebean - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-dev - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-report-builder - 4:24.2.3-0ubuntu0.24.04.2 libuno-sal3t64 - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-tr - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-hi - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-kf5 - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-dz - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-pt - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ja - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-pl - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-sdbc-postgresql - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-writer - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-de - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-da - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-uiconfig-base - 4:24.2.3-0ubuntu0.24.04.2 ure - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-impress-nogui - 4:24.2.3-0ubuntu0.24.04.2 libjuh-java - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-it - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-xh - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-af - 4:24.2.3-0ubuntu0.24.04.2 libuno-cppuhelpergcc3-3t64 - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-help-zh-tw - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-en-gb - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-draw - 4:24.2.3-0ubuntu0.24.04.2 libuno-salhelpergcc3-3t64 - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-core-nogui - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-as - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-ar - 4:24.2.3-0ubuntu0.24.04.2 libreoffice-l10n-in - 4:24.2.3-0ubuntu0.24.04.2 No subscription required Medium CVE-2024-3044 USN-6790-1 -- amavisd-new vulnerability Ubuntu 24.04 LTS It was discovered that amavisd-new incorrectly handled certain MIME email messages with multiple boundary parameters. A remote attacker could possibly use this issue to bypass checks for banned files or malware. Update Instructions: Run `sudo pro fix USN-6790-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: amavisd-new-postfix - 1:2.13.0-3ubuntu2 amavisd-new - 1:2.13.0-3ubuntu2 No subscription required Medium CVE-2024-28054 USN-6791-1 -- Unbound vulnerability Ubuntu 24.04 LTS It was discovered that Unbound could take part in a denial of service amplification attack known as DNSBomb. This update introduces certain resource limits to make the impact from Unbound significantly lower. Update Instructions: Run `sudo pro fix USN-6791-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: unbound - 1.19.2-1ubuntu3.1 python3-unbound - 1.19.2-1ubuntu3.1 libunbound8 - 1.19.2-1ubuntu3.1 unbound-anchor - 1.19.2-1ubuntu3.1 unbound-host - 1.19.2-1ubuntu3.1 libunbound-dev - 1.19.2-1ubuntu3.1 No subscription required Low CVE-2024-33655 USN-6793-1 -- Git vulnerabilities Ubuntu 24.04 LTS It was discovered that Git incorrectly handled certain submodules. An attacker could possibly use this issue to execute arbitrary code. This issue was fixed in Ubuntu 22.04 LTS, Ubuntu 23.10 and Ubuntu 24.04 LTS. (CVE-2024-32002) It was discovered that Git incorrectly handled certain cloned repositories. An attacker could possibly use this issue to execute arbitrary code. (CVE-2024-32004) It was discovered that Git incorrectly handled local clones with hardlinked files/directories. An attacker could possibly use this issue to place a specialized repository on their target's local system. (CVE-2024-32020) It was discovered that Git incorrectly handled certain symlinks. An attacker could possibly use this issue to impact availability and integrity creating hardlinked arbitrary files into users repository's objects/directory. (CVE-2024-32021) It was discovered that Git incorrectly handled certain cloned repositories. An attacker could possibly use this issue to execute arbitrary code. (CVE-2024-32465) Update Instructions: Run `sudo pro fix USN-6793-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: git - 1:2.43.0-1ubuntu7.1 gitweb - 1:2.43.0-1ubuntu7.1 git-gui - 1:2.43.0-1ubuntu7.1 git-daemon-sysvinit - 1:2.43.0-1ubuntu7.1 gitk - 1:2.43.0-1ubuntu7.1 git-all - 1:2.43.0-1ubuntu7.1 git-mediawiki - 1:2.43.0-1ubuntu7.1 git-daemon-run - 1:2.43.0-1ubuntu7.1 git-man - 1:2.43.0-1ubuntu7.1 git-doc - 1:2.43.0-1ubuntu7.1 git-svn - 1:2.43.0-1ubuntu7.1 git-cvs - 1:2.43.0-1ubuntu7.1 git-email - 1:2.43.0-1ubuntu7.1 No subscription required Medium CVE-2024-32002 CVE-2024-32004 CVE-2024-32020 CVE-2024-32021 CVE-2024-32465 USN-6794-1 -- FRR vulnerabilities Ubuntu 24.04 LTS It was discovered that FRR incorrectly handled certain malformed BGP and OSPF packets. A remote attacker could use this issue to cause FRR to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6794-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: frr - 8.4.4-1.1ubuntu6.1 frr-rpki-rtrlib - 8.4.4-1.1ubuntu6.1 frr-snmp - 8.4.4-1.1ubuntu6.1 frr-doc - 8.4.4-1.1ubuntu6.1 frr-pythontools - 8.4.4-1.1ubuntu6.1 No subscription required Medium CVE-2024-31948 CVE-2024-31950 CVE-2024-31951 CVE-2024-34088 USN-6796-1 -- TPM2 Software Stack vulnerabilities Ubuntu 24.04 LTS Fergus Dall discovered that TPM2 Software Stack did not properly handle layer arrays. An attacker could possibly use this issue to cause TPM2 Software Stack to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2023-22745) Jurgen Repp and Andreas Fuchs discovered that TPM2 Software Stack did not validate the quote data after deserialization. An attacker could generate an arbitrary quote and cause TPM2 Software Stack to have unknown behavior. (CVE-2024-29040) Update Instructions: Run `sudo pro fix USN-6796-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libtss2-esys-3.0.2-0t64 - 4.0.1-7.1ubuntu5.1 libtss2-sys1t64 - 4.0.1-7.1ubuntu5.1 libtss2-mu-4.0.1-0t64 - 4.0.1-7.1ubuntu5.1 libtss2-tcti-spi-helper0t64 - 4.0.1-7.1ubuntu5.1 libtss2-tcti-libtpms0t64 - 4.0.1-7.1ubuntu5.1 libtss2-doc - 4.0.1-7.1ubuntu5.1 libtss2-tcti-swtpm0t64 - 4.0.1-7.1ubuntu5.1 libtss2-tcti-device0t64 - 4.0.1-7.1ubuntu5.1 libtss2-rc0t64 - 4.0.1-7.1ubuntu5.1 libtss2-fapi1t64 - 4.0.1-7.1ubuntu5.1 libtss2-tcti-mssim0t64 - 4.0.1-7.1ubuntu5.1 libtss2-policy0t64 - 4.0.1-7.1ubuntu5.1 libtss2-tcti-pcap0t64 - 4.0.1-7.1ubuntu5.1 libtss2-tctildr0t64 - 4.0.1-7.1ubuntu5.1 libtss2-dev - 4.0.1-7.1ubuntu5.1 libtss2-tcti-cmd0t64 - 4.0.1-7.1ubuntu5.1 No subscription required Medium CVE-2023-22745 CVE-2024-29040 USN-6797-1 -- Intel Microcode vulnerabilities Ubuntu 24.04 LTS It was discovered that some 3rd and 4th Generation Intel® Xeon® Processors did not properly restrict access to certain hardware features when using Intel® SGX or Intel® TDX. This may allow a privileged local user to potentially further escalate their privileges on the system. This issue only affected Ubuntu 23.10, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 LTS and Ubuntu 16.04 LTS. (CVE-2023-22655) It was discovered that some Intel® Atom® Processors did not properly clear register state when performing various operations. A local attacker could use this to obtain sensitive information via a transient execution attack. This issue only affected Ubuntu 23.10, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 LTS and Ubuntu 16.04 LTS. (CVE-2023-28746) It was discovered that some Intel® Processors did not properly clear the state of various hardware structures when switching execution contexts. A local attacker could use this to access privileged information. This issue only affected Ubuntu 23.10, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 LTS and Ubuntu 16.04 LTS. (CVE-2023-38575) It was discovered that some Intel® Processors did not properly enforce bus lock regulator protections. A remote attacker could use this to cause a denial of service. This issue only affected Ubuntu 23.10, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 LTS and Ubuntu 16.04 LTS. (CVE-2023-39368) It was discovered that some Intel® Xeon® D Processors did not properly calculate the SGX base key when using Intel® SGX. A privileged local attacker could use this to obtain sensitive information. This issue only affected Ubuntu 23.10, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 LTS and Ubuntu 16.04 LTS. (CVE-2023-43490) It was discovered that some Intel® Processors did not properly protect against concurrent accesses. A local attacker could use this to obtain sensitive information. (CVE-2023-45733) It was discovered that some Intel® Processors TDX module software did not properly validate input. A privileged local attacker could use this information to potentially further escalate their privileges on the system. (CVE-2023-45745, CVE-2023-47855) It was discovered that some Intel® Core™ Ultra processors did not properly handle particular instruction sequences. A local attacker could use this issue to cause a denial of service. (CVE-2023-46103) Update Instructions: Run `sudo pro fix USN-6797-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: intel-microcode - 3.20240514.0ubuntu0.24.04.1 No subscription required Medium CVE-2023-22655 CVE-2023-28746 CVE-2023-38575 CVE-2023-39368 CVE-2023-43490 CVE-2023-45733 CVE-2023-45745 CVE-2023-46103 CVE-2023-47855 USN-6798-1 -- GStreamer Base Plugins vulnerability Ubuntu 24.04 LTS It was discovered that GStreamer Base Plugins incorrectly handled certain EXIF metadata. An attacker could possibly use this issue to execute arbitrary code or cause a crash. Update Instructions: Run `sudo pro fix USN-6798-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gstreamer1.0-plugins-base - 1.24.2-1ubuntu0.1 libgstreamer-plugins-base1.0-0 - 1.24.2-1ubuntu0.1 gstreamer1.0-x - 1.24.2-1ubuntu0.1 libgstreamer-gl1.0-0 - 1.24.2-1ubuntu0.1 gstreamer1.0-gl - 1.24.2-1ubuntu0.1 libgstreamer-plugins-base1.0-dev - 1.24.2-1ubuntu0.1 gir1.2-gst-plugins-base-1.0 - 1.24.2-1ubuntu0.1 gstreamer1.0-alsa - 1.24.2-1ubuntu0.1 gstreamer1.0-plugins-base-apps - 1.24.2-1ubuntu0.1 No subscription required Medium CVE-2024-4453 USN-6799-1 -- Werkzeug vulnerability Ubuntu 24.04 LTS It was discovered that the debugger in Werkzeug was not restricted to trusted hosts. A remote attacker could possibly use this issue to execute code on the host under certain circumstances. Update Instructions: Run `sudo pro fix USN-6799-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-werkzeug - 3.0.1-3ubuntu0.1 python-werkzeug-doc - 3.0.1-3ubuntu0.1 No subscription required Medium CVE-2024-34069 USN-6801-1 -- PyMySQL vulnerability Ubuntu 24.04 LTS It was discovered that PyMySQL incorrectly escaped untrusted JSON input. An attacker could possibly use this issue to perform SQL injection attacks. Update Instructions: Run `sudo pro fix USN-6801-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-pymysql - 1.0.2-2ubuntu1.1 python-pymysql-doc - 1.0.2-2ubuntu1.1 No subscription required Medium CVE-2024-36039 USN-6802-1 -- PostgreSQL vulnerability Ubuntu 24.04 LTS Lukas Fittl discovered that PostgreSQL incorrectly performed authorization in the built-in pg_stats_ext and pg_stats_ext_exprs views. An unprivileged database user can use this issue to read most common values and other statistics from CREATE STATISTICS commands of other users. NOTE: This update will only fix fresh PostgreSQL installations. Current PostgreSQL installations will remain vulnerable to this issue until manual steps are performed. Please see the instructions in the changelog located at /usr/share/doc/postgresql-*/changelog.Debian.gz after the updated packages have been installed, or in the PostgreSQL release notes located here: https://www.postgresql.org/docs/16/release-16-3.html https://www.postgresql.org/docs/15/release-15-7.html https://www.postgresql.org/docs/14/release-14-12.html Update Instructions: Run `sudo pro fix USN-6802-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: postgresql-server-dev-16 - 16.3-0ubuntu0.24.04.1 libecpg6 - 16.3-0ubuntu0.24.04.1 postgresql-pltcl-16 - 16.3-0ubuntu0.24.04.1 libpq-dev - 16.3-0ubuntu0.24.04.1 postgresql-16 - 16.3-0ubuntu0.24.04.1 libpgtypes3 - 16.3-0ubuntu0.24.04.1 libecpg-dev - 16.3-0ubuntu0.24.04.1 postgresql-plperl-16 - 16.3-0ubuntu0.24.04.1 libpq5 - 16.3-0ubuntu0.24.04.1 postgresql-client-16 - 16.3-0ubuntu0.24.04.1 postgresql-doc-16 - 16.3-0ubuntu0.24.04.1 postgresql-plpython3-16 - 16.3-0ubuntu0.24.04.1 libecpg-compat3 - 16.3-0ubuntu0.24.04.1 No subscription required Medium CVE-2024-4317 USN-6803-1 -- FFmpeg vulnerabilities Ubuntu 24.04 LTS Zeng Yunxiang and Song Jiaxuan discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 24.04 LTS. (CVE-2023-49501) Zeng Yunxiang and Song Jiaxuan discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 23.10 and Ubuntu 24.04 LTS. (CVE-2023-49502) Zhang Ling and Zeng Yunxiang discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 23.10 and Ubuntu 24.04 LTS. (CVE-2023-49528) Zeng Yunxiang discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 23.10 and Ubuntu 24.04 LTS. (CVE-2023-50007) Zeng Yunxiang and Song Jiaxuan discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 23.10 and Ubuntu 24.04 LTS. (CVE-2023-50008) Zeng Yunxiang discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 23.10. (CVE-2023-50009) Zeng Yunxiang discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu 23.10. (CVE-2023-50010) Zeng Yunxiang and Li Zeyuan discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 22.04 LTS and Ubuntu 23.10. (CVE-2023-51793) Zeng Yunxiang discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu 23.10. (CVE-2023-51794, CVE-2023-51798) Zeng Yunxiang discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 23.10. (CVE-2023-51795, CVE-2023-51796) It was discovered that discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 23.10 and Ubuntu 24.04 LTS. (CVE-2024-31578) It was discovered that discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 23.10 and Ubuntu 24.04 LTS. (CVE-2024-31582) It was discovered that discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 23.10. (CVE-2024-31585) Update Instructions: Run `sudo pro fix USN-6803-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ffmpeg - 7:6.1.1-3ubuntu5+esm1 ffmpeg-doc - 7:6.1.1-3ubuntu5+esm1 libavcodec-dev - 7:6.1.1-3ubuntu5+esm1 libavcodec-extra - 7:6.1.1-3ubuntu5+esm1 libavcodec-extra60 - 7:6.1.1-3ubuntu5+esm1 libavcodec60 - 7:6.1.1-3ubuntu5+esm1 libavdevice-dev - 7:6.1.1-3ubuntu5+esm1 libavdevice60 - 7:6.1.1-3ubuntu5+esm1 libavfilter-dev - 7:6.1.1-3ubuntu5+esm1 libavfilter-extra - 7:6.1.1-3ubuntu5+esm1 libavfilter-extra9 - 7:6.1.1-3ubuntu5+esm1 libavfilter9 - 7:6.1.1-3ubuntu5+esm1 libavformat-dev - 7:6.1.1-3ubuntu5+esm1 libavformat-extra - 7:6.1.1-3ubuntu5+esm1 libavformat-extra60 - 7:6.1.1-3ubuntu5+esm1 libavformat60 - 7:6.1.1-3ubuntu5+esm1 libavutil-dev - 7:6.1.1-3ubuntu5+esm1 libavutil58 - 7:6.1.1-3ubuntu5+esm1 libpostproc-dev - 7:6.1.1-3ubuntu5+esm1 libpostproc57 - 7:6.1.1-3ubuntu5+esm1 libswresample-dev - 7:6.1.1-3ubuntu5+esm1 libswresample4 - 7:6.1.1-3ubuntu5+esm1 libswscale-dev - 7:6.1.1-3ubuntu5+esm1 libswscale7 - 7:6.1.1-3ubuntu5+esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2023-49501 CVE-2023-49502 CVE-2023-49528 CVE-2023-50007 CVE-2023-50008 CVE-2023-50009 CVE-2023-50010 CVE-2023-51793 CVE-2023-51794 CVE-2023-51795 CVE-2023-51796 CVE-2023-51798 CVE-2024-31578 CVE-2024-31582 CVE-2024-31585 USN-6804-1 -- GNU C Library vulnerabilities Ubuntu 24.04 LTS It was discovered that GNU C Library nscd daemon contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service (system crash). (CVE-2024-33599) It was discovered that GNU C Library nscd daemon did not properly check the cache content, leading to a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service (system crash). (CVE-2024-33600) It was discovered that GNU C Library nscd daemon did not properly validate memory allocation in certain situations, leading to a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service (system crash). (CVE-2024-33601) It was discovered that GNU C Library nscd daemon did not properly handle memory allocation, which could lead to memory corruption. A local attacker could use this to cause a denial of service (system crash). (CVE-2024-33602) Update Instructions: Run `sudo pro fix USN-6804-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libc-bin - 2.39-0ubuntu8.2 glibc-doc - 2.39-0ubuntu8.2 libc6-i386 - 2.39-0ubuntu8.2 libc6-s390 - 2.39-0ubuntu8.2 libc6-dev-i386 - 2.39-0ubuntu8.2 nscd - 2.39-0ubuntu8.2 libc6-dev-x32 - 2.39-0ubuntu8.2 libc6-dev - 2.39-0ubuntu8.2 libc6-amd64 - 2.39-0ubuntu8.2 libc6-x32 - 2.39-0ubuntu8.2 libc6-dev-amd64 - 2.39-0ubuntu8.2 libc-dev-bin - 2.39-0ubuntu8.2 libc6 - 2.39-0ubuntu8.2 locales-all - 2.39-0ubuntu8.2 libc-devtools - 2.39-0ubuntu8.2 glibc-source - 2.39-0ubuntu8.2 libc6-dev-s390 - 2.39-0ubuntu8.2 locales - 2.39-0ubuntu8.2 No subscription required Medium CVE-2024-33599 CVE-2024-33600 CVE-2024-33601 CVE-2024-33602 USN-6805-1 -- libarchive vulnerability Ubuntu 24.04 LTS It was discovered that libarchive incorrectly handled certain RAR archive files. An attacker could possibly use this issue to execute arbitrary code or cause a crash. Update Instructions: Run `sudo pro fix USN-6805-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libarchive-dev - 3.7.2-2ubuntu0.1 libarchive13t64 - 3.7.2-2ubuntu0.1 libarchive-tools - 3.7.2-2ubuntu0.1 No subscription required Medium CVE-2024-26256 USN-6806-1 -- GDK-PixBuf vulnerability Ubuntu 24.04 LTS Pedro Ribeiro and Vitor Pedreira discovered that the GDK-PixBuf library did not properly handle certain ANI files. An attacker could use this flaw to cause GDK-PixBuf to crash, resulting in a denial of service, or to possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6806-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libgdk-pixbuf-2.0-dev - 2.42.10+dfsg-3ubuntu3.1 gdk-pixbuf-tests - 2.42.10+dfsg-3ubuntu3.1 libgdk-pixbuf2.0-common - 2.42.10+dfsg-3ubuntu3.1 libgdk-pixbuf2.0-bin - 2.42.10+dfsg-3ubuntu3.1 libgdk-pixbuf2.0-doc - 2.42.10+dfsg-3ubuntu3.1 gir1.2-gdkpixbuf-2.0 - 2.42.10+dfsg-3ubuntu3.1 libgdk-pixbuf-2.0-0 - 2.42.10+dfsg-3ubuntu3.1 No subscription required Medium CVE-2022-48622 USN-6810-1 -- OpenJDK 8 vulnerabilities Ubuntu 24.04 LTS It was discovered that the Hotspot component of OpenJDK 8 incorrectly handled certain exceptions with specially crafted long messages. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-21011) Vladimir Kondratyev discovered that the Hotspot component of OpenJDK 8 incorrectly handled address offset calculations in the C1 compiler. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-21068) Yakov Shafranovich discovered that OpenJDK 8 did not properly manage memory in the Pack200 archive format. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-21085) It was discovered that the Hotspot component of OpenJDK 8 incorrectly handled array accesses in the C2 compiler. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-21094) Update Instructions: Run `sudo pro fix USN-6810-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-8-doc - 8u412-ga-1~24.04.2 openjdk-8-jdk - 8u412-ga-1~24.04.2 openjdk-8-jre-headless - 8u412-ga-1~24.04.2 openjdk-8-jre - 8u412-ga-1~24.04.2 openjdk-8-jdk-headless - 8u412-ga-1~24.04.2 openjdk-8-source - 8u412-ga-1~24.04.2 openjdk-8-jre-zero - 8u412-ga-1~24.04.2 openjdk-8-demo - 8u412-ga-1~24.04.2 No subscription required Medium CVE-2024-21011 CVE-2024-21068 CVE-2024-21085 CVE-2024-21094 USN-6814-1 -- libvpx vulnerability Ubuntu 24.04 LTS Xiantong Hou discovered that libvpx did not properly handle certain malformed media files. If an application using libvpx opened a specially crafted file, a remote attacker could cause a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6814-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libvpx-dev - 1.14.0-1ubuntu2.1 libvpx9 - 1.14.0-1ubuntu2.1 libvpx-doc - 1.14.0-1ubuntu2.1 vpx-tools - 1.14.0-1ubuntu2.1 No subscription required Medium CVE-2024-5197 USN-6815-1 -- AOM vulnerability Ubuntu 24.04 LTS Xiantong Hou discovered that AOM did not properly handle certain malformed media files. If an application using AOM opened a specially crafted file, a remote attacker could cause a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6815-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libaom-doc - 3.8.2-2ubuntu0.1 libaom-dev - 3.8.2-2ubuntu0.1 libaom3 - 3.8.2-2ubuntu0.1 aom-tools - 3.8.2-2ubuntu0.1 No subscription required Medium CVE-2024-5171 USN-6816-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Ziming Zhang discovered that the DRM driver for VMware Virtual GPU did not properly handle certain error conditions, leading to a NULL pointer dereference. A local attacker could possibly trigger this vulnerability to cause a denial of service. (CVE-2022-38096) Zheng Wang discovered that the Broadcom FullMAC WLAN driver in the Linux kernel contained a race condition during device removal, leading to a use- after-free vulnerability. A physically proximate attacker could possibly use this to cause a denial of service (system crash). (CVE-2023-47233) It was discovered that the ATA over Ethernet (AoE) driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2023-6270) It was discovered that the Atheros 802.11ac wireless driver did not properly validate certain data structures, leading to a NULL pointer dereference. An attacker could possibly use this to cause a denial of service. (CVE-2023-7042) It was discovered that the Intel Data Streaming and Intel Analytics Accelerator drivers in the Linux kernel allowed direct access to the devices for unprivileged users and virtual machines. A local attacker could use this to cause a denial of service. (CVE-2024-21823) Gui-Dong Han discovered that the software RAID driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. A privileged attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-23307) Bai Jiaju discovered that the Xceive XC4000 silicon tuner device driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-24861) Chenyuan Yang discovered that the Unsorted Block Images (UBI) flash device volume management subsystem did not properly validate logical eraseblock sizes in certain situations. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-25739) It was discovered that the MediaTek SoC Gigabit Ethernet driver in the Linux kernel contained a race condition when stopping the device. A local attacker could possibly use this to cause a denial of service (device unavailability). (CVE-2024-27432) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - PowerPC architecture; - x86 architecture; - Block layer subsystem; - ACPI drivers; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Cryptographic API; - DPLL subsystem; - ARM SCMI message protocol; - EFI core; - GPU drivers; - InfiniBand drivers; - IOMMU subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - MMC subsystem; - Network drivers; - NTB driver; - NVME drivers; - PCI subsystem; - Powercap sysfs driver; - SCSI drivers; - Freescale SoC drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - TTY drivers; - USB subsystem; - DesignWare USB3 driver; - VFIO drivers; - Backlight driver; - Virtio drivers; - Xen hypervisor drivers; - AFS file system; - File systems infrastructure; - BTRFS file system; - debug file system; - Ext4 file system; - F2FS file system; - FAT file system; - Network file system client; - NILFS2 file system; - Overlay file system; - Pstore file system; - Diskquota system; - SMB network file system; - UBI file system; - io_uring subsystem; - BPF subsystem; - Core kernel; - Memory management; - Bluetooth subsystem; - Networking core; - HSR network protocol; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - IEEE 802.15.4 subsystem; - Netfilter; - Packet sockets; - Network traffic control; - Sun RPC protocol; - ALSA SH drivers; - SOF drivers; - USB sound devices; - KVM core; (CVE-2024-35822, CVE-2024-26859, CVE-2024-26967, CVE-2024-27053, CVE-2024-27064, CVE-2024-27437, CVE-2024-26931, CVE-2024-26870, CVE-2024-26927, CVE-2024-26880, CVE-2024-35789, CVE-2024-26929, CVE-2024-27034, CVE-2024-26816, CVE-2024-26896, CVE-2024-26975, CVE-2024-26972, CVE-2024-26937, CVE-2024-27032, CVE-2024-26871, CVE-2024-26655, CVE-2024-35829, CVE-2024-26886, CVE-2023-52653, CVE-2024-27028, CVE-2024-26877, CVE-2024-26898, CVE-2024-35796, CVE-2024-27065, CVE-2024-35807, CVE-2024-26966, CVE-2024-35826, CVE-2024-27067, CVE-2024-27039, CVE-2024-35811, CVE-2024-26895, CVE-2024-26814, CVE-2024-26893, CVE-2023-52649, CVE-2024-35801, CVE-2023-52648, CVE-2024-27048, CVE-2024-26934, CVE-2024-27049, CVE-2024-26890, CVE-2024-26874, CVE-2022-48669, CVE-2023-52661, CVE-2024-27436, CVE-2024-27058, CVE-2024-26935, CVE-2024-26956, CVE-2024-26960, CVE-2024-26976, CVE-2024-27041, CVE-2024-26873, CVE-2024-26946, CVE-2024-27080, CVE-2024-27432, CVE-2023-52650, CVE-2024-26879, CVE-2023-52647, CVE-2024-27435, CVE-2024-27038, CVE-2024-26951, CVE-2024-27390, CVE-2024-26863, CVE-2024-26959, CVE-2024-35794, CVE-2024-26889, CVE-2024-35845, CVE-2024-27433, CVE-2024-26961, CVE-2024-35803, CVE-2024-26653, CVE-2024-26939, CVE-2024-26872, CVE-2024-26979, CVE-2024-26973, CVE-2024-27029, CVE-2024-35831, CVE-2024-26892, CVE-2024-26888, CVE-2024-27074, CVE-2024-35844, CVE-2024-26938, CVE-2024-26953, CVE-2024-27391, CVE-2024-35843, CVE-2024-27040, CVE-2024-26875, CVE-2024-27026, CVE-2024-26978, CVE-2024-26882, CVE-2023-52652, CVE-2023-52662, CVE-2024-26963, CVE-2024-26962, CVE-2024-27051, CVE-2024-27068, CVE-2024-26881, CVE-2024-35800, CVE-2024-26964, CVE-2024-27389, CVE-2024-27043, CVE-2024-26901, CVE-2024-26941, CVE-2024-35798, CVE-2024-35799, CVE-2024-26952, CVE-2024-26654, CVE-2024-27046, CVE-2024-35810, CVE-2024-27050, CVE-2024-27063, CVE-2024-26954, CVE-2024-26884, CVE-2024-27047, CVE-2024-26932, CVE-2024-26883, CVE-2024-26943, CVE-2024-26651, CVE-2024-26815, CVE-2024-26948, CVE-2024-27066, CVE-2024-27037, CVE-2024-35806, CVE-2024-26869, CVE-2024-26878, CVE-2024-26810, CVE-2024-35797, CVE-2024-27073, CVE-2024-26812, CVE-2024-26933, CVE-2024-26809, CVE-2024-26894, CVE-2024-35813, CVE-2024-27033, CVE-2024-26876, CVE-2024-27076, CVE-2024-27045, CVE-2024-27079, CVE-2024-26861, CVE-2024-26957, CVE-2024-26864, CVE-2024-26866, CVE-2024-35814, CVE-2024-26813, CVE-2024-27388, CVE-2024-27042, CVE-2024-26862, CVE-2024-26968, CVE-2024-26940, CVE-2024-27027, CVE-2024-35793, CVE-2024-35874, CVE-2024-27035, CVE-2024-26958, CVE-2024-26887, CVE-2024-35809, CVE-2024-26930, CVE-2024-35819, CVE-2024-27392, CVE-2024-35808, CVE-2023-52644, CVE-2024-35828, CVE-2024-26657, CVE-2024-26969, CVE-2024-27434, CVE-2024-35821, CVE-2023-52663, CVE-2024-27078, CVE-2024-35787, CVE-2024-27044, CVE-2024-26848, CVE-2024-26955, CVE-2024-26899, CVE-2024-27077, CVE-2024-26897, CVE-2024-26945, CVE-2024-26885, CVE-2024-27069, CVE-2024-27070, CVE-2024-27054, CVE-2024-35795, CVE-2024-35817, CVE-2024-35827, CVE-2024-26656, CVE-2024-26860, CVE-2024-26942, CVE-2023-52659, CVE-2024-26865, CVE-2024-26868, CVE-2024-26947, CVE-2024-35788, CVE-2024-26950, CVE-2024-27030, CVE-2024-26949, CVE-2024-26900, CVE-2024-26971, CVE-2024-35805, CVE-2024-26977, CVE-2024-26944, CVE-2024-27036, CVE-2024-26965, CVE-2024-26891, CVE-2024-27071, CVE-2024-27075, CVE-2024-27072, CVE-2024-35830, CVE-2024-27052, CVE-2024-26970, CVE-2024-27031) Update Instructions: Run `sudo pro fix USN-6816-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-raspi-tools-6.8.0-1005 - 6.8.0-1005.5 linux-buildinfo-6.8.0-1005-raspi - 6.8.0-1005.5 linux-tools-raspi - 6.8.0-1005.5 linux-tools-6.8.0-1005-raspi - 6.8.0-1005.5 linux-headers-raspi - 6.8.0-1005.5 linux-image-6.8.0-1005-raspi - 6.8.0-1005.5 linux-headers-6.8.0-1005-raspi - 6.8.0-1005.5 linux-raspi-headers-6.8.0-1005 - 6.8.0-1005.5 linux-image-raspi - 6.8.0-1005.5 linux-modules-6.8.0-1005-raspi - 6.8.0-1005.5 linux-raspi - 6.8.0-1005.5 No subscription required linux-modules-extra-6.8.0-1006-ibm - 6.8.0-1006.6 linux-modules-6.8.0-1006-ibm - 6.8.0-1006.6 linux-ibm-tools-6.8.0-1006 - 6.8.0-1006.6 linux-image-unsigned-6.8.0-1006-ibm - 6.8.0-1006.6 linux-ibm-source-6.8.0 - 6.8.0-1006.6 linux-tools-ibm - 6.8.0-1006.6 linux-tools-ibm-lts-24.04 - 6.8.0-1006.6 linux-image-ibm - 6.8.0-1006.6 linux-image-ibm-classic - 6.8.0-1006.6 linux-headers-ibm-lts-24.04 - 6.8.0-1006.6 linux-modules-iwlwifi-6.8.0-1006-ibm - 6.8.0-1006.6 linux-tools-ibm-classic - 6.8.0-1006.6 linux-tools-6.8.0-1006-ibm - 6.8.0-1006.6 linux-headers-6.8.0-1006-ibm - 6.8.0-1006.6 linux-image-6.8.0-1006-ibm - 6.8.0-1006.6 linux-modules-iwlwifi-ibm-classic - 6.8.0-1006.6 linux-ibm-lts-24.04 - 6.8.0-1006.6 linux-ibm-classic - 6.8.0-1006.6 linux-modules-iwlwifi-ibm - 6.8.0-1006.6 linux-image-ibm-lts-24.04 - 6.8.0-1006.6 linux-ibm-headers-6.8.0-1006 - 6.8.0-1006.6 linux-headers-ibm-classic - 6.8.0-1006.6 linux-ibm - 6.8.0-1006.6 linux-ibm-cloud-tools-common - 6.8.0-1006.6 linux-headers-ibm - 6.8.0-1006.6 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1006.6 linux-buildinfo-6.8.0-1006-ibm - 6.8.0-1006.6 No subscription required linux-generic-hwe-24.04 - 6.8.0-35.35 linux-tools-common - 6.8.0-35.35 linux-headers-oem-20.04 - 6.8.0-35.35 linux-cloud-tools-virtual - 6.8.0-35.35 linux-headers-generic-lpae - 6.8.0-35.35 linux-modules-iwlwifi-oem-20.04d - 6.8.0-35.35 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-35.35 linux-headers-laptop-23.10 - 6.8.0-35.35 linux-kvm - 6.8.0-35.35 linux-tools-6.8.0-35 - 6.8.0-35.35 linux-virtual-hwe-24.04 - 6.8.0-35.35 linux-tools-generic-64k - 6.8.0-35.35 linux-image-virtual - 6.8.0-35.35 linux-doc - 6.8.0-35.35 linux-virtual-hwe-24.04-edge - 6.8.0-35.35 linux-image-generic-64k - 6.8.0-35.35 linux-modules-usbio-generic - 6.8.0-35.35 linux-image-generic - 6.8.0-35.35 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-35.35 linux-image-oem-20.04d - 6.8.0-35.35 linux-headers-virtual-hwe-24.04 - 6.8.0-35.35 linux-tools-oem-20.04d - 6.8.0-35.35 linux-headers-virtual-hwe-24.04-edge - 6.8.0-35.35 linux-buildinfo-6.8.0-35-generic-64k - 6.8.0-35.35 linux-cloud-tools-virtual-hwe-24.04-edge - 6.8.0-35.35 linux-image-virtual-hwe-24.04 - 6.8.0-35.35 linux-modules-usbio-6.8.0-35-generic - 6.8.0-35.35 linux-modules-ipu6-generic-hwe-24.04-edge - 6.8.0-35.35 linux-tools-generic-hwe-24.04-edge - 6.8.0-35.35 linux-tools-oem-20.04c - 6.8.0-35.35 linux-modules-ipu6-6.8.0-35-generic - 6.8.0-35.35 linux-tools-oem-20.04b - 6.8.0-35.35 linux-modules-6.8.0-35-generic-64k - 6.8.0-35.35 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-35.35 linux-tools-virtual-hwe-24.04-edge - 6.8.0-35.35 linux-headers-generic-64k-hwe-24.04-edge - 6.8.0-35.35 linux-modules-iwlwifi-6.8.0-35-generic - 6.8.0-35.35 linux-modules-6.8.0-35-generic - 6.8.0-35.35 linux-crashdump - 6.8.0-35.35 linux-image-extra-virtual-hwe-24.04 - 6.8.0-35.35 linux-buildinfo-6.8.0-35-generic - 6.8.0-35.35 linux-headers-6.8.0-35-generic-64k - 6.8.0-35.35 linux-modules-iwlwifi-generic - 6.8.0-35.35 linux-modules-extra-6.8.0-35-generic - 6.8.0-35.35 linux-source - 6.8.0-35.35 linux-image-extra-virtual-hwe-24.04-edge - 6.8.0-35.35 linux-oem-22.04 - 6.8.0-35.35 linux-image-virtual-hwe-24.04-edge - 6.8.0-35.35 linux-tools-generic-hwe-24.04 - 6.8.0-35.35 linux-headers-kvm - 6.8.0-35.35 linux-tools-generic-lpae - 6.8.0-35.35 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-35.35 linux-virtual - 6.8.0-35.35 linux-tools-oem-22.04 - 6.8.0-35.35 linux-tools-generic - 6.8.0-35.35 linux-laptop-23.10 - 6.8.0-35.35 linux-image-generic-64k-hwe-24.04-edge - 6.8.0-35.35 linux-tools-6.8.0-35-generic-64k - 6.8.0-35.35 linux-tools-6.8.0-35-generic - 6.8.0-35.35 linux-image-uc-generic - 6.8.0-35.35 linux-cloud-tools-generic - 6.8.0-35.35 linux-image-uc-generic-hwe-24.04-edge - 6.8.0-35.35 linux-image-oem-20.04c - 6.8.0-35.35 linux-image-oem-20.04b - 6.8.0-35.35 linux-generic-lpae - 6.8.0-35.35 linux-tools-host - 6.8.0-35.35 linux-headers-generic-64k - 6.8.0-35.35 linux-headers-generic-64k-hwe-24.04 - 6.8.0-35.35 linux-oem-20.04 - 6.8.0-35.35 linux-generic - 6.8.0-35.35 linux-image-oem-20.04 - 6.8.0-35.35 linux-oem-20.04d - 6.8.0-35.35 linux-headers-generic-hwe-24.04 - 6.8.0-35.35 linux-oem-20.04c - 6.8.0-35.35 linux-image-oem-22.04 - 6.8.0-35.35 linux-headers-6.8.0-35-generic - 6.8.0-35.35 linux-generic-64k-hwe-24.04-edge - 6.8.0-35.35 linux-lib-rust-6.8.0-35-generic - 6.8.0-35.35 linux-image-generic-hwe-24.04 - 6.8.0-35.35 linux-headers-6.8.0-35 - 6.8.0-35.35 linux-tools-oem-20.04 - 6.8.0-35.35 linux-cloud-tools-common - 6.8.0-35.35 linux-image-generic-lpae - 6.8.0-35.35 linux-oem-20.04b - 6.8.0-35.35 linux-image-extra-virtual - 6.8.0-35.35 linux-modules-ipu6-generic - 6.8.0-35.35 linux-tools-virtual-hwe-24.04 - 6.8.0-35.35 linux-image-laptop-23.10 - 6.8.0-35.35 linux-image-generic-hwe-24.04-edge - 6.8.0-35.35 linux-cloud-tools-6.8.0-35-generic - 6.8.0-35.35 linux-modules-usbio-generic-hwe-24.04-edge - 6.8.0-35.35 linux-tools-generic-64k-hwe-24.04-edge - 6.8.0-35.35 linux-image-generic-64k-hwe-24.04 - 6.8.0-35.35 linux-image-uc-generic-hwe-24.04 - 6.8.0-35.35 linux-cloud-tools-generic-hwe-24.04-edge - 6.8.0-35.35 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-35.35 linux-modules-iwlwifi-oem-20.04 - 6.8.0-35.35 linux-headers-generic-hwe-24.04-edge - 6.8.0-35.35 linux-generic-64k - 6.8.0-35.35 linux-headers-generic - 6.8.0-35.35 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.8.0-35.35 linux-tools-laptop-23.10 - 6.8.0-35.35 linux-libc-dev - 6.8.0-35.35 linux-modules-iwlwifi-oem-22.04 - 6.8.0-35.35 linux-headers-virtual - 6.8.0-35.35 linux-image-kvm - 6.8.0-35.35 linux-source-6.8.0 - 6.8.0-35.35 linux-headers-oem-22.04 - 6.8.0-35.35 linux-generic-hwe-24.04-edge - 6.8.0-35.35 linux-tools-generic-64k-hwe-24.04 - 6.8.0-35.35 linux-tools-kvm - 6.8.0-35.35 linux-image-unsigned-6.8.0-35-generic-64k - 6.8.0-35.35 linux-headers-oem-20.04b - 6.8.0-35.35 linux-headers-oem-20.04c - 6.8.0-35.35 linux-tools-virtual - 6.8.0-35.35 linux-headers-oem-20.04d - 6.8.0-35.35 linux-cloud-tools-6.8.0-35 - 6.8.0-35.35 linux-generic-64k-hwe-24.04 - 6.8.0-35.35 linux-image-unsigned-6.8.0-35-generic - 6.8.0-35.35 No subscription required linux-image-uc-6.8.0-35-generic-64k - 6.8.0-35.35+1 linux-image-6.8.0-35-generic - 6.8.0-35.35+1 linux-image-uc-6.8.0-35-generic - 6.8.0-35.35+1 linux-image-6.8.0-35-generic-64k - 6.8.0-35.35+1 No subscription required linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-35.35.1 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.8.0-35.35.1 linux-buildinfo-6.8.0-35-lowlatency - 6.8.0-35.35.1 linux-headers-lowlatency-64k - 6.8.0-35.35.1 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.8.0-35.35.1 linux-image-6.8.0-35-lowlatency-64k - 6.8.0-35.35.1 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.8.0-35.35.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-35.35.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-35.35.1 linux-lowlatency-tools-common - 6.8.0-35.35.1 linux-lowlatency-cloud-tools-common - 6.8.0-35.35.1 linux-tools-lowlatency - 6.8.0-35.35.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-35.35.1 linux-lowlatency-tools-host - 6.8.0-35.35.1 linux-lowlatency-64k - 6.8.0-35.35.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-35.35.1 linux-tools-6.8.0-35-lowlatency - 6.8.0-35.35.1 linux-tools-lowlatency-hwe-22.04-edge - 6.8.0-35.35.1 linux-image-lowlatency-hwe-22.04-edge - 6.8.0-35.35.1 linux-modules-iwlwifi-lowlatency - 6.8.0-35.35.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-35.35.1 linux-headers-lowlatency-hwe-22.04-edge - 6.8.0-35.35.1 linux-buildinfo-6.8.0-35-lowlatency-64k - 6.8.0-35.35.1 linux-lowlatency-headers-6.8.0-35 - 6.8.0-35.35.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-35.35.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-35.35.1 linux-headers-6.8.0-35-lowlatency - 6.8.0-35.35.1 linux-cloud-tools-6.8.0-35-lowlatency - 6.8.0-35.35.1 linux-lowlatency - 6.8.0-35.35.1 linux-headers-lowlatency-hwe-22.04 - 6.8.0-35.35.1 linux-lowlatency-hwe-22.04-edge - 6.8.0-35.35.1 linux-image-lowlatency-64k-hwe-22.04-edge - 6.8.0-35.35.1 linux-tools-lowlatency-64k-hwe-22.04 - 6.8.0-35.35.1 linux-modules-iwlwifi-6.8.0-35-lowlatency - 6.8.0-35.35.1 linux-image-unsigned-6.8.0-35-lowlatency-64k - 6.8.0-35.35.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-35.35.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-35.35.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-35.35.1 linux-headers-6.8.0-35-lowlatency-64k - 6.8.0-35.35.1 linux-tools-lowlatency-64k - 6.8.0-35.35.1 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.8.0-35.35.1 linux-lowlatency-cloud-tools-6.8.0-35 - 6.8.0-35.35.1 linux-modules-6.8.0-35-lowlatency-64k - 6.8.0-35.35.1 linux-image-unsigned-6.8.0-35-lowlatency - 6.8.0-35.35.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-35.35.1 linux-lowlatency-hwe-22.04 - 6.8.0-35.35.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-35.35.1 linux-modules-6.8.0-35-lowlatency - 6.8.0-35.35.1 linux-headers-lowlatency-64k-hwe-22.04 - 6.8.0-35.35.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-35.35.1 linux-lowlatency-64k-hwe-22.04-edge - 6.8.0-35.35.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-35.35.1 linux-tools-6.8.0-35-lowlatency-64k - 6.8.0-35.35.1 linux-image-6.8.0-35-lowlatency - 6.8.0-35.35.1 linux-image-lowlatency-64k - 6.8.0-35.35.1 linux-cloud-tools-lowlatency - 6.8.0-35.35.1 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.8.0-35.35.1 linux-lowlatency-lib-rust-6.8.0-35-lowlatency - 6.8.0-35.35.1 linux-cloud-tools-lowlatency-hwe-22.04 - 6.8.0-35.35.1 linux-image-lowlatency-hwe-22.04 - 6.8.0-35.35.1 linux-lowlatency-hwe-20.04 - 6.8.0-35.35.1 linux-lowlatency-tools-6.8.0-35 - 6.8.0-35.35.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-35.35.1 linux-headers-lowlatency - 6.8.0-35.35.1 linux-tools-lowlatency-hwe-22.04 - 6.8.0-35.35.1 linux-lowlatency-64k-hwe-22.04 - 6.8.0-35.35.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-35.35.1 linux-image-lowlatency-64k-hwe-22.04 - 6.8.0-35.35.1 linux-image-lowlatency - 6.8.0-35.35.1 No subscription required High CVE-2022-38096 CVE-2022-48669 CVE-2023-47233 CVE-2023-52644 CVE-2023-52647 CVE-2023-52648 CVE-2023-52649 CVE-2023-52650 CVE-2023-52652 CVE-2023-52653 CVE-2023-52659 CVE-2023-52661 CVE-2023-52662 CVE-2023-52663 CVE-2023-6270 CVE-2023-7042 CVE-2024-21823 CVE-2024-23307 CVE-2024-24861 CVE-2024-25739 CVE-2024-26651 CVE-2024-26653 CVE-2024-26654 CVE-2024-26655 CVE-2024-26656 CVE-2024-26657 CVE-2024-26809 CVE-2024-26810 CVE-2024-26812 CVE-2024-26813 CVE-2024-26814 CVE-2024-26815 CVE-2024-26816 CVE-2024-26848 CVE-2024-26859 CVE-2024-26860 CVE-2024-26861 CVE-2024-26862 CVE-2024-26863 CVE-2024-26864 CVE-2024-26865 CVE-2024-26866 CVE-2024-26868 CVE-2024-26869 CVE-2024-26870 CVE-2024-26871 CVE-2024-26872 CVE-2024-26873 CVE-2024-26874 CVE-2024-26875 CVE-2024-26876 CVE-2024-26877 CVE-2024-26878 CVE-2024-26879 CVE-2024-26880 CVE-2024-26881 CVE-2024-26882 CVE-2024-26883 CVE-2024-26884 CVE-2024-26885 CVE-2024-26886 CVE-2024-26887 CVE-2024-26888 CVE-2024-26889 CVE-2024-26890 CVE-2024-26891 CVE-2024-26892 CVE-2024-26893 CVE-2024-26894 CVE-2024-26895 CVE-2024-26896 CVE-2024-26897 CVE-2024-26898 CVE-2024-26899 CVE-2024-26900 CVE-2024-26901 CVE-2024-26927 CVE-2024-26929 CVE-2024-26930 CVE-2024-26931 CVE-2024-26932 CVE-2024-26933 CVE-2024-26934 CVE-2024-26935 CVE-2024-26937 CVE-2024-26938 CVE-2024-26939 CVE-2024-26940 CVE-2024-26941 CVE-2024-26942 CVE-2024-26943 CVE-2024-26944 CVE-2024-26945 CVE-2024-26946 CVE-2024-26947 CVE-2024-26948 CVE-2024-26949 CVE-2024-26950 CVE-2024-26951 CVE-2024-26952 CVE-2024-26953 CVE-2024-26954 CVE-2024-26955 CVE-2024-26956 CVE-2024-26957 CVE-2024-26958 CVE-2024-26959 CVE-2024-26960 CVE-2024-26961 CVE-2024-26962 CVE-2024-26963 CVE-2024-26964 CVE-2024-26965 CVE-2024-26966 CVE-2024-26967 CVE-2024-26968 CVE-2024-26969 CVE-2024-26970 CVE-2024-26971 CVE-2024-26972 CVE-2024-26973 CVE-2024-26975 CVE-2024-26976 CVE-2024-26977 CVE-2024-26978 CVE-2024-27026 CVE-2024-27027 CVE-2024-27028 CVE-2024-27029 CVE-2024-27030 CVE-2024-27031 CVE-2024-27032 CVE-2024-27033 CVE-2024-27034 CVE-2024-27035 CVE-2024-27036 CVE-2024-27037 CVE-2024-27038 CVE-2024-27039 CVE-2024-27040 CVE-2024-27041 CVE-2024-27042 CVE-2024-27043 CVE-2024-27044 CVE-2024-27045 CVE-2024-27046 CVE-2024-27047 CVE-2024-27048 CVE-2024-27049 CVE-2024-27050 CVE-2024-27051 CVE-2024-27052 CVE-2024-27053 CVE-2024-27054 CVE-2024-27058 CVE-2024-27063 CVE-2024-27064 CVE-2024-27065 CVE-2024-27066 CVE-2024-27067 CVE-2024-27068 CVE-2024-27069 CVE-2024-27070 CVE-2024-27071 CVE-2024-27072 CVE-2024-27073 CVE-2024-27074 CVE-2024-27075 CVE-2024-27076 CVE-2024-27077 CVE-2024-27078 CVE-2024-27079 CVE-2024-27080 CVE-2024-27388 CVE-2024-27389 CVE-2024-27390 CVE-2024-27391 CVE-2024-27392 CVE-2024-27432 CVE-2024-27433 CVE-2024-27434 CVE-2024-27435 CVE-2024-27436 CVE-2024-27437 CVE-2024-35787 CVE-2024-35788 CVE-2024-35789 CVE-2024-35793 CVE-2024-35794 CVE-2024-35795 CVE-2024-35796 CVE-2024-35797 CVE-2024-35798 CVE-2024-35799 CVE-2024-35800 CVE-2024-35801 CVE-2024-35803 CVE-2024-35805 CVE-2024-35806 CVE-2024-35807 CVE-2024-35808 CVE-2024-35809 CVE-2024-35810 CVE-2024-35811 CVE-2024-35813 CVE-2024-35814 CVE-2024-35817 CVE-2024-35819 CVE-2024-35821 CVE-2024-35822 CVE-2024-35826 CVE-2024-35827 CVE-2024-35828 CVE-2024-35829 CVE-2024-35830 CVE-2024-35831 CVE-2024-35843 CVE-2024-35844 CVE-2024-35845 CVE-2024-35874 USN-6817-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Ziming Zhang discovered that the DRM driver for VMware Virtual GPU did not properly handle certain error conditions, leading to a NULL pointer dereference. A local attacker could possibly trigger this vulnerability to cause a denial of service. (CVE-2022-38096) Zheng Wang discovered that the Broadcom FullMAC WLAN driver in the Linux kernel contained a race condition during device removal, leading to a use- after-free vulnerability. A physically proximate attacker could possibly use this to cause a denial of service (system crash). (CVE-2023-47233) It was discovered that the ATA over Ethernet (AoE) driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2023-6270) It was discovered that the Atheros 802.11ac wireless driver did not properly validate certain data structures, leading to a NULL pointer dereference. An attacker could possibly use this to cause a denial of service. (CVE-2023-7042) Gui-Dong Han discovered that the software RAID driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. A privileged attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-23307) Bai Jiaju discovered that the Xceive XC4000 silicon tuner device driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-24861) Chenyuan Yang discovered that the Unsorted Block Images (UBI) flash device volume management subsystem did not properly validate logical eraseblock sizes in certain situations. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-25739) It was discovered that the MediaTek SoC Gigabit Ethernet driver in the Linux kernel contained a race condition when stopping the device. A local attacker could possibly use this to cause a denial of service (device unavailability). (CVE-2024-27432) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - PowerPC architecture; - x86 architecture; - Block layer subsystem; - ACPI drivers; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Cryptographic API; - DPLL subsystem; - ARM SCMI message protocol; - EFI core; - GPU drivers; - InfiniBand drivers; - IOMMU subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - MMC subsystem; - Network drivers; - NTB driver; - NVME drivers; - PCI subsystem; - Powercap sysfs driver; - SCSI drivers; - Freescale SoC drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - TTY drivers; - USB subsystem; - DesignWare USB3 driver; - VFIO drivers; - Backlight driver; - Virtio drivers; - Xen hypervisor drivers; - AFS file system; - File systems infrastructure; - BTRFS file system; - debug file system; - Ext4 file system; - F2FS file system; - FAT file system; - Network file system client; - NILFS2 file system; - Overlay file system; - Pstore file system; - Diskquota system; - SMB network file system; - UBI file system; - io_uring subsystem; - BPF subsystem; - Core kernel; - Memory management; - Bluetooth subsystem; - Networking core; - HSR network protocol; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - IEEE 802.15.4 subsystem; - Netfilter; - Packet sockets; - Network traffic control; - Sun RPC protocol; - ALSA SH drivers; - SOF drivers; - USB sound devices; - KVM core; (CVE-2024-26859, CVE-2024-26944, CVE-2024-27049, CVE-2024-26868, CVE-2024-26932, CVE-2024-35843, CVE-2024-35814, CVE-2024-26866, CVE-2024-26941, CVE-2024-27080, CVE-2024-26938, CVE-2024-26889, CVE-2024-27075, CVE-2024-27077, CVE-2024-26864, CVE-2024-35787, CVE-2024-27071, CVE-2024-26880, CVE-2024-26961, CVE-2024-26945, CVE-2024-26863, CVE-2024-35795, CVE-2024-27045, CVE-2024-27066, CVE-2024-27046, CVE-2024-26816, CVE-2024-27069, CVE-2024-26861, CVE-2024-26968, CVE-2024-26963, CVE-2024-26878, CVE-2024-27073, CVE-2024-35806, CVE-2024-26951, CVE-2024-26954, CVE-2024-27026, CVE-2024-26956, CVE-2024-35811, CVE-2024-35803, CVE-2024-26964, CVE-2024-26848, CVE-2024-27434, CVE-2024-35844, CVE-2024-26977, CVE-2024-27031, CVE-2024-35813, CVE-2024-26960, CVE-2024-27067, CVE-2024-26937, CVE-2024-26884, CVE-2024-26656, CVE-2024-27068, CVE-2024-26871, CVE-2023-52653, CVE-2024-26939, CVE-2024-26967, CVE-2024-26966, CVE-2024-27043, CVE-2024-26814, CVE-2024-35829, CVE-2024-26973, CVE-2024-35810, CVE-2024-26877, CVE-2024-27392, CVE-2024-35805, CVE-2024-26875, CVE-2024-26970, CVE-2024-26657, CVE-2024-26874, CVE-2024-26971, CVE-2024-26872, CVE-2024-35798, CVE-2024-26931, CVE-2024-26948, CVE-2024-26883, CVE-2024-26955, CVE-2024-27039, CVE-2024-27038, CVE-2024-27065, CVE-2024-26899, CVE-2024-27048, CVE-2024-35874, CVE-2024-35845, CVE-2024-35799, CVE-2024-35827, CVE-2024-26935, CVE-2024-27079, CVE-2024-35821, CVE-2024-26950, CVE-2024-26879, CVE-2024-26940, CVE-2024-35788, CVE-2024-26891, CVE-2024-27063, CVE-2024-27433, CVE-2024-27036, CVE-2024-35819, CVE-2024-26969, CVE-2024-27044, CVE-2024-27028, CVE-2024-27070, CVE-2023-52649, CVE-2024-27435, CVE-2024-35830, CVE-2024-26929, CVE-2024-26653, CVE-2024-26887, CVE-2024-26869, CVE-2024-26942, CVE-2024-35822, CVE-2024-26979, CVE-2024-26881, CVE-2024-26655, CVE-2024-26975, CVE-2023-52650, CVE-2024-26651, CVE-2024-35828, CVE-2024-26965, CVE-2024-27437, CVE-2024-35794, CVE-2024-26962, CVE-2024-27058, CVE-2024-27076, CVE-2024-27035, CVE-2024-27074, CVE-2024-27027, CVE-2024-26860, CVE-2024-27042, CVE-2024-27390, CVE-2024-26815, CVE-2023-52662, CVE-2024-27051, CVE-2024-35796, CVE-2024-27047, CVE-2024-26930, CVE-2024-26865, CVE-2024-27064, CVE-2024-35826, CVE-2024-26885, CVE-2024-26873, CVE-2024-26943, CVE-2024-26893, CVE-2024-27030, CVE-2024-26976, CVE-2024-35793, CVE-2024-26952, CVE-2023-52644, CVE-2024-35797, CVE-2024-27029, CVE-2024-26927, CVE-2024-26812, CVE-2024-27432, CVE-2024-26897, CVE-2024-26890, CVE-2024-26972, CVE-2024-35800, CVE-2024-27032, CVE-2024-27052, CVE-2023-52647, CVE-2024-26898, CVE-2023-52652, CVE-2024-35808, CVE-2024-26876, CVE-2024-26933, CVE-2024-26862, CVE-2024-27033, CVE-2023-52663, CVE-2024-27041, CVE-2023-52648, CVE-2024-26888, CVE-2024-26957, CVE-2024-26953, CVE-2023-52659, CVE-2024-27436, CVE-2024-27040, CVE-2024-27054, CVE-2024-27050, CVE-2024-26886, CVE-2023-52661, CVE-2024-35831, CVE-2024-26946, CVE-2024-26949, CVE-2024-26809, CVE-2024-26892, CVE-2024-26654, CVE-2024-26901, CVE-2024-27053, CVE-2024-26882, CVE-2024-35809, CVE-2024-26978, CVE-2024-27037, CVE-2024-27391, CVE-2024-27034, CVE-2024-26895, CVE-2024-35817, CVE-2024-26900, CVE-2024-26896, CVE-2024-26958, CVE-2024-35801, CVE-2024-27388, CVE-2024-26934, CVE-2024-27078, CVE-2024-35789, CVE-2024-26894, CVE-2024-27389, CVE-2024-35807, CVE-2024-27072, CVE-2024-26947, CVE-2024-26870, CVE-2024-26813, CVE-2022-48669, CVE-2024-26959, CVE-2024-26810) Update Instructions: Run `sudo pro fix USN-6817-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-gcp-headers-6.8.0-1008 - 6.8.0-1008.9 linux-image-gcp - 6.8.0-1008.9 linux-modules-extra-6.8.0-1008-gcp - 6.8.0-1008.9 linux-headers-6.8.0-1008-gcp - 6.8.0-1008.9 linux-modules-6.8.0-1008-gcp - 6.8.0-1008.9 linux-tools-gcp - 6.8.0-1008.9 linux-gcp - 6.8.0-1008.9 linux-modules-iwlwifi-gcp - 6.8.0-1008.9 linux-gcp-tools-6.8.0-1008 - 6.8.0-1008.9 linux-headers-gcp - 6.8.0-1008.9 linux-image-unsigned-6.8.0-1008-gcp - 6.8.0-1008.9 linux-modules-iwlwifi-6.8.0-1008-gcp - 6.8.0-1008.9 linux-image-6.8.0-1008-gcp - 6.8.0-1008.9 linux-modules-extra-gcp - 6.8.0-1008.9 linux-buildinfo-6.8.0-1008-gcp - 6.8.0-1008.9 linux-tools-6.8.0-1008-gcp - 6.8.0-1008.9 No subscription required linux-modules-extra-aws - 6.8.0-1009.9 linux-tools-aws - 6.8.0-1009.9 linux-aws-tools-6.8.0-1009 - 6.8.0-1009.9 linux-cloud-tools-6.8.0-1009-aws - 6.8.0-1009.9 linux-image-aws - 6.8.0-1009.9 linux-image-6.8.0-1009-aws - 6.8.0-1009.9 linux-aws-cloud-tools-6.8.0-1009 - 6.8.0-1009.9 linux-headers-6.8.0-1009-aws - 6.8.0-1009.9 linux-image-unsigned-6.8.0-1009-aws - 6.8.0-1009.9 linux-modules-6.8.0-1009-aws - 6.8.0-1009.9 linux-aws - 6.8.0-1009.9 linux-headers-aws - 6.8.0-1009.9 linux-buildinfo-6.8.0-1009-aws - 6.8.0-1009.9 linux-aws-headers-6.8.0-1009 - 6.8.0-1009.9 linux-tools-6.8.0-1009-aws - 6.8.0-1009.9 linux-modules-extra-6.8.0-1009-aws - 6.8.0-1009.9 No subscription required High CVE-2022-38096 CVE-2022-48669 CVE-2023-47233 CVE-2023-52644 CVE-2023-52647 CVE-2023-52648 CVE-2023-52649 CVE-2023-52650 CVE-2023-52652 CVE-2023-52653 CVE-2023-52659 CVE-2023-52661 CVE-2023-52662 CVE-2023-52663 CVE-2023-6270 CVE-2023-7042 CVE-2024-23307 CVE-2024-24861 CVE-2024-25739 CVE-2024-26651 CVE-2024-26653 CVE-2024-26654 CVE-2024-26655 CVE-2024-26656 CVE-2024-26657 CVE-2024-26809 CVE-2024-26810 CVE-2024-26812 CVE-2024-26813 CVE-2024-26814 CVE-2024-26815 CVE-2024-26816 CVE-2024-26848 CVE-2024-26859 CVE-2024-26860 CVE-2024-26861 CVE-2024-26862 CVE-2024-26863 CVE-2024-26864 CVE-2024-26865 CVE-2024-26866 CVE-2024-26868 CVE-2024-26869 CVE-2024-26870 CVE-2024-26871 CVE-2024-26872 CVE-2024-26873 CVE-2024-26874 CVE-2024-26875 CVE-2024-26876 CVE-2024-26877 CVE-2024-26878 CVE-2024-26879 CVE-2024-26880 CVE-2024-26881 CVE-2024-26882 CVE-2024-26883 CVE-2024-26884 CVE-2024-26885 CVE-2024-26886 CVE-2024-26887 CVE-2024-26888 CVE-2024-26889 CVE-2024-26890 CVE-2024-26891 CVE-2024-26892 CVE-2024-26893 CVE-2024-26894 CVE-2024-26895 CVE-2024-26896 CVE-2024-26897 CVE-2024-26898 CVE-2024-26899 CVE-2024-26900 CVE-2024-26901 CVE-2024-26927 CVE-2024-26929 CVE-2024-26930 CVE-2024-26931 CVE-2024-26932 CVE-2024-26933 CVE-2024-26934 CVE-2024-26935 CVE-2024-26937 CVE-2024-26938 CVE-2024-26939 CVE-2024-26940 CVE-2024-26941 CVE-2024-26942 CVE-2024-26943 CVE-2024-26944 CVE-2024-26945 CVE-2024-26946 CVE-2024-26947 CVE-2024-26948 CVE-2024-26949 CVE-2024-26950 CVE-2024-26951 CVE-2024-26952 CVE-2024-26953 CVE-2024-26954 CVE-2024-26955 CVE-2024-26956 CVE-2024-26957 CVE-2024-26958 CVE-2024-26959 CVE-2024-26960 CVE-2024-26961 CVE-2024-26962 CVE-2024-26963 CVE-2024-26964 CVE-2024-26965 CVE-2024-26966 CVE-2024-26967 CVE-2024-26968 CVE-2024-26969 CVE-2024-26970 CVE-2024-26971 CVE-2024-26972 CVE-2024-26973 CVE-2024-26975 CVE-2024-26976 CVE-2024-26977 CVE-2024-26978 CVE-2024-27026 CVE-2024-27027 CVE-2024-27028 CVE-2024-27029 CVE-2024-27030 CVE-2024-27031 CVE-2024-27032 CVE-2024-27033 CVE-2024-27034 CVE-2024-27035 CVE-2024-27036 CVE-2024-27037 CVE-2024-27038 CVE-2024-27039 CVE-2024-27040 CVE-2024-27041 CVE-2024-27042 CVE-2024-27043 CVE-2024-27044 CVE-2024-27045 CVE-2024-27046 CVE-2024-27047 CVE-2024-27048 CVE-2024-27049 CVE-2024-27050 CVE-2024-27051 CVE-2024-27052 CVE-2024-27053 CVE-2024-27054 CVE-2024-27058 CVE-2024-27063 CVE-2024-27064 CVE-2024-27065 CVE-2024-27066 CVE-2024-27067 CVE-2024-27068 CVE-2024-27069 CVE-2024-27070 CVE-2024-27071 CVE-2024-27072 CVE-2024-27073 CVE-2024-27074 CVE-2024-27075 CVE-2024-27076 CVE-2024-27077 CVE-2024-27078 CVE-2024-27079 CVE-2024-27080 CVE-2024-27388 CVE-2024-27389 CVE-2024-27390 CVE-2024-27391 CVE-2024-27392 CVE-2024-27432 CVE-2024-27433 CVE-2024-27434 CVE-2024-27435 CVE-2024-27436 CVE-2024-27437 CVE-2024-35787 CVE-2024-35788 CVE-2024-35789 CVE-2024-35793 CVE-2024-35794 CVE-2024-35795 CVE-2024-35796 CVE-2024-35797 CVE-2024-35798 CVE-2024-35799 CVE-2024-35800 CVE-2024-35801 CVE-2024-35803 CVE-2024-35805 CVE-2024-35806 CVE-2024-35807 CVE-2024-35808 CVE-2024-35809 CVE-2024-35810 CVE-2024-35811 CVE-2024-35813 CVE-2024-35814 CVE-2024-35817 CVE-2024-35819 CVE-2024-35821 CVE-2024-35822 CVE-2024-35826 CVE-2024-35827 CVE-2024-35828 CVE-2024-35829 CVE-2024-35830 CVE-2024-35831 CVE-2024-35843 CVE-2024-35844 CVE-2024-35845 CVE-2024-35874 USN-6817-2 -- Linux kernel (OEM) vulnerabilities Ubuntu 24.04 LTS Ziming Zhang discovered that the DRM driver for VMware Virtual GPU did not properly handle certain error conditions, leading to a NULL pointer dereference. A local attacker could possibly trigger this vulnerability to cause a denial of service. (CVE-2022-38096) Zheng Wang discovered that the Broadcom FullMAC WLAN driver in the Linux kernel contained a race condition during device removal, leading to a use- after-free vulnerability. A physically proximate attacker could possibly use this to cause a denial of service (system crash). (CVE-2023-47233) It was discovered that the ATA over Ethernet (AoE) driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2023-6270) It was discovered that the Atheros 802.11ac wireless driver did not properly validate certain data structures, leading to a NULL pointer dereference. An attacker could possibly use this to cause a denial of service. (CVE-2023-7042) Gui-Dong Han discovered that the software RAID driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. A privileged attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-23307) Bai Jiaju discovered that the Xceive XC4000 silicon tuner device driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-24861) Chenyuan Yang discovered that the Unsorted Block Images (UBI) flash device volume management subsystem did not properly validate logical eraseblock sizes in certain situations. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-25739) It was discovered that the MediaTek SoC Gigabit Ethernet driver in the Linux kernel contained a race condition when stopping the device. A local attacker could possibly use this to cause a denial of service (device unavailability). (CVE-2024-27432) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - PowerPC architecture; - x86 architecture; - Block layer subsystem; - ACPI drivers; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Cryptographic API; - DPLL subsystem; - ARM SCMI message protocol; - EFI core; - GPU drivers; - InfiniBand drivers; - IOMMU subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - MMC subsystem; - Network drivers; - NTB driver; - NVME drivers; - PCI subsystem; - Powercap sysfs driver; - SCSI drivers; - Freescale SoC drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - TTY drivers; - USB subsystem; - DesignWare USB3 driver; - VFIO drivers; - Backlight driver; - Virtio drivers; - Xen hypervisor drivers; - AFS file system; - File systems infrastructure; - BTRFS file system; - debug file system; - Ext4 file system; - F2FS file system; - FAT file system; - Network file system client; - NILFS2 file system; - Overlay file system; - Pstore file system; - Diskquota system; - SMB network file system; - UBI file system; - io_uring subsystem; - BPF subsystem; - Core kernel; - Memory management; - Bluetooth subsystem; - Networking core; - HSR network protocol; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - IEEE 802.15.4 subsystem; - Netfilter; - Packet sockets; - Network traffic control; - Sun RPC protocol; - ALSA SH drivers; - SOF drivers; - USB sound devices; - KVM core; (CVE-2024-26859, CVE-2024-26944, CVE-2024-27049, CVE-2024-26868, CVE-2024-26932, CVE-2024-35843, CVE-2024-35814, CVE-2024-26866, CVE-2024-26941, CVE-2024-27080, CVE-2024-26938, CVE-2024-26889, CVE-2024-27075, CVE-2024-27077, CVE-2024-26864, CVE-2024-35787, CVE-2024-27071, CVE-2024-26880, CVE-2024-26961, CVE-2024-26945, CVE-2024-26863, CVE-2024-35795, CVE-2024-27045, CVE-2024-27066, CVE-2024-27046, CVE-2024-26816, CVE-2024-27069, CVE-2024-26861, CVE-2024-26968, CVE-2024-26963, CVE-2024-26878, CVE-2024-27073, CVE-2024-35806, CVE-2024-26951, CVE-2024-26954, CVE-2024-27026, CVE-2024-26956, CVE-2024-35811, CVE-2024-35803, CVE-2024-26964, CVE-2024-26848, CVE-2024-27434, CVE-2024-35844, CVE-2024-26977, CVE-2024-27031, CVE-2024-35813, CVE-2024-26960, CVE-2024-27067, CVE-2024-26937, CVE-2024-26884, CVE-2024-26656, CVE-2024-27068, CVE-2024-26871, CVE-2023-52653, CVE-2024-26939, CVE-2024-26967, CVE-2024-26966, CVE-2024-27043, CVE-2024-26814, CVE-2024-35829, CVE-2024-26973, CVE-2024-35810, CVE-2024-26877, CVE-2024-27392, CVE-2024-35805, CVE-2024-26875, CVE-2024-26970, CVE-2024-26657, CVE-2024-26874, CVE-2024-26971, CVE-2024-26872, CVE-2024-35798, CVE-2024-26931, CVE-2024-26948, CVE-2024-26883, CVE-2024-26955, CVE-2024-27039, CVE-2024-27038, CVE-2024-27065, CVE-2024-26899, CVE-2024-27048, CVE-2024-35874, CVE-2024-35845, CVE-2024-35799, CVE-2024-35827, CVE-2024-26935, CVE-2024-27079, CVE-2024-35821, CVE-2024-26950, CVE-2024-26879, CVE-2024-26940, CVE-2024-35788, CVE-2024-26891, CVE-2024-27063, CVE-2024-27433, CVE-2024-27036, CVE-2024-35819, CVE-2024-26969, CVE-2024-27044, CVE-2024-27028, CVE-2024-27070, CVE-2023-52649, CVE-2024-27435, CVE-2024-35830, CVE-2024-26929, CVE-2024-26653, CVE-2024-26887, CVE-2024-26869, CVE-2024-26942, CVE-2024-35822, CVE-2024-26979, CVE-2024-26881, CVE-2024-26655, CVE-2024-26975, CVE-2023-52650, CVE-2024-26651, CVE-2024-35828, CVE-2024-26965, CVE-2024-27437, CVE-2024-35794, CVE-2024-26962, CVE-2024-27058, CVE-2024-27076, CVE-2024-27035, CVE-2024-27074, CVE-2024-27027, CVE-2024-26860, CVE-2024-27042, CVE-2024-27390, CVE-2024-26815, CVE-2023-52662, CVE-2024-27051, CVE-2024-35796, CVE-2024-27047, CVE-2024-26930, CVE-2024-26865, CVE-2024-27064, CVE-2024-35826, CVE-2024-26885, CVE-2024-26873, CVE-2024-26943, CVE-2024-26893, CVE-2024-27030, CVE-2024-26976, CVE-2024-35793, CVE-2024-26952, CVE-2023-52644, CVE-2024-35797, CVE-2024-27029, CVE-2024-26927, CVE-2024-26812, CVE-2024-27432, CVE-2024-26897, CVE-2024-26890, CVE-2024-26972, CVE-2024-35800, CVE-2024-27032, CVE-2024-27052, CVE-2023-52647, CVE-2024-26898, CVE-2023-52652, CVE-2024-35808, CVE-2024-26876, CVE-2024-26933, CVE-2024-26862, CVE-2024-27033, CVE-2023-52663, CVE-2024-27041, CVE-2023-52648, CVE-2024-26888, CVE-2024-26957, CVE-2024-26953, CVE-2023-52659, CVE-2024-27436, CVE-2024-27040, CVE-2024-27054, CVE-2024-27050, CVE-2024-26886, CVE-2023-52661, CVE-2024-35831, CVE-2024-26946, CVE-2024-26949, CVE-2024-26809, CVE-2024-26892, CVE-2024-26654, CVE-2024-26901, CVE-2024-27053, CVE-2024-26882, CVE-2024-35809, CVE-2024-26978, CVE-2024-27037, CVE-2024-27391, CVE-2024-27034, CVE-2024-26895, CVE-2024-35817, CVE-2024-26900, CVE-2024-26896, CVE-2024-26958, CVE-2024-35801, CVE-2024-27388, CVE-2024-26934, CVE-2024-27078, CVE-2024-35789, CVE-2024-26894, CVE-2024-27389, CVE-2024-35807, CVE-2024-27072, CVE-2024-26947, CVE-2024-26870, CVE-2024-26813, CVE-2022-48669, CVE-2024-26959, CVE-2024-26810) Update Instructions: Run `sudo pro fix USN-6817-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-modules-ipu6-6.8.0-1006-oem - 6.8.0-1006.6 linux-image-6.8.0-1006-oem - 6.8.0-1006.6 linux-tools-6.8.0-1006-oem - 6.8.0-1006.6 linux-headers-6.8.0-1006-oem - 6.8.0-1006.6 linux-image-uc-6.8.0-1006-oem - 6.8.0-1006.6 linux-oem-6.8-tools-6.8.0-1006 - 6.8.0-1006.6 linux-oem-6.8-headers-6.8.0-1006 - 6.8.0-1006.6 linux-image-unsigned-6.8.0-1006-oem - 6.8.0-1006.6 linux-buildinfo-6.8.0-1006-oem - 6.8.0-1006.6 linux-modules-iwlwifi-6.8.0-1006-oem - 6.8.0-1006.6 linux-modules-6.8.0-1006-oem - 6.8.0-1006.6 linux-modules-usbio-6.8.0-1006-oem - 6.8.0-1006.6 No subscription required linux-tools-oem-24.04 - 6.8.0-1006.6+1 linux-image-oem-24.04 - 6.8.0-1006.6+1 linux-image-uc-oem-24.04a - 6.8.0-1006.6+1 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1006.6+1 linux-image-uc-oem-24.04 - 6.8.0-1006.6+1 linux-image-oem-24.04a - 6.8.0-1006.6+1 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1006.6+1 linux-modules-usbio-oem-24.04 - 6.8.0-1006.6+1 linux-modules-ipu6-oem-24.04a - 6.8.0-1006.6+1 linux-headers-oem-24.04a - 6.8.0-1006.6+1 linux-tools-oem-24.04a - 6.8.0-1006.6+1 linux-modules-usbio-oem-24.04a - 6.8.0-1006.6+1 linux-oem-24.04a - 6.8.0-1006.6+1 linux-modules-ipu6-oem-24.04 - 6.8.0-1006.6+1 linux-oem-24.04 - 6.8.0-1006.6+1 linux-headers-oem-24.04 - 6.8.0-1006.6+1 No subscription required High CVE-2022-38096 CVE-2022-48669 CVE-2023-47233 CVE-2023-52644 CVE-2023-52647 CVE-2023-52648 CVE-2023-52649 CVE-2023-52650 CVE-2023-52652 CVE-2023-52653 CVE-2023-52659 CVE-2023-52661 CVE-2023-52662 CVE-2023-52663 CVE-2023-6270 CVE-2023-7042 CVE-2024-23307 CVE-2024-24861 CVE-2024-25739 CVE-2024-26651 CVE-2024-26653 CVE-2024-26654 CVE-2024-26655 CVE-2024-26656 CVE-2024-26657 CVE-2024-26809 CVE-2024-26810 CVE-2024-26812 CVE-2024-26813 CVE-2024-26814 CVE-2024-26815 CVE-2024-26816 CVE-2024-26848 CVE-2024-26859 CVE-2024-26860 CVE-2024-26861 CVE-2024-26862 CVE-2024-26863 CVE-2024-26864 CVE-2024-26865 CVE-2024-26866 CVE-2024-26868 CVE-2024-26869 CVE-2024-26870 CVE-2024-26871 CVE-2024-26872 CVE-2024-26873 CVE-2024-26874 CVE-2024-26875 CVE-2024-26876 CVE-2024-26877 CVE-2024-26878 CVE-2024-26879 CVE-2024-26880 CVE-2024-26881 CVE-2024-26882 CVE-2024-26883 CVE-2024-26884 CVE-2024-26885 CVE-2024-26886 CVE-2024-26887 CVE-2024-26888 CVE-2024-26889 CVE-2024-26890 CVE-2024-26891 CVE-2024-26892 CVE-2024-26893 CVE-2024-26894 CVE-2024-26895 CVE-2024-26896 CVE-2024-26897 CVE-2024-26898 CVE-2024-26899 CVE-2024-26900 CVE-2024-26901 CVE-2024-26927 CVE-2024-26929 CVE-2024-26930 CVE-2024-26931 CVE-2024-26932 CVE-2024-26933 CVE-2024-26934 CVE-2024-26935 CVE-2024-26937 CVE-2024-26938 CVE-2024-26939 CVE-2024-26940 CVE-2024-26941 CVE-2024-26942 CVE-2024-26943 CVE-2024-26944 CVE-2024-26945 CVE-2024-26946 CVE-2024-26947 CVE-2024-26948 CVE-2024-26949 CVE-2024-26950 CVE-2024-26951 CVE-2024-26952 CVE-2024-26953 CVE-2024-26954 CVE-2024-26955 CVE-2024-26956 CVE-2024-26957 CVE-2024-26958 CVE-2024-26959 CVE-2024-26960 CVE-2024-26961 CVE-2024-26962 CVE-2024-26963 CVE-2024-26964 CVE-2024-26965 CVE-2024-26966 CVE-2024-26967 CVE-2024-26968 CVE-2024-26969 CVE-2024-26970 CVE-2024-26971 CVE-2024-26972 CVE-2024-26973 CVE-2024-26975 CVE-2024-26976 CVE-2024-26977 CVE-2024-26978 CVE-2024-27026 CVE-2024-27027 CVE-2024-27028 CVE-2024-27029 CVE-2024-27030 CVE-2024-27031 CVE-2024-27032 CVE-2024-27033 CVE-2024-27034 CVE-2024-27035 CVE-2024-27036 CVE-2024-27037 CVE-2024-27038 CVE-2024-27039 CVE-2024-27040 CVE-2024-27041 CVE-2024-27042 CVE-2024-27043 CVE-2024-27044 CVE-2024-27045 CVE-2024-27046 CVE-2024-27047 CVE-2024-27048 CVE-2024-27049 CVE-2024-27050 CVE-2024-27051 CVE-2024-27052 CVE-2024-27053 CVE-2024-27054 CVE-2024-27058 CVE-2024-27063 CVE-2024-27064 CVE-2024-27065 CVE-2024-27066 CVE-2024-27067 CVE-2024-27068 CVE-2024-27069 CVE-2024-27070 CVE-2024-27071 CVE-2024-27072 CVE-2024-27073 CVE-2024-27074 CVE-2024-27075 CVE-2024-27076 CVE-2024-27077 CVE-2024-27078 CVE-2024-27079 CVE-2024-27080 CVE-2024-27388 CVE-2024-27389 CVE-2024-27390 CVE-2024-27391 CVE-2024-27392 CVE-2024-27432 CVE-2024-27433 CVE-2024-27434 CVE-2024-27435 CVE-2024-27436 CVE-2024-27437 CVE-2024-35787 CVE-2024-35788 CVE-2024-35789 CVE-2024-35793 CVE-2024-35794 CVE-2024-35795 CVE-2024-35796 CVE-2024-35797 CVE-2024-35798 CVE-2024-35799 CVE-2024-35800 CVE-2024-35801 CVE-2024-35803 CVE-2024-35805 CVE-2024-35806 CVE-2024-35807 CVE-2024-35808 CVE-2024-35809 CVE-2024-35810 CVE-2024-35811 CVE-2024-35813 CVE-2024-35814 CVE-2024-35817 CVE-2024-35819 CVE-2024-35821 CVE-2024-35822 CVE-2024-35826 CVE-2024-35827 CVE-2024-35828 CVE-2024-35829 CVE-2024-35830 CVE-2024-35831 CVE-2024-35843 CVE-2024-35844 CVE-2024-35845 CVE-2024-35874 USN-6817-3 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Ziming Zhang discovered that the DRM driver for VMware Virtual GPU did not properly handle certain error conditions, leading to a NULL pointer dereference. A local attacker could possibly trigger this vulnerability to cause a denial of service. (CVE-2022-38096) Zheng Wang discovered that the Broadcom FullMAC WLAN driver in the Linux kernel contained a race condition during device removal, leading to a use- after-free vulnerability. A physically proximate attacker could possibly use this to cause a denial of service (system crash). (CVE-2023-47233) It was discovered that the ATA over Ethernet (AoE) driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2023-6270) It was discovered that the Atheros 802.11ac wireless driver did not properly validate certain data structures, leading to a NULL pointer dereference. An attacker could possibly use this to cause a denial of service. (CVE-2023-7042) Gui-Dong Han discovered that the software RAID driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. A privileged attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-23307) Bai Jiaju discovered that the Xceive XC4000 silicon tuner device driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-24861) Chenyuan Yang discovered that the Unsorted Block Images (UBI) flash device volume management subsystem did not properly validate logical eraseblock sizes in certain situations. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-25739) It was discovered that the MediaTek SoC Gigabit Ethernet driver in the Linux kernel contained a race condition when stopping the device. A local attacker could possibly use this to cause a denial of service (device unavailability). (CVE-2024-27432) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - PowerPC architecture; - x86 architecture; - Block layer subsystem; - ACPI drivers; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Cryptographic API; - DPLL subsystem; - ARM SCMI message protocol; - EFI core; - GPU drivers; - InfiniBand drivers; - IOMMU subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - MMC subsystem; - Network drivers; - NTB driver; - NVME drivers; - PCI subsystem; - Powercap sysfs driver; - SCSI drivers; - Freescale SoC drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - TTY drivers; - USB subsystem; - DesignWare USB3 driver; - VFIO drivers; - Backlight driver; - Virtio drivers; - Xen hypervisor drivers; - AFS file system; - File systems infrastructure; - BTRFS file system; - debug file system; - Ext4 file system; - F2FS file system; - FAT file system; - Network file system client; - NILFS2 file system; - Overlay file system; - Pstore file system; - Diskquota system; - SMB network file system; - UBI file system; - io_uring subsystem; - BPF subsystem; - Core kernel; - Memory management; - Bluetooth subsystem; - Networking core; - HSR network protocol; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - IEEE 802.15.4 subsystem; - Netfilter; - Packet sockets; - Network traffic control; - Sun RPC protocol; - ALSA SH drivers; - SOF drivers; - USB sound devices; - KVM core; (CVE-2024-26859, CVE-2024-26944, CVE-2024-27049, CVE-2024-26868, CVE-2024-26932, CVE-2024-35843, CVE-2024-35814, CVE-2024-26866, CVE-2024-26941, CVE-2024-27080, CVE-2024-26938, CVE-2024-26889, CVE-2024-27075, CVE-2024-27077, CVE-2024-26864, CVE-2024-35787, CVE-2024-27071, CVE-2024-26880, CVE-2024-26961, CVE-2024-26945, CVE-2024-26863, CVE-2024-35795, CVE-2024-27045, CVE-2024-27066, CVE-2024-27046, CVE-2024-26816, CVE-2024-27069, CVE-2024-26861, CVE-2024-26968, CVE-2024-26963, CVE-2024-26878, CVE-2024-27073, CVE-2024-35806, CVE-2024-26951, CVE-2024-26954, CVE-2024-27026, CVE-2024-26956, CVE-2024-35811, CVE-2024-35803, CVE-2024-26964, CVE-2024-26848, CVE-2024-27434, CVE-2024-35844, CVE-2024-26977, CVE-2024-27031, CVE-2024-35813, CVE-2024-26960, CVE-2024-27067, CVE-2024-26937, CVE-2024-26884, CVE-2024-26656, CVE-2024-27068, CVE-2024-26871, CVE-2023-52653, CVE-2024-26939, CVE-2024-26967, CVE-2024-26966, CVE-2024-27043, CVE-2024-26814, CVE-2024-35829, CVE-2024-26973, CVE-2024-35810, CVE-2024-26877, CVE-2024-27392, CVE-2024-35805, CVE-2024-26875, CVE-2024-26970, CVE-2024-26657, CVE-2024-26874, CVE-2024-26971, CVE-2024-26872, CVE-2024-35798, CVE-2024-26931, CVE-2024-26948, CVE-2024-26883, CVE-2024-26955, CVE-2024-27039, CVE-2024-27038, CVE-2024-27065, CVE-2024-26899, CVE-2024-27048, CVE-2024-35874, CVE-2024-35845, CVE-2024-35799, CVE-2024-35827, CVE-2024-26935, CVE-2024-27079, CVE-2024-35821, CVE-2024-26950, CVE-2024-26879, CVE-2024-26940, CVE-2024-35788, CVE-2024-26891, CVE-2024-27063, CVE-2024-27433, CVE-2024-27036, CVE-2024-35819, CVE-2024-26969, CVE-2024-27044, CVE-2024-27028, CVE-2024-27070, CVE-2023-52649, CVE-2024-27435, CVE-2024-35830, CVE-2024-26929, CVE-2024-26653, CVE-2024-26887, CVE-2024-26869, CVE-2024-26942, CVE-2024-35822, CVE-2024-26979, CVE-2024-26881, CVE-2024-26655, CVE-2024-26975, CVE-2023-52650, CVE-2024-26651, CVE-2024-35828, CVE-2024-26965, CVE-2024-27437, CVE-2024-35794, CVE-2024-26962, CVE-2024-27058, CVE-2024-27076, CVE-2024-27035, CVE-2024-27074, CVE-2024-27027, CVE-2024-26860, CVE-2024-27042, CVE-2024-27390, CVE-2024-26815, CVE-2023-52662, CVE-2024-27051, CVE-2024-35796, CVE-2024-27047, CVE-2024-26930, CVE-2024-26865, CVE-2024-27064, CVE-2024-35826, CVE-2024-26885, CVE-2024-26873, CVE-2024-26943, CVE-2024-26893, CVE-2024-27030, CVE-2024-26976, CVE-2024-35793, CVE-2024-26952, CVE-2023-52644, CVE-2024-35797, CVE-2024-27029, CVE-2024-26927, CVE-2024-26812, CVE-2024-27432, CVE-2024-26897, CVE-2024-26890, CVE-2024-26972, CVE-2024-35800, CVE-2024-27032, CVE-2024-27052, CVE-2023-52647, CVE-2024-26898, CVE-2023-52652, CVE-2024-35808, CVE-2024-26876, CVE-2024-26933, CVE-2024-26862, CVE-2024-27033, CVE-2023-52663, CVE-2024-27041, CVE-2023-52648, CVE-2024-26888, CVE-2024-26957, CVE-2024-26953, CVE-2023-52659, CVE-2024-27436, CVE-2024-27040, CVE-2024-27054, CVE-2024-27050, CVE-2024-26886, CVE-2023-52661, CVE-2024-35831, CVE-2024-26946, CVE-2024-26949, CVE-2024-26809, CVE-2024-26892, CVE-2024-26654, CVE-2024-26901, CVE-2024-27053, CVE-2024-26882, CVE-2024-35809, CVE-2024-26978, CVE-2024-27037, CVE-2024-27391, CVE-2024-27034, CVE-2024-26895, CVE-2024-35817, CVE-2024-26900, CVE-2024-26896, CVE-2024-26958, CVE-2024-35801, CVE-2024-27388, CVE-2024-26934, CVE-2024-27078, CVE-2024-35789, CVE-2024-26894, CVE-2024-27389, CVE-2024-35807, CVE-2024-27072, CVE-2024-26947, CVE-2024-26870, CVE-2024-26813, CVE-2022-48669, CVE-2024-26959, CVE-2024-26810) Update Instructions: Run `sudo pro fix USN-6817-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-gke-headers-6.8.0-1004 - 6.8.0-1004.7 linux-modules-iwlwifi-6.8.0-1004-gke - 6.8.0-1004.7 linux-tools-gke - 6.8.0-1004.7 linux-image-6.8.0-1004-gke - 6.8.0-1004.7 linux-modules-extra-6.8.0-1004-gke - 6.8.0-1004.7 linux-gke - 6.8.0-1004.7 linux-buildinfo-6.8.0-1004-gke - 6.8.0-1004.7 linux-image-gke - 6.8.0-1004.7 linux-gke-tools-6.8.0-1004 - 6.8.0-1004.7 linux-headers-gke - 6.8.0-1004.7 linux-modules-6.8.0-1004-gke - 6.8.0-1004.7 linux-modules-iwlwifi-gke - 6.8.0-1004.7 linux-headers-6.8.0-1004-gke - 6.8.0-1004.7 linux-image-unsigned-6.8.0-1004-gke - 6.8.0-1004.7 linux-tools-6.8.0-1004-gke - 6.8.0-1004.7 No subscription required linux-image-6.8.0-1008-azure - 6.8.0-1008.8 linux-image-azure-fde - 6.8.0-1008.8 linux-azure-tools-6.8.0-1008 - 6.8.0-1008.8 linux-azure - 6.8.0-1008.8 linux-azure-headers-6.8.0-1008 - 6.8.0-1008.8 linux-image-azure - 6.8.0-1008.8 linux-modules-iwlwifi-6.8.0-1008-azure - 6.8.0-1008.8 linux-cloud-tools-azure - 6.8.0-1008.8 linux-headers-6.8.0-1008-azure - 6.8.0-1008.8 linux-tools-azure - 6.8.0-1008.8 linux-modules-iwlwifi-azure - 6.8.0-1008.8 linux-image-unsigned-6.8.0-1008-azure - 6.8.0-1008.8 linux-modules-extra-azure - 6.8.0-1008.8 linux-image-6.8.0-1008-azure-fde - 6.8.0-1008.8 linux-buildinfo-6.8.0-1008-azure - 6.8.0-1008.8 linux-azure-fde - 6.8.0-1008.8 linux-tools-6.8.0-1008-azure - 6.8.0-1008.8 linux-modules-6.8.0-1008-azure - 6.8.0-1008.8 linux-azure-cloud-tools-6.8.0-1008 - 6.8.0-1008.8 linux-headers-azure - 6.8.0-1008.8 linux-cloud-tools-6.8.0-1008-azure - 6.8.0-1008.8 linux-modules-extra-6.8.0-1008-azure - 6.8.0-1008.8 No subscription required High CVE-2022-38096 CVE-2022-48669 CVE-2023-47233 CVE-2023-52644 CVE-2023-52647 CVE-2023-52648 CVE-2023-52649 CVE-2023-52650 CVE-2023-52652 CVE-2023-52653 CVE-2023-52659 CVE-2023-52661 CVE-2023-52662 CVE-2023-52663 CVE-2023-6270 CVE-2023-7042 CVE-2024-23307 CVE-2024-24861 CVE-2024-25739 CVE-2024-26651 CVE-2024-26653 CVE-2024-26654 CVE-2024-26655 CVE-2024-26656 CVE-2024-26657 CVE-2024-26809 CVE-2024-26810 CVE-2024-26812 CVE-2024-26813 CVE-2024-26814 CVE-2024-26815 CVE-2024-26816 CVE-2024-26848 CVE-2024-26859 CVE-2024-26860 CVE-2024-26861 CVE-2024-26862 CVE-2024-26863 CVE-2024-26864 CVE-2024-26865 CVE-2024-26866 CVE-2024-26868 CVE-2024-26869 CVE-2024-26870 CVE-2024-26871 CVE-2024-26872 CVE-2024-26873 CVE-2024-26874 CVE-2024-26875 CVE-2024-26876 CVE-2024-26877 CVE-2024-26878 CVE-2024-26879 CVE-2024-26880 CVE-2024-26881 CVE-2024-26882 CVE-2024-26883 CVE-2024-26884 CVE-2024-26885 CVE-2024-26886 CVE-2024-26887 CVE-2024-26888 CVE-2024-26889 CVE-2024-26890 CVE-2024-26891 CVE-2024-26892 CVE-2024-26893 CVE-2024-26894 CVE-2024-26895 CVE-2024-26896 CVE-2024-26897 CVE-2024-26898 CVE-2024-26899 CVE-2024-26900 CVE-2024-26901 CVE-2024-26927 CVE-2024-26929 CVE-2024-26930 CVE-2024-26931 CVE-2024-26932 CVE-2024-26933 CVE-2024-26934 CVE-2024-26935 CVE-2024-26937 CVE-2024-26938 CVE-2024-26939 CVE-2024-26940 CVE-2024-26941 CVE-2024-26942 CVE-2024-26943 CVE-2024-26944 CVE-2024-26945 CVE-2024-26946 CVE-2024-26947 CVE-2024-26948 CVE-2024-26949 CVE-2024-26950 CVE-2024-26951 CVE-2024-26952 CVE-2024-26953 CVE-2024-26954 CVE-2024-26955 CVE-2024-26956 CVE-2024-26957 CVE-2024-26958 CVE-2024-26959 CVE-2024-26960 CVE-2024-26961 CVE-2024-26962 CVE-2024-26963 CVE-2024-26964 CVE-2024-26965 CVE-2024-26966 CVE-2024-26967 CVE-2024-26968 CVE-2024-26969 CVE-2024-26970 CVE-2024-26971 CVE-2024-26972 CVE-2024-26973 CVE-2024-26975 CVE-2024-26976 CVE-2024-26977 CVE-2024-26978 CVE-2024-27026 CVE-2024-27027 CVE-2024-27028 CVE-2024-27029 CVE-2024-27030 CVE-2024-27031 CVE-2024-27032 CVE-2024-27033 CVE-2024-27034 CVE-2024-27035 CVE-2024-27036 CVE-2024-27037 CVE-2024-27038 CVE-2024-27039 CVE-2024-27040 CVE-2024-27041 CVE-2024-27042 CVE-2024-27043 CVE-2024-27044 CVE-2024-27045 CVE-2024-27046 CVE-2024-27047 CVE-2024-27048 CVE-2024-27049 CVE-2024-27050 CVE-2024-27051 CVE-2024-27052 CVE-2024-27053 CVE-2024-27054 CVE-2024-27058 CVE-2024-27063 CVE-2024-27064 CVE-2024-27065 CVE-2024-27066 CVE-2024-27067 CVE-2024-27068 CVE-2024-27069 CVE-2024-27070 CVE-2024-27071 CVE-2024-27072 CVE-2024-27073 CVE-2024-27074 CVE-2024-27075 CVE-2024-27076 CVE-2024-27077 CVE-2024-27078 CVE-2024-27079 CVE-2024-27080 CVE-2024-27388 CVE-2024-27389 CVE-2024-27390 CVE-2024-27391 CVE-2024-27392 CVE-2024-27432 CVE-2024-27433 CVE-2024-27434 CVE-2024-27435 CVE-2024-27436 CVE-2024-27437 CVE-2024-35787 CVE-2024-35788 CVE-2024-35789 CVE-2024-35793 CVE-2024-35794 CVE-2024-35795 CVE-2024-35796 CVE-2024-35797 CVE-2024-35798 CVE-2024-35799 CVE-2024-35800 CVE-2024-35801 CVE-2024-35803 CVE-2024-35805 CVE-2024-35806 CVE-2024-35807 CVE-2024-35808 CVE-2024-35809 CVE-2024-35810 CVE-2024-35811 CVE-2024-35813 CVE-2024-35814 CVE-2024-35817 CVE-2024-35819 CVE-2024-35821 CVE-2024-35822 CVE-2024-35826 CVE-2024-35827 CVE-2024-35828 CVE-2024-35829 CVE-2024-35830 CVE-2024-35831 CVE-2024-35843 CVE-2024-35844 CVE-2024-35845 CVE-2024-35874 USN-6823-1 -- MySQL vulnerabilities Ubuntu 24.04 LTS Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 8.0.37 in Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 23.10, and Ubuntu 24.04 LTS. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information: https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-37.html https://www.oracle.com/security-alerts/cpuapr2024.html Update Instructions: Run `sudo pro fix USN-6823-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: mysql-client - 8.0.37-0ubuntu0.24.04.1 libmysqlclient-dev - 8.0.37-0ubuntu0.24.04.1 mysql-testsuite-8.0 - 8.0.37-0ubuntu0.24.04.1 mysql-router - 8.0.37-0ubuntu0.24.04.1 mysql-server - 8.0.37-0ubuntu0.24.04.1 libmysqlclient21 - 8.0.37-0ubuntu0.24.04.1 mysql-client-core-8.0 - 8.0.37-0ubuntu0.24.04.1 mysql-server-core-8.0 - 8.0.37-0ubuntu0.24.04.1 mysql-server-8.0 - 8.0.37-0ubuntu0.24.04.1 mysql-testsuite - 8.0.37-0ubuntu0.24.04.1 mysql-client-8.0 - 8.0.37-0ubuntu0.24.04.1 mysql-source-8.0 - 8.0.37-0ubuntu0.24.04.1 No subscription required Medium CVE-2024-20994 CVE-2024-20998 CVE-2024-21000 CVE-2024-21008 CVE-2024-21009 CVE-2024-21013 CVE-2024-21047 CVE-2024-21054 CVE-2024-21060 CVE-2024-21062 CVE-2024-21069 CVE-2024-21087 CVE-2024-21096 CVE-2024-21102 USN-6827-1 -- LibTIFF vulnerability Ubuntu 24.04 LTS It was discovered that LibTIFF incorrectly handled memory when performing certain cropping operations, leading to a heap buffer overflow. An attacker could use this issue to cause a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6827-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libtiff-opengl - 4.5.1+git230720-4ubuntu2.1 libtiff5-dev - 4.5.1+git230720-4ubuntu2.1 libtiff-dev - 4.5.1+git230720-4ubuntu2.1 libtiffxx6 - 4.5.1+git230720-4ubuntu2.1 libtiff6 - 4.5.1+git230720-4ubuntu2.1 libtiff-tools - 4.5.1+git230720-4ubuntu2.1 libtiff-doc - 4.5.1+git230720-4ubuntu2.1 No subscription required Low CVE-2023-3164 USN-6830-1 -- libndp vulnerability Ubuntu 24.04 LTS It was discovered that libndp incorrectly handled certain malformed IPv6 router advertisement packets. A local attacker could use this issue to cause NetworkManager to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6830-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libndp0 - 1.8-1fakesync1ubuntu0.24.04.1 libndp-dev - 1.8-1fakesync1ubuntu0.24.04.1 libndp-tools - 1.8-1fakesync1ubuntu0.24.04.1 No subscription required Medium CVE-2024-5564 USN-6832-1 -- Virtuoso Open-Source Edition vulnerabilities Ubuntu 24.04 LTS Jingzhou Fu discovered that Virtuoso Open-Source Edition incorrectly handled certain crafted SQL statements. An attacker could possibly use this issue to crash the program, resulting in a denial of service. (CVE-2023-31607, CVE-2023-31608, CVE-2023-31609, CVE-2023-31610, CVE-2023-31611, CVE-2023-31616, CVE-2023-31617, CVE-2023-31618, CVE-2023-31619, CVE-2023-31623, CVE-2023-31625, CVE-2023-31628) Jingzhou Fu discovered that Virtuoso Open-Source Edition incorrectly handled certain crafted SQL statements. An attacker could possibly use this issue to crash the program, resulting in a denial of service. This issue only affects Ubuntu 22.04 LTS, Ubuntu 23.10 and Ubuntu 24.04 LTS. (CVE-2023-31612, CVE-2023-31613, CVE-2023-31614, CVE-2023-31615) Update Instructions: Run `sudo pro fix USN-6832-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: virtuoso-vad-demo - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vad-sparqldemo - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vad-rdfmappers - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vsp-startpage - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vad-isparql - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-opensource-7-bin - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-server - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vad-tutorial - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-minimal - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-opensource - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vad-ods - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-opensource-7 - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vad-syncml - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vad-doc - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vad-conductor - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 libvirtodbc0 - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 libvirtuoso5.5-cil - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-vad-bpel - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 virtuoso-opensource-7-common - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2023-31607 CVE-2023-31608 CVE-2023-31609 CVE-2023-31610 CVE-2023-31611 CVE-2023-31612 CVE-2023-31613 CVE-2023-31614 CVE-2023-31615 CVE-2023-31616 CVE-2023-31617 CVE-2023-31618 CVE-2023-31619 CVE-2023-31623 CVE-2023-31625 CVE-2023-31628 USN-6833-1 -- VTE vulnerability Ubuntu 24.04 LTS Siddharth Dushantha discovered that VTE incorrectly handled large window resize escape sequences. An attacker could possibly use this issue to consume resources, leading to a denial of service. Update Instructions: Run `sudo pro fix USN-6833-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libvte-2.91-gtk4-dev - 0.76.0-1ubuntu0.1 libvte-2.91-common - 0.76.0-1ubuntu0.1 gir1.2-vte-3.91 - 0.76.0-1ubuntu0.1 gir1.2-vte-2.91 - 0.76.0-1ubuntu0.1 libvte-2.91-doc - 0.76.0-1ubuntu0.1 libvte-2.91-gtk4-0 - 0.76.0-1ubuntu0.1 libvte-2.91-0 - 0.76.0-1ubuntu0.1 libvte-2.91-gtk4-doc - 0.76.0-1ubuntu0.1 libvte-2.91-dev - 0.76.0-1ubuntu0.1 No subscription required Medium CVE-2024-37535 USN-6835-1 -- Ghostscript vulnerabilities Ubuntu 24.04 LTS It was discovered that Ghostscript did not properly restrict eexec seeds to those specified by the Type 1 Font Format standard when SAFER mode is used. An attacker could use this issue to bypass SAFER restrictions and cause unspecified impact. (CVE-2023-52722) This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 23.10. Thomas Rinsma discovered that Ghostscript did not prevent changes to uniprint device argument strings after SAFER is activated, resulting in a format-string vulnerability. An attacker could possibly use this to execute arbitrary code. (CVE-2024-29510) Zdenek Hutyra discovered that Ghostscript did not properly perform path reduction when validating paths. An attacker could use this to access file locations outside of those allowed by SAFER policy and possibly execute arbitrary code. (CVE-2024-33869) Zdenek Hutyra discovered that Ghostscript did not properly check arguments when reducing paths. An attacker could use this to access file locations outside of those allowed by SAFER policy. (CVE-2024-33870) Zdenek Hutyra discovered that the "Driver" parameter for Ghostscript's "opvp"/"oprp" device allowed specifying the name of an arbitrary dynamic library to load. An attacker could use this to execute arbitrary code. (CVE-2024-33871) Update Instructions: Run `sudo pro fix USN-6835-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ghostscript - 10.02.1~dfsg1-0ubuntu7.1 libgs10-common - 10.02.1~dfsg1-0ubuntu7.1 libgs10 - 10.02.1~dfsg1-0ubuntu7.1 libgs-common - 10.02.1~dfsg1-0ubuntu7.1 libgs-dev - 10.02.1~dfsg1-0ubuntu7.1 ghostscript-doc - 10.02.1~dfsg1-0ubuntu7.1 No subscription required Medium CVE-2023-52722 CVE-2024-29510 CVE-2024-33869 CVE-2024-33870 CVE-2024-33871 USN-6836-1 -- SSSD vulnerability Ubuntu 24.04 LTS It was discovered that SSSD did not always correctly apply the GPO policy for authenticated users, contrary to expectations. This could result in improper authorization or improper access to resources. Update Instructions: Run `sudo pro fix USN-6836-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libsss-certmap-dev - 2.9.4-1.1ubuntu6.1 libipa-hbac-dev - 2.9.4-1.1ubuntu6.1 sssd-ad - 2.9.4-1.1ubuntu6.1 libsss-sudo - 2.9.4-1.1ubuntu6.1 libsss-nss-idmap0 - 2.9.4-1.1ubuntu6.1 libnss-sss - 2.9.4-1.1ubuntu6.1 sssd-ipa - 2.9.4-1.1ubuntu6.1 sssd-passkey - 2.9.4-1.1ubuntu6.1 libipa-hbac0t64 - 2.9.4-1.1ubuntu6.1 libsss-idmap-dev - 2.9.4-1.1ubuntu6.1 python3-libsss-nss-idmap - 2.9.4-1.1ubuntu6.1 sssd-common - 2.9.4-1.1ubuntu6.1 python3-sss - 2.9.4-1.1ubuntu6.1 libpam-sss - 2.9.4-1.1ubuntu6.1 sssd - 2.9.4-1.1ubuntu6.1 libsss-idmap0 - 2.9.4-1.1ubuntu6.1 sssd-idp - 2.9.4-1.1ubuntu6.1 libsss-nss-idmap-dev - 2.9.4-1.1ubuntu6.1 sssd-kcm - 2.9.4-1.1ubuntu6.1 libsss-certmap0 - 2.9.4-1.1ubuntu6.1 python3-libipa-hbac - 2.9.4-1.1ubuntu6.1 sssd-ldap - 2.9.4-1.1ubuntu6.1 sssd-tools - 2.9.4-1.1ubuntu6.1 sssd-ad-common - 2.9.4-1.1ubuntu6.1 sssd-krb5-common - 2.9.4-1.1ubuntu6.1 sssd-dbus - 2.9.4-1.1ubuntu6.1 sssd-krb5 - 2.9.4-1.1ubuntu6.1 sssd-proxy - 2.9.4-1.1ubuntu6.1 No subscription required Medium CVE-2023-3758 USN-6837-1 -- Rack vulnerabilities Ubuntu 24.04 LTS It was discovered that Rack incorrectly handled Multipart MIME parsing. A remote attacker could possibly use this issue to cause Rack to consume resources, leading to a denial of service. This issue only affected Ubuntu 23.10. (CVE-2023-27530) It was discovered that Rack incorrectly parsed certain media types. A remote attacker could possibly use this issue to cause Rack to consume resources, leading to a denial of service. (CVE-2024-25126) It was discovered that Rack incorrectly handled certain Range headers. A remote attacker could possibly use this issue to cause Rack to create large responses, leading to a denial of service. This issue only affected Ubuntu 24.04 LTS. (CVE-2024-26141) It was discovered that Rack incorrectly handled certain crafted headers. A remote attacker could possibly use this issue to cause Rack to consume resources, leading to a denial of service. This issue only affected Ubuntu 24.04 LTS. (CVE-2024-26146) Update Instructions: Run `sudo pro fix USN-6837-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ruby-rack - 2.2.7-1ubuntu0.1 No subscription required Medium CVE-2023-27530 CVE-2024-25126 CVE-2024-26141 CVE-2024-26146 USN-6838-1 -- Ruby vulnerabilities Ubuntu 24.04 LTS It was discovered that Ruby RDoc incorrectly parsed certain YAML files. If a user or automated system were tricked into parsing a specially crafted .rdoc_options file, a remote attacker could possibly use this issue to execute arbitrary code. (CVE-2024-27281) It was discovered that the Ruby regex compiler incorrectly handled certain memory operations. A remote attacker could possibly use this issue to obtain sensitive memory contents. (CVE-2024-27282) Update Instructions: Run `sudo pro fix USN-6838-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ruby3.2 - 3.2.3-1ubuntu0.24.04.1 ruby3.2-doc - 3.2.3-1ubuntu0.24.04.1 ruby3.2-dev - 3.2.3-1ubuntu0.24.04.1 libruby3.2 - 3.2.3-1ubuntu0.24.04.1 No subscription required Medium CVE-2024-27281 CVE-2024-27282 USN-6839-1 -- MariaDB vulnerability Ubuntu 24.04 LTS A security issue was discovered in MariaDB and this update includes new upstream MariaDB versions to fix the issue. MariaDB has been updated to 10.6.18 in Ubuntu 22.04 LTS and to 10.11.8 in Ubuntu 23.10 and Ubuntu 24.04 LTS. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Update Instructions: Run `sudo pro fix USN-6839-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: mariadb-plugin-provider-lzo - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-cracklib-password-check - 1:10.11.8-0ubuntu0.24.04.1 mariadb-backup - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-connect - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-spider - 1:10.11.8-0ubuntu0.24.04.1 libmariadb-dev - 1:10.11.8-0ubuntu0.24.04.1 libmariadb3 - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-s3 - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-provider-bzip2 - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-provider-lzma - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-provider-snappy - 1:10.11.8-0ubuntu0.24.04.1 mariadb-client - 1:10.11.8-0ubuntu0.24.04.1 libmariadbd19t64 - 1:10.11.8-0ubuntu0.24.04.1 mariadb-server-core - 1:10.11.8-0ubuntu0.24.04.1 mariadb-server-10.5 - 1:10.11.8-0ubuntu0.24.04.1 mariadb-test-data - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-provider-lz4 - 1:10.11.8-0ubuntu0.24.04.1 mariadb-client-core - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-rocksdb - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-gssapi-client - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-mroonga - 1:10.11.8-0ubuntu0.24.04.1 libmariadbd-dev - 1:10.11.8-0ubuntu0.24.04.1 libmariadb-dev-compat - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-gssapi-server - 1:10.11.8-0ubuntu0.24.04.1 mariadb-server - 1:10.11.8-0ubuntu0.24.04.1 mariadb-common - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-hashicorp-key-management - 1:10.11.8-0ubuntu0.24.04.1 mariadb-plugin-oqgraph - 1:10.11.8-0ubuntu0.24.04.1 mariadb-test - 1:10.11.8-0ubuntu0.24.04.1 No subscription required Medium CVE-2024-21096 USN-6841-1 -- PHP vulnerability Ubuntu 24.04 LTS It was discovered that PHP could early return in the filter_var function resulting in invalid user information being treated as valid user information. An attacker could possibly use this issue to expose raw user input information. Update Instructions: Run `sudo pro fix USN-6841-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: php8.3-cgi - 8.3.6-0ubuntu0.24.04.1 php8.3-xsl - 8.3.6-0ubuntu0.24.04.1 php8.3-fpm - 8.3.6-0ubuntu0.24.04.1 php8.3-phpdbg - 8.3.6-0ubuntu0.24.04.1 php8.3-zip - 8.3.6-0ubuntu0.24.04.1 php8.3-curl - 8.3.6-0ubuntu0.24.04.1 php8.3-ldap - 8.3.6-0ubuntu0.24.04.1 php8.3-gmp - 8.3.6-0ubuntu0.24.04.1 php8.3-sqlite3 - 8.3.6-0ubuntu0.24.04.1 php8.3-gd - 8.3.6-0ubuntu0.24.04.1 php8.3-common - 8.3.6-0ubuntu0.24.04.1 php8.3-enchant - 8.3.6-0ubuntu0.24.04.1 php8.3-odbc - 8.3.6-0ubuntu0.24.04.1 php8.3-cli - 8.3.6-0ubuntu0.24.04.1 php8.3-mbstring - 8.3.6-0ubuntu0.24.04.1 php8.3-pgsql - 8.3.6-0ubuntu0.24.04.1 php8.3-mysql - 8.3.6-0ubuntu0.24.04.1 php8.3-dba - 8.3.6-0ubuntu0.24.04.1 libapache2-mod-php8.3 - 8.3.6-0ubuntu0.24.04.1 php8.3-soap - 8.3.6-0ubuntu0.24.04.1 php8.3-opcache - 8.3.6-0ubuntu0.24.04.1 php8.3-sybase - 8.3.6-0ubuntu0.24.04.1 php8.3-pspell - 8.3.6-0ubuntu0.24.04.1 libphp8.3-embed - 8.3.6-0ubuntu0.24.04.1 php8.3-bz2 - 8.3.6-0ubuntu0.24.04.1 php8.3-dev - 8.3.6-0ubuntu0.24.04.1 php8.3 - 8.3.6-0ubuntu0.24.04.1 php8.3-tidy - 8.3.6-0ubuntu0.24.04.1 php8.3-interbase - 8.3.6-0ubuntu0.24.04.1 php8.3-readline - 8.3.6-0ubuntu0.24.04.1 php8.3-intl - 8.3.6-0ubuntu0.24.04.1 php8.3-imap - 8.3.6-0ubuntu0.24.04.1 php8.3-xml - 8.3.6-0ubuntu0.24.04.1 php8.3-bcmath - 8.3.6-0ubuntu0.24.04.1 php8.3-snmp - 8.3.6-0ubuntu0.24.04.1 No subscription required Medium CVE-2024-5458 USN-6843-1 -- Plasma Workspace vulnerability Ubuntu 24.04 LTS Fabian Vogt discovered that Plasma Workspace incorrectly handled connections via ICE. A local attacker could possibly use this issue to gain access to another user's session manager and execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6843-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: plasma-workspace-dev - 4:5.27.11-0ubuntu4.1 libweather-ion7 - 4:5.27.11-0ubuntu4.1 libkfontinst5 - 4:5.27.11-0ubuntu4.1 libcolorcorrect5 - 4:5.27.11-0ubuntu4.1 libkworkspace5-5 - 4:5.27.11-0ubuntu4.1 plasma-workspace-data - 4:5.27.11-0ubuntu4.1 plasma-workspace-wayland - 4:5.27.11-0ubuntu4.1 sddm-theme-breeze - 4:5.27.11-0ubuntu4.1 libplasma-geolocation-interface5 - 4:5.27.11-0ubuntu4.1 libnotificationmanager1 - 4:5.27.11-0ubuntu4.1 libkfontinstui5 - 4:5.27.11-0ubuntu4.1 libtaskmanager6 - 4:5.27.11-0ubuntu4.1 plasma-workspace - 4:5.27.11-0ubuntu4.1 No subscription required Medium CVE-2024-36041 USN-6844-1 -- CUPS vulnerability Ubuntu 24.04 LTS Rory McNamara discovered that when starting the cupsd server with a Listen configuration item, the cupsd process fails to validate if bind call passed. An attacker could possibly trick cupsd to perform an arbitrary chmod of the provided argument, providing world-writable access to the target. Update Instructions: Run `sudo pro fix USN-6844-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libcups2-dev - 2.4.7-1.2ubuntu7.1 cups-bsd - 2.4.7-1.2ubuntu7.1 cups-common - 2.4.7-1.2ubuntu7.1 cups-core-drivers - 2.4.7-1.2ubuntu7.1 cups-server-common - 2.4.7-1.2ubuntu7.1 cups-client - 2.4.7-1.2ubuntu7.1 libcupsimage2t64 - 2.4.7-1.2ubuntu7.1 libcupsimage2-dev - 2.4.7-1.2ubuntu7.1 cups-ipp-utils - 2.4.7-1.2ubuntu7.1 cups-ppdc - 2.4.7-1.2ubuntu7.1 cups - 2.4.7-1.2ubuntu7.1 libcups2t64 - 2.4.7-1.2ubuntu7.1 cups-daemon - 2.4.7-1.2ubuntu7.1 No subscription required Medium CVE-2024-35235 USN-6844-2 -- CUPS regression Ubuntu 24.04 LTS USN-6844-1 fixed vulnerabilities in the CUPS package. The update lead to the discovery of a regression in CUPS with regards to how the cupsd daemon handles Listen configuration directive. This update fixes the problem. We apologize for the inconvenience. Original advisory details: Rory McNamara discovered that when starting the cupsd server with a Listen configuration item, the cupsd process fails to validate if bind call passed. An attacker could possibly trick cupsd to perform an arbitrary chmod of the provided argument, providing world-writable access to the target. Update Instructions: Run `sudo pro fix USN-6844-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libcups2-dev - 2.4.7-1.2ubuntu7.2 cups-bsd - 2.4.7-1.2ubuntu7.2 cups-common - 2.4.7-1.2ubuntu7.2 cups-core-drivers - 2.4.7-1.2ubuntu7.2 cups-server-common - 2.4.7-1.2ubuntu7.2 cups-client - 2.4.7-1.2ubuntu7.2 libcupsimage2t64 - 2.4.7-1.2ubuntu7.2 libcupsimage2-dev - 2.4.7-1.2ubuntu7.2 cups-ipp-utils - 2.4.7-1.2ubuntu7.2 cups-ppdc - 2.4.7-1.2ubuntu7.2 cups - 2.4.7-1.2ubuntu7.2 libcups2t64 - 2.4.7-1.2ubuntu7.2 cups-daemon - 2.4.7-1.2ubuntu7.2 No subscription required None https://launchpad.net/bugs/2070315 USN-6851-1 -- Netplan vulnerabilities Ubuntu 24.04 LTS Andreas Hasenack discovered that netplan incorrectly handled the permissions for netdev files containing wireguard configuration. An attacker could use this to obtain wireguard secret keys. It was discovered that netplan configuration could be manipulated into injecting arbitrary commands while setting up network interfaces. An attacker could use this to execute arbitrary commands or escalate privileges. Update Instructions: Run `sudo pro fix USN-6851-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: netplan.io - 1.0-2ubuntu1.1 netplan-generator - 1.0-2ubuntu1.1 libnetplan1 - 1.0-2ubuntu1.1 python3-netplan - 1.0-2ubuntu1.1 libnetplan-dev - 1.0-2ubuntu1.1 No subscription required Medium CVE-2022-4968 https://launchpad.net/bugs/2066258 https://launchpad.net/bugs/1987842 https://launchpad.net/bugs/2065738 USN-6851-2 -- Netplan regression Ubuntu 24.04 LTS USN-6851-1 fixed vulnerabilities in Netplan. The update lead to the discovery of a regression in netplan which caused systemctl enable to fail on systems where systemd is not running. This update fixes the problem. We apologize for the inconvenience. Original advisory details: Andreas Hasenack discovered that netplan incorrectly handled the permissions for netdev files containing wireguard configuration. An attacker could use this to obtain wireguard secret keys. It was discovered that netplan configuration could be manipulated into injecting arbitrary commands while setting up network interfaces. An attacker could use this to execute arbitrary commands or escalate privileges. Update Instructions: Run `sudo pro fix USN-6851-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: netplan.io - 1.0-2ubuntu1.2 netplan-generator - 1.0-2ubuntu1.2 libnetplan1 - 1.0-2ubuntu1.2 python3-netplan - 1.0-2ubuntu1.2 libnetplan-dev - 1.0-2ubuntu1.2 No subscription required None https://launchpad.net/bugs/2071333 USN-6852-1 -- Wget vulnerability Ubuntu 24.04 LTS It was discovered that Wget incorrectly handled semicolons in the userinfo subcomponent of a URI. A remote attacker could possibly trick a user into connecting to a different host than expected. Update Instructions: Run `sudo pro fix USN-6852-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: wget - 1.21.4-1ubuntu4.1 No subscription required Medium CVE-2024-38428 USN-6855-1 -- libcdio vulnerability Ubuntu 24.04 LTS Mansour Gashasbi discovered that libcdio incorrectly handled certain memory operations when parsing an ISO file, leading to a buffer overflow vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6855-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libiso9660-dev - 2.1.0-4.1ubuntu1.2 libiso9660-11t64 - 2.1.0-4.1ubuntu1.2 libcdio-utils - 2.1.0-4.1ubuntu1.2 libcdio19t64 - 2.1.0-4.1ubuntu1.2 libiso9660++0t64 - 2.1.0-4.1ubuntu1.2 libudf-dev - 2.1.0-4.1ubuntu1.2 libcdio++1t64 - 2.1.0-4.1ubuntu1.2 libiso9660++-dev - 2.1.0-4.1ubuntu1.2 libudf0t64 - 2.1.0-4.1ubuntu1.2 libcdio++-dev - 2.1.0-4.1ubuntu1.2 libcdio-dev - 2.1.0-4.1ubuntu1.2 No subscription required Medium CVE-2024-36600 USN-6859-1 -- OpenSSH vulnerability Ubuntu 24.04 LTS It was discovered that OpenSSH incorrectly handled signal management. A remote attacker could use this issue to bypass authentication and remotely access systems without proper credentials. Update Instructions: Run `sudo pro fix USN-6859-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openssh-client - 1:9.6p1-3ubuntu13.3 openssh-server - 1:9.6p1-3ubuntu13.3 ssh-askpass-gnome - 1:9.6p1-3ubuntu13.3 ssh - 1:9.6p1-3ubuntu13.3 openssh-tests - 1:9.6p1-3ubuntu13.3 openssh-sftp-server - 1:9.6p1-3ubuntu13.3 No subscription required High CVE-2024-6387 USN-6860-1 -- OpenVPN vulnerabilities Ubuntu 24.04 LTS Reynir Björnsson discovered that OpenVPN incorrectly handled terminating client connections. A remote authenticated client could possibly use this issue to keep the connection active, bypassing certain security policies. This issue only affected Ubuntu 23.10, and Ubuntu 24.04 LTS. (CVE-2024-28882) Reynir Björnsson discovered that OpenVPN incorrectly handled certain control channel messages with nonprintable characters. A remote attacker could possibly use this issue to cause OpenVPN to consume resources, or fill up log files with garbage, leading to a denial of service. (CVE-2024-5594) Update Instructions: Run `sudo pro fix USN-6860-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openvpn - 2.6.9-1ubuntu4.1 No subscription required Medium CVE-2024-28882 CVE-2024-5594 USN-6863-1 -- Linux kernel vulnerability Ubuntu 24.04 LTS A security issue was discovered in the Linux kernel. An attacker could possibly use it to compromise the system. This update corrects flaws in the following subsystem: - Netfilter; (CVE-2024-26924) Update Instructions: Run `sudo pro fix USN-6863-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-headers-6.8.0-1006-raspi - 6.8.0-1006.6 linux-raspi-tools-6.8.0-1006 - 6.8.0-1006.6 linux-buildinfo-6.8.0-1006-raspi - 6.8.0-1006.6 linux-tools-raspi - 6.8.0-1006.6 linux-tools-6.8.0-1006-raspi - 6.8.0-1006.6 linux-image-6.8.0-1006-raspi - 6.8.0-1006.6 linux-headers-raspi - 6.8.0-1006.6 linux-modules-6.8.0-1006-raspi - 6.8.0-1006.6 linux-raspi-headers-6.8.0-1006 - 6.8.0-1006.6 linux-raspi - 6.8.0-1006.6 linux-image-raspi - 6.8.0-1006.6 No subscription required linux-image-ibm-lts-24.04 - 6.8.0-1007.7 linux-ibm-tools-6.8.0-1007 - 6.8.0-1007.7 linux-ibm-source-6.8.0 - 6.8.0-1007.7 linux-modules-6.8.0-1007-ibm - 6.8.0-1007.7 linux-headers-6.8.0-1007-ibm - 6.8.0-1007.7 linux-tools-6.8.0-1007-ibm - 6.8.0-1007.7 linux-image-unsigned-6.8.0-1007-ibm - 6.8.0-1007.7 linux-tools-ibm-lts-24.04 - 6.8.0-1007.7 linux-image-6.8.0-1007-ibm - 6.8.0-1007.7 linux-modules-extra-6.8.0-1007-ibm - 6.8.0-1007.7 linux-image-ibm - 6.8.0-1007.7 linux-image-ibm-classic - 6.8.0-1007.7 linux-headers-ibm-lts-24.04 - 6.8.0-1007.7 linux-tools-ibm-classic - 6.8.0-1007.7 linux-tools-ibm - 6.8.0-1007.7 linux-ibm-lts-24.04 - 6.8.0-1007.7 linux-ibm-classic - 6.8.0-1007.7 linux-modules-iwlwifi-ibm - 6.8.0-1007.7 linux-modules-iwlwifi-6.8.0-1007-ibm - 6.8.0-1007.7 linux-ibm-headers-6.8.0-1007 - 6.8.0-1007.7 linux-headers-ibm-classic - 6.8.0-1007.7 linux-ibm - 6.8.0-1007.7 linux-ibm-cloud-tools-common - 6.8.0-1007.7 linux-buildinfo-6.8.0-1007-ibm - 6.8.0-1007.7 linux-headers-ibm - 6.8.0-1007.7 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1007.7 linux-modules-iwlwifi-ibm-classic - 6.8.0-1007.7 No subscription required linux-modules-extra-6.8.0-1008-nvidia - 6.8.0-1008.8 linux-image-uc-6.8.0-1008-nvidia-64k - 6.8.0-1008.8 linux-headers-6.8.0-1008-nvidia-64k - 6.8.0-1008.8 linux-tools-6.8.0-1008-nvidia - 6.8.0-1008.8 linux-image-nvidia-64k - 6.8.0-1008.8 linux-nvidia-tools-6.8.0-1008 - 6.8.0-1008.8 linux-tools-nvidia - 6.8.0-1008.8 linux-headers-6.8.0-1008-nvidia - 6.8.0-1008.8 linux-nvidia-64k - 6.8.0-1008.8 linux-cloud-tools-nvidia - 6.8.0-1008.8 linux-modules-nvidia-fs-nvidia - 6.8.0-1008.8 linux-buildinfo-6.8.0-1008-nvidia-64k - 6.8.0-1008.8 linux-modules-nvidia-fs-6.8.0-1008-nvidia-64k - 6.8.0-1008.8 linux-tools-6.8.0-1008-nvidia-64k - 6.8.0-1008.8 linux-tools-nvidia-64k - 6.8.0-1008.8 linux-nvidia-headers-6.8.0-1008 - 6.8.0-1008.8 linux-image-nvidia - 6.8.0-1008.8 linux-modules-6.8.0-1008-nvidia - 6.8.0-1008.8 linux-buildinfo-6.8.0-1008-nvidia - 6.8.0-1008.8 linux-modules-nvidia-fs-6.8.0-1008-nvidia - 6.8.0-1008.8 linux-image-6.8.0-1008-nvidia-64k - 6.8.0-1008.8 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1008.8 linux-nvidia - 6.8.0-1008.8 linux-nvidia-tools-host - 6.8.0-1008.8 linux-modules-6.8.0-1008-nvidia-64k - 6.8.0-1008.8 linux-image-unsigned-6.8.0-1008-nvidia - 6.8.0-1008.8 linux-image-uc-6.8.0-1008-nvidia - 6.8.0-1008.8 linux-headers-nvidia - 6.8.0-1008.8 linux-headers-nvidia-64k - 6.8.0-1008.8 linux-image-6.8.0-1008-nvidia - 6.8.0-1008.8 linux-image-unsigned-6.8.0-1008-nvidia-64k - 6.8.0-1008.8 No subscription required linux-generic-hwe-24.04 - 6.8.0-36.36 linux-tools-common - 6.8.0-36.36 linux-modules-6.8.0-36-generic-64k - 6.8.0-36.36 linux-image-unsigned-6.8.0-36-generic-64k - 6.8.0-36.36 linux-headers-oem-20.04 - 6.8.0-36.36 linux-cloud-tools-virtual - 6.8.0-36.36 linux-tools-generic-hwe-24.04-edge - 6.8.0-36.36 linux-headers-generic-lpae - 6.8.0-36.36 linux-modules-iwlwifi-6.8.0-36-generic - 6.8.0-36.36 linux-image-6.8.0-36-generic - 6.8.0-36.36 linux-modules-6.8.0-36-generic - 6.8.0-36.36 linux-headers-laptop-23.10 - 6.8.0-36.36 linux-kvm - 6.8.0-36.36 linux-virtual-hwe-24.04 - 6.8.0-36.36 linux-tools-generic-64k - 6.8.0-36.36 linux-image-virtual - 6.8.0-36.36 linux-tools-oem-20.04b - 6.8.0-36.36 linux-doc - 6.8.0-36.36 linux-image-generic-64k - 6.8.0-36.36 linux-modules-usbio-generic - 6.8.0-36.36 linux-image-generic - 6.8.0-36.36 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-36.36 linux-image-oem-20.04d - 6.8.0-36.36 linux-headers-virtual-hwe-24.04 - 6.8.0-36.36 linux-tools-oem-20.04d - 6.8.0-36.36 linux-headers-virtual-hwe-24.04-edge - 6.8.0-36.36 linux-tools-virtual-hwe-24.04-edge - 6.8.0-36.36 linux-cloud-tools-virtual-hwe-24.04-edge - 6.8.0-36.36 linux-image-virtual-hwe-24.04 - 6.8.0-36.36 linux-modules-ipu6-generic-hwe-24.04-edge - 6.8.0-36.36 linux-tools-oem-20.04 - 6.8.0-36.36 linux-tools-oem-20.04c - 6.8.0-36.36 linux-image-unsigned-6.8.0-36-generic - 6.8.0-36.36 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-36.36 linux-headers-generic-64k-hwe-24.04-edge - 6.8.0-36.36 linux-headers-6.8.0-36-generic - 6.8.0-36.36 linux-crashdump - 6.8.0-36.36 linux-image-extra-virtual-hwe-24.04 - 6.8.0-36.36 linux-modules-iwlwifi-oem-20.04d - 6.8.0-36.36 linux-modules-iwlwifi-generic - 6.8.0-36.36 linux-modules-extra-6.8.0-36-generic - 6.8.0-36.36 linux-image-extra-virtual-hwe-24.04-edge - 6.8.0-36.36 linux-oem-22.04 - 6.8.0-36.36 linux-cloud-tools-6.8.0-36-generic - 6.8.0-36.36 linux-image-virtual-hwe-24.04-edge - 6.8.0-36.36 linux-headers-kvm - 6.8.0-36.36 linux-tools-generic-lpae - 6.8.0-36.36 linux-cloud-tools-generic - 6.8.0-36.36 linux-virtual - 6.8.0-36.36 linux-tools-oem-22.04 - 6.8.0-36.36 linux-laptop-23.10 - 6.8.0-36.36 linux-tools-virtual - 6.8.0-36.36 linux-tools-generic - 6.8.0-36.36 linux-tools-6.8.0-36-generic-64k - 6.8.0-36.36 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-36.36 linux-image-generic-64k-hwe-24.04-edge - 6.8.0-36.36 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-36.36 linux-modules-usbio-6.8.0-36-generic - 6.8.0-36.36 linux-image-uc-generic-hwe-24.04-edge - 6.8.0-36.36 linux-image-oem-20.04c - 6.8.0-36.36 linux-image-oem-20.04b - 6.8.0-36.36 linux-generic-lpae - 6.8.0-36.36 linux-tools-host - 6.8.0-36.36 linux-image-uc-6.8.0-36-generic-64k - 6.8.0-36.36 linux-headers-generic-64k - 6.8.0-36.36 linux-headers-generic-64k-hwe-24.04 - 6.8.0-36.36 linux-oem-20.04 - 6.8.0-36.36 linux-generic - 6.8.0-36.36 linux-image-oem-20.04 - 6.8.0-36.36 linux-oem-20.04d - 6.8.0-36.36 linux-headers-generic-hwe-24.04 - 6.8.0-36.36 linux-oem-20.04c - 6.8.0-36.36 linux-image-oem-22.04 - 6.8.0-36.36 linux-image-uc-generic - 6.8.0-36.36 linux-generic-64k-hwe-24.04-edge - 6.8.0-36.36 linux-lib-rust-6.8.0-36-generic - 6.8.0-36.36 linux-image-generic-hwe-24.04 - 6.8.0-36.36 linux-headers-6.8.0-36 - 6.8.0-36.36 linux-modules-ipu6-6.8.0-36-generic - 6.8.0-36.36 linux-virtual-hwe-24.04-edge - 6.8.0-36.36 linux-cloud-tools-common - 6.8.0-36.36 linux-image-generic-lpae - 6.8.0-36.36 linux-image-6.8.0-36-generic-64k - 6.8.0-36.36 linux-oem-20.04b - 6.8.0-36.36 linux-source - 6.8.0-36.36 linux-image-extra-virtual - 6.8.0-36.36 linux-tools-6.8.0-36-generic - 6.8.0-36.36 linux-tools-generic-64k-hwe-24.04-edge - 6.8.0-36.36 linux-modules-ipu6-generic - 6.8.0-36.36 linux-tools-virtual-hwe-24.04 - 6.8.0-36.36 linux-image-laptop-23.10 - 6.8.0-36.36 linux-libc-dev - 6.8.0-36.36 linux-tools-6.8.0-36 - 6.8.0-36.36 linux-image-generic-hwe-24.04-edge - 6.8.0-36.36 linux-modules-usbio-generic-hwe-24.04-edge - 6.8.0-36.36 linux-image-generic-64k-hwe-24.04 - 6.8.0-36.36 linux-image-uc-generic-hwe-24.04 - 6.8.0-36.36 linux-cloud-tools-generic-hwe-24.04-edge - 6.8.0-36.36 linux-buildinfo-6.8.0-36-generic - 6.8.0-36.36 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-36.36 linux-modules-iwlwifi-oem-20.04 - 6.8.0-36.36 linux-modules-iwlwifi-oem-22.04 - 6.8.0-36.36 linux-headers-generic-hwe-24.04-edge - 6.8.0-36.36 linux-buildinfo-6.8.0-36-generic-64k - 6.8.0-36.36 linux-headers-generic - 6.8.0-36.36 linux-cloud-tools-6.8.0-36 - 6.8.0-36.36 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.8.0-36.36 linux-headers-6.8.0-36-generic-64k - 6.8.0-36.36 linux-tools-laptop-23.10 - 6.8.0-36.36 linux-tools-generic-hwe-24.04 - 6.8.0-36.36 linux-headers-virtual - 6.8.0-36.36 linux-image-kvm - 6.8.0-36.36 linux-source-6.8.0 - 6.8.0-36.36 linux-headers-oem-22.04 - 6.8.0-36.36 linux-generic-hwe-24.04-edge - 6.8.0-36.36 linux-tools-generic-64k-hwe-24.04 - 6.8.0-36.36 linux-tools-kvm - 6.8.0-36.36 linux-headers-oem-20.04b - 6.8.0-36.36 linux-headers-oem-20.04c - 6.8.0-36.36 linux-image-uc-6.8.0-36-generic - 6.8.0-36.36 linux-headers-oem-20.04d - 6.8.0-36.36 linux-generic-64k - 6.8.0-36.36 linux-generic-64k-hwe-24.04 - 6.8.0-36.36 No subscription required linux-headers-6.8.0-36-lowlatency - 6.8.0-36.36.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-36.36.1 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.8.0-36.36.1 linux-modules-iwlwifi-6.8.0-36-lowlatency - 6.8.0-36.36.1 linux-headers-lowlatency-64k - 6.8.0-36.36.1 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.8.0-36.36.1 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.8.0-36.36.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-36.36.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-36.36.1 linux-lowlatency-tools-common - 6.8.0-36.36.1 linux-lowlatency-cloud-tools-common - 6.8.0-36.36.1 linux-tools-lowlatency - 6.8.0-36.36.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-36.36.1 linux-lowlatency-tools-host - 6.8.0-36.36.1 linux-modules-6.8.0-36-lowlatency - 6.8.0-36.36.1 linux-lowlatency-64k - 6.8.0-36.36.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-36.36.1 linux-tools-lowlatency-hwe-22.04-edge - 6.8.0-36.36.1 linux-image-lowlatency-hwe-22.04-edge - 6.8.0-36.36.1 linux-lowlatency-lib-rust-6.8.0-36-lowlatency - 6.8.0-36.36.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-36.36.1 linux-headers-lowlatency-hwe-22.04-edge - 6.8.0-36.36.1 linux-image-lowlatency-64k - 6.8.0-36.36.1 linux-buildinfo-6.8.0-36-lowlatency - 6.8.0-36.36.1 linux-lowlatency-headers-6.8.0-36 - 6.8.0-36.36.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-36.36.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-36.36.1 linux-lowlatency - 6.8.0-36.36.1 linux-headers-lowlatency-hwe-22.04 - 6.8.0-36.36.1 linux-lowlatency-hwe-22.04-edge - 6.8.0-36.36.1 linux-image-lowlatency-64k-hwe-22.04-edge - 6.8.0-36.36.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-36.36.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-36.36.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-36.36.1 linux-image-unsigned-6.8.0-36-lowlatency - 6.8.0-36.36.1 linux-tools-6.8.0-36-lowlatency-64k - 6.8.0-36.36.1 linux-tools-lowlatency-64k - 6.8.0-36.36.1 linux-tools-6.8.0-36-lowlatency - 6.8.0-36.36.1 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.8.0-36.36.1 linux-cloud-tools-6.8.0-36-lowlatency - 6.8.0-36.36.1 linux-image-6.8.0-36-lowlatency - 6.8.0-36.36.1 linux-tools-lowlatency-64k-hwe-22.04 - 6.8.0-36.36.1 linux-headers-lowlatency - 6.8.0-36.36.1 linux-modules-iwlwifi-lowlatency - 6.8.0-36.36.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-36.36.1 linux-headers-lowlatency-64k-hwe-22.04 - 6.8.0-36.36.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-36.36.1 linux-headers-6.8.0-36-lowlatency-64k - 6.8.0-36.36.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-36.36.1 linux-tools-lowlatency-hwe-22.04 - 6.8.0-36.36.1 linux-cloud-tools-lowlatency - 6.8.0-36.36.1 linux-lowlatency-64k-hwe-22.04-edge - 6.8.0-36.36.1 linux-image-unsigned-6.8.0-36-lowlatency-64k - 6.8.0-36.36.1 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.8.0-36.36.1 linux-cloud-tools-lowlatency-hwe-22.04 - 6.8.0-36.36.1 linux-image-lowlatency-hwe-22.04 - 6.8.0-36.36.1 linux-lowlatency-hwe-20.04 - 6.8.0-36.36.1 linux-lowlatency-tools-6.8.0-36 - 6.8.0-36.36.1 linux-buildinfo-6.8.0-36-lowlatency-64k - 6.8.0-36.36.1 linux-modules-6.8.0-36-lowlatency-64k - 6.8.0-36.36.1 linux-lowlatency-cloud-tools-6.8.0-36 - 6.8.0-36.36.1 linux-image-6.8.0-36-lowlatency-64k - 6.8.0-36.36.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-36.36.1 linux-lowlatency-hwe-22.04 - 6.8.0-36.36.1 linux-lowlatency-64k-hwe-22.04 - 6.8.0-36.36.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-36.36.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-36.36.1 linux-image-lowlatency-64k-hwe-22.04 - 6.8.0-36.36.1 linux-image-lowlatency - 6.8.0-36.36.1 No subscription required High CVE-2024-26924 USN-6864-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS It was discovered that the Intel Data Streaming and Intel Analytics Accelerator drivers in the Linux kernel allowed direct access to the devices for unprivileged users and virtual machines. A local attacker could use this to cause a denial of service. (CVE-2024-21823) A security issue was discovered in the Linux kernel. An attacker could possibly use it to compromise the system. This update corrects flaws in the following subsystem: - Netfilter; (CVE-2024-26924) Update Instructions: Run `sudo pro fix USN-6864-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-modules-iwlwifi-intel - 6.8.0-1006.13 linux-modules-6.8.0-1006-intel - 6.8.0-1006.13 linux-headers-6.8.0-1006-intel - 6.8.0-1006.13 linux-headers-intel - 6.8.0-1006.13 linux-intel - 6.8.0-1006.13 linux-intel-cloud-tools-6.8.0-1006 - 6.8.0-1006.13 linux-tools-intel - 6.8.0-1006.13 linux-intel-headers-6.8.0-1006 - 6.8.0-1006.13 linux-image-intel - 6.8.0-1006.13 linux-modules-extra-6.8.0-1006-intel - 6.8.0-1006.13 linux-modules-extra-intel - 6.8.0-1006.13 linux-buildinfo-6.8.0-1006-intel - 6.8.0-1006.13 linux-cloud-tools-6.8.0-1006-intel - 6.8.0-1006.13 linux-image-unsigned-6.8.0-1006-intel - 6.8.0-1006.13 linux-intel-tools-6.8.0-1006 - 6.8.0-1006.13 linux-tools-6.8.0-1006-intel - 6.8.0-1006.13 linux-modules-iwlwifi-6.8.0-1006-intel - 6.8.0-1006.13 linux-image-6.8.0-1006-intel - 6.8.0-1006.13 No subscription required linux-gcp-headers-6.8.0-1009 - 6.8.0-1009.10 linux-tools-6.8.0-1009-gcp - 6.8.0-1009.10 linux-tools-gcp - 6.8.0-1009.10 linux-gcp-tools-6.8.0-1009 - 6.8.0-1009.10 linux-modules-6.8.0-1009-gcp - 6.8.0-1009.10 linux-gcp - 6.8.0-1009.10 linux-image-unsigned-6.8.0-1009-gcp - 6.8.0-1009.10 linux-modules-extra-6.8.0-1009-gcp - 6.8.0-1009.10 linux-modules-iwlwifi-gcp - 6.8.0-1009.10 linux-buildinfo-6.8.0-1009-gcp - 6.8.0-1009.10 linux-image-6.8.0-1009-gcp - 6.8.0-1009.10 linux-headers-gcp - 6.8.0-1009.10 linux-modules-iwlwifi-6.8.0-1009-gcp - 6.8.0-1009.10 linux-headers-6.8.0-1009-gcp - 6.8.0-1009.10 linux-image-gcp - 6.8.0-1009.10 linux-modules-extra-gcp - 6.8.0-1009.10 No subscription required High CVE-2024-21823 CVE-2024-26924 USN-6864-2 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS It was discovered that the Intel Data Streaming and Intel Analytics Accelerator drivers in the Linux kernel allowed direct access to the devices for unprivileged users and virtual machines. A local attacker could use this to cause a denial of service. (CVE-2024-21823) A security issue was discovered in the Linux kernel. An attacker could possibly use it to compromise the system. This update corrects flaws in the following subsystem: - Netfilter; (CVE-2024-26924) Update Instructions: Run `sudo pro fix USN-6864-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-modules-iwlwifi-oem-24.04a - 6.8.0-1007.7 linux-headers-6.8.0-1007-oem - 6.8.0-1007.7 linux-modules-usbio-6.8.0-1007-oem - 6.8.0-1007.7 linux-modules-ipu6-6.8.0-1007-oem - 6.8.0-1007.7 linux-image-oem-24.04 - 6.8.0-1007.7 linux-image-6.8.0-1007-oem - 6.8.0-1007.7 linux-image-uc-oem-24.04a - 6.8.0-1007.7 linux-tools-oem-24.04 - 6.8.0-1007.7 linux-oem-6.8-headers-6.8.0-1007 - 6.8.0-1007.7 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1007.7 linux-image-uc-oem-24.04 - 6.8.0-1007.7 linux-image-oem-24.04a - 6.8.0-1007.7 linux-modules-usbio-oem-24.04 - 6.8.0-1007.7 linux-modules-ipu6-oem-24.04a - 6.8.0-1007.7 linux-headers-oem-24.04a - 6.8.0-1007.7 linux-modules-iwlwifi-6.8.0-1007-oem - 6.8.0-1007.7 linux-oem-6.8-tools-6.8.0-1007 - 6.8.0-1007.7 linux-modules-usbio-oem-24.04a - 6.8.0-1007.7 linux-tools-oem-24.04a - 6.8.0-1007.7 linux-image-unsigned-6.8.0-1007-oem - 6.8.0-1007.7 linux-modules-6.8.0-1007-oem - 6.8.0-1007.7 linux-buildinfo-6.8.0-1007-oem - 6.8.0-1007.7 linux-oem-24.04a - 6.8.0-1007.7 linux-image-uc-6.8.0-1007-oem - 6.8.0-1007.7 linux-modules-ipu6-oem-24.04 - 6.8.0-1007.7 linux-tools-6.8.0-1007-oem - 6.8.0-1007.7 linux-oem-24.04 - 6.8.0-1007.7 linux-headers-oem-24.04 - 6.8.0-1007.7 No subscription required linux-modules-extra-aws - 6.8.0-1010.10 linux-tools-aws - 6.8.0-1010.10 linux-tools-6.8.0-1010-aws - 6.8.0-1010.10 linux-modules-6.8.0-1010-aws - 6.8.0-1010.10 linux-modules-extra-6.8.0-1010-aws - 6.8.0-1010.10 linux-aws-headers-6.8.0-1010 - 6.8.0-1010.10 linux-headers-6.8.0-1010-aws - 6.8.0-1010.10 linux-aws-tools-6.8.0-1010 - 6.8.0-1010.10 linux-aws-cloud-tools-6.8.0-1010 - 6.8.0-1010.10 linux-buildinfo-6.8.0-1010-aws - 6.8.0-1010.10 linux-image-6.8.0-1010-aws - 6.8.0-1010.10 linux-headers-aws - 6.8.0-1010.10 linux-image-aws - 6.8.0-1010.10 linux-aws - 6.8.0-1010.10 linux-cloud-tools-6.8.0-1010-aws - 6.8.0-1010.10 linux-image-unsigned-6.8.0-1010-aws - 6.8.0-1010.10 No subscription required High CVE-2024-21823 CVE-2024-26924 USN-6864-3 -- Linux kernel (GKE) vulnerabilities Ubuntu 24.04 LTS It was discovered that the Intel Data Streaming and Intel Analytics Accelerator drivers in the Linux kernel allowed direct access to the devices for unprivileged users and virtual machines. A local attacker could use this to cause a denial of service. (CVE-2024-21823) A security issue was discovered in the Linux kernel. An attacker could possibly use it to compromise the system. This update corrects flaws in the following subsystem: - Netfilter; (CVE-2024-26924) Update Instructions: Run `sudo pro fix USN-6864-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1005-gke - 6.8.0-1005.8 linux-gke - 6.8.0-1005.8 linux-gke-headers-6.8.0-1005 - 6.8.0-1005.8 linux-gke-tools-6.8.0-1005 - 6.8.0-1005.8 linux-headers-6.8.0-1005-gke - 6.8.0-1005.8 linux-headers-gke - 6.8.0-1005.8 linux-image-6.8.0-1005-gke - 6.8.0-1005.8 linux-image-gke - 6.8.0-1005.8 linux-image-unsigned-6.8.0-1005-gke - 6.8.0-1005.8 linux-modules-6.8.0-1005-gke - 6.8.0-1005.8 linux-modules-extra-6.8.0-1005-gke - 6.8.0-1005.8 linux-modules-iwlwifi-6.8.0-1005-gke - 6.8.0-1005.8 linux-modules-iwlwifi-gke - 6.8.0-1005.8 linux-tools-6.8.0-1005-gke - 6.8.0-1005.8 linux-tools-gke - 6.8.0-1005.8 No subscription required High CVE-2024-21823 CVE-2024-26924 USN-6875-1 -- Linux kernel (Azure) vulnerabilities Ubuntu 24.04 LTS It was discovered that the Intel Data Streaming and Intel Analytics Accelerator drivers in the Linux kernel allowed direct access to the devices for unprivileged users and virtual machines. A local attacker could use this to cause a denial of service. (CVE-2024-21823) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Microsoft Azure Network Adapter (MANA) driver; - Netfilter; (CVE-2024-35901, CVE-2024-26924) Update Instructions: Run `sudo pro fix USN-6875-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-image-azure-fde - 6.8.0-1009.9 linux-azure-tools-6.8.0-1009 - 6.8.0-1009.9 linux-azure - 6.8.0-1009.9 linux-azure-headers-6.8.0-1009 - 6.8.0-1009.9 linux-modules-6.8.0-1009-azure - 6.8.0-1009.9 linux-image-azure - 6.8.0-1009.9 linux-azure-cloud-tools-6.8.0-1009 - 6.8.0-1009.9 linux-cloud-tools-azure - 6.8.0-1009.9 linux-tools-azure - 6.8.0-1009.9 linux-headers-6.8.0-1009-azure - 6.8.0-1009.9 linux-modules-iwlwifi-azure - 6.8.0-1009.9 linux-cloud-tools-6.8.0-1009-azure - 6.8.0-1009.9 linux-buildinfo-6.8.0-1009-azure - 6.8.0-1009.9 linux-modules-extra-azure - 6.8.0-1009.9 linux-tools-6.8.0-1009-azure - 6.8.0-1009.9 linux-image-6.8.0-1009-azure-fde - 6.8.0-1009.9 linux-image-unsigned-6.8.0-1009-azure - 6.8.0-1009.9 linux-azure-fde - 6.8.0-1009.9 linux-image-6.8.0-1009-azure - 6.8.0-1009.9 linux-modules-iwlwifi-6.8.0-1009-azure - 6.8.0-1009.9 linux-headers-azure - 6.8.0-1009.9 linux-modules-extra-6.8.0-1009-azure - 6.8.0-1009.9 No subscription required High CVE-2024-21823 CVE-2024-26924 CVE-2024-35901 USN-6877-1 -- LibreOffice vulnerability Ubuntu 24.04 LTS It was discovered that LibreOffice incorrectly performed TLS certificate verification when the LibreOfficeKit library is being used by third-party components. A remote attacker could possibly use this issue to obtain sensitive information. Update Instructions: Run `sudo pro fix USN-6877-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libreoffice-nlpsolver - 4:0.9+LibO24.2.4-0ubuntu0.24.04.2 No subscription required libreoffice-wiki-publisher - 4:1.2.0+LibO24.2.4-0ubuntu0.24.04.2 No subscription required fonts-opensymbol - 4:102.12+LibO24.2.4-0ubuntu0.24.04.2 No subscription required libreoffice-evolution - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-en-gb - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-librelogo - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ml - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-zh-cn - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-subsequentcheckbase - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-mk - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-id - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-mr - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-style-tango - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-pt-br - 4:24.2.4-0ubuntu0.24.04.2 libreofficekit-data - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-core - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-it - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-uk - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-fr - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-gnome - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-fi - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-nl - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-uiconfig-math - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-uz - 4:24.2.4-0ubuntu0.24.04.2 libreoffice - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-sdbc-mysql - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-nb - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-mn - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ne - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-nl - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-uiconfig-writer - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-nn - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-fi - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-dz - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-nr - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-fr - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-report-builder-bin - 4:24.2.4-0ubuntu0.24.04.2 libofficebean-java - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-qt6 - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-vi - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-nso - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-qt5 - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-nogui - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-math-nogui - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-style-karasa-jaga - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ve - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-gu - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-om - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-gl - 4:24.2.4-0ubuntu0.24.04.2 python3-access2base - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-en-us - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ga - 4:24.2.4-0ubuntu0.24.04.2 libuno-cppu3t64 - 4:24.2.4-0ubuntu0.24.04.2 liblibreofficekitgtk - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-gd - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-km - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-kn - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-ko - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-st - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-dev-common - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-sr - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-cs - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ts - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-sv - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-script-provider-bsh - 4:24.2.4-0ubuntu0.24.04.2 gir1.2-lokdocview-0.1 - 4:24.2.4-0ubuntu0.24.04.2 ure-java - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-report-builder-bin-nogui - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ka - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-uiconfig-common - 4:24.2.4-0ubuntu0.24.04.2 libridl-java - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-ca - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-zh-tw - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-sl - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-sk - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-style-breeze - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-si - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-da - 4:24.2.4-0ubuntu0.24.04.2 libreofficekit-dev - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-de - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-common - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-pl - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-pa-in - 4:24.2.4-0ubuntu0.24.04.2 libuno-purpenvhelpergcc3-3t64 - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-uiconfig-report-builder - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-pt - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-base-nogui - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-gtk3 - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-math - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-vi - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-gtk4 - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-tr - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-hi - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-gug - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-sdbc-hsqldb - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-draw-nogui - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-calc - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-base-drivers - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-style-colibre - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ta - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-sdbc-firebird - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-tg - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-te - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-th - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-id - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-lv - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-hu - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-lt - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ss - 4:24.2.4-0ubuntu0.24.04.2 libunoloader-java - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-uiconfig-impress - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-eu - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-et - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-script-provider-js - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-es - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-el - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-eo - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-style-sifr - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-zh-cn - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ug - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-smoketest-data - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ko - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-zu - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-impress - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-java-common - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-eu - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-et - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-es - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-km - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-uiconfig-draw - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-el - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-uiconfig-calc - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-kk - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-dev-gui - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-be - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-szl - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-bg - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-tn - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-bn - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-plasma - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-ja - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-br - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-bs - 4:24.2.4-0ubuntu0.24.04.2 liblibreoffice-java - 4:24.2.4-0ubuntu0.24.04.2 libunoil-java - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-style-yaru - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-base-core - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-ru - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ru - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-rw - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-is - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-style-elementary - 4:24.2.4-0ubuntu0.24.04.2 python3-uno - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-fa - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-am - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ro - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-en-za - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-style-sukapura - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ca - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-sl - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-calc-nogui - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-sk - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-sv - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-cs - 4:24.2.4-0ubuntu0.24.04.2 python3-scriptforge - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-dev-doc - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-common - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-za - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-cy - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-oc - 4:24.2.4-0ubuntu0.24.04.2 libjurt-java - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-base - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-gl - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-om - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-or - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-pt-br - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-kmr - 4:24.2.4-0ubuntu0.24.04.2 uno-libs-private - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ast - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-hu - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-hr - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-script-provider-python - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-writer-nogui - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-hy - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-he - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-officebean - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-dev - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-report-builder - 4:24.2.4-0ubuntu0.24.04.2 libuno-sal3t64 - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-tr - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-hi - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-kf5 - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-dz - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-pt - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ja - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-pl - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-sdbc-postgresql - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-writer - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-de - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-da - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-uiconfig-base - 4:24.2.4-0ubuntu0.24.04.2 ure - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-impress-nogui - 4:24.2.4-0ubuntu0.24.04.2 libjuh-java - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-it - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-xh - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-af - 4:24.2.4-0ubuntu0.24.04.2 libuno-cppuhelpergcc3-3t64 - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-help-zh-tw - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-en-gb - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-draw - 4:24.2.4-0ubuntu0.24.04.2 libuno-salhelpergcc3-3t64 - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-core-nogui - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-as - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-ar - 4:24.2.4-0ubuntu0.24.04.2 libreoffice-l10n-in - 4:24.2.4-0ubuntu0.24.04.2 No subscription required Medium CVE-2024-5261 USN-6878-1 -- Linux kernel (Oracle) vulnerabilities Ubuntu 24.04 LTS Ziming Zhang discovered that the DRM driver for VMware Virtual GPU did not properly handle certain error conditions, leading to a NULL pointer dereference. A local attacker could possibly trigger this vulnerability to cause a denial of service. (CVE-2022-38096) Zheng Wang discovered that the Broadcom FullMAC WLAN driver in the Linux kernel contained a race condition during device removal, leading to a use- after-free vulnerability. A physically proximate attacker could possibly use this to cause a denial of service (system crash). (CVE-2023-47233) It was discovered that the ATA over Ethernet (AoE) driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2023-6270) It was discovered that the Atheros 802.11ac wireless driver did not properly validate certain data structures, leading to a NULL pointer dereference. An attacker could possibly use this to cause a denial of service. (CVE-2023-7042) It was discovered that the Intel Data Streaming and Intel Analytics Accelerator drivers in the Linux kernel allowed direct access to the devices for unprivileged users and virtual machines. A local attacker could use this to cause a denial of service. (CVE-2024-21823) Gui-Dong Han discovered that the software RAID driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. A privileged attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-23307) Bai Jiaju discovered that the Xceive XC4000 silicon tuner device driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-24861) Chenyuan Yang discovered that the Unsorted Block Images (UBI) flash device volume management subsystem did not properly validate logical eraseblock sizes in certain situations. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-25739) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - PowerPC architecture; - x86 architecture; - Block layer subsystem; - ACPI drivers; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Cryptographic API; - DPLL subsystem; - ARM SCMI message protocol; - EFI core; - GPU drivers; - InfiniBand drivers; - IOMMU subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - MMC subsystem; - Network drivers; - NTB driver; - NVME drivers; - PCI subsystem; - Powercap sysfs driver; - SCSI drivers; - Freescale SoC drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - TTY drivers; - USB subsystem; - DesignWare USB3 driver; - VFIO drivers; - Backlight driver; - Virtio drivers; - Xen hypervisor drivers; - File systems infrastructure; - BTRFS file system; - debug file system; - Ext4 file system; - F2FS file system; - FAT file system; - Network file system client; - NILFS2 file system; - Overlay file system; - Pstore file system; - Diskquota system; - SMB network file system; - UBI file system; - io_uring subsystem; - BPF subsystem; - Core kernel; - PCI iomap interfaces; - Memory management; - Bluetooth subsystem; - Networking core; - HSR network protocol; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - IEEE 802.15.4 subsystem; - Netfilter; - Packet sockets; - Network traffic control; - Sun RPC protocol; - ALSA SH drivers; - SOF drivers; - USB sound devices; - KVM core; (CVE-2024-27032, CVE-2024-26868, CVE-2024-26879, CVE-2024-27033, CVE-2024-26943, CVE-2024-27040, CVE-2024-26950, CVE-2023-52650, CVE-2023-52649, CVE-2023-52644, CVE-2024-26899, CVE-2024-27432, CVE-2024-35806, CVE-2024-26871, CVE-2024-35845, CVE-2024-35799, CVE-2024-26945, CVE-2024-35805, CVE-2024-27041, CVE-2024-26860, CVE-2024-26930, CVE-2024-26941, CVE-2024-26960, CVE-2024-27034, CVE-2024-26891, CVE-2024-35793, CVE-2024-26963, CVE-2024-27029, CVE-2024-26890, CVE-2024-27074, CVE-2024-27079, CVE-2024-27053, CVE-2024-27070, CVE-2024-35821, CVE-2024-27067, CVE-2024-27051, CVE-2024-27026, CVE-2024-26961, CVE-2024-27050, CVE-2024-26939, CVE-2024-26897, CVE-2024-26878, CVE-2024-27433, CVE-2024-26885, CVE-2024-35810, CVE-2024-35829, CVE-2024-26965, CVE-2024-26875, CVE-2024-26966, CVE-2024-27078, CVE-2024-35874, CVE-2023-52661, CVE-2024-35794, CVE-2024-35787, CVE-2024-26874, CVE-2024-27054, CVE-2024-26940, CVE-2024-26859, CVE-2024-27044, CVE-2024-26948, CVE-2024-26882, CVE-2023-52653, CVE-2024-27071, CVE-2024-27065, CVE-2024-26877, CVE-2024-26929, CVE-2024-27064, CVE-2024-35803, CVE-2024-27066, CVE-2024-27028, CVE-2024-27072, CVE-2024-26876, CVE-2024-27039, CVE-2024-27435, CVE-2024-27434, CVE-2024-26812, CVE-2024-27030, CVE-2024-26816, CVE-2024-26873, CVE-2024-35808, CVE-2024-27389, CVE-2024-27075, CVE-2024-27038, CVE-2024-35828, CVE-2024-26946, CVE-2024-26655, CVE-2023-52662, CVE-2024-27077, CVE-2024-27076, CVE-2024-35795, CVE-2024-26933, CVE-2024-35789, CVE-2024-26972, CVE-2023-52663, CVE-2024-27031, CVE-2024-27069, CVE-2024-26813, CVE-2023-52659, CVE-2024-26862, CVE-2024-26962, CVE-2024-26654, CVE-2024-26815, CVE-2024-26978, CVE-2024-26976, CVE-2024-26893, CVE-2024-35809, CVE-2024-27027, CVE-2024-26864, CVE-2024-27048, CVE-2024-27046, CVE-2024-26869, CVE-2024-35827, CVE-2024-26951, CVE-2024-26942, CVE-2024-26870, CVE-2024-27437, CVE-2024-26931, CVE-2024-27036, CVE-2022-48669, CVE-2024-26898, CVE-2024-26970, CVE-2024-26886, CVE-2024-26944, CVE-2024-26865, CVE-2024-26896, CVE-2024-26895, CVE-2024-26947, CVE-2024-26880, CVE-2024-35811, CVE-2024-26975, CVE-2024-27391, CVE-2024-35796, CVE-2024-27043, CVE-2024-26949, CVE-2024-26653, CVE-2024-35814, CVE-2024-26964, CVE-2023-52652, CVE-2024-27047, CVE-2024-35830, CVE-2024-26900, CVE-2024-26810, CVE-2024-26956, CVE-2024-35817, CVE-2024-26887, CVE-2024-26809, CVE-2024-27045, CVE-2024-26656, CVE-2024-26971, CVE-2024-26866, CVE-2024-26861, CVE-2024-26968, CVE-2024-26881, CVE-2024-27063, CVE-2024-35807, CVE-2024-35797, CVE-2024-35822, CVE-2024-35813, CVE-2024-27073, CVE-2024-26954, CVE-2024-26888, CVE-2024-26955, CVE-2024-26894, CVE-2024-35844, CVE-2024-26958, CVE-2024-26952, CVE-2024-35798, CVE-2024-26969, CVE-2024-26967, CVE-2024-35800, CVE-2024-35819, CVE-2024-26937, CVE-2024-26927, CVE-2024-26883, CVE-2024-26934, CVE-2024-27392, CVE-2024-27068, CVE-2024-26889, CVE-2024-26892, CVE-2024-27390, CVE-2024-26657, CVE-2024-27388, CVE-2024-27049, CVE-2024-26935, CVE-2024-35831, CVE-2024-26884, CVE-2024-26938, CVE-2024-27037, CVE-2024-26977, CVE-2024-26953, CVE-2024-26973, CVE-2024-26932, CVE-2024-26901, CVE-2024-35843, CVE-2024-26872, CVE-2024-26959, CVE-2024-27035, CVE-2024-35826, CVE-2024-27436, CVE-2024-26651, CVE-2024-26957, CVE-2024-26863, CVE-2024-27042, CVE-2024-26814, CVE-2023-52647, CVE-2024-27080, CVE-2024-27052, CVE-2024-27058, CVE-2024-35801, CVE-2023-52648) Update Instructions: Run `sudo pro fix USN-6878-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-modules-extra-6.8.0-1006-oracle - 6.8.0-1006.6 linux-headers-oracle - 6.8.0-1006.6 linux-modules-6.8.0-1006-oracle-64k - 6.8.0-1006.6 linux-image-oracle - 6.8.0-1006.6 linux-tools-6.8.0-1006-oracle - 6.8.0-1006.6 linux-image-oracle-64k - 6.8.0-1006.6 linux-image-unsigned-6.8.0-1006-oracle - 6.8.0-1006.6 linux-tools-oracle-64k - 6.8.0-1006.6 linux-modules-6.8.0-1006-oracle - 6.8.0-1006.6 linux-oracle-headers-6.8.0-1006 - 6.8.0-1006.6 linux-image-6.8.0-1006-oracle - 6.8.0-1006.6 linux-oracle-64k - 6.8.0-1006.6 linux-tools-6.8.0-1006-oracle-64k - 6.8.0-1006.6 linux-modules-iwlwifi-6.8.0-1006-oracle - 6.8.0-1006.6 linux-tools-oracle - 6.8.0-1006.6 linux-headers-6.8.0-1006-oracle - 6.8.0-1006.6 linux-headers-oracle-64k - 6.8.0-1006.6 linux-buildinfo-6.8.0-1006-oracle-64k - 6.8.0-1006.6 linux-headers-6.8.0-1006-oracle-64k - 6.8.0-1006.6 linux-oracle-tools-6.8.0-1006 - 6.8.0-1006.6 linux-image-6.8.0-1006-oracle-64k - 6.8.0-1006.6 linux-image-unsigned-6.8.0-1006-oracle-64k - 6.8.0-1006.6 linux-oracle - 6.8.0-1006.6 linux-modules-extra-6.8.0-1006-oracle-64k - 6.8.0-1006.6 linux-modules-iwlwifi-oracle - 6.8.0-1006.6 linux-buildinfo-6.8.0-1006-oracle - 6.8.0-1006.6 No subscription required High CVE-2022-38096 CVE-2022-48669 CVE-2023-47233 CVE-2023-52644 CVE-2023-52647 CVE-2023-52648 CVE-2023-52649 CVE-2023-52650 CVE-2023-52652 CVE-2023-52653 CVE-2023-52659 CVE-2023-52661 CVE-2023-52662 CVE-2023-52663 CVE-2023-6270 CVE-2023-7042 CVE-2024-21823 CVE-2024-23307 CVE-2024-24861 CVE-2024-25739 CVE-2024-26651 CVE-2024-26653 CVE-2024-26654 CVE-2024-26655 CVE-2024-26656 CVE-2024-26657 CVE-2024-26809 CVE-2024-26810 CVE-2024-26812 CVE-2024-26813 CVE-2024-26814 CVE-2024-26815 CVE-2024-26816 CVE-2024-26859 CVE-2024-26860 CVE-2024-26861 CVE-2024-26862 CVE-2024-26863 CVE-2024-26864 CVE-2024-26865 CVE-2024-26866 CVE-2024-26868 CVE-2024-26869 CVE-2024-26870 CVE-2024-26871 CVE-2024-26872 CVE-2024-26873 CVE-2024-26874 CVE-2024-26875 CVE-2024-26876 CVE-2024-26877 CVE-2024-26878 CVE-2024-26879 CVE-2024-26880 CVE-2024-26881 CVE-2024-26882 CVE-2024-26883 CVE-2024-26884 CVE-2024-26885 CVE-2024-26886 CVE-2024-26887 CVE-2024-26888 CVE-2024-26889 CVE-2024-26890 CVE-2024-26891 CVE-2024-26892 CVE-2024-26893 CVE-2024-26894 CVE-2024-26895 CVE-2024-26896 CVE-2024-26897 CVE-2024-26898 CVE-2024-26899 CVE-2024-26900 CVE-2024-26901 CVE-2024-26927 CVE-2024-26929 CVE-2024-26930 CVE-2024-26931 CVE-2024-26932 CVE-2024-26933 CVE-2024-26934 CVE-2024-26935 CVE-2024-26937 CVE-2024-26938 CVE-2024-26939 CVE-2024-26940 CVE-2024-26941 CVE-2024-26942 CVE-2024-26943 CVE-2024-26944 CVE-2024-26945 CVE-2024-26946 CVE-2024-26947 CVE-2024-26948 CVE-2024-26949 CVE-2024-26950 CVE-2024-26951 CVE-2024-26952 CVE-2024-26953 CVE-2024-26954 CVE-2024-26955 CVE-2024-26956 CVE-2024-26957 CVE-2024-26958 CVE-2024-26959 CVE-2024-26960 CVE-2024-26961 CVE-2024-26962 CVE-2024-26963 CVE-2024-26964 CVE-2024-26965 CVE-2024-26966 CVE-2024-26967 CVE-2024-26968 CVE-2024-26969 CVE-2024-26970 CVE-2024-26971 CVE-2024-26972 CVE-2024-26973 CVE-2024-26975 CVE-2024-26976 CVE-2024-26977 CVE-2024-26978 CVE-2024-27026 CVE-2024-27027 CVE-2024-27028 CVE-2024-27029 CVE-2024-27030 CVE-2024-27031 CVE-2024-27032 CVE-2024-27033 CVE-2024-27034 CVE-2024-27035 CVE-2024-27036 CVE-2024-27037 CVE-2024-27038 CVE-2024-27039 CVE-2024-27040 CVE-2024-27041 CVE-2024-27042 CVE-2024-27043 CVE-2024-27044 CVE-2024-27045 CVE-2024-27046 CVE-2024-27047 CVE-2024-27048 CVE-2024-27049 CVE-2024-27050 CVE-2024-27051 CVE-2024-27052 CVE-2024-27053 CVE-2024-27054 CVE-2024-27058 CVE-2024-27063 CVE-2024-27064 CVE-2024-27065 CVE-2024-27066 CVE-2024-27067 CVE-2024-27068 CVE-2024-27069 CVE-2024-27070 CVE-2024-27071 CVE-2024-27072 CVE-2024-27073 CVE-2024-27074 CVE-2024-27075 CVE-2024-27076 CVE-2024-27077 CVE-2024-27078 CVE-2024-27079 CVE-2024-27080 CVE-2024-27388 CVE-2024-27389 CVE-2024-27390 CVE-2024-27391 CVE-2024-27392 CVE-2024-27432 CVE-2024-27433 CVE-2024-27434 CVE-2024-27435 CVE-2024-27436 CVE-2024-27437 CVE-2024-35787 CVE-2024-35789 CVE-2024-35793 CVE-2024-35794 CVE-2024-35795 CVE-2024-35796 CVE-2024-35797 CVE-2024-35798 CVE-2024-35799 CVE-2024-35800 CVE-2024-35801 CVE-2024-35803 CVE-2024-35805 CVE-2024-35806 CVE-2024-35807 CVE-2024-35808 CVE-2024-35809 CVE-2024-35810 CVE-2024-35811 CVE-2024-35813 CVE-2024-35814 CVE-2024-35817 CVE-2024-35819 CVE-2024-35821 CVE-2024-35822 CVE-2024-35826 CVE-2024-35827 CVE-2024-35828 CVE-2024-35829 CVE-2024-35830 CVE-2024-35831 CVE-2024-35843 CVE-2024-35844 CVE-2024-35845 CVE-2024-35874 USN-6879-1 -- Virtuoso Open-Source Edition vulnerabilities Ubuntu 24.04 LTS Jingzhou Fu discovered that Virtuoso Open-Source Edition incorrectly handled certain crafted SQL statements. An attacker could possibly use this issue to crash the program, resulting in a denial of service. (CVE-2023-31620, CVE-2023-31622, CVE-2023-31624, CVE-2023-31626, CVE-2023-31627, CVE-2023-31629, CVE-2023-31630, CVE-2023-31631, CVE-2023-48951) Jingzhou Fu discovered that Virtuoso Open-Source Edition incorrectly handled certain crafted SQL statements. An attacker could possibly use this issue to crash the program, resulting in a denial of service. This issue only affects Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2023-48945, CVE-2023-48946, CVE-2023-48947, CVE-2023-48950) Update Instructions: Run `sudo pro fix USN-6879-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libvirtodbc0 - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 libvirtuoso5.5-cil - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-minimal - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-opensource - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-opensource-7 - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-opensource-7-bin - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-opensource-7-common - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-server - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-bpel - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-conductor - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-demo - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-doc - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-isparql - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-ods - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-rdfmappers - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-sparqldemo - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-syncml - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vad-tutorial - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 virtuoso-vsp-startpage - 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2023-31620 CVE-2023-31622 CVE-2023-31624 CVE-2023-31626 CVE-2023-31627 CVE-2023-31629 CVE-2023-31630 CVE-2023-31631 CVE-2023-48945 CVE-2023-48946 CVE-2023-48947 CVE-2023-48950 CVE-2023-48951 USN-6882-1 -- Cinder vulnerability Ubuntu 24.04 LTS Martin Kaesberger discovered that Cinder incorrectly handled QCOW2 image processing. An authenticated user could use this issue to access arbitrary files on the server, possibly exposing sensitive information. Update Instructions: Run `sudo pro fix USN-6882-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: cinder-api - 2:24.0.0-0ubuntu1.2 cinder-backup - 2:24.0.0-0ubuntu1.2 cinder-common - 2:24.0.0-0ubuntu1.2 cinder-scheduler - 2:24.0.0-0ubuntu1.2 cinder-volume - 2:24.0.0-0ubuntu1.2 python3-cinder - 2:24.0.0-0ubuntu1.2 No subscription required Medium CVE-2024-32498 USN-6883-1 -- OpenStack Glance vulnerability Ubuntu 24.04 LTS Martin Kaesberger discovered that Glance incorrectly handled QCOW2 image processing. An authenticated user could use this issue to access arbitrary files on the server, possibly exposing sensitive information. Update Instructions: Run `sudo pro fix USN-6883-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: glance - 2:28.0.1-0ubuntu1.2 glance-api - 2:28.0.1-0ubuntu1.2 glance-common - 2:28.0.1-0ubuntu1.2 python-glance-doc - 2:28.0.1-0ubuntu1.2 python3-glance - 2:28.0.1-0ubuntu1.2 No subscription required Medium CVE-2024-32498 USN-6884-1 -- Nova vulnerability Ubuntu 24.04 LTS Martin Kaesberger discovered that Nova incorrectly handled QCOW2 image processing. An authenticated user could use this issue to access arbitrary files on the server, possibly exposing sensitive information. Update Instructions: Run `sudo pro fix USN-6884-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: nova-ajax-console-proxy - 3:29.0.1-0ubuntu1.3 nova-api - 3:29.0.1-0ubuntu1.3 nova-api-metadata - 3:29.0.1-0ubuntu1.3 nova-api-os-compute - 3:29.0.1-0ubuntu1.3 nova-api-os-volume - 3:29.0.1-0ubuntu1.3 nova-cells - 3:29.0.1-0ubuntu1.3 nova-common - 3:29.0.1-0ubuntu1.3 nova-compute - 3:29.0.1-0ubuntu1.3 nova-compute-ironic - 3:29.0.1-0ubuntu1.3 nova-compute-kvm - 3:29.0.1-0ubuntu1.3 nova-compute-libvirt - 3:29.0.1-0ubuntu1.3 nova-compute-lxc - 3:29.0.1-0ubuntu1.3 nova-compute-qemu - 3:29.0.1-0ubuntu1.3 nova-compute-vmware - 3:29.0.1-0ubuntu1.3 nova-compute-xen - 3:29.0.1-0ubuntu1.3 nova-conductor - 3:29.0.1-0ubuntu1.3 nova-doc - 3:29.0.1-0ubuntu1.3 nova-novncproxy - 3:29.0.1-0ubuntu1.3 nova-scheduler - 3:29.0.1-0ubuntu1.3 nova-serialproxy - 3:29.0.1-0ubuntu1.3 nova-spiceproxy - 3:29.0.1-0ubuntu1.3 nova-volume - 3:29.0.1-0ubuntu1.3 python3-nova - 3:29.0.1-0ubuntu1.3 No subscription required Medium CVE-2024-32498 USN-6885-1 -- Apache HTTP Server vulnerabilities Ubuntu 24.04 LTS Marc Stern discovered that the Apache HTTP Server incorrectly handled serving WebSocket protocol upgrades over HTTP/2 connections. A remote attacker could possibly use this issue to cause the server to crash, resulting in a denial of service. (CVE-2024-36387) Orange Tsai discovered that the Apache HTTP Server mod_proxy module incorrectly sent certain request URLs with incorrect encodings to backends. A remote attacker could possibly use this issue to bypass authentication. (CVE-2024-38473) Orange Tsai discovered that the Apache HTTP Server mod_rewrite module incorrectly handled certain substitutions. A remote attacker could possibly use this issue to execute scripts in directories not directly reachable by any URL, or cause a denial of service. Some environments may require using the new UnsafeAllow3F flag to handle unsafe substitutions. (CVE-2024-38474, CVE-2024-38475, CVE-2024-39573) Orange Tsai discovered that the Apache HTTP Server incorrectly handled certain response headers. A remote attacker could possibly use this issue to obtain sensitive information, execute local scripts, or perform SSRF attacks. (CVE-2024-38476) Orange Tsai discovered that the Apache HTTP Server mod_proxy module incorrectly handled certain requests. A remote attacker could possibly use this issue to cause the server to crash, resulting in a denial of service. (CVE-2024-38477) It was discovered that the Apache HTTP Server incorrectly handled certain handlers configured via AddType. A remote attacker could possibly use this issue to obtain source code. (CVE-2024-39884) Update Instructions: Run `sudo pro fix USN-6885-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: apache2 - 2.4.58-1ubuntu8.2 apache2-bin - 2.4.58-1ubuntu8.2 apache2-data - 2.4.58-1ubuntu8.2 apache2-dev - 2.4.58-1ubuntu8.2 apache2-doc - 2.4.58-1ubuntu8.2 apache2-ssl-dev - 2.4.58-1ubuntu8.2 apache2-suexec-custom - 2.4.58-1ubuntu8.2 apache2-suexec-pristine - 2.4.58-1ubuntu8.2 apache2-utils - 2.4.58-1ubuntu8.2 libapache2-mod-md - 2.4.58-1ubuntu8.2 libapache2-mod-proxy-uwsgi - 2.4.58-1ubuntu8.2 No subscription required Medium CVE-2024-36387 CVE-2024-38473 CVE-2024-38474 CVE-2024-38475 CVE-2024-38476 CVE-2024-38477 CVE-2024-39573 CVE-2024-39884 USN-6885-2 -- Apache HTTP Server regression Ubuntu 24.04 LTS USN-6885-1 fixed vulnerabilities in Apache HTTP Server. One of the security fixes introduced a regression when proxying requests to a HTTP/2 server. This update fixes the problem. We apologize for the inconvenience. Original advisory details: Marc Stern discovered that the Apache HTTP Server incorrectly handled serving WebSocket protocol upgrades over HTTP/2 connections. A remote attacker could possibly use this issue to cause the server to crash, resulting in a denial of service. (CVE-2024-36387) Orange Tsai discovered that the Apache HTTP Server mod_proxy module incorrectly sent certain request URLs with incorrect encodings to backends. A remote attacker could possibly use this issue to bypass authentication. (CVE-2024-38473) Orange Tsai discovered that the Apache HTTP Server mod_rewrite module incorrectly handled certain substitutions. A remote attacker could possibly use this issue to execute scripts in directories not directly reachable by any URL, or cause a denial of service. Some environments may require using the new UnsafeAllow3F flag to handle unsafe substitutions. (CVE-2024-38474, CVE-2024-38475, CVE-2024-39573) Orange Tsai discovered that the Apache HTTP Server incorrectly handled certain response headers. A remote attacker could possibly use this issue to obtain sensitive information, execute local scripts, or perform SSRF attacks. (CVE-2024-38476) Orange Tsai discovered that the Apache HTTP Server mod_proxy module incorrectly handled certain requests. A remote attacker could possibly use this issue to cause the server to crash, resulting in a denial of service. (CVE-2024-38477) It was discovered that the Apache HTTP Server incorrectly handled certain handlers configured via AddType. A remote attacker could possibly use this issue to obtain source code. (CVE-2024-39884) Update Instructions: Run `sudo pro fix USN-6885-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: apache2 - 2.4.58-1ubuntu8.3 apache2-bin - 2.4.58-1ubuntu8.3 apache2-data - 2.4.58-1ubuntu8.3 apache2-dev - 2.4.58-1ubuntu8.3 apache2-doc - 2.4.58-1ubuntu8.3 apache2-ssl-dev - 2.4.58-1ubuntu8.3 apache2-suexec-custom - 2.4.58-1ubuntu8.3 apache2-suexec-pristine - 2.4.58-1ubuntu8.3 apache2-utils - 2.4.58-1ubuntu8.3 libapache2-mod-md - 2.4.58-1ubuntu8.3 libapache2-mod-proxy-uwsgi - 2.4.58-1ubuntu8.3 No subscription required None https://launchpad.net/bugs/2072648 USN-6886-1 -- Go vulnerabilities Ubuntu 24.04 LTS It was discovered that the Go net/http module did not properly handle the requests when request\'s headers exceed MaxHeaderBytes. An attacker could possibly use this issue to cause a panic resulting into a denial of service. This issue only affected Go 1.21 in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-45288) It was discovered that the Go net/http module did not properly validate the subdomain match or exact match of the initial domain. An attacker could possibly use this issue to read sensitive information. This issue only affected Go 1.21 in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-45289) It was discovered that the Go net/http module did not properly validate the total size of the parsed form when parsing a multipart form. An attacker could possibly use this issue to cause a panic resulting into a denial of service. This issue only affected Go 1.21 in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-45290) It was discovered that the Go crypto/x509 module did not properly handle a certificate chain which contains a certificate with an unknown public key algorithm. An attacker could possibly use this issue to cause a panic resulting into a denial of service. This issue only affected Go 1.21 in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2024-24783) It was discovered that the Go net/mail module did not properly handle comments within display names in the ParseAddressList function. An attacker could possibly use this issue to cause a panic resulting into a denial of service. This issue only affected Go 1.21 in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2024-24784) It was discovered that the Go html/template module did not validate errors returned from MarshalJSON methods. An attacker could possibly use this issue to inject arbitrary code into the Go template. This issue only affected Go 1.21 in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2024-24785) It was discovered that the Go net module did not properly validate the DNS message in response to a query. An attacker could possibly use this issue to cause a panic resulting into a denial of service. This issue only affected Go 1.22. (CVE-2024-24788) It was discovered that the Go archive/zip module did not properly handle certain types of invalid zip files differs from the behavior of most zip implementations. An attacker could possibly use this issue to cause a panic resulting into a denial of service. (CVE-2024-24789) It was discovered that the Go net/netip module did not work as expected for IPv4-mapped IPv6 addresses in various Is methods. An attacker could possibly use this issue to cause a panic resulting into a denial of service. (CVE-2024-24790) Update Instructions: Run `sudo pro fix USN-6886-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: golang-1.21 - 1.21.9-1ubuntu0.1 golang-1.21-doc - 1.21.9-1ubuntu0.1 golang-1.21-go - 1.21.9-1ubuntu0.1 golang-1.21-src - 1.21.9-1ubuntu0.1 No subscription required golang-1.22 - 1.22.2-2ubuntu0.1 golang-1.22-doc - 1.22.2-2ubuntu0.1 golang-1.22-go - 1.22.2-2ubuntu0.1 golang-1.22-src - 1.22.2-2ubuntu0.1 No subscription required Medium CVE-2023-45288 CVE-2023-45289 CVE-2023-45290 CVE-2024-24783 CVE-2024-24784 CVE-2024-24785 CVE-2024-24788 CVE-2024-24789 CVE-2024-24790 USN-6887-1 -- OpenSSH vulnerability Ubuntu 24.04 LTS Philippos Giavridis, Jacky Wei En Kung, Daniel Hugenroth, and Alastair Beresford discovered that the OpenSSH ObscureKeystrokeTiming feature did not work as expected. A remote attacker could possibly use this issue to determine timing information about keystrokes. Update Instructions: Run `sudo pro fix USN-6887-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openssh-client - 1:9.6p1-3ubuntu13.4 openssh-server - 1:9.6p1-3ubuntu13.4 openssh-sftp-server - 1:9.6p1-3ubuntu13.4 openssh-tests - 1:9.6p1-3ubuntu13.4 ssh - 1:9.6p1-3ubuntu13.4 ssh-askpass-gnome - 1:9.6p1-3ubuntu13.4 No subscription required Medium CVE-2024-39894 USN-6888-1 -- Django vulnerabilities Ubuntu 24.04 LTS Elias Myllymäki discovered that Django incorrectly handled certain inputs with a large number of brackets. A remote attacker could possibly use this issue to cause Django to consume resources or stop responding, resulting in a denial of service. (CVE-2024-38875) It was discovered that Django incorrectly handled authenticating users with unusable passwords. A remote attacker could possibly use this issue to perform a timing attack and enumerate users. (CVE-2024-39329) Josh Schneier discovered that Django incorrectly handled file path validation when the storage class is being derived. A remote attacker could possibly use this issue to save files into arbitrary directories. (CVE-2024-39330) It was discovered that Django incorrectly handled certain long strings that included a specific set of characters. A remote attacker could possibly use this issue to cause Django to consume resources or stop responding, resulting in a denial of service. (CVE-2024-39614) Update Instructions: Run `sudo pro fix USN-6888-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-django-doc - 3:4.2.11-1ubuntu1.1 python3-django - 3:4.2.11-1ubuntu1.1 No subscription required Medium CVE-2024-38875 CVE-2024-39329 CVE-2024-39330 CVE-2024-39614 USN-6889-1 -- .NET vulnerabilities Ubuntu 24.04 LTS It was discovered that .NET did not properly handle object deserialization. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-30105) Radek Zikmund discovered that .NET did not properly manage memory. An attacker could use this issue to cause a denial of service or possibly execute arbitrary code. (CVE-2024-35264) It was discovered that .NET did not properly parse X.509 Content and ObjectIdentifiers. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-38095) Update Instructions: Run `sudo pro fix USN-6889-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: dotnet-sdk-8.0 - 8.0.107-0ubuntu1~24.04.1 dotnet-sdk-8.0-source-built-artifacts - 8.0.107-0ubuntu1~24.04.1 dotnet-sdk-dbg-8.0 - 8.0.107-0ubuntu1~24.04.1 dotnet-templates-8.0 - 8.0.107-0ubuntu1~24.04.1 netstandard-targeting-pack-2.1-8.0 - 8.0.107-0ubuntu1~24.04.1 No subscription required dotnet8 - 8.0.107-8.0.7-0ubuntu1~24.04.1 No subscription required aspnetcore-runtime-8.0 - 8.0.7-0ubuntu1~24.04.1 aspnetcore-runtime-dbg-8.0 - 8.0.7-0ubuntu1~24.04.1 aspnetcore-targeting-pack-8.0 - 8.0.7-0ubuntu1~24.04.1 dotnet-apphost-pack-8.0 - 8.0.7-0ubuntu1~24.04.1 dotnet-host-8.0 - 8.0.7-0ubuntu1~24.04.1 dotnet-hostfxr-8.0 - 8.0.7-0ubuntu1~24.04.1 dotnet-runtime-8.0 - 8.0.7-0ubuntu1~24.04.1 dotnet-runtime-dbg-8.0 - 8.0.7-0ubuntu1~24.04.1 dotnet-targeting-pack-8.0 - 8.0.7-0ubuntu1~24.04.1 No subscription required Medium CVE-2024-30105 CVE-2024-35264 CVE-2024-38095 USN-6893-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS It was discovered that a race condition existed in the Bluetooth subsystem in the Linux kernel when modifying certain settings values through debugfs. A privileged local attacker could use this to cause a denial of service. (CVE-2024-24857, CVE-2024-24858, CVE-2024-24859) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - RISC-V architecture; - S390 architecture; - x86 architecture; - Block layer subsystem; - Compute Acceleration Framework; - Accessibility subsystem; - Android drivers; - Drivers core; - Bluetooth drivers; - Clock framework and drivers; - Data acquisition framework and drivers; - Cryptographic API; - Buffer Sharing and Synchronization framework; - GPU drivers; - On-Chip Interconnect management framework; - IOMMU subsystem; - Multiple devices driver; - Media drivers; - VMware VMCI Driver; - Network drivers; - Microsoft Azure Network Adapter (MANA) driver; - Device tree and open firmware driver; - Chrome hardware platform drivers; - i.MX PM domains; - TI SCI PM domains driver; - S/390 drivers; - SCSI drivers; - SPI subsystem; - Thermal drivers; - TTY drivers; - USB subsystem; - Framebuffer layer; - BTRFS file system; - Network file system server daemon; - NILFS2 file system; - File systems infrastructure; - Pstore file system; - SMB network file system; - BPF subsystem; - Bluetooth subsystem; - Netfilter; - io_uring subsystem; - Core kernel; - Extra boot config (XBC); - Memory management; - Amateur Radio drivers; - B.A.T.M.A.N. meshing protocol; - Ethernet bridge; - Networking core; - IPv4 networking; - IPv6 networking; - Multipath TCP; - NFC subsystem; - RDS protocol; - Network traffic control; - SMC sockets; - Sun RPC protocol; - TLS protocol; - Unix domain sockets; - Wireless networking; - eXpress Data Path; - SELinux security module; (CVE-2024-35967, CVE-2024-35886, CVE-2024-26999, CVE-2024-27008, CVE-2024-26988, CVE-2024-35980, CVE-2024-26982, CVE-2024-35946, CVE-2024-35918, CVE-2024-27015, CVE-2024-35900, CVE-2024-35942, CVE-2024-35879, CVE-2024-35961, CVE-2024-35944, CVE-2024-35934, CVE-2024-35978, CVE-2024-35938, CVE-2024-27003, CVE-2024-35976, CVE-2024-36019, CVE-2024-35880, CVE-2024-35866, CVE-2024-35929, CVE-2024-35917, CVE-2024-35912, CVE-2024-35896, CVE-2024-26986, CVE-2024-35951, CVE-2024-35958, CVE-2024-26997, CVE-2024-35965, CVE-2024-35953, CVE-2024-26993, CVE-2024-26991, CVE-2024-35892, CVE-2024-36026, CVE-2024-35882, CVE-2024-35964, CVE-2024-35865, CVE-2024-35897, CVE-2024-26981, CVE-2024-35872, CVE-2024-36027, CVE-2024-26983, CVE-2024-35909, CVE-2024-35985, CVE-2024-35875, CVE-2024-35890, CVE-2024-26922, CVE-2024-26994, CVE-2024-35903, CVE-2024-35936, CVE-2024-35904, CVE-2024-27013, CVE-2024-36025, CVE-2024-26980, CVE-2024-27006, CVE-2024-35861, CVE-2024-35864, CVE-2024-27018, CVE-2024-36022, CVE-2024-26990, CVE-2024-35968, CVE-2024-35860, CVE-2024-36024, CVE-2024-35933, CVE-2024-27019, CVE-2024-35925, CVE-2024-35950, CVE-2024-35915, CVE-2024-35916, CVE-2024-35956, CVE-2024-36020, CVE-2024-35873, CVE-2024-27002, CVE-2024-35963, CVE-2024-35959, CVE-2024-35937, CVE-2024-27011, CVE-2024-27020, CVE-2024-35883, CVE-2024-35913, CVE-2024-35910, CVE-2024-27021, CVE-2024-35921, CVE-2024-35905, CVE-2024-27010, CVE-2024-35981, CVE-2024-35885, CVE-2024-35955, CVE-2024-35894, CVE-2024-35969, CVE-2024-36018, CVE-2024-35867, CVE-2024-27007, CVE-2024-35908, CVE-2024-26985, CVE-2024-27016, CVE-2024-35960, CVE-2024-35935, CVE-2024-35932, CVE-2024-35957, CVE-2024-27001, CVE-2024-35871, CVE-2024-35907, CVE-2024-35878, CVE-2024-35979, CVE-2024-35972, CVE-2024-35975, CVE-2024-35877, CVE-2024-35926, CVE-2024-26817, CVE-2024-35899, CVE-2024-27004, CVE-2024-35920, CVE-2024-35924, CVE-2024-35977, CVE-2024-35930, CVE-2024-35911, CVE-2024-26996, CVE-2024-27005, CVE-2024-35870, CVE-2024-35982, CVE-2024-35895, CVE-2024-35943, CVE-2024-35902, CVE-2024-35919, CVE-2024-35973, CVE-2024-35931, CVE-2024-35888, CVE-2024-35914, CVE-2024-35970, CVE-2024-36023, CVE-2024-27012, CVE-2024-35939, CVE-2024-26984, CVE-2024-35884, CVE-2024-35901, CVE-2024-26811, CVE-2024-35966, CVE-2024-35891, CVE-2024-35887, CVE-2024-35945, CVE-2024-35971, CVE-2024-35862, CVE-2024-26987, CVE-2024-26921, CVE-2024-26989, CVE-2024-35952, CVE-2024-27009, CVE-2024-35893, CVE-2024-26995, CVE-2024-26925, CVE-2024-35868, CVE-2024-35954, CVE-2024-35922, CVE-2024-27000, CVE-2024-36021, CVE-2024-27014, CVE-2024-35940, CVE-2024-26992, CVE-2024-26926, CVE-2024-35927, CVE-2024-35863, CVE-2024-27022, CVE-2024-26998, CVE-2024-27017, CVE-2024-26928, CVE-2024-35889, CVE-2024-35898, CVE-2024-35869, CVE-2024-26936, CVE-2024-26923, CVE-2023-52699, CVE-2024-35974) Update Instructions: Run `sudo pro fix USN-6893-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1007-intel - 6.8.0-1007.14 linux-cloud-tools-6.8.0-1007-intel - 6.8.0-1007.14 linux-headers-6.8.0-1007-intel - 6.8.0-1007.14 linux-headers-intel - 6.8.0-1007.14 linux-image-6.8.0-1007-intel - 6.8.0-1007.14 linux-image-intel - 6.8.0-1007.14 linux-image-unsigned-6.8.0-1007-intel - 6.8.0-1007.14 linux-intel - 6.8.0-1007.14 linux-intel-cloud-tools-6.8.0-1007 - 6.8.0-1007.14 linux-intel-headers-6.8.0-1007 - 6.8.0-1007.14 linux-intel-tools-6.8.0-1007 - 6.8.0-1007.14 linux-modules-6.8.0-1007-intel - 6.8.0-1007.14 linux-modules-extra-6.8.0-1007-intel - 6.8.0-1007.14 linux-modules-extra-intel - 6.8.0-1007.14 linux-modules-iwlwifi-6.8.0-1007-intel - 6.8.0-1007.14 linux-modules-iwlwifi-intel - 6.8.0-1007.14 linux-tools-6.8.0-1007-intel - 6.8.0-1007.14 linux-tools-intel - 6.8.0-1007.14 No subscription required linux-buildinfo-6.8.0-1007-raspi - 6.8.0-1007.7 linux-headers-6.8.0-1007-raspi - 6.8.0-1007.7 linux-headers-raspi - 6.8.0-1007.7 linux-image-6.8.0-1007-raspi - 6.8.0-1007.7 linux-image-raspi - 6.8.0-1007.7 linux-modules-6.8.0-1007-raspi - 6.8.0-1007.7 linux-raspi - 6.8.0-1007.7 linux-raspi-headers-6.8.0-1007 - 6.8.0-1007.7 linux-raspi-tools-6.8.0-1007 - 6.8.0-1007.7 linux-tools-6.8.0-1007-raspi - 6.8.0-1007.7 linux-tools-raspi - 6.8.0-1007.7 No subscription required linux-buildinfo-6.8.0-1008-ibm - 6.8.0-1008.8 linux-buildinfo-6.8.0-1008-oem - 6.8.0-1008.8 linux-headers-6.8.0-1008-ibm - 6.8.0-1008.8 linux-headers-6.8.0-1008-oem - 6.8.0-1008.8 linux-headers-ibm - 6.8.0-1008.8 linux-headers-ibm-classic - 6.8.0-1008.8 linux-headers-ibm-lts-24.04 - 6.8.0-1008.8 linux-headers-oem-24.04 - 6.8.0-1008.8 linux-headers-oem-24.04a - 6.8.0-1008.8 linux-ibm - 6.8.0-1008.8 linux-ibm-classic - 6.8.0-1008.8 linux-ibm-cloud-tools-common - 6.8.0-1008.8 linux-ibm-headers-6.8.0-1008 - 6.8.0-1008.8 linux-ibm-lts-24.04 - 6.8.0-1008.8 linux-ibm-source-6.8.0 - 6.8.0-1008.8 linux-ibm-tools-6.8.0-1008 - 6.8.0-1008.8 linux-image-6.8.0-1008-ibm - 6.8.0-1008.8 linux-image-6.8.0-1008-oem - 6.8.0-1008.8 linux-image-ibm - 6.8.0-1008.8 linux-image-ibm-classic - 6.8.0-1008.8 linux-image-ibm-lts-24.04 - 6.8.0-1008.8 linux-image-oem-24.04 - 6.8.0-1008.8 linux-image-oem-24.04a - 6.8.0-1008.8 linux-image-uc-6.8.0-1008-oem - 6.8.0-1008.8 linux-image-uc-oem-24.04 - 6.8.0-1008.8 linux-image-uc-oem-24.04a - 6.8.0-1008.8 linux-image-unsigned-6.8.0-1008-ibm - 6.8.0-1008.8 linux-image-unsigned-6.8.0-1008-oem - 6.8.0-1008.8 linux-modules-6.8.0-1008-ibm - 6.8.0-1008.8 linux-modules-6.8.0-1008-oem - 6.8.0-1008.8 linux-modules-extra-6.8.0-1008-ibm - 6.8.0-1008.8 linux-modules-ipu6-6.8.0-1008-oem - 6.8.0-1008.8 linux-modules-ipu6-oem-24.04 - 6.8.0-1008.8 linux-modules-ipu6-oem-24.04a - 6.8.0-1008.8 linux-modules-iwlwifi-6.8.0-1008-ibm - 6.8.0-1008.8 linux-modules-iwlwifi-6.8.0-1008-oem - 6.8.0-1008.8 linux-modules-iwlwifi-ibm - 6.8.0-1008.8 linux-modules-iwlwifi-ibm-classic - 6.8.0-1008.8 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1008.8 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1008.8 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1008.8 linux-modules-usbio-6.8.0-1008-oem - 6.8.0-1008.8 linux-modules-usbio-oem-24.04 - 6.8.0-1008.8 linux-modules-usbio-oem-24.04a - 6.8.0-1008.8 linux-oem-24.04 - 6.8.0-1008.8 linux-oem-24.04a - 6.8.0-1008.8 linux-oem-6.8-headers-6.8.0-1008 - 6.8.0-1008.8 linux-oem-6.8-tools-6.8.0-1008 - 6.8.0-1008.8 linux-tools-6.8.0-1008-ibm - 6.8.0-1008.8 linux-tools-6.8.0-1008-oem - 6.8.0-1008.8 linux-tools-ibm - 6.8.0-1008.8 linux-tools-ibm-classic - 6.8.0-1008.8 linux-tools-ibm-lts-24.04 - 6.8.0-1008.8 linux-tools-oem-24.04 - 6.8.0-1008.8 linux-tools-oem-24.04a - 6.8.0-1008.8 No subscription required linux-azure - 6.8.0-1010.10 linux-azure-cloud-tools-6.8.0-1010 - 6.8.0-1010.10 linux-azure-fde - 6.8.0-1010.10 linux-azure-headers-6.8.0-1010 - 6.8.0-1010.10 linux-azure-tools-6.8.0-1010 - 6.8.0-1010.10 linux-buildinfo-6.8.0-1010-azure - 6.8.0-1010.10 linux-cloud-tools-6.8.0-1010-azure - 6.8.0-1010.10 linux-cloud-tools-azure - 6.8.0-1010.10 linux-headers-6.8.0-1010-azure - 6.8.0-1010.10 linux-headers-azure - 6.8.0-1010.10 linux-image-6.8.0-1010-azure - 6.8.0-1010.10 linux-image-6.8.0-1010-azure-fde - 6.8.0-1010.10 linux-image-azure - 6.8.0-1010.10 linux-image-azure-fde - 6.8.0-1010.10 linux-image-unsigned-6.8.0-1010-azure - 6.8.0-1010.10 linux-modules-6.8.0-1010-azure - 6.8.0-1010.10 linux-modules-extra-6.8.0-1010-azure - 6.8.0-1010.10 linux-modules-extra-azure - 6.8.0-1010.10 linux-modules-iwlwifi-6.8.0-1010-azure - 6.8.0-1010.10 linux-modules-iwlwifi-azure - 6.8.0-1010.10 linux-tools-6.8.0-1010-azure - 6.8.0-1010.10 linux-tools-azure - 6.8.0-1010.10 No subscription required linux-buildinfo-6.8.0-1010-gcp - 6.8.0-1010.11 linux-gcp - 6.8.0-1010.11 linux-gcp-headers-6.8.0-1010 - 6.8.0-1010.11 linux-gcp-tools-6.8.0-1010 - 6.8.0-1010.11 linux-headers-6.8.0-1010-gcp - 6.8.0-1010.11 linux-headers-gcp - 6.8.0-1010.11 linux-image-6.8.0-1010-gcp - 6.8.0-1010.11 linux-image-gcp - 6.8.0-1010.11 linux-image-unsigned-6.8.0-1010-gcp - 6.8.0-1010.11 linux-modules-6.8.0-1010-gcp - 6.8.0-1010.11 linux-modules-extra-6.8.0-1010-gcp - 6.8.0-1010.11 linux-modules-extra-gcp - 6.8.0-1010.11 linux-modules-iwlwifi-6.8.0-1010-gcp - 6.8.0-1010.11 linux-modules-iwlwifi-gcp - 6.8.0-1010.11 linux-tools-6.8.0-1010-gcp - 6.8.0-1010.11 linux-tools-gcp - 6.8.0-1010.11 No subscription required linux-buildinfo-6.8.0-38-generic - 6.8.0-38.38 linux-buildinfo-6.8.0-38-generic-64k - 6.8.0-38.38 linux-cloud-tools-6.8.0-38 - 6.8.0-38.38 linux-cloud-tools-6.8.0-38-generic - 6.8.0-38.38 linux-cloud-tools-common - 6.8.0-38.38 linux-cloud-tools-generic - 6.8.0-38.38 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-38.38 linux-cloud-tools-generic-hwe-24.04-edge - 6.8.0-38.38 linux-cloud-tools-virtual - 6.8.0-38.38 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-38.38 linux-cloud-tools-virtual-hwe-24.04-edge - 6.8.0-38.38 linux-crashdump - 6.8.0-38.38 linux-doc - 6.8.0-38.38 linux-generic - 6.8.0-38.38 linux-generic-64k - 6.8.0-38.38 linux-generic-64k-hwe-24.04 - 6.8.0-38.38 linux-generic-64k-hwe-24.04-edge - 6.8.0-38.38 linux-generic-hwe-24.04 - 6.8.0-38.38 linux-generic-hwe-24.04-edge - 6.8.0-38.38 linux-generic-lpae - 6.8.0-38.38 linux-headers-6.8.0-38 - 6.8.0-38.38 linux-headers-6.8.0-38-generic - 6.8.0-38.38 linux-headers-6.8.0-38-generic-64k - 6.8.0-38.38 linux-headers-generic - 6.8.0-38.38 linux-headers-generic-64k - 6.8.0-38.38 linux-headers-generic-64k-hwe-24.04 - 6.8.0-38.38 linux-headers-generic-64k-hwe-24.04-edge - 6.8.0-38.38 linux-headers-generic-hwe-24.04 - 6.8.0-38.38 linux-headers-generic-hwe-24.04-edge - 6.8.0-38.38 linux-headers-generic-lpae - 6.8.0-38.38 linux-headers-kvm - 6.8.0-38.38 linux-headers-laptop-23.10 - 6.8.0-38.38 linux-headers-oem-20.04 - 6.8.0-38.38 linux-headers-oem-20.04b - 6.8.0-38.38 linux-headers-oem-20.04c - 6.8.0-38.38 linux-headers-oem-20.04d - 6.8.0-38.38 linux-headers-oem-22.04 - 6.8.0-38.38 linux-headers-virtual - 6.8.0-38.38 linux-headers-virtual-hwe-24.04 - 6.8.0-38.38 linux-headers-virtual-hwe-24.04-edge - 6.8.0-38.38 linux-image-6.8.0-38-generic - 6.8.0-38.38 linux-image-6.8.0-38-generic-64k - 6.8.0-38.38 linux-image-extra-virtual - 6.8.0-38.38 linux-image-extra-virtual-hwe-24.04 - 6.8.0-38.38 linux-image-extra-virtual-hwe-24.04-edge - 6.8.0-38.38 linux-image-generic - 6.8.0-38.38 linux-image-generic-64k - 6.8.0-38.38 linux-image-generic-64k-hwe-24.04 - 6.8.0-38.38 linux-image-generic-64k-hwe-24.04-edge - 6.8.0-38.38 linux-image-generic-hwe-24.04 - 6.8.0-38.38 linux-image-generic-hwe-24.04-edge - 6.8.0-38.38 linux-image-generic-lpae - 6.8.0-38.38 linux-image-kvm - 6.8.0-38.38 linux-image-laptop-23.10 - 6.8.0-38.38 linux-image-oem-20.04 - 6.8.0-38.38 linux-image-oem-20.04b - 6.8.0-38.38 linux-image-oem-20.04c - 6.8.0-38.38 linux-image-oem-20.04d - 6.8.0-38.38 linux-image-oem-22.04 - 6.8.0-38.38 linux-image-uc-6.8.0-38-generic - 6.8.0-38.38 linux-image-uc-6.8.0-38-generic-64k - 6.8.0-38.38 linux-image-uc-generic - 6.8.0-38.38 linux-image-uc-generic-hwe-24.04 - 6.8.0-38.38 linux-image-uc-generic-hwe-24.04-edge - 6.8.0-38.38 linux-image-unsigned-6.8.0-38-generic - 6.8.0-38.38 linux-image-unsigned-6.8.0-38-generic-64k - 6.8.0-38.38 linux-image-virtual - 6.8.0-38.38 linux-image-virtual-hwe-24.04 - 6.8.0-38.38 linux-image-virtual-hwe-24.04-edge - 6.8.0-38.38 linux-kvm - 6.8.0-38.38 linux-laptop-23.10 - 6.8.0-38.38 linux-lib-rust-6.8.0-38-generic - 6.8.0-38.38 linux-libc-dev - 6.8.0-38.38 linux-modules-6.8.0-38-generic - 6.8.0-38.38 linux-modules-6.8.0-38-generic-64k - 6.8.0-38.38 linux-modules-extra-6.8.0-38-generic - 6.8.0-38.38 linux-modules-ipu6-6.8.0-38-generic - 6.8.0-38.38 linux-modules-ipu6-generic - 6.8.0-38.38 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-38.38 linux-modules-ipu6-generic-hwe-24.04-edge - 6.8.0-38.38 linux-modules-iwlwifi-6.8.0-38-generic - 6.8.0-38.38 linux-modules-iwlwifi-generic - 6.8.0-38.38 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-38.38 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.8.0-38.38 linux-modules-iwlwifi-oem-20.04 - 6.8.0-38.38 linux-modules-iwlwifi-oem-20.04d - 6.8.0-38.38 linux-modules-iwlwifi-oem-22.04 - 6.8.0-38.38 linux-modules-usbio-6.8.0-38-generic - 6.8.0-38.38 linux-modules-usbio-generic - 6.8.0-38.38 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-38.38 linux-modules-usbio-generic-hwe-24.04-edge - 6.8.0-38.38 linux-oem-20.04 - 6.8.0-38.38 linux-oem-20.04b - 6.8.0-38.38 linux-oem-20.04c - 6.8.0-38.38 linux-oem-20.04d - 6.8.0-38.38 linux-oem-22.04 - 6.8.0-38.38 linux-source - 6.8.0-38.38 linux-source-6.8.0 - 6.8.0-38.38 linux-tools-6.8.0-38 - 6.8.0-38.38 linux-tools-6.8.0-38-generic - 6.8.0-38.38 linux-tools-6.8.0-38-generic-64k - 6.8.0-38.38 linux-tools-common - 6.8.0-38.38 linux-tools-generic - 6.8.0-38.38 linux-tools-generic-64k - 6.8.0-38.38 linux-tools-generic-64k-hwe-24.04 - 6.8.0-38.38 linux-tools-generic-64k-hwe-24.04-edge - 6.8.0-38.38 linux-tools-generic-hwe-24.04 - 6.8.0-38.38 linux-tools-generic-hwe-24.04-edge - 6.8.0-38.38 linux-tools-generic-lpae - 6.8.0-38.38 linux-tools-host - 6.8.0-38.38 linux-tools-kvm - 6.8.0-38.38 linux-tools-laptop-23.10 - 6.8.0-38.38 linux-tools-oem-20.04 - 6.8.0-38.38 linux-tools-oem-20.04b - 6.8.0-38.38 linux-tools-oem-20.04c - 6.8.0-38.38 linux-tools-oem-20.04d - 6.8.0-38.38 linux-tools-oem-22.04 - 6.8.0-38.38 linux-tools-virtual - 6.8.0-38.38 linux-tools-virtual-hwe-24.04 - 6.8.0-38.38 linux-tools-virtual-hwe-24.04-edge - 6.8.0-38.38 linux-virtual - 6.8.0-38.38 linux-virtual-hwe-24.04 - 6.8.0-38.38 linux-virtual-hwe-24.04-edge - 6.8.0-38.38 No subscription required linux-buildinfo-6.8.0-38-lowlatency - 6.8.0-38.38.1 linux-buildinfo-6.8.0-38-lowlatency-64k - 6.8.0-38.38.1 linux-cloud-tools-6.8.0-38-lowlatency - 6.8.0-38.38.1 linux-cloud-tools-lowlatency - 6.8.0-38.38.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-38.38.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-38.38.1 linux-cloud-tools-lowlatency-hwe-22.04 - 6.8.0-38.38.1 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.8.0-38.38.1 linux-headers-6.8.0-38-lowlatency - 6.8.0-38.38.1 linux-headers-6.8.0-38-lowlatency-64k - 6.8.0-38.38.1 linux-headers-lowlatency - 6.8.0-38.38.1 linux-headers-lowlatency-64k - 6.8.0-38.38.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-38.38.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-38.38.1 linux-headers-lowlatency-64k-hwe-22.04 - 6.8.0-38.38.1 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.8.0-38.38.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-38.38.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-38.38.1 linux-headers-lowlatency-hwe-22.04 - 6.8.0-38.38.1 linux-headers-lowlatency-hwe-22.04-edge - 6.8.0-38.38.1 linux-image-6.8.0-38-lowlatency - 6.8.0-38.38.1 linux-image-6.8.0-38-lowlatency-64k - 6.8.0-38.38.1 linux-image-lowlatency - 6.8.0-38.38.1 linux-image-lowlatency-64k - 6.8.0-38.38.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-38.38.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-38.38.1 linux-image-lowlatency-64k-hwe-22.04 - 6.8.0-38.38.1 linux-image-lowlatency-64k-hwe-22.04-edge - 6.8.0-38.38.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-38.38.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-38.38.1 linux-image-lowlatency-hwe-22.04 - 6.8.0-38.38.1 linux-image-lowlatency-hwe-22.04-edge - 6.8.0-38.38.1 linux-image-unsigned-6.8.0-38-lowlatency - 6.8.0-38.38.1 linux-image-unsigned-6.8.0-38-lowlatency-64k - 6.8.0-38.38.1 linux-lowlatency - 6.8.0-38.38.1 linux-lowlatency-64k - 6.8.0-38.38.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-38.38.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-38.38.1 linux-lowlatency-64k-hwe-22.04 - 6.8.0-38.38.1 linux-lowlatency-64k-hwe-22.04-edge - 6.8.0-38.38.1 linux-lowlatency-cloud-tools-6.8.0-38 - 6.8.0-38.38.1 linux-lowlatency-cloud-tools-common - 6.8.0-38.38.1 linux-lowlatency-headers-6.8.0-38 - 6.8.0-38.38.1 linux-lowlatency-hwe-20.04 - 6.8.0-38.38.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-38.38.1 linux-lowlatency-hwe-22.04 - 6.8.0-38.38.1 linux-lowlatency-hwe-22.04-edge - 6.8.0-38.38.1 linux-lowlatency-lib-rust-6.8.0-38-lowlatency - 6.8.0-38.38.1 linux-lowlatency-tools-6.8.0-38 - 6.8.0-38.38.1 linux-lowlatency-tools-common - 6.8.0-38.38.1 linux-lowlatency-tools-host - 6.8.0-38.38.1 linux-modules-6.8.0-38-lowlatency - 6.8.0-38.38.1 linux-modules-6.8.0-38-lowlatency-64k - 6.8.0-38.38.1 linux-modules-iwlwifi-6.8.0-38-lowlatency - 6.8.0-38.38.1 linux-modules-iwlwifi-lowlatency - 6.8.0-38.38.1 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.8.0-38.38.1 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.8.0-38.38.1 linux-tools-6.8.0-38-lowlatency - 6.8.0-38.38.1 linux-tools-6.8.0-38-lowlatency-64k - 6.8.0-38.38.1 linux-tools-lowlatency - 6.8.0-38.38.1 linux-tools-lowlatency-64k - 6.8.0-38.38.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-38.38.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-38.38.1 linux-tools-lowlatency-64k-hwe-22.04 - 6.8.0-38.38.1 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.8.0-38.38.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-38.38.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-38.38.1 linux-tools-lowlatency-hwe-22.04 - 6.8.0-38.38.1 linux-tools-lowlatency-hwe-22.04-edge - 6.8.0-38.38.1 No subscription required High CVE-2023-52699 CVE-2024-24857 CVE-2024-24858 CVE-2024-24859 CVE-2024-26811 CVE-2024-26817 CVE-2024-26921 CVE-2024-26922 CVE-2024-26923 CVE-2024-26925 CVE-2024-26926 CVE-2024-26928 CVE-2024-26936 CVE-2024-26980 CVE-2024-26981 CVE-2024-26982 CVE-2024-26983 CVE-2024-26984 CVE-2024-26985 CVE-2024-26986 CVE-2024-26987 CVE-2024-26988 CVE-2024-26989 CVE-2024-26990 CVE-2024-26991 CVE-2024-26992 CVE-2024-26993 CVE-2024-26994 CVE-2024-26995 CVE-2024-26996 CVE-2024-26997 CVE-2024-26998 CVE-2024-26999 CVE-2024-27000 CVE-2024-27001 CVE-2024-27002 CVE-2024-27003 CVE-2024-27004 CVE-2024-27005 CVE-2024-27006 CVE-2024-27007 CVE-2024-27008 CVE-2024-27009 CVE-2024-27010 CVE-2024-27011 CVE-2024-27012 CVE-2024-27013 CVE-2024-27014 CVE-2024-27015 CVE-2024-27016 CVE-2024-27017 CVE-2024-27018 CVE-2024-27019 CVE-2024-27020 CVE-2024-27021 CVE-2024-27022 CVE-2024-35860 CVE-2024-35861 CVE-2024-35862 CVE-2024-35863 CVE-2024-35864 CVE-2024-35865 CVE-2024-35866 CVE-2024-35867 CVE-2024-35868 CVE-2024-35869 CVE-2024-35870 CVE-2024-35871 CVE-2024-35872 CVE-2024-35873 CVE-2024-35875 CVE-2024-35877 CVE-2024-35878 CVE-2024-35879 CVE-2024-35880 CVE-2024-35882 CVE-2024-35883 CVE-2024-35884 CVE-2024-35885 CVE-2024-35886 CVE-2024-35887 CVE-2024-35888 CVE-2024-35889 CVE-2024-35890 CVE-2024-35891 CVE-2024-35892 CVE-2024-35893 CVE-2024-35894 CVE-2024-35895 CVE-2024-35896 CVE-2024-35897 CVE-2024-35898 CVE-2024-35899 CVE-2024-35900 CVE-2024-35901 CVE-2024-35902 CVE-2024-35903 CVE-2024-35904 CVE-2024-35905 CVE-2024-35907 CVE-2024-35908 CVE-2024-35909 CVE-2024-35910 CVE-2024-35911 CVE-2024-35912 CVE-2024-35913 CVE-2024-35914 CVE-2024-35915 CVE-2024-35916 CVE-2024-35917 CVE-2024-35919 CVE-2024-35920 CVE-2024-35921 CVE-2024-35922 CVE-2024-35924 CVE-2024-35925 CVE-2024-35926 CVE-2024-35927 CVE-2024-35929 CVE-2024-35930 CVE-2024-35931 CVE-2024-35932 CVE-2024-35933 CVE-2024-35934 CVE-2024-35935 CVE-2024-35936 CVE-2024-35937 CVE-2024-35938 CVE-2024-35939 CVE-2024-35940 CVE-2024-35942 CVE-2024-35943 CVE-2024-35944 CVE-2024-35945 CVE-2024-35946 CVE-2024-35950 CVE-2024-35951 CVE-2024-35952 CVE-2024-35953 CVE-2024-35954 CVE-2024-35955 CVE-2024-35956 CVE-2024-35957 CVE-2024-35958 CVE-2024-35959 CVE-2024-35960 CVE-2024-35961 CVE-2024-35963 CVE-2024-35964 CVE-2024-35965 CVE-2024-35966 CVE-2024-35967 CVE-2024-35968 CVE-2024-35969 CVE-2024-35970 CVE-2024-35971 CVE-2024-35972 CVE-2024-35973 CVE-2024-35974 CVE-2024-35975 CVE-2024-35976 CVE-2024-35977 CVE-2024-35978 CVE-2024-35979 CVE-2024-35980 CVE-2024-35981 CVE-2024-35982 CVE-2024-35985 CVE-2024-36018 CVE-2024-36019 CVE-2024-36020 CVE-2024-36021 CVE-2024-36022 CVE-2024-36023 CVE-2024-36024 CVE-2024-36025 CVE-2024-36026 CVE-2024-36027 USN-6893-2 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS It was discovered that a race condition existed in the Bluetooth subsystem in the Linux kernel when modifying certain settings values through debugfs. A privileged local attacker could use this to cause a denial of service. (CVE-2024-24857, CVE-2024-24858, CVE-2024-24859) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - RISC-V architecture; - S390 architecture; - x86 architecture; - Block layer subsystem; - Compute Acceleration Framework; - Accessibility subsystem; - Android drivers; - Drivers core; - Bluetooth drivers; - Clock framework and drivers; - Data acquisition framework and drivers; - Cryptographic API; - Buffer Sharing and Synchronization framework; - GPU drivers; - On-Chip Interconnect management framework; - IOMMU subsystem; - Multiple devices driver; - Media drivers; - VMware VMCI Driver; - Network drivers; - Microsoft Azure Network Adapter (MANA) driver; - Device tree and open firmware driver; - Chrome hardware platform drivers; - i.MX PM domains; - TI SCI PM domains driver; - S/390 drivers; - SCSI drivers; - SPI subsystem; - Thermal drivers; - TTY drivers; - USB subsystem; - Framebuffer layer; - BTRFS file system; - Network file system server daemon; - NILFS2 file system; - File systems infrastructure; - Pstore file system; - SMB network file system; - BPF subsystem; - Bluetooth subsystem; - Netfilter; - io_uring subsystem; - Core kernel; - Extra boot config (XBC); - Memory management; - Amateur Radio drivers; - B.A.T.M.A.N. meshing protocol; - Ethernet bridge; - Networking core; - IPv4 networking; - IPv6 networking; - Multipath TCP; - NFC subsystem; - RDS protocol; - Network traffic control; - SMC sockets; - Sun RPC protocol; - TLS protocol; - Unix domain sockets; - Wireless networking; - eXpress Data Path; - SELinux security module; (CVE-2024-35976, CVE-2024-35873, CVE-2024-35959, CVE-2024-27012, CVE-2024-36025, CVE-2024-35868, CVE-2024-26995, CVE-2024-35916, CVE-2024-36023, CVE-2024-35964, CVE-2024-35890, CVE-2024-26980, CVE-2024-35950, CVE-2024-27006, CVE-2024-35955, CVE-2024-35885, CVE-2024-35960, CVE-2024-35932, CVE-2024-26986, CVE-2024-35884, CVE-2024-35860, CVE-2024-36020, CVE-2024-35930, CVE-2024-35919, CVE-2024-27020, CVE-2024-26928, CVE-2024-35903, CVE-2024-35907, CVE-2024-35904, CVE-2024-35972, CVE-2024-35892, CVE-2024-26921, CVE-2024-35869, CVE-2024-35957, CVE-2024-35967, CVE-2024-35927, CVE-2024-35946, CVE-2024-27000, CVE-2024-35943, CVE-2024-35902, CVE-2024-27013, CVE-2024-35968, CVE-2024-35970, CVE-2024-35865, CVE-2024-36022, CVE-2024-26993, CVE-2024-36027, CVE-2024-35895, CVE-2024-35908, CVE-2024-35901, CVE-2024-35872, CVE-2024-26925, CVE-2024-35917, CVE-2024-35898, CVE-2024-35861, CVE-2024-35900, CVE-2024-26984, CVE-2024-35891, CVE-2023-52699, CVE-2024-35961, CVE-2024-35951, CVE-2024-36019, CVE-2024-27021, CVE-2024-35939, CVE-2024-26997, CVE-2024-26999, CVE-2024-35897, CVE-2024-35896, CVE-2024-26817, CVE-2024-35875, CVE-2024-35935, CVE-2024-27015, CVE-2024-26982, CVE-2024-35958, CVE-2024-26989, CVE-2024-26922, CVE-2024-26811, CVE-2024-27003, CVE-2024-35920, CVE-2024-27007, CVE-2024-35879, CVE-2024-35979, CVE-2024-35978, CVE-2024-35914, CVE-2024-35938, CVE-2024-35913, CVE-2024-26985, CVE-2024-35915, CVE-2024-35974, CVE-2024-27001, CVE-2024-35940, CVE-2024-35867, CVE-2024-26994, CVE-2024-35886, CVE-2024-35899, CVE-2024-27022, CVE-2024-35910, CVE-2024-35893, CVE-2024-27010, CVE-2024-36024, CVE-2024-26926, CVE-2024-26923, CVE-2024-26990, CVE-2024-35912, CVE-2024-26987, CVE-2024-35966, CVE-2024-35977, CVE-2024-35866, CVE-2024-35975, CVE-2024-35965, CVE-2024-35933, CVE-2024-26936, CVE-2024-35889, CVE-2024-35863, CVE-2024-27002, CVE-2024-27018, CVE-2024-36021, CVE-2024-27019, CVE-2024-35921, CVE-2024-35870, CVE-2024-35956, CVE-2024-27016, CVE-2024-26996, CVE-2024-35878, CVE-2024-26988, CVE-2024-35888, CVE-2024-35936, CVE-2024-27014, CVE-2024-35883, CVE-2024-35862, CVE-2024-35945, CVE-2024-26983, CVE-2024-35982, CVE-2024-35924, CVE-2024-27004, CVE-2024-27008, CVE-2024-35963, CVE-2024-35909, CVE-2024-35911, CVE-2024-35973, CVE-2024-35887, CVE-2024-27009, CVE-2024-35980, CVE-2024-36026, CVE-2024-35969, CVE-2024-35954, CVE-2024-35864, CVE-2024-35953, CVE-2024-26998, CVE-2024-35931, CVE-2024-26981, CVE-2024-35971, CVE-2024-35934, CVE-2024-35929, CVE-2024-35918, CVE-2024-35937, CVE-2024-36018, CVE-2024-35877, CVE-2024-35925, CVE-2024-35981, CVE-2024-35985, CVE-2024-35942, CVE-2024-35922, CVE-2024-35952, CVE-2024-27011, CVE-2024-35944, CVE-2024-35905, CVE-2024-35880, CVE-2024-35882, CVE-2024-27005, CVE-2024-26991, CVE-2024-35871, CVE-2024-35926, CVE-2024-26992, CVE-2024-35894, CVE-2024-27017) Update Instructions: Run `sudo pro fix USN-6893-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1006-gke - 6.8.0-1006.9 linux-gke - 6.8.0-1006.9 linux-gke-headers-6.8.0-1006 - 6.8.0-1006.9 linux-gke-tools-6.8.0-1006 - 6.8.0-1006.9 linux-headers-6.8.0-1006-gke - 6.8.0-1006.9 linux-headers-gke - 6.8.0-1006.9 linux-image-6.8.0-1006-gke - 6.8.0-1006.9 linux-image-gke - 6.8.0-1006.9 linux-image-unsigned-6.8.0-1006-gke - 6.8.0-1006.9 linux-modules-6.8.0-1006-gke - 6.8.0-1006.9 linux-modules-extra-6.8.0-1006-gke - 6.8.0-1006.9 linux-modules-iwlwifi-6.8.0-1006-gke - 6.8.0-1006.9 linux-modules-iwlwifi-gke - 6.8.0-1006.9 linux-tools-6.8.0-1006-gke - 6.8.0-1006.9 linux-tools-gke - 6.8.0-1006.9 No subscription required linux-buildinfo-6.8.0-1009-nvidia - 6.8.0-1009.9 linux-buildinfo-6.8.0-1009-nvidia-64k - 6.8.0-1009.9 linux-cloud-tools-nvidia - 6.8.0-1009.9 linux-headers-6.8.0-1009-nvidia - 6.8.0-1009.9 linux-headers-6.8.0-1009-nvidia-64k - 6.8.0-1009.9 linux-headers-nvidia - 6.8.0-1009.9 linux-headers-nvidia-64k - 6.8.0-1009.9 linux-image-6.8.0-1009-nvidia - 6.8.0-1009.9 linux-image-6.8.0-1009-nvidia-64k - 6.8.0-1009.9 linux-image-nvidia - 6.8.0-1009.9 linux-image-nvidia-64k - 6.8.0-1009.9 linux-image-uc-6.8.0-1009-nvidia - 6.8.0-1009.9 linux-image-uc-6.8.0-1009-nvidia-64k - 6.8.0-1009.9 linux-image-unsigned-6.8.0-1009-nvidia - 6.8.0-1009.9 linux-image-unsigned-6.8.0-1009-nvidia-64k - 6.8.0-1009.9 linux-modules-6.8.0-1009-nvidia - 6.8.0-1009.9 linux-modules-6.8.0-1009-nvidia-64k - 6.8.0-1009.9 linux-modules-extra-6.8.0-1009-nvidia - 6.8.0-1009.9 linux-modules-nvidia-fs-6.8.0-1009-nvidia - 6.8.0-1009.9 linux-modules-nvidia-fs-6.8.0-1009-nvidia-64k - 6.8.0-1009.9 linux-modules-nvidia-fs-nvidia - 6.8.0-1009.9 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1009.9 linux-nvidia - 6.8.0-1009.9 linux-nvidia-64k - 6.8.0-1009.9 linux-nvidia-headers-6.8.0-1009 - 6.8.0-1009.9 linux-nvidia-tools-6.8.0-1009 - 6.8.0-1009.9 linux-nvidia-tools-host - 6.8.0-1009.9 linux-tools-6.8.0-1009-nvidia - 6.8.0-1009.9 linux-tools-6.8.0-1009-nvidia-64k - 6.8.0-1009.9 linux-tools-nvidia - 6.8.0-1009.9 linux-tools-nvidia-64k - 6.8.0-1009.9 No subscription required High CVE-2023-52699 CVE-2024-24857 CVE-2024-24858 CVE-2024-24859 CVE-2024-26811 CVE-2024-26817 CVE-2024-26921 CVE-2024-26922 CVE-2024-26923 CVE-2024-26925 CVE-2024-26926 CVE-2024-26928 CVE-2024-26936 CVE-2024-26980 CVE-2024-26981 CVE-2024-26982 CVE-2024-26983 CVE-2024-26984 CVE-2024-26985 CVE-2024-26986 CVE-2024-26987 CVE-2024-26988 CVE-2024-26989 CVE-2024-26990 CVE-2024-26991 CVE-2024-26992 CVE-2024-26993 CVE-2024-26994 CVE-2024-26995 CVE-2024-26996 CVE-2024-26997 CVE-2024-26998 CVE-2024-26999 CVE-2024-27000 CVE-2024-27001 CVE-2024-27002 CVE-2024-27003 CVE-2024-27004 CVE-2024-27005 CVE-2024-27006 CVE-2024-27007 CVE-2024-27008 CVE-2024-27009 CVE-2024-27010 CVE-2024-27011 CVE-2024-27012 CVE-2024-27013 CVE-2024-27014 CVE-2024-27015 CVE-2024-27016 CVE-2024-27017 CVE-2024-27018 CVE-2024-27019 CVE-2024-27020 CVE-2024-27021 CVE-2024-27022 CVE-2024-35860 CVE-2024-35861 CVE-2024-35862 CVE-2024-35863 CVE-2024-35864 CVE-2024-35865 CVE-2024-35866 CVE-2024-35867 CVE-2024-35868 CVE-2024-35869 CVE-2024-35870 CVE-2024-35871 CVE-2024-35872 CVE-2024-35873 CVE-2024-35875 CVE-2024-35877 CVE-2024-35878 CVE-2024-35879 CVE-2024-35880 CVE-2024-35882 CVE-2024-35883 CVE-2024-35884 CVE-2024-35885 CVE-2024-35886 CVE-2024-35887 CVE-2024-35888 CVE-2024-35889 CVE-2024-35890 CVE-2024-35891 CVE-2024-35892 CVE-2024-35893 CVE-2024-35894 CVE-2024-35895 CVE-2024-35896 CVE-2024-35897 CVE-2024-35898 CVE-2024-35899 CVE-2024-35900 CVE-2024-35901 CVE-2024-35902 CVE-2024-35903 CVE-2024-35904 CVE-2024-35905 CVE-2024-35907 CVE-2024-35908 CVE-2024-35909 CVE-2024-35910 CVE-2024-35911 CVE-2024-35912 CVE-2024-35913 CVE-2024-35914 CVE-2024-35915 CVE-2024-35916 CVE-2024-35917 CVE-2024-35919 CVE-2024-35920 CVE-2024-35921 CVE-2024-35922 CVE-2024-35924 CVE-2024-35925 CVE-2024-35926 CVE-2024-35927 CVE-2024-35929 CVE-2024-35930 CVE-2024-35931 CVE-2024-35932 CVE-2024-35933 CVE-2024-35934 CVE-2024-35935 CVE-2024-35936 CVE-2024-35937 CVE-2024-35938 CVE-2024-35939 CVE-2024-35940 CVE-2024-35942 CVE-2024-35943 CVE-2024-35944 CVE-2024-35945 CVE-2024-35946 CVE-2024-35950 CVE-2024-35951 CVE-2024-35952 CVE-2024-35953 CVE-2024-35954 CVE-2024-35955 CVE-2024-35956 CVE-2024-35957 CVE-2024-35958 CVE-2024-35959 CVE-2024-35960 CVE-2024-35961 CVE-2024-35963 CVE-2024-35964 CVE-2024-35965 CVE-2024-35966 CVE-2024-35967 CVE-2024-35968 CVE-2024-35969 CVE-2024-35970 CVE-2024-35971 CVE-2024-35972 CVE-2024-35973 CVE-2024-35974 CVE-2024-35975 CVE-2024-35976 CVE-2024-35977 CVE-2024-35978 CVE-2024-35979 CVE-2024-35980 CVE-2024-35981 CVE-2024-35982 CVE-2024-35985 CVE-2024-36018 CVE-2024-36019 CVE-2024-36020 CVE-2024-36021 CVE-2024-36022 CVE-2024-36023 CVE-2024-36024 CVE-2024-36025 CVE-2024-36026 CVE-2024-36027 USN-6893-3 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS It was discovered that a race condition existed in the Bluetooth subsystem in the Linux kernel when modifying certain settings values through debugfs. A privileged local attacker could use this to cause a denial of service. (CVE-2024-24857, CVE-2024-24858, CVE-2024-24859) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - RISC-V architecture; - S390 architecture; - x86 architecture; - Block layer subsystem; - Compute Acceleration Framework; - Accessibility subsystem; - Android drivers; - Drivers core; - Bluetooth drivers; - Clock framework and drivers; - Data acquisition framework and drivers; - Cryptographic API; - Buffer Sharing and Synchronization framework; - GPU drivers; - On-Chip Interconnect management framework; - IOMMU subsystem; - Multiple devices driver; - Media drivers; - VMware VMCI Driver; - Network drivers; - Microsoft Azure Network Adapter (MANA) driver; - Device tree and open firmware driver; - Chrome hardware platform drivers; - i.MX PM domains; - TI SCI PM domains driver; - S/390 drivers; - SCSI drivers; - SPI subsystem; - Thermal drivers; - TTY drivers; - USB subsystem; - Framebuffer layer; - BTRFS file system; - Network file system server daemon; - NILFS2 file system; - File systems infrastructure; - Pstore file system; - SMB network file system; - BPF subsystem; - Bluetooth subsystem; - Netfilter; - io_uring subsystem; - Core kernel; - Extra boot config (XBC); - Memory management; - Amateur Radio drivers; - B.A.T.M.A.N. meshing protocol; - Ethernet bridge; - Networking core; - IPv4 networking; - IPv6 networking; - Multipath TCP; - NFC subsystem; - RDS protocol; - Network traffic control; - SMC sockets; - Sun RPC protocol; - TLS protocol; - Unix domain sockets; - Wireless networking; - eXpress Data Path; - SELinux security module; (CVE-2024-35955, CVE-2024-35921, CVE-2024-35946, CVE-2024-35934, CVE-2024-26993, CVE-2024-35899, CVE-2024-35952, CVE-2024-35894, CVE-2024-35886, CVE-2024-35872, CVE-2024-35970, CVE-2024-35936, CVE-2024-35907, CVE-2024-27013, CVE-2024-35910, CVE-2024-27009, CVE-2024-35875, CVE-2024-36021, CVE-2024-26923, CVE-2024-26997, CVE-2024-35978, CVE-2024-35981, CVE-2024-27015, CVE-2024-26928, CVE-2024-35963, CVE-2024-35897, CVE-2024-27020, CVE-2024-35922, CVE-2024-27001, CVE-2024-27011, CVE-2024-35940, CVE-2024-35871, CVE-2024-35900, CVE-2024-35869, CVE-2024-35905, CVE-2024-35974, CVE-2024-35873, CVE-2024-35882, CVE-2024-35914, CVE-2024-35956, CVE-2024-35887, CVE-2024-35920, CVE-2024-27018, CVE-2024-35880, CVE-2024-35943, CVE-2024-35912, CVE-2024-35979, CVE-2024-35862, CVE-2024-36019, CVE-2024-35950, CVE-2024-35977, CVE-2024-35918, CVE-2024-26992, CVE-2024-35884, CVE-2024-35916, CVE-2024-26817, CVE-2024-35959, CVE-2024-35909, CVE-2024-35933, CVE-2024-35982, CVE-2024-26996, CVE-2024-35980, CVE-2024-36018, CVE-2024-26925, CVE-2024-35929, CVE-2024-35971, CVE-2024-26990, CVE-2024-35885, CVE-2024-36025, CVE-2024-26998, CVE-2024-35930, CVE-2024-26982, CVE-2024-36022, CVE-2024-35895, CVE-2024-35902, CVE-2024-35911, CVE-2024-27002, CVE-2024-35968, CVE-2024-35861, CVE-2024-35903, CVE-2024-36026, CVE-2024-35896, CVE-2024-35945, CVE-2024-26936, CVE-2024-35954, CVE-2024-26985, CVE-2024-35908, CVE-2024-35924, CVE-2024-35938, CVE-2024-26991, CVE-2024-27017, CVE-2024-26922, CVE-2024-35919, CVE-2024-35915, CVE-2024-35985, CVE-2024-26995, CVE-2024-35870, CVE-2024-27010, CVE-2024-35904, CVE-2024-26999, CVE-2024-26983, CVE-2024-35939, CVE-2024-35865, CVE-2024-35860, CVE-2024-35944, CVE-2024-27021, CVE-2024-27016, CVE-2024-27004, CVE-2024-27019, CVE-2024-36027, CVE-2024-35890, CVE-2024-35975, CVE-2024-35901, CVE-2024-35967, CVE-2024-26986, CVE-2024-35957, CVE-2024-35937, CVE-2024-26988, CVE-2024-35972, CVE-2024-35926, CVE-2024-26926, CVE-2024-35964, CVE-2024-26994, CVE-2024-35889, CVE-2024-26981, CVE-2024-36024, CVE-2024-27022, CVE-2024-35935, CVE-2024-26811, CVE-2024-35932, CVE-2024-35866, CVE-2024-27008, CVE-2024-27012, CVE-2024-36023, CVE-2024-35931, CVE-2024-35888, CVE-2024-26989, CVE-2024-35868, CVE-2024-35976, CVE-2024-35953, CVE-2024-36020, CVE-2024-35893, CVE-2024-35961, CVE-2024-35965, CVE-2024-35892, CVE-2024-35942, CVE-2024-35958, CVE-2024-27014, CVE-2024-35867, CVE-2024-27003, CVE-2024-27007, CVE-2024-35951, CVE-2024-35973, CVE-2024-35863, CVE-2024-26984, CVE-2024-35898, CVE-2024-35960, CVE-2024-27005, CVE-2024-35917, CVE-2024-35927, CVE-2024-26980, CVE-2024-35877, CVE-2024-35925, CVE-2024-26921, CVE-2024-35913, CVE-2023-52699, CVE-2024-26987, CVE-2024-27006, CVE-2024-35878, CVE-2024-35864, CVE-2024-35969, CVE-2024-35883, CVE-2024-35891, CVE-2024-35879, CVE-2024-27000, CVE-2024-35966) Update Instructions: Run `sudo pro fix USN-6893-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-aws - 6.8.0-1011.12 linux-aws-cloud-tools-6.8.0-1011 - 6.8.0-1011.12 linux-aws-headers-6.8.0-1011 - 6.8.0-1011.12 linux-aws-tools-6.8.0-1011 - 6.8.0-1011.12 linux-buildinfo-6.8.0-1011-aws - 6.8.0-1011.12 linux-cloud-tools-6.8.0-1011-aws - 6.8.0-1011.12 linux-headers-6.8.0-1011-aws - 6.8.0-1011.12 linux-headers-aws - 6.8.0-1011.12 linux-image-6.8.0-1011-aws - 6.8.0-1011.12 linux-image-aws - 6.8.0-1011.12 linux-image-unsigned-6.8.0-1011-aws - 6.8.0-1011.12 linux-modules-6.8.0-1011-aws - 6.8.0-1011.12 linux-modules-extra-6.8.0-1011-aws - 6.8.0-1011.12 linux-modules-extra-aws - 6.8.0-1011.12 linux-tools-6.8.0-1011-aws - 6.8.0-1011.12 linux-tools-aws - 6.8.0-1011.12 No subscription required High CVE-2023-52699 CVE-2024-24857 CVE-2024-24858 CVE-2024-24859 CVE-2024-26811 CVE-2024-26817 CVE-2024-26921 CVE-2024-26922 CVE-2024-26923 CVE-2024-26925 CVE-2024-26926 CVE-2024-26928 CVE-2024-26936 CVE-2024-26980 CVE-2024-26981 CVE-2024-26982 CVE-2024-26983 CVE-2024-26984 CVE-2024-26985 CVE-2024-26986 CVE-2024-26987 CVE-2024-26988 CVE-2024-26989 CVE-2024-26990 CVE-2024-26991 CVE-2024-26992 CVE-2024-26993 CVE-2024-26994 CVE-2024-26995 CVE-2024-26996 CVE-2024-26997 CVE-2024-26998 CVE-2024-26999 CVE-2024-27000 CVE-2024-27001 CVE-2024-27002 CVE-2024-27003 CVE-2024-27004 CVE-2024-27005 CVE-2024-27006 CVE-2024-27007 CVE-2024-27008 CVE-2024-27009 CVE-2024-27010 CVE-2024-27011 CVE-2024-27012 CVE-2024-27013 CVE-2024-27014 CVE-2024-27015 CVE-2024-27016 CVE-2024-27017 CVE-2024-27018 CVE-2024-27019 CVE-2024-27020 CVE-2024-27021 CVE-2024-27022 CVE-2024-35860 CVE-2024-35861 CVE-2024-35862 CVE-2024-35863 CVE-2024-35864 CVE-2024-35865 CVE-2024-35866 CVE-2024-35867 CVE-2024-35868 CVE-2024-35869 CVE-2024-35870 CVE-2024-35871 CVE-2024-35872 CVE-2024-35873 CVE-2024-35875 CVE-2024-35877 CVE-2024-35878 CVE-2024-35879 CVE-2024-35880 CVE-2024-35882 CVE-2024-35883 CVE-2024-35884 CVE-2024-35885 CVE-2024-35886 CVE-2024-35887 CVE-2024-35888 CVE-2024-35889 CVE-2024-35890 CVE-2024-35891 CVE-2024-35892 CVE-2024-35893 CVE-2024-35894 CVE-2024-35895 CVE-2024-35896 CVE-2024-35897 CVE-2024-35898 CVE-2024-35899 CVE-2024-35900 CVE-2024-35901 CVE-2024-35902 CVE-2024-35903 CVE-2024-35904 CVE-2024-35905 CVE-2024-35907 CVE-2024-35908 CVE-2024-35909 CVE-2024-35910 CVE-2024-35911 CVE-2024-35912 CVE-2024-35913 CVE-2024-35914 CVE-2024-35915 CVE-2024-35916 CVE-2024-35917 CVE-2024-35919 CVE-2024-35920 CVE-2024-35921 CVE-2024-35922 CVE-2024-35924 CVE-2024-35925 CVE-2024-35926 CVE-2024-35927 CVE-2024-35929 CVE-2024-35930 CVE-2024-35931 CVE-2024-35932 CVE-2024-35933 CVE-2024-35934 CVE-2024-35935 CVE-2024-35936 CVE-2024-35937 CVE-2024-35938 CVE-2024-35939 CVE-2024-35940 CVE-2024-35942 CVE-2024-35943 CVE-2024-35944 CVE-2024-35945 CVE-2024-35946 CVE-2024-35950 CVE-2024-35951 CVE-2024-35952 CVE-2024-35953 CVE-2024-35954 CVE-2024-35955 CVE-2024-35956 CVE-2024-35957 CVE-2024-35958 CVE-2024-35959 CVE-2024-35960 CVE-2024-35961 CVE-2024-35963 CVE-2024-35964 CVE-2024-35965 CVE-2024-35966 CVE-2024-35967 CVE-2024-35968 CVE-2024-35969 CVE-2024-35970 CVE-2024-35971 CVE-2024-35972 CVE-2024-35973 CVE-2024-35974 CVE-2024-35975 CVE-2024-35976 CVE-2024-35977 CVE-2024-35978 CVE-2024-35979 CVE-2024-35980 CVE-2024-35981 CVE-2024-35982 CVE-2024-35985 CVE-2024-36018 CVE-2024-36019 CVE-2024-36020 CVE-2024-36021 CVE-2024-36022 CVE-2024-36023 CVE-2024-36024 CVE-2024-36025 CVE-2024-36026 CVE-2024-36027 USN-6897-1 -- Ghostscript vulnerabilities Ubuntu 24.04 LTS It was discovered that Ghostscript incorrectly handled certain long PDF filter names. An attacker could possibly use this issue to cause Ghostscript to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-29506) It was discovered that Ghostscript incorrectly handled certain API parameters. An attacker could possibly use this issue to cause Ghostscript to crash, resulting in a denial of service. This issue only affected Ubuntu 24.04 LTS. (CVE-2024-29507) It was discovered that Ghostscript incorrectly handled certain BaseFont names. An attacker could use this issue to cause Ghostscript to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2024-29508) It was discovered that Ghostscript incorrectly handled certain PDF passwords that contained NULL bytes. An attacker could use this issue to cause Ghostscript to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-29509) It was discovered that Ghostscript incorrectly handled certain certain file paths when doing OCR. An attacker could use this issue to read arbitrary files and write error messages to arbitrary files. This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-29511) Update Instructions: Run `sudo pro fix USN-6897-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ghostscript - 10.02.1~dfsg1-0ubuntu7.3 ghostscript-doc - 10.02.1~dfsg1-0ubuntu7.3 libgs-common - 10.02.1~dfsg1-0ubuntu7.3 libgs-dev - 10.02.1~dfsg1-0ubuntu7.3 libgs10 - 10.02.1~dfsg1-0ubuntu7.3 libgs10-common - 10.02.1~dfsg1-0ubuntu7.3 No subscription required Medium CVE-2024-29506 CVE-2024-29507 CVE-2024-29508 CVE-2024-29509 CVE-2024-29511 USN-6899-1 -- GTK vulnerability Ubuntu 24.04 LTS It was discovered that GTK would attempt to load modules from the current directory, contrary to expectations. If users started GTK applications from shared directories, a local attacker could use this issue to execute arbitrary code, and possibly escalate privileges. Update Instructions: Run `sudo pro fix USN-6899-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-gtk-2.0 - 2.24.33-4ubuntu1.1 gtk2-engines-pixbuf - 2.24.33-4ubuntu1.1 libgail-common - 2.24.33-4ubuntu1.1 libgail-dev - 2.24.33-4ubuntu1.1 libgail-doc - 2.24.33-4ubuntu1.1 libgail18t64 - 2.24.33-4ubuntu1.1 libgtk2.0-0t64 - 2.24.33-4ubuntu1.1 libgtk2.0-bin - 2.24.33-4ubuntu1.1 libgtk2.0-common - 2.24.33-4ubuntu1.1 libgtk2.0-dev - 2.24.33-4ubuntu1.1 libgtk2.0-doc - 2.24.33-4ubuntu1.1 No subscription required gir1.2-gtk-3.0 - 3.24.41-4ubuntu1.1 gtk-3-examples - 3.24.41-4ubuntu1.1 gtk-update-icon-cache - 3.24.41-4ubuntu1.1 libgail-3-0t64 - 3.24.41-4ubuntu1.1 libgail-3-dev - 3.24.41-4ubuntu1.1 libgail-3-doc - 3.24.41-4ubuntu1.1 libgtk-3-0t64 - 3.24.41-4ubuntu1.1 libgtk-3-bin - 3.24.41-4ubuntu1.1 libgtk-3-common - 3.24.41-4ubuntu1.1 libgtk-3-dev - 3.24.41-4ubuntu1.1 libgtk-3-doc - 3.24.41-4ubuntu1.1 No subscription required Medium CVE-2024-6655 USN-6902-1 -- Apache HTTP Server vulnerability Ubuntu 24.04 LTS It was discovered that the Apache HTTP Server incorrectly handled certain handlers configured via AddType. A remote attacker could possibly use this issue to obtain source code. Update Instructions: Run `sudo pro fix USN-6902-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: apache2 - 2.4.58-1ubuntu8.4 apache2-bin - 2.4.58-1ubuntu8.4 apache2-data - 2.4.58-1ubuntu8.4 apache2-dev - 2.4.58-1ubuntu8.4 apache2-doc - 2.4.58-1ubuntu8.4 apache2-ssl-dev - 2.4.58-1ubuntu8.4 apache2-suexec-custom - 2.4.58-1ubuntu8.4 apache2-suexec-pristine - 2.4.58-1ubuntu8.4 apache2-utils - 2.4.58-1ubuntu8.4 libapache2-mod-md - 2.4.58-1ubuntu8.4 libapache2-mod-proxy-uwsgi - 2.4.58-1ubuntu8.4 No subscription required Medium CVE-2024-40725 USN-6904-1 -- PyMongo vulnerability Ubuntu 24.04 LTS It was discovered that PyMongo incorrectly handled certain BSON. An attacker could possibly use this issue to read sensitive information or cause a crash. Update Instructions: Run `sudo pro fix USN-6904-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-pymongo-doc - 3.11.0-1ubuntu0.24.04.1 python3-bson - 3.11.0-1ubuntu0.24.04.1 python3-bson-ext - 3.11.0-1ubuntu0.24.04.1 python3-gridfs - 3.11.0-1ubuntu0.24.04.1 python3-pymongo - 3.11.0-1ubuntu0.24.04.1 python3-pymongo-ext - 3.11.0-1ubuntu0.24.04.1 No subscription required Medium CVE-2024-5629 USN-6906-1 -- python-zipp vulnerability Ubuntu 24.04 LTS It was discovered that python-zipp did not properly handle the zip files with malformed names. An attacker could possibly use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-6906-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-zipp - 1.0.0-6ubuntu0.1 No subscription required Medium CVE-2024-5569 USN-6907-1 -- Squid vulnerability Ubuntu 24.04 LTS Joshua Rogers discovered that Squid did not properly handle multi-byte characters during Edge Side Includes (ESI) processing. A remote attacker could possibly use this issue to cause a memory corruption error, leading to a denial of service. Update Instructions: Run `sudo pro fix USN-6907-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: squid - 6.6-1ubuntu5.1 squid-cgi - 6.6-1ubuntu5.1 squid-common - 6.6-1ubuntu5.1 squid-openssl - 6.6-1ubuntu5.1 squid-purge - 6.6-1ubuntu5.1 squidclient - 6.6-1ubuntu5.1 No subscription required Medium CVE-2024-37894 USN-6909-1 -- Bind vulnerabilities Ubuntu 24.04 LTS It was discovered that Bind incorrectly handled a flood of DNS messages over TCP. A remote attacker could possibly use this issue to cause Bind to become unstable, resulting in a denial of service. (CVE-2024-0760) Toshifumi Sakaguchi discovered that Bind incorrectly handled having a very large number of RRs existing at the same time. A remote attacker could possibly use this issue to cause Bind to consume resources, leading to a denial of service. (CVE-2024-1737) It was discovered that Bind incorrectly handled a large number of SIG(0) signed requests. A remote attacker could possibly use this issue to cause Bind to consume resources, leading to a denial of service. (CVE-2024-1975) Daniel Stränger discovered that Bind incorrectly handled serving both stable cache data and authoritative zone content. A remote attacker could possibly use this issue to cause Bind to crash, resulting in a denial of service. (CVE-2024-4076) On Ubuntu 20.04 LTS, Bind has been updated from 9.16 to 9.18. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information: https://kb.isc.org/docs/changes-to-be-aware-of-when-moving-from-bind-916-to-918 Update Instructions: Run `sudo pro fix USN-6909-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: bind9 - 1:9.18.28-0ubuntu0.24.04.1 bind9-dev - 1:9.18.28-0ubuntu0.24.04.1 bind9-dnsutils - 1:9.18.28-0ubuntu0.24.04.1 bind9-doc - 1:9.18.28-0ubuntu0.24.04.1 bind9-host - 1:9.18.28-0ubuntu0.24.04.1 bind9-libs - 1:9.18.28-0ubuntu0.24.04.1 bind9-utils - 1:9.18.28-0ubuntu0.24.04.1 bind9utils - 1:9.18.28-0ubuntu0.24.04.1 dnsutils - 1:9.18.28-0ubuntu0.24.04.1 No subscription required Medium CVE-2024-0760 CVE-2024-1737 CVE-2024-1975 CVE-2024-4076 USN-6911-1 -- Nova vulnerability Ubuntu 24.04 LTS Arnaud Morin discovered that Nova incorrectly handled certain raw format images. An authenticated user could use this issue to access arbitrary files on the server, possibly exposing sensitive information. Update Instructions: Run `sudo pro fix USN-6911-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: nova-ajax-console-proxy - 3:29.0.1-0ubuntu1.4 nova-api - 3:29.0.1-0ubuntu1.4 nova-api-metadata - 3:29.0.1-0ubuntu1.4 nova-api-os-compute - 3:29.0.1-0ubuntu1.4 nova-api-os-volume - 3:29.0.1-0ubuntu1.4 nova-cells - 3:29.0.1-0ubuntu1.4 nova-common - 3:29.0.1-0ubuntu1.4 nova-compute - 3:29.0.1-0ubuntu1.4 nova-compute-ironic - 3:29.0.1-0ubuntu1.4 nova-compute-kvm - 3:29.0.1-0ubuntu1.4 nova-compute-libvirt - 3:29.0.1-0ubuntu1.4 nova-compute-lxc - 3:29.0.1-0ubuntu1.4 nova-compute-qemu - 3:29.0.1-0ubuntu1.4 nova-compute-vmware - 3:29.0.1-0ubuntu1.4 nova-compute-xen - 3:29.0.1-0ubuntu1.4 nova-conductor - 3:29.0.1-0ubuntu1.4 nova-doc - 3:29.0.1-0ubuntu1.4 nova-novncproxy - 3:29.0.1-0ubuntu1.4 nova-scheduler - 3:29.0.1-0ubuntu1.4 nova-serialproxy - 3:29.0.1-0ubuntu1.4 nova-spiceproxy - 3:29.0.1-0ubuntu1.4 nova-volume - 3:29.0.1-0ubuntu1.4 python3-nova - 3:29.0.1-0ubuntu1.4 No subscription required Medium CVE-2024-40767 USN-6912-1 -- provd vulnerability Ubuntu 24.04 LTS James Henstridge discovered that provd incorrectly handled environment variables. A local attacker could possibly use this issue to run arbitrary programs and escalate privileges. Update Instructions: Run `sudo pro fix USN-6912-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: provd - 0.1.2+24.04 No subscription required Medium CVE-2024-6714 https://bugs.launchpad.net/ubuntu/+source/provd/+bug/2071574 USN-6915-1 -- poppler vulnerability Ubuntu 24.04 LTS It was discovered that poppler incorrectly handled certain malformed PDF. An attacker could possibly use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-6915-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-poppler-0.18 - 24.02.0-1ubuntu9.1 libpoppler-cpp-dev - 24.02.0-1ubuntu9.1 libpoppler-cpp0t64 - 24.02.0-1ubuntu9.1 libpoppler-dev - 24.02.0-1ubuntu9.1 libpoppler-glib-dev - 24.02.0-1ubuntu9.1 libpoppler-glib-doc - 24.02.0-1ubuntu9.1 libpoppler-glib8t64 - 24.02.0-1ubuntu9.1 libpoppler-private-dev - 24.02.0-1ubuntu9.1 libpoppler-qt5-1t64 - 24.02.0-1ubuntu9.1 libpoppler-qt5-dev - 24.02.0-1ubuntu9.1 libpoppler-qt6-3t64 - 24.02.0-1ubuntu9.1 libpoppler-qt6-dev - 24.02.0-1ubuntu9.1 libpoppler134 - 24.02.0-1ubuntu9.1 poppler-utils - 24.02.0-1ubuntu9.1 No subscription required Low CVE-2024-6239 USN-6918-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS It was discovered that a race condition existed in the Bluetooth subsystem in the Linux kernel when modifying certain settings values through debugfs. A privileged local attacker could use this to cause a denial of service. Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - RISC-V architecture; - S390 architecture; - x86 architecture; - Block layer subsystem; - Compute Acceleration Framework; - Accessibility subsystem; - Android drivers; - Drivers core; - Bluetooth drivers; - Clock framework and drivers; - Data acquisition framework and drivers; - Cryptographic API; - Buffer Sharing and Synchronization framework; - GPU drivers; - On-Chip Interconnect management framework; - IOMMU subsystem; - Multiple devices driver; - Media drivers; - VMware VMCI Driver; - Network drivers; - Microsoft Azure Network Adapter (MANA) driver; - Device tree and open firmware driver; - Chrome hardware platform drivers; - i.MX PM domains; - TI SCI PM domains driver; - S/390 drivers; - SCSI drivers; - SPI subsystem; - Thermal drivers; - TTY drivers; - USB subsystem; - Framebuffer layer; - BTRFS file system; - Network file system server daemon; - NILFS2 file system; - File systems infrastructure; - Pstore file system; - SMB network file system; - BPF subsystem; - Bluetooth subsystem; - Netfilter; - io_uring subsystem; - Core kernel; - Extra boot config (XBC); - Memory management; - Amateur Radio drivers; - B.A.T.M.A.N. meshing protocol; - Ethernet bridge; - Networking core; - IPv4 networking; - IPv6 networking; - Multipath TCP; - NFC subsystem; - RDS protocol; - Network traffic control; - SMC sockets; - Sun RPC protocol; - TLS protocol; - Unix domain sockets; - Wireless networking; - eXpress Data Path; - SELinux security module; (CVE-2024-26988, CVE-2024-36023, CVE-2024-35869, CVE-2024-35938, CVE-2024-27000, CVE-2024-35880, CVE-2024-35915, CVE-2024-35959, CVE-2024-35883, CVE-2024-35886, CVE-2024-35976, CVE-2024-35903, CVE-2024-35980, CVE-2024-27020, CVE-2024-35955, CVE-2024-35964, CVE-2024-26980, CVE-2024-35882, CVE-2024-35927, CVE-2024-35884, CVE-2024-35914, CVE-2024-35905, CVE-2024-26925, CVE-2024-35885, CVE-2024-26990, CVE-2024-27012, CVE-2024-35969, CVE-2024-35862, CVE-2024-35956, CVE-2024-35971, CVE-2024-27022, CVE-2024-35935, CVE-2024-26992, CVE-2024-27010, CVE-2024-35892, CVE-2024-26999, CVE-2024-26989, CVE-2024-35963, CVE-2024-35981, CVE-2024-26997, CVE-2024-35920, CVE-2024-35918, CVE-2024-35933, CVE-2024-35867, CVE-2024-35904, CVE-2024-35890, CVE-2024-35968, CVE-2024-35917, CVE-2024-35897, CVE-2024-26922, CVE-2024-36026, CVE-2024-27013, CVE-2024-26991, CVE-2024-26996, CVE-2024-35873, CVE-2024-26987, CVE-2024-35895, CVE-2024-36027, CVE-2024-35896, CVE-2024-35894, CVE-2024-26983, CVE-2024-35966, CVE-2024-35967, CVE-2024-35945, CVE-2024-27003, CVE-2024-35939, CVE-2024-35861, CVE-2024-26985, CVE-2024-27015, CVE-2024-35982, CVE-2024-35912, CVE-2024-35979, CVE-2024-35879, CVE-2024-26982, CVE-2024-35891, CVE-2024-35925, CVE-2024-35870, CVE-2024-27021, CVE-2024-35866, CVE-2024-27014, CVE-2024-27001, CVE-2024-27004, CVE-2024-35953, CVE-2024-36021, CVE-2024-35931, CVE-2024-27007, CVE-2024-35922, CVE-2024-35872, CVE-2024-35926, CVE-2024-27016, CVE-2024-26984, CVE-2024-35919, CVE-2024-35911, CVE-2024-26923, CVE-2024-35929, CVE-2024-35887, CVE-2024-35893, CVE-2024-35898, CVE-2024-35930, CVE-2024-35934, CVE-2024-35916, CVE-2024-35877, CVE-2024-26926, CVE-2024-35974, CVE-2024-36018, CVE-2024-27002, CVE-2024-35975, CVE-2024-35864, CVE-2024-35958, CVE-2024-35944, CVE-2024-35985, CVE-2024-35940, CVE-2024-35900, CVE-2024-27018, CVE-2024-26936, CVE-2024-36024, CVE-2024-26998, CVE-2024-35954, CVE-2024-35878, CVE-2024-26928, CVE-2024-35952, CVE-2024-36020, CVE-2024-26986, CVE-2024-35950, CVE-2024-35957, CVE-2024-35909, CVE-2024-27005, CVE-2024-35978, CVE-2024-35875, CVE-2024-35943, CVE-2024-35970, CVE-2024-35863, CVE-2024-26993, CVE-2024-35865, CVE-2024-26995, CVE-2024-35888, CVE-2024-35899, CVE-2024-35868, CVE-2023-52699, CVE-2024-26994, CVE-2024-26817, CVE-2024-35902, CVE-2024-35977, CVE-2024-35961, CVE-2024-36025, CVE-2024-35936, CVE-2024-35913, CVE-2024-27017, CVE-2024-35889, CVE-2024-35972, CVE-2024-35901, CVE-2024-26921, CVE-2024-26924, CVE-2024-35951, CVE-2024-35860, CVE-2024-35907, CVE-2024-35910, CVE-2024-36022, CVE-2024-27019, CVE-2024-27009, CVE-2024-26981, CVE-2024-35973, CVE-2024-35965, CVE-2024-36019, CVE-2024-35871, CVE-2024-27008, CVE-2024-26811, CVE-2024-35908, CVE-2024-35921, CVE-2024-35942, CVE-2024-35946, CVE-2024-35924, CVE-2024-27011, CVE-2024-35960, CVE-2024-27006, CVE-2024-35937, CVE-2024-35932) Update Instructions: Run `sudo pro fix USN-6918-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1008-oracle - 6.8.0-1008.8 linux-buildinfo-6.8.0-1008-oracle-64k - 6.8.0-1008.8 linux-headers-6.8.0-1008-oracle - 6.8.0-1008.8 linux-headers-6.8.0-1008-oracle-64k - 6.8.0-1008.8 linux-headers-oracle - 6.8.0-1008.8 linux-headers-oracle-64k - 6.8.0-1008.8 linux-image-6.8.0-1008-oracle - 6.8.0-1008.8 linux-image-6.8.0-1008-oracle-64k - 6.8.0-1008.8 linux-image-oracle - 6.8.0-1008.8 linux-image-oracle-64k - 6.8.0-1008.8 linux-image-unsigned-6.8.0-1008-oracle - 6.8.0-1008.8 linux-image-unsigned-6.8.0-1008-oracle-64k - 6.8.0-1008.8 linux-modules-6.8.0-1008-oracle - 6.8.0-1008.8 linux-modules-6.8.0-1008-oracle-64k - 6.8.0-1008.8 linux-modules-extra-6.8.0-1008-oracle - 6.8.0-1008.8 linux-modules-extra-6.8.0-1008-oracle-64k - 6.8.0-1008.8 linux-modules-iwlwifi-6.8.0-1008-oracle - 6.8.0-1008.8 linux-modules-iwlwifi-oracle - 6.8.0-1008.8 linux-oracle - 6.8.0-1008.8 linux-oracle-64k - 6.8.0-1008.8 linux-oracle-headers-6.8.0-1008 - 6.8.0-1008.8 linux-oracle-tools-6.8.0-1008 - 6.8.0-1008.8 linux-tools-6.8.0-1008-oracle - 6.8.0-1008.8 linux-tools-6.8.0-1008-oracle-64k - 6.8.0-1008.8 linux-tools-oracle - 6.8.0-1008.8 linux-tools-oracle-64k - 6.8.0-1008.8 No subscription required High CVE-2023-52699 CVE-2024-24857 CVE-2024-24858 CVE-2024-24859 CVE-2024-26811 CVE-2024-26817 CVE-2024-26921 CVE-2024-26922 CVE-2024-26923 CVE-2024-26924 CVE-2024-26925 CVE-2024-26926 CVE-2024-26928 CVE-2024-26936 CVE-2024-26980 CVE-2024-26981 CVE-2024-26982 CVE-2024-26983 CVE-2024-26984 CVE-2024-26985 CVE-2024-26986 CVE-2024-26987 CVE-2024-26988 CVE-2024-26989 CVE-2024-26990 CVE-2024-26991 CVE-2024-26992 CVE-2024-26993 CVE-2024-26994 CVE-2024-26995 CVE-2024-26996 CVE-2024-26997 CVE-2024-26998 CVE-2024-26999 CVE-2024-27000 CVE-2024-27001 CVE-2024-27002 CVE-2024-27003 CVE-2024-27004 CVE-2024-27005 CVE-2024-27006 CVE-2024-27007 CVE-2024-27008 CVE-2024-27009 CVE-2024-27010 CVE-2024-27011 CVE-2024-27012 CVE-2024-27013 CVE-2024-27014 CVE-2024-27015 CVE-2024-27016 CVE-2024-27017 CVE-2024-27018 CVE-2024-27019 CVE-2024-27020 CVE-2024-27021 CVE-2024-27022 CVE-2024-35860 CVE-2024-35861 CVE-2024-35862 CVE-2024-35863 CVE-2024-35864 CVE-2024-35865 CVE-2024-35866 CVE-2024-35867 CVE-2024-35868 CVE-2024-35869 CVE-2024-35870 CVE-2024-35871 CVE-2024-35872 CVE-2024-35873 CVE-2024-35875 CVE-2024-35877 CVE-2024-35878 CVE-2024-35879 CVE-2024-35880 CVE-2024-35882 CVE-2024-35883 CVE-2024-35884 CVE-2024-35885 CVE-2024-35886 CVE-2024-35887 CVE-2024-35888 CVE-2024-35889 CVE-2024-35890 CVE-2024-35891 CVE-2024-35892 CVE-2024-35893 CVE-2024-35894 CVE-2024-35895 CVE-2024-35896 CVE-2024-35897 CVE-2024-35898 CVE-2024-35899 CVE-2024-35900 CVE-2024-35901 CVE-2024-35902 CVE-2024-35903 CVE-2024-35904 CVE-2024-35905 CVE-2024-35907 CVE-2024-35908 CVE-2024-35909 CVE-2024-35910 CVE-2024-35911 CVE-2024-35912 CVE-2024-35913 CVE-2024-35914 CVE-2024-35915 CVE-2024-35916 CVE-2024-35917 CVE-2024-35919 CVE-2024-35920 CVE-2024-35921 CVE-2024-35922 CVE-2024-35924 CVE-2024-35925 CVE-2024-35926 CVE-2024-35927 CVE-2024-35929 CVE-2024-35930 CVE-2024-35931 CVE-2024-35932 CVE-2024-35933 CVE-2024-35934 CVE-2024-35935 CVE-2024-35936 CVE-2024-35937 CVE-2024-35938 CVE-2024-35939 CVE-2024-35940 CVE-2024-35942 CVE-2024-35943 CVE-2024-35944 CVE-2024-35945 CVE-2024-35946 CVE-2024-35950 CVE-2024-35951 CVE-2024-35952 CVE-2024-35953 CVE-2024-35954 CVE-2024-35955 CVE-2024-35956 CVE-2024-35957 CVE-2024-35958 CVE-2024-35959 CVE-2024-35960 CVE-2024-35961 CVE-2024-35963 CVE-2024-35964 CVE-2024-35965 CVE-2024-35966 CVE-2024-35967 CVE-2024-35968 CVE-2024-35969 CVE-2024-35970 CVE-2024-35971 CVE-2024-35972 CVE-2024-35973 CVE-2024-35974 CVE-2024-35975 CVE-2024-35976 CVE-2024-35977 CVE-2024-35978 CVE-2024-35979 CVE-2024-35980 CVE-2024-35981 CVE-2024-35982 CVE-2024-35985 CVE-2024-36018 CVE-2024-36019 CVE-2024-36020 CVE-2024-36021 CVE-2024-36022 CVE-2024-36023 CVE-2024-36024 CVE-2024-36025 CVE-2024-36026 CVE-2024-36027 USN-6921-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Benedict Schlüter, Supraja Sridhara, Andrin Bertschi, and Shweta Shinde discovered that an untrusted hypervisor could inject malicious #VC interrupts and compromise the security guarantees of AMD SEV-SNP. This flaw is known as WeSee. A local attacker in control of the hypervisor could use this to expose sensitive information or possibly execute arbitrary code in the trusted execution environment. (CVE-2024-25742) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - DMA engine subsystem; - HID subsystem; - I2C subsystem; - PHY drivers; - TTY drivers; - IPv4 networking; (CVE-2024-35990, CVE-2024-35997, CVE-2024-35992, CVE-2024-35984, CVE-2024-36008, CVE-2024-36016) Update Instructions: Run `sudo pro fix USN-6921-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1007-gke - 6.8.0-1007.10 linux-gke - 6.8.0-1007.10 linux-gke-headers-6.8.0-1007 - 6.8.0-1007.10 linux-gke-tools-6.8.0-1007 - 6.8.0-1007.10 linux-headers-6.8.0-1007-gke - 6.8.0-1007.10 linux-headers-gke - 6.8.0-1007.10 linux-image-6.8.0-1007-gke - 6.8.0-1007.10 linux-image-gke - 6.8.0-1007.10 linux-image-unsigned-6.8.0-1007-gke - 6.8.0-1007.10 linux-modules-6.8.0-1007-gke - 6.8.0-1007.10 linux-modules-extra-6.8.0-1007-gke - 6.8.0-1007.10 linux-modules-iwlwifi-6.8.0-1007-gke - 6.8.0-1007.10 linux-modules-iwlwifi-gke - 6.8.0-1007.10 linux-tools-6.8.0-1007-gke - 6.8.0-1007.10 linux-tools-gke - 6.8.0-1007.10 No subscription required linux-buildinfo-6.8.0-1008-raspi - 6.8.0-1008.8 linux-headers-6.8.0-1008-raspi - 6.8.0-1008.8 linux-headers-raspi - 6.8.0-1008.8 linux-image-6.8.0-1008-raspi - 6.8.0-1008.8 linux-image-raspi - 6.8.0-1008.8 linux-modules-6.8.0-1008-raspi - 6.8.0-1008.8 linux-raspi - 6.8.0-1008.8 linux-raspi-headers-6.8.0-1008 - 6.8.0-1008.8 linux-raspi-tools-6.8.0-1008 - 6.8.0-1008.8 linux-tools-6.8.0-1008-raspi - 6.8.0-1008.8 linux-tools-raspi - 6.8.0-1008.8 No subscription required linux-buildinfo-6.8.0-1009-ibm - 6.8.0-1009.9 linux-buildinfo-6.8.0-1009-oem - 6.8.0-1009.9 linux-headers-6.8.0-1009-ibm - 6.8.0-1009.9 linux-headers-6.8.0-1009-oem - 6.8.0-1009.9 linux-headers-ibm - 6.8.0-1009.9 linux-headers-ibm-classic - 6.8.0-1009.9 linux-headers-ibm-lts-24.04 - 6.8.0-1009.9 linux-headers-oem-24.04 - 6.8.0-1009.9 linux-headers-oem-24.04a - 6.8.0-1009.9 linux-ibm - 6.8.0-1009.9 linux-ibm-classic - 6.8.0-1009.9 linux-ibm-cloud-tools-common - 6.8.0-1009.9 linux-ibm-headers-6.8.0-1009 - 6.8.0-1009.9 linux-ibm-lts-24.04 - 6.8.0-1009.9 linux-ibm-source-6.8.0 - 6.8.0-1009.9 linux-ibm-tools-6.8.0-1009 - 6.8.0-1009.9 linux-image-6.8.0-1009-ibm - 6.8.0-1009.9 linux-image-6.8.0-1009-oem - 6.8.0-1009.9 linux-image-ibm - 6.8.0-1009.9 linux-image-ibm-classic - 6.8.0-1009.9 linux-image-ibm-lts-24.04 - 6.8.0-1009.9 linux-image-oem-24.04 - 6.8.0-1009.9 linux-image-oem-24.04a - 6.8.0-1009.9 linux-image-uc-6.8.0-1009-oem - 6.8.0-1009.9 linux-image-uc-oem-24.04 - 6.8.0-1009.9 linux-image-uc-oem-24.04a - 6.8.0-1009.9 linux-image-unsigned-6.8.0-1009-ibm - 6.8.0-1009.9 linux-image-unsigned-6.8.0-1009-oem - 6.8.0-1009.9 linux-modules-6.8.0-1009-ibm - 6.8.0-1009.9 linux-modules-6.8.0-1009-oem - 6.8.0-1009.9 linux-modules-extra-6.8.0-1009-ibm - 6.8.0-1009.9 linux-modules-ipu6-6.8.0-1009-oem - 6.8.0-1009.9 linux-modules-ipu6-oem-24.04 - 6.8.0-1009.9 linux-modules-ipu6-oem-24.04a - 6.8.0-1009.9 linux-modules-iwlwifi-6.8.0-1009-ibm - 6.8.0-1009.9 linux-modules-iwlwifi-6.8.0-1009-oem - 6.8.0-1009.9 linux-modules-iwlwifi-ibm - 6.8.0-1009.9 linux-modules-iwlwifi-ibm-classic - 6.8.0-1009.9 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1009.9 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1009.9 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1009.9 linux-modules-usbio-6.8.0-1009-oem - 6.8.0-1009.9 linux-modules-usbio-oem-24.04 - 6.8.0-1009.9 linux-modules-usbio-oem-24.04a - 6.8.0-1009.9 linux-oem-24.04 - 6.8.0-1009.9 linux-oem-24.04a - 6.8.0-1009.9 linux-oem-6.8-headers-6.8.0-1009 - 6.8.0-1009.9 linux-oem-6.8-tools-6.8.0-1009 - 6.8.0-1009.9 linux-tools-6.8.0-1009-ibm - 6.8.0-1009.9 linux-tools-6.8.0-1009-oem - 6.8.0-1009.9 linux-tools-ibm - 6.8.0-1009.9 linux-tools-ibm-classic - 6.8.0-1009.9 linux-tools-ibm-lts-24.04 - 6.8.0-1009.9 linux-tools-oem-24.04 - 6.8.0-1009.9 linux-tools-oem-24.04a - 6.8.0-1009.9 No subscription required linux-buildinfo-6.8.0-1010-nvidia - 6.8.0-1010.10 linux-buildinfo-6.8.0-1010-nvidia-64k - 6.8.0-1010.10 linux-cloud-tools-nvidia - 6.8.0-1010.10 linux-headers-6.8.0-1010-nvidia - 6.8.0-1010.10 linux-headers-6.8.0-1010-nvidia-64k - 6.8.0-1010.10 linux-headers-nvidia - 6.8.0-1010.10 linux-headers-nvidia-64k - 6.8.0-1010.10 linux-image-6.8.0-1010-nvidia - 6.8.0-1010.10 linux-image-6.8.0-1010-nvidia-64k - 6.8.0-1010.10 linux-image-nvidia - 6.8.0-1010.10 linux-image-nvidia-64k - 6.8.0-1010.10 linux-image-uc-6.8.0-1010-nvidia - 6.8.0-1010.10 linux-image-uc-6.8.0-1010-nvidia-64k - 6.8.0-1010.10 linux-image-unsigned-6.8.0-1010-nvidia - 6.8.0-1010.10 linux-image-unsigned-6.8.0-1010-nvidia-64k - 6.8.0-1010.10 linux-modules-6.8.0-1010-nvidia - 6.8.0-1010.10 linux-modules-6.8.0-1010-nvidia-64k - 6.8.0-1010.10 linux-modules-extra-6.8.0-1010-nvidia - 6.8.0-1010.10 linux-modules-nvidia-fs-6.8.0-1010-nvidia - 6.8.0-1010.10 linux-modules-nvidia-fs-6.8.0-1010-nvidia-64k - 6.8.0-1010.10 linux-modules-nvidia-fs-nvidia - 6.8.0-1010.10 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1010.10 linux-nvidia - 6.8.0-1010.10 linux-nvidia-64k - 6.8.0-1010.10 linux-nvidia-headers-6.8.0-1010 - 6.8.0-1010.10 linux-nvidia-tools-6.8.0-1010 - 6.8.0-1010.10 linux-nvidia-tools-host - 6.8.0-1010.10 linux-tools-6.8.0-1010-nvidia - 6.8.0-1010.10 linux-tools-6.8.0-1010-nvidia-64k - 6.8.0-1010.10 linux-tools-nvidia - 6.8.0-1010.10 linux-tools-nvidia-64k - 6.8.0-1010.10 No subscription required linux-buildinfo-6.8.0-1011-gcp - 6.8.0-1011.12 linux-gcp - 6.8.0-1011.12 linux-gcp-headers-6.8.0-1011 - 6.8.0-1011.12 linux-gcp-tools-6.8.0-1011 - 6.8.0-1011.12 linux-headers-6.8.0-1011-gcp - 6.8.0-1011.12 linux-headers-gcp - 6.8.0-1011.12 linux-image-6.8.0-1011-gcp - 6.8.0-1011.12 linux-image-gcp - 6.8.0-1011.12 linux-image-unsigned-6.8.0-1011-gcp - 6.8.0-1011.12 linux-modules-6.8.0-1011-gcp - 6.8.0-1011.12 linux-modules-extra-6.8.0-1011-gcp - 6.8.0-1011.12 linux-modules-extra-gcp - 6.8.0-1011.12 linux-modules-iwlwifi-6.8.0-1011-gcp - 6.8.0-1011.12 linux-modules-iwlwifi-gcp - 6.8.0-1011.12 linux-tools-6.8.0-1011-gcp - 6.8.0-1011.12 linux-tools-gcp - 6.8.0-1011.12 No subscription required linux-aws - 6.8.0-1012.13 linux-aws-cloud-tools-6.8.0-1012 - 6.8.0-1012.13 linux-aws-headers-6.8.0-1012 - 6.8.0-1012.13 linux-aws-tools-6.8.0-1012 - 6.8.0-1012.13 linux-buildinfo-6.8.0-1012-aws - 6.8.0-1012.13 linux-cloud-tools-6.8.0-1012-aws - 6.8.0-1012.13 linux-headers-6.8.0-1012-aws - 6.8.0-1012.13 linux-headers-aws - 6.8.0-1012.13 linux-image-6.8.0-1012-aws - 6.8.0-1012.13 linux-image-aws - 6.8.0-1012.13 linux-image-unsigned-6.8.0-1012-aws - 6.8.0-1012.13 linux-modules-6.8.0-1012-aws - 6.8.0-1012.13 linux-modules-extra-6.8.0-1012-aws - 6.8.0-1012.13 linux-modules-extra-aws - 6.8.0-1012.13 linux-tools-6.8.0-1012-aws - 6.8.0-1012.13 linux-tools-aws - 6.8.0-1012.13 No subscription required linux-buildinfo-6.8.0-39-generic - 6.8.0-39.39 linux-buildinfo-6.8.0-39-generic-64k - 6.8.0-39.39 linux-cloud-tools-6.8.0-39 - 6.8.0-39.39 linux-cloud-tools-6.8.0-39-generic - 6.8.0-39.39 linux-cloud-tools-common - 6.8.0-39.39 linux-cloud-tools-generic - 6.8.0-39.39 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-39.39 linux-cloud-tools-generic-hwe-24.04-edge - 6.8.0-39.39 linux-cloud-tools-virtual - 6.8.0-39.39 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-39.39 linux-cloud-tools-virtual-hwe-24.04-edge - 6.8.0-39.39 linux-crashdump - 6.8.0-39.39 linux-doc - 6.8.0-39.39 linux-generic - 6.8.0-39.39 linux-generic-64k - 6.8.0-39.39 linux-generic-64k-hwe-24.04 - 6.8.0-39.39 linux-generic-64k-hwe-24.04-edge - 6.8.0-39.39 linux-generic-hwe-24.04 - 6.8.0-39.39 linux-generic-hwe-24.04-edge - 6.8.0-39.39 linux-generic-lpae - 6.8.0-39.39 linux-headers-6.8.0-39 - 6.8.0-39.39 linux-headers-6.8.0-39-generic - 6.8.0-39.39 linux-headers-6.8.0-39-generic-64k - 6.8.0-39.39 linux-headers-generic - 6.8.0-39.39 linux-headers-generic-64k - 6.8.0-39.39 linux-headers-generic-64k-hwe-24.04 - 6.8.0-39.39 linux-headers-generic-64k-hwe-24.04-edge - 6.8.0-39.39 linux-headers-generic-hwe-24.04 - 6.8.0-39.39 linux-headers-generic-hwe-24.04-edge - 6.8.0-39.39 linux-headers-generic-lpae - 6.8.0-39.39 linux-headers-kvm - 6.8.0-39.39 linux-headers-laptop-23.10 - 6.8.0-39.39 linux-headers-oem-20.04 - 6.8.0-39.39 linux-headers-oem-20.04b - 6.8.0-39.39 linux-headers-oem-20.04c - 6.8.0-39.39 linux-headers-oem-20.04d - 6.8.0-39.39 linux-headers-oem-22.04 - 6.8.0-39.39 linux-headers-virtual - 6.8.0-39.39 linux-headers-virtual-hwe-24.04 - 6.8.0-39.39 linux-headers-virtual-hwe-24.04-edge - 6.8.0-39.39 linux-image-6.8.0-39-generic - 6.8.0-39.39 linux-image-6.8.0-39-generic-64k - 6.8.0-39.39 linux-image-extra-virtual - 6.8.0-39.39 linux-image-extra-virtual-hwe-24.04 - 6.8.0-39.39 linux-image-extra-virtual-hwe-24.04-edge - 6.8.0-39.39 linux-image-generic - 6.8.0-39.39 linux-image-generic-64k - 6.8.0-39.39 linux-image-generic-64k-hwe-24.04 - 6.8.0-39.39 linux-image-generic-64k-hwe-24.04-edge - 6.8.0-39.39 linux-image-generic-hwe-24.04 - 6.8.0-39.39 linux-image-generic-hwe-24.04-edge - 6.8.0-39.39 linux-image-generic-lpae - 6.8.0-39.39 linux-image-kvm - 6.8.0-39.39 linux-image-laptop-23.10 - 6.8.0-39.39 linux-image-oem-20.04 - 6.8.0-39.39 linux-image-oem-20.04b - 6.8.0-39.39 linux-image-oem-20.04c - 6.8.0-39.39 linux-image-oem-20.04d - 6.8.0-39.39 linux-image-oem-22.04 - 6.8.0-39.39 linux-image-uc-6.8.0-39-generic - 6.8.0-39.39 linux-image-uc-6.8.0-39-generic-64k - 6.8.0-39.39 linux-image-uc-generic - 6.8.0-39.39 linux-image-uc-generic-hwe-24.04 - 6.8.0-39.39 linux-image-uc-generic-hwe-24.04-edge - 6.8.0-39.39 linux-image-unsigned-6.8.0-39-generic - 6.8.0-39.39 linux-image-unsigned-6.8.0-39-generic-64k - 6.8.0-39.39 linux-image-virtual - 6.8.0-39.39 linux-image-virtual-hwe-24.04 - 6.8.0-39.39 linux-image-virtual-hwe-24.04-edge - 6.8.0-39.39 linux-kvm - 6.8.0-39.39 linux-laptop-23.10 - 6.8.0-39.39 linux-lib-rust-6.8.0-39-generic - 6.8.0-39.39 linux-libc-dev - 6.8.0-39.39 linux-modules-6.8.0-39-generic - 6.8.0-39.39 linux-modules-6.8.0-39-generic-64k - 6.8.0-39.39 linux-modules-extra-6.8.0-39-generic - 6.8.0-39.39 linux-modules-ipu6-6.8.0-39-generic - 6.8.0-39.39 linux-modules-ipu6-generic - 6.8.0-39.39 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-39.39 linux-modules-ipu6-generic-hwe-24.04-edge - 6.8.0-39.39 linux-modules-iwlwifi-6.8.0-39-generic - 6.8.0-39.39 linux-modules-iwlwifi-generic - 6.8.0-39.39 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-39.39 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.8.0-39.39 linux-modules-iwlwifi-oem-20.04 - 6.8.0-39.39 linux-modules-iwlwifi-oem-20.04d - 6.8.0-39.39 linux-modules-iwlwifi-oem-22.04 - 6.8.0-39.39 linux-modules-usbio-6.8.0-39-generic - 6.8.0-39.39 linux-modules-usbio-generic - 6.8.0-39.39 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-39.39 linux-modules-usbio-generic-hwe-24.04-edge - 6.8.0-39.39 linux-oem-20.04 - 6.8.0-39.39 linux-oem-20.04b - 6.8.0-39.39 linux-oem-20.04c - 6.8.0-39.39 linux-oem-20.04d - 6.8.0-39.39 linux-oem-22.04 - 6.8.0-39.39 linux-source - 6.8.0-39.39 linux-source-6.8.0 - 6.8.0-39.39 linux-tools-6.8.0-39 - 6.8.0-39.39 linux-tools-6.8.0-39-generic - 6.8.0-39.39 linux-tools-6.8.0-39-generic-64k - 6.8.0-39.39 linux-tools-common - 6.8.0-39.39 linux-tools-generic - 6.8.0-39.39 linux-tools-generic-64k - 6.8.0-39.39 linux-tools-generic-64k-hwe-24.04 - 6.8.0-39.39 linux-tools-generic-64k-hwe-24.04-edge - 6.8.0-39.39 linux-tools-generic-hwe-24.04 - 6.8.0-39.39 linux-tools-generic-hwe-24.04-edge - 6.8.0-39.39 linux-tools-generic-lpae - 6.8.0-39.39 linux-tools-host - 6.8.0-39.39 linux-tools-kvm - 6.8.0-39.39 linux-tools-laptop-23.10 - 6.8.0-39.39 linux-tools-oem-20.04 - 6.8.0-39.39 linux-tools-oem-20.04b - 6.8.0-39.39 linux-tools-oem-20.04c - 6.8.0-39.39 linux-tools-oem-20.04d - 6.8.0-39.39 linux-tools-oem-22.04 - 6.8.0-39.39 linux-tools-virtual - 6.8.0-39.39 linux-tools-virtual-hwe-24.04 - 6.8.0-39.39 linux-tools-virtual-hwe-24.04-edge - 6.8.0-39.39 linux-virtual - 6.8.0-39.39 linux-virtual-hwe-24.04 - 6.8.0-39.39 linux-virtual-hwe-24.04-edge - 6.8.0-39.39 No subscription required High CVE-2024-25742 CVE-2024-35984 CVE-2024-35990 CVE-2024-35992 CVE-2024-35997 CVE-2024-36008 CVE-2024-36016 USN-6921-2 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Benedict Schlüter, Supraja Sridhara, Andrin Bertschi, and Shweta Shinde discovered that an untrusted hypervisor could inject malicious #VC interrupts and compromise the security guarantees of AMD SEV-SNP. This flaw is known as WeSee. A local attacker in control of the hypervisor could use this to expose sensitive information or possibly execute arbitrary code in the trusted execution environment. (CVE-2024-25742) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - DMA engine subsystem; - HID subsystem; - I2C subsystem; - PHY drivers; - TTY drivers; - IPv4 networking; (CVE-2024-35997, CVE-2024-36016, CVE-2024-35990, CVE-2024-35984, CVE-2024-35992, CVE-2024-36008) Update Instructions: Run `sudo pro fix USN-6921-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-39-lowlatency - 6.8.0-39.39.1 linux-buildinfo-6.8.0-39-lowlatency-64k - 6.8.0-39.39.1 linux-cloud-tools-6.8.0-39-lowlatency - 6.8.0-39.39.1 linux-cloud-tools-lowlatency - 6.8.0-39.39.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-39.39.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-39.39.1 linux-cloud-tools-lowlatency-hwe-22.04 - 6.8.0-39.39.1 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.8.0-39.39.1 linux-headers-6.8.0-39-lowlatency - 6.8.0-39.39.1 linux-headers-6.8.0-39-lowlatency-64k - 6.8.0-39.39.1 linux-headers-lowlatency - 6.8.0-39.39.1 linux-headers-lowlatency-64k - 6.8.0-39.39.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-39.39.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-39.39.1 linux-headers-lowlatency-64k-hwe-22.04 - 6.8.0-39.39.1 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.8.0-39.39.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-39.39.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-39.39.1 linux-headers-lowlatency-hwe-22.04 - 6.8.0-39.39.1 linux-headers-lowlatency-hwe-22.04-edge - 6.8.0-39.39.1 linux-image-6.8.0-39-lowlatency - 6.8.0-39.39.1 linux-image-6.8.0-39-lowlatency-64k - 6.8.0-39.39.1 linux-image-lowlatency - 6.8.0-39.39.1 linux-image-lowlatency-64k - 6.8.0-39.39.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-39.39.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-39.39.1 linux-image-lowlatency-64k-hwe-22.04 - 6.8.0-39.39.1 linux-image-lowlatency-64k-hwe-22.04-edge - 6.8.0-39.39.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-39.39.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-39.39.1 linux-image-lowlatency-hwe-22.04 - 6.8.0-39.39.1 linux-image-lowlatency-hwe-22.04-edge - 6.8.0-39.39.1 linux-image-unsigned-6.8.0-39-lowlatency - 6.8.0-39.39.1 linux-image-unsigned-6.8.0-39-lowlatency-64k - 6.8.0-39.39.1 linux-lowlatency - 6.8.0-39.39.1 linux-lowlatency-64k - 6.8.0-39.39.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-39.39.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-39.39.1 linux-lowlatency-64k-hwe-22.04 - 6.8.0-39.39.1 linux-lowlatency-64k-hwe-22.04-edge - 6.8.0-39.39.1 linux-lowlatency-cloud-tools-6.8.0-39 - 6.8.0-39.39.1 linux-lowlatency-cloud-tools-common - 6.8.0-39.39.1 linux-lowlatency-headers-6.8.0-39 - 6.8.0-39.39.1 linux-lowlatency-hwe-20.04 - 6.8.0-39.39.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-39.39.1 linux-lowlatency-hwe-22.04 - 6.8.0-39.39.1 linux-lowlatency-hwe-22.04-edge - 6.8.0-39.39.1 linux-lowlatency-lib-rust-6.8.0-39-lowlatency - 6.8.0-39.39.1 linux-lowlatency-tools-6.8.0-39 - 6.8.0-39.39.1 linux-lowlatency-tools-common - 6.8.0-39.39.1 linux-lowlatency-tools-host - 6.8.0-39.39.1 linux-modules-6.8.0-39-lowlatency - 6.8.0-39.39.1 linux-modules-6.8.0-39-lowlatency-64k - 6.8.0-39.39.1 linux-modules-iwlwifi-6.8.0-39-lowlatency - 6.8.0-39.39.1 linux-modules-iwlwifi-lowlatency - 6.8.0-39.39.1 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.8.0-39.39.1 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.8.0-39.39.1 linux-tools-6.8.0-39-lowlatency - 6.8.0-39.39.1 linux-tools-6.8.0-39-lowlatency-64k - 6.8.0-39.39.1 linux-tools-lowlatency - 6.8.0-39.39.1 linux-tools-lowlatency-64k - 6.8.0-39.39.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-39.39.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-39.39.1 linux-tools-lowlatency-64k-hwe-22.04 - 6.8.0-39.39.1 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.8.0-39.39.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-39.39.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-39.39.1 linux-tools-lowlatency-hwe-22.04 - 6.8.0-39.39.1 linux-tools-lowlatency-hwe-22.04-edge - 6.8.0-39.39.1 No subscription required High CVE-2024-25742 CVE-2024-35984 CVE-2024-35990 CVE-2024-35992 CVE-2024-35997 CVE-2024-36008 CVE-2024-36016 USN-6929-1 -- OpenJDK 8 vulnerabilities Ubuntu 24.04 LTS It was discovered that the Hotspot component of OpenJDK 8 was not properly performing bounds when handling certain UTF-8 strings, which could lead to a buffer overflow. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-21131) It was discovered that the Hotspot component of OpenJDK 8 could be made to run into an infinite loop. If an automated system were tricked into processing excessively large symbols, an attacker could possibly use this issue to cause a denial of service. (CVE-2024-21138) It was discovered that the Hotspot component of OpenJDK 8 did not properly perform range check elimination. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. (CVE-2024-21140) Yakov Shafranovich discovered that the Concurrency component of OpenJDK 8 incorrectly performed header validation in the Pack200 archive format. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-21144) Sergey Bylokhov discovered that OpenJDK 8 did not properly manage memory when handling 2D images. An attacker could possibly use this issue to obtain sensitive information. (CVE-2024-21145) It was discovered that the Hotspot component of OpenJDK 8 incorrectly handled memory when performing range check elimination under certain circumstances. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. (CVE-2024-21147) Update Instructions: Run `sudo pro fix USN-6929-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-8-demo - 8u422-b05-1~24.04 openjdk-8-doc - 8u422-b05-1~24.04 openjdk-8-jdk - 8u422-b05-1~24.04 openjdk-8-jdk-headless - 8u422-b05-1~24.04 openjdk-8-jre - 8u422-b05-1~24.04 openjdk-8-jre-headless - 8u422-b05-1~24.04 openjdk-8-jre-zero - 8u422-b05-1~24.04 openjdk-8-source - 8u422-b05-1~24.04 No subscription required Medium CVE-2024-21131 CVE-2024-21138 CVE-2024-21140 CVE-2024-21144 CVE-2024-21145 CVE-2024-21147 USN-6930-1 -- OpenJDK 11 vulnerabilities Ubuntu 24.04 LTS It was discovered that the Hotspot component of OpenJDK 11 was not properly performing bounds when handling certain UTF-8 strings, which could lead to a buffer overflow. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-21131) It was discovered that the Hotspot component of OpenJDK 11 could be made to run into an infinite loop. If an automated system were tricked into processing excessively large symbols, an attacker could possibly use this issue to cause a denial of service. (CVE-2024-21138) It was discovered that the Hotspot component of OpenJDK 11 did not properly perform range check elimination. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. (CVE-2024-21140) Yakov Shafranovich discovered that the Concurrency component of OpenJDK 11 incorrectly performed header validation in the Pack200 archive format. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-21144) Sergey Bylokhov discovered that OpenJDK 11 did not properly manage memory when handling 2D images. An attacker could possibly use this issue to obtain sensitive information. (CVE-2024-21145) It was discovered that the Hotspot component of OpenJDK 11 incorrectly handled memory when performing range check elimination under certain circumstances. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. (CVE-2024-21147) Update Instructions: Run `sudo pro fix USN-6930-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-11-demo - 11.0.24+8-1ubuntu3~24.04.1 openjdk-11-doc - 11.0.24+8-1ubuntu3~24.04.1 openjdk-11-jdk - 11.0.24+8-1ubuntu3~24.04.1 openjdk-11-jdk-headless - 11.0.24+8-1ubuntu3~24.04.1 openjdk-11-jre - 11.0.24+8-1ubuntu3~24.04.1 openjdk-11-jre-headless - 11.0.24+8-1ubuntu3~24.04.1 openjdk-11-jre-zero - 11.0.24+8-1ubuntu3~24.04.1 openjdk-11-source - 11.0.24+8-1ubuntu3~24.04.1 No subscription required Medium CVE-2024-21131 CVE-2024-21138 CVE-2024-21140 CVE-2024-21144 CVE-2024-21145 CVE-2024-21147 USN-6931-1 -- OpenJDK 17 vulnerabilities Ubuntu 24.04 LTS It was discovered that the Hotspot component of OpenJDK 17 was not properly performing bounds when handling certain UTF-8 strings, which could lead to a buffer overflow. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-21131) It was discovered that the Hotspot component of OpenJDK 17 could be made to run into an infinite loop. If an automated system were tricked into processing excessively large symbols, an attacker could possibly use this issue to cause a denial of service. (CVE-2024-21138) It was discovered that the Hotspot component of OpenJDK 17 did not properly perform range check elimination. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. (CVE-2024-21140) Sergey Bylokhov discovered that OpenJDK 17 did not properly manage memory when handling 2D images. An attacker could possibly use this issue to obtain sensitive information. (CVE-2024-21145) It was discovered that the Hotspot component of OpenJDK 17 incorrectly handled memory when performing range check elimination under certain circumstances. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. (CVE-2024-21147) Update Instructions: Run `sudo pro fix USN-6931-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-17-demo - 17.0.12+7-1ubuntu2~24.04 openjdk-17-doc - 17.0.12+7-1ubuntu2~24.04 openjdk-17-jdk - 17.0.12+7-1ubuntu2~24.04 openjdk-17-jdk-headless - 17.0.12+7-1ubuntu2~24.04 openjdk-17-jre - 17.0.12+7-1ubuntu2~24.04 openjdk-17-jre-headless - 17.0.12+7-1ubuntu2~24.04 openjdk-17-jre-zero - 17.0.12+7-1ubuntu2~24.04 openjdk-17-source - 17.0.12+7-1ubuntu2~24.04 No subscription required Medium CVE-2024-21131 CVE-2024-21138 CVE-2024-21140 CVE-2024-21145 CVE-2024-21147 USN-6932-1 -- OpenJDK 21 vulnerabilities Ubuntu 24.04 LTS It was discovered that the Hotspot component of OpenJDK 21 was not properly performing bounds when handling certain UTF-8 strings, which could lead to a buffer overflow. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-21131) It was discovered that the Hotspot component of OpenJDK 21 could be made to run into an infinite loop. If an automated system were tricked into processing excessively large symbols, an attacker could possibly use this issue to cause a denial of service. (CVE-2024-21138) It was discovered that the Hotspot component of OpenJDK 21 did not properly perform range check elimination. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. (CVE-2024-21140) Sergey Bylokhov discovered that OpenJDK 21 did not properly manage memory when handling 2D images. An attacker could possibly use this issue to obtain sensitive information. (CVE-2024-21145) It was discovered that the Hotspot component of OpenJDK 21 incorrectly handled memory when performing range check elimination under certain circumstances. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. (CVE-2024-21147) Update Instructions: Run `sudo pro fix USN-6932-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openjdk-21-demo - 21.0.4+7-1ubuntu2~24.04 openjdk-21-doc - 21.0.4+7-1ubuntu2~24.04 openjdk-21-jdk - 21.0.4+7-1ubuntu2~24.04 openjdk-21-jdk-headless - 21.0.4+7-1ubuntu2~24.04 openjdk-21-jre - 21.0.4+7-1ubuntu2~24.04 openjdk-21-jre-headless - 21.0.4+7-1ubuntu2~24.04 openjdk-21-jre-zero - 21.0.4+7-1ubuntu2~24.04 openjdk-21-source - 21.0.4+7-1ubuntu2~24.04 openjdk-21-testsupport - 21.0.4+7-1ubuntu2~24.04 No subscription required Medium CVE-2024-21131 CVE-2024-21138 CVE-2024-21140 CVE-2024-21145 CVE-2024-21147 USN-6934-1 -- MySQL vulnerabilities Ubuntu 24.04 LTS Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 8.0.39 in Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 24.04 LTS. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information: https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-38.html https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-39.html https://www.oracle.com/security-alerts/cpujul2024.html Update Instructions: Run `sudo pro fix USN-6934-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libmysqlclient-dev - 8.0.39-0ubuntu0.24.04.1 libmysqlclient21 - 8.0.39-0ubuntu0.24.04.1 mysql-client - 8.0.39-0ubuntu0.24.04.1 mysql-client-8.0 - 8.0.39-0ubuntu0.24.04.1 mysql-client-core-8.0 - 8.0.39-0ubuntu0.24.04.1 mysql-router - 8.0.39-0ubuntu0.24.04.1 mysql-server - 8.0.39-0ubuntu0.24.04.1 mysql-server-8.0 - 8.0.39-0ubuntu0.24.04.1 mysql-server-core-8.0 - 8.0.39-0ubuntu0.24.04.1 mysql-source-8.0 - 8.0.39-0ubuntu0.24.04.1 mysql-testsuite - 8.0.39-0ubuntu0.24.04.1 mysql-testsuite-8.0 - 8.0.39-0ubuntu0.24.04.1 No subscription required Medium CVE-2024-20996 CVE-2024-21125 CVE-2024-21127 CVE-2024-21129 CVE-2024-21130 CVE-2024-21134 CVE-2024-21142 CVE-2024-21162 CVE-2024-21163 CVE-2024-21165 CVE-2024-21171 CVE-2024-21173 CVE-2024-21177 CVE-2024-21179 CVE-2024-21185 USN-6937-1 -- OpenSSL vulnerabilities Ubuntu 24.04 LTS It was discovered that OpenSSL incorrectly handled TLSv1.3 sessions when certain non-default TLS server configurations were in use. A remote attacker could possibly use this issue to cause OpenSSL to consume resources, leading to a denial of service. (CVE-2024-2511) It was discovered that OpenSSL incorrectly handled checking excessively long DSA keys or parameters. A remote attacker could possibly use this issue to cause OpenSSL to consume resources, leading to a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-4603) William Ahern discovered that OpenSSL incorrectly handled certain memory operations in a rarely-used API. A remote attacker could use this issue to cause OpenSSL to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2024-4741) Joseph Birr-Pixton discovered that OpenSSL incorrectly handled calling a certain API with an empty supported client protocols buffer. A remote attacker could possibly use this issue to obtain sensitive information, or cause OpenSSL to crash, resulting in a denial of service. (CVE-2024-5535) Update Instructions: Run `sudo pro fix USN-6937-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libssl-dev - 3.0.13-0ubuntu3.2 libssl-doc - 3.0.13-0ubuntu3.2 libssl3t64 - 3.0.13-0ubuntu3.2 openssl - 3.0.13-0ubuntu3.2 No subscription required Low CVE-2024-2511 CVE-2024-4603 CVE-2024-4741 CVE-2024-5535 USN-6939-1 -- Exim vulnerability Ubuntu 24.04 LTS Phillip Szelat discovered that Exim misparses multiline MIME header filenames. A remote attacker could use this issue to bypass a MIME filename extension-blocking protection mechanism and possibly deliver executable attachments to the mailboxes of end users. Update Instructions: Run `sudo pro fix USN-6939-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: exim4 - 4.97-4ubuntu4.1 exim4-base - 4.97-4ubuntu4.1 exim4-config - 4.97-4ubuntu4.1 exim4-daemon-heavy - 4.97-4ubuntu4.1 exim4-daemon-light - 4.97-4ubuntu4.1 exim4-dev - 4.97-4ubuntu4.1 eximon4 - 4.97-4ubuntu4.1 No subscription required Medium CVE-2024-39929 USN-6940-1 -- snapd vulnerabilities Ubuntu 24.04 LTS Neil McPhail discovered that snapd did not properly restrict writes to the $HOME/bin path in the AppArmor profile for snaps using the home plug. An attacker who could convince a user to install a malicious snap could use this vulnerability to escape the snap sandbox. (CVE-2024-1724) Zeyad Gouda discovered that snapd failed to properly check the file type when extracting a snap. An attacker who could convince a user to install a malicious snap containing non-regular files could then cause snapd to block indefinitely while trying to read from such files and cause a denial of service. (CVE-2024-29068) Zeyad Gouda discovered that snapd failed to properly check the destination of symbolic links when extracting a snap. An attacker who could convince a user to install a malicious snap containing crafted symbolic links could then cause snapd to write out the contents of the symbolic link destination into a world-readable directory. This in-turn could allow a local unprivileged user to gain access to privileged information. (CVE-2024-29069) Update Instructions: Run `sudo pro fix USN-6940-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: golang-github-snapcore-snapd-dev - 2.63+24.04ubuntu0.1 golang-github-ubuntu-core-snappy-dev - 2.63+24.04ubuntu0.1 snap-confine - 2.63+24.04ubuntu0.1 snapd - 2.63+24.04ubuntu0.1 snapd-xdg-open - 2.63+24.04ubuntu0.1 ubuntu-core-launcher - 2.63+24.04ubuntu0.1 ubuntu-core-snapd-units - 2.63+24.04ubuntu0.1 ubuntu-snappy - 2.63+24.04ubuntu0.1 ubuntu-snappy-cli - 2.63+24.04ubuntu0.1 No subscription required Medium CVE-2024-1724 CVE-2024-29068 CVE-2024-29069 USN-6941-1 -- Python vulnerability Ubuntu 24.04 LTS It was discovered that the Python ipaddress module contained incorrect information about which IP address ranges were considered “private” or “globally reachable”. This could possibly result in applications applying incorrect security policies. Update Instructions: Run `sudo pro fix USN-6941-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: idle-python3.12 - 3.12.3-1ubuntu0.1 libpython3.12-dev - 3.12.3-1ubuntu0.1 libpython3.12-minimal - 3.12.3-1ubuntu0.1 libpython3.12-stdlib - 3.12.3-1ubuntu0.1 libpython3.12-testsuite - 3.12.3-1ubuntu0.1 libpython3.12t64 - 3.12.3-1ubuntu0.1 python3.12 - 3.12.3-1ubuntu0.1 python3.12-dev - 3.12.3-1ubuntu0.1 python3.12-doc - 3.12.3-1ubuntu0.1 python3.12-examples - 3.12.3-1ubuntu0.1 python3.12-full - 3.12.3-1ubuntu0.1 python3.12-minimal - 3.12.3-1ubuntu0.1 python3.12-nopie - 3.12.3-1ubuntu0.1 python3.12-venv - 3.12.3-1ubuntu0.1 No subscription required Low CVE-2024-4032 USN-6942-1 -- Gross vulnerability Ubuntu 24.04 LTS It was discovered that Gross incorrectly handled memory when composing log entries. An attacker could possibly use this issue to cause Gross to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6942-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gross - 1.0.2-4ubuntu0.24.04.1 No subscription required Medium CVE-2023-52159 USN-6944-1 -- curl vulnerability Ubuntu 24.04 LTS Dov Murik discovered that curl incorrectly handled parsing ASN.1 Generalized Time fields. A remote attacker could use this issue to cause curl to crash, resulting in a denial of service, or possibly obtain sensitive memory contents. Update Instructions: Run `sudo pro fix USN-6944-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: curl - 8.5.0-2ubuntu10.2 libcurl3t64-gnutls - 8.5.0-2ubuntu10.2 libcurl4-doc - 8.5.0-2ubuntu10.2 libcurl4-gnutls-dev - 8.5.0-2ubuntu10.2 libcurl4-openssl-dev - 8.5.0-2ubuntu10.2 libcurl4t64 - 8.5.0-2ubuntu10.2 No subscription required Medium CVE-2024-7264 USN-6945-1 -- wpa_supplicant and hostapd vulnerability Ubuntu 24.04 LTS Rory McNamara discovered that wpa_supplicant could be made to load arbitrary shared objects by unprivileged users that have access to the control interface. An attacker could use this to escalate privileges to root. Update Instructions: Run `sudo pro fix USN-6945-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: eapoltest - 2:2.10-21ubuntu0.1 hostapd - 2:2.10-21ubuntu0.1 libwpa-client-dev - 2:2.10-21ubuntu0.1 wpagui - 2:2.10-21ubuntu0.1 wpasupplicant - 2:2.10-21ubuntu0.1 No subscription required Medium CVE-2024-5290 https://launchpad.net/bugs/2067613 USN-6946-1 -- Django vulnerabilities Ubuntu 24.04 LTS It was discovered that Django incorrectly handled certain strings in floatformat function. An attacker could possibly use this issue to cause a memory exhaustion. (CVE-2024-41989) It was discovered that Django incorrectly handled very large inputs. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-41990) It was discovered that Django in AdminURLFieldWidget incorrectly handled certain inputs with a very large number of Unicode characters. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-41991) It was discovered that Django incorrectly handled certain JSON objects. An attacker could possibly use this issue to cause a potential SQL injection. This issue only affected Ubuntu 22.04 LTS, and Ubuntu 24.04 LTS. (CVE-2024-42005) Update Instructions: Run `sudo pro fix USN-6946-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-django-doc - 3:4.2.11-1ubuntu1.2 python3-django - 3:4.2.11-1ubuntu1.2 No subscription required Medium CVE-2024-41989 CVE-2024-41990 CVE-2024-41991 CVE-2024-42005 USN-6947-1 -- Kerberos vulnerabilities Ubuntu 24.04 LTS It was discovered that Kerberos incorrectly handled GSS message tokens where an unwrapped token could appear to be truncated. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-37370) It was discovered that Kerberos incorrectly handled GSS message tokens when sent a token with invalid length fields. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-37371) Update Instructions: Run `sudo pro fix USN-6947-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: krb5-admin-server - 1.20.1-6ubuntu2.1 krb5-doc - 1.20.1-6ubuntu2.1 krb5-gss-samples - 1.20.1-6ubuntu2.1 krb5-k5tls - 1.20.1-6ubuntu2.1 krb5-kdc - 1.20.1-6ubuntu2.1 krb5-kdc-ldap - 1.20.1-6ubuntu2.1 krb5-kpropd - 1.20.1-6ubuntu2.1 krb5-locales - 1.20.1-6ubuntu2.1 krb5-multidev - 1.20.1-6ubuntu2.1 krb5-otp - 1.20.1-6ubuntu2.1 krb5-pkinit - 1.20.1-6ubuntu2.1 krb5-user - 1.20.1-6ubuntu2.1 libgssapi-krb5-2 - 1.20.1-6ubuntu2.1 libgssrpc4t64 - 1.20.1-6ubuntu2.1 libk5crypto3 - 1.20.1-6ubuntu2.1 libkadm5clnt-mit12 - 1.20.1-6ubuntu2.1 libkadm5srv-mit12 - 1.20.1-6ubuntu2.1 libkdb5-10t64 - 1.20.1-6ubuntu2.1 libkrad-dev - 1.20.1-6ubuntu2.1 libkrad0 - 1.20.1-6ubuntu2.1 libkrb5-3 - 1.20.1-6ubuntu2.1 libkrb5-dev - 1.20.1-6ubuntu2.1 libkrb5support0 - 1.20.1-6ubuntu2.1 No subscription required Medium CVE-2024-37370 CVE-2024-37371 USN-6949-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - ARM64 architecture; - M68K architecture; - OpenRISC architecture; - PowerPC architecture; - RISC-V architecture; - x86 architecture; - Block layer subsystem; - Accessibility subsystem; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - DMA engine subsystem; - DPLL subsystem; - FireWire subsystem; - EFI core; - Qualcomm firmware drivers; - GPIO subsystem; - GPU drivers; - Microsoft Hyper-V drivers; - InfiniBand drivers; - IOMMU subsystem; - IRQ chip drivers; - Macintosh device drivers; - Multiple devices driver; - Media drivers; - EEPROM drivers; - MMC subsystem; - Network drivers; - STMicroelectronics network drivers; - Device tree and open firmware driver; - HiSilicon SoC PMU drivers; - PHY drivers; - Pin controllers subsystem; - Remote Processor subsystem; - S/390 drivers; - SCSI drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - Userspace I/O drivers; - USB subsystem; - DesignWare USB3 driver; - ACRN Hypervisor Service Module driver; - Virtio drivers; - 9P distributed file system; - BTRFS file system; - eCrypt file system; - EROFS file system; - File systems infrastructure; - GFS2 file system; - JFFS2 file system; - Network file systems library; - Network file system client; - Network file system server daemon; - NILFS2 file system; - Proc file system; - SMB network file system; - Tracing file system; - Mellanox drivers; - Memory management; - Socket messages infrastructure; - Slab allocator; - Tracing infrastructure; - User-space API (UAPI); - Core kernel; - BPF subsystem; - DMA mapping infrastructure; - RCU subsystem; - Dynamic debug library; - KUnit library; - Maple Tree data structure library; - Heterogeneous memory management; - Amateur Radio drivers; - Bluetooth subsystem; - Ethernet bridge; - Networking core; - IPv4 networking; - IPv6 networking; - Multipath TCP; - Netfilter; - NET/ROM layer; - NFC subsystem; - NSH protocol; - Open vSwitch; - Phonet protocol; - SMC sockets; - TIPC protocol; - Unix domain sockets; - Wireless networking; - Key management; - ALSA framework; - HD-audio driver; - Kirkwood ASoC drivers; - MediaTek ASoC drivers; (CVE-2024-36006, CVE-2024-36922, CVE-2024-38567, CVE-2024-38584, CVE-2024-36923, CVE-2024-36892, CVE-2024-35855, CVE-2024-35853, CVE-2024-38562, CVE-2024-36920, CVE-2024-38543, CVE-2024-38576, CVE-2024-38572, CVE-2024-36898, CVE-2024-38560, CVE-2024-36004, CVE-2024-36956, CVE-2024-36881, CVE-2024-36977, CVE-2024-36955, CVE-2024-36906, CVE-2024-36013, CVE-2024-36884, CVE-2024-38563, CVE-2024-36966, CVE-2024-38547, CVE-2024-38594, CVE-2024-36926, CVE-2024-38587, CVE-2024-38566, CVE-2024-27400, CVE-2024-36941, CVE-2024-36017, CVE-2024-38544, CVE-2024-36899, CVE-2024-35851, CVE-2024-38577, CVE-2024-38590, CVE-2024-38568, CVE-2024-38559, CVE-2024-38611, CVE-2024-36887, CVE-2024-36886, CVE-2024-35996, CVE-2024-38612, CVE-2024-36925, CVE-2024-38586, CVE-2024-38596, CVE-2024-36932, CVE-2024-39482, CVE-2024-38585, CVE-2024-36033, CVE-2024-38614, CVE-2024-35852, CVE-2024-36908, CVE-2024-36939, CVE-2024-36963, CVE-2024-27401, CVE-2024-36029, CVE-2024-38540, CVE-2024-38565, CVE-2024-36927, CVE-2024-36910, CVE-2024-42134, CVE-2024-36888, CVE-2024-35859, CVE-2024-36911, CVE-2024-35947, CVE-2024-36940, CVE-2024-36921, CVE-2024-36913, CVE-2024-36943, CVE-2024-35986, CVE-2024-38616, CVE-2024-36900, CVE-2024-36954, CVE-2024-36915, CVE-2024-38602, CVE-2024-41011, CVE-2024-35991, CVE-2024-36909, CVE-2024-38603, CVE-2023-52882, CVE-2024-36953, CVE-2024-38599, CVE-2024-38574, CVE-2024-36967, CVE-2024-36895, CVE-2024-36003, CVE-2024-36961, CVE-2024-38545, CVE-2024-38538, CVE-2024-36001, CVE-2024-36912, CVE-2024-36952, CVE-2024-38550, CVE-2024-38570, CVE-2024-36969, CVE-2024-38595, CVE-2024-35849, CVE-2024-36936, CVE-2024-35949, CVE-2024-36009, CVE-2024-35987, CVE-2024-38541, CVE-2024-38564, CVE-2024-36032, CVE-2024-38615, CVE-2024-36960, CVE-2024-36934, CVE-2024-36951, CVE-2024-35999, CVE-2024-38551, CVE-2024-36903, CVE-2024-36931, CVE-2024-38593, CVE-2024-36938, CVE-2024-38607, CVE-2024-36928, CVE-2024-38552, CVE-2024-36002, CVE-2024-38605, CVE-2024-38582, CVE-2024-36933, CVE-2024-38620, CVE-2024-27395, CVE-2024-27396, CVE-2024-36012, CVE-2024-38591, CVE-2024-38597, CVE-2024-36889, CVE-2024-36964, CVE-2024-38606, CVE-2024-38553, CVE-2024-36945, CVE-2024-35848, CVE-2024-36962, CVE-2024-36947, CVE-2024-27399, CVE-2024-38546, CVE-2024-38583, CVE-2024-38573, CVE-2024-35850, CVE-2024-38549, CVE-2024-38588, CVE-2024-38610, CVE-2024-36917, CVE-2024-36957, CVE-2024-35846, CVE-2024-38579, CVE-2024-36965, CVE-2024-35857, CVE-2024-38548, CVE-2024-36975, CVE-2024-36919, CVE-2024-38542, CVE-2024-36948, CVE-2024-36011, CVE-2024-38556, CVE-2024-36897, CVE-2024-38557, CVE-2024-36890, CVE-2024-36882, CVE-2024-38613, CVE-2024-36914, CVE-2024-35998, CVE-2024-36958, CVE-2024-38580, CVE-2024-36896, CVE-2024-36891, CVE-2024-36924, CVE-2024-38589, CVE-2024-38592, CVE-2024-36904, CVE-2024-36894, CVE-2024-36028, CVE-2024-36014, CVE-2024-36880, CVE-2024-36944, CVE-2024-38598, CVE-2024-36929, CVE-2024-36883, CVE-2024-35858, CVE-2024-38555, CVE-2024-36005, CVE-2024-38539, CVE-2024-35994, CVE-2024-36030, CVE-2024-27394, CVE-2024-36930, CVE-2024-36937, CVE-2024-38561, CVE-2024-38578, CVE-2024-36959, CVE-2024-36935, CVE-2024-36916, CVE-2024-36902, CVE-2024-38604, CVE-2024-38554, CVE-2024-38575, CVE-2024-36918, CVE-2024-36979, CVE-2024-35854, CVE-2024-36968, CVE-2024-38558, CVE-2024-36000, CVE-2024-27398, CVE-2024-35983, CVE-2024-36949, CVE-2024-38600, CVE-2024-36950, CVE-2024-36946, CVE-2024-36031, CVE-2024-35847, CVE-2024-36905, CVE-2024-38571, CVE-2024-36007, CVE-2024-35856, CVE-2024-38601, CVE-2024-38569, CVE-2024-38617, CVE-2024-35988, CVE-2024-35989, CVE-2024-35993, CVE-2024-36893, CVE-2024-36901) Update Instructions: Run `sudo pro fix USN-6949-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1008-gke - 6.8.0-1008.11 linux-gke - 6.8.0-1008.11 linux-gke-headers-6.8.0-1008 - 6.8.0-1008.11 linux-gke-tools-6.8.0-1008 - 6.8.0-1008.11 linux-headers-6.8.0-1008-gke - 6.8.0-1008.11 linux-headers-gke - 6.8.0-1008.11 linux-image-6.8.0-1008-gke - 6.8.0-1008.11 linux-image-gke - 6.8.0-1008.11 linux-image-unsigned-6.8.0-1008-gke - 6.8.0-1008.11 linux-modules-6.8.0-1008-gke - 6.8.0-1008.11 linux-modules-extra-6.8.0-1008-gke - 6.8.0-1008.11 linux-modules-iwlwifi-6.8.0-1008-gke - 6.8.0-1008.11 linux-modules-iwlwifi-gke - 6.8.0-1008.11 linux-tools-6.8.0-1008-gke - 6.8.0-1008.11 linux-tools-gke - 6.8.0-1008.11 No subscription required linux-buildinfo-6.8.0-1010-ibm - 6.8.0-1010.10 linux-headers-6.8.0-1010-ibm - 6.8.0-1010.10 linux-headers-ibm - 6.8.0-1010.10 linux-headers-ibm-classic - 6.8.0-1010.10 linux-headers-ibm-lts-24.04 - 6.8.0-1010.10 linux-ibm - 6.8.0-1010.10 linux-ibm-classic - 6.8.0-1010.10 linux-ibm-cloud-tools-common - 6.8.0-1010.10 linux-ibm-headers-6.8.0-1010 - 6.8.0-1010.10 linux-ibm-lts-24.04 - 6.8.0-1010.10 linux-ibm-source-6.8.0 - 6.8.0-1010.10 linux-ibm-tools-6.8.0-1010 - 6.8.0-1010.10 linux-image-6.8.0-1010-ibm - 6.8.0-1010.10 linux-image-ibm - 6.8.0-1010.10 linux-image-ibm-classic - 6.8.0-1010.10 linux-image-ibm-lts-24.04 - 6.8.0-1010.10 linux-image-unsigned-6.8.0-1010-ibm - 6.8.0-1010.10 linux-modules-6.8.0-1010-ibm - 6.8.0-1010.10 linux-modules-extra-6.8.0-1010-ibm - 6.8.0-1010.10 linux-modules-iwlwifi-6.8.0-1010-ibm - 6.8.0-1010.10 linux-modules-iwlwifi-ibm - 6.8.0-1010.10 linux-modules-iwlwifi-ibm-classic - 6.8.0-1010.10 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1010.10 linux-tools-6.8.0-1010-ibm - 6.8.0-1010.10 linux-tools-ibm - 6.8.0-1010.10 linux-tools-ibm-classic - 6.8.0-1010.10 linux-tools-ibm-lts-24.04 - 6.8.0-1010.10 No subscription required linux-buildinfo-6.8.0-1011-nvidia - 6.8.0-1011.11 linux-buildinfo-6.8.0-1011-nvidia-64k - 6.8.0-1011.11 linux-cloud-tools-nvidia - 6.8.0-1011.11 linux-headers-6.8.0-1011-nvidia - 6.8.0-1011.11 linux-headers-6.8.0-1011-nvidia-64k - 6.8.0-1011.11 linux-headers-nvidia - 6.8.0-1011.11 linux-headers-nvidia-64k - 6.8.0-1011.11 linux-image-6.8.0-1011-nvidia - 6.8.0-1011.11 linux-image-6.8.0-1011-nvidia-64k - 6.8.0-1011.11 linux-image-nvidia - 6.8.0-1011.11 linux-image-nvidia-64k - 6.8.0-1011.11 linux-image-uc-6.8.0-1011-nvidia - 6.8.0-1011.11 linux-image-uc-6.8.0-1011-nvidia-64k - 6.8.0-1011.11 linux-image-unsigned-6.8.0-1011-nvidia - 6.8.0-1011.11 linux-image-unsigned-6.8.0-1011-nvidia-64k - 6.8.0-1011.11 linux-modules-6.8.0-1011-nvidia - 6.8.0-1011.11 linux-modules-6.8.0-1011-nvidia-64k - 6.8.0-1011.11 linux-modules-extra-6.8.0-1011-nvidia - 6.8.0-1011.11 linux-modules-nvidia-fs-6.8.0-1011-nvidia - 6.8.0-1011.11 linux-modules-nvidia-fs-6.8.0-1011-nvidia-64k - 6.8.0-1011.11 linux-modules-nvidia-fs-nvidia - 6.8.0-1011.11 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1011.11 linux-nvidia - 6.8.0-1011.11 linux-nvidia-64k - 6.8.0-1011.11 linux-nvidia-headers-6.8.0-1011 - 6.8.0-1011.11 linux-nvidia-tools-6.8.0-1011 - 6.8.0-1011.11 linux-nvidia-tools-host - 6.8.0-1011.11 linux-tools-6.8.0-1011-nvidia - 6.8.0-1011.11 linux-tools-6.8.0-1011-nvidia-64k - 6.8.0-1011.11 linux-tools-nvidia - 6.8.0-1011.11 linux-tools-nvidia-64k - 6.8.0-1011.11 No subscription required linux-buildinfo-6.8.0-1012-gcp - 6.8.0-1012.13 linux-gcp - 6.8.0-1012.13 linux-gcp-headers-6.8.0-1012 - 6.8.0-1012.13 linux-gcp-tools-6.8.0-1012 - 6.8.0-1012.13 linux-headers-6.8.0-1012-gcp - 6.8.0-1012.13 linux-headers-gcp - 6.8.0-1012.13 linux-image-6.8.0-1012-gcp - 6.8.0-1012.13 linux-image-gcp - 6.8.0-1012.13 linux-image-unsigned-6.8.0-1012-gcp - 6.8.0-1012.13 linux-modules-6.8.0-1012-gcp - 6.8.0-1012.13 linux-modules-extra-6.8.0-1012-gcp - 6.8.0-1012.13 linux-modules-extra-gcp - 6.8.0-1012.13 linux-modules-iwlwifi-6.8.0-1012-gcp - 6.8.0-1012.13 linux-modules-iwlwifi-gcp - 6.8.0-1012.13 linux-tools-6.8.0-1012-gcp - 6.8.0-1012.13 linux-tools-gcp - 6.8.0-1012.13 No subscription required linux-aws - 6.8.0-1013.14 linux-aws-cloud-tools-6.8.0-1013 - 6.8.0-1013.14 linux-aws-headers-6.8.0-1013 - 6.8.0-1013.14 linux-aws-tools-6.8.0-1013 - 6.8.0-1013.14 linux-buildinfo-6.8.0-1013-aws - 6.8.0-1013.14 linux-cloud-tools-6.8.0-1013-aws - 6.8.0-1013.14 linux-headers-6.8.0-1013-aws - 6.8.0-1013.14 linux-headers-aws - 6.8.0-1013.14 linux-image-6.8.0-1013-aws - 6.8.0-1013.14 linux-image-aws - 6.8.0-1013.14 linux-image-unsigned-6.8.0-1013-aws - 6.8.0-1013.14 linux-modules-6.8.0-1013-aws - 6.8.0-1013.14 linux-modules-extra-6.8.0-1013-aws - 6.8.0-1013.14 linux-modules-extra-aws - 6.8.0-1013.14 linux-tools-6.8.0-1013-aws - 6.8.0-1013.14 linux-tools-aws - 6.8.0-1013.14 No subscription required linux-buildinfo-6.8.0-40-generic - 6.8.0-40.40 linux-buildinfo-6.8.0-40-generic-64k - 6.8.0-40.40 linux-cloud-tools-6.8.0-40 - 6.8.0-40.40 linux-cloud-tools-6.8.0-40-generic - 6.8.0-40.40 linux-cloud-tools-common - 6.8.0-40.40 linux-cloud-tools-generic - 6.8.0-40.40 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-40.40 linux-cloud-tools-generic-hwe-24.04-edge - 6.8.0-40.40 linux-cloud-tools-virtual - 6.8.0-40.40 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-40.40 linux-cloud-tools-virtual-hwe-24.04-edge - 6.8.0-40.40 linux-crashdump - 6.8.0-40.40 linux-doc - 6.8.0-40.40 linux-generic - 6.8.0-40.40 linux-generic-64k - 6.8.0-40.40 linux-generic-64k-hwe-24.04 - 6.8.0-40.40 linux-generic-64k-hwe-24.04-edge - 6.8.0-40.40 linux-generic-hwe-24.04 - 6.8.0-40.40 linux-generic-hwe-24.04-edge - 6.8.0-40.40 linux-generic-lpae - 6.8.0-40.40 linux-headers-6.8.0-40 - 6.8.0-40.40 linux-headers-6.8.0-40-generic - 6.8.0-40.40 linux-headers-6.8.0-40-generic-64k - 6.8.0-40.40 linux-headers-generic - 6.8.0-40.40 linux-headers-generic-64k - 6.8.0-40.40 linux-headers-generic-64k-hwe-24.04 - 6.8.0-40.40 linux-headers-generic-64k-hwe-24.04-edge - 6.8.0-40.40 linux-headers-generic-hwe-24.04 - 6.8.0-40.40 linux-headers-generic-hwe-24.04-edge - 6.8.0-40.40 linux-headers-generic-lpae - 6.8.0-40.40 linux-headers-kvm - 6.8.0-40.40 linux-headers-laptop-23.10 - 6.8.0-40.40 linux-headers-oem-20.04 - 6.8.0-40.40 linux-headers-oem-20.04b - 6.8.0-40.40 linux-headers-oem-20.04c - 6.8.0-40.40 linux-headers-oem-20.04d - 6.8.0-40.40 linux-headers-oem-22.04 - 6.8.0-40.40 linux-headers-virtual - 6.8.0-40.40 linux-headers-virtual-hwe-24.04 - 6.8.0-40.40 linux-headers-virtual-hwe-24.04-edge - 6.8.0-40.40 linux-image-6.8.0-40-generic - 6.8.0-40.40 linux-image-6.8.0-40-generic-64k - 6.8.0-40.40 linux-image-extra-virtual - 6.8.0-40.40 linux-image-extra-virtual-hwe-24.04 - 6.8.0-40.40 linux-image-extra-virtual-hwe-24.04-edge - 6.8.0-40.40 linux-image-generic - 6.8.0-40.40 linux-image-generic-64k - 6.8.0-40.40 linux-image-generic-64k-hwe-24.04 - 6.8.0-40.40 linux-image-generic-64k-hwe-24.04-edge - 6.8.0-40.40 linux-image-generic-hwe-24.04 - 6.8.0-40.40 linux-image-generic-hwe-24.04-edge - 6.8.0-40.40 linux-image-generic-lpae - 6.8.0-40.40 linux-image-kvm - 6.8.0-40.40 linux-image-laptop-23.10 - 6.8.0-40.40 linux-image-oem-20.04 - 6.8.0-40.40 linux-image-oem-20.04b - 6.8.0-40.40 linux-image-oem-20.04c - 6.8.0-40.40 linux-image-oem-20.04d - 6.8.0-40.40 linux-image-oem-22.04 - 6.8.0-40.40 linux-image-uc-6.8.0-40-generic - 6.8.0-40.40 linux-image-uc-6.8.0-40-generic-64k - 6.8.0-40.40 linux-image-uc-generic - 6.8.0-40.40 linux-image-uc-generic-hwe-24.04 - 6.8.0-40.40 linux-image-uc-generic-hwe-24.04-edge - 6.8.0-40.40 linux-image-unsigned-6.8.0-40-generic - 6.8.0-40.40 linux-image-unsigned-6.8.0-40-generic-64k - 6.8.0-40.40 linux-image-virtual - 6.8.0-40.40 linux-image-virtual-hwe-24.04 - 6.8.0-40.40 linux-image-virtual-hwe-24.04-edge - 6.8.0-40.40 linux-kvm - 6.8.0-40.40 linux-laptop-23.10 - 6.8.0-40.40 linux-lib-rust-6.8.0-40-generic - 6.8.0-40.40 linux-libc-dev - 6.8.0-40.40 linux-modules-6.8.0-40-generic - 6.8.0-40.40 linux-modules-6.8.0-40-generic-64k - 6.8.0-40.40 linux-modules-extra-6.8.0-40-generic - 6.8.0-40.40 linux-modules-ipu6-6.8.0-40-generic - 6.8.0-40.40 linux-modules-ipu6-generic - 6.8.0-40.40 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-40.40 linux-modules-ipu6-generic-hwe-24.04-edge - 6.8.0-40.40 linux-modules-iwlwifi-6.8.0-40-generic - 6.8.0-40.40 linux-modules-iwlwifi-generic - 6.8.0-40.40 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-40.40 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.8.0-40.40 linux-modules-iwlwifi-oem-20.04 - 6.8.0-40.40 linux-modules-iwlwifi-oem-20.04d - 6.8.0-40.40 linux-modules-iwlwifi-oem-22.04 - 6.8.0-40.40 linux-modules-usbio-6.8.0-40-generic - 6.8.0-40.40 linux-modules-usbio-generic - 6.8.0-40.40 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-40.40 linux-modules-usbio-generic-hwe-24.04-edge - 6.8.0-40.40 linux-oem-20.04 - 6.8.0-40.40 linux-oem-20.04b - 6.8.0-40.40 linux-oem-20.04c - 6.8.0-40.40 linux-oem-20.04d - 6.8.0-40.40 linux-oem-22.04 - 6.8.0-40.40 linux-source - 6.8.0-40.40 linux-source-6.8.0 - 6.8.0-40.40 linux-tools-6.8.0-40 - 6.8.0-40.40 linux-tools-6.8.0-40-generic - 6.8.0-40.40 linux-tools-6.8.0-40-generic-64k - 6.8.0-40.40 linux-tools-common - 6.8.0-40.40 linux-tools-generic - 6.8.0-40.40 linux-tools-generic-64k - 6.8.0-40.40 linux-tools-generic-64k-hwe-24.04 - 6.8.0-40.40 linux-tools-generic-64k-hwe-24.04-edge - 6.8.0-40.40 linux-tools-generic-hwe-24.04 - 6.8.0-40.40 linux-tools-generic-hwe-24.04-edge - 6.8.0-40.40 linux-tools-generic-lpae - 6.8.0-40.40 linux-tools-host - 6.8.0-40.40 linux-tools-kvm - 6.8.0-40.40 linux-tools-laptop-23.10 - 6.8.0-40.40 linux-tools-oem-20.04 - 6.8.0-40.40 linux-tools-oem-20.04b - 6.8.0-40.40 linux-tools-oem-20.04c - 6.8.0-40.40 linux-tools-oem-20.04d - 6.8.0-40.40 linux-tools-oem-22.04 - 6.8.0-40.40 linux-tools-virtual - 6.8.0-40.40 linux-tools-virtual-hwe-24.04 - 6.8.0-40.40 linux-tools-virtual-hwe-24.04-edge - 6.8.0-40.40 linux-virtual - 6.8.0-40.40 linux-virtual-hwe-24.04 - 6.8.0-40.40 linux-virtual-hwe-24.04-edge - 6.8.0-40.40 No subscription required High CVE-2023-52882 CVE-2024-27394 CVE-2024-27395 CVE-2024-27396 CVE-2024-27398 CVE-2024-27399 CVE-2024-27400 CVE-2024-27401 CVE-2024-35846 CVE-2024-35847 CVE-2024-35848 CVE-2024-35849 CVE-2024-35850 CVE-2024-35851 CVE-2024-35852 CVE-2024-35853 CVE-2024-35854 CVE-2024-35855 CVE-2024-35856 CVE-2024-35857 CVE-2024-35858 CVE-2024-35859 CVE-2024-35947 CVE-2024-35949 CVE-2024-35983 CVE-2024-35986 CVE-2024-35987 CVE-2024-35988 CVE-2024-35989 CVE-2024-35991 CVE-2024-35993 CVE-2024-35994 CVE-2024-35996 CVE-2024-35998 CVE-2024-35999 CVE-2024-36000 CVE-2024-36001 CVE-2024-36002 CVE-2024-36003 CVE-2024-36004 CVE-2024-36005 CVE-2024-36006 CVE-2024-36007 CVE-2024-36009 CVE-2024-36011 CVE-2024-36012 CVE-2024-36013 CVE-2024-36014 CVE-2024-36017 CVE-2024-36028 CVE-2024-36029 CVE-2024-36030 CVE-2024-36031 CVE-2024-36032 CVE-2024-36033 CVE-2024-36880 CVE-2024-36881 CVE-2024-36882 CVE-2024-36883 CVE-2024-36884 CVE-2024-36886 CVE-2024-36887 CVE-2024-36888 CVE-2024-36889 CVE-2024-36890 CVE-2024-36891 CVE-2024-36892 CVE-2024-36893 CVE-2024-36894 CVE-2024-36895 CVE-2024-36896 CVE-2024-36897 CVE-2024-36898 CVE-2024-36899 CVE-2024-36900 CVE-2024-36901 CVE-2024-36902 CVE-2024-36903 CVE-2024-36904 CVE-2024-36905 CVE-2024-36906 CVE-2024-36908 CVE-2024-36909 CVE-2024-36910 CVE-2024-36911 CVE-2024-36912 CVE-2024-36913 CVE-2024-36914 CVE-2024-36915 CVE-2024-36916 CVE-2024-36917 CVE-2024-36918 CVE-2024-36919 CVE-2024-36920 CVE-2024-36921 CVE-2024-36922 CVE-2024-36923 CVE-2024-36924 CVE-2024-36925 CVE-2024-36926 CVE-2024-36927 CVE-2024-36928 CVE-2024-36929 CVE-2024-36930 CVE-2024-36931 CVE-2024-36932 CVE-2024-36933 CVE-2024-36934 CVE-2024-36935 CVE-2024-36936 CVE-2024-36937 CVE-2024-36938 CVE-2024-36939 CVE-2024-36940 CVE-2024-36941 CVE-2024-36943 CVE-2024-36944 CVE-2024-36945 CVE-2024-36946 CVE-2024-36947 CVE-2024-36948 CVE-2024-36949 CVE-2024-36950 CVE-2024-36951 CVE-2024-36952 CVE-2024-36953 CVE-2024-36954 CVE-2024-36955 CVE-2024-36956 CVE-2024-36957 CVE-2024-36958 CVE-2024-36959 CVE-2024-36960 CVE-2024-36961 CVE-2024-36962 CVE-2024-36963 CVE-2024-36964 CVE-2024-36965 CVE-2024-36966 CVE-2024-36967 CVE-2024-36968 CVE-2024-36969 CVE-2024-36975 CVE-2024-36977 CVE-2024-36979 CVE-2024-38538 CVE-2024-38539 CVE-2024-38540 CVE-2024-38541 CVE-2024-38542 CVE-2024-38543 CVE-2024-38544 CVE-2024-38545 CVE-2024-38546 CVE-2024-38547 CVE-2024-38548 CVE-2024-38549 CVE-2024-38550 CVE-2024-38551 CVE-2024-38552 CVE-2024-38553 CVE-2024-38554 CVE-2024-38555 CVE-2024-38556 CVE-2024-38557 CVE-2024-38558 CVE-2024-38559 CVE-2024-38560 CVE-2024-38561 CVE-2024-38562 CVE-2024-38563 CVE-2024-38564 CVE-2024-38565 CVE-2024-38566 CVE-2024-38567 CVE-2024-38568 CVE-2024-38569 CVE-2024-38570 CVE-2024-38571 CVE-2024-38572 CVE-2024-38573 CVE-2024-38574 CVE-2024-38575 CVE-2024-38576 CVE-2024-38577 CVE-2024-38578 CVE-2024-38579 CVE-2024-38580 CVE-2024-38582 CVE-2024-38583 CVE-2024-38584 CVE-2024-38585 CVE-2024-38586 CVE-2024-38587 CVE-2024-38588 CVE-2024-38589 CVE-2024-38590 CVE-2024-38591 CVE-2024-38592 CVE-2024-38593 CVE-2024-38594 CVE-2024-38595 CVE-2024-38596 CVE-2024-38597 CVE-2024-38598 CVE-2024-38599 CVE-2024-38600 CVE-2024-38601 CVE-2024-38602 CVE-2024-38603 CVE-2024-38604 CVE-2024-38605 CVE-2024-38606 CVE-2024-38607 CVE-2024-38610 CVE-2024-38611 CVE-2024-38612 CVE-2024-38613 CVE-2024-38614 CVE-2024-38615 CVE-2024-38616 CVE-2024-38617 CVE-2024-38620 CVE-2024-39482 CVE-2024-41011 CVE-2024-42134 USN-6949-2 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - ARM64 architecture; - M68K architecture; - OpenRISC architecture; - PowerPC architecture; - RISC-V architecture; - x86 architecture; - Block layer subsystem; - Accessibility subsystem; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - DMA engine subsystem; - DPLL subsystem; - FireWire subsystem; - EFI core; - Qualcomm firmware drivers; - GPIO subsystem; - GPU drivers; - Microsoft Hyper-V drivers; - InfiniBand drivers; - IOMMU subsystem; - IRQ chip drivers; - Macintosh device drivers; - Multiple devices driver; - Media drivers; - EEPROM drivers; - MMC subsystem; - Network drivers; - STMicroelectronics network drivers; - Device tree and open firmware driver; - HiSilicon SoC PMU drivers; - PHY drivers; - Pin controllers subsystem; - Remote Processor subsystem; - S/390 drivers; - SCSI drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - Userspace I/O drivers; - USB subsystem; - DesignWare USB3 driver; - ACRN Hypervisor Service Module driver; - Virtio drivers; - 9P distributed file system; - BTRFS file system; - eCrypt file system; - EROFS file system; - File systems infrastructure; - GFS2 file system; - JFFS2 file system; - Network file systems library; - Network file system client; - Network file system server daemon; - NILFS2 file system; - Proc file system; - SMB network file system; - Tracing file system; - Mellanox drivers; - Memory management; - Socket messages infrastructure; - Slab allocator; - Tracing infrastructure; - User-space API (UAPI); - Core kernel; - BPF subsystem; - DMA mapping infrastructure; - RCU subsystem; - Dynamic debug library; - KUnit library; - Maple Tree data structure library; - Heterogeneous memory management; - Amateur Radio drivers; - Bluetooth subsystem; - Ethernet bridge; - Networking core; - IPv4 networking; - IPv6 networking; - Multipath TCP; - Netfilter; - NET/ROM layer; - NFC subsystem; - NSH protocol; - Open vSwitch; - Phonet protocol; - SMC sockets; - TIPC protocol; - Unix domain sockets; - Wireless networking; - Key management; - ALSA framework; - HD-audio driver; - Kirkwood ASoC drivers; - MediaTek ASoC drivers; (CVE-2024-36006, CVE-2024-36922, CVE-2024-38567, CVE-2024-38584, CVE-2024-36923, CVE-2024-36892, CVE-2024-35855, CVE-2024-35853, CVE-2024-38562, CVE-2024-36920, CVE-2024-38543, CVE-2024-38576, CVE-2024-38572, CVE-2024-36898, CVE-2024-38560, CVE-2024-36004, CVE-2024-36956, CVE-2024-36881, CVE-2024-36977, CVE-2024-36955, CVE-2024-36906, CVE-2024-36013, CVE-2024-36884, CVE-2024-38563, CVE-2024-36966, CVE-2024-38547, CVE-2024-38594, CVE-2024-36926, CVE-2024-38587, CVE-2024-38566, CVE-2024-27400, CVE-2024-36941, CVE-2024-36017, CVE-2024-38544, CVE-2024-36899, CVE-2024-35851, CVE-2024-38577, CVE-2024-38590, CVE-2024-38568, CVE-2024-38559, CVE-2024-38611, CVE-2024-36887, CVE-2024-36886, CVE-2024-35996, CVE-2024-38612, CVE-2024-36925, CVE-2024-38586, CVE-2024-38596, CVE-2024-36932, CVE-2024-39482, CVE-2024-38585, CVE-2024-36033, CVE-2024-38614, CVE-2024-35852, CVE-2024-36908, CVE-2024-36939, CVE-2024-36963, CVE-2024-27401, CVE-2024-36029, CVE-2024-38540, CVE-2024-38565, CVE-2024-36927, CVE-2024-36910, CVE-2024-42134, CVE-2024-36888, CVE-2024-35859, CVE-2024-36911, CVE-2024-35947, CVE-2024-36940, CVE-2024-36921, CVE-2024-36913, CVE-2024-36943, CVE-2024-35986, CVE-2024-38616, CVE-2024-36900, CVE-2024-36954, CVE-2024-36915, CVE-2024-38602, CVE-2024-41011, CVE-2024-35991, CVE-2024-36909, CVE-2024-38603, CVE-2023-52882, CVE-2024-36953, CVE-2024-38599, CVE-2024-38574, CVE-2024-36967, CVE-2024-36895, CVE-2024-36003, CVE-2024-36961, CVE-2024-38545, CVE-2024-38538, CVE-2024-36001, CVE-2024-36912, CVE-2024-36952, CVE-2024-38550, CVE-2024-38570, CVE-2024-36969, CVE-2024-38595, CVE-2024-35849, CVE-2024-36936, CVE-2024-35949, CVE-2024-36009, CVE-2024-35987, CVE-2024-38541, CVE-2024-38564, CVE-2024-36032, CVE-2024-38615, CVE-2024-36960, CVE-2024-36934, CVE-2024-36951, CVE-2024-35999, CVE-2024-38551, CVE-2024-36903, CVE-2024-36931, CVE-2024-38593, CVE-2024-36938, CVE-2024-38607, CVE-2024-36928, CVE-2024-38552, CVE-2024-36002, CVE-2024-38605, CVE-2024-38582, CVE-2024-36933, CVE-2024-38620, CVE-2024-27395, CVE-2024-27396, CVE-2024-36012, CVE-2024-38591, CVE-2024-38597, CVE-2024-36889, CVE-2024-36964, CVE-2024-38606, CVE-2024-38553, CVE-2024-36945, CVE-2024-35848, CVE-2024-36962, CVE-2024-36947, CVE-2024-27399, CVE-2024-38546, CVE-2024-38583, CVE-2024-38573, CVE-2024-35850, CVE-2024-38549, CVE-2024-38588, CVE-2024-38610, CVE-2024-36917, CVE-2024-36957, CVE-2024-35846, CVE-2024-38579, CVE-2024-36965, CVE-2024-35857, CVE-2024-38548, CVE-2024-36975, CVE-2024-36919, CVE-2024-38542, CVE-2024-36948, CVE-2024-36011, CVE-2024-38556, CVE-2024-36897, CVE-2024-38557, CVE-2024-36890, CVE-2024-36882, CVE-2024-38613, CVE-2024-36914, CVE-2024-35998, CVE-2024-36958, CVE-2024-38580, CVE-2024-36896, CVE-2024-36891, CVE-2024-36924, CVE-2024-38589, CVE-2024-38592, CVE-2024-36904, CVE-2024-36894, CVE-2024-36028, CVE-2024-36014, CVE-2024-36880, CVE-2024-36944, CVE-2024-38598, CVE-2024-36929, CVE-2024-36883, CVE-2024-35858, CVE-2024-38555, CVE-2024-36005, CVE-2024-38539, CVE-2024-35994, CVE-2024-36030, CVE-2024-27394, CVE-2024-36930, CVE-2024-36937, CVE-2024-38561, CVE-2024-38578, CVE-2024-36959, CVE-2024-36935, CVE-2024-36916, CVE-2024-36902, CVE-2024-38604, CVE-2024-38554, CVE-2024-38575, CVE-2024-36918, CVE-2024-36979, CVE-2024-35854, CVE-2024-36968, CVE-2024-38558, CVE-2024-36000, CVE-2024-27398, CVE-2024-35983, CVE-2024-36949, CVE-2024-38600, CVE-2024-36950, CVE-2024-36946, CVE-2024-36031, CVE-2024-35847, CVE-2024-36905, CVE-2024-38571, CVE-2024-36007, CVE-2024-35856, CVE-2024-38601, CVE-2024-38569, CVE-2024-38617, CVE-2024-35988, CVE-2024-35989, CVE-2024-35993, CVE-2024-36893, CVE-2024-36901) Update Instructions: Run `sudo pro fix USN-6949-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1009-raspi - 6.8.0-1009.10 linux-headers-6.8.0-1009-raspi - 6.8.0-1009.10 linux-headers-raspi - 6.8.0-1009.10 linux-image-6.8.0-1009-raspi - 6.8.0-1009.10 linux-image-raspi - 6.8.0-1009.10 linux-modules-6.8.0-1009-raspi - 6.8.0-1009.10 linux-raspi - 6.8.0-1009.10 linux-raspi-headers-6.8.0-1009 - 6.8.0-1009.10 linux-raspi-tools-6.8.0-1009 - 6.8.0-1009.10 linux-tools-6.8.0-1009-raspi - 6.8.0-1009.10 linux-tools-raspi - 6.8.0-1009.10 No subscription required linux-buildinfo-6.8.0-40-lowlatency - 6.8.0-40.40.1 linux-buildinfo-6.8.0-40-lowlatency-64k - 6.8.0-40.40.1 linux-cloud-tools-6.8.0-40-lowlatency - 6.8.0-40.40.1 linux-cloud-tools-lowlatency - 6.8.0-40.40.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-40.40.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-40.40.1 linux-cloud-tools-lowlatency-hwe-22.04 - 6.8.0-40.40.1 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.8.0-40.40.1 linux-headers-6.8.0-40-lowlatency - 6.8.0-40.40.1 linux-headers-6.8.0-40-lowlatency-64k - 6.8.0-40.40.1 linux-headers-lowlatency - 6.8.0-40.40.1 linux-headers-lowlatency-64k - 6.8.0-40.40.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-40.40.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-40.40.1 linux-headers-lowlatency-64k-hwe-22.04 - 6.8.0-40.40.1 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.8.0-40.40.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-40.40.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-40.40.1 linux-headers-lowlatency-hwe-22.04 - 6.8.0-40.40.1 linux-headers-lowlatency-hwe-22.04-edge - 6.8.0-40.40.1 linux-image-6.8.0-40-lowlatency - 6.8.0-40.40.1 linux-image-6.8.0-40-lowlatency-64k - 6.8.0-40.40.1 linux-image-lowlatency - 6.8.0-40.40.1 linux-image-lowlatency-64k - 6.8.0-40.40.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-40.40.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-40.40.1 linux-image-lowlatency-64k-hwe-22.04 - 6.8.0-40.40.1 linux-image-lowlatency-64k-hwe-22.04-edge - 6.8.0-40.40.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-40.40.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-40.40.1 linux-image-lowlatency-hwe-22.04 - 6.8.0-40.40.1 linux-image-lowlatency-hwe-22.04-edge - 6.8.0-40.40.1 linux-image-unsigned-6.8.0-40-lowlatency - 6.8.0-40.40.1 linux-image-unsigned-6.8.0-40-lowlatency-64k - 6.8.0-40.40.1 linux-lowlatency - 6.8.0-40.40.1 linux-lowlatency-64k - 6.8.0-40.40.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-40.40.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-40.40.1 linux-lowlatency-64k-hwe-22.04 - 6.8.0-40.40.1 linux-lowlatency-64k-hwe-22.04-edge - 6.8.0-40.40.1 linux-lowlatency-cloud-tools-6.8.0-40 - 6.8.0-40.40.1 linux-lowlatency-cloud-tools-common - 6.8.0-40.40.1 linux-lowlatency-headers-6.8.0-40 - 6.8.0-40.40.1 linux-lowlatency-hwe-20.04 - 6.8.0-40.40.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-40.40.1 linux-lowlatency-hwe-22.04 - 6.8.0-40.40.1 linux-lowlatency-hwe-22.04-edge - 6.8.0-40.40.1 linux-lowlatency-lib-rust-6.8.0-40-lowlatency - 6.8.0-40.40.1 linux-lowlatency-tools-6.8.0-40 - 6.8.0-40.40.1 linux-lowlatency-tools-common - 6.8.0-40.40.1 linux-lowlatency-tools-host - 6.8.0-40.40.1 linux-modules-6.8.0-40-lowlatency - 6.8.0-40.40.1 linux-modules-6.8.0-40-lowlatency-64k - 6.8.0-40.40.1 linux-modules-iwlwifi-6.8.0-40-lowlatency - 6.8.0-40.40.1 linux-modules-iwlwifi-lowlatency - 6.8.0-40.40.1 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.8.0-40.40.1 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.8.0-40.40.1 linux-tools-6.8.0-40-lowlatency - 6.8.0-40.40.1 linux-tools-6.8.0-40-lowlatency-64k - 6.8.0-40.40.1 linux-tools-lowlatency - 6.8.0-40.40.1 linux-tools-lowlatency-64k - 6.8.0-40.40.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-40.40.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-40.40.1 linux-tools-lowlatency-64k-hwe-22.04 - 6.8.0-40.40.1 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.8.0-40.40.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-40.40.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-40.40.1 linux-tools-lowlatency-hwe-22.04 - 6.8.0-40.40.1 linux-tools-lowlatency-hwe-22.04-edge - 6.8.0-40.40.1 No subscription required High CVE-2023-52882 CVE-2024-27394 CVE-2024-27395 CVE-2024-27396 CVE-2024-27398 CVE-2024-27399 CVE-2024-27400 CVE-2024-27401 CVE-2024-35846 CVE-2024-35847 CVE-2024-35848 CVE-2024-35849 CVE-2024-35850 CVE-2024-35851 CVE-2024-35852 CVE-2024-35853 CVE-2024-35854 CVE-2024-35855 CVE-2024-35856 CVE-2024-35857 CVE-2024-35858 CVE-2024-35859 CVE-2024-35947 CVE-2024-35949 CVE-2024-35983 CVE-2024-35986 CVE-2024-35987 CVE-2024-35988 CVE-2024-35989 CVE-2024-35991 CVE-2024-35993 CVE-2024-35994 CVE-2024-35996 CVE-2024-35998 CVE-2024-35999 CVE-2024-36000 CVE-2024-36001 CVE-2024-36002 CVE-2024-36003 CVE-2024-36004 CVE-2024-36005 CVE-2024-36006 CVE-2024-36007 CVE-2024-36009 CVE-2024-36011 CVE-2024-36012 CVE-2024-36013 CVE-2024-36014 CVE-2024-36017 CVE-2024-36028 CVE-2024-36029 CVE-2024-36030 CVE-2024-36031 CVE-2024-36032 CVE-2024-36033 CVE-2024-36880 CVE-2024-36881 CVE-2024-36882 CVE-2024-36883 CVE-2024-36884 CVE-2024-36886 CVE-2024-36887 CVE-2024-36888 CVE-2024-36889 CVE-2024-36890 CVE-2024-36891 CVE-2024-36892 CVE-2024-36893 CVE-2024-36894 CVE-2024-36895 CVE-2024-36896 CVE-2024-36897 CVE-2024-36898 CVE-2024-36899 CVE-2024-36900 CVE-2024-36901 CVE-2024-36902 CVE-2024-36903 CVE-2024-36904 CVE-2024-36905 CVE-2024-36906 CVE-2024-36908 CVE-2024-36909 CVE-2024-36910 CVE-2024-36911 CVE-2024-36912 CVE-2024-36913 CVE-2024-36914 CVE-2024-36915 CVE-2024-36916 CVE-2024-36917 CVE-2024-36918 CVE-2024-36919 CVE-2024-36920 CVE-2024-36921 CVE-2024-36922 CVE-2024-36923 CVE-2024-36924 CVE-2024-36925 CVE-2024-36926 CVE-2024-36927 CVE-2024-36928 CVE-2024-36929 CVE-2024-36930 CVE-2024-36931 CVE-2024-36932 CVE-2024-36933 CVE-2024-36934 CVE-2024-36935 CVE-2024-36936 CVE-2024-36937 CVE-2024-36938 CVE-2024-36939 CVE-2024-36940 CVE-2024-36941 CVE-2024-36943 CVE-2024-36944 CVE-2024-36945 CVE-2024-36946 CVE-2024-36947 CVE-2024-36948 CVE-2024-36949 CVE-2024-36950 CVE-2024-36951 CVE-2024-36952 CVE-2024-36953 CVE-2024-36954 CVE-2024-36955 CVE-2024-36956 CVE-2024-36957 CVE-2024-36958 CVE-2024-36959 CVE-2024-36960 CVE-2024-36961 CVE-2024-36962 CVE-2024-36963 CVE-2024-36964 CVE-2024-36965 CVE-2024-36966 CVE-2024-36967 CVE-2024-36968 CVE-2024-36969 CVE-2024-36975 CVE-2024-36977 CVE-2024-36979 CVE-2024-38538 CVE-2024-38539 CVE-2024-38540 CVE-2024-38541 CVE-2024-38542 CVE-2024-38543 CVE-2024-38544 CVE-2024-38545 CVE-2024-38546 CVE-2024-38547 CVE-2024-38548 CVE-2024-38549 CVE-2024-38550 CVE-2024-38551 CVE-2024-38552 CVE-2024-38553 CVE-2024-38554 CVE-2024-38555 CVE-2024-38556 CVE-2024-38557 CVE-2024-38558 CVE-2024-38559 CVE-2024-38560 CVE-2024-38561 CVE-2024-38562 CVE-2024-38563 CVE-2024-38564 CVE-2024-38565 CVE-2024-38566 CVE-2024-38567 CVE-2024-38568 CVE-2024-38569 CVE-2024-38570 CVE-2024-38571 CVE-2024-38572 CVE-2024-38573 CVE-2024-38574 CVE-2024-38575 CVE-2024-38576 CVE-2024-38577 CVE-2024-38578 CVE-2024-38579 CVE-2024-38580 CVE-2024-38582 CVE-2024-38583 CVE-2024-38584 CVE-2024-38585 CVE-2024-38586 CVE-2024-38587 CVE-2024-38588 CVE-2024-38589 CVE-2024-38590 CVE-2024-38591 CVE-2024-38592 CVE-2024-38593 CVE-2024-38594 CVE-2024-38595 CVE-2024-38596 CVE-2024-38597 CVE-2024-38598 CVE-2024-38599 CVE-2024-38600 CVE-2024-38601 CVE-2024-38602 CVE-2024-38603 CVE-2024-38604 CVE-2024-38605 CVE-2024-38606 CVE-2024-38607 CVE-2024-38610 CVE-2024-38611 CVE-2024-38612 CVE-2024-38613 CVE-2024-38614 CVE-2024-38615 CVE-2024-38616 CVE-2024-38617 CVE-2024-38620 CVE-2024-39482 CVE-2024-41011 CVE-2024-42134 USN-6952-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Benedict Schlüter, Supraja Sridhara, Andrin Bertschi, and Shweta Shinde discovered that an untrusted hypervisor could inject malicious #VC interrupts and compromise the security guarantees of AMD SEV-SNP. This flaw is known as WeSee. A local attacker in control of the hypervisor could use this to expose sensitive information or possibly execute arbitrary code in the trusted execution environment. (CVE-2024-25742) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - ARM64 architecture; - M68K architecture; - OpenRISC architecture; - PowerPC architecture; - RISC-V architecture; - x86 architecture; - Block layer subsystem; - Accessibility subsystem; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - DMA engine subsystem; - DPLL subsystem; - FireWire subsystem; - EFI core; - Qualcomm firmware drivers; - GPIO subsystem; - GPU drivers; - HID subsystem; - Microsoft Hyper-V drivers; - I2C subsystem; - InfiniBand drivers; - IOMMU subsystem; - IRQ chip drivers; - Macintosh device drivers; - Multiple devices driver; - Media drivers; - EEPROM drivers; - MMC subsystem; - Network drivers; - STMicroelectronics network drivers; - Device tree and open firmware driver; - HiSilicon SoC PMU drivers; - PHY drivers; - Pin controllers subsystem; - Remote Processor subsystem; - S/390 drivers; - SCSI drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - TTY drivers; - Userspace I/O drivers; - USB subsystem; - DesignWare USB3 driver; - ACRN Hypervisor Service Module driver; - Virtio drivers; - 9P distributed file system; - BTRFS file system; - eCrypt file system; - EROFS file system; - File systems infrastructure; - GFS2 file system; - JFFS2 file system; - Network file systems library; - Network file system client; - Network file system server daemon; - NILFS2 file system; - Proc file system; - SMB network file system; - Tracing file system; - Mellanox drivers; - Memory management; - Socket messages infrastructure; - Slab allocator; - Tracing infrastructure; - User-space API (UAPI); - Core kernel; - BPF subsystem; - DMA mapping infrastructure; - RCU subsystem; - Dynamic debug library; - KUnit library; - Maple Tree data structure library; - Heterogeneous memory management; - Amateur Radio drivers; - Bluetooth subsystem; - Ethernet bridge; - Networking core; - IPv4 networking; - IPv6 networking; - Multipath TCP; - Netfilter; - NET/ROM layer; - NFC subsystem; - NSH protocol; - Open vSwitch; - Phonet protocol; - SMC sockets; - TIPC protocol; - Unix domain sockets; - Wireless networking; - Key management; - ALSA framework; - HD-audio driver; - Kirkwood ASoC drivers; - MediaTek ASoC drivers; (CVE-2024-38601, CVE-2024-36935, CVE-2024-35991, CVE-2024-36032, CVE-2024-35988, CVE-2024-36886, CVE-2024-36913, CVE-2024-36928, CVE-2024-38553, CVE-2024-36927, CVE-2024-38615, CVE-2024-36958, CVE-2024-36977, CVE-2024-36889, CVE-2024-38554, CVE-2024-38590, CVE-2024-42134, CVE-2024-35857, CVE-2024-35850, CVE-2024-35986, CVE-2024-36921, CVE-2024-38569, CVE-2024-36966, CVE-2024-38542, CVE-2024-38585, CVE-2024-36884, CVE-2024-36006, CVE-2024-38577, CVE-2024-36016, CVE-2024-38584, CVE-2024-36887, CVE-2024-38598, CVE-2024-35994, CVE-2024-38603, CVE-2024-35998, CVE-2024-27401, CVE-2024-35852, CVE-2024-36944, CVE-2024-38572, CVE-2024-36917, CVE-2024-36943, CVE-2024-36009, CVE-2024-38587, CVE-2024-35949, CVE-2024-36945, CVE-2024-36004, CVE-2024-36919, CVE-2024-27398, CVE-2024-38582, CVE-2024-35847, CVE-2024-38580, CVE-2024-38602, CVE-2024-36916, CVE-2024-36903, CVE-2024-38555, CVE-2024-36952, CVE-2024-38589, CVE-2024-27394, CVE-2024-36933, CVE-2024-36975, CVE-2024-38591, CVE-2024-38612, CVE-2024-36939, CVE-2024-35983, CVE-2024-38607, CVE-2024-36929, CVE-2024-35849, CVE-2024-36941, CVE-2024-35858, CVE-2024-38599, CVE-2024-35996, CVE-2024-36031, CVE-2024-36931, CVE-2024-35990, CVE-2024-35851, CVE-2024-38556, CVE-2024-36000, CVE-2024-36910, CVE-2024-38573, CVE-2024-36906, CVE-2024-36951, CVE-2024-38604, CVE-2024-38613, CVE-2024-38547, CVE-2024-36014, CVE-2024-36949, CVE-2024-36033, CVE-2024-38597, CVE-2024-36880, CVE-2024-38594, CVE-2024-36894, CVE-2024-38546, CVE-2024-36947, CVE-2024-38541, CVE-2024-35989, CVE-2024-27399, CVE-2024-38550, CVE-2024-36922, CVE-2024-36008, CVE-2024-38540, CVE-2024-36924, CVE-2024-36892, CVE-2024-38549, CVE-2024-36882, CVE-2024-36908, CVE-2024-38566, CVE-2024-36005, CVE-2024-38583, CVE-2024-36968, CVE-2024-36017, CVE-2024-38565, CVE-2024-36881, CVE-2024-38611, CVE-2024-36897, CVE-2024-38560, CVE-2024-36923, CVE-2024-38575, CVE-2024-36899, CVE-2024-38570, CVE-2024-36898, CVE-2024-36896, CVE-2024-38559, CVE-2024-38588, CVE-2024-38606, CVE-2024-38551, CVE-2024-36891, CVE-2024-38567, CVE-2024-36895, CVE-2024-35993, CVE-2024-38552, CVE-2024-36925, CVE-2024-36964, CVE-2024-36888, CVE-2024-36956, CVE-2024-36946, CVE-2024-38600, CVE-2024-35997, CVE-2024-36912, CVE-2024-35984, CVE-2024-35848, CVE-2024-38545, CVE-2024-38563, CVE-2024-36918, CVE-2024-36001, CVE-2024-36957, CVE-2024-38576, CVE-2024-36030, CVE-2024-38574, CVE-2024-36963, CVE-2024-36890, CVE-2024-36960, CVE-2024-36901, CVE-2024-38614, CVE-2024-35859, CVE-2024-38593, CVE-2024-36904, CVE-2024-36012, CVE-2024-38578, CVE-2024-36011, CVE-2024-36930, CVE-2024-36938, CVE-2024-36893, CVE-2024-35987, CVE-2024-36905, CVE-2024-35853, CVE-2024-36003, CVE-2024-38562, CVE-2024-38617, CVE-2024-35855, CVE-2024-36965, CVE-2024-38596, CVE-2024-38558, CVE-2024-38568, CVE-2024-36955, CVE-2024-36029, CVE-2024-36967, CVE-2024-36940, CVE-2024-38595, CVE-2024-36028, CVE-2024-38610, CVE-2024-36911, CVE-2024-35999, CVE-2024-35854, CVE-2024-38571, CVE-2024-38548, CVE-2024-36948, CVE-2024-36002, CVE-2024-36961, CVE-2024-36900, CVE-2024-36932, CVE-2024-36902, CVE-2024-35992, CVE-2024-36914, CVE-2024-38592, CVE-2024-38616, CVE-2024-27400, CVE-2024-36937, CVE-2024-36920, CVE-2024-38586, CVE-2024-36909, CVE-2024-35846, CVE-2024-39482, CVE-2024-38579, CVE-2024-38539, CVE-2024-27395, CVE-2024-36962, CVE-2024-36013, CVE-2024-27396, CVE-2024-38557, CVE-2024-36953, CVE-2024-41011, CVE-2023-52882, CVE-2024-36969, CVE-2024-36007, CVE-2024-35856, CVE-2024-38605, CVE-2024-36915, CVE-2024-36979, CVE-2024-36954, CVE-2024-38538, CVE-2024-36950, CVE-2024-36926, CVE-2024-38544, CVE-2024-36959, CVE-2024-38561, CVE-2024-36883, CVE-2024-36936, CVE-2024-38564, CVE-2024-38543, CVE-2024-36934, CVE-2024-35947, CVE-2024-38620) Update Instructions: Run `sudo pro fix USN-6952-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1010-oracle - 6.8.0-1010.10 linux-buildinfo-6.8.0-1010-oracle-64k - 6.8.0-1010.10 linux-headers-6.8.0-1010-oracle - 6.8.0-1010.10 linux-headers-6.8.0-1010-oracle-64k - 6.8.0-1010.10 linux-headers-oracle - 6.8.0-1010.10 linux-headers-oracle-64k - 6.8.0-1010.10 linux-image-6.8.0-1010-oracle - 6.8.0-1010.10 linux-image-6.8.0-1010-oracle-64k - 6.8.0-1010.10 linux-image-oracle - 6.8.0-1010.10 linux-image-oracle-64k - 6.8.0-1010.10 linux-image-unsigned-6.8.0-1010-oracle - 6.8.0-1010.10 linux-image-unsigned-6.8.0-1010-oracle-64k - 6.8.0-1010.10 linux-modules-6.8.0-1010-oracle - 6.8.0-1010.10 linux-modules-6.8.0-1010-oracle-64k - 6.8.0-1010.10 linux-modules-extra-6.8.0-1010-oracle - 6.8.0-1010.10 linux-modules-extra-6.8.0-1010-oracle-64k - 6.8.0-1010.10 linux-modules-iwlwifi-6.8.0-1010-oracle - 6.8.0-1010.10 linux-modules-iwlwifi-oracle - 6.8.0-1010.10 linux-oracle - 6.8.0-1010.10 linux-oracle-64k - 6.8.0-1010.10 linux-oracle-headers-6.8.0-1010 - 6.8.0-1010.10 linux-oracle-tools-6.8.0-1010 - 6.8.0-1010.10 linux-tools-6.8.0-1010-oracle - 6.8.0-1010.10 linux-tools-6.8.0-1010-oracle-64k - 6.8.0-1010.10 linux-tools-oracle - 6.8.0-1010.10 linux-tools-oracle-64k - 6.8.0-1010.10 No subscription required linux-buildinfo-6.8.0-1011-nvidia-lowlatency - 6.8.0-1011.11.1 linux-buildinfo-6.8.0-1011-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1011.11.1 linux-headers-6.8.0-1011-nvidia-lowlatency - 6.8.0-1011.11.1 linux-headers-6.8.0-1011-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-headers-nvidia-lowlatency - 6.8.0-1011.11.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-image-6.8.0-1011-nvidia-lowlatency - 6.8.0-1011.11.1 linux-image-6.8.0-1011-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-image-nvidia-lowlatency - 6.8.0-1011.11.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-image-uc-6.8.0-1011-nvidia-lowlatency - 6.8.0-1011.11.1 linux-image-uc-6.8.0-1011-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-image-unsigned-6.8.0-1011-nvidia-lowlatency - 6.8.0-1011.11.1 linux-image-unsigned-6.8.0-1011-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-modules-6.8.0-1011-nvidia-lowlatency - 6.8.0-1011.11.1 linux-modules-6.8.0-1011-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-modules-extra-6.8.0-1011-nvidia-lowlatency - 6.8.0-1011.11.1 linux-modules-nvidia-fs-6.8.0-1011-nvidia-lowlatency - 6.8.0-1011.11.1 linux-modules-nvidia-fs-6.8.0-1011-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1011.11.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-nvidia-lowlatency - 6.8.0-1011.11.1 linux-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-nvidia-lowlatency-headers-6.8.0-1011 - 6.8.0-1011.11.1 linux-nvidia-lowlatency-tools-6.8.0-1011 - 6.8.0-1011.11.1 linux-nvidia-lowlatency-tools-host - 6.8.0-1011.11.1 linux-tools-6.8.0-1011-nvidia-lowlatency - 6.8.0-1011.11.1 linux-tools-6.8.0-1011-nvidia-lowlatency-64k - 6.8.0-1011.11.1 linux-tools-nvidia-lowlatency - 6.8.0-1011.11.1 linux-tools-nvidia-lowlatency-64k - 6.8.0-1011.11.1 No subscription required High CVE-2023-52882 CVE-2024-25742 CVE-2024-27394 CVE-2024-27395 CVE-2024-27396 CVE-2024-27398 CVE-2024-27399 CVE-2024-27400 CVE-2024-27401 CVE-2024-35846 CVE-2024-35847 CVE-2024-35848 CVE-2024-35849 CVE-2024-35850 CVE-2024-35851 CVE-2024-35852 CVE-2024-35853 CVE-2024-35854 CVE-2024-35855 CVE-2024-35856 CVE-2024-35857 CVE-2024-35858 CVE-2024-35859 CVE-2024-35947 CVE-2024-35949 CVE-2024-35983 CVE-2024-35984 CVE-2024-35986 CVE-2024-35987 CVE-2024-35988 CVE-2024-35989 CVE-2024-35990 CVE-2024-35991 CVE-2024-35992 CVE-2024-35993 CVE-2024-35994 CVE-2024-35996 CVE-2024-35997 CVE-2024-35998 CVE-2024-35999 CVE-2024-36000 CVE-2024-36001 CVE-2024-36002 CVE-2024-36003 CVE-2024-36004 CVE-2024-36005 CVE-2024-36006 CVE-2024-36007 CVE-2024-36008 CVE-2024-36009 CVE-2024-36011 CVE-2024-36012 CVE-2024-36013 CVE-2024-36014 CVE-2024-36016 CVE-2024-36017 CVE-2024-36028 CVE-2024-36029 CVE-2024-36030 CVE-2024-36031 CVE-2024-36032 CVE-2024-36033 CVE-2024-36880 CVE-2024-36881 CVE-2024-36882 CVE-2024-36883 CVE-2024-36884 CVE-2024-36886 CVE-2024-36887 CVE-2024-36888 CVE-2024-36889 CVE-2024-36890 CVE-2024-36891 CVE-2024-36892 CVE-2024-36893 CVE-2024-36894 CVE-2024-36895 CVE-2024-36896 CVE-2024-36897 CVE-2024-36898 CVE-2024-36899 CVE-2024-36900 CVE-2024-36901 CVE-2024-36902 CVE-2024-36903 CVE-2024-36904 CVE-2024-36905 CVE-2024-36906 CVE-2024-36908 CVE-2024-36909 CVE-2024-36910 CVE-2024-36911 CVE-2024-36912 CVE-2024-36913 CVE-2024-36914 CVE-2024-36915 CVE-2024-36916 CVE-2024-36917 CVE-2024-36918 CVE-2024-36919 CVE-2024-36920 CVE-2024-36921 CVE-2024-36922 CVE-2024-36923 CVE-2024-36924 CVE-2024-36925 CVE-2024-36926 CVE-2024-36927 CVE-2024-36928 CVE-2024-36929 CVE-2024-36930 CVE-2024-36931 CVE-2024-36932 CVE-2024-36933 CVE-2024-36934 CVE-2024-36935 CVE-2024-36936 CVE-2024-36937 CVE-2024-36938 CVE-2024-36939 CVE-2024-36940 CVE-2024-36941 CVE-2024-36943 CVE-2024-36944 CVE-2024-36945 CVE-2024-36946 CVE-2024-36947 CVE-2024-36948 CVE-2024-36949 CVE-2024-36950 CVE-2024-36951 CVE-2024-36952 CVE-2024-36953 CVE-2024-36954 CVE-2024-36955 CVE-2024-36956 CVE-2024-36957 CVE-2024-36958 CVE-2024-36959 CVE-2024-36960 CVE-2024-36961 CVE-2024-36962 CVE-2024-36963 CVE-2024-36964 CVE-2024-36965 CVE-2024-36966 CVE-2024-36967 CVE-2024-36968 CVE-2024-36969 CVE-2024-36975 CVE-2024-36977 CVE-2024-36979 CVE-2024-38538 CVE-2024-38539 CVE-2024-38540 CVE-2024-38541 CVE-2024-38542 CVE-2024-38543 CVE-2024-38544 CVE-2024-38545 CVE-2024-38546 CVE-2024-38547 CVE-2024-38548 CVE-2024-38549 CVE-2024-38550 CVE-2024-38551 CVE-2024-38552 CVE-2024-38553 CVE-2024-38554 CVE-2024-38555 CVE-2024-38556 CVE-2024-38557 CVE-2024-38558 CVE-2024-38559 CVE-2024-38560 CVE-2024-38561 CVE-2024-38562 CVE-2024-38563 CVE-2024-38564 CVE-2024-38565 CVE-2024-38566 CVE-2024-38567 CVE-2024-38568 CVE-2024-38569 CVE-2024-38570 CVE-2024-38571 CVE-2024-38572 CVE-2024-38573 CVE-2024-38574 CVE-2024-38575 CVE-2024-38576 CVE-2024-38577 CVE-2024-38578 CVE-2024-38579 CVE-2024-38580 CVE-2024-38582 CVE-2024-38583 CVE-2024-38584 CVE-2024-38585 CVE-2024-38586 CVE-2024-38587 CVE-2024-38588 CVE-2024-38589 CVE-2024-38590 CVE-2024-38591 CVE-2024-38592 CVE-2024-38593 CVE-2024-38594 CVE-2024-38595 CVE-2024-38596 CVE-2024-38597 CVE-2024-38598 CVE-2024-38599 CVE-2024-38600 CVE-2024-38601 CVE-2024-38602 CVE-2024-38603 CVE-2024-38604 CVE-2024-38605 CVE-2024-38606 CVE-2024-38607 CVE-2024-38610 CVE-2024-38611 CVE-2024-38612 CVE-2024-38613 CVE-2024-38614 CVE-2024-38615 CVE-2024-38616 CVE-2024-38617 CVE-2024-38620 CVE-2024-39482 CVE-2024-41011 CVE-2024-42134 USN-6952-2 -- Linux kernel (Azure) vulnerabilities Ubuntu 24.04 LTS Benedict Schlüter, Supraja Sridhara, Andrin Bertschi, and Shweta Shinde discovered that an untrusted hypervisor could inject malicious #VC interrupts and compromise the security guarantees of AMD SEV-SNP. This flaw is known as WeSee. A local attacker in control of the hypervisor could use this to expose sensitive information or possibly execute arbitrary code in the trusted execution environment. (CVE-2024-25742) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - ARM64 architecture; - M68K architecture; - OpenRISC architecture; - PowerPC architecture; - RISC-V architecture; - x86 architecture; - Block layer subsystem; - Accessibility subsystem; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - DMA engine subsystem; - DPLL subsystem; - FireWire subsystem; - EFI core; - Qualcomm firmware drivers; - GPIO subsystem; - GPU drivers; - HID subsystem; - Microsoft Hyper-V drivers; - I2C subsystem; - InfiniBand drivers; - IOMMU subsystem; - IRQ chip drivers; - Macintosh device drivers; - Multiple devices driver; - Media drivers; - EEPROM drivers; - MMC subsystem; - Network drivers; - STMicroelectronics network drivers; - Device tree and open firmware driver; - HiSilicon SoC PMU drivers; - PHY drivers; - Pin controllers subsystem; - Remote Processor subsystem; - S/390 drivers; - SCSI drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - TTY drivers; - Userspace I/O drivers; - USB subsystem; - DesignWare USB3 driver; - ACRN Hypervisor Service Module driver; - Virtio drivers; - 9P distributed file system; - BTRFS file system; - eCrypt file system; - EROFS file system; - File systems infrastructure; - GFS2 file system; - JFFS2 file system; - Network file systems library; - Network file system client; - Network file system server daemon; - NILFS2 file system; - Proc file system; - SMB network file system; - Tracing file system; - Mellanox drivers; - Memory management; - Socket messages infrastructure; - Slab allocator; - Tracing infrastructure; - User-space API (UAPI); - Core kernel; - BPF subsystem; - DMA mapping infrastructure; - RCU subsystem; - Dynamic debug library; - KUnit library; - Maple Tree data structure library; - Heterogeneous memory management; - Amateur Radio drivers; - Bluetooth subsystem; - Ethernet bridge; - Networking core; - IPv4 networking; - IPv6 networking; - Multipath TCP; - Netfilter; - NET/ROM layer; - NFC subsystem; - NSH protocol; - Open vSwitch; - Phonet protocol; - SMC sockets; - TIPC protocol; - Unix domain sockets; - Wireless networking; - Key management; - ALSA framework; - HD-audio driver; - Kirkwood ASoC drivers; - MediaTek ASoC drivers; (CVE-2024-38601, CVE-2024-36935, CVE-2024-35991, CVE-2024-36032, CVE-2024-35988, CVE-2024-36886, CVE-2024-36913, CVE-2024-36928, CVE-2024-38553, CVE-2024-36927, CVE-2024-38615, CVE-2024-36958, CVE-2024-36977, CVE-2024-36889, CVE-2024-38554, CVE-2024-38590, CVE-2024-42134, CVE-2024-35857, CVE-2024-35850, CVE-2024-35986, CVE-2024-36921, CVE-2024-38569, CVE-2024-36966, CVE-2024-38542, CVE-2024-38585, CVE-2024-36884, CVE-2024-36006, CVE-2024-38577, CVE-2024-36016, CVE-2024-38584, CVE-2024-36887, CVE-2024-38598, CVE-2024-35994, CVE-2024-38603, CVE-2024-35998, CVE-2024-27401, CVE-2024-35852, CVE-2024-36944, CVE-2024-38572, CVE-2024-36917, CVE-2024-36943, CVE-2024-36009, CVE-2024-38587, CVE-2024-35949, CVE-2024-36945, CVE-2024-36004, CVE-2024-36919, CVE-2024-27398, CVE-2024-38582, CVE-2024-35847, CVE-2024-38580, CVE-2024-38602, CVE-2024-36916, CVE-2024-36903, CVE-2024-38555, CVE-2024-36952, CVE-2024-38589, CVE-2024-27394, CVE-2024-36933, CVE-2024-36975, CVE-2024-38591, CVE-2024-38612, CVE-2024-36939, CVE-2024-35983, CVE-2024-38607, CVE-2024-36929, CVE-2024-35849, CVE-2024-36941, CVE-2024-35858, CVE-2024-38599, CVE-2024-35996, CVE-2024-36031, CVE-2024-36931, CVE-2024-35990, CVE-2024-35851, CVE-2024-38556, CVE-2024-36000, CVE-2024-36910, CVE-2024-38573, CVE-2024-36906, CVE-2024-36951, CVE-2024-38604, CVE-2024-38613, CVE-2024-38547, CVE-2024-36014, CVE-2024-36949, CVE-2024-36033, CVE-2024-38597, CVE-2024-36880, CVE-2024-38594, CVE-2024-36894, CVE-2024-38546, CVE-2024-36947, CVE-2024-38541, CVE-2024-35989, CVE-2024-27399, CVE-2024-38550, CVE-2024-36922, CVE-2024-36008, CVE-2024-38540, CVE-2024-36924, CVE-2024-36892, CVE-2024-38549, CVE-2024-36882, CVE-2024-36908, CVE-2024-38566, CVE-2024-36005, CVE-2024-38583, CVE-2024-36968, CVE-2024-36017, CVE-2024-38565, CVE-2024-36881, CVE-2024-38611, CVE-2024-36897, CVE-2024-38560, CVE-2024-36923, CVE-2024-38575, CVE-2024-36899, CVE-2024-38570, CVE-2024-36898, CVE-2024-36896, CVE-2024-38559, CVE-2024-38588, CVE-2024-38606, CVE-2024-38551, CVE-2024-36891, CVE-2024-38567, CVE-2024-36895, CVE-2024-35993, CVE-2024-38552, CVE-2024-36925, CVE-2024-36964, CVE-2024-36888, CVE-2024-36956, CVE-2024-36946, CVE-2024-38600, CVE-2024-35997, CVE-2024-36912, CVE-2024-35984, CVE-2024-35848, CVE-2024-38545, CVE-2024-38563, CVE-2024-36918, CVE-2024-36001, CVE-2024-36957, CVE-2024-38576, CVE-2024-36030, CVE-2024-38574, CVE-2024-36963, CVE-2024-36890, CVE-2024-36960, CVE-2024-36901, CVE-2024-38614, CVE-2024-35859, CVE-2024-38593, CVE-2024-36904, CVE-2024-36012, CVE-2024-38578, CVE-2024-36011, CVE-2024-36930, CVE-2024-36938, CVE-2024-36893, CVE-2024-35987, CVE-2024-36905, CVE-2024-35853, CVE-2024-36003, CVE-2024-38562, CVE-2024-38617, CVE-2024-35855, CVE-2024-36965, CVE-2024-38596, CVE-2024-38558, CVE-2024-38568, CVE-2024-36955, CVE-2024-36029, CVE-2024-36967, CVE-2024-36940, CVE-2024-38595, CVE-2024-36028, CVE-2024-38610, CVE-2024-36911, CVE-2024-35999, CVE-2024-35854, CVE-2024-38571, CVE-2024-38548, CVE-2024-36948, CVE-2024-36002, CVE-2024-36961, CVE-2024-36900, CVE-2024-36932, CVE-2024-36902, CVE-2024-35992, CVE-2024-36914, CVE-2024-38592, CVE-2024-38616, CVE-2024-27400, CVE-2024-36937, CVE-2024-36920, CVE-2024-38586, CVE-2024-36909, CVE-2024-35846, CVE-2024-39482, CVE-2024-38579, CVE-2024-38539, CVE-2024-27395, CVE-2024-36962, CVE-2024-36013, CVE-2024-27396, CVE-2024-38557, CVE-2024-36953, CVE-2024-41011, CVE-2023-52882, CVE-2024-36969, CVE-2024-36007, CVE-2024-35856, CVE-2024-38605, CVE-2024-36915, CVE-2024-36979, CVE-2024-36954, CVE-2024-38538, CVE-2024-36950, CVE-2024-36926, CVE-2024-38544, CVE-2024-36959, CVE-2024-38561, CVE-2024-36883, CVE-2024-36936, CVE-2024-38564, CVE-2024-38543, CVE-2024-36934, CVE-2024-35947, CVE-2024-38620) Update Instructions: Run `sudo pro fix USN-6952-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-azure - 6.8.0-1012.14 linux-azure-cloud-tools-6.8.0-1012 - 6.8.0-1012.14 linux-azure-fde - 6.8.0-1012.14 linux-azure-headers-6.8.0-1012 - 6.8.0-1012.14 linux-azure-tools-6.8.0-1012 - 6.8.0-1012.14 linux-buildinfo-6.8.0-1012-azure - 6.8.0-1012.14 linux-cloud-tools-6.8.0-1012-azure - 6.8.0-1012.14 linux-cloud-tools-azure - 6.8.0-1012.14 linux-headers-6.8.0-1012-azure - 6.8.0-1012.14 linux-headers-azure - 6.8.0-1012.14 linux-image-6.8.0-1012-azure - 6.8.0-1012.14 linux-image-6.8.0-1012-azure-fde - 6.8.0-1012.14 linux-image-azure - 6.8.0-1012.14 linux-image-azure-fde - 6.8.0-1012.14 linux-image-unsigned-6.8.0-1012-azure - 6.8.0-1012.14 linux-modules-6.8.0-1012-azure - 6.8.0-1012.14 linux-modules-extra-6.8.0-1012-azure - 6.8.0-1012.14 linux-modules-extra-azure - 6.8.0-1012.14 linux-modules-involflt-6.8.0-1012-azure - 6.8.0-1012.14 linux-modules-involflt-azure - 6.8.0-1012.14 linux-modules-iwlwifi-6.8.0-1012-azure - 6.8.0-1012.14 linux-modules-iwlwifi-azure - 6.8.0-1012.14 linux-tools-6.8.0-1012-azure - 6.8.0-1012.14 linux-tools-azure - 6.8.0-1012.14 No subscription required High CVE-2023-52882 CVE-2024-25742 CVE-2024-27394 CVE-2024-27395 CVE-2024-27396 CVE-2024-27398 CVE-2024-27399 CVE-2024-27400 CVE-2024-27401 CVE-2024-35846 CVE-2024-35847 CVE-2024-35848 CVE-2024-35849 CVE-2024-35850 CVE-2024-35851 CVE-2024-35852 CVE-2024-35853 CVE-2024-35854 CVE-2024-35855 CVE-2024-35856 CVE-2024-35857 CVE-2024-35858 CVE-2024-35859 CVE-2024-35947 CVE-2024-35949 CVE-2024-35983 CVE-2024-35984 CVE-2024-35986 CVE-2024-35987 CVE-2024-35988 CVE-2024-35989 CVE-2024-35990 CVE-2024-35991 CVE-2024-35992 CVE-2024-35993 CVE-2024-35994 CVE-2024-35996 CVE-2024-35997 CVE-2024-35998 CVE-2024-35999 CVE-2024-36000 CVE-2024-36001 CVE-2024-36002 CVE-2024-36003 CVE-2024-36004 CVE-2024-36005 CVE-2024-36006 CVE-2024-36007 CVE-2024-36008 CVE-2024-36009 CVE-2024-36011 CVE-2024-36012 CVE-2024-36013 CVE-2024-36014 CVE-2024-36016 CVE-2024-36017 CVE-2024-36028 CVE-2024-36029 CVE-2024-36030 CVE-2024-36031 CVE-2024-36032 CVE-2024-36033 CVE-2024-36880 CVE-2024-36881 CVE-2024-36882 CVE-2024-36883 CVE-2024-36884 CVE-2024-36886 CVE-2024-36887 CVE-2024-36888 CVE-2024-36889 CVE-2024-36890 CVE-2024-36891 CVE-2024-36892 CVE-2024-36893 CVE-2024-36894 CVE-2024-36895 CVE-2024-36896 CVE-2024-36897 CVE-2024-36898 CVE-2024-36899 CVE-2024-36900 CVE-2024-36901 CVE-2024-36902 CVE-2024-36903 CVE-2024-36904 CVE-2024-36905 CVE-2024-36906 CVE-2024-36908 CVE-2024-36909 CVE-2024-36910 CVE-2024-36911 CVE-2024-36912 CVE-2024-36913 CVE-2024-36914 CVE-2024-36915 CVE-2024-36916 CVE-2024-36917 CVE-2024-36918 CVE-2024-36919 CVE-2024-36920 CVE-2024-36921 CVE-2024-36922 CVE-2024-36923 CVE-2024-36924 CVE-2024-36925 CVE-2024-36926 CVE-2024-36927 CVE-2024-36928 CVE-2024-36929 CVE-2024-36930 CVE-2024-36931 CVE-2024-36932 CVE-2024-36933 CVE-2024-36934 CVE-2024-36935 CVE-2024-36936 CVE-2024-36937 CVE-2024-36938 CVE-2024-36939 CVE-2024-36940 CVE-2024-36941 CVE-2024-36943 CVE-2024-36944 CVE-2024-36945 CVE-2024-36946 CVE-2024-36947 CVE-2024-36948 CVE-2024-36949 CVE-2024-36950 CVE-2024-36951 CVE-2024-36952 CVE-2024-36953 CVE-2024-36954 CVE-2024-36955 CVE-2024-36956 CVE-2024-36957 CVE-2024-36958 CVE-2024-36959 CVE-2024-36960 CVE-2024-36961 CVE-2024-36962 CVE-2024-36963 CVE-2024-36964 CVE-2024-36965 CVE-2024-36966 CVE-2024-36967 CVE-2024-36968 CVE-2024-36969 CVE-2024-36975 CVE-2024-36977 CVE-2024-36979 CVE-2024-38538 CVE-2024-38539 CVE-2024-38540 CVE-2024-38541 CVE-2024-38542 CVE-2024-38543 CVE-2024-38544 CVE-2024-38545 CVE-2024-38546 CVE-2024-38547 CVE-2024-38548 CVE-2024-38549 CVE-2024-38550 CVE-2024-38551 CVE-2024-38552 CVE-2024-38553 CVE-2024-38554 CVE-2024-38555 CVE-2024-38556 CVE-2024-38557 CVE-2024-38558 CVE-2024-38559 CVE-2024-38560 CVE-2024-38561 CVE-2024-38562 CVE-2024-38563 CVE-2024-38564 CVE-2024-38565 CVE-2024-38566 CVE-2024-38567 CVE-2024-38568 CVE-2024-38569 CVE-2024-38570 CVE-2024-38571 CVE-2024-38572 CVE-2024-38573 CVE-2024-38574 CVE-2024-38575 CVE-2024-38576 CVE-2024-38577 CVE-2024-38578 CVE-2024-38579 CVE-2024-38580 CVE-2024-38582 CVE-2024-38583 CVE-2024-38584 CVE-2024-38585 CVE-2024-38586 CVE-2024-38587 CVE-2024-38588 CVE-2024-38589 CVE-2024-38590 CVE-2024-38591 CVE-2024-38592 CVE-2024-38593 CVE-2024-38594 CVE-2024-38595 CVE-2024-38596 CVE-2024-38597 CVE-2024-38598 CVE-2024-38599 CVE-2024-38600 CVE-2024-38601 CVE-2024-38602 CVE-2024-38603 CVE-2024-38604 CVE-2024-38605 CVE-2024-38606 CVE-2024-38607 CVE-2024-38610 CVE-2024-38611 CVE-2024-38612 CVE-2024-38613 CVE-2024-38614 CVE-2024-38615 CVE-2024-38616 CVE-2024-38617 CVE-2024-38620 CVE-2024-39482 CVE-2024-41011 CVE-2024-42134 USN-6955-1 -- Linux kernel (OEM) vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - ARM64 architecture; - M68K architecture; - OpenRISC architecture; - PowerPC architecture; - RISC-V architecture; - x86 architecture; - Block layer subsystem; - Accessibility subsystem; - Bluetooth drivers; - Clock framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - DMA engine subsystem; - DPLL subsystem; - FireWire subsystem; - EFI core; - Qualcomm firmware drivers; - GPIO subsystem; - GPU drivers; - Microsoft Hyper-V drivers; - InfiniBand drivers; - IOMMU subsystem; - IRQ chip drivers; - Macintosh device drivers; - Multiple devices driver; - Media drivers; - EEPROM drivers; - MMC subsystem; - Network drivers; - STMicroelectronics network drivers; - Device tree and open firmware driver; - HiSilicon SoC PMU drivers; - PHY drivers; - Pin controllers subsystem; - Remote Processor subsystem; - S/390 drivers; - SCSI drivers; - SPI subsystem; - Media staging drivers; - Thermal drivers; - Userspace I/O drivers; - USB subsystem; - DesignWare USB3 driver; - ACRN Hypervisor Service Module driver; - Virtio drivers; - 9P distributed file system; - BTRFS file system; - eCrypt file system; - EROFS file system; - File systems infrastructure; - GFS2 file system; - JFFS2 file system; - Network file systems library; - Network file system client; - Network file system server daemon; - NILFS2 file system; - Proc file system; - SMB network file system; - Tracing file system; - Mellanox drivers; - Memory management; - Socket messages infrastructure; - Slab allocator; - Tracing infrastructure; - User-space API (UAPI); - Core kernel; - BPF subsystem; - DMA mapping infrastructure; - RCU subsystem; - Dynamic debug library; - KUnit library; - Maple Tree data structure library; - Heterogeneous memory management; - Amateur Radio drivers; - Bluetooth subsystem; - Ethernet bridge; - Networking core; - IPv4 networking; - IPv6 networking; - Multipath TCP; - Netfilter; - NET/ROM layer; - NFC subsystem; - NSH protocol; - Open vSwitch; - Phonet protocol; - SMC sockets; - TIPC protocol; - Unix domain sockets; - Wireless networking; - Key management; - ALSA framework; - HD-audio driver; - Kirkwood ASoC drivers; - MediaTek ASoC drivers; (CVE-2024-35987, CVE-2024-36931, CVE-2024-38614, CVE-2024-35857, CVE-2024-36949, CVE-2024-38599, CVE-2024-35994, CVE-2024-35849, CVE-2024-36916, CVE-2024-38590, CVE-2024-36944, CVE-2024-38561, CVE-2024-38538, CVE-2024-36017, CVE-2024-38593, CVE-2024-36028, CVE-2024-36960, CVE-2024-36002, CVE-2024-36967, CVE-2024-36898, CVE-2024-35989, CVE-2024-36975, CVE-2024-38578, CVE-2024-38582, CVE-2024-38588, CVE-2024-38579, CVE-2024-38617, CVE-2024-36901, CVE-2024-38550, CVE-2023-52882, CVE-2024-38603, CVE-2024-38620, CVE-2024-36956, CVE-2024-36880, CVE-2024-36895, CVE-2024-36979, CVE-2024-36887, CVE-2024-27396, CVE-2024-27400, CVE-2024-36952, CVE-2024-36886, CVE-2024-36905, CVE-2024-36883, CVE-2024-38540, CVE-2024-38605, CVE-2024-36029, CVE-2024-36934, CVE-2024-27395, CVE-2024-36000, CVE-2024-38549, CVE-2024-35999, CVE-2024-38585, CVE-2024-38589, CVE-2024-38565, CVE-2024-36917, CVE-2024-36930, CVE-2024-36940, CVE-2024-36900, CVE-2024-35850, CVE-2024-38592, CVE-2024-38553, CVE-2024-36929, CVE-2024-36915, CVE-2024-36004, CVE-2024-38573, CVE-2024-36941, CVE-2024-38607, CVE-2024-36009, CVE-2024-27398, CVE-2024-36909, CVE-2024-35848, CVE-2024-36950, CVE-2024-38564, CVE-2024-36947, CVE-2024-38613, CVE-2024-38570, CVE-2024-38612, CVE-2024-38580, CVE-2024-38557, CVE-2024-36959, CVE-2024-27399, CVE-2024-41011, CVE-2024-36928, CVE-2024-38543, CVE-2024-38541, CVE-2024-38583, CVE-2024-35855, CVE-2024-38611, CVE-2024-36891, CVE-2024-38587, CVE-2024-35851, CVE-2024-38546, CVE-2024-38596, CVE-2024-35998, CVE-2024-35991, CVE-2024-36965, CVE-2024-36925, CVE-2024-36894, CVE-2024-38567, CVE-2024-38572, CVE-2024-36882, CVE-2024-38594, CVE-2024-38563, CVE-2024-38616, CVE-2024-36951, CVE-2024-36005, CVE-2024-42134, CVE-2024-38602, CVE-2024-36014, CVE-2024-38601, CVE-2024-36001, CVE-2024-38575, CVE-2024-27401, CVE-2024-36961, CVE-2024-38576, CVE-2024-36935, CVE-2024-36893, CVE-2024-38562, CVE-2024-36904, CVE-2024-36939, CVE-2024-38591, CVE-2024-38539, CVE-2024-36030, CVE-2024-36920, CVE-2024-39482, CVE-2024-36977, CVE-2024-36013, CVE-2024-35856, CVE-2024-36922, CVE-2024-36033, CVE-2024-35859, CVE-2024-36919, CVE-2024-35846, CVE-2024-36913, CVE-2024-35854, CVE-2024-36924, CVE-2024-38547, CVE-2024-38551, CVE-2024-36899, CVE-2024-36932, CVE-2024-38545, CVE-2024-36966, CVE-2024-36911, CVE-2024-36946, CVE-2024-36906, CVE-2024-38595, CVE-2024-36012, CVE-2024-38552, CVE-2024-36933, CVE-2024-36936, CVE-2024-38548, CVE-2024-38558, CVE-2024-36006, CVE-2024-36908, CVE-2024-36892, CVE-2024-35988, CVE-2024-35993, CVE-2024-36914, CVE-2024-36896, CVE-2024-38615, CVE-2024-36890, CVE-2024-36969, CVE-2024-38559, CVE-2024-36964, CVE-2024-38560, CVE-2024-38574, CVE-2024-36962, CVE-2024-38542, CVE-2024-36926, CVE-2024-36968, CVE-2024-36032, CVE-2024-38544, CVE-2024-36938, CVE-2024-38597, CVE-2024-38577, CVE-2024-36958, CVE-2024-36945, CVE-2024-36943, CVE-2024-38610, CVE-2024-36927, CVE-2024-38554, CVE-2024-38555, CVE-2024-36031, CVE-2024-36011, CVE-2024-38569, CVE-2024-35847, CVE-2024-36921, CVE-2024-38606, CVE-2024-35949, CVE-2024-35947, CVE-2024-36889, CVE-2024-36884, CVE-2024-36954, CVE-2024-36902, CVE-2024-36007, CVE-2024-38586, CVE-2024-36918, CVE-2024-38571, CVE-2024-36955, CVE-2024-36888, CVE-2024-38556, CVE-2024-38604, CVE-2024-27394, CVE-2024-38600, CVE-2024-35983, CVE-2024-38568, CVE-2024-38566, CVE-2024-35853, CVE-2024-35858, CVE-2024-36910, CVE-2024-36903, CVE-2024-36881, CVE-2024-36937, CVE-2024-36957, CVE-2024-36912, CVE-2024-36948, CVE-2024-36953, CVE-2024-35996, CVE-2024-36963, CVE-2024-36923, CVE-2024-35852, CVE-2024-38598, CVE-2024-36003, CVE-2024-35986, CVE-2024-38584) Update Instructions: Run `sudo pro fix USN-6955-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1010-oem - 6.8.0-1010.10 linux-headers-6.8.0-1010-oem - 6.8.0-1010.10 linux-headers-oem-24.04 - 6.8.0-1010.10 linux-headers-oem-24.04a - 6.8.0-1010.10 linux-image-6.8.0-1010-oem - 6.8.0-1010.10 linux-image-oem-24.04 - 6.8.0-1010.10 linux-image-oem-24.04a - 6.8.0-1010.10 linux-image-uc-6.8.0-1010-oem - 6.8.0-1010.10 linux-image-uc-oem-24.04 - 6.8.0-1010.10 linux-image-uc-oem-24.04a - 6.8.0-1010.10 linux-image-unsigned-6.8.0-1010-oem - 6.8.0-1010.10 linux-modules-6.8.0-1010-oem - 6.8.0-1010.10 linux-modules-ipu6-6.8.0-1010-oem - 6.8.0-1010.10 linux-modules-ipu6-oem-24.04 - 6.8.0-1010.10 linux-modules-ipu6-oem-24.04a - 6.8.0-1010.10 linux-modules-iwlwifi-6.8.0-1010-oem - 6.8.0-1010.10 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1010.10 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1010.10 linux-modules-usbio-6.8.0-1010-oem - 6.8.0-1010.10 linux-modules-usbio-oem-24.04 - 6.8.0-1010.10 linux-modules-usbio-oem-24.04a - 6.8.0-1010.10 linux-oem-24.04 - 6.8.0-1010.10 linux-oem-24.04a - 6.8.0-1010.10 linux-oem-6.8-headers-6.8.0-1010 - 6.8.0-1010.10 linux-oem-6.8-tools-6.8.0-1010 - 6.8.0-1010.10 linux-tools-6.8.0-1010-oem - 6.8.0-1010.10 linux-tools-oem-24.04 - 6.8.0-1010.10 linux-tools-oem-24.04a - 6.8.0-1010.10 No subscription required High CVE-2023-52882 CVE-2024-27394 CVE-2024-27395 CVE-2024-27396 CVE-2024-27398 CVE-2024-27399 CVE-2024-27400 CVE-2024-27401 CVE-2024-35846 CVE-2024-35847 CVE-2024-35848 CVE-2024-35849 CVE-2024-35850 CVE-2024-35851 CVE-2024-35852 CVE-2024-35853 CVE-2024-35854 CVE-2024-35855 CVE-2024-35856 CVE-2024-35857 CVE-2024-35858 CVE-2024-35859 CVE-2024-35947 CVE-2024-35949 CVE-2024-35983 CVE-2024-35986 CVE-2024-35987 CVE-2024-35988 CVE-2024-35989 CVE-2024-35991 CVE-2024-35993 CVE-2024-35994 CVE-2024-35996 CVE-2024-35998 CVE-2024-35999 CVE-2024-36000 CVE-2024-36001 CVE-2024-36002 CVE-2024-36003 CVE-2024-36004 CVE-2024-36005 CVE-2024-36006 CVE-2024-36007 CVE-2024-36009 CVE-2024-36011 CVE-2024-36012 CVE-2024-36013 CVE-2024-36014 CVE-2024-36017 CVE-2024-36028 CVE-2024-36029 CVE-2024-36030 CVE-2024-36031 CVE-2024-36032 CVE-2024-36033 CVE-2024-36880 CVE-2024-36881 CVE-2024-36882 CVE-2024-36883 CVE-2024-36884 CVE-2024-36886 CVE-2024-36887 CVE-2024-36888 CVE-2024-36889 CVE-2024-36890 CVE-2024-36891 CVE-2024-36892 CVE-2024-36893 CVE-2024-36894 CVE-2024-36895 CVE-2024-36896 CVE-2024-36898 CVE-2024-36899 CVE-2024-36900 CVE-2024-36901 CVE-2024-36902 CVE-2024-36903 CVE-2024-36904 CVE-2024-36905 CVE-2024-36906 CVE-2024-36908 CVE-2024-36909 CVE-2024-36910 CVE-2024-36911 CVE-2024-36912 CVE-2024-36913 CVE-2024-36914 CVE-2024-36915 CVE-2024-36916 CVE-2024-36917 CVE-2024-36918 CVE-2024-36919 CVE-2024-36920 CVE-2024-36921 CVE-2024-36922 CVE-2024-36923 CVE-2024-36924 CVE-2024-36925 CVE-2024-36926 CVE-2024-36927 CVE-2024-36928 CVE-2024-36929 CVE-2024-36930 CVE-2024-36931 CVE-2024-36932 CVE-2024-36933 CVE-2024-36934 CVE-2024-36935 CVE-2024-36936 CVE-2024-36937 CVE-2024-36938 CVE-2024-36939 CVE-2024-36940 CVE-2024-36941 CVE-2024-36943 CVE-2024-36944 CVE-2024-36945 CVE-2024-36946 CVE-2024-36947 CVE-2024-36948 CVE-2024-36949 CVE-2024-36950 CVE-2024-36951 CVE-2024-36952 CVE-2024-36953 CVE-2024-36954 CVE-2024-36955 CVE-2024-36956 CVE-2024-36957 CVE-2024-36958 CVE-2024-36959 CVE-2024-36960 CVE-2024-36961 CVE-2024-36962 CVE-2024-36963 CVE-2024-36964 CVE-2024-36965 CVE-2024-36966 CVE-2024-36967 CVE-2024-36968 CVE-2024-36969 CVE-2024-36975 CVE-2024-36977 CVE-2024-36979 CVE-2024-38538 CVE-2024-38539 CVE-2024-38540 CVE-2024-38541 CVE-2024-38542 CVE-2024-38543 CVE-2024-38544 CVE-2024-38545 CVE-2024-38546 CVE-2024-38547 CVE-2024-38548 CVE-2024-38549 CVE-2024-38550 CVE-2024-38551 CVE-2024-38552 CVE-2024-38553 CVE-2024-38554 CVE-2024-38555 CVE-2024-38556 CVE-2024-38557 CVE-2024-38558 CVE-2024-38559 CVE-2024-38560 CVE-2024-38561 CVE-2024-38562 CVE-2024-38563 CVE-2024-38564 CVE-2024-38565 CVE-2024-38566 CVE-2024-38567 CVE-2024-38568 CVE-2024-38569 CVE-2024-38570 CVE-2024-38571 CVE-2024-38572 CVE-2024-38573 CVE-2024-38574 CVE-2024-38575 CVE-2024-38576 CVE-2024-38577 CVE-2024-38578 CVE-2024-38579 CVE-2024-38580 CVE-2024-38582 CVE-2024-38583 CVE-2024-38584 CVE-2024-38585 CVE-2024-38586 CVE-2024-38587 CVE-2024-38588 CVE-2024-38589 CVE-2024-38590 CVE-2024-38591 CVE-2024-38592 CVE-2024-38593 CVE-2024-38594 CVE-2024-38595 CVE-2024-38596 CVE-2024-38597 CVE-2024-38598 CVE-2024-38599 CVE-2024-38600 CVE-2024-38601 CVE-2024-38602 CVE-2024-38603 CVE-2024-38604 CVE-2024-38605 CVE-2024-38606 CVE-2024-38607 CVE-2024-38610 CVE-2024-38611 CVE-2024-38612 CVE-2024-38613 CVE-2024-38614 CVE-2024-38615 CVE-2024-38616 CVE-2024-38617 CVE-2024-38620 CVE-2024-39482 CVE-2024-41011 CVE-2024-42134 USN-6959-1 -- .NET vulnerability Ubuntu 24.04 LTS It was discovered that .NET suffered from an information disclosure vulnerability. An attacker could potentially use this issue to read targeted email messages. Update Instructions: Run `sudo pro fix USN-6959-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: dotnet-sdk-8.0 - 8.0.108-0ubuntu1~24.04.1 dotnet-sdk-8.0-source-built-artifacts - 8.0.108-0ubuntu1~24.04.1 dotnet-sdk-dbg-8.0 - 8.0.108-0ubuntu1~24.04.1 dotnet-templates-8.0 - 8.0.108-0ubuntu1~24.04.1 netstandard-targeting-pack-2.1-8.0 - 8.0.108-0ubuntu1~24.04.1 No subscription required dotnet8 - 8.0.108-8.0.8-0ubuntu1~24.04.1 No subscription required aspnetcore-runtime-8.0 - 8.0.8-0ubuntu1~24.04.1 aspnetcore-runtime-dbg-8.0 - 8.0.8-0ubuntu1~24.04.1 aspnetcore-targeting-pack-8.0 - 8.0.8-0ubuntu1~24.04.1 dotnet-apphost-pack-8.0 - 8.0.8-0ubuntu1~24.04.1 dotnet-host-8.0 - 8.0.8-0ubuntu1~24.04.1 dotnet-hostfxr-8.0 - 8.0.8-0ubuntu1~24.04.1 dotnet-runtime-8.0 - 8.0.8-0ubuntu1~24.04.1 dotnet-runtime-dbg-8.0 - 8.0.8-0ubuntu1~24.04.1 dotnet-targeting-pack-8.0 - 8.0.8-0ubuntu1~24.04.1 No subscription required Medium CVE-2024-38167 USN-6961-1 -- BusyBox vulnerabilities Ubuntu 24.04 LTS It was discovered that BusyBox did not properly validate user input when performing certain arithmetic operations. If a user or automated system were tricked into processing a specially crafted file, an attacker could possibly use this issue to cause a denial of service, or execute arbitrary code. (CVE-2022-48174) It was discovered that BusyBox incorrectly managed memory when evaluating certain awk expressions. An attacker could possibly use this issue to cause a denial of service, or execute arbitrary code. This issue only affected Ubuntu 24.04 LTS. (CVE-2023-42363, CVE-2023-42364, CVE-2023-42365) Update Instructions: Run `sudo pro fix USN-6961-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: busybox - 1:1.36.1-6ubuntu3.1 busybox-initramfs - 1:1.36.1-6ubuntu3.1 busybox-static - 1:1.36.1-6ubuntu3.1 busybox-syslogd - 1:1.36.1-6ubuntu3.1 udhcpc - 1:1.36.1-6ubuntu3.1 udhcpd - 1:1.36.1-6ubuntu3.1 No subscription required Medium CVE-2022-48174 CVE-2023-42363 CVE-2023-42364 CVE-2023-42365 USN-6962-1 -- LibreOffice vulnerability Ubuntu 24.04 LTS It was discovered that LibreOffice incorrectly allowed users to enable macros when a cryptographic signature failed to validate. If a user were tricked into opening a specially crafted document, a remote attacker could possibly execute arbitrary macros. Update Instructions: Run `sudo pro fix USN-6962-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libreoffice-nlpsolver - 4:0.9+LibO24.2.5-0ubuntu0.24.04.2 No subscription required libreoffice-wiki-publisher - 4:1.2.0+LibO24.2.5-0ubuntu0.24.04.2 No subscription required fonts-opensymbol - 4:102.12+LibO24.2.5-0ubuntu0.24.04.2 No subscription required gir1.2-lokdocview-0.1 - 4:24.2.5-0ubuntu0.24.04.2 libjuh-java - 4:24.2.5-0ubuntu0.24.04.2 libjurt-java - 4:24.2.5-0ubuntu0.24.04.2 liblibreoffice-java - 4:24.2.5-0ubuntu0.24.04.2 liblibreofficekitgtk - 4:24.2.5-0ubuntu0.24.04.2 libofficebean-java - 4:24.2.5-0ubuntu0.24.04.2 libreoffice - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-base - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-base-core - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-base-drivers - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-base-nogui - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-calc - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-calc-nogui - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-common - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-core - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-core-nogui - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-dev - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-dev-common - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-dev-doc - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-dev-gui - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-draw - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-draw-nogui - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-evolution - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-gnome - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-gtk3 - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-gtk4 - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-ca - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-common - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-cs - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-da - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-de - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-dz - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-el - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-en-gb - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-en-us - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-es - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-et - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-eu - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-fi - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-fr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-gl - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-hi - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-hu - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-id - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-it - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-ja - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-km - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-ko - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-nl - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-om - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-pl - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-pt - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-pt-br - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-ru - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-sk - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-sl - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-sv - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-tr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-vi - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-zh-cn - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-help-zh-tw - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-impress - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-impress-nogui - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-java-common - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-kf5 - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-af - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-am - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ar - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-as - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ast - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-be - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-bg - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-bn - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-br - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-bs - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ca - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-cs - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-cy - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-da - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-de - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-dz - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-el - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-en-gb - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-en-za - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-eo - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-es - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-et - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-eu - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-fa - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-fi - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-fr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ga - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-gd - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-gl - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-gu - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-gug - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-he - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-hi - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-hr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-hu - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-hy - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-id - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-in - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-is - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-it - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ja - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ka - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-kk - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-km - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-kmr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-kn - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ko - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-lt - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-lv - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-mk - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ml - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-mn - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-mr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-nb - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ne - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-nl - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-nn - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-nr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-nso - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-oc - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-om - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-or - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-pa-in - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-pl - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-pt - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-pt-br - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ro - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ru - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-rw - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-si - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-sk - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-sl - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-sr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ss - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-st - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-sv - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-szl - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ta - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-te - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-tg - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-th - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-tn - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-tr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ts - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ug - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-uk - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-uz - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-ve - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-vi - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-xh - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-za - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-zh-cn - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-zh-tw - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-l10n-zu - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-librelogo - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-math - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-math-nogui - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-nogui - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-officebean - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-plasma - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-qt5 - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-qt6 - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-report-builder - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-report-builder-bin - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-report-builder-bin-nogui - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-script-provider-bsh - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-script-provider-js - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-script-provider-python - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-sdbc-firebird - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-sdbc-hsqldb - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-sdbc-mysql - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-sdbc-postgresql - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-smoketest-data - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-style-breeze - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-style-colibre - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-style-elementary - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-style-karasa-jaga - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-style-sifr - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-style-sukapura - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-style-tango - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-style-yaru - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-subsequentcheckbase - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-uiconfig-base - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-uiconfig-calc - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-uiconfig-common - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-uiconfig-draw - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-uiconfig-impress - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-uiconfig-math - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-uiconfig-report-builder - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-uiconfig-writer - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-writer - 4:24.2.5-0ubuntu0.24.04.2 libreoffice-writer-nogui - 4:24.2.5-0ubuntu0.24.04.2 libreofficekit-data - 4:24.2.5-0ubuntu0.24.04.2 libreofficekit-dev - 4:24.2.5-0ubuntu0.24.04.2 libridl-java - 4:24.2.5-0ubuntu0.24.04.2 libuno-cppu3t64 - 4:24.2.5-0ubuntu0.24.04.2 libuno-cppuhelpergcc3-3t64 - 4:24.2.5-0ubuntu0.24.04.2 libuno-purpenvhelpergcc3-3t64 - 4:24.2.5-0ubuntu0.24.04.2 libuno-sal3t64 - 4:24.2.5-0ubuntu0.24.04.2 libuno-salhelpergcc3-3t64 - 4:24.2.5-0ubuntu0.24.04.2 libunoil-java - 4:24.2.5-0ubuntu0.24.04.2 libunoloader-java - 4:24.2.5-0ubuntu0.24.04.2 python3-access2base - 4:24.2.5-0ubuntu0.24.04.2 python3-scriptforge - 4:24.2.5-0ubuntu0.24.04.2 python3-uno - 4:24.2.5-0ubuntu0.24.04.2 uno-libs-private - 4:24.2.5-0ubuntu0.24.04.2 ure - 4:24.2.5-0ubuntu0.24.04.2 ure-java - 4:24.2.5-0ubuntu0.24.04.2 No subscription required Medium CVE-2024-6472 USN-6963-1 -- GNOME Shell vulnerability Ubuntu 24.04 LTS It was discovered that GNOME Shell incorrectly opened the portal helper automatically when detecting a captive network portal. A remote attacker could possibly use this issue to load arbitrary web pages containing JavaScript, leading to resource consumption or other attacks. Update Instructions: Run `sudo pro fix USN-6963-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gnome-shell - 46.0-0ubuntu6~24.04.3 gnome-shell-common - 46.0-0ubuntu6~24.04.3 gnome-shell-extension-prefs - 46.0-0ubuntu6~24.04.3 No subscription required Medium CVE-2024-36472 USN-6964-1 -- ORC vulnerability Ubuntu 24.04 LTS Noriko Totsuka discovered that ORC incorrectly handled certain crafted file. An attacker could possibly use this issue to execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6964-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: liborc-0.4-0t64 - 1:0.4.38-1ubuntu0.1 liborc-0.4-dev - 1:0.4.38-1ubuntu0.1 liborc-0.4-dev-bin - 1:0.4.38-1ubuntu0.1 liborc-0.4-doc - 1:0.4.38-1ubuntu0.1 No subscription required Medium CVE-2024-40897 USN-6967-1 -- Intel Microcode vulnerabilities Ubuntu 24.04 LTS It was discovered that some Intel® Core™ Ultra Processors did not properly isolate the stream cache. A local authenticated user could potentially use this to escalate their privileges. (CVE-2023-42667) It was discovered that some Intel® Processors did not properly isolate the stream cache. A local authenticated user could potentially use this to escalate their privileges. (CVE-2023-49141) It was discovered that some Intel® Processors did not correctly transition between the executive monitor and SMI transfer monitor (STM). A privileged local attacker could use this to escalate their privileges. (CVE-2024-24853) It was discovered that some 3rd, 4th, and 5th Generation Intel® Xeon® Processors failed to properly implement a protection mechanism. A local attacker could use this to potentially escalate their privileges. (CVE-2024-24980) It was discovered that some 3rd Generation Intel Xeon Scalable Processors did not properly handle mirrored regions with different values. A privileged local user could use this to cause a denial of service (system crash). (CVE-2024-25939) Update Instructions: Run `sudo pro fix USN-6967-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: intel-microcode - 3.20240813.0ubuntu0.24.04.2 No subscription required Medium CVE-2023-42667 CVE-2023-49141 CVE-2024-24853 CVE-2024-24980 CVE-2024-25939 USN-6968-1 -- PostgreSQL vulnerability Ubuntu 24.04 LTS Noah Misch discovered that PostgreSQL incorrectly handled certain SQL objects. An attacker could possibly use this issue to execute arbitrary SQL functions as the superuser. Update Instructions: Run `sudo pro fix USN-6968-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libecpg-compat3 - 16.4-0ubuntu0.24.04.1 libecpg-dev - 16.4-0ubuntu0.24.04.1 libecpg6 - 16.4-0ubuntu0.24.04.1 libpgtypes3 - 16.4-0ubuntu0.24.04.1 libpq-dev - 16.4-0ubuntu0.24.04.1 libpq5 - 16.4-0ubuntu0.24.04.1 postgresql-16 - 16.4-0ubuntu0.24.04.1 postgresql-client-16 - 16.4-0ubuntu0.24.04.1 postgresql-doc-16 - 16.4-0ubuntu0.24.04.1 postgresql-plperl-16 - 16.4-0ubuntu0.24.04.1 postgresql-plpython3-16 - 16.4-0ubuntu0.24.04.1 postgresql-pltcl-16 - 16.4-0ubuntu0.24.04.1 postgresql-server-dev-16 - 16.4-0ubuntu0.24.04.1 No subscription required Medium CVE-2024-7348 USN-6969-1 -- Cacti vulnerabilities Ubuntu 24.04 LTS It was discovered that Cacti did not properly apply checks to the "Package Import" feature. An attacker could possibly use this issue to perform arbitrary code execution. This issue only affected Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS and Ubuntu 18.04 LTS. (CVE-2024-25641) It was discovered that Cacti did not properly sanitize values when using javascript based API. A remote attacker could possibly use this issue to inject arbitrary javascript code resulting into cross-site scripting vulnerability. This issue only affected Ubuntu 24.04 LTS. (CVE-2024-29894) It was discovered that Cacti did not properly sanitize values when managing data queries. A remote attacker could possibly use this issue to inject arbitrary javascript code resulting into cross-site scripting vulnerability. (CVE-2024-31443) It was discovered that Cacti did not properly sanitize values when reading tree rules with Automation API. A remote attacker could possibly use this issue to inject arbitrary javascript code resulting into cross-site scripting vulnerability. (CVE-2024-31444) It was discovered that Cacti did not properly sanitize "get_request_var('filter')" values in the "api_automation.php" file. A remote attacker could possibly use this issue to perform SQL injection attacks. This issue only affected Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS and Ubuntu 18.04 LTS. (CVE-2024-31445) It was discovered that Cacti did not properly sanitize data stored in "form_save()" function in the "graph_template_inputs.php" file. A remote attacker could possibly use this issue to perform SQL injection attacks. (CVE-2024-31458) It was discovered that Cacti did not properly validate the file urls from the lib/plugin.php file. An attacker could possibly use this issue to perform arbitrary code execution. (CVE-2024-31459) It was discovered that Cacti did not properly validate the data stored in the "automation_tree_rules.php". A remote attacker could possibly use this issue to perform SQL injection attacks. This issue only affected Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS and Ubuntu 18.04 LTS. (CVE-2024-31460) It was discovered that Cacti did not properly verify the user password. An attacker could possibly use this issue to bypass authentication mechanism. This issue only affected Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS and Ubuntu 18.04 LTS. (CVE-2024-34360) Update Instructions: Run `sudo pro fix USN-6969-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: cacti - 1.2.26+ds1-1ubuntu0.1 No subscription required Medium CVE-2024-25641 CVE-2024-29894 CVE-2024-31443 CVE-2024-31444 CVE-2024-31445 CVE-2024-31458 CVE-2024-31459 CVE-2024-31460 CVE-2024-34340 USN-6975-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - User-Mode Linux (UML); - MMC subsystem; (CVE-2024-39292, CVE-2024-39484) Update Instructions: Run `sudo pro fix USN-6975-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1009-gke - 6.8.0-1009.12 linux-gke - 6.8.0-1009.12 linux-gke-headers-6.8.0-1009 - 6.8.0-1009.12 linux-gke-tools-6.8.0-1009 - 6.8.0-1009.12 linux-headers-6.8.0-1009-gke - 6.8.0-1009.12 linux-headers-gke - 6.8.0-1009.12 linux-image-6.8.0-1009-gke - 6.8.0-1009.12 linux-image-gke - 6.8.0-1009.12 linux-image-unsigned-6.8.0-1009-gke - 6.8.0-1009.12 linux-modules-6.8.0-1009-gke - 6.8.0-1009.12 linux-modules-extra-6.8.0-1009-gke - 6.8.0-1009.12 linux-modules-iwlwifi-6.8.0-1009-gke - 6.8.0-1009.12 linux-modules-iwlwifi-gke - 6.8.0-1009.12 linux-tools-6.8.0-1009-gke - 6.8.0-1009.12 linux-tools-gke - 6.8.0-1009.12 No subscription required linux-buildinfo-6.8.0-1010-raspi - 6.8.0-1010.11 linux-headers-6.8.0-1010-raspi - 6.8.0-1010.11 linux-headers-raspi - 6.8.0-1010.11 linux-image-6.8.0-1010-raspi - 6.8.0-1010.11 linux-image-raspi - 6.8.0-1010.11 linux-modules-6.8.0-1010-raspi - 6.8.0-1010.11 linux-raspi - 6.8.0-1010.11 linux-raspi-headers-6.8.0-1010 - 6.8.0-1010.11 linux-raspi-tools-6.8.0-1010 - 6.8.0-1010.11 linux-tools-6.8.0-1010-raspi - 6.8.0-1010.11 linux-tools-raspi - 6.8.0-1010.11 No subscription required linux-buildinfo-6.8.0-1011-ibm - 6.8.0-1011.11 linux-buildinfo-6.8.0-1011-oem - 6.8.0-1011.11 linux-buildinfo-6.8.0-1011-oracle - 6.8.0-1011.11 linux-buildinfo-6.8.0-1011-oracle-64k - 6.8.0-1011.11 linux-headers-6.8.0-1011-ibm - 6.8.0-1011.11 linux-headers-6.8.0-1011-oem - 6.8.0-1011.11 linux-headers-6.8.0-1011-oracle - 6.8.0-1011.11 linux-headers-6.8.0-1011-oracle-64k - 6.8.0-1011.11 linux-headers-ibm - 6.8.0-1011.11 linux-headers-ibm-classic - 6.8.0-1011.11 linux-headers-ibm-lts-24.04 - 6.8.0-1011.11 linux-headers-oem-24.04 - 6.8.0-1011.11 linux-headers-oem-24.04a - 6.8.0-1011.11 linux-headers-oracle - 6.8.0-1011.11 linux-headers-oracle-64k - 6.8.0-1011.11 linux-ibm - 6.8.0-1011.11 linux-ibm-classic - 6.8.0-1011.11 linux-ibm-cloud-tools-common - 6.8.0-1011.11 linux-ibm-headers-6.8.0-1011 - 6.8.0-1011.11 linux-ibm-lts-24.04 - 6.8.0-1011.11 linux-ibm-source-6.8.0 - 6.8.0-1011.11 linux-ibm-tools-6.8.0-1011 - 6.8.0-1011.11 linux-image-6.8.0-1011-ibm - 6.8.0-1011.11 linux-image-6.8.0-1011-oem - 6.8.0-1011.11 linux-image-6.8.0-1011-oracle - 6.8.0-1011.11 linux-image-6.8.0-1011-oracle-64k - 6.8.0-1011.11 linux-image-ibm - 6.8.0-1011.11 linux-image-ibm-classic - 6.8.0-1011.11 linux-image-ibm-lts-24.04 - 6.8.0-1011.11 linux-image-oem-24.04 - 6.8.0-1011.11 linux-image-oem-24.04a - 6.8.0-1011.11 linux-image-oracle - 6.8.0-1011.11 linux-image-oracle-64k - 6.8.0-1011.11 linux-image-uc-6.8.0-1011-oem - 6.8.0-1011.11 linux-image-uc-oem-24.04 - 6.8.0-1011.11 linux-image-uc-oem-24.04a - 6.8.0-1011.11 linux-image-unsigned-6.8.0-1011-ibm - 6.8.0-1011.11 linux-image-unsigned-6.8.0-1011-oem - 6.8.0-1011.11 linux-image-unsigned-6.8.0-1011-oracle - 6.8.0-1011.11 linux-image-unsigned-6.8.0-1011-oracle-64k - 6.8.0-1011.11 linux-modules-6.8.0-1011-ibm - 6.8.0-1011.11 linux-modules-6.8.0-1011-oem - 6.8.0-1011.11 linux-modules-6.8.0-1011-oracle - 6.8.0-1011.11 linux-modules-6.8.0-1011-oracle-64k - 6.8.0-1011.11 linux-modules-extra-6.8.0-1011-ibm - 6.8.0-1011.11 linux-modules-extra-6.8.0-1011-oracle - 6.8.0-1011.11 linux-modules-extra-6.8.0-1011-oracle-64k - 6.8.0-1011.11 linux-modules-ipu6-6.8.0-1011-oem - 6.8.0-1011.11 linux-modules-ipu6-oem-24.04 - 6.8.0-1011.11 linux-modules-ipu6-oem-24.04a - 6.8.0-1011.11 linux-modules-iwlwifi-6.8.0-1011-ibm - 6.8.0-1011.11 linux-modules-iwlwifi-6.8.0-1011-oem - 6.8.0-1011.11 linux-modules-iwlwifi-6.8.0-1011-oracle - 6.8.0-1011.11 linux-modules-iwlwifi-ibm - 6.8.0-1011.11 linux-modules-iwlwifi-ibm-classic - 6.8.0-1011.11 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1011.11 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1011.11 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1011.11 linux-modules-iwlwifi-oracle - 6.8.0-1011.11 linux-modules-usbio-6.8.0-1011-oem - 6.8.0-1011.11 linux-modules-usbio-oem-24.04 - 6.8.0-1011.11 linux-modules-usbio-oem-24.04a - 6.8.0-1011.11 linux-oem-24.04 - 6.8.0-1011.11 linux-oem-24.04a - 6.8.0-1011.11 linux-oem-6.8-headers-6.8.0-1011 - 6.8.0-1011.11 linux-oem-6.8-tools-6.8.0-1011 - 6.8.0-1011.11 linux-oracle - 6.8.0-1011.11 linux-oracle-64k - 6.8.0-1011.11 linux-oracle-headers-6.8.0-1011 - 6.8.0-1011.11 linux-oracle-tools-6.8.0-1011 - 6.8.0-1011.11 linux-tools-6.8.0-1011-ibm - 6.8.0-1011.11 linux-tools-6.8.0-1011-oem - 6.8.0-1011.11 linux-tools-6.8.0-1011-oracle - 6.8.0-1011.11 linux-tools-6.8.0-1011-oracle-64k - 6.8.0-1011.11 linux-tools-ibm - 6.8.0-1011.11 linux-tools-ibm-classic - 6.8.0-1011.11 linux-tools-ibm-lts-24.04 - 6.8.0-1011.11 linux-tools-oem-24.04 - 6.8.0-1011.11 linux-tools-oem-24.04a - 6.8.0-1011.11 linux-tools-oracle - 6.8.0-1011.11 linux-tools-oracle-64k - 6.8.0-1011.11 No subscription required linux-buildinfo-6.8.0-1012-nvidia - 6.8.0-1012.12 linux-buildinfo-6.8.0-1012-nvidia-64k - 6.8.0-1012.12 linux-cloud-tools-nvidia - 6.8.0-1012.12 linux-headers-6.8.0-1012-nvidia - 6.8.0-1012.12 linux-headers-6.8.0-1012-nvidia-64k - 6.8.0-1012.12 linux-headers-nvidia - 6.8.0-1012.12 linux-headers-nvidia-64k - 6.8.0-1012.12 linux-image-6.8.0-1012-nvidia - 6.8.0-1012.12 linux-image-6.8.0-1012-nvidia-64k - 6.8.0-1012.12 linux-image-nvidia - 6.8.0-1012.12 linux-image-nvidia-64k - 6.8.0-1012.12 linux-image-uc-6.8.0-1012-nvidia - 6.8.0-1012.12 linux-image-uc-6.8.0-1012-nvidia-64k - 6.8.0-1012.12 linux-image-unsigned-6.8.0-1012-nvidia - 6.8.0-1012.12 linux-image-unsigned-6.8.0-1012-nvidia-64k - 6.8.0-1012.12 linux-modules-6.8.0-1012-nvidia - 6.8.0-1012.12 linux-modules-6.8.0-1012-nvidia-64k - 6.8.0-1012.12 linux-modules-extra-6.8.0-1012-nvidia - 6.8.0-1012.12 linux-modules-nvidia-fs-6.8.0-1012-nvidia - 6.8.0-1012.12 linux-modules-nvidia-fs-6.8.0-1012-nvidia-64k - 6.8.0-1012.12 linux-modules-nvidia-fs-nvidia - 6.8.0-1012.12 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1012.12 linux-nvidia - 6.8.0-1012.12 linux-nvidia-64k - 6.8.0-1012.12 linux-nvidia-headers-6.8.0-1012 - 6.8.0-1012.12 linux-nvidia-tools-6.8.0-1012 - 6.8.0-1012.12 linux-nvidia-tools-host - 6.8.0-1012.12 linux-tools-6.8.0-1012-nvidia - 6.8.0-1012.12 linux-tools-6.8.0-1012-nvidia-64k - 6.8.0-1012.12 linux-tools-nvidia - 6.8.0-1012.12 linux-tools-nvidia-64k - 6.8.0-1012.12 No subscription required linux-buildinfo-6.8.0-1012-nvidia-lowlatency - 6.8.0-1012.12.1 linux-buildinfo-6.8.0-1012-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1012.12.1 linux-headers-6.8.0-1012-nvidia-lowlatency - 6.8.0-1012.12.1 linux-headers-6.8.0-1012-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-headers-nvidia-lowlatency - 6.8.0-1012.12.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-image-6.8.0-1012-nvidia-lowlatency - 6.8.0-1012.12.1 linux-image-6.8.0-1012-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-image-nvidia-lowlatency - 6.8.0-1012.12.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-image-uc-6.8.0-1012-nvidia-lowlatency - 6.8.0-1012.12.1 linux-image-uc-6.8.0-1012-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-image-unsigned-6.8.0-1012-nvidia-lowlatency - 6.8.0-1012.12.1 linux-image-unsigned-6.8.0-1012-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-modules-6.8.0-1012-nvidia-lowlatency - 6.8.0-1012.12.1 linux-modules-6.8.0-1012-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-modules-extra-6.8.0-1012-nvidia-lowlatency - 6.8.0-1012.12.1 linux-modules-nvidia-fs-6.8.0-1012-nvidia-lowlatency - 6.8.0-1012.12.1 linux-modules-nvidia-fs-6.8.0-1012-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1012.12.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-nvidia-lowlatency - 6.8.0-1012.12.1 linux-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-nvidia-lowlatency-headers-6.8.0-1012 - 6.8.0-1012.12.1 linux-nvidia-lowlatency-tools-6.8.0-1012 - 6.8.0-1012.12.1 linux-nvidia-lowlatency-tools-host - 6.8.0-1012.12.1 linux-tools-6.8.0-1012-nvidia-lowlatency - 6.8.0-1012.12.1 linux-tools-6.8.0-1012-nvidia-lowlatency-64k - 6.8.0-1012.12.1 linux-tools-nvidia-lowlatency - 6.8.0-1012.12.1 linux-tools-nvidia-lowlatency-64k - 6.8.0-1012.12.1 No subscription required linux-buildinfo-6.8.0-1013-gcp - 6.8.0-1013.14 linux-gcp - 6.8.0-1013.14 linux-gcp-headers-6.8.0-1013 - 6.8.0-1013.14 linux-gcp-tools-6.8.0-1013 - 6.8.0-1013.14 linux-headers-6.8.0-1013-gcp - 6.8.0-1013.14 linux-headers-gcp - 6.8.0-1013.14 linux-image-6.8.0-1013-gcp - 6.8.0-1013.14 linux-image-gcp - 6.8.0-1013.14 linux-image-unsigned-6.8.0-1013-gcp - 6.8.0-1013.14 linux-modules-6.8.0-1013-gcp - 6.8.0-1013.14 linux-modules-extra-6.8.0-1013-gcp - 6.8.0-1013.14 linux-modules-extra-gcp - 6.8.0-1013.14 linux-tools-6.8.0-1013-gcp - 6.8.0-1013.14 linux-tools-gcp - 6.8.0-1013.14 No subscription required linux-azure - 6.8.0-1013.15 linux-azure-cloud-tools-6.8.0-1013 - 6.8.0-1013.15 linux-azure-fde - 6.8.0-1013.15 linux-azure-headers-6.8.0-1013 - 6.8.0-1013.15 linux-azure-tools-6.8.0-1013 - 6.8.0-1013.15 linux-buildinfo-6.8.0-1013-azure - 6.8.0-1013.15 linux-cloud-tools-6.8.0-1013-azure - 6.8.0-1013.15 linux-cloud-tools-azure - 6.8.0-1013.15 linux-headers-6.8.0-1013-azure - 6.8.0-1013.15 linux-headers-azure - 6.8.0-1013.15 linux-image-6.8.0-1013-azure - 6.8.0-1013.15 linux-image-6.8.0-1013-azure-fde - 6.8.0-1013.15 linux-image-azure - 6.8.0-1013.15 linux-image-azure-fde - 6.8.0-1013.15 linux-image-unsigned-6.8.0-1013-azure - 6.8.0-1013.15 linux-modules-6.8.0-1013-azure - 6.8.0-1013.15 linux-modules-extra-6.8.0-1013-azure - 6.8.0-1013.15 linux-modules-extra-azure - 6.8.0-1013.15 linux-modules-involflt-6.8.0-1013-azure - 6.8.0-1013.15 linux-modules-involflt-azure - 6.8.0-1013.15 linux-modules-iwlwifi-6.8.0-1013-azure - 6.8.0-1013.15 linux-modules-iwlwifi-azure - 6.8.0-1013.15 linux-tools-6.8.0-1013-azure - 6.8.0-1013.15 linux-tools-azure - 6.8.0-1013.15 No subscription required linux-aws - 6.8.0-1014.15 linux-aws-cloud-tools-6.8.0-1014 - 6.8.0-1014.15 linux-aws-headers-6.8.0-1014 - 6.8.0-1014.15 linux-aws-tools-6.8.0-1014 - 6.8.0-1014.15 linux-buildinfo-6.8.0-1014-aws - 6.8.0-1014.15 linux-cloud-tools-6.8.0-1014-aws - 6.8.0-1014.15 linux-headers-6.8.0-1014-aws - 6.8.0-1014.15 linux-headers-aws - 6.8.0-1014.15 linux-image-6.8.0-1014-aws - 6.8.0-1014.15 linux-image-aws - 6.8.0-1014.15 linux-image-unsigned-6.8.0-1014-aws - 6.8.0-1014.15 linux-modules-6.8.0-1014-aws - 6.8.0-1014.15 linux-modules-extra-6.8.0-1014-aws - 6.8.0-1014.15 linux-modules-extra-aws - 6.8.0-1014.15 linux-tools-6.8.0-1014-aws - 6.8.0-1014.15 linux-tools-aws - 6.8.0-1014.15 No subscription required linux-buildinfo-6.8.0-41-generic - 6.8.0-41.41 linux-buildinfo-6.8.0-41-generic-64k - 6.8.0-41.41 linux-cloud-tools-6.8.0-41 - 6.8.0-41.41 linux-cloud-tools-6.8.0-41-generic - 6.8.0-41.41 linux-cloud-tools-common - 6.8.0-41.41 linux-cloud-tools-generic - 6.8.0-41.41 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-41.41 linux-cloud-tools-generic-hwe-24.04-edge - 6.8.0-41.41 linux-cloud-tools-virtual - 6.8.0-41.41 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-41.41 linux-cloud-tools-virtual-hwe-24.04-edge - 6.8.0-41.41 linux-crashdump - 6.8.0-41.41 linux-doc - 6.8.0-41.41 linux-generic - 6.8.0-41.41 linux-generic-64k - 6.8.0-41.41 linux-generic-64k-hwe-24.04 - 6.8.0-41.41 linux-generic-64k-hwe-24.04-edge - 6.8.0-41.41 linux-generic-hwe-24.04 - 6.8.0-41.41 linux-generic-hwe-24.04-edge - 6.8.0-41.41 linux-generic-lpae - 6.8.0-41.41 linux-headers-6.8.0-41 - 6.8.0-41.41 linux-headers-6.8.0-41-generic - 6.8.0-41.41 linux-headers-6.8.0-41-generic-64k - 6.8.0-41.41 linux-headers-generic - 6.8.0-41.41 linux-headers-generic-64k - 6.8.0-41.41 linux-headers-generic-64k-hwe-24.04 - 6.8.0-41.41 linux-headers-generic-64k-hwe-24.04-edge - 6.8.0-41.41 linux-headers-generic-hwe-24.04 - 6.8.0-41.41 linux-headers-generic-hwe-24.04-edge - 6.8.0-41.41 linux-headers-generic-lpae - 6.8.0-41.41 linux-headers-kvm - 6.8.0-41.41 linux-headers-laptop-23.10 - 6.8.0-41.41 linux-headers-oem-20.04 - 6.8.0-41.41 linux-headers-oem-20.04b - 6.8.0-41.41 linux-headers-oem-20.04c - 6.8.0-41.41 linux-headers-oem-20.04d - 6.8.0-41.41 linux-headers-oem-22.04 - 6.8.0-41.41 linux-headers-virtual - 6.8.0-41.41 linux-headers-virtual-hwe-24.04 - 6.8.0-41.41 linux-headers-virtual-hwe-24.04-edge - 6.8.0-41.41 linux-image-6.8.0-41-generic - 6.8.0-41.41 linux-image-6.8.0-41-generic-64k - 6.8.0-41.41 linux-image-extra-virtual - 6.8.0-41.41 linux-image-extra-virtual-hwe-24.04 - 6.8.0-41.41 linux-image-extra-virtual-hwe-24.04-edge - 6.8.0-41.41 linux-image-generic - 6.8.0-41.41 linux-image-generic-64k - 6.8.0-41.41 linux-image-generic-64k-hwe-24.04 - 6.8.0-41.41 linux-image-generic-64k-hwe-24.04-edge - 6.8.0-41.41 linux-image-generic-hwe-24.04 - 6.8.0-41.41 linux-image-generic-hwe-24.04-edge - 6.8.0-41.41 linux-image-generic-lpae - 6.8.0-41.41 linux-image-kvm - 6.8.0-41.41 linux-image-laptop-23.10 - 6.8.0-41.41 linux-image-oem-20.04 - 6.8.0-41.41 linux-image-oem-20.04b - 6.8.0-41.41 linux-image-oem-20.04c - 6.8.0-41.41 linux-image-oem-20.04d - 6.8.0-41.41 linux-image-oem-22.04 - 6.8.0-41.41 linux-image-uc-6.8.0-41-generic - 6.8.0-41.41 linux-image-uc-6.8.0-41-generic-64k - 6.8.0-41.41 linux-image-uc-generic - 6.8.0-41.41 linux-image-uc-generic-hwe-24.04 - 6.8.0-41.41 linux-image-uc-generic-hwe-24.04-edge - 6.8.0-41.41 linux-image-unsigned-6.8.0-41-generic - 6.8.0-41.41 linux-image-unsigned-6.8.0-41-generic-64k - 6.8.0-41.41 linux-image-virtual - 6.8.0-41.41 linux-image-virtual-hwe-24.04 - 6.8.0-41.41 linux-image-virtual-hwe-24.04-edge - 6.8.0-41.41 linux-kvm - 6.8.0-41.41 linux-laptop-23.10 - 6.8.0-41.41 linux-lib-rust-6.8.0-41-generic - 6.8.0-41.41 linux-libc-dev - 6.8.0-41.41 linux-modules-6.8.0-41-generic - 6.8.0-41.41 linux-modules-6.8.0-41-generic-64k - 6.8.0-41.41 linux-modules-extra-6.8.0-41-generic - 6.8.0-41.41 linux-modules-ipu6-6.8.0-41-generic - 6.8.0-41.41 linux-modules-ipu6-generic - 6.8.0-41.41 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-41.41 linux-modules-ipu6-generic-hwe-24.04-edge - 6.8.0-41.41 linux-modules-iwlwifi-6.8.0-41-generic - 6.8.0-41.41 linux-modules-iwlwifi-generic - 6.8.0-41.41 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-41.41 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.8.0-41.41 linux-modules-iwlwifi-oem-20.04 - 6.8.0-41.41 linux-modules-iwlwifi-oem-20.04d - 6.8.0-41.41 linux-modules-iwlwifi-oem-22.04 - 6.8.0-41.41 linux-modules-usbio-6.8.0-41-generic - 6.8.0-41.41 linux-modules-usbio-generic - 6.8.0-41.41 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-41.41 linux-modules-usbio-generic-hwe-24.04-edge - 6.8.0-41.41 linux-oem-20.04 - 6.8.0-41.41 linux-oem-20.04b - 6.8.0-41.41 linux-oem-20.04c - 6.8.0-41.41 linux-oem-20.04d - 6.8.0-41.41 linux-oem-22.04 - 6.8.0-41.41 linux-source - 6.8.0-41.41 linux-source-6.8.0 - 6.8.0-41.41 linux-tools-6.8.0-41 - 6.8.0-41.41 linux-tools-6.8.0-41-generic - 6.8.0-41.41 linux-tools-6.8.0-41-generic-64k - 6.8.0-41.41 linux-tools-common - 6.8.0-41.41 linux-tools-generic - 6.8.0-41.41 linux-tools-generic-64k - 6.8.0-41.41 linux-tools-generic-64k-hwe-24.04 - 6.8.0-41.41 linux-tools-generic-64k-hwe-24.04-edge - 6.8.0-41.41 linux-tools-generic-hwe-24.04 - 6.8.0-41.41 linux-tools-generic-hwe-24.04-edge - 6.8.0-41.41 linux-tools-generic-lpae - 6.8.0-41.41 linux-tools-host - 6.8.0-41.41 linux-tools-kvm - 6.8.0-41.41 linux-tools-laptop-23.10 - 6.8.0-41.41 linux-tools-oem-20.04 - 6.8.0-41.41 linux-tools-oem-20.04b - 6.8.0-41.41 linux-tools-oem-20.04c - 6.8.0-41.41 linux-tools-oem-20.04d - 6.8.0-41.41 linux-tools-oem-22.04 - 6.8.0-41.41 linux-tools-virtual - 6.8.0-41.41 linux-tools-virtual-hwe-24.04 - 6.8.0-41.41 linux-tools-virtual-hwe-24.04-edge - 6.8.0-41.41 linux-virtual - 6.8.0-41.41 linux-virtual-hwe-24.04 - 6.8.0-41.41 linux-virtual-hwe-24.04-edge - 6.8.0-41.41 No subscription required linux-buildinfo-6.8.0-41-lowlatency - 6.8.0-41.41.1 linux-buildinfo-6.8.0-41-lowlatency-64k - 6.8.0-41.41.1 linux-cloud-tools-6.8.0-41-lowlatency - 6.8.0-41.41.1 linux-cloud-tools-lowlatency - 6.8.0-41.41.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-41.41.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-41.41.1 linux-cloud-tools-lowlatency-hwe-22.04 - 6.8.0-41.41.1 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.8.0-41.41.1 linux-headers-6.8.0-41-lowlatency - 6.8.0-41.41.1 linux-headers-6.8.0-41-lowlatency-64k - 6.8.0-41.41.1 linux-headers-lowlatency - 6.8.0-41.41.1 linux-headers-lowlatency-64k - 6.8.0-41.41.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-41.41.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-41.41.1 linux-headers-lowlatency-64k-hwe-22.04 - 6.8.0-41.41.1 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.8.0-41.41.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-41.41.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-41.41.1 linux-headers-lowlatency-hwe-22.04 - 6.8.0-41.41.1 linux-headers-lowlatency-hwe-22.04-edge - 6.8.0-41.41.1 linux-image-6.8.0-41-lowlatency - 6.8.0-41.41.1 linux-image-6.8.0-41-lowlatency-64k - 6.8.0-41.41.1 linux-image-lowlatency - 6.8.0-41.41.1 linux-image-lowlatency-64k - 6.8.0-41.41.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-41.41.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-41.41.1 linux-image-lowlatency-64k-hwe-22.04 - 6.8.0-41.41.1 linux-image-lowlatency-64k-hwe-22.04-edge - 6.8.0-41.41.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-41.41.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-41.41.1 linux-image-lowlatency-hwe-22.04 - 6.8.0-41.41.1 linux-image-lowlatency-hwe-22.04-edge - 6.8.0-41.41.1 linux-image-unsigned-6.8.0-41-lowlatency - 6.8.0-41.41.1 linux-image-unsigned-6.8.0-41-lowlatency-64k - 6.8.0-41.41.1 linux-lowlatency - 6.8.0-41.41.1 linux-lowlatency-64k - 6.8.0-41.41.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-41.41.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-41.41.1 linux-lowlatency-64k-hwe-22.04 - 6.8.0-41.41.1 linux-lowlatency-64k-hwe-22.04-edge - 6.8.0-41.41.1 linux-lowlatency-cloud-tools-6.8.0-41 - 6.8.0-41.41.1 linux-lowlatency-cloud-tools-common - 6.8.0-41.41.1 linux-lowlatency-headers-6.8.0-41 - 6.8.0-41.41.1 linux-lowlatency-hwe-20.04 - 6.8.0-41.41.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-41.41.1 linux-lowlatency-hwe-22.04 - 6.8.0-41.41.1 linux-lowlatency-hwe-22.04-edge - 6.8.0-41.41.1 linux-lowlatency-lib-rust-6.8.0-41-lowlatency - 6.8.0-41.41.1 linux-lowlatency-tools-6.8.0-41 - 6.8.0-41.41.1 linux-lowlatency-tools-common - 6.8.0-41.41.1 linux-lowlatency-tools-host - 6.8.0-41.41.1 linux-modules-6.8.0-41-lowlatency - 6.8.0-41.41.1 linux-modules-6.8.0-41-lowlatency-64k - 6.8.0-41.41.1 linux-modules-iwlwifi-6.8.0-41-lowlatency - 6.8.0-41.41.1 linux-modules-iwlwifi-lowlatency - 6.8.0-41.41.1 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.8.0-41.41.1 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.8.0-41.41.1 linux-tools-6.8.0-41-lowlatency - 6.8.0-41.41.1 linux-tools-6.8.0-41-lowlatency-64k - 6.8.0-41.41.1 linux-tools-lowlatency - 6.8.0-41.41.1 linux-tools-lowlatency-64k - 6.8.0-41.41.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-41.41.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-41.41.1 linux-tools-lowlatency-64k-hwe-22.04 - 6.8.0-41.41.1 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.8.0-41.41.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-41.41.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-41.41.1 linux-tools-lowlatency-hwe-22.04 - 6.8.0-41.41.1 linux-tools-lowlatency-hwe-22.04-edge - 6.8.0-41.41.1 No subscription required Medium CVE-2024-39292 CVE-2024-39484 USN-6977-1 -- QEMU vulnerabilities Ubuntu 24.04 LTS It was discovered that QEMU did not properly handle certain memory operations, which could result in a buffer overflow. An attacker could potentially use this issue to cause a denial of service. (CVE-2024-26327) It was discovered that QEMU did not properly handle certain memory operations, which could result in an out-of-bounds memory access. An attacker could potentially use this issue to cause a denial of service. (CVE-2024-26328) Update Instructions: Run `sudo pro fix USN-6977-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: qemu-block-extra - 1:8.2.2+ds-0ubuntu1.2 qemu-block-supplemental - 1:8.2.2+ds-0ubuntu1.2 qemu-guest-agent - 1:8.2.2+ds-0ubuntu1.2 qemu-system - 1:8.2.2+ds-0ubuntu1.2 qemu-system-arm - 1:8.2.2+ds-0ubuntu1.2 qemu-system-common - 1:8.2.2+ds-0ubuntu1.2 qemu-system-data - 1:8.2.2+ds-0ubuntu1.2 qemu-system-gui - 1:8.2.2+ds-0ubuntu1.2 qemu-system-mips - 1:8.2.2+ds-0ubuntu1.2 qemu-system-misc - 1:8.2.2+ds-0ubuntu1.2 qemu-system-modules-opengl - 1:8.2.2+ds-0ubuntu1.2 qemu-system-modules-spice - 1:8.2.2+ds-0ubuntu1.2 qemu-system-ppc - 1:8.2.2+ds-0ubuntu1.2 qemu-system-s390x - 1:8.2.2+ds-0ubuntu1.2 qemu-system-sparc - 1:8.2.2+ds-0ubuntu1.2 qemu-system-x86 - 1:8.2.2+ds-0ubuntu1.2 qemu-system-x86-xen - 1:8.2.2+ds-0ubuntu1.2 qemu-system-xen - 1:8.2.2+ds-0ubuntu1.2 qemu-user - 1:8.2.2+ds-0ubuntu1.2 qemu-user-binfmt - 1:8.2.2+ds-0ubuntu1.2 qemu-user-static - 1:8.2.2+ds-0ubuntu1.2 qemu-utils - 1:8.2.2+ds-0ubuntu1.2 No subscription required Medium CVE-2024-26327 CVE-2024-26328 USN-6982-1 -- Dovecot vulnerabilities Ubuntu 24.04 LTS It was discovered that Dovecot did not not properly have restrictions on ithe size of address headers. A remote attacker could possibly use this issue to cause denial of service. (CVE-2024-23184, CVE-2024-23185) Update Instructions: Run `sudo pro fix USN-6982-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: dovecot-auth-lua - 1:2.3.21+dfsg1-2ubuntu6 dovecot-core - 1:2.3.21+dfsg1-2ubuntu6 dovecot-dev - 1:2.3.21+dfsg1-2ubuntu6 dovecot-gssapi - 1:2.3.21+dfsg1-2ubuntu6 dovecot-imapd - 1:2.3.21+dfsg1-2ubuntu6 dovecot-ldap - 1:2.3.21+dfsg1-2ubuntu6 dovecot-lmtpd - 1:2.3.21+dfsg1-2ubuntu6 dovecot-managesieved - 1:2.3.21+dfsg1-2ubuntu6 dovecot-mysql - 1:2.3.21+dfsg1-2ubuntu6 dovecot-pgsql - 1:2.3.21+dfsg1-2ubuntu6 dovecot-pop3d - 1:2.3.21+dfsg1-2ubuntu6 dovecot-sieve - 1:2.3.21+dfsg1-2ubuntu6 dovecot-solr - 1:2.3.21+dfsg1-2ubuntu6 dovecot-sqlite - 1:2.3.21+dfsg1-2ubuntu6 dovecot-submissiond - 1:2.3.21+dfsg1-2ubuntu6 No subscription required Medium CVE-2024-23184 CVE-2024-23185 USN-6983-1 -- FFmpeg vulnerability Ubuntu 24.04 LTS Zeng Yunxiang discovered that FFmpeg incorrectly handled memory during video encoding. An attacker could possibly use this issue to perform a denial of service, or execute arbitrary code. Update Instructions: Run `sudo pro fix USN-6983-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ffmpeg - 7:6.1.1-3ubuntu5+esm2 ffmpeg-doc - 7:6.1.1-3ubuntu5+esm2 libavcodec-dev - 7:6.1.1-3ubuntu5+esm2 libavcodec-extra - 7:6.1.1-3ubuntu5+esm2 libavcodec-extra60 - 7:6.1.1-3ubuntu5+esm2 libavcodec60 - 7:6.1.1-3ubuntu5+esm2 libavdevice-dev - 7:6.1.1-3ubuntu5+esm2 libavdevice60 - 7:6.1.1-3ubuntu5+esm2 libavfilter-dev - 7:6.1.1-3ubuntu5+esm2 libavfilter-extra - 7:6.1.1-3ubuntu5+esm2 libavfilter-extra9 - 7:6.1.1-3ubuntu5+esm2 libavfilter9 - 7:6.1.1-3ubuntu5+esm2 libavformat-dev - 7:6.1.1-3ubuntu5+esm2 libavformat-extra - 7:6.1.1-3ubuntu5+esm2 libavformat-extra60 - 7:6.1.1-3ubuntu5+esm2 libavformat60 - 7:6.1.1-3ubuntu5+esm2 libavutil-dev - 7:6.1.1-3ubuntu5+esm2 libavutil58 - 7:6.1.1-3ubuntu5+esm2 libpostproc-dev - 7:6.1.1-3ubuntu5+esm2 libpostproc57 - 7:6.1.1-3ubuntu5+esm2 libswresample-dev - 7:6.1.1-3ubuntu5+esm2 libswresample4 - 7:6.1.1-3ubuntu5+esm2 libswscale-dev - 7:6.1.1-3ubuntu5+esm2 libswscale7 - 7:6.1.1-3ubuntu5+esm2 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2024-32230 USN-6984-1 -- WebOb vulnerability Ubuntu 24.04 LTS It was discovered that WebOb incorrectly handled certain URLs. An attacker could possibly use this issue to control a redirect or forward to another URL. Update Instructions: Run `sudo pro fix USN-6984-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-webob-doc - 1:1.8.7-1ubuntu0.1.24.04.1 python3-webob - 1:1.8.7-1ubuntu0.1.24.04.1 No subscription required Medium CVE-2024-42353 USN-6986-1 -- OpenSSL vulnerability Ubuntu 24.04 LTS David Benjamin discovered that OpenSSL incorrectly handled certain X.509 certificates. An attacker could possible use this issue to cause a denial of service or expose sensitive information. Update Instructions: Run `sudo pro fix USN-6986-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libssl-dev - 3.0.13-0ubuntu3.4 libssl-doc - 3.0.13-0ubuntu3.4 libssl3t64 - 3.0.13-0ubuntu3.4 openssl - 3.0.13-0ubuntu3.4 No subscription required Medium CVE-2024-6119 USN-6987-1 -- Django vulnerabilities Ubuntu 24.04 LTS It was discovered that Django incorrectly handled certain inputs. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-45230) It was discovered that Django incorrectly handled certain email sending failures. A remote attacker could possibly use this issue to enumerate user emails by issuing password reset requests and observing the outcomes. (CVE-2024-45231) Update Instructions: Run `sudo pro fix USN-6987-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-django-doc - 3:4.2.11-1ubuntu1.3 python3-django - 3:4.2.11-1ubuntu1.3 No subscription required Medium CVE-2024-45230 CVE-2024-45231 USN-6988-1 -- Twisted vulnerabilities Ubuntu 24.04 LTS It was discovered that Twisted incorrectly handled response order when processing multiple HTTP requests. A remote attacker could possibly use this issue to delay and manipulate responses. This issue only affected Ubuntu 24.04 LTS. (CVE-2024-41671) It was discovered that Twisted did not properly sanitize certain input. An attacker could use this vulnerability to possibly execute an HTML injection leading to a cross-site scripting (XSS) attack. (CVE-2024-41810) Update Instructions: Run `sudo pro fix USN-6988-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-twisted - 24.3.0-1ubuntu0.1 twisted-doc - 24.3.0-1ubuntu0.1 No subscription required Medium CVE-2024-41671 CVE-2024-41810 USN-6989-1 -- OpenStack vulnerability Ubuntu 24.04 LTS Dan Smith, Julia Kreger and Jay Faulkner discovered that in image processing for Ironic, a specially crafted image could be used by an authenticated user to exploit undesired behaviors in qemu-img, including possible unauthorized access to potentially sensitive data. Update Instructions: Run `sudo pro fix USN-6989-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ironic-api - 1:24.1.1-0ubuntu1.2 ironic-common - 1:24.1.1-0ubuntu1.2 ironic-conductor - 1:24.1.1-0ubuntu1.2 python3-ironic - 1:24.1.1-0ubuntu1.2 No subscription required Medium CVE-2024-44082 USN-6990-1 -- znc vulnerability Ubuntu 24.04 LTS Johannes Kuhn (DasBrain) discovered that znc incorrectly handled user input under certain operations. An attacker could possibly use this issue to execute arbitrary code on a user's system if the user was tricked into joining a malicious server. Update Instructions: Run `sudo pro fix USN-6990-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: znc-backlog - 0.20180824+1.9.0-2ubuntu0.1~esm2 Available with Ubuntu Pro: https://ubuntu.com/pro znc-push - 1.0.0+git20190521.78d0385+1.9.0-2ubuntu0.1~esm2 Available with Ubuntu Pro: https://ubuntu.com/pro znc - 1.9.0-2ubuntu0.1~esm2 znc-dev - 1.9.0-2ubuntu0.1~esm2 znc-perl - 1.9.0-2ubuntu0.1~esm2 znc-python - 1.9.0-2ubuntu0.1~esm2 znc-tcl - 1.9.0-2ubuntu0.1~esm2 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2024-39844 USN-6991-1 -- AIOHTTP vulnerability Ubuntu 24.04 LTS It was discovered that AIOHTTP did not properly restrict file access when the 'follow_symlinks' option was set to True. A remote attacker could possibly use this issue to access unauthorized files on the system. Update Instructions: Run `sudo pro fix USN-6991-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-aiohttp-doc - 3.9.1-1ubuntu0.1 python3-aiohttp - 3.9.1-1ubuntu0.1 No subscription required Medium CVE-2024-23334 USN-6993-1 -- Vim vulnerabilities Ubuntu 24.04 LTS It was discovered that Vim incorrectly handled memory when closing a window, leading to a double-free vulnerability. If a user was tricked into opening a specially crafted file, an attacker could crash the application, leading to a denial of service, or possibly achieve code execution with user privileges. (CVE-2024-41957) It was discovered that Vim incorrectly handled memory when adding a new file to an argument list, leading to a use-after-free. If a user was tricked into opening a specially crafted file, an attacker could crash the application, leading to a denial of service. (CVE-2024-43374) Update Instructions: Run `sudo pro fix USN-6993-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: vim - 2:9.1.0016-1ubuntu7.2 vim-athena - 2:9.1.0016-1ubuntu7.2 vim-common - 2:9.1.0016-1ubuntu7.2 vim-doc - 2:9.1.0016-1ubuntu7.2 vim-gtk3 - 2:9.1.0016-1ubuntu7.2 vim-gui-common - 2:9.1.0016-1ubuntu7.2 vim-motif - 2:9.1.0016-1ubuntu7.2 vim-nox - 2:9.1.0016-1ubuntu7.2 vim-runtime - 2:9.1.0016-1ubuntu7.2 vim-tiny - 2:9.1.0016-1ubuntu7.2 xxd - 2:9.1.0016-1ubuntu7.2 No subscription required Medium CVE-2024-41957 CVE-2024-43374 USN-6996-1 -- WebKitGTK vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the WebKitGTK Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution. Update Instructions: Run `sudo pro fix USN-6996-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-javascriptcoregtk-4.1 - 2.44.3-0ubuntu0.24.04.1 gir1.2-javascriptcoregtk-6.0 - 2.44.3-0ubuntu0.24.04.1 gir1.2-webkit-6.0 - 2.44.3-0ubuntu0.24.04.1 gir1.2-webkit2-4.1 - 2.44.3-0ubuntu0.24.04.1 libjavascriptcoregtk-4.0-bin - 2.44.3-0ubuntu0.24.04.1 libjavascriptcoregtk-4.1-0 - 2.44.3-0ubuntu0.24.04.1 libjavascriptcoregtk-4.1-dev - 2.44.3-0ubuntu0.24.04.1 libjavascriptcoregtk-6.0-1 - 2.44.3-0ubuntu0.24.04.1 libjavascriptcoregtk-6.0-dev - 2.44.3-0ubuntu0.24.04.1 libjavascriptcoregtk-bin - 2.44.3-0ubuntu0.24.04.1 libwebkit2gtk-4.0-doc - 2.44.3-0ubuntu0.24.04.1 libwebkit2gtk-4.1-0 - 2.44.3-0ubuntu0.24.04.1 libwebkit2gtk-4.1-dev - 2.44.3-0ubuntu0.24.04.1 libwebkitgtk-6.0-4 - 2.44.3-0ubuntu0.24.04.1 libwebkitgtk-6.0-dev - 2.44.3-0ubuntu0.24.04.1 libwebkitgtk-doc - 2.44.3-0ubuntu0.24.04.1 webkit2gtk-driver - 2.44.3-0ubuntu0.24.04.1 No subscription required Medium CVE-2024-40776 CVE-2024-40779 CVE-2024-40780 CVE-2024-40782 CVE-2024-40789 CVE-2024-4558 USN-6997-1 -- LibTIFF vulnerability Ubuntu 24.04 LTS It was discovered that LibTIFF incorrectly handled memory. An attacker could possibly use this issue to cause the application to crash, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-6997-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libtiff-dev - 4.5.1+git230720-4ubuntu2.2 libtiff-doc - 4.5.1+git230720-4ubuntu2.2 libtiff-opengl - 4.5.1+git230720-4ubuntu2.2 libtiff-tools - 4.5.1+git230720-4ubuntu2.2 libtiff5-dev - 4.5.1+git230720-4ubuntu2.2 libtiff6 - 4.5.1+git230720-4ubuntu2.2 libtiffxx6 - 4.5.1+git230720-4ubuntu2.2 No subscription required Medium CVE-2024-7006 USN-6998-1 -- Unbound vulnerabilities Ubuntu 24.04 LTS It was discovered that Unbound incorrectly handled string comparisons, which could lead to a NULL pointer dereference. An attacker could potentially use this issue to cause a denial of service. (CVE-2024-43167) It was discovered that Unbound incorrectly handled memory in cfg_mark_ports, which could lead to a heap buffer overflow. A local attacker could potentially use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-43168) Update Instructions: Run `sudo pro fix USN-6998-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libunbound-dev - 1.19.2-1ubuntu3.2 libunbound8 - 1.19.2-1ubuntu3.2 python3-unbound - 1.19.2-1ubuntu3.2 unbound - 1.19.2-1ubuntu3.2 unbound-anchor - 1.19.2-1ubuntu3.2 unbound-host - 1.19.2-1ubuntu3.2 No subscription required Medium CVE-2024-43167 CVE-2024-43168 USN-6999-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Chenyuan Yang discovered that the CEC driver driver in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2024-23848) It was discovered that the JFS file system contained an out-of-bounds read vulnerability when printing xattr debug information. A local attacker could use this to cause a denial of service (system crash). (CVE-2024-40902) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PA-RISC architecture; - PowerPC architecture; - RISC-V architecture; - x86 architecture; - Block layer subsystem; - ACPI drivers; - Drivers core; - Null block device driver; - Character device driver; - TPM device driver; - Clock framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - Buffer Sharing and Synchronization framework; - DMA engine subsystem; - EFI core; - FPGA Framework; - GPU drivers; - Greybus drivers; - HID subsystem; - HW tracing; - I2C subsystem; - IIO subsystem; - InfiniBand drivers; - Input Device (Mouse) drivers; - Mailbox framework; - Media drivers; - Microchip PCI driver; - VMware VMCI Driver; - Network drivers; - PCI subsystem; - x86 platform drivers; - PTP clock framework; - S/390 drivers; - SCSI drivers; - SoundWire subsystem; - Sonic Silicon Backplane drivers; - Greybus lights staging drivers; - Thermal drivers; - TTY drivers; - USB subsystem; - VFIO drivers; - Framebuffer layer; - Watchdog drivers; - 9P distributed file system; - BTRFS file system; - File systems infrastructure; - Ext4 file system; - F2FS file system; - JFS file system; - Network file system server daemon; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - Tracing file system; - Tracing infrastructure; - io_uring subsystem; - Core kernel; - BPF subsystem; - Kernel debugger infrastructure; - DMA mapping infrastructure; - IRQ subsystem; - Memory management; - 9P file system network protocol; - Amateur Radio drivers; - B.A.T.M.A.N. meshing protocol; - Ethernet bridge; - Networking core; - Ethtool driver; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - Netfilter; - NET/ROM layer; - NFC subsystem; - Network traffic control; - Sun RPC protocol; - TIPC protocol; - TLS protocol; - Unix domain sockets; - Wireless networking; - XFRM subsystem; - AppArmor security module; - Integrity Measurement Architecture(IMA) framework; - Landlock security; - Linux Security Modules (LSM) Framework; - SELinux security module; - Simplified Mandatory Access Control Kernel framework; - ALSA framework; - HD-audio driver; - SOF drivers; - KVM core; (CVE-2024-40911, CVE-2024-37356, CVE-2024-40935, CVE-2024-40944, CVE-2024-41003, CVE-2024-40990, CVE-2024-40952, CVE-2024-40940, CVE-2024-40930, CVE-2024-40985, CVE-2024-40941, CVE-2024-38630, CVE-2024-39466, CVE-2024-40933, CVE-2024-38624, CVE-2024-40924, CVE-2024-40945, CVE-2024-40899, CVE-2024-38622, CVE-2024-40979, CVE-2024-36484, CVE-2024-41004, CVE-2024-39474, CVE-2022-48772, CVE-2024-36244, CVE-2024-38664, CVE-2024-40925, CVE-2024-40980, CVE-2024-39480, CVE-2024-36270, CVE-2024-40936, CVE-2024-40904, CVE-2024-38635, CVE-2024-40927, CVE-2024-36481, CVE-2024-40929, CVE-2024-40958, CVE-2024-36978, CVE-2024-40992, CVE-2024-40908, CVE-2024-39504, CVE-2024-41001, CVE-2024-40967, CVE-2023-52884, CVE-2024-40997, CVE-2024-40903, CVE-2024-40913, CVE-2024-34030, CVE-2024-39473, CVE-2024-40966, CVE-2024-40951, CVE-2024-40902, CVE-2024-40982, CVE-2024-40923, CVE-2024-39467, CVE-2024-40910, CVE-2024-40909, CVE-2024-39463, CVE-2024-40974, CVE-2024-41002, CVE-2024-39464, CVE-2024-39496, CVE-2024-41040, CVE-2024-39469, CVE-2024-39500, CVE-2024-39510, CVE-2024-38627, CVE-2024-32936, CVE-2024-40975, CVE-2024-38390, CVE-2024-40959, CVE-2024-41006, CVE-2024-40986, CVE-2024-40987, CVE-2024-40922, CVE-2024-40983, CVE-2024-37354, CVE-2024-38637, CVE-2024-39277, CVE-2024-40943, CVE-2024-39371, CVE-2024-40921, CVE-2024-40953, CVE-2024-38634, CVE-2024-38659, CVE-2024-39492, CVE-2024-40976, CVE-2024-40906, CVE-2024-40965, CVE-2024-38667, CVE-2024-39498, CVE-2024-38628, CVE-2024-38661, CVE-2024-38663, CVE-2024-40998, CVE-2024-40948, CVE-2024-38306, CVE-2024-40928, CVE-2024-39468, CVE-2024-39494, CVE-2024-39505, CVE-2024-40963, CVE-2024-39499, CVE-2024-39506, CVE-2024-40995, CVE-2024-39491, CVE-2024-40900, CVE-2024-39478, CVE-2024-39490, CVE-2024-39291, CVE-2024-40981, CVE-2024-40926, CVE-2024-40939, CVE-2024-38385, CVE-2024-39483, CVE-2024-40989, CVE-2024-40955, CVE-2024-39501, CVE-2024-38381, CVE-2024-33621, CVE-2024-40964, CVE-2024-42148, CVE-2024-36286, CVE-2024-38629, CVE-2024-39509, CVE-2024-39298, CVE-2024-36489, CVE-2024-34777, CVE-2024-40957, CVE-2024-40919, CVE-2024-39462, CVE-2024-39495, CVE-2024-39497, CVE-2024-38636, CVE-2024-36281, CVE-2024-39479, CVE-2024-40932, CVE-2024-36288, CVE-2024-38623, CVE-2024-40969, CVE-2024-40931, CVE-2024-36971, CVE-2024-40934, CVE-2024-36015, CVE-2024-39485, CVE-2024-40996, CVE-2024-39507, CVE-2024-36973, CVE-2024-38625, CVE-2024-39301, CVE-2024-34027, CVE-2024-37026, CVE-2024-40960, CVE-2024-37078, CVE-2024-40912, CVE-2024-40988, CVE-2024-41005, CVE-2024-39276, CVE-2024-38662, CVE-2024-39502, CVE-2024-36479, CVE-2024-40947, CVE-2024-38780, CVE-2024-38388, CVE-2024-40917, CVE-2024-36974, CVE-2024-40970, CVE-2024-40901, CVE-2024-38384, CVE-2024-39475, CVE-2024-40949, CVE-2024-37021, CVE-2024-38633, CVE-2024-39503, CVE-2024-41000, CVE-2024-33847, CVE-2024-35247, CVE-2024-40968, CVE-2024-33619, CVE-2024-38619, CVE-2024-40984, CVE-2024-36478, CVE-2024-39493, CVE-2024-42078, CVE-2024-40954, CVE-2024-40978, CVE-2024-39508, CVE-2024-40915, CVE-2024-39489, CVE-2024-40920, CVE-2024-38618, CVE-2024-40938, CVE-2024-39296, CVE-2024-40962, CVE-2024-39470, CVE-2024-39481, CVE-2024-40977, CVE-2024-38621, CVE-2024-40971, CVE-2024-31076, CVE-2024-36972, CVE-2024-39471, CVE-2024-40994, CVE-2024-40973, CVE-2024-40916, CVE-2024-40942, CVE-2024-40956, CVE-2024-39465, CVE-2024-40914, CVE-2024-40937, CVE-2024-40918, CVE-2024-40905, CVE-2024-39488, CVE-2024-38632, CVE-2024-39461, CVE-2024-40999, CVE-2024-40972, CVE-2024-36477, CVE-2024-40961) Update Instructions: Run `sudo pro fix USN-6999-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1010-gke - 6.8.0-1010.13 linux-gke - 6.8.0-1010.13 linux-gke-headers-6.8.0-1010 - 6.8.0-1010.13 linux-gke-tools-6.8.0-1010 - 6.8.0-1010.13 linux-headers-6.8.0-1010-gke - 6.8.0-1010.13 linux-headers-gke - 6.8.0-1010.13 linux-image-6.8.0-1010-gke - 6.8.0-1010.13 linux-image-gke - 6.8.0-1010.13 linux-image-unsigned-6.8.0-1010-gke - 6.8.0-1010.13 linux-modules-6.8.0-1010-gke - 6.8.0-1010.13 linux-modules-extra-6.8.0-1010-gke - 6.8.0-1010.13 linux-modules-iwlwifi-6.8.0-1010-gke - 6.8.0-1010.13 linux-modules-iwlwifi-gke - 6.8.0-1010.13 linux-tools-6.8.0-1010-gke - 6.8.0-1010.13 linux-tools-gke - 6.8.0-1010.13 No subscription required linux-buildinfo-6.8.0-1012-ibm - 6.8.0-1012.12 linux-buildinfo-6.8.0-1012-oem - 6.8.0-1012.12 linux-buildinfo-6.8.0-1012-oracle - 6.8.0-1012.12 linux-buildinfo-6.8.0-1012-oracle-64k - 6.8.0-1012.12 linux-headers-6.8.0-1012-ibm - 6.8.0-1012.12 linux-headers-6.8.0-1012-oem - 6.8.0-1012.12 linux-headers-6.8.0-1012-oracle - 6.8.0-1012.12 linux-headers-6.8.0-1012-oracle-64k - 6.8.0-1012.12 linux-headers-ibm - 6.8.0-1012.12 linux-headers-ibm-classic - 6.8.0-1012.12 linux-headers-ibm-lts-24.04 - 6.8.0-1012.12 linux-headers-oem-24.04 - 6.8.0-1012.12 linux-headers-oem-24.04a - 6.8.0-1012.12 linux-headers-oracle - 6.8.0-1012.12 linux-headers-oracle-64k - 6.8.0-1012.12 linux-ibm - 6.8.0-1012.12 linux-ibm-classic - 6.8.0-1012.12 linux-ibm-cloud-tools-common - 6.8.0-1012.12 linux-ibm-headers-6.8.0-1012 - 6.8.0-1012.12 linux-ibm-lts-24.04 - 6.8.0-1012.12 linux-ibm-source-6.8.0 - 6.8.0-1012.12 linux-ibm-tools-6.8.0-1012 - 6.8.0-1012.12 linux-image-6.8.0-1012-ibm - 6.8.0-1012.12 linux-image-6.8.0-1012-oem - 6.8.0-1012.12 linux-image-6.8.0-1012-oracle - 6.8.0-1012.12 linux-image-6.8.0-1012-oracle-64k - 6.8.0-1012.12 linux-image-ibm - 6.8.0-1012.12 linux-image-ibm-classic - 6.8.0-1012.12 linux-image-ibm-lts-24.04 - 6.8.0-1012.12 linux-image-oem-24.04 - 6.8.0-1012.12 linux-image-oem-24.04a - 6.8.0-1012.12 linux-image-oracle - 6.8.0-1012.12 linux-image-oracle-64k - 6.8.0-1012.12 linux-image-uc-6.8.0-1012-oem - 6.8.0-1012.12 linux-image-uc-oem-24.04 - 6.8.0-1012.12 linux-image-uc-oem-24.04a - 6.8.0-1012.12 linux-image-unsigned-6.8.0-1012-ibm - 6.8.0-1012.12 linux-image-unsigned-6.8.0-1012-oem - 6.8.0-1012.12 linux-image-unsigned-6.8.0-1012-oracle - 6.8.0-1012.12 linux-image-unsigned-6.8.0-1012-oracle-64k - 6.8.0-1012.12 linux-modules-6.8.0-1012-ibm - 6.8.0-1012.12 linux-modules-6.8.0-1012-oem - 6.8.0-1012.12 linux-modules-6.8.0-1012-oracle - 6.8.0-1012.12 linux-modules-6.8.0-1012-oracle-64k - 6.8.0-1012.12 linux-modules-extra-6.8.0-1012-ibm - 6.8.0-1012.12 linux-modules-extra-6.8.0-1012-oracle - 6.8.0-1012.12 linux-modules-extra-6.8.0-1012-oracle-64k - 6.8.0-1012.12 linux-modules-ipu6-6.8.0-1012-oem - 6.8.0-1012.12 linux-modules-ipu6-oem-24.04 - 6.8.0-1012.12 linux-modules-ipu6-oem-24.04a - 6.8.0-1012.12 linux-modules-iwlwifi-6.8.0-1012-ibm - 6.8.0-1012.12 linux-modules-iwlwifi-6.8.0-1012-oem - 6.8.0-1012.12 linux-modules-iwlwifi-6.8.0-1012-oracle - 6.8.0-1012.12 linux-modules-iwlwifi-ibm - 6.8.0-1012.12 linux-modules-iwlwifi-ibm-classic - 6.8.0-1012.12 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1012.12 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1012.12 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1012.12 linux-modules-iwlwifi-oracle - 6.8.0-1012.12 linux-modules-usbio-6.8.0-1012-oem - 6.8.0-1012.12 linux-modules-usbio-oem-24.04 - 6.8.0-1012.12 linux-modules-usbio-oem-24.04a - 6.8.0-1012.12 linux-oem-24.04 - 6.8.0-1012.12 linux-oem-24.04a - 6.8.0-1012.12 linux-oem-6.8-headers-6.8.0-1012 - 6.8.0-1012.12 linux-oem-6.8-tools-6.8.0-1012 - 6.8.0-1012.12 linux-oracle - 6.8.0-1012.12 linux-oracle-64k - 6.8.0-1012.12 linux-oracle-headers-6.8.0-1012 - 6.8.0-1012.12 linux-oracle-tools-6.8.0-1012 - 6.8.0-1012.12 linux-tools-6.8.0-1012-ibm - 6.8.0-1012.12 linux-tools-6.8.0-1012-oem - 6.8.0-1012.12 linux-tools-6.8.0-1012-oracle - 6.8.0-1012.12 linux-tools-6.8.0-1012-oracle-64k - 6.8.0-1012.12 linux-tools-ibm - 6.8.0-1012.12 linux-tools-ibm-classic - 6.8.0-1012.12 linux-tools-ibm-lts-24.04 - 6.8.0-1012.12 linux-tools-oem-24.04 - 6.8.0-1012.12 linux-tools-oem-24.04a - 6.8.0-1012.12 linux-tools-oracle - 6.8.0-1012.12 linux-tools-oracle-64k - 6.8.0-1012.12 No subscription required linux-buildinfo-6.8.0-1014-gcp - 6.8.0-1014.16 linux-gcp - 6.8.0-1014.16 linux-gcp-headers-6.8.0-1014 - 6.8.0-1014.16 linux-gcp-tools-6.8.0-1014 - 6.8.0-1014.16 linux-headers-6.8.0-1014-gcp - 6.8.0-1014.16 linux-headers-gcp - 6.8.0-1014.16 linux-image-6.8.0-1014-gcp - 6.8.0-1014.16 linux-image-gcp - 6.8.0-1014.16 linux-image-unsigned-6.8.0-1014-gcp - 6.8.0-1014.16 linux-modules-6.8.0-1014-gcp - 6.8.0-1014.16 linux-modules-extra-6.8.0-1014-gcp - 6.8.0-1014.16 linux-modules-extra-gcp - 6.8.0-1014.16 linux-tools-6.8.0-1014-gcp - 6.8.0-1014.16 linux-tools-gcp - 6.8.0-1014.16 No subscription required linux-aws - 6.8.0-1015.16 linux-aws-cloud-tools-6.8.0-1015 - 6.8.0-1015.16 linux-aws-headers-6.8.0-1015 - 6.8.0-1015.16 linux-aws-tools-6.8.0-1015 - 6.8.0-1015.16 linux-buildinfo-6.8.0-1015-aws - 6.8.0-1015.16 linux-cloud-tools-6.8.0-1015-aws - 6.8.0-1015.16 linux-headers-6.8.0-1015-aws - 6.8.0-1015.16 linux-headers-aws - 6.8.0-1015.16 linux-image-6.8.0-1015-aws - 6.8.0-1015.16 linux-image-aws - 6.8.0-1015.16 linux-image-unsigned-6.8.0-1015-aws - 6.8.0-1015.16 linux-modules-6.8.0-1015-aws - 6.8.0-1015.16 linux-modules-extra-6.8.0-1015-aws - 6.8.0-1015.16 linux-modules-extra-aws - 6.8.0-1015.16 linux-tools-6.8.0-1015-aws - 6.8.0-1015.16 linux-tools-aws - 6.8.0-1015.16 No subscription required linux-buildinfo-6.8.0-44-generic - 6.8.0-44.44 linux-buildinfo-6.8.0-44-generic-64k - 6.8.0-44.44 linux-cloud-tools-6.8.0-44 - 6.8.0-44.44 linux-cloud-tools-6.8.0-44-generic - 6.8.0-44.44 linux-cloud-tools-common - 6.8.0-44.44 linux-cloud-tools-generic - 6.8.0-44.44 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-44.44 linux-cloud-tools-generic-hwe-24.04-edge - 6.8.0-44.44 linux-cloud-tools-virtual - 6.8.0-44.44 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-44.44 linux-cloud-tools-virtual-hwe-24.04-edge - 6.8.0-44.44 linux-crashdump - 6.8.0-44.44 linux-doc - 6.8.0-44.44 linux-generic - 6.8.0-44.44 linux-generic-64k - 6.8.0-44.44 linux-generic-64k-hwe-24.04 - 6.8.0-44.44 linux-generic-64k-hwe-24.04-edge - 6.8.0-44.44 linux-generic-hwe-24.04 - 6.8.0-44.44 linux-generic-hwe-24.04-edge - 6.8.0-44.44 linux-generic-lpae - 6.8.0-44.44 linux-headers-6.8.0-44 - 6.8.0-44.44 linux-headers-6.8.0-44-generic - 6.8.0-44.44 linux-headers-6.8.0-44-generic-64k - 6.8.0-44.44 linux-headers-generic - 6.8.0-44.44 linux-headers-generic-64k - 6.8.0-44.44 linux-headers-generic-64k-hwe-24.04 - 6.8.0-44.44 linux-headers-generic-64k-hwe-24.04-edge - 6.8.0-44.44 linux-headers-generic-hwe-24.04 - 6.8.0-44.44 linux-headers-generic-hwe-24.04-edge - 6.8.0-44.44 linux-headers-generic-lpae - 6.8.0-44.44 linux-headers-kvm - 6.8.0-44.44 linux-headers-laptop-23.10 - 6.8.0-44.44 linux-headers-oem-20.04 - 6.8.0-44.44 linux-headers-oem-20.04b - 6.8.0-44.44 linux-headers-oem-20.04c - 6.8.0-44.44 linux-headers-oem-20.04d - 6.8.0-44.44 linux-headers-oem-22.04 - 6.8.0-44.44 linux-headers-virtual - 6.8.0-44.44 linux-headers-virtual-hwe-24.04 - 6.8.0-44.44 linux-headers-virtual-hwe-24.04-edge - 6.8.0-44.44 linux-image-6.8.0-44-generic - 6.8.0-44.44 linux-image-6.8.0-44-generic-64k - 6.8.0-44.44 linux-image-extra-virtual - 6.8.0-44.44 linux-image-extra-virtual-hwe-24.04 - 6.8.0-44.44 linux-image-extra-virtual-hwe-24.04-edge - 6.8.0-44.44 linux-image-generic - 6.8.0-44.44 linux-image-generic-64k - 6.8.0-44.44 linux-image-generic-64k-hwe-24.04 - 6.8.0-44.44 linux-image-generic-64k-hwe-24.04-edge - 6.8.0-44.44 linux-image-generic-hwe-24.04 - 6.8.0-44.44 linux-image-generic-hwe-24.04-edge - 6.8.0-44.44 linux-image-generic-lpae - 6.8.0-44.44 linux-image-kvm - 6.8.0-44.44 linux-image-laptop-23.10 - 6.8.0-44.44 linux-image-oem-20.04 - 6.8.0-44.44 linux-image-oem-20.04b - 6.8.0-44.44 linux-image-oem-20.04c - 6.8.0-44.44 linux-image-oem-20.04d - 6.8.0-44.44 linux-image-oem-22.04 - 6.8.0-44.44 linux-image-uc-6.8.0-44-generic - 6.8.0-44.44 linux-image-uc-6.8.0-44-generic-64k - 6.8.0-44.44 linux-image-uc-generic - 6.8.0-44.44 linux-image-uc-generic-hwe-24.04 - 6.8.0-44.44 linux-image-uc-generic-hwe-24.04-edge - 6.8.0-44.44 linux-image-unsigned-6.8.0-44-generic - 6.8.0-44.44 linux-image-unsigned-6.8.0-44-generic-64k - 6.8.0-44.44 linux-image-virtual - 6.8.0-44.44 linux-image-virtual-hwe-24.04 - 6.8.0-44.44 linux-image-virtual-hwe-24.04-edge - 6.8.0-44.44 linux-kvm - 6.8.0-44.44 linux-laptop-23.10 - 6.8.0-44.44 linux-lib-rust-6.8.0-44-generic - 6.8.0-44.44 linux-libc-dev - 6.8.0-44.44 linux-modules-6.8.0-44-generic - 6.8.0-44.44 linux-modules-6.8.0-44-generic-64k - 6.8.0-44.44 linux-modules-extra-6.8.0-44-generic - 6.8.0-44.44 linux-modules-ipu6-6.8.0-44-generic - 6.8.0-44.44 linux-modules-ipu6-generic - 6.8.0-44.44 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-44.44 linux-modules-ipu6-generic-hwe-24.04-edge - 6.8.0-44.44 linux-modules-iwlwifi-6.8.0-44-generic - 6.8.0-44.44 linux-modules-iwlwifi-generic - 6.8.0-44.44 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-44.44 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.8.0-44.44 linux-modules-iwlwifi-oem-20.04 - 6.8.0-44.44 linux-modules-iwlwifi-oem-20.04d - 6.8.0-44.44 linux-modules-iwlwifi-oem-22.04 - 6.8.0-44.44 linux-modules-usbio-6.8.0-44-generic - 6.8.0-44.44 linux-modules-usbio-generic - 6.8.0-44.44 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-44.44 linux-modules-usbio-generic-hwe-24.04-edge - 6.8.0-44.44 linux-oem-20.04 - 6.8.0-44.44 linux-oem-20.04b - 6.8.0-44.44 linux-oem-20.04c - 6.8.0-44.44 linux-oem-20.04d - 6.8.0-44.44 linux-oem-22.04 - 6.8.0-44.44 linux-source - 6.8.0-44.44 linux-source-6.8.0 - 6.8.0-44.44 linux-tools-6.8.0-44 - 6.8.0-44.44 linux-tools-6.8.0-44-generic - 6.8.0-44.44 linux-tools-6.8.0-44-generic-64k - 6.8.0-44.44 linux-tools-common - 6.8.0-44.44 linux-tools-generic - 6.8.0-44.44 linux-tools-generic-64k - 6.8.0-44.44 linux-tools-generic-64k-hwe-24.04 - 6.8.0-44.44 linux-tools-generic-64k-hwe-24.04-edge - 6.8.0-44.44 linux-tools-generic-hwe-24.04 - 6.8.0-44.44 linux-tools-generic-hwe-24.04-edge - 6.8.0-44.44 linux-tools-generic-lpae - 6.8.0-44.44 linux-tools-host - 6.8.0-44.44 linux-tools-kvm - 6.8.0-44.44 linux-tools-laptop-23.10 - 6.8.0-44.44 linux-tools-oem-20.04 - 6.8.0-44.44 linux-tools-oem-20.04b - 6.8.0-44.44 linux-tools-oem-20.04c - 6.8.0-44.44 linux-tools-oem-20.04d - 6.8.0-44.44 linux-tools-oem-22.04 - 6.8.0-44.44 linux-tools-virtual - 6.8.0-44.44 linux-tools-virtual-hwe-24.04 - 6.8.0-44.44 linux-tools-virtual-hwe-24.04-edge - 6.8.0-44.44 linux-virtual - 6.8.0-44.44 linux-virtual-hwe-24.04 - 6.8.0-44.44 linux-virtual-hwe-24.04-edge - 6.8.0-44.44 No subscription required linux-buildinfo-6.8.0-44-lowlatency - 6.8.0-44.44.1 linux-buildinfo-6.8.0-44-lowlatency-64k - 6.8.0-44.44.1 linux-cloud-tools-6.8.0-44-lowlatency - 6.8.0-44.44.1 linux-cloud-tools-lowlatency - 6.8.0-44.44.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-44.44.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-44.44.1 linux-cloud-tools-lowlatency-hwe-22.04 - 6.8.0-44.44.1 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.8.0-44.44.1 linux-headers-6.8.0-44-lowlatency - 6.8.0-44.44.1 linux-headers-6.8.0-44-lowlatency-64k - 6.8.0-44.44.1 linux-headers-lowlatency - 6.8.0-44.44.1 linux-headers-lowlatency-64k - 6.8.0-44.44.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-44.44.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-44.44.1 linux-headers-lowlatency-64k-hwe-22.04 - 6.8.0-44.44.1 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.8.0-44.44.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-44.44.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-44.44.1 linux-headers-lowlatency-hwe-22.04 - 6.8.0-44.44.1 linux-headers-lowlatency-hwe-22.04-edge - 6.8.0-44.44.1 linux-image-6.8.0-44-lowlatency - 6.8.0-44.44.1 linux-image-6.8.0-44-lowlatency-64k - 6.8.0-44.44.1 linux-image-lowlatency - 6.8.0-44.44.1 linux-image-lowlatency-64k - 6.8.0-44.44.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-44.44.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-44.44.1 linux-image-lowlatency-64k-hwe-22.04 - 6.8.0-44.44.1 linux-image-lowlatency-64k-hwe-22.04-edge - 6.8.0-44.44.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-44.44.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-44.44.1 linux-image-lowlatency-hwe-22.04 - 6.8.0-44.44.1 linux-image-lowlatency-hwe-22.04-edge - 6.8.0-44.44.1 linux-image-unsigned-6.8.0-44-lowlatency - 6.8.0-44.44.1 linux-image-unsigned-6.8.0-44-lowlatency-64k - 6.8.0-44.44.1 linux-lowlatency - 6.8.0-44.44.1 linux-lowlatency-64k - 6.8.0-44.44.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-44.44.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-44.44.1 linux-lowlatency-64k-hwe-22.04 - 6.8.0-44.44.1 linux-lowlatency-64k-hwe-22.04-edge - 6.8.0-44.44.1 linux-lowlatency-cloud-tools-6.8.0-44 - 6.8.0-44.44.1 linux-lowlatency-cloud-tools-common - 6.8.0-44.44.1 linux-lowlatency-headers-6.8.0-44 - 6.8.0-44.44.1 linux-lowlatency-hwe-20.04 - 6.8.0-44.44.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-44.44.1 linux-lowlatency-hwe-22.04 - 6.8.0-44.44.1 linux-lowlatency-hwe-22.04-edge - 6.8.0-44.44.1 linux-lowlatency-lib-rust-6.8.0-44-lowlatency - 6.8.0-44.44.1 linux-lowlatency-tools-6.8.0-44 - 6.8.0-44.44.1 linux-lowlatency-tools-common - 6.8.0-44.44.1 linux-lowlatency-tools-host - 6.8.0-44.44.1 linux-modules-6.8.0-44-lowlatency - 6.8.0-44.44.1 linux-modules-6.8.0-44-lowlatency-64k - 6.8.0-44.44.1 linux-modules-iwlwifi-6.8.0-44-lowlatency - 6.8.0-44.44.1 linux-modules-iwlwifi-lowlatency - 6.8.0-44.44.1 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.8.0-44.44.1 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.8.0-44.44.1 linux-tools-6.8.0-44-lowlatency - 6.8.0-44.44.1 linux-tools-6.8.0-44-lowlatency-64k - 6.8.0-44.44.1 linux-tools-lowlatency - 6.8.0-44.44.1 linux-tools-lowlatency-64k - 6.8.0-44.44.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-44.44.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-44.44.1 linux-tools-lowlatency-64k-hwe-22.04 - 6.8.0-44.44.1 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.8.0-44.44.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-44.44.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-44.44.1 linux-tools-lowlatency-hwe-22.04 - 6.8.0-44.44.1 linux-tools-lowlatency-hwe-22.04-edge - 6.8.0-44.44.1 No subscription required High CVE-2022-48772 CVE-2023-52884 CVE-2024-23848 CVE-2024-31076 CVE-2024-32936 CVE-2024-33619 CVE-2024-33621 CVE-2024-33847 CVE-2024-34027 CVE-2024-34030 CVE-2024-34777 CVE-2024-35247 CVE-2024-36015 CVE-2024-36244 CVE-2024-36270 CVE-2024-36281 CVE-2024-36286 CVE-2024-36288 CVE-2024-36477 CVE-2024-36478 CVE-2024-36479 CVE-2024-36481 CVE-2024-36484 CVE-2024-36489 CVE-2024-36971 CVE-2024-36972 CVE-2024-36973 CVE-2024-36974 CVE-2024-36978 CVE-2024-37021 CVE-2024-37026 CVE-2024-37078 CVE-2024-37354 CVE-2024-37356 CVE-2024-38306 CVE-2024-38381 CVE-2024-38384 CVE-2024-38385 CVE-2024-38388 CVE-2024-38390 CVE-2024-38618 CVE-2024-38619 CVE-2024-38621 CVE-2024-38622 CVE-2024-38623 CVE-2024-38624 CVE-2024-38625 CVE-2024-38627 CVE-2024-38628 CVE-2024-38629 CVE-2024-38630 CVE-2024-38632 CVE-2024-38633 CVE-2024-38634 CVE-2024-38635 CVE-2024-38636 CVE-2024-38637 CVE-2024-38659 CVE-2024-38661 CVE-2024-38662 CVE-2024-38663 CVE-2024-38664 CVE-2024-38667 CVE-2024-38780 CVE-2024-39276 CVE-2024-39277 CVE-2024-39291 CVE-2024-39296 CVE-2024-39298 CVE-2024-39301 CVE-2024-39371 CVE-2024-39461 CVE-2024-39462 CVE-2024-39463 CVE-2024-39464 CVE-2024-39465 CVE-2024-39466 CVE-2024-39467 CVE-2024-39468 CVE-2024-39469 CVE-2024-39470 CVE-2024-39471 CVE-2024-39473 CVE-2024-39474 CVE-2024-39475 CVE-2024-39478 CVE-2024-39479 CVE-2024-39480 CVE-2024-39481 CVE-2024-39483 CVE-2024-39485 CVE-2024-39488 CVE-2024-39489 CVE-2024-39490 CVE-2024-39491 CVE-2024-39492 CVE-2024-39493 CVE-2024-39494 CVE-2024-39495 CVE-2024-39496 CVE-2024-39497 CVE-2024-39498 CVE-2024-39499 CVE-2024-39500 CVE-2024-39501 CVE-2024-39502 CVE-2024-39503 CVE-2024-39504 CVE-2024-39505 CVE-2024-39506 CVE-2024-39507 CVE-2024-39508 CVE-2024-39509 CVE-2024-39510 CVE-2024-40899 CVE-2024-40900 CVE-2024-40901 CVE-2024-40902 CVE-2024-40903 CVE-2024-40904 CVE-2024-40905 CVE-2024-40906 CVE-2024-40908 CVE-2024-40909 CVE-2024-40910 CVE-2024-40911 CVE-2024-40912 CVE-2024-40913 CVE-2024-40914 CVE-2024-40915 CVE-2024-40916 CVE-2024-40917 CVE-2024-40918 CVE-2024-40919 CVE-2024-40920 CVE-2024-40921 CVE-2024-40922 CVE-2024-40923 CVE-2024-40924 CVE-2024-40925 CVE-2024-40926 CVE-2024-40927 CVE-2024-40928 CVE-2024-40929 CVE-2024-40930 CVE-2024-40931 CVE-2024-40932 CVE-2024-40933 CVE-2024-40934 CVE-2024-40935 CVE-2024-40936 CVE-2024-40937 CVE-2024-40938 CVE-2024-40939 CVE-2024-40940 CVE-2024-40941 CVE-2024-40942 CVE-2024-40943 CVE-2024-40944 CVE-2024-40945 CVE-2024-40947 CVE-2024-40948 CVE-2024-40949 CVE-2024-40951 CVE-2024-40952 CVE-2024-40953 CVE-2024-40954 CVE-2024-40955 CVE-2024-40956 CVE-2024-40957 CVE-2024-40958 CVE-2024-40959 CVE-2024-40960 CVE-2024-40961 CVE-2024-40962 CVE-2024-40963 CVE-2024-40964 CVE-2024-40965 CVE-2024-40966 CVE-2024-40967 CVE-2024-40968 CVE-2024-40969 CVE-2024-40970 CVE-2024-40971 CVE-2024-40972 CVE-2024-40973 CVE-2024-40974 CVE-2024-40975 CVE-2024-40976 CVE-2024-40977 CVE-2024-40978 CVE-2024-40979 CVE-2024-40980 CVE-2024-40981 CVE-2024-40982 CVE-2024-40983 CVE-2024-40984 CVE-2024-40985 CVE-2024-40986 CVE-2024-40987 CVE-2024-40988 CVE-2024-40989 CVE-2024-40990 CVE-2024-40992 CVE-2024-40994 CVE-2024-40995 CVE-2024-40996 CVE-2024-40997 CVE-2024-40998 CVE-2024-40999 CVE-2024-41000 CVE-2024-41001 CVE-2024-41002 CVE-2024-41003 CVE-2024-41004 CVE-2024-41005 CVE-2024-41006 CVE-2024-41040 CVE-2024-42078 CVE-2024-42148 USN-6999-2 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Chenyuan Yang discovered that the CEC driver driver in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2024-23848) It was discovered that the JFS file system contained an out-of-bounds read vulnerability when printing xattr debug information. A local attacker could use this to cause a denial of service (system crash). (CVE-2024-40902) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PA-RISC architecture; - PowerPC architecture; - RISC-V architecture; - x86 architecture; - Block layer subsystem; - ACPI drivers; - Drivers core; - Null block device driver; - Character device driver; - TPM device driver; - Clock framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - Buffer Sharing and Synchronization framework; - DMA engine subsystem; - EFI core; - FPGA Framework; - GPU drivers; - Greybus drivers; - HID subsystem; - HW tracing; - I2C subsystem; - IIO subsystem; - InfiniBand drivers; - Input Device (Mouse) drivers; - Mailbox framework; - Media drivers; - Microchip PCI driver; - VMware VMCI Driver; - Network drivers; - PCI subsystem; - x86 platform drivers; - PTP clock framework; - S/390 drivers; - SCSI drivers; - SoundWire subsystem; - Sonic Silicon Backplane drivers; - Greybus lights staging drivers; - Thermal drivers; - TTY drivers; - USB subsystem; - VFIO drivers; - Framebuffer layer; - Watchdog drivers; - 9P distributed file system; - BTRFS file system; - File systems infrastructure; - Ext4 file system; - F2FS file system; - JFS file system; - Network file system server daemon; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - Tracing file system; - IOMMU subsystem; - Tracing infrastructure; - io_uring subsystem; - Core kernel; - BPF subsystem; - Kernel debugger infrastructure; - DMA mapping infrastructure; - IRQ subsystem; - Memory management; - 9P file system network protocol; - Amateur Radio drivers; - B.A.T.M.A.N. meshing protocol; - Ethernet bridge; - Networking core; - Ethtool driver; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - Netfilter; - NET/ROM layer; - NFC subsystem; - Network traffic control; - Sun RPC protocol; - TIPC protocol; - TLS protocol; - Unix domain sockets; - Wireless networking; - XFRM subsystem; - AppArmor security module; - Integrity Measurement Architecture(IMA) framework; - Landlock security; - Linux Security Modules (LSM) Framework; - SELinux security module; - Simplified Mandatory Access Control Kernel framework; - ALSA framework; - HD-audio driver; - SOF drivers; - KVM core; (CVE-2024-40978, CVE-2024-39504, CVE-2024-39483, CVE-2024-36478, CVE-2024-40928, CVE-2024-36971, CVE-2024-40947, CVE-2024-31076, CVE-2024-40934, CVE-2024-40909, CVE-2024-40962, CVE-2024-38635, CVE-2024-38632, CVE-2024-40912, CVE-2024-40967, CVE-2024-39492, CVE-2024-40974, CVE-2024-39466, CVE-2024-40939, CVE-2024-40988, CVE-2024-40951, CVE-2024-41005, CVE-2024-40968, CVE-2024-39493, CVE-2024-40949, CVE-2022-48772, CVE-2024-40944, CVE-2024-40998, CVE-2024-39490, CVE-2024-39467, CVE-2024-42078, CVE-2024-40953, CVE-2024-40990, CVE-2024-40902, CVE-2024-39461, CVE-2024-39301, CVE-2024-36978, CVE-2024-39475, CVE-2024-39496, CVE-2024-40901, CVE-2024-40985, CVE-2024-33621, CVE-2024-38663, CVE-2024-39497, CVE-2024-40937, CVE-2024-40941, CVE-2024-40987, CVE-2024-40918, CVE-2024-32936, CVE-2024-40999, CVE-2024-40938, CVE-2024-39488, CVE-2024-39510, CVE-2024-40924, CVE-2024-38661, CVE-2024-40989, CVE-2024-39509, CVE-2024-40983, CVE-2024-39471, CVE-2024-39502, CVE-2024-39508, CVE-2024-39371, CVE-2024-40982, CVE-2024-40910, CVE-2024-40903, CVE-2024-39296, CVE-2024-39507, CVE-2024-40906, CVE-2024-37354, CVE-2024-40905, CVE-2024-34027, CVE-2024-38618, CVE-2024-40900, CVE-2024-39469, CVE-2024-38662, CVE-2024-35247, CVE-2024-40922, CVE-2024-40926, CVE-2024-39503, CVE-2024-40899, CVE-2024-40977, CVE-2024-38634, CVE-2024-40933, CVE-2024-40992, CVE-2024-40904, CVE-2024-36479, CVE-2024-40996, CVE-2024-40957, CVE-2024-40931, CVE-2024-39291, CVE-2024-38780, CVE-2024-39277, CVE-2024-38628, CVE-2024-40932, CVE-2024-41004, CVE-2024-33847, CVE-2024-40972, CVE-2024-40945, CVE-2023-52884, CVE-2024-38664, CVE-2024-39462, CVE-2024-40965, CVE-2024-38388, CVE-2024-40916, CVE-2024-36489, CVE-2024-40975, CVE-2024-40942, CVE-2024-40995, CVE-2024-40997, CVE-2024-38385, CVE-2024-40911, CVE-2024-39474, CVE-2024-39470, CVE-2024-41000, CVE-2024-36015, CVE-2024-38633, CVE-2024-40943, CVE-2024-39489, CVE-2024-36477, CVE-2024-39491, CVE-2024-40919, CVE-2024-40914, CVE-2024-40966, CVE-2024-41002, CVE-2024-40960, CVE-2024-38624, CVE-2024-40964, CVE-2024-40936, CVE-2024-40913, CVE-2024-40955, CVE-2024-37026, CVE-2024-38384, CVE-2024-37078, CVE-2024-36244, CVE-2024-38622, CVE-2024-39485, CVE-2024-39479, CVE-2024-39505, CVE-2024-36973, CVE-2024-39498, CVE-2024-40908, CVE-2024-37356, CVE-2024-39480, CVE-2024-38381, CVE-2024-40940, CVE-2024-40980, CVE-2024-39276, CVE-2024-39499, CVE-2024-36484, CVE-2024-38636, CVE-2024-38390, CVE-2024-38619, CVE-2024-39478, CVE-2024-40959, CVE-2024-36288, CVE-2024-40935, CVE-2024-41006, CVE-2024-38625, CVE-2024-36972, CVE-2024-39298, CVE-2024-39468, CVE-2024-40970, CVE-2024-37021, CVE-2024-40981, CVE-2024-40921, CVE-2024-34777, CVE-2024-39500, CVE-2024-40927, CVE-2024-40979, CVE-2024-38627, CVE-2024-39501, CVE-2024-39481, CVE-2024-40917, CVE-2024-40956, CVE-2024-42148, CVE-2024-36481, CVE-2024-40925, CVE-2024-40986, CVE-2024-40948, CVE-2024-41003, CVE-2024-39506, CVE-2024-40952, CVE-2024-38306, CVE-2024-40971, CVE-2024-41001, CVE-2024-40973, CVE-2024-36281, CVE-2024-40923, CVE-2024-39473, CVE-2024-38637, CVE-2024-40984, CVE-2024-39463, CVE-2024-41040, CVE-2024-38623, CVE-2024-40954, CVE-2024-36286, CVE-2024-38667, CVE-2024-39465, CVE-2024-40915, CVE-2024-33619, CVE-2024-40920, CVE-2024-40969, CVE-2024-38659, CVE-2024-34030, CVE-2024-38630, CVE-2024-40976, CVE-2024-36974, CVE-2024-40930, CVE-2024-39464, CVE-2024-38621, CVE-2024-40958, CVE-2024-40994, CVE-2024-39494, CVE-2024-40961, CVE-2024-39495, CVE-2024-40963, CVE-2024-36270, CVE-2024-38629, CVE-2024-40929) Update Instructions: Run `sudo pro fix USN-6999-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1011-raspi - 6.8.0-1011.12 linux-headers-6.8.0-1011-raspi - 6.8.0-1011.12 linux-headers-raspi - 6.8.0-1011.12 linux-image-6.8.0-1011-raspi - 6.8.0-1011.12 linux-image-raspi - 6.8.0-1011.12 linux-modules-6.8.0-1011-raspi - 6.8.0-1011.12 linux-raspi - 6.8.0-1011.12 linux-raspi-headers-6.8.0-1011 - 6.8.0-1011.12 linux-raspi-tools-6.8.0-1011 - 6.8.0-1011.12 linux-tools-6.8.0-1011-raspi - 6.8.0-1011.12 linux-tools-raspi - 6.8.0-1011.12 No subscription required High CVE-2022-48772 CVE-2023-52884 CVE-2024-23848 CVE-2024-31076 CVE-2024-32936 CVE-2024-33619 CVE-2024-33621 CVE-2024-33847 CVE-2024-34027 CVE-2024-34030 CVE-2024-34777 CVE-2024-35247 CVE-2024-36015 CVE-2024-36244 CVE-2024-36270 CVE-2024-36281 CVE-2024-36286 CVE-2024-36288 CVE-2024-36477 CVE-2024-36478 CVE-2024-36479 CVE-2024-36481 CVE-2024-36484 CVE-2024-36489 CVE-2024-36971 CVE-2024-36972 CVE-2024-36973 CVE-2024-36974 CVE-2024-36978 CVE-2024-37021 CVE-2024-37026 CVE-2024-37078 CVE-2024-37354 CVE-2024-37356 CVE-2024-38306 CVE-2024-38381 CVE-2024-38384 CVE-2024-38385 CVE-2024-38388 CVE-2024-38390 CVE-2024-38618 CVE-2024-38619 CVE-2024-38621 CVE-2024-38622 CVE-2024-38623 CVE-2024-38624 CVE-2024-38625 CVE-2024-38627 CVE-2024-38628 CVE-2024-38629 CVE-2024-38630 CVE-2024-38632 CVE-2024-38633 CVE-2024-38634 CVE-2024-38635 CVE-2024-38636 CVE-2024-38637 CVE-2024-38659 CVE-2024-38661 CVE-2024-38662 CVE-2024-38663 CVE-2024-38664 CVE-2024-38667 CVE-2024-38780 CVE-2024-39276 CVE-2024-39277 CVE-2024-39291 CVE-2024-39296 CVE-2024-39298 CVE-2024-39301 CVE-2024-39371 CVE-2024-39461 CVE-2024-39462 CVE-2024-39463 CVE-2024-39464 CVE-2024-39465 CVE-2024-39466 CVE-2024-39467 CVE-2024-39468 CVE-2024-39469 CVE-2024-39470 CVE-2024-39471 CVE-2024-39473 CVE-2024-39474 CVE-2024-39475 CVE-2024-39478 CVE-2024-39479 CVE-2024-39480 CVE-2024-39481 CVE-2024-39483 CVE-2024-39485 CVE-2024-39488 CVE-2024-39489 CVE-2024-39490 CVE-2024-39491 CVE-2024-39492 CVE-2024-39493 CVE-2024-39494 CVE-2024-39495 CVE-2024-39496 CVE-2024-39497 CVE-2024-39498 CVE-2024-39499 CVE-2024-39500 CVE-2024-39501 CVE-2024-39502 CVE-2024-39503 CVE-2024-39504 CVE-2024-39505 CVE-2024-39506 CVE-2024-39507 CVE-2024-39508 CVE-2024-39509 CVE-2024-39510 CVE-2024-40899 CVE-2024-40900 CVE-2024-40901 CVE-2024-40902 CVE-2024-40903 CVE-2024-40904 CVE-2024-40905 CVE-2024-40906 CVE-2024-40908 CVE-2024-40909 CVE-2024-40910 CVE-2024-40911 CVE-2024-40912 CVE-2024-40913 CVE-2024-40914 CVE-2024-40915 CVE-2024-40916 CVE-2024-40917 CVE-2024-40918 CVE-2024-40919 CVE-2024-40920 CVE-2024-40921 CVE-2024-40922 CVE-2024-40923 CVE-2024-40924 CVE-2024-40925 CVE-2024-40926 CVE-2024-40927 CVE-2024-40928 CVE-2024-40929 CVE-2024-40930 CVE-2024-40931 CVE-2024-40932 CVE-2024-40933 CVE-2024-40934 CVE-2024-40935 CVE-2024-40936 CVE-2024-40937 CVE-2024-40938 CVE-2024-40939 CVE-2024-40940 CVE-2024-40941 CVE-2024-40942 CVE-2024-40943 CVE-2024-40944 CVE-2024-40945 CVE-2024-40947 CVE-2024-40948 CVE-2024-40949 CVE-2024-40951 CVE-2024-40952 CVE-2024-40953 CVE-2024-40954 CVE-2024-40955 CVE-2024-40956 CVE-2024-40957 CVE-2024-40958 CVE-2024-40959 CVE-2024-40960 CVE-2024-40961 CVE-2024-40962 CVE-2024-40963 CVE-2024-40964 CVE-2024-40965 CVE-2024-40966 CVE-2024-40967 CVE-2024-40968 CVE-2024-40969 CVE-2024-40970 CVE-2024-40971 CVE-2024-40972 CVE-2024-40973 CVE-2024-40974 CVE-2024-40975 CVE-2024-40976 CVE-2024-40977 CVE-2024-40978 CVE-2024-40979 CVE-2024-40980 CVE-2024-40981 CVE-2024-40982 CVE-2024-40983 CVE-2024-40984 CVE-2024-40985 CVE-2024-40986 CVE-2024-40987 CVE-2024-40988 CVE-2024-40989 CVE-2024-40990 CVE-2024-40992 CVE-2024-40994 CVE-2024-40995 CVE-2024-40996 CVE-2024-40997 CVE-2024-40998 CVE-2024-40999 CVE-2024-41000 CVE-2024-41001 CVE-2024-41002 CVE-2024-41003 CVE-2024-41004 CVE-2024-41005 CVE-2024-41006 CVE-2024-41040 CVE-2024-42078 CVE-2024-42148 USN-7000-1 -- Expat vulnerabilities Ubuntu 24.04 LTS Shang-Hung Wan discovered that Expat did not properly handle certain function calls when a negative input length was provided. An attacker could use this issue to cause a denial of service or possibly execute arbitrary code. (CVE-2024-45490) Shang-Hung Wan discovered that Expat did not properly handle the potential for an integer overflow on 32-bit platforms. An attacker could use this issue to cause a denial of service or possibly execute arbitrary code. (CVE-2024-45491, CVE-2024-45492) Update Instructions: Run `sudo pro fix USN-7000-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: expat - 2.6.1-2ubuntu0.1 libexpat1 - 2.6.1-2ubuntu0.1 libexpat1-dev - 2.6.1-2ubuntu0.1 No subscription required Medium CVE-2024-45490 CVE-2024-45491 CVE-2024-45492 USN-7001-2 -- xmltok library vulnerabilities Ubuntu 24.04 LTS USN-7001-1 fixed vulnerabilities in xmltol library. This update provides the corresponding updates for Ubuntu 24.04 LTS. Original advisory details: Shang-Hung Wan discovered that Expat, contained within the xmltok library, did not properly handle certain function calls when a negative input length was provided. An attacker could use this issue to cause a denial of service or possibly execute arbitrary code. (CVE-2024-45490) Shang-Hung Wan discovered that Expat, contained within the xmltok library, did not properly handle the potential for an integer overflow on 32-bit platforms. An attacker could use this issue to cause a denial of service or possibly execute arbitrary code. (CVE-2024-45491) Update Instructions: Run `sudo pro fix USN-7001-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libxmltok1-dev - 1.2-4.1ubuntu2.24.0.4.1+esm1 libxmltok1t64 - 1.2-4.1ubuntu2.24.0.4.1+esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2024-45490 CVE-2024-45491 USN-7002-1 -- Setuptools vulnerability Ubuntu 24.04 LTS It was discovered that setuptools was vulnerable to remote code execution. An attacker could possibly use this issue to execute arbitrary code. Update Instructions: Run `sudo pro fix USN-7002-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-setuptools-doc - 68.1.2-2ubuntu1.1 python3-pkg-resources - 68.1.2-2ubuntu1.1 python3-setuptools - 68.1.2-2ubuntu1.1 python3-setuptools-whl - 68.1.2-2ubuntu1.1 No subscription required Medium CVE-2024-6345 USN-7004-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Chenyuan Yang discovered that the CEC driver driver in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2024-23848) It was discovered that the JFS file system contained an out-of-bounds read vulnerability when printing xattr debug information. A local attacker could use this to cause a denial of service (system crash). (CVE-2024-40902) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PA-RISC architecture; - PowerPC architecture; - RISC-V architecture; - x86 architecture; - Block layer subsystem; - ACPI drivers; - Drivers core; - Null block device driver; - Character device driver; - TPM device driver; - Clock framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - Buffer Sharing and Synchronization framework; - DMA engine subsystem; - EFI core; - FPGA Framework; - GPU drivers; - Greybus drivers; - HID subsystem; - HW tracing; - I2C subsystem; - IIO subsystem; - InfiniBand drivers; - Input Device (Mouse) drivers; - Mailbox framework; - Media drivers; - Microchip PCI driver; - VMware VMCI Driver; - Network drivers; - PCI subsystem; - x86 platform drivers; - PTP clock framework; - S/390 drivers; - SCSI drivers; - SoundWire subsystem; - Sonic Silicon Backplane drivers; - Greybus lights staging drivers; - Thermal drivers; - TTY drivers; - USB subsystem; - VFIO drivers; - Framebuffer layer; - Watchdog drivers; - 9P distributed file system; - BTRFS file system; - File systems infrastructure; - Ext4 file system; - F2FS file system; - JFS file system; - Network file system server daemon; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - Tracing file system; - IOMMU subsystem; - Tracing infrastructure; - io_uring subsystem; - Core kernel; - BPF subsystem; - Kernel debugger infrastructure; - DMA mapping infrastructure; - IRQ subsystem; - Memory management; - 9P file system network protocol; - Amateur Radio drivers; - B.A.T.M.A.N. meshing protocol; - Ethernet bridge; - Networking core; - Ethtool driver; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - Netfilter; - NET/ROM layer; - NFC subsystem; - Network traffic control; - Sun RPC protocol; - TIPC protocol; - TLS protocol; - Unix domain sockets; - Wireless networking; - XFRM subsystem; - AppArmor security module; - Integrity Measurement Architecture(IMA) framework; - Landlock security; - Linux Security Modules (LSM) Framework; - SELinux security module; - Simplified Mandatory Access Control Kernel framework; - ALSA framework; - HD-audio driver; - SOF drivers; - KVM core; (CVE-2024-36270, CVE-2024-38627, CVE-2024-39508, CVE-2024-41001, CVE-2024-38634, CVE-2024-40979, CVE-2024-40903, CVE-2024-34030, CVE-2024-38621, CVE-2024-34027, CVE-2024-39504, CVE-2024-38385, CVE-2024-36288, CVE-2024-39301, CVE-2024-38628, CVE-2024-42270, CVE-2024-39507, CVE-2024-36286, CVE-2024-40960, CVE-2024-36479, CVE-2024-41002, CVE-2024-36974, CVE-2024-40943, CVE-2024-40976, CVE-2024-38662, CVE-2024-40995, CVE-2024-39497, CVE-2024-31076, CVE-2024-39371, CVE-2024-40983, CVE-2024-40985, CVE-2024-38618, CVE-2024-40914, CVE-2024-40989, CVE-2024-40973, CVE-2024-38663, CVE-2024-39463, CVE-2024-38633, CVE-2024-36978, CVE-2024-40970, CVE-2024-40932, CVE-2024-39480, CVE-2024-39471, CVE-2024-40962, CVE-2024-40986, CVE-2024-40937, CVE-2024-39469, CVE-2024-40904, CVE-2024-39466, CVE-2024-38388, CVE-2024-39494, CVE-2024-41004, CVE-2024-38381, CVE-2022-48772, CVE-2024-33847, CVE-2024-40969, CVE-2024-40957, CVE-2024-40933, CVE-2024-37354, CVE-2024-39468, CVE-2024-40917, CVE-2024-38623, CVE-2024-40958, CVE-2024-39502, CVE-2024-38384, CVE-2024-39506, CVE-2024-40940, CVE-2024-34777, CVE-2024-41005, CVE-2024-39470, CVE-2024-39464, CVE-2024-39492, CVE-2024-38629, CVE-2024-39505, CVE-2024-40952, CVE-2024-40941, CVE-2024-39474, CVE-2024-38664, CVE-2024-40929, CVE-2024-39489, CVE-2024-40953, CVE-2024-40916, CVE-2024-40911, CVE-2024-32936, CVE-2024-40934, CVE-2024-37078, CVE-2024-39483, CVE-2024-40967, CVE-2024-40924, CVE-2024-39462, CVE-2024-40981, CVE-2024-36281, CVE-2024-39291, CVE-2024-39481, CVE-2024-40978, CVE-2024-38622, CVE-2024-39503, CVE-2024-40956, CVE-2023-52884, CVE-2024-39498, CVE-2024-38661, CVE-2024-40918, CVE-2024-39479, CVE-2024-40915, CVE-2024-39501, CVE-2024-39488, CVE-2024-40925, CVE-2024-40930, CVE-2024-40961, CVE-2024-40951, CVE-2024-38636, CVE-2024-39491, CVE-2024-39495, CVE-2024-39509, CVE-2024-40947, CVE-2024-36477, CVE-2024-36478, CVE-2024-42148, CVE-2024-39473, CVE-2024-39510, CVE-2024-40923, CVE-2024-38624, CVE-2024-38659, CVE-2024-36971, CVE-2024-38625, CVE-2024-40913, CVE-2024-35247, CVE-2024-36481, CVE-2024-36484, CVE-2024-40928, CVE-2024-40927, CVE-2024-40944, CVE-2024-39485, CVE-2024-36244, CVE-2024-40910, CVE-2024-40945, CVE-2024-33621, CVE-2024-38667, CVE-2024-40992, CVE-2024-40908, CVE-2024-40901, CVE-2024-40906, CVE-2024-38390, CVE-2024-40900, CVE-2024-41006, CVE-2024-40968, CVE-2024-40966, CVE-2024-40977, CVE-2024-33619, CVE-2024-39496, CVE-2024-38630, CVE-2024-40920, CVE-2024-39499, CVE-2024-40899, CVE-2024-41003, CVE-2024-40964, CVE-2024-40922, CVE-2024-38632, CVE-2024-40931, CVE-2024-40982, CVE-2024-40971, CVE-2024-39277, CVE-2024-39467, CVE-2024-36015, CVE-2024-40954, CVE-2024-40938, CVE-2024-40921, CVE-2024-39296, CVE-2024-41040, CVE-2024-40965, CVE-2024-39465, CVE-2024-40984, CVE-2024-39478, CVE-2024-40990, CVE-2024-40926, CVE-2024-40980, CVE-2024-40905, CVE-2024-39475, CVE-2024-40959, CVE-2024-40902, CVE-2024-38780, CVE-2024-40935, CVE-2024-37021, CVE-2024-40997, CVE-2024-40936, CVE-2024-40987, CVE-2024-40939, CVE-2024-37026, CVE-2024-36973, CVE-2024-40972, CVE-2024-42078, CVE-2024-38306, CVE-2024-40949, CVE-2024-36489, CVE-2024-38637, CVE-2024-40912, CVE-2024-39276, CVE-2024-39493, CVE-2024-40994, CVE-2024-40948, CVE-2024-36972, CVE-2024-40942, CVE-2024-37356, CVE-2024-38619, CVE-2024-40988, CVE-2024-38635, CVE-2024-41000, CVE-2024-40955, CVE-2024-40999, CVE-2024-40974, CVE-2024-39490, CVE-2024-39298, CVE-2024-40975, CVE-2024-40998, CVE-2024-40996, CVE-2024-40963, CVE-2024-40909, CVE-2024-40919, CVE-2024-39500, CVE-2024-39461) Update Instructions: Run `sudo pro fix USN-7004-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-azure - 6.8.0-1014.16 linux-azure-cloud-tools-6.8.0-1014 - 6.8.0-1014.16 linux-azure-fde - 6.8.0-1014.16 linux-azure-headers-6.8.0-1014 - 6.8.0-1014.16 linux-azure-tools-6.8.0-1014 - 6.8.0-1014.16 linux-buildinfo-6.8.0-1014-azure - 6.8.0-1014.16 linux-cloud-tools-6.8.0-1014-azure - 6.8.0-1014.16 linux-cloud-tools-azure - 6.8.0-1014.16 linux-headers-6.8.0-1014-azure - 6.8.0-1014.16 linux-headers-azure - 6.8.0-1014.16 linux-image-6.8.0-1014-azure - 6.8.0-1014.16 linux-image-6.8.0-1014-azure-fde - 6.8.0-1014.16 linux-image-azure - 6.8.0-1014.16 linux-image-azure-fde - 6.8.0-1014.16 linux-image-unsigned-6.8.0-1014-azure - 6.8.0-1014.16 linux-modules-6.8.0-1014-azure - 6.8.0-1014.16 linux-modules-extra-6.8.0-1014-azure - 6.8.0-1014.16 linux-modules-extra-azure - 6.8.0-1014.16 linux-modules-involflt-6.8.0-1014-azure - 6.8.0-1014.16 linux-modules-involflt-azure - 6.8.0-1014.16 linux-modules-iwlwifi-6.8.0-1014-azure - 6.8.0-1014.16 linux-modules-iwlwifi-azure - 6.8.0-1014.16 linux-tools-6.8.0-1014-azure - 6.8.0-1014.16 linux-tools-azure - 6.8.0-1014.16 No subscription required High CVE-2022-48772 CVE-2023-52884 CVE-2024-23848 CVE-2024-31076 CVE-2024-32936 CVE-2024-33619 CVE-2024-33621 CVE-2024-33847 CVE-2024-34027 CVE-2024-34030 CVE-2024-34777 CVE-2024-35247 CVE-2024-36015 CVE-2024-36244 CVE-2024-36270 CVE-2024-36281 CVE-2024-36286 CVE-2024-36288 CVE-2024-36477 CVE-2024-36478 CVE-2024-36479 CVE-2024-36481 CVE-2024-36484 CVE-2024-36489 CVE-2024-36971 CVE-2024-36972 CVE-2024-36973 CVE-2024-36974 CVE-2024-36978 CVE-2024-37021 CVE-2024-37026 CVE-2024-37078 CVE-2024-37354 CVE-2024-37356 CVE-2024-38306 CVE-2024-38381 CVE-2024-38384 CVE-2024-38385 CVE-2024-38388 CVE-2024-38390 CVE-2024-38618 CVE-2024-38619 CVE-2024-38621 CVE-2024-38622 CVE-2024-38623 CVE-2024-38624 CVE-2024-38625 CVE-2024-38627 CVE-2024-38628 CVE-2024-38629 CVE-2024-38630 CVE-2024-38632 CVE-2024-38633 CVE-2024-38634 CVE-2024-38635 CVE-2024-38636 CVE-2024-38637 CVE-2024-38659 CVE-2024-38661 CVE-2024-38662 CVE-2024-38663 CVE-2024-38664 CVE-2024-38667 CVE-2024-38780 CVE-2024-39276 CVE-2024-39277 CVE-2024-39291 CVE-2024-39296 CVE-2024-39298 CVE-2024-39301 CVE-2024-39371 CVE-2024-39461 CVE-2024-39462 CVE-2024-39463 CVE-2024-39464 CVE-2024-39465 CVE-2024-39466 CVE-2024-39467 CVE-2024-39468 CVE-2024-39469 CVE-2024-39470 CVE-2024-39471 CVE-2024-39473 CVE-2024-39474 CVE-2024-39475 CVE-2024-39478 CVE-2024-39479 CVE-2024-39480 CVE-2024-39481 CVE-2024-39483 CVE-2024-39485 CVE-2024-39488 CVE-2024-39489 CVE-2024-39490 CVE-2024-39491 CVE-2024-39492 CVE-2024-39493 CVE-2024-39494 CVE-2024-39495 CVE-2024-39496 CVE-2024-39497 CVE-2024-39498 CVE-2024-39499 CVE-2024-39500 CVE-2024-39501 CVE-2024-39502 CVE-2024-39503 CVE-2024-39504 CVE-2024-39505 CVE-2024-39506 CVE-2024-39507 CVE-2024-39508 CVE-2024-39509 CVE-2024-39510 CVE-2024-40899 CVE-2024-40900 CVE-2024-40901 CVE-2024-40902 CVE-2024-40903 CVE-2024-40904 CVE-2024-40905 CVE-2024-40906 CVE-2024-40908 CVE-2024-40909 CVE-2024-40910 CVE-2024-40911 CVE-2024-40912 CVE-2024-40913 CVE-2024-40914 CVE-2024-40915 CVE-2024-40916 CVE-2024-40917 CVE-2024-40918 CVE-2024-40919 CVE-2024-40920 CVE-2024-40921 CVE-2024-40922 CVE-2024-40923 CVE-2024-40924 CVE-2024-40925 CVE-2024-40926 CVE-2024-40927 CVE-2024-40928 CVE-2024-40929 CVE-2024-40930 CVE-2024-40931 CVE-2024-40932 CVE-2024-40933 CVE-2024-40934 CVE-2024-40935 CVE-2024-40936 CVE-2024-40937 CVE-2024-40938 CVE-2024-40939 CVE-2024-40940 CVE-2024-40941 CVE-2024-40942 CVE-2024-40943 CVE-2024-40944 CVE-2024-40945 CVE-2024-40947 CVE-2024-40948 CVE-2024-40949 CVE-2024-40951 CVE-2024-40952 CVE-2024-40953 CVE-2024-40954 CVE-2024-40955 CVE-2024-40956 CVE-2024-40957 CVE-2024-40958 CVE-2024-40959 CVE-2024-40960 CVE-2024-40961 CVE-2024-40962 CVE-2024-40963 CVE-2024-40964 CVE-2024-40965 CVE-2024-40966 CVE-2024-40967 CVE-2024-40968 CVE-2024-40969 CVE-2024-40970 CVE-2024-40971 CVE-2024-40972 CVE-2024-40973 CVE-2024-40974 CVE-2024-40975 CVE-2024-40976 CVE-2024-40977 CVE-2024-40978 CVE-2024-40979 CVE-2024-40980 CVE-2024-40981 CVE-2024-40982 CVE-2024-40983 CVE-2024-40984 CVE-2024-40985 CVE-2024-40986 CVE-2024-40987 CVE-2024-40988 CVE-2024-40989 CVE-2024-40990 CVE-2024-40992 CVE-2024-40994 CVE-2024-40995 CVE-2024-40996 CVE-2024-40997 CVE-2024-40998 CVE-2024-40999 CVE-2024-41000 CVE-2024-41001 CVE-2024-41002 CVE-2024-41003 CVE-2024-41004 CVE-2024-41005 CVE-2024-41006 CVE-2024-41040 CVE-2024-42078 CVE-2024-42148 CVE-2024-42270 USN-7005-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Chenyuan Yang discovered that the CEC driver driver in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2024-23848) It was discovered that the JFS file system contained an out-of-bounds read vulnerability when printing xattr debug information. A local attacker could use this to cause a denial of service (system crash). (CVE-2024-40902) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PA-RISC architecture; - PowerPC architecture; - RISC-V architecture; - x86 architecture; - Block layer subsystem; - ACPI drivers; - Drivers core; - Null block device driver; - Character device driver; - Clock framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - Buffer Sharing and Synchronization framework; - DMA engine subsystem; - EFI core; - FPGA Framework; - GPU drivers; - Greybus drivers; - HID subsystem; - HW tracing; - I2C subsystem; - IIO subsystem; - InfiniBand drivers; - Input Device (Mouse) drivers; - Mailbox framework; - Media drivers; - Microchip PCI driver; - VMware VMCI Driver; - Network drivers; - PCI subsystem; - x86 platform drivers; - PTP clock framework; - S/390 drivers; - SCSI drivers; - SoundWire subsystem; - Sonic Silicon Backplane drivers; - Greybus lights staging drivers; - Thermal drivers; - TTY drivers; - USB subsystem; - VFIO drivers; - Framebuffer layer; - Watchdog drivers; - 9P distributed file system; - BTRFS file system; - File systems infrastructure; - Ext4 file system; - F2FS file system; - JFS file system; - Network file system server daemon; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - Tracing file system; - IOMMU subsystem; - Tracing infrastructure; - io_uring subsystem; - Core kernel; - BPF subsystem; - Kernel debugger infrastructure; - DMA mapping infrastructure; - IRQ subsystem; - Memory management; - 9P file system network protocol; - Amateur Radio drivers; - B.A.T.M.A.N. meshing protocol; - Ethernet bridge; - Networking core; - Ethtool driver; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Multipath TCP; - Netfilter; - NET/ROM layer; - NFC subsystem; - Network traffic control; - Sun RPC protocol; - TIPC protocol; - TLS protocol; - Unix domain sockets; - Wireless networking; - XFRM subsystem; - AppArmor security module; - Integrity Measurement Architecture(IMA) framework; - Landlock security; - Linux Security Modules (LSM) Framework; - SELinux security module; - Simplified Mandatory Access Control Kernel framework; - ALSA framework; - HD-audio driver; - SOF drivers; - KVM core; (CVE-2024-40963, CVE-2024-40994, CVE-2024-36481, CVE-2024-39301, CVE-2024-38390, CVE-2024-40976, CVE-2024-40934, CVE-2024-40902, CVE-2024-40916, CVE-2024-39298, CVE-2024-38659, CVE-2024-38384, CVE-2024-38635, CVE-2024-39494, CVE-2024-40926, CVE-2024-40956, CVE-2024-40948, CVE-2024-40920, CVE-2024-38624, CVE-2024-39498, CVE-2024-38780, CVE-2024-39503, CVE-2024-40919, CVE-2024-39505, CVE-2024-40988, CVE-2024-36972, CVE-2024-36974, CVE-2024-39495, CVE-2024-40992, CVE-2024-36015, CVE-2024-38618, CVE-2024-39478, CVE-2024-40975, CVE-2024-39507, CVE-2024-39479, CVE-2024-39291, CVE-2024-40925, CVE-2024-39493, CVE-2024-41005, CVE-2024-40932, CVE-2024-39467, CVE-2024-40973, CVE-2024-38634, CVE-2024-34027, CVE-2024-39462, CVE-2024-40949, CVE-2024-40908, CVE-2024-40929, CVE-2024-38662, CVE-2024-39489, CVE-2024-40953, CVE-2024-38306, CVE-2024-40915, CVE-2024-39470, CVE-2024-40969, CVE-2024-31076, CVE-2024-38663, CVE-2024-38629, CVE-2024-38633, CVE-2024-40959, CVE-2024-39475, CVE-2024-40947, CVE-2024-40971, CVE-2024-40979, CVE-2024-40996, CVE-2024-36484, CVE-2024-40960, CVE-2022-48772, CVE-2024-33619, CVE-2024-40923, CVE-2024-41006, CVE-2024-39474, CVE-2024-40944, CVE-2024-39473, CVE-2024-39469, CVE-2024-40914, CVE-2024-40900, CVE-2023-52884, CVE-2024-40931, CVE-2024-38664, CVE-2024-41004, CVE-2024-38636, CVE-2024-41001, CVE-2024-39497, CVE-2024-40974, CVE-2024-42078, CVE-2024-40954, CVE-2024-39483, CVE-2024-40978, CVE-2024-40952, CVE-2024-39481, CVE-2024-40955, CVE-2024-39471, CVE-2024-41000, CVE-2024-40972, CVE-2024-40957, CVE-2024-40913, CVE-2024-36478, CVE-2024-40984, CVE-2024-40990, CVE-2024-39510, CVE-2024-38381, CVE-2024-39277, CVE-2024-39464, CVE-2024-40995, CVE-2024-40905, CVE-2024-40986, CVE-2024-36971, CVE-2024-39480, CVE-2024-40938, CVE-2024-39509, CVE-2024-40982, CVE-2024-39500, CVE-2024-37026, CVE-2024-40965, CVE-2024-40961, CVE-2024-40989, CVE-2024-36973, CVE-2024-39504, CVE-2024-37354, CVE-2024-39488, CVE-2024-38661, CVE-2024-40998, CVE-2024-36489, CVE-2024-37021, CVE-2024-40917, CVE-2024-36281, CVE-2024-40964, CVE-2024-39496, CVE-2024-40980, CVE-2024-39465, CVE-2024-40983, CVE-2024-40936, CVE-2024-40899, CVE-2024-40933, CVE-2024-36288, CVE-2024-36286, CVE-2024-40987, CVE-2024-40939, CVE-2024-38667, CVE-2024-38628, CVE-2024-40977, CVE-2024-39276, CVE-2024-40941, CVE-2024-39491, CVE-2024-37078, CVE-2024-36978, CVE-2024-38623, CVE-2024-40962, CVE-2024-40935, CVE-2024-40997, CVE-2024-40981, CVE-2024-40922, CVE-2024-39461, CVE-2024-40999, CVE-2024-40918, CVE-2024-40927, CVE-2024-42148, CVE-2024-39371, CVE-2024-40985, CVE-2024-34030, CVE-2024-39485, CVE-2024-39296, CVE-2024-39466, CVE-2024-40909, CVE-2024-39492, CVE-2024-39502, CVE-2024-40903, CVE-2024-41040, CVE-2024-40968, CVE-2024-41003, CVE-2024-39499, CVE-2024-39508, CVE-2024-34777, CVE-2024-38627, CVE-2024-40930, CVE-2024-38388, CVE-2024-39490, CVE-2024-40906, CVE-2024-40940, CVE-2024-40937, CVE-2024-40911, CVE-2024-38385, CVE-2024-36244, CVE-2024-38622, CVE-2024-40958, CVE-2024-41002, CVE-2024-38621, CVE-2024-40970, CVE-2024-40904, CVE-2024-40928, CVE-2024-40967, CVE-2024-40951, CVE-2024-38637, CVE-2024-37356, CVE-2024-39463, CVE-2024-40912, CVE-2024-33847, CVE-2024-39468, CVE-2024-40942, CVE-2024-40910, CVE-2024-38625, CVE-2024-35247, CVE-2024-36479, CVE-2024-40943, CVE-2024-32936, CVE-2024-38630, CVE-2024-39501, CVE-2024-40966, CVE-2024-40921, CVE-2024-40924, CVE-2024-39506, CVE-2024-36270, CVE-2024-33621, CVE-2024-40945, CVE-2024-40901, CVE-2024-38632, CVE-2024-38619) Update Instructions: Run `sudo pro fix USN-7005-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-cloud-tools-nvidia - 6.8.0-1013.13 linux-headers-nvidia - 6.8.0-1013.13 linux-headers-nvidia-64k - 6.8.0-1013.13 linux-image-nvidia - 6.8.0-1013.13 linux-image-nvidia-64k - 6.8.0-1013.13 linux-modules-nvidia-fs-nvidia - 6.8.0-1013.13 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1013.13 linux-nvidia - 6.8.0-1013.13 linux-nvidia-64k - 6.8.0-1013.13 linux-tools-nvidia - 6.8.0-1013.13 linux-tools-nvidia-64k - 6.8.0-1013.13 No subscription required linux-buildinfo-6.8.0-1013-nvidia - 6.8.0-1013.14 linux-buildinfo-6.8.0-1013-nvidia-64k - 6.8.0-1013.14 linux-headers-6.8.0-1013-nvidia - 6.8.0-1013.14 linux-headers-6.8.0-1013-nvidia-64k - 6.8.0-1013.14 linux-image-6.8.0-1013-nvidia - 6.8.0-1013.14 linux-image-6.8.0-1013-nvidia-64k - 6.8.0-1013.14 linux-image-uc-6.8.0-1013-nvidia - 6.8.0-1013.14 linux-image-uc-6.8.0-1013-nvidia-64k - 6.8.0-1013.14 linux-image-unsigned-6.8.0-1013-nvidia - 6.8.0-1013.14 linux-image-unsigned-6.8.0-1013-nvidia-64k - 6.8.0-1013.14 linux-modules-6.8.0-1013-nvidia - 6.8.0-1013.14 linux-modules-6.8.0-1013-nvidia-64k - 6.8.0-1013.14 linux-modules-extra-6.8.0-1013-nvidia - 6.8.0-1013.14 linux-modules-nvidia-fs-6.8.0-1013-nvidia - 6.8.0-1013.14 linux-modules-nvidia-fs-6.8.0-1013-nvidia-64k - 6.8.0-1013.14 linux-nvidia-headers-6.8.0-1013 - 6.8.0-1013.14 linux-nvidia-tools-6.8.0-1013 - 6.8.0-1013.14 linux-nvidia-tools-host - 6.8.0-1013.14 linux-tools-6.8.0-1013-nvidia - 6.8.0-1013.14 linux-tools-6.8.0-1013-nvidia-64k - 6.8.0-1013.14 No subscription required linux-buildinfo-6.8.0-1013-nvidia-lowlatency - 6.8.0-1013.14.1 linux-buildinfo-6.8.0-1013-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1013.14.1 linux-headers-6.8.0-1013-nvidia-lowlatency - 6.8.0-1013.14.1 linux-headers-6.8.0-1013-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-headers-nvidia-lowlatency - 6.8.0-1013.14.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-image-6.8.0-1013-nvidia-lowlatency - 6.8.0-1013.14.1 linux-image-6.8.0-1013-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-image-nvidia-lowlatency - 6.8.0-1013.14.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-image-uc-6.8.0-1013-nvidia-lowlatency - 6.8.0-1013.14.1 linux-image-uc-6.8.0-1013-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-image-unsigned-6.8.0-1013-nvidia-lowlatency - 6.8.0-1013.14.1 linux-image-unsigned-6.8.0-1013-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-modules-6.8.0-1013-nvidia-lowlatency - 6.8.0-1013.14.1 linux-modules-6.8.0-1013-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-modules-extra-6.8.0-1013-nvidia-lowlatency - 6.8.0-1013.14.1 linux-modules-nvidia-fs-6.8.0-1013-nvidia-lowlatency - 6.8.0-1013.14.1 linux-modules-nvidia-fs-6.8.0-1013-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1013.14.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-nvidia-lowlatency - 6.8.0-1013.14.1 linux-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-nvidia-lowlatency-headers-6.8.0-1013 - 6.8.0-1013.14.1 linux-nvidia-lowlatency-tools-6.8.0-1013 - 6.8.0-1013.14.1 linux-nvidia-lowlatency-tools-host - 6.8.0-1013.14.1 linux-tools-6.8.0-1013-nvidia-lowlatency - 6.8.0-1013.14.1 linux-tools-6.8.0-1013-nvidia-lowlatency-64k - 6.8.0-1013.14.1 linux-tools-nvidia-lowlatency - 6.8.0-1013.14.1 linux-tools-nvidia-lowlatency-64k - 6.8.0-1013.14.1 No subscription required High CVE-2022-48772 CVE-2023-52884 CVE-2024-23848 CVE-2024-31076 CVE-2024-32936 CVE-2024-33619 CVE-2024-33621 CVE-2024-33847 CVE-2024-34027 CVE-2024-34030 CVE-2024-34777 CVE-2024-35247 CVE-2024-36015 CVE-2024-36244 CVE-2024-36270 CVE-2024-36281 CVE-2024-36286 CVE-2024-36288 CVE-2024-36478 CVE-2024-36479 CVE-2024-36481 CVE-2024-36484 CVE-2024-36489 CVE-2024-36971 CVE-2024-36972 CVE-2024-36973 CVE-2024-36974 CVE-2024-36978 CVE-2024-37021 CVE-2024-37026 CVE-2024-37078 CVE-2024-37354 CVE-2024-37356 CVE-2024-38306 CVE-2024-38381 CVE-2024-38384 CVE-2024-38385 CVE-2024-38388 CVE-2024-38390 CVE-2024-38618 CVE-2024-38619 CVE-2024-38621 CVE-2024-38622 CVE-2024-38623 CVE-2024-38624 CVE-2024-38625 CVE-2024-38627 CVE-2024-38628 CVE-2024-38629 CVE-2024-38630 CVE-2024-38632 CVE-2024-38633 CVE-2024-38634 CVE-2024-38635 CVE-2024-38636 CVE-2024-38637 CVE-2024-38659 CVE-2024-38661 CVE-2024-38662 CVE-2024-38663 CVE-2024-38664 CVE-2024-38667 CVE-2024-38780 CVE-2024-39276 CVE-2024-39277 CVE-2024-39291 CVE-2024-39296 CVE-2024-39298 CVE-2024-39301 CVE-2024-39371 CVE-2024-39461 CVE-2024-39462 CVE-2024-39463 CVE-2024-39464 CVE-2024-39465 CVE-2024-39466 CVE-2024-39467 CVE-2024-39468 CVE-2024-39469 CVE-2024-39470 CVE-2024-39471 CVE-2024-39473 CVE-2024-39474 CVE-2024-39475 CVE-2024-39478 CVE-2024-39479 CVE-2024-39480 CVE-2024-39481 CVE-2024-39483 CVE-2024-39485 CVE-2024-39488 CVE-2024-39489 CVE-2024-39490 CVE-2024-39491 CVE-2024-39492 CVE-2024-39493 CVE-2024-39494 CVE-2024-39495 CVE-2024-39496 CVE-2024-39497 CVE-2024-39498 CVE-2024-39499 CVE-2024-39500 CVE-2024-39501 CVE-2024-39502 CVE-2024-39503 CVE-2024-39504 CVE-2024-39505 CVE-2024-39506 CVE-2024-39507 CVE-2024-39508 CVE-2024-39509 CVE-2024-39510 CVE-2024-40899 CVE-2024-40900 CVE-2024-40901 CVE-2024-40902 CVE-2024-40903 CVE-2024-40904 CVE-2024-40905 CVE-2024-40906 CVE-2024-40908 CVE-2024-40909 CVE-2024-40910 CVE-2024-40911 CVE-2024-40912 CVE-2024-40913 CVE-2024-40914 CVE-2024-40915 CVE-2024-40916 CVE-2024-40917 CVE-2024-40918 CVE-2024-40919 CVE-2024-40920 CVE-2024-40921 CVE-2024-40922 CVE-2024-40923 CVE-2024-40924 CVE-2024-40925 CVE-2024-40926 CVE-2024-40927 CVE-2024-40928 CVE-2024-40929 CVE-2024-40930 CVE-2024-40931 CVE-2024-40932 CVE-2024-40933 CVE-2024-40934 CVE-2024-40935 CVE-2024-40936 CVE-2024-40937 CVE-2024-40938 CVE-2024-40939 CVE-2024-40940 CVE-2024-40941 CVE-2024-40942 CVE-2024-40943 CVE-2024-40944 CVE-2024-40945 CVE-2024-40947 CVE-2024-40948 CVE-2024-40949 CVE-2024-40951 CVE-2024-40952 CVE-2024-40953 CVE-2024-40954 CVE-2024-40955 CVE-2024-40956 CVE-2024-40957 CVE-2024-40958 CVE-2024-40959 CVE-2024-40960 CVE-2024-40961 CVE-2024-40962 CVE-2024-40963 CVE-2024-40964 CVE-2024-40965 CVE-2024-40966 CVE-2024-40967 CVE-2024-40968 CVE-2024-40969 CVE-2024-40970 CVE-2024-40971 CVE-2024-40972 CVE-2024-40973 CVE-2024-40974 CVE-2024-40975 CVE-2024-40976 CVE-2024-40977 CVE-2024-40978 CVE-2024-40979 CVE-2024-40980 CVE-2024-40981 CVE-2024-40982 CVE-2024-40983 CVE-2024-40984 CVE-2024-40985 CVE-2024-40986 CVE-2024-40987 CVE-2024-40988 CVE-2024-40989 CVE-2024-40990 CVE-2024-40992 CVE-2024-40994 CVE-2024-40995 CVE-2024-40996 CVE-2024-40997 CVE-2024-40998 CVE-2024-40999 CVE-2024-41000 CVE-2024-41001 CVE-2024-41002 CVE-2024-41003 CVE-2024-41004 CVE-2024-41005 CVE-2024-41006 CVE-2024-41040 CVE-2024-42078 CVE-2024-42148 USN-7010-1 -- DCMTK vulnerabilities Ubuntu 24.04 LTS Jinsheng Ba discovered that DCMTK incorrectly handled certain requests. If a user or an automated system were tricked into opening a certain specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 20.04 LTS. (CVE-2021-41687, CVE-2021-41688, CVE-2021-41689, CVE-2021-41690) Sharon Brizinov and Noam Moshe discovered that DCMTK incorrectly handled pointers. If a user or an automated system were tricked into opening a certain specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 20.04 LTS. (CVE-2022-2121) It was discovered that DCMTK incorrectly handled certain inputs. If a user or an automated system were tricked into opening a certain specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 20.04 LTS. (CVE-2022-43272) It was discovered that DCMTK incorrectly handled certain inputs. If a user or an automated system were tricked into opening a certain specially crafted input file, a remote attacker could possibly use this issue to execute arbitrary code. This issue was only addressed in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2024-28130) It was discovered that DCMTK incorrectly handled memory when processing an invalid incoming DIMSE message. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-34508, CVE-2024-34509) Update Instructions: Run `sudo pro fix USN-7010-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: dcmtk - 3.6.7-9.1ubuntu0.1~esm1 dcmtk-doc - 3.6.7-9.1ubuntu0.1~esm1 libdcmtk-dev - 3.6.7-9.1ubuntu0.1~esm1 libdcmtk17t64 - 3.6.7-9.1ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2021-41687 CVE-2021-41688 CVE-2021-41689 CVE-2021-41690 CVE-2022-2121 CVE-2022-43272 CVE-2024-28130 CVE-2024-34508 CVE-2024-34509 USN-7011-1 -- ClamAV vulnerabilities Ubuntu 24.04 LTS It was discovered that ClamAV incorrectly handled certain PDF files. A remote attacker could possibly use this issue to cause ClamAV to crash, resulting in a denial of service. (CVE-2024-20505) It was discovered that ClamAV incorrectly handled logfile privileges. A local attacker could use this issue to cause ClamAV to overwrite arbitrary files, possibly leading to privilege escalation. (CVE-2024-20506) Update Instructions: Run `sudo pro fix USN-7011-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: clamav - 1.0.7+dfsg-0ubuntu0.24.04.1 clamav-base - 1.0.7+dfsg-0ubuntu0.24.04.1 clamav-daemon - 1.0.7+dfsg-0ubuntu0.24.04.1 clamav-docs - 1.0.7+dfsg-0ubuntu0.24.04.1 clamav-freshclam - 1.0.7+dfsg-0ubuntu0.24.04.1 clamav-milter - 1.0.7+dfsg-0ubuntu0.24.04.1 clamav-testfiles - 1.0.7+dfsg-0ubuntu0.24.04.1 clamdscan - 1.0.7+dfsg-0ubuntu0.24.04.1 libclamav-dev - 1.0.7+dfsg-0ubuntu0.24.04.1 libclamav11t64 - 1.0.7+dfsg-0ubuntu0.24.04.1 No subscription required Medium CVE-2024-20505 CVE-2024-20506 USN-7012-1 -- curl vulnerability Ubuntu 24.04 LTS Hiroki Kurosawa discovered that curl incorrectly handled certain OCSP responses. This could result in bad certificates not being checked properly, contrary to expectations. Update Instructions: Run `sudo pro fix USN-7012-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: curl - 8.5.0-2ubuntu10.4 libcurl3t64-gnutls - 8.5.0-2ubuntu10.4 libcurl4-doc - 8.5.0-2ubuntu10.4 libcurl4-gnutls-dev - 8.5.0-2ubuntu10.4 libcurl4-openssl-dev - 8.5.0-2ubuntu10.4 libcurl4t64 - 8.5.0-2ubuntu10.4 No subscription required Medium CVE-2024-8096 USN-7014-1 -- nginx vulnerability Ubuntu 24.04 LTS It was discovered that the nginx ngx_http_mp4 module incorrectly handled certain malformed mp4 files. In environments where the mp4 directive is in use, a remote attacker could possibly use this issue to cause nginx to crash, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-7014-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libnginx-mod-http-geoip - 1.24.0-2ubuntu7.1 libnginx-mod-http-image-filter - 1.24.0-2ubuntu7.1 libnginx-mod-http-perl - 1.24.0-2ubuntu7.1 libnginx-mod-http-xslt-filter - 1.24.0-2ubuntu7.1 libnginx-mod-mail - 1.24.0-2ubuntu7.1 libnginx-mod-stream - 1.24.0-2ubuntu7.1 libnginx-mod-stream-geoip - 1.24.0-2ubuntu7.1 nginx - 1.24.0-2ubuntu7.1 nginx-common - 1.24.0-2ubuntu7.1 nginx-core - 1.24.0-2ubuntu7.1 nginx-dev - 1.24.0-2ubuntu7.1 nginx-doc - 1.24.0-2ubuntu7.1 nginx-extras - 1.24.0-2ubuntu7.1 nginx-full - 1.24.0-2ubuntu7.1 nginx-light - 1.24.0-2ubuntu7.1 No subscription required Medium CVE-2024-7347 USN-7015-1 -- Python vulnerabilities Ubuntu 24.04 LTS It was discovered that the Python email module incorrectly parsed email addresses that contain special characters. A remote attacker could possibly use this issue to bypass certain protection mechanisms. (CVE-2023-27043) It was discovered that Python allowed excessive backtracking while parsing certain tarfile headers. A remote attacker could possibly use this issue to cause Python to consume resources, leading to a denial of service. (CVE-2024-6232) It was discovered that the Python email module incorrectly quoted newlines for email headers. A remote attacker could possibly use this issue to perform header injection. (CVE-2024-6923) It was discovered that the Python http.cookies module incorrectly handled parsing cookies that contained backslashes for quoted characters. A remote attacker could possibly use this issue to cause Python to consume resources, leading to a denial of service. (CVE-2024-7592) It was discovered that the Python zipfile module incorrectly handled certain malformed zip files. A remote attacker could possibly use this issue to cause Python to stop responding, resulting in a denial of service. (CVE-2024-8088) Update Instructions: Run `sudo pro fix USN-7015-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: idle-python3.12 - 3.12.3-1ubuntu0.2 libpython3.12-dev - 3.12.3-1ubuntu0.2 libpython3.12-minimal - 3.12.3-1ubuntu0.2 libpython3.12-stdlib - 3.12.3-1ubuntu0.2 libpython3.12-testsuite - 3.12.3-1ubuntu0.2 libpython3.12t64 - 3.12.3-1ubuntu0.2 python3.12 - 3.12.3-1ubuntu0.2 python3.12-dev - 3.12.3-1ubuntu0.2 python3.12-doc - 3.12.3-1ubuntu0.2 python3.12-examples - 3.12.3-1ubuntu0.2 python3.12-full - 3.12.3-1ubuntu0.2 python3.12-minimal - 3.12.3-1ubuntu0.2 python3.12-nopie - 3.12.3-1ubuntu0.2 python3.12-venv - 3.12.3-1ubuntu0.2 No subscription required Medium CVE-2023-27043 CVE-2024-6232 CVE-2024-6923 CVE-2024-7592 CVE-2024-8088 USN-7016-1 -- FRR vulnerability Ubuntu 24.04 LTS Iggy Frankovic discovered that FRR incorrectly handled certain BGP messages. A remote attacker could possibly use this issue to cause FRR to crash, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-7016-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: frr - 8.4.4-1.1ubuntu6.2 frr-doc - 8.4.4-1.1ubuntu6.2 frr-pythontools - 8.4.4-1.1ubuntu6.2 frr-rpki-rtrlib - 8.4.4-1.1ubuntu6.2 frr-snmp - 8.4.4-1.1ubuntu6.2 No subscription required Medium CVE-2024-44070 USN-7020-1 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - GPU drivers; - Network drivers; - SCSI drivers; - F2FS file system; - BPF subsystem; - IPv4 networking; (CVE-2024-42160, CVE-2024-42159, CVE-2024-42154, CVE-2024-41009, CVE-2024-42228, CVE-2024-42224) Update Instructions: Run `sudo pro fix USN-7020-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1011-gke - 6.8.0-1011.14 linux-gke - 6.8.0-1011.14 linux-gke-headers-6.8.0-1011 - 6.8.0-1011.14 linux-gke-tools-6.8.0-1011 - 6.8.0-1011.14 linux-headers-6.8.0-1011-gke - 6.8.0-1011.14 linux-headers-gke - 6.8.0-1011.14 linux-image-6.8.0-1011-gke - 6.8.0-1011.14 linux-image-gke - 6.8.0-1011.14 linux-image-unsigned-6.8.0-1011-gke - 6.8.0-1011.14 linux-modules-6.8.0-1011-gke - 6.8.0-1011.14 linux-modules-extra-6.8.0-1011-gke - 6.8.0-1011.14 linux-modules-iwlwifi-6.8.0-1011-gke - 6.8.0-1011.14 linux-modules-iwlwifi-gke - 6.8.0-1011.14 linux-tools-6.8.0-1011-gke - 6.8.0-1011.14 linux-tools-gke - 6.8.0-1011.14 No subscription required linux-buildinfo-6.8.0-1013-ibm - 6.8.0-1013.13 linux-buildinfo-6.8.0-1013-oem - 6.8.0-1013.13 linux-buildinfo-6.8.0-1013-oracle - 6.8.0-1013.13 linux-buildinfo-6.8.0-1013-oracle-64k - 6.8.0-1013.13 linux-headers-6.8.0-1013-ibm - 6.8.0-1013.13 linux-headers-6.8.0-1013-oem - 6.8.0-1013.13 linux-headers-6.8.0-1013-oracle - 6.8.0-1013.13 linux-headers-6.8.0-1013-oracle-64k - 6.8.0-1013.13 linux-headers-ibm - 6.8.0-1013.13 linux-headers-ibm-classic - 6.8.0-1013.13 linux-headers-ibm-lts-24.04 - 6.8.0-1013.13 linux-headers-oem-24.04 - 6.8.0-1013.13 linux-headers-oem-24.04a - 6.8.0-1013.13 linux-headers-oracle - 6.8.0-1013.13 linux-headers-oracle-64k - 6.8.0-1013.13 linux-ibm - 6.8.0-1013.13 linux-ibm-classic - 6.8.0-1013.13 linux-ibm-cloud-tools-common - 6.8.0-1013.13 linux-ibm-headers-6.8.0-1013 - 6.8.0-1013.13 linux-ibm-lts-24.04 - 6.8.0-1013.13 linux-ibm-source-6.8.0 - 6.8.0-1013.13 linux-ibm-tools-6.8.0-1013 - 6.8.0-1013.13 linux-image-6.8.0-1013-ibm - 6.8.0-1013.13 linux-image-6.8.0-1013-oem - 6.8.0-1013.13 linux-image-6.8.0-1013-oracle - 6.8.0-1013.13 linux-image-6.8.0-1013-oracle-64k - 6.8.0-1013.13 linux-image-ibm - 6.8.0-1013.13 linux-image-ibm-classic - 6.8.0-1013.13 linux-image-ibm-lts-24.04 - 6.8.0-1013.13 linux-image-oem-24.04 - 6.8.0-1013.13 linux-image-oem-24.04a - 6.8.0-1013.13 linux-image-oracle - 6.8.0-1013.13 linux-image-oracle-64k - 6.8.0-1013.13 linux-image-uc-6.8.0-1013-oem - 6.8.0-1013.13 linux-image-uc-oem-24.04 - 6.8.0-1013.13 linux-image-uc-oem-24.04a - 6.8.0-1013.13 linux-image-unsigned-6.8.0-1013-ibm - 6.8.0-1013.13 linux-image-unsigned-6.8.0-1013-oem - 6.8.0-1013.13 linux-image-unsigned-6.8.0-1013-oracle - 6.8.0-1013.13 linux-image-unsigned-6.8.0-1013-oracle-64k - 6.8.0-1013.13 linux-modules-6.8.0-1013-ibm - 6.8.0-1013.13 linux-modules-6.8.0-1013-oem - 6.8.0-1013.13 linux-modules-6.8.0-1013-oracle - 6.8.0-1013.13 linux-modules-6.8.0-1013-oracle-64k - 6.8.0-1013.13 linux-modules-extra-6.8.0-1013-ibm - 6.8.0-1013.13 linux-modules-extra-6.8.0-1013-oracle - 6.8.0-1013.13 linux-modules-extra-6.8.0-1013-oracle-64k - 6.8.0-1013.13 linux-modules-ipu6-6.8.0-1013-oem - 6.8.0-1013.13 linux-modules-ipu6-oem-24.04 - 6.8.0-1013.13 linux-modules-ipu6-oem-24.04a - 6.8.0-1013.13 linux-modules-iwlwifi-6.8.0-1013-ibm - 6.8.0-1013.13 linux-modules-iwlwifi-6.8.0-1013-oem - 6.8.0-1013.13 linux-modules-iwlwifi-ibm - 6.8.0-1013.13 linux-modules-iwlwifi-ibm-classic - 6.8.0-1013.13 linux-modules-iwlwifi-ibm-lts-24.04 - 6.8.0-1013.13 linux-modules-iwlwifi-oem-24.04 - 6.8.0-1013.13 linux-modules-iwlwifi-oem-24.04a - 6.8.0-1013.13 linux-modules-usbio-6.8.0-1013-oem - 6.8.0-1013.13 linux-modules-usbio-oem-24.04 - 6.8.0-1013.13 linux-modules-usbio-oem-24.04a - 6.8.0-1013.13 linux-oem-24.04 - 6.8.0-1013.13 linux-oem-24.04a - 6.8.0-1013.13 linux-oem-6.8-headers-6.8.0-1013 - 6.8.0-1013.13 linux-oem-6.8-tools-6.8.0-1013 - 6.8.0-1013.13 linux-oracle - 6.8.0-1013.13 linux-oracle-64k - 6.8.0-1013.13 linux-oracle-headers-6.8.0-1013 - 6.8.0-1013.13 linux-oracle-tools-6.8.0-1013 - 6.8.0-1013.13 linux-tools-6.8.0-1013-ibm - 6.8.0-1013.13 linux-tools-6.8.0-1013-oem - 6.8.0-1013.13 linux-tools-6.8.0-1013-oracle - 6.8.0-1013.13 linux-tools-6.8.0-1013-oracle-64k - 6.8.0-1013.13 linux-tools-ibm - 6.8.0-1013.13 linux-tools-ibm-classic - 6.8.0-1013.13 linux-tools-ibm-lts-24.04 - 6.8.0-1013.13 linux-tools-oem-24.04 - 6.8.0-1013.13 linux-tools-oem-24.04a - 6.8.0-1013.13 linux-tools-oracle - 6.8.0-1013.13 linux-tools-oracle-64k - 6.8.0-1013.13 No subscription required linux-buildinfo-6.8.0-1014-nvidia - 6.8.0-1014.15 linux-buildinfo-6.8.0-1014-nvidia-64k - 6.8.0-1014.15 linux-cloud-tools-nvidia - 6.8.0-1014.15 linux-headers-6.8.0-1014-nvidia - 6.8.0-1014.15 linux-headers-6.8.0-1014-nvidia-64k - 6.8.0-1014.15 linux-headers-nvidia - 6.8.0-1014.15 linux-headers-nvidia-64k - 6.8.0-1014.15 linux-image-6.8.0-1014-nvidia - 6.8.0-1014.15 linux-image-6.8.0-1014-nvidia-64k - 6.8.0-1014.15 linux-image-nvidia - 6.8.0-1014.15 linux-image-nvidia-64k - 6.8.0-1014.15 linux-image-uc-6.8.0-1014-nvidia - 6.8.0-1014.15 linux-image-uc-6.8.0-1014-nvidia-64k - 6.8.0-1014.15 linux-image-unsigned-6.8.0-1014-nvidia - 6.8.0-1014.15 linux-image-unsigned-6.8.0-1014-nvidia-64k - 6.8.0-1014.15 linux-modules-6.8.0-1014-nvidia - 6.8.0-1014.15 linux-modules-6.8.0-1014-nvidia-64k - 6.8.0-1014.15 linux-modules-extra-6.8.0-1014-nvidia - 6.8.0-1014.15 linux-modules-nvidia-fs-6.8.0-1014-nvidia - 6.8.0-1014.15 linux-modules-nvidia-fs-6.8.0-1014-nvidia-64k - 6.8.0-1014.15 linux-modules-nvidia-fs-nvidia - 6.8.0-1014.15 linux-modules-nvidia-fs-nvidia-64k - 6.8.0-1014.15 linux-nvidia - 6.8.0-1014.15 linux-nvidia-64k - 6.8.0-1014.15 linux-nvidia-headers-6.8.0-1014 - 6.8.0-1014.15 linux-nvidia-tools-6.8.0-1014 - 6.8.0-1014.15 linux-nvidia-tools-host - 6.8.0-1014.15 linux-tools-6.8.0-1014-nvidia - 6.8.0-1014.15 linux-tools-6.8.0-1014-nvidia-64k - 6.8.0-1014.15 linux-tools-nvidia - 6.8.0-1014.15 linux-tools-nvidia-64k - 6.8.0-1014.15 No subscription required linux-buildinfo-6.8.0-1014-nvidia-lowlatency - 6.8.0-1014.15.1 linux-buildinfo-6.8.0-1014-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-cloud-tools-nvidia-lowlatency - 6.8.0-1014.15.1 linux-headers-6.8.0-1014-nvidia-lowlatency - 6.8.0-1014.15.1 linux-headers-6.8.0-1014-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-headers-nvidia-lowlatency - 6.8.0-1014.15.1 linux-headers-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-image-6.8.0-1014-nvidia-lowlatency - 6.8.0-1014.15.1 linux-image-6.8.0-1014-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-image-nvidia-lowlatency - 6.8.0-1014.15.1 linux-image-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-image-uc-6.8.0-1014-nvidia-lowlatency - 6.8.0-1014.15.1 linux-image-uc-6.8.0-1014-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-image-unsigned-6.8.0-1014-nvidia-lowlatency - 6.8.0-1014.15.1 linux-image-unsigned-6.8.0-1014-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-modules-6.8.0-1014-nvidia-lowlatency - 6.8.0-1014.15.1 linux-modules-6.8.0-1014-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-modules-extra-6.8.0-1014-nvidia-lowlatency - 6.8.0-1014.15.1 linux-modules-nvidia-fs-6.8.0-1014-nvidia-lowlatency - 6.8.0-1014.15.1 linux-modules-nvidia-fs-6.8.0-1014-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-modules-nvidia-fs-nvidia-lowlatency - 6.8.0-1014.15.1 linux-modules-nvidia-fs-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-nvidia-lowlatency - 6.8.0-1014.15.1 linux-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-nvidia-lowlatency-headers-6.8.0-1014 - 6.8.0-1014.15.1 linux-nvidia-lowlatency-tools-6.8.0-1014 - 6.8.0-1014.15.1 linux-nvidia-lowlatency-tools-host - 6.8.0-1014.15.1 linux-tools-6.8.0-1014-nvidia-lowlatency - 6.8.0-1014.15.1 linux-tools-6.8.0-1014-nvidia-lowlatency-64k - 6.8.0-1014.15.1 linux-tools-nvidia-lowlatency - 6.8.0-1014.15.1 linux-tools-nvidia-lowlatency-64k - 6.8.0-1014.15.1 No subscription required linux-buildinfo-6.8.0-1015-gcp - 6.8.0-1015.17 linux-gcp - 6.8.0-1015.17 linux-gcp-headers-6.8.0-1015 - 6.8.0-1015.17 linux-gcp-tools-6.8.0-1015 - 6.8.0-1015.17 linux-headers-6.8.0-1015-gcp - 6.8.0-1015.17 linux-headers-gcp - 6.8.0-1015.17 linux-image-6.8.0-1015-gcp - 6.8.0-1015.17 linux-image-gcp - 6.8.0-1015.17 linux-image-unsigned-6.8.0-1015-gcp - 6.8.0-1015.17 linux-modules-6.8.0-1015-gcp - 6.8.0-1015.17 linux-modules-extra-6.8.0-1015-gcp - 6.8.0-1015.17 linux-modules-extra-gcp - 6.8.0-1015.17 linux-tools-6.8.0-1015-gcp - 6.8.0-1015.17 linux-tools-gcp - 6.8.0-1015.17 No subscription required linux-aws - 6.8.0-1016.17 linux-aws-cloud-tools-6.8.0-1016 - 6.8.0-1016.17 linux-aws-headers-6.8.0-1016 - 6.8.0-1016.17 linux-aws-tools-6.8.0-1016 - 6.8.0-1016.17 linux-buildinfo-6.8.0-1016-aws - 6.8.0-1016.17 linux-cloud-tools-6.8.0-1016-aws - 6.8.0-1016.17 linux-headers-6.8.0-1016-aws - 6.8.0-1016.17 linux-headers-aws - 6.8.0-1016.17 linux-image-6.8.0-1016-aws - 6.8.0-1016.17 linux-image-aws - 6.8.0-1016.17 linux-image-unsigned-6.8.0-1016-aws - 6.8.0-1016.17 linux-modules-6.8.0-1016-aws - 6.8.0-1016.17 linux-modules-extra-6.8.0-1016-aws - 6.8.0-1016.17 linux-modules-extra-aws - 6.8.0-1016.17 linux-tools-6.8.0-1016-aws - 6.8.0-1016.17 linux-tools-aws - 6.8.0-1016.17 No subscription required linux-buildinfo-6.8.0-45-generic - 6.8.0-45.45 linux-buildinfo-6.8.0-45-generic-64k - 6.8.0-45.45 linux-cloud-tools-6.8.0-45 - 6.8.0-45.45 linux-cloud-tools-6.8.0-45-generic - 6.8.0-45.45 linux-cloud-tools-common - 6.8.0-45.45 linux-cloud-tools-generic - 6.8.0-45.45 linux-cloud-tools-generic-hwe-24.04 - 6.8.0-45.45 linux-cloud-tools-generic-hwe-24.04-edge - 6.8.0-45.45 linux-cloud-tools-virtual - 6.8.0-45.45 linux-cloud-tools-virtual-hwe-24.04 - 6.8.0-45.45 linux-cloud-tools-virtual-hwe-24.04-edge - 6.8.0-45.45 linux-crashdump - 6.8.0-45.45 linux-doc - 6.8.0-45.45 linux-generic - 6.8.0-45.45 linux-generic-64k - 6.8.0-45.45 linux-generic-64k-hwe-24.04 - 6.8.0-45.45 linux-generic-64k-hwe-24.04-edge - 6.8.0-45.45 linux-generic-hwe-24.04 - 6.8.0-45.45 linux-generic-hwe-24.04-edge - 6.8.0-45.45 linux-generic-lpae - 6.8.0-45.45 linux-headers-6.8.0-45 - 6.8.0-45.45 linux-headers-6.8.0-45-generic - 6.8.0-45.45 linux-headers-6.8.0-45-generic-64k - 6.8.0-45.45 linux-headers-generic - 6.8.0-45.45 linux-headers-generic-64k - 6.8.0-45.45 linux-headers-generic-64k-hwe-24.04 - 6.8.0-45.45 linux-headers-generic-64k-hwe-24.04-edge - 6.8.0-45.45 linux-headers-generic-hwe-24.04 - 6.8.0-45.45 linux-headers-generic-hwe-24.04-edge - 6.8.0-45.45 linux-headers-generic-lpae - 6.8.0-45.45 linux-headers-kvm - 6.8.0-45.45 linux-headers-laptop-23.10 - 6.8.0-45.45 linux-headers-oem-20.04 - 6.8.0-45.45 linux-headers-oem-20.04b - 6.8.0-45.45 linux-headers-oem-20.04c - 6.8.0-45.45 linux-headers-oem-20.04d - 6.8.0-45.45 linux-headers-oem-22.04 - 6.8.0-45.45 linux-headers-virtual - 6.8.0-45.45 linux-headers-virtual-hwe-24.04 - 6.8.0-45.45 linux-headers-virtual-hwe-24.04-edge - 6.8.0-45.45 linux-image-6.8.0-45-generic - 6.8.0-45.45 linux-image-6.8.0-45-generic-64k - 6.8.0-45.45 linux-image-extra-virtual - 6.8.0-45.45 linux-image-extra-virtual-hwe-24.04 - 6.8.0-45.45 linux-image-extra-virtual-hwe-24.04-edge - 6.8.0-45.45 linux-image-generic - 6.8.0-45.45 linux-image-generic-64k - 6.8.0-45.45 linux-image-generic-64k-hwe-24.04 - 6.8.0-45.45 linux-image-generic-64k-hwe-24.04-edge - 6.8.0-45.45 linux-image-generic-hwe-24.04 - 6.8.0-45.45 linux-image-generic-hwe-24.04-edge - 6.8.0-45.45 linux-image-generic-lpae - 6.8.0-45.45 linux-image-kvm - 6.8.0-45.45 linux-image-laptop-23.10 - 6.8.0-45.45 linux-image-oem-20.04 - 6.8.0-45.45 linux-image-oem-20.04b - 6.8.0-45.45 linux-image-oem-20.04c - 6.8.0-45.45 linux-image-oem-20.04d - 6.8.0-45.45 linux-image-oem-22.04 - 6.8.0-45.45 linux-image-uc-6.8.0-45-generic - 6.8.0-45.45 linux-image-uc-6.8.0-45-generic-64k - 6.8.0-45.45 linux-image-uc-generic - 6.8.0-45.45 linux-image-uc-generic-hwe-24.04 - 6.8.0-45.45 linux-image-uc-generic-hwe-24.04-edge - 6.8.0-45.45 linux-image-unsigned-6.8.0-45-generic - 6.8.0-45.45 linux-image-unsigned-6.8.0-45-generic-64k - 6.8.0-45.45 linux-image-virtual - 6.8.0-45.45 linux-image-virtual-hwe-24.04 - 6.8.0-45.45 linux-image-virtual-hwe-24.04-edge - 6.8.0-45.45 linux-kvm - 6.8.0-45.45 linux-laptop-23.10 - 6.8.0-45.45 linux-lib-rust-6.8.0-45-generic - 6.8.0-45.45 linux-libc-dev - 6.8.0-45.45 linux-modules-6.8.0-45-generic - 6.8.0-45.45 linux-modules-6.8.0-45-generic-64k - 6.8.0-45.45 linux-modules-extra-6.8.0-45-generic - 6.8.0-45.45 linux-modules-ipu6-6.8.0-45-generic - 6.8.0-45.45 linux-modules-ipu6-generic - 6.8.0-45.45 linux-modules-ipu6-generic-hwe-24.04 - 6.8.0-45.45 linux-modules-ipu6-generic-hwe-24.04-edge - 6.8.0-45.45 linux-modules-iwlwifi-6.8.0-45-generic - 6.8.0-45.45 linux-modules-iwlwifi-generic - 6.8.0-45.45 linux-modules-iwlwifi-generic-hwe-24.04 - 6.8.0-45.45 linux-modules-iwlwifi-generic-hwe-24.04-edge - 6.8.0-45.45 linux-modules-iwlwifi-oem-20.04 - 6.8.0-45.45 linux-modules-iwlwifi-oem-20.04d - 6.8.0-45.45 linux-modules-iwlwifi-oem-22.04 - 6.8.0-45.45 linux-modules-usbio-6.8.0-45-generic - 6.8.0-45.45 linux-modules-usbio-generic - 6.8.0-45.45 linux-modules-usbio-generic-hwe-24.04 - 6.8.0-45.45 linux-modules-usbio-generic-hwe-24.04-edge - 6.8.0-45.45 linux-oem-20.04 - 6.8.0-45.45 linux-oem-20.04b - 6.8.0-45.45 linux-oem-20.04c - 6.8.0-45.45 linux-oem-20.04d - 6.8.0-45.45 linux-oem-22.04 - 6.8.0-45.45 linux-source - 6.8.0-45.45 linux-source-6.8.0 - 6.8.0-45.45 linux-tools-6.8.0-45 - 6.8.0-45.45 linux-tools-6.8.0-45-generic - 6.8.0-45.45 linux-tools-6.8.0-45-generic-64k - 6.8.0-45.45 linux-tools-common - 6.8.0-45.45 linux-tools-generic - 6.8.0-45.45 linux-tools-generic-64k - 6.8.0-45.45 linux-tools-generic-64k-hwe-24.04 - 6.8.0-45.45 linux-tools-generic-64k-hwe-24.04-edge - 6.8.0-45.45 linux-tools-generic-hwe-24.04 - 6.8.0-45.45 linux-tools-generic-hwe-24.04-edge - 6.8.0-45.45 linux-tools-generic-lpae - 6.8.0-45.45 linux-tools-host - 6.8.0-45.45 linux-tools-kvm - 6.8.0-45.45 linux-tools-laptop-23.10 - 6.8.0-45.45 linux-tools-oem-20.04 - 6.8.0-45.45 linux-tools-oem-20.04b - 6.8.0-45.45 linux-tools-oem-20.04c - 6.8.0-45.45 linux-tools-oem-20.04d - 6.8.0-45.45 linux-tools-oem-22.04 - 6.8.0-45.45 linux-tools-virtual - 6.8.0-45.45 linux-tools-virtual-hwe-24.04 - 6.8.0-45.45 linux-tools-virtual-hwe-24.04-edge - 6.8.0-45.45 linux-virtual - 6.8.0-45.45 linux-virtual-hwe-24.04 - 6.8.0-45.45 linux-virtual-hwe-24.04-edge - 6.8.0-45.45 No subscription required linux-buildinfo-6.8.0-45-lowlatency - 6.8.0-45.45.1 linux-buildinfo-6.8.0-45-lowlatency-64k - 6.8.0-45.45.1 linux-cloud-tools-6.8.0-45-lowlatency - 6.8.0-45.45.1 linux-cloud-tools-lowlatency - 6.8.0-45.45.1 linux-cloud-tools-lowlatency-hwe-20.04 - 6.8.0-45.45.1 linux-cloud-tools-lowlatency-hwe-20.04-edge - 6.8.0-45.45.1 linux-cloud-tools-lowlatency-hwe-22.04 - 6.8.0-45.45.1 linux-cloud-tools-lowlatency-hwe-22.04-edge - 6.8.0-45.45.1 linux-headers-6.8.0-45-lowlatency - 6.8.0-45.45.1 linux-headers-6.8.0-45-lowlatency-64k - 6.8.0-45.45.1 linux-headers-lowlatency - 6.8.0-45.45.1 linux-headers-lowlatency-64k - 6.8.0-45.45.1 linux-headers-lowlatency-64k-hwe-20.04 - 6.8.0-45.45.1 linux-headers-lowlatency-64k-hwe-20.04-edge - 6.8.0-45.45.1 linux-headers-lowlatency-64k-hwe-22.04 - 6.8.0-45.45.1 linux-headers-lowlatency-64k-hwe-22.04-edge - 6.8.0-45.45.1 linux-headers-lowlatency-hwe-20.04 - 6.8.0-45.45.1 linux-headers-lowlatency-hwe-20.04-edge - 6.8.0-45.45.1 linux-headers-lowlatency-hwe-22.04 - 6.8.0-45.45.1 linux-headers-lowlatency-hwe-22.04-edge - 6.8.0-45.45.1 linux-image-6.8.0-45-lowlatency - 6.8.0-45.45.1 linux-image-6.8.0-45-lowlatency-64k - 6.8.0-45.45.1 linux-image-lowlatency - 6.8.0-45.45.1 linux-image-lowlatency-64k - 6.8.0-45.45.1 linux-image-lowlatency-64k-hwe-20.04 - 6.8.0-45.45.1 linux-image-lowlatency-64k-hwe-20.04-edge - 6.8.0-45.45.1 linux-image-lowlatency-64k-hwe-22.04 - 6.8.0-45.45.1 linux-image-lowlatency-64k-hwe-22.04-edge - 6.8.0-45.45.1 linux-image-lowlatency-hwe-20.04 - 6.8.0-45.45.1 linux-image-lowlatency-hwe-20.04-edge - 6.8.0-45.45.1 linux-image-lowlatency-hwe-22.04 - 6.8.0-45.45.1 linux-image-lowlatency-hwe-22.04-edge - 6.8.0-45.45.1 linux-image-unsigned-6.8.0-45-lowlatency - 6.8.0-45.45.1 linux-image-unsigned-6.8.0-45-lowlatency-64k - 6.8.0-45.45.1 linux-lowlatency - 6.8.0-45.45.1 linux-lowlatency-64k - 6.8.0-45.45.1 linux-lowlatency-64k-hwe-20.04 - 6.8.0-45.45.1 linux-lowlatency-64k-hwe-20.04-edge - 6.8.0-45.45.1 linux-lowlatency-64k-hwe-22.04 - 6.8.0-45.45.1 linux-lowlatency-64k-hwe-22.04-edge - 6.8.0-45.45.1 linux-lowlatency-cloud-tools-6.8.0-45 - 6.8.0-45.45.1 linux-lowlatency-cloud-tools-common - 6.8.0-45.45.1 linux-lowlatency-headers-6.8.0-45 - 6.8.0-45.45.1 linux-lowlatency-hwe-20.04 - 6.8.0-45.45.1 linux-lowlatency-hwe-20.04-edge - 6.8.0-45.45.1 linux-lowlatency-hwe-22.04 - 6.8.0-45.45.1 linux-lowlatency-hwe-22.04-edge - 6.8.0-45.45.1 linux-lowlatency-lib-rust-6.8.0-45-lowlatency - 6.8.0-45.45.1 linux-lowlatency-tools-6.8.0-45 - 6.8.0-45.45.1 linux-lowlatency-tools-common - 6.8.0-45.45.1 linux-lowlatency-tools-host - 6.8.0-45.45.1 linux-modules-6.8.0-45-lowlatency - 6.8.0-45.45.1 linux-modules-6.8.0-45-lowlatency-64k - 6.8.0-45.45.1 linux-modules-iwlwifi-6.8.0-45-lowlatency - 6.8.0-45.45.1 linux-modules-iwlwifi-lowlatency - 6.8.0-45.45.1 linux-modules-iwlwifi-lowlatency-hwe-22.04 - 6.8.0-45.45.1 linux-modules-iwlwifi-lowlatency-hwe-22.04-edge - 6.8.0-45.45.1 linux-tools-6.8.0-45-lowlatency - 6.8.0-45.45.1 linux-tools-6.8.0-45-lowlatency-64k - 6.8.0-45.45.1 linux-tools-lowlatency - 6.8.0-45.45.1 linux-tools-lowlatency-64k - 6.8.0-45.45.1 linux-tools-lowlatency-64k-hwe-20.04 - 6.8.0-45.45.1 linux-tools-lowlatency-64k-hwe-20.04-edge - 6.8.0-45.45.1 linux-tools-lowlatency-64k-hwe-22.04 - 6.8.0-45.45.1 linux-tools-lowlatency-64k-hwe-22.04-edge - 6.8.0-45.45.1 linux-tools-lowlatency-hwe-20.04 - 6.8.0-45.45.1 linux-tools-lowlatency-hwe-20.04-edge - 6.8.0-45.45.1 linux-tools-lowlatency-hwe-22.04 - 6.8.0-45.45.1 linux-tools-lowlatency-hwe-22.04-edge - 6.8.0-45.45.1 No subscription required Medium CVE-2024-41009 CVE-2024-42154 CVE-2024-42159 CVE-2024-42160 CVE-2024-42224 CVE-2024-42228 USN-7020-2 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - GPU drivers; - Network drivers; - SCSI drivers; - F2FS file system; - BPF subsystem; - IPv4 networking; (CVE-2024-42160, CVE-2024-42159, CVE-2024-42154, CVE-2024-41009, CVE-2024-42228, CVE-2024-42224) Update Instructions: Run `sudo pro fix USN-7020-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-azure - 6.8.0-1015.17 linux-azure-cloud-tools-6.8.0-1015 - 6.8.0-1015.17 linux-azure-fde - 6.8.0-1015.17 linux-azure-headers-6.8.0-1015 - 6.8.0-1015.17 linux-azure-tools-6.8.0-1015 - 6.8.0-1015.17 linux-buildinfo-6.8.0-1015-azure - 6.8.0-1015.17 linux-cloud-tools-6.8.0-1015-azure - 6.8.0-1015.17 linux-cloud-tools-azure - 6.8.0-1015.17 linux-headers-6.8.0-1015-azure - 6.8.0-1015.17 linux-headers-azure - 6.8.0-1015.17 linux-image-6.8.0-1015-azure - 6.8.0-1015.17 linux-image-6.8.0-1015-azure-fde - 6.8.0-1015.17 linux-image-azure - 6.8.0-1015.17 linux-image-azure-fde - 6.8.0-1015.17 linux-image-unsigned-6.8.0-1015-azure - 6.8.0-1015.17 linux-modules-6.8.0-1015-azure - 6.8.0-1015.17 linux-modules-extra-6.8.0-1015-azure - 6.8.0-1015.17 linux-modules-extra-azure - 6.8.0-1015.17 linux-modules-involflt-6.8.0-1015-azure - 6.8.0-1015.17 linux-modules-involflt-azure - 6.8.0-1015.17 linux-modules-iwlwifi-6.8.0-1015-azure - 6.8.0-1015.17 linux-modules-iwlwifi-azure - 6.8.0-1015.17 linux-tools-6.8.0-1015-azure - 6.8.0-1015.17 linux-tools-azure - 6.8.0-1015.17 No subscription required Medium CVE-2024-41009 CVE-2024-42154 CVE-2024-42159 CVE-2024-42160 CVE-2024-42224 CVE-2024-42228 USN-7020-3 -- Linux kernel vulnerabilities Ubuntu 24.04 LTS Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - GPU drivers; - Network drivers; - SCSI drivers; - F2FS file system; - BPF subsystem; - IPv4 networking; (CVE-2024-42160, CVE-2024-42159, CVE-2024-42224, CVE-2024-41009, CVE-2024-42154, CVE-2024-42228) Update Instructions: Run `sudo pro fix USN-7020-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-6.8.0-1012-raspi - 6.8.0-1012.13 linux-headers-6.8.0-1012-raspi - 6.8.0-1012.13 linux-headers-raspi - 6.8.0-1012.13 linux-image-6.8.0-1012-raspi - 6.8.0-1012.13 linux-image-raspi - 6.8.0-1012.13 linux-modules-6.8.0-1012-raspi - 6.8.0-1012.13 linux-raspi - 6.8.0-1012.13 linux-raspi-headers-6.8.0-1012 - 6.8.0-1012.13 linux-raspi-tools-6.8.0-1012 - 6.8.0-1012.13 linux-tools-6.8.0-1012-raspi - 6.8.0-1012.13 linux-tools-raspi - 6.8.0-1012.13 No subscription required Medium CVE-2024-41009 CVE-2024-42154 CVE-2024-42159 CVE-2024-42160 CVE-2024-42224 CVE-2024-42228 USN-7027-1 -- Emacs vulnerabilities Ubuntu 24.04 LTS It was discovered that Emacs incorrectly handled input sanitization. An attacker could possibly use this issue to execute arbitrary commands. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-45939) Xi Lu discovered that Emacs incorrectly handled input sanitization. An attacker could possibly use this issue to execute arbitrary commands. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-48337) Xi Lu discovered that Emacs incorrectly handled input sanitization. An attacker could possibly use this issue to execute arbitrary commands. This issue only affected Ubuntu 22.04 LTS. (CVE-2022-48338) Xi Lu discovered that Emacs incorrectly handled input sanitization. An attacker could possibly use this issue to execute arbitrary commands. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-48339) It was discovered that Emacs incorrectly handled filename sanitization. An attacker could possibly use this issue to execute arbitrary commands. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-28617) It was discovered that Emacs incorrectly handled certain crafted files. An attacker could possibly use this issue to crash the program, resulting in a denial of service. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2024-30203, CVE-2024-30204, CVE-2024-30205) It was discovered that Emacs incorrectly handled certain crafted files. An attacker could possibly use this issue to execute arbitrary commands. (CVE-2024-39331) Update Instructions: Run `sudo pro fix USN-7027-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: emacs - 1:29.3+1-1ubuntu2+esm1 emacs-bin-common - 1:29.3+1-1ubuntu2+esm1 emacs-common - 1:29.3+1-1ubuntu2+esm1 emacs-el - 1:29.3+1-1ubuntu2+esm1 emacs-gtk - 1:29.3+1-1ubuntu2+esm1 emacs-lucid - 1:29.3+1-1ubuntu2+esm1 emacs-nox - 1:29.3+1-1ubuntu2+esm1 emacs-pgtk - 1:29.3+1-1ubuntu2+esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2022-45939 CVE-2022-48337 CVE-2022-48338 CVE-2022-48339 CVE-2023-28617 CVE-2024-30203 CVE-2024-30204 CVE-2024-30205 CVE-2024-39331 https://launchpad.net/bugs/2070418 USN-7031-1 -- Puma vulnerability Ubuntu 24.04 LTS It was discovered that Puma incorrectly handled parsing certain headers. A remote attacker could possibly use this issue to overwrite header values set by intermediate proxies by providing duplicate headers containing underscore characters. Update Instructions: Run `sudo pro fix USN-7031-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: puma - 6.4.2-4ubuntu4.3 No subscription required Medium CVE-2024-45614 USN-7032-1 -- Tomcat vulnerability Ubuntu 24.04 LTS It was discovered that Tomcat incorrectly handled HTTP trailer headers. A remote attacker could possibly use this issue to perform HTTP request smuggling. Update Instructions: Run `sudo pro fix USN-7032-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libtomcat9-java - 9.0.70-2ubuntu0.1 No subscription required Medium CVE-2023-46589 USN-7033-1 -- Intel Microcode vulnerabilities Ubuntu 24.04 LTS It was discovered that some Intel(R) Processors did not properly restrict access to the Running Average Power Limit (RAPL) interface. This may allow a local privileged attacker to obtain sensitive information. (CVE-2024-23984) It was discovered that some Intel(R) Processors did not properly implement finite state machines (FSMs) in hardware logic. This may allow a local privileged attacker to cause a denial of service (system crash). (CVE-2024-24968) Update Instructions: Run `sudo pro fix USN-7033-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: intel-microcode - 3.20240910.0ubuntu0.24.04.1 No subscription required Medium CVE-2024-23984 CVE-2024-24968 USN-7037-1 -- OpenJPEG vulnerability Ubuntu 24.04 LTS It was discovered that OpenJPEG could enter a large loop and continuously print warning messages when given specially crafted input. An attacker could potentially use this issue to cause a denial of service. Update Instructions: Run `sudo pro fix USN-7037-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libopenjp2-7 - 2.5.0-2ubuntu0.1 libopenjp2-7-dev - 2.5.0-2ubuntu0.1 libopenjp2-tools - 2.5.0-2ubuntu0.1 libopenjpip-dec-server - 2.5.0-2ubuntu0.1 libopenjpip-server - 2.5.0-2ubuntu0.1 libopenjpip-viewer - 2.5.0-2ubuntu0.1 libopenjpip7 - 2.5.0-2ubuntu0.1 openjpeg-doc - 2.5.0-2ubuntu0.1 No subscription required Medium CVE-2023-39327 USN-7038-1 -- APR vulnerability Ubuntu 24.04 LTS Thomas Stangner discovered a permission vulnerability in the Apache Portable Runtime (APR) library. A local attacker could possibly use this issue to read named shared memory segments, potentially exposing sensitive application data. Update Instructions: Run `sudo pro fix USN-7038-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libapr1-dev - 1.7.2-3.1ubuntu0.1 libapr1t64 - 1.7.2-3.1ubuntu0.1 No subscription required Medium CVE-2023-49582 USN-7041-1 -- CUPS vulnerability Ubuntu 24.04 LTS Simone Margaritelli discovered that CUPS incorrectly sanitized IPP data when creating PPD files. A remote attacker could possibly use this issue to manipulate PPD files and execute arbitrary code when a printer is used. Update Instructions: Run `sudo pro fix USN-7041-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: cups - 2.4.7-1.2ubuntu7.3 cups-bsd - 2.4.7-1.2ubuntu7.3 cups-client - 2.4.7-1.2ubuntu7.3 cups-common - 2.4.7-1.2ubuntu7.3 cups-core-drivers - 2.4.7-1.2ubuntu7.3 cups-daemon - 2.4.7-1.2ubuntu7.3 cups-ipp-utils - 2.4.7-1.2ubuntu7.3 cups-ppdc - 2.4.7-1.2ubuntu7.3 cups-server-common - 2.4.7-1.2ubuntu7.3 libcups2-dev - 2.4.7-1.2ubuntu7.3 libcups2t64 - 2.4.7-1.2ubuntu7.3 libcupsimage2-dev - 2.4.7-1.2ubuntu7.3 libcupsimage2t64 - 2.4.7-1.2ubuntu7.3 No subscription required Medium CVE-2024-47175 USN-7042-1 -- cups-browsed vulnerability Ubuntu 24.04 LTS Simone Margaritelli discovered that cups-browsed could be used to create arbitrary printers from outside the local network. In combination with issues in other printing components, a remote attacker could possibly use this issue to connect to a system, created manipulated PPD files, and execute arbitrary code when a printer is used. This update disables support for the legacy CUPS printer discovery protocol. Update Instructions: Run `sudo pro fix USN-7042-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: cups-browsed - 2.0.0-0ubuntu10.1 cups-browsed-tests - 2.0.0-0ubuntu10.1 No subscription required Medium CVE-2024-47176 USN-7044-1 -- libcupsfilters vulnerability Ubuntu 24.04 LTS Simone Margaritelli discovered that libcupsfilters incorrectly sanitized IPP data when creating PPD files. A remote attacker could possibly use this issue to manipulate PPD files and execute arbitrary code when a printer is used. Update Instructions: Run `sudo pro fix USN-7044-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libcupsfilters-dev - 2.0.0-0ubuntu7.1 libcupsfilters-tests - 2.0.0-0ubuntu7.1 libcupsfilters2-common - 2.0.0-0ubuntu7.1 libcupsfilters2t64 - 2.0.0-0ubuntu7.1 No subscription required Medium CVE-2024-47076 USN-7045-1 -- libppd vulnerability Ubuntu 24.04 LTS Simone Margaritelli discovered that libppd incorrectly sanitized IPP data when creating PPD files. A remote attacker could possibly use this issue to manipulate PPD files and execute arbitrary code when a printer is used. Update Instructions: Run `sudo pro fix USN-7045-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libppd-dev - 2:2.0.0-0ubuntu4.1 libppd-tests - 2:2.0.0-0ubuntu4.1 libppd-utils - 2:2.0.0-0ubuntu4.1 libppd2 - 2:2.0.0-0ubuntu4.1 libppd2-common - 2:2.0.0-0ubuntu4.1 ppdc - 2:2.0.0-0ubuntu4.1 No subscription required Medium CVE-2024-47175 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 . manifest 1 3.0.13-0ubuntu3.1 41.0.7-4ubuntu0.1 2.3.12-1ubuntu0.24.04.1 8.5.0-2ubuntu10.1 2.4.58-1ubuntu8.1 3.8.3-1.1ubuntu3.1 10.0.0-2ubuntu8.1 2.0.13-4ubuntu0.1 2.39-0ubuntu8.1 10.2.0-1ubuntu1 20240213.00-0ubuntu3.1 20240320.00-0ubuntu1~24.04.1 1.59.0-1ubuntu0.1 590-2ubuntu2.1 3.5.1+dfsg1-0ubuntu1 2.0.12-1ubuntu1 10.0.0-2ubuntu8.2 2.80.0-6ubuntu3.1 1:2.23-1ubuntu0.1 0.4.4-1ubuntu0.1 8.0.105-0ubuntu1~24.04.1 8.0.105-8.0.5-0ubuntu1~24.04.1 8.0.5-0ubuntu1~24.04.1 3.6-2ubuntu0.1 1.7.17-1ubuntu0.1~esm2 46.2-1~ubuntu24.04.2 3.1.2-1ubuntu1.1 2.44.2-0ubuntu0.24.04.1 4:0.9+LibO24.2.3-0ubuntu0.24.04.2 4:1.2.0+LibO24.2.3-0ubuntu0.24.04.2 4:102.12+LibO24.2.3-0ubuntu0.24.04.2 4:24.2.3-0ubuntu0.24.04.2 1:2.13.0-3ubuntu2 1.19.2-1ubuntu3.1 1:2.43.0-1ubuntu7.1 8.4.4-1.1ubuntu6.1 4.0.1-7.1ubuntu5.1 3.20240514.0ubuntu0.24.04.1 1.24.2-1ubuntu0.1 3.0.1-3ubuntu0.1 1.0.2-2ubuntu1.1 16.3-0ubuntu0.24.04.1 7:6.1.1-3ubuntu5+esm1 2.39-0ubuntu8.2 3.7.2-2ubuntu0.1 2.42.10+dfsg-3ubuntu3.1 8u412-ga-1~24.04.2 1.14.0-1ubuntu2.1 3.8.2-2ubuntu0.1 6.8.0-1005.5 6.8.0-1006.6 6.8.0-35.35 6.8.0-35.35+1 6.8.0-35.35.1 6.8.0-1008.9 6.8.0-1009.9 6.8.0-1006.6 6.8.0-1004.7 6.8.0-1008.8 8.0.37-0ubuntu0.24.04.1 4.5.1+git230720-4ubuntu2.1 1.8-1fakesync1ubuntu0.24.04.1 7.2.5.1+dfsg1-0.8ubuntu0.1~esm1 0.76.0-1ubuntu0.1 10.02.1~dfsg1-0ubuntu7.1 2.9.4-1.1ubuntu6.1 2.2.7-1ubuntu0.1 3.2.3-1ubuntu0.24.04.1 1:10.11.8-0ubuntu0.24.04.1 8.3.6-0ubuntu0.24.04.1 4:5.27.11-0ubuntu4.1 2.4.7-1.2ubuntu7.1 2.4.7-1.2ubuntu7.2 1.0-2ubuntu1.1 1.0-2ubuntu1.2 1.21.4-1ubuntu4.1 2.1.0-4.1ubuntu1.2 1:9.6p1-3ubuntu13.3 2.6.9-1ubuntu4.1 6.8.0-1006.6 6.8.0-1007.7 6.8.0-1008.8 6.8.0-36.36 6.8.0-36.36.1 6.8.0-1006.13 6.8.0-1009.10 6.8.0-1007.7 6.8.0-1010.10 6.8.0-1005.8 6.8.0-1009.9 4:0.9+LibO24.2.4-0ubuntu0.24.04.2 4:1.2.0+LibO24.2.4-0ubuntu0.24.04.2 4:102.12+LibO24.2.4-0ubuntu0.24.04.2 4:24.2.4-0ubuntu0.24.04.2 6.8.0-1006.6 7.2.5.1+dfsg1-0.8ubuntu0.1~esm2 2:24.0.0-0ubuntu1.2 2:28.0.1-0ubuntu1.2 3:29.0.1-0ubuntu1.3 2.4.58-1ubuntu8.2 2.4.58-1ubuntu8.3 1.21.9-1ubuntu0.1 1.22.2-2ubuntu0.1 1:9.6p1-3ubuntu13.4 3:4.2.11-1ubuntu1.1 8.0.107-0ubuntu1~24.04.1 8.0.107-8.0.7-0ubuntu1~24.04.1 8.0.7-0ubuntu1~24.04.1 6.8.0-1007.14 6.8.0-1007.7 6.8.0-1008.8 6.8.0-1010.10 6.8.0-1010.11 6.8.0-38.38 6.8.0-38.38.1 6.8.0-1006.9 6.8.0-1009.9 6.8.0-1011.12 10.02.1~dfsg1-0ubuntu7.3 2.24.33-4ubuntu1.1 3.24.41-4ubuntu1.1 2.4.58-1ubuntu8.4 3.11.0-1ubuntu0.24.04.1 1.0.0-6ubuntu0.1 6.6-1ubuntu5.1 1:9.18.28-0ubuntu0.24.04.1 3:29.0.1-0ubuntu1.4 0.1.2+24.04 24.02.0-1ubuntu9.1 6.8.0-1008.8 6.8.0-1007.10 6.8.0-1008.8 6.8.0-1009.9 6.8.0-1010.10 6.8.0-1011.12 6.8.0-1012.13 6.8.0-39.39 6.8.0-39.39.1 8u422-b05-1~24.04 11.0.24+8-1ubuntu3~24.04.1 17.0.12+7-1ubuntu2~24.04 21.0.4+7-1ubuntu2~24.04 8.0.39-0ubuntu0.24.04.1 3.0.13-0ubuntu3.2 4.97-4ubuntu4.1 2.63+24.04ubuntu0.1 3.12.3-1ubuntu0.1 1.0.2-4ubuntu0.24.04.1 8.5.0-2ubuntu10.2 2:2.10-21ubuntu0.1 3:4.2.11-1ubuntu1.2 1.20.1-6ubuntu2.1 6.8.0-1008.11 6.8.0-1010.10 6.8.0-1011.11 6.8.0-1012.13 6.8.0-1013.14 6.8.0-40.40 6.8.0-1009.10 6.8.0-40.40.1 6.8.0-1010.10 6.8.0-1011.11.1 6.8.0-1012.14 6.8.0-1010.10 8.0.108-0ubuntu1~24.04.1 8.0.108-8.0.8-0ubuntu1~24.04.1 8.0.8-0ubuntu1~24.04.1 1:1.36.1-6ubuntu3.1 4:0.9+LibO24.2.5-0ubuntu0.24.04.2 4:1.2.0+LibO24.2.5-0ubuntu0.24.04.2 4:102.12+LibO24.2.5-0ubuntu0.24.04.2 4:24.2.5-0ubuntu0.24.04.2 46.0-0ubuntu6~24.04.3 1:0.4.38-1ubuntu0.1 3.20240813.0ubuntu0.24.04.2 16.4-0ubuntu0.24.04.1 1.2.26+ds1-1ubuntu0.1 6.8.0-1009.12 6.8.0-1010.11 6.8.0-1011.11 6.8.0-1012.12 6.8.0-1012.12.1 6.8.0-1013.14 6.8.0-1013.15 6.8.0-1014.15 6.8.0-41.41 6.8.0-41.41.1 1:8.2.2+ds-0ubuntu1.2 1:2.3.21+dfsg1-2ubuntu6 7:6.1.1-3ubuntu5+esm2 1:1.8.7-1ubuntu0.1.24.04.1 3.0.13-0ubuntu3.4 3:4.2.11-1ubuntu1.3 24.3.0-1ubuntu0.1 1:24.1.1-0ubuntu1.2 0.20180824+1.9.0-2ubuntu0.1~esm2 1.0.0+git20190521.78d0385+1.9.0-2ubuntu0.1~esm2 1.9.0-2ubuntu0.1~esm2 3.9.1-1ubuntu0.1 2:9.1.0016-1ubuntu7.2 2.44.3-0ubuntu0.24.04.1 4.5.1+git230720-4ubuntu2.2 1.19.2-1ubuntu3.2 6.8.0-1010.13 6.8.0-1012.12 6.8.0-1014.16 6.8.0-1015.16 6.8.0-44.44 6.8.0-44.44.1 6.8.0-1011.12 2.6.1-2ubuntu0.1 1.2-4.1ubuntu2.24.0.4.1+esm1 68.1.2-2ubuntu1.1 6.8.0-1014.16 6.8.0-1013.14 6.8.0-1013.14.1 3.6.7-9.1ubuntu0.1~esm1 1.0.7+dfsg-0ubuntu0.24.04.1 8.5.0-2ubuntu10.4 1.24.0-2ubuntu7.1 3.12.3-1ubuntu0.2 8.4.4-1.1ubuntu6.2 6.8.0-1011.14 6.8.0-1013.13 6.8.0-1014.15 6.8.0-1014.15.1 6.8.0-1015.17 6.8.0-1016.17 6.8.0-45.45 6.8.0-45.45.1 6.8.0-1015.17 6.8.0-1012.13 1:29.3+1-1ubuntu2+esm1 6.4.2-4ubuntu4.3 9.0.70-2ubuntu0.1 3.20240910.0ubuntu0.24.04.1 2.5.0-2ubuntu0.1 1.7.2-3.1ubuntu0.1 2.4.7-1.2ubuntu7.3 2.0.0-0ubuntu10.1 2.0.0-0ubuntu7.1 2:2.0.0-0ubuntu4.1 ^libssl3t64(?::\w+|)\s+(.*)$ ^libssl-dev(?::\w+|)\s+(.*)$ ^openssl(?::\w+|)\s+(.*)$ ^libssl-doc(?::\w+|)\s+(.*)$ ^python3-cryptography(?::\w+|)\s+(.*)$ ^python-cryptography-doc(?::\w+|)\s+(.*)$ ^libodbc2(?::\w+|)\s+(.*)$ ^unixodbc-dev(?::\w+|)\s+(.*)$ ^unixodbc-common(?::\w+|)\s+(.*)$ ^unixodbc(?::\w+|)\s+(.*)$ ^odbcinst(?::\w+|)\s+(.*)$ ^libodbcinst2(?::\w+|)\s+(.*)$ ^libodbccr2(?::\w+|)\s+(.*)$ ^libcurl4-gnutls-dev(?::\w+|)\s+(.*)$ ^libcurl4-openssl-dev(?::\w+|)\s+(.*)$ ^libcurl3t64-gnutls(?::\w+|)\s+(.*)$ ^libcurl4-doc(?::\w+|)\s+(.*)$ ^curl(?::\w+|)\s+(.*)$ ^libcurl4t64(?::\w+|)\s+(.*)$ ^apache2-data(?::\w+|)\s+(.*)$ ^libapache2-mod-md(?::\w+|)\s+(.*)$ ^apache2-utils(?::\w+|)\s+(.*)$ ^apache2-dev(?::\w+|)\s+(.*)$ ^apache2-suexec-pristine(?::\w+|)\s+(.*)$ ^apache2-suexec-custom(?::\w+|)\s+(.*)$ ^apache2(?::\w+|)\s+(.*)$ ^apache2-doc(?::\w+|)\s+(.*)$ ^libapache2-mod-proxy-uwsgi(?::\w+|)\s+(.*)$ ^apache2-ssl-dev(?::\w+|)\s+(.*)$ ^apache2-bin(?::\w+|)\s+(.*)$ ^libgnutls-openssl27t64(?::\w+|)\s+(.*)$ ^libgnutls-dane0t64(?::\w+|)\s+(.*)$ ^libgnutls28-dev(?::\w+|)\s+(.*)$ ^gnutls-doc(?::\w+|)\s+(.*)$ ^libgnutls30t64(?::\w+|)\s+(.*)$ ^gnutls-bin(?::\w+|)\s+(.*)$ ^libvirt-clients-qemu(?::\w+|)\s+(.*)$ ^libvirt-dev(?::\w+|)\s+(.*)$ ^libvirt-wireshark(?::\w+|)\s+(.*)$ ^libvirt-daemon-driver-qemu(?::\w+|)\s+(.*)$ ^libvirt-login-shell(?::\w+|)\s+(.*)$ ^libvirt-daemon-system-sysv(?::\w+|)\s+(.*)$ ^libvirt-daemon-driver-lxc(?::\w+|)\s+(.*)$ ^libnss-libvirt(?::\w+|)\s+(.*)$ ^libvirt-daemon(?::\w+|)\s+(.*)$ ^libvirt-daemon-config-nwfilter(?::\w+|)\s+(.*)$ ^libvirt-daemon-driver-storage-iscsi-direct(?::\w+|)\s+(.*)$ ^libvirt-daemon-config-network(?::\w+|)\s+(.*)$ ^libvirt-l10n(?::\w+|)\s+(.*)$ ^libvirt-clients(?::\w+|)\s+(.*)$ ^libvirt-daemon-driver-storage-zfs(?::\w+|)\s+(.*)$ ^libvirt-daemon-driver-xen(?::\w+|)\s+(.*)$ ^libvirt-daemon-driver-vbox(?::\w+|)\s+(.*)$ ^libvirt-daemon-driver-storage-gluster(?::\w+|)\s+(.*)$ ^libvirt-daemon-system(?::\w+|)\s+(.*)$ ^libvirt0(?::\w+|)\s+(.*)$ ^libvirt-daemon-system-systemd(?::\w+|)\s+(.*)$ ^libvirt-sanlock(?::\w+|)\s+(.*)$ ^libvirt-daemon-driver-storage-rbd(?::\w+|)\s+(.*)$ ^libvirt-doc(?::\w+|)\s+(.*)$ ^klibc-utils(?::\w+|)\s+(.*)$ ^libklibc(?::\w+|)\s+(.*)$ ^libklibc-dev(?::\w+|)\s+(.*)$ ^libc-bin(?::\w+|)\s+(.*)$ ^glibc-doc(?::\w+|)\s+(.*)$ ^locales-all(?::\w+|)\s+(.*)$ ^libc6-i386(?::\w+|)\s+(.*)$ ^libc6-s390(?::\w+|)\s+(.*)$ ^libc6-dev-i386(?::\w+|)\s+(.*)$ ^libc6-dev-s390(?::\w+|)\s+(.*)$ ^libc6-dev(?::\w+|)\s+(.*)$ ^libc6-amd64(?::\w+|)\s+(.*)$ ^libc6-x32(?::\w+|)\s+(.*)$ ^libc6-dev-amd64(?::\w+|)\s+(.*)$ ^libc-dev-bin(?::\w+|)\s+(.*)$ ^libc6(?::\w+|)\s+(.*)$ ^nscd(?::\w+|)\s+(.*)$ ^libc-devtools(?::\w+|)\s+(.*)$ ^glibc-source(?::\w+|)\s+(.*)$ ^libc6-dev-x32(?::\w+|)\s+(.*)$ ^locales(?::\w+|)\s+(.*)$ ^python3-pil.imagetk(?::\w+|)\s+(.*)$ ^python-pil-doc(?::\w+|)\s+(.*)$ ^python3-pil(?::\w+|)\s+(.*)$ ^google-guest-agent(?::\w+|)\s+(.*)$ ^google-osconfig-agent(?::\w+|)\s+(.*)$ ^libnghttp2-14(?::\w+|)\s+(.*)$ ^libnghttp2-doc(?::\w+|)\s+(.*)$ ^libnghttp2-dev(?::\w+|)\s+(.*)$ ^nghttp2-proxy(?::\w+|)\s+(.*)$ ^nghttp2(?::\w+|)\s+(.*)$ ^nghttp2-client(?::\w+|)\s+(.*)$ ^nghttp2-server(?::\w+|)\s+(.*)$ ^less(?::\w+|)\s+(.*)$ ^libwinpr3-dev(?::\w+|)\s+(.*)$ ^libfreerdp-server3-3(?::\w+|)\s+(.*)$ ^winpr3-utils(?::\w+|)\s+(.*)$ ^libfreerdp-shadow3-3(?::\w+|)\s+(.*)$ ^freerdp3-dev(?::\w+|)\s+(.*)$ ^freerdp3-shadow-x11(?::\w+|)\s+(.*)$ ^libfreerdp3-3(?::\w+|)\s+(.*)$ ^libfreerdp-client3-3(?::\w+|)\s+(.*)$ ^freerdp3-wayland(?::\w+|)\s+(.*)$ ^libwinpr-tools3-3(?::\w+|)\s+(.*)$ ^libfreerdp-shadow-subsystem3-3(?::\w+|)\s+(.*)$ ^freerdp3-x11(?::\w+|)\s+(.*)$ ^libwinpr3-3(?::\w+|)\s+(.*)$ ^anope(?::\w+|)\s+(.*)$ ^libvirt-clients-qemu(?::\w+|)\s+(.*)$ ^libvirt-dev(?::\w+|)\s+(.*)$ ^libvirt-wireshark(?::\w+|)\s+(.*)$ ^libvirt-daemon-driver-qemu(?::\w+|)\s+(.*)$ ^libvirt-login-shell(?::\w+|)\s+(.*)$ ^libvirt-daemon-system-sysv(?::\w+|)\s+(.*)$ ^libvirt-daemon-driver-lxc(?::\w+|)\s+(.*)$ ^libnss-libvirt(?::\w+|)\s+(.*)$ ^libvirt-daemon(?::\w+|)\s+(.*)$ ^libvirt-daemon-config-nwfilter(?::\w+|)\s+(.*)$ ^libvirt-daemon-driver-storage-iscsi-direct(?::\w+|)\s+(.*)$ ^libvirt-daemon-config-network(?::\w+|)\s+(.*)$ ^libvirt-l10n(?::\w+|)\s+(.*)$ ^libvirt-clients(?::\w+|)\s+(.*)$ ^libvirt-daemon-driver-storage-zfs(?::\w+|)\s+(.*)$ ^libvirt-daemon-driver-xen(?::\w+|)\s+(.*)$ ^libvirt-daemon-driver-vbox(?::\w+|)\s+(.*)$ ^libvirt-daemon-driver-storage-gluster(?::\w+|)\s+(.*)$ ^libvirt-daemon-system(?::\w+|)\s+(.*)$ ^libvirt0(?::\w+|)\s+(.*)$ ^libvirt-daemon-system-systemd(?::\w+|)\s+(.*)$ ^libvirt-sanlock(?::\w+|)\s+(.*)$ ^libvirt-daemon-driver-storage-rbd(?::\w+|)\s+(.*)$ ^libvirt-doc(?::\w+|)\s+(.*)$ ^gir1.2-glib-2.0(?::\w+|)\s+(.*)$ ^libgirepository-2.0-dev(?::\w+|)\s+(.*)$ ^gir1.2-girepository-3.0-dev(?::\w+|)\s+(.*)$ ^libglib2.0-0t64(?::\w+|)\s+(.*)$ ^libglib2.0-tests(?::\w+|)\s+(.*)$ ^gir1.2-glib-2.0-dev(?::\w+|)\s+(.*)$ ^libgirepository-2.0-0(?::\w+|)\s+(.*)$ ^gir1.2-girepository-3.0(?::\w+|)\s+(.*)$ ^libglib2.0-data(?::\w+|)\s+(.*)$ ^libglib2.0-doc(?::\w+|)\s+(.*)$ ^libglib2.0-bin(?::\w+|)\s+(.*)$ ^libglib2.0-dev(?::\w+|)\s+(.*)$ ^libglib2.0-dev-bin(?::\w+|)\s+(.*)$ ^fossil(?::\w+|)\s+(.*)$ ^python-sqlparse-doc(?::\w+|)\s+(.*)$ ^python3-sqlparse(?::\w+|)\s+(.*)$ ^sqlformat(?::\w+|)\s+(.*)$ ^dotnet-sdk-8.0(?::\w+|)\s+(.*)$ ^netstandard-targeting-pack-2.1-8.0(?::\w+|)\s+(.*)$ ^dotnet-sdk-8.0-source-built-artifacts(?::\w+|)\s+(.*)$ ^dotnet-sdk-dbg-8.0(?::\w+|)\s+(.*)$ ^dotnet-templates-8.0(?::\w+|)\s+(.*)$ ^dotnet8(?::\w+|)\s+(.*)$ ^aspnetcore-runtime-8.0(?::\w+|)\s+(.*)$ ^dotnet-apphost-pack-8.0(?::\w+|)\s+(.*)$ ^dotnet-hostfxr-8.0(?::\w+|)\s+(.*)$ ^aspnetcore-runtime-dbg-8.0(?::\w+|)\s+(.*)$ ^dotnet-runtime-dbg-8.0(?::\w+|)\s+(.*)$ ^dotnet-runtime-8.0(?::\w+|)\s+(.*)$ ^dotnet-host-8.0(?::\w+|)\s+(.*)$ ^aspnetcore-targeting-pack-8.0(?::\w+|)\s+(.*)$ ^dotnet-targeting-pack-8.0(?::\w+|)\s+(.*)$ ^python3-idna(?::\w+|)\s+(.*)$ ^libcjson-dev(?::\w+|)\s+(.*)$ ^libcjson1(?::\w+|)\s+(.*)$ ^gnome-remote-desktop(?::\w+|)\s+(.*)$ ^python-jinja2-doc(?::\w+|)\s+(.*)$ ^python3-jinja2(?::\w+|)\s+(.*)$ ^gir1.2-javascriptcoregtk-4.1(?::\w+|)\s+(.*)$ ^libjavascriptcoregtk-6.0-1(?::\w+|)\s+(.*)$ ^libjavascriptcoregtk-bin(?::\w+|)\s+(.*)$ ^libwebkitgtk-doc(?::\w+|)\s+(.*)$ ^gir1.2-webkit2-4.1(?::\w+|)\s+(.*)$ ^libwebkitgtk-6.0-dev(?::\w+|)\s+(.*)$ ^libjavascriptcoregtk-4.1-0(?::\w+|)\s+(.*)$ ^libwebkit2gtk-4.1-0(?::\w+|)\s+(.*)$ ^libwebkit2gtk-4.1-dev(?::\w+|)\s+(.*)$ ^libwebkit2gtk-4.0-doc(?::\w+|)\s+(.*)$ ^libjavascriptcoregtk-4.1-dev(?::\w+|)\s+(.*)$ ^libjavascriptcoregtk-6.0-dev(?::\w+|)\s+(.*)$ ^gir1.2-javascriptcoregtk-6.0(?::\w+|)\s+(.*)$ ^webkit2gtk-driver(?::\w+|)\s+(.*)$ ^libjavascriptcoregtk-4.0-bin(?::\w+|)\s+(.*)$ ^libwebkitgtk-6.0-4(?::\w+|)\s+(.*)$ ^gir1.2-webkit-6.0(?::\w+|)\s+(.*)$ ^libreoffice-nlpsolver(?::\w+|)\s+(.*)$ ^libreoffice-wiki-publisher(?::\w+|)\s+(.*)$ ^fonts-opensymbol(?::\w+|)\s+(.*)$ ^libreoffice-evolution(?::\w+|)\s+(.*)$ ^libreoffice-help-en-gb(?::\w+|)\s+(.*)$ ^libreoffice-librelogo(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ml(?::\w+|)\s+(.*)$ ^libreoffice-help-zh-cn(?::\w+|)\s+(.*)$ ^libreoffice-subsequentcheckbase(?::\w+|)\s+(.*)$ ^libreoffice-l10n-mk(?::\w+|)\s+(.*)$ ^libreoffice-help-id(?::\w+|)\s+(.*)$ ^libreoffice-l10n-mr(?::\w+|)\s+(.*)$ ^libreoffice-style-tango(?::\w+|)\s+(.*)$ ^libreoffice-help-pt-br(?::\w+|)\s+(.*)$ ^libreofficekit-data(?::\w+|)\s+(.*)$ ^libreoffice-core(?::\w+|)\s+(.*)$ ^libreoffice-help-it(?::\w+|)\s+(.*)$ ^libreoffice-l10n-uk(?::\w+|)\s+(.*)$ ^libreoffice-l10n-fr(?::\w+|)\s+(.*)$ ^libreoffice-gnome(?::\w+|)\s+(.*)$ ^libreoffice-l10n-fi(?::\w+|)\s+(.*)$ ^libreoffice-help-nl(?::\w+|)\s+(.*)$ ^libreoffice-uiconfig-math(?::\w+|)\s+(.*)$ ^libreoffice-l10n-uz(?::\w+|)\s+(.*)$ ^libreoffice(?::\w+|)\s+(.*)$ ^libreoffice-sdbc-mysql(?::\w+|)\s+(.*)$ ^libreoffice-l10n-nb(?::\w+|)\s+(.*)$ ^libreoffice-l10n-mn(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ne(?::\w+|)\s+(.*)$ ^libreoffice-l10n-nl(?::\w+|)\s+(.*)$ ^libreoffice-uiconfig-writer(?::\w+|)\s+(.*)$ ^libreoffice-l10n-nn(?::\w+|)\s+(.*)$ ^libreoffice-help-fi(?::\w+|)\s+(.*)$ ^libreoffice-l10n-dz(?::\w+|)\s+(.*)$ ^libreoffice-l10n-nr(?::\w+|)\s+(.*)$ ^libreoffice-help-fr(?::\w+|)\s+(.*)$ ^libreoffice-report-builder-bin(?::\w+|)\s+(.*)$ ^libofficebean-java(?::\w+|)\s+(.*)$ ^libreoffice-qt6(?::\w+|)\s+(.*)$ ^libreoffice-l10n-vi(?::\w+|)\s+(.*)$ ^libreoffice-l10n-nso(?::\w+|)\s+(.*)$ ^libreoffice-qt5(?::\w+|)\s+(.*)$ ^libreoffice-nogui(?::\w+|)\s+(.*)$ ^libreoffice-math-nogui(?::\w+|)\s+(.*)$ ^libreoffice-style-karasa-jaga(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ve(?::\w+|)\s+(.*)$ ^libreoffice-l10n-gu(?::\w+|)\s+(.*)$ ^libreoffice-help-om(?::\w+|)\s+(.*)$ ^libreoffice-l10n-gl(?::\w+|)\s+(.*)$ ^python3-access2base(?::\w+|)\s+(.*)$ ^libreoffice-help-en-us(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ga(?::\w+|)\s+(.*)$ ^libuno-cppu3t64(?::\w+|)\s+(.*)$ ^liblibreofficekitgtk(?::\w+|)\s+(.*)$ ^libreoffice-l10n-gd(?::\w+|)\s+(.*)$ ^libreoffice-help-km(?::\w+|)\s+(.*)$ ^libreoffice-l10n-kn(?::\w+|)\s+(.*)$ ^libreoffice-help-ko(?::\w+|)\s+(.*)$ ^libreoffice-l10n-st(?::\w+|)\s+(.*)$ ^libreoffice-dev-common(?::\w+|)\s+(.*)$ ^libreoffice-l10n-sr(?::\w+|)\s+(.*)$ ^libreoffice-help-cs(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ts(?::\w+|)\s+(.*)$ ^libreoffice-l10n-sv(?::\w+|)\s+(.*)$ ^libreoffice-script-provider-bsh(?::\w+|)\s+(.*)$ ^gir1.2-lokdocview-0.1(?::\w+|)\s+(.*)$ ^ure-java(?::\w+|)\s+(.*)$ ^libreoffice-report-builder-bin-nogui(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ka(?::\w+|)\s+(.*)$ ^libreoffice-uiconfig-common(?::\w+|)\s+(.*)$ ^libridl-java(?::\w+|)\s+(.*)$ ^libreoffice-help-ca(?::\w+|)\s+(.*)$ ^libreoffice-l10n-zh-tw(?::\w+|)\s+(.*)$ ^libreoffice-l10n-sl(?::\w+|)\s+(.*)$ ^libreoffice-l10n-sk(?::\w+|)\s+(.*)$ ^libreoffice-style-breeze(?::\w+|)\s+(.*)$ ^libreoffice-l10n-si(?::\w+|)\s+(.*)$ ^libreoffice-l10n-da(?::\w+|)\s+(.*)$ ^libreofficekit-dev(?::\w+|)\s+(.*)$ ^libreoffice-l10n-de(?::\w+|)\s+(.*)$ ^libreoffice-common(?::\w+|)\s+(.*)$ ^libreoffice-help-pl(?::\w+|)\s+(.*)$ ^libreoffice-l10n-pa-in(?::\w+|)\s+(.*)$ ^libuno-purpenvhelpergcc3-3t64(?::\w+|)\s+(.*)$ ^libreoffice-uiconfig-report-builder(?::\w+|)\s+(.*)$ ^libreoffice-help-pt(?::\w+|)\s+(.*)$ ^libreoffice-base-nogui(?::\w+|)\s+(.*)$ ^libreoffice-gtk3(?::\w+|)\s+(.*)$ ^libreoffice-math(?::\w+|)\s+(.*)$ ^libreoffice-help-vi(?::\w+|)\s+(.*)$ ^libreoffice-gtk4(?::\w+|)\s+(.*)$ ^libreoffice-l10n-tr(?::\w+|)\s+(.*)$ ^libreoffice-help-hi(?::\w+|)\s+(.*)$ ^libreoffice-l10n-gug(?::\w+|)\s+(.*)$ ^libreoffice-sdbc-hsqldb(?::\w+|)\s+(.*)$ ^libreoffice-draw-nogui(?::\w+|)\s+(.*)$ ^libreoffice-calc(?::\w+|)\s+(.*)$ ^libreoffice-base-drivers(?::\w+|)\s+(.*)$ ^libreoffice-style-colibre(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ta(?::\w+|)\s+(.*)$ ^libreoffice-sdbc-firebird(?::\w+|)\s+(.*)$ ^libreoffice-l10n-tg(?::\w+|)\s+(.*)$ ^libreoffice-l10n-te(?::\w+|)\s+(.*)$ ^libreoffice-l10n-th(?::\w+|)\s+(.*)$ ^libreoffice-l10n-id(?::\w+|)\s+(.*)$ ^libreoffice-l10n-lv(?::\w+|)\s+(.*)$ ^libreoffice-help-hu(?::\w+|)\s+(.*)$ ^libreoffice-l10n-lt(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ss(?::\w+|)\s+(.*)$ ^libunoloader-java(?::\w+|)\s+(.*)$ ^libreoffice-uiconfig-impress(?::\w+|)\s+(.*)$ ^libreoffice-l10n-eu(?::\w+|)\s+(.*)$ ^libreoffice-l10n-et(?::\w+|)\s+(.*)$ ^libreoffice-script-provider-js(?::\w+|)\s+(.*)$ ^libreoffice-l10n-es(?::\w+|)\s+(.*)$ ^libreoffice-l10n-el(?::\w+|)\s+(.*)$ ^libreoffice-l10n-eo(?::\w+|)\s+(.*)$ ^libreoffice-style-sifr(?::\w+|)\s+(.*)$ ^libreoffice-l10n-zh-cn(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ug(?::\w+|)\s+(.*)$ ^libreoffice-smoketest-data(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ko(?::\w+|)\s+(.*)$ ^libreoffice-l10n-zu(?::\w+|)\s+(.*)$ ^libreoffice-impress(?::\w+|)\s+(.*)$ ^libreoffice-java-common(?::\w+|)\s+(.*)$ ^libreoffice-help-eu(?::\w+|)\s+(.*)$ ^libreoffice-help-et(?::\w+|)\s+(.*)$ ^libreoffice-help-es(?::\w+|)\s+(.*)$ ^libreoffice-l10n-km(?::\w+|)\s+(.*)$ ^libreoffice-uiconfig-draw(?::\w+|)\s+(.*)$ ^libreoffice-help-el(?::\w+|)\s+(.*)$ ^libreoffice-uiconfig-calc(?::\w+|)\s+(.*)$ ^libreoffice-l10n-kk(?::\w+|)\s+(.*)$ ^libreoffice-dev-gui(?::\w+|)\s+(.*)$ ^libreoffice-l10n-be(?::\w+|)\s+(.*)$ ^libreoffice-l10n-szl(?::\w+|)\s+(.*)$ ^libreoffice-l10n-bg(?::\w+|)\s+(.*)$ ^libreoffice-l10n-tn(?::\w+|)\s+(.*)$ ^libreoffice-l10n-bn(?::\w+|)\s+(.*)$ ^libreoffice-plasma(?::\w+|)\s+(.*)$ ^libreoffice-help-ja(?::\w+|)\s+(.*)$ ^libreoffice-l10n-br(?::\w+|)\s+(.*)$ ^libreoffice-l10n-bs(?::\w+|)\s+(.*)$ ^liblibreoffice-java(?::\w+|)\s+(.*)$ ^libunoil-java(?::\w+|)\s+(.*)$ ^libreoffice-style-yaru(?::\w+|)\s+(.*)$ ^libreoffice-base-core(?::\w+|)\s+(.*)$ ^libreoffice-help-ru(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ru(?::\w+|)\s+(.*)$ ^libreoffice-l10n-rw(?::\w+|)\s+(.*)$ ^libreoffice-l10n-is(?::\w+|)\s+(.*)$ ^libreoffice-style-elementary(?::\w+|)\s+(.*)$ ^python3-uno(?::\w+|)\s+(.*)$ ^libreoffice-l10n-fa(?::\w+|)\s+(.*)$ ^libreoffice-l10n-am(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ro(?::\w+|)\s+(.*)$ ^libreoffice-l10n-en-za(?::\w+|)\s+(.*)$ ^libreoffice-style-sukapura(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ca(?::\w+|)\s+(.*)$ ^libreoffice-help-sl(?::\w+|)\s+(.*)$ ^libreoffice-calc-nogui(?::\w+|)\s+(.*)$ ^libreoffice-help-sk(?::\w+|)\s+(.*)$ ^libreoffice-help-sv(?::\w+|)\s+(.*)$ ^libreoffice-l10n-cs(?::\w+|)\s+(.*)$ ^python3-scriptforge(?::\w+|)\s+(.*)$ ^libreoffice-dev-doc(?::\w+|)\s+(.*)$ ^libreoffice-help-common(?::\w+|)\s+(.*)$ ^libreoffice-l10n-za(?::\w+|)\s+(.*)$ ^libreoffice-l10n-cy(?::\w+|)\s+(.*)$ ^libreoffice-l10n-oc(?::\w+|)\s+(.*)$ ^libjurt-java(?::\w+|)\s+(.*)$ ^libreoffice-base(?::\w+|)\s+(.*)$ ^libreoffice-help-gl(?::\w+|)\s+(.*)$ ^libreoffice-l10n-om(?::\w+|)\s+(.*)$ ^libreoffice-l10n-or(?::\w+|)\s+(.*)$ ^libreoffice-l10n-pt-br(?::\w+|)\s+(.*)$ ^libreoffice-l10n-kmr(?::\w+|)\s+(.*)$ ^uno-libs-private(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ast(?::\w+|)\s+(.*)$ ^libreoffice-l10n-hu(?::\w+|)\s+(.*)$ ^libreoffice-l10n-hr(?::\w+|)\s+(.*)$ ^libreoffice-script-provider-python(?::\w+|)\s+(.*)$ ^libreoffice-writer-nogui(?::\w+|)\s+(.*)$ ^libreoffice-l10n-hy(?::\w+|)\s+(.*)$ ^libreoffice-l10n-he(?::\w+|)\s+(.*)$ ^libreoffice-officebean(?::\w+|)\s+(.*)$ ^libreoffice-dev(?::\w+|)\s+(.*)$ ^libreoffice-report-builder(?::\w+|)\s+(.*)$ ^libuno-sal3t64(?::\w+|)\s+(.*)$ ^libreoffice-help-tr(?::\w+|)\s+(.*)$ ^libreoffice-l10n-hi(?::\w+|)\s+(.*)$ ^libreoffice-kf5(?::\w+|)\s+(.*)$ ^libreoffice-help-dz(?::\w+|)\s+(.*)$ ^libreoffice-l10n-pt(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ja(?::\w+|)\s+(.*)$ ^libreoffice-l10n-pl(?::\w+|)\s+(.*)$ ^libreoffice-sdbc-postgresql(?::\w+|)\s+(.*)$ ^libreoffice-writer(?::\w+|)\s+(.*)$ ^libreoffice-help-de(?::\w+|)\s+(.*)$ ^libreoffice-help-da(?::\w+|)\s+(.*)$ ^libreoffice-uiconfig-base(?::\w+|)\s+(.*)$ ^ure(?::\w+|)\s+(.*)$ ^libreoffice-impress-nogui(?::\w+|)\s+(.*)$ ^libjuh-java(?::\w+|)\s+(.*)$ ^libreoffice-l10n-it(?::\w+|)\s+(.*)$ ^libreoffice-l10n-xh(?::\w+|)\s+(.*)$ ^libreoffice-l10n-af(?::\w+|)\s+(.*)$ ^libuno-cppuhelpergcc3-3t64(?::\w+|)\s+(.*)$ ^libreoffice-help-zh-tw(?::\w+|)\s+(.*)$ ^libreoffice-l10n-en-gb(?::\w+|)\s+(.*)$ ^libreoffice-draw(?::\w+|)\s+(.*)$ ^libuno-salhelpergcc3-3t64(?::\w+|)\s+(.*)$ ^libreoffice-core-nogui(?::\w+|)\s+(.*)$ ^libreoffice-l10n-as(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ar(?::\w+|)\s+(.*)$ ^libreoffice-l10n-in(?::\w+|)\s+(.*)$ ^amavisd-new-postfix(?::\w+|)\s+(.*)$ ^amavisd-new(?::\w+|)\s+(.*)$ ^unbound(?::\w+|)\s+(.*)$ ^python3-unbound(?::\w+|)\s+(.*)$ ^libunbound8(?::\w+|)\s+(.*)$ ^unbound-anchor(?::\w+|)\s+(.*)$ ^unbound-host(?::\w+|)\s+(.*)$ ^libunbound-dev(?::\w+|)\s+(.*)$ ^git(?::\w+|)\s+(.*)$ ^gitweb(?::\w+|)\s+(.*)$ ^git-gui(?::\w+|)\s+(.*)$ ^git-daemon-sysvinit(?::\w+|)\s+(.*)$ ^gitk(?::\w+|)\s+(.*)$ ^git-all(?::\w+|)\s+(.*)$ ^git-mediawiki(?::\w+|)\s+(.*)$ ^git-daemon-run(?::\w+|)\s+(.*)$ ^git-man(?::\w+|)\s+(.*)$ ^git-doc(?::\w+|)\s+(.*)$ ^git-svn(?::\w+|)\s+(.*)$ ^git-cvs(?::\w+|)\s+(.*)$ ^git-email(?::\w+|)\s+(.*)$ ^frr(?::\w+|)\s+(.*)$ ^frr-rpki-rtrlib(?::\w+|)\s+(.*)$ ^frr-snmp(?::\w+|)\s+(.*)$ ^frr-doc(?::\w+|)\s+(.*)$ ^frr-pythontools(?::\w+|)\s+(.*)$ ^libtss2-esys-3.0.2-0t64(?::\w+|)\s+(.*)$ ^libtss2-sys1t64(?::\w+|)\s+(.*)$ ^libtss2-mu-4.0.1-0t64(?::\w+|)\s+(.*)$ ^libtss2-tcti-spi-helper0t64(?::\w+|)\s+(.*)$ ^libtss2-tcti-libtpms0t64(?::\w+|)\s+(.*)$ ^libtss2-doc(?::\w+|)\s+(.*)$ ^libtss2-tcti-swtpm0t64(?::\w+|)\s+(.*)$ ^libtss2-tcti-device0t64(?::\w+|)\s+(.*)$ ^libtss2-rc0t64(?::\w+|)\s+(.*)$ ^libtss2-fapi1t64(?::\w+|)\s+(.*)$ ^libtss2-tcti-mssim0t64(?::\w+|)\s+(.*)$ ^libtss2-policy0t64(?::\w+|)\s+(.*)$ ^libtss2-tcti-pcap0t64(?::\w+|)\s+(.*)$ ^libtss2-tctildr0t64(?::\w+|)\s+(.*)$ ^libtss2-dev(?::\w+|)\s+(.*)$ ^libtss2-tcti-cmd0t64(?::\w+|)\s+(.*)$ ^intel-microcode(?::\w+|)\s+(.*)$ ^gstreamer1.0-plugins-base(?::\w+|)\s+(.*)$ ^libgstreamer-plugins-base1.0-0(?::\w+|)\s+(.*)$ ^gstreamer1.0-x(?::\w+|)\s+(.*)$ ^libgstreamer-gl1.0-0(?::\w+|)\s+(.*)$ ^gstreamer1.0-gl(?::\w+|)\s+(.*)$ ^libgstreamer-plugins-base1.0-dev(?::\w+|)\s+(.*)$ ^gir1.2-gst-plugins-base-1.0(?::\w+|)\s+(.*)$ ^gstreamer1.0-alsa(?::\w+|)\s+(.*)$ ^gstreamer1.0-plugins-base-apps(?::\w+|)\s+(.*)$ ^python3-werkzeug(?::\w+|)\s+(.*)$ ^python-werkzeug-doc(?::\w+|)\s+(.*)$ ^python3-pymysql(?::\w+|)\s+(.*)$ ^python-pymysql-doc(?::\w+|)\s+(.*)$ ^postgresql-server-dev-16(?::\w+|)\s+(.*)$ ^libecpg6(?::\w+|)\s+(.*)$ ^postgresql-pltcl-16(?::\w+|)\s+(.*)$ ^libpq-dev(?::\w+|)\s+(.*)$ ^postgresql-16(?::\w+|)\s+(.*)$ ^libpgtypes3(?::\w+|)\s+(.*)$ ^libecpg-dev(?::\w+|)\s+(.*)$ ^postgresql-plperl-16(?::\w+|)\s+(.*)$ ^libpq5(?::\w+|)\s+(.*)$ ^postgresql-client-16(?::\w+|)\s+(.*)$ ^postgresql-doc-16(?::\w+|)\s+(.*)$ ^postgresql-plpython3-16(?::\w+|)\s+(.*)$ ^libecpg-compat3(?::\w+|)\s+(.*)$ ^ffmpeg(?::\w+|)\s+(.*)$ ^ffmpeg-doc(?::\w+|)\s+(.*)$ ^libavcodec-dev(?::\w+|)\s+(.*)$ ^libavcodec-extra(?::\w+|)\s+(.*)$ ^libavcodec-extra60(?::\w+|)\s+(.*)$ ^libavcodec60(?::\w+|)\s+(.*)$ ^libavdevice-dev(?::\w+|)\s+(.*)$ ^libavdevice60(?::\w+|)\s+(.*)$ ^libavfilter-dev(?::\w+|)\s+(.*)$ ^libavfilter-extra(?::\w+|)\s+(.*)$ ^libavfilter-extra9(?::\w+|)\s+(.*)$ ^libavfilter9(?::\w+|)\s+(.*)$ ^libavformat-dev(?::\w+|)\s+(.*)$ ^libavformat-extra(?::\w+|)\s+(.*)$ ^libavformat-extra60(?::\w+|)\s+(.*)$ ^libavformat60(?::\w+|)\s+(.*)$ ^libavutil-dev(?::\w+|)\s+(.*)$ ^libavutil58(?::\w+|)\s+(.*)$ ^libpostproc-dev(?::\w+|)\s+(.*)$ ^libpostproc57(?::\w+|)\s+(.*)$ ^libswresample-dev(?::\w+|)\s+(.*)$ ^libswresample4(?::\w+|)\s+(.*)$ ^libswscale-dev(?::\w+|)\s+(.*)$ ^libswscale7(?::\w+|)\s+(.*)$ ^libc-bin(?::\w+|)\s+(.*)$ ^glibc-doc(?::\w+|)\s+(.*)$ ^libc6-i386(?::\w+|)\s+(.*)$ ^libc6-s390(?::\w+|)\s+(.*)$ ^libc6-dev-i386(?::\w+|)\s+(.*)$ ^nscd(?::\w+|)\s+(.*)$ ^libc6-dev-x32(?::\w+|)\s+(.*)$ ^libc6-dev(?::\w+|)\s+(.*)$ ^libc6-amd64(?::\w+|)\s+(.*)$ ^libc6-x32(?::\w+|)\s+(.*)$ ^libc6-dev-amd64(?::\w+|)\s+(.*)$ ^libc-dev-bin(?::\w+|)\s+(.*)$ ^libc6(?::\w+|)\s+(.*)$ ^locales-all(?::\w+|)\s+(.*)$ ^libc-devtools(?::\w+|)\s+(.*)$ ^glibc-source(?::\w+|)\s+(.*)$ ^libc6-dev-s390(?::\w+|)\s+(.*)$ ^locales(?::\w+|)\s+(.*)$ ^libarchive-dev(?::\w+|)\s+(.*)$ ^libarchive13t64(?::\w+|)\s+(.*)$ ^libarchive-tools(?::\w+|)\s+(.*)$ ^libgdk-pixbuf-2.0-dev(?::\w+|)\s+(.*)$ ^gdk-pixbuf-tests(?::\w+|)\s+(.*)$ ^libgdk-pixbuf2.0-common(?::\w+|)\s+(.*)$ ^libgdk-pixbuf2.0-bin(?::\w+|)\s+(.*)$ ^libgdk-pixbuf2.0-doc(?::\w+|)\s+(.*)$ ^gir1.2-gdkpixbuf-2.0(?::\w+|)\s+(.*)$ ^libgdk-pixbuf-2.0-0(?::\w+|)\s+(.*)$ ^openjdk-8-doc(?::\w+|)\s+(.*)$ ^openjdk-8-jdk(?::\w+|)\s+(.*)$ ^openjdk-8-jre-headless(?::\w+|)\s+(.*)$ ^openjdk-8-jre(?::\w+|)\s+(.*)$ ^openjdk-8-jdk-headless(?::\w+|)\s+(.*)$ ^openjdk-8-source(?::\w+|)\s+(.*)$ ^openjdk-8-jre-zero(?::\w+|)\s+(.*)$ ^openjdk-8-demo(?::\w+|)\s+(.*)$ ^libvpx-dev(?::\w+|)\s+(.*)$ ^libvpx9(?::\w+|)\s+(.*)$ ^libvpx-doc(?::\w+|)\s+(.*)$ ^vpx-tools(?::\w+|)\s+(.*)$ ^libaom-doc(?::\w+|)\s+(.*)$ ^libaom-dev(?::\w+|)\s+(.*)$ ^libaom3(?::\w+|)\s+(.*)$ ^aom-tools(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-raspi)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-ibm)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-generic|-generic-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-generic|-generic-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-lowlatency|-lowlatency-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-gcp)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-aws)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-oem)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-gke)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-azure|-azure-fde)(?::\w+|)\s+(.*)$ ^mysql-client(?::\w+|)\s+(.*)$ ^libmysqlclient-dev(?::\w+|)\s+(.*)$ ^mysql-testsuite-8.0(?::\w+|)\s+(.*)$ ^mysql-router(?::\w+|)\s+(.*)$ ^mysql-server(?::\w+|)\s+(.*)$ ^libmysqlclient21(?::\w+|)\s+(.*)$ ^mysql-client-core-8.0(?::\w+|)\s+(.*)$ ^mysql-server-core-8.0(?::\w+|)\s+(.*)$ ^mysql-server-8.0(?::\w+|)\s+(.*)$ ^mysql-testsuite(?::\w+|)\s+(.*)$ ^mysql-client-8.0(?::\w+|)\s+(.*)$ ^mysql-source-8.0(?::\w+|)\s+(.*)$ ^libtiff-opengl(?::\w+|)\s+(.*)$ ^libtiff5-dev(?::\w+|)\s+(.*)$ ^libtiff-dev(?::\w+|)\s+(.*)$ ^libtiffxx6(?::\w+|)\s+(.*)$ ^libtiff6(?::\w+|)\s+(.*)$ ^libtiff-tools(?::\w+|)\s+(.*)$ ^libtiff-doc(?::\w+|)\s+(.*)$ ^libndp0(?::\w+|)\s+(.*)$ ^libndp-dev(?::\w+|)\s+(.*)$ ^libndp-tools(?::\w+|)\s+(.*)$ ^virtuoso-vad-demo(?::\w+|)\s+(.*)$ ^virtuoso-vad-sparqldemo(?::\w+|)\s+(.*)$ ^virtuoso-vad-rdfmappers(?::\w+|)\s+(.*)$ ^virtuoso-vsp-startpage(?::\w+|)\s+(.*)$ ^virtuoso-vad-isparql(?::\w+|)\s+(.*)$ ^virtuoso-opensource-7-bin(?::\w+|)\s+(.*)$ ^virtuoso-server(?::\w+|)\s+(.*)$ ^virtuoso-vad-tutorial(?::\w+|)\s+(.*)$ ^virtuoso-minimal(?::\w+|)\s+(.*)$ ^virtuoso-opensource(?::\w+|)\s+(.*)$ ^virtuoso-vad-ods(?::\w+|)\s+(.*)$ ^virtuoso-opensource-7(?::\w+|)\s+(.*)$ ^virtuoso-vad-syncml(?::\w+|)\s+(.*)$ ^virtuoso-vad-doc(?::\w+|)\s+(.*)$ ^virtuoso-vad-conductor(?::\w+|)\s+(.*)$ ^libvirtodbc0(?::\w+|)\s+(.*)$ ^libvirtuoso5.5-cil(?::\w+|)\s+(.*)$ ^virtuoso-vad-bpel(?::\w+|)\s+(.*)$ ^virtuoso-opensource-7-common(?::\w+|)\s+(.*)$ ^libvte-2.91-gtk4-dev(?::\w+|)\s+(.*)$ ^libvte-2.91-common(?::\w+|)\s+(.*)$ ^gir1.2-vte-3.91(?::\w+|)\s+(.*)$ ^gir1.2-vte-2.91(?::\w+|)\s+(.*)$ ^libvte-2.91-doc(?::\w+|)\s+(.*)$ ^libvte-2.91-gtk4-0(?::\w+|)\s+(.*)$ ^libvte-2.91-0(?::\w+|)\s+(.*)$ ^libvte-2.91-gtk4-doc(?::\w+|)\s+(.*)$ ^libvte-2.91-dev(?::\w+|)\s+(.*)$ ^ghostscript(?::\w+|)\s+(.*)$ ^libgs10-common(?::\w+|)\s+(.*)$ ^libgs10(?::\w+|)\s+(.*)$ ^libgs-common(?::\w+|)\s+(.*)$ ^libgs-dev(?::\w+|)\s+(.*)$ ^ghostscript-doc(?::\w+|)\s+(.*)$ ^libsss-certmap-dev(?::\w+|)\s+(.*)$ ^libipa-hbac-dev(?::\w+|)\s+(.*)$ ^sssd-ad(?::\w+|)\s+(.*)$ ^libsss-sudo(?::\w+|)\s+(.*)$ ^libsss-nss-idmap0(?::\w+|)\s+(.*)$ ^libnss-sss(?::\w+|)\s+(.*)$ ^sssd-ipa(?::\w+|)\s+(.*)$ ^sssd-passkey(?::\w+|)\s+(.*)$ ^libipa-hbac0t64(?::\w+|)\s+(.*)$ ^libsss-idmap-dev(?::\w+|)\s+(.*)$ ^python3-libsss-nss-idmap(?::\w+|)\s+(.*)$ ^sssd-common(?::\w+|)\s+(.*)$ ^python3-sss(?::\w+|)\s+(.*)$ ^libpam-sss(?::\w+|)\s+(.*)$ ^sssd(?::\w+|)\s+(.*)$ ^libsss-idmap0(?::\w+|)\s+(.*)$ ^sssd-idp(?::\w+|)\s+(.*)$ ^libsss-nss-idmap-dev(?::\w+|)\s+(.*)$ ^sssd-kcm(?::\w+|)\s+(.*)$ ^libsss-certmap0(?::\w+|)\s+(.*)$ ^python3-libipa-hbac(?::\w+|)\s+(.*)$ ^sssd-ldap(?::\w+|)\s+(.*)$ ^sssd-tools(?::\w+|)\s+(.*)$ ^sssd-ad-common(?::\w+|)\s+(.*)$ ^sssd-krb5-common(?::\w+|)\s+(.*)$ ^sssd-dbus(?::\w+|)\s+(.*)$ ^sssd-krb5(?::\w+|)\s+(.*)$ ^sssd-proxy(?::\w+|)\s+(.*)$ ^ruby-rack(?::\w+|)\s+(.*)$ ^ruby3.2(?::\w+|)\s+(.*)$ ^ruby3.2-doc(?::\w+|)\s+(.*)$ ^ruby3.2-dev(?::\w+|)\s+(.*)$ ^libruby3.2(?::\w+|)\s+(.*)$ ^mariadb-plugin-provider-lzo(?::\w+|)\s+(.*)$ ^mariadb-plugin-cracklib-password-check(?::\w+|)\s+(.*)$ ^mariadb-backup(?::\w+|)\s+(.*)$ ^mariadb-plugin-connect(?::\w+|)\s+(.*)$ ^mariadb-plugin-spider(?::\w+|)\s+(.*)$ ^libmariadb-dev(?::\w+|)\s+(.*)$ ^libmariadb3(?::\w+|)\s+(.*)$ ^mariadb-plugin-s3(?::\w+|)\s+(.*)$ ^mariadb-plugin-provider-bzip2(?::\w+|)\s+(.*)$ ^mariadb-plugin-provider-lzma(?::\w+|)\s+(.*)$ ^mariadb-plugin-provider-snappy(?::\w+|)\s+(.*)$ ^mariadb-client(?::\w+|)\s+(.*)$ ^libmariadbd19t64(?::\w+|)\s+(.*)$ ^mariadb-server-core(?::\w+|)\s+(.*)$ ^mariadb-server-10.5(?::\w+|)\s+(.*)$ ^mariadb-test-data(?::\w+|)\s+(.*)$ ^mariadb-plugin-provider-lz4(?::\w+|)\s+(.*)$ ^mariadb-client-core(?::\w+|)\s+(.*)$ ^mariadb-plugin-rocksdb(?::\w+|)\s+(.*)$ ^mariadb-plugin-gssapi-client(?::\w+|)\s+(.*)$ ^mariadb-plugin-mroonga(?::\w+|)\s+(.*)$ ^libmariadbd-dev(?::\w+|)\s+(.*)$ ^libmariadb-dev-compat(?::\w+|)\s+(.*)$ ^mariadb-plugin-gssapi-server(?::\w+|)\s+(.*)$ ^mariadb-server(?::\w+|)\s+(.*)$ ^mariadb-common(?::\w+|)\s+(.*)$ ^mariadb-plugin-hashicorp-key-management(?::\w+|)\s+(.*)$ ^mariadb-plugin-oqgraph(?::\w+|)\s+(.*)$ ^mariadb-test(?::\w+|)\s+(.*)$ ^php8.3-cgi(?::\w+|)\s+(.*)$ ^php8.3-xsl(?::\w+|)\s+(.*)$ ^php8.3-fpm(?::\w+|)\s+(.*)$ ^php8.3-phpdbg(?::\w+|)\s+(.*)$ ^php8.3-zip(?::\w+|)\s+(.*)$ ^php8.3-curl(?::\w+|)\s+(.*)$ ^php8.3-ldap(?::\w+|)\s+(.*)$ ^php8.3-gmp(?::\w+|)\s+(.*)$ ^php8.3-sqlite3(?::\w+|)\s+(.*)$ ^php8.3-gd(?::\w+|)\s+(.*)$ ^php8.3-common(?::\w+|)\s+(.*)$ ^php8.3-enchant(?::\w+|)\s+(.*)$ ^php8.3-odbc(?::\w+|)\s+(.*)$ ^php8.3-cli(?::\w+|)\s+(.*)$ ^php8.3-mbstring(?::\w+|)\s+(.*)$ ^php8.3-pgsql(?::\w+|)\s+(.*)$ ^php8.3-mysql(?::\w+|)\s+(.*)$ ^php8.3-dba(?::\w+|)\s+(.*)$ ^libapache2-mod-php8.3(?::\w+|)\s+(.*)$ ^php8.3-soap(?::\w+|)\s+(.*)$ ^php8.3-opcache(?::\w+|)\s+(.*)$ ^php8.3-sybase(?::\w+|)\s+(.*)$ ^php8.3-pspell(?::\w+|)\s+(.*)$ ^libphp8.3-embed(?::\w+|)\s+(.*)$ ^php8.3-bz2(?::\w+|)\s+(.*)$ ^php8.3-dev(?::\w+|)\s+(.*)$ ^php8.3(?::\w+|)\s+(.*)$ ^php8.3-tidy(?::\w+|)\s+(.*)$ ^php8.3-interbase(?::\w+|)\s+(.*)$ ^php8.3-readline(?::\w+|)\s+(.*)$ ^php8.3-intl(?::\w+|)\s+(.*)$ ^php8.3-imap(?::\w+|)\s+(.*)$ ^php8.3-xml(?::\w+|)\s+(.*)$ ^php8.3-bcmath(?::\w+|)\s+(.*)$ ^php8.3-snmp(?::\w+|)\s+(.*)$ ^plasma-workspace-dev(?::\w+|)\s+(.*)$ ^libweather-ion7(?::\w+|)\s+(.*)$ ^libkfontinst5(?::\w+|)\s+(.*)$ ^libcolorcorrect5(?::\w+|)\s+(.*)$ ^libkworkspace5-5(?::\w+|)\s+(.*)$ ^plasma-workspace-data(?::\w+|)\s+(.*)$ ^plasma-workspace-wayland(?::\w+|)\s+(.*)$ ^sddm-theme-breeze(?::\w+|)\s+(.*)$ ^libplasma-geolocation-interface5(?::\w+|)\s+(.*)$ ^libnotificationmanager1(?::\w+|)\s+(.*)$ ^libkfontinstui5(?::\w+|)\s+(.*)$ ^libtaskmanager6(?::\w+|)\s+(.*)$ ^plasma-workspace(?::\w+|)\s+(.*)$ ^libcups2-dev(?::\w+|)\s+(.*)$ ^cups-bsd(?::\w+|)\s+(.*)$ ^cups-common(?::\w+|)\s+(.*)$ ^cups-core-drivers(?::\w+|)\s+(.*)$ ^cups-server-common(?::\w+|)\s+(.*)$ ^cups-client(?::\w+|)\s+(.*)$ ^libcupsimage2t64(?::\w+|)\s+(.*)$ ^libcupsimage2-dev(?::\w+|)\s+(.*)$ ^cups-ipp-utils(?::\w+|)\s+(.*)$ ^cups-ppdc(?::\w+|)\s+(.*)$ ^cups(?::\w+|)\s+(.*)$ ^libcups2t64(?::\w+|)\s+(.*)$ ^cups-daemon(?::\w+|)\s+(.*)$ ^libcups2-dev(?::\w+|)\s+(.*)$ ^cups-bsd(?::\w+|)\s+(.*)$ ^cups-common(?::\w+|)\s+(.*)$ ^cups-core-drivers(?::\w+|)\s+(.*)$ ^cups-server-common(?::\w+|)\s+(.*)$ ^cups-client(?::\w+|)\s+(.*)$ ^libcupsimage2t64(?::\w+|)\s+(.*)$ ^libcupsimage2-dev(?::\w+|)\s+(.*)$ ^cups-ipp-utils(?::\w+|)\s+(.*)$ ^cups-ppdc(?::\w+|)\s+(.*)$ ^cups(?::\w+|)\s+(.*)$ ^libcups2t64(?::\w+|)\s+(.*)$ ^cups-daemon(?::\w+|)\s+(.*)$ ^netplan.io(?::\w+|)\s+(.*)$ ^netplan-generator(?::\w+|)\s+(.*)$ ^libnetplan1(?::\w+|)\s+(.*)$ ^python3-netplan(?::\w+|)\s+(.*)$ ^libnetplan-dev(?::\w+|)\s+(.*)$ ^netplan.io(?::\w+|)\s+(.*)$ ^netplan-generator(?::\w+|)\s+(.*)$ ^libnetplan1(?::\w+|)\s+(.*)$ ^python3-netplan(?::\w+|)\s+(.*)$ ^libnetplan-dev(?::\w+|)\s+(.*)$ ^wget(?::\w+|)\s+(.*)$ ^libiso9660-dev(?::\w+|)\s+(.*)$ ^libiso9660-11t64(?::\w+|)\s+(.*)$ ^libcdio-utils(?::\w+|)\s+(.*)$ ^libcdio19t64(?::\w+|)\s+(.*)$ ^libiso9660++0t64(?::\w+|)\s+(.*)$ ^libudf-dev(?::\w+|)\s+(.*)$ ^libcdio++1t64(?::\w+|)\s+(.*)$ ^libiso9660++-dev(?::\w+|)\s+(.*)$ ^libudf0t64(?::\w+|)\s+(.*)$ ^libcdio++-dev(?::\w+|)\s+(.*)$ ^libcdio-dev(?::\w+|)\s+(.*)$ ^openssh-client(?::\w+|)\s+(.*)$ ^openssh-server(?::\w+|)\s+(.*)$ ^ssh-askpass-gnome(?::\w+|)\s+(.*)$ ^ssh(?::\w+|)\s+(.*)$ ^openssh-tests(?::\w+|)\s+(.*)$ ^openssh-sftp-server(?::\w+|)\s+(.*)$ ^openvpn(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-raspi)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-ibm)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-nvidia|-nvidia-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-generic|-generic-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-lowlatency|-lowlatency-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-intel)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-gcp)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-oem)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-aws)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-gke)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-azure|-azure-fde)(?::\w+|)\s+(.*)$ ^libreoffice-nlpsolver(?::\w+|)\s+(.*)$ ^libreoffice-wiki-publisher(?::\w+|)\s+(.*)$ ^fonts-opensymbol(?::\w+|)\s+(.*)$ ^libreoffice-evolution(?::\w+|)\s+(.*)$ ^libreoffice-help-en-gb(?::\w+|)\s+(.*)$ ^libreoffice-librelogo(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ml(?::\w+|)\s+(.*)$ ^libreoffice-help-zh-cn(?::\w+|)\s+(.*)$ ^libreoffice-subsequentcheckbase(?::\w+|)\s+(.*)$ ^libreoffice-l10n-mk(?::\w+|)\s+(.*)$ ^libreoffice-help-id(?::\w+|)\s+(.*)$ ^libreoffice-l10n-mr(?::\w+|)\s+(.*)$ ^libreoffice-style-tango(?::\w+|)\s+(.*)$ ^libreoffice-help-pt-br(?::\w+|)\s+(.*)$ ^libreofficekit-data(?::\w+|)\s+(.*)$ ^libreoffice-core(?::\w+|)\s+(.*)$ ^libreoffice-help-it(?::\w+|)\s+(.*)$ ^libreoffice-l10n-uk(?::\w+|)\s+(.*)$ ^libreoffice-l10n-fr(?::\w+|)\s+(.*)$ ^libreoffice-gnome(?::\w+|)\s+(.*)$ ^libreoffice-l10n-fi(?::\w+|)\s+(.*)$ ^libreoffice-help-nl(?::\w+|)\s+(.*)$ ^libreoffice-uiconfig-math(?::\w+|)\s+(.*)$ ^libreoffice-l10n-uz(?::\w+|)\s+(.*)$ ^libreoffice(?::\w+|)\s+(.*)$ ^libreoffice-sdbc-mysql(?::\w+|)\s+(.*)$ ^libreoffice-l10n-nb(?::\w+|)\s+(.*)$ ^libreoffice-l10n-mn(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ne(?::\w+|)\s+(.*)$ ^libreoffice-l10n-nl(?::\w+|)\s+(.*)$ ^libreoffice-uiconfig-writer(?::\w+|)\s+(.*)$ ^libreoffice-l10n-nn(?::\w+|)\s+(.*)$ ^libreoffice-help-fi(?::\w+|)\s+(.*)$ ^libreoffice-l10n-dz(?::\w+|)\s+(.*)$ ^libreoffice-l10n-nr(?::\w+|)\s+(.*)$ ^libreoffice-help-fr(?::\w+|)\s+(.*)$ ^libreoffice-report-builder-bin(?::\w+|)\s+(.*)$ ^libofficebean-java(?::\w+|)\s+(.*)$ ^libreoffice-qt6(?::\w+|)\s+(.*)$ ^libreoffice-l10n-vi(?::\w+|)\s+(.*)$ ^libreoffice-l10n-nso(?::\w+|)\s+(.*)$ ^libreoffice-qt5(?::\w+|)\s+(.*)$ ^libreoffice-nogui(?::\w+|)\s+(.*)$ ^libreoffice-math-nogui(?::\w+|)\s+(.*)$ ^libreoffice-style-karasa-jaga(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ve(?::\w+|)\s+(.*)$ ^libreoffice-l10n-gu(?::\w+|)\s+(.*)$ ^libreoffice-help-om(?::\w+|)\s+(.*)$ ^libreoffice-l10n-gl(?::\w+|)\s+(.*)$ ^python3-access2base(?::\w+|)\s+(.*)$ ^libreoffice-help-en-us(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ga(?::\w+|)\s+(.*)$ ^libuno-cppu3t64(?::\w+|)\s+(.*)$ ^liblibreofficekitgtk(?::\w+|)\s+(.*)$ ^libreoffice-l10n-gd(?::\w+|)\s+(.*)$ ^libreoffice-help-km(?::\w+|)\s+(.*)$ ^libreoffice-l10n-kn(?::\w+|)\s+(.*)$ ^libreoffice-help-ko(?::\w+|)\s+(.*)$ ^libreoffice-l10n-st(?::\w+|)\s+(.*)$ ^libreoffice-dev-common(?::\w+|)\s+(.*)$ ^libreoffice-l10n-sr(?::\w+|)\s+(.*)$ ^libreoffice-help-cs(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ts(?::\w+|)\s+(.*)$ ^libreoffice-l10n-sv(?::\w+|)\s+(.*)$ ^libreoffice-script-provider-bsh(?::\w+|)\s+(.*)$ ^gir1.2-lokdocview-0.1(?::\w+|)\s+(.*)$ ^ure-java(?::\w+|)\s+(.*)$ ^libreoffice-report-builder-bin-nogui(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ka(?::\w+|)\s+(.*)$ ^libreoffice-uiconfig-common(?::\w+|)\s+(.*)$ ^libridl-java(?::\w+|)\s+(.*)$ ^libreoffice-help-ca(?::\w+|)\s+(.*)$ ^libreoffice-l10n-zh-tw(?::\w+|)\s+(.*)$ ^libreoffice-l10n-sl(?::\w+|)\s+(.*)$ ^libreoffice-l10n-sk(?::\w+|)\s+(.*)$ ^libreoffice-style-breeze(?::\w+|)\s+(.*)$ ^libreoffice-l10n-si(?::\w+|)\s+(.*)$ ^libreoffice-l10n-da(?::\w+|)\s+(.*)$ ^libreofficekit-dev(?::\w+|)\s+(.*)$ ^libreoffice-l10n-de(?::\w+|)\s+(.*)$ ^libreoffice-common(?::\w+|)\s+(.*)$ ^libreoffice-help-pl(?::\w+|)\s+(.*)$ ^libreoffice-l10n-pa-in(?::\w+|)\s+(.*)$ ^libuno-purpenvhelpergcc3-3t64(?::\w+|)\s+(.*)$ ^libreoffice-uiconfig-report-builder(?::\w+|)\s+(.*)$ ^libreoffice-help-pt(?::\w+|)\s+(.*)$ ^libreoffice-base-nogui(?::\w+|)\s+(.*)$ ^libreoffice-gtk3(?::\w+|)\s+(.*)$ ^libreoffice-math(?::\w+|)\s+(.*)$ ^libreoffice-help-vi(?::\w+|)\s+(.*)$ ^libreoffice-gtk4(?::\w+|)\s+(.*)$ ^libreoffice-l10n-tr(?::\w+|)\s+(.*)$ ^libreoffice-help-hi(?::\w+|)\s+(.*)$ ^libreoffice-l10n-gug(?::\w+|)\s+(.*)$ ^libreoffice-sdbc-hsqldb(?::\w+|)\s+(.*)$ ^libreoffice-draw-nogui(?::\w+|)\s+(.*)$ ^libreoffice-calc(?::\w+|)\s+(.*)$ ^libreoffice-base-drivers(?::\w+|)\s+(.*)$ ^libreoffice-style-colibre(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ta(?::\w+|)\s+(.*)$ ^libreoffice-sdbc-firebird(?::\w+|)\s+(.*)$ ^libreoffice-l10n-tg(?::\w+|)\s+(.*)$ ^libreoffice-l10n-te(?::\w+|)\s+(.*)$ ^libreoffice-l10n-th(?::\w+|)\s+(.*)$ ^libreoffice-l10n-id(?::\w+|)\s+(.*)$ ^libreoffice-l10n-lv(?::\w+|)\s+(.*)$ ^libreoffice-help-hu(?::\w+|)\s+(.*)$ ^libreoffice-l10n-lt(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ss(?::\w+|)\s+(.*)$ ^libunoloader-java(?::\w+|)\s+(.*)$ ^libreoffice-uiconfig-impress(?::\w+|)\s+(.*)$ ^libreoffice-l10n-eu(?::\w+|)\s+(.*)$ ^libreoffice-l10n-et(?::\w+|)\s+(.*)$ ^libreoffice-script-provider-js(?::\w+|)\s+(.*)$ ^libreoffice-l10n-es(?::\w+|)\s+(.*)$ ^libreoffice-l10n-el(?::\w+|)\s+(.*)$ ^libreoffice-l10n-eo(?::\w+|)\s+(.*)$ ^libreoffice-style-sifr(?::\w+|)\s+(.*)$ ^libreoffice-l10n-zh-cn(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ug(?::\w+|)\s+(.*)$ ^libreoffice-smoketest-data(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ko(?::\w+|)\s+(.*)$ ^libreoffice-l10n-zu(?::\w+|)\s+(.*)$ ^libreoffice-impress(?::\w+|)\s+(.*)$ ^libreoffice-java-common(?::\w+|)\s+(.*)$ ^libreoffice-help-eu(?::\w+|)\s+(.*)$ ^libreoffice-help-et(?::\w+|)\s+(.*)$ ^libreoffice-help-es(?::\w+|)\s+(.*)$ ^libreoffice-l10n-km(?::\w+|)\s+(.*)$ ^libreoffice-uiconfig-draw(?::\w+|)\s+(.*)$ ^libreoffice-help-el(?::\w+|)\s+(.*)$ ^libreoffice-uiconfig-calc(?::\w+|)\s+(.*)$ ^libreoffice-l10n-kk(?::\w+|)\s+(.*)$ ^libreoffice-dev-gui(?::\w+|)\s+(.*)$ ^libreoffice-l10n-be(?::\w+|)\s+(.*)$ ^libreoffice-l10n-szl(?::\w+|)\s+(.*)$ ^libreoffice-l10n-bg(?::\w+|)\s+(.*)$ ^libreoffice-l10n-tn(?::\w+|)\s+(.*)$ ^libreoffice-l10n-bn(?::\w+|)\s+(.*)$ ^libreoffice-plasma(?::\w+|)\s+(.*)$ ^libreoffice-help-ja(?::\w+|)\s+(.*)$ ^libreoffice-l10n-br(?::\w+|)\s+(.*)$ ^libreoffice-l10n-bs(?::\w+|)\s+(.*)$ ^liblibreoffice-java(?::\w+|)\s+(.*)$ ^libunoil-java(?::\w+|)\s+(.*)$ ^libreoffice-style-yaru(?::\w+|)\s+(.*)$ ^libreoffice-base-core(?::\w+|)\s+(.*)$ ^libreoffice-help-ru(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ru(?::\w+|)\s+(.*)$ ^libreoffice-l10n-rw(?::\w+|)\s+(.*)$ ^libreoffice-l10n-is(?::\w+|)\s+(.*)$ ^libreoffice-style-elementary(?::\w+|)\s+(.*)$ ^python3-uno(?::\w+|)\s+(.*)$ ^libreoffice-l10n-fa(?::\w+|)\s+(.*)$ ^libreoffice-l10n-am(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ro(?::\w+|)\s+(.*)$ ^libreoffice-l10n-en-za(?::\w+|)\s+(.*)$ ^libreoffice-style-sukapura(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ca(?::\w+|)\s+(.*)$ ^libreoffice-help-sl(?::\w+|)\s+(.*)$ ^libreoffice-calc-nogui(?::\w+|)\s+(.*)$ ^libreoffice-help-sk(?::\w+|)\s+(.*)$ ^libreoffice-help-sv(?::\w+|)\s+(.*)$ ^libreoffice-l10n-cs(?::\w+|)\s+(.*)$ ^python3-scriptforge(?::\w+|)\s+(.*)$ ^libreoffice-dev-doc(?::\w+|)\s+(.*)$ ^libreoffice-help-common(?::\w+|)\s+(.*)$ ^libreoffice-l10n-za(?::\w+|)\s+(.*)$ ^libreoffice-l10n-cy(?::\w+|)\s+(.*)$ ^libreoffice-l10n-oc(?::\w+|)\s+(.*)$ ^libjurt-java(?::\w+|)\s+(.*)$ ^libreoffice-base(?::\w+|)\s+(.*)$ ^libreoffice-help-gl(?::\w+|)\s+(.*)$ ^libreoffice-l10n-om(?::\w+|)\s+(.*)$ ^libreoffice-l10n-or(?::\w+|)\s+(.*)$ ^libreoffice-l10n-pt-br(?::\w+|)\s+(.*)$ ^libreoffice-l10n-kmr(?::\w+|)\s+(.*)$ ^uno-libs-private(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ast(?::\w+|)\s+(.*)$ ^libreoffice-l10n-hu(?::\w+|)\s+(.*)$ ^libreoffice-l10n-hr(?::\w+|)\s+(.*)$ ^libreoffice-script-provider-python(?::\w+|)\s+(.*)$ ^libreoffice-writer-nogui(?::\w+|)\s+(.*)$ ^libreoffice-l10n-hy(?::\w+|)\s+(.*)$ ^libreoffice-l10n-he(?::\w+|)\s+(.*)$ ^libreoffice-officebean(?::\w+|)\s+(.*)$ ^libreoffice-dev(?::\w+|)\s+(.*)$ ^libreoffice-report-builder(?::\w+|)\s+(.*)$ ^libuno-sal3t64(?::\w+|)\s+(.*)$ ^libreoffice-help-tr(?::\w+|)\s+(.*)$ ^libreoffice-l10n-hi(?::\w+|)\s+(.*)$ ^libreoffice-kf5(?::\w+|)\s+(.*)$ ^libreoffice-help-dz(?::\w+|)\s+(.*)$ ^libreoffice-l10n-pt(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ja(?::\w+|)\s+(.*)$ ^libreoffice-l10n-pl(?::\w+|)\s+(.*)$ ^libreoffice-sdbc-postgresql(?::\w+|)\s+(.*)$ ^libreoffice-writer(?::\w+|)\s+(.*)$ ^libreoffice-help-de(?::\w+|)\s+(.*)$ ^libreoffice-help-da(?::\w+|)\s+(.*)$ ^libreoffice-uiconfig-base(?::\w+|)\s+(.*)$ ^ure(?::\w+|)\s+(.*)$ ^libreoffice-impress-nogui(?::\w+|)\s+(.*)$ ^libjuh-java(?::\w+|)\s+(.*)$ ^libreoffice-l10n-it(?::\w+|)\s+(.*)$ ^libreoffice-l10n-xh(?::\w+|)\s+(.*)$ ^libreoffice-l10n-af(?::\w+|)\s+(.*)$ ^libuno-cppuhelpergcc3-3t64(?::\w+|)\s+(.*)$ ^libreoffice-help-zh-tw(?::\w+|)\s+(.*)$ ^libreoffice-l10n-en-gb(?::\w+|)\s+(.*)$ ^libreoffice-draw(?::\w+|)\s+(.*)$ ^libuno-salhelpergcc3-3t64(?::\w+|)\s+(.*)$ ^libreoffice-core-nogui(?::\w+|)\s+(.*)$ ^libreoffice-l10n-as(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ar(?::\w+|)\s+(.*)$ ^libreoffice-l10n-in(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-oracle|-oracle-64k)(?::\w+|)\s+(.*)$ ^libvirtodbc0(?::\w+|)\s+(.*)$ ^libvirtuoso5.5-cil(?::\w+|)\s+(.*)$ ^virtuoso-minimal(?::\w+|)\s+(.*)$ ^virtuoso-opensource(?::\w+|)\s+(.*)$ ^virtuoso-opensource-7(?::\w+|)\s+(.*)$ ^virtuoso-opensource-7-bin(?::\w+|)\s+(.*)$ ^virtuoso-opensource-7-common(?::\w+|)\s+(.*)$ ^virtuoso-server(?::\w+|)\s+(.*)$ ^virtuoso-vad-bpel(?::\w+|)\s+(.*)$ ^virtuoso-vad-conductor(?::\w+|)\s+(.*)$ ^virtuoso-vad-demo(?::\w+|)\s+(.*)$ ^virtuoso-vad-doc(?::\w+|)\s+(.*)$ ^virtuoso-vad-isparql(?::\w+|)\s+(.*)$ ^virtuoso-vad-ods(?::\w+|)\s+(.*)$ ^virtuoso-vad-rdfmappers(?::\w+|)\s+(.*)$ ^virtuoso-vad-sparqldemo(?::\w+|)\s+(.*)$ ^virtuoso-vad-syncml(?::\w+|)\s+(.*)$ ^virtuoso-vad-tutorial(?::\w+|)\s+(.*)$ ^virtuoso-vsp-startpage(?::\w+|)\s+(.*)$ ^cinder-api(?::\w+|)\s+(.*)$ ^cinder-backup(?::\w+|)\s+(.*)$ ^cinder-common(?::\w+|)\s+(.*)$ ^cinder-scheduler(?::\w+|)\s+(.*)$ ^cinder-volume(?::\w+|)\s+(.*)$ ^python3-cinder(?::\w+|)\s+(.*)$ ^glance(?::\w+|)\s+(.*)$ ^glance-api(?::\w+|)\s+(.*)$ ^glance-common(?::\w+|)\s+(.*)$ ^python-glance-doc(?::\w+|)\s+(.*)$ ^python3-glance(?::\w+|)\s+(.*)$ ^nova-ajax-console-proxy(?::\w+|)\s+(.*)$ ^nova-api(?::\w+|)\s+(.*)$ ^nova-api-metadata(?::\w+|)\s+(.*)$ ^nova-api-os-compute(?::\w+|)\s+(.*)$ ^nova-api-os-volume(?::\w+|)\s+(.*)$ ^nova-cells(?::\w+|)\s+(.*)$ ^nova-common(?::\w+|)\s+(.*)$ ^nova-compute(?::\w+|)\s+(.*)$ ^nova-compute-ironic(?::\w+|)\s+(.*)$ ^nova-compute-kvm(?::\w+|)\s+(.*)$ ^nova-compute-libvirt(?::\w+|)\s+(.*)$ ^nova-compute-lxc(?::\w+|)\s+(.*)$ ^nova-compute-qemu(?::\w+|)\s+(.*)$ ^nova-compute-vmware(?::\w+|)\s+(.*)$ ^nova-compute-xen(?::\w+|)\s+(.*)$ ^nova-conductor(?::\w+|)\s+(.*)$ ^nova-doc(?::\w+|)\s+(.*)$ ^nova-novncproxy(?::\w+|)\s+(.*)$ ^nova-scheduler(?::\w+|)\s+(.*)$ ^nova-serialproxy(?::\w+|)\s+(.*)$ ^nova-spiceproxy(?::\w+|)\s+(.*)$ ^nova-volume(?::\w+|)\s+(.*)$ ^python3-nova(?::\w+|)\s+(.*)$ ^apache2(?::\w+|)\s+(.*)$ ^apache2-bin(?::\w+|)\s+(.*)$ ^apache2-data(?::\w+|)\s+(.*)$ ^apache2-dev(?::\w+|)\s+(.*)$ ^apache2-doc(?::\w+|)\s+(.*)$ ^apache2-ssl-dev(?::\w+|)\s+(.*)$ ^apache2-suexec-custom(?::\w+|)\s+(.*)$ ^apache2-suexec-pristine(?::\w+|)\s+(.*)$ ^apache2-utils(?::\w+|)\s+(.*)$ ^libapache2-mod-md(?::\w+|)\s+(.*)$ ^libapache2-mod-proxy-uwsgi(?::\w+|)\s+(.*)$ ^apache2(?::\w+|)\s+(.*)$ ^apache2-bin(?::\w+|)\s+(.*)$ ^apache2-data(?::\w+|)\s+(.*)$ ^apache2-dev(?::\w+|)\s+(.*)$ ^apache2-doc(?::\w+|)\s+(.*)$ ^apache2-ssl-dev(?::\w+|)\s+(.*)$ ^apache2-suexec-custom(?::\w+|)\s+(.*)$ ^apache2-suexec-pristine(?::\w+|)\s+(.*)$ ^apache2-utils(?::\w+|)\s+(.*)$ ^libapache2-mod-md(?::\w+|)\s+(.*)$ ^libapache2-mod-proxy-uwsgi(?::\w+|)\s+(.*)$ ^golang-1.21(?::\w+|)\s+(.*)$ ^golang-1.21-doc(?::\w+|)\s+(.*)$ ^golang-1.21-go(?::\w+|)\s+(.*)$ ^golang-1.21-src(?::\w+|)\s+(.*)$ ^golang-1.22(?::\w+|)\s+(.*)$ ^golang-1.22-doc(?::\w+|)\s+(.*)$ ^golang-1.22-go(?::\w+|)\s+(.*)$ ^golang-1.22-src(?::\w+|)\s+(.*)$ ^openssh-client(?::\w+|)\s+(.*)$ ^openssh-server(?::\w+|)\s+(.*)$ ^openssh-sftp-server(?::\w+|)\s+(.*)$ ^openssh-tests(?::\w+|)\s+(.*)$ ^ssh(?::\w+|)\s+(.*)$ ^ssh-askpass-gnome(?::\w+|)\s+(.*)$ ^python-django-doc(?::\w+|)\s+(.*)$ ^python3-django(?::\w+|)\s+(.*)$ ^dotnet-sdk-8.0(?::\w+|)\s+(.*)$ ^dotnet-sdk-8.0-source-built-artifacts(?::\w+|)\s+(.*)$ ^dotnet-sdk-dbg-8.0(?::\w+|)\s+(.*)$ ^dotnet-templates-8.0(?::\w+|)\s+(.*)$ ^netstandard-targeting-pack-2.1-8.0(?::\w+|)\s+(.*)$ ^dotnet8(?::\w+|)\s+(.*)$ ^aspnetcore-runtime-8.0(?::\w+|)\s+(.*)$ ^aspnetcore-runtime-dbg-8.0(?::\w+|)\s+(.*)$ ^aspnetcore-targeting-pack-8.0(?::\w+|)\s+(.*)$ ^dotnet-apphost-pack-8.0(?::\w+|)\s+(.*)$ ^dotnet-host-8.0(?::\w+|)\s+(.*)$ ^dotnet-hostfxr-8.0(?::\w+|)\s+(.*)$ ^dotnet-runtime-8.0(?::\w+|)\s+(.*)$ ^dotnet-runtime-dbg-8.0(?::\w+|)\s+(.*)$ ^dotnet-targeting-pack-8.0(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-intel)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-raspi)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-ibm|-oem)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-azure|-azure-fde)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-gcp)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-generic|-generic-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-lowlatency|-lowlatency-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-gke)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-nvidia|-nvidia-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-aws)(?::\w+|)\s+(.*)$ ^ghostscript(?::\w+|)\s+(.*)$ ^ghostscript-doc(?::\w+|)\s+(.*)$ ^libgs-common(?::\w+|)\s+(.*)$ ^libgs-dev(?::\w+|)\s+(.*)$ ^libgs10(?::\w+|)\s+(.*)$ ^libgs10-common(?::\w+|)\s+(.*)$ ^gir1.2-gtk-2.0(?::\w+|)\s+(.*)$ ^gtk2-engines-pixbuf(?::\w+|)\s+(.*)$ ^libgail-common(?::\w+|)\s+(.*)$ ^libgail-dev(?::\w+|)\s+(.*)$ ^libgail-doc(?::\w+|)\s+(.*)$ ^libgail18t64(?::\w+|)\s+(.*)$ ^libgtk2.0-0t64(?::\w+|)\s+(.*)$ ^libgtk2.0-bin(?::\w+|)\s+(.*)$ ^libgtk2.0-common(?::\w+|)\s+(.*)$ ^libgtk2.0-dev(?::\w+|)\s+(.*)$ ^libgtk2.0-doc(?::\w+|)\s+(.*)$ ^gir1.2-gtk-3.0(?::\w+|)\s+(.*)$ ^gtk-3-examples(?::\w+|)\s+(.*)$ ^gtk-update-icon-cache(?::\w+|)\s+(.*)$ ^libgail-3-0t64(?::\w+|)\s+(.*)$ ^libgail-3-dev(?::\w+|)\s+(.*)$ ^libgail-3-doc(?::\w+|)\s+(.*)$ ^libgtk-3-0t64(?::\w+|)\s+(.*)$ ^libgtk-3-bin(?::\w+|)\s+(.*)$ ^libgtk-3-common(?::\w+|)\s+(.*)$ ^libgtk-3-dev(?::\w+|)\s+(.*)$ ^libgtk-3-doc(?::\w+|)\s+(.*)$ ^apache2(?::\w+|)\s+(.*)$ ^apache2-bin(?::\w+|)\s+(.*)$ ^apache2-data(?::\w+|)\s+(.*)$ ^apache2-dev(?::\w+|)\s+(.*)$ ^apache2-doc(?::\w+|)\s+(.*)$ ^apache2-ssl-dev(?::\w+|)\s+(.*)$ ^apache2-suexec-custom(?::\w+|)\s+(.*)$ ^apache2-suexec-pristine(?::\w+|)\s+(.*)$ ^apache2-utils(?::\w+|)\s+(.*)$ ^libapache2-mod-md(?::\w+|)\s+(.*)$ ^libapache2-mod-proxy-uwsgi(?::\w+|)\s+(.*)$ ^python-pymongo-doc(?::\w+|)\s+(.*)$ ^python3-bson(?::\w+|)\s+(.*)$ ^python3-bson-ext(?::\w+|)\s+(.*)$ ^python3-gridfs(?::\w+|)\s+(.*)$ ^python3-pymongo(?::\w+|)\s+(.*)$ ^python3-pymongo-ext(?::\w+|)\s+(.*)$ ^python3-zipp(?::\w+|)\s+(.*)$ ^squid(?::\w+|)\s+(.*)$ ^squid-cgi(?::\w+|)\s+(.*)$ ^squid-common(?::\w+|)\s+(.*)$ ^squid-openssl(?::\w+|)\s+(.*)$ ^squid-purge(?::\w+|)\s+(.*)$ ^squidclient(?::\w+|)\s+(.*)$ ^bind9(?::\w+|)\s+(.*)$ ^bind9-dev(?::\w+|)\s+(.*)$ ^bind9-dnsutils(?::\w+|)\s+(.*)$ ^bind9-doc(?::\w+|)\s+(.*)$ ^bind9-host(?::\w+|)\s+(.*)$ ^bind9-libs(?::\w+|)\s+(.*)$ ^bind9-utils(?::\w+|)\s+(.*)$ ^bind9utils(?::\w+|)\s+(.*)$ ^dnsutils(?::\w+|)\s+(.*)$ ^nova-ajax-console-proxy(?::\w+|)\s+(.*)$ ^nova-api(?::\w+|)\s+(.*)$ ^nova-api-metadata(?::\w+|)\s+(.*)$ ^nova-api-os-compute(?::\w+|)\s+(.*)$ ^nova-api-os-volume(?::\w+|)\s+(.*)$ ^nova-cells(?::\w+|)\s+(.*)$ ^nova-common(?::\w+|)\s+(.*)$ ^nova-compute(?::\w+|)\s+(.*)$ ^nova-compute-ironic(?::\w+|)\s+(.*)$ ^nova-compute-kvm(?::\w+|)\s+(.*)$ ^nova-compute-libvirt(?::\w+|)\s+(.*)$ ^nova-compute-lxc(?::\w+|)\s+(.*)$ ^nova-compute-qemu(?::\w+|)\s+(.*)$ ^nova-compute-vmware(?::\w+|)\s+(.*)$ ^nova-compute-xen(?::\w+|)\s+(.*)$ ^nova-conductor(?::\w+|)\s+(.*)$ ^nova-doc(?::\w+|)\s+(.*)$ ^nova-novncproxy(?::\w+|)\s+(.*)$ ^nova-scheduler(?::\w+|)\s+(.*)$ ^nova-serialproxy(?::\w+|)\s+(.*)$ ^nova-spiceproxy(?::\w+|)\s+(.*)$ ^nova-volume(?::\w+|)\s+(.*)$ ^python3-nova(?::\w+|)\s+(.*)$ ^provd(?::\w+|)\s+(.*)$ ^gir1.2-poppler-0.18(?::\w+|)\s+(.*)$ ^libpoppler-cpp-dev(?::\w+|)\s+(.*)$ ^libpoppler-cpp0t64(?::\w+|)\s+(.*)$ ^libpoppler-dev(?::\w+|)\s+(.*)$ ^libpoppler-glib-dev(?::\w+|)\s+(.*)$ ^libpoppler-glib-doc(?::\w+|)\s+(.*)$ ^libpoppler-glib8t64(?::\w+|)\s+(.*)$ ^libpoppler-private-dev(?::\w+|)\s+(.*)$ ^libpoppler-qt5-1t64(?::\w+|)\s+(.*)$ ^libpoppler-qt5-dev(?::\w+|)\s+(.*)$ ^libpoppler-qt6-3t64(?::\w+|)\s+(.*)$ ^libpoppler-qt6-dev(?::\w+|)\s+(.*)$ ^libpoppler134(?::\w+|)\s+(.*)$ ^poppler-utils(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-oracle|-oracle-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-gke)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-raspi)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-ibm|-oem)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-nvidia|-nvidia-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-gcp)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-aws)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-generic|-generic-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-lowlatency|-lowlatency-64k)(?::\w+|)\s+(.*)$ ^openjdk-8-demo(?::\w+|)\s+(.*)$ ^openjdk-8-doc(?::\w+|)\s+(.*)$ ^openjdk-8-jdk(?::\w+|)\s+(.*)$ ^openjdk-8-jdk-headless(?::\w+|)\s+(.*)$ ^openjdk-8-jre(?::\w+|)\s+(.*)$ ^openjdk-8-jre-headless(?::\w+|)\s+(.*)$ ^openjdk-8-jre-zero(?::\w+|)\s+(.*)$ ^openjdk-8-source(?::\w+|)\s+(.*)$ ^openjdk-11-demo(?::\w+|)\s+(.*)$ ^openjdk-11-doc(?::\w+|)\s+(.*)$ ^openjdk-11-jdk(?::\w+|)\s+(.*)$ ^openjdk-11-jdk-headless(?::\w+|)\s+(.*)$ ^openjdk-11-jre(?::\w+|)\s+(.*)$ ^openjdk-11-jre-headless(?::\w+|)\s+(.*)$ ^openjdk-11-jre-zero(?::\w+|)\s+(.*)$ ^openjdk-11-source(?::\w+|)\s+(.*)$ ^openjdk-17-demo(?::\w+|)\s+(.*)$ ^openjdk-17-doc(?::\w+|)\s+(.*)$ ^openjdk-17-jdk(?::\w+|)\s+(.*)$ ^openjdk-17-jdk-headless(?::\w+|)\s+(.*)$ ^openjdk-17-jre(?::\w+|)\s+(.*)$ ^openjdk-17-jre-headless(?::\w+|)\s+(.*)$ ^openjdk-17-jre-zero(?::\w+|)\s+(.*)$ ^openjdk-17-source(?::\w+|)\s+(.*)$ ^openjdk-21-demo(?::\w+|)\s+(.*)$ ^openjdk-21-doc(?::\w+|)\s+(.*)$ ^openjdk-21-jdk(?::\w+|)\s+(.*)$ ^openjdk-21-jdk-headless(?::\w+|)\s+(.*)$ ^openjdk-21-jre(?::\w+|)\s+(.*)$ ^openjdk-21-jre-headless(?::\w+|)\s+(.*)$ ^openjdk-21-jre-zero(?::\w+|)\s+(.*)$ ^openjdk-21-source(?::\w+|)\s+(.*)$ ^openjdk-21-testsupport(?::\w+|)\s+(.*)$ ^libmysqlclient-dev(?::\w+|)\s+(.*)$ ^libmysqlclient21(?::\w+|)\s+(.*)$ ^mysql-client(?::\w+|)\s+(.*)$ ^mysql-client-8.0(?::\w+|)\s+(.*)$ ^mysql-client-core-8.0(?::\w+|)\s+(.*)$ ^mysql-router(?::\w+|)\s+(.*)$ ^mysql-server(?::\w+|)\s+(.*)$ ^mysql-server-8.0(?::\w+|)\s+(.*)$ ^mysql-server-core-8.0(?::\w+|)\s+(.*)$ ^mysql-source-8.0(?::\w+|)\s+(.*)$ ^mysql-testsuite(?::\w+|)\s+(.*)$ ^mysql-testsuite-8.0(?::\w+|)\s+(.*)$ ^libssl-dev(?::\w+|)\s+(.*)$ ^libssl-doc(?::\w+|)\s+(.*)$ ^libssl3t64(?::\w+|)\s+(.*)$ ^openssl(?::\w+|)\s+(.*)$ ^exim4(?::\w+|)\s+(.*)$ ^exim4-base(?::\w+|)\s+(.*)$ ^exim4-config(?::\w+|)\s+(.*)$ ^exim4-daemon-heavy(?::\w+|)\s+(.*)$ ^exim4-daemon-light(?::\w+|)\s+(.*)$ ^exim4-dev(?::\w+|)\s+(.*)$ ^eximon4(?::\w+|)\s+(.*)$ ^golang-github-snapcore-snapd-dev(?::\w+|)\s+(.*)$ ^golang-github-ubuntu-core-snappy-dev(?::\w+|)\s+(.*)$ ^snap-confine(?::\w+|)\s+(.*)$ ^snapd(?::\w+|)\s+(.*)$ ^snapd-xdg-open(?::\w+|)\s+(.*)$ ^ubuntu-core-launcher(?::\w+|)\s+(.*)$ ^ubuntu-core-snapd-units(?::\w+|)\s+(.*)$ ^ubuntu-snappy(?::\w+|)\s+(.*)$ ^ubuntu-snappy-cli(?::\w+|)\s+(.*)$ ^idle-python3.12(?::\w+|)\s+(.*)$ ^libpython3.12-dev(?::\w+|)\s+(.*)$ ^libpython3.12-minimal(?::\w+|)\s+(.*)$ ^libpython3.12-stdlib(?::\w+|)\s+(.*)$ ^libpython3.12-testsuite(?::\w+|)\s+(.*)$ ^libpython3.12t64(?::\w+|)\s+(.*)$ ^python3.12(?::\w+|)\s+(.*)$ ^python3.12-dev(?::\w+|)\s+(.*)$ ^python3.12-doc(?::\w+|)\s+(.*)$ ^python3.12-examples(?::\w+|)\s+(.*)$ ^python3.12-full(?::\w+|)\s+(.*)$ ^python3.12-minimal(?::\w+|)\s+(.*)$ ^python3.12-nopie(?::\w+|)\s+(.*)$ ^python3.12-venv(?::\w+|)\s+(.*)$ ^gross(?::\w+|)\s+(.*)$ ^curl(?::\w+|)\s+(.*)$ ^libcurl3t64-gnutls(?::\w+|)\s+(.*)$ ^libcurl4-doc(?::\w+|)\s+(.*)$ ^libcurl4-gnutls-dev(?::\w+|)\s+(.*)$ ^libcurl4-openssl-dev(?::\w+|)\s+(.*)$ ^libcurl4t64(?::\w+|)\s+(.*)$ ^eapoltest(?::\w+|)\s+(.*)$ ^hostapd(?::\w+|)\s+(.*)$ ^libwpa-client-dev(?::\w+|)\s+(.*)$ ^wpagui(?::\w+|)\s+(.*)$ ^wpasupplicant(?::\w+|)\s+(.*)$ ^python-django-doc(?::\w+|)\s+(.*)$ ^python3-django(?::\w+|)\s+(.*)$ ^krb5-admin-server(?::\w+|)\s+(.*)$ ^krb5-doc(?::\w+|)\s+(.*)$ ^krb5-gss-samples(?::\w+|)\s+(.*)$ ^krb5-k5tls(?::\w+|)\s+(.*)$ ^krb5-kdc(?::\w+|)\s+(.*)$ ^krb5-kdc-ldap(?::\w+|)\s+(.*)$ ^krb5-kpropd(?::\w+|)\s+(.*)$ ^krb5-locales(?::\w+|)\s+(.*)$ ^krb5-multidev(?::\w+|)\s+(.*)$ ^krb5-otp(?::\w+|)\s+(.*)$ ^krb5-pkinit(?::\w+|)\s+(.*)$ ^krb5-user(?::\w+|)\s+(.*)$ ^libgssapi-krb5-2(?::\w+|)\s+(.*)$ ^libgssrpc4t64(?::\w+|)\s+(.*)$ ^libk5crypto3(?::\w+|)\s+(.*)$ ^libkadm5clnt-mit12(?::\w+|)\s+(.*)$ ^libkadm5srv-mit12(?::\w+|)\s+(.*)$ ^libkdb5-10t64(?::\w+|)\s+(.*)$ ^libkrad-dev(?::\w+|)\s+(.*)$ ^libkrad0(?::\w+|)\s+(.*)$ ^libkrb5-3(?::\w+|)\s+(.*)$ ^libkrb5-dev(?::\w+|)\s+(.*)$ ^libkrb5support0(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-gke)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-ibm)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-nvidia|-nvidia-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-gcp)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-aws)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-generic|-generic-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-raspi)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-lowlatency|-lowlatency-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-oracle|-oracle-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-nvidia-lowlatency|-nvidia-lowlatency-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-azure|-azure-fde)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-oem)(?::\w+|)\s+(.*)$ ^dotnet-sdk-8.0(?::\w+|)\s+(.*)$ ^dotnet-sdk-8.0-source-built-artifacts(?::\w+|)\s+(.*)$ ^dotnet-sdk-dbg-8.0(?::\w+|)\s+(.*)$ ^dotnet-templates-8.0(?::\w+|)\s+(.*)$ ^netstandard-targeting-pack-2.1-8.0(?::\w+|)\s+(.*)$ ^dotnet8(?::\w+|)\s+(.*)$ ^aspnetcore-runtime-8.0(?::\w+|)\s+(.*)$ ^aspnetcore-runtime-dbg-8.0(?::\w+|)\s+(.*)$ ^aspnetcore-targeting-pack-8.0(?::\w+|)\s+(.*)$ ^dotnet-apphost-pack-8.0(?::\w+|)\s+(.*)$ ^dotnet-host-8.0(?::\w+|)\s+(.*)$ ^dotnet-hostfxr-8.0(?::\w+|)\s+(.*)$ ^dotnet-runtime-8.0(?::\w+|)\s+(.*)$ ^dotnet-runtime-dbg-8.0(?::\w+|)\s+(.*)$ ^dotnet-targeting-pack-8.0(?::\w+|)\s+(.*)$ ^busybox(?::\w+|)\s+(.*)$ ^busybox-initramfs(?::\w+|)\s+(.*)$ ^busybox-static(?::\w+|)\s+(.*)$ ^busybox-syslogd(?::\w+|)\s+(.*)$ ^udhcpc(?::\w+|)\s+(.*)$ ^udhcpd(?::\w+|)\s+(.*)$ ^libreoffice-nlpsolver(?::\w+|)\s+(.*)$ ^libreoffice-wiki-publisher(?::\w+|)\s+(.*)$ ^fonts-opensymbol(?::\w+|)\s+(.*)$ ^gir1.2-lokdocview-0.1(?::\w+|)\s+(.*)$ ^libjuh-java(?::\w+|)\s+(.*)$ ^libjurt-java(?::\w+|)\s+(.*)$ ^liblibreoffice-java(?::\w+|)\s+(.*)$ ^liblibreofficekitgtk(?::\w+|)\s+(.*)$ ^libofficebean-java(?::\w+|)\s+(.*)$ ^libreoffice(?::\w+|)\s+(.*)$ ^libreoffice-base(?::\w+|)\s+(.*)$ ^libreoffice-base-core(?::\w+|)\s+(.*)$ ^libreoffice-base-drivers(?::\w+|)\s+(.*)$ ^libreoffice-base-nogui(?::\w+|)\s+(.*)$ ^libreoffice-calc(?::\w+|)\s+(.*)$ ^libreoffice-calc-nogui(?::\w+|)\s+(.*)$ ^libreoffice-common(?::\w+|)\s+(.*)$ ^libreoffice-core(?::\w+|)\s+(.*)$ ^libreoffice-core-nogui(?::\w+|)\s+(.*)$ ^libreoffice-dev(?::\w+|)\s+(.*)$ ^libreoffice-dev-common(?::\w+|)\s+(.*)$ ^libreoffice-dev-doc(?::\w+|)\s+(.*)$ ^libreoffice-dev-gui(?::\w+|)\s+(.*)$ ^libreoffice-draw(?::\w+|)\s+(.*)$ ^libreoffice-draw-nogui(?::\w+|)\s+(.*)$ ^libreoffice-evolution(?::\w+|)\s+(.*)$ ^libreoffice-gnome(?::\w+|)\s+(.*)$ ^libreoffice-gtk3(?::\w+|)\s+(.*)$ ^libreoffice-gtk4(?::\w+|)\s+(.*)$ ^libreoffice-help-ca(?::\w+|)\s+(.*)$ ^libreoffice-help-common(?::\w+|)\s+(.*)$ ^libreoffice-help-cs(?::\w+|)\s+(.*)$ ^libreoffice-help-da(?::\w+|)\s+(.*)$ ^libreoffice-help-de(?::\w+|)\s+(.*)$ ^libreoffice-help-dz(?::\w+|)\s+(.*)$ ^libreoffice-help-el(?::\w+|)\s+(.*)$ ^libreoffice-help-en-gb(?::\w+|)\s+(.*)$ ^libreoffice-help-en-us(?::\w+|)\s+(.*)$ ^libreoffice-help-es(?::\w+|)\s+(.*)$ ^libreoffice-help-et(?::\w+|)\s+(.*)$ ^libreoffice-help-eu(?::\w+|)\s+(.*)$ ^libreoffice-help-fi(?::\w+|)\s+(.*)$ ^libreoffice-help-fr(?::\w+|)\s+(.*)$ ^libreoffice-help-gl(?::\w+|)\s+(.*)$ ^libreoffice-help-hi(?::\w+|)\s+(.*)$ ^libreoffice-help-hu(?::\w+|)\s+(.*)$ ^libreoffice-help-id(?::\w+|)\s+(.*)$ ^libreoffice-help-it(?::\w+|)\s+(.*)$ ^libreoffice-help-ja(?::\w+|)\s+(.*)$ ^libreoffice-help-km(?::\w+|)\s+(.*)$ ^libreoffice-help-ko(?::\w+|)\s+(.*)$ ^libreoffice-help-nl(?::\w+|)\s+(.*)$ ^libreoffice-help-om(?::\w+|)\s+(.*)$ ^libreoffice-help-pl(?::\w+|)\s+(.*)$ ^libreoffice-help-pt(?::\w+|)\s+(.*)$ ^libreoffice-help-pt-br(?::\w+|)\s+(.*)$ ^libreoffice-help-ru(?::\w+|)\s+(.*)$ ^libreoffice-help-sk(?::\w+|)\s+(.*)$ ^libreoffice-help-sl(?::\w+|)\s+(.*)$ ^libreoffice-help-sv(?::\w+|)\s+(.*)$ ^libreoffice-help-tr(?::\w+|)\s+(.*)$ ^libreoffice-help-vi(?::\w+|)\s+(.*)$ ^libreoffice-help-zh-cn(?::\w+|)\s+(.*)$ ^libreoffice-help-zh-tw(?::\w+|)\s+(.*)$ ^libreoffice-impress(?::\w+|)\s+(.*)$ ^libreoffice-impress-nogui(?::\w+|)\s+(.*)$ ^libreoffice-java-common(?::\w+|)\s+(.*)$ ^libreoffice-kf5(?::\w+|)\s+(.*)$ ^libreoffice-l10n-af(?::\w+|)\s+(.*)$ ^libreoffice-l10n-am(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ar(?::\w+|)\s+(.*)$ ^libreoffice-l10n-as(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ast(?::\w+|)\s+(.*)$ ^libreoffice-l10n-be(?::\w+|)\s+(.*)$ ^libreoffice-l10n-bg(?::\w+|)\s+(.*)$ ^libreoffice-l10n-bn(?::\w+|)\s+(.*)$ ^libreoffice-l10n-br(?::\w+|)\s+(.*)$ ^libreoffice-l10n-bs(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ca(?::\w+|)\s+(.*)$ ^libreoffice-l10n-cs(?::\w+|)\s+(.*)$ ^libreoffice-l10n-cy(?::\w+|)\s+(.*)$ ^libreoffice-l10n-da(?::\w+|)\s+(.*)$ ^libreoffice-l10n-de(?::\w+|)\s+(.*)$ ^libreoffice-l10n-dz(?::\w+|)\s+(.*)$ ^libreoffice-l10n-el(?::\w+|)\s+(.*)$ ^libreoffice-l10n-en-gb(?::\w+|)\s+(.*)$ ^libreoffice-l10n-en-za(?::\w+|)\s+(.*)$ ^libreoffice-l10n-eo(?::\w+|)\s+(.*)$ ^libreoffice-l10n-es(?::\w+|)\s+(.*)$ ^libreoffice-l10n-et(?::\w+|)\s+(.*)$ ^libreoffice-l10n-eu(?::\w+|)\s+(.*)$ ^libreoffice-l10n-fa(?::\w+|)\s+(.*)$ ^libreoffice-l10n-fi(?::\w+|)\s+(.*)$ ^libreoffice-l10n-fr(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ga(?::\w+|)\s+(.*)$ ^libreoffice-l10n-gd(?::\w+|)\s+(.*)$ ^libreoffice-l10n-gl(?::\w+|)\s+(.*)$ ^libreoffice-l10n-gu(?::\w+|)\s+(.*)$ ^libreoffice-l10n-gug(?::\w+|)\s+(.*)$ ^libreoffice-l10n-he(?::\w+|)\s+(.*)$ ^libreoffice-l10n-hi(?::\w+|)\s+(.*)$ ^libreoffice-l10n-hr(?::\w+|)\s+(.*)$ ^libreoffice-l10n-hu(?::\w+|)\s+(.*)$ ^libreoffice-l10n-hy(?::\w+|)\s+(.*)$ ^libreoffice-l10n-id(?::\w+|)\s+(.*)$ ^libreoffice-l10n-in(?::\w+|)\s+(.*)$ ^libreoffice-l10n-is(?::\w+|)\s+(.*)$ ^libreoffice-l10n-it(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ja(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ka(?::\w+|)\s+(.*)$ ^libreoffice-l10n-kk(?::\w+|)\s+(.*)$ ^libreoffice-l10n-km(?::\w+|)\s+(.*)$ ^libreoffice-l10n-kmr(?::\w+|)\s+(.*)$ ^libreoffice-l10n-kn(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ko(?::\w+|)\s+(.*)$ ^libreoffice-l10n-lt(?::\w+|)\s+(.*)$ ^libreoffice-l10n-lv(?::\w+|)\s+(.*)$ ^libreoffice-l10n-mk(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ml(?::\w+|)\s+(.*)$ ^libreoffice-l10n-mn(?::\w+|)\s+(.*)$ ^libreoffice-l10n-mr(?::\w+|)\s+(.*)$ ^libreoffice-l10n-nb(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ne(?::\w+|)\s+(.*)$ ^libreoffice-l10n-nl(?::\w+|)\s+(.*)$ ^libreoffice-l10n-nn(?::\w+|)\s+(.*)$ ^libreoffice-l10n-nr(?::\w+|)\s+(.*)$ ^libreoffice-l10n-nso(?::\w+|)\s+(.*)$ ^libreoffice-l10n-oc(?::\w+|)\s+(.*)$ ^libreoffice-l10n-om(?::\w+|)\s+(.*)$ ^libreoffice-l10n-or(?::\w+|)\s+(.*)$ ^libreoffice-l10n-pa-in(?::\w+|)\s+(.*)$ ^libreoffice-l10n-pl(?::\w+|)\s+(.*)$ ^libreoffice-l10n-pt(?::\w+|)\s+(.*)$ ^libreoffice-l10n-pt-br(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ro(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ru(?::\w+|)\s+(.*)$ ^libreoffice-l10n-rw(?::\w+|)\s+(.*)$ ^libreoffice-l10n-si(?::\w+|)\s+(.*)$ ^libreoffice-l10n-sk(?::\w+|)\s+(.*)$ ^libreoffice-l10n-sl(?::\w+|)\s+(.*)$ ^libreoffice-l10n-sr(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ss(?::\w+|)\s+(.*)$ ^libreoffice-l10n-st(?::\w+|)\s+(.*)$ ^libreoffice-l10n-sv(?::\w+|)\s+(.*)$ ^libreoffice-l10n-szl(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ta(?::\w+|)\s+(.*)$ ^libreoffice-l10n-te(?::\w+|)\s+(.*)$ ^libreoffice-l10n-tg(?::\w+|)\s+(.*)$ ^libreoffice-l10n-th(?::\w+|)\s+(.*)$ ^libreoffice-l10n-tn(?::\w+|)\s+(.*)$ ^libreoffice-l10n-tr(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ts(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ug(?::\w+|)\s+(.*)$ ^libreoffice-l10n-uk(?::\w+|)\s+(.*)$ ^libreoffice-l10n-uz(?::\w+|)\s+(.*)$ ^libreoffice-l10n-ve(?::\w+|)\s+(.*)$ ^libreoffice-l10n-vi(?::\w+|)\s+(.*)$ ^libreoffice-l10n-xh(?::\w+|)\s+(.*)$ ^libreoffice-l10n-za(?::\w+|)\s+(.*)$ ^libreoffice-l10n-zh-cn(?::\w+|)\s+(.*)$ ^libreoffice-l10n-zh-tw(?::\w+|)\s+(.*)$ ^libreoffice-l10n-zu(?::\w+|)\s+(.*)$ ^libreoffice-librelogo(?::\w+|)\s+(.*)$ ^libreoffice-math(?::\w+|)\s+(.*)$ ^libreoffice-math-nogui(?::\w+|)\s+(.*)$ ^libreoffice-nogui(?::\w+|)\s+(.*)$ ^libreoffice-officebean(?::\w+|)\s+(.*)$ ^libreoffice-plasma(?::\w+|)\s+(.*)$ ^libreoffice-qt5(?::\w+|)\s+(.*)$ ^libreoffice-qt6(?::\w+|)\s+(.*)$ ^libreoffice-report-builder(?::\w+|)\s+(.*)$ ^libreoffice-report-builder-bin(?::\w+|)\s+(.*)$ ^libreoffice-report-builder-bin-nogui(?::\w+|)\s+(.*)$ ^libreoffice-script-provider-bsh(?::\w+|)\s+(.*)$ ^libreoffice-script-provider-js(?::\w+|)\s+(.*)$ ^libreoffice-script-provider-python(?::\w+|)\s+(.*)$ ^libreoffice-sdbc-firebird(?::\w+|)\s+(.*)$ ^libreoffice-sdbc-hsqldb(?::\w+|)\s+(.*)$ ^libreoffice-sdbc-mysql(?::\w+|)\s+(.*)$ ^libreoffice-sdbc-postgresql(?::\w+|)\s+(.*)$ ^libreoffice-smoketest-data(?::\w+|)\s+(.*)$ ^libreoffice-style-breeze(?::\w+|)\s+(.*)$ ^libreoffice-style-colibre(?::\w+|)\s+(.*)$ ^libreoffice-style-elementary(?::\w+|)\s+(.*)$ ^libreoffice-style-karasa-jaga(?::\w+|)\s+(.*)$ ^libreoffice-style-sifr(?::\w+|)\s+(.*)$ ^libreoffice-style-sukapura(?::\w+|)\s+(.*)$ ^libreoffice-style-tango(?::\w+|)\s+(.*)$ ^libreoffice-style-yaru(?::\w+|)\s+(.*)$ ^libreoffice-subsequentcheckbase(?::\w+|)\s+(.*)$ ^libreoffice-uiconfig-base(?::\w+|)\s+(.*)$ ^libreoffice-uiconfig-calc(?::\w+|)\s+(.*)$ ^libreoffice-uiconfig-common(?::\w+|)\s+(.*)$ ^libreoffice-uiconfig-draw(?::\w+|)\s+(.*)$ ^libreoffice-uiconfig-impress(?::\w+|)\s+(.*)$ ^libreoffice-uiconfig-math(?::\w+|)\s+(.*)$ ^libreoffice-uiconfig-report-builder(?::\w+|)\s+(.*)$ ^libreoffice-uiconfig-writer(?::\w+|)\s+(.*)$ ^libreoffice-writer(?::\w+|)\s+(.*)$ ^libreoffice-writer-nogui(?::\w+|)\s+(.*)$ ^libreofficekit-data(?::\w+|)\s+(.*)$ ^libreofficekit-dev(?::\w+|)\s+(.*)$ ^libridl-java(?::\w+|)\s+(.*)$ ^libuno-cppu3t64(?::\w+|)\s+(.*)$ ^libuno-cppuhelpergcc3-3t64(?::\w+|)\s+(.*)$ ^libuno-purpenvhelpergcc3-3t64(?::\w+|)\s+(.*)$ ^libuno-sal3t64(?::\w+|)\s+(.*)$ ^libuno-salhelpergcc3-3t64(?::\w+|)\s+(.*)$ ^libunoil-java(?::\w+|)\s+(.*)$ ^libunoloader-java(?::\w+|)\s+(.*)$ ^python3-access2base(?::\w+|)\s+(.*)$ ^python3-scriptforge(?::\w+|)\s+(.*)$ ^python3-uno(?::\w+|)\s+(.*)$ ^uno-libs-private(?::\w+|)\s+(.*)$ ^ure(?::\w+|)\s+(.*)$ ^ure-java(?::\w+|)\s+(.*)$ ^gnome-shell(?::\w+|)\s+(.*)$ ^gnome-shell-common(?::\w+|)\s+(.*)$ ^gnome-shell-extension-prefs(?::\w+|)\s+(.*)$ ^liborc-0.4-0t64(?::\w+|)\s+(.*)$ ^liborc-0.4-dev(?::\w+|)\s+(.*)$ ^liborc-0.4-dev-bin(?::\w+|)\s+(.*)$ ^liborc-0.4-doc(?::\w+|)\s+(.*)$ ^intel-microcode(?::\w+|)\s+(.*)$ ^libecpg-compat3(?::\w+|)\s+(.*)$ ^libecpg-dev(?::\w+|)\s+(.*)$ ^libecpg6(?::\w+|)\s+(.*)$ ^libpgtypes3(?::\w+|)\s+(.*)$ ^libpq-dev(?::\w+|)\s+(.*)$ ^libpq5(?::\w+|)\s+(.*)$ ^postgresql-16(?::\w+|)\s+(.*)$ ^postgresql-client-16(?::\w+|)\s+(.*)$ ^postgresql-doc-16(?::\w+|)\s+(.*)$ ^postgresql-plperl-16(?::\w+|)\s+(.*)$ ^postgresql-plpython3-16(?::\w+|)\s+(.*)$ ^postgresql-pltcl-16(?::\w+|)\s+(.*)$ ^postgresql-server-dev-16(?::\w+|)\s+(.*)$ ^cacti(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-gke)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-raspi)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-ibm|-oem|-oracle|-oracle-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-nvidia|-nvidia-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-nvidia-lowlatency|-nvidia-lowlatency-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-gcp)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-azure|-azure-fde)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-aws)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-generic|-generic-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-lowlatency|-lowlatency-64k)(?::\w+|)\s+(.*)$ ^qemu-block-extra(?::\w+|)\s+(.*)$ ^qemu-block-supplemental(?::\w+|)\s+(.*)$ ^qemu-guest-agent(?::\w+|)\s+(.*)$ ^qemu-system(?::\w+|)\s+(.*)$ ^qemu-system-arm(?::\w+|)\s+(.*)$ ^qemu-system-common(?::\w+|)\s+(.*)$ ^qemu-system-data(?::\w+|)\s+(.*)$ ^qemu-system-gui(?::\w+|)\s+(.*)$ ^qemu-system-mips(?::\w+|)\s+(.*)$ ^qemu-system-misc(?::\w+|)\s+(.*)$ ^qemu-system-modules-opengl(?::\w+|)\s+(.*)$ ^qemu-system-modules-spice(?::\w+|)\s+(.*)$ ^qemu-system-ppc(?::\w+|)\s+(.*)$ ^qemu-system-s390x(?::\w+|)\s+(.*)$ ^qemu-system-sparc(?::\w+|)\s+(.*)$ ^qemu-system-x86(?::\w+|)\s+(.*)$ ^qemu-system-x86-xen(?::\w+|)\s+(.*)$ ^qemu-system-xen(?::\w+|)\s+(.*)$ ^qemu-user(?::\w+|)\s+(.*)$ ^qemu-user-binfmt(?::\w+|)\s+(.*)$ ^qemu-user-static(?::\w+|)\s+(.*)$ ^qemu-utils(?::\w+|)\s+(.*)$ ^dovecot-auth-lua(?::\w+|)\s+(.*)$ ^dovecot-core(?::\w+|)\s+(.*)$ ^dovecot-dev(?::\w+|)\s+(.*)$ ^dovecot-gssapi(?::\w+|)\s+(.*)$ ^dovecot-imapd(?::\w+|)\s+(.*)$ ^dovecot-ldap(?::\w+|)\s+(.*)$ ^dovecot-lmtpd(?::\w+|)\s+(.*)$ ^dovecot-managesieved(?::\w+|)\s+(.*)$ ^dovecot-mysql(?::\w+|)\s+(.*)$ ^dovecot-pgsql(?::\w+|)\s+(.*)$ ^dovecot-pop3d(?::\w+|)\s+(.*)$ ^dovecot-sieve(?::\w+|)\s+(.*)$ ^dovecot-solr(?::\w+|)\s+(.*)$ ^dovecot-sqlite(?::\w+|)\s+(.*)$ ^dovecot-submissiond(?::\w+|)\s+(.*)$ ^ffmpeg(?::\w+|)\s+(.*)$ ^ffmpeg-doc(?::\w+|)\s+(.*)$ ^libavcodec-dev(?::\w+|)\s+(.*)$ ^libavcodec-extra(?::\w+|)\s+(.*)$ ^libavcodec-extra60(?::\w+|)\s+(.*)$ ^libavcodec60(?::\w+|)\s+(.*)$ ^libavdevice-dev(?::\w+|)\s+(.*)$ ^libavdevice60(?::\w+|)\s+(.*)$ ^libavfilter-dev(?::\w+|)\s+(.*)$ ^libavfilter-extra(?::\w+|)\s+(.*)$ ^libavfilter-extra9(?::\w+|)\s+(.*)$ ^libavfilter9(?::\w+|)\s+(.*)$ ^libavformat-dev(?::\w+|)\s+(.*)$ ^libavformat-extra(?::\w+|)\s+(.*)$ ^libavformat-extra60(?::\w+|)\s+(.*)$ ^libavformat60(?::\w+|)\s+(.*)$ ^libavutil-dev(?::\w+|)\s+(.*)$ ^libavutil58(?::\w+|)\s+(.*)$ ^libpostproc-dev(?::\w+|)\s+(.*)$ ^libpostproc57(?::\w+|)\s+(.*)$ ^libswresample-dev(?::\w+|)\s+(.*)$ ^libswresample4(?::\w+|)\s+(.*)$ ^libswscale-dev(?::\w+|)\s+(.*)$ ^libswscale7(?::\w+|)\s+(.*)$ ^python-webob-doc(?::\w+|)\s+(.*)$ ^python3-webob(?::\w+|)\s+(.*)$ ^libssl-dev(?::\w+|)\s+(.*)$ ^libssl-doc(?::\w+|)\s+(.*)$ ^libssl3t64(?::\w+|)\s+(.*)$ ^openssl(?::\w+|)\s+(.*)$ ^python-django-doc(?::\w+|)\s+(.*)$ ^python3-django(?::\w+|)\s+(.*)$ ^python3-twisted(?::\w+|)\s+(.*)$ ^twisted-doc(?::\w+|)\s+(.*)$ ^ironic-api(?::\w+|)\s+(.*)$ ^ironic-common(?::\w+|)\s+(.*)$ ^ironic-conductor(?::\w+|)\s+(.*)$ ^python3-ironic(?::\w+|)\s+(.*)$ ^znc-backlog(?::\w+|)\s+(.*)$ ^znc-push(?::\w+|)\s+(.*)$ ^znc(?::\w+|)\s+(.*)$ ^znc-dev(?::\w+|)\s+(.*)$ ^znc-perl(?::\w+|)\s+(.*)$ ^znc-python(?::\w+|)\s+(.*)$ ^znc-tcl(?::\w+|)\s+(.*)$ ^python-aiohttp-doc(?::\w+|)\s+(.*)$ ^python3-aiohttp(?::\w+|)\s+(.*)$ ^vim(?::\w+|)\s+(.*)$ ^vim-athena(?::\w+|)\s+(.*)$ ^vim-common(?::\w+|)\s+(.*)$ ^vim-doc(?::\w+|)\s+(.*)$ ^vim-gtk3(?::\w+|)\s+(.*)$ ^vim-gui-common(?::\w+|)\s+(.*)$ ^vim-motif(?::\w+|)\s+(.*)$ ^vim-nox(?::\w+|)\s+(.*)$ ^vim-runtime(?::\w+|)\s+(.*)$ ^vim-tiny(?::\w+|)\s+(.*)$ ^xxd(?::\w+|)\s+(.*)$ ^gir1.2-javascriptcoregtk-4.1(?::\w+|)\s+(.*)$ ^gir1.2-javascriptcoregtk-6.0(?::\w+|)\s+(.*)$ ^gir1.2-webkit-6.0(?::\w+|)\s+(.*)$ ^gir1.2-webkit2-4.1(?::\w+|)\s+(.*)$ ^libjavascriptcoregtk-4.0-bin(?::\w+|)\s+(.*)$ ^libjavascriptcoregtk-4.1-0(?::\w+|)\s+(.*)$ ^libjavascriptcoregtk-4.1-dev(?::\w+|)\s+(.*)$ ^libjavascriptcoregtk-6.0-1(?::\w+|)\s+(.*)$ ^libjavascriptcoregtk-6.0-dev(?::\w+|)\s+(.*)$ ^libjavascriptcoregtk-bin(?::\w+|)\s+(.*)$ ^libwebkit2gtk-4.0-doc(?::\w+|)\s+(.*)$ ^libwebkit2gtk-4.1-0(?::\w+|)\s+(.*)$ ^libwebkit2gtk-4.1-dev(?::\w+|)\s+(.*)$ ^libwebkitgtk-6.0-4(?::\w+|)\s+(.*)$ ^libwebkitgtk-6.0-dev(?::\w+|)\s+(.*)$ ^libwebkitgtk-doc(?::\w+|)\s+(.*)$ ^webkit2gtk-driver(?::\w+|)\s+(.*)$ ^libtiff-dev(?::\w+|)\s+(.*)$ ^libtiff-doc(?::\w+|)\s+(.*)$ ^libtiff-opengl(?::\w+|)\s+(.*)$ ^libtiff-tools(?::\w+|)\s+(.*)$ ^libtiff5-dev(?::\w+|)\s+(.*)$ ^libtiff6(?::\w+|)\s+(.*)$ ^libtiffxx6(?::\w+|)\s+(.*)$ ^libunbound-dev(?::\w+|)\s+(.*)$ ^libunbound8(?::\w+|)\s+(.*)$ ^python3-unbound(?::\w+|)\s+(.*)$ ^unbound(?::\w+|)\s+(.*)$ ^unbound-anchor(?::\w+|)\s+(.*)$ ^unbound-host(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-gke)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-ibm|-oem|-oracle|-oracle-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-gcp)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-aws)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-generic|-generic-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-lowlatency|-lowlatency-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-raspi)(?::\w+|)\s+(.*)$ ^expat(?::\w+|)\s+(.*)$ ^libexpat1(?::\w+|)\s+(.*)$ ^libexpat1-dev(?::\w+|)\s+(.*)$ ^libxmltok1-dev(?::\w+|)\s+(.*)$ ^libxmltok1t64(?::\w+|)\s+(.*)$ ^python-setuptools-doc(?::\w+|)\s+(.*)$ ^python3-pkg-resources(?::\w+|)\s+(.*)$ ^python3-setuptools(?::\w+|)\s+(.*)$ ^python3-setuptools-whl(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-azure|-azure-fde)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-nvidia|-nvidia-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-nvidia-lowlatency|-nvidia-lowlatency-64k)(?::\w+|)\s+(.*)$ ^dcmtk(?::\w+|)\s+(.*)$ ^dcmtk-doc(?::\w+|)\s+(.*)$ ^libdcmtk-dev(?::\w+|)\s+(.*)$ ^libdcmtk17t64(?::\w+|)\s+(.*)$ ^clamav(?::\w+|)\s+(.*)$ ^clamav-base(?::\w+|)\s+(.*)$ ^clamav-daemon(?::\w+|)\s+(.*)$ ^clamav-docs(?::\w+|)\s+(.*)$ ^clamav-freshclam(?::\w+|)\s+(.*)$ ^clamav-milter(?::\w+|)\s+(.*)$ ^clamav-testfiles(?::\w+|)\s+(.*)$ ^clamdscan(?::\w+|)\s+(.*)$ ^libclamav-dev(?::\w+|)\s+(.*)$ ^libclamav11t64(?::\w+|)\s+(.*)$ ^curl(?::\w+|)\s+(.*)$ ^libcurl3t64-gnutls(?::\w+|)\s+(.*)$ ^libcurl4-doc(?::\w+|)\s+(.*)$ ^libcurl4-gnutls-dev(?::\w+|)\s+(.*)$ ^libcurl4-openssl-dev(?::\w+|)\s+(.*)$ ^libcurl4t64(?::\w+|)\s+(.*)$ ^libnginx-mod-http-geoip(?::\w+|)\s+(.*)$ ^libnginx-mod-http-image-filter(?::\w+|)\s+(.*)$ ^libnginx-mod-http-perl(?::\w+|)\s+(.*)$ ^libnginx-mod-http-xslt-filter(?::\w+|)\s+(.*)$ ^libnginx-mod-mail(?::\w+|)\s+(.*)$ ^libnginx-mod-stream(?::\w+|)\s+(.*)$ ^libnginx-mod-stream-geoip(?::\w+|)\s+(.*)$ ^nginx(?::\w+|)\s+(.*)$ ^nginx-common(?::\w+|)\s+(.*)$ ^nginx-core(?::\w+|)\s+(.*)$ ^nginx-dev(?::\w+|)\s+(.*)$ ^nginx-doc(?::\w+|)\s+(.*)$ ^nginx-extras(?::\w+|)\s+(.*)$ ^nginx-full(?::\w+|)\s+(.*)$ ^nginx-light(?::\w+|)\s+(.*)$ ^idle-python3.12(?::\w+|)\s+(.*)$ ^libpython3.12-dev(?::\w+|)\s+(.*)$ ^libpython3.12-minimal(?::\w+|)\s+(.*)$ ^libpython3.12-stdlib(?::\w+|)\s+(.*)$ ^libpython3.12-testsuite(?::\w+|)\s+(.*)$ ^libpython3.12t64(?::\w+|)\s+(.*)$ ^python3.12(?::\w+|)\s+(.*)$ ^python3.12-dev(?::\w+|)\s+(.*)$ ^python3.12-doc(?::\w+|)\s+(.*)$ ^python3.12-examples(?::\w+|)\s+(.*)$ ^python3.12-full(?::\w+|)\s+(.*)$ ^python3.12-minimal(?::\w+|)\s+(.*)$ ^python3.12-nopie(?::\w+|)\s+(.*)$ ^python3.12-venv(?::\w+|)\s+(.*)$ ^frr(?::\w+|)\s+(.*)$ ^frr-doc(?::\w+|)\s+(.*)$ ^frr-pythontools(?::\w+|)\s+(.*)$ ^frr-rpki-rtrlib(?::\w+|)\s+(.*)$ ^frr-snmp(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-gke)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-ibm|-oem|-oracle|-oracle-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-nvidia|-nvidia-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-nvidia-lowlatency|-nvidia-lowlatency-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-gcp)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-aws)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-generic|-generic-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-lowlatency|-lowlatency-64k)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-azure|-azure-fde)(?::\w+|)\s+(.*)$ ^linux-image-(?:unsigned-)?6.8.0-\d+(?:-raspi)(?::\w+|)\s+(.*)$ ^emacs(?::\w+|)\s+(.*)$ ^emacs-bin-common(?::\w+|)\s+(.*)$ ^emacs-common(?::\w+|)\s+(.*)$ ^emacs-el(?::\w+|)\s+(.*)$ ^emacs-gtk(?::\w+|)\s+(.*)$ ^emacs-lucid(?::\w+|)\s+(.*)$ ^emacs-nox(?::\w+|)\s+(.*)$ ^emacs-pgtk(?::\w+|)\s+(.*)$ ^puma(?::\w+|)\s+(.*)$ ^libtomcat9-java(?::\w+|)\s+(.*)$ ^intel-microcode(?::\w+|)\s+(.*)$ ^libopenjp2-7(?::\w+|)\s+(.*)$ ^libopenjp2-7-dev(?::\w+|)\s+(.*)$ ^libopenjp2-tools(?::\w+|)\s+(.*)$ ^libopenjpip-dec-server(?::\w+|)\s+(.*)$ ^libopenjpip-server(?::\w+|)\s+(.*)$ ^libopenjpip-viewer(?::\w+|)\s+(.*)$ ^libopenjpip7(?::\w+|)\s+(.*)$ ^openjpeg-doc(?::\w+|)\s+(.*)$ ^libapr1-dev(?::\w+|)\s+(.*)$ ^libapr1t64(?::\w+|)\s+(.*)$ ^cups(?::\w+|)\s+(.*)$ ^cups-bsd(?::\w+|)\s+(.*)$ ^cups-client(?::\w+|)\s+(.*)$ ^cups-common(?::\w+|)\s+(.*)$ ^cups-core-drivers(?::\w+|)\s+(.*)$ ^cups-daemon(?::\w+|)\s+(.*)$ ^cups-ipp-utils(?::\w+|)\s+(.*)$ ^cups-ppdc(?::\w+|)\s+(.*)$ ^cups-server-common(?::\w+|)\s+(.*)$ ^libcups2-dev(?::\w+|)\s+(.*)$ ^libcups2t64(?::\w+|)\s+(.*)$ ^libcupsimage2-dev(?::\w+|)\s+(.*)$ ^libcupsimage2t64(?::\w+|)\s+(.*)$ ^cups-browsed(?::\w+|)\s+(.*)$ ^cups-browsed-tests(?::\w+|)\s+(.*)$ ^libcupsfilters-dev(?::\w+|)\s+(.*)$ ^libcupsfilters-tests(?::\w+|)\s+(.*)$ ^libcupsfilters2-common(?::\w+|)\s+(.*)$ ^libcupsfilters2t64(?::\w+|)\s+(.*)$ ^libppd-dev(?::\w+|)\s+(.*)$ ^libppd-tests(?::\w+|)\s+(.*)$ ^libppd-utils(?::\w+|)\s+(.*)$ ^libppd2(?::\w+|)\s+(.*)$ ^libppd2-common(?::\w+|)\s+(.*)$ ^ppdc(?::\w+|)\s+(.*)$